Documentation
¶
Index ¶
- func DecompressBody(Body []byte, encoding []string, content []string) (parsedBody string)
- func ParseDateString(dt string) (time.Time, error)
- func PrettyStruct(data interface{}) (string, error)
- func StringToSpec(ja3 string, userAgent string) (*utls.ClientHelloSpec, error)
- func ToHTTP2Settings(h2Settings *H2Settings) (http2Settings *http2.HTTP2Settings)
- type ContextKeyHeader
- type Cookie
- type CycleTLS
- type Extensions
- type H2Settings
- type Options
- type Response
- type SocksDialer
- type TLSExtensions
- type Time
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func DecompressBody ¶
DecompressBody unzips compressed data
func ParseDateString ¶
ParseDateString takes a string and passes it through Approxidate Parses into a time.Time
func PrettyStruct ¶
func StringToSpec ¶
func StringToSpec(ja3 string, userAgent string) (*utls.ClientHelloSpec, error)
StringToSpec creates a ClientHelloSpec based on a JA3 string
func ToHTTP2Settings ¶
func ToHTTP2Settings(h2Settings *H2Settings) (http2Settings *http2.HTTP2Settings)
Types ¶
type ContextKeyHeader ¶
type ContextKeyHeader struct{}
ContextKeyHeader Users of context.WithValue should define their own types for keys
type Cookie ¶
type Cookie struct { Name string `json:"name"` Value string `json:"value"` Path string `json:"path"` // optional Domain string `json:"domain"` // optional Expires time.Time JSONExpires Time `json:"expires"` // optional RawExpires string `json:"rawExpires"` // for reading cookies only // MaxAge=0 means no 'Max-Age' attribute specified. // MaxAge<0 means delete cookie now, equivalently 'Max-Age: 0' // MaxAge>0 means Max-Age attribute present and given in seconds MaxAge int `json:"maxAge"` Secure bool `json:"secure"` HTTPOnly bool `json:"httpOnly"` SameSite http.SameSite `json:"sameSite"` Raw string Unparsed []string `json:"unparsed"` // Raw text of unparsed attribute-value pairs }
A Cookie represents an HTTP cookie as sent in the Set-Cookie header of an HTTP response or the Cookie header of an HTTP request.
See https://tools.ietf.org/html/rfc6265 for details. Stolen from Net/http/cookies
type Extensions ¶
type Extensions struct { //PKCS1WithSHA256 SignatureScheme = 0x0401 //PKCS1WithSHA384 SignatureScheme = 0x0501 //PKCS1WithSHA512 SignatureScheme = 0x0601 //PSSWithSHA256 SignatureScheme = 0x0804 //PSSWithSHA384 SignatureScheme = 0x0805 //PSSWithSHA512 SignatureScheme = 0x0806 //ECDSAWithP256AndSHA256 SignatureScheme = 0x0403 //ECDSAWithP384AndSHA384 SignatureScheme = 0x0503 //ECDSAWithP521AndSHA512 SignatureScheme = 0x0603 //Ed25519 SignatureScheme = 0x0807 //PKCS1WithSHA1 SignatureScheme = 0x0201 //ECDSAWithSHA1 SignatureScheme = 0x0203 SupportedSignatureAlgorithms []string `json:"SupportedSignatureAlgorithms"` //CertCompressionZlib CertCompressionAlgo = 0x0001 //CertCompressionBrotli CertCompressionAlgo = 0x0002 //CertCompressionZstd CertCompressionAlgo = 0x0003 CertCompressionAlgo []string `json:"CertCompressionAlgo"` // Limit: 0x4001 RecordSizeLimit int `json:"RecordSizeLimit"` //PKCS1WithSHA256 SignatureScheme = 0x0401 //PKCS1WithSHA384 SignatureScheme = 0x0501 //PKCS1WithSHA512 SignatureScheme = 0x0601 //PSSWithSHA256 SignatureScheme = 0x0804 //PSSWithSHA384 SignatureScheme = 0x0805 //PSSWithSHA512 SignatureScheme = 0x0806 //ECDSAWithP256AndSHA256 SignatureScheme = 0x0403 //ECDSAWithP384AndSHA384 SignatureScheme = 0x0503 //ECDSAWithP521AndSHA512 SignatureScheme = 0x0603 //Ed25519 SignatureScheme = 0x0807 //PKCS1WithSHA1 SignatureScheme = 0x0201 //ECDSAWithSHA1 SignatureScheme = 0x0203 DelegatedCredentials []string `json:"DelegatedCredentials"` //GREASE_PLACEHOLDER = 0x0a0a //VersionTLS10 = 0x0301 //VersionTLS11 = 0x0302 //VersionTLS12 = 0x0303 //VersionTLS13 = 0x0304 //VersionSSL30 = 0x0300 SupportedVersions []string `json:"SupportedVersions"` //PskModePlain uint8 = pskModePlain //PskModeDHE uint8 = pskModeDHE PSKKeyExchangeModes []string `json:"PSKKeyExchangeModes"` //PKCS1WithSHA256 SignatureScheme = 0x0401 //PKCS1WithSHA384 SignatureScheme = 0x0501 //PKCS1WithSHA512 SignatureScheme = 0x0601 //PSSWithSHA256 SignatureScheme = 0x0804 //PSSWithSHA384 SignatureScheme = 0x0805 //PSSWithSHA512 SignatureScheme = 0x0806 //ECDSAWithP256AndSHA256 SignatureScheme = 0x0403 //ECDSAWithP384AndSHA384 SignatureScheme = 0x0503 //ECDSAWithP521AndSHA512 SignatureScheme = 0x0603 //Ed25519 SignatureScheme = 0x0807 //PKCS1WithSHA1 SignatureScheme = 0x0201 //ECDSAWithSHA1 SignatureScheme = 0x0203 SignatureAlgorithmsCert []string `json:"SignatureAlgorithmsCert"` //CurveP256 CurveID = 23 //CurveP384 CurveID = 24 //CurveP521 CurveID = 25 //X25519 CurveID = 29 KeyShareCurves []string `json:"KeyShareCurves"` //default is false, default is used grease, if not used grease the UseGREASE param is true UseGREASE bool `json:"UseGREASE"` }
type H2Settings ¶
type H2Settings struct { //HEADER_TABLE_SIZE //ENABLE_PUSH //MAX_CONCURRENT_STREAMS //INITIAL_WINDOW_SIZE //MAX_FRAME_SIZE //MAX_HEADER_LIST_SIZE Settings map[string]int `json:"Settings"` //HEADER_TABLE_SIZE //ENABLE_PUSH //MAX_CONCURRENT_STREAMS //INITIAL_WINDOW_SIZE //MAX_FRAME_SIZE //MAX_HEADER_LIST_SIZE SettingsOrder []string `json:"SettingsOrder"` ConnectionFlow int `json:"ConnectionFlow"` HeaderPriority map[string]interface{} `json:"HeaderPriority"` PriorityFrames []map[string]interface{} `json:"PriorityFrames"` }
type Options ¶
type Options struct { URL string `json:"url"` Method string `json:"method"` Headers map[string]string `json:"headers"` Body string `json:"body"` Ja3 string `json:"ja3"` TLSExtensions *TLSExtensions `json:"-"` HTTP2Settings *http2.HTTP2Settings `json:"-"` PHeaderOrderKeys []string `json:"-"` HeaderOrderKeys []string `json:"-"` UserAgent string `json:"userAgent"` Proxy string `json:"proxy"` Cookies []Cookie `json:"cookies"` Timeout int `json:"timeout"` DisableRedirect bool `json:"disableRedirect"` HeaderOrder []string `json:"headerOrder"` }
Options sets CycleTLS client options
type SocksDialer ¶
type SocksDialer struct {
// contains filtered or unexported fields
}
func (*SocksDialer) DialContext ¶
type TLSExtensions ¶
type TLSExtensions struct { SupportedSignatureAlgorithms *utls.SignatureAlgorithmsExtension CertCompressionAlgo *utls.UtlsCompressCertExtension RecordSizeLimit *utls.FakeRecordSizeLimitExtension DelegatedCredentials *utls.DelegatedCredentialsExtension SupportedVersions *utls.SupportedVersionsExtension PSKKeyExchangeModes *utls.PSKKeyExchangeModesExtension SignatureAlgorithmsCert *utls.SignatureAlgorithmsCertExtension UseGREASE bool }
func ToTLSExtensions ¶
func ToTLSExtensions(e *Extensions) (extensions *TLSExtensions)
Click to show internal directories.
Click to hide internal directories.