Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

run_proxy.go 7.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278
  1. package cli
  2. import (
  3. "context"
  4. "fmt"
  5. "net"
  6. "net/url"
  7. "os"
  8. "github.com/9seconds/mtg/v2/antireplay"
  9. "github.com/9seconds/mtg/v2/events"
  10. "github.com/9seconds/mtg/v2/internal/config"
  11. "github.com/9seconds/mtg/v2/internal/utils"
  12. "github.com/9seconds/mtg/v2/ipblocklist"
  13. "github.com/9seconds/mtg/v2/ipblocklist/files"
  14. "github.com/9seconds/mtg/v2/logger"
  15. "github.com/9seconds/mtg/v2/mtglib"
  16. "github.com/9seconds/mtg/v2/network"
  17. "github.com/9seconds/mtg/v2/stats"
  18. "github.com/rs/zerolog"
  19. "github.com/yl2chen/cidranger"
  20. )
  21. func makeLogger(conf *config.Config) mtglib.Logger {
  22. zerolog.TimeFieldFormat = zerolog.TimeFormatUnixMs
  23. zerolog.TimestampFieldName = "timestamp"
  24. zerolog.LevelFieldName = "level"
  25. if conf.Debug.Get(false) {
  26. zerolog.SetGlobalLevel(zerolog.DebugLevel)
  27. } else {
  28. zerolog.SetGlobalLevel(zerolog.WarnLevel)
  29. }
  30. baseLogger := zerolog.New(os.Stdout).With().Timestamp().Logger()
  31. return logger.NewZeroLogger(baseLogger)
  32. }
  33. func makeNetwork(conf *config.Config, version string) (mtglib.Network, error) {
  34. tcpTimeout := conf.Network.Timeout.TCP.Get(network.DefaultTimeout)
  35. httpTimeout := conf.Network.Timeout.HTTP.Get(network.DefaultHTTPTimeout)
  36. dohIP := conf.Network.DOHIP.Get(net.ParseIP(network.DefaultDOHHostname)).String()
  37. userAgent := "mtg/" + version
  38. baseDialer, err := network.NewDefaultDialer(tcpTimeout, 0)
  39. if err != nil {
  40. return nil, fmt.Errorf("cannot build a default dialer: %w", err)
  41. }
  42. if len(conf.Network.Proxies) == 0 {
  43. return network.NewNetwork(baseDialer, userAgent, dohIP, httpTimeout) //nolint: wrapcheck
  44. }
  45. proxyURLs := make([]*url.URL, 0, len(conf.Network.Proxies))
  46. for _, v := range conf.Network.Proxies {
  47. if value := v.Get(nil); value != nil {
  48. proxyURLs = append(proxyURLs, value)
  49. }
  50. }
  51. if len(proxyURLs) == 1 {
  52. socksDialer, err := network.NewSocks5Dialer(baseDialer, proxyURLs[0])
  53. if err != nil {
  54. return nil, fmt.Errorf("cannot build socks5 dialer: %w", err)
  55. }
  56. return network.NewNetwork(socksDialer, userAgent, dohIP, httpTimeout) //nolint: wrapcheck
  57. }
  58. socksDialer, err := network.NewLoadBalancedSocks5Dialer(baseDialer, proxyURLs)
  59. if err != nil {
  60. return nil, fmt.Errorf("cannot build socks5 dialer: %w", err)
  61. }
  62. return network.NewNetwork(socksDialer, userAgent, dohIP, httpTimeout) //nolint: wrapcheck
  63. }
  64. func makeAntiReplayCache(conf *config.Config) mtglib.AntiReplayCache {
  65. if !conf.Defense.AntiReplay.Enabled.Get(false) {
  66. return antireplay.NewNoop()
  67. }
  68. return antireplay.NewStableBloomFilter(
  69. conf.Defense.AntiReplay.MaxSize.Get(antireplay.DefaultStableBloomFilterMaxSize),
  70. conf.Defense.AntiReplay.ErrorRate.Get(antireplay.DefaultStableBloomFilterErrorRate),
  71. )
  72. }
  73. func makeIPBlocklist(conf config.ListConfig,
  74. logger mtglib.Logger,
  75. ntw mtglib.Network,
  76. updateCallback ipblocklist.FireholUpdateCallback,
  77. ) (mtglib.IPBlocklist, error) {
  78. if !conf.Enabled.Get(false) {
  79. return ipblocklist.NewNoop(), nil
  80. }
  81. remoteURLs := []string{}
  82. localFiles := []string{}
  83. for _, v := range conf.URLs {
  84. if v.IsRemote() {
  85. remoteURLs = append(remoteURLs, v.String())
  86. } else {
  87. localFiles = append(localFiles, v.String())
  88. }
  89. }
  90. blocklist, err := ipblocklist.NewFirehol(logger.Named("ipblockist"),
  91. ntw,
  92. conf.DownloadConcurrency.Get(1),
  93. remoteURLs,
  94. localFiles,
  95. updateCallback)
  96. if err != nil {
  97. return nil, fmt.Errorf("incorrect parameters for firehol: %w", err)
  98. }
  99. go blocklist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
  100. return blocklist, nil
  101. }
  102. func makeIPAllowlist(conf config.ListConfig,
  103. logger mtglib.Logger,
  104. ntw mtglib.Network,
  105. updateCallback ipblocklist.FireholUpdateCallback,
  106. ) (mtglib.IPBlocklist, error) {
