forked from project-chip/connectedhomeip
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathspec_parsing_support.py
616 lines (534 loc) · 31.6 KB
/
spec_parsing_support.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
#
# Copyright (c) 2023 Project CHIP Authors
# All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
import glob
import logging
import os
import typing
import xml.etree.ElementTree as ElementTree
from copy import deepcopy
from dataclasses import dataclass
from enum import Enum, auto
from typing import Callable, Optional
import chip.clusters as Clusters
from chip.tlv import uint
from conformance_support import (OPTIONAL_CONFORM, TOP_LEVEL_CONFORMANCE_TAGS, ConformanceDecision, ConformanceException,
ConformanceParseParameters, feature, is_disallowed, mandatory, optional, or_operation,
parse_callable_from_xml)
from global_attribute_ids import GlobalAttributeIds
from matter_testing_support import (AttributePathLocation, ClusterPathLocation, CommandPathLocation, EventPathLocation,
FeaturePathLocation, ProblemNotice, ProblemSeverity)
_PRIVILEGE_STR = {
None: "N/A",
Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView: "V",
Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kOperate: "O",
Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kManage: "M",
Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kAdminister: "A",
}
def to_access_code(privilege: Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum) -> str:
return _PRIVILEGE_STR.get(privilege, "")
class SpecParsingException(Exception):
pass
@dataclass
class XmlFeature:
code: str
name: str
conformance: Callable[[uint], ConformanceDecision]
@dataclass
class XmlAttribute:
name: str
datatype: str
conformance: Callable[[uint], ConformanceDecision]
read_access: Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum
write_access: Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum
write_optional: bool
def access_string(self):
read_marker = "R" if self.read_access is not Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue else ""
write_marker = "W" if self.write_access is not Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue else ""
read_access_marker = f'{to_access_code(self.read_access)}'
write_access_marker = f'{to_access_code(self.write_access)}'
return f'{read_marker}{write_marker} {read_access_marker}{write_access_marker}'
def __str__(self):
return f'{self.name}: datatype: {self.datatype} conformance: {str(self.conformance)}, access = {self.access_string()}'
@dataclass
class XmlCommand:
id: int
name: str
conformance: Callable[[uint], ConformanceDecision]
@dataclass
class XmlEvent:
name: str
conformance: Callable[[uint], ConformanceDecision]
@dataclass
class XmlCluster:
name: str
revision: int
derived: str
feature_map: dict[str, uint]
attribute_map: dict[str, uint]
command_map: dict[str, uint]
# mask to XmlFeature
features: dict[uint, XmlFeature]
# IDs to class
attributes: dict[uint, XmlAttribute]
accepted_commands: dict[uint, XmlCommand]
generated_commands: dict[uint, XmlCommand]
unknown_commands: list[XmlCommand]
events: dict[uint, XmlEvent]
pics: str
class CommandType(Enum):
ACCEPTED = auto()
GENERATED = auto()
