2016-06-01 02:06:57 +00:00
|
|
|
from __future__ import absolute_import, print_function, division
|
|
|
|
|
|
|
|
import base64
|
2014-11-15 04:25:05 +00:00
|
|
|
import os
|
2014-03-10 21:36:47 +00:00
|
|
|
import re
|
2015-09-10 22:00:00 +00:00
|
|
|
|
2014-11-15 03:29:38 +00:00
|
|
|
import configargparse
|
2015-08-01 08:40:19 +00:00
|
|
|
|
2016-07-18 05:09:55 +00:00
|
|
|
from mitmproxy import exceptions
|
2016-06-01 02:06:57 +00:00
|
|
|
from mitmproxy import filt
|
|
|
|
from mitmproxy.proxy import config
|
2016-05-31 07:32:08 +00:00
|
|
|
from netlib import human
|
2016-06-20 19:38:14 +00:00
|
|
|
from netlib import strutils
|
2016-06-01 02:06:57 +00:00
|
|
|
from netlib import tcp
|
2016-06-11 22:29:12 +00:00
|
|
|
from netlib import version
|
2016-06-01 02:06:57 +00:00
|
|
|
from netlib.http import url
|
2012-03-17 04:20:34 +00:00
|
|
|
|
2014-01-27 01:37:29 +00:00
|
|
|
APP_HOST = "mitm.it"
|
2013-08-18 18:03:53 +00:00
|
|
|
APP_PORT = 80
|
2016-07-18 02:50:10 +00:00
|
|
|
CA_DIR = "~/.mitmproxy"
|
2013-07-23 22:32:56 +00:00
|
|
|
|
2014-03-10 04:11:51 +00:00
|
|
|
|
|
|
|
class ParseException(Exception):
|
|
|
|
pass
|
|
|
|
|
2012-03-17 04:20:34 +00:00
|
|
|
|
2012-08-18 12:14:16 +00:00
|
|
|
def _parse_hook(s):
|
|
|
|
sep, rem = s[0], s[1:]
|
|
|
|
parts = rem.split(sep, 2)
|
|
|
|
if len(parts) == 2:
|
|
|
|
patt = ".*"
|
|
|
|
a, b = parts
|
|
|
|
elif len(parts) == 3:
|
|
|
|
patt, a, b = parts
|
|
|
|
else:
|
2014-11-15 03:14:08 +00:00
|
|
|
raise ParseException(
|
|
|
|
"Malformed hook specifier - too few clauses: %s" % s
|
|
|
|
)
|
2012-08-18 12:14:16 +00:00
|
|
|
|
|
|
|
if not a:
|
2014-07-21 19:06:55 +00:00
|
|
|
raise ParseException("Empty clause: %s" % str(patt))
|
2012-08-18 12:14:16 +00:00
|
|
|
|
|
|
|
if not filt.parse(patt):
|
2014-07-21 19:06:55 +00:00
|
|
|
raise ParseException("Malformed filter pattern: %s" % patt)
|
2012-08-18 12:14:16 +00:00
|
|
|
|
|
|
|
return patt, a, b
|
|
|
|
|
2012-03-17 04:20:34 +00:00
|
|
|
|
|
|
|
def parse_replace_hook(s):
|
|
|
|
"""
|
|
|
|
Returns a (pattern, regex, replacement) tuple.
|
|
|
|
|
|
|
|
The general form for a replacement hook is as follows:
|
|
|
|
|
|
|
|
/patt/regex/replacement
|
|
|
|
|
|
|
|
The first character specifies the separator. Example:
|
|
|
|
|
|
|
|
:~q:foo:bar
|
|
|
|
|
|
|
|
If only two clauses are specified, the pattern is set to match
|
|
|
|
universally (i.e. ".*"). Example:
|
|
|
|
|
|
|
|
/foo/bar/
|
|
|
|
|
|
|
|
Clauses are parsed from left to right. Extra separators are taken to be
|
|
|
|
part of the final clause. For instance, the replacement clause below is
|
|
|
|
"foo/bar/":
|
|
|
|
|
|
|
|
/one/two/foo/bar/
|
|
|
|
|
|
|
|
Checks that pattern and regex are both well-formed. Raises
|
2012-08-18 12:14:16 +00:00
|
|
|
ParseException on error.
|
2012-03-17 04:20:34 +00:00
|
|
|
"""
|
2012-08-18 12:14:16 +00:00
|
|
|
patt, regex, replacement = _parse_hook(s)
|
2012-03-17 04:20:34 +00:00
|
|
|
try:
|
|
|
|
re.compile(regex)
|
2015-05-30 00:03:28 +00:00
|
|
|
except re.error as e:
|
2016-06-20 19:38:14 +00:00
|
|
|
raise ParseException("Malformed replacement regex: %s" % str(e))
|
2012-08-18 12:14:16 +00:00
|
|
|
return patt, regex, replacement
|
2012-03-17 04:20:34 +00:00
|
|
|
|
|
|
|
|
2012-08-18 12:14:16 +00:00
|
|
|
def parse_setheader(s):
|
|
|
|
"""
|
|
|
|
Returns a (pattern, header, value) tuple.
|
|
|
|
|
|
|
|
The general form for a replacement hook is as follows:
|
|
|
|
|
|
|
|
/patt/header/value
|
|
|
|
|
|
|
|
The first character specifies the separator. Example:
|
|
|
|
|
|
|
|
:~q:foo:bar
|
|
|
|
|
|
|
|
If only two clauses are specified, the pattern is set to match
|
|
|
|
universally (i.e. ".*"). Example:
|
|
|
|
|
|
|
|
/foo/bar/
|
|
|
|
|
|
|
|
Clauses are parsed from left to right. Extra separators are taken to be
|
|
|
|
part of the final clause. For instance, the value clause below is
|
|
|
|
"foo/bar/":
|
|
|
|
|
|
|
|
/one/two/foo/bar/
|
|
|
|
|
|
|
|
Checks that pattern and regex are both well-formed. Raises
|
|
|
|
ParseException on error.
