command_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550
  1. package scenarios
  2. import (
  3. "context"
  4. "crypto/rand"
  5. "fmt"
  6. "io"
  7. "testing"
  8. "time"
  9. "github.com/google/go-cmp/cmp"
  10. "google.golang.org/grpc"
  11. "v2ray.com/core"
  12. "v2ray.com/core/app/commander"
  13. "v2ray.com/core/app/policy"
  14. "v2ray.com/core/app/proxyman"
  15. "v2ray.com/core/app/proxyman/command"
  16. "v2ray.com/core/app/router"
  17. "v2ray.com/core/app/stats"
  18. statscmd "v2ray.com/core/app/stats/command"
  19. "v2ray.com/core/common/net"
  20. "v2ray.com/core/common/protocol"
  21. "v2ray.com/core/common/serial"
  22. "v2ray.com/core/common/uuid"
  23. "v2ray.com/core/proxy/dokodemo"
  24. "v2ray.com/core/proxy/freedom"
  25. "v2ray.com/core/proxy/vmess"
  26. "v2ray.com/core/proxy/vmess/inbound"
  27. "v2ray.com/core/proxy/vmess/outbound"
  28. "v2ray.com/core/testing/servers/tcp"
  29. . "v2ray.com/ext/assert"
  30. )
  31. func TestCommanderRemoveHandler(t *testing.T) {
  32. assert := With(t)
  33. tcpServer := tcp.Server{
  34. MsgProcessor: xor,
  35. }
  36. dest, err := tcpServer.Start()
  37. assert(err, IsNil)
  38. defer tcpServer.Close()
  39. clientPort := tcp.PickPort()
  40. cmdPort := tcp.PickPort()
  41. clientConfig := &core.Config{
  42. App: []*serial.TypedMessage{
  43. serial.ToTypedMessage(&commander.Config{
  44. Tag: "api",
  45. Service: []*serial.TypedMessage{
  46. serial.ToTypedMessage(&command.Config{}),
  47. },
  48. }),
  49. serial.ToTypedMessage(&router.Config{
  50. Rule: []*router.RoutingRule{
  51. {
  52. InboundTag: []string{"api"},
  53. TargetTag: &router.RoutingRule_Tag{
  54. Tag: "api",
  55. },
  56. },
  57. },
  58. }),
  59. },
  60. Inbound: []*core.InboundHandlerConfig{
  61. {
  62. Tag: "d",
  63. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  64. PortRange: net.SinglePortRange(clientPort),
  65. Listen: net.NewIPOrDomain(net.LocalHostIP),
  66. }),
  67. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  68. Address: net.NewIPOrDomain(dest.Address),
  69. Port: uint32(dest.Port),
  70. Networks: []net.Network{net.Network_TCP},
  71. }),
  72. },
  73. {
  74. Tag: "api",
  75. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  76. PortRange: net.SinglePortRange(cmdPort),
  77. Listen: net.NewIPOrDomain(net.LocalHostIP),
  78. }),
  79. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  80. Address: net.NewIPOrDomain(dest.Address),
  81. Port: uint32(dest.Port),
  82. Networks: []net.Network{net.Network_TCP},
  83. }),
  84. },
  85. },
  86. Outbound: []*core.OutboundHandlerConfig{
  87. {
  88. Tag: "default-outbound",
  89. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  90. },
  91. },
  92. }
  93. servers, err := InitializeServerConfigs(clientConfig)
  94. assert(err, IsNil)
  95. defer CloseAllServers(servers)
  96. {
  97. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  98. IP: []byte{127, 0, 0, 1},
  99. Port: int(clientPort),
  100. })
  101. if err != nil {
  102. t.Fatal(err)
  103. }
  104. defer conn.Close() // nolint: errcheck
  105. payload := "commander request."
