Documentation ¶
Overview ¶
Taken from $GOROOT/src/pkg/net/http/chunked needed to write https responses to client.
Package goproxy provides a customizable HTTP proxy, supporting hijacking HTTPS connection.
The intent of the proxy, is to be usable with reasonable amount of traffic yet, customizable and programable.
The proxy itself is simply an `net/http` handler.
Typical usage is
proxy := goproxy.New() proxy.OnRequest(..conditions..).Do(..requesthandler..) proxy.OnRequest(..conditions..).DoFunc(..requesthandlerFunction..) proxy.OnResponse(..conditions..).Do(..responesHandler..) proxy.OnResponse(..conditions..).DoFunc(..responesHandlerFunction..) http.ListenAndServe(":8080", proxy)
Adding a header to each request
proxy.OnRequest().DoFunc(func(r *http.Request,ctx context.Context) (*http.Request, *http.Response){ r.Header.Set("X-GoProxy","1") return r, nil })
Note that the function is called before the proxy sends the request to the server ¶
For printing the content type of all incoming responses
proxy.OnResponse().DoFunc(func(r *http.Response, ctx context.Context)*http.Response{ println(CtxReq(ctx).Host,"->",r.Header.Get("Content-Type")) return r })
note that we used the ProxyCtx context variable here. It contains the request and the response (Req and Resp, Resp is nil if unavailable) of this specific client interaction with the proxy.
To print the content type of all responses from a certain url, we'll add a ReqCondition to the OnResponse function:
proxy.OnResponse(goproxy.UrlIs("golang.org/pkg")).DoFunc(func(r *http.Response, ctx context.Context)*http.Response{ println(CtxReq(ctx).Host,"->",r.Header.Get("Content-Type")) return r })
We can write the condition ourselves, conditions can be set on request and on response
var random = ReqConditionFunc(func(r *http.Request) bool { return rand.Intn(1) == 0 }) var hasGoProxyHeader = RespConditionFunc(func(resp *http.Response,req *http.Request)bool { return resp.Header.Get("X-GoProxy") != "" })
Caution! If you give a RespCondition to the OnRequest function, you'll get a run time panic! It doesn't make sense to read the response, if you still haven't got it!
Finally, we have convenience function to throw a quick response
proxy.OnResponse(hasGoProxyHeader).DoFunc(func(r*http.Response,ctx context.Context)*http.Response { r.Body.Close() return goproxy.ForbiddenTextResponse(CtxReq(ctx),"Can't see response with X-GoProxy header!") })
we close the body of the original repsonse, and return a new 403 response with a short message.
Example use cases:
1. https://github.com/elazarl/goproxy2/tree/master/examples/goproxy-avgsize
To measure the average size of an Html served in your site. One can ask all the QA team to access the website by a proxy, and the proxy will measure the average size of all text/html responses from your host.
2. [not yet implemented]
All requests to your web servers should be directed through the proxy, when the proxy will detect html pieces sent as a response to AJAX request, it'll send a warning email.
3. https://github.com/elazarl/goproxy2/blob/master/examples/goproxy-httpdump/
Generate a real traffic to your website by real users using through proxy. Record the traffic, and try it again for more real load testing.
4. https://github.com/elazarl/goproxy2/tree/master/examples/goproxy-no-reddit-at-worktime
Will allow browsing to reddit.com between 8:00am and 17:00pm
5. https://github.com/elazarl/goproxy2/tree/master/examples/goproxy-jquery-version
Will warn if multiple versions of jquery are used in the same domain.
6. https://github.com/elazarl/goproxy2/blob/master/examples/goproxy-upside-down-ternet/
Modifies image files in an HTTP response via goproxy's image extension found in ext/.
