Highly-opinionated (ex-bullshit-free) MTPROTO proxy for Telegram. If you use v1.0 or upgrade broke you proxy, please read the chapter Version 2
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300
  1. package cli
  2. import (
  3. "context"
  4. "fmt"
  5. "net"
  6. "os"
  7. "github.com/9seconds/mtg/v2/antireplay"
  8. "github.com/9seconds/mtg/v2/events"
  9. "github.com/9seconds/mtg/v2/internal/config"
  10. "github.com/9seconds/mtg/v2/internal/proxyprotocol"
  11. "github.com/9seconds/mtg/v2/internal/utils"
  12. "github.com/9seconds/mtg/v2/ipblocklist"
  13. "github.com/9seconds/mtg/v2/ipblocklist/files"
  14. "github.com/9seconds/mtg/v2/logger"
  15. "github.com/9seconds/mtg/v2/mtglib"
  16. "github.com/9seconds/mtg/v2/network/v2"
  17. "github.com/9seconds/mtg/v2/stats"
  18. "github.com/pires/go-proxyproto"
  19. "github.com/rs/zerolog"
  20. "github.com/yl2chen/cidranger"
  21. )
  22. func makeLogger(conf *config.Config) mtglib.Logger {
  23. zerolog.TimeFieldFormat = zerolog.TimeFormatUnixMs
  24. zerolog.TimestampFieldName = "timestamp"
  25. zerolog.LevelFieldName = "level"
  26. if conf.Debug.Get(false) {
  27. zerolog.SetGlobalLevel(zerolog.DebugLevel)
  28. } else {
  29. zerolog.SetGlobalLevel(zerolog.WarnLevel)
  30. }
  31. baseLogger := zerolog.New(os.Stdout).With().Timestamp().Logger()
  32. return logger.NewZeroLogger(baseLogger)
  33. }
  34. func makeNetwork(conf *config.Config, version string) (mtglib.Network, error) {
  35. resolver, err := network.GetDNS(conf.GetDNS())
  36. if err != nil {
  37. return nil, fmt.Errorf("cannot create DNS resolver: %w", err)
  38. }
  39. base := network.New(
  40. resolver,
  41. "",
  42. conf.Network.Timeout.TCP.Get(0),
  43. conf.Network.Timeout.HTTP.Get(0),
  44. conf.Network.Timeout.Idle.Get(0),
  45. )
  46. proxyDialers := make([]mtglib.Network, len(conf.Network.Proxies))
  47. for idx, v := range conf.Network.Proxies {
  48. value, err := network.NewProxyNetwork(base, v.Get(nil))
  49. if err != nil {
  50. return nil, fmt.Errorf("cannot use %v for proxy url: %w", v.Get(nil), err)
  51. }
  52. proxyDialers[idx] = value
  53. }
  54. switch len(proxyDialers) {
  55. case 0:
  56. return base, nil
  57. case 1:
  58. return proxyDialers[0], nil
  59. }
  60. value, err := network.Join(proxyDialers...)
