[PATCH] Ipport plugin unit_test & statistics
This commit is contained in:
@@ -453,12 +453,12 @@ int maat_helper_verify_regex_expression(const char *regex_expr)
|
||||
|
||||
int maat_get_table_id(struct maat *maat_inst, const char *table_name)
|
||||
{
|
||||
int table_id = -1;
|
||||
if (NULL == maat_inst || NULL == table_name) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
struct table_manager *table_mgr = maat_inst->tbl_mgr;
|
||||
table_id = table_manager_get_table_id(table_mgr, table_name);
|
||||
|
||||
return table_id;
|
||||
return table_manager_get_table_id(table_mgr, table_name);
|
||||
}
|
||||
|
||||
static inline void maat_runtime_ref_inc(struct maat_runtime *maat_rt, int thread_id)
|
||||
|
||||
@@ -532,7 +532,12 @@ int ipport_plugin_runtime_commit(void *ipport_plugin_runtime, const char *table_
|
||||
|
||||
long long ipport_plugin_runtime_rule_count(void *ipport_plugin_runtime)
|
||||
{
|
||||
if (NULL == ipport_plugin_runtime) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
struct ipport_plugin_runtime *ipport_plugin_rt = (struct ipport_plugin_runtime *)ipport_plugin_runtime;
|
||||
return ipport_plugin_rt->rule_num;
|
||||
}
|
||||
|
||||
struct ex_data_runtime *ipport_plugin_runtime_get_ex_data_rt(void *ipport_plugin_runtime)
|
||||
@@ -607,5 +612,10 @@ int ipport_plugin_runtime_get_ex_data(void *ipport_plugin_runtime, const struct
|
||||
|
||||
long long ipport_plugin_runtime_update_err_count(void *ipport_plugin_runtime)
|
||||
{
|
||||
if (NULL == ipport_plugin_runtime) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
struct ipport_plugin_runtime *ipport_plugin_rt = (struct ipport_plugin_runtime *)ipport_plugin_runtime;
|
||||
return ipport_plugin_rt->update_err_cnt;
|
||||
}
|
||||
@@ -34,6 +34,7 @@ add_executable(maat_ex_data_gtest maat_ex_data_gtest.cpp)
|
||||
target_link_libraries(maat_ex_data_gtest maat_frame_static gtest_static)
|
||||
|
||||
add_subdirectory(group_exclude)
|
||||
add_subdirectory(ipport_plugin)
|
||||
add_subdirectory(benchmark)
|
||||
|
||||
file(COPY table_info.conf DESTINATION ./)
|
||||
@@ -48,6 +49,7 @@ file(COPY testdata DESTINATION ./)
|
||||
file(COPY test_streamfiles DESTINATION ./)
|
||||
file(COPY json_update DESTINATION ./)
|
||||
file(COPY group_exclude DESTINATION ./)
|
||||
file(COPY ipport_plugin DESTINATION ./)
|
||||
file(COPY benchmark DESTINATION ./)
|
||||
|
||||
include(GoogleTest)
|
||||
|
||||
@@ -14,7 +14,8 @@
|
||||
#define WAIT_FOR_EFFECTIVE_S 2
|
||||
#define MAX_G2G_SCAN_TIMES (1000 * 1000)
|
||||
|
||||
const char *table_info_path = "./table_info.conf";
|
||||
const char *table_info_path = "./group_exclude_table_info.conf";
|
||||
const char *log_file = "./group_exclude_gtest.log";
|
||||
|
||||
struct group_item {
|
||||
long long group_id;
|
||||
@@ -116,11 +117,10 @@ protected:
|
||||
