Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/paper-dragon/docker-transparent-proxy
Docker透明代理,给容器分配一个公网地址。通过共享网络命名空间将正在运行的容器的网络提供给另一个工作容器。
https://github.com/paper-dragon/docker-transparent-proxy
clash docker docker-tproxy private-network proxy proxy-server tproxy tun2proxy warp-docker zero-trust
Last synced: 2 months ago
JSON representation
Docker透明代理,给容器分配一个公网地址。通过共享网络命名空间将正在运行的容器的网络提供给另一个工作容器。
- Host: GitHub
- URL: https://github.com/paper-dragon/docker-transparent-proxy
- Owner: Paper-Dragon
- License: mit
- Created: 2024-04-19T06:58:18.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-10-05T15:18:09.000Z (3 months ago)
- Last Synced: 2024-10-11T13:02:42.841Z (2 months ago)
- Topics: clash, docker, docker-tproxy, private-network, proxy, proxy-server, tproxy, tun2proxy, warp-docker, zero-trust
- Homepage: https://www.geekery.cn/
- Size: 33.2 KB
- Stars: 3
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Docker透明代理(Docker Transparent Proxy)
实现给一个容器分配一个公网ip,并且连接到国际网络,采用了clash,warp,tun2proxy三种实现方式。
## Docker透明代理
- [Clash Core实现模式](#clash-core实现模式)
- [Clash Core功能](#clash-core功能)
- [Clash Core启动方法](#clash-core启动方法)
- [Clash配置文档](#clash配置文档)
- [Clash案例](#clash案例)- [Warp实现模式](#warp实现模式)
- [功能](#功能)
- [如何使用?](#如何使用)
- [启动模式](#启动模式)
- [Zero Turst模式](#zero-turst模式)
- [Zero-Turst模式启动日志](#zero-turst模式启动日志)
- [Warp Plus模式](#zarp-plus模式)
- [Warp-Plus模式启动日志](#warp-plus模式启动日志)
- [Free 模式](#free-模式)- [tun2proxy实现模式](#tun2proxy实现模式)
- [tun2proxy的局限性](#tun2proxy的局限性)
- [tun2proxy使用方法](#tun2proxy使用方法)- [声明](#声明)
- [致谢](#致谢)
- [协议](#致谢)## Clash Core实现模式
更新了新版meta内核,安全性有保障。
### Clash Core功能
通过订阅机场的连接或者使用自己搭建的节点进行流量透明代理。
### Clash Core启动方法
编写 `config.yaml` 并添加节点,原有配置不要修改。
### Clash配置文档
[虚空终端 Docs](https://wiki.metacubex.one/config/)
### Clash案例
config.yaml实例
```yaml
mode: rule
mixed-port: 7897
socks-port: 7898
port: 7899
allow-lan: false
log-level: info
ipv6: false
secret: ''
external-controller: 0.0.0.0:9097
bind-address: '*'
dns:
enable: true
ipv6: false
default-nameserver:
- 223.5.5.5
- 119.29.29.29
enhanced-mode: fake-ip
fake-ip-range: 198.18.0.1/16
use-hosts: true
nameserver:
- https://doh.pub/dns-query
- https://dns.alidns.com/dns-query
fallback:
- https://doh.dns.sb/dns-query
- https://dns.cloudflare.com/dns-query
- https://dns.twnic.tw/dns-query
- tls://8.8.4.4:853
fallback-filter:
geoip: true
ipcidr:
- 240.0.0.0/4
- 0.0.0.0/32
fake-ip-filter:
- dns.msftncsi.com
- www.msftncsi.com
- www.msftconnecttest.com
tun:
stack: gvisor
device: Meta
auto-route: true
auto-detect-interface: true
dns-hijack:
- any:53
strict-route: true
mtu: 9000
enable: true
proxies:```
启动
```bash
cd tproxy-clash
docker compose up -d
```## Warp实现模式
这个代码实现通过warp网络给一个容器分配一个公网ip,并且连接到国际网络。
透明代理项目源码地址 [Warp Tproxy For Docker](https://github.com/Paper-Dragon/warp-tproxy-for-docker) 。
Docker Hub地址 [jockerdragon/warp-tproxy](https://hub.docker.com/r/jockerdragon/warp-tproxy)。
免费密钥获取: [geekery.cn](https://www.geekery.cn/free-service/cloudflare-warp.html)。
适用于 `free` 或 `warp+` 和 `Zero Trust` 网络,因为不可明说的原因,大陆用户建议使用 `Zero Trust` 。
### 功能
它可以让单个Docker容器内部具有透明代理,且拥有一个与本机公网ip不同的公网ip。
#### 如何使用?
根据启动模式在 `docker-compose.yaml` 文件里设置变量。
启动命令
```bash
docker compose up -d
```测试
```bash
docker exec -it warp-transparent-proxy-warp-tproxy-1 bash
apt update && apt install curl -y
curl ifconfig.icu
curl cip.cc
```### 启动模式
详细介绍看 [Warp Tproxy For Docker](https://github.com/Paper-Dragon/warp-tproxy-for-docker/blob/container-tproxy/README.zh_CN.md)
#### Zero Turst模式
设置环境变量
```bash
# 使用zero trust方式
- WARP_ORG_ID=paperdragxx
- WARP_AUTH_CLIENT_ID=c4d31ea084c2940e17b714de890xxxxx.access
- WARP_AUTH_CLIENT_SECRET=7120f34bd52ce19a90534ca804cdaeaa72bb03e9c5da10ee0279fdc7bcdxxxxx
- WARP_UNIQUE_CLIENT_ID=aa7b5738-ff99-11ee-b4c1-72e2181b199b # 可选
```##### Zero-Turst模式启动日志
```text
[+] Starting dbus...