|
|
|
|
"""
|
|
|
|
return _parse_hook(s)
|
2011-03-12 01:30:12 +00:00
|
|
|
|
|
|
|
|
2016-06-01 02:06:57 +00:00
|
|
|
def parse_server_spec(spec):
|
2015-09-16 16:45:22 +00:00
|
|
|
try:
|
2016-06-01 02:06:57 +00:00
|
|
|
p = url.parse(spec)
|
2016-06-20 19:38:14 +00:00
|
|
|
if p[0] not in (b"http", b"https"):
|
2015-09-16 16:45:22 +00:00
|
|
|
raise ValueError()
|
|
|
|
except ValueError:
|
2014-11-15 04:51:21 +00:00
|
|
|
raise configargparse.ArgumentTypeError(
|
2016-06-01 02:06:57 +00:00
|
|
|
"Invalid server specification: %s" % spec
|
2014-11-15 03:29:38 +00:00
|
|
|
)
|
2015-09-16 16:45:22 +00:00
|
|
|
|
2016-06-01 02:06:57 +00:00
|
|
|
address = tcp.Address(p[1:3])
|
2015-08-27 23:51:13 +00:00
|
|
|
scheme = p[0].lower()
|
|
|
|
return config.ServerSpec(scheme, address)
|
2014-03-10 04:11:51 +00:00
|
|
|
|
|
|
|
|
2016-03-02 17:19:33 +00:00
|
|
|
def parse_upstream_auth(auth):
|
2016-03-04 16:12:03 +00:00
|
|
|
pattern = re.compile(".+:")
|
2016-03-02 17:19:33 +00:00
|
|
|
if pattern.search(auth) is None:
|
|
|
|
raise configargparse.ArgumentTypeError(
|
|
|
|
"Invalid upstream auth specification: %s" % auth
|
|
|
|
)
|
2016-06-20 19:38:14 +00:00
|
|
|
return b"Basic" + b" " + base64.b64encode(strutils.always_bytes(auth))
|
2016-03-02 17:19:33 +00:00
|
|
|
|
|
|
|
|
2016-07-18 02:19:39 +00:00
|
|
|
def get_common_options(args):
|
2011-03-20 04:31:54 +00:00
|
|
|
stickycookie, stickyauth = None, None
|
2016-07-18 02:19:39 +00:00
|
|
|
if args.stickycookie_filt:
|
|
|
|
stickycookie = args.stickycookie_filt
|
2011-03-20 04:31:54 +00:00
|
|
|
|
2016-07-18 02:19:39 +00:00
|
|
|
if args.stickyauth_filt:
|
|
|
|
stickyauth = args.stickyauth_filt
|
2011-03-20 04:31:54 +00:00
|
|
|
|
2016-07-18 02:19:39 +00:00
|
|
|
stream_large_bodies = args.stream_large_bodies
|
2016-05-31 07:32:08 +00:00
|
|
|
if stream_large_bodies:
|
|
|
|
stream_large_bodies = human.parse_size(stream_large_bodies)
|
2014-07-21 19:06:55 +00:00
|
|
|
|
2012-03-17 04:20:34 +00:00
|
|
|
reps = []
|
2016-07-18 02:19:39 +00:00
|
|
|
for i in args.replace:
|
2012-03-17 04:20:34 +00:00
|
|
|
try:
|
|
|
|
p = parse_replace_hook(i)
|
2015-05-30 00:03:28 +00:00
|
|
|
except ParseException as e:
|
2016-07-18 05:09:55 +00:00
|
|
|
raise exceptions.OptionsError(e)
|
2012-03-17 04:20:34 +00:00
|
|
|
reps.append(p)
|
2016-07-18 02:19:39 +00:00
|
|
|
for i in args.replace_file:
|
2012-03-17 04:20:34 +00:00
|
|
|
try:
|
|
|
|
patt, rex, path = parse_replace_hook(i)
|
2015-05-30 00:03:28 +00:00
|
|
|
except ParseException as e:
|
2016-07-18 05:09:55 +00:00
|
|
|
raise exceptions.OptionsError(e)
|
2012-03-17 04:20:34 +00:00
|
|
|
try:
|
2013-06-15 22:23:44 +00:00
|
|
|
v = open(path, "rb").read()
|
2015-05-30 00:03:28 +00:00
|
|
|
except IOError as e:
|
2016-07-18 05:09:55 +00:00
|
|
|
raise exceptions.OptionsError(
|
2014-11-15 03:29:38 +00:00
|
|
|
"Could not read replace file: %s" % path
|
|
|
|
)
|
2012-03-17 04:20:34 +00:00
|
|
|
reps.append((patt, rex, v))
|
|
|
|
|
2012-08-18 12:14:16 +00:00
|
|
|
setheaders = []
|
2016-07-18 02:19:39 +00:00
|
|
|
for i in args.setheader:
|
2012-08-18 12:14:16 +00:00
|
|
|
try:
|
|
|
|
p = parse_setheader(i)
|
2015-05-30 00:03:28 +00:00
|
|
|
except ParseException as e:
|
2016-07-18 05:09:55 +00:00
|
|
|
raise exceptions.OptionsError(e)
|
2012-08-18 12:14:16 +00:00
|
|
|
setheaders.append(p)
|
|
|
|
|
2016-07-18 02:19:39 +00:00
|
|
|
if args.outfile and args.outfile[0] == args.rfile:
|
|
|
|
if args.outfile[1] == "wb":
|
2016-07-18 05:09:55 +00:00
|
|
|
raise exceptions.OptionsError(
|
2016-05-21 22:25:57 +00:00
|
|
|
"Cannot use '{}' for both reading and writing flows. "
|
2016-07-18 02:19:39 +00:00
|
|
|
"Are you looking for --afile?".format(args.rfile)
|
2016-05-21 22:25:57 +00:00
|
|
|
)
|
|
|
|
else:
|
2016-07-18 05:09:55 +00:00
|
|
|
raise exceptions.OptionsError(
|
2016-05-21 22:25:57 +00:00
|
|
|
"Cannot use '{}' for both reading and appending flows. "
|
|
|
|
"That would trigger an infinite loop."
