2015-06-08 14:03:33 +00:00
|
|
|
import sys
|
|
|
|
import argparse
|
|
|
|
import os
|
|
|
|
import os.path
|
2015-06-22 18:38:53 +00:00
|
|
|
|
2017-09-03 01:02:13 +00:00
|
|
|
from mitmproxy.net import tls
|
2016-10-19 20:20:44 +00:00
|
|
|
from mitmproxy import version
|
2016-10-19 22:56:38 +00:00
|
|
|
from mitmproxy.net.http import user_agents
|
2020-11-18 22:05:07 +00:00
|
|
|
from . import print_tool_deprecation_message, pathoc, language
|
2015-06-08 14:03:33 +00:00
|
|
|
|
|
|
|
|
|
|
|
def args_pathoc(argv, stdout=sys.stdout, stderr=sys.stderr):
|
|
|
|
preparser = argparse.ArgumentParser(add_help=False)
|
|
|
|
preparser.add_argument(
|
|
|
|
"--show-uas", dest="showua", action="store_true", default=False,
|
|
|
|
help="Print user agent shortcuts and exit."
|
|
|
|
)
|
|
|
|
pa = preparser.parse_known_args(argv)[0]
|
|
|
|
if pa.showua:
|
2016-04-14 05:34:28 +00:00
|
|
|
print("User agent strings:", file=stdout)
|
2015-07-15 20:04:25 +00:00
|
|
|
for i in user_agents.UASTRINGS:
|
2016-04-14 05:34:28 +00:00
|
|
|
print(" ", i[1], i[0], file=stdout)
|
2015-06-08 14:03:33 +00:00
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
parser = argparse.ArgumentParser(
|
|
|
|
description='A perverse HTTP client.', parents=[preparser]
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'--version',
|
|
|
|
action='version',
|
|
|
|
version="pathoc " + version.VERSION
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-c", dest="connect_to", type=str, default=False,
|
2015-06-18 16:12:11 +00:00
|
|
|
metavar="HOST:PORT",
|
2015-06-08 14:03:33 +00:00
|
|
|
help="Issue an HTTP CONNECT to connect to the specified host."
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--memo-limit", dest='memolimit', default=5000, type=int, metavar="N",
|
|
|
|
help='Stop if we do not find a valid request after N attempts.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-m", dest='memo', action="store_true", default=False,
|
|
|
|
help="""
|
|
|
|
Remember specs, and never play the same one twice. Note that this
|
|
|
|
means requests have to be rendered in memory, which means that
|
|
|
|
large generated data can cause issues.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-n", dest='repeat', default=1, type=int, metavar="N",
|
2016-09-25 05:12:02 +00:00
|
|
|
help='Repeat N times. Pass -1 to repeat infinitely.'
|
2015-06-08 14:03:33 +00:00
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-w", dest='wait', default=0, type=float, metavar="N",
|
|
|
|
help='Wait N seconds between each request.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-r", dest="random", action="store_true", default=False,
|
|
|
|
help="""
|
|
|
|
Select a random request from those specified. If this is not specified,
|
|
|
|
requests are all played in sequence.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-t", dest="timeout", type=int, default=None,
|
|
|
|
help="Connection timeout"
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--http2", dest="use_http2", action="store_true", default=False,
|
|
|
|
help='Perform all requests over a single HTTP/2 connection.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--http2-skip-connection-preface",
|
|
|
|
dest="http2_skip_connection_preface",
|
|
|
|
action="store_true",
|
|
|
|
default=False,
|
|
|
|
help='Skips the HTTP/2 connection preface before sending requests.')
|
|
|
|
|
|
|
|
parser.add_argument(
|
|
|
|
'host', type=str,
|
2015-06-18 16:12:11 +00:00
|
|
|
metavar="host[:port]",
|
2015-06-08 14:03:33 +00:00
|
|
|
help='Host and port to connect to'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'requests', type=str, nargs="+",
|
|
|
|
help="""
|
|
|
|
Request specification, or path to a file containing request
|
|
|
|
specifcations
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
'SSL',
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-s", dest="ssl", action="store_true", default=False,
|
|
|
|
help="Connect with SSL"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-C", dest="clientcert", type=str, default=False,
|
|
|
|
help="Path to a file containing client certificate and private key"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-i", dest="sni", type=str, default=False,
|
|
|
|
help="SSL Server Name Indication"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--ciphers", dest="ciphers", type=str, default=False,
|
|
|
|
help="SSL cipher specification"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
2015-08-29 10:30:54 +00:00
|
|
|
"--ssl-version", dest="ssl_version", type=str, default="secure",
|
2017-09-03 01:02:13 +00:00
|
|
|
choices=tls.VERSION_CHOICES.keys(),
|
2015-08-29 10:30:54 +00:00
|
|
|
help="Set supported SSL/TLS versions. "
|
|
|
|
"SSLv2, SSLv3 and 'all' are INSECURE. Defaults to secure, which is TLS1.0+."
