doc: add some info for websocket

This commit is contained in:
nadoo 2018-07-22 20:02:50 +08:00
parent bb45b671c0
commit 068e4df8fc
4 changed files with 45 additions and 3 deletions

View File

@ -32,6 +32,7 @@ Forward (local proxy client/upstream proxy server):
- SSR proxy(tcp) - SSR proxy(tcp)
- VMess proxy(tcp) - VMess proxy(tcp)
- TLS, use it together with above proxy protocols(tcp) - TLS, use it together with above proxy protocols(tcp)
- Websocket, use it together with above proxy protocols(tcp)
DNS Forwarding Server (udp2tcp): DNS Forwarding Server (udp2tcp):
- Listen on UDP and forward dns requests to remote dns server in TCP via forwarders - Listen on UDP and forward dns requests to remote dns server in TCP via forwarders
@ -91,7 +92,7 @@ glider -config CONFIGPATH -listen :8080 -verbose
## Usage ## Usage
```bash ```bash
glider v0.6.2 usage: glider v0.6.3 usage:
-checkduration int -checkduration int
proxy check duration(seconds) (default 30) proxy check duration(seconds) (default 30)
-checkwebsite string -checkwebsite string
@ -132,7 +133,7 @@ Available Schemes:
Available schemes for different modes: Available schemes for different modes:
listen: mixed ss socks5 http redir tcptun udptun uottun dnstun listen: mixed ss socks5 http redir tcptun udptun uottun dnstun
forward: ss socks5 http ssr vmess forward: ss socks5 http ssr vmess tls ws
SS scheme: SS scheme:
ss://method:pass@host:port ss://method:pass@host:port
@ -159,6 +160,21 @@ TLS with a specified proxy protocol:
tls://host:port[?skipVerify=true],socks5://[user:pass@] tls://host:port[?skipVerify=true],socks5://[user:pass@]
tls://host:port[?skipVerify=true],vmess://[security:]uuid@?alterID=num tls://host:port[?skipVerify=true],vmess://[security:]uuid@?alterID=num
Websocket scheme:
ws://host:port[/path]
Websocket with a specified proxy protocol:
ws://host:port[/path],proxy://scheme
ws://host:port[/path],http://[user:pass@]
ws://host:port[/path],socks5://[user:pass@]
ws://host:port[/path],vmess://[security:]uuid@?alterID=num
TLS and Websocket with a specified proxy protocol:
tls://host:port[?skipVerify=true],ws://[@/path],proxy://scheme
tls://host:port[?skipVerify=true],ws://[@/path],http://[user:pass@]
tls://host:port[?skipVerify=true],ws://[@/path],socks5://[user:pass@]
tls://host:port[?skipVerify=true],ws://[@/path],vmess://[security:]uuid@?alterID=num
Available forward strategies: Available forward strategies:
rr: Round Robin mode rr: Round Robin mode
ha: High Availability mode ha: High Availability mode

20
conf.go
View File

@ -171,7 +171,7 @@ func usage() {
fmt.Fprintf(os.Stderr, "Available schemes for different modes:\n") fmt.Fprintf(os.Stderr, "Available schemes for different modes:\n")
fmt.Fprintf(os.Stderr, " listen: mixed ss socks5 http redir tcptun udptun uottun dnstun\n") fmt.Fprintf(os.Stderr, " listen: mixed ss socks5 http redir tcptun udptun uottun dnstun\n")
fmt.Fprintf(os.Stderr, " forward: ss socks5 http ssr vmess\n") fmt.Fprintf(os.Stderr, " forward: ss socks5 http ssr vmess tls ws\n")
fmt.Fprintf(os.Stderr, "\n") fmt.Fprintf(os.Stderr, "\n")
fmt.Fprintf(os.Stderr, "SS scheme:\n") fmt.Fprintf(os.Stderr, "SS scheme:\n")
@ -207,6 +207,24 @@ func usage() {
fmt.Fprintf(os.Stderr, " tls://host:port[?skipVerify=true],vmess://[security:]uuid@?alterID=num\n") fmt.Fprintf(os.Stderr, " tls://host:port[?skipVerify=true],vmess://[security:]uuid@?alterID=num\n")
fmt.Fprintf(os.Stderr, "\n") fmt.Fprintf(os.Stderr, "\n")
fmt.Fprintf(os.Stderr, "Websocket scheme:\n")
fmt.Fprintf(os.Stderr, " ws://host:port[/path]\n")
fmt.Fprintf(os.Stderr, "\n")
fmt.Fprintf(os.Stderr, "Websocket with a specified proxy protocol:\n")
fmt.Fprintf(os.Stderr, " ws://host:port[/path],proxy://scheme\n")
fmt.Fprintf(os.Stderr, " ws://host:port[/path],http://[user:pass@]\n")
fmt.Fprintf(os.Stderr, " ws://host:port[/path],socks5://[user:pass@]\n")
fmt.Fprintf(os.Stderr, " ws://host:port[/path],vmess://[security:]uuid@?alterID=num\n")
fmt.Fprintf(os.Stderr, "\n")
fmt.Fprintf(os.Stderr, "TLS and Websocket with a specified proxy protocol:\n")
fmt.Fprintf(os.Stderr, " tls://host:port[?skipVerify=true],ws://[@/path],proxy://scheme\n")
fmt.Fprintf(os.Stderr, " tls://host:port[?skipVerify=true],ws://[@/path],http://[user:pass@]\n")
fmt.Fprintf(os.Stderr, " tls://host:port[?skipVerify=true],ws://[@/path],socks5://[user:pass@]\n")
fmt.Fprintf(os.Stderr, " tls://host:port[?skipVerify=true],ws://[@/path],vmess://[security:]uuid@?alterID=num\n")
fmt.Fprintf(os.Stderr, "\n")
fmt.Fprintf(os.Stderr, "Available forward strategies:\n") fmt.Fprintf(os.Stderr, "Available forward strategies:\n")
fmt.Fprintf(os.Stderr, " rr: Round Robin mode\n") fmt.Fprintf(os.Stderr, " rr: Round Robin mode\n")
fmt.Fprintf(os.Stderr, " ha: High Availability mode\n") fmt.Fprintf(os.Stderr, " ha: High Availability mode\n")

View File

@ -83,6 +83,12 @@ listen=socks5://:1080
# vmess proxy with tls as forwarder # vmess proxy with tls as forwarder
# forward=tls://1.1.1.1:443,vmess://security:5a146038-0b56-4e95-b1dc-5c6f5a32cd98@?alterID=2 # forward=tls://1.1.1.1:443,vmess://security:5a146038-0b56-4e95-b1dc-5c6f5a32cd98@?alterID=2
# vmess proxy with ws as forwarder
# forward=ws://1.1.1.1:80,vmess://security:5a146038-0b56-4e95-b1dc-5c6f5a32cd98@?alterID=2
# vmess proxy with ws and tls as forwarder
# forward=tls://1.1.1.1:443,ws://,vmess://security:5a146038-0b56-4e95-b1dc-5c6f5a32cd98@?alterID=2
# forward=tls://1.1.1.1:443,ws://@path,vmess://security:5a146038-0b56-4e95-b1dc-5c6f5a32cd98@?alterID=2
# FORWARDER CHAIN # FORWARDER CHAIN
# --------------- # ---------------

View File

@ -1,3 +1,5 @@
//+build dev
package main package main
import ( import (