func main() { log.SetOutput(os.Stdout) var cmdConfig ss.Config var printVer bool var core int flag.BoolVar(&printVer, "version", false, "print version") flag.StringVar(&configFile, "c", "config.json", "specify config file") flag.StringVar(&cmdConfig.Password, "k", "", "password") flag.IntVar(&cmdConfig.ServerPort, "p", 0, "server port") flag.IntVar(&cmdConfig.Timeout, "t", 300, "timeout in seconds") flag.StringVar(&cmdConfig.Method, "m", "", "encryption method, default: aes-256-cfb") flag.IntVar(&core, "core", 0, "maximum number of CPU cores to use, default is determinied by Go runtime") flag.BoolVar((*bool)(&debug), "d", false, "print debug message") flag.Parse() if printVer { ss.PrintVersion() os.Exit(0) } ss.SetDebug(debug) if strings.HasSuffix(cmdConfig.Method, "-auth") { cmdConfig.Method = cmdConfig.Method[:len(cmdConfig.Method)-5] cmdConfig.Auth = true } var err error config, err = ss.ParseConfig(configFile) if err != nil { if !os.IsNotExist(err) { fmt.Fprintf(os.Stderr, "error reading %s: %v\n", configFile, err) os.Exit(1) } config = &cmdConfig } else { ss.UpdateConfig(config, &cmdConfig) } if config.Method == "" { config.Method = "aes-256-cfb" } if err = ss.CheckCipherMethod(config.Method); err != nil { fmt.Fprintln(os.Stderr, err) os.Exit(1) } if err = unifyPortPassword(config); err != nil { os.Exit(1) } if core > 0 { runtime.GOMAXPROCS(core) } for port, password := range config.PortPassword { go run(port, password, config.Auth) } waitSignal() }
func updatePasswd() { log.Println("updating password") newconfig, err := ss.ParseConfig(configFile) if err != nil { log.Printf("error parsing config file %s to update password: %v\n", configFile, err) return } oldconfig := config config = newconfig if err = unifyPortPassword(config); err != nil { return } for port, passwd := range config.PortPassword { passwdManager.updatePortPasswd(port, passwd) if oldconfig.PortPassword != nil { delete(oldconfig.PortPassword, port) } } // port password still left in the old config should be closed for port, _ := range oldconfig.PortPassword { log.Printf("closing port %s as it's deleted\n", port) passwdManager.del(port) } log.Println("password updated") }
func main() { log.SetOutput(os.Stdout) var cmdConfig ss.Config var printVer bool var core int flag.BoolVar(&printVer, "version", false, "print version") flag.StringVar(&configFile, "c", "config.json", "specify config file") flag.StringVar(&cmdConfig.Password, "k", "", "password") flag.IntVar(&cmdConfig.ServerPort, "p", 0, "server port") flag.IntVar(&cmdConfig.Timeout, "t", 60, "connection timeout (in seconds)") flag.StringVar(&cmdConfig.Method, "m", "", "encryption method, use empty string or rc4") flag.IntVar(&core, "core", 0, "maximum number of CPU cores to use, default is determinied by Go runtime") flag.BoolVar((*bool)(&debug), "d", false, "print debug message") flag.Parse() if printVer { ss.PrintVersion() os.Exit(0) } ss.SetDebug(debug) var err error config, err = ss.ParseConfig(configFile) if err != nil { if !os.IsNotExist(err) { fmt.Fprintf(os.Stderr, "error reading %s: %v\n", configFile, err) os.Exit(1) } config = &cmdConfig } else { ss.UpdateConfig(config, &cmdConfig) } if err = unifyPortPassword(config); err != nil { os.Exit(1) } if err = ss.SetDefaultCipher(config.Method); err != nil { fmt.Fprintln(os.Stderr, err) os.Exit(1) } if core > 0 { runtime.GOMAXPROCS(core) } for port, password := range config.PortPassword { go run(port, password) } waitSignal() }
