mirror of
https://github.com/slsdetectorgroup/slsDetectorPackage.git
synced 2025-06-14 13:57:13 +02:00
rx tests
This commit is contained in:
@ -5,6 +5,7 @@
|
|||||||
#include <sstream>
|
#include <sstream>
|
||||||
|
|
||||||
#include "tests/globals.h"
|
#include "tests/globals.h"
|
||||||
|
#include "versionAPI.h"
|
||||||
|
|
||||||
using sls::CmdProxy;
|
using sls::CmdProxy;
|
||||||
using sls::Detector;
|
using sls::Detector;
|
||||||
@ -44,6 +45,50 @@ rx_zmqport
|
|||||||
|
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
TEST_CASE("rx_version", "[.cmd]") {
|
||||||
|
Detector det;
|
||||||
|
CmdProxy proxy(&det);
|
||||||
|
std::ostringstream oss;
|
||||||
|
proxy.Call("rx_version", {}, -1, GET, oss);
|
||||||
|
std::ostringstream vs;
|
||||||
|
vs << "rx_version 0x" << std::hex << APIRECEIVER << '\n';
|
||||||
|
REQUIRE(oss.str() == vs.str());
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST_CASE("rx_start", "[.cmd]") {
|
||||||
|
Detector det;
|
||||||
|
CmdProxy proxy(&det);
|
||||||
|
//PUT only command
|
||||||
|
REQUIRE_THROWS(proxy.Call("rx_start", {}, -1, GET));
|
||||||
|
{
|
||||||
|
std::ostringstream oss;
|
||||||
|
proxy.Call("rx_start", {}, -1, PUT, oss);
|
||||||
|
REQUIRE(oss.str() == "rx_start successful\n");
|
||||||
|
}
|
||||||
|
{
|
||||||
|
std::ostringstream oss;
|
||||||
|
proxy.Call("rx_status", {}, -1, GET, oss);
|
||||||
|
REQUIRE(oss.str() == "rx_status running\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST_CASE("rx_stop", "[.cmd]") {
|
||||||
|
Detector det;
|
||||||
|
CmdProxy proxy(&det);
|
||||||
|
//PUT only command
|
||||||
|
REQUIRE_THROWS(proxy.Call("rx_stop", {}, -1, GET));
|
||||||
|
{
|
||||||
|
std::ostringstream oss;
|
||||||
|
proxy.Call("rx_stop", {}, -1, PUT, oss);
|
||||||
|
REQUIRE(oss.str() == "rx_stop successful\n");
|
||||||
|
}
|
||||||
|
{
|
||||||
|
std::ostringstream oss;
|
||||||
|
proxy.Call("rx_status", {}, -1, GET, oss);
|
||||||
|
REQUIRE(oss.str() == "rx_status idle\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
TEST_CASE("rx_missingpackets", "[.cmd]") {
|
TEST_CASE("rx_missingpackets", "[.cmd]") {
|
||||||
// TODO! This only tests for no crash how can we test
|
// TODO! This only tests for no crash how can we test
|
||||||
// for correct values?
|
// for correct values?
|
||||||
@ -165,20 +210,28 @@ TEST_CASE("rx_jsonaddheader", "[.cmd]") {
|
|||||||
}
|
}
|
||||||
|
|
||||||
TEST_CASE("rx_udpsocksize", "[.cmd]") {
|
TEST_CASE("rx_udpsocksize", "[.cmd]") {
|
||||||
// TODO! Is the real socket size always twice?
|
|
||||||
Detector det;
|
Detector det;
|
||||||
CmdProxy proxy(&det);
|
CmdProxy proxy(&det);
|
||||||
|
|
||||||
{
|
{
|
||||||
std::ostringstream oss;
|
std::ostringstream oss;
|
||||||
proxy.Call("rx_udpsocksize", {"4857600"}, -1, PUT, oss);
|
proxy.Call("rx_udpsocksize", {"4857600"}, -1, PUT, oss);
|
||||||
REQUIRE(oss.str() == "rx_udpsocksize 4857600\n");
|
REQUIRE(oss.str() == "rx_udpsocksize 4857600\n");
|
||||||
}
|
}
|
||||||
uint64_t val = 0;
|
|
||||||
{
|
{
|
||||||
std::ostringstream oss;
|
std::ostringstream oss;
|
||||||
proxy.Call("rx_udpsocksize", {}, -1, GET, oss);
|
proxy.Call("rx_udpsocksize", {}, -1, GET, oss);
|
||||||
REQUIRE(oss.str() == "rx_udpsocksize 4857600\n");
|
REQUIRE(oss.str() == "rx_udpsocksize 4857600\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST_CASE("rx_realudpsocksize", "[.cmd]") {
|
||||||
|
// TODO! Is the real socket size always twice?
