Xepor

Latest version: v0.6.0

Safety actively analyzes 687918 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 2

0.6.0

- Feature: Automatically set `--set connection_strategy=lazy` when Xepor scripts are loaded. No need to manually set the options any more 🥳
- Feature: Add {func}`xepor.InterceptedAPI.load` API for configuration before start. Check the documentation for usage details.

0.5.1

- Feature: Add compatibility with mitmproxy 9.x and Python 3.11~3.12.
- Since mitmproxy 8.x is not compatible with Python 3.11, therefore updating to mitmproxy 9.x + xepor 0.5.1 is recommended especially for Kali users with rolling updates.

0.5.0

**⚠️Breaking Change⚠️**: Incompatible API changes.

- Change: Move some constants inside {class}`~xepor.InterceptedAPI` to seperate enums: {func}`xepor.RouteType`, {func}`xepor.FlowMeta`. ([xepor/xepor83128e8](https://github.com/xepor/xepor/commit/83128e81f8c181cd23363d27c76209b9de1c49eb))
- Change: rename `reqtype` in {func}`xepor.InterceptedAPI.route` to `rtype`. The name there before is for historical reason. [xepor/xeporc6c7e83](https://github.com/xepor/xepor/commit/c6c7e8319aef95de01a0f797d9bb2c01632b7609)
- All exposed API is now type hinted and well documented! check the latest [Documentation](https://xepor.readthedocs.io/en/latest). example scripts are also updated with API change.

0.4.0

- Feature: Add compatibility with mitmproxy 8.x.

0.3.0

- Feature: Add `return_error` option for {func}`xepor.InterceptedAPI.route` ([xepor/xeporfddad13](https://github.com/xepor/xepor/commit/fddad13efc0ed08b214c4f4078e130b04deeeab0))
- Add more docs and examples. Also some tests to ensure the script stay up-to-date with version changes. ([xepor/xepor3f96bf1](https://github.com/xepor/xepor/commit/3f96bf16b8d45b9fb49485abd475b7139422e1b9))

0.2.0

**⚠️Breaking Change⚠️**: mitmproxy 7.0 contains backward-incompatible API change comparing with <=6.x, update to 7.x may need to modify all of your scripts (including those not written with Xepor). Just a change on some methods' signatures.

- Feature: Add `blacklist_domain` and `respect_proxy_headers` options for {class}`~xepor.InterceptedAPI`. Refer to [API Doc](https://xepor.readthedocs.io/en/latest/api/modules.html#xepor.InterceptedAPI) for their usage. ([xepor/xeporaa2517d](https://github.com/xepor/xepor/commit/aa2517d65f800944587a25678b1e624f84bdf13f))
- Feature: Add a debug header when client request hitting {func}`~xepor.InterceptedAPI.default_response` ([xepor/xepord57be79](https://github.com/xepor/xepor/commit/d57be794a2e8863bc8aebec070f4a78be8ec121b))
- Fix: adopt API change in mitmproxy 7.x ([xepor/xeporbeedeab](https://github.com/xepor/xepor/commit/beedeab446508bf0df82c90e05d99b5da9ee3753))
- Fix: Request is forwarded to wrong destination host when mitmproxy is start in reverse/upstream mode. ([xepor/xeporaa2517d](https://github.com/xepor/xepor/commit/aa2517d65f800944587a25678b1e624f84bdf13f)) **Be sure to start mitmproxy with `--set connection_strategy=lazy` under ANY circumstances or the upstream connection may still be wrong.**
- Update example scripts.

Page 1 of 2

Links

Releases

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.