This repository has been archived on 2025-09-14. You can view files and clone it, but cannot push or open issues or pull requests.
Files
stellar-stellar/test/monitor/gtest_seek_layer.cpp
2024-11-07 18:30:58 +08:00

142 lines
5.6 KiB
C++

#include <unistd.h>
#include <stddef.h>
#include <getopt.h>
#include <pcap/pcap.h>
#include <gtest/gtest.h>
#include "stellar/packet.h"
#include "monitor/monitor_private.h"
#include "stellar/packet.h"
#include "packet_manager/packet_parser.h"
#include "packet_manager/packet_internal.h"
/* mock */
int packet_manager_subscribe(UNUSED struct packet_manager *pkt_mgr, UNUSED enum packet_stage stage, UNUSED on_packet_stage_callback *cb, UNUSED void *args)
{
assert(0);
return 0;
}
static int check_layer(const struct packet *pkt, const enum layer_proto *layers, int expect_layer_cnt)
{
int actual_pkt_layer = packet_get_layer_count(pkt);
if (actual_pkt_layer != expect_layer_cnt)
{
return -1;
}
for (int i = 0; i < expect_layer_cnt; i++)
{
const struct layer *layer = packet_get_layer_by_idx(pkt, i);
if (layer == NULL)
{
return -1;
}
if (layer->proto != layers[i])
{
return -1;
}
}
return 0;
}
TEST(MONITOR_SEEK_LAYER, ethernet_ipv4_udp_dns)
{
struct packet pkt = {};
/* a DNS query packet */
const unsigned char packet_bytes[] =
{
0xe8, 0x1c, 0xba, 0xcc, 0x87, 0x21, 0x7c, 0x2a,
0x31, 0x9f, 0x98, 0x2c, 0x08, 0x00, 0x45, 0x00,
0x00, 0x3e, 0x4a, 0x41, 0x00, 0x00, 0x80, 0x11,
0x26, 0x7a, 0xc0, 0xa8, 0x24, 0x67, 0x72, 0x72,
0x72, 0x72, 0xd5, 0xbc, 0x00, 0x35, 0x00, 0x2a,
0xd7, 0x33, 0xdf, 0x96, 0x01, 0x00, 0x00, 0x01,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x66,
0x75, 0x77, 0x75, 0x04, 0x62, 0x64, 0x70, 0x66,
0x03, 0x6f, 0x72, 0x67, 0x02, 0x63, 0x6e, 0x00,
0x00, 0x01, 0x00, 0x01};
ASSERT_TRUE(packet_parse(&pkt, (char *)packet_bytes, sizeof(packet_bytes)) != NULL);
int pkt_layer = packet_get_layer_count(&pkt);
ASSERT_EQ(pkt_layer, 3);
enum layer_proto layers[3] = {LAYER_PROTO_ETHER, LAYER_PROTO_IPV4, LAYER_PROTO_UDP};
ASSERT_EQ(0, check_layer(&pkt, layers, 3));
}
TEST(MONITOR_SEEK_LAYER, ethernet_ipv4_gre_ipv4_gre_ipv4_udp_dns)
{
struct packet pkt = {};
/* a DNS query packet */
const unsigned char packet_bytes[] = {
0x02, 0x00, 0x00, 0x01, 0x02, 0x95, 0x00, 0x00,
0xc3, 0x51, 0x05, 0x0f, 0x08, 0x00, 0x45, 0x00,
0x00, 0x7c, 0x46, 0xdb, 0x00, 0x00, 0xfb, 0x2f,
0xcc, 0x35, 0x73, 0x99, 0x4b, 0xf6, 0x7a, 0x70,
0x72, 0x42, 0x20, 0x00, 0x08, 0x00, 0x00, 0x00,
0x03, 0x84, 0x45, 0x00, 0x00, 0x60, 0xc8, 0xd5,
0x00, 0x00, 0xff, 0x2f, 0xe9, 0x58, 0x0a, 0x96,
0xfa, 0x0a, 0x0a, 0x96, 0xfa, 0x09, 0x00, 0x00,
0x08, 0x00, 0x45, 0x00, 0x00, 0x48, 0xb2, 0xc6,
0x00, 0x00, 0x3f, 0x11, 0x6a, 0x4b, 0x7a, 0x70,
