Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Mon-ius/Docker-Warp-Socks
Connet to CloudFlare WARP, exposing `socks5` proxy all together.
https://github.com/Mon-ius/Docker-Warp-Socks
chatgpt cloudflare docker warp-plus wireguard
Last synced: 3 days ago
JSON representation
Connet to CloudFlare WARP, exposing `socks5` proxy all together.
- Host: GitHub
- URL: https://github.com/Mon-ius/Docker-Warp-Socks
- Owner: Mon-ius
- License: gpl-3.0
- Created: 2023-02-23T02:46:05.000Z (over 1 year ago)
- Default Branch: master
- Last Pushed: 2024-09-10T03:11:38.000Z (about 2 months ago)
- Last Synced: 2024-09-10T11:12:55.220Z (about 2 months ago)
- Topics: chatgpt, cloudflare, docker, warp-plus, wireguard
- Language: Shell
- Homepage: https://hub.docker.com/r/monius/docker-warp-socks
- Size: 173 KB
- Stars: 332
- Watchers: 2
- Forks: 36
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Docker-Warp-Socks
[![CI Status](https://github.com/Mon-ius/Docker-Warp-Socks/workflows/build/badge.svg)](https://github.com/Mon-ius/Docker-Warp-Socks/actions?query=workflow:build)
[![CI Status](https://github.com/Mon-ius/Docker-Warp-Socks/workflows/verify/badge.svg)](https://github.com/Mon-ius/Docker-Warp-Socks/actions?query=workflow:verify)
[![Docker Pulls](https://flat.badgen.net/docker/pulls/monius/docker-warp-socks?icon=docker)](https://hub.docker.com/r/monius/docker-warp-socks)
[![Code Size](https://img.shields.io/github/languages/code-size/Mon-ius/Docker-Warp-Socks)](https://github.com/Mon-ius/Docker-Warp-Socks)
[![License: GPL v3](https://img.shields.io/badge/License-GPLv3-blue.svg)](https://www.gnu.org/licenses/gpl-3.0)
[![Open Issues](https://img.shields.io/github/issues/Mon-ius/Docker-Warp-Socks)](https://github.com/Mon-ius/Docker-Warp-Socks/issues)
[![Visitors](https://api.visitorbadge.io/api/visitors?path=https://github.com/Mon-ius/Docker-Warp-Socks&label=Visitors%20Totay&labelColor=%23808080&countColor=%23ffa31a&style=flat&labelStyle=upper)](https://visitorbadge.io/status?path=https://github.com/Mon-ius/Docker-Warp-Socks)> A lightweight Docker image, designed for easy connection to CloudFlare WARP, exposing `socks5` proxy all together.
Multi-platform: `linux/amd64`, `linux/arm64`, `linux/arm`, `linux/ppc64le`, `linux/s390x` and `linux/riscv64`;
## Migrate to v3
- The `v2` version will be kept and available at `monius/docker-warp-socks:v2`.
- The `v3` version will soon be released and available at `monius/docker-warp-socks:v3` and default in `monius/docker-warp-socks`.
- The `Referral` programme will be concluded on Nov 1st from Cloudflare, the `Plus` flag in `v3` will be unavaible due to it.
- According to the new policy, see `sliver=005-tier1` for `plus` user and `siliver=none` for free account.
- The `v3` version will be based on `alpine 3.20`.## V3 features
- Support for mixed protocols on the default port `9091`. (https://github.com/Mon-ius/Docker-Warp-Socks/pull/15)
- Networking between containers. (https://github.com/Mon-ius/Docker-Warp-Socks/pull/16)
- More secure Bootstrap without `privileged` acquisition in docker container.
- Light start without `NET_ADMIN`, `SYS_MODULE`, `/lib/modules`, and extra `net` deps.
- Migration of core components from `Dante` and `ViRb3/wgcf` to `SagerNet/sing-box`.
