2011-01-25 02:02:48 +00:00
|
|
|
"""
|
2014-09-08 10:20:40 +00:00
|
|
|
This module provides more sophisticated flow tracking and provides filtering and interception facilities.
|
2011-01-25 02:02:48 +00:00
|
|
|
"""
|
2014-03-10 21:36:47 +00:00
|
|
|
from __future__ import absolute_import
|
2014-09-16 21:40:25 +00:00
|
|
|
import hashlib
|
|
|
|
import Cookie
|
|
|
|
import cookielib
|
|
|
|
import re
|
2014-09-08 10:20:40 +00:00
|
|
|
from netlib import odict, wsgi
|
2014-03-10 21:36:47 +00:00
|
|
|
import netlib.http
|
2014-09-09 23:34:58 +00:00
|
|
|
from . import controller, protocol, tnetstring, filt, script, version
|
2014-09-12 00:30:03 +00:00
|
|
|
from .onboarding import app
|
2014-07-27 00:10:39 +00:00
|
|
|
from .protocol import http, handle
|
2014-10-18 16:29:35 +00:00
|
|
|
from .proxy.config import HostMatcher
|
2014-10-03 10:29:44 +00:00
|
|
|
import urlparse
|
2012-02-10 01:27:39 +00:00
|
|
|
|
2012-06-18 21:58:50 +00:00
|
|
|
ODict = odict.ODict
|
|
|
|
ODictCaseless = odict.ODictCaseless
|
|
|
|
|
2011-01-31 00:26:56 +00:00
|
|
|
|
2014-01-04 01:35:11 +00:00
|
|
|
class AppRegistry:
|
|
|
|
def __init__(self):
|
|
|
|
self.apps = {}
|
|
|
|
|
|
|
|
def add(self, app, domain, port):
|
|
|
|
"""
|
|
|
|
Add a WSGI app to the registry, to be served for requests to the
|
|
|
|
specified domain, on the specified port.
|
|
|
|
"""
|
2014-11-05 21:51:30 +00:00
|
|
|
self.apps[(domain, port)] = wsgi.WSGIAdaptor(
|
|
|
|
app,
|
|
|
|
domain,
|
|
|
|
port,
|
|
|
|
version.NAMEVERSION
|
|
|
|
)
|
2014-01-04 01:35:11 +00:00
|
|
|
|
|
|
|
def get(self, request):
|
|
|
|
"""
|
|
|
|
Returns an WSGIAdaptor instance if request matches an app, or None.
|
|
|
|
"""
|
2014-09-03 14:57:56 +00:00
|
|
|
if (request.host, request.port) in self.apps:
|
|
|
|
return self.apps[(request.host, request.port)]
|
2014-01-04 01:35:11 +00:00
|
|
|
if "host" in request.headers:
|
|
|
|
host = request.headers["host"][0]
|
2014-09-03 14:57:56 +00:00
|
|
|
return self.apps.get((host, request.port), None)
|
2014-01-04 01:35:11 +00:00
|
|
|
|
|
|
|
|
2012-03-16 22:31:05 +00:00
|
|
|
class ReplaceHooks:
|
2012-03-16 04:13:11 +00:00
|
|
|
def __init__(self):
|
|
|
|
self.lst = []
|
|
|
|
|
2012-08-18 11:39:52 +00:00
|
|
|
def set(self, r):
|
|
|
|
self.clear()
|
|
|
|
for i in r:
|
|
|
|
self.add(*i)
|
|
|
|
|
2012-03-16 22:31:05 +00:00
|
|
|
def add(self, fpatt, rex, s):
|
2012-03-16 04:13:11 +00:00
|
|
|
"""
|
2013-03-24 20:20:26 +00:00
|
|
|
add a replacement hook.
|
2012-03-16 04:13:11 +00:00
|
|
|
|
2013-03-24 20:20:26 +00:00
|
|
|
fpatt: a string specifying a filter pattern.
|
|
|
|
rex: a regular expression.
|
|
|
|
s: the replacement string
|
2012-03-16 04:13:11 +00:00
|
|
|
|
2013-03-24 20:20:26 +00:00
|
|
|
returns true if hook was added, false if the pattern could not be
|
2012-03-16 04:13:11 +00:00
|
|
|
parsed.
|
|
|
|
"""
|
2012-03-16 22:31:05 +00:00
|
|
|
cpatt = filt.parse(fpatt)
|
2012-03-16 04:13:11 +00:00
|
|
|
if not cpatt:
|
|
|
|
return False
|
2012-03-23 00:28:33 +00:00
|
|
|
try:
|
|
|
|
re.compile(rex)
|
|
|
|
except re.error:
|
|
|
|
return False
|
2012-03-16 22:31:05 +00:00
|
|
|
self.lst.append((fpatt, rex, s, cpatt))
|
2012-03-16 04:13:11 +00:00
|
|
|
return True
|
|
|
|
|
2012-03-17 21:33:11 +00:00
|
|
|
def get_specs(self):
|
|
|
|
"""
|
2014-11-05 21:51:30 +00:00
|
|
|
Retrieve the hook specifcations. Returns a list of (fpatt, rex, s)
|
|
|
|
tuples.
|
2012-03-17 21:33:11 +00:00
|
|
|
"""
|
|
|
|
return [i[:3] for i in self.lst]
|
|
|
|
|
|
|
|
def count(self):
|
|
|
|
return len(self.lst)
|
|
|
|
|
2012-03-16 04:13:11 +00:00
|
|
|
def run(self, f):
|
2012-03-16 22:31:05 +00:00
|
|
|
for _, rex, s, cpatt in self.lst:
|
2012-03-16 04:13:11 +00:00
|
|
|
if cpatt(f):
|
2012-03-16 22:31:05 +00:00
|
|
|
if f.response:
|
|
|
|
f.response.replace(rex, s)
|
|
|
|
else:
|
|
|
|
f.request.replace(rex, s)
|
2012-03-16 04:13:11 +00:00
|
|
|
|
|
|
|
def clear(self):
|
|
|
|
self.lst = []
|
|
|
|
|
|
|
|
|
2012-08-18 11:39:52 +00:00
|
|
|
class SetHeaders:
|
|
|
|
def __init__(self):
|
|
|
|
self.lst = []
|
|
|
|
|
|
|
|
def set(self, r):
|
|
|
|
self.clear()
|
|
|
|
for i in r:
|
|
|
|
self.add(*i)
|
|
|
|
|
|
|
|
def add(self, fpatt, header, value):
|
|
|
|
"""
|
|
|
|
Add a set header hook.
