Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
G
gost
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Locked Files
Issues
0
Issues
0
List
Boards
Labels
Service Desk
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Security & Compliance
Security & Compliance
Dependency List
License Compliance
Packages
Packages
List
Container Registry
Analytics
Analytics
CI / CD
Code Review
Insights
Issues
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
nanahira
gost
Commits
5e94eb64
Commit
5e94eb64
authored
Dec 09, 2018
by
ginuerzh
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
add more SNI tests
parent
75f71daa
Changes
13
Hide whitespace changes
Inline
Side-by-side
Showing
13 changed files
with
794 additions
and
16 deletions
+794
-16
.travis.yml
.travis.yml
+3
-0
handler.go
handler.go
+8
-0
http2_test.go
http2_test.go
+131
-0
http_test.go
http_test.go
+1
-0
kcp_test.go
kcp_test.go
+66
-0
quic.go
quic.go
+1
-1
quic_test.go
quic_test.go
+66
-0
sni.go
sni.go
+5
-1
sni_test.go
sni_test.go
+54
-14
ssh_test.go
ssh_test.go
+66
-0
tls_test.go
tls_test.go
+131
-0
ws_test.go
ws_test.go
+131
-0
wss_test.go
wss_test.go
+131
-0
No files found.
.travis.yml
View file @
5e94eb64
...
...
@@ -7,3 +7,6 @@ install: true
script
:
-
env GO111MODULE=on go test -race -v
-
cd cmd/gost && env GO111MODULE=on go build
after_success
:
-
bash <(curl -s https://codecov.io/bash)
handler.go
View file @
5e94eb64
...
...
@@ -34,6 +34,7 @@ type HandlerOptions struct {
Hosts
*
Hosts
ProbeResist
string
Node
Node
Host
string
}
// HandlerOption allows a common way to set handler options.
...
...
@@ -137,6 +138,13 @@ func NodeHandlerOption(node Node) HandlerOption {
}
}
// HostHandlerOption sets the target host for SNI proxy.
func
HostHandlerOption
(
host
string
)
HandlerOption
{
return
func
(
opts
*
HandlerOptions
)
{
opts
.
Host
=
host
}
}
type
autoHandler
struct
{
options
*
HandlerOptions
}
...
...
http2_test.go
View file @
5e94eb64
...
...
@@ -3,6 +3,7 @@ package gost
import
(
"crypto/rand"
"crypto/tls"
"fmt"
"net/http/httptest"
"net/url"
"testing"
...
...
@@ -418,6 +419,71 @@ func TestSSOverH2(t *testing.T) {
}
}
func
sniOverH2Roundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
H2Listener
(
""
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
H2Transporter
(
nil
),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverH2
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverH2Roundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
func
httpOverH2CRoundtrip
(
targetURL
string
,
data
[]
byte
,
clientInfo
*
url
.
Userinfo
,
serverInfo
[]
*
url
.
Userinfo
)
error
{
...
...
@@ -709,3 +775,68 @@ func TestSSOverH2C(t *testing.T) {
}
}
}
func
sniOverH2CRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
H2CListener
(
""
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
H2CTransporter
(),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverH2C
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverH2CRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
http_test.go
View file @
5e94eb64
...
...
@@ -20,6 +20,7 @@ import (
func
init
()
{
// SetLogger(&LogLogger{})
// Debug = true
cert
,
err
:=
GenCertificate
()
if
err
!=
nil
{
panic
(
err
)
...
...
kcp_test.go
View file @
5e94eb64
...
...
@@ -2,6 +2,7 @@ package gost
import
(
"crypto/rand"
"fmt"
"net/http/httptest"
"net/url"
"testing"
...
...
@@ -299,3 +300,68 @@ func TestSSOverKCP(t *testing.T) {
}
}
}
func
sniOverKCPRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
KCPListener
(
"localhost:0"
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
KCPTransporter
(
nil
),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverKCP
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverKCPRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
quic.go
View file @
5e94eb64
...
...
@@ -137,7 +137,7 @@ func (tr *quicTransporter) initSession(addr string, conn net.Conn, config *QUICC
}
session
,
err
:=
quic
.
Dial
(
udpConn
,
udpAddr
,
addr
,
config
.
TLSConfig
,
quicConfig
)
if
err
!=
nil
{
log
.
Log
(
"quic dial:"
,
err
)
log
.
Log
f
(
"quic dial %s: %v"
,
addr
,
err
)
return
nil
,
err
}
return
&
quicSession
{
conn
:
conn
,
session
:
session
},
nil
...
...
quic_test.go
View file @
5e94eb64
...
...
@@ -2,6 +2,7 @@ package gost
import
(
"crypto/rand"
"fmt"
"net/http/httptest"
"net/url"
"testing"
...
