Compare commits
582 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
68ad904772 | ||
|
|
af19e5d25b | ||
|
|
62907efe0c | ||
|
|
29e4cdf4e2 | ||
|
|
3a4a9a3a27 | ||
|
|
04ef338807 | ||
|
|
3c070a7da3 | ||
|
|
c34f7db239 | ||
|
|
1f655808c6 | ||
|
|
0226d2cde3 | ||
|
|
61bb2d8ca0 | ||
|
|
f5d09b878b | ||
|
|
6b4ee97f05 | ||
|
|
12dd591c58 | ||
|
|
3b49f17e01 | ||
|
|
cb8d0c0b42 | ||
|
|
e92375f6a9 | ||
|
|
c20e19d74f | ||
|
|
50886bd69a | ||
|
|
eaf836eff3 | ||
|
|
bf72325fc0 | ||
|
|
846956a9fe | ||
|
|
20c31b0c68 | ||
|
|
d84a4bec86 | ||
|
|
05d2f16777 | ||
|
|
9fa1c4932b | ||
|
|
0932aecff3 | ||
|
|
a9f8acd98d | ||
|
|
2336e77ac4 | ||
|
|
1ef8d7c82a | ||
|
|
24d54725df | ||
|
|
9b430b5ba4 | ||
|
|
0ee7abbd6a | ||
|
|
361215fb6f | ||
|
|
7c0daad40a | ||
|
|
726240e669 | ||
|
|
1449b94dd4 | ||
|
|
ee9cd7b181 | ||
|
|
ec0492b4b6 | ||
|
|
7b4cb4df04 | ||
|
|
7a31291c4c | ||
|
|
16f1d80588 | ||
|
|
7101530b22 | ||
|
|
7f0bea952d | ||
|
|
380c203222 | ||
|
|
c4ac760603 | ||
|
|
09158ebaa2 | ||
|
|
4709ccfca4 | ||
|
|
bea9ca25cf | ||
|
|
8ca1bfe09c | ||
|
|
878b5e8c8a | ||
|
|
1e9cfccd5a | ||
|
|
995aa73bf2 | ||
|
|
97012a0a19 | ||
|
|
006f2f9510 | ||
|
|
e849cbfcd8 | ||
|
|
dff1a6daaf | ||
|
|
250dc26514 | ||
|
|
1b327d6abf | ||
|
|
fa11146246 | ||
|
|
da7bfcf3be | ||
|
|
4214ec4239 | ||
|
|
504de47999 | ||
|
|
e185d734d0 | ||
|
|
9b1ef52649 | ||
|
|
5c9fc850d8 | ||
|
|
ff96e52a33 | ||
|
|
78004bcd39 | ||
|
|
b16decf976 | ||
|
|
828636553d | ||
|
|
bfcc27e70f | ||
|
|
7cb7d34d42 | ||
|
|
5276154401 | ||
|
|
dad091441e | ||
|
|
81ff3dadd5 | ||
|
|
f559fb1cae | ||
|
|
8649bbc191 | ||
|
|
d775339948 | ||
|
|
69a5b906e0 | ||
|
|
2d66cc6215 | ||
|
|
8d74baf48c | ||
|
|
d7641c4483 | ||
|
|
ffe54c3af7 | ||
|
|
53df3b5578 | ||
|
|
54c22f1410 | ||
|
|
366b7e04f3 | ||
|
|
a33a4d2bd3 | ||
|
|
eb00d570a8 | ||
|
|
500142f4c8 | ||
|
|
bffd5891cc | ||
|
|
cf2e6f9ff0 | ||
|
|
ed4b8d11e3 | ||
|
|
905c1eac63 | ||
|
|
61872133b1 | ||
|
|
e18f53a5bb | ||
|
|
947fb51963 | ||
|
|
7aeef3f8ba | ||
|
|
b42f6a6364 | ||
|
|
92f4d31dfc | ||
|
|
4f11593f26 | ||
|
|
795d63879f | ||
|
|
1c46eeaf43 | ||
|
|
6f47d12498 | ||
|
|
e6c56675ca | ||
|
|
ff92c96d8d | ||
|
|
fed2afb964 | ||
|
|
b3feff7843 | ||
|
|
edb2fb3458 | ||
|
|
dc51a0bd9d | ||
|
|
34b30ac8c9 | ||
|
|
8122af9096 | ||
|
|
2b267fe4bb | ||
|
|
90bf483976 | ||
|
|
b109f273a5 | ||
|
|
482977a4ac | ||
|
|
515dcdbf1f | ||
|
|
0e033c1d85 | ||
|
|
ad2441de3b | ||
|
|
7a881b3625 | ||
|
|
faf61fdd60 | ||
|
|
2b3d23f77c | ||
|
|
06e1247706 | ||
|
|
6b5fdef8c7 | ||
|
|
48b1621ee4 | ||
|
|
c2ce973f61 | ||
|
|
cac648cc32 | ||
|
|
b9bffcdf4b | ||
|
|
7a1e5c5de7 | ||
|
|
e24dfc856a | ||
|
|
66a115c764 | ||
|
|
a6e80a30dc | ||
|
|
52a2771382 | ||
|
|
6b2b75bc50 | ||
|
|
893baff6c6 | ||
|
|
de62d956dd | ||
|
|
b59cf1f144 | ||
|
|
8b5cc3fb89 | ||
|
|
fbd8c67649 | ||
|
|
c6f6266592 | ||
|
|
ab72640ffd | ||
|
|
905bfff92b | ||
|
|
4ef33d0ffd | ||
|
|
1597363dd1 | ||
|
|
27896a0563 | ||
|
|
bef385cfd1 | ||
|
|
98e0154baa | ||
|
|
01961a798a | ||
|
|
d5a460bd09 | ||
|
|
e94605644f | ||
|
|
8dc206e2d6 | ||
|
|
e8acbbfabf | ||
|
|
17335eb92b | ||
|
|
d2051e6e37 | ||
|
|
0aa0e7c550 | ||
|
|
57935c2296 | ||
|
|
9d4930b29d | ||
|
|
66206e63b3 | ||
|
|
19baccb91a | ||
|
|
98bbd68448 | ||
|
|
45dee58203 | ||
|
|
e2557c44c4 | ||
|
|
f0ed6d73e4 | ||
|
|
47790d1d58 | ||
|
|
9aff5eda38 | ||
|
|
eb2f055e07 | ||
|
|
0998c06195 | ||
|
|
cf22866b2a | ||
|
|
16bb452640 | ||
|
|
6f1d826ef5 | ||
|
|
5a68fb3c3d | ||
|
|
350eb5b6ed | ||
|
|
d48f3b3323 | ||
|
|
7a1491c7b3 | ||
|
|
68deae6bf8 | ||
|
|
2086966a89 | ||
|
|
3aba428b76 | ||
|
|
a11ce38747 | ||
|
|
f7b363ec73 | ||
|
|
4c33a1e9b2 | ||
|
|
c4d9382ac7 | ||
|
|
7df2d990e7 | ||
|
|
900b75ddcd | ||
|
|
a5d199fb1c | ||
|
|
2d8190873f | ||
|
|
3eff793ac2 | ||
|
|
27ce6e1bd2 | ||
|
|
b11c7e632b | ||
|
|
d911be7d80 | ||
|
|
bd056d74cc | ||
|
|
69b65a37ca | ||
|
|
dd52ad8a8a | ||
|
|
59b5ef2df4 | ||
|
|
4a34566f08 | ||
|
|
d81d5ffe06 | ||
|
|
59c9148875 | ||
|
|
40bce3e736 | ||
|
|
d4c0775b4a | ||
|
|
7f983152b7 | ||
|
|
bab4325414 | ||
|
|
0d85c7dd7d | ||
|
|
f756d62b19 | ||
|
|
2d1c1449aa | ||
|
|
f348298acd | ||
|
|
ad47104fc7 | ||
|
|
4d4fb64b59 | ||
|
|
9ce3a6e468 | ||
|
|
34e9e362b9 | ||
|
|
f87cbf73e8 | ||
|
|
362ada2ebb | ||
|
|
b4b7221dab | ||
|
|
2d8dc56f4e | ||
|
|
1cf4313d12 | ||
|
|
7bb8f19b90 | ||
|
|
1263a4e751 | ||
|
|
1a432a9b79 | ||
|
|
8951fdbd59 | ||
|
|
77129367fe | ||
|
|
ae2e1e0933 | ||
|
|
4143f14fbd | ||
|
|
8e3e262c2f | ||
|
|
6f11deab96 | ||
|
|
a17acd7351 | ||
|
|
1cbb4195e4 | ||
|
|
c471dd8297 | ||
|
|
25deffb7d6 | ||
|
|
7eb0e0040e | ||
|
|
15994988be | ||
|
|
ae293a6102 | ||
|
|
5ed4702b62 | ||
|
|
287ddc3424 | ||
|
|
57a4227007 | ||
|
|
c9eacd1bf2 | ||
|
|
5f38162fbb | ||
|
|
c755f75a11 | ||
|
|
ac9eb64501 | ||
|
|
3dd013c13c | ||
|
|
ab0205587a | ||
|
|
70955878c9 | ||
|
|
86f017d92f | ||
|
|
446cc3f9a7 | ||
|
|
6529921d71 | ||
|
|
52e441c111 | ||
|
|
a6b169d336 | ||
|
|
5514cfee6c | ||
|
|
b1de184bda | ||
|
|
af2405ba48 | ||
|
|
bee80330b0 | ||
|
|
f1de8659b7 | ||
|
|
bfc5835d82 | ||
|
|
82bc3e27d6 | ||
|
|
5436a95430 | ||
|
|
2c675f2cbe | ||
|
|
8e9427b0c0 | ||
|
|
edcf78f77c | ||
|
|
8f88d14c07 | ||
|
|
1372801b6f | ||
|
|
2af904f442 | ||
|
|
885b27e0d1 | ||
|
|
0207e4731f | ||
|
|
038b6749a3 | ||
|
|
ead577cbfb | ||
|
|
26e9231e48 | ||
|
|
938ddd1141 | ||
|
|
68080539f7 | ||
|
|
5583b303be | ||
|
|
9301c9b49b | ||
|
|
8d2e210522 | ||
|
|
32661552ff | ||
|
|
9a111a59bf | ||
|
|
f5e472ea9f | ||
|
|
7599e2c793 | ||
|
|
3726f5b9c3 | ||
|
|
dee517217e | ||
|
|
983912e44e | ||
|
|
982390f4b2 | ||
|
|
5e3f51a8b0 | ||
|
|
675ae276f9 | ||
|
|
7899c45176 | ||
|
|
1dbb6feb57 | ||
|
|
661685d136 | ||
|
|
28947a0352 | ||
|
|
bd594684ce | ||
|
|
fda3609873 | ||
|
|
d20db0c546 | ||
|
|
07fb22ae70 | ||
|
|
8d5c3944ad | ||
|
|
7cf28aa9f4 | ||
|
|
731867b73c | ||
|
|
1c6df2d9a2 | ||
|
|
ee5a248a39 | ||
|
|
c174f85656 | ||
|
|
2669aac7c9 | ||
|
|
f1aec74b11 | ||
|
|
1d382b2bf6 | ||
|
|
55cac537b1 | ||
|
|
75258fa195 | ||
|
|
cef2ca6d8e | ||
|
|
4b1651bb3e | ||
|
|
78c116bca9 | ||
|
|
a7c46f5582 | ||
|
|
f947d35bc3 | ||
|
|
a49e0166d4 | ||
|
|
7272b592d5 | ||
|
|
cced739d0e | ||
|
|
54ac46b3e4 | ||
|
|
8f9aa2fd64 | ||
|
|
c7b9cd5853 | ||
|
|
f9dfac55b0 | ||
|
|
b4ad1b5465 | ||
|
|
e2b2b7e255 | ||
|
|
80b691564c | ||
|
|
dfc326b771 | ||
|
|
7cfde70a9f | ||
|
|
20837ba983 | ||
|
|
8dda32a599 | ||
|
|
42ce2a4351 | ||
|
|
6574d5cd29 | ||
|
|
4e9ae9a8f5 | ||
|
|
a9ce3cf733 | ||
|
|
65708a0f12 | ||
|
|
e2a3b5f9ee | ||
|
|
7a752537c5 | ||
|
|
abd0b63fe9 | ||
|
|
7ac7cd452b | ||
|
|
94cecdb8c0 | ||
|
|
a8b35ba971 | ||
|
|
bc1ab84b75 | ||
|
|
acc895d2df | ||
|
|
23dbd0a92f | ||
|
|
c069b5cd97 | ||
|
|
f1dfe50d8b | ||
|
|
7d3820175f | ||
|
|
75032fdbb7 | ||
|
|
23b3ad63cf | ||
|
|
7afd0c86cd | ||
|
|
5f0a341d22 | ||
|
|
2a117376b7 | ||
|
|
2fc750532d | ||
|
|
477be63cff | ||
|
|
39b90357db | ||
|
|
2bd916eb73 | ||
|
|
4d1b450b33 | ||
|
|
cb70812cb7 | ||
|
|
42e030e368 | ||
|
|
f84cdc921d | ||
|
|
02c07e7f4f | ||
|
|
d6ea190688 | ||
|
|
b20487b928 | ||
|
|
004cf5693f | ||
|
|
ef8de6feb0 | ||
|
|
d791ebe634 | ||
|
|
5af4a1817e | ||
|
|
e97b8c55f3 | ||
|
|
99fcb76210 | ||
|
|
d4fd34165e | ||
|
|
bd4741a0a0 | ||
|
|
5945c32646 | ||
|
|
9a9dc2594d | ||
|
|
02547e9475 | ||
|
|
d81a823da1 | ||
|
|
df74bcc885 | ||
|
|
094bcebfa3 | ||
|
|
bb2a16720b | ||
|
|
86d9a0c0f3 | ||
|
|
5cf9d72ed3 | ||
|
|
801605676c | ||
|
|
a9dec75e59 | ||
|
|
08d9d90fe1 | ||
|
|
9749db9235 | ||
|
|
11073aaaa5 | ||
|
|
e35ddc4d53 | ||
|
|
99b06e813e | ||
|
|
7164349944 | ||
|
|
bf43b3adee | ||
|
|
6aa4b3c8a9 | ||
|
|
7a9f7ef95e | ||
|
|
ee1a9d3ec7 | ||
|
|
6a69e58be5 | ||
|
|
6e1d788677 | ||
|
|
24f8f789c5 | ||
|
|
2fb779f990 | ||
|
|
0a9d3cd309 | ||
|
|
977b1aba1c | ||
|
|
a02aeeb906 | ||
|
|
7e2e63137e | ||
|
|
4b35219c27 | ||
|
|
0247c4701d | ||
|
|
e2cd0b8e4f | ||
|
|
ee93171c63 | ||
|
|
ddd2302cb2 | ||
|
|
c96d2288b3 | ||
|
|
6f5a088091 | ||
|
|
9a07797e29 | ||
|
|
055a020d33 | ||
|
|
4681ff3827 | ||
|
|
cff92faf06 | ||
|
|
890daf5489 | ||
|
|
182bdeb766 | ||
|
|
a4a953b167 | ||
|
|
ff37b7e18c | ||
|
|
7aa0e78c15 | ||
|
|
d798807693 | ||
|
|
35b78c2da6 | ||
|
|
66a4291c97 | ||
|
|
e89a965aff | ||
|
|
85a9f10be4 | ||
|
|
8bc6e0ffec | ||
|
|
98fc0ade4a | ||
|
|
f5626c21f7 | ||
|
|
b5a76c7ff2 | ||
|
|
612bae4c93 | ||
|
|
e45bf338cb | ||
|
|
577261806c | ||
|
|
8842097bd4 | ||
|
|
a4b14dd0bd | ||
|
|
94f0142c7d | ||
|
|
319affa43f | ||
|
|
14f43a5976 | ||
|
|
9e9a9ac6de | ||
|
|
cc24cfc26f | ||
|
|
712f7dae4a | ||
|
|
6d20908465 | ||
|
|
e2f0fe71f4 | ||
|
|
1241b74562 | ||
|
|
2d610003d5 | ||
|
|
7b2952f4d6 | ||
|
|
b18c5e08bb | ||
|
|
63cb67f009 | ||
|
|
cd212cb978 | ||
|
|
d934c1fb4a | ||
|
|
c8327b4075 | ||
|
|
8410930d2d | ||
|
|
f5218a93f6 | ||
|
|
ca2f367950 | ||
|
|
c8559b757f | ||
|
|
db620ebe83 | ||
|
|
abc7a4fa42 | ||
|
|
b02d75eb3a | ||
|
|
2d225a6cdb | ||
|
|
ccca75ecbd | ||
|
|
2360808604 | ||
|
|
b7c2b0e8fa | ||
|
|
581ff2b840 | ||
|
|
8a75e202d6 | ||
|
|
c23d733cfd | ||
|
|
aab8b41da9 | ||
|
|
e9139ee56f | ||
|
|
24d3d88980 | ||
|
|
078acaa0e8 | ||
|
|
96cd7a2b63 | ||
|
|
bf095b2c76 | ||
|
|
a80e4df6f0 | ||
|
|
3cd0d91c22 | ||
|
|
716aaa272d | ||
|
|
87c13e4aec | ||
|
|
7005d66ed6 | ||
|
|
ba62ce24b8 | ||
|
|
2ec7131659 | ||
|
|
65f441f5b5 | ||
|
|
ee0e85a30f | ||
|
|
8cdb5d1857 | ||
|
|
5cb8620e82 | ||
|
|
f0733655f8 | ||
|
|
59a5a4a68a | ||
|
|
b9cd57d873 | ||
|
|
9504061e4e | ||
|
|
f41f3a3b63 | ||
|
|
8f0c80980c | ||
|
|
e9b46d38e3 | ||
|
|
3440af51b0 | ||
|
|
95db78bc0b | ||
|
|
bde10ad8ef | ||
|
|
b8c2766639 | ||
|
|
5bb8bf20fe | ||
|
|
db71b77da4 | ||
|
|
af19092a7d | ||
|
|
3020dc5c94 | ||
|
|
e28d5449b5 | ||
|
|
efb075c7ba | ||
|
|
31073d398e | ||
|
|
8bafb88bc4 | ||
|
|
dc82b94c6b | ||
|
|
cf6043b0de | ||
|
|
ce1095d6de | ||
|
|
9f08170cd3 | ||
|
|
5c66f5f5d2 | ||
|
|
1a9c3244a3 | ||
|
|
00688bbf33 | ||
|
|
787cc56ed4 | ||
|
|
3984083e23 | ||
|
|
a91790b16d | ||
|
|
b2549e8d48 | ||
|
|
768e5dd6c0 | ||
|
|
7899f1ec00 | ||
|
|
ef93946fb1 | ||
|
|
675061fd63 | ||
|
|
4b212eee0d | ||
|
|
0f81d5e503 | ||
|
|
6616f4f860 | ||
|
|
357a8745de | ||
|
|
cde72c04df | ||
|
|
a8767b0e15 | ||
|
|
785762ceb9 | ||
|
|
7383aa0973 | ||
|
|
7d992082fa | ||
|
|
1d41eadd0b | ||
|
|
7b247384ec | ||
|
|
f270885a4d | ||
|
|
5fa000f7e6 | ||
|
|
ae56bb1edd | ||
|
|
644ec6891d | ||
|
|
db729915ad | ||
|
|
69fcc7d12e | ||
|
|
e90852a401 | ||
|
|
71b9940916 | ||
|
|
175272744d | ||
|
|
635e107d66 | ||
|
|
44dff9a3a9 | ||
|
|
22298fbb97 | ||
|
|
7221bb36b3 | ||
|
|
5b3a5908a3 | ||
|
|
9bbb930323 | ||
|
|
54ce7dbde8 | ||
|
|
92fb704ad1 | ||
|
|
b9b79c2a65 | ||
|
|
b4178a0f78 | ||
|
|
92b2986889 | ||
|
|
2d1a7faafb | ||
|
|
a9ad777757 | ||
|
|
60cb8815a0 | ||
|
|
b7d1085500 | ||
|
|
0449464b3f | ||
|
|
7b00570f55 | ||
|
|
919a5f9c60 | ||
|
|
c957e14733 | ||
|
|
c68e15ca3d | ||
|
|
4578148ab9 | ||
|
|
0503ee9a96 | ||
|
|
1baafc08cc | ||
|
|
39daac6de4 | ||
|
|
03d2b1777b | ||
|
|
22aeb7aaf3 | ||
|
|
f985e24109 | ||
|
|
a99898729f | ||
|
|
3f7b57740d | ||
|
|
b17c09aa1e | ||
|
|
9e2849f967 | ||
|
|
e665ef0d4b | ||
|
|
f514e54d65 | ||
|
|
30b088a13f | ||
|
|
4ce5a461f4 | ||
|
|
aff38118e5 | ||
|
|
31d096e808 | ||
|
|
62d9c10baf | ||
|
|
09242575d8 | ||
|
|
763652cb01 | ||
|
|
4a2f606f3a | ||
|
|
9ce4ce77d0 | ||
|
|
b1d88ac2d4 | ||
|
|
3345b3a570 | ||
|
|
a48a87f17b | ||
|
|
a702691460 | ||
|
|
d5491cb7ef | ||
|
|
67e48b4003 | ||
|
|
cc3bafa07c | ||
|
|
ce67266f5f | ||
|
|
a9b51bb6c3 | ||
|
|
cb48a912e9 | ||
|
|
01d4afe9ef | ||
|
|
3a49ba7e0e | ||
|
|
b04675d62f | ||
|
|
6bd396a70b | ||
|
|
455d0006d7 | ||
|
|
ebb5f5d229 | ||
|
|
73ad912cd1 | ||
|
|
b559cf0500 | ||
|
|
ae3f69a5be | ||
|
|
8a2e470f0a | ||
|
|
6d9134aa25 | ||
|
|
ec7adea194 | ||
|
|
a77b7fda7b | ||
|
|
55d78f678d |
10
.gitignore
vendored
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
/proxy
|
||||||
|
/goproxy
|
||||||
|
*.exe
|
||||||
|
*.exe~
|
||||||
|
.*
|
||||||
|
*.prof
|
||||||
|
!.gitignore
|
||||||
|
release-*
|
||||||
|
/proxy.crt
|
||||||
|
/proxy.key
|
||||||
193
CHANGELOG
Normal file
@ -0,0 +1,193 @@
|
|||||||
|
proxy更新日志
|
||||||
|
v5.2
|
||||||
|
1.修复了HTTP(S)\SPS反向代理无法正常工作的问题.
|
||||||
|
2.优化了智能判断,减少不必要的DNS解析.
|
||||||
|
3.重构了SOCKS和SPS的UDP功能,基于UDP的游戏加速嗖嗖的.
|
||||||
|
|
||||||
|
v5.1
|
||||||
|
1.优化了kcp默认mtu配置,调整为450.
|
||||||
|
2.优化了HTTP(S)\SOCKS5代理智能判断,更加精确。
|
||||||
|
3.fix #97 , 修复了RemoveProxyHeaders方法忽略了第一行的bug。
|
||||||
|
4.修复了-g参数长格式没有连接符号的bug.
|
||||||
|
5.重构了证书生成功能,不再有任何外部依赖,任何平台都可以独立生成证书.
|
||||||
|
|
||||||
|
v5.0
|
||||||
|
1.修复了SPS多端口无效的bug.
|
||||||
|
2.增加了DNS代理功能,提供安全无污染的DNS解析.
|
||||||
|
|
||||||
|
v4.9
|
||||||
|
1.修复了HTTP Basic代理返回不合适的头部,导致浏览器不会弹框,个别代理插件无法认证的问题.
|
||||||
|
2.内网穿透切换smux到yamux.
|
||||||
|
3.优化了HTTP(S)\SOCKS5代理--always的处理逻辑.
|
||||||
|
|
||||||
|
v4.8
|
||||||
|
1.优化了SPS连接HTTP上级的指令,避免了某些代理不响应的问题.
|
||||||
|
2.SPS功能增加了参数:
|
||||||
|
--disable-http:禁用http(s)代理
|
||||||
|
--disable-socks:禁用socks代理
|
||||||
|
默认都是false(开启).
|
||||||
|
3.重构了部分代码的日志部分,保证了日志按着预期输出.
|
||||||
|
4.修复了sps\http代理初始化服务的时机不正确,导致nil异常的bug.
|
||||||
|
5.优化了sps日志输出.
|
||||||
|
6.--debug参数增加了Profiling功能,可以保存cpu,内存等多种调试数据到文件.
|
||||||
|
7.优化了服务注册,避免了不必要的内存开销.
|
||||||
|
8.增加了Dockerfile和docker安装手册.
|
||||||
|
9.优化了ioCopy避免了内存泄漏,大大提升了内存占用的稳定性.
|
||||||
|
|
||||||
|
|
||||||
|
v4.7
|
||||||
|
1.增加了基于gomobile的sdk,对android/ios/windows/linux/mac提供SDK支持.
|
||||||
|
2.优化了bridge的日志,增加了client和server的掉线日志.
|
||||||
|
3.优化了sps读取http(s)代理响应的缓冲大小,同时优化了CONNECT请求,
|
||||||
|
避免了某些代理服务器返回过多数据导致不能正常通讯的问题.
|
||||||
|
4.去除了鸡肋连接池功能.
|
||||||
|
5.优化了所有服务代码,方便对sdk提供支持.
|
||||||
|
6.增加了SDK手册.
|
||||||
|
7.增加了GUI客户端(windows/web/android/ios)介绍主页.
|
||||||
|
8.SPS\HTTP(s)\Socks代理增加了自定义加密传输,只需要通过参数-z和-Z设置一个密码即可.
|
||||||
|
9.SPS\HTTP(s)\Socks代理增加了压缩传输,只需要通过参数-m和-M设置即可.
|
||||||
|
10.手册增加了SPS\HTTP(s)\Socks自定义加密的使用示例.
|
||||||
|
11.手册增加了SPS\HTTP(s)\Socks压缩传输的使用示例.
|
||||||
|
12.优化了多链接版本的内网穿透,融合了多链接和smux的优点,即能够拥有大的吞吐量,
|
||||||
|
同时又具备mux的心跳机制保证了链接的稳定性.
|
||||||
|
13.手册增加了大量配图.
|
||||||
|
14.优化了socks代理udp上级的设置逻辑,智能判断parent上级填充udp parent.
|
||||||
|
15.优化了项目文件夹结构,使用源码可以直接go get.
|
||||||
|
|
||||||
|
v4.6
|
||||||
|
1.sps,http(s),socks5,内网穿透都做了大量的超时优化处理,更加稳定.
|
||||||
|
2.sps增加了强大的树形级联认证支持,可以轻松构建你的认证代理网络.
|
||||||
|
3.手册增加了6.6对sps认证功能的介绍.
|
||||||
|
|
||||||
|
|
||||||
|
v4.5
|
||||||
|
1.优化了mux内网穿透连接管理逻辑,增强了稳定性.
|
||||||
|
2.mux内网穿透增加了tcp和kcp协议支持,之前是tls,现在支持三种协议tcp,tls,kcp.
|
||||||
|
3.keygen参数增加了用法: proxy keygen usage.
|
||||||
|
4.http(s)/socks5代理,tls增加了自签名证书支持.
|
||||||
|
5.建议升级.
|
||||||
|
v4.4
|
||||||
|
1.增加了协议转换sps功能,代理协议转换使用的是sps子命令(socks+https的缩写),
|
||||||
|
sps本身不提供代理功能,只是接受代理请求"转换并转发"给已经存在的http(s)代理
|
||||||
|
或者socks5代理;sps可以把已经存在的http(s)代理或者socks5代理转换为一个端口
|
||||||
|
同时支持http(s)和socks5代理,而且http(s)代理支持正向代理和反向代理(SNI),转
|
||||||
|
换后的SOCKS5代理不支持UDP功能;另外对于已经存在的http(s)代理或者socks5代理,
|
||||||
|
支持tls、tcp、kcp三种模式,支持链式连接,也就是可以多个sps结点层级连接构建
|
||||||
|
加密通道。
|
||||||
|
2.增加了对KCP传输参数的配置,多达17个参数可以自由的配置对kcp传输效率调优。
|
||||||
|
3.内网穿透功能,server和client增加了--session-count参数,可以设置server每个
|
||||||
|
监听端口到bridge打开的session数量,可以设置client到bridge打开的session数量,
|
||||||
|
之前都是1个,现在性能提升N倍,N就是你自己设置的--session-count,这个参数很大
|
||||||
|
程度上解决了多路复用的拥塞问题,v4.4开始默认10个。
|
||||||
|
|
||||||
|
v4.3
|
||||||
|
1.优化了参数keygen生成证书逻辑,避免证书出现特征。
|
||||||
|
2.http(s)和socks代理增加了--dns-address和--dns-ttl参数。
|
||||||
|
用于自己指定proxy访问域名的时候使用的dns(--dns-address)以及解析结果缓存时间(--dns-ttl)秒数,
|
||||||
|
避免系统dns对proxy的干扰,另外缓存功能还能减少dns解析时间提高访问速度。
|
||||||
|
3.优化了http代理的basic认证逻辑。
|
||||||
|
提示:
|
||||||
|
v4.3生成的证书不适用于v4.2及以下版本。
|
||||||
|
|
||||||
|
v4.2
|
||||||
|
1.优化了内网穿透,避免了client意外下线,导致链接信息残留的问题.
|
||||||
|
2.http代理增加了SNI支持,现在http(s)代理模式支持反向代理,支持http(s)透明代理.
|
||||||
|
3.增加了英文手册.
|
||||||
|
|
||||||
|
v4.1
|
||||||
|
1.优化了http(s),socks5代理中的域名智能判断,如果是内网IP,直接走本地网络,提升浏览体验,
|
||||||
|
同时优化了检查机制,判断更快.
|
||||||
|
2.http代理basic认证增加了对https协议的支持,现在basic认证可以控制所有http(s)流量了.
|
||||||
|
3.项目代码增加了依赖类库vendor目录,clone下来就能go build,再也不用担心go get依赖类库
|
||||||
|
失败导致不能编译了.
|
||||||
|
|
||||||
|
v4.0
|
||||||
|
1.内网穿透三端重构了一个multiplexing版本,使用github.com/xtaci/smux实现了tcp链接的多路复用,
|
||||||
|
鼎鼎大名的kcp-go底层就是使用的这个库,基于kcp-go的双边加速工具kcptun的广泛使用已经很好
|
||||||
|
的验证来该库的强大与稳定。multiplexing版的内网穿透对应的子命令分别是server,client,bridge
|
||||||
|
使用方式和参数与之前的子命令tserver,tclient,tserver完全一样,另外server,client增加了
|
||||||
|
压缩传输参数--c,使用压缩传输速度更快。
|
||||||
|
|
||||||
|
v3.9
|
||||||
|
1.增加了守护运行参数--forever,比如: proxy http --forever ,
|
||||||
|
proxy会fork子进程,然后监控子进程,如果子进程异常退出,5秒后重启子进程.
|
||||||
|
该参数配合后台运行参数--daemon和日志参数--log,可以保障proxy一直在后台执行不会因为意外退出,
|
||||||
|
而且可以通过日志文件看到proxy的输出日志内容.
|
||||||
|
比如: proxy http -p ":9090" --forever --log proxy.log --daemon
|
||||||
|
|
||||||
|
v3.8
|
||||||
|
1.增加了日志输出到文件--log参数,比如: --log proxy.log,日志就会输出到proxy.log方便排除问题.
|
||||||
|
|
||||||
|
v3.7
|
||||||
|
1.修复了socks代理不能正常和上级代理通讯的问题.
|
||||||
|
|
||||||
|
|
||||||
|
v3.6
|
||||||
|
1.http(s),socks代理,集成了外部HTTP API认证,可以通过外部API对用户名和密码进行认证.
|
||||||
|
2.手册http(s),socks代理认证部分增加了集成外部HTTP API认证的使用说明.
|
||||||
|
|
||||||
|
v3.5
|
||||||
|
1.优化了kcp参数,速度有所提升.
|
||||||
|
2.修复了socks无法正常工作的问题.
|
||||||
|
3.修正了文档中的一些描述.
|
||||||
|
4.tcp代理增加了kcp协议传输数据.
|
||||||
|
5.优化了死循环检查,增加了添加本地IP参数,当VPS在nat设备后面,
|
||||||
|
vps上网卡IP都是内网IP,这个时候可以通过-g参数添加vps的外网ip防止死循环.
|
||||||
|
6.增加了--daemon参数,可以后台运行程序哟.
|
||||||
|
|
||||||
|
v3.4
|
||||||
|
1.socks5代理新增了用户名密码验证支持.
|
||||||
|
2.socks5,http(s)代理增加了kcp传输协议支持.
|
||||||
|
3.优化了内网穿透的心跳机制.
|
||||||
|
|
||||||
|
v3.3
|
||||||
|
1.修复了socks代理模式对证书文件的判断逻辑.
|
||||||
|
2.增强了http代理,socks代理的ssh中转模式的稳定性.
|
||||||
|
3.socks代理tls,tcp模式新增了CMD_ASSOCIATE(udp)支持.socks代理ssh模式不支持udp.
|
||||||
|
4.修复了http代理某些情况下会崩溃的bug.
|
||||||
|
|
||||||
|
v3.2
|
||||||
|
1.内网穿透功能server端-r参数增加了协议和key设置.
|
||||||
|
2.手册增加了对-r参数的详细说明.
|
||||||
|
3.修复了普通模式也检查证书文件的bug.
|
||||||
|
4.增加了Socks5支持,目前只支持TCP协议,不支持UDP协议.
|
||||||
|
5.Socks5上级代理支持ssh中转,linux服务器不需要任何服务端,本地一个proxy即可开心上网.
|
||||||
|
6.http(s)代理增加了ssh中转支持,linux服务器不需要任何服务端,本地一个proxy即可开心上网.
|
||||||
|
|
||||||
|
v3.1
|
||||||
|
1.优化了内网穿透功能,bridge,client和server只需要启动一个即可。
|
||||||
|
server端启动的时候可以指定client端要暴露的一个或者多个端口。
|
||||||
|
2.修复了重复解析命令行参数的问题。
|
||||||
|
3.手册增加了微信接口本地开发的示例。
|
||||||
|
4.增加了配置文件使用说明.
|
||||||
|
|
||||||
|
v3.0
|
||||||
|
1.此次更新不兼容2.x版本,重构了全部代码,架构更合理,利于功能模块的增加与维护。
|
||||||
|
2.增加了代理死循环检查,增强了安全性。
|
||||||
|
3.增加了反向代理模式(即:内网穿透),支持TCP和UDP两种协议,可以把任何局域网的机器A所在网络的任何端。
|
||||||
|
暴露到任何局域网的机器B的本地端口或暴露到任何公网VPS上。
|
||||||
|
4.正向代理增加了UDP模式支持。
|
||||||
|
|
||||||
|
|
||||||
|
v2.2
|
||||||
|
1.增加了强制使用上级代理参数always.可以使所有流量都走上级代理。
|
||||||
|
2.增加了定时检查网络是否正常,可以在本地网络不稳定的时候修复连接池状态,提升代理访问体验。
|
||||||
|
3.http代理增加了对ipv6地址的支持。
|
||||||
|
|
||||||
|
v2.1
|
||||||
|
1.增加了http basic验证功能,可以对http代理协议设置basic验证,用户名和密码支持来自文件或者命令行。
|
||||||
|
2.优化了域名检查方法,避免空连接的出现。
|
||||||
|
3.修复了连接上级代理超时参数传递错误导致超时过大的问题。
|
||||||
|
4.增加了连接池状态监测,如果上级代理或者网络出现问题,会及时重新初始化连接池,防止大量无效连接,降低浏览体验。
|
||||||
|
5.增加了对系统kill信号的捕获,可以在收到系统kill信号之后执行清理释放连接的操作.避免出现大量CLOSE_WAIT。
|
||||||
|
|
||||||
|
v2.0
|
||||||
|
1.增加了连接池功能,大幅提高了通过上级代理访问的速度。
|
||||||
|
2.HTTP代理模式,优化了请求URL的获取逻辑,可以支持:http,https,websocke。
|
||||||
|
3.增加了TCP代理模式,支持是否加密通讯。
|
||||||
|
4.优化了链接关闭逻辑,避免出现大量CLOSE_WAIT。
|
||||||
|
5.增加了黑白名单机制,更自由快速的访问。
|
||||||
|
6.优化了网站Block机制检测,判断更准确。
|
||||||
|
|
||||||
|
v1.0
|
||||||
|
1.始发版本,可以代理http,https。
|
||||||
9
Dockerfile
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
FROM golang:1.10.3-alpine as builder
|
||||||
|
ARG GOPROXY_VERSION=master
|
||||||
|
RUN apk update && apk upgrade && \
|
||||||
|
apk add --no-cache git && cd /go/src/ && git clone https://github.com/snail007/goproxy && \
|
||||||
|
cd goproxy && git checkout ${GOPROXY_VERSION} && \
|
||||||
|
go get && CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -o proxy
|
||||||
|
FROM alpine:3.7
|
||||||
|
COPY --from=builder /go/src/goproxy/proxy /
|
||||||
|
CMD /proxy ${OPTS}
|
||||||
139
Gopkg.lock
generated
Normal file
@ -0,0 +1,139 @@
|
|||||||
|
# This file is autogenerated, do not edit; changes may be undone by the next 'dep ensure'.
|
||||||
|
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
branch = "master"
|
||||||
|
name = "github.com/alecthomas/template"
|
||||||
|
packages = [
|
||||||
|
".",
|
||||||
|
"parse"
|
||||||
|
]
|
||||||
|
revision = "a0175ee3bccc567396460bf5acd36800cb10c49c"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
branch = "master"
|
||||||
|
name = "github.com/alecthomas/units"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "2efee857e7cfd4f3d0138cc3cbb1b4966962b93a"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
branch = "master"
|
||||||
|
name = "github.com/golang/snappy"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "2e65f85255dbc3072edf28d6b5b8efc472979f5a"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
branch = "master"
|
||||||
|
name = "github.com/hashicorp/yamux"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "3520598351bb3500a49ae9563f5539666ae0a27c"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "github.com/klauspost/cpuid"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "ae7887de9fa5d2db4eaa8174a7eff2c1ac00f2da"
|
||||||
|
version = "v1.1"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "github.com/klauspost/reedsolomon"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "6bb6130ff6a76a904c1841707d65603aec9cc288"
|
||||||
|
version = "v1.6"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "github.com/miekg/dns"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "5a2b9fab83ff0f8bfc99684bd5f43a37abe560f1"
|
||||||
|
version = "v1.0.8"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "github.com/pkg/errors"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "645ef00459ed84a119197bfb8d8205042c6df63d"
|
||||||
|
version = "v0.8.0"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "github.com/pmylund/go-cache"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "a3647f8e31d79543b2d0f0ae2fe5c379d72cedc0"
|
||||||
|
version = "v2.1.0"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
branch = "master"
|
||||||
|
name = "github.com/templexxx/cpufeat"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "3794dfbfb04749f896b521032f69383f24c3687e"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "github.com/templexxx/xor"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "0af8e873c554da75f37f2049cdffda804533d44c"
|
||||||
|
version = "0.1.2"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "github.com/tjfoc/gmsm"
|
||||||
|
packages = ["sm4"]
|
||||||
|
revision = "98aa888b79d8de04afe0fccf45ed10594efc858b"
|
||||||
|
version = "v1.1"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "github.com/xtaci/kcp-go"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "42bc1dfefff592fdb3affa793980c4f6ab4213e5"
|
||||||
|
version = "v3.25"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
branch = "master"
|
||||||
|
name = "golang.org/x/crypto"
|
||||||
|
packages = [
|
||||||
|
"blowfish",
|
||||||
|
"cast5",
|
||||||
|
"curve25519",
|
||||||
|
"ed25519",
|
||||||
|
"ed25519/internal/edwards25519",
|
||||||
|
"internal/chacha20",
|
||||||
|
"internal/subtle",
|
||||||
|
"pbkdf2",
|
||||||
|
"poly1305",
|
||||||
|
"salsa20",
|
||||||
|
"salsa20/salsa",
|
||||||
|
"ssh",
|
||||||
|
"tea",
|
||||||
|
"twofish",
|
||||||
|
"xtea"
|
||||||
|
]
|
||||||
|
revision = "a8fb68e7206f8c78be19b432c58eb52a6aa34462"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
branch = "master"
|
||||||
|
name = "golang.org/x/net"
|
||||||
|
packages = [
|
||||||
|
"bpf",
|
||||||
|
"context",
|
||||||
|
"internal/iana",
|
||||||
|
"internal/socket",
|
||||||
|
"internal/socks",
|
||||||
|
"ipv4",
|
||||||
|
"ipv6",
|
||||||
|
"proxy"
|
||||||
|
]
|
||||||
|
revision = "db08ff08e8622530d9ed3a0e8ac279f6d4c02196"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
branch = "master"
|
||||||
|
name = "golang.org/x/time"
|
||||||
|
packages = ["rate"]
|
||||||
|
revision = "fbb02b2291d28baffd63558aa44b4b56f178d650"
|
||||||
|
|
||||||
|
[[projects]]
|
||||||
|
name = "gopkg.in/alecthomas/kingpin.v2"
|
||||||
|
packages = ["."]
|
||||||
|
revision = "947dcec5ba9c011838740e680966fd7087a71d0d"
|
||||||
|
version = "v2.2.6"
|
||||||
|
|
||||||
|
[solve-meta]
|
||||||
|
analyzer-name = "dep"
|
||||||
|
analyzer-version = 1
|
||||||
|
inputs-digest = "eab0ef29432489696d8bfd524757dcb03a83f91c329f2d05c36da70df850360d"
|
||||||
|
solver-name = "gps-cdcl"
|
||||||
|
solver-version = 1
|
||||||
66
Gopkg.toml
Normal file
@ -0,0 +1,66 @@
|
|||||||
|
# Gopkg.toml example
|
||||||
|
#
|
||||||
|
# Refer to https://golang.github.io/dep/docs/Gopkg.toml.html
|
||||||
|
# for detailed Gopkg.toml documentation.
|
||||||
|
#
|
||||||
|
# required = ["github.com/user/thing/cmd/thing"]
|
||||||
|
# ignored = ["github.com/user/project/pkgX", "bitbucket.org/user/project/pkgA/pkgY"]
|
||||||
|
#
|
||||||
|
# [[constraint]]
|
||||||
|
# name = "github.com/user/project"
|
||||||
|
# version = "1.0.0"
|
||||||
|
#
|
||||||
|
# [[constraint]]
|
||||||
|
# name = "github.com/user/project2"
|
||||||
|
# branch = "dev"
|
||||||
|
# source = "github.com/myfork/project2"
|
||||||
|
#
|
||||||
|
# [[override]]
|
||||||
|
# name = "github.com/x/y"
|
||||||
|
# version = "2.4.0"
|
||||||
|
#
|
||||||
|
# [prune]
|
||||||
|
# non-go = false
|
||||||
|
# go-tests = true
|
||||||
|
# unused-packages = true
|
||||||
|
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
branch = "master"
|
||||||
|
name = "github.com/golang/snappy"
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
branch = "master"
|
||||||
|
name = "github.com/hashicorp/yamux"
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
name = "github.com/miekg/dns"
|
||||||
|
version = "1.0.8"
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
name = "github.com/pmylund/go-cache"
|
||||||
|
version = "2.1.0"
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
name = "github.com/xtaci/kcp-go"
|
||||||
|
version = "3.25.0"
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
branch = "master"
|
||||||
|
name = "golang.org/x/crypto"
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
branch = "master"
|
||||||
|
name = "golang.org/x/net"
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
branch = "master"
|
||||||
|
name = "golang.org/x/time"
|
||||||
|
|
||||||
|
[[constraint]]
|
||||||
|
name = "gopkg.in/alecthomas/kingpin.v2"
|
||||||
|
version = "2.2.6"
|
||||||
|
|
||||||
|
[prune]
|
||||||
|
go-tests = true
|
||||||
|
unused-packages = true
|
||||||
687
LICENSE
@ -1,21 +1,674 @@
|
|||||||
MIT License
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
Version 3, 29 June 2007
|
||||||
|
|
||||||
Copyright (c) 2017 snail007
|
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies
|
||||||
|
of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
Preamble
|
||||||
of this software and associated documentation files (the "Software"), to deal
|
|
||||||
in the Software without restriction, including without limitation the rights
|
|
||||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
||||||
copies of the Software, and to permit persons to whom the Software is
|
|
||||||
furnished to do so, subject to the following conditions:
|
|
||||||
|
|
||||||
The above copyright notice and this permission notice shall be included in all
|
The GNU General Public License is a free, copyleft license for
|
||||||
copies or substantial portions of the Software.
|
software and other kinds of works.
|
||||||
|
|
||||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
The licenses for most software and other practical works are designed
|
||||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
to take away your freedom to share and change the works. By contrast,
|
||||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
the GNU General Public License is intended to guarantee your freedom to
|
||||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
share and change all versions of a program--to make sure it remains free
|
||||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
software for all its users. We, the Free Software Foundation, use the
|
||||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
GNU General Public License for most of our software; it applies also to
|
||||||
SOFTWARE.
|
any other work released this way by its authors. You can apply it to
|
||||||
|
your programs, too.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom, not
|
||||||
|
price. Our General Public Licenses are designed to make sure that you
|
||||||
|
have the freedom to distribute copies of free software (and charge for
|
||||||
|
them if you wish), that you receive source code or can get it if you
|
||||||
|
want it, that you can change the software or use pieces of it in new
|
||||||
|
free programs, and that you know you can do these things.
|
||||||
|
|
||||||
|
To protect your rights, we need to prevent others from denying you
|
||||||
|
these rights or asking you to surrender the rights. Therefore, you have
|
||||||
|
certain responsibilities if you distribute copies of the software, or if
|
||||||
|
you modify it: responsibilities to respect the freedom of others.
|
||||||
|
|
||||||
|
For example, if you distribute copies of such a program, whether
|
||||||
|
gratis or for a fee, you must pass on to the recipients the same
|
||||||
|
freedoms that you received. You must make sure that they, too, receive
|
||||||
|
or can get the source code. And you must show them these terms so they
|
||||||
|
know their rights.
|
||||||
|
|
||||||
|
Developers that use the GNU GPL protect your rights with two steps:
|
||||||
|
(1) assert copyright on the software, and (2) offer you this License
|
||||||
|
giving you legal permission to copy, distribute and/or modify it.
|
||||||
|
|
||||||
|
For the developers' and authors' protection, the GPL clearly explains
|
||||||
|
that there is no warranty for this free software. For both users' and
|
||||||
|
authors' sake, the GPL requires that modified versions be marked as
|
||||||
|
changed, so that their problems will not be attributed erroneously to
|
||||||
|
authors of previous versions.
|
||||||
|
|
||||||
|
Some devices are designed to deny users access to install or run
|
||||||
|
modified versions of the software inside them, although the manufacturer
|
||||||
|
can do so. This is fundamentally incompatible with the aim of
|
||||||
|
protecting users' freedom to change the software. The systematic
|
||||||
|
pattern of such abuse occurs in the area of products for individuals to
|
||||||
|
use, which is precisely where it is most unacceptable. Therefore, we
|
||||||
|
have designed this version of the GPL to prohibit the practice for those
|
||||||
|
products. If such problems arise substantially in other domains, we
|
||||||
|
stand ready to extend this provision to those domains in future versions
|
||||||
|
of the GPL, as needed to protect the freedom of users.
|
||||||
|
|
||||||
|
Finally, every program is threatened constantly by software patents.
|
||||||
|
States should not allow patents to restrict development and use of
|
||||||
|
software on general-purpose computers, but in those that do, we wish to
|
||||||
|
avoid the special danger that patents applied to a free program could
|
||||||
|
make it effectively proprietary. To prevent this, the GPL assures that
|
||||||
|
patents cannot be used to render the program non-free.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and
|
||||||
|
modification follow.
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
0. Definitions.
|
||||||
|
|
||||||
|
"This License" refers to version 3 of the GNU General Public License.
|
||||||
|
|
||||||
|
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||||
|
works, such as semiconductor masks.
|
||||||
|
|
||||||
|
"The Program" refers to any copyrightable work licensed under this
|
||||||
|
License. Each licensee is addressed as "you". "Licensees" and
|
||||||
|
"recipients" may be individuals or organizations.
|
||||||
|
|
||||||
|
To "modify" a work means to copy from or adapt all or part of the work
|
||||||
|
in a fashion requiring copyright permission, other than the making of an
|
||||||
|
exact copy. The resulting work is called a "modified version" of the
|
||||||
|
earlier work or a work "based on" the earlier work.
|
||||||
|
|
||||||
|
A "covered work" means either the unmodified Program or a work based
|
||||||
|
on the Program.
|
||||||
|
|
||||||
|
To "propagate" a work means to do anything with it that, without
|
||||||
|
permission, would make you directly or secondarily liable for
|
||||||
|
infringement under applicable copyright law, except executing it on a
|
||||||
|
computer or modifying a private copy. Propagation includes copying,
|
||||||
|
distribution (with or without modification), making available to the
|
||||||
|
public, and in some countries other activities as well.
|
||||||
|
|
||||||
|
To "convey" a work means any kind of propagation that enables other
|
||||||
|
parties to make or receive copies. Mere interaction with a user through
|
||||||
|
a computer network, with no transfer of a copy, is not conveying.
|
||||||
|
|
||||||
|
An interactive user interface displays "Appropriate Legal Notices"
|
||||||
|
to the extent that it includes a convenient and prominently visible
|
||||||
|
feature that (1) displays an appropriate copyright notice, and (2)
|
||||||
|
tells the user that there is no warranty for the work (except to the
|
||||||
|
extent that warranties are provided), that licensees may convey the
|
||||||
|
work under this License, and how to view a copy of this License. If
|
||||||
|
the interface presents a list of user commands or options, such as a
|
||||||
|
menu, a prominent item in the list meets this criterion.
|
||||||
|
|
||||||
|
1. Source Code.
|
||||||
|
|
||||||
|
The "source code" for a work means the preferred form of the work
|
||||||
|
for making modifications to it. "Object code" means any non-source
|
||||||
|
form of a work.
|
||||||
|
|
||||||
|
A "Standard Interface" means an interface that either is an official
|
||||||
|
standard defined by a recognized standards body, or, in the case of
|
||||||
|
interfaces specified for a particular programming language, one that
|
||||||
|
is widely used among developers working in that language.
|
||||||
|
|
||||||
|
The "System Libraries" of an executable work include anything, other
|
||||||
|
than the work as a whole, that (a) is included in the normal form of
|
||||||
|
packaging a Major Component, but which is not part of that Major
|
||||||
|
Component, and (b) serves only to enable use of the work with that
|
||||||
|
Major Component, or to implement a Standard Interface for which an
|
||||||
|
implementation is available to the public in source code form. A
|
||||||
|
"Major Component", in this context, means a major essential component
|
||||||
|
(kernel, window system, and so on) of the specific operating system
|
||||||
|
(if any) on which the executable work runs, or a compiler used to
|
||||||
|
produce the work, or an object code interpreter used to run it.
|
||||||
|
|
||||||
|
The "Corresponding Source" for a work in object code form means all
|
||||||
|
the source code needed to generate, install, and (for an executable
|
||||||
|
work) run the object code and to modify the work, including scripts to
|
||||||
|
control those activities. However, it does not include the work's
|
||||||
|
System Libraries, or general-purpose tools or generally available free
|
||||||
|
programs which are used unmodified in performing those activities but
|
||||||
|
which are not part of the work. For example, Corresponding Source
|
||||||
|
includes interface definition files associated with source files for
|
||||||
|
the work, and the source code for shared libraries and dynamically
|
||||||
|
linked subprograms that the work is specifically designed to require,
|
||||||
|
such as by intimate data communication or control flow between those
|
||||||
|
subprograms and other parts of the work.
|
||||||
|
|
||||||
|
The Corresponding Source need not include anything that users
|
||||||
|
can regenerate automatically from other parts of the Corresponding
|
||||||
|
Source.
|
||||||
|
|
||||||
|
The Corresponding Source for a work in source code form is that
|
||||||
|
same work.
|
||||||
|
|
||||||
|
2. Basic Permissions.
|
||||||
|
|
||||||
|
All rights granted under this License are granted for the term of
|
||||||
|
copyright on the Program, and are irrevocable provided the stated
|
||||||
|
conditions are met. This License explicitly affirms your unlimited
|
||||||
|
permission to run the unmodified Program. The output from running a
|
||||||
|
covered work is covered by this License only if the output, given its
|
||||||
|
content, constitutes a covered work. This License acknowledges your
|
||||||
|
rights of fair use or other equivalent, as provided by copyright law.
|
||||||
|
|
||||||
|
You may make, run and propagate covered works that you do not
|
||||||
|
convey, without conditions so long as your license otherwise remains
|
||||||
|
in force. You may convey covered works to others for the sole purpose
|
||||||
|
of having them make modifications exclusively for you, or provide you
|
||||||
|
with facilities for running those works, provided that you comply with
|
||||||
|
the terms of this License in conveying all material for which you do
|
||||||
|
not control copyright. Those thus making or running the covered works
|
||||||
|
for you must do so exclusively on your behalf, under your direction
|
||||||
|
and control, on terms that prohibit them from making any copies of
|
||||||
|
your copyrighted material outside their relationship with you.
|
||||||
|
|
||||||
|
Conveying under any other circumstances is permitted solely under
|
||||||
|
the conditions stated below. Sublicensing is not allowed; section 10
|
||||||
|
makes it unnecessary.
|
||||||
|
|
||||||
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||||
|
|
||||||
|
No covered work shall be deemed part of an effective technological
|
||||||
|
measure under any applicable law fulfilling obligations under article
|
||||||
|
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||||
|
similar laws prohibiting or restricting circumvention of such
|
||||||
|
measures.
|
||||||
|
|
||||||
|
When you convey a covered work, you waive any legal power to forbid
|
||||||
|
circumvention of technological measures to the extent such circumvention
|
||||||
|
is effected by exercising rights under this License with respect to
|
||||||
|
the covered work, and you disclaim any intention to limit operation or
|
||||||
|
modification of the work as a means of enforcing, against the work's
|
||||||
|
users, your or third parties' legal rights to forbid circumvention of
|
||||||
|
technological measures.
|
||||||
|
|
||||||
|
4. Conveying Verbatim Copies.
|
||||||
|
|
||||||
|
You may convey verbatim copies of the Program's source code as you
|
||||||
|
receive it, in any medium, provided that you conspicuously and
|
||||||
|
appropriately publish on each copy an appropriate copyright notice;
|
||||||
|
keep intact all notices stating that this License and any
|
||||||
|
non-permissive terms added in accord with section 7 apply to the code;
|
||||||
|
keep intact all notices of the absence of any warranty; and give all
|
||||||
|
recipients a copy of this License along with the Program.
|
||||||
|
|
||||||
|
You may charge any price or no price for each copy that you convey,
|
||||||
|
and you may offer support or warranty protection for a fee.
|
||||||
|
|
||||||
|
5. Conveying Modified Source Versions.
|
||||||
|
|
||||||
|
You may convey a work based on the Program, or the modifications to
|
||||||
|
produce it from the Program, in the form of source code under the
|
||||||
|
terms of section 4, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) The work must carry prominent notices stating that you modified
|
||||||
|
it, and giving a relevant date.
|
||||||
|
|
||||||
|
b) The work must carry prominent notices stating that it is
|
||||||
|
released under this License and any conditions added under section
|
||||||
|
7. This requirement modifies the requirement in section 4 to
|
||||||
|
"keep intact all notices".
|
||||||
|
|
||||||
|
c) You must license the entire work, as a whole, under this
|
||||||
|
License to anyone who comes into possession of a copy. This
|
||||||
|
License will therefore apply, along with any applicable section 7
|
||||||
|
additional terms, to the whole of the work, and all its parts,
|
||||||
|
regardless of how they are packaged. This License gives no
|
||||||
|
permission to license the work in any other way, but it does not
|
||||||
|
invalidate such permission if you have separately received it.
|
||||||
|
|
||||||
|
d) If the work has interactive user interfaces, each must display
|
||||||
|
Appropriate Legal Notices; however, if the Program has interactive
|
||||||
|
interfaces that do not display Appropriate Legal Notices, your
|
||||||
|
work need not make them do so.
|
||||||
|
|
||||||
|
A compilation of a covered work with other separate and independent
|
||||||
|
works, which are not by their nature extensions of the covered work,
|
||||||
|
and which are not combined with it such as to form a larger program,
|
||||||
|
in or on a volume of a storage or distribution medium, is called an
|
||||||
|
"aggregate" if the compilation and its resulting copyright are not
|
||||||
|
used to limit the access or legal rights of the compilation's users
|
||||||
|
beyond what the individual works permit. Inclusion of a covered work
|
||||||
|
in an aggregate does not cause this License to apply to the other
|
||||||
|
parts of the aggregate.
|
||||||
|
|
||||||
|
6. Conveying Non-Source Forms.
|
||||||
|
|
||||||
|
You may convey a covered work in object code form under the terms
|
||||||
|
of sections 4 and 5, provided that you also convey the
|
||||||
|
machine-readable Corresponding Source under the terms of this License,
|
||||||
|
in one of these ways:
|
||||||
|
|
||||||
|
a) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by the
|
||||||
|
Corresponding Source fixed on a durable physical medium
|
||||||
|
customarily used for software interchange.
|
||||||
|
|
||||||
|
b) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by a
|
||||||
|
written offer, valid for at least three years and valid for as
|
||||||
|
long as you offer spare parts or customer support for that product
|
||||||
|
model, to give anyone who possesses the object code either (1) a
|
||||||
|
copy of the Corresponding Source for all the software in the
|
||||||
|
product that is covered by this License, on a durable physical
|
||||||
|
medium customarily used for software interchange, for a price no
|
||||||
|
more than your reasonable cost of physically performing this
|
||||||
|
conveying of source, or (2) access to copy the
|
||||||
|
Corresponding Source from a network server at no charge.
|
||||||
|
|
||||||
|
c) Convey individual copies of the object code with a copy of the
|
||||||
|
written offer to provide the Corresponding Source. This
|
||||||
|
alternative is allowed only occasionally and noncommercially, and
|
||||||
|
only if you received the object code with such an offer, in accord
|
||||||
|
with subsection 6b.
|
||||||
|
|
||||||
|
d) Convey the object code by offering access from a designated
|
||||||
|
place (gratis or for a charge), and offer equivalent access to the
|
||||||
|
Corresponding Source in the same way through the same place at no
|
||||||
|
further charge. You need not require recipients to copy the
|
||||||
|
Corresponding Source along with the object code. If the place to
|
||||||
|
copy the object code is a network server, the Corresponding Source
|
||||||
|
may be on a different server (operated by you or a third party)
|
||||||
|
that supports equivalent copying facilities, provided you maintain
|
||||||
|
clear directions next to the object code saying where to find the
|
||||||
|
Corresponding Source. Regardless of what server hosts the
|
||||||
|
Corresponding Source, you remain obligated to ensure that it is
|
||||||
|
available for as long as needed to satisfy these requirements.
|
||||||
|
|
||||||
|
e) Convey the object code using peer-to-peer transmission, provided
|
||||||
|
you inform other peers where the object code and Corresponding
|
||||||
|
Source of the work are being offered to the general public at no
|
||||||
|
charge under subsection 6d.
|
||||||
|
|
||||||
|
A separable portion of the object code, whose source code is excluded
|
||||||
|
from the Corresponding Source as a System Library, need not be
|
||||||
|
included in conveying the object code work.
|
||||||
|
|
||||||
|
A "User Product" is either (1) a "consumer product", which means any
|
||||||
|
tangible personal property which is normally used for personal, family,
|
||||||
|
or household purposes, or (2) anything designed or sold for incorporation
|
||||||
|
into a dwelling. In determining whether a product is a consumer product,
|
||||||
|
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||||
|
product received by a particular user, "normally used" refers to a
|
||||||
|
typical or common use of that class of product, regardless of the status
|
||||||
|
of the particular user or of the way in which the particular user
|
||||||
|
actually uses, or expects or is expected to use, the product. A product
|
||||||
|
is a consumer product regardless of whether the product has substantial
|
||||||
|
commercial, industrial or non-consumer uses, unless such uses represent
|
||||||
|
the only significant mode of use of the product.
|
||||||
|
|
||||||
|
"Installation Information" for a User Product means any methods,
|
||||||
|
procedures, authorization keys, or other information required to install
|
||||||
|
and execute modified versions of a covered work in that User Product from
|
||||||
|
a modified version of its Corresponding Source. The information must
|
||||||
|
suffice to ensure that the continued functioning of the modified object
|
||||||
|
code is in no case prevented or interfered with solely because
|
||||||
|
modification has been made.
|
||||||
|
|
||||||
|
If you convey an object code work under this section in, or with, or
|
||||||
|
specifically for use in, a User Product, and the conveying occurs as
|
||||||
|
part of a transaction in which the right of possession and use of the
|
||||||
|
User Product is transferred to the recipient in perpetuity or for a
|
||||||
|
fixed term (regardless of how the transaction is characterized), the
|
||||||
|
Corresponding Source conveyed under this section must be accompanied
|
||||||
|
by the Installation Information. But this requirement does not apply
|
||||||
|
if neither you nor any third party retains the ability to install
|
||||||
|
modified object code on the User Product (for example, the work has
|
||||||
|
been installed in ROM).
|
||||||
|
|
||||||
|
The requirement to provide Installation Information does not include a
|
||||||
|
requirement to continue to provide support service, warranty, or updates
|
||||||
|
for a work that has been modified or installed by the recipient, or for
|
||||||
|
the User Product in which it has been modified or installed. Access to a
|
||||||
|
network may be denied when the modification itself materially and
|
||||||
|
adversely affects the operation of the network or violates the rules and
|
||||||
|
protocols for communication across the network.
|
||||||
|
|
||||||
|
Corresponding Source conveyed, and Installation Information provided,
|
||||||
|
in accord with this section must be in a format that is publicly
|
||||||
|
documented (and with an implementation available to the public in
|
||||||
|
source code form), and must require no special password or key for
|
||||||
|
unpacking, reading or copying.
|
||||||
|
|
||||||
|
7. Additional Terms.
|
||||||
|
|
||||||
|
"Additional permissions" are terms that supplement the terms of this
|
||||||
|
License by making exceptions from one or more of its conditions.
|
||||||
|
Additional permissions that are applicable to the entire Program shall
|
||||||
|
be treated as though they were included in this License, to the extent
|
||||||
|
that they are valid under applicable law. If additional permissions
|
||||||
|
apply only to part of the Program, that part may be used separately
|
||||||
|
under those permissions, but the entire Program remains governed by
|
||||||
|
this License without regard to the additional permissions.
