2020-07-18 20:16:57 +02:00
|
|
|
/**
|
2022-07-05 17:08:35 +02:00
|
|
|
* (C) 2016 - 2021 KISTLER INSTRUMENTE AG, Winterthur, Switzerland
|
2026-01-15 14:38:33 +01:00
|
|
|
* (C) 2016 - 2026 Stanislav Angelovic <stanislav.angelovic@protonmail.com>
|
2020-07-18 20:16:57 +02:00
|
|
|
*
|
|
|
|
|
* @file DBusAsyncMethodsTests.cpp
|
|
|
|
|
*
|
|
|
|
|
* Created on: Jan 2, 2017
|
|
|
|
|
* Project: sdbus-c++
|
|
|
|
|
* Description: High-level D-Bus IPC C++ library based on sd-bus
|
|
|
|
|
*
|
|
|
|
|
* This file is part of sdbus-c++.
|
|
|
|
|
*
|
|
|
|
|
* sdbus-c++ is free software; you can redistribute it and/or modify it
|
|
|
|
|
* under the terms of the GNU Lesser General Public License as published by
|
|
|
|
|
* the Free Software Foundation, either version 2.1 of the License, or
|
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* sdbus-c++ is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU Lesser General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
|
|
|
* along with sdbus-c++. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include "TestFixture.h"
|
|
|
|
|
#include "TestProxy.h"
|
2026-01-15 14:38:33 +01:00
|
|
|
#include "Defs.h"
|
|
|
|
|
#include <sdbus-c++/sdbus-c++.h>
|
2020-07-18 20:16:57 +02:00
|
|
|
|
2026-01-15 14:38:33 +01:00
|
|
|
#include <cstdint>
|
|
|
|
|
#include <exception>
|
|
|
|
|
#include <atomic>
|
|
|
|
|
#include <cstddef>
|
2020-07-18 20:16:57 +02:00
|
|
|
#include <gtest/gtest.h>
|
|
|
|
|
#include <gmock/gmock.h>
|
2026-01-15 14:38:33 +01:00
|
|
|
#include <optional>
|
|
|
|
|
#include <mutex>
|
|
|
|
|
#include <map>
|
2020-07-18 20:16:57 +02:00
|
|
|
#include <string>
|
|
|
|
|
#include <thread>
|
|
|
|
|
#include <chrono>
|
|
|
|
|
#include <future>
|
2026-01-15 14:38:33 +01:00
|
|
|
#include <utility>
|
|
|
|
|
#include <vector>
|
2020-07-18 20:16:57 +02:00
|
|
|
|
|
|
|
|
using ::testing::Eq;
|
2021-12-20 10:00:29 +01:00
|
|
|
using ::testing::Le;
|
2020-07-18 20:16:57 +02:00
|
|
|
using ::testing::AnyOf;
|
|
|
|
|
using ::testing::ElementsAre;
|
|
|
|
|
using namespace std::chrono_literals;
|
|
|
|
|
using namespace sdbus::test;
|
|
|
|
|
|
|
|
|
|
/*-------------------------------------*/
|
|
|
|
|
/* -- TEST CASES -- */
|
|
|
|
|
/*-------------------------------------*/
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, ThrowsTimeoutErrorWhenClientSideAsyncMethodTimesOut)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
2021-12-20 10:00:29 +01:00
|
|
|
std::chrono::time_point<std::chrono::steady_clock> start;
|
2020-07-18 20:16:57 +02:00
|
|
|
try
|
|
|
|
|
{
|
|
|
|
|
std::promise<uint32_t> promise;
|
|
|
|
|
auto future = promise.get_future();
|
2024-01-10 15:43:37 +01:00
|
|
|
this->m_proxy->installDoOperationClientSideAsyncReplyHandler([&](uint32_t res, std::optional<sdbus::Error> err)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
2024-01-10 15:43:37 +01:00
|
|
|
if (!err)
|
2020-07-18 20:16:57 +02:00
|
|
|
promise.set_value(res);
|
|
|
|
|
else
|
2024-01-10 15:43:37 +01:00
|
|
|
promise.set_exception(std::make_exception_ptr(*std::move(err)));
|
2020-07-18 20:16:57 +02:00
|
|
|
});
|
|
|
|
|
|
2021-12-20 10:00:29 +01:00
|
|
|
start = std::chrono::steady_clock::now();
|
2023-01-25 00:02:51 +01:00
|
|
|
this->m_proxy->doOperationClientSideAsyncWithTimeout(1us, (1s).count()); // The operation will take 1s, but the timeout is 1us, so we should time out
|
2020-07-18 20:16:57 +02:00
|
|
|
future.get();
|
|
|
|
|
|
|
|
|
|
FAIL() << "Expected sdbus::Error exception";
|
|
|
|
|
}
|
|
|
|
|
catch (const sdbus::Error& e)
|
|
|
|
|
{
|
|
|
|
|
ASSERT_THAT(e.getName(), AnyOf("org.freedesktop.DBus.Error.Timeout", "org.freedesktop.DBus.Error.NoReply"));
|
|
|
|
|
ASSERT_THAT(e.getMessage(), AnyOf("Connection timed out", "Method call timed out"));
|
2021-12-20 10:00:29 +01:00
|
|
|
auto measuredTimeout = std::chrono::steady_clock::now() - start;
|
|
|
|
|
ASSERT_THAT(measuredTimeout, Le(50ms));
|
2020-07-18 20:16:57 +02:00
|
|
|
}
|
|
|
|
|
catch(...)
