sing-box/test/v2ray_grpc_test.go

220 lines
6 KiB
Go
Raw Normal View History

2022-08-29 02:10:41 +00:00
package main
import (
"net/netip"
"os"
"testing"
C "github.com/sagernet/sing-box/constant"
"github.com/sagernet/sing-box/option"
2024-11-07 13:44:04 +00:00
"github.com/sagernet/sing/common"
"github.com/sagernet/sing/common/json/badoption"
2022-08-29 02:10:41 +00:00
2023-04-09 07:37:06 +00:00
"github.com/gofrs/uuid/v5"
2022-08-29 02:10:41 +00:00
"github.com/spyzhov/ajson"
"github.com/stretchr/testify/require"
)
func TestV2RayGRPCInbound(t *testing.T) {
t.Run("origin", func(t *testing.T) {
testV2RayGRPCInbound(t, false)
})
t.Run("lite", func(t *testing.T) {
testV2RayGRPCInbound(t, true)
})
}
func testV2RayGRPCInbound(t *testing.T, forceLite bool) {
userId, err := uuid.DefaultGenerator.NewV4()
require.NoError(t, err)
_, certPem, keyPem := createSelfSignedCertificate(t, "example.org")
startInstance(t, option.Options{
2024-11-07 13:44:04 +00:00
LegacyInbounds: []option.LegacyInbound{
2022-08-29 02:10:41 +00:00
{
Type: C.TypeVMess,
VMessOptions: option.VMessInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-07 13:44:04 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2022-08-29 02:10:41 +00:00
ListenPort: serverPort,
},
Users: []option.VMessUser{
{
Name: "sekai",
UUID: userId.String(),
},
},
InboundTLSOptionsContainer: option.InboundTLSOptionsContainer{
TLS: &option.InboundTLSOptions{
Enabled: true,
ServerName: "example.org",
CertificatePath: certPem,
KeyPath: keyPem,
},
2022-08-29 02:10:41 +00:00
},
Transport: &option.V2RayTransportOptions{
Type: C.V2RayTransportTypeGRPC,
GRPCOptions: option.V2RayGRPCOptions{
ServiceName: "TunService",
ForceLite: forceLite,
},
},
},
},
},
})
content, err := os.ReadFile("config/vmess-grpc-client.json")
require.NoError(t, err)
config, err := ajson.Unmarshal(content)
require.NoError(t, err)
config.MustKey("inbounds").MustIndex(0).MustKey("port").SetNumeric(float64(clientPort))
outbound := config.MustKey("outbounds").MustIndex(0).MustKey("settings").MustKey("vnext").MustIndex(0)
outbound.MustKey("port").SetNumeric(float64(serverPort))
user := outbound.MustKey("users").MustIndex(0)
user.MustKey("id").SetString(userId.String())
content, err = ajson.Marshal(config)
require.NoError(t, err)
startDockerContainer(t, DockerOptions{
Image: ImageV2RayCore,
Ports: []uint16{serverPort, testPort},
EntryPoint: "v2ray",
2023-07-11 06:03:55 +00:00
Cmd: []string{"run"},
2022-08-29 02:10:41 +00:00
Stdin: content,
Bind: map[string]string{
certPem: "/path/to/certificate.crt",
keyPem: "/path/to/private.key",
},
})
testSuitSimple(t, clientPort, testPort)
}
func TestV2RayGRPCOutbound(t *testing.T) {
t.Run("origin", func(t *testing.T) {
testV2RayGRPCOutbound(t, false)
})
t.Run("lite", func(t *testing.T) {
testV2RayGRPCOutbound(t, true)
})
}
func testV2RayGRPCOutbound(t *testing.T, forceLite bool) {
userId, err := uuid.DefaultGenerator.NewV4()
require.NoError(t, err)
_, certPem, keyPem := createSelfSignedCertificate(t, "example.org")
