mirror of
https://github.com/aramperes/nut-rs.git
synced 2025-09-09 05:28:31 -04:00
parent
f22867d2d2
commit
3002b4de53
11 changed files with 171 additions and 75 deletions
10
Cargo.lock
generated
10
Cargo.lock
generated
|
@ -119,6 +119,7 @@ dependencies = [
|
||||||
"rustls",
|
"rustls",
|
||||||
"shell-words",
|
"shell-words",
|
||||||
"webpki",
|
"webpki",
|
||||||
|
"webpki-roots",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
|
@ -328,6 +329,15 @@ dependencies = [
|
||||||
"untrusted",
|
"untrusted",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "webpki-roots"
|
||||||
|
version = "0.21.1"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "aabe153544e473b775453675851ecc86863d2a81d786d741f6b76778f2a48940"
|
||||||
|
dependencies = [
|
||||||
|
"webpki",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "winapi"
|
name = "winapi"
|
||||||
version = "0.3.9"
|
version = "0.3.9"
|
||||||
|
|
|
@ -85,5 +85,9 @@ fn main() -> nut_client::Result<()> {
|
||||||
You can turn on SSL support by adding `.with_ssl(true)` in the `ConfigBuilder`. This requires the `ssl` feature, which
|
You can turn on SSL support by adding `.with_ssl(true)` in the `ConfigBuilder`. This requires the `ssl` feature, which
|
||||||
uses `rustls` under the hood.
|
uses `rustls` under the hood.
|
||||||
|
|
||||||
Note that this crate turns off all certificate validation at the moment, effectively giving a false sense of security.
|
Note that, by default, `.with_ssl(true)` will enable **strict** verification. This means it will verify the server
|
||||||
If you'd like to contribute to this, see issue #8.
|
certificate's DNS entries, check for revocation, and verify the chain using the local root trust. You must also ensure
|
||||||
|
that the connection hostname is a valid DNS name (e.g. `localhost`, not `127.0.0.1`).
|
||||||
|
|
||||||
|
If the server is using a self-signed certificate, and you'd like to ignore the strict validation, you can add
|
||||||
|
`.with_insecure_ssl(true)` along with `.with_ssl(true)`.
|
||||||
|
|
|
@ -17,6 +17,7 @@ license = "MIT"
|
||||||
shell-words = "1.0.0"
|
shell-words = "1.0.0"
|
||||||
rustls = { version = "0.19", optional = true, features = ["dangerous_configuration"] }
|
rustls = { version = "0.19", optional = true, features = ["dangerous_configuration"] }
|
||||||
webpki = { version = "0.21", optional = true }
|
webpki = { version = "0.21", optional = true }
|
||||||
|
webpki-roots = { version = "0.21", optional = true }
|
||||||
|
|
||||||
[features]
|
[features]
|
||||||
ssl = ["rustls", "webpki"]
|
ssl = ["rustls", "webpki", "webpki-roots"]
|
||||||
|
|
|
@ -1,23 +1,23 @@
|
||||||
use std::env;
|
use std::env;
|
||||||
use std::net::ToSocketAddrs;
|
|
||||||
|
|
||||||
use nut_client::blocking::Connection;
|
use nut_client::blocking::Connection;
|
||||||
use nut_client::{Auth, ConfigBuilder, Host};
|
use nut_client::{Auth, ConfigBuilder};
|
||||||
|
use std::convert::TryInto;
|
||||||
|
|
||||||
fn main() -> nut_client::Result<()> {
|
fn main() -> nut_client::Result<()> {
|
||||||
let addr = env::var("NUT_ADDR")
|
let host = env::var("NUT_HOST").unwrap_or_else(|_| "localhost".into());
|
||||||
.unwrap_or_else(|_| "localhost:3493".into())
|
let port = env::var("NUT_PORT")
|
||||||
.to_socket_addrs()
|
.ok()
|
||||||
.unwrap()
|
.map(|s| s.parse::<u16>().ok())
|
||||||
.next()
|
.flatten()
|
||||||
.unwrap();
|
.unwrap_or(3493);
|
||||||
|
|
||||||
let username = env::var("NUT_USER").ok();
|
let username = env::var("NUT_USER").ok();
|
||||||
let password = env::var("NUT_PASSWORD").ok();
|
let password = env::var("NUT_PASSWORD").ok();
|
||||||
let auth = username.map(|username| Auth::new(username, password));
|
let auth = username.map(|username| Auth::new(username, password));
|
||||||
|
|
||||||
let config = ConfigBuilder::new()
|
let config = ConfigBuilder::new()
|
||||||
.with_host(Host::Tcp(addr))
|
.with_host((host, port).try_into().unwrap_or_default())
|
||||||
.with_auth(auth)
|
.with_auth(auth)
|
||||||
.with_debug(false) // Turn this on for debugging network chatter
|
.with_debug(false) // Turn this on for debugging network chatter
|
||||||
.build();
|
.build();
|
||||||
|
|
|
@ -17,9 +17,7 @@ impl Connection {
|
||||||
/// Initializes a connection to a NUT server (upsd).
