* Initialize skeleton electron app
* Attempt to open devtools
* Electron free
* Initialize public/devtools
* Add basic support for static file serving and chrome devtools.
1. No cache header management for static file serving yet.
2. No chunked encoded responses for static files yet.
3. Chrome Devtool initialization.
* Fix static serving with query params
* profile using py-spy
* Complete websocket client loop
* lint check
* Add support for building websocket frames
* Remove redundant CDT params
* Lint check
* Refactor web server base plugin name
* Devtools integrated, need more polish
* Add START_TIME global var
* lint fix
* Remove outdated chrome rdp
* Add FAQs
* Add FAQs
* socket_connection decorator + context manager
* Defer SSL handshake and plugin initialize until protocol handler thread
has started.
This is a follow up to this PR
https://github.com/abhinavsingh/proxy.py/pull/111
* Add tests for new_socket_connection and its friend socket_connection
* Address an issue which came back after being fixed in https://github.com/abhinavsingh/proxy.py/pull/92
* Lint fixes
* uff ye str and bytes
* Remove explicit flushes outside of write ready descriptor handlers
* add links to import proxy
* Only try websocket upgrade if a route is registered
* Add plugin_examples.WebServerPlugin and use precision logging for levelname
* Remove redundant comments
* Add --devtools-ws-path flag
* Add on_websocket_open and on_websocket_close callbacks
* Add empty stubs for incomplete CDT responses
* Ensure client is ready before final flush
* Shutdown on write side of socket, may be client is still reading
* Since client.closed can be set, explicitly call client.connection.closed
* Add ModifyPostDataPlugin example.
Was first asked and referenced here
https://github.com/abhinavsingh/proxy.py/issues/115
* Start adding TestHttpProxyPlugin
* Fixes#116
* Use selectors.DefaultSelector instead of select.select
* Unregister to avoid endless loop
* Cleanup event register/unregiter
* Cleanup event registration
* Add google-fluentd.conf. Use if running proxy.py on Google Cloud.
* Send server error from proxy if for whatever reason we fail to process the request (or should it be BadRequest based upon situation?)
* Fix tests for selectors
* Only include proxy.py and tests.py in coverage report
* Only include proxy.py for coverage
* remove redundant integration test, will rewrite using mocks
* Proper unregister of events
* Change multi core accept model to avoid client TIME_WAIT. Fixes#97
* Catch BlockingIOError
* Remove redundant comments
* Simplify with AcceptorPool
* Pass family to acceptor processes
* Remove plugin.access_log for core plugins
* Return 501 not implemented for web socket upgrade requests to inbuilt HTTP server
* Add support for websocket upgrade
* Websocket frame parser
* Enable websocket based routing
* Add WebsocketClient
* Websocket
* mypy fixes
* Sync GitHub workflow lint and makefile lint commands.
For now comment out tests which are broken :( New tests coming next.
* Start fixing tests for new code
* Fix formatting
* Fix main tests
* Add worker tests
* GitHub only ran windows tests, may be require unique names
* Use 3.6/3.7 dev versions for GitHub actions
* Add AcceptorPool test
* Add x64 and x86 matrix for actions tests
* Dont use dev versions since they dont exists for x86
* Ha no x86 support itself
* Add backer link
* Remove support badge for 3.5 as it doesnt support typing
* Update read me with changed architecture notes
* Update read me with changed architecture notes
* Add `import proxy` usage instructions.
* Add pydoc reference for developers
* Put pydoc as internal documentation
* Add tests and mypy compliance for tests
* Add pragma: no cover for abstract class methods
* mypy --strict compliance for tests.py
* Refactor and test coverage
* lint fixes
* Handle OSError thrown when curl --proxy-cacert flag is invalid
* Add server-cert
* Dockerfile dont need --ipv4 since now its auto-detected and deprecated
* Add make server-cert info
* Add support for HTTPS interception.
1) Start as
proxy.py --ca-key-file ca-key.pem --ca-cert-file ca-cert.pem --ca-signing-key-file ca-signing-key.pem
2) Test using curl
curl -v -L -x proxy.py:8899 --cacert ca-cert.pem https://google.com
Now proxy.py is able to decrypt HTTPS traffic between curl and
google.com. Generated certificates are stored under ~/.proxy.py
directory.
* Add comments for why interception do not work if client is communicating with proxy.py over https
* Fix tests
* Exit with message when trying to https intercept and also serve over https
* lint
* Disable OP_NO_SSLv2, OP_NO_SSLv3, OP_NO_TLSv1, OP_NO_TLSv1_1 when wrapping upstream server socket
* Ensure client.conn.shutdown is called if necessary.
* Add mypy check for plugin_examples.py
* Exception handling when client sends invalid requests
* Verify plugin_examples
* mypy compat
* HttpRequestRejected
* Use pipes instead of queues.
Possible solution for #68
* Handle ConnectionRefusedError
* Close corresponding pipes on shutdown
* Abstract classes for plugins.
* Add github workflows
* Use pytest for github workflow
* Add Windows/Mac workflows
* Use os.matrix
* 3.8 and 3.9 probably dont exists yet
* Do not fail-fast, also python 3.5 seems to be throwing syntax error for typing
* autopep8
* Disable windows-latest workflow which seems to hang
No use mirrors
Enforce coverage3
Add coverage badge and use python -m to invoke coverage
Enforce pip3, remove SyntaxError reported line
Use develop branch for coverage status