1 |
#!/usr/bin/perl |
#!/usr/bin/perl |
2 |
|
|
3 |
|
use warnings; |
4 |
use strict; |
use strict; |
5 |
use IO::Socket::Multicast; |
use IO::Socket::Multicast; |
6 |
use Data::Dump qw/dump/; |
use Data::Dump qw/dump/; |
7 |
|
use Getopt::Long; |
8 |
|
|
9 |
use constant GROUP => '224.0.0.103'; |
use lib './lib'; |
10 |
use constant PORT => '3235'; |
use MDAP; |
11 |
|
|
12 |
my $debug = shift @ARGV; |
my $GROUP = '224.0.0.103'; |
13 |
|
my $PORT = '3235'; |
14 |
|
|
15 |
my $local_port = 1000; |
#my $debug = 0; # from MDAP |
16 |
|
my $quiet = 1; |
17 |
|
my $verbose = 0; |
18 |
|
my $credentials = 0; |
19 |
|
|
20 |
|
my $plugins = 1; |
21 |
|
|
22 |
my $resend_search_delay = 3; |
my $resend_search_delay = 3; |
23 |
my $tftp_path = '/srv/tftp/'; |
my $tftp_path = '/srv/tftp/'; |
24 |
|
|
25 |
|
my $flashed_cmd = 'system config led=flash'; |
26 |
|
|
27 |
|
GetOptions( |
28 |
|
"port=i" => \$PORT, |
29 |
|
"group=s" => \$GROUP, |
30 |
|
"debug!" => \$debug, |
31 |
|
"quiet!" => \$quiet, |
32 |
|
"verbose!" => \$verbose, |
33 |
|
"search=i" => \$resend_search_delay, |
34 |
|
"tftp=s" => \$tftp_path, |
35 |
|
"credentials" => \$credentials, |
36 |
|
"exec=s" => \$flashed_cmd, |
37 |
|
'plugins!' => \$plugins, |
38 |
|
); |
39 |
|
|
40 |
|
$quiet = 0 if $verbose; |
41 |
|
$credentials = 1 if $debug; |
42 |
|
|
43 |
|
# tab-delimited list of user id/passwd to try on ants |
44 |
|
my @try_accounts = ( "Administrator\t" ); |
45 |
|
|
46 |
|
my $passwd_path = $0; |
47 |
|
$passwd_path =~ s/[^\/]+$/passwd/; |
48 |
|
|
49 |
|
if (-e $passwd_path) { |
50 |
|
open(my $fh, $passwd_path) || die "can't open $passwd_path: $!"; |
51 |
|
while(<$fh>) { |
52 |
|
chomp; |
53 |
|
next if /^#/ || /^$/ || /^\s+$/; |
54 |
|
if (/^\S+\s+\S+$/) { |
55 |
|
push @try_accounts, $_; |
56 |
|
} else { |
57 |
|
warn "invalid $passwd_path entry: $_\n"; |
58 |
|
} |
59 |
|
} |
60 |
|
print "found ", $#try_accounts + 1, " accounts to try on password protected ants", |
61 |
|
$credentials ? " and display credentials" : "", "\n"; |
62 |
|
} |
63 |
|
|
64 |
|
warn "search for ants every ${resend_search_delay}s\ntftp server path: $tftp_path\nflashed to current version: $flashed_cmd\n"; |
65 |
|
|
66 |
sub fw { |
sub fw { |
67 |
my ($board, $offset,$len) = @_; |
my ($board, $offset,$len) = @_; |
68 |
open(my $fh, "$tftp_path/$board") || die "Can't open image $tftp_path/$board: $!"; |
open(my $fh, "$tftp_path/$board") || die "Can't open image $tftp_path/$board: $!"; |
76 |
sub fw_build { |
sub fw_build { |
77 |
my $board_name = shift || return 0; |
my $board_name = shift || return 0; |
78 |
my $v = join('.', unpack('CCCC',fw($board_name,0x20,4)) ); |
my $v = join('.', unpack('CCCC',fw($board_name,0x20,4)) ); |
79 |
print "# fw_build $board_name $v\n"; |
print "# fw_build $board_name $v\n" unless $quiet; |
80 |
return $v; |
return $v; |
81 |
} |
} |
82 |
|
|
85 |
return -e "$tftp_path/$board"; |
return -e "$tftp_path/$board"; |
86 |
} |
} |
87 |
|
|
