mirror of https://github.com/v2ray/v2ray-core
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
68 lines
1.9 KiB
68 lines
1.9 KiB
package encoding_test |
|
|
|
import ( |
|
"testing" |
|
|
|
"v2ray.com/core/common" |
|
"v2ray.com/core/common/buf" |
|
"v2ray.com/core/common/net" |
|
"v2ray.com/core/common/protocol" |
|
"v2ray.com/core/common/serial" |
|
"v2ray.com/core/common/uuid" |
|
"v2ray.com/core/proxy/vmess" |
|
. "v2ray.com/core/proxy/vmess/encoding" |
|
. "v2ray.com/ext/assert" |
|
) |
|
|
|
func TestRequestSerialization(t *testing.T) { |
|
assert := With(t) |
|
|
|
user := &protocol.User{ |
|
Level: 0, |
|
Email: "test@v2ray.com", |
|
} |
|
id := uuid.New() |
|
account := &vmess.Account{ |
|
Id: id.String(), |
|
AlterId: 0, |
|
} |
|
user.Account = serial.ToTypedMessage(account) |
|
|
|
expectedRequest := &protocol.RequestHeader{ |
|
Version: 1, |
|
User: user, |
|
Command: protocol.RequestCommandTCP, |
|
Address: net.DomainAddress("www.v2ray.com"), |
|
Port: net.Port(443), |
|
Security: protocol.Security(protocol.SecurityType_AES128_GCM), |
|
} |
|
|
|
buffer := buf.New() |
|
client := NewClientSession(protocol.DefaultIDHash) |
|
common.Must(client.EncodeRequestHeader(expectedRequest, buffer)) |
|
|
|
buffer2 := buf.New() |
|
buffer2.Append(buffer.Bytes()) |
|
|
|
sessionHistory := NewSessionHistory() |
|
defer common.Close(sessionHistory) |
|
|
|
userValidator := vmess.NewTimedUserValidator(protocol.DefaultIDHash) |
|
userValidator.Add(user) |
|
defer common.Close(userValidator) |
|
|
|
server := NewServerSession(userValidator, sessionHistory) |
|
actualRequest, err := server.DecodeRequestHeader(buffer) |
|
assert(err, IsNil) |
|
|
|
assert(expectedRequest.Version, Equals, actualRequest.Version) |
|
assert(byte(expectedRequest.Command), Equals, byte(actualRequest.Command)) |
|
assert(byte(expectedRequest.Option), Equals, byte(actualRequest.Option)) |
|
assert(expectedRequest.Address, Equals, actualRequest.Address) |
|
assert(expectedRequest.Port, Equals, actualRequest.Port) |
|
assert(byte(expectedRequest.Security), Equals, byte(actualRequest.Security)) |
|
|
|
_, err = server.DecodeRequestHeader(buffer2) |
|
// anti replay attack |
|
assert(err, IsNotNil) |
|
}
|
|
|