Amxb_Ubus
3.3.1
Ambiorix Ubus API
|
UBus implementation for the bus agnostic api. This back-end can be loaded using the amxb_be_load
function which is implemented in libamxb.
You could install all tools needed for testing and developing on your local machine, but it is easier to just use a pre-configured environment. Such an environment is already prepared for you as a docker container.
Install docker
Docker must be installed on your system.
If you have no clue how to do this here are some links that could help you:
Make sure you user id is added to the docker group:
``` sudo usermod -aG docker $USER ```
Fetch the container image
To get access to the pre-configured environment, all you need to do is pull the image and launch a container.
Pull the image:
```bash docker pull registry.gitlab.com/soft.at.home/docker/oss-dbg:latest ```
Before launching the container, you should create a directory which will be shared between your local machine and the container.
```bash mkdir -p ~/amx_project/modules/amxb_backends/ ```
Launch the container:
```bash docker run -ti -d –name oss-dbg –restart always –cap-add=SYS_PTRACE –sysctl net.ipv6.conf.all.disable_ipv6=1 -e "USER=$USER" -e "UID=$(id -u)" -e "GID=$(id -g)" -v ~/amx_project/:/home/$USER/amx_project/ registry.gitlab.com/soft.at.home/docker/oss-dbg:latest ```
The -v
option bind mounts the local directory for the ambiorix project in the container, at the exact same place. The -e
options create environment variables in the container. These variables are used to create a user name with exactly the same user id and group id in the container as on your local host (user mapping).
You can open as many terminals/consoles as you like:
```bash docker exec -ti –user $USER oss-dbg /bin/bash ```
Dependency graph - libraries needed by mod-amxb-ubus. For graph simplicity direct dependencies which are also an indirect dependency are not shown.
graph TD; mod-amxb-ubus-->libamxb-->libamxd-->libamxp-->libamxc mod-amxb-ubus-->libubus-->libubox
Clone the git repository
To be able to build it, you need the source code. So open the directory just created for the ambiorix project and clone this library in it (on your local machine).
```bash cd ~/amx_project/modules/amxb_backends/ git clone git@g:prpl-foundation/components/ambiorix/modules/amxb_backends/amxb_ubus.git ``` itla b.com
Install dependencies
Although the container will contain all tools needed for building, it does not contain the libraries needed for building amxb_ubus
. To be able to build amxb_ubus
you need libamxc
, libamxp
and libamxb
. These libraries can be installed in the container.
```bash sudo apt update sudo apt install libamxc sudo apt install libamxb ```
Note that you do not need to install all components explicitly. Some components will be installed automatically because the other components depend on them. Some of the components are allready preinstalled in the container.
Build it
```bash cd ~/amx_project/modules/amxb_backends/amxb_ubus make ```
You can install your own compiled version easily in the container by running the install target.
From within the container you can create packages.
The packages generated are:
You can copy these packages and extract/install them.
For ubuntu or debian distributions use dpkg:
Install dependencies
Most of the packages needed for testing are allready preinstalled in the container. To be able to test amxb_pcb
you need to extra install libamxj
.
```bash sudo apt update sudo apt install libamxj ```
Run tests
You can run the tests by executing the following command.
```bash cd ~/amx_project/modules/amxb_backends/amxb_ubus/tests sudo make ```
Or this command if you also want the coverage tests to run:
```bash cd ~/amx_project/modules/amxb_backends/amxb_ubus/tests make run coverage ```
The coverage target will generate coverage reports using gcov and gcovr.
A summary for each file (*.c files) is printed in your console after the tests are run. A HTML version of the coverage reports is also generated. These reports are available in the output directory of the compiler used. Example: using native gcc When the output of gcc -dumpmachine
is x86_64-linux-gnu
, the HTML coverage reports can be found at ~/amx_project/modules/amxb_backends/amxb_ubus/output/x86_64-linux-gnu/coverage/report.
You can easily access the reports in your browser. In the container start a python3 http server in background.
Use the following url to access the reports http://<IP ADDRESS OF YOUR CONTAINER>:8080/modules/amxb_backends/amxb_ubus/output/<MACHINE>/coverage/report
You can find the ip address of your container by using the ip
command in the container.
Example:
in this case the ip address of the container is 172.17.0.7
. So the uri you should use is: http://172.17.0.7:8080/modules/amxb_backends/amxb_ubus/output/x86_64-linux-gnu/coverage/report/
The behavior of the ubus back-end can be modified using config options. These config options can be set in an odl config
section. All ubus back-end config options must be put in a table with the name ubus
.
Example:
Available config options:
register-on-start-event
: Register all known data model objects to ubus daemon when app:start
event is received. This event is send right before the event loop is started. When this option is not set the data model objects are registered to the ubus daemon just before the entry-points are called.watch-ubus-events
: listen for ubusd events. When this is enabled, the auto re-subscribe feature can work on ubusd.During development or automated tests it can be handy to be able to access to ubus objects from a remote machine. As ubusd doesn't support TCP/IP connections two scripts are installed by this component.
The scripts use socat to create a relay to a TCP/IP socket.
On the target (HGW or device under test) the script forward_ubus_server.sh
must be used to create a TCP/IP listen socket. For each new connection a forked process is started which will act as relay between the TCP/IP socket and a socket to the ubusd.
All traffic coming from the TCP/IP socket will be forwarded to the ubusd, and all replies will be send on the TCP/IP socket.
On the PC (here called test host) the script forward_ubus_client.sh
must be used to create a UNIX domain listen socket and to create a connection to the TCP/IP listen socket on the target. All ubus clients or tests using the ubus protocol can then connect to the UNIX domain listen socket. All traffic coming from an ubus client will then be forwarded to the TCP/IP socket.
Here is a small demonstration of these scripts using the localhost.
NOTE
When creating this set-up using a HGW (device under test) and another machine (the test host), it is possible you need to disable or configure the firewall on the HGW.
—
In the directory /usr/share/acl.d/
create for each user name that needs access to ubsus a json file.
The filename should end on .json
. The file should contain the following json data structure:
The above example will make everything available for the user specified in the field "user". It is possible to restrict which objects and methods the user can access.
Example:
NOTE
Use opening access to objects in ubus with care in production environments.
—