Some minor fixes (#433)

This commit is contained in:
Chinsyo 2020-11-20 01:02:52 +08:00 committed by GitHub
parent 9bf09b2242
commit 2ac380788b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
6 changed files with 11 additions and 39 deletions

View File

@ -1,21 +0,0 @@
// Package proxyman defines applications for managing inbound and outbound proxies.
package proxyman
import (
"context"
"v2ray.com/core/common/session"
)
// ContextWithSniffingConfig is a wrapper of session.ContextWithContent.
// Deprecated. Use session.ContextWithContent directly.
func ContextWithSniffingConfig(ctx context.Context, c *SniffingConfig) context.Context {
content := session.ContentFromContext(ctx)
if content == nil {
content = new(session.Content)
ctx = session.ContextWithContent(ctx, content)
}
content.SniffingRequest.Enabled = c.Enabled
content.SniffingRequest.OverrideDestinationForProtocol = c.DestinationOverride
return ctx
}

View File

@ -5,7 +5,7 @@ import (
"path/filepath"
"testing"
proto "github.com/golang/protobuf/proto"
"github.com/golang/protobuf/proto"
"v2ray.com/core/app/router"
"v2ray.com/core/common"
"v2ray.com/core/common/net"

View File

@ -6,7 +6,7 @@ import (
"strconv"
"testing"
proto "github.com/golang/protobuf/proto"
"github.com/golang/protobuf/proto"
. "v2ray.com/core/app/router"
"v2ray.com/core/common"

View File

@ -113,6 +113,7 @@ func (v *TimedUserValidator) removeExpiredHashes(expire uint32) {
func (v *TimedUserValidator) updateUserHash() {
now := time.Now()
nowSec := protocol.Timestamp(now.Unix())
v.Lock()
defer v.Unlock()
@ -154,8 +155,8 @@ func (v *TimedUserValidator) Add(u *protocol.MemoryUser) error {
}
func (v *TimedUserValidator) Get(userHash []byte) (*protocol.MemoryUser, protocol.Timestamp, bool, error) {
defer v.RUnlock()
v.RLock()
defer v.RUnlock()
v.behaviorFused = true
@ -173,8 +174,9 @@ func (v *TimedUserValidator) Get(userHash []byte) (*protocol.MemoryUser, protoco
}
func (v *TimedUserValidator) GetAEAD(userHash []byte) (*protocol.MemoryUser, bool, error) {
defer v.RUnlock()
v.RLock()
defer v.RUnlock()
var userHashFL [16]byte
copy(userHashFL[:], userHash)
@ -220,6 +222,7 @@ func (v *TimedUserValidator) Close() error {
func (v *TimedUserValidator) GetBehaviorSeed() uint64 {
v.Lock()
defer v.Unlock()
v.behaviorFused = true
if v.behaviorSeed == 0 {
v.behaviorSeed = dice.RollUint64()
@ -230,6 +233,7 @@ func (v *TimedUserValidator) GetBehaviorSeed() uint64 {
func (v *TimedUserValidator) BurnTaintFuse(userHash []byte) error {
v.RLock()
defer v.RUnlock()
var userHashFL [16]byte
copy(userHashFL[:], userHash)

View File

@ -29,15 +29,10 @@ func TestReaderWriter(t *testing.T) {
common.Must(err)
reader := &HeaderReader{}
buffer, err := reader.Read(cache)
_, err = reader.Read(cache)
if err != nil && !strings.HasPrefix(err.Error(), "malformed HTTP request") {
t.Error("unknown error ", err)
}
_ = buffer
/*
if buffer.String() != "efg" {
t.Error("buffer: ", buffer.String())
}*/
}
func TestRequestHeader(t *testing.T) {
@ -70,17 +65,11 @@ func TestLongRequestHeader(t *testing.T) {
payload = append(payload, []byte("abcd")...)
reader := HeaderReader{}
b, err := reader.Read(bytes.NewReader(payload))
_, err := reader.Read(bytes.NewReader(payload))
if err != nil && !(strings.HasPrefix(err.Error(), "invalid") || strings.HasPrefix(err.Error(), "malformed")) {
t.Error("unknown error ", err)
}
_ = b
/*
common.Must(err)
if b.String() != "abcd" {
t.Error("expect content abcd, but actually ", b.String())
}*/
}
func TestConnection(t *testing.T) {

View File

@ -3,7 +3,7 @@ package core_test
import (
"testing"
proto "github.com/golang/protobuf/proto"
"github.com/golang/protobuf/proto"
. "v2ray.com/core"
"v2ray.com/core/app/dispatcher"
"v2ray.com/core/app/proxyman"