├── .gitignore
├── .travis.yml
├── LICENSE
├── README.md
├── cacert.pem
├── ip.go
├── main.go
├── main.json
├── tools
└── tools.go
└── utils.go
/.gitignore:
--------------------------------------------------------------------------------
1 | # Compiled Object files, Static and Dynamic libs (Shared Objects)
2 | *.o
3 | *.a
4 | *.so
5 |
6 | # Folders
7 | _obj
8 | _test
9 | _out
10 |
11 | # Architecture specific extensions/prefixes
12 | *.[568vq]
13 | [568vq].out
14 |
15 | *.cgo1.go
16 | *.cgo2.c
17 | _cgo_defun.c
18 | _cgo_gotypes.go
19 | _cgo_export.*
20 |
21 | _testmain.go
22 |
23 | *.exe
24 | *.test
25 | *.prof
26 |
27 | *tmp*
28 | *.txt
29 |
--------------------------------------------------------------------------------
/.travis.yml:
--------------------------------------------------------------------------------
1 | language: go
2 |
3 | go:
4 | - 1.8
5 | - 1.9
6 | - tip
7 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | GNU AFFERO GENERAL PUBLIC LICENSE
2 | Version 3, 19 November 2007
3 |
4 | Copyright (C) 2007 Free Software Foundation, Inc.
5 | Everyone is permitted to copy and distribute verbatim copies
6 | of this license document, but changing it is not allowed.
7 |
8 | Preamble
9 |
10 | The GNU Affero General Public License is a free, copyleft license for
11 | software and other kinds of works, specifically designed to ensure
12 | cooperation with the community in the case of network server software.
13 |
14 | The licenses for most software and other practical works are designed
15 | to take away your freedom to share and change the works. By contrast,
16 | our General Public Licenses are intended to guarantee your freedom to
17 | share and change all versions of a program--to make sure it remains free
18 | software for all its users.
19 |
20 | When we speak of free software, we are referring to freedom, not
21 | price. Our General Public Licenses are designed to make sure that you
22 | have the freedom to distribute copies of free software (and charge for
23 | them if you wish), that you receive source code or can get it if you
24 | want it, that you can change the software or use pieces of it in new
25 | free programs, and that you know you can do these things.
26 |
27 | Developers that use our General Public Licenses protect your rights
28 | with two steps: (1) assert copyright on the software, and (2) offer
29 | you this License which gives you legal permission to copy, distribute
30 | and/or modify the software.
31 |
32 | A secondary benefit of defending all users' freedom is that
33 | improvements made in alternate versions of the program, if they
34 | receive widespread use, become available for other developers to
35 | incorporate. Many developers of free software are heartened and
36 | encouraged by the resulting cooperation. However, in the case of
37 | software used on network servers, this result may fail to come about.
38 | The GNU General Public License permits making a modified version and
39 | letting the public access it on a server without ever releasing its
40 | source code to the public.
41 |
42 | The GNU Affero General Public License is designed specifically to
43 | ensure that, in such cases, the modified source code becomes available
44 | to the community. It requires the operator of a network server to
45 | provide the source code of the modified version running there to the
46 | users of that server. Therefore, public use of a modified version, on
47 | a publicly accessible server, gives the public access to the source
48 | code of the modified version.
49 |
50 | An older license, called the Affero General Public License and
51 | published by Affero, was designed to accomplish similar goals. This is
52 | a different license, not a version of the Affero GPL, but Affero has
53 | released a new version of the Affero GPL which permits relicensing under
54 | this license.
55 |
56 | The precise terms and conditions for copying, distribution and
57 | modification follow.
58 |
59 | TERMS AND CONDITIONS
60 |
61 | 0. Definitions.
62 |
63 | "This License" refers to version 3 of the GNU Affero General Public License.
64 |
65 | "Copyright" also means copyright-like laws that apply to other kinds of
66 | works, such as semiconductor masks.
67 |
68 | "The Program" refers to any copyrightable work licensed under this
69 | License. Each licensee is addressed as "you". "Licensees" and
70 | "recipients" may be individuals or organizations.
71 |
72 | To "modify" a work means to copy from or adapt all or part of the work
73 | in a fashion requiring copyright permission, other than the making of an
74 | exact copy. The resulting work is called a "modified version" of the
75 | earlier work or a work "based on" the earlier work.
76 |
77 | A "covered work" means either the unmodified Program or a work based
78 | on the Program.
79 |
80 | To "propagate" a work means to do anything with it that, without
81 | permission, would make you directly or secondarily liable for
82 | infringement under applicable copyright law, except executing it on a
83 | computer or modifying a private copy. Propagation includes copying,
84 | distribution (with or without modification), making available to the
85 | public, and in some countries other activities as well.
86 |
87 | To "convey" a work means any kind of propagation that enables other
88 | parties to make or receive copies. Mere interaction with a user through
89 | a computer network, with no transfer of a copy, is not conveying.
90 |
91 | An interactive user interface displays "Appropriate Legal Notices"
92 | to the extent that it includes a convenient and prominently visible
93 | feature that (1) displays an appropriate copyright notice, and (2)
94 | tells the user that there is no warranty for the work (except to the
95 | extent that warranties are provided), that licensees may convey the
96 | work under this License, and how to view a copy of this License. If
97 | the interface presents a list of user commands or options, such as a
98 | menu, a prominent item in the list meets this criterion.
99 |
100 | 1. Source Code.
101 |
102 | The "source code" for a work means the preferred form of the work
103 | for making modifications to it. "Object code" means any non-source
104 | form of a work.
105 |
106 | A "Standard Interface" means an interface that either is an official
107 | standard defined by a recognized standards body, or, in the case of
108 | interfaces specified for a particular programming language, one that
109 | is widely used among developers working in that language.
110 |
111 | The "System Libraries" of an executable work include anything, other
112 | than the work as a whole, that (a) is included in the normal form of
113 | packaging a Major Component, but which is not part of that Major
114 | Component, and (b) serves only to enable use of the work with that
115 | Major Component, or to implement a Standard Interface for which an
116 | implementation is available to the public in source code form. A
117 | "Major Component", in this context, means a major essential component
118 | (kernel, window system, and so on) of the specific operating system
119 | (if any) on which the executable work runs, or a compiler used to
120 | produce the work, or an object code interpreter used to run it.
121 |
122 | The "Corresponding Source" for a work in object code form means all
123 | the source code needed to generate, install, and (for an executable
124 | work) run the object code and to modify the work, including scripts to
125 | control those activities. However, it does not include the work's
126 | System Libraries, or general-purpose tools or generally available free
127 | programs which are used unmodified in performing those activities but
128 | which are not part of the work. For example, Corresponding Source
129 | includes interface definition files associated with source files for
130 | the work, and the source code for shared libraries and dynamically
131 | linked subprograms that the work is specifically designed to require,
132 | such as by intimate data communication or control flow between those
133 | subprograms and other parts of the work.
134 |
135 | The Corresponding Source need not include anything that users
136 | can regenerate automatically from other parts of the Corresponding
137 | Source.
138 |
139 | The Corresponding Source for a work in source code form is that
140 | same work.
141 |
142 | 2. Basic Permissions.
143 |
144 | All rights granted under this License are granted for the term of
145 | copyright on the Program, and are irrevocable provided the stated
146 | conditions are met. This License explicitly affirms your unlimited
147 | permission to run the unmodified Program. The output from running a
148 | covered work is covered by this License only if the output, given its
149 | content, constitutes a covered work. This License acknowledges your
150 | rights of fair use or other equivalent, as provided by copyright law.
151 |
152 | You may make, run and propagate covered works that you do not
153 | convey, without conditions so long as your license otherwise remains
154 | in force. You may convey covered works to others for the sole purpose
155 | of having them make modifications exclusively for you, or provide you
156 | with facilities for running those works, provided that you comply with
157 | the terms of this License in conveying all material for which you do
158 | not control copyright. Those thus making or running the covered works
159 | for you must do so exclusively on your behalf, under your direction
160 | and control, on terms that prohibit them from making any copies of
161 | your copyrighted material outside their relationship with you.
162 |
163 | Conveying under any other circumstances is permitted solely under
164 | the conditions stated below. Sublicensing is not allowed; section 10
165 | makes it unnecessary.
166 |
167 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
168 |
169 | No covered work shall be deemed part of an effective technological
170 | measure under any applicable law fulfilling obligations under article
171 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or
172 | similar laws prohibiting or restricting circumvention of such
173 | measures.
174 |
175 | When you convey a covered work, you waive any legal power to forbid
176 | circumvention of technological measures to the extent such circumvention
177 | is effected by exercising rights under this License with respect to
178 | the covered work, and you disclaim any intention to limit operation or
179 | modification of the work as a means of enforcing, against the work's
180 | users, your or third parties' legal rights to forbid circumvention of
181 | technological measures.
182 |
183 | 4. Conveying Verbatim Copies.
184 |
185 | You may convey verbatim copies of the Program's source code as you
186 | receive it, in any medium, provided that you conspicuously and
187 | appropriately publish on each copy an appropriate copyright notice;
188 | keep intact all notices stating that this License and any
189 | non-permissive terms added in accord with section 7 apply to the code;
190 | keep intact all notices of the absence of any warranty; and give all
191 | recipients a copy of this License along with the Program.
192 |
193 | You may charge any price or no price for each copy that you convey,
194 | and you may offer support or warranty protection for a fee.
195 |
196 | 5. Conveying Modified Source Versions.
197 |
198 | You may convey a work based on the Program, or the modifications to
199 | produce it from the Program, in the form of source code under the
200 | terms of section 4, provided that you also meet all of these conditions:
201 |
202 | a) The work must carry prominent notices stating that you modified
203 | it, and giving a relevant date.
