blob: 82d3a4fbbc393cc434e9542aa8dda109707b3a7d [file] [log] [blame]
Harald Weltee0571462018-02-14 15:42:14 +01001#!/bin/sh
2
Pau Espin Pedrolad931f22019-10-02 13:00:51 +02003PIDFILE_PCAP=/tmp/pcap.pid
4PIDFILE_NETCAT=/tmp/netcat.pid
arehbeinbc85a322022-11-13 18:46:32 +01005FIFO=/tmp/cmderr
Pau Espin Pedroldada4c52018-02-15 16:07:23 +01006TESTCASE=$1
Neels Hofmeyrdadde172018-06-18 06:18:34 +02007VERDICT="$2"
8
arehbeincf8c4502022-11-13 17:52:48 +01009SUDOSTR=""
10if ! [ "$(id -u)" = "0" ]; then
11 SUDOSTR="sudo -n"
12 # Otherwise, if sudo /usr/bin/kill, sudo /usr/bin/tcpdump cannot be run without a password prompt,
13 # and this script will hang indefinitely
14fi
15
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020016kill_rm_pidfile() {
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020017 # NOTE: This requires you to be root or something like
18 # "laforge ALL=NOPASSWD: /usr/sbin/tcpdump, /bin/kill" in your sudoers file
arehbeine66c1f82022-11-28 22:39:21 +010019 if [ -e "$1" ]; then
20 if [ -s "$1" ]; then
21 $SUDOSTR kill "$(cat "$1")" 2>&1 | grep -v "No such process"
22 fi
arehbeincf8c4502022-11-13 17:52:48 +010023 rm $1
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020024 fi
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020025}
26
Neels Hofmeyrced8acf2019-02-26 05:03:22 +010027date
28
arehbeinbf45a5c2022-11-13 18:48:58 +010029if [ x"$VERDICT" = x"pass" ]; then
Vadim Yanitskiy80726d82022-12-18 20:36:27 +070030 printf "\033[1;32m====== $TESTCASE $VERDICT ======\033[0m\n\n"
arehbeinbf45a5c2022-11-13 18:48:58 +010031else
Vadim Yanitskiy80726d82022-12-18 20:36:27 +070032 printf "\033[1;31m------ $TESTCASE $VERDICT ------\033[0m\n\n"
Neels Hofmeyrdadde172018-06-18 06:18:34 +020033fi
Pau Espin Pedroldada4c52018-02-15 16:07:23 +010034
35if [ "z$TTCN3_PCAP_PATH" = "z" ]; then
36 TTCN3_PCAP_PATH=/tmp
37fi
38
Vadim Yanitskiy23d66652021-11-28 21:41:07 +030039# Order the SUT to print a talloc report
40if [ "z$OSMO_SUT_HOST" != "z" ] && [ "z$OSMO_SUT_PORT" != "z" ]; then
41 if [ -x "$(command -v osmo_interact_vty.py)" ]; then
Oliver Smith9678c222021-12-17 12:04:11 +010042 echo "Saving talloc report from $OSMO_SUT_HOST:$OSMO_SUT_PORT to $TESTCASE.talloc"
43 if ! timeout 5 osmo_interact_vty.py \
Vadim Yanitskiy23d66652021-11-28 21:41:07 +030044 -H $OSMO_SUT_HOST -p $OSMO_SUT_PORT \
45 -c "en; show talloc-context application full" \
Oliver Smith9678c222021-12-17 12:04:11 +010046 > "$TTCN3_PCAP_PATH/$TESTCASE.talloc"; then
47 echo
48 echo "ERROR: failed to get talloc report via vty"
49 echo
50 fi
Vadim Yanitskiy23d66652021-11-28 21:41:07 +030051 else
52 echo "Missing osmo_interact_vty.py from osmo-python-tests!"
53 echo " -> Unable to obtain talloc report from the SUT"
54 fi
55fi
56
Maxe5214452019-03-14 18:15:27 +010057# Wait for up to 2 seconds if we keep receiving traffinc from packet dumper,
Pau Espin Pedroldada4c52018-02-15 16:07:23 +010058# otherwise we might lose last packets from test.
59i=0
60prev_count=-1
61count=$(stat --format="%s" "$TTCN3_PCAP_PATH/$TESTCASE.pcap")
62while [ $count -gt $prev_count ] && [ $i -lt 2 ]
63do
Maxe5214452019-03-14 18:15:27 +010064 echo "Waiting for packet dumper to finish... $i (prev_count=$prev_count, count=$count)"
Pau Espin Pedroldada4c52018-02-15 16:07:23 +010065 sleep 1
66 prev_count=$count
67 count=$(stat --format="%s" "$TTCN3_PCAP_PATH/$TESTCASE.pcap")
68 i=$((i+1))
69done
Harald Weltee0571462018-02-14 15:42:14 +010070
Pau Espin Pedrolad931f22019-10-02 13:00:51 +020071kill_rm_pidfile "$PIDFILE_PCAP"
72kill_rm_pidfile "$PIDFILE_NETCAT"
arehbeinbc85a322022-11-13 18:46:32 +010073rm $FIFO
Vadim Yanitskiyf949f462020-07-12 15:49:37 +070074
Vadim Yanitskiyeb662c82020-07-13 05:50:06 +070075gzip -f "$TTCN3_PCAP_PATH/$TESTCASE.pcap"