  106. nBytes, err := conn.Write([]byte(payload))
  107. assert(err, IsNil)
  108. assert(nBytes, Equals, len(payload))
  109. response := make([]byte, 1024)
  110. nBytes, err = conn.Read(response)
  111. assert(err, IsNil)
  112. if r := cmp.Diff(response[:nBytes], xor([]byte(payload))); r != "" {
  113. t.Fatal(r)
  114. }
  115. }
  116. cmdConn, err := grpc.Dial(fmt.Sprintf("127.0.0.1:%d", cmdPort), grpc.WithInsecure(), grpc.WithBlock())
  117. assert(err, IsNil)
  118. defer cmdConn.Close()
  119. hsClient := command.NewHandlerServiceClient(cmdConn)
  120. resp, err := hsClient.RemoveInbound(context.Background(), &command.RemoveInboundRequest{
  121. Tag: "d",
  122. })
  123. assert(err, IsNil)
  124. assert(resp, IsNotNil)
  125. {
  126. _, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  127. IP: []byte{127, 0, 0, 1},
  128. Port: int(clientPort),
  129. })
  130. assert(err, IsNotNil)
  131. }
  132. }
  133. func TestCommanderAddRemoveUser(t *testing.T) {
  134. assert := With(t)
  135. tcpServer := tcp.Server{
  136. MsgProcessor: xor,
  137. }
  138. dest, err := tcpServer.Start()
  139. assert(err, IsNil)
  140. defer tcpServer.Close()
  141. u1 := protocol.NewID(uuid.New())
  142. u2 := protocol.NewID(uuid.New())
  143. cmdPort := tcp.PickPort()
  144. serverPort := tcp.PickPort()
  145. serverConfig := &core.Config{
  146. App: []*serial.TypedMessage{
  147. serial.ToTypedMessage(&commander.Config{
  148. Tag: "api",
  149. Service: []*serial.TypedMessage{
  150. serial.ToTypedMessage(&command.Config{}),
  151. },
  152. }),
  153. serial.ToTypedMessage(&router.Config{
  154. Rule: []*router.RoutingRule{
  155. {
  156. InboundTag: []string{"api"},
  157. TargetTag: &router.RoutingRule_Tag{
  158. Tag: "api",
  159. },
  160. },
  161. },
  162. }),
  163. serial.ToTypedMessage(&policy.Config{
  164. Level: map[uint32]*policy.Policy{
  165. 0: {
  166. Timeout: &policy.Policy_Timeout{
  167. UplinkOnly: &policy.Second{Value: 0},
  168. DownlinkOnly: &policy.Second{Value: 0},
  169. },
  170. },
  171. },
  172. }),
  173. },
  174. Inbound: []*core.InboundHandlerConfig{
  175. {
  176. Tag: "v",
  177. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  178. PortRange: net.SinglePortRange(serverPort),
  179. Listen: net.NewIPOrDomain(net.LocalHostIP),
  180. }),
  181. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  182. User: []*protocol.User{
  183. {
  184. Account: serial.ToTypedMessage(&vmess.Account{
  185. Id: u1.String(),
  186. AlterId: 64,
  187. }),
  188. },
  189. },
  190. }),
  191. },
  192. {
  193. Tag: "api",
  194. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  195. PortRange: net.SinglePortRange(cmdPort),
  196. Listen: net.NewIPOrDomain(net.LocalHostIP),
  197. }),
  198. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  199. Address: net.NewIPOrDomain(dest.Address),
  200. Port: uint32(dest.Port),
  201. Networks: []net.Network{net.Network_TCP},
  202. }),
  203. },
  204. },
  205. Outbound: []*core.OutboundHandlerConfig{
  206. {
  207. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  208. },
  209. },
  210. }
  211. clientPort := tcp.PickPort()
  212. clientConfig := &core.Config{
  213. App: []*serial.TypedMessage{
  214. serial.ToTypedMessage(&policy.Config{
  215. Level: map[uint32]*policy.Policy{
  216. 0: {
  217. Timeout: &policy.Policy_Timeout{
  218. UplinkOnly: &policy.Second{Value: 0},
  219. DownlinkOnly: &policy.Second{Value: 0},
  220. },
  221. },
  222. },
  223. }),
  224. },
  225. Inbound: []*core.InboundHandlerConfig{
  226. {
  227. Tag: "d",
  228. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  229. PortRange: net.SinglePortRange(clientPort),
  230. Listen: net.NewIPOrDomain(net.LocalHostIP),
  231. }),
  232. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  233. Address: net.NewIPOrDomain(dest.Address),
  234. Port: uint32(dest.Port),
  235. NetworkList: &net.NetworkList{
  236. Network: []net.Network{net.Network_TCP},
  237. },
  238. }),
  239. },
  240. },
  241. Outbound: []*core.OutboundHandlerConfig{
  242. {
  243. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  244. Receiver: []*protocol.ServerEndpoint{
  245. {
  246. Address: net.NewIPOrDomain(net.LocalHostIP),
  247. Port: uint32(serverPort),
  248. User: []*protocol.User{
  249. {
  250. Account: serial.ToTypedMessage(&vmess.Account{
  251. Id: u2.String(),
  252. AlterId: 64,
  253. SecuritySettings: &protocol.SecurityConfig{
  254. Type: protocol.SecurityType_AES128_GCM,
  255. },
  256. }),
  257. },
  258. },
  259. },
  260. },
  261. }),
  262. },
  263. },
  264. }
  265. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  266. assert(err, IsNil)
  267. {
  268. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  269. IP: []byte{127, 0, 0, 1},
  270. Port: int(clientPort),
  271. })
  272. assert(err, IsNil)
  273. payload := "commander request."
