Welcome to AzureTLS Client, a robust and flexible HTTP client library for Golang designed with security and customization in mind. Whether you're building a web scraper, an API client, or any application that requires HTTP requests, AzureTLS Client provides a suite of features to meet your needs.
-
Security: With built-in SSL pinning and proxy support, AzureTLS Client takes security seriously, ensuring your connections are secure and reliable.
-
Customization: Modify TLS ClientHello fingerprints, configure HTTP/2 settings, and even set ordered headers. AzureTLS Client is built to be as flexible as your project requires.
-
Performance: Built on top of Golang's native packages, AzureTLS Client is designed for speed and efficiency, making it suitable for both small and large-scale applications.
Whether you're a seasoned developer looking for a feature-rich HTTP client or you're just getting started with Golang, AzureTLS Client offers a blend of performance, customization, and security to help you build better applications.
- Latest Chrome ClientHello Support
- HTTP/1.1 and HTTP/2 Compatibility
- Customizable ClientHello TLS (JA3 strings and extensions)
- Configurable HTTP/2 Frames (SETTINGS, PRIORITY, WINDOW_UPDATE)
- Built-in Proxy Support
- SSL Pinning
- PreHook and Callback Functions
- Integrated Cookie Jar
- Websocket with JA3
golang ^1.20
$ go get github.com/Noooste/azuretls-client
import (
"github.com/Noooste/azuretls-client"
)
// without context
session := azuretls.NewSession()
// don't forget to close the session when you no longer need it, to free up resources
defer session.Close()
// or with context
session := azuretls.NewSessionWithContext(context.Background())
defer session.Close()
You can pass arguments to the request methods. Valid arguments are:
azuretls.OrderedHeaders
: for ordered headers (of type[][]string
)http.Header
: for headers (of typemap[string]string
)azuretls.HeaderOrder
: forhttp.Header
order (of type[]string
)time.Duration
: for the request timeout
By default, the azuretls client follows redirects. If you want to disable it, you can do request.DisableRedirects = true
.
Otherwise, it will follow redirects until the MaxRedirects
limit is reached (default: 10).
You can modify the maximum number of redirects with session.MaxRedirects
or request.MaxRedirects
.
session := azuretls.NewSession()
defer session.Close()
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
fmt.Println(response.StatusCode, string(response.Body))
To do a POST, PUT or PATCH requests, you can use as body:
string
[]byte
io.Reader
- anything that can be marshalled to JSON
session := azuretls.NewSession()
defer session.Close()
response, err := session.Post("https://tls.peet.ws/api/all", `{"test": "test"}`)
// or
response, err := session.Post("https://tls.peet.ws/api/all", map[string]string{"test": "test"})
// or
response, err := session.Post("https://tls.peet.ws/api/all", []byte(`{"test": "test"}`))
session := azuretls.NewSession()
defer session.Close()
// the body follows the same semantics as the POST request.
response, err := session.Put("https://tls.peet.ws/api/all", `{"test": "test"}`)
session := azuretls.NewSession()
defer session.Close()
// the body follows the same semantics as the POST request.
response, err := session.Patch("https://tls.peet.ws/api/all", `{"test": "test"}`)
session := azuretls.NewSession()
defer session.Close()
response, err := session.Delete("https://tls.peet.ws/api/all")
session := azuretls.NewSession()
defer session.Close()
response, err := session.Options("https://tls.peet.ws/api/all")
session := azuretls.NewSession()
defer session.Close()
response, err := session.Head("https://tls.peet.ws/api/all")
session.Connect
is a method that allows you to connect to a website without sending any HTTP request.
It initiates the TLS handshake and the HTTP connection.
This ensures that the server connection is made first, to avoid having to make these connections during the next requests.
session := azuretls.NewSession()
defer session.Close()
response, err := session.Connect("https://tls.peet.ws/api/all")
To modify your ClientHello, you have two options:
- The first one is to use the
session.ApplyJA3
method, which takes a JA3 fingerprint and the target browser (chrome, firefox, safari, ...). - The second one is to assign a method to
session.GetClientHelloSpec
that returns TLS configuration.
