data handler improves, written test for nfproxy, new option on parsing fail
This commit is contained in:
@@ -16,13 +16,13 @@ done
|
||||
echo "Running standard API test"
|
||||
python3 api_test.py -p $PASSWORD || ERROR=1
|
||||
echo "Running Netfilter Regex TCP ipv4"
|
||||
python3 nf_test.py -p $PASSWORD -m tcp || ERROR=1
|
||||
python3 nfregex_test.py -p $PASSWORD -m tcp || ERROR=1
|
||||
echo "Running Netfilter Regex TCP ipv6"
|
||||
python3 nf_test.py -p $PASSWORD -m tcp -6 || ERROR=1
|
||||
python3 nfregex_test.py -p $PASSWORD -m tcp -6 || ERROR=1
|
||||
echo "Running Netfilter Regex UDP ipv4"
|
||||
python3 nf_test.py -p $PASSWORD -m udp || ERROR=1
|
||||
python3 nfregex_test.py -p $PASSWORD -m udp || ERROR=1
|
||||
echo "Running Netfilter Regex UDP ipv6"
|
||||
python3 nf_test.py -p $PASSWORD -m udp -6 || ERROR=1
|
||||
python3 nfregex_test.py -p $PASSWORD -m udp -6 || ERROR=1
|
||||
echo "Running Port Hijack TCP ipv4"
|
||||
python3 ph_test.py -p $PASSWORD -m tcp || ERROR=1
|
||||
echo "Running Port Hijack TCP ipv6"
|
||||
@@ -31,6 +31,10 @@ echo "Running Port Hijack UDP ipv4"
|
||||
python3 ph_test.py -p $PASSWORD -m udp || ERROR=1
|
||||
echo "Running Port Hijack UDP ipv6"
|
||||
python3 ph_test.py -p $PASSWORD -m udp -6 || ERROR=1
|
||||
echo "Running Netfilter Proxy ipv4"
|
||||
python3 nfproxy_test.py -p $PASSWORD || ERROR=1
|
||||
echo "Running Netfilter Proxy ipv6"
|
||||
python3 nfproxy_test.py -p $PASSWORD -6 || ERROR=1
|
||||
|
||||
if [[ "$ERROR" == "0" ]] then
|
||||
python3 benchmark.py -p $PASSWORD -r 5 -d 1 -s 10 || ERROR=1
|
||||
|
||||
Reference in New Issue
Block a user