mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-15 01:09:20 +02:00
397 lines
9.7 KiB
Go
397 lines
9.7 KiB
Go
package scenarios
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"golang.org/x/sync/errgroup"
|
|
|
|
"github.com/xtls/xray-core/app/log"
|
|
"github.com/xtls/xray-core/app/policy"
|
|
"github.com/xtls/xray-core/app/proxyman"
|
|
"github.com/xtls/xray-core/app/reverse"
|
|
"github.com/xtls/xray-core/app/router"
|
|
"github.com/xtls/xray-core/common"
|
|
clog "github.com/xtls/xray-core/common/log"
|
|
"github.com/xtls/xray-core/common/matcher/domain"
|
|
"github.com/xtls/xray-core/common/net"
|
|
"github.com/xtls/xray-core/common/protocol"
|
|
"github.com/xtls/xray-core/common/serial"
|
|
"github.com/xtls/xray-core/common/uuid"
|
|
core "github.com/xtls/xray-core/core"
|
|
"github.com/xtls/xray-core/proxy/blackhole"
|
|
"github.com/xtls/xray-core/proxy/dokodemo"
|
|
"github.com/xtls/xray-core/proxy/freedom"
|
|
"github.com/xtls/xray-core/proxy/vmess"
|
|
"github.com/xtls/xray-core/proxy/vmess/inbound"
|
|
"github.com/xtls/xray-core/proxy/vmess/outbound"
|
|
"github.com/xtls/xray-core/testing/servers/tcp"
|
|
)
|
|
|
|
func TestReverseProxy(t *testing.T) {
|
|
tcpServer := tcp.Server{
|
|
MsgProcessor: xor,
|
|
}
|
|
dest, err := tcpServer.Start()
|
|
common.Must(err)
|
|
|
|
defer tcpServer.Close()
|
|
|
|
userID := protocol.NewID(uuid.New())
|
|
externalPort := tcp.PickPort()
|
|
reversePort := tcp.PickPort()
|
|
|
|
serverConfig := &core.Config{
|
|
App: []*serial.TypedMessage{
|
|
serial.ToTypedMessage(&reverse.Config{
|
|
PortalConfig: []*reverse.PortalConfig{
|
|
{
|
|
Tag: "portal",
|
|
Domain: "test.example.com",
|
|
},
|
|
},
|
|
}),
|
|
serial.ToTypedMessage(&router.Config{
|
|
Rule: []*router.RoutingRule{
|
|
{
|
|
Domain: []*domain.Domain{
|
|
{Type: domain.MatchingType_Full, Value: "test.example.com"},
|
|
},
|
|
TargetTag: &router.RoutingRule_Tag{
|
|
Tag: "portal",
|
|
},
|
|
},
|
|
{
|
|
InboundTag: []string{"external"},
|
|
TargetTag: &router.RoutingRule_Tag{
|
|
Tag: "portal",
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
},
|
|
Inbound: []*core.InboundHandlerConfig{
|
|
{
|
|
Tag: "external",
|
|
ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
|
|
PortRange: net.SinglePortRange(externalPort),
|
|
Listen: net.NewIPOrDomain(net.LocalHostIP),
|
|
}),
|
|
ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
|
|
Address: net.NewIPOrDomain(dest.Address),
|
|
Port: uint32(dest.Port),
|
|
NetworkList: &net.NetworkList{
|
|
Network: []net.Network{net.Network_TCP},
|
|
},
|
|
}),
|
|
},
|
|
{
|
|
ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
|
|
PortRange: net.SinglePortRange(reversePort),
|
|
Listen: net.NewIPOrDomain(net.LocalHostIP),
|
|
}),
|
|
ProxySettings: serial.ToTypedMessage(&inbound.Config{
|
|
User: []*protocol.User{
|
|
{
|
|
Account: serial.ToTypedMessage(&vmess.Account{
|
|
Id: userID.String(),
|
|
AlterId: 64,
|
|
}),
|
|
},
|
|
},
|
|
}),
|
|
},
|
|
},
|
|
Outbound: []*core.OutboundHandlerConfig{
|
|
{
|
|
ProxySettings: serial.ToTypedMessage(&blackhole.Config{}),
|
|
},
|
|
},
|
|
}
|
|
|
|
clientPort := tcp.PickPort()
|
|
clientConfig := &core.Config{
|
|
App: []*serial.TypedMessage{
|
|
serial.ToTypedMessage(&reverse.Config{
|
|
BridgeConfig: []*reverse.BridgeConfig{
|
|
{
|
|
Tag: "bridge",
|
|
Domain: "test.example.com",
|