You can retrieve your JA3 fingerprint there : https://tls.peet.ws/api/all
session := azuretls.NewSession()
defer session.Close()
// First method
if err := session.ApplyJa3("771,4865-4866-4867-49195-49199-49196-49200-52393-52392-49171-49172-156-157-47-53,45-13-43-0-16-65281-51-18-11-27-35-23-10-5-17513-21,29-23-24-25-26,0", azuretls.Chrome); err != nil {
panic(err)
}
// Second method
session.GetClientHelloSpec = azuretls.GetLastChromeVersion //func() *tls.ClientHelloSpec
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
// response *azuretls.Response
fmt.Println(response.StatusCode, string(response.Body))
To modify HTTP2, you have to apply the HTTP2 fingerprint to the session. You can retrieve your HTTP/2 fingerprint there : https://tls.peet.ws/api/all
session := azuretls.NewSession()
defer session.Close()
if err := session.ApplyHTTP2("1:65536,2:0,3:1000,4:6291456,6:262144|15663105|0|m,s,a,p"); err != nil {
panic(err)
}
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
fmt.Println(response.StatusCode, string(response.Body))
Use session.OrderedHeaders
method ([][]string
type)
session := azuretls.NewSession()
defer session.Close()
// it will keep the order
session.OrderedHeaders = azuretls.OrderedHeaders{
{"user-agent", "test"},
{"content-type", "application/json"},
{"accept", "application/json"},
}
response, err = session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
fmt.Println(response.StatusCode, string(response.Body))
You can also pass azuretls.OrderedHeaders
or http.Header
in the arguments of the request methods.
session := azuretls.NewSession()
defer session.Close()
headers := azuretls.OrderedHeaders{
{"user-agent", "test"},
{"content-type", "application/json"},
{"accept", "application/json"},
}
response, err = session.Get("https://tls.peet.ws/api/all", headers)
if err != nil {
panic(err)
}
You can set a proxy to the session with the session.SetProxy
method.
If the proxy needs to be cleared, you can do session.ClearProxy
.
Supported proxy formats include:
http(s)://ip
http(s)://ip:port
http(s)://username:password@ip:port
socks5(h)://ip
socks5(h)://ip:port
socks5(h)://username:password@ip:port
ip:port
ip:port:username:password
username:password:ip:port
username:password@ip:port
If a scheme is not provided, http
will be used by default.
session := azuretls.NewSession()
defer session.Close()
if err := session.SetProxy("http://username:password@ip:port"); err != nil {
panic(err)
}
response, err := session.Get("https://api.ipify.org")
if err != nil {
panic(err)
}
fmt.Println(response.StatusCode, string(response.Body))
SSL pinning is enabled by default.
SSL pinning ensures that you are connecting to the intended server and mitigates the risk of man-in-the-middle attacks, such as those potentially executed using tools like Charles Proxy.
session := azuretls.NewSession()
defer session.Close()
// secured request
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
fmt.Println(response.StatusCode, string(response.Body))
If you're concerned about the reliability of a server, you can improve security by manually setting pins prior to initiating any requests within the session, using the session.AddPins
method.
The pins are generated through the following series of steps:
- SubjectPublicKeyInfo is first DER-encoded.
- The DER-encoded data is then hashed using the SHA-256 algorithm.
- Finally, the hashed output is base64 encoded to generate the pin.
