github.com/xmplusdev/xray-core@v1.8.10/infra/conf/xray_test.go (about) 1 package conf_test 2 3 import ( 4 "encoding/json" 5 "reflect" 6 "testing" 7 8 "github.com/google/go-cmp/cmp" 9 "github.com/xmplusdev/xray-core/app/dispatcher" 10 "github.com/xmplusdev/xray-core/app/log" 11 "github.com/xmplusdev/xray-core/app/proxyman" 12 "github.com/xmplusdev/xray-core/app/router" 13 "github.com/xmplusdev/xray-core/common" 14 clog "github.com/xmplusdev/xray-core/common/log" 15 "github.com/xmplusdev/xray-core/common/net" 16 "github.com/xmplusdev/xray-core/common/protocol" 17 "github.com/xmplusdev/xray-core/common/serial" 18 core "github.com/xmplusdev/xray-core/core" 19 . "github.com/xmplusdev/xray-core/infra/conf" 20 "github.com/xmplusdev/xray-core/proxy/blackhole" 21 dns_proxy "github.com/xmplusdev/xray-core/proxy/dns" 22 "github.com/xmplusdev/xray-core/proxy/freedom" 23 "github.com/xmplusdev/xray-core/proxy/vmess" 24 "github.com/xmplusdev/xray-core/proxy/vmess/inbound" 25 "github.com/xmplusdev/xray-core/transport/internet" 26 "github.com/xmplusdev/xray-core/transport/internet/http" 27 "github.com/xmplusdev/xray-core/transport/internet/tls" 28 "github.com/xmplusdev/xray-core/transport/internet/websocket" 29 "google.golang.org/protobuf/proto" 30 ) 31 32 func TestXrayConfig(t *testing.T) { 33 createParser := func() func(string) (proto.Message, error) { 34 return func(s string) (proto.Message, error) { 35 config := new(Config) 36 if err := json.Unmarshal([]byte(s), config); err != nil { 37 return nil, err 38 } 39 return config.Build() 40 } 41 } 42 43 runMultiTestCase(t, []TestCase{ 44 { 45 Input: `{ 46 "outbound": { 47 "protocol": "freedom", 48 "settings": {} 49 }, 50 "log": { 51 "access": "/var/log/xray/access.log", 52 "loglevel": "error", 53 "error": "/var/log/xray/error.log" 54 }, 55 "inbound": { 56 "streamSettings": { 57 "network": "ws", 58 "wsSettings": { 59 "headers": { 60 "host": "example.domain" 61 }, 62 "path": "" 63 }, 64 "tlsSettings": { 65 "alpn": "h2" 66 }, 67 "security": "tls" 68 }, 69 "protocol": "vmess", 70 "port": 443, 71 "settings": { 72 "clients": [ 73 { 74 "security": "aes-128-gcm", 75 "id": "0cdf8a45-303d-4fed-9780-29aa7f54175e" 76 } 77 ] 78 } 79 }, 80 "inbounds": [{ 81 "streamSettings": { 82 "network": "ws", 83 "wsSettings": { 84 "headers": { 85 "host": "example.domain" 86 }, 87 "path": "" 88 }, 89 "tlsSettings": { 90 "alpn": "h2" 91 }, 92 "security": "tls" 93 }, 94 "protocol": "vmess", 95 "port": "443-500", 96 "allocate": { 97 "strategy": "random", 98 "concurrency": 3 99 }, 100 "settings": { 101 "clients": [ 102 { 103 "security": "aes-128-gcm", 104 "id": "0cdf8a45-303d-4fed-9780-29aa7f54175e" 105 } 106 ] 107 } 108 }], 109 "outboundDetour": [ 110 { 111 "tag": "blocked", 112 "protocol": "blackhole" 113 }, 114 { 115 "protocol": "dns" 116 } 117 ], 118 "routing": { 119 "strategy": "rules", 120 "settings": { 121 "rules": [ 122 { 123 "ip": [ 124 "10.0.0.0/8" 125 ], 126 "type": "field", 127 "outboundTag": "blocked" 128 } 129 ] 130 } 131 }, 132 "transport": { 133 "httpSettings": { 134 "path": "/test" 135 } 136 } 