- Support `linux/ppc64le` and `linux/riscv64` in addition.Quick start from:
```sh
docker run --restart=always -itd \
--name warp_socks_v3 \
-p 9091:9091 \
monius/docker-warp-socks:v3
```Then, verify on host with:
```sh
curl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
curl -x "http://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
```> [!TIP]
> - To use `plus` license, now called `siliver`, add `-e WARP_LICENSE=$WARP_LICENSE`.
> - To use customized `port`, set `-e NET_PORT=$NET_PORT`.
> - To use Tunnel Encryption with `user` and `passwd`, set `-e SOCK_USER=$USER` and `-e SOCK_PWD=$PASSWD`.```sh
docker run --restart=always -itd \
--name warp_socks_plus \
-e WARP_LICENSE=$WARP_LICENSE \
-e NET_PORT=9091 \
-p 9091:9091 \
monius/docker-warp-socks:v3
```Check if both `siliver=xxx-xxx` and `warp=on` shown from:
```sh
curl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
curl -x "http://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
```## V2 features
The features undergo the testing at [rws-cli](https://github.com/AUTOM77/RWS).
- `+` 1. automatically enroll the WARP+ account plan
- `+` 2. eBFP featured wireguard implement
- `+` 3. more OS/platform support
- `+` 4. access to `OpenAI Sora` without effort
- `+` 5. **96.3%** lighter(only `8MB`) in `alpine` core run in more small devices!
- `+` 6. from `10s` to `0.1s` clone speed up from dockerhub!
- `+` 7. Enhance **robustness** to handle restartorreboot events!
- `+` 8. all in one caller written in Rust!!!
- `+` 9. Used to join in the `SORA` RED TEAM waitlist!
- `+` 10. Used call `Gemini 1.5 Pro` API!
- `+` 11. Used to implement `SD 3.0` API!
- `+` 12. Used to use the `Claude 3.5 Sonnet`!
- `+` 13. Enable to join `Zero-Trust` team plan with **Unlimited** traffic plan!
- Automatically install and config CloudFlare WARP Client in Docker
- Enable the access of WARP network from Docker Container's **SOCKS5** port
- Extend accessibility and avoid potential restrictions by using proxy services
- Avoid looping verification in the Midjourney Discord Channel
- Prevent being banned by proxying API calls
- Successfully pre-process the AI WaitList
- Develop apps with warp embedded
- ~~Bypass the New Bing wait-list~~
- ...## Why to use
The official `warp-cli` only support amd64 machines, and its [guide](https://github.com/cloudflare/cloudflare-docs/pull/7644) is prone to causing potential connection loss risks on remote machines. It is recommended to experiment with fresh installations within a docker container, or you have to reboot it via the panel.
With any existed running proxy service, it acts just like a plugin that helps unlock public content such as `OpenAI Sora`, `OpenAI GPT-3.5`,`OpenAI GPT-4`, `OpenAI GPT-4V`, `OpenAI GPT-4o`, `OpenAI GPT-4o-mini`, ~~`Claude`~~, ~~`Claude 2`~~, `Claude 3 Opus`, `Claude 3.5 Sonnet`, ~~`Google Bard`~~, ~~`Google Gemini`~~, ~~`Google Gemini Pro Vision`~~, `Google Gemini Advanced`, `Google Gemini 1.5 PRO`, `Google Gemini 1.5 Flash` ~~`Google PaLM2 API`~~, `Google Vertex API`, `Google Scholar`, and `Netflix`. No necessary to have any knowledge of `CloudFlare`, `Warp`, `WireGuard`, and `WGCF` before using this image.
## Usage
The `v1` image is built on `debian:bookworm` aka `debian:12`, we recently migrate from `v1` to `v2`, which based on a more lighter container `alpine:3.19`. The main line will transition within a month, with minimal impact on the user side. As a contingency plan, users can revert to `monius/docker-warp-socks:v1` if needed.
