Brian Daniels / mbed-tools

Fork of mbed-tools by Morpheus

Committer:
screamer
Date:
Wed Mar 30 16:23:44 2016 +0000
Revision:
0:4a2e5f0422d6
Initial revision

Who changed what in which revision?

UserRevisionLine numberNew contents of line
screamer 0:4a2e5f0422d6 1 """
screamer 0:4a2e5f0422d6 2 mbed SDK
screamer 0:4a2e5f0422d6 3 Copyright (c) 2011-2013 ARM Limited
screamer 0:4a2e5f0422d6 4
screamer 0:4a2e5f0422d6 5 Licensed under the Apache License, Version 2.0 (the "License");
screamer 0:4a2e5f0422d6 6 you may not use this file except in compliance with the License.
screamer 0:4a2e5f0422d6 7 You may obtain a copy of the License at
screamer 0:4a2e5f0422d6 8
screamer 0:4a2e5f0422d6 9 http://www.apache.org/licenses/LICENSE-2.0
screamer 0:4a2e5f0422d6 10
screamer 0:4a2e5f0422d6 11 Unless required by applicable law or agreed to in writing, software
screamer 0:4a2e5f0422d6 12 distributed under the License is distributed on an "AS IS" BASIS,
screamer 0:4a2e5f0422d6 13 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
screamer 0:4a2e5f0422d6 14 See the License for the specific language governing permissions and
screamer 0:4a2e5f0422d6 15 limitations under the License.
screamer 0:4a2e5f0422d6 16 """
screamer 0:4a2e5f0422d6 17
screamer 0:4a2e5f0422d6 18 import sys
screamer 0:4a2e5f0422d6 19 import socket
screamer 0:4a2e5f0422d6 20 from sys import stdout
screamer 0:4a2e5f0422d6 21 from SocketServer import BaseRequestHandler, TCPServer
screamer 0:4a2e5f0422d6 22
screamer 0:4a2e5f0422d6 23 class TCPEchoClient_Handler(BaseRequestHandler):
screamer 0:4a2e5f0422d6 24 def handle(self):
screamer 0:4a2e5f0422d6 25 """ One handle per connection
screamer 0:4a2e5f0422d6 26 """
screamer 0:4a2e5f0422d6 27 print "HOST: Connection received...",
screamer 0:4a2e5f0422d6 28 count = 1;
screamer 0:4a2e5f0422d6 29 while True:
screamer 0:4a2e5f0422d6 30 data = self.request.recv(1024)
screamer 0:4a2e5f0422d6 31 if not data: break
screamer 0:4a2e5f0422d6 32 self.request.sendall(data)
screamer 0:4a2e5f0422d6 33 if '{{end}}' in str(data):
screamer 0:4a2e5f0422d6 34 print
screamer 0:4a2e5f0422d6 35 print str(data)
screamer 0:4a2e5f0422d6 36 else:
screamer 0:4a2e5f0422d6 37 if not count % 10:
screamer 0:4a2e5f0422d6 38 sys.stdout.write('.')
screamer 0:4a2e5f0422d6 39 count += 1
screamer 0:4a2e5f0422d6 40 stdout.flush()
screamer 0:4a2e5f0422d6 41
screamer 0:4a2e5f0422d6 42 class TCPEchoClientTest():
screamer 0:4a2e5f0422d6 43 def send_server_ip_port(self, selftest, ip_address, port_no):
screamer 0:4a2e5f0422d6 44 """ Set up network host. Reset target and and send server IP via serial to Mbed
screamer 0:4a2e5f0422d6 45 """
screamer 0:4a2e5f0422d6 46 c = selftest.mbed.serial_readline() # 'TCPCllient waiting for server IP and port...'
screamer 0:4a2e5f0422d6 47 if c is None:
screamer 0:4a2e5f0422d6 48 self.print_result(selftest.RESULT_IO_SERIAL)
screamer 0:4a2e5f0422d6 49 return
screamer 0:4a2e5f0422d6 50
screamer 0:4a2e5f0422d6 51 selftest.notify(c.strip())
screamer 0:4a2e5f0422d6 52 selftest.notify("HOST: Sending server IP Address to target...")
screamer 0:4a2e5f0422d6 53
screamer 0:4a2e5f0422d6 54 connection_str = ip_address + ":" + str(port_no) + "\n"
screamer 0:4a2e5f0422d6 55 selftest.mbed.serial_write(connection_str)
screamer 0:4a2e5f0422d6 56 selftest.notify(connection_str)
screamer 0:4a2e5f0422d6 57
screamer 0:4a2e5f0422d6 58 # Two more strings about connection should be sent by MBED
screamer 0:4a2e5f0422d6 59 for i in range(0, 2):
screamer 0:4a2e5f0422d6 60 c = selftest.mbed.serial_readline()
screamer 0:4a2e5f0422d6 61 if c is None:
screamer 0:4a2e5f0422d6 62 selftest.print_result(self.RESULT_IO_SERIAL)
screamer 0:4a2e5f0422d6 63 return
screamer 0:4a2e5f0422d6 64 selftest.notify(c.strip())
screamer 0:4a2e5f0422d6 65
screamer 0:4a2e5f0422d6 66 def test(self, selftest):
screamer 0:4a2e5f0422d6 67 # We need to discover SERVEP_IP and set up SERVER_PORT
screamer 0:4a2e5f0422d6 68 # Note: Port 7 is Echo Protocol:
screamer 0:4a2e5f0422d6 69 #
screamer 0:4a2e5f0422d6 70 # Port number rationale:
screamer 0:4a2e5f0422d6 71 #
screamer 0:4a2e5f0422d6 72 # The Echo Protocol is a service in the Internet Protocol Suite defined
screamer 0:4a2e5f0422d6 73 # in RFC 862. It was originally proposed for testing and measurement
screamer 0:4a2e5f0422d6 74 # of round-trip times[citation needed] in IP networks.
screamer 0:4a2e5f0422d6 75 #
screamer 0:4a2e5f0422d6 76 # A host may connect to a server that supports the Echo Protocol using
screamer 0:4a2e5f0422d6 77 # the Transmission Control Protocol (TCP) or the User Datagram Protocol
screamer 0:4a2e5f0422d6 78 # (UDP) on the well-known port number 7. The server sends back an
screamer 0:4a2e5f0422d6 79 # identical copy of the data it received.
screamer 0:4a2e5f0422d6 80 SERVER_IP = str(socket.gethostbyname(socket.getfqdn()))
screamer 0:4a2e5f0422d6 81 SERVER_PORT = 7
screamer 0:4a2e5f0422d6 82
screamer 0:4a2e5f0422d6 83 # Returning none will suppress host test from printing success code
screamer 0:4a2e5f0422d6 84 server = TCPServer((SERVER_IP, SERVER_PORT), TCPEchoClient_Handler)
screamer 0:4a2e5f0422d6 85 print "HOST: Listening for TCP connections: " + SERVER_IP + ":" + str(SERVER_PORT)
screamer 0:4a2e5f0422d6 86 self.send_server_ip_port(selftest, SERVER_IP, SERVER_PORT)
screamer 0:4a2e5f0422d6 87 server.serve_forever()