mirror of https://github.com/v2ray/v2ray-core
				
				
				
			
		
			
				
	
	
		
			238 lines
		
	
	
		
			6.2 KiB
		
	
	
	
		
			Go
		
	
	
			
		
		
	
	
			238 lines
		
	
	
		
			6.2 KiB
		
	
	
	
		
			Go
		
	
	
| package socks_test
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"fmt"
 | |
| 	"io/ioutil"
 | |
| 	"net"
 | |
| 	"testing"
 | |
| 
 | |
| 	"golang.org/x/net/proxy"
 | |
| 
 | |
| 	"github.com/v2ray/v2ray-core/app"
 | |
| 	v2nettesting "github.com/v2ray/v2ray-core/common/net/testing"
 | |
| 	v2proxy "github.com/v2ray/v2ray-core/proxy"
 | |
| 	proxytesting "github.com/v2ray/v2ray-core/proxy/testing"
 | |
| 	proxymocks "github.com/v2ray/v2ray-core/proxy/testing/mocks"
 | |
| 	"github.com/v2ray/v2ray-core/shell/point"
 | |
| 	v2testing "github.com/v2ray/v2ray-core/testing"
 | |
| 	"github.com/v2ray/v2ray-core/testing/assert"
 | |
| )
 | |
| 
 | |
| func TestSocksTcpConnect(t *testing.T) {
 | |
| 	v2testing.Current(t)
 | |
| 	port := v2nettesting.PickPort()
 | |
| 
 | |
| 	connInput := []byte("The data to be returned to socks server.")
 | |
| 	connOutput := bytes.NewBuffer(make([]byte, 0, 1024))
 | |
| 	och := &proxymocks.OutboundConnectionHandler{
 | |
| 		ConnOutput: connOutput,
 | |
| 		ConnInput:  bytes.NewReader(connInput),
 | |
| 	}
 | |
| 
 | |
| 	protocol, err := proxytesting.RegisterOutboundConnectionHandlerCreator("mock_och", func(space app.Space, config interface{}) (v2proxy.OutboundHandler, error) {
 | |
| 		return och, nil
 | |
| 	})
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	config := &point.Config{
 | |
| 		Port: port,
 | |
| 		InboundConfig: &point.ConnectionConfig{
 | |
| 			Protocol: "socks",
 | |
| 			Settings: []byte(`
 | |
|       {
 | |
|         "auth": "noauth"
 | |
|       }`),
 | |
| 		},
 | |
| 		OutboundConfig: &point.ConnectionConfig{
 | |
| 			Protocol: protocol,
 | |
| 			Settings: nil,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	point, err := point.NewPoint(config)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	err = point.Start()
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	socks5Client, err := proxy.SOCKS5("tcp", fmt.Sprintf("127.0.0.1:%d", port), nil, proxy.Direct)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	targetServer := "google.com:80"
 | |
| 	conn, err := socks5Client.Dial("tcp", targetServer)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	data2Send := "The data to be sent to remote server."
 | |
| 	conn.Write([]byte(data2Send))
 | |
| 	if tcpConn, ok := conn.(*net.TCPConn); ok {
 | |
| 		tcpConn.CloseWrite()
 | |
| 	}
 | |
| 
 | |
| 	dataReturned, err := ioutil.ReadAll(conn)
 | |
| 	assert.Error(err).IsNil()
 | |
| 	conn.Close()
 | |
| 
 | |
| 	assert.Bytes([]byte(data2Send)).Equals(connOutput.Bytes())
 | |
| 	assert.Bytes(dataReturned).Equals(connInput)
 | |
| 	assert.StringLiteral(targetServer).Equals(och.Destination.NetAddr())
 | |
| }
 | |
| 
 | |
| func TestSocksTcpConnectWithUserPass(t *testing.T) {
 | |
| 	v2testing.Current(t)
 | |
| 	port := v2nettesting.PickPort()
 | |
| 
 | |
| 	connInput := []byte("The data to be returned to socks server.")
 | |
| 	connOutput := bytes.NewBuffer(make([]byte, 0, 1024))
 | |
| 	och := &proxymocks.OutboundConnectionHandler{
 | |
| 		ConnInput:  bytes.NewReader(connInput),
 | |
| 		ConnOutput: connOutput,
 | |
| 	}
 | |
| 
 | |
| 	protocol, err := proxytesting.RegisterOutboundConnectionHandlerCreator("mock_och", func(space app.Space, config interface{}) (v2proxy.OutboundHandler, error) {
 | |
| 		return och, nil
 | |
| 	})
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	config := &point.Config{
 | |
| 		Port: port,
 | |
| 		InboundConfig: &point.ConnectionConfig{
 | |
| 			Protocol: "socks",
 | |
| 			Settings: []byte(`
 | |
|       {
 | |
|         "auth": "password",
 | |
|         "accounts": [
 | |
|           {"user": "userx", "pass": "passy"}
 | |
|         ]
 | |
|       }`),
 | |
| 		},
 | |
| 		OutboundConfig: &point.ConnectionConfig{
 | |
| 			Protocol: protocol,
 | |
| 			Settings: nil,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	point, err := point.NewPoint(config)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	err = point.Start()
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	socks5Client, err := proxy.SOCKS5("tcp", fmt.Sprintf("127.0.0.1:%d", port), &proxy.Auth{"userx", "passy"}, proxy.Direct)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	targetServer := "1.2.3.4:443"
 | |
| 	conn, err := socks5Client.Dial("tcp", targetServer)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	data2Send := "The data to be sent to remote server."
 | |
| 	conn.Write([]byte(data2Send))
 | |
| 	if tcpConn, ok := conn.(*net.TCPConn); ok {
 | |
| 		tcpConn.CloseWrite()
 | |
| 	}
 | |
| 
 | |
| 	dataReturned, err := ioutil.ReadAll(conn)
 | |
| 	assert.Error(err).IsNil()
 | |
| 	conn.Close()
 | |
| 
 | |
| 	assert.Bytes([]byte(data2Send)).Equals(connOutput.Bytes())
 | |
| 	assert.Bytes(dataReturned).Equals(connInput)
 | |
| 	assert.StringLiteral(targetServer).Equals(och.Destination.NetAddr())
 | |
| }
 | |
| 
 | |
| func TestSocksTcpConnectWithWrongUserPass(t *testing.T) {
 | |
| 	v2testing.Current(t)
 | |
| 	port := v2nettesting.PickPort()
 | |
| 
 | |
| 	connInput := []byte("The data to be returned to socks server.")
 | |
| 	connOutput := bytes.NewBuffer(make([]byte, 0, 1024))
 | |
| 	och := &proxymocks.OutboundConnectionHandler{
 | |
| 		ConnInput:  bytes.NewReader(connInput),
 | |
| 		ConnOutput: connOutput,
 | |
| 	}
 | |
| 
 | |
| 	protocol, err := proxytesting.RegisterOutboundConnectionHandlerCreator("mock_och", func(space app.Space, config interface{}) (v2proxy.OutboundHandler, error) {
 | |
| 		return och, nil
 | |
| 	})
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	config := &point.Config{
 | |
| 		Port: port,
 | |
| 		InboundConfig: &point.ConnectionConfig{
 | |
| 			Protocol: "socks",
 | |
| 			Settings: []byte(`
 | |
|       {
 | |
|         "auth": "password",
 | |
|         "accounts": [
 | |
|           {"user": "userx", "pass": "passy"}
 | |
|         ]
 | |
|       }`),
 | |
| 		},
 | |
| 		OutboundConfig: &point.ConnectionConfig{
 | |
| 			Protocol: protocol,
 | |
| 			Settings: nil,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	point, err := point.NewPoint(config)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	err = point.Start()
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	socks5Client, err := proxy.SOCKS5("tcp", fmt.Sprintf("127.0.0.1:%d", port), &proxy.Auth{"userx", "passz"}, proxy.Direct)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	targetServer := "1.2.3.4:443"
 | |
| 	_, err = socks5Client.Dial("tcp", targetServer)
 | |
| 	assert.Error(err).IsNotNil()
 | |
| }
 | |
| 
 | |
| func TestSocksTcpConnectWithWrongAuthMethod(t *testing.T) {
 | |
| 	v2testing.Current(t)
 | |
| 	port := v2nettesting.PickPort()
 | |
| 
 | |
| 	connInput := []byte("The data to be returned to socks server.")
 | |
| 	connOutput := bytes.NewBuffer(make([]byte, 0, 1024))
 | |
| 	och := &proxymocks.OutboundConnectionHandler{
 | |
| 		ConnInput:  bytes.NewReader(connInput),
 | |
| 		ConnOutput: connOutput,
 | |
| 	}
 | |
| 
 | |
| 	protocol, err := proxytesting.RegisterOutboundConnectionHandlerCreator("mock_och", func(space app.Space, config interface{}) (v2proxy.OutboundHandler, error) {
 | |
| 		return och, nil
 | |
| 	})
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	config := &point.Config{
 | |
| 		Port: port,
 | |
| 		InboundConfig: &point.ConnectionConfig{
 | |
| 			Protocol: "socks",
 | |
| 			Settings: []byte(`
 | |
|       {
 | |
|         "auth": "password",
 | |
|         "accounts": [
 | |
|           {"user": "userx", "pass": "passy"}
 | |
|         ]
 | |
|       }`),
 | |
| 		},
 | |
| 		OutboundConfig: &point.ConnectionConfig{
 | |
| 			Protocol: protocol,
 | |
| 			Settings: nil,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	point, err := point.NewPoint(config)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	err = point.Start()
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	socks5Client, err := proxy.SOCKS5("tcp", fmt.Sprintf("127.0.0.1:%d", port), nil, proxy.Direct)
 | |
| 	assert.Error(err).IsNil()
 | |
| 
 | |
| 	targetServer := "1.2.3.4:443"
 | |
| 	_, err = socks5Client.Dial("tcp", targetServer)
 | |
| 	assert.Error(err).IsNotNil()
 | |
| }
 |