mitmproxy/test/test_protocol_http1.py

64 lines
1.8 KiB
Python
Raw Normal View History

from netlib.http import http1
from netlib.tcp import TCPClient
2016-02-14 13:45:27 +00:00
from netlib.tutils import treq
2016-02-02 12:25:31 +00:00
from . import tutils, tservers
2014-02-07 02:56:57 +00:00
2014-09-04 12:46:25 +00:00
class TestHTTPFlow(object):
2016-01-27 09:12:18 +00:00
2014-09-04 12:46:25 +00:00
def test_repr(self):
f = tutils.tflow(resp=True, err=True)
assert repr(f)
2014-02-07 06:08:59 +00:00
class TestInvalidRequests(tservers.HTTPProxTest):
ssl = True
2015-04-14 21:14:20 +00:00
def test_double_connect(self):
p = self.pathoc()
r = p.request("connect:'%s:%s'" % ("127.0.0.1", self.server2.port))
assert r.status_code == 400
assert "Invalid HTTP request form" in r.content
def test_relative_request(self):
p = self.pathoc_raw()
p.connect()
r = p.request("get:/p/200")
assert r.status_code == 400
assert "Invalid HTTP request form" in r.content
class TestExpectHeader(tservers.HTTPProxTest):
2016-01-27 09:12:18 +00:00
def test_simple(self):
client = TCPClient(("127.0.0.1", self.proxy.port))
client.connect()
# call pathod server, wait a second to complete the request
client.wfile.write(
b"POST http://localhost:%d/p/200 HTTP/1.1\r\n"
b"Expect: 100-continue\r\n"
b"Content-Length: 16\r\n"
b"\r\n" % self.server.port
)
client.wfile.flush()
assert client.rfile.readline() == "HTTP/1.1 100 Continue\r\n"
assert client.rfile.readline() == "\r\n"
client.wfile.write(b"0123456789abcdef\r\n")
client.wfile.flush()
resp = http1.read_response(client.rfile, treq())
assert resp.status_code == 200
2015-09-28 11:54:53 +00:00
client.finish()
2016-01-02 14:12:36 +00:00
class TestHeadContentLength(tservers.HTTPProxTest):
2016-01-27 09:12:18 +00:00
2016-01-02 14:12:36 +00:00
def test_head_content_length(self):
p = self.pathoc()
resp = p.request("""head:'%s/p/200:h"Content-Length"="42"'""" % self.server.urlbase)
2016-01-27 09:12:18 +00:00
assert resp.headers["Content-Length"] == "42"