3 int is_from_script = 0;
4 FILE* shell_writer = NULL;
5 FILE* shell_reader = NULL;
7 int main( int argc, char* argv[] ) {
11 /* --------------------------------------------- */
12 /* see if they have a .srfsh.xml in their home directory */
13 char* home = getenv("HOME");
14 int l = strlen(home) + 36;
17 sprintf(fbuf,"%s/.srfsh.xml",home);
19 if(!access(fbuf, R_OK)) {
20 if( ! osrf_system_bootstrap_client(fbuf) )
21 fatal_handler( "Unable to bootstrap client for requests");
24 fatal_handler( "No Config file found at %s", fbuf );
28 /* for now.. the first arg is used as a script file for processing */
30 if( (f = open(argv[1], O_RDONLY)) == -1 )
31 fatal_handler("Unable to open file %s for reading, exiting...", argv[1]);
33 if(dup2(f, STDIN_FILENO) == -1)
34 fatal_handler("Unable to duplicate STDIN, exiting...");
40 /* --------------------------------------------- */
44 client = osrf_system_get_transport_client();
46 /* open the shell handle */
47 shell_writer = popen( "bash", "w");
48 //shell_reader = popen( "bash", "r");
50 /* main process loop */
52 while((request=readline(prompt))) {
54 if( !strcmp(request, "exit") || !strcmp(request,"quit"))
57 char* req_copy = strdup(request);
59 parse_request( req_copy );
60 if( request && strlen(request) > 1 ) {
72 if(history_file != NULL )
73 write_history(history_file);
75 client_disconnect( client );
76 client_free( client );
83 void sig_child_handler( int s ) {
88 void sig_int_handler( int s ) {
91 signal(SIGINT,sig_int_handler);
97 char* home = getenv("HOME");
98 int l = strlen(home) + 24;
102 sprintf(fbuf,"%s/.srfsh_history",home);
103 history_file = strdup(fbuf);
105 if(!access(history_file, W_OK | R_OK )) {
106 history_length = 999;
107 read_history(history_file);
113 int parse_error( char* words[] ) {
122 memset(buffer, 0, 256);
123 while( (current=words[i++]) ) {
124 strcat(buffer, current);
127 if( ! buffer || strlen(buffer) < 1 )
130 fprintf( stderr, "???: %s\n", buffer );
136 int parse_request( char* request ) {
138 if( request == NULL )
143 char* words[COMMAND_BUFSIZE];
144 memset(words,0,COMMAND_BUFSIZE);
147 char* cur_tok = strtok( req, " " );
149 if( cur_tok == NULL )
152 while(cur_tok != NULL) {
153 words[i++] = cur_tok;
154 cur_tok = strtok( NULL, " " );
158 // not sure why (strtok?), but this is necessary
159 memset( words + i, 0, COMMAND_BUFSIZE - i );
161 /* pass off to the top level command */
162 if( !strcmp(words[0],"router") )
163 ret_val = handle_router( words );
165 else if( !strcmp(words[0],"time") )
166 ret_val = handle_time( words );
168 else if (!strcmp(words[0],"request"))
169 ret_val = handle_request( words, 0 );
171 else if (!strcmp(words[0],"relay"))
172 ret_val = handle_request( words, 1 );
174 else if (!strcmp(words[0],"help"))
175 ret_val = print_help();
177 else if (!strcmp(words[0],"set"))
178 ret_val = handle_set(words);
180 else if (!strcmp(words[0],"print"))
181 ret_val = handle_print(words);
183 else if (!strcmp(words[0],"math_bench"))
184 ret_val = handle_math(words);
186 else if (!strcmp(words[0],"introspect"))
187 ret_val = handle_introspect(words);
189 else if (!strcmp(words[0],"login"))
190 ret_val = handle_login(words);
192 else if (words[0][0] == '!')