204 |
205 | b) The work must carry prominent notices stating that it is
206 | released under this License and any conditions added under section
207 | 7. This requirement modifies the requirement in section 4 to
208 | "keep intact all notices".
209 |
210 | c) You must license the entire work, as a whole, under this
211 | License to anyone who comes into possession of a copy. This
212 | License will therefore apply, along with any applicable section 7
213 | additional terms, to the whole of the work, and all its parts,
214 | regardless of how they are packaged. This License gives no
215 | permission to license the work in any other way, but it does not
216 | invalidate such permission if you have separately received it.
217 |
218 | d) If the work has interactive user interfaces, each must display
219 | Appropriate Legal Notices; however, if the Program has interactive
220 | interfaces that do not display Appropriate Legal Notices, your
221 | work need not make them do so.
222 |
223 | A compilation of a covered work with other separate and independent
224 | works, which are not by their nature extensions of the covered work,
225 | and which are not combined with it such as to form a larger program,
226 | in or on a volume of a storage or distribution medium, is called an
227 | "aggregate" if the compilation and its resulting copyright are not
228 | used to limit the access or legal rights of the compilation's users
229 | beyond what the individual works permit. Inclusion of a covered work
230 | in an aggregate does not cause this License to apply to the other
231 | parts of the aggregate.
232 |
233 | 6. Conveying Non-Source Forms.
234 |
235 | You may convey a covered work in object code form under the terms
236 | of sections 4 and 5, provided that you also convey the
237 | machine-readable Corresponding Source under the terms of this License,
238 | in one of these ways:
239 |
240 | a) Convey the object code in, or embodied in, a physical product
241 | (including a physical distribution medium), accompanied by the
242 | Corresponding Source fixed on a durable physical medium
243 | customarily used for software interchange.
244 |
245 | b) Convey the object code in, or embodied in, a physical product
246 | (including a physical distribution medium), accompanied by a
247 | written offer, valid for at least three years and valid for as
248 | long as you offer spare parts or customer support for that product
249 | model, to give anyone who possesses the object code either (1) a
250 | copy of the Corresponding Source for all the software in the
251 | product that is covered by this License, on a durable physical
252 | medium customarily used for software interchange, for a price no
253 | more than your reasonable cost of physically performing this
254 | conveying of source, or (2) access to copy the
255 | Corresponding Source from a network server at no charge.
256 |
257 | c) Convey individual copies of the object code with a copy of the
258 | written offer to provide the Corresponding Source. This
259 | alternative is allowed only occasionally and noncommercially, and
260 | only if you received the object code with such an offer, in accord
261 | with subsection 6b.
262 |
263 | d) Convey the object code by offering access from a designated
264 | place (gratis or for a charge), and offer equivalent access to the
265 | Corresponding Source in the same way through the same place at no
266 | further charge. You need not require recipients to copy the
267 | Corresponding Source along with the object code. If the place to
268 | copy the object code is a network server, the Corresponding Source
269 | may be on a different server (operated by you or a third party)
270 | that supports equivalent copying facilities, provided you maintain
271 | clear directions next to the object code saying where to find the
272 | Corresponding Source. Regardless of what server hosts the
273 | Corresponding Source, you remain obligated to ensure that it is
274 | available for as long as needed to satisfy these requirements.
275 |
276 | e) Convey the object code using peer-to-peer transmission, provided
277 | you inform other peers where the object code and Corresponding
278 | Source of the work are being offered to the general public at no
279 | charge under subsection 6d.
280 |
281 | A separable portion of the object code, whose source code is excluded
282 | from the Corresponding Source as a System Library, need not be
283 | included in conveying the object code work.
284 |
285 | A "User Product" is either (1) a "consumer product", which means any
286 | tangible personal property which is normally used for personal, family,
287 | or household purposes, or (2) anything designed or sold for incorporation
288 | into a dwelling. In determining whether a product is a consumer product,
289 | doubtful cases shall be resolved in favor of coverage. For a particular
290 | product received by a particular user, "normally used" refers to a
291 | typical or common use of that class of product, regardless of the status
292 | of the particular user or of the way in which the particular user
293 | actually uses, or expects or is expected to use, the product. A product
294 | is a consumer product regardless of whether the product has substantial
295 | commercial, industrial or non-consumer uses, unless such uses represent
296 | the only significant mode of use of the product.
297 |
298 | "Installation Information" for a User Product means any methods,
299 | procedures, authorization keys, or other information required to install
300 | and execute modified versions of a covered work in that User Product from
301 | a modified version of its Corresponding Source. The information must
302 | suffice to ensure that the continued functioning of the modified object
303 | code is in no case prevented or interfered with solely because
304 | modification has been made.
305 |
306 | If you convey an object code work under this section in, or with, or
307 | specifically for use in, a User Product, and the conveying occurs as
308 | part of a transaction in which the right of possession and use of the
309 | User Product is transferred to the recipient in perpetuity or for a
310 | fixed term (regardless of how the transaction is characterized), the
311 | Corresponding Source conveyed under this section must be accompanied
312 | by the Installation Information. But this requirement does not apply
313 | if neither you nor any third party retains the ability to install
314 | modified object code on the User Product (for example, the work has
315 | been installed in ROM).
316 |
317 | The requirement to provide Installation Information does not include a
318 | requirement to continue to provide support service, warranty, or updates
319 | for a work that has been modified or installed by the recipient, or for
320 | the User Product in which it has been modified or installed. Access to a
321 | network may be denied when the modification itself materially and
322 | adversely affects the operation of the network or violates the rules and
323 | protocols for communication across the network.
324 |
325 | Corresponding Source conveyed, and Installation Information provided,
326 | in accord with this section must be in a format that is publicly
327 | documented (and with an implementation available to the public in
328 | source code form), and must require no special password or key for
329 | unpacking, reading or copying.
330 |
331 | 7. Additional Terms.
332 |
333 | "Additional permissions" are terms that supplement the terms of this
334 | License by making exceptions from one or more of its conditions.
335 | Additional permissions that are applicable to the entire Program shall
336 | be treated as though they were included in this License, to the extent
337 | that they are valid under applicable law. If additional permissions
338 | apply only to part of the Program, that part may be used separately
339 | under those permissions, but the entire Program remains governed by
340 | this License without regard to the additional permissions.
341 |
342 | When you convey a copy of a covered work, you may at your option
343 | remove any additional permissions from that copy, or from any part of
344 | it. (Additional permissions may be written to require their own
345 | removal in certain cases when you modify the work.) You may place
346 | additional permissions on material, added by you to a covered work,
347 | for which you have or can give appropriate copyright permission.
348 |
349 | Notwithstanding any other provision of this License, for material you
350 | add to a covered work, you may (if authorized by the copyright holders of
351 | that material) supplement the terms of this License with terms:
352 |
353 | a) Disclaiming warranty or limiting liability differently from the
354 | terms of sections 15 and 16 of this License; or
355 |
356 | b) Requiring preservation of specified reasonable legal notices or
357 | author attributions in that material or in the Appropriate Legal
358 | Notices displayed by works containing it; or
359 |
360 | c) Prohibiting misrepresentation of the origin of that material, or
361 | requiring that modified versions of such material be marked in
362 | reasonable ways as different from the original version; or
363 |
364 | d) Limiting the use for publicity purposes of names of licensors or
365 | authors of the material; or
366 |
367 | e) Declining to grant rights under trademark law for use of some
368 | trade names, trademarks, or service marks; or
369 |
370 | f) Requiring indemnification of licensors and authors of that
371 | material by anyone who conveys the material (or modified versions of
372 | it) with contractual assumptions of liability to the recipient, for
373 | any liability that these contractual assumptions directly impose on
374 | those licensors and authors.
375 |
376 | All other non-permissive additional terms are considered "further
377 | restrictions" within the meaning of section 10. If the Program as you
378 | received it, or any part of it, contains a notice stating that it is
379 | governed by this License along with a term that is a further
380 | restriction, you may remove that term. If a license document contains
381 | a further restriction but permits relicensing or conveying under this
382 | License, you may add to a covered work material governed by the terms
383 | of that license document, provided that the further restriction does
384 | not survive such relicensing or conveying.
385 |
386 | If you add terms to a covered work in accord with this section, you
387 | must place, in the relevant source files, a statement of the
388 | additional terms that apply to those files, or a notice indicating
389 | where to find the applicable terms.
390 |
391 | Additional terms, permissive or non-permissive, may be stated in the
392 | form of a separately written license, or stated as exceptions;
393 | the above requirements apply either way.
394 |
395 | 8. Termination.
396 |
397 | You may not propagate or modify a covered work except as expressly
398 | provided under this License. Any attempt otherwise to propagate or
399 | modify it is void, and will automatically terminate your rights under
400 | this License (including any patent licenses granted under the third
401 | paragraph of section 11).
402 |
403 | However, if you cease all violation of this License, then your
404 | license from a particular copyright holder is reinstated (a)
405 | provisionally, unless and until the copyright holder explicitly and
406 | finally terminates your license, and (b) permanently, if the copyright
407 | holder fails to notify you of the violation by some reasonable means
408 | prior to 60 days after the cessation.
409 |
410 | Moreover, your license from a particular copyright holder is
411 | reinstated permanently if the copyright holder notifies you of the
412 | violation by some reasonable means, this is the first time you have
413 | received notice of violation of this License (for any work) from that
414 | copyright holder, and you cure the violation prior to 30 days after
415 | your receipt of the notice.