88 |
my $sock = IO::Socket::Multicast->new(LocalPort=>PORT,ReuseAddr=>1); |
my $sock = IO::Socket::Multicast->new(LocalPort=>$PORT,ReuseAddr=>1); |
89 |
$sock->mcast_add(GROUP) || die "Couldn't set group: $!\n"; |
$sock->mcast_add($GROUP) || die "Couldn't set group: $!\n"; |
90 |
$sock->mcast_ttl(1); |
$sock->mcast_ttl(1); |
91 |
|
|
92 |
sub ant2hash { |
sub ant2hash { |
101 |
return $hash; |
return $hash; |
102 |
} |
} |
103 |
|
|
104 |
|
sub _dump_data { |
105 |
|
my $data = shift; |
106 |
|
$data =~ s/\s+/ /gs; |
107 |
|
return substr($data,0,150); |
108 |
|
} |
109 |
|
|
110 |
sub mdap_send { |
sub mdap_send { |
111 |
my $data = shift; |
my $data = shift; |
112 |
warn ">> $data\n>>----------\n" if ($debug); |
|
113 |
$sock->mcast_send( "${data}", GROUP . ':' . PORT ); |
my $xor = 0; |
114 |
|
map { $xor ^= ord($_) } split(//,$data); |
115 |
|
$data .= sprintf('%02X', $xor); |
116 |
|
|
117 |
|
$sock->mcast_send( $data, "${GROUP}:${PORT}" ); |
118 |
|
if ($debug) { |
119 |
|
warn ">> ${GROUP}:${PORT} >> ", dump( $data ), $/; |
120 |
|
} elsif( ! $quiet ) { |
121 |
|
warn ">> ",_dump_data($data),$/; |
122 |
|
} |
123 |
|
} |
124 |
|
|
125 |
|
my $ant_passwd; |
126 |
|
my $ant_unknown_password; |
127 |
|
my $ant_ok_password; |
128 |
|
my $ant_flashing; |
129 |
|
|
130 |
|
sub ant_credentials { |
131 |
|
my $ant = shift || die "no ant?"; |
132 |
|
my $i = $ant_passwd->{$ant} || 0; |
133 |
|
my ($user_id,$user_pwd) = split(/\t/, $try_accounts[$i]); |
134 |
|
#warn "ant $ant as [$i] $user_id / $user_pwd\n"; |
135 |
|
return ($user_id,$user_pwd); |
136 |
|
} |
137 |
|
|
138 |
|
sub ant_unknown_password { |
139 |
|
my $ant = shift || die "no ant?"; |
140 |
|
if ( $ant_unknown_password->{$ant} ) { |
141 |
|
$ant_unknown_password->{$ant}--; |
142 |
|
} |
143 |
|
return $ant_unknown_password->{$ant}; |
144 |
|
} |
145 |
|
|
146 |
|
sub ant_another_passwd { |
147 |
|
my $ant = shift || die "no ant?"; |
148 |
|
|
149 |
|
return 0 if ant_unknown_password( $ant ); |
150 |
|
return 0 if $ant_ok_password->{$ant}; |
151 |
|
|
152 |
|
$ant_passwd->{$ant}++; |
153 |
|
|
154 |
|
if ( $ant_passwd->{$ant} > $#try_accounts ) { |
155 |
|
print "$ant ant with unknown password\n"; |
156 |
|
$ant_unknown_password->{$ant} = 10; |
157 |
|
$ant_passwd->{$ant} = 0; |
158 |
|
return 0; |
159 |
|
} |
160 |
|
return 1; |
161 |
|
} |
162 |
|
|
163 |
|
sub forget_ant { |
164 |
|
my $ant = shift || die "no ant?"; |
165 |
|
delete $ant_unknown_password->{$ant}; |
166 |
|
delete $ant_passwd->{$ant}; |
167 |
|
delete $ant_ok_password->{$ant}; |
168 |
|
} |
169 |
|
|
170 |
|
my $status = ''; |
171 |
|
|
172 |
|
sub status { |
173 |
|
my $m = join('', @_); |
174 |
|
if ($m ne $status) { |
175 |
|
print $m; |
176 |
|
$status = $m; |
177 |
|
} |
178 |
} |
} |
179 |
|
|
180 |
local $SIG{ALRM} = sub { |
local $SIG{ALRM} = sub { |
181 |
mdap_send("ANT-SEARCH MDAP/1.1\r\n46"); |
mdap_send("ANT-SEARCH MDAP/1.1\r\n"); |
182 |
alarm( $resend_search_delay ); |