|
|
|
|
|
|
|
|
fpatt: String specifying a filter pattern.
|
|
|
|
header: Header name.
|
|
|
|
value: Header value string
|
|
|
|
|
|
|
|
Returns True if hook was added, False if the pattern could not be
|
|
|
|
parsed.
|
|
|
|
"""
|
|
|
|
cpatt = filt.parse(fpatt)
|
|
|
|
if not cpatt:
|
|
|
|
return False
|
|
|
|
self.lst.append((fpatt, header, value, cpatt))
|
|
|
|
return True
|
|
|
|
|
|
|
|
def get_specs(self):
|
|
|
|
"""
|
2014-11-05 21:51:30 +00:00
|
|
|
Retrieve the hook specifcations. Returns a list of (fpatt, rex, s)
|
|
|
|
tuples.
|
2012-08-18 11:39:52 +00:00
|
|
|
"""
|
|
|
|
return [i[:3] for i in self.lst]
|
|
|
|
|
|
|
|
def count(self):
|
|
|
|
return len(self.lst)
|
|
|
|
|
|
|
|
def clear(self):
|
|
|
|
self.lst = []
|
|
|
|
|
|
|
|
def run(self, f):
|
|
|
|
for _, header, value, cpatt in self.lst:
|
|
|
|
if cpatt(f):
|
|
|
|
if f.response:
|
|
|
|
del f.response.headers[header]
|
|
|
|
else:
|
|
|
|
del f.request.headers[header]
|
|
|
|
for _, header, value, cpatt in self.lst:
|
|
|
|
if cpatt(f):
|
|
|
|
if f.response:
|
|
|
|
f.response.headers.add(header, value)
|
|
|
|
else:
|
|
|
|
f.request.headers.add(header, value)
|
|
|
|
|
|
|
|
|
2014-07-21 19:06:55 +00:00
|
|
|
class StreamLargeBodies(object):
|
|
|
|
def __init__(self, max_size):
|
|
|
|
self.max_size = max_size
|
|
|
|
|
|
|
|
def run(self, flow, is_request):
|
|
|
|
r = flow.request if is_request else flow.response
|
|
|
|
code = flow.response.code if flow.response else None
|
2014-09-16 21:40:25 +00:00
|
|
|
expected_size = netlib.http.expected_http_body_size(
|
|
|
|
r.headers, is_request, flow.request.method, code
|
|
|
|
)
|
2014-07-21 19:06:55 +00:00
|
|
|
if not (0 <= expected_size <= self.max_size):
|
|
|
|
r.stream = True
|
|
|
|
|
2014-09-16 21:40:25 +00:00
|
|
|
|
2011-03-04 00:08:43 +00:00
|
|
|
class ClientPlaybackState:
|
2011-03-06 03:54:49 +00:00
|
|
|
def __init__(self, flows, exit):
|
|
|
|
self.flows, self.exit = flows, exit
|
2011-03-04 00:08:43 +00:00
|
|
|
self.current = None
|
2014-11-13 23:26:22 +00:00
|
|
|
self.testing = False # Disables actual replay for testing.
|
2011-03-04 00:08:43 +00:00
|
|
|
|
|
|
|
def count(self):
|
|
|
|
return len(self.flows)
|
|
|
|
|
2011-03-06 03:54:49 +00:00
|
|
|
def done(self):
|
|
|
|
if len(self.flows) == 0 and not self.current:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2011-03-04 00:08:43 +00:00
|
|
|
def clear(self, flow):
|
|
|
|
"""
|
|
|
|
A request has returned in some way - if this is the one we're
|
|
|
|
servicing, go to the next flow.
|
|
|
|
"""
|
|
|
|
if flow is self.current:
|
|
|
|
self.current = None
|
|
|
|
|
2014-11-13 23:26:22 +00:00
|
|
|
def tick(self, master):
|
2011-03-04 00:08:43 +00:00
|
|
|
if self.flows and not self.current:
|
2014-11-13 23:26:22 +00:00
|
|
|
self.current = self.flows.pop(0).copy()
|
|
|
|
if not self.testing:
|
|
|
|
master.replay_request(self.current)
|
|
|
|
else:
|
|
|
|
self.current.reply = controller.DummyReply()
|
|
|
|
master.handle_request(self.current)
|
|
|
|
if self.current.response:
|
|
|
|
master.handle_response(self.current)
|
2011-03-04 00:08:43 +00:00
|
|
|
|
|
|
|
|
2011-02-20 19:47:19 +00:00
|
|
|
class ServerPlaybackState:
|
2014-10-03 10:29:44 +00:00
|
|
|
def __init__(self, headers, flows, exit, nopop, ignore_params, ignore_content):
|
2011-02-22 21:54:51 +00:00
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
headers: Case-insensitive list of request headers that should be
|
2011-02-22 21:54:51 +00:00
|
|
|
included in request-response matching.
|
|
|
|
"""
|
2014-10-03 10:29:44 +00:00
|
|
|
self.headers, self.exit, self.nopop, self.ignore_params, self.ignore_content = headers, exit, nopop, ignore_params, ignore_content
|
2011-02-20 19:47:19 +00:00
|
|
|
self.fmap = {}
|
|
|
|
for i in flows:
|
2011-02-20 22:08:35 +00:00
|
|
|
if i.response:
|
|
|
|
l = self.fmap.setdefault(self._hash(i), [])
|
|
|
|
l.append(i)
|
2011-02-20 19:47:19 +00:00
|
|
|
|
2011-03-04 00:08:43 +00:00
|
|
|
def count(self):
|
2011-08-18 21:20:38 +00:00
|
|
|
return sum(len(i) for i in self.fmap.values())
|
2011-07-16 09:47:06 +00:00
|
|
|
|
2011-02-20 19:47:19 +00:00
|
|
|
def _hash(self, flow):
|
|
|
|
"""
|
2011-07-16 09:47:06 +00:00
|
|
|
Calculates a loose hash of the flow request.
