mirror of
https://github.com/shadowsocks/shadowsocks-rust.git
synced 2026-02-09 01:59:16 +08:00
282 lines
11 KiB
Rust
282 lines
11 KiB
Rust
//! This is a binary running in the server environment
|
|
//!
|
|
//! You have to provide all needed configuration attributes via command line parameters,
|
|
//! or you could specify a configuration file. The format of configuration file is defined
|
|
//! in mod `config`.
|
|
//!
|
|
//! *It should be notice that the extented configuration file is not suitable for the server
|
|
//! side.*
|
|
|
|
use std::{net::IpAddr, time::Duration};
|
|
|
|
use clap::{clap_app, Arg};
|
|
use futures::future::{self, Either};
|
|
use log::info;
|
|
use tokio::{self, runtime::Builder};
|
|
|
|
use shadowsocks_service::{
|
|
acl::AccessControl,
|
|
config::{Config, ConfigType, ManagerConfig, ManagerServerHost},
|
|
run_manager,
|
|
shadowsocks::{
|
|
config::{ManagerAddr, Mode},
|
|
crypto::v1::{available_ciphers, CipherKind},
|
|
},
|
|
};
|
|
|
|
#[cfg(feature = "logging")]
|
|
use self::common::logging;
|
|
use self::common::{monitor, validator};
|
|
|
|
mod common;
|
|
|
|
/// shadowsocks version
|
|
const VERSION: &str = env!("CARGO_PKG_VERSION");
|
|
|
|
fn main() {
|
|
#[allow(unused_mut)]
|
|
let mut app = clap_app!(shadowsocks =>
|
|
(version: VERSION)
|
|
(about: "A fast tunnel proxy that helps you bypass firewalls.")
|
|
|
|
(@arg UDP_ONLY: -u conflicts_with[TCP_AND_UDP] "Server mode UDP_ONLY")
|
|
(@arg TCP_AND_UDP: -U conflicts_with[UDP_ONLY] "Server mode TCP_AND_UDP")
|
|
|
|
(@arg CONFIG: -c --config +takes_value required_unless("MANAGER_ADDRESS")
|
|
"Shadowsocks configuration file (https://shadowsocks.org/en/config/quick-guide.html), \
|
|
the only required fields are \"manager_address\" and \"manager_port\". \
|
|
Servers defined will be created when process is started.")
|
|
|
|
(@arg BIND_ADDR: -b --("bind-addr") +takes_value {validator::validate_ip_addr} "Bind address, outbound socket will bind this address")
|
|
(@arg SERVER_HOST: -s --("server-host") +takes_value "Host name or IP address of your remote server")
|
|
|
|
(@arg NO_DELAY: --("no-delay") !takes_value "Set TCP_NODELAY option for socket")
|
|
|
|
(@arg MANAGER_ADDRESS: --("manager-address") +takes_value {validator::validate_manager_addr} "ShadowSocks Manager (ssmgr) address, could be ip:port, domain:port or /path/to/unix.sock")
|
|
(@arg ENCRYPT_METHOD: -m --("encrypt-method") +takes_value possible_values(available_ciphers()) "Default encryption method")
|
|
(@arg TIMEOUT: --timeout +takes_value {validator::validate_u64} "Default timeout seconds for TCP relay")
|
|
|
|
(@arg NOFILE: -n --nofile +takes_value "Set RLIMIT_NOFILE with both soft and hard limit (only for *nix systems)")
|
|
(@arg ACL: --acl +takes_value "Path to ACL (Access Control List)")
|
|
(@arg DNS: --dns +takes_value "DNS nameservers, formatted like [(tcp|udp)://]host[:port][,host[:port]]..., or unix:///path/to/dns, or predefined keys like \"google\", \"cloudflare\"")
|
|
|
|
(@arg INBOUND_SEND_BUFFER_SIZE: --("inbound-send-buffer-size") +takes_value {validator::validate_u32} "Set inbound sockets' SO_SNDBUF option")
|
|
(@arg INBOUND_RECV_BUFFER_SIZE: --("inbound-recv-buffer-size") +takes_value {validator::validate_u32} "Set inbound sockets' SO_RCVBUF option")
|
|
(@arg OUTBOUND_SEND_BUFFER_SIZE: --("outbound-send-buffer-size") +takes_value {validator::validate_u32} "Set outbound sockets' SO_SNDBUF option")
|
|
(@arg OUTBOUND_RECV_BUFFER_SIZE: --("outbound-recv-buffer-size") +takes_value {validator::validate_u32} "Set outbound sockets' SO_RCVBUF option")
|
|
);
|
|
