sing-box/test/shadowtls_test.go

372 lines
9.1 KiB
Go
Raw Permalink Normal View History

package main
import (
2022-10-06 14:47:11 +00:00
"context"
"net"
"net/http"
"net/netip"
"testing"
C "github.com/sagernet/sing-box/constant"
"github.com/sagernet/sing-box/option"
"github.com/sagernet/sing-shadowsocks/shadowaead_2022"
2024-11-18 10:59:19 +00:00
"github.com/sagernet/sing/common"
F "github.com/sagernet/sing/common/format"
2024-11-18 10:59:19 +00:00
"github.com/sagernet/sing/common/json/badoption"
2022-10-06 14:47:11 +00:00
"github.com/stretchr/testify/require"
)
func TestShadowTLS(t *testing.T) {
2022-10-06 14:47:11 +00:00
t.Run("v1", func(t *testing.T) {
2023-02-20 06:08:13 +00:00
testShadowTLS(t, 1, "", false)
2022-10-06 14:47:11 +00:00
})
t.Run("v2", func(t *testing.T) {
2023-02-20 06:08:13 +00:00
testShadowTLS(t, 2, "hello", false)
2023-02-18 06:55:47 +00:00
})
t.Run("v3", func(t *testing.T) {
2023-02-20 06:08:13 +00:00
testShadowTLS(t, 3, "hello", false)
})
t.Run("v2-utls", func(t *testing.T) {
testShadowTLS(t, 2, "hello", true)
})
t.Run("v3-utls", func(t *testing.T) {
testShadowTLS(t, 3, "hello", true)
2022-10-06 14:47:11 +00:00
})
}
2023-02-20 06:08:13 +00:00
func testShadowTLS(t *testing.T, version int, password string, utlsEanbled bool) {
method := shadowaead_2022.List[0]
2022-10-06 14:47:11 +00:00
ssPassword := mkBase64(t, 16)
startInstance(t, option.Options{
2024-11-18 10:59:19 +00:00
Inbounds: []option.Inbound{
{
Type: C.TypeMixed,
2024-11-18 10:59:19 +00:00
Options: &option.HTTPMixedInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
ListenPort: clientPort,
},
},
},
{
Type: C.TypeShadowTLS,
Tag: "in",
2024-11-18 10:59:19 +00:00
Options: &option.ShadowTLSInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
ListenPort: serverPort,
2024-11-18 10:59:19 +00:00
InboundOptions: option.InboundOptions{
Detour: "detour",
},
},
Handshake: option.ShadowTLSHandshakeOptions{
ServerOptions: option.ServerOptions{
Server: "google.com",
ServerPort: 443,
},
},
2022-10-08 12:30:52 +00:00
Version: version,
2022-10-06 14:47:11 +00:00
Password: password,
Users: []option.ShadowTLSUser{{Password: password}},
},
},
{
Type: C.TypeShadowsocks,
Tag: "detour",
2024-11-18 10:59:19 +00:00
Options: &option.ShadowsocksInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
ListenPort: otherPort,
},
Method: method,
2022-10-06 14:47:11 +00:00
Password: ssPassword,
},
},
},
2024-11-18 10:59:19 +00:00
Outbounds: []option.Outbound{
{
Type: C.TypeShadowsocks,
2024-11-18 10:59:19 +00:00
Options: &option.ShadowsocksOutboundOptions{
Method: method,
2022-10-06 14:47:11 +00:00
Password: ssPassword,
2022-09-03 04:55:10 +00:00
DialerOptions: option.DialerOptions{
Detour: "detour",
},
},
},
{
Type: C.TypeShadowTLS,
Tag: "detour",
2024-11-18 10:59:19 +00:00
Options: &option.ShadowTLSOutboundOptions{
ServerOptions: option.ServerOptions{
Server: "127.0.0.1",
ServerPort: serverPort,
},
OutboundTLSOptionsContainer: option.OutboundTLSOptionsContainer{
TLS: &option.OutboundTLSOptions{
Enabled: true,
ServerName: "google.com",
UTLS: &option.OutboundUTLSOptions{
Enabled: utlsEanbled,
},
2023-02-20 06:08:13 +00:00
},
},
2022-10-08 12:30:52 +00:00
Version: version,
2022-10-06 14:47:11 +00:00
Password: password,
},
},
{
Type: C.TypeDirect,
Tag: "direct",
},
},
