mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
afaff3bca3
This makes the test faster and more robust in very a busy WiFi environment (our CI) and still exercises the scenario of fragmenting the message on both mqtt and ssl levels (binary size to send > mqtt buffer size)
135 lines
5.3 KiB
Python
135 lines
5.3 KiB
Python
from __future__ import print_function
|
|
from __future__ import unicode_literals
|
|
from builtins import str
|
|
import re
|
|
import os
|
|
import sys
|
|
import ssl
|
|
import paho.mqtt.client as mqtt
|
|
from threading import Thread, Event
|
|
|
|
from tiny_test_fw import DUT
|
|
import ttfw_idf
|
|
|
|
|
|
event_client_connected = Event()
|
|
event_stop_client = Event()
|
|
event_client_received_correct = Event()
|
|
event_client_received_binary = Event()
|
|
message_log = ""
|
|
|
|
|
|
# The callback for when the client receives a CONNACK response from the server.
|
|
def on_connect(client, userdata, flags, rc):
|
|
print("Connected with result code " + str(rc))
|
|
event_client_connected.set()
|
|
client.subscribe("/topic/qos0")
|
|
|
|
|
|
def mqtt_client_task(client):
|
|
while not event_stop_client.is_set():
|
|
client.loop()
|
|
|
|
|
|
# The callback for when a PUBLISH message is received from the server.
|
|
def on_message(client, userdata, msg):
|
|
global message_log
|
|
global event_client_received_correct
|
|
global event_client_received_binary
|
|
if msg.topic == '/topic/binary':
|
|
binary, bin_size = userdata
|
|
print('Receiving binary from esp and comparing with {}, size {}...'.format(binary, bin_size))
|
|
with open(binary, 'rb') as f:
|
|
bin = f.read()
|
|
if bin[:bin_size] == msg.payload[:bin_size]:
|
|
print('...matches!')
|
|
event_client_received_binary.set()
|
|
return
|
|
recv_binary = binary + '.received'
|
|
with open(recv_binary, 'w') as fw:
|
|
fw.write(msg.payload)
|
|
raise ValueError('Received binary (saved as: {}) does not match the original file: {}'.format(recv_binary, binary))
|
|
|
|
payload = msg.payload.decode()
|
|
if not event_client_received_correct.is_set() and payload == "data":
|
|
client.subscribe("/topic/binary")
|
|
client.publish("/topic/qos0", "send binary please")
|
|
if msg.topic == "/topic/qos0" and payload == "data":
|
|
event_client_received_correct.set()
|
|
message_log += "Received data:" + msg.topic + " " + payload + "\n"
|
|
|
|
|
|
@ttfw_idf.idf_example_test(env_tag="Example_WIFI")
|
|
def test_examples_protocol_mqtt_ssl(env, extra_data):
|
|
broker_url = ""
|
|
broker_port = 0
|
|
"""
|
|
steps:
|
|
1. join AP and connects to ssl broker
|
|
2. Test connects a client to the same broker
|
|
3. Test evaluates python client received correct qos0 message
|
|
4. Test ESP32 client received correct qos0 message
|
|
5. Test python client receives binary data from running partition and compares it with the binary
|
|
"""
|
|
dut1 = env.get_dut("mqtt_ssl", "examples/protocols/mqtt/ssl", dut_class=ttfw_idf.ESP32DUT)
|
|
# check and log bin size
|
|
binary_file = os.path.join(dut1.app.binary_path, "mqtt_ssl.bin")
|
|
bin_size = os.path.getsize(binary_file)
|
|
ttfw_idf.log_performance("mqtt_ssl_bin_size", "{}KB"
|
|
.format(bin_size // 1024))
|
|
ttfw_idf.check_performance("mqtt_ssl_size", bin_size // 1024, dut1.TARGET)
|
|
# Look for host:port in sdkconfig
|
|
try:
|
|
value = re.search(r'\:\/\/([^:]+)\:([0-9]+)', dut1.app.get_sdkconfig()["CONFIG_BROKER_URI"])
|
|
broker_url = value.group(1)
|
|
broker_port = int(value.group(2))
|
|
bin_size = min(int(dut1.app.get_sdkconfig()['CONFIG_BROKER_BIN_SIZE_TO_SEND']), bin_size)
|
|
except Exception:
|
|
print('ENV_TEST_FAILURE: Cannot find broker url in sdkconfig')
|
|
raise
|
|
client = None
|
|
# 1. Test connects to a broker
|
|
try:
|
|
client = mqtt.Client()
|
|
client.on_connect = on_connect
|
|
client.on_message = on_message
|
|
client.user_data_set((binary_file, bin_size))
|
|
client.tls_set(None,
|
|
None,
|
|
None, cert_reqs=ssl.CERT_NONE, tls_version=ssl.PROTOCOL_TLSv1_2, ciphers=None)
|
|
client.tls_insecure_set(True)
|
|
print("Connecting...")
|
|
client.connect(broker_url, broker_port, 60)
|
|
except Exception:
|
|
print("ENV_TEST_FAILURE: Unexpected error while connecting to broker {}: {}:".format(broker_url, sys.exc_info()[0]))
|
|
raise
|
|
# Starting a py-client in a separate thread
|
|
thread1 = Thread(target=mqtt_client_task, args=(client,))
|
|
thread1.start()
|
|
try:
|
|
print("Connecting py-client to broker {}:{}...".format(broker_url, broker_port))
|
|
if not event_client_connected.wait(timeout=30):
|
|
raise ValueError("ENV_TEST_FAILURE: Test script cannot connect to broker: {}".format(broker_url))
|
|
dut1.start_app()
|
|
try:
|
|
ip_address = dut1.expect(re.compile(r" sta ip: ([^,]+),"), timeout=30)
|
|
print("Connected to AP with IP: {}".format(ip_address))
|
|
except DUT.ExpectTimeout:
|
|
print('ENV_TEST_FAILURE: Cannot connect to AP')
|
|
raise
|
|
print("Checking py-client received msg published from esp...")
|
|
if not event_client_received_correct.wait(timeout=30):
|
|
raise ValueError('Wrong data received, msg log: {}'.format(message_log))
|
|
print("Checking esp-client received msg published from py-client...")
|
|
dut1.expect(re.compile(r"DATA=send binary please"), timeout=30)
|
|
print("Receiving binary data from running partition...")
|
|
if not event_client_received_binary.wait(timeout=30):
|
|
raise ValueError('Binary not received within timeout')
|
|
finally:
|
|
event_stop_client.set()
|
|
thread1.join()
|
|
|
|
|
|
if __name__ == '__main__':
|
|
test_examples_protocol_mqtt_ssl()
|