# This will happen for derived clusters, where the direction isn't noted. On normal clusters, this is a problem.
UNKNOWN = auto()
# workaround for aliased clusters PICS not appearing in the xml. Remove this once https://github.com/csa-data-model/projects/issues/461 is addressed
ALIAS_PICS = {0x040C: 'CMOCONC',
0x040D: 'CDOCONC',
0x0413: 'NDOCONC',
0x0415: 'OZCONC',
0x042A: 'PMICONC',
0x042B: 'FLDCONC',
0x042C: 'PMHCONC',
0x042D: 'PMKCONC',
0x042E: 'TVOCCONC',
0x042F: 'RNCONC',
0x0071: 'HEPAFREMON',
0x0072: 'ACFREMON',
0x0405: 'RH',
0x001C: 'PWM'}
class ClusterParser:
def __init__(self, cluster, cluster_id, name):
self._problems: list[ProblemNotice] = []
self._cluster = cluster
self._cluster_id = cluster_id
self._name = name
self._derived = None
try:
classification = next(cluster.iter('classification'))
hierarchy = classification.attrib['hierarchy']
if hierarchy.lower() == 'derived':
self._derived = classification.attrib['baseCluster']
except (KeyError, StopIteration):
self._derived = None
try:
classification = next(cluster.iter('classification'))
self._pics = classification.attrib['picsCode']
except (KeyError, StopIteration):
self._pics = None
if self._cluster_id in ALIAS_PICS.keys():
self._pics = ALIAS_PICS[cluster_id]
self.feature_elements = self.get_all_feature_elements()
self.attribute_elements = self.get_all_attribute_elements()
self.command_elements = self.get_all_command_elements()
self.event_elements = self.get_all_event_elements()
self.params = ConformanceParseParameters(feature_map=self.create_feature_map(), attribute_map=self.create_attribute_map(),
command_map=self.create_command_map())
def get_location_from_element(self, element: ElementTree.Element):
# Conformance is missing, so let's record the problem and treat it as optional for lack of a better choice
if element.tag == 'feature':
location = FeaturePathLocation(endpoint_id=0, cluster_id=self._cluster_id, feature_code=element.attrib['code'])
elif element.tag == 'command':
location = CommandPathLocation(endpoint_id=0, cluster_id=self._cluster_id, command_id=int(element.attrib['id'], 0))
elif element.tag == 'attribute':
location = AttributePathLocation(endpoint_id=0, cluster_id=self._cluster_id, attribute_id=int(element.attrib['id'], 0))
elif element.tag == 'event':
location = EventPathLocation(endpoint_id=0, cluster_id=self._cluster_id, event_id=int(element.attrib['id'], 0))
else:
location = ClusterPathLocation(endpoint_id=0, cluster_id=self._cluster_id)
return location
def get_conformance(self, element: ElementTree.Element) -> ElementTree.Element:
for sub in element:
if sub.tag in TOP_LEVEL_CONFORMANCE_TAGS:
return sub
location = self.get_location_from_element(element)
self._problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem='Unable to find conformance element'))
return ElementTree.Element(OPTIONAL_CONFORM)
def get_access(self, element: ElementTree.Element) -> Optional[ElementTree.Element]:
for sub in element:
if sub.tag == 'access':
return sub
return None
def get_all_type(self, type_container: str, type_name: str, key_name: str) -> list[tuple[ElementTree.Element, ElementTree.Element, ElementTree.Element]]:
ret = []
container_tags = self._cluster.iter(type_container)
for container in container_tags:
elements = container.iter(type_name)
for element in elements:
try:
element.attrib[key_name]
except KeyError:
# This is a conformance tag, which uses the same name
continue
conformance = self.get_conformance(element)
access = self.get_access(element)
ret.append((element, conformance, access))
return ret
def get_all_feature_elements(self) -> list[tuple[ElementTree.Element, ElementTree.Element]]:
''' Returns a list of features and their conformances'''
return self.get_all_type('features', 'feature', 'code')
def get_all_attribute_elements(self) -> list[tuple[ElementTree.Element, ElementTree.Element]]:
''' Returns a list of attributes and their conformances'''
return self.get_all_type('attributes', 'attribute', 'id')
def get_all_command_elements(self) -> list[tuple[ElementTree.Element, ElementTree.Element]]:
''' Returns a list of commands and their conformances '''
return self.get_all_type('commands', 'command', 'id')
def get_all_event_elements(self) -> list[tuple[ElementTree.Element, ElementTree.Element]]:
''' Returns a list of events and their conformances'''
return self.get_all_type('events', 'event', 'id')
def create_feature_map(self) -> dict[str, uint]:
features = {}
for element, _, _ in self.feature_elements:
features[element.attrib['code']] = 1 << int(element.attrib['bit'], 0)
return features
def create_attribute_map(self) -> dict[str, uint]:
attributes = {}
for element, conformance, _ in self.attribute_elements:
attributes[element.attrib['name']] = int(element.attrib['id'], 0)
return attributes
def create_command_map(self) -> dict[str, uint]:
commands = {}
for element, _, _ in self.command_elements:
commands[element.attrib['name']] = int(element.attrib['id'], 0)
return commands
def parse_conformance(self, conformance_xml: ElementTree.Element) -> Callable:
try:
return parse_callable_from_xml(conformance_xml, self.params)
except ConformanceException as ex:
# Just point to the general cluster, because something is mismatched, but it's not clear what
location = ClusterPathLocation(endpoint_id=0, cluster_id=self._cluster_id)
self._problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem=str(ex)))
return None
def parse_write_optional(self, element_xml: ElementTree.Element, access_xml: ElementTree.Element) -> bool:
return access_xml.attrib['write'] == 'optional'
def parse_access(self, element_xml: ElementTree.Element, access_xml: ElementTree.Element, conformance: Callable) -> tuple[Optional[Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum], Optional[Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum], Optional[Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum]]:
''' Returns a tuple of access types for read / write / invoke'''
def str_to_access_type(privilege_str: str) -> Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum:
if privilege_str == 'view':
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView
if privilege_str == 'operate':
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kOperate
if privilege_str == 'manage':
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kManage
if privilege_str == 'admin':
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kAdminister
# We don't know what this means, for now, assume no access and mark a warning
location = self.get_location_from_element(element_xml)
self._problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem=f'Unknown access type {privilege_str}'))
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
if access_xml is None:
