mirror of https://github.com/v2ray/v2ray-core
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
69 lines
1.9 KiB
69 lines
1.9 KiB
package encoding_test
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"v2ray.com/core/common/buf"
|
|
v2net "v2ray.com/core/common/net"
|
|
"v2ray.com/core/common/protocol"
|
|
"v2ray.com/core/common/serial"
|
|
"v2ray.com/core/common/uuid"
|
|
"v2ray.com/core/proxy/vmess"
|
|
. "v2ray.com/core/proxy/vmess/encoding"
|
|
"v2ray.com/core/testing/assert"
|
|
)
|
|
|
|
func TestRequestSerialization(t *testing.T) {
|
|
assert := assert.On(t)
|
|
|
|
user := &protocol.User{
|
|
Level: 0,
|
|
Email: "test@v2ray.com",
|
|
}
|
|
account := &vmess.Account{
|
|
Id: uuid.New().String(),
|
|
AlterId: 0,
|
|
}
|
|
user.Account = serial.ToTypedMessage(account)
|
|
|
|
expectedRequest := &protocol.RequestHeader{
|
|
Version: 1,
|
|
User: user,
|
|
Command: protocol.RequestCommandTCP,
|
|
Address: v2net.DomainAddress("www.v2ray.com"),
|
|
Port: v2net.Port(443),
|
|
Security: protocol.Security(protocol.SecurityType_AES128_GCM),
|
|
}
|
|
|
|
buffer := buf.New()
|
|
client := NewClientSession(protocol.DefaultIDHash)
|
|
client.EncodeRequestHeader(expectedRequest, buffer)
|
|
|
|
buffer2 := buf.New()
|
|
buffer2.Append(buffer.Bytes())
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
sessionHistory := NewSessionHistory(ctx)
|
|
|
|
userValidator := vmess.NewTimedUserValidator(ctx, protocol.DefaultIDHash)
|
|
userValidator.Add(user)
|
|
|
|
server := NewServerSession(userValidator, sessionHistory)
|
|
actualRequest, err := server.DecodeRequestHeader(buffer)
|
|
assert.Error(err).IsNil()
|
|
|
|
assert.Byte(expectedRequest.Version).Equals(actualRequest.Version)
|
|
assert.Byte(byte(expectedRequest.Command)).Equals(byte(actualRequest.Command))
|
|
assert.Byte(byte(expectedRequest.Option)).Equals(byte(actualRequest.Option))
|
|
assert.Address(expectedRequest.Address).Equals(actualRequest.Address)
|
|
assert.Port(expectedRequest.Port).Equals(actualRequest.Port)
|
|
assert.Byte(byte(expectedRequest.Security)).Equals(byte(actualRequest.Security))
|
|
|
|
_, err = server.DecodeRequestHeader(buffer2)
|
|
// anti replay attack
|
|
assert.Error(err).IsNotNil()
|
|
|
|
cancel()
|
|
}
|