100 lines
3.8 KiB
Python
100 lines
3.8 KiB
Python
from mitmproxy import contentviews
|
|
from mitmproxy.test import tflow
|
|
from mitmproxy.test import tutils
|
|
from mitmproxy.test import taddons
|
|
from mitmproxy.net.http import Headers
|
|
|
|
from ..mitmproxy import tservers
|
|
|
|
|
|
class TestScripts(tservers.MasterTest):
|
|
def test_add_header(self, tdata):
|
|
with taddons.context() as tctx:
|
|
a = tctx.script(tdata.path("../examples/simple/add_header.py"))
|
|
f = tflow.tflow(resp=tutils.tresp())
|
|
a.response(f)
|
|
assert f.response.headers["newheader"] == "foo"
|
|
|
|
def test_custom_contentviews(self, tdata):
|
|
with taddons.context() as tctx:
|
|
tctx.script(tdata.path("../examples/simple/custom_contentview.py"))
|
|
swapcase = contentviews.get("swapcase")
|
|
_, fmt = swapcase(b"<html>Test!</html>")
|
|
assert any(b'tEST!' in val[0][1] for val in fmt)
|
|
|
|
def test_iframe_injector(self, tdata):
|
|
with taddons.context() as tctx:
|
|
sc = tctx.script(tdata.path("../examples/simple/modify_body_inject_iframe.py"))
|
|
tctx.configure(
|
|
sc,
|
|
iframe = "http://example.org/evil_iframe"
|
|
)
|
|
f = tflow.tflow(
|
|
resp=tutils.tresp(content=b"<html><body>mitmproxy</body></html>")
|
|
)
|
|
tctx.master.addons.invoke_addon(sc, "response", f)
|
|
content = f.response.content
|
|
assert b'iframe' in content and b'evil_iframe' in content
|
|
|
|
def test_modify_form(self, tdata):
|
|
with taddons.context() as tctx:
|
|
sc = tctx.script(tdata.path("../examples/simple/modify_form.py"))
|
|
|
|
form_header = Headers(content_type="application/x-www-form-urlencoded")
|
|
f = tflow.tflow(req=tutils.treq(headers=form_header))
|
|
sc.request(f)
|
|
|
|
assert f.request.urlencoded_form["mitmproxy"] == "rocks"
|
|
|
|
f.request.headers["content-type"] = ""
|
|
sc.request(f)
|
|
assert list(f.request.urlencoded_form.items()) == [("foo", "bar")]
|
|
|
|
def test_modify_querystring(self, tdata):
|
|
with taddons.context() as tctx:
|
|
sc = tctx.script(tdata.path("../examples/simple/modify_querystring.py"))
|
|
f = tflow.tflow(req=tutils.treq(path="/search?q=term"))
|
|
|
|
sc.request(f)
|
|
assert f.request.query["mitmproxy"] == "rocks"
|
|
|
|
f.request.path = "/"
|
|
sc.request(f)
|
|
assert f.request.query["mitmproxy"] == "rocks"
|
|
|
|
def test_redirect_requests(self, tdata):
|
|
with taddons.context() as tctx:
|
|
sc = tctx.script(tdata.path("../examples/simple/redirect_requests.py"))
|
|
f = tflow.tflow(req=tutils.treq(host="example.org"))
|
|
sc.request(f)
|
|
assert f.request.host == "mitmproxy.org"
|
|
|
|
def test_send_reply_from_proxy(self, tdata):
|
|
with taddons.context() as tctx:
|
|
sc = tctx.script(tdata.path("../examples/simple/send_reply_from_proxy.py"))
|
|
f = tflow.tflow(req=tutils.treq(host="example.com", port=80))
|
|
sc.request(f)
|
|
assert f.response.content == b"Hello World"
|
|
|
|
def test_dns_spoofing(self, tdata):
|
|
with taddons.context() as tctx:
|
|
sc = tctx.script(tdata.path("../examples/complex/dns_spoofing.py"))
|
|
|
|
original_host = "example.com"
|
|
|
|
host_header = Headers(host=original_host)
|
|
f = tflow.tflow(req=tutils.treq(headers=host_header, port=80))
|
|
|
|
tctx.master.addons.invoke_addon(sc, "requestheaders", f)
|
|
|
|
# Rewrite by reverse proxy mode
|
|
f.request.scheme = "https"
|
|
f.request.port = 443
|
|
|
|
tctx.master.addons.invoke_addon(sc, "request", f)
|
|
|
|
assert f.request.scheme == "http"
|
|
assert f.request.port == 80
|
|
|
|
assert f.request.headers["Host"] == original_host
|