1
0
mirror of https://github.com/dutchcoders/transfer.sh.git synced 2020-11-18 19:53:40 -08:00
2019-03-17 20:19:56 +01:00

458 lines
14 KiB
Go

// Copyright 2015 Google Inc. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// proxy is an HTTP/S proxy configurable via an HTTP API.
//
// It can be dynamically configured/queried at runtime by issuing requests to
// proxy specific paths using JSON.
//
// Supported configuration endpoints:
//
// POST http://martian.proxy/configure
//
// sets the request and response modifier of the proxy; modifiers adhere to the
// following top-level JSON structure:
//
// {
// "package.Modifier": {
// "scope": ["request", "response"],
// "attribute 1": "value",
// "attribute 2": "value"
// }
// }
//
// modifiers may be "stacked" to provide support for additional behaviors; for
// example, to add a "Martian-Test" header with the value "true" for requests
// with the domain "www.example.com" the JSON message would be:
//
// {
// "url.Filter": {
// "scope": ["request"],
// "host": "www.example.com",
// "modifier": {
// "header.Modifier": {
// "name": "Martian-Test",
// "value": "true"
// }
// }
// }
// }
//
// url.Filter parses the JSON object in the value of the "url.Filter" attribute;
// the "host" key tells the url.Filter to filter requests if the host explicitly
// matches "www.example.com"
//
// the "modifier" key within the "url.Filter" JSON object contains another
// modifier message of the type header.Modifier to run iff the filter passes
//
// groups may also be used to run multiple modifiers sequentially; for example to
// log requests and responses after adding the "Martian-Test" header to the
// request, but only when the host matches www.example.com:
//
// {
// "url.Filter": {
// "host": "www.example.com",
// "modifier": {
// "fifo.Group": {
// "modifiers": [
// {
// "header.Modifier": {
// "scope": ["request"],
// "name": "Martian-Test",
// "value": "true"
// }
// },
// {
// "log.Logger": { }
// }
// ]
// }
// }
// }
// }
//
// modifiers are designed to be composed together in ways that allow the user to
// write a single JSON structure to accomplish a variety of functionality
//
// GET http://martian.proxy/verify
//
// retrieves the verifications errors as JSON with the following structure:
//
// {
// "errors": [
// {
// "message": "request(url) verification failure"
// },
// {
// "message": "response(url) verification failure"
// }
// ]
// }
//
// verifiers also adhere to the modifier interface and thus can be included in the
// modifier configuration request; for example, to verify that all requests to
// "www.example.com" are sent over HTTPS send the following JSON to the
// configuration endpoint:
//
// {
// "url.Filter": {
// "scope": ["request"],
// "host": "www.example.com",
// "modifier": {
// "url.Verifier": {
// "scope": ["request"],
// "scheme": "https"
// }
// }
// }
// }
//
// sending a request to "http://martian.proxy/verify" will then return errors from the url.Verifier
//
// POST http://martian.proxy/verify/reset
//
// resets the verifiers to their initial state; note some verifiers may start in
// a failure state (e.g., pingback.Verifier is failed if no requests have been
// seen by the proxy)
//
// GET http://martian.proxy/authority.cer
//
// prompts the user to install the CA certificate used by the proxy if MITM is enabled
//
// GET http://martian.proxy/logs
//
// retrieves the HAR logs for all requests and responses seen by the proxy if
// the HAR flag is enabled
//
// DELETE http://martian.proxy/logs/reset
//
// reset the in-memory HAR log; note that the log will grow unbounded unless it
// is periodically reset
//
// passing the -cors flag will enable CORS support for the endpoints so that they
// may be called via AJAX
//
// Sending a sigint will cause the proxy to stop receiving new connections,
// finish processing any inflight requests, and close existing connections without
// reading anymore requests from them.
//
// The flags are:
// -addr=":8080"
// host:port of the proxy
// -api-addr=":8181"
// host:port of the proxy API
// -tls-addr=":4443"
// host:port of the proxy over TLS
// -api="martian.proxy"
// hostname that can be used to reference the configuration API when
// configuring through the proxy
// -cert=""
// PEM encoded X.509 CA certificate; if set, it will be set as the
// issuer for dynamically-generated certificates during man-in-the-middle
// -key=""
// PEM encoded private key of cert (RSA or ECDSA); if set, the key will be used
// to sign dynamically-generated certificates during man-in-the-middle
// -generate-ca-cert=false
// generates a CA certificate and private key to use for man-in-the-middle;
// the certificate is only valid while the proxy is running and will be
// discarded on shutdown
// -organization="Martian Proxy"
// organization name set on the dynamically-generated certificates during
// man-in-the-middle
// -validity="1h"
// window of time around the time of request that the dynamically-generated
// certificate is valid for; the duration is set such that the total valid
// timeframe is double the value of validity (1h before & 1h after)
// -cors=false
// allow the proxy to be configured via CORS requests; such as when
// configuring the proxy via AJAX
// -har=false
// enable logging endpoints for retrieving full request/response logs in
// HAR format.
// -traffic-shaping=false
// enable traffic shaping endpoints for simulating latency and constrained
// bandwidth conditions (e.g. mobile, exotic network infrastructure, the
// 90's)
// -skip-tls-verify=false
// skip TLS server verification; insecure and intended for testing only
// -v=0
// log level for console logs; defaults to error only.
package main
import (
"crypto/tls"
"crypto/x509"
"flag"
"log"
"net"
"net/http"
"net/url"
"os"
"os/signal"
"path"
"strconv"
"strings"
"time"
"github.com/google/martian"
mapi "github.com/google/martian/api"
"github.com/google/martian/cors"
"github.com/google/martian/fifo"
"github.com/google/martian/har"
"github.com/google/martian/httpspec"
"github.com/google/martian/marbl"
"github.com/google/martian/martianhttp"
"github.com/google/martian/martianlog"
"github.com/google/martian/mitm"
"github.com/google/martian/servemux"
"github.com/google/martian/trafficshape"
"github.com/google/martian/verify"
_ "github.com/google/martian/body"
_ "github.com/google/martian/cookie"
_ "github.com/google/martian/failure"
_ "github.com/google/martian/martianurl"
_ "github.com/google/martian/method"
_ "github.com/google/martian/pingback"
_ "github.com/google/martian/port"
_ "github.com/google/martian/priority"
_ "github.com/google/martian/querystring"
_ "github.com/google/martian/skip"
_ "github.com/google/martian/stash"
_ "github.com/google/martian/static"
_ "github.com/google/martian/status"
)
var (
addr = flag.String("addr", ":8080", "host:port of the proxy")
apiAddr = flag.String("api-addr", ":8181", "host:port of the configuration API")
tlsAddr = flag.String("tls-addr", ":4443", "host:port of the proxy over TLS")
api = flag.String("api", "martian.proxy", "hostname for the API")
generateCA = flag.Bool("generate-ca-cert", false, "generate CA certificate and private key for MITM")
cert = flag.String("cert", "", "filepath to the CA certificate used to sign MITM certificates")
key = flag.String("key", "", "filepath to the private key of the CA used to sign MITM certificates")
organization = flag.String("organization", "Martian Proxy", "organization name for MITM certificates")
validity = flag.Duration("validity", time.Hour, "window of time that MITM certificates are valid")
allowCORS = flag.Bool("cors", false, "allow CORS requests to configure the proxy")
harLogging = flag.Bool("har", false, "enable HAR logging API")
marblLogging = flag.Bool("marbl", false, "enable MARBL logging API")
trafficShaping = flag.Bool("traffic-shaping", false, "enable traffic shaping API")
skipTLSVerify = flag.Bool("skip-tls-verify", false, "skip TLS server verification; insecure")
dsProxyURL = flag.String("downstream-proxy-url", "", "URL of downstream proxy")
)
func main() {
p := martian.NewProxy()
defer p.Close()
tr := &http.Transport{
Dial: (&net.Dialer{
Timeout: 30 * time.Second,
KeepAlive: 30 * time.Second,
}).Dial,
TLSHandshakeTimeout: 10 * time.Second,
ExpectContinueTimeout: time.Second,
TLSClientConfig: &tls.Config{
InsecureSkipVerify: *skipTLSVerify,
},
}
p.SetRoundTripper(tr)
if *dsProxyURL != "" {
u, err := url.Parse(*dsProxyURL)
if err != nil {
log.Fatal(err)
}
p.SetDownstreamProxy(u)
}
mux := http.NewServeMux()
var x509c *x509.Certificate
var priv interface{}
if *generateCA {
var err error
x509c, priv, err = mitm.NewAuthority("martian.proxy", "Martian Authority", 30*24*time.Hour)
if err != nil {
log.Fatal(err)
}
} else if *cert != "" && *key != "" {
tlsc, err := tls.LoadX509KeyPair(*cert, *key)
if err != nil {
log.Fatal(err)
}
priv = tlsc.PrivateKey
x509c, err = x509.ParseCertificate(tlsc.Certificate[0])
if err != nil {
log.Fatal(err)
}
}
if x509c != nil && priv != nil {
mc, err := mitm.NewConfig(x509c, priv)
if err != nil {
log.Fatal(err)
}
mc.SetValidity(*validity)
mc.SetOrganization(*organization)
mc.SkipTLSVerify(*skipTLSVerify)
p.SetMITM(mc)
// Expose certificate authority.
