shadowsocks_test.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257
  1. package scenarios
  2. import (
  3. "crypto/rand"
  4. "net"
  5. "sync"
  6. "testing"
  7. "time"
  8. "v2ray.com/core"
  9. "v2ray.com/core/app/log"
  10. "v2ray.com/core/app/proxyman"
  11. v2net "v2ray.com/core/common/net"
  12. "v2ray.com/core/common/protocol"
  13. "v2ray.com/core/common/serial"
  14. "v2ray.com/core/proxy/dokodemo"
  15. "v2ray.com/core/proxy/freedom"
  16. "v2ray.com/core/proxy/shadowsocks"
  17. "v2ray.com/core/testing/assert"
  18. "v2ray.com/core/testing/servers/tcp"
  19. )
  20. func TestShadowsocksAES256TCP(t *testing.T) {
  21. assert := assert.On(t)
  22. tcpServer := tcp.Server{
  23. MsgProcessor: xor,
  24. }
  25. dest, err := tcpServer.Start()
  26. assert.Error(err).IsNil()
  27. defer tcpServer.Close()
  28. account := serial.ToTypedMessage(&shadowsocks.Account{
  29. Password: "shadowsocks-password",
  30. CipherType: shadowsocks.CipherType_AES_256_CFB,
  31. Ota: shadowsocks.Account_Enabled,
  32. })
  33. serverPort := pickPort()
  34. serverConfig := &core.Config{
  35. Inbound: []*proxyman.InboundHandlerConfig{
  36. {
  37. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  38. PortRange: v2net.SinglePortRange(serverPort),
  39. Listen: v2net.NewIPOrDomain(v2net.LocalHostIP),
  40. }),
  41. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  42. User: &protocol.User{
  43. Account: account,
  44. Level: 1,
  45. },
  46. }),
  47. },
  48. },
  49. Outbound: []*proxyman.OutboundHandlerConfig{
  50. {
  51. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  52. },
  53. },
  54. App: []*serial.TypedMessage{
  55. serial.ToTypedMessage(&log.Config{
  56. ErrorLogLevel: log.LogLevel_Debug,
  57. ErrorLogType: log.LogType_Console,
  58. }),
  59. },
  60. }
  61. clientPort := pickPort()
  62. clientConfig := &core.Config{
  63. Inbound: []*proxyman.InboundHandlerConfig{
  64. {
  65. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  66. PortRange: v2net.SinglePortRange(clientPort),
  67. Listen: v2net.NewIPOrDomain(v2net.LocalHostIP),
  68. }),
  69. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  70. Address: v2net.NewIPOrDomain(dest.Address),
  71. Port: uint32(dest.Port),
  72. NetworkList: &v2net.NetworkList{
  73. Network: []v2net.Network{v2net.Network_TCP},
  74. },
  75. }),
  76. },
  77. },
  78. Outbound: []*proxyman.OutboundHandlerConfig{
  79. {
  80. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  81. Server: []*protocol.ServerEndpoint{
  82. {
  83. Address: v2net.NewIPOrDomain(v2net.LocalHostIP),
  84. Port: uint32(serverPort),
  85. User: []*protocol.User{
  86. {
  87. Account: account,
  88. },
  89. },
  90. },
  91. },
  92. }),
  93. },
  94. },
  95. App: []*serial.TypedMessage{
  96. serial.ToTypedMessage(&log.Config{
  97. ErrorLogLevel: log.LogLevel_Debug,
  98. ErrorLogType: log.LogType_Console,
  99. }),
  100. },
  101. }
  102. assert.Error(InitializeServerConfig(serverConfig)).IsNil()
  103. assert.Error(InitializeServerConfig(clientConfig)).IsNil()
  104. var wg sync.WaitGroup
  105. wg.Add(10)
  106. for i := 0; i < 10; i++ {
  107. go func() {
  108. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  109. IP: []byte{127, 0, 0, 1},
  110. Port: int(clientPort),
  111. })
  112. assert.Error(err).IsNil()
  113. payload := make([]byte, 10240*1024)
  114. rand.Read(payload)
  115. nBytes, err := conn.Write([]byte(payload))
  116. assert.Error(err).IsNil()
  117. assert.Int(nBytes).Equals(len(payload))