416 |
417 | Termination of your rights under this section does not terminate the
418 | licenses of parties who have received copies or rights from you under
419 | this License. If your rights have been terminated and not permanently
420 | reinstated, you do not qualify to receive new licenses for the same
421 | material under section 10.
422 |
423 | 9. Acceptance Not Required for Having Copies.
424 |
425 | You are not required to accept this License in order to receive or
426 | run a copy of the Program. Ancillary propagation of a covered work
427 | occurring solely as a consequence of using peer-to-peer transmission
428 | to receive a copy likewise does not require acceptance. However,
429 | nothing other than this License grants you permission to propagate or
430 | modify any covered work. These actions infringe copyright if you do
431 | not accept this License. Therefore, by modifying or propagating a
432 | covered work, you indicate your acceptance of this License to do so.
433 |
434 | 10. Automatic Licensing of Downstream Recipients.
435 |
436 | Each time you convey a covered work, the recipient automatically
437 | receives a license from the original licensors, to run, modify and
438 | propagate that work, subject to this License. You are not responsible
439 | for enforcing compliance by third parties with this License.
440 |
441 | An "entity transaction" is a transaction transferring control of an
442 | organization, or substantially all assets of one, or subdividing an
443 | organization, or merging organizations. If propagation of a covered
444 | work results from an entity transaction, each party to that
445 | transaction who receives a copy of the work also receives whatever
446 | licenses to the work the party's predecessor in interest had or could
447 | give under the previous paragraph, plus a right to possession of the
448 | Corresponding Source of the work from the predecessor in interest, if
449 | the predecessor has it or can get it with reasonable efforts.
450 |
451 | You may not impose any further restrictions on the exercise of the
452 | rights granted or affirmed under this License. For example, you may
453 | not impose a license fee, royalty, or other charge for exercise of
454 | rights granted under this License, and you may not initiate litigation
455 | (including a cross-claim or counterclaim in a lawsuit) alleging that
456 | any patent claim is infringed by making, using, selling, offering for
457 | sale, or importing the Program or any portion of it.
458 |
459 | 11. Patents.
460 |
461 | A "contributor" is a copyright holder who authorizes use under this
462 | License of the Program or a work on which the Program is based. The
463 | work thus licensed is called the contributor's "contributor version".
464 |
465 | A contributor's "essential patent claims" are all patent claims
466 | owned or controlled by the contributor, whether already acquired or
467 | hereafter acquired, that would be infringed by some manner, permitted
468 | by this License, of making, using, or selling its contributor version,
469 | but do not include claims that would be infringed only as a
470 | consequence of further modification of the contributor version. For
471 | purposes of this definition, "control" includes the right to grant
472 | patent sublicenses in a manner consistent with the requirements of
473 | this License.
474 |
475 | Each contributor grants you a non-exclusive, worldwide, royalty-free
476 | patent license under the contributor's essential patent claims, to
477 | make, use, sell, offer for sale, import and otherwise run, modify and
478 | propagate the contents of its contributor version.
479 |
480 | In the following three paragraphs, a "patent license" is any express
481 | agreement or commitment, however denominated, not to enforce a patent
482 | (such as an express permission to practice a patent or covenant not to
483 | sue for patent infringement). To "grant" such a patent license to a
484 | party means to make such an agreement or commitment not to enforce a
485 | patent against the party.
486 |
487 | If you convey a covered work, knowingly relying on a patent license,
488 | and the Corresponding Source of the work is not available for anyone
489 | to copy, free of charge and under the terms of this License, through a
490 | publicly available network server or other readily accessible means,
491 | then you must either (1) cause the Corresponding Source to be so
492 | available, or (2) arrange to deprive yourself of the benefit of the
493 | patent license for this particular work, or (3) arrange, in a manner
494 | consistent with the requirements of this License, to extend the patent
495 | license to downstream recipients. "Knowingly relying" means you have
496 | actual knowledge that, but for the patent license, your conveying the
497 | covered work in a country, or your recipient's use of the covered work
498 | in a country, would infringe one or more identifiable patents in that
499 | country that you have reason to believe are valid.
500 |
501 | If, pursuant to or in connection with a single transaction or
502 | arrangement, you convey, or propagate by procuring conveyance of, a
503 | covered work, and grant a patent license to some of the parties
504 | receiving the covered work authorizing them to use, propagate, modify
505 | or convey a specific copy of the covered work, then the patent license
506 | you grant is automatically extended to all recipients of the covered
507 | work and works based on it.
508 |
509 | A patent license is "discriminatory" if it does not include within
510 | the scope of its coverage, prohibits the exercise of, or is
511 | conditioned on the non-exercise of one or more of the rights that are
512 | specifically granted under this License. You may not convey a covered
513 | work if you are a party to an arrangement with a third party that is
514 | in the business of distributing software, under which you make payment
515 | to the third party based on the extent of your activity of conveying
516 | the work, and under which the third party grants, to any of the
517 | parties who would receive the covered work from you, a discriminatory
518 | patent license (a) in connection with copies of the covered work
519 | conveyed by you (or copies made from those copies), or (b) primarily
520 | for and in connection with specific products or compilations that
521 | contain the covered work, unless you entered into that arrangement,
522 | or that patent license was granted, prior to 28 March 2007.
523 |
524 | Nothing in this License shall be construed as excluding or limiting
525 | any implied license or other defenses to infringement that may
526 | otherwise be available to you under applicable patent law.
527 |
528 | 12. No Surrender of Others' Freedom.
529 |
530 | If conditions are imposed on you (whether by court order, agreement or
531 | otherwise) that contradict the conditions of this License, they do not
532 | excuse you from the conditions of this License. If you cannot convey a
533 | covered work so as to satisfy simultaneously your obligations under this
534 | License and any other pertinent obligations, then as a consequence you may
535 | not convey it at all. For example, if you agree to terms that obligate you
536 | to collect a royalty for further conveying from those to whom you convey
537 | the Program, the only way you could satisfy both those terms and this
538 | License would be to refrain entirely from conveying the Program.
539 |
540 | 13. Remote Network Interaction; Use with the GNU General Public License.
541 |
542 | Notwithstanding any other provision of this License, if you modify the
543 | Program, your modified version must prominently offer all users
544 | interacting with it remotely through a computer network (if your version
545 | supports such interaction) an opportunity to receive the Corresponding
546 | Source of your version by providing access to the Corresponding Source
547 | from a network server at no charge, through some standard or customary
548 | means of facilitating copying of software. This Corresponding Source
549 | shall include the Corresponding Source for any work covered by version 3
550 | of the GNU General Public License that is incorporated pursuant to the
551 | following paragraph.
552 |
553 | Notwithstanding any other provision of this License, you have
554 | permission to link or combine any covered work with a work licensed
555 | under version 3 of the GNU General Public License into a single
556 | combined work, and to convey the resulting work. The terms of this
557 | License will continue to apply to the part which is the covered work,
558 | but the work with which it is combined will remain governed by version
559 | 3 of the GNU General Public License.
560 |
561 | 14. Revised Versions of this License.
562 |
563 | The Free Software Foundation may publish revised and/or new versions of
564 | the GNU Affero General Public License from time to time. Such new versions
565 | will be similar in spirit to the present version, but may differ in detail to
566 | address new problems or concerns.
567 |
568 | Each version is given a distinguishing version number. If the
569 | Program specifies that a certain numbered version of the GNU Affero General
570 | Public License "or any later version" applies to it, you have the
571 | option of following the terms and conditions either of that numbered
572 | version or of any later version published by the Free Software
573 | Foundation. If the Program does not specify a version number of the
574 | GNU Affero General Public License, you may choose any version ever published
575 | by the Free Software Foundation.
576 |
577 | If the Program specifies that a proxy can decide which future
578 | versions of the GNU Affero General Public License can be used, that proxy's
579 | public statement of acceptance of a version permanently authorizes you
580 | to choose that version for the Program.
581 |
582 | Later license versions may give you additional or different
583 | permissions. However, no additional obligations are imposed on any
584 | author or copyright holder as a result of your choosing to follow a
585 | later version.
586 |
587 | 15. Disclaimer of Warranty.
588 |
589 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
590 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
591 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
592 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
593 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
594 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
595 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
596 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
597 |
598 | 16. Limitation of Liability.
599 |
600 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
601 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
602 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
603 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
604 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
605 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
606 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
607 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
608 | SUCH DAMAGES.
609 |
610 | 17. Interpretation of Sections 15 and 16.
611 |
612 | If the disclaimer of warranty and limitation of liability provided
613 | above cannot be given local legal effect according to their terms,
614 | reviewing courts shall apply local law that most closely approximates
615 | an absolute waiver of all civil liability in connection with the
616 | Program, unless a warranty or assumption of liability accompanies a
617 | copy of the Program in return for a fee.
618 |
619 | END OF TERMS AND CONDITIONS
620 |
621 | How to Apply These Terms to Your New Programs
622 |
623 | If you develop a new program, and you want it to be of the greatest
624 | possible use to the public, the best way to achieve this is to make it
625 | free software which everyone can redistribute and change under these terms.
626 |
627 | To do so, attach the following notices to the program. It is safest
628 | to attach them to the start of each source file to most effectively
629 | state the exclusion of warranty; and each file should have at least
630 | the "copyright" line and a pointer to where the full notice is found.
631 |
632 |
633 | Copyright (C)
634 |
635 | This program is free software: you can redistribute it and/or modify
636 | it under the terms of the GNU Affero General Public License as published
637 | by the Free Software Foundation, either version 3 of the License, or
638 | (at your option) any later version.
639 |
640 | This program is distributed in the hope that it will be useful,
641 | but WITHOUT ANY WARRANTY; without even the implied warranty of
642 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
643 | GNU Affero General Public License for more details.