***Please follow the EXAMPLES `1.1` and `2.1` To Get Start !***
### 💾 Prerequisites
```bash
# in case, you have no docker-ce installed;
curl -fsSL "https://get.docker.com" | sudo bash# to avoid `sudo` calling
sudo usermod -aG docker ${USER}
# or check https://docs.docker.com/engine/security/rootless
# if required a rootless install with `dockerd-rootless-setuptool.sh install`# in case, using Centos/RedHatEL
sudo systemctl enable docker && sudo systemctl start docker
```### 1. Docker CLI
#### 1.1 🎉 Quick Start
Run the following commands in your terminal:
```bash
docker run --privileged --restart=always -itd \
--name warp_socks \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv6.conf.all.disable_ipv6=0 \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /lib/modules:/lib/modules \
-p 9091:9091 \
monius/docker-warp-socks
```The above command will create a background service that allows the entire container network to join the dual-stack cloudflare network pool without disconnecting from the host.
#### 1.2 ⭐ WARP Plus Account(Advanced)
```bash
docker run --privileged --restart=always -itd \
--name warp_socks_plus \
-e WGCF_LICENSE_KEY=yourpluslicense \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv6.conf.all.disable_ipv6=0 \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /lib/modules:/lib/modules \
-p 9091:9091 \
monius/docker-warp-socks
```Run, `curl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"`;
See `plus` means ***WARP Plus License Key*** applied success.Updates: Since the policy changes, there will be no such `plus` flag when check with `https://www.cloudflare.com/cdn-cgi/trace`.
See `sliver=xxx-tier1` means sucess for now.#### 1.3 🔒 Tunnel Encryption(Advanced)
Run the following commands in your terminal:
```bash
docker run --privileged --restart=always -itd \
--name warp_socks_passwd \
-e SOCK_USER=monius \
-e SOCK_PWD=passwd \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv6.conf.all.disable_ipv6=0 \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /lib/modules:/lib/modules \
-p 9091:9091 \
monius/docker-warp-socks
```The above command will add a little encryption to the existed socks connection, just a little~
Run, `curl -U "monius:passwd" -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"` to go 🤗
#### 1.4 🪡 Custom Port(Advanced)
Run the following commands in your terminal:
```bash
docker run --privileged --restart=always -itd \
--name warp_socks_passwd \
-e NET_PORT=8091 \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv6.conf.all.disable_ipv6=0 \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /lib/modules:/lib/modules \
-p 8091:8091 \
monius/docker-warp-socks
```Run, `curl -x "socks5h://127.0.0.1:8091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"` to go 🤗
#### 1.5 🔧 Pre-Configuration Start (advanced)
To use your prepared config:
``` bash
docker run --privileged --restart=always -itd \
--name warp_socks \
-e SOCK_USER=monius \
-e SOCK_PWD=cool \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv6.conf.all.disable_ipv6=0 \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-p 127.0.0.1:9091:9091 \
-v /lib/modules:/lib/modules \
-v ~/wireguard/:/opt/wireguard/:ro \
monius/docker-warp-socks
```It will also recognize the prepared `wgcf-profile.conf` and `danted.conf` if they are located in `~/wireguard/`.
Use **-v** `~/wireguard/:/opt/wireguard/:ro` to map the directory.And, `-p 127.0.0.1:9091:9091` will create a localhost(`127.0.0.1`) access-only `9091` port to secure the connection.
#### 1.3 Test and Verify
To output the network test log:
``` bash
# Host
curl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
# See`warp=on` means success.
```### 2. Docker Compose
`docker-compose.yml` could replace some args in a file to run a container.
