add tcp active -> closing test case
This commit is contained in:
@@ -1,58 +1,6 @@
|
||||
// TCP state machine test: opening -> active
|
||||
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
#include "session_private.h"
|
||||
#include "timestamp.h"
|
||||
#include "session_manager.h"
|
||||
#include "ipv4_helpers.h"
|
||||
#include "test_packets.h"
|
||||
|
||||
struct session_manager_config config = {
|
||||
// max session number
|
||||
.max_tcp_session_num = 3,
|
||||
.max_udp_session_num = 3,
|
||||
|
||||
// tcp timeout
|
||||
.tcp_timeout_init = 2,
|
||||
.tcp_timeout_handshake = 2,
|
||||
.tcp_timeout_data = 2,
|
||||
.tcp_timeout_half_closed = 2,
|
||||
.tcp_timeout_time_wait = 2,
|
||||
.tcp_timeout_discard = 2,
|
||||
|
||||
// udp timeout
|
||||
.udp_timeout_data = 1,
|
||||
|
||||
// tcp duplicate packet filter
|
||||
.tcp_dupkt_filter_enable = 1,
|
||||
.tcp_dupkt_filter_capacity = 1000,
|
||||
.tcp_dupkt_filter_timeout = 10,
|
||||
.tcp_dupkt_filter_error_rate = 0.0001,
|
||||
|
||||
// udp eviction filter
|
||||
.udp_eviction_filter_enable = 1,
|
||||
.udp_eviction_filter_capacity = 1000,
|
||||
.udp_eviction_filter_timeout = 10,
|
||||
.udp_eviction_filter_error_rate = 0.0001,
|
||||
};
|
||||
|
||||
static void __session_dispatch(struct session *sess)
|
||||
{
|
||||
if (sess == NULL)
|
||||
{
|
||||
return;
|
||||
}
|
||||
|
||||
printf("\n");
|
||||
printf("=> session dispatch: %p\n", sess);
|
||||
session_dump(sess);
|
||||
printf("<= session dispatch\n");
|
||||
printf("\n");
|
||||
|
||||
session_set0_cur_pkt(sess, NULL);
|
||||
session_set_cur_dir(sess, SESSION_DIR_NONE);
|
||||
}
|
||||
#include "test_state_machine.h"
|
||||
|
||||
/******************************************************************************
|
||||
* case: TCP opening -> active (by C2S DATA)
|
||||
@@ -101,12 +49,7 @@ TEST(TCP_OPENING_TO_ACTIVE, BY_SYN_C2S_DATA)
|
||||
|
||||
__session_dispatch(sess);
|
||||
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_OPENING) == 1);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_ACTIVE) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_ACTIVE) == 0);
|
||||
__session_manager_count(mgr, 1, 0, 0, 0, 0, 0);
|
||||
|
||||
sleep(1);
|
||||
timestamp_update();
|
||||
@@ -138,27 +81,11 @@ TEST(TCP_OPENING_TO_ACTIVE, BY_SYN_C2S_DATA)
|
||||
EXPECT_TRUE(session_get0_c2s_1st_pkt(sess) != NULL);
|
||||
EXPECT_TRUE(session_get0_s2c_1st_pkt(sess) == NULL);
|
||||
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_ACTIVE) == 1);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_ACTIVE) == 0);
|
||||
__session_dispatch(sess);
|
||||
|
||||
for (int i = 0; i < 3; i++)
|
||||
{
|
||||
timestamp_update();
|
||||
__session_dispatch(session_manager_get_expired_session(mgr));
|
||||
__session_dispatch(session_manager_get_evicted_session(mgr));
|
||||
sleep(1);
|
||||
}
|
||||
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_ACTIVE) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_ACTIVE) == 0);
|
||||
__session_manager_count(mgr, 0, 1, 0, 0, 0, 0);
|
||||
__session_manager_dispatch(mgr, CLOSING_BY_TIMEOUT);
|
||||
__session_manager_count(mgr, 0, 0, 0, 0, 0, 0);
|
||||
|
||||
session_manager_destroy(mgr);
|
||||
}
|
||||
@@ -211,12 +138,7 @@ TEST(TCP_OPENING_TO_ACTIVE, BY_SYNACK_S2C_DATA)
|
||||
|
||||
__session_dispatch(sess);
|
||||
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_OPENING) == 1);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_ACTIVE) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_ACTIVE) == 0);
|
||||
__session_manager_count(mgr, 1, 0, 0, 0, 0, 0);
|
||||
|
||||
sleep(1);
|
||||
timestamp_update();
|
||||
@@ -250,27 +172,9 @@ TEST(TCP_OPENING_TO_ACTIVE, BY_SYNACK_S2C_DATA)
|
||||
|
||||
__session_dispatch(sess);
|
||||
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_ACTIVE) == 1);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_ACTIVE) == 0);
|
||||
|
||||
for (int i = 0; i < 3; i++)
|
||||
{
|
||||
timestamp_update();
|
||||
__session_dispatch(session_manager_get_expired_session(mgr));
|
||||
__session_dispatch(session_manager_get_evicted_session(mgr));
|
||||
sleep(1);
|
||||
}
|
||||
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_TCP, SESSION_STATE_ACTIVE) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_OPENING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_CLOSING) == 0);
|
||||
EXPECT_TRUE(session_manager_get_session_number(mgr, SESSION_TYPE_UDP, SESSION_STATE_ACTIVE) == 0);
|
||||
__session_manager_count(mgr, 0, 1, 0, 0, 0, 0);
|
||||
__session_manager_dispatch(mgr, CLOSING_BY_TIMEOUT);
|
||||
__session_manager_count(mgr, 0, 0, 0, 0, 0, 0);
|
||||
|
||||
session_manager_destroy(mgr);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user