2012-04-28 00:42:03 +00:00
|
|
|
#!/usr/bin/env python
|
2014-10-24 04:12:54 +00:00
|
|
|
import argparse
|
|
|
|
import os
|
2014-10-24 19:18:39 +00:00
|
|
|
import os.path
|
|
|
|
import sys
|
2014-10-25 02:30:54 +00:00
|
|
|
import re
|
2014-10-24 04:12:54 +00:00
|
|
|
from netlib import http_uastrings
|
2015-04-19 20:56:47 +00:00
|
|
|
from . import pathoc, pathod, version, utils, language
|
2012-04-28 00:42:03 +00:00
|
|
|
|
2012-08-23 00:00:16 +00:00
|
|
|
|
2015-04-17 05:45:50 +00:00
|
|
|
def args_pathoc(argv, stdout=sys.stdout, stderr=sys.stderr):
|
2014-08-31 00:09:04 +00:00
|
|
|
preparser = argparse.ArgumentParser(add_help=False)
|
|
|
|
preparser.add_argument(
|
|
|
|
"--show-uas", dest="showua", action="store_true", default=False,
|
|
|
|
help="Print user agent shortcuts and exit."
|
|
|
|
)
|
2015-04-17 05:45:50 +00:00
|
|
|
pa = preparser.parse_known_args(argv)[0]
|
2014-08-31 00:09:04 +00:00
|
|
|
if pa.showua:
|
2015-04-17 05:45:50 +00:00
|
|
|
print >> stdout, "User agent strings:"
|
2014-08-31 00:09:04 +00:00
|
|
|
for i in http_uastrings.UASTRINGS:
|
2015-04-17 05:45:50 +00:00
|
|
|
print >> stdout, " ", i[1], i[0]
|
2014-08-31 00:09:04 +00:00
|
|
|
sys.exit(0)
|
|
|
|
|
2014-10-24 01:01:34 +00:00
|
|
|
parser = argparse.ArgumentParser(
|
|
|
|
description='A perverse HTTP client.', parents=[preparser]
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'--version',
|
|
|
|
action='version',
|
|
|
|
version="pathoc " + version.VERSION
|
|
|
|
)
|
2014-08-31 00:09:04 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-c", dest="connect_to", type=str, default=False,
|
|
|
|
metavar = "HOST:PORT",
|
|
|
|
help="Issue an HTTP CONNECT to connect to the specified host."
|
|
|
|
)
|
2014-10-26 05:16:47 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--memo-limit", dest='memolimit', default=5000, type=int, metavar="N",
|
|
|
|
help='Stop if we do not find a valid request after N attempts.'
|
|
|
|
)
|
2014-10-25 06:50:48 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-m", dest='memo', action="store_true", default=False,
|
|
|
|
help="""
|
|
|
|
Remember specs, and never play the same one twice. Note that this
|
|
|
|
means requests have to be rendered in memory, which means that large
|
|
|
|
generated data can cause issues.
|
|
|
|
"""
|
|
|
|
)
|
2014-08-31 00:09:04 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-n", dest='repeat', default=1, type=int, metavar="N",
|
2014-10-25 04:58:59 +00:00
|
|
|
help='Repeat N times. If 0 repeat for ever.'
|
2014-10-25 03:43:01 +00:00
|
|
|
)
|
2015-03-14 00:54:47 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-w", dest='wait', default=0, type=float, metavar="N",
|
|
|
|
help='Wait N seconds between each request.'
|
|
|
|
)
|
2014-10-25 03:43:01 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-r", dest="random", action="store_true", default=False,
|
|
|
|
help="""
|
|
|
|
Select a random request from those specified. If this is not specified,
|
|
|
|
requests are all played in sequence.