0x72, 0x49, 0x73, 0xee, 0xfd, 0xeb, 0x51, 0x13,
0x00, 0x35, 0x00, 0x34, 0x3a, 0xbf, 0xb1, 0xba,
0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x08, 0x75, 0x72, 0x77, 0x70, 0x75,
0x6c, 0x65, 0x70, 0x03, 0x77, 0x77, 0x77, 0x09,
0x64, 0x65, 0x73, 0x68, 0x65, 0x6e, 0x67, 0x32,
0x38, 0x03, 0x63, 0x6f, 0x6d, 0x00, 0x00, 0x01,
0x00, 0x01};
ASSERT_TRUE(packet_parse(&pkt, (char *)packet_bytes, sizeof(packet_bytes)) != NULL);
int pkt_layer = packet_get_layer_count(&pkt);
ASSERT_EQ(pkt_layer, 7);
enum layer_proto layers[7] = {LAYER_PROTO_ETHER, LAYER_PROTO_IPV4, LAYER_PROTO_GRE, LAYER_PROTO_IPV4, LAYER_PROTO_GRE, LAYER_PROTO_IPV4, LAYER_PROTO_UDP};
ASSERT_EQ(0, check_layer(&pkt, layers, 7));
}
extern "C" u_int stm_bpf_filter_greedy(const struct bpf_insn *bpf_dlt_raw, struct packet *pkt);
TEST(MONITOR_SEEK_LAYER, ethernet_ipv4_gre_ipv4_gre_ipv4_udp_dns_bpf_filter_greedy)
{
struct packet pkt = {};
/* a DNS query packet */
const unsigned char packet_bytes[] = {
0x02, 0x00, 0x00, 0x01, 0x02, 0x95, 0x00, 0x00,
0xc3, 0x51, 0x05, 0x0f, 0x08, 0x00, 0x45, 0x00,
0x00, 0x7c, 0x46, 0xdb, 0x00, 0x00, 0xfb, 0x2f,
0xcc, 0x35, 0x73, 0x99, 0x4b, 0xf6, 0x7a, 0x70,
0x72, 0x42, 0x20, 0x00, 0x08, 0x00, 0x00, 0x00,
0x03, 0x84, 0x45, 0x00, 0x00, 0x60, 0xc8, 0xd5,
0x00, 0x00, 0xff, 0x2f, 0xe9, 0x58, 0x0a, 0x96,
0xfa, 0x0a, 0x0a, 0x96, 0xfa, 0x09, 0x00, 0x00,
0x08, 0x00, 0x45, 0x00, 0x00, 0x48, 0xb2, 0xc6,
0x00, 0x00, 0x3f, 0x11, 0x6a, 0x4b, 0x7a, 0x70,
0x72, 0x49, 0x73, 0xee, 0xfd, 0xeb, 0x51, 0x13,
0x00, 0x35, 0x00, 0x34, 0x3a, 0xbf, 0xb1, 0xba,
0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x08, 0x75, 0x72, 0x77, 0x70, 0x75,
0x6c, 0x65, 0x70, 0x03, 0x77, 0x77, 0x77, 0x09,
0x64, 0x65, 0x73, 0x68, 0x65, 0x6e, 0x67, 0x32,
0x38, 0x03, 0x63, 0x6f, 0x6d, 0x00, 0x00, 0x01,
0x00, 0x01};
ASSERT_TRUE(packet_parse(&pkt, (char *)packet_bytes, sizeof(packet_bytes)) != NULL);
struct bpf_program bpf_bin;
pcap_compile_nopcap(65535, DLT_RAW, &bpf_bin, "host 115.153.75.246 and host 122.112.114.66", 1, 0); // firset ipv4 layer
ASSERT_TRUE(0 != stm_bpf_filter_greedy(bpf_bin.bf_insns, &pkt));
pcap_freecode(&bpf_bin);
pcap_compile_nopcap(65535, DLT_RAW, &bpf_bin, "host 10.150.250.10 and host 10.150.250.9", 1, 0); // second ipv4 layer
ASSERT_TRUE(0 != stm_bpf_filter_greedy(bpf_bin.bf_insns, &pkt));
pcap_freecode(&bpf_bin);
pcap_compile_nopcap(65535, DLT_RAW, &bpf_bin, "host 122.112.114.73 and host 115.238.253.235", 1, 0); // third ipv4 layer
ASSERT_TRUE(0 != stm_bpf_filter_greedy(bpf_bin.bf_insns, &pkt));
pcap_freecode(&bpf_bin);
}
int main(int argc, char **argv)
{
testing::InitGoogleTest(&argc, argv);
int ret = RUN_ALL_TESTS();
return ret;
}