644 |
645 | You should have received a copy of the GNU Affero General Public License
646 | along with this program. If not, see .
647 |
648 | Also add information on how to contact you by electronic and paper mail.
649 |
650 | If your software can interact with users remotely through a computer
651 | network, you should also make sure that it provides a way for users to
652 | get its source. For example, if your program is a web application, its
653 | interface could display a "Source" link that leads users to an archive
654 | of the code. There are many ways you could offer source, and different
655 | solutions will be better for different programs; see section 13 for the
656 | specific requirements.
657 |
658 | You should also get your employer (if you work as a programmer) or school,
659 | if any, to sign a "copyright disclaimer" for the program, if necessary.
660 | For more information on this, and how to apply and follow the GNU AGPL, see
661 | .
662 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # go-checkiptools
2 |
3 | [](https://travis-ci.org/johnsonz/go-checkiptools) [](https://github.com/johnsonz/go-checkiptools/blob/master/LICENSE)
4 | ============
5 |
6 | 使用Go语言编写,在性能上会比Python版的有一些提升,功能参考了[checkgoogleip](https://github.com/moonshawdo/checkgoogleip)、[checkiptools](https://github.com/xyuanmu/checkiptools)、[gogotester](https://github.com/azzvx/gogotester)感谢大家!
7 |
8 | 自带实用小工具,扫描完成后会自动将ip写入到gae.json或gae.user.json,可以根据条件提取扫描出的ip,并可在goagent和goproxy ip格式之间相互转换。在扫描完成后会自动测试带宽(但仅限gws的ip)。
9 |
10 | ## 下载地址
11 | [Latest release](https://github.com/johnsonz/go-checkiptools/releases)
12 |
13 | ## 配置说明
14 |
15 | `"concurrency":5000` 并发线程数,可根据自己的硬件配置调整
16 |
17 | `"delay":1200` 扫描完成后,提取所有小于等于该延迟的ip
18 |
19 | `"only_gws_ip":false` 扫描完成后,是否只提取gws ip,默认为false
20 |
21 | `"sort_tmpokfile":true` 扫描完成后,是否对ip_tmpok.txt中的ip根据延迟进行排序
22 |
23 | `"match_ip_by_dnsname":false` 使用DNSNames而不是CommonName进行ip匹配
24 |
25 | `"check_last_okip":true` 是否检查上一次的ok ip
26 |
27 | `"ippool"` 是否维护一个最大IP数量
28 |
29 | >`"enabled":false` 默认为false,不启用
30 |
31 | >`"max_ip_number":1000` 最大IP数量,当扫描到的可用IP等于该值时停止扫描
32 |
33 | >`"delay":1200` 延迟,会忽略上面的timeout和delay值
34 |
35 | `"check_bandwidth"` 测试带宽
36 |
37 | >`"enabled":false` 扫描完成后,是否测试带宽(仅限gws的ip),默认为false,不启用
38 |
39 | >`"concurrency":10` 测试带宽的并发线程数,可根据自己的网络环境调整
40 |
41 | `"write_to_goproxy"` 扫描完成后是否将ip自动写入到gae.json或gae.user.json
42 |
43 | >`"enabled":false` 默认为false,不写入
44 |
45 | >`"path":""` goproxy目录,只指定目录即可,请注意目录分隔符,windows下需用`\`转义
46 |
47 | >`"one_ip_per_line":true` 每行一个ip
48 |
49 | `"soft_mode":true` 边读取ip边扫描,不会再执行ip去重,适合需要扫描大量ip且内存较小的用户
50 |
51 | ## Wiki
52 | [Wiki](https://plumwine.me/go-checkiptools-usage-wiki/)
53 |
54 | ## 其它工具
55 |
56 | 检测SNI服务器工具:[go-sni-detector](https://github.com/johnsonz/go-sni-detector)
57 |
--------------------------------------------------------------------------------
/ip.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 | import (
4 | "bytes"
5 | "fmt"
6 | "io/ioutil"
7 | "net"
8 | "strconv"
9 | "strings"
10 | )
11 |
12 | //The IP struct
13 | type IP struct {
14 | Address string
15 | CountryName string
16 | CommonName string
17 | OrgName string
18 | ServerName string
19 | Delay int
20 | Bandwidth int
21 | }
22 |
23 | // The status of type IP
24 | const (
25 | okIP = iota
26 | noIP
27 | errIP
28 | )
29 |
30 | //IPs []IP
31 | type IPs []IP
32 |
33 | //Len return the length of []IP
34 | func (ips IPs) Len() int {
35 | return len(ips)
36 | }
37 |
38 | //Swap swap two value of []IP
39 | func (ips IPs) Swap(i, j int) {
40 | ips[i], ips[j] = ips[j], ips[i]
41 | }
42 |
43 | //ByDelay sort by delay
44 | type ByDelay struct {
45 | IPs
46 | }
47 |
48 | //Less return false if the first value less than the second one
49 | func (s ByDelay) Less(i, j int) bool {
50 | return s.IPs[i].Delay < s.IPs[j].Delay
51 | }
52 |
53 | //ByBandwidth sort by bandwidth
54 | type ByBandwidth struct {
55 | IPs
56 | }
57 |
58 | //Less return false if the first value less than the second one
59 | func (s ByBandwidth) Less(i, j int) bool {
60 | return s.IPs[i].Bandwidth < s.IPs[j].Bandwidth
61 | }
62 |
63 | //get last ok ip
64 | func getLastOkIP() []IP {
65 | m := make(map[string]IP)
66 | var checkedip IP
67 | var ips []IP
68 | if isFileExist(tmpOkIPFileName) {
69 | bytes, err := ioutil.ReadFile(tmpOkIPFileName)
70 | checkErr(fmt.Sprintf("read file %s error: ", tmpOkIPFileName), err, Error)
71 | lines := strings.Split(string(bytes), "\n")
72 | for _, line := range lines {
73 | ipInfo := strings.Split(line, " ")
74 | if len(ipInfo) == 5 || len(ipInfo) == 6 {
75 | delay, err := strconv.Atoi(ipInfo[1][:len(ipInfo[1])-2])
76 | checkErr("delay conversion failed: ", err, Warning)
77 | bandwidth := 0
78 | if len(ipInfo) == 6 {
79 | bandwidth, err = strconv.Atoi(ipInfo[5][:len(ipInfo[5])-4])
80 | checkErr("bandwidth conversion failed: ", err, Warning)
81 | }
82 | checkedip = IP{
83 | Address: ipInfo[0],
84 | Delay: delay,
85 | CommonName: ipInfo[2],
86 | ServerName: ipInfo[3],
87 | CountryName: ipInfo[4],
88 | Bandwidth: bandwidth,
89 | }
90 | m[ipInfo[0]] = checkedip
91 | }
92 | }
93 | }
94 | for _, v := range m {
95 | ips = append(ips, v)
96 | }
97 | return ips
98 | }
99 |
100 | //get all google ip range from googleip.txt file
101 | func getGoogleIPRange() []string {
102 | var ipRanges []string
103 | bytes, err := ioutil.ReadFile(googleIPFileName)
104 | checkErr(fmt.Sprintf("read file %s error: ", googleIPFileName), err, Error)
105 |
106 | lines := strings.Split(string(bytes), "\n")
107 | for _, line := range lines {
108 | line = strings.Replace(line, "\r", "", -1)
109 | line = strings.TrimSpace(line)
110 | if len(line) > 1 {
111 | ipRanges = append(ipRanges, line)
112 | }
113 | }
114 |
115 | return ipRanges
116 | }
117 |
118 | /**
119 | Parse google ip range, support the following formats:
120 | 1. xxx.xxx.xxx.xxx
121 | 2. xxx.xxx.xxx.xxx/xx
122 | 3. xxx.xxx.xxx.xxx-xxx.xxx.xxx.xxx
123 | 4. xxx.xxx.xxx.xxx-xxx.
124 | 5. xxx.-xxx.
125 | 6. xxx.xxx.
126 | */
127 | func parseGoogleIPRange(ipRange string) []string {
128 | var ips []string
129 | if strings.Contains(ipRange, "/") {
130 | //CIDR: https://zh.wikipedia.org/wiki/%E6%97%A0%E7%B1%BB%E5%88%AB%E5%9F%9F%E9%97%B4%E8%B7%AF%E7%94%B1
131 | ip, ipNet, err := net.ParseCIDR(ipRange)
132 | checkErr(fmt.Sprintf("parse CIDR %s error: ", ipRange), err, Error)
133 |
134 | for iptmp := ip.Mask(ipNet.Mask); ipNet.Contains(iptmp); inc(iptmp) {
135 | ips = append(ips, iptmp.String())
136 | }
137 | // remove network address and broadcast address
138 | return ips[1 : len(ips)-1]
139 | } else if strings.Contains(ipRange, "-") {
140 | startIP := ipRange[:strings.Index(ipRange, "-")]
141 | endIP := ipRange[strings.Index(ipRange, "-")+1:]
142 | if strings.HasSuffix(startIP, ".") {
143 | switch strings.Count(startIP, ".") {
144 | case 1:
145 | startIP += "0.0.0"
146 | case 2:
147 | startIP += "0.0"
148 | case 3:
149 | startIP += "0"
150 | }
151 | }
152 | if strings.HasSuffix(endIP, ".") {
153 | switch strings.Count(endIP, ".") {
154 | case 1:
155 | endIP += "255.255.255"
156 | case 2:
157 | endIP += "255.255"
158 | case 3:
159 | endIP += "255"
160 | }
161 | }
162 | sIP := net.ParseIP(startIP)
163 | eIP := net.ParseIP(endIP)
164 |
165 | for ip := sIP; bytes.Compare(ip, eIP) <= 0; inc(ip) {
166 | ips = append(ips, ip.String())
167 | }
168 | } else {
169 | if strings.HasSuffix(ipRange, ".") {
170 | startIP, endIP := ipRange, ipRange
171 | switch strings.Count(ipRange, ".") {
172 | case 1:
173 | startIP += "0.0.0"
174 | endIP += "255.255.255"
175 | case 2:
176 | startIP += "0.0"
177 | endIP += "255.255"
178 | case 3:
179 | startIP += "0"
180 | endIP += "255"
181 | }
182 | sIP := net.ParseIP(startIP)
183 | eIP := net.ParseIP(endIP)
184 |
185 | for ip := sIP; bytes.Compare(ip, eIP) <= 0; inc(ip) {
186 | ips = append(ips, ip.String())
187 | }
188 | } else {
189 | ips = append(ips, ipRange)
190 | }
191 | }
192 |
193 | return ips
194 | }
195 |
196 | //get all google ip
197 | func getGoogleIP() []string {
198 | var ips []string
199 | ipRanges := getGoogleIPRange()
200 | for _, ipRange := range ipRanges {
201 | ips = append(ips, parseGoogleIPRange(ipRange)...)
