mirror of
				https://github.com/v2fly/v2ray-core.git
				synced 2025-10-30 17:29:23 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			378 lines
		
	
	
		
			9.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			378 lines
		
	
	
		
			9.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package scenarios
 | |
| 
 | |
| import (
 | |
| 	"crypto/rand"
 | |
| 	"net"
 | |
| 	"sync"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"v2ray.com/core"
 | |
| 	"v2ray.com/core/app/log"
 | |
| 	"v2ray.com/core/app/proxyman"
 | |
| 	v2net "v2ray.com/core/common/net"
 | |
| 	"v2ray.com/core/common/protocol"
 | |
| 	"v2ray.com/core/common/serial"
 | |
| 	"v2ray.com/core/proxy/dokodemo"
 | |
| 	"v2ray.com/core/proxy/freedom"
 | |
| 	"v2ray.com/core/proxy/shadowsocks"
 | |
| 	"v2ray.com/core/testing/assert"
 | |
| 	"v2ray.com/core/testing/servers/tcp"
 | |
| 	"v2ray.com/core/testing/servers/udp"
 | |
| )
 | |
| 
 | |
| func TestShadowsocksAES256TCP(t *testing.T) {
 | |
| 	assert := assert.On(t)
 | |
| 
 | |
| 	tcpServer := tcp.Server{
 | |
| 		MsgProcessor: xor,
 | |
| 	}
 | |
| 	dest, err := tcpServer.Start()
 | |
| 	assert.Error(err).IsNil()
 | |
| 	defer tcpServer.Close()
 | |
| 
 | |
| 	account := serial.ToTypedMessage(&shadowsocks.Account{
 | |
| 		Password:   "shadowsocks-password",
 | |
| 		CipherType: shadowsocks.CipherType_AES_256_CFB,
 | |
| 		Ota:        shadowsocks.Account_Enabled,
 | |
| 	})
 | |
| 
 | |
| 	serverPort := pickPort()
 | |
| 	serverConfig := &core.Config{
 | |
| 		Inbound: []*proxyman.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortRange: v2net.SinglePortRange(serverPort),
 | |
| 					Listen:    v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
 | |
| 					User: &protocol.User{
 | |
| 						Account: account,
 | |
| 						Level:   1,
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*proxyman.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | |
| 			},
 | |
| 		},
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: log.LogLevel_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	clientPort := pickPort()
 | |
| 	clientConfig := &core.Config{
 | |
| 		Inbound: []*proxyman.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortRange: v2net.SinglePortRange(clientPort),
 | |
| 					Listen:    v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | |
| 					Address: v2net.NewIPOrDomain(dest.Address),
 | |
| 					Port:    uint32(dest.Port),
 | |
| 					NetworkList: &v2net.NetworkList{
 | |
| 						Network: []v2net.Network{v2net.Network_TCP},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*proxyman.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
 | |
| 					Server: []*protocol.ServerEndpoint{
 | |
| 						{
 | |
| 							Address: v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 							Port:    uint32(serverPort),
 | |
| 							User: []*protocol.User{
 | |
| 								{
 | |
| 									Account: account,
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: log.LogLevel_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	var wg sync.WaitGroup
 | |
| 	wg.Add(10)
 | |
| 	for i := 0; i < 10; i++ {
 | |
| 		go func() {
 | |
| 			conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
 | |
| 				IP:   []byte{127, 0, 0, 1},
 | |
| 				Port: int(clientPort),
 | |
| 			})
 | |
| 			assert.Error(err).IsNil()
 | |
| 
 | |
| 			payload := make([]byte, 10240*1024)
 | |
| 			rand.Read(payload)
 | |
| 
 | |
| 			nBytes, err := conn.Write([]byte(payload))
 | |
| 			assert.Error(err).IsNil()
 | |
| 			assert.Int(nBytes).Equals(len(payload))
 | |
| 
 | |
| 			response := readFrom(conn, time.Second*20, 10240*1024)
 | |
| 			assert.Bytes(response).Equals(xor([]byte(payload)))
 | |
| 			assert.Error(conn.Close()).IsNil()
 | |
| 			wg.Done()
 | |
| 		}()
 | |
| 	}
 | |
| 	wg.Wait()
 | |
| 
 | |
| 	CloseAllServers(servers)
 | |
| }
 | |
| 
 | |
| func TestShadowsocksAES128UDP(t *testing.T) {
 | |
| 	assert := assert.On(t)
 | |
| 
 | |
| 	udpServer := udp.Server{
 | |
| 		MsgProcessor: xor,
 | |
| 	}
 | |
| 	dest, err := udpServer.Start()
 | |
| 	assert.Error(err).IsNil()
 | |
| 	defer udpServer.Close()
 | |
| 
 | |
| 	account := serial.ToTypedMessage(&shadowsocks.Account{
 | |
| 		Password:   "shadowsocks-password",
 | |
| 		CipherType: shadowsocks.CipherType_AES_128_CFB,
 | |
| 		Ota:        shadowsocks.Account_Enabled,
 | |
| 	})
 | |
| 
 | |
| 	serverPort := pickPort()
 | |
| 	serverConfig := &core.Config{
 | |
| 		Inbound: []*proxyman.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortRange: v2net.SinglePortRange(serverPort),
 | |
| 					Listen:    v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
 | |
| 					UdpEnabled: true,
 | |
| 					User: &protocol.User{
 | |
| 						Account: account,
 | |
| 						Level:   1,
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*proxyman.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | |
| 			},
 | |
| 		},
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: log.LogLevel_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	clientPort := pickPort()
 | |
| 	clientConfig := &core.Config{
 | |
| 		Inbound: []*proxyman.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortRange: v2net.SinglePortRange(clientPort),
 | |
| 					Listen:    v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | |
| 					Address: v2net.NewIPOrDomain(dest.Address),
 | |
| 					Port:    uint32(dest.Port),
 | |
| 					NetworkList: &v2net.NetworkList{
 | |
| 						Network: []v2net.Network{v2net.Network_UDP},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*proxyman.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
 | |
| 					Server: []*protocol.ServerEndpoint{
 | |
| 						{
 | |
| 							Address: v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 							Port:    uint32(serverPort),
 | |
| 							User: []*protocol.User{
 | |
| 								{
 | |
| 									Account: account,
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: log.LogLevel_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	var wg sync.WaitGroup
 | |
| 	wg.Add(10)
 | |
| 	for i := 0; i < 10; i++ {
 | |
| 		go func() {
 | |
| 			conn, err := net.DialUDP("udp", nil, &net.UDPAddr{
 | |
| 				IP:   []byte{127, 0, 0, 1},
 | |
| 				Port: int(clientPort),
 | |
| 			})
 | |
| 			assert.Error(err).IsNil()
 | |
| 
 | |
| 			payload := make([]byte, 1024)
 | |
| 			rand.Read(payload)
 | |
| 
 | |
| 			nBytes, err := conn.Write([]byte(payload))
 | |
| 			assert.Error(err).IsNil()
 | |
| 			assert.Int(nBytes).Equals(len(payload))
 | |
| 
 | |
| 			response := readFrom(conn, time.Second*5, 1024)
 | |
| 			assert.Bytes(response).Equals(xor([]byte(payload)))
 | |
| 			assert.Error(conn.Close()).IsNil()
 | |
| 			wg.Done()
 | |
| 		}()
 | |
| 	}
 | |
| 	wg.Wait()
 | |
| 
 | |
| 	CloseAllServers(servers)
 | |
| }
 | |
| 
 | |
| func TestShadowsocksChacha20TCP(t *testing.T) {
 | |
| 	assert := assert.On(t)
 | |
| 
 | |
| 	tcpServer := tcp.Server{
 | |
| 		MsgProcessor: xor,
 | |
| 	}
 | |
| 	dest, err := tcpServer.Start()
 | |
| 	assert.Error(err).IsNil()
 | |
| 	defer tcpServer.Close()
 | |
| 
 | |
| 	account := serial.ToTypedMessage(&shadowsocks.Account{
 | |
| 		Password:   "shadowsocks-password",
 | |
| 		CipherType: shadowsocks.CipherType_CHACHA20_IETF,
 | |
| 		Ota:        shadowsocks.Account_Enabled,
 | |
| 	})
 | |
| 
 | |
| 	serverPort := pickPort()
 | |
| 	serverConfig := &core.Config{
 | |
| 		Inbound: []*proxyman.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortRange: v2net.SinglePortRange(serverPort),
 | |
| 					Listen:    v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
 | |
| 					User: &protocol.User{
 | |
| 						Account: account,
 | |
| 						Level:   1,
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*proxyman.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | |
| 			},
 | |
| 		},
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: log.LogLevel_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	clientPort := pickPort()
 | |
| 	clientConfig := &core.Config{
 | |
| 		Inbound: []*proxyman.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortRange: v2net.SinglePortRange(clientPort),
 | |
| 					Listen:    v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | |
| 					Address: v2net.NewIPOrDomain(dest.Address),
 | |
| 					Port:    uint32(dest.Port),
 | |
| 					NetworkList: &v2net.NetworkList{
 | |
| 						Network: []v2net.Network{v2net.Network_TCP},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*proxyman.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
 | |
| 					Server: []*protocol.ServerEndpoint{
 | |
| 						{
 | |
| 							Address: v2net.NewIPOrDomain(v2net.LocalHostIP),
 | |
| 							Port:    uint32(serverPort),
 | |
| 							User: []*protocol.User{
 | |
| 								{
 | |
| 									Account: account,
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: log.LogLevel_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	var wg sync.WaitGroup
 | |
| 	wg.Add(10)
 | |
| 	for i := 0; i < 10; i++ {
 | |
| 		go func() {
 | |
| 			conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
 | |
| 				IP:   []byte{127, 0, 0, 1},
 | |
| 				Port: int(clientPort),
 | |
| 			})
 | |
| 			assert.Error(err).IsNil()
 | |
| 
 | |
| 			payload := make([]byte, 10240*1024)
 | |
| 			rand.Read(payload)
 | |
| 
 | |
| 			nBytes, err := conn.Write([]byte(payload))
 | |
| 			assert.Error(err).IsNil()
 | |
| 			assert.Int(nBytes).Equals(len(payload))
 | |
| 
 | |
| 			response := readFrom(conn, time.Second*20, 10240*1024)
 | |
| 			assert.Bytes(response).Equals(xor([]byte(payload)))
 | |
| 			assert.Error(conn.Close()).IsNil()
 | |
| 			wg.Done()
 | |
| 		}()
 | |
| 	}
 | |
| 	wg.Wait()
 | |
| 
 | |
| 	CloseAllServers(servers)
 | |
| }
 | 