|
/// Initializes a connection to a NUT server (upsd).
|
||||||
pub fn new(config: &Config) -> crate::Result<Self> {
|
pub fn new(config: &Config) -> crate::Result<Self> {
|
||||||
match &config.host {
|
match &config.host {
|
||||||
Host::Tcp(socket_addr) => {
|
Host::Tcp(host) => Ok(Self::Tcp(TcpConnection::new(config.clone(), &host.addr)?)),
|
||||||
Ok(Self::Tcp(TcpConnection::new(config.clone(), socket_addr)?))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -62,7 +60,7 @@ impl Connection {
|
||||||
/// A blocking TCP NUT client connection.
|
/// A blocking TCP NUT client connection.
|
||||||
pub struct TcpConnection {
|
pub struct TcpConnection {
|
||||||
config: Config,
|
config: Config,
|
||||||
pipeline: ConnectionStream,
|
stream: ConnectionStream,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl TcpConnection {
|
impl TcpConnection {
|
||||||
|
@ -71,7 +69,7 @@ impl TcpConnection {
|
||||||
let tcp_stream = TcpStream::connect_timeout(socket_addr, config.timeout)?;
|
let tcp_stream = TcpStream::connect_timeout(socket_addr, config.timeout)?;
|
||||||
let mut connection = Self {
|
let mut connection = Self {
|
||||||
config,
|
config,
|
||||||
pipeline: ConnectionStream::Plain(tcp_stream),
|
stream: ConnectionStream::Plain(tcp_stream),
|
||||||
};
|
};
|
||||||
|
|
||||||
// Initialize SSL connection
|
// Initialize SSL connection
|
||||||
|
@ -98,19 +96,37 @@ impl TcpConnection {
|
||||||
})?
|
})?
|
||||||
.expect_ok()?;
|
.expect_ok()?;
|
||||||
|
|
||||||
let mut config = rustls::ClientConfig::new();
|
let mut ssl_config = rustls::ClientConfig::new();
|
||||||
config
|
let sess = if self.config.ssl_insecure {
|
||||||
|
ssl_config
|
||||||
.dangerous()
|
.dangerous()
|
||||||
.set_certificate_verifier(std::sync::Arc::new(
|
.set_certificate_verifier(std::sync::Arc::new(
|
||||||
crate::ssl::NutCertificateValidator::new(&self.config),
|
crate::ssl::InsecureCertificateValidator::new(&self.config),
|
||||||
));
|
));
|
||||||
|
|
||||||
// todo: this DNS name is temporary; should get from connection hostname? (#8)
|
|
||||||
let dns_name = webpki::DNSNameRef::try_from_ascii_str("www.google.com").unwrap();
|
let dns_name = webpki::DNSNameRef::try_from_ascii_str("www.google.com").unwrap();
|
||||||
let sess = rustls::ClientSession::new(&std::sync::Arc::new(config), dns_name);
|
|
||||||
|
rustls::ClientSession::new(&std::sync::Arc::new(ssl_config), dns_name)
|
||||||
|
} else {
|
||||||
|
// Try to get hostname as given (e.g. localhost can be used for strict SSL, but not 127.0.0.1)
|
||||||
|
let hostname = self
|
||||||
|
.config
|
||||||
|
.host
|
||||||
|
.hostname()
|
||||||
|
.ok_or(ClientError::Nut(NutError::SslInvalidHostname))?;
|
||||||
|
|
||||||
|
let dns_name = webpki::DNSNameRef::try_from_ascii_str(&hostname)
|
||||||
|
.map_err(|_| ClientError::Nut(NutError::SslInvalidHostname))?;
|
||||||
|
|
||||||
|
ssl_config
|
||||||
|
.root_store
|
||||||
|
.add_server_trust_anchors(&webpki_roots::TLS_SERVER_ROOTS);
|
||||||
|
|
||||||
|
