AIL-framework/bin/feeder/test-zmq.py

34 lines
692 B
Python
Raw Normal View History

2018-05-04 13:53:29 +02:00
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# This file is part of AIL framework - Analysis Information Leak framework
#
#
# Python script to test if the ZMQ feed works as expected
#
import sys
import zmq
port = "5556"
context = zmq.Context()
socket = context.socket(zmq.SUB)
socket.connect ("tcp://crf.circl.lu:%s" % port)
# 101 Name of the pastes only
# 102 Full pastes in raw base64(gz)
2018-05-04 13:53:29 +02:00
topicfilter = "102"
socket.setsockopt(zmq.SUBSCRIBE, topicfilter)
2018-05-04 13:53:29 +02:00
while True:
message = socket.recv()
2018-04-16 14:50:04 +02:00
print('b1')
print (message)
2018-05-04 13:53:29 +02:00
if topicfilter == "102":
topic, paste, messagedata = message.split()
2018-04-16 14:50:04 +02:00
print(paste, messagedata)
else:
print (message)