|
2011-02-20 19:47:19 +00:00
|
|
|
"""
|
|
|
|
r = flow.request
|
2014-10-03 10:29:44 +00:00
|
|
|
|
|
|
|
_, _, path, _, query, _ = urlparse.urlparse(r.url)
|
|
|
|
queriesArray = urlparse.parse_qsl(query)
|
|
|
|
|
|
|
|
filtered = []
|
2014-10-24 22:54:51 +00:00
|
|
|
ignore_params = self.ignore_params or []
|
2014-10-03 10:29:44 +00:00
|
|
|
for p in queriesArray:
|
2014-10-24 22:54:51 +00:00
|
|
|
if p[0] not in ignore_params:
|
|
|
|
filtered.append(p)
|
2014-10-03 10:29:44 +00:00
|
|
|
|
2011-02-20 19:47:19 +00:00
|
|
|
key = [
|
|
|
|
str(r.host),
|
|
|
|
str(r.port),
|
|
|
|
str(r.scheme),
|
|
|
|
str(r.method),
|
2014-10-03 10:29:44 +00:00
|
|
|
str(path),
|
|
|
|
]
|
|
|
|
if not self.ignore_content:
|
|
|
|
key.append(str(r.content))
|
|
|
|
|
|
|
|
for p in filtered:
|
|
|
|
key.append(p[0])
|
|
|
|
key.append(p[1])
|
|
|
|
|
2011-02-22 21:54:51 +00:00
|
|
|
if self.headers:
|
|
|
|
hdrs = []
|
|
|
|
for i in self.headers:
|
2011-07-14 03:59:27 +00:00
|
|
|
v = r.headers[i]
|
2011-02-22 21:54:51 +00:00
|
|
|
# Slightly subtle: we need to convert everything to strings
|
|
|
|
# to prevent a mismatch between unicode/non-unicode.
|
|
|
|
v = [str(x) for x in v]
|
|
|
|
hdrs.append((i, v))
|
|
|
|
key.append(repr(hdrs))
|
2011-02-20 19:47:19 +00:00
|
|
|
return hashlib.sha256(repr(key)).digest()
|
|
|
|
|
|
|
|
def next_flow(self, request):
|
|
|
|
"""
|
|
|
|
Returns the next flow object, or None if no matching flow was
|
|
|
|
found.
|
|
|
|
"""
|
|
|
|
l = self.fmap.get(self._hash(request))
|
|
|
|
if not l:
|
|
|
|
return None
|
2012-03-05 09:05:11 +00:00
|
|
|
|
2012-03-13 22:20:25 +00:00
|
|
|
if self.nopop:
|
2012-03-05 09:05:11 +00:00
|
|
|
return l[0]
|
2012-03-13 22:20:25 +00:00
|
|
|
else:
|
2012-03-05 09:05:11 +00:00
|
|
|
return l.pop(0)
|
|
|
|
|
2011-02-20 19:47:19 +00:00
|
|
|
|
2011-02-23 21:33:39 +00:00
|
|
|
class StickyCookieState:
|
2011-02-24 02:15:51 +00:00
|
|
|
def __init__(self, flt):
|
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
flt: Compiled filter.
|
2011-02-24 02:15:51 +00:00
|
|
|
"""
|
2011-02-23 21:33:39 +00:00
|
|
|
self.jar = {}
|
2011-02-24 02:15:51 +00:00
|
|
|
self.flt = flt
|
2011-02-23 21:33:39 +00:00
|
|
|
|
2011-02-24 02:15:51 +00:00
|
|
|
def ckey(self, m, f):
|
|
|
|
"""
|
2011-07-16 09:47:06 +00:00
|
|
|
Returns a (domain, port, path) tuple.
|
2011-02-24 02:15:51 +00:00
|
|
|
"""
|
|
|
|
return (
|
2014-09-03 21:44:54 +00:00
|
|
|
m["domain"] or f.request.host,
|
|
|
|
f.request.port,
|
2011-02-24 02:15:51 +00:00
|
|
|
m["path"] or "/"
|
|
|
|
)
|
2011-02-23 21:33:39 +00:00
|
|
|
|
2011-08-26 05:37:12 +00:00
|
|
|
def domain_match(self, a, b):
|
|
|
|
if cookielib.domain_match(a, b):
|
|
|
|
return True
|
|
|
|
elif cookielib.domain_match(a, b.strip(".")):
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2011-02-24 02:15:51 +00:00
|
|
|
def handle_response(self, f):
|
2011-07-14 03:59:27 +00:00
|
|
|
for i in f.response.headers["set-cookie"]:
|
2011-03-10 22:56:10 +00:00
|
|
|
# FIXME: We now know that Cookie.py screws up some cookies with
|
|
|
|
# valid RFC 822/1123 datetime specifications for expiry. Sigh.
|
2011-07-24 04:08:27 +00:00
|
|
|
c = Cookie.SimpleCookie(str(i))
|
2011-02-23 21:33:39 +00:00
|
|
|
m = c.values()[0]
|
2011-02-24 02:15:51 +00:00
|
|
|
k = self.ckey(m, f)
|
2014-09-03 21:44:54 +00:00
|
|
|
if self.domain_match(f.request.host, k[0]):
|
2011-02-24 02:15:51 +00:00
|
|
|
self.jar[self.ckey(m, f)] = m
|
|
|
|
|
|
|
|
def handle_request(self, f):
|
2011-08-26 05:37:12 +00:00
|
|
|
l = []
|
2011-02-24 02:15:51 +00:00
|
|
|
if f.match(self.flt):
|
|
|
|
for i in self.jar.keys():
|
|
|
|
match = [
|
2014-09-03 21:44:54 +00:00
|
|
|
self.domain_match(f.request.host, i[0]),
|
|
|
|
f.request.port == i[1],
|
2011-02-24 02:15:51 +00:00
|
|
|
f.request.path.startswith(i[2])
|
|
|
|
]
|
|
|
|
if all(match):
|
|
|
|
l.append(self.jar[i].output(header="").strip())
|
2011-08-26 05:37:12 +00:00
|
|
|
if l:
|
|
|
|
f.request.stickycookie = True
|
|
|
|
f.request.headers["cookie"] = l
|
2011-02-23 21:33:39 +00:00
|
|
|
|
|
|
|
|
2011-03-20 04:31:54 +00:00
|
|
|
class StickyAuthState:
|
|
|
|
def __init__(self, flt):
|
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
flt: Compiled filter.