unsigned char *json_buff = NULL;
|
||||
size_t json_buff_size = 0;
|
||||
|
||||
logger = log_handle_create("./group_exclude_gtest.log", 0);
|
||||
logger = log_handle_create(log_file, 0);
|
||||
garbage_bin = maat_garbage_bin_new(60);
|
||||
|
||||
int ret = load_file_to_memory("./group_exclude_table_info.conf",
|
||||
&json_buff, &json_buff_size);
|
||||
int ret = load_file_to_memory(table_info_path, &json_buff, &json_buff_size);
|
||||
if (ret < 0) {
|
||||
log_error(logger, MODULE_GROUP_EXCLUDE_GTEST, "load_file_to_memory failed.");
|
||||
assert(0);
|
||||
@@ -471,8 +471,9 @@ TEST_F(MaatGroupExclude, level_exceed_function) {
|
||||
|
||||
int main(int argc, char ** argv)
|
||||
{
|
||||
int ret=0;
|
||||
int ret = 0;
|
||||
::testing::InitGoogleTest(&argc, argv);
|
||||
ret=RUN_ALL_TESTS();
|
||||
ret = RUN_ALL_TESTS();
|
||||
|
||||
return ret;
|
||||
}
|
||||
4
test/ipport_plugin/CMakeLists.txt
Normal file
4
test/ipport_plugin/CMakeLists.txt
Normal file
@@ -0,0 +1,4 @@
|
||||
include_directories(${PROJECT_SOURCE_DIR}/src/inc_internal)
|
||||
|
||||
add_executable(ipport_plugin_gtest ipport_plugin_gtest.cpp)
|
||||
target_link_libraries(ipport_plugin_gtest maat_frame_static gtest_static)
|
||||
356
test/ipport_plugin/ipport_plugin_gtest.cpp
Normal file
356
test/ipport_plugin/ipport_plugin_gtest.cpp
Normal file
@@ -0,0 +1,356 @@
|
||||
#include "maat.h"
|
||||
#include "log/log.h"
|
||||
#include "cJSON/cJSON.h"
|
||||
#include "maat_rule.h"
|
||||
#include "maat_utils.h"
|
||||
#include "log/log.h"
|
||||
#include "maat_config_monitor.h"
|
||||
#include "maat_redis_monitor.h"
|
||||
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
#define MODULE_IPPORT_PLUGIN_GTEST module_name_str("maat.ipport_plugin_gtest")
|
||||
#define ARRAY_SIZE 10
|
||||
#define PERF_SCAN_COUNT 1000 * 1000
|
||||
|
||||
const char *table_info_path = "./ipport_plugin_table_info.conf";
|
||||
const char *log_file = "./ipport_plugin_gtest.log";
|
||||
|
||||
class IPPortPluginTable : public testing::Test
|
||||
{
|
||||
protected:
|
||||
static void SetUpTestCase() {
|
||||
logger = log_handle_create(log_file, 0);
|
||||
|
||||
// char iris_idx_path[PATH_MAX] = {0};
|
||||
// snprintf(iris_idx_path, sizeof(iris_idx_path), "test_data/index");
|
||||
|
||||
// struct maat_options *opts = maat_options_new();
|
||||
// maat_options_set_iris(opts, iris_idx_path, iris_idx_path);
|
||||
// maat_options_set_logger(opts, log_file, LOG_LEVEL_INFO);
|
||||
// maat_options_set_stat_file(opts, "./stat.log");
|
||||
|
||||
// struct maat *_shared_maat_inst = maat_new(opts, table_info_path);
|
||||
// assert(_shared_maat_inst);
|
||||
// maat_options_free(opts);
|
||||
}
|
||||
|
||||
static void TearDownTestCase() {
|
||||
log_handle_destroy(logger);
|
||||
// maat_free(_shared_maat_inst);
|
||||
}
|
||||
|
||||
static struct log_handle *logger;
|
||||
// static struct maat *_shared_maat_inst;
|
||||
};
|
||||
|
||||
// struct maat *IPPortPluginTable::_shared_maat_inst;
|
||||
struct log_handle *IPPortPluginTable::logger;
|
||||
|
||||
int count_line_num_cb(const char *table_name, const char *line, void *u_para)
|
||||
{
|
||||
(*((unsigned int *)u_para))++;
|
||||
return 0;
|
||||
}
|
||||
|
||||
int line_idx = 0;
|
||||
long long absolute_expire_time=0;
|
||||
int make_serial_rule(const char *table_name, const char *line, void *u_para)
|
||||
{
|
||||
struct serial_rule *s_rule=(struct serial_rule *)u_para;
|
||||
redisContext *ctx = s_rule->ref_ctx;
|
||||
char *buff = ALLOC(char, strlen(line) + 1);
|
||||
|
||||
memcpy(buff, line, strlen(line) + 1);
|
||||
while(buff[strlen(line) - 1] == '\n' || buff[strlen(line) - 1] == '\t') {
|
||||
buff[strlen(line) - 1] = '\0';
|
||||
}
|
||||
|
||||
const char *redis_rule_key = "TEST_RULE_KEY";
|
||||
redisReply *reply = maat_wrap_redis_command(ctx, "INCRBY %s %d", redis_rule_key, 1);
|
||||
if (reply->type == REDIS_REPLY_NIL) {
|
||||
printf("incrby redis_rule_key:%s failed.", redis_rule_key);
|
||||
return -1;
|
||||
} else {
|
||||
s_rule->rule_id = maat_read_redis_integer(reply);
|
||||
freeReplyObject(reply);
|
||||
reply = NULL;
|
||||
}
|
||||
|
||||
maat_set_serial_rule(s_rule + line_idx, MAAT_OP_ADD, s_rule->rule_id, table_name,
|
||||
buff, absolute_expire_time);
|
||||
(s_rule + line_idx)->ref_ctx = ctx;
|
||||
line_idx++;
|
||||
|
||||
FREE(buff);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int write_config_to_redis(char *redis_ip, int redis_port, int redis_db,
|
||||
struct log_handle *logger)
|
||||
{
|
||||
redisContext *c = maat_connect_redis(redis_ip, redis_port, redis_db, logger);
|
||||
if (NULL == c) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
redisReply *reply = maat_wrap_redis_command(c, "flushdb");
|
||||
if (NULL == reply) {
|
||||
return -1;
|
||||
} else {
|
||||
freeReplyObject(reply);
|
||||
reply = NULL;
|
||||
}
|
||||
|
||||
|
||||
size_t total_line_cnt = 0;
|
||||
char iris_idx_path[PATH_MAX] = {0};
|
||||
snprintf(iris_idx_path, sizeof(iris_idx_path), "test_data/index");
|
||||
config_monitor_traverse(0, iris_idx_path, NULL, count_line_num_cb, NULL,
|
||||
&total_line_cnt, NULL, logger);
|
||||
|
||||
struct serial_rule *s_rule = ALLOC(struct serial_rule, total_line_cnt);
|
||||
s_rule->ref_ctx = c;
|
||||
long long server_time = maat_redis_server_time_s(c);
|
||||
if (server_time < 0) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
absolute_expire_time = server_time + 300;
|
||||
config_monitor_traverse(0, iris_idx_path, NULL, make_serial_rule, NULL,
|
||||
s_rule, NULL, logger);
|
||||
s_rule->ref_ctx = NULL;
|
||||
line_idx = 0;
|
||||
absolute_expire_time = 0;
|
||||
|
||||
int success_cnt = 0;
|
||||
do {
|
||||
success_cnt = maat_cmd_write_rule(c, s_rule, total_line_cnt, server_time, logger);
|
||||
} while (success_cnt < 0);
|
||||
|
||||
EXPECT_EQ(success_cnt, (int)total_line_cnt);
|
||||
|
||||
for (size_t i = 0; i < total_line_cnt; i++) {
|
||||
maat_clear_rule_cache(s_rule + i);
|
||||
}
|
||||
FREE(s_rule);
|
||||
redisFree(c);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
struct ipport_plugin_ud {
|
||||
long long rule_id;
|
||||
char *buffer;
|
||||
size_t buf_len;
|
||||
};
|
||||
void ipport_plugin_ex_new_cb(const char *table_name, int table_id, const char *key,
|
||||
const char *table_line, void **ad, long argl, void *argp)
|
||||
{
|
||||
int *counter = (int *)argp;
|
||||
size_t column_offset=0, column_len=0;
|
||||
struct ipport_plugin_ud *ud = ALLOC(struct ipport_plugin_ud, 1);
|
||||
|
||||
int ret = get_column_pos(table_line, 1, &column_offset, &column_len);
|
||||
EXPECT_EQ(ret, 0);
|
||||
|
||||
ud->rule_id = atoll(table_line + column_offset);
|
||||
|
||||
ret = get_column_pos(table_line, 5, &column_offset, &column_len);
|
||||
EXPECT_EQ(ret, 0);
|
||||
|
||||
ud->buffer = ALLOC(char, column_len + 1);
|
||||
strncpy(ud->buffer, table_line + column_offset, column_len);
|
||||
|
||||
ud->buf_len = column_len + 1;
|
||||
*ad = ud;
|
||||
(*counter)++;
|
||||
}
|
||||
|
||||
void ipport_plugin_ex_free_cb(int table_id, void **ad, long argl, void *argp)
|
||||
{
|
||||
struct ipport_plugin_ud *ud = (struct ipport_plugin_ud *)(*ad);
|
||||
|
||||
ud->rule_id = 0;
|
||||
memset(ud->buffer, 0, ud->buf_len);
|
||||
ud->buf_len = 0;
|
||||
|
||||
free(ud->buffer);
|
||||
free(ud);
|
||||
*ad = NULL;
|
||||
}
|
||||
|
||||
void ipport_plugin_ex_dup_cb(int table_id, void **to, void **from, long argl, void *argp)
|
||||
{
|
||||
struct ipport_plugin_ud *ud = (struct ipport_plugin_ud *)(*from);
|
||||
|
||||
*to = ud;
|
||||
}
|
||||
|
||||
struct thread_param {
|
||||
int thread_id;
|
||||
int test_count;
|
||||
struct maat *maat_inst;
|
||||
const char *table_name;
|
||||
long long time_elapse_ms;
|
||||
struct log_handle *logger;
|
||||
};
|
||||
|
||||
void *ipport_plugin_scan_thread(void *arg)
|
||||
{
|
||||
struct thread_param *param = (struct thread_param *)arg;
|
||||
struct maat *maat_inst = param->maat_inst;
|
||||
const char *table_name = param->table_name;
|
||||
struct timespec start, end;
|
||||
int table_id = maat_get_table_id(maat_inst, table_name);
|
||||
|
||||
struct ip_addr ipv4;
|
||||
ipv4.ip_type = 4;
|
||||
int ret = inet_pton(AF_INET, "192.0.2.0", &ipv4.ipv4);
|
||||
EXPECT_EQ(ret, 1);
|
||||
|
||||
uint16_t port = htons(200);
|
||||
int hit_times = 0;
|
||||
struct ipport_plugin_ud *results[ARRAY_SIZE];
|
||||
|
||||
clock_gettime(CLOCK_MONOTONIC, &start);
|
||||
for (int i = 0; i < param->test_count; i++) {
|
||||