137 }`, 138 Parser: createParser(), 139 Output: &core.Config{ 140 App: []*serial.TypedMessage{ 141 serial.ToTypedMessage(&log.Config{ 142 ErrorLogType: log.LogType_File, 143 ErrorLogPath: "/var/log/xray/error.log", 144 ErrorLogLevel: clog.Severity_Error, 145 AccessLogType: log.LogType_File, 146 AccessLogPath: "/var/log/xray/access.log", 147 }), 148 serial.ToTypedMessage(&dispatcher.Config{}), 149 serial.ToTypedMessage(&proxyman.InboundConfig{}), 150 serial.ToTypedMessage(&proxyman.OutboundConfig{}), 151 serial.ToTypedMessage(&router.Config{ 152 DomainStrategy: router.Config_AsIs, 153 Rule: []*router.RoutingRule{ 154 { 155 Geoip: []*router.GeoIP{ 156 { 157 Cidr: []*router.CIDR{ 158 { 159 Ip: []byte{10, 0, 0, 0}, 160 Prefix: 8, 161 }, 162 }, 163 }, 164 }, 165 TargetTag: &router.RoutingRule_Tag{ 166 Tag: "blocked", 167 }, 168 }, 169 }, 170 }), 171 }, 172 Outbound: []*core.OutboundHandlerConfig{ 173 { 174 SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{ 175 StreamSettings: &internet.StreamConfig{ 176 ProtocolName: "tcp", 177 TransportSettings: []*internet.TransportConfig{ 178 { 179 ProtocolName: "http", 180 Settings: serial.ToTypedMessage(&http.Config{ 181 Path: "/test", 182 }), 183 }, 184 }, 185 }, 186 }), 187 ProxySettings: serial.ToTypedMessage(&freedom.Config{ 188 DomainStrategy: freedom.Config_AS_IS, 189 UserLevel: 0, 190 }), 191 }, 192 { 193 Tag: "blocked", 194 SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{ 195 StreamSettings: &internet.StreamConfig{ 196 ProtocolName: "tcp", 197 TransportSettings: []*internet.TransportConfig{ 198 { 199 ProtocolName: "http", 200 Settings: serial.ToTypedMessage(&http.Config{ 201 Path: "/test", 202 }), 203 }, 204 }, 205 }, 206 }), 207 ProxySettings: serial.ToTypedMessage(&blackhole.Config{}), 208 }, 209 { 210 SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{ 211 StreamSettings: &internet.StreamConfig{ 212 ProtocolName: "tcp", 213 TransportSettings: []*internet.TransportConfig{ 214 { 215 ProtocolName: "http", 216 Settings: serial.ToTypedMessage(&http.Config{ 217 Path: "/test", 218 }), 219 }, 220 }, 221 }, 222 }), 223 ProxySettings: serial.ToTypedMessage(&dns_proxy.Config{ 224 Server: &net.Endpoint{}, 225 Non_IPQuery: "drop", 226 }), 227 }, 228 }, 229 Inbound: []*core.InboundHandlerConfig{ 230 { 231 ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{ 232 PortList: &net.PortList{Range: []*net.PortRange{net.SinglePortRange(443)}}, 233 StreamSettings: &internet.StreamConfig{ 234 ProtocolName: "websocket", 235 TransportSettings: []*internet.TransportConfig{ 236 { 237 ProtocolName: "websocket", 238 Settings: serial.ToTypedMessage(&websocket.Config{ 239 Host: "example.domain", 240 Header: map[string]string{ 241 "host": "example.domain", 242 }, 243 }), 244 }, 245 { 246 ProtocolName: "http", 247 Settings: serial.ToTypedMessage(&http.Config{ 248 Path: "/test", 249 }), 250 }, 251 }, 252 SecurityType: "xray.transport.internet.tls.Config", 253 SecuritySettings: []*serial.TypedMessage{ 254 serial.ToTypedMessage(&tls.Config{ 255 NextProtocol: []string{"h2"}, 256 }), 