Skip to content

Commit 609926a

Browse files
gvargas-csacecille
andauthored
TC-OPCREDS 3.5: Automate (project-chip#34345)
* chore(TC_OPCREDS_3.4): skeleton class * chore(TC_OPCREDS_3.4): implementation until step CSRRequest IsForUpdatedNOC=True * chore(TC_OPCREDS_3.4): All test step are implement using the old way to printed them * chore(TC_OPCREDS_3.4): patch from restyled code * chore(TC_OPCREDS_3.4): restyled by autopep8 * chore(TC_OPCREDS_3.5): first implementation of test steps * chore(TC_OPCREDS_3.5): ICAC modification of subjects on-hold * chore(TC_OPCREDS_3.5): revert changes on commissioningBuildingBlocks * chore(TC_OPCREDS_3.5): revert changes on TC_OPCREDS_3_2 * chore(TC_OPCREDS_3.5): revert changes on TC_OPCREDS_3_4 * chore(TC_OPCREDS_3.5): draft -> flow to modify the validity of certificates * chore(TC_OPCREDS_3.5): expose certificateValidityPeriod method outside C/C++ DLL * OPCREDS-3.5: fix and add rest of steps TODO still - need plumbing to properly expire case sessions. * Expire sessions properly * Fix up test steps * chore(TC_OPCREDS_3.5): remove comments and dependencies unused * chore(TC_OPCREDS_3.5): restyled by clang-format and isort * chore(TC_OPCREDS_3.5): restyled by isort * chore(TC_OPCREDS_3.5): add assert validation for step 3 * chore(TC_OPCREDS_3.5): modify step 3 verify that at least one of the trusted root matches RCAC * chore(TC_OPCREDS_3.5): fix restyled by autopep8 * chore(TC_OPCREDS_3.5): fix validation to one or more entries in step 3 * chore(TC_OPCREDS_3.5): fix beecause there is not guaranteed order for the list step 3 * chore(TC_OPCREDS_3.5): restyled by autopep8 * Update src/python_testing/TC_OPCREDS_3_5.py Co-authored-by: C Freeman <cecille@google.com> * chore(TC_OPCREDS_3.5): restyled by autopep8 * chore(TC_OPCREDS_3.5): add 'Sec' suffix to certificate validity settings * chore(TC_OPCREDS_3.5): restyled by autopep8 --------- Co-authored-by: cecille <cecille@google.com>
1 parent 88148b5 commit 609926a

File tree

6 files changed

+301
-12
lines changed

6 files changed

+301
-12
lines changed

src/controller/python/OpCredsBinding.cpp

+11
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,8 @@ class OperationalCredentialsAdapter : public OperationalCredentialsDelegate
8383

8484
void SetMaximallyLargeCertsUsed(bool enabled) { mExampleOpCredsIssuer.SetMaximallyLargeCertsUsed(enabled); }
8585

86+
void SetCertificateValidityPeriod(uint32_t validity) { mExampleOpCredsIssuer.SetCertificateValidityPeriod(validity); }
87+
8688
private:
8789
CHIP_ERROR GenerateNOCChain(const ByteSpan & csrElements, const ByteSpan & csrNonce, const ByteSpan & attestationSignature,
8890
const ByteSpan & attestationChallenge, const ByteSpan & DAC, const ByteSpan & PAI,
@@ -607,6 +609,15 @@ PyChipError pychip_OpCreds_SetMaximallyLargeCertsUsed(OpCredsContext * context,
607609
return ToPyChipError(CHIP_NO_ERROR);
608610
}
609611

612+
PyChipError pychip_OpCreds_SetCertificateValidityPeriod(OpCredsContext * context, uint32_t validity)
613+
{
614+
VerifyOrReturnError(context != nullptr && context->mAdapter != nullptr, ToPyChipError(CHIP_ERROR_INCORRECT_STATE));
615+
616+
context->mAdapter->SetCertificateValidityPeriod(validity);
617+
618+
return ToPyChipError(CHIP_NO_ERROR);
619+
}
620+
610621
void pychip_OpCreds_FreeDelegate(OpCredsContext * context)
611622
{
612623
Platform::Delete(context);

src/controller/python/chip/CertificateAuthority.py

+28-1
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@
2121
import ctypes
2222
import logging
2323
from ctypes import c_void_p
24+
from datetime import timedelta
2425
from typing import List, Optional
2526

2627
import chip.exceptions
@@ -30,6 +31,9 @@
3031

3132
LOGGER = logging.getLogger(__name__)
3233

34+
# By default, let's set certificate validity to 10 years.
35+
CERTIFICATE_VALIDITY_PERIOD_SEC = int(timedelta(days=10*365).total_seconds())
36+
3337