Route: &option.RouteOptions{
2024-10-21 15:38:34 +00:00
Rules: []option.Rule{
{
Type: C.RuleTypeDefault,
DefaultOptions: option.DefaultRule{
RawDefaultRule: option.RawDefaultRule{
Inbound: []string{"detour"},
},
RuleAction: option.RuleAction{
Action: C.RuleActionTypeRoute,
RouteOptions: option.RouteActionOptions{
Outbound: "direct",
},
},
},
},
2024-10-21 15:38:34 +00:00
},
},
})
2023-02-20 05:53:06 +00:00
testTCP(t, clientPort, testPort)
}
2023-02-18 06:55:47 +00:00
func TestShadowTLSFallback(t *testing.T) {
2022-10-06 14:47:11 +00:00
startInstance(t, option.Options{
2024-11-18 10:59:19 +00:00
Inbounds: []option.Inbound{
2022-10-06 14:47:11 +00:00
{
Type: C.TypeShadowTLS,
2024-11-18 10:59:19 +00:00
Options: &option.ShadowTLSInboundOptions{
2022-10-06 14:47:11 +00:00
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2022-10-06 14:47:11 +00:00
ListenPort: serverPort,
},
Handshake: option.ShadowTLSHandshakeOptions{
ServerOptions: option.ServerOptions{
Server: "google.com",
ServerPort: 443,
},
},
2023-07-11 06:03:55 +00:00
Version: 3,
Users: []option.ShadowTLSUser{
{Password: "hello"},
},
2022-10-06 14:47:11 +00:00
},
},
},
})
client := &http.Client{
Transport: &http.Transport{
DialContext: func(ctx context.Context, network, addr string) (net.Conn, error) {
var d net.Dialer
return d.DialContext(ctx, network, "127.0.0.1:"+F.ToString(serverPort))
},
},
}
response, err := client.Get("https://google.com")
require.NoError(t, err)
require.Equal(t, response.StatusCode, 200)
2022-10-31 05:54:24 +00:00
response.Body.Close()
2022-10-06 14:47:11 +00:00
client.CloseIdleConnections()
}
2022-10-10 03:31:03 +00:00
func TestShadowTLSInbound(t *testing.T) {
method := shadowaead_2022.List[0]
password := mkBase64(t, 16)
startDockerContainer(t, DockerOptions{
Image: ImageShadowTLS,
Ports: []uint16{serverPort, otherPort},
EntryPoint: "shadow-tls",
2023-02-18 06:55:47 +00:00
Cmd: []string{"--v3", "--threads", "1", "client", "--listen", "0.0.0.0:" + F.ToString(otherPort), "--server", "127.0.0.1:" + F.ToString(serverPort), "--sni", "google.com", "--password", password},
2022-10-10 03:31:03 +00:00
})
startInstance(t, option.Options{
2024-11-18 10:59:19 +00:00
Inbounds: []option.Inbound{
2022-10-10 03:31:03 +00:00
{
Type: C.TypeMixed,
Tag: "in",
2024-11-18 10:59:19 +00:00
Options: &option.HTTPMixedInboundOptions{
2022-10-10 03:31:03 +00:00
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2022-10-10 03:31:03 +00:00
ListenPort: clientPort,
},
},
},
{
Type: C.TypeShadowTLS,
2024-11-18 10:59:19 +00:00
Options: &option.ShadowTLSInboundOptions{
2022-10-10 03:31:03 +00:00
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2022-10-10 03:31:03 +00:00
ListenPort: serverPort,
2024-11-18 10:59:19 +00:00
InboundOptions: option.InboundOptions{
Detour: "detour",
},
2022-10-10 03:31:03 +00:00
},
Handshake: option.ShadowTLSHandshakeOptions{
ServerOptions: option.ServerOptions{
Server: "google.com",
ServerPort: 443,
},
},
2023-07-11 06:03:55 +00:00
Version: 3,
Users: []option.ShadowTLSUser{
{Password: password},
},
2022-10-10 03:31:03 +00:00
},
},
{
Type: C.TypeShadowsocks,
Tag: "detour",
2024-11-18 10:59:19 +00:00
Options: &option.ShadowsocksInboundOptions{
2022-10-10 03:31:03 +00:00
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2022-10-10 03:31:03 +00:00
},
Method: method,
