| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309 |
- package conf_test
- import (
- "encoding/json"
- "reflect"
- "testing"
- "github.com/google/go-cmp/cmp"
- "github.com/xtls/xray-core/app/dispatcher"
- "github.com/xtls/xray-core/app/log"
- "github.com/xtls/xray-core/app/proxyman"
- "github.com/xtls/xray-core/app/router"
- "github.com/xtls/xray-core/common"
- clog "github.com/xtls/xray-core/common/log"
- "github.com/xtls/xray-core/common/net"
- "github.com/xtls/xray-core/common/protocol"
- "github.com/xtls/xray-core/common/serial"
- core "github.com/xtls/xray-core/core"
- . "github.com/xtls/xray-core/infra/conf"
- "github.com/xtls/xray-core/proxy/vmess"
- "github.com/xtls/xray-core/proxy/vmess/inbound"
- "github.com/xtls/xray-core/transport/internet"
- "github.com/xtls/xray-core/transport/internet/tls"
- "github.com/xtls/xray-core/transport/internet/websocket"
- "google.golang.org/protobuf/proto"
- )
- func TestXrayConfig(t *testing.T) {
- createParser := func() func(string) (proto.Message, error) {
- return func(s string) (proto.Message, error) {
- config := new(Config)
- if err := json.Unmarshal([]byte(s), config); err != nil {
- return nil, err
- }
- return config.Build()
- }
- }
- runMultiTestCase(t, []TestCase{
- {
- Input: `{
- "log": {
- "access": "/var/log/xray/access.log",
- "loglevel": "error",
- "error": "/var/log/xray/error.log"
- },
- "inbounds": [{
- "streamSettings": {
- "network": "ws",
- "wsSettings": {
- "headers": {
- "host": "example.domain"
- },
- "path": ""
- },
- "tlsSettings": {
- "alpn": "h2"
- },
- "security": "tls"
- },
- "protocol": "vmess",
- "port": "443-500",
- "allocate": {
- "strategy": "random",
- "concurrency": 3
- },
- "settings": {
- "clients": [
- {
- "security": "aes-128-gcm",
- "id": "0cdf8a45-303d-4fed-9780-29aa7f54175e"
- }
- ]
- }
- }],
- "routing": {
- "strategy": "rules",
- "settings": {
- "rules": [
- {
- "ip": [
- "10.0.0.0/8"
- ],
- "type": "field",
- "outboundTag": "blocked"
- }
- ]
- }
- }
- }`,
- Parser: createParser(),
- Output: &core.Config{
- App: []*serial.TypedMessage{
- serial.ToTypedMessage(&log.Config{
- ErrorLogType: log.LogType_File,
- ErrorLogPath: "/var/log/xray/error.log",
- ErrorLogLevel: clog.Severity_Error,
- AccessLogType: log.LogType_File,
- AccessLogPath: "/var/log/xray/access.log",
- }),
- serial.ToTypedMessage(&dispatcher.Config{}),
- serial.ToTypedMessage(&proxyman.InboundConfig{}),
- serial.ToTypedMessage(&proxyman.OutboundConfig{}),
- serial.ToTypedMessage(&router.Config{
- DomainStrategy: router.Config_AsIs,
- Rule: []*router.RoutingRule{
- {
- Geoip: []*router.GeoIP{
- {
- Cidr: []*router.CIDR{
- {
- Ip: []byte{10, 0, 0, 0},
- Prefix: 8,
- },
- },
- },
- },
- TargetTag: &router.RoutingRule_Tag{
- Tag: "blocked",
- },
- },
- },
- }),
- },
- Inbound: []*core.InboundHandlerConfig{
- {
- ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
- PortList: &net.PortList{Range: []*net.PortRange{{
- From: 443,
- To: 500,
- }}},
- AllocationStrategy: &proxyman.AllocationStrategy{
- Type: proxyman.AllocationStrategy_Random,
- Concurrency: &proxyman.AllocationStrategy_AllocationStrategyConcurrency{
- Value: 3,
- },
- },
- StreamSettings: &internet.StreamConfig{
- ProtocolName: "websocket",
- TransportSettings: []*internet.TransportConfig{
- {
- ProtocolName: "websocket",
- Settings: serial.ToTypedMessage(&websocket.Config{
- Host: "example.domain",
- Header: map[string]string{
- "host": "example.domain",
- },
- }),
- },
- },
- SecurityType: "xray.transport.internet.tls.Config",
- SecuritySettings: []*serial.TypedMessage{
- serial.ToTypedMessage(&tls.Config{
- NextProtocol: []string{"h2"},
- }),
- },
- },
- }),
- ProxySettings: serial.ToTypedMessage(&inbound.Config{
- User: []*protocol.User{
- {
- Level: 0,
- Account: serial.ToTypedMessage(&vmess.Account{
- Id: "0cdf8a45-303d-4fed-9780-29aa7f54175e",
- SecuritySettings: &protocol.SecurityConfig{
- Type: protocol.SecurityType_AES128_GCM,
- },
- }),
