@@ -44,8 +44,7 @@ def __init__(self, tap_handler=None):
44
44
"/tap-server/tap/" )
45
45
else :
46
46
self ._tap = tap_handler
47
- self ._rmf_ftp = str ("http://sasdev-xmm.esac.esa.int/"
48
- "pub/ccf/constituents/extras/responses/" )
47
+ self ._rmf_ftp = str ("http://sasdev-xmm.esac.esa.int/pub/ccf/constituents/extras/responses/" )
49
48
50
49
def download_data (self , observation_id , * , filename = None , verbose = False ,
51
50
** kwargs ):
@@ -303,7 +302,7 @@ def _parse_filename(self, filename):
303
302
return ret
304
303
305
304
def get_epic_spectra (self , filename , source_number , * ,
306
- instrument = [], path = "" ):
305
+ instrument = [], path = "" , verbose = False ):
307
306
"""Extracts the EPIC sources spectral products from a given TAR file
308
307
For a given TAR file obtained with:
309
308
XMM.download_data(OBS_ID,level="PPS",extension="FTZ",filename=tarfile)
@@ -330,6 +329,10 @@ def get_epic_spectra(self, filename, source_number, *,
330
329
An array of strings indicating the desired instruments
331
330
path: string, optional
332
331
If set, extracts the EPIC images in the indicated path
332
+ verbose : bool
333
+ optional, default 'False'
334
+ flag to display information about the process
335
+
333
336
Returns
334
337
-------
335
338
A dictionary with the full paths of the extracted EPIC sources
@@ -398,6 +401,9 @@ def get_epic_spectra(self, filename, source_number, *,
398
401
399
402
link = self ._rmf_ftp + inst + rmf_fname
400
403
404
+ if verbose :
405
+ log .info ("rmf link is: %s" % link )
406
+
401
407
response = self ._request ('GET' , link )
402
408
403
409
rsp_filename = \
0 commit comments