mirror of
https://github.com/dutchcoders/transfer.sh.git
synced 2020-11-18 19:53:40 -08:00
458 lines
14 KiB
Go
458 lines
14 KiB
Go
// Copyright 2015 Google Inc. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
// proxy is an HTTP/S proxy configurable via an HTTP API.
|
|
//
|
|
// It can be dynamically configured/queried at runtime by issuing requests to
|
|
// proxy specific paths using JSON.
|
|
//
|
|
// Supported configuration endpoints:
|
|
//
|
|
// POST http://martian.proxy/configure
|
|
//
|
|
// sets the request and response modifier of the proxy; modifiers adhere to the
|
|
// following top-level JSON structure:
|
|
//
|
|
// {
|
|
// "package.Modifier": {
|
|
// "scope": ["request", "response"],
|
|
// "attribute 1": "value",
|
|
// "attribute 2": "value"
|
|
// }
|
|
// }
|
|
//
|
|
// modifiers may be "stacked" to provide support for additional behaviors; for
|
|
// example, to add a "Martian-Test" header with the value "true" for requests
|
|
// with the domain "www.example.com" the JSON message would be:
|
|
//
|
|
// {
|
|
// "url.Filter": {
|
|
// "scope": ["request"],
|
|
// "host": "www.example.com",
|
|
// "modifier": {
|
|
// "header.Modifier": {
|
|
// "name": "Martian-Test",
|
|
// "value": "true"
|
|
// }
|
|
// }
|
|
// }
|
|
// }
|
|
//
|
|
// url.Filter parses the JSON object in the value of the "url.Filter" attribute;
|
|
// the "host" key tells the url.Filter to filter requests if the host explicitly
|
|
// matches "www.example.com"
|
|
//
|
|
// the "modifier" key within the "url.Filter" JSON object contains another
|
|
// modifier message of the type header.Modifier to run iff the filter passes
|
|
//
|
|
// groups may also be used to run multiple modifiers sequentially; for example to
|
|
// log requests and responses after adding the "Martian-Test" header to the
|
|
// request, but only when the host matches www.example.com:
|
|
//
|
|
// {
|
|
// "url.Filter": {
|
|
// "host": "www.example.com",
|
|
// "modifier": {
|
|
// "fifo.Group": {
|
|
// "modifiers": [
|
|
// {
|
|
// "header.Modifier": {
|
|
// "scope": ["request"],
|
|
// "name": "Martian-Test",
|
|
// "value": "true"
|
|
// }
|
|
// },
|
|
// {
|
|
// "log.Logger": { }
|
|
// }
|
|
// ]
|
|
// }
|
|
// }
|
|
// }
|
|
// }
|
|
//
|
|
// modifiers are designed to be composed together in ways that allow the user to
|
|
// write a single JSON structure to accomplish a variety of functionality
|
|
//
|
|
// GET http://martian.proxy/verify
|
|
//
|
|
// retrieves the verifications errors as JSON with the following structure:
|
|
//
|
|
// {
|
|
// "errors": [
|
|
// {
|
|
// "message": "request(url) verification failure"
|
|
// },
|
|
// {
|
|
// "message": "response(url) verification failure"
|
|
// }
|
|
// ]
|
|
// }
|
|
//
|
|
// verifiers also adhere to the modifier interface and thus can be included in the
|
|
// modifier configuration request; for example, to verify that all requests to
|
|
// "www.example.com" are sent over HTTPS send the following JSON to the
|
|
// configuration endpoint:
|
|
//
|
|
// {
|
|
// "url.Filter": {
|
|
// "scope": ["request"],
|
|
// "host": "www.example.com",
|
|
// "modifier": {
|
|
// "url.Verifier": {
|
|
// "scope": ["request"],
|
|
// "scheme": "https"
|
|
// }
|
|
// }
|
|
// }
|
|
// }
|
|
//
|
|
// sending a request to "http://martian.proxy/verify" will then return errors from the url.Verifier
|
|
//
|
|
// POST http://martian.proxy/verify/reset
|
|
//
|
|
// resets the verifiers to their initial state; note some verifiers may start in
|
|
// a failure state (e.g., pingback.Verifier is failed if no requests have been
|
|
// seen by the proxy)
|
|
//
|
|
// GET http://martian.proxy/authority.cer
|
|
//
|
|
// prompts the user to install the CA certificate used by the proxy if MITM is enabled
|
|
//
|
|
// GET http://martian.proxy/logs
|
|
//
|
|
// retrieves the HAR logs for all requests and responses seen by the proxy if
|
|
// the HAR flag is enabled
|
|
//
|
|
// DELETE http://martian.proxy/logs/reset
|
|
//
|
|
// reset the in-memory HAR log; note that the log will grow unbounded unless it
|
|
// is periodically reset
|
|
//
|
|
// passing the -cors flag will enable CORS support for the endpoints so that they
|
|
// may be called via AJAX
|
|
//
|
|
// Sending a sigint will cause the proxy to stop receiving new connections,
|
|
// finish processing any inflight requests, and close existing connections without
|
|
// reading anymore requests from them.
