Security News
Weekly Downloads Now Available in npm Package Search Results
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.
libcurl.js
Advanced tools
This is an experimental port of libcurl to WebAssembly for use in the browser. It provides an interface compatible with the Fetch API, allowing you to proxy HTTPS requests from the browser with full TLS encryption. Unlike previous implementations, the proxy server cannot read the contents of your requests.
You can build this project by running the following commands:
git clone https://github.com/ading2210/libcurl.js --recursive
cd libcurl.js/client
./build.sh
Make sure you have emscripten, git, and the various C build tools installed. The only OS supported for building libcurl.js is Linux. On Debian-based systems, you can run the following command to install all the dependencies:
sudo apt install make cmake emscripten autoconf automake libtool pkg-config wget xxd jq
The build script will generate client/out/libcurl.js
as well as client/out/libcurl.mjs
, which is an ES6 module. You can supply the following arguments to the build script to control the build:
release
- Use all optimizations.single_file
- Include the WASM binary in the outputted JS using base64.all
- Build twice, once normally, and once as a single file.To import the library, follow the build instructions in the previous section, and copy client/out/libcurl.js
and client/out/libcurl.wasm
to a directory of your choice. After the script is loaded, call libcurl.load_wasm
, specifying the url of the libcurl.wasm
file.
<script defer src="./out/libcurl.js" onload="libcurl.load_wasm('/out/libcurl.wasm');"></script>
Alternatively, prebuilt versions can be found on NPM and jsDelivr. You can use the following URLs to load libcurl.js from a third party CDN.
https://cdn.jsdelivr.net/npm/libcurl.js@latest/libcurl.js
https://cdn.jsdelivr.net/npm/libcurl.js@latest/libcurl.wasm
To know when libcurl.js has finished loading, you can use the libcurl_load
DOM event.
document.addEventListener("libcurl_load", ()=>{
libcurl.set_websocket(`wss://${location.hostname}/ws/`);
console.log("libcurl.js ready!");
});
You may also use the, the libcurl.onload
callback, which can be useful for running libcurl.js inside a web worker.
libcurl.onload = () => {
console.log("libcurl.js ready!");
}
Once loaded, there will be a window.libcurl
object which includes all the API functions. The libcurl.ready
property can also be used to know if the WASM has loaded.
To perform HTTP requests, use libcurl.fetch
, which takes the same arguments as the browser's regular fetch
function. Like the standard Fetch API, libcurl.fetch
will also return a Response
object.
let r = await libcurl.fetch("https://ading.dev");
console.log(await r.text());
Most of the standard Fetch API's features are supported, with the exception of:
FormData
or URLSearchParams
as the request bodyNote that there is a hard limit of 50 active TCP connections due to emscripten limitations.
To use WebSockets, create a libcurl.CurlWebSocket
object, which takes the following arguments:
url
- The Websocket URL.protocols
- A optional list of websocket subprotocols, as an array of strings.options
- An optional object with extra settings to pass to curl.The valid WebSocket options are:
headers
- HTTP request headers for the websocket handshake.verbose
- A boolean flag that toggles the verbose libcurl output. This verbose output will be passed to the function defined in libcurl.stderr
, which is console.warn
by default.The following callbacks are available:
CurlWebSocket.onopen
- Called when the websocket is successfully connected.CurlWebSocket.message
- Called when a websocket message is received from the server. The data is passed to the first argument of the function, and it will be either a Uint8Array
or a string, depending on the type of message.CurlWebSocket.onclose
- Called when the websocket is cleanly closed with no error.CurlWebSocket.onerror
- Called when the websocket encounters an unexpected error. The error code is passed to the first argument of the function.The CurlWebSocket.send
function can be used to send data to the websocket. The only argument is the data that is to be sent, which must be either a string or a Uint8Array
.
let ws = new libcurl.CurlWebSocket("wss://echo.websocket.org", [], {verbose: 1});
ws.onopen = () => {
console.log("ws connected!");
ws.send("hello".repeat(100));
};
ws.onmessage = (data) => {
console.log(data);
};
You can also use the libcurl.WebSocket
object, which works identically to the regular WebSocket object. It uses the same arguments as the simpler CurlWebSocket
API.
