1#!/usr/bin/env python
2
3r"""
4Network generic functions.
5
6"""
7
8import gen_print as gp
9import gen_cmd as gc
10import gen_misc as gm
11import var_funcs as vf
12import collections
13import re
14import ipaddress
15import subprocess
16import socket
17from robot.libraries.BuiltIn import BuiltIn
18import json
19import bmc_ssh_utils as bsu
20
21ip_regex = r"\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}"
22
23
24def get_running_system_ip():
25    r"""
26    Get the IP address of server from which robot code is running.
27
28    """
29
30    ip_list = list()
31    stdout = subprocess.check_output(['hostname', '--all-fqdns'], shell=True)
32    host_fqdns = stdout.decode("utf-8").strip()
33    ip_address = socket.gethostbyname(str(host_fqdns))
34    ip_list.append(ip_address)
35
36    return ip_list
37
38
39def netmask_prefix_length(netmask):
40    r"""
41    Return the netmask prefix length.
42
43    Description of argument(s):
44    netmask     Netmask value (e.g. "255.255.0.0", "255.255.255.0",
45                                    "255.252.0.0", etc.).
46    """
47
48    # IP address netmask format: '0.0.0.0/255.255.252.0'
49    return ipaddress.ip_network('0.0.0.0/' + netmask).prefixlen
50
51
52def get_netmask_address(prefix_len):
53    r"""
54    Return the netmask address.
55
56    Description of argument(s):
57    prefix_len     Prefix length value (e.g. "24", "23", "22", etc.).
58    """
59
60    # IP address netmask format: '0.0.0.0/24'
61    return ipaddress.ip_network('0.0.0.0/' + prefix_len).netmask
62
63
64def parse_nping_output(output):
65    r"""
66    Parse the output from the nping command and return as a dictionary.
67
68    Example of output value:
69
70    Starting Nping 0.6.47 ( http://nmap.org/nping ) at 2019-08-07 22:05 IST
71    SENT (0.0181s) TCP Source IP:37577 >
72      Destination IP:80 S ttl=64 id=39113 iplen=40  seq=629782493 win=1480
73    SENT (0.2189s) TCP Source IP:37577 >
74      Destination IP:80 S ttl=64 id=39113 iplen=40  seq=629782493 win=1480
75    RCVD (0.4120s) TCP Destination IP:80 >
76      Source IP:37577 SA ttl=49 id=0 iplen=44  seq=1078301364 win=5840 <mss 1380>
77    Max rtt: 193.010ms | Min rtt: 193.010ms | Avg rtt: 193.010ms
78    Raw packets sent: 2 (80B) | Rcvd: 1 (46B) | Lost: 1 (50.00%)
79    Nping done: 1 IP address pinged in 0.43 seconds
80
81    Example of data returned by this function:
82
83    nping_result:
84      [max_rtt]:                 193.010ms
85      [min_rtt]:                 193.010ms
86      [avg_rtt]:                 193.010ms
87      [raw_packets_sent]:        2 (80B)
88      [rcvd]:                    1 (46B)
89      [lost]:                    1 (50.00%)
90      [percent_lost]:            50.00
91
92    Description of argument(s):
93    output                          The output obtained by running an nping
94                                    command.
95    """
96
97    lines = output.split("\n")
98    # Obtain only the lines of interest.
99    lines = list(filter(lambda x: re.match(r"(Max rtt|Raw packets)", x),
100                        lines))
101
102    key_value_list = []
103    for line in lines:
104        key_value_list += line.split("|")
105    nping_result = vf.key_value_list_to_dict(key_value_list)
106    # Extract percent_lost value from lost field.
