use crate::pool::{LocalPool, StoreAddr, StoreError}; use alloc::boxed::Box; use alloc::sync::Arc; use alloc::vec; use alloc::vec::Vec; use core::marker::PhantomData; use core::mem::size_of; use delegate::delegate; use downcast_rs::{impl_downcast, Downcast}; use spacepackets::ecss::{EcssEnumeration, PusError}; use spacepackets::tc::PusTc; use spacepackets::time::{CcsdsTimeProvider, TimestampError}; use spacepackets::tm::{PusTm, PusTmSecondaryHeader}; use spacepackets::{ByteConversionError, SizeMissmatch, SpHeader}; use spacepackets::{CcsdsPacket, PacketId, PacketSequenceCtrl}; #[cfg(feature = "std")] use std::sync::mpsc::SendError; #[cfg(feature = "std")] use std::sync::MutexGuard; #[cfg(feature = "std")] use std::sync::{mpsc, Mutex}; #[derive(Debug, Eq, PartialEq, Copy, Clone)] pub struct RequestId { version_number: u8, packet_id: PacketId, psc: PacketSequenceCtrl, } impl RequestId { const SIZE_AS_BYTES: usize = size_of::(); pub fn to_bytes(&self, buf: &mut [u8]) { let raw = ((self.version_number as u32) << 29) | ((self.packet_id.raw() as u32) << 16) | self.psc.raw() as u32; buf.copy_from_slice(raw.to_be_bytes().as_slice()); } pub fn from_bytes(buf: &[u8]) -> Option { if buf.len() < 4 { return None; } let raw = u32::from_be_bytes(buf[0..Self::SIZE_AS_BYTES].try_into().unwrap()); Some(Self { version_number: ((raw >> 29) & 0b111) as u8, packet_id: PacketId::from(((raw >> 16) & 0xffff) as u16), psc: PacketSequenceCtrl::from((raw & 0xffff) as u16), }) } } impl RequestId { pub fn new(tc: &PusTc) -> Self { RequestId { version_number: tc.ccsds_version(), packet_id: tc.packet_id(), psc: tc.psc(), } } } #[derive(Debug, Clone)] pub enum VerificationError { SendError(E), TimeStampError(TimestampError), ByteConversionError(ByteConversionError), PusError(PusError), } #[derive(Debug, Clone)] pub struct VerificationErrorWithToken(VerificationError, VerificationToken); pub trait VerificationSender: Downcast { fn send_verification_tm(&mut self, tm: PusTm) -> Result<(), VerificationError>; } impl_downcast!(VerificationSender); #[derive(Debug, Clone, Copy)] pub struct VerificationToken { state: PhantomData, req_id: RequestId, } #[derive(Copy, Clone, Debug)] pub struct StateNone; #[derive(Copy, Clone, Debug)] pub struct StateAccepted; #[derive(Copy, Clone, Debug)] pub struct StateStarted; impl VerificationToken { fn new(req_id: RequestId) -> VerificationToken { VerificationToken { state: PhantomData, req_id, } } } pub struct VerificationReporterCfg { pub apid: u16, pub dest_id: u16, pub step_field_width: u8, pub failure_code_field_width: u8, pub max_fail_data_len: usize, pub max_stamp_len: usize, } impl VerificationReporterCfg { pub fn new(time_stamper: impl CcsdsTimeProvider, apid: u16) -> Self { let max_stamp_len = time_stamper.len_as_bytes(); Self { apid, dest_id: 0, step_field_width: size_of::() as u8, failure_code_field_width: size_of::() as u8, max_fail_data_len: 2 * size_of::(), max_stamp_len, } } } pub struct FailParams<'a> { time_stamp: &'a [u8], failure_code: &'a dyn EcssEnumeration, failure_data: Option<&'a [u8]>, } impl<'a> FailParams<'a> { pub fn new( time_stamp: &'a [u8], failure_code: &'a impl EcssEnumeration, failure_data: Option<&'a [u8]>, ) -> Self { Self { time_stamp, failure_code, failure_data, } } } pub struct FailParamsWithStep<'a> { bp: FailParams<'a>, step: &'a dyn EcssEnumeration, } impl<'a> FailParamsWithStep<'a> { pub fn new( time_stamp: &'a [u8], step: &'a impl EcssEnumeration, failure_code: &'a impl EcssEnumeration, failure_data: Option<&'a [u8]>, ) -> Self { Self { bp: FailParams::new(time_stamp, failure_code, failure_data), step, } } } pub struct VerificationReporter { pub apid: u16, pub dest_id: u16, msg_count: u16, source_data_buf: Vec, } impl VerificationReporter { pub fn new(cfg: VerificationReporterCfg) -> Self { Self { apid: cfg.apid, dest_id: cfg.dest_id, msg_count: 0, source_data_buf: vec![ 0; RequestId::SIZE_AS_BYTES + cfg.step_field_width as usize + cfg.failure_code_field_width as usize + cfg.max_fail_data_len ], } } pub fn add_tc(&mut self, pus_tc: &PusTc) -> VerificationToken { self.add_tc_with_req_id(RequestId::new(pus_tc)) } pub fn add_tc_with_req_id(&mut self, req_id: RequestId) -> VerificationToken { VerificationToken::::new(req_id) } pub fn acceptance_success( &mut self, token: VerificationToken, sender: &mut (impl VerificationSender + ?Sized), time_stamp: &[u8], ) -> Result, VerificationErrorWithToken> { let tm = self .create_pus_verif_success_tm( 1, 1, &token.req_id, time_stamp, None::<&dyn EcssEnumeration>, ) .map_err(|e| VerificationErrorWithToken(e, token))?; sender .send_verification_tm(tm) .map_err(|e| VerificationErrorWithToken(e, token))?; self.msg_count += 1; Ok(VerificationToken { state: PhantomData, req_id: token.req_id, }) } pub fn acceptance_failure( mut self, token: VerificationToken, sender: &mut (impl VerificationSender + ?Sized), params: FailParams, ) -> Result<(), VerificationErrorWithToken> { let tm = self .create_pus_verif_fail_tm(1, 2, &token.req_id, None::<&dyn EcssEnumeration>, ¶ms) .map_err(|e| VerificationErrorWithToken(e, token))?; sender .send_verification_tm(tm) .map_err(|e| VerificationErrorWithToken(e, token))?; self.msg_count += 1; Ok(()) } pub fn start_success( &mut self, token: VerificationToken, sender: &mut (impl VerificationSender + ?Sized), time_stamp: &[u8], ) -> Result, VerificationErrorWithToken> { let tm = self .create_pus_verif_success_tm( 1, 3, &token.req_id, time_stamp, None::<&dyn EcssEnumeration>, ) .map_err(|e| VerificationErrorWithToken(e, token))?; sender .send_verification_tm(tm) .map_err(|e| VerificationErrorWithToken(e, token))?; self.msg_count += 1; Ok(VerificationToken { state: PhantomData, req_id: token.req_id, }) } pub fn start_failure( &mut self, token: VerificationToken, sender: &mut (impl VerificationSender + ?Sized), params: FailParams, ) -> Result<(), VerificationErrorWithToken> { let tm = self .create_pus_verif_fail_tm(1, 4, &token.req_id, None::<&dyn EcssEnumeration>, ¶ms) .map_err(|e| VerificationErrorWithToken(e, token))?; sender .send_verification_tm(tm) .map_err(|e| VerificationErrorWithToken(e, token))?; self.msg_count += 1; Ok(()) } pub fn step_success( &mut self, token: &VerificationToken, sender: &mut (impl VerificationSender + ?Sized), time_stamp: &[u8], step: impl EcssEnumeration, ) -> Result<(), VerificationError> { let tm = self.create_pus_verif_success_tm(1, 5, &token.req_id, time_stamp, Some(&step))?; sender.send_verification_tm(tm)?; self.msg_count += 1; Ok(()) } pub fn step_failure( &mut self, token: VerificationToken, sender: &mut (impl VerificationSender + ?Sized), params: FailParamsWithStep, ) -> Result<(), VerificationErrorWithToken> { let tm = self .create_pus_verif_fail_tm(1, 6, &token.req_id, Some(params.step), ¶ms.bp) .map_err(|e| VerificationErrorWithToken(e, token))?; sender .send_verification_tm(tm) .map_err(|e| VerificationErrorWithToken(e, token))?; self.msg_count += 1; Ok(()) } pub fn completion_success( &mut self, token: VerificationToken, sender: &mut (impl VerificationSender + ?Sized), time_stamp: &[u8], ) -> Result<(), VerificationErrorWithToken> { let tm = self .create_pus_verif_success_tm( 1, 7, &token.req_id, time_stamp, None::<&dyn EcssEnumeration>, ) .map_err(|e| VerificationErrorWithToken(e, token))?; sender .send_verification_tm(tm) .map_err(|e| VerificationErrorWithToken(e, token))?; self.msg_count += 1; Ok(()) } pub fn completion_failure( &mut self, token: VerificationToken, sender: &mut (impl VerificationSender + ?Sized), params: FailParams, ) -> Result<(), VerificationErrorWithToken> { let tm = self .create_pus_verif_fail_tm(1, 8, &token.req_id, None::<&dyn