Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 1 | #!/usr/bin/python |
| 2 | |
| 3 | import sys,os |
| 4 | from optparse import OptionParser |
| 5 | import socket |
| 6 | import struct |
| 7 | |
| 8 | verbose = False |
| 9 | |
| 10 | def prefix_ipa_ctrl_header(data): |
| 11 | return struct.pack(">HBB", len(data)+1, 0xee, 0) + data |
| 12 | |
| 13 | def remove_ipa_ctrl_header(data): |
| 14 | if (len(data) < 4): |
| 15 | raise BaseException("Answer too short!") |
| 16 | (plen, ipa_proto, osmo_proto) = struct.unpack(">HBB", data[:4]) |
| 17 | if (plen + 3 > len(data)): |
| 18 | print "Warning: Wrong payload length (expected %i, got %i)" % (plen, len(data) - 3) |
| 19 | if (ipa_proto != 0xee or osmo_proto != 0): |
| 20 | raise BaseException("Wrong protocol in answer!") |
| 21 | |
| 22 | return data[4:plen+3], data[plen+3:] |
| 23 | |
| 24 | def connect(host, port): |
| 25 | if verbose: |
| 26 | print "Connecting to host %s:%i" % (host, port) |
| 27 | |
| 28 | sck = socket.socket(socket.AF_INET, socket.SOCK_STREAM) |
| 29 | sck.setblocking(1) |
| 30 | sck.connect((host, port)) |
| 31 | return sck |
| 32 | |
| 33 | def send(sck, data): |
| 34 | if verbose: |
| 35 | print "Sending \"%s\"" %(data) |
| 36 | data = prefix_ipa_ctrl_header(data) |
| 37 | sck.send(data) |
| 38 | |
| 39 | def do_set(var, value, id, sck): |
| 40 | setmsg = "SET %s %s %s" %(options.id, var, value) |
| 41 | send(sck, setmsg) |
| 42 | |
| 43 | def do_get(var, id, sck): |
| 44 | getmsg = "GET %s %s" %(options.id, var) |
| 45 | send(sck, getmsg) |
| 46 | |
| 47 | parser = OptionParser("Usage: %prog [options] var [value]") |
| 48 | parser.add_option("-d", "--host", dest="host", |
| 49 | help="connect to HOST", metavar="HOST") |
| 50 | parser.add_option("-p", "--port", dest="port", type="int", |
| 51 | help="use PORT", metavar="PORT", default=4249) |
| 52 | parser.add_option("-g", "--get", action="store_true", |
| 53 | dest="cmd_get", help="perform GET operation") |
| 54 | parser.add_option("-s", "--set", action="store_true", |
| 55 | dest="cmd_set", help="perform SET operation") |
| 56 | parser.add_option("-i", "--id", dest="id", default="1", |
| 57 | help="set id manually", metavar="ID") |
| 58 | parser.add_option("-v", "--verbose", action="store_true", |
| 59 | dest="verbose", help="be verbose", default=False) |
| 60 | parser.add_option("-m", "--monitor", action="store_true", |
| 61 | dest="monitor", help="monitor the connection for traps", default=False) |
| 62 | |
| 63 | (options, args) = parser.parse_args() |
| 64 | |
| 65 | verbose = options.verbose |
| 66 | |
| 67 | if options.cmd_set and options.cmd_get: |
| 68 | parser.error("Get and set options are mutually exclusive!") |
| 69 | |
| 70 | if not (options.cmd_get or options.cmd_set or options.monitor): |
| 71 | parser.error("One of -m, -g, or -s must be set") |
| 72 | |
| 73 | if not (options.host): |
| 74 | parser.error("Destination host and port required!") |
| 75 | |
| 76 | sock = connect(options.host, options.port) |
| 77 | |
| 78 | if options.cmd_set: |
| 79 | if len(args) < 2: |
| 80 | parser.error("Set requires var and value arguments") |
| 81 | do_set(args[0], ' '.join(args[1:]), options.id, sock) |
| 82 | |
| 83 | if options.cmd_get: |
| 84 | if len(args) != 1: |
| 85 | parser.error("Get requires the var argument") |
| 86 | do_get(args[0], options.id, sock) |
| 87 | |
| 88 | data = sock.recv(1024) |
| 89 | while (len(data)>0): |
| 90 | (answer, data) = remove_ipa_ctrl_header(data) |
| 91 | print "Got message:", answer |
| 92 | |
| 93 | if options.monitor: |
| 94 | while (True): |
| 95 | data = sock.recv(1024) |
Daniel Willmann | 6044162 | 2011-07-28 19:04:57 +0200 | [diff] [blame] | 96 | if len(data) == 0: |
| 97 | print "Connection is gone." |
| 98 | break |
| 99 | |
Daniel Willmann | 59073a1 | 2011-04-29 18:40:29 +0200 | [diff] [blame] | 100 | while (len(data)>0): |
| 101 | (answer, data) = remove_ipa_ctrl_header(data) |
| 102 | print "Got message:", answer |
| 103 | |
| 104 | sock.close() |