2011-01-25 02:02:48 +00:00
|
|
|
"""
|
|
|
|
This module provides more sophisticated flow tracking. These match requests
|
|
|
|
with their responses, and provide filtering and interception facilities.
|
|
|
|
"""
|
2014-01-19 05:16:24 +00:00
|
|
|
import hashlib, Cookie, cookielib, copy, re, urlparse, threading
|
2012-08-19 01:03:21 +00:00
|
|
|
import time, urllib
|
2011-08-19 09:38:05 +00:00
|
|
|
import tnetstring, filt, script, utils, encoding, proxy
|
2011-08-03 10:38:23 +00:00
|
|
|
from email.utils import parsedate_tz, formatdate, mktime_tz
|
2014-01-04 01:35:11 +00:00
|
|
|
from netlib import odict, http, certutils, wsgi
|
2012-06-27 04:43:33 +00:00
|
|
|
import controller, version
|
2013-03-24 20:20:26 +00:00
|
|
|
import app
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2012-02-10 01:35:23 +00:00
|
|
|
HDR_FORM_URLENCODED = "application/x-www-form-urlencoded"
|
2012-05-16 03:42:58 +00:00
|
|
|
CONTENT_MISSING = 0
|
2012-02-10 01:27:39 +00:00
|
|
|
|
2012-06-18 21:58:50 +00:00
|
|
|
ODict = odict.ODict
|
|
|
|
ODictCaseless = odict.ODictCaseless
|
|
|
|
|
2011-01-31 00:26:56 +00:00
|
|
|
|
2014-01-04 01:35:11 +00:00
|
|
|
class AppRegistry:
|
|
|
|
def __init__(self):
|
|
|
|
self.apps = {}
|
|
|
|
|
|
|
|
def add(self, app, domain, port):
|
|
|
|
"""
|
|
|
|
Add a WSGI app to the registry, to be served for requests to the
|
|
|
|
specified domain, on the specified port.
|
|
|
|
"""
|
|
|
|
self.apps[(domain, port)] = wsgi.WSGIAdaptor(app, domain, port, version.NAMEVERSION)
|
|
|
|
|
|
|
|
def get(self, request):
|
|
|
|
"""
|
|
|
|
Returns an WSGIAdaptor instance if request matches an app, or None.
|
|
|
|
"""
|
|
|
|
if (request.host, request.port) in self.apps:
|
|
|
|
return self.apps[(request.host, request.port)]
|
|
|
|
if "host" in request.headers:
|
|
|
|
host = request.headers["host"][0]
|
|
|
|
return self.apps.get((host, request.port), None)
|
|
|
|
|
|
|
|
|
2012-03-16 22:31:05 +00:00
|
|
|
class ReplaceHooks:
|
2012-03-16 04:13:11 +00:00
|
|
|
def __init__(self):
|
|
|
|
self.lst = []
|
|
|
|
|
2012-08-18 11:39:52 +00:00
|
|
|
def set(self, r):
|
|
|
|
self.clear()
|
|
|
|
for i in r:
|
|
|
|
self.add(*i)
|
|
|
|
|
2012-03-16 22:31:05 +00:00
|
|
|
def add(self, fpatt, rex, s):
|
2012-03-16 04:13:11 +00:00
|
|
|
"""
|
2013-03-24 20:20:26 +00:00
|
|
|
add a replacement hook.
|
2012-03-16 04:13:11 +00:00
|
|
|
|
2013-03-24 20:20:26 +00:00
|
|
|
fpatt: a string specifying a filter pattern.
|
|
|
|
rex: a regular expression.
|
|
|
|
s: the replacement string
|
2012-03-16 04:13:11 +00:00
|
|
|
|
2013-03-24 20:20:26 +00:00
|
|
|
returns true if hook was added, false if the pattern could not be
|
2012-03-16 04:13:11 +00:00
|
|
|
parsed.
|
|
|
|
"""
|
2012-03-16 22:31:05 +00:00
|
|
|
cpatt = filt.parse(fpatt)
|
2012-03-16 04:13:11 +00:00
|
|
|
if not cpatt:
|
|
|
|
return False
|
2012-03-23 00:28:33 +00:00
|
|
|
try:
|
|
|
|
re.compile(rex)
|
|
|
|
except re.error:
|
|
|
|
return False
|
2012-03-16 22:31:05 +00:00
|
|
|
self.lst.append((fpatt, rex, s, cpatt))
|
2012-03-16 04:13:11 +00:00
|
|
|
return True
|
|
|
|
|
2012-03-17 21:33:11 +00:00
|
|
|
def get_specs(self):
|
|
|
|
"""
|
|
|
|
Retrieve the hook specifcations. Returns a list of (fpatt, rex, s) tuples.
|
|
|
|
"""
|
|
|
|
return [i[:3] for i in self.lst]
|
|
|
|
|
|
|
|
def count(self):
|
|
|
|
return len(self.lst)
|
|
|
|
|
2012-03-16 04:13:11 +00:00
|
|
|
def run(self, f):
|
2012-03-16 22:31:05 +00:00
|
|
|
for _, rex, s, cpatt in self.lst:
|
2012-03-16 04:13:11 +00:00
|
|
|
if cpatt(f):
|
2012-03-16 22:31:05 +00:00
|
|
|
if f.response:
|
|
|
|
f.response.replace(rex, s)
|
|
|
|
else:
|
|
|
|
f.request.replace(rex, s)
|
2012-03-16 04:13:11 +00:00
|
|
|
|
|
|
|
def clear(self):
|
|
|
|
self.lst = []
|
|
|
|
|
|
|
|
|
2012-08-18 11:39:52 +00:00
|
|
|
class SetHeaders:
|
|
|
|
def __init__(self):
|
|
|
|
self.lst = []
|
|
|
|
|
|
|
|
def set(self, r):
|
|
|
|
self.clear()
|
|
|
|
for i in r:
|
|
|
|
self.add(*i)
|
|
|
|
|
|
|
|
def add(self, fpatt, header, value):
|
|
|
|
"""
|
|
|
|
Add a set header hook.
|
|
|
|
|
|
|
|
fpatt: String specifying a filter pattern.
|
|
|
|
header: Header name.
|
|
|
|
value: Header value string
|
|
|
|
|
|
|
|
Returns True if hook was added, False if the pattern could not be
|
|
|
|
parsed.
|
|
|
|
"""
|
|
|
|
cpatt = filt.parse(fpatt)
|
|
|
|
if not cpatt:
|
|
|
|
return False
|
|
|
|
self.lst.append((fpatt, header, value, cpatt))
|
|
|
|
return True
|
|
|
|
|
|
|
|
def get_specs(self):
|
|
|
|
"""
|
|
|
|
Retrieve the hook specifcations. Returns a list of (fpatt, rex, s) tuples.
|
|
|
|
"""
|
|
|
|
return [i[:3] for i in self.lst]
|
|
|
|
|
|
|
|
def count(self):
|
|
|
|
return len(self.lst)
|
|
|
|
|
|
|
|
def clear(self):
|
|
|
|
self.lst = []
|
|
|
|
|
|
|
|
def run(self, f):
|
|
|
|
for _, header, value, cpatt in self.lst:
|
|
|
|
if cpatt(f):
|
|
|
|
if f.response:
|
|
|
|
del f.response.headers[header]
|
|
|
|
else:
|
|
|
|
del f.request.headers[header]
|
|
|
|
for _, header, value, cpatt in self.lst:
|
|
|
|
if cpatt(f):
|
|
|
|
if f.response:
|
|
|
|
f.response.headers.add(header, value)
|
|
|
|
else:
|
|
|
|
f.request.headers.add(header, value)
|
|
|
|
|
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
class StateObject:
|
|
|
|
def _get_state(self):
|
|
|
|
raise NotImplementedError
|
2012-03-15 22:12:56 +00:00
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
def _load_state(self, state):
|
|
|
|
raise NotImplementedError
|
2012-03-15 22:12:56 +00:00
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
@classmethod
|
|
|
|
def _from_state(cls, state):
|
|
|
|
raise NotImplementedError
|
2012-03-15 22:12:56 +00:00
|
|
|
|
2013-02-23 01:08:28 +00:00
|
|
|
def __eq__(self, other):
|
|
|
|
try:
|
|
|
|
return self._get_state() == other._get_state()
|
2014-01-30 04:00:13 +00:00
|
|
|
except AttributeError: # we may compare with something that's not a StateObject
|
2013-02-23 01:08:28 +00:00
|
|
|
return False
|
|
|
|
|
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
class SimpleStateObject(StateObject):
|
2011-08-03 21:26:26 +00:00
|
|
|
"""
|
2014-01-30 04:00:13 +00:00
|
|
|
A StateObject with opionated conventions that tries to keep everything DRY.y
|
2011-08-03 21:26:26 +00:00
|
|
|
"""
|
2014-01-04 21:58:53 +00:00
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
_stateobject_attributes = None
|
|
|
|
"""
|
|
|
|
A dict where the keys represent the attributes to be serialized.
|
|
|
|
The values represent the attribute class or type.
|
|
|
|
If the attribute is a class, this class must be a subclass of StateObject.