|
|
|
|
"""
|
2014-08-31 00:09:04 +00:00
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-t", dest="timeout", type=int, default=None,
|
|
|
|
help="Connection timeout"
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'host', type=str,
|
2014-10-25 03:34:19 +00:00
|
|
|
metavar = "host[:port]",
|
|
|
|
help='Host and port to connect to'
|
2014-08-31 00:09:04 +00:00
|
|
|
)
|
|
|
|
parser.add_argument(
|
2014-10-25 03:43:01 +00:00
|
|
|
'requests', type=str, nargs="+",
|
2014-10-24 19:18:39 +00:00
|
|
|
help="""
|
2014-10-25 03:34:19 +00:00
|
|
|
Request specification, or path to a file containing request
|
|
|
|
specifcations
|
2014-10-24 19:18:39 +00:00
|
|
|
"""
|
2014-08-31 00:09:04 +00:00
|
|
|
)
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
'SSL',
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-s", dest="ssl", action="store_true", default=False,
|
|
|
|
help="Connect with SSL"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-C", dest="clientcert", type=str, default=False,
|
|
|
|
help="Path to a file containing client certificate and private key"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-i", dest="sni", type=str, default=False,
|
|
|
|
help="SSL Server Name Indication"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--ciphers", dest="ciphers", type=str, default=False,
|
|
|
|
help="SSL cipher specification"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"--sslversion", dest="sslversion", type=int, default=4,
|
|
|
|
choices=[1, 2, 3, 4],
|
2014-10-25 02:30:54 +00:00
|
|
|
help="""
|
|
|
|
Use a specified protocol - TLSv1, SSLv2, SSLv3, SSLv23. Default
|
|
|
|
to SSLv23.
|
|
|
|
"""
|
2014-08-31 00:09:04 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
'Controlling Output',
|
|
|
|
"""
|
|
|
|
Some of these options expand generated values for logging - if
|
|
|
|
you're generating large data, use them with caution.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-I", dest="ignorecodes", type=str, default="",
|
|
|
|
help="Comma-separated list of response codes to ignore"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-S", dest="showssl", action="store_true", default=False,
|
|
|
|
help="Show info on SSL connection"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-e", dest="explain", action="store_true", default=False,
|
|
|
|
help="Explain requests"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-o", dest="oneshot", action="store_true", default=False,
|
|
|
|
help="Oneshot - exit after first non-ignored response"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-q", dest="showreq", action="store_true", default=False,
|
|
|
|
help="Print full request"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
2014-10-25 03:43:01 +00:00
|
|
|
"-p", dest="showresp", action="store_true", default=False,
|
2014-08-31 00:09:04 +00:00
|
|
|
help="Print full response"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-T", dest="ignoretimeout", action="store_true", default=False,
|
|
|
|
help="Ignore timeouts"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-x", dest="hexdump", action="store_true", default=False,
|
|
|
|
help="Output in hexdump format"
|
|
|
|
)
|
|
|
|
|
2015-04-17 05:45:50 +00:00
|
|
|
args = parser.parse_args(argv[1:])
|
2014-08-31 00:09:04 +00:00
|
|
|
|
2014-10-25 03:34:19 +00:00
|
|
|
args.port = None
|
|
|
|
if ":" in args.host:
|
|
|
|
h, p = args.host.rsplit(":", 1)
|
|
|
|
try:
|
|
|
|
p = int(p)
|
|
|
|
except ValueError:
|
2015-04-17 05:45:50 +00:00
|
|
|
return parser.error("Invalid port in host spec: %s" % args.host)
|
2014-10-25 03:34:19 +00:00
|
|
|
args.host = h
|
|
|
|
args.port = p
|
|
|
|
|
2014-08-31 00:09:04 +00:00
|
|
|
if args.port is None:
|
