summaryrefslogtreecommitdiff
path: root/test/verify_policy_test.cpp
diff options
context:
space:
mode:
authorfengweihao <[email protected]>2024-08-16 10:32:02 +0800
committerfengweihao <[email protected]>2024-08-16 10:32:02 +0800
commitbe7368a0cce09adaf66f3697a8c2efb05f79fcff (patch)
treeaeb2afe5c49481450272784c941fcdfbd695ed48 /test/verify_policy_test.cpp
parent6dc39cc9223d809340ec9b99668dea79dd67baf8 (diff)
TSG-22199 修复tunnel调用no_logic情况下命中路径记录问题,优化Fqdn命中路径构建v4.0.26-20240816develop-3.0
Diffstat (limited to 'test/verify_policy_test.cpp')
-rw-r--r--test/verify_policy_test.cpp48
1 files changed, 43 insertions, 5 deletions
diff --git a/test/verify_policy_test.cpp b/test/verify_policy_test.cpp
index e109183..446c70c 100644
--- a/test/verify_policy_test.cpp
+++ b/test/verify_policy_test.cpp
@@ -299,17 +299,55 @@ TEST(VerifyPolicy, HitMultiplePolicy)
FREE(&hit_policy_result);
}
-static void reload_maat_config(const char * main_profile)
+TEST(VerifyPolicy, HitTunnelEndpointaPolicy_1025)
{
- verify_policy_table_free(main_profile);
- int ret = verify_policy_table_init(g_verify_proxy, main_profile);
- CHECK_OR_EXIT(ret == 0, "Failed at init maat module, Exit.");
+ char *hit_policy_request = select_hit_policy_request_item(6);
+ ASSERT_TRUE(hit_policy_request != NULL);
+ char *hit_policy_result = select_hit_policy_result_item(6);
+ ASSERT_TRUE(hit_policy_result != NULL);
+
+ cJSON *result_json = get_verify_policy_query(hit_policy_request, strlen(hit_policy_request), 1);
+ ASSERT_TRUE(result_json != NULL);
+
+ char *hit_policy_query = cJSON_PrintUnformatted(result_json);
+ ASSERT_TRUE(hit_policy_query != NULL);
+
+ int equal = strncasecmp(hit_policy_query, hit_policy_result, strlen(hit_policy_result));
+ EXPECT_EQ(equal, 0);
+
+ cJSON_Delete(result_json);
+ FREE(&hit_policy_query);
+ FREE(&hit_policy_request);
+ FREE(&hit_policy_result);
+}
+
+TEST(VerifyPolicy, HitTunnelEndpointaPolicy_1027)
+{
+ char *hit_policy_request = select_hit_policy_request_item(7);
+ ASSERT_TRUE(hit_policy_request != NULL);
+ char *hit_policy_result = select_hit_policy_result_item(7);
+ ASSERT_TRUE(hit_policy_result != NULL);
+
+ cJSON *result_json = get_verify_policy_query(hit_policy_request, strlen(hit_policy_request), 1);
+ ASSERT_TRUE(result_json != NULL);
+
+ char *hit_policy_query = cJSON_PrintUnformatted(result_json);
+ ASSERT_TRUE(hit_policy_query != NULL);
+
+ printf("hit_policy_query = %s\n", hit_policy_query);
+
+ int equal = strncasecmp(hit_policy_query, hit_policy_result, strlen(hit_policy_result));
+ EXPECT_EQ(equal, 0);
+
+ cJSON_Delete(result_json);
+ FREE(&hit_policy_query);
+ FREE(&hit_policy_request);
+ FREE(&hit_policy_result);
}
/*Tunnel Endpoint Policy Test**/
TEST(VerifyPolicy, HitTunnelEndpointaPolicy)
{
- reload_maat_config("./conf/verify_policy2.conf");
char *hit_policy_request = select_hit_policy_request_item(2);
ASSERT_TRUE(hit_policy_request != NULL);
char *hit_policy_result = select_hit_policy_result_item(2);