diff options
-rw-r--r-- | libmproxy/proxy.py | 49 | ||||
-rw-r--r-- | test/test_proxy.py | 41 | ||||
-rw-r--r-- | test/tutils.py | 2 |
3 files changed, 71 insertions, 21 deletions
diff --git a/libmproxy/proxy.py b/libmproxy/proxy.py index f0640f23..6a1d8f6d 100644 --- a/libmproxy/proxy.py +++ b/libmproxy/proxy.py @@ -21,7 +21,7 @@ class ProxyError(Exception): return "ProxyError(%s, %s)"%(self.code, self.msg) -class SSLConfig: +class ProxyConfig: def __init__(self, certfile = None, ciphers = None, cacert = None, cert_wait_time=0): self.certfile = certfile self.ciphers = ciphers @@ -30,19 +30,30 @@ class SSLConfig: self.cert_wait_time = cert_wait_time -def read_chunked(fp): +def read_chunked(fp, limit): content = "" + total = 0 while 1: - line = fp.readline() + line = fp.readline(128) if line == "": raise IOError("Connection closed") if line == '\r\n' or line == '\n': continue - length = int(line,16) + try: + length = int(line,16) + except ValueError: + # FIXME: Not strictly correct - this could be from the server, in which + # case we should send a 502. + raise ProxyError(400, "Invalid chunked encoding length: %s"%line) if not length: break + total += length + if limit is not None and total > limit: + msg = "HTTP Body too large."\ + " Limit is %s, chunked content length was at least %s"%(limit, total) + raise ProxyError(509, msg) content += fp.read(length) - line = fp.readline() + line = fp.readline(5) if line != '\r\n': raise IOError("Malformed chunked body") while 1: @@ -54,15 +65,23 @@ def read_chunked(fp): return content -def read_http_body(rfile, connection, headers, all): +def read_http_body(rfile, connection, headers, all, limit): if 'transfer-encoding' in headers: if not ",".join(headers["transfer-encoding"]) == "chunked": raise IOError('Invalid transfer-encoding') - content = read_chunked(rfile) + content = read_chunked(rfile, limit) elif "content-length" in headers: - content = rfile.read(int(headers["content-length"][0])) + try: + l = int(headers["content-length"][0]) + except ValueError: + # FIXME: Not strictly correct - this could be from the server, in which + # case we should send a 502. + raise ProxyError(400, "Invalid content-length header: %s"%headers["content-length"]) + if limit is not None and l > limit: + raise ProxyError(509, "HTTP Body too large. Limit is %s, content-length was %s"%(limit, l)) + content = rfile.read(l) elif all: - content = rfile.read() + content = rfile.read(limit if limit else None) connection.close = True else: content = "" @@ -173,7 +192,7 @@ class ServerConnection: server = ssl.wrap_socket(server) server.connect((addr, self.port)) except socket.error, err: - raise ProxyError(504, 'Error connecting to "%s": %s' % (self.host, err)) + raise ProxyError(502, 'Error connecting to "%s": %s' % (self.host, err)) self.server = server self.rfile, self.wfile = server.makefile('rb'), server.makefile('wb') @@ -184,7 +203,7 @@ class ServerConnection: self.wfile.write(request._assemble()) self.wfile.flush() except socket.error, err: - raise ProxyError(504, 'Error sending data to "%s": %s' % (request.host, err)) + raise ProxyError(502, 'Error sending data to "%s": %s' % (request.host, err)) def read_response(self): line = self.rfile.readline() @@ -207,7 +226,7 @@ class ServerConnection: if self.request.method == "HEAD" or code == 204 or code == 304: content = "" else: - content = read_http_body(self.rfile, self, headers, True) + content = read_http_body(self.rfile, self, headers, True, None) return flow.Response(self.request, code, msg, headers, content) def