|
|
#[cfg(feature = "logging")]
|
|
{
|
|
app = clap_app!(@app (app)
|
|
(@arg VERBOSE: -v ... "Set log level")
|
|
(@arg LOG_WITHOUT_TIME: --("log-without-time") "Log without datetime prefix")
|
|
(@arg LOG_CONFIG: --("log-config") +takes_value "log4rs configuration file")
|
|
);
|
|
}
|
|
|
|
#[cfg(unix)]
|
|
{
|
|
app = clap_app!(@app (app)
|
|
(@arg DAEMONIZE: -d --("daemonize") "Daemonize")
|
|
(@arg DAEMONIZE_PID_PATH: --("daemonize-pid") +takes_value "File path to store daemonized process's PID")
|
|
);
|
|
}
|
|
|
|
#[cfg(any(target_os = "linux", target_os = "android"))]
|
|
{
|
|
app = clap_app!(@app (app)
|
|
(@arg OUTBOUND_BIND_INTERFACE: --("outbound-bind-interface") +takes_value "Set SO_BINDTODEVICE option for outbound socket")
|
|
(@arg OUTBOUND_FWMARK: --("outbound-fwmark") +takes_value {validator::validate_u32} "Set SO_MARK option for outbound socket")
|
|
);
|
|
}
|
|
|
|
#[cfg(any(target_os = "macos", target_os = "ios"))]
|
|
{
|
|
app = clap_app!(@app (app)
|
|
(@arg OUTBOUND_BIND_INTERFACE: --("outbound-bind-interface") +takes_value "Set IP_BOUND_IF option for outbound socket")
|
|
);
|
|
}
|
|
|
|
#[cfg(feature = "multi-threaded")]
|
|
{
|
|
app = clap_app!(@app (app)
|
|
(@arg SINGLE_THREADED: --("single-threaded") "Run the program all in one thread")
|
|
(@arg WORKER_THREADS: --("worker-threads") +takes_value {validator::validate_usize} "Sets the number of worker threads the `Runtime` will use")
|
|
);
|
|
}
|
|
|
|
let matches = app
|
|
.arg(
|
|
Arg::with_name("IPV6_FIRST")
|
|
.short("6")
|
|
.help("Resolve hostname to IPv6 address first"),
|
|
)
|
|
.get_matches();
|
|
|
|
#[cfg(feature = "logging")]
|
|
match matches.value_of("LOG_CONFIG") {
|
|
Some(path) => {
|
|
logging::init_with_file(path);
|
|
}
|
|
None => {
|
|
logging::init_with_config("ssmanager", &matches);
|
|
}
|
|
}
|
|
|
|
let mut config = match matches.value_of("CONFIG") {
|
|
Some(cpath) => match Config::load_from_file(cpath, ConfigType::Manager) {
|
|
Ok(cfg) => cfg,
|
|
Err(err) => {
|
|
panic!("loading config \"{}\", {}", cpath, err);
|
|
}
|
|
},
|
|
None => Config::new(ConfigType::Manager),
|
|
};
|
|
|
|
if let Some(bind_addr) = matches.value_of("BIND_ADDR") {
|
|
let bind_addr = bind_addr.parse::<IpAddr>().expect("bind-addr");
|
|
config.local_addr = Some(bind_addr);
|
|
}
|
|
|
|
if matches.is_present("NO_DELAY") {
|
|
config.no_delay = true;
|
|
}
|
|
|
|
#[cfg(any(target_os = "linux", target_os = "android"))]
|
|
if let Some(mark) = matches.value_of("OUTBOUND_FWMARK") {
|
|
config.outbound_fwmark = Some(mark.parse::<u32>().expect("an unsigned integer for `outbound-fwmark`"));
|
|
}
|
|
|
|
#[cfg(any(target_os = "linux", target_os = "android"))]
|
|
if let Some(iface) = matches.value_of("OUTBOUND_BIND_INTERFACE") {
|
|
config.outbound_bind_interface = Some(From::from(iface.to_owned()));
|
|
}
|
|
|
|
if let Some(m) = matches.value_of("MANAGER_ADDRESS") {
|
|
if let Some(ref mut manager_config) = config.manager {
|
|
manager_config.addr = m.parse::<ManagerAddr>().expect("manager-address");
|
|
} else {
|
|
config.manager = Some(ManagerConfig::new(m.parse::<ManagerAddr>().expect("manager-address")));
|
|
}
|
|
}
|
|
|
|
if let Some(ref mut manager_config) = config.manager {
|
|
if let Some(m) = matches.value_of("ENCRYPT_METHOD") {
|
|
manager_config.method = Some(m.parse::<CipherKind>().expect("encrypt-method"));
|
|
}
|
|
|
|
if let Some(t) = matches.value_of("TIMEOUT") {
|
|
manager_config.timeout = Some(Duration::from_secs(t.parse::<u64>().expect("timeout")));
|
|
}
|
|
|
|
if let Some(sh) = matches.value_of("SERVER_HOST") {
|
|