202 | }
203 |
204 | return ips
205 | }
206 |
207 | //get all google ip
208 | func getUniqueGoogleIP() map[string]string {
209 | ips := make(map[string]string)
210 | ipRanges := getGoogleIPRange()
211 | for _, ipRange := range ipRanges {
212 | for _, ip := range parseGoogleIPRange(ipRange) {
213 | ips[ip] = ip
214 | }
215 | }
216 |
217 | return ips
218 | }
219 |
220 | //get google ip one by one
221 | func getGoogleIPQueue() {
222 | ipRanges := getGoogleIPRange()
223 | ipRanges = convertMap2Array(convertArray2Map(ipRanges))
224 | for _, ipRange := range ipRanges {
225 | parsedips := parseGoogleIPRange(ipRange)
226 | for _, ip := range parsedips {
227 | totalips <- ip
228 | }
229 | }
230 | }
231 |
232 | func inc(ip net.IP) {
233 | for j := len(ip) - 1; j >= 0; j-- {
234 | ip[j]++
235 | if ip[j] > 0 {
236 | break
237 | }
238 | }
239 | }
240 |
--------------------------------------------------------------------------------
/main.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 | import (
4 | "bytes"
5 | "crypto/tls"
6 | "crypto/x509"
7 | "encoding/json"
8 | "errors"
9 | "flag"
10 | "fmt"
11 | "io"
12 | "io/ioutil"
13 | "net"
14 | "os"
15 | "path/filepath"
16 | "sort"
17 | "strings"
18 | "time"
19 | )
20 |
21 | //Config Get config info from extra config.json file.
22 | type Config struct {
23 | Concurrency int `json:"concurrency"`
24 | Timeout int `json:"timeout"`
25 | HandshakeTimeout int `json:"handshake_timeout"`
26 | Delay int `json:"delay"`
27 | OnlyGWSIP bool `json:"only_gws_ip"`
28 | OrgNames []string `json:"organization"`
29 | GwsDomains []string `json:"gws"`
30 | GvsDomains []string `json:"gvs"`
31 | MatchByDNSName bool `json:"match_ip_by_dnsname"`
32 | SortOkIP bool `json:"sort_tmpokfile"`
33 | CheckLastOkIP bool `json:"check_last_okip"`
34 | SoftMode bool `json:"soft_mode"`
35 | Bell bool `json:"bell"`
36 | IPPool `json:"ippool"`
37 | Bandwidth `json:"check_bandwidth"`
38 | GoProxy `json:"write_to_goproxy"`
39 | }
40 |
41 | //IPPool maintance a ip pool
42 | type IPPool struct {
43 | Enabled bool `json:"enabled"`
44 | MaxIPNnumber int `json:"max_ip_number"`
45 | CheckIPAll bool `json:"check_ip_all"`
46 | Delay int `json:"delay"`
47 | }
48 |
49 | //Bandwidth check bandwidth
50 | type Bandwidth struct {
51 | Enabled bool `json:"enabled"`
52 | Sort bool `json:"sort"`
53 | Concurrency int `json:"concurrency"`
54 | Timeout int `json:"timeout"`
55 | }
56 |
57 | //GoProxy write ip to goproxy config
58 | type GoProxy struct {
59 | Enabled bool `json:"enabled"`
60 | Path string `json:"path"`
61 | OneIPPerLine bool `json:"one_ip_per_line"`
62 | }
63 |
64 | const (
65 | configFileName string = "main.json"
66 | certFileName string = "cacert.pem"
67 | googleIPFileName string = "googleip.txt"
68 | tmpOkIPFileName string = "ip_tmpok.txt"
69 | tmpErrIPFileName string = "ip_tmperr.txt"
70 | tmpNoIPFileName string = "ip_tmpno.txt"
71 | jsonIPFileName string = "ip.txt"
72 | )
73 |
74 | var config Config
75 | var curDir string
76 | var separator string
77 | var certPool *x509.CertPool
78 | var tlsConfig *tls.Config
79 | var dialer net.Dialer
80 | var totalips chan string
81 |
82 | func init() {
83 | fmt.Println("initial...")
84 | parseConfig()
85 |
86 | if config.IPPool.Enabled {
87 | config.Timeout = config.IPPool.Delay
88 | config.HandshakeTimeout = config.IPPool.Delay
89 | }
90 | loadCertPem()
91 | createFile()
92 | tlsConfig = &tls.Config{
93 | RootCAs: certPool,
94 | InsecureSkipVerify: true,
95 | }
96 | }
97 |
98 | func main() {
99 |
100 | flag.Set("logtostderr", "true")
101 | flag.Parse()
102 |
103 | var lastOkIPs []string
104 | var ips []string
105 | if config.CheckLastOkIP {
106 | tmpLastOkIPs := getLastOkIP()
107 | for _, ip := range tmpLastOkIPs {
108 | lastOkIPs = append(lastOkIPs, ip.Address)
109 | }
110 | err := os.Truncate(tmpOkIPFileName, 0)
111 | checkErr(fmt.Sprintf("truncate file %s error: ", tmpOkIPFileName), err, Error)
112 | }
113 |
114 | if config.SoftMode {
115 | totalips = make(chan string, config.Concurrency)
116 | go func() {
117 | for _, ip := range lastOkIPs {
118 | totalips <- ip
119 | }
120 | getGoogleIPQueue()
121 | close(totalips)
122 | }()
123 |
124 | fmt.Printf("load last checked ip ok, count: %d,\nload extra ip ok, line: %d\n\n", len(lastOkIPs), len(getGoogleIPRange()))
125 | time.Sleep(5 * time.Second)
126 |
127 | } else {
128 | ipsExtra := convertMap2Array(getUniqueGoogleIP())
129 | ips = append(lastOkIPs, ipsExtra...)
130 |
131 | fmt.Printf("load last checked ip ok, count: %d,\nload extra ip ok, line: %d, count: %d\n\n", len(lastOkIPs), len(getGoogleIPRange()), len(ips))
132 | time.Sleep(5 * time.Second)
133 | }
134 |
135 | jobs := make(chan string, config.Concurrency)
136 | done := make(chan bool, config.Concurrency)
137 | maxNum := make(chan<- bool, config.IPPool.MaxIPNnumber)
138 |
139 | //check all goole ip begin
140 | t0 := time.Now()
141 | go func() {
142 | if config.SoftMode {
143 | for ip := range totalips {
144 | jobs <- ip
145 | }
146 | } else {
147 | for _, ip := range ips {
148 | jobs <- ip
149 | }
150 | }
151 | close(jobs)
152 | }()
153 | for ip := range jobs {
154 | done <- true
155 | go checkIP(ip, done, maxNum)
156 | if config.IPPool.Enabled && len(maxNum) == config.IPPool.MaxIPNnumber {
157 | break
158 | }
159 | }
160 | if !config.IPPool.Enabled {
161 | for i := 0; i < cap(done); i++ {
162 | done <- true
163 | }
164 | }
165 | //check all goole ip end
166 |
167 | if config.Bandwidth.Enabled {
168 |
169 | jobs := make(chan IP, config.Bandwidth.Concurrency)
170 | done := make(chan bool, config.Bandwidth.Concurrency)
171 |
172 | ips := getLastOkIP()
173 | err := os.Truncate(tmpOkIPFileName, 0)
174 | checkErr(fmt.Sprintf("truncate file %s error: ", tmpOkIPFileName), err, Error)
175 | // t2 := time.Now()
176 | go func() {
177 | for _, ip := range ips {
178 | jobs <- ip
179 | }
180 | close(jobs)
181 | }()
182 | for ip := range jobs {
183 | done <- true
184 | go checkBandwidth(ip, done)
185 | }
186 | for i := 0; i < cap(done); i++ {
187 | done <- true
188 | }
189 | // t3 := time.Now()
190 | // cost := int(t3.Sub(t2).Seconds())
191 | }
192 | gws, gvs, gpips := writeJSONIP2File()
193 | t1 := time.Now()
194 | cost := int(t1.Sub(t0).Seconds())
195 | fmt.Printf("\ntime: %ds, ok ip count: %d(gws: %d, gvs: %d)\n\n", cost, gws+gvs, gws, gvs)
196 | if config.GoProxy.Enabled {
197 | file := filepath.Join(config.GoProxy.Path, "gae.user.json")
198 | if !isFileExist(file) {
199 | file = filepath.Join(config.GoProxy.Path, "gae.json")
200 | }
201 | writeIP2Goproxy(file, gpips)
202 | }
203 |
204 | if config.Bell {
205 | for i := 0; i < 3; i++ {
206 | for j := 0; j < 3; j++ {
207 | fmt.Printf("%c", '\007')
208 | time.Sleep(time.Second)
209 | }
210 | time.Sleep(time.Second * 3)
211 | }
212 | }
213 | fmt.Println("\npress 'Enter' to continue...")
