from __future__ import print_function, absolute_import import os import signal import sys import netlib.version from . import version, cmdline from .proxy import process_proxy_options, ProxyServerError from .proxy.server import DummyServer, ProxyServer # This file is not included in coverage analysis or tests - anything that can be # tested should live elsewhere. def check_versions(): """ Having installed a wrong version of pyOpenSSL or netlib is unfortunately a very common source of error. Check before every start that both versions are somewhat okay. """ # We don't introduce backward-incompatible changes in patch versions. Only # consider major and minor version. if netlib.version.IVERSION[:2] != version.IVERSION[:2]: print( "Warning: You are using mitmdump %s with netlib %s. " "Most likely, that won't work - please upgrade!" % ( version.VERSION, netlib.version.VERSION ), file=sys.stderr ) import OpenSSL import inspect v = tuple([int(x) for x in OpenSSL.__version__.split(".")][:2]) if v < (0, 14): print( "You are using an outdated version of pyOpenSSL:" " mitmproxy requires pyOpenSSL 0.14 or greater.", file=sys.stderr ) # Some users apparently have multiple versions of pyOpenSSL installed. # Report which one we got. pyopenssl_path = os.path.dirname(inspect.getfile(OpenSSL)) print( "Your pyOpenSSL %s installation is located at %s" % ( OpenSSL.__version__, pyopenssl_path ), file=sys.stderr ) sys.exit(1) def assert_utf8_env(): spec = "" for i in ["LANG", "LC_CTYPE", "LC_ALL"]: spec += os.environ.get(i, "").lower() if "utf" not in spec: print( "Error: mitmproxy requires a UTF console environment.", file=sys.stderr ) print( "Set your LANG enviroment variable to something like en_US.UTF-8", file=sys.stderr ) sys.exit(1) def get_server(dummy_server, options): if dummy_server: return DummyServer(options) else: try: return ProxyServer(options) except ProxyServerError, v: print(str(v), file=sys.stderr) sys.exit(1) def mitmproxy(): # pragma: nocover from . import console check_versions() assert_utf8_env() parser = cmdline.mitmproxy() options = parser.parse_args() if options.quiet: options.verbose = 0 proxy_config = process_proxy_options(parser, options) console_options = console.Options(**cmdline.get_common_options(options)) console_options.palette = options.palette console_options.palette_transparent = options.palette_transparent console_options.eventlog = options.eventlog console_options.intercept = options.intercept server = get_server(console_options.no_server, proxy_config) m = console.ConsoleMaster(server, console_options) try: m.run() except KeyboardInterrupt: pass def mitmdump(): # pragma: nocover from . import dump check_versions() parser = cmdline.mitmdump() options = parser.parse_args() if options.quiet: options.verbose = 0 options.flow_detail = 0 proxy_config = process_proxy_options(parser, options) dump_options = dump.Options(**cmdline.get_common_options(options)) dump_options.flow_detail = options.flow_detail dump_options.keepserving = options.keepserving dump_options.filtstr = " ".join(options.args) if options.args else None server = get_server(dump_options.no_server, proxy_config) try: master = dump.DumpMaster(server, dump_options) def cleankill(*args, **kwargs): master.shutdown() signal.signal(signal.SIGTERM, cleankill) master.run() except dump.DumpError as e: print("mitmdump: %s" % e, file=sys.stderr) sys.exit(1) except KeyboardInterrupt: pass def mitmweb(): # pragma: nocover from . import web check_versions() parser = cmdline.mitmweb() options = parser.parse_args() if options.quiet: options.verbose = 0 proxy_config = process_proxy_options(parser, options) web_options = web.Options(**cmdline.get_common_options(options)) web_options.intercept = options.intercept web_options.wdebug = options.wdebug web_options.wiface = options.wiface web_options.wport = options.wport server = get_server(web_options.no_server, proxy_config) m = web.WebMaster(server, web_options) try: m.run() except KeyboardInterrupt: pass