3 int recv_timeout = 120;
4 int is_from_script = 0;
5 FILE* shell_writer = NULL;
6 FILE* shell_reader = NULL;
8 int main( int argc, char* argv[] ) {
10 /* --------------------------------------------- */
11 /* see if they have a .srfsh.xml in their home directory */
12 char* home = getenv("HOME");
13 int l = strlen(home) + 36;
16 sprintf(fbuf,"%s/.srfsh.xml",home);
18 if(!access(fbuf, R_OK)) {
19 if( ! osrf_system_bootstrap_client(fbuf, "srfsh") ) {
20 fprintf(stderr,"Unable to bootstrap client for requests\n");
21 osrfLogError( OSRF_LOG_MARK, "Unable to bootstrap client for requests");
26 fprintf(stderr,"No Config file found at %s\n", fbuf );
31 /* for now.. the first arg is used as a script file for processing */
33 if( (f = open(argv[1], O_RDONLY)) == -1 ) {
34 osrfLogError( OSRF_LOG_MARK, "Unable to open file %s for reading, exiting...", argv[1]);
38 if(dup2(f, STDIN_FILENO) == -1) {
39 osrfLogError( OSRF_LOG_MARK, "Unable to duplicate STDIN, exiting...");
47 /* --------------------------------------------- */
51 client = osrf_system_get_transport_client();
53 /* open the shell handle */
54 shell_writer = popen( "bash", "w");
55 //shell_reader = popen( "bash", "r");
57 /* main process loop */
59 while((request=readline(prompt))) {
61 if( !strcasecmp(request, "exit") || !strcasecmp(request,"quit"))
64 char* req_copy = strdup(request);
66 parse_request( req_copy );
67 if( request && strlen(request) > 1 ) {
79 if(history_file != NULL )
80 write_history(history_file);
84 osrf_system_shutdown();
88 void sig_child_handler( int s ) {
93 void sig_int_handler( int s ) {
96 signal(SIGINT,sig_int_handler);
102 char* home = getenv("HOME");
103 int l = strlen(home) + 24;
107 sprintf(fbuf,"%s/.srfsh_history",home);
108 history_file = strdup(fbuf);
110 if(!access(history_file, W_OK | R_OK )) {
111 history_length = 999;
112 read_history(history_file);
118 int parse_error( char* words[] ) {
127 memset(buffer, 0, 256);
128 while( (current=words[i++]) ) {
129 strcat(buffer, current);
132 if( ! buffer || strlen(buffer) < 1 )
135 fprintf( stderr, "???: %s\n", buffer );
141 int parse_request( char* request ) {
143 if( request == NULL )
148 char* words[COMMAND_BUFSIZE];
149 memset(words,0,COMMAND_BUFSIZE);
152 char* cur_tok = strtok( req, " " );
154 if( cur_tok == NULL )
157 while(cur_tok != NULL) {
158 words[i++] = cur_tok;
159 cur_tok = strtok( NULL, " " );
163 // not sure why (strtok?), but this is necessary
164 memset( words + i, 0, COMMAND_BUFSIZE - i );
166 /* pass off to the top level command */
167 if( !strcmp(words[0],"router") )
168 ret_val = handle_router( words );
171 else if( !strcmp(words[0],"time") )
172 ret_val = handle_time( words );
175 else if (!strcmp(words[0],"request"))
176 ret_val = handle_request( words, 0 );
178 else if (!strcmp(words[0],"relay"))
179 ret_val = handle_request( words, 1 );
181 else if (!strcmp(words[0],"help"))
182 ret_val = print_help();
184 else if (!strcmp(words[0],"set"))
185 ret_val = handle_set(words);
187 else if (!strcmp(words[0],"print"))
188 ret_val = handle_print(words);
190 else if (!strcmp(words[0],"math_bench"))
191 ret_val = handle_math(words);
193 else if (!strcmp(words[0],"introspect"))
194 ret_val = handle_introspect(words);
196 else if (!strcmp(words[0],"login"))
197 ret_val = handle_login(words);
199 else if (words[0][0] == '!')