|
2011-03-20 04:31:54 +00:00
|
|
|
"""
|
|
|
|
self.flt = flt
|
|
|
|
self.hosts = {}
|
|
|
|
|
|
|
|
def handle_request(self, f):
|
2014-09-03 21:44:54 +00:00
|
|
|
host = f.request.host
|
2011-03-20 04:31:54 +00:00
|
|
|
if "authorization" in f.request.headers:
|
2014-02-05 19:26:47 +00:00
|
|
|
self.hosts[host] = f.request.headers["authorization"]
|
2011-03-20 04:31:54 +00:00
|
|
|
elif f.match(self.flt):
|
2014-02-05 19:26:47 +00:00
|
|
|
if host in self.hosts:
|
|
|
|
f.request.headers["authorization"] = self.hosts[host]
|
2011-03-20 04:31:54 +00:00
|
|
|
|
2011-02-23 21:33:39 +00:00
|
|
|
|
2011-08-02 04:14:33 +00:00
|
|
|
class State(object):
|
2011-01-25 02:02:48 +00:00
|
|
|
def __init__(self):
|
2011-07-31 23:17:01 +00:00
|
|
|
self._flow_list = []
|
|
|
|
self.view = []
|
2011-02-19 04:00:24 +00:00
|
|
|
|
2011-01-25 02:02:48 +00:00
|
|
|
# These are compiled filt expressions:
|
2011-07-31 23:17:01 +00:00
|
|
|
self._limit = None
|
2011-01-25 02:02:48 +00:00
|
|
|
self.intercept = None
|
2011-07-31 23:17:01 +00:00
|
|
|
self._limit_txt = None
|
|
|
|
|
|
|
|
@property
|
|
|
|
def limit_txt(self):
|
|
|
|
return self._limit_txt
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2011-03-06 03:11:45 +00:00
|
|
|
def flow_count(self):
|
2014-01-31 02:01:51 +00:00
|
|
|
return len(self._flow_list)
|
2011-03-06 03:11:45 +00:00
|
|
|
|
2012-02-18 11:17:47 +00:00
|
|
|
def index(self, f):
|
|
|
|
return self._flow_list.index(f)
|
|
|
|
|
2011-03-06 03:11:45 +00:00
|
|
|
def active_flow_count(self):
|
|
|
|
c = 0
|
2011-07-31 23:17:01 +00:00
|
|
|
for i in self._flow_list:
|
2011-03-06 03:11:45 +00:00
|
|
|
if not i.response and not i.error:
|
|
|
|
c += 1
|
|
|
|
return c
|
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def add_request(self, flow):
|
2011-01-25 02:02:48 +00:00
|
|
|
"""
|
|
|
|
Add a request to the state. Returns the matching flow.
|
|
|
|
"""
|
2014-11-13 23:26:22 +00:00
|
|
|
if flow in self._flow_list: # catch flow replay
|
|
|
|
return flow
|
2014-09-03 14:57:56 +00:00
|
|
|
self._flow_list.append(flow)
|
|
|
|
if flow.match(self._limit):
|
|
|
|
self.view.append(flow)
|
|
|
|
return flow
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def add_response(self, f):
|
2011-01-25 02:02:48 +00:00
|
|
|
"""
|
|
|
|
Add a response to the state. Returns the matching flow.
|
|
|
|
"""
|
|
|
|
if not f:
|
|
|
|
return False
|
2011-07-31 23:17:01 +00:00
|
|
|
if f.match(self._limit) and not f in self.view:
|
|
|
|
self.view.append(f)
|
2011-01-25 02:02:48 +00:00
|
|
|
return f
|
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def add_error(self, f):
|
2011-01-25 02:02:48 +00:00
|
|
|
"""
|
|
|
|
Add an error response to the state. Returns the matching flow, or
|
|
|
|
None if there isn't one.
|
|
|
|
"""
|
2012-02-24 23:19:54 +00:00
|
|
|
if not f:
|
2011-01-25 02:02:48 +00:00
|
|
|
return None
|
2011-07-31 23:17:01 +00:00
|
|
|
if f.match(self._limit) and not f in self.view:
|
|
|
|
self.view.append(f)
|
2011-01-25 02:02:48 +00:00
|
|
|
return f
|
|
|
|
|
2011-02-16 02:10:00 +00:00
|
|
|
def load_flows(self, flows):
|
2011-07-31 23:17:01 +00:00
|
|
|
self._flow_list.extend(flows)
|
|
|
|
self.recalculate_view()
|
2011-01-26 03:50:17 +00:00
|
|
|
|
2011-03-12 22:24:49 +00:00
|
|
|
def set_limit(self, txt):
|
|
|
|
if txt:
|
|
|
|
f = filt.parse(txt)
|
|
|
|
if not f:
|
|
|
|
return "Invalid filter expression."
|
2011-07-31 23:17:01 +00:00
|
|
|
self._limit = f
|
|
|
|
self._limit_txt = txt
|
2011-03-12 22:24:49 +00:00
|
|
|
else:
|
2011-07-31 23:17:01 +00:00
|
|
|
self._limit = None
|
|
|
|
self._limit_txt = None
|
|
|
|
self.recalculate_view()
|
2011-03-12 22:24:49 +00:00
|
|
|
|
|
|
|
def set_intercept(self, txt):
|
|
|
|
if txt:
|
|
|
|
f = filt.parse(txt)
|
|
|
|
if not f:
|
|
|
|
return "Invalid filter expression."