|
|
|
|
"""
|
2011-08-03 10:38:23 +00:00
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
def _get_state(self):
|
|
|
|
return {attr: (getattr(self, attr)._get_state()
|
|
|
|
if (type(cls) == 'classobj')
|
|
|
|
else getattr(self, attr))
|
|
|
|
for attr, cls in self._stateobject_attributes.iteritems()}
|
2011-08-03 10:38:23 +00:00
|
|
|
|
2011-08-03 10:48:40 +00:00
|
|
|
def _load_state(self, state):
|
2014-01-30 04:00:13 +00:00
|
|
|
for attr, cls in self._stateobject_attributes.iteritems():
|
|
|
|
self._load_state_attr(attr, cls, state)
|
|
|
|
|
|
|
|
def _load_state_attr(self, attribute, cls, state):
|
|
|
|
if state[attribute] is not None:
|
|
|
|
if type(cls) == 'classobj':
|
|
|
|
assert issubclass(cls, StateObject)
|
|
|
|
curr = getattr(self, attribute)
|
|
|
|
if curr:
|
|
|
|
curr._load_state(state[attribute])
|
|
|
|
else:
|
|
|
|
setattr(self, attribute, cls._from_state(state[attribute]))
|
2011-08-03 10:38:23 +00:00
|
|
|
else:
|
2014-01-30 04:00:13 +00:00
|
|
|
setattr(self, attribute, cls(state[attribute]))
|
2011-08-03 10:38:23 +00:00
|
|
|
else:
|
2014-01-30 04:00:13 +00:00
|
|
|
setattr(self, attribute, None)
|
2011-08-03 10:38:23 +00:00
|
|
|
|
|
|
|
@classmethod
|
2014-01-30 04:00:13 +00:00
|
|
|
def _from_state(cls, state):
|
|
|
|
f = cls()
|
|
|
|
f._load_state(state)
|
|
|
|
return f
|
2011-08-03 10:38:23 +00:00
|
|
|
|
|
|
|
|
2014-01-30 04:00:13 +00:00
|
|
|
class Response(object):
|
2011-08-03 21:29:55 +00:00
|
|
|
"""
|
|
|
|
An HTTP response.
|
|
|
|
|
|
|
|
Exposes the following attributes:
|
|
|
|
|
|
|
|
request: Request object.
|
2012-05-16 03:42:58 +00:00
|
|
|
|
2011-08-03 21:29:55 +00:00
|
|
|
code: HTTP response code
|
2012-05-16 03:42:58 +00:00
|
|
|
|
2011-08-03 21:29:55 +00:00
|
|
|
msg: HTTP response message
|
2012-05-16 03:42:58 +00:00
|
|
|
|
2012-02-19 21:34:32 +00:00
|
|
|
headers: ODict object
|
2012-05-16 03:42:58 +00:00
|
|
|
|
|
|
|
content: Content of the request, None, or CONTENT_MISSING if there
|
|
|
|
is content associated, but not present. CONTENT_MISSING evaluates
|
|
|
|
to False to make checking for the presence of content natural.
|
|
|
|
|
2013-01-17 15:32:56 +00:00
|
|
|
timestamp_start: Seconds since the epoch signifying response transmission started
|
|
|
|
|
|
|
|
timestamp_end: Seconds since the epoch signifying response transmission ended
|
2011-08-03 21:29:55 +00:00
|
|
|
"""
|
2013-01-17 15:32:56 +00:00
|
|
|
def __init__(self, request, httpversion, code, msg, headers, content, cert, timestamp_start=None, timestamp_end=None):
|
2012-02-19 22:29:36 +00:00
|
|
|
assert isinstance(headers, ODictCaseless)
|
2011-08-03 10:38:23 +00:00
|
|
|
self.request = request
|
2012-06-10 01:27:43 +00:00
|
|
|
self.httpversion, self.code, self.msg = httpversion, code, msg
|
2011-08-03 10:38:23 +00:00
|
|
|
self.headers, self.content = headers, content
|
2012-06-28 02:29:15 +00:00
|
|
|
self.cert = cert
|
2013-01-17 15:32:56 +00:00
|
|
|
self.timestamp_start = timestamp_start or utils.timestamp()
|
2013-08-22 22:01:19 +00:00
|
|
|
self.timestamp_end = timestamp_end or utils.timestamp()
|
2011-08-03 10:38:23 +00:00
|
|
|
self.replay = False
|
|
|
|
|
|
|
|
def _refresh_cookie(self, c, delta):
|
|
|
|
"""
|
|
|
|
Takes a cookie string c and a time delta in seconds, and returns
|
|
|
|
a refreshed cookie string.
|
|
|
|
"""
|
|
|
|
c = Cookie.SimpleCookie(str(c))
|
|
|
|
for i in c.values():
|
|
|
|
if "expires" in i:
|
|
|
|
d = parsedate_tz(i["expires"])
|
|
|
|
if d:
|
|
|
|
d = mktime_tz(d) + delta
|
|
|
|
i["expires"] = formatdate(d)
|
|
|
|
else:
|
|
|
|
# This can happen when the expires tag is invalid.
|
|
|
|
# reddit.com sends a an expires tag like this: "Thu, 31 Dec
|
|
|
|
# 2037 23:59:59 GMT", which is valid RFC 1123, but not
|
|
|
|
# strictly correct according tot he cookie spec. Browsers
|
|
|
|
# appear to parse this tolerantly - maybe we should too.
|
|
|
|
# For now, we just ignore this.
|
|
|
|
del i["expires"]
|
|
|
|
return c.output(header="").strip()
|
|
|
|
|
|
|
|
def refresh(self, now=None):
|
|
|
|
"""
|
|
|
|
This fairly complex and heuristic function refreshes a server
|
|
|
|
response for replay.
|
|
|
|
|
|
|
|
- It adjusts date, expires and last-modified headers.
|
|
|
|
- It adjusts cookie expiration.
|
|
|
|
"""
|
|
|
|
if not now:
|
|
|
|
now = time.time()
|
2013-01-17 15:32:56 +00:00
|
|
|
delta = now - self.timestamp_start
|
2011-08-03 10:38:23 +00:00
|
|
|
refresh_headers = [
|
|
|
|
"date",
|
|
|
|
"expires",
|
|
|
|
"last-modified",
|
|
|
|
]
|
|
|
|
for i in refresh_headers:
|
|
|
|
if i in self.headers:
|
|
|
|
d = parsedate_tz(self.headers[i][0])
|
|
|
|
if d:
|
|
|
|
new = mktime_tz(d) + delta
|
|
|
|
self.headers[i] = [formatdate(new)]
|
|
|
|
c = []
|
|
|
|
for i in self.headers["set-cookie"]:
|
|
|
|
c.append(self._refresh_cookie(i, delta))
|
|
|
|
if c:
|
|
|
|
self.headers["set-cookie"] = c
|
|
|
|
|
2011-08-03 21:26:26 +00:00
|
|
|
def _set_replay(self):
|
2011-08-03 10:38:23 +00:00
|
|
|
self.replay = True
|
|
|
|
|
|
|
|
def is_replay(self):
|
2011-08-03 21:26:26 +00:00
|
|
|
"""
|
|
|
|
Is this response a replay?
|
|
|
|
"""
|
2011-08-03 10:38:23 +00:00
|
|
|
return self.replay
|
|
|
|
|
2011-08-03 10:48:40 +00:00
|
|
|
def _load_state(self, state):
|
2011-08-03 10:38:23 +00:00
|
|
|
self.code = state["code"]
|
|
|
|
self.msg = state["msg"]
|
2012-02-19 22:29:36 +00:00
|
|
|
self.headers = ODictCaseless._from_state(state["headers"])
|
2011-08-19 09:30:24 +00:00
|
|
|
self.content = state["content"]
|
2013-01-17 15:32:56 +00:00
|
|
|
self.timestamp_start = state["timestamp_start"]
|
|
|
|
self.timestamp_end = state["timestamp_end"]
|
2012-07-04 23:52:56 +00:00
|
|
|
self.cert = certutils.SSLCert.from_pem(state["cert"]) if state["cert"] else None
|
2011-08-03 10:38:23 +00:00
|
|
|
|
2011-08-03 10:48:40 +00:00
|
|
|
def _get_state(self):
|
2011-08-03 10:38:23 +00:00
|
|
|
return dict(
|
2012-06-10 01:27:43 +00:00
|
|
|
httpversion = self.httpversion,
|
2011-08-03 10:38:23 +00:00
|
|
|
code = self.code,
|
|
|
|
msg = self.msg,
|
2011-08-03 10:48:40 +00:00
|
|
|
headers = self.headers._get_state(),
|
2013-01-17 15:32:56 +00:00
|
|
|
timestamp_start = self.timestamp_start,
|
|
|
|
timestamp_end = self.timestamp_end,
|
2012-06-28 02:29:15 +00:00
|
|
|
cert = self.cert.to_pem() if self.cert else None,
|
2013-01-17 15:32:56 +00:00
|
|
|
content = self.content,
|
2011-08-03 10:38:23 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
@classmethod
|
2011-08-03 10:48:40 +00:00
|
|
|
def _from_state(klass, request, state):
|
2011-08-03 10:38:23 +00:00
|
|
|
return klass(
|
|
|
|
request,
|
2012-06-10 01:27:43 +00:00
|
|
|
state["httpversion"],
|
2011-08-03 10:38:23 +00:00
|
|
|
state["code"],
|
|
|
|
str(state["msg"]),
|
2012-02-19 22:29:36 +00:00
|
|
|
ODictCaseless._from_state(state["headers"]),
|
2011-08-19 09:30:24 +00:00
|
|
|
state["content"],
|
2012-06-28 02:29:15 +00:00
|
|
|
certutils.SSLCert.from_pem(state["cert"]) if state["cert"] else None,
|
2013-01-17 15:32:56 +00:00
|
|
|
state["timestamp_start"],
|
|
|
|
state["timestamp_end"],
|
2011-08-03 10:38:23 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
def copy(self):
|
|
|
|
c = copy.copy(self)
|
|
|
|
c.headers = self.headers.copy()
|
|
|
|
return c
|
|
|
|
|
2012-08-04 01:18:05 +00:00
|
|
|
def _assemble_head(self):
|
|
|
|
FMT = '%s\r\n%s\r\n'
|
|
|
|
headers = self.headers.copy()
|
|
|
|
utils.del_all(
|
|
|
|
headers,
|
|
|
|
['proxy-connection', 'transfer-encoding']
|
|
|
|
)
|
|
|
|
if self.content:
|
2013-05-21 13:57:14 +00:00
|
|
|
headers["Content-Length"] = [str(len(self.content))]
|
2013-12-12 03:42:29 +00:00
|
|
|
elif 'Transfer-Encoding' in self.headers:
|
|
|
|
headers["Content-Length"] = ["0"]
|
2012-08-04 01:18:05 +00:00
|
|
|
proto = "HTTP/%s.%s %s %s"%(self.httpversion[0], self.httpversion[1], self.code, str(self.msg))
|
|
|
|
data = (proto, str(headers))
|
|
|
|
return FMT%data
|
|
|
|
|
2011-08-03 11:02:33 +00:00
|
|
|
def _assemble(self):
|
2011-08-03 10:38:23 +00:00
|
|
|
"""
|
|
|
|
Assembles the response for transmission to the client. We make some
|
|
|
|
modifications to make sure interception works properly.