EcssEnumeration>, ¶ms) .map_err(|e| VerificationErrorWithToken(e, token))?; sender .send_verification_tm(tm) .map_err(|e| VerificationErrorWithToken(e, token))?; self.msg_count += 1; Ok(()) } fn create_pus_verif_success_tm<'a, E>( &'a mut self, service: u8, subservice: u8, req_id: &RequestId, time_stamp: &'a [u8], step: Option<&(impl EcssEnumeration + ?Sized)>, ) -> Result> { let mut source_data_len = size_of::(); if let Some(step) = step { source_data_len += step.byte_width() as usize; } self.source_buffer_large_enough(source_data_len)?; let mut idx = 0; req_id.to_bytes(&mut self.source_data_buf[0..RequestId::SIZE_AS_BYTES]); idx += RequestId::SIZE_AS_BYTES; if let Some(step) = step { // Size check was done beforehand step.to_bytes(&mut self.source_data_buf[idx..idx + step.byte_width() as usize]) .unwrap(); } let mut sp_header = SpHeader::tm(self.apid, 0, 0).unwrap(); Ok(self.create_pus_verif_tm_base( service, subservice, &mut sp_header, time_stamp, source_data_len, )) } fn create_pus_verif_fail_tm<'a, E>( &'a mut self, service: u8, subservice: u8, req_id: &RequestId, step: Option<&(impl EcssEnumeration + ?Sized)>, params: &'a FailParams, ) -> Result> { let mut idx = 0; let mut source_data_len = RequestId::SIZE_AS_BYTES + params.failure_code.byte_width() as usize; if let Some(step) = step { source_data_len += step.byte_width() as usize; } if let Some(failure_data) = params.failure_data { source_data_len += failure_data.len(); } self.source_buffer_large_enough(source_data_len)?; req_id.to_bytes(&mut self.source_data_buf[0..RequestId::SIZE_AS_BYTES]); idx += RequestId::SIZE_AS_BYTES; if let Some(step) = step { // Size check done beforehand step.to_bytes(&mut self.source_data_buf[idx..idx + step.byte_width() as usize]) .unwrap(); idx += step.byte_width() as usize; } params .failure_code .to_bytes( &mut self.source_data_buf[idx..idx + params.failure_code.byte_width() as usize], ) .map_err(|e| VerificationError::::ByteConversionError(e))?; idx += params.failure_code.byte_width() as usize; if let Some(failure_data) = params.failure_data { self.source_data_buf[idx..idx + failure_data.len()].copy_from_slice(failure_data); } let mut sp_header = SpHeader::tm(self.apid, 0, 0).unwrap(); Ok(self.create_pus_verif_tm_base( service, subservice, &mut sp_header, params.time_stamp, source_data_len, )) } fn source_buffer_large_enough(&self, len: usize) -> Result<(), VerificationError> { if len > self.source_data_buf.capacity() { return Err(VerificationError::ByteConversionError( ByteConversionError::ToSliceTooSmall(SizeMissmatch { found: self.source_data_buf.capacity(), expected: len, }), )); } Ok(()) } fn create_pus_verif_tm_base<'a>( &'a mut self, service: u8, subservice: u8, sp_header: &mut SpHeader, time_stamp: &'a [u8], source_data_len: usize, ) -> PusTm { let tm_sec_header = PusTmSecondaryHeader::new( service, subservice, self.msg_count, self.dest_id, time_stamp, ); PusTm::new( sp_header, tm_sec_header, Some(&self.source_data_buf[0..source_data_len]), true, ) } } pub struct VerificationReporterWithSender { reporter: VerificationReporter, pub sender: Box>, } impl VerificationReporterWithSender { pub fn new(cfg: VerificationReporterCfg, sender: Box>) -> Self { Self::new_from_reporter(VerificationReporter::new(cfg), sender) } pub fn new_from_reporter( reporter: VerificationReporter, sender: Box>, ) -> Self { Self { reporter, sender } } delegate! { to self.reporter { pub fn add_tc(&mut self, pus_tc: &PusTc) -> VerificationToken; pub fn add_tc_with_req_id(&mut self, req_id: RequestId) -> VerificationToken; } } pub fn acceptance_success( &mut self, token: VerificationToken, time_stamp: &[u8], ) -> Result, VerificationErrorWithToken> { self.reporter .acceptance_success(token, self.sender.as_mut(), time_stamp) } pub fn acceptance_failure( mut self, token: VerificationToken, params: FailParams, ) -> Result<(), VerificationErrorWithToken> { self.reporter .acceptance_failure(token, self.sender.as_mut(), params) } pub fn start_success( &mut self, token: VerificationToken, time_stamp: &[u8], ) -> Result, VerificationErrorWithToken> { self.reporter .start_success(token, self.sender.as_mut(), time_stamp) } pub fn start_failure( &mut self, token: VerificationToken, params: FailParams, ) -> Result<(), VerificationErrorWithToken> { self.reporter .start_failure(token, self.sender.as_mut(), params) } pub fn step_success( &mut self, token: &VerificationToken, time_stamp: &[u8], step: impl EcssEnumeration, ) -> Result<(), VerificationError> { self.reporter .step_success(token, self.sender.as_mut(), time_stamp, step) } pub fn step_failure( &mut self, token: VerificationToken, params: FailParamsWithStep, ) -> Result<(), VerificationErrorWithToken> { self.reporter .step_failure(token, self.sender.as_mut(), params) } pub fn completion_success( &mut self, token: VerificationToken, time_stamp: &[u8], ) -> Result<(), VerificationErrorWithToken> { self.reporter .completion_success(token, self.sender.as_mut(), time_stamp) } pub fn completion_failure( &mut self, token: VerificationToken, params: FailParams, ) -> Result<(), VerificationErrorWithToken> { self.reporter .completion_failure(token, self.sender.as_mut(), params) } } #[cfg(feature = "std")] pub struct StdVerifSender { pub ignore_poison_error: bool, tm_store: Arc>, tx: mpsc::Sender, } #[cfg(feature = "std")] impl StdVerifSender { pub fn new(tm_store: Arc>, tx: mpsc::Sender) -> Self { Self { ignore_poison_error: true, tx, tm_store, } } } #[cfg(feature = "std")] #[derive(Debug, Eq, PartialEq)] pub enum StdVerifSenderError { PoisonError, StoreError(StoreError), SendError(SendError), } #[cfg(feature = "std")] impl VerificationSender for StdVerifSender { fn send_verification_tm( &mut self, tm: PusTm, ) -> Result<(), VerificationError> { let operation = |mut mg: MutexGuard| { let (addr, buf) = mg .free_element(tm.len_packed()) .map_err(|e| VerificationError::SendError(StdVerifSenderError::StoreError(e)))?; tm.write_to(buf).map_err(VerificationError::PusError)?; self.tx .send(addr) .map_err(|e| VerificationError::SendError(StdVerifSenderError::SendError(e)))?; Ok(()) }; match self.tm_store.lock() { Ok(lock) => operation(lock), Err(poison_error) => { if self.ignore_poison_error { operation(poison_error.into_inner()) } else { Err(VerificationError::SendError( StdVerifSenderError::PoisonError, )) } } } } } #[cfg(test)] mod tests { use crate::pus::verification::{ FailParams, FailParamsWithStep, RequestId, StateNone, VerificationError, VerificationReporter, VerificationReporterCfg, VerificationReporterWithSender, VerificationSender, VerificationToken, }; use alloc::boxed::Box; use alloc::vec::Vec; use spacepackets::ecss::{EcssEnumU16, EcssEnumU32, EcssEnumU8, EcssEnumeration, PusPacket}; use spacepackets::tc::{PusTc, PusTcSecondaryHeader}; use spacepackets::time::{CdsShortTimeProvider, TimeWriter}; use spacepackets::tm::{PusTm, PusTmSecondaryHeaderT}; use spacepackets::{CcsdsPacket, SpHeader}; use std::collections::VecDeque; const TEST_APID: u16 = 0x02; const EMPTY_STAMP: [u8; 7] = [0; 7]; #[derive(Debug, Eq, PartialEq)] struct TmInfo { pub subservice: u8, pub apid: u16, pub msg_counter: u16, pub dest_id: u16, pub time_stamp: [u8; 7], pub req_id: RequestId, pub additional_data: Option>, } #[derive(Default)] struct TestSender { pub service_queue: VecDeque, } struct TestBase<'a> { #[allow(dead_code)] ts: CdsShortTimeProvider, vr: VerificationReporter, #[allow(dead_code)] tc: PusTc<'a>, req_id: RequestId, } struct TestBaseWithHelper<'a, E> { #[allow(dead_code)] ts: CdsShortTimeProvider, helper: VerificationReporterWithSender, #[allow(dead_code)] tc: PusTc<'a>, req_id: RequestId, } fn base_reporter_and_stamper() -> (CdsShortTimeProvider, VerificationReporter) { let