/usr/lib/python2.7/dist-packages/mitmproxy-0.15.egg-info/PKG-INFO is in mitmproxy 0.15-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
| 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 | Metadata-Version: 1.1
Name: mitmproxy
Version: 0.15
Summary: An interactive, SSL-capable, man-in-the-middle HTTP proxy for penetration testers and software developers.
Home-page: http://mitmproxy.org
Author: Aldo Cortesi
Author-email: aldo@corte.si
License: MIT
Description: |travis| |coveralls| |downloads| |latest-release| |python-versions|
        
        ``mitmproxy`` is an interactive, SSL-capable man-in-the-middle proxy for HTTP
        with a console interface.
        
        ``mitmdump`` is the command-line version of mitmproxy. Think tcpdump for HTTP.
        
        ``libmproxy`` is the library that mitmproxy and mitmdump are built on.
        
        Documentation & Help
        --------------------
        
        Documentation, tutorials and distribution packages can be found on the
        mitmproxy website.
        
        |site|
        
        Installation Instructions are available in the docs.
        
        |docs|
        
        You can join our developer chat on Slack.
        
        |slack|
        
        Features
        --------
        
        - Intercept HTTP requests and responses and modify them on the fly.
        - Save complete HTTP conversations for later replay and analysis.
        - Replay the client-side of an HTTP conversations.
        - Replay HTTP responses of a previously recorded server.
        - Reverse proxy mode to forward traffic to a specified server.
        - Transparent proxy mode on OSX and Linux.
        - Make scripted changes to HTTP traffic using Python.
        - SSL certificates for interception are generated on the fly.
        - And much, much more.
        
        ``mitmproxy`` is tested and developed on OSX, Linux and OpenBSD.
        On Windows, only mitmdump is supported, which does not have a graphical user interface.
        
        
        
        Hacking
        -------
        
        To get started hacking on mitmproxy, make sure you have Python_ 2.7.x. with
        virtualenv_ installed (you can find installation instructions for virtualenv here_).
        Then do the following:
        
        .. code-block:: text
        
            git clone https://github.com/mitmproxy/mitmproxy.git
            git clone https://github.com/mitmproxy/netlib.git
            git clone https://github.com/mitmproxy/pathod.git
            cd mitmproxy
            ./dev
        
        
        The *dev* script will create a virtualenv environment in a directory called
        "venv.mitmproxy", and install all of mitmproxy's development requirements, plus
        all optional modules. The primary mitmproxy components - mitmproxy, netlib and
        pathod - are all installed "editable", so any changes to the source in the git
        checkouts will be reflected live in the virtualenv.
        
        To confirm that you're up and running, activate the virtualenv, and run the
        mitmproxy test suite:
        
        .. code-block:: text
        
            . ../venv.mitmproxy/bin/activate # ..\venv.mitmproxy\Scripts\activate.bat on Windows
            py.test -n 4 --cov libmproxy
        
        Note that the main executables for the project - ``mitmdump``, ``mitmproxy`` and
        ``mitmweb`` - are all created within the virtualenv. After activating the
        virtualenv, they will be on your $PATH, and you can run them like any other
        command:
        
        .. code-block:: text
        
            mitmdump --version
        
        For convenience, the project includes an autoenv_ file (`.env`_) that
        auto-activates the virtualenv when you cd into the mitmproxy directory.
        
        
        Testing
        -------
        
        If you've followed the procedure above, you already have all the development
        requirements installed, and you can simply run the test suite:
        
        .. code-block:: text
        
            py.test -n 4 --cov libmproxy
        
        Please ensure that all patches are accompanied by matching changes in the test
        suite. The project maintains 100% test coverage.
        
        
        Docs
        ----
        
        The mitmproxy documentation is build using Sphinx_, which is installed automatically if you set up a development
        environment as described above.
        After installation, you can render the documentation like this:
        
        .. code-block:: text
        
            cd docs
            make clean
            make html
            make livehtml
        
        The last command invokes `sphinx-autobuild`_, which watches the Sphinx directory and rebuilds
        the documentation when a change is detected.
        
        
        .. |site| image:: https://img.shields.io/badge/https%3A%2F%2F-mitmproxy.org-blue.svg
            :target: https://mitmproxy.org/
            :alt: mitmproxy.org
        
        .. |docs| image:: https://readthedocs.org/projects/mitmproxy/badge/
            :target: http://docs.mitmproxy.org/en/latest/
            :alt: Documentation
        
        .. |slack| image:: http://slack.mitmproxy.org/badge.svg
            :target: http://slack.mitmproxy.org/
            :alt: Slack Developer Chat
        
        .. |travis| image:: https://img.shields.io/travis/mitmproxy/mitmproxy/master.svg
            :target: https://travis-ci.org/mitmproxy/mitmproxy
            :alt: Build Status
        
        .. |coveralls| image:: https://img.shields.io/coveralls/mitmproxy/mitmproxy/master.svg
            :target: https://coveralls.io/r/mitmproxy/mitmproxy
            :alt: Coverage Status
        
        .. |downloads| image:: https://img.shields.io/pypi/dm/mitmproxy.svg?color=orange
            :target: https://pypi.python.org/pypi/mitmproxy
            :alt: Downloads
        
        .. |latest-release| image:: https://img.shields.io/pypi/v/mitmproxy.svg
            :target: https://pypi.python.org/pypi/mitmproxy
            :alt: Latest Version
        
        .. |python-versions| image:: https://img.shields.io/pypi/pyversions/mitmproxy.svg
            :target: https://pypi.python.org/pypi/mitmproxy
            :alt: Supported Python versions
        
        .. _Python: https://www.python.org/
        .. _virtualenv: https://virtualenv.pypa.io/en/latest/
        .. _here: https://virtualenv.pypa.io/en/latest/installation.html
        .. _autoenv: https://github.com/kennethreitz/autoenv
        .. _.env: https://github.com/mitmproxy/mitmproxy/blob/master/.env
        .. _Sphinx: http://sphinx-doc.org/
        .. _sphinx-autobuild: https://pypi.python.org/pypi/sphinx-autobuild
        
Platform: UNKNOWN
Classifier: License :: OSI Approved :: MIT License
Classifier: Development Status :: 5 - Production/Stable
Classifier: Environment :: Console
Classifier: Environment :: Console :: Curses
Classifier: Operating System :: MacOS :: MacOS X
Classifier: Operating System :: POSIX
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 2
Classifier: Programming Language :: Python :: 2.7
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Programming Language :: Python :: Implementation :: PyPy
Classifier: Topic :: Security
Classifier: Topic :: Internet
Classifier: Topic :: Internet :: WWW/HTTP
Classifier: Topic :: Internet :: Proxy Servers
Classifier: Topic :: Software Development :: Testing
 |