command_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555
  1. package scenarios
  2. import (
  3. "context"
  4. "crypto/rand"
  5. "fmt"
  6. "io"
  7. "testing"
  8. "time"
  9. "google.golang.org/grpc"
  10. "v2ray.com/core"
  11. "v2ray.com/core/app/commander"
  12. "v2ray.com/core/app/policy"
  13. "v2ray.com/core/app/proxyman"
  14. "v2ray.com/core/app/proxyman/command"
  15. "v2ray.com/core/app/router"
  16. "v2ray.com/core/app/stats"
  17. statscmd "v2ray.com/core/app/stats/command"
  18. "v2ray.com/core/common/compare"
  19. "v2ray.com/core/common/net"
  20. "v2ray.com/core/common/protocol"
  21. "v2ray.com/core/common/serial"
  22. "v2ray.com/core/common/uuid"
  23. "v2ray.com/core/proxy/dokodemo"
  24. "v2ray.com/core/proxy/freedom"
  25. "v2ray.com/core/proxy/vmess"
  26. "v2ray.com/core/proxy/vmess/inbound"
  27. "v2ray.com/core/proxy/vmess/outbound"
  28. "v2ray.com/core/testing/servers/tcp"
  29. . "v2ray.com/ext/assert"
  30. )
  31. func TestCommanderRemoveHandler(t *testing.T) {
  32. assert := With(t)
  33. tcpServer := tcp.Server{
  34. MsgProcessor: xor,
  35. }
  36. dest, err := tcpServer.Start()
  37. assert(err, IsNil)
  38. defer tcpServer.Close()
  39. clientPort := tcp.PickPort()
  40. cmdPort := tcp.PickPort()
  41. clientConfig := &core.Config{
  42. App: []*serial.TypedMessage{
  43. serial.ToTypedMessage(&commander.Config{
  44. Tag: "api",
  45. Service: []*serial.TypedMessage{
  46. serial.ToTypedMessage(&command.Config{}),
  47. },
  48. }),
  49. serial.ToTypedMessage(&router.Config{
  50. Rule: []*router.RoutingRule{
  51. {
  52. InboundTag: []string{"api"},
  53. TargetTag: &router.RoutingRule_Tag{
  54. Tag: "api",
  55. },
  56. },
  57. },
  58. }),
  59. },
  60. Inbound: []*core.InboundHandlerConfig{
  61. {
  62. Tag: "d",
  63. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  64. PortRange: net.SinglePortRange(clientPort),
  65. Listen: net.NewIPOrDomain(net.LocalHostIP),
  66. }),
  67. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  68. Address: net.NewIPOrDomain(dest.Address),
  69. Port: uint32(dest.Port),
  70. NetworkList: &net.NetworkList{
  71. Network: []net.Network{net.Network_TCP},
  72. },
  73. }),
  74. },
  75. {
  76. Tag: "api",
  77. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  78. PortRange: net.SinglePortRange(cmdPort),
  79. Listen: net.NewIPOrDomain(net.LocalHostIP),
  80. }),
  81. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  82. Address: net.NewIPOrDomain(dest.Address),
  83. Port: uint32(dest.Port),
  84. NetworkList: &net.NetworkList{
  85. Network: []net.Network{net.Network_TCP},
  86. },
  87. }),
  88. },
  89. },
  90. Outbound: []*core.OutboundHandlerConfig{
  91. {
  92. Tag: "default-outbound",
  93. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  94. },
  95. },
  96. }
  97. servers, err := InitializeServerConfigs(clientConfig)
  98. assert(err, IsNil)
  99. defer CloseAllServers(servers)
  100. {
  101. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  102. IP: []byte{127, 0, 0, 1},
  103. Port: int(clientPort),
  104. })
  105. if err != nil {
  106. t.Fatal(err)
  107. }
  108. defer conn.Close() // nolint: errcheck
  109. payload := "commander request."
