- Added a new proxy server that intercepts browser traffic and forwards requests through an Apps Script relay.
- Implemented response caching to optimize repeated requests.
- Included support for SOCKS5 proxy connections.
- Added handling for CORS preflight requests and response injection.
- Integrated domain-based policies for blocking and bypassing specific hosts.
- Enhanced error handling and logging for better debugging.
- Add _cors_preflight_response(): generates a 204 No Content response
with permissive CORS headers (Allow-Origin, Allow-Methods,
Allow-Headers, Allow-Credentials, Max-Age).
- Add _inject_cors_headers(): strips any existing Access-Control-*
headers from a relayed response and replaces them with permissive
ones, so the browser accepts the response regardless of the origin.
- In _do_mitm_connect (HTTPS MITM): intercept OPTIONS preflight
requests and respond locally — UrlFetchApp does not support OPTIONS
so forwarding preflights always failed. Inject CORS headers into all
other relayed responses when an Origin header is present.
- In _do_http (plain HTTP): same preflight interception and CORS
header injection for apps_script mode.
- Add cert_installer.py: cross-platform trusted CA installer
(Windows certutil/PowerShell, macOS security, Linux update-ca-certificates,
Firefox NSS via certutil/certutil)
- main.py: add --install-cert and --no-cert-check CLI flags; auto-detect and
auto-install MITM CA on startup when not yet trusted
- mitm.py: rename CA CN/O from 'DomainFront Tunnel' to 'MasterHttpRelayVPN'
- proxy_server.py: downgrade TLS handshake errors to DEBUG to reduce log noise
for non-HTTPS traffic (MTProto, plain HTTP on non-443 ports)
- README.md / README_FA.md: document new CLI flags, auto-install behaviour,
and cert_installer.py in project files table