257 }, 258 }, 259 }), 260 ProxySettings: serial.ToTypedMessage(&inbound.Config{ 261 User: []*protocol.User{ 262 { 263 Level: 0, 264 Account: serial.ToTypedMessage(&vmess.Account{ 265 Id: "0cdf8a45-303d-4fed-9780-29aa7f54175e", 266 SecuritySettings: &protocol.SecurityConfig{ 267 Type: protocol.SecurityType_AES128_GCM, 268 }, 269 }), 270 }, 271 }, 272 }), 273 }, 274 { 275 ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{ 276 PortList: &net.PortList{Range: []*net.PortRange{{ 277 From: 443, 278 To: 500, 279 }}}, 280 AllocationStrategy: &proxyman.AllocationStrategy{ 281 Type: proxyman.AllocationStrategy_Random, 282 Concurrency: &proxyman.AllocationStrategy_AllocationStrategyConcurrency{ 283 Value: 3, 284 }, 285 }, 286 StreamSettings: &internet.StreamConfig{ 287 ProtocolName: "websocket", 288 TransportSettings: []*internet.TransportConfig{ 289 { 290 ProtocolName: "websocket", 291 Settings: serial.ToTypedMessage(&websocket.Config{ 292 Host: "example.domain", 293 Header: map[string]string{ 294 "host": "example.domain", 295 }, 296 }), 297 }, 298 { 299 ProtocolName: "http", 300 Settings: serial.ToTypedMessage(&http.Config{ 301 Path: "/test", 302 }), 303 }, 304 }, 305 SecurityType: "xray.transport.internet.tls.Config", 306 SecuritySettings: []*serial.TypedMessage{ 307 serial.ToTypedMessage(&tls.Config{ 308 NextProtocol: []string{"h2"}, 309 }), 310 }, 311 }, 312 }), 313 ProxySettings: serial.ToTypedMessage(&inbound.Config{ 314 User: []*protocol.User{ 315 { 316 Level: 0, 317 Account: serial.ToTypedMessage(&vmess.Account{ 318 Id: "0cdf8a45-303d-4fed-9780-29aa7f54175e", 319 SecuritySettings: &protocol.SecurityConfig{ 320 Type: protocol.SecurityType_AES128_GCM, 321 }, 322 }), 323 }, 324 }, 325 }), 326 }, 327 }, 328 }, 329 }, 330 }) 331 } 332 333 func TestMuxConfig_Build(t *testing.T) { 334 tests := []struct { 335 name string 336 fields string 337 want *proxyman.MultiplexingConfig 338 }{ 339 {"default", `{"enabled": true, "concurrency": 16}`, &proxyman.MultiplexingConfig{ 340 Enabled: true, 341 Concurrency: 16, 342 XudpConcurrency: 0, 343 XudpProxyUDP443: "reject", 344 }}, 345 {"empty def", `{}`, &proxyman.MultiplexingConfig{ 346 Enabled: false, 347 Concurrency: 0, 348 XudpConcurrency: 0, 349 XudpProxyUDP443: "reject", 350 }}, 351 {"not enable", `{"enabled": false, "concurrency": 4}`, &proxyman.MultiplexingConfig{ 352 Enabled: false, 353 Concurrency: 4, 354 XudpConcurrency: 0, 355 XudpProxyUDP443: "reject", 356 }}, 357 {"forbidden", `{"enabled": false, "concurrency": -1}`, &proxyman.MultiplexingConfig{ 358 Enabled: false, 359 Concurrency: -1, 360 XudpConcurrency: 0, 361 XudpProxyUDP443: "reject", 362 }}, 363 } 364 for _, tt := range tests { 365 t.Run(tt.name, func(t *testing.T) { 366 m := &MuxConfig{} 367 common.Must(json.Unmarshal([]byte(tt.fields), m)) 368 if got, _ := m.Build(); !reflect.DeepEqual(got, tt.want) { 369 t.Errorf("MuxConfig.Build() = %v, want %v", got, tt.want) 370 } 371 }) 372 } 373 } 374 375 func TestConfig_Override(t *testing.T) { 376 tests := []struct { 377 name string 378 orig *Config 379 over *Config 