mitmproxy/pathoc

39 lines
1.4 KiB
Plaintext
Raw Normal View History

#!/usr/bin/env python
import argparse, sys
from libpathod import pathoc, version, rparse
if __name__ == "__main__":
parser = argparse.ArgumentParser(description='A perverse HTTP client.')
parser.add_argument('--port', "-p", type=int, default=None, help="Port. Defaults to 80, or 443 if SSL is active.")
parser.add_argument('--ssl', "-s", action="store_true", default=False, help="Connect with SSL.")
parser.add_argument('--sni', "-n", type=str, default=False, help="SSL Server Name Indication.")
parser.add_argument('--verbose', '-v', action='count')
parser.add_argument('host', type=str, help='Host to connect to')
parser.add_argument('request', type=str, nargs="+", help='Request specification')
args = parser.parse_args()
2012-06-24 09:40:31 +00:00
if args.port is None:
port = 443 if args.ssl else 80
else:
port = args.port
try:
p = pathoc.Pathoc(args.host, port)
p.connect()
if args.ssl:
p.convert_to_ssl(sni=args.sni)
for i in args.request:
ret = p.request(i)
if args.verbose:
pathoc.print_full(sys.stdout, *ret)
else:
pathoc.print_short(sys.stdout, *ret)
except pathoc.PathocError, v:
print >> sys.stderr, str(v)
sys.exit(1)
except rparse.ParseException, v:
print >> sys.stderr, "Error parsing request spec: %s"%v.msg
print >> sys.stderr, v.marked()
sys.exit(1)