# Derived clusters can inherit their access from the base and that's fine, so don't add an error
# Similarly, pure base clusters can have the access defined in the derived clusters. If neither has it defined,
# we will determine this at the end when we put these together.
# Things with deprecated conformance don't get an access element, and that is also fine.
# If a device properly passes the conformance test, such elements are guaranteed not to appear on the device.
if self._derived is not None or is_disallowed(conformance):
return (None, None, None)
location = self.get_location_from_element(element_xml)
self._problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem='Unable to find access element'))
return (None, None, None)
try:
read_access = str_to_access_type(access_xml.attrib['readPrivilege'])
except KeyError:
read_access = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
try:
write_access = str_to_access_type(access_xml.attrib['writePrivilege'])
except KeyError:
write_access = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
try:
invoke_access = str_to_access_type(access_xml.attrib['invokePrivilege'])
except KeyError:
invoke_access = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
return (read_access, write_access, invoke_access)
def parse_features(self) -> dict[uint, XmlFeature]:
features = {}
for element, conformance_xml, _ in self.feature_elements:
mask = 1 << int(element.attrib['bit'], 0)
conformance = self.parse_conformance(conformance_xml)
if conformance is None:
continue
features[mask] = XmlFeature(code=element.attrib['code'], name=element.attrib['name'],
conformance=conformance)
return features
def parse_attributes(self) -> dict[uint, XmlAttribute]:
attributes = {}
for element, conformance_xml, access_xml in self.attribute_elements:
code = int(element.attrib['id'], 0)
# Some deprecated attributes don't have their types included, for now, lets just fallback to UNKNOWN
try:
datatype = element.attrib['type']
except KeyError:
datatype = 'UNKNOWN'
conformance = self.parse_conformance(conformance_xml)
if conformance is None:
continue
if code in attributes:
# This is one of those fun ones where two different rows have the same id and name, but differ in conformance and ranges
# I don't have a good way to relate the ranges to the conformance, but they're both acceptable, so let's just or them.
conformance = or_operation([conformance, attributes[code].conformance])
read_access, write_access, _ = self.parse_access(element, access_xml, conformance)
write_optional = False
if write_access not in [None, Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue]:
write_optional = self.parse_write_optional(element, access_xml)
attributes[code] = XmlAttribute(name=element.attrib['name'], datatype=datatype,
conformance=conformance, read_access=read_access, write_access=write_access, write_optional=write_optional)
# Add in the global attributes for the base class
for id in GlobalAttributeIds:
# TODO: Add data type here. Right now it's unused. We should parse this from the spec.
attributes[id] = XmlAttribute(name=id.to_name(), datatype="", conformance=mandatory(
), read_access=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView, write_access=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue, write_optional=False)
return attributes
def get_command_type(self, element: ElementTree.Element) -> CommandType:
try:
if element.attrib['direction'].lower() == 'responsefromserver':
return CommandType.GENERATED
if element.attrib['direction'].lower() == 'commandtoclient':
return CommandType.UNKNOWN
if element.attrib['direction'].lower() == 'commandtoserver':
return CommandType.ACCEPTED
raise Exception(f"Unknown direction: {element.attrib['direction']}")
except KeyError:
return CommandType.UNKNOWN
def parse_unknown_commands(self) -> list[XmlCommand]:
commands = []
for element, conformance_xml, access_xml in self.command_elements:
if self.get_command_type(element) != CommandType.UNKNOWN:
continue
code = int(element.attrib['id'], 0)
conformance = self.parse_conformance(conformance_xml)
commands.append(XmlCommand(id=code, name=element.attrib['name'], conformance=conformance))
return commands
def parse_commands(self, command_type: CommandType) -> dict[uint, XmlCommand]:
commands = {}
for element, conformance_xml, access_xml in self.command_elements:
if self.get_command_type(element) != command_type:
continue
code = int(element.attrib['id'], 0)
conformance = self.parse_conformance(conformance_xml)
if conformance is None:
continue
if code in commands:
conformance = or_operation([conformance, commands[code].conformance])
commands[code] = XmlCommand(id=code, name=element.attrib['name'], conformance=conformance)
return commands
def parse_events(self) -> dict[uint, XmlAttribute]:
events = {}
for element, conformance_xml, access_xml in self.event_elements:
code = int(element.attrib['id'], 0)
conformance = self.parse_conformance(conformance_xml)
if conformance is None:
continue
if code in events:
conformance = or_operation([conformance, events[code].conformance])
events[code] = XmlEvent(name=element.attrib['name'], conformance=conformance)
return events
def create_cluster(self) -> XmlCluster:
try:
revision = int(self._cluster.attrib['revision'], 0)
except ValueError:
revision = 0
return XmlCluster(revision=revision, derived=self._derived,
name=self._name, feature_map=self.params.feature_map,
attribute_map=self.params.attribute_map, command_map=self.params.command_map,
features=self.parse_features(),
attributes=self.parse_attributes(),
accepted_commands=self.parse_commands(CommandType.ACCEPTED),
generated_commands=self.parse_commands(CommandType.GENERATED),
unknown_commands=self.parse_unknown_commands(),
events=self.parse_events(), pics=self._pics)
def get_problems(self) -> list[ProblemNotice]:
return self._problems
def add_cluster_data_from_xml(xml: ElementTree.Element, clusters: dict[int, XmlCluster], pure_base_clusters: dict[str, XmlCluster], ids_by_name: dict[str, int], problems: list[ProblemNotice]) -> None:
''' Adds cluster data to the supplied dicts as appropriate
xml: XML element read from from the XML cluster file
clusters: dict of id -> XmlCluster. This function will append new clusters as appropriate to this dict.
pure_base_clusters: dict of base name -> XmlCluster. This data structure is used to hold pure base clusters that don't have
an ID. This function will append new pure base clusters as appropriate to this dict.
ids_by_name: dict of cluster name -> ID. This function will append new IDs as appropriate to this dict.
problems: list of any problems encountered during spec parsing. This function will append problems as appropriate to this list.
'''
cluster = xml.iter('cluster')
for c in cluster:
ids = c.iter('clusterId')
for id in ids:
name = id.get('name')
cluster_id = id.get('id')
if cluster_id:
cluster_id = int(id.get('id'), 0)
ids_by_name[name] = cluster_id
parser = ClusterParser(c, cluster_id, name)
new = parser.create_cluster()
problems = problems + parser.get_problems()
if cluster_id:
clusters[cluster_id] = new
else:
