2015-05-30 00:03:28 +00:00
|
|
|
import socket
|
|
|
|
import time
|
2015-07-15 21:19:01 +00:00
|
|
|
from OpenSSL import SSL
|
2015-08-27 15:35:53 +00:00
|
|
|
from netlib.tcp import Address
|
2015-07-15 21:19:01 +00:00
|
|
|
|
2015-08-01 08:40:19 +00:00
|
|
|
import netlib.tutils
|
2015-07-15 21:19:01 +00:00
|
|
|
from netlib import tcp, http, socks
|
2014-09-04 17:08:54 +00:00
|
|
|
from netlib.certutils import SSLCert
|
2015-07-15 21:19:01 +00:00
|
|
|
from netlib.http import authentication
|
2015-07-29 09:39:53 +00:00
|
|
|
from netlib.http.semantics import CONTENT_MISSING
|
2015-07-15 21:19:01 +00:00
|
|
|
from libpathod import pathoc, pathod
|
|
|
|
|
|
|
|
from libmproxy.proxy.config import HostMatcher
|
2015-08-30 13:27:29 +00:00
|
|
|
from libmproxy.protocol import Kill
|
|
|
|
from libmproxy.models import Error, HTTPResponse
|
|
|
|
|
2015-07-15 21:19:01 +00:00
|
|
|
import tutils
|
|
|
|
import tservers
|
2011-03-05 22:21:31 +00:00
|
|
|
|
2012-06-10 01:17:18 +00:00
|
|
|
"""
|
|
|
|
Note that the choice of response code in these tests matters more than you
|
|
|
|
might think. libcurl treats a 304 response code differently from, say, a
|
|
|
|
200 response code - it will correctly terminate a 304 response with no
|
|
|
|
content-length header, whereas it will block forever waiting for content
|
|
|
|
for a 200 response.
|
|
|
|
"""
|
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
class CommonMixin:
|
2012-06-13 06:16:47 +00:00
|
|
|
def test_large(self):
|
2015-05-30 00:03:28 +00:00
|
|
|
assert len(self.pathod("200:b@50k").content) == 1024 * 50
|
2012-06-13 06:16:47 +00:00
|
|
|
|
2014-10-18 23:26:08 +00:00
|
|
|
@staticmethod
|
|
|
|
def wait_until_not_live(flow):
|
|
|
|
"""
|
|
|
|
Race condition: We don't want to replay the flow while it is still live.
|
|
|
|
"""
|
|
|
|
s = time.time()
|
|
|
|
while flow.live:
|
|
|
|
time.sleep(0.001)
|
|
|
|
if time.time() - s > 5:
|
|
|
|
raise RuntimeError("Flow is live for too long.")
|
|
|
|
|
2012-07-08 23:03:55 +00:00
|
|
|
def test_replay(self):
|
|
|
|
assert self.pathod("304").status_code == 304
|
2014-09-04 22:18:17 +00:00
|
|
|
if isinstance(self, tservers.HTTPUpstreamProxTest) and self.ssl:
|
|
|
|
assert len(self.master.state.view) == 2
|
|
|
|
else:
|
|
|
|
assert len(self.master.state.view) == 1
|
|
|
|
l = self.master.state.view[-1]
|
2012-07-08 23:03:55 +00:00
|
|
|
assert l.response.code == 304
|
|
|
|
l.request.path = "/p/305"
|
2014-10-18 23:26:08 +00:00
|
|
|
self.wait_until_not_live(l)
|
2012-07-10 11:29:33 +00:00
|
|
|
rt = self.master.replay_request(l, block=True)
|
2012-07-08 23:03:55 +00:00
|
|
|
assert l.response.code == 305
|
|
|
|
|
2012-07-08 23:18:03 +00:00
|
|
|
# Disconnect error
|
|
|
|
l.request.path = "/p/305:d0"
|
2012-07-10 11:29:33 +00:00
|
|
|
rt = self.master.replay_request(l, block=True)
|
2014-09-04 22:18:17 +00:00
|
|
|
assert not rt
|
|
|
|
if isinstance(self, tservers.HTTPUpstreamProxTest):
|
|
|
|
assert l.response.code == 502
|
|
|
|
else:
|
|
|
|
assert l.error
|
2012-07-08 23:18:03 +00:00
|
|
|
|
|
|
|
# Port error
|
|
|
|
l.request.port = 1
|
2014-09-04 22:18:17 +00:00
|
|
|
# In upstream mode, we get a 502 response from the upstream proxy server.
|
2015-05-30 00:03:28 +00:00
|
|
|
# In upstream mode with ssl, the replay will fail as we cannot establish
|
|
|
|
# SSL with the upstream proxy.
|
2014-09-04 22:18:17 +00:00
|
|
|
rt = self.master.replay_request(l, block=True)
|
|
|
|
assert not rt
|
2015-08-29 18:53:25 +00:00
|
|
|
if isinstance(self, tservers.HTTPUpstreamProxTest):
|
2014-09-04 22:18:17 +00:00
|
|
|
assert l.response.code == 502
|
|
|
|
else:
|
|
|
|
assert l.error
|
2012-07-08 23:18:03 +00:00
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
def test_http(self):
|
|
|
|
f = self.pathod("304")
|
|
|
|
assert f.status_code == 304
|
2011-03-05 22:21:31 +00:00
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
# In Upstream mode with SSL, we may already have a previous CONNECT
|
|
|
|
# request.
|
|
|
|
l = self.master.state.view[-1]
|
2014-01-29 01:49:11 +00:00
|
|
|
assert l.client_conn.address
|
2013-02-28 20:05:39 +00:00
|
|
|
assert "host" in l.request.headers
|
|
|
|
assert l.response.code == 304
|
2013-02-16 03:46:16 +00:00
|
|
|
|
2013-03-02 09:42:36 +00:00
|
|
|
def test_invalid_http(self):
|
2014-01-29 01:49:11 +00:00
|
|
|
t = tcp.TCPClient(("127.0.0.1", self.proxy.port))
|
2013-03-02 09:42:36 +00:00
|
|
|
t.connect()
|
|
|
|
t.wfile.write("invalid\r\n\r\n")
|
|
|
|
t.wfile.flush()
|
2014-01-29 01:49:11 +00:00
|
|
|
line = t.rfile.readline()
|
|
|
|
assert ("Bad Request" in line) or ("Bad Gateway" in line)
|
2013-02-28 20:05:39 +00:00
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
def test_sni(self):
|
|
|
|
if not self.ssl:
|
|
|
|
return
|
|
|
|
|
|
|
|
f = self.pathod("304", sni="testserver.com")
|
|
|
|
assert f.status_code == 304
|
|
|
|
log = self.server.last_log()
|
|
|
|
assert log["request"]["sni"] == "testserver.com"
|
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2014-09-04 17:08:54 +00:00
|
|
|
class TcpMixin:
|
|
|
|
def _ignore_on(self):
|
2014-10-18 16:29:35 +00:00
|
|
|
assert not hasattr(self, "_ignore_backup")
|
|
|
|
self._ignore_backup = self.config.check_ignore
|
2015-05-30 00:03:28 +00:00
|
|
|
self.config.check_ignore = HostMatcher(
|
|
|
|
[".+:%s" % self.server.port] + self.config.check_ignore.patterns)
|
2014-09-04 17:08:54 +00:00
|
|
|
|
|
|
|
def _ignore_off(self):
|
2014-10-18 16:29:35 +00:00
|
|
|
assert hasattr(self, "_ignore_backup")
|
|
|
|