|
|
//
|
|
// The flags are:
|
|
// -addr=":8080"
|
|
// host:port of the proxy
|
|
// -api-addr=":8181"
|
|
// host:port of the proxy API
|
|
// -tls-addr=":4443"
|
|
// host:port of the proxy over TLS
|
|
// -api="martian.proxy"
|
|
// hostname that can be used to reference the configuration API when
|
|
// configuring through the proxy
|
|
// -cert=""
|
|
// PEM encoded X.509 CA certificate; if set, it will be set as the
|
|
// issuer for dynamically-generated certificates during man-in-the-middle
|
|
// -key=""
|
|
// PEM encoded private key of cert (RSA or ECDSA); if set, the key will be used
|
|
// to sign dynamically-generated certificates during man-in-the-middle
|
|
// -generate-ca-cert=false
|
|
// generates a CA certificate and private key to use for man-in-the-middle;
|
|
// the certificate is only valid while the proxy is running and will be
|
|
// discarded on shutdown
|
|
// -organization="Martian Proxy"
|
|
// organization name set on the dynamically-generated certificates during
|
|
// man-in-the-middle
|
|
// -validity="1h"
|
|
// window of time around the time of request that the dynamically-generated
|
|
// certificate is valid for; the duration is set such that the total valid
|
|
// timeframe is double the value of validity (1h before & 1h after)
|
|
// -cors=false
|
|
// allow the proxy to be configured via CORS requests; such as when
|
|
// configuring the proxy via AJAX
|
|
// -har=false
|
|
// enable logging endpoints for retrieving full request/response logs in
|
|
// HAR format.
|
|
// -traffic-shaping=false
|
|
// enable traffic shaping endpoints for simulating latency and constrained
|
|
// bandwidth conditions (e.g. mobile, exotic network infrastructure, the
|
|
// 90's)
|
|
// -skip-tls-verify=false
|
|
// skip TLS server verification; insecure and intended for testing only
|
|
// -v=0
|
|
// log level for console logs; defaults to error only.