|
|
|
|
|
{
|
|
|
|
|
FAIL() << "Expected sdbus::Error exception";
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2024-10-10 16:10:20 +02:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, RunsServerSideAsynchronousMethodAsynchronously)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
|
|
|
|
// Yeah, this is kinda timing-dependent test, but times should be safe...
|
|
|
|
|
std::mutex mtx;
|
|
|
|
|
std::vector<uint32_t> results;
|
2026-01-15 14:38:33 +01:00
|
|
|
std::atomic invoke{false};
|
|
|
|
|
std::atomic startedCount{0};
|
2020-07-18 20:16:57 +02:00
|
|
|
auto call = [&](uint32_t param)
|
|
|
|
|
{
|
refactor: add strong types to public API (#414)
This introduces strong types for `std::string`-based D-Bus types. This facilitates safer, less error-prone and more expressive API.
What previously was `auto proxy = createProxy("org.sdbuscpp.concatenator", "/org/sdbuscpp/concatenator");` is now written like `auto proxy = createProxy(ServiceName{"org.sdbuscpp.concatenator"}, ObjectPath{"/org/sdbuscpp/concatenator"});`.
These types are:
* `ObjectPath` type for the object path (the type has been around already but now is also used consistently in sdbus-c++ API for object path strings),
* `InterfaceName` type for D-Bus interface names,
* `BusName` (and its aliases `ServiceName` and `ConnectionName`) type for bus/service/connection names,
* `MemberName` (and its aliases `MethodName`, `SignalName` and `PropertyName`) type for D-Bus method, signal and property names,
* `Signature` type for the D-Bus signature (the type has been around already but now is also used consistently in sdbus-c++ API for signature strings),
* `Error::Name` type for D-Bus error names.
2024-03-29 13:23:44 +01:00
|
|
|
TestProxy proxy{SERVICE_NAME, OBJECT_PATH};
|
2020-07-18 20:16:57 +02:00
|
|
|
++startedCount;
|
|
|
|
|
while (!invoke) ;
|
|
|
|
|
auto result = proxy.doOperationAsync(param);
|
2026-01-15 14:38:33 +01:00
|
|
|
std::lock_guard const guard(mtx);
|
2020-07-18 20:16:57 +02:00
|
|
|
results.push_back(result);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
std::thread invocations[]{std::thread{call, 1500}, std::thread{call, 1000}, std::thread{call, 500}};
|
|
|
|
|
while (startedCount != 3) ;
|
|
|
|
|
invoke = true;
|
2026-01-15 14:38:33 +01:00
|
|
|
std::for_each(std::begin(invocations), std::end(invocations), [](auto& thread){ thread.join(); });
|
2020-07-18 20:16:57 +02:00
|
|
|
|
|
|
|
|
ASSERT_THAT(results, ElementsAre(500, 1000, 1500));
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, HandlesCorrectlyABulkOfParallelServerSideAsyncMethods)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
|
|
|
|
std::atomic<size_t> resultCount{};
|
2026-01-15 14:38:33 +01:00
|
|
|
std::atomic invoke{false};
|
|
|
|
|
std::atomic startedCount{0};
|
2020-07-18 20:16:57 +02:00
|
|
|
auto call = [&]()
|
|
|
|
|
{
|
refactor: add strong types to public API (#414)
This introduces strong types for `std::string`-based D-Bus types. This facilitates safer, less error-prone and more expressive API.