|
|
|
|
self.intercept = f
|
|
|
|
self.intercept_txt = txt
|
|
|
|
else:
|
|
|
|
self.intercept = None
|
|
|
|
self.intercept_txt = None
|
2011-01-25 02:02:48 +00:00
|
|
|
|
2011-07-31 23:17:01 +00:00
|
|
|
def recalculate_view(self):
|
|
|
|
if self._limit:
|
|
|
|
self.view = [i for i in self._flow_list if i.match(self._limit)]
|
2011-01-26 03:50:17 +00:00
|
|
|
else:
|
2011-07-31 23:17:01 +00:00
|
|
|
self.view = self._flow_list[:]
|
2011-01-26 03:50:17 +00:00
|
|
|
|
2011-01-25 02:02:48 +00:00
|
|
|
def delete_flow(self, f):
|
2011-07-31 23:17:01 +00:00
|
|
|
self._flow_list.remove(f)
|
2013-03-17 19:36:56 +00:00
|
|
|
if f in self.view:
|
2011-07-31 23:17:01 +00:00
|
|
|
self.view.remove(f)
|
2011-03-15 04:53:29 +00:00
|
|
|
return True
|
2011-01-25 02:02:48 +00:00
|
|
|
|
|
|
|
def clear(self):
|
2011-07-31 23:17:01 +00:00
|
|
|
for i in self._flow_list[:]:
|
2011-01-25 02:02:48 +00:00
|
|
|
self.delete_flow(i)
|
|
|
|
|
|
|
|
def accept_all(self):
|
2011-07-31 23:17:01 +00:00
|
|
|
for i in self._flow_list[:]:
|
2011-01-25 02:02:48 +00:00
|
|
|
i.accept_intercept()
|
|
|
|
|
|
|
|
def revert(self, f):
|
|
|
|
f.revert()
|
|
|
|
|
2011-07-31 23:17:01 +00:00
|
|
|
def killall(self, master):
|
|
|
|
for i in self._flow_list:
|
|
|
|
i.kill(master)
|
|
|
|
|
2011-02-16 01:33:04 +00:00
|
|
|
|
2011-02-16 03:03:22 +00:00
|
|
|
class FlowMaster(controller.Master):
|
|
|
|
def __init__(self, server, state):
|
|
|
|
controller.Master.__init__(self, server)
|
|
|
|
self.state = state
|
2011-03-05 00:03:26 +00:00
|
|
|
self.server_playback = None
|
|
|
|
self.client_playback = None
|
2011-02-20 22:40:49 +00:00
|
|
|
self.kill_nonreplay = False
|
2013-06-13 14:04:04 +00:00
|
|
|
self.scripts = []
|
2012-02-18 22:29:49 +00:00
|
|
|
self.pause_scripts = False
|
2011-03-13 02:55:47 +00:00
|
|
|
|
2011-02-24 02:15:51 +00:00
|
|
|
self.stickycookie_state = False
|
2011-03-13 02:55:47 +00:00
|
|
|
self.stickycookie_txt = None
|
2011-03-10 22:56:10 +00:00
|
|
|
|
2011-03-20 04:31:54 +00:00
|
|
|
self.stickyauth_state = False
|
|
|
|
self.stickyauth_txt = None
|
|
|
|
|
2011-03-09 00:15:31 +00:00
|
|
|
self.anticache = False
|
2011-07-15 03:21:04 +00:00
|
|
|
self.anticomp = False
|
2014-07-21 19:06:55 +00:00
|
|
|
self.stream_large_bodies = False
|
2011-03-10 22:56:10 +00:00
|
|
|
self.refresh_server_playback = False
|
2012-03-16 22:31:05 +00:00
|
|
|
self.replacehooks = ReplaceHooks()
|
2012-08-18 11:39:52 +00:00
|
|
|
self.setheaders = SetHeaders()
|
2014-10-26 04:44:49 +00:00
|
|
|
self.replay_ignore_params = False
|
2014-10-03 10:29:44 +00:00
|
|
|
self.replay_ignore_content = None
|
|
|
|
|
2011-02-20 20:54:39 +00:00
|
|
|
|
2012-07-08 22:18:37 +00:00
|
|
|
self.stream = None
|
2014-01-04 01:35:11 +00:00
|
|
|
self.apps = AppRegistry()
|
2012-07-08 22:18:37 +00:00
|
|
|
|
2014-09-13 23:46:01 +00:00
|
|
|
def start_app(self, host, port):
|
|
|
|
self.apps.add(
|
|
|
|
app.mapp,
|
|
|
|
host,
|
|
|
|
port
|
|
|
|
)
|
2013-07-23 22:32:56 +00:00
|
|
|
|
2014-03-13 00:04:45 +00:00
|
|
|
def add_event(self, e, level="info"):
|
2011-08-03 01:33:18 +00:00
|
|
|
"""
|
2014-03-12 21:39:23 +00:00
|
|
|
level: debug, info, error
|
2011-08-03 01:33:18 +00:00
|
|
|
"""
|
|
|
|
pass
|
|
|
|
|
2014-01-13 01:20:34 +00:00
|
|
|
def unload_scripts(self):
|
2014-01-19 05:16:24 +00:00
|
|
|
for s in self.scripts[:]:
|
2014-09-07 13:57:36 +00:00
|
|
|
self.unload_script(s)
|
|
|
|
|
|
|
|
def unload_script(self, script):
|
|
|
|
script.unload()
|
|
|
|
self.scripts.remove(script)
|
2011-08-03 05:35:18 +00:00
|
|
|
|
2014-01-12 10:01:59 +00:00
|
|
|
def load_script(self, command):
|
2011-08-03 05:35:18 +00:00
|
|
|
"""
|
|
|
|
Loads a script. Returns an error description if something went
|
2013-06-13 14:04:04 +00:00
|
|
|
wrong.
|
2011-08-03 05:35:18 +00:00
|
|
|
"""
|
2014-01-12 00:59:32 +00:00
|
|
|
try:
|
2014-01-12 10:01:59 +00:00
|
|
|
s = script.Script(command, self)
|
2014-01-12 00:59:32 +00:00
|
|
|
except script.ScriptError, v:
|
|
|
|
return v.args[0]
|
|
|
|
self.scripts.append(s)
|
2013-06-13 14:04:04 +00:00
|
|
|
|
|
|
|
def run_single_script_hook(self, script, name, *args, **kwargs):
|
|
|
|
if script and not self.pause_scripts:
|
|
|
|
ret = script.run(name, *args, **kwargs)
|
|
|
|
if not ret[0] and ret[1]:
|
|
|
|
e = "Script error:\n" + ret[1][1]
|
|
|
|
self.add_event(e, "error")
|
2011-02-20 22:40:49 +00:00
|
|
|
|
2013-06-13 14:04:04 +00:00
|
|
|
def run_script_hook(self, name, *args, **kwargs):
|
|
|
|
for script in self.scripts:
|
|
|
|
self.run_single_script_hook(script, name, *args, **kwargs)
|
2013-12-24 01:28:20 +00:00
|
|
|
|
2014-10-18 16:29:35 +00:00
|
|
|
def get_ignore_filter(self):
|
|
|
|
return self.server.config.check_ignore.patterns
|
2014-09-08 10:20:40 +00:00
|
|
|
|
2014-10-18 16:29:35 +00:00
|
|
|
def set_ignore_filter(self, host_patterns):
|
|
|
|
self.server.config.check_ignore = HostMatcher(host_patterns)
|
|
|
|
|
|
|
|
def get_tcp_filter(self):
|
|
|
|
return self.server.config.check_tcp.patterns
|
|
|
|
|
|
|
|
def set_tcp_filter(self, host_patterns):
|
|
|
|
self.server.config.check_tcp = HostMatcher(host_patterns)
|
2014-09-08 10:20:40 +00:00
|
|
|
|
2011-02-24 02:15:51 +00:00
|
|
|
def set_stickycookie(self, txt):
|
|
|
|
if txt:
|
|
|
|
flt = filt.parse(txt)
|
|
|
|
if not flt:
|
|
|
|
return "Invalid filter expression."