|
|
|
|
)
|
|
|
|
|
2016-07-18 04:02:54 +00:00
|
|
|
# Proxy config
|
|
|
|
certs = []
|
|
|
|
for i in args.certs:
|
|
|
|
parts = i.split("=", 1)
|
|
|
|
if len(parts) == 1:
|
|
|
|
parts = ["*", parts[0]]
|
|
|
|
certs.append(parts)
|
|
|
|
|
2016-07-18 04:58:53 +00:00
|
|
|
body_size_limit = args.body_size_limit
|
|
|
|
if body_size_limit:
|
2016-07-18 05:09:55 +00:00
|
|
|
try:
|
|
|
|
body_size_limit = human.parse_size(body_size_limit)
|
|
|
|
except ValueError, e:
|
|
|
|
raise exceptions.OptionsError(
|
|
|
|
"Invalid body size limit specification: %s" % body_size_limit
|
|
|
|
)
|
2016-07-18 04:58:53 +00:00
|
|
|
|
2011-03-12 01:30:12 +00:00
|
|
|
return dict(
|
2016-07-18 02:19:39 +00:00
|
|
|
app=args.app,
|
|
|
|
app_host=args.app_host,
|
|
|
|
app_port=args.app_port,
|
|
|
|
|
|
|
|
anticache=args.anticache,
|
|
|
|
anticomp=args.anticomp,
|
|
|
|
client_replay=args.client_replay,
|
|
|
|
kill=args.kill,
|
|
|
|
no_server=args.no_server,
|
|
|
|
refresh_server_playback=not args.norefresh,
|
|
|
|
rheaders=args.rheaders,
|
|
|
|
rfile=args.rfile,
|
2014-07-21 19:06:55 +00:00
|
|
|
replacements=reps,
|
|
|
|
setheaders=setheaders,
|
2016-07-18 02:19:39 +00:00
|
|
|
server_replay=args.server_replay,
|
|
|
|
scripts=args.scripts,
|
2014-07-21 19:06:55 +00:00
|
|
|
stickycookie=stickycookie,
|
|
|
|
stickyauth=stickyauth,
|
|
|
|
stream_large_bodies=stream_large_bodies,
|
2016-07-18 02:19:39 +00:00
|
|
|
showhost=args.showhost,
|
|
|
|
outfile=args.outfile,
|
|
|
|
verbosity=args.verbose,
|
|
|
|
nopop=args.nopop,
|
|
|
|
replay_ignore_content=args.replay_ignore_content,
|
|
|
|
replay_ignore_params=args.replay_ignore_params,
|
|
|
|
replay_ignore_payload_params=args.replay_ignore_payload_params,
|
|
|
|
replay_ignore_host=args.replay_ignore_host,
|
|
|
|
|
2016-07-18 04:58:53 +00:00
|
|
|
body_size_limit = body_size_limit,
|
2016-07-18 03:40:40 +00:00
|
|
|
cadir = args.cadir,
|
2016-07-18 04:02:54 +00:00
|
|
|
certs = certs,
|
2016-07-18 03:40:40 +00:00
|
|
|
clientcerts = args.clientcerts,
|
2016-07-18 04:02:54 +00:00
|
|
|
listen_host = args.addr,
|
|
|
|
listen_port = args.port,
|
2011-03-12 01:30:12 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
def basic_options(parser):
|
2014-11-15 04:58:38 +00:00
|
|
|
parser.add_argument(
|
|
|
|
'--version',
|
2015-08-27 23:51:13 +00:00
|
|
|
action='version',
|
|
|
|
version="%(prog)s" + " " + version.VERSION
|
2014-11-15 04:58:38 +00:00
|
|
|
)
|
2016-06-11 04:40:21 +00:00
|
|
|
parser.add_argument(
|
|
|
|
'--sysinfo',
|
|
|
|
action='store_true',
|
|
|
|
dest='sysinfo',
|
|
|
|
)
|
2014-12-28 02:07:44 +00:00
|
|
|
parser.add_argument(
|
|
|
|
'--shortversion',
|
2015-08-27 23:51:13 +00:00
|
|
|
action='version',
|
|
|
|
help="show program's short version number and exit",
|
|
|
|
version=version.VERSION
|
2014-12-28 02:07:44 +00:00
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2011-08-03 01:20:36 +00:00
|
|
|
"--anticache",
|
|
|
|
action="store_true", dest="anticache", default=False,
|
2014-11-15 03:14:08 +00:00
|
|
|
|
|
|
|
help="""
|
|
|
|
Strip out request headers that might cause the server to return
|
|
|
|
304-not-modified.
|
|
|
|
"""
|
2011-08-03 01:20:36 +00:00
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 03:14:08 +00:00
|
|
|
"--cadir",
|
2016-07-18 02:50:10 +00:00
|
|
|
action="store", type=str, dest="cadir", default=CA_DIR,
|
|
|
|
help="Location of the default mitmproxy CA files. (%s)" % CA_DIR
|
2011-08-03 01:20:36 +00:00
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-03-13 22:43:26 +00:00
|
|
|
"--host",
|
|
|
|
action="store_true", dest="showhost", default=False,
|
|
|
|
help="Use the Host header to construct URLs for display."
|
2014-03-10 04:11:51 +00:00
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-q", "--quiet",
|
2011-03-12 01:30:12 +00:00
|
|
|
action="store_true", dest="quiet",
|
|
|
|
help="Quiet."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-r", "--read-flows",
|
2011-05-14 23:54:12 +00:00
|
|
|
action="store", dest="rfile", default=None,
|
|
|
|
help="Read flows from file."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-s", "--script",
|
2014-01-12 10:01:59 +00:00
|
|
|
action="append", type=str, dest="scripts", default=[],
|
2013-06-13 14:04:04 +00:00
|
|
|
metavar='"script.py --bar"',
|
2014-11-15 03:14:08 +00:00
|
|
|
help="""
|
|
|
|
Run a script. Surround with quotes to pass script arguments. Can be
|
|
|
|
passed multiple times.
|
|
|
|
"""
|
2011-03-12 01:30:12 +00:00
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-t", "--stickycookie",
|
2014-11-15 03:14:08 +00:00
|
|
|
action="store",
|
|
|
|
dest="stickycookie_filt",
|
|
|
|
default=None,
|
|
|
|
metavar="FILTER",
|
2011-03-12 01:30:12 +00:00
|
|
|
help="Set sticky cookie filter. Matched against requests."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-u", "--stickyauth",
|
2011-03-20 04:31:54 +00:00
|
|
|
action="store", dest="stickyauth_filt", default=None, metavar="FILTER",
|
|
|
|
help="Set sticky auth filter. Matched against requests."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-v", "--verbose",
|
2016-07-15 21:23:52 +00:00
|
|
|
action="store_const", dest="verbose", default=2, const=3,
|
2016-07-15 22:00:34 +00:00
|
|
|
help="Increase log verbosity."
|
2011-03-12 01:30:12 +00:00
|
|
|
)
|
2014-12-11 18:21:33 +00:00
|
|
|
outfile = parser.add_mutually_exclusive_group()
|
|
|
|
outfile.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-w", "--wfile",
|
2014-12-11 18:21:33 +00:00
|
|
|
action="store", dest="outfile", type=lambda f: (f, "wb"),
|
2011-03-12 01:30:12 +00:00
|
|
|
help="Write flows to file."
|
|
|
|
)
|
2014-12-11 18:21:33 +00:00
|
|
|
outfile.add_argument(
|
|
|
|
"-a", "--afile",
|
|
|
|
action="store", dest="outfile", type=lambda f: (f, "ab"),
|
|
|
|
help="Append flows to file."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-z", "--anticomp",
|
2011-07-17 02:36:38 +00:00
|
|
|
action="store_true", dest="anticomp", default=False,
|
2011-07-15 03:21:04 +00:00
|
|
|
help="Try to convince servers to send us un-compressed data."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-Z", "--body-size-limit",
|
2011-09-09 05:31:36 +00:00
|
|
|
action="store", dest="body_size_limit", default=None,
|
|
|
|
metavar="SIZE",
|
2014-11-15 03:14:08 +00:00
|
|
|
help="Byte size limit of HTTP request and response bodies."
