40m QIL Cryo_Lab CTN SUS_Lab TCS_Lab OMC_Lab CRIME_Lab FEA ENG_Labs OptContFac Mariner WBEEShop
  40m Log  Not logged in ELOG logo
Entry  Tue Jun 5 21:09:40 2012, yuta, Update, Computer Scripts / Programs, hacked ezca tools 
    Reply  Wed Jun 6 18:04:22 2012, Jamie, Update, Computer Scripts / Programs, hacked ezca tools 
       Reply  Wed Jun 6 18:22:52 2012, Jamie, Update, Computer Scripts / Programs, hacked ezca tools 
Message ID: 6757     Entry time: Tue Jun 5 21:09:40 2012     Reply to this: 6768
Author: yuta 
Type: Update 
Category: Computer Scripts / Programs 
Subject: hacked ezca tools 

Currently, ezca tools are flakey and fails too much.
So, I hacked ezca tools just like Yoichi did in 2009 (see elog #1368).

For now,

/ligo/apps/linux-x86_64/gds-2.15.1/bin/ezcaread
/ligo/apps/linux-x86_64/gds-2.15.1/bin/ezcastep
/ligo/apps/linux-x86_64/gds-2.15.1/bin/ezcaswitch
/ligo/apps/linux-x86_64/gds-2.15.1/bin/ezcawrite

are wrapper scripts that repeats ezca stuff until it succeeds (or fails more than 5 times).

Of course, this is just a temporary solution to do tonight's work.
To stop this hack, run /users/yuta/scripts/ezhack/stophacking.cmd. To hack, run /users/yuta/scripts/ezhack/starthacking.cmd.

Original binary files are located in /ligo/apps/linux-x86_64/gds-2.15.1/bin/ezcabackup/ directory.
Wrapper scripts live in /users/yuta/scripts/ezhack directory.

I wish I could alias ezca tools to my wrapper scripts so that I don't have to touch the original files. However, alias settings doesn't work in our scripts.
Do you have any idea?

ELOG V3.1.3-