dns_test.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. package scenarios
  2. import (
  3. "fmt"
  4. "testing"
  5. xproxy "golang.org/x/net/proxy"
  6. "v2ray.com/core"
  7. "v2ray.com/core/app/dns"
  8. "v2ray.com/core/app/proxyman"
  9. "v2ray.com/core/app/router"
  10. "v2ray.com/core/common/net"
  11. "v2ray.com/core/common/serial"
  12. "v2ray.com/core/proxy/blackhole"
  13. "v2ray.com/core/proxy/freedom"
  14. "v2ray.com/core/proxy/socks"
  15. "v2ray.com/core/testing/servers/tcp"
  16. . "v2ray.com/ext/assert"
  17. )
  18. func TestResolveIP(t *testing.T) {
  19. assert := With(t)
  20. tcpServer := tcp.Server{
  21. MsgProcessor: xor,
  22. }
  23. dest, err := tcpServer.Start()
  24. assert(err, IsNil)
  25. defer tcpServer.Close()
  26. serverPort := tcp.PickPort()
  27. serverConfig := &core.Config{
  28. App: []*serial.TypedMessage{
  29. serial.ToTypedMessage(&dns.Config{
  30. Hosts: map[string]*net.IPOrDomain{
  31. "google.com": net.NewIPOrDomain(dest.Address),
  32. },
  33. }),
  34. serial.ToTypedMessage(&router.Config{
  35. DomainStrategy: router.Config_IpIfNonMatch,
  36. Rule: []*router.RoutingRule{
  37. {
  38. Cidr: []*router.CIDR{
  39. {
  40. Ip: []byte{127, 0, 0, 0},
  41. Prefix: 8,
  42. },
  43. },
  44. TargetTag: &router.RoutingRule_Tag{
  45. Tag: "direct",
  46. },
  47. },
  48. },
  49. }),
  50. },
  51. Inbound: []*core.InboundHandlerConfig{
  52. {
  53. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  54. PortRange: net.SinglePortRange(serverPort),
  55. Listen: net.NewIPOrDomain(net.LocalHostIP),
  56. }),
  57. ProxySettings: serial.ToTypedMessage(&socks.ServerConfig{
  58. AuthType: socks.AuthType_NO_AUTH,
  59. Accounts: map[string]string{
  60. "Test Account": "Test Password",
  61. },
  62. Address: net.NewIPOrDomain(net.LocalHostIP),
  63. UdpEnabled: false,
  64. }),
  65. },
  66. },
  67. Outbound: []*core.OutboundHandlerConfig{
  68. {
  69. ProxySettings: serial.ToTypedMessage(&blackhole.Config{}),
  70. },
  71. {
  72. Tag: "direct",
  73. ProxySettings: serial.ToTypedMessage(&freedom.Config{
  74. DomainStrategy: freedom.Config_USE_IP,
  75. }),
  76. },
  77. },
  78. }
  79. servers, err := InitializeServerConfigs(serverConfig)
  80. assert(err, IsNil)
  81. {
  82. noAuthDialer, err := xproxy.SOCKS5("tcp", net.TCPDestination(net.LocalHostIP, serverPort).NetAddr(), nil, xproxy.Direct)
  83. assert(err, IsNil)
  84. conn, err := noAuthDialer.Dial("tcp", fmt.Sprintf("google.com:%d", dest.Port))
  85. assert(err, IsNil)
  86. payload := "test payload"
  87. nBytes, err := conn.Write([]byte(payload))
  88. assert(err, IsNil)
  89. assert(nBytes, Equals, len(payload))
  90. response := make([]byte, 1024)
  91. nBytes, err = conn.Read(response)
  92. assert(err, IsNil)
  93. assert(response[:nBytes], Equals, xor([]byte(payload)))
  94. assert(conn.Close(), IsNil)
  95. }
  96. CloseAllServers(servers)
  97. }