mirror of https://github.com/XTLS/Xray-core
				
				
				
			
		
			
				
	
	
		
			488 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
			
		
		
	
	
			488 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
| package scenarios
 | |
| 
 | |
| import (
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/xtls/xray-core/app/log"
 | |
| 	"github.com/xtls/xray-core/app/proxyman"
 | |
| 	"github.com/xtls/xray-core/common"
 | |
| 	clog "github.com/xtls/xray-core/common/log"
 | |
| 	"github.com/xtls/xray-core/common/net"
 | |
| 	"github.com/xtls/xray-core/common/protocol"
 | |
| 	"github.com/xtls/xray-core/common/serial"
 | |
| 	"github.com/xtls/xray-core/core"
 | |
| 	"github.com/xtls/xray-core/proxy/dokodemo"
 | |
| 	"github.com/xtls/xray-core/proxy/freedom"
 | |
| 	"github.com/xtls/xray-core/proxy/shadowsocks"
 | |
| 	"github.com/xtls/xray-core/testing/servers/tcp"
 | |
| 	"github.com/xtls/xray-core/testing/servers/udp"
 | |
| 	"golang.org/x/sync/errgroup"
 | |
| )
 | |
| 
 | |
| func TestShadowsocksChaCha20Poly1305TCP(t *testing.T) {
 | |
| 	tcpServer := tcp.Server{
 | |
| 		MsgProcessor: xor,
 | |
| 	}
 | |
| 	dest, err := tcpServer.Start()
 | |
| 	common.Must(err)
 | |
| 	defer tcpServer.Close()
 | |
| 
 | |
| 	account := serial.ToTypedMessage(&shadowsocks.Account{
 | |
| 		Password:   "shadowsocks-password",
 | |
| 		CipherType: shadowsocks.CipherType_CHACHA20_POLY1305,
 | |
| 	})
 | |
| 
 | |
| 	serverPort := tcp.PickPort()
 | |
| 	serverConfig := &core.Config{
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(serverPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
 | |
| 					Users: []*protocol.User{{
 | |
| 						Account: account,
 | |
| 						Level:   1,
 | |
| 					}},
 | |
| 					Network: []net.Network{net.Network_TCP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	clientPort := tcp.PickPort()
 | |
| 	clientConfig := &core.Config{
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(clientPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | |
| 					Address:  net.NewIPOrDomain(dest.Address),
 | |
| 					Port:     uint32(dest.Port),
 | |
| 					Networks: []net.Network{net.Network_TCP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
 | |
| 					Server: []*protocol.ServerEndpoint{
 | |
| 						{
 | |
| 							Address: net.NewIPOrDomain(net.LocalHostIP),
 | |
| 							Port:    uint32(serverPort),
 | |
| 							User: []*protocol.User{
 | |
| 								{
 | |
| 									Account: account,
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | |
| 	common.Must(err)
 | |
| 	defer CloseAllServers(servers)
 | |
| 
 | |
| 	var errGroup errgroup.Group
 | |
| 	for i := 0; i < 10; i++ {
 | |
| 		errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
 | |
| 	}
 | |
| 	if err := errGroup.Wait(); err != nil {
 | |
| 		t.Error(err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestShadowsocksAES256GCMTCP(t *testing.T) {
 | |
| 	tcpServer := tcp.Server{
 | |
| 		MsgProcessor: xor,
 | |
| 	}
 | |
| 	dest, err := tcpServer.Start()
 | |
| 	common.Must(err)
 | |
| 	defer tcpServer.Close()
 | |
| 
 | |
| 	account := serial.ToTypedMessage(&shadowsocks.Account{
 | |
| 		Password:   "shadowsocks-password",
 | |
| 		CipherType: shadowsocks.CipherType_AES_256_GCM,
 | |
| 	})
 | |
| 
 | |
| 	serverPort := tcp.PickPort()
 | |
| 	serverConfig := &core.Config{
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: clog.Severity_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(serverPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
 | |
| 					Users: []*protocol.User{{
 | |
| 						Account: account,
 | |
| 						Level:   1,
 | |
| 					}},
 | |
| 					Network: []net.Network{net.Network_TCP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	clientPort := tcp.PickPort()
 | |
| 	clientConfig := &core.Config{