alarm( $resend_search_delay ); |
183 |
}; |
}; |
184 |
|
|
185 |
alarm( $resend_search_delay ); |
alarm( $resend_search_delay ); |
186 |
|
|
187 |
mdap_send("ANT-SEARCH MDAP/1.1\r\n46"); |
mdap_send("ANT-SEARCH MDAP/1.1\r\n"); |
188 |
|
|
189 |
while (1) { |
while (1) { |
190 |
my $data; |
my $data; |
191 |
next unless $sock->recv($data,1024); |
next unless $sock->recv($data,1024); |
192 |
|
|
193 |
if ( $data =~ m#^(REPLY-\S+)\s(MDAP/\d+\.\d+)# ) { |
if ( $data =~ m#^(INFO|ANT-SEARCH|EXEC-CLI|REPLY-\S+)\s(MDAP)/(\d+\.\d+)# ) { |
194 |
|
|
195 |
my ($type,$proto) = ($1,$2); |
my ($type,$proto,$mdap_ver) = ($1,$2,$3); |
196 |
|
|
197 |
my $h = ant2hash($data); |
my $h = ant2hash($data); |
198 |
|
|
199 |
my $ant = $h->{'ANT-ID'} || die "no ANT-ID in ", dump( $h ); |
my $client_version = $h->{'MDAP-VERSION'}; |
200 |
|
$mdap_ver = $client_version if ($client_version); |
201 |
|
|
202 |
print "<< $type $proto ", length($data), " bytes\n"; |
# we are getting our own messages (since our source port |
203 |
|
# is same as destination) |
204 |
|
next if ( $type =~ m#^(INFO|ANT-SEARCH|EXEC-CLI)# ); |
205 |
|
|
206 |
warn dump($h),$/ if ($debug); |
print "<< $type $proto/$mdap_ver << ", length($data), " bytes: ",_dump_data($data),$/ unless $quiet; |
207 |
|
|
208 |
|
warn dump( $data, $h ),$/ if ($debug); |
209 |
|
|
210 |
|
my $ant = $h->{'ANT-ID'} || die "no ANT-ID in ", dump( $h ); |
211 |
|
my $seq_nr = $1 if (defined $h->{'SEQ-NR'} && $h->{'SEQ-NR'} =~ m/^(-*\d)+/); |
212 |
|
#warn "SEQ-NR: $seq_nr ok: ",$ant_ok_password->{$ant},"\n" if ($seq_nr); |
213 |
|
|
214 |
|
my ($user_id,$user_pwd) = ant_credentials( $ant ); |
215 |
|
|
216 |
if ($type eq 'REPLY-ANT-SEARCH') { |
if ($type eq 'REPLY-ANT-SEARCH') { |
217 |
mdap_send("INFO MDAP/1.2\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:Administrator\r\nUSER-PWD:\r\n22"); |
mdap_send("INFO MDAP/$mdap_ver\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n") unless ant_unknown_password( $ant ); |
218 |
} elsif ($type eq 'REPLY-INFO') { |
} elsif ($type eq 'REPLY-INFO') { |
219 |
|
|
220 |
|
if ( $seq_nr < 0 ) { |
221 |
|
# if ( $ant_ok_password ) { |
222 |
|
# $ant_ok_password->{$ant} = 0; |
223 |
|
# } elsif ( ant_another_passwd( $ant ) ) { |
224 |
|
if ( ant_another_passwd( $ant ) ) { |
225 |
|
($user_id,$user_pwd) = ant_credentials( $ant ); |
226 |
|
mdap_send("INFO MDAP/$mdap_ver\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
227 |
|
} |
228 |
|
next; |
229 |
|
} else { |
230 |
|
$ant_ok_password->{$ant}++; |
231 |
|
print "$ant credentials $user_id $user_pwd\n" if ( $credentials && $ant_ok_password->{$ant} == 1 ) || $debug; |
232 |
|
} |
233 |
|
|
234 |
my $board = $h->{'_BOARD_NAME'} || die "no _BOARD_NAME?"; |
my $board = $h->{'_BOARD_NAME'} || die "no _BOARD_NAME?"; |
235 |
if ( fw_exists( $board ) ) { |
if ( fw_exists( $board ) ) { |
236 |
if ( $h->{'_BUILD'} ne fw_build( $board ) ) { |
my $build = $h->{'_BUILD'} || die "no _BUILD?"; |
237 |