ret = maat_ipport_plugin_table_get_ex_data(maat_inst, table_id, &ipv4, port,
|
||||
(void **)results, ARRAY_SIZE);
|
||||
EXPECT_EQ(ret, 1);
|
||||
if (ret == 1) {
|
||||
EXPECT_EQ(results[0]->rule_id, 513);
|
||||
hit_times++;
|
||||
}
|
||||
}
|
||||
clock_gettime(CLOCK_MONOTONIC, &end);
|
||||
|
||||
param->time_elapse_ms = (end.tv_sec - start.tv_sec) * 1000 + (end.tv_nsec - start.tv_nsec) / 1000000;
|
||||
int *is_all_hit = ALLOC(int, 1);
|
||||
*is_all_hit = (hit_times == param->test_count ? 1 : 0);
|
||||
log_info(param->logger, MODULE_IPPORT_PLUGIN_GTEST,
|
||||
"thread_id:%d ipport_plugin scan time_elapse:%lldms hit_times:%d",
|
||||
param->thread_id, param->time_elapse_ms, hit_times);
|
||||
return is_all_hit;
|
||||
}
|
||||
|
||||
static void test_add_ipport_plugin_command(struct maat *maat_inst, const char *table_name,
|
||||
const char *ip_str, long long item_id)
|
||||
{
|
||||
int table_id = maat_get_table_id(maat_inst, table_name);
|
||||
assert(table_id >= 0);
|
||||
|
||||
enum table_type table_type = table_manager_get_table_type(maat_inst->tbl_mgr, table_id);
|
||||
assert(table_type == TABLE_TYPE_IPPORT_PLUGIN);
|
||||
|
||||
|
||||
char table_line[1024] = {0};
|
||||
sprintf(table_line, "%lld\t4\t%s\t100\t200\t1", item_id, ip_str);
|
||||
|
||||
struct maat_cmd_line line_rule;
|
||||
line_rule.rule_id = item_id;
|
||||
line_rule.table_line = table_line;
|
||||
line_rule.table_name = table_name;
|
||||
line_rule.expire_after = 0;
|
||||
|
||||
maat_cmd_set_line(maat_inst, &line_rule);
|
||||
}
|
||||
|
||||
void *ipport_plugin_update_thread(void *arg)
|
||||
{
|
||||
struct thread_param *param = (struct thread_param *)arg;
|
||||
struct maat *maat_inst = param->maat_inst;
|
||||
const char *table_name = param->table_name;
|
||||
const int CMD_EXPR_NUM = 100;
|
||||
char ip_buf[128] = {0};
|
||||
long long item_id = 9000000;
|
||||
|
||||
for (int i = 0; i < CMD_EXPR_NUM; i++) {
|
||||
sprintf(ip_buf, "172.16.1.%d", i);
|
||||
test_add_ipport_plugin_command(maat_inst, table_name, ip_buf, item_id);
|
||||
item_id++;
|
||||
usleep(100 * 1000);
|
||||
}
|
||||
|
||||
int *is_all_hit = ALLOC(int, 1);
|
||||
*is_all_hit = 1;
|
||||
|
||||
return is_all_hit;
|
||||
}
|
||||
|
||||
TEST_F(IPPortPluginTable, basic) {
|
||||
char redis_ip[32] = "127.0.0.1";
|
||||
int redis_port = 6379;
|
||||
int redis_db = 0;
|
||||
struct log_handle *logger = IPPortPluginTable::logger;
|
||||
|
||||
int ret = write_config_to_redis(redis_ip, redis_port, redis_db, logger);
|
||||
assert(ret == 0);
|
||||
|
||||
struct maat_options *opts = maat_options_new();
|
||||
maat_options_set_redis(opts, redis_ip, redis_port, redis_db);
|
||||
maat_options_set_logger(opts, log_file, LOG_LEVEL_INFO);
|
||||
maat_options_set_stat_file(opts, "./stat.log");
|
||||
maat_options_set_rule_update_checking_interval_ms(opts, 100);