rustls::ClientSession::new(&std::sync::Arc::new(ssl_config), dns_name)
|
||||||
|
};
|
||||||
|
|
||||||
// Wrap and override the TCP stream
|
// Wrap and override the TCP stream
|
||||||
self.pipeline = self.pipeline.upgrade_ssl(sess)?;
|
self.stream = self.stream.upgrade_ssl(sess)?;
|
||||||
|
|
||||||
// Send a test command
|
// Send a test command
|
||||||
self.get_network_version()?;
|
self.get_network_version()?;
|
||||||
|
@ -179,8 +195,8 @@ impl TcpConnection {
|
||||||
if self.config.debug {
|
if self.config.debug {
|
||||||
eprint!("DEBUG -> {}", line);
|
eprint!("DEBUG -> {}", line);
|
||||||
}
|
}
|
||||||
self.pipeline.write_all(line.as_bytes())?;
|
self.stream.write_all(line.as_bytes())?;
|
||||||
self.pipeline.flush()?;
|
self.stream.flush()?;
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -203,19 +219,19 @@ impl TcpConnection {
|
||||||
}
|
}
|
||||||
|
|
||||||
fn read_response(&mut self) -> crate::Result<Response> {
|
fn read_response(&mut self) -> crate::Result<Response> {
|
||||||
let mut reader = BufReader::new(&mut self.pipeline);
|
let mut reader = BufReader::new(&mut self.stream);
|
||||||
let args = Self::parse_line(&mut reader, self.config.debug)?;
|
let args = Self::parse_line(&mut reader, self.config.debug)?;
|
||||||
Response::from_args(args)
|
Response::from_args(args)
|
||||||
}
|
}
|
||||||
|
|
||||||
fn read_plain_response(&mut self) -> crate::Result<String> {
|
fn read_plain_response(&mut self) -> crate::Result<String> {
|
||||||
let mut reader = BufReader::new(&mut self.pipeline);
|
let mut reader = BufReader::new(&mut self.stream);
|
||||||
let args = Self::parse_line(&mut reader, self.config.debug)?;
|
let args = Self::parse_line(&mut reader, self.config.debug)?;
|
||||||
Ok(args.join(" "))
|
Ok(args.join(" "))
|
||||||
}
|
}
|
||||||
|
|
||||||
fn read_list(&mut self, query: &[&str]) -> crate::Result<Vec<Response>> {
|
fn read_list(&mut self, query: &[&str]) -> crate::Result<Vec<Response>> {
|
||||||
let mut reader = BufReader::new(&mut self.pipeline);
|
let mut reader = BufReader::new(&mut self.stream);
|
||||||
let args = Self::parse_line(&mut reader, self.config.debug)?;
|
let args = Self::parse_line(&mut reader, self.config.debug)?;
|
||||||
|
|
||||||
Response::from_args(args)?.expect_begin_list(query)?;
|
Response::from_args(args)?.expect_begin_list(query)?;
|
||||||
|
|
|
@ -1,29 +1,66 @@
|
||||||
use core::fmt;
|
use core::fmt;
|
||||||
|
use std::convert::{TryFrom, TryInto};
|
||||||
use std::net::{SocketAddr, ToSocketAddrs};
|
use std::net::{SocketAddr, ToSocketAddrs};
|
||||||
use std::time::Duration;
|
use std::time::Duration;
|
||||||
|
|
||||||
|
use crate::ClientError;
|
||||||
|
|
||||||
/// A host specification.
|
/// A host specification.
|
||||||
#[derive(Clone, Debug)]
|
#[derive(Clone, Debug)]
|
||||||
pub enum Host {
|
pub enum Host {
|
||||||
/// A TCP hostname and port.
|
/// A TCP hostname, and address (IP + port).
|
||||||
Tcp(SocketAddr),
|
Tcp(TcpHost),
|
||||||
// TODO: Support Unix socket streams.
|
// TODO: Support Unix socket streams.