It's not necessary for every certificate in the chain to match a pin. If even a single certificate in the chain matches one of the pre-defined pins, the entire chain is considered valid : this approach allows for flexibility in the certificate chain while still providing an additional layer of security.
session := azuretls.NewSession()
defer session.Close()
session.AddPins(&url.URL{
Scheme: "https",
Host: "httpbin.org",
}, []string{
"j5bzD/UjYVE+0feXsngcrVs3i1vSaoOOtPgpLBb9Db8=",
"18tkPyr2nckv4fgo0dhAkaUtJ2hu2831xlO2SKhq8dg=",
"++MBgDH5WGvL9Bcn5Be30cRcL0f5O+NyoXuWtQdX1aI=",
"KwccWaCgrnaw6tsrrSO61FgLacNgG2MMLq8GE6+oP5I=",
})
_, err := session.Get("https://httpbin.org/get")
if err != nil {
panic(err)
}
You can also call session.ClearPins
beforehand to remove any saved pins in the session for the given URL
To disable SSL Pinning, you can do session.InsecureSkipVerify = true
session := azuretls.NewSession()
defer session.Close()
session.InsecureSkipVerify = true
// do it at your own risk
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
fmt.Println(response.StatusCode, string(response.Body))
You can set a timeout to the session with the session.SetTimeout
method.
session := azuretls.NewSession()
defer session.Close()
session.SetTimeout(5 * time.Second)
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
fmt.Println(response.StatusCode, string(response.Body))
You can use the session.PreHook
method to modify all outgoing requests in the session before they are executed.
You can also set a callback for the session using the session.CallBack
method which will be called just after the response received.
session := azuretls.NewSession()
defer session.Close()
session.PreHook = func(request *azuretls.Request) error {
request.Header.Set("user-agent", "test")
return nil
}
session.CallBack = func(request *azuretls.Request, response *azuretls.Response, err error) error {
fmt.Println(response.StatusCode, string(response.Body))
return nil
}
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
You can manage cookies with the jar of the session. Note that azuretls automatically manage cookies when doing requests.
session := azuretls.NewSession()
defer session.Close()
parsed, err := url.Parse("https://tls.peet.ws/api/all")
session.CookieJar.SetCookies(parsed, []*http.Cookie{
{
Name: "test",
Value: "test",
},
})
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
You can use websocket with session.NewWebsocket
method.
session := azuretls.NewSession()
defer session.Close()
ws, err := session.NewWebsocket(&azuretls.Request{
Url: "wss://demo.piesocket.com/v3/channel_123?api_key=VCXCEuvhGcBDP7XhiJJUDvR1e1D3eiVjgZ9VRiaV¬ify_self",
OrderedHeaders: azuretls.OrderedHeaders{
{"User-Agent", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36"},
},
})
if err = ws.WriteJSON(map[string]string{
"event": "new_message",
}); err != nil {
panic(err)
}
You can unmarshal the response body (JSON format) into a struct with the response.JSON
or response.MustJSON
methods.
session := azuretls.NewSession()
defer session.Close()
response, err := session.Get("https://tls.peet.ws/api/all")
if err != nil {
panic(err)
}
var data map[string]any
if err := response.JSON(&data); err != nil {
panic(err)
}
fmt.Println(data)
You can convert a struct into an url encoded string (used for urls or application/x-www-form-urlencoded
) with the azuretls.UrlEncode
method.
session := azuretls.NewSession()
defer session.Close()
type Foo struct {
Bar string `url:"bar"`
Baz string `url:"baz"`
}
body := azuretls.UrlEncode(Foo{
Bar: "bar",
Baz: "baz baz baz",
})
response, err := session.Post("https://tls.peet.ws/api/all", body)
if err != nil {
panic(err)
}
fmt.Println(response.StatusCode, string(response.Body))
You can dump the request and response with the session.Dump
method.
session := azuretls.NewSession()
session.Dump("./my_dump_dir",
"/any/path/to/ignore",
"can.ignore.this",
"*.all.subdomains",
)
session.Get("https://www.google.com")
// the request and response dump will be in the "my_dump_dir" directory.
You can log the request and response with the session.Log
method.
This will display the request and response in the console.
session := azuretls.NewSession()
session.Log(
"/any/path/to/ignore",
"can.ignore.this",
"*.all.subdomains",
)
session.Get("https://www.google.com")