|
||||||
|
|
||||||
|
When you convey a copy of a covered work, you may at your option
|
||||||
|
remove any additional permissions from that copy, or from any part of
|
||||||
|
it. (Additional permissions may be written to require their own
|
||||||
|
removal in certain cases when you modify the work.) You may place
|
||||||
|
additional permissions on material, added by you to a covered work,
|
||||||
|
for which you have or can give appropriate copyright permission.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, for material you
|
||||||
|
add to a covered work, you may (if authorized by the copyright holders of
|
||||||
|
that material) supplement the terms of this License with terms:
|
||||||
|
|
||||||
|
a) Disclaiming warranty or limiting liability differently from the
|
||||||
|
terms of sections 15 and 16 of this License; or
|
||||||
|
|
||||||
|
b) Requiring preservation of specified reasonable legal notices or
|
||||||
|
author attributions in that material or in the Appropriate Legal
|
||||||
|
Notices displayed by works containing it; or
|
||||||
|
|
||||||
|
c) Prohibiting misrepresentation of the origin of that material, or
|
||||||
|
requiring that modified versions of such material be marked in
|
||||||
|
reasonable ways as different from the original version; or
|
||||||
|
|
||||||
|
d) Limiting the use for publicity purposes of names of licensors or
|
||||||
|
authors of the material; or
|
||||||
|
|
||||||
|
e) Declining to grant rights under trademark law for use of some
|
||||||
|
trade names, trademarks, or service marks; or
|
||||||
|
|
||||||
|
f) Requiring indemnification of licensors and authors of that
|
||||||
|
material by anyone who conveys the material (or modified versions of
|
||||||
|
it) with contractual assumptions of liability to the recipient, for
|
||||||
|
any liability that these contractual assumptions directly impose on
|
||||||
|
those licensors and authors.
|
||||||
|
|
||||||
|
All other non-permissive additional terms are considered "further
|
||||||
|
restrictions" within the meaning of section 10. If the Program as you
|
||||||
|
received it, or any part of it, contains a notice stating that it is
|
||||||
|
governed by this License along with a term that is a further
|
||||||
|
restriction, you may remove that term. If a license document contains
|
||||||
|
a further restriction but permits relicensing or conveying under this
|
||||||
|
License, you may add to a covered work material governed by the terms
|
||||||
|
of that license document, provided that the further restriction does
|
||||||
|
not survive such relicensing or conveying.
|
||||||
|
|
||||||
|
If you add terms to a covered work in accord with this section, you
|
||||||
|
must place, in the relevant source files, a statement of the
|
||||||
|
additional terms that apply to those files, or a notice indicating
|
||||||
|
where to find the applicable terms.
|
||||||
|
|
||||||
|
Additional terms, permissive or non-permissive, may be stated in the
|
||||||
|
form of a separately written license, or stated as exceptions;
|
||||||
|
the above requirements apply either way.
|
||||||
|
|
||||||
|
8. Termination.
|
||||||
|
|
||||||
|
You may not propagate or modify a covered work except as expressly
|
||||||
|
provided under this License. Any attempt otherwise to propagate or
|
||||||
|
modify it is void, and will automatically terminate your rights under
|
||||||
|
this License (including any patent licenses granted under the third
|
||||||
|
paragraph of section 11).
|
||||||
|
|
||||||
|
However, if you cease all violation of this License, then your
|
||||||
|
license from a particular copyright holder is reinstated (a)
|
||||||
|
provisionally, unless and until the copyright holder explicitly and
|
||||||
|
finally terminates your license, and (b) permanently, if the copyright
|
||||||
|
holder fails to notify you of the violation by some reasonable means
|
||||||
|
prior to 60 days after the cessation.
|
||||||
|
|
||||||
|
Moreover, your license from a particular copyright holder is
|
||||||
|
reinstated permanently if the copyright holder notifies you of the
|
||||||
|
violation by some reasonable means, this is the first time you have
|
||||||
|
received notice of violation of this License (for any work) from that
|
||||||
|
copyright holder, and you cure the violation prior to 30 days after
|
||||||
|
your receipt of the notice.
|
||||||
|
|
||||||
|
Termination of your rights under this section does not terminate the
|
||||||
|
licenses of parties who have received copies or rights from you under
|
||||||
|
this License. If your rights have been terminated and not permanently
|
||||||
|
reinstated, you do not qualify to receive new licenses for the same
|
||||||
|
material under section 10.
|
||||||
|
|
||||||
|
9. Acceptance Not Required for Having Copies.
|
||||||
|
|
||||||
|
You are not required to accept this License in order to receive or
|
||||||
|
run a copy of the Program. Ancillary propagation of a covered work
|
||||||
|
occurring solely as a consequence of using peer-to-peer transmission
|
||||||
|
to receive a copy likewise does not require acceptance. However,
|
||||||
|
nothing other than this License grants you permission to propagate or
|
||||||
|
modify any covered work. These actions infringe copyright if you do
|
||||||
|
not accept this License. Therefore, by modifying or propagating a
|
||||||
|
covered work, you indicate your acceptance of this License to do so.
|
||||||
|
|
||||||
|
10. Automatic Licensing of Downstream Recipients.
|
||||||
|
|
||||||
|
Each time you convey a covered work, the recipient automatically
|
||||||
|
receives a license from the original licensors, to run, modify and
|
||||||
|
propagate that work, subject to this License. You are not responsible
|
||||||
|
for enforcing compliance by third parties with this License.
|
||||||
|
|
||||||
|
An "entity transaction" is a transaction transferring control of an
|
||||||
|
organization, or substantially all assets of one, or subdividing an
|
||||||
|
organization, or merging organizations. If propagation of a covered
|
||||||
|
work results from an entity transaction, each party to that
|
||||||
|
transaction who receives a copy of the work also receives whatever
|
||||||
|
licenses to the work the party's predecessor in interest had or could
|
||||||
|
give under the previous paragraph, plus a right to possession of the
|
||||||
|
Corresponding Source of the work from the predecessor in interest, if
|
||||||
|
the predecessor has it or can get it with reasonable efforts.
|
||||||
|
|
||||||
|
You may not impose any further restrictions on the exercise of the
|
||||||
|
rights granted or affirmed under this License. For example, you may
|
||||||
|
not impose a license fee, royalty, or other charge for exercise of
|
||||||
|
rights granted under this License, and you may not initiate litigation
|
||||||
|
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||||
|
any patent claim is infringed by making, using, selling, offering for
|
||||||
|
sale, or importing the Program or any portion of it.
|
||||||
|
|
||||||
|
11. Patents.
|
||||||
|
|
||||||
|
A "contributor" is a copyright holder who authorizes use under this
|
||||||
|
License of the Program or a work on which the Program is based. The
|
||||||
|
work thus licensed is called the contributor's "contributor version".
|
||||||
|
|
||||||
|
A contributor's "essential patent claims" are all patent claims
|
||||||
|
owned or controlled by the contributor, whether already acquired or
|
||||||
|
hereafter acquired, that would be infringed by some manner, permitted
|
||||||
|
by this License, of making, using, or selling its contributor version,
|
||||||
|
but do not include claims that would be infringed only as a
|
||||||
|
consequence of further modification of the contributor version. For
|
||||||
|
purposes of this definition, "control" includes the right to grant
|
||||||
|
patent sublicenses in a manner consistent with the requirements of
|
||||||
|
this License.
|
||||||
|
|
||||||
|
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||||
|
patent license under the contributor's essential patent claims, to
|
||||||
|
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||||
|
propagate the contents of its contributor version.
|
||||||
|
|
||||||
|
In the following three paragraphs, a "patent license" is any express
|
||||||
|
agreement or commitment, however denominated, not to enforce a patent
|
||||||
|
(such as an express permission to practice a patent or covenant not to
|
||||||
|
sue for patent infringement). To "grant" such a patent license to a
|
||||||
|
party means to make such an agreement or commitment not to enforce a
|
||||||
|
patent against the party.
|
||||||
|
|
||||||
|
If you convey a covered work, knowingly relying on a patent license,
|
||||||
|
and the Corresponding Source of the work is not available for anyone
|
||||||
|
to copy, free of charge and under the terms of this License, through a
|
||||||
|
publicly available network server or other readily accessible means,
|
||||||
|
then you must either (1) cause the Corresponding Source to be so
|
||||||
|
available, or (2) arrange to deprive yourself of the benefit of the
|
||||||
|
patent license for this particular work, or (3) arrange, in a manner
|
||||||
|
consistent with the requirements of this License, to extend the patent
|
||||||
|
license to downstream recipients. "Knowingly relying" means you have
|
||||||
|
actual knowledge that, but for the patent license, your conveying the
|
||||||
|
covered work in a country, or your recipient's use of the covered work
|
||||||
|
in a country, would infringe one or more identifiable patents in that
|
||||||
|
country that you have reason to believe are valid.
|
||||||
|
|
||||||
|
If, pursuant to or in connection with a single transaction or
|
||||||
|
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||||
|
covered work, and grant a patent license to some of the parties
|
||||||
|
receiving the covered work authorizing them to use, propagate, modify
|
||||||
|
or convey a specific copy of the covered work, then the patent license
|
||||||
|
you grant is automatically extended to all recipients of the covered
|
||||||
|
work and works based on it.
|
||||||
|
|
||||||
|
A patent license is "discriminatory" if it does not include within
|
||||||
|
the scope of its coverage, prohibits the exercise of, or is
|
||||||
|
conditioned on the non-exercise of one or more of the rights that are
|
||||||
|
specifically granted under this License. You may not convey a covered
|
||||||
|
work if you are a party to an arrangement with a third party that is
|
||||||
|
in the business of distributing software, under which you make payment
|
||||||
|
to the third party based on the extent of your activity of conveying
|
||||||
|
the work, and under which the third party grants, to any of the
|
||||||
|
parties who would receive the covered work from you, a discriminatory
|
||||||
|
patent license (a) in connection with copies of the covered work
|
||||||
|
conveyed by you (or copies made from those copies), or (b) primarily
|
||||||
|
for and in connection with specific products or compilations that
|
||||||
|
contain the covered work, unless you entered into that arrangement,
|
||||||
|
or that patent license was granted, prior to 28 March 2007.
|
||||||
|
|
||||||
|
Nothing in this License shall be construed as excluding or limiting
|
||||||
|
any implied license or other defenses to infringement that may
|
||||||
|
otherwise be available to you under applicable patent law.
|
||||||
|
|
||||||
|
12. No Surrender of Others' Freedom.
|
||||||
|
|
||||||
|
If conditions are imposed on you (whether by court order, agreement or
|
||||||
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
|
excuse you from the conditions of this License. If you cannot convey a
|
||||||
|
covered work so as to satisfy simultaneously your obligations under this
|
||||||
|
License and any other pertinent obligations, then as a consequence you may
|
||||||
|
not convey it at all. For example, if you agree to terms that obligate you
|
||||||
|
to collect a royalty for further conveying from those to whom you convey
|
||||||
|
the Program, the only way you could satisfy both those terms and this
|
||||||
|
License would be to refrain entirely from conveying the Program.
|
||||||
|
|
||||||
|
13. Use with the GNU Affero General Public License.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, you have
|
||||||
|
permission to link or combine any covered work with a work licensed
|
||||||
|
under version 3 of the GNU Affero General Public License into a single
|
||||||
|
combined work, and to convey the resulting work. The terms of this
|
||||||
|
License will continue to apply to the part which is the covered work,
|
||||||
|
but the special requirements of the GNU Affero General Public License,
|
||||||
|
section 13, concerning interaction through a network will apply to the
|
||||||
|
combination as such.
|
||||||
|
|
||||||
|
14. Revised Versions of this License.
|
||||||
|
|
||||||
|
The Free Software Foundation may publish revised and/or new versions of
|
||||||
|
the GNU General Public License from time to time. Such new versions will
|
||||||
|
be similar in spirit to the present version, but may differ in detail to
|
||||||
|
address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the
|
||||||
|
Program specifies that a certain numbered version of the GNU General
|
||||||
|
Public License "or any later version" applies to it, you have the
|
||||||
|
option of following the terms and conditions either of that numbered
|
||||||
|
version or of any later version published by the Free Software
|
||||||
|
Foundation. If the Program does not specify a version number of the
|
||||||
|
GNU General Public License, you may choose any version ever published
|
||||||
|
by the Free Software Foundation.
|
||||||
|
|
||||||
|
If the Program specifies that a proxy can decide which future
|
||||||
|
versions of the GNU General Public License can be used, that proxy's
|
||||||
|
public statement of acceptance of a version permanently authorizes you
|
||||||
|
to choose that version for the Program.
|
||||||
|
|
||||||
|
Later license versions may give you additional or different
|
||||||
|
permissions. However, no additional obligations are imposed on any
|
||||||
|
author or copyright holder as a result of your choosing to follow a
|
||||||
|
later version.
|
||||||
|
|
||||||
|
15. Disclaimer of Warranty.
|
||||||
|
|
||||||
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||||
|
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||||
|
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||||
|
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||||
|
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||||
|
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||||
|
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
16. Limitation of Liability.
|
||||||
|
|
||||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||||
|
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||||
|
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||||
|
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||||
|
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||||
|
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||||
|
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||||
|
SUCH DAMAGES.
|
||||||
|
|
||||||
|
17. Interpretation of Sections 15 and 16.
|
||||||
|
|
||||||
|
If the disclaimer of warranty and limitation of liability provided
|
||||||
|
above cannot be given local legal effect according to their terms,
|
||||||
|
reviewing courts shall apply local law that most closely approximates
|
||||||
|
an absolute waiver of all civil liability in connection with the
|
||||||
|
Program, unless a warranty or assumption of liability accompanies a
|
||||||
|
copy of the Program in return for a fee.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
How to Apply These Terms to Your New Programs
|
||||||
|
|
||||||
|
If you develop a new program, and you want it to be of the greatest
|
||||||
|
possible use to the public, the best way to achieve this is to make it
|
||||||
|
free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
|
To do so, attach the following notices to the program. It is safest
|
||||||
|
to attach them to the start of each source file to most effectively
|
||||||
|
state the exclusion of warranty; and each file should have at least
|
||||||
|
the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
{one line to give the program's name and a brief idea of what it does.}
|
||||||
|
Copyright (C) {year} {name of author}
|
||||||
|
|
||||||
|
This program is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
If the program does terminal interaction, make it output a short
|
||||||
|
notice like this when it starts in an interactive mode:
|
||||||
|
|
||||||
|
{project} Copyright (C) {year} {fullname}
|
||||||
|
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||||
|
This is free software, and you are welcome to redistribute it
|
||||||
|
under certain conditions; type `show c' for details.
|
||||||
|
|
||||||
|
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||||
|
parts of the General Public License. Of course, your program's commands
|
||||||
|
might be different; for a GUI interface, you would use an "about box".
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or school,
|
||||||
|
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||||
|
For more information on this, and how to apply and follow the GNU GPL, see
|
||||||
|
<http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
The GNU General Public License does not permit incorporating your program
|
||||||
|
into proprietary programs. If your program is a subroutine library, you
|
||||||
|
may consider it more useful to permit linking proprietary applications with
|
||||||
|
the library. If this is what you want to do, use the GNU Lesser General
|
||||||
|
Public License instead of this License. But first, please read
|
||||||
|
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
||||||
|
|||||||
1147
README_ZH.md
Normal file
499
config.go
Executable file
@ -0,0 +1,499 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"crypto/sha1"
|
||||||
|
"fmt"
|
||||||
|
logger "log"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"path"
|
||||||
|
"path/filepath"
|
||||||
|
"runtime/pprof"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
sdk "github.com/snail007/goproxy/sdk/android-ios"
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
|
||||||
|
httpx "github.com/snail007/goproxy/services/http"
|
||||||
|
keygenx "github.com/snail007/goproxy/services/keygen"
|
||||||
|
mux "github.com/snail007/goproxy/services/mux"
|
||||||
|
socksx "github.com/snail007/goproxy/services/socks"
|
||||||
|
spsx "github.com/snail007/goproxy/services/sps"
|
||||||
|
tcpx "github.com/snail007/goproxy/services/tcp"
|
||||||
|
tunnel "github.com/snail007/goproxy/services/tunnel"
|
||||||
|
udpx "github.com/snail007/goproxy/services/udp"
|
||||||
|
|
||||||
|
kcp "github.com/xtaci/kcp-go"
|
||||||
|
"golang.org/x/crypto/pbkdf2"
|
||||||
|
kingpin "gopkg.in/alecthomas/kingpin.v2"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
app *kingpin.Application
|
||||||
|
service *services.ServiceItem
|
||||||
|
cmd *exec.Cmd
|
||||||
|
cpuProfilingFile, memProfilingFile, blockProfilingFile, goroutineProfilingFile, threadcreateProfilingFile *os.File
|
||||||
|
isDebug bool
|
||||||
|
)
|
||||||
|
|
||||||
|
func initConfig() (err error) {
|
||||||
|
//define args
|
||||||
|
tcpArgs := tcpx.TCPArgs{}
|
||||||
|
httpArgs := httpx.HTTPArgs{}
|
||||||
|
tunnelServerArgs := tunnel.TunnelServerArgs{}
|
||||||
|
tunnelClientArgs := tunnel.TunnelClientArgs{}
|
||||||
|
tunnelBridgeArgs := tunnel.TunnelBridgeArgs{}
|
||||||
|
muxServerArgs := mux.MuxServerArgs{}
|
||||||
|
muxClientArgs := mux.MuxClientArgs{}
|
||||||
|
muxBridgeArgs := mux.MuxBridgeArgs{}
|
||||||
|
udpArgs := udpx.UDPArgs{}
|
||||||
|
socksArgs := socksx.SocksArgs{}
|
||||||
|
spsArgs := spsx.SPSArgs{}
|
||||||
|
dnsArgs := sdk.DNSArgs{}
|
||||||
|
keygenArgs := keygenx.KeygenArgs{}
|
||||||
|
kcpArgs := kcpcfg.KCPConfigArgs{}
|
||||||
|
|
||||||
|
//build srvice args
|
||||||
|
app = kingpin.New("proxy", "happy with proxy")
|
||||||
|
app.Author("snail").Version(APP_VERSION)
|
||||||
|
debug := app.Flag("debug", "debug log output").Default("false").Bool()
|
||||||
|
daemon := app.Flag("daemon", "run proxy in background").Default("false").Bool()
|
||||||
|
forever := app.Flag("forever", "run proxy in forever,fail and retry").Default("false").Bool()
|
||||||
|
logfile := app.Flag("log", "log file path").Default("").String()
|
||||||
|
kcpArgs.Key = app.Flag("kcp-key", "pre-shared secret between client and server").Default("secrect").String()
|
||||||
|
kcpArgs.Crypt = app.Flag("kcp-method", "encrypt/decrypt method, can be: aes, aes-128, aes-192, salsa20, blowfish, twofish, cast5, 3des, tea, xtea, xor, sm4, none").Default("aes").Enum("aes", "aes-128", "aes-192", "salsa20", "blowfish", "twofish", "cast5", "3des", "tea", "xtea", "xor", "sm4", "none")
|
||||||
|
kcpArgs.Mode = app.Flag("kcp-mode", "profiles: fast3, fast2, fast, normal, manual").Default("fast").Enum("fast3", "fast2", "fast", "normal", "manual")
|
||||||
|
kcpArgs.MTU = app.Flag("kcp-mtu", "set maximum transmission unit for UDP packets").Default("450").Int()
|
||||||
|
kcpArgs.SndWnd = app.Flag("kcp-sndwnd", "set send window size(num of packets)").Default("1024").Int()
|
||||||
|
kcpArgs.RcvWnd = app.Flag("kcp-rcvwnd", "set receive window size(num of packets)").Default("1024").Int()
|
||||||
|
kcpArgs.DataShard = app.Flag("kcp-ds", "set reed-solomon erasure coding - datashard").Default("10").Int()
|
||||||
|
kcpArgs.ParityShard = app.Flag("kcp-ps", "set reed-solomon erasure coding - parityshard").Default("3").Int()
|
||||||
|
kcpArgs.DSCP = app.Flag("kcp-dscp", "set DSCP(6bit)").Default("0").Int()
|
||||||
|
kcpArgs.NoComp = app.Flag("kcp-nocomp", "disable compression").Default("false").Bool()
|
||||||
|
kcpArgs.AckNodelay = app.Flag("kcp-acknodelay", "be carefull! flush ack immediately when a packet is received").Default("true").Bool()
|
||||||
|
kcpArgs.NoDelay = app.Flag("kcp-nodelay", "be carefull!").Default("0").Int()
|
||||||
|
kcpArgs.Interval = app.Flag("kcp-interval", "be carefull!").Default("50").Int()
|
||||||
|
kcpArgs.Resend = app.Flag("kcp-resend", "be carefull!").Default("0").Int()
|
||||||
|
kcpArgs.NoCongestion = app.Flag("kcp-nc", "be carefull! no congestion").Default("0").Int()
|
||||||
|
kcpArgs.SockBuf = app.Flag("kcp-sockbuf", "be carefull!").Default("4194304").Int()
|
||||||
|
kcpArgs.KeepAlive = app.Flag("kcp-keepalive", "be carefull!").Default("10").Int()
|
||||||
|
|
||||||
|
//########http#########
|
||||||
|
http := app.Command("http", "proxy on http mode")
|
||||||
|
httpArgs.Parent = http.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
httpArgs.CaCertFile = http.Flag("ca", "ca cert file for tls").Default("").String()
|
||||||
|
httpArgs.CertFile = http.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
httpArgs.KeyFile = http.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
httpArgs.LocalType = http.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tcp").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
httpArgs.ParentType = http.Flag("parent-type", "parent protocol type <tls|tcp|ssh|kcp>").Short('T').Enum("tls", "tcp", "ssh", "kcp")
|
||||||
|
httpArgs.Always = http.Flag("always", "always use parent proxy").Default("false").Bool()
|
||||||
|
httpArgs.Timeout = http.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Default("2000").Int()
|
||||||
|
httpArgs.HTTPTimeout = http.Flag("http-timeout", "check domain if blocked , http request timeout milliseconds when connect to host").Default("3000").Int()
|
||||||
|
httpArgs.Interval = http.Flag("interval", "check domain if blocked every interval seconds").Default("10").Int()
|
||||||
|
httpArgs.Blocked = http.Flag("blocked", "blocked domain file , one domain each line").Default("blocked").Short('b').String()
|
||||||
|
httpArgs.Direct = http.Flag("direct", "direct domain file , one domain each line").Default("direct").Short('d').String()
|
||||||
|
httpArgs.AuthFile = http.Flag("auth-file", "http basic auth file,\"username:password\" each line in file").Short('F').String()
|
||||||
|
httpArgs.Auth = http.Flag("auth", "http basic auth username and password, mutiple user repeat -a ,such as: -a user1:pass1 -a user2:pass2").Short('a').Strings()
|
||||||
|
httpArgs.CheckParentInterval = http.Flag("check-parent-interval", "check if proxy is okay every interval seconds,zero: means no check").Short('I').Default("3").Int()
|
||||||
|
httpArgs.Local = http.Flag("local", "local ip:port to listen,multiple address use comma split,such as: 0.0.0.0:80,0.0.0.0:443").Short('p').Default(":33080").String()
|
||||||
|
httpArgs.SSHUser = http.Flag("ssh-user", "user for ssh").Short('u').Default("").String()
|
||||||
|
httpArgs.SSHKeyFile = http.Flag("ssh-key", "private key file for ssh").Short('S').Default("").String()
|
||||||
|
httpArgs.SSHKeyFileSalt = http.Flag("ssh-keysalt", "salt of ssh private key").Short('s').Default("").String()
|
||||||
|
httpArgs.SSHPassword = http.Flag("ssh-password", "password for ssh").Short('A').Default("").String()
|
||||||
|
httpArgs.LocalIPS = http.Flag("local-bind-ips", "if your host behind a nat,set your public ip here avoid dead loop").Short('g').Strings()
|
||||||
|
httpArgs.AuthURL = http.Flag("auth-url", "http basic auth username and password will send to this url,response http code equal to 'auth-code' means ok,others means fail.").Default("").String()
|
||||||
|
httpArgs.AuthURLTimeout = http.Flag("auth-timeout", "access 'auth-url' timeout milliseconds").Default("3000").Int()
|
||||||
|
httpArgs.AuthURLOkCode = http.Flag("auth-code", "access 'auth-url' success http code").Default("204").Int()
|
||||||
|
httpArgs.AuthURLRetry = http.Flag("auth-retry", "access 'auth-url' fail and retry count").Default("1").Int()
|
||||||
|
httpArgs.DNSAddress = http.Flag("dns-address", "if set this, proxy will use this dns for resolve doamin").Short('q').Default("").String()
|
||||||
|
httpArgs.DNSTTL = http.Flag("dns-ttl", "caching seconds of dns query result").Short('e').Default("300").Int()
|
||||||
|
httpArgs.LocalKey = http.Flag("local-key", "the password for auto encrypt/decrypt local connection data").Short('z').Default("").String()
|
||||||
|
httpArgs.ParentKey = http.Flag("parent-key", "the password for auto encrypt/decrypt parent connection data").Short('Z').Default("").String()
|
||||||
|
httpArgs.LocalCompress = http.Flag("local-compress", "auto compress/decompress data on local connection").Short('m').Default("false").Bool()
|
||||||
|
httpArgs.ParentCompress = http.Flag("parent-compress", "auto compress/decompress data on parent connection").Short('M').Default("false").Bool()
|
||||||
|
|
||||||
|
//########tcp#########
|
||||||
|
tcp := app.Command("tcp", "proxy on tcp mode")
|
||||||
|
tcpArgs.Parent = tcp.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
tcpArgs.CertFile = tcp.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
tcpArgs.KeyFile = tcp.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
tcpArgs.Timeout = tcp.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Short('e').Default("2000").Int()
|
||||||
|
tcpArgs.ParentType = tcp.Flag("parent-type", "parent protocol type <tls|tcp|kcp|udp>").Short('T').Enum("tls", "tcp", "udp", "kcp")
|
||||||
|
tcpArgs.LocalType = tcp.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tcp").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
tcpArgs.CheckParentInterval = tcp.Flag("check-parent-interval", "check if proxy is okay every interval seconds,zero: means no check").Short('I').Default("3").Int()
|
||||||
|
tcpArgs.Local = tcp.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
|
||||||
|
//########udp#########
|
||||||
|
udp := app.Command("udp", "proxy on udp mode")
|
||||||
|
udpArgs.Parent = udp.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
udpArgs.CertFile = udp.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
udpArgs.KeyFile = udp.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
udpArgs.Timeout = udp.Flag("timeout", "tcp timeout milliseconds when connect to parent proxy").Short('t').Default("2000").Int()
|
||||||
|
udpArgs.ParentType = udp.Flag("parent-type", "parent protocol type <tls|tcp|udp>").Short('T').Enum("tls", "tcp", "udp")
|
||||||
|
udpArgs.CheckParentInterval = udp.Flag("check-parent-interval", "check if proxy is okay every interval seconds,zero: means no check").Short('I').Default("3").Int()
|
||||||
|
udpArgs.Local = udp.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
|
||||||
|
//########mux-server#########
|
||||||
|
muxServer := app.Command("server", "proxy on mux server mode")
|
||||||
|
muxServerArgs.Parent = muxServer.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
muxServerArgs.ParentType = muxServer.Flag("parent-type", "parent protocol type <tls|tcp|kcp>").Default("tls").Short('T').Enum("tls", "tcp", "kcp")
|
||||||
|
muxServerArgs.CertFile = muxServer.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
muxServerArgs.KeyFile = muxServer.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
muxServerArgs.Timeout = muxServer.Flag("timeout", "tcp timeout with milliseconds").Short('i').Default("2000").Int()
|
||||||
|
muxServerArgs.IsUDP = muxServer.Flag("udp", "proxy on udp mux server mode").Default("false").Bool()
|
||||||
|
muxServerArgs.Key = muxServer.Flag("k", "client key").Default("default").String()
|
||||||
|
muxServerArgs.Route = muxServer.Flag("route", "local route to client's network, such as: PROTOCOL://LOCAL_IP:LOCAL_PORT@[CLIENT_KEY]CLIENT_LOCAL_HOST:CLIENT_LOCAL_PORT").Short('r').Default("").Strings()
|
||||||
|
muxServerArgs.IsCompress = muxServer.Flag("c", "compress data when tcp|tls mode").Default("false").Bool()
|
||||||
|
muxServerArgs.SessionCount = muxServer.Flag("session-count", "session count which connect to bridge").Short('n').Default("10").Int()
|
||||||
|
|
||||||
|
//########mux-client#########
|
||||||
|
muxClient := app.Command("client", "proxy on mux client mode")
|
||||||
|
muxClientArgs.Parent = muxClient.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
muxClientArgs.ParentType = muxClient.Flag("parent-type", "parent protocol type <tls|tcp|kcp>").Default("tls").Short('T').Enum("tls", "tcp", "kcp")
|
||||||
|
muxClientArgs.CertFile = muxClient.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
muxClientArgs.KeyFile = muxClient.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
muxClientArgs.Timeout = muxClient.Flag("timeout", "tcp timeout with milliseconds").Short('i').Default("2000").Int()
|
||||||
|
muxClientArgs.Key = muxClient.Flag("k", "key same with server").Default("default").String()
|
||||||
|
muxClientArgs.IsCompress = muxClient.Flag("c", "compress data when tcp|tls mode").Default("false").Bool()
|
||||||
|
muxClientArgs.SessionCount = muxClient.Flag("session-count", "session count which connect to bridge").Short('n').Default("10").Int()
|
||||||
|
|
||||||
|
//########mux-bridge#########
|
||||||
|
muxBridge := app.Command("bridge", "proxy on mux bridge mode")
|
||||||
|
muxBridgeArgs.CertFile = muxBridge.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
muxBridgeArgs.KeyFile = muxBridge.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
muxBridgeArgs.Timeout = muxBridge.Flag("timeout", "tcp timeout with milliseconds").Short('i').Default("2000").Int()
|
||||||
|
muxBridgeArgs.Local = muxBridge.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
muxBridgeArgs.LocalType = muxBridge.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tls").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
|
||||||
|
//########tunnel-server#########
|
||||||
|
tunnelServer := app.Command("tserver", "proxy on tunnel server mode")
|
||||||
|
tunnelServerArgs.Parent = tunnelServer.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
tunnelServerArgs.CertFile = tunnelServer.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
tunnelServerArgs.KeyFile = tunnelServer.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
tunnelServerArgs.Timeout = tunnelServer.Flag("timeout", "tcp timeout with milliseconds").Short('t').Default("2000").Int()
|
||||||
|
tunnelServerArgs.IsUDP = tunnelServer.Flag("udp", "proxy on udp tunnel server mode").Default("false").Bool()
|
||||||
|
tunnelServerArgs.Key = tunnelServer.Flag("k", "client key").Default("default").String()
|
||||||
|
tunnelServerArgs.Route = tunnelServer.Flag("route", "local route to client's network, such as: PROTOCOL://LOCAL_IP:LOCAL_PORT@[CLIENT_KEY]CLIENT_LOCAL_HOST:CLIENT_LOCAL_PORT").Short('r').Default("").Strings()
|
||||||
|
|
||||||
|
//########tunnel-client#########
|
||||||
|
tunnelClient := app.Command("tclient", "proxy on tunnel client mode")
|
||||||
|
tunnelClientArgs.Parent = tunnelClient.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
tunnelClientArgs.CertFile = tunnelClient.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
tunnelClientArgs.KeyFile = tunnelClient.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
tunnelClientArgs.Timeout = tunnelClient.Flag("timeout", "tcp timeout with milliseconds").Short('t').Default("2000").Int()
|
||||||
|
tunnelClientArgs.Key = tunnelClient.Flag("k", "key same with server").Default("default").String()
|
||||||
|
|
||||||
|
//########tunnel-bridge#########
|
||||||
|
tunnelBridge := app.Command("tbridge", "proxy on tunnel bridge mode")
|
||||||
|
tunnelBridgeArgs.CertFile = tunnelBridge.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
tunnelBridgeArgs.KeyFile = tunnelBridge.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
tunnelBridgeArgs.Timeout = tunnelBridge.Flag("timeout", "tcp timeout with milliseconds").Short('t').Default("2000").Int()
|
||||||
|
tunnelBridgeArgs.Local = tunnelBridge.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
|
||||||
|
//########ssh#########
|
||||||
|
socks := app.Command("socks", "proxy on ssh mode")
|
||||||
|
socksArgs.Parent = socks.Flag("parent", "parent ssh address, such as: \"23.32.32.19:22\"").Default("").Short('P').String()
|
||||||
|
socksArgs.ParentType = socks.Flag("parent-type", "parent protocol type <tls|tcp|kcp|ssh>").Default("tcp").Short('T').Enum("tls", "tcp", "kcp", "ssh")
|
||||||
|
socksArgs.LocalType = socks.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tcp").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
socksArgs.Local = socks.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
socksArgs.CertFile = socks.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
socksArgs.CaCertFile = socks.Flag("ca", "ca cert file for tls").Default("").String()
|
||||||
|
socksArgs.KeyFile = socks.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
socksArgs.SSHUser = socks.Flag("ssh-user", "user for ssh").Short('u').Default("").String()
|
||||||
|
socksArgs.SSHKeyFile = socks.Flag("ssh-key", "private key file for ssh").Short('S').Default("").String()
|
||||||
|
socksArgs.SSHKeyFileSalt = socks.Flag("ssh-keysalt", "salt of ssh private key").Short('s').Default("").String()
|
||||||
|
socksArgs.SSHPassword = socks.Flag("ssh-password", "password for ssh").Short('A').Default("").String()
|
||||||
|
socksArgs.Always = socks.Flag("always", "always use parent proxy").Default("false").Bool()
|
||||||
|
socksArgs.Timeout = socks.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Default("5000").Int()
|
||||||
|
socksArgs.Interval = socks.Flag("interval", "check domain if blocked every interval seconds").Default("10").Int()
|
||||||
|
socksArgs.Blocked = socks.Flag("blocked", "blocked domain file , one domain each line").Default("blocked").Short('b').String()
|
||||||
|
socksArgs.Direct = socks.Flag("direct", "direct domain file , one domain each line").Default("direct").Short('d').String()
|
||||||
|
socksArgs.AuthFile = socks.Flag("auth-file", "http basic auth file,\"username:password\" each line in file").Short('F').String()
|
||||||
|
socksArgs.Auth = socks.Flag("auth", "socks auth username and password, mutiple user repeat -a ,such as: -a user1:pass1 -a user2:pass2").Short('a').Strings()
|
||||||
|
socksArgs.LocalIPS = socks.Flag("local-bind-ips", "if your host behind a nat,set your public ip here avoid dead loop").Short('g').Strings()
|
||||||
|
socksArgs.AuthURL = socks.Flag("auth-url", "auth username and password will send to this url,response http code equal to 'auth-code' means ok,others means fail.").Default("").String()
|
||||||
|
socksArgs.AuthURLTimeout = socks.Flag("auth-timeout", "access 'auth-url' timeout milliseconds").Default("3000").Int()
|
||||||
|
socksArgs.AuthURLOkCode = socks.Flag("auth-code", "access 'auth-url' success http code").Default("204").Int()
|
||||||
|
socksArgs.AuthURLRetry = socks.Flag("auth-retry", "access 'auth-url' fail and retry count").Default("0").Int()
|
||||||
|
socksArgs.DNSAddress = socks.Flag("dns-address", "if set this, proxy will use this dns for resolve doamin").Short('q').Default("").String()
|
||||||
|
socksArgs.DNSTTL = socks.Flag("dns-ttl", "caching seconds of dns query result").Short('e').Default("300").Int()
|
||||||
|
socksArgs.LocalKey = socks.Flag("local-key", "the password for auto encrypt/decrypt local connection data").Short('z').Default("").String()
|
||||||
|
socksArgs.ParentKey = socks.Flag("parent-key", "the password for auto encrypt/decrypt parent connection data").Short('Z').Default("").String()
|
||||||
|
socksArgs.LocalCompress = socks.Flag("local-compress", "auto compress/decompress data on local connection").Short('m').Default("false").Bool()
|
||||||
|
socksArgs.ParentCompress = socks.Flag("parent-compress", "auto compress/decompress data on parent connection").Short('M').Default("false").Bool()
|
||||||
|
|
||||||
|
//########socks+http(s)#########
|
||||||
|
sps := app.Command("sps", "proxy on socks+http(s) mode")
|
||||||
|
spsArgs.Parent = sps.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
spsArgs.CertFile = sps.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
spsArgs.KeyFile = sps.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
spsArgs.CaCertFile = sps.Flag("ca", "ca cert file for tls").Default("").String()
|
||||||
|
spsArgs.Timeout = sps.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Short('i').Default("2000").Int()
|
||||||
|
spsArgs.ParentType = sps.Flag("parent-type", "parent protocol type <tls|tcp|kcp>").Short('T').Enum("tls", "tcp", "kcp")
|
||||||
|
spsArgs.LocalType = sps.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tcp").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
spsArgs.Local = sps.Flag("local", "local ip:port to listen,multiple address use comma split,such as: 0.0.0.0:80,0.0.0.0:443").Short('p').Default(":33080").String()
|
||||||
|
spsArgs.ParentServiceType = sps.Flag("parent-service-type", "parent service type <http|socks>").Short('S').Enum("http", "socks")
|
||||||
|
spsArgs.DNSAddress = sps.Flag("dns-address", "if set this, proxy will use this dns for resolve doamin").Short('q').Default("").String()
|
||||||
|
spsArgs.DNSTTL = sps.Flag("dns-ttl", "caching seconds of dns query result").Short('e').Default("300").Int()
|
||||||
|
spsArgs.AuthFile = sps.Flag("auth-file", "http basic auth file,\"username:password\" each line in file").Short('F').String()
|
||||||
|
spsArgs.Auth = sps.Flag("auth", "socks auth username and password, mutiple user repeat -a ,such as: -a user1:pass1 -a user2:pass2").Short('a').Strings()
|
||||||
|
spsArgs.LocalIPS = sps.Flag("local-bind-ips", "if your host behind a nat,set your public ip here avoid dead loop").Short('g').Strings()
|
||||||
|
spsArgs.AuthURL = sps.Flag("auth-url", "auth username and password will send to this url,response http code equal to 'auth-code' means ok,others means fail.").Default("").String()
|
||||||
|
spsArgs.AuthURLTimeout = sps.Flag("auth-timeout", "access 'auth-url' timeout milliseconds").Default("3000").Int()
|
||||||
|
spsArgs.AuthURLOkCode = sps.Flag("auth-code", "access 'auth-url' success http code").Default("204").Int()
|
||||||
|
spsArgs.AuthURLRetry = sps.Flag("auth-retry", "access 'auth-url' fail and retry count").Default("0").Int()
|
||||||
|
spsArgs.ParentAuth = sps.Flag("parent-auth", "parent socks auth username and password, such as: -A user1:pass1").Short('A').String()
|
||||||
|
spsArgs.LocalKey = sps.Flag("local-key", "the password for auto encrypt/decrypt local connection data").Short('z').Default("").String()
|
||||||
|
spsArgs.ParentKey = sps.Flag("parent-key", "the password for auto encrypt/decrypt parent connection data").Short('Z').Default("").String()
|
||||||
|
spsArgs.LocalCompress = sps.Flag("local-compress", "auto compress/decompress data on local connection").Short('m').Default("false").Bool()
|
||||||
|
spsArgs.ParentCompress = sps.Flag("parent-compress", "auto compress/decompress data on parent connection").Short('M').Default("false").Bool()
|
||||||
|
spsArgs.DisableHTTP = sps.Flag("disable-http", "disable http(s) proxy").Default("false").Bool()
|
||||||
|
spsArgs.DisableSocks5 = sps.Flag("disable-socks", "disable socks proxy").Default("false").Bool()
|
||||||
|
|
||||||
|
//########dns#########
|
||||||
|
dns := app.Command("dns", "proxy on dns server mode")
|
||||||
|
dnsArgs.Parent = dns.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
dnsArgs.CertFile = dns.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
dnsArgs.KeyFile = dns.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
dnsArgs.CaCertFile = dns.Flag("ca", "ca cert file for tls").Default("").String()
|
||||||
|
dnsArgs.Timeout = dns.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Short('i').Default("2000").Int()
|
||||||
|
dnsArgs.ParentType = dns.Flag("parent-type", "parent protocol type <tls|tcp|kcp>").Short('T').Enum("tls", "tcp", "kcp")
|
||||||
|
dnsArgs.Local = dns.Flag("local", "local ip:port to listen,multiple address use comma split,such as: 0.0.0.0:80,0.0.0.0:443").Short('p').Default(":53").String()
|
||||||
|
dnsArgs.ParentServiceType = dns.Flag("parent-service-type", "parent service type <http|socks>").Short('S').Enum("http", "socks")
|
||||||
|
dnsArgs.RemoteDNSAddress = dns.Flag("dns-address", "remote dns for resolve doamin").Short('q').Default("8.8.8.8:53").String()
|
||||||
|
dnsArgs.DNSTTL = dns.Flag("dns-ttl", "caching seconds of dns query result").Short('e').Default("300").Int()
|
||||||
|
dnsArgs.ParentAuth = dns.Flag("parent-auth", "parent socks auth username and password, such as: -A user1:pass1").Short('A').String()
|
||||||
|
dnsArgs.ParentKey = dns.Flag("parent-key", "the password for auto encrypt/decrypt parent connection data").Short('Z').Default("").String()
|
||||||
|
dnsArgs.ParentCompress = dns.Flag("parent-compress", "auto compress/decompress data on parent connection").Short('M').Default("false").Bool()
|
||||||
|
dnsArgs.CacheFile = dns.Flag("cache-file", "dns result cached file").Short('f').Default(filepath.Join(path.Dir(os.Args[0]), "cache.dat")).String()
|
||||||
|
dnsArgs.LocalSocks5Port = dns.Flag("socks-port", "local socks5 port").Short('s').Default("65501").String()
|
||||||
|
|
||||||
|
//########keygen#########
|
||||||
|
keygen := app.Command("keygen", "create certificate for proxy")
|
||||||
|
keygenArgs.CommonName = keygen.Flag("cn", "common name").Short('n').Default("").String()
|
||||||
|
keygenArgs.CaName = keygen.Flag("ca", "ca name").Short('C').Default("").String()
|
||||||
|
keygenArgs.CertName = keygen.Flag("cert", "cert name of sign to create").Short('c').Default("").String()
|
||||||
|
keygenArgs.SignDays = keygen.Flag("days", "days of sign").Short('d').Default("365").Int()
|
||||||
|
keygenArgs.Sign = keygen.Flag("sign", "cert is to signin").Short('s').Default("false").Bool()
|
||||||
|
|
||||||
|
//parse args
|
||||||
|
serviceName := kingpin.MustParse(app.Parse(os.Args[1:]))
|
||||||
|
|
||||||
|
isDebug = *debug
|
||||||
|
|
||||||
|
//set kcp config
|
||||||
|
|
||||||
|
switch *kcpArgs.Mode {
|
||||||
|
case "normal":
|
||||||
|
*kcpArgs.NoDelay, *kcpArgs.Interval, *kcpArgs.Resend, *kcpArgs.NoCongestion = 0, 40, 2, 1
|
||||||
|
case "fast":
|
||||||
|
*kcpArgs.NoDelay, *kcpArgs.Interval, *kcpArgs.Resend, *kcpArgs.NoCongestion = 0, 30, 2, 1
|
||||||
|
case "fast2":
|
||||||
|
*kcpArgs.NoDelay, *kcpArgs.Interval, *kcpArgs.Resend, *kcpArgs.NoCongestion = 1, 20, 2, 1
|
||||||
|
case "fast3":
|
||||||
|
*kcpArgs.NoDelay, *kcpArgs.Interval, *kcpArgs.Resend, *kcpArgs.NoCongestion = 1, 10, 2, 1
|
||||||
|
}
|
||||||
|
pass := pbkdf2.Key([]byte(*kcpArgs.Key), []byte("snail007-goproxy"), 4096, 32, sha1.New)
|
||||||
|
|
||||||
|
switch *kcpArgs.Crypt {
|
||||||
|
case "sm4":
|
||||||
|
kcpArgs.Block, _ = kcp.NewSM4BlockCrypt(pass[:16])
|
||||||
|
case "tea":
|
||||||
|
kcpArgs.Block, _ = kcp.NewTEABlockCrypt(pass[:16])
|
||||||
|
case "xor":
|
||||||
|
kcpArgs.Block, _ = kcp.NewSimpleXORBlockCrypt(pass)
|
||||||
|
case "none":
|
||||||
|
kcpArgs.Block, _ = kcp.NewNoneBlockCrypt(pass)
|
||||||
|
case "aes-128":
|
||||||
|
kcpArgs.Block, _ = kcp.NewAESBlockCrypt(pass[:16])
|
||||||
|
case "aes-192":
|
||||||
|
kcpArgs.Block, _ = kcp.NewAESBlockCrypt(pass[:24])
|
||||||
|
case "blowfish":
|
||||||
|
kcpArgs.Block, _ = kcp.NewBlowfishBlockCrypt(pass)
|
||||||
|
case "twofish":
|
||||||
|
kcpArgs.Block, _ = kcp.NewTwofishBlockCrypt(pass)
|
||||||
|
case "cast5":
|
||||||
|
kcpArgs.Block, _ = kcp.NewCast5BlockCrypt(pass[:16])
|
||||||
|
case "3des":
|
||||||
|
kcpArgs.Block, _ = kcp.NewTripleDESBlockCrypt(pass[:24])
|
||||||
|
case "xtea":
|
||||||
|
kcpArgs.Block, _ = kcp.NewXTEABlockCrypt(pass[:16])
|
||||||
|
case "salsa20":
|
||||||
|
kcpArgs.Block, _ = kcp.NewSalsa20BlockCrypt(pass)
|
||||||
|
default:
|
||||||
|
*kcpArgs.Crypt = "aes"
|
||||||
|
kcpArgs.Block, _ = kcp.NewAESBlockCrypt(pass)
|
||||||
|
}
|
||||||
|
//attach kcp config
|
||||||
|
tcpArgs.KCP = kcpArgs
|
||||||
|
httpArgs.KCP = kcpArgs
|
||||||
|
socksArgs.KCP = kcpArgs
|
||||||
|
spsArgs.KCP = kcpArgs
|
||||||
|
muxBridgeArgs.KCP = kcpArgs
|
||||||
|
muxServerArgs.KCP = kcpArgs
|
||||||
|
muxClientArgs.KCP = kcpArgs
|
||||||
|
dnsArgs.KCP = kcpArgs
|
||||||
|
|
||||||
|
log := logger.New(os.Stderr, "", logger.Ldate|logger.Ltime)
|
||||||
|
|
||||||
|
flags := logger.Ldate
|
||||||
|
if *debug {
|
||||||
|
flags |= logger.Lshortfile | logger.Lmicroseconds
|
||||||
|
cpuProfilingFile, _ = os.Create("cpu.prof")
|
||||||
|
memProfilingFile, _ = os.Create("memory.prof")
|
||||||
|
blockProfilingFile, _ = os.Create("block.prof")
|
||||||
|
goroutineProfilingFile, _ = os.Create("goroutine.prof")
|
||||||
|
threadcreateProfilingFile, _ = os.Create("threadcreate.prof")
|
||||||
|
pprof.StartCPUProfile(cpuProfilingFile)
|
||||||
|
} else {
|
||||||
|
flags |= logger.Ltime
|
||||||
|
}
|
||||||
|
log.SetFlags(flags)
|
||||||
|
|
||||||
|
if *logfile != "" {
|
||||||
|
f, e := os.OpenFile(*logfile, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0600)
|
||||||
|
if e != nil {
|
||||||
|
log.Fatal(e)
|
||||||
|
}
|
||||||
|
log.SetOutput(f)
|
||||||
|
}
|
||||||
|
if *daemon {
|
||||||
|
args := []string{}
|
||||||
|
for _, arg := range os.Args[1:] {
|
||||||
|
if arg != "--daemon" {
|
||||||
|
args = append(args, arg)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
cmd = exec.Command(os.Args[0], args...)
|
||||||
|
cmd.Start()
|
||||||
|
f := ""
|
||||||
|
if *forever {
|
||||||
|
f = "forever "
|
||||||
|
}
|
||||||
|
log.Printf("%s%s [PID] %d running...\n", f, os.Args[0], cmd.Process.Pid)
|
||||||
|
os.Exit(0)
|
||||||
|
}
|
||||||
|
if *forever {
|
||||||
|
args := []string{}
|
||||||
|
for _, arg := range os.Args[1:] {
|
||||||
|
if arg != "--forever" {
|
||||||
|
args = append(args, arg)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
if cmd != nil {
|
||||||
|
cmd.Process.Kill()
|
||||||
|
}
|
||||||
|
cmd = exec.Command(os.Args[0], args...)
|
||||||
|
cmdReaderStderr, err := cmd.StderrPipe()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("ERR:%s,restarting...\n", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
cmdReader, err := cmd.StdoutPipe()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("ERR:%s,restarting...\n", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
scanner := bufio.NewScanner(cmdReader)
|
||||||
|
scannerStdErr := bufio.NewScanner(cmdReaderStderr)
|
||||||
|
go func() {
|
||||||
|
for scanner.Scan() {
|
||||||
|
fmt.Println(scanner.Text())
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
for scannerStdErr.Scan() {
|
||||||
|
fmt.Println(scannerStdErr.Text())
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
if err := cmd.Start(); err != nil {
|
||||||
|
log.Printf("ERR:%s,restarting...\n", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
pid := cmd.Process.Pid
|
||||||
|
log.Printf("worker %s [PID] %d running...\n", os.Args[0], pid)
|
||||||
|
if err := cmd.Wait(); err != nil {
|
||||||
|
log.Printf("ERR:%s,restarting...", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
log.Printf("worker %s [PID] %d unexpected exited, restarting...\n", os.Args[0], pid)
|
||||||
|
time.Sleep(time.Second * 5)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *logfile == "" {
|
||||||
|
poster()
|
||||||
|
if *debug {
|
||||||
|
log.Println("[profiling] cpu profiling save to file : cpu.prof")
|
||||||
|
log.Println("[profiling] memory profiling save to file : memory.prof")
|
||||||
|
log.Println("[profiling] block profiling save to file : block.prof")
|
||||||
|
log.Println("[profiling] goroutine profiling save to file : goroutine.prof")
|
||||||
|
log.Println("[profiling] threadcreate profiling save to file : threadcreate.prof")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
//regist services and run service
|
||||||
|
//regist services and run service
|
||||||
|
switch serviceName {
|
||||||
|
case "http":
|
||||||
|
services.Regist(serviceName, httpx.NewHTTP(), httpArgs, log)
|
||||||
|
case "tcp":
|
||||||
|
services.Regist(serviceName, tcpx.NewTCP(), tcpArgs, log)
|
||||||
|
case "udp":
|
||||||
|
services.Regist(serviceName, udpx.NewUDP(), udpArgs, log)
|
||||||
|
case "tserver":
|
||||||
|
services.Regist(serviceName, tunnel.NewTunnelServerManager(), tunnelServerArgs, log)
|
||||||
|
case "tclient":
|
||||||
|
services.Regist(serviceName, tunnel.NewTunnelClient(), tunnelClientArgs, log)
|
||||||
|
case "tbridge":
|
||||||
|
services.Regist(serviceName, tunnel.NewTunnelBridge(), tunnelBridgeArgs, log)
|
||||||
|
case "server":
|
||||||
|
services.Regist(serviceName, mux.NewMuxServerManager(), muxServerArgs, log)
|
||||||
|
case "client":
|
||||||
|
services.Regist(serviceName, mux.NewMuxClient(), muxClientArgs, log)
|
||||||
|
case "bridge":
|
||||||
|
services.Regist(serviceName, mux.NewMuxBridge(), muxBridgeArgs, log)
|
||||||
|
case "socks":
|
||||||
|
services.Regist(serviceName, socksx.NewSocks(), socksArgs, log)
|
||||||
|
case "sps":
|
||||||
|
services.Regist(serviceName, spsx.NewSPS(), spsArgs, log)
|
||||||
|
case "dns":
|
||||||
|
services.Regist(serviceName, sdk.NewDNS(), dnsArgs, log)
|
||||||
|
case "keygen":
|
||||||
|
services.Regist(serviceName, keygenx.NewKeygen(), keygenArgs, log)
|
||||||
|
}
|
||||||
|
|
||||||
|
service, err = services.Run(serviceName, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("run service [%s] fail, ERR:%s", serviceName, err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func poster() {
|
||||||
|
fmt.Printf(`
|
||||||
|
######## ######## ####### ## ## ## ##
|
||||||
|
## ## ## ## ## ## ## ## ## ##
|
||||||
|
## ## ## ## ## ## ## ## ####
|
||||||
|
######## ######## ## ## ### ##
|
||||||
|
## ## ## ## ## ## ## ##
|
||||||
|
## ## ## ## ## ## ## ##
|
||||||
|
## ## ## ####### ## ## ##
|
||||||
|
|
||||||
|
v%s`+" by snail , blog : http://www.host900.com/\n\n", APP_VERSION)
|
||||||
|
}
|
||||||
|
func saveProfiling() {
|
||||||
|
goroutine := pprof.Lookup("goroutine")
|
||||||
|
goroutine.WriteTo(goroutineProfilingFile, 1)
|
||||||
|
heap := pprof.Lookup("heap")
|
||||||
|
heap.WriteTo(memProfilingFile, 1)
|
||||||
|
block := pprof.Lookup("block")
|
||||||
|
block.WriteTo(blockProfilingFile, 1)
|
||||||
|
threadcreate := pprof.Lookup("threadcreate")
|
||||||
|
threadcreate.WriteTo(threadcreateProfilingFile, 1)
|
||||||
|
pprof.StopCPUProfile()
|
||||||
|
}
|
||||||
456
direct
Normal file
@ -0,0 +1,456 @@
|
|||||||
|
07073.com
|
||||||
|
10010.com
|
||||||
|
100ye.com
|
||||||
|
114la.com
|
||||||
|
115.com
|
||||||
|
120ask.com
|
||||||
|
126.com
|
||||||
|
126.net
|
||||||
|
1616.net
|
||||||
|
163.com
|
||||||
|
17173.com
|
||||||
|
1778.com
|
||||||
|
178.com
|
||||||
|
17u.com
|
||||||
|
19lou.com
|
||||||
|
1o26.com
|
||||||
|
1ting.com
|
||||||
|
21cn.com
|
||||||
|
2345.com
|
||||||
|
265.com
|
||||||
|
265g.com
|
||||||
|
28.com
|
||||||
|
28tui.com
|
||||||
|
2hua.com
|
||||||
|
2mdn.net
|
||||||
|
315che.com
|
||||||
|
3366.com
|
||||||
|
360buy.com
|
||||||
|
360buyimg.com
|
||||||
|
360doc.com
|
||||||
|
36kr.com
|
||||||
|
39.net
|
||||||
|
3dmgame.com
|
||||||
|
4399.com
|
||||||
|
4738.com
|
||||||
|
500wan.com
|
||||||
|
51.com
|
||||||
|
51.la
|
||||||
|
5173.com
|
||||||
|
51auto.com
|
||||||
|
51buy.com
|
||||||
|
51cto.com
|
||||||
|
51fanli.com
|
||||||
|
51job.com
|
||||||
|
52kmh.com
|
||||||
|
52pk.net
|
||||||
|
52tlbb.com
|
||||||
|
53kf.com
|
||||||
|
55bbs.com
|
||||||
|
55tuan.com
|
||||||
|
56.com
|
||||||
|
58.com
|
||||||
|
591hx.com
|
||||||
|
5d6d.net
|
||||||
|
61.com
|
||||||
|
70e.com
|
||||||
|
777wyx.com
|
||||||
|
778669.com
|
||||||
|
7c.com
|
||||||
|
7k7k.com
|
||||||
|
88db.com
|
||||||
|
91.com
|
||||||
|
99bill.com
|
||||||
|
a135.net
|
||||||
|
abang.com
|
||||||
|
abchina.com
|
||||||
|
ad1111.com
|
||||||
|
admin5.com
|
||||||
|
adnxs.com
|
||||||
|
adobe.com
|
||||||
|
adroll.com
|
||||||
|
ads8.com
|
||||||
|
adsame.com
|
||||||
|
adsonar.com
|
||||||
|
adtechus.com
|
||||||
|
aibang.com
|
||||||
|
aifang.com
|
||||||
|
aili.com
|
||||||
|
aipai.com
|
||||||
|
aizhan.com
|
||||||
|
ali213.net
|
||||||
|
alibaba.com
|
||||||
|
alicdn.com
|
||||||
|
aliexpress.com
|
||||||
|
alimama.com
|
||||||
|
alipay.com
|
||||||
|
alipayobjects.com
|
||||||
|
alisoft.com
|
||||||
|
alivv.com
|
||||||
|
aliyun.com
|
||||||
|
allyes.com
|
||||||
|
amazon.com
|
||||||
|
anjuke.com
|
||||||
|
anzhi.com
|
||||||
|
aol.com
|
||||||
|
apple.com
|
||||||
|
arpg2.com
|
||||||
|
atdmt.com
|
||||||
|
b2b168.com
|
||||||
|
babytree.com
|
||||||
|
baidu.com
|
||||||
|
baihe.com
|
||||||
|
baixing.com
|
||||||
|
bankcomm.com
|
||||||
|
baomihua.com
|
||||||
|
bdimg.com
|
||||||
|
bdstatic.com
|
||||||
|
bendibao.com
|
||||||
|
betrad.com
|
||||||
|
bilibili.tv
|
||||||
|
bing.com
|
||||||
|
bitauto.com
|
||||||
|
blog.163.com
|
||||||
|
blogchina.com
|
||||||
|
blueidea.com
|
||||||
|
bluekai.com
|
||||||
|
booksky.org
|
||||||
|
caixin.com
|
||||||
|
ccb.com
|
||||||
|
ccidnet.com
|
||||||
|
cctv*.com
|
||||||
|
china.com
|
||||||
|
chinabyte.com
|
||||||
|
chinahr.com
|
||||||
|
chinanews.com
|
||||||
|
chinaw3.com
|
||||||
|
chinaz.com
|
||||||
|
chuangelm.com
|
||||||
|
ci123.com
|
||||||
|
cmbchina.com
|
||||||
|
cnbeta.com
|
||||||
|
cnblogs.com
|
||||||
|
cncn.com
|
||||||
|
cnhubei.com
|
||||||
|
cnki.net
|
||||||
|
cnmo.com
|
||||||
|
cnxad.com
|
||||||
|
cnzz.com
|
||||||
|
cocoren.com
|
||||||
|
compete.com
|
||||||
|
comsenz.com
|
||||||
|
coo8.com
|
||||||
|
cqnews.net
|
||||||
|
crsky.com
|
||||||
|
csdn.net
|
||||||
|
ct10000.com
|
||||||
|
ctrip.com
|
||||||
|
dangdang.com
|
||||||
|
daqi.com
|
||||||
|
dayoo.com
|
||||||
|
dbank.com
|
||||||
|
ddmap.com
|
||||||
|
dedecms.com
|
||||||
|
dh818.com
|
||||||
|
diandian.com
|
||||||
|
dianping.com
|
||||||
|
discuz.net
|
||||||
|
doc88.com
|
||||||
|
docin.com
|
||||||
|
donews.com
|
||||||
|
dospy.com
|
||||||
|
douban.com
|
||||||
|
douban.fm
|
||||||
|
doubleclick.com
|
||||||
|
doubleclick.net
|
||||||
|
duba.net
|
||||||
|
duote.com
|
||||||
|
duowan.com
|
||||||
|
dzwww.com
|
||||||
|
eastday.com
|
||||||
|
eastmoney.com
|
||||||
|
ebay.com
|
||||||
|
elong.com
|
||||||
|
ename.net
|
||||||
|
etao.com
|
||||||
|
exam8.com
|
||||||
|
eye.rs
|
||||||
|
fantong.com
|
||||||
|
fastcdn.com
|
||||||
|
fblife.com
|
||||||
|
fengniao.com
|
||||||
|
fenzhi.com
|
||||||
|
flickr.com
|
||||||
|
fobshanghai.com
|
||||||
|
ftuan.com
|
||||||
|
funshion.com
|
||||||
|
fx120.net
|
||||||
|
game3737.com
|
||||||
|
gamersky.com
|
||||||
|
gamestlbb.com
|
||||||
|
gamesville.com
|
||||||
|
ganji.com
|
||||||
|
gfan.com
|
||||||
|
gongchang.com
|
||||||
|
google-analytics.com
|
||||||
|
gougou.com
|
||||||
|
gtimg.com
|
||||||
|
hao123.com
|
||||||
|
haodf.com
|
||||||
|
harrenmedianetwork.com
|
||||||
|
hc360.com
|
||||||
|
hefei.cc
|
||||||
|
hf365.com
|
||||||
|
hiapk.com
|
||||||
|
hichina.com
|
||||||
|
homeinns.com
|
||||||
|
hotsales.net
|
||||||
|
house365.com
|
||||||
|
huaban.com
|
||||||
|
huanqiu.com
|
||||||
|
hudong.com
|
||||||
|
hupu.com
|
||||||
|
iask.com
|
||||||
|
iciba.com
|
||||||
|
icson.com
|
||||||
|
ifeng.com
|
||||||
|
iloveyouxi.com
|
||||||
|
im286.com
|
||||||
|
imanhua.com
|
||||||
|
img.cctvpic.com
|
||||||
|
imrworldwide.com
|
||||||
|
invitemedia.com
|
||||||
|
ip138.com
|
||||||
|
ipinyou.com
|
||||||
|
iqilu.com
|
||||||
|
iqiyi.com
|
||||||
|
irs01.com
|
||||||
|
irs01.net
|
||||||
|
it168.com
|
||||||
|
iteye.com
|
||||||
|
iyaya.com
|
||||||
|
jb51.net
|
||||||
|
jiathis.com
|
||||||
|
jiayuan.com
|
||||||
|
jing.fm
|
||||||
|
jinti.com
|
||||||
|
jqw.com
|
||||||
|
jumei.com
|
||||||
|
jxedt.com
|
||||||
|
jysq.net
|
||||||
|
kaixin001.com
|
||||||
|
kandian.com
|
||||||
|
kdnet.net
|
||||||
|
kimiss.com
|
||||||
|
ku6.com
|
||||||
|
ku6cdn.com
|
||||||
|
ku6img.com
|
||||||
|
kuaidi100.com
|
||||||
|
kugou.com
|
||||||
|
l99.com
|
||||||
|
lady8844.com
|
||||||
|
lafaso.com
|
||||||
|
lashou.com
|
||||||
|
legolas-media.com
|
||||||
|
lehecai.com
|
||||||
|
leho.com
|
||||||
|
letv.com
|
||||||
|
liebiao.com
|
||||||
|
lietou.com
|
||||||
|
linezing.com
|
||||||
|
linkedin.com
|
||||||
|
live.com
|
||||||
|
longhoo.net
|
||||||
|
lusongsong.com
|
||||||
|
lxdns.com
|
||||||
|
lycos.com
|
||||||
|
lygo.com
|
||||||
|
m18.com
|
||||||
|
m1905.com
|
||||||
|
made-in-china.com
|
||||||
|
makepolo.com
|
||||||
|
mangocity.com
|
||||||
|
manzuo.com
|
||||||
|
mapbar.com
|
||||||
|
mathtag.com
|
||||||
|
mediaplex.com
|
||||||
|
mediav.com
|
||||||
|
meilele.com
|
||||||
|
meilishuo.com
|
||||||
|
meishichina.com
|
||||||
|
meituan.com
|
||||||
|
meizu.com
|
||||||
|
miaozhen.com
|
||||||
|
microsoft.com
|
||||||
|
miercn.com
|
||||||
|
mlt01.com
|
||||||
|
mmcdn.cn
|
||||||
|
mmstat.com
|
||||||
|
mnwan.com
|
||||||
|
mogujie.com
|
||||||
|
mookie1.com
|
||||||
|
moonbasa.com
|
||||||
|
mop.com
|
||||||
|
mosso.com
|
||||||
|
mplife.com
|
||||||
|
msn.com
|
||||||
|
mtime.com
|
||||||
|
mumayi.com
|
||||||
|
mydrivers.com
|
||||||
|
net114.com
|
||||||
|
netease.com
|
||||||
|
newsmth.net
|
||||||
|
nipic.com
|
||||||
|
nowec.com
|
||||||
|
nuomi.com
|
||||||
|
oadz.com
|
||||||
|
oeeee.com
|
||||||
|
onetad.com
|
||||||
|
onlinedown.net
|
||||||
|
onlylady.com
|
||||||
|
oschina.net
|
||||||
|
otwan.com
|
||||||
|
paipai.com
|
||||||
|
paypal.com
|
||||||
|
pchome.net
|
||||||
|
pcpop.com
|
||||||
|
pengyou.com
|
||||||
|
php100.com
|
||||||
|
phpwind.net
|
||||||
|
pingan.com
|
||||||
|
pixlr.com
|
||||||
|
pp.cc
|
||||||
|
ppstream.com
|
||||||
|
pptv.com
|
||||||
|
ptlogin2.qq.com
|
||||||
|
pubmatic.com
|
||||||
|
q150.com
|
||||||
|
qianlong.com
|
||||||
|
qidian.com
|
||||||
|
qingdaonews.com
|
||||||
|
qire123.com
|
||||||
|
qiushibaike.com
|
||||||
|
qiyou.com
|
||||||
|
qjy168.com
|
||||||
|
qq.com
|
||||||
|
qq937.com
|
||||||
|
qstatic.com
|
||||||
|
quantserve.com
|
||||||
|
qunar.com
|
||||||
|
rakuten.co.jp
|
||||||
|
readnovel.com
|
||||||
|
renren.com
|
||||||
|
rtbidder.net
|
||||||
|
scanscout.com
|
||||||
|
scorecardresearch.com
|
||||||
|
sdo.com
|
||||||
|
seowhy.com
|
||||||
|
serving-sys.com
|
||||||
|
sf-express.com
|
||||||
|
shangdu.com
|
||||||
|
si.kz
|
||||||
|
sina.com
|
||||||
|
sinahk.net
|
||||||
|
sinajs.com
|
||||||
|
smzdm.com
|
||||||
|
snyu.com
|
||||||
|
sodu.org
|
||||||
|
sogou.com
|
||||||
|
sohu.com
|
||||||
|
soku.com
|
||||||
|
sootoo.com
|
||||||
|
soso.com
|
||||||
|
soufun.com
|
||||||
|
sourceforge.net
|
||||||
|
staticsdo.com
|
||||||
|
stockstar.com
|
||||||
|
sttlbb.com
|
||||||
|
suning.com
|
||||||
|
szhome.com
|
||||||
|
sznews.com
|
||||||
|
tangdou.com
|
||||||
|
tanx.com
|
||||||
|
tao123.com
|
||||||
|
taobao.com
|
||||||
|
taobaocdn.com
|
||||||
|
tbcdn.cn
|
||||||
|
tdimg.com
|
||||||
|
tenpay.com
|
||||||
|
tgbus.com
|
||||||
|
theplanet.com
|
||||||
|
thethirdmedia.com
|
||||||
|
tiancity.com
|
||||||
|
tianji.com
|
||||||
|
tiao8.info
|
||||||
|
tiexue.net
|
||||||
|
titan24.com
|
||||||
|
tmall.com
|
||||||
|
tom.com
|
||||||
|
toocle.com
|
||||||
|
tremormedia.com
|
||||||
|
tuan800.com
|
||||||
|
tudou.com
|
||||||
|
tudouui.com
|
||||||
|
tui18.com
|
||||||
|
tuniu.com
|
||||||
|
twcczhu.com
|
||||||
|
u17.com
|
||||||
|
ucjoy.com
|
||||||
|
ulink.cc
|
||||||
|
uniontoufang.com
|
||||||
|
up2c.com
|
||||||
|
uuu9.com
|
||||||
|
uuzu.com
|
||||||
|
vancl.com
|
||||||
|
verycd.com
|
||||||
|
vipshop.com
|
||||||
|
vizu.com
|
||||||
|
vjia.com
|
||||||
|
weibo.com
|
||||||
|
weiphone.com
|
||||||
|
west263.com
|
||||||
|
whlongda.com
|
||||||
|
wrating.com
|
||||||
|
wumii.com
|
||||||
|
xiami.com
|
||||||
|
xiaomi.com
|
||||||
|
xiazaiba.com
|
||||||
|
xici.net
|
||||||
|
xinhuanet.com
|
||||||
|
xinnet.com
|
||||||
|
xitek.com
|
||||||
|
xiu.com
|
||||||
|
xunlei.com
|
||||||
|
xyxy.net
|
||||||
|
yahoo.co.jp
|
||||||
|
yahoo.com
|
||||||
|
yaolan.com
|
||||||
|
yesky.com
|
||||||
|
yieldmanager.com
|
||||||
|
yihaodian.com
|
||||||
|
yingjiesheng.com
|
||||||
|
yinyuetai.com
|
||||||
|
yiqifa.com
|
||||||
|
ykimg.com
|
||||||
|
ynet.com
|
||||||
|
yoka.com
|
||||||
|
yolk7.com
|
||||||
|
youboy.com
|
||||||
|
youdao.com
|
||||||
|
yougou.com
|
||||||
|
youku.com
|
||||||
|
youshang.com
|
||||||
|
yupoo.com
|
||||||
|
yxlady.com
|
||||||
|
yyets.com
|
||||||
|
zhaodao123.com
|
||||||
|
zhaopin.com
|
||||||
|
zhenai.com
|
||||||
|
zhibo8.cc
|
||||||
|
zhihu.com
|
||||||
|
zhubajie.com
|
||||||
|
zongheng.com
|
||||||
|
zoosnet.net
|
||||||
|
zqgame.com
|
||||||
|
ztgame.com
|
||||||
|
zx915.com
|
||||||
@ -1,40 +0,0 @@
|
|||||||
这里以vps centos 64位为例子
|
|
||||||
Linux 部分
|
|
||||||
1.Putty工具(或其他工具)
|
|
||||||
root登入
|
|
||||||
2.下载批量命令文件install_auto.sh(64位的话直接执行这个命令即可)
|
|
||||||
#curl -L https://raw.githubusercontent.com/snail007/goproxy/master/install_auto.sh | bash
|
|
||||||
注意
|
|
||||||
这里的install_auto.sh 源码可以下载修改proxy版本,保存后执行.