  110. nBytes, err := conn.Write([]byte(payload))
  111. assert(err, IsNil)
  112. assert(nBytes, Equals, len(payload))
  113. response := make([]byte, 1024)
  114. nBytes, err = conn.Read(response)
  115. assert(err, IsNil)
  116. if err := compare.BytesEqualWithDetail(response[:nBytes], xor([]byte(payload))); err != nil {
  117. t.Fatal(err)
  118. }
  119. }
  120. cmdConn, err := grpc.Dial(fmt.Sprintf("127.0.0.1:%d", cmdPort), grpc.WithInsecure(), grpc.WithBlock())
  121. assert(err, IsNil)
  122. defer cmdConn.Close()
  123. hsClient := command.NewHandlerServiceClient(cmdConn)
  124. resp, err := hsClient.RemoveInbound(context.Background(), &command.RemoveInboundRequest{
  125. Tag: "d",
  126. })
  127. assert(err, IsNil)
  128. assert(resp, IsNotNil)
  129. {
  130. _, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  131. IP: []byte{127, 0, 0, 1},
  132. Port: int(clientPort),
  133. })
  134. assert(err, IsNotNil)
  135. }
  136. }
  137. func TestCommanderAddRemoveUser(t *testing.T) {
  138. assert := With(t)
  139. tcpServer := tcp.Server{
  140. MsgProcessor: xor,
  141. }
  142. dest, err := tcpServer.Start()
  143. assert(err, IsNil)
  144. defer tcpServer.Close()
  145. u1 := protocol.NewID(uuid.New())
  146. u2 := protocol.NewID(uuid.New())
  147. cmdPort := tcp.PickPort()
  148. serverPort := tcp.PickPort()
  149. serverConfig := &core.Config{
  150. App: []*serial.TypedMessage{
  151. serial.ToTypedMessage(&commander.Config{
  152. Tag: "api",
  153. Service: []*serial.TypedMessage{
  154. serial.ToTypedMessage(&command.Config{}),
  155. },
  156. }),
  157. serial.ToTypedMessage(&router.Config{
  158. Rule: []*router.RoutingRule{
  159. {
  160. InboundTag: []string{"api"},
  161. TargetTag: &router.RoutingRule_Tag{
  162. Tag: "api",
  163. },
  164. },
  165. },
  166. }),
  167. serial.ToTypedMessage(&policy.Config{
  168. Level: map[uint32]*policy.Policy{
  169. 0: {
  170. Timeout: &policy.Policy_Timeout{
  171. UplinkOnly: &policy.Second{Value: 0},
  172. DownlinkOnly: &policy.Second{Value: 0},
  173. },
  174. },
  175. },
  176. }),
  177. },
  178. Inbound: []*core.InboundHandlerConfig{
  179. {
  180. Tag: "v",
  181. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  182. PortRange: net.SinglePortRange(serverPort),
  183. Listen: net.NewIPOrDomain(net.LocalHostIP),
  184. }),
  185. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  186. User: []*protocol.User{
  187. {
  188. Account: serial.ToTypedMessage(&vmess.Account{
  189. Id: u1.String(),
  190. AlterId: 64,
  191. }),
  192. },
  193. },
  194. }),
  195. },
  196. {
  197. Tag: "api",
  198. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  199. PortRange: net.SinglePortRange(cmdPort),
  200. Listen: net.NewIPOrDomain(net.LocalHostIP),
  201. }),
  202. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  203. Address: net.NewIPOrDomain(dest.Address),
  204. Port: uint32(dest.Port),
  205. NetworkList: &net.NetworkList{
  206. Network: []net.Network{net.Network_TCP},
  207. },
  208. }),
  209. },
  210. },
  211. Outbound: []*core.OutboundHandlerConfig{
  212. {
  213. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  214. },
  215. },
  216. }
  217. clientPort := tcp.PickPort()
  218. clientConfig := &core.Config{
  219. App: []*serial.TypedMessage{
  220. serial.ToTypedMessage(&policy.Config{
  221. Level: map[uint32]*policy.Policy{
  222. 0: {
  223. Timeout: &policy.Policy_Timeout{
  224. UplinkOnly: &policy.Second{Value: 0},
  225. DownlinkOnly: &policy.Second{Value: 0},
  226. },
  227. },
  228. },
  229. }),
  230. },
  231. Inbound: []*core.InboundHandlerConfig{
  232. {
  233. Tag: "d",
  234. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  235. PortRange: net.SinglePortRange(clientPort),
  236. Listen: net.NewIPOrDomain(net.LocalHostIP),
  237. }),
  238. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  239. Address: net.NewIPOrDomain(dest.Address),
  240. Port: uint32(dest.Port),
  241. NetworkList: &net.NetworkList{
  242. Network: []net.Network{net.Network_TCP},
  243. },
  244. }),
  245. },
  246. },
  247. Outbound: []*core.OutboundHandlerConfig{
  248. {
  249. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  250. Receiver: []*protocol.ServerEndpoint{
  251. {
  252. Address: net.NewIPOrDomain(net.LocalHostIP),
  253. Port: uint32(serverPort),
  254. User: []*protocol.User{
  255. {
  256. Account: serial.ToTypedMessage(&vmess.Account{
  257. Id: u2.String(),
  258. AlterId: 64,
  259. SecuritySettings: &protocol.SecurityConfig{
  260. Type: protocol.SecurityType_AES128_GCM,
  261. },
  262. }),
  263. },
  264. },
  265. },
  266. },
  267. }),
  268. },
  269. },
  270. }
  271. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  272. assert(err, IsNil)
  273. {
  274. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  275. IP: []byte{127, 0, 0, 1},
  276. Port: int(clientPort),
  277. })
  278. assert(err, IsNil)
  279. payload := "commander request."
  280. nBytes, err := conn.Write([]byte(payload))
  281. assert(err, IsNil)
  282. assert(nBytes, Equals, len(payload))
  283. response := make([]byte, 1024)
  284. nBytes, err = conn.Read(response)
  285. assert(nBytes, Equals, 0)
  286. assert(err, Equals, io.EOF)
  287. assert(conn.Close(), IsNil)
  288. }
  289. cmdConn, err := grpc.Dial(fmt.Sprintf("127.0.0.1:%d", cmdPort), grpc.WithInsecure(), grpc.WithBlock())
  290. assert(err, IsNil)
  291. defer cmdConn.Close()
  292. hsClient := command.NewHandlerServiceClient(cmdConn)
  293. resp, err := hsClient.AlterInbound(context.Background(), &command.AlterInboundRequest{
  294. Tag: "v",
  295. Operation: serial.ToTypedMessage(
  296. &command.AddUserOperation{
  297. User: &protocol.User{
  298. Email: "test@v2ray.com",
  299. Account: serial.ToTypedMessage(&vmess.Account{
  300. Id: u2.String(),
  301. AlterId: 64,
  302. }),
  303. },
  304. }),
  305. })
  306. assert(err, IsNil)
  307. assert(resp, IsNotNil)
  308. {
  309. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  310. IP: []byte{127, 0, 0, 1},
  311. Port: int(clientPort),
  312. })
  313. assert(err, IsNil)
  314. payload := "commander request."
  315. nBytes, err := conn.Write([]byte(payload))
  316. assert(err, IsNil)
  317. assert(nBytes, Equals, len(payload))
  318. response := make([]byte, 1024)
  319. nBytes, err = conn.Read(response)
  320. assert(err, IsNil)
  321. assert(response[:nBytes], Equals, xor([]byte(payload)))
  322. assert(conn.Close(), IsNil)
  323. }
  324. resp, err = hsClient.AlterInbound(context.Background(), &command.AlterInboundRequest{
  325. Tag: "v",
  326. Operation: serial.ToTypedMessage(&command.RemoveUserOperation{Email: "test@v2ray.com"}),
  327. })
  328. assert(resp, IsNotNil)
  329. assert(err, IsNil)
  330. CloseAllServers(servers)
  331. }
  332. func TestCommanderStats(t *testing.T) {
  333. assert := With(t)
  334. tcpServer := tcp.Server{
  335. MsgProcessor: xor,
  336. }
  337. dest, err := tcpServer.Start()
  338. assert(err, IsNil)
  339. defer tcpServer.Close()
  340. userID := protocol.NewID(uuid.New())
  341. serverPort := tcp.PickPort()
  342. cmdPort := tcp.PickPort()
  343. serverConfig := &core.Config{
  344. App: []*serial.TypedMessage{
  345. serial.ToTypedMessage(&stats.Config{}),
  346. serial.ToTypedMessage(&commander.Config{
  347. Tag: "api",
  348. Service: []*serial.TypedMessage{
  349. serial.ToTypedMessage(&statscmd.Config{}),
  350. },
  351. }),
  352. serial.ToTypedMessage(&router.Config{
  353. Rule: []*router.RoutingRule{
  354. {
  355. InboundTag: []string{"api"},
  356. TargetTag: &router.RoutingRule_Tag{
  357. Tag: "api",
  358. },
  359. },
  360. },
  361. }),
  362. serial.ToTypedMessage(&policy.Config{
  363. Level: map[uint32]*policy.Policy{
  364. 0: {
  365. Timeout: &policy.Policy_Timeout{
  366. UplinkOnly: &policy.Second{Value: 0},
  367. DownlinkOnly: &policy.Second{Value: 0},
  368. },
  369. },
  370. 1: {
  371. Stats: &policy.Policy_Stats{
  372. UserUplink: true,
  373. UserDownlink: true,
  374. },
  375. },
  376. },
  377. System: &policy.SystemPolicy{
  378. Stats: &policy.SystemPolicy_Stats{
  379. InboundUplink: true,
  380. },
  381. },
  382. }),
  383. },
  384. Inbound: []*core.InboundHandlerConfig{
  385. {
  386. Tag: "vmess",
  387. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  388. PortRange: net.SinglePortRange(serverPort),
  389. Listen: net.NewIPOrDomain(net.LocalHostIP),
  390. }),
  391. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  392. User: []*protocol.User{
  393. {
  394. Level: 1,
  395. Email: "test",
  396. Account: serial.ToTypedMessage(&vmess.Account{
  397. Id: userID.String(),