content, err := os.ReadFile("config/vmess-grpc-server.json")
require.NoError(t, err)
config, err := ajson.Unmarshal(content)
require.NoError(t, err)
inbound := config.MustKey("inbounds").MustIndex(0)
inbound.MustKey("port").SetNumeric(float64(serverPort))
inbound.MustKey("settings").MustKey("clients").MustIndex(0).MustKey("id").SetString(userId.String())
content, err = ajson.Marshal(config)
require.NoError(t, err)
startDockerContainer(t, DockerOptions{
Image: ImageV2RayCore,
Ports: []uint16{serverPort, testPort},
EntryPoint: "v2ray",
2023-07-11 06:03:55 +00:00
Cmd: []string{"run"},
2022-08-29 02:10:41 +00:00
Stdin: content,
Env: []string{"V2RAY_VMESS_AEAD_FORCED=false"},
Bind: map[string]string{
certPem: "/path/to/certificate.crt",
keyPem: "/path/to/private.key",
},
})
startInstance(t, option.Options{
2024-11-07 13:44:04 +00:00
LegacyInbounds: []option.LegacyInbound{
2022-08-29 02:10:41 +00:00
{
Type: C.TypeMixed,
Tag: "mixed-in",
MixedOptions: option.HTTPMixedInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-07 13:44:04 +00:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2022-08-29 02:10:41 +00:00
ListenPort: clientPort,
},
},
},
},
2024-11-01 16:39:02 +00:00
LegacyOutbounds: []option.LegacyOutbound{
2022-08-29 02:10:41 +00:00
{
Type: C.TypeVMess,
Tag: "vmess-out",
VMessOptions: option.VMessOutboundOptions{
ServerOptions: option.ServerOptions{
Server: "127.0.0.1",
ServerPort: serverPort,
},
UUID: userId.String(),
Security: "zero",
OutboundTLSOptionsContainer: option.OutboundTLSOptionsContainer{
TLS: &option.OutboundTLSOptions{
Enabled: true,
ServerName: "example.org",
CertificatePath: certPem,
},
2022-08-29 02:10:41 +00:00
},
Transport: &option.V2RayTransportOptions{
Type: C.V2RayTransportTypeGRPC,
GRPCOptions: option.V2RayGRPCOptions{
ServiceName: "TunService",
ForceLite: forceLite,
},
},
},
},
},
})
2022-09-13 02:41:10 +00:00
testSuit(t, clientPort, testPort)
2022-08-29 02:10:41 +00:00
}
func TestV2RayGRPCLite(t *testing.T) {
t.Run("server", func(t *testing.T) {
testV2RayTransportSelfWith(t, &option.V2RayTransportOptions{
Type: C.V2RayTransportTypeGRPC,
GRPCOptions: option.V2RayGRPCOptions{
ServiceName: "TunService",
ForceLite: true,
},
}, &option.V2RayTransportOptions{
Type: C.V2RayTransportTypeGRPC,
GRPCOptions: option.V2RayGRPCOptions{
ServiceName: "TunService",
},
})
})
t.Run("client", func(t *testing.T) {
testV2RayTransportSelfWith(t, &option.V2RayTransportOptions{
Type: C.V2RayTransportTypeGRPC,
GRPCOptions: option.V2RayGRPCOptions{
ServiceName: "TunService",
},
}, &option.V2RayTransportOptions{
Type: C.V2RayTransportTypeGRPC,
GRPCOptions: option.V2RayGRPCOptions{
ServiceName: "TunService",
ForceLite: true,
},
})
})
t.Run("self", func(t *testing.T) {
testV2RayTransportSelfWith(t, &option.V2RayTransportOptions{
Type: C.V2RayTransportTypeGRPC,
GRPCOptions: option.V2RayGRPCOptions{
ServiceName: "TunService",
ForceLite: true,
},
}, &option.V2RayTransportOptions{
Type: C.V2RayTransportTypeGRPC,
GRPCOptions: option.V2RayGRPCOptions{
ServiceName: "TunService",
ForceLite: true,
},
})
})
}