| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290 |
- package cli
-
- import (
- "context"
- "fmt"
- "net"
- "net/url"
- "os"
-
- "github.com/9seconds/mtg/v2/antireplay"
- "github.com/9seconds/mtg/v2/events"
- "github.com/9seconds/mtg/v2/internal/config"
- "github.com/9seconds/mtg/v2/internal/proxyprotocol"
- "github.com/9seconds/mtg/v2/internal/utils"
- "github.com/9seconds/mtg/v2/ipblocklist"
- "github.com/9seconds/mtg/v2/ipblocklist/files"
- "github.com/9seconds/mtg/v2/logger"
- "github.com/9seconds/mtg/v2/mtglib"
- "github.com/9seconds/mtg/v2/network"
- "github.com/9seconds/mtg/v2/stats"
- "github.com/pires/go-proxyproto"
- "github.com/rs/zerolog"
- "github.com/yl2chen/cidranger"
- )
-
- func makeLogger(conf *config.Config) mtglib.Logger {
- zerolog.TimeFieldFormat = zerolog.TimeFormatUnixMs
- zerolog.TimestampFieldName = "timestamp"
- zerolog.LevelFieldName = "level"
-
- if conf.Debug.Get(false) {
- zerolog.SetGlobalLevel(zerolog.DebugLevel)
- } else {
- zerolog.SetGlobalLevel(zerolog.WarnLevel)
- }
-
- baseLogger := zerolog.New(os.Stdout).With().Timestamp().Logger()
-
- return logger.NewZeroLogger(baseLogger)
- }
-
- func makeNetwork(conf *config.Config, version string) (mtglib.Network, error) {
- tcpTimeout := conf.Network.Timeout.TCP.Get(network.DefaultTimeout)
- httpTimeout := conf.Network.Timeout.HTTP.Get(network.DefaultHTTPTimeout)
- dohIP := conf.Network.DOHIP.Get(net.ParseIP(network.DefaultDOHHostname)).String()
- userAgent := "mtg/" + version
-
- baseDialer, err := network.NewDefaultDialer(tcpTimeout, 0)
- if err != nil {
- return nil, fmt.Errorf("cannot build a default dialer: %w", err)
- }
-
- if len(conf.Network.Proxies) == 0 {
- return network.NewNetwork(baseDialer, userAgent, dohIP, httpTimeout) //nolint: wrapcheck
- }
-
- proxyURLs := make([]*url.URL, 0, len(conf.Network.Proxies))
-
- for _, v := range conf.Network.Proxies {
- if value := v.Get(nil); value != nil {
- proxyURLs = append(proxyURLs, value)
- }
- }
-
- if len(proxyURLs) == 1 {
- socksDialer, err := network.NewSocks5Dialer(baseDialer, proxyURLs[0])
- if err != nil {
- return nil, fmt.Errorf("cannot build socks5 dialer: %w", err)
- }
-
- return network.NewNetwork(socksDialer, userAgent, dohIP, httpTimeout) //nolint: wrapcheck
- }
-
- socksDialer, err := network.NewLoadBalancedSocks5Dialer(baseDialer, proxyURLs)
- if err != nil {
- return nil, fmt.Errorf("cannot build socks5 dialer: %w", err)
- }
-
- return network.NewNetwork(socksDialer, userAgent, dohIP, httpTimeout) //nolint: wrapcheck
- }
-
- func makeAntiReplayCache(conf *config.Config) mtglib.AntiReplayCache {
- if !conf.Defense.AntiReplay.Enabled.Get(false) {
- return antireplay.NewNoop()
- }
-
- return antireplay.NewStableBloomFilter(
- conf.Defense.AntiReplay.MaxSize.Get(antireplay.DefaultStableBloomFilterMaxSize),
- conf.Defense.AntiReplay.ErrorRate.Get(antireplay.DefaultStableBloomFilterErrorRate),
- )
- }
-
- func makeIPBlocklist(conf config.ListConfig,
- logger mtglib.Logger,
- ntw mtglib.Network,
- updateCallback ipblocklist.FireholUpdateCallback,
- ) (mtglib.IPBlocklist, error) {
- if !conf.Enabled.Get(false) {
- return ipblocklist.NewNoop(), nil
- }
-
- remoteURLs := []string{}
- localFiles := []string{}
-
- for _, v := range conf.URLs {
- if v.IsRemote() {
- remoteURLs = append(remoteURLs, v.String())
- } else {
- localFiles = append(localFiles, v.String())
- }
- }
-
- blocklist, err := ipblocklist.NewFirehol(logger.Named("ipblockist"),
- ntw,
- conf.DownloadConcurrency.Get(1),
- remoteURLs,
- localFiles,
- updateCallback)
- if err != nil {
- return nil, fmt.Errorf("incorrect parameters for firehol: %w", err)
- }
-
- go blocklist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
-
- return blocklist, nil
- }
-
- func makeIPAllowlist(conf config.ListConfig,
- logger mtglib.Logger,
- ntw mtglib.Network,
- updateCallback ipblocklist.FireholUpdateCallback,
- ) (mtglib.IPBlocklist, error) {
- var (
- allowlist mtglib.IPBlocklist