#### 💾 Download Standalone Docker-Compose V2 Binary
If you don't have Docker-Compose installed, following this:
```bash
sudo curl -fsSL `uname -s`-`uname -m` > /usr/bin/docker-composesudo chmod +x /usr/bin/docker-compose
```#### 2.1 🎉 Compose up the container
```bash
#start
curl -fsSL https://bit.ly/docker-warp-socks-compose | docker-compose -f - up -d --wait && curl --proxy socks5h://127.0.0.1:9091 "https://www.cloudflare.com/cdn-cgi/trace"#stop
curl -fsSL https://bit.ly/docker-warp-socks-compose | docker-compose -f - down
```### 3. Docker Stack Deploy
[![Try in PWD](https://github.com/play-with-docker/stacks/raw/cff22438cb4195ace27f9b15784bbb497047afa7/assets/images/button.png)](http://play-with-docker.com?stack=https://raw.githubusercontent.com/Mon-ius/Docker-Warp-Socks/main/dev/warp-socks.yml)
> Click the *CLOSE* button, Replace the $IP with the given one on the top side, then run:
> `curl -x "socks5h://$IP:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"`#### 3.1 Enable Swarm Mode
To use `Docker Stack`, first perform the *Swarm Initialized* by:
```bash
# create
docker swarm init# leave
docker swarm leave --force
```#### 3.2 Service Creation
```bash
# create
curl -fsSL https://bit.ly/docker-warp-socks-compose | docker stack deploy -c - TEST# remove
docker stack rm TEST
```#### 3.3 Check and Test
- `docker info`
- `docker node ls`
- `docker network ls`
- `docker stack ps TEST`
- `docker stack services TEST`
- `docker service ls`
- `docker service logs TEST_warp-socks`
- `docker service inspect TEST_warp-socks````bash
# in swarm mode, the ip addr is randomTID=`docker ps -aqf "name=^TEST_warp-socks"`
IF=`docker exec $TID sh -c "ip route show default" | awk '{print $5}'`
TIP=`docker exec $TID sh -c "ifconfig $IF" | awk '/inet /{print $2}' | cut -d' ' -f2`curl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
```
### 4. Official Implement
#### 4.1 For `warp-cli 2024.6` and later
```sh
echo y | warp-cli registration new
warp-cli registration license "$LICENSE_KEY"
warp-cli mode proxy
warp-cli proxy port 9091
warp-cli connectcurl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
```#### 4.1.1 `Proxy` Mode for newbie
For those who has `amd64` remote machine and don't need to use `docker` to secure network connection, I [suggest](https://github.com/cloudflare/cloudflare-docs/pull/7644) to use the official `warp-cli` as following:
```bash
curl -fsSL https://pkg.cloudflareclient.com/pubkey.gpg \
| sudo gpg --yes --dearmor --output /etc/apt/trusted.gpg.d/cloudflare-warp.gpgecho "deb https://pkg.cloudflareclient.com $(lsb_release -cs) main" \
| sudo tee /etc/apt/sources.list.d/cloudflare-warp.list > /dev/nullsudo apt-get -qq update && sudo apt-get -qq install cloudflare-warp
echo y | warp-cli register
warp-cli set-mode proxy
warp-cli set-proxy-port 9091
warp-cli connect# test
curl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
# See`warp=on` means success.
```#### 4.1.2 `Proxy` Mode with `Plus`
Prepare `WGCF_LICENSE_KEY="xxxxxxx"`
```bash
curl -fsSL https://pkg.cloudflareclient.com/pubkey.gpg \
| sudo gpg --yes --dearmor --output /etc/apt/trusted.gpg.d/cloudflare-warp.gpgecho "deb https://pkg.cloudflareclient.com $(lsb_release -cs) main" \
| sudo tee /etc/apt/sources.list.d/cloudflare-warp.list > /dev/nullsudo apt-get -qq update && sudo apt-get -qq install cloudflare-warp
echo y | warp-cli registration new && warp-cli registration license "$WGCF_LICENSE_KEY"
warp-cli mode proxy
warp-cli proxy port 9091
warp-cli connect# test
curl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
# Instead of `warp=plus`, see `sliver=005-tier1` means success.
```#### 4.2 `Default` Global Mode for old man
For those who are **ooold** enough for Linux network management, try it for a global proxy mode, keep in mind that you have already back up or have second way or third way to save your remote VM's network!!!