193 ret_val = handle_exec( words, 1 );
197 return handle_exec( words, 0 );
199 return parse_error( words );
208 int handle_introspect(char* words[]) {
210 if(words[1] && words[2]) {
211 fprintf(stderr, "--> %s\n", words[1]);
214 sprintf( buf, "request %s opensrf.system.method %s", words[1], words[2] );
215 return parse_request( buf );
220 fprintf(stderr, "--> %s\n", words[1]);
223 sprintf( buf, "request %s opensrf.system.method.all", words[1] );
224 return parse_request( buf );
232 int handle_login( char* words[]) {
234 if( words[1] && words[2]) {
236 char* username = words[1];
237 char* password = words[2];
246 "request open-ils.auth open-ils.auth.authenticate.init \"%s\"", username );
250 if(last_result && last_result->_result_content) {
251 object* r = last_result->_result_content;
252 hash = r->string_data;
256 char* pass_buf = md5sum(password);
259 memset(both_buf,0,256);
260 sprintf(both_buf,"%s%s",hash, pass_buf);
262 char* mess_buf = md5sum(both_buf);
265 "request open-ils.auth open-ils.auth.authenticate.complete \"%s\", \"%s\", \"opac\"",
266 username, mess_buf );
271 parse_request( buf2 );
273 login_session = strdup(last_result->_result_content->string_data);
275 printf("Login Session: %s\n", login_session );
284 char* md5sum( char* text ) {
287 unsigned char digest[16];
292 for ( i=0 ; i != strlen(text) ; i++ )
293 MD5_feed (&ctx, text[i]);
295 MD5_stop (&ctx, digest);
303 for ( i=0 ; i<16 ; i++ ) {
304 sprintf(buf, "%02x", digest[i]);
305 strcat( final, buf );
308 return strdup(final);
313 int handle_set( char* words[]) {
316 if( (variable=words[1]) ) {
319 if( (val=words[2]) ) {
321 if(!strcmp(variable,"pretty_print")) {
322 if(!strcmp(val,"true")) {
324 printf("pretty_print = true\n");
327 if(!strcmp(val,"false")) {
329 printf("pretty_print = false\n");
340 int handle_print( char* words[]) {
343 if( (variable=words[1]) ) {
344 if(!strcmp(variable,"pretty_print")) {
346 printf("pretty_print = true\n");
349 printf("pretty_print = false\n");
354 if(!strcmp(variable,"login")) {
355 printf("login session = %s\n", login_session );
363 int handle_router( char* words[] ) {
371 if( !strcmp(words[1],"query") ) {
373 if( words[2] && !strcmp(words[2],"servers") ) {
374 for(i=3; i < COMMAND_BUFSIZE - 3 && words[i]; i++ ) {
375 router_query_servers( words[i] );
387 /* if new shell, spawn a new child and subshell to do the work,
388 otherwise pipe the request to the currently open (piped) shell */
389 int handle_exec(char* words[], int new_shell) {
391 if(!words[0]) return 0;
393 if( words[0] && words[0][0] == '!') {
394 int len = strlen(words[0]);
396 memset(command,0,len);
398 int i; /* chop out the ! */
399 for( i=1; i!= len; i++) {
400 command[i-1] = words[0][i];
404 words[0] = strdup(command);
408 signal(SIGCHLD, sig_child_handler);
414 signal(SIGCHLD,sig_child_handler);
419 execvp( words[0], words );
425 growing_buffer* b = buffer_init(64);
428 buffer_fadd( b, "%s ", words[i++] );
430 buffer_add( b, "\n");
432 fprintf( shell_writer, b->buf );
435 fflush(shell_writer);
444 int handle_request( char* words[], int relay ) {
450 char* server = words[1];
451 char* method = words[2];
453 growing_buffer* buffer = NULL;
455 buffer = buffer_init(128);
456 buffer_add(buffer, "[");
457 for(i = 3; words[i] != NULL; i++ ) {
458 /* removes trailing semicolon if user accidentally enters it */
459 if( words[i][strlen(words[i])-1] == ';' )
460 words[i][strlen(words[i])-1] = '\0';
461 buffer_add( buffer, words[i] );
462 buffer_add(buffer, " ");
464 buffer_add(buffer, "]");
467 return send_request( server, method, buffer, relay );
473 int send_request( char* server,
474 char* method, growing_buffer* buffer, int relay ) {
475 if( server == NULL || method == NULL )
478 object* params = NULL;
480 if( buffer != NULL && buffer->n_used > 0 )
481 params = json_parse_string(buffer->buf);
483 if(!last_result || ! last_result->_result_content) {
484 printf("We're not going to call 'relay' with no result params\n");
488 object* o = new_object(NULL);
489 o->push(o, last_result->_result_content );
495 if(buffer->n_used > 0 && params == NULL) {
496 fprintf(stderr, "JSON error detected, not executing\n");