214 | fmt.Scanln()
215 | }
216 |
217 | //Parse config file
218 | func parseConfig() {
219 | data, err := ioutil.ReadFile(configFileName)
220 | checkErr("read config file error: ", err, Error)
221 | var lines []string
222 | for _, line := range strings.Split(strings.Replace(string(data), "\r\n", "\n", -1), "\n") {
223 | line = strings.TrimSpace(line)
224 | if !strings.HasPrefix(line, "//") && line != "" {
225 | lines = append(lines, line)
226 | }
227 | }
228 |
229 | var b bytes.Buffer
230 | for i, line := range lines {
231 | if len(lines)-1 > i {
232 | nextLine := lines[i+1]
233 | if nextLine == "]" || nextLine == "]," || nextLine == "}" || nextLine == "}," {
234 | if strings.HasSuffix(line, ",") {
235 | line = strings.TrimSuffix(line, ",")
236 | }
237 | }
238 | }
239 | b.WriteString(line)
240 | }
241 | err = json.Unmarshal(b.Bytes(), &config)
242 | checkErr("parse config file error: ", err, Error)
243 | }
244 |
245 | //Load cacert.pem
246 | func loadCertPem() {
247 | certpem, err := ioutil.ReadFile(certFileName)
248 | checkErr(fmt.Sprintf("read pem file %s error: ", certFileName), err, Error)
249 | certPool = x509.NewCertPool()
250 | if !certPool.AppendCertsFromPEM(certpem) {
251 | checkErr(fmt.Sprintf("load pem file %s error: ", certFileName), errors.New("load pem file error"), Error)
252 | }
253 | }
254 |
255 | func checkIP(ip string, done chan bool, maxNum chan<- bool) {
256 | defer func() {
257 | <-done
258 | }()
259 | var checkedip IP
260 | checkedip.Address = ip
261 | checkedip.Bandwidth = 0
262 | checkedip.CountryName = "-"
263 | dialer = net.Dialer{
264 | Timeout: time.Millisecond * time.Duration(config.Timeout),
265 | KeepAlive: 0,
266 | DualStack: false,
267 | }
268 |
269 | conn, err := dialer.Dial("tcp", net.JoinHostPort(ip, "443"))
270 | if err != nil {
271 | if config.IPPool.Enabled && config.IPPool.MaxIPNnumber == len(maxNum) {
272 | return
273 | }
274 | checkErr(fmt.Sprintf("%s dial error: ", ip), err, Debug)
275 | appendIP2File(checkedip, tmpErrIPFileName)
276 | return
277 | }
278 | defer conn.Close()
279 |
280 | t0 := time.Now()
281 | tlsClient := tls.Client(conn, tlsConfig)
282 | tlsClient.SetDeadline(time.Now().Add(time.Millisecond * time.Duration(config.HandshakeTimeout)))
283 | err = tlsClient.Handshake()
284 |
285 | if err != nil {
286 | if config.IPPool.Enabled && config.IPPool.MaxIPNnumber == len(maxNum) {
287 | return
288 | }
289 | checkErr(fmt.Sprintf("%s handshake error: ", ip), err, Debug)
290 | appendIP2File(checkedip, tmpErrIPFileName)
291 | return
292 | }
293 | defer tlsClient.Close()
294 | t1 := time.Now()
295 |
296 | if tlsClient.ConnectionState().PeerCertificates == nil {
297 | if config.IPPool.Enabled && config.IPPool.MaxIPNnumber == len(maxNum) {
298 | return
299 | }
300 | checkErr(fmt.Sprintf("%s peer certificates error: ", ip), errors.New("peer certificates is nil"), Debug)
301 | appendIP2File(checkedip, tmpNoIPFileName)
302 | return
303 | }
304 |
305 | checkedip.Delay = int(t1.Sub(t0).Seconds() * 1000)
306 |
307 | peerCertSubject := tlsClient.ConnectionState().PeerCertificates[0].Subject
308 | DNSNames := tlsClient.ConnectionState().PeerCertificates[0].DNSNames
309 | checkedip.CommonName = peerCertSubject.CommonName
310 | orgNames := peerCertSubject.Organization
311 | if len(peerCertSubject.Organization) > 0 {
312 | checkedip.OrgName = orgNames[0]
313 | }
314 | countryNames := peerCertSubject.Country
315 | if len(countryNames) > 0 {
316 | checkedip.CountryName = countryNames[0]
317 | }
318 |
319 | for _, org := range config.OrgNames {
320 | if org == checkedip.OrgName {
321 | for _, gws := range config.GwsDomains {
322 | if config.MatchByDNSName {
323 | for _, DNSName := range DNSNames {
324 | if strings.HasPrefix(DNSName, gws) {
325 | checkedip.ServerName = "gws"
326 | checkedip.CommonName = DNSName
327 |
328 | if config.IPPool.Enabled {
329 | select {
330 | case maxNum <- true:
331 | default:
332 | return
333 | }
334 | }
335 | appendIP2File(checkedip, tmpOkIPFileName)
336 | goto OK
337 | }
338 | }
339 | } else {
340 | if checkedip.CommonName == gws {
341 | checkedip.ServerName = "gws"
342 | if config.IPPool.Enabled {
343 | select {
344 | case maxNum <- true:
345 | default:
346 | return
347 | }
348 | }
349 | appendIP2File(checkedip, tmpOkIPFileName)
350 | goto OK
351 | }
352 | }
353 | }
354 | for _, gvs := range config.GvsDomains {
355 | if config.MatchByDNSName {
356 | for _, DNSName := range DNSNames {
357 | if strings.HasPrefix(DNSName, gvs) {
358 | checkedip.ServerName = "gvs"
359 | checkedip.CommonName = DNSName
360 | if config.IPPool.Enabled {
361 | select {
362 | case maxNum <- true:
363 | default:
364 | return
365 | }
366 | }
367 | appendIP2File(checkedip, tmpOkIPFileName)
368 | goto OK
369 | }
370 | }
371 | } else {
372 | if checkedip.CommonName == gvs {
373 | checkedip.ServerName = "gvs"
374 | if config.IPPool.Enabled {
375 | select {
376 | case maxNum <- true:
377 | default:
378 | return
379 | }
380 | }
381 | appendIP2File(checkedip, tmpOkIPFileName)
382 | goto OK
383 | }
384 | }
385 | }
386 | appendIP2File(checkedip, tmpNoIPFileName)
387 | } else {
388 | appendIP2File(checkedip, tmpNoIPFileName)
389 | }
390 | }
391 | OK:
392 | checkErr(fmt.Sprintf("%s: %s %s %s %dms", checkedip.Address, checkedip.CommonName, checkedip.ServerName, checkedip.CountryName,
393 | checkedip.Delay), errors.New(""), Info)
394 | }
395 |
396 | //append ip to related file
397 | func appendIP2File(checkedip IP, filename string) {
398 | f, err := os.OpenFile(filename, os.O_APPEND|os.O_WRONLY, os.ModeAppend)
399 | checkErr(fmt.Sprintf("open file %s error: ", filename), err, Error)
400 | defer f.Close()
401 |
402 | ipInfo := fmt.Sprintf("%s %dms %s %s %s\n", checkedip.Address, checkedip.Delay, checkedip.CommonName, checkedip.ServerName, checkedip.CountryName)
403 | if config.Bandwidth.Enabled {
404 | ipInfo = fmt.Sprintf("%s %dms %s %s %s %dKB/s\n", checkedip.Address, checkedip.Delay, checkedip.CommonName, checkedip.ServerName, checkedip.CountryName, checkedip.Bandwidth)
405 | }
406 | _, err = f.WriteString(ipInfo)
407 | checkErr(fmt.Sprintf("append ip to file %s error: ", filename), err, Error)
408 | f.Close()
409 | }
410 |
411 | //Create files if they donnot exist, or truncate them.