Password: password,
},
},
},
2024-11-18 10:59:19 +00:00
Outbounds: []option.Outbound{
2022-10-10 03:31:03 +00:00
{
Type: C.TypeDirect,
},
{
Type: C.TypeShadowsocks,
Tag: "out",
2024-11-18 10:59:19 +00:00
Options: &option.ShadowsocksOutboundOptions{
2022-10-10 03:31:03 +00:00
ServerOptions: option.ServerOptions{
Server: "127.0.0.1",
ServerPort: otherPort,
},
Method: method,
Password: password,
},
},
},
Route: &option.RouteOptions{
2024-10-21 15:38:34 +00:00
Rules: []option.Rule{
{
Type: C.RuleTypeDefault,
DefaultOptions: option.DefaultRule{
RawDefaultRule: option.RawDefaultRule{
Inbound: []string{"in"},
},
RuleAction: option.RuleAction{
Action: C.RuleActionTypeRoute,
RouteOptions: option.RouteActionOptions{
Outbound: "out",
},
},
},
2022-10-10 03:31:03 +00:00
},
2024-10-21 15:38:34 +00:00
},
2022-10-10 03:31:03 +00:00
},
})
2023-02-18 06:55:47 +00:00
testTCP(t, clientPort, testPort)
2022-10-10 03:31:03 +00:00
}
func TestShadowTLSOutbound(t *testing.T) {
2022-10-06 14:47:11 +00:00
method := shadowaead_2022.List[0]
password := mkBase64(t, 16)
startDockerContainer(t, DockerOptions{
Image: ImageShadowTLS,
Ports: []uint16{serverPort, otherPort},
EntryPoint: "shadow-tls",
2023-02-18 06:55:47 +00:00
Cmd: []string{"--v3", "--threads", "1", "server", "--listen", "0.0.0.0:" + F.ToString(serverPort), "--server", "127.0.0.1:" + F.ToString(otherPort), "--tls", "google.com:443", "--password", "hello"},
Env: []string{"RUST_LOG=trace"},
})
startInstance(t, option.Options{
2024-11-18 10:59:19 +00:00
Inbounds: []option.Inbound{
{
Type: C.TypeMixed,
2024-11-18 10:59:19 +00:00
Options: &option.HTTPMixedInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
ListenPort: clientPort,
},
},
},
{
2022-10-06 14:47:11 +00:00
Type: C.TypeShadowsocks,
Tag: "detour",
2024-11-18 10:59:19 +00:00
Options: &option.ShadowsocksInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-18 10:59:19 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
ListenPort: otherPort,
},
2022-10-06 14:47:11 +00:00
Method: method,
Password: password,
},
},
},
2024-11-18 10:59:19 +00:00
Outbounds: []option.Outbound{
{
2022-10-06 14:47:11 +00:00
Type: C.TypeShadowsocks,
2024-11-18 10:59:19 +00:00
Options: &option.ShadowsocksOutboundOptions{
2022-10-06 14:47:11 +00:00
Method: method,
Password: password,
2022-09-03 04:55:10 +00:00
DialerOptions: option.DialerOptions{
Detour: "detour",
},
},
},
{
Type: C.TypeShadowTLS,
Tag: "detour",
2024-11-18 10:59:19 +00:00
Options: &option.ShadowTLSOutboundOptions{
ServerOptions: option.ServerOptions{
Server: "127.0.0.1",
ServerPort: serverPort,
},
OutboundTLSOptionsContainer: option.OutboundTLSOptionsContainer{
TLS: &option.OutboundTLSOptions{
Enabled: true,
ServerName: "google.com",
},
},
2023-02-18 06:55:47 +00:00
Version: 3,
2022-10-06 14:47:11 +00:00
Password: "hello",
},
},
{
Type: C.TypeDirect,
Tag: "direct",
},
},
Route: &option.RouteOptions{
2024-10-21 15:38:34 +00:00
Rules: []option.Rule{
{
Type: C.RuleTypeDefault,
DefaultOptions: option.DefaultRule{
RawDefaultRule: option.RawDefaultRule{
Inbound: []string{"detour"},
},
RuleAction: option.RuleAction{
Action: C.RuleActionTypeRoute,
RouteOptions: option.RouteActionOptions{
Outbound: "direct",
},
},
},
},
2024-10-21 15:38:34 +00:00
},
},
})
2023-02-18 06:55:47 +00:00
testTCP(t, clientPort, testPort)
}