Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 1 | #!/usr/bin/python |
| 2 | |
Max | 2e195a9 | 2016-08-01 14:26:19 +0200 | [diff] [blame] | 3 | import sys,os, random |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 4 | from optparse import OptionParser |
| 5 | import socket |
| 6 | import struct |
| 7 | |
| 8 | verbose = False |
| 9 | |
| 10 | def prefix_ipa_ctrl_header(data): |
| 11 | return struct.pack(">HBB", len(data)+1, 0xee, 0) + data |
| 12 | |
Max | 44c4c47 | 2016-08-01 18:54:17 +0200 | [diff] [blame] | 13 | def ipa_ctrl_header(header): |
| 14 | (plen, ipa_proto, osmo_proto) = struct.unpack(">HBB", header) |
| 15 | return None if (ipa_proto != 0xee or osmo_proto != 0) else plen |
| 16 | |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 17 | def remove_ipa_ctrl_header(data): |
| 18 | if (len(data) < 4): |
| 19 | raise BaseException("Answer too short!") |
Max | 44c4c47 | 2016-08-01 18:54:17 +0200 | [diff] [blame] | 20 | plen = ipa_ctrl_header(data[:4]) |
| 21 | if (None == plen): |
| 22 | raise BaseException("Wrong protocol in answer!") |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 23 | if (plen + 3 > len(data)): |
| 24 | print "Warning: Wrong payload length (expected %i, got %i)" % (plen, len(data) - 3) |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 25 | return data[4:plen+3], data[plen+3:] |
| 26 | |
| 27 | def connect(host, port): |
| 28 | if verbose: |
| 29 | print "Connecting to host %s:%i" % (host, port) |
| 30 | |
| 31 | sck = socket.socket(socket.AF_INET, socket.SOCK_STREAM) |
| 32 | sck.setblocking(1) |
| 33 | sck.connect((host, port)) |
| 34 | return sck |
| 35 | |
| 36 | def send(sck, data): |
| 37 | if verbose: |
| 38 | print "Sending \"%s\"" %(data) |
| 39 | data = prefix_ipa_ctrl_header(data) |
| 40 | sck.send(data) |
| 41 | |
Max | 2e195a9 | 2016-08-01 14:26:19 +0200 | [diff] [blame] | 42 | def do_set(var, value, op_id, sck): |
| 43 | setmsg = "SET %s %s %s" %(op_id, var, value) |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 44 | send(sck, setmsg) |
| 45 | |
Max | 2e195a9 | 2016-08-01 14:26:19 +0200 | [diff] [blame] | 46 | def do_get(var, op_id, sck): |
| 47 | getmsg = "GET %s %s" %(op_id, var) |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 48 | send(sck, getmsg) |
| 49 | |
Max | 44c4c47 | 2016-08-01 18:54:17 +0200 | [diff] [blame] | 50 | def do_set_get(sck, var, value = None): |
| 51 | r = random.randint(1, sys.maxint) |
| 52 | if (value != None): |
| 53 | s = 'SET_REPLY' |
| 54 | do_set(var, value, r, sck) |
| 55 | else: |
| 56 | s = 'GET_REPLY' |
| 57 | do_get(var, r, sck) |
| 58 | (answer, data) = remove_ipa_ctrl_header(sck.recv(4096)) |
| 59 | x = answer.split() |
| 60 | if (s == x[0] and str(r) == x[1] and var == x[2]): |
| 61 | return None if ('SET_REPLY' == s and value != x[3]) else x[3] |
| 62 | return None |
| 63 | |
| 64 | def set_var(sck, var, val): |
| 65 | return do_set_get(sck, var, val) |
| 66 | |
| 67 | def get_var(sck, var): |
| 68 | return do_set_get(sck, var) |
| 69 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 70 | if __name__ == '__main__': |
Max | 2e195a9 | 2016-08-01 14:26:19 +0200 | [diff] [blame] | 71 | random.seed() |
| 72 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 73 | parser = OptionParser("Usage: %prog [options] var [value]") |
| 74 | parser.add_option("-d", "--host", dest="host", |
| 75 | help="connect to HOST", metavar="HOST") |
| 76 | parser.add_option("-p", "--port", dest="port", type="int", |
| 77 | help="use PORT", metavar="PORT", default=4249) |
| 78 | parser.add_option("-g", "--get", action="store_true", |
| 79 | dest="cmd_get", help="perform GET operation") |
| 80 | parser.add_option("-s", "--set", action="store_true", |
| 81 | dest="cmd_set", help="perform SET operation") |
Max | 2e195a9 | 2016-08-01 14:26:19 +0200 | [diff] [blame] | 82 | parser.add_option("-i", "--id", dest="op_id", default=random.randint(1, sys.maxint), |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 83 | help="set id manually", metavar="ID") |
| 84 | parser.add_option("-v", "--verbose", action="store_true", |
| 85 | dest="verbose", help="be verbose", default=False) |
| 86 | parser.add_option("-m", "--monitor", action="store_true", |
| 87 | dest="monitor", help="monitor the connection for traps", default=False) |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 88 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 89 | (options, args) = parser.parse_args() |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 90 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 91 | verbose = options.verbose |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 92 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 93 | if options.cmd_set and options.cmd_get: |
| 94 | parser.error("Get and set options are mutually exclusive!") |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 95 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 96 | if not (options.cmd_get or options.cmd_set or options.monitor): |
| 97 | parser.error("One of -m, -g, or -s must be set") |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 98 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 99 | if not (options.host): |
| 100 | parser.error("Destination host and port required!") |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 101 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 102 | sock = connect(options.host, options.port) |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 103 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 104 | if options.cmd_set: |
| 105 | if len(args) < 2: |
| 106 | parser.error("Set requires var and value arguments") |
Max | 2e195a9 | 2016-08-01 14:26:19 +0200 | [diff] [blame] | 107 | do_set(args[0], ' '.join(args[1:]), options.op_id, sock) |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 108 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 109 | if options.cmd_get: |
| 110 | if len(args) != 1: |
| 111 | parser.error("Get requires the var argument") |
Max | 2e195a9 | 2016-08-01 14:26:19 +0200 | [diff] [blame] | 112 | do_get(args[0], options.op_id, sock) |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 113 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 114 | data = sock.recv(1024) |
| 115 | while (len(data)>0): |
| 116 | (answer, data) = remove_ipa_ctrl_header(data) |
| 117 | print "Got message:", answer |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 118 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 119 | if options.monitor: |
| 120 | while (True): |
| 121 | data = sock.recv(1024) |
| 122 | if len(data) == 0: |
| 123 | print "Connection is gone." |
| 124 | break |
Daniel Willmann | 6044162 | 2011-07-28 19:04:57 +0200 | [diff] [blame] | 125 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 126 | while (len(data)>0): |
| 127 | (answer, data) = remove_ipa_ctrl_header(data) |
| 128 | print "Got message:", answer |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 129 | |
Max | 28b39b9 | 2016-07-29 18:19:25 +0200 | [diff] [blame] | 130 | sock.close() |