|
2012-05-16 03:42:58 +00:00
|
|
|
|
|
|
|
Returns None if the request cannot be assembled.
|
2011-08-03 10:38:23 +00:00
|
|
|
"""
|
2012-05-16 03:42:58 +00:00
|
|
|
if self.content == CONTENT_MISSING:
|
|
|
|
return None
|
2012-08-04 01:18:05 +00:00
|
|
|
head = self._assemble_head()
|
|
|
|
if self.content:
|
|
|
|
return head + self.content
|
2012-04-25 02:38:20 +00:00
|
|
|
else:
|
2012-08-04 01:18:05 +00:00
|
|
|
return head
|
2011-08-03 10:38:23 +00:00
|
|
|
|
|
|
|
def replace(self, pattern, repl, *args, **kwargs):
|
|
|
|
"""
|
|
|
|
Replaces a regular expression pattern with repl in both the headers
|
2012-03-15 22:24:18 +00:00
|
|
|
and the body of the response. Encoded content will be decoded
|
|
|
|
before replacement, and re-encoded afterwards.
|
|
|
|
|
|
|
|
Returns the number of replacements made.
|
2011-08-03 10:38:23 +00:00
|
|
|
"""
|
2012-03-15 22:24:18 +00:00
|
|
|
with decoded(self):
|
2012-05-26 01:10:31 +00:00
|
|
|
self.content, c = utils.safe_subn(pattern, repl, self.content, *args, **kwargs)
|
2011-08-03 10:38:23 +00:00
|
|
|
c += self.headers.replace(pattern, repl, *args, **kwargs)
|
|
|
|
return c
|
|
|
|
|
2013-01-28 15:37:25 +00:00
|
|
|
def get_header_size(self):
|
|
|
|
FMT = '%s\r\n%s\r\n'
|
|
|
|
proto = "HTTP/%s.%s %s %s"%(self.httpversion[0], self.httpversion[1], self.code, str(self.msg))
|
|
|
|
assembled_header = FMT % (proto, str(self.headers))
|
|
|
|
return len(assembled_header)
|
|
|
|
|
|
|
|
def get_cookies(self):
|
|
|
|
cookie_headers = self.headers.get("set-cookie")
|
|
|
|
if not cookie_headers:
|
|
|
|
return None
|
|
|
|
|
|
|
|
cookies = []
|
|
|
|
for header in cookie_headers:
|
|
|
|
pairs = [pair.partition("=") for pair in header.split(';')]
|
|
|
|
cookie_name = pairs[0][0] # the key of the first key/value pairs
|
|
|
|
cookie_value = pairs[0][2] # the value of the first key/value pairs
|
|
|
|
cookie_parameters = {key.strip().lower():value.strip() for key,sep,value in pairs[1:]}
|
|
|
|
cookies.append((cookie_name, (cookie_value, cookie_parameters)))
|
|
|
|
return dict(cookies)
|
2011-08-03 10:38:23 +00:00
|
|
|
|
2013-07-13 02:44:09 +00:00
|
|
|
|
2013-02-16 23:42:48 +00:00
|
|
|
class ClientDisconnect:
|
2011-08-03 21:29:55 +00:00
|
|
|
"""
|
2011-10-26 01:49:15 +00:00
|
|
|
A client disconnection event.
|
2011-08-03 21:29:55 +00:00
|
|
|
|
|
|
|
Exposes the following attributes:
|
|
|
|
|
|
|
|
client_conn: ClientConnect object.
|
|
|
|
"""
|
2011-08-03 10:38:23 +00:00
|
|
|
def __init__(self, client_conn):
|
|
|
|
self.client_conn = client_conn
|
|
|
|
|
|
|
|
|
2013-02-23 01:08:28 +00:00
|
|
|
class ClientConnect(StateObject):
|
2011-08-03 21:29:55 +00:00
|
|
|
"""
|
|
|
|
A single client connection. Each connection can result in multiple HTTP
|
|
|
|
Requests.
|
|
|
|
|
|
|
|
Exposes the following attributes:
|
2011-10-26 01:49:15 +00:00
|
|
|
|
2011-08-03 21:29:55 +00:00
|
|
|
address: (address, port) tuple, or None if the connection is replayed.
|
|
|
|
requestcount: Number of requests created by this client connection.
|
|
|
|
close: Is the client connection closed?
|
2012-06-30 12:15:03 +00:00
|
|
|
error: Error string or None.
|
2011-08-03 21:29:55 +00:00
|
|
|
"""
|
2011-08-03 10:38:23 +00:00
|
|
|
def __init__(self, address):
|
|
|
|
"""
|
|
|
|
address is an (address, port) tuple, or None if this connection has
|
|
|
|
been replayed from within mitmproxy.
|
|
|
|
"""
|
|
|
|
self.address = address
|
|
|
|
self.close = False
|
2012-06-30 12:15:03 +00:00
|
|
|
self.error = None
|
2011-08-03 10:38:23 +00:00
|
|
|
|
2013-02-28 11:28:42 +00:00
|
|
|
def __str__(self):
|
|
|
|
if self.address:
|
|
|
|
return "%s:%d"%(self.address[0],self.address[1])
|
|
|
|
|
2011-08-03 10:48:40 +00:00
|
|
|
def _load_state(self, state):
|
2012-04-03 21:47:57 +00:00
|
|
|
self.close = True
|
2012-06-30 12:16:30 +00:00
|
|
|
self.error = state["error"]
|
2012-04-03 10:37:24 +00:00
|
|
|
self.requestcount = state["requestcount"]
|
2011-08-03 10:38:23 +00:00
|
|
|
|
2011-08-03 10:48:40 +00:00
|
|
|
def _get_state(self):
|
2012-04-03 10:37:24 +00:00
|
|
|
return dict(
|
|
|
|
address = list(self.address),
|
2014-01-29 01:49:11 +00:00
|
|
|
requestcount = -1, # FIXME self.requestcount,
|
2012-06-30 12:16:30 +00:00
|
|
|
error = self.error,
|
2012-04-03 10:37:24 +00:00
|
|
|
)
|
2011-08-03 10:38:23 +00:00
|
|
|
|
|
|
|
@classmethod
|
2011-08-03 10:48:40 +00:00
|
|
|
def _from_state(klass, state):
|
2011-08-03 10:38:23 +00:00
|
|
|
if state:
|
2012-04-03 10:37:24 +00:00
|
|
|
k = klass(state["address"])
|
|
|
|
k._load_state(state)
|
|
|
|
return k
|
2011-08-03 10:38:23 +00:00
|
|
|
else:
|
|
|
|
return None
|
|
|
|
|
|
|
|
def copy(self):
|
2013-02-23 01:08:28 +00:00
|
|
|
return copy.copy(self)
|
2011-08-03 10:38:23 +00:00
|
|
|
|
|
|
|
|
2013-02-23 01:08:28 +00:00
|
|
|
class Error(StateObject):
|
2011-08-03 21:29:55 +00:00
|
|
|
"""
|
2011-10-26 01:49:15 +00:00
|
|
|
An Error.
|
2011-08-03 21:29:55 +00:00
|
|
|
|
|
|
|
This is distinct from an HTTP error response (say, a code 500), which
|
|
|
|
is represented by a normal Response object. This class is responsible
|
|
|
|
for indicating errors that fall outside of normal HTTP communications,
|
|
|
|
like interrupted connections, timeouts, protocol errors.
|
|
|
|
|
|
|
|
Exposes the following attributes:
|
|
|
|
|
|
|
|
request: Request object
|
|
|
|
msg: Message describing the error
|
|
|
|
timestamp: Seconds since the epoch
|
|
|
|
"""
|
2011-08-03 10:38:23 +00:00
|
|
|
def __init__(self, request, msg, timestamp=None):
|
|
|
|
self.request, self.msg = request, msg
|
|
|
|
self.timestamp = timestamp or utils.timestamp()
|
|
|
|
|
2011-08-03 10:48:40 +00:00
|
|
|
def _load_state(self, state):
|
2011-08-03 10:38:23 +00:00
|
|
|
self.msg = state["msg"]
|
|
|
|
self.timestamp = state["timestamp"]
|
|
|
|
|
|
|
|
def copy(self):
|
2012-02-18 22:29:49 +00:00
|
|
|
c = copy.copy(self)
|
|
|
|
return c
|
2011-08-03 10:38:23 +00:00
|
|
|
|
2011-08-03 10:48:40 +00:00
|
|
|
def _get_state(self):
|
2011-08-03 10:38:23 +00:00
|
|
|
return dict(
|
|
|
|
msg = self.msg,
|
|
|
|
timestamp = self.timestamp,
|
|
|
|
)
|
|
|
|
|
|
|
|
@classmethod
|
2012-02-17 23:25:22 +00:00
|
|
|
def _from_state(klass, request, state):
|
2011-08-03 10:38:23 +00:00
|
|
|
return klass(
|
2012-02-17 23:25:22 +00:00
|
|
|
request,
|
2011-08-03 10:38:23 +00:00
|
|
|
state["msg"],
|
|
|
|
state["timestamp"],
|
|
|
|
)
|
|
|
|
|
|
|
|
def replace(self, pattern, repl, *args, **kwargs):
|
|
|
|
"""
|
|
|
|
Replaces a regular expression pattern with repl in both the headers
|
|
|
|
and the body of the request. Returns the number of replacements
|
|
|
|
made.
|
2012-03-15 22:24:18 +00:00
|
|
|
|
|
|
|
FIXME: Is replace useful on an Error object??
