A lot of files were missing copyright field in the header and
the Blender Foundation contributed to them in a sense of bug
fixing and general maintenance.
This change makes it explicit that those files are at least
partially copyrighted by the Blender Foundation.
Note that this does not make it so the Blender Foundation is
the only holder of the copyright in those files, and developers
who do not have a signed contract with the foundation still
hold the copyright as well.
Another aspect of this change is using SPDX format for the
header. We already used it for the license specification,
and now we state it for the copyright as well, following the
FAQ:
https://reuse.software/faq/
173 lines
8.3 KiB
C++
173 lines
8.3 KiB
C++
/* SPDX-FileCopyrightText: 2021 Blender Foundation.
|
||
*
|
||
* SPDX-License-Identifier: GPL-2.0-or-later */
|
||
#include "testing/testing.h"
|
||
|
||
#include "BKE_cryptomatte.h"
|
||
#include "BKE_cryptomatte.hh"
|
||
#include "BKE_image.h"
|
||
|
||
#include "RE_pipeline.h"
|
||
|
||
#include "MEM_guardedalloc.h"
|
||
|
||
namespace blender::bke::cryptomatte::tests {
|
||
|
||
TEST(cryptomatte, meta_data_key)
|
||
{
|
||
ASSERT_EQ("cryptomatte/c7dbf5e/key",
|
||
BKE_cryptomatte_meta_data_key("ViewLayer.CryptoMaterial", "key"));
|
||
ASSERT_EQ("cryptomatte/b990b65/𝓴𝓮𝔂",
|
||
BKE_cryptomatte_meta_data_key("𝖚𝖓𝖎𝖈𝖔𝖉𝖊.CryptoMaterial", "𝓴𝓮𝔂"));
|
||
}
|
||
|
||
TEST(cryptomatte, extract_layer_name)
|
||
{
|
||
ASSERT_EQ("ViewLayer.CryptoMaterial",
|
||
BKE_cryptomatte_extract_layer_name("ViewLayer.CryptoMaterial00"));
|
||
ASSERT_EQ("𝖚𝖓𝖎𝖈𝖔𝖉𝖊", BKE_cryptomatte_extract_layer_name("𝖚𝖓𝖎𝖈𝖔𝖉𝖊13"));
|
||
ASSERT_EQ("NoTrailingSampleNumber",
|
||
BKE_cryptomatte_extract_layer_name("NoTrailingSampleNumber"));
|
||
ASSERT_EQ("W1thM1dd13Numb3rs", BKE_cryptomatte_extract_layer_name("W1thM1dd13Numb3rs09"));
|
||
ASSERT_EQ("", BKE_cryptomatte_extract_layer_name("0123"));
|
||
ASSERT_EQ("", BKE_cryptomatte_extract_layer_name(""));
|
||
}
|
||
|
||
TEST(cryptomatte, layer)
|
||
{
|
||
blender::bke::cryptomatte::CryptomatteLayer layer;
|
||
ASSERT_EQ("{}", layer.manifest());
|
||
|
||
layer.add_hash("Object", 123);
|
||
ASSERT_EQ("{\"Object\":\"0000007b\"}", layer.manifest());
|
||
|
||
layer.add_hash("Object2", 123245678);
|
||
ASSERT_EQ("{\"Object\":\"0000007b\",\"Object2\":\"0758946e\"}", layer.manifest());
|
||
}
|
||
|
||
TEST(cryptomatte, layer_quoted)
|
||
{
|
||
blender::bke::cryptomatte::CryptomatteLayer layer;
|
||
layer.add_hash("\"Object\"", 123);
|
||
ASSERT_EQ("{\"\\\"Object\\\"\":\"0000007b\"}", layer.manifest());
|
||
}
|
||
|
||
static void test_cryptomatte_manifest(std::string expected, std::string manifest)
|
||
{
|
||
EXPECT_EQ(expected,
|
||
blender::bke::cryptomatte::CryptomatteLayer::read_from_manifest(manifest)->manifest());
|
||
}
|
||
|
||
TEST(cryptomatte, layer_from_manifest)
|
||
{
|
||
test_cryptomatte_manifest("{}", "{}");
|
||
test_cryptomatte_manifest(R"({"Object":"12345678"})", R"({"Object": "12345678"})");
|
||
test_cryptomatte_manifest(R"({"Object":"12345678","Object2":"87654321"})",
|
||
R"({"Object":"12345678","Object2":"87654321"})");
