mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-23 08:11:00 +00:00
375 lines
9.9 KiB
Python
375 lines
9.9 KiB
Python
import os.path
|
|
import threading
|
|
import tempfile
|
|
import sys
|
|
|
|
import mitmproxy.platform
|
|
from mitmproxy.proxy.config import ProxyConfig
|
|
from mitmproxy.proxy.server import ProxyServer
|
|
from mitmproxy import controller
|
|
from mitmproxy import options
|
|
from mitmproxy import exceptions
|
|
from mitmproxy import io
|
|
import pathod.test
|
|
import pathod.pathoc
|
|
|
|
from mitmproxy import eventsequence
|
|
from mitmproxy.test import tflow
|
|
from mitmproxy.test import tutils
|
|
from mitmproxy.test import taddons
|
|
|
|
|
|
class MasterTest:
|
|
|
|
def cycle(self, master, content):
|
|
f = tflow.tflow(req=tutils.treq(content=content))
|
|
master.addons.handle_lifecycle("clientconnect", f.client_conn)
|
|
for i in eventsequence.iterate(f):
|
|
master.addons.handle_lifecycle(*i)
|
|
master.addons.handle_lifecycle("clientdisconnect", f.client_conn)
|
|
return f
|
|
|
|
def dummy_cycle(self, master, n, content):
|
|
for i in range(n):
|
|
self.cycle(master, content)
|
|
master.shutdown()
|
|
|
|
def flowfile(self, path):
|
|
with open(path, "wb") as f:
|
|
fw = io.FlowWriter(f)
|
|
t = tflow.tflow(resp=True)
|
|
fw.add(t)
|
|
|
|
|
|
class TestState:
|
|
def __init__(self):
|
|
self.flows = []
|
|
|
|
def request(self, f):
|
|
if f not in self.flows:
|
|
self.flows.append(f)
|
|
|
|
def response(self, f):
|
|
if f not in self.flows:
|
|
self.flows.append(f)
|
|
|
|
def websocket_start(self, f):
|
|
if f not in self.flows:
|
|
self.flows.append(f)
|
|
|
|
# TODO: add TCP support?
|
|
# def tcp_start(self, f):
|
|
# if f not in self.flows:
|
|
# self.flows.append(f)
|
|
|
|
|
|
class TestMaster(taddons.RecordingMaster):
|
|
|
|
def __init__(self, opts, config):
|
|
s = ProxyServer(config)
|
|
super().__init__(opts, s)
|
|
|
|
def clear_addons(self, addons):
|
|
self.addons.clear()
|
|
self.state = TestState()
|
|
self.addons.add(self.state)
|
|
self.addons.add(*addons)
|
|
self.addons.trigger("configure", self.options.keys())
|
|
self.addons.trigger("running")
|
|
|
|
def reset(self, addons):
|
|
self.clear_addons(addons)
|
|
self.clear()
|
|
|
|
|
|
class ProxyThread(threading.Thread):
|
|
|
|
def __init__(self, tmaster):
|
|
threading.Thread.__init__(self)
|
|
self.tmaster = tmaster
|
|
self.name = "ProxyThread (%s:%s)" % (
|
|
tmaster.server.address[0],
|
|
tmaster.server.address[1],
|
|
)
|
|
controller.should_exit = False
|
|
|
|
@property
|
|
def port(self):
|
|
return self.tmaster.server.address[1]
|
|
|
|
@property
|
|
def tlog(self):
|
|
return self.tmaster.logs
|
|
|
|
def run(self):
|
|
self.tmaster.run()
|
|
|
|
def shutdown(self):
|
|
self.tmaster.shutdown()
|
|
|
|
|
|
class ProxyTestBase:
|
|
# Test Configuration
|
|
ssl = None
|
|
ssloptions = False
|
|
masterclass = TestMaster
|
|
|
|
add_upstream_certs_to_client_chain = False
|
|
|
|
@classmethod
|
|
def setup_class(cls):
|
|
cls.server = pathod.test.Daemon(
|
|
ssl=cls.ssl,
|
|
ssloptions=cls.ssloptions)
|
|
cls.server2 = pathod.test.Daemon(
|
|
ssl=cls.ssl,
|
|
ssloptions=cls.ssloptions)
|
|
|
|
opts = cls.get_options()
|
|
cls.config = ProxyConfig(opts)
|
|
tmaster = cls.masterclass(opts, cls.config)
|
|
cls.proxy = ProxyThread(tmaster)
|
|
cls.proxy.start()
|
|
|
|
@classmethod
|
|
def teardown_class(cls):