|
|
||||||
<img src="https://github.com/snail007/goproxy/blob/master/docs/images/image001.png?raw=true"/>
|
|
||||||
3.修改/etc/proxy/proxy.toml配置文件
|
|
||||||
<img src="https://github.com/snail007/goproxy/blob/master/docs/images/image002.png?raw=true"/>
|
|
||||||
<img src="https://github.com/snail007/goproxy/blob/master/docs/images/image003.png?raw=true"/>
|
|
||||||
<img src="https://github.com/snail007/goproxy/blob/master/docs/images/image004.png?raw=true"/>
|
|
||||||
#/usr/bin/proxyd status
|
|
||||||
如果未运行那么执行调试命令:/usr/bin/proxy
|
|
||||||
如果一切正常,可以使用proxyd命令管理proxy,执行 proxyd 可以查看用法.
|
|
||||||
后台启动proxy: proxyd start
|
|
||||||
4.下载证书加密文件/etc/proxy/proxy.crt和/etc/proxy/proxy.key到windows
|
|
||||||
Windows部分
|
|
||||||
5.https://github.com/snail007/goproxy/releases 下载对应windows版本
|
|
||||||
<img src="https://github.com/snail007/goproxy/blob/master/docs/images/image005.jpg?raw=true"/>
|
|
||||||
<img src="https://github.com/snail007/goproxy/blob/master/docs/images/image006.png?raw=true"/>
|
|
||||||
我的是d:盘
|
|
||||||
6.修改windows下的proxy.toml vps服务ip和上面设置的端口哦
|
|
||||||
<img src="https://github.com/snail007/goproxy/blob/master/docs/images/image007.png?raw=true"/>
|
|
||||||
然后运行proxy.exe即可.
|
|
||||||
这时候浏览器代理服务器就是127.0.0.1:9501啦,完毕!
|
|
||||||
|
|
||||||
要隐藏windows命令用工具下载RunHiddenConsole.exe 写个bat文件都放proxy目录下就行
|
|
||||||
Start.bat
|
|
||||||
|
|
||||||
@echo off
|
|
||||||
echo Starting
|
|
||||||
RunHiddenConsole D:/proxy/proxy.exe
|
|
||||||
|
|
||||||
Stop.bat
|
|
||||||
@echo off
|
|
||||||
echo Stopping
|
|
||||||
taskkill /F /IM proxy.exe > nul
|
|
||||||
exit
|
|
||||||
BIN
docs/images/1.1.jpg
Normal file
|
After Width: | Height: | Size: 94 KiB |
BIN
docs/images/2.1.png
Normal file
|
After Width: | Height: | Size: 26 KiB |
BIN
docs/images/2.2.png
Normal file
|
After Width: | Height: | Size: 32 KiB |
BIN
docs/images/5.2.png
Normal file
|
After Width: | Height: | Size: 12 KiB |
BIN
docs/images/alipay.jpg
Normal file
|
After Width: | Height: | Size: 39 KiB |
BIN
docs/images/fxdl.png
Normal file
|
After Width: | Height: | Size: 34 KiB |
BIN
docs/images/http-1.png
Normal file
|
After Width: | Height: | Size: 18 KiB |
BIN
docs/images/http-2.png
Normal file
|
After Width: | Height: | Size: 22 KiB |
BIN
docs/images/http-kcp.png
Normal file
|
After Width: | Height: | Size: 25 KiB |
BIN
docs/images/http-ssh-1.png
Normal file
|
After Width: | Height: | Size: 29 KiB |
BIN
docs/images/http-tls-2.png
Normal file
|
After Width: | Height: | Size: 25 KiB |
BIN
docs/images/http-tls-3.png
Normal file
|
After Width: | Height: | Size: 30 KiB |
|
Before Width: | Height: | Size: 2.3 KiB |
|
Before Width: | Height: | Size: 3.7 KiB |
|
Before Width: | Height: | Size: 2.3 KiB |
|
Before Width: | Height: | Size: 2.7 KiB |
|
Before Width: | Height: | Size: 2.7 KiB |
|
Before Width: | Height: | Size: 13 KiB |
|
Before Width: | Height: | Size: 11 KiB |
BIN
docs/images/logo.jpg
Normal file
|
After Width: | Height: | Size: 119 KiB |
BIN
docs/images/socks-2.png
Normal file
|
After Width: | Height: | Size: 18 KiB |
BIN
docs/images/socks-ssh.png
Normal file
|
After Width: | Height: | Size: 24 KiB |
BIN
docs/images/socks-tls-2.png
Normal file
|
After Width: | Height: | Size: 19 KiB |
BIN
docs/images/socks-tls-3.png
Normal file
|
After Width: | Height: | Size: 25 KiB |
BIN
docs/images/sps-tls.png
Normal file
|
After Width: | Height: | Size: 24 KiB |
BIN
docs/images/tcp-1.png
Normal file
|
After Width: | Height: | Size: 14 KiB |
BIN
docs/images/tcp-2.png
Normal file
|
After Width: | Height: | Size: 17 KiB |
BIN
docs/images/tcp-3.png
Normal file
|
After Width: | Height: | Size: 22 KiB |
BIN
docs/images/tcp-tls-2.png
Normal file
|
After Width: | Height: | Size: 19 KiB |
BIN
docs/images/tcp-tls-3.png
Normal file
|
After Width: | Height: | Size: 25 KiB |
BIN
docs/images/udp-1.png
Normal file
|
After Width: | Height: | Size: 13 KiB |
BIN
docs/images/udp-2.png
Normal file
|
After Width: | Height: | Size: 20 KiB |
BIN
docs/images/udp-3.png
Normal file
|
After Width: | Height: | Size: 23 KiB |
BIN
docs/images/udp-tls-2.png
Normal file
|
After Width: | Height: | Size: 22 KiB |
BIN
docs/images/udp-tls-3.png
Normal file
|
After Width: | Height: | Size: 26 KiB |
BIN
docs/images/wxpay.jpg
Normal file
|
After Width: | Height: | Size: 24 KiB |
23
docs/old-release.md
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
# Old Versions of Proxy
|
||||||
|
|
||||||
|
- [v5.1手册](https://github.com/snail007/goproxy/tree/v5.1)
|
||||||
|
- [v5.0手册](https://github.com/snail007/goproxy/tree/v5.0)
|
||||||
|
- [v4.9手册](https://github.com/snail007/goproxy/tree/v4.9)
|
||||||
|
- [v4.8手册](https://github.com/snail007/goproxy/tree/v4.8)
|
||||||
|
- [v4.7手册](https://github.com/snail007/goproxy/tree/v4.7)
|
||||||
|
- [v4.6手册](https://github.com/snail007/goproxy/tree/v4.6)
|
||||||
|
- [v4.5手册](https://github.com/snail007/goproxy/tree/v4.5)
|
||||||
|
- [v4.4手册](https://github.com/snail007/goproxy/tree/v4.4)
|
||||||
|
- [v4.3手册](https://github.com/snail007/goproxy/tree/v4.3)
|
||||||
|
- [v4.2手册](https://github.com/snail007/goproxy/tree/v4.2)
|
||||||
|
- [v4.0-v4.1手册](https://github.com/snail007/goproxy/tree/v4.1)
|
||||||
|
- [v3.9手册](https://github.com/snail007/goproxy/tree/v3.9)
|
||||||
|
- [v3.8手册](https://github.com/snail007/goproxy/tree/v3.8)
|
||||||
|
- [v3.6-v3.7手册](https://github.com/snail007/goproxy/tree/v3.6)
|
||||||
|
- [v3.5手册](https://github.com/snail007/goproxy/tree/v3.5)
|
||||||
|
- [v3.4手册](https://github.com/snail007/goproxy/tree/v3.4)
|
||||||
|
- [v3.3手册](https://github.com/snail007/goproxy/tree/v3.3)
|
||||||
|
- [v3.2手册](https://github.com/snail007/goproxy/tree/v3.2)
|
||||||
|
- [v3.1手册](https://github.com/snail007/goproxy/tree/v3.1)
|
||||||
|
- [v3.0手册](https://github.com/snail007/goproxy/tree/v3.0)
|
||||||
|
- [v2.x手册](https://github.com/snail007/goproxy/tree/v2.2)
|
||||||
27
gui/README.md
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
# Proxy-GUI
|
||||||
|
基于proxy的各平台SDK,作者和众多热心人士开发了各平台的GUI版本的proxy,下面分平台介绍.
|
||||||
|
|
||||||
|
## Windows
|
||||||
|
|
||||||
|
- 官方java版本,项目主页:[goproxy-jui](https://github.com/snail007/goproxy-jui)
|
||||||
|
|
||||||
|
## Linux
|
||||||
|
|
||||||
|
- 官方java版本,项目主页:[goproxy-jui](https://github.com/snail007/goproxy-jui)
|
||||||
|
|
||||||
|
## MacOS
|
||||||
|
|
||||||
|
- Coming Soon ...
|
||||||
|
|
||||||
|
## Android
|
||||||
|
|
||||||
|
- proxy-go,一个非官方实现版本,界面比较简陋,但是够用.下载地址:[proxy-go](https://github.com/snail007/goproxy-gui-stuff/releases/tag/proxy-go-release)
|
||||||
|
|
||||||
|
|
||||||
|
## IOS
|
||||||
|
|
||||||
|
- Coming Soon ...
|
||||||
|
|
||||||
|
## 跨平台
|
||||||
|
|
||||||
|
- proxy-web,一个跨平台的web UI版本,项目主页:[proxy-web](https://github.com/yincongcyincong/proxy-web)
|
||||||
19
install.sh
@ -1,25 +1,14 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -e
|
set -e
|
||||||
if [ -e /tmp/proxy ]; then
|
|
||||||
rm -rf /tmp/proxy
|
|
||||||
fi
|
|
||||||
mkdir /tmp/proxy
|
|
||||||
cd /tmp/proxy
|
|
||||||
# install monexec
|
|
||||||
tar zxvf monexec_0.1.1_linux_amd64.tar.gz
|
|
||||||
cd monexec_0.1.1_linux_amd64
|
|
||||||
cp monexec /usr/bin/
|
|
||||||
chmod +x /usr/bin/monexec
|
|
||||||
cd ..
|
|
||||||
# #install proxy
|
# #install proxy
|
||||||
tar zxvf proxy-linux-amd64.tar.gz
|
tar zxvf proxy-linux-amd64.tar.gz
|
||||||
cp proxy /usr/bin/
|
cp proxy /usr/bin/
|
||||||
cp proxyd /usr/bin/
|
|
||||||
chmod +x /usr/bin/proxy
|
chmod +x /usr/bin/proxy
|
||||||
chmod +x /usr/bin/proxyd
|
|
||||||
if [ ! -e /etc/proxy ]; then
|
if [ ! -e /etc/proxy ]; then
|
||||||
mkdir /etc/proxy
|
mkdir /etc/proxy
|
||||||
cp proxy.toml /etc/proxy/
|
cp blocked /etc/proxy
|
||||||
|
cp direct /etc/proxy
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ ! -e /etc/proxy/proxy.crt ]; then
|
if [ ! -e /etc/proxy/proxy.crt ]; then
|
||||||
@ -28,4 +17,4 @@ if [ ! -e /etc/proxy/proxy.crt ]; then
|
|||||||
fi
|
fi
|
||||||
rm -rf /tmp/proxy
|
rm -rf /tmp/proxy
|
||||||
echo "install done"
|
echo "install done"
|
||||||
proxyd
|
proxy help
|
||||||
|
|||||||
@ -5,30 +5,22 @@ if [ -e /tmp/proxy ]; then
|
|||||||
fi
|
fi
|
||||||
mkdir /tmp/proxy
|
mkdir /tmp/proxy
|
||||||
cd /tmp/proxy
|
cd /tmp/proxy
|
||||||
wget https://github.com/reddec/monexec/releases/download/v0.1.1/monexec_0.1.1_linux_amd64.tar.gz
|
wget https://github.com/snail007/goproxy/releases/download/v5.2/proxy-linux-amd64.tar.gz
|
||||||
wget https://github.com/snail007/goproxy/releases/download/v2.1/proxy-linux-amd64.tar.gz
|
|
||||||
|
|
||||||
# install monexec
|
|
||||||
tar zxvf monexec_0.1.1_linux_amd64.tar.gz
|
|
||||||
cd monexec_0.1.1_linux_amd64
|
|
||||||
cp monexec /usr/bin/
|
|
||||||
chmod +x /usr/bin/monexec
|
|
||||||
cd ..
|
|
||||||
# #install proxy
|
# #install proxy
|
||||||
tar zxvf proxy-linux-amd64.tar.gz
|
tar zxvf proxy-linux-amd64.tar.gz
|
||||||
cp proxy /usr/bin/
|
cp proxy /usr/bin/
|
||||||
cp proxyd /usr/bin/
|
|
||||||
chmod +x /usr/bin/proxy
|
chmod +x /usr/bin/proxy
|
||||||
chmod +x /usr/bin/proxyd
|
|
||||||
if [ ! -e /etc/proxy ]; then
|
if [ ! -e /etc/proxy ]; then
|
||||||
mkdir /etc/proxy
|
mkdir /etc/proxy
|
||||||
cp proxy.toml /etc/proxy/
|
cp blocked /etc/proxy
|
||||||
|
cp direct /etc/proxy
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ ! -e /etc/proxy/proxy.crt ]; then
|
if [ ! -e /etc/proxy/proxy.crt ]; then
|
||||||
cd /etc/proxy/
|
cd /etc/proxy/
|
||||||
proxy keygen >/dev/null 2>&1
|
proxy keygen -C proxy >/dev/null 2>&1
|
||||||
fi
|
fi
|
||||||
rm -rf /tmp/proxy
|
rm -rf /tmp/proxy
|
||||||
echo "install done"
|
echo "install done"
|
||||||
proxyd
|
proxy help
|
||||||
|
|||||||
3
keygen.sh
Executable file
@ -0,0 +1,3 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
openssl genrsa -out proxy.key 2048
|
||||||
|
openssl req -new -key proxy.key -x509 -days 3650 -out proxy.crt -subj /C=CN/ST=BJ/O="Localhost Ltd"/CN=proxy
|
||||||
51
main.go
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"os/signal"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
)
|
||||||
|
|
||||||
|
const APP_VERSION = "5.2"
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
err := initConfig()
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("err : %s", err)
|
||||||
|
}
|
||||||
|
if service != nil && service.S != nil {
|
||||||
|
Clean(&service.S)
|
||||||
|
} else {
|
||||||
|
Clean(nil)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func Clean(s *services.Service) {
|
||||||
|
signalChan := make(chan os.Signal, 1)
|
||||||
|
cleanupDone := make(chan bool)
|
||||||
|
signal.Notify(signalChan,
|
||||||
|
os.Interrupt,
|
||||||
|
syscall.SIGHUP,
|
||||||
|
syscall.SIGINT,
|
||||||
|
syscall.SIGTERM,
|
||||||
|
syscall.SIGQUIT)
|
||||||
|
go func() {
|
||||||
|
for _ = range signalChan {
|
||||||
|
log.Println("Received an interrupt, stopping services...")
|
||||||
|
if s != nil && *s != nil {
|
||||||
|
(*s).Clean()
|
||||||
|
}
|
||||||
|
if cmd != nil {
|
||||||
|
log.Printf("clean process %d", cmd.Process.Pid)
|
||||||
|
cmd.Process.Kill()
|
||||||
|
}
|
||||||
|
if isDebug {
|
||||||
|
saveProfiling()
|
||||||
|
}
|
||||||
|
cleanupDone <- true
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
<-cleanupDone
|
||||||
|
}
|
||||||
74
release.sh
Executable file
@ -0,0 +1,74 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
VER="5.2"
|
||||||
|
RELEASE="release-${VER}"
|
||||||
|
rm -rf .cert
|
||||||
|
mkdir .cert
|
||||||
|
go build -o proxy
|
||||||
|
cd .cert
|
||||||
|
../proxy keygen -C proxy
|
||||||
|
cd ..
|
||||||
|
rm -rf ${RELEASE}
|
||||||
|
mkdir ${RELEASE}
|
||||||
|
#linux
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=386 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-386.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-amd64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm GOARM=6 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-arm-v6.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm64 GOARM=6 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-arm64-v6.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm GOARM=7 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-arm-v7.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm64 GOARM=7 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-arm64-v7.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm GOARM=5 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-arm-v5.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=arm64 GOARM=5 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-arm64-v5.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=mips go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-mips.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=mips64 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-mips64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=mips64le go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-mips64le.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=mipsle go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-mipsle.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=ppc64 go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-ppc64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=ppc64le go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-ppc64le.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=linux GOARCH=s390x go build -o proxy && tar zcfv "${RELEASE}/proxy-linux-s390x.tar.gz" proxy direct blocked
|
||||||
|
#android
|
||||||
|
CGO_ENABLED=0 GOOS=android GOARCH=386 go build -o proxy && tar zcfv "${RELEASE}/proxy-android-386.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=android GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-android-amd64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=android GOARCH=arm go build -o proxy && tar zcfv "${RELEASE}/proxy-android-arm.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=android GOARCH=arm64 go build -o proxy && tar zcfv "${RELEASE}/proxy-android-arm64.tar.gz" proxy direct blocked
|
||||||
|
#darwin
|
||||||
|
CGO_ENABLED=0 GOOS=darwin GOARCH=386 go build -o proxy && tar zcfv "${RELEASE}/proxy-darwin-386.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=darwin GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-darwin-amd64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=darwin GOARCH=arm go build -o proxy && tar zcfv "${RELEASE}/proxy-darwin-arm.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=darwin GOARCH=arm64 go build -o proxy && tar zcfv "${RELEASE}/proxy-darwin-arm64.tar.gz" proxy direct blocked
|
||||||
|
#dragonfly
|
||||||
|
CGO_ENABLED=0 GOOS=dragonfly GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-dragonfly-amd64.tar.gz" proxy direct blocked
|
||||||
|
#freebsd
|
||||||
|
CGO_ENABLED=0 GOOS=freebsd GOARCH=386 go build -o proxy && tar zcfv "${RELEASE}/proxy-freebsd-386.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=freebsd GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-freebsd-amd64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=freebsd GOARCH=arm go build -o proxy && tar zcfv "${RELEASE}/proxy-freebsd-arm.tar.gz" proxy direct blocked
|
||||||
|
#nacl
|
||||||
|
CGO_ENABLED=0 GOOS=nacl GOARCH=386 go build -o proxy && tar zcfv "${RELEASE}/proxy-nacl-386.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=nacl GOARCH=amd64p32 go build -o proxy && tar zcfv "${RELEASE}/proxy-nacl-amd64p32.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=nacl GOARCH=arm go build -o proxy && tar zcfv "${RELEASE}/proxy-nacl-arm.tar.gz" proxy direct blocked
|
||||||
|
#netbsd
|
||||||
|
CGO_ENABLED=0 GOOS=netbsd GOARCH=386 go build -o proxy && tar zcfv "${RELEASE}/proxy-netbsd-386.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=netbsd GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-netbsd-amd64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=netbsd GOARCH=arm go build -o proxy && tar zcfv "${RELEASE}/proxy-netbsd-arm.tar.gz" proxy direct blocked
|
||||||
|
#openbsd
|
||||||
|
CGO_ENABLED=0 GOOS=openbsd GOARCH=386 go build -o proxy && tar zcfv "${RELEASE}/proxy-openbsd-386.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=openbsd GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-openbsd-amd64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=openbsd GOARCH=arm go build -o proxy && tar zcfv "${RELEASE}/proxy-openbsd-arm.tar.gz" proxy direct blocked
|
||||||
|
#plan9
|
||||||
|
CGO_ENABLED=0 GOOS=plan9 GOARCH=386 go build -o proxy && tar zcfv "${RELEASE}/proxy-plan9-386.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=plan9 GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-plan9-amd64.tar.gz" proxy direct blocked
|
||||||
|
CGO_ENABLED=0 GOOS=plan9 GOARCH=arm go build -o proxy && tar zcfv "${RELEASE}/proxy-plan9-arm.tar.gz" proxy direct blocked
|
||||||
|
#solaris
|
||||||
|
CGO_ENABLED=0 GOOS=solaris GOARCH=amd64 go build -o proxy && tar zcfv "${RELEASE}/proxy-solaris-amd64.tar.gz" proxy direct blocked
|
||||||
|
#windows
|
||||||
|
CGO_ENABLED=0 GOOS=windows GOARCH=386 go build -ldflags="-H=windowsgui" -o proxy-wingui.exe
|
||||||
|
CGO_ENABLED=0 GOOS=windows GOARCH=386 go build -o proxy.exe && tar zcfv "${RELEASE}/proxy-windows-386.tar.gz" proxy.exe proxy-wingui.exe direct blocked .cert/proxy.crt .cert/proxy.key
|
||||||
|
CGO_ENABLED=0 GOOS=windows GOARCH=amd64 go build -ldflags="-H=windowsgui" -o proxy-wingui.exe
|
||||||
|
CGO_ENABLED=0 GOOS=windows GOARCH=amd64 go build -o proxy.exe && tar zcfv "${RELEASE}/proxy-windows-amd64.tar.gz" proxy.exe proxy-wingui.exe direct blocked .cert/proxy.crt .cert/proxy.key
|
||||||
|
|
||||||
|
rm -rf proxy proxy.exe proxy-wingui.exe .cert
|
||||||
|
|
||||||
|
#todo
|
||||||
|
#1.release.sh VER="xxx"
|
||||||
|
#2.main.go APP_VERSION="xxx"
|
||||||
|
#3.install_auto.sh goproxy/releases/download/vxxx
|
||||||
|
#4.README goproxy/releases/download/vxxx
|
||||||
10
sdk/CHANGELOG
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
SDK更新日志
|
||||||
|
|
||||||
|
v4.9
|
||||||
|
1.修复了HTTP Basic代理返回不合适的头部,导致浏览器不会弹框,个别代理插件无法认证的问题.
|
||||||
|
2.内网穿透切换smux到yamux.
|
||||||
|
3.优化了HTTP(S)\SOCKS5代理--always的处理逻辑.
|
||||||
|
|
||||||
|
v4.8
|
||||||
|
1.修复了多个服务同时开启日志,只会输出到最后一个日志文件的bug.
|
||||||
|
2.增加了获取sdk版本的Version()方法.
|
||||||
259
sdk/README.md
Normal file
@ -0,0 +1,259 @@
|
|||||||
|
|
||||||
|
# Proxy SDK 使用说明
|
||||||
|
|
||||||
|
支持以下平台:
|
||||||
|
- Android,`.arr`库
|
||||||
|
- IOS,`.framework`库
|
||||||
|
- Windows,`.dll`库
|
||||||
|
- Linux,`.so`库
|
||||||
|
- MacOS,`.dylib`库
|
||||||
|
|
||||||
|
proxy使用gombile实现了一份go代码编译为android和ios平台下面可以直接调用的sdk类库,
|
||||||
|
另外还为linux和windows,MacOS提供sdk支持,基于这些类库,APP开发者可以轻松的开发出各种形式的代理工具。
|
||||||
|
|
||||||
|
# 下面分平台介绍SDK的用法
|
||||||
|
|
||||||
|
## Android SDK
|
||||||
|
|
||||||
|
[](https://github.com/snail007/goproxy-sdk-android/) []() [](https://github.com/snail007/goproxy-sdk-android/releases) [](https://github.com/snail007/goproxy-sdk-android/releases)
|
||||||
|
|
||||||
|
[点击下载Android-SDK](https://github.com/snail007/goproxy-sdk-android/releases)
|
||||||
|
在Android系统提供的sdk形式是一个后缀为.aar的类库文件,开发的时候只需要把arr类库文件引入android项目即可.
|
||||||
|
|
||||||
|
### Android-SDK使用实例
|
||||||
|
|
||||||
|
#### 1.导入包
|
||||||
|
|
||||||
|
```java
|
||||||
|
import snail007.proxy.Porxy
|
||||||
|
```
|
||||||
|
|
||||||
|
#### 2.启动一个服务
|
||||||
|
|
||||||
|
```java
|
||||||
|
String serviceID="http01";//这里serviceID是自定义的唯一标识字符串,保证每个启动的服务不一样即可
|
||||||
|
String serviceArgs="http -p :8080";
|
||||||
|
String err=Proxy.start(serviceID,serviceArgs);
|
||||||
|
if (!err.isEmpty()){
|
||||||
|
//启动失败
|
||||||
|
System.out.println("start fail,error:"+err);
|
||||||
|
}else{
|
||||||
|
//启动成功
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
#### 3.停止一个服务
|
||||||
|
|
||||||
|
```java
|
||||||
|
String serviceID="http01";
|
||||||
|
Proxy.stop(serviceID);
|
||||||
|
//停止完毕
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
## IOS SDK
|
||||||
|
|
||||||
|
[](https://github.com/snail007/goproxy-sdk-ios/) []() [](https://github.com/snail007/goproxy-sdk-ios/releases) [](https://github.com/snail007/goproxy-sdk-ios/releases)
|
||||||
|
|
||||||
|
[点击下载IOS-SDK](https://github.com/snail007/goproxy-sdk-ios/releases)
|
||||||
|
在IOS系统提供的sdk形式是一个后缀为.framework的类库文件夹,开发的时候只需要把类库文件引入项目,然后调用方法即可.
|
||||||
|
|
||||||
|
### IOS-SDK使用实例
|
||||||
|
|
||||||
|
#### 导入包
|
||||||
|
|
||||||
|
```objc
|
||||||
|
#import <Proxy/Proxy.objc.h>
|
||||||
|
```
|
||||||
|
|
||||||
|
#### 2.启动一个服务
|
||||||
|
|
||||||
|
```objc
|
||||||
|
-(IBAction)doStart:(id)sender
|
||||||
|
{
|
||||||
|
//这里serviceID是自定义的唯一标识字符串,保证每个启动的服务不一样
|
||||||
|
NSString *serviceID = @"http01";
|
||||||
|
NSString *serviceArgs = @"http -p :8080";
|
||||||
|
NSString *error = ProxyStart(serviceID,serviceArgs);
|
||||||
|
|
||||||
|
if (error != nil && error.length > 0)
|
||||||
|
{
|
||||||
|
NSLog(@"start error %@",error);
|
||||||
|
}else{
|
||||||
|
NSLog(@"启动成功");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
#### 3.停止一个服务
|
||||||
|
|
||||||
|
```objc
|
||||||
|
-(IBAction)doStop:(id)sender
|
||||||
|
{
|
||||||
|
NSString *serviceID = @"http01";
|
||||||
|
ProxyStop(serviceID);
|
||||||
|
//停止完毕
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
## Windows SDK
|
||||||
|
[](https://github.com/snail007/goproxy-sdk-windows/) []() [](https://github.com/snail007/goproxy-sdk-windows/releases) [](https://github.com/snail007/goproxy-sdk-windows/releases)
|
||||||
|
|
||||||
|
[点击下载Windows-SDK](https://github.com/snail007/goproxy-sdk-windows/releases)
|
||||||
|
在Windows系统提供的sdk形式是一个后缀为.dll的类库文件,开发的时候只需要把dll类库文件加载,然后调用方法即可.
|
||||||
|
|
||||||
|
### Windows-SDK使用实例
|
||||||
|
C++示例,不需要包含头文件,只需要加载proxy-sdk.dll即可,ieshims.dll需要和proxy-sdk.dll在一起。
|
||||||
|
作者:[yjbdsky](https://github.com/yjbdsky)
|
||||||
|
|
||||||
|
```cpp
|
||||||
|
#include <stdio.h>
|
||||||
|
#include<stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include<pthread.h>
|
||||||
|
#include<Windows.h>
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
extern "C" {
|
||||||
|
#endif
|
||||||
|
|
||||||
|
typedef char *(*GOSTART)(char *s);
|
||||||
|
typedef char *(*GOSTOP)(char *s);
|
||||||
|
typedef int(*GOISRUN)(char *s);
|
||||||
|
HMODULE GODLL = LoadLibrary("proxy-sdk.dll");
|
||||||
|
|
||||||
|
char * Start(char * p0,char * p1)
|
||||||
|
{
|
||||||
|
if (GODLL != NULL)
|
||||||
|
{
|
||||||
|
GOSTART gostart = *(GOSTART)(GetProcAddress(GODLL, "Start"));
|
||||||
|
if (gostart != NULL){
|
||||||
|
printf("%s:%s\n",p0, p1);
|
||||||
|
char *ret = gostart(p0,p1);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return "Cannot Find dll";
|
||||||
|
}
|
||||||
|
char * Stop(char * p)
|
||||||
|
{
|
||||||
|
if (GODLL != NULL)
|
||||||
|
{
|
||||||
|
GOSTOP gostop = *(GOSTOP)(GetProcAddress(GODLL, "Stop"));
|
||||||
|
if (gostop != NULL){
|
||||||
|
printf("%s\n", p);
|
||||||
|
char *ret = gostop(p);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return "Cannot Find dll";
|
||||||
|
}
|
||||||
|
|
||||||
|
int main()
|
||||||
|
{
|
||||||
|
//这里p0是自定义的唯一标识字符串,保证每个启动的服务不一样
|
||||||
|
char *p0 = "http01";
|
||||||
|
char *p1 = "http -t tcp -p :38080";
|
||||||
|
printf("This is demo application.\n");
|
||||||
|
//启动服务,返回空字符串说明启动成功;返回非空字符串说明启动失败,返回的字符串是错误原因
|
||||||
|
printf("start result %s\n", Start(p0,p1));
|
||||||
|
//停止服务,没有返回值
|
||||||
|
Stop(p0);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
```
|
||||||
|
|
||||||
|
C++示例2,请移步:[GoProxyForC](https://github.com/SuperPowerLF2/GoProxyForC)
|
||||||
|
|
||||||
|
## Linux SDK
|
||||||
|
[](https://github.com/snail007/goproxy-sdk-linux/) []() [](https://github.com/snail007/goproxy-sdk-linux/releases) [](https://github.com/snail007/goproxy-sdk-linux/releases)
|
||||||
|
|
||||||
|
[点击下载Linux-SDK](https://github.com/snail007/goproxy-sdk-linux/releases)
|
||||||
|
在Linux系统提供的sdk形式是一个后缀为.so的类库文件,开发的时候只需要把so类库加载,调用方法即可.
|
||||||
|
|
||||||
|
### Linux-SDK使用实例
|
||||||
|
Linux下面使用的sdk是so文件即libproxy-sdk.so,下面写一个简单的C程序示例,调用so库里面的方法.
|
||||||
|
|
||||||
|
`vi test-proxy.c`
|
||||||
|
|
||||||
|
```c
|
||||||
|
#include <stdio.h>
|
||||||
|
#include "libproxy-sdk.h"
|
||||||
|
|
||||||
|
int main() {
|
||||||
|
printf("This is demo application.\n");
|
||||||
|
//这里p0是自定义的唯一标识字符串,保证每个启动的服务不一样
|
||||||
|
char *p0 = "http01";
|
||||||
|
char *p1 = "http -t tcp -p :38080";
|
||||||
|
//启动服务,返回空字符串说明启动成功;返回非空字符串说明启动失败,返回的字符串是错误原因
|
||||||
|
printf("start result %s\n",Start(p0,p1));
|
||||||
|
//停止服务,没有返回值
|
||||||
|
Stop(p0);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
#### 编译test-proxy.c ####
|
||||||
|
`export LD_LIBRARY_PATH=./ && gcc -o test-proxy test.c libproxy-sdk.so`
|
||||||
|
|
||||||
|
#### 执行 ####
|
||||||
|
`./test-proxy`
|
||||||
|
|
||||||
|
## MacOS SDK
|
||||||
|
[](https://github.com/snail007/goproxy-sdk-mac/) []() [](https://github.com/snail007/goproxy-sdk-mac/releases) [](https://github.com/snail007/goproxy-sdk-mac/releases)
|
||||||
|
|
||||||
|
[点击下载MacOS-SDK](https://github.com/snail007/goproxy-sdk-mac/releases)
|
||||||
|
在MacOS系统提供的sdk形式是一个后缀为.dylib的类库文件,开发的时候只需要把so类库加载,调用方法即可.
|
||||||
|
|
||||||
|
### MacOS-SDK使用实例
|
||||||
|
MacOS下面使用的sdk是dylib文件即libproxy-sdk.dylib,下面写一个简单的Obj-C程序示例,调用dylib库里面的方法.
|
||||||
|
|
||||||
|
```objc
|
||||||
|
#import "libproxy-sdk.h"
|
||||||
|
-(IBAction)doStart:(id)sender
|
||||||
|
{
|
||||||
|
char *result = Start("http01", "http -t tcp -p :38080");
|
||||||
|
|
||||||
|
if (result)
|
||||||
|
{
|
||||||
|
printf("started");
|
||||||
|
}else{
|
||||||
|
printf("not started");
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
-(IBAction)doStop:(id)sender
|
||||||
|
{
|
||||||
|
Stop("http01");
|
||||||
|
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### 关于服务
|
||||||
|
proxy的服务有11种,分别是:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
http
|
||||||
|
socks
|
||||||
|
sps
|
||||||
|
tcp
|
||||||
|
udp
|
||||||
|
bridge
|
||||||
|
server
|
||||||
|
client
|
||||||
|
tbridge
|
||||||
|
tserver
|
||||||
|
tclient
|
||||||
|
```
|
||||||
|
服务启动时,如果存在正在运行的相同ID的服务,那么之前的服务会被停掉,后面启动的服务覆盖之前的服务.
|
||||||
|
所以要保证每次启动服务的时候,第一个ID参数唯一.
|
||||||
|
上面这些服务的具体使用方式和具体参数,可以参考[proxy手册](https://github.com/snail007/goproxy/blob/master/README_ZH.md)
|
||||||
|
sdk里面的服务不支持手册里面的:--daemon和--forever参数.
|
||||||
|
|
||||||
|
|
||||||
7
sdk/android-ios/.gitignore
vendored
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
*.jar
|
||||||
|
*.aar
|
||||||
|
*.tar.gz
|
||||||
|
ios
|
||||||
|
android
|
||||||
|
Proxy.framework
|
||||||
|
|
||||||
256
sdk/android-ios/dns.go
Normal file
@ -0,0 +1,256 @@
|
|||||||
|
package proxy
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/md5"
|
||||||
|
"encoding/hex"
|
||||||
|
"fmt"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/net/proxy"
|
||||||
|
|
||||||
|
"github.com/miekg/dns"
|
||||||
|
gocache "github.com/pmylund/go-cache"
|
||||||
|
services "github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DNSArgs struct {
|
||||||
|
ParentServiceType *string
|
||||||
|
ParentType *string
|
||||||
|
Parent *string
|
||||||
|
ParentAuth *string
|
||||||
|
ParentKey *string
|
||||||
|
ParentCompress *bool
|
||||||
|
KCP kcpcfg.KCPConfigArgs
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CaCertFile *string
|
||||||
|
Local *string
|
||||||
|
Timeout *int
|
||||||
|
RemoteDNSAddress *string
|
||||||
|
DNSTTL *int
|
||||||
|
CacheFile *string
|
||||||
|
LocalSocks5Port *string
|
||||||
|
}
|
||||||
|
type DNS struct {
|
||||||
|
cfg DNSArgs
|
||||||
|
log *logger.Logger
|
||||||
|
cache *gocache.Cache
|
||||||
|
exitSig chan bool
|
||||||
|
serviceKey string
|
||||||
|
dialer proxy.Dialer
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewDNS() services.Service {
|
||||||
|
return &DNS{
|
||||||
|
cfg: DNSArgs{},
|
||||||
|
exitSig: make(chan bool, 1),
|
||||||
|
serviceKey: "dns-service-" + fmt.Sprintf("%d", time.Now().UnixNano()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *DNS) CheckArgs() (err error) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *DNS) InitService() (err error) {
|
||||||
|
s.cache = gocache.New(time.Second*time.Duration(*s.cfg.DNSTTL), time.Second*60)
|
||||||
|
s.cache.LoadFile(*s.cfg.CacheFile)
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-s.exitSig:
|
||||||
|
return
|
||||||
|
case <-time.After(time.Second * 60):
|
||||||
|
err := s.cache.SaveFile(*s.cfg.CacheFile)
|
||||||
|
if err == nil {
|
||||||
|
//s.log.Printf("cache saved: %s", *s.cfg.CacheFile)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("cache save failed: %s, %s", *s.cfg.CacheFile, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.dialer, err = proxy.SOCKS5("tcp", *s.cfg.Parent,
|
||||||
|
nil,
|
||||||
|
&net.Dialer{
|
||||||
|
Timeout: 5 * time.Second,
|
||||||
|
KeepAlive: 2 * time.Second,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
sdkArgs := fmt.Sprintf("sps -S %s -T %s -P %s -C %s -K %s -i %d -p 127.0.0.1:%s --disable-http",
|
||||||
|
*s.cfg.ParentServiceType,
|
||||||
|
*s.cfg.ParentType,
|
||||||
|
*s.cfg.Parent,
|
||||||
|
*s.cfg.CertFile,
|
||||||
|
*s.cfg.KeyFile,
|
||||||
|
*s.cfg.Timeout,
|
||||||
|
*s.cfg.LocalSocks5Port,
|
||||||
|
)
|
||||||
|
if *s.cfg.ParentKey != "" {
|
||||||
|
sdkArgs += " -Z " + *s.cfg.ParentKey
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentAuth != "" {
|
||||||
|
sdkArgs += " -A " + *s.cfg.ParentAuth
|
||||||
|
}
|
||||||
|
if *s.cfg.CaCertFile != "" {
|
||||||
|
sdkArgs += " --ca " + *s.cfg.CaCertFile
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentCompress {
|
||||||
|
sdkArgs += " -M"
|
||||||
|
}
|
||||||
|
s.log.Printf("start sps with : %s", sdkArgs)
|
||||||
|
errStr := Start(s.serviceKey, sdkArgs)
|
||||||
|
if errStr != "" {
|
||||||
|
err = fmt.Errorf("start sps service fail,%s", errStr)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *DNS) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop dns service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service dns stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
Stop(s.serviceKey)
|
||||||
|
s.cache.Flush()
|
||||||
|
s.exitSig <- true
|
||||||
|
}
|
||||||
|
func (s *DNS) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(DNSArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
dns.HandleFunc(".", s.callback)
|
||||||
|
go func() {
|
||||||
|
log.Printf("dns server on udp %s", *s.cfg.Local)
|
||||||
|
err := dns.ListenAndServe(*s.cfg.Local, "udp", nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("dns listen error: %s", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DNS) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *DNS) callback(w dns.ResponseWriter, req *dns.Msg) {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("dns handler crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
var (
|
||||||
|
key string
|
||||||
|
m *dns.Msg
|
||||||
|
err error
|
||||||
|
data []byte
|
||||||
|
id uint16
|
||||||
|
query []string
|
||||||
|
questions []dns.Question
|
||||||
|
)
|
||||||
|
if req.MsgHdr.Response == true {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
query = make([]string, len(req.Question))
|
||||||
|
for i, q := range req.Question {
|
||||||
|
if q.Qtype != dns.TypeAAAA {
|
||||||
|
questions = append(questions, q)
|
||||||
|
}
|
||||||
|
query[i] = fmt.Sprintf("(%s %s %s)", q.Name, dns.ClassToString[q.Qclass], dns.TypeToString[q.Qtype])
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(questions) == 0 {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Question = questions
|
||||||
|
id = req.Id
|
||||||
|
req.Id = 0
|
||||||
|
key = s.toMd5(req.String())
|
||||||
|
req.Id = id
|
||||||
|
if reply, ok := s.cache.Get(key); ok {
|
||||||
|
data, _ = reply.([]byte)
|
||||||
|
}
|
||||||
|
if data != nil && len(data) > 0 {
|
||||||
|
m = &dns.Msg{}
|
||||||
|
m.Unpack(data)
|
||||||
|
m.Id = id
|
||||||
|
err = w.WriteMsg(m)
|
||||||
|
s.log.Printf("id: %5d cache: HIT %v", id, query)
|
||||||
|
return
|
||||||
|
|
||||||
|
} else {
|
||||||
|
s.log.Printf("id: %5d cache: MISS %v", id, query)
|
||||||
|
}
|
||||||
|
|
||||||
|
s.log.Printf("id: %5d resolve: %v %s", id, query, *s.cfg.RemoteDNSAddress)
|
||||||
|
|
||||||
|
rawConn, err := s.dialer.Dial("tcp", *s.cfg.RemoteDNSAddress)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("dail to %s fail,%s", *s.cfg.RemoteDNSAddress, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer rawConn.Close()
|
||||||
|
co := new(dns.Conn)
|
||||||
|
co.Conn = rawConn
|
||||||
|
defer co.Close()
|
||||||
|
if err = co.WriteMsg(req); err != nil {
|
||||||
|
s.log.Printf("write dns query fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
m, err = co.ReadMsg()
|
||||||
|
if err == nil && m.Id != req.Id {
|
||||||
|
s.log.Printf("id: %5d mismath", id)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err != nil || len(m.Answer) == 0 {
|
||||||
|
s.log.Printf("dns query fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
data, err = m.Pack()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("dns query fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = w.Write(data)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("dns query fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
m.Id = 0
|
||||||
|
data, _ = m.Pack()
|
||||||
|
ttl := 0
|
||||||
|
if len(m.Answer) > 0 {
|
||||||
|
if *s.cfg.DNSTTL > 0 {
|
||||||
|
ttl = *s.cfg.DNSTTL
|
||||||
|
} else {
|
||||||
|
ttl = int(m.Answer[0].Header().Ttl)
|
||||||
|
if ttl < 0 {
|
||||||
|
ttl = *s.cfg.DNSTTL
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
s.cache.Set(key, data, time.Second*time.Duration(ttl))
|
||||||
|
m.Id = id
|
||||||
|
s.log.Printf("id: %5d cache: CACHED %v TTL %v", id, query, ttl)
|
||||||
|
}
|
||||||
|
func (s *DNS) toMd5(data string) string {
|
||||||
|
m := md5.New()
|
||||||
|
m.Write([]byte(data))
|
||||||
|
return hex.EncodeToString(m.Sum(nil))
|
||||||
|
}
|
||||||
24
sdk/android-ios/release_android.sh
Executable file
@ -0,0 +1,24 @@
|
|||||||
|
#/bin/bash
|
||||||
|
VER="v5.0"
|
||||||
|
rm -rf sdk-android-*.tar.gz
|
||||||
|
rm -rf android
|
||||||
|
mkdir android
|
||||||
|
|
||||||
|
#android ; jdk,android ndk & android sdk required, install gomobile go1.10 required
|
||||||
|
#export GOPATH="$HOME/go"
|
||||||
|
#export GOROOT="/usr/local/go"
|
||||||
|
#export PATH="$GOROOT/bin:$GOPATH/bin:$PATH"
|
||||||
|
#export ANDROID_HOME="$HOME/Android/Sdk"
|
||||||
|
#export NDK_ROOT="$HOME/Android/Sdk/ndk-bundle"
|
||||||
|
#export PATH="$ANDROID_HOME/tools:$ANDROID_HOME/platform-tools:$NDK_ROOT:$PATH"
|
||||||
|
#go get -v golang.org/x/mobile/cmd/gomobile
|
||||||
|
#gomobile init
|
||||||
|
|
||||||
|
gomobile bind -v -target=android -javapkg=snail007 -ldflags="-s -w"
|
||||||
|
mv proxy.aar android/snail007.goproxy.sdk.aar
|
||||||
|
mv proxy-sources.jar android/snail007.goproxy.sdk-sources.jar
|
||||||
|
cp ../README.md android
|
||||||
|
tar zcfv sdk-android-${VER}.tar.gz android
|
||||||
|
rm -rf android
|
||||||
|
|
||||||
|
echo "done."
|
||||||
14
sdk/android-ios/release_ios.sh
Executable file
@ -0,0 +1,14 @@
|
|||||||
|
#/bin/bash
|
||||||
|
VER="v5.0"
|
||||||
|
rm -rf sdk-ios-*.tar.gz
|
||||||
|
rm -rf ios
|
||||||
|
mkdir ios
|
||||||
|
|
||||||
|
#ios XCode required
|
||||||
|
gomobile bind -v -target=ios -ldflags="-s -w"
|
||||||
|
mv Proxy.framework ios
|
||||||
|
cp ../README.md ios
|
||||||
|
tar zcfv sdk-ios-${VER}.tar.gz ios
|
||||||
|
rm -rf ios
|
||||||
|
|
||||||
|
echo "done."
|
||||||
388
sdk/android-ios/sdk.go
Normal file
@ -0,0 +1,388 @@
|
|||||||
|
package proxy
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/sha1"
|
||||||
|
"fmt"
|
||||||
|
logger "log"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
httpx "github.com/snail007/goproxy/services/http"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
mux "github.com/snail007/goproxy/services/mux"
|
||||||
|
socksx "github.com/snail007/goproxy/services/socks"
|
||||||
|
spsx "github.com/snail007/goproxy/services/sps"
|
||||||
|
tcpx "github.com/snail007/goproxy/services/tcp"
|
||||||
|
tunnel "github.com/snail007/goproxy/services/tunnel"
|
||||||
|
udpx "github.com/snail007/goproxy/services/udp"
|
||||||
|
kcp "github.com/xtaci/kcp-go"
|
||||||
|
"golang.org/x/crypto/pbkdf2"
|
||||||
|
kingpin "gopkg.in/alecthomas/kingpin.v2"
|
||||||
|
)
|
||||||
|
|
||||||
|
const SDK_VERSION = "5.0"
|
||||||
|
|
||||||
|
var (
|
||||||
|
app *kingpin.Application
|
||||||
|
)
|
||||||
|
|
||||||
|
//Start
|
||||||
|
//serviceID : is service identify id,different service's id should be difference
|
||||||
|
//serviceArgsStr: is the whole command line args string
|
||||||
|
//such as :
|
||||||
|
//1."http -t tcp -p :8989"
|
||||||
|
//2."socks -t tcp -p :8989"
|
||||||
|
//and so on.
|
||||||
|
//if an error occured , errStr will be the error reason
|
||||||
|
//if start success, errStr is empty.