...
@@ -299,3 +300,68 @@ func TestSSOverQUIC(t *testing.T) {
}
}
}
func
sniOverQUICRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
QUICListener
(
"localhost:0"
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
QUICTransporter
(
nil
),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverQUIC
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverQUICRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
sni.go
View file @
5e94eb64
...
...
@@ -91,7 +91,11 @@ func (h *sniHandler) Handle(conn net.Conn) {
return
}
host
=
net
.
JoinHostPort
(
host
,
"443"
)
_
,
sport
,
_
:=
net
.
SplitHostPort
(
h
.
options
.
Host
)
if
sport
==
""
{
sport
=
"443"
}
host
=
net
.
JoinHostPort
(
host
,
sport
)
log
.
Logf
(
"[sni] %s -> %s -> %s"
,
conn
.
RemoteAddr
(),
h
.
options
.
Node
.
String
(),
host
)
...
...
sni_test.go
View file @
5e94eb64
...
...
@@ -6,6 +6,8 @@ import (
"crypto/rand"
"crypto/tls"
"errors"
"fmt"
"io/ioutil"
"net/http"
"net/http/httptest"
"net/url"
...
...
@@ -18,18 +20,21 @@ func sniRoundtrip(client *Client, server *Server, targetURL string, data []byte)
if
err
!=
nil
{
return
}
defer
conn
.
Close
()
conn
.
SetDeadline
(
time
.
Now
()
.
Add
(
3
*
time
.
Second
))
conn
,
err
=
client
.
Handshake
(
conn
)
conn
,
err
=
client
.
Handshake
(
conn
,
AddrHandshakeOption
(
server
.
Addr
()
.
String
())
)
if
err
!=
nil
{
return
}
defer
conn
.
Close
()
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
}
conn
.
SetDeadline
(
time
.
Now
()
.
Add
(
3
*
time
.
Second
))
defer
conn
.
SetDeadline
(
time
.
Time
{})
conn
,
err
=
client
.
Connect
(
conn
,
u
.
Host
)
if
err
!=
nil
{
return
...
...
@@ -38,8 +43,8 @@ func sniRoundtrip(client *Client, server *Server, targetURL string, data []byte)
if
u
.
Scheme
==
"https"
{
conn
=
tls
.
Client
(
conn
,
&
tls
.
Config
{
InsecureSkipVerify
:
fals
e
,
ServerName
:
u
.
Hostname
(),
InsecureSkipVerify
:
tru
e
,
//
ServerName: u.Hostname(),
})
u
.
Scheme
=
"http"
}
...
...
@@ -64,6 +69,15 @@ func sniRoundtrip(client *Client, server *Server, targetURL string, data []byte)
return
errors
.
New
(
resp
.
Status
)
}
recv
,
err
:=
ioutil
.
ReadAll
(
resp
.
Body
)
if
err
!=
nil
{
return
}
if
!
bytes
.
Equal
(
data
,
recv
)
{
return
fmt
.
Errorf
(
"data not equal"
)
}
return
}
...
...
@@ -73,6 +87,11 @@ func sniProxyRoundtrip(targetURL string, data []byte, host string) error {
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
TCPTransporter
(),
...
...
@@ -80,7 +99,7 @@ func sniProxyRoundtrip(targetURL string, data []byte, host string) error {
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(),
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)
),
}
go
server
.
Run
()
...
...
@@ -90,19 +109,40 @@ func sniProxyRoundtrip(targetURL string, data []byte, host string) error {
}
func
TestSNIProxy
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
New
TLS
Server
(
httpTestHandler
)
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
err
:=
sniProxyRoundtrip
(
"https://github.com"
,
sendData
,
""
)
if
err
!=
nil
{
t
.
Errorf
(
"got error: %v"
,
err
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
err
=
sniProxyRoundtrip
(
"https://github.com"
,
sendData
,
"google.com"
)
if
err
!=
nil
{
t
.
Errorf
(
"got error: %v"
,
err
)
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniProxyRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
ssh_test.go
View file @
5e94eb64
...
...
@@ -3,6 +3,7 @@ package gost
import
(
"crypto/rand"
"crypto/tls"
"fmt"
"net/http/httptest"
"net/url"
"testing"
...
...
@@ -301,3 +302,68 @@ func TestSSOverSSHTunnel(t *testing.T) {
}
}
}
func
sniOverSSHTunnelRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
SSHTunnelListener
(
""
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
SSHTunnelTransporter
(),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverSSHTunnel
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverSSHTunnelRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
tls_test.go
View file @
5e94eb64
...
...
@@ -3,6 +3,7 @@ package gost
import
(
"crypto/rand"
"crypto/tls"
"fmt"
"net/http/httptest"
"net/url"
"testing"
...