|
||||||
|
Detector det;
|
||||||
|
CmdProxy proxy(&det);
|
||||||
|
uint64_t val = 0;
|
||||||
|
{
|
||||||
|
std::ostringstream oss;
|
||||||
|
proxy.Call("rx_udpsocksize", {}, -1, GET, oss);
|
||||||
std::string s = (oss.str()).erase(0, strlen("rx_udpsocksize "));
|
std::string s = (oss.str()).erase(0, strlen("rx_udpsocksize "));
|
||||||
val = std::stol(s);
|
val = std::stol(s);
|
||||||
}
|
}
|
||||||
@ -326,45 +379,49 @@ TEST_CASE("rx_lock", "[.cmd]") {
|
|||||||
// }
|
// }
|
||||||
// }
|
// }
|
||||||
|
|
||||||
// TEST_CASE("rx_datastream", "[.cmd]") {
|
TEST_CASE("rx_datastream", "[.cmd]") {
|
||||||
// {
|
Detector det;
|
||||||
// std::ostringstream oss;
|
CmdProxy proxy(&det);
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_datastream 1", PUT,
|
{
|
||||||
// nullptr, oss)); REQUIRE(oss.str() == "rx_datastream 1\n");
|
std::ostringstream oss;
|
||||||
// }
|
proxy.Call("rx_datastream", {"1"}, -1, PUT, oss);
|
||||||
// {
|
REQUIRE(oss.str() == "rx_datastream 1\n");
|
||||||
// std::ostringstream oss;
|
REQUIRE(det.getRxZmqDataStream().squash() == true);
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("0:rx_datastream", GET,
|
}
|
||||||
// nullptr, oss)); REQUIRE(oss.str() == "rx_datastream 1\n");
|
{
|
||||||
// }
|
std::ostringstream oss;
|
||||||
// {
|
proxy.Call("rx_datastream", {}, -1, GET, oss);
|
||||||
// std::ostringstream oss;
|
REQUIRE(oss.str() == "rx_datastream 1\n");
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_datastream 0", PUT,
|
}
|
||||||
// nullptr, oss)); REQUIRE(oss.str() == "rx_datastream 0\n");
|
{
|
||||||
// }
|
std::ostringstream oss;
|
||||||
// }
|
proxy.Call("rx_datastream", {"0"}, -1, PUT, oss);
|
||||||
|
REQUIRE(oss.str() == "rx_datastream 0\n");
|
||||||
|
REQUIRE(det.getRxZmqDataStream().squash() == false);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// TEST_CASE("rx_tcpport", "[.cmd]") {
|
TEST_CASE("rx_tcpport", "[.cmd]") {
|
||||||
// multiSlsDetector d;
|
Detector det;
|
||||||
// int port = 3500;
|
CmdProxy proxy(&det);
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_tcpport " +
|
|
||||||
// std::to_string(port), PUT)); for (int i = 0; i != d.size(); ++i) {
|
int port = 3500;
|
||||||
// std::ostringstream oss;
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient(std::to_string(i) +
|
proxy.Call("rx_tcpport", {std::to_string(port)}, -1, PUT);
|
||||||
// ":rx_tcpport", GET, nullptr, oss)); REQUIRE(oss.str() == "rx_tcpport
|
for (int i = 0; i != det.size(); ++i) {
|
||||||
// " + std::to_string(port + i) + '\n');
|
std::ostringstream oss;
|
||||||
// }
|
proxy.Call("rx_tcpport", {}, -1, GET, oss);
|
||||||
// REQUIRE_THROWS(multiSlsDetectorClient("rx_tcpport 15", PUT));
|
REQUIRE(oss.str() == "rx_tcpport " + std::to_string(port + i) + '\n');
|
||||||
// port = 1954;
|
}
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_tcpport " +
|
REQUIRE_THROWS(proxy.Call("rx_tcpport", {"15"}, -1, PUT));
|
||||||
// std::to_string(port), PUT)); for (int i = 0; i != d.size(); ++i) {
|
port = 1954;
|
||||||
// std::ostringstream oss;
|
proxy.Call("rx_tcpport", {std::to_string(port)}, -1, PUT);
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient(std::to_string(i) +
|
for (int i = 0; i != det.size(); ++i) {
|
||||||
// ":rx_tcpport", GET, nullptr, oss)); REQUIRE(oss.str() == "rx_tcpport
|
std::ostringstream oss;
|
||||||
// " + std::to_string(port + i) + '\n');
|
proxy.Call("rx_tcpport", {}, -1, GET, oss);
|
||||||
// }
|
REQUIRE(oss.str() == "rx_tcpport " + std::to_string(port + i) + '\n');
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_tcpport 1954", PUT));
|
}
|
||||||
// }
|
}
|
||||||
|
|
||||||
// TEST_CASE("rx_zmqip", "[.cmd]") {
|
// TEST_CASE("rx_zmqip", "[.cmd]") {
|
||||||
// std::string s;
|
// std::string s;
|
||||||
|
@ -3299,53 +3299,7 @@ TEST_CASE("stopport", "[.cmd]") {
|
|||||||
// }
|
// }
|
||||||
// }
|
// }
|
||||||
|
|
||||||
// TEST_CASE("rx_zmqport", "[.cmd]") {
|
|
||||||
// multiSlsDetector d;
|
|
||||||
// int socketsperdetector = 1;
|
|
||||||
// if (test::type == slsDetectorDefs::EIGER) {
|
|
||||||
// socketsperdetector *= 2;
|
|
||||||
// } else if (test::type == slsDetectorDefs::JUNGFRAU) {
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("numinterfaces 2", PUT));
|
|
||||||
// socketsperdetector *= 2;
|
|
||||||
// }
|
|
||||||
// int port = 3500;
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_zmqport " +
|
|
||||||
// std::to_string(port), PUT)); for (int i = 0; i != d.size(); ++i) {
|
|
||||||
// std::ostringstream oss;
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient(std::to_string(i) +
|
|
||||||
// ":rx_zmqport", GET, nullptr, oss)); REQUIRE(oss.str() == "rx_zmqport
|
|
||||||
// " + std::to_string(port + i * socketsperdetector) + '\n');
|
|
||||||
// }
|
|
||||||
// port = 30001;
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_zmqport " +
|
|
||||||
// std::to_string(port), PUT)); for (int i = 0; i != d.size(); ++i) {
|
|
||||||
// std::ostringstream oss;
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient(std::to_string(i) +
|
|
||||||
// ":rx_zmqport", GET, nullptr, oss)); REQUIRE(oss.str() == "rx_zmqport
|
|
||||||
// " + std::to_string(port + i * socketsperdetector) + '\n');
|
|
||||||
// }
|
|
||||||
// if (test::type == slsDetectorDefs::JUNGFRAU) {
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("numinterfaces 1", PUT));
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
|
|
||||||
// TEST_CASE("rx_datastream", "[.cmd]") {
|
|
||||||
// {
|
|
||||||
// std::ostringstream oss;
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_datastream 1", PUT,
|
|
||||||
// nullptr, oss)); REQUIRE(oss.str() == "rx_datastream 1\n");
|
|
||||||
// }
|
|
||||||
// {
|
|
||||||
// std::ostringstream oss;
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("0:rx_datastream", GET,
|
|
||||||
// nullptr, oss)); REQUIRE(oss.str() == "rx_datastream 1\n");
|
|
||||||
// }
|
|
||||||
// {
|
|
||||||
// std::ostringstream oss;
|
|
||||||
// REQUIRE_NOTHROW(multiSlsDetectorClient("rx_datastream 0", PUT,
|
|
||||||
// nullptr, oss)); REQUIRE(oss.str() == "rx_datastream 0\n");
|
|
||||||
// }
|
|
||||||
// }
|
|
||||||
|
|
||||||
// TEST_CASE("fpath", "[.cmd]") {
|
// TEST_CASE("fpath", "[.cmd]") {
|
||||||
// std::string s;
|
// std::string s;
|
||||||
|
Reference in New Issue
Block a user