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl Host {
|
||||||
|
/// Returns the hostname as given, if any.
|
||||||
|
pub fn hostname(&self) -> Option<String> {
|
||||||
|
match self {
|
||||||
|
Host::Tcp(host) => Some(host.hostname.to_owned()),
|
||||||
|
// _ => None,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
impl Default for Host {
|
impl Default for Host {
|
||||||
fn default() -> Self {
|
fn default() -> Self {
|
||||||
let addr = (String::from("127.0.0.1"), 3493)
|
(String::from("localhost"), 3493)
|
||||||
.to_socket_addrs()
|
.try_into()
|
||||||
.expect("Failed to create local UPS socket address. This is a bug.")
|
.expect("Failed to parse local hostname; this is a bug.")
|
||||||
.next()
|
|
||||||
.expect("Failed to create local UPS socket address. This is a bug.");
|
|
||||||
Self::Tcp(addr)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<SocketAddr> for Host {
|
impl From<SocketAddr> for Host {
|
||||||
fn from(addr: SocketAddr) -> Self {
|
fn from(addr: SocketAddr) -> Self {
|
||||||
Self::Tcp(addr)
|
let hostname = addr.ip().to_string();
|
||||||
|
Self::Tcp(TcpHost { hostname, addr })
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// A TCP address, preserving the original DNS hostname if any.
|
||||||
|
#[derive(Clone, Debug)]
|
||||||
|
pub struct TcpHost {
|
||||||
|
pub(crate) hostname: String,
|
||||||
|
pub(crate) addr: SocketAddr,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl TryFrom<(String, u16)> for Host {
|
||||||
|
type Error = ClientError;
|
||||||
|
|
||||||
|
fn try_from(hostname_port: (String, u16)) -> Result<Self, Self::Error> {
|
||||||
|
let (hostname, _) = hostname_port.clone();
|
||||||
|
let addr = hostname_port
|
||||||
|
.to_socket_addrs()
|
||||||
|
.map_err(ClientError::Io)?
|
||||||
|
.next()
|
||||||
|
.ok_or_else(|| {
|
||||||
|
ClientError::Io(std::io::Error::new(
|
||||||
|
std::io::ErrorKind::AddrNotAvailable,
|
||||||
|
"no address given",
|
||||||
|
))
|
||||||
|
})?;
|
||||||
|
Ok(Host::Tcp(TcpHost { hostname, addr }))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -59,17 +96,26 @@ pub struct Config {
|
||||||
pub(crate) auth: Option<Auth>,
|
pub(crate) auth: Option<Auth>,
|
||||||
pub(crate) timeout: Duration,
|
pub(crate) timeout: Duration,
|
||||||
pub(crate) ssl: bool,
|
pub(crate) ssl: bool,
|
||||||
|
pub(crate) ssl_insecure: bool,
|
||||||
pub(crate) debug: bool,
|
pub(crate) debug: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Config {
|
impl Config {
|
||||||
/// Creates a connection configuration.
|
/// Creates a connection configuration.
|
||||||
pub fn new(host: Host, auth: Option<Auth>, timeout: Duration, ssl: bool, debug: bool) -> Self {
|
pub fn new(
|
||||||
|
host: Host,
|
||||||
|
auth: Option<Auth>,
|
||||||
|
timeout: Duration,
|
||||||
|
ssl: bool,
|
||||||
|
ssl_insecure: bool,
|
||||||
|
debug: bool,
|
||||||
|
) -> Self {
|
||||||
Config {
|
Config {
|
||||||
host,
|
host,
|
||||||
auth,
|
auth,
|
||||||
timeout,
|
timeout,
|
||||||
ssl,
|
ssl,
|
||||||
|
ssl_insecure,
|
||||||
debug,
|
debug,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -82,6 +128,7 @@ pub struct ConfigBuilder {
|
||||||
auth: Option<Auth>,
|
auth: Option<Auth>,
|
||||||
timeout: Option<Duration>,
|
timeout: Option<Duration>,
|
||||||
ssl: Option<bool>,
|
ssl: Option<bool>,
|
||||||
|
ssl_insecure: Option<bool>,
|
||||||
debug: Option<bool>,
|
debug: Option<bool>,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -111,12 +158,24 @@ impl ConfigBuilder {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Enables SSL on the connection.