self.config.check_ignore = self._ignore_backup
|
|
|
|
del self._ignore_backup
|
2014-09-04 17:08:54 +00:00
|
|
|
|
|
|
|
def test_ignore(self):
|
|
|
|
spec = '304:h"Alternate-Protocol"="mitmproxy-will-remove-this"'
|
|
|
|
n = self.pathod(spec)
|
|
|
|
self._ignore_on()
|
|
|
|
i = self.pathod(spec)
|
|
|
|
i2 = self.pathod(spec)
|
|
|
|
self._ignore_off()
|
|
|
|
|
|
|
|
assert i.status_code == i2.status_code == n.status_code == 304
|
|
|
|
assert "Alternate-Protocol" in i.headers
|
|
|
|
assert "Alternate-Protocol" in i2.headers
|
|
|
|
assert "Alternate-Protocol" not in n.headers
|
|
|
|
|
|
|
|
# Test that we get the original SSL cert
|
|
|
|
if self.ssl:
|
|
|
|
i_cert = SSLCert(i.sslinfo.certchain[0])
|
|
|
|
i2_cert = SSLCert(i2.sslinfo.certchain[0])
|
|
|
|
n_cert = SSLCert(n.sslinfo.certchain[0])
|
|
|
|
|
|
|
|
assert i_cert == i2_cert
|
|
|
|
assert i_cert != n_cert
|
|
|
|
|
|
|
|
# Test Non-HTTP traffic
|
|
|
|
spec = "200:i0,@100:d0" # this results in just 100 random bytes
|
2015-05-30 00:03:28 +00:00
|
|
|
# mitmproxy responds with bad gateway
|
|
|
|
assert self.pathod(spec).status_code == 502
|
2014-09-04 17:08:54 +00:00
|
|
|
self._ignore_on()
|
2015-05-30 00:03:28 +00:00
|
|
|
tutils.raises(
|
|
|
|
"invalid server response",
|
|
|
|
self.pathod,
|
|
|
|
spec) # pathoc tries to parse answer as HTTP
|
2014-09-04 17:08:54 +00:00
|
|
|
self._ignore_off()
|
2013-02-28 20:05:39 +00:00
|
|
|
|
2014-10-18 16:29:35 +00:00
|
|
|
def _tcpproxy_on(self):
|
|
|
|
assert not hasattr(self, "_tcpproxy_backup")
|
|
|
|
self._tcpproxy_backup = self.config.check_tcp
|
2015-05-30 00:03:28 +00:00
|
|
|
self.config.check_tcp = HostMatcher(
|
|
|
|
[".+:%s" % self.server.port] + self.config.check_tcp.patterns)
|
2014-10-18 16:29:35 +00:00
|
|
|
|
|
|
|
def _tcpproxy_off(self):
|
|
|
|
assert hasattr(self, "_tcpproxy_backup")
|
|
|
|
self.config.check_ignore = self._tcpproxy_backup
|
|
|
|
del self._tcpproxy_backup
|
|
|
|
|
|
|
|
def test_tcp(self):
|
|
|
|
spec = '304:h"Alternate-Protocol"="mitmproxy-will-remove-this"'
|
|
|
|
n = self.pathod(spec)
|
|
|
|
self._tcpproxy_on()
|
|
|
|
i = self.pathod(spec)
|
|
|
|
i2 = self.pathod(spec)
|
|
|
|
self._tcpproxy_off()
|
|
|
|
|
|
|
|
assert i.status_code == i2.status_code == n.status_code == 304
|
|
|
|
assert "Alternate-Protocol" in i.headers
|
|
|
|
assert "Alternate-Protocol" in i2.headers
|
|
|
|
assert "Alternate-Protocol" not in n.headers
|
|
|
|
|
|
|
|
# Test that we get the original SSL cert
|
|
|
|
if self.ssl:
|
|
|
|
i_cert = SSLCert(i.sslinfo.certchain[0])
|
|
|
|
i2_cert = SSLCert(i2.sslinfo.certchain[0])
|
|
|
|
n_cert = SSLCert(n.sslinfo.certchain[0])
|
|
|
|
|
|
|
|
assert i_cert == i2_cert == n_cert
|
|
|
|
|
|
|
|
# Make sure that TCP messages are in the event log.
|
|
|
|
assert any("mitmproxy-will-remove-this" in m for m in self.master.log)
|
2013-03-24 20:20:26 +00:00
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-03-24 20:20:26 +00:00
|
|
|
class AppMixin:
|
|
|
|
def test_app(self):
|
|
|
|
ret = self.app("/")
|
|
|
|
assert ret.status_code == 200
|
|
|
|
assert "mitmproxy" in ret.content
|
|
|
|
|
|
|
|
|
|
|
|
class TestHTTP(tservers.HTTPProxTest, CommonMixin, AppMixin):
|
2013-02-16 03:46:16 +00:00
|
|
|
def test_app_err(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
ret = p.request("get:'http://errapp/'")
|
2013-02-28 20:05:39 +00:00
|
|
|
assert ret.status_code == 500
|
|
|
|
assert "ValueError" in ret.content
|
2013-02-16 03:46:16 +00:00
|
|
|
|
2012-06-30 03:59:42 +00:00
|
|
|
def test_invalid_connect(self):
|
2014-01-29 01:49:11 +00:00
|
|
|
t = tcp.TCPClient(("127.0.0.1", self.proxy.port))
|
2012-06-30 03:59:42 +00:00
|
|
|
t.connect()
|
|
|
|
t.wfile.write("CONNECT invalid\n\n")
|
|
|
|
t.wfile.flush()
|
|
|
|
assert "Bad Request" in t.rfile.readline()
|
2012-06-09 00:13:01 +00:00
|
|
|
|
2013-01-06 03:44:12 +00:00
|
|
|
def test_upstream_ssl_error(self):
|
|
|
|
p = self.pathoc()
|
2015-05-30 00:03:28 +00:00
|
|
|
ret = p.request("get:'https://localhost:%s/'" % self.server.port)
|
2013-02-28 20:05:39 +00:00
|
|
|
assert ret.status_code == 400
|
2013-01-06 03:44:12 +00:00
|
|
|
|
2013-02-23 21:51:14 +00:00
|
|
|
def test_connection_close(self):
|
|
|
|
# Add a body, so we have a content-length header, which combined with
|
|
|
|
# HTTP1.1 means the connection is kept alive.
|
2015-05-30 00:03:28 +00:00
|
|
|
response = '%s/p/200:b@1' % self.server.urlbase
|
2013-02-23 21:51:14 +00:00
|
|
|
|
|
|
|
# Lets sanity check that the connection does indeed stay open by
|
|
|
|
# issuing two requests over the same connection
|
|
|
|
p = self.pathoc()
|
2015-05-30 00:03:28 +00:00
|
|
|
assert p.request("get:'%s'" % response)
|
|
|
|
assert p.request("get:'%s'" % response)
|
2013-02-23 21:51:14 +00:00
|
|
|
|
|
|
|
# Now check that the connection is closed as the client specifies
|
|
|
|
p = self.pathoc()
|
2015-05-30 00:03:28 +00:00
|
|
|
assert p.request("get:'%s':h'Connection'='close'" % response)
|
2015-04-19 06:03:50 +00:00
|
|
|
# There's a race here, which means we can get any of a number of errors.
|
|
|
|
# Rather than introduce yet another sleep into the test suite, we just
|
|
|
|
# relax the Exception specification.
|
2015-05-30 00:03:28 +00:00
|
|
|
tutils.raises(Exception, p.request, "get:'%s'" % response)
|
2013-02-23 21:51:14 +00:00
|
|
|
|
2013-02-24 01:04:56 +00:00
|
|
|
def test_reconnect(self):
|
2015-05-30 00:03:28 +00:00
|
|
|
req = "get:'%s/p/200:b@1:da'" % self.server.urlbase
|
2013-02-24 01:04:56 +00:00
|
|
|
p = self.pathoc()
|
|
|
|
assert p.request(req)