500 osrf_app_session* session = osrf_app_client_session_init(server);
502 if(!osrf_app_session_connect(session)) {
503 warning_handler( "Unable to connect to remote service %s\n", server );
507 double start = get_timestamp_millis();
508 //int req_id = osrf_app_session_make_request( session, params, method, 1, NULL );
509 int req_id = osrf_app_session_make_req( session, params, method, 1, NULL );
512 osrf_message* omsg = osrf_app_session_request_recv( session, req_id, 60 );
513 debug_handler("srfsh0");
517 printf("\nReceived no data from server\n");
520 signal(SIGPIPE, SIG_IGN);
523 if(!is_from_script) less = popen( "less -EX", "w");
526 if( less == NULL ) { less = stdout; }
528 growing_buffer* resp_buffer = buffer_init(4096);
532 if(omsg->_result_content) {
534 debug_handler("srfsh1");
535 osrf_message_free(last_result);
540 if( pretty_print && omsg->_result_content ) {
541 char* j = object_to_json(omsg->_result_content);
542 content = json_printer(j);
545 content = object_get_string(omsg->_result_content);
547 debug_handler("srfsh2");
549 buffer_add( resp_buffer, "\nReceived Data: " );
550 buffer_add( resp_buffer, content );
551 buffer_add( resp_buffer, "\n" );
556 buffer_add( resp_buffer, "\nReceived Exception:\nName: " );
557 buffer_add( resp_buffer, omsg->status_name );
558 buffer_add( resp_buffer, "\nStatus: " );
559 buffer_add( resp_buffer, omsg->status_text );
560 buffer_add( resp_buffer, "\nStatus: " );
563 sprintf( code, "%d", omsg->status_code );
564 buffer_add( resp_buffer, code );
568 omsg = osrf_app_session_request_recv( session, req_id, 5 );
572 double end = get_timestamp_millis();
574 fprintf( less, resp_buffer->buf );
575 buffer_free( resp_buffer );
576 fprintf( less, "\n------------------------------------\n");
577 if( osrf_app_session_request_complete( session, req_id ))
578 fprintf(less, "Request Completed Successfully\n");
581 fprintf(less, "Request Time in seconds: %.3f\n", end - start );
582 fprintf(less, "------------------------------------\n");
586 osrf_app_session_request_finish( session, req_id );
587 osrf_app_session_disconnect( session );
588 osrf_app_session_destroy( session );
596 int handle_time( char* words[] ) {
603 printf( "%s\n", buf );
608 time_t epoch = (time_t)atoi( words[1] );
609 char* localtime = strdup( ctime( &epoch ) );
610 printf( "%s => %s", words[1], localtime );
621 int router_query_servers( char* router_server ) {
623 if( ! router_server || strlen(router_server) == 0 )
628 sprintf(rbuf,"router@%s/router", router_server );
630 transport_message* send =
631 message_init( "servers", NULL, NULL, rbuf, NULL );
632 message_set_router_info( send, NULL, NULL, NULL, "query", 0 );
634 client_send_message( client, send );
635 message_free( send );
637 transport_message* recv = client_recv( client, -1 );
639 fprintf(stderr, "NULL message received from router\n");
644 "---------------------------------------------------------------------------------\n"
645 "Received from 'server' query on %s\n"
646 "---------------------------------------------------------------------------------\n"
647 "original reg time | latest reg time | last used time | class | server\n"
648 "---------------------------------------------------------------------------------\n"
650 "---------------------------------------------------------------------------------\n"
651 , router_server, recv->body );
653 message_free( recv );
661 "---------------------------------------------------------------------------------\n"
663 "---------------------------------------------------------------------------------\n"
664 "help - Display this message\n"
665 "!<command> [args] - Forks and runs the given command in the shell\n"
666 "time - Prints the current time\n"
667 "time <timestamp> - Formats seconds since epoch into readable format\n"
668 "set <variable> <value> - set a srfsh variable (e.g. set pretty_print true )\n"
669 "print <variable> - Displays the value of a srfsh variable\n"
670 "---------------------------------------------------------------------------------\n"
672 "router query servers <server1 [, server2, ...]>\n"
673 " - Returns stats on connected services\n"
676 "request <service> <method> [ <json formatted string of params> ]\n"
