Each listener binds to its own port with an independent chain. The "pool" keyword in a chain appends a random alive proxy from the shared pool; multiple pool entries = multiple hops. :1080 -> Tor only (0 pool hops) :1081 -> Tor + 1 pool proxy :1082 -> Tor + 2 pool proxies Shared resources (ProxyPool, Tor, metrics, semaphore, API) are reused across listeners. FirstHopPool is shared per unique first hop. Backward compatible: old listen/chain format still works.
82 lines
3.3 KiB
YAML
82 lines
3.3 KiB
YAML
# s5p example configuration
|
|
# Copy to config/s5p.yaml and edit to taste.
|
|
|
|
listen: 127.0.0.1:1080
|
|
timeout: 10
|
|
retries: 3 # max attempts per connection (proxy_source only)
|
|
log_level: info
|
|
# max_connections: 256 # max concurrent client connections (backpressure)
|
|
# pool_size: 0 # pre-warmed TCP connections to first hop (0 = disabled)
|
|
# pool_max_idle: 30 # max idle time (seconds) for pooled connections
|
|
# api_listen: 127.0.0.1:1081 # control API (disabled by default)
|
|
|
|
# Proxy chain -- connections tunnel through each hop in order.
|
|
# Supported protocols: socks5://, socks4://, http://
|
|
#
|
|
# Example: Tor first hop, then a public proxy
|
|
chain:
|
|
- socks5://127.0.0.1:9050 # Tor
|
|
# - socks5://user:pass@proxy:1080 # post-Tor SOCKS5 proxy
|
|
# - socks4://proxy:1080 # post-Tor SOCKS4/4a proxy
|
|
# - http://user:pass@proxy:8080 # post-Tor HTTP CONNECT proxy
|
|
|
|
# Managed proxy pool -- fetches from multiple sources, health-tests,
|
|
# and rotates alive proxies per-connection after the static chain.
|
|
# proxy_pool:
|
|
# sources:
|
|
# - url: http://10.200.1.250:8081/proxies
|
|
# proto: socks5 # optional: filter by protocol
|
|
# country: US # optional: filter by country
|
|
# limit: 1000 # optional: max proxies to fetch
|
|
# - file: /etc/s5p/proxies.txt # text file, one proxy URL per line
|
|
# refresh: 300 # re-fetch sources interval (seconds)
|
|
# test_interval: 120 # health test cycle interval (seconds)
|
|
# test_targets: # TLS handshake targets (round-robin)
|
|
# - www.google.com
|
|
# - www.cloudflare.com
|
|
# - www.amazon.com
|
|
# test_timeout: 15 # per-test timeout (seconds)
|
|
# test_concurrency: 5 # parallel health tests
|
|
# max_fails: 3 # consecutive fails before eviction
|
|
# state_file: "" # empty = ~/.cache/s5p/pool.json
|
|
# report_url: "" # POST dead proxies here (optional)
|
|
|
|
# Tor control port -- enables NEWNYM signaling (new circuit on demand).
|
|
# Requires Tor's ControlPort enabled (torrc: ControlPort 9051).
|
|
# tor:
|
|
# control_host: 127.0.0.1
|
|
# control_port: 9051
|
|
# password: "" # HashedControlPassword in torrc
|
|
# cookie_file: "" # CookieAuthentication file path
|
|
# newnym_interval: 0 # periodic NEWNYM (seconds, 0 = manual only)
|
|
|
|
# Multi-listener mode -- each listener gets its own address and chain.
|
|
# The "pool" keyword in a chain appends a random alive proxy from the pool.
|
|
# Multiple "pool" entries = multiple pool hops (deeper chaining).
|
|
#
|
|
# listeners:
|
|
# - listen: 0.0.0.0:1080
|
|
# chain:
|
|
# - socks5://127.0.0.1:9050 # Tor only (no pool hops)
|
|
#
|
|
# - listen: 0.0.0.0:1081
|
|
# chain:
|
|
# - socks5://127.0.0.1:9050
|
|
# - pool # Tor + 1 random pool proxy
|
|
#
|
|
# - listen: 0.0.0.0:1082
|
|
# chain:
|
|
# - socks5://127.0.0.1:9050
|
|
# - pool # Tor + 2 random pool proxies
|
|
# - pool
|
|
#
|
|
# When using "listeners:", the top-level "listen" and "chain" keys are ignored.
|
|
# If "listeners:" is absent, the old format is used (single listener).
|
|
|
|
# Legacy proxy source (still supported, auto-converts to proxy_pool):
|
|
# proxy_source:
|
|
# url: http://10.200.1.250:8081/proxies
|
|
# proto: socks5
|
|
# limit: 1000
|
|
# refresh: 300
|