107    nping_result['percent_lost'] = \
108        float(nping_result['lost'].split(" ")[-1].strip("()%"))
109    return nping_result
110
111
112openbmc_host = BuiltIn().get_variable_value("${OPENBMC_HOST}")
113
114
115def nping(host=openbmc_host, parse_results=1, **options):
116    r"""
117    Run the nping command and return the results either as a string or as a dictionary.
118
119    Do a 'man nping' for a complete description of the nping utility.
120
121    Note that any valid nping argument may be specified as a function argument.
122
123    Example robot code:
124
125    ${nping_result}=  Nping  delay=${delay}  count=${count}  icmp=${None}  icmp-type=echo
126    Rprint Vars  nping_result
127
128    Resulting output:
129
130    nping_result:
131      [max_rtt]:                                      0.534ms
132      [min_rtt]:                                      0.441ms
133      [avg_rtt]:                                      0.487ms
134      [raw_packets_sent]:                             4 (112B)
135      [rcvd]:                                         2 (92B)
136      [lost]:                                         2 (50.00%)
137      [percent_lost]:                                 50.0
138
139    Description of argument(s):
140    host                            The host name or IP of the target of the
141                                    nping command.
142    parse_results                   1 or True indicates that this function
143                                    should parse the nping results and return
144                                    a dictionary rather than the raw nping
145                                    output.  See the parse_nping_output()
146                                    function for details on the dictionary
147                                    structure.
148    options                         Zero or more options accepted by the nping
149                                    command.  Do a 'man nping' for details.
150    """
151
152    command_string = gc.create_command_string('nping', host, options)
153    rc, output = gc.shell_cmd(command_string, print_output=0, ignore_err=0)
154    if parse_results:
155        return parse_nping_output(output)
156
157    return output
158
159
160def get_channel_config():
161    r"""
162    Get the channel config data and return as a dictionary.
163
164    Example:
165    channel_config = get_channel_config()
166    print_vars(channel_config)
167
168    channel_config:
169      [0]:
170        [name]:                  IPMB
171        [is_valid]:              True
172        [active_sessions]:       0
173        [channel_info]:
174          [medium_type]:         ipmb
175          [protocol_type]:       ipmb-1.0
176          [session_supported]:   session-less
177          [is_ipmi]:             True
178      [1]:
179        [name]:                  eth0
180        [is_valid]:              True
181        [active_sessions]:       0
182        [channel_info]:
183          [medium_type]:         other-lan
184          [protocol_type]:       ipmb-1.0
185          [session_supported]:   multi-session
186          [is_ipmi]:             True
187      [2]:
188        [name]:                  eth1
189        [is_valid]:              True
190        [active_sessions]:       0
191        [channel_info]:
192          [medium_type]:         lan-802.3
193          [protocol_type]:       ipmb-1.0
194          [session_supported]:   multi-session
195          [is_ipmi]:             True
196    (etc.)
197    """
198
199    stdout, stderr, rc = bsu.bmc_execute_command("cat /usr/share/ipmi-providers/channel_config.json")
200    return json.loads(stdout)
201
202
203def get_active_channel_config():
204    r"""
205    Channel configs which medium_type are 'other-lan' or 'lan-802.3' returned by
206     this function.
207    """
208
209    return vf.filter_struct(get_channel_config(), "[('medium_type', 'other-lan|lan-802.3')]", regex=1)
210
211
212def get_channel_access_config(file_name):
213    r"""
214    Get the channel access config data and return as a dictionary.
215
216    Description of argument:
217    file_name     File name for channel access settings (e.g. '/run/ipmi/channel_access_volatile.json',
218                 '/var/lib/ipmi/channel_access_nv.json'.).
219
220    Example:
221
222    channel_access_config =  get_channel_access_config()
223    print_vars(channel_access_config)
224
225    channel_access_config:
226        [1]:
227            [priv_limit]:                                 priv-admin
228            [per_msg_auth_disabled]:                      False
229            [access_mode]:                                always_available
230            [alerting_disabled]:                          False
231            [user_auth_disabled]:                         False
232        [2]:
233            [priv_limit]:                                 priv-admin
234            [per_msg_auth_disabled]:                      False
235            [access_mode]:                                always_available
236            [alerting_disabled]:                          False
237            [user_auth_disabled]:                         False
238    """
239    stdout, stderr, rc = bsu.bmc_execute_command("cat " + file_name)
240
241    return json.loads(stdout)
242