terminate(self): @@ -288,7 +307,7 @@ class ProxyHandler(SocketServer.StreamRequestHandler): ret = utils.dummy_cert(self.config.certdir, self.config.cacert, host) time.sleep(self.config.cert_wait_time) if not ret: - raise ProxyError(400, "mitmproxy: Unable to generate dummy cert.") + raise ProxyError(502, "mitmproxy: Unable to generate dummy cert.") return ret def read_request(self, client_conn): @@ -362,7 +381,7 @@ class ProxyHandler(SocketServer.StreamRequestHandler): client_conn.close = True if value == "keep-alive": client_conn.close = False - content = read_http_body(self.rfile, client_conn, headers, False) + content = read_http_body(self.rfile, client_conn, headers, False, None) return flow.Request(client_conn, host, port, scheme, method, path, headers, content) def send_response(self, response): @@ -456,7 +475,7 @@ def process_certificate_option_group(parser, options): utils.dummy_ca(cacert) if getattr(options, "cache", None) is not None: options.cache = os.path.expanduser(options.cache) - return SSLConfig( + return ProxyConfig( certfile = options.cert, cacert = cacert, ciphers = options.ciphers, diff --git a/test/test_proxy.py b/test/test_proxy.py index 16b6034c..f0b54681 100644 --- a/test/test_proxy.py +++ b/test/test_proxy.py @@ -1,22 +1,52 @@ import cStringIO, time import libpry -from libmproxy import proxy, controller, utils, dump +from libmproxy import proxy, controller, utils, dump, flow class u_read_chunked(libpry.AutoTree): def test_all(self): s = cStringIO.StringIO("1\r\na\r\n0\r\n") - libpry.raises(IOError, proxy.read_chunked, s) + libpry.raises(IOError, proxy.read_chunked, s, None) s = cStringIO.StringIO("1\r\na\r\n0\r\n\r\n") - assert proxy.read_chunked(s) == "a" + assert proxy.read_chunked(s, None) == "a" s = cStringIO.StringIO("\r\n") - libpry.raises(IOError, proxy.read_chunked, s) + libpry.raises(IOError, proxy.read_chunked, s, None) s = cStringIO.StringIO("1\r\nfoo") - libpry.raises(IOError, proxy.read_chunked, s) + libpry.raises(IOError, proxy.read_chunked, s, None) + s = cStringIO.StringIO("foo\r\nfoo") + libpry.raises(proxy.ProxyError, proxy.read_chunked, s, None) + + +class Dummy: pass + +class u_read_http_body(libpry.AutoTree): + def test_all(self): + + d = Dummy() + h = flow.Headers() + s = cStringIO.StringIO("testing") + assert proxy.read_http_body(s, d, h, False, None) == "" + + h["content-length"] = ["foo"] + s = cStringIO.StringIO("testing") + libpry.raises(proxy.ProxyError, proxy.read_http_body, s, d, h, False, None) + + h["content-length"] = [5] + s = cStringIO.StringIO("testing") + assert len(proxy.read_http_body(s, d, h, False, None)) == 5 + s = cStringIO.StringIO("testing") + libpry.raises(proxy.ProxyError, proxy.read_http_body, s, d, h, False, 4) + + + h = flow.Headers() + s = cStringIO.StringIO("testing") + assert len(proxy.read_http_body(s, d, h, True, 4)) == 4 + s = cStringIO.StringIO("testing") + assert len(proxy.read_http_body(s, d, h, True, 100)) == 7 class u_parse_request_line(libpry.AutoTree): @@ -69,4 +99,5 @@ tests = [ uFileLike(), u_parse_request_line(), u_read_chunked(), + u_read_http_body(), ] diff --git a/test/tutils.py b/test/tutils.py index f7a49577..bed99caf 100644 --- a/test/tutils.py +++ b/test/tutils.py @@ -50,7 +50,7 @@ HTTPS_PORT = random.randint(30000, 40000) class TestMaster(controller.Master): def __init__(self, port, testq): - serv = proxy.ProxyServer(proxy.SSLConfig("data/testkey.pem"), port) + serv = proxy.ProxyServer(proxy.ProxyConfig("data/testkey.pem"), port) controller.Master.__init__(self, serv) self.testq = testq self.log = [] |