Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

run_proxy.go 6.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223
  1. package cli
  2. import (
  3. "fmt"
  4. "net"
  5. "net/url"
  6. "os"
  7. "github.com/9seconds/mtg/v2/antireplay"
  8. "github.com/9seconds/mtg/v2/events"
  9. "github.com/9seconds/mtg/v2/internal/config"
  10. "github.com/9seconds/mtg/v2/internal/utils"
  11. "github.com/9seconds/mtg/v2/ipblocklist"
  12. "github.com/9seconds/mtg/v2/logger"
  13. "github.com/9seconds/mtg/v2/mtglib"
  14. "github.com/9seconds/mtg/v2/network"
  15. "github.com/9seconds/mtg/v2/stats"
  16. "github.com/rs/zerolog"
  17. )
  18. func makeLogger(conf *config.Config) mtglib.Logger {
  19. zerolog.TimeFieldFormat = zerolog.TimeFormatUnixMs
  20. zerolog.TimestampFieldName = "timestamp"
  21. zerolog.LevelFieldName = "level"
  22. if conf.Debug.Get(false) {
  23. zerolog.SetGlobalLevel(zerolog.DebugLevel)
  24. } else {
  25. zerolog.SetGlobalLevel(zerolog.WarnLevel)
  26. }
  27. baseLogger := zerolog.New(os.Stdout).With().Timestamp().Logger()
  28. return logger.NewZeroLogger(baseLogger)
  29. }
  30. func makeNetwork(conf *config.Config, version string) (mtglib.Network, error) {
  31. tcpTimeout := conf.Network.Timeout.TCP.Get(network.DefaultTimeout)
  32. httpTimeout := conf.Network.Timeout.HTTP.Get(network.DefaultHTTPTimeout)
  33. dohIP := conf.Network.DOHIP.Get(net.ParseIP(network.DefaultDOHHostname)).String()
  34. bufferSize := conf.TCPBuffer.Get(network.DefaultBufferSize)
  35. userAgent := "mtg/" + version
  36. baseDialer, err := network.NewDefaultDialer(tcpTimeout, int(bufferSize))
  37. if err != nil {
  38. return nil, fmt.Errorf("cannot build a default dialer: %w", err)
  39. }
  40. if len(conf.Network.Proxies) == 0 {
  41. return network.NewNetwork(baseDialer, userAgent, dohIP, httpTimeout) // nolint: wrapcheck
  42. }
  43. proxyURLs := make([]*url.URL, 0, len(conf.Network.Proxies))
  44. for _, v := range conf.Network.Proxies {
  45. if value := v.Get(nil); value != nil {
  46. proxyURLs = append(proxyURLs, value)
  47. }
  48. }
  49. if len(proxyURLs) == 1 {
  50. socksDialer, err := network.NewSocks5Dialer(baseDialer, proxyURLs[0])
  51. if err != nil {
  52. return nil, fmt.Errorf("cannot build socks5 dialer: %w", err)
  53. }
  54. return network.NewNetwork(socksDialer, userAgent, dohIP, httpTimeout) // nolint: wrapcheck
  55. }
  56. socksDialer, err := network.NewLoadBalancedSocks5Dialer(baseDialer, proxyURLs)
  57. if err != nil {
  58. return nil, fmt.Errorf("cannot build socks5 dialer: %w", err)
  59. }
  60. return network.NewNetwork(socksDialer, userAgent, dohIP, httpTimeout) // nolint: wrapcheck
  61. }
  62. func makeAntiReplayCache(conf *config.Config) mtglib.AntiReplayCache {
  63. if !conf.Defense.AntiReplay.Enabled.Get(false) {
  64. return antireplay.NewNoop()
  65. }
  66. return antireplay.NewStableBloomFilter(
  67. conf.Defense.AntiReplay.MaxSize.Get(antireplay.DefaultStableBloomFilterMaxSize),
  68. conf.Defense.AntiReplay.ErrorRate.Get(antireplay.DefaultStableBloomFilterErrorRate),
  69. )
  70. }
  71. func makeIPBlocklist(conf config.ListConfig, logger mtglib.Logger, ntw mtglib.Network) (mtglib.IPBlocklist, error) {
  72. if !conf.Enabled.Get(false) {
  73. return ipblocklist.NewNoop(), nil
  74. }
  75. remoteURLs := []string{}
  76. localFiles := []string{}
  77. for _, v := range conf.URLs {
  78. if v.IsRemote() {
  79. remoteURLs = append(remoteURLs, v.String())
  80. } else {
  81. localFiles = append(localFiles, v.String())
  82. }
  83. }
  84. firehol, err := ipblocklist.NewFirehol(logger.Named("ipblockist"),
