use crate::*;
#[test]
fn test_auto_check_sbp_linux_msg_linux_mem_state() {
{
let mut payload = Cursor::new(vec![
85, 9, 127, 95, 253, 70, 154, 191, 223, 19, 247, 53, 26, 187, 76, 112, 114, 111, 99,
101, 115, 115, 45, 110, 97, 109, 101, 0, 0, 0, 47, 112, 97, 116, 104, 47, 116, 111, 47,
112, 114, 111, 99, 101, 115, 115, 45, 110, 97, 109, 101, 32, 97, 114, 103, 48, 32, 97,
114, 103, 49, 32, 97, 114, 103, 50, 32, 97, 114, 103, 51, 32, 97, 114, 103, 52, 3, 181,
]);
let sbp_msg = {
let mut msgs = iter_messages(&mut payload);
msgs.next()
.expect("no message found")
.expect("failed to parse message")
};
match &sbp_msg {
sbp::messages::Sbp::MsgLinuxMemState(msg) => {
let msg_type = msg.message_type().unwrap();
assert_eq!(
msg_type, 0x7f09,
"Incorrect message type, expected 0x7f09, is {msg_type}"
);
let sender_id = msg.sender_id().unwrap();
assert_eq!(
sender_id, 0xfd5f,
"incorrect sender id, expected 0xfd5f, is {sender_id}"
);
assert_eq!(
msg.cmdline.as_bytes(),
&[
47, 112, 97, 116, 104, 47, 116, 111, 47, 112, 114, 111, 99, 101, 115, 115,
45, 110, 97, 109, 101, 32, 97, 114, 103, 48, 32, 97, 114, 103, 49, 32, 97,
114, 103, 50, 32, 97, 114, 103, 51, 32, 97, 114, 103, 52
],
"incorrect value for msg.cmdline, expected string '{:?}', is '{:?}'",
&[
47, 112, 97, 116, 104, 47, 116, 111, 47, 112, 114, 111, 99, 101, 115, 115,
45, 110, 97, 109, 101, 32, 97, 114, 103, 48, 32, 97, 114, 103, 49, 32, 97,
114, 103, 50, 32, 97, 114, 103, 51, 32, 97, 114, 103, 52
],
msg.cmdline.as_bytes()
);
assert_eq!(
msg.flags, 76,
"incorrect value for flags, expected 76, is {}",
msg.flags
);
assert_eq!(
msg.index, 154,
"incorrect value for index, expected 154, is {}",
msg.index
);
assert_eq!(
msg.pid, 57279,
"incorrect value for pid, expected 57279, is {}",
msg.pid
);
assert_eq!(
msg.pmem, 19,
"incorrect value for pmem, expected 19, is {}",
msg.pmem
);
assert_eq!(
msg.time, 3139057143,
"incorrect value for time, expected 3139057143, is {}",
msg.time
);
assert_eq!(
msg.tname.as_bytes(),
&[
112, 114, 111, 99, 101, 115, 115, 45, 110, 97, 109, 101, 0, 0, 0
],
"incorrect value for msg.tname, expected string '{:?}', is '{:?}'",
&[
112, 114, 111, 99, 101, 115, 115, 45, 110, 97, 109, 101, 0, 0, 0
],
msg.tname.as_bytes()
);
}
_ => panic!("Invalid message type! Expected a MsgLinuxMemState"),
};
let frame = sbp::to_vec(&sbp_msg).unwrap();
assert_eq!(frame, payload.into_inner());
}
}
#[test]
#[cfg(feature = "json")]
fn test_json2sbp_auto_check_sbp_linux_msg_linux_mem_state() {
{
let json_input = r#"{"crc":46339,"length":70,"msg_type":32521,"payload":"mr/fE/c1GrtMcHJvY2Vzcy1uYW1lAAAAL3BhdGgvdG8vcHJvY2Vzcy1uYW1lIGFyZzAgYXJnMSBhcmcyIGFyZzMgYXJnNA==","preamble":85,"sender":64863,"index":154,"pid":57279,"pmem":19,"time":3139057143,"flags":76,"tname":"process-name\u0000\u0000\u0000","cmdline":"/path/to/process-name arg0 arg1 arg2 arg3 arg4"}"#.as_bytes();
let sbp_msg = {
let mut iter = json2sbp_iter_msg(json_input);
let from_payload = iter
.next()
.expect("no message found")
.expect("failed to parse message");
let mut iter = iter_messages_from_fields(json_input);
let from_fields = iter
.next()
.expect("no message found")
.expect("failed to parse message");
assert_eq!(from_fields, from_payload);
from_fields
};
match &sbp_msg {
sbp::messages::Sbp::MsgLinuxMemState(msg) => {
let msg_type = msg.message_type().unwrap();
assert_eq!(
msg_type, 0x7f09,
"Incorrect message type, expected 0x7f09, is {msg_type}"
);
let sender_id = msg.sender_id().unwrap();
assert_eq!(
sender_id, 0xfd5f,
"incorrect sender id, expected 0xfd5f, is {sender_id}"
);
assert_eq!(
msg.cmdline.as_bytes(),
&[
47, 112, 97, 116, 104, 47, 116, 111, 47, 112, 114, 111, 99, 101, 115, 115,
45, 110, 97, 109, 101, 32, 97, 114, 103, 48, 32, 97, 114, 103, 49, 32, 97,
114, 103, 50, 32, 97, 114, 103, 51, 32, 97, 114, 103, 52
],