let ws = new libcurl.WebSocket("wss://echo.websocket.org");
ws.addEventListener("open", () => {
console.log("ws connected!");
ws.send("hello".repeat(128));
});
ws.addEventListener("message", (event) => {
console.log(event.data);
});
Raw TLS sockets can be created with the libcurl.TLSSocket
class, which takes the following arguments:
host
- The hostname to connect to.port
- The TCP port to connect to.options
- An optional object with extra settings to pass to curl.The valid TLS socket options are:
verbose
- A boolean flag that toggles the verbose libcurl output.The callbacks work similarly to the libcurl.CurlWebSocket
object, with the main difference being that the onmessage
callback always returns a Uint8Array
.
The TLSSocket.send
function can be used to send data to the socket. The only argument is the data that is to be sent, which must be a Uint8Array
.
let socket = new libcurl.TLSSocket("ading.dev", 443, {verbose: 1});
socket.onopen = () => {
console.log("socket connected!");
let str = "GET /all HTTP/1.1\r\nHost: ading.dev\r\nConnection: close\r\n\r\n";
socket.send(new TextEncoder().encode(str));
};
socket.onmessage = (data) => {
console.log(new TextDecoder().decode(data));
};
You can change the underlying network transport by setting libcurl.transport
. The following values are accepted:
"wisp"
- Use the Wisp protocol."wsproxy"
- Use the wsproxy protocol, where a new websocket is created for each TCP connection.WebSocket
API. The URL that is passed into this fake websocket always looks like "wss://example.com/ws/ading.dev:443"
, where wss://example.com/ws/
is the proxy server URL, and ading.dev:443
is the destination server.You can change the URL of the websocket proxy by using libcurl.set_websocket
.
libcurl.set_websocket("ws://localhost:6001/");
If the websocket proxy URL is not set and one of the other API functions is called, an error will be thrown. Note that this URL must end with a trailing slash.
If you want more information about a connection, you can pass the _libcurl_verbose
argument to the libcurl.fetch
function. These are the same messages that you would see if you ran curl -v
on the command line.
await libcurl.fetch("https://example.com", {_libcurl_verbose: 1});
By default this will print the output to the browser console, but you can set libcurl.stdout
and libcurl.stderr
to intercept these messages. This callback will be executed on every line of text that libcurl outputs.
libcurl.stderr = (text) => {document.body.innerHTML += text};
Libcurl.js will also output some error messages to the browser console. You can intercept these messages by setting the libcurl.logger
callback, which takes two arguments:
type
- The type of message. This will be one of the following: "log"
, "warn"
, "error"
text
- The text that is to be logged.You can get version information from the libcurl.version
object. This object will also contain the versions of all the C libraries that libcurl.js uses. libcurl.version.lib
returns the version of libcurl.js itself.
You can get the CA cert bundle that libcurl uses by calling libcurl.get_cacert()
. The function will return a string with the certificates in PEM format. The cert bundle comes from the official curl website, which is extracted from the Mozilla Firefox source code.
The proxy server consists of a standard Wisp server, allowing multiple TCP connections to share the same websocket.
To host the proxy server, run the following commands:
git clone https://github.com/ading2210/libcurl.js --recursive
cd libcurl.js
server/run.sh --static=./client
For a full list of server arguments, see the wisp-server-python documentation.
This project is licensed under the GNU AGPL v3.
ading2210/libcurl.js - A port of libcurl to WASM for use in the browser.
Copyright (C) 2023 ading2210
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
v0.4.0 (3/7/24):
libcurl.CurlWebSocket
and libcurl.WebSocket
polyfillFAQs
A port of libcurl to WebAssembly, for proxying HTTPS requests from the browser with full TLS encryption
The npm package libcurl.js receives a total of 1,198 weekly downloads. As such, libcurl.js popularity was classified as popular.
We found that libcurl.js demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.
Security News
A Stanford study reveals 9.5% of engineers contribute almost nothing, costing tech $90B annually, with remote work fueling the rise of "ghost engineers."
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.