11 |
my $debug = 0; |
my $debug = 0; |
12 |
my $quiet = 1; |
my $quiet = 1; |
13 |
my $verbose = 0; |
my $verbose = 0; |
14 |
|
my $credentials = 0; |
15 |
|
|
16 |
my $resend_search_delay = 3; |
my $resend_search_delay = 3; |
17 |
my $tftp_path = '/srv/tftp/'; |
my $tftp_path = '/srv/tftp/'; |
24 |
"verbose!" => \$verbose, |
"verbose!" => \$verbose, |
25 |
"search=i" => \$resend_search_delay, |
"search=i" => \$resend_search_delay, |
26 |
"tftp=s" => \$tftp_path, |
"tftp=s" => \$tftp_path, |
27 |
|
"credentials" => \$credentials, |
28 |
); |
); |
29 |
|
|
30 |
$quiet = 0 if $verbose; |
$quiet = 0 if $verbose; |
40 |
while(<$fh>) { |
while(<$fh>) { |
41 |
chomp; |
chomp; |
42 |
next if /^#/ || /^$/ || /^\s+$/; |
next if /^#/ || /^$/ || /^\s+$/; |
43 |
if (/^\S+\t\S+$/) { |
if (/^\S+\s\S+$/) { |
44 |
push @try_accounts, $_; |
push @try_accounts, $_; |
45 |
} else { |
} else { |
46 |
warn "invalid $passwd_path entry: $_\n"; |
warn "invalid $passwd_path entry: $_\n"; |
106 |
} |
} |
107 |
|
|
108 |
my $ant_passwd; |
my $ant_passwd; |
109 |
|
my $ant_unknown_password; |
110 |
|
my $ant_ok_password; |
111 |
|
my $ant_flashing; |
112 |
|
|
113 |
sub ant_credentials { |
sub ant_credentials { |
114 |
my $ant = shift || die "no ant?"; |
my $ant = shift || die "no ant?"; |
118 |
return ($user_id,$user_pwd); |
return ($user_id,$user_pwd); |
119 |
} |
} |
120 |
|
|
|
my $ant_unknown_password; |
|
|
my $ant_ok_password; |
|
|
|
|
121 |
sub ant_unknown_password { |
sub ant_unknown_password { |
122 |
my $ant = shift || die "no ant?"; |
my $ant = shift || die "no ant?"; |
123 |
if ( $ant_unknown_password->{$ant} ) { |
if ( $ant_unknown_password->{$ant} ) { |
130 |
my $ant = shift || die "no ant?"; |
my $ant = shift || die "no ant?"; |
131 |
|
|
132 |
return 0 if ant_unknown_password( $ant ); |
return 0 if ant_unknown_password( $ant ); |
133 |
|
return 0 if $ant_ok_password->{$ant}; |
134 |
|
|
135 |
$ant_passwd->{$ant}++; |
$ant_passwd->{$ant}++; |
136 |
|
|
143 |
return 1; |
return 1; |
144 |
} |
} |
145 |
|
|
146 |
|
sub forget_ant { |
147 |
|
my $ant = shift || die "no ant?"; |
148 |
|
delete $ant_unknown_password->{$ant}; |
149 |
|
delete $ant_passwd->{$ant}; |
150 |
|
delete $ant_ok_password->{$ant}; |
151 |
|
} |
152 |
|
|
153 |
my $once; |
my $once; |
154 |
|
|
155 |
sub once { |
sub once { |
158 |
print $m if ($once->{$m} == 1); |
print $m if ($once->{$m} == 1); |
159 |
} |
} |
160 |
|
|
161 |
|
my $status = ''; |
162 |
|
|
163 |
|
sub status { |
164 |
|
my $m = join('', @_); |
165 |
|
if ($m ne $status) { |
166 |
|
print $m; |
167 |
|
$status = $m; |
168 |
|
} |
169 |
|
} |
170 |
|
|
171 |
local $SIG{ALRM} = sub { |
local $SIG{ALRM} = sub { |
172 |
mdap_send("ANT-SEARCH MDAP/1.1\r\n"); |