  61. if err != nil {
  62. panic(err)
  63. }
  64. return value, nil
  65. }
  66. func makeAntiReplayCache(conf *config.Config) mtglib.AntiReplayCache {
  67. if !conf.Defense.AntiReplay.Enabled.Get(false) {
  68. return antireplay.NewNoop()
  69. }
  70. return antireplay.NewStableBloomFilter(
  71. conf.Defense.AntiReplay.MaxSize.Get(antireplay.DefaultStableBloomFilterMaxSize),
  72. conf.Defense.AntiReplay.ErrorRate.Get(antireplay.DefaultStableBloomFilterErrorRate),
  73. )
  74. }
  75. func makeIPBlocklist(conf config.ListConfig,
  76. logger mtglib.Logger,
  77. ntw mtglib.Network,
  78. updateCallback ipblocklist.FireholUpdateCallback,
  79. ) (mtglib.IPBlocklist, error) {
  80. if !conf.Enabled.Get(false) {
  81. return ipblocklist.NewNoop(), nil
  82. }
  83. remoteURLs := []string{}
  84. localFiles := []string{}
  85. for _, v := range conf.URLs {
  86. if v.IsRemote() {
  87. remoteURLs = append(remoteURLs, v.String())
  88. } else {
  89. localFiles = append(localFiles, v.String())
  90. }
  91. }
  92. blocklist, err := ipblocklist.NewFirehol(logger.Named("ipblockist"),
  93. ntw,
  94. conf.DownloadConcurrency.Get(1),
  95. remoteURLs,
  96. localFiles,
  97. updateCallback)
  98. if err != nil {
  99. return nil, fmt.Errorf("incorrect parameters for firehol: %w", err)
  100. }
  101. go blocklist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
  102. return blocklist, nil
  103. }
  104. func makeIPAllowlist(conf config.ListConfig,
  105. logger mtglib.Logger,
  106. ntw mtglib.Network,
  107. updateCallback ipblocklist.FireholUpdateCallback,
  108. ) (mtglib.IPBlocklist, error) {
  109. var (
  110. allowlist mtglib.IPBlocklist
  111. err error
  112. )
  113. if !conf.Enabled.Get(false) {
  114. allowlist, err = ipblocklist.NewFireholFromFiles(
  115. logger.Named("ipblocklist"),
  116. 1,
  117. []files.File{
  118. files.NewMem([]*net.IPNet{
  119. cidranger.AllIPv4,
  120. cidranger.AllIPv6,
  121. }),
  122. },
  123. updateCallback,
  124. )
  125. go allowlist.Run(conf.UpdateEach.Get(ipblocklist.DefaultFireholUpdateEach))
  126. } else {
  127. allowlist, err = makeIPBlocklist(
  128. conf,
  129. logger,
  130. ntw,
  131. updateCallback,
  132. )
  133. }
  134. if err != nil {
  135. return nil, fmt.Errorf("cannot build allowlist: %w", err)
  136. }
  137. return allowlist, nil
  138. }
  139. func makeEventStream(conf *config.Config, logger mtglib.Logger) (mtglib.EventStream, error) {
  140. factories := make([]events.ObserverFactory, 0, 2)
  141. if conf.Stats.StatsD.Enabled.Get(false) {
  142. statsdFactory, err := stats.NewStatsd(
  143. conf.Stats.StatsD.Address.Get(""),
  144. logger.Named("statsd"),
  145. conf.Stats.StatsD.MetricPrefix.Get(stats.DefaultStatsdMetricPrefix),
  146. conf.Stats.StatsD.TagFormat.Get(stats.DefaultStatsdTagFormat))
  147. if err != nil {
  148. return nil, fmt.Errorf("cannot build statsd observer: %w", err)
  149. }
  150. factories = append(factories, statsdFactory.Make)
  151. }
  152. if conf.Stats.Prometheus.Enabled.Get(false) {
  153. prometheus := stats.NewPrometheus(
  154. conf.Stats.Prometheus.MetricPrefix.Get(stats.DefaultMetricPrefix),
  155. conf.Stats.Prometheus.HTTPPath.Get("/"),
  156. )
  157. listener, err := net.Listen("tcp", conf.Stats.Prometheus.BindTo.Get(""))
  158. if err != nil {
  159. return nil, fmt.Errorf("cannot start a listener for prometheus: %w", err)
  160. }