Index ¶
- Constants
- Variables
- func CtxConnectRequest(ctx context.Context) *http.Request
- func CtxError(ctx context.Context) error
- func CtxReq(ctx context.Context) *http.Request
- func CtxResp(ctx context.Context) *http.Response
- func CtxRoundTripper(ctx context.Context) http.RoundTripper
- func CtxWithError(ctx context.Context, err error) context.Context
- func CtxWithReq(ctx context.Context, r *http.Request) context.Context
- func CtxWithResp(ctx context.Context, r *http.Response) context.Context
- func CtxWithRoundTripper(ctx context.Context, rt http.RoundTripper) context.Context
- func NewResponse(r *http.Request, contentType string, status int, body string) *http.Response
- func TLSConfigFromCA(ca *tls.Certificate) func(req *http.Request, host string) (*tls.Config, error)
- func TextResponse(r *http.Request, text string) *http.Response
- type CloseWriteReader
- type ConnectAction
- type ConnectActionLiteral
- type CounterEncryptorRand
- type FuncHttpsHandler
- type FuncReqHandler
- type FuncRespHandler
- type HttpsHandler
- type Logger
- type Loggers
- type ProxyConds
- type ProxyHttpServer
- func (proxy *ProxyHttpServer) NewConnectDialToProxy(https_proxy string) func(ctx context.Context, network, addr string) (net.Conn, error)
- func (proxy *ProxyHttpServer) OnRequest(conds ...ReqCondition) *ReqProxyConds
- func (proxy *ProxyHttpServer) OnResponse(conds ...RespCondition) *ProxyConds
- func (proxy *ProxyHttpServer) ServeHTTP(w http.ResponseWriter, r *http.Request)
- type ReqCondition
- type ReqConditionFunc
- func DstHostIs(host string) ReqConditionFunc
- func Not(r ReqCondition) ReqConditionFunc
- func ReqHostIs(hosts ...string) ReqConditionFunc
- func ReqHostMatches(regexps ...*regexp.Regexp) ReqConditionFunc
- func UrlHasPrefix(prefix string) ReqConditionFunc
- func UrlIs(urls ...string) ReqConditionFunc
- func UrlMatches(re *regexp.Regexp) ReqConditionFunc
- type ReqHandler
- type ReqProxyConds
- func (pcond *ReqProxyConds) Do(h ReqHandler)
- func (pcond *ReqProxyConds) DoFunc(f func(req *http.Request) (*http.Request, *http.Response))
- func (pcond *ReqProxyConds) HandleConnect(h HttpsHandler)
- func (pcond *ReqProxyConds) HandleConnectFunc(f func(r *http.Request, host string) (*http.Request, *ConnectAction, string))
- func (pcond *ReqProxyConds) HijackConnect(f func(req *http.Request, client net.Conn))
- type RespCondition
- type RespConditionFunc
- type RespHandler
- type WriterLogger
Constants ¶
const ( ConnectAccept = iota ConnectReject ConnectMitm ConnectHijack ConnectHTTPMitm ConnectProxyAuthHijack )
const ( ContentTypeText = "text/plain" ContentTypeHtml = "text/html" )
Variables ¶
var ( OkConnect = &ConnectAction{Action: ConnectAccept, TLSConfig: TLSConfigFromCA(&GoproxyCa)} MitmConnect = &ConnectAction{Action: ConnectMitm, TLSConfig: TLSConfigFromCA(&GoproxyCa)} HTTPMitmConnect = &ConnectAction{Action: ConnectHTTPMitm, TLSConfig: TLSConfigFromCA(&GoproxyCa)} RejectConnect = &ConnectAction{Action: ConnectReject, TLSConfig: TLSConfigFromCA(&GoproxyCa)} )
var CA_CERT = []byte(`-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----`)
var CA_KEY = []byte(`-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----`)
var ErrorLogger = Loggers{Error: StderrLogger, Debug: NopLogger}
var GoproxyCa, _ = tls.X509KeyPair(CA_CERT, CA_KEY)
var NopLogger = emptyLogger{}
var StderrLogger = WriterLogger{os.Stderr}
var VerboseLogger = Loggers{Error: StderrLogger, Debug: NopLogger}
Functions ¶
func CtxRoundTripper ¶
func CtxRoundTripper(ctx context.Context) http.RoundTripper
func CtxWithRoundTripper ¶
func NewResponse ¶
Will generate a valid http response to the given request the response will have the given contentType, and http status. Typical usage, refuse to process requests to local addresses:
proxy.OnRequest(IsLocalHost()).DoFunc(func(r *http.Request, ctx *goproxy.ProxyCtx) (*http.Request,*http.Response) { return nil,NewResponse(r,goproxy.ContentTypeHtml,http.StatusUnauthorized, `<!doctype html><html><head><title>Can't use proxy for local addresses</title></head><body/></html>`) })
func TLSConfigFromCA ¶
Types ¶
type CloseWriteReader ¶
type CloseWriteReader interface { io.ReadWriter CloseWrite() error CloseRead() error }