...
@@ -302,6 +303,71 @@ func TestSSOverTLS(t *testing.T) {
}
}
func
sniOverTLSRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
TLSListener
(
""
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
TLSTransporter
(),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverTLS
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverTLSRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
func
httpOverMTLSRoundtrip
(
targetURL
string
,
data
[]
byte
,
tlsConfig
*
tls
.
Config
,
clientInfo
*
url
.
Userinfo
,
serverInfo
[]
*
url
.
Userinfo
)
error
{
...
...
@@ -595,3 +661,68 @@ func TestSSOverMTLS(t *testing.T) {
}
}
}
func
sniOverMTLSRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
MTLSListener
(
""
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
MTLSTransporter
(),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverMTLS
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverMTLSRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
ws_test.go
View file @
5e94eb64
...
...
@@ -2,6 +2,7 @@ package gost
import
(
"crypto/rand"
"fmt"
"net/http/httptest"
"net/url"
"testing"
...
...
@@ -300,6 +301,71 @@ func TestSSOverWS(t *testing.T) {
}
}
func
sniOverWSRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
WSListener
(
""
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
WSTransporter
(
nil
),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverWS
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverWSRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
func
httpOverMWSRoundtrip
(
targetURL
string
,
data
[]
byte
,
clientInfo
*
url
.
Userinfo
,
serverInfo
[]
*
url
.
Userinfo
)
error
{
...
...
@@ -593,3 +659,68 @@ func TestSSOverMWS(t *testing.T) {
}
}
}
func
sniOverMWSRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
MWSListener
(
""
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
MWSTransporter
(
nil
),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverMWS
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverMWSRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
wss_test.go
View file @
5e94eb64
...
...
@@ -3,6 +3,7 @@ package gost
import
(
"crypto/rand"
"crypto/tls"
"fmt"
"net/http/httptest"
"net/url"
"testing"
...
...
@@ -301,6 +302,71 @@ func TestSSOverWSS(t *testing.T) {
}
}
func
sniOverWSSRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
WSSListener
(
""
,
nil
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
WSSTransporter
(
nil
),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverWSS
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverWSSRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
func
httpOverMWSSRoundtrip
(
targetURL
string
,
data
[]
byte
,
clientInfo
*
url
.
Userinfo
,
serverInfo
[]
*
url
.
Userinfo
)
error
{
...
...
@@ -594,3 +660,68 @@ func TestSSOverMWSS(t *testing.T) {
}
}
}
func
sniOverMWSSRoundtrip
(
targetURL
string
,
data
[]
byte
,
host
string
)
error
{
ln
,
err
:=
MWSSListener
(
""
,
nil
,
nil
)
if
err
!=
nil
{
return
err
}
u
,
err
:=
url
.
Parse
(
targetURL
)
if
err
!=
nil
{
return
err
}
client
:=
&
Client
{
Connector
:
SNIConnector
(
host
),
Transporter
:
MWSSTransporter
(
nil
),
}
server
:=
&
Server
{
Listener
:
ln
,
Handler
:
SNIHandler
(
HostHandlerOption
(
u
.
Host
)),
}
go
server
.
Run
()
defer
server
.
Close
()
return
sniRoundtrip
(
client
,
server
,
targetURL
,
data
)
}
func
TestSNIOverMWSS
(
t
*
testing
.
T
)
{
httpSrv
:=
httptest
.
NewServer
(
httpTestHandler
)
defer
httpSrv
.
Close
()
httpsSrv
:=
httptest
.
NewTLSServer
(
httpTestHandler
)
defer
httpsSrv
.
Close
()
sendData
:=
make
([]
byte
,
128
)
rand
.
Read
(
sendData
)
var
sniProxyTests
=
[]
struct
{
targetURL
string
host
string
pass
bool
}{
{
httpSrv
.
URL
,
""
,
true
},
{
httpSrv
.
URL
,
"example.com"
,
true
},
{
httpsSrv
.
URL
,
""
,
true
},
{
httpsSrv
.
URL
,
"example.com"
,
true
},
}
for
i
,
tc
:=
range
sniProxyTests
{
tc
:=
tc
t
.
Run
(
fmt
.
Sprintf
(
"#%d"
,
i
),
func
(
t
*
testing
.
T
)
{
err
:=
sniOverMWSSRoundtrip
(
tc
.
targetURL
,
sendData
,
tc
.
host
)
if
err
==
nil
{
if
!
tc
.
pass
{
t
.
Errorf
(
"#%d should failed"
,
i
)
}
}
else
{
// t.Logf("#%d %v", i, err)
if
tc
.
pass
{
t
.
Errorf
(
"#%d got error: %v"
,
i
,
err
)
}
}
})
}
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment