--- mdap-server.pl 2007/04/23 23:32:49 25 +++ mdap-server.pl 2007/11/18 01:29:04 67 @@ -1,20 +1,29 @@ #!/usr/bin/perl +use warnings; use strict; use IO::Socket::Multicast; use Data::Dump qw/dump/; use Getopt::Long; +use lib './lib'; +use MDAP; + my $GROUP = '224.0.0.103'; my $PORT = '3235'; -my $debug = 0; +#my $debug = 0; # from MDAP my $quiet = 1; my $verbose = 0; +my $credentials = 0; + +my $plugins = 1; my $resend_search_delay = 3; my $tftp_path = '/srv/tftp/'; +my $flashed_cmd = 'system config led=flash'; + GetOptions( "port=i" => \$PORT, "group=s" => \$GROUP, @@ -23,9 +32,13 @@ "verbose!" => \$verbose, "search=i" => \$resend_search_delay, "tftp=s" => \$tftp_path, + "credentials" => \$credentials, + "exec=s" => \$flashed_cmd, + 'plugins!' => \$plugins, ); $quiet = 0 if $verbose; +$credentials = 1 if $debug; # tab-delimited list of user id/passwd to try on ants my @try_accounts = ( "Administrator\t" ); @@ -38,16 +51,17 @@ while(<$fh>) { chomp; next if /^#/ || /^$/ || /^\s+$/; - if (/^\S+\t\S+$/) { + if (/^\S+\s+\S+$/) { push @try_accounts, $_; } else { warn "invalid $passwd_path entry: $_\n"; } } - print "found ", $#try_accounts + 1, " accounts to try on password protected ants\n"; + print "found ", $#try_accounts + 1, " accounts to try on password protected ants", + $credentials ? " and display credentials" : "", "\n"; } -warn "search for ants every ${resend_search_delay}s\ntftp server path: $tftp_path\n"; +warn "search for ants every ${resend_search_delay}s\ntftp server path: $tftp_path\nflashed to current version: $flashed_cmd\n"; sub fw { my ($board, $offset,$len) = @_; @@ -96,7 +110,7 @@ $sock->mcast_send( $data, "${GROUP}:${PORT}" ); if ($debug) { - warn ">> ", dump( $data ), $/; + warn ">> ${GROUP}:${PORT} >> ", dump( $data ), $/; } elsif( ! $quiet ) { $data =~ s/\s+/ /gi; warn ">> ", substr($data,0,70), $/; @@ -104,6 +118,9 @@ } my $ant_passwd; +my $ant_unknown_password; +my $ant_ok_password; +my $ant_flashing; sub ant_credentials { my $ant = shift || die "no ant?"; @@ -113,9 +130,6 @@ return ($user_id,$user_pwd); } -my $ant_unknown_password; -my $ant_ok_password; - sub ant_unknown_password { my $ant = shift || die "no ant?"; if ( $ant_unknown_password->{$ant} ) { @@ -128,24 +142,34 @@ my $ant = shift || die "no ant?"; return 0 if ant_unknown_password( $ant ); + return 0 if $ant_ok_password->{$ant}; $ant_passwd->{$ant}++; if ( $ant_passwd->{$ant} > $#try_accounts ) { print "$ant ant with unknown password\n"; - $ant_unknown_password->{$ant} = 60; + $ant_unknown_password->{$ant} = 10; $ant_passwd->{$ant} = 0; return 0; } return 1; } -my $once; +sub forget_ant { + my $ant = shift || die "no ant?"; + delete $ant_unknown_password->{$ant}; + delete $ant_passwd->{$ant}; + delete $ant_ok_password->{$ant}; +} -sub once { +my $status = ''; + +sub status { my $m = join('', @_); - $once->{$m}++; - print $m if ($once->{$m} == 1); + if ($m ne $status) { + print $m; + $status = $m; + } } local $SIG{ALRM} = sub { @@ -172,14 +196,14 @@ print "<< $type $proto/$mdap_ver << ", length($data), " bytes\n" unless $quiet; - warn dump($h),$/ if ($debug); + warn dump( $data, $h ),$/ if ($debug); # we are getting our own messages (since our source port # is same as destination) next if ( $type =~ m#^(INFO|ANT-SEARCH|EXEC-CLI)# ); my $ant = $h->{'ANT-ID'} || die "no ANT-ID in ", dump( $h ); - my $seq_nr = $h->{'SEQ-NR'}; + my $seq_nr = $1 if (defined $h->{'SEQ-NR'} && $h->{'SEQ-NR'} =~ m/^-*(\d)+/); #warn "SEQ-NR: $seq_nr ok: ",$ant_ok_password->{$ant},"\n" if ($seq_nr); my ($user_id,$user_pwd) = ant_credentials( $ant ); @@ -189,15 +213,17 @@ } elsif ($type eq 'REPLY-INFO') { if ( $seq_nr < 0 ) { - if ( $ant_ok_password ) { - $ant_ok_password->{$ant} = 0; - } elsif ( ant_another_passwd( $ant ) ) { +# if ( $ant_ok_password ) { +# $ant_ok_password->{$ant} = 0; +# } elsif ( ant_another_passwd( $ant ) ) { + if ( ant_another_passwd( $ant ) ) { ($user_id,$user_pwd) = ant_credentials( $ant ); mdap_send("INFO MDAP/$mdap_ver\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); } next; } else { $ant_ok_password->{$ant}++; + print "$ant credentials $user_id $user_pwd\n" if ( $credentials && $ant_ok_password->{$ant} == 1 ) || $debug; } my $board = $h->{'_BOARD_NAME'} || die "no _BOARD_NAME?"; @@ -207,24 +233,62 @@ if ( $build ne $new_build ) { print "+ $ant version $build -> $new_build\n"; mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nCLI-CMD:software upgrade\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); + $ant_flashing->{$ant}++; + next; } else { once "$ant OK version $build", $ant_unknown_password->{$ant} ? ' with unknown password' : - $ant_ok_password->{$ant} ? ' password protected' : - '', - "\n"; + $ant_passwd->{$ant} ? ' password protected' : + ''; + + $ant_flashing->{$ant} = 0; + # green|red|orange|flash|off + mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nCLI-CMD:$flashed_cmd\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); + my $waiting = 0; + my $count = 0; + map { + $waiting++ if ($ant_flashing->{$_}); + $count++; + } keys %$ant_flashing; + if ($waiting == 0) { + status "ALL $count ANTS FLASHED to $build\n"; + $ant_flashing = undef; + } else { + status "$waiting of $count ants still flasing upto $build\n"; + } + } + + if ( $plugins ) { + foreach my $plugin ( MDAP->plugins ) { + warn "## calling $plugin\n" if $debug; + if ( my $command = $plugin->check( $h ) ) { + + warn ">> $plugin $ant ", + $h->{'ANT-NAME'}, " ", + $h->{'_BUILD'}, " ", + "\t:$command\n"; + + mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nCLI-CMD:$command\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); + last; + } + } } + } else { - once "!! NO FIRMWARE for $board in $tftp_path for ant $ant, skipping update\n"; + once "!! NO FIRMWARE for $board in $tftp_path for ant $ant, skipping update"; } - } elsif ( $type eq 'REPLY-EXEC-CLI' && $h->{'SEQ-NR'} == 1 ) { - print "+ $ant bootp mode re-flash started\n"; + + } elsif ( $type eq 'REPLY-EXEC-CLI' ) { + print "##<< $type\n$data\n" if $debug; + if ( $seq_nr == 1 ) { mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nSEQ-NR:2\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); - $ant_unknown_password->{$ant} = 0; - $ant_passwd->{$ant} = 0; - $ant_ok_password->{$ant} = 0; + forget_ant( $ant ) if ( $ant_flashing->{$ant} ); + } elsif ( $seq_nr < 0 ) { + warn "EXEC-CLI failed: $data\n"; + } + } else { - print "!! reply ignored ", dump( $h ), $/; + print "!! reply $type ignored ", dump( $h ), $/; } } else {