mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2025-12-17 17:25:28 +00:00
* Move proxy variable from global to options - Provides ability to pass diff proxy in single nuclei instance using sdk * add type check (resolve comments)
93 lines
2.5 KiB
Go
93 lines
2.5 KiB
Go
package engine
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"net"
|
|
"net/http"
|
|
"net/http/cookiejar"
|
|
"net/url"
|
|
"time"
|
|
|
|
"golang.org/x/net/proxy"
|
|
|
|
"github.com/projectdiscovery/fastdialer/fastdialer/ja3/impersonate"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/common/protocolstate"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/utils"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/types"
|
|
)
|
|
|
|
// newHttpClient creates a new http client for headless communication with a timeout
|
|
func newHttpClient(options *types.Options) (*http.Client, error) {
|
|
dialer := protocolstate.Dialer
|
|
|
|
// Set the base TLS configuration definition
|
|
tlsConfig := &tls.Config{
|
|
Renegotiation: tls.RenegotiateOnceAsClient,
|
|
InsecureSkipVerify: true,
|
|
MinVersion: tls.VersionTLS10,
|
|
}
|
|
|
|
if options.SNI != "" {
|
|
tlsConfig.ServerName = options.SNI
|
|
}
|
|
|
|
// Add the client certificate authentication to the request if it's configured
|
|
var err error
|
|
tlsConfig, err = utils.AddConfiguredClientCertToRequest(tlsConfig, options)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
transport := &http.Transport{
|
|
ForceAttemptHTTP2: options.ForceAttemptHTTP2,
|
|
DialContext: dialer.Dial,
|
|
DialTLSContext: func(ctx context.Context, network, addr string) (net.Conn, error) {
|
|
if options.TlsImpersonate {
|
|
return dialer.DialTLSWithConfigImpersonate(ctx, network, addr, tlsConfig, impersonate.Random, nil)
|
|
}
|
|
if options.HasClientCertificates() || options.ForceAttemptHTTP2 {
|
|
return dialer.DialTLSWithConfig(ctx, network, addr, tlsConfig)
|
|
}
|
|
return dialer.DialTLS(ctx, network, addr)
|
|
},
|
|
MaxIdleConns: 500,
|
|
MaxIdleConnsPerHost: 500,
|
|
MaxConnsPerHost: 500,
|
|
TLSClientConfig: tlsConfig,
|
|
}
|
|
if options.AliveHttpProxy != "" {
|
|
if proxyURL, err := url.Parse(options.AliveHttpProxy); err == nil {
|
|
transport.Proxy = http.ProxyURL(proxyURL)
|
|
}
|
|
} else if options.AliveSocksProxy != "" {
|
|
socksURL, proxyErr := url.Parse(options.AliveSocksProxy)
|
|
if proxyErr != nil {
|
|
return nil, err
|
|
}
|
|
dialer, err := proxy.FromURL(socksURL, proxy.Direct)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
dc := dialer.(interface {
|
|
DialContext(ctx context.Context, network, addr string) (net.Conn, error)
|
|
})
|
|
transport.DialContext = dc.DialContext
|
|
}
|
|
|
|
jar, _ := cookiejar.New(nil)
|
|
|
|
httpclient := &http.Client{
|
|
Transport: transport,
|
|
Timeout: time.Duration(options.Timeout*3) * time.Second,
|
|
Jar: jar,
|
|
CheckRedirect: func(req *http.Request, via []*http.Request) error {
|
|
// the browser should follow redirects not us
|
|
return http.ErrUseLastResponse
|
|
},
|
|
}
|
|
|
|
return httpclient, nil
|
|
}
|