feat(pcap): complete replay system with filtering, metadata, and live replay

Wire ExcludeOpcodes config into RecordingConn so configured opcodes
(e.g. ping, nop, position) are filtered at record time. Add padded
metadata with in-place PatchMetadata to populate CharID/UserID after
login. Implement --mode replay using protbot's encrypted connection
with timing-aware packet sending, auto-ping response, concurrent
S→C collection, and byte-level payload diff reporting.
This commit is contained in:
Houmgaor
2026-02-23 19:34:30 +01:00
parent 7ef5efc549
commit f712e3c04d
14 changed files with 679 additions and 42 deletions

View File

@@ -3,6 +3,7 @@ package pcap
import (
"bytes"
"io"
"os"
"testing"
)
@@ -252,6 +253,100 @@ func TestDirectionString(t *testing.T) {
}
}
func TestMetadataPadding(t *testing.T) {
var buf bytes.Buffer
hdr := FileHeader{
Version: FormatVersion,
ServerType: ServerTypeChannel,
ClientMode: 40,
SessionStartNs: 1000,
}
meta := SessionMetadata{Host: "127.0.0.1"}
_, err := NewWriter(&buf, hdr, meta)
if err != nil {
t.Fatalf("NewWriter: %v", err)
}
// The metadata block should be at least MinMetadataSize.
data := buf.Bytes()
if len(data) < HeaderSize+MinMetadataSize {
t.Errorf("file size %d < HeaderSize+MinMetadataSize (%d)", len(data), HeaderSize+MinMetadataSize)
}
}
func TestPatchMetadata(t *testing.T) {
// Create a capture file with initial metadata.
f, err := os.CreateTemp(t.TempDir(), "test-patch-*.mhfr")
if err != nil {
t.Fatalf("CreateTemp: %v", err)
}
defer func() { _ = f.Close() }()
hdr := FileHeader{
Version: FormatVersion,
ServerType: ServerTypeChannel,
ClientMode: 40,
SessionStartNs: 1000,
}
meta := SessionMetadata{Host: "127.0.0.1", Port: 54001}
w, err := NewWriter(f, hdr, meta)
if err != nil {
t.Fatalf("NewWriter: %v", err)
}
// Write a packet so we can verify it survives patching.
if err := w.WritePacket(PacketRecord{
TimestampNs: 2000, Direction: DirClientToServer, Opcode: 0x0013, Payload: []byte{0x00, 0x13},
}); err != nil {
t.Fatalf("WritePacket: %v", err)
}
if err := w.Flush(); err != nil {
t.Fatalf("Flush: %v", err)
}
// Patch metadata with CharID/UserID.
patched := SessionMetadata{
Host: "127.0.0.1",
Port: 54001,
CharID: 42,
UserID: 7,
}
if err := PatchMetadata(f, patched); err != nil {
t.Fatalf("PatchMetadata: %v", err)
}
// Re-read from the beginning.
if _, err := f.Seek(0, 0); err != nil {
t.Fatalf("Seek: %v", err)
}
r, err := NewReader(f)
if err != nil {
t.Fatalf("NewReader: %v", err)
}
// Verify patched metadata.
if r.Meta.CharID != 42 {
t.Errorf("CharID = %d, want 42", r.Meta.CharID)
}
if r.Meta.UserID != 7 {
t.Errorf("UserID = %d, want 7", r.Meta.UserID)
}
if r.Meta.Host != "127.0.0.1" {
t.Errorf("Host = %q, want %q", r.Meta.Host, "127.0.0.1")
}
// Verify packet survived.
rec, err := r.ReadPacket()
if err != nil {
t.Fatalf("ReadPacket: %v", err)
}
if rec.Opcode != 0x0013 {
t.Errorf("Opcode = 0x%04X, want 0x0013", rec.Opcode)
}
}
func TestServerTypeString(t *testing.T) {
if ServerTypeSign.String() != "sign" {
t.Errorf("ServerTypeSign.String() = %q", ServerTypeSign.String())