2014-10-24 04:12:54 +00:00
|
|
|
args.port = 443 if args.ssl else 80
|
2014-08-31 00:09:04 +00:00
|
|
|
|
|
|
|
try:
|
2014-10-24 04:12:54 +00:00
|
|
|
args.ignorecodes = [int(i) for i in args.ignorecodes.split(",") if i]
|
2014-08-31 00:09:04 +00:00
|
|
|
except ValueError:
|
2015-04-17 05:45:50 +00:00
|
|
|
return parser.error("Invalid return code specification: %s"%args.ignorecodes)
|
2014-08-31 00:09:04 +00:00
|
|
|
|
|
|
|
if args.connect_to:
|
|
|
|
parts = args.connect_to.split(":")
|
|
|
|
if len(parts) != 2:
|
2015-04-17 05:45:50 +00:00
|
|
|
return parser.error("Invalid CONNECT specification: %s"%args.connect_to)
|
2014-08-31 00:09:04 +00:00
|
|
|
try:
|
|
|
|
parts[1] = int(parts[1])
|
|
|
|
except ValueError:
|
2015-04-17 05:45:50 +00:00
|
|
|
return parser.error("Invalid CONNECT specification: %s"%args.connect_to)
|
2014-10-24 04:12:54 +00:00
|
|
|
args.connect_to = parts
|
2014-08-31 00:09:04 +00:00
|
|
|
else:
|
2014-10-24 04:12:54 +00:00
|
|
|
args.connect_to = None
|
2014-10-24 19:18:39 +00:00
|
|
|
|
|
|
|
reqs = []
|
2014-10-25 03:43:01 +00:00
|
|
|
for r in args.requests:
|
2015-04-17 06:00:46 +00:00
|
|
|
if os.path.isfile(r):
|
2014-10-24 19:18:39 +00:00
|
|
|
data = open(r).read()
|
2014-10-25 02:30:54 +00:00
|
|
|
r = data
|
|
|
|
try:
|
2014-10-25 03:20:23 +00:00
|
|
|
reqs.extend(language.parse_requests(r))
|
2014-10-25 02:30:54 +00:00
|
|
|
except language.ParseException, v:
|
2015-04-17 05:45:50 +00:00
|
|
|
print >> stderr, "Error parsing request spec: %s"%v.msg
|
|
|
|
print >> stderr, v.marked()
|
2014-10-25 02:30:54 +00:00
|
|
|
sys.exit(1)
|
2014-10-25 03:43:01 +00:00
|
|
|
args.requests = reqs
|
2015-04-17 05:45:50 +00:00
|
|
|
return args
|
|
|
|
|
|
|
|
|
|
|
|
def go_pathoc(): # pragma: nocover
|
|
|
|
args = args_pathoc(sys.argv)
|
2014-10-24 04:12:54 +00:00
|
|
|
pathoc.main(args)
|
2014-08-31 00:09:04 +00:00
|
|
|
|
|
|
|
|
2015-04-17 05:45:50 +00:00
|
|
|
def args_pathod(argv, stdout=sys.stdout, stderr=sys.stderr):
|
2014-10-24 04:12:54 +00:00
|
|
|
parser = argparse.ArgumentParser(
|
|
|
|
description='A pathological HTTP/S daemon.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
'--version',
|
|
|
|
action='version',
|
|
|
|
version="pathod " + version.VERSION
|
2013-01-05 03:48:49 +00:00
|
|
|
)
|
2012-08-16 04:07:23 +00:00
|
|
|
parser.add_argument(
|
2014-10-24 04:12:54 +00:00
|
|
|
"-p",
|
|
|
|
dest='port',
|
|
|
|
default=9999,
|
|
|
|
type=int,
|
|
|
|
help='Port. Specify 0 to pick an arbitrary empty port.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-l",
|
|
|
|
dest='address',
|
|
|
|
default="127.0.0.1",
|
|
|
|
type=str,
|
|
|
|
help='Listening address.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-a",
|
|
|
|
dest='anchors',
|
|
|
|
default=[],
|
|
|
|
type=str,
|
|
|
|
action="append",
|
|
|
|
metavar="ANCHOR",
|
2014-10-24 19:18:39 +00:00
|
|
|
help="""
|
|
|
|
Add an anchor. Specified as a string with the form pattern=pagespec, or
|
|
|
|
pattern=filepath
|
|
|
|
"""
|
2012-08-16 04:07:23 +00:00
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-c", dest='craftanchor', default="/p/", type=str,
|
|
|
|
help='Anchorpoint for URL crafting commands.'
|
|
|
|
)
|
2014-03-02 00:45:35 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--confdir",
|
|
|
|
action="store", type = str, dest="confdir", default='~/.mitmproxy',
|
|
|
|
help = "Configuration directory. (~/.mitmproxy)"
|
|
|
|
)
|
2012-08-16 04:07:23 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-d", dest='staticdir', default=None, type=str,
|
|
|
|
help='Directory for static files.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"-D", dest='daemonize', default=False, action="store_true",
|
|
|
|
help='Daemonize.'