200 ret_val = handle_exec( words, 1 );
204 return handle_exec( words, 0 );
206 return parse_error( words );
215 int handle_introspect(char* words[]) {
217 if(words[1] && words[2]) {
218 fprintf(stderr, "--> %s\n", words[1]);
221 sprintf( buf, "request %s opensrf.system.method %s", words[1], words[2] );
222 return parse_request( buf );
227 fprintf(stderr, "--> %s\n", words[1]);
230 sprintf( buf, "request %s opensrf.system.method.all", words[1] );
231 return parse_request( buf );
239 int handle_login( char* words[]) {
241 if( words[1] && words[2]) {
243 char* username = words[1];
244 char* password = words[2];
245 char* type = words[3];
246 char* orgloc = words[4];
247 char* wsid = words[5];
248 int orgloci = (orgloc) ? atoi(orgloc) : 0;
249 int wsidi = (wsid) ? atoi(wsid) : 0;
250 if(!type) type = "opac";
259 "request open-ils.auth open-ils.auth.authenticate.init \"%s\"", username );
263 if(last_result && last_result->_result_content) {
264 jsonObject* r = last_result->_result_content;
265 hash = jsonObjectGetString(r);
269 char* pass_buf = md5sum(password);
272 memset(both_buf,0,256);
273 sprintf(both_buf,"%s%s",hash, pass_buf);
275 char* mess_buf = md5sum(both_buf);
277 sprintf( buf2, "request open-ils.auth open-ils.auth.authenticate.complete "
278 "\"%s\", \"%s\", \"%s\", %d, %d", username, mess_buf, type, orgloci, wsidi );
283 parse_request( buf2 );
285 jsonObject* x = last_result->_result_content;
288 char* authtoken = jsonObjectGetString(
289 jsonObjectGetKey(jsonObjectGetKey(x,"payload"), "authtoken"));
290 authtime = jsonObjectGetNumber(
291 jsonObjectGetKey(jsonObjectGetKey(x,"payload"), "authtime"));
292 if(authtoken) login_session = strdup(authtoken);
293 else login_session = NULL;
295 else login_session = NULL;
297 printf("Login Session: %s. Session timeout: %lf\n", login_session, authtime );
306 int handle_set( char* words[]) {
309 if( (variable=words[1]) ) {
312 if( (val=words[2]) ) {
314 if(!strcmp(variable,"pretty_print")) {
315 if(!strcmp(val,"true")) {
317 printf("pretty_print = true\n");
320 if(!strcmp(val,"false")) {
322 printf("pretty_print = false\n");
327 if(!strcmp(variable,"raw_print")) {
328 if(!strcmp(val,"true")) {
330 printf("raw_print = true\n");
333 if(!strcmp(val,"false")) {
335 printf("raw_print = false\n");
347 int handle_print( char* words[]) {
350 if( (variable=words[1]) ) {
351 if(!strcmp(variable,"pretty_print")) {
353 printf("pretty_print = true\n");
356 printf("pretty_print = false\n");
361 if(!strcmp(variable,"login")) {
362 printf("login session = %s\n", login_session );
370 int handle_router( char* words[] ) {
378 if( !strcmp(words[1],"query") ) {
380 if( words[2] && !strcmp(words[2],"servers") ) {
381 for(i=3; i < COMMAND_BUFSIZE - 3 && words[i]; i++ ) {
382 router_query_servers( words[i] );
394 /* if new shell, spawn a new child and subshell to do the work,
395 otherwise pipe the request to the currently open (piped) shell */
396 int handle_exec(char* words[], int new_shell) {
398 if(!words[0]) return 0;
400 if( words[0] && words[0][0] == '!') {
401 int len = strlen(words[0]);
403 memset(command,0,len);
405 int i; /* chop out the ! */
406 for( i=1; i!= len; i++) {
407 command[i-1] = words[0][i];
411 words[0] = strdup(command);
415 signal(SIGCHLD, sig_child_handler);
421 signal(SIGCHLD,sig_child_handler);
426 execvp( words[0], words );
433 growing_buffer* b = buffer_init(64);
436 buffer_fadd( b, "%s ", words[i++] );
438 buffer_add( b, "\n");
441 //int reader = dup2(STDOUT_FILENO, reader);
442 //int reader = dup(STDOUT_FILENO);
443 //close(STDOUT_FILENO);
445 fprintf( shell_writer, b->buf );
448 fflush(shell_writer);
454 read( reader, c, 4095 );
455 fprintf(stderr, "read %s", c);
456 dup2(reader, STDOUT_FILENO);
466 int handle_request( char* words[], int relay ) {
472 char* server = words[1];
473 char* method = words[2];
475 growing_buffer* buffer = NULL;
477 buffer = buffer_init(128);
478 buffer_add(buffer, "[");
479 for(i = 3; words[i] != NULL; i++ ) {
480 /* removes trailing semicolon if user accidentally enters it */
481 if( words[i][strlen(words[i])-1] == ';' )
482 words[i][strlen(words[i])-1] = '\0';
483 buffer_add( buffer, words[i] );