|
},
|
|
},
|
|
}),
|
|
serial.ToTypedMessage(&router.Config{
|
|
Rule: []*router.RoutingRule{
|
|
{
|
|
Domain: []*domain.Domain{
|
|
{Type: domain.MatchingType_Full, Value: "test.example.com"},
|
|
},
|
|
TargetTag: &router.RoutingRule_Tag{
|
|
Tag: "reverse",
|
|
},
|
|
},
|
|
{
|
|
InboundTag: []string{"bridge"},
|
|
TargetTag: &router.RoutingRule_Tag{
|
|
Tag: "freedom",
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
},
|
|
Inbound: []*core.InboundHandlerConfig{
|
|
{
|
|
ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
|
|
PortRange: net.SinglePortRange(clientPort),
|
|
Listen: net.NewIPOrDomain(net.LocalHostIP),
|
|
}),
|
|
ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
|
|
Address: net.NewIPOrDomain(dest.Address),
|
|
Port: uint32(dest.Port),
|
|
NetworkList: &net.NetworkList{
|
|
Network: []net.Network{net.Network_TCP},
|
|
},
|
|
}),
|
|
},
|
|
},
|
|
Outbound: []*core.OutboundHandlerConfig{
|
|
{
|
|
Tag: "freedom",
|
|
ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
|
|
},
|
|
{
|
|
Tag: "reverse",
|
|
ProxySettings: serial.ToTypedMessage(&outbound.Config{
|
|
Receiver: []*protocol.ServerEndpoint{
|
|
{
|
|
Address: net.NewIPOrDomain(net.LocalHostIP),
|
|
Port: uint32(reversePort),
|
|
User: []*protocol.User{
|
|
{
|
|
Account: serial.ToTypedMessage(&vmess.Account{
|
|
Id: userID.String(),
|
|
AlterId: 64,
|
|
SecuritySettings: &protocol.SecurityConfig{
|
|
Type: protocol.SecurityType_AES128_GCM,
|
|
},
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
},
|
|
},
|
|
}
|
|
|
|
servers, err := InitializeServerConfigs(serverConfig, clientConfig)
|
|
common.Must(err)
|
|
|
|
defer CloseAllServers(servers)
|
|
|
|
var errg errgroup.Group
|
|
for i := 0; i < 32; i++ {
|
|
errg.Go(testTCPConn(externalPort, 10240*1024, time.Second*40))
|
|
}
|
|
|
|
if err := errg.Wait(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestReverseProxyLongRunning(t *testing.T) {
|
|
tcpServer := tcp.Server{
|
|
MsgProcessor: xor,
|
|
}
|
|
dest, err := tcpServer.Start()
|
|
common.Must(err)
|
|
|
|
defer tcpServer.Close()
|
|
|
|
userID := protocol.NewID(uuid.New())
|
|
externalPort := tcp.PickPort()
|
|
reversePort := tcp.PickPort()
|
|
|
|
serverConfig := &core.Config{
|
|
App: []*serial.TypedMessage{
|
|
serial.ToTypedMessage(&log.Config{
|
|
ErrorLogLevel: clog.Severity_Warning,
|
|
ErrorLogType: log.LogType_Console,
|
|
}),
|
|
serial.ToTypedMessage(&policy.Config{
|
|
Level: map[uint32]*policy.Policy{
|
|
0: {
|
|
Timeout: &policy.Policy_Timeout{
|
|
UplinkOnly: &policy.Second{Value: 0},
|
|
DownlinkOnly: &policy.Second{Value: 0},
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
serial.ToTypedMessage(&reverse.Config{
|
|
PortalConfig: []*reverse.PortalConfig{
|
|
{
|
|
Tag: "portal",
|
|
Domain: "test.example.com",
|
|
},
|
|
},
|
|
}),
|
|
serial.ToTypedMessage(&router.Config{
|
|
Rule: []*router.RoutingRule{
|
|
{
|
|
Domain: []*domain.Domain{
|
|
{Type: domain.MatchingType_Full, Value: "test.example.com"},
|
|
},
|
|
TargetTag: &router.RoutingRule_Tag{
|
|
Tag: "portal",
|
|
},
|
|
},
|
|
{
|
|
InboundTag: []string{"external"},
|
|
TargetTag: &router.RoutingRule_Tag{
|
|
Tag: "portal",
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
},
|
|
Inbound: []*core.InboundHandlerConfig{
|
|
{
|
|
Tag: "external",
|
|
ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