|
2011-08-03 10:38:23 +00:00
|
|
|
"""
|
2012-05-26 01:10:31 +00:00
|
|
|
self.msg, c = utils.safe_subn(pattern, repl, self.msg, *args, **kwargs)
|
2011-08-03 10:38:23 +00:00
|
|
|
return c
|
|
|
|
|
|
|
|
|
2011-03-04 00:08:43 +00:00
|
|
|
class ClientPlaybackState:
|
2011-03-06 03:54:49 +00:00
|
|
|
def __init__(self, flows, exit):
|
|
|
|
self.flows, self.exit = flows, exit
|
2011-03-04 00:08:43 +00:00
|
|
|
self.current = None
|
|
|
|
|
|
|
|
def count(self):
|
|
|
|
return len(self.flows)
|
|
|
|
|
2011-03-06 03:54:49 +00:00
|
|
|
def done(self):
|
|
|
|
if len(self.flows) == 0 and not self.current:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2011-03-04 00:08:43 +00:00
|
|
|
def clear(self, flow):
|
|
|
|
"""
|
|
|
|
A request has returned in some way - if this is the one we're
|
|
|
|
servicing, go to the next flow.
|
|
|
|
"""
|
|
|
|
if flow is self.current:
|
|
|
|
self.current = None
|
|
|
|
|
|
|
|
def tick(self, master, testing=False):
|
|
|
|
"""
|
|
|
|
testing: Disables actual replay for testing.
|
|
|
|
"""
|
|
|
|
if self.flows and not self.current:
|
2011-03-05 22:21:31 +00:00
|
|
|
n = self.flows.pop(0)
|
2013-05-05 01:18:52 +00:00
|
|
|
n.request.reply = controller.DummyReply()
|
2011-03-06 03:02:28 +00:00
|
|
|
n.request.client_conn = None
|
2011-03-05 22:21:31 +00:00
|
|
|
self.current = master.handle_request(n.request)
|
2011-03-06 01:48:16 +00:00
|
|
|
if not testing and not self.current.response:
|
2012-06-09 01:42:43 +00:00
|
|
|
master.replay_request(self.current) # pragma: no cover
|
2011-03-06 01:48:16 +00:00
|
|
|
elif self.current.response:
|
|
|
|
master.handle_response(self.current.response)
|
2011-03-04 00:08:43 +00:00
|
|
|
|
|
|
|
|
2011-02-20 19:47:19 +00:00
|
|
|
class ServerPlaybackState:
|
2012-03-05 09:05:11 +00:00
|
|
|
def __init__(self, headers, flows, exit, nopop):
|
2011-02-22 21:54:51 +00:00
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
headers: Case-insensitive list of request headers that should be
|
2011-02-22 21:54:51 +00:00
|
|
|
included in request-response matching.
|
|
|
|
"""
|
2012-03-05 09:05:11 +00:00
|
|
|
self.headers, self.exit, self.nopop = headers, exit, nopop
|
2011-02-20 19:47:19 +00:00
|
|
|
self.fmap = {}
|
|
|
|
for i in flows:
|
2011-02-20 22:08:35 +00:00
|
|
|
if i.response:
|
|
|
|
l = self.fmap.setdefault(self._hash(i), [])
|
|
|
|
l.append(i)
|
2011-02-20 19:47:19 +00:00
|
|
|
|
2011-03-04 00:08:43 +00:00
|
|
|
def count(self):
|
2011-08-18 21:20:38 +00:00
|
|
|
return sum(len(i) for i in self.fmap.values())
|
2011-07-16 09:47:06 +00:00
|
|
|
|
2011-02-20 19:47:19 +00:00
|
|
|
def _hash(self, flow):
|
|
|
|
"""
|
2011-07-16 09:47:06 +00:00
|
|
|
Calculates a loose hash of the flow request.
|
2011-02-20 19:47:19 +00:00
|
|
|
"""
|
|
|
|
r = flow.request
|
|
|
|
key = [
|
|
|
|
str(r.host),
|
|
|
|
str(r.port),
|
|
|
|
str(r.scheme),
|
|
|
|
str(r.method),
|
|
|
|
str(r.path),
|
|
|
|
str(r.content),
|
|
|
|
]
|
2011-02-22 21:54:51 +00:00
|
|
|
if self.headers:
|
|
|
|
hdrs = []
|
|
|
|
for i in self.headers:
|
2011-07-14 03:59:27 +00:00
|
|
|
v = r.headers[i]
|
2011-02-22 21:54:51 +00:00
|
|
|
# Slightly subtle: we need to convert everything to strings
|
|
|
|
# to prevent a mismatch between unicode/non-unicode.
|
|
|
|
v = [str(x) for x in v]
|
|
|
|
hdrs.append((i, v))
|
|
|
|
key.append(repr(hdrs))
|
2011-02-20 19:47:19 +00:00
|
|
|
return hashlib.sha256(repr(key)).digest()
|
|
|
|
|
|
|
|
def next_flow(self, request):
|
|
|
|
"""
|
|
|
|
Returns the next flow object, or None if no matching flow was
|
|
|
|
found.
|
|
|
|
"""
|
|
|
|
l = self.fmap.get(self._hash(request))
|
|
|
|
if not l:
|
|
|
|
return None
|
2012-03-05 09:05:11 +00:00
|
|
|
|
2012-03-13 22:20:25 +00:00
|
|
|
if self.nopop:
|
2012-03-05 09:05:11 +00:00
|
|
|
return l[0]
|
2012-03-13 22:20:25 +00:00
|
|
|
else:
|
2012-03-05 09:05:11 +00:00
|
|
|
return l.pop(0)
|
|
|
|
|
2011-02-20 19:47:19 +00:00
|
|
|
|
|
|
|
|
2011-02-23 21:33:39 +00:00
|
|
|
class StickyCookieState:
|
2011-02-24 02:15:51 +00:00
|
|
|
def __init__(self, flt):
|
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
flt: Compiled filter.
|
2011-02-24 02:15:51 +00:00
|
|
|
"""
|
2011-02-23 21:33:39 +00:00
|
|
|
self.jar = {}
|
2011-02-24 02:15:51 +00:00
|
|
|
self.flt = flt
|
2011-02-23 21:33:39 +00:00
|
|
|
|
2011-02-24 02:15:51 +00:00
|
|
|
def ckey(self, m, f):
|
|
|
|
"""
|
2011-07-16 09:47:06 +00:00
|
|
|
Returns a (domain, port, path) tuple.
|
2011-02-24 02:15:51 +00:00
|
|
|
"""
|
|
|
|
return (
|
|
|
|
m["domain"] or f.request.host,
|
|
|
|
f.request.port,
|
|
|
|
m["path"] or "/"
|
|
|
|
)
|
2011-02-23 21:33:39 +00:00
|
|
|
|
2011-08-26 05:37:12 +00:00
|
|
|
def domain_match(self, a, b):
|
|
|
|
if cookielib.domain_match(a, b):
|
|
|
|
return True
|
|
|
|
elif cookielib.domain_match(a, b.strip(".")):
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2011-02-24 02:15:51 +00:00
|
|
|
def handle_response(self, f):
|
2011-07-14 03:59:27 +00:00
|
|
|
for i in f.response.headers["set-cookie"]:
|
2011-03-10 22:56:10 +00:00
|
|
|
# FIXME: We now know that Cookie.py screws up some cookies with
|
|
|
|
# valid RFC 822/1123 datetime specifications for expiry. Sigh.
|
2011-07-24 04:08:27 +00:00
|
|
|
c = Cookie.SimpleCookie(str(i))
|
2011-02-23 21:33:39 +00:00
|
|
|
m = c.values()[0]
|
2011-02-24 02:15:51 +00:00
|
|
|
k = self.ckey(m, f)
|
2011-08-26 05:37:12 +00:00
|
|
|
if self.domain_match(f.request.host, k[0]):
|
2011-02-24 02:15:51 +00:00
|
|
|
self.jar[self.ckey(m, f)] = m
|
|
|
|
|
|
|
|
def handle_request(self, f):
|
2011-08-26 05:37:12 +00:00
|
|
|
l = []
|
2011-02-24 02:15:51 +00:00
|
|
|
if f.match(self.flt):
|
|
|
|
for i in self.jar.keys():
|
|
|
|
match = [
|
2011-08-26 05:37:12 +00:00
|
|
|
self.domain_match(f.request.host, i[0]),
|
2011-02-24 02:15:51 +00:00
|
|
|
f.request.port == i[1],
|
|
|
|
f.request.path.startswith(i[2])
|
|
|
|
]
|
|
|
|
if all(match):
|
|
|
|
l.append(self.jar[i].output(header="").strip())
|
2011-08-26 05:37:12 +00:00
|
|
|
if l:
|
|
|
|
f.request.stickycookie = True
|
|
|
|
f.request.headers["cookie"] = l
|
2011-02-23 21:33:39 +00:00
|
|
|
|
|
|
|
|
2011-03-20 04:31:54 +00:00
|
|
|
class StickyAuthState:
|
|
|
|
def __init__(self, flt):
|
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
flt: Compiled filter.
|
2011-03-20 04:31:54 +00:00
|
|
|
"""
|
|
|
|
self.flt = flt
|
|
|
|
self.hosts = {}
|
|
|
|
|
|
|
|
def handle_request(self, f):
|
|
|
|
if "authorization" in f.request.headers:
|
|
|
|
self.hosts[f.request.host] = f.request.headers["authorization"]
|
|
|
|
elif f.match(self.flt):
|
|
|
|
if f.request.host in self.hosts:
|
|
|
|
f.request.headers["authorization"] = self.hosts[f.request.host]
|
|
|
|
|
2011-02-23 21:33:39 +00:00
|
|
|
|
2011-01-25 02:02:48 +00:00
|
|
|
class Flow:
|
2011-08-03 21:56:44 +00:00
|
|
|
"""
|
|
|
|
A Flow is a collection of objects representing a single HTTP
|
|
|
|
transaction. The main attributes are:
|
2011-10-26 01:49:15 +00:00
|
|
|
|
2011-08-03 21:56:44 +00:00
|
|
|
request: Request object
|
|
|
|
response: Response object
|
|
|
|
error: Error object
|
|
|
|
|
|
|
|
Note that it's possible for a Flow to have both a response and an error
|
|
|
|
object. This might happen, for instance, when a response was received
|
|
|
|
from the server, but there was an error sending it back to the client.