  161. go prometheus.Serve(listener) //nolint: errcheck
  162. factories = append(factories, prometheus.Make)
  163. }
  164. if len(factories) > 0 {
  165. return events.NewEventStream(factories), nil
  166. }
  167. return events.NewNoopStream(), nil
  168. }
  169. func runProxy(conf *config.Config, version string) error { //nolint: funlen
  170. logger := makeLogger(conf)
  171. logger.BindJSON("configuration", conf.String()).Debug("configuration")
  172. eventStream, err := makeEventStream(conf, logger)
  173. if err != nil {
  174. return fmt.Errorf("cannot build event stream: %w", err)
  175. }
  176. ntw, err := makeNetwork(conf, version)
  177. if err != nil {
  178. return fmt.Errorf("cannot build network: %w", err)
  179. }
  180. blocklist, err := makeIPBlocklist(
  181. conf.Defense.Blocklist,
  182. logger.Named("blocklist"),
  183. ntw,
  184. func(ctx context.Context, size int) {
  185. eventStream.Send(ctx, mtglib.NewEventIPListSize(size, true))
  186. })
  187. if err != nil {
  188. return fmt.Errorf("cannot build ip blocklist: %w", err)
  189. }
  190. allowlist, err := makeIPAllowlist(
  191. conf.Defense.Allowlist,
  192. logger.Named("allowlist"),
  193. ntw,
  194. func(ctx context.Context, size int) {
  195. eventStream.Send(ctx, mtglib.NewEventIPListSize(size, false))
  196. },
  197. )
  198. if err != nil {
  199. return fmt.Errorf("cannot build ip allowlist: %w", err)
  200. }
  201. doppelGangerURLs := make([]string, len(conf.Defense.Doppelganger.URLs))
  202. for i, v := range conf.Defense.Doppelganger.URLs {
  203. doppelGangerURLs[i] = v.String()
  204. }
  205. opts := mtglib.ProxyOpts{
  206. Logger: logger,
  207. Network: ntw,
  208. AntiReplayCache: makeAntiReplayCache(conf),
  209. IPBlocklist: blocklist,
  210. IPAllowlist: allowlist,
  211. EventStream: eventStream,
  212. Secret: conf.Secret,
  213. Concurrency: conf.GetConcurrency(mtglib.DefaultConcurrency),
  214. DomainFrontingPort: conf.GetDomainFrontingPort(mtglib.DefaultDomainFrontingPort),
  215. DomainFrontingIP: conf.GetDomainFrontingIP(nil),
  216. DomainFrontingProxyProtocol: conf.GetDomainFrontingProxyProtocol(false),
  217. PreferIP: conf.PreferIP.Get(mtglib.DefaultPreferIP),
  218. AutoUpdate: conf.AutoUpdate.Get(false),
  219. AllowFallbackOnUnknownDC: conf.AllowFallbackOnUnknownDC.Get(false),
  220. TolerateTimeSkewness: conf.TolerateTimeSkewness.Value,
  221. IdleTimeout: conf.Network.Timeout.Idle.Get(mtglib.DefaultIdleTimeout),
  222. DoppelGangerURLs: doppelGangerURLs,
  223. DoppelGangerPerRaid: conf.Defense.Doppelganger.Repeats.Get(mtglib.DoppelGangerPerRaid),
  224. DoppelGangerEach: conf.Defense.Doppelganger.UpdateEach.Get(mtglib.DoppelGangerEach),
  225. DoppelGangerDRS: conf.Defense.Doppelganger.DRS.Get(false),
  226. }
  227. proxy, err := mtglib.NewProxy(opts)
  228. if err != nil {
  229. return fmt.Errorf("cannot create a proxy: %w", err)
  230. }
  231. listener, err := utils.NewListener(conf.BindTo.Get(""), 0)
  232. if err != nil {
  233. return fmt.Errorf("cannot start proxy: %w", err)
  234. }
  235. if conf.ProxyProtocolListener.Get(false) {
  236. listener = &proxyprotocol.ListenerAdapter{
  237. Listener: proxyproto.Listener{
  238. Listener: listener,
  239. },
  240. }
  241. }
  242. ctx := utils.RootContext()
  243. go proxy.Serve(listener) //nolint: errcheck
  244. <-ctx.Done()
  245. listener.Close() //nolint: errcheck
  246. proxy.Shutdown()
  247. return nil
  248. }