What previously was `auto proxy = createProxy("org.sdbuscpp.concatenator", "/org/sdbuscpp/concatenator");` is now written like `auto proxy = createProxy(ServiceName{"org.sdbuscpp.concatenator"}, ObjectPath{"/org/sdbuscpp/concatenator"});`.
These types are:
* `ObjectPath` type for the object path (the type has been around already but now is also used consistently in sdbus-c++ API for object path strings),
* `InterfaceName` type for D-Bus interface names,
* `BusName` (and its aliases `ServiceName` and `ConnectionName`) type for bus/service/connection names,
* `MemberName` (and its aliases `MethodName`, `SignalName` and `PropertyName`) type for D-Bus method, signal and property names,
* `Signature` type for the D-Bus signature (the type has been around already but now is also used consistently in sdbus-c++ API for signature strings),
* `Error::Name` type for D-Bus error names.
2024-03-29 13:23:44 +01:00
|
|
|
TestProxy proxy{SERVICE_NAME, OBJECT_PATH};
|
2020-07-18 20:16:57 +02:00
|
|
|
++startedCount;
|
|
|
|
|
while (!invoke) ;
|
|
|
|
|
|
|
|
|
|
size_t localResultCount{};
|
|
|
|
|
for (size_t i = 0; i < 500; ++i)
|
|
|
|
|
{
|
|
|
|
|
auto result = proxy.doOperationAsync(i % 2);
|
|
|
|
|
if (result == (i % 2)) // Correct return value?
|
|
|
|
|
localResultCount++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
resultCount += localResultCount;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
std::thread invocations[]{std::thread{call}, std::thread{call}, std::thread{call}};
|
|
|
|
|
while (startedCount != 3) ;
|
|
|
|
|
invoke = true;
|
2026-01-15 14:38:33 +01:00
|
|
|
std::for_each(std::begin(invocations), std::end(invocations), [](auto& thread){ thread.join(); });
|
2020-07-18 20:16:57 +02:00
|
|
|
|
|
|
|
|
ASSERT_THAT(resultCount, Eq(1500));
|
|
|
|
|
}
|
|
|
|
|
|
2024-10-10 16:10:20 +02:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, RunsServerSideAsynchronousMethodWithLargeMessage)
|
|
|
|
|
{
|
|
|
|
|
std::map<int32_t, std::string> largeMap;
|
|
|
|
|
for (int32_t i = 0; i < 40'000; ++i)
|
|
|
|
|
largeMap.emplace(i, "This is string nr. " + std::to_string(i+1));
|
|
|
|
|
|
|
|
|
|
auto result1 = this->m_proxy->doOperationAsyncWithLargeData(0, largeMap); // Sends large map back in the context of the callback (event loop thread)
|
|
|
|
|
auto result2 = this->m_proxy->doOperationAsyncWithLargeData(500, largeMap); // Sends large map back outside the context of the event loop thread
|
|
|
|
|
|
|
|
|
|
ASSERT_THAT(result1, Eq(largeMap));
|
|
|
|
|
ASSERT_THAT(result2, Eq(largeMap));
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, InvokesMethodAsynchronouslyOnClientSide)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
|
|
|
|
std::promise<uint32_t> promise;
|
|
|
|
|
auto future = promise.get_future();
|
2024-01-10 15:43:37 +01:00
|
|
|
this->m_proxy->installDoOperationClientSideAsyncReplyHandler([&](uint32_t res, std::optional<sdbus::Error> err)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
2024-01-10 15:43:37 +01:00
|
|
|
if (!err)
|
2020-07-18 20:16:57 +02:00
|
|
|
promise.set_value(res);
|
|
|
|
|
else
|
2024-01-10 15:43:37 +01:00
|
|
|
promise.set_exception(std::make_exception_ptr(std::move(err)));
|
2020-07-18 20:16:57 +02:00
|
|
|
});
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
this->m_proxy->doOperationClientSideAsync(100);
|
2020-07-18 20:16:57 +02:00
|
|
|
|
|
|
|
|