|
|
|
|
# Server has disconnected. Mitmproxy should detect this, and reconnect.
|
|
|
|
assert p.request(req)
|
|
|
|
assert p.request(req)
|
|
|
|
|
2013-02-24 09:24:21 +00:00
|
|
|
def test_get_connection_switching(self):
|
|
|
|
def switched(l):
|
|
|
|
for i in l:
|
2014-01-29 01:49:11 +00:00
|
|
|
if "serverdisconnect" in i:
|
2013-02-24 09:24:21 +00:00
|
|
|
return True
|
2015-07-03 00:47:12 +00:00
|
|
|
|
2013-02-24 09:24:21 +00:00
|
|
|
req = "get:'%s/p/200:b@1'"
|
|
|
|
p = self.pathoc()
|
2015-05-30 00:03:28 +00:00
|
|
|
assert p.request(req % self.server.urlbase)
|
|
|
|
assert p.request(req % self.server2.urlbase)
|
2013-02-24 09:24:21 +00:00
|
|
|
assert switched(self.proxy.log)
|
|
|
|
|
|
|
|
def test_get_connection_err(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
ret = p.request("get:'http://localhost:0'")
|
2013-02-28 20:05:39 +00:00
|
|
|
assert ret.status_code == 502
|
2013-02-24 09:24:21 +00:00
|
|
|
|
2013-03-02 09:42:36 +00:00
|
|
|
def test_blank_leading_line(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
req = "get:'%s/p/201':i0,'\r\n'"
|
2015-05-30 00:03:28 +00:00
|
|
|
assert p.request(req % self.server.urlbase).status_code == 201
|
2013-03-02 09:42:36 +00:00
|
|
|
|
|
|
|
def test_invalid_headers(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
req = p.request("get:'http://foo':h':foo'='bar'")
|
2013-03-02 21:37:06 +00:00
|
|
|
assert req.status_code == 400
|
2013-03-02 09:42:36 +00:00
|
|
|
|
2013-12-12 03:42:29 +00:00
|
|
|
def test_empty_chunked_content(self):
|
|
|
|
"""
|
|
|
|
https://github.com/mitmproxy/mitmproxy/issues/186
|
|
|
|
"""
|
|
|
|
connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
connection.connect(("127.0.0.1", self.proxy.port))
|
|
|
|
spec = '301:h"Transfer-Encoding"="chunked":r:b"0\\r\\n\\r\\n"'
|
2015-05-30 00:03:28 +00:00
|
|
|
connection.send(
|
|
|
|
"GET http://localhost:%d/p/%s HTTP/1.1\r\n" %
|
|
|
|
(self.server.port, spec))
|
2014-09-06 11:30:00 +00:00
|
|
|
connection.send("\r\n")
|
2013-12-12 03:42:29 +00:00
|
|
|
resp = connection.recv(50000)
|
|
|
|
connection.close()
|
|
|
|
assert "content-length" in resp.lower()
|
2013-03-24 20:20:26 +00:00
|
|
|
|
2014-09-06 11:30:00 +00:00
|
|
|
def test_stream(self):
|
|
|
|
self.master.set_stream_large_bodies(1024 * 2)
|
|
|
|
|
|
|
|
self.pathod("200:b@1k")
|
|
|
|
assert not self.master.state.view[-1].response.stream
|
|
|
|
assert len(self.master.state.view[-1].response.content) == 1024 * 1
|
|
|
|
|
|
|
|
self.pathod("200:b@3k")
|
|
|
|
assert self.master.state.view[-1].response.stream
|
|
|
|
assert self.master.state.view[-1].response.content == CONTENT_MISSING
|
|
|
|
self.master.set_stream_large_bodies(None)
|
2014-02-07 23:33:59 +00:00
|
|
|
|
2015-02-27 14:24:27 +00:00
|
|
|
def test_stream_modify(self):
|
2015-05-30 00:03:28 +00:00
|
|
|
self.master.load_script(
|
|
|
|
tutils.test_data.path("scripts/stream_modify.py"))
|
2015-02-27 14:24:27 +00:00
|
|
|
d = self.pathod('200:b"foo"')
|
|
|
|
assert d.content == "bar"
|
|
|
|
self.master.unload_scripts()
|
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-03-02 22:04:33 +00:00
|
|
|
class TestHTTPAuth(tservers.HTTPProxTest):
|
2015-07-15 21:19:01 +00:00
|
|
|
authenticator = http.authentication.BasicProxyAuth(
|
|
|
|
http.authentication.PassManSingleUser(
|
2015-05-30 00:03:28 +00:00
|
|
|
"test",
|
|
|
|
"test"),
|
|
|
|
"realm")
|
|
|
|
|
2013-03-02 22:04:33 +00:00
|
|
|
def test_auth(self):
|
|
|
|
assert self.pathod("202").status_code == 407
|
|
|
|
p = self.pathoc()
|
|
|
|
ret = p.request("""
|
|
|
|
get
|
|
|
|
'http://localhost:%s/p/202'
|
|
|
|
h'%s'='%s'
|
2015-05-30 00:03:28 +00:00
|
|
|
""" % (
|
2013-03-02 22:04:33 +00:00
|
|
|
self.server.port,
|
2015-07-15 21:19:01 +00:00
|
|
|
http.authentication.BasicProxyAuth.AUTH_HEADER,
|
|
|
|
authentication.assemble_http_basic_auth("basic", "test", "test")
|
2013-03-02 22:04:33 +00:00
|
|
|
))
|
|
|
|
assert ret.status_code == 202
|
|
|
|
|
|
|
|
|
2014-09-04 17:08:54 +00:00
|
|
|
class TestHTTPS(tservers.HTTPProxTest, CommonMixin, TcpMixin):
|
2012-06-09 00:13:01 +00:00
|
|
|
ssl = True
|
2013-05-12 21:08:24 +00:00
|
|
|
ssloptions = pathod.SSLOptions(request_client_cert=True)
|
2013-01-18 04:08:30 +00:00
|
|
|
clientcerts = True
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-01-20 09:39:28 +00:00
|
|
|
def test_clientcert(self):
|
|
|
|
f = self.pathod("304")
|
2013-03-02 01:52:05 +00:00
|
|
|
assert f.status_code == 304
|
2013-02-24 09:24:21 +00:00
|
|
|
assert self.server.last_log()["request"]["clientcert"]["keyinfo"]
|
2012-06-09 00:13:01 +00:00
|
|
|
|
2013-03-02 09:42:36 +00:00
|
|
|
def test_error_post_connect(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
assert p.request("get:/:i0,'invalid\r\n\r\n'").status_code == 400
|
|
|
|
|
|
|
|
|
2013-02-28 20:05:39 +00:00
|
|
|
class TestHTTPSCertfile(tservers.HTTPProxTest, CommonMixin):
|
2013-02-24 09:52:59 +00:00
|
|
|
ssl = True
|
|
|
|
certfile = True
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-02-24 09:52:59 +00:00
|
|
|
def test_certfile(self):
|
|
|
|
assert self.pathod("304")
|
|
|
|
|
2014-03-02 02:14:22 +00:00
|
|
|
|
2015-06-29 17:32:57 +00:00
|
|
|
class TestHTTPSUpstreamServerVerificationWTrustedCert(tservers.HTTPProxTest):
|
|
|
|
"""
|
|
|
|
Test upstream server certificate verification with a trusted server cert.
