
See script directory for method. The script to run in the top level MaxScale directory is called maxscale-uncrustify.sh, which uses another script, list-src, from the same directory (so you need to set your PATH). The uncrustify version was 0.66.
301 lines
7.0 KiB
C++
301 lines
7.0 KiB
C++
#include <iostream>
|
|
#include <unistd.h>
|
|
#include "testconnections.h"
|
|
|
|
#include <stdio.h>
|
|
#include <sys/socket.h>
|
|
#include <arpa/inet.h>
|
|
#include <stdlib.h>
|
|
#include <netdb.h>
|
|
#include <string.h>
|
|
|
|
#include <openssl/sha.h>
|
|
#include "maxinfo_func.h"
|
|
#include <sys/epoll.h>
|
|
#include <jansson.h>
|
|
#include <fcntl.h>
|
|
|
|
using namespace std;
|
|
|
|
#define PORT 8080
|
|
#define USERAGENT "HTMLGET 1.1"
|
|
|
|
int create_tcp_socket()
|
|
{
|
|
int sock;
|
|
if ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0)
|
|
{
|
|
perror("Can't create TCP socket");
|
|
return 0;
|
|
}
|
|
return sock;
|
|
}
|
|
|
|
char* get_ip(char* host)
|
|
{
|
|
struct hostent* hent;
|
|
int iplen = 16; // XXX.XXX.XXX.XXX
|
|
char* ip = (char*)malloc(iplen + 1);
|
|
memset(ip, 0, iplen + 1);
|
|
if ((hent = gethostbyname(host)) == NULL)
|
|
{
|
|
herror("Can't get IP");
|
|
return NULL;
|
|
}
|
|
if (inet_ntop(AF_INET, (void*)hent->h_addr_list[0], ip, iplen) == NULL)
|
|
{
|
|
perror("Can't resolve host");
|
|
return NULL;
|
|
}
|
|
return ip;
|
|
}
|
|
|
|
char* build_get_query(char* host, const char* page)
|
|
{
|
|
char* query;
|
|
const char* getpage = page;
|
|
char* tpl = (char*) "GET /%s HTTP/1.1\r\nHost: %s\r\nUser-Agent: %s\r\n\r\n";
|
|
if (getpage[0] == '/')
|
|
{
|
|
getpage = getpage + 1;
|
|
fprintf(stderr, "Removing leading \"/\", converting %s to %s\n", page, getpage);
|
|
}
|
|
// -5 is to consider the %s %s %s in tpl and the ending \0
|
|
query = (char*)malloc(strlen(host) + strlen(getpage) + strlen(USERAGENT) + strlen(tpl) - 5);
|
|
sprintf(query, tpl, getpage, host, USERAGENT);
|
|
return query;
|
|
}
|
|
|
|
char* get_maxinfo(const char* page, TestConnections* Test)
|
|
{
|
|
struct sockaddr_in* remote;
|
|
int sock;
|
|
int tmpres;
|
|
char* ip;
|
|
char* get;
|
|
char buf[BUFSIZ + 1];
|
|
|
|
sock = create_tcp_socket();
|
|
ip = get_ip(Test->maxscales->IP[0]);
|
|
if (ip == NULL)
|
|
{
|
|
Test->add_result(1, "Can't get IP\n");
|
|
return NULL;
|
|
}
|
|
remote = (struct sockaddr_in*)malloc(sizeof(struct sockaddr_in*));
|
|
remote->sin_family = AF_INET;
|
|
tmpres = inet_pton(AF_INET, ip, (void*)(&(remote->sin_addr.s_addr)));
|
|
if (tmpres < 0)
|
|
{
|
|
Test->add_result(1, "Can't set remote->sin_addr.s_addr\n");
|
|
return NULL;
|
|
}
|
|
else if (tmpres == 0)
|
|
{
|
|
Test->add_result(1, "%s is not a valid IP address\n", ip);
|
|
return NULL;
|
|
}
|
|
remote->sin_port = htons(PORT);
|
|
|
|
if (connect(sock, (struct sockaddr*)remote, sizeof(struct sockaddr)) < 0)
|
|
{
|
|
Test->add_result(1, "Could not connect\n");
|
|
return NULL;
|
|
}
|
|
get = build_get_query(Test->maxscales->IP[0], page);
|
|
// Test->tprintf("Query is:\n<<START>>\n%s<<END>>\n", get);
|
|
|
|
// Send the query to the server
|
|
size_t sent = 0;
|
|
while (sent < strlen(get))
|
|
{
|
|
tmpres = send(sock, get + sent, strlen(get) - sent, 0);
|
|
if (tmpres == -1)
|
|
{
|
|
Test->add_result(1, "Can't send query\n");
|
|
return NULL;
|
|
}
|
|
sent += tmpres;
|
|
}
|
|
// now it is time to receive the page
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
char* result = (char*)calloc(BUFSIZ, sizeof(char));
|
|
size_t rsize = sizeof(buf);
|
|
while ((tmpres = recv(sock, buf, BUFSIZ, MSG_WAITALL)) > 0)
|
|
{
|
|
result = (char*)realloc(result, tmpres + rsize);
|
|
rsize += tmpres;
|
|
strcat(result, buf);
|
|
memset(buf, 0, tmpres);
|
|
}
|
|
if (tmpres < 0)
|
|
{
|
|
Test->add_result(1, "Error receiving data\n");