|
|
# perf: we want to run tests in parallel
|
|
# should this ever cause an error, travis should catch it.
|
|
# shutil.rmtree(cls.cadir)
|
|
cls.proxy.shutdown()
|
|
cls.server.shutdown()
|
|
cls.server2.shutdown()
|
|
|
|
def teardown(self):
|
|
try:
|
|
self.server.wait_for_silence()
|
|
except exceptions.Timeout:
|
|
# FIXME: Track down the Windows sync issues
|
|
if sys.platform != "win32":
|
|
raise
|
|
|
|
def setup(self):
|
|
self.master.reset(self.addons())
|
|
self.server.clear_log()
|
|
self.server2.clear_log()
|
|
|
|
@property
|
|
def master(self):
|
|
return self.proxy.tmaster
|
|
|
|
@classmethod
|
|
def get_options(cls):
|
|
cls.cadir = os.path.join(tempfile.gettempdir(), "mitmproxy")
|
|
return options.Options(
|
|
listen_port=0,
|
|
cadir=cls.cadir,
|
|
add_upstream_certs_to_client_chain=cls.add_upstream_certs_to_client_chain,
|
|
ssl_insecure=True,
|
|
)
|
|
|
|
def addons(self):
|
|
"""
|
|
Can be over-ridden to add a standard set of addons to tests.
|
|
"""
|
|
return []
|
|
|
|
|
|
class LazyPathoc(pathod.pathoc.Pathoc):
|
|
def __init__(self, lazy_connect, *args, **kwargs):
|
|
self.lazy_connect = lazy_connect
|
|
pathod.pathoc.Pathoc.__init__(self, *args, **kwargs)
|
|
|
|
def connect(self):
|
|
return pathod.pathoc.Pathoc.connect(self, self.lazy_connect)
|
|
|
|
|
|
class HTTPProxyTest(ProxyTestBase):
|
|
|
|
def pathoc_raw(self):
|
|
return pathod.pathoc.Pathoc(("127.0.0.1", self.proxy.port), fp=None)
|
|
|
|
def pathoc(self, sni=None):
|
|
"""
|
|
Returns a connected Pathoc instance.
|
|
"""
|
|
if self.ssl:
|
|
conn = ("127.0.0.1", self.server.port)
|
|
else:
|
|
conn = None
|
|
return LazyPathoc(
|
|
conn,
|
|
("localhost", self.proxy.port), ssl=self.ssl, sni=sni, fp=None
|
|
)
|
|
|
|
def pathod(self, spec, sni=None):
|
|
"""
|
|
Constructs a pathod GET request, with the appropriate base and proxy.
|
|
"""
|
|
p = self.pathoc(sni=sni)
|
|
if self.ssl:
|
|
q = "get:'/p/%s'" % spec
|
|
else:
|
|
q = "get:'%s/p/%s'" % (self.server.urlbase, spec)
|
|
with p.connect():
|
|
return p.request(q)
|
|
|
|
def app(self, page):
|
|
if self.ssl:
|
|
p = pathod.pathoc.Pathoc(
|
|
("127.0.0.1", self.proxy.port), True, fp=None
|
|
)
|
|
with p.connect((options.APP_HOST, options.APP_PORT)):
|
|
return p.request("get:'%s'" % page)
|
|
else:
|
|
p = self.pathoc()
|
|
with p.connect():
|
|
return p.request("get:'http://%s%s'" % (options.APP_HOST, page))
|
|
|
|
|
|
class TransparentProxyTest(ProxyTestBase):
|
|
ssl = None
|
|
|
|
@classmethod
|
|
def setup_class(cls):
|
|
cls._init_transparent_mode = mitmproxy.platform.init_transparent_mode
|
|
cls._original_addr = mitmproxy.platform.original_addr
|
|
mitmproxy.platform.init_transparent_mode = lambda: True
|
|
mitmproxy.platform.original_addr = lambda sock: ("127.0.0.1", cls.server.port)
|
|
super().setup_class()
|
|
|
|
@classmethod
|
|
def teardown_class(cls):
|
|
super().teardown_class()
|
|
mitmproxy.platform.init_transparent_mode = cls._init_transparent_mode
|
|
mitmproxy.platform.original_addr = cls._original_addr
|
|
|
|
@classmethod
|
|
def get_options(cls):
|
|
opts = ProxyTestBase.get_options()
|
|
opts.mode = "transparent"
|
|
return opts
|
|
|
|
def pathod(self, spec, sni=None):
|
|
"""
|
|
Constructs a pathod GET request, with the appropriate base and proxy.