type ConnectAction ¶
type ConnectActionLiteral ¶
type ConnectActionLiteral int
type CounterEncryptorRand ¶
type CounterEncryptorRand struct {
// contains filtered or unexported fields
}
func NewCounterEncryptorRandFromKey ¶
func NewCounterEncryptorRandFromKey(key interface{}, seed []byte) (r CounterEncryptorRand, err error)
func (*CounterEncryptorRand) Read ¶
func (c *CounterEncryptorRand) Read(b []byte) (n int, err error)
func (*CounterEncryptorRand) Seed ¶
func (c *CounterEncryptorRand) Seed(b []byte)
type FuncHttpsHandler ¶
A wrapper that would convert a function to a HttpsHandler interface type
var AlwaysMitm FuncHttpsHandler = func(req *http.Request, host string) (*http.Request, *ConnectAction, string) { return req, MitmConnect, host }
AlwaysMitm is a HttpsHandler that always eavesdrop https connections, for example to eavesdrop all https connections to www.google.com, we can use
proxy.OnRequest(goproxy.ReqHostIs("www.google.com")).HandleConnect(goproxy.AlwaysMitm)
var AlwaysReject FuncHttpsHandler = func(req *http.Request, host string) (*http.Request, *ConnectAction, string) { return req, RejectConnect, host }
AlwaysReject is a HttpsHandler that drops any CONNECT request, for example, this code will disallow connections to hosts on any other port than 443
proxy.OnRequest(goproxy.Not(goproxy.ReqHostMatches(regexp.MustCompile(":443$"))). HandleConnect(goproxy.AlwaysReject)
func (FuncHttpsHandler) HandleConnect ¶
func (f FuncHttpsHandler) HandleConnect(req *http.Request, host string) (*http.Request, *ConnectAction, string)
FuncHttpsHandler should implement the RespHandler interface
type FuncReqHandler ¶
A wrapper that would convert a function to a ReqHandler interface type
type FuncRespHandler ¶
A wrapper that would convert a function to a RespHandler interface type
type HttpsHandler ¶
type HttpsHandler interface {
HandleConnect(req *http.Request, host string) (*http.Request, *ConnectAction, string)
}
When a client send a CONNECT request to a host, the request is filtered through all the HttpsHandlers the proxy has, and if one returns true, the connection is sniffed using Man in the Middle attack. That is, the proxy will create a TLS connection with the client, another TLS connection with the destination the client wished to connect to, and would send back and forth all messages from the server to the client and vice versa. The request and responses sent in this Man In the Middle channel are filtered through the usual flow (request and response filtered through the ReqHandlers and RespHandlers)
type Logger ¶
type Logger interface {
Log(keyvals ...interface{}) error
}
borrowed from github.com/go-kit/kit log
type ProxyConds ¶
type ProxyConds struct {
// contains filtered or unexported fields
}
ProxyConds is used to aggregate RespConditions for a ProxyHttpServer. Upon calling ProxyConds.Do, it will register a RespHandler that would handle the HTTP response from remote server if all conditions on the HTTP response are met.
func (*ProxyConds) Do ¶
func (pcond *ProxyConds) Do(h RespHandler)
ProxyConds.Do will register the RespHandler on the proxy, h.Handle(resp,ctx) will be called on every request that matches the conditions aggregated in pcond.
type ProxyHttpServer ¶
type ProxyHttpServer struct { // setting Verbose to true will log information on each request sent to the proxy Verbose bool Loggers Loggers NonproxyHandler http.Handler Tr *http.Transport // ConnectDial will be used to create TCP connections for CONNECT requests // if nil Tr.Dial will be used ConnectDial func(ctx context.Context, network string, addr string) (net.Conn, error) // contains filtered or unexported fields }
The basic proxy type. Implements http.Handler.
func (*ProxyHttpServer) NewConnectDialToProxy ¶
func (*ProxyHttpServer) OnRequest ¶
func (proxy *ProxyHttpServer) OnRequest(conds ...ReqCondition) *ReqProxyConds
ProxyHttpServer.OnRequest Will return a temporary ReqProxyConds struct, aggregating the given condtions. You will use the ReqProxyConds struct to register a ReqHandler, that would filter the request, only if all the given ReqCondition matched. Typical usage:
proxy.OnRequest(UrlIs("example.com/foo"),UrlMatches(regexp.MustParse(`.*\.exampl.\com\./.*`)).Do(...)