|
|
|
|
self.stickycookie_state = StickyCookieState(flt)
|
2011-03-12 22:43:55 +00:00
|
|
|
self.stickycookie_txt = txt
|
2011-02-24 02:15:51 +00:00
|
|
|
else:
|
|
|
|
self.stickycookie_state = None
|
2011-03-12 22:43:55 +00:00
|
|
|
self.stickycookie_txt = None
|
2011-02-24 02:15:51 +00:00
|
|
|
|
2014-07-21 19:06:55 +00:00
|
|
|
def set_stream_large_bodies(self, max_size):
|
|
|
|
if max_size is not None:
|
|
|
|
self.stream_large_bodies = StreamLargeBodies(max_size)
|
|
|
|
else:
|
|
|
|
self.stream_large_bodies = False
|
|
|
|
|
2011-03-20 04:31:54 +00:00
|
|
|
def set_stickyauth(self, txt):
|
|
|
|
if txt:
|
|
|
|
flt = filt.parse(txt)
|
|
|
|
if not flt:
|
|
|
|
return "Invalid filter expression."
|
|
|
|
self.stickyauth_state = StickyAuthState(flt)
|
|
|
|
self.stickyauth_txt = txt
|
|
|
|
else:
|
|
|
|
self.stickyauth_state = None
|
|
|
|
self.stickyauth_txt = None
|
|
|
|
|
2011-03-06 03:54:49 +00:00
|
|
|
def start_client_playback(self, flows, exit):
|
2011-03-05 00:03:26 +00:00
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
flows: List of flows.
|
2011-03-05 00:03:26 +00:00
|
|
|
"""
|
2011-03-06 03:54:49 +00:00
|
|
|
self.client_playback = ClientPlaybackState(flows, exit)
|
2011-03-05 00:03:26 +00:00
|
|
|
|
2011-03-17 20:38:51 +00:00
|
|
|
def stop_client_playback(self):
|
|
|
|
self.client_playback = None
|
|
|
|
|
2014-10-03 10:29:44 +00:00
|
|
|
def start_server_playback(self, flows, kill, headers, exit, nopop, ignore_params, ignore_content):
|
2011-02-20 22:40:49 +00:00
|
|
|
"""
|
2011-08-03 21:29:55 +00:00
|
|
|
flows: List of flows.
|
2011-02-20 22:40:49 +00:00
|
|
|
kill: Boolean, should we kill requests not part of the replay?
|
2014-10-03 10:29:44 +00:00
|
|
|
ignore_params: list of parameters to ignore in server replay
|
|
|
|
ignore_content: true if request content should be ignored in server replay
|
2011-02-20 22:40:49 +00:00
|
|
|
"""
|
2014-10-03 10:29:44 +00:00
|
|
|
self.server_playback = ServerPlaybackState(headers, flows, exit, nopop, ignore_params, ignore_content)
|
2011-02-20 22:40:49 +00:00
|
|
|
self.kill_nonreplay = kill
|
|
|
|
|
2011-03-17 20:43:47 +00:00
|
|
|
def stop_server_playback(self):
|
2013-01-05 08:41:16 +00:00
|
|
|
if self.server_playback.exit:
|
|
|
|
self.shutdown()
|
2011-03-17 20:43:47 +00:00
|
|
|
self.server_playback = None
|
|
|
|
|
2011-03-05 00:03:26 +00:00
|
|
|
def do_server_playback(self, flow):
|
2011-02-20 20:54:39 +00:00
|
|
|
"""
|
|
|
|
This method should be called by child classes in the handle_request
|
|
|
|
handler. Returns True if playback has taken place, None if not.
|
|
|
|
"""
|
2011-03-05 00:03:26 +00:00
|
|
|
if self.server_playback:
|
|
|
|
rflow = self.server_playback.next_flow(flow)
|
2011-02-20 20:54:39 +00:00
|
|
|
if not rflow:
|
|
|
|
return None
|
2014-09-16 23:35:14 +00:00
|
|
|
response = http.HTTPResponse.from_state(rflow.response.get_state())
|
2014-02-04 04:02:17 +00:00
|
|
|
response.is_replay = True
|
2011-03-10 22:56:10 +00:00
|
|
|
if self.refresh_server_playback:
|
|
|
|
response.refresh()
|
2014-09-03 14:57:56 +00:00
|
|
|
flow.reply(response)
|
2012-08-17 12:23:41 +00:00
|
|
|
if self.server_playback.count() == 0:
|
|
|
|
self.stop_server_playback()
|
2011-02-20 20:54:39 +00:00
|
|
|
return True
|
|
|
|
return None
|
2011-02-16 03:03:22 +00:00
|
|
|
|
2014-09-13 23:30:00 +00:00
|
|
|
def tick(self, q, timeout):
|
2011-03-05 00:03:26 +00:00
|
|
|
if self.client_playback:
|
2011-03-06 03:54:49 +00:00
|
|
|
e = [
|
|
|
|
self.client_playback.done(),
|
|
|
|
self.client_playback.exit,
|
|
|
|
self.state.active_flow_count() == 0
|
|
|
|
]
|
|
|
|
if all(e):
|
|
|
|
self.shutdown()
|
2014-11-10 16:11:36 +00:00
|
|
|
self.client_playback.tick(self)
|
2011-03-06 04:08:56 +00:00
|
|
|
|
2014-09-13 23:30:00 +00:00
|
|
|
return controller.Master.tick(self, q, timeout)
|
2011-03-05 00:03:26 +00:00
|
|
|
|
2012-02-18 10:56:40 +00:00
|
|
|
def duplicate_flow(self, f):
|
|
|
|
return self.load_flow(f.copy())
|
|
|
|
|
|
|
|
def load_flow(self, f):
|
2012-02-18 11:17:47 +00:00
|
|
|
"""
|
|
|
|
Loads a flow, and returns a new flow object.
|
|
|
|
"""
|
2014-09-08 12:43:05 +00:00
|
|
|
|
|
|
|
if self.server and self.server.config.mode == "reverse":
|
|
|
|
f.request.host, f.request.port = self.server.config.mode.dst[2:]
|
|
|
|
f.request.scheme = "https" if self.server.config.mode.dst[1] else "http"
|
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
f.reply = controller.DummyReply()
|
2012-02-18 10:56:40 +00:00
|
|
|
if f.request:
|
2014-09-03 14:57:56 +00:00
|
|
|
self.handle_request(f)
|
2012-02-18 10:56:40 +00:00
|
|
|
if f.response:
|
2014-09-04 17:08:54 +00:00
|
|
|
self.handle_responseheaders(f)
|
2014-09-03 14:57:56 +00:00
|
|
|
self.handle_response(f)
|
2012-02-18 10:56:40 +00:00
|
|
|
if f.error:
|
2014-09-03 14:57:56 +00:00
|
|
|
self.handle_error(f)
|
|
|
|
return f
|
2012-02-18 10:56:40 +00:00
|
|
|
|
2011-05-14 23:22:35 +00:00
|
|
|
def load_flows(self, fr):
|
|
|
|
"""
|
|
|
|
Load flows from a FlowReader object.