484 buffer_add(buffer, " ");
486 buffer_add(buffer, "]");
489 return send_request( server, method, buffer, relay );
495 int send_request( char* server,
496 char* method, growing_buffer* buffer, int relay ) {
497 if( server == NULL || method == NULL )
500 jsonObject* params = NULL;
502 if( buffer != NULL && buffer->n_used > 0 )
503 params = json_parse_string(buffer->buf);
505 if(!last_result || ! last_result->_result_content) {
506 printf("We're not going to call 'relay' with no result params\n");
510 jsonObject* o = jsonNewObject(NULL);
511 jsonObjectPush(o, last_result->_result_content );
517 if(buffer->n_used > 0 && params == NULL) {
518 fprintf(stderr, "JSON error detected, not executing\n");
522 osrf_app_session* session = osrf_app_client_session_init(server);
524 if(!osrf_app_session_connect(session)) {
525 osrfLogWarning( OSRF_LOG_MARK, "Unable to connect to remote service %s\n", server );
529 double start = get_timestamp_millis();
530 //int req_id = osrf_app_session_make_request( session, params, method, 1, NULL );
531 int req_id = osrf_app_session_make_req( session, params, method, 1, NULL );
534 osrf_message* omsg = osrf_app_session_request_recv( session, req_id, recv_timeout );
537 printf("\nReceived no data from server\n");
540 signal(SIGPIPE, SIG_IGN);
543 if(!is_from_script) less = popen( "less -EX", "w");
546 if( less == NULL ) { less = stdout; }
548 growing_buffer* resp_buffer = buffer_init(4096);
554 if(omsg->_result_content) {
556 osrf_message_free(last_result);
561 if( pretty_print && omsg->_result_content ) {
562 char* j = jsonObjectToJSON(omsg->_result_content);
563 //content = json_printer(j);
564 content = jsonFormatString(j);
567 content = jsonObjectGetString(omsg->_result_content);
569 printf( "\nReceived Data: %s\n", content );
576 sprintf( code, "%d", omsg->status_code );
577 buffer_add( resp_buffer, code );
579 printf( "\nReceived Exception:\nName: %s\nStatus: %s\nStatus: %s\n",
580 omsg->status_name, omsg->status_text, code );
587 if(omsg->_result_content) {
589 osrf_message_free(last_result);
594 if( pretty_print && omsg->_result_content ) {
595 char* j = jsonObjectToJSON(omsg->_result_content);
596 //content = json_printer(j);
597 content = jsonFormatString(j);
600 content = jsonObjectGetString(omsg->_result_content);
602 buffer_add( resp_buffer, "\nReceived Data: " );
603 buffer_add( resp_buffer, content );
604 buffer_add( resp_buffer, "\n" );
609 buffer_add( resp_buffer, "\nReceived Exception:\nName: " );
610 buffer_add( resp_buffer, omsg->status_name );
611 buffer_add( resp_buffer, "\nStatus: " );
612 buffer_add( resp_buffer, omsg->status_text );
613 buffer_add( resp_buffer, "\nStatus: " );
616 sprintf( code, "%d", omsg->status_code );
617 buffer_add( resp_buffer, code );
622 omsg = osrf_app_session_request_recv( session, req_id, recv_timeout );
626 double end = get_timestamp_millis();
628 fprintf( less, resp_buffer->buf );
629 buffer_free( resp_buffer );
630 fprintf( less, "\n------------------------------------\n");
631 if( osrf_app_session_request_complete( session, req_id ))
632 fprintf(less, "Request Completed Successfully\n");
635 fprintf(less, "Request Time in seconds: %.6f\n", end - start );
636 fprintf(less, "------------------------------------\n");
640 osrf_app_session_request_finish( session, req_id );
641 osrf_app_session_disconnect( session );
642 osrf_app_session_destroy( session );
651 int handle_time( char* words[] ) {
658 printf( "%s\n", buf );
663 time_t epoch = (time_t)atoi( words[1] );
664 char* localtime = strdup( ctime( &epoch ) );
665 printf( "%s => %s", words[1], localtime );
677 int router_query_servers( char* router_server ) {
679 if( ! router_server || strlen(router_server) == 0 )
684 sprintf(rbuf,"router@%s/router", router_server );
686 transport_message* send =
687 message_init( "servers", NULL, NULL, rbuf, NULL );
688 message_set_router_info( send, NULL, NULL, NULL, "query", 0 );
690 client_send_message( client, send );
691 message_free( send );
693 transport_message* recv = client_recv( client, -1 );
695 fprintf(stderr, "NULL message received from router\n");
700 "---------------------------------------------------------------------------------\n"