func (*ProxyHttpServer) OnResponse ¶
func (proxy *ProxyHttpServer) OnResponse(conds ...RespCondition) *ProxyConds
OnResponse is used when adding a response-filter to the HTTP proxy, usual pattern is
proxy.OnResponse(cond1,cond2).Do(handler) // handler.Handle(resp,ctx) will be used // if cond1.HandleResp(resp) && cond2.HandleResp(resp)
func (*ProxyHttpServer) ServeHTTP ¶
func (proxy *ProxyHttpServer) ServeHTTP(w http.ResponseWriter, r *http.Request)
Standard net/http function. Shouldn't be used directly, http.Serve will use it.
type ReqCondition ¶
type ReqCondition interface { RespCondition HandleReq(req *http.Request) bool }
ReqCondition.HandleReq will decide whether or not to use the ReqHandler on an HTTP request before sending it to the remote server
func SrcIpIs ¶
func SrcIpIs(ips ...string) ReqCondition
SrcIpIs returns a ReqCondition testing whether the source IP of the request is one of the given strings
type ReqConditionFunc ¶
ReqConditionFunc.HandleReq(req) <=> ReqConditionFunc(req)
var IsLocalHost ReqConditionFunc = func(req *http.Request) bool {
return req.URL.Host == "::1" ||
req.URL.Host == "0:0:0:0:0:0:0:1" ||
localHostIpv4.MatchString(req.URL.Host) ||
req.URL.Host == "localhost"
}
IsLocalHost checks whether the destination host is explicitly local host (buggy, there can be IPv6 addresses it doesn't catch)
func DstHostIs ¶
func DstHostIs(host string) ReqConditionFunc
DstHostIs returns a ReqCondition testing wether the host in the request url is the given string
func Not ¶
func Not(r ReqCondition) ReqConditionFunc
Not returns a ReqCondition negating the given ReqCondition
func ReqHostIs ¶
func ReqHostIs(hosts ...string) ReqConditionFunc
ReqHostIs returns a ReqCondition, testing whether the host to which the request is directed to equal to one of the given strings
func ReqHostMatches ¶
func ReqHostMatches(regexps ...*regexp.Regexp) ReqConditionFunc
ReqHostMatches returns a ReqCondition, testing whether the host to which the request was directed to matches any of the given regular expressions.
func UrlHasPrefix ¶
func UrlHasPrefix(prefix string) ReqConditionFunc
UrlHasPrefix returns a ReqCondition checking wether the destination URL the proxy client has requested has the given prefix, with or without the host. For example UrlHasPrefix("host/x") will match requests of the form 'GET host/x', and will match requests to url 'http://host/x'
func UrlIs ¶
func UrlIs(urls ...string) ReqConditionFunc
UrlIs returns a ReqCondition, testing whether or not the request URL is one of the given strings with or without the host prefix. UrlIs("google.com/","foo") will match requests 'GET /' to 'google.com', requests `'GET google.com/' to any host, and requests of the form 'GET foo'.
func UrlMatches ¶
func UrlMatches(re *regexp.Regexp) ReqConditionFunc
UrlMatches returns a ReqCondition testing whether the destination URL of the request matches the given regexp, with or without prefix
func (ReqConditionFunc) HandleResp ¶
ReqConditionFunc cannot test responses. It only satisfies RespCondition interface so that to be usable as RespCondition.
type ReqHandler ¶
ReqHandler will "tamper" with the request coming to the proxy server If Handle returns req,nil the proxy will send the returned request to the destination server. If it returns nil,resp the proxy will skip sending any requests, and will simply return the response `resp` to the client.
type ReqProxyConds ¶
type ReqProxyConds struct {
// contains filtered or unexported fields
}
ReqProxyConds aggregate ReqConditions for a ProxyHttpServer. Upon calling Do, it will register a ReqHandler that would handle the request if all conditions on the HTTP request are met.