mdap_send("ANT-SEARCH MDAP/1.1\r\n"); |
173 |
alarm( $resend_search_delay ); |
alarm( $resend_search_delay ); |
209 |
} elsif ($type eq 'REPLY-INFO') { |
} elsif ($type eq 'REPLY-INFO') { |
210 |
|
|
211 |
if ( $seq_nr < 0 ) { |
if ( $seq_nr < 0 ) { |
212 |
if ( $ant_ok_password ) { |
# if ( $ant_ok_password ) { |
213 |
$ant_ok_password->{$ant} = 0; |
# $ant_ok_password->{$ant} = 0; |
214 |
} elsif ( ant_another_passwd( $ant ) ) { |
# } elsif ( ant_another_passwd( $ant ) ) { |
215 |
|
if ( ant_another_passwd( $ant ) ) { |
216 |
($user_id,$user_pwd) = ant_credentials( $ant ); |
($user_id,$user_pwd) = ant_credentials( $ant ); |
217 |
mdap_send("INFO MDAP/$mdap_ver\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
mdap_send("INFO MDAP/$mdap_ver\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
218 |
} |
} |
219 |
next; |
next; |
220 |
} else { |
} else { |
221 |
$ant_ok_password->{$ant}++; |
$ant_ok_password->{$ant}++; |
222 |
|
print "$ant credentials $user_id $user_pwd\n" if ($credentials && $ant_ok_password->{$ant} == 1); |
223 |
} |
} |
224 |
|
|
225 |
my $board = $h->{'_BOARD_NAME'} || die "no _BOARD_NAME?"; |
my $board = $h->{'_BOARD_NAME'} || die "no _BOARD_NAME?"; |
235 |
$ant_ok_password->{$ant} ? ' password protected' : |
$ant_ok_password->{$ant} ? ' password protected' : |
236 |
'', |
'', |
237 |
"\n"; |
"\n"; |
238 |
|
$ant_flashing->{$ant} = 0; |
239 |
|
my $waiting = 0; |
240 |
|
my $count = 0; |
241 |
|
map { |
242 |
|
$waiting++ if ($ant_flashing->{$_}); |
243 |
|
$count++; |
244 |
|
} keys %$ant_flashing; |
245 |
|
if ($waiting == 0) { |
246 |
|
status "ALL $count ANTS FLASHED to $build\n"; |
247 |
|
$ant_flashing = undef; |
248 |
|
} else { |
249 |
|
status "$waiting of $count ants still flasing upto $build\n"; |
250 |
|
} |
251 |
} |
} |
252 |
} else { |
} else { |
253 |
once "!! NO FIRMWARE for $board in $tftp_path for ant $ant, skipping update\n"; |
once "!! NO FIRMWARE for $board in $tftp_path for ant $ant, skipping update\n"; |
254 |
} |
} |
255 |
} elsif ( $type eq 'REPLY-EXEC-CLI' && $h->{'SEQ-NR'} == 1 ) { |
} elsif ( $type eq 'REPLY-EXEC-CLI' && $h->{'SEQ-NR'} == 1 ) { |
256 |
print "+ $ant bootp mode re-flash started\n"; |
print "+ $ant bootp mode re-flash started\n" if ($verbose); |
257 |
mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nSEQ-NR:2\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nSEQ-NR:2\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
258 |
$ant_unknown_password->{$ant} = 0; |
forget_ant( $ant ); |
259 |
$ant_passwd->{$ant} = 0; |
$ant_flashing->{$ant}++; |
|
$ant_ok_password->{$ant} = 0; |
|
260 |
} else { |
} else { |
261 |
print "!! reply ignored ", dump( $h ), $/; |
print "!! reply ignored ", dump( $h ), $/; |
262 |
} |
} |