Shadowsocks manager of multiple servers, providing simple and easy way for users to acquire shadowsocks services over regions of servers and advanced tools for operators to manage the servers.
NOTIFICATION After commit ca33594, slave's managed dir changes to $HOME/.ssmgr, refer to #23 if you want to do a migration.
First of all, install the dependent tools.
For mac users,
brew install go node protobuf
For ubuntu/debian users, install golang toolchain (>=1.7) and
sudo add-apt-repository ppa:maarten-fonville/protobuf
curl -sL https://deb.nodesource.com/setup_8.x | sudo -E bash -
sudo apt update
sudo apt install nodejs protobuf-compiler
Then,
# Install protobuf go plugin
go get -u github.com/golang/protobuf/protoc-gen-go
# And make sure that protoc-gen-go is in
# your env $PATH so that protoc can find and use it, such as
# export PATH=$PATH:$(go env GOPATH)/bin
make all
[NOTE] install
is only supported on linux with systemd.
[NOTE] If you want to enable TLS, you should modify the env and config files and specify your certificates. For more details about generating self-signed certificates, please see Generate Self-signed Certificates.
Before install ssmgr, install shadowsocks-libev first.
sudo apt install shadowsocks-libev
To install it completely (binaries and systemd services),
# Install to /usr/local/ssmgr/*, /etc/default/ssmgr.{master/slave},
# /lib/systemd/system/ssmgr-{master/slave}.service and /etc/ssmgr/*
sudo make install
Or you can install master/slave seperately,
# Master
sudo make install-master
# Slave
sudo make install-slave
Enable TLS to secure the communication between master and slaves.
TLS on Slave
Add "tls" field to config.json file.
{
"port": 6001,
"manager_port": 6001,
"token": "SSMGRTEST",
"tls": {
"cert_file": "testdata/certs/server.crt",
"key_file": "testdata/certs/server.key"
}
}
TLS on Master
Specify CA X.509 file when you start the master.
master -w frontend -c config.json -ca path/to/ca.pem
Generate CA key and PEM file if you do not have one:
openssl genrsa -out ca.key 2048
openssl req -x509 -new -nodes -key ca.key -sha256 -days 3650 -out ca.pem
Then, using script gssc
to generate these certificates.
./tools/gssc --ip SLAVE_IP --ca CA_DIR
This will generate a 2048 bits key and a certificate whose expiry is 365 days in current directory.
For more details of gssc
, please see
./tools/gssc -h
We implement a hook of logrus to send some levels of logs to slack channel. This helps developers to monitor servers and to develop ChatOps in the future.
Slack logs is only supported on master. To enable it, add the "slack" field to config.json file,
{
"...": "...",
"slack": {
"channel": "#SLACK_CHANNEL",
"token": "TEST_SLACK_TOKEN",
"levels": [
"panic",
"fatal",
"error",
"warn",
"info",
"debug"
]
}
}
where token is the application token and levels are the logrus levels to send.
- Issues here with
bug
tags. - Can not debug on master because it imports a library with native C codes (go-sqlite3).
Licensed under GPL v3.