|
|
|
|
"""
|
|
|
|
ssl = True
|
|
|
|
ssloptions = pathod.SSLOptions(
|
2015-07-03 00:47:12 +00:00
|
|
|
cn="trusted-cert",
|
|
|
|
certs=[
|
2015-06-29 17:32:57 +00:00
|
|
|
("trusted-cert", tutils.test_data.path("data/trusted-server.crt"))
|
|
|
|
])
|
|
|
|
|
|
|
|
def test_verification_w_cadir(self):
|
|
|
|
self.config.openssl_verification_mode_server = SSL.VERIFY_PEER
|
|
|
|
self.config.openssl_trusted_cadir_server = tutils.test_data.path(
|
|
|
|
"data/trusted-cadir/")
|
2015-07-03 00:47:12 +00:00
|
|
|
|
2015-06-29 17:32:57 +00:00
|
|
|
self.pathoc()
|
|
|
|
|
|
|
|
def test_verification_w_pemfile(self):
|
|
|
|
self.config.openssl_verification_mode_server = SSL.VERIFY_PEER
|
|
|
|
self.config.openssl_trusted_ca_server = tutils.test_data.path(
|
|
|
|
"data/trusted-cadir/trusted-ca.pem")
|
|
|
|
|
|
|
|
self.pathoc()
|
|
|
|
|
|
|
|
|
|
|
|
class TestHTTPSUpstreamServerVerificationWBadCert(tservers.HTTPProxTest):
|
|
|
|
"""
|
|
|
|
Test upstream server certificate verification with an untrusted server cert.
|
|
|
|
"""
|
|
|
|
ssl = True
|
|
|
|
ssloptions = pathod.SSLOptions(
|
2015-07-03 00:47:12 +00:00
|
|
|
cn="untrusted-cert",
|
|
|
|
certs=[
|
|
|
|
("untrusted-cert", tutils.test_data.path("data/untrusted-server.crt"))
|
2015-06-29 17:32:57 +00:00
|
|
|
])
|
|
|
|
|
2015-08-24 14:52:03 +00:00
|
|
|
def _request(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
# We need to make an actual request because the upstream connection is lazy-loaded.
|
|
|
|
return p.request("get:/p/242")
|
|
|
|
|
2015-06-29 17:32:57 +00:00
|
|
|
def test_default_verification_w_bad_cert(self):
|
|
|
|
"""Should use no verification."""
|
|
|
|
self.config.openssl_trusted_ca_server = tutils.test_data.path(
|
|
|
|
"data/trusted-cadir/trusted-ca.pem")
|
|
|
|
|
2015-08-24 14:52:03 +00:00
|
|
|
assert self._request().status_code == 242
|
2015-06-29 17:32:57 +00:00
|
|
|
|
|
|
|
def test_no_verification_w_bad_cert(self):
|
|
|
|
self.config.openssl_verification_mode_server = SSL.VERIFY_NONE
|
|
|
|
self.config.openssl_trusted_ca_server = tutils.test_data.path(
|
|
|
|
"data/trusted-cadir/trusted-ca.pem")
|
|
|
|
|
2015-08-24 14:52:03 +00:00
|
|
|
assert self._request().status_code == 242
|
2015-06-29 17:32:57 +00:00
|
|
|
|
|
|
|
def test_verification_w_bad_cert(self):
|
|
|
|
self.config.openssl_verification_mode_server = SSL.VERIFY_PEER
|
|
|
|
self.config.openssl_trusted_ca_server = tutils.test_data.path(
|
|
|
|
"data/trusted-cadir/trusted-ca.pem")
|
|
|
|
|
2015-08-24 14:52:03 +00:00
|
|
|
assert self._request().status_code == 502
|
2015-06-29 17:32:57 +00:00
|
|
|
|
|
|
|
|
2014-03-02 02:14:22 +00:00
|
|
|
class TestHTTPSNoCommonName(tservers.HTTPProxTest):
|
2013-12-12 02:24:17 +00:00
|
|
|
"""
|
|
|
|
Test what happens if we get a cert without common name back.
|
|
|
|
"""
|
|
|
|
ssl = True
|
2015-05-30 00:03:28 +00:00
|
|
|
ssloptions = pathod.SSLOptions(
|
2015-07-03 00:47:12 +00:00
|
|
|
certs=[
|
2015-05-30 00:03:28 +00:00
|
|
|
("*", tutils.test_data.path("data/no_common_name.pem"))
|
|
|
|
]
|
|
|
|
)
|
|
|
|
|
2014-03-02 02:14:22 +00:00
|
|
|
def test_http(self):
|
|
|
|
f = self.pathod("202")
|
|
|
|
assert f.sslinfo.certchain[0].get_subject().CN == "127.0.0.1"
|
|
|
|
|
2013-02-24 09:52:59 +00:00
|
|
|
|
2014-09-04 17:08:54 +00:00
|
|
|
class TestReverse(tservers.ReverseProxTest, CommonMixin, TcpMixin):
|
2012-06-09 08:41:28 +00:00
|
|
|
reverse = True
|
|
|
|
|
|
|
|
|
2015-07-03 00:47:12 +00:00
|
|
|
class TestSocks5(tservers.SocksModeTest):
|
|
|
|
def test_simple(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
p.socks_connect(("localhost", self.server.port))
|
|
|
|
f = p.request("get:/p/200")
|
|
|
|
assert f.status_code == 200
|
|
|
|
|
|
|
|
def test_with_authentication_only(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
f = p.request("get:/p/200")
|
|
|
|
assert f.status_code == 502
|
|
|
|
assert "SOCKS5 mode failure" in f.content
|
|
|
|
|
|
|
|
def test_no_connect(self):
|
|
|
|
"""
|
|
|
|
mitmproxy doesn't support UDP or BIND SOCKS CMDs
|
|
|
|
"""
|
|
|
|
p = self.pathoc()
|
|
|
|
|
|
|
|
socks.ClientGreeting(
|
|
|
|
socks.VERSION.SOCKS5,
|
|
|
|
[socks.METHOD.NO_AUTHENTICATION_REQUIRED]
|
|
|
|
).to_file(p.wfile)
|
|
|
|
socks.Message(
|
|
|
|
socks.VERSION.SOCKS5,
|
|
|
|
socks.CMD.BIND,
|
|
|
|
socks.ATYP.DOMAINNAME,
|
|
|
|
("example.com", 8080)
|
|
|
|
).to_file(p.wfile)
|
|
|
|
|
|
|
|
p.wfile.flush()
|
|
|
|
p.rfile.read(2) # read server greeting
|
|
|
|
f = p.request("get:/p/200") # the request doesn't matter, error response from handshake will be read anyway.
|
|
|
|
assert f.status_code == 502
|
|
|
|
assert "SOCKS5 mode failure" in f.content
|
|
|
|
|
|
|
|
|
2015-02-27 08:17:41 +00:00
|
|
|
class TestHttps2Http(tservers.ReverseProxTest):
|
|
|
|
@classmethod
|
|
|
|
def get_proxy_config(cls):
|
|
|
|
d = super(TestHttps2Http, cls).get_proxy_config()
|
2015-08-30 11:40:23 +00:00
|
|
|
d["upstream_server"] = ("http", d["upstream_server"][1])
|
2015-02-27 08:17:41 +00:00
|
|
|
return d
|
|
|
|
|
|
|
|
def pathoc(self, ssl, sni=None):
|
|
|
|
"""
|
|
|
|
Returns a connected Pathoc instance.