3438
class CertificateAuthority:
3539
''' This represents an operational Root Certificate Authority (CA) with a root key key pair with associated
@@ -77,11 +81,15 @@ def __init__(self, chipStack: ChipStack.ChipStack, caIndex: int, persistentStora
7781
self._Handle().pychip_OpCreds_SetMaximallyLargeCertsUsed.restype = PyChipError
7882
self._Handle().pychip_OpCreds_SetMaximallyLargeCertsUsed.argtypes = [ctypes.c_void_p, ctypes.c_bool]
7983

84+
self._Handle().pychip_OpCreds_SetCertificateValidityPeriod.restype = PyChipError
85+
self._Handle().pychip_OpCreds_SetCertificateValidityPeriod.argtypes = [ctypes.c_void_p, ctypes.c_uint32]
86+
8087
if (persistentStorage is None):
8188
persistentStorage = self._chipStack.GetStorageManager()
8289

8390
self._persistentStorage = persistentStorage
8491
self._maximizeCertChains = False
92+
self._certificateValidityPeriodSec = CERTIFICATE_VALIDITY_PERIOD_SEC
8593

8694
self._closure = self._chipStack.Call(
8795
lambda: self._Handle().pychip_OpCreds_InitializeDelegate(
@@ -189,6 +197,10 @@ def adminList(self) -> list[FabricAdmin.FabricAdmin]:
189197
def maximizeCertChains(self) -> bool:
190198
return self._maximizeCertChains
191199

200+
@property
201+
def certificateValidityPeriodSec(self) -> int:
202+
return self._certificateValidityPeriodSec
203+
192204
@maximizeCertChains.setter
193205
def maximizeCertChains(self, enabled: bool):
194206
self._chipStack.Call(
@@ -197,6 +209,17 @@ def maximizeCertChains(self, enabled: bool):
197209

198210
self._maximizeCertChains = enabled
199211

212+
@certificateValidityPeriodSec.setter
213+
def certificateValidityPeriodSec(self, validity: int):
214+
if validity < 0:
215+
raise ValueError("Validity period must be a non-negative integer")
216+
217+
self._chipStack.Call(
218+
lambda: self._Handle().pychip_OpCreds_SetCertificateValidityPeriod(ctypes.c_void_p(self._closure), ctypes.c_uint32(validity))
219+
).raise_on_error()
220+
221+
self._certificateValidityPeriodSec = validity
222+
200223
def __del__(self):
201224
self.Shutdown()
202225

@@ -258,7 +281,7 @@ def LoadAuthoritiesFromStorage(self):
258281
ca = self.NewCertificateAuthority(int(caIndex))
259282
ca.LoadFabricAdminsFromStorage()
260283

261-
def NewCertificateAuthority(self, caIndex: Optional[int] = None, maximizeCertChains: bool = False):
284+
def NewCertificateAuthority(self, caIndex: Optional[int] = None, maximizeCertChains: bool = False, certificateValidityPeriodSec: Optional[int] = None):
262285
''' Creates a new CertificateAuthority instance with the provided CA Index and the PersistentStorage
263286
instance previously setup in the constructor.
264287
@@ -282,8 +305,12 @@ def NewCertificateAuthority(self, caIndex: Optional[int] = None, maximizeCertCha
282305
caList[str(caIndex)] = []
283306
self._persistentStorage.SetReplKey(key='caList', value=caList)
284307

308+
if certificateValidityPeriodSec is None:
309+
certificateValidityPeriodSec = CERTIFICATE_VALIDITY_PERIOD_SEC
310+
285311
ca = CertificateAuthority(chipStack=self._chipStack, caIndex=caIndex, persistentStorage=self._persistentStorage)
286312
ca.maximizeCertChains = maximizeCertChains
313+
ca.certificateValidityPeriodSec = certificateValidityPeriodSec
287314
self._activeCaList.append(ca)
288315

289316
return ca

src/controller/python/chip/utils/CommissioningBuildingBlocks.py

+7-9
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
import typing
2121

2222
import chip.clusters as Clusters
23-
from chip.ChipDeviceCtrl import ChipDeviceController as ChipDeviceController
23+
from chip.ChipDeviceCtrl import ChipDeviceController, NOCChain
2424
from chip.clusters import GeneralCommissioning as generalCommissioning
2525
from chip.clusters import OperationalCredentials as opCreds
2626
from chip.clusters.Types import NullValue
@@ -144,7 +144,7 @@ async def CreateControllersOnFabric(fabricAdmin: FabricAdmin,
144144
return controllerList
145145