|
|
|
|
|
|
|
|
The following additional attributes are exposed:
|
|
|
|
|
|
|
|
intercepting: Is this flow currently being intercepted?
|
|
|
|
"""
|
2011-02-19 04:00:24 +00:00
|
|
|
def __init__(self, request):
|
|
|
|
self.request = request
|
|
|
|
self.response, self.error = None, None
|
2011-01-25 02:02:48 +00:00
|
|
|
self.intercepting = False
|
|
|
|
self._backup = None
|
|
|
|
|
2012-02-18 10:56:40 +00:00
|
|
|
def copy(self):
|
|
|
|
rc = self.request.copy()
|
|
|
|
f = Flow(rc)
|
|
|
|
if self.response:
|
|
|
|
f.response = self.response.copy()
|
2012-02-18 11:17:47 +00:00
|
|
|
f.response.request = rc
|
2012-02-18 10:56:40 +00:00
|
|
|
if self.error:
|
|
|
|
f.error = self.error.copy()
|
2012-02-18 11:17:47 +00:00
|
|
|
f.error.request = rc
|
2012-02-18 10:56:40 +00:00
|
|
|
return f
|
|
|
|
|
2011-03-06 03:11:45 +00:00
|
|
|
@classmethod
|
2011-08-03 10:48:40 +00:00
|
|
|
def _from_state(klass, state):
|
2011-03-06 03:11:45 +00:00
|
|
|
f = klass(None)
|
2011-08-03 10:48:40 +00:00
|
|
|
f._load_state(state)
|
2011-03-06 03:11:45 +00:00
|
|
|
return f
|
|
|
|
|
2012-04-03 21:47:57 +00:00
|
|
|
def _get_state(self):
|
2011-02-05 21:28:43 +00:00
|
|
|
d = dict(
|
2011-08-03 10:48:40 +00:00
|
|
|
request = self.request._get_state() if self.request else None,
|
|
|
|
response = self.response._get_state() if self.response else None,
|
|
|
|
error = self.error._get_state() if self.error else None,
|
2011-03-08 23:35:38 +00:00
|
|
|
version = version.IVERSION
|
2011-01-26 01:52:03 +00:00
|
|
|
)
|
2011-02-05 21:28:43 +00:00
|
|
|
return d
|
2011-01-26 01:52:03 +00:00
|
|
|
|
2011-08-03 10:48:40 +00:00
|
|
|
def _load_state(self, state):
|
2011-02-19 20:36:13 +00:00
|
|
|
if self.request:
|
2011-08-03 10:48:40 +00:00
|
|
|
self.request._load_state(state["request"])
|
2011-02-19 20:36:13 +00:00
|
|
|
else:
|
2011-08-03 10:48:40 +00:00
|
|
|
self.request = Request._from_state(state["request"])
|
2011-02-19 20:36:13 +00:00
|
|
|
|
2011-01-26 01:52:03 +00:00
|
|
|
if state["response"]:
|
2011-02-19 20:36:13 +00:00
|
|
|
if self.response:
|
2011-08-03 10:48:40 +00:00
|
|
|
self.response._load_state(state["response"])
|
2011-02-19 20:36:13 +00:00
|
|
|
else:
|
2011-08-03 10:48:40 +00:00
|
|
|
self.response = Response._from_state(self.request, state["response"])
|
2011-02-19 20:36:13 +00:00
|
|
|
else:
|
|
|
|
self.response = None
|
|
|
|
|
2011-01-26 01:52:03 +00:00
|
|
|
if state["error"]:
|
2011-02-19 20:36:13 +00:00
|
|
|
if self.error:
|
2011-08-03 10:48:40 +00:00
|
|
|
self.error._load_state(state["error"])
|
2011-02-19 20:36:13 +00:00
|
|
|
else:
|
2012-02-17 23:25:22 +00:00
|
|
|
self.error = Error._from_state(self.request, state["error"])
|
2011-02-19 20:36:13 +00:00
|
|
|
else:
|
|
|
|
self.error = None
|
2011-01-31 00:26:56 +00:00
|
|
|
|
2011-02-01 22:44:28 +00:00
|
|
|
def modified(self):
|
2011-08-03 21:56:44 +00:00
|
|
|
"""
|
|
|
|
Has this Flow been modified?
|
|
|
|
"""
|
2011-02-01 22:44:28 +00:00
|
|
|
# FIXME: Save a serialization in backup, compare current with
|
|
|
|
# backup to detect if flow has _really_ been modified.
|
|
|
|
if self._backup:
|
|
|
|
return True
|
|
|
|
else:
|
|
|
|
return False
|
|
|
|
|
2012-04-03 21:47:57 +00:00
|
|
|
def backup(self, force=False):
|
2011-08-03 21:56:44 +00:00
|
|
|
"""
|
|
|
|
Save a backup of this Flow, which can be reverted to using a
|
|
|
|
call to .revert().
|
|
|
|
"""
|
2012-04-03 21:47:57 +00:00
|
|
|
if not self._backup:
|
|
|
|
self._backup = self._get_state()
|
2011-01-25 02:02:48 +00:00
|
|
|
|
|
|
|
def revert(self):
|
2011-08-03 21:56:44 +00:00
|
|
|
"""
|
|
|
|
Revert to the last backed up state.
|
|
|
|
"""
|
2011-01-25 02:02:48 +00:00
|
|
|
if self._backup:
|
2011-08-03 10:48:40 +00:00
|
|
|
self._load_state(self._backup)
|
2011-02-01 22:44:28 +00:00
|
|
|
self._backup = None
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2011-08-03 21:56:44 +00:00
|
|
|
def match(self, f):
|
|
|
|
"""
|
|
|
|
Match this flow against a compiled filter expression. Returns True
|
|
|
|
if matched, False if not.
|
2012-09-13 21:41:01 +00:00
|
|
|
|
|
|
|
If f is a string, it will be compiled as a filter expression. If
|
|
|
|
the expression is invalid, ValueError is raised.
|
2011-08-03 21:56:44 +00:00
|
|
|
"""
|
2012-09-13 21:41:01 +00:00
|
|
|
if isinstance(f, basestring):
|
|
|
|
f = filt.parse(f)
|
|
|
|
if not f:
|
|
|
|
raise ValueError("Invalid filter expression.")
|
2011-08-03 21:56:44 +00:00
|
|
|
if f:
|
2012-02-23 04:03:58 +00:00
|
|
|
return f(self)
|
|
|
|
return True
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2011-03-13 03:50:11 +00:00
|
|
|
def kill(self, master):
|
2011-08-03 21:56:44 +00:00
|
|
|
"""
|
|
|
|
Kill this request.
|
|
|
|
"""
|
2011-08-03 10:38:23 +00:00
|
|
|
self.error = Error(self.request, "Connection killed")
|
2013-02-16 23:42:48 +00:00
|
|
|
self.error.reply = controller.DummyReply()
|
|
|
|
if self.request and not self.request.reply.acked:
|
2013-02-23 01:08:28 +00:00
|
|
|
self.request.reply(proxy.KILL)
|
2013-02-16 23:42:48 +00:00
|
|
|
elif self.response and not self.response.reply.acked:
|
2013-02-23 01:08:28 +00:00
|
|
|
self.response.reply(proxy.KILL)
|
2011-03-13 03:50:11 +00:00
|
|
|
master.handle_error(self.error)
|
2011-03-15 04:53:29 +00:00
|
|
|
self.intercepting = False
|
2011-01-25 02:02:48 +00:00
|
|
|
|
|
|
|
def intercept(self):
|
2011-08-03 21:56:44 +00:00
|
|
|
"""
|
|
|
|
Intercept this Flow. Processing will stop until accept_intercept is
|
|
|
|
called.
|
|
|
|
"""
|
2011-01-25 02:02:48 +00:00
|
|
|
self.intercepting = True
|
|
|
|
|
|
|
|
def accept_intercept(self):
|
2011-08-03 21:56:44 +00:00
|
|
|
"""
|
|
|
|
Continue with the flow - called after an intercept().
|
|
|
|
"""
|
2011-01-25 02:02:48 +00:00
|
|
|
if self.request:
|
2013-02-16 23:42:48 +00:00
|
|
|
if not self.request.reply.acked:
|
|
|
|
self.request.reply()
|
|
|
|
elif self.response and not self.response.reply.acked:
|
|
|
|
self.response.reply()
|
2011-01-25 02:02:48 +00:00
|
|
|
self.intercepting = False
|
|
|
|
|
2011-07-27 05:47:08 +00:00
|
|
|
def replace(self, pattern, repl, *args, **kwargs):
|
2011-07-22 05:48:42 +00:00
|
|
|
"""
|
|
|
|
Replaces a regular expression pattern with repl in all parts of the
|
2012-03-15 22:24:18 +00:00
|
|
|
flow. Encoded content will be decoded before replacement, and
|
|
|
|
re-encoded afterwards.
|
|
|
|
|
|
|
|
Returns the number of replacements made.