|
|
|
|
"""
|
2015-07-15 21:19:01 +00:00
|
|
|
p = pathoc.Pathoc(
|
2015-08-30 11:40:23 +00:00
|
|
|
("localhost", self.proxy.port), ssl=True, sni=sni, fp=None
|
2015-05-02 04:46:15 +00:00
|
|
|
)
|
2015-02-27 08:17:41 +00:00
|
|
|
p.connect()
|
|
|
|
return p
|
|
|
|
|
|
|
|
def test_all(self):
|
|
|
|
p = self.pathoc(ssl=True)
|
|
|
|
assert p.request("get:'/p/200'").status_code == 200
|
|
|
|
|
|
|
|
def test_sni(self):
|
|
|
|
p = self.pathoc(ssl=True, sni="example.com")
|
|
|
|
assert p.request("get:'/p/200'").status_code == 200
|
|
|
|
assert all("Error in handle_sni" not in msg for msg in self.proxy.log)
|
|
|
|
|
2015-08-30 11:40:23 +00:00
|
|
|
def test_http(self):
|
|
|
|
p = self.pathoc(ssl=False)
|
|
|
|
assert p.request("get:'/p/200'").status_code == 200
|
|
|
|
|
2015-02-27 08:17:41 +00:00
|
|
|
|
2014-09-04 17:08:54 +00:00
|
|
|
class TestTransparent(tservers.TransparentProxTest, CommonMixin, TcpMixin):
|
2013-02-28 20:05:39 +00:00
|
|
|
ssl = False
|
|
|
|
|
|
|
|
|
2014-09-04 17:08:54 +00:00
|
|
|
class TestTransparentSSL(tservers.TransparentProxTest, CommonMixin, TcpMixin):
|
2013-02-28 20:05:39 +00:00
|
|
|
ssl = True
|
2013-03-02 02:06:49 +00:00
|
|
|
|
2013-03-02 09:42:36 +00:00
|
|
|
def test_sslerr(self):
|
2015-05-02 04:46:15 +00:00
|
|
|
p = pathoc.Pathoc(("localhost", self.proxy.port), fp=None)
|
2013-03-02 09:42:36 +00:00
|
|
|
p.connect()
|
2014-01-29 01:49:11 +00:00
|
|
|
r = p.request("get:/")
|
2015-08-29 18:53:25 +00:00
|
|
|
assert r.status_code == 502
|
2012-06-14 21:20:10 +00:00
|
|
|
|
|
|
|
|
2013-02-16 03:46:16 +00:00
|
|
|
class TestProxy(tservers.HTTPProxTest):
|
2011-03-05 22:21:31 +00:00
|
|
|
def test_http(self):
|
2012-06-10 01:17:18 +00:00
|
|
|
f = self.pathod("304")
|
|
|
|
assert f.status_code == 304
|
2012-01-20 23:43:00 +00:00
|
|
|
|
2014-02-04 04:02:17 +00:00
|
|
|
f = self.master.state.view[0]
|
|
|
|
assert f.client_conn.address
|
|
|
|
assert "host" in f.request.headers
|
|
|
|
assert f.response.code == 304
|
2013-01-17 15:32:56 +00:00
|
|
|
|
|
|
|
def test_response_timestamps(self):
|
|
|
|
# test that we notice at least 2 sec delay between timestamps
|
|
|
|
# in response object
|
2013-01-28 21:41:45 +00:00
|
|
|
f = self.pathod("304:b@1k:p50,1")
|
2013-01-17 15:32:56 +00:00
|
|
|
assert f.status_code == 304
|
|
|
|
|
|
|
|
response = self.master.state.view[0].response
|
2013-01-28 21:41:45 +00:00
|
|
|
assert 1 <= response.timestamp_end - response.timestamp_start <= 1.2
|
2013-01-17 15:32:56 +00:00
|
|
|
|
|
|
|
def test_request_timestamps(self):
|
2013-01-28 21:41:45 +00:00
|
|
|
# test that we notice a delay between timestamps in request object
|
2013-01-17 15:32:56 +00:00
|
|
|
connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
connection.connect(("127.0.0.1", self.proxy.port))
|
|
|
|
|
|
|
|
# call pathod server, wait a second to complete the request
|
2015-05-30 00:03:28 +00:00
|
|
|
connection.send(
|
|
|
|
"GET http://localhost:%d/p/304:b@1k HTTP/1.1\r\n" %
|
|
|
|
self.server.port)
|
2013-06-17 22:54:07 +00:00
|
|
|
time.sleep(1)
|
2014-09-06 11:30:00 +00:00
|
|
|
connection.send("\r\n")
|
2013-01-17 15:32:56 +00:00
|
|
|
connection.recv(50000)
|
|
|
|
connection.close()
|
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
request, response = self.master.state.view[
|
2015-07-03 00:47:12 +00:00
|
|
|
0].request, self.master.state.view[0].response
|
2013-01-17 15:32:56 +00:00
|
|
|
assert response.code == 304 # sanity test for our low level request
|
2015-05-30 00:03:28 +00:00
|
|
|
# time.sleep might be a little bit shorter than a second
|
|
|
|
assert 0.95 < (request.timestamp_end - request.timestamp_start) < 1.2
|
2013-01-17 15:32:56 +00:00
|
|
|
|
|
|
|
def test_request_timestamps_not_affected_by_client_time(self):
|
|
|
|
# test that don't include user wait time in request's timestamps
|
|
|
|
|
|
|
|
f = self.pathod("304:b@10k")
|
|
|
|
assert f.status_code == 304
|
|
|
|
f = self.pathod("304:b@10k")
|
|
|
|
assert f.status_code == 304
|
|
|
|
|
|
|
|
request = self.master.state.view[0].request
|
|
|
|
assert request.timestamp_end - request.timestamp_start <= 0.1
|
|
|
|
|
|
|
|
request = self.master.state.view[1].request
|
|
|
|
assert request.timestamp_end - request.timestamp_start <= 0.1
|
2013-02-23 03:34:59 +00:00
|
|
|
|
2013-03-19 16:21:52 +00:00
|
|
|
def test_request_tcp_setup_timestamp_presence(self):
|
2014-02-04 04:02:17 +00:00
|
|
|
# tests that the client_conn a tcp connection has a tcp_setup_timestamp
|
2013-03-19 16:21:52 +00:00
|
|
|
connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
connection.connect(("localhost", self.proxy.port))
|
2015-05-30 00:03:28 +00:00
|
|
|
connection.send(
|
|
|
|
"GET http://localhost:%d/p/304:b@1k HTTP/1.1\r\n" %
|
|
|
|
self.server.port)
|
2014-09-06 11:30:00 +00:00
|
|
|
connection.send("\r\n")
|
2013-03-19 16:21:52 +00:00
|
|
|
connection.recv(5000)
|
2015-05-30 00:03:28 +00:00
|
|
|
connection.send(
|
|
|
|
"GET http://localhost:%d/p/304:b@1k HTTP/1.1\r\n" %
|
|
|
|
self.server.port)
|
2014-09-06 11:30:00 +00:00
|
|
|
connection.send("\r\n")
|
2013-03-19 16:21:52 +00:00
|
|
|
connection.recv(5000)
|
|
|
|
connection.close()
|
|
|
|
|
2014-02-04 04:02:17 +00:00
|
|
|
first_flow = self.master.state.view[0]
|
|
|
|
second_flow = self.master.state.view[1]
|
|
|
|
assert first_flow.server_conn.timestamp_tcp_setup
|
|
|
|
assert first_flow.server_conn.timestamp_ssl_setup is None
|
|
|
|
assert second_flow.server_conn.timestamp_tcp_setup
|
|
|
|
assert first_flow.server_conn.timestamp_tcp_setup == second_flow.server_conn.timestamp_tcp_setup
|
2013-03-19 16:21:52 +00:00
|
|
|
|
2013-12-12 01:11:22 +00:00
|
|
|
def test_request_ip(self):
|
|
|
|
f = self.pathod("200:b@100")
|
|
|
|
assert f.status_code == 200
|
2014-02-04 04:02:17 +00:00
|
|
|
f = self.master.state.view[0]
|
2014-09-04 14:37:50 +00:00
|
|
|
assert f.server_conn.address == ("127.0.0.1", self.server.port)
|
2013-02-23 03:34:59 +00:00
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-03-19 16:21:52 +00:00
|
|
|
class TestProxySSL(tservers.HTTPProxTest):
|
2015-05-30 00:03:28 +00:00
|
|
|
ssl = True
|
|
|
|
|
2013-03-19 16:21:52 +00:00
|
|
|
def test_request_ssl_setup_timestamp_presence(self):
|
|
|
|
# tests that the ssl timestamp is present when ssl is used
|
|
|
|
f = self.pathod("304:b@10k")
|
|
|
|
assert f.status_code == 304
|
2014-09-03 14:57:56 +00:00
|
|
|
first_flow = self.master.state.view[0]
|
|
|
|
assert first_flow.server_conn.timestamp_ssl_setup
|
2013-02-23 08:59:25 +00:00
|
|
|
|
2014-03-11 01:16:22 +00:00
|
|
|
|
|
|
|
class MasterRedirectRequest(tservers.TestMaster):
|
2014-09-03 14:57:56 +00:00
|
|
|
redirect_port = None # Set by TestRedirectRequest
|
|
|
|
|
|
|
|
def handle_request(self, f):
|
2015-08-27 15:35:53 +00:00
|
|
|
if f.request.path == "/p/201":