412 | func createFile() {
413 | if !isFileExist(tmpOkIPFileName) {
414 | _, err := os.Create(tmpOkIPFileName)
415 | checkErr(fmt.Sprintf("create file %s error: ", tmpOkIPFileName), err, Error)
416 | }
417 | _, err := os.Create(tmpNoIPFileName)
418 | checkErr(fmt.Sprintf("create file %s error: ", tmpNoIPFileName), err, Error)
419 | _, err = os.Create(tmpErrIPFileName)
420 | checkErr(fmt.Sprintf("create file %s error: ", tmpErrIPFileName), err, Error)
421 | }
422 |
423 | /**
424 | writeJSONIP2File: sorting ip, ridding duplicate ip, generating json ip and
425 | bar-separated ip
426 | */
427 | func writeJSONIP2File() (gws, gvs int, gpips string) {
428 | okIPs := getLastOkIP()
429 | if config.SortOkIP {
430 | sort.Sort(ByDelay{IPs(okIPs)})
431 | }
432 | err := os.Truncate(tmpOkIPFileName, 0)
433 | checkErr(fmt.Sprintf("truncate file %s error: ", tmpOkIPFileName), err, Error)
434 | var gaipbuf, gpipbuf bytes.Buffer
435 | for _, ip := range okIPs {
436 | if ip.ServerName == "gws" {
437 | gws++
438 | }
439 | if ip.ServerName == "gvs" {
440 | gvs++
441 | }
442 | appendIP2File(ip, tmpOkIPFileName)
443 | if config.IPPool.Enabled {
444 | gaipbuf.WriteString(ip.Address)
445 | gaipbuf.WriteString("|")
446 | gpipbuf.WriteString("\"")
447 | gpipbuf.WriteString(ip.Address)
448 | gpipbuf.WriteString("\",")
449 | } else {
450 | if ip.Delay <= config.Delay {
451 | if config.OnlyGWSIP {
452 | if ip.ServerName == "gws" {
453 | gaipbuf.WriteString(ip.Address)
454 | gaipbuf.WriteString("|")
455 | gpipbuf.WriteString("\"")
456 | gpipbuf.WriteString(ip.Address)
457 | gpipbuf.WriteString("\",")
458 | }
459 | } else {
460 | gaipbuf.WriteString(ip.Address)
461 | gaipbuf.WriteString("|")
462 | gpipbuf.WriteString("\"")
463 | gpipbuf.WriteString(ip.Address)
464 | gpipbuf.WriteString("\",")
465 | }
466 |
467 | }
468 | }
469 | }
470 | gaips := gaipbuf.String()
471 | gpips = gpipbuf.String()
472 |
473 | if strings.HasSuffix(gaips, "|") {
474 | gaips = strings.TrimSuffix(gaips, "|")
475 | }
476 | if strings.HasSuffix(gpips, ",") {
477 | gpips = strings.TrimSuffix(gpips, ",")
478 | }
479 |
480 | err = ioutil.WriteFile(jsonIPFileName, []byte(gaips+"\n"+gpips), 0755)
481 | checkErr(fmt.Sprintf("write ip to file %s error: ", jsonIPFileName), err, Error)
482 | if config.GoProxy.Enabled && config.GoProxy.OneIPPerLine {
483 | gpips = strings.Replace(gpips, ",\"", ",\r\n\t\t\t\"", -1)
484 | }
485 | return gws, gvs, gpips
486 | }
487 |
488 | //writeIP2Goproxy: write json ip to gae.user.json or gae.json
489 | func writeIP2Goproxy(file, jsonips string) {
490 | data, err := ioutil.ReadFile(file)
491 | checkErr(fmt.Sprintf("read file %s error: ", file), err, Error)
492 | content := string(data)
493 | if n := strings.Index(content, "HostMap"); n > -1 {
494 | tmp := content[n:]
495 | tmp = tmp[strings.Index(tmp, "[")+1 : strings.Index(tmp, "]")]
496 | content = strings.Replace(content, tmp, "\r\n\t\t\t"+jsonips+"\r\n\t\t\t", -1)
497 | err := ioutil.WriteFile(file, []byte(content), 0777)
498 | checkErr(fmt.Sprintf("write ip to file %s error: ", file), err, Error)
499 | fmt.Println("write ip to .json file successfully.")
500 | }
501 | }
502 | func checkBandwidth(ip IP, done chan bool) {
503 | defer func() {
504 | <-done
505 | }()
506 | ip.Bandwidth = 0
507 | if ip.ServerName == "gvs" {
508 | appendIP2File(ip, tmpOkIPFileName)
509 | checkErr(fmt.Sprintf("%s %s %s NaN", ip.Address, ip.CommonName, ip.ServerName), errors.New("gvs skipped"), Info)
510 | return
511 | }
512 | conn, err := dialer.Dial("tcp", net.JoinHostPort(ip.Address, "443"))
513 | if err != nil {
514 | appendIP2File(ip, tmpOkIPFileName)
515 | checkErr(fmt.Sprintf("%s dial error: ", ip.Address), err, Info)
516 | return
517 | }
518 | defer conn.Close()
519 |
520 | tlsClient := tls.Client(conn, tlsConfig)
521 | tlsClient.SetDeadline(time.Now().Add(time.Minute * 5))
522 | _, err = tlsClient.Write([]byte("GET /storage/v1/b/google-code-archive/o/v2%2Fcode.google.com%2Fgogo-tester%2Fwiki%2F1m.wiki?alt=media HTTP/1.1\r\nHost: www.googleapis.com\r\nConnection: close\r\n\r\n"))
523 | if err != nil {
524 | appendIP2File(ip, tmpOkIPFileName)
525 | checkErr(fmt.Sprintf("%s tls write data error: ", ip.Address), err, Info)
526 | return
527 | }
528 | defer tlsClient.Close()
529 |
530 | buf := make([]byte, 0, 4096)
531 | tmp := make([]byte, 1024)
532 | t0 := time.Now()
533 | for {
534 | n, err := tlsClient.Read(tmp)
535 | if err != nil {
536 | if err != io.EOF {
537 | fmt.Println("read error:", err)
538 | }
539 | break
540 | }
541 | buf = append(buf, tmp[:n]...)
542 | }
543 | t1 := time.Now()
544 |
545 | ip.Bandwidth = int(float64(len(buf)) / 1024 / t1.Sub(t0).Seconds())
546 | appendIP2File(ip, tmpOkIPFileName)
547 | checkErr(fmt.Sprintf("%s %s %s %dKB/s", ip.Address, ip.CommonName, ip.ServerName, ip.Bandwidth), errors.New(""), Info)
548 | }
549 |
--------------------------------------------------------------------------------
/main.json:
--------------------------------------------------------------------------------
1 | {
2 | "concurrency":200,
3 | "timeout":5000,
4 | "handshake_timeout":5000,
5 | "delay":1200,
6 | "only_gws_ip":false,
7 | "organization":[
8 | "Google Inc"
9 | ],
10 | "gws":[
11 | "google.",
12 | "google.com"
13 | ],
14 | "gvs":[
15 | "*.c.docs.google.com",
16 | "*.googlevideo.com"
17 | ],
18 | "match_ip_by_dnsname":false,
19 | "sort_tmpokfile":true,
20 | "check_last_okip":true,
21 | "ippool":{
22 | "enabled":false,
23 | "max_ip_number":1000,
24 | "check_ip_all":false,
25 | "delay":1200
26 | },
27 | "check_bandwidth":{
28 | "enabled":false,
29 | "sort":true,
30 | "concurrency":10,
31 | "timeout":8000
32 | },
33 | "check_http2":false,
34 | "write_to_goproxy":{
35 | "enabled":false,
36 | "path":"",
37 | "one_ip_per_line":true
38 | },
39 | "soft_mode":true,
40 | "bell":false
41 | }
42 |
--------------------------------------------------------------------------------
/tools/tools.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 | import (
4 | "bufio"
5 | "bytes"
6 | "fmt"
7 | "io/ioutil"
8 | "net"
9 | "os"
10 | "strconv"
11 | "strings"
12 | )
13 |
14 | //The IP struct
15 | type IP struct {
16 | Address string
17 | ServerName string
18 | Delay int
19 | Bandwidth int
20 | }
21 |
22 | const (
23 | tmpOkIPFileName string = "ip_tmpok.txt"
24 | jsonIPFileName string = "ip_output.txt"
25 | )
26 |
27 | func main() {
28 | tips()
29 |
30 | }
31 | func tips() {
32 |
33 | fmt.Print(`请选择需要处理的操作, 输入对应的数字并按下回车:
34 |
35 | 1. 提取 ip_tmpok.txt 中的IP, 用|分隔以及 json 格式, 并生成ip_output.txt
36 |
37 | 2. IP格式互转 GoAgent <==> GoProxy, 并生成 ip_output.txt
38 |
39 | 请输入对应的数字:`)
40 |
41 | switch getInputFromCommand() {
42 | case "1":
43 | convertIP2JSON()
44 | case "2":
45 | goagent2goproxy()
46 | default:
47 | tips()
48 | }
49 | }
50 | func convertIP2JSON() {
51 | var delay int
52 | var bandwidth int
53 | var err error
54 | isAll := true
55 | isAllBandwidth := true
56 | isGWS := false
57 |
58 | fmt.Print("\n请输入最大延迟(以毫秒计算),否则提取所有IP:")
59 | delaytmp := getInputFromCommand()
60 | if len(delaytmp) > 0 {
61 | delay, err = strconv.Atoi(delaytmp)
62 | if err != nil {
63 | fmt.Println("\n输入不正确,请重新输入。")
64 | convertIP2JSON()
65 | return
66 | }
67 | isAll = false
68 | }
69 | fmt.Print("\n是否只提取gws的IP,是请输入y,否请直接按回车键:")
70 | isgws := getInputFromCommand()
71 | if isgws == "y" || isgws == "Y" {
72 | isGWS = true
73 | }
74 | // CheckBD:
75 | // fmt.Print("\n请输入最小带宽(以KB计算,仅针对gws IP),否则提取所有带宽的IP:")
76 | // bandwidthtmp := getInputFromCommand()
77 | // if len(bandwidthtmp) > 0 {
78 | // bandwidth, err = strconv.Atoi(bandwidthtmp)
79 | // if err != nil {
80 | // fmt.Println("\n输入不正确,请重新输入。")
81 | // goto CheckBD
82 | // }
83 | // isAllBandwidth = false
84 | // }
85 | gws, gvs := writeJSONIP2File(delay, bandwidth, isGWS, isAllBandwidth, isAll)
86 | fmt.Printf("\ndelay: %dms, ip count: %d(gws: %d, gvs: %d)\n", delay, gws+gvs, gws, gvs)
87 |
88 | fmt.Println("\npress Enter to continue...")
