mitmproxy/pathod/log.py

86 lines
2.0 KiB
Python
Raw Normal View History

2015-05-31 05:25:36 +00:00
import datetime
2016-05-07 18:14:39 +00:00
import six
import netlib.utils
import netlib.tcp
import netlib.http
TIMEFMT = '%d-%m-%y %H:%M:%S'
def write_raw(fp, lines):
if fp:
fp.write(
"%s: " % datetime.datetime.now().strftime(TIMEFMT)
)
for i in lines:
fp.write(i)
2015-06-08 02:01:04 +00:00
fp.write("\n")
fp.flush()
class LogCtx(object):
2015-05-31 05:25:36 +00:00
def __init__(self, fp, hex, rfile, wfile):
self.lines = []
self.fp = fp
self.suppressed = False
self.hex = hex
self.rfile, self.wfile = rfile, wfile
def __enter__(self):
if self.wfile:
self.wfile.start_log()
if self.rfile:
self.rfile.start_log()
return self
def __exit__(self, exc_type, exc_value, traceback):
wlog = self.wfile.get_log() if self.wfile else None
rlog = self.rfile.get_log() if self.rfile else None
if self.suppressed or not self.fp:
return
if wlog:
self("Bytes written:")
self.dump(wlog, self.hex)
if rlog:
self("Bytes read:")
self.dump(rlog, self.hex)
2015-06-08 02:01:04 +00:00
if self.lines:
write_raw(
2015-06-08 02:01:04 +00:00
self.fp,
[
"\n".join(self.lines),
]
)
if exc_value:
2016-05-07 18:14:39 +00:00
six.reraise(exc_type, exc_value, traceback)
def suppress(self):
self.suppressed = True
def dump(self, data, hexdump):
if hexdump:
for line in netlib.utils.hexdump(data):
self("\t%s %s %s" % line)
else:
2015-09-16 16:44:34 +00:00
for i in netlib.utils.clean_bin(data).split("\n"):
self("\t%s" % i)
def __call__(self, line):
self.lines.append(line)
class ConnectionLogger:
def __init__(self, fp, hex, rfile, wfile):
self.fp = fp
self.hex = hex
self.rfile, self.wfile = rfile, wfile
def ctx(self):
return LogCtx(self.fp, self.hex, self.rfile, self.wfile)
def write(self, lines):
write_raw(self.fp, lines)