  118. response := readFrom(conn, time.Second*20, 10240*1024)
  119. assert.Bytes(response).Equals(xor([]byte(payload)))
  120. assert.Error(conn.Close()).IsNil()
  121. wg.Done()
  122. }()
  123. }
  124. wg.Wait()
  125. CloseAllServers()
  126. }
  127. func TestShadowsocksChacha20TCP(t *testing.T) {
  128. assert := assert.On(t)
  129. tcpServer := tcp.Server{
  130. MsgProcessor: xor,
  131. }
  132. dest, err := tcpServer.Start()
  133. assert.Error(err).IsNil()
  134. defer tcpServer.Close()
  135. account := serial.ToTypedMessage(&shadowsocks.Account{
  136. Password: "shadowsocks-password",
  137. CipherType: shadowsocks.CipherType_CHACHA20_IETF,
  138. Ota: shadowsocks.Account_Enabled,
  139. })
  140. serverPort := pickPort()
  141. serverConfig := &core.Config{
  142. Inbound: []*proxyman.InboundHandlerConfig{
  143. {
  144. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  145. PortRange: v2net.SinglePortRange(serverPort),
  146. Listen: v2net.NewIPOrDomain(v2net.LocalHostIP),
  147. }),
  148. ProxySettings: serial.ToTypedMessage(&shadowsocks.ServerConfig{
  149. User: &protocol.User{
  150. Account: account,
  151. Level: 1,
  152. },
  153. }),
  154. },
  155. },
  156. Outbound: []*proxyman.OutboundHandlerConfig{
  157. {
  158. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  159. },
  160. },
  161. App: []*serial.TypedMessage{
  162. serial.ToTypedMessage(&log.Config{
  163. ErrorLogLevel: log.LogLevel_Debug,
  164. ErrorLogType: log.LogType_Console,
  165. }),
  166. },
  167. }
  168. clientPort := pickPort()
  169. clientConfig := &core.Config{
  170. Inbound: []*proxyman.InboundHandlerConfig{
  171. {
  172. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  173. PortRange: v2net.SinglePortRange(clientPort),
  174. Listen: v2net.NewIPOrDomain(v2net.LocalHostIP),
  175. }),
  176. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  177. Address: v2net.NewIPOrDomain(dest.Address),
  178. Port: uint32(dest.Port),
  179. NetworkList: &v2net.NetworkList{
  180. Network: []v2net.Network{v2net.Network_TCP},
  181. },
  182. }),
  183. },
  184. },
  185. Outbound: []*proxyman.OutboundHandlerConfig{
  186. {
  187. ProxySettings: serial.ToTypedMessage(&shadowsocks.ClientConfig{
  188. Server: []*protocol.ServerEndpoint{
  189. {
  190. Address: v2net.NewIPOrDomain(v2net.LocalHostIP),
  191. Port: uint32(serverPort),
  192. User: []*protocol.User{
  193. {
  194. Account: account,
  195. },
  196. },
  197. },
  198. },
  199. }),
  200. },
  201. },
  202. App: []*serial.TypedMessage{
  203. serial.ToTypedMessage(&log.Config{
  204. ErrorLogLevel: log.LogLevel_Debug,
  205. ErrorLogType: log.LogType_Console,
  206. }),
  207. },
  208. }
  209. assert.Error(InitializeServerConfig(serverConfig)).IsNil()
  210. assert.Error(InitializeServerConfig(clientConfig)).IsNil()
  211. var wg sync.WaitGroup
  212. wg.Add(10)
  213. for i := 0; i < 10; i++ {
  214. go func() {
  215. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  216. IP: []byte{127, 0, 0, 1},
  217. Port: int(clientPort),
  218. })
  219. assert.Error(err).IsNil()
  220. payload := make([]byte, 10240*1024)
  221. rand.Read(payload)
  222. nBytes, err := conn.Write([]byte(payload))
  223. assert.Error(err).IsNil()
  224. assert.Int(nBytes).Equals(len(payload))
  225. response := readFrom(conn, time.Second*20, 10240*1024)
  226. assert.Bytes(response).Equals(xor([]byte(payload)))
  227. assert.Error(conn.Close()).IsNil()
  228. wg.Done()
  229. }()
  230. }
  231. wg.Wait()
  232. CloseAllServers()
  233. }