ASSERT_THAT(future.get(), Eq(100));
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, InvokesMethodAsynchronouslyOnClientSideWithFuture)
|
2023-01-29 22:12:10 +01:00
|
|
|
{
|
2023-01-25 00:02:51 +01:00
|
|
|
auto future = this->m_proxy->doOperationClientSideAsync(100, sdbus::with_future);
|
2023-01-29 22:12:10 +01:00
|
|
|
|
|
|
|
|
ASSERT_THAT(future.get(), Eq(100));
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, InvokesMethodAsynchronouslyOnClientSideWithFutureOnBasicAPILevel)
|
2023-01-29 22:12:10 +01:00
|
|
|
{
|
2023-01-25 00:02:51 +01:00
|
|
|
auto future = this->m_proxy->doOperationClientSideAsyncOnBasicAPILevel(100);
|
2023-01-29 22:12:10 +01:00
|
|
|
|
|
|
|
|
auto methodReply = future.get();
|
|
|
|
|
uint32_t returnValue{};
|
|
|
|
|
methodReply >> returnValue;
|
|
|
|
|
|
|
|
|
|
ASSERT_THAT(returnValue, Eq(100));
|
|
|
|
|
}
|
|
|
|
|
|
2024-10-10 16:10:20 +02:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, InvokesMethodWithLargeDataAsynchronouslyOnClientSideWithFuture)
|
|
|
|
|
{
|
|
|
|
|
std::map<int32_t, std::string> largeMap;
|
|
|
|
|
for (int32_t i = 0; i < 40'000; ++i)
|
|
|
|
|
largeMap.emplace(i, "This is string nr. " + std::to_string(i+1));
|
|
|
|
|
|
|
|
|
|
auto future = this->m_proxy->doOperationWithLargeDataClientSideAsync(largeMap, sdbus::with_future);
|
|
|
|
|
|
|
|
|
|
ASSERT_THAT(future.get(), Eq(largeMap));
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, AnswersThatAsyncCallIsPendingIfItIsInProgress)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
2026-01-15 14:38:33 +01:00
|
|
|
this->m_proxy->installDoOperationClientSideAsyncReplyHandler([&](uint32_t /*res*/, const std::optional<sdbus::Error>& /*err*/){});
|
2020-07-18 20:16:57 +02:00
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
auto call = this->m_proxy->doOperationClientSideAsync(100);
|
2020-07-18 20:16:57 +02:00
|
|
|
|
|
|
|
|
ASSERT_TRUE(call.isPending());
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, CancelsPendingAsyncCallOnClientSide)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
|
|
|
|
std::promise<uint32_t> promise;
|
|
|
|
|
auto future = promise.get_future();
|
2026-01-15 14:38:33 +01:00
|
|
|
this->m_proxy->installDoOperationClientSideAsyncReplyHandler([&](uint32_t /*res*/, const std::optional<sdbus::Error>& /*err*/){ promise.set_value(1); });
|
2023-01-25 00:02:51 +01:00
|
|
|
auto call = this->m_proxy->doOperationClientSideAsync(100);
|
2020-07-18 20:16:57 +02:00
|
|
|
|
|
|
|
|
call.cancel();
|
|
|
|
|
|
|
|
|
|
ASSERT_THAT(future.wait_for(300ms), Eq(std::future_status::timeout));
|
|
|
|
|
}
|
|
|
|
|
|
2024-04-18 19:53:35 +02:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, CancelsPendingAsyncCallOnClientSideByDestroyingOwningSlot)
|
|
|
|
|
{
|
|
|
|
|
std::promise<uint32_t> promise;
|
|
|
|
|
auto future = promise.get_future();
|
2026-01-15 14:38:33 +01:00
|
|
|
this->m_proxy->installDoOperationClientSideAsyncReplyHandler([&](uint32_t /*res*/, const std::optional<sdbus::Error>& /*err*/){ promise.set_value(1); });
|
2024-04-18 19:53:35 +02:00
|
|
|
|
|
|
|
|
{
|
|
|
|
|
auto slot = this->m_proxy->doOperationClientSideAsync(100, sdbus::return_slot);
|
|
|
|
|
// Now the slot is destroyed, cancelling the async call
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ASSERT_THAT(future.wait_for(300ms), Eq(std::future_status::timeout));