|
|
|
|
)
|
2012-09-30 23:01:02 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"-t", dest="timeout", type=int, default=None,
|
|
|
|
help="Connection timeout"
|
|
|
|
)
|
2012-08-16 04:07:23 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--limit-size", dest='sizelimit', default=None, type=str,
|
|
|
|
help='Size limit of served responses. Understands size suffixes, i.e. 100k.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--noapi", dest='noapi', default=False, action="store_true",
|
|
|
|
help='Disable API.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--nohang", dest='nohang', default=False, action="store_true",
|
|
|
|
help='Disable pauses during crafted response generation.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--noweb", dest='noweb', default=False, action="store_true",
|
|
|
|
help='Disable both web interface and API.'
|
|
|
|
)
|
|
|
|
parser.add_argument(
|
|
|
|
"--nocraft", dest='nocraft', default=False, action="store_true",
|
|
|
|
help='Disable response crafting. If anchors are specified, they still work.'
|
|
|
|
)
|
2015-04-22 03:58:25 +00:00
|
|
|
parser.add_argument(
|
|
|
|
"--webdebug", dest='webdebug', default=False, action="store_true",
|
|
|
|
help='Debugging mode for the web app (dev only).'
|
|
|
|
)
|
2013-01-05 02:25:09 +00:00
|
|
|
|
|
|
|
group = parser.add_argument_group(
|
|
|
|
'SSL',
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-s", dest='ssl', default=False, action="store_true",
|
2013-01-05 03:48:49 +00:00
|
|
|
help='Run in HTTPS mode.'
|
2013-01-05 02:25:09 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
2014-03-02 00:45:35 +00:00
|
|
|
"--cn", dest="cn", type=str, default=None,
|
2014-10-24 04:12:54 +00:00
|
|
|
help="CN for generated SSL certs. Default: %s"%pathod.DEFAULT_CERT_DOMAIN
|
2014-03-02 00:45:35 +00:00
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-C", dest='ssl_not_after_connect', default=False, action="store_true",
|
|
|
|
help="Don't expect SSL after a CONNECT request."
|
2012-08-16 04:07:23 +00:00
|
|
|
)
|
2013-01-05 02:25:09 +00:00
|
|
|
group.add_argument(
|
2014-03-05 02:03:31 +00:00
|
|
|
"--cert", dest='ssl_certs', default=[], type=str,
|
2014-08-31 00:09:04 +00:00
|
|
|
metavar = "SPEC", action="append",
|
2014-10-24 04:12:54 +00:00
|
|
|
help = """
|
|
|
|
Add an SSL certificate. SPEC is of the form "[domain=]path". The domain
|
|
|
|
may include a wildcard, and is equal to "*" if not specified. The file
|
|
|
|
at path is a certificate in PEM format. If a private key is included in
|
|
|
|
the PEM, it is used, else the default key in the conf dir is used. Can
|
2015-04-18 22:51:03 +00:00
|
|
|
be passed multiple times.
|
2014-10-24 04:12:54 +00:00
|
|
|
"""
|
2012-08-16 04:07:23 +00:00
|
|
|
)
|
2014-02-27 05:33:48 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--ciphers", dest="ciphers", type=str, default=False,
|
|
|
|
help="SSL cipher specification"
|
|
|
|
)
|
2015-04-18 22:51:03 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--sans", dest="sans", type=str, default="",
|
|
|
|
help="""Comma-separated list of subject Altnernate Names to add to
|
|
|
|
the server certificate."""
|
|
|
|
)
|
2014-02-27 05:33:48 +00:00
|
|
|
group.add_argument(
|
|
|
|
"--sslversion", dest="sslversion", type=int, default=4,
|
|
|
|
choices=[1, 2, 3, 4],
|
2014-10-25 02:30:54 +00:00
|
|
|
help=""""Use a specified protocol - TLSv1, SSLv2, SSLv3, SSLv23. Default
|
|
|
|
to SSLv23."""
|
2014-02-27 05:33:48 +00:00
|
|
|
)
|
2012-09-30 23:48:26 +00:00
|
|
|
|
2012-10-30 22:23:53 +00:00
|
|
|
group = parser.add_argument_group(
|
2012-12-30 23:23:42 +00:00
|
|
|
'Controlling Logging',
|
2012-10-30 22:23:53 +00:00
|
|
|
"""
|
|
|
|
Some of these options expand generated values for logging - if
|
|
|
|
you're generating large data, use them with caution.