|
|
|
|
|
2015-08-31 15:05:52 +00:00
|
|
|
# This part should have no impact, but it should also not cause any exceptions.
|
2015-08-27 15:35:53 +00:00
|
|
|
addr = f.live.server_conn.address
|
|
|
|
addr2 = Address(("127.0.0.1", self.redirect_port))
|
|
|
|
f.live.set_server(addr2)
|
|
|
|
f.live.set_server(addr)
|
|
|
|
|
|
|
|
# This is the actual redirection.
|
|
|
|
f.request.port = self.redirect_port
|
|
|
|
super(MasterRedirectRequest, self).handle_request(f)
|
2014-03-11 01:16:22 +00:00
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_response(self, f):
|
|
|
|
f.response.content = str(f.client_conn.address.port)
|
2015-09-05 18:45:58 +00:00
|
|
|
f.response.headers["server-conn-id"] = str(f.server_conn.source_address.port)
|
2015-08-27 15:35:53 +00:00
|
|
|
super(MasterRedirectRequest, self).handle_response(f)
|
2014-03-11 01:16:22 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestRedirectRequest(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterRedirectRequest
|
2015-08-27 15:35:53 +00:00
|
|
|
ssl = True
|
2014-03-11 01:16:22 +00:00
|
|
|
|
|
|
|
def test_redirect(self):
|
2015-08-27 15:35:53 +00:00
|
|
|
"""
|
|
|
|
Imagine a single HTTPS connection with three requests:
|
|
|
|
|
|
|
|
1. First request should pass through unmodified
|
|
|
|
2. Second request will be redirected to a different host by an inline script
|
|
|
|
3. Third request should pass through unmodified
|
|
|
|
|
|
|
|
This test verifies that the original destination is restored for the third request.
|
|
|
|
"""
|
2014-03-11 01:16:22 +00:00
|
|
|
self.master.redirect_port = self.server2.port
|
|
|
|
|
|
|
|
p = self.pathoc()
|
|
|
|
|
|
|
|
self.server.clear_log()
|
|
|
|
self.server2.clear_log()
|
2015-08-27 15:35:53 +00:00
|
|
|
r1 = p.request("get:'/p/200'")
|
2014-03-11 01:16:22 +00:00
|
|
|
assert r1.status_code == 200
|
|
|
|
assert self.server.last_log()
|
|
|
|
assert not self.server2.last_log()
|
|
|
|
|
|
|
|
self.server.clear_log()
|
|
|
|
self.server2.clear_log()
|
2015-08-27 15:35:53 +00:00
|
|
|
r2 = p.request("get:'/p/201'")
|
2014-03-11 01:16:22 +00:00
|
|
|
assert r2.status_code == 201
|
|
|
|
assert not self.server.last_log()
|
|
|
|
assert self.server2.last_log()
|
|
|
|
|
|
|
|
self.server.clear_log()
|
|
|
|
self.server2.clear_log()
|
2015-08-27 15:35:53 +00:00
|
|
|
r3 = p.request("get:'/p/202'")
|
2014-03-11 01:16:22 +00:00
|
|
|
assert r3.status_code == 202
|
|
|
|
assert self.server.last_log()
|
|
|
|
assert not self.server2.last_log()
|
|
|
|
|
2014-09-04 14:37:50 +00:00
|
|
|
assert r1.content == r2.content == r3.content
|
2014-03-11 01:16:22 +00:00
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2014-07-20 02:10:14 +00:00
|
|
|
class MasterStreamRequest(tservers.TestMaster):
|
|
|
|
"""
|
|
|
|
Enables the stream flag on the flow for all requests
|
|
|
|
"""
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_responseheaders(self, f):
|
|
|
|
f.response.stream = True
|
|
|
|
f.reply()
|
2014-07-20 02:10:14 +00:00
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2014-07-20 02:10:14 +00:00
|
|
|
class TestStreamRequest(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterStreamRequest
|
|
|
|
|
|
|
|
def test_stream_simple(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
|
|
|
|
# a request with 100k of data but without content-length
|
|
|
|
self.server.clear_log()
|
2015-05-30 00:03:28 +00:00
|
|
|
r1 = p.request("get:'%s/p/200:r:b@100k:d102400'" % self.server.urlbase)
|
2014-07-20 02:10:14 +00:00
|
|
|
assert r1.status_code == 200
|
|
|
|
assert len(r1.content) > 100000
|
|
|
|
assert self.server.last_log()
|
|
|
|
|
|
|
|
def test_stream_multiple(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
|
|
|
|
# simple request with streaming turned on
|
|
|
|
self.server.clear_log()
|
2015-05-30 00:03:28 +00:00
|
|
|
r1 = p.request("get:'%s/p/200'" % self.server.urlbase)
|
2014-07-20 02:10:14 +00:00
|
|
|
assert r1.status_code == 200
|
|
|
|
assert self.server.last_log()
|
|
|
|
|
|
|
|
# now send back 100k of data, streamed but not chunked
|
|
|
|
self.server.clear_log()
|
2015-05-30 00:03:28 +00:00
|
|
|
r1 = p.request("get:'%s/p/200:b@100k'" % self.server.urlbase)
|
2014-07-20 02:10:14 +00:00
|
|
|
assert r1.status_code == 200
|
|
|
|
assert self.server.last_log()
|
|
|
|
|
|
|
|
def test_stream_chunked(self):
|
|
|
|
connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
connection.connect(("127.0.0.1", self.proxy.port))
|
|
|
|
fconn = connection.makefile()
|
2015-09-10 23:18:17 +00:00
|
|
|
spec = '200:h"Transfer-Encoding"="chunked":r:b"4\\r\\nthis\\r\\n11\\r\\nisatest__reachhex\\r\\n0\\r\\n\\r\\n"'
|
2015-05-30 00:03:28 +00:00
|
|
|
connection.send(
|
|
|
|
"GET %s/p/%s HTTP/1.1\r\n" %
|
|
|
|
(self.server.urlbase, spec))
|
2014-07-21 12:09:24 +00:00
|
|
|
connection.send("\r\n")
|
2014-07-20 02:10:14 +00:00
|
|
|
|
2015-07-22 11:04:45 +00:00
|
|
|
protocol = http.http1.HTTP1Protocol(rfile=fconn)
|
|
|
|
resp = protocol.read_response("GET", None, include_body=False)
|
2014-07-20 02:10:14 +00:00
|
|
|
|
2015-09-05 18:45:58 +00:00
|
|
|
assert resp.headers["Transfer-Encoding"] == 'chunked'
|
2015-07-08 19:03:04 +00:00
|
|
|
assert resp.status_code == 200
|
2014-07-20 02:10:14 +00:00
|
|
|
|
2015-08-29 18:53:25 +00:00
|
|
|
chunks = list(protocol.read_http_body_chunked(
|
|
|
|
resp.headers, None, "GET", 200, False
|
|
|
|
))
|