[+] warp's TOS already accepted!
[+] Starting warp-svc...
[!] warp-svc in debug mode
/entrypoint.sh: line 85: docker: command not found
[!] show warp svc log
nohup: appending output to 'nohup.out'
[!] wait for warp-svc to start in debug mode
[+] wait warp-svc show status ...
Status update: Connecting
[+] Set warp license to Y9U8f53G-0C8Z9d1j-C37hg8c9 ... Success
[+] New registration generated ... Error: Old registration is still around. Try running: "warp-cli registration delete"
[+] Set warp mode to warp ... Success
[+] Turn ON warp ... Success
[+] Waiting for warp to connect...
[+] warp connected!
[+] All services started!
---
warp-svc config: /var/lib/cloudflare-warp/conf.json
---
[+] warp status: Status update: Connected[+] You can check it with warp local tproxy in container:
E.g.:
curl https://cloudflare.com/cdn-cgi/trace (inside container)
```#### Warp Plus模式
必须在宿主机内安装wireguard `apt update && apt install wireguard -y`
```bash
# 使用key方式
- WARP_LICENSE=Y9U8f53G-0C8Z9d1j-C37hg8c9
```##### Warp-Plus模式启动日志
```text
* 正在执行任务: docker compose --file '/root/docker-transparent-proxy/tproxy-warp/docker-compose.yaml' --project-name 'warp-transparent-proxy' logs --follow --tail '1000'WARN[0000] /root/docker-transparent-proxy/tproxy-warp/docker-compose.yaml: `version` is obsolete
warp-tproxy-1 | [+] Starting dbus...
warp-tproxy-1 | [+] Bypassing warp's TOS ...
warp-tproxy-1 | [+] Starting warp-svc...
warp-tproxy-1 | [+] Waiting for warp to connect...
warp-tproxy-1 | Status update: Unable to connect. Reason: Registration Missing
warp-tproxy-1 | [+] New registration generated ... Success
warp-tproxy-1 | [+] Set warp mode to warp ... Success
warp-tproxy-1 | [+] Turn ON warp ... Success
warp-tproxy-1 | [+] Waiting for warp to connect...
[+] warp connected!
warp-tproxy-1 | [+] All services started!
warp-tproxy-1 | ---
warp-tproxy-1 | warp-svc config: /var/lib/cloudflare-warp/conf.json
warp-tproxy-1 | ---
warp-tproxy-1 | [+] warp status: Status update: Connected
warp-tproxy-1 |
warp-tproxy-1 | [+] You can check it with warp local tproxy in container:
warp-tproxy-1 | E.g.:
warp-tproxy-1 | curl https://cloudflare.com/cdn-cgi/trace (inside container)```
### Free 模式
在大陆地区极低概率连接成功,不建议使用。
## tun2proxy实现模式
#### tun2proxy的局限性
仅支持socks或者http代理
[tun2proxy/tun2proxy](https://github.com/tun2proxy/tun2proxy)
### tun2proxy使用方法
#### compose方式
```bash
cd tproxy-tun2proxy
# edit compose file filled proxy protocol
docker compose up -d
```#### 命令行方式
```bash
docker run -d \
-v /dev/net/tun:/dev/net/tun \
--sysctl net.ipv6.conf.default.disable_ipv6=0 \
--cap-add NET_ADMIN \
--name tun2proxy \
ghcr.io/tun2proxy/tun2proxy:latest --dns virtual --proxy proto://[username[:password]@]host:port
# proto is one of socks4, socks5, http. For example: socks5://myname:[email protected]:1080```
通过共享网络命名空间将正在运行的容器的网络提供给另一个工作容器(类似于 Kubernetes sidecar):
```bash
docker run -it \
--network "container:tun2proxy" \
ubuntu:latest
```这样,工作容器就可以访问 tun2proxy 容器的网络了。
## 声明
本项目仅供学习,非法使用必追究法律责任,下载后请于24小时内删除。
自行下载所造成任何后果与作者无关!!
## 致谢
- [Warp Tproxy For Docker](https://github.com/Paper-Dragon/warp-tproxy-for-docker/blob/container-tproxy/README.zh_CN.md)
- [Cloudflare](cloudflare.com)
- [MetaCubeX](https://wiki.metacubex.one/config/)
- [Docker](https://hub.docker.com)
- Github
- GFW 🤣
- [防火长城GFW](https://wikipredia.net/zh/Great_Firewall_of_China#Campaigns_and_crackdowns)
- [金盾工程](https://wikipredia.net/zh/Golden_Shield_Project)## 协议
MIT