|
/// Enables SSL on the connection.
|
||||||
|
///
|
||||||
|
/// This will enable strict SSL verification (including hostname),
|
||||||
|
/// unless `.with_insecure_ssl` is also set to `true`.
|
||||||
#[cfg(feature = "ssl")]
|
#[cfg(feature = "ssl")]
|
||||||
pub fn with_ssl(mut self, ssl: bool) -> Self {
|
pub fn with_ssl(mut self, ssl: bool) -> Self {
|
||||||
self.ssl = Some(ssl);
|
self.ssl = Some(ssl);
|
||||||
self
|
self
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Turns off SSL verification.
|
||||||
|
///
|
||||||
|
/// Note: you must still use `.with_ssl(true)` to turn on SSL.
|
||||||
|
#[cfg(feature = "ssl")]
|
||||||
|
pub fn with_insecure_ssl(mut self, ssl_insecure: bool) -> Self {
|
||||||
|
self.ssl_insecure = Some(ssl_insecure);
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
/// Enables debugging network calls by printing to stderr.
|
/// Enables debugging network calls by printing to stderr.
|
||||||
pub fn with_debug(mut self, debug: bool) -> Self {
|
pub fn with_debug(mut self, debug: bool) -> Self {
|
||||||
self.debug = Some(debug);
|
self.debug = Some(debug);
|
||||||
|
@ -130,6 +189,7 @@ impl ConfigBuilder {
|
||||||
self.auth,
|
self.auth,
|
||||||
self.timeout.unwrap_or_else(|| Duration::from_secs(5)),
|
self.timeout.unwrap_or_else(|| Duration::from_secs(5)),
|
||||||
self.ssl.unwrap_or(false),
|
self.ssl.unwrap_or(false),
|
||||||
|
self.ssl_insecure.unwrap_or(false),
|
||||||
self.debug.unwrap_or(false),
|
self.debug.unwrap_or(false),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,6 +15,8 @@ pub enum NutError {
|
||||||
/// Occurs when attempting to use SSL in a transport that doesn't support it, or
|
/// Occurs when attempting to use SSL in a transport that doesn't support it, or
|
||||||
/// if the server is not configured for it.
|
/// if the server is not configured for it.
|
||||||
SslNotSupported,
|
SslNotSupported,
|
||||||
|
/// Occurs when trying to initialize a strict SSL connection with an invalid hostname.
|
||||||
|
SslInvalidHostname,
|
||||||
/// Occurs when the client used a feature that is disabled by the server.
|
/// Occurs when the client used a feature that is disabled by the server.
|
||||||
FeatureNotConfigured,
|
FeatureNotConfigured,
|
||||||
/// Generic (usually internal) client error.
|
/// Generic (usually internal) client error.
|
||||||
|
@ -29,6 +31,10 @@ impl fmt::Display for NutError {
|
||||||
Self::UnexpectedResponse => write!(f, "Unexpected server response content"),
|
Self::UnexpectedResponse => write!(f, "Unexpected server response content"),
|
||||||
Self::UnknownResponseType(ty) => write!(f, "Unknown response type: {}", ty),
|
Self::UnknownResponseType(ty) => write!(f, "Unknown response type: {}", ty),
|
||||||
Self::SslNotSupported => write!(f, "SSL not supported by server or transport"),
|
Self::SslNotSupported => write!(f, "SSL not supported by server or transport"),
|
||||||
|
Self::SslInvalidHostname => write!(
|
||||||
|
f,
|
||||||
|
"Given hostname cannot be used for a strict SSL connection"
|
||||||
|
),
|
||||||
Self::FeatureNotConfigured => write!(f, "Feature not configured by server"),
|
Self::FeatureNotConfigured => write!(f, "Feature not configured by server"),
|
||||||
Self::Generic(msg) => write!(f, "Internal client error: {}", msg),
|
Self::Generic(msg) => write!(f, "Internal client error: {}", msg),
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,40 +1,30 @@
|
||||||
use crate::Config;
|
use crate::Config;
|
||||||
|
|
||||||
/// The certificate validation mechanism for NUT.