|
|
|
|
"""
|
|
|
|
for i in fr.stream():
|
2012-02-18 10:56:40 +00:00
|
|
|
self.load_flow(i)
|
2011-05-14 23:22:35 +00:00
|
|
|
|
2011-03-15 02:11:03 +00:00
|
|
|
def process_new_request(self, f):
|
|
|
|
if self.stickycookie_state:
|
|
|
|
self.stickycookie_state.handle_request(f)
|
2011-03-20 04:31:54 +00:00
|
|
|
if self.stickyauth_state:
|
|
|
|
self.stickyauth_state.handle_request(f)
|
|
|
|
|
2011-03-15 02:11:03 +00:00
|
|
|
if self.anticache:
|
|
|
|
f.request.anticache()
|
2011-07-15 03:21:04 +00:00
|
|
|
if self.anticomp:
|
|
|
|
f.request.anticomp()
|
2011-07-16 09:47:06 +00:00
|
|
|
|
2011-03-15 02:11:03 +00:00
|
|
|
if self.server_playback:
|
|
|
|
pb = self.do_server_playback(f)
|
|
|
|
if not pb:
|
|
|
|
if self.kill_nonreplay:
|
|
|
|
f.kill(self)
|
|
|
|
else:
|
2014-09-03 14:57:56 +00:00
|
|
|
f.reply()
|
2011-03-15 02:11:03 +00:00
|
|
|
|
2011-05-14 23:22:35 +00:00
|
|
|
def process_new_response(self, f):
|
|
|
|
if self.stickycookie_state:
|
|
|
|
self.stickycookie_state.handle_response(f)
|
|
|
|
|
2012-07-10 11:29:33 +00:00
|
|
|
def replay_request(self, f, block=False):
|
2011-03-15 02:11:03 +00:00
|
|
|
"""
|
|
|
|
Returns None if successful, or error message if not.
|
|
|
|
"""
|
2014-10-18 23:26:08 +00:00
|
|
|
if f.live:
|
|
|
|
return "Can't replay request which is still live..."
|
2011-03-15 02:11:03 +00:00
|
|
|
if f.intercepting:
|
|
|
|
return "Can't replay while intercepting..."
|
2014-03-09 20:51:24 +00:00
|
|
|
if f.request.content == http.CONTENT_MISSING:
|
2012-05-16 06:24:32 +00:00
|
|
|
return "Can't replay request with missing content..."
|
2011-03-15 02:11:03 +00:00
|
|
|
if f.request:
|
2014-02-04 04:02:17 +00:00
|
|
|
f.request.is_replay = True
|
2011-03-15 02:11:03 +00:00
|
|
|
if f.request.content:
|
2013-05-21 13:57:14 +00:00
|
|
|
f.request.headers["Content-Length"] = [str(len(f.request.content))]
|
2011-03-15 02:11:03 +00:00
|
|
|
f.response = None
|
|
|
|
f.error = None
|
|
|
|
self.process_new_request(f)
|
2014-08-08 17:04:58 +00:00
|
|
|
rt = http.RequestReplayThread(
|
2014-09-16 21:40:25 +00:00
|
|
|
self.server.config,
|
|
|
|
f,
|
|
|
|
self.masterq,
|
|
|
|
self.should_exit
|
|
|
|
)
|
2014-09-04 17:08:54 +00:00
|
|
|
rt.start() # pragma: no cover
|
2012-07-10 11:29:33 +00:00
|
|
|
if block:
|
|
|
|
rt.join()
|
2011-03-15 02:11:03 +00:00
|
|
|
|
2014-03-13 00:04:45 +00:00
|
|
|
def handle_log(self, l):
|
|
|
|
self.add_event(l.msg, l.level)
|
|
|
|
l.reply()
|
|
|
|
|
2011-08-03 04:36:20 +00:00
|
|
|
def handle_clientconnect(self, cc):
|
2011-08-05 02:03:10 +00:00
|
|
|
self.run_script_hook("clientconnect", cc)
|
2013-02-16 23:42:48 +00:00
|
|
|
cc.reply()
|
2011-02-19 04:00:24 +00:00
|
|
|
|
|
|
|
def handle_clientdisconnect(self, r):
|
2011-08-05 02:03:10 +00:00
|
|
|
self.run_script_hook("clientdisconnect", r)
|
2013-02-16 23:42:48 +00:00
|
|
|
r.reply()
|
2011-02-16 03:03:22 +00:00
|
|
|
|
2014-07-26 10:02:18 +00:00
|
|
|
def handle_serverconnect(self, sc):
|
2013-11-18 16:25:52 +00:00
|
|
|
self.run_script_hook("serverconnect", sc)
|
|
|
|
sc.reply()
|
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_error(self, f):
|
|
|
|
self.state.add_error(f)
|
|
|
|
self.run_script_hook("error", f)
|
2011-03-05 00:03:26 +00:00
|
|
|
if self.client_playback:
|
|
|
|
self.client_playback.clear(f)
|
2014-09-03 14:57:56 +00:00
|
|
|
f.reply()
|
2011-02-16 03:03:22 +00:00
|
|
|
return f
|
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_request(self, f):
|
|
|
|
if f.live:
|
|
|
|
app = self.apps.get(f.request)
|
2014-01-04 21:58:53 +00:00
|
|
|
if app:
|
2014-10-26 04:44:49 +00:00
|
|
|
err = app.serve(
|
|
|
|
f,
|
|
|
|
f.client_conn.wfile,
|
|
|
|
**{"mitmproxy.master": self}
|
|
|
|
)
|
2014-01-04 21:58:53 +00:00
|
|
|
if err:
|
|
|
|
self.add_event("Error in wsgi app. %s"%err, "error")
|
2014-09-03 14:57:56 +00:00
|
|
|
f.reply(protocol.KILL)
|
2014-01-04 21:58:53 +00:00
|
|
|
return
|
2014-09-03 14:57:56 +00:00
|
|
|
self.state.add_request(f)
|
2012-03-16 22:31:05 +00:00
|
|
|
self.replacehooks.run(f)
|
2012-08-18 11:39:52 +00:00
|
|
|
self.setheaders.run(f)
|
2011-08-05 02:03:10 +00:00
|
|
|
self.run_script_hook("request", f)
|
2011-03-15 02:11:03 +00:00
|
|
|
self.process_new_request(f)
|
2011-02-20 22:40:49 +00:00
|
|
|
return f
|
2011-02-16 03:03:22 +00:00
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_responseheaders(self, f):
|
2014-07-20 09:17:53 +00:00
|
|
|
self.run_script_hook("responseheaders", f)
|
2014-07-21 19:06:55 +00:00
|
|
|
|
Fix crash while streaming
Found using fuzzing. Reproduction with pathoc, given "mitmproxy -s" and