func main() { var cmdConfig ss.Config var printVer bool flag.BoolVar(&printVer, "version", false, "print version") flag.StringVar(&configFile, "c", "config.json", "specify config file") flag.StringVar(&cmdConfig.Password, "k", "", "password") flag.IntVar(&cmdConfig.ServerPort, "p", 0, "server port") flag.IntVar(&cmdConfig.Timeout, "t", 60, "connection timeout (in seconds)") flag.BoolVar((*bool)(&debug), "d", false, "print debug message") flag.Parse() if printVer { ss.PrintVersion() os.Exit(0) } ss.SetDebug(debug) var err error config, err = ss.ParseConfig(configFile) if err != nil { if os.IsNotExist(err) { log.Println("config file not found, using all options from command line") } else { log.Printf("error reading %s: %v\n", configFile, err) os.Exit(1) } config = &cmdConfig } else { ss.UpdateConfig(config, &cmdConfig) } if err = unifyPortPassword(config); err != nil { os.Exit(1) } initTableCache(config) for port, password := range config.PortPassword { go run(port, password) } // Wait all ports have get it's encryption table for int(table.getCnt) != len(config.PortPassword) { time.Sleep(1 * time.Second) } storeTableCache(config) log.Println("all ports ready") table.cache = nil // release memory waitSignal() }
func initPortMap() { portMap.Lock() conf, err := ss.ParseConfig(configFile) if err == nil { if conf.ServerPort >= 8000 && conf.ServerPort <= 9000 { portMap.ports[conf.ServerPort-8000] = true } for portstr, _ := range conf.PortPassword { port := atoi(portstr) if port >= 8000 && port <= 9000 { portMap.ports[port-8000] = true } else { log.Println("port overflow!") } } portMap.config = conf } portMap.Unlock() checkErr(err) }
func main() { log.SetOutput(os.Stdout) var configFile, cmdServer string var cmdConfig ss.Config var printVer bool flag.BoolVar(&printVer, "version", false, "print version") flag.StringVar(&configFile, "c", "config.json", "specify config file") flag.StringVar(&cmdServer, "s", "", "server address") flag.StringVar(&cmdConfig.Password, "k", "", "password") flag.IntVar(&cmdConfig.ServerPort, "p", 0, "server port") flag.IntVar(&cmdConfig.LocalPort, "l", 0, "local socks5 proxy port") flag.StringVar(&cmdConfig.Method, "m", "", "encryption method, use empty string or rc4") flag.BoolVar((*bool)(&debug), "d", false, "print debug message") flag.Parse() if printVer { ss.PrintVersion() os.Exit(0) } cmdConfig.Server = cmdServer ss.SetDebug(debug) exists, err := ss.IsFileExists(configFile) // If no config file in current directory, try search it in the binary directory // Note there's no portable way to detect the binary directory. binDir := path.Dir(os.Args[0]) if (!exists || err != nil) && binDir != "" && binDir != "." { oldConfig := configFile configFile = path.Join(binDir, "config.json") log.Printf("%s not found, try config file %s\n", oldConfig, configFile) } config, err := ss.ParseConfig(configFile) if err != nil { config = &cmdConfig if !os.IsNotExist(err) { fmt.Fprintf(os.Stderr, "error reading %s: %v\n", configFile, err) os.Exit(1) } } else { ss.UpdateConfig(config, &cmdConfig) } if len(config.ServerPassword) == 0 { if !enoughOptions(config) { fmt.Fprintln(os.Stderr, "must specify server address, password and both server/local port") os.Exit(1) } } else { if config.Password != "" || config.ServerPort != 0 || config.GetServerArray() != nil { fmt.Fprintln(os.Stderr, "given server_password, ignore server, server_port and password option:", config) } if config.LocalPort == 0 { fmt.Fprintln(os.Stderr, "must specify local port") os.Exit(1) } } parseServerConfig(config) run(strconv.Itoa(config.LocalPort)) }
