diff options
| author | fengweihao <[email protected]> | 2024-08-16 10:32:02 +0800 |
|---|---|---|
| committer | fengweihao <[email protected]> | 2024-08-16 10:32:02 +0800 |
| commit | be7368a0cce09adaf66f3697a8c2efb05f79fcff (patch) | |
| tree | aeb2afe5c49481450272784c941fcdfbd695ed48 /test/verify_policy_test.cpp | |
| parent | 6dc39cc9223d809340ec9b99668dea79dd67baf8 (diff) | |
TSG-22199 修复tunnel调用no_logic情况下命中路径记录问题,优化Fqdn命中路径构建v4.0.26-20240816develop-3.0
Diffstat (limited to 'test/verify_policy_test.cpp')
| -rw-r--r-- | test/verify_policy_test.cpp | 48 |
1 files changed, 43 insertions, 5 deletions
diff --git a/test/verify_policy_test.cpp b/test/verify_policy_test.cpp index e109183..446c70c 100644 --- a/test/verify_policy_test.cpp +++ b/test/verify_policy_test.cpp @@ -299,17 +299,55 @@ TEST(VerifyPolicy, HitMultiplePolicy) FREE(&hit_policy_result); } -static void reload_maat_config(const char * main_profile) +TEST(VerifyPolicy, HitTunnelEndpointaPolicy_1025) { - verify_policy_table_free(main_profile); - int ret = verify_policy_table_init(g_verify_proxy, main_profile); - CHECK_OR_EXIT(ret == 0, "Failed at init maat module, Exit."); + char *hit_policy_request = select_hit_policy_request_item(6); + ASSERT_TRUE(hit_policy_request != NULL); + char *hit_policy_result = select_hit_policy_result_item(6); + ASSERT_TRUE(hit_policy_result != NULL); + + cJSON *result_json = get_verify_policy_query(hit_policy_request, strlen(hit_policy_request), 1); + ASSERT_TRUE(result_json != NULL); + + char *hit_policy_query = cJSON_PrintUnformatted(result_json); + ASSERT_TRUE(hit_policy_query != NULL); + + int equal = strncasecmp(hit_policy_query, hit_policy_result, strlen(hit_policy_result)); + EXPECT_EQ(equal, 0); + + cJSON_Delete(result_json); + FREE(&hit_policy_query); + FREE(&hit_policy_request); + FREE(&hit_policy_result); +} + +TEST(VerifyPolicy, HitTunnelEndpointaPolicy_1027) +{ + char *hit_policy_request = select_hit_policy_request_item(7); + ASSERT_TRUE(hit_policy_request != NULL); + char *hit_policy_result = select_hit_policy_result_item(7); + ASSERT_TRUE(hit_policy_result != NULL); + + cJSON *result_json = get_verify_policy_query(hit_policy_request, strlen(hit_policy_request), 1); + ASSERT_TRUE(result_json != NULL); + + char *hit_policy_query = cJSON_PrintUnformatted(result_json); + ASSERT_TRUE(hit_policy_query != NULL); + + printf("hit_policy_query = %s\n", hit_policy_query); + + int equal = strncasecmp(hit_policy_query, hit_policy_result, strlen(hit_policy_result)); + EXPECT_EQ(equal, 0); + + cJSON_Delete(result_json); + FREE(&hit_policy_query); + FREE(&hit_policy_request); + FREE(&hit_policy_result); } /*Tunnel Endpoint Policy Test**/ TEST(VerifyPolicy, HitTunnelEndpointaPolicy) { - reload_maat_config("./conf/verify_policy2.conf"); char *hit_policy_request = select_hit_policy_request_item(2); ASSERT_TRUE(hit_policy_request != NULL); char *hit_policy_result = select_hit_policy_result_item(2); |
