dns_test.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. package scenarios
  2. import (
  3. "fmt"
  4. "testing"
  5. xproxy "golang.org/x/net/proxy"
  6. "v2ray.com/core"
  7. "v2ray.com/core/app/dns"
  8. "v2ray.com/core/app/proxyman"
  9. "v2ray.com/core/app/router"
  10. "v2ray.com/core/common"
  11. "v2ray.com/core/common/net"
  12. "v2ray.com/core/common/serial"
  13. "v2ray.com/core/proxy/blackhole"
  14. "v2ray.com/core/proxy/freedom"
  15. "v2ray.com/core/proxy/socks"
  16. "v2ray.com/core/testing/servers/tcp"
  17. . "v2ray.com/ext/assert"
  18. )
  19. func TestResolveIP(t *testing.T) {
  20. assert := With(t)
  21. tcpServer := tcp.Server{
  22. MsgProcessor: xor,
  23. }
  24. dest, err := tcpServer.Start()
  25. common.Must(err)
  26. defer tcpServer.Close()
  27. serverPort := tcp.PickPort()
  28. serverConfig := &core.Config{
  29. App: []*serial.TypedMessage{
  30. serial.ToTypedMessage(&dns.Config{
  31. Hosts: map[string]*net.IPOrDomain{
  32. "google.com": net.NewIPOrDomain(dest.Address),
  33. },
  34. }),
  35. serial.ToTypedMessage(&router.Config{
  36. DomainStrategy: router.Config_IpIfNonMatch,
  37. Rule: []*router.RoutingRule{
  38. {
  39. Cidr: []*router.CIDR{
  40. {
  41. Ip: []byte{127, 0, 0, 0},
  42. Prefix: 8,
  43. },
  44. },
  45. TargetTag: &router.RoutingRule_Tag{
  46. Tag: "direct",
  47. },
  48. },
  49. },
  50. }),
  51. },
  52. Inbound: []*core.InboundHandlerConfig{
  53. {
  54. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  55. PortRange: net.SinglePortRange(serverPort),
  56. Listen: net.NewIPOrDomain(net.LocalHostIP),
  57. }),
  58. ProxySettings: serial.ToTypedMessage(&socks.ServerConfig{
  59. AuthType: socks.AuthType_NO_AUTH,
  60. Accounts: map[string]string{
  61. "Test Account": "Test Password",
  62. },
  63. Address: net.NewIPOrDomain(net.LocalHostIP),
  64. UdpEnabled: false,
  65. }),
  66. },
  67. },
  68. Outbound: []*core.OutboundHandlerConfig{
  69. {
  70. ProxySettings: serial.ToTypedMessage(&blackhole.Config{}),
  71. },
  72. {
  73. Tag: "direct",
  74. ProxySettings: serial.ToTypedMessage(&freedom.Config{
  75. DomainStrategy: freedom.Config_USE_IP,
  76. }),
  77. },
  78. },
  79. }
  80. servers, err := InitializeServerConfigs(serverConfig)
  81. common.Must(err)
  82. {
  83. noAuthDialer, err := xproxy.SOCKS5("tcp", net.TCPDestination(net.LocalHostIP, serverPort).NetAddr(), nil, xproxy.Direct)
  84. common.Must(err)
  85. conn, err := noAuthDialer.Dial("tcp", fmt.Sprintf("google.com:%d", dest.Port))
  86. common.Must(err)
  87. payload := "test payload"
  88. nBytes, err := conn.Write([]byte(payload))
  89. common.Must(err)
  90. assert(nBytes, Equals, len(payload))
  91. response := make([]byte, 1024)
  92. nBytes, err = conn.Read(response)
  93. common.Must(err)
  94. assert(response[:nBytes], Equals, xor([]byte(payload)))
  95. assert(conn.Close(), IsNil)
  96. }
  97. CloseAllServers(servers)
  98. }