2015-09-10 23:18:17 +00:00
|
|
|
assert chunks == ["this", "isatest__reachhex"]
|
2014-07-20 02:10:14 +00:00
|
|
|
|
|
|
|
connection.close()
|
|
|
|
|
2014-03-11 01:16:22 +00:00
|
|
|
|
2013-02-23 03:34:59 +00:00
|
|
|
class MasterFakeResponse(tservers.TestMaster):
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_request(self, f):
|
2015-08-30 13:27:29 +00:00
|
|
|
resp = HTTPResponse.wrap(netlib.tutils.tresp())
|
2014-09-03 14:57:56 +00:00
|
|
|
f.reply(resp)
|
2013-02-23 03:34:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestFakeResponse(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterFakeResponse
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-03-02 23:13:33 +00:00
|
|
|
def test_fake(self):
|
2013-02-23 03:34:59 +00:00
|
|
|
f = self.pathod("200")
|
2015-09-05 18:45:58 +00:00
|
|
|
assert "header_response" in f.headers
|
2013-02-23 03:34:59 +00:00
|
|
|
|
2013-02-23 08:59:25 +00:00
|
|
|
|
2015-03-28 07:10:24 +00:00
|
|
|
class TestServerConnect(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterFakeResponse
|
|
|
|
no_upstream_cert = True
|
|
|
|
ssl = True
|
|
|
|
def test_unnecessary_serverconnect(self):
|
|
|
|
"""A replayed/fake response with no_upstream_cert should not connect to an upstream server"""
|
|
|
|
assert self.pathod("200").status_code == 200
|
|
|
|
for msg in self.proxy.tmaster.log:
|
|
|
|
assert "serverconnect" not in msg
|
|
|
|
|
|
|
|
|
2013-02-23 08:59:25 +00:00
|
|
|
class MasterKillRequest(tservers.TestMaster):
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_request(self, f):
|
2015-08-30 13:27:29 +00:00
|
|
|
f.reply(Kill)
|
2013-02-23 08:59:25 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestKillRequest(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterKillRequest
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-02-23 08:59:25 +00:00
|
|
|
def test_kill(self):
|
2013-02-28 20:05:39 +00:00
|
|
|
tutils.raises("server disconnect", self.pathod, "200")
|
2013-02-23 08:59:25 +00:00
|
|
|
# Nothing should have hit the server
|
2013-02-24 09:24:21 +00:00
|
|
|
assert not self.server.last_log()
|
2013-02-23 08:59:25 +00:00
|
|
|
|
|
|
|
|
|
|
|
class MasterKillResponse(tservers.TestMaster):
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_response(self, f):
|
2015-08-30 13:27:29 +00:00
|
|
|
f.reply(Kill)
|
2013-02-23 08:59:25 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestKillResponse(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterKillResponse
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-02-23 08:59:25 +00:00
|
|
|
def test_kill(self):
|
2013-02-28 20:05:39 +00:00
|
|
|
tutils.raises("server disconnect", self.pathod, "200")
|
2013-02-23 08:59:25 +00:00
|
|
|
# The server should have seen a request
|
2013-02-24 09:24:21 +00:00
|
|
|
assert self.server.last_log()
|
2013-02-23 08:59:25 +00:00
|
|
|
|
2013-03-02 09:42:36 +00:00
|
|
|
|
|
|
|
class EResolver(tservers.TResolver):
|
|
|
|
def original_addr(self, sock):
|
2014-08-10 14:20:04 +00:00
|
|
|
raise RuntimeError("Could not resolve original destination.")
|
2013-03-02 09:42:36 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestTransparentResolveError(tservers.TransparentProxTest):
|
|
|
|
resolver = EResolver
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-03-02 09:42:36 +00:00
|
|
|
def test_resolve_error(self):
|
|
|
|
assert self.pathod("304").status_code == 502
|
|
|
|
|
2013-03-02 23:13:33 +00:00
|
|
|
|
|
|
|
class MasterIncomplete(tservers.TestMaster):
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_request(self, f):
|
2015-08-30 13:27:29 +00:00
|
|
|
resp = HTTPResponse.wrap(netlib.tutils.tresp())
|
2014-03-09 20:51:24 +00:00
|
|
|
resp.content = CONTENT_MISSING
|
2014-09-03 14:57:56 +00:00
|
|
|
f.reply(resp)
|
2013-03-02 23:13:33 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestIncompleteResponse(tservers.HTTPProxTest):
|
|
|
|
masterclass = MasterIncomplete
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2013-03-02 23:13:33 +00:00
|
|
|
def test_incomplete(self):
|
|
|
|
assert self.pathod("200").status_code == 502
|
|
|
|
|
2014-03-11 00:02:10 +00:00
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
class TestUpstreamProxy(tservers.HTTPUpstreamProxTest, CommonMixin, AppMixin):
|
|
|
|
ssl = False
|
|
|
|
|
|
|
|
def test_order(self):
|
2015-05-30 00:03:28 +00:00
|
|
|
self.proxy.tmaster.replacehooks.add(
|
|
|
|
"~q",
|
|
|
|
"foo",
|
|
|
|
"bar") # replace in request
|
2014-09-04 22:18:17 +00:00
|
|
|
self.chain[0].tmaster.replacehooks.add("~q", "bar", "baz")
|
|
|
|
self.chain[1].tmaster.replacehooks.add("~q", "foo", "oh noes!")
|
2015-05-30 00:03:28 +00:00
|
|
|
self.chain[0].tmaster.replacehooks.add(
|
|
|
|
"~s",
|
|
|
|
"baz",
|
|
|
|
"ORLY") # replace in response
|
2014-09-04 22:18:17 +00:00
|
|
|
|
|
|
|
p = self.pathoc()
|
|
|
|
req = p.request("get:'%s/p/418:b\"foo\"'" % self.server.urlbase)
|
|
|
|
assert req.content == "ORLY"
|
|
|
|
assert req.status_code == 418
|
|
|
|
|
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
class TestUpstreamProxySSL(
|
2015-07-03 00:47:12 +00:00
|
|
|
tservers.HTTPUpstreamProxTest,
|
|
|
|
CommonMixin,
|
|
|
|
TcpMixin):
|
2014-09-04 22:18:17 +00:00
|
|
|
ssl = True
|
|
|
|
|
2014-10-18 16:29:35 +00:00
|
|
|
def _host_pattern_on(self, attr):
|
|
|
|
"""
|
|
|
|
Updates config.check_tcp or check_ignore, depending on attr.