|
2011-07-22 05:48:42 +00:00
|
|
|
"""
|
2011-07-27 05:47:08 +00:00
|
|
|
c = self.request.replace(pattern, repl, *args, **kwargs)
|
2011-07-22 05:48:42 +00:00
|
|
|
if self.response:
|
2011-07-27 05:47:08 +00:00
|
|
|
c += self.response.replace(pattern, repl, *args, **kwargs)
|
2011-07-22 05:48:42 +00:00
|
|
|
if self.error:
|
2011-07-27 05:47:08 +00:00
|
|
|
c += self.error.replace(pattern, repl, *args, **kwargs)
|
2011-07-22 05:48:42 +00:00
|
|
|
return c
|
|
|
|
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2011-08-02 04:14:33 +00:00
|
|
|
class State(object):
|
2011-01-25 02:02:48 +00:00
|
|
|
def __init__(self):
|
2011-07-31 23:17:01 +00:00
|
|
|
self._flow_map = {}
|
|
|
|
self._flow_list = []
|
|
|
|
self.view = []
|
2011-02-19 04:00:24 +00:00
|
|
|
|
2011-01-25 02:02:48 +00:00
|
|
|
# These are compiled filt expressions:
|
2011-07-31 23:17:01 +00:00
|
|
|
self._limit = None
|
2011-01-25 02:02:48 +00:00
|
|
|
self.intercept = None
|
2011-07-31 23:17:01 +00:00
|
|
|
self._limit_txt = None
|
|
|
|
|
|
|
|
@property
|
|
|
|
def limit_txt(self):
|
|
|
|
return self._limit_txt
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2011-03-06 03:11:45 +00:00
|
|
|
def flow_count(self):
|
2011-07-31 23:17:01 +00:00
|
|
|
return len(self._flow_map)
|
2011-03-06 03:11:45 +00:00
|
|
|
|
2012-02-18 11:17:47 +00:00
|
|
|
def index(self, f):
|
|
|
|
return self._flow_list.index(f)
|
|
|
|
|
2011-03-06 03:11:45 +00:00
|
|
|
def active_flow_count(self):
|
|
|
|
c = 0
|
2011-07-31 23:17:01 +00:00
|
|
|
for i in self._flow_list:
|
2011-03-06 03:11:45 +00:00
|
|
|
if not i.response and not i.error:
|
|
|
|
c += 1
|
|
|
|
return c
|
|
|
|
|
2011-01-25 02:02:48 +00:00
|
|
|
def add_request(self, req):
|
|
|
|
"""
|
|
|
|
Add a request to the state. Returns the matching flow.
|
|
|
|
"""
|
2011-02-19 04:00:24 +00:00
|
|
|
f = Flow(req)
|
2011-07-31 23:17:01 +00:00
|
|
|
self._flow_list.append(f)
|
|
|
|
self._flow_map[req] = f
|
2012-02-18 10:56:40 +00:00
|
|
|
assert len(self._flow_list) == len(self._flow_map)
|
2011-07-31 23:17:01 +00:00
|
|
|
if f.match(self._limit):
|
|
|
|
self.view.append(f)
|
2011-01-25 02:02:48 +00:00
|
|
|
return f
|
|
|
|
|
|
|
|
def add_response(self, resp):
|
|
|
|
"""
|
|
|
|
Add a response to the state. Returns the matching flow.
|
|
|
|
"""
|
2014-01-30 04:00:13 +00:00
|
|
|
f = self._flow_map.get(resp.flow)
|
2011-01-25 02:02:48 +00:00
|
|
|
if not f:
|
|
|
|
return False
|
|
|
|
f.response = resp
|
2011-07-31 23:17:01 +00:00
|
|
|
if f.match(self._limit) and not f in self.view:
|
|
|
|
self.view.append(f)
|
2011-01-25 02:02:48 +00:00
|
|
|
return f
|
|
|
|
|
|
|
|
def add_error(self, err):
|
|
|
|
"""
|
|
|
|
Add an error response to the state. Returns the matching flow, or
|
|
|
|
None if there isn't one.
|
|
|
|
"""
|
2012-02-24 23:19:54 +00:00
|
|
|
f = self._flow_map.get(err.request)
|
|
|
|
if not f:
|
2011-01-25 02:02:48 +00:00
|
|
|
return None
|
|
|
|
f.error = err
|
2011-07-31 23:17:01 +00:00
|
|
|
if f.match(self._limit) and not f in self.view:
|
|
|
|
self.view.append(f)
|
2011-01-25 02:02:48 +00:00
|
|
|
return f
|
|
|
|
|
2011-02-16 02:10:00 +00:00
|
|
|
def load_flows(self, flows):
|
2011-07-31 23:17:01 +00:00
|
|
|
self._flow_list.extend(flows)
|
2011-02-16 02:10:00 +00:00
|
|
|
for i in flows:
|
2011-07-31 23:17:01 +00:00
|
|
|
self._flow_map[i.request] = i
|
|
|
|
self.recalculate_view()
|
2011-01-26 03:50:17 +00:00
|
|
|
|
2011-03-12 22:24:49 +00:00
|
|
|
def set_limit(self, txt):
|
|
|
|
if txt:
|
|
|
|
f = filt.parse(txt)
|
|
|
|
if not f:
|
|
|
|
return "Invalid filter expression."
|
2011-07-31 23:17:01 +00:00
|
|
|
self._limit = f
|
|
|
|
self._limit_txt = txt
|
2011-03-12 22:24:49 +00:00
|
|
|
else:
|
2011-07-31 23:17:01 +00:00
|
|
|
self._limit = None
|
|
|
|
self._limit_txt = None
|
|
|
|
self.recalculate_view()
|
2011-03-12 22:24:49 +00:00
|
|
|
|
|
|
|
def set_intercept(self, txt):
|
|
|
|
if txt:
|
|
|
|
f = filt.parse(txt)
|
|
|
|
if not f:
|
|
|
|
return "Invalid filter expression."
|
|
|
|
self.intercept = f
|
|
|
|
self.intercept_txt = txt
|
|
|
|
else:
|
|
|
|
self.intercept = None
|
|
|
|
self.intercept_txt = None
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2011-07-31 23:17:01 +00:00
|
|
|
def recalculate_view(self):
|
|
|
|
if self._limit:
|
|
|
|
self.view = [i for i in self._flow_list if i.match(self._limit)]
|
2011-01-26 03:50:17 +00:00
|
|
|
else:
|
2011-07-31 23:17:01 +00:00
|
|
|
self.view = self._flow_list[:]
|
2011-01-26 03:50:17 +00:00
|
|
|
|
2011-01-25 02:02:48 +00:00
|
|
|
def delete_flow(self, f):
|
2011-07-31 23:17:01 +00:00
|
|
|
if f.request in self._flow_map:
|
|
|
|
del self._flow_map[f.request]
|
|
|
|
self._flow_list.remove(f)
|
2013-03-17 19:36:56 +00:00
|
|
|
if f in self.view:
|
2011-07-31 23:17:01 +00:00
|
|
|
self.view.remove(f)
|
2011-03-15 04:53:29 +00:00
|
|
|
return True
|
2011-01-25 02:02:48 +00:00
|
|
|
|
|
|
|
def clear(self):
|
2011-07-31 23:17:01 +00:00
|
|
|
for i in self._flow_list[:]:
|
2011-01-25 02:02:48 +00:00
|
|
|
self.delete_flow(i)
|
|
|
|
|
|
|
|
def accept_all(self):
|
2011-07-31 23:17:01 +00:00
|
|
|
for i in self._flow_list[:]:
|
2011-01-25 02:02:48 +00:00
|
|
|
i.accept_intercept()
|
|
|
|
|
|
|
|
def revert(self, f):
|
|
|
|
f.revert()
|
|
|
|
|
2011-07-31 23:17:01 +00:00
|
|
|
def killall(self, master):
|
|
|
|
for i in self._flow_list:
|
|
|
|
i.kill(master)
|
|
|
|
|
2011-02-16 01:33:04 +00:00
|
|
|
|
2011-02-16 03:03:22 +00:00
|
|
|
class FlowMaster(controller.Master):
|
|
|
|
def __init__(self, server, state):
|
|
|
|
controller.Master.__init__(self, server)
|
|
|
|
self.state = state
|
2011-03-05 00:03:26 +00:00
|
|
|
self.server_playback = None
|
|
|
|
self.client_playback = None
|
2011-02-20 22:40:49 +00:00
|
|
|
self.kill_nonreplay = False
|
2013-06-13 14:04:04 +00:00
|
|
|
self.scripts = []
|
2012-02-18 22:29:49 +00:00
|
|
|
self.pause_scripts = False
|
2011-03-13 02:55:47 +00:00
|
|
|
|
2011-02-24 02:15:51 +00:00
|
|
|
self.stickycookie_state = False
|
2011-03-13 02:55:47 +00:00
|
|
|
self.stickycookie_txt = None
|
2011-03-10 22:56:10 +00:00
|
|
|
|
2011-03-20 04:31:54 +00:00
|
|
|
self.stickyauth_state = False
|
|
|
|
self.stickyauth_txt = None
|
|
|
|
|
2011-03-09 00:15:31 +00:00
|
|
|
self.anticache = False
|
2011-07-15 03:21:04 +00:00
|
|
|
self.anticomp = False
|
2011-03-10 22:56:10 +00:00
|
|
|
self.refresh_server_playback = False
|
2012-03-16 22:31:05 +00:00
|
|
|
self.replacehooks = ReplaceHooks()
|
2012-08-18 11:39:52 +00:00
|
|
|
self.setheaders = SetHeaders()
|
2011-02-20 20:54:39 +00:00
|
|
|
|
2012-07-08 22:18:37 +00:00
|
|
|
self.stream = None
|
2014-01-04 01:35:11 +00:00
|
|
|
self.apps = AppRegistry()
|
2012-07-08 22:18:37 +00:00
|
|
|
|
2013-08-18 18:03:53 +00:00
|
|
|
def start_app(self, host, port, external):
|
|
|
|
if not external:
|
2014-01-04 01:35:11 +00:00
|
|
|
self.apps.add(
|
2013-08-18 18:03:53 +00:00
|
|
|
app.mapp,
|
|
|
|
host,
|
|
|
|
port
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
threading.Thread(target=app.mapp.run,kwargs={
|
|
|
|
"use_reloader": False,
|
|
|
|
"host": host,
|
|
|
|
"port": port}).start()
|
2013-07-23 22:32:56 +00:00
|
|
|
|
2011-08-03 01:33:18 +00:00
|
|
|
def add_event(self, e, level="info"):
|
|
|
|
"""
|
|
|
|
level: info, error
|
|
|
|
"""
|
|
|
|
pass
|
|
|
|
|
2014-01-13 01:20:34 +00:00
|
|
|
def unload_scripts(self):
|
2014-01-19 05:16:24 +00:00
|
|
|
for s in self.scripts[:]:
|
|
|
|
s.unload()
|
|
|
|
self.scripts.remove(s)
|
2011-08-03 05:35:18 +00:00
|
|
|
|
2014-01-12 10:01:59 +00:00
|
|
|
def load_script(self, command):
|
2011-08-03 05:35:18 +00:00
|
|
|
"""
|
|
|
|
Loads a script. Returns an error description if something went
|
2013-06-13 14:04:04 +00:00
|
|
|
wrong.
