osmo-ttcn3-hacks/ttcn3-tcpdump-stop.sh

76 lines
2.0 KiB
Bash
Raw Permalink Normal View History

#!/bin/sh
PIDFILE_PCAP=/tmp/pcap.pid
PIDFILE_NETCAT=/tmp/netcat.pid
FIFO=/tmp/cmderr
TESTCASE=$1
VERDICT="$2"
SUDOSTR=""
if ! [ "$(id -u)" = "0" ]; then
SUDOSTR="sudo -n"
# Otherwise, if sudo /usr/bin/kill, sudo /usr/bin/tcpdump cannot be run without a password prompt,
# and this script will hang indefinitely
fi
kill_rm_pidfile() {
# NOTE: This requires you to be root or something like
# "laforge ALL=NOPASSWD: /usr/sbin/tcpdump, /bin/kill" in your sudoers file
if [ -e "$1" ]; then
if [ -s "$1" ]; then
$SUDOSTR kill "$(cat "$1")" 2>&1 | grep -v "No such process"
fi
rm $1
fi
}
date
if [ x"$VERDICT" = x"pass" ]; then
printf "\033[1;32m====== $TESTCASE $VERDICT ======\033[0m\n\n"
else
printf "\033[1;31m------ $TESTCASE $VERDICT ------\033[0m\n\n"
fi
if [ "z$TTCN3_PCAP_PATH" = "z" ]; then
TTCN3_PCAP_PATH=/tmp
fi
# Order the SUT to print a talloc report
if [ "z$OSMO_SUT_HOST" != "z" ] && [ "z$OSMO_SUT_PORT" != "z" ]; then
if [ -x "$(command -v osmo_interact_vty.py)" ]; then
echo "Saving talloc report from $OSMO_SUT_HOST:$OSMO_SUT_PORT to $TESTCASE.talloc"
if ! timeout 5 osmo_interact_vty.py \
-H $OSMO_SUT_HOST -p $OSMO_SUT_PORT \
-c "en; show talloc-context application full" \
> "$TTCN3_PCAP_PATH/$TESTCASE.talloc"; then
echo
echo "ERROR: failed to get talloc report via vty"
echo
fi
else
echo "Missing osmo_interact_vty.py from osmo-python-tests!"
echo " -> Unable to obtain talloc report from the SUT"
fi
fi
# Wait for up to 2 seconds if we keep receiving traffinc from packet dumper,
# otherwise we might lose last packets from test.
i=0
prev_count=-1
count=$(stat --format="%s" "$TTCN3_PCAP_PATH/$TESTCASE.pcap")
while [ $count -gt $prev_count ] && [ $i -lt 2 ]
do
echo "Waiting for packet dumper to finish... $i (prev_count=$prev_count, count=$count)"
sleep 1
prev_count=$count
count=$(stat --format="%s" "$TTCN3_PCAP_PATH/$TESTCASE.pcap")
i=$((i+1))
done
kill_rm_pidfile "$PIDFILE_PCAP"
kill_rm_pidfile "$PIDFILE_NETCAT"
rm $FIFO
gzip -f "$TTCN3_PCAP_PATH/$TESTCASE.pcap"