|
||||||
|
func Start(serviceID, serviceArgsStr string) (errStr string) {
|
||||||
|
//define args
|
||||||
|
tcpArgs := tcpx.TCPArgs{}
|
||||||
|
httpArgs := httpx.HTTPArgs{}
|
||||||
|
tunnelServerArgs := tunnel.TunnelServerArgs{}
|
||||||
|
tunnelClientArgs := tunnel.TunnelClientArgs{}
|
||||||
|
tunnelBridgeArgs := tunnel.TunnelBridgeArgs{}
|
||||||
|
muxServerArgs := mux.MuxServerArgs{}
|
||||||
|
muxClientArgs := mux.MuxClientArgs{}
|
||||||
|
muxBridgeArgs := mux.MuxBridgeArgs{}
|
||||||
|
udpArgs := udpx.UDPArgs{}
|
||||||
|
socksArgs := socksx.SocksArgs{}
|
||||||
|
spsArgs := spsx.SPSArgs{}
|
||||||
|
dnsArgs := DNSArgs{}
|
||||||
|
kcpArgs := kcpcfg.KCPConfigArgs{}
|
||||||
|
//build srvice args
|
||||||
|
app = kingpin.New("proxy", "happy with proxy")
|
||||||
|
app.Author("snail").Version(SDK_VERSION)
|
||||||
|
debug := app.Flag("debug", "debug log output").Default("false").Bool()
|
||||||
|
logfile := app.Flag("log", "log file path").Default("").String()
|
||||||
|
kcpArgs.Key = app.Flag("kcp-key", "pre-shared secret between client and server").Default("secrect").String()
|
||||||
|
kcpArgs.Crypt = app.Flag("kcp-method", "encrypt/decrypt method, can be: aes, aes-128, aes-192, salsa20, blowfish, twofish, cast5, 3des, tea, xtea, xor, sm4, none").Default("aes").Enum("aes", "aes-128", "aes-192", "salsa20", "blowfish", "twofish", "cast5", "3des", "tea", "xtea", "xor", "sm4", "none")
|
||||||
|
kcpArgs.Mode = app.Flag("kcp-mode", "profiles: fast3, fast2, fast, normal, manual").Default("fast3").Enum("fast3", "fast2", "fast", "normal", "manual")
|
||||||
|
kcpArgs.MTU = app.Flag("kcp-mtu", "set maximum transmission unit for UDP packets").Default("1350").Int()
|
||||||
|
kcpArgs.SndWnd = app.Flag("kcp-sndwnd", "set send window size(num of packets)").Default("1024").Int()
|
||||||
|
kcpArgs.RcvWnd = app.Flag("kcp-rcvwnd", "set receive window size(num of packets)").Default("1024").Int()
|
||||||
|
kcpArgs.DataShard = app.Flag("kcp-ds", "set reed-solomon erasure coding - datashard").Default("10").Int()
|
||||||
|
kcpArgs.ParityShard = app.Flag("kcp-ps", "set reed-solomon erasure coding - parityshard").Default("3").Int()
|
||||||
|
kcpArgs.DSCP = app.Flag("kcp-dscp", "set DSCP(6bit)").Default("0").Int()
|
||||||
|
kcpArgs.NoComp = app.Flag("kcp-nocomp", "disable compression").Default("false").Bool()
|
||||||
|
kcpArgs.AckNodelay = app.Flag("kcp-acknodelay", "be carefull! flush ack immediately when a packet is received").Default("true").Bool()
|
||||||
|
kcpArgs.NoDelay = app.Flag("kcp-nodelay", "be carefull!").Default("0").Int()
|
||||||
|
kcpArgs.Interval = app.Flag("kcp-interval", "be carefull!").Default("50").Int()
|
||||||
|
kcpArgs.Resend = app.Flag("kcp-resend", "be carefull!").Default("0").Int()
|
||||||
|
kcpArgs.NoCongestion = app.Flag("kcp-nc", "be carefull! no congestion").Default("0").Int()
|
||||||
|
kcpArgs.SockBuf = app.Flag("kcp-sockbuf", "be carefull!").Default("4194304").Int()
|
||||||
|
kcpArgs.KeepAlive = app.Flag("kcp-keepalive", "be carefull!").Default("10").Int()
|
||||||
|
|
||||||
|
//########http#########
|
||||||
|
http := app.Command("http", "proxy on http mode")
|
||||||
|
httpArgs.Parent = http.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
httpArgs.CaCertFile = http.Flag("ca", "ca cert file for tls").Default("").String()
|
||||||
|
httpArgs.CertFile = http.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
httpArgs.KeyFile = http.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
httpArgs.LocalType = http.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tcp").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
httpArgs.ParentType = http.Flag("parent-type", "parent protocol type <tls|tcp|ssh|kcp>").Short('T').Enum("tls", "tcp", "ssh", "kcp")
|
||||||
|
httpArgs.Always = http.Flag("always", "always use parent proxy").Default("false").Bool()
|
||||||
|
httpArgs.Timeout = http.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Default("2000").Int()
|
||||||
|
httpArgs.HTTPTimeout = http.Flag("http-timeout", "check domain if blocked , http request timeout milliseconds when connect to host").Default("3000").Int()
|
||||||
|
httpArgs.Interval = http.Flag("interval", "check domain if blocked every interval seconds").Default("10").Int()
|
||||||
|
httpArgs.Blocked = http.Flag("blocked", "blocked domain file , one domain each line").Default("blocked").Short('b').String()
|
||||||
|
httpArgs.Direct = http.Flag("direct", "direct domain file , one domain each line").Default("direct").Short('d').String()
|
||||||
|
httpArgs.AuthFile = http.Flag("auth-file", "http basic auth file,\"username:password\" each line in file").Short('F').String()
|
||||||
|
httpArgs.Auth = http.Flag("auth", "http basic auth username and password, mutiple user repeat -a ,such as: -a user1:pass1 -a user2:pass2").Short('a').Strings()
|
||||||
|
httpArgs.CheckParentInterval = http.Flag("check-parent-interval", "check if proxy is okay every interval seconds,zero: means no check").Short('I').Default("3").Int()
|
||||||
|
httpArgs.Local = http.Flag("local", "local ip:port to listen,multiple address use comma split,such as: 0.0.0.0:80,0.0.0.0:443").Short('p').Default(":33080").String()
|
||||||
|
httpArgs.SSHUser = http.Flag("ssh-user", "user for ssh").Short('u').Default("").String()
|
||||||
|
httpArgs.SSHKeyFile = http.Flag("ssh-key", "private key file for ssh").Short('S').Default("").String()
|
||||||
|
httpArgs.SSHKeyFileSalt = http.Flag("ssh-keysalt", "salt of ssh private key").Short('s').Default("").String()
|
||||||
|
httpArgs.SSHPassword = http.Flag("ssh-password", "password for ssh").Short('A').Default("").String()
|
||||||
|
httpArgs.LocalIPS = http.Flag("local-bind-ips", "if your host behind a nat,set your public ip here avoid dead loop").Short('g').Strings()
|
||||||
|
httpArgs.AuthURL = http.Flag("auth-url", "http basic auth username and password will send to this url,response http code equal to 'auth-code' means ok,others means fail.").Default("").String()
|
||||||
|
httpArgs.AuthURLTimeout = http.Flag("auth-timeout", "access 'auth-url' timeout milliseconds").Default("3000").Int()
|
||||||
|
httpArgs.AuthURLOkCode = http.Flag("auth-code", "access 'auth-url' success http code").Default("204").Int()
|
||||||
|
httpArgs.AuthURLRetry = http.Flag("auth-retry", "access 'auth-url' fail and retry count").Default("1").Int()
|
||||||
|
httpArgs.DNSAddress = http.Flag("dns-address", "if set this, proxy will use this dns for resolve doamin").Short('q').Default("").String()
|
||||||
|
httpArgs.DNSTTL = http.Flag("dns-ttl", "caching seconds of dns query result").Short('e').Default("300").Int()
|
||||||
|
httpArgs.LocalKey = http.Flag("local-key", "the password for auto encrypt/decrypt local connection data").Short('z').Default("").String()
|
||||||
|
httpArgs.ParentKey = http.Flag("parent-key", "the password for auto encrypt/decrypt parent connection data").Short('Z').Default("").String()
|
||||||
|
httpArgs.LocalCompress = http.Flag("local-compress", "auto compress/decompress data on local connection").Short('m').Default("false").Bool()
|
||||||
|
httpArgs.ParentCompress = http.Flag("parent-compress", "auto compress/decompress data on parent connection").Short('M').Default("false").Bool()
|
||||||
|
|
||||||
|
//########tcp#########
|
||||||
|
tcp := app.Command("tcp", "proxy on tcp mode")
|
||||||
|
tcpArgs.Parent = tcp.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
tcpArgs.CertFile = tcp.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
tcpArgs.KeyFile = tcp.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
tcpArgs.Timeout = tcp.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Short('e').Default("2000").Int()
|
||||||
|
tcpArgs.ParentType = tcp.Flag("parent-type", "parent protocol type <tls|tcp|kcp|udp>").Short('T').Enum("tls", "tcp", "udp", "kcp")
|
||||||
|
tcpArgs.LocalType = tcp.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tcp").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
tcpArgs.CheckParentInterval = tcp.Flag("check-parent-interval", "check if proxy is okay every interval seconds,zero: means no check").Short('I').Default("3").Int()
|
||||||
|
tcpArgs.Local = tcp.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
|
||||||
|
//########udp#########
|
||||||
|
udp := app.Command("udp", "proxy on udp mode")
|
||||||
|
udpArgs.Parent = udp.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
udpArgs.CertFile = udp.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
udpArgs.KeyFile = udp.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
udpArgs.Timeout = udp.Flag("timeout", "tcp timeout milliseconds when connect to parent proxy").Short('t').Default("2000").Int()
|
||||||
|
udpArgs.ParentType = udp.Flag("parent-type", "parent protocol type <tls|tcp|udp>").Short('T').Enum("tls", "tcp", "udp")
|
||||||
|
udpArgs.CheckParentInterval = udp.Flag("check-parent-interval", "check if proxy is okay every interval seconds,zero: means no check").Short('I').Default("3").Int()
|
||||||
|
udpArgs.Local = udp.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
|
||||||
|
//########mux-server#########
|
||||||
|
muxServer := app.Command("server", "proxy on mux server mode")
|
||||||
|
muxServerArgs.Parent = muxServer.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
muxServerArgs.ParentType = muxServer.Flag("parent-type", "parent protocol type <tls|tcp|kcp>").Default("tls").Short('T').Enum("tls", "tcp", "kcp")
|
||||||
|
muxServerArgs.CertFile = muxServer.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
muxServerArgs.KeyFile = muxServer.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
muxServerArgs.Timeout = muxServer.Flag("timeout", "tcp timeout with milliseconds").Short('i').Default("2000").Int()
|
||||||
|
muxServerArgs.IsUDP = muxServer.Flag("udp", "proxy on udp mux server mode").Default("false").Bool()
|
||||||
|
muxServerArgs.Key = muxServer.Flag("k", "client key").Default("default").String()
|
||||||
|
muxServerArgs.Route = muxServer.Flag("route", "local route to client's network, such as: PROTOCOL://LOCAL_IP:LOCAL_PORT@[CLIENT_KEY]CLIENT_LOCAL_HOST:CLIENT_LOCAL_PORT").Short('r').Default("").Strings()
|
||||||
|
muxServerArgs.IsCompress = muxServer.Flag("c", "compress data when tcp|tls mode").Default("false").Bool()
|
||||||
|
muxServerArgs.SessionCount = muxServer.Flag("session-count", "session count which connect to bridge").Short('n').Default("10").Int()
|
||||||
|
|
||||||
|
//########mux-client#########
|
||||||
|
muxClient := app.Command("client", "proxy on mux client mode")
|
||||||
|
muxClientArgs.Parent = muxClient.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
muxClientArgs.ParentType = muxClient.Flag("parent-type", "parent protocol type <tls|tcp|kcp>").Default("tls").Short('T').Enum("tls", "tcp", "kcp")
|
||||||
|
muxClientArgs.CertFile = muxClient.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
muxClientArgs.KeyFile = muxClient.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
muxClientArgs.Timeout = muxClient.Flag("timeout", "tcp timeout with milliseconds").Short('i').Default("2000").Int()
|
||||||
|
muxClientArgs.Key = muxClient.Flag("k", "key same with server").Default("default").String()
|
||||||
|
muxClientArgs.IsCompress = muxClient.Flag("c", "compress data when tcp|tls mode").Default("false").Bool()
|
||||||
|
muxClientArgs.SessionCount = muxClient.Flag("session-count", "session count which connect to bridge").Short('n').Default("10").Int()
|
||||||
|
|
||||||
|
//########mux-bridge#########
|
||||||
|
muxBridge := app.Command("bridge", "proxy on mux bridge mode")
|
||||||
|
muxBridgeArgs.CertFile = muxBridge.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
muxBridgeArgs.KeyFile = muxBridge.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
muxBridgeArgs.Timeout = muxBridge.Flag("timeout", "tcp timeout with milliseconds").Short('i').Default("2000").Int()
|
||||||
|
muxBridgeArgs.Local = muxBridge.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
muxBridgeArgs.LocalType = muxBridge.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tls").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
|
||||||
|
//########tunnel-server#########
|
||||||
|
tunnelServer := app.Command("tserver", "proxy on tunnel server mode")
|
||||||
|
tunnelServerArgs.Parent = tunnelServer.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
tunnelServerArgs.CertFile = tunnelServer.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
tunnelServerArgs.KeyFile = tunnelServer.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
tunnelServerArgs.Timeout = tunnelServer.Flag("timeout", "tcp timeout with milliseconds").Short('t').Default("2000").Int()
|
||||||
|
tunnelServerArgs.IsUDP = tunnelServer.Flag("udp", "proxy on udp tunnel server mode").Default("false").Bool()
|
||||||
|
tunnelServerArgs.Key = tunnelServer.Flag("k", "client key").Default("default").String()
|
||||||
|
tunnelServerArgs.Route = tunnelServer.Flag("route", "local route to client's network, such as: PROTOCOL://LOCAL_IP:LOCAL_PORT@[CLIENT_KEY]CLIENT_LOCAL_HOST:CLIENT_LOCAL_PORT").Short('r').Default("").Strings()
|
||||||
|
|
||||||
|
//########tunnel-client#########
|
||||||
|
tunnelClient := app.Command("tclient", "proxy on tunnel client mode")
|
||||||
|
tunnelClientArgs.Parent = tunnelClient.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
tunnelClientArgs.CertFile = tunnelClient.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
tunnelClientArgs.KeyFile = tunnelClient.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
tunnelClientArgs.Timeout = tunnelClient.Flag("timeout", "tcp timeout with milliseconds").Short('t').Default("2000").Int()
|
||||||
|
tunnelClientArgs.Key = tunnelClient.Flag("k", "key same with server").Default("default").String()
|
||||||
|
|
||||||
|
//########tunnel-bridge#########
|
||||||
|
tunnelBridge := app.Command("tbridge", "proxy on tunnel bridge mode")
|
||||||
|
tunnelBridgeArgs.CertFile = tunnelBridge.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
tunnelBridgeArgs.KeyFile = tunnelBridge.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
tunnelBridgeArgs.Timeout = tunnelBridge.Flag("timeout", "tcp timeout with milliseconds").Short('t').Default("2000").Int()
|
||||||
|
tunnelBridgeArgs.Local = tunnelBridge.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
|
||||||
|
//########ssh#########
|
||||||
|
socks := app.Command("socks", "proxy on ssh mode")
|
||||||
|
socksArgs.Parent = socks.Flag("parent", "parent ssh address, such as: \"23.32.32.19:22\"").Default("").Short('P').String()
|
||||||
|
socksArgs.ParentType = socks.Flag("parent-type", "parent protocol type <tls|tcp|kcp|ssh>").Default("tcp").Short('T').Enum("tls", "tcp", "kcp", "ssh")
|
||||||
|
socksArgs.LocalType = socks.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tcp").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
socksArgs.Local = socks.Flag("local", "local ip:port to listen").Short('p').Default(":33080").String()
|
||||||
|
socksArgs.CertFile = socks.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
socksArgs.CaCertFile = socks.Flag("ca", "ca cert file for tls").Default("").String()
|
||||||
|
socksArgs.KeyFile = socks.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
socksArgs.SSHUser = socks.Flag("ssh-user", "user for ssh").Short('u').Default("").String()
|
||||||
|
socksArgs.SSHKeyFile = socks.Flag("ssh-key", "private key file for ssh").Short('S').Default("").String()
|
||||||
|
socksArgs.SSHKeyFileSalt = socks.Flag("ssh-keysalt", "salt of ssh private key").Short('s').Default("").String()
|
||||||
|
socksArgs.SSHPassword = socks.Flag("ssh-password", "password for ssh").Short('A').Default("").String()
|
||||||
|
socksArgs.Always = socks.Flag("always", "always use parent proxy").Default("false").Bool()
|
||||||
|
socksArgs.Timeout = socks.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Default("5000").Int()
|
||||||
|
socksArgs.Interval = socks.Flag("interval", "check domain if blocked every interval seconds").Default("10").Int()
|
||||||
|
socksArgs.Blocked = socks.Flag("blocked", "blocked domain file , one domain each line").Default("blocked").Short('b').String()
|
||||||
|
socksArgs.Direct = socks.Flag("direct", "direct domain file , one domain each line").Default("direct").Short('d').String()
|
||||||
|
socksArgs.AuthFile = socks.Flag("auth-file", "http basic auth file,\"username:password\" each line in file").Short('F').String()
|
||||||
|
socksArgs.Auth = socks.Flag("auth", "socks auth username and password, mutiple user repeat -a ,such as: -a user1:pass1 -a user2:pass2").Short('a').Strings()
|
||||||
|
socksArgs.LocalIPS = socks.Flag("local-bind-ips", "if your host behind a nat,set your public ip here avoid dead loop").Short('g').Strings()
|
||||||
|
socksArgs.AuthURL = socks.Flag("auth-url", "auth username and password will send to this url,response http code equal to 'auth-code' means ok,others means fail.").Default("").String()
|
||||||
|
socksArgs.AuthURLTimeout = socks.Flag("auth-timeout", "access 'auth-url' timeout milliseconds").Default("3000").Int()
|
||||||
|
socksArgs.AuthURLOkCode = socks.Flag("auth-code", "access 'auth-url' success http code").Default("204").Int()
|
||||||
|
socksArgs.AuthURLRetry = socks.Flag("auth-retry", "access 'auth-url' fail and retry count").Default("0").Int()
|
||||||
|
socksArgs.DNSAddress = socks.Flag("dns-address", "if set this, proxy will use this dns for resolve doamin").Short('q').Default("").String()
|
||||||
|
socksArgs.DNSTTL = socks.Flag("dns-ttl", "caching seconds of dns query result").Short('e').Default("300").Int()
|
||||||
|
socksArgs.LocalKey = socks.Flag("local-key", "the password for auto encrypt/decrypt local connection data").Short('z').Default("").String()
|
||||||
|
socksArgs.ParentKey = socks.Flag("parent-key", "the password for auto encrypt/decrypt parent connection data").Short('Z').Default("").String()
|
||||||
|
socksArgs.LocalCompress = socks.Flag("local-compress", "auto compress/decompress data on local connection").Short('m').Default("false").Bool()
|
||||||
|
socksArgs.ParentCompress = socks.Flag("parent-compress", "auto compress/decompress data on parent connection").Short('M').Default("false").Bool()
|
||||||
|
|
||||||
|
//########socks+http(s)#########
|
||||||
|
sps := app.Command("sps", "proxy on socks+http(s) mode")
|
||||||
|
spsArgs.Parent = sps.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
spsArgs.CertFile = sps.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
spsArgs.KeyFile = sps.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
spsArgs.CaCertFile = sps.Flag("ca", "ca cert file for tls").Default("").String()
|
||||||
|
spsArgs.Timeout = sps.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Short('i').Default("2000").Int()
|
||||||
|
spsArgs.ParentType = sps.Flag("parent-type", "parent protocol type <tls|tcp|kcp>").Short('T').Enum("tls", "tcp", "kcp")
|
||||||
|
spsArgs.LocalType = sps.Flag("local-type", "local protocol type <tls|tcp|kcp>").Default("tcp").Short('t').Enum("tls", "tcp", "kcp")
|
||||||
|
spsArgs.Local = sps.Flag("local", "local ip:port to listen,multiple address use comma split,such as: 0.0.0.0:80,0.0.0.0:443").Short('p').Default(":33080").String()
|
||||||
|
spsArgs.ParentServiceType = sps.Flag("parent-service-type", "parent service type <http|socks>").Short('S').Enum("http", "socks")
|
||||||
|
spsArgs.DNSAddress = sps.Flag("dns-address", "if set this, proxy will use this dns for resolve doamin").Short('q').Default("").String()
|
||||||
|
spsArgs.DNSTTL = sps.Flag("dns-ttl", "caching seconds of dns query result").Short('e').Default("300").Int()
|
||||||
|
spsArgs.AuthFile = sps.Flag("auth-file", "http basic auth file,\"username:password\" each line in file").Short('F').String()
|
||||||
|
spsArgs.Auth = sps.Flag("auth", "socks auth username and password, mutiple user repeat -a ,such as: -a user1:pass1 -a user2:pass2").Short('a').Strings()
|
||||||
|
spsArgs.LocalIPS = sps.Flag("local bind ips", "if your host behind a nat,set your public ip here avoid dead loop").Short('g').Strings()
|
||||||
|
spsArgs.AuthURL = sps.Flag("auth-url", "auth username and password will send to this url,response http code equal to 'auth-code' means ok,others means fail.").Default("").String()
|
||||||
|
spsArgs.AuthURLTimeout = sps.Flag("auth-timeout", "access 'auth-url' timeout milliseconds").Default("3000").Int()
|
||||||
|
spsArgs.AuthURLOkCode = sps.Flag("auth-code", "access 'auth-url' success http code").Default("204").Int()
|
||||||
|
spsArgs.AuthURLRetry = sps.Flag("auth-retry", "access 'auth-url' fail and retry count").Default("0").Int()
|
||||||
|
spsArgs.ParentAuth = sps.Flag("parent-auth", "parent socks auth username and password, such as: -A user1:pass1").Short('A').String()
|
||||||
|
spsArgs.LocalKey = sps.Flag("local-key", "the password for auto encrypt/decrypt local connection data").Short('z').Default("").String()
|
||||||
|
spsArgs.ParentKey = sps.Flag("parent-key", "the password for auto encrypt/decrypt parent connection data").Short('Z').Default("").String()
|
||||||
|
spsArgs.LocalCompress = sps.Flag("local-compress", "auto compress/decompress data on local connection").Short('m').Default("false").Bool()
|
||||||
|
spsArgs.ParentCompress = sps.Flag("parent-compress", "auto compress/decompress data on parent connection").Short('M').Default("false").Bool()
|
||||||
|
spsArgs.DisableHTTP = sps.Flag("disable-http", "disable http(s) proxy").Default("false").Bool()
|
||||||
|
spsArgs.DisableSocks5 = sps.Flag("disable-socks", "disable socks proxy").Default("false").Bool()
|
||||||
|
//########dns#########
|
||||||
|
dns := app.Command("dns", "proxy on dns server mode")
|
||||||
|
dnsArgs.Parent = dns.Flag("parent", "parent address, such as: \"23.32.32.19:28008\"").Default("").Short('P').String()
|
||||||
|
dnsArgs.CertFile = dns.Flag("cert", "cert file for tls").Short('C').Default("proxy.crt").String()
|
||||||
|
dnsArgs.KeyFile = dns.Flag("key", "key file for tls").Short('K').Default("proxy.key").String()
|
||||||
|
dnsArgs.CaCertFile = dns.Flag("ca", "ca cert file for tls").Default("").String()
|
||||||
|
dnsArgs.Timeout = dns.Flag("timeout", "tcp timeout milliseconds when connect to real server or parent proxy").Short('i').Default("2000").Int()
|
||||||
|
dnsArgs.ParentType = dns.Flag("parent-type", "parent protocol type <tls|tcp|kcp>").Short('T').Enum("tls", "tcp", "kcp")
|
||||||
|
dnsArgs.Local = dns.Flag("local", "local ip:port to listen,multiple address use comma split,such as: 0.0.0.0:80,0.0.0.0:443").Short('p').Default(":33080").String()
|
||||||
|
dnsArgs.ParentServiceType = dns.Flag("parent-service-type", "parent service type <http|socks>").Short('S').Enum("http", "socks")
|
||||||
|
dnsArgs.RemoteDNSAddress = dns.Flag("dns-address", "remote dns for resolve doamin").Short('q').Default("8.8.8.8:53").String()
|
||||||
|
dnsArgs.DNSTTL = dns.Flag("dns-ttl", "caching seconds of dns query result").Short('e').Default("300").Int()
|
||||||
|
dnsArgs.ParentAuth = dns.Flag("parent-auth", "parent socks auth username and password, such as: -A user1:pass1").Short('A').String()
|
||||||
|
dnsArgs.ParentKey = dns.Flag("parent-key", "the password for auto encrypt/decrypt parent connection data").Short('Z').Default("").String()
|
||||||
|
dnsArgs.ParentCompress = dns.Flag("parent-compress", "auto compress/decompress data on parent connection").Short('M').Default("false").Bool()
|
||||||
|
dnsArgs.CacheFile = dns.Flag("cache-file", "dns result cached file").Short('f').Default(filepath.Join(path.Dir(os.Args[0]), "cache.dat")).String()
|
||||||
|
dnsArgs.LocalSocks5Port = dns.Flag("socks-port", "local socks5 port").Short('s').Default("65501").String()
|
||||||
|
|
||||||
|
//parse args
|
||||||
|
_args := strings.Fields(strings.Trim(serviceArgsStr, " "))
|
||||||
|
args := []string{}
|
||||||
|
for _, a := range _args {
|
||||||
|
args = append(args, strings.Trim(a, "\""))
|
||||||
|
}
|
||||||
|
serviceName, err := app.Parse(args)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Sprintf("parse args fail,err: %s", err)
|
||||||
|
}
|
||||||
|
//set kcp config
|
||||||
|
|
||||||
|
switch *kcpArgs.Mode {
|
||||||
|
case "normal":
|
||||||
|
*kcpArgs.NoDelay, *kcpArgs.Interval, *kcpArgs.Resend, *kcpArgs.NoCongestion = 0, 40, 2, 1
|
||||||
|
case "fast":
|
||||||
|
*kcpArgs.NoDelay, *kcpArgs.Interval, *kcpArgs.Resend, *kcpArgs.NoCongestion = 0, 30, 2, 1
|
||||||
|
case "fast2":
|
||||||
|
*kcpArgs.NoDelay, *kcpArgs.Interval, *kcpArgs.Resend, *kcpArgs.NoCongestion = 1, 20, 2, 1
|
||||||
|
case "fast3":
|
||||||
|
*kcpArgs.NoDelay, *kcpArgs.Interval, *kcpArgs.Resend, *kcpArgs.NoCongestion = 1, 10, 2, 1
|
||||||
|
}
|
||||||
|
pass := pbkdf2.Key([]byte(*kcpArgs.Key), []byte("snail007-goproxy"), 4096, 32, sha1.New)
|
||||||
|
|
||||||
|
switch *kcpArgs.Crypt {
|
||||||
|
case "sm4":
|
||||||
|
kcpArgs.Block, _ = kcp.NewSM4BlockCrypt(pass[:16])
|
||||||
|
case "tea":
|
||||||
|
kcpArgs.Block, _ = kcp.NewTEABlockCrypt(pass[:16])
|
||||||
|
case "xor":
|
||||||
|
kcpArgs.Block, _ = kcp.NewSimpleXORBlockCrypt(pass)
|
||||||
|
case "none":
|
||||||
|
kcpArgs.Block, _ = kcp.NewNoneBlockCrypt(pass)
|
||||||
|
case "aes-128":
|
||||||
|
kcpArgs.Block, _ = kcp.NewAESBlockCrypt(pass[:16])
|
||||||
|
case "aes-192":
|
||||||
|
kcpArgs.Block, _ = kcp.NewAESBlockCrypt(pass[:24])
|
||||||
|
case "blowfish":
|
||||||
|
kcpArgs.Block, _ = kcp.NewBlowfishBlockCrypt(pass)
|
||||||
|
case "twofish":
|
||||||
|
kcpArgs.Block, _ = kcp.NewTwofishBlockCrypt(pass)
|
||||||
|
case "cast5":
|
||||||
|
kcpArgs.Block, _ = kcp.NewCast5BlockCrypt(pass[:16])
|
||||||
|
case "3des":
|
||||||
|
kcpArgs.Block, _ = kcp.NewTripleDESBlockCrypt(pass[:24])
|
||||||
|
case "xtea":
|
||||||
|
kcpArgs.Block, _ = kcp.NewXTEABlockCrypt(pass[:16])
|
||||||
|
case "salsa20":
|
||||||
|
kcpArgs.Block, _ = kcp.NewSalsa20BlockCrypt(pass)
|
||||||
|
default:
|
||||||
|
*kcpArgs.Crypt = "aes"
|
||||||
|
kcpArgs.Block, _ = kcp.NewAESBlockCrypt(pass)
|
||||||
|
}
|
||||||
|
//attach kcp config
|
||||||
|
tcpArgs.KCP = kcpArgs
|
||||||
|
httpArgs.KCP = kcpArgs
|
||||||
|
socksArgs.KCP = kcpArgs
|
||||||
|
spsArgs.KCP = kcpArgs
|
||||||
|
muxBridgeArgs.KCP = kcpArgs
|
||||||
|
muxServerArgs.KCP = kcpArgs
|
||||||
|
muxClientArgs.KCP = kcpArgs
|
||||||
|
dnsArgs.KCP = kcpArgs
|
||||||
|
|
||||||
|
log := logger.New(os.Stderr, "", logger.Ldate|logger.Ltime)
|
||||||
|
flags := logger.Ldate
|
||||||
|
if *debug {
|
||||||
|
flags |= logger.Lshortfile | logger.Lmicroseconds
|
||||||
|
} else {
|
||||||
|
flags |= logger.Ltime
|
||||||
|
}
|
||||||
|
log.SetFlags(flags)
|
||||||
|
|
||||||
|
if *logfile != "" {
|
||||||
|
f, e := os.OpenFile(*logfile, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0600)
|
||||||
|
if e != nil {
|
||||||
|
log.Fatal(e)
|
||||||
|
}
|
||||||
|
log.SetOutput(f)
|
||||||
|
}
|
||||||
|
|
||||||
|
//regist services and run service
|
||||||
|
switch serviceName {
|
||||||
|
case "http":
|
||||||
|
services.Regist(serviceID, httpx.NewHTTP(), httpArgs, log)
|
||||||
|
case "tcp":
|
||||||
|
services.Regist(serviceID, tcpx.NewTCP(), tcpArgs, log)
|
||||||
|
case "udp":
|
||||||
|
services.Regist(serviceID, udpx.NewUDP(), udpArgs, log)
|
||||||
|
case "tserver":
|
||||||
|
services.Regist(serviceID, tunnel.NewTunnelServerManager(), tunnelServerArgs, log)
|
||||||
|
case "tclient":
|
||||||
|
services.Regist(serviceID, tunnel.NewTunnelClient(), tunnelClientArgs, log)
|
||||||
|
case "tbridge":
|
||||||
|
services.Regist(serviceID, tunnel.NewTunnelBridge(), tunnelBridgeArgs, log)
|
||||||
|
case "server":
|
||||||
|
services.Regist(serviceID, mux.NewMuxServerManager(), muxServerArgs, log)
|
||||||
|
case "client":
|
||||||
|
services.Regist(serviceID, mux.NewMuxClient(), muxClientArgs, log)
|
||||||
|
case "bridge":
|
||||||
|
services.Regist(serviceID, mux.NewMuxBridge(), muxBridgeArgs, log)
|
||||||
|
case "socks":
|
||||||
|
services.Regist(serviceID, socksx.NewSocks(), socksArgs, log)
|
||||||
|
case "sps":
|
||||||
|
services.Regist(serviceID, spsx.NewSPS(), spsArgs, log)
|
||||||
|
case "dns":
|
||||||
|
services.Regist(serviceName, NewDNS(), dnsArgs, log)
|
||||||
|
}
|
||||||
|
_, err = services.Run(serviceID, nil)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Sprintf("run service [%s:%s] fail, ERR:%s", serviceID, serviceName, err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func Stop(serviceID string) {
|
||||||
|
services.Stop(serviceID)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Version() string {
|
||||||
|
return SDK_VERSION
|
||||||
|
}
|
||||||
6
sdk/windows-linux/.gitignore
vendored
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
proxy-sdk.dll
|
||||||
|
proxy-sdk.h
|
||||||
|
proxy-sdk.so
|
||||||
|
proxy-sdk.a
|
||||||
|
*.tar.gz
|
||||||
|
test.c
|
||||||
BIN
sdk/windows-linux/ieshims.dll
Normal file
24
sdk/windows-linux/release_linux.sh
Executable file
@ -0,0 +1,24 @@
|
|||||||
|
#/bin/bash
|
||||||
|
VER="v5.0"
|
||||||
|
|
||||||
|
rm -rf sdk-linux-*.tar.gz
|
||||||
|
rm -rf README.md libproxy-sdk.so libproxy-sdk.h libproxy-sdk.a
|
||||||
|
|
||||||
|
#linux 32bit
|
||||||
|
CGO_ENABLED=1 GOARCH=386 GOOS=linux go build -buildmode=c-archive -ldflags "-s -w" -o libproxy-sdk.a sdk.go
|
||||||
|
CGO_ENABLED=1 GOARCH=386 GOOS=linux go build -buildmode=c-shared -ldflags "-s -w" -o libproxy-sdk.so sdk.go
|
||||||
|
cp ../README.md .
|
||||||
|
tar zcf sdk-linux-32bit-${VER}.tar.gz README.md libproxy-sdk.so libproxy-sdk.a libproxy-sdk.h
|
||||||
|
rm -rf README.md libproxy-sdk.so libproxy-sdk.h libproxy-sdk.a
|
||||||
|
|
||||||
|
#linux 64bit
|
||||||
|
CGO_ENABLED=1 GOARCH=amd64 GOOS=linux go build -buildmode=c-archive -ldflags "-s -w" -o libproxy-sdk.a sdk.go
|
||||||
|
CGO_ENABLED=1 GOARCH=amd64 GOOS=linux go build -buildmode=c-shared -ldflags "-s -w" -o libproxy-sdk.so sdk.go
|
||||||
|
cp ../README.md .
|
||||||
|
tar zcf sdk-linux-64bit-${VER}.tar.gz README.md libproxy-sdk.so libproxy-sdk.a libproxy-sdk.h
|
||||||
|
rm -rf README.md libproxy-sdk.so libproxy-sdk.h libproxy-sdk.a
|
||||||
|
|
||||||
|
echo "done."
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
13
sdk/windows-linux/release_mac.sh
Executable file
@ -0,0 +1,13 @@
|
|||||||
|
#/bin/bash
|
||||||
|
VER="v5.0"
|
||||||
|
|
||||||
|
rm -rf *.tar.gz
|
||||||
|
rm -rf README.md libproxy-sdk.dylib libproxy-sdk.h
|
||||||
|
|
||||||
|
#mac , macos required
|
||||||
|
CGO_ENABLED=1 GOARCH=amd64 GOOS=darwin go build -buildmode=c-shared -ldflags "-s -w" -o libproxy-sdk.dylib sdk.go
|
||||||
|
cp ../README.md .
|
||||||
|
tar zcf sdk-mac-${VER}.tar.gz README.md libproxy-sdk.dylib libproxy-sdk.h
|
||||||
|
rm -rf README.md libproxy-sdk.dylib libproxy-sdk.h
|
||||||
|
|
||||||
|
echo "done."
|
||||||
28
sdk/windows-linux/release_windows.sh
Executable file
@ -0,0 +1,28 @@
|
|||||||
|
#/bin/bash
|
||||||
|
VER="v5.0"
|
||||||
|
|
||||||
|
sudo rm /usr/local/go
|
||||||
|
sudo ln -s /usr/local/go1.10.1 /usr/local/go
|
||||||
|
rm -rf sdk-windows-*.tar.gz
|
||||||
|
rm -rf README.md proxy-sdk.h proxy-sdk.dll
|
||||||
|
|
||||||
|
|
||||||
|
#apt-get install gcc-multilib
|
||||||
|
#apt-get install gcc-mingw-w64
|
||||||
|
|
||||||
|
#windows 64bit
|
||||||
|
CC=x86_64-w64-mingw32-gcc GOARCH=amd64 CGO_ENABLED=1 GOOS=windows go build -buildmode=c-shared -ldflags "-s -w" -o proxy-sdk.dll sdk.go
|
||||||
|
cp ../README.md .
|
||||||
|
tar zcf sdk-windows-64bit-${VER}.tar.gz README.md proxy-sdk.dll proxy-sdk.h ieshims.dll
|
||||||
|
rm -rf README.md proxy-sdk.h proxy-sdk.dll
|
||||||
|
|
||||||
|
#windows 32bit
|
||||||
|
CC=i686-w64-mingw32-gcc-win32 GOARCH=386 CGO_ENABLED=1 GOOS=windows go build -buildmode=c-shared -ldflags "-s -w" -o proxy-sdk.dll sdk.go
|
||||||
|
cp ../README.md .
|
||||||
|
tar zcf sdk-windows-32bit-${VER}.tar.gz README.md proxy-sdk.dll proxy-sdk.h ieshims.dll
|
||||||
|
rm -rf README.md proxy-sdk.h proxy-sdk.dll
|
||||||
|
|
||||||
|
sudo rm /usr/local/go
|
||||||
|
sudo ln -s /usr/local/go1.8.5 /usr/local/go
|
||||||
|
|
||||||
|
echo "done."
|
||||||
25
sdk/windows-linux/sdk.go
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"C"
|
||||||
|
|
||||||
|
sdk "github.com/snail007/goproxy/sdk/android-ios"
|
||||||
|
)
|
||||||
|
|
||||||
|
//export Start
|
||||||
|
func Start(serviceID *C.char, serviceArgsStr *C.char) (errStr *C.char) {
|
||||||
|
return C.CString(sdk.Start(C.GoString(serviceID), C.GoString(serviceArgsStr)))
|
||||||
|
}
|
||||||
|
|
||||||
|
//export Stop
|
||||||
|
func Stop(serviceID *C.char) {
|
||||||
|
sdk.Stop(C.GoString(serviceID))
|
||||||
|
}
|
||||||
|
|
||||||
|
//export Version
|
||||||
|
func Version() (ver *C.char) {
|
||||||
|
return C.CString(sdk.Version())
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
}
|
||||||
530
services/http/http.go
Normal file
@ -0,0 +1,530 @@
|
|||||||
|
package http
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
"github.com/snail007/goproxy/utils/conncrypt"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/ssh"
|
||||||
|
)
|
||||||
|
|
||||||
|
type HTTPArgs struct {
|
||||||
|
Parent *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CaCertFile *string
|
||||||
|
CaCertBytes []byte
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Local *string
|
||||||
|
Always *bool
|
||||||
|
HTTPTimeout *int
|
||||||
|
Interval *int
|
||||||
|
Blocked *string
|
||||||
|
Direct *string
|
||||||
|
AuthFile *string
|
||||||
|
Auth *[]string
|
||||||
|
AuthURL *string
|
||||||
|
AuthURLOkCode *int
|
||||||
|
AuthURLTimeout *int
|
||||||
|
AuthURLRetry *int
|
||||||
|
ParentType *string
|
||||||
|
LocalType *string
|
||||||
|
Timeout *int
|
||||||
|
CheckParentInterval *int
|
||||||
|
SSHKeyFile *string
|
||||||
|
SSHKeyFileSalt *string
|
||||||
|
SSHPassword *string
|
||||||
|
SSHUser *string
|
||||||
|
SSHKeyBytes []byte
|
||||||
|
SSHAuthMethod ssh.AuthMethod
|
||||||
|
KCP kcpcfg.KCPConfigArgs
|
||||||
|
LocalIPS *[]string
|
||||||
|
DNSAddress *string
|
||||||
|
DNSTTL *int
|
||||||
|
LocalKey *string
|
||||||
|
ParentKey *string
|
||||||
|
LocalCompress *bool
|
||||||
|
ParentCompress *bool
|
||||||
|
}
|
||||||
|
type HTTP struct {
|
||||||
|
outPool utils.OutConn
|
||||||
|
cfg HTTPArgs
|
||||||
|
checker utils.Checker
|
||||||
|
basicAuth utils.BasicAuth
|
||||||
|
sshClient *ssh.Client
|
||||||
|
lockChn chan bool
|
||||||
|
domainResolver utils.DomainResolver
|
||||||
|
isStop bool
|
||||||
|
serverChannels []*utils.ServerChannel
|
||||||
|
userConns utils.ConcurrentMap
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewHTTP() services.Service {
|
||||||
|
return &HTTP{
|
||||||
|
outPool: utils.OutConn{},
|
||||||
|
cfg: HTTPArgs{},
|
||||||
|
checker: utils.Checker{},
|
||||||
|
basicAuth: utils.BasicAuth{},
|
||||||
|
lockChn: make(chan bool, 1),
|
||||||
|
isStop: false,
|
||||||
|
serverChannels: []*utils.ServerChannel{},
|
||||||
|
userConns: utils.NewConcurrentMap(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *HTTP) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Parent != "" && *s.cfg.ParentType == "" {
|
||||||
|
err = fmt.Errorf("parent type unkown,use -T <tls|tcp|ssh|kcp>")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "tls" || *s.cfg.LocalType == "tls" {
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.CaCertFile != "" {
|
||||||
|
s.cfg.CaCertBytes, err = ioutil.ReadFile(*s.cfg.CaCertFile)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read ca file error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "ssh" {
|
||||||
|
if *s.cfg.SSHUser == "" {
|
||||||
|
err = fmt.Errorf("ssh user required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.SSHKeyFile == "" && *s.cfg.SSHPassword == "" {
|
||||||
|
err = fmt.Errorf("ssh password or key required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if *s.cfg.SSHPassword != "" {
|
||||||
|
s.cfg.SSHAuthMethod = ssh.Password(*s.cfg.SSHPassword)
|
||||||
|
} else {
|
||||||
|
var SSHSigner ssh.Signer
|
||||||
|
s.cfg.SSHKeyBytes, err = ioutil.ReadFile(*s.cfg.SSHKeyFile)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read key file ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.SSHKeyFileSalt != "" {
|
||||||
|
SSHSigner, err = ssh.ParsePrivateKeyWithPassphrase(s.cfg.SSHKeyBytes, []byte(*s.cfg.SSHKeyFileSalt))
|
||||||
|
} else {
|
||||||
|
SSHSigner, err = ssh.ParsePrivateKey(s.cfg.SSHKeyBytes)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("parse ssh private key fail,ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.cfg.SSHAuthMethod = ssh.PublicKeys(SSHSigner)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *HTTP) InitService() (err error) {
|
||||||
|
s.InitBasicAuth()
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
s.checker = utils.NewChecker(*s.cfg.HTTPTimeout, int64(*s.cfg.Interval), *s.cfg.Blocked, *s.cfg.Direct, s.log)
|
||||||
|
}
|
||||||
|
if *s.cfg.DNSAddress != "" {
|
||||||
|
(*s).domainResolver = utils.NewDomainResolver(*s.cfg.DNSAddress, *s.cfg.DNSTTL, s.log)
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "ssh" {
|
||||||
|
err = s.ConnectSSH()
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("init service fail, ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
//循环检查ssh网络连通性
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn, err := utils.ConnectHost(s.Resolve(*s.cfg.Parent), *s.cfg.Timeout*2)
|
||||||
|
if err == nil {
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = conn.Write([]byte{0})
|
||||||
|
conn.SetDeadline(time.Time{})
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
if s.sshClient != nil {
|
||||||
|
s.sshClient.Close()
|
||||||
|
if s.sshClient.Conn != nil {
|
||||||
|
s.sshClient.Conn.Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
s.log.Printf("ssh offline, retrying...")
|
||||||
|
s.ConnectSSH()
|
||||||
|
} else {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *HTTP) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop http(s) service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service http(s) stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
s.checker.Stop()
|
||||||
|
if s.sshClient != nil {
|
||||||
|
s.sshClient.Close()
|
||||||
|
}
|
||||||
|
for _, sc := range s.serverChannels {
|
||||||
|
if sc.Listener != nil && *sc.Listener != nil {
|
||||||
|
(*sc.Listener).Close()
|
||||||
|
}
|
||||||
|
if sc.UDPListener != nil {
|
||||||
|
(*sc.UDPListener).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *HTTP) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(HTTPArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
s.log.Printf("use %s parent %s", *s.cfg.ParentType, *s.cfg.Parent)
|
||||||
|
s.InitOutConnPool()
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, addr := range strings.Split(*s.cfg.Local, ",") {
|
||||||
|
if addr != "" {
|
||||||
|
host, port, _ := net.SplitHostPort(addr)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
sc := utils.NewServerChannel(host, p, s.log)
|
||||||
|
if *s.cfg.LocalType == "tcp" {
|
||||||
|
err = sc.ListenTCP(s.callback)
|
||||||
|
} else if *s.cfg.LocalType == "tls" {
|
||||||
|
err = sc.ListenTls(s.cfg.CertBytes, s.cfg.KeyBytes, s.cfg.CaCertBytes, s.callback)
|
||||||
|
} else if *s.cfg.LocalType == "kcp" {
|
||||||
|
err = sc.ListenKCP(s.cfg.KCP, s.callback, s.log)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("%s http(s) proxy on %s", *s.cfg.LocalType, (*sc.Listener).Addr())
|
||||||
|
s.serverChannels = append(s.serverChannels, &sc)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *HTTP) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *HTTP) callback(inConn net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("http(s) conn handler crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
if *s.cfg.LocalCompress {
|
||||||
|
inConn = utils.NewCompConn(inConn)
|
||||||
|
}
|
||||||
|
if *s.cfg.LocalKey != "" {
|
||||||
|
inConn = conncrypt.New(inConn, &conncrypt.Config{
|
||||||
|
Password: *s.cfg.LocalKey,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
var err interface{}
|
||||||
|
var req utils.HTTPRequest
|
||||||
|
req, err = utils.NewHTTPRequest(&inConn, 4096, s.IsBasicAuth(), &s.basicAuth, s.log)
|
||||||
|
if err != nil {
|
||||||
|
if err != io.EOF {
|
||||||
|
s.log.Printf("decoder error , from %s, ERR:%s", inConn.RemoteAddr(), err)
|
||||||
|
}
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
address := req.Host
|
||||||
|
host, _, _ := net.SplitHostPort(address)
|
||||||
|
useProxy := false
|
||||||
|
if !utils.IsIternalIP(host, *s.cfg.Always) {
|
||||||
|
useProxy = true
|
||||||
|
if *s.cfg.Parent == "" {
|
||||||
|
useProxy = false
|
||||||
|
} else if *s.cfg.Always {
|
||||||
|
useProxy = true
|
||||||
|
} else {
|
||||||
|
var isInMap bool
|
||||||
|
useProxy, isInMap, _, _ = s.checker.IsBlocked(address)
|
||||||
|
if !isInMap {
|
||||||
|
s.checker.Add(address, s.Resolve(address))
|
||||||
|
}
|
||||||
|
//s.log.Printf("blocked ? : %v, %s , fail:%d ,success:%d", useProxy, address, n, m)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
s.log.Printf("use proxy : %v, %s", useProxy, address)
|
||||||
|
|
||||||
|
err = s.OutToTCP(useProxy, address, &inConn, &req)
|
||||||
|
if err != nil {
|
||||||
|
if *s.cfg.Parent == "" {
|
||||||
|
s.log.Printf("connect to %s fail, ERR:%s", address, err)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("connect to %s parent %s fail", *s.cfg.ParentType, *s.cfg.Parent)
|
||||||
|
}
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *HTTP) OutToTCP(useProxy bool, address string, inConn *net.Conn, req *utils.HTTPRequest) (err interface{}) {
|
||||||
|
inAddr := (*inConn).RemoteAddr().String()
|
||||||
|
inLocalAddr := (*inConn).LocalAddr().String()
|
||||||
|
//防止死循环
|
||||||
|
if s.IsDeadLoop(inLocalAddr, req.Host) {
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
err = fmt.Errorf("dead loop detected , %s", req.Host)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var outConn net.Conn
|
||||||
|
tryCount := 0
|
||||||
|
maxTryCount := 5
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if useProxy {
|
||||||
|
if *s.cfg.ParentType == "ssh" {
|
||||||
|
outConn, err = s.getSSHConn(address)
|
||||||
|
} else {
|
||||||
|
// s.log.Printf("%v", s.outPool)
|
||||||
|
outConn, err = s.outPool.Get()
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
outConn, err = utils.ConnectHost(s.Resolve(address), *s.cfg.Timeout)
|
||||||
|
}
|
||||||
|
tryCount++
|
||||||
|
if err == nil || tryCount > maxTryCount {
|
||||||
|
break
|
||||||
|
} else {
|
||||||
|
s.log.Printf("connect to %s , err:%s,retrying...", *s.cfg.Parent, err)
|
||||||
|
time.Sleep(time.Second * 2)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to %s , err:%s", *s.cfg.Parent, err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentCompress {
|
||||||
|
outConn = utils.NewCompConn(outConn)
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentKey != "" {
|
||||||
|
outConn = conncrypt.New(outConn, &conncrypt.Config{
|
||||||
|
Password: *s.cfg.ParentKey,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
outAddr := outConn.RemoteAddr().String()
|
||||||
|
//outLocalAddr := outConn.LocalAddr().String()
|
||||||
|
if req.IsHTTPS() && (!useProxy || *s.cfg.ParentType == "ssh") {
|
||||||
|
//https无上级或者上级非代理,proxy需要响应connect请求,并直连目标
|
||||||
|
err = req.HTTPSReply()
|
||||||
|
} else {
|
||||||
|
//https或者http,上级是代理,proxy需要转发
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
//直连目标或上级非代理或非SNI,清理HTTP头部的代理头信息.
|
||||||
|
if (!useProxy || *s.cfg.ParentType == "ssh") && !req.IsSNI {
|
||||||
|
_, err = outConn.Write(utils.RemoveProxyHeaders(req.HeadBuf))
|
||||||
|
} else {
|
||||||
|
_, err = outConn.Write(req.HeadBuf)
|
||||||
|
}
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("write to %s , err:%s", *s.cfg.Parent, err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
utils.IoBind((*inConn), outConn, func(err interface{}) {
|
||||||
|
s.log.Printf("conn %s - %s released [%s]", inAddr, outAddr, req.Host)
|
||||||
|
s.userConns.Remove(inAddr)
|
||||||
|
}, s.log)
|
||||||
|
s.log.Printf("conn %s - %s connected [%s]", inAddr, outAddr, req.Host)
|
||||||
|
if c, ok := s.userConns.Get(inAddr); ok {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
s.userConns.Set(inAddr, inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *HTTP) getSSHConn(host string) (outConn net.Conn, err interface{}) {
|
||||||
|
maxTryCount := 1
|
||||||
|
tryCount := 0
|
||||||
|
RETRY:
|
||||||
|
if tryCount >= maxTryCount || s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
wait := make(chan bool, 1)
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if err == nil {
|
||||||
|
err = recover()
|
||||||
|
}
|
||||||
|
wait <- true
|
||||||
|
}()
|
||||||
|
outConn, err = s.sshClient.Dial("tcp", host)
|
||||||
|
}()
|
||||||
|
select {
|
||||||
|
case <-wait:
|
||||||
|
case <-time.After(time.Second * 5):
|
||||||
|
err = fmt.Errorf("ssh dial %s timeout", host)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect ssh fail, ERR: %s, retrying...", err)
|
||||||
|
e := s.ConnectSSH()
|
||||||
|
if e == nil {
|
||||||
|
tryCount++
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
goto RETRY
|
||||||
|
} else {
|
||||||
|
err = e
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *HTTP) ConnectSSH() (err error) {
|
||||||
|
select {
|
||||||
|
case s.lockChn <- true:
|
||||||
|
default:
|
||||||
|
err = fmt.Errorf("can not connect at same time")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
config := ssh.ClientConfig{
|
||||||
|
Timeout: time.Duration(*s.cfg.Timeout) * time.Millisecond,
|
||||||
|
User: *s.cfg.SSHUser,
|
||||||
|
Auth: []ssh.AuthMethod{s.cfg.SSHAuthMethod},
|
||||||
|
HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error {
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
if s.sshClient != nil {
|
||||||
|
s.sshClient.Close()
|
||||||
|
}
|
||||||
|
s.sshClient, err = ssh.Dial("tcp", s.Resolve(*s.cfg.Parent), &config)
|
||||||
|
<-s.lockChn
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *HTTP) InitOutConnPool() {
|
||||||
|
if *s.cfg.ParentType == "tls" || *s.cfg.ParentType == "tcp" || *s.cfg.ParentType == "kcp" {
|
||||||
|
//dur int, isTLS bool, certBytes, keyBytes []byte,
|
||||||
|
//parent string, timeout int, InitialCap int, MaxCap int
|
||||||
|
s.outPool = utils.NewOutConn(
|
||||||
|
*s.cfg.CheckParentInterval,
|
||||||
|
*s.cfg.ParentType,
|
||||||
|
s.cfg.KCP,
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, s.cfg.CaCertBytes,
|
||||||
|
s.Resolve(*s.cfg.Parent),
|
||||||
|
*s.cfg.Timeout,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *HTTP) InitBasicAuth() (err error) {
|
||||||
|
if *s.cfg.DNSAddress != "" {
|
||||||
|
s.basicAuth = utils.NewBasicAuth(&(*s).domainResolver, s.log)
|
||||||
|
} else {
|
||||||
|
s.basicAuth = utils.NewBasicAuth(nil, s.log)
|
||||||
|
}
|
||||||
|
if *s.cfg.AuthURL != "" {
|
||||||
|
s.basicAuth.SetAuthURL(*s.cfg.AuthURL, *s.cfg.AuthURLOkCode, *s.cfg.AuthURLTimeout, *s.cfg.AuthURLRetry)
|
||||||
|
s.log.Printf("auth from %s", *s.cfg.AuthURL)
|
||||||
|
}
|
||||||
|
if *s.cfg.AuthFile != "" {
|
||||||
|
var n = 0
|
||||||
|
n, err = s.basicAuth.AddFromFile(*s.cfg.AuthFile)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("auth-file ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("auth data added from file %d , total:%d", n, s.basicAuth.Total())
|
||||||
|
}
|
||||||
|
if len(*s.cfg.Auth) > 0 {
|
||||||
|
n := s.basicAuth.Add(*s.cfg.Auth)
|
||||||
|
s.log.Printf("auth data added %d, total:%d", n, s.basicAuth.Total())
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *HTTP) IsBasicAuth() bool {
|
||||||
|
return *s.cfg.AuthFile != "" || len(*s.cfg.Auth) > 0 || *s.cfg.AuthURL != ""
|
||||||
|
}
|
||||||
|
func (s *HTTP) IsDeadLoop(inLocalAddr string, host string) bool {
|
||||||
|
inIP, inPort, err := net.SplitHostPort(inLocalAddr)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
outDomain, outPort, err := net.SplitHostPort(host)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if inPort == outPort {
|
||||||
|
var outIPs []net.IP
|
||||||
|
if *s.cfg.DNSAddress != "" {
|
||||||
|
outIPs = []net.IP{net.ParseIP(s.Resolve(outDomain))}
|
||||||
|
} else {
|
||||||
|
outIPs, err = net.LookupIP(outDomain)
|
||||||
|
}
|
||||||
|
if err == nil {
|
||||||
|
for _, ip := range outIPs {
|
||||||
|
if ip.String() == inIP {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
interfaceIPs, err := utils.GetAllInterfaceAddr()
|
||||||
|
for _, ip := range *s.cfg.LocalIPS {
|
||||||
|
interfaceIPs = append(interfaceIPs, net.ParseIP(ip).To4())
|
||||||
|
}
|
||||||
|
if err == nil {
|
||||||
|
for _, localIP := range interfaceIPs {
|
||||||
|
for _, outIP := range outIPs {
|
||||||
|
if localIP.Equal(outIP) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
func (s *HTTP) Resolve(address string) string {
|
||||||
|
if *s.cfg.DNSAddress == "" {
|
||||||
|
return address
|
||||||
|
}
|
||||||
|
ip, err := s.domainResolver.Resolve(address)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("dns error %s , ERR:%s", address, err)
|
||||||
|
return address
|
||||||
|
}
|
||||||
|
return ip
|
||||||
|
}
|
||||||
24
services/kcpcfg/args.go
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
package kcpcfg
|
||||||
|
|
||||||
|
import kcp "github.com/xtaci/kcp-go"
|
||||||
|
|
||||||
|
type KCPConfigArgs struct {
|
||||||
|
Key *string
|
||||||
|
Crypt *string
|
||||||
|
Mode *string
|
||||||
|
MTU *int
|
||||||
|
SndWnd *int
|
||||||
|
RcvWnd *int
|
||||||
|
DataShard *int
|
||||||
|
ParityShard *int
|
||||||
|
DSCP *int
|
||||||
|
NoComp *bool
|
||||||
|
AckNodelay *bool
|
||||||
|
NoDelay *int
|
||||||
|
Interval *int
|
||||||
|
Resend *int
|
||||||
|
NoCongestion *int
|
||||||
|
SockBuf *int
|
||||||
|
KeepAlive *int
|
||||||
|
Block kcp.BlockCrypt
|
||||||
|
}
|
||||||
71
services/keygen/keygen.go
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
package keygen
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
logger "log"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
"github.com/snail007/goproxy/utils/cert"
|
||||||
|
)
|
||||||
|
|
||||||
|
type KeygenArgs struct {
|
||||||
|
CaName *string
|
||||||
|
CertName *string
|
||||||
|
Sign *bool
|
||||||
|
SignDays *int
|
||||||
|
CommonName *string
|
||||||
|
}
|
||||||
|
|
||||||
|
type Keygen struct {
|
||||||
|
cfg KeygenArgs
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewKeygen() services.Service {
|
||||||
|
return &Keygen{}
|
||||||
|
}
|
||||||
|
func (s *Keygen) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Sign && (*s.cfg.CertName == "" || *s.cfg.CaName == "") {
|
||||||
|
err = fmt.Errorf("ca name and cert name required for signin")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if !*s.cfg.Sign && *s.cfg.CaName == "" {
|
||||||
|
err = fmt.Errorf("ca name required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.CommonName == "" {
|
||||||
|
domainSubfixList := []string{".com", ".edu", ".gov", ".int", ".mil", ".net", ".org", ".biz", ".info", ".pro", ".name", ".museum", ".coop", ".aero", ".xxx", ".idv", ".ac", ".ad", ".ae", ".af", ".ag", ".ai", ".al", ".am", ".an", ".ao", ".aq", ".ar", ".as", ".at", ".au", ".aw", ".az", ".ba", ".bb", ".bd", ".be", ".bf", ".bg", ".bh", ".bi", ".bj", ".bm", ".bn", ".bo", ".br", ".bs", ".bt", ".bv", ".bw", ".by", ".bz", ".ca", ".cc", ".cd", ".cf", ".cg", ".ch", ".ci", ".ck", ".cl", ".cm", ".cn", ".co", ".cr", ".cu", ".cv", ".cx", ".cy", ".cz", ".de", ".dj", ".dk", ".dm", ".do", ".dz", ".ec", ".ee", ".eg", ".eh", ".er", ".es", ".et", ".eu", ".fi", ".fj", ".fk", ".fm", ".fo", ".fr", ".ga", ".gd", ".ge", ".gf", ".gg", ".gh", ".gi", ".gl", ".gm", ".gn", ".gp", ".gq", ".gr", ".gs", ".gt", ".gu", ".gw", ".gy", ".hk", ".hm", ".hn", ".hr", ".ht", ".hu", ".id", ".ie", ".il", ".im", ".in", ".io", ".iq", ".ir", ".is", ".it", ".je", ".jm", ".jo", ".jp", ".ke", ".kg", ".kh", ".ki", ".km", ".kn", ".kp", ".kr", ".kw", ".ky", ".kz", ".la", ".lb", ".lc", ".li", ".lk", ".lr", ".ls", ".lt", ".lu", ".lv", ".ly", ".ma", ".mc", ".md", ".mg", ".mh", ".mk", ".ml", ".mm", ".mn", ".mo", ".mp", ".mq", ".mr", ".ms", ".mt", ".mu", ".mv", ".mw", ".mx", ".my", ".mz", ".na", ".nc", ".ne", ".nf", ".ng", ".ni", ".nl", ".no", ".np", ".nr", ".nu", ".nz", ".om", ".pa", ".pe", ".pf", ".pg", ".ph", ".pk", ".pl", ".pm", ".pn", ".pr", ".ps", ".pt", ".pw", ".py", ".qa", ".re", ".ro", ".ru", ".rw", ".sa", ".sb", ".sc", ".sd", ".se", ".sg", ".sh", ".si", ".sj", ".sk", ".sl", ".sm", ".sn", ".so", ".sr", ".st", ".sv", ".sy", ".sz", ".tc", ".td", ".tf", ".tg", ".th", ".tj", ".tk", ".tl", ".tm", ".tn", ".to", ".tp", ".tr", ".tt", ".tv", ".tw", ".tz", ".ua", ".ug", ".uk", ".um", ".us", ".uy", ".uz", ".va", ".vc", ".ve", ".vg", ".vi", ".vn", ".vu", ".wf", ".ws", ".ye", ".yt", ".yu", ".yr", ".za", ".zm", ".zw"}
|
||||||
|
CN := strings.ToLower(utils.RandString(int(utils.RandInt(4)%10)) + domainSubfixList[int(utils.RandInt(4))%len(domainSubfixList)])
|
||||||
|
*s.cfg.CommonName = CN
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Keygen) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(KeygenArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.Sign {
|
||||||
|
caCert, caKey, err := cert.ParseCertAndKey(*s.cfg.CaName+".crt", *s.cfg.CaName+".key")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = cert.CreateSignCertToFile(caCert, caKey, *s.cfg.CommonName, *s.cfg.SignDays, *s.cfg.CertName)
|
||||||
|
} else {
|
||||||
|
err = cert.CreateCaToFile(*s.cfg.CaName, *s.cfg.CommonName, *s.cfg.SignDays)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Println("success")
|
||||||
|
os.Exit(0)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Keygen) Clean() {
|
||||||
|
|
||||||
|
}
|
||||||
301
services/mux/mux_bridge.go
Normal file
@ -0,0 +1,301 @@
|
|||||||
|
package mux
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
logger "log"
|
||||||
|
"math/rand"
|
||||||
|
"net"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
//"github.com/xtaci/smux"
|
||||||
|
smux "github.com/hashicorp/yamux"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
CONN_SERVER = uint8(4)
|
||||||
|
CONN_CLIENT = uint8(5)
|
||||||
|
)
|
||||||
|
|
||||||
|
type MuxBridgeArgs struct {
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Local *string
|
||||||
|
LocalType *string
|
||||||
|
Timeout *int
|
||||||
|
IsCompress *bool
|
||||||
|
KCP kcpcfg.KCPConfigArgs
|
||||||
|
}
|
||||||
|
type MuxBridge struct {
|
||||||
|
cfg MuxBridgeArgs
|
||||||
|
clientControlConns utils.ConcurrentMap
|
||||||
|
serverConns utils.ConcurrentMap
|
||||||
|
router utils.ClientKeyRouter
|
||||||
|
l *sync.Mutex
|
||||||
|
isStop bool
|
||||||
|
sc *utils.ServerChannel
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewMuxBridge() services.Service {
|
||||||
|
b := &MuxBridge{
|
||||||
|
cfg: MuxBridgeArgs{},
|
||||||
|
clientControlConns: utils.NewConcurrentMap(),
|
||||||
|
serverConns: utils.NewConcurrentMap(),
|
||||||
|
l: &sync.Mutex{},
|
||||||
|
isStop: false,
|
||||||
|
}
|
||||||
|
b.router = utils.NewClientKeyRouter(&b.clientControlConns, 50000)
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *MuxBridge) InitService() (err error) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxBridge) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.CertFile == "" || *s.cfg.KeyFile == "" {
|
||||||
|
err = fmt.Errorf("cert and key file required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.LocalType == "tls" {
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxBridge) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop bridge service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service bridge stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
if s.sc != nil && (*s.sc).Listener != nil {
|
||||||
|
(*(*s.sc).Listener).Close()
|
||||||
|
}
|
||||||
|
for _, g := range s.clientControlConns.Items() {
|
||||||
|
for _, session := range g.(*utils.ConcurrentMap).Items() {
|
||||||
|
(session.(*smux.Session)).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, c := range s.serverConns.Items() {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *MuxBridge) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(MuxBridgeArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
host, port, _ := net.SplitHostPort(*s.cfg.Local)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
sc := utils.NewServerChannel(host, p, s.log)
|
||||||
|
if *s.cfg.LocalType == "tcp" {
|
||||||
|
err = sc.ListenTCP(s.handler)
|
||||||
|
} else if *s.cfg.LocalType == "tls" {
|
||||||
|
err = sc.ListenTls(s.cfg.CertBytes, s.cfg.KeyBytes, nil, s.handler)
|
||||||
|
} else if *s.cfg.LocalType == "kcp" {
|
||||||
|
err = sc.ListenKCP(s.cfg.KCP, s.handler, s.log)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.sc = &sc
|
||||||
|
s.log.Printf("%s bridge on %s", *s.cfg.LocalType, (*sc.Listener).Addr())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxBridge) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *MuxBridge) handler(inConn net.Conn) {
|
||||||
|
reader := bufio.NewReader(inConn)
|
||||||
|
|
||||||
|
var err error
|
||||||
|
var connType uint8
|
||||||
|
var key string
|
||||||
|
inConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
err = utils.ReadPacket(reader, &connType, &key)
|
||||||
|
inConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
switch connType {
|
||||||
|
case CONN_SERVER:
|
||||||
|
var serverID string
|
||||||
|
inAddr := inConn.RemoteAddr().String()
|
||||||
|
inConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
err = utils.ReadPacketData(reader, &serverID)
|
||||||
|
inConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("server connection %s %s connected", serverID, key)
|
||||||
|
if c, ok := s.serverConns.Get(inAddr); ok {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
s.serverConns.Set(inAddr, &inConn)
|
||||||
|
session, err := smux.Server(inConn, nil)
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
s.log.Printf("server session error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
stream, err := session.AcceptStream()
|
||||||
|
if err != nil {
|
||||||
|
session.Close()
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
s.serverConns.Remove(inAddr)
|
||||||
|
s.log.Printf("server connection %s %s released", serverID, key)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("bridge callback crashed,err: %s", e)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.callback(stream, serverID, key)
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
case CONN_CLIENT:
|
||||||
|
s.log.Printf("client connection %s connected", key)
|
||||||
|
session, err := smux.Client(inConn, nil)
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
s.log.Printf("client session error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
keyInfo := strings.Split(key, "-")
|
||||||
|
if len(keyInfo) != 2 {
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
s.log.Printf("client key format error,key:%s", key)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
groupKey := keyInfo[0]
|
||||||
|
index := keyInfo[1]
|
||||||
|
s.l.Lock()
|
||||||
|
defer s.l.Unlock()
|
||||||
|
if !s.clientControlConns.Has(groupKey) {
|
||||||
|
item := utils.NewConcurrentMap()
|
||||||
|
s.clientControlConns.Set(groupKey, &item)
|
||||||
|
}
|
||||||
|
_group, _ := s.clientControlConns.Get(groupKey)
|
||||||
|
group := _group.(*utils.ConcurrentMap)
|
||||||
|
if v, ok := group.Get(index); ok {
|
||||||
|
v.(*smux.Session).Close()
|
||||||
|
}
|
||||||
|
group.Set(index, session)
|
||||||
|
// s.clientControlConns.Set(key, session)
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if session.IsClosed() {
|
||||||
|
s.l.Lock()
|
||||||
|
defer s.l.Unlock()
|
||||||
|
if sess, ok := group.Get(index); ok && sess.(*smux.Session).IsClosed() {
|
||||||
|
group.Remove(index)
|
||||||
|
s.log.Printf("client connection %s released", key)
|
||||||
|
}
|
||||||
|
if group.IsEmpty() {
|
||||||
|
s.clientControlConns.Remove(groupKey)
|
||||||
|
}
|
||||||
|
break
|
||||||
|
}
|
||||||
|
time.Sleep(time.Second * 5)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
//s.log.Printf("set client session,key: %s", key)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
func (s *MuxBridge) callback(inConn net.Conn, serverID, key string) {
|
||||||
|
try := 20
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
try--
|
||||||
|
if try == 0 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if key == "*" {
|
||||||
|
key = s.router.GetKey()
|
||||||
|
}
|
||||||
|
_group, ok := s.clientControlConns.Get(key)
|
||||||
|
if !ok {
|
||||||
|
s.log.Printf("client %s session not exists for server stream %s, retrying...", key, serverID)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
group := _group.(*utils.ConcurrentMap)
|
||||||
|
keys := group.Keys()
|
||||||
|
keysLen := len(keys)
|
||||||
|
i := 0
|
||||||
|
if keysLen > 0 {
|
||||||
|
i = rand.Intn(keysLen)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("client %s session empty for server stream %s, retrying...", key, serverID)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
index := keys[i]
|
||||||
|
s.log.Printf("select client : %s-%s", key, index)
|
||||||
|
session, _ := group.Get(index)
|
||||||
|
//session.(*smux.Session).SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
stream, err := session.(*smux.Session).OpenStream()
|
||||||
|
//session.(*smux.Session).SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("%s client session open stream %s fail, err: %s, retrying...", key, serverID, err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
s.log.Printf("stream %s -> %s created", serverID, key)
|
||||||
|
die1 := make(chan bool, 1)
|
||||||
|
die2 := make(chan bool, 1)
|
||||||
|
go func() {
|
||||||
|
io.Copy(stream, inConn)
|
||||||
|
die1 <- true
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
io.Copy(inConn, stream)
|
||||||
|
die2 <- true
|
||||||
|
}()
|
||||||
|
select {
|
||||||
|
case <-die1:
|
||||||
|
case <-die2:
|
||||||
|
}
|
||||||
|
stream.Close()
|
||||||
|
inConn.Close()
|
||||||
|
s.log.Printf("%s server %s stream released", key, serverID)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
320
services/mux/mux_client.go
Normal file
@ -0,0 +1,320 @@
|
|||||||
|
package mux
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/golang/snappy"
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
//"github.com/xtaci/smux"
|
||||||
|
smux "github.com/hashicorp/yamux"
|
||||||
|
)
|
||||||
|
|
||||||
|
type MuxClientArgs struct {
|
||||||
|
Parent *string
|
||||||
|
ParentType *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Key *string
|
||||||
|
Timeout *int
|
||||||
|
IsCompress *bool
|
||||||
|
SessionCount *int
|
||||||
|
KCP kcpcfg.KCPConfigArgs
|
||||||
|
}
|
||||||
|
type MuxClient struct {
|
||||||
|
cfg MuxClientArgs
|
||||||
|
isStop bool
|
||||||
|
sessions utils.ConcurrentMap
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewMuxClient() services.Service {
|
||||||
|
return &MuxClient{
|
||||||
|
cfg: MuxClientArgs{},
|
||||||
|
isStop: false,
|
||||||
|
sessions: utils.NewConcurrentMap(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *MuxClient) InitService() (err error) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *MuxClient) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
s.log.Printf("use tls parent %s", *s.cfg.Parent)
|
||||||
|
} else {
|
||||||
|
err = fmt.Errorf("parent required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.CertFile == "" || *s.cfg.KeyFile == "" {
|
||||||
|
err = fmt.Errorf("cert and key file required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "tls" {
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxClient) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop client service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service client stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
for _, sess := range s.sessions.Items() {
|
||||||
|
sess.(*smux.Session).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *MuxClient) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(MuxClientArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("client started")
|
||||||
|
count := 1
|
||||||
|
if *s.cfg.SessionCount > 0 {
|
||||||
|
count = *s.cfg.SessionCount
|
||||||
|
}
|
||||||
|
for i := 1; i <= count; i++ {
|
||||||
|
key := fmt.Sprintf("worker[%d]", i)
|
||||||
|
s.log.Printf("session %s started", key)
|
||||||
|
go func(i int) {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("session worker crashed: %s", e)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn, err := s.getParentConn()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connection err: %s, retrying...", err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = conn.Write(utils.BuildPacket(CONN_CLIENT, fmt.Sprintf("%s-%d", *s.cfg.Key, i)))
|
||||||
|
conn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
conn.Close()
|
||||||
|
s.log.Printf("connection err: %s, retrying...", err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
session, err := smux.Server(conn, nil)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("session err: %s, retrying...", err)
|
||||||
|
conn.Close()
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if _sess, ok := s.sessions.Get(key); ok {
|
||||||
|
_sess.(*smux.Session).Close()
|
||||||
|
}
|
||||||
|
s.sessions.Set(key, session)
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
stream, err := session.AcceptStream()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("accept stream err: %s, retrying...", err)
|
||||||
|
session.Close()
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stream handler crashed: %s", e)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
var ID, clientLocalAddr, serverID string
|
||||||
|
stream.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
err = utils.ReadPacketData(stream, &ID, &clientLocalAddr, &serverID)
|
||||||
|
stream.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read stream signal err: %s", err)
|
||||||
|
stream.Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("worker[%d] signal revecived,server %s stream %s %s", i, serverID, ID, clientLocalAddr)
|
||||||
|
protocol := clientLocalAddr[:3]
|
||||||
|
localAddr := clientLocalAddr[4:]
|
||||||
|
if protocol == "udp" {
|
||||||
|
s.ServeUDP(stream, localAddr, ID)
|
||||||
|
} else {
|
||||||
|
s.ServeConn(stream, localAddr, ID)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}(i)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxClient) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *MuxClient) getParentConn() (conn net.Conn, err error) {
|
||||||
|
if *s.cfg.ParentType == "tls" {
|
||||||
|
var _conn tls.Conn
|
||||||
|
_conn, err = utils.TlsConnectHost(*s.cfg.Parent, *s.cfg.Timeout, s.cfg.CertBytes, s.cfg.KeyBytes, nil)
|
||||||
|
if err == nil {
|
||||||
|
conn = net.Conn(&_conn)
|
||||||
|
}
|
||||||
|
} else if *s.cfg.ParentType == "kcp" {
|
||||||
|
conn, err = utils.ConnectKCPHost(*s.cfg.Parent, s.cfg.KCP)
|
||||||
|
} else {
|
||||||
|
conn, err = utils.ConnectHost(*s.cfg.Parent, *s.cfg.Timeout)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxClient) ServeUDP(inConn *smux.Stream, localAddr, ID string) {
|
||||||
|
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
inConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
srcAddr, body, err := utils.ReadUDPPacket(inConn)
|
||||||
|
inConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp packet revecived fail, err: %s", err)
|
||||||
|
s.log.Printf("connection %s released", ID)
|
||||||
|
inConn.Close()
|
||||||
|
break
|
||||||
|
} else {
|
||||||
|
//s.log.Printf("udp packet revecived:%s,%v", srcAddr, body)
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("client processUDPPacket crashed,err: %s", e)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.processUDPPacket(inConn, srcAddr, localAddr, body)
|
||||||
|
}()
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
// }
|
||||||
|
}
|
||||||
|
func (s *MuxClient) processUDPPacket(inConn *smux.Stream, srcAddr, localAddr string, body []byte) {
|
||||||
|
dstAddr, err := net.ResolveUDPAddr("udp", localAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("can't resolve address: %s", err)
|
||||||
|
inConn.Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
clientSrcAddr := &net.UDPAddr{IP: net.IPv4zero, Port: 0}
|
||||||
|
conn, err := net.DialUDP("udp", clientSrcAddr, dstAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to udp %s fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = conn.Write(body)
|
||||||
|
conn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("send udp packet to %s fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("send udp packet to %s success", dstAddr.String())
|
||||||
|
buf := make([]byte, 1024)
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
length, _, err := conn.ReadFromUDP(buf)
|
||||||
|
conn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read udp response from %s fail ,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
respBody := buf[0:length]
|
||||||
|
//s.log.Printf("revecived udp packet from %s , %v", dstAddr.String(), respBody)
|
||||||
|
bs := utils.UDPPacket(srcAddr, respBody)
|
||||||
|
(*inConn).SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = (*inConn).Write(bs)
|
||||||
|
(*inConn).SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("send udp response fail ,ERR:%s", err)
|
||||||
|
inConn.Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("send udp response success ,from:%s ,%d ,%v", dstAddr.String(), len(bs), bs)
|
||||||
|
}
|
||||||
|
func (s *MuxClient) ServeConn(inConn *smux.Stream, localAddr, ID string) {
|
||||||
|
var err error
|
||||||
|
var outConn net.Conn
|
||||||
|
i := 0
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
i++
|
||||||
|
outConn, err = utils.ConnectHost(localAddr, *s.cfg.Timeout)
|
||||||
|
if err == nil || i == 3 {
|
||||||
|
break
|
||||||
|
} else {
|
||||||
|
if i == 3 {
|
||||||
|
s.log.Printf("connect to %s err: %s, retrying...", localAddr, err)
|
||||||
|
time.Sleep(2 * time.Second)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
inConn.Close()
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
s.log.Printf("build connection error, err: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
s.log.Printf("stream %s created", ID)
|
||||||
|
if *s.cfg.IsCompress {
|
||||||
|
die1 := make(chan bool, 1)
|
||||||
|
die2 := make(chan bool, 1)
|
||||||
|
go func() {
|
||||||
|
io.Copy(outConn, snappy.NewReader(inConn))
|
||||||
|
die1 <- true
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
io.Copy(snappy.NewWriter(inConn), outConn)