|
2011-08-03 05:35:18 +00:00
|
|
|
"""
|
2014-01-12 00:59:32 +00:00
|
|
|
try:
|
2014-01-12 10:01:59 +00:00
|
|
|
s = script.Script(command, self)
|
2014-01-12 00:59:32 +00:00
|
|
|
except script.ScriptError, v:
|
|
|
|
return v.args[0]
|
|
|
|
self.scripts.append(s)
|
2013-06-13 14:04:04 +00:00
|
|
|
|
|
|
|
def run_single_script_hook(self, script, name, *args, **kwargs):
|
|
|
|
if script and not self.pause_scripts:
|
|
|
|
ret = script.run(name, *args, **kwargs)
|
|
|
|
if not ret[0] and ret[1]:
|
|
|
|
e = "Script error:\n" + ret[1][1]
|
|
|
|
self.add_event(e, "error")
|
2011-02-20 22:40:49 +00:00
|
|
|
|
2013-06-13 14:04:04 +00:00
|
|
|
def run_script_hook(self, name, *args, **kwargs):
|
|
|
|
for script in self.scripts:
|
|
|
|
self.run_single_script_hook(script, name, *args, **kwargs)
|
2013-12-24 01:28:20 +00:00
|
|
|
|
2011-02-24 02:15:51 +00:00
|
|
|
def set_stickycookie(self, txt):
|
|
|
|
if txt:
|
|
|
|
flt = filt.parse(txt)
|
|
|
|
if not flt:
|
|
|
|
return "Invalid filter expression."
|
|
|
|
self.stickycookie_state = StickyCookieState(flt)
|
2011-03-12 22:43:55 +00:00
|
|
|
self.stickycookie_txt = txt
|
2011-02-24 02:15:51 +00:00
|
|
|
else:
|
|
|
|
self.stickycookie_state = None
|
2011-03-12 22:43:55 +00:00
|
|
|
self.stickycookie_txt = None
|
2011-02-24 02:15:51 +00:00
|
|
|
|
2011-03-20 04:31:54 +00:00
|
|
|
def set_stickyauth(self, txt):
|
|
|
|
if txt:
|
|
|
|
flt = filt.parse(txt)
|
|
|
|
if not flt:
|
|
|
|
return "Invalid filter expression."
|
|
|
|
self.stickyauth_state = StickyAuthState(flt)
|
|
|
|
self.stickyauth_txt = txt
|
|
|
|
else:
|
|
|
|
self.stickyauth_state = None
|
|
|
|
self.stickyauth_txt = None
|
|
|
|
|
2011-03-06 03:54:49 +00:00
|
|
|
def start_client_playback(self, flows, exit):
|
2011-03-05 00:03:26 +00:00
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
flows: List of flows.
|
2011-03-05 00:03:26 +00:00
|
|
|
"""
|
2011-03-06 03:54:49 +00:00
|
|
|
self.client_playback = ClientPlaybackState(flows, exit)
|
2011-03-05 00:03:26 +00:00
|
|
|
|
2011-03-17 20:38:51 +00:00
|
|
|
def stop_client_playback(self):
|
|
|
|
self.client_playback = None
|
|
|
|
|
2012-03-05 09:05:11 +00:00
|
|
|
def start_server_playback(self, flows, kill, headers, exit, nopop):
|
2011-02-20 22:40:49 +00:00
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
flows: List of flows.
|
2011-02-20 22:40:49 +00:00
|
|
|
kill: Boolean, should we kill requests not part of the replay?
|
|
|
|
"""
|
2012-03-05 09:05:11 +00:00
|
|
|
self.server_playback = ServerPlaybackState(headers, flows, exit, nopop)
|
2011-02-20 22:40:49 +00:00
|
|
|
self.kill_nonreplay = kill
|
|
|
|
|
2011-03-17 20:43:47 +00:00
|
|
|
def stop_server_playback(self):
|
2013-01-05 08:41:16 +00:00
|
|
|
if self.server_playback.exit:
|
|
|
|
self.shutdown()
|
2011-03-17 20:43:47 +00:00
|
|
|
self.server_playback = None
|
|
|
|
|
2011-03-05 00:03:26 +00:00
|
|
|
def do_server_playback(self, flow):
|
2011-02-20 20:54:39 +00:00
|
|
|
"""
|
|
|
|
This method should be called by child classes in the handle_request
|
|
|
|
handler. Returns True if playback has taken place, None if not.
|
|
|
|
"""
|
2011-03-05 00:03:26 +00:00
|
|
|
if self.server_playback:
|
|
|
|
rflow = self.server_playback.next_flow(flow)
|
2011-02-20 20:54:39 +00:00
|
|
|
if not rflow:
|
|
|
|
return None
|
2011-08-03 10:48:40 +00:00
|
|
|
response = Response._from_state(flow.request, rflow.response._get_state())
|
2011-08-03 21:26:26 +00:00
|
|
|
response._set_replay()
|
2011-02-20 20:54:39 +00:00
|
|
|
flow.response = response
|
2011-03-10 22:56:10 +00:00
|
|
|
if self.refresh_server_playback:
|
|
|
|
response.refresh()
|
2013-02-16 23:42:48 +00:00
|
|
|
flow.request.reply(response)
|
2012-08-17 12:23:41 +00:00
|
|
|
if self.server_playback.count() == 0:
|
|
|
|
self.stop_server_playback()
|
2011-02-20 20:54:39 +00:00
|
|
|
return True
|
|
|
|
return None
|
2011-02-16 03:03:22 +00:00
|
|
|
|
2011-03-05 00:03:26 +00:00
|
|
|
def tick(self, q):
|
|
|
|
if self.client_playback:
|
2011-03-06 03:54:49 +00:00
|
|
|
e = [
|
|
|
|
self.client_playback.done(),
|
|
|
|
self.client_playback.exit,
|
|
|
|
self.state.active_flow_count() == 0
|
|
|
|
]
|
|
|
|
if all(e):
|
|
|
|
self.shutdown()
|
2011-03-05 22:21:31 +00:00
|
|
|
self.client_playback.tick(self)
|
2011-03-06 04:08:56 +00:00
|
|
|
|
2011-06-27 02:01:08 +00:00
|
|
|
return controller.Master.tick(self, q)
|
2011-03-05 00:03:26 +00:00
|
|
|
|
2012-02-18 10:56:40 +00:00
|
|
|
def duplicate_flow(self, f):
|
|
|
|
return self.load_flow(f.copy())
|
|
|
|
|
|
|
|
def load_flow(self, f):
|
2012-02-18 11:17:47 +00:00
|
|
|
"""
|
|
|
|
Loads a flow, and returns a new flow object.
|
|
|
|
"""
|
2012-02-18 10:56:40 +00:00
|
|
|
if f.request:
|
2013-02-16 23:42:48 +00:00
|
|
|
f.request.reply = controller.DummyReply()
|
2012-02-18 10:56:40 +00:00
|
|
|
fr = self.handle_request(f.request)
|
|
|
|
if f.response:
|
2013-02-16 23:42:48 +00:00
|
|
|
f.response.reply = controller.DummyReply()
|
2012-02-18 10:56:40 +00:00
|
|
|
self.handle_response(f.response)
|
|
|
|
if f.error:
|
2013-02-16 23:42:48 +00:00
|
|
|
f.error.reply = controller.DummyReply()
|
2012-02-18 10:56:40 +00:00
|
|
|
self.handle_error(f.error)
|
|
|
|
return fr
|
|
|
|
|
2011-05-14 23:22:35 +00:00
|
|
|
def load_flows(self, fr):
|
|
|
|
"""
|
|
|
|
Load flows from a FlowReader object.
|
|
|
|
"""
|
|
|
|
for i in fr.stream():
|
2012-02-18 10:56:40 +00:00
|
|
|
self.load_flow(i)
|
2011-05-14 23:22:35 +00:00
|
|
|
|
2011-03-15 02:11:03 +00:00
|
|
|
def process_new_request(self, f):
|
|
|
|
if self.stickycookie_state:
|
|
|
|
self.stickycookie_state.handle_request(f)
|
2011-03-20 04:31:54 +00:00
|
|
|
if self.stickyauth_state:
|
|
|
|
self.stickyauth_state.handle_request(f)
|
|
|
|
|
2011-03-15 02:11:03 +00:00
|
|
|
if self.anticache:
|
|
|
|
f.request.anticache()
|
2011-07-15 03:21:04 +00:00
|
|
|
if self.anticomp:
|
|
|
|
f.request.anticomp()
|
2011-07-16 09:47:06 +00:00
|
|
|
|
2011-03-15 02:11:03 +00:00
|
|
|
if self.server_playback:
|
|
|
|
pb = self.do_server_playback(f)
|
|
|
|
if not pb:
|
|
|
|
if self.kill_nonreplay:
|
|
|
|
f.kill(self)
|
|
|
|
else:
|
2013-02-16 23:42:48 +00:00
|
|
|
f.request.reply()
|
2011-03-15 02:11:03 +00:00
|
|
|
|
2011-05-14 23:22:35 +00:00
|
|
|
def process_new_response(self, f):
|
|
|
|
if self.stickycookie_state:
|
|
|
|
self.stickycookie_state.handle_response(f)
|
|
|
|
|
2012-07-10 11:29:33 +00:00
|
|
|
def replay_request(self, f, block=False):
|
2011-03-15 02:11:03 +00:00
|
|
|
"""
|
|
|
|
Returns None if successful, or error message if not.
