session manager support output fieldstat
This commit is contained in:
@@ -1,24 +1,4 @@
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
#include "packet_internal.h"
|
||||
#include "packet_parser.h"
|
||||
#include "session_internal.h"
|
||||
#include "default_config.h"
|
||||
#include "test_packets.h"
|
||||
|
||||
static void hex_dump(const char *payload, uint32_t len)
|
||||
{
|
||||
printf("Payload Length: %u\n", len);
|
||||
for (uint32_t i = 0; i < len; i++)
|
||||
{
|
||||
if (i > 0 && i % 16 == 0)
|
||||
{
|
||||
printf("\n");
|
||||
}
|
||||
printf("%02x ", (uint8_t)payload[i]);
|
||||
}
|
||||
printf("\n");
|
||||
}
|
||||
#include "test_utils.h"
|
||||
|
||||
#if 1
|
||||
TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
@@ -26,10 +6,10 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
struct tcp_segment *seg;
|
||||
struct packet pkt;
|
||||
struct session *sess = NULL;
|
||||
struct session_manager_runtime *sess_mgr_rt = NULL;
|
||||
struct session_manager_rte *sess_mgr_rte = NULL;
|
||||
|
||||
sess_mgr_rt = session_manager_runtime_new(&sess_mgr_cfg, 1);
|
||||
EXPECT_TRUE(sess_mgr_rt != NULL);
|
||||
sess_mgr_rte = session_manager_rte_new(&sess_mgr_cfg, 1);
|
||||
EXPECT_TRUE(sess_mgr_rte != NULL);
|
||||
|
||||
// C2S SYN Packet
|
||||
printf("\n=> Packet Parse: TCP C2S SYN packet\n");
|
||||
@@ -38,9 +18,10 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
EXPECT_TRUE(session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt) == NULL);
|
||||
EXPECT_TRUE(session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt) == NULL);
|
||||
|
||||
// new session
|
||||
sess = session_manager_runtime_new_session(sess_mgr_rt, &pkt, 1);
|
||||
sess = session_manager_rte_new_session(sess_mgr_rte, &pkt, 1);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
@@ -53,10 +34,11 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 2) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 2) == 0);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg == NULL);
|
||||
@@ -68,10 +50,11 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 3) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 3) == 0);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg == NULL);
|
||||
@@ -83,10 +66,11 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 4) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 4) == 0);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg == NULL);
|
||||
@@ -98,10 +82,11 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 5) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 5) == 0);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg == NULL);
|
||||
@@ -113,10 +98,11 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 6) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 6) == 0);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg == NULL);
|
||||
@@ -128,10 +114,11 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 7) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 7) == 0);
|
||||
|
||||
/*
|
||||
* 11111111111111111111111111111111111111111111111111111111111111
|
||||
@@ -166,48 +153,49 @@ TEST(SESS_MGR_TCP_REASSEMBLY, OUT_OF_ORDER)
|
||||
EXPECT_TRUE(seg != NULL);
|
||||
EXPECT_TRUE(seg->len == sizeof(payload1));
|
||||
EXPECT_TRUE(memcmp((void *)seg->data, payload1, sizeof(payload1)) == 0);
|
||||
hex_dump((const char *)seg->data, seg->len);
|
||||
hexdump_to_fd(STDOUT_FILENO, 0, (const char *)seg->data, seg->len);
|
||||
session_free_tcp_segment(sess, seg);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg != NULL);
|
||||
EXPECT_TRUE(seg->len == sizeof(payload2));
|
||||
EXPECT_TRUE(memcmp((void *)seg->data, payload2, sizeof(payload2)) == 0);
|
||||
hex_dump((const char *)seg->data, seg->len);
|
||||
hexdump_to_fd(STDOUT_FILENO, 0, (const char *)seg->data, seg->len);
|
||||
session_free_tcp_segment(sess, seg);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg != NULL);
|
||||
EXPECT_TRUE(seg->len == sizeof(payload3));
|
||||
EXPECT_TRUE(memcmp((void *)seg->data, payload3, sizeof(payload3)) == 0);
|
||||
hex_dump((const char *)seg->data, seg->len);
|
||||
hexdump_to_fd(STDOUT_FILENO, 0, (const char *)seg->data, seg->len);
|
||||
session_free_tcp_segment(sess, seg);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg != NULL);
|
||||
EXPECT_TRUE(seg->len == sizeof(payload4));
|
||||
EXPECT_TRUE(memcmp((void *)seg->data, payload4, sizeof(payload4)) == 0);
|
||||
hex_dump((const char *)seg->data, seg->len);
|
||||
hexdump_to_fd(STDOUT_FILENO, 0, (const char *)seg->data, seg->len);
|
||||
session_free_tcp_segment(sess, seg);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg != NULL);
|
||||
EXPECT_TRUE(seg->len == sizeof(payload5));
|
||||
EXPECT_TRUE(memcmp((void *)seg->data, payload5, sizeof(payload5)) == 0);
|
||||
hex_dump((const char *)seg->data, seg->len);
|
||||
hexdump_to_fd(STDOUT_FILENO, 0, (const char *)seg->data, seg->len);
|
||||
session_free_tcp_segment(sess, seg);
|
||||
|
||||
// expire session
|
||||
EXPECT_TRUE(session_manager_runtime_get_expired_session(sess_mgr_rt, 7 + sess_mgr_cfg.tcp_timeout_ms.data) == NULL); // active -> closing
|
||||
sess = session_manager_runtime_get_expired_session(sess_mgr_rt, 7 + sess_mgr_cfg.tcp_timeout_ms.data + sess_mgr_cfg.tcp_timeout_ms.data); // closing -> closed
|
||||
EXPECT_TRUE(session_manager_rte_get_expired_session(sess_mgr_rte, 7 + sess_mgr_cfg.tcp_timeout_ms.data) == NULL); // active -> closing
|
||||
sess = session_manager_rte_get_expired_session(sess_mgr_rte, 7 + sess_mgr_cfg.tcp_timeout_ms.data + sess_mgr_cfg.tcp_timeout_ms.data); // closing -> closed
|
||||
EXPECT_TRUE(sess);
|
||||
EXPECT_TRUE(session_get_current_state(sess) == SESSION_STATE_CLOSED);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_TIMEOUT);
|
||||
session_print(sess);
|
||||
// free session
|
||||
session_manager_runtime_free_session(sess_mgr_rt, sess);
|
||||
|
||||
session_manager_runtime_free(sess_mgr_rt);
|
||||
// free session
|
||||
session_manager_rte_free_session(sess_mgr_rte, sess);
|
||||
|
||||
session_manager_rte_free(sess_mgr_rte);
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -217,10 +205,10 @@ TEST(SESS_MGR_TCP_REASSEMBLY, SEQ_WRAPAROUND)
|
||||
struct tcp_segment *seg;
|
||||
struct packet pkt;
|
||||
struct session *sess = NULL;
|
||||
struct session_manager_runtime *sess_mgr_rt = NULL;
|
||||
struct session_manager_rte *sess_mgr_rte = NULL;
|
||||
|
||||
sess_mgr_rt = session_manager_runtime_new(&sess_mgr_cfg, 1);
|
||||
EXPECT_TRUE(sess_mgr_rt != NULL);
|
||||
sess_mgr_rte = session_manager_rte_new(&sess_mgr_cfg, 1);
|
||||
EXPECT_TRUE(sess_mgr_rte != NULL);
|
||||
|
||||
// C2S SYN Packet
|
||||
printf("\n=> Packet Parse: TCP C2S SYN packet\n");
|
||||
@@ -229,9 +217,10 @@ TEST(SESS_MGR_TCP_REASSEMBLY, SEQ_WRAPAROUND)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
EXPECT_TRUE(session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt) == NULL);
|
||||
EXPECT_TRUE(session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt) == NULL);
|
||||
|
||||
// new session
|
||||
sess = session_manager_runtime_new_session(sess_mgr_rt, &pkt, 1);
|
||||
sess = session_manager_rte_new_session(sess_mgr_rte, &pkt, 1);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
@@ -244,10 +233,11 @@ TEST(SESS_MGR_TCP_REASSEMBLY, SEQ_WRAPAROUND)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 2) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 2) == 0);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg == NULL);
|
||||
@@ -259,16 +249,17 @@ TEST(SESS_MGR_TCP_REASSEMBLY, SEQ_WRAPAROUND)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 3) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 3) == 0);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg != NULL);
|
||||
EXPECT_TRUE(seg->len == sizeof(tcp_seq_wraparound_pkt3_payload));
|
||||
EXPECT_TRUE(memcmp((void *)seg->data, tcp_seq_wraparound_pkt3_payload, sizeof(tcp_seq_wraparound_pkt3_payload)) == 0);
|
||||
hex_dump((const char *)seg->data, seg->len);
|
||||
hexdump_to_fd(STDOUT_FILENO, 0, (const char *)seg->data, seg->len);
|
||||
session_free_tcp_segment(sess, seg);
|
||||
|
||||
// C2S Data Packet
|
||||
@@ -278,29 +269,31 @@ TEST(SESS_MGR_TCP_REASSEMBLY, SEQ_WRAPAROUND)
|
||||
printf("<= Packet Parse: done\n\n");
|
||||
|
||||
// lookup session
|
||||
sess = session_manager_runtime_lookup_session_by_packet(sess_mgr_rt, &pkt);
|
||||
sess = session_manager_rte_lookup_session_by_packet(sess_mgr_rte, &pkt);
|
||||
EXPECT_TRUE(sess);
|
||||
|
||||
// update session
|
||||
EXPECT_TRUE(session_manager_runtime_update_session(sess_mgr_rt, sess, &pkt, 4) == 0);
|
||||
EXPECT_TRUE(session_manager_rte_update_session(sess_mgr_rte, sess, &pkt, 4) == 0);
|
||||
|
||||
seg = session_get_tcp_segment(sess);
|
||||
EXPECT_TRUE(seg != NULL);
|
||||
EXPECT_TRUE(seg->len == sizeof(tcp_seq_wraparound_pkt4_payload));
|
||||
EXPECT_TRUE(memcmp((void *)seg->data, tcp_seq_wraparound_pkt4_payload, sizeof(tcp_seq_wraparound_pkt4_payload)) == 0);
|
||||
hex_dump((const char *)seg->data, seg->len);
|
||||
hexdump_to_fd(STDOUT_FILENO, 0, (const char *)seg->data, seg->len);
|
||||
session_free_tcp_segment(sess, seg);
|
||||
|
||||
// expire session
|
||||
EXPECT_TRUE(session_manager_runtime_get_expired_session(sess_mgr_rt, 4 + sess_mgr_cfg.tcp_timeout_ms.data) == NULL); // active -> closing
|
||||
sess = session_manager_runtime_get_expired_session(sess_mgr_rt, 4 + sess_mgr_cfg.tcp_timeout_ms.data + sess_mgr_cfg.tcp_timeout_ms.data); // closing -> closed
|
||||
EXPECT_TRUE(session_manager_rte_get_expired_session(sess_mgr_rte, 4 + sess_mgr_cfg.tcp_timeout_ms.data) == NULL); // active -> closing
|
||||
sess = session_manager_rte_get_expired_session(sess_mgr_rte, 4 + sess_mgr_cfg.tcp_timeout_ms.data + sess_mgr_cfg.tcp_timeout_ms.data); // closing -> closed
|
||||
EXPECT_TRUE(sess);
|
||||
EXPECT_TRUE(session_get_current_state(sess) == SESSION_STATE_CLOSED);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_TIMEOUT);
|
||||
session_print(sess);
|
||||
// free session
|
||||
session_manager_runtime_free_session(sess_mgr_rt, sess);
|
||||
|
||||
session_manager_runtime_free(sess_mgr_rt);
|
||||
// free session
|
||||
session_manager_rte_free_session(sess_mgr_rte, sess);
|
||||
|
||||
session_manager_rte_free(sess_mgr_rte);
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
Reference in New Issue
Block a user