|
||||
|
||||
struct maat *maat_inst = maat_new(opts, table_info_path);
|
||||
assert(maat_inst);
|
||||
maat_options_free(opts);
|
||||
|
||||
int ex_data_counter = 0;
|
||||
const char *table_name = "IPPORT_PLUGIN_WITH_EXDATA";
|
||||
|
||||
int table_id = maat_get_table_id(maat_inst, table_name);
|
||||
ASSERT_GT(table_id, 0);
|
||||
|
||||
ret = maat_plugin_table_ex_schema_register(maat_inst, table_name,
|
||||
ipport_plugin_ex_new_cb,
|
||||
ipport_plugin_ex_free_cb,
|
||||
ipport_plugin_ex_dup_cb,
|
||||
0, &ex_data_counter);
|
||||
EXPECT_EQ(ret, 0);
|
||||
EXPECT_EQ(ex_data_counter, 49999);
|
||||
|
||||
int i = 0;
|
||||
pthread_t threads[2];
|
||||
struct thread_param thread_params[2];
|
||||
|
||||
for (i = 0; i < 2; i++) {
|
||||
thread_params[i].maat_inst = maat_inst;
|
||||
thread_params[i].thread_id = i;
|
||||
thread_params[i].table_name = table_name;
|
||||
thread_params[i].test_count = PERF_SCAN_COUNT;
|
||||
thread_params[i].time_elapse_ms = 0;
|
||||
thread_params[i].logger = logger;
|
||||
}
|
||||
|
||||
pthread_create(&threads[0], NULL, ipport_plugin_scan_thread, thread_params);
|
||||
pthread_create(&threads[1], NULL, ipport_plugin_update_thread, thread_params + 1);
|
||||
|
||||
int *is_all_hit = NULL;
|
||||
long long time_elapse_ms = 0;
|
||||
long long scan_per_second = 0;
|
||||
for (i = 0; i < 2; i++) {
|
||||
pthread_join(threads[i], (void **)&is_all_hit);
|
||||
time_elapse_ms += thread_params[i].time_elapse_ms;
|
||||
|
||||
EXPECT_EQ(*is_all_hit, 1);
|
||||
*is_all_hit = 0;
|
||||
free(is_all_hit);
|
||||
}
|
||||
|
||||
scan_per_second = PERF_SCAN_COUNT * 1000 / time_elapse_ms;
|
||||
log_info(maat_inst->logger, MODULE_IPPORT_PLUGIN_GTEST,
|
||||
"IpportPluginScan match rate speed %lld lookups/s/thread",
|
||||
scan_per_second);
|
||||
}
|
||||
|
||||
int main(int argc, char ** argv)
|
||||
{
|
||||
int ret = 0;
|
||||
::testing::InitGoogleTest(&argc, argv);
|
||||
ret = RUN_ALL_TESTS();
|
||||
|
||||
return ret;
|
||||
}
|
||||
16
test/ipport_plugin/ipport_plugin_table_info.conf
Normal file
16
test/ipport_plugin/ipport_plugin_table_info.conf
Normal file
@@ -0,0 +1,16 @@
|
||||
[
|
||||
{
|
||||
"table_id":1,
|
||||
"table_name":"IPPORT_PLUGIN_WITH_EXDATA",
|
||||
"table_type":"ipport_plugin",
|
||||
"valid_column":6,
|
||||
"custom": {
|
||||
"gc_timeout_s": 3,
|
||||
"item_id":1,
|
||||
"ip_type":2,
|
||||
"ip_addr":3,
|
||||
"port1":4,
|
||||
"port2":5
|
||||
}
|
||||
}
|
||||
]
|
||||
196609
test/ipport_plugin/test_data/IPPORT_PLUGIN_WITH_EXDATA.local
Normal file
196609
test/ipport_plugin/test_data/IPPORT_PLUGIN_WITH_EXDATA.local
Normal file
File diff suppressed because it is too large
Load Diff
@@ -0,0 +1 @@
|
||||
IPPORT_PLUGIN_WITH_EXDATA 50000 test_data/IPPORT_PLUGIN_WITH_EXDATA.local
|
||||
@@ -3840,42 +3840,41 @@ TEST_F(IPPortPluginTable, EX_DATA) {