"incorrect value for msg.cmdline, expected string '{:?}', is '{:?}'",
&[
47, 112, 97, 116, 104, 47, 116, 111, 47, 112, 114, 111, 99, 101, 115, 115,
45, 110, 97, 109, 101, 32, 97, 114, 103, 48, 32, 97, 114, 103, 49, 32, 97,
114, 103, 50, 32, 97, 114, 103, 51, 32, 97, 114, 103, 52
],
msg.cmdline.as_bytes()
);
assert_eq!(
msg.flags, 76,
"incorrect value for flags, expected 76, is {}",
msg.flags
);
assert_eq!(
msg.index, 154,
"incorrect value for index, expected 154, is {}",
msg.index
);
assert_eq!(
msg.pid, 57279,
"incorrect value for pid, expected 57279, is {}",
msg.pid
);
assert_eq!(
msg.pmem, 19,
"incorrect value for pmem, expected 19, is {}",
msg.pmem
);
assert_eq!(
msg.time, 3139057143,
"incorrect value for time, expected 3139057143, is {}",
msg.time
);
assert_eq!(
msg.tname.as_bytes(),
&[
112, 114, 111, 99, 101, 115, 115, 45, 110, 97, 109, 101, 0, 0, 0
],
"incorrect value for msg.tname, expected string '{:?}', is '{:?}'",
&[
112, 114, 111, 99, 101, 115, 115, 45, 110, 97, 109, 101, 0, 0, 0
],
msg.tname.as_bytes()
);
}
_ => panic!("Invalid message type! Expected a MsgLinuxMemState"),
};
}
}
#[test]
#[cfg(feature = "json")]
fn test_sbp2json_auto_check_sbp_linux_msg_linux_mem_state() {
{
let mut payload = Cursor::new(vec![
85, 9, 127, 95, 253, 70, 154, 191, 223, 19, 247, 53, 26, 187, 76, 112, 114, 111, 99,
101, 115, 115, 45, 110, 97, 109, 101, 0, 0, 0, 47, 112, 97, 116, 104, 47, 116, 111, 47,
112, 114, 111, 99, 101, 115, 115, 45, 110, 97, 109, 101, 32, 97, 114, 103, 48, 32, 97,
114, 103, 49, 32, 97, 114, 103, 50, 32, 97, 114, 103, 51, 32, 97, 114, 103, 52, 3, 181,
]);
let sbp_msg = {
let mut msgs = iter_messages(&mut payload);
msgs.next()
.expect("no message found")
.expect("failed to parse message")
};
let mut json_buffer = vec![];
sbp::json::JsonEncoder::new(&mut json_buffer, sbp::json::CompactFormatter {})
.send(&sbp_msg)
.unwrap();
let sbp_msg = sbp::messages::Sbp::MsgLinuxMemState(
serde_json::from_str(
std::str::from_utf8(json_buffer.as_slice())
.unwrap()
.to_string()
.as_str(),
)
.unwrap(),
);
match &sbp_msg {
sbp::messages::Sbp::MsgLinuxMemState(msg) => {
let msg_type = msg.message_type().unwrap();
assert_eq!(
msg_type, 0x7f09,
"Incorrect message type, expected 0x7f09, is {msg_type}"
);
let sender_id = msg.sender_id().unwrap();
assert_eq!(
sender_id, 0xfd5f,
"incorrect sender id, expected 0xfd5f, is {sender_id}"
);
assert_eq!(
msg.cmdline.as_bytes(),
&[
47, 112, 97, 116, 104, 47, 116, 111, 47, 112, 114, 111, 99, 101, 115, 115,
45, 110, 97, 109, 101, 32, 97, 114, 103, 48, 32, 97, 114, 103, 49, 32, 97,
114, 103, 50, 32, 97, 114, 103, 51, 32, 97, 114, 103, 52
],
"incorrect value for msg.cmdline, expected string '{:?}', is '{:?}'",
&[
47, 112, 97, 116, 104, 47, 116, 111, 47, 112, 114, 111, 99, 101, 115, 115,
45, 110, 97, 109, 101, 32, 97, 114, 103, 48, 32, 97, 114, 103, 49, 32, 97,
114, 103, 50, 32, 97, 114, 103, 51, 32, 97, 114, 103, 52
],
msg.cmdline.as_bytes()
);
assert_eq!(
msg.flags, 76,
"incorrect value for flags, expected 76, is {}",
msg.flags
);
assert_eq!(
msg.index, 154,
"incorrect value for index, expected 154, is {}",
msg.index
);
assert_eq!(
msg.pid, 57279,
"incorrect value for pid, expected 57279, is {}",
msg.pid
);
assert_eq!(
msg.pmem, 19,
"incorrect value for pmem, expected 19, is {}",
msg.pmem
);
assert_eq!(
msg.time, 3139057143,
"incorrect value for time, expected 3139057143, is {}",
msg.time
);
assert_eq!(
msg.tname.as_bytes(),
&[
112, 114, 111, 99, 101, 115, 115, 45, 110, 97, 109, 101, 0, 0, 0
],
"incorrect value for msg.tname, expected string '{:?}', is '{:?}'",
&[
112, 114, 111, 99, 101, 115, 115, 45, 110, 97, 109, 101, 0, 0, 0
],
msg.tname.as_bytes()
);
}
_ => panic!("Invalid message type! Expected a MsgLinuxMemState"),
};
let frame = sbp::to_vec(&sbp_msg).unwrap();
assert_eq!(frame, payload.into_inner());
}
}