print "UPDATE STEP 1 on ant $ant\n"; |
my $new_build = fw_build( $board ); |
238 |
mdap_send("EXEC-CLI MDAP/1.2\r\nCLI-CMD:software upgrade\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:Administrator\r\nUSER-PWD:\r\n1F"); |
if ( $build ne $new_build ) { |
239 |
|
print "+ $ant $board version $build -> $new_build\n"; |
240 |
|
mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nCLI-CMD:software upgrade\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
241 |
|
$ant_flashing->{$ant}++; |
242 |
|
next; |
243 |
} else { |
} else { |
244 |
print "OK ant $ant allready updated...\n"; |
once "$ant $board OK version $build", |
245 |
|
$ant_unknown_password->{$ant} ? ' with unknown password' : |
246 |
|
$ant_passwd->{$ant} ? ' password protected' : |
247 |
|
''; |
248 |
|
|
249 |
|
$ant_flashing->{$ant} = 0; |
250 |
|
# green|red|orange|flash|off |
251 |
|
mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nCLI-CMD:$flashed_cmd\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
252 |
|
my $waiting = 0; |
253 |
|
my $count = 0; |
254 |
|
map { |
255 |
|
$waiting++ if ($ant_flashing->{$_}); |
256 |
|
$count++; |
257 |
|
} keys %$ant_flashing; |
258 |
|
if ($waiting == 0) { |
259 |
|
status "ALL $count ANTS FLASHED\n"; |
260 |
|
$ant_flashing = undef; |
261 |
|
} else { |
262 |
|
status "$waiting of $count ants still flasing\n"; |
263 |
|
} |
264 |
|
} |
265 |
|
|
266 |
|
if ( $plugins ) { |
267 |
|
foreach my $plugin ( MDAP->plugins ) { |
268 |
|
warn "## calling $plugin\n" if $debug; |
269 |
|
if ( my $command = $plugin->check( $h ) ) { |
270 |
|
|
271 |
|
warn ">> $plugin $ant $board ", |
272 |
|
$h->{'ANT-NAME'}, " ", |
273 |
|
$h->{'_BUILD'}, " ", |
274 |
|
"\t:$command\n"; |
275 |
|
|
276 |
|
mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nCLI-CMD:$command\r\nSEQ-NR:1\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
277 |
|
last; |
278 |
|
} |
279 |
|
} |
280 |
} |
} |
281 |
|
|
282 |
} else { |
} else { |
283 |
print "!! NO FIRMWARE for $board in $tftp_path for ant $ant, skipping update\n"; |
once "!! NO FIRMWARE for $board in $tftp_path for ant $ant, skipping update"; |
284 |
} |
} |
285 |
} elsif ( $type eq 'REPLY-EXEC-CLI' && $h->{'SEQ-NR'} == 1 ) { |
|
286 |
print "UPDATE STEP 2 on ant $ant\n"; |
} elsif ( $type eq 'REPLY-EXEC-CLI' ) { |
287 |
mdap_send("EXEC-CLI MDAP/1.2\r\nSEQ-NR:2\r\nTO-ANT:$ant\r\nUSER-ID:Administrator\r\nUSER-PWD:\r\n5F"); |
print "##<< $type $seq_nr\n$data\n" if $debug; |
288 |
|
if ( $seq_nr == 1 ) { |
289 |
|
mdap_send("EXEC-CLI MDAP/$mdap_ver\r\nSEQ-NR:2\r\nTO-ANT:$ant\r\nUSER-ID:$user_id\r\nUSER-PWD:$user_pwd\r\n"); |
290 |
|
forget_ant( $ant ) if ( $ant_flashing->{$ant} ); |
291 |
|
} elsif ( $seq_nr < 0 ) { |
292 |
|
warn "EXEC-CLI failed: $data\n"; |
293 |
|
} |
294 |
|
|
295 |
} else { |
} else { |
296 |
print "!! reply ignored ", dump( $h ), $/; |
print "!! reply $type ignored ", dump( $h ), $/; |
297 |
} |
} |
298 |
|
|
299 |
} else { |
} else { |