stupid doctests
Some checks failed
Rust/sat-rs/pipeline/pr-main There was a failure building this commit

This commit is contained in:
Robin Müller 2023-09-20 11:45:27 +02:00
parent 22254e4bbe
commit 3aba6b4276
Signed by: muellerr
GPG Key ID: A649FB78196E3849
2 changed files with 152 additions and 1 deletions

View File

@ -105,6 +105,153 @@ impl<TmError, TcError> TcpTmSender<TmError, TcError> for CobsTmSender {
/// packets even from a data stream which is split up. The server wil use the /// packets even from a data stream which is split up. The server wil use the
/// [parse_buffer_for_cobs_encoded_packets] function to parse for packets and pass them to a /// [parse_buffer_for_cobs_encoded_packets] function to parse for packets and pass them to a
/// generic TC receiver. /// generic TC receiver.
///
/// ## Example
///
/// ```
/// use core::{
/// sync::atomic::{AtomicBool, Ordering},
/// time::Duration,
/// };
/// use std::{
/// io::{Read, Write},
/// net::{IpAddr, Ipv4Addr, SocketAddr, TcpStream},
/// sync::Mutex,
/// thread,
/// };
///
/// use satrs_core::{
/// hal::std::tcp_server::{ServerConfig, TcpTmtcInCobsServer},
/// tmtc::{ReceivesTcCore, TmPacketSourceCore},
/// };
/// use std::{boxed::Box, collections::VecDeque, sync::Arc, vec::Vec};
/// use cobs::encode;
///
/// #[derive(Default, Clone)]
/// struct SyncTcCacher {
/// tc_queue: Arc<Mutex<VecDeque<Vec<u8>>>>,
/// }
/// impl ReceivesTcCore for SyncTcCacher {
/// type Error = ();
///
/// fn pass_tc(&mut self, tc_raw: &[u8]) -> Result<(), Self::Error> {
/// let mut tc_queue = self.tc_queue.lock().expect("tc forwarder failed");
/// tc_queue.push_back(tc_raw.to_vec());
/// Ok(())
/// }
/// }
///
/// #[derive(Default, Clone)]
/// struct SyncTmSource {
/// tm_queue: Arc<Mutex<VecDeque<Vec<u8>>>>,
/// }
///
/// impl SyncTmSource {
/// pub(crate) fn add_tm(&mut self, tm: &[u8]) {
/// let mut tm_queue = self.tm_queue.lock().expect("locking tm queue failec");
/// tm_queue.push_back(tm.to_vec());
/// }
/// }
///
/// impl TmPacketSourceCore for SyncTmSource {
/// type Error = ();
///
/// fn retrieve_packet(&mut self, buffer: &mut [u8]) -> Result<usize, Self::Error> {
/// let mut tm_queue = self.tm_queue.lock().expect("locking tm queue failed");
/// if !tm_queue.is_empty() {
/// let next_vec = tm_queue.front().unwrap();
/// if buffer.len() < next_vec.len() {
/// panic!(
/// "provided buffer too small, must be at least {} bytes",
/// next_vec.len()
/// );
/// }
/// let next_vec = tm_queue.pop_front().unwrap();
/// buffer[0..next_vec.len()].copy_from_slice(&next_vec);
/// return Ok(next_vec.len());
/// }
/// Ok(0)
/// }
/// }
///
/// fn encode_simple_packet(encoded_buf: &mut [u8], current_idx: &mut usize) {
/// encoded_buf[*current_idx] = 0;
/// *current_idx += 1;
/// *current_idx += encode(&SIMPLE_PACKET, &mut encoded_buf[*current_idx..]);
/// encoded_buf[*current_idx] = 0;
/// *current_idx += 1;
/// }
///
/// const SIMPLE_PACKET: [u8; 5] = [1, 2, 3, 4, 5];
/// const INVERTED_PACKET: [u8; 5] = [5, 4, 3, 4, 1];
///
/// let auto_port_addr = SocketAddr::new(IpAddr::V4(Ipv4Addr::new(127, 0, 0, 1)), 0);
/// let tc_receiver = SyncTcCacher::default();
/// let tm_source = SyncTmSource::default();
/// let mut tcp_server = TcpTmtcInCobsServer::new(
/// ServerConfig::new(auto_port_addr, Duration::from_millis(2), 1024, 1024),
/// Box::new(tm_source),
/// Box::new(tc_receiver.clone()),
/// ).expect("TCP server generation failed");
/// let dest_addr = tcp_server.local_addr().expect("retrieving dest addr failed");
/// let conn_handled: Arc<AtomicBool> = Default::default();
/// let set_if_done = conn_handled.clone();
///
/// // Call the connection handler in separate thread, does block.
/// thread::spawn(move || {
/// let result = tcp_server.handle_next_connection();
/// if result.is_err() {
/// panic!("handling connection failed: {:?}", result.unwrap_err());
/// }
/// let conn_result = result.unwrap();
/// assert_eq!(conn_result.num_received_tcs, 1);
/// assert_eq!(conn_result.num_sent_tms, 1);
/// set_if_done.store(true, Ordering::Relaxed);
/// });
///
/// // Send TC to server now.
/// let mut encoded_buf: [u8; 16] = [0; 16];
/// let mut current_idx = 0;
/// encode_simple_packet(&mut encoded_buf, &mut current_idx);
/// let mut stream = TcpStream::connect(dest_addr).expect("connecting to TCP server failed");
/// stream
/// .write_all(&encoded_buf[..current_idx])
/// .expect("writing to TCP server failed");
/// // Done with writing.
/// stream
/// .shutdown(std::net::Shutdown::Write)
/// .expect("shutting down write failed");
/// let mut read_buf: [u8; 16] = [0; 16];
/// let read_len = stream.read(&mut read_buf).expect("read failed");
/// drop(stream);
///
/// // 1 byte encoding overhead, 2 sentinel bytes.
/// assert_eq!(read_len, 8);
/// assert_eq!(read_buf[0], 0);
/// assert_eq!(read_buf[read_len - 1], 0);
/// let decoded_len =
/// cobs::decode_in_place(&mut read_buf[1..read_len]).expect("COBS decoding failed");
/// assert_eq!(decoded_len, 5);
/// // Skip first sentinel byte.
/// assert_eq!(&read_buf[1..1 + INVERTED_PACKET.len()], &INVERTED_PACKET);
/// // A certain amount of time is allowed for the transaction to complete.
/// for _ in 0..3 {
/// if !conn_handled.load(Ordering::Relaxed) {
/// thread::sleep(Duration::from_millis(5));
/// }
/// }
/// if !conn_handled.load(Ordering::Relaxed) {
/// panic!("connection was not handled properly");
/// }
/// // Check that the packet was received and decoded successfully.
/// let mut tc_queue = tc_receiver
/// .tc_queue
/// .lock()
/// .expect("locking tc queue failed");
/// assert_eq!(tc_queue.len(), 1);
/// assert_eq!(tc_queue.pop_front().unwrap(), &SIMPLE_PACKET);
/// drop(tc_queue);
/// ```
pub struct TcpTmtcInCobsServer<TmError, TcError: 'static> { pub struct TcpTmtcInCobsServer<TmError, TcError: 'static> {
generic_server: TcpTmtcGenericServer<TmError, TcError, CobsTmSender, CobsTcParser>, generic_server: TcpTmtcGenericServer<TmError, TcError, CobsTmSender, CobsTcParser>,
} }
@ -335,6 +482,8 @@ mod tests {
.expect("shutting down write failed"); .expect("shutting down write failed");
let mut read_buf: [u8; 16] = [0; 16]; let mut read_buf: [u8; 16] = [0; 16];
let read_len = stream.read(&mut read_buf).expect("read failed"); let read_len = stream.read(&mut read_buf).expect("read failed");
drop(stream);
// 1 byte encoding overhead, 2 sentinel bytes. // 1 byte encoding overhead, 2 sentinel bytes.
assert_eq!(read_len, 8); assert_eq!(read_len, 8);
assert_eq!(read_buf[0], 0); assert_eq!(read_buf[0], 0);
@ -345,7 +494,6 @@ mod tests {
// Skip first sentinel byte. // Skip first sentinel byte.
assert_eq!(&read_buf[1..1 + INVERTED_PACKET.len()], &INVERTED_PACKET); assert_eq!(&read_buf[1..1 + INVERTED_PACKET.len()], &INVERTED_PACKET);
drop(stream);
// A certain amount of time is allowed for the transaction to complete. // A certain amount of time is allowed for the transaction to complete.
for _ in 0..3 { for _ in 0..3 {
if !conn_handled.load(Ordering::Relaxed) { if !conn_handled.load(Ordering::Relaxed) {

View File

@ -99,3 +99,6 @@ pub fn parse_buffer_for_ccsds_space_packets<E>(
} }
Ok(packets_found) Ok(packets_found)
} }
#[cfg(test)]
mod tests {}