1
0
Fork 0
hscloud/dc/cmc-proxy
q3k 61594bb088 go/svc/(dc stuff) -> dc/
We want to start keeping codebases separated per 'team'/intent, to then
have simple OWNER files/trees to specify review rules.

This means dc/ stuff can all be OWNED by q3k, and review will only
involve a +1 for style/readability, instead  of a +2 for approval.

Change-Id: I05afbc4e1018944b841ec0d88cd24cc95bec8bf1
2019-07-21 15:20:51 +02:00
..
proto go/svc/(dc stuff) -> dc/ 2019-07-21 15:20:51 +02:00
BUILD.bazel go/svc/(dc stuff) -> dc/ 2019-07-21 15:20:51 +02:00
README.md go/svc/(dc stuff) -> dc/ 2019-07-21 15:20:51 +02:00
client.go go/svc/(dc stuff) -> dc/ 2019-07-21 15:20:51 +02:00
main.go go/svc/(dc stuff) -> dc/ 2019-07-21 15:20:51 +02:00

README.md

Dell M1000e gRPC Proxy

Cursedness level: 6.5/10 (regexp XML parsing, JSONP scraping, limited sessions).

This is a small gRPC proxy to allow programmatic access to a Dell M1000e Chassis Management Controller. It's based on scraping the web interface, as the alternative (WSMAN) is even more ridiculous.

Functionality

The only feature supported so far is getting information for an iDRAC KVM console. This can be used to run a iDRAC KVM proxy (to be implemented), or the original client.

Usage

./cmc-proxy -h

Flags are self-explanatory. The proxy listens on gRPC and a status HTTP debug server.

Example

$ grpc-dev -d '{"blade_num": 6}' cmc.q3k.svc.cluster.local:4200 proto.CMCProxy.GetKVMData
{
  "arguments": [
    "10.10.10.16:443",
    "5901",
    "oojo2obohhaWiu3A",
    "1",
    "0",
    "3668",
    "3669",
    "511",
    "5900",
    "1",
    "EN"
  ]
}