pathod running on 9999:
get:'http://localhost:9999/p/':s'200:b\'foo\':h\'Content-Length\'=\'3\'':i58,'\x1a':r
return flow.FlowMaster.run(self)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 111, in run
self.tick(self.masterq, 0.01)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 613, in tick
return controller.Master.tick(self, q, timeout)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 101, in tick
self.handle(*msg)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 118, in handle
m(obj)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 738, in handle_responseheaders
self.stream_large_bodies.run(f, False)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 155, in run
r.headers, is_request, flow.request.method, code
File "/Users/aldo/mitmproxy/mitmproxy/netlib/http.py", line 401, in expected_http_body_size
raise HttpError(400 if is_request else 502, "Invalid content-length header: %s" % headers["content-length"])
netlib.http.HttpError: Invalid content-length header: ['\x1a3']
2014-10-26 04:58:36 +00:00
|
|
|
try:
|
|
|
|
if self.stream_large_bodies:
|
|
|
|
self.stream_large_bodies.run(f, False)
|
|
|
|
except netlib.http.HttpError:
|
|
|
|
f.reply(protocol.KILL)
|
|
|
|
return
|
2014-07-21 19:06:55 +00:00
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
f.reply()
|
2014-09-09 23:34:58 +00:00
|
|
|
return f
|
2014-07-18 05:43:26 +00:00
|
|
|
|
2014-09-03 14:57:56 +00:00
|
|
|
def handle_response(self, f):
|
|
|
|
self.state.add_response(f)
|
|
|
|
self.replacehooks.run(f)
|
|
|
|
self.setheaders.run(f)
|
|
|
|
self.run_script_hook("response", f)
|
|
|
|
if self.client_playback:
|
|
|
|
self.client_playback.clear(f)
|
|
|
|
self.process_new_response(f)
|
|
|
|
if self.stream:
|
|
|
|
self.stream.add(f)
|
2011-02-16 03:43:35 +00:00
|
|
|
return f
|
2011-02-16 03:03:22 +00:00
|
|
|
|
2011-08-05 02:03:10 +00:00
|
|
|
def shutdown(self):
|
2014-01-13 01:20:34 +00:00
|
|
|
self.unload_scripts()
|
2011-08-05 02:03:10 +00:00
|
|
|
controller.Master.shutdown(self)
|
2012-07-08 22:18:37 +00:00
|
|
|
if self.stream:
|
|
|
|
for i in self.state._flow_list:
|
|
|
|
if not i.response:
|
|
|
|
self.stream.add(i)
|
|
|
|
self.stop_stream()
|
|
|
|
|
2013-03-13 20:19:43 +00:00
|
|
|
def start_stream(self, fp, filt):
|
|
|
|
self.stream = FilteredFlowWriter(fp, filt)
|
2012-07-08 22:18:37 +00:00
|
|
|
|
|
|
|
def stop_stream(self):
|
2012-07-26 12:19:18 +00:00
|
|
|
self.stream.fo.close()
|
2012-07-08 22:18:37 +00:00
|
|
|
self.stream = None
|
|
|
|
|
2011-08-05 02:03:10 +00:00
|
|
|
|
2011-02-16 01:33:04 +00:00
|
|
|
class FlowWriter:
|
|
|
|
def __init__(self, fo):
|
|
|
|
self.fo = fo
|
|
|
|
|
|
|
|
def add(self, flow):
|
2014-09-16 23:35:14 +00:00
|
|
|
d = flow.get_state()
|
2011-08-19 09:38:05 +00:00
|
|
|
tnetstring.dump(d, self.fo)
|
2011-02-16 01:33:04 +00:00
|
|
|
|
2011-03-12 00:47:37 +00:00
|
|
|
|
2011-03-11 02:16:31 +00:00
|
|
|
class FlowReadError(Exception):
|
|
|
|
@property
|
|
|
|
def strerror(self):
|
|
|
|
return self.args[0]
|
2011-02-16 01:33:04 +00:00
|
|
|
|
2011-03-12 00:47:37 +00:00
|
|
|
|
2011-02-16 01:33:04 +00:00
|
|
|
class FlowReader:
|
|
|
|
def __init__(self, fo):
|
|
|
|
self.fo = fo
|
|
|
|
|
|
|
|
def stream(self):
|
|
|
|
"""
|
|
|
|
Yields Flow objects from the dump.
|
|
|
|
"""
|
2011-08-19 09:30:24 +00:00
|
|
|
off = 0
|
2011-03-11 02:16:31 +00:00
|
|
|
try:
|
2011-08-19 09:30:24 +00:00
|
|
|
while 1:
|
2011-08-19 09:38:05 +00:00
|
|
|
data = tnetstring.load(self.fo)
|
2013-07-23 22:32:56 +00:00
|
|
|
if tuple(data["version"][:2]) != version.IVERSION[:2]:
|
2012-04-10 22:10:53 +00:00
|
|
|
v = ".".join(str(i) for i in data["version"])
|
|
|
|
raise FlowReadError("Incompatible serialized data version: %s"%v)
|
2011-08-19 09:30:24 +00:00
|
|
|
off = self.fo.tell()
|
2014-10-18 16:29:35 +00:00
|
|
|
yield handle.protocols[data["type"]]["flow"].from_state(data)
|
2012-07-24 03:15:41 +00:00
|
|
|
except ValueError, v:
|
2011-08-19 09:30:24 +00:00
|
|
|
# Error is due to EOF
|
|
|
|
if self.fo.tell() == off and self.fo.read() == '':
|
|
|
|
return
|
2011-03-11 02:16:31 +00:00
|
|
|
raise FlowReadError("Invalid data format.")
|
2011-02-16 01:33:04 +00:00
|
|
|
|
2013-03-13 20:19:43 +00:00
|
|
|
|
|
|
|
class FilteredFlowWriter:
|
|
|
|
def __init__(self, fo, filt):
|
|
|
|
self.fo = fo
|
|
|
|
self.filt = filt
|
|
|
|
|
|
|
|
def add(self, f):
|
|
|
|
if self.filt and not f.match(self.filt):
|
|
|
|
return
|
2014-09-16 23:35:14 +00:00
|
|
|
d = f.get_state()
|
2013-03-13 20:19:43 +00:00
|
|
|
tnetstring.dump(d, self.fo)
|