mirror of
https://github.com/MHSanaei/3x-ui.git
synced 2026-04-16 20:45:50 +00:00
1. **Fixed XPadding Placement Dropdown**: - Added the missing `cookie` and `query` options to `xPaddingPlacement` (`stream_xhttp.html`). - *Why:* Previously, users wanting `cookie` obfuscation were forced to use the `header` placement string. This caused Xray-core to blindly intercept the entire monolithic HTTP Cookie header, failing internal padding-length validations and causing the inbound to silently drop the connection. 2. **Fixed Uplink Data Placement Validation**: - Replaced the unsupported `query` option with `cookie` in `uplinkDataPlacement`. - *Why:* Xray-core's `transport_internet.go` explicitly forbids `query` as an uplink placement option. Selecting it from the UI previously sent a payload that would cause Xray-core to instantly throw an `unsupported uplink data placement: query` panic. Adding `cookie` perfectly aligns the UI with Xray-core restrictions. ### Related Issues - Resolves #3992
52 lines
1.5 KiB
Go
52 lines
1.5 KiB
Go
package wireguard_test
|
|
|
|
import (
|
|
"context"
|
|
"github.com/stretchr/testify/assert"
|
|
"runtime/debug"
|
|
"testing"
|
|
|
|
"github.com/xtls/xray-core/core"
|
|
"github.com/xtls/xray-core/proxy/wireguard"
|
|
)
|
|
|
|
// TestWireGuardServerInitializationError verifies that an error during TUN initialization
|
|
// (triggered by an empty SecretKey) in the WireGuard server does not cause a panic and returns an error instead.
|
|
func TestWireGuardServerInitializationError(t *testing.T) {
|
|
// Create a minimal core instance with default features
|
|
config := &core.Config{}
|
|
instance, err := core.New(config)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create core instance: %v", err)
|
|
}
|
|
// Set the Xray instance in the context
|
|
ctx := context.WithValue(context.Background(), core.XrayKey(1), instance)
|
|
|
|
// Define the server configuration with an empty SecretKey to trigger error
|
|
conf := &wireguard.DeviceConfig{
|
|
IsClient: false,
|
|
Endpoint: []string{"10.0.0.1/32"},
|
|
Mtu: 1420,
|
|
SecretKey: "", // Empty SecretKey to trigger error
|
|
Peers: []*wireguard.PeerConfig{
|
|
{
|
|
PublicKey: "some_public_key",
|
|
AllowedIps: []string{"10.0.0.2/32"},
|
|
},
|
|
},
|
|
}
|
|
|
|
// Use defer to catch any panic and fail the test explicitly
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
t.Errorf("TUN initialization panicked: %v", r)
|
|
debug.PrintStack()
|
|
}
|
|
}()
|
|
|
|
// Attempt to initialize the WireGuard server
|
|
_, err = wireguard.NewServer(ctx, conf)
|
|
|
|
// Check that an error is returned
|
|
assert.ErrorContains(t, err, "failed to set private_key: hex string does not fit the slice")
|
|
}
|