  398. AlterId: 64,
  399. }),
  400. },
  401. },
  402. }),
  403. },
  404. {
  405. Tag: "api",
  406. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  407. PortRange: net.SinglePortRange(cmdPort),
  408. Listen: net.NewIPOrDomain(net.LocalHostIP),
  409. }),
  410. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  411. Address: net.NewIPOrDomain(dest.Address),
  412. Port: uint32(dest.Port),
  413. NetworkList: &net.NetworkList{
  414. Network: []net.Network{net.Network_TCP},
  415. },
  416. }),
  417. },
  418. },
  419. Outbound: []*core.OutboundHandlerConfig{
  420. {
  421. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  422. },
  423. },
  424. }
  425. clientPort := tcp.PickPort()
  426. clientConfig := &core.Config{
  427. Inbound: []*core.InboundHandlerConfig{
  428. {
  429. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  430. PortRange: net.SinglePortRange(clientPort),
  431. Listen: net.NewIPOrDomain(net.LocalHostIP),
  432. }),
  433. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  434. Address: net.NewIPOrDomain(dest.Address),
  435. Port: uint32(dest.Port),
  436. NetworkList: &net.NetworkList{
  437. Network: []net.Network{net.Network_TCP},
  438. },
  439. }),
  440. },
  441. },
  442. Outbound: []*core.OutboundHandlerConfig{
  443. {
  444. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  445. Receiver: []*protocol.ServerEndpoint{
  446. {
  447. Address: net.NewIPOrDomain(net.LocalHostIP),
  448. Port: uint32(serverPort),
  449. User: []*protocol.User{
  450. {
  451. Account: serial.ToTypedMessage(&vmess.Account{
  452. Id: userID.String(),
  453. AlterId: 64,
  454. SecuritySettings: &protocol.SecurityConfig{
  455. Type: protocol.SecurityType_AES128_GCM,
  456. },
  457. }),
  458. },
  459. },
  460. },
  461. },
  462. }),
  463. },
  464. },
  465. }
  466. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  467. if err != nil {
  468. t.Fatal("Failed to create all servers", err)
  469. }
  470. defer CloseAllServers(servers)
  471. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  472. IP: []byte{127, 0, 0, 1},
  473. Port: int(clientPort),
  474. })
  475. assert(err, IsNil)
  476. defer conn.Close() // nolint: errcheck
  477. payload := make([]byte, 10240*1024)
  478. rand.Read(payload)
  479. nBytes, err := conn.Write([]byte(payload))
  480. assert(err, IsNil)
  481. assert(nBytes, Equals, len(payload))
  482. response := readFrom(conn, time.Second*20, 10240*1024)
  483. if err := compare.BytesEqualWithDetail(response, xor([]byte(payload))); err != nil {
  484. t.Fatal("failed to read response: ", err)
  485. }
  486. cmdConn, err := grpc.Dial(fmt.Sprintf("127.0.0.1:%d", cmdPort), grpc.WithInsecure(), grpc.WithBlock())
  487. assert(err, IsNil)
  488. defer cmdConn.Close()
  489. const name = "user>>>test>>>traffic>>>uplink"
  490. sClient := statscmd.NewStatsServiceClient(cmdConn)
  491. sresp, err := sClient.GetStats(context.Background(), &statscmd.GetStatsRequest{
  492. Name: name,
  493. Reset_: true,
  494. })
  495. assert(err, IsNil)
  496. assert(sresp.Stat.Name, Equals, name)
  497. assert(sresp.Stat.Value, Equals, int64(10240*1024))
  498. sresp, err = sClient.GetStats(context.Background(), &statscmd.GetStatsRequest{
  499. Name: name,
  500. })
  501. assert(err, IsNil)
  502. assert(sresp.Stat.Name, Equals, name)
  503. assert(sresp.Stat.Value, Equals, int64(0))
  504. sresp, err = sClient.GetStats(context.Background(), &statscmd.GetStatsRequest{
  505. Name: "inbound>>>vmess>>>traffic>>>uplink",
  506. Reset_: true,
  507. })
  508. assert(err, IsNil)
  509. assert(sresp.Stat.Value, GreaterThan, int64(10240*1024))
  510. }