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: clog.Severity_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(clientPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | |
| 					Address:  net.NewIPOrDomain(dest.Address),
 | |
| 					Port:     uint32(dest.Port),
 | |
| 					Networks: []net.Network{net.Network_TCP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
 | |
| 					Server: []*protocol.ServerEndpoint{
 | |
| 						{
 | |
| 							Address: net.NewIPOrDomain(net.LocalHostIP),
 | |
| 							Port:    uint32(serverPort),
 | |
| 							User: []*protocol.User{
 | |
| 								{
 | |
| 									Account: account,
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | |
| 	common.Must(err)
 | |
| 	defer CloseAllServers(servers)
 | |
| 
 | |
| 	var errGroup errgroup.Group
 | |
| 	for i := 0; i < 10; i++ {
 | |
| 		errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
 | |
| 	}
 | |
| 
 | |
| 	if err := errGroup.Wait(); err != nil {
 | |
| 		t.Error(err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestShadowsocksAES128GCMUDP(t *testing.T) {
 | |
| 	udpServer := udp.Server{
 | |
| 		MsgProcessor: xor,
 | |
| 	}
 | |
| 	dest, err := udpServer.Start()
 | |
| 	common.Must(err)
 | |
| 	defer udpServer.Close()
 | |
| 
 | |
| 	account := serial.ToTypedMessage(&shadowsocks.Account{
 | |
| 		Password:   "shadowsocks-password",
 | |
| 		CipherType: shadowsocks.CipherType_AES_128_GCM,
 | |
| 	})
 | |
| 
 | |
| 	serverPort := udp.PickPort()
 | |
| 	serverConfig := &core.Config{
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: clog.Severity_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(serverPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
 | |
| 					Users: []*protocol.User{{
 | |
| 						Account: account,
 | |
| 						Level:   1,
 | |
| 					}},
 | |
| 					Network: []net.Network{net.Network_UDP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	clientPort := udp.PickPort()
 | |
| 	clientConfig := &core.Config{
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: clog.Severity_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(clientPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | |
| 					Address:  net.NewIPOrDomain(dest.Address),
 | |
| 					Port:     uint32(dest.Port),
 | |
| 					Networks: []net.Network{net.Network_UDP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
 | |
| 					Server: []*protocol.ServerEndpoint{
 | |
| 						{
 | |
| 							Address: net.NewIPOrDomain(net.LocalHostIP),
 | |
| 							Port:    uint32(serverPort),
 | |
| 							User: []*protocol.User{
 | |
| 								{
 | |
| 									Account: account,
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | |
| 	common.Must(err)
 | |
| 	defer CloseAllServers(servers)
 | |
| 
 | |
| 	var errGroup errgroup.Group
 | |
| 	for i := 0; i < 10; i++ {
 | |
| 		errGroup.Go(testUDPConn(clientPort, 1024, time.Second*5))
 | |
| 	}
 | |
| 	if err := errGroup.Wait(); err != nil {
 | |
| 		t.Error(err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestShadowsocksAES128GCMUDPMux(t *testing.T) {
 | |
| 	udpServer := udp.Server{
 | |
| 		MsgProcessor: xor,
 | |
| 	}
 | |
| 	dest, err := udpServer.Start()
 | |
| 	common.Must(err)
 | |
| 	defer udpServer.Close()
 | |
| 
 | |
| 	account := serial.ToTypedMessage(&shadowsocks.Account{
 | |
| 		Password:   "shadowsocks-password",
 | |
| 		CipherType: shadowsocks.CipherType_AES_128_GCM,
 | |
| 	})
 | |
| 
 | |
| 	serverPort := tcp.PickPort()
 | |
| 	serverConfig := &core.Config{
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: clog.Severity_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(serverPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
 | |
| 					Users: []*protocol.User{{
 | |
| 						Account: account,
 | |
| 						Level:   1,
 | |
| 					}},
 | |
