| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124 |
- package scenarios
- import (
- "testing"
- //"time"
- "github.com/xtls/xray-core/app/log"
- "github.com/xtls/xray-core/app/proxyman"
- "github.com/xtls/xray-core/common"
- clog "github.com/xtls/xray-core/common/log"
- "github.com/xtls/xray-core/common/net"
- "github.com/xtls/xray-core/common/serial"
- core "github.com/xtls/xray-core/core"
- "github.com/xtls/xray-core/infra/conf"
- "github.com/xtls/xray-core/proxy/dokodemo"
- "github.com/xtls/xray-core/proxy/freedom"
- "github.com/xtls/xray-core/proxy/wireguard"
- "github.com/xtls/xray-core/testing/servers/tcp"
- "github.com/xtls/xray-core/testing/servers/udp"
- //"golang.org/x/sync/errgroup"
- )
- func TestWireguard(t *testing.T) {
- tcpServer := tcp.Server{
- MsgProcessor: xor,
- }
- dest, err := tcpServer.Start()
- common.Must(err)
- defer tcpServer.Close()
- serverPrivate, _ := conf.ParseWireGuardKey("EGs4lTSJPmgELx6YiJAmPR2meWi6bY+e9rTdCipSj10=")
- serverPublic, _ := conf.ParseWireGuardKey("osAMIyil18HeZXGGBDC9KpZoM+L2iGyXWVSYivuM9B0=")
- clientPrivate, _ := conf.ParseWireGuardKey("CPQSpgxgdQRZa5SUbT3HLv+mmDVHLW5YR/rQlzum/2I=")
- clientPublic, _ := conf.ParseWireGuardKey("MmLJ5iHFVVBp7VsB0hxfpQ0wEzAbT2KQnpQpj0+RtBw=")
- serverPort := udp.PickPort()
- serverConfig := &core.Config{
- App: []*serial.TypedMessage{
- serial.ToTypedMessage(&log.Config{
- ErrorLogLevel: clog.Severity_Debug,
- ErrorLogType: log.LogType_Console,
- }),
- },
- Inbound: []*core.InboundHandlerConfig{
- {
- ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
- PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(serverPort)}},
- Listen: net.NewIPOrDomain(net.LocalHostIP),
- }),
- ProxySettings: serial.ToTypedMessage(&wireguard.DeviceConfig{
- IsClient: false,
- KernelMode: false,
- Endpoint: []string{"10.0.0.1"},
- Mtu: 1420,
- SecretKey: serverPrivate,
- Peers: []*wireguard.PeerConfig{{
- PublicKey: serverPublic,
- AllowedIps: []string{"0.0.0.0/0", "::0/0"},
- }},
- }),
- },
- },
- Outbound: []*core.OutboundHandlerConfig{
- {
- ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
- },
- },
- }
- clientPort := tcp.PickPort()
- clientConfig := &core.Config{
- App: []*serial.TypedMessage{
- serial.ToTypedMessage(&log.Config{
- ErrorLogLevel: clog.Severity_Debug,
- ErrorLogType: log.LogType_Console,
- }),
- },
- Inbound: []*core.InboundHandlerConfig{
- {
- ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
- PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(clientPort)}},
- Listen: net.NewIPOrDomain(net.LocalHostIP),
- }),
- ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
- Address: net.NewIPOrDomain(dest.Address),
- Port: uint32(dest.Port),
- NetworkList: &net.NetworkList{
- Network: []net.Network{net.Network_TCP},
- },
- }),
- },
- },
- Outbound: []*core.OutboundHandlerConfig{
- {
- ProxySettings: serial.ToTypedMessage(&wireguard.DeviceConfig{
- IsClient: true,
- KernelMode: false,
- Endpoint: []string{"10.0.0.2"},
- Mtu: 1420,
- SecretKey: clientPrivate,
- Peers: []*wireguard.PeerConfig{{
- Endpoint: "127.0.0.1:" + serverPort.String(),
- PublicKey: clientPublic,
- AllowedIps: []string{"0.0.0.0/0", "::0/0"},
- }},
- }),
- },
- },
- }
- servers, err := InitializeServerConfigs(serverConfig, clientConfig)
- common.Must(err)
- defer CloseAllServers(servers)
- // FIXME: for some reason wg server does not receive
- // var errg errgroup.Group
- // for i := 0; i < 1; i++ {
- // errg.Go(testTCPConn(clientPort, 1024, time.Second*2))
- // }
- // if err := errg.Wait(); err != nil {
- // t.Error(err)
- // }
- }
|