summaryrefslogtreecommitdiff
path: root/src/tsg_rule.cpp
diff options
context:
space:
mode:
authoryangwei <[email protected]>2023-04-14 15:17:18 +0800
committeryangwei <[email protected]>2023-04-14 15:17:18 +0800
commitb31278b7cda764e257ea3bad58f1da5eb8f8f528 (patch)
tree9376647d1c313423e4c3e6582ec469687f3c883c /src/tsg_rule.cpp
parent71ec322759a8ce662f89e2399420d05839052725 (diff)
🦄 refactor(scan log): 扫描结果日志统一写入g_tsg_maat_rt_para句柄
Diffstat (limited to 'src/tsg_rule.cpp')
-rw-r--r--src/tsg_rule.cpp24
1 files changed, 12 insertions, 12 deletions
diff --git a/src/tsg_rule.cpp b/src/tsg_rule.cpp
index 6fb64b4..fc0a381 100644
--- a/src/tsg_rule.cpp
+++ b/src/tsg_rule.cpp
@@ -2320,23 +2320,23 @@ size_t tsg_scan_ipv4_address(const struct streaminfo *a_stream, struct maat *fea
if(n_matched_rules>0)
{
- MESA_handle_runtime_log(g_tsg_para.logger,
+ MESA_handle_runtime_log(g_tsg_maat_rt_para.logger,
RLOG_LV_DEBUG,
"SCAN_IPV4",
"Hit %s addr: %s return n_rules: %llu",
g_tsg_maat_rt_para.scan_tb[idx].name,
- PRINTADDR(a_stream, g_tsg_para.level),
+ PRINTADDR(a_stream, g_tsg_maat_rt_para.level),
n_matched_rules
);
return matche_rules_convert(feather, matched_rules, n_matched_rules, rules, n_rules);
}
- MESA_handle_runtime_log(g_tsg_para.logger,
+ MESA_handle_runtime_log(g_tsg_maat_rt_para.logger,
RLOG_LV_DEBUG,
"SCAN_IPV4",
"Not hit %s addr: %s Scan return: %d ",
g_tsg_maat_rt_para.scan_tb[idx].name,
- PRINTADDR(a_stream, g_tsg_para.level),
+ PRINTADDR(a_stream, g_tsg_maat_rt_para.level),
is_hited
);
@@ -2369,23 +2369,23 @@ size_t tsg_scan_ipv6_address(const struct streaminfo *a_stream, struct maat *fea
if(n_matched_rules>0)
{
- MESA_handle_runtime_log(g_tsg_para.logger,
+ MESA_handle_runtime_log(g_tsg_maat_rt_para.logger,
RLOG_LV_DEBUG,
"SCAN_IPV6",
"Hit %s addr: %s return n_rules: %llu",
g_tsg_maat_rt_para.scan_tb[idx].name,
- PRINTADDR(a_stream, g_tsg_para.level),
+ PRINTADDR(a_stream, g_tsg_maat_rt_para.level),
n_matched_rules
);
return matche_rules_convert(feather, matched_rules, n_matched_rules, rules, n_rules);
}
- MESA_handle_runtime_log(g_tsg_para.logger,
+ MESA_handle_runtime_log(g_tsg_maat_rt_para.logger,
RLOG_LV_DEBUG,
"SCAN_IPV6",
"Not hit %s addr: %s Scan return: %d ",
g_tsg_maat_rt_para.scan_tb[idx].name,
- PRINTADDR(a_stream, g_tsg_para.level),
+ PRINTADDR(a_stream, g_tsg_maat_rt_para.level),
is_hited
);
@@ -2443,7 +2443,7 @@ int tsg_scan_intercept_exclusion(const struct streaminfo *a_stream, struct maat
if(ret>0)
{
- MESA_handle_runtime_log(g_tsg_para.logger,
+ MESA_handle_runtime_log(g_tsg_maat_rt_para.logger,
RLOG_LV_DEBUG,
"EXCLUSION_SSL_SNI",
"Hit %s policy_id: %d service: %d action: %d Decryption Exclusion: [ policy_id: %d service: %d action: %d ] addr: %s",
@@ -2454,19 +2454,19 @@ int tsg_scan_intercept_exclusion(const struct streaminfo *a_stream, struct maat
p_result->rule_id,
p_result->service_id,
(unsigned char)p_result->action,
- PRINTADDR(a_stream, g_tsg_para.level)
+ PRINTADDR(a_stream, g_tsg_maat_rt_para.level)
);
return 1;
}
- MESA_handle_runtime_log(g_tsg_para.logger,
+ MESA_handle_runtime_log(g_tsg_maat_rt_para.logger,
RLOG_LV_DEBUG,
"EXCLUSION_SSL_SNI",
"Not hit %s stream_dir: %d addr: %s scan ret: %d",
domain,
a_stream->dir,
- PRINTADDR(a_stream, g_tsg_para.level),
+ PRINTADDR(a_stream, g_tsg_maat_rt_para.level),
ret
);