|
|
return NULL;
|
|
}
|
|
|
|
free(get);
|
|
free(remote);
|
|
free(ip);
|
|
close(sock);
|
|
|
|
char* content = strstr(result, "[");
|
|
if (content == NULL)
|
|
{
|
|
Test->add_result(1, "Content not found\n");
|
|
free(result);
|
|
return NULL;
|
|
}
|
|
|
|
char* ret_content = (char*) calloc(strlen(content) + 1, sizeof(char));
|
|
mempcpy(ret_content, content, strlen(content));
|
|
free(result);
|
|
|
|
return ret_content;
|
|
// return(result);
|
|
}
|
|
|
|
char* read_sc(int sock)
|
|
{
|
|
char buf[BUFSIZ + 1];
|
|
int tmpres;
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
char* result = (char*)calloc(BUFSIZ, sizeof(char));
|
|
size_t rsize = sizeof(buf);
|
|
while ((tmpres = recv(sock, buf, BUFSIZ, 0)) > 0)
|
|
{
|
|
result = (char*)realloc(result, tmpres + rsize);
|
|
rsize += tmpres;
|
|
// printf("%s", buf);
|
|
strcat(result, buf);
|
|
memset(buf, 0, tmpres);
|
|
}
|
|
return result;
|
|
}
|
|
int send_so(int sock, char* data)
|
|
{
|
|
int tmpres;
|
|
size_t sent = 0;
|
|
while (sent < strlen(data))
|
|
{
|
|
tmpres = send(sock, data + sent, strlen(data) - sent, 0);
|
|
if (tmpres == -1)
|
|
{
|
|
return -1;
|
|
}
|
|
sent += tmpres;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static char* bin2hex(const unsigned char* old, const size_t oldlen)
|
|
{
|
|
char* result = (char*) malloc(oldlen * 2 + 1);
|
|
size_t i, j;
|
|
|
|
for (i = j = 0; i < oldlen; i++)
|
|
{
|
|
result[j++] = hexconvtab[old[i] >> 4];
|
|
result[j++] = hexconvtab[old[i] & 15];
|
|
}
|
|
result[j] = '\0';
|
|
return result;
|
|
}
|
|
|
|
char* cdc_auth_srt(char* user, char* password)
|
|
{
|
|
unsigned char sha1pass[20];
|
|
char* str;
|
|
str = (char*) malloc(42 + strlen(user) * 2);
|
|
|
|
unsigned char* password_u;
|
|
unsigned char* user_u;
|
|
password_u = (unsigned char*) malloc(strlen(password));
|
|
user_u = (unsigned char*) malloc(strlen(user));
|
|
memcpy((void*)password_u, (void*)password, strlen(password));
|
|
memcpy((void*)user_u, (void*)user, strlen(user));
|
|
|
|
SHA1(password_u, strlen(password), sha1pass);
|
|
|
|
// char * sha1pass_hex = (char *) "454ac34c2999aacfebc6bf5fe9fa1db9b596f625";
|
|
|
|
char* sha1pass_hex = bin2hex(sha1pass, 20);
|
|
printf("password %s, len %lu, password sha1: %s\n", password, strlen(password), sha1pass_hex);
|
|
|
|
|
|
char* user_hex = bin2hex(user_u, strlen(user));
|
|
char* clmn_hex = bin2hex((unsigned char*)":", 1);
|
|
|
|
sprintf(str, "%s%s%s", user_hex, clmn_hex, sha1pass_hex);
|
|
|
|
free(clmn_hex);
|
|
free(user_hex);
|
|
free(sha1pass_hex);
|
|
free(user_u);
|
|
free(password_u);
|
|
|
|
printf("%s\n", str);
|
|
return str;
|
|
}
|
|
|
|
int setnonblocking(int sock)
|
|
{
|
|
int opts;
|
|
opts = fcntl(sock, F_GETFL);
|
|
if (opts < 0)
|
|
{
|
|
return -1;
|
|
}
|
|
opts = (opts | O_NONBLOCK);
|
|
if (fcntl(sock, F_SETFL, opts) < 0)
|
|
{
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
int get_x_fl_from_json(char* line, long long int* x1, long long int* fl)
|
|
{
|
|
json_t* root;
|
|
json_error_t error;
|
|
|
|
root = json_loads(line, 0, &error);
|
|
if (!root)
|
|
{
|
|
fprintf(stderr, "error: on line %d: %s\n", error.line, error.text);
|
|
return 1;
|
|
}
|
|
|
|
json_t* x_json = json_object_get(root, "x1");
|
|
if (x_json == NULL)
|
|
{
|
|
return 1;
|
|
}
|
|
if (!json_is_integer(x_json))
|
|
{
|
|
printf("x1 is not int, type is %d\n", json_typeof(x_json));
|
|
return 1;
|
|
}
|
|
|
|
*x1 = json_integer_value(x_json);
|
|
json_t* fl_json = json_object_get(root, "fl");
|
|
if (fl_json == NULL)
|
|
{
|
|
return 1;
|
|
}
|
|
if (!json_is_integer(fl_json))
|
|
{
|
|
printf("fl is not int\n");
|
|
return 1;
|
|
}
|
|
|
|
*fl = json_integer_value(fl_json);
|
|
json_decref(x_json);
|
|
json_decref(fl_json);
|
|
json_decref(root);
|
|
return 0;
|
|
}
|