  274. nBytes, err := conn.Write([]byte(payload))
  275. assert(err, IsNil)
  276. assert(nBytes, Equals, len(payload))
  277. response := make([]byte, 1024)
  278. nBytes, err = conn.Read(response)
  279. assert(nBytes, Equals, 0)
  280. assert(err, Equals, io.EOF)
  281. assert(conn.Close(), IsNil)
  282. }
  283. cmdConn, err := grpc.Dial(fmt.Sprintf("127.0.0.1:%d", cmdPort), grpc.WithInsecure(), grpc.WithBlock())
  284. assert(err, IsNil)
  285. defer cmdConn.Close()
  286. hsClient := command.NewHandlerServiceClient(cmdConn)
  287. resp, err := hsClient.AlterInbound(context.Background(), &command.AlterInboundRequest{
  288. Tag: "v",
  289. Operation: serial.ToTypedMessage(
  290. &command.AddUserOperation{
  291. User: &protocol.User{
  292. Email: "test@v2ray.com",
  293. Account: serial.ToTypedMessage(&vmess.Account{
  294. Id: u2.String(),
  295. AlterId: 64,
  296. }),
  297. },
  298. }),
  299. })
  300. assert(err, IsNil)
  301. assert(resp, IsNotNil)
  302. {
  303. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  304. IP: []byte{127, 0, 0, 1},
  305. Port: int(clientPort),
  306. })
  307. assert(err, IsNil)
  308. payload := "commander request."
  309. nBytes, err := conn.Write([]byte(payload))
  310. assert(err, IsNil)
  311. assert(nBytes, Equals, len(payload))
  312. response := make([]byte, 1024)
  313. nBytes, err = conn.Read(response)
  314. assert(err, IsNil)
  315. assert(response[:nBytes], Equals, xor([]byte(payload)))
  316. assert(conn.Close(), IsNil)
  317. }
  318. resp, err = hsClient.AlterInbound(context.Background(), &command.AlterInboundRequest{
  319. Tag: "v",
  320. Operation: serial.ToTypedMessage(&command.RemoveUserOperation{Email: "test@v2ray.com"}),
  321. })
  322. assert(resp, IsNotNil)
  323. assert(err, IsNil)
  324. CloseAllServers(servers)
  325. }
  326. func TestCommanderStats(t *testing.T) {
  327. assert := With(t)
  328. tcpServer := tcp.Server{
  329. MsgProcessor: xor,
  330. }
  331. dest, err := tcpServer.Start()
  332. assert(err, IsNil)
  333. defer tcpServer.Close()
  334. userID := protocol.NewID(uuid.New())
  335. serverPort := tcp.PickPort()
  336. cmdPort := tcp.PickPort()
  337. serverConfig := &core.Config{
  338. App: []*serial.TypedMessage{
  339. serial.ToTypedMessage(&stats.Config{}),
  340. serial.ToTypedMessage(&commander.Config{
  341. Tag: "api",
  342. Service: []*serial.TypedMessage{
  343. serial.ToTypedMessage(&statscmd.Config{}),
  344. },
  345. }),
  346. serial.ToTypedMessage(&router.Config{
  347. Rule: []*router.RoutingRule{
  348. {
  349. InboundTag: []string{"api"},
  350. TargetTag: &router.RoutingRule_Tag{
  351. Tag: "api",
  352. },
  353. },
  354. },
  355. }),
  356. serial.ToTypedMessage(&policy.Config{
  357. Level: map[uint32]*policy.Policy{
  358. 0: {
  359. Timeout: &policy.Policy_Timeout{
  360. UplinkOnly: &policy.Second{Value: 0},
  361. DownlinkOnly: &policy.Second{Value: 0},
  362. },
  363. },
  364. 1: {
  365. Stats: &policy.Policy_Stats{
  366. UserUplink: true,
  367. UserDownlink: true,
  368. },
  369. },
  370. },
  371. System: &policy.SystemPolicy{
  372. Stats: &policy.SystemPolicy_Stats{
  373. InboundUplink: true,
  374. },
  375. },
  376. }),
  377. },
  378. Inbound: []*core.InboundHandlerConfig{
  379. {
  380. Tag: "vmess",
  381. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  382. PortRange: net.SinglePortRange(serverPort),
  383. Listen: net.NewIPOrDomain(net.LocalHostIP),
  384. }),
  385. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  386. User: []*protocol.User{
  387. {
  388. Level: 1,
  389. Email: "test",
  390. Account: serial.ToTypedMessage(&vmess.Account{
  391. Id: userID.String(),
  392. AlterId: 64,
  393. }),
  394. },
  395. },
  396. }),
  397. },
  398. {
  399. Tag: "api",
  400. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  401. PortRange: net.SinglePortRange(cmdPort),
  402. Listen: net.NewIPOrDomain(net.LocalHostIP),
  403. }),
  404. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  405. Address: net.NewIPOrDomain(dest.Address),
  406. Port: uint32(dest.Port),
  407. NetworkList: &net.NetworkList{
  408. Network: []net.Network{net.Network_TCP},
  409. },
  410. }),
  411. },
  412. },
  413. Outbound: []*core.OutboundHandlerConfig{
  414. {
  415. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  416. },
  417. },
  418. }
  419. clientPort := tcp.PickPort()
  420. clientConfig := &core.Config{
  421. Inbound: []*core.InboundHandlerConfig{
  422. {
  423. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  424. PortRange: net.SinglePortRange(clientPort),
  425. Listen: net.NewIPOrDomain(net.LocalHostIP),
  426. }),
  427. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  428. Address: net.NewIPOrDomain(dest.Address),
  429. Port: uint32(dest.Port),
  430. NetworkList: &net.NetworkList{
  431. Network: []net.Network{net.Network_TCP},
  432. },
  433. }),
  434. },
  435. },
  436. Outbound: []*core.OutboundHandlerConfig{
  437. {
  438. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  439. Receiver: []*protocol.ServerEndpoint{
  440. {
  441. Address: net.NewIPOrDomain(net.LocalHostIP),
  442. Port: uint32(serverPort),
  443. User: []*protocol.User{
  444. {
  445. Account: serial.ToTypedMessage(&vmess.Account{
  446. Id: userID.String(),
  447. AlterId: 64,
  448. SecuritySettings: &protocol.SecurityConfig{
  449. Type: protocol.SecurityType_AES128_GCM,
  450. },
  451. }),
  452. },
  453. },
  454. },
  455. },
  456. }),
  457. },
  458. },
  459. }
  460. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  461. if err != nil {
  462. t.Fatal("Failed to create all servers", err)
  463. }
  464. defer CloseAllServers(servers)
  465. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  466. IP: []byte{127, 0, 0, 1},
  467. Port: int(clientPort),
  468. })
  469. assert(err, IsNil)
  470. defer conn.Close() // nolint: errcheck
  471. payload := make([]byte, 10240*1024)
  472. rand.Read(payload)
  473. nBytes, err := conn.Write([]byte(payload))
  474. assert(err, IsNil)
  475. assert(nBytes, Equals, len(payload))
  476. response := readFrom(conn, time.Second*20, 10240*1024)
  477. if r := cmp.Diff(response, xor([]byte(payload))); r != "" {
  478. t.Fatal("failed to read response: ", r)
  479. }
  480. cmdConn, err := grpc.Dial(fmt.Sprintf("127.0.0.1:%d", cmdPort), grpc.WithInsecure(), grpc.WithBlock())
  481. assert(err, IsNil)
  482. defer cmdConn.Close()
  483. const name = "user>>>test>>>traffic>>>uplink"
  484. sClient := statscmd.NewStatsServiceClient(cmdConn)
  485. sresp, err := sClient.GetStats(context.Background(), &statscmd.GetStatsRequest{
  486. Name: name,
  487. Reset_: true,
  488. })
  489. assert(err, IsNil)
  490. assert(sresp.Stat.Name, Equals, name)
  491. assert(sresp.Stat.Value, Equals, int64(10240*1024))
  492. sresp, err = sClient.GetStats(context.Background(), &statscmd.GetStatsRequest{
  493. Name: name,
  494. })
  495. assert(err, IsNil)
  496. assert(sresp.Stat.Name, Equals, name)
  497. assert(sresp.Stat.Value, Equals, int64(0))
  498. sresp, err = sClient.GetStats(context.Background(), &statscmd.GetStatsRequest{
  499. Name: "inbound>>>vmess>>>traffic>>>uplink",
  500. Reset_: true,
  501. })
  502. assert(err, IsNil)
  503. assert(sresp.Stat.Value, GreaterThan, int64(10240*1024))
  504. }