  107. var (
  108. allowlist mtglib.IPBlocklist
  109. err error
  110. )
  111. if !conf.Enabled.Get(false) {
  112. allowlist, err = ipblocklist.NewFireholFromFiles(
  113. logger.Named("ipblocklist"),
  114. 1,
  115. []files.File{
  116. files.NewMem([]*net.IPNet{
  117. cidranger.AllIPv4,
  118. cidranger.AllIPv6,
  119. }),
  120. },
  121. updateCallback,
  122. )
  123. go allowlist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
  124. } else {
  125. allowlist, err = makeIPBlocklist(
  126. conf,
  127. logger,
  128. ntw,
  129. updateCallback,
  130. )
  131. }
  132. if err != nil {
  133. return nil, fmt.Errorf("cannot build allowlist: %w", err)
  134. }
  135. return allowlist, nil
  136. }
  137. func makeEventStream(conf *config.Config, logger mtglib.Logger) (mtglib.EventStream, error) {
  138. factories := make([]events.ObserverFactory, 0, 2) //nolint: gomnd
  139. if conf.Stats.StatsD.Enabled.Get(false) {
  140. statsdFactory, err := stats.NewStatsd(
  141. conf.Stats.StatsD.Address.Get(""),
  142. logger.Named("statsd"),
  143. conf.Stats.StatsD.MetricPrefix.Get(stats.DefaultStatsdMetricPrefix),
  144. conf.Stats.StatsD.TagFormat.Get(stats.DefaultStatsdTagFormat))
  145. if err != nil {
  146. return nil, fmt.Errorf("cannot build statsd observer: %w", err)
  147. }
  148. factories = append(factories, statsdFactory.Make)
  149. }
  150. if conf.Stats.Prometheus.Enabled.Get(false) {
  151. prometheus := stats.NewPrometheus(
  152. conf.Stats.Prometheus.MetricPrefix.Get(stats.DefaultMetricPrefix),
  153. conf.Stats.Prometheus.HTTPPath.Get("/"),
  154. )
  155. listener, err := net.Listen("tcp", conf.Stats.Prometheus.BindTo.Get(""))
  156. if err != nil {
  157. return nil, fmt.Errorf("cannot start a listener for prometheus: %w", err)
  158. }
  159. go prometheus.Serve(listener) //nolint: errcheck
  160. factories = append(factories, prometheus.Make)
  161. }
  162. if len(factories) > 0 {
  163. return events.NewEventStream(factories), nil
  164. }
  165. return events.NewNoopStream(), nil
  166. }
  167. func runProxy(conf *config.Config, version string) error { //nolint: funlen
  168. logger := makeLogger(conf)
  169. logger.BindJSON("configuration", conf.String()).Debug("configuration")
  170. eventStream, err := makeEventStream(conf, logger)
  171. if err != nil {
  172. return fmt.Errorf("cannot build event stream: %w", err)
  173. }
  174. ntw, err := makeNetwork(conf, version)
  175. if err != nil {
  176. return fmt.Errorf("cannot build network: %w", err)
  177. }
  178. blocklist, err := makeIPBlocklist(
  179. conf.Defense.Blocklist,
  180. logger.Named("blocklist"),
  181. ntw,
  182. func(ctx context.Context, size int) {
  183. eventStream.Send(ctx, mtglib.NewEventIPListSize(size, true))
  184. })
  185. if err != nil {
  186. return fmt.Errorf("cannot build ip blocklist: %w", err)
  187. }
  188. allowlist, err := makeIPAllowlist(
  189. conf.Defense.Allowlist,
  190. logger.Named("allowlist"),
  191. ntw,
  192. func(ctx context.Context, size int) {
  193. eventStream.Send(ctx, mtglib.NewEventIPListSize(size, false))
  194. },
  195. )
  196. if err != nil {
  197. return fmt.Errorf("cannot build ip allowlist: %w", err)
  198. }
  199. opts := mtglib.ProxyOpts{
  200. Logger: logger,
  201. Network: ntw,
  202. AntiReplayCache: makeAntiReplayCache(conf),
  203. IPBlocklist: blocklist,
  204. IPAllowlist: allowlist,
  205. EventStream: eventStream,
  206. Secret: conf.Secret,
  207. DomainFrontingPort: conf.DomainFrontingPort.Get(mtglib.DefaultDomainFrontingPort),
  208. PreferIP: conf.PreferIP.Get(mtglib.DefaultPreferIP),
  209. AllowFallbackOnUnknownDC: conf.AllowFallbackOnUnknownDC.Get(false),
  210. TolerateTimeSkewness: conf.TolerateTimeSkewness.Value,
  211. }
  212. proxy, err := mtglib.NewProxy(opts)
  213. if err != nil {
  214. return fmt.Errorf("cannot create a proxy: %w", err)
  215. }
  216. listener, err := utils.NewListener(conf.BindTo.Get(""), 0)
  217. if err != nil {
  218. return fmt.Errorf("cannot start proxy: %w", err)
  219. }
  220. ctx := utils.RootContext()
  221. go proxy.Serve(listener) //nolint: errcheck
  222. <-ctx.Done()
  223. listener.Close()
  224. proxy.Shutdown()
  225. return nil
  226. }