```bash
CF_WARP="https://pkg.cloudflareclient.com/pubkey.gpg"
_WARP="deb https://pkg.cloudflareclient.com $(lsb_release -cs) main"
echo "$_WARP" | sudo tee /etc/apt/sources.list.d/cloudflare-warp.list > /dev/null
curl -fsSL "$CF_WARP" | sudo gpg --yes --dearmor --output /etc/apt/trusted.gpg.d/cloudflare-warp.gpg
sudo apt-get -qq update && sudo apt-get -qq install cloudflare-warpGATEWAY=$(ip route show default | awk '/default/ {print $3}')
IFACE=$(ip route get 8.8.8.8 | sed -n 's/.*dev \([^\ ]*\).*/\1/p' | head -n 1)
_IPv4=$(ip addr show dev "$IFACE" | awk '/inet /{print $2}' | cut -d' ' -f2)
_IPv6=$(ip addr show dev "$IFACE" | awk '/inet6 /{print $2}' | cut -d' ' -f2)
# Setting for VPC ip structure
_VPC=$(curl -fsSL https://www.cloudflare.com/cdn-cgi/trace | grep 'ip' | sed 's/ip=//')echo y | warp-cli registration new
# Setting for VPC internal
warp-cli add-excluded-route "$_IPv4"
warp-cli add-excluded-route "$_IPv6"
warp-cli add-excluded-route "$_VPC"
# Setting for external ssh
echo "$SSH_CONNECTION" | sed 's/ .*//' | sed 's/[0-9]*$/0\/24/' | xargs warp-cli add-excluded-routewarp-cli connect
# Whole network in WARP proxy, `warp=on` means success.# Check `/var/log/cloudflare-warp/cfwarp_service_log.txt` for logs details
```
**Plz be aware that the VMs still has possibility to be lost due to the `IP` can still be changed after `reboot`!!!****DONT USE** `warp-cli tunnel ip add` to exclude ip for now!!!
```bash
GATEWAY=$(ip route show default | awk '/default/ {print $3}')
IFACE=$(ip route get 8.8.8.8 | sed -n 's/.*dev \([^\ ]*\).*/\1/p' | head -n 1)
_IPv4=$(ip addr show dev "$IFACE" | awk '/inet /{print $2}' | cut -d' ' -f2 | sed 's/\([0-9.]*\)\/.*/\1/')
_IPv6=$(ip addr show dev "$IFACE" | awk '/inet6 /{print $2}' | cut -d' ' -f2 | sed 's/\([0-9.]*\)\/.*/\1/')
warp-cli tunnel ip add "$_IPv4"
warp-cli tunnel ip add "$_IPv6"
warp-cli tunnel ip add "$_VPC"
echo "$SSH_CONNECTION" | sed 's/ .*//' | sed 's/[0-9]*$/0\/24/' | sed 's/\([0-9.]*\)\/.*/\1/' | xargs warp-cli tunnel ip add
```#### 4.3 `Zero-Trust` official implement
1. Go to `https://$TEAM.cloudflareaccess.com/warp` and authenticate.
2. On the ‘Success’ page in the browser, right click and ‘Inspect’ the blue ‘Open Cloudflare WARP’ button. Copy the long url start with `com.cloudflare.warp://` that’s shown linked to the button.