time_stamper = CdsShortTimeProvider::default(); let cfg = VerificationReporterCfg::new(time_stamper, 0x02); (time_stamper, VerificationReporter::new(cfg)) } fn base_tc_init(app_data: Option<&[u8]>) -> (PusTc, RequestId) { let mut sph = SpHeader::tc(TEST_APID, 0x34, 0).unwrap(); let tc_header = PusTcSecondaryHeader::new_simple(17, 1); let pus_tc = PusTc::new(&mut sph, tc_header, app_data, true); let req_id = RequestId::new(&pus_tc); (pus_tc, req_id) } fn base_init() -> (TestBase<'static>, VerificationToken) { let (ts, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); let init_tok = reporter.add_tc(&tc); ( TestBase { ts, vr: reporter, tc, req_id, }, init_tok, ) } fn base_with_helper_init() -> ( TestBaseWithHelper<'static, ()>, VerificationToken, ) { let (ts, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); let init_tok = reporter.add_tc(&tc); let sender = TestSender::default(); let helper = VerificationReporterWithSender::new_from_reporter(reporter, Box::new(sender)); ( TestBaseWithHelper { ts, helper: helper, tc, req_id, }, init_tok, ) } impl VerificationSender<()> for TestSender { fn send_verification_tm(&mut self, tm: PusTm) -> Result<(), VerificationError<()>> { assert_eq!(PusPacket::service(&tm), 1); assert!(tm.source_data().is_some()); let mut time_stamp = [0; 7]; time_stamp.clone_from_slice(tm.time_stamp()); let src_data = tm.source_data().unwrap(); assert!(src_data.len() >= 4); let req_id = RequestId::from_bytes(&src_data[0..RequestId::SIZE_AS_BYTES]).unwrap(); let mut vec = None; if src_data.len() > 4 { let mut new_vec = Vec::new(); new_vec.extend_from_slice(&src_data[RequestId::SIZE_AS_BYTES..]); vec = Some(new_vec); } self.service_queue.push_back(TmInfo { subservice: PusPacket::subservice(&tm), apid: tm.apid(), msg_counter: tm.msg_counter(), dest_id: tm.dest_id(), time_stamp, req_id, additional_data: vec, }); Ok(()) } } fn acceptance_check(sender: &mut TestSender, req_id: &RequestId) { let cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 1, dest_id: 0, apid: TEST_APID, msg_counter: 0, additional_data: None, req_id: req_id.clone(), }; assert_eq!(sender.service_queue.len(), 1); let info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); } #[test] fn test_basic_acceptance_success() { let (mut b, tok) = base_init(); let mut sender = TestSender::default(); b.vr.acceptance_success(tok, &mut sender, &EMPTY_STAMP) .expect("Sending acceptance success failed"); acceptance_check(&mut sender, &b.req_id); } #[test] fn test_basic_acceptance_success_with_helper() { let (mut b, tok) = base_with_helper_init(); b.helper .acceptance_success(tok, &EMPTY_STAMP) .expect("Sending acceptance success failed"); let sender: &mut TestSender = b.helper.sender.downcast_mut().unwrap(); acceptance_check(sender, &b.req_id); } #[test] pub fn test_basic_acceptance_failure() { let (time_stamper, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); reporter.dest_id = 5; let verif_token = reporter.add_tc(&tc); let mut stamp_buf = [1, 2, 3, 4, 5, 6, 7]; time_stamper.write_to_bytes(&mut stamp_buf).unwrap(); let mut sender = TestSender::default(); let fail_code = EcssEnumU16::new(2); let fail_params = FailParams::new(stamp_buf.as_slice(), &fail_code, None); reporter .acceptance_failure(verif_token, &mut sender, fail_params) .expect("Sending acceptance success failed"); let cmp_info = TmInfo { time_stamp: stamp_buf, subservice: 2, dest_id: 5, apid: TEST_APID, msg_counter: 0, additional_data: Some([0, 2].to_vec()), req_id, }; assert_eq!