|
|
|
|
"""
|
|
|
|
assert not hasattr(self, "_ignore_%s_backup" % attr)
|
|
|
|
backup = []
|
|
|
|
for proxy in self.chain:
|
2015-05-30 00:03:28 +00:00
|
|
|
old_matcher = getattr(
|
|
|
|
proxy.tmaster.server.config,
|
|
|
|
"check_%s" %
|
|
|
|
attr)
|
2014-10-18 16:29:35 +00:00
|
|
|
backup.append(old_matcher)
|
|
|
|
setattr(
|
|
|
|
proxy.tmaster.server.config,
|
|
|
|
"check_%s" % attr,
|
|
|
|
HostMatcher([".+:%s" % self.server.port] + old_matcher.patterns)
|
|
|
|
)
|
|
|
|
|
|
|
|
setattr(self, "_ignore_%s_backup" % attr, backup)
|
|
|
|
|
|
|
|
def _host_pattern_off(self, attr):
|
|
|
|
backup = getattr(self, "_ignore_%s_backup" % attr)
|
|
|
|
for proxy in reversed(self.chain):
|
|
|
|
setattr(
|
|
|
|
proxy.tmaster.server.config,
|
|
|
|
"check_%s" % attr,
|
|
|
|
backup.pop()
|
|
|
|
)
|
|
|
|
|
|
|
|
assert not backup
|
|
|
|
delattr(self, "_ignore_%s_backup" % attr)
|
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
def _ignore_on(self):
|
|
|
|
super(TestUpstreamProxySSL, self)._ignore_on()
|
2014-10-18 16:29:35 +00:00
|
|
|
self._host_pattern_on("ignore")
|
2014-09-04 22:18:17 +00:00
|
|
|
|
|
|
|
def _ignore_off(self):
|
|
|
|
super(TestUpstreamProxySSL, self)._ignore_off()
|
2014-10-18 16:29:35 +00:00
|
|
|
self._host_pattern_off("ignore")
|
|
|
|
|
|
|
|
def _tcpproxy_on(self):
|
|
|
|
super(TestUpstreamProxySSL, self)._tcpproxy_on()
|
|
|
|
self._host_pattern_on("tcp")
|
|
|
|
|
|
|
|
def _tcpproxy_off(self):
|
|
|
|
super(TestUpstreamProxySSL, self)._tcpproxy_off()
|
|
|
|
self._host_pattern_off("tcp")
|
2014-09-04 22:18:17 +00:00
|
|
|
|
|
|
|
def test_simple(self):
|
|
|
|
p = self.pathoc()
|
|
|
|
req = p.request("get:'/p/418:b\"content\"'")
|
|
|
|
assert req.content == "content"
|
|
|
|
assert req.status_code == 418
|
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
# CONNECT from pathoc to chain[0],
|
|
|
|
assert self.proxy.tmaster.state.flow_count() == 2
|
|
|
|
# request from pathoc to chain[0]
|
|
|
|
# CONNECT from proxy to chain[1],
|
|
|
|
assert self.chain[0].tmaster.state.flow_count() == 2
|
|
|
|
# request from proxy to chain[1]
|
|
|
|
# request from chain[0] (regular proxy doesn't store CONNECTs)
|
|
|
|
assert self.chain[1].tmaster.state.flow_count() == 1
|
2014-09-04 22:18:17 +00:00
|
|
|
|
|
|
|
def test_closing_connect_response(self):
|
|
|
|
"""
|
|
|
|
https://github.com/mitmproxy/mitmproxy/issues/313
|
|
|
|
"""
|
2015-07-03 00:47:12 +00:00
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
def handle_request(f):
|
|
|
|
f.request.httpversion = (1, 0)
|
|
|
|
del f.request.headers["Content-Length"]
|
|
|
|
f.reply()
|
2015-07-03 00:47:12 +00:00
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
_handle_request = self.chain[0].tmaster.handle_request
|
|
|
|
self.chain[0].tmaster.handle_request = handle_request
|
|
|
|
try:
|
|
|
|
assert self.pathoc().request("get:/p/418").status_code == 418
|
|
|
|
finally:
|
|
|
|
self.chain[0].tmaster.handle_request = _handle_request
|
|
|
|
|
|
|
|
|
|
|
|
class TestProxyChainingSSLReconnect(tservers.HTTPUpstreamProxTest):
|
|
|
|
ssl = True
|
|
|
|
|
|
|
|
def test_reconnect(self):
|
|
|
|
"""
|
|
|
|
Tests proper functionality of ConnectionHandler.server_reconnect mock.
|
|
|
|
If we have a disconnect on a secure connection that's transparently proxified to
|
|
|
|
an upstream http proxy, we need to send the CONNECT request again.
|
|
|
|
"""
|
2015-07-03 00:47:12 +00:00
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
def kill_requests(master, attr, exclude):
|
|
|
|
k = [0] # variable scope workaround: put into array
|
|
|
|
_func = getattr(master, attr)
|
2015-05-30 00:03:28 +00:00
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
def handler(f):
|
|
|
|
k[0] += 1
|
|
|
|
if not (k[0] in exclude):
|
|
|
|
f.client_conn.finish()
|
|
|
|
f.error = Error("terminated")
|
2015-08-30 13:27:29 +00:00
|
|
|
f.reply(Kill)
|
2014-09-04 22:18:17 +00:00
|
|
|
return _func(f)
|
2015-07-03 00:47:12 +00:00
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
setattr(master, attr, handler)
|
|
|
|
|
|
|
|
kill_requests(self.chain[1].tmaster, "handle_request",
|
|
|
|
exclude=[
|
2015-07-03 00:47:12 +00:00
|
|
|
# fail first request
|
2014-09-04 22:18:17 +00:00
|
|
|
2, # allow second request
|
2015-07-03 00:47:12 +00:00
|
|
|
])
|
2014-09-04 22:18:17 +00:00
|
|
|
|
|
|
|
kill_requests(self.chain[0].tmaster, "handle_request",
|
|
|
|
exclude=[
|
|
|
|
1, # CONNECT
|
2015-07-03 00:47:12 +00:00
|
|
|
# fail first request
|
2014-09-04 22:18:17 +00:00
|
|
|
3, # reCONNECT
|
|
|
|
4, # request
|
2015-07-03 00:47:12 +00:00
|
|
|
])
|
2014-09-04 22:18:17 +00:00
|
|
|
|
|
|
|
p = self.pathoc()
|
|
|
|
req = p.request("get:'/p/418:b\"content\"'")
|
2015-08-29 18:53:25 +00:00
|
|
|
assert req.content == "content"
|
|
|
|
assert req.status_code == 418
|
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
assert self.proxy.tmaster.state.flow_count() == 2 # CONNECT and request
|
2015-05-30 00:03:28 +00:00
|
|
|
# CONNECT, failing request,
|
|
|
|
assert self.chain[0].tmaster.state.flow_count() == 4
|
|
|
|
# reCONNECT, request
|
|
|
|
# failing request, request
|
|
|
|
assert self.chain[1].tmaster.state.flow_count() == 2
|
|
|
|
# (doesn't store (repeated) CONNECTs from chain[0]
|
|
|
|
# as it is a regular proxy)
|
2015-08-29 18:53:25 +00:00
|
|
|
|
2014-09-04 22:18:17 +00:00
|
|
|
|
2014-11-26 03:18:21 +00:00
|
|
|
assert not self.chain[1].tmaster.state.flows[0].response # killed
|
|
|
|
assert self.chain[1].tmaster.state.flows[1].response
|
2014-09-04 22:18:17 +00:00
|
|
|
|
2014-11-26 03:18:21 +00:00
|
|
|
assert self.proxy.tmaster.state.flows[0].request.form_in == "authority"
|
|
|
|
assert self.proxy.tmaster.state.flows[1].request.form_in == "relative"
|
2014-09-04 22:18:17 +00:00
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
assert self.chain[0].tmaster.state.flows[
|
2015-07-03 00:47:12 +00:00
|
|
|
0].request.form_in == "authority"
|
2015-05-30 00:03:28 +00:00
|
|
|
assert self.chain[0].tmaster.state.flows[
|
2015-07-03 00:47:12 +00:00
|
|
|
1].request.form_in == "relative"
|
2015-05-30 00:03:28 +00:00
|
|
|
assert self.chain[0].tmaster.state.flows[
|
2015-07-03 00:47:12 +00:00
|
|
|
2].request.form_in == "authority"
|
2015-05-30 00:03:28 +00:00
|
|
|
assert self.chain[0].tmaster.state.flows[
|
2015-07-03 00:47:12 +00:00
|
|
|
3].request.form_in == "relative"
|
2014-09-04 22:18:17 +00:00
|
|
|
|
2015-05-30 00:03:28 +00:00
|
|
|
assert self.chain[1].tmaster.state.flows[
|
2015-07-03 00:47:12 +00:00
|
|
|
0].request.form_in == "relative"
|
2015-05-30 00:03:28 +00:00
|
|
|
assert self.chain[1].tmaster.state.flows[
|
2015-07-03 00:47:12 +00:00
|
|
|
1].request.form_in == "relative"
|
2014-09-04 22:18:17 +00:00
|
|
|
|
|
|
|
req = p.request("get:'/p/418:b\"content2\"'")
|
|
|
|
|
|
|
|
assert req.status_code == 502
|
|
|
|
assert self.proxy.tmaster.state.flow_count() == 3 # + new request
|
2015-05-30 00:03:28 +00:00
|
|
|
# + new request, repeated CONNECT from chain[1]
|
|
|
|
assert self.chain[0].tmaster.state.flow_count() == 6
|
|
|
|
# (both terminated)
|
|
|
|
# nothing happened here
|
|
|
|
assert self.chain[1].tmaster.state.flow_count() == 2
|