Spell-check docs, setup.py fixes, add missing files to manifest.

This commit is contained in:
Aldo Cortesi 2011-03-30 12:05:50 +13:00
parent 60aa16fc56
commit f12510d979
8 changed files with 12 additions and 8 deletions

View File

@ -1,4 +1,8 @@
include LICENSE
include CHANGELOG
include CONTRIBUTORS
include README.mkd
recursive-include examples *
recursive-include doc *
recursive-include test *
recursive-include libmproxy/resources *

View File

@ -1,3 +1,4 @@
__mitmproxy__ is an SSL-capable, intercepting HTTP proxy. It provides a console
interface that allows traffic flows to be inspected and edited on the fly.
@ -35,7 +36,6 @@ Source is hosted on github:
Requirements
------------
* [Python](http://www.python.org) 2.6.x or 2.7.x.
* [openssl](http://www.openssl.org/). Installed by default on most systems.
* [urwid](http://excess.org/urwid/) version 0.9.8 or newer.

View File

@ -2,6 +2,6 @@
When the __anticache__ option is passed to mitmproxy, it removes headers
(__if-none-match__ and __if-modified-since__) that might elicit a
304-not-modified response from the server. This is useful when you want to make
sure you capture an HTTP extchange in its totality, and during [client
sure you capture an HTTP exchange in its totality, and during [client
replay](@!urlTo("clientreplay.html")!@).

View File

@ -20,7 +20,7 @@ Filter expressions consist of the following operators:
Examples
========
Url containing "google.com":
URL containing "google.com":
google\.com

View File

@ -14,7 +14,7 @@ pattern tells __mitmproxy__ to intercept all requests. For complete filter
syntax, see the [Filter expressions](@!urlTo("filters.html")!@) section of this
document, or the built-in help function in __mitmproxy__.
### 2: Intercepted conenctions are indicated with a red exclamation mark:
### 2: Intercepted connections are indicated with a red exclamation mark:
<img src="@!urlTo('intercept-mid.png')!@"/>
@ -22,7 +22,7 @@ document, or the built-in help function in __mitmproxy__.
<img src="@!urlTo('intercept-options.png')!@"/>
In this case, we viewd the request by selecting it, pressed __e__ for "edit"
In this case, we viewed the request by selecting it, pressed __e__ for "edit"
and __m__ for "method" to change the HTTP request method.
### 4: Accept the intercept to continue

View File

@ -27,7 +27,7 @@ a browser, just accepting the bogus SSL cert manually is not too much trouble,
but there are a number of cases where you will want to configure your testing
system or browser to trust the __mitmproxy__ CA as a signing root authority:
- If you are testing non-browser software that checks SSL cert validiy using
- If you are testing non-browser software that checks SSL cert validity using
the system certificate store.
- You are testing an app that makes non-interactive (JSONP, script src, etc.)
requests to SSL resources. Another workaround in this case is to manually visit

View File

@ -17,7 +17,7 @@ with the secured resources.
## Sticky auth
The __stickyauth__ option is analagous to the __stickycookie__ option, in that
The __stickyauth__ option is analogous to the __stickycookie__ option, in that
HTTP __Authorization__ headers are simply replayed to the server once they have
been seen. This is enough to allow you to access a server resource using HTTP
Basic authentication through the proxy. Note that __mitmproxy__ doesn't (yet)

View File

@ -76,7 +76,7 @@ setup(
long_description = long_description,
author = "Aldo Cortesi",
author_email = "aldo@corte.si",
url = "http://corte.si/software",
url = "http://mitmproxy.org",
packages = packages,
package_data = package_data,
scripts = ["mitmproxy", "mitmdump"],