func main() { log.SetOutput(os.Stdout) var cmdConfig ss.Config var printVer, debug bool var core int flag.BoolVar(&printVer, "version", false, "print version") flag.StringVar(&configFile, "c", "config.json", "specify config file") flag.StringVar(&cmdConfig.Password, "k", "", "password") flag.IntVar(&cmdConfig.ServerPort, "p", 0, "server port") flag.IntVar(&cmdConfig.Timeout, "t", 60, "connection timeout (in seconds)") flag.StringVar(&cmdConfig.Method, "m", "", "encryption method, default: aes-256-cfb") flag.IntVar(&cmdConfig.Net, "n", 0, "ipv4(4) or ipv6(6) or both(0), default is both") flag.IntVar(&core, "core", 0, "maximum number of CPU cores to use, default is determinied by logical CPUs on server") flag.BoolVar(&udp, "u", false, "UDP Relay") flag.BoolVar(&debug, "d", false, "print debug message") flag.Parse() if printVer { ss.PrintVersion() os.Exit(0) } ss.SetDebug(debug) var err error config, err = ss.ParseConfig(configFile) if err != nil { if !os.IsNotExist(err) { fmt.Fprintf(os.Stderr, "error reading %s: %v\n", configFile, err) os.Exit(1) } config = &cmdConfig } else { ss.UpdateConfig(config, &cmdConfig) } switch config.Net { case 4: netTcp = "tcp4" netUdp = "udp4" case 6: netTcp = "tcp6" netUdp = "udp6" default: netTcp = "tcp" netUdp = "udp" } if config.Method == "" { config.Method = "aes-256-cfb" } if err = ss.CheckCipherMethod(config.Method); err != nil { fmt.Fprintln(os.Stderr, err) os.Exit(1) } if err = unifyPortPassword(config); err != nil { os.Exit(1) } if core > 0 { runtime.GOMAXPROCS(runtime.NumCPU()) } ss.NewTraffic() for port, password := range config.PortPassword { go run(port, password) if udp && password[2] == "ok" { go runUDP(port, password) } } waitSignal() }
func main() { log.SetFlags(log.Ldate | log.Ltime | log.Lshortfile) log.SetOutput(os.Stdout) var cmdConfig ss.Config var printVer bool var core int flag.BoolVar(&printVer, "version", false, "print version") flag.StringVar(&configFile, "c", "config.json", "specify config file") flag.StringVar(&cmdConfig.Password, "k", "", "password") flag.IntVar(&cmdConfig.ServerPort, "p", 0, "server port") flag.IntVar(&cmdConfig.Timeout, "t", 60, "connection timeout (in seconds)") flag.StringVar(&cmdConfig.Method, "m", "", "encryption method, default: aes-256-cfb") flag.IntVar(&core, "core", 0, "maximum number of CPU cores to use, default is determinied by Go runtime") flag.BoolVar((*bool)(&debug), "d", false, "print debug message") flag.Parse() if printVer { ss.PrintVersion() os.Exit(0) } ss.SetDebug(debug) var err error config, err = ss.ParseConfig(configFile) if err != nil { if !os.IsNotExist(err) { fmt.Fprintf(os.Stderr, "error reading %s: %v\n", configFile, err) os.Exit(1) } config = &cmdConfig } else { ss.UpdateConfig(config, &cmdConfig) } if config.Method == "" { config.Method = "aes-256-cfb" } if err = ss.CheckCipherMethod(config.Method); err != nil { fmt.Fprintln(os.Stderr, err) os.Exit(1) } if err = unifyPortPassword(config); err != nil { os.Exit(1) } if core > 0 { runtime.GOMAXPROCS(core) } initPortMap() if runtime.GOOS == "linux" { limitConfig.Init("/etc/limit.json") } else { limitConfig.Init("limit.json") } for port, password := range config.PortPassword { go run(port, password) } go runWeb() go DaysLimitLoop() waitSignal() }