|
||||
ASSERT_GT(table_id, 0);
|
||||
|
||||
int ret = maat_plugin_table_ex_schema_register(maat_inst, table_name,
|
||||
ip_plugin_ex_new_cb,
|
||||
ip_plugin_ex_free_cb,
|
||||
ip_plugin_ex_dup_cb,
|
||||
ipport_plugin_ex_new_cb,
|
||||
ipport_plugin_ex_free_cb,
|
||||
ipport_plugin_ex_dup_cb,
|
||||
0, &ex_data_counter);
|
||||
EXPECT_EQ(ret, 0);
|
||||
EXPECT_EQ(ex_data_counter, 3);
|
||||
EXPECT_EQ(ex_data_counter, 4);
|
||||
|
||||
struct ip_addr ipv4;
|
||||
ipv4.ip_type = IPv4;
|
||||
ret = inet_pton(AF_INET, "192.168.100.1", &ipv4.ipv4);
|
||||
EXPECT_EQ(ret, 1);
|
||||
|
||||
uint16_t port = htons(150);
|
||||
uint16_t port = htons(255);
|
||||
|
||||
struct ipport_plugin_ud *results[ARRAY_SIZE];
|
||||
ret = maat_ipport_plugin_table_get_ex_data(maat_inst, table_id, &ipv4, port,
|
||||
(void **)results, ARRAY_SIZE);
|
||||
EXPECT_EQ(ret, 1);
|
||||
EXPECT_EQ(ret, 2);
|
||||
EXPECT_EQ(results[0]->rule_id, 101);
|
||||
EXPECT_EQ(results[1]->rule_id, 103);
|
||||
|
||||
// struct ip_addr ipv6;
|
||||
// ipv6.ip_type = IPv6;
|
||||
// inet_pton(AF_INET6, "2001:db8:1234::5210", &(ipv6.ipv6));
|
||||
// memset(results, 0, sizeof(results));
|
||||
struct ip_addr ipv6;
|
||||
ipv6.ip_type = IPv6;
|
||||
inet_pton(AF_INET6, "2001:db8:1234::5210", ipv6.ipv6);
|
||||
memset(results, 0, sizeof(results));
|
||||
|
||||
// ret = maat_ip_plugin_table_get_ex_data(maat_inst, table_id, &ipv6,
|
||||
// (void**)results, ARRAY_SIZE);
|
||||
// EXPECT_EQ(ret, 2);
|
||||
// EXPECT_EQ(results[0]->rule_id, 104);
|
||||
// EXPECT_EQ(results[1]->rule_id, 103);
|
||||
ret = maat_ipport_plugin_table_get_ex_data(maat_inst, table_id, &ipv6, port,
|
||||
(void**)results, ARRAY_SIZE);
|
||||
EXPECT_EQ(ret, 1);
|
||||
EXPECT_EQ(results[0]->rule_id, 104);
|
||||
|
||||
// //Reproduce BugReport-Liumengyan-20210515
|
||||
// inet_pton(AF_INET6, "240e:97c:4010:104::17", &(ipv6.ipv6));
|
||||
// ret = maat_ip_plugin_table_get_ex_data(maat_inst, table_id, &ipv6,
|
||||
// (void**)results, ARRAY_SIZE);
|
||||
// EXPECT_EQ(ret, 0);
|
||||
inet_pton(AF_INET6, "240e:97c:4010:104::17", ipv6.ipv6);
|
||||
ret = maat_ipport_plugin_table_get_ex_data(maat_inst, table_id, &ipv6, port,
|
||||
(void**)results, ARRAY_SIZE);
|
||||
EXPECT_EQ(ret, 0);
|
||||
}
|
||||
|
||||
class FQDNPluginTable : public testing::Test
|
||||
|
||||
@@ -3032,9 +3032,10 @@
|
||||
{
|
||||
"table_name": "TEST_IPPORT_PLUGIN_WITH_EXDATA",
|
||||
"table_content": [
|
||||
"101\t4\t192.168.100.1\t100\t200\t1",
|
||||
"101\t4\t192.168.100.1\t0\t255\t1",
|
||||
"102\t4\t192.168.100.2\t100\t200\t1",
|
||||
"103\t4\t192.168.100.1\t201\t300\t1"
|
||||
"103\t4\t192.168.100.1\t255\t300\t1",
|
||||
"104\t6\t2001:db8:1234::5210\t255\t512\t1"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
||||
Reference in New Issue
Block a user