677 " - Anything passed in will be wrapped in a json array,\n"
678 " so add commas if there is more than one param\n"
681 "relay <service> <method>\n"
682 " - Performs the requested query using the last received result as the param\n"
685 "math_bench <num_batches> [0|1|2]\n"
686 " - 0 means don't reconnect, 1 means reconnect after each batch of 4, and\n"
687 " 2 means reconnect after every request\n"
689 "introspect <service>\n"
690 " - prints the API for the service\n"
693 "---------------------------------------------------------------------------------\n"
694 " Commands for Open-ILS\n"
695 "---------------------------------------------------------------------------------\n"
696 "login <username> <password>\n"
697 " - Logs into the 'server' and displays the session id\n"
698 " - To view the session id later, enter: print login\n"
699 "---------------------------------------------------------------------------------\n"
702 "Note: long output is piped through 'less'. To search in 'less', type: /<search>\n"
703 "---------------------------------------------------------------------------------\n"
712 char* tabs(int count) {
713 growing_buffer* buf = buffer_init(24);
715 for(i=0;i!=count;i++)
716 buffer_add(buf, " ");
718 char* final = buffer_data( buf );
723 char* json_printer( char* string ) {
725 growing_buffer* buf = buffer_init(64);
728 for(i=0; i!= strlen(string); i++) {
730 if( string[i] == '{' ) {
732 buffer_add(buf, "\n");
733 char* tab = tabs(tab_var);
734 buffer_add(buf, tab);
736 buffer_add( buf, "{");
738 buffer_add( buf, "\n" );
740 buffer_add( buf, tab );
743 } else if( string[i] == '[' ) {
745 buffer_add(buf, "\n");
746 char* tab = tabs(tab_var);
747 buffer_add(buf, tab);
749 buffer_add( buf, "[");
751 buffer_add( buf, "\n" );
753 buffer_add( buf, tab );
756 } else if( string[i] == '}' ) {
759 buffer_add(buf, "\n");
760 char* tab = tabs(tab_var);
761 buffer_add(buf, tab);
763 buffer_add( buf, "}");
764 buffer_add( buf, "\n" );
766 buffer_add( buf, tab );
769 } else if( string[i] == ']' ) {
772 buffer_add(buf, "\n");
773 char* tab = tabs(tab_var);
774 buffer_add(buf, tab);
776 buffer_add( buf, "]");
777 buffer_add( buf, "\n" );
779 buffer_add( buf, tab );
782 } else if( string[i] == ',' ) {
784 buffer_add( buf, ",");
785 buffer_add( buf, "\n" );
786 char* tab = tabs(tab_var);
787 buffer_add(buf, tab);
795 buffer_add( buf, b );
800 char* result = buffer_data(buf);
806 int handle_math( char* words[] ) {
807 if( words[1] && words[2] )
808 return do_math( atoi(words[1]), atoi(words[2]) );
813 int do_math( int count, int style ) {
815 osrf_app_session* session = osrf_app_client_session_init( "opensrf.math" );
817 object* params = json_parse_string("[]");
818 params->push(params,new_object("1"));
819 params->push(params,new_object("2"));
821 char* methods[] = { "add", "sub", "mult", "div" };
822 char* answers[] = { "\"3\"", "\"-1\"", "\"2\"", "\"0.5\"" };
824 float times[ count * 4 ];
825 memset(times,0,count*4);
828 for(k=0;k!=100;k++) {
835 fprintf(stderr,"\n\n");
839 for(i=0; i!= count; i++) {
842 for(j=0; j != 4; j++) {
849 //int req_id = osrf_app_session_make_request( session, params, methods[j], 1, NULL );
850 int req_id = osrf_app_session_make_req( session, params, methods[j], 1, NULL );
852 osrf_message* omsg = osrf_app_session_request_recv( session, req_id, 5 );
856 double start = ( (int)t1.time + ( ((float)t1.millitm) / 1000 ) );
857 double end = ( (int)t2.time + ( ((float)t2.millitm) / 1000 ) );
859 times[(4*i) + j] = end - start;
863 if(omsg->_result_content) {
864 char* jsn = object_to_json(omsg->_result_content);
865 if(!strcmp(jsn, answers[j]))
866 fprintf(stderr, "+");
868 fprintf(stderr, "\n![%s] - should be %s\n", jsn, answers[j] );
873 osrf_message_free(omsg);
875 } else { fprintf( stderr, "\nempty message for tt: %d\n", req_id ); }
877 osrf_app_session_request_finish( session, req_id );
880 osrf_app_session_disconnect( session );
883 fprintf(stderr,"\n");
887 osrf_app_session_disconnect( session );
890 osrf_app_session_destroy( session );
895 for(c=0; c!= count*4; c++)
898 float avg = total / (count*4);
899 fprintf(stderr, "\n Average round trip time: %f\n", avg );