encoding_test.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155
  1. package encoding_test
  2. import (
  3. "testing"
  4. "v2ray.com/core/common"
  5. "v2ray.com/core/common/buf"
  6. "v2ray.com/core/common/net"
  7. "v2ray.com/core/common/protocol"
  8. "v2ray.com/core/common/serial"
  9. "v2ray.com/core/common/uuid"
  10. "v2ray.com/core/proxy/vmess"
  11. . "v2ray.com/core/proxy/vmess/encoding"
  12. . "v2ray.com/ext/assert"
  13. )
  14. func TestRequestSerialization(t *testing.T) {
  15. assert := With(t)
  16. user := &protocol.User{
  17. Level: 0,
  18. Email: "test@v2ray.com",
  19. }
  20. id := uuid.New()
  21. account := &vmess.Account{
  22. Id: id.String(),
  23. AlterId: 0,
  24. }
  25. user.Account = serial.ToTypedMessage(account)
  26. expectedRequest := &protocol.RequestHeader{
  27. Version: 1,
  28. User: user,
  29. Command: protocol.RequestCommandTCP,
  30. Address: net.DomainAddress("www.v2ray.com"),
  31. Port: net.Port(443),
  32. Security: protocol.SecurityType_AES128_GCM,
  33. }
  34. buffer := buf.New()
  35. client := NewClientSession(protocol.DefaultIDHash)
  36. common.Must(client.EncodeRequestHeader(expectedRequest, buffer))
  37. buffer2 := buf.New()
  38. buffer2.Write(buffer.Bytes())
  39. sessionHistory := NewSessionHistory()
  40. defer common.Close(sessionHistory)
  41. userValidator := vmess.NewTimedUserValidator(protocol.DefaultIDHash)
  42. userValidator.Add(user)
  43. defer common.Close(userValidator)
  44. server := NewServerSession(userValidator, sessionHistory)
  45. actualRequest, err := server.DecodeRequestHeader(buffer)
  46. assert(err, IsNil)
  47. assert(expectedRequest.Version, Equals, actualRequest.Version)
  48. assert(byte(expectedRequest.Command), Equals, byte(actualRequest.Command))
  49. assert(byte(expectedRequest.Option), Equals, byte(actualRequest.Option))
  50. assert(expectedRequest.Address, Equals, actualRequest.Address)
  51. assert(expectedRequest.Port, Equals, actualRequest.Port)
  52. assert(byte(expectedRequest.Security), Equals, byte(actualRequest.Security))
  53. _, err = server.DecodeRequestHeader(buffer2)
  54. // anti replay attack
  55. assert(err, IsNotNil)
  56. }
  57. func TestInvalidRequest(t *testing.T) {
  58. assert := With(t)
  59. user := &protocol.User{
  60. Level: 0,
  61. Email: "test@v2ray.com",
  62. }
  63. id := uuid.New()
  64. account := &vmess.Account{
  65. Id: id.String(),
  66. AlterId: 0,
  67. }
  68. user.Account = serial.ToTypedMessage(account)
  69. expectedRequest := &protocol.RequestHeader{
  70. Version: 1,
  71. User: user,
  72. Command: protocol.RequestCommand(100),
  73. Address: net.DomainAddress("www.v2ray.com"),
  74. Port: net.Port(443),
  75. Security: protocol.SecurityType_AES128_GCM,
  76. }
  77. buffer := buf.New()
  78. client := NewClientSession(protocol.DefaultIDHash)
  79. common.Must(client.EncodeRequestHeader(expectedRequest, buffer))
  80. buffer2 := buf.New()
  81. buffer2.Write(buffer.Bytes())
  82. sessionHistory := NewSessionHistory()
  83. defer common.Close(sessionHistory)
  84. userValidator := vmess.NewTimedUserValidator(protocol.DefaultIDHash)
  85. userValidator.Add(user)
  86. defer common.Close(userValidator)
  87. server := NewServerSession(userValidator, sessionHistory)
  88. _, err := server.DecodeRequestHeader(buffer)
  89. assert(err, IsNotNil)
  90. }
  91. func TestMuxRequest(t *testing.T) {
  92. assert := With(t)
  93. user := &protocol.User{
  94. Level: 0,
  95. Email: "test@v2ray.com",
  96. }
  97. id := uuid.New()
  98. account := &vmess.Account{
  99. Id: id.String(),
  100. AlterId: 0,
  101. }
  102. user.Account = serial.ToTypedMessage(account)
  103. expectedRequest := &protocol.RequestHeader{
  104. Version: 1,
  105. User: user,
  106. Command: protocol.RequestCommandMux,
  107. Security: protocol.SecurityType_AES128_GCM,
  108. }
  109. buffer := buf.New()
  110. client := NewClientSession(protocol.DefaultIDHash)
  111. common.Must(client.EncodeRequestHeader(expectedRequest, buffer))
  112. buffer2 := buf.New()
  113. buffer2.Write(buffer.Bytes())
  114. sessionHistory := NewSessionHistory()
  115. defer common.Close(sessionHistory)
  116. userValidator := vmess.NewTimedUserValidator(protocol.DefaultIDHash)
  117. userValidator.Add(user)
  118. defer common.Close(userValidator)
  119. server := NewServerSession(userValidator, sessionHistory)
  120. actualRequest, err := server.DecodeRequestHeader(buffer)
  121. assert(err, IsNil)
  122. assert(expectedRequest.Version, Equals, actualRequest.Version)
  123. assert(byte(expectedRequest.Command), Equals, byte(actualRequest.Command))
  124. assert(byte(expectedRequest.Option), Equals, byte(actualRequest.Option))
  125. assert(byte(expectedRequest.Security), Equals, byte(actualRequest.Security))
  126. }