func (*ReqProxyConds) Do ¶
func (pcond *ReqProxyConds) Do(h ReqHandler)
ReqProxyConds.Do will register the ReqHandler on the proxy, the ReqHandler will handle the HTTP request if all the conditions aggregated in the ReqProxyConds are met. Typical usage:
proxy.OnRequest().Do(handler) // will call handler.Handle(req) on every request to the proxy proxy.OnRequest(cond1,cond2).Do(handler) // given request to the proxy, will test if cond1.HandleReq(req) && cond2.HandleReq(req) are true // if they are, will call handler.Handle(req)
func (*ReqProxyConds) HandleConnect ¶
func (pcond *ReqProxyConds) HandleConnect(h HttpsHandler)
HandleConnect is used when proxy receives an HTTP CONNECT request, it'll then use the HttpsHandler to determine what should it do with this request. The handler returns a ConnectAction struct, the Action field in the ConnectAction struct returned will determine what to do with this request. ConnectAccept will simply accept the request forwarding all bytes from the client to the remote host, ConnectReject will close the connection with the client, and ConnectMitm, will assume the underlying connection is an HTTPS connection, and will use Man in the Middle attack to eavesdrop the connection. All regular handler will be active on this eavesdropped connection. The ConnectAction struct contains possible tlsConfig that will be used for eavesdropping. If nil, the proxy will use the default tls configuration.
proxy.OnRequest().HandleConnect(goproxy.AlwaysReject) // rejects all CONNECT requests
func (*ReqProxyConds) HandleConnectFunc ¶
func (pcond *ReqProxyConds) HandleConnectFunc(f func(r *http.Request, host string) (*http.Request, *ConnectAction, string))
HandleConnectFunc is equivalent to HandleConnect, for example, accepting CONNECT request if they contain a password in header
io.WriteString(h,password) passHash := h.Sum(nil) proxy.OnRequest().HandleConnectFunc(func(host string, ctx context.Context) (*ConnectAction, string) { c := sha1.New() io.WriteString(c,CtxReq(ctx).Header.Get("X-GoProxy-Auth")) if c.Sum(nil) == passHash { return OkConnect, host } return RejectConnect, host })
func (*ReqProxyConds) HijackConnect ¶
func (pcond *ReqProxyConds) HijackConnect(f func(req *http.Request, client net.Conn))
type RespCondition ¶
RespCondition.HandleReq will decide whether or not to use the RespHandler on an HTTP response before sending it to the proxy client. Note that resp might be nil, in case there was an error sending the request.
func ContentTypeIs ¶
func ContentTypeIs(typ string, types ...string) RespCondition
ContentTypeIs returns a RespCondition testing whether the HTTP response has Content-Type header equal to one of the given strings.
type RespConditionFunc ¶
RespConditionFunc.HandleResp(resp) <=> RespConditionFunc(resp)
func (RespConditionFunc) HandleResp ¶
type RespHandler ¶
type RespHandler interface {
Handle(req *http.Request, resp *http.Response) (*http.Request, *http.Response)
}
after the proxy have sent the request to the destination server, it will "filter" the response through the RespHandlers it has. The proxy server will send to the client the response returned by the RespHandler. In case of error, resp will be nil, and ctx.RoundTrip.Error will contain the error
type WriterLogger ¶
func (WriterLogger) Log ¶
func (w WriterLogger) Log(keyvals ...interface{}) error
Source Files ¶
Directories ¶
Path | Synopsis |
---|---|
examples
|
|
goproxy-yui-minify
This example would minify standalone Javascript files (identified by their content type) using the command line utility YUI compressor http://yui.github.io/yuicompressor/ Example usage: ./yui -java /usr/local/bin/java -yuicompressor ~/Downloads/yuicompressor-2.4.8.jar $ curl -vx localhost:8080 http://golang.org/lib/godoc/godocs.js (function(){function g(){var u=$("#search");if(u.length===0){return}function t(){if(....
|
This example would minify standalone Javascript files (identified by their content type) using the command line utility YUI compressor http://yui.github.io/yuicompressor/ Example usage: ./yui -java /usr/local/bin/java -yuicompressor ~/Downloads/yuicompressor-2.4.8.jar $ curl -vx localhost:8080 http://golang.org/lib/godoc/godocs.js (function(){function g(){var u=$("#search");if(u.length===0){return}function t(){if(.... |
ext
|
|
html
extension to goproxy that will allow you to easily filter web browser related content.
|
extension to goproxy that will allow you to easily filter web browser related content. |