2021-01-25 21:49:01 -05:00
|
|
|
from __future__ import print_function, unicode_literals
|
|
|
|
|
2018-07-24 10:59:03 -04:00
|
|
|
import os
|
2021-01-25 21:49:01 -05:00
|
|
|
import re
|
2018-07-24 10:59:03 -04:00
|
|
|
import ssl
|
2021-01-25 21:49:01 -05:00
|
|
|
import sys
|
|
|
|
from builtins import str
|
|
|
|
from threading import Event, Thread
|
2018-12-07 09:15:34 -05:00
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
import paho.mqtt.client as mqtt
|
2019-11-26 22:58:07 -05:00
|
|
|
import ttfw_idf
|
2021-01-25 21:49:01 -05:00
|
|
|
from tiny_test_fw import DUT
|
2018-12-07 09:15:34 -05:00
|
|
|
|
|
|
|
event_client_connected = Event()
|
|
|
|
event_stop_client = Event()
|
|
|
|
event_client_received_correct = Event()
|
2019-10-17 04:57:04 -04:00
|
|
|
event_client_received_binary = Event()
|
2021-01-25 21:49:01 -05:00
|
|
|
message_log = ''
|
2018-12-04 02:32:48 -05:00
|
|
|
|
2018-07-24 10:59:03 -04:00
|
|
|
|
|
|
|
# The callback for when the client receives a CONNACK response from the server.
|
|
|
|
def on_connect(client, userdata, flags, rc):
|
2021-01-25 21:49:01 -05:00
|
|
|
print('Connected with result code ' + str(rc))
|
2018-12-07 09:15:34 -05:00
|
|
|
event_client_connected.set()
|
2021-01-25 21:49:01 -05:00
|
|
|
client.subscribe('/topic/qos0')
|
2018-07-24 10:59:03 -04:00
|
|
|
|
2018-12-04 02:32:48 -05:00
|
|
|
|
2018-12-07 09:15:34 -05:00
|
|
|
def mqtt_client_task(client):
|
|
|
|
while not event_stop_client.is_set():
|
|
|
|
client.loop()
|
|
|
|
|
|
|
|
|
2018-07-24 10:59:03 -04:00
|
|
|
# The callback for when a PUBLISH message is received from the server.
|
|
|
|
def on_message(client, userdata, msg):
|
2018-12-07 09:15:34 -05:00
|
|
|
global message_log
|
2019-10-17 04:57:04 -04:00
|
|
|
global event_client_received_correct
|
|
|
|
global event_client_received_binary
|
2021-01-25 21:49:01 -05:00
|
|
|
if msg.topic == '/topic/binary':
|
2021-01-26 05:52:36 -05:00
|
|
|
binary, bin_size = userdata
|
|
|
|
print('Receiving binary from esp and comparing with {}, size {}...'.format(binary, bin_size))
|
2021-01-25 21:49:01 -05:00
|
|
|
with open(binary, 'rb') as f:
|
2019-10-17 04:57:04 -04:00
|
|
|
bin = f.read()
|
2021-01-26 05:52:36 -05:00
|
|
|
if bin[:bin_size] == msg.payload[:bin_size]:
|
2021-01-25 21:49:01 -05:00
|
|
|
print('...matches!')
|
2019-10-17 04:57:04 -04:00
|
|
|
event_client_received_binary.set()
|
|
|
|
return
|
2021-01-26 05:52:36 -05:00
|
|
|
recv_binary = binary + '.received'
|
|
|
|
with open(recv_binary, 'w') as fw:
|
|
|
|
fw.write(msg.payload)
|
|
|
|
raise ValueError('Received binary (saved as: {}) does not match the original file: {}'.format(recv_binary, binary))
|
|
|
|
|
2018-09-27 05:46:13 -04:00
|
|
|
payload = msg.payload.decode()
|
2021-01-25 21:49:01 -05:00
|
|
|
if not event_client_received_correct.is_set() and payload == 'data':
|
|
|
|
client.subscribe('/topic/binary')
|
|
|
|
client.publish('/topic/qos0', 'send binary please')
|
|
|
|
if msg.topic == '/topic/qos0' and payload == 'data':
|
2018-12-07 09:15:34 -05:00
|
|
|
event_client_received_correct.set()
|
2021-01-25 21:49:01 -05:00
|
|
|
message_log += 'Received data:' + msg.topic + ' ' + payload + '\n'
|
2018-07-24 10:59:03 -04:00
|
|
|
|
|
|
|
|
2021-01-25 21:49:01 -05:00
|
|
|
@ttfw_idf.idf_example_test(env_tag='Example_WIFI')
|
2018-07-24 10:59:03 -04:00
|
|
|
def test_examples_protocol_mqtt_ssl(env, extra_data):
|
2021-01-25 21:49:01 -05:00
|
|
|
broker_url = ''
|
2018-12-07 09:15:34 -05:00
|
|
|
broker_port = 0
|
2018-07-24 10:59:03 -04:00
|
|
|
"""
|
2021-01-26 05:52:36 -05:00
|
|
|
steps:
|
2018-07-24 10:59:03 -04:00
|
|
|
1. join AP and connects to ssl broker
|
|
|
|
2. Test connects a client to the same broker
|
|
|
|
3. Test evaluates python client received correct qos0 message
|
|
|
|
4. Test ESP32 client received correct qos0 message
|
2019-10-17 04:57:04 -04:00
|
|
|
5. Test python client receives binary data from running partition and compares it with the binary
|
