sing-box/test/tuic_test.go

199 lines
5.1 KiB
Go
Raw Permalink Normal View History

2023-07-23 14:42:19 +08:00
package main
import (
"net/netip"
"testing"
C "github.com/sagernet/sing-box/constant"
"github.com/sagernet/sing-box/option"
2024-11-07 21:44:04 +08:00
"github.com/sagernet/sing/common"
"github.com/sagernet/sing/common/json/badoption"
2023-07-23 14:42:19 +08:00
"github.com/gofrs/uuid/v5"
)
func TestTUICSelf(t *testing.T) {
t.Run("self", func(t *testing.T) {
testTUICSelf(t, false, false)
})
t.Run("self-udp-stream", func(t *testing.T) {
testTUICSelf(t, true, false)
})
t.Run("self-early", func(t *testing.T) {
testTUICSelf(t, false, true)
})
}
func testTUICSelf(t *testing.T, udpStream bool, zeroRTTHandshake bool) {
_, certPem, keyPem := createSelfSignedCertificate(t, "example.org")
var udpRelayMode string
if udpStream {
udpRelayMode = "quic"
}
startInstance(t, option.Options{
2024-11-07 21:44:04 +08:00
LegacyInbounds: []option.LegacyInbound{
2023-07-23 14:42:19 +08:00
{
Type: C.TypeMixed,
Tag: "mixed-in",
MixedOptions: option.HTTPMixedInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-07 21:44:04 +08:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2023-07-23 14:42:19 +08:00
ListenPort: clientPort,
},
},
},
{
Type: C.TypeTUIC,
TUICOptions: option.TUICInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-07 21:44:04 +08:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2023-07-23 14:42:19 +08:00
ListenPort: serverPort,
},
Users: []option.TUICUser{{
UUID: uuid.Nil.String(),
}},
ZeroRTTHandshake: zeroRTTHandshake,
InboundTLSOptionsContainer: option.InboundTLSOptionsContainer{
TLS: &option.InboundTLSOptions{
Enabled: true,
ServerName: "example.org",
CertificatePath: certPem,
KeyPath: keyPem,
},
2023-07-23 14:42:19 +08:00
},
},
},
},
2024-11-02 00:39:02 +08:00
LegacyOutbounds: []option.LegacyOutbound{
2023-07-23 14:42:19 +08:00
{
Type: C.TypeDirect,
},
{
Type: C.TypeTUIC,
Tag: "tuic-out",
TUICOptions: option.TUICOutboundOptions{
ServerOptions: option.ServerOptions{
Server: "127.0.0.1",
ServerPort: serverPort,
},
UUID: uuid.Nil.String(),
UDPRelayMode: udpRelayMode,
ZeroRTTHandshake: zeroRTTHandshake,
OutboundTLSOptionsContainer: option.OutboundTLSOptionsContainer{
TLS: &option.OutboundTLSOptions{
Enabled: true,
ServerName: "example.org",
CertificatePath: certPem,
},
2023-07-23 14:42:19 +08:00
},
},
},
},
Route: &option.RouteOptions{
Rules: []option.Rule{
{
2024-10-21 23:38:34 +08:00
Type: C.RuleTypeDefault,
2023-07-23 14:42:19 +08:00
DefaultOptions: option.DefaultRule{
2024-10-21 23:38:34 +08:00
RawDefaultRule: option.RawDefaultRule{
Inbound: []string{"mixed-in"},
},
RuleAction: option.RuleAction{
Action: C.RuleActionTypeRoute,
RouteOptions: option.RouteActionOptions{
Outbound: "tuic-out",
},
},
2023-07-23 14:42:19 +08:00
},
},
},
},
})
2023-08-21 18:11:44 +08:00
testSuitLargeUDP(t, clientPort, testPort)
2023-07-23 14:42:19 +08:00
}
func TestTUICInbound(t *testing.T) {
caPem, certPem, keyPem := createSelfSignedCertificate(t, "example.org")
startInstance(t, option.Options{
2024-11-07 21:44:04 +08:00
LegacyInbounds: []option.LegacyInbound{
2023-07-23 14:42:19 +08:00
{
Type: C.TypeTUIC,
TUICOptions: option.TUICInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-07 21:44:04 +08:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2023-07-23 14:42:19 +08:00
ListenPort: serverPort,
},
Users: []option.TUICUser{{
UUID: "FE35D05B-8803-45C4-BAE6-723AD2CD5D3D",
Password: "tuic",
}},
InboundTLSOptionsContainer: option.InboundTLSOptionsContainer{
TLS: &option.InboundTLSOptions{
Enabled: true,
ServerName: "example.org",
CertificatePath: certPem,
KeyPath: keyPem,
},
2023-07-23 14:42:19 +08:00
},
},
},
},
})
startDockerContainer(t, DockerOptions{
Image: ImageTUICClient,
Ports: []uint16{serverPort, clientPort},
Bind: map[string]string{
"tuic-client.json": "/etc/tuic/config.json",
caPem: "/etc/tuic/ca.pem",
},
})
2023-08-21 18:11:44 +08:00
testSuitLargeUDP(t, clientPort, testPort)
2023-07-23 14:42:19 +08:00
}
func TestTUICOutbound(t *testing.T) {
_, certPem, keyPem := createSelfSignedCertificate(t, "example.org")
startDockerContainer(t, DockerOptions{
Image: ImageTUICServer,
Ports: []uint16{testPort},
Bind: map[string]string{
"tuic-server.json": "/etc/tuic/config.json",
certPem: "/etc/tuic/cert.pem",
keyPem: "/etc/tuic/key.pem",
},
})
startInstance(t, option.Options{
2024-11-07 21:44:04 +08:00
LegacyInbounds: []option.LegacyInbound{
2023-07-23 14:42:19 +08:00
{
Type: C.TypeMixed,
MixedOptions: option.HTTPMixedInboundOptions{
ListenOptions: option.ListenOptions{
2024-11-07 21:44:04 +08:00
Listen: common.Ptr(badoption.Addr(netip.IPv4Unspecified())),
2023-07-23 14:42:19 +08:00
ListenPort: clientPort,
},
},
},
},
2024-11-02 00:39:02 +08:00
LegacyOutbounds: []option.LegacyOutbound{
2023-07-23 14:42:19 +08:00
{
Type: C.TypeTUIC,
TUICOptions: option.TUICOutboundOptions{
ServerOptions: option.ServerOptions{
Server: "127.0.0.1",
ServerPort: serverPort,
},
UUID: "FE35D05B-8803-45C4-BAE6-723AD2CD5D3D",
Password: "tuic",
OutboundTLSOptionsContainer: option.OutboundTLSOptionsContainer{
TLS: &option.OutboundTLSOptions{
Enabled: true,
ServerName: "example.org",
CertificatePath: certPem,
},
2023-07-23 14:42:19 +08:00
},
},
},
},
})
2023-08-21 18:11:44 +08:00
testSuitLargeUDP(t, clientPort, testPort)
2023-07-23 14:42:19 +08:00
}