aboutsummaryrefslogtreecommitdiffstats
path: root/docs/src
diff options
context:
space:
mode:
authorkira0204 <rshtmudgal@gmail.com>2018-02-24 23:47:55 +0530
committerkira0204 <rshtmudgal@gmail.com>2018-02-24 23:47:55 +0530
commitf31ce49aa59558b354e6524d5370eb36f055c876 (patch)
treeeb546826683a1803e469da24982b0b2283c6e00a /docs/src
parenteee109117f956600261bc938be52040d1474a97f (diff)
downloadmitmproxy-f31ce49aa59558b354e6524d5370eb36f055c876.tar.gz
mitmproxy-f31ce49aa59558b354e6524d5370eb36f055c876.tar.bz2
mitmproxy-f31ce49aa59558b354e6524d5370eb36f055c876.zip
Fixing #2913
Diffstat (limited to 'docs/src')
-rw-r--r--docs/src/content/concepts-modes.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/docs/src/content/concepts-modes.md b/docs/src/content/concepts-modes.md
index 86bb7b0f..7a0b835a 100644
--- a/docs/src/content/concepts-modes.md
+++ b/docs/src/content/concepts-modes.md
@@ -157,20 +157,20 @@ There are various use-cases:
example.com domain and get all requests recorded in mitmproxy.
- Say you have some toy project that should get SSL support. Simply set up
mitmproxy as a reverse proxy on port 443 and you're done (`mitmdump -p 443
- -R http://localhost:80/`). Mitmproxy auto-detects TLS traffic and intercepts
+ --mode reverse:http://localhost:80/`). Mitmproxy auto-detects TLS traffic and intercepts
it dynamically. There are better tools for this specific task, but mitmproxy
is very quick and simple way to set up an SSL-speaking server.
- Want to add a non-SSL-capable compression proxy in front of your server? You
- could even spawn a mitmproxy instance that terminates SSL (`-R http://...`),
+ could even spawn a mitmproxy instance that terminates SSL (`--mode reverse:http://...`),
point it to the compression proxy and let the compression proxy point to a
- SSL-initiating mitmproxy (`-R https://...`), which then points to the real
+ SSL-initiating mitmproxy (`--mode reverse:https://...`), which then points to the real
server. As you see, it's a fairly flexible thing.
### Host Header
In reverse proxy mode, mitmproxy automatically rewrites the Host header to match
the upstream server. This allows mitmproxy to easily connect to existing
-endpoints on the open web (e.g. `mitmproxy -R https://example.com`). You can
+endpoints on the open web (e.g. `mitmproxy --mode reverse:https://example.com`). You can
disable this behaviour with the `keep_host_header` option.
However, keep in mind that absolute URLs within the returned document or HTTP