2018-07-24 10:59:03 -04:00
|
|
|
"""
|
2021-01-25 21:49:01 -05:00
|
|
|
dut1 = env.get_dut('mqtt_ssl', 'examples/protocols/mqtt/ssl', dut_class=ttfw_idf.ESP32DUT)
|
2018-07-24 10:59:03 -04:00
|
|
|
# check and log bin size
|
2021-01-25 21:49:01 -05:00
|
|
|
binary_file = os.path.join(dut1.app.binary_path, 'mqtt_ssl.bin')
|
2018-07-24 10:59:03 -04:00
|
|
|
bin_size = os.path.getsize(binary_file)
|
2021-01-25 21:49:01 -05:00
|
|
|
ttfw_idf.log_performance('mqtt_ssl_bin_size', '{}KB'
|
2019-11-26 22:58:07 -05:00
|
|
|
.format(bin_size // 1024))
|
2018-12-07 09:15:34 -05:00
|
|
|
# Look for host:port in sdkconfig
|
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
value = re.search(r'\:\/\/([^:]+)\:([0-9]+)', dut1.app.get_sdkconfig()['CONFIG_BROKER_URI'])
|
2018-12-07 09:15:34 -05:00
|
|
|
broker_url = value.group(1)
|
|
|
|
broker_port = int(value.group(2))
|
2021-01-26 05:52:36 -05:00
|
|
|
bin_size = min(int(dut1.app.get_sdkconfig()['CONFIG_BROKER_BIN_SIZE_TO_SEND']), bin_size)
|
2018-12-07 09:15:34 -05:00
|
|
|
except Exception:
|
|
|
|
print('ENV_TEST_FAILURE: Cannot find broker url in sdkconfig')
|
|
|
|
raise
|
2018-09-27 05:46:13 -04:00
|
|
|
client = None
|
2018-12-07 09:15:34 -05:00
|
|
|
# 1. Test connects to a broker
|
2018-09-27 05:46:13 -04:00
|
|
|
try:
|
2018-07-24 10:59:03 -04:00
|
|
|
client = mqtt.Client()
|
|
|
|
client.on_connect = on_connect
|
|
|
|
client.on_message = on_message
|
2021-01-26 05:52:36 -05:00
|
|
|
client.user_data_set((binary_file, bin_size))
|
2018-07-24 10:59:03 -04:00
|
|
|
client.tls_set(None,
|
2018-12-04 02:32:48 -05:00
|
|
|
None,
|
2019-09-26 21:35:26 -04:00
|
|
|
None, cert_reqs=ssl.CERT_NONE, tls_version=ssl.PROTOCOL_TLSv1_2, ciphers=None)
|
2018-07-24 10:59:03 -04:00
|
|
|
client.tls_insecure_set(True)
|
2021-01-25 21:49:01 -05:00
|
|
|
print('Connecting...')
|
2018-12-07 09:15:34 -05:00
|
|
|
client.connect(broker_url, broker_port, 60)
|
2018-12-04 02:32:48 -05:00
|
|
|
except Exception:
|
2021-01-25 21:49:01 -05:00
|
|
|
print('ENV_TEST_FAILURE: Unexpected error while connecting to broker {}: {}:'.format(broker_url, sys.exc_info()[0]))
|
2018-09-27 05:46:13 -04:00
|
|
|
raise
|
2018-12-07 09:15:34 -05:00
|
|
|
# Starting a py-client in a separate thread
|
|
|
|
thread1 = Thread(target=mqtt_client_task, args=(client,))
|
|
|
|
thread1.start()
|
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
print('Connecting py-client to broker {}:{}...'.format(broker_url, broker_port))
|
2018-12-07 09:15:34 -05:00
|
|
|
if not event_client_connected.wait(timeout=30):
|
2021-01-25 21:49:01 -05:00
|
|
|
raise ValueError('ENV_TEST_FAILURE: Test script cannot connect to broker: {}'.format(broker_url))
|
2018-12-07 09:15:34 -05:00
|
|
|
dut1.start_app()
|
|
|
|
try:
|
2021-01-25 21:49:01 -05:00
|
|
|
ip_address = dut1.expect(re.compile(r' sta ip: ([^,]+),'), timeout=30)
|
|
|
|
print('Connected to AP with IP: {}'.format(ip_address))
|
2018-12-07 09:15:34 -05:00
|
|
|
except DUT.ExpectTimeout:
|
|
|
|
print('ENV_TEST_FAILURE: Cannot connect to AP')
|
|
|
|
raise
|
2021-01-25 21:49:01 -05:00
|
|
|
print('Checking py-client received msg published from esp...')
|
2018-12-07 09:15:34 -05:00
|
|
|
if not event_client_received_correct.wait(timeout=30):
|
|
|
|
raise ValueError('Wrong data received, msg log: {}'.format(message_log))
|
2021-01-25 21:49:01 -05:00
|
|
|
print('Checking esp-client received msg published from py-client...')
|
|
|
|
dut1.expect(re.compile(r'DATA=send binary please'), timeout=30)
|
|
|
|
print('Receiving binary data from running partition...')
|
2019-10-17 04:57:04 -04:00
|
|
|
if not event_client_received_binary.wait(timeout=30):
|
|
|
|
raise ValueError('Binary not received within timeout')
|
2018-12-07 09:15:34 -05:00
|
|
|
finally:
|
|
|
|
event_stop_client.set()
|
|
|
|
thread1.join()
|
2018-07-24 10:59:03 -04:00
|
|
|
|
2018-12-04 02:32:48 -05:00
|
|
|
|
2018-07-24 10:59:03 -04:00
|
|
|
if __name__ == '__main__':
|
|
|
|
test_examples_protocol_mqtt_ssl()
|