701 "Received from 'server' query on %s\n"
702 "---------------------------------------------------------------------------------\n"
703 "original reg time | latest reg time | last used time | class | server\n"
704 "---------------------------------------------------------------------------------\n"
706 "---------------------------------------------------------------------------------\n"
707 , router_server, recv->body );
709 message_free( recv );
717 "---------------------------------------------------------------------------------\n"
719 "---------------------------------------------------------------------------------\n"
720 "help - Display this message\n"
721 "!<command> [args] - Forks and runs the given command in the shell\n"
722 "time - Prints the current time\n"
723 "time <timestamp> - Formats seconds since epoch into readable format\n"
724 "set <variable> <value> - set a srfsh variable (e.g. set pretty_print true )\n"
725 "print <variable> - Displays the value of a srfsh variable\n"
726 "---------------------------------------------------------------------------------\n"
728 "router query servers <server1 [, server2, ...]>\n"
729 " - Returns stats on connected services\n"
732 "request <service> <method> [ <json formatted string of params> ]\n"
733 " - Anything passed in will be wrapped in a json array,\n"
734 " so add commas if there is more than one param\n"
737 "relay <service> <method>\n"
738 " - Performs the requested query using the last received result as the param\n"
741 "math_bench <num_batches> [0|1|2]\n"
742 " - 0 means don't reconnect, 1 means reconnect after each batch of 4, and\n"
743 " 2 means reconnect after every request\n"
745 "introspect <service>\n"
746 " - prints the API for the service\n"
749 "---------------------------------------------------------------------------------\n"
750 " Commands for Open-ILS\n"
751 "---------------------------------------------------------------------------------\n"
752 "login <username> <password>\n"
753 " - Logs into the 'server' and displays the session id\n"
754 " - To view the session id later, enter: print login\n"
755 "---------------------------------------------------------------------------------\n"
758 "Note: long output is piped through 'less'. To search in 'less', type: /<search>\n"
759 "---------------------------------------------------------------------------------\n"
768 char* tabs(int count) {
769 growing_buffer* buf = buffer_init(24);
771 for(i=0;i!=count;i++)
772 buffer_add(buf, " ");
774 char* final = buffer_data( buf );
779 int handle_math( char* words[] ) {
781 return do_math( atoi(words[1]), 0 );
786 int do_math( int count, int style ) {
788 osrf_app_session* session = osrf_app_client_session_init( "opensrf.math" );
790 jsonObject* params = json_parse_string("[]");
791 jsonObjectPush(params,jsonNewObject("1"));
792 jsonObjectPush(params,jsonNewObject("2"));
794 char* methods[] = { "add", "sub", "mult", "div" };
795 char* answers[] = { "3", "-1", "2", "0.500000" };
797 float times[ count * 4 ];
798 memset(times,0,count*4);
801 for(k=0;k!=100;k++) {
808 fprintf(stderr,"\n\n");
812 for(i=0; i!= count; i++) {
815 for(j=0; j != 4; j++) {
819 double start = get_timestamp_millis();
820 int req_id = osrf_app_session_make_req( session, params, methods[j], 1, NULL );
821 osrf_message* omsg = osrf_app_session_request_recv( session, req_id, 5 );
822 double end = get_timestamp_millis();
824 times[(4*i) + j] = end - start;
828 if(omsg->_result_content) {
829 char* jsn = jsonObjectToJSON(omsg->_result_content);
830 if(!strcmp(jsn, answers[j]))
831 fprintf(stderr, "+");
833 fprintf(stderr, "\n![%s] - should be %s\n", jsn, answers[j] );
838 osrf_message_free(omsg);
840 } else { fprintf( stderr, "\nempty message for tt: %d\n", req_id ); }
842 osrf_app_session_request_finish( session, req_id );
845 osrf_app_session_disconnect( session );
848 fprintf(stderr,"\n");
852 osrf_app_session_disconnect( session );
855 osrf_app_session_destroy( session );
856 jsonObjectFree(params);
860 for(c=0; c!= count*4; c++)
863 float avg = total / (count*4);
864 fprintf(stderr, "\n Average round trip time: %f\n", avg );