|
|
package main
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"flag"
|
|
"log"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"os/signal"
|
|
"path"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/google/martian"
|
|
mapi "github.com/google/martian/api"
|
|
"github.com/google/martian/cors"
|
|
"github.com/google/martian/fifo"
|
|
"github.com/google/martian/har"
|
|
"github.com/google/martian/httpspec"
|
|
"github.com/google/martian/marbl"
|
|
"github.com/google/martian/martianhttp"
|
|
"github.com/google/martian/martianlog"
|
|
"github.com/google/martian/mitm"
|
|
"github.com/google/martian/servemux"
|
|
"github.com/google/martian/trafficshape"
|
|
"github.com/google/martian/verify"
|
|
|
|
_ "github.com/google/martian/body"
|
|
_ "github.com/google/martian/cookie"
|
|
_ "github.com/google/martian/failure"
|
|
_ "github.com/google/martian/martianurl"
|
|
_ "github.com/google/martian/method"
|
|
_ "github.com/google/martian/pingback"
|
|
_ "github.com/google/martian/port"
|
|
_ "github.com/google/martian/priority"
|
|
_ "github.com/google/martian/querystring"
|
|
_ "github.com/google/martian/skip"
|
|
_ "github.com/google/martian/stash"
|
|
_ "github.com/google/martian/static"
|
|
_ "github.com/google/martian/status"
|
|
)
|
|
|
|
var (
|
|
addr = flag.String("addr", ":8080", "host:port of the proxy")
|
|
apiAddr = flag.String("api-addr", ":8181", "host:port of the configuration API")
|
|
tlsAddr = flag.String("tls-addr", ":4443", "host:port of the proxy over TLS")
|
|
api = flag.String("api", "martian.proxy", "hostname for the API")
|
|
generateCA = flag.Bool("generate-ca-cert", false, "generate CA certificate and private key for MITM")
|
|
cert = flag.String("cert", "", "filepath to the CA certificate used to sign MITM certificates")
|
|
key = flag.String("key", "", "filepath to the private key of the CA used to sign MITM certificates")
|
|
organization = flag.String("organization", "Martian Proxy", "organization name for MITM certificates")
|
|
validity = flag.Duration("validity", time.Hour, "window of time that MITM certificates are valid")
|
|
allowCORS = flag.Bool("cors", false, "allow CORS requests to configure the proxy")
|
|
harLogging = flag.Bool("har", false, "enable HAR logging API")
|
|
marblLogging = flag.Bool("marbl", false, "enable MARBL logging API")
|
|
trafficShaping = flag.Bool("traffic-shaping", false, "enable traffic shaping API")
|
|
skipTLSVerify = flag.Bool("skip-tls-verify", false, "skip TLS server verification; insecure")
|
|
dsProxyURL = flag.String("downstream-proxy-url", "", "URL of downstream proxy")
|
|
)
|
|
|
|
func main() {
|
|
p := martian.NewProxy()
|
|
defer p.Close()
|
|
|
|
tr := &http.Transport{
|
|
Dial: (&net.Dialer{
|
|
Timeout: 30 * time.Second,
|
|
KeepAlive: 30 * time.Second,
|
|
}).Dial,
|
|
TLSHandshakeTimeout: 10 * time.Second,
|
|
ExpectContinueTimeout: time.Second,
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: *skipTLSVerify,
|
|
},
|
|
}
|
|
p.SetRoundTripper(tr)
|
|
|
|
if *dsProxyURL != "" {
|
|
u, err := url.Parse(*dsProxyURL)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
p.SetDownstreamProxy(u)
|
|
}
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
var x509c *x509.Certificate
|
|
var priv interface{}
|
|
|
|
if *generateCA {
|
|
var err error
|
|
x509c, priv, err = mitm.NewAuthority("martian.proxy", "Martian Authority", 30*24*time.Hour)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
} else if *cert != "" && *key != "" {
|
|
tlsc, err := tls.LoadX509KeyPair(*cert, *key)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
priv = tlsc.PrivateKey
|
|
|
|
x509c, err = x509.ParseCertificate(tlsc.Certificate[0])
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
}
|
|
|
|
if x509c != nil && priv != nil {
|
|
mc, err := mitm.NewConfig(x509c, priv)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
mc.SetValidity(*validity)
|
|
mc.SetOrganization(*organization)
|
|
mc.SkipTLSVerify(*skipTLSVerify)
|
|
|
|
p.SetMITM(mc)
|
|
|
|
// Expose certificate authority.
|
|
ah := martianhttp.NewAuthorityHandler(x509c)
|
|
configure("/authority.cer", ah, mux)
|
|
|
|
// Start TLS listener for transparent MITM.
|
|
tl, err := net.Listen("tcp", *tlsAddr)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
go p.Serve(tls.NewListener(tl, mc.TLS()))
|
|
}
|
|
|
|
stack, fg := httpspec.NewStack("martian")
|
|
|
|
// wrap stack in a group so that we can forward API requests to the API port
|
|
// before the httpspec modifiers which include the via modifier which will
|
|
// trip loop detection
|
|
topg := fifo.NewGroup()
|
|
|
|
// Redirect API traffic to API server.
|
|
if *apiAddr != "" {
|
|
apip := strings.Replace(*apiAddr, ":", "", 1)
|
|
port, err := strconv.Atoi(apip)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
// Forward traffic that pattern matches in http.DefaultServeMux
|
|
apif := servemux.NewFilter(mux)
|
|
apif.SetRequestModifier(mapi.NewForwarder("", port))
|
|
topg.AddRequestModifier(apif)
|
|
}
|
|
topg.AddRequestModifier(stack)
|
|
topg.AddResponseModifier(stack)
|
|
|
|
p.SetRequestModifier(topg)
|
|
p.SetResponseModifier(topg)
|
|
|
|
m := martianhttp.NewModifier()
|
|
fg.AddRequestModifier(m)
|
|
fg.AddResponseModifier(m)
|
|
|
|
if *harLogging {
|
|
hl := har.NewLogger()
|
|
muxf := servemux.NewFilter(mux)
|
|
// Only append to HAR logs when the requests are not API requests,
|
|
// that is, they are not matched in http.DefaultServeMux
|
|
muxf.RequestWhenFalse(hl)
|
|
muxf.ResponseWhenFalse(hl)
|
|
|
|
stack.AddRequestModifier(muxf)
|
|
stack.AddResponseModifier(muxf)
|
|
|
|
configure("/logs", har.NewExportHandler(hl), mux)
|
|
configure("/logs/reset", har.NewResetHandler(hl), mux)
|
|
}
|
|
|
|
logger := martianlog.NewLogger()
|
|
logger.SetDecode(true)
|
|
|
|
stack.AddRequestModifier(logger)
|
|
stack.AddResponseModifier(logger)
|
|
|
|
if *marblLogging {
|
|
lsh := marbl.NewHandler()
|
|
lsm := marbl.NewModifier(lsh)
|
|
muxf := servemux.NewFilter(mux)
|
|
muxf.RequestWhenFalse(lsm)
|
|
muxf.ResponseWhenFalse(lsm)
|
|
stack.AddRequestModifier(muxf)
|
|
stack.AddResponseModifier(muxf)
|
|
|
|
// retrieve binary marbl logs
|
|
mux.Handle("/binlogs", lsh)
|
|
}
|
|
|
|
// Configure modifiers.
|
|
configure("/configure", m, mux)
|
|
|
|
// Verify assertions.
|
|
vh := verify.NewHandler()
|
|
vh.SetRequestVerifier(m)
|
|
vh.SetResponseVerifier(m)
|
|
configure("/verify", vh, mux)
|
|
|
|
// Reset verifications.
|
|
rh := verify.NewResetHandler()
|
|
rh.SetRequestVerifier(m)
|
|
rh.SetResponseVerifier(m)
|
|
configure("/verify/reset", rh, mux)
|
|
|
|
l, err := net.Listen("tcp", *addr)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
if *trafficShaping {
|
|
tsl := trafficshape.NewListener(l)
|
|
tsh := trafficshape.NewHandler(tsl)
|
|
configure("/shape-traffic", tsh, mux)
|
|
|
|
l = tsl
|
|
}
|
|
|
|
lAPI, err := net.Listen("tcp", *apiAddr)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
log.Printf("martian: starting proxy on %s and api on %s", l.Addr().String(), lAPI.Addr().String())
|
|
|
|
go p.Serve(l)
|
|
|
|
go http.Serve(lAPI, mux)
|
|
|
|
sigc := make(chan os.Signal, 1)
|
|
signal.Notify(sigc, os.Interrupt, os.Kill)
|
|
|
|
<-sigc
|
|
|
|
log.Println("martian: shutting down")
|
|
}
|
|
|
|
func init() {
|
|
martian.Init()
|
|
}
|
|
|
|
// configure installs a configuration handler at path.
|
|
func configure(pattern string, handler http.Handler, mux *http.ServeMux) {
|
|
if *allowCORS {
|
|
handler = cors.NewHandler(handler)
|
|
}
|
|
|
|
// register handler for martian.proxy to be forwarded to
|
|
// local API server
|
|
mux.Handle(path.Join(*api, pattern), handler)
|
|
|
|
// register handler for local API server
|
|
p := path.Join("localhost"+*apiAddr, pattern)
|
|
mux.Handle(p, handler)
|
|
}
|