manager_config.server_host = sh.parse::<ManagerServerHost>().unwrap();
|
|
}
|
|
}
|
|
|
|
// Overrides
|
|
if matches.is_present("UDP_ONLY") {
|
|
if let Some(ref mut m) = config.manager {
|
|
m.mode = m.mode.merge(Mode::UdpOnly);
|
|
}
|
|
}
|
|
|
|
if matches.is_present("TCP_AND_UDP") {
|
|
if let Some(ref mut m) = config.manager {
|
|
m.mode = Mode::TcpAndUdp;
|
|
}
|
|
}
|
|
|
|
if let Some(nofile) = matches.value_of("NOFILE") {
|
|
config.nofile = Some(nofile.parse::<u64>().expect("an unsigned integer for `nofile`"));
|
|
}
|
|
|
|
if let Some(acl_file) = matches.value_of("ACL") {
|
|
let acl = match AccessControl::load_from_file(acl_file) {
|
|
Ok(acl) => acl,
|
|
Err(err) => {
|
|
panic!("loading ACL \"{}\", {}", acl_file, err);
|
|
}
|
|
};
|
|
config.acl = Some(acl);
|
|
}
|
|
|
|
if let Some(dns) = matches.value_of("DNS") {
|
|
config.set_dns_formatted(dns).expect("dns");
|
|
}
|
|
|
|
if matches.is_present("IPV6_FIRST") {
|
|
config.ipv6_first = true;
|
|
}
|
|
|
|
if let Some(bs) = matches.value_of("INBOUND_SEND_BUFFER_SIZE") {
|
|
config.inbound_send_buffer_size = Some(bs.parse::<u32>().expect("inbound-send-buffer-size"));
|
|
}
|
|
if let Some(bs) = matches.value_of("INBOUND_RECV_BUFFER_SIZE") {
|
|
config.inbound_recv_buffer_size = Some(bs.parse::<u32>().expect("inbound-recv-buffer-size"));
|
|
}
|
|
if let Some(bs) = matches.value_of("OUTBOUND_SEND_BUFFER_SIZE") {
|
|
config.outbound_send_buffer_size = Some(bs.parse::<u32>().expect("outbound-send-buffer-size"));
|
|
}
|
|
if let Some(bs) = matches.value_of("OUTBOUND_RECV_BUFFER_SIZE") {
|
|
config.outbound_recv_buffer_size = Some(bs.parse::<u32>().expect("outbound-recv-buffer-size"));
|
|
}
|
|
|
|
// DONE reading options
|
|
|
|
if config.manager.is_none() {
|
|
eprintln!(
|
|
"missing `manager_address`, consider specifying it by --manager-address command line option, \
|
|
or \"manager_address\" and \"manager_port\" keys in configuration file"
|
|
);
|
|
println!("{}", matches.usage());
|
|
return;
|
|
}
|
|
|
|
if let Err(err) = config.check_integrity() {
|
|
eprintln!("config integrity check failed, {}", err);
|
|
println!("{}", matches.usage());
|
|
return;
|
|
}
|
|
|
|
#[cfg(unix)]
|
|
if matches.is_present("DAEMONIZE") {
|
|
use self::common::daemonize;
|
|
daemonize::daemonize(matches.value_of("DAEMONIZE_PID_PATH"));
|
|
}
|
|
|
|
info!("shadowsocks {}", VERSION);
|
|
|
|
#[cfg(feature = "multi-threaded")]
|
|
let mut builder = if matches.is_present("SINGLE_THREADED") {
|
|
Builder::new_current_thread()
|
|
} else {
|
|
let mut builder = Builder::new_multi_thread();
|
|
if let Some(worker_threads) = matches.value_of("WORKER_THREADS") {
|
|
builder.worker_threads(worker_threads.parse::<usize>().expect("worker-threads"));
|
|
}
|
|
builder
|
|
};
|
|
#[cfg(not(feature = "multi-threaded"))]
|
|
let mut builder = Builder::new_current_thread();
|
|
|
|
let runtime = builder.enable_all().build().expect("create tokio Runtime");
|
|
runtime.block_on(async move {
|
|
let abort_signal = monitor::create_signal_monitor();
|
|
let server = run_manager(config);
|
|
|
|
tokio::pin!(abort_signal);
|
|
tokio::pin!(server);
|
|
|
|
match future::select(server, abort_signal).await {
|
|
// Server future resolved without an error. This should never happen.
|
|
Either::Left((Ok(..), ..)) => panic!("server exited unexpectly"),
|
|
// Server future resolved with error, which are listener errors in most cases
|
|
Either::Left((Err(err), ..)) => panic!("aborted with {}", err),
|
|
// The abort signal future resolved. Means we should just exit.
|
|
Either::Right(_) => (),
|
|
}
|
|
});
|
|
}
|