# Fully derived clusters have no id, but also shouldn't appear on a device.
# We do need to keep them, though, because we need to update the derived
# clusters. We keep them in a special dict by name, so they can be thrown
# away later.
pure_base_clusters[name] = new
def check_clusters_for_unknown_commands(clusters: dict[int, XmlCluster], problems: list[ProblemNotice]):
for id, cluster in clusters.items():
for cmd in cluster.unknown_commands:
problems.append(ProblemNotice(test_name="Spec XML parsing", location=CommandPathLocation(
endpoint_id=0, cluster_id=id, command_id=cmd.id), severity=ProblemSeverity.WARNING, problem="Command with unknown direction"))
class PrebuiltDataModelDirectory(Enum):
k1_3 = auto()
kMaster = auto()
def build_xml_clusters(data_model_directory: typing.Union[PrebuiltDataModelDirectory, str] = PrebuiltDataModelDirectory.k1_3) -> tuple[dict[uint, XmlCluster], list[ProblemNotice]]:
if data_model_directory == PrebuiltDataModelDirectory.k1_3:
dir = os.path.join(os.path.dirname(os.path.realpath(__file__)), '..', '..', 'data_model', '1.3', 'clusters')
elif data_model_directory == PrebuiltDataModelDirectory.kMaster:
dir = os.path.join(os.path.dirname(os.path.realpath(__file__)), '..', '..', 'data_model', 'master', 'clusters')
else:
dir = data_model_directory
clusters: dict[int, XmlCluster] = {}
pure_base_clusters: dict[str, XmlCluster] = {}
ids_by_name: dict[str, int] = {}
problems: list[ProblemNotice] = []
files = glob.glob(f'{dir}/*.xml')
if not files:
raise SpecParsingException(f'No data model files found in specified directory {dir}')
for xml in files:
logging.info(f'Parsing file {xml}')
tree = ElementTree.parse(f'{xml}')
root = tree.getroot()
add_cluster_data_from_xml(root, clusters, pure_base_clusters, ids_by_name, problems)
# There are a few clusters where the conformance columns are listed as desc. These clusters need specific, targeted tests
# to properly assess conformance. Here, we list them as Optional to allow these for the general test. Targeted tests are described below.
# Descriptor - TagList feature - this feature is mandated when the duplicate condition holds for the endpoint. It is tested in DESC-2.2
# Actions cluster - all commands - these need to be listed in the ActionsList attribute to be supported.
# We do not currently have a test for this. Please see https://github.com/CHIP-Specifications/chip-test-plans/issues/3646.
def remove_problem(location: typing.Union[CommandPathLocation, FeaturePathLocation]):
nonlocal problems
problems = [p for p in problems if p.location != location]
descriptor_id = Clusters.Descriptor.id
code = 'TAGLIST'
mask = clusters[descriptor_id].feature_map[code]
clusters[descriptor_id].features[mask].conformance = optional()
remove_problem(FeaturePathLocation(endpoint_id=0, cluster_id=descriptor_id, feature_code=code))
action_id = Clusters.Actions.id
for c in Clusters.ClusterObjects.ALL_ACCEPTED_COMMANDS[action_id]:
clusters[action_id].accepted_commands[c].conformance = optional()
remove_problem(CommandPathLocation(endpoint_id=0, cluster_id=action_id, command_id=c))
combine_derived_clusters_with_base(clusters, pure_base_clusters, ids_by_name, problems)