89 | fmt.Scanln()
90 | tips()
91 | }
92 | func goagent2goproxy() {
93 | fmt.Println("请输入需要转换的IP, 会自动去除重复IP,可使用右键->粘贴:")
94 | fmt.Println()
95 | rawips := getInputFromCommand()
96 | rawips = strings.TrimSpace(rawips)
97 | var ipstr string
98 | m := make(map[string]string)
99 | if strings.Contains(rawips, "|") {
100 | ips := strings.Split(rawips, "|")
101 | for _, ip := range ips {
102 | tmpip := net.ParseIP(ip)
103 | if tmpip != nil {
104 | m[tmpip.String()] = tmpip.String()
105 | }
106 | }
107 | var ipbuf bytes.Buffer
108 | for k := range m {
109 | ipbuf.WriteString("\"")
110 | ipbuf.WriteString(k)
111 | ipbuf.WriteString("\",")
112 | }
113 | ipstr = ipbuf.String()
114 | ipstr = ipstr[:len(ipstr)-1]
115 | } else {
116 | rawips = rawips[1 : len(rawips)-1]
117 | ips := strings.Split(strings.TrimSpace(rawips), "\",\"")
118 | for _, ip := range ips {
119 | tmpip := net.ParseIP(ip)
120 | if tmpip != nil {
121 | m[tmpip.String()] = tmpip.String()
122 | }
123 | }
124 | var ipbuf bytes.Buffer
125 | for k := range m {
126 | ipbuf.WriteString(k)
127 | ipbuf.WriteString("|")
128 | }
129 | ipstr = ipbuf.String()
130 | ipstr = ipstr[:len(ipstr)-1]
131 | }
132 | fmt.Println()
133 | fmt.Println(ipstr)
134 | fmt.Println("\npress Enter to continue...")
135 | fmt.Scanln()
136 | tips()
137 | }
138 | func getInputFromCommand() string {
139 | reader := bufio.NewReader(os.Stdin)
140 | input, _ := reader.ReadString('\n')
141 | input = strings.Replace(strings.Replace(input, "\n", "", -1), "\r", "", -1)
142 | return input
143 | }
144 |
145 | //get last ok ip
146 | func getLastOkIP() []IP {
147 | m := make(map[string]IP)
148 | var checkedip IP
149 | var ips []IP
150 | if isFileExist(tmpOkIPFileName) {
151 | bytes, err := ioutil.ReadFile(tmpOkIPFileName)
152 | if err != nil {
153 | fmt.Printf("read file %s error: %v", tmpOkIPFileName, err)
154 | }
155 | lines := strings.Split(string(bytes), "\n")
156 | for _, line := range lines {
157 | ipInfo := strings.Split(line, " ")
158 | if len(ipInfo) == 6 || len(ipInfo) == 5 {
159 | delay, _ := strconv.Atoi(ipInfo[1][:len(ipInfo[1])-2])
160 | // bandwidth, err := strconv.Atoi(ipInfo[5][:len(ipInfo[5])-4])
161 | // if err != nil {
162 | // fmt.Println("bandwidth conversion failed: ", err)
163 | // }
164 | checkedip = IP{
165 | Address: ipInfo[0],
166 | Delay: delay,
167 | ServerName: ipInfo[3],
168 | // Bandwidth: bandwidth,
169 | }
170 | m[ipInfo[0]] = checkedip
171 | }
172 | }
173 | }
174 | for _, v := range m {
175 | ips = append(ips, v)
176 | }
177 | return ips
178 | }
179 |
180 | /**
181 | writeJSONIP2File: sorting ip, ridding duplicate ip, generating json ip and
182 | bar-separated ip
183 | */
184 | func writeJSONIP2File(delay int, bandwidth int, isGWS, isAllBandwidth, isAll bool) (gws, gvs int) {
185 | okIPs := getLastOkIP()
186 | _, err := os.Create(jsonIPFileName)
187 | if err != nil {
188 | fmt.Printf("create file %s error: %v", jsonIPFileName, err)
189 | }
190 | var gaipbuf, gpipbuf bytes.Buffer
191 | for _, ip := range okIPs {
192 | if isAllBandwidth {
193 | if isGWS {
194 | if ip.ServerName == "gws" {
195 | if isAll {
196 | gws++
197 | gaipbuf.WriteString(ip.Address)
198 | gaipbuf.WriteString("|")
199 | gpipbuf.WriteString("\"")
200 | gpipbuf.WriteString(ip.Address)
201 | gpipbuf.WriteString("\",")
202 | } else {
203 | if ip.Delay <= delay {
204 | gws++
205 | gaipbuf.WriteString(ip.Address)
206 | gaipbuf.WriteString("|")
207 | gpipbuf.WriteString("\"")
208 | gpipbuf.WriteString(ip.Address)
209 | gpipbuf.WriteString("\",")
210 | }
211 | }
212 | }
213 | } else {
214 | if isAll {
215 | if ip.ServerName == "gws" {
216 | gws++
217 | }
218 | if ip.ServerName == "gvs" {
219 | gvs++
220 | }
221 | gaipbuf.WriteString(ip.Address)
222 | gaipbuf.WriteString("|")
223 | gpipbuf.WriteString("\"")
224 | gpipbuf.WriteString(ip.Address)
225 | gpipbuf.WriteString("\",")
226 | } else {
227 | if ip.Delay <= delay {
228 | if ip.ServerName == "gws" {
229 | gws++
230 | }
231 | if ip.ServerName == "gvs" {
232 | gvs++
233 | }
234 | gaipbuf.WriteString(ip.Address)
235 | gaipbuf.WriteString("|")
236 | gpipbuf.WriteString("\"")
237 | gpipbuf.WriteString(ip.Address)
238 | gpipbuf.WriteString("\",")
239 | }
240 | }
241 | }
242 | } else {
243 | if ip.Bandwidth >= bandwidth {
244 | if isGWS {
245 | if ip.ServerName == "gws" {
246 | if isAll {
247 | gws++
248 | gaipbuf.WriteString(ip.Address)
249 | gaipbuf.WriteString("|")
250 | gpipbuf.WriteString("\"")
251 | gpipbuf.WriteString(ip.Address)
252 | gpipbuf.WriteString("\",")
253 | } else {
254 | if ip.Delay <= delay {
255 | gws++
256 | gaipbuf.WriteString(ip.Address)
257 | gaipbuf.WriteString("|")
258 | gpipbuf.WriteString("\"")
259 | gpipbuf.WriteString(ip.Address)
260 | gpipbuf.WriteString("\",")
261 | }
262 | }
263 | }
264 | } else {
265 | if isAll {
266 | if ip.ServerName == "gws" {
267 | gws++
268 | }
269 | if ip.ServerName == "gvs" {
270 | gvs++
271 | }
272 | gaipbuf.WriteString(ip.Address)
273 | gaipbuf.WriteString("|")
274 | gpipbuf.WriteString("\"")
275 | gpipbuf.WriteString(ip.Address)
276 | gpipbuf.WriteString("\",")
277 | } else {
278 | if ip.Delay <= delay {
279 | if ip.ServerName == "gws" {
280 | gws++
281 | }
282 | if ip.ServerName == "gvs" {
283 | gvs++
284 | }
285 | gaipbuf.WriteString(ip.Address)
286 | gaipbuf.WriteString("|")
287 | gpipbuf.WriteString("\"")
288 | gpipbuf.WriteString(ip.Address)
289 | gpipbuf.WriteString("\",")
290 | }
291 | }
292 | }
293 | }
294 | }
295 | }
296 | gaip := gaipbuf.String()
297 | gpip := gpipbuf.String()
298 |
299 | if len(gaip) > 0 {
300 | gaip = gaip[:len(gaip)-1]
301 | }
302 | if len(gpip) > 0 {
303 | gpip = gpip[:len(gpip)-1]
304 | }
305 | err = ioutil.WriteFile(jsonIPFileName, []byte(gaip+"\n\n\n"+gpip), 0755)
306 | if err != nil {
307 | fmt.Printf("write ip to file %s error: %v", jsonIPFileName, err)
308 | }
309 | return gws, gvs
310 | }
311 |
312 | //Whether file exists.
313 | func isFileExist(file string) bool {
314 | _, err := os.Stat(file)
315 | if err != nil && os.IsNotExist(err) {
316 | return false
317 | }
318 | return true
319 | }
320 |
--------------------------------------------------------------------------------
/utils.go:
--------------------------------------------------------------------------------
1 | package main
2 |
3 | import (
4 | "os"
5 |
6 | "github.com/golang/glog"
7 | )
8 |
9 | //custom log level
10 | const (
11 | Info = iota
12 | Warning
13 | Debug
14 | Error
15 | )
16 |
17 | //CheckErr checks given error
18 | func checkErr(messge string, err error, level int) {
19 | if err != nil {
20 | switch level {
21 | case Info, Warning, Debug:
22 | glog.Infoln(messge, err)
23 | case Error:
24 | glog.Fatalln(messge, err)
25 | }
26 | }
27 | }
28 |
29 | //Whether file exists.
30 | func isFileExist(file string) bool {
31 | _, err := os.Stat(file)
32 | if err != nil && os.IsNotExist(err) {
33 | return false
34 | }
35 | return true
36 | }
37 |
38 | //convert type map[string]string to array
39 | func convertMap2Array(m map[string]string) (s []string) {
40 | for _, v := range m {
41 | s = append(s, v)
42 | }
43 |
44 | return s
45 | }
46 |
47 | //convert type array to map[string]string
48 | func convertArray2Map(s []string) (m map[string]string) {
49 | m = make(map[string]string)
50 | for _, v := range s {
51 | m[v] = v
52 | }
53 | return m
54 | }
55 |
--------------------------------------------------------------------------------