|
2011-09-09 05:31:36 +00:00
|
|
|
" Understands k/m/g suffixes, i.e. 3m for 3 megabytes."
|
|
|
|
)
|
2014-07-21 19:06:55 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--stream",
|
|
|
|
action="store", dest="stream_large_bodies", default=None,
|
|
|
|
metavar="SIZE",
|
Fix crash while streaming
Found using fuzzing. Reproduction with pathoc, given "mitmproxy -s" and
pathod running on 9999:
get:'http://localhost:9999/p/':s'200:b\'foo\':h\'Content-Length\'=\'3\'':i58,'\x1a':r
return flow.FlowMaster.run(self)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 111, in run
self.tick(self.masterq, 0.01)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 613, in tick
return controller.Master.tick(self, q, timeout)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 101, in tick
self.handle(*msg)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 118, in handle
m(obj)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 738, in handle_responseheaders
self.stream_large_bodies.run(f, False)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 155, in run
r.headers, is_request, flow.request.method, code
File "/Users/aldo/mitmproxy/mitmproxy/netlib/http.py", line 401, in expected_http_body_size
raise HttpError(400 if is_request else 502, "Invalid content-length header: %s" % headers["content-length"])
netlib.http.HttpError: Invalid content-length header: ['\x1a3']
2014-10-26 04:58:36 +00:00
|
|
|
help="""
|
2014-11-15 03:14:08 +00:00
|
|
|
Stream data to the client if response body exceeds the given
|
|
|
|
threshold. If streamed, the body will not be stored in any way.
|
|
|
|
Understands k/m/g suffixes, i.e. 3m for 3 megabytes.
|
Fix crash while streaming
Found using fuzzing. Reproduction with pathoc, given "mitmproxy -s" and
pathod running on 9999:
get:'http://localhost:9999/p/':s'200:b\'foo\':h\'Content-Length\'=\'3\'':i58,'\x1a':r
return flow.FlowMaster.run(self)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 111, in run
self.tick(self.masterq, 0.01)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 613, in tick
return controller.Master.tick(self, q, timeout)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 101, in tick
self.handle(*msg)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 118, in handle
m(obj)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 738, in handle_responseheaders
self.stream_large_bodies.run(f, False)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 155, in run
r.headers, is_request, flow.request.method, code
File "/Users/aldo/mitmproxy/mitmproxy/netlib/http.py", line 401, in expected_http_body_size
raise HttpError(400 if is_request else 502, "Invalid content-length header: %s" % headers["content-length"])
netlib.http.HttpError: Invalid content-length header: ['\x1a3']
2014-10-26 04:58:36 +00:00
|
|
|
"""
|
2014-07-21 19:06:55 +00:00
|
|
|
)
|
2014-03-13 22:43:26 +00:00
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
def proxy_modes(parser):
|
2016-06-29 02:26:08 +00:00
|
|
|
group = parser.add_argument_group("Proxy Modes")
|
2015-08-27 23:51:13 +00:00
|
|
|
group.add_argument(
|
|
|
|
"-R", "--reverse",
|
|
|
|
action="store",
|
2015-08-30 00:27:38 +00:00
|
|
|
type=parse_server_spec,
|
2015-08-27 23:51:13 +00:00
|
|
|
dest="reverse_proxy",
|
|
|
|
default=None,
|
|
|
|
help="""
|
|
|
|
Forward all requests to upstream HTTP server:
|
2016-04-22 00:56:18 +00:00
|
|
|
http[s]://host[:port]. Clients can always connect both
|
|
|
|
via HTTPS and HTTP, the connection to the server is
|
|
|
|
determined by the specified scheme.
|
2015-08-27 23:51:13 +00:00
|
|
|
"""
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--socks",
|
|
|
|
action="store_true", dest="socks_proxy", default=False,
|
|
|
|
help="Set SOCKS5 proxy mode."
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-T", "--transparent",
|
|
|
|
action="store_true", dest="transparent_proxy", default=False,
|
|
|
|
help="Set transparent proxy mode."
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-U", "--upstream",
|
|
|
|
action="store",
|
|
|
|
type=parse_server_spec,
|
|
|
|
dest="upstream_proxy",
|
|
|
|
default=None,
|
|
|
|
help="Forward all requests to upstream proxy server: http://host[:port]"
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
def proxy_options(parser):
|
2014-03-13 22:43:26 +00:00
|
|
|
group = parser.add_argument_group("Proxy Options")
|
|
|
|
group.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-b", "--bind-address",
|
2014-07-21 19:06:55 +00:00
|
|
|
action="store", type=str, dest="addr", default='',
|
|
|
|
help="Address to bind proxy to (defaults to all interfaces)"
|
2014-03-13 22:43:26 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
2014-08-09 01:03:21 +00:00
|
|
|
"-I", "--ignore",
|
2014-10-18 16:29:35 +00:00
|
|
|
action="append", type=str, dest="ignore_hosts", default=[],
|
2014-08-09 01:03:21 +00:00
|
|
|
metavar="HOST",
|
Fix crash while streaming
Found using fuzzing. Reproduction with pathoc, given "mitmproxy -s" and
pathod running on 9999:
get:'http://localhost:9999/p/':s'200:b\'foo\':h\'Content-Length\'=\'3\'':i58,'\x1a':r
return flow.FlowMaster.run(self)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 111, in run
self.tick(self.masterq, 0.01)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 613, in tick
return controller.Master.tick(self, q, timeout)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 101, in tick
self.handle(*msg)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/controller.py", line 118, in handle
m(obj)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 738, in handle_responseheaders
self.stream_large_bodies.run(f, False)
File "/Users/aldo/mitmproxy/mitmproxy/libmproxy/flow.py", line 155, in run
r.headers, is_request, flow.request.method, code
File "/Users/aldo/mitmproxy/mitmproxy/netlib/http.py", line 401, in expected_http_body_size
raise HttpError(400 if is_request else 502, "Invalid content-length header: %s" % headers["content-length"])
netlib.http.HttpError: Invalid content-length header: ['\x1a3']
2014-10-26 04:58:36 +00:00
|
|
|
help="""
|
|
|
|
Ignore host and forward all traffic without processing it. In
|
|
|
|
transparent mode, it is recommended to use an IP address (range),
|
|
|
|
not the hostname. In regular mode, only SSL traffic is ignored and
|
|
|
|
the hostname should be used. The supplied value is interpreted as a
|
|
|
|
regular expression and matched on the ip or the hostname. Can be
|
|
|
|
passed multiple times.