|
/// The certificate validation mechanism that allows any certificate.
|
||||||
pub struct NutCertificateValidator {
|
pub struct InsecureCertificateValidator {
|
||||||
debug: bool,
|
debug: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl NutCertificateValidator {
|
impl InsecureCertificateValidator {
|
||||||
/// Initialize a new instance.
|
/// Initialize a new instance.
|
||||||
pub fn new(config: &Config) -> Self {
|
pub fn new(config: &Config) -> Self {
|
||||||
NutCertificateValidator {
|
InsecureCertificateValidator {
|
||||||
debug: config.debug,
|
debug: config.debug,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl rustls::ServerCertVerifier for NutCertificateValidator {
|
impl rustls::ServerCertVerifier for InsecureCertificateValidator {
|
||||||
fn verify_server_cert(
|
fn verify_server_cert(
|
||||||
&self,
|
&self,
|
||||||
_roots: &rustls::RootCertStore,
|
_roots: &rustls::RootCertStore,
|
||||||
presented_certs: &[rustls::Certificate],
|
_presented_certs: &[rustls::Certificate],
|
||||||
_dns_name: webpki::DNSNameRef<'_>,
|
_dns_name: webpki::DNSNameRef<'_>,
|
||||||
_ocsp: &[u8],
|
_ocsp: &[u8],
|
||||||
) -> Result<rustls::ServerCertVerified, rustls::TLSError> {
|
) -> Result<rustls::ServerCertVerified, rustls::TLSError> {
|
||||||
// todo: verify certificates, but not hostnames
|
|
||||||
|
|
||||||
if self.debug {
|
if self.debug {
|
||||||
let parsed = webpki::EndEntityCert::from(presented_certs[0].0.as_slice()).ok();
|
eprintln!("DEBUG <- (!) Certificate received, but not verified");
|
||||||
if let Some(_parsed) = parsed {
|
|
||||||
eprintln!("DEBUG <- Certificate received and parsed");
|
|
||||||
// todo: reading values here... https://github.com/briansmith/webpki/pull/103
|
|
||||||
} else {
|
|
||||||
eprintln!("DEBUG <- Certificate not-parseable");
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
// trust everything for now
|
|
||||||
Ok(rustls::ServerCertVerified::assertion())
|
Ok(rustls::ServerCertVerified::assertion())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -38,11 +38,11 @@ This is a clone of [`upsc`](https://networkupstools.org/docs/man/upsc.html), so
|
||||||
# Show usage
|
# Show usage
|
||||||
rupsc -h
|
rupsc -h
|
||||||
|
|
||||||
# List variables on UPS device "nutdev1" (assumes upsd running on 127.0.0.1:3493)
|
# List variables on UPS device "nutdev1" (assumes upsd running on localhost:3493)
|
||||||
rupsc nutdev1
|
rupsc nutdev1
|
||||||
|
|
||||||
# List variables on UPS device "nutdev1" (remove upsd)
|
# List variables on UPS device "nutdev1" (remote upsd)
|
||||||
rupsc nutdev1@192.168.1.2:3493
|
rupsc nutdev1@upsd.remote:3493
|
||||||
|
|
||||||
# List available UPS devices
|
# List available UPS devices
|
||||||
rupsc -l
|
rupsc -l
|
||||||
|
@ -54,14 +54,17 @@ rupsc -L
|
||||||
rupsc -c nutdev1
|
rupsc -c nutdev1
|
||||||
```
|
```
|
||||||
|
|
||||||
However, there are also some additions:
|
However, there are also some additions to the original tool:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