(sender.service_queue.len(), 1); let info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); } #[test] pub fn test_basic_acceptance_failure_with_fail_data() { let (_, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); let verif_token = reporter.add_tc(&tc); let mut sender = TestSender::default(); let fail_code = EcssEnumU8::new(10); let fail_data = EcssEnumU32::new(12); let mut fail_data_raw = [0; 4]; fail_data.to_bytes(&mut fail_data_raw).unwrap(); let fail_params = FailParams::new(&EMPTY_STAMP, &fail_code, Some(fail_data_raw.as_slice())); reporter .acceptance_failure(verif_token, &mut sender, fail_params) .expect("Sending acceptance success failed"); let cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 2, dest_id: 0, apid: TEST_APID, msg_counter: 0, additional_data: Some([10, 0, 0, 0, 12].to_vec()), req_id, }; assert_eq!(sender.service_queue.len(), 1); let info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); } #[test] fn test_start_failure() { let (_, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); let verif_token = reporter.add_tc(&tc); let mut sender = TestSender::default(); let fail_code = EcssEnumU8::new(22); let fail_data: i32 = -12; let mut fail_data_raw = [0; 4]; fail_data_raw.copy_from_slice(fail_data.to_be_bytes().as_slice()); let fail_params = FailParams::new(&EMPTY_STAMP, &fail_code, Some(fail_data_raw.as_slice())); let accepted_token = reporter .acceptance_success(verif_token, &mut sender, &EMPTY_STAMP) .expect("Sending acceptance success failed"); let empty = reporter .start_failure(accepted_token, &mut sender, fail_params) .expect("Start failure failure"); assert_eq!(empty, ()); assert_eq!(sender.service_queue.len(), 2); let mut cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 1, dest_id: 0, apid: TEST_APID, msg_counter: 0, additional_data: None, req_id, }; let mut info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 4, dest_id: 0, apid: TEST_APID, msg_counter: 1, additional_data: Some([&[22], fail_data_raw.as_slice()].concat().to_vec()), req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); } #[test] fn test_steps_success() { let (_, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); let verif_token = reporter.add_tc(&tc); let mut sender = TestSender::default(); let accepted_token = reporter .acceptance_success(verif_token, &mut sender, &EMPTY_STAMP) .expect("Sending acceptance success failed"); let started_token = reporter .start_success(accepted_token, &mut sender, &[0, 1, 0, 1, 0, 1, 0]) .expect("Sending start success failed"); let mut empty = reporter .step_success( &started_token, &mut sender, &EMPTY_STAMP, EcssEnumU8::new(0), ) .expect("Sending step 0 success failed"); assert_eq!(empty, ()); empty = reporter .step_success( &started_token, &mut sender, &EMPTY_STAMP, EcssEnumU8::new(1), ) .expect("Sending step 1 success failed"); assert_eq!(empty, ()); let mut cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 1, dest_id: 0, apid: TEST_APID, msg_counter: 0, additional_data: None, req_id, }; let mut info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: [0, 1, 0, 1, 0, 1, 0], subservice: 3, dest_id: 0, apid: TEST_APID, msg_counter: 1, additional_data: None, req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 5, dest_id: 0, apid: TEST_APID, msg_counter: 2, additional_data: Some([0].to_vec()), req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 5, dest_id: 0, apid: TEST_APID, msg_counter: 3, additional_data: Some([1].to_vec()), req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); } #[test] fn test_step_failure() { let (_, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); let verif_token = reporter.add_tc(&tc); let mut sender = TestSender::default(); let fail_code = EcssEnumU32::new(0x1020); let fail_data: f32 = -22.3232; let mut fail_data_raw = [0; 4]; fail_data_raw.copy_from_slice(fail_data.to_be_bytes().as_slice()); let fail_step = EcssEnumU8::new(1); let fail_params = FailParamsWithStep::new( &EMPTY_STAMP, &fail_step, &fail_code, Some(fail_data_raw.as_slice()), ); let accepted_token = reporter .acceptance_success(verif_token, &mut sender, &EMPTY_STAMP) .expect("Sending acceptance success failed"); let started_token = reporter .start_success(accepted_token, &mut sender, &[0, 1, 0, 1, 0, 1, 0]) .expect("Sending start success failed"); let mut empty = reporter .step_success( &started_token, &mut sender, &EMPTY_STAMP, EcssEnumU8::new(0), ) .expect("Sending completion success failed"); assert_eq!