  85. ntw,
  86. conf.DownloadConcurrency.Get(1),
  87. remoteURLs,
  88. localFiles)
  89. if err != nil {
  90. return nil, fmt.Errorf("incorrect parameters for firehol: %w", err)
  91. }
  92. return firehol, nil
  93. }
  94. func makeEventStream(conf *config.Config, logger mtglib.Logger) (mtglib.EventStream, error) {
  95. factories := make([]events.ObserverFactory, 0, 2) // nolint: gomnd
  96. if conf.Stats.StatsD.Enabled.Get(false) {
  97. statsdFactory, err := stats.NewStatsd(
  98. conf.Stats.StatsD.Address.Get(""),
  99. logger.Named("statsd"),
  100. conf.Stats.StatsD.MetricPrefix.Get(stats.DefaultStatsdMetricPrefix),
  101. conf.Stats.StatsD.TagFormat.Get(stats.DefaultStatsdTagFormat))
  102. if err != nil {
  103. return nil, fmt.Errorf("cannot build statsd observer: %w", err)
  104. }
  105. factories = append(factories, statsdFactory.Make)
  106. }
  107. if conf.Stats.Prometheus.Enabled.Get(false) {
  108. prometheus := stats.NewPrometheus(
  109. conf.Stats.Prometheus.MetricPrefix.Get(stats.DefaultMetricPrefix),
  110. conf.Stats.Prometheus.HTTPPath.Get("/"),
  111. )
  112. listener, err := net.Listen("tcp", conf.Stats.Prometheus.BindTo.Get(""))
  113. if err != nil {
  114. return nil, fmt.Errorf("cannot start a listener for prometheus: %w", err)
  115. }
  116. go prometheus.Serve(listener) // nolint: errcheck
  117. factories = append(factories, prometheus.Make)
  118. }
  119. if len(factories) > 0 {
  120. return events.NewEventStream(factories), nil
  121. }
  122. return events.NewNoopStream(), nil
  123. }
  124. func runProxy(conf *config.Config, version string) error { // nolint: funlen
  125. logger := makeLogger(conf)
  126. logger.BindJSON("configuration", conf.String()).Debug("configuration")
  127. ntw, err := makeNetwork(conf, version)
  128. if err != nil {
  129. return fmt.Errorf("cannot build network: %w", err)
  130. }
  131. blocklist, err := makeIPBlocklist(conf.Defense.Blocklist, logger, ntw)
  132. if err != nil {
  133. return fmt.Errorf("cannot build ip blocklist: %w", err)
  134. }
  135. var whitelist mtglib.IPBlocklist
  136. if conf.Defense.Allowlist.Enabled.Get(false) {
  137. whlist, err := makeIPBlocklist(conf.Defense.Allowlist, logger, ntw)
  138. if err != nil {
  139. return fmt.Errorf("cannot build ip blocklist: %w", err)
  140. }
  141. whitelist = whlist
  142. }
  143. eventStream, err := makeEventStream(conf, logger)
  144. if err != nil {
  145. return fmt.Errorf("cannot build event stream: %w", err)
  146. }
  147. opts := mtglib.ProxyOpts{
  148. Logger: logger,
  149. Network: ntw,
  150. AntiReplayCache: makeAntiReplayCache(conf),
  151. IPBlocklist: blocklist,
  152. IPWhitelist: whitelist,
  153. EventStream: eventStream,
  154. Secret: conf.Secret,
  155. BufferSize: conf.TCPBuffer.Get(mtglib.DefaultBufferSize),
  156. DomainFrontingPort: conf.DomainFrontingPort.Get(mtglib.DefaultDomainFrontingPort),
  157. PreferIP: conf.PreferIP.Get(mtglib.DefaultPreferIP),
  158. AllowFallbackOnUnknownDC: conf.AllowFallbackOnUnknownDC.Get(false),
  159. TolerateTimeSkewness: conf.TolerateTimeSkewness.Value,
  160. }
  161. proxy, err := mtglib.NewProxy(opts)
  162. if err != nil {
  163. return fmt.Errorf("cannot create a proxy: %w", err)
  164. }
  165. listener, err := utils.NewListener(conf.BindTo.Get(""), int(opts.BufferSize))
  166. if err != nil {
  167. return fmt.Errorf("cannot start proxy: %w", err)
  168. }
  169. ctx := utils.RootContext()
  170. go proxy.Serve(listener) // nolint: errcheck
  171. <-ctx.Done()
  172. listener.Close()
  173. proxy.Shutdown()
  174. return nil
  175. }