# TODO: All these fixups should be removed BEFORE SVE if at all possible
# Workaround for Color Control cluster - the spec uses a non-standard conformance. Set all to optional now, will need
# to implement either arithmetic conformance handling (once spec changes land here) or specific test
# https://github.com/CHIP-Specifications/connectedhomeip-spec/pull/7808 for spec changes.
# see 3.2.8. Defined Primaries Information Attribute Set, affects Primary<#>X/Y/Intensity attributes.
cc_id = Clusters.ColorControl.id
cc_attr = Clusters.ColorControl.Attributes
affected_attributes = [cc_attr.Primary1X,
cc_attr.Primary1Y,
cc_attr.Primary1Intensity,
cc_attr.Primary2X,
cc_attr.Primary2Y,
cc_attr.Primary2Intensity,
cc_attr.Primary3X,
cc_attr.Primary3Y,
cc_attr.Primary3Intensity,
cc_attr.Primary4X,
cc_attr.Primary4Y,
cc_attr.Primary4Intensity,
cc_attr.Primary5X,
cc_attr.Primary5Y,
cc_attr.Primary5Intensity,
cc_attr.Primary6X,
cc_attr.Primary6Y,
cc_attr.Primary6Intensity,
]
for a in affected_attributes:
clusters[cc_id].attributes[a.attribute_id].conformance = optional()
# Workaround for temp control cluster - this is parsed incorrectly in the DM XML and is missing all its attributes
# Remove this workaround when https://github.com/csa-data-model/projects/issues/330 is fixed
temp_control_id = Clusters.TemperatureControl.id
if temp_control_id in clusters and not clusters[temp_control_id].attributes:
view = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView
none = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
clusters[temp_control_id].attributes = {
0x00: XmlAttribute(name='TemperatureSetpoint', datatype='temperature', conformance=feature(0x01, 'TN'), read_access=view, write_access=none, write_optional=False),
0x01: XmlAttribute(name='MinTemperature', datatype='temperature', conformance=feature(0x01, 'TN'), read_access=view, write_access=none, write_optional=False),
0x02: XmlAttribute(name='MaxTemperature', datatype='temperature', conformance=feature(0x01, 'TN'), read_access=view, write_access=none, write_optional=False),
0x03: XmlAttribute(name='Step', datatype='temperature', conformance=feature(0x04, 'STEP'), read_access=view, write_access=none, write_optional=False),
0x04: XmlAttribute(name='SelectedTemperatureLevel', datatype='uint8', conformance=feature(0x02, 'TL'), read_access=view, write_access=none, write_optional=False),
0x05: XmlAttribute(name='SupportedTemperatureLevels', datatype='list', conformance=feature(0x02, 'TL'), read_access=view, write_access=none, write_optional=False),
}
check_clusters_for_unknown_commands(clusters, problems)
return clusters, problems
def combine_derived_clusters_with_base(xml_clusters: dict[int, XmlCluster], pure_base_clusters: dict[str, XmlCluster], ids_by_name: dict[str, int], problems: list[ProblemNotice]) -> None:
''' Overrides base elements with the derived cluster values for derived clusters. '''
def combine_attributes(base: dict[uint, XmlAttribute], derived: dict[uint, XmlAttribute], cluster_id: uint, problems: list[ProblemNotice]) -> dict[uint, XmlAttribute]:
ret = deepcopy(base)
extras = {k: v for k, v in derived.items() if k not in base.keys()}
overrides = {k: v for k, v in derived.items() if k in base.keys()}
ret.update(extras)
for id, override in overrides.items():
if override.conformance:
ret[id].conformance = override.conformance
if override.read_access:
ret[id].read_access = override.read_access
if override.write_access:
ret[id].write_access = override.write_access
if ret[id].read_access is None and ret[id].write_access is None:
location = AttributePathLocation(endpoint_id=0, cluster_id=cluster_id, attribute_id=id)
problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem='Unable to find access element'))
if ret[id].read_access is None:
ret[id].read_access == Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
if ret[id].write_access is None:
ret[id].write_access = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
return ret
# We have the information now about which clusters are derived, so we need to fix them up. Apply first the base cluster,
# then add the specific cluster overtop
for id, c in xml_clusters.items():
if c.derived:
base_name = c.derived
if base_name in ids_by_name:
base = xml_clusters[ids_by_name[c.derived]]
else:
base = pure_base_clusters[base_name]
feature_map = deepcopy(base.feature_map)
feature_map.update(c.feature_map)
attribute_map = deepcopy(base.attribute_map)
attribute_map.update(c.attribute_map)
command_map = deepcopy(base.command_map)
command_map.update(c.command_map)
features = deepcopy(base.features)
features.update(c.features)
attributes = combine_attributes(base.attributes, c.attributes, id, problems)
accepted_commands = deepcopy(base.accepted_commands)
accepted_commands.update(c.accepted_commands)
generated_commands = deepcopy(base.generated_commands)
generated_commands.update(c.generated_commands)
events = deepcopy(base.events)
events.update(c.events)
unknown_commands = deepcopy(base.unknown_commands)
for cmd in c.unknown_commands:
if cmd.id in accepted_commands.keys() and cmd.name == accepted_commands[cmd.id].name:
accepted_commands[cmd.id].conformance = cmd.conformance
elif cmd.id in generated_commands.keys() and cmd.name == generated_commands[cmd.id].name:
generated_commands[cmd.id].conformance = cmd.conformance
else:
unknown_commands.append(cmd)
new = XmlCluster(revision=c.revision, derived=c.derived, name=c.name,
feature_map=feature_map, attribute_map=attribute_map, command_map=command_map,
features=features, attributes=attributes, accepted_commands=accepted_commands,
generated_commands=generated_commands, unknown_commands=unknown_commands, events=events, pics=c.pics)
xml_clusters[id] = new