|
||
test_cryptomatte_manifest(R"({"Object":"12345678","Object2":"87654321"})",
|
||
R"( { "Object" : "12345678" , "Object2" : "87654321" } )");
|
||
test_cryptomatte_manifest(R"({"Object\"01\"":"12345678"})", R"({"Object\"01\"": "12345678"})");
|
||
test_cryptomatte_manifest(
|
||
R"({"Object\"01\"":"12345678","Object":"12345678","Object2":"87654321"})",
|
||
R"({"Object\"01\"":"12345678","Object":"12345678", "Object2":"87654321"})");
|
||
}
|
||
|
||
TEST(cryptomatte, extract_layer_hash_from_metadata_key)
|
||
{
|
||
EXPECT_EQ("eb4c67b",
|
||
blender::bke::cryptomatte::CryptomatteStampDataCallbackData::extract_layer_hash(
|
||
"cryptomatte/eb4c67b/conversion"));
|
||
EXPECT_EQ("qwerty",
|
||
blender::bke::cryptomatte::CryptomatteStampDataCallbackData::extract_layer_hash(
|
||
"cryptomatte/qwerty/name"));
|
||
/* Check if undefined behaviors are handled. */
|
||
EXPECT_EQ("",
|
||
blender::bke::cryptomatte::CryptomatteStampDataCallbackData::extract_layer_hash(
|
||
"cryptomatte/name"));
|
||
EXPECT_EQ("",
|
||
blender::bke::cryptomatte::CryptomatteStampDataCallbackData::extract_layer_hash(
|
||
"cryptomatte/"));
|
||
}
|
||
|
||
static void validate_cryptomatte_session_from_stamp_data(void * /*data*/,
|
||
const char *propname,
|
||
char *propvalue,
|
||
int /*propvalue_maxncpy*/)
|
||
{
|
||
blender::StringRefNull prop_name(propname);
|
||
if (!prop_name.startswith("cryptomatte/")) {
|
||
return;
|
||
}
|
||
|
||
if (prop_name == "cryptomatte/87f095e/name") {
|
||
EXPECT_STREQ("viewlayername.layer1", propvalue);
|
||
}
|
||
else if (prop_name == "cryptomatte/87f095e/hash") {
|
||
EXPECT_STREQ("MurmurHash3_32", propvalue);
|
||
}
|
||
else if (prop_name == "cryptomatte/87f095e/conversion") {
|
||
EXPECT_STREQ("uint32_to_float32", propvalue);
|
||
}
|
||
else if (prop_name == "cryptomatte/87f095e/manifest") {
|
||
EXPECT_STREQ(R"({"Object":"12345678"})", propvalue);
|
||
}
|
||
|
||
else if (prop_name == "cryptomatte/c42daa7/name") {
|
||
EXPECT_STREQ("viewlayername.layer2", propvalue);
|
||
}
|
||
else if (prop_name == "cryptomatte/c42daa7/hash") {
|
||
EXPECT_STREQ("MurmurHash3_32", propvalue);
|
||
}
|
||
else if (prop_name == "cryptomatte/c42daa7/conversion") {
|
||
EXPECT_STREQ("uint32_to_float32", propvalue);
|
||
}
|
||
else if (prop_name == "cryptomatte/c42daa7/manifest") {
|
||
EXPECT_STREQ(R"({"Object2":"87654321"})", propvalue);
|
||
}
|
||
|
||
else {
|
||
EXPECT_EQ("Unhandled", std::string(propname) + ": " + propvalue);
|
||
}
|
||
}
|
||
|
||
TEST(cryptomatte, session_from_stamp_data)
|
||
{
|
||
/* Create CryptomatteSession from stamp data. */
|
||
RenderResult *render_result = static_cast<RenderResult *>(
|
||
MEM_callocN(sizeof(RenderResult), __func__));
|
||
BKE_render_result_stamp_data(render_result, "cryptomatte/qwerty/name", "layer1");
|
||
BKE_render_result_stamp_data(
|
||
render_result, "cryptomatte/qwerty/manifest", R"({"Object":"12345678"})");
|
||
BKE_render_result_stamp_data(render_result, "cryptomatte/uiop/name", "layer2");
|
||
BKE_render_result_stamp_data(
|
||
render_result, "cryptomatte/uiop/manifest", R"({"Object2":"87654321"})");