- },
- },
- }),
- },
- },
- },
- },
- })
- }
- func TestMuxConfig_Build(t *testing.T) {
- tests := []struct {
- name string
- fields string
- want *proxyman.MultiplexingConfig
- }{
- {"default", `{"enabled": true, "concurrency": 16}`, &proxyman.MultiplexingConfig{
- Enabled: true,
- Concurrency: 16,
- XudpConcurrency: 0,
- XudpProxyUDP443: "reject",
- }},
- {"empty def", `{}`, &proxyman.MultiplexingConfig{
- Enabled: false,
- Concurrency: 0,
- XudpConcurrency: 0,
- XudpProxyUDP443: "reject",
- }},
- {"not enable", `{"enabled": false, "concurrency": 4}`, &proxyman.MultiplexingConfig{
- Enabled: false,
- Concurrency: 4,
- XudpConcurrency: 0,
- XudpProxyUDP443: "reject",
- }},
- {"forbidden", `{"enabled": false, "concurrency": -1}`, &proxyman.MultiplexingConfig{
- Enabled: false,
- Concurrency: -1,
- XudpConcurrency: 0,
- XudpProxyUDP443: "reject",
- }},
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- m := &MuxConfig{}
- common.Must(json.Unmarshal([]byte(tt.fields), m))
- if got, _ := m.Build(); !reflect.DeepEqual(got, tt.want) {
- t.Errorf("MuxConfig.Build() = %v, want %v", got, tt.want)
- }
- })
- }
- }
- func TestConfig_Override(t *testing.T) {
- tests := []struct {
- name string
- orig *Config
- over *Config
- fn string
- want *Config
- }{
- {
- "combine/empty",
- &Config{},
- &Config{
- LogConfig: &LogConfig{},
- RouterConfig: &RouterConfig{},
- DNSConfig: &DNSConfig{},
- Policy: &PolicyConfig{},
- API: &APIConfig{},
- Stats: &StatsConfig{},
- Reverse: &ReverseConfig{},
- },
- "",
- &Config{
- LogConfig: &LogConfig{},
- RouterConfig: &RouterConfig{},
- DNSConfig: &DNSConfig{},
- Policy: &PolicyConfig{},
- API: &APIConfig{},
- Stats: &StatsConfig{},
- Reverse: &ReverseConfig{},
- },
- },
- {
- "combine/newattr",
- &Config{InboundConfigs: []InboundDetourConfig{{Tag: "old"}}},
- &Config{LogConfig: &LogConfig{}}, "",
- &Config{LogConfig: &LogConfig{}, InboundConfigs: []InboundDetourConfig{{Tag: "old"}}},
- },
- {
- "replace/inbounds",
- &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}}},
- &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}}},
- "",
- &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos0"}, {Tag: "pos1", Protocol: "kcp"}}},
- },
- {
- "replace/inbounds-replaceall",
- &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}}},
- &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}, {Tag: "pos2", Protocol: "kcp"}}},
- "",
- &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos0"}, {Tag: "pos1", Protocol: "kcp"}, {Tag: "pos2", Protocol: "kcp"}}},
- },
- {
- "replace/notag-append",
- &Config{InboundConfigs: []InboundDetourConfig{{}, {Protocol: "vmess"}}},
- &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}}},
- "",
- &Config{InboundConfigs: []InboundDetourConfig{{}, {Protocol: "vmess"}, {Tag: "pos1", Protocol: "kcp"}}},
- },
- {
- "replace/outbounds",
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}}},
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}}},
- "",
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Tag: "pos1", Protocol: "kcp"}}},
- },
- {
- "replace/outbounds-prepend",
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}, {Tag: "pos3"}}},
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}, {Tag: "pos2", Protocol: "kcp"}, {Tag: "pos4", Protocol: "kcp"}}},
- "config.json",
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos2", Protocol: "kcp"}, {Tag: "pos4", Protocol: "kcp"}, {Tag: "pos0"}, {Tag: "pos1", Protocol: "kcp"}, {Tag: "pos3"}}},
- },
- {
- "replace/outbounds-append",
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}}},
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos2", Protocol: "kcp"}}},
- "config_tail.json",
- &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}, {Tag: "pos2", Protocol: "kcp"}}},
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- tt.orig.Override(tt.over, tt.fn)
- if r := cmp.Diff(tt.orig, tt.want); r != "" {
- t.Error(r)
- }
- })
- }
- }
|