|
||||||
|
die2 <- true
|
||||||
|
}()
|
||||||
|
select {
|
||||||
|
case <-die1:
|
||||||
|
case <-die2:
|
||||||
|
}
|
||||||
|
outConn.Close()
|
||||||
|
inConn.Close()
|
||||||
|
s.log.Printf("%s stream %s released", *s.cfg.Key, ID)
|
||||||
|
} else {
|
||||||
|
utils.IoBind(inConn, outConn, func(err interface{}) {
|
||||||
|
s.log.Printf("stream %s released", ID)
|
||||||
|
}, s.log)
|
||||||
|
}
|
||||||
|
}
|
||||||
476
services/mux/mux_server.go
Normal file
@ -0,0 +1,476 @@
|
|||||||
|
package mux
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
logger "log"
|
||||||
|
"math/rand"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
|
||||||
|
"github.com/golang/snappy"
|
||||||
|
//"github.com/xtaci/smux"
|
||||||
|
smux "github.com/hashicorp/yamux"
|
||||||
|
)
|
||||||
|
|
||||||
|
type MuxServerArgs struct {
|
||||||
|
Parent *string
|
||||||
|
ParentType *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Local *string
|
||||||
|
IsUDP *bool
|
||||||
|
Key *string
|
||||||
|
Remote *string
|
||||||
|
Timeout *int
|
||||||
|
Route *[]string
|
||||||
|
Mgr *MuxServerManager
|
||||||
|
IsCompress *bool
|
||||||
|
SessionCount *int
|
||||||
|
KCP kcpcfg.KCPConfigArgs
|
||||||
|
}
|
||||||
|
|
||||||
|
type MuxUDPItem struct {
|
||||||
|
packet *[]byte
|
||||||
|
localAddr *net.UDPAddr
|
||||||
|
srcAddr *net.UDPAddr
|
||||||
|
}
|
||||||
|
|
||||||
|
type MuxServerManager struct {
|
||||||
|
cfg MuxServerArgs
|
||||||
|
udpChn chan MuxUDPItem
|
||||||
|
serverID string
|
||||||
|
servers []*services.Service
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewMuxServerManager() services.Service {
|
||||||
|
return &MuxServerManager{
|
||||||
|
cfg: MuxServerArgs{},
|
||||||
|
udpChn: make(chan MuxUDPItem, 50000),
|
||||||
|
serverID: utils.Uniqueid(),
|
||||||
|
servers: []*services.Service{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *MuxServerManager) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(MuxServerArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
s.log.Printf("use %s parent %s", *s.cfg.ParentType, *s.cfg.Parent)
|
||||||
|
} else {
|
||||||
|
err = fmt.Errorf("parent required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
s.log.Printf("server id: %s", s.serverID)
|
||||||
|
//s.log.Printf("route:%v", *s.cfg.Route)
|
||||||
|
for _, _info := range *s.cfg.Route {
|
||||||
|
if _info == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
IsUDP := *s.cfg.IsUDP
|
||||||
|
if strings.HasPrefix(_info, "udp://") {
|
||||||
|
IsUDP = true
|
||||||
|
}
|
||||||
|
info := strings.TrimPrefix(_info, "udp://")
|
||||||
|
info = strings.TrimPrefix(info, "tcp://")
|
||||||
|
_routeInfo := strings.Split(info, "@")
|
||||||
|
server := NewMuxServer()
|
||||||
|
|
||||||
|
local := _routeInfo[0]
|
||||||
|
remote := _routeInfo[1]
|
||||||
|
KEY := *s.cfg.Key
|
||||||
|
if strings.HasPrefix(remote, "[") {
|
||||||
|
KEY = remote[1:strings.LastIndex(remote, "]")]
|
||||||
|
remote = remote[strings.LastIndex(remote, "]")+1:]
|
||||||
|
}
|
||||||
|
if strings.HasPrefix(remote, ":") {
|
||||||
|
remote = fmt.Sprintf("127.0.0.1%s", remote)
|
||||||
|
}
|
||||||
|
err = server.Start(MuxServerArgs{
|
||||||
|
CertBytes: s.cfg.CertBytes,
|
||||||
|
KeyBytes: s.cfg.KeyBytes,
|
||||||
|
Parent: s.cfg.Parent,
|
||||||
|
CertFile: s.cfg.CertFile,
|
||||||
|
KeyFile: s.cfg.KeyFile,
|
||||||
|
Local: &local,
|
||||||
|
IsUDP: &IsUDP,
|
||||||
|
Remote: &remote,
|
||||||
|
Key: &KEY,
|
||||||
|
Timeout: s.cfg.Timeout,
|
||||||
|
Mgr: s,
|
||||||
|
IsCompress: s.cfg.IsCompress,
|
||||||
|
SessionCount: s.cfg.SessionCount,
|
||||||
|
KCP: s.cfg.KCP,
|
||||||
|
ParentType: s.cfg.ParentType,
|
||||||
|
}, log)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.servers = append(s.servers, &server)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxServerManager) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *MuxServerManager) StopService() {
|
||||||
|
for _, server := range s.servers {
|
||||||
|
(*server).Clean()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *MuxServerManager) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.CertFile == "" || *s.cfg.KeyFile == "" {
|
||||||
|
err = fmt.Errorf("cert and key file required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "tls" {
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxServerManager) InitService() (err error) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
type MuxServer struct {
|
||||||
|
cfg MuxServerArgs
|
||||||
|
udpChn chan MuxUDPItem
|
||||||
|
sc utils.ServerChannel
|
||||||
|
sessions utils.ConcurrentMap
|
||||||
|
lockChn chan bool
|
||||||
|
isStop bool
|
||||||
|
udpConn *net.Conn
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewMuxServer() services.Service {
|
||||||
|
return &MuxServer{
|
||||||
|
cfg: MuxServerArgs{},
|
||||||
|
udpChn: make(chan MuxUDPItem, 50000),
|
||||||
|
lockChn: make(chan bool, 1),
|
||||||
|
sessions: utils.NewConcurrentMap(),
|
||||||
|
isStop: false,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *MuxServer) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop server service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service server stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
for _, sess := range s.sessions.Items() {
|
||||||
|
sess.(*smux.Session).Close()
|
||||||
|
}
|
||||||
|
if s.sc.Listener != nil {
|
||||||
|
(*s.sc.Listener).Close()
|
||||||
|
}
|
||||||
|
if s.sc.UDPListener != nil {
|
||||||
|
(*s.sc.UDPListener).Close()
|
||||||
|
}
|
||||||
|
if s.udpConn != nil {
|
||||||
|
(*s.udpConn).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *MuxServer) InitService() (err error) {
|
||||||
|
s.UDPConnDeamon()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxServer) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Remote == "" {
|
||||||
|
err = fmt.Errorf("remote required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *MuxServer) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(MuxServerArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
host, port, _ := net.SplitHostPort(*s.cfg.Local)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
s.sc = utils.NewServerChannel(host, p, s.log)
|
||||||
|
if *s.cfg.IsUDP {
|
||||||
|
err = s.sc.ListenUDP(func(packet []byte, localAddr, srcAddr *net.UDPAddr) {
|
||||||
|
s.udpChn <- MuxUDPItem{
|
||||||
|
packet: &packet,
|
||||||
|
localAddr: localAddr,
|
||||||
|
srcAddr: srcAddr,
|
||||||
|
}
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("server on %s", (*s.sc.UDPListener).LocalAddr())
|
||||||
|
} else {
|
||||||
|
err = s.sc.ListenTCP(func(inConn net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("connection handler crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
var outConn net.Conn
|
||||||
|
var ID string
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
outConn, ID, err = s.GetOutConn()
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
s.log.Printf("connect to %s fail, err: %s, retrying...", *s.cfg.Parent, err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
s.log.Printf("%s stream %s created", *s.cfg.Key, ID)
|
||||||
|
if *s.cfg.IsCompress {
|
||||||
|
die1 := make(chan bool, 1)
|
||||||
|
die2 := make(chan bool, 1)
|
||||||
|
go func() {
|
||||||
|
io.Copy(inConn, snappy.NewReader(outConn))
|
||||||
|
die1 <- true
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
io.Copy(snappy.NewWriter(outConn), inConn)
|
||||||
|
die2 <- true
|
||||||
|
}()
|
||||||
|
select {
|
||||||
|
case <-die1:
|
||||||
|
case <-die2:
|
||||||
|
}
|
||||||
|
outConn.Close()
|
||||||
|
inConn.Close()
|
||||||
|
s.log.Printf("%s stream %s released", *s.cfg.Key, ID)
|
||||||
|
} else {
|
||||||
|
utils.IoBind(inConn, outConn, func(err interface{}) {
|
||||||
|
s.log.Printf("%s stream %s released", *s.cfg.Key, ID)
|
||||||
|
}, s.log)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("server on %s", (*s.sc.Listener).Addr())
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxServer) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *MuxServer) GetOutConn() (outConn net.Conn, ID string, err error) {
|
||||||
|
i := 1
|
||||||
|
if *s.cfg.SessionCount > 0 {
|
||||||
|
i = rand.Intn(*s.cfg.SessionCount)
|
||||||
|
}
|
||||||
|
outConn, err = s.GetConn(fmt.Sprintf("%d", i))
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connection err: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
remoteAddr := "tcp:" + *s.cfg.Remote
|
||||||
|
if *s.cfg.IsUDP {
|
||||||
|
remoteAddr = "udp:" + *s.cfg.Remote
|
||||||
|
}
|
||||||
|
ID = utils.Uniqueid()
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = outConn.Write(utils.BuildPacketData(ID, remoteAddr, s.cfg.Mgr.serverID))
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("write stream data err: %s ,retrying...", err)
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxServer) GetConn(index string) (conn net.Conn, err error) {
|
||||||
|
select {
|
||||||
|
case s.lockChn <- true:
|
||||||
|
default:
|
||||||
|
err = fmt.Errorf("can not connect at same time")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
<-s.lockChn
|
||||||
|
}()
|
||||||
|
var session *smux.Session
|
||||||
|
_session, ok := s.sessions.Get(index)
|
||||||
|
if !ok {
|
||||||
|
var c net.Conn
|
||||||
|
c, err = s.getParentConn()
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
c.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = c.Write(utils.BuildPacket(CONN_SERVER, *s.cfg.Key, s.cfg.Mgr.serverID))
|
||||||
|
c.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
c.Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err == nil {
|
||||||
|
session, err = smux.Client(c, nil)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if _sess, ok := s.sessions.Get(index); ok {
|
||||||
|
_sess.(*smux.Session).Close()
|
||||||
|
}
|
||||||
|
s.sessions.Set(index, session)
|
||||||
|
s.log.Printf("session[%s] created", index)
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if session.IsClosed() {
|
||||||
|
s.sessions.Remove(index)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
time.Sleep(time.Second * 5)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
} else {
|
||||||
|
session = _session.(*smux.Session)
|
||||||
|
}
|
||||||
|
conn, err = session.OpenStream()
|
||||||
|
if err != nil {
|
||||||
|
session.Close()
|
||||||
|
s.sessions.Remove(index)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxServer) getParentConn() (conn net.Conn, err error) {
|
||||||
|
if *s.cfg.ParentType == "tls" {
|
||||||
|
var _conn tls.Conn
|
||||||
|
_conn, err = utils.TlsConnectHost(*s.cfg.Parent, *s.cfg.Timeout, s.cfg.CertBytes, s.cfg.KeyBytes, nil)
|
||||||
|
if err == nil {
|
||||||
|
conn = net.Conn(&_conn)
|
||||||
|
}
|
||||||
|
} else if *s.cfg.ParentType == "kcp" {
|
||||||
|
conn, err = utils.ConnectKCPHost(*s.cfg.Parent, s.cfg.KCP)
|
||||||
|
} else {
|
||||||
|
conn, err = utils.ConnectHost(*s.cfg.Parent, *s.cfg.Timeout)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MuxServer) UDPConnDeamon() {
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("udp conn deamon crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
var outConn net.Conn
|
||||||
|
var ID string
|
||||||
|
var err error
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
item := <-s.udpChn
|
||||||
|
RETRY:
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if outConn == nil {
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
outConn, ID, err = s.GetOutConn()
|
||||||
|
if err != nil {
|
||||||
|
outConn = nil
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
s.log.Printf("connect to %s fail, err: %s, retrying...", *s.cfg.Parent, err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
go func(outConn net.Conn, ID string) {
|
||||||
|
if s.udpConn != nil {
|
||||||
|
(*s.udpConn).Close()
|
||||||
|
}
|
||||||
|
s.udpConn = &outConn
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
srcAddrFromConn, body, err := utils.ReadUDPPacket(outConn)
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("parse revecived udp packet fail, err: %s ,%v", err, body)
|
||||||
|
s.log.Printf("UDP deamon connection %s exited", ID)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
//s.log.Printf("udp packet revecived over parent , local:%s", srcAddrFromConn)
|
||||||
|
_srcAddr := strings.Split(srcAddrFromConn, ":")
|
||||||
|
if len(_srcAddr) != 2 {
|
||||||
|
s.log.Printf("parse revecived udp packet fail, addr error : %s", srcAddrFromConn)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
port, _ := strconv.Atoi(_srcAddr[1])
|
||||||
|
dstAddr := &net.UDPAddr{IP: net.ParseIP(_srcAddr[0]), Port: port}
|
||||||
|
s.sc.UDPListener.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = s.sc.UDPListener.WriteToUDP(body, dstAddr)
|
||||||
|
s.sc.UDPListener.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp response to local %s fail,ERR:%s", srcAddrFromConn, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
//s.log.Printf("udp response to local %s success , %v", srcAddrFromConn, body)
|
||||||
|
}
|
||||||
|
}(outConn, ID)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
outConn.SetWriteDeadline(time.Now().Add(time.Second))
|
||||||
|
_, err = outConn.Write(utils.UDPPacket(item.srcAddr.String(), *item.packet))
|
||||||
|
outConn.SetWriteDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
outConn = nil
|
||||||
|
s.log.Printf("write udp packet to %s fail ,flush err:%s ,retrying...", *s.cfg.Parent, err)
|
||||||
|
goto RETRY
|
||||||
|
}
|
||||||
|
//s.log.Printf("write packet %v", *item.packet)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
64
services/service.go
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
package services
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
logger "log"
|
||||||
|
"runtime/debug"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Service interface {
|
||||||
|
Start(args interface{}, log *logger.Logger) (err error)
|
||||||
|
Clean()
|
||||||
|
}
|
||||||
|
type ServiceItem struct {
|
||||||
|
S Service
|
||||||
|
Args interface{}
|
||||||
|
Name string
|
||||||
|
Log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
var servicesMap = map[string]*ServiceItem{}
|
||||||
|
|
||||||
|
func Regist(name string, s Service, args interface{}, log *logger.Logger) {
|
||||||
|
Stop(name)
|
||||||
|
servicesMap[name] = &ServiceItem{
|
||||||
|
S: s,
|
||||||
|
Args: args,
|
||||||
|
Name: name,
|
||||||
|
Log: log,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func GetService(name string) *ServiceItem {
|
||||||
|
if s, ok := servicesMap[name]; ok && s.S != nil {
|
||||||
|
return s
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
|
||||||
|
}
|
||||||
|
func Stop(name string) {
|
||||||
|
if s, ok := servicesMap[name]; ok && s.S != nil {
|
||||||
|
s.S.Clean()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func Run(name string, args interface{}) (service *ServiceItem, err error) {
|
||||||
|
service, ok := servicesMap[name]
|
||||||
|
if ok {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
err = fmt.Errorf("%s servcie crashed, ERR: %s\ntrace:%s", name, e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
if args != nil {
|
||||||
|
err = service.S.Start(args, service.Log)
|
||||||
|
} else {
|
||||||
|
err = service.S.Start(service.Args, service.Log)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("%s servcie fail, ERR: %s", name, err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
err = fmt.Errorf("service %s not found", name)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
636
services/socks/socks.go
Normal file
@ -0,0 +1,636 @@
|
|||||||
|
package socks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
"github.com/snail007/goproxy/utils/conncrypt"
|
||||||
|
"github.com/snail007/goproxy/utils/socks"
|
||||||
|
"golang.org/x/crypto/ssh"
|
||||||
|
)
|
||||||
|
|
||||||
|
type SocksArgs struct {
|
||||||
|
Parent *string
|
||||||
|
ParentType *string
|
||||||
|
Local *string
|
||||||
|
LocalType *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CaCertFile *string
|
||||||
|
CaCertBytes []byte
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
SSHKeyFile *string
|
||||||
|
SSHKeyFileSalt *string
|
||||||
|
SSHPassword *string
|
||||||
|
SSHUser *string
|
||||||
|
SSHKeyBytes []byte
|
||||||
|
SSHAuthMethod ssh.AuthMethod
|
||||||
|
Timeout *int
|
||||||
|
Always *bool
|
||||||
|
Interval *int
|
||||||
|
Blocked *string
|
||||||
|
Direct *string
|
||||||
|
AuthFile *string
|
||||||
|
Auth *[]string
|
||||||
|
AuthURL *string
|
||||||
|
AuthURLOkCode *int
|
||||||
|
AuthURLTimeout *int
|
||||||
|
AuthURLRetry *int
|
||||||
|
KCP kcpcfg.KCPConfigArgs
|
||||||
|
LocalIPS *[]string
|
||||||
|
DNSAddress *string
|
||||||
|
DNSTTL *int
|
||||||
|
LocalKey *string
|
||||||
|
ParentKey *string
|
||||||
|
LocalCompress *bool
|
||||||
|
ParentCompress *bool
|
||||||
|
}
|
||||||
|
type Socks struct {
|
||||||
|
cfg SocksArgs
|
||||||
|
checker utils.Checker
|
||||||
|
basicAuth utils.BasicAuth
|
||||||
|
sshClient *ssh.Client
|
||||||
|
lockChn chan bool
|
||||||
|
udpSC utils.ServerChannel
|
||||||
|
sc *utils.ServerChannel
|
||||||
|
domainResolver utils.DomainResolver
|
||||||
|
isStop bool
|
||||||
|
userConns utils.ConcurrentMap
|
||||||
|
log *logger.Logger
|
||||||
|
udpRelatedPacketConns utils.ConcurrentMap
|
||||||
|
udpLocalKey []byte
|
||||||
|
udpParentKey []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewSocks() services.Service {
|
||||||
|
return &Socks{
|
||||||
|
cfg: SocksArgs{},
|
||||||
|
checker: utils.Checker{},
|
||||||
|
basicAuth: utils.BasicAuth{},
|
||||||
|
lockChn: make(chan bool, 1),
|
||||||
|
isStop: false,
|
||||||
|
userConns: utils.NewConcurrentMap(),
|
||||||
|
udpRelatedPacketConns: utils.NewConcurrentMap(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Socks) CheckArgs() (err error) {
|
||||||
|
|
||||||
|
if *s.cfg.LocalType == "tls" || (*s.cfg.Parent != "" && *s.cfg.ParentType == "tls") {
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.CaCertFile != "" {
|
||||||
|
s.cfg.CaCertBytes, err = ioutil.ReadFile(*s.cfg.CaCertFile)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read ca file error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
if *s.cfg.ParentType == "" {
|
||||||
|
err = fmt.Errorf("parent type unkown,use -T <tls|tcp|ssh|kcp>")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "ssh" {
|
||||||
|
if *s.cfg.SSHUser == "" {
|
||||||
|
err = fmt.Errorf("ssh user required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.SSHKeyFile == "" && *s.cfg.SSHPassword == "" {
|
||||||
|
err = fmt.Errorf("ssh password or key required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.SSHPassword != "" {
|
||||||
|
s.cfg.SSHAuthMethod = ssh.Password(*s.cfg.SSHPassword)
|
||||||
|
} else {
|
||||||
|
var SSHSigner ssh.Signer
|
||||||
|
s.cfg.SSHKeyBytes, err = ioutil.ReadFile(*s.cfg.SSHKeyFile)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read key file ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.SSHKeyFileSalt != "" {
|
||||||
|
SSHSigner, err = ssh.ParsePrivateKeyWithPassphrase(s.cfg.SSHKeyBytes, []byte(*s.cfg.SSHKeyFileSalt))
|
||||||
|
} else {
|
||||||
|
SSHSigner, err = ssh.ParsePrivateKey(s.cfg.SSHKeyBytes)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("parse ssh private key fail,ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.cfg.SSHAuthMethod = ssh.PublicKeys(SSHSigner)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
s.udpLocalKey = s.LocalUDPKey()
|
||||||
|
s.udpParentKey = s.ParentUDPKey()
|
||||||
|
//s.log.Printf("udpLocalKey : %v , udpParentKey : %v", s.udpLocalKey, s.udpParentKey)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Socks) InitService() (err error) {
|
||||||
|
s.InitBasicAuth()
|
||||||
|
if *s.cfg.DNSAddress != "" {
|
||||||
|
(*s).domainResolver = utils.NewDomainResolver(*s.cfg.DNSAddress, *s.cfg.DNSTTL, s.log)
|
||||||
|
}
|
||||||
|
s.checker = utils.NewChecker(*s.cfg.Timeout, int64(*s.cfg.Interval), *s.cfg.Blocked, *s.cfg.Direct, s.log)
|
||||||
|
if *s.cfg.ParentType == "ssh" {
|
||||||
|
e := s.ConnectSSH()
|
||||||
|
if e != nil {
|
||||||
|
err = fmt.Errorf("init service fail, ERR: %s", e)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
//循环检查ssh网络连通性
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn, err := utils.ConnectHost(s.Resolve(*s.cfg.Parent), *s.cfg.Timeout*2)
|
||||||
|
if err == nil {
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = conn.Write([]byte{0})
|
||||||
|
conn.SetDeadline(time.Time{})
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
if s.sshClient != nil {
|
||||||
|
s.sshClient.Close()
|
||||||
|
}
|
||||||
|
s.log.Printf("ssh offline, retrying...")
|
||||||
|
s.ConnectSSH()
|
||||||
|
} else {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "ssh" {
|
||||||
|
s.log.Printf("warn: socks udp not suppored for ssh")
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Socks) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop socks service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service socks stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
s.checker.Stop()
|
||||||
|
if s.sshClient != nil {
|
||||||
|
s.sshClient.Close()
|
||||||
|
}
|
||||||
|
if s.udpSC.UDPListener != nil {
|
||||||
|
s.udpSC.UDPListener.Close()
|
||||||
|
}
|
||||||
|
if s.sc != nil && (*s.sc).Listener != nil {
|
||||||
|
(*(*s.sc).Listener).Close()
|
||||||
|
}
|
||||||
|
for _, c := range s.userConns.Items() {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
for _, c := range s.udpRelatedPacketConns.Items() {
|
||||||
|
(*c.(*net.UDPConn)).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *Socks) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
//start()
|
||||||
|
s.cfg = args.(SocksArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
s.InitService()
|
||||||
|
}
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
s.log.Printf("use %s parent %s", *s.cfg.ParentType, *s.cfg.Parent)
|
||||||
|
}
|
||||||
|
sc := utils.NewServerChannelHost(*s.cfg.Local, s.log)
|
||||||
|
if *s.cfg.LocalType == "tcp" {
|
||||||
|
err = sc.ListenTCP(s.socksConnCallback)
|
||||||
|
} else if *s.cfg.LocalType == "tls" {
|
||||||
|
err = sc.ListenTls(s.cfg.CertBytes, s.cfg.KeyBytes, nil, s.socksConnCallback)
|
||||||
|
} else if *s.cfg.LocalType == "kcp" {
|
||||||
|
err = sc.ListenKCP(s.cfg.KCP, s.socksConnCallback, s.log)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.sc = &sc
|
||||||
|
s.log.Printf("%s socks proxy on %s", *s.cfg.LocalType, (*sc.Listener).Addr())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Socks) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Socks) socksConnCallback(inConn net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("socks conn handler crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
inConn.Close()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
if *s.cfg.LocalCompress {
|
||||||
|
inConn = utils.NewCompConn(inConn)
|
||||||
|
}
|
||||||
|
if *s.cfg.LocalKey != "" {
|
||||||
|
inConn = conncrypt.New(inConn, &conncrypt.Config{
|
||||||
|
Password: *s.cfg.LocalKey,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
//协商开始
|
||||||
|
|
||||||
|
//method select request
|
||||||
|
inConn.SetReadDeadline(time.Now().Add(time.Second * 3))
|
||||||
|
methodReq, err := socks.NewMethodsRequest(inConn)
|
||||||
|
inConn.SetReadDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
methodReq.Reply(socks.Method_NONE_ACCEPTABLE)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
if err != io.EOF {
|
||||||
|
s.log.Printf("new methods request fail,ERR: %s", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if !s.IsBasicAuth() {
|
||||||
|
if !methodReq.Select(socks.Method_NO_AUTH) {
|
||||||
|
methodReq.Reply(socks.Method_NONE_ACCEPTABLE)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
s.log.Printf("none method found : Method_NO_AUTH")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//method select reply
|
||||||
|
err = methodReq.Reply(socks.Method_NO_AUTH)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("reply answer data fail,ERR: %s", err)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// s.log.Printf("% x", methodReq.Bytes())
|
||||||
|
} else {
|
||||||
|
//auth
|
||||||
|
if !methodReq.Select(socks.Method_USER_PASS) {
|
||||||
|
methodReq.Reply(socks.Method_NONE_ACCEPTABLE)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
s.log.Printf("none method found : Method_USER_PASS")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//method reply need auth
|
||||||
|
err = methodReq.Reply(socks.Method_USER_PASS)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("reply answer data fail,ERR: %s", err)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//read auth
|
||||||
|
buf := make([]byte, 500)
|
||||||
|
inConn.SetReadDeadline(time.Now().Add(time.Second * 3))
|
||||||
|
n, err := inConn.Read(buf)
|
||||||
|
inConn.SetReadDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
r := buf[:n]
|
||||||
|
user := string(r[2 : r[1]+2])
|
||||||
|
pass := string(r[2+r[1]+1:])
|
||||||
|
//s.log.Printf("user:%s,pass:%s", user, pass)
|
||||||
|
//auth
|
||||||
|
_addr := strings.Split(inConn.RemoteAddr().String(), ":")
|
||||||
|
if s.basicAuth.CheckUserPass(user, pass, _addr[0], "") {
|
||||||
|
inConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
inConn.Write([]byte{0x01, 0x00})
|
||||||
|
inConn.SetDeadline(time.Time{})
|
||||||
|
|
||||||
|
} else {
|
||||||
|
inConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
inConn.Write([]byte{0x01, 0x01})
|
||||||
|
inConn.SetDeadline(time.Time{})
|
||||||
|
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
//request detail
|
||||||
|
request, err := socks.NewRequest(inConn)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read request data fail,ERR: %s", err)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//协商结束
|
||||||
|
|
||||||
|
switch request.CMD() {
|
||||||
|
case socks.CMD_BIND:
|
||||||
|
//bind 不支持
|
||||||
|
request.TCPReply(socks.REP_UNKNOWN)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
return
|
||||||
|
case socks.CMD_CONNECT:
|
||||||
|
//tcp
|
||||||
|
s.proxyTCP(&inConn, methodReq, request)
|
||||||
|
case socks.CMD_ASSOCIATE:
|
||||||
|
//udp
|
||||||
|
s.proxyUDP(&inConn, methodReq, request)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Socks) proxyTCP(inConn *net.Conn, methodReq socks.MethodsRequest, request socks.Request) {
|
||||||
|
var outConn net.Conn
|
||||||
|
var err interface{}
|
||||||
|
useProxy := true
|
||||||
|
tryCount := 0
|
||||||
|
maxTryCount := 5
|
||||||
|
//防止死循环
|
||||||
|
if s.IsDeadLoop((*inConn).LocalAddr().String(), request.Host()) {
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
s.log.Printf("dead loop detected , %s", request.Host())
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.Always {
|
||||||
|
outConn, err = s.getOutConn(methodReq.Bytes(), request.Bytes(), request.Addr(), true)
|
||||||
|
} else {
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
host, _, _ := net.SplitHostPort(request.Addr())
|
||||||
|
useProxy := false
|
||||||
|
if utils.IsIternalIP(host, *s.cfg.Always) {
|
||||||
|
useProxy = false
|
||||||
|
} else {
|
||||||
|
var isInMap bool
|
||||||
|
useProxy, isInMap, _, _ = s.checker.IsBlocked(request.Addr())
|
||||||
|
if !isInMap {
|
||||||
|
s.checker.Add(request.Addr(), s.Resolve(request.Addr()))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if useProxy {
|
||||||
|
outConn, err = s.getOutConn(methodReq.Bytes(), request.Bytes(), request.Addr(), true)
|
||||||
|
} else {
|
||||||
|
outConn, err = utils.ConnectHost(s.Resolve(request.Addr()), *s.cfg.Timeout)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
outConn, err = utils.ConnectHost(s.Resolve(request.Addr()), *s.cfg.Timeout)
|
||||||
|
useProxy = false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
tryCount++
|
||||||
|
if err == nil || tryCount > maxTryCount || *s.cfg.Parent == "" {
|
||||||
|
break
|
||||||
|
} else {
|
||||||
|
s.log.Printf("get out conn fail,%s,retrying...", err)
|
||||||
|
time.Sleep(time.Second * 2)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("get out conn fail,%s", err)
|
||||||
|
request.TCPReply(socks.REP_NETWOR_UNREACHABLE)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
s.log.Printf("use proxy %v : %s", useProxy, request.Addr())
|
||||||
|
|
||||||
|
request.TCPReply(socks.REP_SUCCESS)
|
||||||
|
inAddr := (*inConn).RemoteAddr().String()
|
||||||
|
//inLocalAddr := (*inConn).LocalAddr().String()
|
||||||
|
|
||||||
|
s.log.Printf("conn %s - %s connected", inAddr, request.Addr())
|
||||||
|
utils.IoBind(*inConn, outConn, func(err interface{}) {
|
||||||
|
s.log.Printf("conn %s - %s released", inAddr, request.Addr())
|
||||||
|
s.userConns.Remove(inAddr)
|
||||||
|
}, s.log)
|
||||||
|
if c, ok := s.userConns.Get(inAddr); ok {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
s.userConns.Remove(inAddr)
|
||||||
|
}
|
||||||
|
s.userConns.Set(inAddr, inConn)
|
||||||
|
}
|
||||||
|
func (s *Socks) getOutConn(methodBytes, reqBytes []byte, host string, handshake bool) (outConn net.Conn, err interface{}) {
|
||||||
|
switch *s.cfg.ParentType {
|
||||||
|
case "kcp":
|
||||||
|
fallthrough
|
||||||
|
case "tls":
|
||||||
|
fallthrough
|
||||||
|
case "tcp":
|
||||||
|
if *s.cfg.ParentType == "tls" {
|
||||||
|
var _outConn tls.Conn
|
||||||
|
_outConn, err = utils.TlsConnectHost(s.Resolve(*s.cfg.Parent), *s.cfg.Timeout, s.cfg.CertBytes, s.cfg.KeyBytes, nil)
|
||||||
|
outConn = net.Conn(&_outConn)
|
||||||
|
} else if *s.cfg.ParentType == "kcp" {
|
||||||
|
outConn, err = utils.ConnectKCPHost(s.Resolve(*s.cfg.Parent), s.cfg.KCP)
|
||||||
|
} else {
|
||||||
|
outConn, err = utils.ConnectHost(s.Resolve(*s.cfg.Parent), *s.cfg.Timeout)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("connect fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentCompress {
|
||||||
|
outConn = utils.NewCompConn(outConn)
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentKey != "" {
|
||||||
|
outConn = conncrypt.New(outConn, &conncrypt.Config{
|
||||||
|
Password: *s.cfg.ParentKey,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
if !handshake {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var buf = make([]byte, 1024)
|
||||||
|
//var n int
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = outConn.Write(methodBytes)
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("write method fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = outConn.Read(buf)
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read method reply fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//resp := buf[:n]
|
||||||
|
//s.log.Printf("resp:%v", resp)
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = outConn.Write(reqBytes)
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("write req detail fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = outConn.Read(buf)
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read req reply fail,%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//result := buf[:n]
|
||||||
|
//s.log.Printf("result:%v", result)
|
||||||
|
|
||||||
|
case "ssh":
|
||||||
|
maxTryCount := 1
|
||||||
|
tryCount := 0
|
||||||
|
RETRY:
|
||||||
|
if tryCount >= maxTryCount || s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
wait := make(chan bool, 1)
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if err == nil {
|
||||||
|
err = recover()
|
||||||
|
}
|
||||||
|
wait <- true
|
||||||
|
}()
|
||||||
|
outConn, err = s.sshClient.Dial("tcp", host)
|
||||||
|
}()
|
||||||
|
select {
|
||||||
|
case <-wait:
|
||||||
|
case <-time.After(time.Millisecond * time.Duration(*s.cfg.Timeout) * 2):
|
||||||
|
err = fmt.Errorf("ssh dial %s timeout", host)
|
||||||
|
s.sshClient.Close()
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect ssh fail, ERR: %s, retrying...", err)
|
||||||
|
e := s.ConnectSSH()
|
||||||
|
if e == nil {
|
||||||
|
tryCount++
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
goto RETRY
|
||||||
|
} else {
|
||||||
|
err = e
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Socks) ConnectSSH() (err error) {
|
||||||
|
select {
|
||||||
|
case s.lockChn <- true:
|
||||||
|
default:
|
||||||
|
err = fmt.Errorf("can not connect at same time")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
config := ssh.ClientConfig{
|
||||||
|
Timeout: time.Duration(*s.cfg.Timeout) * time.Millisecond,
|
||||||
|
User: *s.cfg.SSHUser,
|
||||||
|
Auth: []ssh.AuthMethod{s.cfg.SSHAuthMethod},
|
||||||
|
HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error {
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
if s.sshClient != nil {
|
||||||
|
s.sshClient.Close()
|
||||||
|
}
|
||||||
|
s.sshClient, err = ssh.Dial("tcp", s.Resolve(*s.cfg.Parent), &config)
|
||||||
|
<-s.lockChn
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Socks) InitBasicAuth() (err error) {
|
||||||
|
if *s.cfg.DNSAddress != "" {
|
||||||
|
s.basicAuth = utils.NewBasicAuth(&(*s).domainResolver, s.log)
|
||||||
|
} else {
|
||||||
|
s.basicAuth = utils.NewBasicAuth(nil, s.log)
|
||||||
|
}
|
||||||
|
if *s.cfg.AuthURL != "" {
|
||||||
|
s.basicAuth.SetAuthURL(*s.cfg.AuthURL, *s.cfg.AuthURLOkCode, *s.cfg.AuthURLTimeout, *s.cfg.AuthURLRetry)
|
||||||
|
s.log.Printf("auth from %s", *s.cfg.AuthURL)
|
||||||
|
}
|
||||||
|
if *s.cfg.AuthFile != "" {
|
||||||
|
var n = 0
|
||||||
|
n, err = s.basicAuth.AddFromFile(*s.cfg.AuthFile)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("auth-file ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("auth data added from file %d , total:%d", n, s.basicAuth.Total())
|
||||||
|
}
|
||||||
|
if len(*s.cfg.Auth) > 0 {
|
||||||
|
n := s.basicAuth.Add(*s.cfg.Auth)
|
||||||
|
s.log.Printf("auth data added %d, total:%d", n, s.basicAuth.Total())
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Socks) IsBasicAuth() bool {
|
||||||
|
return *s.cfg.AuthFile != "" || len(*s.cfg.Auth) > 0 || *s.cfg.AuthURL != ""
|
||||||
|
}
|
||||||
|
func (s *Socks) IsDeadLoop(inLocalAddr string, host string) bool {
|
||||||
|
inIP, inPort, err := net.SplitHostPort(inLocalAddr)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
outDomain, outPort, err := net.SplitHostPort(host)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if inPort == outPort {
|
||||||
|
var outIPs []net.IP
|
||||||
|
if *s.cfg.DNSAddress != "" {
|
||||||
|
outIPs = []net.IP{net.ParseIP(s.Resolve(outDomain))}
|
||||||
|
} else {
|
||||||
|
outIPs, err = net.LookupIP(outDomain)
|
||||||
|
}
|
||||||
|
if err == nil {
|
||||||
|
for _, ip := range outIPs {
|
||||||
|
if ip.String() == inIP {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
interfaceIPs, err := utils.GetAllInterfaceAddr()
|
||||||
|
for _, ip := range *s.cfg.LocalIPS {
|
||||||
|
interfaceIPs = append(interfaceIPs, net.ParseIP(ip).To4())
|
||||||
|
}
|
||||||
|
if err == nil {
|
||||||
|
for _, localIP := range interfaceIPs {
|
||||||
|
for _, outIP := range outIPs {
|
||||||
|
if localIP.Equal(outIP) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
func (s *Socks) Resolve(address string) string {
|
||||||
|
if *s.cfg.DNSAddress == "" {
|
||||||
|
return address
|
||||||
|
}
|
||||||
|
ip, err := s.domainResolver.Resolve(address)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("dns error %s , ERR:%s", address, err)
|
||||||
|
return address
|
||||||
|
}
|
||||||
|
return ip
|
||||||
|
}
|
||||||
321
services/socks/udp.go
Normal file
@ -0,0 +1,321 @@
|
|||||||
|
package socks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/md5"
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
goaes "github.com/snail007/goproxy/utils/aes"
|
||||||
|
"github.com/snail007/goproxy/utils/socks"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (s *Socks) ParentUDPKey() (key []byte) {
|
||||||
|
switch *s.cfg.ParentType {
|
||||||
|
case "tcp":
|
||||||
|
if *s.cfg.ParentKey != "" {
|
||||||
|
v := fmt.Sprintf("%x", md5.Sum([]byte(*s.cfg.ParentKey)))
|
||||||
|
return []byte(v)[:24]
|
||||||
|
}
|
||||||
|
case "tls":
|
||||||
|
return s.cfg.KeyBytes[:24]
|
||||||
|
case "kcp":
|
||||||
|
v := fmt.Sprintf("%x", md5.Sum([]byte(*s.cfg.KCP.Key)))
|
||||||
|
return []byte(v)[:24]
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Socks) LocalUDPKey() (key []byte) {
|
||||||
|
switch *s.cfg.LocalType {
|
||||||
|
case "tcp":
|
||||||
|
if *s.cfg.LocalKey != "" {
|
||||||
|
v := fmt.Sprintf("%x", md5.Sum([]byte(*s.cfg.LocalKey)))
|
||||||
|
return []byte(v)[:24]
|
||||||
|
}
|
||||||
|
case "tls":
|
||||||
|
return s.cfg.KeyBytes[:24]
|
||||||
|
case "kcp":
|
||||||
|
v := fmt.Sprintf("%x", md5.Sum([]byte(*s.cfg.KCP.Key)))
|
||||||
|
return []byte(v)[:24]
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Socks) proxyUDP(inConn *net.Conn, methodReq socks.MethodsRequest, request socks.Request) {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp local->out io copy crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
if *s.cfg.ParentType == "ssh" {
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
srcIP, _, _ := net.SplitHostPort((*inConn).RemoteAddr().String())
|
||||||
|
inconnRemoteAddr := (*inConn).RemoteAddr().String()
|
||||||
|
localAddr := &net.UDPAddr{IP: net.IPv4zero, Port: 0}
|
||||||
|
udpListener, err := net.ListenUDP("udp", localAddr)
|
||||||
|
if err != nil {
|
||||||
|
(*inConn).Close()
|
||||||
|
udpListener.Close()
|
||||||
|
s.log.Printf("udp bind fail , %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
host, _, _ := net.SplitHostPort((*inConn).LocalAddr().String())
|
||||||
|
_, port, _ := net.SplitHostPort(udpListener.LocalAddr().String())
|
||||||
|
if len(*s.cfg.LocalIPS) > 0 {
|
||||||
|
host = (*s.cfg.LocalIPS)[0]
|
||||||
|
}
|
||||||
|
s.log.Printf("proxy udp on %s , for %s", net.JoinHostPort(host, port), inconnRemoteAddr)
|
||||||
|
request.UDPReply(socks.REP_SUCCESS, net.JoinHostPort(host, port))
|
||||||
|
s.userConns.Set(inconnRemoteAddr, inConn)
|
||||||
|
var (
|
||||||
|
outUDPConn *net.UDPConn
|
||||||
|
outconn net.Conn
|
||||||
|
outconnLocalAddr string
|
||||||
|
isClosedErr = func(err error) bool {
|
||||||
|
return err != nil && strings.Contains(err.Error(), "use of closed network connection")
|
||||||
|
}
|
||||||
|
destAddr *net.UDPAddr
|
||||||
|
)
|
||||||
|
var clean = func(msg, err string) {
|
||||||
|
raddr := ""
|
||||||
|
if outUDPConn != nil {
|
||||||
|
raddr = outUDPConn.RemoteAddr().String()
|
||||||
|
outUDPConn.Close()
|
||||||
|
}
|
||||||
|
if msg != "" {
|
||||||
|
if raddr != "" {
|
||||||
|
s.log.Printf("%s , %s , %s -> %s", msg, err, inconnRemoteAddr, raddr)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("%s , %s , from : %s", msg, err, inconnRemoteAddr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
(*inConn).Close()
|
||||||
|
udpListener.Close()
|
||||||
|
s.userConns.Remove(inconnRemoteAddr)
|
||||||
|
if outconn != nil {
|
||||||
|
outconn.Close()
|
||||||
|
}
|
||||||
|
if outconnLocalAddr != "" {
|
||||||
|
s.userConns.Remove(outconnLocalAddr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
defer clean("", "")
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp related client tcp conn read crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
buf := make([]byte, 1)
|
||||||
|
(*inConn).SetReadDeadline(time.Time{})
|
||||||
|
if _, err := (*inConn).Read(buf); err != nil {
|
||||||
|
clean("udp related tcp conn disconnected with read", err.Error())
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp related client tcp conn write crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for {
|
||||||
|
(*inConn).SetWriteDeadline(time.Now().Add(time.Second * 5))
|
||||||
|
if _, err := (*inConn).Write([]byte{0x00}); err != nil {
|
||||||
|
clean("udp related tcp conn disconnected with write", err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
(*inConn).SetWriteDeadline(time.Time{})
|
||||||
|
time.Sleep(time.Second * 5)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
useProxy := true
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
dstHost, _, _ := net.SplitHostPort(request.Addr())
|
||||||
|
if utils.IsIternalIP(dstHost, *s.cfg.Always) {
|
||||||
|
useProxy = false
|
||||||
|
} else {
|
||||||
|
var isInMap bool
|
||||||
|
useProxy, isInMap, _, _ = s.checker.IsBlocked(request.Addr())
|
||||||
|
if !isInMap {
|
||||||
|
s.checker.Add(request.Addr(), s.Resolve(request.Addr()))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
useProxy = false
|
||||||
|
}
|
||||||
|
if useProxy {
|
||||||
|
//parent proxy
|
||||||
|
outconn, err := s.getOutConn(nil, nil, "", false)
|
||||||
|
if err != nil {
|
||||||
|
clean("connnect fail", fmt.Sprintf("%s", err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
client := socks.NewClientConn(&outconn, "udp", request.Addr(), time.Millisecond*time.Duration(*s.cfg.Timeout), nil, nil)
|
||||||
|
if err = client.Handshake(); err != nil {
|
||||||
|
clean("handshake fail", fmt.Sprintf("%s", err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//outconnRemoteAddr := outconn.RemoteAddr().String()
|
||||||
|
outconnLocalAddr = outconn.LocalAddr().String()
|
||||||
|
s.userConns.Set(outconnLocalAddr, &outconn)
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp related parent tcp conn read crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
buf := make([]byte, 1)
|
||||||
|
outconn.SetReadDeadline(time.Time{})
|
||||||
|
if _, err := outconn.Read(buf); err != nil {
|
||||||
|
clean("udp parent tcp conn disconnected", fmt.Sprintf("%s", err))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
//forward to parent udp
|
||||||
|
//s.log.Printf("parent udp address %s", client.UDPAddr)
|
||||||
|
destAddr, _ = net.ResolveUDPAddr("udp", client.UDPAddr)
|
||||||
|
}
|
||||||
|
s.log.Printf("use proxy %v : udp %s", useProxy, request.Addr())
|
||||||
|
//relay
|
||||||
|
for {
|
||||||
|
buf := utils.LeakyBuffer.Get()
|
||||||
|
defer utils.LeakyBuffer.Put(buf)
|
||||||
|
n, srcAddr, err := udpListener.ReadFromUDP(buf)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp listener read fail, %s", err.Error())
|
||||||
|
if isClosedErr(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
srcIP0, _, _ := net.SplitHostPort(srcAddr.String())
|
||||||
|
//IP not match drop it
|
||||||
|
if srcIP != srcIP0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
p := socks.NewPacketUDP()
|
||||||
|
//convert data to raw
|
||||||
|
if len(s.udpLocalKey) > 0 {
|
||||||
|
var v []byte
|
||||||
|
v, err = goaes.Decrypt(s.udpLocalKey, buf[:n])
|
||||||
|
if err == nil {
|
||||||
|
err = p.Parse(v)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
err = p.Parse(buf[:n])
|
||||||
|
}
|
||||||
|
//err = p.Parse(buf[:n])
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp listener parse packet fail, %s", err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
port, _ := strconv.Atoi(p.Port())
|
||||||
|
|
||||||
|
if v, ok := s.udpRelatedPacketConns.Get(srcAddr.String()); !ok {
|
||||||
|
if destAddr == nil {
|
||||||
|
destAddr = &net.UDPAddr{IP: net.ParseIP(p.Host()), Port: port}
|
||||||
|
}
|
||||||
|
outUDPConn, err = net.DialUDP("udp", localAddr, destAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("create out udp conn fail , %s , from : %s", err, srcAddr)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
s.udpRelatedPacketConns.Set(srcAddr.String(), outUDPConn)
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp out->local io copy crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
defer s.udpRelatedPacketConns.Remove(srcAddr.String())
|
||||||
|
//out->local io copy
|
||||||
|
buf := utils.LeakyBuffer.Get()
|
||||||
|
defer utils.LeakyBuffer.Put(buf)
|
||||||
|
for {
|
||||||
|
n, err := outUDPConn.Read(buf)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read out udp data fail , %s , from : %s", err, srcAddr)
|
||||||
|
if isClosedErr(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
//var dlen = n
|
||||||
|
if useProxy {
|
||||||
|
//forward to local
|
||||||
|
var v []byte
|
||||||
|
//convert parent data to raw
|
||||||
|
if len(s.udpParentKey) > 0 {
|
||||||
|
v, err = goaes.Decrypt(s.udpParentKey, buf[:n])
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp outconn parse packet fail, %s", err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
v = buf[:n]
|
||||||
|
}
|
||||||
|
//now v is raw, try convert v to local
|
||||||
|
if len(s.udpLocalKey) > 0 {
|
||||||
|
v, _ = goaes.Encrypt(s.udpLocalKey, v)
|
||||||
|
}
|
||||||
|
_, err = udpListener.WriteTo(v, srcAddr)
|
||||||
|
// _, err = udpListener.WriteTo(buf[:n], srcAddr)
|
||||||
|
} else {
|
||||||
|
rp := socks.NewPacketUDP()
|
||||||
|
rp.Build(destAddr.String(), buf[:n])
|
||||||
|
v := rp.Bytes()
|
||||||
|
//dlen = len(v)
|
||||||
|
//rp.Bytes() v is raw, try convert to local
|
||||||
|
if len(s.udpLocalKey) > 0 {
|
||||||
|
v, _ = goaes.Encrypt(s.udpLocalKey, v)
|
||||||
|
}
|
||||||
|
_, err = udpListener.WriteTo(v, srcAddr)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
s.udpRelatedPacketConns.Remove(srcAddr.String())
|
||||||
|
s.log.Printf("write out data to local fail , %s , from : %s", err, srcAddr)
|
||||||
|
if isClosedErr(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
//s.log.Printf("send udp data to local success , len %d, for : %s", dlen, srcAddr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
} else {
|
||||||
|
outUDPConn = v.(*net.UDPConn)
|
||||||
|
}
|
||||||
|
//local->out io copy
|
||||||
|
if useProxy {
|
||||||
|
//forward to parent
|
||||||
|
//p is raw, now convert it to parent
|
||||||
|
var v []byte
|
||||||
|
if len(s.udpParentKey) > 0 {
|
||||||
|
v, _ = goaes.Encrypt(s.udpParentKey, p.Bytes())
|
||||||
|
} else {
|
||||||
|
v = p.Bytes()
|
||||||
|
}
|
||||||
|
_, err = outUDPConn.Write(v)
|
||||||
|
// _, err = outUDPConn.Write(p.Bytes())
|
||||||
|
} else {
|
||||||
|
_, err = outUDPConn.Write(p.Data())
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
if isClosedErr(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("send out udp data fail , %s , from : %s", err, srcAddr)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
//s.log.Printf("send udp data to remote success , len %d, for : %s", len(p.Data()), srcAddr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
306
services/sps/socksudp.go
Normal file
@ -0,0 +1,306 @@
|
|||||||
|
package sps
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/md5"
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
goaes "github.com/snail007/goproxy/utils/aes"
|
||||||
|
"github.com/snail007/goproxy/utils/conncrypt"
|
||||||
|
"github.com/snail007/goproxy/utils/socks"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (s *SPS) ParentUDPKey() (key []byte) {
|
||||||
|
switch *s.cfg.ParentType {
|
||||||
|
case "tcp":
|
||||||
|
if *s.cfg.ParentKey != "" {
|
||||||
|
v := fmt.Sprintf("%x", md5.Sum([]byte(*s.cfg.ParentKey)))
|
||||||
|
return []byte(v)[:24]
|
||||||
|
}
|
||||||
|
case "tls":
|
||||||
|
return s.cfg.KeyBytes[:24]
|
||||||
|
case "kcp":
|
||||||
|
v := fmt.Sprintf("%x", md5.Sum([]byte(*s.cfg.KCP.Key)))
|
||||||
|
return []byte(v)[:24]
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *SPS) LocalUDPKey() (key []byte) {
|
||||||
|
switch *s.cfg.LocalType {
|
||||||
|
case "tcp":
|
||||||
|
if *s.cfg.LocalKey != "" {
|
||||||
|
v := fmt.Sprintf("%x", md5.Sum([]byte(*s.cfg.LocalKey)))
|
||||||
|
return []byte(v)[:24]
|
||||||
|
}
|
||||||
|
case "tls":
|
||||||
|
return s.cfg.KeyBytes[:24]
|
||||||
|
case "kcp":
|
||||||
|
v := fmt.Sprintf("%x", md5.Sum([]byte(*s.cfg.KCP.Key)))
|
||||||
|
return []byte(v)[:24]
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *SPS) proxyUDP(inConn *net.Conn, serverConn *socks.ServerConn) {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp local->out io copy crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
if *s.cfg.ParentType == "ssh" {
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
srcIP, _, _ := net.SplitHostPort((*inConn).RemoteAddr().String())
|
||||||
|
inconnRemoteAddr := (*inConn).RemoteAddr().String()
|
||||||
|
localAddr := &net.UDPAddr{IP: net.IPv4zero, Port: 0}
|
||||||
|
udpListener := serverConn.UDPConnListener
|
||||||
|
s.log.Printf("proxy udp on %s , for %s", udpListener.LocalAddr(), inconnRemoteAddr)
|
||||||
|
s.userConns.Set(inconnRemoteAddr, inConn)
|
||||||
|
var (
|
||||||
|
outUDPConn *net.UDPConn
|
||||||
|
outconn net.Conn
|
||||||
|
outconnLocalAddr string
|
||||||
|
isClosedErr = func(err error) bool {
|
||||||
|
return err != nil && strings.Contains(err.Error(), "use of closed network connection")
|
||||||
|
}
|
||||||
|
destAddr *net.UDPAddr
|
||||||
|
)
|
||||||
|
var clean = func(msg, err string) {
|
||||||
|
raddr := ""
|
||||||
|
if outUDPConn != nil {
|
||||||
|
raddr = outUDPConn.RemoteAddr().String()
|
||||||
|
outUDPConn.Close()
|
||||||
|
}
|
||||||
|
if msg != "" {
|
||||||
|
if raddr != "" {
|
||||||
|
s.log.Printf("%s , %s , %s -> %s", msg, err, inconnRemoteAddr, raddr)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("%s , %s , from : %s", msg, err, inconnRemoteAddr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
(*inConn).Close()
|
||||||
|
udpListener.Close()
|
||||||
|
s.userConns.Remove(inconnRemoteAddr)
|
||||||
|
if outconn != nil {
|
||||||
|
outconn.Close()
|
||||||
|
}
|
||||||
|
if outconnLocalAddr != "" {
|
||||||
|
s.userConns.Remove(outconnLocalAddr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
defer clean("", "")
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp related client tcp conn read crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
buf := make([]byte, 1)
|
||||||
|
(*inConn).SetReadDeadline(time.Time{})
|
||||||
|
if _, err := (*inConn).Read(buf); err != nil {
|
||||||
|
clean("udp related tcp conn disconnected with read", err.Error())
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp related client tcp conn write crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for {
|
||||||
|
(*inConn).SetWriteDeadline(time.Now().Add(time.Second * 5))
|
||||||
|
if _, err := (*inConn).Write([]byte{0x00}); err != nil {
|
||||||
|
clean("udp related tcp conn disconnected with write", err.Error())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
(*inConn).SetWriteDeadline(time.Time{})
|
||||||
|
time.Sleep(time.Second * 5)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
//parent proxy
|
||||||
|
outconn, err := s.outPool.Get()
|
||||||
|
//outconn, err := s.GetParentConn(nil, nil, "", false)
|
||||||
|
if err != nil {
|
||||||
|
clean("connnect fail", fmt.Sprintf("%s", err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentCompress {
|
||||||
|
outconn = utils.NewCompConn(outconn)
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentKey != "" {
|
||||||
|
outconn = conncrypt.New(outconn, &conncrypt.Config{
|
||||||
|
Password: *s.cfg.ParentKey,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
s.log.Printf("connect %s for udp", serverConn.Target())
|
||||||
|
//socks client
|
||||||
|
var client *socks.ClientConn
|
||||||
|
auth := serverConn.AuthData()
|
||||||
|
if *s.cfg.ParentAuth != "" {
|
||||||
|
a := strings.Split(*s.cfg.ParentAuth, ":")
|
||||||
|
if len(a) != 2 {
|
||||||
|
err = fmt.Errorf("parent auth data format error")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
client = socks.NewClientConn(&outconn, "udp", serverConn.Target(), time.Millisecond*time.Duration(*s.cfg.Timeout), &socks.Auth{User: a[0], Password: a[1]}, nil)
|
||||||
|
} else {
|
||||||
|
if !s.IsBasicAuth() && auth.Password != "" && auth.User != "" {
|
||||||
|
client = socks.NewClientConn(&outconn, "udp", serverConn.Target(), time.Millisecond*time.Duration(*s.cfg.Timeout), &auth, nil)
|
||||||
|
} else {
|
||||||
|
client = socks.NewClientConn(&outconn, "udp", serverConn.Target(), time.Millisecond*time.Duration(*s.cfg.Timeout), nil, nil)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = client.Handshake(); err != nil {
|
||||||
|
clean("handshake fail", fmt.Sprintf("%s", err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
//outconnRemoteAddr := outconn.RemoteAddr().String()
|
||||||
|
outconnLocalAddr = outconn.LocalAddr().String()
|
||||||
|
s.userConns.Set(outconnLocalAddr, &outconn)
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp related parent tcp conn read crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
buf := make([]byte, 1)
|
||||||
|
outconn.SetReadDeadline(time.Time{})
|
||||||
|
if _, err := outconn.Read(buf); err != nil {
|
||||||
|
clean("udp parent tcp conn disconnected", fmt.Sprintf("%s", err))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
//forward to parent udp
|
||||||
|
//s.log.Printf("parent udp address %s", client.UDPAddr)
|
||||||
|
destAddr, _ = net.ResolveUDPAddr("udp", client.UDPAddr)
|
||||||
|
//relay
|
||||||
|
buf := utils.LeakyBuffer.Get()
|
||||||
|
defer utils.LeakyBuffer.Put(buf)
|
||||||
|
for {
|
||||||
|
n, srcAddr, err := udpListener.ReadFromUDP(buf)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp listener read fail, %s", err.Error())
|
||||||
|
if isClosedErr(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
srcIP0, _, _ := net.SplitHostPort(srcAddr.String())
|
||||||
|
//IP not match drop it
|
||||||
|
if srcIP != srcIP0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
p := socks.NewPacketUDP()
|
||||||
|
//convert data to raw
|
||||||
|
if len(s.udpLocalKey) > 0 {
|
||||||
|
var v []byte
|
||||||
|
v, err = goaes.Decrypt(s.udpLocalKey, buf[:n])
|
||||||
|
if err == nil {
|
||||||
|
err = p.Parse(v)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
err = p.Parse(buf[:n])
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp listener parse packet fail, %s", err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
port, _ := strconv.Atoi(p.Port())
|
||||||
|
|
||||||
|
if v, ok := s.udpRelatedPacketConns.Get(srcAddr.String()); !ok {
|
||||||
|
if destAddr == nil {
|
||||||
|
destAddr = &net.UDPAddr{IP: net.ParseIP(p.Host()), Port: port}
|
||||||
|
}
|
||||||
|
outUDPConn, err = net.DialUDP("udp", localAddr, destAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("create out udp conn fail , %s , from : %s", err, srcAddr)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
s.udpRelatedPacketConns.Set(srcAddr.String(), outUDPConn)
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
s.log.Printf("udp out->local io copy crashed:\n%s\n%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
defer s.udpRelatedPacketConns.Remove(srcAddr.String())
|
||||||
|
//out->local io copy
|
||||||
|
buf := utils.LeakyBuffer.Get()
|
||||||
|
defer utils.LeakyBuffer.Put(buf)
|
||||||
|
for {
|
||||||
|
outUDPConn.SetReadDeadline(time.Now().Add(time.Second * 5))
|
||||||
|
n, err := outUDPConn.Read(buf)
|
||||||
|
outUDPConn.SetReadDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read out udp data fail , %s , from : %s", err, srcAddr)
|
||||||
|
if isClosedErr(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
//var dlen = n
|
||||||
|
//forward to local
|
||||||
|
var v []byte
|
||||||
|
//convert parent data to raw
|
||||||
|
if len(s.udpParentKey) > 0 {
|
||||||
|
v, err = goaes.Decrypt(s.udpParentKey, buf[:n])
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp outconn parse packet fail, %s", err.Error())
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
v = buf[:n]
|
||||||
|
}
|
||||||
|
//now v is raw, try convert v to local
|
||||||
|
if len(s.udpLocalKey) > 0 {
|
||||||
|
v, _ = goaes.Encrypt(s.udpLocalKey, v)
|
||||||
|
}
|
||||||
|
_, err = udpListener.WriteTo(v, srcAddr)
|
||||||
|
// _, err = udpListener.WriteTo(buf[:n], srcAddr)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
s.udpRelatedPacketConns.Remove(srcAddr.String())
|
||||||
|
s.log.Printf("write out data to local fail , %s , from : %s", err, srcAddr)
|
||||||
|
if isClosedErr(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
//s.log.Printf("send udp data to local success , len %d, for : %s", dlen, srcAddr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
} else {
|
||||||
|
outUDPConn = v.(*net.UDPConn)
|
||||||
|
}
|
||||||
|
//local->out io copy
|
||||||
|
//forward to parent
|
||||||
|
//p is raw, now convert it to parent
|
||||||
|
var v []byte
|
||||||
|
if len(s.udpParentKey) > 0 {
|
||||||
|
v, _ = goaes.Encrypt(s.udpParentKey, p.Bytes())
|
||||||
|
} else {
|
||||||
|
v = p.Bytes()
|
||||||
|
}
|
||||||
|
_, err = outUDPConn.Write(v)
|
||||||
|
// _, err = outUDPConn.Write(p.Bytes())
|
||||||
|
if err != nil {
|
||||||
|
if isClosedErr(err) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("send out udp data fail , %s , from : %s", err, srcAddr)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
//s.log.Printf("send udp data to remote success , len %d, for : %s", len(p.Data()), srcAddr)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
517
services/sps/sps.go
Normal file
@ -0,0 +1,517 @@
|
|||||||
|
package sps
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/base64"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
"github.com/snail007/goproxy/utils/conncrypt"
|
||||||
|
"github.com/snail007/goproxy/utils/sni"
|
||||||
|
"github.com/snail007/goproxy/utils/socks"
|
||||||
|
)
|
||||||
|
|
||||||
|
type SPSArgs struct {
|
||||||
|
Parent *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CaCertFile *string
|
||||||
|
CaCertBytes []byte
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Local *string
|
||||||
|
ParentType *string
|
||||||
|
LocalType *string
|
||||||
|
Timeout *int
|
||||||
|
KCP kcpcfg.KCPConfigArgs
|
||||||
|
ParentServiceType *string
|
||||||
|
DNSAddress *string
|
||||||
|
DNSTTL *int
|
||||||
|
AuthFile *string
|
||||||
|
Auth *[]string
|
||||||
|
AuthURL *string
|
||||||
|
AuthURLOkCode *int
|
||||||
|
AuthURLTimeout *int
|
||||||
|
AuthURLRetry *int
|
||||||
|
LocalIPS *[]string
|
||||||
|
ParentAuth *string
|
||||||
|
LocalKey *string
|
||||||
|
ParentKey *string
|
||||||
|
LocalCompress *bool
|
||||||
|
ParentCompress *bool
|
||||||
|
DisableHTTP *bool
|
||||||
|
DisableSocks5 *bool
|
||||||
|
}
|
||||||
|
type SPS struct {
|
||||||
|
outPool utils.OutConn
|
||||||
|
cfg SPSArgs
|
||||||
|
domainResolver utils.DomainResolver
|
||||||
|
basicAuth utils.BasicAuth
|
||||||
|
serverChannels []*utils.ServerChannel
|
||||||
|
userConns utils.ConcurrentMap
|
||||||
|
log *logger.Logger
|
||||||
|
udpRelatedPacketConns utils.ConcurrentMap
|
||||||
|
udpLocalKey []byte
|
||||||
|
udpParentKey []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewSPS() services.Service {
|
||||||
|
return &SPS{
|
||||||
|
outPool: utils.OutConn{},
|
||||||
|
cfg: SPSArgs{},
|
||||||
|
basicAuth: utils.BasicAuth{},
|
||||||
|
serverChannels: []*utils.ServerChannel{},
|
||||||
|
userConns: utils.NewConcurrentMap(),
|
||||||
|
udpRelatedPacketConns: utils.NewConcurrentMap(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *SPS) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Parent == "" {
|
||||||
|
err = fmt.Errorf("parent required for %s %s", *s.cfg.LocalType, *s.cfg.Local)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "" {
|
||||||
|
err = fmt.Errorf("parent type unkown,use -T <tls|tcp|kcp>")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "tls" || *s.cfg.LocalType == "tls" {
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.CaCertFile != "" {
|
||||||
|
s.cfg.CaCertBytes, err = ioutil.ReadFile(*s.cfg.CaCertFile)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read ca file error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
s.udpLocalKey = s.LocalUDPKey()
|
||||||
|
s.udpParentKey = s.ParentUDPKey()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *SPS) InitService() (err error) {
|
||||||
|
if *s.cfg.DNSAddress != "" {
|
||||||
|
(*s).domainResolver = utils.NewDomainResolver(*s.cfg.DNSAddress, *s.cfg.DNSTTL, s.log)
|
||||||
|
}
|
||||||
|
s.InitOutConnPool()
|
||||||
|
err = s.InitBasicAuth()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *SPS) InitOutConnPool() {
|
||||||
|
if *s.cfg.ParentType == "tls" || *s.cfg.ParentType == "tcp" || *s.cfg.ParentType == "kcp" {
|
||||||
|
//dur int, isTLS bool, certBytes, keyBytes []byte,
|
||||||
|
//parent string, timeout int, InitialCap int, MaxCap int
|
||||||
|
s.outPool = utils.NewOutConn(
|
||||||
|
0,
|
||||||
|
*s.cfg.ParentType,
|
||||||
|
s.cfg.KCP,
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, s.cfg.CaCertBytes,
|
||||||
|
*s.cfg.Parent,
|
||||||
|
*s.cfg.Timeout,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *SPS) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop sps service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service sps stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for _, sc := range s.serverChannels {
|
||||||
|
if sc.Listener != nil && *sc.Listener != nil {
|
||||||
|
(*sc.Listener).Close()
|
||||||
|
}
|
||||||
|
if sc.UDPListener != nil {
|
||||||
|
(*sc.UDPListener).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, c := range s.userConns.Items() {
|
||||||
|
if _, ok := c.(*net.Conn); ok {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
if _, ok := c.(**net.Conn); ok {
|
||||||
|
(*(*c.(**net.Conn))).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *SPS) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(SPSArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("use %s %s parent %s", *s.cfg.ParentType, *s.cfg.ParentServiceType, *s.cfg.Parent)
|
||||||
|
for _, addr := range strings.Split(*s.cfg.Local, ",") {
|
||||||
|
if addr != "" {
|
||||||
|
host, port, _ := net.SplitHostPort(addr)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
sc := utils.NewServerChannel(host, p, s.log)
|
||||||
|
if *s.cfg.LocalType == "tcp" {
|
||||||
|
err = sc.ListenTCP(s.callback)
|
||||||
|
} else if *s.cfg.LocalType == "tls" {
|
||||||
|
err = sc.ListenTls(s.cfg.CertBytes, s.cfg.KeyBytes, s.cfg.CaCertBytes, s.callback)
|
||||||
|
} else if *s.cfg.LocalType == "kcp" {
|
||||||
|
err = sc.ListenKCP(s.cfg.KCP, s.callback, s.log)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("%s http(s)+socks proxy on %s", *s.cfg.LocalType, (*sc.Listener).Addr())
|
||||||
|
s.serverChannels = append(s.serverChannels, &sc)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *SPS) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *SPS) callback(inConn net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("%s conn handler crashed with err : %s \nstack: %s", *s.cfg.LocalType, err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
if *s.cfg.LocalCompress {
|
||||||
|
inConn = utils.NewCompConn(inConn)
|
||||||
|
}
|
||||||
|
if *s.cfg.LocalKey != "" {
|
||||||
|
inConn = conncrypt.New(inConn, &conncrypt.Config{
|
||||||
|
Password: *s.cfg.LocalKey,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
var err error
|
||||||
|
switch *s.cfg.ParentType {
|
||||||
|
case "kcp":
|
||||||
|
fallthrough
|
||||||
|
case "tcp":
|
||||||
|
fallthrough
|
||||||
|
case "tls":
|
||||||
|
err = s.OutToTCP(&inConn)
|
||||||
|
default:
|
||||||
|
err = fmt.Errorf("unkown parent type %s", *s.cfg.ParentType)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to %s parent %s fail, ERR:%s from %s", *s.cfg.ParentType, *s.cfg.Parent, err, inConn.RemoteAddr())
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *SPS) OutToTCP(inConn *net.Conn) (err error) {
|
||||||
|
enableUDP := *s.cfg.ParentServiceType == "socks"
|
||||||
|
udpIP, _, _ := net.SplitHostPort((*inConn).LocalAddr().String())
|
||||||
|
if len(*s.cfg.LocalIPS) > 0 {
|
||||||
|
udpIP = (*s.cfg.LocalIPS)[0]
|
||||||
|
}
|
||||||
|
bInConn := utils.NewBufferedConn(*inConn)
|
||||||
|
//important
|
||||||
|
//action read will regist read event to system,
|
||||||
|
//when data arrived , system call process
|
||||||
|
//so that we can get buffered bytes count
|
||||||
|
//otherwise Buffered() always return 0
|
||||||
|
bInConn.ReadByte()
|
||||||
|
bInConn.UnreadByte()
|
||||||
|
|
||||||
|
n := 2048
|
||||||
|
if n > bInConn.Buffered() {
|
||||||
|
n = bInConn.Buffered()
|
||||||
|
}
|
||||||
|
h, err := bInConn.Peek(n)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("peek error %s ", err)
|
||||||
|
(*inConn).Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
isSNI, _ := sni.ServerNameFromBytes(h)
|
||||||
|
*inConn = bInConn
|
||||||
|
address := ""
|
||||||
|
var auth socks.Auth
|
||||||
|
var forwardBytes []byte
|
||||||
|
//fmt.Printf("%v", h)
|
||||||
|
if utils.IsSocks5(h) {
|
||||||
|
if *s.cfg.DisableSocks5 {
|
||||||
|
(*inConn).Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//socks5 server
|
||||||
|
var serverConn *socks.ServerConn
|
||||||
|
if s.IsBasicAuth() {
|
||||||
|
serverConn = socks.NewServerConn(inConn, time.Millisecond*time.Duration(*s.cfg.Timeout), &s.basicAuth, enableUDP, udpIP, nil)
|
||||||
|
} else {
|
||||||
|
serverConn = socks.NewServerConn(inConn, time.Millisecond*time.Duration(*s.cfg.Timeout), nil, enableUDP, udpIP, nil)
|
||||||
|
}
|
||||||
|
if err = serverConn.Handshake(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
address = serverConn.Target()
|
||||||
|
auth = serverConn.AuthData()
|
||||||
|
if serverConn.IsUDP() {
|
||||||
|
s.proxyUDP(inConn, serverConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
} else if utils.IsHTTP(h) || isSNI != "" {
|
||||||
|
if *s.cfg.DisableHTTP {
|
||||||
|
(*inConn).Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//http
|
||||||
|
var request utils.HTTPRequest
|
||||||
|
(*inConn).SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
if s.IsBasicAuth() {
|
||||||
|
request, err = utils.NewHTTPRequest(inConn, 1024, true, &s.basicAuth, s.log)
|
||||||
|
} else {
|
||||||
|
request, err = utils.NewHTTPRequest(inConn, 1024, false, nil, s.log)
|
||||||
|
}
|
||||||
|
(*inConn).SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("new http request fail,ERR: %s", err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if len(h) >= 7 && strings.ToLower(string(h[:7])) == "connect" {
|
||||||
|
//https
|
||||||
|
request.HTTPSReply()
|
||||||
|
//s.log.Printf("https reply: %s", request.Host)
|
||||||
|
} else {
|
||||||
|
//forwardBytes = bytes.TrimRight(request.HeadBuf,"\r\n")
|
||||||
|
forwardBytes = request.HeadBuf
|
||||||
|
}
|
||||||
|
address = request.Host
|
||||||
|
var userpass string
|
||||||
|
if s.IsBasicAuth() {
|
||||||
|
userpass, err = request.GetAuthDataStr()
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
userpassA := strings.Split(userpass, ":")
|
||||||
|
if len(userpassA) == 2 {
|
||||||
|
auth = socks.Auth{User: userpassA[0], Password: userpassA[1]}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err != nil || address == "" {
|
||||||
|
s.log.Printf("unknown request from: %s,%s", (*inConn).RemoteAddr(), string(h))
|
||||||
|
(*inConn).Close()
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
err = errors.New("unknown request")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//connect to parent
|
||||||
|
var outConn net.Conn
|
||||||
|
outConn, err = s.outPool.Get()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to %s , err:%s", *s.cfg.Parent, err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentCompress {
|
||||||
|
outConn = utils.NewCompConn(outConn)
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentKey != "" {
|
||||||
|
outConn = conncrypt.New(outConn, &conncrypt.Config{
|
||||||
|
Password: *s.cfg.ParentKey,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
if *s.cfg.ParentAuth != "" || s.IsBasicAuth() {
|
||||||
|
forwardBytes = utils.RemoveProxyHeaders(forwardBytes)
|
||||||
|
}
|
||||||
|
|
||||||
|
//ask parent for connect to target address
|
||||||
|
if *s.cfg.ParentServiceType == "http" {
|
||||||
|
//http parent
|
||||||
|
isHTTPS := false
|
||||||
|
|
||||||
|
pb := new(bytes.Buffer)
|
||||||
|
if len(forwardBytes) == 0 {
|
||||||
|
isHTTPS = true
|
||||||
|
pb.Write([]byte(fmt.Sprintf("CONNECT %s HTTP/1.1\r\n", address)))
|
||||||
|
}
|
||||||
|
pb.WriteString("Proxy-Connection: Keep-Alive\r\n")
|
||||||
|
|
||||||
|
u := ""
|
||||||
|
if *s.cfg.ParentAuth != "" {
|
||||||
|
a := strings.Split(*s.cfg.ParentAuth, ":")
|
||||||
|
if len(a) != 2 {
|
||||||
|
err = fmt.Errorf("parent auth data format error")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
u = fmt.Sprintf("%s:%s", a[0], a[1])
|
||||||
|
} else {
|
||||||
|
if !s.IsBasicAuth() && auth.Password != "" && auth.User != "" {
|
||||||
|
u = fmt.Sprintf("%s:%s", auth.User, auth.Password)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if u != "" {
|
||||||
|
pb.Write([]byte(fmt.Sprintf("Proxy-Authorization: Basic %s\r\n", base64.StdEncoding.EncodeToString([]byte(u)))))
|
||||||
|
}
|
||||||
|
|
||||||
|
if isHTTPS {
|
||||||
|
pb.Write([]byte("\r\n"))
|
||||||
|
} else {
|
||||||
|
forwardBytes = utils.InsertProxyHeaders(forwardBytes, string(pb.Bytes()))
|
||||||
|
pb.Reset()
|
||||||
|
pb.Write(forwardBytes)
|
||||||
|
forwardBytes = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = outConn.Write(pb.Bytes())
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("write CONNECT to %s , err:%s", *s.cfg.Parent, err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if isHTTPS {
|
||||||
|
reply := make([]byte, 1024)
|
||||||
|
outConn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = outConn.Read(reply)
|
||||||
|
outConn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read reply from %s , err:%s", *s.cfg.Parent, err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("reply: %s", string(reply[:n]))
|
||||||
|
}
|
||||||
|
} else if *s.cfg.ParentServiceType == "socks" {
|
||||||
|
s.log.Printf("connect %s", address)
|
||||||
|
//socks client
|
||||||
|
var clientConn *socks.ClientConn
|
||||||
|
if *s.cfg.ParentAuth != "" {
|
||||||
|
a := strings.Split(*s.cfg.ParentAuth, ":")
|
||||||
|
if len(a) != 2 {
|
||||||
|
err = fmt.Errorf("parent auth data format error")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
clientConn = socks.NewClientConn(&outConn, "tcp", address, time.Millisecond*time.Duration(*s.cfg.Timeout), &socks.Auth{User: a[0], Password: a[1]}, nil)
|
||||||
|
} else {
|
||||||
|
if !s.IsBasicAuth() && auth.Password != "" && auth.User != "" {
|
||||||
|
clientConn = socks.NewClientConn(&outConn, "tcp", address, time.Millisecond*time.Duration(*s.cfg.Timeout), &auth, nil)
|
||||||
|
} else {
|
||||||
|
clientConn = socks.NewClientConn(&outConn, "tcp", address, time.Millisecond*time.Duration(*s.cfg.Timeout), nil, nil)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err = clientConn.Handshake(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
//forward client data to target,if necessary.
|
||||||
|
if len(forwardBytes) > 0 {
|
||||||
|
outConn.Write(forwardBytes)
|
||||||
|
}
|
||||||
|
|
||||||
|
//bind
|
||||||
|
inAddr := (*inConn).RemoteAddr().String()
|
||||||
|
outAddr := outConn.RemoteAddr().String()
|
||||||
|
utils.IoBind((*inConn), outConn, func(err interface{}) {
|
||||||
|
s.log.Printf("conn %s - %s released [%s]", inAddr, outAddr, address)
|
||||||
|
s.userConns.Remove(inAddr)
|
||||||
|
}, s.log)
|
||||||
|
s.log.Printf("conn %s - %s connected [%s]", inAddr, outAddr, address)
|
||||||
|
if c, ok := s.userConns.Get(inAddr); ok {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
s.userConns.Set(inAddr, inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *SPS) InitBasicAuth() (err error) {
|
||||||
|
if *s.cfg.DNSAddress != "" {
|
||||||
|
s.basicAuth = utils.NewBasicAuth(&(*s).domainResolver, s.log)
|
||||||
|
} else {
|
||||||
|
s.basicAuth = utils.NewBasicAuth(nil, s.log)
|
||||||
|
}
|
||||||
|
if *s.cfg.AuthURL != "" {
|
||||||
|
s.basicAuth.SetAuthURL(*s.cfg.AuthURL, *s.cfg.AuthURLOkCode, *s.cfg.AuthURLTimeout, *s.cfg.AuthURLRetry)
|
||||||
|
s.log.Printf("auth from %s", *s.cfg.AuthURL)
|
||||||
|
}
|
||||||
|
if *s.cfg.AuthFile != "" {
|
||||||
|
var n = 0
|
||||||
|
n, err = s.basicAuth.AddFromFile(*s.cfg.AuthFile)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("auth-file ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("auth data added from file %d , total:%d", n, s.basicAuth.Total())
|
||||||
|
}
|
||||||
|
if len(*s.cfg.Auth) > 0 {
|
||||||
|
n := s.basicAuth.Add(*s.cfg.Auth)
|
||||||
|
s.log.Printf("auth data added %d, total:%d", n, s.basicAuth.Total())
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *SPS) IsBasicAuth() bool {
|
||||||
|
return *s.cfg.AuthFile != "" || len(*s.cfg.Auth) > 0 || *s.cfg.AuthURL != ""
|
||||||
|
}
|
||||||
|
func (s *SPS) buildRequest(address string) (buf []byte, err error) {
|
||||||
|
host, portStr, err := net.SplitHostPort(address)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
port, err := strconv.Atoi(portStr)
|
||||||
|
if err != nil {
|
||||||
|
err = errors.New("proxy: failed to parse port number: " + portStr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if port < 1 || port > 0xffff {
|
||||||
|
err = errors.New("proxy: port number out of range: " + portStr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
buf = buf[:0]
|
||||||
|
buf = append(buf, 0x05, 0x01, 0 /* reserved */)
|
||||||
|
|
||||||
|
if ip := net.ParseIP(host); ip != nil {
|
||||||
|
if ip4 := ip.To4(); ip4 != nil {
|
||||||
|
buf = append(buf, 0x01)
|
||||||
|
ip = ip4
|
||||||
|
} else {
|
||||||
|
buf = append(buf, 0x04)
|
||||||
|
}
|
||||||
|
buf = append(buf, ip...)
|
||||||
|
} else {
|
||||||
|
if len(host) > 255 {
|
||||||
|
err = errors.New("proxy: destination host name too long: " + host)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
buf = append(buf, 0x03)
|
||||||
|
buf = append(buf, byte(len(host)))
|
||||||
|
buf = append(buf, host...)
|
||||||
|
}
|
||||||
|
buf = append(buf, byte(port>>8), byte(port))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *SPS) Resolve(address string) string {
|
||||||
|
if *s.cfg.DNSAddress == "" {
|
||||||
|
return address
|
||||||
|
}
|
||||||
|
ip, err := s.domainResolver.Resolve(address)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("dns error %s , ERR:%s", address, err)
|
||||||
|
return address
|
||||||
|
}
|
||||||
|
return ip
|
||||||
|
}
|
||||||
235
services/tcp/tcp.go
Normal file
@ -0,0 +1,235 @@
|
|||||||
|
package tcp
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
|
||||||
|
"strconv"
|
||||||
|
)
|
||||||
|
|
||||||
|
type TCPArgs struct {
|
||||||
|
Parent *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Local *string
|
||||||
|
ParentType *string
|
||||||
|
LocalType *string
|
||||||
|
Timeout *int
|
||||||
|
CheckParentInterval *int
|
||||||
|
KCP kcpcfg.KCPConfigArgs
|
||||||
|
}
|
||||||
|
|
||||||
|
type TCP struct {
|
||||||
|
outPool utils.OutConn
|
||||||
|
cfg TCPArgs
|
||||||
|
sc *utils.ServerChannel
|
||||||
|
isStop bool
|
||||||
|
userConns utils.ConcurrentMap
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTCP() services.Service {
|
||||||
|
return &TCP{
|
||||||
|
outPool: utils.OutConn{},
|
||||||
|
cfg: TCPArgs{},
|
||||||
|
isStop: false,
|
||||||
|
userConns: utils.NewConcurrentMap(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TCP) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Parent == "" {
|
||||||
|
err = fmt.Errorf("parent required for %s %s", *s.cfg.LocalType, *s.cfg.Local)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "" {
|
||||||
|
err = fmt.Errorf("parent type unkown,use -T <tls|tcp|kcp|udp>")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "tls" || *s.cfg.LocalType == "tls" {
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TCP) InitService() (err error) {
|
||||||
|
s.InitOutConnPool()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TCP) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop tcp service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service tcp stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
if s.sc.Listener != nil && *s.sc.Listener != nil {
|
||||||
|
(*s.sc.Listener).Close()
|
||||||
|
}
|
||||||
|
if s.sc.UDPListener != nil {
|
||||||
|
(*s.sc.UDPListener).Close()
|
||||||
|
}
|
||||||
|
for _, c := range s.userConns.Items() {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TCP) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(TCPArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("use %s parent %s", *s.cfg.ParentType, *s.cfg.Parent)
|
||||||
|
host, port, _ := net.SplitHostPort(*s.cfg.Local)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
sc := utils.NewServerChannel(host, p, s.log)
|
||||||
|
|
||||||
|
if *s.cfg.LocalType == "tcp" {
|
||||||
|
err = sc.ListenTCP(s.callback)
|
||||||
|
} else if *s.cfg.LocalType == "tls" {
|
||||||
|
err = sc.ListenTls(s.cfg.CertBytes, s.cfg.KeyBytes, nil, s.callback)
|
||||||
|
} else if *s.cfg.LocalType == "kcp" {
|
||||||
|
err = sc.ListenKCP(s.cfg.KCP, s.callback, s.log)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("%s proxy on %s", *s.cfg.LocalType, (*sc.Listener).Addr())
|
||||||
|
s.sc = &sc
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *TCP) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *TCP) callback(inConn net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("%s conn handler crashed with err : %s \nstack: %s", *s.cfg.LocalType, err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
var err error
|
||||||
|
switch *s.cfg.ParentType {
|
||||||
|
case "kcp":
|
||||||
|
fallthrough
|
||||||
|
case "tcp":
|
||||||
|
fallthrough
|
||||||
|
case "tls":
|
||||||
|
err = s.OutToTCP(&inConn)
|
||||||
|
case "udp":
|
||||||
|
err = s.OutToUDP(&inConn)
|
||||||
|
default:
|
||||||
|
err = fmt.Errorf("unkown parent type %s", *s.cfg.ParentType)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to %s parent %s fail, ERR:%s", *s.cfg.ParentType, *s.cfg.Parent, err)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TCP) OutToTCP(inConn *net.Conn) (err error) {
|
||||||
|
var outConn net.Conn
|
||||||
|
outConn, err = s.outPool.Get()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to %s , err:%s", *s.cfg.Parent, err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
inAddr := (*inConn).RemoteAddr().String()
|
||||||
|
//inLocalAddr := (*inConn).LocalAddr().String()
|
||||||
|
outAddr := outConn.RemoteAddr().String()
|
||||||
|
//outLocalAddr := outConn.LocalAddr().String()
|
||||||
|
utils.IoBind((*inConn), outConn, func(err interface{}) {
|
||||||
|
s.log.Printf("conn %s - %s released", inAddr, outAddr)
|
||||||
|
s.userConns.Remove(inAddr)
|
||||||
|
}, s.log)
|
||||||
|
s.log.Printf("conn %s - %s connected", inAddr, outAddr)
|
||||||
|
if c, ok := s.userConns.Get(inAddr); ok {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
s.userConns.Set(inAddr, inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TCP) OutToUDP(inConn *net.Conn) (err error) {
|
||||||
|
s.log.Printf("conn created , remote : %s ", (*inConn).RemoteAddr())
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
(*inConn).Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
srcAddr, body, err := utils.ReadUDPPacket(bufio.NewReader(*inConn))
|
||||||
|
if err == io.EOF || err == io.ErrUnexpectedEOF {
|
||||||
|
//s.log.Printf("connection %s released", srcAddr)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
//log.Debugf("udp packet revecived:%s,%v", srcAddr, body)
|
||||||
|
dstAddr, err := net.ResolveUDPAddr("udp", *s.cfg.Parent)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("can't resolve address: %s", err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
clientSrcAddr := &net.UDPAddr{IP: net.IPv4zero, Port: 0}
|
||||||
|
conn, err := net.DialUDP("udp", clientSrcAddr, dstAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to udp %s fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = conn.Write(body)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("send udp packet to %s fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
//log.Debugf("send udp packet to %s success", dstAddr.String())
|
||||||
|
buf := make([]byte, 512)
|
||||||
|
len, _, err := conn.ReadFromUDP(buf)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read udp response from %s fail ,ERR:%s", dstAddr.String(), err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
respBody := buf[0:len]
|
||||||
|
//log.Debugf("revecived udp packet from %s , %v", dstAddr.String(), respBody)
|
||||||
|
_, err = (*inConn).Write(utils.UDPPacket(srcAddr, respBody))
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("send udp response fail ,ERR:%s", err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
//s.log.Printf("send udp response success ,from:%s", dstAddr.String())
|
||||||
|
}
|
||||||
|
return
|
||||||
|
|
||||||
|
}
|
||||||
|
func (s *TCP) InitOutConnPool() {
|
||||||
|
if *s.cfg.ParentType == "tls" || *s.cfg.ParentType == "tcp" || *s.cfg.ParentType == "kcp" {
|
||||||
|
//dur int, isTLS bool, certBytes, keyBytes []byte,
|
||||||
|
//parent string, timeout int, InitialCap int, MaxCap int
|
||||||
|
s.outPool = utils.NewOutConn(
|
||||||
|
*s.cfg.CheckParentInterval,
|
||||||
|
*s.cfg.ParentType,
|
||||||
|
s.cfg.KCP,
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, nil,
|
||||||
|
*s.cfg.Parent,
|
||||||
|
*s.cfg.Timeout,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
216
services/tunnel/tunnel_bridge.go
Normal file
@ -0,0 +1,216 @@
|
|||||||
|
package tunnel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"strconv"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
|
||||||
|
//"github.com/xtaci/smux"
|
||||||
|
smux "github.com/hashicorp/yamux"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
CONN_CLIENT_CONTROL = uint8(1)
|
||||||
|
CONN_SERVER = uint8(4)
|
||||||
|
CONN_CLIENT = uint8(5)
|
||||||
|
)
|
||||||
|
|
||||||
|
type TunnelBridgeArgs struct {
|
||||||
|
Parent *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Local *string
|
||||||
|
Timeout *int
|
||||||
|
Mux *bool
|
||||||
|
}
|
||||||
|
type ServerConn struct {
|
||||||
|
//ClientLocalAddr string //tcp:2.2.22:333@ID
|
||||||
|
Conn *net.Conn
|
||||||
|
}
|
||||||
|
type TunnelBridge struct {
|
||||||
|
cfg TunnelBridgeArgs
|
||||||
|
serverConns utils.ConcurrentMap
|
||||||
|
clientControlConns utils.ConcurrentMap
|
||||||
|
isStop bool
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTunnelBridge() services.Service {
|
||||||
|
return &TunnelBridge{
|
||||||
|
cfg: TunnelBridgeArgs{},
|
||||||
|
serverConns: utils.NewConcurrentMap(),
|
||||||
|
clientControlConns: utils.NewConcurrentMap(),
|
||||||
|
isStop: false,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *TunnelBridge) InitService() (err error) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelBridge) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.CertFile == "" || *s.cfg.KeyFile == "" {
|
||||||
|
err = fmt.Errorf("cert and key file required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelBridge) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop tbridge service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service tbridge stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
for _, sess := range s.clientControlConns.Items() {
|
||||||
|
(*sess.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
for _, sess := range s.serverConns.Items() {
|
||||||
|
(*sess.(ServerConn).Conn).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TunnelBridge) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(TunnelBridgeArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
host, port, _ := net.SplitHostPort(*s.cfg.Local)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
sc := utils.NewServerChannel(host, p, s.log)
|
||||||
|
|
||||||
|
err = sc.ListenTls(s.cfg.CertBytes, s.cfg.KeyBytes, nil, s.callback)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("proxy on tunnel bridge mode %s", (*sc.Listener).Addr())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelBridge) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *TunnelBridge) callback(inConn net.Conn) {
|
||||||
|
var err error
|
||||||
|
//s.log.Printf("connection from %s ", inConn.RemoteAddr())
|
||||||
|
sess, err := smux.Server(inConn, &smux.Config{
|
||||||
|
AcceptBacklog: 256,
|
||||||
|
EnableKeepAlive: true,
|
||||||
|
KeepAliveInterval: 9 * time.Second,
|
||||||
|
ConnectionWriteTimeout: 3 * time.Second,
|
||||||
|
MaxStreamWindowSize: 512 * 1024,
|
||||||
|
LogOutput: os.Stderr,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("new mux server conn error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
inConn, err = sess.AcceptStream()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("mux server conn accept error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var buf = make([]byte, 1024)
|
||||||
|
n, _ := inConn.Read(buf)
|
||||||
|
reader := bytes.NewReader(buf[:n])
|
||||||
|
//reader := bufio.NewReader(inConn)
|
||||||
|
|
||||||
|
var connType uint8
|
||||||
|
err = utils.ReadPacket(reader, &connType)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
switch connType {
|
||||||
|
case CONN_SERVER:
|
||||||
|
var key, ID, clientLocalAddr, serverID string
|
||||||
|
err = utils.ReadPacketData(reader, &key, &ID, &clientLocalAddr, &serverID)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
packet := utils.BuildPacketData(ID, clientLocalAddr, serverID)
|
||||||
|
s.log.Printf("server connection, key: %s , id: %s %s %s", key, ID, clientLocalAddr, serverID)
|
||||||
|
|
||||||
|
//addr := clientLocalAddr + "@" + ID
|
||||||
|
s.serverConns.Set(ID, ServerConn{
|
||||||
|
Conn: &inConn,
|
||||||
|
})
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
item, ok := s.clientControlConns.Get(key)
|
||||||
|
if !ok {
|
||||||
|
s.log.Printf("client %s control conn not exists", key)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
(*item.(*net.Conn)).SetWriteDeadline(time.Now().Add(time.Second * 3))
|
||||||
|
_, err := (*item.(*net.Conn)).Write(packet)
|
||||||
|
(*item.(*net.Conn)).SetWriteDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("%s client control conn write signal fail, err: %s, retrying...", key, err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
// s.cmServer.Add(serverID, ID, &inConn)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
case CONN_CLIENT:
|
||||||
|
var key, ID, serverID string
|
||||||
|
err = utils.ReadPacketData(reader, &key, &ID, &serverID)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("client connection , key: %s , id: %s, server id:%s", key, ID, serverID)
|
||||||
|
|
||||||
|
serverConnItem, ok := s.serverConns.Get(ID)
|
||||||
|
if !ok {
|
||||||
|
inConn.Close()
|
||||||
|
s.log.Printf("server conn %s exists", ID)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
serverConn := serverConnItem.(ServerConn).Conn
|
||||||
|
utils.IoBind(*serverConn, inConn, func(err interface{}) {
|
||||||
|
s.serverConns.Remove(ID)
|
||||||
|
// s.cmClient.RemoveOne(key, ID)
|
||||||
|
// s.cmServer.RemoveOne(serverID, ID)
|
||||||
|
s.log.Printf("conn %s released", ID)
|
||||||
|
}, s.log)
|
||||||
|
// s.cmClient.Add(key, ID, &inConn)
|
||||||
|
s.log.Printf("conn %s created", ID)
|
||||||
|
|
||||||
|
case CONN_CLIENT_CONTROL:
|
||||||
|
var key string
|
||||||
|
err = utils.ReadPacketData(reader, &key)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read error,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("client control connection, key: %s", key)
|
||||||
|
if s.clientControlConns.Has(key) {
|
||||||
|
item, _ := s.clientControlConns.Get(key)
|
||||||
|
(*item.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
s.clientControlConns.Set(key, &inConn)
|
||||||
|
s.log.Printf("set client %s control conn", key)
|
||||||
|
}
|
||||||
|
}
|
||||||
312
services/tunnel/tunnel_client.go
Normal file
@ -0,0 +1,312 @@
|
|||||||
|
package tunnel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
//"github.com/xtaci/smux"
|
||||||
|
smux "github.com/hashicorp/yamux"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
CONN_SERVER_MUX = uint8(6)
|
||||||
|
CONN_CLIENT_MUX = uint8(7)
|
||||||
|
)
|
||||||
|
|
||||||
|
type TunnelClientArgs struct {
|
||||||
|
Parent *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Key *string
|
||||||
|
Timeout *int
|
||||||
|
Mux *bool
|
||||||
|
}
|
||||||
|
type TunnelClient struct {
|
||||||
|
cfg TunnelClientArgs
|
||||||
|
ctrlConn net.Conn
|
||||||
|
isStop bool
|
||||||
|
userConns utils.ConcurrentMap
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTunnelClient() services.Service {
|
||||||
|
return &TunnelClient{
|
||||||
|
cfg: TunnelClientArgs{},
|
||||||
|
userConns: utils.NewConcurrentMap(),
|
||||||
|
isStop: false,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *TunnelClient) InitService() (err error) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *TunnelClient) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
s.log.Printf("use tls parent %s", *s.cfg.Parent)
|
||||||
|
} else {
|
||||||
|
err = fmt.Errorf("parent required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.CertFile == "" || *s.cfg.KeyFile == "" {
|
||||||
|
err = fmt.Errorf("cert and key file required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelClient) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop tclient service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service tclient stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
if s.ctrlConn != nil {
|
||||||
|
s.ctrlConn.Close()
|
||||||
|
}
|
||||||
|
for _, c := range s.userConns.Items() {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TunnelClient) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(TunnelClientArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("proxy on tunnel client mode")
|
||||||
|
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if s.ctrlConn != nil {
|
||||||
|
s.ctrlConn.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
s.ctrlConn, err = s.GetInConn(CONN_CLIENT_CONTROL, *s.cfg.Key)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("control connection err: %s, retrying...", err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
if s.ctrlConn != nil {
|
||||||
|
s.ctrlConn.Close()
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var ID, clientLocalAddr, serverID string
|
||||||
|
err = utils.ReadPacketData(s.ctrlConn, &ID, &clientLocalAddr, &serverID)
|
||||||
|
if err != nil {
|
||||||
|
if s.ctrlConn != nil {
|
||||||
|
s.ctrlConn.Close()
|
||||||
|
}
|
||||||
|
s.log.Printf("read connection signal err: %s, retrying...", err)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
s.log.Printf("signal revecived:%s %s %s", serverID, ID, clientLocalAddr)
|
||||||
|
protocol := clientLocalAddr[:3]
|
||||||
|
localAddr := clientLocalAddr[4:]
|
||||||
|
if protocol == "udp" {
|
||||||
|
go s.ServeUDP(localAddr, ID, serverID)
|
||||||
|
} else {
|
||||||
|
go s.ServeConn(localAddr, ID, serverID)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TunnelClient) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *TunnelClient) GetInConn(typ uint8, data ...string) (outConn net.Conn, err error) {
|
||||||
|
outConn, err = s.GetConn()
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("connection err: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
_, err = outConn.Write(utils.BuildPacket(typ, data...))
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("write connection data err: %s ,retrying...", err)
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelClient) GetConn() (conn net.Conn, err error) {
|
||||||
|
var _conn tls.Conn
|
||||||
|
_conn, err = utils.TlsConnectHost(*s.cfg.Parent, *s.cfg.Timeout, s.cfg.CertBytes, s.cfg.KeyBytes, nil)
|
||||||
|
if err == nil {
|
||||||
|
conn = net.Conn(&_conn)
|
||||||
|
c, e := smux.Client(conn, &smux.Config{
|
||||||
|
AcceptBacklog: 256,
|
||||||
|
EnableKeepAlive: true,
|
||||||
|
KeepAliveInterval: 9 * time.Second,
|
||||||
|
ConnectionWriteTimeout: 3 * time.Second,
|
||||||
|
MaxStreamWindowSize: 512 * 1024,
|
||||||
|
LogOutput: os.Stderr,
|
||||||
|
})
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("new mux client conn error,ERR:%s", e)
|
||||||
|
err = e
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn, e = c.OpenStream()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("mux client conn open stream error,ERR:%s", e)
|
||||||
|
err = e
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelClient) ServeUDP(localAddr, ID, serverID string) {
|
||||||
|
var inConn net.Conn
|
||||||
|
var err error
|
||||||
|
// for {
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
if inConn != nil {
|
||||||
|
inConn.Close()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// s.cm.RemoveOne(*s.cfg.Key, ID)
|
||||||
|
inConn, err = s.GetInConn(CONN_CLIENT, *s.cfg.Key, ID, serverID)
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
s.log.Printf("connection err: %s, retrying...", err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// s.cm.Add(*s.cfg.Key, ID, &inConn)
|
||||||
|
s.log.Printf("conn %s created", ID)
|
||||||
|
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
srcAddr, body, err := utils.ReadUDPPacket(inConn)
|
||||||
|
if err == io.EOF || err == io.ErrUnexpectedEOF {
|
||||||
|
s.log.Printf("connection %s released", ID)
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
break
|
||||||
|
} else if err != nil {
|
||||||
|
s.log.Printf("udp packet revecived fail, err: %s", err)
|
||||||
|
} else {
|
||||||
|
//s.log.Printf("udp packet revecived:%s,%v", srcAddr, body)
|
||||||
|
go s.processUDPPacket(&inConn, srcAddr, localAddr, body)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
// }
|
||||||
|
}
|
||||||
|
func (s *TunnelClient) processUDPPacket(inConn *net.Conn, srcAddr, localAddr string, body []byte) {
|
||||||
|
dstAddr, err := net.ResolveUDPAddr("udp", localAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("can't resolve address: %s", err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
clientSrcAddr := &net.UDPAddr{IP: net.IPv4zero, Port: 0}
|
||||||
|
conn, err := net.DialUDP("udp", clientSrcAddr, dstAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to udp %s fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = conn.Write(body)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("send udp packet to %s fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("send udp packet to %s success", dstAddr.String())
|
||||||
|
buf := make([]byte, 1024)
|
||||||
|
length, _, err := conn.ReadFromUDP(buf)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read udp response from %s fail ,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
respBody := buf[0:length]
|
||||||
|
//s.log.Printf("revecived udp packet from %s , %v", dstAddr.String(), respBody)
|
||||||
|
bs := utils.UDPPacket(srcAddr, respBody)
|
||||||
|
_, err = (*inConn).Write(bs)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("send udp response fail ,ERR:%s", err)
|
||||||
|
utils.CloseConn(inConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("send udp response success ,from:%s ,%d ,%v", dstAddr.String(), len(bs), bs)
|
||||||
|
}
|
||||||
|
func (s *TunnelClient) ServeConn(localAddr, ID, serverID string) {
|
||||||
|
var inConn, outConn net.Conn
|
||||||
|
var err error
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
inConn, err = s.GetInConn(CONN_CLIENT, *s.cfg.Key, ID, serverID)
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
s.log.Printf("connection err: %s, retrying...", err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
i := 0
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
i++
|
||||||
|
outConn, err = utils.ConnectHost(localAddr, *s.cfg.Timeout)
|
||||||
|
if err == nil || i == 3 {
|
||||||
|
break
|
||||||
|
} else {
|
||||||
|
if i == 3 {
|
||||||
|
s.log.Printf("connect to %s err: %s, retrying...", localAddr, err)
|
||||||
|
time.Sleep(2 * time.Second)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&inConn)
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
s.log.Printf("build connection error, err: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
inAddr := inConn.RemoteAddr().String()
|
||||||
|
utils.IoBind(inConn, outConn, func(err interface{}) {
|
||||||
|
s.log.Printf("conn %s released", ID)
|
||||||
|
s.userConns.Remove(inAddr)
|
||||||
|
}, s.log)
|
||||||
|
if c, ok := s.userConns.Get(inAddr); ok {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
s.userConns.Set(inAddr, &inConn)
|
||||||
|
s.log.Printf("conn %s created", ID)
|
||||||
|
}
|
||||||
415
services/tunnel/tunnel_server.go
Normal file
@ -0,0 +1,415 @@
|
|||||||
|
package tunnel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"runtime/debug"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
|
||||||
|
//"github.com/xtaci/smux"
|
||||||
|
smux "github.com/hashicorp/yamux"
|
||||||
|
)
|
||||||
|
|
||||||
|
type TunnelServerArgs struct {
|
||||||
|
Parent *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Local *string
|
||||||
|
IsUDP *bool
|
||||||
|
Key *string
|
||||||
|
Remote *string
|
||||||
|
Timeout *int
|
||||||
|
Route *[]string
|
||||||
|
Mgr *TunnelServerManager
|
||||||
|
Mux *bool
|
||||||
|
}
|
||||||
|
type UDPItem struct {
|
||||||
|
packet *[]byte
|
||||||
|
localAddr *net.UDPAddr
|
||||||
|
srcAddr *net.UDPAddr
|
||||||
|
}
|
||||||
|
type TunnelServerManager struct {
|
||||||
|
cfg TunnelServerArgs
|
||||||
|
udpChn chan UDPItem
|
||||||
|
serverID string
|
||||||
|
servers []*services.Service
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTunnelServerManager() services.Service {
|
||||||
|
return &TunnelServerManager{
|
||||||
|
cfg: TunnelServerArgs{},
|
||||||
|
udpChn: make(chan UDPItem, 50000),
|
||||||
|
serverID: utils.Uniqueid(),
|
||||||
|
servers: []*services.Service{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TunnelServerManager) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(TunnelServerArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.Parent != "" {
|
||||||
|
s.log.Printf("use tls parent %s", *s.cfg.Parent)
|
||||||
|
} else {
|
||||||
|
err = fmt.Errorf("parent required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
s.log.Printf("server id: %s", s.serverID)
|
||||||
|
//s.log.Printf("route:%v", *s.cfg.Route)
|
||||||
|
for _, _info := range *s.cfg.Route {
|
||||||
|
IsUDP := *s.cfg.IsUDP
|
||||||
|
if strings.HasPrefix(_info, "udp://") {
|
||||||
|
IsUDP = true
|
||||||
|
}
|
||||||
|
info := strings.TrimPrefix(_info, "udp://")
|
||||||
|
info = strings.TrimPrefix(info, "tcp://")
|
||||||
|
_routeInfo := strings.Split(info, "@")
|
||||||
|
server := NewTunnelServer()
|
||||||
|
local := _routeInfo[0]
|
||||||
|
remote := _routeInfo[1]
|
||||||
|
KEY := *s.cfg.Key
|
||||||
|
if strings.HasPrefix(remote, "[") {
|
||||||
|
KEY = remote[1:strings.LastIndex(remote, "]")]
|
||||||
|
remote = remote[strings.LastIndex(remote, "]")+1:]
|
||||||
|
}
|
||||||
|
if strings.HasPrefix(remote, ":") {
|
||||||
|
remote = fmt.Sprintf("127.0.0.1%s", remote)
|
||||||
|
}
|
||||||
|
err = server.Start(TunnelServerArgs{
|
||||||
|
CertBytes: s.cfg.CertBytes,
|
||||||
|
KeyBytes: s.cfg.KeyBytes,
|
||||||
|
Parent: s.cfg.Parent,
|
||||||
|
CertFile: s.cfg.CertFile,
|
||||||
|
KeyFile: s.cfg.KeyFile,
|
||||||
|
Local: &local,
|
||||||
|
IsUDP: &IsUDP,
|
||||||
|
Remote: &remote,
|
||||||
|
Key: &KEY,
|
||||||
|
Timeout: s.cfg.Timeout,
|
||||||
|
Mgr: s,
|
||||||
|
}, log)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.servers = append(s.servers, &server)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelServerManager) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *TunnelServerManager) StopService() {
|
||||||
|
for _, server := range s.servers {
|
||||||
|
(*server).Clean()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TunnelServerManager) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.CertFile == "" || *s.cfg.KeyFile == "" {
|
||||||
|
err = fmt.Errorf("cert and key file required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelServerManager) InitService() (err error) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *TunnelServerManager) GetOutConn(typ uint8) (outConn net.Conn, ID string, err error) {
|
||||||
|
outConn, err = s.GetConn()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connection err: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
ID = s.serverID
|
||||||
|
_, err = outConn.Write(utils.BuildPacket(typ, s.serverID))
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("write connection data err: %s ,retrying...", err)
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelServerManager) GetConn() (conn net.Conn, err error) {
|
||||||
|
var _conn tls.Conn
|
||||||
|
_conn, err = utils.TlsConnectHost(*s.cfg.Parent, *s.cfg.Timeout, s.cfg.CertBytes, s.cfg.KeyBytes, nil)
|
||||||
|
if err == nil {
|
||||||
|
conn = net.Conn(&_conn)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
type TunnelServer struct {
|
||||||
|
cfg TunnelServerArgs
|
||||||
|
udpChn chan UDPItem
|
||||||
|
sc utils.ServerChannel
|
||||||
|
isStop bool
|
||||||
|
udpConn *net.Conn
|
||||||
|
userConns utils.ConcurrentMap
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewTunnelServer() services.Service {
|
||||||
|
return &TunnelServer{
|
||||||
|
cfg: TunnelServerArgs{},
|
||||||
|
udpChn: make(chan UDPItem, 50000),
|
||||||
|
isStop: false,
|
||||||
|
userConns: utils.NewConcurrentMap(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *TunnelServer) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop server service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service server stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
|
||||||
|
if s.sc.Listener != nil {
|
||||||
|
(*s.sc.Listener).Close()
|
||||||
|
}
|
||||||
|
if s.sc.UDPListener != nil {
|
||||||
|
(*s.sc.UDPListener).Close()
|
||||||
|
}
|
||||||
|
if s.udpConn != nil {
|
||||||
|
(*s.udpConn).Close()
|
||||||
|
}
|
||||||
|
for _, c := range s.userConns.Items() {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *TunnelServer) InitService() (err error) {
|
||||||
|
s.UDPConnDeamon()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelServer) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Remote == "" {
|
||||||
|
err = fmt.Errorf("remote required")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *TunnelServer) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(TunnelServerArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
host, port, _ := net.SplitHostPort(*s.cfg.Local)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
s.sc = utils.NewServerChannel(host, p, s.log)
|
||||||
|
if *s.cfg.IsUDP {
|
||||||
|
err = s.sc.ListenUDP(func(packet []byte, localAddr, srcAddr *net.UDPAddr) {
|
||||||
|
s.udpChn <- UDPItem{
|
||||||
|
packet: &packet,
|
||||||
|
localAddr: localAddr,
|
||||||
|
srcAddr: srcAddr,
|
||||||
|
}
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("proxy on udp tunnel server mode %s", (*s.sc.UDPListener).LocalAddr())
|
||||||
|
} else {
|
||||||
|
err = s.sc.ListenTCP(func(inConn net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("tserver conn handler crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
var outConn net.Conn
|
||||||
|
var ID string
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
outConn, ID, err = s.GetOutConn(CONN_SERVER)
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
s.log.Printf("connect to %s fail, err: %s, retrying...", *s.cfg.Parent, err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
inAddr := inConn.RemoteAddr().String()
|
||||||
|
utils.IoBind(inConn, outConn, func(err interface{}) {
|
||||||
|
s.userConns.Remove(inAddr)
|
||||||
|
s.log.Printf("%s conn %s released", *s.cfg.Key, ID)
|
||||||
|
}, s.log)
|
||||||
|
if c, ok := s.userConns.Get(inAddr); ok {
|
||||||
|
(*c.(*net.Conn)).Close()
|
||||||
|
}
|
||||||
|
s.userConns.Set(inAddr, &inConn)
|
||||||
|
s.log.Printf("%s conn %s created", *s.cfg.Key, ID)
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("proxy on tunnel server mode %s", (*s.sc.Listener).Addr())
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelServer) Clean() {
|
||||||
|
|
||||||
|
}
|
||||||
|
func (s *TunnelServer) GetOutConn(typ uint8) (outConn net.Conn, ID string, err error) {
|
||||||
|
outConn, err = s.GetConn()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connection err: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
remoteAddr := "tcp:" + *s.cfg.Remote
|
||||||
|
if *s.cfg.IsUDP {
|
||||||
|
remoteAddr = "udp:" + *s.cfg.Remote
|
||||||
|
}
|
||||||
|
ID = utils.Uniqueid()
|
||||||
|
_, err = outConn.Write(utils.BuildPacket(typ, *s.cfg.Key, ID, remoteAddr, s.cfg.Mgr.serverID))
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("write connection data err: %s ,retrying...", err)
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelServer) GetConn() (conn net.Conn, err error) {
|
||||||
|
var _conn tls.Conn
|
||||||
|
_conn, err = utils.TlsConnectHost(*s.cfg.Parent, *s.cfg.Timeout, s.cfg.CertBytes, s.cfg.KeyBytes, nil)
|
||||||
|
if err == nil {
|
||||||
|
conn = net.Conn(&_conn)
|
||||||
|
c, e := smux.Client(conn, &smux.Config{
|
||||||
|
AcceptBacklog: 256,
|
||||||
|
EnableKeepAlive: true,
|
||||||
|
KeepAliveInterval: 9 * time.Second,
|
||||||
|
ConnectionWriteTimeout: 3 * time.Second,
|
||||||
|
MaxStreamWindowSize: 512 * 1024,
|
||||||
|
LogOutput: os.Stderr,
|
||||||
|
})
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("new mux client conn error,ERR:%s", e)
|
||||||
|
err = e
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn, e = c.OpenStream()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("mux client conn open stream error,ERR:%s", e)
|
||||||
|
err = e
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *TunnelServer) UDPConnDeamon() {
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("udp conn deamon crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
var outConn net.Conn
|
||||||
|
// var hb utils.HeartbeatReadWriter
|
||||||
|
var ID string
|
||||||
|
// var cmdChn = make(chan bool, 1000)
|
||||||
|
var err error
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
item := <-s.udpChn
|
||||||
|
RETRY:
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if outConn == nil {
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
outConn, ID, err = s.GetOutConn(CONN_SERVER)
|
||||||
|
if err != nil {
|
||||||
|
// cmdChn <- true
|
||||||
|
outConn = nil
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
s.log.Printf("connect to %s fail, err: %s, retrying...", *s.cfg.Parent, err)
|
||||||
|
time.Sleep(time.Second * 3)
|
||||||
|
continue
|
||||||
|
} else {
|
||||||
|
go func(outConn net.Conn, ID string) {
|
||||||
|
if s.udpConn != nil {
|
||||||
|
(*s.udpConn).Close()
|
||||||
|
}
|
||||||
|
s.udpConn = &outConn
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
srcAddrFromConn, body, err := utils.ReadUDPPacket(outConn)
|
||||||
|
if err == io.EOF || err == io.ErrUnexpectedEOF {
|
||||||
|
s.log.Printf("UDP deamon connection %s exited", ID)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("parse revecived udp packet fail, err: %s ,%v", err, body)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
//s.log.Printf("udp packet revecived over parent , local:%s", srcAddrFromConn)
|
||||||
|
_srcAddr := strings.Split(srcAddrFromConn, ":")
|
||||||
|
if len(_srcAddr) != 2 {
|
||||||
|
s.log.Printf("parse revecived udp packet fail, addr error : %s", srcAddrFromConn)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
port, _ := strconv.Atoi(_srcAddr[1])
|
||||||
|
dstAddr := &net.UDPAddr{IP: net.ParseIP(_srcAddr[0]), Port: port}
|
||||||
|
_, err = s.sc.UDPListener.WriteToUDP(body, dstAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp response to local %s fail,ERR:%s", srcAddrFromConn, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
//s.log.Printf("udp response to local %s success , %v", srcAddrFromConn, body)
|
||||||
|
}
|
||||||
|
}(outConn, ID)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
outConn.SetWriteDeadline(time.Now().Add(time.Second))
|
||||||
|
_, err = outConn.Write(utils.UDPPacket(item.srcAddr.String(), *item.packet))
|
||||||
|
outConn.SetWriteDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
utils.CloseConn(&outConn)
|
||||||
|
outConn = nil
|
||||||
|
s.log.Printf("write udp packet to %s fail ,flush err:%s ,retrying...", *s.cfg.Parent, err)
|
||||||
|
goto RETRY
|
||||||
|
}
|
||||||
|
//s.log.Printf("write packet %v", *item.packet)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
261
services/udp/udp.go
Normal file
@ -0,0 +1,261 @@
|
|||||||
|
package udp
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"fmt"
|
||||||
|
"hash/crc32"
|
||||||
|
"io"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services"
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
)
|
||||||
|
|
||||||
|
type UDPArgs struct {
|
||||||
|
Parent *string
|
||||||
|
CertFile *string
|
||||||
|
KeyFile *string
|
||||||
|
CertBytes []byte
|
||||||
|
KeyBytes []byte
|
||||||
|
Local *string
|
||||||
|
ParentType *string
|
||||||
|
Timeout *int
|
||||||
|
CheckParentInterval *int
|
||||||
|
}
|
||||||
|
type UDP struct {
|
||||||
|
p utils.ConcurrentMap
|
||||||
|
outPool utils.OutConn
|
||||||
|
cfg UDPArgs
|
||||||
|
sc *utils.ServerChannel
|
||||||
|
isStop bool
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewUDP() services.Service {
|
||||||
|
return &UDP{
|
||||||
|
outPool: utils.OutConn{},
|
||||||
|
p: utils.NewConcurrentMap(),
|
||||||
|
isStop: false,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *UDP) CheckArgs() (err error) {
|
||||||
|
if *s.cfg.Parent == "" {
|
||||||
|
err = fmt.Errorf("parent required for udp %s", *s.cfg.Local)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "" {
|
||||||
|
err = fmt.Errorf("parent type unkown,use -T <tls|tcp>")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if *s.cfg.ParentType == "tls" {
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, err = utils.TlsBytes(*s.cfg.CertFile, *s.cfg.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *UDP) InitService() (err error) {
|
||||||
|
if *s.cfg.ParentType != "udp" {
|
||||||
|
s.InitOutConnPool()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *UDP) StopService() {
|
||||||
|
defer func() {
|
||||||
|
e := recover()
|
||||||
|
if e != nil {
|
||||||
|
s.log.Printf("stop udp service crashed,%s", e)
|
||||||
|
} else {
|
||||||
|
s.log.Printf("service udp stoped")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.isStop = true
|
||||||
|
if s.sc.Listener != nil && *s.sc.Listener != nil {
|
||||||
|
(*s.sc.Listener).Close()
|
||||||
|
}
|
||||||
|
if s.sc.UDPListener != nil {
|
||||||
|
(*s.sc.UDPListener).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *UDP) Start(args interface{}, log *logger.Logger) (err error) {
|
||||||
|
s.log = log
|
||||||
|
s.cfg = args.(UDPArgs)
|
||||||
|
if err = s.CheckArgs(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("use %s parent %s", *s.cfg.ParentType, *s.cfg.Parent)
|
||||||
|
if err = s.InitService(); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
host, port, _ := net.SplitHostPort(*s.cfg.Local)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
sc := utils.NewServerChannel(host, p, s.log)
|
||||||
|
s.sc = &sc
|
||||||
|
err = sc.ListenUDP(s.callback)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.log.Printf("udp proxy on %s", (*sc.UDPListener).LocalAddr())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *UDP) Clean() {
|
||||||
|
s.StopService()
|
||||||
|
}
|
||||||
|
func (s *UDP) callback(packet []byte, localAddr, srcAddr *net.UDPAddr) {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("udp conn handler crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
var err error
|
||||||
|
switch *s.cfg.ParentType {
|
||||||
|
case "tcp":
|
||||||
|
fallthrough
|
||||||
|
case "tls":
|
||||||
|
err = s.OutToTCP(packet, localAddr, srcAddr)
|
||||||
|
case "udp":
|
||||||
|
err = s.OutToUDP(packet, localAddr, srcAddr)
|
||||||
|
default:
|
||||||
|
err = fmt.Errorf("unkown parent type %s", *s.cfg.ParentType)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to %s parent %s fail, ERR:%s", *s.cfg.ParentType, *s.cfg.Parent, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (s *UDP) GetConn(connKey string) (conn net.Conn, isNew bool, err error) {
|
||||||
|
isNew = !s.p.Has(connKey)
|
||||||
|
var _conn interface{}
|
||||||
|
if isNew {
|
||||||
|
_conn, err = s.outPool.Get()
|
||||||
|
if err != nil {
|
||||||
|
return nil, false, err
|
||||||
|
}
|
||||||
|
s.p.Set(connKey, _conn)
|
||||||
|
} else {
|
||||||
|
_conn, _ = s.p.Get(connKey)
|
||||||
|
}
|
||||||
|
conn = _conn.(net.Conn)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *UDP) OutToTCP(packet []byte, localAddr, srcAddr *net.UDPAddr) (err error) {
|
||||||
|
numLocal := crc32.ChecksumIEEE([]byte(localAddr.String()))
|
||||||
|
numSrc := crc32.ChecksumIEEE([]byte(srcAddr.String()))
|
||||||
|
mod := uint32(10)
|
||||||
|
if mod == 0 {
|
||||||
|
mod = 10
|
||||||
|
}
|
||||||
|
connKey := uint64((numLocal/10)*10 + numSrc%mod)
|
||||||
|
conn, isNew, err := s.GetConn(fmt.Sprintf("%d", connKey))
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("upd get conn to %s parent %s fail, ERR:%s", *s.cfg.ParentType, *s.cfg.Parent, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if isNew {
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
s.log.Printf("udp conn handler out to tcp crashed with err : %s \nstack: %s", err, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s.log.Printf("conn %d created , local: %s", connKey, srcAddr.String())
|
||||||
|
for {
|
||||||
|
if s.isStop {
|
||||||
|
conn.Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
srcAddrFromConn, body, err := utils.ReadUDPPacket(bufio.NewReader(conn))
|
||||||
|
if err == io.EOF || err == io.ErrUnexpectedEOF {
|
||||||
|
//s.log.Printf("connection %d released", connKey)
|
||||||
|
s.p.Remove(fmt.Sprintf("%d", connKey))
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("parse revecived udp packet fail, err: %s", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
//s.log.Printf("udp packet revecived over parent , local:%s", srcAddrFromConn)
|
||||||
|
_srcAddr := strings.Split(srcAddrFromConn, ":")
|
||||||
|
if len(_srcAddr) != 2 {
|
||||||
|
s.log.Printf("parse revecived udp packet fail, addr error : %s", srcAddrFromConn)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
port, _ := strconv.Atoi(_srcAddr[1])
|
||||||
|
dstAddr := &net.UDPAddr{IP: net.ParseIP(_srcAddr[0]), Port: port}
|
||||||
|
_, err = s.sc.UDPListener.WriteToUDP(body, dstAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("udp response to local %s fail,ERR:%s", srcAddr, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
//s.log.Printf("udp response to local %s success", srcAddr)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
//s.log.Printf("select conn %d , local: %s", connKey, srcAddr.String())
|
||||||
|
writer := bufio.NewWriter(conn)
|
||||||
|
//fmt.Println(conn, writer)
|
||||||
|
writer.Write(utils.UDPPacket(srcAddr.String(), packet))
|
||||||
|
err = writer.Flush()
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("write udp packet to %s fail ,flush err:%s", *s.cfg.Parent, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("write packet %v", packet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *UDP) OutToUDP(packet []byte, localAddr, srcAddr *net.UDPAddr) (err error) {
|
||||||
|
//s.log.Printf("udp packet revecived:%s,%v", srcAddr, packet)
|
||||||
|
dstAddr, err := net.ResolveUDPAddr("udp", *s.cfg.Parent)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("resolve udp addr %s fail fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
clientSrcAddr := &net.UDPAddr{IP: net.IPv4zero, Port: 0}
|
||||||
|
conn, err := net.DialUDP("udp", clientSrcAddr, dstAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("connect to udp %s fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(*s.cfg.Timeout)))
|
||||||
|
_, err = conn.Write(packet)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("send udp packet to %s fail,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("send udp packet to %s success", dstAddr.String())
|
||||||
|
buf := make([]byte, 512)
|
||||||
|
len, _, err := conn.ReadFromUDP(buf)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("read udp response from %s fail ,ERR:%s", dstAddr.String(), err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("revecived udp packet from %s , %v", dstAddr.String(), respBody)
|
||||||
|
_, err = s.sc.UDPListener.WriteToUDP(buf[0:len], srcAddr)
|
||||||
|
if err != nil {
|
||||||
|
s.log.Printf("send udp response to cluster fail ,ERR:%s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//s.log.Printf("send udp response to cluster success ,from:%s", dstAddr.String())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *UDP) InitOutConnPool() {
|
||||||
|
if *s.cfg.ParentType == "tls" || *s.cfg.ParentType == "tcp" {
|
||||||
|
//dur int, isTLS bool, certBytes, keyBytes []byte,
|
||||||
|
//parent string, timeout int, InitialCap int, MaxCap int
|
||||||
|
s.outPool = utils.NewOutConn(
|
||||||
|
*s.cfg.CheckParentInterval,
|
||||||
|
*s.cfg.ParentType,
|
||||||
|
kcpcfg.KCPConfigArgs{},
|
||||||
|
s.cfg.CertBytes, s.cfg.KeyBytes, nil,
|
||||||
|
*s.cfg.Parent,
|
||||||
|
*s.cfg.Timeout,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -1,4 +1,3 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
rm -rf /usr/bin/proxy
|
rm -rf /usr/bin/proxy
|
||||||
rm -rf /usr/bin/proxyd
|
|
||||||
echo "uninstall done"
|
echo "uninstall done"
|
||||||
|
|||||||
84
utils/aes/aes.go
Normal file
@ -0,0 +1,84 @@
|
|||||||
|
// Playbook - http://play.golang.org/p/3wFl4lacjX
|
||||||
|
|
||||||
|
package goaes
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"crypto/aes"
|
||||||
|
"crypto/cipher"
|
||||||
|
"crypto/rand"
|
||||||
|
"errors"
|
||||||
|
"io"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
func addBase64Padding(value string) string {
|
||||||
|
m := len(value) % 4
|
||||||
|
if m != 0 {
|
||||||
|
value += strings.Repeat("=", 4-m)
|
||||||
|
}
|
||||||
|
|
||||||
|
return value
|
||||||
|
}
|
||||||
|
|
||||||
|
func removeBase64Padding(value string) string {
|
||||||
|
return strings.Replace(value, "=", "", -1)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Pad(src []byte) []byte {
|
||||||
|
padding := aes.BlockSize - len(src)%aes.BlockSize
|
||||||
|
padtext := bytes.Repeat([]byte{byte(padding)}, padding)
|
||||||
|
return append(src, padtext...)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Unpad(src []byte) ([]byte, error) {
|
||||||
|
length := len(src)
|
||||||
|
unpadding := int(src[length-1])
|
||||||
|
|
||||||
|
if unpadding > length {
|
||||||
|
return nil, errors.New("unpad error. This could happen when incorrect encryption key is used")
|
||||||
|
}
|
||||||
|
|
||||||
|
return src[:(length - unpadding)], nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Encrypt(key []byte, text []byte) ([]byte, error) {
|
||||||
|
block, err := aes.NewCipher(key)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
msg := Pad(text)
|
||||||
|
ciphertext := make([]byte, aes.BlockSize+len(msg))
|
||||||
|
iv := ciphertext[:aes.BlockSize]
|
||||||
|
if _, err := io.ReadFull(rand.Reader, iv); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
cfb := cipher.NewCFBEncrypter(block, iv)
|
||||||
|
cfb.XORKeyStream(ciphertext[aes.BlockSize:], []byte(msg))
|
||||||
|
|
||||||
|
return ciphertext, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Decrypt(key []byte, text []byte) ([]byte, error) {
|
||||||
|
block, err := aes.NewCipher(key)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if (len(text) % aes.BlockSize) != 0 {
|
||||||
|
return nil, errors.New("blocksize must be multipe of decoded message length")
|
||||||
|
}
|
||||||
|
iv := text[:aes.BlockSize]
|
||||||
|
msg := text[aes.BlockSize:]
|
||||||
|
|
||||||
|
cfb := cipher.NewCFBDecrypter(block, iv)
|
||||||
|
cfb.XORKeyStream(msg, msg)
|
||||||
|
|
||||||
|
unpadMsg, err := Unpad(msg)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return unpadMsg, nil
|
||||||
|
}
|
||||||
199
utils/cert/cert.go
Normal file
@ -0,0 +1,199 @@
|
|||||||
|
package cert
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
cryptorand "crypto/rand"
|
||||||
|
"crypto/rsa"
|
||||||
|
"crypto/x509"
|
||||||
|
"crypto/x509/pkix"
|
||||||
|
"encoding/pem"
|
||||||
|
"io/ioutil"
|
||||||
|
"math/big"
|
||||||
|
"math/rand"
|
||||||
|
"net"
|
||||||
|
"strconv"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
func CreateSignCertToFile(rootCa *x509.Certificate, rootKey *rsa.PrivateKey, domainOrIP string, expireDays int, name string) (err error) {
|
||||||
|
cert, key, err := CreateSignCert(rootCa, rootKey, domainOrIP, expireDays)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = ioutil.WriteFile(name+".crt", cert, 0755)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = ioutil.WriteFile(name+".key", key, 0755)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func CreateSignCert(rootCa *x509.Certificate, rootKey *rsa.PrivateKey, domainOrIP string, expireDays int) (certBytes []byte, keyBytes []byte, err error) {
|
||||||
|
cer := &x509.Certificate{
|
||||||
|
SerialNumber: big.NewInt(rand.Int63()), //证书序列号
|
||||||
|
Subject: pkix.Name{
|
||||||
|
Country: []string{getCountry()},
|
||||||
|
Organization: []string{domainOrIP},
|
||||||
|
OrganizationalUnit: []string{domainOrIP},
|
||||||
|
CommonName: domainOrIP,
|
||||||
|
},
|
||||||
|
NotBefore: time.Now().Add(-time.Hour),
|
||||||
|
NotAfter: time.Now().Add(time.Hour * 24 * time.Duration(expireDays)),
|
||||||
|
BasicConstraintsValid: true,
|
||||||
|
IsCA: false,
|
||||||
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
|
||||||
|
//KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageDataEncipherment,
|
||||||
|
EmailAddresses: []string{},
|
||||||
|
IPAddresses: []net.IP{},
|
||||||
|
}
|
||||||
|
if ip := net.ParseIP(domainOrIP); ip != nil {
|
||||||
|
cer.IPAddresses = append(cer.IPAddresses, ip)
|
||||||
|
} else {
|
||||||
|
cer.DNSNames = append(cer.DNSNames, domainOrIP)
|
||||||
|
}
|
||||||
|
|
||||||
|
// cer.IPAddresses = append(cer.IPAddresses, alternateIPs...)
|
||||||
|
// cer.DNSNames = append(cer.DNSNames, alternateDNS...)
|
||||||
|
|
||||||
|
//生成公钥私钥对
|
||||||
|
priKey, err := rsa.GenerateKey(cryptorand.Reader, 2048)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
certBytes, err = x509.CreateCertificate(cryptorand.Reader, cer, rootCa, &priKey.PublicKey, rootKey)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
//编码证书文件和私钥文件
|
||||||
|
caPem := &pem.Block{
|
||||||
|
Type: "CERTIFICATE",
|
||||||
|
Bytes: certBytes,
|
||||||
|
}
|
||||||
|
certBytes = pem.EncodeToMemory(caPem)
|
||||||
|
|
||||||
|
buf := x509.MarshalPKCS1PrivateKey(priKey)
|
||||||
|
keyPem := &pem.Block{
|
||||||
|
Type: "RSA PRIVATE KEY",
|
||||||
|
Bytes: buf,
|
||||||
|
}
|
||||||
|
keyBytes = pem.EncodeToMemory(keyPem)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func CreateCaToFile(name, domainOrIP string, expireDays int) (err error) {
|
||||||
|
ca, key, err := CreateCa(domainOrIP, expireDays)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = ioutil.WriteFile(name+".crt", ca, 0755)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = ioutil.WriteFile(name+".key", key, 0755)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func CreateCa(organization string, expireDays int) (certBytes []byte, keyBytes []byte, err error) {
|
||||||
|
priv, err := rsa.GenerateKey(cryptorand.Reader, 2048)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
template := x509.Certificate{
|
||||||
|
SerialNumber: big.NewInt(1),
|
||||||
|
Subject: pkix.Name{
|
||||||
|
CommonName: organization,
|
||||||
|
Organization: []string{organization},
|
||||||
|
OrganizationalUnit: []string{organization},
|
||||||
|
Country: []string{getCountry()},
|
||||||
|
},
|
||||||
|
NotBefore: time.Now().Add(-time.Hour),
|
||||||
|
NotAfter: time.Now().Add(time.Hour * 24 * time.Duration(expireDays)),
|
||||||
|
|
||||||
|
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
|
||||||
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
|
||||||
|
BasicConstraintsValid: true,
|
||||||
|
IsCA: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
derBytes, err := x509.CreateCertificate(cryptorand.Reader, &template, &template, &priv.PublicKey, priv)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Generate cert
|
||||||
|
certBuffer := bytes.Buffer{}
|
||||||
|
if err := pem.Encode(&certBuffer, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes}); err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Generate key
|
||||||
|
keyBuffer := bytes.Buffer{}
|
||||||
|
if err := pem.Encode(&keyBuffer, &pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(priv)}); err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return certBuffer.Bytes(), keyBuffer.Bytes(), nil
|
||||||
|
}
|
||||||
|
func ParseCertAndKeyBytes(certPemFileByes, keyFileBytes []byte) (cert *x509.Certificate, privateKey *rsa.PrivateKey, err error) {
|
||||||
|
//解析根证书
|
||||||
|
cert, err = ParseCertBytes(certPemFileByes)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//解析私钥
|
||||||
|
privateKey, err = ParseKeyBytes(keyFileBytes)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func ParseCertAndKey(certPemFile, keyFile string) (cert *x509.Certificate, privateKey *rsa.PrivateKey, err error) {
|
||||||
|
//解析根证书
|
||||||
|
cert, err = ParseCert(certPemFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//解析私钥
|
||||||
|
privateKey, err = ParseKey(keyFile)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func ParseCert(certPemFile string) (cert *x509.Certificate, err error) {
|
||||||
|
//解析证书
|
||||||
|
certFile_, err := ioutil.ReadFile(certPemFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
cert, err = ParseCertBytes(certFile_)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func ParseKey(keyFile string) (key *rsa.PrivateKey, err error) {
|
||||||
|
//解析证书
|
||||||
|
keyFile_, err := ioutil.ReadFile(keyFile)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
key, err = ParseKeyBytes(keyFile_)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func ParseCertBytes(certPemFileBytes []byte) (cert *x509.Certificate, err error) {
|
||||||
|
caBlock, _ := pem.Decode(certPemFileBytes)
|
||||||
|
cert, err = x509.ParseCertificate(caBlock.Bytes)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func ParseKeyBytes(keyFileBytes []byte) (praKey *rsa.PrivateKey, err error) {
|
||||||
|
keyBlock, _ := pem.Decode(keyFileBytes)
|
||||||
|
praKey, err = x509.ParsePKCS1PrivateKey(keyBlock.Bytes)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func getCountry() string {
|
||||||
|
CList := []string{"AD", "AE", "AF", "AG", "AI", "AL", "AM", "AO", "AR", "AT", "AU", "AZ", "BB", "BD", "BE", "BF", "BG", "BH", "BI", "BJ", "BL", "BM", "BN", "BO", "BR", "BS", "BW", "BY", "BZ", "CA", "CF", "CG", "CH", "CK", "CL", "CM", "CN", "CO", "CR", "CS", "CU", "CY", "CZ", "DE", "DJ", "DK", "DO", "DZ", "EC", "EE", "EG", "ES", "ET", "FI", "FJ", "FR", "GA", "GB", "GD", "GE", "GF", "GH", "GI", "GM", "GN", "GR", "GT", "GU", "GY", "HK", "HN", "HT", "HU", "ID", "IE", "IL", "IN", "IQ", "IR", "IS", "IT", "JM", "JO", "JP", "KE", "KG", "KH", "KP", "KR", "KT", "KW", "KZ", "LA", "LB", "LC", "LI", "LK", "LR", "LS", "LT", "LU", "LV", "LY", "MA", "MC", "MD", "MG", "ML", "MM", "MN", "MO", "MS", "MT", "MU", "MV", "MW", "MX", "MY", "MZ", "NA", "NE", "NG", "NI", "NL", "NO", "NP", "NR", "NZ", "OM", "PA", "PE", "PF", "PG", "PH", "PK", "PL", "PR", "PT", "PY", "QA", "RO", "RU", "SA", "SB", "SC", "SD", "SE", "SG", "SI", "SK", "SL", "SM", "SN", "SO", "SR", "ST", "SV", "SY", "SZ", "TD", "TG", "TH", "TJ", "TM", "TN", "TO", "TR", "TT", "TW", "TZ", "UA", "UG", "US", "UY", "UZ", "VC", "VE", "VN", "YE", "YU", "ZA", "ZM", "ZR", "ZW"}
|
||||||
|
return CList[int(randInt(4))%len(CList)]
|
||||||
|
}
|
||||||
|
func randInt(strLen int) int64 {
|
||||||
|
codes := "123456789"
|
||||||
|
codeLen := len(codes)
|
||||||
|
data := make([]byte, strLen)
|
||||||
|
rand.Seed(time.Now().UnixNano() + rand.Int63() + rand.Int63() + rand.Int63() + rand.Int63())
|
||||||
|
for i := 0; i < strLen; i++ {
|
||||||
|
idx := rand.Intn(codeLen)
|
||||||
|
data[i] = byte(codes[idx])
|
||||||
|
}
|
||||||
|
i, _ := strconv.ParseInt(string(data), 10, 64)
|
||||||
|
return i
|
||||||
|
}
|
||||||
71
utils/cert/cert_test.go
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
package cert
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCaGen(t *testing.T) {
|
||||||
|
err := CreateCaToFile("ca", "test", 365)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
ca, key, err := ParseCertAndKey("ca.crt", "ca.key")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if ca.Subject.Organization[0] != "test" {
|
||||||
|
t.Fatalf("Organization %s not match test", ca.Subject.Organization[0])
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = key.Validate()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
os.Remove("ca.crt")
|
||||||
|
os.Remove("ca.key")
|
||||||
|
|
||||||
|
}
|
||||||
|
func TestSign(t *testing.T) {
|
||||||
|
err := CreateCaToFile("ca", "test", 365)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
ca, key, err := ParseCertAndKey("ca.crt", "ca.key")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = CreateCaToFile("ca", "test", 365)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = CreateSignCertToFile(ca, key, "server.com", 365, "server")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
servercrt, serverkey, err := ParseCertAndKey("server.crt", "server.key")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if servercrt.Subject.CommonName != "server.com" {
|
||||||
|
t.Fatalf("CommonName %s not match server.com", ca.Subject.CommonName)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = serverkey.Validate()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
os.Remove("ca.crt")
|
||||||
|
os.Remove("ca.key")
|
||||||
|
os.Remove("server.crt")
|
||||||
|
os.Remove("server.key")
|
||||||
|
}
|
||||||
95
utils/conncrypt/conncrypt.go
Normal file
@ -0,0 +1,95 @@
|
|||||||
|
package conncrypt
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/aes"
|
||||||
|
"crypto/cipher"
|
||||||
|
"crypto/sha256"
|
||||||
|
"hash"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/pbkdf2"
|
||||||
|
)
|
||||||
|
|
||||||
|
//Confg defaults
|
||||||
|
const DefaultIterations = 1024
|
||||||
|
const DefaultKeySize = 24 //256bits
|
||||||
|
var DefaultHashFunc = sha256.New
|
||||||
|
var DefaultSalt = []byte(`
|
||||||
|
(;QUHj.BQ?RXzYSO]ifkXp/G!kFmWyXyEV6Nt!d|@bo+N$L9+<d$|g6e26T}
|
||||||
|
Ao<:>SOd,6acYKY_ec+(x"R";\'4&fTAVu92GVA-wxBptOTM^2,iP5%)wnhW
|
||||||
|
hwk=]Snsgymt!3gbP2pe=J//}1a?lp9ej=&TB!C_V(cT2?z8wyoL_-13fd[]
|
||||||
|
`) //salt must be predefined in order to derive the same key
|
||||||
|
|
||||||
|
//Config stores the PBKDF2 key generation parameters
|
||||||
|
type Config struct {
|
||||||
|
Password string
|
||||||
|
Salt []byte
|
||||||
|
Iterations int
|
||||||
|
KeySize int
|
||||||
|
HashFunc func() hash.Hash
|
||||||
|
}
|
||||||
|
|
||||||
|
//New creates an AES encrypted net.Conn by generating
|
||||||
|
//a key using PBKDF2 with the provided configuration
|
||||||
|
func New(conn net.Conn, c *Config) net.Conn {
|
||||||
|
//set defaults
|
||||||
|
if len(c.Salt) == 0 {
|
||||||
|
c.Salt = DefaultSalt
|
||||||
|
}
|
||||||
|
if c.Iterations == 0 {
|
||||||
|
c.Iterations = DefaultIterations
|
||||||
|
}
|
||||||
|
if c.KeySize != 16 && c.KeySize != 24 && c.KeySize != 32 {
|
||||||
|
c.KeySize = DefaultKeySize
|
||||||
|
}
|
||||||
|
if c.HashFunc == nil {
|
||||||
|
c.HashFunc = DefaultHashFunc
|
||||||
|
}
|
||||||
|
|
||||||
|
//generate key
|
||||||
|
key := pbkdf2.Key([]byte(c.Password), c.Salt, c.Iterations, c.KeySize, c.HashFunc)
|
||||||
|
|
||||||
|
// could use scrypt, but it's a bit slow...
|
||||||
|
// dk, err := scrypt.Key([]byte(c.Password), c.Salt, 16384, 8, 1, 32)
|
||||||
|
|
||||||
|
//key will be always be the correct size so this will never error
|
||||||
|
conn, _ = NewFromKey(conn, key)
|
||||||
|
return conn
|
||||||
|
}
|
||||||
|
|
||||||
|
//NewFromKey creates an AES encrypted net.Conn using the provided key
|
||||||
|
func NewFromKey(conn net.Conn, key []byte) (net.Conn, error) {
|
||||||
|
block, err := aes.NewCipher([]byte(key))
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
//hash(key) -> read IV
|
||||||
|
riv := DefaultHashFunc().Sum(key)
|
||||||
|
rstream := cipher.NewCFBDecrypter(block, riv[:aes.BlockSize])
|
||||||
|
reader := &cipher.StreamReader{S: rstream, R: conn}
|
||||||
|
//hash(read IV) -> write IV
|
||||||
|
wiv := DefaultHashFunc().Sum(riv)
|
||||||
|
wstream := cipher.NewCFBEncrypter(block, wiv[:aes.BlockSize])
|
||||||
|
writer := &cipher.StreamWriter{S: wstream, W: conn}
|
||||||
|
|
||||||
|
return &cryptoConn{
|
||||||
|
Conn: conn,
|
||||||
|
r: reader,
|
||||||
|
w: writer,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type cryptoConn struct {
|
||||||
|
net.Conn
|
||||||
|
r io.Reader
|
||||||
|
w io.Writer
|
||||||
|
}
|
||||||
|
|
||||||
|
//replace read and write methods
|
||||||
|
func (c *cryptoConn) Read(p []byte) (int, error) {
|
||||||
|
return c.r.Read(p)
|
||||||
|
}
|
||||||
|
func (c *cryptoConn) Write(p []byte) (int, error) {
|
||||||
|
return c.w.Write(p)
|
||||||
|
}
|
||||||
634
utils/functions.go
Executable file
@ -0,0 +1,634 @@
|
|||||||
|
package utils
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"bytes"
|
||||||
|
"crypto/sha1"
|
||||||
|
"crypto/tls"
|
||||||
|
"crypto/x509"
|
||||||
|
"encoding/binary"
|
||||||
|
"encoding/pem"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
|
logger "log"
|
||||||
|
"math/rand"
|
||||||
|
"net"
|
||||||
|
"net/http"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/pbkdf2"
|
||||||
|
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/utils/id"
|
||||||
|
|
||||||
|
kcp "github.com/xtaci/kcp-go"
|
||||||
|
)
|
||||||
|
|
||||||
|
func IoBind(dst io.ReadWriteCloser, src io.ReadWriteCloser, fn func(err interface{}), log *logger.Logger) {
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
log.Printf("bind crashed %s", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
e1 := make(chan interface{}, 1)
|
||||||
|
e2 := make(chan interface{}, 1)
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
log.Printf("bind crashed %s", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
//_, err := io.Copy(dst, src)
|
||||||
|
err := ioCopy(dst, src)
|
||||||
|
e1 <- err
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if err := recover(); err != nil {
|
||||||
|
log.Printf("bind crashed %s", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
//_, err := io.Copy(src, dst)
|
||||||
|
err := ioCopy(src, dst)
|
||||||
|
e2 <- err
|
||||||
|
}()
|
||||||
|
var err interface{}
|
||||||
|
select {
|
||||||
|
case err = <-e1:
|
||||||
|
//log.Printf("e1")
|
||||||
|
case err = <-e2:
|
||||||
|
//log.Printf("e2")
|
||||||
|
}
|
||||||
|
src.Close()
|
||||||
|
dst.Close()
|
||||||
|
if fn != nil {
|
||||||
|
fn(err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
func ioCopy(dst io.ReadWriter, src io.ReadWriter) (err error) {
|
||||||
|
buf := LeakyBuffer.Get()
|
||||||
|
defer LeakyBuffer.Put(buf)
|
||||||
|
n := 0
|
||||||
|
for {
|
||||||
|
n, err = src.Read(buf)
|
||||||
|
if n > 0 {
|
||||||
|
if _, e := dst.Write(buf[0:n]); e != nil {
|
||||||
|
return e
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func TlsConnectHost(host string, timeout int, certBytes, keyBytes, caCertBytes []byte) (conn tls.Conn, err error) {
|
||||||
|
h := strings.Split(host, ":")
|
||||||
|
port, _ := strconv.Atoi(h[1])
|
||||||
|
return TlsConnect(h[0], port, timeout, certBytes, keyBytes, caCertBytes)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TlsConnect(host string, port, timeout int, certBytes, keyBytes, caCertBytes []byte) (conn tls.Conn, err error) {
|
||||||
|
conf, err := getRequestTlsConfig(certBytes, keyBytes, caCertBytes)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
_conn, err := net.DialTimeout("tcp", fmt.Sprintf("%s:%d", host, port), time.Duration(timeout)*time.Millisecond)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return *tls.Client(_conn, conf), err
|
||||||
|
}
|
||||||
|
func getRequestTlsConfig(certBytes, keyBytes, caCertBytes []byte) (conf *tls.Config, err error) {
|
||||||
|
|
||||||
|
var cert tls.Certificate
|
||||||
|
cert, err = tls.X509KeyPair(certBytes, keyBytes)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
serverCertPool := x509.NewCertPool()
|
||||||
|
caBytes := certBytes
|
||||||
|
if caCertBytes != nil {
|
||||||
|
caBytes = caCertBytes
|
||||||
|
}
|
||||||
|
ok := serverCertPool.AppendCertsFromPEM(caBytes)
|
||||||
|
if !ok {
|
||||||
|
err = errors.New("failed to parse root certificate")
|
||||||
|
}
|
||||||
|
block, _ := pem.Decode(caBytes)
|
||||||
|
if block == nil {
|
||||||
|
panic("failed to parse certificate PEM")
|
||||||
|
}
|
||||||
|
x509Cert, _ := x509.ParseCertificate(block.Bytes)
|
||||||
|
if x509Cert == nil {
|
||||||
|
panic("failed to parse block")
|
||||||
|
}
|
||||||
|
conf = &tls.Config{
|
||||||
|
RootCAs: serverCertPool,
|
||||||
|
Certificates: []tls.Certificate{cert},
|
||||||
|
InsecureSkipVerify: true,
|
||||||
|
ServerName: x509Cert.Subject.CommonName,
|
||||||
|
VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
||||||
|
opts := x509.VerifyOptions{
|
||||||
|
Roots: serverCertPool,
|
||||||
|
}
|
||||||
|
for _, rawCert := range rawCerts {
|
||||||
|
cert, _ := x509.ParseCertificate(rawCert)
|
||||||
|
_, err := cert.Verify(opts)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func ConnectHost(hostAndPort string, timeout int) (conn net.Conn, err error) {
|
||||||
|
conn, err = net.DialTimeout("tcp", hostAndPort, time.Duration(timeout)*time.Millisecond)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func ConnectKCPHost(hostAndPort string, config kcpcfg.KCPConfigArgs) (conn net.Conn, err error) {
|
||||||
|
kcpconn, err := kcp.DialWithOptions(hostAndPort, config.Block, *config.DataShard, *config.ParityShard)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
kcpconn.SetStreamMode(true)
|
||||||
|
kcpconn.SetWriteDelay(true)
|
||||||
|
kcpconn.SetNoDelay(*config.NoDelay, *config.Interval, *config.Resend, *config.NoCongestion)
|
||||||
|
kcpconn.SetMtu(*config.MTU)
|
||||||
|
kcpconn.SetWindowSize(*config.SndWnd, *config.RcvWnd)
|
||||||
|
kcpconn.SetACKNoDelay(*config.AckNodelay)
|
||||||
|
if *config.NoComp {
|
||||||
|
return kcpconn, err
|
||||||
|
}
|
||||||
|
return NewCompStream(kcpconn), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func PathExists(_path string) bool {
|
||||||
|
_, err := os.Stat(_path)
|
||||||
|
if err != nil && os.IsNotExist(err) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
func HTTPGet(URL string, timeout int) (err error) {
|
||||||
|
tr := &http.Transport{}
|
||||||
|
var resp *http.Response
|
||||||
|
var client *http.Client
|
||||||
|
defer func() {
|
||||||
|
if resp != nil && resp.Body != nil {
|
||||||
|
resp.Body.Close()
|
||||||
|
}
|
||||||
|
tr.CloseIdleConnections()
|
||||||
|
}()
|
||||||
|
client = &http.Client{Timeout: time.Millisecond * time.Duration(timeout), Transport: tr}
|
||||||
|
resp, err = client.Get(URL)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func CloseConn(conn *net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
_ = recover()
|
||||||
|
}()
|
||||||
|
if conn != nil && *conn != nil {
|
||||||
|
(*conn).SetDeadline(time.Now().Add(time.Millisecond))
|
||||||
|
(*conn).Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func GetAllInterfaceAddr() ([]net.IP, error) {
|
||||||
|
|
||||||
|
ifaces, err := net.Interfaces()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
addresses := []net.IP{}
|
||||||
|
for _, iface := range ifaces {
|
||||||
|
|
||||||
|
if iface.Flags&net.FlagUp == 0 {
|
||||||
|
continue // interface down
|
||||||
|
}
|
||||||
|
// if iface.Flags&net.FlagLoopback != 0 {
|
||||||
|
// continue // loopback interface
|
||||||
|
// }
|
||||||
|
addrs, err := iface.Addrs()
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, addr := range addrs {
|
||||||
|
var ip net.IP
|
||||||
|
switch v := addr.(type) {
|
||||||
|
case *net.IPNet:
|
||||||
|
ip = v.IP
|
||||||
|
case *net.IPAddr:
|
||||||
|
ip = v.IP
|
||||||
|
}
|
||||||
|
// if ip == nil || ip.IsLoopback() {
|
||||||
|
// continue
|
||||||
|
// }
|
||||||
|
ip = ip.To4()
|
||||||
|
if ip == nil {
|
||||||
|
continue // not an ipv4 address
|
||||||
|
}
|
||||||
|
addresses = append(addresses, ip)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(addresses) == 0 {
|
||||||
|
return nil, fmt.Errorf("no address Found, net.InterfaceAddrs: %v", addresses)
|
||||||
|
}
|
||||||
|
//only need first
|
||||||
|
return addresses, nil
|
||||||
|
}
|
||||||
|
func UDPPacket(srcAddr string, packet []byte) []byte {
|
||||||
|
addrBytes := []byte(srcAddr)
|
||||||
|
addrLength := uint16(len(addrBytes))
|
||||||
|
bodyLength := uint16(len(packet))
|
||||||
|
//log.Printf("build packet : addr len %d, body len %d", addrLength, bodyLength)
|
||||||
|
pkg := new(bytes.Buffer)
|
||||||
|
binary.Write(pkg, binary.LittleEndian, addrLength)
|
||||||
|
binary.Write(pkg, binary.LittleEndian, addrBytes)
|
||||||
|
binary.Write(pkg, binary.LittleEndian, bodyLength)
|
||||||
|
binary.Write(pkg, binary.LittleEndian, packet)
|
||||||
|
return pkg.Bytes()
|
||||||
|
}
|
||||||
|
func ReadUDPPacket(_reader io.Reader) (srcAddr string, packet []byte, err error) {
|
||||||
|
reader := bufio.NewReader(_reader)
|
||||||
|
var addrLength uint16
|
||||||
|
var bodyLength uint16
|
||||||
|
err = binary.Read(reader, binary.LittleEndian, &addrLength)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
_srcAddr := make([]byte, addrLength)
|
||||||
|
n, err := reader.Read(_srcAddr)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if n != int(addrLength) {
|
||||||
|
err = fmt.Errorf("n != int(addrLength), %d,%d", n, addrLength)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
srcAddr = string(_srcAddr)
|
||||||
|
|
||||||
|
err = binary.Read(reader, binary.LittleEndian, &bodyLength)
|
||||||
|
if err != nil {
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
packet = make([]byte, bodyLength)
|
||||||
|
n, err = reader.Read(packet)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if n != int(bodyLength) {
|
||||||
|
err = fmt.Errorf("n != int(bodyLength), %d,%d", n, bodyLength)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func Uniqueid() string {
|
||||||
|
return xid.New().String()
|
||||||
|
// var src = rand.NewSource(time.Now().UnixNano())
|
||||||
|
// s := fmt.Sprintf("%d", src.Int63())
|
||||||
|
// return s[len(s)-5:len(s)-1] + fmt.Sprintf("%d", uint64(time.Now().UnixNano()))[8:]
|
||||||
|
}
|
||||||
|
func RandString(strlen int) string {
|
||||||
|
codes := "QWERTYUIOPLKJHGFDSAZXCVBNMabcdefghijklmnopqrstuvwxyz0123456789"
|
||||||
|
codeLen := len(codes)
|
||||||
|
data := make([]byte, strlen)
|
||||||
|
rand.Seed(time.Now().UnixNano() + rand.Int63() + rand.Int63() + rand.Int63() + rand.Int63())
|
||||||
|
for i := 0; i < strlen; i++ {
|
||||||
|
idx := rand.Intn(codeLen)
|
||||||
|
data[i] = byte(codes[idx])
|
||||||
|
}
|
||||||
|
return string(data)
|
||||||
|
}
|
||||||
|
func RandInt(strLen int) int64 {
|
||||||
|
codes := "123456789"
|
||||||
|
codeLen := len(codes)
|
||||||
|
data := make([]byte, strLen)
|
||||||
|
rand.Seed(time.Now().UnixNano() + rand.Int63() + rand.Int63() + rand.Int63() + rand.Int63())
|
||||||
|
for i := 0; i < strLen; i++ {
|
||||||
|
idx := rand.Intn(codeLen)
|
||||||
|
data[i] = byte(codes[idx])
|
||||||
|
}
|
||||||
|
i, _ := strconv.ParseInt(string(data), 10, 64)
|
||||||
|
return i
|
||||||
|
}
|
||||||
|
func ReadData(r io.Reader) (data string, err error) {
|
||||||
|
var len uint16
|
||||||
|
err = binary.Read(r, binary.LittleEndian, &len)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var n int
|
||||||
|
_data := make([]byte, len)
|
||||||
|
n, err = r.Read(_data)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if n != int(len) {
|
||||||
|
err = fmt.Errorf("error data len")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
data = string(_data)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func ReadPacketData(r io.Reader, data ...*string) (err error) {
|
||||||
|
for _, d := range data {
|
||||||
|
*d, err = ReadData(r)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func ReadPacket(r io.Reader, typ *uint8, data ...*string) (err error) {
|
||||||
|
var connType uint8
|
||||||
|
err = binary.Read(r, binary.LittleEndian, &connType)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
*typ = connType
|
||||||
|
for _, d := range data {
|
||||||
|
*d, err = ReadData(r)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func BuildPacket(typ uint8, data ...string) []byte {
|
||||||
|
pkg := new(bytes.Buffer)
|
||||||
|
binary.Write(pkg, binary.LittleEndian, typ)
|
||||||
|
for _, d := range data {
|
||||||
|
bytes := []byte(d)
|
||||||
|
binary.Write(pkg, binary.LittleEndian, uint16(len(bytes)))
|
||||||
|
binary.Write(pkg, binary.LittleEndian, bytes)
|
||||||
|
}
|
||||||
|
return pkg.Bytes()
|
||||||
|
}
|
||||||
|
func BuildPacketData(data ...string) []byte {
|
||||||
|
pkg := new(bytes.Buffer)
|
||||||
|
for _, d := range data {
|
||||||
|
bytes := []byte(d)
|
||||||
|
binary.Write(pkg, binary.LittleEndian, uint16(len(bytes)))
|
||||||
|
binary.Write(pkg, binary.LittleEndian, bytes)
|
||||||
|
}
|
||||||
|
return pkg.Bytes()
|
||||||
|
}
|
||||||
|
func SubStr(str string, start, end int) string {
|
||||||
|
if len(str) == 0 {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
if end >= len(str) {
|
||||||
|
end = len(str) - 1
|
||||||
|
}
|
||||||
|
return str[start:end]
|
||||||
|
}
|
||||||
|
func SubBytes(bytes []byte, start, end int) []byte {
|
||||||
|
if len(bytes) == 0 {
|
||||||
|
return []byte{}
|
||||||
|
}
|
||||||
|
if end >= len(bytes) {
|
||||||
|
end = len(bytes) - 1
|
||||||
|
}
|
||||||
|
return bytes[start:end]
|
||||||
|
}
|
||||||
|
func TlsBytes(cert, key string) (certBytes, keyBytes []byte, err error) {
|
||||||
|
certBytes, err = ioutil.ReadFile(cert)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("err : %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
keyBytes, err = ioutil.ReadFile(key)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("err : %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func GetKCPBlock(method, key string) (block kcp.BlockCrypt) {
|
||||||
|
pass := pbkdf2.Key([]byte(key), []byte(key), 4096, 32, sha1.New)
|
||||||
|
switch method {
|
||||||
|
case "sm4":
|
||||||
|
block, _ = kcp.NewSM4BlockCrypt(pass[:16])
|
||||||
|
case "tea":
|
||||||
|
block, _ = kcp.NewTEABlockCrypt(pass[:16])
|
||||||
|
case "xor":
|
||||||
|
block, _ = kcp.NewSimpleXORBlockCrypt(pass)
|
||||||
|
case "none":
|
||||||
|
block, _ = kcp.NewNoneBlockCrypt(pass)
|
||||||
|
case "aes-128":
|
||||||
|
block, _ = kcp.NewAESBlockCrypt(pass[:16])
|
||||||
|
case "aes-192":
|
||||||
|
block, _ = kcp.NewAESBlockCrypt(pass[:24])
|
||||||
|
case "blowfish":
|
||||||
|
block, _ = kcp.NewBlowfishBlockCrypt(pass)
|
||||||
|
case "twofish":
|
||||||
|
block, _ = kcp.NewTwofishBlockCrypt(pass)
|
||||||
|
case "cast5":
|
||||||
|
block, _ = kcp.NewCast5BlockCrypt(pass[:16])
|
||||||
|
case "3des":
|
||||||
|
block, _ = kcp.NewTripleDESBlockCrypt(pass[:24])
|
||||||
|
case "xtea":
|
||||||
|
block, _ = kcp.NewXTEABlockCrypt(pass[:16])
|
||||||
|
case "salsa20":
|
||||||
|
block, _ = kcp.NewSalsa20BlockCrypt(pass)
|
||||||
|
default:
|
||||||
|
block, _ = kcp.NewAESBlockCrypt(pass)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func HttpGet(URL string, timeout int, host ...string) (body []byte, code int, err error) {
|
||||||
|
var tr *http.Transport
|
||||||
|
var client *http.Client
|
||||||
|
conf := &tls.Config{
|
||||||
|
InsecureSkipVerify: true,
|
||||||
|
}
|
||||||
|
if strings.Contains(URL, "https://") {
|
||||||
|
tr = &http.Transport{TLSClientConfig: conf}
|
||||||
|
client = &http.Client{Timeout: time.Millisecond * time.Duration(timeout), Transport: tr}
|
||||||
|
} else {
|
||||||
|
tr = &http.Transport{}
|
||||||
|
client = &http.Client{Timeout: time.Millisecond * time.Duration(timeout), Transport: tr}
|
||||||
|
}
|
||||||
|
defer tr.CloseIdleConnections()
|
||||||
|
|
||||||
|
//resp, err := client.Get(URL)
|
||||||
|
req, err := http.NewRequest("GET", URL, nil)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if len(host) == 1 && host[0] != "" {
|
||||||
|
req.Host = host[0]
|
||||||
|
}
|
||||||
|
resp, err := client.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
code = resp.StatusCode
|
||||||
|
body, err = ioutil.ReadAll(resp.Body)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func IsIternalIP(domainOrIP string, always bool) bool {
|
||||||
|
var outIPs []net.IP
|
||||||
|
var err error
|
||||||
|
var isDomain bool
|
||||||
|
if net.ParseIP(domainOrIP) == nil {
|
||||||
|
isDomain = true
|
||||||
|
}
|
||||||
|
if always && isDomain {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
if isDomain {
|
||||||
|
outIPs, err = net.LookupIP(domainOrIP)
|
||||||
|
} else {
|
||||||
|
outIPs = []net.IP{net.ParseIP(domainOrIP)}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for _, ip := range outIPs {
|
||||||
|
if ip.IsLoopback() {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if ip.To4().Mask(net.IPv4Mask(255, 0, 0, 0)).String() == "10.0.0.0" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if ip.To4().Mask(net.IPv4Mask(255, 0, 0, 0)).String() == "192.168.0.0" {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if ip.To4().Mask(net.IPv4Mask(255, 0, 0, 0)).String() == "172.0.0.0" {
|
||||||
|
i, _ := strconv.Atoi(strings.Split(ip.To4().String(), ".")[1])
|
||||||
|
return i >= 16 && i <= 31
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
func IsHTTP(head []byte) bool {
|
||||||
|
keys := []string{"GET", "HEAD", "POST", "PUT", "DELETE", "CONNECT", "OPTIONS", "TRACE", "PATCH"}
|
||||||
|
for _, key := range keys {
|
||||||
|
if bytes.HasPrefix(head, []byte(key)) || bytes.HasPrefix(head, []byte(strings.ToLower(key))) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
func IsSocks5(head []byte) bool {
|
||||||
|
if len(head) < 3 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if head[0] == uint8(0x05) && 0 < int(head[1]) && int(head[1]) < 255 {
|
||||||
|
if len(head) == 2+int(head[1]) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
func RemoveProxyHeaders(head []byte) []byte {
|
||||||
|
newLines := [][]byte{}
|
||||||
|
var keys = map[string]bool{}
|
||||||
|
lines := bytes.Split(head, []byte("\r\n"))
|
||||||
|
IsBody := false
|
||||||
|
i := -1
|
||||||
|
for _, line := range lines {
|
||||||
|
i++
|
||||||
|
if len(line) == 0 || IsBody {
|
||||||
|
newLines = append(newLines, line)
|
||||||
|
IsBody = true
|
||||||
|
} else {
|
||||||
|
hline := bytes.SplitN(line, []byte(":"), 2)
|
||||||
|
if i == 0 && IsHTTP(head) {
|
||||||
|
newLines = append(newLines, line)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if len(hline) != 2 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
k := strings.ToUpper(string(hline[0]))
|
||||||
|
if _, ok := keys[k]; ok || strings.HasPrefix(k, "PROXY-") {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
keys[k] = true
|
||||||
|
newLines = append(newLines, line)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return bytes.Join(newLines, []byte("\r\n"))
|
||||||
|
}
|
||||||
|
func InsertProxyHeaders(head []byte, headers string) []byte {
|
||||||
|
return bytes.Replace(head, []byte("\r\n"), []byte("\r\n"+headers), 1)
|
||||||
|
}
|
||||||
|
|
||||||
|
// type sockaddr struct {
|
||||||
|
// family uint16
|
||||||
|
// data [14]byte
|
||||||
|
// }
|
||||||
|
|
||||||
|
// const SO_ORIGINAL_DST = 80
|
||||||
|
|
||||||
|
// realServerAddress returns an intercepted connection's original destination.
|
||||||
|
// func realServerAddress(conn *net.Conn) (string, error) {
|
||||||
|
// tcpConn, ok := (*conn).(*net.TCPConn)
|
||||||
|
// if !ok {
|
||||||
|
// return "", errors.New("not a TCPConn")
|
||||||
|
// }
|
||||||
|
|
||||||
|
// file, err := tcpConn.File()
|
||||||
|
// if err != nil {
|
||||||
|
// return "", err
|
||||||
|
// }
|
||||||
|
|
||||||
|
// // To avoid potential problems from making the socket non-blocking.
|
||||||
|
// tcpConn.Close()
|
||||||
|
// *conn, err = net.FileConn(file)
|
||||||
|
// if err != nil {
|
||||||
|
// return "", err
|
||||||
|
// }
|
||||||
|
|
||||||
|
// defer file.Close()
|
||||||
|
// fd := file.Fd()
|
||||||
|
|
||||||
|
// var addr sockaddr
|
||||||
|
// size := uint32(unsafe.Sizeof(addr))
|
||||||
|
// err = getsockopt(int(fd), syscall.SOL_IP, SO_ORIGINAL_DST, uintptr(unsafe.Pointer(&addr)), &size)
|
||||||
|
// if err != nil {
|
||||||
|
// return "", err
|
||||||
|
// }
|
||||||
|
|
||||||
|
// var ip net.IP
|
||||||
|
// switch addr.family {
|
||||||
|
// case syscall.AF_INET:
|
||||||
|
// ip = addr.data[2:6]
|
||||||
|
// default:
|
||||||
|
// return "", errors.New("unrecognized address family")
|
||||||
|
// }
|
||||||
|
|
||||||
|
// port := int(addr.data[0])<<8 + int(addr.data[1])
|
||||||
|
|
||||||
|
// return net.JoinHostPort(ip.String(), strconv.Itoa(port)), nil
|
||||||
|
// }
|
||||||
|
|
||||||
|
// func getsockopt(s int, level int, name int, val uintptr, vallen *uint32) (err error) {
|
||||||
|
// _, _, e1 := syscall.Syscall6(syscall.SYS_GETSOCKOPT, uintptr(s), uintptr(level), uintptr(name), uintptr(val), uintptr(unsafe.Pointer(vallen)), 0)
|
||||||
|
// if e1 != 0 {
|
||||||
|
// err = e1
|
||||||
|
// }
|
||||||
|
// return
|
||||||
|
// }
|
||||||
264
utils/id/xid.go
Normal file
@ -0,0 +1,264 @@
|
|||||||
|
// Package xid is a globally unique id generator suited for web scale
|
||||||
|
//
|
||||||
|
// Xid is using Mongo Object ID algorithm to generate globally unique ids:
|
||||||
|
// https://docs.mongodb.org/manual/reference/object-id/
|
||||||
|
//
|
||||||
|
// - 4-byte value representing the seconds since the Unix epoch,
|
||||||
|
// - 3-byte machine identifier,
|
||||||
|
// - 2-byte process id, and
|
||||||
|
// - 3-byte counter, starting with a random value.
|
||||||
|
//
|
||||||
|
// The binary representation of the id is compatible with Mongo 12 bytes Object IDs.
|
||||||
|
// The string representation is using base32 hex (w/o padding) for better space efficiency
|
||||||
|
// when stored in that form (20 bytes). The hex variant of base32 is used to retain the
|
||||||
|
// sortable property of the id.
|
||||||
|
//
|
||||||
|
// Xid doesn't use base64 because case sensitivity and the 2 non alphanum chars may be an
|
||||||
|
// issue when transported as a string between various systems. Base36 wasn't retained either
|
||||||
|
// because 1/ it's not standard 2/ the resulting size is not predictable (not bit aligned)
|
||||||
|
// and 3/ it would not remain sortable. To validate a base32 `xid`, expect a 20 chars long,
|
||||||
|
// all lowercase sequence of `a` to `v` letters and `0` to `9` numbers (`[0-9a-v]{20}`).
|
||||||
|
//
|
||||||
|
// UUID is 16 bytes (128 bits), snowflake is 8 bytes (64 bits), xid stands in between
|
||||||
|
// with 12 bytes with a more compact string representation ready for the web and no
|
||||||
|
// required configuration or central generation server.
|
||||||
|
//
|
||||||
|
// Features:
|
||||||
|
//
|
||||||
|
// - Size: 12 bytes (96 bits), smaller than UUID, larger than snowflake
|
||||||
|
// - Base32 hex encoded by default (16 bytes storage when transported as printable string)
|
||||||
|
// - Non configured, you don't need set a unique machine and/or data center id
|
||||||
|
// - K-ordered
|
||||||
|
// - Embedded time with 1 second precision
|
||||||
|
// - Unicity guaranted for 16,777,216 (24 bits) unique ids per second and per host/process
|
||||||
|
//
|
||||||
|
// Best used with xlog's RequestIDHandler (https://godoc.org/github.com/rs/xlog#RequestIDHandler).
|
||||||
|
//
|
||||||
|
// References:
|
||||||
|
//
|
||||||
|
// - http://www.slideshare.net/davegardnerisme/unique-id-generation-in-distributed-systems
|
||||||
|
// - https://en.wikipedia.org/wiki/Universally_unique_identifier
|
||||||
|
// - https://blog.twitter.com/2010/announcing-snowflake
|
||||||
|
package xid
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/md5"
|
||||||
|
"crypto/rand"
|
||||||
|
"database/sql/driver"
|
||||||
|
"encoding/binary"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"sync/atomic"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Code inspired from mgo/bson ObjectId
|
||||||
|
|
||||||
|
// ID represents a unique request id
|
||||||
|
type ID [rawLen]byte
|
||||||
|
|
||||||
|
const (
|
||||||
|
encodedLen = 20 // string encoded len
|
||||||
|
decodedLen = 15 // len after base32 decoding with the padded data
|
||||||
|
rawLen = 12 // binary raw len
|
||||||
|
|
||||||
|
// encoding stores a custom version of the base32 encoding with lower case
|
||||||
|
// letters.
|
||||||
|
encoding = "0123456789abcdefghijklmnopqrstuv"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ErrInvalidID is returned when trying to unmarshal an invalid ID
|
||||||
|
var ErrInvalidID = errors.New("xid: invalid ID")
|
||||||
|
|
||||||
|
// objectIDCounter is atomically incremented when generating a new ObjectId
|
||||||
|
// using NewObjectId() function. It's used as a counter part of an id.
|
||||||
|
// This id is initialized with a random value.
|
||||||
|
var objectIDCounter = randInt()
|
||||||
|
|
||||||
|
// machineId stores machine id generated once and used in subsequent calls
|
||||||
|
// to NewObjectId function.
|
||||||
|
var machineID = readMachineID()
|
||||||
|
|
||||||
|
// pid stores the current process id
|
||||||
|
var pid = os.Getpid()
|
||||||
|
|
||||||
|
// dec is the decoding map for base32 encoding
|
||||||
|
var dec [256]byte
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
for i := 0; i < len(dec); i++ {
|
||||||
|
dec[i] = 0xFF
|
||||||
|
}
|
||||||
|
for i := 0; i < len(encoding); i++ {
|
||||||
|
dec[encoding[i]] = byte(i)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// readMachineId generates machine id and puts it into the machineId global
|
||||||
|
// variable. If this function fails to get the hostname, it will cause
|
||||||
|
// a runtime error.
|
||||||
|
func readMachineID() []byte {
|
||||||
|
id := make([]byte, 3)
|
||||||
|
if hostname, err := os.Hostname(); err == nil {
|
||||||
|
hw := md5.New()
|
||||||
|
hw.Write([]byte(hostname))
|
||||||
|
copy(id, hw.Sum(nil))
|
||||||
|
} else {
|
||||||
|
// Fallback to rand number if machine id can't be gathered
|
||||||
|
if _, randErr := rand.Reader.Read(id); randErr != nil {
|
||||||
|
panic(fmt.Errorf("xid: cannot get hostname nor generate a random number: %v; %v", err, randErr))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return id
|
||||||
|
}
|
||||||
|
|
||||||
|
// randInt generates a random uint32
|
||||||
|
func randInt() uint32 {
|
||||||
|
b := make([]byte, 3)
|
||||||
|
if _, err := rand.Reader.Read(b); err != nil {
|
||||||
|
panic(fmt.Errorf("xid: cannot generate random number: %v;", err))
|
||||||
|
}
|
||||||
|
return uint32(b[0])<<16 | uint32(b[1])<<8 | uint32(b[2])
|
||||||
|
}
|
||||||
|
|
||||||
|
// New generates a globaly unique ID
|
||||||
|
func New() ID {
|
||||||
|
var id ID
|
||||||
|
// Timestamp, 4 bytes, big endian
|
||||||
|
binary.BigEndian.PutUint32(id[:], uint32(time.Now().Unix()))
|
||||||
|
// Machine, first 3 bytes of md5(hostname)
|
||||||
|
id[4] = machineID[0]
|
||||||
|
id[5] = machineID[1]
|
||||||
|
id[6] = machineID[2]
|
||||||
|
// Pid, 2 bytes, specs don't specify endianness, but we use big endian.
|
||||||
|
id[7] = byte(pid >> 8)
|
||||||
|
id[8] = byte(pid)
|
||||||
|
// Increment, 3 bytes, big endian
|
||||||
|
i := atomic.AddUint32(&objectIDCounter, 1)
|
||||||
|
id[9] = byte(i >> 16)
|
||||||
|
id[10] = byte(i >> 8)
|
||||||
|
id[11] = byte(i)
|
||||||
|
return id
|
||||||
|
}
|
||||||
|
|
||||||
|
// FromString reads an ID from its string representation
|
||||||
|
func FromString(id string) (ID, error) {
|
||||||
|
i := &ID{}
|
||||||
|
err := i.UnmarshalText([]byte(id))
|
||||||
|
return *i, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// String returns a base32 hex lowercased with no padding representation of the id (char set is 0-9, a-v).
|
||||||
|
func (id ID) String() string {
|
||||||
|
text := make([]byte, encodedLen)
|
||||||
|
encode(text, id[:])
|
||||||
|
return string(text)
|
||||||
|
}
|
||||||
|
|
||||||
|
// MarshalText implements encoding/text TextMarshaler interface
|
||||||
|
func (id ID) MarshalText() ([]byte, error) {
|
||||||
|
text := make([]byte, encodedLen)
|
||||||
|
encode(text, id[:])
|
||||||
|
return text, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// encode by unrolling the stdlib base32 algorithm + removing all safe checks
|
||||||
|
func encode(dst, id []byte) {
|
||||||
|
dst[0] = encoding[id[0]>>3]
|
||||||
|
dst[1] = encoding[(id[1]>>6)&0x1F|(id[0]<<2)&0x1F]
|
||||||
|
dst[2] = encoding[(id[1]>>1)&0x1F]
|
||||||
|
dst[3] = encoding[(id[2]>>4)&0x1F|(id[1]<<4)&0x1F]
|
||||||
|
dst[4] = encoding[id[3]>>7|(id[2]<<1)&0x1F]
|
||||||
|
dst[5] = encoding[(id[3]>>2)&0x1F]
|
||||||
|
dst[6] = encoding[id[4]>>5|(id[3]<<3)&0x1F]
|
||||||
|
dst[7] = encoding[id[4]&0x1F]
|
||||||
|
dst[8] = encoding[id[5]>>3]
|
||||||
|
dst[9] = encoding[(id[6]>>6)&0x1F|(id[5]<<2)&0x1F]
|
||||||
|
dst[10] = encoding[(id[6]>>1)&0x1F]
|
||||||
|
dst[11] = encoding[(id[7]>>4)&0x1F|(id[6]<<4)&0x1F]
|
||||||
|
dst[12] = encoding[id[8]>>7|(id[7]<<1)&0x1F]
|
||||||
|
dst[13] = encoding[(id[8]>>2)&0x1F]
|
||||||
|
dst[14] = encoding[(id[9]>>5)|(id[8]<<3)&0x1F]
|
||||||
|
dst[15] = encoding[id[9]&0x1F]
|
||||||
|
dst[16] = encoding[id[10]>>3]
|
||||||
|
dst[17] = encoding[(id[11]>>6)&0x1F|(id[10]<<2)&0x1F]
|
||||||
|
dst[18] = encoding[(id[11]>>1)&0x1F]
|
||||||
|
dst[19] = encoding[(id[11]<<4)&0x1F]
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnmarshalText implements encoding/text TextUnmarshaler interface
|
||||||
|
func (id *ID) UnmarshalText(text []byte) error {
|
||||||
|
if len(text) != encodedLen {
|
||||||
|
return ErrInvalidID
|
||||||
|
}
|
||||||
|
for _, c := range text {
|
||||||
|
if dec[c] == 0xFF {
|
||||||
|
return ErrInvalidID
|
||||||
|
}
|
||||||
|
}
|
||||||
|
decode(id, text)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// decode by unrolling the stdlib base32 algorithm + removing all safe checks
|
||||||
|
func decode(id *ID, src []byte) {
|
||||||
|
id[0] = dec[src[0]]<<3 | dec[src[1]]>>2
|
||||||
|
id[1] = dec[src[1]]<<6 | dec[src[2]]<<1 | dec[src[3]]>>4
|
||||||
|
id[2] = dec[src[3]]<<4 | dec[src[4]]>>1
|
||||||
|
id[3] = dec[src[4]]<<7 | dec[src[5]]<<2 | dec[src[6]]>>3
|
||||||
|
id[4] = dec[src[6]]<<5 | dec[src[7]]
|
||||||
|
id[5] = dec[src[8]]<<3 | dec[src[9]]>>2
|
||||||
|
id[6] = dec[src[9]]<<6 | dec[src[10]]<<1 | dec[src[11]]>>4
|
||||||
|
id[7] = dec[src[11]]<<4 | dec[src[12]]>>1
|
||||||
|
id[8] = dec[src[12]]<<7 | dec[src[13]]<<2 | dec[src[14]]>>3
|
||||||
|
id[9] = dec[src[14]]<<5 | dec[src[15]]
|
||||||
|
id[10] = dec[src[16]]<<3 | dec[src[17]]>>2
|
||||||
|
id[11] = dec[src[17]]<<6 | dec[src[18]]<<1 | dec[src[19]]>>4
|
||||||
|
}
|
||||||
|
|
||||||
|
// Time returns the timestamp part of the id.
|
||||||
|
// It's a runtime error to call this method with an invalid id.
|
||||||
|
func (id ID) Time() time.Time {
|
||||||
|
// First 4 bytes of ObjectId is 32-bit big-endian seconds from epoch.
|
||||||
|
secs := int64(binary.BigEndian.Uint32(id[0:4]))
|
||||||
|
return time.Unix(secs, 0)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Machine returns the 3-byte machine id part of the id.
|
||||||
|
// It's a runtime error to call this method with an invalid id.
|
||||||
|
func (id ID) Machine() []byte {
|
||||||
|
return id[4:7]
|
||||||
|
}
|
||||||
|
|
||||||
|
// Pid returns the process id part of the id.
|
||||||
|
// It's a runtime error to call this method with an invalid id.
|
||||||
|
func (id ID) Pid() uint16 {
|
||||||
|
return binary.BigEndian.Uint16(id[7:9])
|
||||||
|
}
|
||||||
|
|
||||||
|
// Counter returns the incrementing value part of the id.
|
||||||
|
// It's a runtime error to call this method with an invalid id.
|
||||||
|
func (id ID) Counter() int32 {
|
||||||
|
b := id[9:12]
|
||||||
|
// Counter is stored as big-endian 3-byte value
|
||||||
|
return int32(uint32(b[0])<<16 | uint32(b[1])<<8 | uint32(b[2]))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Value implements the driver.Valuer interface.
|
||||||
|
func (id ID) Value() (driver.Value, error) {
|
||||||
|
b, err := id.MarshalText()
|
||||||
|
return string(b), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Scan implements the sql.Scanner interface.
|
||||||
|
func (id *ID) Scan(value interface{}) (err error) {
|
||||||
|
switch val := value.(type) {
|
||||||
|
case string:
|
||||||
|
return id.UnmarshalText([]byte(val))
|
||||||
|
case []byte:
|
||||||
|
return id.UnmarshalText(val)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("xid: scanning unsupported type: %T", value)
|
||||||
|
}
|
||||||
|
}
|
||||||
97
utils/io-limiter.go
Normal file
@ -0,0 +1,97 @@
|
|||||||
|
package utils
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"io"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/time/rate"
|
||||||
|
)
|
||||||
|
|
||||||
|
const burstLimit = 1000 * 1000 * 1000
|
||||||
|
|
||||||
|
type Reader struct {
|
||||||
|
r io.Reader
|
||||||
|
limiter *rate.Limiter
|
||||||
|
ctx context.Context
|
||||||
|
}
|
||||||
|
|
||||||
|
type Writer struct {
|
||||||
|
w io.Writer
|
||||||
|
limiter *rate.Limiter
|
||||||
|
ctx context.Context
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewReader returns a reader that implements io.Reader with rate limiting.
|
||||||
|
func NewReader(r io.Reader) *Reader {
|
||||||
|
return &Reader{
|
||||||
|
r: r,
|
||||||
|
ctx: context.Background(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewReaderWithContext returns a reader that implements io.Reader with rate limiting.
|
||||||
|
func NewReaderWithContext(r io.Reader, ctx context.Context) *Reader {
|
||||||
|
return &Reader{
|
||||||
|
r: r,
|
||||||
|
ctx: ctx,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewWriter returns a writer that implements io.Writer with rate limiting.
|
||||||
|
func NewWriter(w io.Writer) *Writer {
|
||||||
|
return &Writer{
|
||||||
|
w: w,
|
||||||
|
ctx: context.Background(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewWriterWithContext returns a writer that implements io.Writer with rate limiting.
|
||||||
|
func NewWriterWithContext(w io.Writer, ctx context.Context) *Writer {
|
||||||
|
return &Writer{
|
||||||
|
w: w,
|
||||||
|
ctx: ctx,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetRateLimit sets rate limit (bytes/sec) to the reader.
|
||||||
|
func (s *Reader) SetRateLimit(bytesPerSec float64) {
|
||||||
|
s.limiter = rate.NewLimiter(rate.Limit(bytesPerSec), burstLimit)
|
||||||
|
s.limiter.AllowN(time.Now(), burstLimit) // spend initial burst
|
||||||
|
}
|
||||||
|
|
||||||
|
// Read reads bytes into p.
|
||||||
|
func (s *Reader) Read(p []byte) (int, error) {
|
||||||
|
if s.limiter == nil {
|
||||||
|
return s.r.Read(p)
|
||||||
|
}
|
||||||
|
n, err := s.r.Read(p)
|
||||||
|
if err != nil {
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
|
if err := s.limiter.WaitN(s.ctx, n); err != nil {
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
|
return n, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// SetRateLimit sets rate limit (bytes/sec) to the writer.
|
||||||
|
func (s *Writer) SetRateLimit(bytesPerSec float64) {
|
||||||
|
s.limiter = rate.NewLimiter(rate.Limit(bytesPerSec), burstLimit)
|
||||||
|
s.limiter.AllowN(time.Now(), burstLimit) // spend initial burst
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write writes bytes from p.
|
||||||
|
func (s *Writer) Write(p []byte) (int, error) {
|
||||||
|
if s.limiter == nil {
|
||||||
|
return s.w.Write(p)
|
||||||
|
}
|
||||||
|
n, err := s.w.Write(p)
|
||||||
|
if err != nil {
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
|
if err := s.limiter.WaitN(s.ctx, n); err != nil {
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
45
utils/leakybuf.go
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
// Provides leaky buffer, based on the example in Effective Go.
|
||||||
|
package utils
|
||||||
|
|
||||||
|
type LeakyBuf struct {
|
||||||
|
bufSize int // size of each buffer
|
||||||
|
freeList chan []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
const LeakyBufSize = 2048 // data.len(2) + hmacsha1(10) + data(4096)
|
||||||
|
const maxNBuf = 2048
|
||||||
|
|
||||||
|
var LeakyBuffer = NewLeakyBuf(maxNBuf, LeakyBufSize)
|
||||||
|
|
||||||
|
// NewLeakyBuf creates a leaky buffer which can hold at most n buffer, each
|
||||||
|
// with bufSize bytes.
|
||||||
|
func NewLeakyBuf(n, bufSize int) *LeakyBuf {
|
||||||
|
return &LeakyBuf{
|
||||||
|
bufSize: bufSize,
|
||||||
|
freeList: make(chan []byte, n),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get returns a buffer from the leaky buffer or create a new buffer.
|
||||||
|
func (lb *LeakyBuf) Get() (b []byte) {
|
||||||
|
select {
|
||||||
|
case b = <-lb.freeList:
|
||||||
|
default:
|
||||||
|
b = make([]byte, lb.bufSize)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Put add the buffer into the free buffer pool for reuse. Panic if the buffer
|
||||||
|
// size is not the same with the leaky buffer's. This is intended to expose
|
||||||
|
// error usage of leaky buffer.
|
||||||
|
func (lb *LeakyBuf) Put(b []byte) {
|
||||||
|
if len(b) != lb.bufSize {
|
||||||
|
panic("invalid buffer size that's put into leaky buffer")
|
||||||
|
}
|
||||||
|
select {
|
||||||
|
case lb.freeList <- b:
|
||||||
|
default:
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
315
utils/map.go
Normal file
@ -0,0 +1,315 @@
|
|||||||
|
package utils
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"sync"
|
||||||
|
)
|
||||||
|
|
||||||
|
var SHARD_COUNT = 32
|
||||||
|
|
||||||
|
// A "thread" safe map of type string:Anything.
|
||||||
|
// To avoid lock bottlenecks this map is dived to several (SHARD_COUNT) map shards.
|
||||||
|
type ConcurrentMap []*ConcurrentMapShared
|
||||||
|
|
||||||
|
// A "thread" safe string to anything map.
|
||||||
|
type ConcurrentMapShared struct {
|
||||||
|
items map[string]interface{}
|
||||||
|
sync.RWMutex // Read Write mutex, guards access to internal map.
|
||||||
|
}
|
||||||
|
|
||||||
|
// Creates a new concurrent map.
|
||||||
|
func NewConcurrentMap() ConcurrentMap {
|
||||||
|
m := make(ConcurrentMap, SHARD_COUNT)
|
||||||
|
for i := 0; i < SHARD_COUNT; i++ {
|
||||||
|
m[i] = &ConcurrentMapShared{items: make(map[string]interface{})}
|
||||||
|
}
|
||||||
|
return m
|
||||||
|
}
|
||||||
|
|
||||||
|
// Returns shard under given key
|
||||||
|
func (m ConcurrentMap) GetShard(key string) *ConcurrentMapShared {
|
||||||
|
return m[uint(fnv32(key))%uint(SHARD_COUNT)]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m ConcurrentMap) MSet(data map[string]interface{}) {
|
||||||
|
for key, value := range data {
|
||||||
|
shard := m.GetShard(key)
|
||||||
|
shard.Lock()
|
||||||
|
shard.items[key] = value
|
||||||
|
shard.Unlock()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Sets the given value under the specified key.
|
||||||
|
func (m ConcurrentMap) Set(key string, value interface{}) {
|
||||||
|
// Get map shard.
|
||||||
|
shard := m.GetShard(key)
|
||||||
|
shard.Lock()
|
||||||
|
shard.items[key] = value
|
||||||
|
shard.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Callback to return new element to be inserted into the map
|
||||||
|
// It is called while lock is held, therefore it MUST NOT
|
||||||
|
// try to access other keys in same map, as it can lead to deadlock since
|
||||||
|
// Go sync.RWLock is not reentrant
|
||||||
|
type UpsertCb func(exist bool, valueInMap interface{}, newValue interface{}) interface{}
|
||||||
|
|
||||||
|
// Insert or Update - updates existing element or inserts a new one using UpsertCb
|
||||||
|
func (m ConcurrentMap) Upsert(key string, value interface{}, cb UpsertCb) (res interface{}) {
|
||||||
|
shard := m.GetShard(key)
|
||||||
|
shard.Lock()
|
||||||
|
v, ok := shard.items[key]
|
||||||
|
res = cb(ok, v, value)
|
||||||
|
shard.items[key] = res
|
||||||
|
shard.Unlock()
|
||||||
|
return res
|
||||||
|
}
|
||||||
|
|
||||||
|
// Sets the given value under the specified key if no value was associated with it.
|
||||||
|
func (m ConcurrentMap) SetIfAbsent(key string, value interface{}) bool {
|
||||||
|
// Get map shard.
|
||||||
|
shard := m.GetShard(key)
|
||||||
|
shard.Lock()
|
||||||
|
_, ok := shard.items[key]
|
||||||
|
if !ok {
|
||||||
|
shard.items[key] = value
|
||||||
|
}
|
||||||
|
shard.Unlock()
|
||||||
|
return !ok
|
||||||
|
}
|
||||||
|
|
||||||
|
// Retrieves an element from map under given key.
|
||||||
|
func (m ConcurrentMap) Get(key string) (interface{}, bool) {
|
||||||
|
// Get shard
|
||||||
|
shard := m.GetShard(key)
|
||||||
|
shard.RLock()
|
||||||
|
// Get item from shard.
|
||||||
|
val, ok := shard.items[key]
|
||||||
|
shard.RUnlock()
|
||||||
|
return val, ok
|
||||||
|
}
|
||||||
|
|
||||||
|
// Returns the number of elements within the map.
|
||||||
|
func (m ConcurrentMap) Count() int {
|
||||||
|
count := 0
|
||||||
|
for i := 0; i < SHARD_COUNT; i++ {
|
||||||
|
shard := m[i]
|
||||||
|
shard.RLock()
|
||||||
|
count += len(shard.items)
|
||||||
|
shard.RUnlock()
|
||||||
|
}
|
||||||
|
return count
|
||||||
|
}
|
||||||
|
|
||||||
|
// Looks up an item under specified key
|
||||||
|
func (m ConcurrentMap) Has(key string) bool {
|
||||||
|
// Get shard
|
||||||
|
shard := m.GetShard(key)
|
||||||
|
shard.RLock()
|
||||||
|
// See if element is within shard.
|
||||||
|
_, ok := shard.items[key]
|
||||||
|
shard.RUnlock()
|
||||||
|
return ok
|
||||||
|
}
|
||||||
|
|
||||||
|
// Removes an element from the map.
|
||||||
|
func (m ConcurrentMap) Remove(key string) {
|
||||||
|
// Try to get shard.
|
||||||
|
shard := m.GetShard(key)
|
||||||
|
shard.Lock()
|
||||||
|
delete(shard.items, key)
|
||||||
|
shard.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Removes an element from the map and returns it
|
||||||
|
func (m ConcurrentMap) Pop(key string) (v interface{}, exists bool) {
|
||||||
|
// Try to get shard.
|
||||||
|
shard := m.GetShard(key)
|
||||||
|
shard.Lock()
|
||||||
|
v, exists = shard.items[key]
|
||||||
|
delete(shard.items, key)
|
||||||
|
shard.Unlock()
|
||||||
|
return v, exists
|
||||||
|
}
|
||||||
|
|
||||||
|
// Checks if map is empty.
|
||||||
|
func (m ConcurrentMap) IsEmpty() bool {
|
||||||
|
return m.Count() == 0
|
||||||
|
}
|
||||||
|
|
||||||
|
// Used by the Iter & IterBuffered functions to wrap two variables together over a channel,
|
||||||
|
type Tuple struct {
|
||||||
|
Key string
|
||||||
|
Val interface{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Returns an iterator which could be used in a for range loop.
|
||||||
|
//
|
||||||
|
// Deprecated: using IterBuffered() will get a better performence
|
||||||
|
func (m ConcurrentMap) Iter() <-chan Tuple {
|
||||||
|
chans := snapshot(m)
|
||||||
|
ch := make(chan Tuple)
|
||||||
|
go fanIn(chans, ch)
|
||||||
|
return ch
|
||||||
|
}
|
||||||
|
|
||||||
|
// Returns a buffered iterator which could be used in a for range loop.
|
||||||
|
func (m ConcurrentMap) IterBuffered() <-chan Tuple {
|
||||||
|
chans := snapshot(m)
|
||||||
|
total := 0
|
||||||
|
for _, c := range chans {
|
||||||
|
total += cap(c)
|
||||||
|
}
|
||||||
|
ch := make(chan Tuple, total)
|
||||||
|
go fanIn(chans, ch)
|
||||||
|
return ch
|
||||||
|
}
|
||||||
|
|
||||||
|
// Returns a array of channels that contains elements in each shard,
|
||||||
|
// which likely takes a snapshot of `m`.
|
||||||
|
// It returns once the size of each buffered channel is determined,
|
||||||
|
// before all the channels are populated using goroutines.
|
||||||
|
func snapshot(m ConcurrentMap) (chans []chan Tuple) {
|
||||||
|
chans = make([]chan Tuple, SHARD_COUNT)
|
||||||
|
wg := sync.WaitGroup{}
|
||||||
|
wg.Add(SHARD_COUNT)
|
||||||
|
// Foreach shard.
|
||||||
|
for index, shard := range m {
|
||||||
|
go func(index int, shard *ConcurrentMapShared) {
|
||||||
|
// Foreach key, value pair.
|
||||||
|
shard.RLock()
|
||||||
|
chans[index] = make(chan Tuple, len(shard.items))
|
||||||
|
wg.Done()
|
||||||
|
for key, val := range shard.items {
|
||||||
|
chans[index] <- Tuple{key, val}
|
||||||
|
}
|
||||||
|
shard.RUnlock()
|
||||||
|
close(chans[index])
|
||||||
|
}(index, shard)
|
||||||
|
}
|
||||||
|
wg.Wait()
|
||||||
|
return chans
|
||||||
|
}
|
||||||
|
|
||||||
|
// fanIn reads elements from channels `chans` into channel `out`
|
||||||
|
func fanIn(chans []chan Tuple, out chan Tuple) {
|
||||||
|
wg := sync.WaitGroup{}
|
||||||
|
wg.Add(len(chans))
|
||||||
|
for _, ch := range chans {
|
||||||
|
go func(ch chan Tuple) {
|
||||||
|
for t := range ch {
|
||||||
|
out <- t
|
||||||
|
}
|
||||||
|
wg.Done()
|
||||||
|
}(ch)
|
||||||
|
}
|
||||||
|
wg.Wait()
|
||||||
|
close(out)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Returns all items as map[string]interface{}
|
||||||
|
func (m ConcurrentMap) Items() map[string]interface{} {
|
||||||
|
tmp := make(map[string]interface{})
|
||||||
|
|
||||||
|
// Insert items to temporary map.
|
||||||
|
for item := range m.IterBuffered() {
|
||||||
|
tmp[item.Key] = item.Val
|
||||||
|
}
|
||||||
|
|
||||||
|
return tmp
|
||||||
|
}
|
||||||
|
|
||||||
|
// Iterator callback,called for every key,value found in
|
||||||
|
// maps. RLock is held for all calls for a given shard
|
||||||
|
// therefore callback sess consistent view of a shard,
|
||||||
|
// but not across the shards
|
||||||
|
type IterCb func(key string, v interface{})
|
||||||
|
|
||||||
|
// Callback based iterator, cheapest way to read
|
||||||
|
// all elements in a map.
|
||||||
|
func (m ConcurrentMap) IterCb(fn IterCb) {
|
||||||
|
for idx := range m {
|
||||||
|
shard := (m)[idx]
|
||||||
|
shard.RLock()
|
||||||
|
for key, value := range shard.items {
|
||||||
|
fn(key, value)
|
||||||
|
}
|
||||||
|
shard.RUnlock()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return all keys as []string
|
||||||
|
func (m ConcurrentMap) Keys() []string {
|
||||||
|
count := m.Count()
|
||||||
|
ch := make(chan string, count)
|
||||||
|
go func() {
|
||||||
|
// Foreach shard.
|
||||||
|
wg := sync.WaitGroup{}
|
||||||
|
wg.Add(SHARD_COUNT)
|
||||||
|
for _, shard := range m {
|
||||||
|
go func(shard *ConcurrentMapShared) {
|
||||||
|
// Foreach key, value pair.
|
||||||
|
shard.RLock()
|
||||||
|
for key := range shard.items {
|
||||||
|
ch <- key
|
||||||
|
}
|
||||||
|
shard.RUnlock()
|
||||||
|
wg.Done()
|
||||||
|
}(shard)
|
||||||
|
}
|
||||||
|
wg.Wait()
|
||||||
|
close(ch)
|
||||||
|
}()
|
||||||
|
|
||||||
|
// Generate keys
|
||||||
|
keys := make([]string, 0, count)
|
||||||
|
for k := range ch {
|
||||||
|
keys = append(keys, k)
|
||||||
|
}
|
||||||
|
return keys
|
||||||
|
}
|
||||||
|
|
||||||
|
//Reviles ConcurrentMap "private" variables to json marshal.
|
||||||
|
func (m ConcurrentMap) MarshalJSON() ([]byte, error) {
|
||||||
|
// Create a temporary map, which will hold all item spread across shards.
|
||||||
|
tmp := make(map[string]interface{})
|
||||||
|
|
||||||
|
// Insert items to temporary map.
|
||||||
|
for item := range m.IterBuffered() {
|
||||||
|
tmp[item.Key] = item.Val
|
||||||
|
}
|
||||||
|
return json.Marshal(tmp)
|
||||||
|
}
|
||||||
|
|
||||||
|
func fnv32(key string) uint32 {
|
||||||
|
hash := uint32(2166136261)
|
||||||
|
const prime32 = uint32(16777619)
|
||||||
|
for i := 0; i < len(key); i++ {
|
||||||
|
hash *= prime32
|
||||||
|
hash ^= uint32(key[i])
|
||||||
|
}
|
||||||
|
return hash
|
||||||
|
}
|
||||||
|
|
||||||
|
// Concurrent map uses Interface{} as its value, therefor JSON Unmarshal
|
||||||
|
// will probably won't know which to type to unmarshal into, in such case
|
||||||
|
// we'll end up with a value of type map[string]interface{}, In most cases this isn't
|
||||||
|
// out value type, this is why we've decided to remove this functionality.
|
||||||
|
|
||||||
|
// func (m *ConcurrentMap) UnmarshalJSON(b []byte) (err error) {
|
||||||
|
// // Reverse process of Marshal.
|
||||||
|
|
||||||
|
// tmp := make(map[string]interface{})
|
||||||
|
|
||||||
|
// // Unmarshal into a single map.
|
||||||
|
// if err := json.Unmarshal(b, &tmp); err != nil {
|
||||||
|
// return nil
|
||||||
|
// }
|
||||||
|
|
||||||
|
// // foreach key,value pair in temporary map insert into our concurrent map.
|
||||||
|
// for key, val := range tmp {
|
||||||
|
// m.Set(key, val)
|
||||||
|
// }
|
||||||
|
// return nil
|
||||||
|
// }
|
||||||
229
utils/serve-channel.go
Normal file
@ -0,0 +1,229 @@
|
|||||||
|
package utils
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"crypto/x509"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
logger "log"
|
||||||
|
"net"
|
||||||
|
"runtime/debug"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/services/kcpcfg"
|
||||||
|
|
||||||
|
kcp "github.com/xtaci/kcp-go"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ServerChannel struct {
|
||||||
|
ip string
|
||||||
|
port int
|
||||||
|
Listener *net.Listener
|
||||||
|
UDPListener *net.UDPConn
|
||||||
|
errAcceptHandler func(err error)
|
||||||
|
log *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewServerChannel(ip string, port int, log *logger.Logger) ServerChannel {
|
||||||
|
return ServerChannel{
|
||||||
|
ip: ip,
|
||||||
|
port: port,
|
||||||
|
log: log,
|
||||||
|
errAcceptHandler: func(err error) {
|
||||||
|
log.Printf("accept error , ERR:%s", err)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func NewServerChannelHost(host string, log *logger.Logger) ServerChannel {
|
||||||
|
h, port, _ := net.SplitHostPort(host)
|
||||||
|
p, _ := strconv.Atoi(port)
|
||||||
|
return ServerChannel{
|
||||||
|
ip: h,
|
||||||
|
port: p,
|
||||||
|
log: log,
|
||||||
|
errAcceptHandler: func(err error) {
|
||||||
|
log.Printf("accept error , ERR:%s", err)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func (sc *ServerChannel) SetErrAcceptHandler(fn func(err error)) {
|
||||||
|
sc.errAcceptHandler = fn
|
||||||
|
}
|
||||||
|
func (sc *ServerChannel) ListenTls(certBytes, keyBytes, caCertBytes []byte, fn func(conn net.Conn)) (err error) {
|
||||||
|
sc.Listener, err = sc.listenTls(sc.ip, sc.port, certBytes, keyBytes, caCertBytes)
|
||||||
|
if err == nil {
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
sc.log.Printf("ListenTls crashed , err : %s , \ntrace:%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for {
|
||||||
|
var conn net.Conn
|
||||||
|
conn, err = (*sc.Listener).Accept()
|
||||||
|
if err == nil {
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
sc.log.Printf("tls connection handler crashed , err : %s , \ntrace:%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
fn(conn)
|
||||||
|
}()
|
||||||
|
} else {
|
||||||
|
sc.errAcceptHandler(err)
|
||||||
|
(*sc.Listener).Close()
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (sc *ServerChannel) listenTls(ip string, port int, certBytes, keyBytes, caCertBytes []byte) (ln *net.Listener, err error) {
|
||||||
|
|
||||||
|
var cert tls.Certificate
|
||||||
|
cert, err = tls.X509KeyPair(certBytes, keyBytes)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
clientCertPool := x509.NewCertPool()
|
||||||
|
caBytes := certBytes
|
||||||
|
if caCertBytes != nil {
|
||||||
|
caBytes = caCertBytes
|
||||||
|
}
|
||||||
|
ok := clientCertPool.AppendCertsFromPEM(caBytes)
|
||||||
|
if !ok {
|
||||||
|
err = errors.New("failed to parse root certificate")
|
||||||
|
}
|
||||||
|
config := &tls.Config{
|
||||||
|
ClientCAs: clientCertPool,
|
||||||
|
Certificates: []tls.Certificate{cert},
|
||||||
|
ClientAuth: tls.RequireAndVerifyClientCert,
|
||||||
|
}
|
||||||
|
_ln, err := tls.Listen("tcp", fmt.Sprintf("%s:%d", ip, port), config)
|
||||||
|
if err == nil {
|
||||||
|
ln = &_ln
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (sc *ServerChannel) ListenTCP(fn func(conn net.Conn)) (err error) {
|
||||||
|
var l net.Listener
|
||||||
|
l, err = net.Listen("tcp", fmt.Sprintf("%s:%d", sc.ip, sc.port))
|
||||||
|
if err == nil {
|
||||||
|
sc.Listener = &l
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
sc.log.Printf("ListenTCP crashed , err : %s , \ntrace:%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for {
|
||||||
|
var conn net.Conn
|
||||||
|
conn, err = (*sc.Listener).Accept()
|
||||||
|
if err == nil {
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
sc.log.Printf("tcp connection handler crashed , err : %s , \ntrace:%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
fn(conn)
|
||||||
|
}()
|
||||||
|
} else {
|
||||||
|
sc.errAcceptHandler(err)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (sc *ServerChannel) ListenUDP(fn func(packet []byte, localAddr, srcAddr *net.UDPAddr)) (err error) {
|
||||||
|
addr := &net.UDPAddr{IP: net.ParseIP(sc.ip), Port: sc.port}
|
||||||
|
l, err := net.ListenUDP("udp", addr)
|
||||||
|
if err == nil {
|
||||||
|
sc.UDPListener = l
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
sc.log.Printf("ListenUDP crashed , err : %s , \ntrace:%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for {
|
||||||
|
var buf = make([]byte, 2048)
|
||||||
|
n, srcAddr, err := (*sc.UDPListener).ReadFromUDP(buf)
|
||||||
|
if err == nil {
|
||||||
|
packet := buf[0:n]
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
sc.log.Printf("udp data handler crashed , err : %s , \ntrace:%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
fn(packet, addr, srcAddr)
|
||||||
|
}()
|
||||||
|
} else {
|
||||||
|
sc.errAcceptHandler(err)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (sc *ServerChannel) ListenKCP(config kcpcfg.KCPConfigArgs, fn func(conn net.Conn), log *logger.Logger) (err error) {
|
||||||
|
lis, err := kcp.ListenWithOptions(fmt.Sprintf("%s:%d", sc.ip, sc.port), config.Block, *config.DataShard, *config.ParityShard)
|
||||||
|
if err == nil {
|
||||||
|
if err = lis.SetDSCP(*config.DSCP); err != nil {
|
||||||
|
log.Println("SetDSCP:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = lis.SetReadBuffer(*config.SockBuf); err != nil {
|
||||||
|
log.Println("SetReadBuffer:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err = lis.SetWriteBuffer(*config.SockBuf); err != nil {
|
||||||
|
log.Println("SetWriteBuffer:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
sc.Listener = new(net.Listener)
|
||||||
|
*sc.Listener = lis
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
sc.log.Printf("ListenKCP crashed , err : %s , \ntrace:%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for {
|
||||||
|
//var conn net.Conn
|
||||||
|
conn, err := lis.AcceptKCP()
|
||||||
|
if err == nil {
|
||||||
|
go func() {
|
||||||
|
defer func() {
|
||||||
|
if e := recover(); e != nil {
|
||||||
|
sc.log.Printf("kcp connection handler crashed , err : %s , \ntrace:%s", e, string(debug.Stack()))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
conn.SetStreamMode(true)
|
||||||
|
conn.SetWriteDelay(true)
|
||||||
|
conn.SetNoDelay(*config.NoDelay, *config.Interval, *config.Resend, *config.NoCongestion)
|
||||||
|
conn.SetMtu(*config.MTU)
|
||||||
|
conn.SetWindowSize(*config.SndWnd, *config.RcvWnd)
|
||||||
|
conn.SetACKNoDelay(*config.AckNodelay)
|
||||||
|
if *config.NoComp {
|
||||||
|
fn(conn)
|
||||||
|
} else {
|
||||||
|
cconn := NewCompStream(conn)
|
||||||
|
fn(cconn)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
} else {
|
||||||
|
sc.errAcceptHandler(err)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
173
utils/sni/sni.go
Normal file
@ -0,0 +1,173 @@
|
|||||||
|
package sni
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"bytes"
|
||||||
|
"errors"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
)
|
||||||
|
|
||||||
|
func ServerNameFromBytes(data []byte) (sn string, err error) {
|
||||||
|
reader := bytes.NewReader(data)
|
||||||
|
bufferedReader := bufio.NewReader(reader)
|
||||||
|
c := bufferedConn{bufferedReader, nil, nil}
|
||||||
|
sn, _, err = ServerNameFromConn(c)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
type bufferedConn struct {
|
||||||
|
r *bufio.Reader
|
||||||
|
rout io.Reader
|
||||||
|
net.Conn
|
||||||
|
}
|
||||||
|
|
||||||
|
func newBufferedConn(c net.Conn) bufferedConn {
|
||||||
|
return bufferedConn{bufio.NewReader(c), nil, c}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b bufferedConn) Peek(n int) ([]byte, error) {
|
||||||
|
return b.r.Peek(n)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b bufferedConn) Read(p []byte) (int, error) {
|
||||||
|
if b.rout != nil {
|
||||||
|
return b.rout.Read(p)
|
||||||
|
}
|
||||||
|
return b.r.Read(p)
|
||||||
|
}
|
||||||
|
|
||||||
|
var malformedError = errors.New("malformed client hello")
|
||||||
|
|
||||||
|
func getHello(b []byte) (string, error) {
|
||||||
|
rest := b[5:]
|
||||||
|
|
||||||
|
if len(rest) == 0 {
|
||||||
|
return "", malformedError
|
||||||
|
}
|
||||||
|
|
||||||
|
current := 0
|
||||||
|
handshakeType := rest[0]
|
||||||
|
current += 1
|
||||||
|
if handshakeType != 0x1 {
|
||||||
|
return "", errors.New("Not a ClientHello")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Skip over another length
|
||||||
|
current += 3
|
||||||
|
// Skip over protocolversion
|
||||||
|
current += 2
|
||||||
|
// Skip over random number
|
||||||
|
current += 4 + 28
|
||||||
|
|
||||||
|
if current > len(rest) {
|
||||||
|
return "", malformedError
|
||||||
|
}
|
||||||
|
|
||||||
|
// Skip over session ID
|
||||||
|
sessionIDLength := int(rest[current])
|
||||||
|
current += 1
|
||||||
|
current += sessionIDLength
|
||||||
|
|
||||||
|
if current+1 > len(rest) {
|
||||||
|
return "", malformedError
|
||||||
|
}
|
||||||
|
|
||||||
|
cipherSuiteLength := (int(rest[current]) << 8) + int(rest[current+1])
|
||||||
|
current += 2
|
||||||
|
current += cipherSuiteLength
|
||||||
|
|
||||||
|
if current > len(rest) {
|
||||||
|
return "", malformedError
|
||||||
|
}
|
||||||
|
compressionMethodLength := int(rest[current])
|
||||||
|
current += 1
|
||||||
|
current += compressionMethodLength
|
||||||
|
|
||||||
|
if current > len(rest) {
|
||||||
|
return "", errors.New("no extensions")
|
||||||
|
}
|
||||||
|
|
||||||
|
current += 2
|
||||||
|
|
||||||
|
hostname := ""
|
||||||
|
for current+4 < len(rest) && hostname == "" {
|
||||||
|
extensionType := (int(rest[current]) << 8) + int(rest[current+1])
|
||||||
|
current += 2
|
||||||
|
|
||||||
|
extensionDataLength := (int(rest[current]) << 8) + int(rest[current+1])
|
||||||
|
current += 2
|
||||||
|
|
||||||
|
if extensionType == 0 {
|
||||||
|
|
||||||
|
// Skip over number of names as we're assuming there's just one
|
||||||
|
current += 2
|
||||||
|
if current > len(rest) {
|
||||||
|
return "", malformedError
|
||||||
|
}
|
||||||
|
|
||||||
|
nameType := rest[current]
|
||||||
|
current += 1
|
||||||
|
if nameType != 0 {
|
||||||
|
return "", errors.New("Not a hostname")
|
||||||
|
}
|
||||||
|
if current+1 > len(rest) {
|
||||||
|
return "", malformedError
|
||||||
|
}
|
||||||
|
nameLen := (int(rest[current]) << 8) + int(rest[current+1])
|
||||||
|
current += 2
|
||||||
|
if current+nameLen > len(rest) {
|
||||||
|
return "", malformedError
|
||||||
|
}
|
||||||
|
hostname = string(rest[current : current+nameLen])
|
||||||
|
}
|
||||||
|
|
||||||
|
current += extensionDataLength
|
||||||
|
}
|
||||||
|
if hostname == "" {
|
||||||
|
return "", errors.New("No hostname")
|
||||||
|
}
|
||||||
|
return hostname, nil
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func getHelloBytes(c bufferedConn) ([]byte, error) {
|
||||||
|
b, err := c.Peek(5)
|
||||||
|
if err != nil {
|
||||||
|
return []byte{}, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if b[0] != 0x16 {
|
||||||
|
return []byte{}, errors.New("not TLS")
|
||||||
|
}
|
||||||
|
|
||||||
|
restLengthBytes := b[3:]
|
||||||
|
restLength := (int(restLengthBytes[0]) << 8) + int(restLengthBytes[1])
|
||||||
|
|
||||||
|
return c.Peek(5 + restLength)
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func getServername(c bufferedConn) (string, []byte, error) {
|
||||||
|
all, err := getHelloBytes(c)
|
||||||
|
if err != nil {
|
||||||
|
return "", nil, err
|
||||||
|
}
|
||||||
|
name, err := getHello(all)
|
||||||
|
if err != nil {
|
||||||
|
return "", nil, err
|
||||||
|
}
|
||||||
|
return name, all, err
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Uses SNI to get the name of the server from the connection. Returns the ServerName and a buffered connection that will not have been read off of.
|
||||||
|
func ServerNameFromConn(c net.Conn) (string, net.Conn, error) {
|
||||||
|
bufconn := newBufferedConn(c)
|
||||||
|
sn, helloBytes, err := getServername(bufconn)
|
||||||
|
if err != nil {
|
||||||
|
return "", nil, err
|
||||||
|
}
|
||||||
|
bufconn.rout = io.MultiReader(bytes.NewBuffer(helloBytes), c)
|
||||||
|
return sn, bufconn, nil
|
||||||
|
}
|
||||||
253
utils/socks/client.go
Normal file
@ -0,0 +1,253 @@
|
|||||||
|
package socks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/binary"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"strconv"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
var socks5Errors = []string{
|
||||||
|
"",
|
||||||
|
"general failure",
|
||||||
|
"connection forbidden",
|
||||||
|
"network unreachable",
|
||||||
|
"host unreachable",
|
||||||
|
"connection refused",
|
||||||
|
"TTL expired",
|
||||||
|
"command not supported",
|
||||||
|
"address type not supported",
|
||||||
|
}
|
||||||
|
|
||||||
|
type Auth struct {
|
||||||
|
User, Password string
|
||||||
|
}
|
||||||
|
type ClientConn struct {
|
||||||
|
user string
|
||||||
|
password string
|
||||||
|
conn *net.Conn
|
||||||
|
header []byte
|
||||||
|
timeout time.Duration
|
||||||
|
addr string
|
||||||
|
network string
|
||||||
|
UDPAddr string
|
||||||
|
}
|
||||||
|
|
||||||
|
// SOCKS5 returns a Dialer that makes SOCKSv5 connections to the given address
|
||||||
|
// with an optional username and password. See RFC 1928 and RFC 1929.
|
||||||
|
// target must be a canonical address with a host and port.
|
||||||
|
// network : tcp udp
|
||||||
|
func NewClientConn(conn *net.Conn, network, target string, timeout time.Duration, auth *Auth, header []byte) *ClientConn {
|
||||||
|
s := &ClientConn{
|
||||||
|
conn: conn,
|
||||||
|
network: network,
|
||||||
|
timeout: timeout,
|
||||||
|
}
|
||||||
|
if auth != nil {
|
||||||
|
s.user = auth.User
|
||||||
|
s.password = auth.Password
|
||||||
|
}
|
||||||
|
if header != nil && len(header) > 0 {
|
||||||
|
s.header = header
|
||||||
|
}
|
||||||
|
if network == "udp" && target == "" {
|
||||||
|
target = "0.0.0.0:1"
|
||||||
|
}
|
||||||
|
s.addr = target
|
||||||
|
return s
|
||||||
|
}
|
||||||
|
|
||||||
|
// connect takes an existing connection to a socks5 proxy server,
|
||||||
|
// and commands the server to extend that connection to target,
|
||||||
|
// which must be a canonical address with a host and port.
|
||||||
|
func (s *ClientConn) Handshake() error {
|
||||||
|
host, portStr, err := net.SplitHostPort(s.addr)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
port, err := strconv.Atoi(portStr)
|
||||||
|
if err != nil {
|
||||||
|
return errors.New("proxy: failed to parse port number: " + portStr)
|
||||||
|
}
|
||||||
|
if port < 1 || port > 0xffff {
|
||||||
|
return errors.New("proxy: port number out of range: " + portStr)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := s.handshake(host); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
buf := []byte{}
|
||||||
|
if s.network == "tcp" {
|
||||||
|
buf = append(buf, VERSION_V5, CMD_CONNECT, 0 /* reserved */)
|
||||||
|
|
||||||
|
} else {
|
||||||
|
buf = append(buf, VERSION_V5, CMD_ASSOCIATE, 0 /* reserved */)
|
||||||
|
}
|
||||||
|
if ip := net.ParseIP(host); ip != nil {
|
||||||
|
if ip4 := ip.To4(); ip4 != nil {
|
||||||
|
buf = append(buf, ATYP_IPV4)
|
||||||
|
ip = ip4
|
||||||
|
} else {
|
||||||
|
buf = append(buf, ATYP_IPV6)
|
||||||
|
}
|
||||||
|
buf = append(buf, ip...)
|
||||||
|
} else {
|
||||||
|
if len(host) > 255 {
|
||||||
|
return errors.New("proxy: destination host name too long: " + host)
|
||||||
|
}
|
||||||
|
buf = append(buf, ATYP_DOMAIN)
|
||||||
|
buf = append(buf, byte(len(host)))
|
||||||
|
buf = append(buf, host...)
|
||||||
|
}
|
||||||
|
buf = append(buf, byte(port>>8), byte(port))
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
if _, err := (*s.conn).Write(buf); err != nil {
|
||||||
|
return errors.New("proxy: failed to write connect request to SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
if _, err := io.ReadFull((*s.conn), buf[:4]); err != nil {
|
||||||
|
return errors.New("proxy: failed to read connect reply from SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
failure := "unknown error"
|
||||||
|
if int(buf[1]) < len(socks5Errors) {
|
||||||
|
failure = socks5Errors[buf[1]]
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(failure) > 0 {
|
||||||
|
return errors.New("proxy: SOCKS5 proxy at " + s.addr + " failed to connect: " + failure)
|
||||||
|
}
|
||||||
|
|
||||||
|
bytesToDiscard := 0
|
||||||
|
switch buf[3] {
|
||||||
|
case ATYP_IPV4:
|
||||||
|
bytesToDiscard = net.IPv4len
|
||||||
|
case ATYP_IPV6:
|
||||||
|
bytesToDiscard = net.IPv6len
|
||||||
|
case ATYP_DOMAIN:
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
_, err := io.ReadFull((*s.conn), buf[:1])
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
return errors.New("proxy: failed to read domain length from SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
bytesToDiscard = int(buf[0])
|
||||||
|
default:
|
||||||
|
return errors.New("proxy: got unknown address type " + strconv.Itoa(int(buf[3])) + " from SOCKS5 proxy at " + s.addr)
|
||||||
|
}
|
||||||
|
|
||||||
|
if cap(buf) < bytesToDiscard {
|
||||||
|
buf = make([]byte, bytesToDiscard)
|
||||||
|
} else {
|
||||||
|
buf = buf[:bytesToDiscard]
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
if _, err := io.ReadFull((*s.conn), buf); err != nil {
|
||||||
|
return errors.New("proxy: failed to read address from SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
var ip net.IP
|
||||||
|
ip = buf
|
||||||
|
ipStr := ""
|
||||||
|
if bytesToDiscard == net.IPv4len || bytesToDiscard == net.IPv6len {
|
||||||
|
if ipv4 := ip.To4(); ipv4 != nil {
|
||||||
|
ipStr = ipv4.String()
|
||||||
|
} else {
|
||||||
|
ipStr = ip.To16().String()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
//log.Printf("%v", ipStr)
|
||||||
|
// Also need to discard the port number
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
if _, err := io.ReadFull((*s.conn), buf[:2]); err != nil {
|
||||||
|
return errors.New("proxy: failed to read port from SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
p := binary.BigEndian.Uint16([]byte{buf[0], buf[1]})
|
||||||
|
//log.Printf("%v", p)
|
||||||
|
s.UDPAddr = net.JoinHostPort(ipStr, fmt.Sprintf("%d", p))
|
||||||
|
//log.Printf("%v", s.udpAddr)
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
func (s *ClientConn) SendUDP(data []byte, addr string) (respData []byte, err error) {
|
||||||
|
|
||||||
|
c, err := net.DialTimeout("udp", s.UDPAddr, s.timeout)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
conn := c.(*net.UDPConn)
|
||||||
|
|
||||||
|
p := NewPacketUDP()
|
||||||
|
p.Build(addr, data)
|
||||||
|
conn.SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
conn.Write(p.Bytes())
|
||||||
|
conn.SetDeadline(time.Time{})
|
||||||
|
|
||||||
|
buf := make([]byte, 1024)
|
||||||
|
conn.SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
n, _, err := conn.ReadFrom(buf)
|
||||||
|
conn.SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
respData = buf[:n]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *ClientConn) handshake(host string) error {
|
||||||
|
|
||||||
|
// the size here is just an estimate
|
||||||
|
buf := make([]byte, 0, 6+len(host))
|
||||||
|
|
||||||
|
buf = append(buf, VERSION_V5)
|
||||||
|
if len(s.user) > 0 && len(s.user) < 256 && len(s.password) < 256 {
|
||||||
|
buf = append(buf, 2 /* num auth methods */, Method_NO_AUTH, Method_USER_PASS)
|
||||||
|
} else {
|
||||||
|
buf = append(buf, 1 /* num auth methods */, Method_NO_AUTH)
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
if _, err := (*s.conn).Write(buf); err != nil {
|
||||||
|
return errors.New("proxy: failed to write greeting to SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
if _, err := io.ReadFull((*s.conn), buf[:2]); err != nil {
|
||||||
|
return errors.New("proxy: failed to read greeting from SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
|
||||||
|
if buf[0] != 5 {
|
||||||
|
return errors.New("proxy: SOCKS5 proxy at " + s.addr + " has unexpected version " + strconv.Itoa(int(buf[0])))
|
||||||
|
}
|
||||||
|
if buf[1] == 0xff {
|
||||||
|
return errors.New("proxy: SOCKS5 proxy at " + s.addr + " requires authentication")
|
||||||
|
}
|
||||||
|
|
||||||
|
// See RFC 1929
|
||||||
|
if buf[1] == Method_USER_PASS {
|
||||||
|
buf = buf[:0]
|
||||||
|
buf = append(buf, 1 /* password protocol version */)
|
||||||
|
buf = append(buf, uint8(len(s.user)))
|
||||||
|
buf = append(buf, s.user...)
|
||||||
|
buf = append(buf, uint8(len(s.password)))
|
||||||
|
buf = append(buf, s.password...)
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
if _, err := (*s.conn).Write(buf); err != nil {
|
||||||
|
return errors.New("proxy: failed to write authentication request to SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(s.timeout))
|
||||||
|
if _, err := io.ReadFull((*s.conn), buf[:2]); err != nil {
|
||||||
|
return errors.New("proxy: failed to read authentication reply from SOCKS5 proxy at " + s.addr + ": " + err.Error())
|
||||||
|
}
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
if buf[1] != 0 {
|
||||||
|
return errors.New("proxy: SOCKS5 proxy at " + s.addr + " rejected username/password")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
252
utils/socks/server.go
Normal file
@ -0,0 +1,252 @@
|
|||||||
|
package socks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/snail007/goproxy/utils"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
Method_NO_AUTH = uint8(0x00)
|
||||||
|
Method_GSSAPI = uint8(0x01)
|
||||||
|
Method_USER_PASS = uint8(0x02)
|
||||||
|
Method_IANA = uint8(0x7F)
|
||||||
|
Method_RESVERVE = uint8(0x80)
|
||||||
|
Method_NONE_ACCEPTABLE = uint8(0xFF)
|
||||||
|
VERSION_V5 = uint8(0x05)
|
||||||
|
CMD_CONNECT = uint8(0x01)
|
||||||
|
CMD_BIND = uint8(0x02)
|
||||||
|
CMD_ASSOCIATE = uint8(0x03)
|
||||||
|
ATYP_IPV4 = uint8(0x01)
|
||||||
|
ATYP_DOMAIN = uint8(0x03)
|
||||||
|
ATYP_IPV6 = uint8(0x04)
|
||||||
|
REP_SUCCESS = uint8(0x00)
|
||||||
|
REP_REQ_FAIL = uint8(0x01)
|
||||||
|
REP_RULE_FORBIDDEN = uint8(0x02)
|
||||||
|
REP_NETWOR_UNREACHABLE = uint8(0x03)
|
||||||
|
REP_HOST_UNREACHABLE = uint8(0x04)
|
||||||
|
REP_CONNECTION_REFUSED = uint8(0x05)
|
||||||
|
REP_TTL_TIMEOUT = uint8(0x06)
|
||||||
|
REP_CMD_UNSUPPORTED = uint8(0x07)
|
||||||
|
REP_ATYP_UNSUPPORTED = uint8(0x08)
|
||||||
|
REP_UNKNOWN = uint8(0x09)
|
||||||
|
RSV = uint8(0x00)
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
ZERO_IP = []byte{0x00, 0x00, 0x00, 0x00}
|
||||||
|
ZERO_PORT = []byte{0x00, 0x00}
|
||||||
|
)
|
||||||
|
|
||||||
|
type ServerConn struct {
|
||||||
|
target string
|
||||||
|
user string
|
||||||
|
password string
|
||||||
|
conn *net.Conn
|
||||||
|
timeout time.Duration
|
||||||
|
auth *utils.BasicAuth
|
||||||
|
header []byte
|
||||||
|
ver uint8
|
||||||
|
//method
|
||||||
|
methodsCount uint8
|
||||||
|
methods []uint8
|
||||||
|
method uint8
|
||||||
|
//request
|
||||||
|
cmd uint8
|
||||||
|
reserve uint8
|
||||||
|
addressType uint8
|
||||||
|
dstAddr string
|
||||||
|
dstPort string
|
||||||
|
dstHost string
|
||||||
|
UDPConnListener *net.UDPConn
|
||||||
|
enableUDP bool
|
||||||
|
udpIP string
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewServerConn(conn *net.Conn, timeout time.Duration, auth *utils.BasicAuth, enableUDP bool, udpHost string, header []byte) *ServerConn {
|
||||||
|
|
||||||
|
s := &ServerConn{
|
||||||
|
conn: conn,
|
||||||
|
timeout: timeout,
|
||||||
|
auth: auth,
|
||||||
|
header: header,
|
||||||
|
ver: VERSION_V5,
|
||||||
|
enableUDP: enableUDP,
|
||||||
|
udpIP: udpHost,
|
||||||
|
}
|
||||||
|
return s
|
||||||
|
|
||||||
|
}
|
||||||
|
func (s *ServerConn) Close() {
|
||||||
|
utils.CloseConn(s.conn)
|
||||||
|
}
|
||||||
|
func (s *ServerConn) AuthData() Auth {
|
||||||
|
return Auth{s.user, s.password}
|
||||||
|
}
|
||||||
|
func (s *ServerConn) IsUDP() bool {
|
||||||
|
return s.cmd == CMD_ASSOCIATE
|
||||||
|
}
|
||||||
|
func (s *ServerConn) IsTCP() bool {
|
||||||
|
return s.cmd == CMD_CONNECT
|
||||||
|
}
|
||||||
|
func (s *ServerConn) Method() uint8 {
|
||||||
|
return s.method
|
||||||
|
}
|
||||||
|
func (s *ServerConn) Target() string {
|
||||||
|
return s.target
|
||||||
|
}
|
||||||
|
func (s *ServerConn) Handshake() (err error) {
|
||||||
|
remoteAddr := (*s.conn).RemoteAddr()
|
||||||
|
//协商开始
|
||||||
|
//method select request
|
||||||
|
var methodReq MethodsRequest
|
||||||
|
(*s.conn).SetReadDeadline(time.Now().Add(time.Second * s.timeout))
|
||||||
|
|
||||||
|
methodReq, e := NewMethodsRequest((*s.conn), s.header)
|
||||||
|
(*s.conn).SetReadDeadline(time.Time{})
|
||||||
|
if e != nil {
|
||||||
|
(*s.conn).SetReadDeadline(time.Now().Add(time.Second * s.timeout))
|
||||||
|
methodReq.Reply(Method_NONE_ACCEPTABLE)
|
||||||
|
(*s.conn).SetReadDeadline(time.Time{})
|
||||||
|
err = fmt.Errorf("new methods request fail,ERR: %s", e)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//log.Printf("%v,s.auth == %v && methodReq.Select(Method_NO_AUTH) %v", methodReq.methods, s.auth, methodReq.Select(Method_NO_AUTH))
|
||||||
|
if s.auth == nil && methodReq.Select(Method_NO_AUTH) && !methodReq.Select(Method_USER_PASS) {
|
||||||
|
// if !methodReq.Select(Method_NO_AUTH) {
|
||||||
|
// (*s.conn).SetReadDeadline(time.Now().Add(time.Second * s.timeout))
|
||||||
|
// methodReq.Reply(Method_NONE_ACCEPTABLE)
|
||||||
|
// (*s.conn).SetReadDeadline(time.Time{})
|
||||||
|
// err = fmt.Errorf("none method found : Method_NO_AUTH")
|
||||||
|
// return
|
||||||
|
// }
|
||||||
|
s.method = Method_NO_AUTH
|
||||||
|
//method select reply
|
||||||
|
(*s.conn).SetReadDeadline(time.Now().Add(time.Second * s.timeout))
|
||||||
|
err = methodReq.Reply(Method_NO_AUTH)
|
||||||
|
(*s.conn).SetReadDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("reply answer data fail,ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// err = fmt.Errorf("% x", methodReq.Bytes())
|
||||||
|
} else {
|
||||||
|
//auth
|
||||||
|
if !methodReq.Select(Method_USER_PASS) {
|
||||||
|
(*s.conn).SetReadDeadline(time.Now().Add(time.Second * s.timeout))
|
||||||
|
methodReq.Reply(Method_NONE_ACCEPTABLE)
|
||||||
|
(*s.conn).SetReadDeadline(time.Time{})
|
||||||
|
err = fmt.Errorf("none method found : Method_USER_PASS")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.method = Method_USER_PASS
|
||||||
|
//method reply need auth
|
||||||
|
(*s.conn).SetReadDeadline(time.Now().Add(time.Second * s.timeout))
|
||||||
|
err = methodReq.Reply(Method_USER_PASS)
|
||||||
|
(*s.conn).SetReadDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("reply answer data fail,ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//read auth
|
||||||
|
buf := make([]byte, 500)
|
||||||
|
var n int
|
||||||
|
(*s.conn).SetReadDeadline(time.Now().Add(time.Second * s.timeout))
|
||||||
|
n, err = (*s.conn).Read(buf)
|
||||||
|
(*s.conn).SetReadDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read auth info fail,ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
r := buf[:n]
|
||||||
|
s.user = string(r[2 : r[1]+2])
|
||||||
|
s.password = string(r[2+r[1]+1:])
|
||||||
|
//err = fmt.Errorf("user:%s,pass:%s", user, pass)
|
||||||
|
//auth
|
||||||
|
_addr := strings.Split(remoteAddr.String(), ":")
|
||||||
|
if s.auth == nil || s.auth.CheckUserPass(s.user, s.password, _addr[0], "") {
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(time.Millisecond * time.Duration(s.timeout)))
|
||||||
|
_, err = (*s.conn).Write([]byte{0x01, 0x00})
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("answer auth success to %s fail,ERR: %s", remoteAddr, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
(*s.conn).SetDeadline(time.Now().Add(time.Millisecond * time.Duration(s.timeout)))
|
||||||
|
_, err = (*s.conn).Write([]byte{0x01, 0x01})
|
||||||
|
(*s.conn).SetDeadline(time.Time{})
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("answer auth fail to %s fail,ERR: %s", remoteAddr, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = fmt.Errorf("auth fail from %s", remoteAddr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
//request detail
|
||||||
|
(*s.conn).SetReadDeadline(time.Now().Add(time.Second * s.timeout))
|
||||||
|
request, e := NewRequest(*s.conn)
|
||||||
|
(*s.conn).SetReadDeadline(time.Time{})
|
||||||
|
if e != nil {
|
||||||
|
err = fmt.Errorf("read request data fail,ERR: %s", e)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
//协商结束
|
||||||
|
|
||||||
|
switch request.CMD() {
|
||||||
|
case CMD_BIND:
|
||||||
|
err = request.TCPReply(REP_UNKNOWN)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("TCPReply REP_UNKNOWN to %s fail,ERR: %s", remoteAddr, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = fmt.Errorf("cmd bind not supported, form: %s", remoteAddr)
|
||||||
|
return
|
||||||
|
case CMD_CONNECT:
|
||||||
|
err = request.TCPReply(REP_SUCCESS)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("TCPReply REP_SUCCESS to %s fail,ERR: %s", remoteAddr, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
case CMD_ASSOCIATE:
|
||||||
|
if !s.enableUDP {
|
||||||
|
request.UDPReply(REP_UNKNOWN, "0.0.0.0:0")
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("UDPReply REP_UNKNOWN to %s fail,ERR: %s", remoteAddr, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = fmt.Errorf("cmd associate not supported, form: %s", remoteAddr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
a, _ := net.ResolveUDPAddr("udp", ":0")
|
||||||
|
s.UDPConnListener, err = net.ListenUDP("udp", a)
|
||||||
|
if err != nil {
|
||||||
|
request.UDPReply(REP_UNKNOWN, "0.0.0.0:0")
|
||||||
|
err = fmt.Errorf("udp bind fail,ERR: %s , for %s", err, remoteAddr)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
_, port, _ := net.SplitHostPort(s.UDPConnListener.LocalAddr().String())
|
||||||
|
err = request.UDPReply(REP_SUCCESS, net.JoinHostPort(s.udpIP, port))
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("UDPReply REP_SUCCESS to %s fail,ERR: %s", remoteAddr, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
//fill socks info
|
||||||
|
s.target = request.Addr()
|
||||||
|
s.methodsCount = methodReq.MethodsCount()
|
||||||
|
s.methods = methodReq.Methods()
|
||||||
|
s.cmd = request.CMD()
|
||||||
|
s.reserve = request.reserve
|
||||||
|
s.addressType = request.addressType
|
||||||
|
s.dstAddr = request.dstAddr
|
||||||
|
s.dstHost = request.dstHost
|
||||||
|
s.dstPort = request.dstPort
|
||||||
|
return
|
||||||
|
}
|
||||||
342
utils/socks/structs.go
Normal file
@ -0,0 +1,342 @@
|
|||||||
|
package socks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/binary"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"strconv"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Request struct {
|
||||||
|
ver uint8
|
||||||
|
cmd uint8
|
||||||
|
reserve uint8
|
||||||
|
addressType uint8
|
||||||
|
dstAddr string
|
||||||
|
dstPort string
|
||||||
|
dstHost string
|
||||||
|
bytes []byte
|
||||||
|
rw io.ReadWriter
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRequest(rw io.ReadWriter, header ...[]byte) (req Request, err interface{}) {
|
||||||
|
var b = make([]byte, 1024)
|
||||||
|
var n int
|
||||||
|
req = Request{rw: rw}
|
||||||
|
if header != nil && len(header) == 1 && len(header[0]) > 1 {
|
||||||
|
b = header[0]
|
||||||
|
n = len(header[0])
|
||||||
|
} else {
|
||||||
|
n, err = rw.Read(b[:])
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("read req data fail,ERR: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
req.ver = uint8(b[0])
|
||||||
|
req.cmd = uint8(b[1])
|
||||||
|
req.reserve = uint8(b[2])
|
||||||
|
req.addressType = uint8(b[3])
|
||||||
|
if b[0] != 0x5 {
|
||||||
|
err = fmt.Errorf("sosck version supported")
|
||||||
|
req.TCPReply(REP_REQ_FAIL)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
switch b[3] {
|
||||||
|
case 0x01: //IP V4
|
||||||
|
req.dstHost = net.IPv4(b[4], b[5], b[6], b[7]).String()
|
||||||
|
case 0x03: //域名
|
||||||
|
req.dstHost = string(b[5 : n-2]) //b[4]表示域名的长度
|
||||||
|
case 0x04: //IP V6
|
||||||
|
req.dstHost = net.IP{b[4], b[5], b[6], b[7], b[8], b[9], b[10], b[11], b[12], b[13], b[14], b[15], b[16], b[17], b[18], b[19]}.String()
|
||||||
|
}
|
||||||
|
req.dstPort = strconv.Itoa(int(b[n-2])<<8 | int(b[n-1]))
|
||||||
|
req.dstAddr = net.JoinHostPort(req.dstHost, req.dstPort)
|
||||||
|
req.bytes = b[:n]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Request) Bytes() []byte {
|
||||||
|
return s.bytes
|
||||||
|
}
|
||||||
|
func (s *Request) Addr() string {
|
||||||
|
return s.dstAddr
|
||||||
|
}
|
||||||
|
func (s *Request) Host() string {
|
||||||
|
return s.dstHost
|
||||||
|
}
|
||||||
|
func (s *Request) Port() string {
|
||||||
|
return s.dstPort
|
||||||
|
}
|
||||||
|
func (s *Request) AType() uint8 {
|
||||||
|
return s.addressType
|
||||||
|
}
|
||||||
|
func (s *Request) CMD() uint8 {
|
||||||
|
return s.cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Request) TCPReply(rep uint8) (err error) {
|
||||||
|
_, err = s.rw.Write(s.NewReply(rep, "0.0.0.0:0"))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Request) UDPReply(rep uint8, addr string) (err error) {
|
||||||
|
_, err = s.rw.Write(s.NewReply(rep, addr))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *Request) NewReply(rep uint8, addr string) []byte {
|
||||||
|
var response bytes.Buffer
|
||||||
|
host, port, _ := net.SplitHostPort(addr)
|
||||||
|
ip := net.ParseIP(host)
|
||||||
|
ipb := ip.To4()
|
||||||
|
atyp := ATYP_IPV4
|
||||||
|
ipv6 := ip.To16()
|
||||||
|
zeroiIPv6 := fmt.Sprintf("%d%d%d%d%d%d%d%d%d%d%d%d",
|
||||||
|
ipv6[0], ipv6[1], ipv6[2], ipv6[3],
|
||||||
|
ipv6[4], ipv6[5], ipv6[6], ipv6[7],
|
||||||
|
ipv6[8], ipv6[9], ipv6[10], ipv6[11],
|
||||||
|
)
|
||||||
|
if ipb == nil && ipv6 != nil && "0000000000255255" != zeroiIPv6 {
|
||||||
|
atyp = ATYP_IPV6
|
||||||
|
ipb = ip.To16()
|
||||||
|
}
|
||||||
|
porti, _ := strconv.Atoi(port)
|
||||||
|
portb := make([]byte, 2)
|
||||||
|
binary.BigEndian.PutUint16(portb, uint16(porti))
|
||||||
|
// log.Printf("atyp : %v", atyp)
|
||||||
|
// log.Printf("ip : %v", []byte(ip))
|
||||||
|
response.WriteByte(VERSION_V5)
|
||||||
|
response.WriteByte(rep)
|
||||||
|
response.WriteByte(RSV)
|
||||||
|
response.WriteByte(atyp)
|
||||||
|
response.Write(ipb)
|
||||||
|
response.Write(portb)
|
||||||
|
return response.Bytes()
|
||||||
|
}
|
||||||
|
|
||||||
|
type MethodsRequest struct {
|
||||||
|
ver uint8
|
||||||
|
methodsCount uint8
|
||||||
|
methods []uint8
|
||||||
|
bytes []byte
|
||||||
|
rw *io.ReadWriter
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewMethodsRequest(r io.ReadWriter, header ...[]byte) (s MethodsRequest, err interface{}) {
|
||||||
|
defer func() {
|
||||||
|
if err == nil {
|
||||||
|
err = recover()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
s = MethodsRequest{}
|
||||||
|
s.rw = &r
|
||||||
|
var buf = make([]byte, 300)
|
||||||
|
var n int
|
||||||
|
if header != nil && len(header) == 1 && len(header[0]) > 1 {
|
||||||
|
buf = header[0]
|
||||||
|
n = len(header[0])
|
||||||
|
} else {
|
||||||
|
n, err = r.Read(buf)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if buf[0] != 0x05 {
|
||||||
|
err = fmt.Errorf("socks version not supported")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if n != int(buf[1])+int(2) {
|
||||||
|
err = fmt.Errorf("socks methods data length error")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
s.ver = buf[0]
|
||||||
|
s.methodsCount = buf[1]
|
||||||
|
s.methods = buf[2:n]
|
||||||
|
s.bytes = buf[:n]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MethodsRequest) Version() uint8 {
|
||||||
|
return s.ver
|
||||||
|
}
|
||||||
|
func (s *MethodsRequest) MethodsCount() uint8 {
|
||||||
|
return s.methodsCount
|
||||||
|
}
|
||||||
|
func (s *MethodsRequest) Methods() []uint8 {
|
||||||
|
return s.methods
|
||||||
|
}
|
||||||
|
func (s *MethodsRequest) Select(method uint8) bool {
|
||||||
|
for _, m := range s.methods {
|
||||||
|
if m == method {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
func (s *MethodsRequest) Reply(method uint8) (err error) {
|
||||||
|
_, err = (*s.rw).Write([]byte{byte(VERSION_V5), byte(method)})
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (s *MethodsRequest) Bytes() []byte {
|
||||||
|
return s.bytes
|
||||||
|
}
|
||||||
|
|
||||||
|
func ParseUDPPacket(b []byte) (p UDPPacket, err error) {
|
||||||
|
p = UDPPacket{}
|
||||||
|
p.frag = uint8(b[2])
|
||||||
|
p.bytes = b
|
||||||
|
if p.frag != 0 {
|
||||||
|
err = fmt.Errorf("FRAG only support for 0 , %v ,%v", p.frag, b[:4])
|
||||||
|
return
|
||||||
|
}
|
||||||
|
portIndex := 0
|
||||||
|
p.atype = b[3]
|
||||||
|
switch p.atype {
|
||||||
|
case ATYP_IPV4: //IP V4
|
||||||
|
p.dstHost = net.IPv4(b[4], b[5], b[6], b[7]).String()
|
||||||
|
portIndex = 8
|
||||||
|
case ATYP_DOMAIN: //域名
|
||||||
|
domainLen := uint8(b[4])
|
||||||
|
p.dstHost = string(b[5 : 5+domainLen]) //b[4]表示域名的长度
|
||||||
|
portIndex = int(5 + domainLen)
|
||||||
|
case ATYP_IPV6: //IP V6
|
||||||
|
p.dstHost = net.IP{b[4], b[5], b[6], b[7], b[8], b[9], b[10], b[11], b[12], b[13], b[14], b[15], b[16], b[17], b[18], b[19]}.String()
|
||||||
|
portIndex = 20
|
||||||
|
}
|
||||||
|
p.dstPort = strconv.Itoa(int(b[portIndex])<<8 | int(b[portIndex+1]))
|
||||||
|
p.data = b[portIndex+2:]
|
||||||
|
p.header = b[:portIndex+2]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
type UDPPacket struct {
|
||||||
|
rsv uint16
|
||||||
|
frag uint8
|
||||||
|
atype uint8
|
||||||
|
dstHost string
|
||||||
|
dstPort string
|
||||||
|
data []byte
|
||||||
|
header []byte
|
||||||
|
bytes []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *UDPPacket) Header() []byte {
|
||||||
|
return s.header
|
||||||
|
}
|
||||||
|
func (s *UDPPacket) NewReply(data []byte) []byte {
|
||||||
|
var buf bytes.Buffer
|
||||||
|
buf.Write(s.header)
|
||||||
|
buf.Write(data)
|
||||||
|
return buf.Bytes()
|
||||||
|
}
|
||||||
|
func (s *UDPPacket) Host() string {
|
||||||
|
return s.dstHost
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *UDPPacket) Port() string {
|
||||||
|
return s.dstPort
|
||||||
|
}
|
||||||
|
func (s *UDPPacket) Data() []byte {
|
||||||
|
return s.data
|
||||||
|
}
|
||||||
|
|
||||||
|
type PacketUDP struct {
|
||||||
|
rsv uint16
|
||||||
|
frag uint8
|
||||||
|
atype uint8
|
||||||
|
dstHost string
|
||||||
|
dstPort string
|
||||||
|
data []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewPacketUDP() (p PacketUDP) {
|
||||||
|
return PacketUDP{}
|
||||||
|
}
|
||||||
|
func (p *PacketUDP) Build(destAddr string, data []byte) (err error) {
|
||||||
|
host, port, err := net.SplitHostPort(destAddr)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
p.rsv = 0
|
||||||
|
p.frag = 0
|
||||||
|
p.dstHost = host
|
||||||
|
p.dstPort = port
|
||||||
|
p.atype = ATYP_IPV4
|
||||||
|
if ip := net.ParseIP(host); ip != nil {
|
||||||
|
if ip4 := ip.To4(); ip4 != nil {
|
||||||
|
p.atype = ATYP_IPV4
|
||||||
|
ip = ip4
|
||||||
|
} else {
|
||||||
|
p.atype = ATYP_IPV6
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if len(host) > 255 {
|
||||||
|
err = errors.New("proxy: destination host name too long: " + host)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
p.atype = ATYP_DOMAIN
|
||||||
|
}
|
||||||
|
p.data = data
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (p *PacketUDP) Parse(b []byte) (err error) {
|
||||||
|
p.frag = uint8(b[2])
|
||||||
|
if p.frag != 0 {
|
||||||
|
err = fmt.Errorf("FRAG only support for 0 , %v ,%v", p.frag, b[:4])
|
||||||
|
return
|
||||||
|
}
|
||||||
|
portIndex := 0
|
||||||
|
p.atype = b[3]
|
||||||
|
switch p.atype {
|
||||||
|
case ATYP_IPV4: //IP V4
|
||||||
|
p.dstHost = net.IPv4(b[4], b[5], b[6], b[7]).String()
|
||||||
|
portIndex = 8
|
||||||
|
case ATYP_DOMAIN: //域名
|
||||||
|
domainLen := uint8(b[4])
|
||||||
|
p.dstHost = string(b[5 : 5+domainLen]) //b[4]表示域名的长度
|
||||||
|
portIndex = int(5 + domainLen)
|
||||||
|
case ATYP_IPV6: //IP V6
|
||||||
|
p.dstHost = net.IP{b[4], b[5], b[6], b[7], b[8], b[9], b[10], b[11], b[12], b[13], b[14], b[15], b[16], b[17], b[18], b[19]}.String()
|
||||||
|
portIndex = 20
|
||||||
|
}
|
||||||
|
p.dstPort = strconv.Itoa(int(b[portIndex])<<8 | int(b[portIndex+1]))
|
||||||
|
p.data = b[portIndex+2:]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (p *PacketUDP) Header() []byte {
|
||||||
|
header := new(bytes.Buffer)
|
||||||
|
header.Write([]byte{0x00, 0x00, p.frag, p.atype})
|
||||||
|
if p.atype == ATYP_IPV4 {
|
||||||
|
ip := net.ParseIP(p.dstHost)
|
||||||
|
header.Write(ip.To4())
|
||||||
|
} else if p.atype == ATYP_IPV6 {
|
||||||
|
ip := net.ParseIP(p.dstHost)
|
||||||
|
header.Write(ip.To16())
|
||||||
|
} else if p.atype == ATYP_DOMAIN {
|
||||||
|
hBytes := []byte(p.dstHost)
|
||||||
|
header.WriteByte(byte(len(hBytes)))
|
||||||
|
header.Write(hBytes)
|
||||||
|
}
|
||||||
|
port, _ := strconv.ParseUint(p.dstPort, 10, 64)
|
||||||
|
portBytes := new(bytes.Buffer)
|
||||||
|
binary.Write(portBytes, binary.BigEndian, port)
|
||||||
|
header.Write(portBytes.Bytes()[portBytes.Len()-2:])
|
||||||
|
return header.Bytes()
|
||||||
|
}
|
||||||
|
func (p *PacketUDP) Bytes() []byte {
|
||||||
|
packBytes := new(bytes.Buffer)
|
||||||
|
packBytes.Write(p.Header())
|
||||||
|
packBytes.Write(p.data)
|
||||||
|
return packBytes.Bytes()
|
||||||
|
}
|
||||||
|
func (p *PacketUDP) Host() string {
|
||||||
|
return p.dstHost
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *PacketUDP) Port() string {
|
||||||
|
return p.dstPort
|
||||||
|
}
|
||||||
|
func (p *PacketUDP) Data() []byte {
|
||||||
|
return p.data
|
||||||
|
}
|
||||||