3. Assume you store it inside `$TOKEN_URL`
4. Go to `one.dash.cloudflare.com`
5. Find -> Setting -> WARP Client -> Device settings
6. Click Default -> Configure -> Split Tunnels -> Manage, then add exclude IPs which is same as `warp-cli add-excluded-route````bash
curl -fsSL https://pkg.cloudflareclient.com/pubkey.gpg \
| sudo gpg --yes --dearmor --output /etc/apt/trusted.gpg.d/cloudflare-warp.gpgecho "deb https://pkg.cloudflareclient.com $(lsb_release -cs) main" \
| sudo tee /etc/apt/sources.list.d/cloudflare-warp.list > /dev/nullsudo apt-get -qq update && sudo apt-get -qq install cloudflare-warp
TOKEN_URL="com.cloudflare.warp://xxx.cloudflareaccess.com/auth?token=xxxxx"
echo y | warp-cli registration token $TOKEN_URL
warp-cli connect
curl -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
curl --proxy socks5h://127.0.0.1:9011 https://www.cloudflare.com/cdn-cgi/trace
curl -x "socks5h://127.0.0.1:9091" -fsSL "https://www.cloudflare.com/cdn-cgi/trace"
```### 5. Debug Information
Debug commands for quick troubleshooting
```bash
docker rm -f $(docker ps -a -q) && docker rmi -f $(docker images -a -q)docker run --privileged --restart=always -itd \
--name warp_debug \
--sysctl net.ipv6.conf.all.disable_ipv6=0 \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
--cap-add NET_ADMIN --cap-add SYS_MODULE \
-p 9091:9091 \
-v /lib/modules:/lib/modules \
monius/docker-warp-socks:metadocker exec -it warp_debug /bin/bash
IFACE=$(ip route show default | grep default | awk '{print $5}')
IPv4=$(ifconfig "$IFACE" | awk '/inet /{print $2}' | cut -d' ' -f2)
IPv6=$(ifconfig "$IFACE" | awk '/inet6 /{print $2}' | cut -d' ' -f2)
TAR="https://api.github.com/repos/Mon-ius/Docker-Warp-Socks/releases/latest"
ARCH=$(dpkg --print-architecture)
URL=$(curl -fsSL ${TAR} | grep 'browser_download_url' | cut -d'"' -f4 | grep linux | grep "${ARCH}")
curl -LSs "${URL}" -o ./wgcf && chmod +x ./wgcf && mv ./wgcf /usr/bin
wgcf register --accept-tos && wgcf generate && mv wgcf-profile.conf /etc/wireguard/warp.conf
sed -i "/\[Interface\]/a PostDown = ip -6 rule delete from ${IPv6} lookup main" /etc/wireguard/warp.conf
sed -i "/\[Interface\]/a PostUp = ip -6 rule add from ${IPv6} lookup main" /etc/wireguard/warp.conf
sed -i "/\[Interface\]/a PostDown = ip -4 rule delete from ${IPv4} lookup main" /etc/wireguard/warp.conf
sed -i "/\[Interface\]/a PostUp = ip -4 rule add from ${IPv4} lookup main" /etc/wireguard/warp.confwg-quick up warp
curl "https://www.cloudflare.com/cdn-cgi/trace"
curl --interface eth0 "https://www.cloudflare.com/cdn-cgi/trace"
curl --interface warp "https://www.cloudflare.com/cdn-cgi/trace"```
### Known issues- CentOS/RedHat/Rocky Linux as Host, see https://github.com/uzairali001/docker-wireguard-rhel
### Source
[Docker-Warp-Socks](https://github.com/Mon-ius/Docker-Warp-Socks)### Credits
- [WireGuard](https://www.wireguard.com/)
- [Mon-ius/Docker-Warp-Socks](https://github.com/Mon-ius/Docker-Warp-Socks)
- [Cloudflare WARP](https://developers.cloudflare.com/warp-client/get-started/linux/)
- [SagerNet/sing-box](https://github.com/SagerNet/sing-box)
- [ViRb3/wgcf](https://github.com/ViRb3/wgcf)
- [Neilpang/wgcf-docker](https://github.com/Neilpang/wgcf-docker)
- [Wireguard-Socks-Proxy](https://github.com/ispmarin/wireguard-socks-proxy)
- [WARP exlude config](https://github.com/crzidea/confbook/blob/fe6e583dff223fc9d461cd8350adc24eff5b1925/apt/cloudflare-warp#L16)## Notice of Non-Affiliation and Disclaimer
We are not affiliated, associated, authorized, endorsed by, or in any way officially connected with Cloudflare, or any of its subsidiaries or its affiliates. The official Cloudflare website can be found at .
![visitor](https://count.getloli.com/get/@warp-socks?theme=asoul)