def main(): parent_connection, child_connection = Pipe() server_process = Process(target=server.run_server, args=(parent_connection, )) server_process.start() client.run_client(child_connection) server_process.terminate()
def test_server_bad_request(running_server, request_bytes, expected_status): import client status, reason, headers, content = response_info( client.run_client('127.0.0.1', 5000, request_bytes) ) assert int(status) == expected_status assert int(headers['Content-Length']) == len(content)
def run(self): self.runner.increase_running_agents() try: if run_client(): self.runner.increase_conn_per_sec() except: pass self.runner.decrease_running_agents()
def main(): if len(sys.argv) < 2: print 'enter arg form console/server/client' return if sys.argv[1] == 'client': host, port = None, None if len(sys.argv) >= 4: host, port = sys.argv[2], sys.argv[3] client.run_client(host, port) elif sys.argv[1] == 'server': host, port = None, None if len(sys.argv) >= 4: host, port = sys.argv[2], sys.argv[3] server.run_server(host, port) elif sys.argv[1] == 'console': console.console_mode() else: print 'enter arg form console/server/client' return
def main(): # tornado.options.parse_command_line() opts, _ = getopt.getopt(sys.argv[1:], 'ht:') t = '' for op, v in opts: if op == '-t': t = v if t == 's': signal.signal(signal.SIGINT, handle_sigchld) # app = makeApp() app = Application() app.listen(8888) IOLoop.current().start() elif t == 'c': import client client.run_client()
def test_server_good_request(running_server, uri, expected_mime, expected_content): import client status, reason, headers, content = response_info( client.run_client('127.0.0.1', 5000, build_request(uri)) ) assert (status, reason) == ("200", "OK") assert headers['Content-Encoding'] == "gzip" assert headers['Content-Type'] == expected_mime assert int(headers['Content-Length']) == len(content) if expected_content: assert gzipdecode(content) == load_testfile(expected_content)
import logging from client import run_client logging.basicConfig( format= '%(asctime)s.%(msecs)s:%(name)s:%(thread)d:%(levelname)s:%(process)d:%(message)s', level=logging.INFO) if __name__ == '__main__': run_client()
def main(): parent_connection, child_connection = Pipe() server_process = Process(target=server.run_server, args=(parent_connection,)) server_process.start() client.run_client(child_connection) server_process.terminate()
def join(): from client import run_client d = run_client(reactor) reactor.run()
private, public = generate_keys() (signing_key, verification_key_hex) = generate_signing_keys() with open('secrets/encryption/' + name_prefix + '_private.key', 'w', encoding='utf-8') as f: f.write( private.encode(encoder=HexEncoder).decode('utf-8').replace( "'", '')) with open('secrets/encryption/' + name_prefix + '_public.key', 'w', encoding='utf-8') as f: f.write( public.encode(encoder=HexEncoder).decode('utf-8').replace("'", '')) with open('secrets/verification/' + name_prefix + '_sign.key', 'w', encoding='utf-8') as f: f.write( signing_key.encode(encoder=HexEncoder).decode('utf-8').replace( "'", '')) with open('secrets/verification/' + name_prefix + '_verify.key', 'w', encoding='utf-8') as f: f.write(verification_key_hex.decode('utf-8').replace("'", '')) if __name__ == '__main__': run_server(False) time.sleep(0.1) run_client(False)