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-e", dest="explain", action="store_true", default=False,
|
|
|
|
help="Explain responses"
|
|
|
|
)
|
2012-09-30 23:48:26 +00:00
|
|
|
group.add_argument(
|
|
|
|
"-f", dest='logfile', default=None, type=str,
|
|
|
|
help='Log to file.'
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-q", dest="logreq", action="store_true", default=False,
|
|
|
|
help="Log full request"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-r", dest="logresp", action="store_true", default=False,
|
|
|
|
help="Log full response"
|
|
|
|
)
|
|
|
|
group.add_argument(
|
|
|
|
"-x", dest="hexdump", action="store_true", default=False,
|
|
|
|
help="Log request/response in hexdump format"
|
|
|
|
)
|
2015-04-17 05:45:50 +00:00
|
|
|
args = parser.parse_args(argv[1:])
|
2014-10-24 04:19:55 +00:00
|
|
|
|
2015-04-18 22:51:03 +00:00
|
|
|
args.sans = args.sans.split(",")
|
|
|
|
|
2014-10-24 04:19:55 +00:00
|
|
|
certs = []
|
|
|
|
for i in args.ssl_certs:
|
|
|
|
parts = i.split("=", 1)
|
|
|
|
if len(parts) == 1:
|
|
|
|
parts = ["*", parts[0]]
|
|
|
|
parts[1] = os.path.expanduser(parts[1])
|
2015-04-17 06:00:46 +00:00
|
|
|
if not os.path.isfile(parts[1]):
|
2015-04-17 05:45:50 +00:00
|
|
|
return parser.error("Certificate file does not exist: %s"%parts[1])
|
2014-10-24 04:19:55 +00:00
|
|
|
certs.append(parts)
|
|
|
|
args.ssl_certs = certs
|
|
|
|
|
|
|
|
alst = []
|
|
|
|
for i in args.anchors:
|
|
|
|
parts = utils.parse_anchor_spec(i)
|
|
|
|
if not parts:
|
2015-04-17 05:45:50 +00:00
|
|
|
return parser.error("Invalid anchor specification: %s"%i)
|
2014-10-24 04:19:55 +00:00
|
|
|
alst.append(parts)
|
|
|
|
args.anchors = alst
|
|
|
|
|
|
|
|
sizelimit = None
|
|
|
|
if args.sizelimit:
|
|
|
|
try:
|
|
|
|
sizelimit = utils.parse_size(args.sizelimit)
|
|
|
|
except ValueError, v:
|
2015-04-17 05:45:50 +00:00
|
|
|
return parser.error(v)
|
2014-10-24 04:19:55 +00:00
|
|
|
args.sizelimit = sizelimit
|
|
|
|
|
2014-10-24 19:18:39 +00:00
|
|
|
anchors = []
|
2014-10-25 02:30:54 +00:00
|
|
|
for patt, spec in args.anchors:
|
2015-04-17 06:00:46 +00:00
|
|
|
if os.path.isfile(spec):
|
2014-10-24 19:18:39 +00:00
|
|
|
data = open(spec).read()
|
2014-10-25 02:30:54 +00:00
|
|
|
spec = data
|
|
|
|
try:
|
|
|
|
req = language.parse_response(spec)
|
|
|
|
except language.ParseException, v:
|
2015-04-17 05:45:50 +00:00
|
|
|
print >> stderr, "Error parsing anchor spec: %s"%v.msg
|
|
|
|
print >> stderr, v.marked()
|
2014-10-25 02:30:54 +00:00
|
|
|
sys.exit(1)
|
|
|
|
try:
|
|
|
|
arex = re.compile(patt)
|
|
|
|
except re.error:
|
2015-04-17 06:00:46 +00:00
|
|
|
return parser.error("Invalid regex in anchor: %s" % patt)
|
2014-10-25 02:30:54 +00:00
|
|
|
anchors.append((arex, req))
|
2014-10-24 19:18:39 +00:00
|
|
|
args.anchors = anchors
|
2015-04-17 05:45:50 +00:00
|
|
|
return args
|
|
|
|
|
2014-10-24 19:18:39 +00:00
|
|
|
|
2015-04-17 05:45:50 +00:00
|
|
|
def go_pathod(): # pragma: nocover
|
|
|
|
args = args_pathod(sys.argv)
|
2014-10-24 04:19:55 +00:00
|
|
|
pathod.main(args)
|