npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

transparent-proxy

v1.15.2

Published

Real transparent HTTP-Proxy-Server. Upstream your requests whatever you want!

Downloads

437

Readme

Intro

transparent-proxy extends the native net.createServer and it acts as a real transparent http-proxy.

This module was built on top of TCP-level to avoid header-stripping problem of nodejs http(s)-modules.

It allows to upstream client-request dynamically to other proxies, or to certain iFace, to spoof requests and more...

It supports Basic Proxy-Authentication.

Useful for debugging, crawling, security and more.

It works on Termux.

Quick Start

Install

npm i transparent-proxy

Use

const ProxyServer = require('transparent-proxy');

//init ProxyServer
const server = new ProxyServer();

//starting server on port 8080
server.listen(8080, '0.0.0.0', function () {
    console.log('TCP-Proxy-Server started!', server.address());
});

Options Object

| Param | Type | Description | | ------ | ------------------- | ------------ | |options | Object | The options object. | |[options.auth] | Function | Activate/Handle Proxy-Authentication. Returns or solves to Boolean. | |[options.upstream] | Function | The proxy to be used to upstreaming requests. Returns String. | |[options.tcpOutgoingAddress] | Function | The localAddress to use while sending requests. Returns String | |[options.injectData] | Function | The edited data to upstream. Returns Buffer or string | |[options.injectResponse] | Function | The edited response to return to connected client. Returns Buffer or string | |[options.keys] | Function | The keys to use while handshake. It will work only if intercept is true. Returns Object or false | |[options.verbose] | Boolean | Activate verbose mode. | |[options.intercept] | Boolean | Activate interception of encrypted communications. False as default. | |[options.interceptOptions] | Object | The used options while intercepting HTTPs. As Default {server:{rejectUnauthorized:false,requestCert:false},client:{rejectUnauthorized: false,requestCert: false}}| |[options.logger] | Logger | Must be an object implementing log(args[]) and error(args[]). Defaults to the inbuilt logger writing to the console if verbose is true.| |[options.handleSni] | Function | Pass SNICallback to be added to the server. See SNICallback tls.createServer options |

upstream, tcpOutgoingAddress, injectData & injectResponse Options

The options are functions having follow parameters:

| Param | Type | Description | | ------ | ------------------- | ------------ | |data | Buffer | The received data. | |session | Session | Object containing info/data about Tunnel |

  • upstream-Function need to return/resolve a String with format -> IP:PORT or USER:PWD@IP:PORT of used http-proxy. If 'localhost' is returned/resolved, then the host-self will be used as proxy.
  • tcpOutgoingAddress-Function need to return a String with format -> IP.

Note: These functions will be executed before first tcp-socket-connection is established.

  • injectData-Function need to return a String or buffer for the new spoofed data. This will be upstreamed as request.
  • injectResponse-Function need to return a String or buffer for the new received data.

Upstream to other proxies

If you don't want to use the host of active instance self, then you need to upstream connections to another http-proxy. This can be done with upstream attribute.

const ProxyServer = require('transparent-proxy');

const server = new ProxyServer({
    upstream: function () {
          return 'x.x.x.x:3128'; // upstream to other proxy
    }
});

//starting server on port 8080
server.listen(8080, '0.0.0.0', function () {
    console.log('TCP-Proxy-Server started!', server.address());
});

You can also use an async function to upstream your requests:

const ProxyServer = require('transparent-proxy');

const server = new ProxyServer({
    upstream: async function () {
         //make some async task before
         return 'x.x.x.x:3128'; // upstream to other proxy
    }
});

//starting server on port 8080
server.listen(8080, '0.0.0.0', function () {
    console.log('TCP-Proxy-Server started!', server.address());
});

The auth Function

This activate basic authorization mechanism. The Auth-function will be executed while handling Proxy-Authentications.

| Param | Type | Description | | ------ | ------------------- | ------------ | |username | String | The client username. | |password | String | The client password | |session | Session | Object containing info/data about Tunnel |

Note: It needs to return True/False or a Promise that resolves to boolean (isAuthenticated).

const ProxyServer = require('transparent-proxy');

const server = new ProxyServer({
    auth: function (username, password) {
        return username === 'bar' && password === 'foo';
    }
});

//starting server on port 8080
server.listen(8080, '0.0.0.0', function () {
    console.log('TCP-Proxy-Server started!', server.address());
});

Interception

The callbacks injectData & injectResponse could be used to intercept/spoof communication. These functions are executed with the data and session arguments.