|
||
CryptomatteSessionPtr session(BKE_cryptomatte_init_from_render_result(render_result));
|
||
EXPECT_NE(session.get(), nullptr);
|
||
RE_FreeRenderResult(render_result);
|
||
|
||
/* Create StampData from CryptomatteSession. */
|
||
ViewLayer view_layer;
|
||
STRNCPY(view_layer.name, "viewlayername");
|
||
RenderResult *render_result2 = static_cast<RenderResult *>(
|
||
MEM_callocN(sizeof(RenderResult), __func__));
|
||
BKE_cryptomatte_store_metadata(session.get(), render_result2, &view_layer);
|
||
|
||
/* Validate StampData. */
|
||
BKE_stamp_info_callback(
|
||
nullptr, render_result2->stamp_data, validate_cryptomatte_session_from_stamp_data, false);
|
||
|
||
RE_FreeRenderResult(render_result2);
|
||
}
|
||
|
||
/**
|
||
* Test method that contains known malformed manifests and makes sure that these can be parsed as
|
||
* best as possible. */
|
||
TEST(cryptomatte, parsing_malformed_manifests)
|
||
{
|
||
/* Manifest from `multilayer.exr` in the cryptomatte git-repository. */
|
||
test_cryptomatte_manifest(
|
||
R"({"/obj/instance1:instances:0":"0d54c6cc","/obj/instance1:instances:1":"293d9340","/obj/instance1:instances:110":"ccb9e1f2","/obj/instance1:instances:111":"f8dd3a48","/obj/instance1:instances:112":"a99e07a8","/obj/instance1:instances:113":"e75599a4","/obj/instance1:instances:114":"794200f3","/obj/instance1:instances:115":"2a3a1728","/obj/instance1:instances:116":"478544a1","/obj/instance1:instances:117":"b2bd969a","/obj/instance1:instances:10":"3a0c8681","/obj/instance1:instances:11":"01e5970d","/obj/box:polygons:1":"9d416418","/obj/instance1:instances:100":"2dcd2966","/obj/instance1:instances:101":"9331cd82","/obj/instance1:instances:102":"df50fccb","/obj/instance1:instances:103":"97f8590d","/obj/instance1:instances:104":"bbcd220d","/obj/instance1:instances:105":"4ae06139","/obj/instance1:instances:106":"8873d5ea","/obj/instance1:instances:107":"39d8af8d","/obj/instance1:instances:108":"bb11bd4e","/obj/instance1:instances:109":"a32bba35"})",
|
||
R"({"\/obj\/box:polygons:1":"9d416418","\/obj\/instance1:instances:0":"0d54c6cc","\/obj\/instance1:instances:1":"293d9340","\/obj\/instance1:instances:10":"3a0c8681","\/obj\/instance1:instances:100":"2dcd2966","\/obj\/instance1:instances:101":"9331cd82","\/obj\/instance1:instances:102":"df50fccb","\/obj\/instance1:instances:103":"97f8590d","\/obj\/instance1:instances:104":"bbcd220d","\/obj\/instance1:instances:105":"4ae06139","\/obj\/instance1:instances:106":"8873d5ea","\/obj\/instance1:instances:107":"39d8af8d","\/obj\/instance1:instances:108":"bb11bd4e","\/obj\/instance1:instances:109":"a32bba35","\/obj\/instance1:instances:11":"01e5970d","\/obj\/instance1:instances:110":"ccb9e1f2","\/obj\/instance1:instances:111":"f8dd3a48","\/obj\/instance1:instances:112":"a99e07a8","\/obj\/instance1:instances:113":"e75599a4","\/obj\/instance1:instances:114":"794200f3","\/obj\/instance1:instances:115":"2a3a1728","\/obj\/instance1:instances:116":"478544a1","\/obj\/instance1:instances:117":"b2bd969a","\/obj\/instance1:instance)");
|
||
}
|
||
} // namespace blender::bke::cryptomatte::tests
|