Harald Welte | e057146 | 2018-02-14 15:42:14 +0100 | [diff] [blame] | 1 | #!/bin/sh |
| 2 | |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 3 | PIDFILE_PCAP=/tmp/pcap.pid |
| 4 | PIDFILE_NETCAT=/tmp/netcat.pid |
Pau Espin Pedrol | dada4c5 | 2018-02-15 16:07:23 +0100 | [diff] [blame] | 5 | TESTCASE=$1 |
Neels Hofmeyr | dadde17 | 2018-06-18 06:18:34 +0200 | [diff] [blame] | 6 | VERDICT="$2" |
| 7 | |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 8 | kill_rm_pidfile() { |
| 9 | if [ -e $1 ]; then |
| 10 | PSNAME="$(ps -q "$(cat "$1")" -o comm=)" |
| 11 | if [ "$PSNAME" != "sudo" ]; then |
| 12 | kill "$(cat "$1")" |
| 13 | else |
| 14 | # NOTE: This requires you to be root or something like |
| 15 | # "laforge ALL=NOPASSWD: /usr/sbin/tcpdump, /bin/kill" in your sudoers file |
| 16 | sudo kill "$(cat "$1")" |
| 17 | fi |
| 18 | rm $1 |
| 19 | fi |
| 20 | } |
| 21 | |
Neels Hofmeyr | ced8acf | 2019-02-26 05:03:22 +0100 | [diff] [blame] | 22 | date |
| 23 | |
Neels Hofmeyr | dadde17 | 2018-06-18 06:18:34 +0200 | [diff] [blame] | 24 | if [ x"$VERDICT" = x"pass" ]; then |
Vadim Yanitskiy | aa94d32 | 2020-05-21 20:36:33 +0700 | [diff] [blame] | 25 | echo -e "\033[1;32m====== $TESTCASE $VERDICT ======\033[0m" |
Neels Hofmeyr | dadde17 | 2018-06-18 06:18:34 +0200 | [diff] [blame] | 26 | else |
Vadim Yanitskiy | aa94d32 | 2020-05-21 20:36:33 +0700 | [diff] [blame] | 27 | echo -e "\033[1;31m------ $TESTCASE $VERDICT ------\033[0m" |
Neels Hofmeyr | dadde17 | 2018-06-18 06:18:34 +0200 | [diff] [blame] | 28 | fi |
| 29 | echo |
Pau Espin Pedrol | dada4c5 | 2018-02-15 16:07:23 +0100 | [diff] [blame] | 30 | |
| 31 | if [ "z$TTCN3_PCAP_PATH" = "z" ]; then |
| 32 | TTCN3_PCAP_PATH=/tmp |
| 33 | fi |
| 34 | |
Vadim Yanitskiy | 23d6665 | 2021-11-28 21:41:07 +0300 | [diff] [blame] | 35 | # Order the SUT to print a talloc report |
| 36 | if [ "z$OSMO_SUT_HOST" != "z" ] && [ "z$OSMO_SUT_PORT" != "z" ]; then |
| 37 | if [ -x "$(command -v osmo_interact_vty.py)" ]; then |
Oliver Smith | 9678c22 | 2021-12-17 12:04:11 +0100 | [diff] [blame] | 38 | echo "Saving talloc report from $OSMO_SUT_HOST:$OSMO_SUT_PORT to $TESTCASE.talloc" |
| 39 | if ! timeout 5 osmo_interact_vty.py \ |
Vadim Yanitskiy | 23d6665 | 2021-11-28 21:41:07 +0300 | [diff] [blame] | 40 | -H $OSMO_SUT_HOST -p $OSMO_SUT_PORT \ |
| 41 | -c "en; show talloc-context application full" \ |
Oliver Smith | 9678c22 | 2021-12-17 12:04:11 +0100 | [diff] [blame] | 42 | > "$TTCN3_PCAP_PATH/$TESTCASE.talloc"; then |
| 43 | echo |
| 44 | echo "ERROR: failed to get talloc report via vty" |
| 45 | echo |
| 46 | fi |
Vadim Yanitskiy | 23d6665 | 2021-11-28 21:41:07 +0300 | [diff] [blame] | 47 | else |
| 48 | echo "Missing osmo_interact_vty.py from osmo-python-tests!" |
| 49 | echo " -> Unable to obtain talloc report from the SUT" |
| 50 | fi |
| 51 | fi |
| 52 | |
Max | e521445 | 2019-03-14 18:15:27 +0100 | [diff] [blame] | 53 | # Wait for up to 2 seconds if we keep receiving traffinc from packet dumper, |
Pau Espin Pedrol | dada4c5 | 2018-02-15 16:07:23 +0100 | [diff] [blame] | 54 | # otherwise we might lose last packets from test. |
| 55 | i=0 |
| 56 | prev_count=-1 |
| 57 | count=$(stat --format="%s" "$TTCN3_PCAP_PATH/$TESTCASE.pcap") |
| 58 | while [ $count -gt $prev_count ] && [ $i -lt 2 ] |
| 59 | do |
Max | e521445 | 2019-03-14 18:15:27 +0100 | [diff] [blame] | 60 | echo "Waiting for packet dumper to finish... $i (prev_count=$prev_count, count=$count)" |
Pau Espin Pedrol | dada4c5 | 2018-02-15 16:07:23 +0100 | [diff] [blame] | 61 | sleep 1 |
| 62 | prev_count=$count |
| 63 | count=$(stat --format="%s" "$TTCN3_PCAP_PATH/$TESTCASE.pcap") |
| 64 | i=$((i+1)) |
| 65 | done |
Harald Welte | e057146 | 2018-02-14 15:42:14 +0100 | [diff] [blame] | 66 | |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 67 | kill_rm_pidfile "$PIDFILE_PCAP" |
| 68 | kill_rm_pidfile "$PIDFILE_NETCAT" |
Vadim Yanitskiy | f949f46 | 2020-07-12 15:49:37 +0700 | [diff] [blame] | 69 | |
Vadim Yanitskiy | eb662c8 | 2020-07-13 05:50:06 +0700 | [diff] [blame] | 70 | gzip -f "$TTCN3_PCAP_PATH/$TESTCASE.pcap" |