#request #http-request #websocket #websocket-client #http #client

chromimic

An easy and powerful Rust HTTP Client (Impersonate Chrome/OkHttp)

2 unstable releases

0.12.0 Apr 2, 2024
0.11.66 Mar 12, 2024

#89 in HTTP client

Download history 138/week @ 2024-03-11 5/week @ 2024-03-18 197/week @ 2024-04-01

340 downloads per month

MIT/Apache

760KB
16K SLoC

chromimic

A fork of reqwest-impersonate used to impersonate the Chrome browser / OkHttp with default certs. Inspired by curl-impersonate.

Fork with vendored certificates supports for boringssl

reqwest-impersonate

crates.io MIT/Apache-2 licensed CI

An ergonomic, batteries-included HTTP Client for Rust.

  • Plain bodies, JSON, urlencoded, multipart
  • Customizable redirect policy
  • HTTP Proxies
  • HTTPS via BoringSSL
  • WebSocket
  • Cookie Store
  • WASM
  • Changelog

A fork of reqwest used to impersonate the Chrome browser / OkHttp. Inspired by curl-impersonate.

Example

This asynchronous example uses Tokio and enables some optional features, so your Cargo.toml could look like this:

[dependencies]
tokio = { version = "1", features = ["full"] }
reqwest_impersonate = { version = "0.11", default-features = false, features = [
    "boring-tls",
    "impersonate"
] }

Or WebSocket:

[dependencies]
tokio = { version = "1", features = ["full"] }
reqwest_impersonate = { version = "0.11", default-features = false, features = [
    "boring-tls",
    "impersonate",
    "websocket",
] }

And then the code:

use std::error::Error;
use reqwest_impersonate as reqwest;
use reqwest::impersonate::Impersonate;

#[tokio::main]
async fn main() -> Result<(), Box<dyn Error>> {
    // Build a client to mimic Chrome120
    let client = reqwest::Client::builder()
        .impersonate(Impersonate::Chrome120)
        .danger_accept_invalid_certs(true)
        .enable_ech_grease(true)
        .permute_extensions(true)
        .cookie_store(true)
        .build()?;

    // Use the API you're already familiar with
    let resp = client.get("https://tls.peet.ws/api/all").send().await?;
    println!("{}", resp.text().await?);

    let resp = client
        .post("https://chat.openai.com/backend-api/conversation")
        .send().await?;
    println!("{}", resp.text().await?);
    
    Ok(())
}

And then the websocket code:

use reqwest_impersonate as reqwest;
use std::error::Error;
use tungstenite::Message;

use futures_util::{SinkExt, StreamExt, TryStreamExt};
use reqwest::{impersonate::Impersonate, Client};

#[tokio::main]
async fn main() -> Result<(), Box<dyn Error>> {
    let websocket = Client::builder()
        .impersonate_websocket(Impersonate::Chrome120)
        .build()?
        .get("wss://echo.websocket.org")
        .upgrade()
        .send()
        .await?
        .into_websocket()
        .await?;

    let (mut tx, mut rx) = websocket.split();

    tokio::spawn(async move {
        for i in 1..11 {
            tx.send(Message::Text(format!("Hello, World! #{i}")))
                .await
                .unwrap();
        }
    });

    while let Some(message) = rx.try_next().await? {
        match message {
            Message::Text(text) => println!("received: {text}"),
            _ => {}
        }
    }

    Ok(())
}

Requirements

On Linux:

  • OpenSSL with headers. See https://docs.rs/openssl for supported versions and more details. Alternatively you can enable the native-tls-vendored feature to compile a copy of OpenSSL.

On Windows and macOS:

  • Nothing.

Reqwest uses rust-native-tls, which will use the operating system TLS framework if available, meaning Windows and macOS. On Linux, it will use OpenSSL 1.1.

License

Licensed under either of

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Dependencies

~3–28MB
~551K SLoC