blob: de0c2a9432fc427bc55cc73440b22dc1d9905d64 [file] [log] [blame]
Daniel Willmann203d8652011-04-29 18:40:29 +02001#!/usr/bin/python
2
Max2a63d012016-08-01 14:26:19 +02003import sys,os, random
Daniel Willmann203d8652011-04-29 18:40:29 +02004from optparse import OptionParser
5import socket
6import struct
7
8verbose = False
9
10def prefix_ipa_ctrl_header(data):
11 return struct.pack(">HBB", len(data)+1, 0xee, 0) + data
12
Maxdbb63922016-08-01 18:54:17 +020013def ipa_ctrl_header(header):
14 (plen, ipa_proto, osmo_proto) = struct.unpack(">HBB", header)
15 return None if (ipa_proto != 0xee or osmo_proto != 0) else plen
16
Daniel Willmann203d8652011-04-29 18:40:29 +020017def remove_ipa_ctrl_header(data):
18 if (len(data) < 4):
19 raise BaseException("Answer too short!")
Maxdbb63922016-08-01 18:54:17 +020020 plen = ipa_ctrl_header(data[:4])
21 if (None == plen):
22 raise BaseException("Wrong protocol in answer!")
Daniel Willmann203d8652011-04-29 18:40:29 +020023 if (plen + 3 > len(data)):
24 print "Warning: Wrong payload length (expected %i, got %i)" % (plen, len(data) - 3)
Daniel Willmann203d8652011-04-29 18:40:29 +020025 return data[4:plen+3], data[plen+3:]
26
27def connect(host, port):
28 if verbose:
29 print "Connecting to host %s:%i" % (host, port)
30
31 sck = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
32 sck.setblocking(1)
33 sck.connect((host, port))
34 return sck
35
36def send(sck, data):
37 if verbose:
38 print "Sending \"%s\"" %(data)
39 data = prefix_ipa_ctrl_header(data)
40 sck.send(data)
41
Max2a63d012016-08-01 14:26:19 +020042def do_set(var, value, op_id, sck):
43 setmsg = "SET %s %s %s" %(op_id, var, value)
Daniel Willmann203d8652011-04-29 18:40:29 +020044 send(sck, setmsg)
45
Max2a63d012016-08-01 14:26:19 +020046def do_get(var, op_id, sck):
47 getmsg = "GET %s %s" %(op_id, var)
Daniel Willmann203d8652011-04-29 18:40:29 +020048 send(sck, getmsg)
49
Maxdbb63922016-08-01 18:54:17 +020050def do_set_get(sck, var, value = None):
51 r = random.randint(1, sys.maxint)
52 if (value != None):
53 s = 'SET_REPLY'
54 do_set(var, value, r, sck)
55 else:
56 s = 'GET_REPLY'
57 do_get(var, r, sck)
58 (answer, data) = remove_ipa_ctrl_header(sck.recv(4096))
59 x = answer.split()
60 if (s == x[0] and str(r) == x[1] and var == x[2]):
61 return None if ('SET_REPLY' == s and value != x[3]) else x[3]
62 return None
63
64def set_var(sck, var, val):
65 return do_set_get(sck, var, val)
66
67def get_var(sck, var):
68 return do_set_get(sck, var)
69
Max3ed214c2016-07-29 18:19:25 +020070if __name__ == '__main__':
Max2a63d012016-08-01 14:26:19 +020071 random.seed()
72
Max3ed214c2016-07-29 18:19:25 +020073 parser = OptionParser("Usage: %prog [options] var [value]")
74 parser.add_option("-d", "--host", dest="host",
75 help="connect to HOST", metavar="HOST")
76 parser.add_option("-p", "--port", dest="port", type="int",
77 help="use PORT", metavar="PORT", default=4249)
78 parser.add_option("-g", "--get", action="store_true",
79 dest="cmd_get", help="perform GET operation")
80 parser.add_option("-s", "--set", action="store_true",
81 dest="cmd_set", help="perform SET operation")
Max2a63d012016-08-01 14:26:19 +020082 parser.add_option("-i", "--id", dest="op_id", default=random.randint(1, sys.maxint),
Max3ed214c2016-07-29 18:19:25 +020083 help="set id manually", metavar="ID")
84 parser.add_option("-v", "--verbose", action="store_true",
85 dest="verbose", help="be verbose", default=False)
86 parser.add_option("-m", "--monitor", action="store_true",
87 dest="monitor", help="monitor the connection for traps", default=False)
Daniel Willmann203d8652011-04-29 18:40:29 +020088
Max3ed214c2016-07-29 18:19:25 +020089 (options, args) = parser.parse_args()
Daniel Willmann203d8652011-04-29 18:40:29 +020090
Max3ed214c2016-07-29 18:19:25 +020091 verbose = options.verbose
Daniel Willmann203d8652011-04-29 18:40:29 +020092
Max3ed214c2016-07-29 18:19:25 +020093 if options.cmd_set and options.cmd_get:
94 parser.error("Get and set options are mutually exclusive!")
Daniel Willmann203d8652011-04-29 18:40:29 +020095
Max3ed214c2016-07-29 18:19:25 +020096 if not (options.cmd_get or options.cmd_set or options.monitor):
97 parser.error("One of -m, -g, or -s must be set")
Daniel Willmann203d8652011-04-29 18:40:29 +020098
Max3ed214c2016-07-29 18:19:25 +020099 if not (options.host):
100 parser.error("Destination host and port required!")
Daniel Willmann203d8652011-04-29 18:40:29 +0200101
Max3ed214c2016-07-29 18:19:25 +0200102 sock = connect(options.host, options.port)
Daniel Willmann203d8652011-04-29 18:40:29 +0200103
Max3ed214c2016-07-29 18:19:25 +0200104 if options.cmd_set:
105 if len(args) < 2:
106 parser.error("Set requires var and value arguments")
Max2a63d012016-08-01 14:26:19 +0200107 do_set(args[0], ' '.join(args[1:]), options.op_id, sock)
Daniel Willmann203d8652011-04-29 18:40:29 +0200108
Max3ed214c2016-07-29 18:19:25 +0200109 if options.cmd_get:
110 if len(args) != 1:
111 parser.error("Get requires the var argument")
Max2a63d012016-08-01 14:26:19 +0200112 do_get(args[0], options.op_id, sock)
Daniel Willmann203d8652011-04-29 18:40:29 +0200113
Max3ed214c2016-07-29 18:19:25 +0200114 data = sock.recv(1024)
115 while (len(data)>0):
116 (answer, data) = remove_ipa_ctrl_header(data)
117 print "Got message:", answer
Daniel Willmann203d8652011-04-29 18:40:29 +0200118
Max3ed214c2016-07-29 18:19:25 +0200119 if options.monitor:
120 while (True):
121 data = sock.recv(1024)
122 if len(data) == 0:
123 print "Connection is gone."
124 break
Daniel Willmann7c3298a2011-07-28 19:04:57 +0200125
Max3ed214c2016-07-29 18:19:25 +0200126 while (len(data)>0):
127 (answer, data) = remove_ipa_ctrl_header(data)
128 print "Got message:", answer
Daniel Willmann203d8652011-04-29 18:40:29 +0200129
Max3ed214c2016-07-29 18:19:25 +0200130 sock.close()