Intercepting HTTPS

The boolean attribute intercept allows to break SSL-Communication between Source & Destination.

This will activate Security-Alarm by most used browsers.

const switchWith = 'My Super Spoofed UA!';
const server = new ProxyServer({
    intercept: true,
    verbose: true,
    injectData: (data, session) => {
        if (session.isHttps) {
            const modifiedData = data.toString()
                .replace(session.request.headers['user-agent'], switchWith); //replacing UA-Header-Value

            return Buffer.from(modifiedData);
        }
        return data;
    }
});
curl -x localhost:8080 -k http://ifconfig.io/ua
curl/7.83.1

curl -x localhost:8080 -k https://ifconfig.me/ua
My Super Spoofed UA!

The keys Function

This function will work only if intercept is set to true.

If activated needs to return an Object {key:'String', cert:'String'} like native tls_connect_options.key & tls_connect_options.cert or false statement.

If no object is returned, then default keys will be used to update communication.

| Param | Type | Description | | ------ | ------------------- | ------------ | |session | Session | Object containing info/data about Tunnel |

Note: This function will be executed before TLS-Handshake.

The handleSNI Function

If passed a function, the proxy will call it to obtain the TLS secure context instead of using keys.

From tls.createServer two arguments will be passed when called: servername and callback. Callback is an error-first callback that takes two optional arguments: error and ctx. ctx, if provided, is a SecureContext instance.

tls.createSecureContext() can be used to get a proper SecureContext. If callback is called with a falsy ctx argument, the default secure context of the server will be used.

You can find an example here.

Session-Instance

The Session-Instance is an Object containing info/data about Tunnel. It has following useful attributes and methods:

  • {boolean} isHttps - Is session encrypted.

  • {object} request - The Request-Object containing info about current request. Normally defined on both injectData & injectResponse Callbacks. Attributes exist only if Session is not encrypted.

    • {object} [request.headers] - The intercepted request headers.
    • {string|undefined} [request.body] - The intercepted request body.
  • {object} response - The Response-Object containing info about current response. Normally defined on injectResponse Callback. Attributes exist only if Session is not encrypted.

    • {object} [response.headers] - The intercepted response headers.
    • {string} [response.body] - The intercepted response body.
    • {boolean} [response.complete] - is response completely done.
  • {buffer} rawResponse - The original body buffer.

  • {object} getTunnelStats() - Get Stats for this tunnel

  • {string} getId() - Get Own ID-Session

  • {boolean} isAuthenticated() - Is the session authenticated by user or not.

.getBridgedConnections()

const ProxyServer = require('transparent-proxy');
const server = new ProxyServer();

//starting server on port 8080
server.listen(8080, '0.0.0.0', function () {
    console.log('Proxy-Server started!', server.address());
});

setInterval(function showOpenSockets() {
    const bridgedConnections = server.getBridgedConnections();
    console.log([new Date()], 'OPEN =>', Object.keys(bridgedConnections).length)
}, 2000);

Examples

This example upstreams only requests for ifconfig.me to another proxy, for all other requests will be used localhost.

const ProxyServer = require('transparent-proxy');

const server = new ProxyServer({
    upstream: function (data, session) {
        if (~(data.toString().indexOf('ifconfig.me'))) {
            return 'x.x.x.x:3128'; // upstream to other proxy
        } else {
            return 'localhost'; //upstream to localhost
        }
    },
});

//starting server on port 8080
server.listen(8080, '0.0.0.0', function () {
    console.log('TCP-Proxy-Server started!', server.address());
});

Testing with curl:

curl -x 127.0.0.1:8080 https://ifconfig.me
x.x.x.x
curl -x 127.0.0.1:8080 https://ifconfig.co
y.y.y.y

For more examples look here.