|
|
PortRange: net.SinglePortRange(externalPort),
|
|
Listen: net.NewIPOrDomain(net.LocalHostIP),
|
|
}),
|
|
ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
|
|
Address: net.NewIPOrDomain(dest.Address),
|
|
Port: uint32(dest.Port),
|
|
NetworkList: &net.NetworkList{
|
|
Network: []net.Network{net.Network_TCP},
|
|
},
|
|
}),
|
|
},
|
|
{
|
|
ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
|
|
PortRange: net.SinglePortRange(reversePort),
|
|
Listen: net.NewIPOrDomain(net.LocalHostIP),
|
|
}),
|
|
ProxySettings: serial.ToTypedMessage(&inbound.Config{
|
|
User: []*protocol.User{
|
|
{
|
|
Account: serial.ToTypedMessage(&vmess.Account{
|
|
Id: userID.String(),
|
|
AlterId: 64,
|
|
}),
|
|
},
|
|
},
|
|
}),
|
|
},
|
|
},
|
|
Outbound: []*core.OutboundHandlerConfig{
|
|
{
|
|
ProxySettings: serial.ToTypedMessage(&blackhole.Config{}),
|
|
},
|
|
},
|
|
}
|
|
|
|
clientPort := tcp.PickPort()
|
|
clientConfig := &core.Config{
|
|
App: []*serial.TypedMessage{
|
|
serial.ToTypedMessage(&log.Config{
|
|
ErrorLogLevel: clog.Severity_Warning,
|
|
ErrorLogType: log.LogType_Console,
|
|
}),
|
|
serial.ToTypedMessage(&policy.Config{
|
|
Level: map[uint32]*policy.Policy{
|
|
0: {
|
|
Timeout: &policy.Policy_Timeout{
|
|
UplinkOnly: &policy.Second{Value: 0},
|
|
DownlinkOnly: &policy.Second{Value: 0},
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
serial.ToTypedMessage(&reverse.Config{
|
|
BridgeConfig: []*reverse.BridgeConfig{
|
|
{
|
|
Tag: "bridge",
|
|
Domain: "test.example.com",
|
|
},
|
|
},
|
|
}),
|
|
serial.ToTypedMessage(&router.Config{
|
|
Rule: []*router.RoutingRule{
|
|
{
|
|
Domain: []*domain.Domain{
|
|
{Type: domain.MatchingType_Full, Value: "test.example.com"},
|
|
},
|
|
TargetTag: &router.RoutingRule_Tag{
|
|
Tag: "reverse",
|
|
},
|
|
},
|
|
{
|
|
InboundTag: []string{"bridge"},
|
|
TargetTag: &router.RoutingRule_Tag{
|
|
Tag: "freedom",
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
},
|
|
Inbound: []*core.InboundHandlerConfig{
|
|
{
|
|
ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
|
|
PortRange: net.SinglePortRange(clientPort),
|
|
Listen: net.NewIPOrDomain(net.LocalHostIP),
|
|
}),
|
|
ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
|
|
Address: net.NewIPOrDomain(dest.Address),
|
|
Port: uint32(dest.Port),
|
|
NetworkList: &net.NetworkList{
|
|
Network: []net.Network{net.Network_TCP},
|
|
},
|
|
}),
|
|
},
|
|
},
|
|
Outbound: []*core.OutboundHandlerConfig{
|
|
{
|
|
Tag: "freedom",
|
|
ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
|
|
},
|
|
{
|
|
Tag: "reverse",
|
|
ProxySettings: serial.ToTypedMessage(&outbound.Config{
|
|
Receiver: []*protocol.ServerEndpoint{
|
|
{
|
|
Address: net.NewIPOrDomain(net.LocalHostIP),
|
|
Port: uint32(reversePort),
|
|
User: []*protocol.User{
|
|
{
|
|
Account: serial.ToTypedMessage(&vmess.Account{
|
|
Id: userID.String(),
|
|
AlterId: 64,
|
|
SecuritySettings: &protocol.SecurityConfig{
|
|
Type: protocol.SecurityType_AES128_GCM,
|
|
},
|
|
}),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}),
|
|
},
|
|
},
|
|
}
|
|
|
|
servers, err := InitializeServerConfigs(serverConfig, clientConfig)
|
|
common.Must(err)
|
|
|
|
defer CloseAllServers(servers)
|
|
|
|
for i := 0; i < 4096; i++ {
|
|
if err := testTCPConn(externalPort, 1024, time.Second*20)(); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
}
|