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, AnswersThatAsyncCallIsNotPendingAfterItHasBeenCancelled)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
|
|
|
|
std::promise<uint32_t> promise;
|
2026-01-15 14:38:33 +01:00
|
|
|
this->m_proxy->installDoOperationClientSideAsyncReplyHandler([&](uint32_t /*res*/, const std::optional<sdbus::Error>& /*err*/){ promise.set_value(1); });
|
2023-01-25 00:02:51 +01:00
|
|
|
auto call = this->m_proxy->doOperationClientSideAsync(100);
|
2020-07-18 20:16:57 +02:00
|
|
|
|
|
|
|
|
call.cancel();
|
|
|
|
|
|
|
|
|
|
ASSERT_FALSE(call.isPending());
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, AnswersThatAsyncCallIsNotPendingAfterItHasBeenCompleted)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
|
|
|
|
std::promise<uint32_t> promise;
|
|
|
|
|
auto future = promise.get_future();
|
2026-01-15 14:38:33 +01:00
|
|
|
this->m_proxy->installDoOperationClientSideAsyncReplyHandler([&](uint32_t /*res*/, const std::optional<sdbus::Error>& /*err*/){ promise.set_value(1); });
|
2020-07-18 20:16:57 +02:00
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
auto call = this->m_proxy->doOperationClientSideAsync(0);
|
2020-07-18 20:16:57 +02:00
|
|
|
(void) future.get(); // Wait for the call to finish
|
|
|
|
|
|
|
|
|
|
ASSERT_TRUE(waitUntil([&call](){ return !call.isPending(); }));
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, AnswersThatDefaultConstructedAsyncCallIsNotPending)
|
2021-05-07 06:22:07 -07:00
|
|
|
{
|
2026-01-15 14:38:33 +01:00
|
|
|
sdbus::PendingAsyncCall const call;
|
2021-05-07 06:22:07 -07:00
|
|
|
|
|
|
|
|
ASSERT_FALSE(call.isPending());
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, SupportsAsyncCallCopyAssignment)
|
2021-05-07 06:22:07 -07:00
|
|
|
{
|
|
|
|
|
sdbus::PendingAsyncCall call;
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
call = this->m_proxy->doOperationClientSideAsync(100);
|
2021-05-07 06:22:07 -07:00
|
|
|
|
|
|
|
|
ASSERT_TRUE(call.isPending());
|
|
|
|
|
}
|
|
|
|
|
|
2026-01-15 14:38:33 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, ReturnsNonnullErrorWhenAsynchronousMethodCallFails) // NOLINT(readability-function-cognitive-complexity)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
|
|
|
|
std::promise<uint32_t> promise;
|
|
|
|
|
auto future = promise.get_future();
|
2024-01-10 15:43:37 +01:00
|
|
|
this->m_proxy->installDoOperationClientSideAsyncReplyHandler([&](uint32_t res, std::optional<sdbus::Error> err)
|
2020-07-18 20:16:57 +02:00
|
|
|
{
|
2024-01-10 15:43:37 +01:00
|
|
|
if (!err)
|
2020-07-18 20:16:57 +02:00
|
|
|
promise.set_value(res);
|
|
|
|
|
else
|
2024-01-10 15:43:37 +01:00
|
|
|
promise.set_exception(std::make_exception_ptr(*std::move(err)));
|
2020-07-18 20:16:57 +02:00
|
|
|
});
|
|
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
this->m_proxy->doErroneousOperationClientSideAsync();
|
2020-07-18 20:16:57 +02:00
|
|
|
|
|
|
|
|
ASSERT_THROW(future.get(), sdbus::Error);
|
|
|
|
|
}
|
2023-01-29 22:12:10 +01:00
|
|
|
|
2023-01-25 00:02:51 +01:00
|
|
|
TYPED_TEST(AsyncSdbusTestObject, ThrowsErrorWhenClientSideAsynchronousMethodCallWithFutureFails)
|
2023-01-29 22:12:10 +01:00
|
|
|
{
|
2023-01-25 00:02:51 +01:00
|
|
|
auto future = this->m_proxy->doErroneousOperationClientSideAsync(sdbus::with_future);
|
2023-01-29 22:12:10 +01:00
|
|
|
|
|
|
|
|
ASSERT_THROW(future.get(), sdbus::Error);
|
|
|
|
|
}
|