2018-05-04 13:53:29 +02:00
|
|
|
#!/usr/bin/env python3
|
2017-11-28 09:46:06 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
#
|
|
|
|
# This file is part of AIL framework - Analysis Information Leak framework
|
|
|
|
#
|
|
|
|
#
|
|
|
|
# Python script to test if the ZMQ feed works as expected
|
|
|
|
#
|
|
|
|
|
|
|
|
import sys
|
|
|
|
import zmq
|
|
|
|
|
|
|
|
port = "5556"
|
|
|
|
|
|
|
|
context = zmq.Context()
|
|
|
|
socket = context.socket(zmq.SUB)
|
|
|
|
socket.connect ("tcp://crf.circl.lu:%s" % port)
|
|
|
|
|
|
|
|
# 101 Name of the pastes only
|
|
|
|
# 102 Full pastes in raw base64(gz)
|
|
|
|
|
2018-05-04 13:53:29 +02:00
|
|
|
topicfilter = "102"
|
2018-11-22 06:57:24 +01:00
|
|
|
socket.setsockopt_string(zmq.SUBSCRIBE, topicfilter)
|
2018-05-04 13:53:29 +02:00
|
|
|
|
2017-11-28 09:46:06 +01:00
|
|
|
while True:
|
|
|
|
message = socket.recv()
|
2018-04-16 14:50:04 +02:00
|
|
|
print('b1')
|
2017-11-28 09:46:06 +01:00
|
|
|
print (message)
|
2018-05-04 13:53:29 +02:00
|
|
|
if topicfilter == "102":
|
2017-11-28 09:46:06 +01:00
|
|
|
topic, paste, messagedata = message.split()
|
2018-04-16 14:50:04 +02:00
|
|
|
print(paste, messagedata)
|
2017-11-28 09:46:06 +01:00
|
|
|
else:
|
|
|
|
print (message)
|