|
|
|
|
"""
|
|
|
|
if f.intercepting:
|
|
|
|
return "Can't replay while intercepting..."
|
2012-05-16 06:24:32 +00:00
|
|
|
if f.request.content == CONTENT_MISSING:
|
|
|
|
return "Can't replay request with missing content..."
|
2011-03-15 02:11:03 +00:00
|
|
|
if f.request:
|
2011-08-03 21:26:26 +00:00
|
|
|
f.request._set_replay()
|
2011-03-15 02:11:03 +00:00
|
|
|
if f.request.content:
|
2013-05-21 13:57:14 +00:00
|
|
|
f.request.headers["Content-Length"] = [str(len(f.request.content))]
|
2011-03-15 02:11:03 +00:00
|
|
|
f.response = None
|
|
|
|
f.error = None
|
|
|
|
self.process_new_request(f)
|
2011-09-09 05:31:36 +00:00
|
|
|
rt = proxy.RequestReplayThread(
|
2012-02-18 01:45:22 +00:00
|
|
|
self.server.config,
|
2011-09-09 05:31:36 +00:00
|
|
|
f,
|
|
|
|
self.masterq,
|
|
|
|
)
|
2012-06-09 01:42:43 +00:00
|
|
|
rt.start() # pragma: no cover
|
2012-07-10 11:29:33 +00:00
|
|
|
if block:
|
|
|
|
rt.join()
|
2011-03-15 02:11:03 +00:00
|
|
|
|
2011-08-03 04:36:20 +00:00
|
|
|
def handle_clientconnect(self, cc):
|
2011-08-05 02:03:10 +00:00
|
|
|
self.run_script_hook("clientconnect", cc)
|
2013-02-16 23:42:48 +00:00
|
|
|
cc.reply()
|
2011-02-19 04:00:24 +00:00
|
|
|
|
|
|
|
def handle_clientdisconnect(self, r):
|
2011-08-05 02:03:10 +00:00
|
|
|
self.run_script_hook("clientdisconnect", r)
|
2013-02-16 23:42:48 +00:00
|
|
|
r.reply()
|
2011-02-16 03:03:22 +00:00
|
|
|
|
2013-11-18 16:25:52 +00:00
|
|
|
def handle_serverconnection(self, sc):
|
2014-01-04 01:35:11 +00:00
|
|
|
# To unify the mitmproxy script API, we call the script hook
|
|
|
|
# "serverconnect" rather than "serverconnection". As things are handled
|
|
|
|
# differently in libmproxy (ClientConnect + ClientDisconnect vs
|
|
|
|
# ServerConnection class), there is no "serverdisonnect" event at the
|
|
|
|
# moment.
|
2013-11-18 16:25:52 +00:00
|
|
|
self.run_script_hook("serverconnect", sc)
|
|
|
|
sc.reply()
|
|
|
|
|
2011-02-16 03:03:22 +00:00
|
|
|
def handle_error(self, r):
|
|
|
|
f = self.state.add_error(r)
|
2011-08-03 04:36:20 +00:00
|
|
|
if f:
|
2011-08-05 02:03:10 +00:00
|
|
|
self.run_script_hook("error", f)
|
2011-03-05 00:03:26 +00:00
|
|
|
if self.client_playback:
|
|
|
|
self.client_playback.clear(f)
|
2013-02-16 23:42:48 +00:00
|
|
|
r.reply()
|
2011-02-16 03:03:22 +00:00
|
|
|
return f
|
|
|
|
|
|
|
|
def handle_request(self, r):
|
2014-01-30 04:00:13 +00:00
|
|
|
if False and r.is_live(): # FIXME
|
2014-01-04 21:58:53 +00:00
|
|
|
app = self.apps.get(r)
|
|
|
|
if app:
|
2014-01-29 01:49:11 +00:00
|
|
|
# FIXME: for the tcp proxy, use flow.client_conn.wfile
|
2014-01-04 21:58:53 +00:00
|
|
|
err = app.serve(r, r.wfile, **{"mitmproxy.master": self})
|
|
|
|
if err:
|
|
|
|
self.add_event("Error in wsgi app. %s"%err, "error")
|
|
|
|
r.reply(proxy.KILL)
|
|
|
|
return
|
2011-02-20 22:40:49 +00:00
|
|
|
f = self.state.add_request(r)
|
2012-03-16 22:31:05 +00:00
|
|
|
self.replacehooks.run(f)
|
2012-08-18 11:39:52 +00:00
|
|
|
self.setheaders.run(f)
|
2011-08-05 02:03:10 +00:00
|
|
|
self.run_script_hook("request", f)
|
2011-03-15 02:11:03 +00:00
|
|
|
self.process_new_request(f)
|
2011-02-20 22:40:49 +00:00
|
|
|
return f
|
2011-02-16 03:03:22 +00:00
|
|
|
|
|
|
|
def handle_response(self, r):
|
|
|
|
f = self.state.add_response(r)
|
2011-08-03 04:36:20 +00:00
|
|
|
if f:
|
2012-07-08 22:18:37 +00:00
|
|
|
self.replacehooks.run(f)
|
2012-08-18 11:39:52 +00:00
|
|
|
self.setheaders.run(f)
|
2011-08-05 02:03:10 +00:00
|
|
|
self.run_script_hook("response", f)
|
2012-07-08 22:18:37 +00:00
|
|
|
if self.client_playback:
|
|
|
|
self.client_playback.clear(f)
|
2011-08-26 06:03:03 +00:00
|
|
|
self.process_new_response(f)
|
2012-07-08 22:18:37 +00:00
|
|
|
if self.stream:
|
|
|
|
self.stream.add(f)
|
|
|
|
else:
|
2013-02-16 23:42:48 +00:00
|
|
|
r.reply()
|
2011-02-16 03:43:35 +00:00
|
|
|
return f
|
2011-02-16 03:03:22 +00:00
|
|
|
|
2011-08-05 02:03:10 +00:00
|
|
|
def shutdown(self):
|
2014-01-13 01:20:34 +00:00
|
|
|
self.unload_scripts()
|
2011-08-05 02:03:10 +00:00
|
|
|
controller.Master.shutdown(self)
|
2012-07-08 22:18:37 +00:00
|
|
|
if self.stream:
|
|
|
|
for i in self.state._flow_list:
|
|
|
|
if not i.response:
|
|
|
|
self.stream.add(i)
|
|
|
|
self.stop_stream()
|
|
|
|
|
2013-03-13 20:19:43 +00:00
|
|
|
def start_stream(self, fp, filt):
|
|
|
|
self.stream = FilteredFlowWriter(fp, filt)
|
2012-07-08 22:18:37 +00:00
|
|
|
|
|
|
|
def stop_stream(self):
|
2012-07-26 12:19:18 +00:00
|
|
|
self.stream.fo.close()
|
2012-07-08 22:18:37 +00:00
|
|
|
self.stream = None
|
|
|
|
|
2011-08-05 02:03:10 +00:00
|
|
|
|
2011-02-16 01:33:04 +00:00
|
|
|
|
|
|
|
class FlowWriter:
|
|
|
|
def __init__(self, fo):
|
|
|
|
self.fo = fo
|
|
|
|
|
|
|
|
def add(self, flow):
|
2011-08-03 10:48:40 +00:00
|
|
|
d = flow._get_state()
|
2011-08-19 09:38:05 +00:00
|
|
|
tnetstring.dump(d, self.fo)
|
2011-02-16 01:33:04 +00:00
|
|
|
|
2011-03-12 00:47:37 +00:00
|
|
|
|
2011-03-11 02:16:31 +00:00
|
|
|
class FlowReadError(Exception):
|
|
|
|
@property
|
|
|
|
def strerror(self):
|
|
|
|
return self.args[0]
|
2011-02-16 01:33:04 +00:00
|
|
|
|
2011-03-12 00:47:37 +00:00
|
|
|
|
2011-02-16 01:33:04 +00:00
|
|
|
class FlowReader:
|
|
|
|
def __init__(self, fo):
|
|
|
|
self.fo = fo
|
|
|
|
|
|
|
|
def stream(self):
|
|
|
|
"""
|
|
|
|
Yields Flow objects from the dump.
|
|
|
|
"""
|
2011-08-19 09:30:24 +00:00
|
|
|
off = 0
|
2011-03-11 02:16:31 +00:00
|
|
|
try:
|
2011-08-19 09:30:24 +00:00
|
|
|
while 1:
|
2011-08-19 09:38:05 +00:00
|
|
|
data = tnetstring.load(self.fo)
|
2013-07-23 22:32:56 +00:00
|
|
|
if tuple(data["version"][:2]) != version.IVERSION[:2]:
|
2012-04-10 22:10:53 +00:00
|
|
|
v = ".".join(str(i) for i in data["version"])
|
|
|
|
raise FlowReadError("Incompatible serialized data version: %s"%v)
|
2011-08-19 09:30:24 +00:00
|
|
|
off = self.fo.tell()
|
2011-08-03 10:48:40 +00:00
|
|
|
yield Flow._from_state(data)
|
2012-07-24 03:15:41 +00:00
|
|
|
except ValueError, v:
|
2011-08-19 09:30:24 +00:00
|
|
|
# Error is due to EOF
|
|
|
|
if self.fo.tell() == off and self.fo.read() == '':
|
|
|
|
return
|
2011-03-11 02:16:31 +00:00
|
|
|
raise FlowReadError("Invalid data format.")
|
2011-02-16 01:33:04 +00:00
|
|
|
|
2013-03-13 20:19:43 +00:00
|
|
|
|
|
|
|
class FilteredFlowWriter:
|
|
|
|
def __init__(self, fo, filt):
|
|
|
|
self.fo = fo
|
|
|
|
self.filt = filt
|
|
|
|
|
|
|
|
def add(self, f):
|
|
|
|
if self.filt and not f.match(self.filt):
|
|
|
|
return
|
|
|
|
d = f._get_state()
|
|
|
|
tnetstring.dump(d, self.fo)
|
|
|
|
|