mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-23 08:11:00 +00:00
126 lines
3.9 KiB
Python
126 lines
3.9 KiB
Python
import argparse
|
|
from libmproxy import cmdline
|
|
from libmproxy.proxy.config import process_proxy_options
|
|
from libmproxy.proxy.connection import ServerConnection
|
|
from libmproxy.proxy.primitives import ProxyError
|
|
from libmproxy.proxy.server import DummyServer, ProxyServer
|
|
import tutils
|
|
from libpathod import test
|
|
from netlib import http, tcp
|
|
import mock
|
|
|
|
|
|
def test_proxy_error():
|
|
p = ProxyError(111, "msg")
|
|
assert str(p)
|
|
|
|
|
|
class TestServerConnection:
|
|
def setUp(self):
|
|
self.d = test.Daemon()
|
|
|
|
def tearDown(self):
|
|
self.d.shutdown()
|
|
|
|
def test_simple(self):
|
|
sc = ServerConnection((self.d.IFACE, self.d.port))
|
|
sc.connect()
|
|
f = tutils.tflow()
|
|
f.server_conn = sc
|
|
f.request.path = "/p/200:da"
|
|
sc.send(f.request._assemble())
|
|
assert http.read_response(sc.rfile, f.request.method, 1000)
|
|
assert self.d.last_log()
|
|
|
|
sc.finish()
|
|
|
|
def test_terminate_error(self):
|
|
sc = ServerConnection((self.d.IFACE, self.d.port))
|
|
sc.connect()
|
|
sc.connection = mock.Mock()
|
|
sc.connection.recv = mock.Mock(return_value=False)
|
|
sc.connection.flush = mock.Mock(side_effect=tcp.NetLibDisconnect)
|
|
sc.finish()
|
|
|
|
def test_repr(self):
|
|
sc = tutils.tserver_conn()
|
|
assert "address:22" in repr(sc)
|
|
assert "ssl" not in repr(sc)
|
|
sc.ssl_established = True
|
|
assert "ssl" in repr(sc)
|
|
sc.sni = "foo"
|
|
assert "foo" in repr(sc)
|
|
|
|
|
|
class TestProcessProxyOptions:
|
|
def p(self, *args):
|
|
parser = tutils.MockParser()
|
|
cmdline.common_options(parser)
|
|
opts = parser.parse_args(args=args)
|
|
return parser, process_proxy_options(parser, opts)
|
|
|
|
def assert_err(self, err, *args):
|
|
tutils.raises(err, self.p, *args)
|
|
|
|
def assert_noerr(self, *args):
|
|
m, p = self.p(*args)
|
|
assert p
|
|
return p
|
|
|
|
def test_simple(self):
|
|
assert self.p()
|
|
|
|
def test_confdir(self):
|
|
with tutils.tmpdir() as confdir:
|
|
self.assert_noerr("--confdir", confdir)
|
|
|
|
@mock.patch("libmproxy.platform.resolver", None)
|
|
def test_no_transparent(self):
|
|
self.assert_err("transparent mode not supported", "-T")
|
|
|
|
@mock.patch("libmproxy.platform.resolver")
|
|
def test_transparent_reverse(self, _):
|
|
self.assert_err("mutually exclusive", "-R", "http://localhost", "-T")
|
|
self.assert_noerr("-T")
|
|
self.assert_err("Invalid server specification", "-R", "reverse")
|
|
self.assert_noerr("-R", "http://localhost")
|
|
|
|
def test_client_certs(self):
|
|
with tutils.tmpdir() as confdir:
|
|
self.assert_noerr("--client-certs", confdir)
|
|
self.assert_err("directory does not exist", "--client-certs", "nonexistent")
|
|
|
|
def test_certs(self):
|
|
with tutils.tmpdir() as confdir:
|
|
self.assert_noerr("--cert", tutils.test_data.path("data/testkey.pem"))
|
|
self.assert_err("does not exist", "--cert", "nonexistent")
|
|
|
|
def test_auth(self):
|
|
p = self.assert_noerr("--nonanonymous")
|
|
assert p.authenticator
|
|
|
|
p = self.assert_noerr("--htpasswd", tutils.test_data.path("data/htpasswd"))
|
|
assert p.authenticator
|
|
self.assert_err("malformed htpasswd file", "--htpasswd", tutils.test_data.path("data/htpasswd.invalid"))
|
|
|
|
p = self.assert_noerr("--singleuser", "test:test")
|
|
assert p.authenticator
|
|
self.assert_err("invalid single-user specification", "--singleuser", "test")
|
|
|
|
|
|
class TestProxyServer:
|
|
@tutils.SkipWindows # binding to 0.0.0.0:1 works without special permissions on Windows
|
|
def test_err(self):
|
|
parser = argparse.ArgumentParser()
|
|
cmdline.common_options(parser)
|
|
opts = parser.parse_args(args=[])
|
|
tutils.raises("error starting proxy server", ProxyServer, opts, 1)
|
|
|
|
|
|
class TestDummyServer:
|
|
def test_simple(self):
|
|
d = DummyServer(None)
|
|
d.start_slave()
|
|
d.shutdown()
|
|
|