(empty, ()); empty = reporter .step_failure(started_token, &mut sender, fail_params) .expect("Step failure failed"); assert_eq!(empty, ()); assert_eq!(sender.service_queue.len(), 4); let mut cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 1, dest_id: 0, apid: TEST_APID, msg_counter: 0, additional_data: None, req_id, }; let mut info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: [0, 1, 0, 1, 0, 1, 0], subservice: 3, dest_id: 0, apid: TEST_APID, msg_counter: 1, additional_data: None, req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 5, dest_id: 0, apid: TEST_APID, msg_counter: 2, additional_data: Some([0].to_vec()), req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 6, dest_id: 0, apid: TEST_APID, msg_counter: 3, additional_data: Some( [ [1].as_slice(), &[0, 0, 0x10, 0x20], fail_data_raw.as_slice(), ] .concat() .to_vec(), ), req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); } #[test] fn test_completion_failure() { let (_, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); let verif_token = reporter.add_tc(&tc); let mut sender = TestSender::default(); let fail_code = EcssEnumU32::new(0x1020); let fail_params = FailParams::new(&EMPTY_STAMP, &fail_code, None); let accepted_token = reporter .acceptance_success(verif_token, &mut sender, &EMPTY_STAMP) .expect("Sending acceptance success failed"); let started_token = reporter .start_success(accepted_token, &mut sender, &[0, 1, 0, 1, 0, 1, 0]) .expect("Sending start success failed"); let empty = reporter .completion_failure(started_token, &mut sender, fail_params) .expect("Completion failure"); assert_eq!(empty, ()); assert_eq!(sender.service_queue.len(), 3); let mut cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 1, dest_id: 0, apid: TEST_APID, msg_counter: 0, additional_data: None, req_id, }; let mut info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: [0, 1, 0, 1, 0, 1, 0], subservice: 3, dest_id: 0, apid: TEST_APID, msg_counter: 1, additional_data: None, req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 8, dest_id: 0, apid: TEST_APID, msg_counter: 2, additional_data: Some([0, 0, 0x10, 0x20].to_vec()), req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); } #[test] fn test_complete_success_sequence() { let (_, mut reporter) = base_reporter_and_stamper(); let (tc, req_id) = base_tc_init(None); let verif_token = reporter.add_tc(&tc); let mut sender = TestSender::default(); let accepted_token = reporter .acceptance_success(verif_token, &mut sender, &EMPTY_STAMP) .expect("Sending acceptance success failed"); let started_token = reporter .start_success(accepted_token, &mut sender, &[0, 1, 0, 1, 0, 1, 0]) .expect("Sending start success failed"); let empty = reporter .completion_success(started_token, &mut sender, &EMPTY_STAMP) .expect("Sending completion success failed"); assert_eq!(empty, ()); assert_eq!(sender.service_queue.len(), 3); let cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 1, dest_id: 0, apid: TEST_APID, msg_counter: 0, additional_data: None, req_id, }; let mut info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); let cmp_info = TmInfo { time_stamp: [0, 1, 0, 1, 0, 1, 0], subservice: 3, dest_id: 0, apid: TEST_APID, msg_counter: 1, additional_data: None, req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); let cmp_info = TmInfo { time_stamp: EMPTY_STAMP, subservice: 7, dest_id: 0, apid: TEST_APID, msg_counter: 2, additional_data: None, req_id, }; info = sender.service_queue.pop_front().unwrap(); assert_eq!(info, cmp_info); } }