dns_test.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. package scenarios
  2. import (
  3. "fmt"
  4. "testing"
  5. xproxy "golang.org/x/net/proxy"
  6. "v2ray.com/core"
  7. "v2ray.com/core/app/dns"
  8. "v2ray.com/core/app/proxyman"
  9. "v2ray.com/core/app/router"
  10. v2net "v2ray.com/core/common/net"
  11. "v2ray.com/core/common/serial"
  12. "v2ray.com/core/proxy/blackhole"
  13. "v2ray.com/core/proxy/freedom"
  14. "v2ray.com/core/proxy/socks"
  15. "v2ray.com/core/testing/assert"
  16. "v2ray.com/core/testing/servers/tcp"
  17. )
  18. func TestResolveIP(t *testing.T) {
  19. assert := assert.On(t)
  20. tcpServer := tcp.Server{
  21. MsgProcessor: xor,
  22. }
  23. dest, err := tcpServer.Start()
  24. assert.Error(err).IsNil()
  25. defer tcpServer.Close()
  26. serverPort := pickPort()
  27. serverConfig := &core.Config{
  28. App: []*serial.TypedMessage{
  29. serial.ToTypedMessage(&dns.Config{
  30. Hosts: map[string]*v2net.IPOrDomain{
  31. "google.com": v2net.NewIPOrDomain(dest.Address),
  32. },
  33. }),
  34. serial.ToTypedMessage(&router.Config{
  35. DomainStrategy: router.Config_IpIfNonMatch,
  36. Rule: []*router.RoutingRule{
  37. {
  38. Cidr: []*router.CIDR{
  39. {
  40. Ip: []byte{127, 0, 0, 0},
  41. Prefix: 8,
  42. },
  43. },
  44. Tag: "direct",
  45. },
  46. },
  47. }),
  48. },
  49. Inbound: []*proxyman.InboundHandlerConfig{
  50. {
  51. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  52. PortRange: v2net.SinglePortRange(serverPort),
  53. Listen: v2net.NewIPOrDomain(v2net.LocalHostIP),
  54. }),
  55. ProxySettings: serial.ToTypedMessage(&socks.ServerConfig{
  56. AuthType: socks.AuthType_NO_AUTH,
  57. Accounts: map[string]string{
  58. "Test Account": "Test Password",
  59. },
  60. Address: v2net.NewIPOrDomain(v2net.LocalHostIP),
  61. UdpEnabled: false,
  62. }),
  63. },
  64. },
  65. Outbound: []*proxyman.OutboundHandlerConfig{
  66. {
  67. ProxySettings: serial.ToTypedMessage(&blackhole.Config{}),
  68. },
  69. {
  70. Tag: "direct",
  71. ProxySettings: serial.ToTypedMessage(&freedom.Config{
  72. DomainStrategy: freedom.Config_USE_IP,
  73. }),
  74. },
  75. },
  76. }
  77. assert.Error(InitializeServerConfig(serverConfig)).IsNil()
  78. {
  79. noAuthDialer, err := xproxy.SOCKS5("tcp", v2net.TCPDestination(v2net.LocalHostIP, serverPort).NetAddr(), nil, xproxy.Direct)
  80. assert.Error(err).IsNil()
  81. conn, err := noAuthDialer.Dial("tcp", fmt.Sprintf("google.com:%d", dest.Port))
  82. assert.Error(err).IsNil()
  83. payload := "test payload"
  84. nBytes, err := conn.Write([]byte(payload))
  85. assert.Error(err).IsNil()
  86. assert.Int(nBytes).Equals(len(payload))
  87. response := make([]byte, 1024)
  88. nBytes, err = conn.Read(response)
  89. assert.Error(err).IsNil()
  90. assert.Bytes(response[:nBytes]).Equals(xor([]byte(payload)))
  91. assert.Error(conn.Close()).IsNil()
  92. }
  93. CloseAllServers()
  94. }