Markus Zolliker e416a657fd fix frappy_demo.lakeshore
reading back the target does not work properly, because
  a) the readback value might be delayed
  b) there is no command to read back the target, SETP?1
     is returning the working setpoint, which might be distinct
     in case of a ramp

Change-Id: I0da2dbfc1a8ddbecbae6d0456ff64e008bc56336
Reviewed-on: https://forge.frm2.tum.de/review/c/secop/frappy/+/31983
Tested-by: Jenkins Automated Tests <pedersen+jenkins@frm2.tum.de>
Reviewed-by: Markus Zolliker <markus.zolliker@psi.ch>
2023-09-14 08:59:13 +02:00
2023-06-21 08:33:22 +02:00
2023-06-20 14:38:00 +02:00
2023-09-14 08:59:13 +02:00
2023-05-25 09:31:16 +02:00
2023-09-14 08:59:13 +02:00
2023-09-14 08:48:16 +02:00
2023-03-14 14:24:11 +01:00
2023-07-03 08:29:53 +02:00
2023-01-24 10:56:39 +01:00
2022-11-08 17:44:58 +01:00
2023-06-14 13:36:13 +02:00
2023-03-14 08:20:03 +01:00
2023-06-30 08:15:11 +02:00
2022-11-09 16:29:29 +01:00
2023-01-18 16:24:30 +01:00
2023-03-21 13:27:20 +01:00
2022-11-09 16:29:29 +01:00

Frappy: Framework for programming secnodes in Python

Frappy is a Python-framework for writing SECoP servers (called SECNodes or Nodes) and Clients. It comes with its own Graphical client and a collection of example Nodes. It is able to use TCP and Serial connections.

To get started, look at the provided demo, the provided examples, or have a look at the INTRODUCTION section.

Main development is done here and a readonly GitHub-mirror for easier access is available here.

Requirements

See requirements.txt.

Demo

Use the following command after installing the dependencies:

$ make demo

Documentation

See here for documentation of Frappy

Description
PSI local frappy repo, probably ahead of git/gerrit at MLZ
Readme 11 MiB
Languages
Python 99.9%