2023-10-31 02:41:27 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"encoding/base64"
|
|
|
|
"flag"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
type ProxyServer struct {
|
|
|
|
port string
|
|
|
|
username string
|
|
|
|
password string
|
|
|
|
}
|
2023-10-31 02:41:27 +00:00
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
func (ps *ProxyServer) isAuthRequired() bool {
|
|
|
|
return ps.username != "" && ps.password != ""
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ps *ProxyServer) checkProxyAuth(r *http.Request) bool {
|
|
|
|
if !ps.isAuthRequired() {
|
2023-10-31 02:41:27 +00:00
|
|
|
return true
|
|
|
|
}
|
2023-10-31 03:31:10 +00:00
|
|
|
|
2023-10-31 02:41:27 +00:00
|
|
|
authHeader := r.Header.Get("Proxy-Authorization")
|
|
|
|
const prefix = "Basic "
|
|
|
|
if !strings.HasPrefix(authHeader, prefix) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
payload, err := base64.StdEncoding.DecodeString(authHeader[len(prefix):])
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
pair := strings.SplitN(string(payload), ":", 2)
|
|
|
|
if len(pair) != 2 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
return pair[0] == ps.username && pair[1] == ps.password
|
2023-10-31 02:41:27 +00:00
|
|
|
}
|
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
func (ps *ProxyServer) requestHandler(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if !ps.checkProxyAuth(r) {
|
2023-10-31 02:41:27 +00:00
|
|
|
w.Header().Set("Proxy-Authenticate", `Basic realm="Provide username and password"`)
|
|
|
|
http.Error(w, "Proxy authentication required", http.StatusProxyAuthRequired)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.Method == http.MethodConnect {
|
|
|
|
handleTunneling(w, r)
|
|
|
|
} else {
|
|
|
|
handleHTTP(w, r)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
// Manages tunneling requests (used for HTTPS connections).
|
2023-10-31 02:41:27 +00:00
|
|
|
func handleTunneling(w http.ResponseWriter, r *http.Request) {
|
|
|
|
logRequest(r)
|
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
destConn, err := net.DialTimeout("tcp", r.Host, 10*time.Second)
|
2023-10-31 02:41:27 +00:00
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusServiceUnavailable)
|
|
|
|
return
|
|
|
|
}
|
2023-10-31 03:31:10 +00:00
|
|
|
|
2023-10-31 02:41:27 +00:00
|
|
|
w.WriteHeader(http.StatusOK)
|
2023-10-31 03:31:10 +00:00
|
|
|
|
|
|
|
// Hijack the connection to manage it at the TCP level
|
2023-10-31 02:41:27 +00:00
|
|
|
hijacker, ok := w.(http.Hijacker)
|
|
|
|
if !ok {
|
|
|
|
http.Error(w, "Hijacking not supported", http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
2023-10-31 03:31:10 +00:00
|
|
|
clientConn, _, err := hijacker.Hijack()
|
2023-10-31 02:41:27 +00:00
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusServiceUnavailable)
|
2023-10-31 03:31:10 +00:00
|
|
|
return
|
2023-10-31 02:41:27 +00:00
|
|
|
}
|
2023-10-31 03:31:10 +00:00
|
|
|
|
|
|
|
// Transfer data between client and destination
|
|
|
|
go transfer(destConn, clientConn)
|
|
|
|
go transfer(clientConn, destConn)
|
2023-10-31 02:41:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func transfer(destination io.WriteCloser, source io.ReadCloser) {
|
|
|
|
defer destination.Close()
|
|
|
|
defer source.Close()
|
|
|
|
io.Copy(destination, source)
|
|
|
|
}
|
|
|
|
|
|
|
|
func handleHTTP(w http.ResponseWriter, req *http.Request) {
|
|
|
|
logRequest(req)
|
|
|
|
|
|
|
|
resp, err := http.DefaultTransport.RoundTrip(req)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(w, err.Error(), http.StatusServiceUnavailable)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
2023-10-31 03:31:10 +00:00
|
|
|
|
2023-10-31 02:41:27 +00:00
|
|
|
copyHeader(w.Header(), resp.Header)
|
|
|
|
w.WriteHeader(resp.StatusCode)
|
|
|
|
io.Copy(w, resp.Body)
|
|
|
|
}
|
|
|
|
|
|
|
|
func copyHeader(dst, src http.Header) {
|
|
|
|
for k, vv := range src {
|
|
|
|
for _, v := range vv {
|
|
|
|
dst.Add(k, v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
func logRequest(r *http.Request) {
|
|
|
|
log.Printf("Method: %s, URL: %s", r.Method, r.URL.String())
|
|
|
|
}
|
|
|
|
|
2023-10-31 02:41:27 +00:00
|
|
|
func main() {
|
2023-10-31 03:31:10 +00:00
|
|
|
var port, username, password string
|
|
|
|
|
|
|
|
flag.StringVar(&port, "port", "3000", "Specify the port the proxy will run on")
|
|
|
|
flag.StringVar(&username, "username", "", "Username for proxy authentication")
|
|
|
|
flag.StringVar(&password, "password", "", "Password for proxy authentication")
|
2023-10-31 02:41:27 +00:00
|
|
|
flag.Parse()
|
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
if (username == "" && password != "") || (username != "" && password == "") {
|
2023-10-31 02:48:14 +00:00
|
|
|
log.Fatal("Error: Both username and password must be provided, or neither should be.")
|
|
|
|
}
|
|
|
|
|
2023-10-31 03:31:10 +00:00
|
|
|
proxy := &ProxyServer{port: port, username: username, password: password}
|
2023-10-31 02:41:27 +00:00
|
|
|
server := &http.Server{
|
2023-10-31 03:31:10 +00:00
|
|
|
Addr: ":" + proxy.port,
|
|
|
|
Handler: http.HandlerFunc(proxy.requestHandler),
|
|
|
|
// Disable HTTP/2 (https://github.com/golang/go/issues/14797#issuecomment-196103814)
|
2023-10-31 02:41:27 +00:00
|
|
|
TLSNextProto: make(map[string]func(*http.Server, *tls.Conn, http.Handler)),
|
|
|
|
}
|
2023-10-31 03:31:10 +00:00
|
|
|
log.Printf("Starting proxy server on :%s\n", proxy.port)
|
2023-10-31 02:41:27 +00:00
|
|
|
log.Fatal(server.ListenAndServe())
|
|
|
|
}
|