2018-11-04 15:19:22 +00:00
|
|
|
|
package main
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"flag"
|
|
|
|
|
"fmt"
|
|
|
|
|
"log"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
var (
|
2018-11-29 11:55:24 +00:00
|
|
|
|
configPath = flag.String("config", "config.json", "配置文件路径")
|
|
|
|
|
tcpPort = flag.Int("tcpport", 8284, "Socket连接或者监听的端口")
|
|
|
|
|
httpPort = flag.Int("httpport", 8024, "当mode为server时为服务端监听端口,当为mode为client时为转发至本地客户端的端口")
|
2018-12-06 12:45:14 +00:00
|
|
|
|
rpMode = flag.String("mode", "client", "启动模式,可选为client|server")
|
2018-12-03 15:03:25 +00:00
|
|
|
|
tunnelTarget = flag.String("target", "10.1.50.203:80", "远程目标")
|
2018-11-29 11:55:24 +00:00
|
|
|
|
verifyKey = flag.String("vkey", "", "验证密钥")
|
2018-12-06 12:45:14 +00:00
|
|
|
|
u = flag.String("u", "", "socks5验证用户名")
|
|
|
|
|
p = flag.String("p", "", "socks5验证密码")
|
|
|
|
|
compress = flag.String("compress", "", "数据压缩(gzip|snappy)")
|
2018-11-29 11:55:24 +00:00
|
|
|
|
config Config
|
|
|
|
|
err error
|
2018-12-03 15:03:25 +00:00
|
|
|
|
DataEncode int
|
|
|
|
|
DataDecode int
|
2018-11-04 15:19:22 +00:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
|
flag.Parse()
|
|
|
|
|
log.SetFlags(log.Ldate | log.Ltime | log.Lshortfile)
|
2018-12-03 15:03:25 +00:00
|
|
|
|
switch *compress {
|
|
|
|
|
case "":
|
|
|
|
|
DataDecode = COMPRESS_NONE
|
|
|
|
|
DataEncode = COMPRESS_NONE
|
|
|
|
|
case "gzip":
|
|
|
|
|
DataDecode = COMPRESS_GZIP_DECODE
|
|
|
|
|
DataEncode = COMPRESS_GZIP_ENCODE
|
|
|
|
|
case "snnapy":
|
|
|
|
|
DataDecode = COMPRESS_SNAPY_DECODE
|
|
|
|
|
DataEncode = COMPRESS_SNAPY_ENCODE
|
|
|
|
|
default:
|
|
|
|
|
log.Fatalln("数据压缩格式错误")
|
|
|
|
|
}
|
2018-11-04 15:19:22 +00:00
|
|
|
|
if *rpMode == "client" {
|
|
|
|
|
JsonParse := NewJsonStruct()
|
|
|
|
|
config, err = JsonParse.Load(*configPath)
|
|
|
|
|
if err != nil {
|
|
|
|
|
log.Fatalln(err)
|
|
|
|
|
}
|
|
|
|
|
*verifyKey = config.Server.Vkey
|
|
|
|
|
log.Println("客户端启动,连接:", config.Server.Ip, ", 端口:", config.Server.Tcp)
|
|
|
|
|
cli := NewRPClient(fmt.Sprintf("%s:%d", config.Server.Ip, config.Server.Tcp), config.Server.Num)
|
|
|
|
|
cli.Start()
|
2018-11-29 11:55:24 +00:00
|
|
|
|
} else {
|
2018-11-04 15:19:22 +00:00
|
|
|
|
if *verifyKey == "" {
|
|
|
|
|
log.Fatalln("必须输入一个验证的key")
|
|
|
|
|
}
|
|
|
|
|
if *tcpPort <= 0 || *tcpPort >= 65536 {
|
|
|
|
|
log.Fatalln("请输入正确的tcp端口。")
|
|
|
|
|
}
|
|
|
|
|
if *httpPort <= 0 || *httpPort >= 65536 {
|
|
|
|
|
log.Fatalln("请输入正确的http端口。")
|
|
|
|
|
}
|
2018-11-29 11:55:24 +00:00
|
|
|
|
log.Println("服务端启动,监听tcp服务端端口:", *tcpPort, ", 外部服务端端口:", *httpPort)
|
|
|
|
|
if *rpMode == "httpServer" {
|
|
|
|
|
svr := NewHttpModeServer(*tcpPort, *httpPort)
|
|
|
|
|
if err := svr.Start(); err != nil {
|
|
|
|
|
log.Fatalln(err)
|
|
|
|
|
}
|
|
|
|
|
} else if *rpMode == "tunnelServer" {
|
2018-11-30 18:38:29 +00:00
|
|
|
|
svr := NewTunnelModeServer(*tcpPort, *httpPort, *tunnelTarget, ProcessTunnel)
|
|
|
|
|
svr.Start()
|
2018-11-29 11:55:24 +00:00
|
|
|
|
} else if *rpMode == "sock5Server" {
|
2018-12-03 15:03:25 +00:00
|
|
|
|
svr := NewSock5ModeServer(*tcpPort, *httpPort, *u, *p)
|
2018-11-29 11:55:24 +00:00
|
|
|
|
svr.Start()
|
2018-11-30 18:38:29 +00:00
|
|
|
|
} else if *rpMode == "httpProxyServer" {
|
|
|
|
|
svr := NewTunnelModeServer(*tcpPort, *httpPort, *tunnelTarget, ProcessHttp)
|
|
|
|
|
svr.Start()
|
2018-12-03 15:03:25 +00:00
|
|
|
|
} else if *rpMode == "udpServer" {
|
|
|
|
|
svr := NewUdpModeServer(*tcpPort, *httpPort, *tunnelTarget)
|
|
|
|
|
svr.Start()
|
2018-11-04 15:19:22 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|