| 					Network: []net.Network{net.Network_TCP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	clientPort := udp.PickPort()
 | |
| 	clientConfig := &core.Config{
 | |
| 		App: []*serial.TypedMessage{
 | |
| 			serial.ToTypedMessage(&log.Config{
 | |
| 				ErrorLogLevel: clog.Severity_Debug,
 | |
| 				ErrorLogType:  log.LogType_Console,
 | |
| 			}),
 | |
| 		},
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(clientPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | |
| 					Address:  net.NewIPOrDomain(dest.Address),
 | |
| 					Port:     uint32(dest.Port),
 | |
| 					Networks: []net.Network{net.Network_UDP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{
 | |
| 					MultiplexSettings: &proxyman.MultiplexingConfig{
 | |
| 						Enabled:     true,
 | |
| 						Concurrency: 8,
 | |
| 					},
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
 | |
| 					Server: []*protocol.ServerEndpoint{
 | |
| 						{
 | |
| 							Address: net.NewIPOrDomain(net.LocalHostIP),
 | |
| 							Port:    uint32(serverPort),
 | |
| 							User: []*protocol.User{
 | |
| 								{
 | |
| 									Account: account,
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | |
| 	common.Must(err)
 | |
| 	defer CloseAllServers(servers)
 | |
| 
 | |
| 	var errGroup errgroup.Group
 | |
| 	for i := 0; i < 10; i++ {
 | |
| 		errGroup.Go(testUDPConn(clientPort, 1024, time.Second*5))
 | |
| 	}
 | |
| 	if err := errGroup.Wait(); err != nil {
 | |
| 		t.Error(err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestShadowsocksNone(t *testing.T) {
 | |
| 	tcpServer := tcp.Server{
 | |
| 		MsgProcessor: xor,
 | |
| 	}
 | |
| 	dest, err := tcpServer.Start()
 | |
| 	common.Must(err)
 | |
| 
 | |
| 	defer tcpServer.Close()
 | |
| 
 | |
| 	account := serial.ToTypedMessage(&shadowsocks.Account{
 | |
| 		Password:   "shadowsocks-password",
 | |
| 		CipherType: shadowsocks.CipherType_NONE,
 | |
| 	})
 | |
| 
 | |
| 	serverPort := tcp.PickPort()
 | |
| 	serverConfig := &core.Config{
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(serverPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
 | |
| 					Users: []*protocol.User{{
 | |
| 						Account: account,
 | |
| 						Level:   1,
 | |
| 					}},
 | |
| 					Network: []net.Network{net.Network_TCP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	clientPort := tcp.PickPort()
 | |
| 	clientConfig := &core.Config{
 | |
| 		Inbound: []*core.InboundHandlerConfig{
 | |
| 			{
 | |
| 				ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
 | |
| 					PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(clientPort)}},
 | |
| 					Listen:   net.NewIPOrDomain(net.LocalHostIP),
 | |
| 				}),
 | |
| 				ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
 | |
| 					Address:  net.NewIPOrDomain(dest.Address),
 | |
| 					Port:     uint32(dest.Port),
 | |
| 					Networks: []net.Network{net.Network_TCP},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 		Outbound: []*core.OutboundHandlerConfig{
 | |
| 			{
 | |
| 				ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
 | |
| 					Server: []*protocol.ServerEndpoint{
 | |
| 						{
 | |
| 							Address: net.NewIPOrDomain(net.LocalHostIP),
 | |
| 							Port:    uint32(serverPort),
 | |
| 							User: []*protocol.User{
 | |
| 								{
 | |
| 									Account: account,
 | |
| 								},
 | |
| 							},
 | |
| 						},
 | |
| 					},
 | |
| 				}),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	servers, err := InitializeServerConfigs(serverConfig, clientConfig)
 | |
| 	common.Must(err)
 | |
| 
 | |
| 	defer CloseAllServers(servers)
 | |
| 
 | |
| 	var errGroup errgroup.Group
 | |
| 	for i := 0; i < 10; i++ {
 | |
| 		errGroup.Go(testTCPConn(clientPort, 10240*1024, time.Second*20))
 | |
| 	}
 | |
| 
 | |
| 	if err := errGroup.Wait(); err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| }
 |