146146

147-
async def AddNOCForNewFabricFromExisting(commissionerDevCtrl, newFabricDevCtrl, existingNodeId, newNodeId):
147+
async def AddNOCForNewFabricFromExisting(commissionerDevCtrl, newFabricDevCtrl, existingNodeId, newNodeId) -> tuple[bool, typing.Optional[Clusters.OperationalCredentials.Commands.NOCResponse], typing.Optional[NOCChain]]:
148148
''' Perform sequence to commission new fabric using existing commissioned fabric.
149149
150150
Args:
@@ -156,7 +156,7 @@ async def AddNOCForNewFabricFromExisting(commissionerDevCtrl, newFabricDevCtrl,
156156
newNodeId (int): Node ID to use for the target node on the new fabric.
157157
158158
Return:
159-
tuple: (bool, Optional[nocResp], Optional[rcacResp]: True if successful, False otherwise, along with nocResp, rcacResp value.
159+
tuple: (bool, Optional[nocResp], Optional[NOCChain]: True if successful, False otherwise, along with nocResp, rcacResp value.
160160
161161
'''
162162
nocResp = None
@@ -173,7 +173,7 @@ async def AddNOCForNewFabricFromExisting(commissionerDevCtrl, newFabricDevCtrl,
173173
chainForAddNOC.nocBytes is None or chainForAddNOC.ipkBytes is None):
174174
# Expiring the failsafe timer in an attempt to clean up.
175175
await commissionerDevCtrl.SendCommand(existingNodeId, 0, generalCommissioning.Commands.ArmFailSafe(0))
176-
return False, nocResp
176+
return False, nocResp, None
177177

178178
await commissionerDevCtrl.SendCommand(existingNodeId, 0, opCreds.Commands.AddTrustedRootCertificate(chainForAddNOC.rcacBytes))
179179
nocResp = await commissionerDevCtrl.SendCommand(existingNodeId,
@@ -184,8 +184,6 @@ async def AddNOCForNewFabricFromExisting(commissionerDevCtrl, newFabricDevCtrl,
184184
newFabricDevCtrl.nodeId,
185185
newFabricDevCtrl.fabricAdmin.vendorId))
186186

187-
rcacResp = chainForAddNOC.rcacBytes
188-
189187
if nocResp.statusCode is not opCreds.Enums.NodeOperationalCertStatusEnum.kOk:
190188
# Expiring the failsafe timer in an attempt to clean up.
191189
await commissionerDevCtrl.SendCommand(existingNodeId, 0, generalCommissioning.Commands.ArmFailSafe(0))
@@ -196,12 +194,12 @@ async def AddNOCForNewFabricFromExisting(commissionerDevCtrl, newFabricDevCtrl,
196194
if resp.errorCode is not generalCommissioning.Enums.CommissioningErrorEnum.kOk:
197195
# Expiring the failsafe timer in an attempt to clean up.
198196
await commissionerDevCtrl.SendCommand(existingNodeId, 0, generalCommissioning.Commands.ArmFailSafe(0))
199-
return False, nocResp
197+
return False, nocResp, chainForAddNOC
200198

201199
if not await _IsNodeInFabricList(newFabricDevCtrl, newNodeId):
202-
return False, nocResp
200+
return False, nocResp, chainForAddNOC
203201

204-
return True, nocResp, rcacResp
202+
return True, nocResp, chainForAddNOC
205203

206204

207205
async def UpdateNOC(devCtrl, existingNodeId, newNodeId):

src/python_testing/TC_OPCREDS_3_2.py

+4-2
Original file line numberDiff line numberDiff line change
@@ -94,10 +94,11 @@ async def test_TC_OPCREDS_3_2(self):
9494

9595
cr2_new_admin_ctrl = cr2_new_fabric_admin.NewController(
9696
nodeId=cr2_nodeid)
97-
success, nocResp, rcacResp = await CommissioningBuildingBlocks.AddNOCForNewFabricFromExisting(
97+
success, nocResp, chain = await CommissioningBuildingBlocks.AddNOCForNewFabricFromExisting(
9898
commissionerDevCtrl=dev_ctrl, newFabricDevCtrl=cr2_new_admin_ctrl,
9999
existingNodeId=self.dut_node_id, newNodeId=cr2_dut_node_id
100100
)
101+
rcacResp = chain.rcacBytes
101102

102103
fabric_index_CR2 = nocResp.fabricIndex
103104
tlvReaderRCAC_CR2 = TLVReader(rcacResp).get()["Any"]
@@ -114,10 +115,11 @@ async def test_TC_OPCREDS_3_2(self):
114115

115116
cr3_new_admin_ctrl = cr3_new_fabric_admin.NewController(
116117
nodeId=cr3_nodeid)
117-
success, nocResp, rcacResp = await CommissioningBuildingBlocks.AddNOCForNewFabricFromExisting(
118+
success, nocResp, chain = await CommissioningBuildingBlocks.AddNOCForNewFabricFromExisting(
118119
commissionerDevCtrl=dev_ctrl, newFabricDevCtrl=cr3_new_admin_ctrl,
119120
existingNodeId=self.dut_node_id, newNodeId=cr3_dut_node_id
120121
)
122+
rcacResp = chain.rcacBytes
121123

122124
fabric_index_CR3 = nocResp.fabricIndex
123125
tlvReaderRCAC_CR3 = TLVReader(rcacResp).get()["Any"]

0 commit comments

Comments
 (0)