ah := martianhttp.NewAuthorityHandler(x509c)
configure("/authority.cer", ah, mux)
// Start TLS listener for transparent MITM.
tl, err := net.Listen("tcp", *tlsAddr)
if err != nil {
log.Fatal(err)
}
go p.Serve(tls.NewListener(tl, mc.TLS()))
}
stack, fg := httpspec.NewStack("martian")
// wrap stack in a group so that we can forward API requests to the API port
// before the httpspec modifiers which include the via modifier which will
// trip loop detection
topg := fifo.NewGroup()
// Redirect API traffic to API server.
if *apiAddr != "" {
apip := strings.Replace(*apiAddr, ":", "", 1)
port, err := strconv.Atoi(apip)
if err != nil {
log.Fatal(err)
}
// Forward traffic that pattern matches in http.DefaultServeMux
apif := servemux.NewFilter(mux)
apif.SetRequestModifier(mapi.NewForwarder("", port))
topg.AddRequestModifier(apif)
}
topg.AddRequestModifier(stack)
topg.AddResponseModifier(stack)
p.SetRequestModifier(topg)
p.SetResponseModifier(topg)
m := martianhttp.NewModifier()
fg.AddRequestModifier(m)
fg.AddResponseModifier(m)
if *harLogging {
hl := har.NewLogger()
muxf := servemux.NewFilter(mux)
// Only append to HAR logs when the requests are not API requests,
// that is, they are not matched in http.DefaultServeMux
muxf.RequestWhenFalse(hl)
muxf.ResponseWhenFalse(hl)
stack.AddRequestModifier(muxf)
stack.AddResponseModifier(muxf)
configure("/logs", har.NewExportHandler(hl), mux)
configure("/logs/reset", har.NewResetHandler(hl), mux)
}
logger := martianlog.NewLogger()
logger.SetDecode(true)
stack.AddRequestModifier(logger)
stack.AddResponseModifier(logger)
if *marblLogging {
lsh := marbl.NewHandler()
lsm := marbl.NewModifier(lsh)
muxf := servemux.NewFilter(mux)
muxf.RequestWhenFalse(lsm)
muxf.ResponseWhenFalse(lsm)
stack.AddRequestModifier(muxf)
stack.AddResponseModifier(muxf)
// retrieve binary marbl logs
mux.Handle("/binlogs", lsh)
}
// Configure modifiers.
configure("/configure", m, mux)
// Verify assertions.
vh := verify.NewHandler()
vh.SetRequestVerifier(m)
vh.SetResponseVerifier(m)
configure("/verify", vh, mux)
// Reset verifications.
rh := verify.NewResetHandler()
rh.SetRequestVerifier(m)
rh.SetResponseVerifier(m)
configure("/verify/reset", rh, mux)
l, err := net.Listen("tcp", *addr)
if err != nil {
log.Fatal(err)
}
if *trafficShaping {
tsl := trafficshape.NewListener(l)
tsh := trafficshape.NewHandler(tsl)
configure("/shape-traffic", tsh, mux)
l = tsl
}
lAPI, err := net.Listen("tcp", *apiAddr)
if err != nil {
log.Fatal(err)
}
log.Printf("martian: starting proxy on %s and api on %s", l.Addr().String(), lAPI.Addr().String())
go p.Serve(l)
go http.Serve(lAPI, mux)
sigc := make(chan os.Signal, 1)
signal.Notify(sigc, os.Interrupt, os.Kill)
<-sigc
log.Println("martian: shutting down")
}
func init() {
martian.Init()
}
// configure installs a configuration handler at path.
func configure(pattern string, handler http.Handler, mux *http.ServeMux) {
if *allowCORS {
handler = cors.NewHandler(handler)
}
// register handler for martian.proxy to be forwarded to
// local API server
mux.Handle(path.Join(*api, pattern), handler)
// register handler for local API server
p := path.Join("localhost"+*apiAddr, pattern)
mux.Handle(p, handler)
}