- err error
- )
-
- if !conf.Enabled.Get(false) {
- allowlist, err = ipblocklist.NewFireholFromFiles(
- logger.Named("ipblocklist"),
- 1,
- []files.File{
- files.NewMem([]*net.IPNet{
- cidranger.AllIPv4,
- cidranger.AllIPv6,
- }),
- },
- updateCallback,
- )
-
- go allowlist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
- } else {
- allowlist, err = makeIPBlocklist(
- conf,
- logger,
- ntw,
- updateCallback,
- )
- }
-
- if err != nil {
- return nil, fmt.Errorf("cannot build allowlist: %w", err)
- }
-
- return allowlist, nil
- }
-
- func makeEventStream(conf *config.Config, logger mtglib.Logger) (mtglib.EventStream, error) {
- factories := make([]events.ObserverFactory, 0, 2)
-
- if conf.Stats.StatsD.Enabled.Get(false) {
- statsdFactory, err := stats.NewStatsd(
- conf.Stats.StatsD.Address.Get(""),
- logger.Named("statsd"),
- conf.Stats.StatsD.MetricPrefix.Get(stats.DefaultStatsdMetricPrefix),
- conf.Stats.StatsD.TagFormat.Get(stats.DefaultStatsdTagFormat))
- if err != nil {
- return nil, fmt.Errorf("cannot build statsd observer: %w", err)
- }
-
- factories = append(factories, statsdFactory.Make)
- }
-
- if conf.Stats.Prometheus.Enabled.Get(false) {
- prometheus := stats.NewPrometheus(
- conf.Stats.Prometheus.MetricPrefix.Get(stats.DefaultMetricPrefix),
- conf.Stats.Prometheus.HTTPPath.Get("/"),
- )
-
- listener, err := net.Listen("tcp", conf.Stats.Prometheus.BindTo.Get(""))
- if err != nil {
- return nil, fmt.Errorf("cannot start a listener for prometheus: %w", err)
- }
-
- go prometheus.Serve(listener) //nolint: errcheck
-
- factories = append(factories, prometheus.Make)
- }
-
- if len(factories) > 0 {
- return events.NewEventStream(factories), nil
- }
-
- return events.NewNoopStream(), nil
- }
-
- func runProxy(conf *config.Config, version string) error { //nolint: funlen
- logger := makeLogger(conf)
-
- logger.BindJSON("configuration", conf.String()).Debug("configuration")
-
- eventStream, err := makeEventStream(conf, logger)
- if err != nil {
- return fmt.Errorf("cannot build event stream: %w", err)
- }
-
- ntw, err := makeNetwork(conf, version)
- if err != nil {
- return fmt.Errorf("cannot build network: %w", err)
- }
-
- blocklist, err := makeIPBlocklist(
- conf.Defense.Blocklist,
- logger.Named("blocklist"),
- ntw,
- func(ctx context.Context, size int) {
- eventStream.Send(ctx, mtglib.NewEventIPListSize(size, true))
- })
- if err != nil {
- return fmt.Errorf("cannot build ip blocklist: %w", err)
- }
-
- allowlist, err := makeIPAllowlist(
- conf.Defense.Allowlist,
- logger.Named("allowlist"),
- ntw,
- func(ctx context.Context, size int) {
- eventStream.Send(ctx, mtglib.NewEventIPListSize(size, false))
- },
- )
- if err != nil {
- return fmt.Errorf("cannot build ip allowlist: %w", err)
- }
-
- opts := mtglib.ProxyOpts{
- Logger: logger,
- Network: ntw,
- AntiReplayCache: makeAntiReplayCache(conf),
- IPBlocklist: blocklist,
- IPAllowlist: allowlist,
- EventStream: eventStream,
-
- Secret: conf.Secret,
- DomainFrontingPort: conf.DomainFrontingPort.Get(mtglib.DefaultDomainFrontingPort),
- DomainFrontingIP: conf.DomainFrontingIP.String(),
- DomainFrontingProxyProtocol: conf.DomainFrontingProxyProtocol.Get(false),
- PreferIP: conf.PreferIP.Get(mtglib.DefaultPreferIP),
-
- AllowFallbackOnUnknownDC: conf.AllowFallbackOnUnknownDC.Get(false),
- TolerateTimeSkewness: conf.TolerateTimeSkewness.Value,
- }
-
- proxy, err := mtglib.NewProxy(opts)
- if err != nil {
- return fmt.Errorf("cannot create a proxy: %w", err)
- }
-
- listener, err := utils.NewListener(conf.BindTo.Get(""), 0)
- if err != nil {
- return fmt.Errorf("cannot start proxy: %w", err)
- }
-
- if conf.ProxyProtocolListener.Get(false) {
- listener = &proxyprotocol.ListenerAdapter{
- Listener: proxyproto.Listener{
- Listener: listener,
- },
- }
- }
-
- ctx := utils.RootContext()
-
- go proxy.Serve(listener) //nolint: errcheck
-
- <-ctx.Done()
- listener.Close() //nolint: errcheck
- proxy.Shutdown()
-
- return nil
- }
|