|
2015-06-08 14:03:33 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
'Controlling Output',
|
|
|
|
"""
|
|
|
|
Some of these options expand generated values for logging - if
|
|
|
|
you're generating large data, use them with caution.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-I", dest="ignorecodes", type=str, default="",
|
|
|
|
help="Comma-separated list of response codes to ignore"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-S", dest="showssl", action="store_true", default=False,
|
|
|
|
help="Show info on SSL connection"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-e", dest="explain", action="store_true", default=False,
|
|
|
|
help="Explain requests"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-o", dest="oneshot", action="store_true", default=False,
|
|
|
|
help="Oneshot - exit after first non-ignored response"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-q", dest="showreq", action="store_true", default=False,
|
|
|
|
help="Print full request"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-p", dest="showresp", action="store_true", default=False,
|
|
|
|
help="Print full response"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-T", dest="ignoretimeout", action="store_true", default=False,
|
|
|
|
help="Ignore timeouts"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-x", dest="hexdump", action="store_true", default=False,
|
|
|
|
help="Output in hexdump format"
|
|
|
|
)
|
2015-06-11 14:13:22 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--http2-framedump", dest="http2_framedump", action="store_true", default=False,
|
|
|
|
help="Output all received & sent HTTP/2 frames"
|
|
|
|
)
|
2015-06-08 14:03:33 +00:00
|
|
|
|
|
|
|
args = parser.parse_args(argv[1:])
|
|
|
|
|
2017-09-03 01:02:13 +00:00
|
|
|
args.ssl_version, args.ssl_options = tls.VERSION_CHOICES[args.ssl_version]
|
2015-06-22 18:38:53 +00:00
|
|
|
|
2015-06-08 14:03:33 +00:00
|
|
|
args.port = None
|
|
|
|
if ":" in args.host:
|
|
|
|
h, p = args.host.rsplit(":", 1)
|
|
|
|
try:
|
|
|
|
p = int(p)
|
|
|
|
except ValueError:
|
|
|
|
return parser.error("Invalid port in host spec: %s" % args.host)
|
|
|
|
args.host = h
|
|
|
|
args.port = p
|
|
|
|
|
|
|
|
if args.port is None:
|
|
|
|
args.port = 443 if args.ssl else 80
|
|
|
|
|
|
|
|
try:
|
|
|
|
args.ignorecodes = [int(i) for i in args.ignorecodes.split(",") if i]
|
|
|
|
except ValueError:
|
|
|
|
return parser.error(
|
|
|
|
"Invalid return code specification: %s" %
|
|
|
|
args.ignorecodes)
|
|
|
|
|
|
|
|
if args.connect_to:
|
|
|
|
parts = args.connect_to.split(":")
|
|
|
|
if len(parts) != 2:
|
|
|
|
return parser.error(
|
|
|
|
"Invalid CONNECT specification: %s" %
|
|
|
|
args.connect_to)
|
|
|
|
try:
|
|
|
|
parts[1] = int(parts[1])
|
|
|
|
except ValueError:
|
|
|
|
return parser.error(
|
|
|
|
"Invalid CONNECT specification: %s" %
|
|
|
|
args.connect_to)
|
|
|
|
args.connect_to = parts
|
|
|
|
else:
|
|
|
|
args.connect_to = None
|
|
|
|
|
|
|
|
if args.http2_skip_connection_preface:
|
|
|
|
args.use_http2 = True
|
|
|
|
|
2015-06-08 15:12:01 +00:00
|
|
|
if args.use_http2:
|
|
|
|
args.ssl = True
|
|
|
|
|
2015-06-08 14:03:33 +00:00
|
|
|
reqs = []
|
|
|
|
for r in args.requests:
|
2017-07-25 19:55:26 +00:00
|
|
|
r = os.path.expanduser(r)
|
2015-06-08 14:03:33 +00:00
|
|
|
if os.path.isfile(r):
|
2016-09-24 23:34:20 +00:00
|
|
|
with open(r) as f:
|
|
|
|
r = f.read()
|
2015-06-08 14:03:33 +00:00
|
|
|
try:
|
|
|
|
reqs.append(language.parse_pathoc(r, args.use_http2))
|
|
|
|
except language.ParseException as v:
|
2016-04-14 05:34:28 +00:00
|
|
|
print("Error parsing request spec: %s" % v.msg, file=stderr)
|
|
|
|
print(v.marked(), file=stderr)
|
2015-06-08 14:03:33 +00:00
|
|
|
sys.exit(1)
|
|
|
|
args.requests = reqs
|
|
|
|
return args
|
|
|
|
|
|
|
|
|
2016-03-27 10:02:41 +00:00
|
|
|
def go_pathoc(): # pragma: no cover
|
2020-11-18 22:05:07 +00:00
|
|
|
print_tool_deprecation_message()
|
2015-06-08 14:03:33 +00:00
|
|
|
args = args_pathoc(sys.argv)
|
|
|
|
pathoc.main(args)
|