380 fn string 381 want *Config 382 }{ 383 { 384 "combine/empty", 385 &Config{}, 386 &Config{ 387 LogConfig: &LogConfig{}, 388 RouterConfig: &RouterConfig{}, 389 DNSConfig: &DNSConfig{}, 390 Transport: &TransportConfig{}, 391 Policy: &PolicyConfig{}, 392 API: &APIConfig{}, 393 Stats: &StatsConfig{}, 394 Reverse: &ReverseConfig{}, 395 }, 396 "", 397 &Config{ 398 LogConfig: &LogConfig{}, 399 RouterConfig: &RouterConfig{}, 400 DNSConfig: &DNSConfig{}, 401 Transport: &TransportConfig{}, 402 Policy: &PolicyConfig{}, 403 API: &APIConfig{}, 404 Stats: &StatsConfig{}, 405 Reverse: &ReverseConfig{}, 406 }, 407 }, 408 { 409 "combine/newattr", 410 &Config{InboundConfigs: []InboundDetourConfig{{Tag: "old"}}}, 411 &Config{LogConfig: &LogConfig{}}, "", 412 &Config{LogConfig: &LogConfig{}, InboundConfigs: []InboundDetourConfig{{Tag: "old"}}}, 413 }, 414 { 415 "replace/inbounds", 416 &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}}}, 417 &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}}}, 418 "", 419 &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos0"}, {Tag: "pos1", Protocol: "kcp"}}}, 420 }, 421 { 422 "replace/inbounds-replaceall", 423 &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}}}, 424 &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}, {Tag: "pos2", Protocol: "kcp"}}}, 425 "", 426 &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos0"}, {Tag: "pos1", Protocol: "kcp"}, {Tag: "pos2", Protocol: "kcp"}}}, 427 }, 428 { 429 "replace/notag-append", 430 &Config{InboundConfigs: []InboundDetourConfig{{}, {Protocol: "vmess"}}}, 431 &Config{InboundConfigs: []InboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}}}, 432 "", 433 &Config{InboundConfigs: []InboundDetourConfig{{}, {Protocol: "vmess"}, {Tag: "pos1", Protocol: "kcp"}}}, 434 }, 435 { 436 "replace/outbounds", 437 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}}}, 438 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}}}, 439 "", 440 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Tag: "pos1", Protocol: "kcp"}}}, 441 }, 442 { 443 "replace/outbounds-prepend", 444 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}, {Tag: "pos3"}}}, 445 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos1", Protocol: "kcp"}, {Tag: "pos2", Protocol: "kcp"}, {Tag: "pos4", Protocol: "kcp"}}}, 446 "config.json", 447 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos2", Protocol: "kcp"}, {Tag: "pos4", Protocol: "kcp"}, {Tag: "pos0"}, {Tag: "pos1", Protocol: "kcp"}, {Tag: "pos3"}}}, 448 }, 449 { 450 "replace/outbounds-append", 451 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}}}, 452 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos2", Protocol: "kcp"}}}, 453 "config_tail.json", 454 &Config{OutboundConfigs: []OutboundDetourConfig{{Tag: "pos0"}, {Protocol: "vmess", Tag: "pos1"}, {Tag: "pos2", Protocol: "kcp"}}}, 455 }, 456 } 457 for _, tt := range tests { 458 t.Run(tt.name, func(t *testing.T) { 459 tt.orig.Override(tt.over, tt.fn) 460 if r := cmp.Diff(tt.orig, tt.want); r != "" { 461 t.Error(r) 462 } 463 }) 464 } 465 }