mirror of https://github.com/XTLS/Xray-core
				
				
				
			
		
			
				
	
	
		
			123 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
			
		
		
	
	
			123 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
package scenarios
 | 
						|
 | 
						|
import (
 | 
						|
	"testing"
 | 
						|
	//"time"
 | 
						|
 | 
						|
	"github.com/xtls/xray-core/app/log"
 | 
						|
	"github.com/xtls/xray-core/app/proxyman"
 | 
						|
	"github.com/xtls/xray-core/common"
 | 
						|
	clog "github.com/xtls/xray-core/common/log"
 | 
						|
	"github.com/xtls/xray-core/common/net"
 | 
						|
	"github.com/xtls/xray-core/common/serial"
 | 
						|
	core "github.com/xtls/xray-core/core"
 | 
						|
	"github.com/xtls/xray-core/infra/conf"
 | 
						|
	"github.com/xtls/xray-core/proxy/dokodemo"
 | 
						|
	"github.com/xtls/xray-core/proxy/freedom"
 | 
						|
	"github.com/xtls/xray-core/proxy/wireguard"
 | 
						|
	"github.com/xtls/xray-core/testing/servers/tcp"
 | 
						|
	"github.com/xtls/xray-core/testing/servers/udp"
 | 
						|
	//"golang.org/x/sync/errgroup"
 | 
						|
)
 | 
						|
 | 
						|
func TestWireguard(t *testing.T) {
 | 
						|
	tcpServer := tcp.Server{
 | 
						|
		MsgProcessor: xor,
 | 
						|
	}
 | 
						|
	dest, err := tcpServer.Start()
 | 
						|
	common.Must(err)
 | 
						|
	defer tcpServer.Close()
 | 
						|
 | 
						|
	serverPrivate, _ := conf.ParseWireGuardKey("EGs4lTSJPmgELx6YiJAmPR2meWi6bY+e9rTdCipSj10=")
 | 
						|
	serverPublic, _ := conf.ParseWireGuardKey("osAMIyil18HeZXGGBDC9KpZoM+L2iGyXWVSYivuM9B0=")
 | 
						|
	clientPrivate, _ := conf.ParseWireGuardKey("CPQSpgxgdQRZa5SUbT3HLv+mmDVHLW5YR/rQlzum/2I=")
 | 
						|
	clientPublic, _ := conf.ParseWireGuardKey("MmLJ5iHFVVBp7VsB0hxfpQ0wEzAbT2KQnpQpj0+RtBw=")
 | 
						|
 | 
						|
	serverPort := udp.PickPort()
 | 
						|
	serverConfig := &core.Config{
 | 
						|
		App: []*serial.TypedMessage{
 | 
						|
			serial.ToTypedMessage(&log.Config{
 | 
						|
				ErrorLogLevel: clog.Severity_Debug,
 | 
						|
				ErrorLogType:  log.LogType_Console,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		Inbound: []*core.InboundHandlerConfig{
 | 
						|
			{
 | 
						|
				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | 
						|
					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(serverPort)}},
 | 
						|
					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | 
						|
				}),
 | 
						|
				ProxySettings: serial.ToTypedMessage(&wireguard.DeviceConfig{
 | 
						|
					IsClient:    false,
 | 
						|
					NoKernelTun: false,
 | 
						|
					Endpoint:    []string{"10.0.0.1"},
 | 
						|
					Mtu:         1420,
 | 
						|
					SecretKey:   serverPrivate,
 | 
						|
					Peers: []*wireguard.PeerConfig{{
 | 
						|
						PublicKey:  serverPublic,
 | 
						|
						AllowedIps: []string{"0.0.0.0/0", "::0/0"},
 | 
						|
					}},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Outbound: []*core.OutboundHandlerConfig{
 | 
						|
			{
 | 
						|
				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	clientPort := tcp.PickPort()
 | 
						|
	clientConfig := &core.Config{
 | 
						|
		App: []*serial.TypedMessage{
 | 
						|
			serial.ToTypedMessage(&log.Config{
 | 
						|
				ErrorLogLevel: clog.Severity_Debug,
 | 
						|
				ErrorLogType:  log.LogType_Console,
 | 
						|
			}),
 | 
						|
		},
 | 
						|
		Inbound: []*core.InboundHandlerConfig{
 | 
						|
			{
 | 
						|
				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | 
						|
					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(clientPort)}},
 | 
						|
					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | 
						|
				}),
 | 
						|
				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | 
						|
					Address:  net.NewIPOrDomain(dest.Address),
 | 
						|
					Port:     uint32(dest.Port),
 | 
						|
					Networks: []net.Network{net.Network_TCP},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Outbound: []*core.OutboundHandlerConfig{
 | 
						|
			{
 | 
						|
				ProxySettings: serial.ToTypedMessage(&wireguard.DeviceConfig{
 | 
						|
					IsClient:    true,
 | 
						|
					NoKernelTun: false,
 | 
						|
					Endpoint:    []string{"10.0.0.2"},
 | 
						|
					Mtu:         1420,
 | 
						|
					SecretKey:   clientPrivate,
 | 
						|
					Peers: []*wireguard.PeerConfig{{
 | 
						|
						Endpoint:   "127.0.0.1:" + serverPort.String(),
 | 
						|
						PublicKey:  clientPublic,
 | 
						|
						AllowedIps: []string{"0.0.0.0/0", "::0/0"},
 | 
						|
					}},
 | 
						|
				}),
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | 
						|
	common.Must(err)
 | 
						|
	defer CloseAllServers(servers)
 | 
						|
 | 
						|
	// FIXME: for some reason wg server does not receive
 | 
						|
 | 
						|
	// var errg errgroup.Group
 | 
						|
	// for i := 0; i < 1; i++ {
 | 
						|
	// 	errg.Go(testTCPConn(clientPort, 1024, time.Second*2))
 | 
						|
	// }
 | 
						|
	// if err := errg.Wait(); err != nil {
 | 
						|
	// 	t.Error(err)
 | 
						|
	// }
 | 
						|
}
 |