|
|
"""
|
|
if self.ssl:
|
|
p = self.pathoc(sni=sni)
|
|
q = "get:'/p/%s'" % spec
|
|
else:
|
|
p = self.pathoc()
|
|
q = "get:'/p/%s'" % spec
|
|
with p.connect():
|
|
return p.request(q)
|
|
|
|
def pathoc(self, sni=None):
|
|
"""
|
|
Returns a connected Pathoc instance.
|
|
"""
|
|
p = pathod.pathoc.Pathoc(
|
|
("localhost", self.proxy.port), ssl=self.ssl, sni=sni, fp=None
|
|
)
|
|
return p
|
|
|
|
|
|
class ReverseProxyTest(ProxyTestBase):
|
|
ssl = None
|
|
|
|
@classmethod
|
|
def get_options(cls):
|
|
opts = ProxyTestBase.get_options()
|
|
s = "".join(
|
|
[
|
|
"https" if cls.ssl else "http",
|
|
"://",
|
|
"127.0.0.1:",
|
|
str(cls.server.port)
|
|
]
|
|
)
|
|
opts.mode = "reverse:" + s
|
|
return opts
|
|
|
|
def pathoc(self, sni=None):
|
|
"""
|
|
Returns a connected Pathoc instance.
|
|
"""
|
|
p = pathod.pathoc.Pathoc(
|
|
("localhost", self.proxy.port), ssl=self.ssl, sni=sni, fp=None
|
|
)
|
|
return p
|
|
|
|
def pathod(self, spec, sni=None):
|
|
"""
|
|
Constructs a pathod GET request, with the appropriate base and proxy.
|
|
"""
|
|
if self.ssl:
|
|
p = self.pathoc(sni=sni)
|
|
q = "get:'/p/%s'" % spec
|
|
else:
|
|
p = self.pathoc()
|
|
q = "get:'/p/%s'" % spec
|
|
with p.connect():
|
|
return p.request(q)
|
|
|
|
|
|
class SocksModeTest(HTTPProxyTest):
|
|
|
|
@classmethod
|
|
def get_options(cls):
|
|
opts = ProxyTestBase.get_options()
|
|
opts.mode = "socks5"
|
|
return opts
|
|
|
|
|
|
class ChainProxyTest(ProxyTestBase):
|
|
|
|
"""
|
|
Chain three instances of mitmproxy in a row to test upstream mode.
|
|
Proxy order is cls.proxy -> cls.chain[0] -> cls.chain[1]
|
|
cls.proxy and cls.chain[0] are in upstream mode,
|
|
cls.chain[1] is in regular mode.
|
|
"""
|
|
chain = None
|
|
n = 2
|
|
|
|
@classmethod
|
|
def setup_class(cls):
|
|
cls.chain = []
|
|
super().setup_class()
|
|
for _ in range(cls.n):
|
|
opts = cls.get_options()
|
|
config = ProxyConfig(opts)
|
|
tmaster = cls.masterclass(opts, config)
|
|
proxy = ProxyThread(tmaster)
|
|
proxy.start()
|
|
cls.chain.insert(0, proxy)
|
|
|
|
# Patch the orginal proxy to upstream mode
|
|
opts = cls.get_options()
|
|
cls.config = cls.proxy.tmaster.config = cls.proxy.tmaster.server.config = ProxyConfig(opts)
|
|
|
|
@classmethod
|
|
def teardown_class(cls):
|
|
super().teardown_class()
|
|
for proxy in cls.chain:
|
|
proxy.shutdown()
|
|
|
|
def setup(self):
|
|
super().setup()
|
|
for proxy in self.chain:
|
|
proxy.tmaster.reset(self.addons())
|
|
|
|
@classmethod
|
|
def get_options(cls):
|
|
opts = super().get_options()
|
|
if cls.chain: # First proxy is in normal mode.
|
|
s = "http://127.0.0.1:%s" % cls.chain[0].port
|
|
opts.update(
|
|
mode="upstream:" + s,
|
|
)
|
|
return opts
|
|
|
|
|
|
class HTTPUpstreamProxyTest(ChainProxyTest, HTTPProxyTest):
|
|
pass
|