mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-23 00:01:36 +00:00
39d7ba852c
While the HAR spec is not very explicit and their example shows just this one example: ```json "postData": { "mimeType": "multipart/form-data" } ``` Would it not make sense to include all the information necessary to parse out the post data `text`. Eg. ```json "postData": { "text": "--xYzZY\r\nContent-Disposition: form-data; name=\"sort1\"\r\n\r\noldest date first\r\n--xYzZY--\r\n", "mimeType": "multipart/form-data; boundary=xYzZY" }, ``` Currently, full mimeType is included only in `content-type` request header. Elsewhere in HAR spec they include the 'extras', eg ```json "content": { "mimeType": "text/html; charset=utf-8" } ``` So one could argue that `mimeType` should include all information necessary to interpret the data. In case of `multipart/form-data`, as per RFC2046 http://www.ietf.org/rfc/rfc2046.txt ``` The Content-Type field for multipart entities requires one parameter, "boundary". ``` I believe that earlier incarnations, eg `har_exporter.py` included it in the mimeType. |
||
---|---|---|
.. | ||
pathod | ||
add_header.py | ||
arguments.py | ||
change_upstream_proxy.py | ||
classes.py | ||
custom_contentviews.py | ||
dns_spoofing.py | ||
dup_and_replay.py | ||
fail_with_500.py | ||
flowbasic | ||
flowfilter.py | ||
flowwriter.py | ||
full_transparency_shim.c | ||
har_dump.py | ||
iframe_injector.py | ||
logging.py | ||
mitmproxywrapper.py | ||
modify_form.py | ||
modify_querystring.py | ||
nonblocking.py | ||
proxapp.py | ||
read_dumpfile | ||
README | ||
redirect_requests.py | ||
remote_debug.py | ||
sslstrip.py | ||
stickycookies | ||
stream_modify.py | ||
stream.py | ||
stub.py | ||
tcp_message.py | ||
tls_passthrough.py | ||
upsidedownternet.py |
Some inline scripts may require additional dependencies, which can be installed using `pip install mitmproxy[examples]`. # inline script examples add_header.py Simple script that just adds a header to every request. change_upstream_proxy.py Dynamically change the upstream proxy dns_spoofing.py Use mitmproxy in a DNS spoofing scenario. dup_and_replay.py Duplicates each request, changes it, and then replays the modified request. fail_with_500.py Turn every response into an Internal Server Error. filt.py Use mitmproxy's filter expressions in your script. flowwriter.py Only write selected flows into a mitmproxy dumpfile. iframe_injector.py Inject configurable iframe into pages. modify_form.py Modify all form submissions to add a parameter. modify_querystring.py Modify all query strings to add a parameters. modify_response_body.py Replace arbitrary strings in all responses nonblocking.py Demonstrate parallel processing with a blocking script. proxapp.py How to embed a WSGI app in a mitmproxy server redirect_requests.py Redirect requests or directly reply to them. stub.py Script stub with a method definition for every event. upsidedownternet.py Rewrites traffic to turn images upside down. # mitmproxy examples flowbasic Basic use of mitmproxy as a library. stickycookies An example of writing a custom proxy with mitmproxy. # misc read_dumpfile Read a dumpfile generated by mitmproxy. mitmproxywrapper.py Bracket mitmproxy run with proxy enable/disable on OS X