me.seq = _pingseq
_pingseq += 1
me._failures = 0
+ me._sabotage = False
me._last = '-'
me._nping = 0
me._nlost = 0
S.forcekx(me._peer)
T.spawn(run_connect, peer, peer.get('connect'))
me._timer = M.SelTimer(time() + me._every, me._time)
+ me._sabotage = False
else:
S.kill(me._peer)
elif stuff[0] == 'ping-send-failed':
me._reconnect()
elif code == 'INFO':
- if stuff[0] == 'ping-ok':
+ outcome = stuff[0]
+ if outcome == 'ping-ok' and me._sabotage:
+ outcome = 'ping-timeout'
+ if outcome == 'ping-ok':
if me._failures > 0:
S.warn('connect', 'ping-ok', me._peer)
t = float(stuff[1])
if me._min == '-' or t < me._min: me._min = t
if me._max == '-' or t > me._max: me._max = t
me._timer = M.SelTimer(time() + me._every, me._time)
- elif stuff[0] == 'ping-timeout':
+ elif outcome == 'ping-timeout':
me._failures += 1
me._nlost += 1
S.warn('connect', 'ping-timeout', me._peer,
me._last = 'timeout'
else:
me._reconnect()
- elif stuff[0] == 'ping-peer-died':
+ me._last = 'reconnect'
+ elif outcome == 'ping-peer-died':
me._pinger.kill(me._peer)
+ def sabotage(me):
+ """Sabotage the peer, for testing purposes."""
+ me._sabotage = True
+ if me._timer: me._timer.kill()
+ T.defer(me._time)
+
def info(me):
if not me._nping:
mean = sd = '-'
finally:
del chalmap[chal]
+def cmd_sabotage(name):
+ """
+ sabotage NAME: Sabotage the NAMEd peer so that we think it can't be pinged.
+ """
+ try: pp = pinger.find(name)
+ except KeyError: raise T.TripeJobError('unknown-peer', name)
+ pp.sabotage()
+
###--------------------------------------------------------------------------
### Start up.
'active': (1, 1, 'PEER', cmd_active),
'info': (1, 1, 'PEER', cmd_info),
'list-active': (0, 0, '', cmd_listactive),
- 'userpeer': (1, 1, 'USER', cmd_userpeer)
+ 'userpeer': (1, 1, 'USER', cmd_userpeer),
+ 'sabotage': (1, 1, 'PEER', cmd_sabotage)
})]
if __name__ == '__main__':