|
|
|
|
"""
|
2014-03-13 22:43:26 +00:00
|
|
|
)
|
2014-10-18 16:29:35 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--tcp",
|
|
|
|
action="append", type=str, dest="tcp_hosts", default=[],
|
|
|
|
metavar="HOST",
|
2014-11-15 03:14:08 +00:00
|
|
|
help="""
|
|
|
|
Generic TCP SSL proxy mode for all hosts that match the pattern.
|
|
|
|
Similar to --ignore, but SSL connections are intercepted. The
|
2016-07-15 22:00:34 +00:00
|
|
|
communication contents are printed to the log in verbose mode.
|
2014-11-15 03:14:08 +00:00
|
|
|
"""
|
2014-10-18 16:29:35 +00:00
|
|
|
)
|
2014-03-13 22:43:26 +00:00
|
|
|
group.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-n", "--no-server",
|
2014-03-13 22:43:26 +00:00
|
|
|
action="store_true", dest="no_server",
|
|
|
|
help="Don't start a proxy server."
|
|
|
|
)
|
|
|
|
group.add_argument(
|
2014-11-15 04:25:05 +00:00
|
|
|
"-p", "--port",
|
2014-07-21 19:06:55 +00:00
|
|
|
action="store", type=int, dest="port", default=8080,
|
|
|
|
help="Proxy service port."
|
2014-03-13 22:43:26 +00:00
|
|
|
)
|
2016-02-17 22:46:44 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--no-http2",
|
|
|
|
action="store_false", dest="http2",
|
|
|
|
help="""
|
|
|
|
Explicitly disable HTTP/2 support.
|
|
|
|
If your OpenSSL version supports ALPN, HTTP/2 is enabled by default.
|
|
|
|
"""
|
|
|
|
)
|
2016-03-01 09:40:32 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--upstream-auth",
|
|
|
|
action="store", dest="upstream_auth", default=None,
|
2016-03-02 17:19:33 +00:00
|
|
|
type=parse_upstream_auth,
|
2016-03-01 09:40:32 +00:00
|
|
|
help="""
|
|
|
|
Proxy Authentication:
|
|
|
|
username:password
|
|
|
|
"""
|
|
|
|
)
|
2015-09-10 22:00:00 +00:00
|
|
|
rawtcp = group.add_mutually_exclusive_group()
|
|
|
|
rawtcp.add_argument("--raw-tcp", action="store_true", dest="rawtcp")
|
|
|
|
rawtcp.add_argument("--no-raw-tcp", action="store_false", dest="rawtcp",
|
2016-01-27 09:12:18 +00:00
|
|
|
help="Explicitly enable/disable experimental raw tcp support. "
|
|
|
|
"Disabled by default. "
|
|
|
|
"Default value will change in a future version."
|
|
|
|
)
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
|
|
|
|
def proxy_ssl_options(parser):
|
|
|
|
# TODO: Agree to consistently either use "upstream" or "server".
|
|
|
|
group = parser.add_argument_group("SSL")
|
2014-03-13 22:43:26 +00:00
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--cert",
|
|
|
|
dest='certs',
|
|
|
|
default=[],
|
|
|
|
type=str,
|
|
|
|
metavar="SPEC",
|
|
|
|
action="append",
|
|
|
|
help='Add an SSL certificate. SPEC is of the form "[domain=]path". '
|
|
|
|
'The domain may include a wildcard, and is equal to "*" if not specified. '
|
|
|
|
'The file at path is a certificate in PEM format. If a private key is included '
|
|
|
|
'in the PEM, it is used, else the default key in the conf dir is used. '
|
|
|
|
'The PEM file should contain the full certificate chain, with the leaf certificate '
|
|
|
|
'as the first entry. Can be passed multiple times.')
|
2014-10-08 23:58:54 +00:00
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--ciphers-client", action="store",
|
|
|
|
type=str, dest="ciphers_client", default=config.DEFAULT_CLIENT_CIPHERS,
|
|
|
|
help="Set supported ciphers for client connections. (OpenSSL Syntax)"
|
2014-10-08 23:58:54 +00:00
|
|
|
)
|
2014-03-13 22:43:26 +00:00
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--ciphers-server", action="store",
|
|
|
|
type=str, dest="ciphers_server", default=None,
|
|
|
|
help="Set supported ciphers for server connections. (OpenSSL Syntax)"
|
2013-03-17 04:31:35 +00:00
|
|
|
)
|
2014-08-09 01:03:21 +00:00
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--client-certs", action="store",
|
|
|
|
type=str, dest="clientcerts", default=None,
|
2015-12-28 20:20:45 +00:00
|
|
|
help="Client certificate file or directory."
|
2014-08-09 01:03:21 +00:00
|
|
|
)
|
2015-06-20 12:43:50 +00:00
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--no-upstream-cert", default=False,
|
|
|
|
action="store_true", dest="no_upstream_cert",
|
|
|
|
help="Don't connect to upstream server to look up certificate details."
|
2015-06-20 15:51:56 +00:00
|
|
|
)
|
2016-03-16 22:45:27 +00:00
|
|
|
group.add_argument(
|
2016-03-16 19:20:18 +00:00
|
|
|
"--add-upstream-certs-to-client-chain", default=False,
|
|
|
|
action="store_true", dest="add_upstream_certs_to_client_chain",
|
|
|
|
help="Add all certificates of the upstream server to the certificate chain "
|
|
|
|
"that will be served to the proxy client, as extras."
|
2016-03-02 15:23:33 +00:00
|
|
|
)
|
2016-03-16 22:45:27 +00:00
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--verify-upstream-cert", default=False,
|
|
|
|
action="store_true", dest="ssl_verify_upstream_cert",
|
|
|
|
help="Verify upstream server SSL/TLS certificates and fail if invalid "
|
|
|
|
"or not present."
|
2015-06-20 15:51:56 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--upstream-trusted-cadir", default=None, action="store",
|
|
|
|
dest="ssl_verify_upstream_trusted_cadir",
|
|
|
|
help="Path to a directory of trusted CA certificates for upstream "
|
|
|
|
"server verification prepared using the c_rehash tool."
|
2015-06-20 12:43:50 +00:00
|
|
|
)
|
2015-08-27 23:51:13 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--upstream-trusted-ca", default=None, action="store",
|
|
|
|
dest="ssl_verify_upstream_trusted_ca",
|
|
|
|
help="Path to a PEM formatted trusted CA certificate."
|
2014-03-13 22:43:26 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--ssl-version-client", dest="ssl_version_client",
|
|
|
|
default="secure", action="store",
|
2016-06-01 02:06:57 +00:00
|
|
|
choices=tcp.sslversion_choices.keys(),
|
2015-08-29 10:34:01 +00:00
|
|
|
help="Set supported SSL/TLS versions for client connections. "
|
2015-08-27 23:51:13 +00:00
|
|
|
"SSLv2, SSLv3 and 'all' are INSECURE. Defaults to secure, which is TLS1.0+."
|
2014-03-13 22:43:26 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
2015-08-27 23:51:13 +00:00
|
|
|
"--ssl-version-server", dest="ssl_version_server",
|
|
|
|
default="secure", action="store",
|
2016-06-01 02:06:57 +00:00
|
|
|
choices=tcp.sslversion_choices.keys(),
|
2015-08-29 10:34:01 +00:00
|
|
|
help="Set supported SSL/TLS versions for server connections. "
|
2015-08-27 23:51:13 +00:00
|
|
|
"SSLv2, SSLv3 and 'all' are INSECURE. Defaults to secure, which is TLS1.0+."
|
2012-02-27 02:05:45 +00:00
|
|
|
)
|
2014-03-13 22:43:26 +00:00
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
def onboarding_app(parser):
|
2014-09-14 00:22:28 +00:00
|
|
|
group = parser.add_argument_group("Onboarding App")
|
2013-03-24 20:20:26 +00:00
|
|
|
group.add_argument(
|
2014-12-11 18:21:33 +00:00
|
|
|
"--noapp",
|
2014-01-27 01:37:29 +00:00
|
|
|
action="store_false", dest="app", default=True,
|
2014-09-14 00:22:28 +00:00
|
|
|
help="Disable the mitmproxy onboarding app."
|
2013-03-24 20:20:26 +00:00
|
|
|
)
|
2013-07-23 22:32:56 +00:00
|
|
|
group.add_argument(
|
2013-08-18 18:03:53 +00:00
|
|
|
"--app-host",
|
|
|
|
action="store", dest="app_host", default=APP_HOST, metavar="host",
|
2014-11-15 03:14:08 +00:00
|
|
|
help="""
|
|
|
|
Domain to serve the onboarding app from. For transparent mode, use
|
|
|
|
an IP when a DNS entry for the app domain is not present. Default:
|
|
|
|
%s
|
|
|
|
""" % APP_HOST
|
2013-07-23 22:32:56 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
2013-08-18 18:03:53 +00:00
|
|
|
"--app-port",
|
2014-11-15 03:14:08 +00:00
|
|
|
action="store",
|
|
|
|
dest="app_port",
|
|
|
|
default=APP_PORT,
|
|
|
|
type=int,
|
|
|
|
metavar="80",
|
2014-09-14 00:22:28 +00:00
|
|
|
help="Port to serve the onboarding app from."
|
2013-08-18 18:03:53 +00:00
|
|
|
)
|
2013-03-24 20:20:26 +00:00
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
def client_replay(parser):
|
2012-08-17 17:04:39 +00:00
|
|
|
group = parser.add_argument_group("Client Replay")
|
|
|
|
group.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-c", "--client-replay",
|
2015-01-05 21:12:38 +00:00
|
|
|
action="append", dest="client_replay", default=None, metavar="PATH",
|
2011-03-12 01:30:12 +00:00
|
|
|
help="Replay client requests from a saved file."
|
|
|
|
)
|
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
def server_replay(parser):
|
2012-08-17 17:04:39 +00:00
|
|
|
group = parser.add_argument_group("Server Replay")
|
|
|
|
group.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-S", "--server-replay",
|
2015-01-05 21:12:38 +00:00
|
|
|
action="append", dest="server_replay", default=None, metavar="PATH",
|
2011-03-12 01:30:12 +00:00
|
|
|
help="Replay server responses from a saved file."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
group.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-k", "--kill",
|
2011-03-12 01:30:12 +00:00
|
|
|
action="store_true", dest="kill", default=False,
|
|
|
|
help="Kill extra requests during replay."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
group.add_argument(
|
2011-03-12 01:30:12 +00:00
|
|
|
"--rheader",
|
2012-08-17 17:04:39 +00:00
|
|
|
action="append", dest="rheaders", type=str,
|
2011-03-12 01:30:12 +00:00
|
|
|
help="Request headers to be considered during replay. "
|
2014-07-21 19:06:55 +00:00
|
|
|
"Can be passed multiple times."
|
2011-03-12 01:30:12 +00:00
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
group.add_argument(
|
2011-03-12 01:30:12 +00:00
|
|
|
"--norefresh",
|
|
|
|
action="store_true", dest="norefresh", default=False,
|
2014-11-15 03:14:08 +00:00
|
|
|
help="""
|
|
|
|
Disable response refresh, which updates times in cookies and headers
|
|
|
|
for replayed responses.
|
|
|
|
"""
|
2011-03-12 01:30:12 +00:00
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
group.add_argument(
|
2012-03-05 09:05:11 +00:00
|
|
|
"--no-pop",
|
|
|
|
action="store_true", dest="nopop", default=False,
|
2012-03-05 09:56:03 +00:00
|
|
|
help="Disable response pop from response flow. "
|
2014-07-21 19:06:55 +00:00
|
|
|
"This makes it possible to replay same response multiple times."
|
2012-03-05 09:05:11 +00:00
|
|
|
)
|
2014-12-18 20:56:27 +00:00
|
|
|
payload = group.add_mutually_exclusive_group()
|
|
|
|
payload.add_argument(
|
2014-10-03 10:29:44 +00:00
|
|
|
"--replay-ignore-content",
|
|
|
|
action="store_true", dest="replay_ignore_content", default=False,
|
2014-11-15 03:14:08 +00:00
|
|
|
help="""
|
|
|
|
Ignore request's content while searching for a saved flow to replay
|
|
|
|
"""
|
2014-10-03 10:29:44 +00:00
|
|
|
)
|
2014-12-18 20:56:27 +00:00
|
|
|
payload.add_argument(
|
|
|
|
"--replay-ignore-payload-param",
|
|
|
|
action="append", dest="replay_ignore_payload_params", type=str,
|
|
|
|
help="""
|
2015-03-27 14:30:19 +00:00
|
|
|
Request's payload parameters (application/x-www-form-urlencoded or multipart/form-data) to
|
2014-12-28 02:07:44 +00:00
|
|
|
be ignored while searching for a saved flow to replay.
|
|
|
|
Can be passed multiple times.
|
2014-12-18 20:56:27 +00:00
|
|
|
"""
|
|
|
|
)
|
|
|
|
|
2014-10-03 10:29:44 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--replay-ignore-param",
|
|
|
|
action="append", dest="replay_ignore_params", type=str,
|
2014-11-15 03:14:08 +00:00
|
|
|
help="""
|
|
|
|
Request's parameters to be ignored while searching for a saved flow
|
|
|
|
to replay. Can be passed multiple times.
|
|
|
|
"""
|
2014-10-08 23:58:54 +00:00
|
|
|
)
|
2015-03-07 16:38:18 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--replay-ignore-host",
|
2015-05-30 00:03:28 +00:00
|
|
|
action="store_true",
|
|
|
|
dest="replay_ignore_host",
|
|
|
|
default=False,
|
|
|
|
help="Ignore request's destination host while searching for a saved flow to replay")
|
2012-03-17 04:20:34 +00:00
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
def replacements(parser):
|
2012-08-17 17:04:39 +00:00
|
|
|
group = parser.add_argument_group(
|
2012-03-17 04:20:34 +00:00
|
|
|
"Replacements",
|
|
|
|
"""
|
|
|
|
Replacements are of the form "/pattern/regex/replacement", where
|
|
|
|
the separator can be any character. Please see the documentation
|
|
|
|
for more information.
|
|
|
|
""".strip()
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
group.add_argument(
|
2012-03-17 04:20:34 +00:00
|
|
|
"--replace",
|
2012-08-17 17:04:39 +00:00
|
|
|
action="append", type=str, dest="replace", default=[],
|
2012-03-17 04:20:34 +00:00
|
|
|
metavar="PATTERN",
|
|
|
|
help="Replacement pattern."
|
|
|
|
)
|
2012-08-17 17:04:39 +00:00
|
|
|
group.add_argument(
|
2012-03-17 04:20:34 +00:00
|
|
|
"--replace-from-file",
|
2015-08-27 23:51:13 +00:00
|
|
|
action="append", type=str, dest="replace_file", default=[],
|
|
|
|
metavar="PATH",
|
|
|
|
help="""
|
2014-11-15 03:14:08 +00:00
|
|
|
Replacement pattern, where the replacement clause is a path to a
|
|
|
|
file.
|
|
|
|
"""
|
2012-03-17 04:20:34 +00:00
|
|
|
)
|
2011-03-12 01:30:12 +00:00
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
def set_headers(parser):
|
2012-08-18 12:14:16 +00:00
|
|
|
group = parser.add_argument_group(
|
|
|
|
"Set Headers",
|
|
|
|
"""
|
|
|
|
Header specifications are of the form "/pattern/header/value",
|
|
|
|
where the separator can be any character. Please see the
|
|
|
|
documentation for more information.
|
|
|
|
""".strip()
|
|
|
|
)
|
2012-08-17 17:13:56 +00:00
|
|
|
group.add_argument(
|
2012-08-18 12:14:16 +00:00
|
|
|
"--setheader",
|
|
|
|
action="append", type=str, dest="setheader", default=[],
|
|
|
|
metavar="PATTERN",
|
|
|
|
help="Header set pattern."
|
2012-08-06 21:09:35 +00:00
|
|
|
)
|
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
def proxy_authentication(parser):
|
2012-12-30 09:41:58 +00:00
|
|
|
group = parser.add_argument_group(
|
|
|
|
"Proxy Authentication",
|
|
|
|
"""
|
2013-01-02 04:35:44 +00:00
|
|
|
Specify which users are allowed to access the proxy and the method
|
2014-09-06 10:23:05 +00:00
|
|
|
used for authenticating them.
|
2013-01-02 04:35:44 +00:00
|
|
|
"""
|
2015-08-27 23:51:13 +00:00
|
|
|
).add_mutually_exclusive_group()
|
|
|
|
group.add_argument(
|
2012-12-30 09:41:58 +00:00
|
|
|
"--nonanonymous",
|
|
|
|
action="store_true", dest="auth_nonanonymous",
|
2013-01-02 04:35:44 +00:00
|
|
|
help="Allow access to any user long as a credentials are specified."
|
2012-12-30 09:41:58 +00:00
|
|
|
)
|
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
group.add_argument(
|
2012-12-30 09:41:58 +00:00
|
|
|
"--singleuser",
|
|
|
|
action="store", dest="auth_singleuser", type=str,
|
2013-01-02 04:35:44 +00:00
|
|
|
metavar="USER",
|
2014-11-15 03:14:08 +00:00
|
|
|
help="""
|
|
|
|
Allows access to a a single user, specified in the form
|
|
|
|
username:password.
|
|
|
|
"""
|
2012-12-30 09:41:58 +00:00
|
|
|
)
|
2015-08-27 23:51:13 +00:00
|
|
|
group.add_argument(
|
2012-12-30 09:41:58 +00:00
|
|
|
"--htpasswd",
|
2014-08-17 21:06:25 +00:00
|
|
|
action="store", dest="auth_htpasswd", type=str,
|
2013-01-02 04:35:44 +00:00
|
|
|
metavar="PATH",
|
2012-12-30 09:41:58 +00:00
|
|
|
help="Allow access to users specified in an Apache htpasswd file."
|
|
|
|
)
|
|
|
|
|
2015-08-27 23:51:13 +00:00
|
|
|
|
|
|
|
def common_options(parser):
|
|
|
|
basic_options(parser)
|
|
|
|
proxy_modes(parser)
|
|
|
|
proxy_options(parser)
|
|
|
|
proxy_ssl_options(parser)
|
|
|
|
onboarding_app(parser)
|
|
|
|
client_replay(parser)
|
|
|
|
server_replay(parser)
|
|
|
|
replacements(parser)
|
|
|
|
set_headers(parser)
|
|
|
|
proxy_authentication(parser)
|
2014-11-15 03:29:38 +00:00
|
|
|
|
|
|
|
|
|
|
|
def mitmproxy():
|
2016-02-16 19:49:10 +00:00
|
|
|
# Don't import mitmproxy.console for mitmdump, urwid is not available on all
|
2014-11-15 03:29:38 +00:00
|
|
|
# platforms.
|
|
|
|
from .console import palettes
|
|
|
|
|
2014-11-15 04:25:05 +00:00
|
|
|
parser = configargparse.ArgumentParser(
|
|
|
|
usage="%(prog)s [options]",
|
2015-08-27 23:51:13 +00:00
|
|
|
args_for_setting_config_path=["--conf"],
|
|
|
|
default_config_files=[
|
2016-07-18 02:50:10 +00:00
|
|
|
os.path.join(CA_DIR, "common.conf"),
|
|
|
|
os.path.join(CA_DIR, "mitmproxy.conf")
|
2014-11-15 04:25:05 +00:00
|
|
|
],
|
2015-08-27 23:51:13 +00:00
|
|
|
add_config_file_help=True,
|
|
|
|
add_env_var_help=True
|
2014-11-15 04:25:05 +00:00
|
|
|
)
|
2014-11-15 03:29:38 +00:00
|
|
|
common_options(parser)
|
|
|
|
parser.add_argument(
|
2015-04-06 20:42:40 +00:00
|
|
|
"--palette", type=str, default=palettes.DEFAULT,
|
2014-11-15 03:29:38 +00:00
|
|
|
action="store", dest="palette",
|
2015-03-12 11:56:47 +00:00
|
|
|
choices=sorted(palettes.palettes.keys()),
|
2014-11-15 03:29:38 +00:00
|
|
|
help="Select color palette: " + ", ".join(palettes.palettes.keys())
|
|
|
|
)
|
2015-04-06 22:01:18 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--palette-transparent",
|
|
|
|
action="store_true", dest="palette_transparent", default=False,
|
|
|
|
help="Set transparent background for palette."
|
|
|
|
)
|
2014-11-15 03:29:38 +00:00
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-e", "--eventlog",
|
2014-11-15 03:29:38 +00:00
|
|
|
action="store_true", dest="eventlog",
|
|
|
|
help="Show event log."
|
|
|
|
)
|
2016-01-22 21:11:03 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-f", "--follow",
|
|
|
|
action="store_true", dest="follow",
|
|
|
|
help="Follow flow list."
|
|
|
|
)
|
2015-08-19 20:07:39 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--no-mouse",
|
|
|
|
action="store_true", dest="no_mouse",
|
|
|
|
help="Disable mouse interaction."
|
|
|
|
)
|
2014-11-15 03:29:38 +00:00
|
|
|
group = parser.add_argument_group(
|
|
|
|
"Filters",
|
|
|
|
"See help in mitmproxy for filter expression syntax."
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-i", "--intercept", action="store",
|
|
|
|
type=str, dest="intercept", default=None,
|
|
|
|
help="Intercept filter expression."
|
|
|
|
)
|
2015-04-15 00:56:43 +00:00
|
|
|
group.add_argument(
|
|
|
|
"-l", "--limit", action="store",
|
|
|
|
type=str, dest="limit", default=None,
|
|
|
|
help="Limit filter expression."
|
|
|
|
)
|
2014-11-15 03:29:38 +00:00
|
|
|
return parser
|
|
|
|
|
|
|
|
|
|
|
|
def mitmdump():
|
2014-11-15 04:25:05 +00:00
|
|
|
parser = configargparse.ArgumentParser(
|
|
|
|
usage="%(prog)s [options] [filter]",
|
2015-08-27 23:51:13 +00:00
|
|
|
args_for_setting_config_path=["--conf"],
|
|
|
|
default_config_files=[
|
2016-07-18 02:50:10 +00:00
|
|
|
os.path.join(CA_DIR, "common.conf"),
|
|
|
|
os.path.join(CA_DIR, "mitmdump.conf")
|
2014-11-15 04:25:05 +00:00
|
|
|
],
|
2015-08-27 23:51:13 +00:00
|
|
|
add_config_file_help=True,
|
|
|
|
add_env_var_help=True
|
2014-11-15 04:25:05 +00:00
|
|
|
)
|
2014-11-15 03:29:38 +00:00
|
|
|
|
|
|
|
common_options(parser)
|
|
|
|
parser.add_argument(
|
|
|
|
"--keepserving",
|
2015-08-27 23:51:13 +00:00
|
|
|
action="store_true", dest="keepserving", default=False,
|
|
|
|
help="""
|
2014-11-15 03:29:38 +00:00
|
|
|
Continue serving after client playback or file read. We exit by
|
|
|
|
default.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
2014-11-15 04:41:04 +00:00
|
|
|
"-d", "--detail",
|
2014-11-15 03:29:38 +00:00
|
|
|
action="count", dest="flow_detail", default=1,
|
|
|
|
help="Increase flow detail display level. Can be passed multiple times."
|
|
|
|
)
|
2014-11-15 04:51:21 +00:00
|
|
|
parser.add_argument('args', nargs="...")
|
2014-11-15 03:29:38 +00:00
|
|
|
return parser
|
|
|
|
|
|
|
|
|
|
|
|
def mitmweb():
|
2014-11-15 04:25:05 +00:00
|
|
|
parser = configargparse.ArgumentParser(
|
|
|
|
usage="%(prog)s [options]",
|
2015-08-27 23:51:13 +00:00
|
|
|
args_for_setting_config_path=["--conf"],
|
|
|
|
default_config_files=[
|
2016-07-18 02:50:10 +00:00
|
|
|
os.path.join(CA_DIR, "common.conf"),
|
|
|
|
os.path.join(CA_DIR, "mitmweb.conf")
|
2014-11-15 04:25:05 +00:00
|
|
|
],
|
2015-08-27 23:51:13 +00:00
|
|
|
add_config_file_help=True,
|
|
|
|
add_env_var_help=True
|
2014-11-15 04:25:05 +00:00
|
|
|
)
|
2014-11-15 03:29:38 +00:00
|
|
|
|
|
|
|
group = parser.add_argument_group("Mitmweb")
|
|
|
|
group.add_argument(
|
|
|
|
"--wport",
|
|
|
|
action="store", type=int, dest="wport", default=8081,
|
|
|
|
metavar="PORT",
|
|
|
|
help="Mitmweb port."
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--wiface",
|
|
|
|
action="store", dest="wiface", default="127.0.0.1",
|
|
|
|
metavar="IFACE",
|
|
|
|
help="Mitmweb interface."
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--wdebug",
|
|
|
|
action="store_true", dest="wdebug",
|
|
|
|
help="Turn on mitmweb debugging"
|
|
|
|
)
|
2016-02-10 23:14:38 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--wsingleuser",
|
|
|
|
action="store", dest="wsingleuser", type=str,
|
|
|
|
metavar="USER",
|
|
|
|
help="""
|
|
|
|
Allows access to a a single user, specified in the form
|
|
|
|
username:password.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--whtpasswd",
|
|
|
|
action="store", dest="whtpasswd", type=str,
|
|
|
|
metavar="PATH",
|
|
|
|
help="Allow access to users specified in an Apache htpasswd file."
|
|
|
|
)
|
2014-11-15 03:29:38 +00:00
|
|
|
|
|
|
|
common_options(parser)
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
"Filters",
|
|
|
|
"See help in mitmproxy for filter expression syntax."
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-i", "--intercept", action="store",
|
|
|
|
type=str, dest="intercept", default=None,
|
|
|
|
help="Intercept filter expression."
|
|
|
|
)
|
|
|
|
return parser
|