# Enable network debugging (global flag).
|
# Enable network debugging
|
||||||
rupsc -D
|
rupsc -D
|
||||||
|
|
||||||
# Enable SSL
|
# Enable SSL (strict verification)
|
||||||
rupsc -S
|
rupsc -S
|
||||||
|
|
||||||
|
# Enable SSL (no verification)
|
||||||
|
rupsc --insecure-ssl
|
||||||
```
|
```
|
||||||
|
|
||||||
## Pronunciation
|
## Pronunciation
|
||||||
|
|
|
@ -41,15 +41,23 @@ fn main() -> anyhow::Result<()> {
|
||||||
.arg(
|
.arg(
|
||||||
Arg::with_name("debug")
|
Arg::with_name("debug")
|
||||||
.short("D")
|
.short("D")
|
||||||
|
.long("debug")
|
||||||
.takes_value(false)
|
.takes_value(false)
|
||||||
.help("Enables debug mode (logs network commands to stderr)."),
|
.help("Enables debug mode (logs network commands to stderr)."),
|
||||||
)
|
)
|
||||||
.arg(
|
.arg(
|
||||||
Arg::with_name("ssl")
|
Arg::with_name("ssl")
|
||||||
.short("S")
|
.short("S")
|
||||||
|
.long("ssl")
|
||||||
.takes_value(false)
|
.takes_value(false)
|
||||||
.help("Enables SSL on the connection with upsd."),
|
.help("Enables SSL on the connection with upsd."),
|
||||||
)
|
)
|
||||||
|
.arg(
|
||||||
|
Arg::with_name("insecure-ssl")
|
||||||
|
.long("insecure-ssl")
|
||||||
|
.takes_value(false)
|
||||||
|
.help("Disables SSL verification on the connection with upsd."),
|
||||||
|
)
|
||||||
.arg(
|
.arg(
|
||||||
Arg::with_name("upsd-server")
|
Arg::with_name("upsd-server")
|
||||||
.required(false)
|
.required(false)
|
||||||
|
@ -70,13 +78,15 @@ fn main() -> anyhow::Result<()> {
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
let debug = args.is_present("debug");
|
let debug = args.is_present("debug");
|
||||||
let ssl = args.is_present("ssl");
|
let insecure_ssl = args.is_present("insecure-ssl");
|
||||||
|
let ssl = insecure_ssl || args.is_present("ssl");
|
||||||
|
|
||||||
let host = server.try_into()?;
|
let host = server.try_into()?;
|
||||||
let config = nut_client::ConfigBuilder::new()
|
let config = nut_client::ConfigBuilder::new()
|
||||||
.with_host(host)
|
.with_host(host)
|
||||||
.with_debug(debug)
|
.with_debug(debug)
|
||||||
.with_ssl(ssl)
|
.with_ssl(ssl)
|
||||||
|
.with_insecure_ssl(insecure_ssl)
|
||||||
.build();
|
.build();
|
||||||
|
|
||||||
if args.is_present("list") {
|
if args.is_present("list") {
|
||||||
|
|
|
@ -1,9 +1,8 @@
|
||||||
use anyhow::Context;
|
use anyhow::Context;
|
||||||
use std::convert::{TryFrom, TryInto};
|
use std::convert::{TryFrom, TryInto};
|
||||||
use std::fmt;
|
use std::fmt;
|
||||||
use std::net::ToSocketAddrs;
|
|
||||||
|
|
||||||
pub const DEFAULT_HOSTNAME: &str = "127.0.0.1";
|
pub const DEFAULT_HOSTNAME: &str = "localhost";
|
||||||
pub const DEFAULT_PORT: u16 = 3493;
|
pub const DEFAULT_PORT: u16 = 3493;
|
||||||
|
|
||||||
/// Connection information for a upsd server.
|
/// Connection information for a upsd server.
|
||||||
|
@ -69,12 +68,9 @@ impl<'a> TryInto<nut_client::Host> for UpsdName<'a> {
|
||||||
type Error = anyhow::Error;
|
type Error = anyhow::Error;
|
||||||
|
|
||||||
fn try_into(self) -> anyhow::Result<nut_client::Host> {
|
fn try_into(self) -> anyhow::Result<nut_client::Host> {
|
||||||
Ok((String::from(self.hostname), self.port)
|
(self.hostname.to_owned(), self.port)
|
||||||
.to_socket_addrs()
|
.try_into()
|
||||||
.with_context(|| "Failed to convert to SocketAddr")?
|
.with_context(|| "Invalid hostname/port")
|
||||||
.next()
|
|
||||||
.with_context(|| "Failed to convert to SocketAddr")?
|
|
||||||
.into())
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -131,7 +127,7 @@ mod tests {
|
||||||
port: DEFAULT_PORT
|
port: DEFAULT_PORT
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
assert_eq!(format!("{}", name), "ups0@127.0.0.1:3493");
|
assert_eq!(format!("{}", name), "ups0@localhost:3493");
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue