diff --git a/.github/issue-labeler.yml b/.github/issue-labeler.yml index 210ae86a24fbf6..909ef045c039e4 100644 --- a/.github/issue-labeler.yml +++ b/.github/issue-labeler.yml @@ -5,9 +5,12 @@ darwin: # (like "kiosk" or whatnot), but do allow matching "ios8" and things # like that. # + # Make sure we don't trigger for the string "MAC", which almost + # certainly has nothing to do with Darwin. + # # \\b means "word boundary" # (?![a-z]) means "there is no next char in the range a-z". - - "/(\\bios(?![a-z])|homepod|darwin|\\bmac\\b|macos)/i" + - "/(\\b[Ii][Oo][Ss](?![a-zA-Z])|[Hh][Oo][Mm][Ee][Pp][Oo][Dd]|[Dd][Aa][Rr][Ww][Ii][Nn]|\\bm[Aa][Cc]\\b|\\bMa[Cc]\\b|\\bM[Aa]c\\b|[Mm][Aa][Cc][Oo][Ss])/" linux: - "/(linux)/i" diff --git a/.github/workflows/chef.yaml b/.github/workflows/chef.yaml index 11f76711794ab3..4cbc381d931f69 100644 --- a/.github/workflows/chef.yaml +++ b/.github/workflows/chef.yaml @@ -110,7 +110,7 @@ jobs: platform: telink # - name: Update Zephyr to specific revision (for developers purpose) # shell: bash - # run: scripts/run_in_build_env.sh "python3 scripts/tools/telink/update_zephyr.py 65dc1812431bf946dfc110682298acf83d63e27a" + # run: scripts/run_in_build_env.sh "python3 scripts/tools/telink/update_zephyr.py 68deadeb5c20b82d68700e720d4580e8003bf1d8" - name: CI Examples Telink shell: bash run: | diff --git a/.github/workflows/examples-linux-standalone.yaml b/.github/workflows/examples-linux-standalone.yaml index 919704ea54e7f2..6ab36546dee02e 100644 --- a/.github/workflows/examples-linux-standalone.yaml +++ b/.github/workflows/examples-linux-standalone.yaml @@ -198,6 +198,16 @@ jobs: linux debug air-purifier-app \ out/linux-x64-air-purifier/chip-air-purifier-app \ /tmp/bloat_reports/ + - name: Build example Fabric Admin + run: | + ./scripts/run_in_build_env.sh \ + "./scripts/build/build_examples.py \ + --target linux-x64-fabric-admin \ + build" + .environment/pigweed-venv/bin/python3 scripts/tools/memory/gh_sizes.py \ + linux debug fabric-admin \ + out/linux-x64-fabric-admin/fabric-admin \ + /tmp/bloat_reports/ - name: Build example Fabric Bridge App run: | ./scripts/run_in_build_env.sh \ diff --git a/.github/workflows/examples-telink.yaml b/.github/workflows/examples-telink.yaml index 63830b3d38e7ea..9d83015ecf3d0e 100644 --- a/.github/workflows/examples-telink.yaml +++ b/.github/workflows/examples-telink.yaml @@ -1,4 +1,4 @@ -# Copyright (c) 2022-2023 Project CHIP Authors +# Copyright (c) 2022-2024 Project CHIP Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -57,7 +57,7 @@ jobs: gh-context: ${{ toJson(github) }} # - name: Update Zephyr to specific revision (for developers purpose) - # run: scripts/run_in_build_env.sh "python3 scripts/tools/telink/update_zephyr.py 65dc1812431bf946dfc110682298acf83d63e27a" + # run: scripts/run_in_build_env.sh "python3 scripts/tools/telink/update_zephyr.py 68deadeb5c20b82d68700e720d4580e8003bf1d8" - name: Build example Telink (B92 retention) Air Quality Sensor App run: | @@ -71,13 +71,13 @@ jobs: - name: clean out build output run: rm -rf ./out - - name: Build example Telink (B91) All Clusters App + - name: Build example Telink (W91) All Clusters App run: | ./scripts/run_in_build_env.sh \ - "./scripts/build/build_examples.py --target 'telink-tlsr9518adk80d-all-clusters' build" + "./scripts/build/build_examples.py --target 'telink-tlsr9118bdk40d-all-clusters' build" .environment/pigweed-venv/bin/python3 scripts/tools/memory/gh_sizes.py \ - telink tlsr9518adk80d all-clusters-app \ - out/telink-tlsr9518adk80d-all-clusters/zephyr/zephyr.elf \ + telink tlsr9118bdk40d all-clusters-app \ + out/telink-tlsr9118bdk40d-all-clusters/zephyr/zephyr.elf \ /tmp/bloat_reports/ - name: clean out build output @@ -129,6 +129,18 @@ jobs: - name: clean out build output (keep tools) run: rm -rf ./out/telink* + - name: Build example Telink (W91) Lighting App with OTA, Factory Data + run: | + ./scripts/run_in_build_env.sh \ + "./scripts/build/build_examples.py --target 'telink-tlsr9118bdk40d-light-ota-factory-data' build" + .environment/pigweed-venv/bin/python3 scripts/tools/memory/gh_sizes.py \ + telink tlsr9118bdk40d lighting-app-ota-factory-data \ + out/telink-tlsr9118bdk40d-light-ota-factory-data/zephyr/zephyr.elf \ + /tmp/bloat_reports/ + + - name: clean out build output (keep tools) + run: rm -rf ./out/telink* + - name: Build example Telink (B91) Lighting App with OTA, RPC, Factory Data and 4Mb flash run: | ./scripts/run_in_build_env.sh \ @@ -189,13 +201,13 @@ jobs: - name: clean out build output run: rm -rf ./out - - name: Build example Telink (B91) Pump Controller App + - name: Build example Telink (W91) Pump Controller App run: | ./scripts/run_in_build_env.sh \ - "./scripts/build/build_examples.py --target 'telink-tlsr9518adk80d-pump-controller' build" + "./scripts/build/build_examples.py --target 'telink-tlsr9118bdk40d-pump-controller' build" .environment/pigweed-venv/bin/python3 scripts/tools/memory/gh_sizes.py \ - telink tlsr9518adk80d pump-controller-app \ - out/telink-tlsr9518adk80d-pump-controller/zephyr/zephyr.elf \ + telink tlsr9118bdk40d pump-controller-app \ + out/telink-tlsr9118bdk40d-pump-controller/zephyr/zephyr.elf \ /tmp/bloat_reports/ - name: clean out build output diff --git a/.github/workflows/lint.yml b/.github/workflows/lint.yml index 7336213ba81a30..4685948fd7bd12 100644 --- a/.github/workflows/lint.yml +++ b/.github/workflows/lint.yml @@ -119,6 +119,10 @@ jobs: --known-failure app/util/DataModelHandler.h \ --known-failure app/util/ember-compatibility-functions.cpp \ --known-failure app/util/ember-compatibility-functions.h \ + --known-failure app/util/ember-global-attribute-access-interface.cpp \ + --known-failure app/util/ember-global-attribute-access-interface.h \ + --known-failure app/util/ember-io-storage.cpp \ + --known-failure app/util/ember-io-storage.h \ --known-failure app/util/endpoint-config-api.h \ --known-failure app/util/generic-callbacks.h \ --known-failure app/util/generic-callback-stubs.cpp \ diff --git a/.github/workflows/tests.yaml b/.github/workflows/tests.yaml index 0c0290ff193230..57bc3971d44ea3 100644 --- a/.github/workflows/tests.yaml +++ b/.github/workflows/tests.yaml @@ -508,6 +508,7 @@ jobs: scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-all-clusters-ipv6only-no-ble-no-wifi-tsan-clang-test/chip-all-clusters-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace-to json:out/trace_data/app-{SCRIPT_BASE_NAME}.json" --script "src/python_testing/TC_FAN_3_4.py" --script-args "--storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-all-clusters-ipv6only-no-ble-no-wifi-tsan-clang-test/chip-all-clusters-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace-to json:out/trace_data/app-{SCRIPT_BASE_NAME}.json" --script "src/python_testing/TC_FAN_3_5.py" --script-args "--storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-lit-icd-ipv6only-no-ble-no-wifi-tsan-clang-test/lit-icd-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace-to json:out/trace_data/app-{SCRIPT_BASE_NAME}.json" --script "src/python_testing/TC_ICDM_2_1.py" --script-args "--storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --PICS src/app/tests/suites/certification/ci-pics-values --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' + scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-lit-icd-ipv6only-no-ble-no-wifi-tsan-clang-test/lit-icd-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace-to json:out/trace_data/app-{SCRIPT_BASE_NAME}.json" --script "src/python_testing/TC_ICDM_3_1.py" --script-args "--storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --PICS src/app/tests/suites/certification/ci-pics-values --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-lit-icd-ipv6only-no-ble-no-wifi-tsan-clang-test/lit-icd-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace-to json:out/trace_data/app-{SCRIPT_BASE_NAME}.json --enable-key 000102030405060708090a0b0c0d0e0f" --script "src/python_testing/TC_ICDManagementCluster.py" --script-args "--storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --hex-arg enableKey:000102030405060708090a0b0c0d0e0f --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-all-clusters-ipv6only-no-ble-no-wifi-tsan-clang-test/chip-all-clusters-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace-to json:out/trace_data/app-{SCRIPT_BASE_NAME}.json" --script "src/python_testing/TC_IDM_1_2.py" --script-args "--storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-all-clusters-ipv6only-no-ble-no-wifi-tsan-clang-test/chip-all-clusters-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace-to json:out/trace_data/app-{SCRIPT_BASE_NAME}.json --enable-key 000102030405060708090a0b0c0d0e0f" --script "src/python_testing/TC_IDM_1_4.py" --script-args "--hex-arg PIXIT.DGGEN.TEST_EVENT_TRIGGER_KEY:000102030405060708090a0b0c0d0e0f --storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' @@ -560,6 +561,7 @@ jobs: scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-rvc-ipv6only-no-ble-no-wifi-tsan-clang-test/chip-rvc-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace_file json:out/trace_data/app-{SCRIPT_BASE_NAME}.json" --script "src/python_testing/TC_RVCOPSTATE_2_3.py" --script-args "--storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --PICS examples/rvc-app/rvc-common/pics/rvc-app-pics-values --endpoint 1 --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' scripts/run_in_python_env.sh out/venv './scripts/tests/run_python_test.py --app out/linux-x64-rvc-ipv6only-no-ble-no-wifi-tsan-clang-test/chip-rvc-app --factoryreset --app-args "--discriminator 1234 --KVS kvs1 --trace_file json:out/trace_data/app-{SCRIPT_BASE_NAME}.json" --script "src/python_testing/TC_RVCOPSTATE_2_4.py" --script-args "--storage-path admin_storage.json --commissioning-method on-network --discriminator 1234 --passcode 20202021 --PICS examples/rvc-app/rvc-common/pics/rvc-app-pics-values --endpoint 1 --trace-to json:out/trace_data/test-{SCRIPT_BASE_NAME}.json --trace-to perfetto:out/trace_data/test-{SCRIPT_BASE_NAME}.perfetto"' scripts/run_in_python_env.sh out/venv './src/python_testing/test_testing/test_TC_DA_1_2.py' + scripts/run_in_python_env.sh out/venv './src/python_testing/test_testing/test_TC_ICDM_2_1.py' - name: Uploading core files uses: actions/upload-artifact@v4 if: ${{ failure() && !env.ACT }} diff --git a/.vscode/settings.json b/.vscode/settings.json index bfac435030bb4f..415d4980d00d24 100644 --- a/.vscode/settings.json +++ b/.vscode/settings.json @@ -14,7 +14,18 @@ "${workspaceFolder}/src/lib/**", "${workspaceFolder}/src/system/**", "${workspaceFolder}/third_party/nlassert/repo/include/**", - "${workspaceFolder}/third_party/nlio/repo/include/**" + "${workspaceFolder}/third_party/nlio/repo/include/**", + "${workspaceFolder}/darwin/Framework/CHIP/**", + "${workspaceFolder}/src/messaging/**", + "${workspaceFolder}/src/protocols/**", + "${workspaceFolder}/src/tracing/**", + "${workspaceFolder}/src/transport/**", + "${workspaceFolder}/src/inet/**", + "${workspaceFolder}/src/credentials/**", + "${workspaceFolder}/src/data_model/**", + "${workspaceFolder}/src/app/**", + "${workspaceFolder}/src/crytpo/**", + "${workspaceFolder}/src/platform/**" ], "[cpp]": { "editor.defaultFormatter": "xaver.clang-format" @@ -35,6 +46,7 @@ "editor.defaultFormatter": "esbenp.prettier-vscode" }, "files.associations": { + "*.mm": "cpp", "iostream": "cpp", "array": "cpp", "atomic": "cpp", diff --git a/config/esp32/components/chip/Kconfig b/config/esp32/components/chip/Kconfig index 5998b220ba2fe5..e2f9dcc099eba6 100644 --- a/config/esp32/components/chip/Kconfig +++ b/config/esp32/components/chip/Kconfig @@ -1232,7 +1232,7 @@ menu "CHIP Device Layer" menu "Message Reliable Protocol Options" config MRP_LOCAL_ACTIVE_RETRY_INTERVAL_FOR_THREAD int "MRP local active retry interval for Thread network in milliseconds" - depends on OPENTHREAD_ENABLED + depends on ENABLE_MATTER_OVER_THREAD range 0 3600000 default 800 help @@ -1240,7 +1240,7 @@ menu "CHIP Device Layer" config MRP_LOCAL_ACTIVE_RETRY_INTERVAL_FOR_WIFI_ETHERNET int "MRP local active retry interval for WIFI or ETHERNET network in milliseconds" - depends on !OPENTHREAD_ENABLED + depends on !ENABLE_MATTER_OVER_THREAD range 0 3600000 default 300 help @@ -1248,7 +1248,7 @@ menu "CHIP Device Layer" config MRP_LOCAL_IDLE_RETRY_INTERVAL_FOR_THREAD int "MRP local idle retry interval for Thread network in milliseconds" - depends on OPENTHREAD_ENABLED + depends on ENABLE_MATTER_OVER_THREAD range 0 3600000 default 800 help @@ -1256,7 +1256,7 @@ menu "CHIP Device Layer" config MRP_LOCAL_IDLE_RETRY_INTERVAL_FOR_WIFI_ETHERNET int "MRP local idle retry interval for WIFI or ETHERNET network in milliseconds" - depends on !OPENTHREAD_ENABLED + depends on !ENABLE_MATTER_OVER_THREAD range 0 3600000 default 500 help @@ -1264,7 +1264,7 @@ menu "CHIP Device Layer" config MRP_RETRY_INTERVAL_SENDER_BOOST_FOR_THREAD int "MRP retransmission delta timeout for Thread network in milliseconds" - depends on OPENTHREAD_ENABLED + depends on ENABLE_MATTER_OVER_THREAD range 0 3600000 default 500 help @@ -1272,7 +1272,7 @@ menu "CHIP Device Layer" config MRP_RETRY_INTERVAL_SENDER_BOOST_FOR_WIFI_ETHERNET int "MRP retransmission delta timeout for WIFI or ETHERNET network in milliseconds" - depends on !OPENTHREAD_ENABLED + depends on !ENABLE_MATTER_OVER_THREAD range 0 3600000 default 0 help diff --git a/config/telink/app/bootloader.conf b/config/telink/app/bootloader.conf index 2098bc7072cb3d..52937e1649e9af 100644 --- a/config/telink/app/bootloader.conf +++ b/config/telink/app/bootloader.conf @@ -1,5 +1,5 @@ # -# Copyright (c) 2023 Project CHIP Authors +# Copyright (c) 2023-2024 Project CHIP Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -41,8 +41,3 @@ CONFIG_BOOT_MAX_IMG_SECTORS=4096 # - 3 INFO, default to write LOG_LEVEL_INFO # - 4 DEBUG, default to write LOG_LEVEL_DBG CONFIG_LOG_DEFAULT_LEVEL=1 - -# USB DFU configuration -CONFIG_USB_DFU_WILL_DETACH=n -CONFIG_BOOT_USB_DFU_GPIO=y -CONFIG_MCUBOOT_INDICATION_LED=y diff --git a/config/telink/app/bootloader_usb.conf b/config/telink/app/bootloader_usb.conf new file mode 100644 index 00000000000000..b6b0098bfc31b1 --- /dev/null +++ b/config/telink/app/bootloader_usb.conf @@ -0,0 +1,20 @@ +# +# Copyright (c) 2024 Project CHIP Authors +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +# USB DFU configuration +CONFIG_USB_DFU_WILL_DETACH=n +CONFIG_BOOT_USB_DFU_GPIO=y +CONFIG_MCUBOOT_INDICATION_LED=y diff --git a/config/telink/chip-module/CMakeLists.txt b/config/telink/chip-module/CMakeLists.txt index 27f429b390d528..0f2e4edce0f8d1 100644 --- a/config/telink/chip-module/CMakeLists.txt +++ b/config/telink/chip-module/CMakeLists.txt @@ -46,6 +46,7 @@ include(${COMMON_CMAKE_SOURCE_DIR}/chip_gn_args.cmake) include(${COMMON_CMAKE_SOURCE_DIR}/chip_gn.cmake) # Prepare compiler flags +matter_add_flags(-isystem${ZEPHYR_BASE}/../modules/crypto/mbedtls/include/) if (CONFIG_POSIX_API) matter_add_flags(-D_DEFAULT_SOURCE) @@ -102,6 +103,7 @@ matter_add_gn_arg_bool ("chip_error_logging" CONFIG_MATTER_ matter_add_gn_arg_bool ("chip_progress_logging" CONFIG_MATTER_LOG_LEVEL GREATER_EQUAL 3) matter_add_gn_arg_bool ("chip_detail_logging" CONFIG_MATTER_LOG_LEVEL GREATER_EQUAL 4) matter_add_gn_arg_bool ("chip_automation_logging" FALSE) +matter_add_gn_arg_bool ("chip_enable_wifi" CONFIG_WIFI_W91) matter_add_gn_arg_bool ("chip_enable_icd_server" CONFIG_CHIP_ENABLE_ICD_SUPPORT) if (CONFIG_CHIP_ENABLE_ICD_SUPPORT) @@ -122,8 +124,12 @@ if (CONFIG_CHIP_ROTATING_DEVICE_ID) matter_add_gn_arg_bool("chip_enable_additional_data_advertising" "true") endif() -if (CONFIG_CHIP_ENABLE_DNSSD_SRP) +if (CONFIG_NET_L2_OPENTHREAD) matter_add_gn_arg_string("chip_mdns" "platform") +elseif(CONFIG_WIFI_W91) + matter_add_gn_arg_string("chip_mdns" "minimal") +else() + matter_add_gn_arg_string("chip_mdns" "none") endif() if (CONFIG_CHIP_PW_RPC) diff --git a/config/telink/chip-module/Kconfig b/config/telink/chip-module/Kconfig index b76e3962d2efbe..4444cc8e9e44ed 100644 --- a/config/telink/chip-module/Kconfig +++ b/config/telink/chip-module/Kconfig @@ -180,7 +180,7 @@ config CHIP_LOG_SIZE_OPTIMIZATION config CHIP_BUTTON_MANAGER_IRQ_MODE bool "Use GPIO in an IRQ mode instead of polling the GPIO" - default PM + default PM || BOARD_TLSR9118BDK40D help Use GPIO in an IRQ mode to avoid button polling loop and extend the battery lifetime by waking up by GPIO event. GPIO events are working only with GPIO IRQ. This option changes button matrix configuration. diff --git a/config/telink/chip-module/Kconfig.defaults b/config/telink/chip-module/Kconfig.defaults index 57236f57708418..e6554774187a18 100644 --- a/config/telink/chip-module/Kconfig.defaults +++ b/config/telink/chip-module/Kconfig.defaults @@ -108,6 +108,7 @@ config GPIO # Bluetooth Low Energy configs config BT + default n if BOARD_TLSR9118BDK40D default y if BT @@ -178,7 +179,7 @@ config PWM endif # Board non-retention config -if BOARD_TLSR9528A || BOARD_TLSR9258A || BOARD_TLSR9518ADK80D +if BOARD_TLSR9118BDK40D || BOARD_TLSR9528A || BOARD_TLSR9258A || BOARD_TLSR9518ADK80D config PWM default y endif @@ -224,7 +225,7 @@ config SETTINGS_NVS_SECTOR_COUNT # Enable OpenThread config NET_L2_OPENTHREAD - default y + default y if !WIFI if NET_L2_OPENTHREAD @@ -292,9 +293,58 @@ config NET_MAX_CONTEXTS config NET_CONFIG_INIT_TIMEOUT default 0 + +config CHIP_WIFI + bool "Enable Telink Wi-Fi support" + default y if BOARD_TLSR9118BDK40D + select WIFI_W91 + select WIFI + select NET_STATISTICS + select NET_L2_ETHERNET + select NET_IPV6_ND # enable Neighbor Discovery to handle Router Advertisements + select NET_IPV6_NBR_CACHE + select NET_STATISTICS_USER_API + +if CHIP_WIFI + +config CHIP_WIFI_CONNECTION_RECOVERY_MINIMUM_INTERVAL + int "Define the minimum connection recovery time interval in milliseconds" + depends on CHIP_WIFI + default 500 + help + Specifies the minimum connection recovery interval (in milliseconds). + +config CHIP_WIFI_CONNECTION_RECOVERY_MAXIMUM_INTERVAL + int "Define the maximum connection recovery time interval in milliseconds" + depends on CHIP_WIFI + default 3600000 # 1 hour + help + Specifies the maximum connection recovery interval (in milliseconds). + +config CHIP_WIFI_CONNECTION_RECOVERY_MAX_RETRIES_NUMBER + int "Define the maximum amount of connection recovery occurrences" + depends on CHIP_WIFI + default 0 + help + Specifies the maximum number of connection recovery attempts. + If set to 0, no limitation is applied and attempts + to recover the connection are performed indefinitely. + +config CHIP_WIFI_CONNECTION_RECOVERY_JITTER + int "Define the connection recovery jitter in milliseconds" + depends on CHIP_WIFI + default 2000 + help + Specifies the maximum connection recovery jitter interval (in milliseconds). + Once the wait time reaches the current maximum value (defined by CHIP_WIFI_CONNECTION_RECOVERY_MAXIMUM_INTERVAL), + a random jitter interval is added to it to avoid periodicity. The random jitter is selected + within range [-JITTER; +JITTER]. + +endif # CHIP_WIFI + config CHIP_ENABLE_PAIRING_AUTOSTART bool "Open commissioning window on boot" - default y + default y help Opens the commissioning window automatically at application boot time if the node is not yet commissioned. diff --git a/examples/air-quality-sensor-app/telink/README.md b/examples/air-quality-sensor-app/telink/README.md index 015e613d40896f..64b394c046b51a 100644 --- a/examples/air-quality-sensor-app/telink/README.md +++ b/examples/air-quality-sensor-app/telink/README.md @@ -25,7 +25,7 @@ You can use this example as a reference for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/all-clusters-app/telink/README.md b/examples/all-clusters-app/telink/README.md index a5532487fa67a2..89d8221af75d3f 100644 --- a/examples/all-clusters-app/telink/README.md +++ b/examples/all-clusters-app/telink/README.md @@ -27,7 +27,7 @@ creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/all-clusters-minimal-app/telink/README.md b/examples/all-clusters-minimal-app/telink/README.md index 8e18bf4b9419b0..396afb1cc63091 100644 --- a/examples/all-clusters-minimal-app/telink/README.md +++ b/examples/all-clusters-minimal-app/telink/README.md @@ -27,7 +27,7 @@ for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/bridge-app/telink/README.md b/examples/bridge-app/telink/README.md index f23d2aeb4c6f85..0855689cd1201f 100644 --- a/examples/bridge-app/telink/README.md +++ b/examples/bridge-app/telink/README.md @@ -104,7 +104,7 @@ defined: ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/bridge-app/telink/include/AppEvent.h b/examples/bridge-app/telink/include/AppEvent.h deleted file mode 100644 index f570dfd1e7cdf7..00000000000000 --- a/examples/bridge-app/telink/include/AppEvent.h +++ /dev/null @@ -1,64 +0,0 @@ -/* - * - * Copyright (c) 2023 Project CHIP Authors - * All rights reserved. - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#pragma once - -#include - -struct AppEvent; -typedef void (*EventHandler)(AppEvent *); - -class LEDWidget; - -struct AppEvent -{ - enum AppEventTypes - { - kEventType_Button = 0, - kEventType_Timer, - kEventType_UpdateLedState, - kEventType_IdentifyStart, - kEventType_IdentifyStop, - kEventType_Lighting, - }; - - uint16_t Type; - - union - { - struct - { - uint8_t Action; - } ButtonEvent; - struct - { - void * Context; - } TimerEvent; - struct - { - uint8_t Action; - int32_t Actor; - } LightingEvent; - struct - { - LEDWidget * LedWidget; - } UpdateLedStateEvent; - }; - - EventHandler Handler; -}; diff --git a/examples/bridge-app/telink/src/AppTask.cpp b/examples/bridge-app/telink/src/AppTask.cpp index 76a59c4de5e293..e080e40eb5dda9 100644 --- a/examples/bridge-app/telink/src/AppTask.cpp +++ b/examples/bridge-app/telink/src/AppTask.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2023 Project CHIP Authors + * Copyright (c) 2023-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -539,10 +539,10 @@ void AppTask::LightingActionEventHandler(AppEvent * aEvent) Action_t action = INVALID_ACTION; int32_t actor = 0; - if (aEvent->Type == AppEvent::kEventType_Lighting) + if (aEvent->Type == AppEvent::kEventType_DeviceAction) { - action = static_cast(aEvent->LightingEvent.Action); - actor = aEvent->LightingEvent.Actor; + action = static_cast(aEvent->DeviceEvent.Action); + actor = aEvent->DeviceEvent.Actor; } else if (aEvent->Type == AppEvent::kEventType_Button) { diff --git a/examples/contact-sensor-app/telink/README.md b/examples/contact-sensor-app/telink/README.md index 9b6a59ba0c086f..964b05a76ba109 100755 --- a/examples/contact-sensor-app/telink/README.md +++ b/examples/contact-sensor-app/telink/README.md @@ -25,7 +25,7 @@ You can use this example as a reference for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/contact-sensor-app/telink/src/AppTask.cpp b/examples/contact-sensor-app/telink/src/AppTask.cpp index 8ddb43d7b7f084..aa7b28d0679c9f 100644 --- a/examples/contact-sensor-app/telink/src/AppTask.cpp +++ b/examples/contact-sensor-app/telink/src/AppTask.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2022-2023 Project CHIP Authors + * Copyright (c) 2022-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -67,9 +67,9 @@ void AppTask::OnStateChanged(ContactSensorManager::State aState) void AppTask::PostContactActionRequest(ContactSensorManager::Action aAction) { AppEvent event; - event.Type = AppEvent::kEventType_Contact; - event.ContactEvent.Action = static_cast(aAction); - event.Handler = ContactActionEventHandler; + event.Type = AppEvent::kEventType_DeviceAction; + event.DeviceEvent.Action = static_cast(aAction); + event.Handler = ContactActionEventHandler; sAppTask.PostEvent(&event); } @@ -95,9 +95,9 @@ void AppTask::ContactActionEventHandler(AppEvent * aEvent) ChipLogProgress(NotSpecified, "ContactActionEventHandler"); - if (aEvent->Type == AppEvent::kEventType_Contact) + if (aEvent->Type == AppEvent::kEventType_DeviceAction) { - action = static_cast(aEvent->ContactEvent.Action); + action = static_cast(aEvent->DeviceEvent.Action); } else if (aEvent->Type == AppEvent::kEventType_Button) { diff --git a/examples/contact-sensor-app/telink/src/ContactSensorManager.cpp b/examples/contact-sensor-app/telink/src/ContactSensorManager.cpp index a5822df5f8515e..efb5244db59755 100644 --- a/examples/contact-sensor-app/telink/src/ContactSensorManager.cpp +++ b/examples/contact-sensor-app/telink/src/ContactSensorManager.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2022 Project CHIP Authors + * Copyright (c) 2022-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -54,15 +54,15 @@ bool ContactSensorManager::IsContactClosed() void ContactSensorManager::InitiateAction(Action aAction) { AppEvent event; - event.Type = AppEvent::kEventType_Contact; - event.ContactEvent.Action = static_cast(aAction); - event.Handler = HandleAction; + event.Type = AppEvent::kEventType_DeviceAction; + event.DeviceEvent.Action = static_cast(aAction); + event.Handler = HandleAction; GetAppTask().PostEvent(&event); } void ContactSensorManager::HandleAction(AppEvent * aEvent) { - Action action = static_cast(aEvent->ContactEvent.Action); + Action action = static_cast(aEvent->DeviceEvent.Action); // Change current state based on action: // - if state is closed and action is signal lost, change state to opened // - if state is opened and action is signal detected, change state to closed diff --git a/examples/fabric-admin/.gn b/examples/fabric-admin/.gn new file mode 100644 index 00000000000000..3b11e2ba2e62ee --- /dev/null +++ b/examples/fabric-admin/.gn @@ -0,0 +1,25 @@ +# Copyright (c) 2024 Project CHIP Authors +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +import("//build_overrides/build.gni") + +# The location of the build configuration file. +buildconfig = "${build_root}/config/BUILDCONFIG.gn" + +# CHIP uses angle bracket includes. +check_system_includes = true + +default_args = { + import("//args.gni") +} diff --git a/examples/fabric-admin/BUILD.gn b/examples/fabric-admin/BUILD.gn new file mode 100644 index 00000000000000..79e175fb4a70c1 --- /dev/null +++ b/examples/fabric-admin/BUILD.gn @@ -0,0 +1,120 @@ +# Copyright (c) 2024 Project CHIP Authors +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +import("//build_overrides/build.gni") +import("//build_overrides/chip.gni") + +import("//build_overrides/editline.gni") +import("${chip_root}/build/chip/tools.gni") +import("${chip_root}/examples/fabric-admin/fabric-admin.gni") +import("${chip_root}/src/lib/core/core.gni") + +assert(chip_build_tools) + +config("config") { + include_dirs = [ + ".", + "${chip_root}/examples/common", + "${chip_root}/zzz_generated/app-common/app-common", + "${chip_root}/zzz_generated/chip-tool", + "${chip_root}/src/lib", + ] + + defines = [ "CONFIG_USE_SEPARATE_EVENTLOOP=${config_use_separate_eventloop}" ] + + # Note: CONFIG_USE_LOCAL_STORAGE is tested for via #ifdef, not #if. + if (config_use_local_storage) { + defines += [ "CONFIG_USE_LOCAL_STORAGE" ] + } + + cflags = [ "-Wconversion" ] +} + +static_library("fabric-admin-utils") { + sources = [ + "${chip_root}/src/controller/ExamplePersistentStorage.cpp", + "${chip_root}/src/controller/ExamplePersistentStorage.h", + "${chip_root}/zzz_generated/chip-tool/zap-generated/cluster/ComplexArgumentParser.cpp", + "${chip_root}/zzz_generated/chip-tool/zap-generated/cluster/logging/DataModelLogger.cpp", + "commands/clusters/ModelCommand.cpp", + "commands/clusters/ModelCommand.h", + "commands/common/CHIPCommand.cpp", + "commands/common/CHIPCommand.h", + "commands/common/Command.cpp", + "commands/common/Command.h", + "commands/common/Commands.cpp", + "commands/common/Commands.h", + "commands/common/CredentialIssuerCommands.h", + "commands/common/HexConversion.h", + "commands/common/RemoteDataModelLogger.cpp", + "commands/common/RemoteDataModelLogger.h", + "commands/pairing/OpenCommissioningWindowCommand.cpp", + "commands/pairing/OpenCommissioningWindowCommand.h", + "commands/pairing/PairingCommand.cpp", + "commands/pairing/ToTLVCert.cpp", + ] + + deps = [ "${chip_root}/src/app:events" ] + + sources += [ "commands/interactive/InteractiveCommands.cpp" ] + deps += [ + "${chip_root}/examples/common/websocket-server", + "${chip_root}/src/platform/logging:headers", + "${editline_root}:editline", + ] + + if (chip_device_platform == "darwin") { + sources += [ "commands/common/DeviceScanner.cpp" ] + } + + public_deps = [ + "${chip_root}/examples/common/tracing:commandline", + "${chip_root}/src/app/icd/client:handler", + "${chip_root}/src/app/icd/client:manager", + "${chip_root}/src/app/server", + "${chip_root}/src/app/tests/suites/commands/interaction_model", + "${chip_root}/src/controller/data_model", + "${chip_root}/src/credentials:file_attestation_trust_store", + "${chip_root}/src/lib", + "${chip_root}/src/lib/core:types", + "${chip_root}/src/lib/support/jsontlv", + "${chip_root}/src/platform", + "${chip_root}/third_party/inipp", + "${chip_root}/third_party/jsoncpp", + ] + + public_configs = [ ":config" ] + + if (chip_enable_transport_trace) { + public_deps += + [ "${chip_root}/examples/common/tracing:trace_handlers_decoder" ] + } + + output_dir = root_out_dir +} + +executable("fabric-admin") { + sources = [ "main.cpp" ] + + deps = [ + ":fabric-admin-utils", + "${chip_root}/src/platform/logging:force_stdio", + ] + + output_dir = root_out_dir +} + +group("default") { + deps = [ ":fabric-admin" ] +} diff --git a/examples/fabric-admin/args.gni b/examples/fabric-admin/args.gni new file mode 100644 index 00000000000000..83300d797ed08a --- /dev/null +++ b/examples/fabric-admin/args.gni @@ -0,0 +1,34 @@ +# Copyright (c) 2024 Project CHIP Authors +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +import("//build_overrides/chip.gni") + +import("${chip_root}/config/standalone/args.gni") + +chip_device_project_config_include = "" +chip_project_config_include = "" +chip_system_project_config_include = "" + +chip_project_config_include_dirs = + [ "${chip_root}/examples/fabric-admin/include" ] +chip_project_config_include_dirs += [ "${chip_root}/config/standalone" ] + +matter_enable_tracing_support = true + +matter_log_json_payload_hex = true +matter_log_json_payload_decode_full = true + +# make fabric-admin very strict by default +chip_tlv_validate_char_string_on_read = true +chip_tlv_validate_char_string_on_write = true diff --git a/examples/fabric-admin/build_overrides b/examples/fabric-admin/build_overrides new file mode 120000 index 00000000000000..b430cf6a2e6391 --- /dev/null +++ b/examples/fabric-admin/build_overrides @@ -0,0 +1 @@ +../build_overrides \ No newline at end of file diff --git a/examples/fabric-admin/commands/clusters/ClusterCommand.h b/examples/fabric-admin/commands/clusters/ClusterCommand.h new file mode 100644 index 00000000000000..4865f056e135f4 --- /dev/null +++ b/examples/fabric-admin/commands/clusters/ClusterCommand.h @@ -0,0 +1,196 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include + +#include "DataModelLogger.h" +#include "ModelCommand.h" + +class ClusterCommand : public InteractionModelCommands, public ModelCommand, public chip::app::CommandSender::Callback +{ +public: + ClusterCommand(CredentialIssuerCommands * credsIssuerConfig) : + InteractionModelCommands(this), ModelCommand("command-by-id", credsIssuerConfig) + { + AddArgument("cluster-id", 0, UINT32_MAX, &mClusterId); + AddByIdArguments(); + AddArguments(); + } + + ClusterCommand(chip::ClusterId clusterId, CredentialIssuerCommands * credsIssuerConfig) : + InteractionModelCommands(this), ModelCommand("command-by-id", credsIssuerConfig), mClusterId(clusterId) + { + AddByIdArguments(); + AddArguments(); + } + + ~ClusterCommand() {} + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + return InteractionModelCommands::SendCommand(device, endpointIds.at(0), mClusterId, mCommandId, mPayload); + } + + template + CHIP_ERROR SendCommand(chip::DeviceProxy * device, chip::EndpointId endpointId, chip::ClusterId clusterId, + chip::CommandId commandId, const T & value) + { + return InteractionModelCommands::SendCommand(device, endpointId, clusterId, commandId, value); + } + + CHIP_ERROR SendGroupCommand(chip::GroupId groupId, chip::FabricIndex fabricIndex) override + { + return InteractionModelCommands::SendGroupCommand(groupId, fabricIndex, mClusterId, mCommandId, mPayload); + } + + template + CHIP_ERROR SendGroupCommand(chip::GroupId groupId, chip::FabricIndex fabricIndex, chip::ClusterId clusterId, + chip::CommandId commandId, const T & value) + { + return InteractionModelCommands::SendGroupCommand(groupId, fabricIndex, clusterId, commandId, value); + } + + /////////// CommandSender Callback Interface ///////// + virtual void OnResponse(chip::app::CommandSender * client, const chip::app::ConcreteCommandPath & path, + const chip::app::StatusIB & status, chip::TLV::TLVReader * data) override + { + CHIP_ERROR error = status.ToChipError(); + if (CHIP_NO_ERROR != error) + { + LogErrorOnFailure(RemoteDataModelLogger::LogErrorAsJSON(path, status)); + + ChipLogError(NotSpecified, "Response Failure: %s", chip::ErrorStr(error)); + mError = error; + return; + } + + if (data != nullptr) + { + LogErrorOnFailure(RemoteDataModelLogger::LogCommandAsJSON(path, data)); + + error = DataModelLogger::LogCommand(path, data); + if (CHIP_NO_ERROR != error) + { + ChipLogError(NotSpecified, "Response Failure: Can not decode Data"); + mError = error; + return; + } + } + } + + virtual void OnError(const chip::app::CommandSender * client, CHIP_ERROR error) override + { + LogErrorOnFailure(RemoteDataModelLogger::LogErrorAsJSON(error)); + + ChipLogProgress(NotSpecified, "Error: %s", chip::ErrorStr(error)); + mError = error; + } + + virtual void OnDone(chip::app::CommandSender * client) override + { + if (mCommandSender.size()) + { + mCommandSender.front().reset(); + mCommandSender.erase(mCommandSender.begin()); + } + + // If the command is repeated N times, wait for all the responses to comes in + // before exiting. + bool shouldStop = true; + if (mRepeatCount.HasValue()) + { + mRepeatCount.SetValue(static_cast(mRepeatCount.Value() - 1)); + shouldStop = mRepeatCount.Value() == 0; + } + + if (shouldStop) + { + SetCommandExitStatus(mError); + } + } + + void Shutdown() override + { + mError = CHIP_NO_ERROR; + ModelCommand::Shutdown(); + } + +protected: + ClusterCommand(const char * commandName, CredentialIssuerCommands * credsIssuerConfig) : + InteractionModelCommands(this), ModelCommand(commandName, credsIssuerConfig) + { + // Subclasses are responsible for calling AddArguments. + } + + void AddByIdArguments() + { + AddArgument("command-id", 0, UINT32_MAX, &mCommandId); + AddArgument("payload", &mPayload, + "The command payload. This should be a JSON-encoded object, with string representations of field ids as keys. " + " The values for the keys are represented as follows, depending on the type:\n" + " * struct: a JSON-encoded object, with field ids as keys.\n" + " * list: a JSON-encoded array of values.\n" + " * null: A literal null.\n" + " * boolean: A literal true or false.\n" + " * unsigned integer: One of:\n" + " a) The number directly, as decimal.\n" + " b) A string starting with \"u:\" followed by decimal digits\n" + " * signed integer: One of:\n" + " a) The number directly, if it's negative.\n" + " b) A string starting with \"s:\" followed by decimal digits\n" + " * single-precision float: A string starting with \"f:\" followed by the number.\n" + " * double-precision float: One of:\n" + " a) The number directly, if it's not an integer.\n" + " b) A string starting with \"d:\" followed by the number.\n" + " * octet string: A string starting with \"hex:\" followed by the hex encoding of the bytes.\n" + " * string: A string with the characters.\n" + "\n" + " An example payload may look like this: '{ \"0x0\": { \"0\": null, \"1\": false }, \"1\": [17, \"u:17\"], " + "\"0x2\": [ -17, \"s:17\", \"s:-17\" ], \"0x3\": \"f:2\", \"0x4\": [ \"d:3\", 4.5 ], \"0x5\": \"hex:ab12\", " + "\"0x6\": \"ab12\" }' and represents:\n" + " Field 0: a struct with two fields, one with value null and one with value false.\n" + " Field 1: A list of unsigned integers.\n" + " Field 2: A list of signed integers.\n" + " Field 3: A single-precision float.\n" + " Field 4: A list of double-precision floats.\n" + " Field 5: A 2-byte octet string.\n" + " Field 6: A 4-char character string."); + } + + void AddArguments() + { + AddArgument("timedInteractionTimeoutMs", 0, UINT16_MAX, &mTimedInteractionTimeoutMs, + "If provided, do a timed invoke with the given timed interaction timeout. See \"7.6.10. Timed Interaction\" in " + "the Matter specification."); + AddArgument("busyWaitForMs", 0, UINT16_MAX, &mBusyWaitForMs, + "If provided, block the main thread processing for the given time right after sending a command."); + AddArgument("suppressResponse", 0, 1, &mSuppressResponse); + AddArgument("repeat-count", 1, UINT16_MAX, &mRepeatCount); + AddArgument("repeat-delay-ms", 0, UINT16_MAX, &mRepeatDelayInMs); + ModelCommand::AddArguments(); + } + +private: + chip::ClusterId mClusterId; + chip::CommandId mCommandId; + + CHIP_ERROR mError = CHIP_NO_ERROR; + CustomArgument mPayload; +}; diff --git a/examples/fabric-admin/commands/clusters/ComplexArgument.h b/examples/fabric-admin/commands/clusters/ComplexArgument.h new file mode 100644 index 00000000000000..954ea1db352b97 --- /dev/null +++ b/examples/fabric-admin/commands/clusters/ComplexArgument.h @@ -0,0 +1,422 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +/** + * This file allocate/free memory using the chip platform abstractions + * (Platform::MemoryCalloc and Platform::MemoryFree) for hosting a subset of the + * data model internal types until they are consumed by the DataModel::Encode machinery: + * - chip::app:DataModel::List + * - chip::ByteSpan + * - chip::CharSpan + * + * Memory allocation happens during the 'Setup' phase, while memory deallocation happens + * during the 'Finalize' phase. + * + * The 'Finalize' phase during the destructor phase, and if needed, 'Finalize' will call + * the 'Finalize' phase of its descendant. + */ + +#pragma once + +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "JsonParser.h" + +inline constexpr uint8_t kMaxLabelLength = UINT8_MAX; +inline constexpr char kNullString[] = "null"; + +class ComplexArgumentParser +{ +public: + ComplexArgumentParser() {} + + template ::value && !std::is_signed::value && + !std::is_same>, bool>::value, + int> = 0> + static CHIP_ERROR Setup(const char * label, T & request, Json::Value value) + { + if (value.isNumeric()) + { + if (chip::CanCastTo(value.asLargestUInt())) + { + request = static_cast(value.asLargestUInt()); + return CHIP_NO_ERROR; + } + } + else if (value.isString()) + { + // Check for a hex number; JSON does not support those as numbers, + // so they have to be done as strings. And we might as well support + // string-encoded unsigned numbers in general if we're doing that. + bool isHexNotation = strncmp(value.asCString(), "0x", 2) == 0 || strncmp(value.asCString(), "0X", 2) == 0; + + std::stringstream str; + isHexNotation ? str << std::hex << value.asCString() : str << value.asCString(); + uint64_t val; + str >> val; + if (!str.fail() && str.eof() && chip::CanCastTo(val)) + { + request = static_cast(val); + return CHIP_NO_ERROR; + } + } + + ChipLogError(NotSpecified, "Error while encoding %s as an unsigned integer.", label); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + template ::value, bool> = true> + static CHIP_ERROR Setup(const char * label, T & request, Json::Value value) + { + if (!value.isNumeric() || !chip::CanCastTo(value.asLargestInt())) + { + ChipLogError(NotSpecified, "Error while encoding %s as an unsigned integer.", label); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + request = static_cast(value.asLargestInt()); + return CHIP_NO_ERROR; + } + + template ::value, int> = 0> + static CHIP_ERROR Setup(const char * label, T & request, Json::Value value) + { + std::underlying_type_t requestValue; + ReturnErrorOnFailure(ComplexArgumentParser::Setup(label, requestValue, value)); + + request = static_cast(requestValue); + return CHIP_NO_ERROR; + } + + template + static CHIP_ERROR Setup(const char * label, chip::BitFlags & request, Json::Value & value) + { + T requestValue; + ReturnErrorOnFailure(ComplexArgumentParser::Setup(label, requestValue, value)); + + request = chip::BitFlags(requestValue); + return CHIP_NO_ERROR; + } + + template + static CHIP_ERROR Setup(const char * label, chip::BitMask & request, Json::Value & value) + { + T requestValue; + ReturnErrorOnFailure(ComplexArgumentParser::Setup(label, requestValue, value)); + + request = chip::BitMask(requestValue); + return CHIP_NO_ERROR; + } + + template + static CHIP_ERROR Setup(const char * label, chip::Optional & request, Json::Value & value) + { + T requestValue; + ReturnErrorOnFailure(ComplexArgumentParser::Setup(label, requestValue, value)); + + request = chip::Optional(requestValue); + return CHIP_NO_ERROR; + } + + template + static CHIP_ERROR Setup(const char * label, chip::app::DataModel::Nullable & request, Json::Value & value) + { + if (value.isNull()) + { + request.SetNull(); + return CHIP_NO_ERROR; + } + + T requestValue; + ReturnErrorOnFailure(ComplexArgumentParser::Setup(label, requestValue, value)); + + request = chip::app::DataModel::Nullable(requestValue); + return CHIP_NO_ERROR; + } + + template + static CHIP_ERROR Setup(const char * label, chip::app::DataModel::List & request, Json::Value & value) + { + if (!value.isArray()) + { + ChipLogError(NotSpecified, "Error while encoding %s as an array.", label); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + auto content = static_cast::type *>(chip::Platform::MemoryCalloc(value.size(), sizeof(T))); + VerifyOrReturnError(content != nullptr, CHIP_ERROR_NO_MEMORY); + + Json::ArrayIndex size = value.size(); + for (Json::ArrayIndex i = 0; i < size; i++) + { + char labelWithIndex[kMaxLabelLength]; + // GCC 7.0.1 has introduced some new warnings for snprintf (-Werror=format-truncation) by default. + // This is not particularly useful when using snprintf and especially in this context, so in order + // to disable the warning the %s is constrained to be of max length: (254 - 11 - 2) where: + // - 254 is kMaxLabelLength - 1 (for null) + // - 11 is the maximum length of a %d (-2147483648, 2147483647) + // - 2 is the length for the "[" and "]" characters. + snprintf(labelWithIndex, sizeof(labelWithIndex), "%.241s[%d]", label, i); + ReturnErrorOnFailure(ComplexArgumentParser::Setup(labelWithIndex, content[i], value[i])); + } + + request = chip::app::DataModel::List(content, value.size()); + return CHIP_NO_ERROR; + } + + static CHIP_ERROR Setup(const char * label, chip::ByteSpan & request, Json::Value & value) + { + if (!value.isString()) + { + ChipLogError(NotSpecified, "Error while encoding %s as an octet string: Not a string.", label); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + auto str = value.asString(); + auto size = str.size(); + uint8_t * buffer = nullptr; + + if (IsStrString(str.c_str())) + { + // Skip the prefix + str.erase(0, kStrStringPrefixLen); + size = str.size(); + + buffer = static_cast(chip::Platform::MemoryCalloc(size, sizeof(uint8_t))); + VerifyOrReturnError(buffer != nullptr, CHIP_ERROR_NO_MEMORY); + + memcpy(buffer, str.c_str(), size); + } + else + { + if (IsHexString(str.c_str())) + { + // Skip the prefix + str.erase(0, kHexStringPrefixLen); + size = str.size(); + } + + CHIP_ERROR err = HexToBytes( + chip::CharSpan(str.c_str(), size), + [&buffer](size_t allocSize) { + buffer = static_cast(chip::Platform::MemoryCalloc(allocSize, sizeof(uint8_t))); + return buffer; + }, + &size); + + if (err != CHIP_NO_ERROR) + { + if (buffer != nullptr) + { + chip::Platform::MemoryFree(buffer); + } + + return err; + } + } + + request = chip::ByteSpan(buffer, size); + return CHIP_NO_ERROR; + } + + static CHIP_ERROR Setup(const char * label, chip::CharSpan & request, Json::Value & value) + { + if (!value.isString()) + { + ChipLogError(NotSpecified, "Error while encoding %s as a string: Not a string.", label); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + size_t size = strlen(value.asCString()); + auto buffer = static_cast(chip::Platform::MemoryCalloc(size, sizeof(char))); + VerifyOrReturnError(buffer != nullptr, CHIP_ERROR_NO_MEMORY); + + memcpy(buffer, value.asCString(), size); + + request = chip::CharSpan(buffer, size); + return CHIP_NO_ERROR; + } + + static CHIP_ERROR Setup(const char * label, float & request, Json::Value & value) + { + if (!value.isNumeric()) + { + ChipLogError(NotSpecified, "Error while encoding %s as a float: Not a number.", label); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + request = static_cast(value.asFloat()); + return CHIP_NO_ERROR; + } + + static CHIP_ERROR Setup(const char * label, double & request, Json::Value & value) + { + if (!value.isNumeric()) + { + ChipLogError(NotSpecified, "Error while encoding %s as a double: Not a number.", label); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + request = static_cast(value.asDouble()); + return CHIP_NO_ERROR; + } + + static CHIP_ERROR Setup(const char * label, bool & request, Json::Value & value) + { + if (!value.isBool()) + { + ChipLogError(NotSpecified, "Error while encoding %s as a boolean: Not a boolean.", label); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + request = value.asBool(); + return CHIP_NO_ERROR; + } + + static CHIP_ERROR EnsureMemberExist(const char * label, const char * memberName, bool hasMember) + { + if (hasMember) + { + return CHIP_NO_ERROR; + } + + ChipLogError(NotSpecified, "%s is required. Should be provided as {\"%s\": value}", label, memberName); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + static CHIP_ERROR EnsureNoMembersRemaining(const char * label, const Json::Value & value) + { + auto remainingFields = value.getMemberNames(); + if (remainingFields.size() == 0) + { + return CHIP_NO_ERROR; + } +#if CHIP_ERROR_LOGGING + for (auto & field : remainingFields) + { + ChipLogError(NotSpecified, "Unexpected field name: '%s.%s'", label, field.c_str()); + } +#endif // CHIP_ERROR_LOGGING + return CHIP_ERROR_INVALID_ARGUMENT; + } + + template + static void Finalize(T & request) + { + // Nothing to do + } + + template + static void Finalize(chip::Optional & request) + { + VerifyOrReturn(request.HasValue()); + ComplexArgumentParser::Finalize(request.Value()); + } + + template + static void Finalize(chip::app::DataModel::Nullable & request) + { + VerifyOrReturn(!request.IsNull()); + ComplexArgumentParser::Finalize(request.Value()); + } + + static void Finalize(chip::ByteSpan & request) + { + VerifyOrReturn(request.data() != nullptr); + chip::Platform::MemoryFree(reinterpret_cast(const_cast(request.data()))); + } + + static void Finalize(chip::CharSpan & request) + { + VerifyOrReturn(request.data() != nullptr); + chip::Platform::MemoryFree(reinterpret_cast(const_cast(request.data()))); + } + + template + static void Finalize(chip::app::DataModel::List & request) + { + VerifyOrReturn(request.data() != nullptr); + + size_t size = request.size(); + auto data = const_cast::type *>(request.data()); + for (size_t i = 0; i < size; i++) + { + Finalize(data[i]); + } + + chip::Platform::MemoryFree(reinterpret_cast(data)); + } + +#include +}; + +class ComplexArgument +{ +public: + virtual ~ComplexArgument() {} + + virtual CHIP_ERROR Parse(const char * label, const char * json) = 0; + + virtual void Reset() = 0; +}; + +template +class TypedComplexArgument : public ComplexArgument +{ +public: + TypedComplexArgument() {} + TypedComplexArgument(T * request) : mRequest(request) {} + ~TypedComplexArgument() + { + if (mRequest != nullptr) + { + ComplexArgumentParser::Finalize(*mRequest); + } + } + + void SetArgument(T * request) { mRequest = request; }; + + CHIP_ERROR Parse(const char * label, const char * json) + { + Json::Value value; + if (strcmp(kNullString, json) == 0) + { + value = Json::nullValue; + } + else if (!JsonParser::ParseComplexArgument(label, json, value)) + { + return CHIP_ERROR_INVALID_ARGUMENT; + } + + return ComplexArgumentParser::Setup(label, *mRequest, value); + } + + void Reset() { *mRequest = T(); } + +private: + T * mRequest; +}; diff --git a/examples/fabric-admin/commands/clusters/CustomArgument.h b/examples/fabric-admin/commands/clusters/CustomArgument.h new file mode 100644 index 00000000000000..3769c0052236cd --- /dev/null +++ b/examples/fabric-admin/commands/clusters/CustomArgument.h @@ -0,0 +1,297 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include +#include +#include +#include +#include + +#include + +#include "JsonParser.h" + +namespace { +static constexpr char kPayloadHexPrefix[] = "hex:"; +static constexpr char kPayloadSignedPrefix[] = "s:"; +static constexpr char kPayloadUnsignedPrefix[] = "u:"; +static constexpr char kPayloadFloatPrefix[] = "f:"; +static constexpr char kPayloadDoublePrefix[] = "d:"; +static constexpr size_t kPayloadHexPrefixLen = ArraySize(kPayloadHexPrefix) - 1; // ignore null character +static constexpr size_t kPayloadSignedPrefixLen = ArraySize(kPayloadSignedPrefix) - 1; // ignore null character +static constexpr size_t kPayloadUnsignedPrefixLen = ArraySize(kPayloadUnsignedPrefix) - 1; // ignore null character +static constexpr size_t kPayloadFloatPrefixLen = ArraySize(kPayloadFloatPrefix) - 1; // ignore null character +static constexpr size_t kPayloadDoublePrefixLen = ArraySize(kPayloadDoublePrefix) - 1; // ignore null character +} // namespace + +class CustomArgumentParser +{ +public: + static CHIP_ERROR Put(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + if (value.isObject()) + { + return CustomArgumentParser::PutObject(writer, tag, value); + } + + if (value.isArray()) + { + return CustomArgumentParser::PutArray(writer, tag, value); + } + + if (value.isString()) + { + if (IsOctetString(value)) + { + return CustomArgumentParser::PutOctetString(writer, tag, value); + } + if (IsUnsignedNumberPrefix(value)) + { + return CustomArgumentParser::PutUnsignedFromString(writer, tag, value); + } + if (IsSignedNumberPrefix(value)) + { + return CustomArgumentParser::PutSignedFromString(writer, tag, value); + } + if (IsFloatNumberPrefix(value)) + { + return CustomArgumentParser::PutFloatFromString(writer, tag, value); + } + if (IsDoubleNumberPrefix(value)) + { + return CustomArgumentParser::PutDoubleFromString(writer, tag, value); + } + + return CustomArgumentParser::PutCharString(writer, tag, value); + } + + if (value.isNull()) + { + return chip::app::DataModel::Encode(*writer, tag, chip::app::DataModel::Nullable()); + } + + if (value.isBool()) + { + return chip::app::DataModel::Encode(*writer, tag, value.asBool()); + } + + if (value.isUInt()) + { + return chip::app::DataModel::Encode(*writer, tag, value.asLargestUInt()); + } + + if (value.isInt()) + { + return chip::app::DataModel::Encode(*writer, tag, value.asLargestInt()); + } + + if (value.isNumeric()) + { + return chip::app::DataModel::Encode(*writer, tag, value.asDouble()); + } + + return CHIP_ERROR_NOT_IMPLEMENTED; + } + +private: + static CHIP_ERROR PutArray(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + chip::TLV::TLVType outer; + ReturnErrorOnFailure(writer->StartContainer(tag, chip::TLV::kTLVType_Array, outer)); + + Json::ArrayIndex size = value.size(); + + for (Json::ArrayIndex i = 0; i < size; i++) + { + ReturnErrorOnFailure(CustomArgumentParser::Put(writer, chip::TLV::AnonymousTag(), value[i])); + } + + return writer->EndContainer(outer); + } + + static CHIP_ERROR PutObject(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + chip::TLV::TLVType outer; + ReturnErrorOnFailure(writer->StartContainer(tag, chip::TLV::kTLVType_Structure, outer)); + + for (auto const & id : value.getMemberNames()) + { + auto index = std::stoul(id, nullptr, 0); + VerifyOrReturnError(chip::CanCastTo(index), CHIP_ERROR_INVALID_ARGUMENT); + ReturnErrorOnFailure(CustomArgumentParser::Put(writer, chip::TLV::ContextTag(static_cast(index)), value[id])); + } + + return writer->EndContainer(outer); + } + + static CHIP_ERROR PutOctetString(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + const char * hexData = value.asCString() + kPayloadHexPrefixLen; + size_t hexDataLen = strlen(hexData); + chip::Platform::ScopedMemoryBuffer buffer; + + size_t octetCount; + ReturnErrorOnFailure(HexToBytes( + chip::CharSpan(hexData, hexDataLen), + [&buffer](size_t allocSize) { + buffer.Calloc(allocSize); + return buffer.Get(); + }, + &octetCount)); + + return chip::app::DataModel::Encode(*writer, tag, chip::ByteSpan(buffer.Get(), octetCount)); + } + + static CHIP_ERROR PutCharString(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + size_t size = strlen(value.asCString()); + return chip::app::DataModel::Encode(*writer, tag, chip::CharSpan(value.asCString(), size)); + } + + static CHIP_ERROR PutUnsignedFromString(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + char numberAsString[21]; + chip::Platform::CopyString(numberAsString, value.asCString() + kPayloadUnsignedPrefixLen); + + auto number = std::stoull(numberAsString, nullptr, 0); + return chip::app::DataModel::Encode(*writer, tag, static_cast(number)); + } + + static CHIP_ERROR PutSignedFromString(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + char numberAsString[21]; + chip::Platform::CopyString(numberAsString, value.asCString() + kPayloadSignedPrefixLen); + + auto number = std::stoll(numberAsString, nullptr, 0); + return chip::app::DataModel::Encode(*writer, tag, static_cast(number)); + } + + static CHIP_ERROR PutFloatFromString(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + char numberAsString[21]; + chip::Platform::CopyString(numberAsString, value.asCString() + kPayloadFloatPrefixLen); + + auto number = std::stof(numberAsString); + return chip::app::DataModel::Encode(*writer, tag, number); + } + + static CHIP_ERROR PutDoubleFromString(chip::TLV::TLVWriter * writer, chip::TLV::Tag tag, Json::Value & value) + { + char numberAsString[21]; + chip::Platform::CopyString(numberAsString, value.asCString() + kPayloadDoublePrefixLen); + + auto number = std::stod(numberAsString); + return chip::app::DataModel::Encode(*writer, tag, number); + } + + static bool IsOctetString(Json::Value & value) + { + return (strncmp(value.asCString(), kPayloadHexPrefix, kPayloadHexPrefixLen) == 0); + } + + static bool IsUnsignedNumberPrefix(Json::Value & value) + { + return (strncmp(value.asCString(), kPayloadUnsignedPrefix, kPayloadUnsignedPrefixLen) == 0); + } + + static bool IsSignedNumberPrefix(Json::Value & value) + { + return (strncmp(value.asCString(), kPayloadSignedPrefix, kPayloadSignedPrefixLen) == 0); + } + + static bool IsFloatNumberPrefix(Json::Value & value) + { + return (strncmp(value.asCString(), kPayloadFloatPrefix, kPayloadFloatPrefixLen) == 0); + } + + static bool IsDoubleNumberPrefix(Json::Value & value) + { + return (strncmp(value.asCString(), kPayloadDoublePrefix, kPayloadDoublePrefixLen) == 0); + } +}; + +class CustomArgument +{ +public: + ~CustomArgument() + { + if (mData != nullptr) + { + chip::Platform::MemoryFree(mData); + } + } + + CHIP_ERROR Parse(const char * label, const char * json) + { + Json::Value value; + static constexpr char kHexNumPrefix[] = "0x"; + constexpr size_t kHexNumPrefixLen = ArraySize(kHexNumPrefix) - 1; + if (strncmp(json, kPayloadHexPrefix, kPayloadHexPrefixLen) == 0 || + strncmp(json, kPayloadSignedPrefix, kPayloadSignedPrefixLen) == 0 || + strncmp(json, kPayloadUnsignedPrefix, kPayloadUnsignedPrefixLen) == 0 || + strncmp(json, kPayloadFloatPrefix, kPayloadFloatPrefixLen) == 0 || + strncmp(json, kPayloadDoublePrefix, kPayloadDoublePrefixLen) == 0) + { + value = Json::Value(json); + } + else if (strncmp(json, kHexNumPrefix, kHexNumPrefixLen) == 0) + { + // Assume that hex numbers are unsigned. Prepend + // kPayloadUnsignedPrefix and then let the rest of the logic handle + // things. + std::string str(kPayloadUnsignedPrefix); + str += json; + value = Json::Value(str); + } + else if (!JsonParser::ParseCustomArgument(label, json, value)) + { + return CHIP_ERROR_INVALID_ARGUMENT; + } + + mData = static_cast(chip::Platform::MemoryCalloc(sizeof(uint8_t), mDataMaxLen)); + VerifyOrReturnError(mData != nullptr, CHIP_ERROR_NO_MEMORY); + + chip::TLV::TLVWriter writer; + writer.Init(mData, mDataMaxLen); + + ReturnErrorOnFailure(CustomArgumentParser::Put(&writer, chip::TLV::AnonymousTag(), value)); + + mDataLen = writer.GetLengthWritten(); + return writer.Finalize(); + } + + CHIP_ERROR Encode(chip::TLV::TLVWriter & writer, chip::TLV::Tag tag) const + { + chip::TLV::TLVReader reader; + reader.Init(mData, mDataLen); + ReturnErrorOnFailure(reader.Next()); + + return writer.CopyElement(tag, reader); + } + + // We trust our consumers to do the encoding of our data correctly, so don't + // need to know whether we are being encoded for a write. + static constexpr bool kIsFabricScoped = false; + +private: + uint8_t * mData = nullptr; + uint32_t mDataLen = 0; + static constexpr uint32_t mDataMaxLen = 4096; +}; diff --git a/examples/fabric-admin/commands/clusters/DataModelLogger.h b/examples/fabric-admin/commands/clusters/DataModelLogger.h new file mode 100644 index 00000000000000..ee649755014906 --- /dev/null +++ b/examples/fabric-admin/commands/clusters/DataModelLogger.h @@ -0,0 +1,190 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include + +#include +#include +#include +#include +#include +#include +#include +#include + +class DataModelLogger +{ +public: + static CHIP_ERROR LogAttribute(const chip::app::ConcreteDataAttributePath & path, chip::TLV::TLVReader * data); + static CHIP_ERROR LogCommand(const chip::app::ConcreteCommandPath & path, chip::TLV::TLVReader * data); + static CHIP_ERROR LogEvent(const chip::app::EventHeader & header, chip::TLV::TLVReader * data); + +private: + static CHIP_ERROR LogValue(const char * label, size_t indent, bool value) + { + DataModelLogger::LogString(label, indent, value ? "TRUE" : "FALSE"); + return CHIP_NO_ERROR; + } + + static CHIP_ERROR LogValue(const char * label, size_t indent, chip::CharSpan value) + { + DataModelLogger::LogString(label, indent, std::string(value.data(), value.size())); + return CHIP_NO_ERROR; + } + + static CHIP_ERROR LogValue(const char * label, size_t indent, chip::ByteSpan value) + { + // CHIP_CONFIG_LOG_MESSAGE_MAX_SIZE includes various prefixes we don't + // control (timestamps, process ids, etc). Let's assume (hope?) that + // those prefixes use up no more than half the total available space. + // Right now it looks like the prefixes are 45 chars out of a 255 char + // buffer. + char buffer[CHIP_CONFIG_LOG_MESSAGE_MAX_SIZE / 2]; + size_t prefixSize = ComputePrefixSize(label, indent); + if (prefixSize > ArraySize(buffer)) + { + DataModelLogger::LogString("", 0, "Prefix is too long to fit in buffer"); + return CHIP_ERROR_INTERNAL; + } + + const size_t availableSize = ArraySize(buffer) - prefixSize; + // Each byte ends up as two hex characters. + const size_t bytesPerLogCall = availableSize / 2; + std::string labelStr(label); + while (value.size() > bytesPerLogCall) + { + ReturnErrorOnFailure( + chip::Encoding::BytesToUppercaseHexString(value.data(), bytesPerLogCall, &buffer[0], ArraySize(buffer))); + LogString(labelStr, indent, buffer); + value = value.SubSpan(bytesPerLogCall); + // For the second and following lines, make it clear that they are + // continuation lines by replacing the label with "....". + labelStr.replace(labelStr.begin(), labelStr.end(), labelStr.size(), '.'); + } + ReturnErrorOnFailure(chip::Encoding::BytesToUppercaseHexString(value.data(), value.size(), &buffer[0], ArraySize(buffer))); + LogString(labelStr, indent, buffer); + + return CHIP_NO_ERROR; + } + + template ::value && !std::is_same>, bool>::value, int> = 0> + static CHIP_ERROR LogValue(const char * label, size_t indent, X value) + { + DataModelLogger::LogString(label, indent, std::to_string(value)); + return CHIP_NO_ERROR; + } + + template ::value, int> = 0> + static CHIP_ERROR LogValue(const char * label, size_t indent, X value) + { + DataModelLogger::LogString(label, indent, std::to_string(value)); + return CHIP_NO_ERROR; + } + + template ::value, int> = 0> + static CHIP_ERROR LogValue(const char * label, size_t indent, X value) + { + return DataModelLogger::LogValue(label, indent, chip::to_underlying(value)); + } + + template + static CHIP_ERROR LogValue(const char * label, size_t indent, chip::BitFlags value) + { + return DataModelLogger::LogValue(label, indent, value.Raw()); + } + + template + static CHIP_ERROR LogValue(const char * label, size_t indent, const chip::app::DataModel::DecodableList & value) + { + size_t count = 0; + ReturnErrorOnFailure(value.ComputeSize(&count)); + DataModelLogger::LogString(label, indent, std::to_string(count) + " entries"); + + auto iter = value.begin(); + size_t i = 0; + while (iter.Next()) + { + ++i; + std::string itemLabel = std::string("[") + std::to_string(i) + "]"; + ReturnErrorOnFailure(DataModelLogger::LogValue(itemLabel.c_str(), indent + 1, iter.GetValue())); + } + if (iter.GetStatus() != CHIP_NO_ERROR) + { + DataModelLogger::LogString(indent + 1, "List truncated due to invalid value"); + } + return iter.GetStatus(); + } + + template + static CHIP_ERROR LogValue(const char * label, size_t indent, const chip::app::DataModel::Nullable & value) + { + if (value.IsNull()) + { + DataModelLogger::LogString(label, indent, "null"); + return CHIP_NO_ERROR; + } + + return DataModelLogger::LogValue(label, indent, value.Value()); + } + + template + static CHIP_ERROR LogValue(const char * label, size_t indent, const chip::Optional & value) + { + if (value.HasValue()) + { + return DataModelLogger::LogValue(label, indent, value.Value()); + } + + return CHIP_NO_ERROR; + } + +#include + + static void LogString(size_t indent, const std::string string) { LogString("", indent, string); } + + static void LogString(const std::string label, size_t indent, const std::string string) + { + std::string prefix = ComputePrefix(label, indent); + + ChipLogProgress(NotSpecified, "%s%s", prefix.c_str(), string.c_str()); + } + +private: + static std::string ComputePrefix(const std::string label, size_t indent) + { + std::string prefix; + for (size_t i = 0; i < indent; ++i) + { + prefix.append(" "); + } + if (label.size() > 0) + { + prefix.append(label); + prefix.append(":"); + } + prefix.append(" "); + + return prefix; + } + + static size_t ComputePrefixSize(const std::string label, size_t indent) { return ComputePrefix(label, indent).size(); } +}; diff --git a/examples/fabric-admin/commands/clusters/JsonParser.h b/examples/fabric-admin/commands/clusters/JsonParser.h new file mode 100644 index 00000000000000..0871e767c21bd6 --- /dev/null +++ b/examples/fabric-admin/commands/clusters/JsonParser.h @@ -0,0 +1,166 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "../common/CustomStringPrefix.h" + +#include +#include + +#include +#include +#include +#include + +class JsonParser +{ +public: + // Returns whether the parse succeeded. + static bool ParseComplexArgument(const char * label, const char * json, Json::Value & value) + { + return Parse(label, json, /* strictRoot = */ true, value); + } + + // Returns whether the parse succeeded. + static bool ParseCustomArgument(const char * label, const char * json, Json::Value & value) + { + return Parse(label, json, /* strictRoot = */ false, value); + } + +private: + static bool Parse(const char * label, const char * json, bool strictRoot, Json::Value & value) + { + Json::CharReaderBuilder readerBuilder; + readerBuilder.settings_["strictRoot"] = strictRoot; + readerBuilder.settings_["allowSingleQuotes"] = true; + readerBuilder.settings_["failIfExtra"] = true; + readerBuilder.settings_["rejectDupKeys"] = true; + + auto reader = std::unique_ptr(readerBuilder.newCharReader()); + std::string errors; + if (reader->parse(json, json + strlen(json), &value, &errors)) + { + return true; + } + + // The CharReader API allows us to set failIfExtra, unlike Reader, but does + // not allow us to get structured errors. We get to try to manually undo + // the work it did to create a string from the structured errors it had. + ChipLogError(NotSpecified, "Error parsing JSON for %s:", label); + + // For each error "errors" has the following: + // + // 1) A line starting with "* " that has line/column info + // 2) A line with the error message. + // 3) An optional line with some extra info. + // + // We keep track of the last error column, in case the error message + // reporting needs it. + std::istringstream stream(errors); + std::string error; + chip::Optional errorColumn; + while (getline(stream, error)) + { + if (error.rfind("* ", 0) == 0) + { + // Flush out any pending error location. + LogErrorLocation(errorColumn, json); + + // The format of this line is: + // + // * Line N, Column M + // + // Unfortunately it does not indicate end of error, so we can only + // show its start. + unsigned errorLine; // ignored in practice + if (sscanf(error.c_str(), "* Line %u, Column %u", &errorLine, &errorColumn.Emplace()) != 2) + { + ChipLogError(NotSpecified, "Unexpected location string: %s\n", error.c_str()); + // We don't know how to make sense of this thing anymore. + break; + } + if (errorColumn.Value() == 0) + { + ChipLogError(NotSpecified, "Expected error column to be at least 1"); + // We don't know how to make sense of this thing anymore. + break; + } + // We are using our column numbers as offsets, so want them to be + // 0-based. + --errorColumn.Value(); + } + else + { + ChipLogError(NotSpecified, " %s", error.c_str()); + if (error == " Missing ',' or '}' in object declaration" && errorColumn.HasValue() && errorColumn.Value() > 0 && + json[errorColumn.Value() - 1] == '0' && (json[errorColumn.Value()] == 'x' || json[errorColumn.Value()] == 'X')) + { + // Log the error location marker before showing the NOTE + // message. + LogErrorLocation(errorColumn, json); + ChipLogError(NotSpecified, + "NOTE: JSON does not allow hex syntax beginning with 0x for numbers. Try putting the hex number " + "in quotes (like {\"name\": \"0x100\"})."); + } + } + } + + // Write out the marker for our last error. + LogErrorLocation(errorColumn, json); + + return false; + } + +private: + static void LogErrorLocation(chip::Optional & errorColumn, const char * json) + { +#if CHIP_ERROR_LOGGING + if (!errorColumn.HasValue()) + { + return; + } + + const char * sourceText = json; + unsigned error_start = errorColumn.Value(); + // The whole JSON string might be too long to fit in our log + // messages. Just include 30 chars before the error. + constexpr ptrdiff_t kMaxContext = 30; + std::string errorMarker; + if (error_start > kMaxContext) + { + sourceText += (error_start - kMaxContext); + error_start = kMaxContext; + ChipLogError(NotSpecified, "... %s", sourceText); + // Add markers corresponding to the "... " above. + errorMarker += "----"; + } + else + { + ChipLogError(NotSpecified, "%s", sourceText); + } + for (unsigned i = 0; i < error_start; ++i) + { + errorMarker += "-"; + } + errorMarker += "^"; + ChipLogError(NotSpecified, "%s", errorMarker.c_str()); + errorColumn.ClearValue(); +#endif // CHIP_ERROR_LOGGING + } +}; diff --git a/examples/fabric-admin/commands/clusters/ModelCommand.cpp b/examples/fabric-admin/commands/clusters/ModelCommand.cpp new file mode 100644 index 00000000000000..8f379dbcc4ee06 --- /dev/null +++ b/examples/fabric-admin/commands/clusters/ModelCommand.cpp @@ -0,0 +1,105 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "ModelCommand.h" + +#include +#include +#include + +using namespace ::chip; + +CHIP_ERROR ModelCommand::RunCommand() +{ + + if (IsGroupId(mDestinationId)) + { + FabricIndex fabricIndex = CurrentCommissioner().GetFabricIndex(); + ChipLogProgress(chipTool, "Sending command to group 0x%x", GroupIdFromNodeId(mDestinationId)); + + return SendGroupCommand(GroupIdFromNodeId(mDestinationId), fabricIndex); + } + + ChipLogProgress(NotSpecified, "Sending command to node " ChipLogFormatX64, ChipLogValueX64(mDestinationId)); + CheckPeerICDType(); + + CommissioneeDeviceProxy * commissioneeDeviceProxy = nullptr; + if (CHIP_NO_ERROR == CurrentCommissioner().GetDeviceBeingCommissioned(mDestinationId, &commissioneeDeviceProxy)) + { + return SendCommand(commissioneeDeviceProxy, mEndPointId); + } + + return CurrentCommissioner().GetConnectedDevice(mDestinationId, &mOnDeviceConnectedCallback, + &mOnDeviceConnectionFailureCallback); +} + +void ModelCommand::OnDeviceConnectedFn(void * context, chip::Messaging::ExchangeManager & exchangeMgr, + const chip::SessionHandle & sessionHandle) +{ + ModelCommand * command = reinterpret_cast(context); + VerifyOrReturn(command != nullptr, ChipLogError(NotSpecified, "OnDeviceConnectedFn: context is null")); + + chip::OperationalDeviceProxy device(&exchangeMgr, sessionHandle); + CHIP_ERROR err = command->SendCommand(&device, command->mEndPointId); + VerifyOrReturn(CHIP_NO_ERROR == err, command->SetCommandExitStatus(err)); +} + +void ModelCommand::OnDeviceConnectionFailureFn(void * context, const chip::ScopedNodeId & peerId, CHIP_ERROR err) +{ + LogErrorOnFailure(err); + + ModelCommand * command = reinterpret_cast(context); + VerifyOrReturn(command != nullptr, ChipLogError(NotSpecified, "OnDeviceConnectionFailureFn: context is null")); + command->SetCommandExitStatus(err); +} + +void ModelCommand::Shutdown() +{ + mOnDeviceConnectedCallback.Cancel(); + mOnDeviceConnectionFailureCallback.Cancel(); + + CHIPCommand::Shutdown(); +} + +void ModelCommand::CheckPeerICDType() +{ + if (mIsPeerLIT.HasValue()) + { + ChipLogProgress(NotSpecified, "Peer ICD type is set to %s", mIsPeerLIT.Value() == 1 ? "LIT-ICD" : "non LIT-ICD"); + return; + } + + app::ICDClientInfo info; + auto destinationPeerId = chip::ScopedNodeId(mDestinationId, CurrentCommissioner().GetFabricIndex()); + auto iter = CHIPCommand::sICDClientStorage.IterateICDClientInfo(); + if (iter == nullptr) + { + return; + } + app::DefaultICDClientStorage::ICDClientInfoIteratorWrapper clientInfoIteratorWrapper(iter); + + while (iter->Next(info)) + { + if (ScopedNodeId(info.peer_node.GetNodeId(), info.peer_node.GetFabricIndex()) == destinationPeerId) + { + ChipLogProgress(NotSpecified, "Peer is a registered LIT ICD."); + mIsPeerLIT.SetValue(true); + return; + } + } +} diff --git a/examples/fabric-admin/commands/clusters/ModelCommand.h b/examples/fabric-admin/commands/clusters/ModelCommand.h new file mode 100644 index 00000000000000..c14d3c9952f3fc --- /dev/null +++ b/examples/fabric-admin/commands/clusters/ModelCommand.h @@ -0,0 +1,91 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#ifdef CONFIG_USE_LOCAL_STORAGE +#include +#endif // CONFIG_USE_LOCAL_STORAGE + +#include "../common/CHIPCommand.h" +#include + +class ModelCommand : public CHIPCommand +{ +public: + ModelCommand(const char * commandName, CredentialIssuerCommands * credsIssuerConfig, bool supportsMultipleEndpoints = false) : + CHIPCommand(commandName, credsIssuerConfig), mOnDeviceConnectedCallback(OnDeviceConnectedFn, this), + mOnDeviceConnectionFailureCallback(OnDeviceConnectionFailureFn, this), mSupportsMultipleEndpoints(supportsMultipleEndpoints) + {} + + void AddArguments(bool skipEndpoints = false) + { + AddArgument( + "destination-id", 0, UINT64_MAX, &mDestinationId, + "64-bit node or group identifier.\n Group identifiers are detected by being in the 0xFFFF'FFFF'FFFF'xxxx range."); + if (skipEndpoints == false) + { + if (mSupportsMultipleEndpoints) + { + AddArgument("endpoint-ids", 0, UINT16_MAX, &mEndPointId, + "Comma-separated list of endpoint ids (e.g. \"1\" or \"1,2,3\").\n Allowed to be 0xFFFF to indicate a " + "wildcard endpoint."); + } + else + { + AddArgument("endpoint-id-ignored-for-group-commands", 0, UINT16_MAX, &mEndPointId, + "Endpoint the command is targeted at."); + } + } + AddArgument( + "lit-icd-peer", 0, 1, &mIsPeerLIT, + "Whether to treat the peer as a LIT ICD. false: Always no, true: Always yes, (not set): Yes if the peer is registered " + "to this controller."); + AddArgument("timeout", 0, UINT16_MAX, &mTimeout); + } + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override; + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(mTimeout.ValueOr(20)); } + + virtual CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endPointIds) = 0; + + virtual CHIP_ERROR SendGroupCommand(chip::GroupId groupId, chip::FabricIndex fabricIndex) { return CHIP_ERROR_BAD_REQUEST; }; + + void Shutdown() override; + +protected: + bool IsPeerLIT() { return mIsPeerLIT.ValueOr(false); } + + chip::Optional mTimeout; + +private: + chip::NodeId mDestinationId; + std::vector mEndPointId; + chip::Optional mIsPeerLIT; + + void CheckPeerICDType(); + + static void OnDeviceConnectedFn(void * context, chip::Messaging::ExchangeManager & exchangeMgr, + const chip::SessionHandle & sessionHandle); + static void OnDeviceConnectionFailureFn(void * context, const chip::ScopedNodeId & peerId, CHIP_ERROR error); + + chip::Callback::Callback mOnDeviceConnectedCallback; + chip::Callback::Callback mOnDeviceConnectionFailureCallback; + const bool mSupportsMultipleEndpoints; +}; diff --git a/examples/fabric-admin/commands/clusters/ReportCommand.h b/examples/fabric-admin/commands/clusters/ReportCommand.h new file mode 100644 index 00000000000000..4e9dbd0f043931 --- /dev/null +++ b/examples/fabric-admin/commands/clusters/ReportCommand.h @@ -0,0 +1,551 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include + +#include "DataModelLogger.h" +#include "ModelCommand.h" + +class ReportCommand : public InteractionModelReports, public ModelCommand, public chip::app::ReadClient::Callback +{ +public: + ReportCommand(const char * commandName, CredentialIssuerCommands * credsIssuerConfig) : + InteractionModelReports(this), ModelCommand(commandName, credsIssuerConfig, /* supportsMultipleEndpoints = */ true) + {} + + /////////// ReadClient Callback Interface ///////// + void OnAttributeData(const chip::app::ConcreteDataAttributePath & path, chip::TLV::TLVReader * data, + const chip::app::StatusIB & status) override + { + CHIP_ERROR error = status.ToChipError(); + if (CHIP_NO_ERROR != error) + { + LogErrorOnFailure(RemoteDataModelLogger::LogErrorAsJSON(path, status)); + + ChipLogError(NotSpecified, "Response Failure: %s", chip::ErrorStr(error)); + mError = error; + return; + } + + if (data == nullptr) + { + ChipLogError(NotSpecified, "Response Failure: No Data"); + mError = CHIP_ERROR_INTERNAL; + return; + } + + LogErrorOnFailure(RemoteDataModelLogger::LogAttributeAsJSON(path, data)); + + error = DataModelLogger::LogAttribute(path, data); + if (CHIP_NO_ERROR != error) + { + ChipLogError(NotSpecified, "Response Failure: Can not decode Data"); + mError = error; + return; + } + } + + void OnEventData(const chip::app::EventHeader & eventHeader, chip::TLV::TLVReader * data, + const chip::app::StatusIB * status) override + { + if (status != nullptr) + { + CHIP_ERROR error = status->ToChipError(); + if (CHIP_NO_ERROR != error) + { + LogErrorOnFailure(RemoteDataModelLogger::LogErrorAsJSON(eventHeader, *status)); + + ChipLogError(NotSpecified, "Response Failure: %s", chip::ErrorStr(error)); + mError = error; + return; + } + } + + if (data == nullptr) + { + ChipLogError(NotSpecified, "Response Failure: No Data"); + mError = CHIP_ERROR_INTERNAL; + return; + } + + LogErrorOnFailure(RemoteDataModelLogger::LogEventAsJSON(eventHeader, data)); + + CHIP_ERROR error = DataModelLogger::LogEvent(eventHeader, data); + if (CHIP_NO_ERROR != error) + { + ChipLogError(NotSpecified, "Response Failure: Can not decode Data"); + mError = error; + return; + } + } + + void OnError(CHIP_ERROR error) override + { + LogErrorOnFailure(RemoteDataModelLogger::LogErrorAsJSON(error)); + + ChipLogProgress(NotSpecified, "Error: %s", chip::ErrorStr(error)); + mError = error; + } + + void OnDeallocatePaths(chip::app::ReadPrepareParams && aReadPrepareParams) override + { + InteractionModelReports::OnDeallocatePaths(std::move(aReadPrepareParams)); + } + + void Shutdown() override + { + // We don't shut down InteractionModelReports here; we leave it for + // Cleanup to handle. + mError = CHIP_NO_ERROR; + ModelCommand::Shutdown(); + } + + void Cleanup() override { InteractionModelReports::Shutdown(); } + +protected: + // Use a 3x-longer-than-default timeout because wildcard reads can take a + // while. + chip::System::Clock::Timeout GetWaitDuration() const override + { + return mTimeout.HasValue() ? chip::System::Clock::Seconds16(mTimeout.Value()) : (ModelCommand::GetWaitDuration() * 3); + } + + CHIP_ERROR mError = CHIP_NO_ERROR; +}; + +class ReadCommand : public ReportCommand +{ +protected: + ReadCommand(const char * commandName, CredentialIssuerCommands * credsIssuerConfig) : + ReportCommand(commandName, credsIssuerConfig) + {} + + void OnDone(chip::app::ReadClient * aReadClient) override + { + InteractionModelReports::CleanupReadClient(aReadClient); + SetCommandExitStatus(mError); + } +}; + +class SubscribeCommand : public ReportCommand +{ +protected: + SubscribeCommand(const char * commandName, CredentialIssuerCommands * credsIssuerConfig) : + ReportCommand(commandName, credsIssuerConfig) + {} + + void OnSubscriptionEstablished(chip::SubscriptionId subscriptionId) override + { + mSubscriptionEstablished = true; + SetCommandExitStatus(CHIP_NO_ERROR); + } + + void OnDone(chip::app::ReadClient * aReadClient) override + { + InteractionModelReports::CleanupReadClient(aReadClient); + + if (!mSubscriptionEstablished) + { + SetCommandExitStatus(mError); + } + // else we must be getting here from Cleanup(), which means we have + // already done our exit status thing. + } + + void Shutdown() override + { + mSubscriptionEstablished = false; + ReportCommand::Shutdown(); + } + + // For subscriptions we always defer interactive cleanup. Either our + // ReadClients will terminate themselves (in which case they will be removed + // from our list anyway), or they should hang around until shutdown. + bool DeferInteractiveCleanup() override { return true; } + +private: + bool mSubscriptionEstablished = false; +}; + +class ReadAttribute : public ReadCommand +{ +public: + ReadAttribute(CredentialIssuerCommands * credsIssuerConfig) : ReadCommand("read-by-id", credsIssuerConfig) + { + AddArgument("cluster-ids", 0, UINT32_MAX, &mClusterIds, + "Comma-separated list of cluster ids to read from (e.g. \"6\" or \"8,0x201\").\n Allowed to be 0xFFFFFFFF to " + "indicate a wildcard cluster."); + AddAttributeIdArgument(); + AddCommonArguments(); + ReadCommand::AddArguments(); + } + + ReadAttribute(chip::ClusterId clusterId, CredentialIssuerCommands * credsIssuerConfig) : + ReadCommand("read-by-id", credsIssuerConfig), mClusterIds(1, clusterId) + { + AddAttributeIdArgument(); + AddCommonArguments(); + ReadCommand::AddArguments(); + } + + ReadAttribute(chip::ClusterId clusterId, const char * attributeName, chip::AttributeId attributeId, + CredentialIssuerCommands * credsIssuerConfig) : + ReadCommand("read", credsIssuerConfig), + mClusterIds(1, clusterId), mAttributeIds(1, attributeId) + { + AddArgument("attr-name", attributeName); + AddCommonArguments(); + ReadCommand::AddArguments(); + } + + ~ReadAttribute() {} + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + return ReadCommand::ReadAttribute(device, endpointIds, mClusterIds, mAttributeIds); + } + +private: + void AddAttributeIdArgument() + { + AddArgument("attribute-ids", 0, UINT32_MAX, &mAttributeIds, + "Comma-separated list of attribute ids to read (e.g. \"0\" or \"1,0xFFFC,0xFFFD\").\n Allowed to be " + "0xFFFFFFFF to indicate a wildcard attribute."); + } + + void AddCommonArguments() + { + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered, + "Boolean indicating whether to do a fabric-filtered read. Defaults to true."); + AddArgument("data-version", 0, UINT32_MAX, &mDataVersions, + "Comma-separated list of data versions for the clusters being read."); + } + + std::vector mClusterIds; + std::vector mAttributeIds; +}; + +class SubscribeAttribute : public SubscribeCommand +{ +public: + SubscribeAttribute(CredentialIssuerCommands * credsIssuerConfig) : SubscribeCommand("subscribe-by-id", credsIssuerConfig) + { + AddArgument("cluster-ids", 0, UINT32_MAX, &mClusterIds, + "Comma-separated list of cluster ids to subscribe to (e.g. \"6\" or \"8,0x201\").\n Allowed to be 0xFFFFFFFF " + "to indicate a wildcard cluster."); + AddAttributeIdArgument(); + AddCommonArguments(); + SubscribeCommand::AddArguments(); + } + + SubscribeAttribute(chip::ClusterId clusterId, CredentialIssuerCommands * credsIssuerConfig) : + SubscribeCommand("subscribe-by-id", credsIssuerConfig), mClusterIds(1, clusterId) + { + AddAttributeIdArgument(); + AddCommonArguments(); + SubscribeCommand::AddArguments(); + } + + SubscribeAttribute(chip::ClusterId clusterId, const char * attributeName, chip::AttributeId attributeId, + CredentialIssuerCommands * credsIssuerConfig) : + SubscribeCommand("subscribe", credsIssuerConfig), + mClusterIds(1, clusterId), mAttributeIds(1, attributeId) + { + AddArgument("attr-name", attributeName); + AddCommonArguments(); + SubscribeCommand::AddArguments(); + } + + ~SubscribeAttribute() {} + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + SubscribeCommand::SetPeerLIT(IsPeerLIT()); + return SubscribeCommand::SubscribeAttribute(device, endpointIds, mClusterIds, mAttributeIds); + } + +private: + void AddAttributeIdArgument() + { + AddArgument("attribute-ids", 0, UINT32_MAX, &mAttributeIds, + "Comma-separated list of attribute ids to subscribe to (e.g. \"0\" or \"1,0xFFFC,0xFFFD\").\n Allowed to be " + "0xFFFFFFFF to indicate a wildcard attribute."); + } + + void AddCommonArguments() + { + AddArgument("min-interval", 0, UINT16_MAX, &mMinInterval, + "Server should not send a new report if less than this number of seconds has elapsed since the last report."); + AddArgument("max-interval", 0, UINT16_MAX, &mMaxInterval, + "Server must send a report if this number of seconds has elapsed since the last report."); + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered, + "Boolean indicating whether to do a fabric-filtered subscription. Defaults to true."); + AddArgument("data-version", 0, UINT32_MAX, &mDataVersions, + "Comma-separated list of data versions for the clusters being subscribed to."); + AddArgument("keepSubscriptions", 0, 1, &mKeepSubscriptions, + "Boolean indicating whether to keep existing subscriptions when creating the new one. Defaults to false."); + AddArgument("auto-resubscribe", 0, 1, &mAutoResubscribe, + "Boolean indicating whether the subscription should auto-resubscribe. Defaults to false."); + } + + std::vector mClusterIds; + std::vector mAttributeIds; +}; + +class ReadEvent : public ReadCommand +{ +public: + ReadEvent(CredentialIssuerCommands * credsIssuerConfig) : ReadCommand("read-event-by-id", credsIssuerConfig) + { + AddArgument("cluster-id", 0, UINT32_MAX, &mClusterIds); + AddArgument("event-id", 0, UINT32_MAX, &mEventIds); + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered); + AddArgument("event-min", 0, UINT64_MAX, &mEventNumber); + ReadCommand::AddArguments(); + } + + ReadEvent(chip::ClusterId clusterId, CredentialIssuerCommands * credsIssuerConfig) : + ReadCommand("read-event-by-id", credsIssuerConfig), mClusterIds(1, clusterId) + { + AddArgument("event-id", 0, UINT32_MAX, &mEventIds); + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered); + AddArgument("event-min", 0, UINT64_MAX, &mEventNumber); + ReadCommand::AddArguments(); + } + + ReadEvent(chip::ClusterId clusterId, const char * eventName, chip::EventId eventId, + CredentialIssuerCommands * credsIssuerConfig) : + ReadCommand("read-event", credsIssuerConfig), + mClusterIds(1, clusterId), mEventIds(1, eventId) + { + AddArgument("event-name", eventName); + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered); + AddArgument("event-min", 0, UINT64_MAX, &mEventNumber); + ReadCommand::AddArguments(); + } + + ~ReadEvent() {} + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + return ReadCommand::ReadEvent(device, endpointIds, mClusterIds, mEventIds); + } + +private: + std::vector mClusterIds; + std::vector mEventIds; +}; + +class SubscribeEvent : public SubscribeCommand +{ +public: + SubscribeEvent(CredentialIssuerCommands * credsIssuerConfig) : SubscribeCommand("subscribe-event-by-id", credsIssuerConfig) + { + AddArgument("cluster-id", 0, UINT32_MAX, &mClusterIds); + AddArgument("event-id", 0, UINT32_MAX, &mEventIds); + AddCommonArguments(); + SubscribeCommand::AddArguments(); + } + + SubscribeEvent(chip::ClusterId clusterId, CredentialIssuerCommands * credsIssuerConfig) : + SubscribeCommand("subscribe-event-by-id", credsIssuerConfig), mClusterIds(1, clusterId) + { + AddArgument("event-id", 0, UINT32_MAX, &mEventIds); + AddCommonArguments(); + SubscribeCommand::AddArguments(); + } + + SubscribeEvent(chip::ClusterId clusterId, const char * eventName, chip::EventId eventId, + CredentialIssuerCommands * credsIssuerConfig) : + SubscribeCommand("subscribe-event", credsIssuerConfig), + mClusterIds(1, clusterId), mEventIds(1, eventId) + { + AddArgument("event-name", eventName, "Event name."); + AddCommonArguments(); + SubscribeCommand::AddArguments(); + } + + void AddCommonArguments() + { + AddArgument("min-interval", 0, UINT16_MAX, &mMinInterval, + "The requested minimum interval between reports. Sets MinIntervalFloor in the Subscribe Request."); + AddArgument("max-interval", 0, UINT16_MAX, &mMaxInterval, + "The requested maximum interval between reports. Sets MaxIntervalCeiling in the Subscribe Request."); + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered); + AddArgument("event-min", 0, UINT64_MAX, &mEventNumber); + AddArgument("keepSubscriptions", 0, 1, &mKeepSubscriptions, + "false - Terminate existing subscriptions from initiator.\n true - Leave existing subscriptions in place."); + AddArgument( + "is-urgent", 0, 1, &mIsUrgents, + "Sets isUrgent in the Subscribe Request.\n" + " The queueing of any urgent event SHALL force an immediate generation of reports containing all events queued " + "leading up to (and including) the urgent event in question.\n" + " This argument takes a comma separated list of true/false values.\n" + " If the number of paths exceeds the number of entries provided to is-urgent, then isUrgent will be false for the " + "extra paths."); + AddArgument("auto-resubscribe", 0, 1, &mAutoResubscribe, + "Boolean indicating whether the subscription should auto-resubscribe. Defaults to false."); + } + + ~SubscribeEvent() {} + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + SubscribeCommand::SetPeerLIT(IsPeerLIT()); + return SubscribeCommand::SubscribeEvent(device, endpointIds, mClusterIds, mEventIds); + } + +private: + std::vector mClusterIds; + std::vector mEventIds; +}; + +class ReadNone : public ReadCommand +{ +public: + ReadNone(CredentialIssuerCommands * credsIssuerConfig) : ReadCommand("read-none", credsIssuerConfig) + { + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered, + "Boolean indicating whether to do a fabric-filtered read. Defaults to true."); + AddArgument("data-versions", 0, UINT32_MAX, &mDataVersions, + "Comma-separated list of data versions for the clusters being read."); + AddArgument("event-min", 0, UINT64_MAX, &mEventNumber); + ReadCommand::AddArguments(true /* skipEndpoints */); + } + + ~ReadNone() {} + + void OnDone(chip::app::ReadClient * aReadClient) override + { + InteractionModelReports::CleanupReadClient(aReadClient); + SetCommandExitStatus(mError); + } + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + return ReadCommand::ReadNone(device); + } +}; + +class ReadAll : public ReadCommand +{ +public: + ReadAll(CredentialIssuerCommands * credsIssuerConfig) : ReadCommand("read-all", credsIssuerConfig) + { + AddArgument("cluster-ids", 0, UINT32_MAX, &mClusterIds, + "Comma-separated list of cluster ids to read from (e.g. \"6\" or \"8,0x201\").\n Allowed to be 0xFFFFFFFF to " + "indicate a wildcard cluster."); + AddArgument("attribute-ids", 0, UINT32_MAX, &mAttributeIds, + "Comma-separated list of attribute ids to read (e.g. \"0\" or \"1,0xFFFC,0xFFFD\").\n Allowed to be " + "0xFFFFFFFF to indicate a wildcard attribute."); + AddArgument("event-ids", 0, UINT32_MAX, &mEventIds, + "Comma-separated list of event ids to read (e.g. \"0\" or \"1,2,3\").\n Allowed to be " + "0xFFFFFFFF to indicate a wildcard event."); + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered, + "Boolean indicating whether to do a fabric-filtered read. Defaults to true."); + AddArgument("data-versions", 0, UINT32_MAX, &mDataVersions, + "Comma-separated list of data versions for the clusters being read."); + AddArgument("event-min", 0, UINT64_MAX, &mEventNumber); + ReadCommand::AddArguments(); + } + + ~ReadAll() {} + + void OnDone(chip::app::ReadClient * aReadClient) override + { + InteractionModelReports::CleanupReadClient(aReadClient); + SetCommandExitStatus(mError); + } + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + return ReadCommand::ReadAll(device, endpointIds, mClusterIds, mAttributeIds, mEventIds); + } + +private: + std::vector mClusterIds; + std::vector mAttributeIds; + std::vector mEventIds; +}; + +class SubscribeNone : public SubscribeCommand +{ +public: + SubscribeNone(CredentialIssuerCommands * credsIssuerConfig) : SubscribeCommand("subscribe-none", credsIssuerConfig) + { + AddArgument("min-interval", 0, UINT16_MAX, &mMinInterval, + "The requested minimum interval between reports. Sets MinIntervalFloor in the Subscribe Request."); + AddArgument("max-interval", 0, UINT16_MAX, &mMaxInterval, + "The requested maximum interval between reports. Sets MaxIntervalCeiling in the Subscribe Request."); + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered, + "Boolean indicating whether to do a fabric-filtered read. Defaults to true."); + AddArgument("event-min", 0, UINT64_MAX, &mEventNumber); + AddArgument("keepSubscriptions", 0, 1, &mKeepSubscriptions, + "false - Terminate existing subscriptions from initiator.\n true - Leave existing subscriptions in place."); + SubscribeCommand::AddArguments(true /* skipEndpoints */); + } + + ~SubscribeNone() {} + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + return SubscribeCommand::SubscribeNone(device); + } +}; + +class SubscribeAll : public SubscribeCommand +{ +public: + SubscribeAll(CredentialIssuerCommands * credsIssuerConfig) : SubscribeCommand("subscribe-all", credsIssuerConfig) + { + AddArgument("cluster-ids", 0, UINT32_MAX, &mClusterIds, + "Comma-separated list of cluster ids to read from (e.g. \"6\" or \"8,0x201\").\n Allowed to be 0xFFFFFFFF to " + "indicate a wildcard cluster."); + AddArgument("attribute-ids", 0, UINT32_MAX, &mAttributeIds, + "Comma-separated list of attribute ids to read (e.g. \"0\" or \"1,0xFFFC,0xFFFD\").\n Allowed to be " + "0xFFFFFFFF to indicate a wildcard attribute."); + AddArgument("event-ids", 0, UINT32_MAX, &mEventIds, + "Comma-separated list of event ids to read (e.g. \"0\" or \"1,2,3\").\n Allowed to be " + "0xFFFFFFFF to indicate a wildcard event."); + AddArgument("min-interval", 0, UINT16_MAX, &mMinInterval, + "The requested minimum interval between reports. Sets MinIntervalFloor in the Subscribe Request."); + AddArgument("max-interval", 0, UINT16_MAX, &mMaxInterval, + "The requested maximum interval between reports. Sets MaxIntervalCeiling in the Subscribe Request."); + AddArgument("fabric-filtered", 0, 1, &mFabricFiltered, + "Boolean indicating whether to do a fabric-filtered read. Defaults to true."); + AddArgument("event-min", 0, UINT64_MAX, &mEventNumber); + AddArgument("keepSubscriptions", 0, 1, &mKeepSubscriptions, + "false - Terminate existing subscriptions from initiator.\n true - Leave existing subscriptions in place."); + SubscribeCommand::AddArguments(); + } + + ~SubscribeAll() {} + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + SubscribeCommand::SetPeerLIT(IsPeerLIT()); + return SubscribeCommand::SubscribeAll(device, endpointIds, mClusterIds, mAttributeIds, mEventIds); + } + +private: + std::vector mClusterIds; + std::vector mAttributeIds; + std::vector mEventIds; +}; diff --git a/examples/fabric-admin/commands/clusters/SubscriptionsCommands.h b/examples/fabric-admin/commands/clusters/SubscriptionsCommands.h new file mode 100644 index 00000000000000..625e5a73245507 --- /dev/null +++ b/examples/fabric-admin/commands/clusters/SubscriptionsCommands.h @@ -0,0 +1,108 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include + +#include +#include + +class ShutdownSubscription : public CHIPCommand +{ +public: + ShutdownSubscription(CredentialIssuerCommands * credsIssuerConfig) : + CHIPCommand("shutdown-one", credsIssuerConfig, + "Shut down a single subscription, identified by its subscription id and target node id.") + { + AddArgument("subscription-id", 0, UINT32_MAX, &mSubscriptionId); + AddArgument("node-id", 0, UINT64_MAX, &mNodeId, + "The node id, scoped to the commissioner name the command is running under."); + } + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override + { + CHIP_ERROR err = chip::app::InteractionModelEngine::GetInstance()->ShutdownSubscription( + chip::ScopedNodeId(mNodeId, CurrentCommissioner().GetFabricIndex()), mSubscriptionId); + SetCommandExitStatus(err); + return CHIP_NO_ERROR; + } + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(10); } + +private: + chip::SubscriptionId mSubscriptionId; + chip::NodeId mNodeId; +}; + +class ShutdownSubscriptionsForNode : public CHIPCommand +{ +public: + ShutdownSubscriptionsForNode(CredentialIssuerCommands * credsIssuerConfig) : + CHIPCommand("shutdown-all-for-node", credsIssuerConfig, "Shut down all subscriptions targeting a given node.") + { + AddArgument("node-id", 0, UINT64_MAX, &mNodeId, + "The node id, scoped to the commissioner name the command is running under."); + } + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override + { + chip::app::InteractionModelEngine::GetInstance()->ShutdownSubscriptions(CurrentCommissioner().GetFabricIndex(), mNodeId); + + SetCommandExitStatus(CHIP_NO_ERROR); + return CHIP_NO_ERROR; + } + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(10); } + +private: + chip::NodeId mNodeId; +}; + +class ShutdownAllSubscriptions : public CHIPCommand +{ +public: + ShutdownAllSubscriptions(CredentialIssuerCommands * credsIssuerConfig) : + CHIPCommand("shutdown-all", credsIssuerConfig, "Shut down all subscriptions to all nodes.") + {} + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override + { + chip::app::InteractionModelEngine::GetInstance()->ShutdownAllSubscriptions(); + + SetCommandExitStatus(CHIP_NO_ERROR); + return CHIP_NO_ERROR; + } + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(10); } + +private: +}; + +void registerCommandsSubscriptions(Commands & commands, CredentialIssuerCommands * credsIssuerConfig) +{ + const char * clusterName = "Subscriptions"; + + commands_list clusterCommands = { + make_unique(credsIssuerConfig), // + make_unique(credsIssuerConfig), // + make_unique(credsIssuerConfig), // + }; + + commands.RegisterCommandSet(clusterName, clusterCommands, "Commands for shutting down subscriptions."); +} diff --git a/examples/fabric-admin/commands/clusters/WriteAttributeCommand.h b/examples/fabric-admin/commands/clusters/WriteAttributeCommand.h new file mode 100644 index 00000000000000..8424e95020f92e --- /dev/null +++ b/examples/fabric-admin/commands/clusters/WriteAttributeCommand.h @@ -0,0 +1,286 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include + +#include "DataModelLogger.h" +#include "ModelCommand.h" + +inline constexpr char kWriteCommandKey[] = "write"; +inline constexpr char kWriteByIdCommandKey[] = "write-by-id"; +inline constexpr char kForceWriteCommandKey[] = "force-write"; + +enum class WriteCommandType +{ + kWrite, // regular, writable attributes + kForceWrite, // forced writes, send a write command on something expected to fail +}; + +template > +class WriteAttribute : public InteractionModelWriter, public ModelCommand, public chip::app::WriteClient::Callback +{ +public: + WriteAttribute(CredentialIssuerCommands * credsIssuerConfig) : + InteractionModelWriter(this), ModelCommand(kWriteByIdCommandKey, credsIssuerConfig) + { + AddArgumentClusterIds(); + AddArgumentAttributeIds(); + AddArgumentAttributeValues(); + AddArguments(); + } + + WriteAttribute(chip::ClusterId clusterId, CredentialIssuerCommands * credsIssuerConfig) : + InteractionModelWriter(this), ModelCommand(kWriteByIdCommandKey, credsIssuerConfig), mClusterIds(1, clusterId) + { + AddArgumentAttributeIds(); + AddArgumentAttributeValues(); + AddArguments(); + } + + template + WriteAttribute(chip::ClusterId clusterId, const char * attributeName, minType minValue, maxType maxValue, + chip::AttributeId attributeId, WriteCommandType commandType, CredentialIssuerCommands * credsIssuerConfig) : + WriteAttribute(clusterId, attributeId, commandType, credsIssuerConfig) + { + AddArgumentAttributeName(attributeName); + AddArgumentAttributeValues(static_cast(minValue), static_cast(maxValue)); + AddArguments(); + } + + WriteAttribute(chip::ClusterId clusterId, const char * attributeName, float minValue, float maxValue, + chip::AttributeId attributeId, WriteCommandType commandType, CredentialIssuerCommands * credsIssuerConfig) : + WriteAttribute(clusterId, attributeId, commandType, credsIssuerConfig) + { + AddArgumentAttributeName(attributeName); + AddArgumentAttributeValues(minValue, maxValue); + AddArguments(); + } + + WriteAttribute(chip::ClusterId clusterId, const char * attributeName, double minValue, double maxValue, + chip::AttributeId attributeId, WriteCommandType commandType, CredentialIssuerCommands * credsIssuerConfig) : + WriteAttribute(clusterId, attributeId, commandType, credsIssuerConfig) + { + AddArgumentAttributeName(attributeName); + AddArgumentAttributeValues(minValue, maxValue); + AddArguments(); + } + + WriteAttribute(chip::ClusterId clusterId, const char * attributeName, chip::AttributeId attributeId, + WriteCommandType commandType, CredentialIssuerCommands * credsIssuerConfig) : + WriteAttribute(clusterId, attributeId, commandType, credsIssuerConfig) + { + AddArgumentAttributeName(attributeName); + AddArgumentAttributeValues(); + AddArguments(); + } + + WriteAttribute(chip::ClusterId clusterId, const char * attributeName, chip::AttributeId attributeId, + TypedComplexArgument & attributeParser, WriteCommandType commandType, + CredentialIssuerCommands * credsIssuerConfig) : + WriteAttribute(clusterId, attributeId, commandType, credsIssuerConfig) + { + AddArgumentAttributeName(attributeName); + AddArgumentAttributeValues(attributeParser); + AddArguments(); + } + + ~WriteAttribute() {} + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds) override + { + return WriteAttribute::SendCommand(device, endpointIds, mClusterIds, mAttributeIds, mAttributeValues); + } + + CHIP_ERROR SendGroupCommand(chip::GroupId groupId, chip::FabricIndex fabricIndex) override + { + return WriteAttribute::SendGroupCommand(groupId, fabricIndex, mClusterIds, mAttributeIds, mAttributeValues); + } + + /////////// WriteClient Callback Interface ///////// + void OnResponse(const chip::app::WriteClient * client, const chip::app::ConcreteDataAttributePath & path, + chip::app::StatusIB status) override + { + CHIP_ERROR error = status.ToChipError(); + if (CHIP_NO_ERROR != error) + { + LogErrorOnFailure(RemoteDataModelLogger::LogErrorAsJSON(path, status)); + + ChipLogError(NotSpecified, "Response Failure: %s", chip::ErrorStr(error)); + mError = error; + } + } + + void OnError(const chip::app::WriteClient * client, CHIP_ERROR error) override + { + LogErrorOnFailure(RemoteDataModelLogger::LogErrorAsJSON(error)); + + ChipLogProgress(NotSpecified, "Error: %s", chip::ErrorStr(error)); + mError = error; + } + + void OnDone(chip::app::WriteClient * client) override + { + InteractionModelWriter::Shutdown(); + SetCommandExitStatus(mError); + } + + CHIP_ERROR SendCommand(chip::DeviceProxy * device, std::vector endpointIds, + std::vector clusterIds, std::vector attributeIds, const T & values) + { + return InteractionModelWriter::WriteAttribute(device, endpointIds, clusterIds, attributeIds, values); + } + + CHIP_ERROR SendGroupCommand(chip::GroupId groupId, chip::FabricIndex fabricIndex, std::vector clusterIds, + std::vector attributeIds, const T & value) + { + ChipLogDetail(NotSpecified, "Sending Write Attribute to Group %u, on Fabric %x, for cluster %u with attributeId %u", + groupId, fabricIndex, clusterIds.at(0), attributeIds.at(0)); + chip::Optional dataVersion = chip::NullOptional; + if (mDataVersions.HasValue()) + { + dataVersion.SetValue(mDataVersions.Value().at(0)); + } + + return InteractionModelWriter::WriteGroupAttribute(groupId, fabricIndex, clusterIds.at(0), attributeIds.at(0), value, + dataVersion); + } + + void Shutdown() override + { + mError = CHIP_NO_ERROR; + ModelCommand::Shutdown(); + } + +protected: + WriteAttribute(const char * attributeName, CredentialIssuerCommands * credsIssuerConfig) : + InteractionModelWriter(this), ModelCommand(kWriteCommandKey, credsIssuerConfig) + { + // Subclasses are responsible for calling AddArguments. + } + + void AddArgumentClusterIds() + { + AddArgument("cluster-ids", 0, UINT32_MAX, &mClusterIds, + "Comma-separated list of cluster ids to write to (e.g. \"6\" or \"6,0x201\")."); + } + + void AddArgumentAttributeIds() + { + AddArgument("attribute-ids", 0, UINT32_MAX, &mAttributeIds, + "Comma-separated list of attribute ids to write (e.g. \"16385\" or \"16385,0x4002\")."); + } + + void AddArgumentAttributeName(const char * attributeName) + { + AddArgument("attribute-name", attributeName, "The attribute name to write."); + } + + template >::value, int> = 0> + static const char * GetAttributeValuesDescription() + { + return "Semicolon-separated list of attribute values to write. Each value is represented as follows, depending on the " + "type:\n" + " * struct: a JSON-encoded object, with field ids as keys.\n" + " * list: a JSON-encoded array of values.\n" + " * null: A literal null.\n" + " * boolean: A literal true or false.\n" + " * unsigned integer: One of:\n" + " a) The number directly, as decimal.\n" + " b) The number directly, as 0x followed by hex digits. (Only for the toplevel value, not inside structs or " + "lists.)\n" + " c) A string starting with \"u:\" followed by decimal digits\n" + " * signed integer: One of:\n" + " a) The number directly, if it's negative.\n" + " c) A string starting with \"s:\" followed by decimal digits\n" + " * single-precision float: A string starting with \"f:\" followed by the number.\n" + " * double-precision float: One of:\n" + " a) The number directly, if it's not an integer.\n" + " b) A string starting with \"d:\" followed by the number.\n" + " * octet string: A string starting with \"hex:\" followed by the hex encoding of the bytes.\n" + " * string: A string with the characters.\n" + "\n" + " Example values: '10;20', '10;\"u:20\"', '\"hex:aabbcc\";\"hello\"'."; + } + + static const char * GetTypedAttributeValuesDescription() { return "Comma-separated list of attribute values to write."; } + + template >::value, int> = 0> + static const char * GetAttributeValuesDescription() + { + return GetTypedAttributeValuesDescription(); + } + + template + void AddArgumentAttributeValues(minType minValue, maxType maxValue) + { + AddArgument("attribute-values", minValue, maxValue, &mAttributeValues, GetTypedAttributeValuesDescription()); + } + + void AddArgumentAttributeValues() { AddArgument("attribute-values", &mAttributeValues, GetAttributeValuesDescription()); } + + void AddArgumentAttributeValues(TypedComplexArgument & attributeParser) + { + attributeParser.SetArgument(&mAttributeValues); + AddArgument("attribute-values", &attributeParser, GetTypedAttributeValuesDescription()); + } + + void AddArguments() + { + AddArgument("timedInteractionTimeoutMs", 0, UINT16_MAX, &mTimedInteractionTimeoutMs, + "If provided, do a timed write with the given timed interaction timeout. See \"7.6.10. Timed Interaction\" in " + "the Matter specification."); + AddArgument("busyWaitForMs", 0, UINT16_MAX, &mBusyWaitForMs, + "If provided, block the main thread processing for the given time right after sending a command."); + AddArgument("data-version", 0, UINT32_MAX, &mDataVersions, + "Comma-separated list of data versions for the clusters being written."); + AddArgument("suppressResponse", 0, 1, &mSuppressResponse); + AddArgument("repeat-count", 1, UINT16_MAX, &mRepeatCount); + AddArgument("repeat-delay-ms", 0, UINT16_MAX, &mRepeatDelayInMs); + ModelCommand::AddArguments(); + } + +private: + // This constructor is private as it is not intended to be used from outside the class. + WriteAttribute(chip::ClusterId clusterId, chip::AttributeId attributeId, WriteCommandType commandType, + CredentialIssuerCommands * credsIssuerConfig) : + InteractionModelWriter(this), + ModelCommand(commandType == WriteCommandType::kWrite ? kWriteCommandKey : kForceWriteCommandKey, credsIssuerConfig), + mClusterIds(1, clusterId), mAttributeIds(1, attributeId) + {} + + std::vector mClusterIds; + std::vector mAttributeIds; + + CHIP_ERROR mError = CHIP_NO_ERROR; + T mAttributeValues; +}; + +template +class WriteAttributeAsComplex : public WriteAttribute +{ +public: + WriteAttributeAsComplex(chip::ClusterId clusterId, const char * attributeName, chip::AttributeId attributeId, + WriteCommandType commandType, CredentialIssuerCommands * credsIssuerConfig) : + WriteAttribute(clusterId, attributeName, attributeId, mAttributeParser, commandType, credsIssuerConfig) + {} + +private: + TypedComplexArgument mAttributeParser; +}; diff --git a/examples/fabric-admin/commands/common/CHIPCommand.cpp b/examples/fabric-admin/commands/common/CHIPCommand.cpp new file mode 100644 index 00000000000000..982c857d206136 --- /dev/null +++ b/examples/fabric-admin/commands/common/CHIPCommand.cpp @@ -0,0 +1,651 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "CHIPCommand.h" + +#include +#include +#include +#include +#include +#include +#include +#include + +#include + +#if CHIP_CONFIG_TRANSPORT_TRACE_ENABLED +#include "TraceDecoder.h" +#include "TraceHandlers.h" +#endif // CHIP_CONFIG_TRANSPORT_TRACE_ENABLED + +std::map> CHIPCommand::mCommissioners; +std::set CHIPCommand::sDeferredCleanups; + +using DeviceControllerFactory = chip::Controller::DeviceControllerFactory; + +constexpr chip::FabricId kIdentityNullFabricId = chip::kUndefinedFabricId; +constexpr chip::FabricId kIdentityAlphaFabricId = 1; +constexpr chip::FabricId kIdentityBetaFabricId = 2; +constexpr chip::FabricId kIdentityGammaFabricId = 3; +constexpr chip::FabricId kIdentityOtherFabricId = 4; +constexpr char kPAATrustStorePathVariable[] = "FABRICSYNC_PAA_TRUST_STORE_PATH"; +constexpr char kCDTrustStorePathVariable[] = "FABRICSYNC_CD_TRUST_STORE_PATH"; + +const chip::Credentials::AttestationTrustStore * CHIPCommand::sTrustStore = nullptr; +chip::Credentials::GroupDataProviderImpl CHIPCommand::sGroupDataProvider{ kMaxGroupsPerFabric, kMaxGroupKeysPerFabric }; +// All fabrics share the same ICD client storage. +chip::app::DefaultICDClientStorage CHIPCommand::sICDClientStorage; +chip::Crypto::RawKeySessionKeystore CHIPCommand::sSessionKeystore; +chip::app::DefaultCheckInDelegate CHIPCommand::sCheckInDelegate; +chip::app::CheckInHandler CHIPCommand::sCheckInHandler; + +namespace { + +CHIP_ERROR GetAttestationTrustStore(const char * paaTrustStorePath, const chip::Credentials::AttestationTrustStore ** trustStore) +{ + if (paaTrustStorePath == nullptr) + { + paaTrustStorePath = getenv(kPAATrustStorePathVariable); + } + + if (paaTrustStorePath == nullptr) + { + *trustStore = chip::Credentials::GetTestAttestationTrustStore(); + return CHIP_NO_ERROR; + } + + static chip::Credentials::FileAttestationTrustStore attestationTrustStore{ paaTrustStorePath }; + + if (paaTrustStorePath != nullptr && attestationTrustStore.paaCount() == 0) + { + ChipLogError(NotSpecified, "No PAAs found in path: %s", paaTrustStorePath); + ChipLogError(NotSpecified, + "Please specify a valid path containing trusted PAA certificates using " + "the argument [--paa-trust-store-path paa/file/path] " + "or environment variable [%s=paa/file/path]", + kPAATrustStorePathVariable); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + *trustStore = &attestationTrustStore; + return CHIP_NO_ERROR; +} + +} // namespace + +CHIP_ERROR CHIPCommand::MaybeSetUpStack() +{ + if (IsInteractive()) + { + return CHIP_NO_ERROR; + } + + StartTracing(); + +#if (CHIP_DEVICE_LAYER_TARGET_LINUX || CHIP_DEVICE_LAYER_TARGET_TIZEN) && CHIP_DEVICE_CONFIG_ENABLE_CHIPOBLE + // By default, Linux device is configured as a BLE peripheral while the controller needs a BLE central. + ReturnLogErrorOnFailure(chip::DeviceLayer::Internal::BLEMgrImpl().ConfigureBle(mBleAdapterId.ValueOr(0), true)); +#endif + + ReturnLogErrorOnFailure(mDefaultStorage.Init(nullptr, GetStorageDirectory().ValueOr(nullptr))); + ReturnLogErrorOnFailure(mOperationalKeystore.Init(&mDefaultStorage)); + ReturnLogErrorOnFailure(mOpCertStore.Init(&mDefaultStorage)); + + // fabric-admin uses a non-persistent keystore. + // ICD storage lifetime is currently tied to the fabric-admin's lifetime. Since fabric-admin interactive mode is currently used + // for ICD commissioning and check-in validation, this temporary storage meets the test requirements. + // TODO: Implement persistent ICD storage for the fabric-admin. + ReturnLogErrorOnFailure(sICDClientStorage.Init(&mDefaultStorage, &sSessionKeystore)); + + chip::Controller::FactoryInitParams factoryInitParams; + + factoryInitParams.fabricIndependentStorage = &mDefaultStorage; + factoryInitParams.operationalKeystore = &mOperationalKeystore; + factoryInitParams.opCertStore = &mOpCertStore; + factoryInitParams.enableServerInteractions = NeedsOperationalAdvertising(); + factoryInitParams.sessionKeystore = &sSessionKeystore; + + // Init group data provider that will be used for all group keys and IPKs for the + // fabric-admin-configured fabrics. This is OK to do once since the fabric tables + // and the DeviceControllerFactory all "share" in the same underlying data. + // Different commissioner implementations may want to use alternate implementations + // of GroupDataProvider for injection through factoryInitParams. + sGroupDataProvider.SetStorageDelegate(&mDefaultStorage); + sGroupDataProvider.SetSessionKeystore(factoryInitParams.sessionKeystore); + ReturnLogErrorOnFailure(sGroupDataProvider.Init()); + chip::Credentials::SetGroupDataProvider(&sGroupDataProvider); + factoryInitParams.groupDataProvider = &sGroupDataProvider; + + uint16_t port = mDefaultStorage.GetListenPort(); + if (port != 0) + { + // Make sure different commissioners run on different ports. + port = static_cast(port + CurrentCommissionerId()); + } + factoryInitParams.listenPort = port; + ReturnLogErrorOnFailure(DeviceControllerFactory::GetInstance().Init(factoryInitParams)); + + auto systemState = chip::Controller::DeviceControllerFactory::GetInstance().GetSystemState(); + VerifyOrReturnError(nullptr != systemState, CHIP_ERROR_INCORRECT_STATE); + + ReturnErrorOnFailure(GetAttestationTrustStore(mPaaTrustStorePath.ValueOr(nullptr), &sTrustStore)); + + auto engine = chip::app::InteractionModelEngine::GetInstance(); + VerifyOrReturnError(engine != nullptr, CHIP_ERROR_INCORRECT_STATE); + ReturnLogErrorOnFailure(sCheckInDelegate.Init(&sICDClientStorage, engine)); + ReturnLogErrorOnFailure(sCheckInHandler.Init(DeviceControllerFactory::GetInstance().GetSystemState()->ExchangeMgr(), + &sICDClientStorage, &sCheckInDelegate, engine)); + + CommissionerIdentity nullIdentity{ kIdentityNull, chip::kUndefinedNodeId }; + ReturnLogErrorOnFailure(InitializeCommissioner(nullIdentity, kIdentityNullFabricId)); + + // After initializing first commissioner, add the additional CD certs once + { + const char * cdTrustStorePath = mCDTrustStorePath.ValueOr(nullptr); + if (cdTrustStorePath == nullptr) + { + cdTrustStorePath = getenv(kCDTrustStorePathVariable); + } + + auto additionalCdCerts = + chip::Credentials::LoadAllX509DerCerts(cdTrustStorePath, chip::Credentials::CertificateValidationMode::kPublicKeyOnly); + if (cdTrustStorePath != nullptr && additionalCdCerts.size() == 0) + { + ChipLogError(NotSpecified, "Warning: no CD signing certs found in path: %s, only defaults will be used", + cdTrustStorePath); + ChipLogError(NotSpecified, + "Please specify a path containing trusted CD verifying key certificates using " + "the argument [--cd-trust-store-path cd/file/path] " + "or environment variable [%s=cd/file/path]", + kCDTrustStorePathVariable); + } + ReturnErrorOnFailure(mCredIssuerCmds->AddAdditionalCDVerifyingCerts(additionalCdCerts)); + } + bool allowTestCdSigningKey = !mOnlyAllowTrustedCdKeys.ValueOr(false); + mCredIssuerCmds->SetCredentialIssuerOption(CredentialIssuerCommands::CredentialIssuerOptions::kAllowTestCdSigningKey, + allowTestCdSigningKey); + + return CHIP_NO_ERROR; +} + +void CHIPCommand::MaybeTearDownStack() +{ + if (IsInteractive()) + { + return; + } + + // + // We can call DeviceController::Shutdown() safely without grabbing the stack lock + // since the CHIP thread and event queue have been stopped, preventing any thread + // races. + // + for (auto & commissioner : mCommissioners) + { + ShutdownCommissioner(commissioner.first); + } + + StopTracing(); +} + +CHIP_ERROR CHIPCommand::EnsureCommissionerForIdentity(std::string identity) +{ + chip::NodeId nodeId; + ReturnErrorOnFailure(GetIdentityNodeId(identity, &nodeId)); + CommissionerIdentity lookupKey{ identity, nodeId }; + if (mCommissioners.find(lookupKey) != mCommissioners.end()) + { + return CHIP_NO_ERROR; + } + + // Need to initialize the commissioner. + chip::FabricId fabricId; + if (identity == kIdentityAlpha) + { + fabricId = kIdentityAlphaFabricId; + } + else if (identity == kIdentityBeta) + { + fabricId = kIdentityBetaFabricId; + } + else if (identity == kIdentityGamma) + { + fabricId = kIdentityGammaFabricId; + } + else + { + fabricId = strtoull(identity.c_str(), nullptr, 0); + if (fabricId < kIdentityOtherFabricId) + { + ChipLogError(NotSpecified, "Invalid identity: %s", identity.c_str()); + return CHIP_ERROR_INVALID_ARGUMENT; + } + } + + return InitializeCommissioner(lookupKey, fabricId); +} + +CHIP_ERROR CHIPCommand::Run() +{ + ReturnErrorOnFailure(MaybeSetUpStack()); + + CHIP_ERROR err = StartWaiting(GetWaitDuration()); + + if (IsInteractive()) + { + bool timedOut; + // Give it 2 hours to run our cleanup; that should never get hit in practice. + CHIP_ERROR cleanupErr = RunOnMatterQueue(RunCommandCleanup, chip::System::Clock::Seconds16(7200), &timedOut); + VerifyOrDie(cleanupErr == CHIP_NO_ERROR); + VerifyOrDie(!timedOut); + } + else + { + CleanupAfterRun(); + } + + MaybeTearDownStack(); + + return err; +} + +void CHIPCommand::StartTracing() +{ + if (mTraceTo.HasValue()) + { + for (const auto & destination : mTraceTo.Value()) + { + mTracingSetup.EnableTracingFor(destination.c_str()); + } + } + +#if CHIP_CONFIG_TRANSPORT_TRACE_ENABLED + chip::trace::InitTrace(); + + if (mTraceFile.HasValue()) + { + chip::trace::AddTraceStream(new chip::trace::TraceStreamFile(mTraceFile.Value())); + } + else if (mTraceLog.HasValue() && mTraceLog.Value()) + { + chip::trace::AddTraceStream(new chip::trace::TraceStreamLog()); + } + + if (mTraceDecode.HasValue() && mTraceDecode.Value()) + { + chip::trace::TraceDecoderOptions options; + // The interaction model protocol is already logged, so just disable logging those. + options.mEnableProtocolInteractionModelResponse = false; + chip::trace::TraceDecoder * decoder = new chip::trace::TraceDecoder(); + decoder->SetOptions(options); + chip::trace::AddTraceStream(decoder); + } +#endif // CHIP_CONFIG_TRANSPORT_TRACE_ENABLED +} + +void CHIPCommand::StopTracing() +{ + mTracingSetup.StopTracing(); + +#if CHIP_CONFIG_TRANSPORT_TRACE_ENABLED + chip::trace::DeInitTrace(); +#endif // CHIP_CONFIG_TRANSPORT_TRACE_ENABLED +} + +void CHIPCommand::SetIdentity(const char * identity) +{ + std::string name = std::string(identity); + if (name.compare(kIdentityAlpha) != 0 && name.compare(kIdentityBeta) != 0 && name.compare(kIdentityGamma) != 0 && + name.compare(kIdentityNull) != 0 && strtoull(name.c_str(), nullptr, 0) < kIdentityOtherFabricId) + { + ChipLogError(NotSpecified, "Unknown commissioner name: %s. Supported names are [%s, %s, %s, 4, 5...]", name.c_str(), + kIdentityAlpha, kIdentityBeta, kIdentityGamma); + chipDie(); + } + + mCommissionerName.SetValue(const_cast(identity)); +} + +std::string CHIPCommand::GetIdentity() +{ + std::string name = mCommissionerName.HasValue() ? mCommissionerName.Value() : kIdentityAlpha; + if (name.compare(kIdentityAlpha) != 0 && name.compare(kIdentityBeta) != 0 && name.compare(kIdentityGamma) != 0 && + name.compare(kIdentityNull) != 0) + { + chip::FabricId fabricId = strtoull(name.c_str(), nullptr, 0); + if (fabricId >= kIdentityOtherFabricId) + { + // normalize name since it is used in persistent storage + + char s[24]; + sprintf(s, "%lx", fabricId); + + name = s; + } + else + { + ChipLogError(NotSpecified, "Unknown commissioner name: %s. Supported names are [%s, %s, %s, 4, 5...]", name.c_str(), + kIdentityAlpha, kIdentityBeta, kIdentityGamma); + chipDie(); + } + } + + return name; +} + +CHIP_ERROR CHIPCommand::GetIdentityNodeId(std::string identity, chip::NodeId * nodeId) +{ + if (mCommissionerNodeId.HasValue()) + { + *nodeId = mCommissionerNodeId.Value(); + return CHIP_NO_ERROR; + } + + if (identity == kIdentityNull) + { + *nodeId = chip::kUndefinedNodeId; + return CHIP_NO_ERROR; + } + + ReturnLogErrorOnFailure(mCommissionerStorage.Init(identity.c_str(), GetStorageDirectory().ValueOr(nullptr))); + + *nodeId = mCommissionerStorage.GetLocalNodeId(); + + return CHIP_NO_ERROR; +} + +CHIP_ERROR CHIPCommand::GetIdentityRootCertificate(std::string identity, chip::ByteSpan & span) +{ + if (identity == kIdentityNull) + { + return CHIP_ERROR_NOT_FOUND; + } + + chip::NodeId nodeId; + VerifyOrDie(GetIdentityNodeId(identity, &nodeId) == CHIP_NO_ERROR); + CommissionerIdentity lookupKey{ identity, nodeId }; + auto item = mCommissioners.find(lookupKey); + + span = chip::ByteSpan(item->first.mRCAC, item->first.mRCACLen); + return CHIP_NO_ERROR; +} + +chip::FabricId CHIPCommand::CurrentCommissionerId() +{ + chip::FabricId id; + + std::string name = GetIdentity(); + if (name.compare(kIdentityAlpha) == 0) + { + id = kIdentityAlphaFabricId; + } + else if (name.compare(kIdentityBeta) == 0) + { + id = kIdentityBetaFabricId; + } + else if (name.compare(kIdentityGamma) == 0) + { + id = kIdentityGammaFabricId; + } + else if (name.compare(kIdentityNull) == 0) + { + id = kIdentityNullFabricId; + } + else if ((id = strtoull(name.c_str(), nullptr, 0)) < kIdentityOtherFabricId) + { + VerifyOrDieWithMsg(false, NotSpecified, "Unknown commissioner name: %s. Supported names are [%s, %s, %s, 4, 5...]", + name.c_str(), kIdentityAlpha, kIdentityBeta, kIdentityGamma); + } + + return id; +} + +chip::Controller::DeviceCommissioner & CHIPCommand::CurrentCommissioner() +{ + return GetCommissioner(GetIdentity()); +} + +chip::Controller::DeviceCommissioner & CHIPCommand::GetCommissioner(std::string identity) +{ + // We don't have a great way to handle commissioner setup failures here. + // This only matters for commands (like TestCommand) that involve multiple + // identities. + VerifyOrDie(EnsureCommissionerForIdentity(identity) == CHIP_NO_ERROR); + + chip::NodeId nodeId; + VerifyOrDie(GetIdentityNodeId(identity, &nodeId) == CHIP_NO_ERROR); + CommissionerIdentity lookupKey{ identity, nodeId }; + auto item = mCommissioners.find(lookupKey); + VerifyOrDie(item != mCommissioners.end()); + return *item->second; +} + +void CHIPCommand::ShutdownCommissioner(const CommissionerIdentity & key) +{ + mCommissioners[key].get()->Shutdown(); +} + +CHIP_ERROR CHIPCommand::InitializeCommissioner(CommissionerIdentity & identity, chip::FabricId fabricId) +{ + std::unique_ptr commissioner = std::make_unique(); + chip::Controller::SetupParams commissionerParams; + + ReturnLogErrorOnFailure(mCredIssuerCmds->SetupDeviceAttestation(commissionerParams, sTrustStore)); + + chip::Crypto::P256Keypair ephemeralKey; + + if (fabricId != chip::kUndefinedFabricId) + { + + // TODO - OpCreds should only be generated for pairing command + // store the credentials in persistent storage, and + // generate when not available in the storage. + ReturnLogErrorOnFailure(mCommissionerStorage.Init(identity.mName.c_str(), GetStorageDirectory().ValueOr(nullptr))); + if (mUseMaxSizedCerts.HasValue()) + { + auto option = CredentialIssuerCommands::CredentialIssuerOptions::kMaximizeCertificateSizes; + mCredIssuerCmds->SetCredentialIssuerOption(option, mUseMaxSizedCerts.Value()); + } + + ReturnLogErrorOnFailure(mCredIssuerCmds->InitializeCredentialsIssuer(mCommissionerStorage)); + + chip::MutableByteSpan nocSpan(identity.mNOC); + chip::MutableByteSpan icacSpan(identity.mICAC); + chip::MutableByteSpan rcacSpan(identity.mRCAC); + + ReturnLogErrorOnFailure(ephemeralKey.Initialize(chip::Crypto::ECPKeyTarget::ECDSA)); + + ReturnLogErrorOnFailure(mCredIssuerCmds->GenerateControllerNOCChain(identity.mLocalNodeId, fabricId, + mCommissionerStorage.GetCommissionerCATs(), + ephemeralKey, rcacSpan, icacSpan, nocSpan)); + + identity.mRCACLen = rcacSpan.size(); + identity.mICACLen = icacSpan.size(); + identity.mNOCLen = nocSpan.size(); + + commissionerParams.operationalKeypair = &ephemeralKey; + commissionerParams.controllerRCAC = rcacSpan; + commissionerParams.controllerICAC = icacSpan; + commissionerParams.controllerNOC = nocSpan; + commissionerParams.permitMultiControllerFabrics = true; + commissionerParams.enableServerInteractions = NeedsOperationalAdvertising(); + } + + // TODO: Initialize IPK epoch key in ExampleOperationalCredentials issuer rather than relying on DefaultIpkValue + commissionerParams.operationalCredentialsDelegate = mCredIssuerCmds->GetCredentialIssuer(); + commissionerParams.controllerVendorId = mCommissionerVendorId.ValueOr(chip::VendorId::TestVendor1); + + ReturnLogErrorOnFailure(DeviceControllerFactory::GetInstance().SetupCommissioner(commissionerParams, *(commissioner.get()))); + + if (identity.mName != kIdentityNull) + { + // Initialize Group Data, including IPK + chip::FabricIndex fabricIndex = commissioner->GetFabricIndex(); + uint8_t compressed_fabric_id[sizeof(uint64_t)]; + chip::MutableByteSpan compressed_fabric_id_span(compressed_fabric_id); + ReturnLogErrorOnFailure(commissioner->GetCompressedFabricIdBytes(compressed_fabric_id_span)); + + ReturnLogErrorOnFailure(chip::GroupTesting::InitData(&sGroupDataProvider, fabricIndex, compressed_fabric_id_span)); + + // Configure the default IPK for all fabrics used by CHIP-tool. The epoch + // key is the same, but the derived keys will be different for each fabric. + chip::ByteSpan defaultIpk = chip::GroupTesting::DefaultIpkValue::GetDefaultIpk(); + ReturnLogErrorOnFailure( + chip::Credentials::SetSingleIpkEpochKey(&sGroupDataProvider, fabricIndex, defaultIpk, compressed_fabric_id_span)); + } + + CHIPCommand::sICDClientStorage.UpdateFabricList(commissioner->GetFabricIndex()); + + mCommissioners[identity] = std::move(commissioner); + + return CHIP_NO_ERROR; +} + +void CHIPCommand::RunQueuedCommand(intptr_t commandArg) +{ + auto * command = reinterpret_cast(commandArg); + CHIP_ERROR err = command->EnsureCommissionerForIdentity(command->GetIdentity()); + if (err == CHIP_NO_ERROR) + { + err = command->RunCommand(); + } + + if (err != CHIP_NO_ERROR) + { + command->SetCommandExitStatus(err); + } +} + +void CHIPCommand::RunCommandCleanup(intptr_t commandArg) +{ + auto * command = reinterpret_cast(commandArg); + command->CleanupAfterRun(); + command->StopWaiting(); +} + +void CHIPCommand::CleanupAfterRun() +{ + assertChipStackLockedByCurrentThread(); + bool deferCleanup = (IsInteractive() && DeferInteractiveCleanup()); + + Shutdown(); + + if (deferCleanup) + { + sDeferredCleanups.insert(this); + } + else + { + Cleanup(); + } +} + +CHIP_ERROR CHIPCommand::RunOnMatterQueue(MatterWorkCallback callback, chip::System::Clock::Timeout timeout, bool * timedOut) +{ + { + std::lock_guard lk(cvWaitingForResponseMutex); + mWaitingForResponse = true; + } + + auto err = chip::DeviceLayer::PlatformMgr().ScheduleWork(callback, reinterpret_cast(this)); + if (CHIP_NO_ERROR != err) + { + { + std::lock_guard lk(cvWaitingForResponseMutex); + mWaitingForResponse = false; + } + return err; + } + + auto waitingUntil = std::chrono::system_clock::now() + std::chrono::duration_cast(timeout); + { + std::unique_lock lk(cvWaitingForResponseMutex); + *timedOut = !cvWaitingForResponse.wait_until(lk, waitingUntil, [this]() { return !this->mWaitingForResponse; }); + } + + return CHIP_NO_ERROR; +} + +#if !CONFIG_USE_SEPARATE_EVENTLOOP +static void OnResponseTimeout(chip::System::Layer *, void * appState) +{ + (reinterpret_cast(appState))->SetCommandExitStatus(CHIP_ERROR_TIMEOUT); +} +#endif // !CONFIG_USE_SEPARATE_EVENTLOOP + +CHIP_ERROR CHIPCommand::StartWaiting(chip::System::Clock::Timeout duration) +{ +#if CONFIG_USE_SEPARATE_EVENTLOOP + // ServiceEvents() calls StartEventLoopTask(), which is paired with the StopEventLoopTask() below. + if (!IsInteractive()) + { + ReturnLogErrorOnFailure(DeviceControllerFactory::GetInstance().ServiceEvents()); + } + + if (duration.count() == 0) + { + mCommandExitStatus = RunCommand(); + } + else + { + bool timedOut; + CHIP_ERROR err = RunOnMatterQueue(RunQueuedCommand, duration, &timedOut); + if (CHIP_NO_ERROR != err) + { + return err; + } + if (timedOut) + { + mCommandExitStatus = CHIP_ERROR_TIMEOUT; + } + } + if (!IsInteractive()) + { + LogErrorOnFailure(chip::DeviceLayer::PlatformMgr().StopEventLoopTask()); + } +#else + chip::DeviceLayer::PlatformMgr().ScheduleWork(RunQueuedCommand, reinterpret_cast(this)); + ReturnLogErrorOnFailure(chip::DeviceLayer::SystemLayer().StartTimer(duration, OnResponseTimeout, this)); + chip::DeviceLayer::PlatformMgr().RunEventLoop(); +#endif // CONFIG_USE_SEPARATE_EVENTLOOP + + return mCommandExitStatus; +} + +void CHIPCommand::StopWaiting() +{ +#if CONFIG_USE_SEPARATE_EVENTLOOP + { + std::lock_guard lk(cvWaitingForResponseMutex); + mWaitingForResponse = false; + } + cvWaitingForResponse.notify_all(); +#else // CONFIG_USE_SEPARATE_EVENTLOOP + LogErrorOnFailure(chip::DeviceLayer::PlatformMgr().StopEventLoopTask()); +#endif // CONFIG_USE_SEPARATE_EVENTLOOP +} + +void CHIPCommand::ExecuteDeferredCleanups(intptr_t ignored) +{ + for (auto * cmd : sDeferredCleanups) + { + cmd->Cleanup(); + } + sDeferredCleanups.clear(); +} diff --git a/examples/fabric-admin/commands/common/CHIPCommand.h b/examples/fabric-admin/commands/common/CHIPCommand.h new file mode 100644 index 00000000000000..856a4daa48753d --- /dev/null +++ b/examples/fabric-admin/commands/common/CHIPCommand.h @@ -0,0 +1,264 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#ifdef CONFIG_USE_LOCAL_STORAGE +#include +#endif // CONFIG_USE_LOCAL_STORAGE + +#include "Command.h" + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include + +inline constexpr char kIdentityAlpha[] = "alpha"; +inline constexpr char kIdentityBeta[] = "beta"; +inline constexpr char kIdentityGamma[] = "gamma"; +// The null fabric commissioner is a commissioner that isn't on a fabric. +// This is a legal configuration in which the commissioner delegates +// operational communication and invocation of the commssioning complete +// command to a separate on-fabric administrator node. +// +// The null-fabric-commissioner identity is provided here to demonstrate the +// commissioner portion of such an architecture. The null-fabric-commissioner +// can carry a commissioning flow up until the point of operational channel +// (CASE) communcation. +inline constexpr char kIdentityNull[] = "null-fabric-commissioner"; + +class CHIPCommand : public Command +{ +public: + using ChipDeviceCommissioner = ::chip::Controller::DeviceCommissioner; + using ChipDeviceController = ::chip::Controller::DeviceController; + using IPAddress = ::chip::Inet::IPAddress; + using NodeId = ::chip::NodeId; + using PeerId = ::chip::PeerId; + using PeerAddress = ::chip::Transport::PeerAddress; + + static constexpr uint16_t kMaxGroupsPerFabric = 50; + static constexpr uint16_t kMaxGroupKeysPerFabric = 25; + + CHIPCommand(const char * commandName, CredentialIssuerCommands * credIssuerCmds, const char * helpText = nullptr) : + Command(commandName, helpText), mCredIssuerCmds(credIssuerCmds) + { + AddArgument("paa-trust-store-path", &mPaaTrustStorePath, + "Path to directory holding PAA certificate information. Can be absolute or relative to the current working " + "directory."); + AddArgument("cd-trust-store-path", &mCDTrustStorePath, + "Path to directory holding CD certificate information. Can be absolute or relative to the current working " + "directory."); + AddArgument("commissioner-name", &mCommissionerName, + "Name of fabric to use. Valid values are \"alpha\", \"beta\", \"gamma\", and integers greater than or equal to " + "4. The default if not specified is \"alpha\"."); + AddArgument("commissioner-nodeid", 0, UINT64_MAX, &mCommissionerNodeId, + "The node id to use for fabric-admin. If not provided, kTestControllerNodeId (112233, 0x1B669) will be used."); + AddArgument("use-max-sized-certs", 0, 1, &mUseMaxSizedCerts, + "Maximize the size of operational certificates. If not provided or 0 (\"false\"), normally sized operational " + "certificates are generated."); + AddArgument("only-allow-trusted-cd-keys", 0, 1, &mOnlyAllowTrustedCdKeys, + "Only allow trusted CD verifying keys (disallow test keys). If not provided or 0 (\"false\"), untrusted CD " + "verifying keys are allowed. If 1 (\"true\"), test keys are disallowed."); +#if CHIP_CONFIG_TRANSPORT_TRACE_ENABLED + AddArgument("trace_file", &mTraceFile); + AddArgument("trace_log", 0, 1, &mTraceLog); + AddArgument("trace_decode", 0, 1, &mTraceDecode); +#endif // CHIP_CONFIG_TRANSPORT_TRACE_ENABLED + AddArgument("trace-to", &mTraceTo, "Trace destinations, comma-separated (" SUPPORTED_COMMAND_LINE_TRACING_TARGETS ")"); + AddArgument("ble-adapter", 0, UINT16_MAX, &mBleAdapterId); + AddArgument("storage-directory", &mStorageDirectory, + "Directory to place fabric-admin's storage files in. Defaults to $TMPDIR, with fallback to /tmp"); + AddArgument( + "commissioner-vendor-id", 0, UINT16_MAX, &mCommissionerVendorId, + "The vendor id to use for fabric-admin. If not provided, chip::VendorId::TestVendor1 (65521, 0xFFF1) will be used."); + } + + /////////// Command Interface ///////// + CHIP_ERROR Run() override; + + void SetCommandExitStatus(CHIP_ERROR status) + { + mCommandExitStatus = status; + // In interactive mode the stack is not shut down once a command is ended. + // That means calling `ErrorStr(err)` from the main thread when command + // completion is signaled may race since `ErrorStr` uses a static sErrorStr + // buffer for computing the error string. Call it here instead. + if (IsInteractive() && CHIP_NO_ERROR != status) + { + ChipLogError(NotSpecified, "Run command failure: %s", chip::ErrorStr(status)); + } + StopWaiting(); + } + +protected: + // Will be called in a setting in which it's safe to touch the CHIP + // stack. The rules for Run() are as follows: + // + // 1) If error is returned, Run() must not call SetCommandExitStatus. + // 2) If success is returned Run() must either have called + // SetCommandExitStatus() or scheduled async work that will do that. + virtual CHIP_ERROR RunCommand() = 0; + + // Get the wait duration, in seconds, before the command times out. + virtual chip::System::Clock::Timeout GetWaitDuration() const = 0; + + // Shut down the command. After a Shutdown call the command object is ready + // to be used for another command invocation. + virtual void Shutdown() { ResetArguments(); } + + // Clean up any resources allocated by the command. Some commands may hold + // on to resources after Shutdown(), but Cleanup() will guarantee those are + // cleaned up. + virtual void Cleanup() {} + + // If true, skip calling Cleanup() when in interactive mode, so the command + // can keep doing work as needed. Cleanup() will be called when quitting + // interactive mode. This method will be called before Shutdown, so it can + // use member values that Shutdown will normally reset. + virtual bool DeferInteractiveCleanup() { return false; } + + // If true, the controller will be created with server capabilities enabled, + // such as advertising operational nodes over DNS-SD and accepting incoming + // CASE sessions. + virtual bool NeedsOperationalAdvertising() { return mAdvertiseOperational; } + + // Execute any deferred cleanups. Used when exiting interactive mode. + static void ExecuteDeferredCleanups(intptr_t ignored); + +#ifdef CONFIG_USE_LOCAL_STORAGE + PersistentStorage mDefaultStorage; + // TODO: It's pretty weird that we re-init mCommissionerStorage for every + // identity without shutting it down or something in between... + PersistentStorage mCommissionerStorage; +#endif // CONFIG_USE_LOCAL_STORAGE + chip::PersistentStorageOperationalKeystore mOperationalKeystore; + chip::Credentials::PersistentStorageOpCertStore mOpCertStore; + static chip::Crypto::RawKeySessionKeystore sSessionKeystore; + + static chip::Credentials::GroupDataProviderImpl sGroupDataProvider; + static chip::app::DefaultICDClientStorage sICDClientStorage; + static chip::app::DefaultCheckInDelegate sCheckInDelegate; + static chip::app::CheckInHandler sCheckInHandler; + CredentialIssuerCommands * mCredIssuerCmds; + + std::string GetIdentity(); + CHIP_ERROR GetIdentityNodeId(std::string identity, chip::NodeId * nodeId); + CHIP_ERROR GetIdentityRootCertificate(std::string identity, chip::ByteSpan & span); + void SetIdentity(const char * name); + + // This method returns the commissioner instance to be used for running the command. + // The default commissioner instance name is "alpha", but it can be overridden by passing + // --identity "instance name" when running a command. + ChipDeviceCommissioner & CurrentCommissioner(); + + ChipDeviceCommissioner & GetCommissioner(std::string identity); + +private: + CHIP_ERROR MaybeSetUpStack(); + void MaybeTearDownStack(); + + CHIP_ERROR EnsureCommissionerForIdentity(std::string identity); + + // Commissioners are keyed by name and local node id. + struct CommissionerIdentity + { + bool operator<(const CommissionerIdentity & other) const + { + return mName < other.mName || (mName == other.mName && mLocalNodeId < other.mLocalNodeId); + } + std::string mName; + chip::NodeId mLocalNodeId; + uint8_t mRCAC[chip::Controller::kMaxCHIPDERCertLength] = {}; + uint8_t mICAC[chip::Controller::kMaxCHIPDERCertLength] = {}; + uint8_t mNOC[chip::Controller::kMaxCHIPDERCertLength] = {}; + + size_t mRCACLen; + size_t mICACLen; + size_t mNOCLen; + }; + + // InitializeCommissioner uses various members, so can't be static. This is + // obviously a little odd, since the commissioners are then shared across + // multiple commands in interactive mode... + CHIP_ERROR InitializeCommissioner(CommissionerIdentity & identity, chip::FabricId fabricId); + void ShutdownCommissioner(const CommissionerIdentity & key); + chip::FabricId CurrentCommissionerId(); + + static std::map> mCommissioners; + static std::set sDeferredCleanups; + + chip::Optional mCommissionerName; + chip::Optional mCommissionerNodeId; + chip::Optional mCommissionerVendorId; + chip::Optional mBleAdapterId; + chip::Optional mPaaTrustStorePath; + chip::Optional mCDTrustStorePath; + chip::Optional mUseMaxSizedCerts; + chip::Optional mOnlyAllowTrustedCdKeys; + + // Cached trust store so commands other than the original startup command + // can spin up commissioners as needed. + static const chip::Credentials::AttestationTrustStore * sTrustStore; + + static void RunQueuedCommand(intptr_t commandArg); + typedef decltype(RunQueuedCommand) MatterWorkCallback; + static void RunCommandCleanup(intptr_t commandArg); + + // Do cleanup after a commmand is done running. Must happen with the + // Matter stack locked. + void CleanupAfterRun(); + + // Run the given callback on the Matter thread. Return whether we managed + // to successfully dispatch it to the Matter thread. If we did, *timedOut + // will be set to whether we timed out or whether our mWaitingForResponse + // got set to false by the callback itself. + CHIP_ERROR RunOnMatterQueue(MatterWorkCallback callback, chip::System::Clock::Timeout timeout, bool * timedOut); + + CHIP_ERROR mCommandExitStatus = CHIP_ERROR_INTERNAL; + + CHIP_ERROR StartWaiting(chip::System::Clock::Timeout seconds); + void StopWaiting(); + +#if CONFIG_USE_SEPARATE_EVENTLOOP + std::condition_variable cvWaitingForResponse; + std::mutex cvWaitingForResponseMutex; + bool mWaitingForResponse{ true }; +#endif // CONFIG_USE_SEPARATE_EVENTLOOP + + void StartTracing(); + void StopTracing(); + +#if CHIP_CONFIG_TRANSPORT_TRACE_ENABLED + chip::Optional mTraceFile; + chip::Optional mTraceLog; + chip::Optional mTraceDecode; +#endif // CHIP_CONFIG_TRANSPORT_TRACE_ENABLED + + chip::CommandLineApp::TracingSetup mTracingSetup; + chip::Optional> mTraceTo; +}; diff --git a/examples/fabric-admin/commands/common/Command.cpp b/examples/fabric-admin/commands/common/Command.cpp new file mode 100644 index 00000000000000..f0521a9c259a8b --- /dev/null +++ b/examples/fabric-admin/commands/common/Command.cpp @@ -0,0 +1,1088 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "Command.h" +#include "CustomStringPrefix.h" +#include "HexConversion.h" +#include "platform/PlatformManager.h" + +#include +#include +#include +#include +#include +#include + +#include // For INFINITY + +#include +#include +#include +#include +#include +#include +#include +#include + +constexpr char kOptionalArgumentPrefix[] = "--"; +constexpr size_t kOptionalArgumentPrefixLength = 2; + +bool Command::InitArguments(int argc, char ** argv) +{ + bool isValidCommand = false; + + size_t argvExtraArgsCount = (size_t) argc; + size_t mandatoryArgsCount = 0; + size_t optionalArgsCount = 0; + for (auto & arg : mArgs) + { + if (arg.isOptional()) + { + optionalArgsCount++; + } + else + { + mandatoryArgsCount++; + argvExtraArgsCount--; + } + } + + VerifyOrExit((size_t) (argc) >= mandatoryArgsCount && (argvExtraArgsCount == 0 || (argvExtraArgsCount && optionalArgsCount)), + ChipLogError(NotSpecified, "InitArgs: Wrong arguments number: %d instead of %u", argc, + static_cast(mandatoryArgsCount))); + + // Initialize mandatory arguments + for (size_t i = 0; i < mandatoryArgsCount; i++) + { + char * arg = argv[i]; + if (!InitArgument(i, arg)) + { + ExitNow(); + } + } + + // Initialize optional arguments + // Optional arguments expect a name and a value, so i is increased by 2 on every step. + for (size_t i = mandatoryArgsCount; i < (size_t) argc; i += 2) + { + bool found = false; + for (size_t j = mandatoryArgsCount; j < mandatoryArgsCount + optionalArgsCount; j++) + { + // optional arguments starts with kOptionalArgumentPrefix + if (strlen(argv[i]) <= kOptionalArgumentPrefixLength && + strncmp(argv[i], kOptionalArgumentPrefix, kOptionalArgumentPrefixLength) != 0) + { + continue; + } + + if (strcmp(argv[i] + strlen(kOptionalArgumentPrefix), mArgs[j].name) == 0) + { + found = true; + + VerifyOrExit((size_t) argc > (i + 1), + ChipLogError(NotSpecified, "InitArgs: Optional argument %s missing value.", argv[i])); + if (!InitArgument(j, argv[i + 1])) + { + ExitNow(); + } + } + } + VerifyOrExit(found, ChipLogError(NotSpecified, "InitArgs: Optional argument %s does not exist.", argv[i])); + } + + isValidCommand = true; + +exit: + return isValidCommand; +} + +static bool ParseAddressWithInterface(const char * addressString, Command::AddressWithInterface * address) +{ + struct addrinfo hints; + struct addrinfo * result; + int ret; + + memset(&hints, 0, sizeof(hints)); + hints.ai_family = AF_UNSPEC; + hints.ai_socktype = SOCK_DGRAM; + ret = getaddrinfo(addressString, nullptr, &hints, &result); + if (ret < 0) + { + ChipLogError(NotSpecified, "Invalid address: %s", addressString); + return false; + } + + if (result->ai_family == AF_INET6) + { + struct sockaddr_in6 * addr = reinterpret_cast(result->ai_addr); + address->address = ::chip::Inet::IPAddress::FromSockAddr(*addr); + address->interfaceId = ::chip::Inet::InterfaceId(addr->sin6_scope_id); + } +#if INET_CONFIG_ENABLE_IPV4 + else if (result->ai_family == AF_INET) + { + address->address = ::chip::Inet::IPAddress::FromSockAddr(*reinterpret_cast(result->ai_addr)); + address->interfaceId = chip::Inet::InterfaceId::Null(); + } +#endif // INET_CONFIG_ENABLE_IPV4 + else + { + ChipLogError(NotSpecified, "Unsupported address: %s", addressString); + return false; + } + + return true; +} + +// The callback should return whether the argument is valid, for the non-null +// case. It can't directly write to isValidArgument (by closing over it) +// because in the nullable-and-null case we need to do that from this function, +// via the return value. +template +bool HandleNullableOptional(Argument & arg, char * argValue, std::function callback) +{ + if (arg.isOptional()) + { + if (arg.isNullable()) + { + arg.value = &(reinterpret_cast> *>(arg.value)->Emplace()); + } + else + { + arg.value = &(reinterpret_cast *>(arg.value)->Emplace()); + } + } + + if (arg.isNullable()) + { + auto * nullable = reinterpret_cast *>(arg.value); + if (strcmp(argValue, "null") == 0) + { + nullable->SetNull(); + return true; + } + + arg.value = &(nullable->SetNonNull()); + } + + return callback(reinterpret_cast(arg.value)); +} + +bool Command::InitArgument(size_t argIndex, char * argValue) +{ + bool isValidArgument = false; + bool isHexNotation = strncmp(argValue, "0x", 2) == 0 || strncmp(argValue, "0X", 2) == 0; + + Argument arg = mArgs.at(argIndex); + + // We have two places where we handle uint8_t-typed args (actual int8u and + // bool args), so declare the handler function here so it can be reused. + auto uint8Handler = [&](uint8_t * value) { + // stringstream treats uint8_t as char, which is not what we want here. + uint16_t tmpValue; + std::stringstream ss; + isHexNotation ? (ss << std::hex << argValue) : (ss << argValue); + ss >> tmpValue; + if (chip::CanCastTo(tmpValue)) + { + *value = static_cast(tmpValue); + + uint64_t min = chip::CanCastTo(arg.min) ? static_cast(arg.min) : 0; + uint64_t max = arg.max; + return (!ss.fail() && ss.eof() && *value >= min && *value <= max); + } + + return false; + }; + + switch (arg.type) + { + case ArgumentType::Complex: { + // Complex arguments may be optional, but they are not currently supported via the class. + // Instead, they must be explicitly specified as optional using the kOptional flag, + // and the base TypedComplexArgument class is still referenced. + auto complexArgument = static_cast(arg.value); + return CHIP_NO_ERROR == complexArgument->Parse(arg.name, argValue); + } + + case ArgumentType::Custom: { + auto customArgument = static_cast(arg.value); + return CHIP_NO_ERROR == customArgument->Parse(arg.name, argValue); + } + + case ArgumentType::VectorString: { + std::vector vectorArgument; + + chip::StringSplitter splitter(argValue, ','); + chip::CharSpan value; + + while (splitter.Next(value)) + { + vectorArgument.push_back(std::string(value.data(), value.size())); + } + + if (arg.flags == Argument::kOptional) + { + auto argument = static_cast> *>(arg.value); + argument->SetValue(vectorArgument); + } + else + { + auto argument = static_cast *>(arg.value); + *argument = vectorArgument; + } + return true; + } + case ArgumentType::VectorBool: { + // Currently only chip::Optional> is supported. + if (arg.flags != Argument::kOptional) + { + return false; + } + + std::vector vectorArgument; + std::stringstream ss(argValue); + while (ss.good()) + { + std::string valueAsString; + getline(ss, valueAsString, ','); + + if (strcasecmp(valueAsString.c_str(), "true") == 0) + { + vectorArgument.push_back(true); + } + else if (strcasecmp(valueAsString.c_str(), "false") == 0) + { + vectorArgument.push_back(false); + } + else + { + return false; + } + } + + auto optionalArgument = static_cast> *>(arg.value); + optionalArgument->SetValue(vectorArgument); + return true; + } + + case ArgumentType::Vector16: + case ArgumentType::Vector32: { + std::vector values; + uint64_t min = chip::CanCastTo(arg.min) ? static_cast(arg.min) : 0; + uint64_t max = arg.max; + + std::stringstream ss(argValue); + while (ss.good()) + { + std::string valueAsString; + getline(ss, valueAsString, ','); + isHexNotation = strncmp(valueAsString.c_str(), "0x", 2) == 0 || strncmp(valueAsString.c_str(), "0X", 2) == 0; + + std::stringstream subss; + isHexNotation ? subss << std::hex << valueAsString : subss << valueAsString; + + uint64_t value; + subss >> value; + VerifyOrReturnError(!subss.fail() && subss.eof() && value >= min && value <= max, false); + values.push_back(value); + } + + if (arg.type == ArgumentType::Vector16) + { + auto vectorArgument = static_cast *>(arg.value); + for (uint64_t v : values) + { + vectorArgument->push_back(static_cast(v)); + } + } + else if (arg.type == ArgumentType::Vector32 && arg.flags != Argument::kOptional) + { + auto vectorArgument = static_cast *>(arg.value); + for (uint64_t v : values) + { + vectorArgument->push_back(static_cast(v)); + } + } + else if (arg.type == ArgumentType::Vector32 && arg.flags == Argument::kOptional) + { + std::vector vectorArgument; + for (uint64_t v : values) + { + vectorArgument.push_back(static_cast(v)); + } + + auto optionalArgument = static_cast> *>(arg.value); + optionalArgument->SetValue(vectorArgument); + } + else + { + return false; + } + + return true; + } + + case ArgumentType::VectorCustom: { + auto vectorArgument = static_cast *>(arg.value); + + std::stringstream ss(argValue); + while (ss.good()) + { + std::string valueAsString; + // By default the parameter separator is ";" in order to not collapse with the argument itself if it contains commas + // (e.g a struct argument with multiple fields). In case one needs to use ";" it can be overriden with the following + // environment variable. + static constexpr char kSeparatorVariable[] = "NotSpecified,_CUSTOM_ARGUMENTS_SEPARATOR"; + char * getenvSeparatorVariableResult = getenv(kSeparatorVariable); + getline(ss, valueAsString, getenvSeparatorVariableResult ? getenvSeparatorVariableResult[0] : ';'); + + CustomArgument * customArgument = new CustomArgument(); + vectorArgument->push_back(customArgument); + VerifyOrReturnError(CHIP_NO_ERROR == vectorArgument->back()->Parse(arg.name, valueAsString.c_str()), false); + } + + return true; + } + + case ArgumentType::String: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + *value = argValue; + return true; + }); + break; + } + + case ArgumentType::CharString: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + *value = chip::Span(argValue, strlen(argValue)); + return true; + }); + break; + } + + case ArgumentType::OctetString: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + // We support two ways to pass an octet string argument. If it happens + // to be all-ASCII, you can just pass it in. Otherwise you can pass in + // "hex:" followed by the hex-encoded bytes. + size_t argLen = strlen(argValue); + + if (IsHexString(argValue)) + { + // Hex-encoded. Decode it into a temporary buffer first, so if we + // run into errors we can do correct "argument is not valid" logging + // that actually shows the value that was passed in. After we + // determine it's valid, modify the passed-in value to hold the + // right bytes, so we don't need to worry about allocating storage + // for this somewhere else. This works because the hex + // representation is always longer than the octet string it encodes, + // so we have enough space in argValue for the decoded version. + chip::Platform::ScopedMemoryBuffer buffer; + + size_t octetCount; + CHIP_ERROR err = HexToBytes( + chip::CharSpan(argValue + kHexStringPrefixLen, argLen - kHexStringPrefixLen), + [&buffer](size_t allocSize) { + buffer.Calloc(allocSize); + return buffer.Get(); + }, + &octetCount); + if (err != CHIP_NO_ERROR) + { + return false; + } + + memcpy(argValue, buffer.Get(), octetCount); + *value = chip::ByteSpan(chip::Uint8::from_char(argValue), octetCount); + return true; + } + + // Just ASCII. Check for the "str:" prefix. + if (IsStrString(argValue)) + { + // Skip the prefix + argValue += kStrStringPrefixLen; + argLen -= kStrStringPrefixLen; + } + *value = chip::ByteSpan(chip::Uint8::from_char(argValue), argLen); + return true; + }); + break; + } + + case ArgumentType::Bool: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + // Start with checking for actual boolean values. + if (strcasecmp(argValue, "true") == 0) + { + *value = true; + return true; + } + + if (strcasecmp(argValue, "false") == 0) + { + *value = false; + return true; + } + + // For backwards compat, keep accepting 0 and 1 for now as synonyms + // for false and true. Since we set our min to 0 and max to 1 for + // booleans, calling uint8Handler does the right thing in terms of + // only allowing those two values. + uint8_t temp = 0; + if (!uint8Handler(&temp)) + { + return false; + } + *value = (temp == 1); + return true; + }); + break; + } + + case ArgumentType::Number_uint8: { + isValidArgument = HandleNullableOptional(arg, argValue, uint8Handler); + break; + } + + case ArgumentType::Number_uint16: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + std::stringstream ss; + isHexNotation ? ss << std::hex << argValue : ss << argValue; + ss >> *value; + + uint64_t min = chip::CanCastTo(arg.min) ? static_cast(arg.min) : 0; + uint64_t max = arg.max; + return (!ss.fail() && ss.eof() && *value >= min && *value <= max); + }); + break; + } + + case ArgumentType::Number_uint32: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + std::stringstream ss; + isHexNotation ? ss << std::hex << argValue : ss << argValue; + ss >> *value; + + uint64_t min = chip::CanCastTo(arg.min) ? static_cast(arg.min) : 0; + uint64_t max = arg.max; + return (!ss.fail() && ss.eof() && *value >= min && *value <= max); + }); + break; + } + + case ArgumentType::Number_uint64: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + std::stringstream ss; + isHexNotation ? ss << std::hex << argValue : ss << argValue; + ss >> *value; + + uint64_t min = chip::CanCastTo(arg.min) ? static_cast(arg.min) : 0; + uint64_t max = arg.max; + return (!ss.fail() && ss.eof() && *value >= min && *value <= max); + }); + break; + } + + case ArgumentType::Number_int8: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + // stringstream treats int8_t as char, which is not what we want here. + int16_t tmpValue; + std::stringstream ss; + isHexNotation ? ss << std::hex << argValue : ss << argValue; + ss >> tmpValue; + if (chip::CanCastTo(tmpValue)) + { + *value = static_cast(tmpValue); + + int64_t min = arg.min; + int64_t max = chip::CanCastTo(arg.max) ? static_cast(arg.max) : INT64_MAX; + return (!ss.fail() && ss.eof() && *value >= min && *value <= max); + } + + return false; + }); + break; + } + + case ArgumentType::Number_int16: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + std::stringstream ss; + isHexNotation ? ss << std::hex << argValue : ss << argValue; + ss >> *value; + + int64_t min = arg.min; + int64_t max = chip::CanCastTo(arg.max) ? static_cast(arg.max) : INT64_MAX; + return (!ss.fail() && ss.eof() && *value >= min && *value <= max); + }); + break; + } + + case ArgumentType::Number_int32: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + std::stringstream ss; + isHexNotation ? ss << std::hex << argValue : ss << argValue; + ss >> *value; + + int64_t min = arg.min; + int64_t max = chip::CanCastTo(arg.max) ? static_cast(arg.max) : INT64_MAX; + return (!ss.fail() && ss.eof() && *value >= min && *value <= max); + }); + break; + } + + case ArgumentType::Number_int64: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + std::stringstream ss; + isHexNotation ? ss << std::hex << argValue : ss << argValue; + ss >> *value; + + int64_t min = arg.min; + int64_t max = chip::CanCastTo(arg.max) ? static_cast(arg.max) : INT64_MAX; + return (!ss.fail() && ss.eof() && *value >= min && *value <= max); + }); + break; + } + + case ArgumentType::Float: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + if (strcmp(argValue, "Infinity") == 0) + { + *value = INFINITY; + return true; + } + + if (strcmp(argValue, "-Infinity") == 0) + { + *value = -INFINITY; + return true; + } + + std::stringstream ss; + ss << argValue; + ss >> *value; + return (!ss.fail() && ss.eof()); + }); + break; + } + + case ArgumentType::Double: { + isValidArgument = HandleNullableOptional(arg, argValue, [&](auto * value) { + if (strcmp(argValue, "Infinity") == 0) + { + *value = INFINITY; + return true; + } + + if (strcmp(argValue, "-Infinity") == 0) + { + *value = -INFINITY; + return true; + } + + std::stringstream ss; + ss << argValue; + ss >> *value; + return (!ss.fail() && ss.eof()); + }); + break; + } + + case ArgumentType::Address: { + isValidArgument = HandleNullableOptional( + arg, argValue, [&](auto * value) { return ParseAddressWithInterface(argValue, value); }); + break; + } + } + + if (!isValidArgument) + { + ChipLogError(NotSpecified, "InitArgs: Invalid argument %s: %s", arg.name, argValue); + } + + return isValidArgument; +} + +void Command::AddArgument(const char * name, const char * value, const char * desc) +{ + ReadOnlyGlobalCommandArgument arg; + arg.name = name; + arg.value = value; + arg.desc = desc; + + mReadOnlyGlobalCommandArgument.SetValue(arg); +} + +size_t Command::AddArgument(const char * name, char ** value, const char * desc, uint8_t flags) +{ + Argument arg; + arg.type = ArgumentType::String; + arg.name = name; + arg.value = reinterpret_cast(value); + arg.flags = flags; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, chip::CharSpan * value, const char * desc, uint8_t flags) +{ + Argument arg; + arg.type = ArgumentType::CharString; + arg.name = name; + arg.value = reinterpret_cast(value); + arg.flags = flags; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, chip::ByteSpan * value, const char * desc, uint8_t flags) +{ + Argument arg; + arg.type = ArgumentType::OctetString; + arg.name = name; + arg.value = reinterpret_cast(value); + arg.flags = flags; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, AddressWithInterface * out, const char * desc, uint8_t flags) +{ + Argument arg; + arg.type = ArgumentType::Address; + arg.name = name; + arg.value = reinterpret_cast(out); + arg.flags = flags; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, int64_t min, uint64_t max, std::vector * value, const char * desc) +{ + Argument arg; + arg.type = ArgumentType::Vector16; + arg.name = name; + arg.value = static_cast(value); + arg.min = min; + arg.max = max; + arg.flags = 0; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, int64_t min, uint64_t max, std::vector * value, const char * desc) +{ + Argument arg; + arg.type = ArgumentType::Vector32; + arg.name = name; + arg.value = static_cast(value); + arg.min = min; + arg.max = max; + arg.flags = 0; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, int64_t min, uint64_t max, chip::Optional> * value, + const char * desc) +{ + Argument arg; + arg.type = ArgumentType::Vector32; + arg.name = name; + arg.value = static_cast(value); + arg.min = min; + arg.max = max; + arg.flags = Argument::kOptional; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, int64_t min, uint64_t max, chip::Optional> * value, + const char * desc) +{ + Argument arg; + arg.type = ArgumentType::VectorBool; + arg.name = name; + arg.value = static_cast(value); + arg.min = min; + arg.max = max; + arg.flags = Argument::kOptional; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, ComplexArgument * value, const char * desc, uint8_t flags) +{ + Argument arg; + arg.type = ArgumentType::Complex; + arg.name = name; + arg.value = static_cast(value); + arg.flags = flags; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, CustomArgument * value, const char * desc) +{ + Argument arg; + arg.type = ArgumentType::Custom; + arg.name = name; + arg.value = const_cast(reinterpret_cast(value)); + arg.flags = 0; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, std::vector * value, const char * desc) +{ + Argument arg; + arg.type = ArgumentType::VectorCustom; + arg.name = name; + arg.value = static_cast(value); + arg.flags = 0; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, float min, float max, float * out, const char * desc, uint8_t flags) +{ + Argument arg; + arg.type = ArgumentType::Float; + arg.name = name; + arg.value = reinterpret_cast(out); + arg.flags = flags; + arg.desc = desc; + // Ignore min/max for now; they're always +-Infinity anyway. + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, double min, double max, double * out, const char * desc, uint8_t flags) +{ + Argument arg; + arg.type = ArgumentType::Double; + arg.name = name; + arg.value = reinterpret_cast(out); + arg.flags = flags; + arg.desc = desc; + // Ignore min/max for now; they're always +-Infinity anyway. + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, int64_t min, uint64_t max, void * out, ArgumentType type, const char * desc, + uint8_t flags) +{ + Argument arg; + arg.type = type; + arg.name = name; + arg.value = out; + arg.min = min; + arg.max = max; + arg.flags = flags; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, int64_t min, uint64_t max, void * out, const char * desc, uint8_t flags) +{ + Argument arg; + arg.type = ArgumentType::Number_uint8; + arg.name = name; + arg.value = out; + arg.min = min; + arg.max = max; + arg.flags = flags; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, std::vector * value, const char * desc) +{ + Argument arg; + arg.type = ArgumentType::VectorString; + arg.name = name; + arg.value = static_cast(value); + arg.flags = 0; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +size_t Command::AddArgument(const char * name, chip::Optional> * value, const char * desc) +{ + Argument arg; + arg.type = ArgumentType::VectorString; + arg.name = name; + arg.value = static_cast(value); + arg.flags = Argument::kOptional; + arg.desc = desc; + + return AddArgumentToList(std::move(arg)); +} + +const char * Command::GetArgumentName(size_t index) const +{ + if (index < mArgs.size()) + { + return mArgs.at(index).name; + } + + return nullptr; +} + +const char * Command::GetArgumentDescription(size_t index) const +{ + if (index < mArgs.size()) + { + return mArgs.at(index).desc; + } + + return nullptr; +} + +const char * Command::GetReadOnlyGlobalCommandArgument() const +{ + if (GetAttribute()) + { + return GetAttribute(); + } + + if (GetEvent()) + { + return GetEvent(); + } + + return nullptr; +} + +const char * Command::GetAttribute() const +{ + if (mReadOnlyGlobalCommandArgument.HasValue()) + { + return mReadOnlyGlobalCommandArgument.Value().value; + } + + return nullptr; +} + +const char * Command::GetEvent() const +{ + if (mReadOnlyGlobalCommandArgument.HasValue()) + { + return mReadOnlyGlobalCommandArgument.Value().value; + } + + return nullptr; +} + +size_t Command::AddArgumentToList(Argument && argument) +{ + if (argument.isOptional() || mArgs.empty() || !mArgs.back().isOptional()) + { + // Safe to just append. + mArgs.emplace_back(std::move(argument)); + return mArgs.size(); + } + + // We're inserting a non-optional arg but we already have something optional + // in the list. Insert before the first optional arg. + for (auto cur = mArgs.cbegin(), end = mArgs.cend(); cur != end; ++cur) + { + if ((*cur).isOptional()) + { + mArgs.emplace(cur, std::move(argument)); + return mArgs.size(); + } + } + + // Never reached. + VerifyOrDie(false); + return 0; +} + +namespace { +template +void ResetOptionalArg(const Argument & arg) +{ + VerifyOrDie(arg.isOptional()); + + if (arg.isNullable()) + { + reinterpret_cast> *>(arg.value)->ClearValue(); + } + else + { + reinterpret_cast *>(arg.value)->ClearValue(); + } +} +} // anonymous namespace + +void Command::ResetArguments() +{ + for (const auto & arg : mArgs) + { + const ArgumentType type = arg.type; + if (arg.isOptional()) + { + // Must always clean these up so they don't carry over to the next + // command invocation in interactive mode. + switch (type) + { + case ArgumentType::Complex: { + // Optional Complex arguments are not currently supported via the class. + // Instead, they must be explicitly specified as optional using the kOptional flag, + // and the base TypedComplexArgument class is referenced. + auto argument = static_cast(arg.value); + argument->Reset(); + break; + } + case ArgumentType::Custom: { + // No optional custom arguments so far. + VerifyOrDie(false); + break; + } + case ArgumentType::VectorString: { + ResetOptionalArg>(arg); + break; + } + case ArgumentType::VectorBool: { + ResetOptionalArg>(arg); + break; + } + case ArgumentType::Vector16: { + // No optional Vector16 arguments so far. + VerifyOrDie(false); + break; + } + case ArgumentType::Vector32: { + ResetOptionalArg>(arg); + break; + } + case ArgumentType::VectorCustom: { + // No optional VectorCustom arguments so far. + VerifyOrDie(false); + break; + } + case ArgumentType::String: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::CharString: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::OctetString: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Bool: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Number_uint8: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Number_uint16: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Number_uint32: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Number_uint64: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Number_int8: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Number_int16: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Number_int32: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Number_int64: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Float: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Double: { + ResetOptionalArg(arg); + break; + } + case ArgumentType::Address: { + ResetOptionalArg(arg); + break; + } + } + } + else + { + // Some non-optional arguments have state that needs to be cleaned + // up too. + if (type == ArgumentType::Vector16) + { + auto vectorArgument = static_cast *>(arg.value); + vectorArgument->clear(); + } + else if (type == ArgumentType::Vector32) + { + auto vectorArgument = static_cast *>(arg.value); + vectorArgument->clear(); + } + else if (type == ArgumentType::VectorCustom) + { + auto vectorArgument = static_cast *>(arg.value); + for (auto & customArgument : *vectorArgument) + { + delete customArgument; + } + vectorArgument->clear(); + } + else if (type == ArgumentType::Complex) + { + auto argument = static_cast(arg.value); + argument->Reset(); + } + } + } +} diff --git a/examples/fabric-admin/commands/common/Command.h b/examples/fabric-admin/commands/common/Command.h new file mode 100644 index 00000000000000..ec8b51dd87b8f4 --- /dev/null +++ b/examples/fabric-admin/commands/common/Command.h @@ -0,0 +1,307 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include +#include +#include +#include + +class Command; + +template +std::unique_ptr make_unique(Args &&... args) +{ + return std::unique_ptr(new T(std::forward(args)...)); +} + +struct movable_initializer_list +{ + movable_initializer_list(std::unique_ptr && in) : item(std::move(in)) {} + operator std::unique_ptr() const && { return std::move(item); } + mutable std::unique_ptr item; +}; + +typedef std::initializer_list commands_list; + +enum ArgumentType +{ + Number_uint8, + Number_uint16, + Number_uint32, + Number_uint64, + Number_int8, + Number_int16, + Number_int32, + Number_int64, + Float, + Double, + Bool, + String, + CharString, + OctetString, + Address, + Complex, + Custom, + VectorBool, + Vector16, + Vector32, + VectorCustom, + VectorString, // comma separated string items +}; + +struct Argument +{ + const char * name; + ArgumentType type; + int64_t min; + uint64_t max; + void * value; + uint8_t flags; + const char * desc; + + enum + { + kOptional = (1 << 0), + kNullable = (1 << 1), + }; + + bool isOptional() const { return flags & kOptional; } + bool isNullable() const { return flags & kNullable; } +}; + +struct ReadOnlyGlobalCommandArgument +{ + const char * name; + const char * value; + const char * desc; +}; + +class Command +{ +public: + struct AddressWithInterface + { + ::chip::Inet::IPAddress address; + ::chip::Inet::InterfaceId interfaceId; + }; + + Command(const char * commandName, const char * helpText = nullptr) : mName(commandName), mHelpText(helpText) {} + virtual ~Command() {} + + const char * GetName(void) const { return mName; } + const char * GetHelpText() const { return mHelpText; } + const char * GetReadOnlyGlobalCommandArgument(void) const; + const char * GetAttribute(void) const; + const char * GetEvent(void) const; + const char * GetArgumentName(size_t index) const; + const char * GetArgumentDescription(size_t index) const; + bool GetArgumentIsOptional(size_t index) const { return mArgs[index].isOptional(); } + size_t GetArgumentsCount(void) const { return mArgs.size(); } + + bool InitArguments(int argc, char ** argv); + void AddArgument(const char * name, const char * value, const char * desc = ""); + /** + * @brief + * Add a char string command argument + * + * @param name The name that will be displayed in the command help + * @param value A pointer to a `char *` where the argv value will be stored + * @param flags + * @param desc The description of the argument that will be displayed in the command help + * @returns The number of arguments currently added to the command + */ + size_t AddArgument(const char * name, char ** value, const char * desc = "", uint8_t flags = 0); + + /** + * Add an octet string command argument + */ + size_t AddArgument(const char * name, chip::ByteSpan * value, const char * desc = "", uint8_t flags = 0); + size_t AddArgument(const char * name, chip::Span * value, const char * desc = "", uint8_t flags = 0); + size_t AddArgument(const char * name, AddressWithInterface * out, const char * desc = "", uint8_t flags = 0); + // Optional Complex arguments are not currently supported via the class. + // Instead, they must be explicitly specified as optional using kOptional in the flags parameter, + // and the base TypedComplexArgument class is referenced. + size_t AddArgument(const char * name, ComplexArgument * value, const char * desc = "", uint8_t flags = 0); + size_t AddArgument(const char * name, CustomArgument * value, const char * desc = ""); + size_t AddArgument(const char * name, int64_t min, uint64_t max, bool * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Bool, desc, flags); + } + size_t AddArgument(const char * name, int64_t min, uint64_t max, int8_t * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Number_int8, desc, flags); + } + size_t AddArgument(const char * name, int64_t min, uint64_t max, int16_t * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Number_int16, desc, flags); + } + size_t AddArgument(const char * name, int64_t min, uint64_t max, int32_t * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Number_int32, desc, flags); + } + size_t AddArgument(const char * name, int64_t min, uint64_t max, int64_t * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Number_int64, desc, flags); + } + size_t AddArgument(const char * name, int64_t min, uint64_t max, uint8_t * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Number_uint8, desc, flags); + } + size_t AddArgument(const char * name, int64_t min, uint64_t max, uint16_t * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Number_uint16, desc, flags); + } + size_t AddArgument(const char * name, int64_t min, uint64_t max, uint32_t * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Number_uint32, desc, flags); + } + size_t AddArgument(const char * name, int64_t min, uint64_t max, uint64_t * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(out), Number_uint64, desc, flags); + } + + size_t AddArgument(const char * name, float min, float max, float * out, const char * desc = "", uint8_t flags = 0); + size_t AddArgument(const char * name, double min, double max, double * out, const char * desc = "", uint8_t flags = 0); + + size_t AddArgument(const char * name, int64_t min, uint64_t max, std::vector * value, const char * desc = ""); + size_t AddArgument(const char * name, int64_t min, uint64_t max, std::vector * value, const char * desc = ""); + size_t AddArgument(const char * name, std::vector * value, const char * desc = ""); + size_t AddArgument(const char * name, int64_t min, uint64_t max, chip::Optional> * value, + const char * desc = ""); + size_t AddArgument(const char * name, int64_t min, uint64_t max, chip::Optional> * value, + const char * desc = ""); + + template ::value>> + size_t AddArgument(const char * name, int64_t min, uint64_t max, T * out, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast *>(out), desc, flags); + } + + template + size_t AddArgument(const char * name, int64_t min, uint64_t max, chip::BitFlags * out, const char * desc = "", + uint8_t flags = 0) + { + // This is a terrible hack that relies on BitFlags only having the one + // mValue member. + return AddArgument(name, min, max, reinterpret_cast(out), desc, flags); + } + + template + size_t AddArgument(const char * name, int64_t min, uint64_t max, chip::BitMask * out, const char * desc = "", + uint8_t flags = 0) + { + // This is a terrible hack that relies on BitMask only having the one + // mValue member. + return AddArgument(name, min, max, reinterpret_cast(out), desc, flags); + } + + template + size_t AddArgument(const char * name, chip::Optional * value, const char * desc = "") + { + return AddArgument(name, reinterpret_cast(value), desc, Argument::kOptional); + } + + template + size_t AddArgument(const char * name, int64_t min, uint64_t max, chip::Optional * value, const char * desc = "") + { + return AddArgument(name, min, max, reinterpret_cast(value), desc, Argument::kOptional); + } + + template + size_t AddArgument(const char * name, chip::app::DataModel::Nullable * value, const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, reinterpret_cast(value), desc, flags | Argument::kNullable); + } + + template + size_t AddArgument(const char * name, int64_t min, uint64_t max, chip::app::DataModel::Nullable * value, + const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(value), desc, flags | Argument::kNullable); + } + + size_t AddArgument(const char * name, float min, float max, chip::app::DataModel::Nullable * value, + const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(value), desc, flags | Argument::kNullable); + } + + size_t AddArgument(const char * name, double min, double max, chip::app::DataModel::Nullable * value, + const char * desc = "", uint8_t flags = 0) + { + return AddArgument(name, min, max, reinterpret_cast(value), desc, flags | Argument::kNullable); + } + + size_t AddArgument(const char * name, std::vector * value, const char * desc); + size_t AddArgument(const char * name, chip::Optional> * value, const char * desc); + + void ResetArguments(); + + virtual CHIP_ERROR Run() = 0; + + bool IsInteractive() { return mIsInteractive; } + + CHIP_ERROR RunAsInteractive(const chip::Optional & interactiveStorageDirectory, bool advertiseOperational) + { + mStorageDirectory = interactiveStorageDirectory; + mIsInteractive = true; + mAdvertiseOperational = advertiseOperational; + return Run(); + } + + const chip::Optional & GetStorageDirectory() const { return mStorageDirectory; } + +protected: + // mStorageDirectory lives here so we can just set it in RunAsInteractive. + chip::Optional mStorageDirectory; + + // mAdvertiseOperational lives here so we can just set it in + // RunAsInteractive; it's only used by CHIPCommand. + bool mAdvertiseOperational = false; + +private: + bool InitArgument(size_t argIndex, char * argValue); + size_t AddArgument(const char * name, int64_t min, uint64_t max, void * out, ArgumentType type, const char * desc, + uint8_t flags); + size_t AddArgument(const char * name, int64_t min, uint64_t max, void * out, const char * desc, uint8_t flags); + + /** + * Add the Argument to our list. This preserves the property that all + * optional arguments come at the end of the list. + */ + size_t AddArgumentToList(Argument && argument); + + const char * mName = nullptr; + const char * mHelpText = nullptr; + bool mIsInteractive = false; + + chip::Optional mReadOnlyGlobalCommandArgument; + std::vector mArgs; +}; diff --git a/examples/fabric-admin/commands/common/Commands.cpp b/examples/fabric-admin/commands/common/Commands.cpp new file mode 100644 index 00000000000000..3742978443796a --- /dev/null +++ b/examples/fabric-admin/commands/common/Commands.cpp @@ -0,0 +1,703 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "Commands.h" + +#include "Command.h" + +#include +#include +#include +#include + +#include +#include +#include +#include +#include + +#include "../clusters/JsonParser.h" + +namespace { + +char kInteractiveModeName[] = ""; +constexpr size_t kInteractiveModeArgumentsMaxLength = 32; +constexpr char kOptionalArgumentPrefix[] = "--"; +constexpr char kJsonClusterKey[] = "cluster"; +constexpr char kJsonCommandKey[] = "command"; +constexpr char kJsonCommandSpecifierKey[] = "command_specifier"; +constexpr char kJsonArgumentsKey[] = "arguments"; + +#if !CHIP_DISABLE_PLATFORM_KVS +template +struct HasInitWithString +{ + template + static constexpr auto check(U *) -> typename std::is_same().Init("")), CHIP_ERROR>::type; + + template + static constexpr std::false_type check(...); + + typedef decltype(check>(nullptr)) type; + +public: + static constexpr bool value = type::value; +}; + +// Template so we can do conditional enabling +template ::value, int> = 0> +static void UseStorageDirectory(T & storageManagerImpl, const char * storageDirectory) +{ + std::string platformKVS = std::string(storageDirectory) + "/chip_tool_kvs"; + storageManagerImpl.Init(platformKVS.c_str()); +} + +template ::value, int> = 0> +static void UseStorageDirectory(T & storageManagerImpl, const char * storageDirectory) +{} +#endif // !CHIP_DISABLE_PLATFORM_KVS + +bool GetArgumentsFromJson(Command * command, Json::Value & value, bool optional, std::vector & outArgs) +{ + auto memberNames = value.getMemberNames(); + + std::vector args; + for (size_t i = 0; i < command->GetArgumentsCount(); i++) + { + auto argName = command->GetArgumentName(i); + auto memberNamesIterator = memberNames.begin(); + while (memberNamesIterator != memberNames.end()) + { + auto memberName = *memberNamesIterator; + if (strcasecmp(argName, memberName.c_str()) != 0) + { + memberNamesIterator++; + continue; + } + + if (command->GetArgumentIsOptional(i) != optional) + { + memberNamesIterator = memberNames.erase(memberNamesIterator); + continue; + } + + if (optional) + { + args.push_back(std::string(kOptionalArgumentPrefix) + argName); + } + + auto argValue = value[memberName].asString(); + args.push_back(std::move(argValue)); + memberNamesIterator = memberNames.erase(memberNamesIterator); + break; + } + } + + if (memberNames.size()) + { + auto memberName = memberNames.front(); + ChipLogError(NotSpecified, "The argument \"\%s\" is not supported.", memberName.c_str()); + return false; + } + + outArgs = args; + return true; +}; + +// Check for arguments with a starting '"' but no ending '"': those +// would indicate that people are using double-quoting, not single +// quoting, on arguments with spaces. +static void DetectAndLogMismatchedDoubleQuotes(int argc, char ** argv) +{ + for (int curArg = 0; curArg < argc; ++curArg) + { + char * arg = argv[curArg]; + if (!arg) + { + continue; + } + + auto len = strlen(arg); + if (len == 0) + { + continue; + } + + if (arg[0] == '"' && arg[len - 1] != '"') + { + ChipLogError(NotSpecified, + "Mismatched '\"' detected in argument: '%s'. Use single quotes to delimit arguments with spaces " + "in them: 'x y', not \"x y\".", + arg); + } + } +} + +} // namespace + +void Commands::Register(const char * commandSetName, commands_list commandsList, const char * helpText, bool isCluster) +{ + VerifyOrDieWithMsg(isCluster || helpText != nullptr, NotSpecified, "Non-cluster command sets must have help text"); + mCommandSets[commandSetName].isCluster = isCluster; + mCommandSets[commandSetName].helpText = helpText; + for (auto & command : commandsList) + { + mCommandSets[commandSetName].commands.push_back(std::move(command)); + } +} + +int Commands::Run(int argc, char ** argv) +{ + CHIP_ERROR err = CHIP_NO_ERROR; + + err = chip::Platform::MemoryInit(); + VerifyOrExit(err == CHIP_NO_ERROR, ChipLogError(Controller, "Init Memory failure: %s", chip::ErrorStr(err))); + +#ifdef CONFIG_USE_LOCAL_STORAGE + err = mStorage.Init(); + VerifyOrExit(err == CHIP_NO_ERROR, ChipLogError(Controller, "Init Storage failure: %s", chip::ErrorStr(err))); + + chip::Logging::SetLogFilter(mStorage.GetLoggingLevel()); +#endif // CONFIG_USE_LOCAL_STORAGE + + err = RunCommand(argc, argv); + VerifyOrExit(err == CHIP_NO_ERROR, ChipLogError(NotSpecified, "Run command failure: %s", chip::ErrorStr(err))); + +exit: + return (err == CHIP_NO_ERROR) ? EXIT_SUCCESS : EXIT_FAILURE; +} + +int Commands::RunInteractive(const char * command, const chip::Optional & storageDirectory, bool advertiseOperational) +{ + std::vector arguments; + VerifyOrReturnValue(DecodeArgumentsFromInteractiveMode(command, arguments), EXIT_FAILURE); + + if (arguments.size() > (kInteractiveModeArgumentsMaxLength - 1 /* for interactive mode name */)) + { + ChipLogError(NotSpecified, "Too many arguments. Ignoring."); + arguments.resize(kInteractiveModeArgumentsMaxLength - 1); + } + + int argc = 0; + char * argv[kInteractiveModeArgumentsMaxLength] = {}; + argv[argc++] = kInteractiveModeName; + + std::string commandStr; + for (auto & arg : arguments) + { + argv[argc] = new char[arg.size() + 1]; + strcpy(argv[argc++], arg.c_str()); + commandStr += arg; + commandStr += " "; + } + + ChipLogProgress(NotSpecified, "Command: %s", commandStr.c_str()); + auto err = RunCommand(argc, argv, true, storageDirectory, advertiseOperational); + + // Do not delete arg[0] + for (auto i = 1; i < argc; i++) + { + delete[] argv[i]; + } + + return (err == CHIP_NO_ERROR) ? EXIT_SUCCESS : EXIT_FAILURE; +} + +CHIP_ERROR Commands::RunCommand(int argc, char ** argv, bool interactive, + const chip::Optional & interactiveStorageDirectory, bool interactiveAdvertiseOperational) +{ + Command * command = nullptr; + + if (argc <= 1) + { + ChipLogError(NotSpecified, "Missing cluster or command set name"); + ShowCommandSets(argv[0]); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + auto commandSetIter = GetCommandSet(argv[1]); + if (commandSetIter == mCommandSets.end()) + { + ChipLogError(NotSpecified, "Unknown cluster or command set: %s", argv[1]); + ShowCommandSets(argv[0]); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + auto & commandList = commandSetIter->second.commands; + auto * helpText = commandSetIter->second.helpText; + + if (argc <= 2) + { + ChipLogError(NotSpecified, "Missing command name"); + ShowCommandSet(argv[0], argv[1], commandList, helpText); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + bool isGlobalCommand = IsGlobalCommand(argv[2]); + if (!isGlobalCommand) + { + command = GetCommand(commandList, argv[2]); + if (command == nullptr) + { + ChipLogError(NotSpecified, "Unknown command: %s", argv[2]); + ShowCommandSet(argv[0], argv[1], commandList, helpText); + return CHIP_ERROR_INVALID_ARGUMENT; + } + } + else if (IsEventCommand(argv[2])) + { + if (argc <= 3) + { + ChipLogError(NotSpecified, "Missing event name"); + ShowClusterEvents(argv[0], argv[1], argv[2], commandList); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + command = GetGlobalCommand(commandList, argv[2], argv[3]); + if (command == nullptr) + { + ChipLogError(NotSpecified, "Unknown event: %s", argv[3]); + ShowClusterEvents(argv[0], argv[1], argv[2], commandList); + return CHIP_ERROR_INVALID_ARGUMENT; + } + } + else + { + if (argc <= 3) + { + ChipLogError(NotSpecified, "Missing attribute name"); + ShowClusterAttributes(argv[0], argv[1], argv[2], commandList); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + command = GetGlobalCommand(commandList, argv[2], argv[3]); + if (command == nullptr) + { + ChipLogError(NotSpecified, "Unknown attribute: %s", argv[3]); + ShowClusterAttributes(argv[0], argv[1], argv[2], commandList); + return CHIP_ERROR_INVALID_ARGUMENT; + } + } + + int argumentsPosition = isGlobalCommand ? 4 : 3; + if (!command->InitArguments(argc - argumentsPosition, &argv[argumentsPosition])) + { + if (interactive) + { + DetectAndLogMismatchedDoubleQuotes(argc - argumentsPosition, &argv[argumentsPosition]); + } + ShowCommand(argv[0], argv[1], command); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + if (interactive) + { + return command->RunAsInteractive(interactiveStorageDirectory, interactiveAdvertiseOperational); + } + + // Now that the command is initialized, get our storage from it as needed + // and set up our loging level. +#ifdef CONFIG_USE_LOCAL_STORAGE + CHIP_ERROR err = mStorage.Init(nullptr, command->GetStorageDirectory().ValueOr(nullptr)); + if (err != CHIP_NO_ERROR) + { + ChipLogError(Controller, "Init Storage failure: %s", chip::ErrorStr(err)); + return err; + } + + chip::Logging::SetLogFilter(mStorage.GetLoggingLevel()); + +#if !CHIP_DISABLE_PLATFORM_KVS + UseStorageDirectory(chip::DeviceLayer::PersistedStorage::KeyValueStoreMgrImpl(), mStorage.GetDirectory()); +#endif // !CHIP_DISABLE_PLATFORM_KVS + +#endif // CONFIG_USE_LOCAL_STORAGE + + return command->Run(); +} + +Commands::CommandSetMap::iterator Commands::GetCommandSet(std::string commandSetName) +{ + for (auto & commandSet : mCommandSets) + { + std::string key(commandSet.first); + std::transform(key.begin(), key.end(), key.begin(), ::tolower); + if (key.compare(commandSetName) == 0) + { + return mCommandSets.find(commandSet.first); + } + } + + return mCommandSets.end(); +} + +Command * Commands::GetCommand(CommandsVector & commands, std::string commandName) +{ + for (auto & command : commands) + { + if (commandName.compare(command->GetName()) == 0) + { + return command.get(); + } + } + + return nullptr; +} + +Command * Commands::GetGlobalCommand(CommandsVector & commands, std::string commandName, std::string attributeName) +{ + for (auto & command : commands) + { + if (commandName.compare(command->GetName()) == 0 && attributeName.compare(command->GetAttribute()) == 0) + { + return command.get(); + } + } + + return nullptr; +} + +bool Commands::IsAttributeCommand(std::string commandName) const +{ + return commandName.compare("read") == 0 || commandName.compare("write") == 0 || commandName.compare("force-write") == 0 || + commandName.compare("subscribe") == 0; +} + +bool Commands::IsEventCommand(std::string commandName) const +{ + return commandName.compare("read-event") == 0 || commandName.compare("subscribe-event") == 0; +} + +bool Commands::IsGlobalCommand(std::string commandName) const +{ + return IsAttributeCommand(commandName) || IsEventCommand(commandName); +} + +void Commands::ShowCommandSetOverview(std::string commandSetName, const CommandSet & commandSet) +{ + std::transform(commandSetName.begin(), commandSetName.end(), commandSetName.begin(), + [](unsigned char c) { return std::tolower(c); }); + fprintf(stderr, " | * %-82s|\n", commandSetName.c_str()); + ShowHelpText(commandSet.helpText); +} + +void Commands::ShowCommandSets(std::string executable) +{ + fprintf(stderr, "Usage:\n"); + fprintf(stderr, " %s cluster_name command_name [param1 param2 ...]\n", executable.c_str()); + fprintf(stderr, "or:\n"); + fprintf(stderr, " %s command_set_name command_name [param1 param2 ...]\n", executable.c_str()); + fprintf(stderr, "\n"); + // Table of clusters + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + fprintf(stderr, " | Clusters: |\n"); + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + for (auto & commandSet : mCommandSets) + { + if (commandSet.second.isCluster) + { + ShowCommandSetOverview(commandSet.first, commandSet.second); + } + } + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + fprintf(stderr, "\n"); + + // Table of command sets + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + fprintf(stderr, " | Command sets: |\n"); + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + for (auto & commandSet : mCommandSets) + { + if (!commandSet.second.isCluster) + { + ShowCommandSetOverview(commandSet.first, commandSet.second); + } + } + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); +} + +void Commands::ShowCommandSet(std::string executable, std::string commandSetName, CommandsVector & commands, const char * helpText) +{ + fprintf(stderr, "Usage:\n"); + fprintf(stderr, " %s %s command_name [param1 param2 ...]\n", executable.c_str(), commandSetName.c_str()); + + if (helpText) + { + fprintf(stderr, "\n%s\n", helpText); + } + + fprintf(stderr, "\n"); + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + fprintf(stderr, " | Commands: |\n"); + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + bool readCommand = false; + bool writeCommand = false; + bool writeOverrideCommand = false; + bool subscribeCommand = false; + bool readEventCommand = false; + bool subscribeEventCommand = false; + for (auto & command : commands) + { + bool shouldPrint = true; + + if (IsGlobalCommand(command->GetName())) + { + if (strcmp(command->GetName(), "read") == 0 && !readCommand) + { + readCommand = true; + } + else if (strcmp(command->GetName(), "write") == 0 && !writeCommand) + { + writeCommand = true; + } + else if (strcmp(command->GetName(), "force-write") == 0 && !writeOverrideCommand) + { + writeOverrideCommand = true; + } + else if (strcmp(command->GetName(), "subscribe") == 0 && !subscribeCommand) + { + subscribeCommand = true; + } + else if (strcmp(command->GetName(), "read-event") == 0 && !readEventCommand) + { + readEventCommand = true; + } + else if (strcmp(command->GetName(), "subscribe-event") == 0 && !subscribeEventCommand) + { + subscribeEventCommand = true; + } + else + { + shouldPrint = false; + } + } + + if (shouldPrint) + { + fprintf(stderr, " | * %-82s|\n", command->GetName()); + ShowHelpText(command->GetHelpText()); + } + } + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); +} + +void Commands::ShowClusterAttributes(std::string executable, std::string clusterName, std::string commandName, + CommandsVector & commands) +{ + fprintf(stderr, "Usage:\n"); + fprintf(stderr, " %s %s %s attribute-name [param1 param2 ...]\n", executable.c_str(), clusterName.c_str(), + commandName.c_str()); + fprintf(stderr, "\n"); + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + fprintf(stderr, " | Attributes: |\n"); + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + for (auto & command : commands) + { + if (commandName.compare(command->GetName()) == 0) + { + fprintf(stderr, " | * %-82s|\n", command->GetAttribute()); + } + } + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); +} + +void Commands::ShowClusterEvents(std::string executable, std::string clusterName, std::string commandName, + CommandsVector & commands) +{ + fprintf(stderr, "Usage:\n"); + fprintf(stderr, " %s %s %s event-name [param1 param2 ...]\n", executable.c_str(), clusterName.c_str(), commandName.c_str()); + fprintf(stderr, "\n"); + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + fprintf(stderr, " | Events: |\n"); + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); + for (auto & command : commands) + { + if (commandName.compare(command->GetName()) == 0) + { + fprintf(stderr, " | * %-82s|\n", command->GetEvent()); + } + } + fprintf(stderr, " +-------------------------------------------------------------------------------------+\n"); +} + +void Commands::ShowCommand(std::string executable, std::string clusterName, Command * command) +{ + fprintf(stderr, "Usage:\n"); + + std::string arguments; + std::string description; + arguments += command->GetName(); + + if (command->GetReadOnlyGlobalCommandArgument()) + { + arguments += ' '; + arguments += command->GetReadOnlyGlobalCommandArgument(); + } + + size_t argumentsCount = command->GetArgumentsCount(); + for (size_t i = 0; i < argumentsCount; i++) + { + std::string arg; + bool isOptional = command->GetArgumentIsOptional(i); + if (isOptional) + { + arg += "[--"; + } + arg += command->GetArgumentName(i); + if (isOptional) + { + arg += "]"; + } + arguments += " "; + arguments += arg; + + const char * argDescription = command->GetArgumentDescription(i); + if ((argDescription != nullptr) && (strlen(argDescription) > 0)) + { + description += "\n"; + description += arg; + description += ":\n "; + description += argDescription; + description += "\n"; + } + } + fprintf(stderr, " %s %s %s\n", executable.c_str(), clusterName.c_str(), arguments.c_str()); + + if (command->GetHelpText()) + { + fprintf(stderr, "\n%s\n", command->GetHelpText()); + } + + if (description.size() > 0) + { + fprintf(stderr, "%s\n", description.c_str()); + } +} + +bool Commands::DecodeArgumentsFromInteractiveMode(const char * command, std::vector & args) +{ + // Remote clients may not know the ordering of arguments, so instead of a strict ordering arguments can + // be passed in as a json payload encoded in base64 and are reordered on the fly. + return IsJsonString(command) ? DecodeArgumentsFromBase64EncodedJson(command, args) + : DecodeArgumentsFromStringStream(command, args); +} + +bool Commands::DecodeArgumentsFromBase64EncodedJson(const char * json, std::vector & args) +{ + Json::Value jsonValue; + bool parsed = JsonParser::ParseCustomArgument(json, json + kJsonStringPrefixLen, jsonValue); + VerifyOrReturnValue(parsed, false, ChipLogError(NotSpecified, "Error while parsing json.")); + VerifyOrReturnValue(jsonValue.isObject(), false, ChipLogError(NotSpecified, "Unexpected json type.")); + VerifyOrReturnValue(jsonValue.isMember(kJsonClusterKey), false, + ChipLogError(NotSpecified, "'%s' key not found in json.", kJsonClusterKey)); + VerifyOrReturnValue(jsonValue.isMember(kJsonCommandKey), false, + ChipLogError(NotSpecified, "'%s' key not found in json.", kJsonCommandKey)); + VerifyOrReturnValue(jsonValue.isMember(kJsonArgumentsKey), false, + ChipLogError(NotSpecified, "'%s' key not found in json.", kJsonArgumentsKey)); + VerifyOrReturnValue(IsBase64String(jsonValue[kJsonArgumentsKey].asString().c_str()), false, + ChipLogError(NotSpecified, "'arguments' is not a base64 string.")); + + auto clusterName = jsonValue[kJsonClusterKey].asString(); + auto commandName = jsonValue[kJsonCommandKey].asString(); + auto arguments = jsonValue[kJsonArgumentsKey].asString(); + + auto clusterIter = GetCommandSet(clusterName); + VerifyOrReturnValue(clusterIter != mCommandSets.end(), false, + ChipLogError(NotSpecified, "Cluster '%s' is not supported.", clusterName.c_str())); + + auto & commandList = clusterIter->second.commands; + + auto command = GetCommand(commandList, commandName); + + if (jsonValue.isMember(kJsonCommandSpecifierKey) && IsGlobalCommand(commandName)) + { + auto commandSpecifierName = jsonValue[kJsonCommandSpecifierKey].asString(); + command = GetGlobalCommand(commandList, commandName, commandSpecifierName); + } + VerifyOrReturnValue(nullptr != command, false, ChipLogError(NotSpecified, "Unknown command.")); + + auto encodedData = arguments.c_str(); + encodedData += kBase64StringPrefixLen; + + size_t encodedDataSize = strlen(encodedData); + size_t expectedMaxDecodedSize = BASE64_MAX_DECODED_LEN(encodedDataSize); + + chip::Platform::ScopedMemoryBuffer decodedData; + VerifyOrReturnValue(decodedData.Calloc(expectedMaxDecodedSize + 1 /* for null */), false); + + size_t decodedDataSize = chip::Base64Decode(encodedData, static_cast(encodedDataSize), decodedData.Get()); + VerifyOrReturnValue(decodedDataSize != 0, false, ChipLogError(NotSpecified, "Error while decoding base64 data.")); + + decodedData.Get()[decodedDataSize] = '\0'; + + Json::Value jsonArguments; + bool parsedArguments = JsonParser::ParseCustomArgument(encodedData, chip::Uint8::to_char(decodedData.Get()), jsonArguments); + VerifyOrReturnValue(parsedArguments, false, ChipLogError(NotSpecified, "Error while parsing json.")); + VerifyOrReturnValue(jsonArguments.isObject(), false, ChipLogError(NotSpecified, "Unexpected json type, expects and object.")); + + std::vector mandatoryArguments; + std::vector optionalArguments; + VerifyOrReturnValue(GetArgumentsFromJson(command, jsonArguments, false /* addOptional */, mandatoryArguments), false); + VerifyOrReturnValue(GetArgumentsFromJson(command, jsonArguments, true /* addOptional */, optionalArguments), false); + + args.push_back(std::move(clusterName)); + args.push_back(std::move(commandName)); + if (jsonValue.isMember(kJsonCommandSpecifierKey)) + { + auto commandSpecifierName = jsonValue[kJsonCommandSpecifierKey].asString(); + args.push_back(std::move(commandSpecifierName)); + } + args.insert(args.end(), mandatoryArguments.begin(), mandatoryArguments.end()); + args.insert(args.end(), optionalArguments.begin(), optionalArguments.end()); + + return true; +} + +bool Commands::DecodeArgumentsFromStringStream(const char * command, std::vector & args) +{ + std::string arg; + std::stringstream ss(command); + while (ss >> std::quoted(arg, '\'')) + { + args.push_back(std::move(arg)); + } + + return true; +} + +void Commands::ShowHelpText(const char * helpText) +{ + if (helpText == nullptr) + { + return; + } + + // We leave 82 chars for command/cluster names. The help text starts + // two chars further to the right, so there are 80 chars left + // for it. + if (strlen(helpText) > 80) + { + // Add "..." at the end to indicate truncation, and only + // show the first 77 chars, since that's what will fit. + fprintf(stderr, " | - %.77s...|\n", helpText); + } + else + { + fprintf(stderr, " | - %-80s|\n", helpText); + } +} diff --git a/examples/fabric-admin/commands/common/Commands.h b/examples/fabric-admin/commands/common/Commands.h new file mode 100644 index 00000000000000..8638ededcb3b8c --- /dev/null +++ b/examples/fabric-admin/commands/common/Commands.h @@ -0,0 +1,90 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#ifdef CONFIG_USE_LOCAL_STORAGE +#include +#endif // CONFIG_USE_LOCAL_STORAGE + +#include "Command.h" +#include +#include + +class Commands +{ +public: + using CommandsVector = ::std::vector>; + + void RegisterCluster(const char * clusterName, commands_list commandsList) + { + Register(clusterName, commandsList, nullptr, true); + } + // Command sets represent fabric-admin functionality that is not actually + // XML-defined clusters. All command sets should have help text explaining + // what sort of commands one should expect to find in the set. + void RegisterCommandSet(const char * commandSetName, commands_list commandsList, const char * helpText) + { + Register(commandSetName, commandsList, helpText, false); + } + int Run(int argc, char ** argv); + int RunInteractive(const char * command, const chip::Optional & storageDirectory, bool advertiseOperational); + +private: + struct CommandSet + { + CommandsVector commands; + bool isCluster = false; + const char * helpText = nullptr; + }; + // The tuple contains the commands, whether it's a synthetic cluster, and + // the help text for the cluster (which may be null). + using CommandSetMap = std::map; + + CHIP_ERROR RunCommand(int argc, char ** argv, bool interactive = false, + const chip::Optional & interactiveStorageDirectory = chip::NullOptional, + bool interactiveAdvertiseOperational = false); + + CommandSetMap::iterator GetCommandSet(std::string commandSetName); + Command * GetCommand(CommandsVector & commands, std::string commandName); + Command * GetGlobalCommand(CommandsVector & commands, std::string commandName, std::string attributeName); + bool IsAttributeCommand(std::string commandName) const; + bool IsEventCommand(std::string commandName) const; + bool IsGlobalCommand(std::string commandName) const; + + void ShowCommandSets(std::string executable); + static void ShowCommandSetOverview(std::string commandSetName, const CommandSet & commandSet); + void ShowCommandSet(std::string executable, std::string commandSetName, CommandsVector & commands, const char * helpText); + void ShowClusterAttributes(std::string executable, std::string clusterName, std::string commandName, CommandsVector & commands); + void ShowClusterEvents(std::string executable, std::string clusterName, std::string commandName, CommandsVector & commands); + void ShowCommand(std::string executable, std::string clusterName, Command * command); + + bool DecodeArgumentsFromInteractiveMode(const char * command, std::vector & args); + bool DecodeArgumentsFromBase64EncodedJson(const char * encodedData, std::vector & args); + bool DecodeArgumentsFromStringStream(const char * command, std::vector & args); + + // helpText may be null, in which case it's not shown. + static void ShowHelpText(const char * helpText); + + void Register(const char * commandSetName, commands_list commandsList, const char * helpText, bool isCluster); + + CommandSetMap mCommandSets; +#ifdef CONFIG_USE_LOCAL_STORAGE + PersistentStorage mStorage; +#endif // CONFIG_USE_LOCAL_STORAGE +}; diff --git a/examples/fabric-admin/commands/common/CredentialIssuerCommands.h b/examples/fabric-admin/commands/common/CredentialIssuerCommands.h new file mode 100644 index 00000000000000..c36948fe69c992 --- /dev/null +++ b/examples/fabric-admin/commands/common/CredentialIssuerCommands.h @@ -0,0 +1,117 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include +#include +#include +#include +#include +#include + +namespace chip { +namespace Controller { +struct SetupParams; +class OperationalCredentialsDelegate; +} // namespace Controller +} // namespace chip + +class CredentialIssuerCommands +{ +public: + virtual ~CredentialIssuerCommands() {} + + /** + * @brief + * This function is used to initialize the Credentials Issuer, if needed. + * + * @param[in] storage A reference to the storage, where the Credentials Issuer can optionally use to access the keypair in + * storage. + * + * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error code. + */ + virtual CHIP_ERROR InitializeCredentialsIssuer(chip::PersistentStorageDelegate & storage) = 0; + + /** + * @brief + * This function is used to setup Device Attestation Singletons and intialize Setup/Commissioning Parameters with a custom + * Device Attestation Verifier object. + * + * @param[in] setupParams A reference to the Setup/Commissioning Parameters, to be initialized with custom Device Attestation + * Verifier. + * @param[in] trustStore A pointer to the PAA trust store to use to find valid PAA roots. + * + * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error code. + */ + virtual CHIP_ERROR SetupDeviceAttestation(chip::Controller::SetupParams & setupParams, + const chip::Credentials::AttestationTrustStore * trustStore) = 0; + + /** + * @brief Add a list of additional non-default CD verifying keys (by certificate) + * + * Must be called AFTER SetupDeviceAttestation. + * + * @param additionalCdCerts - vector of X.509 DER verifying cert bodies + * @return CHIP_NO_ERROR on succes, another CHIP_ERROR on internal failures. + */ + virtual CHIP_ERROR AddAdditionalCDVerifyingCerts(const std::vector> & additionalCdCerts) = 0; + + virtual chip::Controller::OperationalCredentialsDelegate * GetCredentialIssuer() = 0; + + virtual void SetCredentialIssuerCATValues(chip::CATValues cats) = 0; + + /** + * @brief + * This function is used to Generate NOC Chain for the Controller/Commissioner. Parameters follow the example implementation, + * so some parameters may not translate to the real remote Credentials Issuer policy. + * + * @param[in] nodeId The desired NodeId for the generated NOC Chain - May be optional/unused in some implementations. + * @param[in] fabricId The desired FabricId for the generated NOC Chain - May be optional/unused in some implementations. + * @param[in] cats The desired CATs for the generated NOC Chain - May be optional/unused in some implementations. + * @param[in] keypair The desired Keypair for the generated NOC Chain - May be optional/unused in some implementations. + * @param[in,out] rcac Buffer to hold the Root Certificate of the generated NOC Chain. + * @param[in,out] icac Buffer to hold the Intermediate Certificate of the generated NOC Chain. + * @param[in,out] noc Buffer to hold the Leaf Certificate of the generated NOC Chain. + * + * @return CHIP_ERROR CHIP_NO_ERROR on success, or corresponding error code. + */ + virtual CHIP_ERROR GenerateControllerNOCChain(chip::NodeId nodeId, chip::FabricId fabricId, const chip::CATValues & cats, + chip::Crypto::P256Keypair & keypair, chip::MutableByteSpan & rcac, + chip::MutableByteSpan & icac, chip::MutableByteSpan & noc) = 0; + + // All options must start false + enum CredentialIssuerOptions : uint8_t + { + kMaximizeCertificateSizes = 0, // If set, certificate chains will be maximized for testing via padding + kAllowTestCdSigningKey = 1, // If set, allow development/test SDK CD verifying key to be used + }; + + virtual void SetCredentialIssuerOption(CredentialIssuerOptions option, bool isEnabled) + { + // Do nothing + (void) option; + (void) isEnabled; + } + + virtual bool GetCredentialIssuerOption(CredentialIssuerOptions option) + { + // All options always start false + return false; + } +}; diff --git a/examples/fabric-admin/commands/common/CustomStringPrefix.h b/examples/fabric-admin/commands/common/CustomStringPrefix.h new file mode 100644 index 00000000000000..be8442993d1bf2 --- /dev/null +++ b/examples/fabric-admin/commands/common/CustomStringPrefix.h @@ -0,0 +1,55 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include + +#include + +static constexpr char kJsonStringPrefix[] = "json:"; +inline constexpr size_t kJsonStringPrefixLen = ArraySize(kJsonStringPrefix) - 1; // Don't count the null + +static constexpr char kBase64StringPrefix[] = "base64:"; +inline constexpr size_t kBase64StringPrefixLen = ArraySize(kBase64StringPrefix) - 1; // Don't count the null + +static constexpr char kHexStringPrefix[] = "hex:"; +inline constexpr size_t kHexStringPrefixLen = ArraySize(kHexStringPrefix) - 1; // Don't count the null + +static constexpr char kStrStringPrefix[] = "str:"; +inline constexpr size_t kStrStringPrefixLen = ArraySize(kStrStringPrefix) - 1; // Don't count the null + +inline bool IsJsonString(const char * str) +{ + return strncmp(str, kJsonStringPrefix, kJsonStringPrefixLen) == 0; +} + +inline bool IsBase64String(const char * str) +{ + return strncmp(str, kBase64StringPrefix, kBase64StringPrefixLen) == 0; +} + +inline bool IsHexString(const char * str) +{ + return strncmp(str, kHexStringPrefix, kHexStringPrefixLen) == 0; +} + +inline bool IsStrString(const char * str) +{ + return strncmp(str, kStrStringPrefix, kStrStringPrefixLen) == 0; +} diff --git a/examples/fabric-admin/commands/common/DeviceScanner.cpp b/examples/fabric-admin/commands/common/DeviceScanner.cpp new file mode 100644 index 00000000000000..e49eb852fe4808 --- /dev/null +++ b/examples/fabric-admin/commands/common/DeviceScanner.cpp @@ -0,0 +1,245 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "DeviceScanner.h" + +using namespace chip; +using namespace chip::Dnssd; + +#if CONFIG_NETWORK_LAYER_BLE +using namespace chip::Ble; +constexpr char kBleKey[] = "BLE"; +#endif // CONFIG_NETWORK_LAYER_BLE + +CHIP_ERROR DeviceScanner::Start() +{ + mDiscoveredResults.clear(); + +#if CONFIG_NETWORK_LAYER_BLE + ReturnErrorOnFailure(DeviceLayer::PlatformMgrImpl().StartBleScan(this)); +#endif // CONFIG_NETWORK_LAYER_BLE + + ReturnErrorOnFailure(chip::Dnssd::Resolver::Instance().Init(DeviceLayer::UDPEndPointManager())); + + char serviceName[kMaxCommissionableServiceNameSize]; + auto filter = DiscoveryFilterType::kNone; + ReturnErrorOnFailure(MakeServiceTypeName(serviceName, sizeof(serviceName), filter, DiscoveryType::kCommissionableNode)); + + return ChipDnssdBrowse(serviceName, DnssdServiceProtocol::kDnssdProtocolUdp, Inet::IPAddressType::kAny, + Inet::InterfaceId::Null(), this); +} + +CHIP_ERROR DeviceScanner::Stop() +{ +#if CONFIG_NETWORK_LAYER_BLE + ReturnErrorOnFailure(DeviceLayer::PlatformMgrImpl().StopBleScan()); +#endif // CONFIG_NETWORK_LAYER_BLE + + return ChipDnssdStopBrowse(this); +} + +void DeviceScanner::OnNodeDiscovered(const DiscoveredNodeData & nodeData) +{ + VerifyOrReturn(nodeData.Is()); + auto & commissionData = nodeData.Get(); + + auto discriminator = commissionData.longDiscriminator; + auto vendorId = static_cast(commissionData.vendorId); + auto productId = commissionData.productId; + + ChipLogProgress(NotSpecified, "OnNodeDiscovered (MDNS): discriminator: %u, vendorId: %u, productId: %u", discriminator, + vendorId, productId); + + const CommonResolutionData & resolutionData = commissionData; + + auto & instanceData = mDiscoveredResults[commissionData.instanceName]; + auto & interfaceData = instanceData[resolutionData.interfaceId.GetPlatformInterface()]; + + for (size_t i = 0; i < resolutionData.numIPs; i++) + { + auto params = Controller::SetUpCodePairerParameters(resolutionData, i); + DeviceScannerResult result = { params, vendorId, productId, discriminator, chip::MakeOptional(resolutionData) }; + interfaceData.push_back(result); + } + + commissionData.LogDetail(); +} + +void DeviceScanner::OnBrowseAdd(chip::Dnssd::DnssdService service) +{ + ChipLogProgress(NotSpecified, "OnBrowseAdd: %s", service.mName); + LogErrorOnFailure(ChipDnssdResolve(&service, service.mInterface, this)); + + auto & instanceData = mDiscoveredResults[service.mName]; + auto & interfaceData = instanceData[service.mInterface.GetPlatformInterface()]; + (void) interfaceData; +} + +void DeviceScanner::OnBrowseRemove(chip::Dnssd::DnssdService service) +{ + ChipLogProgress(NotSpecified, "OnBrowseRemove: %s", service.mName); + auto & instanceData = mDiscoveredResults[service.mName]; + auto & interfaceData = instanceData[service.mInterface.GetPlatformInterface()]; + + // Check if the interface data has been resolved already, otherwise, just inform the + // back end that we may not need it anymore. + if (interfaceData.size() == 0) + { + ChipDnssdResolveNoLongerNeeded(service.mName); + } + + // Delete the interface placeholder. + instanceData.erase(service.mInterface.GetPlatformInterface()); + + // If there is nothing else to resolve for the given instance name, just remove it + // too. + if (instanceData.size() == 0) + { + mDiscoveredResults.erase(service.mName); + } +} + +void DeviceScanner::OnBrowseStop(CHIP_ERROR error) +{ + ChipLogProgress(NotSpecified, "OnBrowseStop: %" CHIP_ERROR_FORMAT, error.Format()); + + for (auto & instance : mDiscoveredResults) + { + for (auto & interface : instance.second) + { + if (interface.second.size() == 0) + { + ChipDnssdResolveNoLongerNeeded(instance.first.c_str()); + } + } + } +} + +#if CONFIG_NETWORK_LAYER_BLE +void DeviceScanner::OnBleScanAdd(BLE_CONNECTION_OBJECT connObj, const ChipBLEDeviceIdentificationInfo & info) +{ + auto discriminator = info.GetDeviceDiscriminator(); + auto vendorId = static_cast(info.GetVendorId()); + auto productId = info.GetProductId(); + + ChipLogProgress(NotSpecified, "OnBleScanAdd (BLE): %p, discriminator: %u, vendorId: %u, productId: %u", connObj, discriminator, + vendorId, productId); + + auto params = Controller::SetUpCodePairerParameters(connObj, false /* connected */); + DeviceScannerResult result = { params, vendorId, productId, discriminator }; + + auto & instanceData = mDiscoveredResults[kBleKey]; + auto & interfaceData = instanceData[chip::Inet::InterfaceId::Null().GetPlatformInterface()]; + interfaceData.push_back(result); +} + +void DeviceScanner::OnBleScanRemove(BLE_CONNECTION_OBJECT connObj) +{ + ChipLogProgress(NotSpecified, "OnBleScanRemove: %p", connObj); + + auto & instanceData = mDiscoveredResults[kBleKey]; + auto & interfaceData = instanceData[chip::Inet::InterfaceId::Null().GetPlatformInterface()]; + + interfaceData.erase(std::remove_if(interfaceData.begin(), interfaceData.end(), + [connObj](const DeviceScannerResult & result) { + return result.mParams.HasDiscoveredObject() && + result.mParams.GetDiscoveredObject() == connObj; + }), + interfaceData.end()); + + if (interfaceData.size() == 0) + { + instanceData.clear(); + mDiscoveredResults.erase(kBleKey); + } +} +#endif // CONFIG_NETWORK_LAYER_BLE + +CHIP_ERROR DeviceScanner::Get(uint16_t index, RendezvousParameters & params) +{ + uint16_t currentIndex = 0; + for (auto & instance : mDiscoveredResults) + { + for (auto & interface : instance.second) + { + for (auto & result : interface.second) + { + if (currentIndex == index) + { + params = result.mParams; + return CHIP_NO_ERROR; + } + currentIndex++; + } + } + } + + return CHIP_ERROR_NOT_FOUND; +} + +CHIP_ERROR DeviceScanner::Get(uint16_t index, Dnssd::CommonResolutionData & resolutionData) +{ + uint16_t currentIndex = 0; + for (auto & instance : mDiscoveredResults) + { + for (auto & interface : instance.second) + { + for (auto & result : interface.second) + { + if (currentIndex == index && result.mResolutionData.HasValue()) + { + resolutionData = result.mResolutionData.Value(); + return CHIP_NO_ERROR; + } + currentIndex++; + } + } + } + + return CHIP_ERROR_NOT_FOUND; +} + +void DeviceScanner::Log() const +{ + auto resultsCount = mDiscoveredResults.size(); + VerifyOrReturn(resultsCount > 0, ChipLogProgress(NotSpecified, "No device discovered.")); + + [[maybe_unused]] uint16_t index = 0; + for (auto & instance : mDiscoveredResults) + { + ChipLogProgress(NotSpecified, "Instance Name: %s ", instance.first.c_str()); + for (auto & interface : instance.second) + { + for (auto & result : interface.second) + { + char addr[Transport::PeerAddress::kMaxToStringSize]; + result.mParams.GetPeerAddress().ToString(addr); + + ChipLogProgress(NotSpecified, "\t %u - Discriminator: %u - Vendor: %u - Product: %u - %s", index, + result.mDiscriminator, result.mVendorId, result.mProductId, addr); + index++; + } + } + } +} + +DeviceScanner & GetDeviceScanner() +{ + static DeviceScanner scanner; + return scanner; +} diff --git a/examples/fabric-admin/commands/common/DeviceScanner.h b/examples/fabric-admin/commands/common/DeviceScanner.h new file mode 100644 index 00000000000000..c3e81a51c413cd --- /dev/null +++ b/examples/fabric-admin/commands/common/DeviceScanner.h @@ -0,0 +1,80 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include + +#if CHIP_DEVICE_LAYER_TARGET_DARWIN + +#include +#include + +#include +#include +#include + +#if CONFIG_NETWORK_LAYER_BLE +#include +#endif // CONFIG_NETWORK_LAYER_BLE + +struct DeviceScannerResult +{ + chip::Controller::SetUpCodePairerParameters mParams; + chip::VendorId mVendorId; + uint16_t mProductId; + uint16_t mDiscriminator; + chip::Optional mResolutionData; +}; + +class DeviceScanner : public chip::Dnssd::DiscoverNodeDelegate, + public chip::Dnssd::DnssdBrowseDelegate +#if CONFIG_NETWORK_LAYER_BLE + , + public chip::DeviceLayer::BleScannerDelegate +#endif // CONFIG_NETWORK_LAYER_BLE +{ +public: + CHIP_ERROR Start(); + CHIP_ERROR Stop(); + CHIP_ERROR Get(uint16_t index, chip::RendezvousParameters & params); + CHIP_ERROR Get(uint16_t index, chip::Dnssd::CommonResolutionData & resolutionData); + void Log() const; + + /////////// DiscoverNodeDelegate Interface ///////// + void OnNodeDiscovered(const chip::Dnssd::DiscoveredNodeData & nodeData) override; + + /////////// DnssdBrowseDelegate Interface ///////// + void OnBrowseAdd(chip::Dnssd::DnssdService service) override; + void OnBrowseRemove(chip::Dnssd::DnssdService service) override; + void OnBrowseStop(CHIP_ERROR error) override; + +#if CONFIG_NETWORK_LAYER_BLE + /////////// BleScannerDelegate Interface ///////// + void OnBleScanAdd(BLE_CONNECTION_OBJECT connObj, const chip::Ble::ChipBLEDeviceIdentificationInfo & info) override; + void OnBleScanRemove(BLE_CONNECTION_OBJECT connObj) override; +#endif // CONFIG_NETWORK_LAYER_BLE + +private: + std::unordered_map>> + mDiscoveredResults; +}; + +DeviceScanner & GetDeviceScanner(); + +#endif // CHIP_DEVICE_LAYER_TARGET_DARWIN diff --git a/examples/fabric-admin/commands/common/HexConversion.h b/examples/fabric-admin/commands/common/HexConversion.h new file mode 100644 index 00000000000000..99b7f651734d12 --- /dev/null +++ b/examples/fabric-admin/commands/common/HexConversion.h @@ -0,0 +1,65 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#pragma once + +#include +#include +#include +#include + +/** + * Utility for converting a hex string to bytes, with the right error checking + * and allocation size computation. + * + * Takes a functor to allocate the buffer to use for the hex bytes. The functor + * is expected to return uint8_t *. The caller is responsible for cleaning up + * this buffer as needed. + * + * On success, *octetCount is filled with the number of octets placed in the + * buffer. On failure, the value of *octetCount is undefined. + */ +template +CHIP_ERROR HexToBytes(chip::CharSpan hex, F bufferAllocator, size_t * octetCount) +{ + *octetCount = 0; + + if (hex.size() % 2 != 0) + { + ChipLogError(NotSpecified, "Error while encoding '%.*s' as an octet string: Odd number of characters.", + static_cast(hex.size()), hex.data()); + return CHIP_ERROR_INVALID_STRING_LENGTH; + } + + const size_t bufferSize = hex.size() / 2; + uint8_t * buffer = bufferAllocator(bufferSize); + if (buffer == nullptr && bufferSize != 0) + { + ChipLogError(NotSpecified, "Failed to allocate buffer of size: %llu", static_cast(bufferSize)); + return CHIP_ERROR_NO_MEMORY; + } + + size_t byteCount = chip::Encoding::HexToBytes(hex.data(), hex.size(), buffer, bufferSize); + if (byteCount == 0 && hex.size() != 0) + { + ChipLogError(NotSpecified, "Error while encoding '%.*s' as an octet string.", static_cast(hex.size()), hex.data()); + return CHIP_ERROR_INTERNAL; + } + + *octetCount = byteCount; + return CHIP_NO_ERROR; +} diff --git a/examples/fabric-admin/commands/common/RemoteDataModelLogger.cpp b/examples/fabric-admin/commands/common/RemoteDataModelLogger.cpp new file mode 100644 index 00000000000000..c8e9d5a5450703 --- /dev/null +++ b/examples/fabric-admin/commands/common/RemoteDataModelLogger.cpp @@ -0,0 +1,279 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "RemoteDataModelLogger.h" + +#include +#include + +constexpr char kEventNumberKey[] = "eventNumber"; +constexpr char kDataVersionKey[] = "dataVersion"; +constexpr char kClusterIdKey[] = "clusterId"; +constexpr char kEndpointIdKey[] = "endpointId"; +constexpr char kAttributeIdKey[] = "attributeId"; +constexpr char kEventIdKey[] = "eventId"; +constexpr char kCommandIdKey[] = "commandId"; +constexpr char kErrorIdKey[] = "error"; +constexpr char kClusterErrorIdKey[] = "clusterError"; +constexpr char kValueKey[] = "value"; +constexpr char kNodeIdKey[] = "nodeId"; +constexpr char kNOCKey[] = "NOC"; +constexpr char kICACKey[] = "ICAC"; +constexpr char kRCACKey[] = "RCAC"; +constexpr char kIPKKey[] = "IPK"; + +namespace { +RemoteDataModelLoggerDelegate * gDelegate; + +CHIP_ERROR LogError(Json::Value & value, const chip::app::StatusIB & status) +{ + if (status.mClusterStatus.HasValue()) + { + auto statusValue = status.mClusterStatus.Value(); + value[kClusterErrorIdKey] = statusValue; + } + +#if CHIP_CONFIG_IM_STATUS_CODE_VERBOSE_FORMAT + auto statusName = chip::Protocols::InteractionModel::StatusName(status.mStatus); + value[kErrorIdKey] = statusName; +#else + auto statusName = status.mStatus; + value[kErrorIdKey] = chip::to_underlying(statusName); +#endif // CHIP_CONFIG_IM_STATUS_CODE_VERBOSE_FORMAT + + auto valueStr = chip::JsonToString(value); + return gDelegate->LogJSON(valueStr.c_str()); +} + +} // namespace + +namespace RemoteDataModelLogger { +CHIP_ERROR LogAttributeAsJSON(const chip::app::ConcreteDataAttributePath & path, chip::TLV::TLVReader * data) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value value; + value[kClusterIdKey] = path.mClusterId; + value[kEndpointIdKey] = path.mEndpointId; + value[kAttributeIdKey] = path.mAttributeId; + if (path.mDataVersion.HasValue()) + { + value[kDataVersionKey] = path.mDataVersion.Value(); + } + + chip::TLV::TLVReader reader; + reader.Init(*data); + ReturnErrorOnFailure(chip::TlvToJson(reader, value)); + + auto valueStr = chip::JsonToString(value); + return gDelegate->LogJSON(valueStr.c_str()); +} + +CHIP_ERROR LogErrorAsJSON(const chip::app::ConcreteDataAttributePath & path, const chip::app::StatusIB & status) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value value; + value[kClusterIdKey] = path.mClusterId; + value[kEndpointIdKey] = path.mEndpointId; + value[kAttributeIdKey] = path.mAttributeId; + + return LogError(value, status); +} + +CHIP_ERROR LogCommandAsJSON(const chip::app::ConcreteCommandPath & path, chip::TLV::TLVReader * data) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value value; + value[kClusterIdKey] = path.mClusterId; + value[kEndpointIdKey] = path.mEndpointId; + value[kCommandIdKey] = path.mCommandId; + + chip::TLV::TLVReader reader; + reader.Init(*data); + ReturnErrorOnFailure(chip::TlvToJson(reader, value)); + + auto valueStr = chip::JsonToString(value); + return gDelegate->LogJSON(valueStr.c_str()); +} + +CHIP_ERROR LogErrorAsJSON(const chip::app::ConcreteCommandPath & path, const chip::app::StatusIB & status) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value value; + value[kClusterIdKey] = path.mClusterId; + value[kEndpointIdKey] = path.mEndpointId; + value[kCommandIdKey] = path.mCommandId; + + return LogError(value, status); +} + +CHIP_ERROR LogEventAsJSON(const chip::app::EventHeader & header, chip::TLV::TLVReader * data) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value value; + value[kClusterIdKey] = header.mPath.mClusterId; + value[kEndpointIdKey] = header.mPath.mEndpointId; + value[kEventIdKey] = header.mPath.mEventId; + value[kEventNumberKey] = header.mEventNumber; + + chip::TLV::TLVReader reader; + reader.Init(*data); + ReturnErrorOnFailure(chip::TlvToJson(reader, value)); + + auto valueStr = chip::JsonToString(value); + return gDelegate->LogJSON(valueStr.c_str()); +} + +CHIP_ERROR LogErrorAsJSON(const chip::app::EventHeader & header, const chip::app::StatusIB & status) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value value; + value[kClusterIdKey] = header.mPath.mClusterId; + value[kEndpointIdKey] = header.mPath.mEndpointId; + value[kEventIdKey] = header.mPath.mEventId; + + return LogError(value, status); +} + +CHIP_ERROR LogErrorAsJSON(const CHIP_ERROR & error) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value value; + chip::app::StatusIB status; + status.InitFromChipError(error); + return LogError(value, status); +} + +CHIP_ERROR LogGetCommissionerNodeId(chip::NodeId value) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value rootValue; + rootValue[kValueKey] = Json::Value(); + rootValue[kValueKey][kNodeIdKey] = value; + + auto valueStr = chip::JsonToString(rootValue); + return gDelegate->LogJSON(valueStr.c_str()); +} + +CHIP_ERROR LogGetCommissionerRootCertificate(const char * value) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value rootValue; + rootValue[kValueKey] = Json::Value(); + rootValue[kValueKey][kRCACKey] = value; + + auto valueStr = chip::JsonToString(rootValue); + return gDelegate->LogJSON(valueStr.c_str()); +} + +CHIP_ERROR LogIssueNOCChain(const char * noc, const char * icac, const char * rcac, const char * ipk) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + Json::Value rootValue; + rootValue[kValueKey] = Json::Value(); + rootValue[kValueKey][kNOCKey] = noc; + rootValue[kValueKey][kICACKey] = icac; + rootValue[kValueKey][kRCACKey] = rcac; + rootValue[kValueKey][kIPKKey] = ipk; + + auto valueStr = chip::JsonToString(rootValue); + return gDelegate->LogJSON(valueStr.c_str()); +} + +CHIP_ERROR LogDiscoveredNodeData(const chip::Dnssd::CommissionNodeData & nodeData) +{ + VerifyOrReturnError(gDelegate != nullptr, CHIP_NO_ERROR); + + auto & commissionData = nodeData; + auto & resolutionData = commissionData; + + if (!chip::CanCastTo(resolutionData.numIPs)) + { + ChipLogError(NotSpecified, "Too many ips."); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + if (!chip::CanCastTo(commissionData.rotatingIdLen)) + { + ChipLogError(NotSpecified, "Can not convert rotatingId to json format."); + return CHIP_ERROR_INVALID_ARGUMENT; + } + + char rotatingId[chip::Dnssd::kMaxRotatingIdLen * 2 + 1] = ""; + ReturnErrorOnFailure(chip::Encoding::BytesToUppercaseHexString(commissionData.rotatingId, commissionData.rotatingIdLen, + rotatingId, sizeof(rotatingId))); + + Json::Value value; + value["hostName"] = resolutionData.hostName; + value["instanceName"] = commissionData.instanceName; + value["longDiscriminator"] = commissionData.longDiscriminator; + value["shortDiscriminator"] = ((commissionData.longDiscriminator >> 8) & 0x0F); + value["vendorId"] = commissionData.vendorId; + value["productId"] = commissionData.productId; + value["commissioningMode"] = commissionData.commissioningMode; + value["deviceType"] = commissionData.deviceType; + value["deviceName"] = commissionData.deviceName; + value["rotatingId"] = rotatingId; + value["rotatingIdLen"] = static_cast(commissionData.rotatingIdLen); + value["pairingHint"] = commissionData.pairingHint; + value["pairingInstruction"] = commissionData.pairingInstruction; + value["supportsTcp"] = resolutionData.supportsTcp; + value["port"] = resolutionData.port; + value["numIPs"] = static_cast(resolutionData.numIPs); + + if (resolutionData.mrpRetryIntervalIdle.has_value()) + { + value["mrpRetryIntervalIdle"] = resolutionData.mrpRetryIntervalIdle->count(); + } + + if (resolutionData.mrpRetryIntervalActive.has_value()) + { + value["mrpRetryIntervalActive"] = resolutionData.mrpRetryIntervalActive->count(); + } + + if (resolutionData.mrpRetryActiveThreshold.has_value()) + { + value["mrpRetryActiveThreshold"] = resolutionData.mrpRetryActiveThreshold->count(); + } + + if (resolutionData.isICDOperatingAsLIT.has_value()) + { + value["isICDOperatingAsLIT"] = *(resolutionData.isICDOperatingAsLIT); + } + + Json::Value rootValue; + rootValue[kValueKey] = value; + + auto valueStr = chip::JsonToString(rootValue); + return gDelegate->LogJSON(valueStr.c_str()); +} + +void SetDelegate(RemoteDataModelLoggerDelegate * delegate) +{ + gDelegate = delegate; +} +}; // namespace RemoteDataModelLogger diff --git a/examples/fabric-admin/commands/common/RemoteDataModelLogger.h b/examples/fabric-admin/commands/common/RemoteDataModelLogger.h new file mode 100644 index 00000000000000..c31636ea1fd8a9 --- /dev/null +++ b/examples/fabric-admin/commands/common/RemoteDataModelLogger.h @@ -0,0 +1,48 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include +#include +#include +#include +#include +#include + +class RemoteDataModelLoggerDelegate +{ +public: + CHIP_ERROR virtual LogJSON(const char *) = 0; + virtual ~RemoteDataModelLoggerDelegate(){}; +}; + +namespace RemoteDataModelLogger { +CHIP_ERROR LogAttributeAsJSON(const chip::app::ConcreteDataAttributePath & path, chip::TLV::TLVReader * data); +CHIP_ERROR LogErrorAsJSON(const chip::app::ConcreteDataAttributePath & path, const chip::app::StatusIB & status); +CHIP_ERROR LogCommandAsJSON(const chip::app::ConcreteCommandPath & path, chip::TLV::TLVReader * data); +CHIP_ERROR LogErrorAsJSON(const chip::app::ConcreteCommandPath & path, const chip::app::StatusIB & status); +CHIP_ERROR LogEventAsJSON(const chip::app::EventHeader & header, chip::TLV::TLVReader * data); +CHIP_ERROR LogErrorAsJSON(const chip::app::EventHeader & header, const chip::app::StatusIB & status); +CHIP_ERROR LogErrorAsJSON(const CHIP_ERROR & error); +CHIP_ERROR LogGetCommissionerNodeId(chip::NodeId value); +CHIP_ERROR LogGetCommissionerRootCertificate(const char * value); +CHIP_ERROR LogIssueNOCChain(const char * noc, const char * icac, const char * rcac, const char * ipk); +CHIP_ERROR LogDiscoveredNodeData(const chip::Dnssd::CommissionNodeData & nodeData); +void SetDelegate(RemoteDataModelLoggerDelegate * delegate); +}; // namespace RemoteDataModelLogger diff --git a/examples/fabric-admin/commands/example/ExampleCredentialIssuerCommands.h b/examples/fabric-admin/commands/example/ExampleCredentialIssuerCommands.h new file mode 100644 index 00000000000000..a739ac7dbfa9dd --- /dev/null +++ b/examples/fabric-admin/commands/example/ExampleCredentialIssuerCommands.h @@ -0,0 +1,111 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include +#include +#include +#include +#include +#include +#include + +class ExampleCredentialIssuerCommands : public CredentialIssuerCommands +{ +public: + CHIP_ERROR InitializeCredentialsIssuer(chip::PersistentStorageDelegate & storage) override + { + return mOpCredsIssuer.Initialize(storage); + } + CHIP_ERROR SetupDeviceAttestation(chip::Controller::SetupParams & setupParams, + const chip::Credentials::AttestationTrustStore * trustStore) override + { + chip::Credentials::SetDeviceAttestationCredentialsProvider(chip::Credentials::Examples::GetExampleDACProvider()); + + mDacVerifier = chip::Credentials::GetDefaultDACVerifier(trustStore); + setupParams.deviceAttestationVerifier = mDacVerifier; + mDacVerifier->EnableCdTestKeySupport(mAllowTestCdSigningKey); + + return CHIP_NO_ERROR; + } + chip::Controller::OperationalCredentialsDelegate * GetCredentialIssuer() override { return &mOpCredsIssuer; } + void SetCredentialIssuerCATValues(chip::CATValues cats) override { mOpCredsIssuer.SetCATValuesForNextNOCRequest(cats); } + CHIP_ERROR GenerateControllerNOCChain(chip::NodeId nodeId, chip::FabricId fabricId, const chip::CATValues & cats, + chip::Crypto::P256Keypair & keypair, chip::MutableByteSpan & rcac, + chip::MutableByteSpan & icac, chip::MutableByteSpan & noc) override + { + return mOpCredsIssuer.GenerateNOCChainAfterValidation(nodeId, fabricId, cats, keypair.Pubkey(), rcac, icac, noc); + } + + CHIP_ERROR AddAdditionalCDVerifyingCerts(const std::vector> & additionalCdCerts) override + { + VerifyOrReturnError(mDacVerifier != nullptr, CHIP_ERROR_INCORRECT_STATE); + + for (const auto & cert : additionalCdCerts) + { + auto cdTrustStore = mDacVerifier->GetCertificationDeclarationTrustStore(); + VerifyOrReturnError(cdTrustStore != nullptr, CHIP_ERROR_INCORRECT_STATE); + ReturnErrorOnFailure(cdTrustStore->AddTrustedKey(chip::ByteSpan(cert.data(), cert.size()))); + } + + return CHIP_NO_ERROR; + } + + void SetCredentialIssuerOption(CredentialIssuerOptions option, bool isEnabled) override + { + switch (option) + { + case CredentialIssuerOptions::kMaximizeCertificateSizes: + mUsesMaxSizedCerts = isEnabled; + mOpCredsIssuer.SetMaximallyLargeCertsUsed(mUsesMaxSizedCerts); + break; + case CredentialIssuerOptions::kAllowTestCdSigningKey: + mAllowTestCdSigningKey = isEnabled; + if (mDacVerifier != nullptr) + { + mDacVerifier->EnableCdTestKeySupport(isEnabled); + } + break; + default: + break; + } + } + + bool GetCredentialIssuerOption(CredentialIssuerOptions option) override + { + switch (option) + { + case CredentialIssuerOptions::kMaximizeCertificateSizes: + return mUsesMaxSizedCerts; + case CredentialIssuerOptions::kAllowTestCdSigningKey: + return mAllowTestCdSigningKey; + default: + return false; + } + } + +protected: + bool mUsesMaxSizedCerts = false; + // Starts true for legacy purposes + bool mAllowTestCdSigningKey = true; + +private: + chip::Controller::ExampleOperationalCredentialsIssuer mOpCredsIssuer; + chip::Credentials::DeviceAttestationVerifier * mDacVerifier; +}; diff --git a/examples/fabric-admin/commands/interactive/Commands.h b/examples/fabric-admin/commands/interactive/Commands.h new file mode 100644 index 00000000000000..e324ddae2680ae --- /dev/null +++ b/examples/fabric-admin/commands/interactive/Commands.h @@ -0,0 +1,34 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "commands/common/CHIPCommand.h" +#include "commands/common/Commands.h" +#include "commands/interactive/InteractiveCommands.h" + +void registerCommandsInteractive(Commands & commands, CredentialIssuerCommands * credsIssuerConfig) +{ + const char * clusterName = "interactive"; + + commands_list clusterCommands = { + make_unique(&commands, credsIssuerConfig), + }; + + commands.RegisterCommandSet(clusterName, clusterCommands, "Commands for starting long-lived interactive modes."); +} diff --git a/examples/fabric-admin/commands/interactive/InteractiveCommands.cpp b/examples/fabric-admin/commands/interactive/InteractiveCommands.cpp new file mode 100644 index 00000000000000..9ef07e79450300 --- /dev/null +++ b/examples/fabric-admin/commands/interactive/InteractiveCommands.cpp @@ -0,0 +1,139 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "InteractiveCommands.h" + +#include + +#include + +#include +#include + +constexpr char kInteractiveModePrompt[] = ">>> "; +constexpr char kInteractiveModeHistoryFileName[] = "chip_tool_history"; +constexpr char kInteractiveModeStopCommand[] = "quit()"; + +namespace { + +void ClearLine() +{ + printf("\r\x1B[0J"); // Move cursor to the beginning of the line and clear from cursor to end of the screen +} + +void ENFORCE_FORMAT(3, 0) LoggingCallback(const char * module, uint8_t category, const char * msg, va_list args) +{ + ClearLine(); + chip::Logging::Platform::LogV(module, category, msg, args); + ClearLine(); +} + +} // namespace + +char * InteractiveStartCommand::GetCommand(char * command) +{ + if (command != nullptr) + { + free(command); + command = nullptr; + } + + command = readline(kInteractiveModePrompt); + + // Do not save empty lines + if (command != nullptr && *command) + { + add_history(command); + write_history(GetHistoryFilePath().c_str()); + } + + return command; +} + +std::string InteractiveStartCommand::GetHistoryFilePath() const +{ + std::string storageDir; + if (GetStorageDirectory().HasValue()) + { + storageDir = GetStorageDirectory().Value(); + } + else + { + // Match what GetFilename in ExamplePersistentStorage.cpp does. + const char * dir = getenv("TMPDIR"); + if (dir == nullptr) + { + dir = "/tmp"; + } + storageDir = dir; + } + + return storageDir + "/" + kInteractiveModeHistoryFileName; +} + +CHIP_ERROR InteractiveStartCommand::RunCommand() +{ + read_history(GetHistoryFilePath().c_str()); + + // Logs needs to be redirected in order to refresh the screen appropriately when something + // is dumped to stdout while the user is typing a command. + chip::Logging::SetLogRedirectCallback(LoggingCallback); + + char * command = nullptr; + int status; + while (true) + { + command = GetCommand(command); + if (command != nullptr && !ParseCommand(command, &status)) + { + break; + } + } + + if (command != nullptr) + { + free(command); + command = nullptr; + } + + SetCommandExitStatus(CHIP_NO_ERROR); + return CHIP_NO_ERROR; +} + +bool InteractiveCommand::ParseCommand(char * command, int * status) +{ + if (strcmp(command, kInteractiveModeStopCommand) == 0) + { + // If scheduling the cleanup fails, there is not much we can do. + // But if something went wrong while the application is leaving it could be because things have + // not been cleaned up properly, so it is still useful to log the failure. + LogErrorOnFailure(chip::DeviceLayer::PlatformMgr().ScheduleWork(ExecuteDeferredCleanups, 0)); + return false; + } + + ClearLine(); + + *status = mHandler->RunInteractive(command, GetStorageDirectory(), NeedsOperationalAdvertising()); + + return true; +} + +bool InteractiveCommand::NeedsOperationalAdvertising() +{ + return mAdvertiseOperational.ValueOr(true); +} diff --git a/examples/fabric-admin/commands/interactive/InteractiveCommands.h b/examples/fabric-admin/commands/interactive/InteractiveCommands.h new file mode 100644 index 00000000000000..21c14a7a4c95ce --- /dev/null +++ b/examples/fabric-admin/commands/interactive/InteractiveCommands.h @@ -0,0 +1,68 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "../clusters/DataModelLogger.h" +#include "../common/CHIPCommand.h" +#include "../common/Commands.h" + +#include + +#include + +class Commands; + +class InteractiveCommand : public CHIPCommand +{ +public: + InteractiveCommand(const char * name, Commands * commandsHandler, const char * helpText, + CredentialIssuerCommands * credsIssuerConfig) : + CHIPCommand(name, credsIssuerConfig, helpText), + mHandler(commandsHandler) + { + AddArgument("advertise-operational", 0, 1, &mAdvertiseOperational, + "Advertise operational node over DNS-SD and accept incoming CASE sessions."); + } + + /////////// CHIPCommand Interface ///////// + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(0); } + bool NeedsOperationalAdvertising() override; + + bool ParseCommand(char * command, int * status); + +private: + Commands * mHandler = nullptr; + chip::Optional mAdvertiseOperational; +}; + +class InteractiveStartCommand : public InteractiveCommand +{ +public: + InteractiveStartCommand(Commands * commandsHandler, CredentialIssuerCommands * credsIssuerConfig) : + InteractiveCommand("start", commandsHandler, "Start an interactive shell that can then run other commands.", + credsIssuerConfig) + {} + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override; + +private: + char * GetCommand(char * command); + std::string GetHistoryFilePath() const; +}; diff --git a/examples/fabric-admin/commands/pairing/Commands.h b/examples/fabric-admin/commands/pairing/Commands.h new file mode 100644 index 00000000000000..6fdfacef79e34f --- /dev/null +++ b/examples/fabric-admin/commands/pairing/Commands.h @@ -0,0 +1,259 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "commands/common/Commands.h" +#include "commands/pairing/GetCommissionerNodeIdCommand.h" +#include "commands/pairing/GetCommissionerRootCertificateCommand.h" +#include "commands/pairing/IssueNOCChainCommand.h" +#include "commands/pairing/OpenCommissioningWindowCommand.h" +#include "commands/pairing/PairingCommand.h" + +#include +#include +#include + +class Unpair : public PairingCommand +{ +public: + Unpair(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("unpair", PairingMode::None, PairingNetworkType::None, credsIssuerConfig) + {} +}; + +class PairCode : public PairingCommand +{ +public: + PairCode(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("code", PairingMode::Code, PairingNetworkType::None, credsIssuerConfig) + {} +}; + +class PairCodePase : public PairingCommand +{ +public: + PairCodePase(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("code-paseonly", PairingMode::CodePaseOnly, PairingNetworkType::None, credsIssuerConfig) + {} +}; + +class PairCodeWifi : public PairingCommand +{ +public: + PairCodeWifi(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("code-wifi", PairingMode::Code, PairingNetworkType::WiFi, credsIssuerConfig) + {} +}; + +class PairCodeThread : public PairingCommand +{ +public: + PairCodeThread(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("code-thread", PairingMode::Code, PairingNetworkType::Thread, credsIssuerConfig) + {} +}; + +class PairOnNetwork : public PairingCommand +{ +public: + PairOnNetwork(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig) + {} +}; + +class PairOnNetworkShort : public PairingCommand +{ +public: + PairOnNetworkShort(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork-short", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig, + chip::Dnssd::DiscoveryFilterType::kShortDiscriminator) + {} +}; + +class PairOnNetworkLong : public PairingCommand +{ +public: + PairOnNetworkLong(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork-long", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig, + chip::Dnssd::DiscoveryFilterType::kLongDiscriminator) + {} +}; + +class PairOnNetworkVendor : public PairingCommand +{ +public: + PairOnNetworkVendor(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork-vendor", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig, + chip::Dnssd::DiscoveryFilterType::kVendorId) + {} +}; + +class PairOnNetworkFabric : public PairingCommand +{ +public: + PairOnNetworkFabric(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork-fabric", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig, + chip::Dnssd::DiscoveryFilterType::kCompressedFabricId) + {} +}; + +class PairOnNetworkCommissioningMode : public PairingCommand +{ +public: + PairOnNetworkCommissioningMode(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork-commissioning-mode", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig, + chip::Dnssd::DiscoveryFilterType::kCommissioningMode) + {} +}; + +class PairOnNetworkCommissioner : public PairingCommand +{ +public: + PairOnNetworkCommissioner(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork-commissioner", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig, + chip::Dnssd::DiscoveryFilterType::kCommissioner) + {} +}; + +class PairOnNetworkDeviceType : public PairingCommand +{ +public: + PairOnNetworkDeviceType(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork-device-type", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig, + chip::Dnssd::DiscoveryFilterType::kDeviceType) + {} +}; + +class PairOnNetworkInstanceName : public PairingCommand +{ +public: + PairOnNetworkInstanceName(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("onnetwork-instance-name", PairingMode::OnNetwork, PairingNetworkType::None, credsIssuerConfig, + chip::Dnssd::DiscoveryFilterType::kInstanceName) + {} +}; + +class PairBleWiFi : public PairingCommand +{ +public: + PairBleWiFi(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("ble-wifi", PairingMode::Ble, PairingNetworkType::WiFi, credsIssuerConfig) + {} +}; + +class PairBleThread : public PairingCommand +{ +public: + PairBleThread(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("ble-thread", PairingMode::Ble, PairingNetworkType::Thread, credsIssuerConfig) + {} +}; + +class PairSoftAP : public PairingCommand +{ +public: + PairSoftAP(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("softap", PairingMode::SoftAP, PairingNetworkType::WiFi, credsIssuerConfig) + {} +}; + +class PairAlreadyDiscovered : public PairingCommand +{ +public: + PairAlreadyDiscovered(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("already-discovered", PairingMode::AlreadyDiscovered, PairingNetworkType::None, credsIssuerConfig) + {} +}; + +class PairAlreadyDiscoveredByIndex : public PairingCommand +{ +public: + PairAlreadyDiscoveredByIndex(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("already-discovered-by-index", PairingMode::AlreadyDiscoveredByIndex, PairingNetworkType::None, + credsIssuerConfig) + {} +}; + +class PairAlreadyDiscoveredByIndexWithWiFi : public PairingCommand +{ +public: + PairAlreadyDiscoveredByIndexWithWiFi(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("already-discovered-by-index-with-wifi", PairingMode::AlreadyDiscoveredByIndex, PairingNetworkType::WiFi, + credsIssuerConfig) + {} +}; + +class PairAlreadyDiscoveredByIndexWithCode : public PairingCommand +{ +public: + PairAlreadyDiscoveredByIndexWithCode(CredentialIssuerCommands * credsIssuerConfig) : + PairingCommand("already-discovered-by-index-with-code", PairingMode::AlreadyDiscoveredByIndexWithCode, + PairingNetworkType::None, credsIssuerConfig) + {} +}; + +class StartUdcServerCommand : public CHIPCommand +{ +public: + StartUdcServerCommand(CredentialIssuerCommands * credsIssuerConfig) : CHIPCommand("start-udc-server", credsIssuerConfig) {} + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(300); } + + CHIP_ERROR RunCommand() override + { + chip::app::DnssdServer::Instance().StartServer(chip::Dnssd::CommissioningMode::kDisabled); + return CHIP_NO_ERROR; + } +}; + +void registerCommandsPairing(Commands & commands, CredentialIssuerCommands * credsIssuerConfig) +{ + const char * clusterName = "Pairing"; + + commands_list clusterCommands = { + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + // TODO(#13973) - enable CommissionedListCommand once DNS Cache is implemented + // make_unique(), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + make_unique(credsIssuerConfig), + }; + + commands.RegisterCommandSet(clusterName, clusterCommands, "Commands for commissioning devices."); +} diff --git a/examples/fabric-admin/commands/pairing/GetCommissionerNodeIdCommand.h b/examples/fabric-admin/commands/pairing/GetCommissionerNodeIdCommand.h new file mode 100644 index 00000000000000..3234cfe456a956 --- /dev/null +++ b/examples/fabric-admin/commands/pairing/GetCommissionerNodeIdCommand.h @@ -0,0 +1,44 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "../common/CHIPCommand.h" +#include "../common/RemoteDataModelLogger.h" + +class GetCommissionerNodeIdCommand : public CHIPCommand +{ +public: + GetCommissionerNodeIdCommand(CredentialIssuerCommands * credIssuerCommands) : + CHIPCommand("get-commissioner-node-id", credIssuerCommands) + {} + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override + { + chip::NodeId id; + ReturnErrorOnFailure(GetIdentityNodeId(GetIdentity(), &id)); + ChipLogProgress(NotSpecified, "Commissioner Node Id 0x:" ChipLogFormatX64, ChipLogValueX64(id)); + + ReturnErrorOnFailure(RemoteDataModelLogger::LogGetCommissionerNodeId(id)); + SetCommandExitStatus(CHIP_NO_ERROR); + return CHIP_NO_ERROR; + } + + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(10); } +}; diff --git a/examples/fabric-admin/commands/pairing/GetCommissionerRootCertificateCommand.h b/examples/fabric-admin/commands/pairing/GetCommissionerRootCertificateCommand.h new file mode 100644 index 00000000000000..1d25efcc38224d --- /dev/null +++ b/examples/fabric-admin/commands/pairing/GetCommissionerRootCertificateCommand.h @@ -0,0 +1,53 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "../common/CHIPCommand.h" +#include "../common/RemoteDataModelLogger.h" + +#include "ToTLVCert.h" + +#include + +class GetCommissionerRootCertificateCommand : public CHIPCommand +{ +public: + GetCommissionerRootCertificateCommand(CredentialIssuerCommands * credIssuerCommands) : + CHIPCommand("get-commissioner-root-certificate", credIssuerCommands, + "Returns a base64-encoded RCAC prefixed with: 'base64:'") + {} + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override + { + chip::ByteSpan span; + ReturnErrorOnFailure(GetIdentityRootCertificate(GetIdentity(), span)); + + std::string rcac; + ReturnErrorOnFailure(ToTLVCert(span, rcac)); + ChipLogProgress(NotSpecified, "RCAC: %s", rcac.c_str()); + + ReturnErrorOnFailure(RemoteDataModelLogger::LogGetCommissionerRootCertificate(rcac.c_str())); + + SetCommandExitStatus(CHIP_NO_ERROR); + return CHIP_NO_ERROR; + } + + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(10); } +}; diff --git a/examples/fabric-admin/commands/pairing/IssueNOCChainCommand.h b/examples/fabric-admin/commands/pairing/IssueNOCChainCommand.h new file mode 100644 index 00000000000000..0103b26977136d --- /dev/null +++ b/examples/fabric-admin/commands/pairing/IssueNOCChainCommand.h @@ -0,0 +1,91 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "../common/CHIPCommand.h" +#include "../common/RemoteDataModelLogger.h" + +#include "ToTLVCert.h" + +#include + +class IssueNOCChainCommand : public CHIPCommand +{ +public: + IssueNOCChainCommand(CredentialIssuerCommands * credIssuerCommands) : + CHIPCommand("issue-noc-chain", credIssuerCommands, + "Returns a base64-encoded NOC, ICAC, RCAC, and IPK prefixed with: 'base64:'"), + mDeviceNOCChainCallback(OnDeviceNOCChainGeneration, this) + { + AddArgument("elements", &mNOCSRElements, "NOCSRElements encoded in hexadecimal"); + AddArgument("node-id", 0, UINT64_MAX, &mNodeId, "The target node id"); + } + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override + { + auto & commissioner = CurrentCommissioner(); + ReturnErrorOnFailure(commissioner.IssueNOCChain(mNOCSRElements, mNodeId, &mDeviceNOCChainCallback)); + return CHIP_NO_ERROR; + } + + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(10); } + + static void OnDeviceNOCChainGeneration(void * context, CHIP_ERROR status, const chip::ByteSpan & noc, + const chip::ByteSpan & icac, const chip::ByteSpan & rcac, + chip::Optional ipk, + chip::Optional adminSubject) + { + auto command = static_cast(context); + + auto err = status; + VerifyOrReturn(CHIP_NO_ERROR == err, command->SetCommandExitStatus(err)); + + std::string nocStr; + err = ToTLVCert(noc, nocStr); + VerifyOrReturn(CHIP_NO_ERROR == err, command->SetCommandExitStatus(err)); + ChipLogProgress(NotSpecified, "NOC: %s", nocStr.c_str()); + + std::string icacStr; + err = ToTLVCert(icac, icacStr); + VerifyOrReturn(CHIP_NO_ERROR == err, command->SetCommandExitStatus(err)); + ChipLogProgress(NotSpecified, "ICAC: %s", icacStr.c_str()); + + std::string rcacStr; + err = ToTLVCert(rcac, rcacStr); + VerifyOrReturn(CHIP_NO_ERROR == err, command->SetCommandExitStatus(err)); + ChipLogProgress(NotSpecified, "RCAC: %s", rcacStr.c_str()); + + std::string ipkStr; + if (ipk.HasValue()) + { + err = ToBase64(ipk.Value(), ipkStr); + VerifyOrReturn(CHIP_NO_ERROR == err, command->SetCommandExitStatus(err)); + } + ChipLogProgress(NotSpecified, "IPK: %s", ipkStr.c_str()); + + err = RemoteDataModelLogger::LogIssueNOCChain(nocStr.c_str(), icacStr.c_str(), rcacStr.c_str(), ipkStr.c_str()); + command->SetCommandExitStatus(err); + } + +private: + chip::Callback::Callback mDeviceNOCChainCallback; + chip::ByteSpan mNOCSRElements; + chip::NodeId mNodeId; +}; diff --git a/examples/fabric-admin/commands/pairing/OpenCommissioningWindowCommand.cpp b/examples/fabric-admin/commands/pairing/OpenCommissioningWindowCommand.cpp new file mode 100644 index 00000000000000..bc4af6c4a51cec --- /dev/null +++ b/examples/fabric-admin/commands/pairing/OpenCommissioningWindowCommand.cpp @@ -0,0 +1,62 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "OpenCommissioningWindowCommand.h" + +#include + +using namespace ::chip; + +CHIP_ERROR OpenCommissioningWindowCommand::RunCommand() +{ + mWindowOpener = Platform::MakeUnique(&CurrentCommissioner()); + if (mCommissioningWindowOption == Controller::CommissioningWindowOpener::CommissioningWindowOption::kOriginalSetupCode) + { + return mWindowOpener->OpenBasicCommissioningWindow(mNodeId, System::Clock::Seconds16(mCommissioningWindowTimeout), + &mOnOpenBasicCommissioningWindowCallback); + } + + if (mCommissioningWindowOption == Controller::CommissioningWindowOpener::CommissioningWindowOption::kTokenWithRandomPIN) + { + SetupPayload ignored; + return mWindowOpener->OpenCommissioningWindow(mNodeId, System::Clock::Seconds16(mCommissioningWindowTimeout), mIteration, + mDiscriminator, NullOptional, NullOptional, + &mOnOpenCommissioningWindowCallback, ignored, + /* readVIDPIDAttributes */ true); + } + + ChipLogError(NotSpecified, "Unknown commissioning window option: %d", to_underlying(mCommissioningWindowOption)); + return CHIP_ERROR_INVALID_ARGUMENT; +} + +void OpenCommissioningWindowCommand::OnOpenCommissioningWindowResponse(void * context, NodeId remoteId, CHIP_ERROR err, + chip::SetupPayload payload) +{ + LogErrorOnFailure(err); + + OnOpenBasicCommissioningWindowResponse(context, remoteId, err); +} + +void OpenCommissioningWindowCommand::OnOpenBasicCommissioningWindowResponse(void * context, NodeId remoteId, CHIP_ERROR err) +{ + LogErrorOnFailure(err); + + OpenCommissioningWindowCommand * command = reinterpret_cast(context); + VerifyOrReturn(command != nullptr, ChipLogError(NotSpecified, "OnOpenCommissioningWindowCommand: context is null")); + command->SetCommandExitStatus(err); +} diff --git a/examples/fabric-admin/commands/pairing/OpenCommissioningWindowCommand.h b/examples/fabric-admin/commands/pairing/OpenCommissioningWindowCommand.h new file mode 100644 index 00000000000000..99b179d8753125 --- /dev/null +++ b/examples/fabric-admin/commands/pairing/OpenCommissioningWindowCommand.h @@ -0,0 +1,67 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "../common/CHIPCommand.h" + +#include +#include + +class OpenCommissioningWindowCommand : public CHIPCommand +{ +public: + OpenCommissioningWindowCommand(CredentialIssuerCommands * credIssuerCommands) : + CHIPCommand("open-commissioning-window", credIssuerCommands), + mOnOpenCommissioningWindowCallback(OnOpenCommissioningWindowResponse, this), + mOnOpenBasicCommissioningWindowCallback(OnOpenBasicCommissioningWindowResponse, this) + { + AddArgument("node-id", 0, UINT64_MAX, &mNodeId, "Node to send command to."); + AddArgument("option", 0, 2, &mCommissioningWindowOption, + "1 to use Enhanced Commissioning Method.\n 0 to use Basic Commissioning Method."); + AddArgument("window-timeout", 0, UINT16_MAX, &mCommissioningWindowTimeout, + "Time, in seconds, before the commissioning window closes."); + AddArgument("iteration", chip::Crypto::kSpake2p_Min_PBKDF_Iterations, chip::Crypto::kSpake2p_Max_PBKDF_Iterations, + &mIteration, "Number of PBKDF iterations to use to derive the verifier. Ignored if 'option' is 0."); + AddArgument("discriminator", 0, 4096, &mDiscriminator, "Discriminator to use for advertising. Ignored if 'option' is 0."); + AddArgument("timeout", 0, UINT16_MAX, &mTimeout, "Time, in seconds, before this command is considered to have timed out."); + } + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override; + // We issue multiple data model operations for this command, and the default + // timeout for those is 10 seconds, so default to 20 seconds. + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(mTimeout.ValueOr(20)); } + +private: + NodeId mNodeId; + chip::Controller::CommissioningWindowOpener::CommissioningWindowOption mCommissioningWindowOption; + uint16_t mCommissioningWindowTimeout; + uint32_t mIteration; + uint16_t mDiscriminator; + + chip::Optional mTimeout; + + chip::Platform::UniquePtr mWindowOpener; + + static void OnOpenCommissioningWindowResponse(void * context, NodeId deviceId, CHIP_ERROR status, chip::SetupPayload payload); + static void OnOpenBasicCommissioningWindowResponse(void * context, NodeId deviceId, CHIP_ERROR status); + + chip::Callback::Callback mOnOpenCommissioningWindowCallback; + chip::Callback::Callback mOnOpenBasicCommissioningWindowCallback; +}; diff --git a/examples/fabric-admin/commands/pairing/PairingCommand.cpp b/examples/fabric-admin/commands/pairing/PairingCommand.cpp new file mode 100644 index 00000000000000..80775f0853d110 --- /dev/null +++ b/examples/fabric-admin/commands/pairing/PairingCommand.cpp @@ -0,0 +1,551 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "PairingCommand.h" +#include "platform/PlatformManager.h" +#include +#include +#include +#include +#include +#include + +#include +#include + +#include + +using namespace ::chip; +using namespace ::chip::Controller; + +CHIP_ERROR PairingCommand::RunCommand() +{ + CurrentCommissioner().RegisterPairingDelegate(this); + // Clear the CATs in OperationalCredentialsIssuer + mCredIssuerCmds->SetCredentialIssuerCATValues(kUndefinedCATs); + + mDeviceIsICD = false; + + if (mCASEAuthTags.HasValue() && mCASEAuthTags.Value().size() <= kMaxSubjectCATAttributeCount) + { + CATValues cats = kUndefinedCATs; + for (size_t index = 0; index < mCASEAuthTags.Value().size(); ++index) + { + cats.values[index] = mCASEAuthTags.Value()[index]; + } + if (cats.AreValid()) + { + mCredIssuerCmds->SetCredentialIssuerCATValues(cats); + } + } + return RunInternal(mNodeId); +} + +CHIP_ERROR PairingCommand::RunInternal(NodeId remoteId) +{ + CHIP_ERROR err = CHIP_NO_ERROR; + + switch (mPairingMode) + { + case PairingMode::None: + err = Unpair(remoteId); + break; + case PairingMode::Code: + err = PairWithCode(remoteId); + break; + case PairingMode::CodePaseOnly: + err = PaseWithCode(remoteId); + break; + case PairingMode::Ble: + err = Pair(remoteId, PeerAddress::BLE()); + break; + case PairingMode::OnNetwork: + err = PairWithMdns(remoteId); + break; + case PairingMode::SoftAP: + err = Pair(remoteId, PeerAddress::UDP(mRemoteAddr.address, mRemotePort, mRemoteAddr.interfaceId)); + break; + case PairingMode::AlreadyDiscovered: + err = Pair(remoteId, PeerAddress::UDP(mRemoteAddr.address, mRemotePort, mRemoteAddr.interfaceId)); + break; + case PairingMode::AlreadyDiscoveredByIndex: + err = PairWithMdnsOrBleByIndex(remoteId, mIndex); + break; + case PairingMode::AlreadyDiscoveredByIndexWithCode: + err = PairWithMdnsOrBleByIndexWithCode(remoteId, mIndex); + break; + } + + return err; +} + +CommissioningParameters PairingCommand::GetCommissioningParameters() +{ + auto params = CommissioningParameters(); + params.SetSkipCommissioningComplete(mSkipCommissioningComplete.ValueOr(false)); + if (mBypassAttestationVerifier.ValueOr(false)) + { + params.SetDeviceAttestationDelegate(this); + } + + switch (mNetworkType) + { + case PairingNetworkType::WiFi: + params.SetWiFiCredentials(Controller::WiFiCredentials(mSSID, mPassword)); + break; + case PairingNetworkType::Thread: + params.SetThreadOperationalDataset(mOperationalDataset); + break; + case PairingNetworkType::None: + break; + } + + if (mCountryCode.HasValue()) + { + params.SetCountryCode(CharSpan::fromCharString(mCountryCode.Value())); + } + + // mTimeZoneList is an optional argument managed by TypedComplexArgument mComplex_TimeZones. + // Since optional Complex arguments are not currently supported via the class, + // we will use mTimeZoneList.data() value to determine if the argument was provided. + if (mTimeZoneList.data()) + { + params.SetTimeZone(mTimeZoneList); + } + + // miDSTOffsetList is an optional argument managed by TypedComplexArgument mComplex_DSTOffsets. + // Since optional Complex arguments are not currently supported via the class, + // we will use mTimeZoneList.data() value to determine if the argument was provided. + if (mDSTOffsetList.data()) + { + params.SetDSTOffsets(mDSTOffsetList); + } + + if (mICDRegistration.ValueOr(false)) + { + params.SetICDRegistrationStrategy(ICDRegistrationStrategy::kBeforeComplete); + + if (!mICDSymmetricKey.HasValue()) + { + chip::Crypto::DRBG_get_bytes(mRandomGeneratedICDSymmetricKey, sizeof(mRandomGeneratedICDSymmetricKey)); + mICDSymmetricKey.SetValue(ByteSpan(mRandomGeneratedICDSymmetricKey)); + } + if (!mICDCheckInNodeId.HasValue()) + { + mICDCheckInNodeId.SetValue(CurrentCommissioner().GetNodeId()); + } + if (!mICDMonitoredSubject.HasValue()) + { + mICDMonitoredSubject.SetValue(mICDCheckInNodeId.Value()); + } + // These Optionals must have values now. + // The commissioner will verify these values. + params.SetICDSymmetricKey(mICDSymmetricKey.Value()); + if (mICDStayActiveDurationMsec.HasValue()) + { + params.SetICDStayActiveDurationMsec(mICDStayActiveDurationMsec.Value()); + } + params.SetICDCheckInNodeId(mICDCheckInNodeId.Value()); + params.SetICDMonitoredSubject(mICDMonitoredSubject.Value()); + } + + return params; +} + +CHIP_ERROR PairingCommand::PaseWithCode(NodeId remoteId) +{ + auto discoveryType = DiscoveryType::kAll; + if (mUseOnlyOnNetworkDiscovery.ValueOr(false)) + { + discoveryType = DiscoveryType::kDiscoveryNetworkOnly; + } + + if (mDiscoverOnce.ValueOr(false)) + { + discoveryType = DiscoveryType::kDiscoveryNetworkOnlyWithoutPASEAutoRetry; + } + + return CurrentCommissioner().EstablishPASEConnection(remoteId, mOnboardingPayload, discoveryType); +} + +CHIP_ERROR PairingCommand::PairWithCode(NodeId remoteId) +{ + CommissioningParameters commissioningParams = GetCommissioningParameters(); + + // If no network discovery behavior and no network credentials are provided, assume that the pairing command is trying to pair + // with an on-network device. + if (!mUseOnlyOnNetworkDiscovery.HasValue()) + { + auto threadCredentials = commissioningParams.GetThreadOperationalDataset(); + auto wiFiCredentials = commissioningParams.GetWiFiCredentials(); + mUseOnlyOnNetworkDiscovery.SetValue(!threadCredentials.HasValue() && !wiFiCredentials.HasValue()); + } + + auto discoveryType = DiscoveryType::kAll; + if (mUseOnlyOnNetworkDiscovery.ValueOr(false)) + { + discoveryType = DiscoveryType::kDiscoveryNetworkOnly; + } + + if (mDiscoverOnce.ValueOr(false)) + { + discoveryType = DiscoveryType::kDiscoveryNetworkOnlyWithoutPASEAutoRetry; + } + + return CurrentCommissioner().PairDevice(remoteId, mOnboardingPayload, commissioningParams, discoveryType); +} + +CHIP_ERROR PairingCommand::Pair(NodeId remoteId, PeerAddress address) +{ + auto params = RendezvousParameters().SetSetupPINCode(mSetupPINCode).SetDiscriminator(mDiscriminator).SetPeerAddress(address); + + CHIP_ERROR err = CHIP_NO_ERROR; + if (mPaseOnly.ValueOr(false)) + { + err = CurrentCommissioner().EstablishPASEConnection(remoteId, params); + } + else + { + auto commissioningParams = GetCommissioningParameters(); + err = CurrentCommissioner().PairDevice(remoteId, params, commissioningParams); + } + return err; +} + +CHIP_ERROR PairingCommand::PairWithMdnsOrBleByIndex(NodeId remoteId, uint16_t index) +{ +#if CHIP_DEVICE_LAYER_TARGET_DARWIN + VerifyOrReturnError(IsInteractive(), CHIP_ERROR_INCORRECT_STATE); + + RendezvousParameters params; + ReturnErrorOnFailure(GetDeviceScanner().Get(index, params)); + params.SetSetupPINCode(mSetupPINCode); + + CHIP_ERROR err = CHIP_NO_ERROR; + if (mPaseOnly.ValueOr(false)) + { + err = CurrentCommissioner().EstablishPASEConnection(remoteId, params); + } + else + { + auto commissioningParams = GetCommissioningParameters(); + err = CurrentCommissioner().PairDevice(remoteId, params, commissioningParams); + } + return err; +#else + return CHIP_ERROR_NOT_IMPLEMENTED; +#endif // CHIP_DEVICE_LAYER_TARGET_DARWIN +} + +CHIP_ERROR PairingCommand::PairWithMdnsOrBleByIndexWithCode(NodeId remoteId, uint16_t index) +{ +#if CHIP_DEVICE_LAYER_TARGET_DARWIN + VerifyOrReturnError(IsInteractive(), CHIP_ERROR_INCORRECT_STATE); + + Dnssd::CommonResolutionData resolutionData; + auto err = GetDeviceScanner().Get(index, resolutionData); + if (CHIP_ERROR_NOT_FOUND == err) + { + // There is no device with this index that has some resolution data. This could simply + // be because the device is a ble device. In this case let's fall back to looking for + // a device with this index and some RendezvousParameters. + chip::SetupPayload payload; + bool isQRCode = strncmp(mOnboardingPayload, kQRCodePrefix, strlen(kQRCodePrefix)) == 0; + if (isQRCode) + { + ReturnErrorOnFailure(QRCodeSetupPayloadParser(mOnboardingPayload).populatePayload(payload)); + VerifyOrReturnError(payload.isValidQRCodePayload(), CHIP_ERROR_INVALID_ARGUMENT); + } + else + { + ReturnErrorOnFailure(ManualSetupPayloadParser(mOnboardingPayload).populatePayload(payload)); + VerifyOrReturnError(payload.isValidManualCode(), CHIP_ERROR_INVALID_ARGUMENT); + } + + mSetupPINCode = payload.setUpPINCode; + return PairWithMdnsOrBleByIndex(remoteId, index); + } + + err = CHIP_NO_ERROR; + if (mPaseOnly.ValueOr(false)) + { + err = CurrentCommissioner().EstablishPASEConnection(remoteId, mOnboardingPayload, DiscoveryType::kDiscoveryNetworkOnly, + MakeOptional(resolutionData)); + } + else + { + auto commissioningParams = GetCommissioningParameters(); + err = CurrentCommissioner().PairDevice(remoteId, mOnboardingPayload, commissioningParams, + DiscoveryType::kDiscoveryNetworkOnly, MakeOptional(resolutionData)); + } + return err; +#else + return CHIP_ERROR_NOT_IMPLEMENTED; +#endif // CHIP_DEVICE_LAYER_TARGET_DARWIN +} + +CHIP_ERROR PairingCommand::PairWithMdns(NodeId remoteId) +{ + Dnssd::DiscoveryFilter filter(mFilterType); + switch (mFilterType) + { + case chip::Dnssd::DiscoveryFilterType::kNone: + break; + case chip::Dnssd::DiscoveryFilterType::kShortDiscriminator: + case chip::Dnssd::DiscoveryFilterType::kLongDiscriminator: + case chip::Dnssd::DiscoveryFilterType::kCompressedFabricId: + case chip::Dnssd::DiscoveryFilterType::kVendorId: + case chip::Dnssd::DiscoveryFilterType::kDeviceType: + filter.code = mDiscoveryFilterCode; + break; + case chip::Dnssd::DiscoveryFilterType::kCommissioningMode: + break; + case chip::Dnssd::DiscoveryFilterType::kCommissioner: + filter.code = 1; + break; + case chip::Dnssd::DiscoveryFilterType::kInstanceName: + filter.code = 0; + filter.instanceName = mDiscoveryFilterInstanceName; + break; + } + + CurrentCommissioner().RegisterDeviceDiscoveryDelegate(this); + return CurrentCommissioner().DiscoverCommissionableNodes(filter); +} + +CHIP_ERROR PairingCommand::Unpair(NodeId remoteId) +{ + mCurrentFabricRemover = Platform::MakeUnique(&CurrentCommissioner()); + return mCurrentFabricRemover->RemoveCurrentFabric(remoteId, &mCurrentFabricRemoveCallback); +} + +void PairingCommand::OnStatusUpdate(DevicePairingDelegate::Status status) +{ + switch (status) + { + case DevicePairingDelegate::Status::SecurePairingSuccess: + ChipLogProgress(NotSpecified, "Secure Pairing Success"); + ChipLogProgress(NotSpecified, "CASE establishment successful"); + break; + case DevicePairingDelegate::Status::SecurePairingFailed: + ChipLogError(NotSpecified, "Secure Pairing Failed"); + SetCommandExitStatus(CHIP_ERROR_INCORRECT_STATE); + break; + } +} + +void PairingCommand::OnPairingComplete(CHIP_ERROR err) +{ + if (err == CHIP_NO_ERROR) + { + ChipLogProgress(NotSpecified, "Pairing Success"); + ChipLogProgress(NotSpecified, "PASE establishment successful"); + if (mPairingMode == PairingMode::CodePaseOnly || mPaseOnly.ValueOr(false)) + { + SetCommandExitStatus(err); + } + } + else + { + ChipLogProgress(NotSpecified, "Pairing Failure: %s", ErrorStr(err)); + } + + if (err != CHIP_NO_ERROR) + { + SetCommandExitStatus(err); + } +} + +void PairingCommand::OnPairingDeleted(CHIP_ERROR err) +{ + if (err == CHIP_NO_ERROR) + { + ChipLogProgress(NotSpecified, "Pairing Deleted Success"); + } + else + { + ChipLogProgress(NotSpecified, "Pairing Deleted Failure: %s", ErrorStr(err)); + } + + SetCommandExitStatus(err); +} + +void PairingCommand::OnCommissioningComplete(NodeId nodeId, CHIP_ERROR err) +{ + if (err == CHIP_NO_ERROR) + { + ChipLogProgress(NotSpecified, "Device commissioning completed with success"); + } + else + { + // When ICD device commissioning fails, the ICDClientInfo stored in OnICDRegistrationComplete needs to be removed. + if (mDeviceIsICD) + { + CHIP_ERROR deleteEntryError = + CHIPCommand::sICDClientStorage.DeleteEntry(ScopedNodeId(mNodeId, CurrentCommissioner().GetFabricIndex())); + if (deleteEntryError != CHIP_NO_ERROR) + { + ChipLogError(NotSpecified, "Failed to delete ICD entry: %s", ErrorStr(err)); + } + } + ChipLogProgress(NotSpecified, "Device commissioning Failure: %s", ErrorStr(err)); + } + + SetCommandExitStatus(err); +} + +void PairingCommand::OnReadCommissioningInfo(const Controller::ReadCommissioningInfo & info) +{ + ChipLogProgress(AppServer, "OnReadCommissioningInfo - vendorId=0x%04X productId=0x%04X", info.basic.vendorId, + info.basic.productId); + + // The string in CharSpan received from the device is not null-terminated, we use std::string here for coping and + // appending a numm-terminator at the end of the string. + std::string userActiveModeTriggerInstruction; + + // Note: the callback doesn't own the buffer, should make a copy if it will be used it later. + if (info.icd.userActiveModeTriggerInstruction.size() != 0) + { + userActiveModeTriggerInstruction = + std::string(info.icd.userActiveModeTriggerInstruction.data(), info.icd.userActiveModeTriggerInstruction.size()); + } + + if (info.icd.userActiveModeTriggerHint.HasAny()) + { + ChipLogProgress(AppServer, "OnReadCommissioningInfo - LIT UserActiveModeTriggerHint=0x%08x", + info.icd.userActiveModeTriggerHint.Raw()); + ChipLogProgress(AppServer, "OnReadCommissioningInfo - LIT UserActiveModeTriggerInstruction=%s", + userActiveModeTriggerInstruction.c_str()); + } + ChipLogProgress(AppServer, "OnReadCommissioningInfo ICD - IdleModeDuration=%u activeModeDuration=%u activeModeThreshold=%u", + info.icd.idleModeDuration, info.icd.activeModeDuration, info.icd.activeModeThreshold); +} + +void PairingCommand::OnICDRegistrationComplete(NodeId nodeId, uint32_t icdCounter) +{ + char icdSymmetricKeyHex[chip::Crypto::kAES_CCM128_Key_Length * 2 + 1]; + + chip::Encoding::BytesToHex(mICDSymmetricKey.Value().data(), mICDSymmetricKey.Value().size(), icdSymmetricKeyHex, + sizeof(icdSymmetricKeyHex), chip::Encoding::HexFlags::kNullTerminate); + + app::ICDClientInfo clientInfo; + clientInfo.peer_node = ScopedNodeId(nodeId, CurrentCommissioner().GetFabricIndex()); + clientInfo.monitored_subject = mICDMonitoredSubject.Value(); + clientInfo.start_icd_counter = icdCounter; + + CHIP_ERROR err = CHIPCommand::sICDClientStorage.SetKey(clientInfo, mICDSymmetricKey.Value()); + if (err == CHIP_NO_ERROR) + { + err = CHIPCommand::sICDClientStorage.StoreEntry(clientInfo); + } + + if (err != CHIP_NO_ERROR) + { + CHIPCommand::sICDClientStorage.RemoveKey(clientInfo); + ChipLogError(NotSpecified, "Failed to persist symmetric key for " ChipLogFormatX64 ": %s", ChipLogValueX64(nodeId), + err.AsString()); + SetCommandExitStatus(err); + return; + } + + mDeviceIsICD = true; + + ChipLogProgress(NotSpecified, "Saved ICD Symmetric key for " ChipLogFormatX64, ChipLogValueX64(nodeId)); + ChipLogProgress(NotSpecified, + "ICD Registration Complete for device " ChipLogFormatX64 " / Check-In NodeID: " ChipLogFormatX64 + " / Monitored Subject: " ChipLogFormatX64 " / Symmetric Key: %s / ICDCounter %u", + ChipLogValueX64(nodeId), ChipLogValueX64(mICDCheckInNodeId.Value()), + ChipLogValueX64(mICDMonitoredSubject.Value()), icdSymmetricKeyHex, icdCounter); +} + +void PairingCommand::OnICDStayActiveComplete(NodeId deviceId, uint32_t promisedActiveDuration) +{ + ChipLogProgress(NotSpecified, "ICD Stay Active Complete for device " ChipLogFormatX64 " / promisedActiveDuration: %u", + ChipLogValueX64(deviceId), promisedActiveDuration); +} + +void PairingCommand::OnDiscoveredDevice(const chip::Dnssd::CommissionNodeData & nodeData) +{ + // Ignore nodes with closed commissioning window + VerifyOrReturn(nodeData.commissioningMode != 0); + + auto & resolutionData = nodeData; + + const uint16_t port = resolutionData.port; + char buf[chip::Inet::IPAddress::kMaxStringLength]; + resolutionData.ipAddress[0].ToString(buf); + ChipLogProgress(NotSpecified, "Discovered Device: %s:%u", buf, port); + + // Stop Mdns discovery. + auto err = CurrentCommissioner().StopCommissionableDiscovery(); + + // Some platforms does not implement a mechanism to stop mdns browse, so + // we just ignore CHIP_ERROR_NOT_IMPLEMENTED instead of bailing out. + if (CHIP_NO_ERROR != err && CHIP_ERROR_NOT_IMPLEMENTED != err) + { + SetCommandExitStatus(err); + return; + } + + CurrentCommissioner().RegisterDeviceDiscoveryDelegate(nullptr); + + auto interfaceId = resolutionData.ipAddress[0].IsIPv6LinkLocal() ? resolutionData.interfaceId : Inet::InterfaceId::Null(); + auto peerAddress = PeerAddress::UDP(resolutionData.ipAddress[0], port, interfaceId); + err = Pair(mNodeId, peerAddress); + if (CHIP_NO_ERROR != err) + { + SetCommandExitStatus(err); + } +} + +void PairingCommand::OnCurrentFabricRemove(void * context, NodeId nodeId, CHIP_ERROR err) +{ + PairingCommand * command = reinterpret_cast(context); + VerifyOrReturn(command != nullptr, ChipLogError(NotSpecified, "OnCurrentFabricRemove: context is null")); + + if (err == CHIP_NO_ERROR) + { + ChipLogProgress(NotSpecified, "Device unpair completed with success: " ChipLogFormatX64, ChipLogValueX64(nodeId)); + } + else + { + ChipLogProgress(NotSpecified, "Device unpair Failure: " ChipLogFormatX64 " %s", ChipLogValueX64(nodeId), ErrorStr(err)); + } + + command->SetCommandExitStatus(err); +} + +chip::Optional PairingCommand::FailSafeExpiryTimeoutSecs() const +{ + // We don't need to set additional failsafe timeout as we don't ask the final user if he wants to continue + return chip::Optional(); +} + +void PairingCommand::OnDeviceAttestationCompleted(chip::Controller::DeviceCommissioner * deviceCommissioner, + chip::DeviceProxy * device, + const chip::Credentials::DeviceAttestationVerifier::AttestationDeviceInfo & info, + chip::Credentials::AttestationVerificationResult attestationResult) +{ + // Bypass attestation verification, continue with success + auto err = deviceCommissioner->ContinueCommissioningAfterDeviceAttestation( + device, chip::Credentials::AttestationVerificationResult::kSuccess); + if (CHIP_NO_ERROR != err) + { + SetCommandExitStatus(err); + } +} diff --git a/examples/fabric-admin/commands/pairing/PairingCommand.h b/examples/fabric-admin/commands/pairing/PairingCommand.h new file mode 100644 index 00000000000000..4ff3903253be4e --- /dev/null +++ b/examples/fabric-admin/commands/pairing/PairingCommand.h @@ -0,0 +1,268 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include "../common/CHIPCommand.h" +#include +#include + +#include +#include +#include + +enum class PairingMode +{ + None, + Code, + CodePaseOnly, + Ble, + SoftAP, + AlreadyDiscovered, + AlreadyDiscoveredByIndex, + AlreadyDiscoveredByIndexWithCode, + OnNetwork, +}; + +enum class PairingNetworkType +{ + None, + WiFi, + Thread, +}; + +class PairingCommand : public CHIPCommand, + public chip::Controller::DevicePairingDelegate, + public chip::Controller::DeviceDiscoveryDelegate, + public chip::Credentials::DeviceAttestationDelegate +{ +public: + PairingCommand(const char * commandName, PairingMode mode, PairingNetworkType networkType, + CredentialIssuerCommands * credIssuerCmds, + chip::Dnssd::DiscoveryFilterType filterType = chip::Dnssd::DiscoveryFilterType::kNone) : + CHIPCommand(commandName, credIssuerCmds), + mPairingMode(mode), mNetworkType(networkType), mFilterType(filterType), + mRemoteAddr{ IPAddress::Any, chip::Inet::InterfaceId::Null() }, mComplex_TimeZones(&mTimeZoneList), + mComplex_DSTOffsets(&mDSTOffsetList), mCurrentFabricRemoveCallback(OnCurrentFabricRemove, this) + { + AddArgument("node-id", 0, UINT64_MAX, &mNodeId); + AddArgument("bypass-attestation-verifier", 0, 1, &mBypassAttestationVerifier, + "Bypass the attestation verifier. If not provided or false, the attestation verifier is not bypassed." + " If true, the commissioning will continue in case of attestation verification failure."); + AddArgument("case-auth-tags", 1, UINT32_MAX, &mCASEAuthTags, "The CATs to be encoded in the NOC sent to the commissionee"); + AddArgument("icd-registration", 0, 1, &mICDRegistration, + "Whether to register for check-ins from ICDs during commissioning. Default: false"); + AddArgument("icd-check-in-nodeid", 0, UINT64_MAX, &mICDCheckInNodeId, + "The check-in node id for the ICD, default: node id of the commissioner."); + AddArgument("icd-monitored-subject", 0, UINT64_MAX, &mICDMonitoredSubject, + "The monitored subject of the ICD, default: The node id used for icd-check-in-nodeid."); + AddArgument("icd-symmetric-key", &mICDSymmetricKey, "The 16 bytes ICD symmetric key, default: randomly generated."); + AddArgument("icd-stay-active-duration", 0, UINT32_MAX, &mICDStayActiveDurationMsec, + "If set, a LIT ICD that is commissioned will be requested to stay active for this many milliseconds"); + switch (networkType) + { + case PairingNetworkType::None: + break; + case PairingNetworkType::WiFi: + AddArgument("ssid", &mSSID); + AddArgument("password", &mPassword); + break; + case PairingNetworkType::Thread: + AddArgument("operationalDataset", &mOperationalDataset); + break; + } + + switch (mode) + { + case PairingMode::None: + break; + case PairingMode::Code: + AddArgument("skip-commissioning-complete", 0, 1, &mSkipCommissioningComplete); + FALLTHROUGH; + case PairingMode::CodePaseOnly: + AddArgument("payload", &mOnboardingPayload); + AddArgument("discover-once", 0, 1, &mDiscoverOnce); + AddArgument("use-only-onnetwork-discovery", 0, 1, &mUseOnlyOnNetworkDiscovery); + break; + case PairingMode::Ble: + AddArgument("skip-commissioning-complete", 0, 1, &mSkipCommissioningComplete); + AddArgument("setup-pin-code", 0, 134217727, &mSetupPINCode); + AddArgument("discriminator", 0, 4096, &mDiscriminator); + break; + case PairingMode::OnNetwork: + AddArgument("skip-commissioning-complete", 0, 1, &mSkipCommissioningComplete); + AddArgument("setup-pin-code", 0, 134217727, &mSetupPINCode); + AddArgument("pase-only", 0, 1, &mPaseOnly); + break; + case PairingMode::SoftAP: + AddArgument("skip-commissioning-complete", 0, 1, &mSkipCommissioningComplete); + AddArgument("setup-pin-code", 0, 134217727, &mSetupPINCode); + AddArgument("discriminator", 0, 4096, &mDiscriminator); + AddArgument("device-remote-ip", &mRemoteAddr); + AddArgument("device-remote-port", 0, UINT16_MAX, &mRemotePort); + AddArgument("pase-only", 0, 1, &mPaseOnly); + break; + case PairingMode::AlreadyDiscovered: + AddArgument("skip-commissioning-complete", 0, 1, &mSkipCommissioningComplete); + AddArgument("setup-pin-code", 0, 134217727, &mSetupPINCode); + AddArgument("device-remote-ip", &mRemoteAddr); + AddArgument("device-remote-port", 0, UINT16_MAX, &mRemotePort); + AddArgument("pase-only", 0, 1, &mPaseOnly); + break; + case PairingMode::AlreadyDiscoveredByIndex: + AddArgument("skip-commissioning-complete", 0, 1, &mSkipCommissioningComplete); + AddArgument("setup-pin-code", 0, 134217727, &mSetupPINCode); + AddArgument("index", 0, UINT16_MAX, &mIndex); + AddArgument("pase-only", 0, 1, &mPaseOnly); + break; + case PairingMode::AlreadyDiscoveredByIndexWithCode: + AddArgument("skip-commissioning-complete", 0, 1, &mSkipCommissioningComplete); + AddArgument("payload", &mOnboardingPayload); + AddArgument("index", 0, UINT16_MAX, &mIndex); + AddArgument("pase-only", 0, 1, &mPaseOnly); + break; + } + + switch (filterType) + { + case chip::Dnssd::DiscoveryFilterType::kNone: + break; + case chip::Dnssd::DiscoveryFilterType::kShortDiscriminator: + AddArgument("discriminator", 0, 15, &mDiscoveryFilterCode); + break; + case chip::Dnssd::DiscoveryFilterType::kLongDiscriminator: + AddArgument("discriminator", 0, 4096, &mDiscoveryFilterCode); + break; + case chip::Dnssd::DiscoveryFilterType::kVendorId: + AddArgument("vendor-id", 0, UINT16_MAX, &mDiscoveryFilterCode); + break; + case chip::Dnssd::DiscoveryFilterType::kCompressedFabricId: + AddArgument("fabric-id", 0, UINT64_MAX, &mDiscoveryFilterCode); + break; + case chip::Dnssd::DiscoveryFilterType::kCommissioningMode: + case chip::Dnssd::DiscoveryFilterType::kCommissioner: + break; + case chip::Dnssd::DiscoveryFilterType::kDeviceType: + AddArgument("device-type", 0, UINT16_MAX, &mDiscoveryFilterCode); + break; + case chip::Dnssd::DiscoveryFilterType::kInstanceName: + AddArgument("name", &mDiscoveryFilterInstanceName); + break; + } + + if (mode != PairingMode::None) + { + AddArgument("country-code", &mCountryCode, + "Country code to use to set the Basic Information cluster's Location attribute"); + + // mTimeZoneList is an optional argument managed by TypedComplexArgument mComplex_TimeZones. + // Since optional Complex arguments are not currently supported via the class, + // we explicitly set the kOptional flag. + AddArgument("time-zone", &mComplex_TimeZones, + "TimeZone list to use when setting Time Synchronization cluster's TimeZone attribute", Argument::kOptional); + + // mDSTOffsetList is an optional argument managed by TypedComplexArgument mComplex_DSTOffsets. + // Since optional Complex arguments are not currently supported via the class, + // we explicitly set the kOptional flag. + AddArgument("dst-offset", &mComplex_DSTOffsets, + "DSTOffset list to use when setting Time Synchronization cluster's DSTOffset attribute", + Argument::kOptional); + } + + AddArgument("timeout", 0, UINT16_MAX, &mTimeout); + } + + /////////// CHIPCommand Interface ///////// + CHIP_ERROR RunCommand() override; + chip::System::Clock::Timeout GetWaitDuration() const override { return chip::System::Clock::Seconds16(mTimeout.ValueOr(120)); } + + /////////// DevicePairingDelegate Interface ///////// + void OnStatusUpdate(chip::Controller::DevicePairingDelegate::Status status) override; + void OnPairingComplete(CHIP_ERROR error) override; + void OnPairingDeleted(CHIP_ERROR error) override; + void OnReadCommissioningInfo(const chip::Controller::ReadCommissioningInfo & info) override; + void OnCommissioningComplete(NodeId deviceId, CHIP_ERROR error) override; + void OnICDRegistrationComplete(NodeId deviceId, uint32_t icdCounter) override; + void OnICDStayActiveComplete(NodeId deviceId, uint32_t promisedActiveDuration) override; + + /////////// DeviceDiscoveryDelegate Interface ///////// + void OnDiscoveredDevice(const chip::Dnssd::CommissionNodeData & nodeData) override; + + /////////// DeviceAttestationDelegate ///////// + chip::Optional FailSafeExpiryTimeoutSecs() const override; + void OnDeviceAttestationCompleted(chip::Controller::DeviceCommissioner * deviceCommissioner, chip::DeviceProxy * device, + const chip::Credentials::DeviceAttestationVerifier::AttestationDeviceInfo & info, + chip::Credentials::AttestationVerificationResult attestationResult) override; + +private: + CHIP_ERROR RunInternal(NodeId remoteId); + CHIP_ERROR Pair(NodeId remoteId, PeerAddress address); + CHIP_ERROR PairWithMdns(NodeId remoteId); + CHIP_ERROR PairWithCode(NodeId remoteId); + CHIP_ERROR PaseWithCode(NodeId remoteId); + CHIP_ERROR PairWithMdnsOrBleByIndex(NodeId remoteId, uint16_t index); + CHIP_ERROR PairWithMdnsOrBleByIndexWithCode(NodeId remoteId, uint16_t index); + CHIP_ERROR Unpair(NodeId remoteId); + chip::Controller::CommissioningParameters GetCommissioningParameters(); + + const PairingMode mPairingMode; + const PairingNetworkType mNetworkType; + const chip::Dnssd::DiscoveryFilterType mFilterType; + Command::AddressWithInterface mRemoteAddr; + NodeId mNodeId; + chip::Optional mTimeout; + chip::Optional mDiscoverOnce; + chip::Optional mUseOnlyOnNetworkDiscovery; + chip::Optional mPaseOnly; + chip::Optional mSkipCommissioningComplete; + chip::Optional mBypassAttestationVerifier; + chip::Optional> mCASEAuthTags; + chip::Optional mCountryCode; + chip::Optional mICDRegistration; + chip::Optional mICDCheckInNodeId; + chip::Optional mICDSymmetricKey; + chip::Optional mICDMonitoredSubject; + chip::Optional mICDStayActiveDurationMsec; + chip::app::DataModel::List mTimeZoneList; + TypedComplexArgument> + mComplex_TimeZones; + chip::app::DataModel::List mDSTOffsetList; + TypedComplexArgument> + mComplex_DSTOffsets; + + uint16_t mRemotePort; + uint16_t mDiscriminator; + uint32_t mSetupPINCode; + uint16_t mIndex; + chip::ByteSpan mOperationalDataset; + chip::ByteSpan mSSID; + chip::ByteSpan mPassword; + char * mOnboardingPayload; + uint64_t mDiscoveryFilterCode; + char * mDiscoveryFilterInstanceName; + + bool mDeviceIsICD; + uint8_t mRandomGeneratedICDSymmetricKey[chip::Crypto::kAES_CCM128_Key_Length]; + + // For unpair + chip::Platform::UniquePtr mCurrentFabricRemover; + chip::Callback::Callback mCurrentFabricRemoveCallback; + + static void OnCurrentFabricRemove(void * context, NodeId remoteNodeId, CHIP_ERROR status); + void PersistIcdInfo(); +}; diff --git a/examples/fabric-admin/commands/pairing/ToTLVCert.cpp b/examples/fabric-admin/commands/pairing/ToTLVCert.cpp new file mode 100644 index 00000000000000..01f9156f744593 --- /dev/null +++ b/examples/fabric-admin/commands/pairing/ToTLVCert.cpp @@ -0,0 +1,54 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "ToTLVCert.h" + +#include +#include + +#include + +constexpr char kBase64Header[] = "base64:"; +constexpr size_t kBase64HeaderLen = ArraySize(kBase64Header) - 1; + +CHIP_ERROR ToBase64(const chip::ByteSpan & input, std::string & outputAsPrefixedBase64) +{ + chip::Platform::ScopedMemoryBuffer base64String; + base64String.Alloc(kBase64HeaderLen + BASE64_ENCODED_LEN(input.size()) + 1); + VerifyOrReturnError(base64String.Get() != nullptr, CHIP_ERROR_NO_MEMORY); + + auto encodedLen = chip::Base64Encode(input.data(), static_cast(input.size()), base64String.Get() + kBase64HeaderLen); + if (encodedLen) + { + memcpy(base64String.Get(), kBase64Header, kBase64HeaderLen); + encodedLen = static_cast(encodedLen + kBase64HeaderLen); + } + base64String.Get()[encodedLen] = '\0'; + outputAsPrefixedBase64 = std::string(base64String.Get(), encodedLen); + + return CHIP_NO_ERROR; +} + +CHIP_ERROR ToTLVCert(const chip::ByteSpan & derEncodedCertificate, std::string & tlvCertAsPrefixedBase64) +{ + uint8_t chipCertBuffer[chip::Credentials::kMaxCHIPCertLength]; + chip::MutableByteSpan chipCertBytes(chipCertBuffer); + ReturnErrorOnFailure(chip::Credentials::ConvertX509CertToChipCert(derEncodedCertificate, chipCertBytes)); + ReturnErrorOnFailure(ToBase64(chipCertBytes, tlvCertAsPrefixedBase64)); + return CHIP_NO_ERROR; +} diff --git a/examples/fabric-admin/commands/pairing/ToTLVCert.h b/examples/fabric-admin/commands/pairing/ToTLVCert.h new file mode 100644 index 00000000000000..29956470b529ce --- /dev/null +++ b/examples/fabric-admin/commands/pairing/ToTLVCert.h @@ -0,0 +1,25 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#pragma once + +#include +#include + +CHIP_ERROR ToBase64(const chip::ByteSpan & input, std::string & outputAsPrefixedBase64); +CHIP_ERROR ToTLVCert(const chip::ByteSpan & derEncodedCertificate, std::string & tlvCertAsPrefixedBase64); diff --git a/examples/fabric-admin/fabric-admin.gni b/examples/fabric-admin/fabric-admin.gni new file mode 100644 index 00000000000000..021ab7792458d9 --- /dev/null +++ b/examples/fabric-admin/fabric-admin.gni @@ -0,0 +1,22 @@ +# Copyright (c) 2024 Project CHIP Authors +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +import("//build_overrides/build.gni") +import("//build_overrides/chip.gni") + +declare_args() { + # Use a separate eventloop for CHIP tasks + config_use_separate_eventloop = true + config_use_local_storage = true +} diff --git a/examples/fabric-admin/include/CHIPProjectAppConfig.h b/examples/fabric-admin/include/CHIPProjectAppConfig.h new file mode 100644 index 00000000000000..b3f85d69359e87 --- /dev/null +++ b/examples/fabric-admin/include/CHIPProjectAppConfig.h @@ -0,0 +1,67 @@ +/* + * + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * @file + * Project configuration for Fabric Admin. + * + */ +#ifndef CHIPPROJECTCONFIG_H +#define CHIPPROJECTCONFIG_H + +#define CHIP_CONFIG_MAX_FABRICS 17 + +#define CHIP_CONFIG_EVENT_LOGGING_NUM_EXTERNAL_CALLBACKS 2 + +// Uncomment this for a large Tunnel MTU. +// #define CHIP_CONFIG_TUNNEL_INTERFACE_MTU (9000) + +// Enable support functions for parsing command-line arguments +#define CHIP_CONFIG_ENABLE_ARG_PARSER 1 + +// Use a default pairing code if one hasn't been provisioned in flash. +#define CHIP_DEVICE_CONFIG_USE_TEST_SETUP_PIN_CODE 20202021 +#define CHIP_DEVICE_CONFIG_USE_TEST_SETUP_DISCRIMINATOR 0xF00 + +// Enable reading DRBG seed data from /dev/(u)random. +// This is needed for test applications and the CHIP device manager to function +// properly when CHIP_CONFIG_RNG_IMPLEMENTATION_CHIPDRBG is enabled. +#define CHIP_CONFIG_DEV_RANDOM_DRBG_SEED 1 + +// For convenience, Chip Security Test Mode can be enabled and the +// requirement for authentication in various protocols can be disabled. +// +// WARNING: These options make it possible to circumvent basic Chip security functionality, +// including message encryption. Because of this they MUST NEVER BE ENABLED IN PRODUCTION BUILDS. +// +#define CHIP_CONFIG_SECURITY_TEST_MODE 0 + +#define CHIP_CONFIG_ENABLE_UPDATE 1 + +#define CHIP_SYSTEM_CONFIG_PACKETBUFFER_POOL_SIZE 0 + +#define CHIP_CONFIG_DATA_MANAGEMENT_CLIENT_EXPERIMENTAL 1 + +#define CHIP_DEVICE_CONFIG_ENABLE_COMMISSIONER_DISCOVERY 1 + +// Enable some test-only interaction model APIs. +#define CONFIG_BUILD_FOR_HOST_UNIT_TEST 1 + +// Allow us, for test purposes, to encode invalid enum values. +#define CHIP_CONFIG_IM_ENABLE_ENCODING_SENTINEL_ENUM_VALUES 1 + +#endif /* CHIPPROJECTCONFIG_H */ diff --git a/examples/fabric-admin/main.cpp b/examples/fabric-admin/main.cpp new file mode 100644 index 00000000000000..e517c67f6b403f --- /dev/null +++ b/examples/fabric-admin/main.cpp @@ -0,0 +1,40 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +#include "commands/common/Commands.h" + +#include "commands/clusters/SubscriptionsCommands.h" +#include "commands/interactive/Commands.h" +#include "commands/pairing/Commands.h" +#include + +// ================================================================================ +// Main Code +// ================================================================================ +int main(int argc, char * argv[]) +{ + ExampleCredentialIssuerCommands credIssuerCommands; + Commands commands; + + registerCommandsInteractive(commands, &credIssuerCommands); + registerCommandsPairing(commands, &credIssuerCommands); + registerClusters(commands, &credIssuerCommands); + registerCommandsSubscriptions(commands, &credIssuerCommands); + + return commands.Run(argc, argv); +} diff --git a/examples/fabric-admin/third_party/connectedhomeip b/examples/fabric-admin/third_party/connectedhomeip new file mode 120000 index 00000000000000..1b20c9fb816b63 --- /dev/null +++ b/examples/fabric-admin/third_party/connectedhomeip @@ -0,0 +1 @@ +../../../ \ No newline at end of file diff --git a/examples/java-matter-controller/README.md b/examples/java-matter-controller/README.md index 3b67056eceba90..543623e6d6c997 100644 --- a/examples/java-matter-controller/README.md +++ b/examples/java-matter-controller/README.md @@ -120,7 +120,7 @@ the top Matter directory: ``` The Java executable file `java-matter-controller` will be generated at -`out/android-x86-java-matter-controller/bin/` +`out/linux-x64-java-matter-controller/bin/` Run the java-matter-controller diff --git a/examples/light-switch-app/telink/README.md b/examples/light-switch-app/telink/README.md index d6ba4b34cd6351..d222116f5f1a7f 100755 --- a/examples/light-switch-app/telink/README.md +++ b/examples/light-switch-app/telink/README.md @@ -30,7 +30,7 @@ creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/light-switch-app/telink/include/IdentifyCommand.h b/examples/light-switch-app/telink/include/IdentifyCommand.h new file mode 100644 index 00000000000000..1e94f338157eda --- /dev/null +++ b/examples/light-switch-app/telink/include/IdentifyCommand.h @@ -0,0 +1,270 @@ +/* + * + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include "controller/InvokeInteraction.h" +#include "controller/ReadInteraction.h" +#include + +#if defined(CONFIG_CHIP_LIB_SHELL) +#include "lib/shell/Engine.h" +#include "lib/shell/commands/Help.h" +#endif // CONFIG_CHIP_LIB_SHELL + +using namespace chip; +using namespace chip::app; + +#if defined(CONFIG_CHIP_LIB_SHELL) +using Shell::Engine; +using Shell::shell_command_t; +using Shell::streamer_get; +using Shell::streamer_printf; + +Engine sShellSwitchIdentifySubCommands; +Engine sShellSwitchIdentifyReadSubCommands; +Engine sShellSwitchGroupsIdentifySubCommands; +#endif // CONFIG_CHIP_LIB_SHELL + +void ProcessIdentifyUnicastBindingRead(BindingCommandData * data, const EmberBindingTableEntry & binding, + OperationalDeviceProxy * peer_device) +{ + auto onSuccess = [](const ConcreteDataAttributePath & attributePath, const auto & dataResponse) { + ChipLogProgress(NotSpecified, "Read Identify attribute succeeds"); + }; + + auto onFailure = [](const ConcreteDataAttributePath * attributePath, CHIP_ERROR error) { + ChipLogError(NotSpecified, "Read Identify attribute failed: %" CHIP_ERROR_FORMAT, error.Format()); + }; + + VerifyOrDie(peer_device != nullptr && peer_device->ConnectionReady()); + + switch (data->attributeId) + { + case Clusters::Identify::Attributes::AttributeList::Id: + Controller::ReadAttribute( + peer_device->GetExchangeManager(), peer_device->GetSecureSession().Value(), binding.remote, onSuccess, onFailure); + break; + + case Clusters::Identify::Attributes::IdentifyTime::Id: + Controller::ReadAttribute( + peer_device->GetExchangeManager(), peer_device->GetSecureSession().Value(), binding.remote, onSuccess, onFailure); + break; + + case Clusters::Identify::Attributes::IdentifyType::Id: + Controller::ReadAttribute( + peer_device->GetExchangeManager(), peer_device->GetSecureSession().Value(), binding.remote, onSuccess, onFailure); + break; + } +} + +void ProcessIdentifyUnicastBindingCommand(BindingCommandData * data, const EmberBindingTableEntry & binding, + OperationalDeviceProxy * peer_device) +{ + auto onSuccess = [](const ConcreteCommandPath & commandPath, const StatusIB & status, const auto & dataResponse) { + ChipLogProgress(NotSpecified, "Identify command succeeds"); + }; + + auto onFailure = [](CHIP_ERROR error) { + ChipLogError(NotSpecified, "Identify command failed: %" CHIP_ERROR_FORMAT, error.Format()); + }; + + VerifyOrDie(peer_device != nullptr && peer_device->ConnectionReady()); + + Clusters::Identify::Commands::Identify::Type identifyCommand; + Clusters::Identify::Commands::TriggerEffect::Type triggerEffectCommand; + + switch (data->commandId) + { + case Clusters::Identify::Commands::Identify::Id: + identifyCommand.identifyTime = static_cast(data->args[0]); + Controller::InvokeCommandRequest(peer_device->GetExchangeManager(), peer_device->GetSecureSession().Value(), binding.remote, + identifyCommand, onSuccess, onFailure); + break; + + case Clusters::Identify::Commands::TriggerEffect::Id: + triggerEffectCommand.effectIdentifier = static_cast(data->args[0]); + triggerEffectCommand.effectVariant = static_cast(data->args[1]); + Controller::InvokeCommandRequest(peer_device->GetExchangeManager(), peer_device->GetSecureSession().Value(), binding.remote, + triggerEffectCommand, onSuccess, onFailure); + break; + } +} + +void ProcessIdentifyGroupBindingCommand(BindingCommandData * data, const EmberBindingTableEntry & binding) +{ + Messaging::ExchangeManager & exchangeMgr = Server::GetInstance().GetExchangeManager(); + + Clusters::Identify::Commands::Identify::Type identifyCommand; + Clusters::Identify::Commands::TriggerEffect::Type triggerEffectCommand; + + switch (data->commandId) + { + case Clusters::Identify::Commands::Identify::Id: + identifyCommand.identifyTime = static_cast(data->args[0]); + Controller::InvokeGroupCommandRequest(&exchangeMgr, binding.fabricIndex, binding.groupId, identifyCommand); + break; + + case Clusters::Identify::Commands::TriggerEffect::Id: + triggerEffectCommand.effectIdentifier = static_cast(data->args[0]); + triggerEffectCommand.effectVariant = static_cast(data->args[1]); + Controller::InvokeGroupCommandRequest(&exchangeMgr, binding.fabricIndex, binding.groupId, triggerEffectCommand); + break; + } +} + +#if defined(CONFIG_CHIP_LIB_SHELL) +/******************************************************** + * Identify switch shell functions + *********************************************************/ + +CHIP_ERROR IdentifyHelpHandler(int argc, char ** argv) +{ + sShellSwitchIdentifySubCommands.ForEachCommand(Shell::PrintCommandHelp, nullptr); + return CHIP_NO_ERROR; +} + +CHIP_ERROR IdentifySwitchCommandHandler(int argc, char ** argv) +{ + if (argc == 0) + { + return IdentifyHelpHandler(argc, argv); + } + + return sShellSwitchIdentifySubCommands.ExecCommand(argc, argv); +} + +CHIP_ERROR IdentifyCommandHandler(int argc, char ** argv) +{ + BindingCommandData * data = Platform::New(); + data->commandId = Clusters::Identify::Commands::Identify::Id; + data->clusterId = Clusters::Identify::Id; + data->args[0] = atoi(argv[0]); + + DeviceLayer::PlatformMgr().ScheduleWork(SwitchWorkerFunction, reinterpret_cast(data)); + return CHIP_NO_ERROR; +} + +CHIP_ERROR TriggerEffectSwitchCommandHandler(int argc, char ** argv) +{ + BindingCommandData * data = Platform::New(); + data->commandId = Clusters::Identify::Commands::TriggerEffect::Id; + data->clusterId = Clusters::Identify::Id; + data->args[0] = atoi(argv[0]); + data->args[1] = atoi(argv[1]); + + DeviceLayer::PlatformMgr().ScheduleWork(SwitchWorkerFunction, reinterpret_cast(data)); + return CHIP_NO_ERROR; +} + +/******************************************************** + * Identify Read switch shell functions + *********************************************************/ + +CHIP_ERROR IdentifyReadHelpHandler(int argc, char ** argv) +{ + sShellSwitchIdentifyReadSubCommands.ForEachCommand(Shell::PrintCommandHelp, nullptr); + return CHIP_NO_ERROR; +} + +CHIP_ERROR IdentifyRead(int argc, char ** argv) +{ + if (argc == 0) + { + return IdentifyReadHelpHandler(argc, argv); + } + + return sShellSwitchIdentifyReadSubCommands.ExecCommand(argc, argv); +} + +CHIP_ERROR IdentifyReadAttributeList(int argc, char ** argv) +{ + BindingCommandData * data = Platform::New(); + data->attributeId = Clusters::Identify::Attributes::AttributeList::Id; + data->clusterId = Clusters::Identify::Id; + data->isReadAttribute = true; + + DeviceLayer::PlatformMgr().ScheduleWork(SwitchWorkerFunction, reinterpret_cast(data)); + return CHIP_NO_ERROR; +} + +CHIP_ERROR IdentifyReadIdentifyTime(int argc, char ** argv) +{ + BindingCommandData * data = Platform::New(); + data->attributeId = Clusters::Identify::Attributes::IdentifyTime::Id; + data->clusterId = Clusters::Identify::Id; + data->isReadAttribute = true; + + DeviceLayer::PlatformMgr().ScheduleWork(SwitchWorkerFunction, reinterpret_cast(data)); + return CHIP_NO_ERROR; +} + +CHIP_ERROR IdentifyReadIdentifyType(int argc, char ** argv) +{ + BindingCommandData * data = Platform::New(); + data->attributeId = Clusters::Identify::Attributes::IdentifyType::Id; + data->clusterId = Clusters::Identify::Id; + data->isReadAttribute = true; + + DeviceLayer::PlatformMgr().ScheduleWork(SwitchWorkerFunction, reinterpret_cast(data)); + return CHIP_NO_ERROR; +} + +/******************************************************** + * Groups Identify switch shell functions + *********************************************************/ + +CHIP_ERROR GroupsIdentifyHelpHandler(int argc, char ** argv) +{ + sShellSwitchGroupsIdentifySubCommands.ForEachCommand(Shell::PrintCommandHelp, nullptr); + return CHIP_NO_ERROR; +} + +CHIP_ERROR GroupsIdentifySwitchCommandHandler(int argc, char ** argv) +{ + if (argc == 0) + { + return GroupsIdentifyHelpHandler(argc, argv); + } + + return sShellSwitchGroupsIdentifySubCommands.ExecCommand(argc, argv); +} + +CHIP_ERROR GroupIdentifyCommandHandler(int argc, char ** argv) +{ + BindingCommandData * data = Platform::New(); + data->commandId = Clusters::Identify::Commands::Identify::Id; + data->clusterId = Clusters::Identify::Id; + data->args[0] = atoi(argv[0]); + data->isGroup = true; + + DeviceLayer::PlatformMgr().ScheduleWork(SwitchWorkerFunction, reinterpret_cast(data)); + return CHIP_NO_ERROR; +} + +CHIP_ERROR GroupTriggerEffectSwitchCommandHandler(int argc, char ** argv) +{ + BindingCommandData * data = Platform::New(); + data->commandId = Clusters::Identify::Commands::TriggerEffect::Id; + data->clusterId = Clusters::Identify::Id; + data->args[0] = atoi(argv[0]); + data->args[1] = atoi(argv[1]); + data->isGroup = true; + + DeviceLayer::PlatformMgr().ScheduleWork(SwitchWorkerFunction, reinterpret_cast(data)); + return CHIP_NO_ERROR; +} +#endif // CONFIG_CHIP_LIB_SHELL diff --git a/examples/light-switch-app/telink/include/binding-handler.h b/examples/light-switch-app/telink/include/binding-handler.h index 6d1bb9717fd713..10dbc7a27af828 100755 --- a/examples/light-switch-app/telink/include/binding-handler.h +++ b/examples/light-switch-app/telink/include/binding-handler.h @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2020 Project CHIP Authors + * Copyright (c) 2020-2024 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -27,8 +27,11 @@ void BindingWorkerFunction(intptr_t context); struct BindingCommandData { + chip::AttributeId attributeId; chip::EndpointId localEndpointId = 1; chip::CommandId commandId; chip::ClusterId clusterId; - bool isGroup = false; + bool isGroup = false; + bool isReadAttribute = false; + uint32_t args[7]; }; diff --git a/examples/light-switch-app/telink/src/binding-handler.cpp b/examples/light-switch-app/telink/src/binding-handler.cpp index 23ab22ff454b98..22c83a8b9fd788 100644 --- a/examples/light-switch-app/telink/src/binding-handler.cpp +++ b/examples/light-switch-app/telink/src/binding-handler.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2020 Project CHIP Authors + * Copyright (c) 2020-2024 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -16,8 +16,8 @@ */ #include "binding-handler.h" - #include "AppConfig.h" +#include "IdentifyCommand.h" #include "app/CommandSender.h" #include "app/clusters/bindings/BindingManager.h" #include "app/server/Server.h" @@ -113,24 +113,46 @@ void LightSwitchChangedHandler(const EmberBindingTableEntry & binding, Operation BindingCommandData * data = static_cast(context); data->isGroup = IsGroupBound(); - if (binding.type == MATTER_MULTICAST_BINDING && data->isGroup) + if (data->isReadAttribute) { - switch (data->clusterId) + // It should always enter here if isReadAttribute is true + if (binding.type == MATTER_UNICAST_BINDING && !data->isGroup) { - case Clusters::OnOff::Id: - ProcessOnOffGroupBindingCommand(data->commandId, binding); - break; + switch (data->clusterId) + { + case Clusters::Identify::Id: + ProcessIdentifyUnicastBindingRead(data, binding, peer_device); + break; + } } } - else if (binding.type == MATTER_UNICAST_BINDING && !data->isGroup) + else { - switch (data->clusterId) + if (binding.type == MATTER_MULTICAST_BINDING && data->isGroup) + { + switch (data->clusterId) + { + case Clusters::Identify::Id: + ProcessIdentifyGroupBindingCommand(data, binding); + break; + case Clusters::OnOff::Id: + ProcessOnOffGroupBindingCommand(data->commandId, binding); + break; + } + } + else if (binding.type == MATTER_UNICAST_BINDING && !data->isGroup) { - case Clusters::OnOff::Id: - VerifyOrDie(peer_device != nullptr && peer_device->ConnectionReady()); - ProcessOnOffUnicastBindingCommand(data->commandId, binding, peer_device->GetExchangeManager(), - peer_device->GetSecureSession().Value()); - break; + switch (data->clusterId) + { + case Clusters::Identify::Id: + ProcessIdentifyUnicastBindingCommand(data, binding, peer_device); + break; + case Clusters::OnOff::Id: + VerifyOrDie(peer_device != nullptr && peer_device->ConnectionReady()); + ProcessOnOffUnicastBindingCommand(data->commandId, binding, peer_device->GetExchangeManager(), + peer_device->GetSecureSession().Value()); + break; + } } } } @@ -346,11 +368,26 @@ static void RegisterSwitchCommands() { static const shell_command_t sSwitchSubCommands[] = { { &SwitchHelpHandler, "help", "Usage: switch " }, + { &IdentifySwitchCommandHandler, "identify", " Usage: switch identify " }, { &OnOffSwitchCommandHandler, "onoff", " Usage: switch onoff " }, { &GroupsSwitchCommandHandler, "groups", "Usage: switch groups " }, { &BindingSwitchCommandHandler, "binding", "Usage: switch binding " } }; + static const shell_command_t sSwitchIdentifySubCommands[] = { + { &IdentifyHelpHandler, "help", "Usage: switch identify " }, + { &IdentifyCommandHandler, "identify", "identify Usage: switch identify identify" }, + { &TriggerEffectSwitchCommandHandler, "triggereffect", "triggereffect Usage: switch identify triggereffect" }, + { &IdentifyRead, "read", "Usage : switch identify read " } + }; + + static const shell_command_t sSwitchIdentifyReadSubCommands[] = { + { &IdentifyReadHelpHandler, "help", "Usage : switch identify read " }, + { &IdentifyReadAttributeList, "attlist", "Read attribute list" }, + { &IdentifyReadIdentifyTime, "identifytime", "Read identifytime attribute" }, + { &IdentifyReadIdentifyType, "identifytype", "Read identifytype attribute" }, + }; + static const shell_command_t sSwitchOnOffSubCommands[] = { { &OnOffHelpHandler, "help", "Usage : switch ononff " }, { &OnSwitchCommandHandler, "on", "Sends on command to bound lighting app" }, @@ -362,6 +399,12 @@ static void RegisterSwitchCommands() { &GroupsOnOffSwitchCommandHandler, "onoff", "Usage: switch groups onoff " } }; + static const shell_command_t sSwitchGroupsIdentifySubCommands[] = { + { &GroupsIdentifyHelpHandler, "help", "Usage: switch groups onoff " }, + { &GroupIdentifyCommandHandler, "identify", "Sends identify command to bound group" }, + { &GroupTriggerEffectSwitchCommandHandler, "triggereffect", "Sends triggereffect command to group" }, + }; + static const shell_command_t sSwitchGroupsOnOffSubCommands[] = { { &GroupsOnOffHelpHandler, "help", "Usage: switch groups onoff " }, { &GroupOnSwitchCommandHandler, "on", "Sends on command to bound group" }, @@ -378,7 +421,11 @@ static void RegisterSwitchCommands() static const shell_command_t sSwitchCommand = { &SwitchCommandHandler, "switch", "Light-switch commands. Usage: switch " }; + sShellSwitchGroupsIdentifySubCommands.RegisterCommands(sSwitchGroupsIdentifySubCommands, + ArraySize(sSwitchGroupsIdentifySubCommands)); sShellSwitchGroupsOnOffSubCommands.RegisterCommands(sSwitchGroupsOnOffSubCommands, ArraySize(sSwitchGroupsOnOffSubCommands)); + sShellSwitchIdentifySubCommands.RegisterCommands(sSwitchIdentifySubCommands, ArraySize(sSwitchIdentifySubCommands)); + sShellSwitchIdentifyReadSubCommands.RegisterCommands(sSwitchIdentifyReadSubCommands, ArraySize(sSwitchIdentifyReadSubCommands)); sShellSwitchOnOffSubCommands.RegisterCommands(sSwitchOnOffSubCommands, ArraySize(sSwitchOnOffSubCommands)); sShellSwitchGroupsSubCommands.RegisterCommands(sSwitchGroupsSubCommands, ArraySize(sSwitchGroupsSubCommands)); sShellSwitchBindingSubCommands.RegisterCommands(sSwitchBindingSubCommands, ArraySize(sSwitchBindingSubCommands)); diff --git a/examples/lighting-app/telink/README.md b/examples/lighting-app/telink/README.md index f4dfefe2b9795e..6c2269007e8ac3 100644 --- a/examples/lighting-app/telink/README.md +++ b/examples/lighting-app/telink/README.md @@ -28,7 +28,7 @@ a reference for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/lighting-app/telink/src/AppTask.cpp b/examples/lighting-app/telink/src/AppTask.cpp index bb4dc4150db2be..f250de450def21 100644 --- a/examples/lighting-app/telink/src/AppTask.cpp +++ b/examples/lighting-app/telink/src/AppTask.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2022-2023 Project CHIP Authors + * Copyright (c) 2022-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -48,7 +48,7 @@ void AppTask::PowerOnFactoryReset(void) { LOG_INF("Lighting App Power On Factory Reset"); AppEvent event; - event.Type = AppEvent::kEventType_Lighting; + event.Type = AppEvent::kEventType_DeviceAction; event.Handler = PowerOnFactoryResetEventHandler; GetAppTask().PostEvent(&event); } @@ -77,7 +77,7 @@ CHIP_ERROR AppTask::Init(void) if (status == Protocols::InteractionModel::Status::Success) { // Set actual state to stored before reboot - SetInitiateAction(storedValue ? ON_ACTION : OFF_ACTION, static_cast(AppEvent::kEventType_Lighting), nullptr); + SetInitiateAction(storedValue ? ON_ACTION : OFF_ACTION, static_cast(AppEvent::kEventType_DeviceAction), nullptr); } return CHIP_NO_ERROR; @@ -88,10 +88,10 @@ void AppTask::LightingActionEventHandler(AppEvent * aEvent) Fixture_Action action = INVALID_ACTION; int32_t actor = 0; - if (aEvent->Type == AppEvent::kEventType_Lighting) + if (aEvent->Type == AppEvent::kEventType_DeviceAction) { - action = static_cast(aEvent->LightingEvent.Action); - actor = aEvent->LightingEvent.Actor; + action = static_cast(aEvent->DeviceEvent.Action); + actor = aEvent->DeviceEvent.Actor; } else if (aEvent->Type == AppEvent::kEventType_Button) { diff --git a/examples/lighting-app/telink/src/ZclCallbacks.cpp b/examples/lighting-app/telink/src/ZclCallbacks.cpp index 75b43f7c39eee1..e28d31c833de43 100644 --- a/examples/lighting-app/telink/src/ZclCallbacks.cpp +++ b/examples/lighting-app/telink/src/ZclCallbacks.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2022 Project CHIP Authors + * Copyright (c) 2022-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -42,14 +42,14 @@ void MatterPostAttributeChangeCallback(const chip::app::ConcreteAttributePath & { ChipLogDetail(Zcl, "Cluster OnOff: attribute OnOff set to %u", *value); GetAppTask().SetInitiateAction(*value ? AppTask::ON_ACTION : AppTask::OFF_ACTION, - static_cast(AppEvent::kEventType_Lighting), value); + static_cast(AppEvent::kEventType_DeviceAction), value); } else if (clusterId == LevelControl::Id && attributeId == LevelControl::Attributes::CurrentLevel::Id) { if (GetAppTask().IsTurnedOn()) { ChipLogDetail(Zcl, "Cluster LevelControl: attribute CurrentLevel set to %u", *value); - GetAppTask().SetInitiateAction(AppTask::LEVEL_ACTION, static_cast(AppEvent::kEventType_Lighting), value); + GetAppTask().SetInitiateAction(AppTask::LEVEL_ACTION, static_cast(AppEvent::kEventType_DeviceAction), value); } else { @@ -79,7 +79,7 @@ void MatterPostAttributeChangeCallback(const chip::app::ConcreteAttributePath & } ChipLogDetail(Zcl, "New XY color: %u|%u", xy.x, xy.y); - GetAppTask().SetInitiateAction(AppTask::COLOR_ACTION_XY, static_cast(AppEvent::kEventType_Lighting), + GetAppTask().SetInitiateAction(AppTask::COLOR_ACTION_XY, static_cast(AppEvent::kEventType_DeviceAction), (uint8_t *) &xy); } /* HSV color space */ @@ -101,14 +101,15 @@ void MatterPostAttributeChangeCallback(const chip::app::ConcreteAttributePath & hsv.s = *value; } ChipLogDetail(Zcl, "New HSV color: hue = %u| saturation = %u", hsv.h, hsv.s); - GetAppTask().SetInitiateAction(AppTask::COLOR_ACTION_HSV, static_cast(AppEvent::kEventType_Lighting), + GetAppTask().SetInitiateAction(AppTask::COLOR_ACTION_HSV, static_cast(AppEvent::kEventType_DeviceAction), (uint8_t *) &hsv); } /* Temperature Mireds color space */ else if (attributeId == ColorControl::Attributes::ColorTemperatureMireds::Id) { ChipLogDetail(Zcl, "New Temperature Mireds color = %u", *(uint16_t *) value); - GetAppTask().SetInitiateAction(AppTask::COLOR_ACTION_CT, static_cast(AppEvent::kEventType_Lighting), value); + GetAppTask().SetInitiateAction(AppTask::COLOR_ACTION_CT, static_cast(AppEvent::kEventType_DeviceAction), + value); } else { diff --git a/examples/lit-icd-app/lit-icd-common/lit-icd-server-app.matter b/examples/lit-icd-app/lit-icd-common/lit-icd-server-app.matter index cf3d0710089d2c..5274f249f7628d 100644 --- a/examples/lit-icd-app/lit-icd-common/lit-icd-server-app.matter +++ b/examples/lit-icd-app/lit-icd-common/lit-icd-server-app.matter @@ -1783,7 +1783,7 @@ endpoint 0 { callback attribute registeredClients; callback attribute ICDCounter; callback attribute clientsSupportedPerFabric; - ram attribute userActiveModeTriggerHint default = 0x110D; + ram attribute userActiveModeTriggerHint default = 0x111D; ram attribute userActiveModeTriggerInstruction default = "Restart the application"; ram attribute operatingMode default = 0; callback attribute generatedCommandList; diff --git a/examples/lit-icd-app/lit-icd-common/lit-icd-server-app.zap b/examples/lit-icd-app/lit-icd-common/lit-icd-server-app.zap index 7780cccbac0c77..6bbfc9050a8365 100644 --- a/examples/lit-icd-app/lit-icd-common/lit-icd-server-app.zap +++ b/examples/lit-icd-app/lit-icd-common/lit-icd-server-app.zap @@ -1,6 +1,6 @@ { "fileFormat": 2, - "featureLevel": 100, + "featureLevel": 102, "creator": "zap", "keyValuePairs": [ { @@ -29,6 +29,7 @@ "pathRelativity": "relativeToZap", "path": "../../../src/app/zap-templates/app-templates.json", "type": "gen-templates-json", + "category": "matter", "version": "chip-v1" } ], @@ -3497,7 +3498,7 @@ "storageOption": "RAM", "singleton": 0, "bounded": 0, - "defaultValue": "0x110D", + "defaultValue": "0x111D", "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3699,7 +3700,7 @@ "singleton": 0, "bounded": 0, "defaultValue": "0x0", - "reportable": 0, + "reportable": 1, "minInterval": 1, "maxInterval": 65534, "reportableChange": 0 @@ -3715,7 +3716,7 @@ "singleton": 0, "bounded": 0, "defaultValue": "0x00", - "reportable": 0, + "reportable": 1, "minInterval": 1, "maxInterval": 65534, "reportableChange": 0 @@ -3730,7 +3731,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3746,7 +3747,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3762,7 +3763,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3778,7 +3779,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3836,7 +3837,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3852,8 +3853,8 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", - "reportable": 0, + "defaultValue": null, + "reportable": 1, "minInterval": 1, "maxInterval": 65534, "reportableChange": 0 @@ -3868,8 +3869,8 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", - "reportable": 0, + "defaultValue": null, + "reportable": 1, "minInterval": 1, "maxInterval": 65534, "reportableChange": 0 @@ -3884,8 +3885,8 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", - "reportable": 0, + "defaultValue": null, + "reportable": 1, "minInterval": 1, "maxInterval": 65534, "reportableChange": 0 @@ -3900,7 +3901,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3916,7 +3917,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3932,7 +3933,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3948,7 +3949,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3964,7 +3965,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "0", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -3980,7 +3981,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "2", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -4022,7 +4023,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -4038,7 +4039,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -4054,7 +4055,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, @@ -4070,7 +4071,7 @@ "storageOption": "External", "singleton": 0, "bounded": 0, - "defaultValue": "", + "defaultValue": null, "reportable": 1, "minInterval": 1, "maxInterval": 65534, diff --git a/examples/lock-app/telink/README.md b/examples/lock-app/telink/README.md index 27a95baffa0b6a..8386a524c48d41 100755 --- a/examples/lock-app/telink/README.md +++ b/examples/lock-app/telink/README.md @@ -28,7 +28,7 @@ a reference for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/lock-app/telink/src/AppTask.cpp b/examples/lock-app/telink/src/AppTask.cpp index 46e34db66710e5..540a14f76f64ba 100644 --- a/examples/lock-app/telink/src/AppTask.cpp +++ b/examples/lock-app/telink/src/AppTask.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2023 Project CHIP Authors + * Copyright (c) 2023-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -130,11 +130,11 @@ void AppTask::LockActionEventHandler(AppEvent * aEvent) { case LockManager::kState_NotFulyLocked: case LockManager::kState_LockCompleted: - LockMgr().LockAction(AppEvent::kEventType_Lock, LockManager::UNLOCK_ACTION, LockManager::OperationSource::kButton, + LockMgr().LockAction(AppEvent::kEventType_DeviceAction, LockManager::UNLOCK_ACTION, LockManager::OperationSource::kButton, kExampleEndpointId); break; case LockManager::kState_UnlockCompleted: - LockMgr().LockAction(AppEvent::kEventType_Lock, LockManager::LOCK_ACTION, LockManager::OperationSource::kButton, + LockMgr().LockAction(AppEvent::kEventType_DeviceAction, LockManager::LOCK_ACTION, LockManager::OperationSource::kButton, kExampleEndpointId); break; default: diff --git a/examples/lock-app/telink/src/ZclCallbacks.cpp b/examples/lock-app/telink/src/ZclCallbacks.cpp index 7eaf0b303fd697..e4bd320981877c 100644 --- a/examples/lock-app/telink/src/ZclCallbacks.cpp +++ b/examples/lock-app/telink/src/ZclCallbacks.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2023 Project CHIP Authors + * Copyright (c) 2023-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -75,7 +75,7 @@ bool emberAfPluginDoorLockOnDoorLockCommand(chip::EndpointId endpointId, const N { ChipLogProgress(Zcl, "Door Lock App: Lock Command endpoint=%d", endpointId); - return LockMgr().LockAction(AppEvent::kEventType_Lock, LockManager::LOCK_ACTION, LockManager::OperationSource::kRemote, + return LockMgr().LockAction(AppEvent::kEventType_DeviceAction, LockManager::LOCK_ACTION, LockManager::OperationSource::kRemote, endpointId, err, fabricIdx, nodeId, pinCode); } @@ -85,8 +85,8 @@ bool emberAfPluginDoorLockOnDoorUnlockCommand(chip::EndpointId endpointId, const { ChipLogProgress(Zcl, "Door Lock App: Unlock Command endpoint=%d", endpointId); - return LockMgr().LockAction(AppEvent::kEventType_Lock, LockManager::UNLOCK_ACTION, LockManager::OperationSource::kRemote, - endpointId, err, fabricIdx, nodeId, pinCode); + return LockMgr().LockAction(AppEvent::kEventType_DeviceAction, LockManager::UNLOCK_ACTION, + LockManager::OperationSource::kRemote, endpointId, err, fabricIdx, nodeId, pinCode); } // TODO : Add helper function to call from the Unlock command if we establish Unbolt doesn't need a different behaviour than Unlock @@ -96,8 +96,8 @@ bool emberAfPluginDoorLockOnDoorUnboltCommand(chip::EndpointId endpointId, const { ChipLogProgress(Zcl, "Door Lock App: Unbolt Command endpoint=%d", endpointId); - return LockMgr().LockAction(AppEvent::kEventType_Lock, LockManager::UNBOLT_ACTION, LockManager::OperationSource::kRemote, - endpointId, err, fabricIdx, nodeId, pinCode); + return LockMgr().LockAction(AppEvent::kEventType_DeviceAction, LockManager::UNBOLT_ACTION, + LockManager::OperationSource::kRemote, endpointId, err, fabricIdx, nodeId, pinCode); } bool emberAfPluginDoorLockGetCredential(chip::EndpointId endpointId, uint16_t credentialIndex, CredentialTypeEnum credentialType, @@ -170,5 +170,6 @@ DlStatus emberAfPluginDoorLockSetSchedule(chip::EndpointId endpointId, uint8_t h void emberAfPluginDoorLockOnAutoRelock(chip::EndpointId endpointId) { // Apply the relock state in the application control - LockMgr().LockAction(AppEvent::kEventType_Lock, LockManager::LOCK_ACTION, LockManager::OperationSource::kRemote, endpointId); + LockMgr().LockAction(AppEvent::kEventType_DeviceAction, LockManager::LOCK_ACTION, LockManager::OperationSource::kRemote, + endpointId); } diff --git a/examples/ota-requestor-app/telink/README.md b/examples/ota-requestor-app/telink/README.md index 81870b738f18df..c549804e42f627 100755 --- a/examples/ota-requestor-app/telink/README.md +++ b/examples/ota-requestor-app/telink/README.md @@ -21,7 +21,7 @@ ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/platform/nxp/common/app_task/source/AppTaskBase.cpp b/examples/platform/nxp/common/app_task/source/AppTaskBase.cpp index 2f0bbcbf85b653..2b70fcb4c070c7 100644 --- a/examples/platform/nxp/common/app_task/source/AppTaskBase.cpp +++ b/examples/platform/nxp/common/app_task/source/AppTaskBase.cpp @@ -210,7 +210,7 @@ CHIP_ERROR chip::NXP::App::AppTaskBase::Init() Shell::SetWiFiDriver(chip::NXP::App::GetAppTask().GetWifiDriverInstance()); #endif #endif -#if CONFIG_CHIP_OTA_REQUESTOR +#if CHIP_DEVICE_CONFIG_ENABLE_OTA_REQUESTOR if (err == CHIP_NO_ERROR) { /* If an update is under test make it permanent */ diff --git a/examples/platform/silabs/FreeRTOSConfig.h b/examples/platform/silabs/FreeRTOSConfig.h index ec926f4bbbeb94..5e257c4caf5b16 100644 --- a/examples/platform/silabs/FreeRTOSConfig.h +++ b/examples/platform/silabs/FreeRTOSConfig.h @@ -197,7 +197,7 @@ See http://www.FreeRTOS.org/RTOS-Cortex-M3-M4.html. */ #define configMAX_SYSCALL_INTERRUPT_PRIORITY 48 #endif // SLI_SI91X_MCU_INTERFACE -#define configENABLE_FPU 0 +#define configENABLE_FPU 1 #define configENABLE_MPU 0 /* FreeRTOS Secure Side Only and TrustZone Security Extension */ #define configRUN_FREERTOS_SECURE_ONLY 1 diff --git a/examples/platform/telink/common.cmake b/examples/platform/telink/common.cmake index 314e74063be605..9b8149c7d02d6a 100644 --- a/examples/platform/telink/common.cmake +++ b/examples/platform/telink/common.cmake @@ -15,12 +15,14 @@ string(REPLACE "_retention" "" BASE_BOARD ${BOARD}) -if(FLASH_SIZE) - message(STATUS "Flash memory size is set to: " ${FLASH_SIZE} "b") -else() - set(FLASH_SIZE "2m") - message(STATUS "Flash memory size is set to: 2mb (default)") +if(NOT FLASH_SIZE) + if(${BASE_BOARD} MATCHES "tlsr9118bdk40d") + set(FLASH_SIZE "3m") + else() + set(FLASH_SIZE "2m") + endif() endif() +message(STATUS "Flash memory size is set to: " ${FLASH_SIZE} "b") if(${TLNK_MARS_BOARD} MATCHES y) set(MARS_BOOT_DTC_OVERLAY_FILE "${CHIP_ROOT}/src/platform/telink/${BASE_BOARD}_mars_boot.overlay") @@ -60,11 +62,22 @@ else() unset(USB_CONF_OVERLAY_FILE) endif() -set(GLOBAL_BOOT_CONF_OVERLAY_FILE "${CHIP_ROOT}/config/telink/app/bootloader.conf") -if(NOT EXISTS "${GLOBAL_BOOT_CONF_OVERLAY_FILE}") - message(FATAL_ERROR "${GLOBAL_BOOT_CONF_OVERLAY_FILE} doesn't exist") +set(BOOT_CONF_OVERLAY_FILE "${CHIP_ROOT}/config/telink/app/bootloader.conf") +if(NOT EXISTS "${BOOT_CONF_OVERLAY_FILE}") + message(FATAL_ERROR "${BOOT_CONF_OVERLAY_FILE} doesn't exist") endif() +if(${CONFIG_USB_TELINK_B9X} MATCHES y) + set(BOOT_USB_CONF_OVERLAY_FILE "${CHIP_ROOT}/config/telink/app/bootloader_usb.conf") + if(NOT EXISTS "${BOOT_USB_CONF_OVERLAY_FILE}") + message(FATAL_ERROR "${BOOT_USB_CONF_OVERLAY_FILE} doesn't exist") + endif() +else() + unset(BOOT_USB_CONF_OVERLAY_FILE) +endif() + +set(GLOBAL_BOOT_CONF_OVERLAY_FILE "${BOOT_CONF_OVERLAY_FILE} ${BOOT_USB_CONF_OVERLAY_FILE}") + set(LOCAL_DTC_OVERLAY_FILE "${CMAKE_CURRENT_SOURCE_DIR}/boards/${BASE_BOARD}.overlay") if(NOT EXISTS "${LOCAL_DTC_OVERLAY_FILE}") message(STATUS "${LOCAL_DTC_OVERLAY_FILE} doesn't exist") diff --git a/examples/platform/telink/common/include/AppEventCommon.h b/examples/platform/telink/common/include/AppEventCommon.h index b9fa40ece20bc5..dea362f24c50a7 100644 --- a/examples/platform/telink/common/include/AppEventCommon.h +++ b/examples/platform/telink/common/include/AppEventCommon.h @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2022 Project CHIP Authors + * Copyright (c) 2022-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -31,15 +31,9 @@ struct AppEvent { kEventType_Button = 0, kEventType_Timer, - kEventType_UpdateLedState, kEventType_IdentifyStart, kEventType_IdentifyStop, - kEventType_Lighting, - kEventType_Thermostat, - kEventType_Install, - kEventType_Contact, - kEventType_Start, - kEventType_Lock + kEventType_DeviceAction }; uint16_t Type; @@ -58,20 +52,7 @@ struct AppEvent { uint8_t Action; int32_t Actor; - } LightingEvent; - struct - { - uint8_t Action; - } ContactEvent; - struct - { - uint8_t Action; - int32_t Actor; - } StartEvent; - struct - { - LEDWidget * LedWidget; - } UpdateLedStateEvent; + } DeviceEvent; }; EventHandler Handler; diff --git a/examples/platform/telink/common/include/AppTaskCommon.h b/examples/platform/telink/common/include/AppTaskCommon.h index 6218427e963a51..b1e5ad356692bb 100644 --- a/examples/platform/telink/common/include/AppTaskCommon.h +++ b/examples/platform/telink/common/include/AppTaskCommon.h @@ -56,6 +56,8 @@ class LedManager; class PwmManager; class ButtonManager; +struct Identify; + class AppTaskCommon { public: @@ -66,6 +68,8 @@ class AppTaskCommon void PostEvent(AppEvent * event); static void IdentifyEffectHandler(Clusters::Identify::EffectIdentifierEnum aEffect); + static void IdentifyStartHandler(Identify *); + static void IdentifyStopHandler(Identify *); #ifdef CONFIG_CHIP_PW_RPC enum ButtonId_t diff --git a/examples/platform/telink/common/src/AppTaskCommon.cpp b/examples/platform/telink/common/src/AppTaskCommon.cpp index 9f268b74da3e55..96bb3ca87463dc 100644 --- a/examples/platform/telink/common/src/AppTaskCommon.cpp +++ b/examples/platform/telink/common/src/AppTaskCommon.cpp @@ -28,6 +28,7 @@ #include #include +#include #include #include #include @@ -88,20 +89,16 @@ void OnIdentifyTriggerEffect(Identify * identify) } Identify sIdentify = { - kExampleEndpointId, - [](Identify *) { ChipLogProgress(Zcl, "OnIdentifyStart"); }, - [](Identify *) { ChipLogProgress(Zcl, "OnIdentifyStop"); }, - Clusters::Identify::IdentifyTypeEnum::kVisibleIndicator, + kExampleEndpointId, AppTask::IdentifyStartHandler, + AppTask::IdentifyStopHandler, Clusters::Identify::IdentifyTypeEnum::kVisibleIndicator, OnIdentifyTriggerEffect, }; #endif -#if CONFIG_CHIP_FACTORY_DATA // NOTE! This key is for test/certification only and should not be available in production devices! uint8_t sTestEventTriggerEnableKey[TestEventTriggerDelegate::kEnableKeyLength] = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }; -#endif class AppCallbacks : public AppDelegate { @@ -221,7 +218,8 @@ CHIP_ERROR AppTaskCommon::StartApp(void) #endif #ifdef CONFIG_BOOTLOADER_MCUBOOT - if (!chip::DeviceLayer::ConnectivityMgr().IsThreadProvisioned()) + if (!chip::DeviceLayer::ConnectivityMgr().IsThreadProvisioned() && + !chip::DeviceLayer::ConnectivityMgr().IsWiFiStationProvisioned()) { LOG_INF("Confirm image."); OtaConfirmNewImage(); @@ -271,8 +269,15 @@ CHIP_ERROR AppTaskCommon::InitCommonParts(void) // Init ZCL Data Model and start server static CommonCaseDeviceServerInitParams initParams; + static SimpleTestEventTriggerDelegate sTestEventTriggerDelegate{}; + VerifyOrDie(sTestEventTriggerDelegate.Init(ByteSpan(sTestEventTriggerEnableKey)) == CHIP_NO_ERROR); +#if CONFIG_CHIP_OTA_REQUESTOR + static OTATestEventTriggerHandler sOtaTestEventTriggerHandler{}; + VerifyOrDie(sTestEventTriggerDelegate.AddHandler(&sOtaTestEventTriggerHandler) == CHIP_NO_ERROR); +#endif (void) initParams.InitializeStaticResourcesBeforeServerInit(); - initParams.appDelegate = &sCallbacks; + initParams.appDelegate = &sCallbacks; + initParams.testEventTriggerDelegate = &sTestEventTriggerDelegate; ReturnErrorOnFailure(chip::Server::GetInstance().Init(initParams)); #if APP_SET_DEVICE_INFO_PROVIDER @@ -314,6 +319,30 @@ CHIP_ERROR AppTaskCommon::InitCommonParts(void) return CHIP_NO_ERROR; } +void AppTaskCommon::IdentifyStartHandler(Identify *) +{ + AppEvent event; + + event.Type = AppEvent::kEventType_IdentifyStart; + event.Handler = [](AppEvent * event) { + ChipLogProgress(Zcl, "OnIdentifyStart"); + PwmManager::getInstance().setPwmBlink(PwmManager::EAppPwm_Indication, kIdentifyBlinkRateMs, kIdentifyBlinkRateMs); + }; + GetAppTask().PostEvent(&event); +} + +void AppTaskCommon::IdentifyStopHandler(Identify *) +{ + AppEvent event; + + event.Type = AppEvent::kEventType_IdentifyStop; + event.Handler = [](AppEvent * event) { + ChipLogProgress(Zcl, "OnIdentifyStop"); + PwmManager::getInstance().setPwm(PwmManager::EAppPwm_Indication, false); + }; + GetAppTask().PostEvent(&event); +} + #ifdef CONFIG_CHIP_PW_RPC void AppTaskCommon::ButtonEventHandler(ButtonId_t btnId, bool btnPressed) { @@ -373,7 +402,8 @@ void AppTaskCommon::InitPwms() void AppTaskCommon::LinkPwms(PwmManager & pwmManager) { -#if CONFIG_WS2812_STRIP +#if CONFIG_WS2812_STRIP || \ + CONFIG_BOARD_TLSR9118BDK40D // TLSR9118BDK40D EVK buttons located on 4th PWM channel (see tlsr9118bdk40d.overlay) pwmManager.linkPwm(PwmManager::EAppPwm_Red, 0); pwmManager.linkPwm(PwmManager::EAppPwm_Green, 1); pwmManager.linkPwm(PwmManager::EAppPwm_Blue, 2); @@ -644,6 +674,16 @@ void AppTaskCommon::ChipEventHandler(const ChipDeviceEvent * event, intptr_t /* sIsNetworkProvisioned = ConnectivityMgr().IsThreadProvisioned(); sIsNetworkEnabled = ConnectivityMgr().IsThreadEnabled(); sIsThreadAttached = ConnectivityMgr().IsThreadAttached(); +#elif CHIP_DEVICE_CONFIG_ENABLE_WIFI + case DeviceEventType::kWiFiConnectivityChange: + sIsNetworkProvisioned = ConnectivityMgr().IsWiFiStationProvisioned(); + sIsNetworkEnabled = ConnectivityMgr().IsWiFiStationEnabled(); +#if CONFIG_CHIP_OTA_REQUESTOR + if (event->WiFiConnectivityChange.Result == kConnectivity_Established) + { + InitBasicOTARequestor(); + } +#endif #endif /* CHIP_DEVICE_CONFIG_ENABLE_THREAD */ #if CONFIG_CHIP_ENABLE_APPLICATION_STATUS_LED UpdateStatusLED(); diff --git a/examples/platform/telink/common/src/mainCommon.cpp b/examples/platform/telink/common/src/mainCommon.cpp index c80ab4c609e971..7018adaa1b8c7c 100644 --- a/examples/platform/telink/common/src/mainCommon.cpp +++ b/examples/platform/telink/common/src/mainCommon.cpp @@ -21,6 +21,11 @@ #include #include +#if CHIP_DEVICE_CONFIG_ENABLE_WIFI +#include +#include +#endif + #include #ifdef CONFIG_USB_DEVICE_STACK @@ -37,6 +42,10 @@ using namespace ::chip; using namespace ::chip::Inet; using namespace ::chip::DeviceLayer; +#if CHIP_DEVICE_CONFIG_ENABLE_WIFI +app::Clusters::NetworkCommissioning::Instance sWiFiCommissioningInstance(0, &(NetworkCommissioning::TelinkWiFiDriver::Instance())); +#endif + #ifdef CONFIG_CHIP_ENABLE_POWER_ON_FACTORY_RESET static constexpr uint32_t kFactoryResetOnBootMaxCnt = 5; static constexpr char kFactoryResetOnBootStoreKey[] = "TelinkFactoryResetOnBootCnt"; @@ -155,6 +164,8 @@ int main(void) LOG_ERR("SetThreadDeviceType fail"); goto exit; } +#elif CHIP_DEVICE_CONFIG_ENABLE_WIFI + sWiFiCommissioningInstance.Init(); #else return CHIP_ERROR_INTERNAL; #endif /* CHIP_DEVICE_CONFIG_ENABLE_THREAD */ diff --git a/examples/pump-app/telink/README.md b/examples/pump-app/telink/README.md index 487833f4fb7d30..885cf7230856bc 100755 --- a/examples/pump-app/telink/README.md +++ b/examples/pump-app/telink/README.md @@ -29,7 +29,7 @@ reference for creating your own pump application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/pump-app/telink/src/AppTask.cpp b/examples/pump-app/telink/src/AppTask.cpp index a7a360b934cd8f..10e58c3e2edc73 100644 --- a/examples/pump-app/telink/src/AppTask.cpp +++ b/examples/pump-app/telink/src/AppTask.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2023 Project CHIP Authors + * Copyright (c) 2023-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -85,10 +85,10 @@ void AppTask::ActionCompleted(PumpManager::Action_t action, int32_t actor) void AppTask::PostStartActionRequest(int32_t actor, PumpManager::Action_t action) { AppEvent event; - event.Type = AppEvent::kEventType_Start; - event.StartEvent.Actor = actor; - event.StartEvent.Action = action; - event.Handler = StartActionEventHandler; + event.Type = AppEvent::kEventType_DeviceAction; + event.DeviceEvent.Actor = actor; + event.DeviceEvent.Action = action; + event.Handler = StartActionEventHandler; sAppTask.PostEvent(&event); } @@ -97,10 +97,10 @@ void AppTask::StartActionEventHandler(AppEvent * aEvent) PumpManager::Action_t action = PumpManager::INVALID_ACTION; int32_t actor = 0; - if (aEvent->Type == AppEvent::kEventType_Start) + if (aEvent->Type == AppEvent::kEventType_DeviceAction) { - action = static_cast(aEvent->StartEvent.Action); - actor = aEvent->StartEvent.Actor; + action = static_cast(aEvent->DeviceEvent.Action); + actor = aEvent->DeviceEvent.Actor; } else if (aEvent->Type == AppEvent::kEventType_Button) { diff --git a/examples/pump-controller-app/telink/README.md b/examples/pump-controller-app/telink/README.md index 5a9e95548f883a..a49b0999ddebac 100755 --- a/examples/pump-controller-app/telink/README.md +++ b/examples/pump-controller-app/telink/README.md @@ -30,7 +30,7 @@ your own pump application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/pump-controller-app/telink/src/AppTask.cpp b/examples/pump-controller-app/telink/src/AppTask.cpp index 681f0fa4fd799e..b36888cda159fd 100644 --- a/examples/pump-controller-app/telink/src/AppTask.cpp +++ b/examples/pump-controller-app/telink/src/AppTask.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2023 Project CHIP Authors + * Copyright (c) 2023-2024 Project CHIP Authors * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); @@ -47,10 +47,10 @@ void AppTask::StartActionEventHandler(AppEvent * aEvent) PumpManager::Action_t action = PumpManager::INVALID_ACTION; int32_t actor = 0; - if (aEvent->Type == AppEvent::kEventType_Start) + if (aEvent->Type == AppEvent::kEventType_DeviceAction) { - action = static_cast(aEvent->StartEvent.Action); - actor = aEvent->StartEvent.Actor; + action = static_cast(aEvent->DeviceEvent.Action); + actor = aEvent->DeviceEvent.Actor; } else if (aEvent->Type == AppEvent::kEventType_Button) { @@ -103,10 +103,10 @@ void AppTask::ActionCompleted(PumpManager::Action_t action, int32_t actor) void AppTask::PostStartActionRequest(int32_t actor, PumpManager::Action_t action) { AppEvent event; - event.Type = AppEvent::kEventType_Start; - event.StartEvent.Actor = actor; - event.StartEvent.Action = action; - event.Handler = StartActionEventHandler; + event.Type = AppEvent::kEventType_DeviceAction; + event.DeviceEvent.Actor = actor; + event.DeviceEvent.Action = action; + event.Handler = StartActionEventHandler; sAppTask.PostEvent(&event); } diff --git a/examples/shell/telink/README.md b/examples/shell/telink/README.md index aa7023043e0b9f..0d445a3838ec3a 100755 --- a/examples/shell/telink/README.md +++ b/examples/shell/telink/README.md @@ -25,7 +25,7 @@ You can use this example as a reference for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/smoke-co-alarm-app/telink/README.md b/examples/smoke-co-alarm-app/telink/README.md index 7f7138a7f14771..97a00f8d53a8ad 100755 --- a/examples/smoke-co-alarm-app/telink/README.md +++ b/examples/smoke-co-alarm-app/telink/README.md @@ -25,7 +25,7 @@ You can use this example as a reference for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/temperature-measurement-app/telink/README.md b/examples/temperature-measurement-app/telink/README.md index 6f147721149b19..c78bd36ea8e4a6 100644 --- a/examples/temperature-measurement-app/telink/README.md +++ b/examples/temperature-measurement-app/telink/README.md @@ -29,7 +29,7 @@ creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/thermostat/telink/README.md b/examples/thermostat/telink/README.md index 85a98d8ce4862e..604a917ff18ce9 100755 --- a/examples/thermostat/telink/README.md +++ b/examples/thermostat/telink/README.md @@ -25,7 +25,7 @@ You can use this example as a reference for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/examples/tv-app/android/App/platform-app/src/main/java/com/matter/tv/server/MatterCommissioningPrompter.java b/examples/tv-app/android/App/platform-app/src/main/java/com/matter/tv/server/MatterCommissioningPrompter.java index 7879af41158438..8d2a650ce034c9 100644 --- a/examples/tv-app/android/App/platform-app/src/main/java/com/matter/tv/server/MatterCommissioningPrompter.java +++ b/examples/tv-app/android/App/platform-app/src/main/java/com/matter/tv/server/MatterCommissioningPrompter.java @@ -5,8 +5,10 @@ import android.app.Activity; import android.app.NotificationChannel; import android.app.NotificationManager; +import android.content.ContentResolver; import android.content.Context; import android.os.Build; +import android.provider.Settings; import android.util.Log; import android.widget.EditText; import androidx.appcompat.app.AlertDialog; @@ -45,6 +47,17 @@ public void promptForCommissionOkPermission( + ". Commissionee: " + commissioneeName); + ContentResolver contentResolver = context.getContentResolver(); + boolean authorisationDialogDisabled = + Settings.Secure.getInt(contentResolver, "matter_show_authorisation_dialog", 0) == 0; + // By default do not show authorisation dialog + // only do so if customer or OS explicitly ask for it, by updating + // matter_show_authorisation_dialog flag to 1 + if (authorisationDialogDisabled) { + OnPromptAccepted(); + return; + } + getActivity() .runOnUiThread( () -> { diff --git a/examples/window-app/silabs/include/WindowManager.h b/examples/window-app/silabs/include/WindowManager.h index 8ae75e8ed48c94..7578396c8f67f6 100644 --- a/examples/window-app/silabs/include/WindowManager.h +++ b/examples/window-app/silabs/include/WindowManager.h @@ -40,6 +40,7 @@ class WindowManager typedef void (*Callback)(Timer & timer); Timer(uint32_t timeoutInMs, Callback callback, void * context); + ~Timer(); void Start(); void Stop(); @@ -155,7 +156,7 @@ class WindowManager LEDWidget mActionLED; #ifdef DISPLAY_ENABLED - Timer mIconTimer; - LcdIcon mIcon = LcdIcon::None; + Timer * mIconTimer = nullptr; + LcdIcon mIcon = LcdIcon::None; #endif }; diff --git a/examples/window-app/silabs/src/WindowManager.cpp b/examples/window-app/silabs/src/WindowManager.cpp index 0b8639dc04e93b..8ae78b3d2e99b8 100644 --- a/examples/window-app/silabs/src/WindowManager.cpp +++ b/examples/window-app/silabs/src/WindowManager.cpp @@ -514,6 +514,15 @@ WindowManager::Timer::Timer(uint32_t timeoutInMs, Callback callback, void * cont } } +WindowManager::Timer::~Timer() +{ + if (mHandler) + { + osTimerDelete(mHandler); + mHandler = nullptr; + } +} + void WindowManager::Timer::Stop() { mIsActive = false; @@ -538,11 +547,7 @@ WindowManager & WindowManager::Instance() return WindowManager::sWindow; } -#ifdef DISPLAY_ENABLED -WindowManager::WindowManager() : mIconTimer(LCD_ICON_TIMEOUT, OnIconTimeout, this) {} -#else WindowManager::WindowManager() {} -#endif void WindowManager::OnIconTimeout(WindowManager::Timer & timer) { @@ -556,6 +561,9 @@ CHIP_ERROR WindowManager::Init() { chip::DeviceLayer::PlatformMgr().LockChipStack(); +#ifdef DISPLAY_ENABLED + mIconTimer = new Timer(LCD_ICON_TIMEOUT, OnIconTimeout, this); +#endif // Timers mLongPressTimer = new Timer(LONG_PRESS_TIMEOUT, OnLongPressTimeout, this); @@ -768,13 +776,19 @@ void WindowManager::GeneralEventHandler(AppEvent * aEvent) window->UpdateLCD(); break; case AppEvent::kEventType_CoverChange: - window->mIconTimer.Start(); + if (window->mIconTimer != nullptr) + { + window->mIconTimer->Start(); + } window->mIcon = (window->GetCover().mEndpoint == 1) ? LcdIcon::One : LcdIcon::Two; window->UpdateLCD(); break; case AppEvent::kEventType_TiltModeChange: ChipLogDetail(AppServer, "App control mode changed to %s", window->mTiltMode ? "Tilt" : "Lift"); - window->mIconTimer.Start(); + if (window->mIconTimer != nullptr) + { + window->mIconTimer->Start(); + } window->mIcon = window->mTiltMode ? LcdIcon::Tilt : LcdIcon::Lift; window->UpdateLCD(); break; diff --git a/examples/window-app/telink/README.md b/examples/window-app/telink/README.md index c5500aa5c9cbd6..9d35cbc2d5a360 100644 --- a/examples/window-app/telink/README.md +++ b/examples/window-app/telink/README.md @@ -28,7 +28,7 @@ for creating your own application. ``` 3. In the example dir run (replace __ with your board name, for - example, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): + example, `tlsr9118bdk40d`, `tlsr9518adk80d`, `tlsr9528a` or `tlsr9258a`): ```bash $ west build -b diff --git a/integrations/docker/images/chip-cert-bins/Dockerfile b/integrations/docker/images/chip-cert-bins/Dockerfile index b04679dd3a1ebe..ef26e30945c943 100644 --- a/integrations/docker/images/chip-cert-bins/Dockerfile +++ b/integrations/docker/images/chip-cert-bins/Dockerfile @@ -89,7 +89,6 @@ RUN set -x \ wget \ git-lfs \ zlib1g-dev \ - && rm -rf /var/lib/apt/lists/ \ && git lfs install \ && : # last line @@ -119,13 +118,12 @@ RUN case ${TARGETPLATFORM} in \ # Python 3 and PIP RUN set -x \ - && DEBIAN_FRONTEND=noninteractive apt-get update \ - && DEBIAN_FRONTEND=noninteractive apt-get install -y libgirepository1.0-dev \ - && DEBIAN_FRONTEND=noninteractive apt-get install -y software-properties-common \ + && DEBIAN_FRONTEND=noninteractive apt-get install -y \ + libgirepository1.0-dev \ + software-properties-common \ && add-apt-repository universe \ && curl https://bootstrap.pypa.io/get-pip.py -o get-pip.py \ && python3 get-pip.py \ - && rm -rf /var/lib/apt/lists/ \ && : # last line RUN set -x \ @@ -148,9 +146,9 @@ RUN set -x \ && git clone https://github.com/google/bloaty.git \ && mkdir -p bloaty/build \ && cd bloaty/build \ - && cmake ../ \ - && make -j8 \ - && make install \ + && cmake -G Ninja ../ \ + && ninja \ + && ninja install \ && cd ../.. \ && rm -rf bloaty \ && : # last line @@ -194,7 +192,6 @@ RUN case ${TARGETPLATFORM} in \ --target linux-x64-lit-icd-ipv6only \ --target linux-x64-energy-management-ipv6only \ --target linux-x64-microwave-oven-ipv6only \ - --target linux-x64-rvc-ipv6only \ build \ && mv out/linux-x64-chip-tool-ipv6only-platform-mdns/chip-tool out/chip-tool \ && mv out/linux-x64-shell-ipv6only-platform-mdns/chip-shell out/chip-shell \ @@ -214,7 +211,6 @@ RUN case ${TARGETPLATFORM} in \ && mv out/linux-x64-lit-icd-ipv6only/lit-icd-app out/lit-icd-app \ && mv out/linux-x64-energy-management-ipv6only/chip-energy-management-app out/chip-energy-management-app \ && mv out/linux-x64-microwave-oven-ipv6only/chip-microwave-oven-app out/chip-microwave-oven-app \ - && mv out/linux-x64-rvc-ipv6only/chip-rvc-app out/chip-rvc-app \ ;; \ "linux/arm64")\ set -x \ @@ -257,7 +253,6 @@ RUN case ${TARGETPLATFORM} in \ && mv out/linux-arm64-lit-icd-ipv6only/lit-icd-app out/lit-icd-app \ && mv out/linux-arm64-energy-management-ipv6only/chip-energy-management-app out/chip-energy-management-app \ && mv out/linux-arm64-microwave-oven-ipv6only/chip-microwave-oven-app out/chip-microwave-oven-app \ - && mv out/linux-arm64-rvc-ipv6only/chip-rvc-app out/chip-rvc-app \ ;; \ *) ;; \ esac @@ -290,13 +285,11 @@ COPY --from=chip-build-cert-bins /root/connectedhomeip/out/chip-app1 chip-app1 COPY --from=chip-build-cert-bins /root/connectedhomeip/out/lit-icd-app lit-icd-app COPY --from=chip-build-cert-bins /root/connectedhomeip/out/chip-energy-management-app chip-energy-management-app COPY --from=chip-build-cert-bins /root/connectedhomeip/out/chip-microwave-oven-app chip-microwave-oven-app -COPY --from=chip-build-cert-bins /root/connectedhomeip/out/chip-rvc-app chip-rvc-app # Stage 3.1: Setup the Matter Python environment COPY --from=chip-build-cert-bins /root/connectedhomeip/out/python_lib python_lib COPY --from=chip-build-cert-bins /root/connectedhomeip/out/python_env python_env -COPY --from=chip-build-cert-bins /root/connectedhomeip/src/python_testing python_testing/scripts/sdk -COPY --from=chip-build-cert-bins /root/connectedhomeip/data_model python_testing/data_model +COPY --from=chip-build-cert-bins /root/connectedhomeip/src/python_testing python_testing COPY --from=chip-build-cert-bins /root/connectedhomeip/scripts/tests/requirements.txt /tmp/requirements.txt RUN pip install -r /tmp/requirements.txt && rm /tmp/requirements.txt @@ -304,4 +297,7 @@ RUN pip install -r /tmp/requirements.txt && rm /tmp/requirements.txt COPY --from=chip-build-cert-bins /root/connectedhomeip/src/python_testing/requirements.txt /tmp/requirements.txt RUN pip install -r /tmp/requirements.txt && rm /tmp/requirements.txt +# PIP requires MASON package compilation, which seems to require a JDK +RUN set -x && DEBIAN_FRONTEND=noninteractive apt-get install -fy openjdk-8-jdk + RUN pip install --no-cache-dir python_lib/controller/python/chip*.whl diff --git a/scripts/build/build/targets.py b/scripts/build/build/targets.py index 33e37670040e2b..94f0c7c598c07d 100755 --- a/scripts/build/build/targets.py +++ b/scripts/build/build/targets.py @@ -1,4 +1,4 @@ -# Copyright (c) 2021 Project CHIP Authors +# Copyright (c) 2021-2024 Project CHIP Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -130,6 +130,7 @@ def BuildHostTarget(): TargetPart('tv-app', app=HostApp.TV_APP), TargetPart('tv-casting-app', app=HostApp.TV_CASTING), TargetPart('bridge', app=HostApp.BRIDGE), + TargetPart('fabric-admin', app=HostApp.FABRIC_ADMIN), TargetPart('fabric-bridge', app=HostApp.FABRIC_BRIDGE), TargetPart('tests', app=HostApp.TESTS), TargetPart('chip-cert', app=HostApp.CERT_TOOL), @@ -737,6 +738,7 @@ def BuildTelinkTarget(): target = BuildTarget('telink', TelinkBuilder) target.AppendFixedTargets([ + TargetPart('tlsr9118bdk40d', board=TelinkBoard.TLRS9118BDK40D), TargetPart('tlsr9518adk80d', board=TelinkBoard.TLSR9518ADK80D), TargetPart('tlsr9528a', board=TelinkBoard.TLSR9528A), TargetPart('tlsr9528a_retention', board=TelinkBoard.TLSR9528A_RETENTION), diff --git a/scripts/build/builders/host.py b/scripts/build/builders/host.py index c68e0d1118254b..667cd39d47da99 100644 --- a/scripts/build/builders/host.py +++ b/scripts/build/builders/host.py @@ -67,6 +67,7 @@ class HostApp(Enum): EFR32_TEST_RUNNER = auto() TV_CASTING = auto() BRIDGE = auto() + FABRIC_ADMIN = auto() FABRIC_BRIDGE = auto() JAVA_MATTER_CONTROLLER = auto() KOTLIN_MATTER_CONTROLLER = auto() @@ -120,6 +121,8 @@ def ExamplePath(self): return 'tv-casting-app/linux' elif self == HostApp.BRIDGE: return 'bridge-app/linux' + elif self == HostApp.FABRIC_ADMIN: + return 'fabric-admin' elif self == HostApp.FABRIC_BRIDGE: return 'fabric-bridge-app/linux' elif self == HostApp.JAVA_MATTER_CONTROLLER: @@ -219,6 +222,9 @@ def OutputNames(self): elif self == HostApp.BRIDGE: yield 'chip-bridge-app' yield 'chip-bridge-app.map' + elif self == HostApp.FABRIC_ADMIN: + yield 'fabric-admin' + yield 'fabric-admin.map' elif self == HostApp.FABRIC_BRIDGE: yield 'fabric-bridge-app' yield 'fabric-bridge-app.map' diff --git a/scripts/build/builders/telink.py b/scripts/build/builders/telink.py index 9160c044a2be57..9b63635250dcf2 100644 --- a/scripts/build/builders/telink.py +++ b/scripts/build/builders/telink.py @@ -1,4 +1,4 @@ -# Copyright (c) 2022 Project CHIP Authors +# Copyright (c) 2022-2024 Project CHIP Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -114,6 +114,7 @@ def AppNamePrefix(self): class TelinkBoard(Enum): + TLRS9118BDK40D = auto() TLSR9518ADK80D = auto() TLSR9528A = auto() TLSR9528A_RETENTION = auto() @@ -121,7 +122,9 @@ class TelinkBoard(Enum): TLSR9258A_RETENTION = auto() def GnArgName(self): - if self == TelinkBoard.TLSR9518ADK80D: + if self == TelinkBoard.TLRS9118BDK40D: + return 'tlsr9118bdk40d' + elif self == TelinkBoard.TLSR9518ADK80D: return 'tlsr9518adk80d' elif self == TelinkBoard.TLSR9528A: return 'tlsr9528a' diff --git a/scripts/build/testdata/all_targets_linux_x64.txt b/scripts/build/testdata/all_targets_linux_x64.txt index b2273d694acdc6..a8ad9198f63da8 100644 --- a/scripts/build/testdata/all_targets_linux_x64.txt +++ b/scripts/build/testdata/all_targets_linux_x64.txt @@ -9,7 +9,7 @@ efr32-{brd2703a,brd4161a,brd4187c,brd4186c,brd4163a,brd4164a,brd4166a,brd4170a,b esp32-{m5stack,c3devkit,devkitc,qemu}-{all-clusters,all-clusters-minimal,energy-management,ota-provider,ota-requestor,shell,light,lock,bridge,temperature-measurement,ota-requestor,tests}[-rpc][-ipv6only][-tracing] genio-lighting-app linux-fake-tests[-mbedtls][-boringssl][-asan][-tsan][-ubsan][-libfuzzer][-ossfuzz][-coverage][-dmalloc][-clang] -linux-{x64,arm64}-{rpc-console,all-clusters,all-clusters-minimal,chip-tool,thermostat,java-matter-controller,kotlin-matter-controller,minmdns,light,lock,shell,ota-provider,ota-requestor,simulated-app1,simulated-app2,python-bindings,tv-app,tv-casting-app,bridge,fabric-bridge,tests,chip-cert,address-resolve-tool,contact-sensor,dishwasher,microwave-oven,refrigerator,rvc,air-purifier,lit-icd,air-quality-sensor,network-manager,energy-management}[-nodeps][-nlfaultinject][-platform-mdns][-minmdns-verbose][-libnl][-same-event-loop][-no-interactive][-ipv6only][-no-ble][-no-wifi][-no-thread][-mbedtls][-boringssl][-asan][-tsan][-ubsan][-libfuzzer][-ossfuzz][-coverage][-dmalloc][-clang][-test][-rpc][-with-ui][-evse-test-event][-enable-dnssd-tests][-disable-dnssd-tests] +linux-{x64,arm64}-{rpc-console,all-clusters,all-clusters-minimal,chip-tool,thermostat,java-matter-controller,kotlin-matter-controller,minmdns,light,lock,shell,ota-provider,ota-requestor,simulated-app1,simulated-app2,python-bindings,tv-app,tv-casting-app,bridge,fabric-admin,fabric-bridge,tests,chip-cert,address-resolve-tool,contact-sensor,dishwasher,microwave-oven,refrigerator,rvc,air-purifier,lit-icd,air-quality-sensor,network-manager,energy-management}[-nodeps][-nlfaultinject][-platform-mdns][-minmdns-verbose][-libnl][-same-event-loop][-no-interactive][-ipv6only][-no-ble][-no-wifi][-no-thread][-mbedtls][-boringssl][-asan][-tsan][-ubsan][-libfuzzer][-ossfuzz][-coverage][-dmalloc][-clang][-test][-rpc][-with-ui][-evse-test-event][-enable-dnssd-tests][-disable-dnssd-tests] linux-x64-efr32-test-runner[-clang] imx-{chip-tool,lighting-app,thermostat,all-clusters-app,all-clusters-minimal-app,ota-provider-app}[-release] infineon-psoc6-{lock,light,all-clusters,all-clusters-minimal}[-ota][-updateimage][-trustm] @@ -23,5 +23,5 @@ nuttx-x64-light qpg-qpg6105-{lock,light,shell,persistent-storage,light-switch,thermostat}[-updateimage] stm32-stm32wb5mm-dk-light tizen-arm-{all-clusters,all-clusters-minimal,chip-tool,light,tests}[-no-ble][-no-thread][-no-wifi][-asan][-ubsan][-with-ui] -telink-{tlsr9518adk80d,tlsr9528a,tlsr9528a_retention,tlsr9258a,tlsr9258a_retention}-{air-quality-sensor,all-clusters,all-clusters-minimal,bridge,contact-sensor,light,light-switch,lock,ota-requestor,pump,pump-controller,shell,smoke-co-alarm,temperature-measurement,thermostat,window-covering}[-ota][-dfu][-shell][-rpc][-factory-data][-4mb][-mars] +telink-{tlsr9118bdk40d,tlsr9518adk80d,tlsr9528a,tlsr9528a_retention,tlsr9258a,tlsr9258a_retention}-{air-quality-sensor,all-clusters,all-clusters-minimal,bridge,contact-sensor,light,light-switch,lock,ota-requestor,pump,pump-controller,shell,smoke-co-alarm,temperature-measurement,thermostat,window-covering}[-ota][-dfu][-shell][-rpc][-factory-data][-4mb][-mars] openiotsdk-{shell,lock}[-mbedtls][-psa] diff --git a/scripts/tools/telink/mfg_tool.py b/scripts/tools/telink/mfg_tool.py index c55e1fe4ca3c4a..dcc41d788215d9 100644 --- a/scripts/tools/telink/mfg_tool.py +++ b/scripts/tools/telink/mfg_tool.py @@ -1,6 +1,6 @@ #!/usr/bin/env python3 # -# Copyright (c) 2022 Project CHIP Authors +# Copyright (c) 2022-2024 Project CHIP Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -671,6 +671,7 @@ def base64_str(s): return base64.b64decode(s) check_str_range(args.hw_ver_str, 1, 64, 'Hardware version string') check_str_range(args.mfg_date, 8, 16, 'Manufacturing date') check_str_range(args.rd_id_uid, 16, 32, 'Rotating device Unique id') + check_str_range(args.enable_key, 32, 32, 'Enable Key') # Validates the attestation related arguments # DAC key and DAC cert both should be present or none diff --git a/src/BUILD.gn b/src/BUILD.gn index 01aae8abc3fbab..cf15f40ec00629 100644 --- a/src/BUILD.gn +++ b/src/BUILD.gn @@ -92,9 +92,9 @@ if (chip_build_tests) { ] } + # Skip on efr32 due to flash and/or ram limitations. if (chip_device_platform != "efr32") { tests += [ - # TODO(#10447): App test has HF on EFR32. "${chip_root}/src/app/tests", "${chip_root}/src/credentials/tests", "${chip_root}/src/lib/format/tests", @@ -128,7 +128,7 @@ if (chip_build_tests) { # https://github.com/project-chip/connectedhomeip/issues/9630 if (chip_device_platform != "nrfconnect" && chip_device_platform != "efr32") { - # TODO(#10447): Controller test has HF on EFR32. + # Doesn't compile on ef32. Multiple definitions issues with attribute storage and overflows flash memory. tests += [ "${chip_root}/src/controller/tests/data_model" ] # Skip controller test for Open IoT SDK diff --git a/src/app/InteractionModelDelegatePointers.cpp b/src/app/InteractionModelDelegatePointers.cpp index af4c85ee1bb1c2..56583888f3bc81 100644 --- a/src/app/InteractionModelDelegatePointers.cpp +++ b/src/app/InteractionModelDelegatePointers.cpp @@ -31,6 +31,12 @@ app::TimedHandlerDelegate * GlobalInstanceProvider::I return app::InteractionModelEngine::GetInstance(); } +template <> +app::WriteHandlerDelegate * GlobalInstanceProvider::InstancePointer() +{ + return app::InteractionModelEngine::GetInstance(); +} + } // namespace chip #endif diff --git a/src/app/InteractionModelEngine.cpp b/src/app/InteractionModelEngine.cpp index 97528768cb2561..6ee2a1134594b5 100644 --- a/src/app/InteractionModelEngine.cpp +++ b/src/app/InteractionModelEngine.cpp @@ -869,7 +869,7 @@ Protocols::InteractionModel::Status InteractionModelEngine::OnWriteRequest(Messa { if (writeHandler.IsFree()) { - VerifyOrReturnError(writeHandler.Init() == CHIP_NO_ERROR, Status::Busy); + VerifyOrReturnError(writeHandler.Init(this) == CHIP_NO_ERROR, Status::Busy); return writeHandler.OnWriteRequest(apExchangeContext, std::move(aPayload), aIsTimedWrite); } } diff --git a/src/app/InteractionModelEngine.h b/src/app/InteractionModelEngine.h index 87c497c9e9955d..4f61cb4e464a27 100644 --- a/src/app/InteractionModelEngine.h +++ b/src/app/InteractionModelEngine.h @@ -91,7 +91,8 @@ class InteractionModelEngine : public Messaging::UnsolicitedMessageHandler, public ReadHandler::ManagementCallback, public FabricTable::Delegate, public SubscriptionsInfoProvider, - public TimedHandlerDelegate + public TimedHandlerDelegate, + public WriteHandlerDelegate { public: /** @@ -235,6 +236,9 @@ class InteractionModelEngine : public Messaging::UnsolicitedMessageHandler, void OnTimedWrite(TimedHandler * apTimedHandler, Messaging::ExchangeContext * apExchangeContext, const PayloadHeader & aPayloadHeader, System::PacketBufferHandle && aPayload) override; + // WriteHandlerDelegate implementation + bool HasConflictWriteRequests(const WriteHandler * apWriteHandler, const ConcreteAttributePath & apath) override; + #if CHIP_CONFIG_ENABLE_READ_CLIENT /** * Activate the idle subscriptions. @@ -279,12 +283,6 @@ class InteractionModelEngine : public Messaging::UnsolicitedMessageHandler, */ size_t GetNumDirtySubscriptions() const; - /** - * Returns whether the write operation to the given path is conflict with another write operations. (i.e. another write - * transaction is in the middle of processing the chunked value of the given path.) - */ - bool HasConflictWriteRequests(const WriteHandler * apWriteHandler, const ConcreteAttributePath & aPath); - /** * Select the oldest (and the one that exceeds the per subscription resource minimum if there are any) read handler on the * fabric with the given fabric index. Evict it when the fabric uses more resources than the per fabric quota or aForceEvict is diff --git a/src/app/WriteHandler.cpp b/src/app/WriteHandler.cpp index f7f3ee1c8ae7ae..068f1f6b5c3004 100644 --- a/src/app/WriteHandler.cpp +++ b/src/app/WriteHandler.cpp @@ -36,10 +36,12 @@ using namespace Protocols::InteractionModel; using Status = Protocols::InteractionModel::Status; constexpr uint8_t kListAttributeType = 0x48; -CHIP_ERROR WriteHandler::Init() +CHIP_ERROR WriteHandler::Init(WriteHandlerDelegate * apWriteHandlerDelegate) { VerifyOrReturnError(!mExchangeCtx, CHIP_ERROR_INCORRECT_STATE); + VerifyOrReturnError(apWriteHandlerDelegate, CHIP_ERROR_INVALID_ARGUMENT); + mDelegate = apWriteHandlerDelegate; MoveToState(State::Initialized); mACLCheckCache.ClearValue(); @@ -241,7 +243,8 @@ CHIP_ERROR WriteHandler::DeliverFinalListWriteEndForGroupWrite(bool writeWasSucc processingConcreteAttributePath.mEndpointId = mapping.endpoint_id; - if (!InteractionModelEngine::GetInstance()->HasConflictWriteRequests(this, processingConcreteAttributePath)) + VerifyOrReturnError(mDelegate, CHIP_ERROR_INCORRECT_STATE); + if (!mDelegate->HasConflictWriteRequests(this, processingConcreteAttributePath)) { DeliverListWriteEnd(processingConcreteAttributePath, writeWasSuccessful); } @@ -306,7 +309,8 @@ CHIP_ERROR WriteHandler::ProcessAttributeDataIBs(TLV::TLVReader & aAttributeData dataAttributePath.mListOp = ConcreteDataAttributePath::ListOperation::ReplaceAll; } - if (InteractionModelEngine::GetInstance()->HasConflictWriteRequests(this, dataAttributePath) || + VerifyOrExit(mDelegate, err = CHIP_ERROR_INCORRECT_STATE); + if (mDelegate->HasConflictWriteRequests(this, dataAttributePath) || // Per chunking protocol, we are processing the list entries, but the initial empty list is not processed, so we reject // it with Busy status code. (dataAttributePath.IsListItemOperation() && !IsSameAttribute(mProcessingAttributePath, dataAttributePath))) @@ -458,13 +462,15 @@ CHIP_ERROR WriteHandler::ProcessGroupAttributeDataIBs(TLV::TLVReader & aAttribut { auto processingConcreteAttributePath = mProcessingAttributePath.Value(); processingConcreteAttributePath.mEndpointId = mapping.endpoint_id; - if (!InteractionModelEngine::GetInstance()->HasConflictWriteRequests(this, processingConcreteAttributePath)) + VerifyOrExit(mDelegate, err = CHIP_ERROR_INCORRECT_STATE); + if (mDelegate->HasConflictWriteRequests(this, processingConcreteAttributePath)) { DeliverListWriteEnd(processingConcreteAttributePath, true /* writeWasSuccessful */); } } - if (InteractionModelEngine::GetInstance()->HasConflictWriteRequests(this, dataAttributePath)) + VerifyOrExit(mDelegate, err = CHIP_ERROR_INCORRECT_STATE); + if (mDelegate->HasConflictWriteRequests(this, dataAttributePath)) { ChipLogDetail(DataManagement, "Writing attribute endpoint=%u Cluster=" ChipLogFormatMEI " attribute=" ChipLogFormatMEI diff --git a/src/app/WriteHandler.h b/src/app/WriteHandler.h index 9a004d9b0e5e60..907aa043561eed 100644 --- a/src/app/WriteHandler.h +++ b/src/app/WriteHandler.h @@ -19,6 +19,7 @@ #pragma once #include #include +#include #include #include #include @@ -35,6 +36,21 @@ namespace chip { namespace app { + +class WriteHandler; + +class WriteHandlerDelegate +{ +public: + virtual ~WriteHandlerDelegate() = default; + + /** + * Returns whether the write operation to the given path is in conflict with another write operation. + * (i.e. another write transaction is in the middle of processing a chunked write to the given path.) + */ + virtual bool HasConflictWriteRequests(const WriteHandler * apWriteHandler, const ConcreteAttributePath & aPath) = 0; +}; + /** * @brief The write handler is responsible for processing a write request and sending a write reply. */ @@ -49,11 +65,13 @@ class WriteHandler : public Messaging::ExchangeDelegate * construction until a call to Close is made to terminate the * instance. * + * @param[in] apWriteHandlerDelegate A Valid pointer to the WriteHandlerDelegate. + * * @retval #CHIP_ERROR_INCORRECT_STATE If the state is not equal to * kState_NotInitialized. * @retval #CHIP_NO_ERROR On success. */ - CHIP_ERROR Init(); + CHIP_ERROR Init(WriteHandlerDelegate * apWriteHandlerDelegate); /** * Process a write request. Parts of the processing may end up being asynchronous, but the WriteHandler @@ -175,6 +193,14 @@ class WriteHandler : public Messaging::ExchangeDelegate // Where (1)-(3) will be consistent among the whole list write request, while (4) and (5) are not appliable to group writes. bool mAttributeWriteSuccessful = false; Optional mACLCheckCache = NullOptional; + + // This may be a "fake" pointer or a real delegate pointer, depending + // on CHIP_CONFIG_STATIC_GLOBAL_INTERACTION_MODEL_ENGINE setting. + // + // When this is not a real pointer, it checks that the value is always + // set to the global InteractionModelEngine and the size of this + // member is 1 byte. + InteractionModelDelegatePointer mDelegate; }; } // namespace app } // namespace chip diff --git a/src/app/chip_data_model.cmake b/src/app/chip_data_model.cmake index 5573eeb275acd7..2d4149b66f6a8a 100644 --- a/src/app/chip_data_model.cmake +++ b/src/app/chip_data_model.cmake @@ -144,6 +144,8 @@ function(chip_configure_data_model APP_TARGET) ${CHIP_APP_BASE_DIR}/icd/server/ICDConfigurationData.cpp ${CHIP_APP_BASE_DIR}/util/DataModelHandler.cpp ${CHIP_APP_BASE_DIR}/util/ember-compatibility-functions.cpp + ${CHIP_APP_BASE_DIR}/util/ember-global-attribute-access-interface.cpp + ${CHIP_APP_BASE_DIR}/util/ember-io-storage.cpp ${CHIP_APP_BASE_DIR}/util/generic-callback-stubs.cpp ${CHIP_APP_BASE_DIR}/util/privilege-storage.cpp ${CHIP_APP_BASE_DIR}/util/util.cpp diff --git a/src/app/chip_data_model.gni b/src/app/chip_data_model.gni index c8a30b1b5bd36a..a68d193d241541 100644 --- a/src/app/chip_data_model.gni +++ b/src/app/chip_data_model.gni @@ -209,6 +209,8 @@ template("chip_data_model") { "${_app_root}/util/attribute-storage.cpp", "${_app_root}/util/attribute-table.cpp", "${_app_root}/util/ember-compatibility-functions.cpp", + "${_app_root}/util/ember-global-attribute-access-interface.cpp", + "${_app_root}/util/ember-io-storage.cpp", "${_app_root}/util/util.cpp", ] } diff --git a/src/app/icd/server/tests/TestICDManager.cpp b/src/app/icd/server/tests/TestICDManager.cpp index 6cba8c308b4e06..45e781685e6d31 100644 --- a/src/app/icd/server/tests/TestICDManager.cpp +++ b/src/app/icd/server/tests/TestICDManager.cpp @@ -1061,10 +1061,15 @@ TEST_F(TestICDManager, TestICDStateObserverOnTransitionToIdleModeEqualActiveMode // Expire IdleMode timer AdvanceClockAndRunEventLoop(1_s); - EXPECT_FALSE(mICDStateObserver.mOnTransitionToIdleCalled); + // In this scenario, The ICD state machine kicked a OnTransitionToIdle timer with a duration of 0 seconds. + // The freeRTOS systemlayer timer calls a 0s timer's callback instantly while on posix it take and 1 addition event loop. + // Thefore, the expect result diverges here based on the systemlayer implementation. Skip this check. + // https://github.com/project-chip/connectedhomeip/issues/33441 + // EXPECT_FALSE(mICDStateObserver.mOnTransitionToIdleCalled); // Expire OnTransitionToIdleMode AdvanceClockAndRunEventLoop(1_ms32); + // All systems should have called the OnTransitionToIdle callback by now. EXPECT_TRUE(mICDStateObserver.mOnTransitionToIdleCalled); // Reset Old durations diff --git a/src/app/tests/AppTestContext.h b/src/app/tests/AppTestContext.h index b9945fecd3a90a..a2fe3387d2d7aa 100644 --- a/src/app/tests/AppTestContext.h +++ b/src/app/tests/AppTestContext.h @@ -28,13 +28,13 @@ class AppContext : public LoopbackMessagingContext { public: // Performs shared setup for all tests in the test suite - void SetUpTestSuite() override; + static void SetUpTestSuite(); // Performs shared teardown for all tests in the test suite - void TearDownTestSuite() override; + static void TearDownTestSuite(); // Performs setup for each individual test in the test suite - void SetUp() override; + void SetUp(); // Performs teardown for each individual test in the test suite - void TearDown() override; + void TearDown(); }; } // namespace Test diff --git a/src/app/tests/BUILD.gn b/src/app/tests/BUILD.gn index 49196f2fdaaf8f..df6737a713e6e4 100644 --- a/src/app/tests/BUILD.gn +++ b/src/app/tests/BUILD.gn @@ -29,7 +29,6 @@ static_library("helpers") { "${chip_root}/src/app/reporting/tests/MockReportScheduler.cpp", "AppTestContext.cpp", "AppTestContext.h", - "integration/RequiredPrivilegeStubs.cpp", ] cflags = [ "-Wconversion" ] diff --git a/src/app/tests/TestAclAttribute.cpp b/src/app/tests/TestAclAttribute.cpp index c1bfd8acf68a73..427b257f9efd7c 100644 --- a/src/app/tests/TestAclAttribute.cpp +++ b/src/app/tests/TestAclAttribute.cpp @@ -259,10 +259,10 @@ const nlTest sTests[] = { nlTestSuite sSuite = { "TestAclAttribute", &sTests[0], - TestAccessContext::nlTestSetUpTestSuite, - TestAccessContext::nlTestTearDownTestSuite, - TestAccessContext::nlTestSetUp, - TestAccessContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestAccessContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestAccessContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestAccessContext, SetUp), + NL_TEST_WRAP_METHOD(TestAccessContext, TearDown), }; } // namespace diff --git a/src/app/tests/TestAclEvent.cpp b/src/app/tests/TestAclEvent.cpp index f7c85e0bccaed8..8f377cc263e9bd 100644 --- a/src/app/tests/TestAclEvent.cpp +++ b/src/app/tests/TestAclEvent.cpp @@ -377,10 +377,10 @@ nlTestSuite sSuite = { "TestAclEvent", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/app/tests/TestBufferedReadCallback.cpp b/src/app/tests/TestBufferedReadCallback.cpp index 93eca2ad5044f4..6079c21b50b49f 100644 --- a/src/app/tests/TestBufferedReadCallback.cpp +++ b/src/app/tests/TestBufferedReadCallback.cpp @@ -610,10 +610,10 @@ nlTestSuite theSuite = { "TestBufferedReadCallback", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; } diff --git a/src/app/tests/TestClusterStateCache.cpp b/src/app/tests/TestClusterStateCache.cpp index a871f3dd1a434e..3247af55bccd03 100644 --- a/src/app/tests/TestClusterStateCache.cpp +++ b/src/app/tests/TestClusterStateCache.cpp @@ -695,10 +695,10 @@ nlTestSuite theSuite = { "TestClusterStateCache", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; } diff --git a/src/app/tests/TestCommandInteraction.cpp b/src/app/tests/TestCommandInteraction.cpp index 87296580fa695f..195580ce8702a5 100644 --- a/src/app/tests/TestCommandInteraction.cpp +++ b/src/app/tests/TestCommandInteraction.cpp @@ -2120,10 +2120,10 @@ nlTestSuite sSuite = { "TestCommandInteraction", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/app/tests/TestEventLogging.cpp b/src/app/tests/TestEventLogging.cpp index 41ae31bd4295ff..854247240ac701 100644 --- a/src/app/tests/TestEventLogging.cpp +++ b/src/app/tests/TestEventLogging.cpp @@ -318,10 +318,10 @@ const nlTest sTests[] = { nlTestSuite sSuite = { "EventLogging", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; } // namespace diff --git a/src/app/tests/TestEventLoggingNoUTCTime.cpp b/src/app/tests/TestEventLoggingNoUTCTime.cpp index 77a8463a5f9718..c6dc4182b79e0e 100644 --- a/src/app/tests/TestEventLoggingNoUTCTime.cpp +++ b/src/app/tests/TestEventLoggingNoUTCTime.cpp @@ -84,16 +84,16 @@ class TestContext : public chip::Test::AppContext { public: // Performs shared setup for all tests in the test suite - void SetUpTestSuite() override + static void SetUpTestSuite() { chip::Test::AppContext::SetUpTestSuite(); - mClock.Emplace(chip::System::SystemClock()); + sClock.Emplace(chip::System::SystemClock()); } // Performs shared teardown for all tests in the test suite - void TearDownTestSuite() override + static void TearDownTestSuite() { - mClock.ClearValue(); + sClock.ClearValue(); chip::Test::AppContext::TearDownTestSuite(); } @@ -125,9 +125,11 @@ class TestContext : public chip::Test::AppContext private: chip::MonotonicallyIncreasingCounter mEventCounter; - chip::Optional mClock; + static chip::Optional sClock; }; +chip::Optional TestContext::sClock; + void ENFORCE_FORMAT(1, 2) SimpleDumpWriter(const char * aFormat, ...) { va_list args; @@ -370,10 +372,10 @@ const nlTest sTests[] = { nlTestSuite sSuite = { "EventLogging", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; } // namespace diff --git a/src/app/tests/TestEventOverflow.cpp b/src/app/tests/TestEventOverflow.cpp index a328bec9783ef2..23615f401d6f75 100644 --- a/src/app/tests/TestEventOverflow.cpp +++ b/src/app/tests/TestEventOverflow.cpp @@ -169,10 +169,10 @@ nlTestSuite sSuite = { "TestEventOverflow", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/app/tests/TestFabricScopedEventLogging.cpp b/src/app/tests/TestFabricScopedEventLogging.cpp index 082aca0a2ecb7d..2ed758573aa5b6 100644 --- a/src/app/tests/TestFabricScopedEventLogging.cpp +++ b/src/app/tests/TestFabricScopedEventLogging.cpp @@ -278,10 +278,10 @@ nlTestSuite sSuite = { "TestFabricScopedEventLogging", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/app/tests/TestInteractionModelEngine.cpp b/src/app/tests/TestInteractionModelEngine.cpp index 4f0b75315355ad..3d6abd9e651d49 100644 --- a/src/app/tests/TestInteractionModelEngine.cpp +++ b/src/app/tests/TestInteractionModelEngine.cpp @@ -773,10 +773,10 @@ nlTestSuite sSuite = { "TestInteractionModelEngine", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/app/tests/TestReadInteraction.cpp b/src/app/tests/TestReadInteraction.cpp index 7e18cca7883c8f..e06721806732f6 100644 --- a/src/app/tests/TestReadInteraction.cpp +++ b/src/app/tests/TestReadInteraction.cpp @@ -79,13 +79,13 @@ class TestContext : public chip::Test::AppContext { public: // Performs shared setup for all tests in the test suite - void SetUpTestSuite() override + static void SetUpTestSuite() { chip::Test::AppContext::SetUpTestSuite(); gRealClock = &chip::System::SystemClock(); chip::System::Clock::Internal::SetSystemClockForTesting(&gMockClock); - if (mSyncScheduler) + if (sSyncScheduler) { gReportScheduler = chip::app::reporting::GetSynchronizedReportScheduler(); sUsingSubSync = true; @@ -96,14 +96,8 @@ class TestContext : public chip::Test::AppContext } } - static int nlTestSetUpTestSuite_Sync(void * context) - { - static_cast(context)->mSyncScheduler = true; - return nlTestSetUpTestSuite(context); - } - // Performs shared teardown for all tests in the test suite - void TearDownTestSuite() override + static void TearDownTestSuite() { chip::System::Clock::Internal::SetSystemClockForTesting(gRealClock); chip::Test::AppContext::TearDownTestSuite(); @@ -133,9 +127,21 @@ class TestContext : public chip::Test::AppContext chip::Test::AppContext::TearDown(); } -private: +protected: chip::MonotonicallyIncreasingCounter mEventCounter; - bool mSyncScheduler = false; + static bool sSyncScheduler; +}; + +bool TestContext::sSyncScheduler = false; + +class TestSyncContext : public TestContext +{ +public: + static void SetUpTestSuite() + { + sSyncScheduler = true; + TestContext::SetUpTestSuite(); + } }; class TestEventGenerator : public chip::app::EventLoggingDelegate @@ -5146,19 +5152,19 @@ const nlTest sTests[] = { nlTestSuite sSuite = { "TestReadInteraction", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; nlTestSuite sSyncSuite = { "TestSyncReadInteraction", &sTests[0], - TestContext::nlTestSetUpTestSuite_Sync, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestSyncContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestSyncContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestSyncContext, SetUp), + NL_TEST_WRAP_METHOD(TestSyncContext, TearDown), }; } // namespace diff --git a/src/app/tests/TestReportScheduler.cpp b/src/app/tests/TestReportScheduler.cpp index 5219943136847d..b7289f5f2daa90 100644 --- a/src/app/tests/TestReportScheduler.cpp +++ b/src/app/tests/TestReportScheduler.cpp @@ -821,10 +821,10 @@ static nlTest sTests[] = { nlTestSuite sSuite = { "TestReportScheduler", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; } // namespace diff --git a/src/app/tests/TestReportingEngine.cpp b/src/app/tests/TestReportingEngine.cpp index 618a2e892e789b..459c9752016e48 100644 --- a/src/app/tests/TestReportingEngine.cpp +++ b/src/app/tests/TestReportingEngine.cpp @@ -350,10 +350,10 @@ nlTestSuite sSuite = { "TestReportingEngine", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/app/tests/TestTimedHandler.cpp b/src/app/tests/TestTimedHandler.cpp index 29e8aac71d35a7..64e174a2b9e7d7 100644 --- a/src/app/tests/TestTimedHandler.cpp +++ b/src/app/tests/TestTimedHandler.cpp @@ -264,10 +264,10 @@ nlTestSuite sSuite = { "TestTimedHandler", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/app/tests/TestWriteInteraction.cpp b/src/app/tests/TestWriteInteraction.cpp index 16647ca523829e..795c52a9030f99 100644 --- a/src/app/tests/TestWriteInteraction.cpp +++ b/src/app/tests/TestWriteInteraction.cpp @@ -338,7 +338,7 @@ void TestWriteInteraction::TestWriteHandler(nlTestSuite * apSuite, void * apCont app::WriteHandler writeHandler; System::PacketBufferHandle buf = System::PacketBufferHandle::New(System::PacketBuffer::kMaxSize); - err = writeHandler.Init(); + err = writeHandler.Init(chip::app::InteractionModelEngine::GetInstance()); GenerateWriteRequest(apSuite, apContext, messageIsTimed, buf); @@ -1063,10 +1063,10 @@ const nlTest sTests[] = nlTestSuite sSuite = { "TestWriteInteraction", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; } // namespace diff --git a/src/app/tests/integration/BUILD.gn b/src/app/tests/integration/BUILD.gn index da0db88682f180..49aea9034e9766 100644 --- a/src/app/tests/integration/BUILD.gn +++ b/src/app/tests/integration/BUILD.gn @@ -38,7 +38,6 @@ source_set("common") { executable("chip-im-initiator") { sources = [ "${chip_root}/src/app/reporting/tests/MockReportScheduler.cpp", - "RequiredPrivilegeStubs.cpp", "chip_im_initiator.cpp", ] @@ -61,7 +60,6 @@ executable("chip-im-responder") { "${chip_root}/src/app/reporting/tests/MockReportScheduler.cpp", "MockEvents.cpp", "MockEvents.h", - "RequiredPrivilegeStubs.cpp", "chip_im_responder.cpp", ] diff --git a/src/app/tests/suites/TestCluster.yaml b/src/app/tests/suites/TestCluster.yaml index 017d6ce6b6daf4..540683a5422f13 100644 --- a/src/app/tests/suites/TestCluster.yaml +++ b/src/app/tests/suites/TestCluster.yaml @@ -2896,7 +2896,7 @@ tests: constraints: notValue: nullableOctetStrTestValue - # Tests for Char String attribute + # Tests for Nullable Char String attribute - label: "Read attribute NULLABLE_CHAR_STRING Default Value" command: "readAttribute" @@ -2968,6 +2968,18 @@ tests: response: error: UNSUPPORTED_CLUSTER + - label: "Write attribute NULLABLE_CHAR_STRING - Value starting with null" + command: "writeAttribute" + attribute: "nullable_char_string" + arguments: + value: "nulla" + + - label: "Read attribute NULLABLE_CHAR_STRING" + command: "readAttribute" + attribute: "nullable_char_string" + response: + value: "nulla" + # Tests for command with optional arguments - label: "Send a command that takes an optional parameter but do not set it." diff --git a/src/app/tests/suites/TestIcdManagementCluster.yaml b/src/app/tests/suites/TestIcdManagementCluster.yaml index f7f207ab8df310..a3196835915b52 100644 --- a/src/app/tests/suites/TestIcdManagementCluster.yaml +++ b/src/app/tests/suites/TestIcdManagementCluster.yaml @@ -141,7 +141,7 @@ tests: response: constraints: type: bitmap32 - value: 0x110D + value: 0x111D - label: "Read UserActiveModeTriggerInstruction" command: "readAttribute" diff --git a/src/app/tests/suites/certification/PICS.yaml b/src/app/tests/suites/certification/PICS.yaml index d23a1db8cdc6cb..cf0159804aeee3 100644 --- a/src/app/tests/suites/certification/PICS.yaml +++ b/src/app/tests/suites/certification/PICS.yaml @@ -8692,10 +8692,13 @@ PICS: "Does the device implement the UserActiveModeTriggerHint attribute?" id: ICDM.S.A0006 + - label: "Does the device implement the OperatingMode? attribute?" + id: ICDM.S.A0007 + - label: "Does the device implement the UserActiveModeTriggerInstruction attribute?" - id: ICDM.S.A0007 + id: ICDM.S.A0008 # # Client Attribute diff --git a/src/app/tests/suites/certification/Test_TC_ICDM_2_2.yaml b/src/app/tests/suites/certification/Test_TC_ICDM_2_2.yaml deleted file mode 100644 index c23b7fae1ea6c1..00000000000000 --- a/src/app/tests/suites/certification/Test_TC_ICDM_2_2.yaml +++ /dev/null @@ -1,277 +0,0 @@ -# Copyright (c) 2023 Project CHIP Authors -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# Auto-generated scripts for harness use only, please review before automation. The endpoints and cluster names are currently set to default - -name: 214.2.2. [TC-ICDM-2.2] Primary functionality with DUT as Server - -PICS: - - ICDM.S - - ICDM.S.C00.Rsp - - ICDM.S.C02.Rsp - -config: - nodeId: 0x12344321 - cluster: "Basic Information" - endpoint: 0 - -tests: - - label: "Precondition" - verification: | - Commission DUT to TH (can be skipped if done in a preceding test). - TH reads from the DUT the RegisteredClients attribute. - If list of registered clients is not empty, unregister existing clients - TH reads from the DUT the RegisteredClients attribute. Verify that the DUT response contains empty list of registered clients. - disabled: true - - - label: - "Step 1: TH sends RegisterClient command. - CheckInNodeID: registering - clients node ID - MonitoredSubject: monitored subject ID - Key: shared - secret between the client and the ICD used in the encryption of the - check-in message payload." - PICS: ICDM.S.C00.Rsp - verification: | - ./chip-tool icdmanagement register-client 1 1 1234567890abcdef 1 0 - On TH(chip-tool) verify that DUT responds with status code as success - - [1687534883748] [49948:406768] [DMG] Received Command Response Data, Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0001 - [1687534883748] [49948:406768] [TOO] Endpoint: 0 Cluster: 0x0000_0046 Command 0x0000_0001 - [1687534883748] [49948:406768] [TOO] RegisterClientResponse: { - [1687534883748] [49948:406768] [TOO] ICDCounter: 0 - [1687534883748] [49948:406768] [TOO] } - disabled: true - - - label: "Step 2: TH reads from the DUT the RegisteredClients attribute." - PICS: ICDM.S.A0003 - verification: | - ./chip-tool icdmanagement read registered-clients 1 0 - - On TH(Chip-tool), Verify that the DUT response contains a list of 1 registered client of given CheckInNodeID, MonitoredSubject, and Key - - [1689676816.943056][18202:18204] CHIP:DMG: } - [1689676816.943185][18202:18204] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0003 DataVersion: 1824957093 - [1689676816.943237][18202:18204] CHIP:TOO: RegisteredClients: 2 entries - [1689676816.943266][18202:18204] CHIP:TOO: [1]: { - [1689676816.943273][18202:18204] CHIP:TOO: CheckInNodeID: 1 - [1689676816.943279][18202:18204] CHIP:TOO: MonitoredSubject: 1 - [1689676816.943288][18202:18204] CHIP:TOO: Key: 31323334353637383930616263646566 - [1689676816.943302][18202:18204] CHIP:TOO: FabricIndex: 1 - [1689676816.943309][18202:18204] CHIP:TOO: } - [1689676816.943411][18202:18204] CHIP:EM: <<< [E:57729i S:18360 M:263136445 (Ack:51562449)] (S) Msg TX to 1:0000000000000001 [BFDE] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689676816.943425][18202:18204] CHIP:IN: (S) Sending msg 263136445 on secure session with LSID: 18360 - disabled: true - - - label: - "Step 3a: TH reads from the DUT the - ICDM.S.A0005(ClientsSupportedPerFabric) attribute." - PICS: ICDM.S.A0005 - verification: | - ./chip-tool icdmanagement read clients-supported-per-fabric 1 0 - - [1689676851.025335][18210:18212] CHIP:DMG: } - [1689676851.025406][18210:18212] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0005 DataVersion: 1824957093 - [1689676851.025433][18210:18212] CHIP:TOO: ClientsSupportedPerFabric: 2 - [1689676851.025500][18210:18212] CHIP:EM: <<< [E:302i S:21595 M:237990169 (Ack:268232015)] (S) Msg TX to 1:0000000000000001 [BFDE] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689676851.025513][18210:18212] CHIP:IN: (S) Sending msg 237990169 on secure session with LSID: 21595 - [1689676851.025540][18210:18212] CHIP:EM: Flushed pending ack for MessageCounter:268232015 on exchange 302i - disabled: true - - - label: - "Step 3b: If RegisteredClients is less than ClientsSupportedPerFabric, - TH repeats RegisterClient command with a different CheckInNodeID until - the number of RegisteredClients equals ClientsSupportedPerFabric." - PICS: ICDM.S.C00.Rsp - verification: | - ./chip-tool icdmanagement register-client 2 2 2234567890abcdef 1 0 - - On TH(chip-tool) verify that DUT responds with status code as success - - [1687535275413] [50580:413095] [DMG] Received Command Response Data, Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0001 - [1687535275413] [50580:413095] [TOO] Endpoint: 0 Cluster: 0x0000_0046 Command 0x0000_0001 - [1687535275413] [50580:413095] [TOO] RegisterClientResponse: { - [1687535275413] [50580:413095] [TOO] ICDCounter: 0 - [1687535275413] [50580:413095] [TOO] } - disabled: true - - - label: - "Step 3c: TH sends RegisterClient command with a different - CheckInNodeID." - PICS: ICDM.S.C00.Rsp - verification: | - ./chip-tool icdmanagement register-client 10 20 abcdef1234567890 1 0 - - On TH(chip-tool) verify that DUT responds with status as RESOURCE_EXHAUSTED(0x89) - - [1687535364276] [50673:414417] [DMG] Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0000 Status=0x89 - [1687535364276] [50673:414417] [TOO] Error: IM Error 0x00000589: General error: 0x89 (RESOURCE_EXHAUSTED) - disabled: true - - - label: "Step 4: TH reads from the DUT the RegisteredClients attribute." - PICS: ICDM.S.A0003 - verification: | - ./chip-tool icdmanagement read registered-clients 1 0 - On TH(chip-tool), Verify that the DUT response contains a list of registered clients from Step 1 and 3b; each entry contains CheckInNodeID, MonitoredSubject, and Key. - - [1689676880.681118][18221:18223] CHIP:DMG: } - [1689676880.681246][18221:18223] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0003 DataVersion: 1824957093 - [1689676880.681292][18221:18223] CHIP:TOO: RegisteredClients: 2 entries - [1689676880.681320][18221:18223] CHIP:TOO: [1]: { - [1689676880.681334][18221:18223] CHIP:TOO: CheckInNodeID: 1 - [1689676880.681341][18221:18223] CHIP:TOO: MonitoredSubject: 1 - [1689676880.681349][18221:18223] CHIP:TOO: Key: 31323334353637383930616263646566 - [1689676880.681357][18221:18223] CHIP:TOO: FabricIndex: 1 - [1689676880.681363][18221:18223] CHIP:TOO: } - [1689676880.681373][18221:18223] CHIP:TOO: [2]: { - [1689676880.681378][18221:18223] CHIP:TOO: CheckInNodeID: 2 - [1689676880.681384][18221:18223] CHIP:TOO: MonitoredSubject: 2 - [1689676880.681390][18221:18223] CHIP:TOO: Key: 32323334353637383930616263646566 - [1689676880.681396][18221:18223] CHIP:TOO: FabricIndex: 1 - [1689676880.681401][18221:18223] CHIP:TOO: } - [1689676880.681461][18221:18223] CHIP:EM: <<< [E:58454i S:61329 M:203963160 (Ack:146764558)] (S) Msg TX to 1:0000000000000001 [BFDE] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689676880.681475][18221:18223] CHIP:IN: (S) Sending msg 203963160 on secure session with LSID: 61329 - [1689676880.681506][18221:18223] CHIP:EM: Flushed pending ack for MessageCounter:146764558 on exchange 58454i - [1689676880.681697][18221:18221] CHIP:CTL: Shutting down the commissioner - disabled: true - - - label: - "Step 5a: TH sends UnregisterClient command with a CheckInNodeID which - is not in the list of RegisteredClients from Step 4." - PICS: ICDM.S.C02.Rsp - verification: | - ./chip-tool icdmanagement unregister-client 10 1 0 - On TH(chip-tool) verify that DUT responds with status as NOT_FOUND(0x8b). - [1687535473821] [50706:415574] [DMG] Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x8b - [1687535473821] [50706:415574] [TOO] Error: IM Error 0x0000058B: General error: 0x8b (NOT_FOUND) - disabled: true - - - label: - "Step 5b: TH sends UnregisterClient command with the CheckInNodeID - from Step 1." - PICS: ICDM.S.C02.Rsp - verification: | - ./chip-tool icdmanagement unregister-client 1 1 0 - On TH(chip-tool) verify that DUT responds with status as SUCCESS(0x00). - [1689764286.310839][26236:26241] CHIP:DMG: InvokeResponseMessage = - [1689764286.310843][26236:26241] CHIP:DMG: { - [1689764286.310848][26236:26241] CHIP:DMG: suppressResponse = false, - [1689764286.310852][26236:26241] CHIP:DMG: InvokeResponseIBs = - [1689764286.310859][26236:26241] CHIP:DMG: [ - [1689764286.310863][26236:26241] CHIP:DMG: InvokeResponseIB = - [1689764286.310871][26236:26241] CHIP:DMG: { - [1689764286.310875][26236:26241] CHIP:DMG: CommandStatusIB = - [1689764286.310880][26236:26241] CHIP:DMG: { - [1689764286.310885][26236:26241] CHIP:DMG: CommandPathIB = - [1689764286.310891][26236:26241] CHIP:DMG: { - [1689764286.310896][26236:26241] CHIP:DMG: EndpointId = 0x0, - [1689764286.310901][26236:26241] CHIP:DMG: ClusterId = 0x46, - [1689764286.310906][26236:26241] CHIP:DMG: CommandId = 0x2, - [1689764286.310911][26236:26241] CHIP:DMG: }, - [1689764286.310919][26236:26241] CHIP:DMG: - [1689764286.310922][26236:26241] CHIP:DMG: StatusIB = - [1689764286.310928][26236:26241] CHIP:DMG: { - [1689764286.310932][26236:26241] CHIP:DMG: status = 0x00 (SUCCESS), - [1689764286.310936][26236:26241] CHIP:DMG: }, - [1689764286.310941][26236:26241] CHIP:DMG: - [1689764286.310945][26236:26241] CHIP:DMG: }, - [1689764286.310951][26236:26241] CHIP:DMG: - [1689764286.310955][26236:26241] CHIP:DMG: }, - [1689764286.310962][26236:26241] CHIP:DMG: - [1689764286.310966][26236:26241] CHIP:DMG: ], - [1689764286.310972][26236:26241] CHIP:DMG: - [1689764286.310976][26236:26241] CHIP:DMG: InteractionModelRevision = 1 - [1689764286.310980][26236:26241] CHIP:DMG: }, - [1689764286.311002][26236:26241] CHIP:DMG: Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x0 - [1689764286.311020][26236:26241] CHIP:DMG: ICR moving to [AwaitingDe] - [1689764286.311060][26236:26241] CHIP:EM: <<< [E:63413i S:31018 M:161228496 (Ack:98843769)] (S) Msg TX to 1:0000000000000001 [D397] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689764286.311069][26236:26241] CHIP:IN: (S) Sending msg 161228496 on secure session with LSID: 31018 - [1689764286.311093][26236:26241] CHIP:EM: Flushed pending ack for MessageCounter:98843769 on exchange 63413i - disabled: true - - - label: - "Step 5c: Repeat Step 5b with the rest of CheckInNodeIDs from the list - of RegisteredClients from Step 4, if any." - PICS: ICDM.S.C02.Rsp - verification: | - ./chip-tool icdmanagement unregister-client 2 1 0 - On TH(chip-tool) verify that DUT responds with status as SUCCESS(0x00). - - [1689764308.632783][26647:26650] CHIP:DMG: ICR moving to [ResponseRe] - [1689764308.632806][26647:26650] CHIP:DMG: InvokeResponseMessage = - [1689764308.632816][26647:26650] CHIP:DMG: { - [1689764308.632826][26647:26650] CHIP:DMG: suppressResponse = false, - [1689764308.632842][26647:26650] CHIP:DMG: InvokeResponseIBs = - [1689764308.632864][26647:26650] CHIP:DMG: [ - [1689764308.632878][26647:26650] CHIP:DMG: InvokeResponseIB = - [1689764308.632899][26647:26650] CHIP:DMG: { - [1689764308.632918][26647:26650] CHIP:DMG: CommandStatusIB = - [1689764308.632941][26647:26650] CHIP:DMG: { - [1689764308.632982][26647:26650] CHIP:DMG: CommandPathIB = - [1689764308.633008][26647:26650] CHIP:DMG: { - [1689764308.633028][26647:26650] CHIP:DMG: EndpointId = 0x0, - [1689764308.633056][26647:26650] CHIP:DMG: ClusterId = 0x46, - [1689764308.633080][26647:26650] CHIP:DMG: CommandId = 0x2, - [1689764308.633103][26647:26650] CHIP:DMG: }, - [1689764308.633129][26647:26650] CHIP:DMG: - [1689764308.633151][26647:26650] CHIP:DMG: StatusIB = - [1689764308.633176][26647:26650] CHIP:DMG: { - [1689764308.633201][26647:26650] CHIP:DMG: status = 0x00 (SUCCESS), - [1689764308.633228][26647:26650] CHIP:DMG: }, - [1689764308.633252][26647:26650] CHIP:DMG: - [1689764308.633273][26647:26650] CHIP:DMG: }, - [1689764308.633295][26647:26650] CHIP:DMG: - [1689764308.633311][26647:26650] CHIP:DMG: }, - [1689764308.633331][26647:26650] CHIP:DMG: - [1689764308.633345][26647:26650] CHIP:DMG: ], - [1689764308.633363][26647:26650] CHIP:DMG: - [1689764308.633383][26647:26650] CHIP:DMG: InteractionModelRevision = 1 - [1689764308.633413][26647:26650] CHIP:DMG: }, - [1689764308.633514][26647:26650] CHIP:DMG: Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x0 - [1689764308.633536][26647:26650] CHIP:DMG: ICR moving to [AwaitingDe] - disabled: true - - - label: "Step 6: TH reads from the DUT the RegisteredClients attribute." - PICS: ICDM.S.A0003 - verification: | - ./chip-tool icdmanagement read registered-clients 1 0 - On TH(chip-tool) Verify that the DUT response contains empty list of registered clients. - - [1689764322.761414][26808:26810] CHIP:DMG: } - [1689764322.761506][26808:26810] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0003 DataVersion: 1750818309 - [1689764322.761629][26808:26810] CHIP:TOO: RegisteredClients: 0 entries - [1689764322.761723][26808:26810] CHIP:EM: <<< [E:36669i S:5946 M:161762028 (Ack:88110606)] (S) Msg TX to 1:0000000000000001 [D397] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689764322.761742][26808:26810] CHIP:IN: (S) Sending msg 161762028 on secure session with LSID: 5946 - [1689764322.761775][26808:26810] CHIP:EM: Flushed pending ack for MessageCounter:88110606 on exchange 36669i - disabled: true - - - label: - "Step 7: TH sends UnregisterClient command with the CheckInNodeID from - Step 1." - PICS: ICDM.S.C02.Rsp - verification: | - ./chip-tool icdmanagement unregister-client 1 1 0 - On TH(chip-tool) verify that DUT responds with status as NOT_FOUND(0x8b) - - [1689764335.957449][27077:27079] CHIP:DMG: }, - [1689764335.957456][27077:27079] CHIP:DMG: - [1689764335.957460][27077:27079] CHIP:DMG: ], - [1689764335.957468][27077:27079] CHIP:DMG: - [1689764335.957472][27077:27079] CHIP:DMG: InteractionModelRevision = 1 - [1689764335.957476][27077:27079] CHIP:DMG: }, - [1689764335.957497][27077:27079] CHIP:DMG: Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x8b - [1689764335.957513][27077:27079] CHIP:TOO: Error: IM Error 0x0000058B: General error: 0x8b (NOT_FOUND) - [1689764335.957525][27077:27079] CHIP:DMG: ICR moving to [AwaitingDe] - [1689764335.957567][27077:27079] CHIP:EM: <<< [E:17566i S:36201 M:3097260 (Ack:169314533)] (S) Msg TX to 1:0000000000000001 [D397] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689764335.957578][27077:27079] CHIP:IN: (S) Sending msg 3097260 on secure session with LSID: 36201 - [1689764335.957604][27077:27079] CHIP:EM: Flushed pending ack for MessageCounter:169314533 on exchange 17566i - [1689764335.957677][27077:27077] CHIP:CTL: Shutting down the commissioner - disabled: true diff --git a/src/app/tests/suites/certification/Test_TC_ICDM_3_1.yaml b/src/app/tests/suites/certification/Test_TC_ICDM_3_1.yaml deleted file mode 100644 index 365d820bccf00f..00000000000000 --- a/src/app/tests/suites/certification/Test_TC_ICDM_3_1.yaml +++ /dev/null @@ -1,319 +0,0 @@ -# Copyright (c) 2024 Project CHIP Authors -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# Auto-generated scripts for harness use only, please review before automation. The endpoints and cluster names are currently set to default - -name: 217.2.2. [TC-ICDM-3.1] Register/Unregister Clients with DUT as Server - -PICS: - - ICDM.S - - ICDM.S.F00 - - ICDM.S.C00.Rsp - - ICDM.S.C02.Rsp - -config: - nodeId: 0x12344321 - cluster: "Basic Information" - endpoint: 0 - -tests: - - label: "Preconditions" - verification: | - 1.Commission DUT to TH (can be skipped if done in a preceding test). - 2a.TH reads from the DUT the RegisteredClients attribute. - 2b.If list of registered clients is not empty, unregister existing client(s) - 2c.TH reads from the DUT the RegisteredClients attribute. Verify that the DUT response contains empty list of registered clients. - disabled: true - - - label: - "Step 0a: Preconfition 1: Read 'register-clients' by sending the - command below and note the check-in nodeID for the entries" - verification: | - ./chip-tool icdmanagement read registered-clients 1 0 - - [1704888897.027204][71644:71646] CHIP:DMG: } - [1704888897.027313][71644:71646] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0003 DataVersion: 852105378 - [1704888897.027351][71644:71646] CHIP:TOO: RegisteredClients: 1 entries - [1704888897.027394][71644:71646] CHIP:TOO: [1]: { - [1704888897.027412][71644:71646] CHIP:TOO: CheckInNodeID: 112233 - [1704888897.027421][71644:71646] CHIP:TOO: MonitoredSubject: 112233 - [1704888897.027431][71644:71646] CHIP:TOO: FabricIndex: 1 - [1704888897.027440][71644:71646] CHIP:TOO: } - [1704888897.027521][71644:71646] CHIP:EM: <<< [E:49337i S:30873 M:176023643 (Ack:200282364)] (S) Msg TX to 1:0000000000000001 [5BF5] [UDP:[fe80::a70c:61dc:df51:6945%enxd03745ce8f62]:5540] --- Type 0000:10 (SecureChannel:StandaloneAck) - disabled: true - - - label: - "Step 0b: Preconfition 2: Please send the 'unregister client' command - using the check-in nodeID received from the previous read" - verification: | - ./chip-tool icdmanagement unregister-client 112233 1 0 - - [1704888949.629057][71657:71659] CHIP:DMG: - [1704888949.629066][71657:71659] CHIP:DMG: InteractionModelRevision = 11 - [1704888949.629074][71657:71659] CHIP:DMG: }, - [1704888949.629125][71657:71659] CHIP:DMG: Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x0 - [1704888949.629153][71657:71659] CHIP:DMG: ICR moving to [AwaitingDe] - disabled: true - - - label: - "Step 0c: Preconfition 3: Verify that all entries have been - successfully unregistered by reading 'register-clients'" - verification: | - ./chip-tool icdmanagement read registered-clients 1 0 - [1704889092.945869][71700:71702] CHIP:DMG: } - [1704889092.945955][71700:71702] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0003 DataVersion: 852105378 - [1704889092.945989][71700:71702] CHIP:TOO: RegisteredClients: 0 entries - [1704889092.946079][71700:71702] CHIP:EM: <<< [E:63454i S:39669 M:600516 (Ack:156383188)] (S) - disabled: true - - - label: - "Step 1: TH sends RegisterClient command. - CheckInNodeID: registering - clients node ID - MonitoredSubject: monitored subject ID - Key: shared - secret between the client and the ICD" - PICS: ICDM.S.C00.Rsp - verification: | - ./chip-tool icdmanagement register-client 1 1 hex:1234567890abcdef1234567890abcdef 1 0 - On TH(chip-tool) verify that DUT responds with status code as success - - [1687534883748] [49948:406768] [DMG] Received Command Response Data, Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0001 - [1687534883748] [49948:406768] [TOO] Endpoint: 0 Cluster: 0x0000_0046 Command 0x0000_0001 - [1687534883748] [49948:406768] [TOO] RegisterClientResponse: { - [1687534883748] [49948:406768] [TOO] ICDCounter: 0 - [1687534883748] [49948:406768] [TOO] } - disabled: true - - - label: "Step 2: TH reads from the DUT the RegisteredClients attribute." - PICS: ICDM.S.A0003 - verification: | - ./chip-tool icdmanagement read registered-clients 1 0 - - On TH(Chip-tool), Verify that the DUT response contains a list of 1 registered client of given CheckInNodeID, MonitoredSubject, and Key - - [1689676816.943056][18202:18204] CHIP:DMG: } - [1689676816.943185][18202:18204] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0003 DataVersion: 1824957093 - [1689676816.943237][18202:18204] CHIP:TOO: RegisteredClients: 2 entries - [1689676816.943266][18202:18204] CHIP:TOO: [1]: { - [1689676816.943273][18202:18204] CHIP:TOO: CheckInNodeID: 1 - [1689676816.943279][18202:18204] CHIP:TOO: MonitoredSubject: 1 - [1689676816.943288][18202:18204] CHIP:TOO: Key: 31323334353637383930616263646566 - [1689676816.943302][18202:18204] CHIP:TOO: FabricIndex: 1 - [1689676816.943309][18202:18204] CHIP:TOO: } - [1689676816.943411][18202:18204] CHIP:EM: <<< [E:57729i S:18360 M:263136445 (Ack:51562449)] (S) Msg TX to 1:0000000000000001 [BFDE] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689676816.943425][18202:18204] CHIP:IN: (S) Sending msg 263136445 on secure session with LSID: 18360 - disabled: true - - - label: - "Step 3a: TH reads from the DUT the - ICDM.S.A0005(ClientsSupportedPerFabric) attribute." - PICS: ICDM.S.A0005 - verification: | - ./chip-tool icdmanagement read clients-supported-per-fabric 1 0 - - [1689676851.025335][18210:18212] CHIP:DMG: } - [1689676851.025406][18210:18212] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0005 DataVersion: 1824957093 - [1689676851.025433][18210:18212] CHIP:TOO: ClientsSupportedPerFabric: 2 - [1689676851.025500][18210:18212] CHIP:EM: <<< [E:302i S:21595 M:237990169 (Ack:268232015)] (S) Msg TX to 1:0000000000000001 [BFDE] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689676851.025513][18210:18212] CHIP:IN: (S) Sending msg 237990169 on secure session with LSID: 21595 - [1689676851.025540][18210:18212] CHIP:EM: Flushed pending ack for MessageCounter:268232015 on exchange 302i - disabled: true - - - label: - "Step 3b: If len(RegisteredClients) is less than - ClientsSupportedPerFabric, TH repeats RegisterClient command with a - different CheckInNodeID until the number of entries in - RegisteredClients equals ClientsSupportedPerFabric." - PICS: ICDM.S.C00.Rsp - verification: | - ./chip-tool icdmanagement register-client 2 2 hex:2234567890abcdef2234567890abcdef 1 0 - - On TH(chip-tool) verify that DUT responds with status code as success - - [1687535275413] [50580:413095] [DMG] Received Command Response Data, Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0001 - [1687535275413] [50580:413095] [TOO] Endpoint: 0 Cluster: 0x0000_0046 Command 0x0000_0001 - [1687535275413] [50580:413095] [TOO] RegisterClientResponse: { - [1687535275413] [50580:413095] [TOO] ICDCounter: 0 - [1687535275413] [50580:413095] [TOO] } - disabled: true - - - label: - "Step 3c: TH sends RegisterClient command with a different - CheckInNodeID." - PICS: ICDM.S.C00.Rsp - verification: | - ./chip-tool icdmanagement register-client 10 20 hex:abcdef1234567890abcdef1234567890 1 0 - - On TH(chip-tool) verify that DUT responds with status as RESOURCE_EXHAUSTED(0x89) - - [1687535364276] [50673:414417] [DMG] Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0000 Status=0x89 - [1687535364276] [50673:414417] [TOO] Error: IM Error 0x00000589: General error: 0x89 (RESOURCE_EXHAUSTED) - disabled: true - - - label: "Step 4: TH reads from the DUT the RegisteredClients attribute." - PICS: ICDM.S.A0003 - verification: | - ./chip-tool icdmanagement read registered-clients 1 0 - On TH(chip-tool), Verify that the DUT response contains a list of registered clients from Step 1 and 3b; each entry contains CheckInNodeID, MonitoredSubject, and Key. - - [1689676880.681118][18221:18223] CHIP:DMG: } - [1689676880.681246][18221:18223] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0003 DataVersion: 1824957093 - [1689676880.681292][18221:18223] CHIP:TOO: RegisteredClients: 2 entries - [1689676880.681320][18221:18223] CHIP:TOO: [1]: { - [1689676880.681334][18221:18223] CHIP:TOO: CheckInNodeID: 1 - [1689676880.681341][18221:18223] CHIP:TOO: MonitoredSubject: 1 - [1689676880.681349][18221:18223] CHIP:TOO: Key: 31323334353637383930616263646566 - [1689676880.681357][18221:18223] CHIP:TOO: FabricIndex: 1 - [1689676880.681363][18221:18223] CHIP:TOO: } - [1689676880.681373][18221:18223] CHIP:TOO: [2]: { - [1689676880.681378][18221:18223] CHIP:TOO: CheckInNodeID: 2 - [1689676880.681384][18221:18223] CHIP:TOO: MonitoredSubject: 2 - [1689676880.681390][18221:18223] CHIP:TOO: Key: 32323334353637383930616263646566 - [1689676880.681396][18221:18223] CHIP:TOO: FabricIndex: 1 - [1689676880.681401][18221:18223] CHIP:TOO: } - [1689676880.681461][18221:18223] CHIP:EM: <<< [E:58454i S:61329 M:203963160 (Ack:146764558)] (S) Msg TX to 1:0000000000000001 [BFDE] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689676880.681475][18221:18223] CHIP:IN: (S) Sending msg 203963160 on secure session with LSID: 61329 - [1689676880.681506][18221:18223] CHIP:EM: Flushed pending ack for MessageCounter:146764558 on exchange 58454i - [1689676880.681697][18221:18221] CHIP:CTL: Shutting down the commissioner - disabled: true - - - label: - "Step 5a: TH sends UnregisterClient command with a CheckInNodeID which - is not in the list of RegisteredClients from Step 4." - PICS: ICDM.S.C02.Rsp - verification: | - ./chip-tool icdmanagement unregister-client 10 1 0 - On TH(chip-tool) verify that DUT responds with status as NOT_FOUND(0x8b). - [1687535473821] [50706:415574] [DMG] Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x8b - [1687535473821] [50706:415574] [TOO] Error: IM Error 0x0000058B: General error: 0x8b (NOT_FOUND) - disabled: true - - - label: - "Step 5b: TH sends UnregisterClient command with the CheckInNodeID - from Step 1." - PICS: ICDM.S.C02.Rsp - verification: | - ./chip-tool icdmanagement unregister-client 1 1 0 - On TH(chip-tool) verify that DUT responds with status as SUCCESS(0x00). - [1689764286.310839][26236:26241] CHIP:DMG: InvokeResponseMessage = - [1689764286.310843][26236:26241] CHIP:DMG: { - [1689764286.310848][26236:26241] CHIP:DMG: suppressResponse = false, - [1689764286.310852][26236:26241] CHIP:DMG: InvokeResponseIBs = - [1689764286.310859][26236:26241] CHIP:DMG: [ - [1689764286.310863][26236:26241] CHIP:DMG: InvokeResponseIB = - [1689764286.310871][26236:26241] CHIP:DMG: { - [1689764286.310875][26236:26241] CHIP:DMG: CommandStatusIB = - [1689764286.310880][26236:26241] CHIP:DMG: { - [1689764286.310885][26236:26241] CHIP:DMG: CommandPathIB = - [1689764286.310891][26236:26241] CHIP:DMG: { - [1689764286.310896][26236:26241] CHIP:DMG: EndpointId = 0x0, - [1689764286.310901][26236:26241] CHIP:DMG: ClusterId = 0x46, - [1689764286.310906][26236:26241] CHIP:DMG: CommandId = 0x2, - [1689764286.310911][26236:26241] CHIP:DMG: }, - [1689764286.310919][26236:26241] CHIP:DMG: - [1689764286.310922][26236:26241] CHIP:DMG: StatusIB = - [1689764286.310928][26236:26241] CHIP:DMG: { - [1689764286.310932][26236:26241] CHIP:DMG: status = 0x00 (SUCCESS), - [1689764286.310936][26236:26241] CHIP:DMG: }, - [1689764286.310941][26236:26241] CHIP:DMG: - [1689764286.310945][26236:26241] CHIP:DMG: }, - [1689764286.310951][26236:26241] CHIP:DMG: - [1689764286.310955][26236:26241] CHIP:DMG: }, - [1689764286.310962][26236:26241] CHIP:DMG: - [1689764286.310966][26236:26241] CHIP:DMG: ], - [1689764286.310972][26236:26241] CHIP:DMG: - [1689764286.310976][26236:26241] CHIP:DMG: InteractionModelRevision = 1 - [1689764286.310980][26236:26241] CHIP:DMG: }, - [1689764286.311002][26236:26241] CHIP:DMG: Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x0 - [1689764286.311020][26236:26241] CHIP:DMG: ICR moving to [AwaitingDe] - [1689764286.311060][26236:26241] CHIP:EM: <<< [E:63413i S:31018 M:161228496 (Ack:98843769)] (S) Msg TX to 1:0000000000000001 [D397] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689764286.311069][26236:26241] CHIP:IN: (S) Sending msg 161228496 on secure session with LSID: 31018 - [1689764286.311093][26236:26241] CHIP:EM: Flushed pending ack for MessageCounter:98843769 on exchange 63413i - disabled: true - - - label: - "Step 5c: Repeat Step 5b with the rest of CheckInNodeIDs from the list - of RegisteredClients from Step 4, if any." - PICS: ICDM.S.C02.Rsp - verification: | - ./chip-tool icdmanagement unregister-client 2 1 0 - On TH(chip-tool) verify that DUT responds with status as SUCCESS(0x00). - - [1689764308.632783][26647:26650] CHIP:DMG: ICR moving to [ResponseRe] - [1689764308.632806][26647:26650] CHIP:DMG: InvokeResponseMessage = - [1689764308.632816][26647:26650] CHIP:DMG: { - [1689764308.632826][26647:26650] CHIP:DMG: suppressResponse = false, - [1689764308.632842][26647:26650] CHIP:DMG: InvokeResponseIBs = - [1689764308.632864][26647:26650] CHIP:DMG: [ - [1689764308.632878][26647:26650] CHIP:DMG: InvokeResponseIB = - [1689764308.632899][26647:26650] CHIP:DMG: { - [1689764308.632918][26647:26650] CHIP:DMG: CommandStatusIB = - [1689764308.632941][26647:26650] CHIP:DMG: { - [1689764308.632982][26647:26650] CHIP:DMG: CommandPathIB = - [1689764308.633008][26647:26650] CHIP:DMG: { - [1689764308.633028][26647:26650] CHIP:DMG: EndpointId = 0x0, - [1689764308.633056][26647:26650] CHIP:DMG: ClusterId = 0x46, - [1689764308.633080][26647:26650] CHIP:DMG: CommandId = 0x2, - [1689764308.633103][26647:26650] CHIP:DMG: }, - [1689764308.633129][26647:26650] CHIP:DMG: - [1689764308.633151][26647:26650] CHIP:DMG: StatusIB = - [1689764308.633176][26647:26650] CHIP:DMG: { - [1689764308.633201][26647:26650] CHIP:DMG: status = 0x00 (SUCCESS), - [1689764308.633228][26647:26650] CHIP:DMG: }, - [1689764308.633252][26647:26650] CHIP:DMG: - [1689764308.633273][26647:26650] CHIP:DMG: }, - [1689764308.633295][26647:26650] CHIP:DMG: - [1689764308.633311][26647:26650] CHIP:DMG: }, - [1689764308.633331][26647:26650] CHIP:DMG: - [1689764308.633345][26647:26650] CHIP:DMG: ], - [1689764308.633363][26647:26650] CHIP:DMG: - [1689764308.633383][26647:26650] CHIP:DMG: InteractionModelRevision = 1 - [1689764308.633413][26647:26650] CHIP:DMG: }, - [1689764308.633514][26647:26650] CHIP:DMG: Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x0 - [1689764308.633536][26647:26650] CHIP:DMG: ICR moving to [AwaitingDe] - disabled: true - - - label: "Step 6: TH reads from the DUT the RegisteredClients attribute." - PICS: ICDM.S.A0003 - verification: | - ./chip-tool icdmanagement read registered-clients 1 0 - On TH(chip-tool) Verify that the DUT response contains empty list of registered clients. - - [1689764322.761414][26808:26810] CHIP:DMG: } - [1689764322.761506][26808:26810] CHIP:TOO: Endpoint: 0 Cluster: 0x0000_0046 Attribute 0x0000_0003 DataVersion: 1750818309 - [1689764322.761629][26808:26810] CHIP:TOO: RegisteredClients: 0 entries - [1689764322.761723][26808:26810] CHIP:EM: <<< [E:36669i S:5946 M:161762028 (Ack:88110606)] (S) Msg TX to 1:0000000000000001 [D397] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689764322.761742][26808:26810] CHIP:IN: (S) Sending msg 161762028 on secure session with LSID: 5946 - [1689764322.761775][26808:26810] CHIP:EM: Flushed pending ack for MessageCounter:88110606 on exchange 36669i - disabled: true - - - label: - "Step 7: TH sends UnregisterClient command with the CheckInNodeID from - Step 1." - PICS: ICDM.S.C02.Rsp - verification: | - ./chip-tool icdmanagement unregister-client 1 1 0 - On TH(chip-tool) verify that DUT responds with status as NOT_FOUND(0x8b) - - [1689764335.957449][27077:27079] CHIP:DMG: }, - [1689764335.957456][27077:27079] CHIP:DMG: - [1689764335.957460][27077:27079] CHIP:DMG: ], - [1689764335.957468][27077:27079] CHIP:DMG: - [1689764335.957472][27077:27079] CHIP:DMG: InteractionModelRevision = 1 - [1689764335.957476][27077:27079] CHIP:DMG: }, - [1689764335.957497][27077:27079] CHIP:DMG: Received Command Response Status for Endpoint=0 Cluster=0x0000_0046 Command=0x0000_0002 Status=0x8b - [1689764335.957513][27077:27079] CHIP:TOO: Error: IM Error 0x0000058B: General error: 0x8b (NOT_FOUND) - [1689764335.957525][27077:27079] CHIP:DMG: ICR moving to [AwaitingDe] - [1689764335.957567][27077:27079] CHIP:EM: <<< [E:17566i S:36201 M:3097260 (Ack:169314533)] (S) Msg TX to 1:0000000000000001 [D397] --- Type 0000:10 (SecureChannel:StandaloneAck) - [1689764335.957578][27077:27079] CHIP:IN: (S) Sending msg 3097260 on secure session with LSID: 36201 - [1689764335.957604][27077:27079] CHIP:EM: Flushed pending ack for MessageCounter:169314533 on exchange 17566i - [1689764335.957677][27077:27077] CHIP:CTL: Shutting down the commissioner - disabled: true diff --git a/src/app/tests/suites/certification/ci-pics-values b/src/app/tests/suites/certification/ci-pics-values index 20f0a334979c40..aa8fb52d289d2b 100644 --- a/src/app/tests/suites/certification/ci-pics-values +++ b/src/app/tests/suites/certification/ci-pics-values @@ -2668,6 +2668,7 @@ ICDM.S.A0004=1 ICDM.S.A0005=1 ICDM.S.A0006=1 ICDM.S.A0007=1 +ICDM.S.A0008=1 #Client Attribute ICDM.C.A0000=1 diff --git a/src/app/tests/suites/manualTests.json b/src/app/tests/suites/manualTests.json index d199a682492150..0331f9eba773df 100644 --- a/src/app/tests/suites/manualTests.json +++ b/src/app/tests/suites/manualTests.json @@ -120,8 +120,6 @@ "GeneralDiagnostics": ["Test_TC_DGGEN_2_2"], "Identify": ["Test_TC_I_3_2"], "IcdManagement": [ - "Test_TC_ICDM_2_2", - "Test_TC_ICDM_3_1", "Test_TC_ICDM_3_2", "Test_TC_ICDM_3_3", "Test_TC_ICDM_4_1", diff --git a/src/app/util/ember-compatibility-functions.cpp b/src/app/util/ember-compatibility-functions.cpp index e87e0f564a5ff7..cc3185f78a5df6 100644 --- a/src/app/util/ember-compatibility-functions.cpp +++ b/src/app/util/ember-compatibility-functions.cpp @@ -33,6 +33,8 @@ #include #include #include +#include +#include #include #include #include @@ -54,118 +56,18 @@ using chip::Protocols::InteractionModel::Status; using namespace chip; using namespace chip::app; using namespace chip::Access; +using namespace chip::app::Compatibility; +using namespace chip::app::Compatibility::Internal; namespace chip { namespace app { -namespace Compatibility { -namespace { -// On some apps, ATTRIBUTE_LARGEST can as small as 3, making compiler unhappy since data[kAttributeReadBufferSize] cannot hold -// uint64_t. Make kAttributeReadBufferSize at least 8 so it can fit all basic types. -constexpr size_t kAttributeReadBufferSize = (ATTRIBUTE_LARGEST >= 8 ? ATTRIBUTE_LARGEST : 8); - -// BasicType maps the type to basic int(8|16|32|64)(s|u) types. -EmberAfAttributeType BaseType(EmberAfAttributeType type) -{ - switch (type) - { - case ZCL_ACTION_ID_ATTRIBUTE_TYPE: // Action Id - case ZCL_FABRIC_IDX_ATTRIBUTE_TYPE: // Fabric Index - case ZCL_BITMAP8_ATTRIBUTE_TYPE: // 8-bit bitmap - case ZCL_ENUM8_ATTRIBUTE_TYPE: // 8-bit enumeration - case ZCL_STATUS_ATTRIBUTE_TYPE: // Status Code - case ZCL_PERCENT_ATTRIBUTE_TYPE: // Percentage - static_assert(std::is_same::value, - "chip::Percent is expected to be uint8_t, change this when necessary"); - return ZCL_INT8U_ATTRIBUTE_TYPE; - - case ZCL_ENDPOINT_NO_ATTRIBUTE_TYPE: // Endpoint Number - case ZCL_GROUP_ID_ATTRIBUTE_TYPE: // Group Id - case ZCL_VENDOR_ID_ATTRIBUTE_TYPE: // Vendor Id - case ZCL_ENUM16_ATTRIBUTE_TYPE: // 16-bit enumeration - case ZCL_BITMAP16_ATTRIBUTE_TYPE: // 16-bit bitmap - case ZCL_PERCENT100THS_ATTRIBUTE_TYPE: // 100ths of a percent - static_assert(std::is_same::value, - "chip::EndpointId is expected to be uint16_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::GroupId is expected to be uint16_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::Percent100ths is expected to be uint16_t, change this when necessary"); - return ZCL_INT16U_ATTRIBUTE_TYPE; - - case ZCL_CLUSTER_ID_ATTRIBUTE_TYPE: // Cluster Id - case ZCL_ATTRIB_ID_ATTRIBUTE_TYPE: // Attribute Id - case ZCL_FIELD_ID_ATTRIBUTE_TYPE: // Field Id - case ZCL_EVENT_ID_ATTRIBUTE_TYPE: // Event Id - case ZCL_COMMAND_ID_ATTRIBUTE_TYPE: // Command Id - case ZCL_TRANS_ID_ATTRIBUTE_TYPE: // Transaction Id - case ZCL_DEVTYPE_ID_ATTRIBUTE_TYPE: // Device Type Id - case ZCL_DATA_VER_ATTRIBUTE_TYPE: // Data Version - case ZCL_BITMAP32_ATTRIBUTE_TYPE: // 32-bit bitmap - case ZCL_EPOCH_S_ATTRIBUTE_TYPE: // Epoch Seconds - case ZCL_ELAPSED_S_ATTRIBUTE_TYPE: // Elapsed Seconds - static_assert(std::is_same::value, - "chip::Cluster is expected to be uint32_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::AttributeId is expected to be uint32_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::AttributeId is expected to be uint32_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::EventId is expected to be uint32_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::CommandId is expected to be uint32_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::TransactionId is expected to be uint32_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::DeviceTypeId is expected to be uint32_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::DataVersion is expected to be uint32_t, change this when necessary"); - return ZCL_INT32U_ATTRIBUTE_TYPE; - - case ZCL_AMPERAGE_MA_ATTRIBUTE_TYPE: // Amperage milliamps - case ZCL_ENERGY_MWH_ATTRIBUTE_TYPE: // Energy milliwatt-hours - case ZCL_POWER_MW_ATTRIBUTE_TYPE: // Power milliwatts - case ZCL_VOLTAGE_MV_ATTRIBUTE_TYPE: // Voltage millivolts - return ZCL_INT64S_ATTRIBUTE_TYPE; - - case ZCL_EVENT_NO_ATTRIBUTE_TYPE: // Event Number - case ZCL_FABRIC_ID_ATTRIBUTE_TYPE: // Fabric Id - case ZCL_NODE_ID_ATTRIBUTE_TYPE: // Node Id - case ZCL_BITMAP64_ATTRIBUTE_TYPE: // 64-bit bitmap - case ZCL_EPOCH_US_ATTRIBUTE_TYPE: // Epoch Microseconds - case ZCL_POSIX_MS_ATTRIBUTE_TYPE: // POSIX Milliseconds - case ZCL_SYSTIME_MS_ATTRIBUTE_TYPE: // System time Milliseconds - case ZCL_SYSTIME_US_ATTRIBUTE_TYPE: // System time Microseconds - static_assert(std::is_same::value, - "chip::EventNumber is expected to be uint64_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::FabricId is expected to be uint64_t, change this when necessary"); - static_assert(std::is_same::value, - "chip::NodeId is expected to be uint64_t, change this when necessary"); - return ZCL_INT64U_ATTRIBUTE_TYPE; - - case ZCL_TEMPERATURE_ATTRIBUTE_TYPE: // Temperature - return ZCL_INT16S_ATTRIBUTE_TYPE; - - default: - return type; - } -} - -} // namespace - -} // namespace Compatibility - -using namespace chip::app::Compatibility; - namespace { -// Common buffer for ReadSingleClusterData & WriteSingleClusterData -uint8_t attributeData[kAttributeReadBufferSize]; template CHIP_ERROR attributeBufferToNumericTlvData(TLV::TLVWriter & writer, bool isNullable) { typename NumericAttributeTraits::StorageType value; - memcpy(&value, attributeData, sizeof(value)); + memcpy(&value, gEmberAttributeIOBufferSpan.data(), sizeof(value)); TLV::Tag tag = TLV::ContextTag(AttributeDataIB::Tag::kData); if (isNullable && NumericAttributeTraits::IsNullValue(value)) { @@ -285,143 +187,6 @@ CHIP_ERROR SendFailureStatus(const ConcreteAttributePath & aPath, AttributeRepor return aAttributeReports.EncodeAttributeStatus(aPath, StatusIB(aStatus)); } -// This reader should never actually be registered; we do manual dispatch to it -// for the one attribute it handles. -class MandatoryGlobalAttributeReader : public AttributeAccessInterface -{ -public: - MandatoryGlobalAttributeReader(const EmberAfCluster * aCluster) : - AttributeAccessInterface(MakeOptional(kInvalidEndpointId), kInvalidClusterId), mCluster(aCluster) - {} - -protected: - const EmberAfCluster * mCluster; -}; - -class GlobalAttributeReader : public MandatoryGlobalAttributeReader -{ -public: - GlobalAttributeReader(const EmberAfCluster * aCluster) : MandatoryGlobalAttributeReader(aCluster) {} - - CHIP_ERROR Read(const ConcreteReadAttributePath & aPath, AttributeValueEncoder & aEncoder) override; - -private: - typedef CHIP_ERROR (CommandHandlerInterface::*CommandListEnumerator)(const ConcreteClusterPath & cluster, - CommandHandlerInterface::CommandIdCallback callback, - void * context); - static CHIP_ERROR EncodeCommandList(const ConcreteClusterPath & aClusterPath, AttributeValueEncoder & aEncoder, - CommandListEnumerator aEnumerator, const CommandId * aClusterCommandList); -}; - -CHIP_ERROR GlobalAttributeReader::Read(const ConcreteReadAttributePath & aPath, AttributeValueEncoder & aEncoder) -{ - using namespace Clusters::Globals::Attributes; - switch (aPath.mAttributeId) - { - case AttributeList::Id: - return aEncoder.EncodeList([this](const auto & encoder) { - const size_t count = mCluster->attributeCount; - bool addedExtraGlobals = false; - for (size_t i = 0; i < count; ++i) - { - AttributeId id = mCluster->attributes[i].attributeId; - constexpr auto lastGlobalId = GlobalAttributesNotInMetadata[ArraySize(GlobalAttributesNotInMetadata) - 1]; -#if CHIP_CONFIG_ENABLE_EVENTLIST_ATTRIBUTE - // The GlobalAttributesNotInMetadata shouldn't have any gaps in their ids here. - static_assert(lastGlobalId - GlobalAttributesNotInMetadata[0] == ArraySize(GlobalAttributesNotInMetadata) - 1, - "Ids in GlobalAttributesNotInMetadata not consecutive"); -#else - // If EventList is not supported. The GlobalAttributesNotInMetadata is missing one id here. - static_assert(lastGlobalId - GlobalAttributesNotInMetadata[0] == ArraySize(GlobalAttributesNotInMetadata), - "Ids in GlobalAttributesNotInMetadata not consecutive (except EventList)"); -#endif // CHIP_CONFIG_ENABLE_EVENTLIST_ATTRIBUTE - if (!addedExtraGlobals && id > lastGlobalId) - { - for (const auto & globalId : GlobalAttributesNotInMetadata) - { - ReturnErrorOnFailure(encoder.Encode(globalId)); - } - addedExtraGlobals = true; - } - ReturnErrorOnFailure(encoder.Encode(id)); - } - if (!addedExtraGlobals) - { - for (const auto & globalId : GlobalAttributesNotInMetadata) - { - ReturnErrorOnFailure(encoder.Encode(globalId)); - } - } - return CHIP_NO_ERROR; - }); -#if CHIP_CONFIG_ENABLE_EVENTLIST_ATTRIBUTE - case EventList::Id: - return aEncoder.EncodeList([this](const auto & encoder) { - for (size_t i = 0; i < mCluster->eventCount; ++i) - { - ReturnErrorOnFailure(encoder.Encode(mCluster->eventList[i])); - } - return CHIP_NO_ERROR; - }); -#endif // CHIP_CONFIG_ENABLE_EVENTLIST_ATTRIBUTE - case AcceptedCommandList::Id: - return EncodeCommandList(aPath, aEncoder, &CommandHandlerInterface::EnumerateAcceptedCommands, - mCluster->acceptedCommandList); - case GeneratedCommandList::Id: - return EncodeCommandList(aPath, aEncoder, &CommandHandlerInterface::EnumerateGeneratedCommands, - mCluster->generatedCommandList); - default: - // This function is only called if attributeCluster is non-null in - // ReadSingleClusterData, which only happens for attributes listed in - // GlobalAttributesNotInMetadata. If we reach this code, someone added - // a global attribute to that list but not the above switch. - VerifyOrDieWithMsg(false, DataManagement, "Unexpected global attribute: " ChipLogFormatMEI, - ChipLogValueMEI(aPath.mAttributeId)); - return CHIP_NO_ERROR; - } -} - -CHIP_ERROR GlobalAttributeReader::EncodeCommandList(const ConcreteClusterPath & aClusterPath, AttributeValueEncoder & aEncoder, - GlobalAttributeReader::CommandListEnumerator aEnumerator, - const CommandId * aClusterCommandList) -{ - return aEncoder.EncodeList([&](const auto & encoder) { - auto * commandHandler = - InteractionModelEngine::GetInstance()->FindCommandHandler(aClusterPath.mEndpointId, aClusterPath.mClusterId); - if (commandHandler) - { - struct Context - { - decltype(encoder) & commandIdEncoder; - CHIP_ERROR err; - } context{ encoder, CHIP_NO_ERROR }; - CHIP_ERROR err = (commandHandler->*aEnumerator)( - aClusterPath, - [](CommandId command, void * closure) -> Loop { - auto * ctx = static_cast(closure); - ctx->err = ctx->commandIdEncoder.Encode(command); - if (ctx->err != CHIP_NO_ERROR) - { - return Loop::Break; - } - return Loop::Continue; - }, - &context); - if (err != CHIP_ERROR_NOT_IMPLEMENTED) - { - return context.err; - } - // Else fall through to the list in aClusterCommandList. - } - - for (const CommandId * cmd = aClusterCommandList; cmd != nullptr && *cmd != kInvalidCommandId; cmd++) - { - ReturnErrorOnFailure(encoder.Encode(*cmd)); - } - return CHIP_NO_ERROR; - }); -} - // Helper function for trying to read an attribute value via an // AttributeAccessInterface. On failure, the read has failed. On success, the // aTriedEncode outparam is set to whether the AttributeAccessInterface tried to encode a value. @@ -603,7 +368,8 @@ CHIP_ERROR ReadSingleClusterData(const SubjectDescriptor & aSubjectDescriptor, b record.endpoint = aPath.mEndpointId; record.clusterId = aPath.mClusterId; record.attributeId = aPath.mAttributeId; - Status status = emAfReadOrWriteAttribute(&record, &attributeMetadata, attributeData, sizeof(attributeData), + Status status = emAfReadOrWriteAttribute(&record, &attributeMetadata, gEmberAttributeIOBufferSpan.data(), + static_cast(gEmberAttributeIOBufferSpan.size()), /* write = */ false); if (status == Status::Success) @@ -613,7 +379,7 @@ CHIP_ERROR ReadSingleClusterData(const SubjectDescriptor & aSubjectDescriptor, b TLV::TLVWriter * writer = attributeDataIBBuilder.GetWriter(); VerifyOrReturnError(writer != nullptr, CHIP_NO_ERROR); TLV::Tag tag = TLV::ContextTag(AttributeDataIB::Tag::kData); - switch (BaseType(attributeType)) + switch (AttributeBaseType(attributeType)) { case ZCL_NO_DATA_ATTRIBUTE_TYPE: // No data ReturnErrorOnFailure(writer->PutNull(tag)); @@ -719,8 +485,8 @@ CHIP_ERROR ReadSingleClusterData(const SubjectDescriptor & aSubjectDescriptor, b } case ZCL_CHAR_STRING_ATTRIBUTE_TYPE: // Char string { - char * actualData = reinterpret_cast(attributeData + 1); - uint8_t dataLength = attributeData[0]; + char * actualData = reinterpret_cast(gEmberAttributeIOBufferSpan.data() + 1); + uint8_t dataLength = gEmberAttributeIOBufferSpan[0]; if (dataLength == 0xFF) { if (isNullable) @@ -739,9 +505,10 @@ CHIP_ERROR ReadSingleClusterData(const SubjectDescriptor & aSubjectDescriptor, b break; } case ZCL_LONG_CHAR_STRING_ATTRIBUTE_TYPE: { - char * actualData = reinterpret_cast(attributeData + 2); // The pascal string contains 2 bytes length + char * actualData = + reinterpret_cast(gEmberAttributeIOBufferSpan.data() + 2); // The pascal string contains 2 bytes length uint16_t dataLength; - memcpy(&dataLength, attributeData, sizeof(dataLength)); + memcpy(&dataLength, gEmberAttributeIOBufferSpan.data(), sizeof(dataLength)); if (dataLength == 0xFFFF) { if (isNullable) @@ -761,8 +528,8 @@ CHIP_ERROR ReadSingleClusterData(const SubjectDescriptor & aSubjectDescriptor, b } case ZCL_OCTET_STRING_ATTRIBUTE_TYPE: // Octet string { - uint8_t * actualData = attributeData + 1; - uint8_t dataLength = attributeData[0]; + uint8_t * actualData = gEmberAttributeIOBufferSpan.data() + 1; + uint8_t dataLength = gEmberAttributeIOBufferSpan[0]; if (dataLength == 0xFF) { if (isNullable) @@ -781,9 +548,9 @@ CHIP_ERROR ReadSingleClusterData(const SubjectDescriptor & aSubjectDescriptor, b break; } case ZCL_LONG_OCTET_STRING_ATTRIBUTE_TYPE: { - uint8_t * actualData = attributeData + 2; // The pascal string contains 2 bytes length + uint8_t * actualData = gEmberAttributeIOBufferSpan.data() + 2; // The pascal string contains 2 bytes length uint16_t dataLength; - memcpy(&dataLength, attributeData, sizeof(dataLength)); + memcpy(&dataLength, gEmberAttributeIOBufferSpan.data(), sizeof(dataLength)); if (dataLength == 0xFFFF) { if (isNullable) @@ -821,7 +588,8 @@ template CHIP_ERROR numericTlvDataToAttributeBuffer(TLV::TLVReader & aReader, bool isNullable, uint16_t & dataLen) { typename NumericAttributeTraits::StorageType value; - static_assert(sizeof(value) <= sizeof(attributeData), "Value cannot fit into attribute data"); + VerifyOrDie(sizeof(value) <= gEmberAttributeIOBufferSpan.size()); + if (isNullable && aReader.GetType() == TLV::kTLVType_Null) { NumericAttributeTraits::SetNull(value); @@ -834,7 +602,7 @@ CHIP_ERROR numericTlvDataToAttributeBuffer(TLV::TLVReader & aReader, bool isNull NumericAttributeTraits::WorkingToStorage(val, value); } dataLen = sizeof(value); - memcpy(attributeData, &value, sizeof(value)); + memcpy(gEmberAttributeIOBufferSpan.data(), &value, sizeof(value)); return CHIP_NO_ERROR; } @@ -847,7 +615,7 @@ CHIP_ERROR stringTlvDataToAttributeBuffer(TLV::TLVReader & aReader, bool isOctet { // Null is represented by an 0xFF or 0xFFFF length, respectively. len = std::numeric_limits::max(); - memcpy(&attributeData[0], &len, sizeof(len)); + memcpy(gEmberAttributeIOBufferSpan.data(), &len, sizeof(len)); dataLen = sizeof(len); } else @@ -859,10 +627,10 @@ CHIP_ERROR stringTlvDataToAttributeBuffer(TLV::TLVReader & aReader, bool isOctet ReturnErrorOnFailure(aReader.GetDataPtr(data)); len = static_cast(aReader.GetLength()); VerifyOrReturnError(len != std::numeric_limits::max(), CHIP_ERROR_MESSAGE_TOO_LONG); - VerifyOrReturnError(len + sizeof(len) /* length at the beginning of data */ <= sizeof(attributeData), + VerifyOrReturnError(len + sizeof(len) /* length at the beginning of data */ <= gEmberAttributeIOBufferSpan.size(), CHIP_ERROR_MESSAGE_TOO_LONG); - memcpy(&attributeData[0], &len, sizeof(len)); - memcpy(&attributeData[sizeof(len)], data, len); + memcpy(gEmberAttributeIOBufferSpan.data(), &len, sizeof(len)); + memcpy(gEmberAttributeIOBufferSpan.data() + sizeof(len), data, len); dataLen = static_cast(len + sizeof(len)); } return CHIP_NO_ERROR; @@ -870,7 +638,7 @@ CHIP_ERROR stringTlvDataToAttributeBuffer(TLV::TLVReader & aReader, bool isOctet CHIP_ERROR prepareWriteData(const EmberAfAttributeMetadata * attributeMetadata, TLV::TLVReader & aReader, uint16_t & dataLen) { - EmberAfAttributeType expectedType = BaseType(attributeMetadata->attributeType); + EmberAfAttributeType expectedType = AttributeBaseType(attributeMetadata->attributeType); bool isNullable = attributeMetadata->IsNullable(); switch (expectedType) { @@ -1031,8 +799,8 @@ CHIP_ERROR WriteSingleClusterData(const SubjectDescriptor & aSubjectDescriptor, return apWriteHandler->AddStatus(aPath, Protocols::InteractionModel::Status::InvalidValue); } - auto status = emAfWriteAttributeExternal(aPath.mEndpointId, aPath.mClusterId, aPath.mAttributeId, attributeData, - attributeMetadata->attributeType); + auto status = emAfWriteAttributeExternal(aPath.mEndpointId, aPath.mClusterId, aPath.mAttributeId, + gEmberAttributeIOBufferSpan.data(), attributeMetadata->attributeType); return apWriteHandler->AddStatus(aPath, status); } diff --git a/src/app/util/ember-global-attribute-access-interface.cpp b/src/app/util/ember-global-attribute-access-interface.cpp new file mode 100644 index 00000000000000..327ab09c479512 --- /dev/null +++ b/src/app/util/ember-global-attribute-access-interface.cpp @@ -0,0 +1,136 @@ +/* + * Copyright (c) 2021-2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#include + +#include +#include + +namespace chip { +namespace app { +namespace Compatibility { + +CHIP_ERROR GlobalAttributeReader::Read(const ConcreteReadAttributePath & aPath, AttributeValueEncoder & aEncoder) +{ + using namespace Clusters::Globals::Attributes; + switch (aPath.mAttributeId) + { + case AttributeList::Id: + return aEncoder.EncodeList([this](const auto & encoder) { + const size_t count = mCluster->attributeCount; + bool addedExtraGlobals = false; + for (size_t i = 0; i < count; ++i) + { + AttributeId id = mCluster->attributes[i].attributeId; + constexpr auto lastGlobalId = GlobalAttributesNotInMetadata[ArraySize(GlobalAttributesNotInMetadata) - 1]; +#if CHIP_CONFIG_ENABLE_EVENTLIST_ATTRIBUTE + // The GlobalAttributesNotInMetadata shouldn't have any gaps in their ids here. + static_assert(lastGlobalId - GlobalAttributesNotInMetadata[0] == ArraySize(GlobalAttributesNotInMetadata) - 1, + "Ids in GlobalAttributesNotInMetadata not consecutive"); +#else + // If EventList is not supported. The GlobalAttributesNotInMetadata is missing one id here. + static_assert(lastGlobalId - GlobalAttributesNotInMetadata[0] == ArraySize(GlobalAttributesNotInMetadata), + "Ids in GlobalAttributesNotInMetadata not consecutive (except EventList)"); +#endif // CHIP_CONFIG_ENABLE_EVENTLIST_ATTRIBUTE + if (!addedExtraGlobals && id > lastGlobalId) + { + for (const auto & globalId : GlobalAttributesNotInMetadata) + { + ReturnErrorOnFailure(encoder.Encode(globalId)); + } + addedExtraGlobals = true; + } + ReturnErrorOnFailure(encoder.Encode(id)); + } + if (!addedExtraGlobals) + { + for (const auto & globalId : GlobalAttributesNotInMetadata) + { + ReturnErrorOnFailure(encoder.Encode(globalId)); + } + } + return CHIP_NO_ERROR; + }); +#if CHIP_CONFIG_ENABLE_EVENTLIST_ATTRIBUTE + case EventList::Id: + return aEncoder.EncodeList([this](const auto & encoder) { + for (size_t i = 0; i < mCluster->eventCount; ++i) + { + ReturnErrorOnFailure(encoder.Encode(mCluster->eventList[i])); + } + return CHIP_NO_ERROR; + }); +#endif // CHIP_CONFIG_ENABLE_EVENTLIST_ATTRIBUTE + case AcceptedCommandList::Id: + return EncodeCommandList(aPath, aEncoder, &CommandHandlerInterface::EnumerateAcceptedCommands, + mCluster->acceptedCommandList); + case GeneratedCommandList::Id: + return EncodeCommandList(aPath, aEncoder, &CommandHandlerInterface::EnumerateGeneratedCommands, + mCluster->generatedCommandList); + default: + // This function is only called if attributeCluster is non-null in + // ReadSingleClusterData, which only happens for attributes listed in + // GlobalAttributesNotInMetadata. If we reach this code, someone added + // a global attribute to that list but not the above switch. + VerifyOrDieWithMsg(false, DataManagement, "Unexpected global attribute: " ChipLogFormatMEI, + ChipLogValueMEI(aPath.mAttributeId)); + return CHIP_NO_ERROR; + } +} + +CHIP_ERROR GlobalAttributeReader::EncodeCommandList(const ConcreteClusterPath & aClusterPath, AttributeValueEncoder & aEncoder, + GlobalAttributeReader::CommandListEnumerator aEnumerator, + const CommandId * aClusterCommandList) +{ + return aEncoder.EncodeList([&](const auto & encoder) { + auto * commandHandler = + InteractionModelEngine::GetInstance()->FindCommandHandler(aClusterPath.mEndpointId, aClusterPath.mClusterId); + if (commandHandler) + { + struct Context + { + decltype(encoder) & commandIdEncoder; + CHIP_ERROR err; + } context{ encoder, CHIP_NO_ERROR }; + CHIP_ERROR err = (commandHandler->*aEnumerator)( + aClusterPath, + [](CommandId command, void * closure) -> Loop { + auto * ctx = static_cast(closure); + ctx->err = ctx->commandIdEncoder.Encode(command); + if (ctx->err != CHIP_NO_ERROR) + { + return Loop::Break; + } + return Loop::Continue; + }, + &context); + if (err != CHIP_ERROR_NOT_IMPLEMENTED) + { + return context.err; + } + // Else fall through to the list in aClusterCommandList. + } + + for (const CommandId * cmd = aClusterCommandList; cmd != nullptr && *cmd != kInvalidCommandId; cmd++) + { + ReturnErrorOnFailure(encoder.Encode(*cmd)); + } + return CHIP_NO_ERROR; + }); +} + +} // namespace Compatibility +} // namespace app +} // namespace chip diff --git a/src/app/util/ember-global-attribute-access-interface.h b/src/app/util/ember-global-attribute-access-interface.h new file mode 100644 index 00000000000000..d17e1b286dbd81 --- /dev/null +++ b/src/app/util/ember-global-attribute-access-interface.h @@ -0,0 +1,56 @@ +/* + * Copyright (c) 2021-2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#pragma once + +#include +#include +#include + +namespace chip { +namespace app { +namespace Compatibility { + +// This reader should never actually be registered; we do manual dispatch to it +// for the one attribute it handles. +class MandatoryGlobalAttributeReader : public AttributeAccessInterface +{ +public: + MandatoryGlobalAttributeReader(const EmberAfCluster * aCluster) : + AttributeAccessInterface(MakeOptional(kInvalidEndpointId), kInvalidClusterId), mCluster(aCluster) + {} + +protected: + const EmberAfCluster * mCluster; +}; + +class GlobalAttributeReader : public MandatoryGlobalAttributeReader +{ +public: + GlobalAttributeReader(const EmberAfCluster * aCluster) : MandatoryGlobalAttributeReader(aCluster) {} + + CHIP_ERROR Read(const ConcreteReadAttributePath & aPath, AttributeValueEncoder & aEncoder) override; + +private: + typedef CHIP_ERROR (CommandHandlerInterface::*CommandListEnumerator)(const ConcreteClusterPath & cluster, + CommandHandlerInterface::CommandIdCallback callback, + void * context); + static CHIP_ERROR EncodeCommandList(const ConcreteClusterPath & aClusterPath, AttributeValueEncoder & aEncoder, + CommandListEnumerator aEnumerator, const CommandId * aClusterCommandList); +}; + +} // namespace Compatibility +} // namespace app +} // namespace chip diff --git a/src/app/util/ember-io-storage.cpp b/src/app/util/ember-io-storage.cpp new file mode 100644 index 00000000000000..cc5eacf733480c --- /dev/null +++ b/src/app/util/ember-io-storage.cpp @@ -0,0 +1,126 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#include + +#include +#include + +#include + +namespace chip { +namespace app { +namespace Compatibility { +namespace Internal { + +// On some apps, ATTRIBUTE_LARGEST can as small as 3, making compiler unhappy since data[kAttributeReadBufferSize] cannot hold +// uint64_t. Make kAttributeReadBufferSize at least 8 so it can fit all basic types. +constexpr size_t kAttributeReadBufferSize = (ATTRIBUTE_LARGEST >= 8 ? ATTRIBUTE_LARGEST : 8); +uint8_t attributeIOBuffer[kAttributeReadBufferSize]; + +MutableByteSpan gEmberAttributeIOBufferSpan(attributeIOBuffer); + +EmberAfAttributeType AttributeBaseType(EmberAfAttributeType type) +{ + switch (type) + { + case ZCL_ACTION_ID_ATTRIBUTE_TYPE: // Action Id + case ZCL_FABRIC_IDX_ATTRIBUTE_TYPE: // Fabric Index + case ZCL_BITMAP8_ATTRIBUTE_TYPE: // 8-bit bitmap + case ZCL_ENUM8_ATTRIBUTE_TYPE: // 8-bit enumeration + case ZCL_STATUS_ATTRIBUTE_TYPE: // Status Code + case ZCL_PERCENT_ATTRIBUTE_TYPE: // Percentage + static_assert(std::is_same::value, + "chip::Percent is expected to be uint8_t, change this when necessary"); + return ZCL_INT8U_ATTRIBUTE_TYPE; + + case ZCL_ENDPOINT_NO_ATTRIBUTE_TYPE: // Endpoint Number + case ZCL_GROUP_ID_ATTRIBUTE_TYPE: // Group Id + case ZCL_VENDOR_ID_ATTRIBUTE_TYPE: // Vendor Id + case ZCL_ENUM16_ATTRIBUTE_TYPE: // 16-bit enumeration + case ZCL_BITMAP16_ATTRIBUTE_TYPE: // 16-bit bitmap + case ZCL_PERCENT100THS_ATTRIBUTE_TYPE: // 100ths of a percent + static_assert(std::is_same::value, + "chip::EndpointId is expected to be uint16_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::GroupId is expected to be uint16_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::Percent100ths is expected to be uint16_t, change this when necessary"); + return ZCL_INT16U_ATTRIBUTE_TYPE; + + case ZCL_CLUSTER_ID_ATTRIBUTE_TYPE: // Cluster Id + case ZCL_ATTRIB_ID_ATTRIBUTE_TYPE: // Attribute Id + case ZCL_FIELD_ID_ATTRIBUTE_TYPE: // Field Id + case ZCL_EVENT_ID_ATTRIBUTE_TYPE: // Event Id + case ZCL_COMMAND_ID_ATTRIBUTE_TYPE: // Command Id + case ZCL_TRANS_ID_ATTRIBUTE_TYPE: // Transaction Id + case ZCL_DEVTYPE_ID_ATTRIBUTE_TYPE: // Device Type Id + case ZCL_DATA_VER_ATTRIBUTE_TYPE: // Data Version + case ZCL_BITMAP32_ATTRIBUTE_TYPE: // 32-bit bitmap + case ZCL_EPOCH_S_ATTRIBUTE_TYPE: // Epoch Seconds + case ZCL_ELAPSED_S_ATTRIBUTE_TYPE: // Elapsed Seconds + static_assert(std::is_same::value, + "chip::Cluster is expected to be uint32_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::AttributeId is expected to be uint32_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::AttributeId is expected to be uint32_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::EventId is expected to be uint32_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::CommandId is expected to be uint32_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::TransactionId is expected to be uint32_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::DeviceTypeId is expected to be uint32_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::DataVersion is expected to be uint32_t, change this when necessary"); + return ZCL_INT32U_ATTRIBUTE_TYPE; + + case ZCL_AMPERAGE_MA_ATTRIBUTE_TYPE: // Amperage milliamps + case ZCL_ENERGY_MWH_ATTRIBUTE_TYPE: // Energy milliwatt-hours + case ZCL_POWER_MW_ATTRIBUTE_TYPE: // Power milliwatts + case ZCL_VOLTAGE_MV_ATTRIBUTE_TYPE: // Voltage millivolts + return ZCL_INT64S_ATTRIBUTE_TYPE; + + case ZCL_EVENT_NO_ATTRIBUTE_TYPE: // Event Number + case ZCL_FABRIC_ID_ATTRIBUTE_TYPE: // Fabric Id + case ZCL_NODE_ID_ATTRIBUTE_TYPE: // Node Id + case ZCL_BITMAP64_ATTRIBUTE_TYPE: // 64-bit bitmap + case ZCL_EPOCH_US_ATTRIBUTE_TYPE: // Epoch Microseconds + case ZCL_POSIX_MS_ATTRIBUTE_TYPE: // POSIX Milliseconds + case ZCL_SYSTIME_MS_ATTRIBUTE_TYPE: // System time Milliseconds + case ZCL_SYSTIME_US_ATTRIBUTE_TYPE: // System time Microseconds + static_assert(std::is_same::value, + "chip::EventNumber is expected to be uint64_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::FabricId is expected to be uint64_t, change this when necessary"); + static_assert(std::is_same::value, + "chip::NodeId is expected to be uint64_t, change this when necessary"); + return ZCL_INT64U_ATTRIBUTE_TYPE; + + case ZCL_TEMPERATURE_ATTRIBUTE_TYPE: // Temperature + return ZCL_INT16S_ATTRIBUTE_TYPE; + + default: + return type; + } +} + +} // namespace Internal +} // namespace Compatibility +} // namespace app +} // namespace chip diff --git a/src/app/util/ember-io-storage.h b/src/app/util/ember-io-storage.h new file mode 100644 index 00000000000000..4297bc73d0c176 --- /dev/null +++ b/src/app/util/ember-io-storage.h @@ -0,0 +1,55 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +#pragma once + +#include + +#include +#include + +namespace chip { +namespace app { +namespace Compatibility { +namespace Internal { + +/// A buffer guaranteed to be sized sufficiently large to contain any individual value from +/// the ember attribute/data store (i.e. a buffer that can be used to read ember data into +/// or as a temporary buffer to place data before asking ember to store it). +/// +/// This buffer is intended to be used for calls to `emAfReadOrWriteAttribute` and +/// `emAfWriteAttributeExternal`: it is sufficiently sized to be able to handle any +/// max-sized data that ember is aware of. +extern MutableByteSpan gEmberAttributeIOBufferSpan; + +/// Maps an attribute type that is not an integer but can be represented as an integer to the +/// corresponding basic int(8|16|32|64)(s|u) type +/// +/// For example: +/// ZCL_ENUM8_ATTRIBUTE_TYPE maps to ZCL_INT8U_ATTRIBUTE_TYPE +/// ZCL_VENDOR_ID_ATTRIBUTE_TYPE maps to ZCL_INT16U_ATTRIBUTE_TYPE +/// ZCL_BITMAP32_ATTRIBUTE_TYPE maps to ZCL_INT32U_ATTRIBUTE_TYPE +/// ZCL_VOLTAGE_MV_ATTRIBUTE_TYPE maps to ZCL_INT64S_ATTRIBUTE_TYPE +/// ... +/// +/// If the `type` cannot be mapped to a basic type (or is already a basic type) its value +/// is returned unchanged. +EmberAfAttributeType AttributeBaseType(EmberAfAttributeType type); + +} // namespace Internal +} // namespace Compatibility +} // namespace app +} // namespace chip diff --git a/src/app/util/mock/BUILD.gn b/src/app/util/mock/BUILD.gn index da44fb84e5a809..b63c49e68f2494 100644 --- a/src/app/util/mock/BUILD.gn +++ b/src/app/util/mock/BUILD.gn @@ -25,6 +25,7 @@ source_set("mock_ember") { "MockNodeConfig.cpp", "MockNodeConfig.h", "attribute-storage.cpp", + "privilege-storage.cpp", ] public_deps = [ diff --git a/src/app/util/mock/attribute-storage.cpp b/src/app/util/mock/attribute-storage.cpp index 2293a48a8403e4..e4c965e98905f4 100644 --- a/src/app/util/mock/attribute-storage.cpp +++ b/src/app/util/mock/attribute-storage.cpp @@ -152,6 +152,50 @@ uint8_t emberAfGetClusterCountForEndpoint(EndpointId endpointId) return static_cast(endpoint->clusters.size()); } +const EmberAfAttributeMetadata * emberAfLocateAttributeMetadata(EndpointId endpointId, ClusterId clusterId, AttributeId attributeId) +{ + auto ep = GetMockNodeConfig().endpointById(endpointId); + VerifyOrReturnValue(ep != nullptr, nullptr); + + auto cluster = ep->clusterById(clusterId); + VerifyOrReturnValue(cluster != nullptr, nullptr); + + auto attr = cluster->attributeById(attributeId); + VerifyOrReturnValue(attr != nullptr, nullptr); + + return &attr->attributeMetaData; +} + +const EmberAfCluster * emberAfFindClusterInType(const EmberAfEndpointType * endpointType, ClusterId clusterId, + EmberAfClusterMask mask, uint8_t * index) +{ + // This is a copy & paste implementation from ember attribute storage + // TODO: this hard-codes ember logic and is duplicated code. + uint8_t scopedIndex = 0; + + for (uint8_t i = 0; i < endpointType->clusterCount; i++) + { + const EmberAfCluster * cluster = &(endpointType->cluster[i]); + + if (mask == 0 || ((cluster->mask & mask) != 0)) + { + if (cluster->clusterId == clusterId) + { + if (index) + { + *index = scopedIndex; + } + + return cluster; + } + + scopedIndex++; + } + } + + return nullptr; +} + uint8_t emberAfClusterCount(chip::EndpointId endpoint, bool server) { return (server) ? emberAfGetClusterCountForEndpoint(endpoint) : 0; @@ -414,6 +458,7 @@ void SetMockNodeConfig(const MockNodeConfig & config) mockConfig = &config; } +/// Resets the mock attribute storage to the default configuration. void ResetMockNodeConfig() { mockConfig = nullptr; diff --git a/src/app/util/mock/include/zap-generated/endpoint_config.h b/src/app/util/mock/include/zap-generated/endpoint_config.h index 33d1e87e320896..620e6e29880f36 100644 --- a/src/app/util/mock/include/zap-generated/endpoint_config.h +++ b/src/app/util/mock/include/zap-generated/endpoint_config.h @@ -1,2 +1,4 @@ // Number of fixed endpoints #define FIXED_ENDPOINT_COUNT (3) + +#define ATTRIBUTE_LARGEST (1003) diff --git a/src/app/tests/integration/RequiredPrivilegeStubs.cpp b/src/app/util/mock/privilege-storage.cpp similarity index 82% rename from src/app/tests/integration/RequiredPrivilegeStubs.cpp rename to src/app/util/mock/privilege-storage.cpp index 2cc23056e5d34a..26ff8967944e12 100644 --- a/src/app/tests/integration/RequiredPrivilegeStubs.cpp +++ b/src/app/util/mock/privilege-storage.cpp @@ -1,6 +1,5 @@ -/* - * - * Copyright (c) 2022 Project CHIP Authors +/** + * Copyright (c) 2024 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -14,8 +13,12 @@ * See the License for the specific language governing permissions and * limitations under the License. */ +#include +#include -#include +// Privilege mocks here are MUCH more strict so that +// testing code can generally validatate access without something +// being permissive like kView. chip::Access::Privilege MatterGetAccessPrivilegeForReadAttribute(chip::ClusterId cluster, chip::AttributeId attribute) { diff --git a/src/ble/BtpEngine.cpp b/src/ble/BtpEngine.cpp index 59cc73222e5722..75958169a785d5 100644 --- a/src/ble/BtpEngine.cpp +++ b/src/ble/BtpEngine.cpp @@ -35,6 +35,7 @@ #include #include #include +#include #include #include @@ -45,8 +46,10 @@ #ifdef CHIP_BTP_PROTOCOL_ENGINE_DEBUG_LOGGING_ENABLED #define ChipLogDebugBtpEngine(MOD, MSG, ...) ChipLogError(MOD, MSG, ##__VA_ARGS__) +#define ChipLogDebugBufferBtpEngine(MOD, BUF) ChipLogByteSpan(MOD, ByteSpan((BUF)->Start(), (BUF)->DataLength())) #else #define ChipLogDebugBtpEngine(MOD, MSG, ...) +#define ChipLogDebugBufferBtpEngine(MOD, BUF) #endif namespace chip { @@ -63,18 +66,6 @@ static inline bool DidReceiveData(BitFlags rx_flags) BtpEngine::HeaderFlags::kEndMessage); } -static void PrintBufDebug(const System::PacketBufferHandle & buf) -{ -#ifdef CHIP_BTP_PROTOCOL_ENGINE_DEBUG_LOGGING_ENABLED - uint8_t * b = buf->Start(); - - for (int i = 0; i < buf->DataLength(); i++) - { - ChipLogError(Ble, "\t%02x", b[i]); - } -#endif -} - const uint16_t BtpEngine::sDefaultFragmentSize = 20; // 23-byte minimum ATT_MTU - 3 bytes for ATT operation header const uint16_t BtpEngine::sMaxFragmentSize = 244; // Maximum size of BTP segment @@ -289,7 +280,7 @@ CHIP_ERROR BtpEngine::HandleCharacteristicReceived(System::PacketBufferHandle && data->ConsumeHead(static_cast(reader.OctetsRead())); ChipLogDebugBtpEngine(Ble, ">>> BTP reassembler received data:"); - PrintBufDebug(data); + ChipLogDebugBufferBtpEngine(Ble, data); } if (mRxState == kState_Idle) @@ -434,7 +425,7 @@ bool BtpEngine::HandleCharacteristicSend(System::PacketBufferHandle data, bool s mTxLength = static_cast(mTxBuf->DataLength()); ChipLogDebugBtpEngine(Ble, ">>> CHIPoBle preparing to send whole message:"); - PrintBufDebug(mTxBuf); + ChipLogDebugBufferBtpEngine(Ble, mTxBuf); // Determine fragment header size. uint8_t header_size = @@ -485,7 +476,7 @@ bool BtpEngine::HandleCharacteristicSend(System::PacketBufferHandle data, bool s characteristic[0] = headerFlags.Raw(); ChipLogDebugBtpEngine(Ble, ">>> CHIPoBle preparing to send first fragment:"); - PrintBufDebug(mTxBuf); + ChipLogDebugBufferBtpEngine(Ble, mTxBuf); } else if (mTxState == kState_InProgress) { @@ -531,7 +522,7 @@ bool BtpEngine::HandleCharacteristicSend(System::PacketBufferHandle data, bool s characteristic[0] = headerFlags.Raw(); ChipLogDebugBtpEngine(Ble, ">>> CHIPoBle preparing to send additional fragment:"); - PrintBufDebug(mTxBuf); + ChipLogDebugBufferBtpEngine(Ble, mTxBuf); } else { diff --git a/src/controller/python/chip/ChipDeviceCtrl.py b/src/controller/python/chip/ChipDeviceCtrl.py index 4e57e3d6044e67..d63a3772e62dc6 100644 --- a/src/controller/python/chip/ChipDeviceCtrl.py +++ b/src/controller/python/chip/ChipDeviceCtrl.py @@ -186,7 +186,7 @@ def __init__(self, deviceProxy: ctypes.c_void_p, dmLib=None): def __del__(self): if (self._dmLib is not None and hasattr(builtins, 'chipStack') and builtins.chipStack is not None): # This destructor is called from any threading context, including on the Matter threading context. - # So, we cannot call chipStack.Call or chipStack.CallAsync which waits for the posted work to + # So, we cannot call chipStack.Call or chipStack.CallAsyncWithCompleteCallback which waits for the posted work to # actually be executed. Instead, we just post/schedule the work and move on. builtins.chipStack.PostTaskOnChipThread(lambda: self._dmLib.pychip_FreeOperationalDeviceProxy(self._deviceProxy)) @@ -447,7 +447,7 @@ def ConnectBLE(self, discriminator, setupPinCode, nodeid) -> PyChipError: self.state = DCState.COMMISSIONING self._enablePairingCompeleteCallback(True) - self._ChipStack.CallAsync( + self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_ConnectBLE( self.devCtrl, discriminator, setupPinCode, nodeid) ).raise_on_error() @@ -459,7 +459,7 @@ def ConnectBLE(self, discriminator, setupPinCode, nodeid) -> PyChipError: def UnpairDevice(self, nodeid: int): self.CheckIsActive() - return self._ChipStack.CallAsync( + return self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_UnpairDevice( self.devCtrl, nodeid, self.cbHandleDeviceUnpairCompleteFunct) ).raise_on_error() @@ -498,7 +498,7 @@ def EstablishPASESessionBLE(self, setupPinCode: int, discriminator: int, nodeid: self.state = DCState.RENDEZVOUS_ONGOING self._enablePairingCompeleteCallback(True) - return self._ChipStack.CallAsync( + return self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_EstablishPASESessionBLE( self.devCtrl, setupPinCode, discriminator, nodeid) ) @@ -508,7 +508,7 @@ def EstablishPASESessionIP(self, ipaddr: str, setupPinCode: int, nodeid: int, po self.state = DCState.RENDEZVOUS_ONGOING self._enablePairingCompeleteCallback(True) - return self._ChipStack.CallAsync( + return self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_EstablishPASESessionIP( self.devCtrl, ipaddr.encode("utf-8"), setupPinCode, nodeid, port) ) @@ -518,7 +518,7 @@ def EstablishPASESession(self, setUpCode: str, nodeid: int): self.state = DCState.RENDEZVOUS_ONGOING self._enablePairingCompeleteCallback(True) - return self._ChipStack.CallAsync( + return self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_EstablishPASESession( self.devCtrl, setUpCode.encode("utf-8"), nodeid) ) @@ -737,7 +737,7 @@ def OpenCommissioningWindow(self, nodeid: int, timeout: int, iteration: int, Returns CommissioningParameters ''' self.CheckIsActive() - self._ChipStack.CallAsync( + self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_OpenCommissioningWindow( self.devCtrl, self.pairingDelegate, nodeid, timeout, iteration, discriminator, option) ).raise_on_error() @@ -858,7 +858,7 @@ async def GetConnectedDevice(self, nodeid, allowPASE: bool = True, timeoutMs: in if allowPASE: returnDevice = c_void_p(None) - res = self._ChipStack.Call(lambda: self._dmLib.pychip_GetDeviceBeingCommissioned( + res = await self._ChipStack.CallAsync(lambda: self._dmLib.pychip_GetDeviceBeingCommissioned( self.devCtrl, nodeid, byref(returnDevice)), timeoutMs) if res.is_success: logging.info('Using PASE connection') @@ -888,11 +888,12 @@ def deviceAvailable(self, device, err): closure = DeviceAvailableClosure(eventLoop, future) ctypes.pythonapi.Py_IncRef(ctypes.py_object(closure)) - self._ChipStack.Call(lambda: self._dmLib.pychip_GetConnectedDeviceByNodeId( + res = await self._ChipStack.CallAsync(lambda: self._dmLib.pychip_GetConnectedDeviceByNodeId( self.devCtrl, nodeid, ctypes.py_object(closure), _DeviceAvailableCallback), - timeoutMs).raise_on_error() + timeoutMs) + res.raise_on_error() - # The callback might have been received synchronously (during self._ChipStack.Call()). + # The callback might have been received synchronously (during self._ChipStack.CallAsync()). # In that case the Future has already been set it will return immediately if timeoutMs is not None: timeout = float(timeoutMs) / 1000 @@ -1020,13 +1021,14 @@ async def SendCommand(self, nodeid: int, endpoint: int, payload: ClusterObjects. future = eventLoop.create_future() device = await self.GetConnectedDevice(nodeid, timeoutMs=interactionTimeoutMs) - ClusterCommand.SendCommand( + res = await ClusterCommand.SendCommand( future, eventLoop, responseType, device.deviceProxy, ClusterCommand.CommandPath( EndpointId=endpoint, ClusterId=payload.cluster_id, CommandId=payload.command_id, ), payload, timedRequestTimeoutMs=timedRequestTimeoutMs, - interactionTimeoutMs=interactionTimeoutMs, busyWaitMs=busyWaitMs, suppressResponse=suppressResponse).raise_on_error() + interactionTimeoutMs=interactionTimeoutMs, busyWaitMs=busyWaitMs, suppressResponse=suppressResponse) + res.raise_on_error() return await future async def SendBatchCommands(self, nodeid: int, commands: typing.List[ClusterCommand.InvokeRequestInfo], @@ -1062,10 +1064,11 @@ async def SendBatchCommands(self, nodeid: int, commands: typing.List[ClusterComm device = await self.GetConnectedDevice(nodeid, timeoutMs=interactionTimeoutMs) - ClusterCommand.SendBatchCommands( + res = await ClusterCommand.SendBatchCommands( future, eventLoop, device.deviceProxy, commands, timedRequestTimeoutMs=timedRequestTimeoutMs, - interactionTimeoutMs=interactionTimeoutMs, busyWaitMs=busyWaitMs, suppressResponse=suppressResponse).raise_on_error() + interactionTimeoutMs=interactionTimeoutMs, busyWaitMs=busyWaitMs, suppressResponse=suppressResponse) + res.raise_on_error() return await future def SendGroupCommand(self, groupid: int, payload: ClusterObjects.ClusterCommand, busyWaitMs: typing.Union[None, int] = None): @@ -1895,7 +1898,7 @@ def Commission(self, nodeid) -> PyChipError: self._ChipStack.commissioningCompleteEvent.clear() self.state = DCState.COMMISSIONING - self._ChipStack.CallAsync( + self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_Commission( self.devCtrl, nodeid) ) @@ -2011,7 +2014,7 @@ def CommissionOnNetwork(self, nodeId: int, setupPinCode: int, self._ChipStack.commissioningCompleteEvent.clear() self._enablePairingCompeleteCallback(True) - self._ChipStack.CallAsync( + self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_OnNetworkCommission( self.devCtrl, self.pairingDelegate, nodeId, setupPinCode, int(filterType), str(filter).encode("utf-8") + b"\x00" if filter is not None else None, discoveryTimeoutMsec) ) @@ -2035,7 +2038,7 @@ def CommissionWithCode(self, setupPayload: str, nodeid: int, discoveryType: Disc self._ChipStack.commissioningCompleteEvent.clear() self._enablePairingCompeleteCallback(True) - self._ChipStack.CallAsync( + self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_ConnectWithCode( self.devCtrl, setupPayload, nodeid, discoveryType.value) ) @@ -2055,7 +2058,7 @@ def CommissionIP(self, ipaddr: str, setupPinCode: int, nodeid: int) -> PyChipErr self._ChipStack.commissioningCompleteEvent.clear() self._enablePairingCompeleteCallback(True) - self._ChipStack.CallAsync( + self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_ConnectIP( self.devCtrl, ipaddr.encode("utf-8"), setupPinCode, nodeid) ) @@ -2069,7 +2072,7 @@ def IssueNOCChain(self, csr: Clusters.OperationalCredentials.Commands.CSRRespons The NOC chain will be provided in TLV cert format.""" self.CheckIsActive() - return self._ChipStack.CallAsync( + return self._ChipStack.CallAsyncWithCompleteCallback( lambda: self._dmLib.pychip_DeviceController_IssueNOCChain( self.devCtrl, py_object(self), csr.NOCSRElements, len(csr.NOCSRElements), nodeId) ) diff --git a/src/controller/python/chip/ChipStack.py b/src/controller/python/chip/ChipStack.py index 6df7e41de4433a..35f9e24ef4db25 100644 --- a/src/controller/python/chip/ChipStack.py +++ b/src/controller/python/chip/ChipStack.py @@ -26,6 +26,7 @@ from __future__ import absolute_import, print_function +import asyncio import builtins import logging import os @@ -164,6 +165,35 @@ def Wait(self, timeoutMs: int = None): return self._res +class AsyncioCallableHandle: + """Class which handles Matter SDK Calls asyncio friendly""" + + def __init__(self, callback): + self._callback = callback + self._loop = asyncio.get_event_loop() + self._future = self._loop.create_future() + self._result = None + self._exception = None + + @property + def future(self): + return self._future + + def _done(self): + if self._exception: + self._future.set_exception(self._exception) + else: + self._future.set_result(self._result) + + def __call__(self): + try: + self._result = self._callback() + except Exception as ex: + self._exception = ex + self._loop.call_soon_threadsafe(self._done) + pythonapi.Py_DecRef(py_object(self)) + + _CompleteFunct = CFUNCTYPE(None, c_void_p, c_void_p) _ErrorFunct = CFUNCTYPE(None, c_void_p, c_void_p, c_ulong, POINTER(DeviceStatusStruct)) @@ -178,6 +208,7 @@ def __init__(self, persistentStoragePath: str, installDefaultLogHandler=True, bluetoothAdapter=None, enableServerInteractions=True): builtins.enableDebugMode = False + # TODO: Probably no longer necessary, see https://github.com/project-chip/connectedhomeip/issues/33321. self.networkLock = Lock() self.completeEvent = Event() self.commissioningCompleteEvent = Event() @@ -318,6 +349,7 @@ def setLogFunct(self, logFunct): logFunct = 0 if not isinstance(logFunct, _LogMessageFunct): logFunct = _LogMessageFunct(logFunct) + # TODO: Lock probably no longer necessary, see https://github.com/project-chip/connectedhomeip/issues/33321. with self.networkLock: # NOTE: ChipStack must hold a reference to the CFUNCTYPE object while it is # set. Otherwise it may get garbage collected, and logging calls from the @@ -360,6 +392,7 @@ def Call(self, callFunct, timeoutMs: int = None): # throw error if op in progress self.callbackRes = None self.completeEvent.clear() + # TODO: Lock probably no longer necessary, see https://github.com/project-chip/connectedhomeip/issues/33321. with self.networkLock: res = self.PostTaskOnChipThread(callFunct).Wait(timeoutMs) self.completeEvent.set() @@ -367,14 +400,32 @@ def Call(self, callFunct, timeoutMs: int = None): return self.callbackRes return res - def CallAsync(self, callFunct): + async def CallAsync(self, callFunct, timeoutMs: int = None): + '''Run a Python function on CHIP stack, and wait for the response. + This function will post a task on CHIP mainloop and waits for the call response in a asyncio friendly manner. + ''' + callObj = AsyncioCallableHandle(callFunct) + pythonapi.Py_IncRef(py_object(callObj)) + + res = self._ChipStackLib.pychip_DeviceController_PostTaskOnChipThread( + self.cbHandleChipThreadRun, py_object(callObj)) + + if not res.is_success: + pythonapi.Py_DecRef(py_object(callObj)) + raise res.to_exception() + + return await asyncio.wait_for(callObj.future, timeoutMs / 1000 if timeoutMs else None) + + def CallAsyncWithCompleteCallback(self, callFunct): '''Run a Python function on CHIP stack, and wait for the application specific response. This function is a wrapper of PostTaskOnChipThread, which includes some handling of application specific logics. Calling this function on CHIP on CHIP mainloop thread will cause deadlock. + Make sure to register the necessary callbacks which release the function by setting the completeEvent. ''' # throw error if op in progress self.callbackRes = None self.completeEvent.clear() + # TODO: Lock probably no longer necessary, see https://github.com/project-chip/connectedhomeip/issues/33321. with self.networkLock: res = self.PostTaskOnChipThread(callFunct).Wait() diff --git a/src/controller/python/chip/ble/darwin/Scanning.mm b/src/controller/python/chip/ble/darwin/Scanning.mm index 292978b424a787..564a984e094369 100644 --- a/src/controller/python/chip/ble/darwin/Scanning.mm +++ b/src/controller/python/chip/ble/darwin/Scanning.mm @@ -1,7 +1,7 @@ #include #include #include -#include +#include #import @@ -45,7 +45,7 @@ - (id)initWithContext:(PyObject *)context { self = [super init]; if (self) { - self.shortServiceUUID = [UUIDHelper GetShortestServiceUUID:&chip::Ble::CHIP_BLE_SVC_ID]; + self.shortServiceUUID = [MTRUUIDHelper GetShortestServiceUUID:&chip::Ble::CHIP_BLE_SVC_ID]; _workQueue = dispatch_queue_create("com.chip.python.ble.work_queue", DISPATCH_QUEUE_SERIAL); _timer = dispatch_source_create(DISPATCH_SOURCE_TYPE_TIMER, 0, 0, _workQueue); diff --git a/src/controller/python/chip/clusters/Command.py b/src/controller/python/chip/clusters/Command.py index 89aae537c9b3fd..6ef25cb211d4da 100644 --- a/src/controller/python/chip/clusters/Command.py +++ b/src/controller/python/chip/clusters/Command.py @@ -291,9 +291,9 @@ def TestOnlySendCommandTimedRequestFlagWithNoTimedInvoke(future: Future, eventLo )) -def SendCommand(future: Future, eventLoop, responseType: Type, device, commandPath: CommandPath, payload: ClusterCommand, - timedRequestTimeoutMs: Union[None, int] = None, interactionTimeoutMs: Union[None, int] = None, busyWaitMs: Union[None, int] = None, - suppressResponse: Union[None, bool] = None) -> PyChipError: +async def SendCommand(future: Future, eventLoop, responseType: Type, device, commandPath: CommandPath, payload: ClusterCommand, + timedRequestTimeoutMs: Union[None, int] = None, interactionTimeoutMs: Union[None, int] = None, + busyWaitMs: Union[None, int] = None, suppressResponse: Union[None, bool] = None) -> PyChipError: ''' Send a cluster-object encapsulated command to a device and does the following: - On receipt of a successful data response, returns the cluster-object equivalent through the provided future. - None (on a successful response containing no data) @@ -316,7 +316,7 @@ def SendCommand(future: Future, eventLoop, responseType: Type, device, commandPa payloadTLV = payload.ToTLV() ctypes.pythonapi.Py_IncRef(ctypes.py_object(transaction)) - return builtins.chipStack.Call( + return await builtins.chipStack.CallAsync( lambda: handle.pychip_CommandSender_SendCommand( ctypes.py_object(transaction), device, c_uint16(0 if timedRequestTimeoutMs is None else timedRequestTimeoutMs), commandPath.EndpointId, @@ -353,9 +353,9 @@ def _BuildPyInvokeRequestData(commands: List[InvokeRequestInfo], timedRequestTim return pyBatchCommandsData -def SendBatchCommands(future: Future, eventLoop, device, commands: List[InvokeRequestInfo], - timedRequestTimeoutMs: Optional[int] = None, interactionTimeoutMs: Optional[int] = None, busyWaitMs: Optional[int] = None, - suppressResponse: Optional[bool] = None) -> PyChipError: +async def SendBatchCommands(future: Future, eventLoop, device, commands: List[InvokeRequestInfo], + timedRequestTimeoutMs: Optional[int] = None, interactionTimeoutMs: Optional[int] = None, + busyWaitMs: Optional[int] = None, suppressResponse: Optional[bool] = None) -> PyChipError: ''' Initiates an InvokeInteraction with the batch commands provided. Arguments: @@ -388,7 +388,7 @@ def SendBatchCommands(future: Future, eventLoop, device, commands: List[InvokeRe transaction = AsyncBatchCommandsTransaction(future, eventLoop, responseTypes) ctypes.pythonapi.Py_IncRef(ctypes.py_object(transaction)) - return builtins.chipStack.Call( + return await builtins.chipStack.CallAsync( lambda: handle.pychip_CommandSender_SendBatchCommands( py_object(transaction), device, c_uint16(0 if timedRequestTimeoutMs is None else timedRequestTimeoutMs), diff --git a/src/controller/python/chip/clusters/__init__.py b/src/controller/python/chip/clusters/__init__.py index 85048384d8a81c..44d9910c670098 100644 --- a/src/controller/python/chip/clusters/__init__.py +++ b/src/controller/python/chip/clusters/__init__.py @@ -27,12 +27,12 @@ ApplicationBasic, ApplicationLauncher, AudioOutput, BallastConfiguration, BarrierControl, BasicInformation, BinaryInputBasic, Binding, BooleanState, BooleanStateConfiguration, BridgedDeviceBasicInformation, CarbonDioxideConcentrationMeasurement, CarbonMonoxideConcentrationMeasurement, Channel, ColorControl, - ContentLauncher, Descriptor, DeviceEnergyManagement, DeviceEnergyManagementMode, DiagnosticLogs, - DishwasherAlarm, DishwasherMode, DoorLock, ElectricalEnergyMeasurement, ElectricalMeasurement, - ElectricalPowerMeasurement, EnergyEvse, EnergyEvseMode, EthernetNetworkDiagnostics, FanControl, - FaultInjection, FixedLabel, FlowMeasurement, FormaldehydeConcentrationMeasurement, GeneralCommissioning, - GeneralDiagnostics, GroupKeyManagement, Groups, HepaFilterMonitoring, IcdManagement, Identify, - IlluminanceMeasurement, KeypadInput, LaundryDryerControls, LaundryWasherControls, LaundryWasherMode, + ContentControl, ContentLauncher, Descriptor, DeviceEnergyManagement, DeviceEnergyManagementMode, + DiagnosticLogs, DishwasherAlarm, DishwasherMode, DoorLock, ElectricalEnergyMeasurement, ElectricalMeasurement, + ElectricalPowerMeasurement, EnergyEvse, EnergyEvseMode, EnergyPreference, EthernetNetworkDiagnostics, + FanControl, FaultInjection, FixedLabel, FlowMeasurement, FormaldehydeConcentrationMeasurement, + GeneralCommissioning, GeneralDiagnostics, GroupKeyManagement, Groups, HepaFilterMonitoring, IcdManagement, + Identify, IlluminanceMeasurement, KeypadInput, LaundryDryerControls, LaundryWasherControls, LaundryWasherMode, LevelControl, LocalizationConfiguration, LowPower, MediaInput, MediaPlayback, MicrowaveOvenControl, MicrowaveOvenMode, ModeSelect, NetworkCommissioning, NitrogenDioxideConcentrationMeasurement, OccupancySensing, OnOff, OnOffSwitchConfiguration, OperationalCredentials, OperationalState, @@ -51,8 +51,8 @@ ApplicationBasic, ApplicationLauncher, AudioOutput, BallastConfiguration, BarrierControl, BasicInformation, BinaryInputBasic, Binding, BooleanState, BooleanStateConfiguration, BridgedDeviceBasicInformation, CarbonDioxideConcentrationMeasurement, CarbonMonoxideConcentrationMeasurement, Channel, - ColorControl, ContentLauncher, Descriptor, DeviceEnergyManagementMode, DeviceEnergyManagement, DiagnosticLogs, DishwasherAlarm, DishwasherMode, - DoorLock, ElectricalEnergyMeasurement, ElectricalMeasurement, ElectricalPowerMeasurement, EnergyEvse, EnergyEvseMode, + ColorControl, ContentControl, ContentLauncher, Descriptor, DeviceEnergyManagementMode, DeviceEnergyManagement, DeviceEnergyManagementMode, DiagnosticLogs, DishwasherAlarm, DishwasherMode, + DoorLock, ElectricalEnergyMeasurement, ElectricalMeasurement, ElectricalPowerMeasurement, EnergyEvse, EnergyEvseMode, EnergyPreference, EthernetNetworkDiagnostics, FanControl, FaultInjection, FixedLabel, FlowMeasurement, FormaldehydeConcentrationMeasurement, GeneralCommissioning, GeneralDiagnostics, GroupKeyManagement, Groups, HepaFilterMonitoring, IcdManagement, Identify, IlluminanceMeasurement, KeypadInput, LaundryDryerControls, diff --git a/src/controller/python/test/test_scripts/base.py b/src/controller/python/test/test_scripts/base.py index 9fc9300f4c8116..3f9f76d9101874 100644 --- a/src/controller/python/test/test_scripts/base.py +++ b/src/controller/python/test/test_scripts/base.py @@ -178,29 +178,6 @@ def run(self): TestFail("Timeout", doCrash=True) -class TestResult: - def __init__(self, operationName, result): - self.operationName = operationName - self.result = result - - def assertStatusEqual(self, expected): - if self.result is None: - raise Exception(f"{self.operationName}: no result got") - if self.result.status != expected: - raise Exception( - f"{self.operationName}: expected status {expected}, got {self.result.status}") - return self - - def assertValueEqual(self, expected): - self.assertStatusEqual(0) - if self.result is None: - raise Exception(f"{self.operationName}: no result got") - if self.result.value != expected: - raise Exception( - f"{self.operationName}: expected value {expected}, got {self.result.value}") - return self - - class BaseTestHelper: def __init__(self, nodeid: int, paaTrustStorePath: str, testCommissioner: bool = False, keypair: p256keypair.P256Keypair = None): @@ -368,15 +345,16 @@ def TestOnNetworkCommissioning(self, discriminator: int, setuppin: int, nodeid: def TestUsedTestCommissioner(self): return self.devCtrl.GetTestCommissionerUsed() - def TestFailsafe(self, nodeid: int): + async def TestFailsafe(self, nodeid: int): self.logger.info("Testing arm failsafe") self.logger.info("Setting failsafe on CASE connection") - err, resp = self.devCtrl.ZCLSend("GeneralCommissioning", "ArmFailSafe", nodeid, - 0, 0, dict(expiryLengthSeconds=60, breadcrumb=1), blocking=True) - if err != 0: + try: + resp = await self.devCtrl.SendCommand(nodeid, 0, + Clusters.GeneralCommissioning.Commands.ArmFailSafe(expiryLengthSeconds=60, breadcrumb=1)) + except IM.InteractionModelError as ex: self.logger.error( - "Failed to send arm failsafe command error is {} with im response{}".format(err, resp)) + "Failed to send arm failsafe command error is {}".format(ex.status)) return False if resp.errorCode is not Clusters.GeneralCommissioning.Enums.CommissioningErrorEnum.kOk: @@ -387,17 +365,17 @@ def TestFailsafe(self, nodeid: int): self.logger.info( "Attempting to open basic commissioning window - this should fail since the failsafe is armed") try: - asyncio.run(self.devCtrl.SendCommand( + await self.devCtrl.SendCommand( nodeid, 0, Clusters.AdministratorCommissioning.Commands.OpenBasicCommissioningWindow(180), timedRequestTimeoutMs=10000 - )) + ) # we actually want the exception here because we want to see a failure, so return False here self.logger.error( 'Incorrectly succeeded in opening basic commissioning window') return False - except Exception: + except IM.InteractionModelError: pass # TODO: @@ -413,39 +391,39 @@ def TestFailsafe(self, nodeid: int): self.logger.info( "Attempting to open enhanced commissioning window - this should fail since the failsafe is armed") try: - asyncio.run(self.devCtrl.SendCommand( + await self.devCtrl.SendCommand( nodeid, 0, Clusters.AdministratorCommissioning.Commands.OpenCommissioningWindow( commissioningTimeout=180, PAKEPasscodeVerifier=verifier, discriminator=discriminator, iterations=iterations, - salt=salt), timedRequestTimeoutMs=10000)) + salt=salt), timedRequestTimeoutMs=10000) # we actually want the exception here because we want to see a failure, so return False here self.logger.error( 'Incorrectly succeeded in opening enhanced commissioning window') return False - except Exception: + except IM.InteractionModelError: pass self.logger.info("Disarming failsafe on CASE connection") - err, resp = self.devCtrl.ZCLSend("GeneralCommissioning", "ArmFailSafe", nodeid, - 0, 0, dict(expiryLengthSeconds=0, breadcrumb=1), blocking=True) - if err != 0: + try: + resp = await self.devCtrl.SendCommand(nodeid, 0, + Clusters.GeneralCommissioning.Commands.ArmFailSafe(expiryLengthSeconds=0, breadcrumb=1)) + except IM.InteractionModelError as ex: self.logger.error( - "Failed to send arm failsafe command error is {} with im response{}".format(err, resp)) + "Failed to send arm failsafe command error is {}".format(ex.status)) return False self.logger.info( "Opening Commissioning Window - this should succeed since the failsafe was just disarmed") try: - asyncio.run( - self.devCtrl.SendCommand( - nodeid, - 0, - Clusters.AdministratorCommissioning.Commands.OpenBasicCommissioningWindow(180), - timedRequestTimeoutMs=10000 - )) + await self.devCtrl.SendCommand( + nodeid, + 0, + Clusters.AdministratorCommissioning.Commands.OpenBasicCommissioningWindow(180), + timedRequestTimeoutMs=10000 + ) except Exception: self.logger.error( 'Failed to open commissioning window after disarming failsafe') @@ -453,11 +431,12 @@ def TestFailsafe(self, nodeid: int): self.logger.info( "Attempting to arm failsafe over CASE - this should fail since the commissioning window is open") - err, resp = self.devCtrl.ZCLSend("GeneralCommissioning", "ArmFailSafe", nodeid, - 0, 0, dict(expiryLengthSeconds=60, breadcrumb=1), blocking=True) - if err != 0: + try: + resp = await self.devCtrl.SendCommand(nodeid, 0, + Clusters.GeneralCommissioning.Commands.ArmFailSafe(expiryLengthSeconds=60, breadcrumb=1)) + except IM.InteractionModelError as ex: self.logger.error( - "Failed to send arm failsafe command error is {} with im response{}".format(err, resp)) + "Failed to send arm failsafe command error is {}".format(ex.status)) return False if resp.errorCode is Clusters.GeneralCommissioning.Enums.CommissioningErrorEnum.kBusyWithOtherAdmin: return True @@ -1095,50 +1074,48 @@ def SetNetworkCommissioningParameters(self, dataset: str): self.devCtrl.SetThreadOperationalDataset(bytes.fromhex(dataset)) return True - def TestOnOffCluster(self, nodeid: int, endpoint: int, group: int): + async def TestOnOffCluster(self, nodeid: int, endpoint: int): self.logger.info( "Sending On/Off commands to device {} endpoint {}".format(nodeid, endpoint)) - err, resp = self.devCtrl.ZCLSend("OnOff", "On", nodeid, - endpoint, group, {}, blocking=True) - if err != 0: + + try: + await self.devCtrl.SendCommand(nodeid, endpoint, + Clusters.OnOff.Commands.On()) + except IM.InteractionModelError as ex: self.logger.error( - "failed to send OnOff.On: error is {} with im response{}".format(err, resp)) + "failed to send OnOff.On: error is {}".format(ex.status)) return False - err, resp = self.devCtrl.ZCLSend("OnOff", "Off", nodeid, - endpoint, group, {}, blocking=True) - if err != 0: + + try: + await self.devCtrl.SendCommand(nodeid, endpoint, + Clusters.OnOff.Commands.Off()) + except IM.InteractionModelError as ex: self.logger.error( - "failed to send OnOff.Off: error is {} with im response {}".format(err, resp)) + "failed to send OnOff.Off: error is {}".format(ex.status)) return False return True - def TestLevelControlCluster(self, nodeid: int, endpoint: int, group: int): + async def TestLevelControlCluster(self, nodeid: int, endpoint: int): self.logger.info( f"Sending MoveToLevel command to device {nodeid} endpoint {endpoint}") - try: - commonArgs = dict(transitionTime=0, optionsMask=1, optionsOverride=1) + commonArgs = dict(transitionTime=0, optionsMask=1, optionsOverride=1) + + async def _moveClusterLevel(setLevel): + await self.devCtrl.SendCommand(nodeid, + endpoint, + Clusters.LevelControl.Commands.MoveToLevel(**commonArgs, level=setLevel)) + res = await self.devCtrl.ReadAttribute(nodeid, [(endpoint, Clusters.LevelControl.Attributes.CurrentLevel)]) + readVal = res[endpoint][Clusters.LevelControl][Clusters.LevelControl.Attributes.CurrentLevel] + if readVal != setLevel: + raise Exception(f"Read attribute LevelControl.CurrentLevel: expected value {setLevel}, got {readVal}") + + try: # Move to 1 - self.devCtrl.ZCLSend("LevelControl", "MoveToLevel", nodeid, - endpoint, group, dict(**commonArgs, level=1), blocking=True) - res = self.devCtrl.ZCLReadAttribute(cluster="LevelControl", - attribute="CurrentLevel", - nodeid=nodeid, - endpoint=endpoint, - groupid=group) - TestResult("Read attribute LevelControl.CurrentLevel", - res).assertValueEqual(1) + await _moveClusterLevel(1) # Move to 254 - self.devCtrl.ZCLSend("LevelControl", "MoveToLevel", nodeid, - endpoint, group, dict(**commonArgs, level=254), blocking=True) - res = self.devCtrl.ZCLReadAttribute(cluster="LevelControl", - attribute="CurrentLevel", - nodeid=nodeid, - endpoint=endpoint, - groupid=group) - TestResult("Read attribute LevelControl.CurrentLevel", - res).assertValueEqual(254) + await _moveClusterLevel(254) return True except Exception as ex: @@ -1171,29 +1148,27 @@ def TestResolve(self, nodeid): self.logger.exception("Failed to resolve. {}".format(ex)) return False - def TestReadBasicAttributes(self, nodeid: int, endpoint: int, group: int): + async def TestReadBasicAttributes(self, nodeid: int, endpoint: int): + attrs = Clusters.BasicInformation.Attributes basic_cluster_attrs = { - "VendorName": "TEST_VENDOR", - "VendorID": 0xFFF1, - "ProductName": "TEST_PRODUCT", - "ProductID": 0x8001, - "NodeLabel": "Test", - "Location": "XX", - "HardwareVersion": 0, - "HardwareVersionString": "TEST_VERSION", - "SoftwareVersion": 1, - "SoftwareVersionString": "1.0", + attrs.VendorName: "TEST_VENDOR", + attrs.VendorID: 0xFFF1, + attrs.ProductName: "TEST_PRODUCT", + attrs.ProductID: 0x8001, + attrs.NodeLabel: "Test", + attrs.Location: "XX", + attrs.HardwareVersion: 0, + attrs.HardwareVersionString: "TEST_VERSION", + attrs.SoftwareVersion: 1, + attrs.SoftwareVersionString: "1.0", } failed_zcl = {} for basic_attr, expected_value in basic_cluster_attrs.items(): try: - res = self.devCtrl.ZCLReadAttribute(cluster="BasicInformation", - attribute=basic_attr, - nodeid=nodeid, - endpoint=endpoint, - groupid=group) - TestResult(f"Read attribute {basic_attr}", res).assertValueEqual( - expected_value) + res = await self.devCtrl.ReadAttribute(nodeid, [(endpoint, basic_attr)]) + readVal = res[endpoint][Clusters.BasicInformation][basic_attr] + if readVal != expected_value: + raise Exception(f"Read attribute: expected value {expected_value}, got {readVal}") except Exception as ex: failed_zcl[basic_attr] = str(ex) if failed_zcl: @@ -1217,16 +1192,16 @@ class AttributeWriteRequest: failed_attribute_write = [] for req in requests: try: - try: - await self.devCtrl.WriteAttribute(nodeid, [(endpoint, req.attribute, 0)]) - if req.expected_status != IM.Status.Success: - raise AssertionError( - f"Write attribute {req.attribute.__qualname__} expects failure but got success response") - except Exception as ex: - if req.expected_status != IM.Status.Success: - continue - else: - raise ex + # Errors tested here is in the per-attribute result list (type AttributeStatus) + write_res = await self.devCtrl.WriteAttribute(nodeid, [(endpoint, req.attribute(req.value))]) + status = write_res[0].Status + if req.expected_status != status: + raise AssertionError( + f"Write attribute {req.attribute.__qualname__} expects {req.expected_status} but got {status}") + + # Only execute read tests where write is successful. + if req.expected_status != IM.Status.Success: + continue res = await self.devCtrl.ReadAttribute(nodeid, [(endpoint, req.attribute)]) val = res[endpoint][req.cluster][req.attribute] diff --git a/src/controller/python/test/test_scripts/commissioning_failure_test.py b/src/controller/python/test/test_scripts/commissioning_failure_test.py index eca170601c7f29..d680682d567491 100755 --- a/src/controller/python/test/test_scripts/commissioning_failure_test.py +++ b/src/controller/python/test/test_scripts/commissioning_failure_test.py @@ -19,6 +19,7 @@ # Commissioning test. +import asyncio import os import sys from optparse import OptionParser @@ -121,9 +122,8 @@ def main(): FailIfNot(test.TestCommissionFailure(1, 0), "Failed to commission device") logger.info("Testing on off cluster") - FailIfNot(test.TestOnOffCluster(nodeid=1, - endpoint=LIGHTING_ENDPOINT_ID, - group=GROUP_ID), "Failed to test on off cluster") + FailIfNot(asyncio.run(test.TestOnOffCluster(nodeid=1, + endpoint=LIGHTING_ENDPOINT_ID)), "Failed to test on off cluster") timeoutTicker.stop() diff --git a/src/controller/python/test/test_scripts/commissioning_test.py b/src/controller/python/test/test_scripts/commissioning_test.py index b6adc0f477884d..4a7f15d6c3b085 100755 --- a/src/controller/python/test/test_scripts/commissioning_test.py +++ b/src/controller/python/test/test_scripts/commissioning_test.py @@ -19,6 +19,7 @@ # Commissioning test. +import asyncio import os import sys from optparse import OptionParser @@ -146,9 +147,8 @@ def main(): TestFail("Must provide device address or setup payload to commissioning the device") logger.info("Testing on off cluster") - FailIfNot(test.TestOnOffCluster(nodeid=options.nodeid, - endpoint=LIGHTING_ENDPOINT_ID, - group=GROUP_ID), "Failed to test on off cluster") + FailIfNot(asyncio.run(test.TestOnOffCluster(nodeid=options.nodeid, + endpoint=LIGHTING_ENDPOINT_ID)), "Failed to test on off cluster") FailIfNot(test.TestUsedTestCommissioner(), "Test commissioner check failed") diff --git a/src/controller/python/test/test_scripts/failsafe_tests.py b/src/controller/python/test/test_scripts/failsafe_tests.py index 4b3838430ca213..d1a2034e7359d5 100755 --- a/src/controller/python/test/test_scripts/failsafe_tests.py +++ b/src/controller/python/test/test_scripts/failsafe_tests.py @@ -19,6 +19,7 @@ # Commissioning test. +import asyncio import os import sys from optparse import OptionParser @@ -99,7 +100,7 @@ def main(): nodeid=1), "Failed to finish key exchange") - FailIfNot(test.TestFailsafe(nodeid=1), "Failed failsafe test") + FailIfNot(asyncio.run(test.TestFailsafe(nodeid=1)), "Failed failsafe test") timeoutTicker.stop() diff --git a/src/controller/python/test/test_scripts/mobile-device-test.py b/src/controller/python/test/test_scripts/mobile-device-test.py index 33ae713fe02cb2..8f6f534dcefb96 100755 --- a/src/controller/python/test/test_scripts/mobile-device-test.py +++ b/src/controller/python/test/test_scripts/mobile-device-test.py @@ -102,20 +102,17 @@ def TestDatamodel(test: BaseTestHelper, device_nodeid: int): logger.info("Testing datamodel functions") logger.info("Testing on off cluster") - FailIfNot(test.TestOnOffCluster(nodeid=device_nodeid, - endpoint=LIGHTING_ENDPOINT_ID, - group=GROUP_ID), "Failed to test on off cluster") + FailIfNot(asyncio.run(test.TestOnOffCluster(nodeid=device_nodeid, + endpoint=LIGHTING_ENDPOINT_ID)), "Failed to test on off cluster") logger.info("Testing level control cluster") - FailIfNot(test.TestLevelControlCluster(nodeid=device_nodeid, - endpoint=LIGHTING_ENDPOINT_ID, - group=GROUP_ID), + FailIfNot(asyncio.run(test.TestLevelControlCluster(nodeid=device_nodeid, + endpoint=LIGHTING_ENDPOINT_ID)), "Failed to test level control cluster") logger.info("Testing sending commands to non exist endpoint") - FailIfNot(not test.TestOnOffCluster(nodeid=device_nodeid, - endpoint=233, - group=GROUP_ID), "Failed to test on off cluster on non-exist endpoint") + FailIfNot(not asyncio.run(test.TestOnOffCluster(nodeid=device_nodeid, + endpoint=233)), "Failed to test on off cluster on non-exist endpoint") # Test experimental Python cluster objects API logger.info("Testing cluster objects API") @@ -123,9 +120,8 @@ def TestDatamodel(test: BaseTestHelper, device_nodeid: int): "Failed when testing Python Cluster Object APIs") logger.info("Testing attribute reading") - FailIfNot(test.TestReadBasicAttributes(nodeid=device_nodeid, - endpoint=ENDPOINT_ID, - group=GROUP_ID), + FailIfNot(asyncio.run(test.TestReadBasicAttributes(nodeid=device_nodeid, + endpoint=ENDPOINT_ID)), "Failed to test Read Basic Attributes") logger.info("Testing attribute writing") @@ -134,9 +130,8 @@ def TestDatamodel(test: BaseTestHelper, device_nodeid: int): "Failed to test Write Basic Attributes") logger.info("Testing attribute reading basic again") - FailIfNot(test.TestReadBasicAttributes(nodeid=1, - endpoint=ENDPOINT_ID, - group=GROUP_ID), + FailIfNot(asyncio.run(test.TestReadBasicAttributes(nodeid=1, + endpoint=ENDPOINT_ID)), "Failed to test Read Basic Attributes") logger.info("Testing subscription") @@ -152,9 +147,8 @@ def TestDatamodel(test: BaseTestHelper, device_nodeid: int): "Failed to validated re-subscription") logger.info("Testing on off cluster over resolved connection") - FailIfNot(test.TestOnOffCluster(nodeid=device_nodeid, - endpoint=LIGHTING_ENDPOINT_ID, - group=GROUP_ID), "Failed to test on off cluster") + FailIfNot(asyncio.run(test.TestOnOffCluster(nodeid=device_nodeid, + endpoint=LIGHTING_ENDPOINT_ID)), "Failed to test on off cluster") logger.info("Testing writing/reading fabric sensitive data") asyncio.run(test.TestFabricSensitive(nodeid=device_nodeid)) diff --git a/src/controller/python/test/test_scripts/split_commissioning_test.py b/src/controller/python/test/test_scripts/split_commissioning_test.py index 47fedb3aadee8f..9233d58b90377d 100755 --- a/src/controller/python/test/test_scripts/split_commissioning_test.py +++ b/src/controller/python/test/test_scripts/split_commissioning_test.py @@ -19,6 +19,7 @@ # Commissioning test. +import asyncio import os import sys from optparse import OptionParser @@ -118,14 +119,12 @@ def main(): "Failed to commission device 2") logger.info("Testing on off cluster on device 1") - FailIfNot(test.TestOnOffCluster(nodeid=1, - endpoint=LIGHTING_ENDPOINT_ID, - group=GROUP_ID), "Failed to test on off cluster on device 1") + FailIfNot(asyncio.run(test.TestOnOffCluster(nodeid=1, + endpoint=LIGHTING_ENDPOINT_ID)), "Failed to test on off cluster on device 1") logger.info("Testing on off cluster on device 2") - FailIfNot(test.TestOnOffCluster(nodeid=2, - endpoint=LIGHTING_ENDPOINT_ID, - group=GROUP_ID), "Failed to test on off cluster on device 2") + FailIfNot(asyncio.run(test.TestOnOffCluster(nodeid=2, + endpoint=LIGHTING_ENDPOINT_ID)), "Failed to test on off cluster on device 2") timeoutTicker.stop() diff --git a/src/darwin/CHIPTool/README.md b/src/darwin/CHIPTool/README.md index d31ab129972ffb..bf74d6bb14e5c2 100644 --- a/src/darwin/CHIPTool/README.md +++ b/src/darwin/CHIPTool/README.md @@ -6,9 +6,11 @@ control. --- - [CHIP Tool iOS Sample Commissioner App](#chip-tool-ios-sample-commissioner-app) + - [Prerequisites](#prerequisites) - [Building the Application](#building-the-application) - [Compilation Fixes](#compilation-fixes) - [Installing the Application](#installing-the-application) + - [Setting up the iPhone](#setting-up-the-iphone) - [Pairing an Accessory](#pairing-an-accessory) --- @@ -80,6 +82,15 @@ run. Now you can launch the application from the Home screen or from Xcode by hitting the run button once more. +## Setting up the iPhone + +To use CHIP Tool on iOS or macOS, enable Developer Mode during the development +phase of your app by following the steps at +[Enabling Developer Mode on a device](https://developer.apple.com/documentation/xcode/enabling-developer-mode-on-a-device). +On the iOS or macOS device that initiates the pairing, +[download](https://developer.apple.com/services-account/download?path=/iOS/iOS_Logs/EnableBluetoothCentralMatterClientDeveloperMode.mobileconfig) +the developer profile, then install it. + ## Pairing an Accessory Once you have CHIPTool up and running, to pair an accessory simply: diff --git a/src/darwin/Framework/CHIP/MTRDevice.mm b/src/darwin/Framework/CHIP/MTRDevice.mm index 478485d509ccd1..486dcd90e2eae2 100644 --- a/src/darwin/Framework/CHIP/MTRDevice.mm +++ b/src/darwin/Framework/CHIP/MTRDevice.mm @@ -140,7 +140,15 @@ typedef NS_ENUM(NSUInteger, MTRInternalDeviceState) { // InitialSubscriptionEstablished means we have at some point finished setting up a // subscription. That subscription may have dropped since then, but if so it's the ReadClient's // responsibility to re-establish it. - MTRInternalDeviceStateInitalSubscriptionEstablished = 2, + MTRInternalDeviceStateInitialSubscriptionEstablished = 2, + // Resubscribing means we had established a subscription, but then + // detected a subscription drop due to not receiving a report on time. This + // covers all the actions that happen when re-subscribing (discovery, CASE, + // getting priming reports, etc). + MTRInternalDeviceStateResubscribing = 3, + // LaterSubscriptionEstablished meant that we had a subscription drop and + // then re-created a subscription. + MTRInternalDeviceStateLaterSubscriptionEstablished = 4, }; // Utility methods for working with MTRInternalDeviceState, located near the @@ -148,13 +156,18 @@ typedef NS_ENUM(NSUInteger, MTRInternalDeviceState) { namespace { bool HadSubscriptionEstablishedOnce(MTRInternalDeviceState state) { - return state >= MTRInternalDeviceStateInitalSubscriptionEstablished; + return state >= MTRInternalDeviceStateInitialSubscriptionEstablished; } bool NeedToStartSubscriptionSetup(MTRInternalDeviceState state) { return state <= MTRInternalDeviceStateUnsubscribed; } + +bool HaveSubscriptionEstablishedRightNow(MTRInternalDeviceState state) +{ + return state == MTRInternalDeviceStateInitialSubscriptionEstablished || state == MTRInternalDeviceStateLaterSubscriptionEstablished; +} } // anonymous namespace typedef NS_ENUM(NSUInteger, MTRDeviceExpectedValueFieldIndex) { @@ -878,6 +891,16 @@ - (void)_changeState:(MTRDeviceState)state } } +- (void)_changeInternalState:(MTRInternalDeviceState)state +{ + os_unfair_lock_assert_owner(&self->_lock); + MTRInternalDeviceState lastState = _internalDeviceState; + _internalDeviceState = state; + if (lastState != state) { + MTR_LOG_DEFAULT("%@ internal state change %lu => %lu", self, static_cast(lastState), static_cast(state)); + } +} + // First Time Sync happens 2 minutes after reachability (this can be changed in the future) #define MTR_DEVICE_TIME_UPDATE_INITIAL_WAIT_TIME_SEC (60 * 2) - (void)_handleSubscriptionEstablished @@ -886,7 +909,11 @@ - (void)_handleSubscriptionEstablished // reset subscription attempt wait time when subscription succeeds _lastSubscriptionAttemptWait = 0; - _internalDeviceState = MTRInternalDeviceStateInitalSubscriptionEstablished; + if (HadSubscriptionEstablishedOnce(_internalDeviceState)) { + [self _changeInternalState:MTRInternalDeviceStateLaterSubscriptionEstablished]; + } else { + [self _changeInternalState:MTRInternalDeviceStateInitialSubscriptionEstablished]; + } // As subscription is established, check if the delegate needs to be informed if (!_delegateDeviceCachePrimedCalled) { @@ -913,7 +940,7 @@ - (void)_handleSubscriptionError:(NSError *)error { std::lock_guard lock(_lock); - _internalDeviceState = MTRInternalDeviceStateUnsubscribed; + [self _changeInternalState:MTRInternalDeviceStateUnsubscribed]; _unreportedEvents = nil; [self _changeState:MTRDeviceStateUnreachable]; @@ -924,6 +951,7 @@ - (void)_handleResubscriptionNeeded std::lock_guard lock(_lock); [self _changeState:MTRDeviceStateUnknown]; + [self _changeInternalState:MTRInternalDeviceStateResubscribing]; // If we are here, then the ReadClient either just detected a subscription // drop or just tried again and failed. Either way, count it as "tried and @@ -1044,11 +1072,12 @@ - (void)_handleReportBegin _receivingReport = YES; if (_state != MTRDeviceStateReachable) { - _receivingPrimingReport = YES; [self _changeState:MTRDeviceStateReachable]; - } else { - _receivingPrimingReport = NO; } + + // If we currently don't have an established subscription, this must be a + // priming report. + _receivingPrimingReport = !HaveSubscriptionEstablishedRightNow(_internalDeviceState); } - (NSDictionary *)_clusterDataToPersistSnapshot @@ -1134,12 +1163,17 @@ - (void)_reportAttributes:(NSArray *> *)attributes } } -- (void)_handleAttributeReport:(NSArray *> *)attributeReport +- (void)_handleAttributeReport:(NSArray *> *)attributeReport fromSubscription:(BOOL)isFromSubscription { std::lock_guard lock(_lock); // _getAttributesToReportWithReportedValues will log attribute paths reported - [self _reportAttributes:[self _getAttributesToReportWithReportedValues:attributeReport]]; + [self _reportAttributes:[self _getAttributesToReportWithReportedValues:attributeReport fromSubscription:isFromSubscription]]; +} + +- (void)_handleAttributeReport:(NSArray *> *)attributeReport +{ + [self _handleAttributeReport:attributeReport fromSubscription:NO]; } #ifdef DEBUG @@ -1349,11 +1383,11 @@ - (MTRDeviceDataValueDictionary _Nullable)_cachedAttributeValueForPath:(MTRAttri return clusterData.attributes[path.attribute]; } -- (void)_setCachedAttributeValue:(MTRDeviceDataValueDictionary _Nullable)value forPath:(MTRAttributePath *)path +- (void)_setCachedAttributeValue:(MTRDeviceDataValueDictionary _Nullable)value forPath:(MTRAttributePath *)path fromSubscription:(BOOL)isFromSubscription { os_unfair_lock_assert_owner(&self->_lock); - // We need an actual MTRClusterPath, not a subsclass, to do _clusterDataForPath. + // We need an actual MTRClusterPath, not a subclass, to do _clusterDataForPath. auto * clusterPath = [MTRClusterPath clusterPathWithEndpointID:path.endpoint clusterID:path.cluster]; MTRDeviceClusterData * clusterData = [self _clusterDataForPath:clusterPath]; @@ -1368,6 +1402,16 @@ - (void)_setCachedAttributeValue:(MTRDeviceDataValueDictionary _Nullable)value f [clusterData storeValue:value forAttribute:path.attribute]; + if (value != nil + && isFromSubscription + && !_receivingPrimingReport + && AttributeHasChangesOmittedQuality(path)) { + // Do not persist new values for Changes Omitted Quality attributes unless + // they're part of a Priming Report or from a read response. + // (removals are OK) + return; + } + if (_clusterDataToPersist == nil) { _clusterDataToPersist = [NSMutableDictionary dictionary]; } @@ -1461,7 +1505,7 @@ - (void)_setupSubscription return; } - _internalDeviceState = MTRInternalDeviceStateSubscribing; + [self _changeInternalState:MTRInternalDeviceStateSubscribing]; // Set up a timer to mark as not reachable if it takes too long to set up a subscription MTRWeakReference * weakSelf = [MTRWeakReference weakReferenceWithObject:self]; @@ -1492,7 +1536,7 @@ - (void)_setupSubscription MTR_LOG_INFO("%@ got attribute report %@", self, value); dispatch_async(self.queue, ^{ // OnAttributeData - [self _handleAttributeReport:value]; + [self _handleAttributeReport:value fromSubscription:YES]; #ifdef DEBUG self->_unitTestAttributesReportedSinceLastCheck += value.count; #endif @@ -2494,7 +2538,7 @@ - (BOOL)_attributeAffectsDeviceConfiguration:(MTRAttributePath *)attributePath } // assume lock is held -- (NSArray *)_getAttributesToReportWithReportedValues:(NSArray *> *)reportedAttributeValues +- (NSArray *)_getAttributesToReportWithReportedValues:(NSArray *> *)reportedAttributeValues fromSubscription:(BOOL)isFromSubscription { os_unfair_lock_assert_owner(&self->_lock); @@ -2528,14 +2572,12 @@ - (NSArray *)_getAttributesToReportWithReportedValues:(NSArray * downloads; +@interface MTRDownloads : NSObject +@property (nonatomic, strong) NSMutableArray * downloads; -- (Download * _Nullable)get:(NSString *)fileDesignator - fabricIndex:(NSNumber *)fabricIndex - nodeID:(NSNumber *)nodeID; +- (MTRDownload * _Nullable)get:(NSString *)fileDesignator + fabricIndex:(NSNumber *)fabricIndex + nodeID:(NSNumber *)nodeID; -- (Download * _Nullable)add:(MTRDiagnosticLogType)type - fabricIndex:(NSNumber *)fabricIndex - nodeID:(NSNumber *)nodeID - queue:(dispatch_queue_t)queue - completion:(void (^)(NSURL * _Nullable url, NSError * _Nullable error))completion - done:(void (^)(Download * finishedDownload))done; +- (MTRDownload * _Nullable)add:(MTRDiagnosticLogType)type + fabricIndex:(NSNumber *)fabricIndex + nodeID:(NSNumber *)nodeID + queue:(dispatch_queue_t)queue + completion:(void (^)(NSURL * _Nullable url, NSError * _Nullable error))completion + done:(void (^)(MTRDownload * finishedDownload))done; @end @interface MTRDiagnosticLogsDownloader () @property (readonly) DiagnosticLogsDownloaderBridge * bridge; -@property (nonatomic, strong) Downloads * downloads; +@property (nonatomic, strong) MTRDownloads * downloads; /** * Notify the delegate when a BDX Session starts for some logs. @@ -134,21 +134,21 @@ - (void)handleBDXTransferSessionEndForFileDesignator:(NSString *)fileDesignator CHIP_ERROR OnTransferEnd(chip::bdx::BDXTransferProxy * transfer, CHIP_ERROR error) override; CHIP_ERROR OnTransferData(chip::bdx::BDXTransferProxy * transfer, const chip::ByteSpan & data) override; - CHIP_ERROR StartBDXTransferTimeout(Download * download, uint16_t timeoutInSeconds); - void CancelBDXTransferTimeout(Download * download); + CHIP_ERROR StartBDXTransferTimeout(MTRDownload * download, uint16_t timeoutInSeconds); + void CancelBDXTransferTimeout(MTRDownload * download); private: static void OnTransferTimeout(chip::System::Layer * layer, void * context); MTRDiagnosticLogsDownloader * __weak mDelegate; }; -@implementation Download +@implementation MTRDownload - (instancetype)initWithType:(MTRDiagnosticLogType)type fabricIndex:(NSNumber *)fabricIndex nodeID:(NSNumber *)nodeID queue:(dispatch_queue_t)queue completion:(void (^)(NSURL * _Nullable url, NSError * _Nullable error))completion - done:(void (^)(Download * finishedDownload))done; + done:(void (^)(MTRDownload * finishedDownload))done; { self = [super init]; if (self) { @@ -158,7 +158,7 @@ - (instancetype)initWithType:(MTRDiagnosticLogType)type __weak typeof(self) weakSelf = self; auto bdxTransferDone = ^(NSError * bdxError) { dispatch_async(queue, ^{ - Download * strongSelf = weakSelf; + MTRDownload * strongSelf = weakSelf; if (strongSelf) { // If a fileHandle exists, it means that the BDX session has been initiated and a file has // been created to host the data of the session. So even if there is an error there may be some @@ -303,7 +303,7 @@ - (NSString *)_toTypeString:(MTRDiagnosticLogType)type @end -@implementation Downloads +@implementation MTRDownloads - (instancetype)init { if (self = [super init]) { @@ -315,15 +315,15 @@ - (instancetype)init - (void)dealloc { auto error = [MTRError errorForCHIPErrorCode:CHIP_ERROR_INTERNAL]; - for (Download * download in _downloads) { + for (MTRDownload * download in _downloads) { [download failure:error]; } _downloads = nil; } -- (Download * _Nullable)get:(NSString *)fileDesignator fabricIndex:(NSNumber *)fabricIndex nodeID:(NSNumber *)nodeID +- (MTRDownload * _Nullable)get:(NSString *)fileDesignator fabricIndex:(NSNumber *)fabricIndex nodeID:(NSNumber *)nodeID { - for (Download * download in _downloads) { + for (MTRDownload * download in _downloads) { if ([download matches:fileDesignator fabricIndex:fabricIndex nodeID:nodeID]) { return download; } @@ -332,23 +332,23 @@ - (Download * _Nullable)get:(NSString *)fileDesignator fabricIndex:(NSNumber *)f return nil; } -- (Download * _Nullable)add:(MTRDiagnosticLogType)type - fabricIndex:(NSNumber *)fabricIndex - nodeID:(NSNumber *)nodeID - queue:(dispatch_queue_t)queue - completion:(void (^)(NSURL * _Nullable url, NSError * _Nullable error))completion - done:(void (^)(Download * finishedDownload))done +- (MTRDownload * _Nullable)add:(MTRDiagnosticLogType)type + fabricIndex:(NSNumber *)fabricIndex + nodeID:(NSNumber *)nodeID + queue:(dispatch_queue_t)queue + completion:(void (^)(NSURL * _Nullable url, NSError * _Nullable error))completion + done:(void (^)(MTRDownload * finishedDownload))done { assertChipStackLockedByCurrentThread(); - auto download = [[Download alloc] initWithType:type fabricIndex:fabricIndex nodeID:nodeID queue:queue completion:completion done:done]; + auto download = [[MTRDownload alloc] initWithType:type fabricIndex:fabricIndex nodeID:nodeID queue:queue completion:completion done:done]; VerifyOrReturnValue(nil != download, nil); [_downloads addObject:download]; return download; } -- (void)remove:(Download *)download +- (void)remove:(MTRDownload *)download { assertChipStackLockedByCurrentThread(); @@ -362,7 +362,7 @@ - (instancetype)init assertChipStackLockedByCurrentThread(); if (self = [super init]) { - _downloads = [[Downloads alloc] init]; + _downloads = [[MTRDownloads alloc] init]; _bridge = new DiagnosticLogsDownloaderBridge(self); if (_bridge == nullptr) { MTR_LOG_ERROR("Error: %@", kErrorInitDiagnosticLogsDownloader); @@ -406,7 +406,7 @@ - (void)downloadLogFromNodeWithID:(NSNumber *)nodeID } // This block is always called when a download is finished. - auto done = ^(Download * finishedDownload) { + auto done = ^(MTRDownload * finishedDownload) { [controller asyncDispatchToMatterQueue:^() { [self->_downloads remove:finishedDownload]; @@ -593,13 +593,13 @@ - (void)handleBDXTransferSessionEndForFileDesignator:(NSString *)fileDesignator return CHIP_NO_ERROR; } -CHIP_ERROR DiagnosticLogsDownloaderBridge::StartBDXTransferTimeout(Download * download, uint16_t timeoutInSeconds) +CHIP_ERROR DiagnosticLogsDownloaderBridge::StartBDXTransferTimeout(MTRDownload * download, uint16_t timeoutInSeconds) { assertChipStackLockedByCurrentThread(); return chip::DeviceLayer::SystemLayer().StartTimer(chip::System::Clock::Seconds16(timeoutInSeconds), OnTransferTimeout, (__bridge void *) download); } -void DiagnosticLogsDownloaderBridge::CancelBDXTransferTimeout(Download * download) +void DiagnosticLogsDownloaderBridge::CancelBDXTransferTimeout(MTRDownload * download) { assertChipStackLockedByCurrentThread(); chip::DeviceLayer::SystemLayer().CancelTimer(OnTransferTimeout, (__bridge void *) download); @@ -609,7 +609,7 @@ - (void)handleBDXTransferSessionEndForFileDesignator:(NSString *)fileDesignator { assertChipStackLockedByCurrentThread(); - auto * download = (__bridge Download *) context; + auto * download = (__bridge MTRDownload *) context; VerifyOrReturn(nil != download); // If there is no abortHandler, it means that the BDX transfer has not started. diff --git a/src/darwin/Framework/CHIP/MTRDiagnosticLogsType.h b/src/darwin/Framework/CHIP/MTRDiagnosticLogsType.h index 6beb9671ab4210..5c90cb95d299fa 100644 --- a/src/darwin/Framework/CHIP/MTRDiagnosticLogsType.h +++ b/src/darwin/Framework/CHIP/MTRDiagnosticLogsType.h @@ -15,6 +15,8 @@ * limitations under the License. */ +#import + /** * This enum is used to specify the type of log requested from this device. * diff --git a/src/darwin/Framework/CHIP/MTRMetricsCollector.mm b/src/darwin/Framework/CHIP/MTRMetricsCollector.mm index 3bde24fa52a527..76176c58df5c94 100644 --- a/src/darwin/Framework/CHIP/MTRMetricsCollector.mm +++ b/src/darwin/Framework/CHIP/MTRMetricsCollector.mm @@ -25,6 +25,11 @@ #include #include +/* + * Set this to MTR_LOG_DEBUG(__VA_ARGS__) to enable logging noisy debug logging for metrics events processing + */ +#define MTR_METRICS_LOG_DEBUG(...) + using MetricEvent = chip::Tracing::MetricEvent; @implementation MTRMetricData { @@ -74,7 +79,8 @@ - (instancetype)initWithMetricEvent:(const MetricEvent &)event case ValueType::kUndefined: break; } - MTR_LOG_DEBUG("Initializing metric event data %s, type: %d, with time point %llu", event.key(), _type, _timePoint.count()); + + MTR_METRICS_LOG_DEBUG("Initializing metric event data %s, type: %d, with time point %llu", event.key(), _type, _timePoint.count()); return self; } @@ -83,7 +89,7 @@ - (void)setDurationFromMetricData:(MTRMetricData *)fromData auto duration = _timePoint - fromData->_timePoint; _duration = [NSNumber numberWithDouble:double(duration.count()) / USEC_PER_SEC]; - MTR_LOG_DEBUG("Calculating duration for Matter metric with type %d, from type %d, (%llu - %llu) = %llu us (%llu s)", + MTR_METRICS_LOG_DEBUG("Calculating duration for Matter metric with type %d, from type %d, (%llu - %llu) = %llu us (%llu s)", _type, fromData->_type, _timePoint.count(), fromData->_timePoint.count(), duration.count(), [_duration unsignedLongLongValue]); } @@ -201,19 +207,19 @@ - (void)handleMetricEvent:(MetricEvent)event using ValueType = MetricEvent::Value::Type; switch (event.ValueType()) { case ValueType::kInt32: - MTR_LOG_DEBUG("Received metric event, key: %s, type: %d, value: %d", event.key(), static_cast(event.type()), event.ValueInt32()); + MTR_METRICS_LOG_DEBUG("Received metric event, key: %s, type: %d, value: %d", event.key(), static_cast(event.type()), event.ValueInt32()); break; case ValueType::kUInt32: - MTR_LOG_DEBUG("Received metric event, key: %s, type: %d, value: %u", event.key(), static_cast(event.type()), event.ValueUInt32()); + MTR_METRICS_LOG_DEBUG("Received metric event, key: %s, type: %d, value: %u", event.key(), static_cast(event.type()), event.ValueUInt32()); break; case ValueType::kChipErrorCode: - MTR_LOG_DEBUG("Received metric event, key: %s, type: %d, error value: %u", event.key(), static_cast(event.type()), event.ValueErrorCode()); + MTR_METRICS_LOG_DEBUG("Received metric event, key: %s, type: %d, error value: %u", event.key(), static_cast(event.type()), event.ValueErrorCode()); break; case ValueType::kUndefined: - MTR_LOG_DEBUG("Received metric event, key: %s, type: %d, value: nil", event.key(), static_cast(event.type())); + MTR_METRICS_LOG_DEBUG("Received metric event, key: %s, type: %d, value: nil", event.key(), static_cast(event.type())); break; default: - MTR_LOG_DEBUG("Received metric event, key: %s, type: %d, unknown value", event.key(), static_cast(event.type())); + MTR_METRICS_LOG_DEBUG("Received metric event, key: %s, type: %d, unknown value", event.key(), static_cast(event.type())); return; } diff --git a/src/darwin/Framework/CHIPTests/MTRDeviceTests.m b/src/darwin/Framework/CHIPTests/MTRDeviceTests.m index 0b198bcbbc8bdf..c05ee000b20e5f 100644 --- a/src/darwin/Framework/CHIPTests/MTRDeviceTests.m +++ b/src/darwin/Framework/CHIPTests/MTRDeviceTests.m @@ -218,6 +218,56 @@ - (void)setUp { [super setUp]; [self setContinueAfterFailure:NO]; + + // Ensure the test starts with clean slate in terms of stored data. + if (sController != nil) { + [sController.controllerDataStore clearAllStoredClusterData]; + NSDictionary * storedClusterDataAfterClear = [sController.controllerDataStore getStoredClusterDataForNodeID:@(kDeviceId)]; + XCTAssertEqual(storedClusterDataAfterClear.count, 0); + } +} + +- (void)tearDown +{ + // Make sure our MTRDevice instances, which are stateful, do not keep that + // state between different tests. + if (sController != nil) { + __auto_type * device = [MTRDevice deviceWithNodeID:@(kDeviceId) controller:sController]; + [sController removeDevice:device]; + } + + // Try to make sure we don't have any outstanding subscriptions from + // previous tests, by sending a subscribe request that will get rid of + // existing subscriptions and then fail out due to requesting a subscribe to + // a nonexistent cluster. + if (mConnectedDevice != nil) { + dispatch_queue_t queue = dispatch_get_main_queue(); + + MTRSubscribeParams * params = [[MTRSubscribeParams alloc] initWithMinInterval:@(0) maxInterval:@(10)]; + params.resubscribeAutomatically = NO; + params.replaceExistingSubscriptions = YES; + + XCTestExpectation * errorExpectation = [self expectationWithDescription:@"Canceled all subscriptions"]; + + // There should be no Basic Information cluster on random endpoints. + [mConnectedDevice subscribeToAttributesWithEndpointID:@10000 + clusterID:@(MTRClusterIDTypeBasicInformationID) + attributeID:@(0) + params:params + queue:queue + reportHandler:^(id _Nullable values, NSError * _Nullable error) { + XCTAssertNil(values); + XCTAssertNotNil(error); + [errorExpectation fulfill]; + } + subscriptionEstablished:^() { + XCTFail("Did not expect subscription to Basic Information on random endpoint to succeed"); + }]; + + [self waitForExpectations:@[ errorExpectation ] timeout:kTimeoutInSeconds]; + } + + [super tearDown]; } - (void)test001_ReadAttribute @@ -406,6 +456,7 @@ - (void)test005_Subscribe // Subscribe XCTestExpectation * expectation = [self expectationWithDescription:@"subscribe OnOff attribute"]; __auto_type * params = [[MTRSubscribeParams alloc] initWithMinInterval:@(1) maxInterval:@(10)]; + params.resubscribeAutomatically = NO; [device subscribeToAttributesWithEndpointID:@1 clusterID:@6 attributeID:@0 @@ -1278,8 +1329,7 @@ - (void)test015_FailedSubscribeWithQueueAcrossShutdown __auto_type clusterStateCacheContainer = [[MTRAttributeCacheContainer alloc] init]; __auto_type * params = [[MTRSubscribeParams alloc] init]; params.resubscribeAutomatically = NO; - params.replaceExistingSubscriptions = NO; // Not strictly needed, but checking that doing this does not - // affect this subscription erroring out correctly. + params.replaceExistingSubscriptions = NO; // Not strictly needed, but checking that doing this does not affect this subscription erroring out correctly. [device subscribeWithQueue:queue minInterval:1 maxInterval:2 @@ -1387,11 +1437,6 @@ - (void)test016_FailedSubscribeWithCacheReadDuringFailure - (void)test017_TestMTRDeviceBasics { - // Ensure the test starts with clean slate, even with MTRDeviceControllerLocalTestStorage enabled - [sController.controllerDataStore clearAllStoredClusterData]; - NSDictionary * storedClusterDataAfterClear = [sController.controllerDataStore getStoredClusterDataForNodeID:@(kDeviceId)]; - XCTAssertEqual(storedClusterDataAfterClear.count, 0); - __auto_type * device = [MTRDevice deviceWithNodeID:kDeviceId deviceController:sController]; dispatch_queue_t queue = dispatch_get_main_queue(); @@ -2149,6 +2194,7 @@ - (void)test023_SubscribeMultipleAttributes // Subscribe XCTestExpectation * expectation = [self expectationWithDescription:@"subscribe OnOff attribute"]; __auto_type * params = [[MTRSubscribeParams alloc] initWithMinInterval:@(1) maxInterval:@(10)]; + params.resubscribeAutomatically = NO; NSNumber * failClusterId = @5678; NSNumber * failEndpointId = @1000; @@ -2406,6 +2452,7 @@ - (void)test025_SubscribeMultipleEvents // Subscribe XCTestExpectation * expectation = [self expectationWithDescription:@"subscribe multiple events"]; __auto_type * params = [[MTRSubscribeParams alloc] initWithMinInterval:@(1) maxInterval:@(10)]; + params.resubscribeAutomatically = NO; NSArray * eventPaths = @[ // Startup event. @@ -2415,7 +2462,7 @@ - (void)test025_SubscribeMultipleEvents ]; XCTestExpectation * startupEventExpectation = [self expectationWithDescription:@"report startup event"]; - __auto_type reportHandler = ^(id _Nullable values, NSError * _Nullable error) { + __block __auto_type reportHandler = ^(id _Nullable values, NSError * _Nullable error) { XCTAssertNil(error); XCTAssertTrue([values isKindOfClass:[NSArray class]]); @@ -2455,18 +2502,26 @@ - (void)test025_SubscribeMultipleEvents }; [device subscribeToAttributePaths:nil - eventPaths:eventPaths - params:params - queue:queue - reportHandler:reportHandler - subscriptionEstablished:^{ - NSLog(@"subscribe complete"); - [expectation fulfill]; - } - resubscriptionScheduled:nil]; + eventPaths:eventPaths + params:params + queue:queue + reportHandler:^(id _Nullable values, NSError * _Nullable error) { + if (reportHandler != nil) { + reportHandler(values, error); + } + } + subscriptionEstablished:^{ + NSLog(@"subscribe complete"); + [expectation fulfill]; + } + resubscriptionScheduled:nil]; // Wait till establishment [self waitForExpectations:@[ startupEventExpectation, expectation ] timeout:kTimeoutInSeconds]; + + // Null out reportHandler, so we don't notify it when the + // subscription tears down. + reportHandler = nil; } - (void)test026_LocationAttribute @@ -2634,11 +2689,6 @@ - (void)test028_TimeZoneAndDST - (void)test029_MTRDeviceWriteCoalescing { - // Ensure the test starts with clean slate, even with MTRDeviceControllerLocalTestStorage enabled - [sController.controllerDataStore clearAllStoredClusterData]; - NSDictionary * storedClusterDataAfterClear = [sController.controllerDataStore getStoredClusterDataForNodeID:@(kDeviceId)]; - XCTAssertEqual(storedClusterDataAfterClear.count, 0); - __auto_type * device = [MTRDevice deviceWithNodeID:kDeviceId deviceController:sController]; dispatch_queue_t queue = dispatch_get_main_queue(); @@ -2971,15 +3021,8 @@ - (void)test031_MTRDeviceAttributeCacheLocalTestStorage { dispatch_queue_t queue = dispatch_get_main_queue(); - // First start with clean slate by removing the MTRDevice and clearing the persisted cache + // Get the subscription primed __auto_type * device = [MTRDevice deviceWithNodeID:@(kDeviceId) controller:sController]; - [sController removeDevice:device]; - [sController.controllerDataStore clearAllStoredClusterData]; - NSDictionary * storedClusterDataAfterClear = [sController.controllerDataStore getStoredClusterDataForNodeID:@(kDeviceId)]; - XCTAssertEqual(storedClusterDataAfterClear.count, 0); - - // Now recreate device and get subscription primed - device = [MTRDevice deviceWithNodeID:@(kDeviceId) controller:sController]; XCTestExpectation * gotReportsExpectation = [self expectationWithDescription:@"Attribute and Event reports have been received"]; XCTestExpectation * gotDeviceCachePrimed = [self expectationWithDescription:@"Device cache primed for the first time"]; __auto_type * delegate = [[MTRDeviceTestDelegate alloc] init]; @@ -3038,12 +3081,6 @@ - (void)test031_MTRDeviceAttributeCacheLocalTestStorage } NSUInteger storedAttributeCountDifferenceFromMTRDeviceReport = dataStoreAttributeCountAfterSecondSubscription - attributesReportedWithSecondSubscription; XCTAssertTrue(storedAttributeCountDifferenceFromMTRDeviceReport > 300); - - // We need to remove the device here since the MTRDevice retains its reachable state. So if the next test needs to start with a clean state, - // it can't do that since the MTRDevice becomes reachable in the previous test. Since there are no changes detected in reachability, - // the onReachable callback to the delegate is not called. - // TODO: #33205 Ensure we have a clean slate w.r.t MTRDevice before running each test. - [sController removeDevice:device]; } - (void)test032_MTRPathClassesEncoding @@ -3175,11 +3212,6 @@ + (void)checkAttributeReportTriggersConfigurationChanged:(MTRAttributeIDType)att - (void)test033_TestMTRDeviceDeviceConfigurationChanged { - // Ensure the test starts with clean slate. - [sController.controllerDataStore clearAllStoredClusterData]; - NSDictionary * storedClusterDataAfterClear = [sController.controllerDataStore getStoredClusterDataForNodeID:@(kDeviceId)]; - XCTAssertEqual(storedClusterDataAfterClear.count, 0); - __auto_type * device = [MTRDevice deviceWithNodeID:kDeviceId deviceController:sController]; dispatch_queue_t queue = dispatch_get_main_queue(); @@ -3274,7 +3306,7 @@ - (void)test033_TestMTRDeviceDeviceConfigurationChanged [device setDelegate:delegate queue:queue]; - // Wait for subscription set up and intitial reports received. + // Wait for subscription set up and initial reports received. [self waitForExpectations:@[ subscriptionExpectation, gotInitialReportsExpectation, @@ -3500,11 +3532,90 @@ - (void)test033_TestMTRDeviceDeviceConfigurationChanged [device unitTestInjectAttributeReport:attributeReport]; [self waitForExpectations:@[ gotAttributeReportWithMultipleAttributesExpectation, gotAttributeReportWithMultipleAttributesEndExpectation, deviceConfigurationChangedExpectationForAttributeReportWithMultipleAttributes ] timeout:kTimeoutInSeconds]; +} + +- (void)test034_TestMTRDeviceHistoricalEvents +{ + dispatch_queue_t queue = dispatch_get_main_queue(); + + NSDictionary * storedClusterDataAfterClear = [sController.controllerDataStore getStoredClusterDataForNodeID:@(kDeviceId)]; + XCTAssertEqual(storedClusterDataAfterClear.count, 0); + + // Set up a subscription via mConnectedDevice that will send us continuous + // reports. + XCTestExpectation * firstSubscriptionExpectation = [self expectationWithDescription:@"First subscription established"]; + + MTRSubscribeParams * params = [[MTRSubscribeParams alloc] initWithMinInterval:@(0) maxInterval:@(0)]; + params.resubscribeAutomatically = NO; + + [mConnectedDevice subscribeToAttributesWithEndpointID:@(0) + clusterID:@(MTRClusterIDTypeBasicInformationID) + attributeID:@(0) + params:params + queue:queue + reportHandler:^(id _Nullable values, NSError * _Nullable error) { + } + subscriptionEstablished:^() { + [firstSubscriptionExpectation fulfill]; + }]; + + [self waitForExpectations:@[ firstSubscriptionExpectation ] timeout:kTimeoutInSeconds]; + + // Now set up our MTRDevice and do a subscribe. Make sure all the events we + // get are marked "historical". + __auto_type * device = [MTRDevice deviceWithNodeID:kDeviceId deviceController:sController]; + XCTestExpectation * secondSubscriptionExpectation = [self expectationWithDescription:@"Second subscription established"]; + XCTestExpectation * gotFirstReportsExpectation = [self expectationWithDescription:@"First Attribute and Event reports have been received"]; - // We need to remove the device here, because we injected data into its attribute cache - // that does not match the actual server. - // TODO: #33205 Ensure we have a clean slate w.r.t MTRDevice before running each test. + __auto_type * delegate = [[MTRDeviceTestDelegate alloc] init]; + delegate.onReachable = ^() { + [secondSubscriptionExpectation fulfill]; + }; + + __block unsigned eventReportsReceived = 0; + delegate.onEventDataReceived = ^(NSArray *> * eventReport) { + eventReportsReceived += eventReport.count; + for (NSDictionary * eventDict in eventReport) { + NSNumber * reportIsHistorical = eventDict[MTREventIsHistoricalKey]; + XCTAssertTrue(reportIsHistorical.boolValue); + } + }; + + delegate.onReportEnd = ^() { + [gotFirstReportsExpectation fulfill]; + }; + + [device setDelegate:delegate queue:queue]; + + [self waitForExpectations:@[ secondSubscriptionExpectation, gotFirstReportsExpectation ] timeout:60]; + + // Must have gotten some events (at least StartUp!) + XCTAssertTrue(eventReportsReceived > 0); + + // Remove the device, then try again, now with us having stored cluster + // data. All the events should still be reported as historical. [sController removeDevice:device]; + + eventReportsReceived = 0; + + device = [MTRDevice deviceWithNodeID:kDeviceId deviceController:sController]; + XCTestExpectation * thirdSubscriptionExpectation = [self expectationWithDescription:@"Third subscription established"]; + XCTestExpectation * gotSecondReportsExpectation = [self expectationWithDescription:@"Second Attribute and Event reports have been received"]; + + delegate.onReachable = ^() { + [thirdSubscriptionExpectation fulfill]; + }; + + delegate.onReportEnd = ^() { + [gotSecondReportsExpectation fulfill]; + }; + + [device setDelegate:delegate queue:queue]; + + [self waitForExpectations:@[ thirdSubscriptionExpectation, gotSecondReportsExpectation ] timeout:60]; + + // Must have gotten some events (at least StartUp!) + XCTAssertTrue(eventReportsReceived > 0); } @end diff --git a/src/darwin/Framework/CHIPTests/MTROTAProviderTests.m b/src/darwin/Framework/CHIPTests/MTROTAProviderTests.m index 2874e6cfff509e..39f6a499312088 100644 --- a/src/darwin/Framework/CHIPTests/MTROTAProviderTests.m +++ b/src/darwin/Framework/CHIPTests/MTROTAProviderTests.m @@ -722,11 +722,11 @@ + (void)shutdownStack */ - (NSString *)absolutePathFor:(NSString *)matterRootRelativePath { - // Find the right absolute path to our file. PWD should - // point to our src/darwin/Framework. - NSString * pwd = [[NSProcessInfo processInfo] environment][@"PWD"]; + // Start with the absolute path to our file, then remove the suffix that + // comes after the path to the Matter SDK root. + NSString * pathToTest = [NSString stringWithUTF8String:__FILE__]; NSMutableArray * pathComponents = [[NSMutableArray alloc] init]; - [pathComponents addObject:[pwd substringToIndex:(pwd.length - @"src/darwin/Framework".length)]]; + [pathComponents addObject:[pathToTest substringToIndex:(pathToTest.length - @"src/darwin/Framework/CHIPTests/MTROTAProviderTests.m".length)]]; [pathComponents addObjectsFromArray:[matterRootRelativePath pathComponents]]; return [NSString pathWithComponents:pathComponents]; } diff --git a/src/darwin/Framework/Matter.xcodeproj/project.pbxproj b/src/darwin/Framework/Matter.xcodeproj/project.pbxproj index 4cb4edf4a8edd3..36aa65dfaa2752 100644 --- a/src/darwin/Framework/Matter.xcodeproj/project.pbxproj +++ b/src/darwin/Framework/Matter.xcodeproj/project.pbxproj @@ -364,6 +364,10 @@ B4FCD5732B611EB300832859 /* MTRDiagnosticLogsDownloader.h in Headers */ = {isa = PBXBuildFile; fileRef = B4C8E6B32B3453AD00FCD54D /* MTRDiagnosticLogsDownloader.h */; }; BA09EB43247477BA00605257 /* libCHIP.a in Frameworks */ = {isa = PBXBuildFile; fileRef = BA09EB3F2474762900605257 /* libCHIP.a */; }; D4772A46285AE98400383630 /* MTRClusterConstants.h in Headers */ = {isa = PBXBuildFile; fileRef = D4772A45285AE98300383630 /* MTRClusterConstants.h */; settings = {ATTRIBUTES = (Public, ); }; }; + E04AC67D2BEEA17F00BA409B /* ember-io-storage.cpp in Sources */ = {isa = PBXBuildFile; fileRef = E04AC67B2BEEA17F00BA409B /* ember-io-storage.cpp */; }; + E04AC67E2BEEA17F00BA409B /* ember-io-storage.cpp in Sources */ = {isa = PBXBuildFile; fileRef = E04AC67B2BEEA17F00BA409B /* ember-io-storage.cpp */; }; + E04AC67F2BEEA17F00BA409B /* ember-global-attribute-access-interface.cpp in Sources */ = {isa = PBXBuildFile; fileRef = E04AC67C2BEEA17F00BA409B /* ember-global-attribute-access-interface.cpp */; }; + E04AC6802BEEA17F00BA409B /* ember-global-attribute-access-interface.cpp in Sources */ = {isa = PBXBuildFile; fileRef = E04AC67C2BEEA17F00BA409B /* ember-global-attribute-access-interface.cpp */; }; /* End PBXBuildFile section */ /* Begin PBXContainerItemProxy section */ @@ -788,6 +792,8 @@ D437613F285BDC0D0051FEA2 /* MTRTestKeys.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = MTRTestKeys.h; sourceTree = ""; }; D4376140285BDC0D0051FEA2 /* MTRTestStorage.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = MTRTestStorage.h; sourceTree = ""; }; D4772A45285AE98300383630 /* MTRClusterConstants.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = MTRClusterConstants.h; sourceTree = ""; }; + E04AC67B2BEEA17F00BA409B /* ember-io-storage.cpp */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.cpp.cpp; name = "ember-io-storage.cpp"; path = "util/ember-io-storage.cpp"; sourceTree = ""; }; + E04AC67C2BEEA17F00BA409B /* ember-global-attribute-access-interface.cpp */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.cpp.cpp; name = "ember-global-attribute-access-interface.cpp"; path = "util/ember-global-attribute-access-interface.cpp"; sourceTree = ""; }; /* End PBXFileReference section */ /* Begin PBXFrameworksBuildPhase section */ @@ -1033,6 +1039,8 @@ 514C79F22B62ED5500DD6D7B /* attribute-storage.cpp */, 514C79EF2B62ADDA00DD6D7B /* descriptor.cpp */, 514C79EC2B62ADCD00DD6D7B /* ember-compatibility-functions.cpp */, + E04AC67C2BEEA17F00BA409B /* ember-global-attribute-access-interface.cpp */, + E04AC67B2BEEA17F00BA409B /* ember-io-storage.cpp */, 516415FE2B6B132200D5CE11 /* DataModelHandler.cpp */, 514C79F52B62F0B900DD6D7B /* util.cpp */, 514C79FB2B62F94C00DD6D7B /* ota-provider.cpp */, @@ -1845,6 +1853,7 @@ B45373FE2A9FEC4F00807602 /* unix-fds.c in Sources */, B45374002A9FEC4F00807602 /* unix-init.c in Sources */, B45373FF2A9FEC4F00807602 /* unix-misc.c in Sources */, + E04AC67E2BEEA17F00BA409B /* ember-io-storage.cpp in Sources */, B45373FD2A9FEC4F00807602 /* unix-pipe.c in Sources */, B45373FB2A9FEC4F00807602 /* unix-service.c in Sources */, B45374012A9FEC4F00807602 /* unix-sockets.c in Sources */, @@ -1891,6 +1900,7 @@ 037C3DB62991BD5000B7EEE2 /* ModelCommandBridge.mm in Sources */, 516411322B6BF75700E67C05 /* MTRIMDispatch.mm in Sources */, 037C3DB42991BD5000B7EEE2 /* DeviceControllerDelegateBridge.mm in Sources */, + E04AC6802BEEA17F00BA409B /* ember-global-attribute-access-interface.cpp in Sources */, 039547012992D461006D42A8 /* generic-callback-stubs.cpp in Sources */, 514C79F12B62ADDA00DD6D7B /* descriptor.cpp in Sources */, ); @@ -1926,6 +1936,7 @@ 7534F12828BFF20300390851 /* MTRDeviceAttestationDelegate.mm in Sources */, B4C8E6B72B3453AD00FCD54D /* MTRDiagnosticLogsDownloader.mm in Sources */, 2C5EEEF7268A85C400CAE3D3 /* MTRDeviceConnectionBridge.mm in Sources */, + E04AC67D2BEEA17F00BA409B /* ember-io-storage.cpp in Sources */, 51B22C262740CB32008D5055 /* MTRStructsObjc.mm in Sources */, 2C222AD1255C620600E446B9 /* MTRBaseDevice.mm in Sources */, 1EC3238D271999E2002A8BF0 /* cluster-objects.cpp in Sources */, @@ -1967,6 +1978,7 @@ 5178E67E2AE098210069DF72 /* MTRCommandTimedCheck.mm in Sources */, 7596A84928762783004DAE0E /* MTRAsyncCallbackWorkQueue.mm in Sources */, B2E0D7B9245B0B5C003C5B48 /* MTRSetupPayload.mm in Sources */, + E04AC67F2BEEA17F00BA409B /* ember-global-attribute-access-interface.cpp in Sources */, B2E0D7B6245B0B5C003C5B48 /* MTRManualSetupPayloadParser.mm in Sources */, 7596A85528788557004DAE0E /* MTRClusters.mm in Sources */, 88EBF8CF27FABDD500686BC1 /* MTRDeviceAttestationDelegateBridge.mm in Sources */, diff --git a/src/inet/tests/TestInetCommonOptions.cpp b/src/inet/tests/TestInetCommonOptions.cpp index fdc79b11954a27..7e4648d7466b1b 100644 --- a/src/inet/tests/TestInetCommonOptions.cpp +++ b/src/inet/tests/TestInetCommonOptions.cpp @@ -51,7 +51,7 @@ NetworkOptions::NetworkOptions() static OptionDef optionDefs[] = { { "local-addr", kArgumentRequired, 'a' }, { "node-addr", kArgumentRequired, kToolCommonOpt_NodeAddr }, /* alias for local-addr */ -#if CHIP_SYSTEM_CONFIG_USE_LWIP +#if CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT { "tap-device", kArgumentRequired, kToolCommonOpt_TapDevice }, { "ipv4-gateway", kArgumentRequired, kToolCommonOpt_IPv4GatewayAddr }, { "ipv6-gateway", kArgumentRequired, kToolCommonOpt_IPv6GatewayAddr }, @@ -59,7 +59,7 @@ NetworkOptions::NetworkOptions() { "debug-lwip", kNoArgument, kToolCommonOpt_DebugLwIP }, { "event-delay", kArgumentRequired, kToolCommonOpt_EventDelay }, { "tap-system-config", kNoArgument, kToolCommonOpt_TapInterfaceConfig }, -#endif +#endif // CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT {} }; OptionDefs = optionDefs; @@ -69,7 +69,7 @@ NetworkOptions::NetworkOptions() OptionHelp = " -a, --local-addr, --node-addr \n" " Local address for the node.\n" "\n" -#if CHIP_SYSTEM_CONFIG_USE_LWIP +#if CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT " --tap-device \n" " TAP device name for LwIP hosted OS usage. Defaults to chip-dev-.\n" "\n" @@ -91,14 +91,14 @@ NetworkOptions::NetworkOptions() " --tap-system-config\n" " Use configuration on each of the Linux TAP interfaces to configure LwIP's interfaces.\n" "\n" -#endif // CHIP_SYSTEM_CONFIG_USE_LWIP +#endif // CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT ; // Defaults. LocalIPv4Addr.clear(); LocalIPv6Addr.clear(); -#if CHIP_SYSTEM_CONFIG_USE_LWIP +#if CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT TapDeviceName.clear(); LwIPDebugFlags = 0; EventDelay = 0; @@ -106,7 +106,7 @@ NetworkOptions::NetworkOptions() IPv6GatewayAddr.clear(); DNSServerAddr = Inet::IPAddress::Any; TapUseSystemConfig = false; -#endif // CHIP_SYSTEM_CONFIG_USE_LWIP +#endif // CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT } bool NetworkOptions::HandleOption(const char * progName, OptionSet * optSet, int id, const char * name, const char * arg) diff --git a/src/inet/tests/TestInetCommonOptions.h b/src/inet/tests/TestInetCommonOptions.h index 9b3cd2e59b4f3b..a67536dda1b266 100644 --- a/src/inet/tests/TestInetCommonOptions.h +++ b/src/inet/tests/TestInetCommonOptions.h @@ -59,7 +59,7 @@ class NetworkOptions : public chip::ArgParser::OptionSetBase std::vector LocalIPv4Addr; std::vector LocalIPv6Addr; -#if CHIP_SYSTEM_CONFIG_USE_LWIP +#if CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT std::vector IPv4GatewayAddr; std::vector IPv6GatewayAddr; chip::Inet::IPAddress DNSServerAddr; @@ -67,7 +67,7 @@ class NetworkOptions : public chip::ArgParser::OptionSetBase uint8_t LwIPDebugFlags; uint32_t EventDelay; bool TapUseSystemConfig; -#endif // CHIP_SYSTEM_CONFIG_USE_LWIP +#endif // CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT NetworkOptions(); diff --git a/src/inet/tests/TestInetCommonPosix.cpp b/src/inet/tests/TestInetCommonPosix.cpp index 9d5e4588979d1a..6fc53a15fbb980 100644 --- a/src/inet/tests/TestInetCommonPosix.cpp +++ b/src/inet/tests/TestInetCommonPosix.cpp @@ -337,7 +337,7 @@ void InitNetwork() #if INET_CONFIG_ENABLE_TCP_ENDPOINT gTCP.Init(gSystemLayer); #endif -#if INET_CONFIG_ENABLE_TCP_ENDPOINT +#if INET_CONFIG_ENABLE_UDP_ENDPOINT gUDP.Init(gSystemLayer); #endif } @@ -368,14 +368,14 @@ void ServiceEvents(uint32_t aSleepTimeMilliseconds) gSystemLayer.HandleEvents(); #endif -#if CHIP_SYSTEM_CONFIG_USE_LWIP +#if CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT if (gSystemLayer.IsInitialized()) { static uint32_t sRemainingSystemLayerEventDelay = 0; if (sRemainingSystemLayerEventDelay == 0) { -#if CHIP_DEVICE_LAYER_TARGET_OPEN_IOT_SDK +#if CHIP_DEVICE_LAYER_TARGET_OPEN_IOT_SDK || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT // We need to terminate event loop after performance single step. // Event loop processing work items until StopEventLoopTask is called. // Scheduling StopEventLoop task guarantees correct operation of the loop. @@ -390,7 +390,7 @@ void ServiceEvents(uint32_t aSleepTimeMilliseconds) gSystemLayer.HandlePlatformTimer(); } -#endif // CHIP_SYSTEM_CONFIG_USE_LWIP +#endif // CHIP_SYSTEM_CONFIG_USE_LWIP || CHIP_SYSTEM_CONFIG_USE_OPEN_THREAD_ENDPOINT } #if CHIP_SYSTEM_CONFIG_USE_LWIP && !(CHIP_SYSTEM_CONFIG_LWIP_SKIP_INIT) diff --git a/src/lib/core/CHIPError.h b/src/lib/core/CHIPError.h index 3a8ad9d5f24811..fe030670fea57d 100644 --- a/src/lib/core/CHIPError.h +++ b/src/lib/core/CHIPError.h @@ -35,9 +35,9 @@ #include #include -#if __cplusplus >= 202002L +#if CHIP_CONFIG_ERROR_SOURCE && __cplusplus >= 202002L #include -#endif // __cplusplus >= 202002L +#endif // CHIP_CONFIG_ERROR_SOURCE && __cplusplus >= 202002L namespace chip { @@ -239,10 +239,10 @@ class ChipError * @note * Normally, prefer to use Format() */ - const char * AsString() const + const char * AsString(bool withSourceLocation = true) const { - extern const char * ErrorStr(ChipError); - return ErrorStr(*this); + extern const char * ErrorStr(ChipError, bool); + return ErrorStr(*this, withSourceLocation); } /** diff --git a/src/lib/core/ErrorStr.cpp b/src/lib/core/ErrorStr.cpp index a32ff6bc433344..6d83bc015b21d2 100644 --- a/src/lib/core/ErrorStr.cpp +++ b/src/lib/core/ErrorStr.cpp @@ -41,19 +41,21 @@ static ErrorFormatter * sErrorFormatterList = nullptr; * describing the provided error. * * @param[in] err The error for format and describe. + * @param[in] withSourceLocation Whether or not to include the source + * location in the output string. Only used if CHIP_CONFIG_ERROR_SOURCE && + * !CHIP_CONFIG_SHORT_ERROR_STR. Defaults to true. * * @return A pointer to a NULL-terminated C string describing the * provided error. */ -DLL_EXPORT const char * ErrorStr(CHIP_ERROR err) +DLL_EXPORT const char * ErrorStr(CHIP_ERROR err, bool withSourceLocation) { char * formattedError = sErrorStr; uint16_t formattedSpace = sizeof(sErrorStr); #if CHIP_CONFIG_ERROR_SOURCE && !CHIP_CONFIG_SHORT_ERROR_STR - const char * const file = err.GetFile(); - if (file != nullptr) + if (const char * const file = err.GetFile(); withSourceLocation && file != nullptr) { int n = snprintf(formattedError, formattedSpace, "%s:%u: ", file, err.GetLine()); if (n > formattedSpace) diff --git a/src/lib/core/ErrorStr.h b/src/lib/core/ErrorStr.h index de3a0ad0afe93a..d67680c2151b1e 100644 --- a/src/lib/core/ErrorStr.h +++ b/src/lib/core/ErrorStr.h @@ -48,7 +48,7 @@ struct ErrorFormatter ErrorFormatter * Next; }; -extern const char * ErrorStr(CHIP_ERROR err); +extern const char * ErrorStr(CHIP_ERROR err, bool withSourceLocation = true); extern void RegisterErrorFormatter(ErrorFormatter * errFormatter); extern void DeregisterErrorFormatter(ErrorFormatter * errFormatter); extern void FormatError(char * buf, uint16_t bufSize, const char * subsys, CHIP_ERROR err, const char * desc); diff --git a/src/lib/core/tests/BUILD.gn b/src/lib/core/tests/BUILD.gn index 30d50ee9493699..001078019a7e83 100644 --- a/src/lib/core/tests/BUILD.gn +++ b/src/lib/core/tests/BUILD.gn @@ -30,9 +30,14 @@ chip_test_suite("tests") { "TestOptional.cpp", "TestReferenceCounted.cpp", "TestTLV.cpp", - "TestTLVVectorWriter.cpp", ] + # requires large amount of heap for multiple unfragmented 10k buffers + # skip for efr32 to allow flash space for other tests + if (chip_device_platform != "efr32") { + test_sources += [ "TestTLVVectorWriter.cpp" ] + } + cflags = [ "-Wconversion" ] public_deps = [ diff --git a/src/lib/core/tests/TestCHIPErrorStr.cpp b/src/lib/core/tests/TestCHIPErrorStr.cpp index 54e187c72763fd..295dc895fc52fb 100644 --- a/src/lib/core/tests/TestCHIPErrorStr.cpp +++ b/src/lib/core/tests/TestCHIPErrorStr.cpp @@ -195,6 +195,40 @@ TEST(TestCHIPErrorStr, CheckCoreErrorStr) char const * const file = err.GetFile(); ASSERT_NE(file, nullptr); EXPECT_EQ(strstr(file, "src/lib/core/"), file); + + // File should be included in the error. + EXPECT_NE(strstr(errStr, file), nullptr); +#endif // CHIP_CONFIG_ERROR_SOURCE + } +} + +TEST(TestCHIPErrorStr, CheckCoreErrorStrWithoutSourceLocation) +{ + // Register the layer error formatter + + RegisterCHIPLayerErrorFormatter(); + + // For each defined error... + for (const auto & err : kTestElements) + { + const char * errStr = ErrorStr(err, /*withSourceLocation=*/false); + char expectedText[9]; + + // Assert that the error string contains the error number in hex. + snprintf(expectedText, sizeof(expectedText), "%08" PRIX32, static_cast(err.AsInteger())); + EXPECT_TRUE((strstr(errStr, expectedText) != nullptr)); + +#if !CHIP_CONFIG_SHORT_ERROR_STR + // Assert that the error string contains a description, which is signaled + // by a presence of a colon proceeding the description. + EXPECT_TRUE((strchr(errStr, ':') != nullptr)); +#endif // !CHIP_CONFIG_SHORT_ERROR_STR + +#if CHIP_CONFIG_ERROR_SOURCE + char const * const file = err.GetFile(); + ASSERT_NE(file, nullptr); + // File should not be included in the error. + EXPECT_EQ(strstr(errStr, file), nullptr); #endif // CHIP_CONFIG_ERROR_SOURCE } } diff --git a/src/lib/dnssd/Constants.h b/src/lib/dnssd/Constants.h index f34bdfa3da52b8..90c0d2e4afd4cb 100644 --- a/src/lib/dnssd/Constants.h +++ b/src/lib/dnssd/Constants.h @@ -29,7 +29,12 @@ namespace Dnssd { * Matter DNS host settings */ -inline constexpr size_t kHostNameMaxLength = 16; // MAC or 802.15.4 Extended Address in hex +// Matter spec expects hostname to be MAC or 802.15.4 Extended Address in hex. +// But in latest android nsdManager, it would set hostname with 40 bytes with prefix as android_, +// and there is no existing API to update the hostname, therefore we put temporary workaround with 40 bytes. +// Follow-up with ticket issue https://github.com/project-chip/connectedhomeip/issues/33474 +inline constexpr size_t kHostNameMaxLength = 40; +// /* * Matter DNS service subtypes diff --git a/src/lib/shell/BUILD.gn b/src/lib/shell/BUILD.gn index 46981b83bb6bb0..8a9f6233a476f6 100644 --- a/src/lib/shell/BUILD.gn +++ b/src/lib/shell/BUILD.gn @@ -20,9 +20,13 @@ import("${chip_root}/src/platform/device.gni") source_set("shell_core") { sources = [ + "Command.h", + "CommandSet.cpp", + "CommandSet.h", "Commands.h", "Engine.cpp", "Engine.h", + "SubShellCommand.h", "streamer.cpp", "streamer.h", ] diff --git a/src/lib/shell/Command.h b/src/lib/shell/Command.h new file mode 100644 index 00000000000000..0b4e3002e38d34 --- /dev/null +++ b/src/lib/shell/Command.h @@ -0,0 +1,62 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#pragma once + +#include + +namespace chip { +namespace Shell { + +/** + * Shell command descriptor structure. + * + * Typically a set of commands is defined as an array of this structure and registered + * at the shell root using the @c Shell::Engine::Root().RegisterCommands() method, or + * used to construct a @c CommandSet. + * + * Usage example: + * + * @code + * static Shell::Command cmds[] = { + * { &cmd_echo, "echo", "Echo back provided inputs" }, + * { &cmd_exit, "exit", "Exit the shell application" }, + * { &cmd_help, "help", "List out all top level commands" }, + * { &cmd_version, "version", "Output the software version" }, + * }; + * @endcode + */ +struct Command +{ + /** + * Shell command handler function type. + * + * @param argc Number of arguments in argv. + * @param argv Array of arguments in the tokenized command line to execute. + */ + using Handler = CHIP_ERROR (*)(int argc, char * argv[]); + + Handler cmd_func; + const char * cmd_name; + const char * cmd_help; +}; + +// DEPRECATED: +// shell_command_t is used in many examples, so keep it for backwards compatibility +using shell_command_t = const Command; + +} // namespace Shell +} // namespace chip diff --git a/src/lib/shell/CommandSet.cpp b/src/lib/shell/CommandSet.cpp new file mode 100644 index 00000000000000..7a6efd9db467da --- /dev/null +++ b/src/lib/shell/CommandSet.cpp @@ -0,0 +1,52 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include +#include +#include + +namespace chip { +namespace Shell { + +CHIP_ERROR CommandSet::ExecCommand(int argc, char * argv[]) const +{ + if (argc == 0 || strcmp(argv[0], "help") == 0) + { + ShowHelp(); + return CHIP_NO_ERROR; + } + + for (const Command & command : mCommands) + { + if (strcmp(argv[0], command.cmd_name) == 0) + { + return command.cmd_func(argc - 1, argv + 1); + } + } + + return CHIP_ERROR_INVALID_ARGUMENT; +} + +void CommandSet::ShowHelp() const +{ + for (const Command & command : mCommands) + { + streamer_printf(streamer_get(), " %-15s %s\r\n", command.cmd_name, command.cmd_help); + } +} + +} // namespace Shell +} // namespace chip diff --git a/src/lib/shell/CommandSet.h b/src/lib/shell/CommandSet.h new file mode 100644 index 00000000000000..eef0b69180f8dd --- /dev/null +++ b/src/lib/shell/CommandSet.h @@ -0,0 +1,58 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#pragma once + +#include +#include + +namespace chip { +namespace Shell { + +/** + * Shell command set. + * + * The shell command set is a thin wrapper for the span of commands. + * It facilitates executing a matching shell command for the given input arguments. + */ +class CommandSet +{ +public: + template + constexpr CommandSet(const Command (&commands)[N]) : mCommands(commands) + {} + + /** + * Dispatch and execute the command for the given argument list. + * + * The first argument is used to select the command to be executed and + * the remaining arguments are forwarded to the command's handler. + * If no argument has been provided or the first argument is "help", then + * the function prints help text for each command and returns no error. + * + * @param argc Number of arguments in argv. + * @param argv Array of arguments in the tokenized command line to execute. + */ + CHIP_ERROR ExecCommand(int argc, char * argv[]) const; + +private: + void ShowHelp() const; + + Span mCommands; +}; + +} // namespace Shell +} // namespace chip diff --git a/src/lib/shell/Engine.h b/src/lib/shell/Engine.h index be65ed45c94dc0..a0d7cfa6fa71fe 100644 --- a/src/lib/shell/Engine.h +++ b/src/lib/shell/Engine.h @@ -26,6 +26,7 @@ #include "streamer.h" #include +#include #include #include @@ -49,40 +50,6 @@ namespace chip { namespace Shell { -/** - * Callback to execute an individual shell command. - * - * @param argc Number of arguments passed. - * @param argv Array of option strings. The command name is not included. - * - * @return 0 on success; CHIP_ERROR[...] on failure. - */ -typedef CHIP_ERROR shell_command_fn(int argc, char * argv[]); - -/** - * Descriptor structure for a single command. - * - * Typically a set of commands are defined as an array of this structure - * and passed to the `shell_register()` during application initialization. - * - * An example command set definition follows: - * - * static shell_command_t cmds[] = { - * { &cmd_echo, "echo", "Echo back provided inputs" }, - * { &cmd_exit, "exit", "Exit the shell application" }, - * { &cmd_help, "help", "List out all top level commands" }, - * { &cmd_version, "version", "Output the software version" }, - * }; - */ -struct shell_command -{ - shell_command_fn * cmd_func; - const char * cmd_name; - const char * cmd_help; -}; - -typedef const struct shell_command shell_command_t; - /** * Execution callback for a shell command. * diff --git a/src/lib/shell/SubShellCommand.h b/src/lib/shell/SubShellCommand.h new file mode 100644 index 00000000000000..2f5008a2407b93 --- /dev/null +++ b/src/lib/shell/SubShellCommand.h @@ -0,0 +1,58 @@ +/* + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#pragma once + +#include + +namespace chip { +namespace Shell { + +/** + * Templatized shell command handler that runs one of the provided subcommands. + * + * The array of subcommands is provided as a non-type template parameter. + * + * The first argument is used to select the subcommand to be executed and + * the remaining arguments are forwarded to the subcommand's handler. + * If no argument has been provided or the first argument is "help", then + * the function prints help text for each subcommand and returns no error. + * + * Usage example: + * @code + * constexpr Command subCommands[3] = { + * {handler_a, "cmd_a", "command a help text"}, + * {handler_b, "cmd_b", "command b help text"}, + * {handler_c, "cmd_c", "command c help text"}, + * }; + * + * // Execute the matching subcommand + * SubShellCommand<3, subCommands>(argc, argv); + * @endcode + * + * @param argc Number of arguments in argv. + * @param argv Array of arguments in the tokenized command line to execute. + */ +template +inline CHIP_ERROR SubShellCommand(int argc, char ** argv) +{ + static constexpr CommandSet commandSet(C); + + return commandSet.ExecCommand(argc, argv); +} + +} // namespace Shell +} // namespace chip diff --git a/src/lib/shell/commands/BLE.cpp b/src/lib/shell/commands/BLE.cpp index f12c2101561b6d..9647f7fc5c6f3e 100644 --- a/src/lib/shell/commands/BLE.cpp +++ b/src/lib/shell/commands/BLE.cpp @@ -21,7 +21,7 @@ #include #endif #include -#include +#include #include #include #include @@ -31,21 +31,12 @@ using chip::DeviceLayer::ConnectivityMgr; namespace chip { namespace Shell { -static chip::Shell::Engine sShellDeviceSubcommands; - -CHIP_ERROR BLEHelpHandler(int argc, char ** argv) -{ - sShellDeviceSubcommands.ForEachCommand(PrintCommandHelp, nullptr); - return CHIP_NO_ERROR; -} - CHIP_ERROR BLEAdvertiseHandler(int argc, char ** argv) { - CHIP_ERROR error = CHIP_NO_ERROR; streamer_t * sout = streamer_get(); bool adv_enabled; - VerifyOrReturnError(argc == 1, error = CHIP_ERROR_INVALID_ARGUMENT); + VerifyOrReturnError(argc == 1, CHIP_ERROR_INVALID_ARGUMENT); adv_enabled = ConnectivityMgr().IsBLEAdvertisingEnabled(); if (strcmp(argv[0], "start") == 0) @@ -86,33 +77,18 @@ CHIP_ERROR BLEAdvertiseHandler(int argc, char ** argv) return CHIP_ERROR_INVALID_ARGUMENT; } - return error; -} - -CHIP_ERROR BLEDispatch(int argc, char ** argv) -{ - if (argc == 0) - { - BLEHelpHandler(argc, argv); - return CHIP_NO_ERROR; - } - return sShellDeviceSubcommands.ExecCommand(argc, argv); + return CHIP_NO_ERROR; } void RegisterBLECommands() { - static const shell_command_t sBLESubCommands[] = { - { &BLEHelpHandler, "help", "Usage: ble " }, - { &BLEAdvertiseHandler, "adv", "Enable or disable advertisement. Usage: ble adv " }, + static constexpr Command subCommands[] = { + { &BLEAdvertiseHandler, "adv", "Manage BLE advertising. Usage: ble adv " }, }; - static const shell_command_t sBLECommand = { &BLEDispatch, "ble", "BLE transport commands" }; - - // Register `device` subcommands with the local shell dispatcher. - sShellDeviceSubcommands.RegisterCommands(sBLESubCommands, ArraySize(sBLESubCommands)); + static constexpr Command bleCommand = { &SubShellCommand, "ble", "Bluetooth LE commands" }; - // Register the root `btp` command with the top-level shell. - Engine::Root().RegisterCommands(&sBLECommand, 1); + Engine::Root().RegisterCommands(&bleCommand, 1); } } // namespace Shell diff --git a/src/lib/shell/commands/Config.cpp b/src/lib/shell/commands/Config.cpp index ae1274a599bb16..e1452f9b35ba67 100644 --- a/src/lib/shell/commands/Config.cpp +++ b/src/lib/shell/commands/Config.cpp @@ -17,9 +17,9 @@ #include #include +#include #include #include -#include #include #include #include @@ -28,19 +28,9 @@ #include #include -using chip::DeviceLayer::ConfigurationMgr; - namespace chip { namespace Shell { -static chip::Shell::Engine sShellConfigSubcommands; - -CHIP_ERROR ConfigHelpHandler(int argc, char ** argv) -{ - sShellConfigSubcommands.ForEachCommand(PrintCommandHelp, nullptr); - return CHIP_NO_ERROR; -} - static CHIP_ERROR ConfigGetVendorId(bool printHeader) { streamer_t * sout = streamer_get(); @@ -182,28 +172,7 @@ static CHIP_ERROR PrintAllConfigs() static CHIP_ERROR ConfigHandler(int argc, char ** argv) { - switch (argc) - { - case 0: - return PrintAllConfigs(); - case 1: - if ((strcmp(argv[0], "help") == 0) || (strcmp(argv[0], "-h") == 0)) - { - return ConfigHelpHandler(argc, argv); - } - } - return sShellConfigSubcommands.ExecCommand(argc, argv); -} - -void RegisterConfigCommands() -{ - - static const shell_command_t sConfigComand = { &ConfigHandler, "config", - "Manage device configuration. Usage to dump value: config [param_name] and " - "to set some values (discriminator): config [param_name] [param_value]." }; - - static const shell_command_t sConfigSubCommands[] = { - { &ConfigHelpHandler, "help", "Usage: config " }, + static constexpr Command subCommands[] = { { &ConfigVendorId, "vendorid", "Get VendorId. Usage: config vendorid" }, { &ConfigProductId, "productid", "Get ProductId. Usage: config productid" }, { &ConfigHardwareVersion, "hardwarever", "Get HardwareVersion. Usage: config hardwarever" }, @@ -211,11 +180,18 @@ void RegisterConfigCommands() { &ConfigDiscriminator, "discriminator", "Get/Set commissioning discriminator. Usage: config discriminator [value]" }, }; - // Register `config` subcommands with the local shell dispatcher. - sShellConfigSubcommands.RegisterCommands(sConfigSubCommands, ArraySize(sConfigSubCommands)); + static constexpr CommandSet subShell(subCommands); + + return argc ? subShell.ExecCommand(argc, argv) : PrintAllConfigs(); +} + +void RegisterConfigCommands() +{ + static constexpr Command configCommand = { &ConfigHandler, "config", + "Manage device configuration. Usage to dump value: config [param_name] and " + "to set some values (discriminator): config [param_name] [param_value]." }; - // Register the root `config` command with the top-level shell. - Engine::Root().RegisterCommands(&sConfigComand, 1); + Engine::Root().RegisterCommands(&configCommand, 1); } } // namespace Shell diff --git a/src/lib/shell/commands/Device.cpp b/src/lib/shell/commands/Device.cpp index 7e26a75a5c32fb..de11f4d2e7a25d 100644 --- a/src/lib/shell/commands/Device.cpp +++ b/src/lib/shell/commands/Device.cpp @@ -15,30 +15,15 @@ * limitations under the License. */ -#include #include -#if CONFIG_DEVICE_LAYER -#include -#endif #include -#include -#include -#include +#include #include - -using chip::DeviceLayer::ConnectivityMgr; +#include namespace chip { namespace Shell { -static chip::Shell::Engine sShellDeviceSubcommands; - -int DeviceHelpHandler(int argc, char ** argv) -{ - sShellDeviceSubcommands.ForEachCommand(PrintCommandHelp, nullptr); - return 0; -} - static CHIP_ERROR FactoryResetHandler(int argc, char ** argv) { streamer_printf(streamer_get(), "Performing factory reset ... \r\n"); @@ -46,29 +31,16 @@ static CHIP_ERROR FactoryResetHandler(int argc, char ** argv) return CHIP_NO_ERROR; } -static CHIP_ERROR DeviceHandler(int argc, char ** argv) -{ - if (argc == 0) - { - DeviceHelpHandler(argc, argv); - return CHIP_NO_ERROR; - } - return sShellDeviceSubcommands.ExecCommand(argc, argv); -} - void RegisterDeviceCommands() { - static const shell_command_t sDeviceSubCommands[] = { + static constexpr Command subCommands[] = { { &FactoryResetHandler, "factoryreset", "Performs device factory reset" }, }; - static const shell_command_t sDeviceComand = { &DeviceHandler, "device", "Device management commands" }; - - // Register `device` subcommands with the local shell dispatcher. - sShellDeviceSubcommands.RegisterCommands(sDeviceSubCommands, ArraySize(sDeviceSubCommands)); + static constexpr Command deviceComand = { &SubShellCommand, "device", + "Device management commands" }; - // Register the root `device` command with the top-level shell. - Engine::Root().RegisterCommands(&sDeviceComand, 1); + Engine::Root().RegisterCommands(&deviceComand, 1); } } // namespace Shell diff --git a/src/lib/shell/commands/Dns.cpp b/src/lib/shell/commands/Dns.cpp index c6a93657ca7440..65b3f7bc9cc537 100644 --- a/src/lib/shell/commands/Dns.cpp +++ b/src/lib/shell/commands/Dns.cpp @@ -19,13 +19,12 @@ #include #include #include -#include #include #include #include #include #include -#include +#include #include #include #include @@ -36,8 +35,6 @@ namespace Shell { namespace { -Shell::Engine sShellDnsBrowseSubcommands; -Shell::Engine sShellDnsSubcommands; Dnssd::ResolverProxy sResolverProxy; class DnsShellResolverDelegate : public Dnssd::DiscoverNodeDelegate, public AddressResolve::NodeListener @@ -232,6 +229,9 @@ CHIP_ERROR BrowseCommissionableHandler(int argc, char ** argv) streamer_printf(streamer_get(), "Browsing commissionable nodes...\r\n"); + sResolverProxy.Init(DeviceLayer::UDPEndPointManager()); + sResolverProxy.SetDiscoveryDelegate(&sDnsShellResolverDelegate); + return sResolverProxy.DiscoverCommissionableNodes(filter); } @@ -242,6 +242,9 @@ CHIP_ERROR BrowseCommissionerHandler(int argc, char ** argv) streamer_printf(streamer_get(), "Browsing commissioners...\r\n"); + sResolverProxy.Init(DeviceLayer::UDPEndPointManager()); + sResolverProxy.SetDiscoveryDelegate(&sDnsShellResolverDelegate); + return sResolverProxy.DiscoverCommissioners(filter); } @@ -252,63 +255,32 @@ CHIP_ERROR BrowseOperationalHandler(int argc, char ** argv) streamer_printf(streamer_get(), "Browsing operational...\r\n"); - return sResolverProxy.DiscoverOperationalNodes(filter); -} - -CHIP_ERROR BrowseHandler(int argc, char ** argv) -{ - if (argc == 0) - { - sShellDnsBrowseSubcommands.ForEachCommand(PrintCommandHelp, nullptr); - return CHIP_NO_ERROR; - } - sResolverProxy.Init(DeviceLayer::UDPEndPointManager()); sResolverProxy.SetDiscoveryDelegate(&sDnsShellResolverDelegate); - return sShellDnsBrowseSubcommands.ExecCommand(argc, argv); -} - -CHIP_ERROR DnsHandler(int argc, char ** argv) -{ - if (argc == 0) - { - sShellDnsSubcommands.ForEachCommand(PrintCommandHelp, nullptr); - return CHIP_NO_ERROR; - } - - return sShellDnsSubcommands.ExecCommand(argc, argv); + return sResolverProxy.DiscoverOperationalNodes(filter); } } // namespace void RegisterDnsCommands() { - static const shell_command_t sDnsBrowseSubCommands[] = { + static constexpr Command browseSubCommands[] = { { &BrowseCommissionableHandler, "commissionable", - "Browse Matter commissionable nodes. Usage: dns browse commissionable [subtype]" }, - { &BrowseCommissionerHandler, "commissioner", - "Browse Matter commissioner nodes. Usage: dns browse commissioner [subtype]" }, + "Browse Matter commissionables. Usage: dns browse commissionable [subtype]" }, + { &BrowseCommissionerHandler, "commissioner", "Browse Matter commissioners. Usage: dns browse commissioner [subtype]" }, { &BrowseOperationalHandler, "operational", "Browse Matter operational nodes. Usage: dns browse operational" }, }; - static const shell_command_t sDnsSubCommands[] = { + static constexpr Command subCommands[] = { { &ResolveHandler, "resolve", - "Resolve the DNS service. Usage: dns resolve (e.g. dns resolve 5544332211 1)" }, - { &BrowseHandler, "browse", - "Browse DNS services published by Matter nodes. Usage: dns browse " }, + "Resolve Matter operational service. Usage: dns resolve fabricid nodeid (e.g. dns resolve 5544332211 1)" }, + { &SubShellCommand, "browse", "Browse Matter DNS services" }, }; - static const shell_command_t sDnsCommand = { &DnsHandler, "dns", "Dns client commands" }; - - // Register `dns browse` subcommands - sShellDnsBrowseSubcommands.RegisterCommands(sDnsBrowseSubCommands, ArraySize(sDnsBrowseSubCommands)); - - // Register `dns` subcommands with the local shell dispatcher. - sShellDnsSubcommands.RegisterCommands(sDnsSubCommands, ArraySize(sDnsSubCommands)); + static constexpr Command dnsCommand = { &SubShellCommand, "dns", "DNS client commands" }; - // Register the root `dns` command with the top-level shell. - Engine::Root().RegisterCommands(&sDnsCommand, 1); + Engine::Root().RegisterCommands(&dnsCommand, 1); } } // namespace Shell diff --git a/src/lib/shell/commands/NFC.cpp b/src/lib/shell/commands/NFC.cpp index 23b745b1901b90..78d2cc841b66df 100644 --- a/src/lib/shell/commands/NFC.cpp +++ b/src/lib/shell/commands/NFC.cpp @@ -22,9 +22,6 @@ #endif #include #include -#include -#include -#include #include using chip::DeviceLayer::ConnectivityMgr; @@ -86,11 +83,10 @@ static CHIP_ERROR NFCHandler(int argc, char ** argv) void RegisterNFCCommands() { - static const shell_command_t sDeviceComand = { &NFCHandler, "nfc", - "Start, stop or get nfc emulation state. Usage: nfc " }; + static constexpr Command nfcComand = { &NFCHandler, "nfc", + "Start, stop or get nfc emulation state. Usage: nfc " }; - // Register the root `device` command with the top-level shell. - Engine::Root().RegisterCommands(&sDeviceComand, 1); + Engine::Root().RegisterCommands(&nfcComand, 1); } } // namespace Shell diff --git a/src/lib/shell/commands/OnboardingCodes.cpp b/src/lib/shell/commands/OnboardingCodes.cpp index 1ecb791904280b..1e17812d183a3f 100644 --- a/src/lib/shell/commands/OnboardingCodes.cpp +++ b/src/lib/shell/commands/OnboardingCodes.cpp @@ -20,7 +20,6 @@ #include #include #include -#include #include #include #include @@ -170,14 +169,12 @@ static CHIP_ERROR OnboardingHandler(int argc, char ** argv) void RegisterOnboardingCodesCommands() { - - static const shell_command_t sDeviceComand = { + static constexpr Command deviceComand = { &OnboardingHandler, "onboardingcodes", "Dump device onboarding codes. Usage: onboardingcodes none|softap|ble|onnetwork [qrcode|qrcodeurl|manualpairingcode]" }; - // Register the root `device` command with the top-level shell. - Engine::Root().RegisterCommands(&sDeviceComand, 1); + Engine::Root().RegisterCommands(&deviceComand, 1); } } // namespace Shell diff --git a/src/lib/shell/commands/Ota.cpp b/src/lib/shell/commands/Ota.cpp index 729d1b9b059466..2be0619151e2d0 100644 --- a/src/lib/shell/commands/Ota.cpp +++ b/src/lib/shell/commands/Ota.cpp @@ -19,7 +19,7 @@ #include #include #include -#include +#include #include using namespace chip::DeviceLayer; @@ -28,8 +28,6 @@ namespace chip { namespace Shell { namespace { -Shell::Engine sSubShell; - CHIP_ERROR QueryImageHandler(int argc, char ** argv) { VerifyOrReturnError(GetRequestorInstance() != nullptr, CHIP_ERROR_INCORRECT_STATE); @@ -96,31 +94,15 @@ CHIP_ERROR ProgressHandler(int argc, char ** argv) return CHIP_NO_ERROR; } -CHIP_ERROR OtaHandler(int argc, char ** argv) -{ - if (argc == 0) - { - sSubShell.ForEachCommand(PrintCommandHelp, nullptr); - return CHIP_NO_ERROR; - } - - return sSubShell.ExecCommand(argc, argv); -} } // namespace void RegisterOtaCommands() { - // Register subcommands of the `ota` commands. - static const shell_command_t subCommands[] = { - { &QueryImageHandler, "query", "Query for a new image. Usage: ota query" }, - { &StateHandler, "state", "Gets state of a current image update process. Usage: ota state" }, - { &ProgressHandler, "progress", "Gets progress of a current image update process. Usage: ota progress" } - }; - - sSubShell.RegisterCommands(subCommands, ArraySize(subCommands)); + static constexpr Command subCommands[] = { { &QueryImageHandler, "query", "Query for a new image" }, + { &StateHandler, "state", "Get current image update state" }, + { &ProgressHandler, "progress", "Get current image update progress" } }; - // Register the root `ota` command in the top-level shell. - static const shell_command_t otaCommand = { &OtaHandler, "ota", "OTA commands" }; + static constexpr Command otaCommand = { &SubShellCommand, "ota", "OTA commands" }; Engine::Root().RegisterCommands(&otaCommand, 1); } diff --git a/src/lib/shell/commands/Stat.cpp b/src/lib/shell/commands/Stat.cpp index 88262e1e8daa1a..cf1799c8a71db8 100644 --- a/src/lib/shell/commands/Stat.cpp +++ b/src/lib/shell/commands/Stat.cpp @@ -16,6 +16,7 @@ #include #include +#include #include #include #include @@ -35,8 +36,6 @@ namespace chip { namespace Shell { namespace { -Shell::Engine sSubShell; - CHIP_ERROR StatPeakHandler(int argc, char ** argv) { auto labels = System::Stats::GetStrings(); @@ -88,24 +87,16 @@ CHIP_ERROR StatResetHandler(int argc, char ** argv) return CHIP_NO_ERROR; } -CHIP_ERROR StatHandler(int argc, char ** argv) -{ - return sSubShell.ExecCommand(argc, argv); -} } // namespace void RegisterStatCommands() { - // Register subcommands of the `stat` commands. - static const shell_command_t subCommands[] = { - { &StatPeakHandler, "peak", "Print peak usage of system resources. Usage: stat peak" }, - { &StatResetHandler, "reset", "Reset peak usage of system resources. Usage: stat reset" }, + static constexpr Command subCommands[] = { + { &StatPeakHandler, "peak", "Print peak usage of system resources" }, + { &StatResetHandler, "reset", "Reset peak usage of system resources" }, }; - sSubShell.RegisterCommands(subCommands, ArraySize(subCommands)); - - // Register the root `stat` command in the top-level shell. - static const shell_command_t statCommand = { &StatHandler, "stat", "Statistics commands" }; + static constexpr Command statCommand = { &SubShellCommand, "stat", "Statistics commands" }; Engine::Root().RegisterCommands(&statCommand, 1); } diff --git a/src/lib/shell/commands/WiFi.cpp b/src/lib/shell/commands/WiFi.cpp index 35ab5e26ae23a2..f2076a72decdba 100644 --- a/src/lib/shell/commands/WiFi.cpp +++ b/src/lib/shell/commands/WiFi.cpp @@ -17,7 +17,7 @@ #include #include -#include +#include #include #include #include @@ -32,15 +32,8 @@ using namespace chip::DeviceLayer::NetworkCommissioning; namespace chip { namespace Shell { -static Shell::Engine sShellWiFiSubCommands; static DeviceLayer::NetworkCommissioning::WiFiDriver * sDriver; -static CHIP_ERROR WiFiHelpHandler(int argc, char ** argv) -{ - sShellWiFiSubCommands.ForEachCommand(PrintCommandHelp, nullptr); - return CHIP_NO_ERROR; -} - static CHIP_ERROR PrintWiFiMode() { streamer_t * sout = streamer_get(); @@ -143,15 +136,6 @@ static CHIP_ERROR WiFiDisconnectHandler(int argc, char ** argv) return ConnectivityMgr().DisconnectNetwork(); } -static CHIP_ERROR WiFiDispatch(int argc, char ** argv) -{ - if (argc == 0) - { - return WiFiHelpHandler(argc, argv); - } - return sShellWiFiSubCommands.ExecCommand(argc, argv); -} - void SetWiFiDriver(WiFiDriver * driver) { sDriver = driver; @@ -164,17 +148,15 @@ WiFiDriver * GetWiFiDriver() void RegisterWiFiCommands() { - /// Subcommands for root command: `device ` - static const shell_command_t sWiFiSubCommands[] = { - { &WiFiHelpHandler, "help", "" }, + static constexpr Command subCommands[] = { { &WiFiModeHandler, "mode", "Get/Set wifi mode. Usage: wifi mode [disable|ap|sta]" }, { &WiFiConnectHandler, "connect", "Connect to AP. Usage: wifi connect " }, { &WiFiDisconnectHandler, "disconnect", "Disconnect device from AP. Usage: wifi disconnect" }, }; - static const shell_command_t sWiFiCommand = { &WiFiDispatch, "wifi", "Usage: wifi " }; - sShellWiFiSubCommands.RegisterCommands(sWiFiSubCommands, ArraySize(sWiFiSubCommands)); - Engine::Root().RegisterCommands(&sWiFiCommand, 1); + static constexpr Command wifiCommand = { &SubShellCommand, "wifi", "Wi-Fi commands" }; + + Engine::Root().RegisterCommands(&wifiCommand, 1); } } // namespace Shell diff --git a/src/lib/shell/streamer_esp32.cpp b/src/lib/shell/streamer_esp32.cpp index c92170ec730812..ce711849efaa34 100644 --- a/src/lib/shell/streamer_esp32.cpp +++ b/src/lib/shell/streamer_esp32.cpp @@ -18,6 +18,8 @@ #include #include +#include "sdkconfig.h" + #include "esp_console.h" #include "esp_vfs_dev.h" #include "linenoise/linenoise.h" @@ -25,10 +27,12 @@ #include #include #include -#if CONFIG_ESP_CONSOLE_UART_DEFAULT || CONFIG_ESP_CONSOLE_UART_CUSTOM + +#if defined(CONFIG_ESP_CONSOLE_UART_DEFAULT) || defined(CONFIG_ESP_CONSOLE_UART_CUSTOM) #include "driver/uart.h" #endif -#if CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG + +#ifdef CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG #include "driver/usb_serial_jtag.h" #include "esp_vfs_usb_serial_jtag.h" #endif @@ -55,7 +59,7 @@ int streamer_esp32_init(streamer_t * streamer) fflush(stdout); fsync(fileno(stdout)); setvbuf(stdin, NULL, _IONBF, 0); -#if CONFIG_ESP_CONSOLE_UART_DEFAULT || CONFIG_ESP_CONSOLE_UART_CUSTOM +#if defined(CONFIG_ESP_CONSOLE_UART_DEFAULT) || defined(CONFIG_ESP_CONSOLE_UART_CUSTOM) esp_vfs_dev_uart_port_set_rx_line_endings((uart_port_t) CONFIG_ESP_CONSOLE_UART_NUM, ESP_LINE_ENDINGS_CR); esp_vfs_dev_uart_port_set_tx_line_endings((uart_port_t) CONFIG_ESP_CONSOLE_UART_NUM, ESP_LINE_ENDINGS_CRLF); if (!uart_is_driver_installed((uart_port_t) CONFIG_ESP_CONSOLE_UART_NUM)) @@ -79,7 +83,7 @@ int streamer_esp32_init(streamer_t * streamer) esp_vfs_dev_uart_use_driver(0); #endif // CONFIG_ESP_CONSOLE_UART_DEFAULT || CONFIG_ESP_CONSOLE_UART_CUSTOM -#if CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG +#ifdef CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG esp_vfs_dev_usb_serial_jtag_set_rx_line_endings(ESP_LINE_ENDINGS_CR); esp_vfs_dev_usb_serial_jtag_set_tx_line_endings(ESP_LINE_ENDINGS_CRLF); @@ -121,10 +125,10 @@ ssize_t streamer_esp32_read(streamer_t * streamer, char * buf, size_t len) ssize_t streamer_esp32_write(streamer_t * streamer, const char * buf, size_t len) { -#if CONFIG_ESP_CONSOLE_UART_DEFAULT || CONFIG_ESP_CONSOLE_UART_CUSTOM +#if defined(CONFIG_ESP_CONSOLE_UART_DEFAULT) || defined(CONFIG_ESP_CONSOLE_UART_CUSTOM) return uart_write_bytes((uart_port_t) CONFIG_ESP_CONSOLE_UART_NUM, buf, len); #endif -#if CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG +#ifdef CONFIG_ESP_CONSOLE_USB_SERIAL_JTAG return usb_serial_jtag_write_bytes(buf, len, 0); #endif } diff --git a/src/lib/support/UnitTestRegistration.h b/src/lib/support/UnitTestRegistration.h index 791a62be855a36..be7cc710a9278d 100644 --- a/src/lib/support/UnitTestRegistration.h +++ b/src/lib/support/UnitTestRegistration.h @@ -48,6 +48,20 @@ VerifyOrDie(chip::RegisterUnitTests(&FUNCTION) == CHIP_NO_ERROR); \ } +// TODO: remove these once transition to pw_unit_test is completed +#define NL_TEST_WRAP_FUNCTION(FUNCTION) \ + [](void * _context) -> int { \ + FUNCTION(); \ + return SUCCESS; \ + } + +#define NL_TEST_WRAP_METHOD(CLASS, METHOD) \ + [](void * context) -> int { \ + auto ctx = static_cast(context); \ + ctx->METHOD(); \ + return SUCCESS; \ + } + namespace chip { typedef int (*UnitTestTriggerFunction)(); diff --git a/src/lib/support/UnitTestUtils.cpp b/src/lib/support/UnitTestUtils.cpp index 84976405a20940..0d3acae6487106 100644 --- a/src/lib/support/UnitTestUtils.cpp +++ b/src/lib/support/UnitTestUtils.cpp @@ -51,7 +51,7 @@ uint64_t TimeMonotonicMillis() void SleepMillis(uint64_t millisecs) { - uint32_t ticks = static_cast(millisecs / portTICK_PERIOD_MS); + uint32_t ticks = pdMS_TO_TICKS(millisecs); vTaskDelay(ticks == 0 ? 1 : ticks); // delay at least 1 tick } diff --git a/src/lib/support/logging/Constants.h b/src/lib/support/logging/Constants.h index 6a176b02eb1389..badc112202c277 100644 --- a/src/lib/support/logging/Constants.h +++ b/src/lib/support/logging/Constants.h @@ -60,6 +60,7 @@ enum LogModule kLogModule_Automation, kLogModule_CASESessionManager, kLogModule_ICD, + kLogModule_FabricSync, kLogModule_Max }; @@ -231,6 +232,10 @@ enum LogModule #define CHIP_CONFIG_LOG_MODULE_ICD 1 #endif +#ifndef CHIP_CONFIG_LOG_MODULE_FabricSync +#define CHIP_CONFIG_LOG_MODULE_FabricSync 1 +#endif + /** * @enum LogCategory * diff --git a/src/lib/support/logging/TextOnlyLogging.cpp b/src/lib/support/logging/TextOnlyLogging.cpp index eb7065f2d938d4..0e420140524662 100644 --- a/src/lib/support/logging/TextOnlyLogging.cpp +++ b/src/lib/support/logging/TextOnlyLogging.cpp @@ -149,6 +149,8 @@ static const char ModuleNames[kLogModule_Max][kMaxModuleNameLen + 1] = { "OSS", // OperationalSessionSetup "ATM", // Automation "CSM", // CASESessionManager + "ICD", // ICD + "FS", // FabricSync }; } // namespace diff --git a/src/lib/support/static_support_smart_ptr.h b/src/lib/support/static_support_smart_ptr.h index 896073a9b15801..76035e48d33841 100644 --- a/src/lib/support/static_support_smart_ptr.h +++ b/src/lib/support/static_support_smart_ptr.h @@ -54,6 +54,7 @@ template class CheckedGlobalInstanceReference { public: + CheckedGlobalInstanceReference() = default; CheckedGlobalInstanceReference(T * e) { VerifyOrDie(e == GlobalInstanceProvider::InstancePointer()); } CheckedGlobalInstanceReference & operator=(T * value) { @@ -63,6 +64,7 @@ class CheckedGlobalInstanceReference inline T * operator->() { return GlobalInstanceProvider::InstancePointer(); } inline const T * operator->() const { return GlobalInstanceProvider::InstancePointer(); } + inline operator bool() const { return true; } }; /// A class that acts as a wrapper to a pointer and provides @@ -87,6 +89,7 @@ template class SimpleInstanceReference { public: + SimpleInstanceReference() = default; SimpleInstanceReference(T * e) : mValue(e) {} SimpleInstanceReference & operator=(T * value) { @@ -96,9 +99,10 @@ class SimpleInstanceReference T * operator->() { return mValue; } const T * operator->() const { return mValue; } + inline operator bool() const { return mValue != nullptr; } private: - T * mValue; + T * mValue = nullptr; }; } // namespace chip diff --git a/src/lib/support/tests/TestStaticSupportSmartPtr.cpp b/src/lib/support/tests/TestStaticSupportSmartPtr.cpp index b51afc15729ad8..5ffe1cee4d284b 100644 --- a/src/lib/support/tests/TestStaticSupportSmartPtr.cpp +++ b/src/lib/support/tests/TestStaticSupportSmartPtr.cpp @@ -56,6 +56,7 @@ TEST(TestStaticSupportSmartPtr, TestCheckedGlobalInstanceReference) // We expect that sizes of global references is minimal EXPECT_EQ(sizeof(ref), 1u); + ASSERT_TRUE(ref); EXPECT_EQ(ref->num, 123); EXPECT_STREQ(ref->str, "abc"); @@ -69,6 +70,7 @@ TEST(TestStaticSupportSmartPtr, TestCheckedGlobalInstanceReference) CheckedGlobalInstanceReference ref2(&gTestClass); + ASSERT_TRUE(ref2); EXPECT_EQ(ref->num, ref2->num); EXPECT_STREQ(ref->str, ref2->str); @@ -82,6 +84,10 @@ TEST(TestStaticSupportSmartPtr, TestCheckedGlobalInstanceReference) EXPECT_EQ(ref2->num, 321); EXPECT_STREQ(ref2->str, "test"); } + + // Check default constructed CheckedGlobalInstanceReference + CheckedGlobalInstanceReference ref_default; + ASSERT_TRUE(ref_default); } TEST(TestStaticSupportSmartPtr, TestSimpleInstanceReference) @@ -95,6 +101,9 @@ TEST(TestStaticSupportSmartPtr, TestSimpleInstanceReference) // overhead of simple references should be a simple pointer EXPECT_LE(sizeof(ref_a), sizeof(void *)); + ASSERT_TRUE(ref_a); + ASSERT_TRUE(ref_b); + EXPECT_EQ(ref_a->num, 123); EXPECT_EQ(ref_b->num, 100); @@ -103,6 +112,10 @@ TEST(TestStaticSupportSmartPtr, TestSimpleInstanceReference) EXPECT_EQ(a.num, 99); EXPECT_EQ(ref_b->num, 30); + + // Check default constructed SimpleInstanceReference + SimpleInstanceReference ref_default; + ASSERT_FALSE(ref_default); } } // namespace diff --git a/src/messaging/ReliableMessageMgr.cpp b/src/messaging/ReliableMessageMgr.cpp index 4bc196c45510ea..c9178a03d1822d 100644 --- a/src/messaging/ReliableMessageMgr.cpp +++ b/src/messaging/ReliableMessageMgr.cpp @@ -199,7 +199,7 @@ void ReliableMessageMgr::Timeout(System::Layer * aSystemLayer, void * aAppState) CHIP_ERROR ReliableMessageMgr::AddToRetransTable(ReliableMessageContext * rc, RetransTableEntry ** rEntry) { - VerifyOrDie(!rc->IsWaitingForAck()); + VerifyOrReturnError(!rc->IsWaitingForAck(), CHIP_ERROR_INCORRECT_STATE); *rEntry = mRetransTable.CreateObject(rc); if (*rEntry == nullptr) diff --git a/src/messaging/ReliableMessageProtocolConfig.h b/src/messaging/ReliableMessageProtocolConfig.h index 3dce56b9e98f56..beceee6c52de46 100644 --- a/src/messaging/ReliableMessageProtocolConfig.h +++ b/src/messaging/ReliableMessageProtocolConfig.h @@ -30,10 +30,6 @@ #include #include -#if CHIP_SYSTEM_CONFIG_USE_LWIP -#include -#endif // CHIP_SYSTEM_CONFIG_USE_LWIP - namespace chip { /** @@ -129,14 +125,14 @@ namespace chip { #ifndef CHIP_CONFIG_RMP_RETRANS_TABLE_SIZE #if CHIP_SYSTEM_CONFIG_USE_LWIP -#if !LWIP_PBUF_FROM_CUSTOM_POOLS && PBUF_POOL_SIZE != 0 +#if !CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL && PBUF_POOL_SIZE != 0 // Configure the table size to be less than the number of packet buffers to make sure // that not all buffers are held by the retransmission entries, in which case the device // is unable to receive an ACK and hence becomes unavailable until a message times out. #define CHIP_CONFIG_RMP_RETRANS_TABLE_SIZE std::min(PBUF_POOL_SIZE - 1, CHIP_CONFIG_MAX_EXCHANGE_CONTEXTS) #else #define CHIP_CONFIG_RMP_RETRANS_TABLE_SIZE CHIP_CONFIG_MAX_EXCHANGE_CONTEXTS -#endif // !LWIP_PBUF_FROM_CUSTOM_POOLS && PBUF_POOL_SIZE != 0 +#endif // !CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL && PBUF_POOL_SIZE != 0 #else // CHIP_SYSTEM_CONFIG_USE_LWIP diff --git a/src/messaging/tests/BUILD.gn b/src/messaging/tests/BUILD.gn index a78dcce953756b..89f0934486b9c1 100644 --- a/src/messaging/tests/BUILD.gn +++ b/src/messaging/tests/BUILD.gn @@ -49,27 +49,20 @@ static_library("helpers") { chip_test_suite_using_nltest("tests") { output_name = "libMessagingLayerTests" - test_sources = [] - - if (chip_device_platform != "efr32") { - # TODO(#10447): ReliableMessage Test has HF, and ExchangeMgr hangs on EFR32. - # And TestAbortExchangesForFabric does not link on EFR32 for some reason. - # TODO #33372: TestExchange.cpp asserts in ExchangeContext::SendMessage - test_sources += [ - "TestAbortExchangesForFabric.cpp", - "TestExchange.cpp", - "TestExchangeMgr.cpp", - "TestReliableMessageProtocol.cpp", - ] + test_sources = [ + "TestAbortExchangesForFabric.cpp", + "TestExchange.cpp", + "TestExchangeMgr.cpp", + "TestReliableMessageProtocol.cpp", + ] - if (chip_device_platform != "esp32" && chip_device_platform != "mbed" && - chip_device_platform != "nrfconnect" && chip_device_platform != "nxp") { - test_sources += [ "TestExchangeHolder.cpp" ] - } + if (chip_device_platform != "esp32" && chip_device_platform != "mbed" && + chip_device_platform != "nrfconnect" && chip_device_platform != "nxp") { + test_sources += [ "TestExchangeHolder.cpp" ] + } - if (chip_device_platform == "linux") { - test_sources += [ "TestMessagingLayer.cpp" ] - } + if (chip_device_platform == "linux") { + test_sources += [ "TestMessagingLayer.cpp" ] } cflags = [ "-Wconversion" ] diff --git a/src/messaging/tests/MessagingContext.cpp b/src/messaging/tests/MessagingContext.cpp index 72ab1650da552c..61565da1cd4ac0 100644 --- a/src/messaging/tests/MessagingContext.cpp +++ b/src/messaging/tests/MessagingContext.cpp @@ -58,7 +58,7 @@ CHIP_ERROR MessagingContext::Init(TransportMgrBase * transport, IOContext * ioCo ReturnErrorOnFailure(mExchangeManager.Init(&mSessionManager)); ReturnErrorOnFailure(mMessageCounterManager.Init(&mExchangeManager)); - if (mInitializeNodes) + if (sInitializeNodes) { ReturnErrorOnFailure(CreateAliceFabric()); ReturnErrorOnFailure(CreateBobFabric()); @@ -112,6 +112,8 @@ using namespace System::Clock::Literals; constexpr chip::System::Clock::Timeout MessagingContext::kResponsiveIdleRetransTimeout; constexpr chip::System::Clock::Timeout MessagingContext::kResponsiveActiveRetransTimeout; +bool MessagingContext::sInitializeNodes = true; + void MessagingContext::SetMRPMode(MRPMode mode) { if (mode == MRPMode::kDefault) @@ -302,6 +304,10 @@ Messaging::ExchangeContext * MessagingContext::NewExchangeToBob(Messaging::Excha return mExchangeManager.NewContext(GetSessionAliceToBob(), delegate, isInitiator); } +LoopbackTransportManager LoopbackMessagingContext::sLoopbackTransportManager; + +UDPTransportManager UDPMessagingContext::sUDPTransportManager; + void MessageCapturer::OnMessageReceived(const PacketHeader & packetHeader, const PayloadHeader & payloadHeader, const SessionHandle & session, DuplicateMessage isDuplicate, System::PacketBufferHandle && msgBuf) diff --git a/src/messaging/tests/MessagingContext.h b/src/messaging/tests/MessagingContext.h index 9ed82de60e4d5d..ab9912924e713c 100644 --- a/src/messaging/tests/MessagingContext.h +++ b/src/messaging/tests/MessagingContext.h @@ -20,6 +20,7 @@ #include #include #include +#include #include #include #include @@ -100,7 +101,7 @@ class MessagingContext : public PlatformMemoryUser ~MessagingContext() { VerifyOrDie(mInitialized == false); } // Whether Alice and Bob are initialized, must be called before Init - void ConfigInitializeNodes(bool initializeNodes) { mInitializeNodes = initializeNodes; } + static void ConfigInitializeNodes(bool initializeNodes) { sInitializeNodes = initializeNodes; } /// Initialize the underlying layers and test suite pointer CHIP_ERROR Init(TransportMgrBase * transport, IOContext * io); @@ -177,7 +178,7 @@ class MessagingContext : public PlatformMemoryUser System::Layer & GetSystemLayer() { return mIOContext->GetSystemLayer(); } private: - bool mInitializeNodes = true; + static bool sInitializeNodes; bool mInitialized; FabricTable mFabricTable; @@ -206,26 +207,38 @@ class MessagingContext : public PlatformMemoryUser }; // LoopbackMessagingContext enriches MessagingContext with an async loopback transport -class LoopbackMessagingContext : public LoopbackTransportManager, public MessagingContext +class LoopbackMessagingContext : public MessagingContext { public: virtual ~LoopbackMessagingContext() {} + // These functions wrap sLoopbackTransportManager methods + static auto & GetSystemLayer() { return sLoopbackTransportManager.GetSystemLayer(); } + static auto & GetLoopback() { return sLoopbackTransportManager.GetLoopback(); } + static auto & GetTransportMgr() { return sLoopbackTransportManager.GetTransportMgr(); } + static auto & GetIOContext() { return sLoopbackTransportManager.GetIOContext(); } + + template + static void DrainAndServiceIO(Ts... args) + { + return sLoopbackTransportManager.DrainAndServiceIO(args...); + } + // Performs shared setup for all tests in the test suite - virtual void SetUpTestSuite() + static void SetUpTestSuite() { CHIP_ERROR err = CHIP_NO_ERROR; // TODO: use ASSERT_EQ, once transition to pw_unit_test is complete VerifyOrDieWithMsg((err = chip::Platform::MemoryInit()) == CHIP_NO_ERROR, AppServer, "Init CHIP memory failed: %" CHIP_ERROR_FORMAT, err.Format()); - VerifyOrDieWithMsg((err = LoopbackTransportManager::Init()) == CHIP_NO_ERROR, AppServer, + VerifyOrDieWithMsg((err = sLoopbackTransportManager.Init()) == CHIP_NO_ERROR, AppServer, "Init LoopbackTransportManager failed: %" CHIP_ERROR_FORMAT, err.Format()); } // Performs shared teardown for all tests in the test suite - virtual void TearDownTestSuite() + static void TearDownTestSuite() { - LoopbackTransportManager::Shutdown(); + sLoopbackTransportManager.Shutdown(); chip::Platform::MemoryShutdown(); } @@ -240,100 +253,48 @@ class LoopbackMessagingContext : public LoopbackTransportManager, public Messagi // Performs teardown for each individual test in the test suite virtual void TearDown() { MessagingContext::Shutdown(); } - // Helpers that can be used directly by the nlTestSuite - - static int nlTestSetUpTestSuite(void * context) - { - static_cast(context)->SetUpTestSuite(); - return SUCCESS; - } - - static int nlTestTearDownTestSuite(void * context) - { - static_cast(context)->TearDownTestSuite(); - return SUCCESS; - } - - static int nlTestSetUp(void * context) - { - static_cast(context)->SetUp(); - return SUCCESS; - } - - static int nlTestTearDown(void * context) - { - static_cast(context)->TearDown(); - return SUCCESS; - } - - using LoopbackTransportManager::GetSystemLayer; + static LoopbackTransportManager sLoopbackTransportManager; }; // UDPMessagingContext enriches MessagingContext with an UDP transport -class UDPMessagingContext : public UDPTransportManager, public MessagingContext +class UDPMessagingContext : public MessagingContext { public: virtual ~UDPMessagingContext() {} + static auto & GetSystemLayer() { return sUDPTransportManager.GetSystemLayer(); } + static auto & GetTransportMgr() { return sUDPTransportManager.GetTransportMgr(); } + static auto & GetIOContext() { return sUDPTransportManager.GetIOContext(); } + // Performs shared setup for all tests in the test suite - virtual CHIP_ERROR SetUpTestSuite() + static void SetUpTestSuite() { CHIP_ERROR err = CHIP_NO_ERROR; - VerifyOrExit((err = chip::Platform::MemoryInit()) == CHIP_NO_ERROR, - ChipLogError(AppServer, "Init CHIP memory failed: %" CHIP_ERROR_FORMAT, err.Format())); - VerifyOrExit((err = UDPTransportManager::Init()) == CHIP_NO_ERROR, - ChipLogError(AppServer, "Init UDPTransportManager failed: %" CHIP_ERROR_FORMAT, err.Format())); - exit: - return err; + VerifyOrDieWithMsg((err = chip::Platform::MemoryInit()) == CHIP_NO_ERROR, AppServer, + "Init CHIP memory failed: %" CHIP_ERROR_FORMAT, err.Format()); + VerifyOrDieWithMsg((err = sUDPTransportManager.Init()) == CHIP_NO_ERROR, AppServer, + "Init UDPTransportManager failed: %" CHIP_ERROR_FORMAT, err.Format()); } // Performs shared teardown for all tests in the test suite - virtual void TearDownTestSuite() + static void TearDownTestSuite() { - UDPTransportManager::Shutdown(); + sUDPTransportManager.Shutdown(); chip::Platform::MemoryShutdown(); } // Performs setup for each individual test in the test suite - virtual CHIP_ERROR SetUp() + virtual void SetUp() { CHIP_ERROR err = CHIP_NO_ERROR; - VerifyOrExit((err = MessagingContext::Init(&GetTransportMgr(), &GetIOContext())) == CHIP_NO_ERROR, - ChipLogError(AppServer, "Init MessagingContext failed: %" CHIP_ERROR_FORMAT, err.Format())); - exit: - return err; + VerifyOrDieWithMsg((err = MessagingContext::Init(&GetTransportMgr(), &GetIOContext())) == CHIP_NO_ERROR, AppServer, + "Init MessagingContext failed: %" CHIP_ERROR_FORMAT, err.Format()); } // Performs teardown for each individual test in the test suite virtual void TearDown() { MessagingContext::Shutdown(); } - // Helpers that can be used directly by the nlTestSuite - - static int nlTestSetUpTestSuite(void * context) - { - auto err = static_cast(context)->SetUpTestSuite(); - return err == CHIP_NO_ERROR ? SUCCESS : FAILURE; - } - - static int nlTestTearDownTestSuite(void * context) - { - static_cast(context)->TearDownTestSuite(); - return SUCCESS; - } - - static int nlTestSetUp(void * context) - { - auto err = static_cast(context)->SetUp(); - return err == CHIP_NO_ERROR ? SUCCESS : FAILURE; - } - - static int nlTestTearDown(void * context) - { - static_cast(context)->TearDown(); - return SUCCESS; - } - - using UDPTransportManager::GetSystemLayer; + static UDPTransportManager sUDPTransportManager; }; // Class that can be used to capture decrypted message traffic in tests using diff --git a/src/messaging/tests/TestAbortExchangesForFabric.cpp b/src/messaging/tests/TestAbortExchangesForFabric.cpp index 1540b91725a3aa..d5c945c848a9aa 100644 --- a/src/messaging/tests/TestAbortExchangesForFabric.cpp +++ b/src/messaging/tests/TestAbortExchangesForFabric.cpp @@ -273,10 +273,10 @@ const nlTest sTests[] = { nlTestSuite sSuite = { "Test-AbortExchangesForFabric", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/messaging/tests/TestExchange.cpp b/src/messaging/tests/TestExchange.cpp index 67b9ab6d16d0d3..fbc1c9e505204d 100644 --- a/src/messaging/tests/TestExchange.cpp +++ b/src/messaging/tests/TestExchange.cpp @@ -241,10 +241,10 @@ nlTestSuite sSuite = { "Test-Exchange", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/messaging/tests/TestExchangeHolder.cpp b/src/messaging/tests/TestExchangeHolder.cpp index 9325350d262e1b..849c1856d9b013 100644 --- a/src/messaging/tests/TestExchangeHolder.cpp +++ b/src/messaging/tests/TestExchangeHolder.cpp @@ -821,10 +821,10 @@ nlTestSuite sSuite = { "Test-TestExchangeHolder", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/messaging/tests/TestExchangeMgr.cpp b/src/messaging/tests/TestExchangeMgr.cpp index cc4dbf10e5a4f4..efca83e6d1a92a 100644 --- a/src/messaging/tests/TestExchangeMgr.cpp +++ b/src/messaging/tests/TestExchangeMgr.cpp @@ -301,10 +301,10 @@ nlTestSuite sSuite = { "Test-CHIP-ExchangeManager", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/messaging/tests/TestMessagingLayer.cpp b/src/messaging/tests/TestMessagingLayer.cpp index 2c05c067989e42..00dca89f2b6639 100644 --- a/src/messaging/tests/TestMessagingLayer.cpp +++ b/src/messaging/tests/TestMessagingLayer.cpp @@ -162,10 +162,10 @@ nlTestSuite sSuite = { "Test-CHIP-MessagingLayer", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/messaging/tests/TestReliableMessageProtocol.cpp b/src/messaging/tests/TestReliableMessageProtocol.cpp index 057aa599726df3..68342838a735b1 100644 --- a/src/messaging/tests/TestReliableMessageProtocol.cpp +++ b/src/messaging/tests/TestReliableMessageProtocol.cpp @@ -2229,10 +2229,10 @@ const nlTest sTests[] = { nlTestSuite sSuite = { "Test-CHIP-ReliableMessageProtocol", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/platform/Darwin/BUILD.gn b/src/platform/Darwin/BUILD.gn index 9dbb8460ae0566..a416e99e5b24d4 100644 --- a/src/platform/Darwin/BUILD.gn +++ b/src/platform/Darwin/BUILD.gn @@ -130,8 +130,8 @@ static_library("Darwin") { "BleConnectionDelegateImpl.mm", "BlePlatformDelegate.h", "BlePlatformDelegateImpl.mm", - "UUIDHelper.h", - "UUIDHelperImpl.mm", + "MTRUUIDHelper.h", + "MTRUUIDHelperImpl.mm", ] } } diff --git a/src/platform/Darwin/BleConnectionDelegateImpl.mm b/src/platform/Darwin/BleConnectionDelegateImpl.mm index 5eb1c4a74aa082..b0c1e2ef70a4bb 100644 --- a/src/platform/Darwin/BleConnectionDelegateImpl.mm +++ b/src/platform/Darwin/BleConnectionDelegateImpl.mm @@ -34,8 +34,8 @@ #include #include +#import "MTRUUIDHelper.h" #import "PlatformMetricKeys.h" -#import "UUIDHelper.h" using namespace chip::Ble; using namespace chip::DeviceLayer; @@ -245,7 +245,7 @@ - (id)initWithQueue:(dispatch_queue_t)queue { self = [super init]; if (self) { - self.shortServiceUUID = [UUIDHelper GetShortestServiceUUID:&chip::Ble::CHIP_BLE_SVC_ID]; + self.shortServiceUUID = [MTRUUIDHelper GetShortestServiceUUID:&chip::Ble::CHIP_BLE_SVC_ID]; _chipWorkQueue = chip::DeviceLayer::PlatformMgrImpl().GetWorkQueue(); _workQueue = queue; _centralManager = [CBCentralManager alloc]; diff --git a/src/platform/Darwin/BlePlatformDelegateImpl.mm b/src/platform/Darwin/BlePlatformDelegateImpl.mm index 210cd872318056..b0d247f058ed7d 100644 --- a/src/platform/Darwin/BlePlatformDelegateImpl.mm +++ b/src/platform/Darwin/BlePlatformDelegateImpl.mm @@ -29,7 +29,7 @@ #include #include -#import "UUIDHelper.h" +#import "MTRUUIDHelper.h" using namespace ::chip; using namespace ::chip::Ble; @@ -47,7 +47,7 @@ return found; } - CBUUID * serviceId = [UUIDHelper GetShortestServiceUUID:svcId]; + CBUUID * serviceId = [MTRUUIDHelper GetShortestServiceUUID:svcId]; CBUUID * characteristicId = [CBUUID UUIDWithData:[NSData dataWithBytes:charId->bytes length:sizeof(charId->bytes)]]; CBPeripheral * peripheral = (__bridge CBPeripheral *) connObj; @@ -74,7 +74,7 @@ return found; } - CBUUID * serviceId = [UUIDHelper GetShortestServiceUUID:svcId]; + CBUUID * serviceId = [MTRUUIDHelper GetShortestServiceUUID:svcId]; CBUUID * characteristicId = characteristicId = [CBUUID UUIDWithData:[NSData dataWithBytes:charId->bytes length:sizeof(charId->bytes)]]; CBPeripheral * peripheral = (__bridge CBPeripheral *) connObj; @@ -131,7 +131,7 @@ return found; } - CBUUID * serviceId = [UUIDHelper GetShortestServiceUUID:svcId]; + CBUUID * serviceId = [MTRUUIDHelper GetShortestServiceUUID:svcId]; CBUUID * characteristicId = [CBUUID UUIDWithData:[NSData dataWithBytes:charId->bytes length:sizeof(charId->bytes)]]; NSData * data = [NSData dataWithBytes:pBuf->Start() length:pBuf->DataLength()]; CBPeripheral * peripheral = (__bridge CBPeripheral *) connObj; diff --git a/src/platform/Darwin/UUIDHelper.h b/src/platform/Darwin/MTRUUIDHelper.h similarity index 95% rename from src/platform/Darwin/UUIDHelper.h rename to src/platform/Darwin/MTRUUIDHelper.h index bf12cf9a92375e..faa0af95809f88 100644 --- a/src/platform/Darwin/UUIDHelper.h +++ b/src/platform/Darwin/MTRUUIDHelper.h @@ -21,6 +21,6 @@ #import -@interface UUIDHelper : NSObject +@interface MTRUUIDHelper : NSObject + (CBUUID *)GetShortestServiceUUID:(const chip::Ble::ChipBleUUID *)svcId; @end diff --git a/src/platform/Darwin/UUIDHelperImpl.mm b/src/platform/Darwin/MTRUUIDHelperImpl.mm similarity index 97% rename from src/platform/Darwin/UUIDHelperImpl.mm rename to src/platform/Darwin/MTRUUIDHelperImpl.mm index 3f5b3df0d7641b..8f1b863a760cf8 100644 --- a/src/platform/Darwin/UUIDHelperImpl.mm +++ b/src/platform/Darwin/MTRUUIDHelperImpl.mm @@ -20,9 +20,9 @@ #error This file must be compiled with ARC. Use -fobjc-arc flag (or convert project to ARC). #endif -#import "UUIDHelper.h" +#import "MTRUUIDHelper.h" -@implementation UUIDHelper +@implementation MTRUUIDHelper + (CBUUID *)GetShortestServiceUUID:(const chip::Ble::ChipBleUUID *)svcId { diff --git a/src/platform/ESP32/BLEManagerImpl.h b/src/platform/ESP32/BLEManagerImpl.h index 3f466fc24ac97b..5308a377c43e6a 100644 --- a/src/platform/ESP32/BLEManagerImpl.h +++ b/src/platform/ESP32/BLEManagerImpl.h @@ -32,16 +32,17 @@ #include -#if CONFIG_BT_BLUEDROID_ENABLED +#ifdef CONFIG_BT_BLUEDROID_ENABLED #include "esp_bt.h" #include "esp_gap_ble_api.h" -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include "esp_gattc_api.h" #endif #include "esp_gatts_api.h" #include -#elif CONFIG_BT_NIMBLE_ENABLED + +#elif defined(CONFIG_BT_NIMBLE_ENABLED) /* min max macros in NimBLE can cause build issues with generic min max * functions defined in CHIP.*/ @@ -60,17 +61,15 @@ struct ble_gatt_char_context void * arg; }; -#endif - -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER && CONFIG_BT_NIMBLE_ENABLED -#include "nimble/blecent.h" -#endif +#endif // CONFIG_BT_BLUEDROID_ENABLED -#include "ble/Ble.h" -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include -#endif +#ifdef CONFIG_BT_NIMBLE_ENABLED +#include "nimble/blecent.h" +#endif // CONFIG_BT_NIMBLE_ENABLED +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER #define MAX_SCAN_RSP_DATA_LEN 31 @@ -78,7 +77,7 @@ namespace chip { namespace DeviceLayer { namespace Internal { -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER enum class BleScanState : uint8_t { kNotScanning, @@ -117,30 +116,30 @@ struct BLEScanConfig void * mAppState = nullptr; }; -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER /** * Concrete implementation of the BLEManager singleton object for the ESP32 platform. */ class BLEManagerImpl final : public BLEManager, private Ble::BleLayer, private Ble::BlePlatformDelegate, -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER private Ble::BleApplicationDelegate, private Ble::BleConnectionDelegate, private ChipDeviceScannerDelegate #else private Ble::BleApplicationDelegate -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER { public: uint8_t scanResponseBuffer[MAX_SCAN_RSP_DATA_LEN]; BLEManagerImpl() {} -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER CHIP_ERROR ConfigureBle(uint32_t aAdapterId, bool aIsCentral); -#if CONFIG_BT_BLUEDROID_ENABLED +#ifdef CONFIG_BT_BLUEDROID_ENABLED static void gattc_profile_event_handler(esp_gattc_cb_event_t event, esp_gatt_if_t gattc_if, esp_ble_gattc_cb_param_t * param); -#endif -#endif +#endif // CONFIG_BT_BLUEDROID_ENABLED +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER CHIP_ERROR ConfigureScanResponseData(ByteSpan data); void ClearScanResponseData(void); @@ -164,10 +163,10 @@ class BLEManagerImpl final : public BLEManager, CHIP_ERROR _SetDeviceName(const char * deviceName); uint16_t _NumConnections(void); void _OnPlatformEvent(const ChipDeviceEvent * event); -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER void HandlePlatformSpecificBLEEvent(const ChipDeviceEvent * event); CHIP_ERROR _SetCHIPoBLEServiceMode(CHIPoBLEServiceMode val); -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER ::chip::Ble::BleLayer * _GetBleLayer(void); // ===== Members that implement virtual methods on BlePlatformDelegate. @@ -191,23 +190,23 @@ class BLEManagerImpl final : public BLEManager, void NotifyChipConnectionClosed(BLE_CONNECTION_OBJECT conId) override; // ===== Members that implement virtual methods on BleConnectionDelegate. -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER void NewConnection(chip::Ble::BleLayer * bleLayer, void * appState, const SetupDiscriminator & connDiscriminator) override; void NewConnection(chip::Ble::BleLayer * bleLayer, void * appState, BLE_CONNECTION_OBJECT connObj) override{}; CHIP_ERROR CancelConnection() override; // ===== Members that implement virtual methods on ChipDeviceScannerDelegate -#if CONFIG_BT_NIMBLE_ENABLED +#ifdef CONFIG_BT_NIMBLE_ENABLED virtual void OnDeviceScanned(const struct ble_hs_adv_fields & fields, const ble_addr_t & addr, const chip::Ble::ChipBLEDeviceIdentificationInfo & info) override; -#elif CONFIG_BT_BLUEDROID_ENABLED +#elif defined(CONFIG_BT_BLUEDROID_ENABLED) virtual void OnDeviceScanned(esp_ble_addr_type_t & addr_type, esp_bd_addr_t & addr, const chip::Ble::ChipBLEDeviceIdentificationInfo & info) override; -#endif +#endif // CONFIG_BT_NIMBLE_ENABLED void OnScanComplete() override; -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER // ===== Members for internal use by the following friends. friend BLEManager & BLEMgr(void); @@ -240,12 +239,12 @@ class BLEManagerImpl final : public BLEManager, kMaxDeviceNameLength = 16 }; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER BLEAdvConfig mBLEAdvConfig; -#endif -#if CONFIG_BT_NIMBLE_ENABLED +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_BT_NIMBLE_ENABLED uint16_t mSubscribedConIds[kMaxConnections]; -#endif +#endif // CONFIG_BT_NIMBLE_ENABLED struct CHIPoBLEConState { @@ -278,11 +277,11 @@ class BLEManagerImpl final : public BLEManager, CHIPoBLEConState mCons[kMaxConnections]; CHIPoBLEServiceMode mServiceMode; -#if CONFIG_BT_BLUEDROID_ENABLED +#ifdef CONFIG_BT_BLUEDROID_ENABLED esp_gatt_if_t mAppIf; -#elif CONFIG_BT_NIMBLE_ENABLED +#elif defined(CONFIG_BT_NIMBLE_ENABLED) uint16_t mNumGAPCons; -#endif +#endif // CONFIG_BT_BLUEDROID_ENABLED uint16_t mServiceAttrHandle; uint16_t mRXCharAttrHandle; uint16_t mTXCharAttrHandle; @@ -303,7 +302,7 @@ class BLEManagerImpl final : public BLEManager, void CancelBleAdvTimeoutTimer(void); static void BleAdvTimeoutHandler(TimerHandle_t xTimer); -#if CONFIG_BT_BLUEDROID_ENABLED +#ifdef CONFIG_BT_BLUEDROID_ENABLED void HandleGATTControlEvent(esp_gatts_cb_event_t event, esp_gatt_if_t gatts_if, esp_ble_gatts_cb_param_t * param); void HandleGATTCommEvent(esp_gatts_cb_event_t event, esp_gatt_if_t gatts_if, esp_ble_gatts_cb_param_t * param); void HandleRXCharWrite(esp_ble_gatts_cb_param_t * param); @@ -314,7 +313,7 @@ class BLEManagerImpl final : public BLEManager, void HandleDisconnect(esp_ble_gatts_cb_param_t * param); CHIPoBLEConState * GetConnectionState(uint16_t conId, bool allocate = false); bool ReleaseConnectionState(uint16_t conId); -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER CHIP_ERROR HandleGAPConnect(esp_ble_gattc_cb_param_t p_data); CHIP_ERROR HandleGAPCentralConnect(esp_ble_gattc_cb_param_t p_data); @@ -326,7 +325,7 @@ class BLEManagerImpl final : public BLEManager, static void HandleGATTEvent(esp_gatts_cb_event_t event, esp_gatt_if_t gatts_if, esp_ble_gatts_cb_param_t * param); static void HandleGAPEvent(esp_gap_ble_cb_event_t event, esp_ble_gap_cb_param_t * param); -#elif CONFIG_BT_NIMBLE_ENABLED +#elif defined(CONFIG_BT_NIMBLE_ENABLED) CHIP_ERROR DeinitBLE(); static void ClaimBLEMemory(System::Layer *, void *); @@ -361,7 +360,7 @@ class BLEManagerImpl final : public BLEManager, void HandleC3CharRead(struct ble_gatt_char_context * param); #endif /* CHIP_ENABLE_ADDITIONAL_DATA_ADVERTISING */ -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER static int btshell_on_mtu(uint16_t conn_handle, const struct ble_gatt_error * error, uint16_t mtu, void * arg); bool SubOrUnsubChar(BLE_CONNECTION_OBJECT conId, const Ble::ChipBleUUID * svcId, const Ble::ChipBleUUID * charId, @@ -370,9 +369,9 @@ class BLEManagerImpl final : public BLEManager, static void OnGattDiscComplete(const struct peer * peer, int status, void * arg); static void HandleConnectFailed(CHIP_ERROR error); CHIP_ERROR HandleRXNotify(struct ble_gap_event * event); -#endif -#endif -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#endif // CONFIG_BT_NIMBLE_ENABLED +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER static void CancelConnect(void); static void HandleConnectTimeout(chip::System::Layer *, void * context); void InitiateScan(BleScanState scanType); @@ -382,7 +381,7 @@ class BLEManagerImpl final : public BLEManager, void CleanScanConfig(); BLEScanConfig mBLEScanConfig; bool mIsCentral; -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER static void DriveBLEState(intptr_t arg); }; diff --git a/src/platform/ESP32/BUILD.gn b/src/platform/ESP32/BUILD.gn index 167d0eb6bc139c..1b84a21b06d9d7 100644 --- a/src/platform/ESP32/BUILD.gn +++ b/src/platform/ESP32/BUILD.gn @@ -204,5 +204,8 @@ static_library("ESP32") { ] } - cflags = [ "-Wconversion" ] + cflags = [ + "-Wconversion", + "-Wundef", + ] } diff --git a/src/platform/ESP32/CHIPDevicePlatformConfig.h b/src/platform/ESP32/CHIPDevicePlatformConfig.h index 273fd562d60883..e6d7870c35fda6 100644 --- a/src/platform/ESP32/CHIPDevicePlatformConfig.h +++ b/src/platform/ESP32/CHIPDevicePlatformConfig.h @@ -48,13 +48,20 @@ #endif /* CHIP_DEVICE_CONFIG_DEVICE_PRODUCT_ID */ +#ifdef CONFIG_ENABLE_MATTER_OVER_THREAD #define CHIP_DEVICE_CONFIG_ENABLE_THREAD CONFIG_ENABLE_MATTER_OVER_THREAD +#else +#define CHIP_DEVICE_CONFIG_ENABLE_THREAD 0 +#endif // CONFIG_ENABLE_MATTER_OVER_THREAD + #define CHIP_DEVICE_CONFIG_ENABLE_THREAD_SRP_CLIENT CONFIG_OPENTHREAD_SRP_CLIENT #define CHIP_DEVICE_CONFIG_ENABLE_THREAD_DNS_CLIENT CONFIG_OPENTHREAD_DNS_CLIENT -#if CONFIG_ENABLE_ETHERNET_TELEMETRY +#ifdef CONFIG_ENABLE_ETHERNET_TELEMETRY #define CHIP_DEVICE_CONFIG_ENABLE_ETHERNET 1 -#endif +#else +#define CHIP_DEVICE_CONFIG_ENABLE_ETHERNET 0 +#endif // CONFIG_ENABLE_ETHERNET_TELEMETRY #define CHIP_DEVICE_CONFIG_ENABLE_WIFI CHIP_DEVICE_CONFIG_ENABLE_WIFI_AP | CHIP_DEVICE_CONFIG_ENABLE_WIFI_STATION #if CHIP_DEVICE_CONFIG_ENABLE_WIFI @@ -72,14 +79,29 @@ #endif /* CHIP_DEVICE_CONFIG_ENABLE_WIFI_AP */ #endif // CHIP_DEVICE_CONFIG_ENABLE_WIFI -#if CONFIG_ENABLE_ICD_SERVER +#ifdef CONFIG_ENABLE_ICD_SERVER #define CHIP_DEVICE_CONFIG_ICD_SLOW_POLL_INTERVAL chip::System::Clock::Milliseconds32(CONFIG_ICD_SLOW_POLL_INTERVAL_MS) #define CHIP_DEVICE_CONFIG_ICD_FAST_POLL_INTERVAL chip::System::Clock::Milliseconds32(CONFIG_ICD_FAST_POLL_INTERVAL_MS) #endif // CHIP_CONFIG_ENABLE_ICD_SERVER +#ifdef CONFIG_ENABLE_CHIPOBLE #define CHIP_DEVICE_CONFIG_ENABLE_CHIPOBLE CONFIG_ENABLE_CHIPOBLE +#else +#define CHIP_DEVICE_CONFIG_ENABLE_CHIPOBLE 0 +#endif // CONFIG_ENABLE_CHIPOBLE + +#ifdef CONFIG_ENABLE_EXTENDED_DISCOVERY #define CHIP_DEVICE_CONFIG_ENABLE_EXTENDED_DISCOVERY CONFIG_ENABLE_EXTENDED_DISCOVERY +#else +#define CHIP_DEVICE_CONFIG_ENABLE_EXTENDED_DISCOVERY 0 +#endif // CONFIG_ENABLE_EXTENDED_DISCOVERY + +#ifdef CONFIG_ENABLE_COMMISSIONABLE_DEVICE_TYPE #define CHIP_DEVICE_CONFIG_ENABLE_COMMISSIONABLE_DEVICE_TYPE CONFIG_ENABLE_COMMISSIONABLE_DEVICE_TYPE +#else +#define CHIP_DEVICE_CONFIG_ENABLE_COMMISSIONABLE_DEVICE_TYPE 0 +#endif // CONFIG_ENABLE_COMMISSIONABLE_DEVICE_TYPE + #define CHIP_DEVICE_CONFIG_BLE_DEVICE_NAME_PREFIX CONFIG_BLE_DEVICE_NAME_PREFIX #define CHIP_DEVICE_CONFIG_BLE_FAST_ADVERTISING_INTERVAL_MIN CONFIG_BLE_FAST_ADVERTISING_INTERVAL_MIN #define CHIP_DEVICE_CONFIG_BLE_FAST_ADVERTISING_INTERVAL_MAX CONFIG_BLE_FAST_ADVERTISING_INTERVAL_MAX @@ -92,8 +114,19 @@ #define CHIP_DEVICE_CONFIG_SERVICE_PROVISIONING_REQUEST_TIMEOUT CONFIG_SERVICE_PROVISIONING_REQUEST_TIMEOUT #define CHIP_DEVICE_CONFIG_ENABLE_TEST_SETUP_PARAMS CONFIG_ENABLE_TEST_SETUP_PARAMS #define CHIP_DEVICE_CONFIG_TEST_SERIAL_NUMBER CONFIG_USE_TEST_SERIAL_NUMBER + +#ifdef CONFIG_ENABLE_THREAD_TELEMETRY #define CHIP_DEVICE_CONFIG_ENABLE_THREAD_TELEMETRY CONFIG_ENABLE_THREAD_TELEMETRY +#else +#define CHIP_DEVICE_CONFIG_ENABLE_THREAD_TELEMETRY 0 +#endif // CONFIG_ENABLE_THREAD_TELEMETRY + +#ifdef CONFIG_ENABLE_THREAD_TELEMETRY_FULL #define CHIP_DEVICE_CONFIG_ENABLE_THREAD_TELEMETRY_FULL CONFIG_ENABLE_THREAD_TELEMETRY_FULL +#else +#define CHIP_DEVICE_CONFIG_ENABLE_THREAD_TELEMETRY_FULL 0 +#endif // CONFIG_ENABLE_THREAD_TELEMETRY_FULL + #define CHIP_DEVICE_CONFIG_EVENT_LOGGING_CRIT_BUFFER_SIZE CONFIG_EVENT_LOGGING_CRIT_BUFFER_SIZE #define CHIP_DEVICE_CONFIG_EVENT_LOGGING_INFO_BUFFER_SIZE CONFIG_EVENT_LOGGING_INFO_BUFFER_SIZE #define CHIP_DEVICE_CONFIG_EVENT_LOGGING_DEBUG_BUFFER_SIZE CONFIG_EVENT_LOGGING_DEBUG_BUFFER_SIZE @@ -105,10 +138,20 @@ #define CHIP_DEVICE_CONFIG_DISCOVERY_TIMEOUT_SECS CONFIG_CHIP_DISCOVERY_TIMEOUT_SECS #define CHIP_DEVICE_CONFIG_ENABLE_BOTH_COMMISSIONER_AND_COMMISSIONEE CONFIG_ENABLE_ESP32_BLE_CONTROLLER #define CHIP_DEVICE_CONFIG_ENABLE_PAIRING_AUTOSTART CONFIG_CHIP_ENABLE_PAIRING_AUTOSTART + +#ifdef CONFIG_ENABLE_BLE_EXT_ANNOUNCEMENT #define CHIP_DEVICE_CONFIG_BLE_EXT_ADVERTISING CONFIG_ENABLE_BLE_EXT_ANNOUNCEMENT +#else +#define CHIP_DEVICE_CONFIG_BLE_EXT_ADVERTISING 0 +#endif // Options for background chip task +#ifdef CONFIG_ENABLE_BG_EVENT_PROCESSING #define CHIP_DEVICE_CONFIG_ENABLE_BG_EVENT_PROCESSING CONFIG_ENABLE_BG_EVENT_PROCESSING +#else +#define CHIP_DEVICE_CONFIG_ENABLE_BG_EVENT_PROCESSING 0 +#endif // CONFIG_ENABLE_BG_EVENT_PROCESSING + #define CHIP_DEVICE_CONFIG_BG_TASK_PRIORITY CONFIG_BG_CHIP_TASK_PRIORITY #define CHIP_DEVICE_CONFIG_BG_MAX_EVENT_QUEUE_SIZE CONFIG_BG_MAX_EVENT_QUEUE_SIZE #define CHIP_DEVICE_CONFIG_BG_TASK_STACK_SIZE CONFIG_BG_CHIP_TASK_STACK_SIZE diff --git a/src/platform/ESP32/CHIPDevicePlatformEvent.h b/src/platform/ESP32/CHIPDevicePlatformEvent.h index b7664ef8c69145..7aad43df14add4 100644 --- a/src/platform/ESP32/CHIPDevicePlatformEvent.h +++ b/src/platform/ESP32/CHIPDevicePlatformEvent.h @@ -44,7 +44,7 @@ enum kESPSystemEvent = kRange_PublicPlatformSpecific, }; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER /** * Enumerates ESP32 platform-specific event types that are internal to the Chip Device Layer. */ @@ -58,7 +58,7 @@ enum InternalPlatformSpecificEventTypes kPlatformESP32BLEIndicationReceived, }; -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER } // namespace DeviceEventType /** @@ -89,7 +89,7 @@ struct ChipDevicePlatformEvent final wifi_event_ap_probe_req_rx_t WiFiApProbeReqRecved; } Data; } ESPSystemEvent; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER struct { BLE_CONNECTION_OBJECT mConnection; @@ -112,7 +112,7 @@ struct ChipDevicePlatformEvent final BLE_CONNECTION_OBJECT mConnection; chip::System::PacketBuffer * mData; } BLEIndicationReceived; -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER }; }; diff --git a/src/platform/ESP32/CHIPPlatformConfig.h b/src/platform/ESP32/CHIPPlatformConfig.h index bed7cb02357b3e..82b6a6262a1e1b 100644 --- a/src/platform/ESP32/CHIPPlatformConfig.h +++ b/src/platform/ESP32/CHIPPlatformConfig.h @@ -58,7 +58,12 @@ #define CHIP_DISPATCH_EVENT_LONG_DISPATCH_TIME_WARNING_THRESHOLD_MS CONFIG_DISPATCH_EVENT_LONG_DISPATCH_TIME_WARNING_THRESHOLD_MS #define CHIP_CONFIG_MAX_UNSOLICITED_MESSAGE_HANDLERS CONFIG_MAX_UNSOLICITED_MESSAGE_HANDLERS #define CHIP_CONFIG_MAX_EXCHANGE_CONTEXTS CONFIG_MAX_EXCHANGE_CONTEXTS + +#ifdef CONFIG_SECURITY_TEST_MODE #define CHIP_CONFIG_SECURITY_TEST_MODE CONFIG_SECURITY_TEST_MODE +#else +#define CHIP_CONFIG_SECURITY_TEST_MODE 0 +#endif // CONFIG_SECURITY_TEST_MODE #ifndef CHIP_CONFIG_MAX_FABRICS #define CHIP_CONFIG_MAX_FABRICS CONFIG_MAX_FABRICS @@ -76,7 +81,7 @@ #define CHIP_DEVICE_CONFIG_ENABLE_WIFI_AP 0 #endif -#if CONFIG_ENABLE_ICD_SERVER +#ifdef CONFIG_ENABLE_ICD_SERVER #ifndef CHIP_CONFIG_ICD_IDLE_MODE_DURATION_SEC #define CHIP_CONFIG_ICD_IDLE_MODE_DURATION_SEC CONFIG_ICD_IDLE_MODE_INTERVAL_SEC diff --git a/src/platform/ESP32/ChipDeviceScanner.h b/src/platform/ESP32/ChipDeviceScanner.h index 601e1ac6bab0b0..d921ba08e859a2 100644 --- a/src/platform/ESP32/ChipDeviceScanner.h +++ b/src/platform/ESP32/ChipDeviceScanner.h @@ -20,9 +20,9 @@ #include #include -#if CONFIG_BT_NIMBLE_ENABLED +#ifdef CONFIG_BT_NIMBLE_ENABLED #include "host/ble_hs.h" -#elif CONFIG_BT_BLUEDROID_ENABLED +#elif defined(CONFIG_BT_BLUEDROID_ENABLED) #include "esp_bt.h" #include "esp_bt_main.h" #include "esp_gap_ble_api.h" @@ -47,7 +47,7 @@ class ChipDeviceScannerDelegate virtual ~ChipDeviceScannerDelegate() {} // Called when a CHIP device was found -#if CONFIG_BT_NIMBLE_ENABLED +#ifdef CONFIG_BT_NIMBLE_ENABLED virtual void OnDeviceScanned(const struct ble_hs_adv_fields & fields, const ble_addr_t & addr, const chip::Ble::ChipBLEDeviceIdentificationInfo & info) = 0; #else @@ -90,7 +90,7 @@ class ChipDeviceScanner CHIP_ERROR StopScan(); bool mIsScanning = false; -#if CONFIG_BT_NIMBLE_ENABLED +#ifdef CONFIG_BT_NIMBLE_ENABLED void ReportDevice(const struct ble_hs_adv_fields & fields, const ble_addr_t & addr); #else void ReportDevice(esp_ble_gap_cb_param_t & fields, esp_bd_addr_t & addr); diff --git a/src/platform/ESP32/ConfigurationManagerImpl.cpp b/src/platform/ESP32/ConfigurationManagerImpl.cpp index 62dc02cba74628..55c8758bb85fe7 100644 --- a/src/platform/ESP32/ConfigurationManagerImpl.cpp +++ b/src/platform/ESP32/ConfigurationManagerImpl.cpp @@ -223,7 +223,7 @@ CHIP_ERROR ConfigurationManagerImpl::GetSoftwareVersion(uint32_t & softwareVer) CHIP_ERROR ConfigurationManagerImpl::GetLocationCapability(uint8_t & location) { -#if CONFIG_ENABLE_ESP32_LOCATIONCAPABILITY +#ifdef CONFIG_ENABLE_ESP32_LOCATIONCAPABILITY uint32_t value = 0; CHIP_ERROR err = ReadConfigValue(ESP32Config::kConfigKey_LocationCapability, value); @@ -237,7 +237,7 @@ CHIP_ERROR ConfigurationManagerImpl::GetLocationCapability(uint8_t & location) #else location = static_cast(chip::app::Clusters::GeneralCommissioning::RegulatoryLocationTypeEnum::kIndoor); return CHIP_NO_ERROR; -#endif +#endif // CONFIG_ENABLE_ESP32_LOCATIONCAPABILITY } CHIP_ERROR ConfigurationManagerImpl::StoreCountryCode(const char * code, size_t codeLen) @@ -246,7 +246,7 @@ CHIP_ERROR ConfigurationManagerImpl::StoreCountryCode(const char * code, size_t VerifyOrReturnError((code != nullptr) && (codeLen == 2), CHIP_ERROR_INVALID_ARGUMENT); // Setting country is only possible on WiFi supported SoCs -#if CONFIG_ESP32_WIFI_ENABLED +#ifdef CONFIG_ESP32_WIFI_ENABLED // Write CountryCode to esp_phy layer ReturnErrorOnFailure(MapConfigError(esp_phy_update_country_info(code))); #endif diff --git a/src/platform/ESP32/ConfigurationManagerImpl.h b/src/platform/ESP32/ConfigurationManagerImpl.h index 3779ac816dc463..1416df35d93b65 100644 --- a/src/platform/ESP32/ConfigurationManagerImpl.h +++ b/src/platform/ESP32/ConfigurationManagerImpl.h @@ -25,6 +25,8 @@ #pragma once +#include + #include #include #if CHIP_DEVICE_CONFIG_ENABLE_CHIPOBLE diff --git a/src/platform/ESP32/ConnectivityManagerImpl.h b/src/platform/ESP32/ConnectivityManagerImpl.h index 0add13da49886c..e2940173b135ce 100644 --- a/src/platform/ESP32/ConnectivityManagerImpl.h +++ b/src/platform/ESP32/ConnectivityManagerImpl.h @@ -20,6 +20,7 @@ #pragma once #include +#include #include #include diff --git a/src/platform/ESP32/ConnectivityManagerImpl_WiFi.cpp b/src/platform/ESP32/ConnectivityManagerImpl_WiFi.cpp index 3810862a0f57b6..a3e369a85917aa 100644 --- a/src/platform/ESP32/ConnectivityManagerImpl_WiFi.cpp +++ b/src/platform/ESP32/ConnectivityManagerImpl_WiFi.cpp @@ -1108,7 +1108,7 @@ void ConnectivityManagerImpl::OnStationIPv6AddressAvailable(const ip_event_got_i event.InterfaceIpAddressChanged.Type = InterfaceIpChangeType::kIpV6_Assigned; PlatformMgr().PostEventOrDie(&event); -#if CONFIG_ENABLE_ENDPOINT_QUEUE_FILTER +#ifdef CONFIG_ENABLE_ENDPOINT_QUEUE_FILTER uint8_t station_mac[6]; if (esp_wifi_get_mac(WIFI_IF_STA, station_mac) == ESP_OK) { @@ -1136,7 +1136,7 @@ void ConnectivityManagerImpl::OnStationIPv6AddressAvailable(const ip_event_got_i } #endif // CONFIG_ENABLE_ENDPOINT_QUEUE_FILTER -#if CONFIG_ENABLE_ROUTE_HOOK +#ifdef CONFIG_ENABLE_ROUTE_HOOK esp_route_hook_init(esp_netif_get_handle_from_ifkey(ESP32Utils::kDefaultWiFiStationNetifKey)); #endif } diff --git a/src/platform/ESP32/DiagnosticDataProviderImpl.cpp b/src/platform/ESP32/DiagnosticDataProviderImpl.cpp index ff36ca21662152..154be055d92e9c 100644 --- a/src/platform/ESP32/DiagnosticDataProviderImpl.cpp +++ b/src/platform/ESP32/DiagnosticDataProviderImpl.cpp @@ -230,14 +230,14 @@ CHIP_ERROR DiagnosticDataProviderImpl::GetNetworkInterfaces(NetworkInterface ** { ifp->hardwareAddress = ByteSpan(ifp->MacAddress, 6); } -#if !CONFIG_DISABLE_IPV4 +#ifndef CONFIG_DISABLE_IPV4 if (esp_netif_get_ip_info(ifa, &ipv4_info) == ESP_OK) { memcpy(ifp->Ipv4AddressesBuffer[0], &(ipv4_info.ip.addr), kMaxIPv4AddrSize); ifp->Ipv4AddressSpans[0] = ByteSpan(ifp->Ipv4AddressesBuffer[0], kMaxIPv4AddrSize); ifp->IPv4Addresses = app::DataModel::List(ifp->Ipv4AddressSpans, 1); } -#endif +#endif // !defined(CONFIG_DISABLE_IPV4) static_assert(kMaxIPv6AddrCount <= UINT8_MAX, "Count might not fit in ipv6_addr_count"); static_assert(ArraySize(ip6_addr) >= LWIP_IPV6_NUM_ADDRESSES, "Not enough space for our addresses."); diff --git a/src/platform/ESP32/ESP32SecureCertDACProvider.cpp b/src/platform/ESP32/ESP32SecureCertDACProvider.cpp index a1bdedf03e1711..f9c2f242ec3a47 100644 --- a/src/platform/ESP32/ESP32SecureCertDACProvider.cpp +++ b/src/platform/ESP32/ESP32SecureCertDACProvider.cpp @@ -23,13 +23,13 @@ #include #include -#if CONFIG_USE_ESP32_ECDSA_PERIPHERAL +#ifdef CONFIG_USE_ESP32_ECDSA_PERIPHERAL #include #endif // CONFIG_USE_ESP32_ECDSA_PERIPHERAL #define TAG "dac_provider" -#if CONFIG_SEC_CERT_DAC_PROVIDER +#ifdef CONFIG_SEC_CERT_DAC_PROVIDER namespace chip { namespace DeviceLayer { @@ -139,7 +139,7 @@ CHIP_ERROR ESP32SecureCertDACProvider ::SignWithDeviceAttestationKey(const ByteS // This flow is for devices supporting ECDSA peripheral if (keyType == ESP_SECURE_CERT_ECDSA_PERIPHERAL_KEY) { -#if CONFIG_USE_ESP32_ECDSA_PERIPHERAL +#ifdef CONFIG_USE_ESP32_ECDSA_PERIPHERAL Crypto::ESP32P256Keypair keypair; uint8_t efuseBlockId; @@ -163,7 +163,7 @@ CHIP_ERROR ESP32SecureCertDACProvider ::SignWithDeviceAttestationKey(const ByteS } else // This flow is for devices which do not support ECDSA peripheral { -#if !CONFIG_USE_ESP32_ECDSA_PERIPHERAL +#ifndef CONFIG_USE_ESP32_ECDSA_PERIPHERAL Crypto::P256Keypair keypair; char * sc_keypair = NULL; uint32_t sc_keypair_len = 0; diff --git a/src/platform/ESP32/OTAImageProcessorImpl.cpp b/src/platform/ESP32/OTAImageProcessorImpl.cpp index 51e9fe50468d22..73ba759c87c599 100644 --- a/src/platform/ESP32/OTAImageProcessorImpl.cpp +++ b/src/platform/ESP32/OTAImageProcessorImpl.cpp @@ -27,7 +27,7 @@ #include "esp_system.h" #include "lib/core/CHIPError.h" -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA #include #endif // CONFIG_ENABLE_ENCRYPTED_OTA @@ -150,7 +150,7 @@ void OTAImageProcessorImpl::HandlePrepareDownload(intptr_t context) return; } -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA CHIP_ERROR chipError = imageProcessor->DecryptStart(); if (chipError != CHIP_NO_ERROR) { @@ -171,7 +171,7 @@ void OTAImageProcessorImpl::HandleFinalize(intptr_t context) auto * imageProcessor = reinterpret_cast(context); VerifyOrReturn(imageProcessor, ChipLogError(SoftwareUpdate, "ImageProcessor context is null")); -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA if (CHIP_NO_ERROR != imageProcessor->DecryptEnd()) { ChipLogError(SoftwareUpdate, "Failed to end pre encrypted OTA"); @@ -213,7 +213,7 @@ void OTAImageProcessorImpl::HandleAbort(intptr_t context) return; } -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA imageProcessor->DecryptAbort(); #endif // CONFIG_ENABLE_ENCRYPTED_OTA @@ -253,7 +253,7 @@ void OTAImageProcessorImpl::HandleProcessBlock(intptr_t context) esp_err_t err; ByteSpan blockToWrite = block; -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA error = imageProcessor->DecryptBlock(block, blockToWrite); if (error != CHIP_NO_ERROR) { @@ -266,7 +266,7 @@ void OTAImageProcessorImpl::HandleProcessBlock(intptr_t context) err = esp_ota_write(imageProcessor->mOTAUpdateHandle, blockToWrite.data(), blockToWrite.size()); -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA free((void *) (blockToWrite.data())); #endif // CONFIG_ENABLE_ENCRYPTED_OTA @@ -297,7 +297,7 @@ void OTAImageProcessorImpl::HandleApply(intptr_t context) PostOTAStateChangeEvent(DeviceLayer::kOtaApplyComplete); -#if CONFIG_OTA_AUTO_REBOOT_ON_APPLY +#ifdef CONFIG_OTA_AUTO_REBOOT_ON_APPLY // HandleApply is called after delayed action time seconds are elapsed, so it would be safe to schedule the restart DeviceLayer::SystemLayer().StartTimer(System::Clock::Milliseconds32(CONFIG_OTA_AUTO_REBOOT_DELAY_MS), HandleRestart, nullptr); #else @@ -362,7 +362,7 @@ CHIP_ERROR OTAImageProcessorImpl::ProcessHeader(ByteSpan & block) return CHIP_NO_ERROR; } -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA CHIP_ERROR OTAImageProcessorImpl::InitEncryptedOTA(const CharSpan & key) { VerifyOrReturnError(mEncryptedOTAEnabled == false, CHIP_ERROR_INCORRECT_STATE); diff --git a/src/platform/ESP32/OTAImageProcessorImpl.h b/src/platform/ESP32/OTAImageProcessorImpl.h index 4162711eef847a..c33407dad74511 100644 --- a/src/platform/ESP32/OTAImageProcessorImpl.h +++ b/src/platform/ESP32/OTAImageProcessorImpl.h @@ -23,7 +23,7 @@ #include #include -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA #include #endif // CONFIG_ENABLE_ENCRYPTED_OTA @@ -42,7 +42,7 @@ class OTAImageProcessorImpl : public OTAImageProcessorInterface bool IsFirstImageRun() override; CHIP_ERROR ConfirmCurrentImage() override; -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA // @brief This API initializes the handling of encrypted OTA image // @param key null terminated RSA-3072 key in PEM format // @return CHIP_NO_ERROR on success, appropriate error code otherwise @@ -66,7 +66,7 @@ class OTAImageProcessorImpl : public OTAImageProcessorInterface esp_ota_handle_t mOTAUpdateHandle; OTAImageHeaderParser mHeaderParser; -#if CONFIG_ENABLE_ENCRYPTED_OTA +#ifdef CONFIG_ENABLE_ENCRYPTED_OTA CHIP_ERROR DecryptStart(); CHIP_ERROR DecryptEnd(); void DecryptAbort(); diff --git a/src/platform/ESP32/OpenthreadLauncher.cpp b/src/platform/ESP32/OpenthreadLauncher.cpp index 8c76c1db809082..ed04692cbed08e 100644 --- a/src/platform/ESP32/OpenthreadLauncher.cpp +++ b/src/platform/ESP32/OpenthreadLauncher.cpp @@ -161,7 +161,7 @@ esp_err_t openthread_init_stack(void) assert(s_platform_config); // Initialize the OpenThread stack ESP_ERROR_CHECK(esp_openthread_init(s_platform_config)); -#if CONFIG_OPENTHREAD_CLI +#ifdef CONFIG_OPENTHREAD_CLI esp_openthread_matter_cli_init(); cli_command_transmit_task(); #endif diff --git a/src/platform/ESP32/SystemTimeSupport.cpp b/src/platform/ESP32/SystemTimeSupport.cpp index c303c7420c42c0..613e79b6067858 100644 --- a/src/platform/ESP32/SystemTimeSupport.cpp +++ b/src/platform/ESP32/SystemTimeSupport.cpp @@ -50,7 +50,7 @@ Milliseconds64 ClockImpl::GetMonotonicMilliseconds64(void) CHIP_ERROR ClockImpl::GetClock_RealTime(Microseconds64 & aCurTime) { -#if CONFIG_ENABLE_SNTP_TIME_SYNC +#ifdef CONFIG_ENABLE_SNTP_TIME_SYNC struct timeval tv; if (gettimeofday(&tv, nullptr) != 0) { @@ -69,7 +69,7 @@ CHIP_ERROR ClockImpl::GetClock_RealTime(Microseconds64 & aCurTime) return CHIP_NO_ERROR; #else return CHIP_ERROR_UNSUPPORTED_CHIP_FEATURE; -#endif +#endif // CONFIG_ENABLE_SNTP_TIME_SYNC } CHIP_ERROR ClockImpl::GetClock_RealTimeMS(Milliseconds64 & aCurTime) diff --git a/src/platform/ESP32/bluedroid/BLEManagerImpl.cpp b/src/platform/ESP32/bluedroid/BLEManagerImpl.cpp index 72d738df7e3293..3e5cc6091e9314 100644 --- a/src/platform/ESP32/bluedroid/BLEManagerImpl.cpp +++ b/src/platform/ESP32/bluedroid/BLEManagerImpl.cpp @@ -28,25 +28,25 @@ #if CHIP_DEVICE_CONFIG_ENABLE_CHIPOBLE #include "sdkconfig.h" -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include #endif -#if CONFIG_BT_BLUEDROID_ENABLED +#ifdef CONFIG_BT_BLUEDROID_ENABLED -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include #endif #include #include #include -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include #include #include #endif #include -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include #include #endif @@ -79,7 +79,7 @@ struct ESP32ChipServiceData ChipBLEDeviceIdentificationInfo DeviceIdInfo; }; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER static constexpr uint16_t kNewConnectionScanTimeout = 60; static constexpr uint16_t kConnectTimeout = 20; #endif @@ -96,7 +96,7 @@ const uint8_t UUID_CHIPoBLEChar_RX[] = { 0x11, 0x9D, 0x9F, 0x42, 0x9C, 0x4F 0x59, 0x45, 0x3D, 0x26, 0xF5, 0x2E, 0xEE, 0x18 }; const uint8_t UUID_CHIPoBLEChar_TX[] = { 0x12, 0x9D, 0x9F, 0x42, 0x9C, 0x4F, 0x9F, 0x95, 0x59, 0x45, 0x3D, 0x26, 0xF5, 0x2E, 0xEE, 0x18 }; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER const uint8_t ShortUUID_CHIPoBLE_CharTx_Desc[] = { 0x02, 0x29 }; #endif const ChipBleUUID ChipUUID_CHIPoBLEChar_RX = { { 0x18, 0xEE, 0x2E, 0xF5, 0x26, 0x3D, 0x45, 0x59, 0x95, 0x9F, 0x4F, 0x9C, 0x42, 0x9F, @@ -147,12 +147,12 @@ const uint16_t CHIPoBLEGATTAttrCount = sizeof(CHIPoBLEGATTAttrs) / sizeof(CHIPoB } // unnamed namespace -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER ChipDeviceScanner & mDeviceScanner = Internal::ChipDeviceScanner::GetInstance(); #endif BLEManagerImpl BLEManagerImpl::sInstance; constexpr System::Clock::Timeout BLEManagerImpl::kFastAdvertiseTimeout; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER static esp_gattc_char_elem_t * char_elem_result = NULL; static esp_gattc_descr_elem_t * descr_elem_result = NULL; @@ -203,7 +203,7 @@ CHIP_ERROR BLEManagerImpl::_Init() CHIP_ERROR err; // Initialize the Chip BleLayer. -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER err = BleLayer::Init(this, this, this, &DeviceLayer::SystemLayer()); #else err = BleLayer::Init(this, this, &DeviceLayer::SystemLayer()); @@ -217,7 +217,7 @@ CHIP_ERROR BLEManagerImpl::_Init() mRXCharAttrHandle = 0; mTXCharAttrHandle = 0; mTXCharCCCDAttrHandle = 0; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER mFlags.ClearAll().Set(Flags::kAdvertisingEnabled, CHIP_DEVICE_CONFIG_CHIPOBLE_ENABLE_ADVERTISING_AUTOSTART && !mIsCentral); mFlags.Set(Flags::kFastAdvertisingEnabled, !mIsCentral); #else @@ -360,14 +360,14 @@ void BLEManagerImpl::_OnPlatformEvent(const ChipDeviceEvent * event) break; default: -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER HandlePlatformSpecificBLEEvent(event); #endif break; } } -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER void BLEManagerImpl::HandlePlatformSpecificBLEEvent(const ChipDeviceEvent * apEvent) { CHIP_ERROR err = CHIP_NO_ERROR; @@ -743,7 +743,7 @@ void BLEManagerImpl::ConnectDevice(esp_bd_addr_t & addr, esp_ble_addr_type_t add bool BLEManagerImpl::SubscribeCharacteristic(BLE_CONNECTION_OBJECT conId, const ChipBleUUID * svcId, const ChipBleUUID * charId) { -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER uint8_t value[2]; int rc; @@ -771,7 +771,7 @@ bool BLEManagerImpl::SubscribeCharacteristic(BLE_CONNECTION_OBJECT conId, const bool BLEManagerImpl::UnsubscribeCharacteristic(BLE_CONNECTION_OBJECT conId, const ChipBleUUID * svcId, const ChipBleUUID * charId) { -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER uint8_t value[2]; int rc; @@ -813,7 +813,7 @@ bool BLEManagerImpl::CloseConnection(BLE_CONNECTION_OBJECT conId) // Release the associated connection state record. ReleaseConnectionState(conId); -#if !CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifndef CONFIG_ENABLE_ESP32_BLE_CONTROLLER // Force a refresh of the advertising state. mFlags.Set(Flags::kAdvertisingRefreshNeeded); mFlags.Clear(Flags::kAdvertisingConfigured); @@ -840,7 +840,7 @@ bool BLEManagerImpl::SendIndication(BLE_CONNECTION_OBJECT conId, const ChipBleUU VerifyOrExit(conState != NULL, err = CHIP_ERROR_INVALID_ARGUMENT); VerifyOrExit(conState->PendingIndBuf.IsNull(), err = CHIP_ERROR_INCORRECT_STATE); -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER ChipLogDetail(Ble, "Sending indication for CHIPoBLE TX characteristic (con %u, len %u)", conId, data->DataLength()); #endif @@ -869,7 +869,7 @@ bool BLEManagerImpl::SendIndication(BLE_CONNECTION_OBJECT conId, const ChipBleUU bool BLEManagerImpl::SendWriteRequest(BLE_CONNECTION_OBJECT conId, const ChipBleUUID * svcId, const ChipBleUUID * charId, PacketBufferHandle pBuf) { -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER ChipLogProgress(Ble, "In send write request\n"); int rc; @@ -1655,7 +1655,7 @@ void BLEManagerImpl::HandleDisconnect(esp_ble_gatts_cb_param_t * param) } } -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER CHIP_ERROR BLEManagerImpl::HandleRXNotify(esp_ble_gattc_cb_param_t param) { System::PacketBufferHandle buf = System::PacketBufferHandle::NewWithData(param.notify.value, param.notify.value_len); @@ -1889,7 +1889,7 @@ uint16_t BLEManagerImpl::_NumConnections(void) return numCons; } -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER void BLEManagerImpl::HandleGAPConnectionFailed() { if (sInstance.mIsCentral) @@ -1965,7 +1965,7 @@ void BLEManagerImpl::HandleGATTEvent(esp_gatts_cb_event_t event, esp_gatt_if_t g void BLEManagerImpl::HandleGAPEvent(esp_gap_ble_cb_event_t event, esp_ble_gap_cb_param_t * param) { CHIP_ERROR err = CHIP_NO_ERROR; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER esp_ble_gap_cb_param_t * scan_result = (esp_ble_gap_cb_param_t *) param; #endif @@ -2051,7 +2051,7 @@ void BLEManagerImpl::HandleGAPEvent(esp_gap_ble_cb_event_t event, esp_ble_gap_cb } break; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER case ESP_GAP_BLE_SCAN_RESULT_EVT: { mDeviceScanner.ReportDevice(*scan_result, scan_result->scan_rst.bda); } diff --git a/src/platform/ESP32/nimble/BLEManagerImpl.cpp b/src/platform/ESP32/nimble/BLEManagerImpl.cpp index 54219bfa4d84e6..c153e4b592c8ea 100644 --- a/src/platform/ESP32/nimble/BLEManagerImpl.cpp +++ b/src/platform/ESP32/nimble/BLEManagerImpl.cpp @@ -28,31 +28,37 @@ #include "sdkconfig.h" -#if CONFIG_BT_NIMBLE_ENABLED +#ifdef CONFIG_BT_NIMBLE_ENABLED -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER + #include #include #include #include #include -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER + +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER + #include #include #include #include "esp_bt.h" #include "esp_log.h" + #if ESP_IDF_VERSION < ESP_IDF_VERSION_VAL(5, 0, 0) #include "esp_nimble_hci.h" #endif -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER + +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER #include "blecent.h" -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER + #include "host/ble_hs.h" #include "host/ble_hs_pvcy.h" #include "host/ble_uuid.h" @@ -77,10 +83,10 @@ namespace Internal { namespace { TimerHandle_t sbleAdvTimeoutTimer; // FreeRTOS sw timer. -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER static constexpr uint16_t kNewConnectionScanTimeout = 60; static constexpr uint16_t kConnectTimeout = 20; -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER struct ESP32ChipServiceData { @@ -90,9 +96,9 @@ struct ESP32ChipServiceData const ble_uuid16_t ShortUUID_CHIPoBLEService = { BLE_UUID_TYPE_16, 0xFFF6 }; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER const ble_uuid16_t ShortUUID_CHIPoBLE_CharTx_Desc = { BLE_UUID_TYPE_16, 0x2902 }; -#endif +#endif // CONFIG_ENABLE_ESP32_BLE_CONTROLLER const ble_uuid128_t UUID128_CHIPoBLEChar_RX = { BLE_UUID_TYPE_128, { 0x11, 0x9D, 0x9F, 0x42, 0x9C, 0x4F, 0x9F, 0x95, 0x59, 0x45, 0x3D, 0x26, 0xF5, 0x2E, 0xEE, 0x18 } @@ -106,11 +112,11 @@ const ble_uuid128_t UUID_CHIPoBLEChar_TX = { { BLE_UUID_TYPE_128 }, { 0x12, 0x9D, 0x9F, 0x42, 0x9C, 0x4F, 0x9F, 0x95, 0x59, 0x45, 0x3D, 0x26, 0xF5, 0x2E, 0xEE, 0x18 } }; -#if CHIP_ENABLE_ADDITIONAL_DATA_ADVERTISING +#ifdef CHIP_ENABLE_ADDITIONAL_DATA_ADVERTISING const ble_uuid128_t UUID_CHIPoBLEChar_C3 = { { BLE_UUID_TYPE_128 }, { 0x04, 0x8F, 0x21, 0x83, 0x8A, 0x74, 0x7D, 0xB8, 0xF2, 0x45, 0x72, 0x87, 0x38, 0x02, 0x63, 0x64 } }; -#endif +#endif // CHIP_ENABLE_ADDITIONAL_DATA_ADVERTISING SemaphoreHandle_t semaphoreHandle = NULL; @@ -120,7 +126,7 @@ uint8_t own_addr_type = BLE_OWN_ADDR_RANDOM; } // unnamed namespace -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER ChipDeviceScanner & mDeviceScanner = Internal::ChipDeviceScanner::GetInstance(); #endif BLEManagerImpl BLEManagerImpl::sInstance; @@ -159,7 +165,7 @@ const struct ble_gatt_svc_def BLEManagerImpl::CHIPoBLEGATTAttrs[] = { }, }; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER void BLEManagerImpl::HandleConnectFailed(CHIP_ERROR error) { if (sInstance.mIsCentral) @@ -218,7 +224,7 @@ CHIP_ERROR BLEManagerImpl::_Init() VerifyOrReturnError(sbleAdvTimeoutTimer != nullptr, CHIP_ERROR_NO_MEMORY); // Initialize the Chip BleLayer. -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER err = BleLayer::Init(this, this, this, &DeviceLayer::SystemLayer()); #else err = BleLayer::Init(this, this, &DeviceLayer::SystemLayer()); @@ -230,7 +236,7 @@ CHIP_ERROR BLEManagerImpl::_Init() mC3CharAttrHandle = 0; #endif mTXCharCCCDAttrHandle = 0; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER mFlags.ClearAll().Set(Flags::kAdvertisingEnabled, CHIP_DEVICE_CONFIG_CHIPOBLE_ENABLE_ADVERTISING_AUTOSTART && !mIsCentral); mFlags.Set(Flags::kFastAdvertisingEnabled, !mIsCentral); #else @@ -404,14 +410,14 @@ void BLEManagerImpl::_OnPlatformEvent(const ChipDeviceEvent * event) break; default: -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER HandlePlatformSpecificBLEEvent(event); #endif break; } } -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER void BLEManagerImpl::HandlePlatformSpecificBLEEvent(const ChipDeviceEvent * apEvent) { CHIP_ERROR err = CHIP_NO_ERROR; @@ -498,7 +504,7 @@ static int OnSubscribeCharComplete(uint16_t conn_handle, const struct ble_gatt_e bool BLEManagerImpl::SubscribeCharacteristic(BLE_CONNECTION_OBJECT conId, const ChipBleUUID * svcId, const ChipBleUUID * charId) { -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER const struct peer_dsc * dsc; uint8_t value[2]; int rc; @@ -536,7 +542,7 @@ bool BLEManagerImpl::SubscribeCharacteristic(BLE_CONNECTION_OBJECT conId, const bool BLEManagerImpl::UnsubscribeCharacteristic(BLE_CONNECTION_OBJECT conId, const ChipBleUUID * svcId, const ChipBleUUID * charId) { -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER const struct peer_dsc * dsc; uint8_t value[2]; int rc; @@ -585,7 +591,7 @@ bool BLEManagerImpl::CloseConnection(BLE_CONNECTION_OBJECT conId) ChipLogError(DeviceLayer, "ble_gap_terminate() failed: %s", ErrorStr(err)); } -#if !CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifndef CONFIG_ENABLE_ESP32_BLE_CONTROLLER // Force a refresh of the advertising state. mFlags.Set(Flags::kAdvertisingRefreshNeeded); mFlags.Clear(Flags::kAdvertisingConfigured); @@ -638,7 +644,7 @@ bool BLEManagerImpl::SendIndication(BLE_CONNECTION_OBJECT conId, const ChipBleUU return true; } -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER static int OnWriteComplete(uint16_t conn_handle, const struct ble_gatt_error * error, struct ble_gatt_attr * attr, void * arg) { ChipLogDetail(Ble, "Write complete; status:%d conn_handle:%d attr_handle:%d", error->status, conn_handle, attr->handle); @@ -658,7 +664,7 @@ static int OnWriteComplete(uint16_t conn_handle, const struct ble_gatt_error * e bool BLEManagerImpl::SendWriteRequest(BLE_CONNECTION_OBJECT conId, const ChipBleUUID * svcId, const ChipBleUUID * charId, chip::System::PacketBufferHandle pBuf) { -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER const struct peer_chr * chr; int rc; const struct peer * peer = peer_find(conId); @@ -1020,10 +1026,10 @@ void BLEManagerImpl::ClaimBLEMemory(System::Layer *, void *) // Free up all the space occupied by ble and add it to heap esp_err_t err = ESP_OK; -#if CONFIG_IDF_TARGET_ESP32 +#ifdef CONFIG_IDF_TARGET_ESP32 err = esp_bt_mem_release(ESP_BT_MODE_BTDM); -#elif CONFIG_IDF_TARGET_ESP32C2 || CONFIG_IDF_TARGET_ESP32C3 || CONFIG_IDF_TARGET_ESP32S3 || CONFIG_IDF_TARGET_ESP32H2 || \ - CONFIG_IDF_TARGET_ESP32C6 +#elif defined(CONFIG_IDF_TARGET_ESP32C2) || defined(CONFIG_IDF_TARGET_ESP32C3) || defined(CONFIG_IDF_TARGET_ESP32S3) || \ + defined(CONFIG_IDF_TARGET_ESP32H2) || defined(CONFIG_IDF_TARGET_ESP32C6) err = esp_bt_mem_release(ESP_BT_MODE_BLE); #endif @@ -1290,7 +1296,7 @@ uint16_t BLEManagerImpl::_NumConnections(void) return numCons; } -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER void BLEManagerImpl::HandleGAPConnectionFailed(struct ble_gap_event * gapEvent, CHIP_ERROR error) { ChipLogError(Ble, "BLE GAP connection failed; status:%d", gapEvent->connect.status); @@ -1379,7 +1385,7 @@ CHIP_ERROR BLEManagerImpl::HandleGAPPeripheralConnect(struct ble_gap_event * gap CHIP_ERROR BLEManagerImpl::HandleGAPConnect(struct ble_gap_event * gapEvent) { -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER int rc; rc = ble_gattc_exchange_mtu(gapEvent->connect.conn_handle, NULL, NULL); @@ -1405,7 +1411,7 @@ CHIP_ERROR BLEManagerImpl::HandleGAPDisconnect(struct ble_gap_event * gapEvent) mNumGAPCons--; } -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER peer_delete(gapEvent->disconnect.conn.conn_handle); #endif @@ -1542,7 +1548,7 @@ int BLEManagerImpl::ble_svr_gap_event(struct ble_gap_event * event, void * arg) ESP_LOGD(TAG, "BLE_GAP_EVENT_MTU = %d channel id = %d", event->mtu.value, event->mtu.channel_id); break; -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER case BLE_GAP_EVENT_NOTIFY_RX: ESP_LOGD(TAG, "BLE_GAP_EVENT_NOTIFY_RX received %s conn_handle:%d attr_handle:%d attr_len:%d", event->notify_rx.indication ? "indication" : "notification", event->notify_rx.conn_handle, @@ -1735,7 +1741,7 @@ CHIP_ERROR BLEManagerImpl::StartAdvertising(void) return err; } } -#if CONFIG_BT_NIMBLE_HOST_BASED_PRIVACY +#ifdef CONFIG_BT_NIMBLE_HOST_BASED_PRIVACY else { err = MapBLEError(ble_hs_pvcy_rpa_config(NIMBLE_HOST_ENABLE_RPA)); @@ -1773,7 +1779,7 @@ void BLEManagerImpl::DriveBLEState(intptr_t arg) sInstance.DriveBLEState(); } -#if CONFIG_ENABLE_ESP32_BLE_CONTROLLER +#ifdef CONFIG_ENABLE_ESP32_BLE_CONTROLLER CHIP_ERROR BLEManagerImpl::HandleRXNotify(struct ble_gap_event * ble_event) { uint8_t * data = OS_MBUF_DATA(ble_event->notify_rx.om, uint8_t *); diff --git a/src/platform/OpenThread/GenericThreadStackManagerImpl_OpenThread.hpp b/src/platform/OpenThread/GenericThreadStackManagerImpl_OpenThread.hpp index c28cb86edf0085..12f9af57a44342 100644 --- a/src/platform/OpenThread/GenericThreadStackManagerImpl_OpenThread.hpp +++ b/src/platform/OpenThread/GenericThreadStackManagerImpl_OpenThread.hpp @@ -227,18 +227,22 @@ void GenericThreadStackManagerImpl_OpenThread::_OnPlatformEvent(const ThreadDiagnosticsDelegate * delegate = GetDiagnosticDataProvider().GetThreadDiagnosticsDelegate(); - if (mIsAttached) + if (delegate) { - delegate->OnConnectionStatusChanged(app::Clusters::ThreadNetworkDiagnostics::ConnectionStatusEnum::kConnected); - } - else - { - delegate->OnConnectionStatusChanged(app::Clusters::ThreadNetworkDiagnostics::ConnectionStatusEnum::kNotConnected); + if (mIsAttached) + { + delegate->OnConnectionStatusChanged(app::Clusters::ThreadNetworkDiagnostics::ConnectionStatusEnum::kConnected); + } + else + { + delegate->OnConnectionStatusChanged( + app::Clusters::ThreadNetworkDiagnostics::ConnectionStatusEnum::kNotConnected); - GeneralFaults current; - current.add(to_underlying(chip::app::Clusters::ThreadNetworkDiagnostics::NetworkFaultEnum::kLinkDown)); - delegate->OnNetworkFaultChanged(mNetworkFaults, current); - mNetworkFaults = current; + GeneralFaults current; + current.add(to_underlying(chip::app::Clusters::ThreadNetworkDiagnostics::NetworkFaultEnum::kLinkDown)); + delegate->OnNetworkFaultChanged(mNetworkFaults, current); + mNetworkFaults = current; + } } } diff --git a/src/platform/Zephyr/InetUtils.cpp b/src/platform/Zephyr/InetUtils.cpp index 07d2a302dacbf3..a4879884da41f0 100644 --- a/src/platform/Zephyr/InetUtils.cpp +++ b/src/platform/Zephyr/InetUtils.cpp @@ -15,6 +15,8 @@ * limitations under the License. */ +#include + #include "InetUtils.h" #include @@ -38,10 +40,18 @@ net_if * GetInterface(Inet::InterfaceId ifaceId) return ifaceId.IsPresent() ? net_if_get_by_index(ifaceId.GetPlatformInterface()) : net_if_get_default(); } +#if CHIP_DEVICE_CONFIG_ENABLE_WIFI net_if * GetWiFiInterface() { +// TODO: Remove dependency after Telink Zephyr update +// net_if_get_first_wifi() is not available in Zephyr 3.3.99 +#if !defined(CONFIG_SOC_SERIES_RISCV_TELINK_W91) return net_if_get_first_wifi(); +#else + return GetInterface(); +#endif } +#endif } // namespace InetUtils } // namespace DeviceLayer diff --git a/src/platform/Zephyr/ThreadStackManagerImpl.h b/src/platform/Zephyr/ThreadStackManagerImpl.h index ec9feb8b121d3e..4368c23468a6f8 100644 --- a/src/platform/Zephyr/ThreadStackManagerImpl.h +++ b/src/platform/Zephyr/ThreadStackManagerImpl.h @@ -29,9 +29,7 @@ #include #include -#if !defined(CONFIG_SOC_SERIES_RISCV_TELINK_B9X) #include -#endif // !defined(CONFIG_SOC_SERIES_RISCV_TELINK_B9X) #include diff --git a/src/platform/silabs/CHIPDevicePlatformConfig.h b/src/platform/silabs/CHIPDevicePlatformConfig.h index e8601e5feedaf9..feabf306ab0772 100644 --- a/src/platform/silabs/CHIPDevicePlatformConfig.h +++ b/src/platform/silabs/CHIPDevicePlatformConfig.h @@ -96,7 +96,9 @@ #endif /* CHIP_ENABLE_OPENTHREAD */ #endif /* defined(SL_WIFI) */ +#ifndef CHIP_DEVICE_CONFIG_ENABLE_CHIPOBLE #define CHIP_DEVICE_CONFIG_ENABLE_CHIPOBLE 1 +#endif #if defined(SL_WIFI) diff --git a/src/platform/telink/BUILD.gn b/src/platform/telink/BUILD.gn index 5561fb4e906ac9..787b45ca7c06eb 100644 --- a/src/platform/telink/BUILD.gn +++ b/src/platform/telink/BUILD.gn @@ -1,4 +1,4 @@ -# Copyright (c) 2021-2023 Project CHIP Authors +# Copyright (c) 2021-2024 Project CHIP Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -69,6 +69,13 @@ static_library("telink") { ] } + if (chip_enable_openthread || chip_enable_wifi) { + sources += [ + "../Zephyr/InetUtils.cpp", + "../Zephyr/InetUtils.h", + ] + } + if (chip_enable_openthread) { sources += [ "../OpenThread/OpenThreadUtils.cpp", @@ -86,6 +93,17 @@ static_library("telink") { } } + if (chip_enable_wifi) { + sources += [ + "wifi/ConnectivityManagerImplWiFi.cpp", + "wifi/ConnectivityManagerImplWiFi.h", + "wifi/TelinkWiFiDriver.cpp", + "wifi/TelinkWiFiDriver.h", + "wifi/WiFiManager.cpp", + "wifi/WiFiManager.h", + ] + } + if (chip_enable_ota_requestor) { sources += [ "OTAImageProcessorImpl.cpp", diff --git a/src/platform/telink/CHIPDevicePlatformConfig.h b/src/platform/telink/CHIPDevicePlatformConfig.h index f53be5b303f383..cc612b86499eba 100644 --- a/src/platform/telink/CHIPDevicePlatformConfig.h +++ b/src/platform/telink/CHIPDevicePlatformConfig.h @@ -93,14 +93,12 @@ #define CHIP_DEVICE_CONFIG_ENABLE_THREAD 0 #endif -#ifndef CHIP_DEVICE_CONFIG_ENABLE_WIFI -#define CHIP_DEVICE_CONFIG_ENABLE_WIFI 0 -#endif - -#if CHIP_DEVICE_CONFIG_ENABLE_WIFI +#ifdef CONFIG_WIFI_W91 +#define CHIP_DEVICE_CONFIG_ENABLE_WIFI CONFIG_WIFI_W91 #define CHIP_DEVICE_CONFIG_ENABLE_WIFI_STATION 1 #define CHIP_DEVICE_CONFIG_ENABLE_WIFI_AP 0 #else +#define CHIP_DEVICE_CONFIG_ENABLE_WIFI 0 #define CHIP_DEVICE_CONFIG_ENABLE_WIFI_STATION 0 #define CHIP_DEVICE_CONFIG_ENABLE_WIFI_AP 0 #endif diff --git a/src/platform/telink/ConnectivityManagerImpl.cpp b/src/platform/telink/ConnectivityManagerImpl.cpp index 601bac3f22fe71..9b2b651dab93b8 100644 --- a/src/platform/telink/ConnectivityManagerImpl.cpp +++ b/src/platform/telink/ConnectivityManagerImpl.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2021 Project CHIP Authors + * Copyright (c) 2021-2024 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -17,11 +17,12 @@ #include -#include -#include - +#include #include #include +#include +#include +#include #include @@ -34,15 +35,64 @@ #endif #if CHIP_DEVICE_CONFIG_ENABLE_THREAD +#include #include #endif -using namespace ::chip; +using namespace ::chip::Inet; using namespace ::chip::DeviceLayer::Internal; namespace chip { namespace DeviceLayer { +namespace { +CHIP_ERROR JoinLeaveMulticastGroup(net_if * iface, const Inet::IPAddress & address, + UDPEndPointImplSockets::MulticastOperation operation) +{ +#if CHIP_DEVICE_CONFIG_ENABLE_THREAD + if (net_if_l2(iface) == &NET_L2_GET_NAME(OPENTHREAD)) + { + const otIp6Address otAddress = ToOpenThreadIP6Address(address); + const auto handler = operation == UDPEndPointImplSockets::MulticastOperation::kJoin ? otIp6SubscribeMulticastAddress + : otIp6UnsubscribeMulticastAddress; + otError error; + + ThreadStackMgr().LockThreadStack(); + error = handler(openthread_get_default_instance(), &otAddress); + ThreadStackMgr().UnlockThreadStack(); + + return MapOpenThreadError(error); + } +#endif + +#if CHIP_DEVICE_CONFIG_ENABLE_WIFI + // The following code should also be valid for other interface types, such as Ethernet, + // but they are not officially supported, so for now enable it for Wi-Fi only. + const in6_addr in6Addr = InetUtils::ToZephyrAddr(address); + + if (operation == UDPEndPointImplSockets::MulticastOperation::kJoin) + { + net_if_mcast_addr * maddr = net_if_ipv6_maddr_add(iface, &in6Addr); + + if (maddr && !net_if_ipv6_maddr_is_joined(maddr)) + { + net_if_ipv6_maddr_join(maddr); + } + } + else if (operation == UDPEndPointImplSockets::MulticastOperation::kLeave) + { + VerifyOrReturnError(net_if_ipv6_maddr_rm(iface, &in6Addr), CHIP_ERROR_INVALID_ADDRESS); + } + else + { + return CHIP_ERROR_INCORRECT_STATE; + } +#endif + + return CHIP_NO_ERROR; +} +} // namespace + ConnectivityManagerImpl ConnectivityManagerImpl::sInstance; CHIP_ERROR ConnectivityManagerImpl::_Init() @@ -50,6 +100,30 @@ CHIP_ERROR ConnectivityManagerImpl::_Init() #if CHIP_DEVICE_CONFIG_ENABLE_THREAD GenericConnectivityManagerImpl_Thread::_Init(); #endif +#if CHIP_DEVICE_CONFIG_ENABLE_WIFI + ReturnErrorOnFailure(InitWiFi()); +#endif + +#if CHIP_DEVICE_CONFIG_ENABLE_THREAD || CHIP_DEVICE_CONFIG_ENABLE_WIFI + UDPEndPointImplSockets::SetMulticastGroupHandler( + [](InterfaceId interfaceId, const IPAddress & address, UDPEndPointImplSockets::MulticastOperation operation) { + if (interfaceId.IsPresent()) + { + net_if * iface = InetUtils::GetInterface(interfaceId); + VerifyOrReturnError(iface != nullptr, INET_ERROR_UNKNOWN_INTERFACE); + + return JoinLeaveMulticastGroup(iface, address, operation); + } + + // If the interface is not specified, join or leave the multicast group on all interfaces. + for (int i = 1; net_if * iface = net_if_get_by_index(i); i++) + { + ReturnErrorOnFailure(JoinLeaveMulticastGroup(iface, address, operation)); + } + + return CHIP_NO_ERROR; + }); +#endif // CHIP_DEVICE_CONFIG_ENABLE_THREAD || CHIP_DEVICE_CONFIG_ENABLE_WIFI return CHIP_NO_ERROR; } diff --git a/src/platform/telink/ConnectivityManagerImpl.h b/src/platform/telink/ConnectivityManagerImpl.h index ce6ae49a4283e7..e258c27d055044 100644 --- a/src/platform/telink/ConnectivityManagerImpl.h +++ b/src/platform/telink/ConnectivityManagerImpl.h @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2021 Project CHIP Authors + * Copyright (c) 2021-2024 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -33,7 +33,11 @@ #else #include #endif +#if CHIP_DEVICE_CONFIG_ENABLE_WIFI +#include "wifi/ConnectivityManagerImplWiFi.h" +#else #include +#endif #include @@ -65,7 +69,11 @@ class ConnectivityManagerImpl final : public ConnectivityManager, #else public Internal::GenericConnectivityManagerImpl_NoThread, #endif +#if CHIP_DEVICE_CONFIG_ENABLE_WIFI + public ConnectivityManagerImplWiFi +#else public Internal::GenericConnectivityManagerImpl_NoWiFi +#endif { // Allow the ConnectivityManager interface class to delegate method calls to // the implementation methods provided by this class. diff --git a/src/platform/telink/FactoryDataProvider.cpp b/src/platform/telink/FactoryDataProvider.cpp index 806cdb2cfe9391..ba02131911370f 100644 --- a/src/platform/telink/FactoryDataProvider.cpp +++ b/src/platform/telink/FactoryDataProvider.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2022 Project CHIP Authors + * Copyright (c) 2022-2024 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -18,7 +18,7 @@ #include "FactoryDataProvider.h" #include "CHIPDevicePlatformConfig.h" #include - +#include #if CONFIG_CHIP_CERTIFICATION_DECLARATION_STORAGE #include #include @@ -329,11 +329,12 @@ template CHIP_ERROR FactoryDataProvider::GetEnableKey(MutableByteSpan & enableKey) { ReturnErrorCodeIf(!mFactoryData.enable_key.data, CHIP_ERROR_PERSISTED_STORAGE_VALUE_NOT_FOUND); - ReturnErrorCodeIf(enableKey.size() < mFactoryData.enable_key.len, CHIP_ERROR_BUFFER_TOO_SMALL); + ReturnErrorCodeIf(enableKey.size() < mFactoryData.enable_key.len / 2, CHIP_ERROR_BUFFER_TOO_SMALL); - memcpy(enableKey.data(), mFactoryData.enable_key.data, mFactoryData.enable_key.len); + Encoding::HexToBytes((const char *) mFactoryData.enable_key.data, mFactoryData.enable_key.len, enableKey.data(), + enableKey.size()); - enableKey.reduce_size(mFactoryData.enable_key.len); + enableKey.reduce_size(mFactoryData.enable_key.len / 2); return CHIP_NO_ERROR; } diff --git a/src/platform/telink/ThreadStackManagerImpl.cpp b/src/platform/telink/ThreadStackManagerImpl.cpp index 2ec9b02ca0b67c..41d9189ab5f215 100644 --- a/src/platform/telink/ThreadStackManagerImpl.cpp +++ b/src/platform/telink/ThreadStackManagerImpl.cpp @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2023 Project CHIP Authors + * Copyright (c) 2023-2024 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -27,16 +27,13 @@ #include #include -#include #include -#include #include namespace chip { namespace DeviceLayer { using namespace ::chip::DeviceLayer::Internal; -using namespace ::chip::Inet; ThreadStackManagerImpl ThreadStackManagerImpl::sInstance; @@ -48,20 +45,6 @@ CHIP_ERROR ThreadStackManagerImpl::_InitThreadStack() ReturnErrorOnFailure(GenericThreadStackManagerImpl_OpenThread::DoInit(instance)); - UDPEndPointImplSockets::SetMulticastGroupHandler( - [](InterfaceId, const IPAddress & address, UDPEndPointImplSockets::MulticastOperation operation) { - const otIp6Address otAddress = ToOpenThreadIP6Address(address); - const auto handler = operation == UDPEndPointImplSockets::MulticastOperation::kJoin ? otIp6SubscribeMulticastAddress - : otIp6UnsubscribeMulticastAddress; - otError error; - - ThreadStackMgr().LockThreadStack(); - error = handler(openthread_get_default_instance(), &otAddress); - ThreadStackMgr().UnlockThreadStack(); - - return MapOpenThreadError(error); - }); - #if CHIP_DEVICE_CONFIG_ENABLE_THREAD_SRP_CLIENT k_sem_init(&mSrpClearAllSemaphore, 0, 1); #endif // CHIP_DEVICE_CONFIG_ENABLE_THREAD_SRP_CLIENT diff --git a/src/platform/telink/ThreadStackManagerImpl.h b/src/platform/telink/ThreadStackManagerImpl.h index 21db9972f62dec..b06e33d9f5e0b2 100644 --- a/src/platform/telink/ThreadStackManagerImpl.h +++ b/src/platform/telink/ThreadStackManagerImpl.h @@ -1,6 +1,6 @@ /* * - * Copyright (c) 2023 Project CHIP Authors + * Copyright (c) 2023-2024 Project CHIP Authors * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -29,9 +29,6 @@ #include #include -#if !CONFIG_SOC_SERIES_RISCV_TELINK_B9X -#include -#endif // !CONFIG_SOC_SERIES_RISCV_TELINK_B9X #include diff --git a/src/platform/telink/telink-mbedtls-config.h b/src/platform/telink/telink-mbedtls-config.h index 23d7d97bc43c9a..921255d9425289 100644 --- a/src/platform/telink/telink-mbedtls-config.h +++ b/src/platform/telink/telink-mbedtls-config.h @@ -37,8 +37,10 @@ #define MBEDTLS_X509_CREATE_C #define MBEDTLS_X509_CSR_WRITE_C +#ifdef CONFIG_TELINK_B9X_MBEDTLS_HW_ACCELERATION #define MBEDTLS_AES_ALT #define MBEDTLS_ECP_ALT +#endif #undef MBEDTLS_ERROR_C diff --git a/src/platform/telink/tlsr9118bdk40d.overlay b/src/platform/telink/tlsr9118bdk40d.overlay new file mode 100644 index 00000000000000..6dddbe61c95a38 --- /dev/null +++ b/src/platform/telink/tlsr9118bdk40d.overlay @@ -0,0 +1,48 @@ +/ { + /* Short TL_Key1 (J20 pin 11) to ground (J20 pin 25-35) */ + key_pool { + compatible = "gpio-keys"; + + inp { + gpios = <&gpio0 16 (GPIO_ACTIVE_LOW | GPIO_PULL_UP)>, + <&gpio0 15 (GPIO_ACTIVE_LOW | GPIO_PULL_UP)>; + }; + }; + + key_matrix { + compatible = "gpio-keys"; + + col { + gpios = <&gpio0 18 GPIO_ACTIVE_HIGH>, + <&gpio0 17 GPIO_ACTIVE_HIGH>; + }; + + row { + gpios = <&gpio0 16 (GPIO_PULL_DOWN | GPIO_ACTIVE_HIGH)>, + <&gpio0 15 (GPIO_PULL_DOWN | GPIO_ACTIVE_HIGH)>; + }; + }; + + led_pool{ + compatible = "gpio-leds"; + + out { + gpios = <&gpio0 19 GPIO_ACTIVE_HIGH>; + }; + }; + pwm_pool { + compatible = "pwm-leds"; + out { + pwms = <&pwm0 4 PWM_MSEC(1) PWM_POLARITY_NORMAL>, + <&pwm0 2 PWM_MSEC(1) PWM_POLARITY_NORMAL>, + <&pwm0 3 PWM_MSEC(1) PWM_POLARITY_NORMAL>; + }; + }; +}; + +&pwm0 { + /* On board RGB LEDs */ + pinctrl-ch4 = <&pwm_ch4_p20_default>; + pinctrl-ch2 = <&pwm_ch2_p17_default>; + pinctrl-ch3 = <&pwm_ch3_p18_default>; +}; \ No newline at end of file diff --git a/src/platform/telink/tlsr9118bdk40d_3m_flash.overlay b/src/platform/telink/tlsr9118bdk40d_3m_flash.overlay new file mode 100644 index 00000000000000..3e42145fb44370 --- /dev/null +++ b/src/platform/telink/tlsr9118bdk40d_3m_flash.overlay @@ -0,0 +1,35 @@ +&flash { + reg = <0x80000000 0x300000>; + + partitions { + /delete-node/ partition@0; + /delete-node/ partition@20000; + /delete-node/ partition@88000; + /delete-node/ partition@f0000; + /delete-node/ partition@f4000; + boot_partition: partition@0 { + label = "mcuboot"; + reg = <0x00000000 0x20000>; + }; + slot0_partition: partition@20000 { + label = "image-0"; + reg = <0x20000 0xe8000>; + }; + factory_partition: partition@108000 { + label = "factory-data"; + reg = <0x108000 0x1000>; + }; + storage_partition: partition@109000 { + label = "storage"; + reg = <0x109000 0xf000>; + }; + slot1_partition: partition@118000 { + label = "image-1"; + reg = <0x118000 0xe8000>; + }; + reserved_partition: partition@200000 { + label = "vendor-data"; + reg = <0x200000 0x100000>; + }; + }; +}; diff --git a/src/platform/telink/wifi/ConnectivityManagerImplWiFi.cpp b/src/platform/telink/wifi/ConnectivityManagerImplWiFi.cpp new file mode 100644 index 00000000000000..3fefcf709e1b9b --- /dev/null +++ b/src/platform/telink/wifi/ConnectivityManagerImplWiFi.cpp @@ -0,0 +1,178 @@ +/* + * + * Copyright (c) 2024 Project CHIP Authors + * All rights reserved. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/* this file behaves like a config.h, comes first */ +#include + +#include +#include + +#include "ConnectivityManagerImplWiFi.h" +#include "WiFiManager.h" + +#if CHIP_DEVICE_CONFIG_ENABLE_WIFI + +using namespace ::chip; +using namespace ::chip::Inet; +using namespace ::chip::System; +using namespace ::chip::TLV; + +namespace chip { +namespace DeviceLayer { + +CHIP_ERROR ConnectivityManagerImplWiFi::InitWiFi() +{ + return WiFiManager::Instance().Init(); +} + +ConnectivityManager::WiFiStationMode ConnectivityManagerImplWiFi::_GetWiFiStationMode(void) +{ + if (mStationMode != ConnectivityManager::WiFiStationMode::kWiFiStationMode_ApplicationControlled) + { + mStationMode = (WiFiManager::StationStatus::DISABLED == WiFiManager().Instance().GetStationStatus()) + ? ConnectivityManager::WiFiStationMode::kWiFiStationMode_Disabled + : ConnectivityManager::WiFiStationMode::kWiFiStationMode_Enabled; + } + return mStationMode; +} + +CHIP_ERROR ConnectivityManagerImplWiFi::_SetWiFiStationMode(ConnectivityManager::WiFiStationMode aMode) +{ + VerifyOrReturnError(ConnectivityManager::WiFiStationMode::kWiFiStationMode_NotSupported != aMode, CHIP_ERROR_INVALID_ARGUMENT); + + mStationMode = aMode; + + return CHIP_NO_ERROR; +} + +bool ConnectivityManagerImplWiFi::_IsWiFiStationEnabled(void) +{ + return (WiFiManager::StationStatus::DISABLED <= WiFiManager().Instance().GetStationStatus()); +} + +bool ConnectivityManagerImplWiFi::_IsWiFiStationApplicationControlled(void) +{ + return (ConnectivityManager::WiFiStationMode::kWiFiStationMode_ApplicationControlled == mStationMode); +} + +bool ConnectivityManagerImplWiFi::_IsWiFiStationConnected(void) +{ + return (WiFiManager::StationStatus::CONNECTED == WiFiManager().Instance().GetStationStatus()); +} + +System::Clock::Timeout ConnectivityManagerImplWiFi::_GetWiFiStationReconnectInterval(void) +{ + return mWiFiStationReconnectInterval; +} + +CHIP_ERROR ConnectivityManagerImplWiFi::_SetWiFiStationReconnectInterval(System::Clock::Timeout val) +{ + mWiFiStationReconnectInterval = val; + return CHIP_NO_ERROR; +} + +bool ConnectivityManagerImplWiFi::_IsWiFiStationProvisioned(void) +{ + // from Matter perspective `provisioned` means that the supplicant has been provided + // with SSID and password (doesn't matter if valid or not) + return (WiFiManager::StationStatus::CONNECTING <= WiFiManager().Instance().GetStationStatus()); +} + +void ConnectivityManagerImplWiFi::_ClearWiFiStationProvision(void) +{ + if (_IsWiFiStationProvisioned()) + { + if (CHIP_NO_ERROR != WiFiManager().Instance().ClearStationProvisioningData()) + { + ChipLogError(DeviceLayer, "Cannot clear WiFi station provisioning data"); + } + } +} + +bool ConnectivityManagerImplWiFi::_CanStartWiFiScan() +{ + return (WiFiManager::StationStatus::DISABLED != WiFiManager().Instance().GetStationStatus() && + WiFiManager::StationStatus::SCANNING != WiFiManager().Instance().GetStationStatus() && + WiFiManager::StationStatus::CONNECTING != WiFiManager().Instance().GetStationStatus()); +} + +void ConnectivityManagerImplWiFi::_OnWiFiStationProvisionChange() +{ + // do nothing +} + +void ConnectivityManagerImplWiFi::_OnWiFiScanDone() {} + +CHIP_ERROR ConnectivityManagerImplWiFi::_GetAndLogWiFiStatsCounters(void) +{ + // TODO: when network statistics are enabled + return CHIP_NO_ERROR; +} + +ConnectivityManager::WiFiAPMode ConnectivityManagerImplWiFi::_GetWiFiAPMode(void) +{ + /* AP mode is unsupported */ + return ConnectivityManager::WiFiAPMode::kWiFiAPMode_NotSupported; +} + +CHIP_ERROR ConnectivityManagerImplWiFi::_SetWiFiAPMode(ConnectivityManager::WiFiAPMode mode) +{ + /* AP mode is unsupported */ + VerifyOrReturnError(ConnectivityManager::WiFiAPMode::kWiFiAPMode_NotSupported == mode || + ConnectivityManager::WiFiAPMode::kWiFiAPMode_Disabled == mode, + CHIP_ERROR_UNSUPPORTED_CHIP_FEATURE); + return CHIP_NO_ERROR; +} + +bool ConnectivityManagerImplWiFi::_IsWiFiAPActive(void) +{ + /* AP mode is unsupported */ + return false; +} + +bool ConnectivityManagerImplWiFi::_IsWiFiAPApplicationControlled(void) +{ + /* AP mode is unsupported */ + return false; +} + +void ConnectivityManagerImplWiFi::_DemandStartWiFiAP(void) +{ /* AP mode is unsupported */ +} + +void ConnectivityManagerImplWiFi::_StopOnDemandWiFiAP(void) +{ /* AP mode is unsupported */ +} + +void ConnectivityManagerImplWiFi::_MaintainOnDemandWiFiAP(void) +{ /* AP mode is unsupported */ +} + +System::Clock::Timeout ConnectivityManagerImplWiFi::_GetWiFiAPIdleTimeout(void) +{ + /* AP mode is unsupported */ + return System::Clock::kZero; +} + +void ConnectivityManagerImplWiFi::_SetWiFiAPIdleTimeout(System::Clock::Timeout val) +{ /* AP mode is unsupported */ +} + +} // namespace DeviceLayer +} // namespace chip + +#endif // CHIP_DEVICE_CONFIG_ENABLE_WIFI diff --git a/src/platform/telink/wifi/ConnectivityManagerImplWiFi.h b/src/platform/telink/wifi/ConnectivityManagerImplWiFi.h new file mode 100644 index 00000000000000..ec9c1d12027af9 --- /dev/null +++ b/src/platform/telink/wifi/ConnectivityManagerImplWiFi.h @@ -0,0 +1,80 @@ +/* + * + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#pragma once + +#include + +#include + +#include + +namespace chip { +namespace Inet { +class IPAddress; +} // namespace Inet +} // namespace chip + +namespace chip { +namespace DeviceLayer { + +class ConnectivityManagerImplWiFi +{ + friend class ConnectivityManager; + +protected: + CHIP_ERROR InitWiFi(); + +private: + // Wi-Fi station + ConnectivityManager::WiFiStationMode _GetWiFiStationMode(void); + CHIP_ERROR _SetWiFiStationMode(ConnectivityManager::WiFiStationMode val); + bool _IsWiFiStationEnabled(void); + bool _IsWiFiStationApplicationControlled(void); + bool _IsWiFiStationConnected(void); + System::Clock::Timeout _GetWiFiStationReconnectInterval(void); + CHIP_ERROR _SetWiFiStationReconnectInterval(System::Clock::Timeout val); + bool _IsWiFiStationProvisioned(void); + void _ClearWiFiStationProvision(void); + CHIP_ERROR _GetAndLogWiFiStatsCounters(void); + bool _CanStartWiFiScan(); + void _OnWiFiScanDone(); + void _OnWiFiStationProvisionChange(); + + // Wi-Fi access point - not supported + ConnectivityManager::WiFiAPMode _GetWiFiAPMode(void); + CHIP_ERROR _SetWiFiAPMode(ConnectivityManager::WiFiAPMode val); + bool _IsWiFiAPActive(void); + bool _IsWiFiAPApplicationControlled(void); + void _DemandStartWiFiAP(void); + void _StopOnDemandWiFiAP(void); + void _MaintainOnDemandWiFiAP(void); + System::Clock::Timeout _GetWiFiAPIdleTimeout(void); + void _SetWiFiAPIdleTimeout(System::Clock::Timeout val); + + ConnectivityManager::WiFiStationMode mStationMode{ ConnectivityManager::WiFiStationMode::kWiFiStationMode_Disabled }; + ConnectivityManager::WiFiStationState mStationState{ ConnectivityManager::WiFiStationState::kWiFiStationState_NotConnected }; + System::Clock::Timeout mWiFiStationReconnectInterval{}; + + static const char * _WiFiStationModeToStr(ConnectivityManager::WiFiStationMode mode); + static const char * _WiFiAPModeToStr(ConnectivityManager::WiFiAPMode mode); + static const char * _WiFiStationStateToStr(ConnectivityManager::WiFiStationState state); + static const char * _WiFiAPStateToStr(ConnectivityManager::WiFiAPState state); +}; + +} // namespace DeviceLayer +} // namespace chip diff --git a/src/platform/telink/wifi/TelinkWiFiDriver.cpp b/src/platform/telink/wifi/TelinkWiFiDriver.cpp new file mode 100644 index 00000000000000..d6b47053839e35 --- /dev/null +++ b/src/platform/telink/wifi/TelinkWiFiDriver.cpp @@ -0,0 +1,281 @@ +/* + * + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include "TelinkWiFiDriver.h" + +#include + +#include +#include +#include + +using namespace ::chip; +using namespace ::chip::DeviceLayer::Internal; +using namespace ::chip::DeviceLayer::PersistedStorage; +using namespace ::chip::app::Clusters::NetworkCommissioning; + +namespace chip { +namespace DeviceLayer { +namespace NetworkCommissioning { + +size_t TelinkWiFiDriver::WiFiNetworkIterator::Count() +{ + VerifyOrReturnValue(mDriver != nullptr, 0); + return mDriver->mStagingNetwork.IsConfigured() ? 1 : 0; +} + +bool TelinkWiFiDriver::WiFiNetworkIterator::Next(Network & item) +{ + // we assume only one network is actually supported + // TODO: verify if this can be extended + if (mExhausted || 0 == Count()) + { + return false; + } + + memcpy(item.networkID, mDriver->mStagingNetwork.ssid, mDriver->mStagingNetwork.ssidLen); + item.networkIDLen = static_cast(mDriver->mStagingNetwork.ssidLen); + item.connected = false; + + mExhausted = true; + + WiFiManager::WiFiInfo wifiInfo; + if (CHIP_NO_ERROR == WiFiManager::Instance().GetWiFiInfo(wifiInfo)) + { + if (WiFiManager::StationStatus::CONNECTED <= WiFiManager::Instance().GetStationStatus()) + { + if (wifiInfo.mSsidLen == item.networkIDLen && 0 == memcmp(wifiInfo.mSsid, item.networkID, wifiInfo.mSsidLen)) + { + item.connected = true; + } + } + } + return true; +} + +bool TelinkWiFiScanResponseIterator::Next(WiFiScanResponse & item) +{ + if (mResultId < mResultCount) + { + item = mResults[mResultId++]; + return true; + } + return false; +} + +void TelinkWiFiScanResponseIterator::Release() +{ + mResultId = mResultCount = 0; + Platform::MemoryFree(mResults); + mResults = nullptr; +} + +void TelinkWiFiScanResponseIterator::Add(const WiFiScanResponse & result) +{ + void * newResults = Platform::MemoryRealloc(mResults, (mResultCount + 1) * sizeof(WiFiScanResponse)); + + if (newResults) + { + mResults = static_cast(newResults); + mResults[mResultCount++] = result; + } +} + +CHIP_ERROR TelinkWiFiDriver::Init(NetworkStatusChangeCallback * networkStatusChangeCallback) +{ + mpNetworkStatusChangeCallback = networkStatusChangeCallback; + + LoadFromStorage(); + + if (mStagingNetwork.IsConfigured()) + { + WiFiManager::ConnectionHandling handling{ [] { Instance().OnNetworkStatusChanged(Status::kSuccess); }, + [] { Instance().OnNetworkStatusChanged(Status::kUnknownError); }, + System::Clock::Seconds32{ kWiFiConnectNetworkTimeoutSeconds } }; + ReturnErrorOnFailure( + WiFiManager::Instance().Connect(mStagingNetwork.GetSsidSpan(), mStagingNetwork.GetPassSpan(), handling)); + } + + return CHIP_NO_ERROR; +} + +void TelinkWiFiDriver::OnNetworkStatusChanged(Status status) +{ + if (status == Status::kSuccess) + { + ConnectivityMgr().SetWiFiStationMode(ConnectivityManager::kWiFiStationMode_Enabled); + } + + if (mpNetworkStatusChangeCallback) + { + mpNetworkStatusChangeCallback->OnNetworkingStatusChange(status, NullOptional, NullOptional); + } + + if (mpConnectCallback) + { + mpConnectCallback->OnResult(status, CharSpan(), 0); + mpConnectCallback = nullptr; + } +} + +void TelinkWiFiDriver::Shutdown() +{ + mpNetworkStatusChangeCallback = nullptr; +} + +CHIP_ERROR TelinkWiFiDriver::CommitConfiguration() +{ + ReturnErrorOnFailure(KeyValueStoreMgr().Put(kPassKey, mStagingNetwork.pass, mStagingNetwork.passLen)); + ReturnErrorOnFailure(KeyValueStoreMgr().Put(kSsidKey, mStagingNetwork.ssid, mStagingNetwork.ssidLen)); + + return CHIP_NO_ERROR; +} + +CHIP_ERROR TelinkWiFiDriver::RevertConfiguration() +{ + LoadFromStorage(); + + if (WiFiManager::StationStatus::CONNECTING <= WiFiManager::Instance().GetStationStatus()) + { + WiFiManager::WiFiInfo wifiInfo; + ReturnErrorOnFailure(WiFiManager::Instance().GetWiFiInfo(wifiInfo)); + if (mStagingNetwork.GetSsidSpan().data_equal(ByteSpan(wifiInfo.mSsid, wifiInfo.mSsidLen))) + { + // we are already connected to this network, so return prematurely + return CHIP_NO_ERROR; + } + + WiFiManager::Instance().Disconnect(); + } + + if (mStagingNetwork.IsConfigured()) + { + WiFiManager::ConnectionHandling handling{ [] { Instance().OnNetworkStatusChanged(Status::kSuccess); }, + [] { Instance().OnNetworkStatusChanged(Status::kUnknownError); }, + System::Clock::Seconds32{ kWiFiConnectNetworkTimeoutSeconds } }; + ReturnErrorOnFailure( + WiFiManager::Instance().Connect(mStagingNetwork.GetSsidSpan(), mStagingNetwork.GetPassSpan(), handling)); + } + + return CHIP_NO_ERROR; +} + +Status TelinkWiFiDriver::AddOrUpdateNetwork(ByteSpan ssid, ByteSpan credentials, MutableCharSpan & outDebugText, + uint8_t & outNetworkIndex) +{ + outDebugText = {}; + outNetworkIndex = 0; + + VerifyOrReturnError(!mStagingNetwork.IsConfigured() || ssid.data_equal(mStagingNetwork.GetSsidSpan()), Status::kBoundsExceeded); + VerifyOrReturnError(ssid.size() <= sizeof(mStagingNetwork.ssid), Status::kOutOfRange); + VerifyOrReturnError(credentials.size() <= sizeof(mStagingNetwork.pass), Status::kOutOfRange); + + mStagingNetwork.Erase(); + memcpy(mStagingNetwork.ssid, ssid.data(), ssid.size()); + memcpy(mStagingNetwork.pass, credentials.data(), credentials.size()); + mStagingNetwork.ssidLen = ssid.size(); + mStagingNetwork.passLen = credentials.size(); + + return Status::kSuccess; +} + +Status TelinkWiFiDriver::RemoveNetwork(ByteSpan networkId, MutableCharSpan & outDebugText, uint8_t & outNetworkIndex) +{ + outDebugText = {}; + outNetworkIndex = 0; + + VerifyOrReturnError(networkId.data_equal(mStagingNetwork.GetSsidSpan()), Status::kNetworkIDNotFound); + mStagingNetwork.Clear(); + + return Status::kSuccess; +} + +Status TelinkWiFiDriver::ReorderNetwork(ByteSpan networkId, uint8_t index, MutableCharSpan & outDebugText) +{ + outDebugText = {}; + + // Only one network is supported for now + VerifyOrReturnError(index == 0, Status::kOutOfRange); + VerifyOrReturnError(networkId.data_equal(mStagingNetwork.GetSsidSpan()), Status::kNetworkIDNotFound); + + return Status::kSuccess; +} + +void TelinkWiFiDriver::ConnectNetwork(ByteSpan networkId, ConnectCallback * callback) +{ + Status status = Status::kSuccess; + WiFiManager::ConnectionHandling handling{ [] { Instance().OnNetworkStatusChanged(Status::kSuccess); }, + [] { Instance().OnNetworkStatusChanged(Status::kUnknownError); }, + System::Clock::Seconds32{ kWiFiConnectNetworkTimeoutSeconds } }; + + VerifyOrExit(mpConnectCallback == nullptr, status = Status::kUnknownError); + mpConnectCallback = callback; + + VerifyOrExit(WiFiManager::StationStatus::CONNECTING != WiFiManager::Instance().GetStationStatus(), + status = Status::kOtherConnectionFailure); + VerifyOrExit(networkId.data_equal(mStagingNetwork.GetSsidSpan()), status = Status::kNetworkIDNotFound); + + WiFiManager::Instance().Connect(mStagingNetwork.GetSsidSpan(), mStagingNetwork.GetPassSpan(), handling); + +exit: + if (status != Status::kSuccess && mpConnectCallback) + { + mpConnectCallback->OnResult(status, CharSpan(), 0); + mpConnectCallback = nullptr; + } +} + +void TelinkWiFiDriver::LoadFromStorage() +{ + WiFiManager::WiFiNetwork network; + + mStagingNetwork = {}; + ReturnOnFailure(KeyValueStoreMgr().Get(kSsidKey, network.ssid, sizeof(network.ssid), &network.ssidLen)); + ReturnOnFailure(KeyValueStoreMgr().Get(kPassKey, network.pass, sizeof(network.pass), &network.passLen)); + mStagingNetwork = network; +} + +void TelinkWiFiDriver::OnScanWiFiNetworkDone(WiFiManager::WiFiRequestStatus status) +{ + VerifyOrReturn(mScanCallback != nullptr); + mScanCallback->OnFinished(status == WiFiManager::WiFiRequestStatus::SUCCESS ? Status::kSuccess : Status::kUnknownError, + CharSpan(), &mScanResponseIterator); + mScanCallback = nullptr; +} + +void TelinkWiFiDriver::OnScanWiFiNetworkResult(const WiFiScanResponse & response) +{ + mScanResponseIterator.Add(response); +} + +void TelinkWiFiDriver::ScanNetworks(ByteSpan ssid, WiFiDriver::ScanCallback * callback) +{ + mScanCallback = callback; + CHIP_ERROR error = WiFiManager::Instance().Scan( + ssid, [](const WiFiScanResponse & response) { Instance().OnScanWiFiNetworkResult(response); }, + [](WiFiManager::WiFiRequestStatus status) { Instance().OnScanWiFiNetworkDone(status); }); + + if (error != CHIP_NO_ERROR) + { + mScanCallback = nullptr; + callback->OnFinished(Status::kUnknownError, CharSpan(), nullptr); + } +} + +} // namespace NetworkCommissioning +} // namespace DeviceLayer +} // namespace chip diff --git a/src/platform/telink/wifi/TelinkWiFiDriver.h b/src/platform/telink/wifi/TelinkWiFiDriver.h new file mode 100644 index 00000000000000..b9f9b6374c42e3 --- /dev/null +++ b/src/platform/telink/wifi/TelinkWiFiDriver.h @@ -0,0 +1,112 @@ +/* + * + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#pragma once + +#include "WiFiManager.h" + +#include + +namespace chip { +namespace DeviceLayer { +namespace NetworkCommissioning { + +inline constexpr uint8_t kMaxWiFiNetworks = 1; +inline constexpr uint8_t kWiFiScanNetworksTimeOutSeconds = 10; +inline constexpr uint8_t kWiFiConnectNetworkTimeoutSeconds = 35; + +class TelinkWiFiScanResponseIterator : public Iterator +{ +public: + size_t Count() override { return mResultCount; } + bool Next(WiFiScanResponse & item) override; + void Release() override; + void Add(const WiFiScanResponse & result); + +private: + size_t mResultId = 0; + size_t mResultCount = 0; + WiFiScanResponse * mResults = nullptr; +}; + +class TelinkWiFiDriver final : public WiFiDriver +{ +public: + // Define non-volatile storage keys for SSID and password. + // The naming convention is aligned with DefaultStorageKeyAllocator class. + static constexpr char kSsidKey[] = "g/wi/s"; + static constexpr char kPassKey[] = "g/wi/p"; + + class WiFiNetworkIterator final : public NetworkIterator + { + public: + WiFiNetworkIterator(TelinkWiFiDriver * aDriver) : mDriver(aDriver) {} + size_t Count() override; + bool Next(Network & item) override; + void Release() override { delete this; } + ~WiFiNetworkIterator() = default; + + private: + TelinkWiFiDriver * mDriver; + bool mExhausted{ false }; + }; + + // BaseDriver + NetworkIterator * GetNetworks() override { return new WiFiNetworkIterator(this); } + CHIP_ERROR Init(NetworkStatusChangeCallback * networkStatusChangeCallback) override; + void Shutdown() override; + + // WirelessDriver + uint8_t GetMaxNetworks() override { return kMaxWiFiNetworks; } + uint8_t GetScanNetworkTimeoutSeconds() override { return kWiFiScanNetworksTimeOutSeconds; } + uint8_t GetConnectNetworkTimeoutSeconds() override { return kWiFiConnectNetworkTimeoutSeconds; } + + CHIP_ERROR CommitConfiguration() override; + CHIP_ERROR RevertConfiguration() override; + + Status RemoveNetwork(ByteSpan networkId, MutableCharSpan & outDebugText, uint8_t & outNetworkIndex) override; + Status ReorderNetwork(ByteSpan networkId, uint8_t index, MutableCharSpan & outDebugText) override; + void ConnectNetwork(ByteSpan networkId, ConnectCallback * callback) override; + + // WiFiDriver + Status AddOrUpdateNetwork(ByteSpan ssid, ByteSpan credentials, MutableCharSpan & outDebugText, + uint8_t & outNetworkIndex) override; + void ScanNetworks(ByteSpan ssid, ScanCallback * callback) override; + + static TelinkWiFiDriver & Instance() + { + static TelinkWiFiDriver sInstance; + return sInstance; + } + + void OnNetworkStatusChanged(Status status); + void OnScanWiFiNetworkResult(const WiFiScanResponse & result); + void OnScanWiFiNetworkDone(WiFiManager::WiFiRequestStatus status); + +private: + void LoadFromStorage(); + + ConnectCallback * mpConnectCallback{ nullptr }; + NetworkStatusChangeCallback * mpNetworkStatusChangeCallback{ nullptr }; + WiFiManager::WiFiNetwork mStagingNetwork; + TelinkWiFiScanResponseIterator mScanResponseIterator; + ScanCallback * mScanCallback{ nullptr }; +}; + +} // namespace NetworkCommissioning +} // namespace DeviceLayer +} // namespace chip diff --git a/src/platform/telink/wifi/WiFiManager.cpp b/src/platform/telink/wifi/WiFiManager.cpp new file mode 100644 index 00000000000000..88195fdbee2ab8 --- /dev/null +++ b/src/platform/telink/wifi/WiFiManager.cpp @@ -0,0 +1,560 @@ +/* + * + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * @file + * Provides the wrapper for Telink WiFi API + */ + +#include "WiFiManager.h" + +#include +#include +#include +#include +#include +#include + +#include +#include +#include +#include + +namespace chip { +namespace DeviceLayer { + +namespace { + +NetworkCommissioning::WiFiScanResponse ToScanResponse(const wifi_scan_result * result) +{ + NetworkCommissioning::WiFiScanResponse response = {}; + + if (result != nullptr) + { + static_assert(sizeof(response.ssid) == sizeof(result->ssid), "SSID length mismatch"); + static_assert(sizeof(response.bssid) == sizeof(result->mac), "BSSID length mismatch"); + + // TODO: Distinguish WPA versions + response.security.Set(result->security == WIFI_SECURITY_TYPE_PSK ? NetworkCommissioning::WiFiSecurity::kWpaPersonal + : NetworkCommissioning::WiFiSecurity::kUnencrypted); + response.channel = result->channel; + response.rssi = result->rssi; + response.ssidLen = result->ssid_length; + memcpy(response.ssid, result->ssid, result->ssid_length); + // TODO: MAC/BSSID is not filled by the Wi-Fi driver + memcpy(response.bssid, result->mac, result->mac_length); + } + + return response; +} + +// Matter expectations towards Wi-Fi version codes are unaligned with +// what wpa_supplicant provides. This function maps supplicant codes +// to the ones defined in the Matter spec (11.14.5.2. WiFiVersionEnum) +app::Clusters::WiFiNetworkDiagnostics::WiFiVersionEnum MapToMatterWiFiVersionCode(wifi_link_mode wifiVersion) +{ + using app::Clusters::WiFiNetworkDiagnostics::WiFiVersionEnum; + + if (wifiVersion < WIFI_1 || wifiVersion > WIFI_6E) + { + ChipLogError(DeviceLayer, "Unsupported Wi-Fi version detected"); + return WiFiVersionEnum::kA; // let's return 'a' by default + } + + switch (wifiVersion) + { + case WIFI_1: + return WiFiVersionEnum::kB; + case WIFI_2: + return WiFiVersionEnum::kA; + case WIFI_6E: + return WiFiVersionEnum::kAx; // treat as 802.11ax + default: + break; + } + + return static_cast(wifiVersion - 1); +} + +// Matter expectations towards Wi-Fi security type codes are unaligned with +// what wpa_supplicant provides. This function maps supplicant codes +// to the ones defined in the Matter spec (11.14.3.1. SecurityType enum) +app::Clusters::WiFiNetworkDiagnostics::SecurityTypeEnum MapToMatterSecurityType(wifi_security_type securityType) +{ + using app::Clusters::WiFiNetworkDiagnostics::SecurityTypeEnum; + + switch (securityType) + { + case WIFI_SECURITY_TYPE_NONE: + return SecurityTypeEnum::kNone; + case WIFI_SECURITY_TYPE_PSK: + case WIFI_SECURITY_TYPE_PSK_SHA256: + return SecurityTypeEnum::kWpa2; + case WIFI_SECURITY_TYPE_SAE: + return SecurityTypeEnum::kWpa3; + default: + break; + } + + return SecurityTypeEnum::kUnspecified; +} + +} // namespace + +const Map + WiFiManager::sStatusMap({ { WIFI_STATE_DISCONNECTED, WiFiManager::StationStatus::DISCONNECTED }, + { WIFI_STATE_INTERFACE_DISABLED, WiFiManager::StationStatus::DISABLED }, + { WIFI_STATE_INACTIVE, WiFiManager::StationStatus::DISABLED }, + { WIFI_STATE_SCANNING, WiFiManager::StationStatus::SCANNING }, + { WIFI_STATE_AUTHENTICATING, WiFiManager::StationStatus::CONNECTING }, + { WIFI_STATE_ASSOCIATING, WiFiManager::StationStatus::CONNECTING }, + { WIFI_STATE_ASSOCIATED, WiFiManager::StationStatus::CONNECTED }, + { WIFI_STATE_4WAY_HANDSHAKE, WiFiManager::StationStatus::PROVISIONING }, + { WIFI_STATE_GROUP_HANDSHAKE, WiFiManager::StationStatus::PROVISIONING }, + { WIFI_STATE_COMPLETED, WiFiManager::StationStatus::FULLY_PROVISIONED } }); + +const Map + WiFiManager::sEventHandlerMap({ { NET_EVENT_WIFI_SCAN_RESULT, WiFiManager::ScanResultHandler }, + { NET_EVENT_WIFI_SCAN_DONE, WiFiManager::ScanDoneHandler }, + { NET_EVENT_WIFI_CONNECT_RESULT, WiFiManager::ConnectHandler }, + { NET_EVENT_WIFI_DISCONNECT_RESULT, WiFiManager::DisconnectHandler } }); + +void WiFiManager::WifiMgmtEventHandler(net_mgmt_event_callback * cb, uint32_t mgmtEvent, net_if * iface) +{ + if (0 == strcmp(iface->if_dev->dev->name, "wlan0")) + { + Platform::UniquePtr eventData(new uint8_t[cb->info_length]); + VerifyOrReturn(eventData); + memcpy(eventData.get(), cb->info, cb->info_length); + sEventHandlerMap[mgmtEvent](std::move(eventData)); + } +} + +CHIP_ERROR WiFiManager::Init() +{ + net_mgmt_init_event_callback(&mWiFiMgmtClbk, WifiMgmtEventHandler, kWifiManagementEvents); + net_mgmt_add_event_callback(&mWiFiMgmtClbk); + + ChipLogDetail(DeviceLayer, "WiFiManager has been initialized"); + + return CHIP_NO_ERROR; +} +CHIP_ERROR WiFiManager::Scan(const ByteSpan & ssid, ScanResultCallback resultCallback, ScanDoneCallback doneCallback, + bool internalScan) +{ + net_if * iface = InetUtils::GetInterface(); + VerifyOrReturnError(nullptr != iface, CHIP_ERROR_INTERNAL); + + mInternalScan = internalScan; + mScanResultCallback = resultCallback; + mScanDoneCallback = doneCallback; + mCachedWiFiState = mWiFiState; + mWiFiState = WIFI_STATE_SCANNING; + mSsidFound = false; + + if (0 != net_mgmt(NET_REQUEST_WIFI_SCAN, iface, NULL, 0)) + { + ChipLogError(DeviceLayer, "Scan request failed"); + return CHIP_ERROR_INTERNAL; + } + + ChipLogDetail(DeviceLayer, "WiFi scanning started..."); + + return CHIP_NO_ERROR; +} + +CHIP_ERROR WiFiManager::ClearStationProvisioningData() +{ + mWiFiParams.mRssi = std::numeric_limits::min(); + memset(&mWiFiParams.mParams, 0, sizeof(mWiFiParams.mParams)); + return CHIP_NO_ERROR; +} + +CHIP_ERROR WiFiManager::Connect(const ByteSpan & ssid, const ByteSpan & credentials, const ConnectionHandling & handling) +{ + ChipLogDetail(DeviceLayer, "Connecting to WiFi network: %*s", ssid.size(), ssid.data()); + + mHandling.mOnConnectionSuccess = handling.mOnConnectionSuccess; + mHandling.mOnConnectionFailed = handling.mOnConnectionFailed; + mHandling.mConnectionTimeout = handling.mConnectionTimeout; + + mWiFiState = WIFI_STATE_ASSOCIATING; + + // Store SSID and credentials and perform the scan to detect the security mode supported by the AP. + // Zephyr WiFi connect request will be issued in the callback when we have the SSID match. + mWantedNetwork.Erase(); + memcpy(mWantedNetwork.ssid, ssid.data(), ssid.size()); + memcpy(mWantedNetwork.pass, credentials.data(), credentials.size()); + mWantedNetwork.ssidLen = ssid.size(); + mWantedNetwork.passLen = credentials.size(); + + return Scan(ssid, nullptr, nullptr, true /* internal scan */); +} + +CHIP_ERROR WiFiManager::Disconnect() +{ + net_if * iface = InetUtils::GetInterface(); + VerifyOrReturnError(nullptr != iface, CHIP_ERROR_INTERNAL); + + mApplicationDisconnectRequested = true; + int status = net_mgmt(NET_REQUEST_WIFI_DISCONNECT, iface, NULL, 0); + + if (status) + { + mApplicationDisconnectRequested = false; + if (status == -EALREADY) + { + ChipLogDetail(DeviceLayer, "Already disconnected"); + } + else + { + ChipLogDetail(DeviceLayer, "Disconnect request failed"); + return CHIP_ERROR_INTERNAL; + } + } + else + { + ChipLogDetail(DeviceLayer, "Disconnect requested"); + } + + return CHIP_NO_ERROR; +} + +CHIP_ERROR WiFiManager::GetWiFiInfo(WiFiInfo & info) const +{ + net_if * iface = InetUtils::GetInterface(); + VerifyOrReturnError(nullptr != iface, CHIP_ERROR_INTERNAL); + struct wifi_iface_status status = { 0 }; + + if (net_mgmt(NET_REQUEST_WIFI_IFACE_STATUS, iface, &status, sizeof(struct wifi_iface_status))) + { + ChipLogError(DeviceLayer, "Status request failed"); + return CHIP_ERROR_INTERNAL; + } + + if (status.state >= WIFI_STATE_ASSOCIATED) + { + info.mSecurityType = MapToMatterSecurityType(status.security); + info.mWiFiVersion = MapToMatterWiFiVersionCode(status.link_mode); + info.mRssi = static_cast(status.rssi); + info.mChannel = static_cast(status.channel); + info.mSsidLen = status.ssid_len; + memcpy(info.mSsid, status.ssid, status.ssid_len); + memcpy(info.mBssId, status.bssid, sizeof(status.bssid)); + + return CHIP_NO_ERROR; + } + + return CHIP_ERROR_INTERNAL; +} + +CHIP_ERROR WiFiManager::GetNetworkStatistics(NetworkStatistics & stats) const +{ + net_stats_wifi data{}; + net_mgmt(NET_REQUEST_STATS_GET_WIFI, InetUtils::GetInterface(), &data, sizeof(data)); + + stats.mPacketMulticastRxCount = data.multicast.rx; + stats.mPacketMulticastTxCount = data.multicast.tx; + stats.mPacketUnicastRxCount = data.pkts.rx - data.multicast.rx - data.broadcast.rx; + stats.mPacketUnicastTxCount = data.pkts.tx - data.multicast.tx - data.broadcast.tx; + stats.mBeaconsSuccessCount = data.sta_mgmt.beacons_rx; + stats.mBeaconsLostCount = data.sta_mgmt.beacons_miss; + + return CHIP_NO_ERROR; +} + +void WiFiManager::ScanResultHandler(Platform::UniquePtr data) +{ + // Contrary to other handlers, offload accumulating of the scan results from the CHIP thread to the caller's thread + const struct wifi_scan_result * scanResult = reinterpret_cast(data.get()); + + if (Instance().mInternalScan && + Instance().mWantedNetwork.GetSsidSpan().data_equal(ByteSpan(scanResult->ssid, scanResult->ssid_length))) + { + // Prepare the connection parameters + // In case there are many networks with the same SSID choose the one with the best RSSI + if (scanResult->rssi > Instance().mWiFiParams.mRssi) + { + Instance().ClearStationProvisioningData(); + Instance().mWiFiParams.mParams.ssid_length = static_cast(Instance().mWantedNetwork.ssidLen); + Instance().mWiFiParams.mParams.ssid = Instance().mWantedNetwork.ssid; + // Fallback to the WIFI_SECURITY_TYPE_PSK if the security is unknown + Instance().mWiFiParams.mParams.security = + scanResult->security <= WIFI_SECURITY_TYPE_MAX ? scanResult->security : WIFI_SECURITY_TYPE_PSK; + Instance().mWiFiParams.mParams.psk_length = static_cast(Instance().mWantedNetwork.passLen); + Instance().mWiFiParams.mParams.mfp = (scanResult->mfp == WIFI_MFP_REQUIRED) ? WIFI_MFP_REQUIRED : WIFI_MFP_OPTIONAL; + + // If the security is none, WiFi driver expects the psk to be nullptr + if (Instance().mWiFiParams.mParams.security == WIFI_SECURITY_TYPE_NONE) + { + Instance().mWiFiParams.mParams.psk = nullptr; + } + else + { + Instance().mWiFiParams.mParams.psk = Instance().mWantedNetwork.pass; + } + + Instance().mWiFiParams.mParams.timeout = Instance().mHandling.mConnectionTimeout.count(); + Instance().mWiFiParams.mParams.channel = WIFI_CHANNEL_ANY; + Instance().mWiFiParams.mRssi = scanResult->rssi; + Instance().mSsidFound = true; + } + } + + if (Instance().mScanResultCallback && !Instance().mInternalScan) + { + Instance().mScanResultCallback(ToScanResponse(scanResult)); + } +} + +void WiFiManager::ScanDoneHandler(Platform::UniquePtr data) +{ + CHIP_ERROR err = SystemLayer().ScheduleLambda([capturedData = data.get()] { + Platform::UniquePtr safePtr(capturedData); + uint8_t * rawData = safePtr.get(); + const wifi_status * status = reinterpret_cast(rawData); + WiFiRequestStatus requestStatus = static_cast(status->status); + + if (requestStatus == WiFiRequestStatus::FAILURE) + { + ChipLogError(DeviceLayer, "Wi-Fi scan finalization failure (%d)", status->status); + } + else + { + ChipLogProgress(DeviceLayer, "Wi-Fi scan done (%d)", status->status); + } + + if (Instance().mScanDoneCallback && !Instance().mInternalScan) + { + Instance().mScanDoneCallback(requestStatus); + // restore the connection state from before the scan request was issued + Instance().mWiFiState = Instance().mCachedWiFiState; + return; + } + + // Internal scan is supposed to be followed by a connection request if the SSID has been found + if (Instance().mInternalScan) + { + + if (!Instance().mSsidFound) + { + auto currentTimeout = Instance().CalculateNextRecoveryTime(); + ChipLogProgress(DeviceLayer, "Starting connection recover: re-scanning... (next attempt in %d ms)", + currentTimeout.count()); + DeviceLayer::SystemLayer().StartTimer(currentTimeout, Recover, nullptr); + } + + Instance().mWiFiState = WIFI_STATE_ASSOCIATING; + net_if * iface = InetUtils::GetInterface(); + VerifyOrReturn(nullptr != iface, CHIP_ERROR_INTERNAL); + + if (net_mgmt(NET_REQUEST_WIFI_CONNECT, iface, &(Instance().mWiFiParams.mParams), sizeof(wifi_connect_req_params))) + { + ChipLogError(DeviceLayer, "Connection request failed"); + if (Instance().mHandling.mOnConnectionFailed) + { + Instance().mHandling.mOnConnectionFailed(); + } + Instance().mWiFiState = WIFI_STATE_DISCONNECTED; + return; + } + ChipLogProgress(DeviceLayer, "Connection to %*s requested [RSSI=%d]", Instance().mWiFiParams.mParams.ssid_length, + Instance().mWiFiParams.mParams.ssid, Instance().mWiFiParams.mRssi); + Instance().mInternalScan = false; + } + }); + + if (CHIP_NO_ERROR == err) + { + // the ownership has been transferred to the worker thread - release the buffer + data.release(); + } +} + +void WiFiManager::SendRouterSolicitation(System::Layer * layer, void * param) +{ + net_if * iface = InetUtils::GetInterface(); + if (iface && iface->if_dev->link_addr.type == NET_LINK_ETHERNET) + { + net_if_start_rs(iface); + Instance().mRouterSolicitationCounter++; + if (Instance().mRouterSolicitationCounter < kRouterSolicitationMaxCount) + { + DeviceLayer::SystemLayer().StartTimer(System::Clock::Milliseconds32(kRouterSolicitationIntervalMs), + SendRouterSolicitation, nullptr); + } + else + { + Instance().mRouterSolicitationCounter = 0; + } + } +} + +void WiFiManager::ConnectHandler(Platform::UniquePtr data) +{ + CHIP_ERROR err = SystemLayer().ScheduleLambda([capturedData = data.get()] { + Platform::UniquePtr safePtr(capturedData); + uint8_t * rawData = safePtr.get(); + const wifi_status * status = reinterpret_cast(rawData); + WiFiRequestStatus requestStatus = static_cast(status->status); + + if (requestStatus == WiFiRequestStatus::FAILURE || requestStatus == WiFiRequestStatus::TERMINATED) + { + ChipLogProgress(DeviceLayer, "Connection to WiFi network failed or was terminated by another request"); + Instance().mWiFiState = WIFI_STATE_DISCONNECTED; + if (Instance().mHandling.mOnConnectionFailed) + { + Instance().mHandling.mOnConnectionFailed(); + } + } + else // The connection has been established successfully. + { + // Workaround needed until sending Router Solicitation after connect will be done by the driver. + DeviceLayer::SystemLayer().StartTimer( + System::Clock::Milliseconds32(chip::Crypto::GetRandU16() % kMaxInitialRouterSolicitationDelayMs), + SendRouterSolicitation, nullptr); + + ChipLogProgress(DeviceLayer, "Connected to WiFi network"); + Instance().mWiFiState = WIFI_STATE_COMPLETED; + if (Instance().mHandling.mOnConnectionSuccess) + { + Instance().mHandling.mOnConnectionSuccess(); + } + Instance().PostConnectivityStatusChange(kConnectivity_Established); + + // Workaround needed to re-initialize mDNS server after Wi-Fi interface is operative + chip::DeviceLayer::ChipDeviceEvent event; + event.Type = chip::DeviceLayer::DeviceEventType::kDnssdInitialized; + + CHIP_ERROR error = chip::DeviceLayer::PlatformMgr().PostEvent(&event); + if (error != CHIP_NO_ERROR) + { + ChipLogError(DeviceLayer, "Cannot post event [error: %s]", ErrorStr(error)); + } + } + // cleanup the provisioning data as it is configured per each connect request + Instance().ClearStationProvisioningData(); + }); + + if (CHIP_NO_ERROR == err) + { + // the ownership has been transferred to the worker thread - release the buffer + data.release(); + } +} + +void WiFiManager::DisconnectHandler(Platform::UniquePtr) +{ + SystemLayer().ScheduleLambda([] { + ChipLogProgress(DeviceLayer, "WiFi station disconnected"); + Instance().mWiFiState = WIFI_STATE_DISCONNECTED; + Instance().PostConnectivityStatusChange(kConnectivity_Lost); + }); +} + +WiFiManager::StationStatus WiFiManager::GetStationStatus() const +{ + return WiFiManager::sStatusMap[mWiFiState]; +} + +void WiFiManager::PostConnectivityStatusChange(ConnectivityChange changeType) +{ + ChipDeviceEvent networkEvent{}; + networkEvent.Type = DeviceEventType::kWiFiConnectivityChange; + networkEvent.WiFiConnectivityChange.Result = changeType; + PlatformMgr().PostEventOrDie(&networkEvent); +} + +void WiFiManager::Recover(System::Layer *, void *) +{ + // Prevent scheduling recovery if we are already connected to the network. + if (Instance().mWiFiState == WIFI_STATE_COMPLETED) + { + Instance().AbortConnectionRecovery(); + return; + } + + // If kConnectionRecoveryMaxOverallInterval has a non-zero value prevent endless re-scan. + if (0 != kConnectionRecoveryMaxRetries && (++Instance().mConnectionRecoveryCounter >= kConnectionRecoveryMaxRetries)) + { + Instance().AbortConnectionRecovery(); + return; + } + + Instance().Scan(Instance().mWantedNetwork.GetSsidSpan(), nullptr, nullptr, true /* internal scan */); +} + +void WiFiManager::ResetRecoveryTime() +{ + mConnectionRecoveryTimeMs = kConnectionRecoveryMinIntervalMs; + mConnectionRecoveryCounter = 0; +} + +void WiFiManager::AbortConnectionRecovery() +{ + DeviceLayer::SystemLayer().CancelTimer(Recover, nullptr); + Instance().ResetRecoveryTime(); +} + +System::Clock::Milliseconds32 WiFiManager::CalculateNextRecoveryTime() +{ + if (mConnectionRecoveryTimeMs > kConnectionRecoveryMaxIntervalMs) + { + // Find the new random jitter value in range [-jitter, +jitter]. + int32_t jitter = chip::Crypto::GetRandU32() % (2 * jitter + 1) - jitter; + mConnectionRecoveryTimeMs = kConnectionRecoveryMaxIntervalMs + jitter; + return System::Clock::Milliseconds32(mConnectionRecoveryTimeMs); + } + else + { + uint32_t currentRecoveryTimeout = mConnectionRecoveryTimeMs; + mConnectionRecoveryTimeMs = mConnectionRecoveryTimeMs * 2; + return System::Clock::Milliseconds32(currentRecoveryTimeout); + } +} + +CHIP_ERROR WiFiManager::SetLowPowerMode(bool onoff) +{ + net_if * iface = InetUtils::GetInterface(); + VerifyOrReturnError(nullptr != iface, CHIP_ERROR_INTERNAL); + + wifi_ps_config currentConfig{}; + if (net_mgmt(NET_REQUEST_WIFI_PS_CONFIG, iface, ¤tConfig, sizeof(currentConfig))) + { + ChipLogError(DeviceLayer, "Get current low power mode config request failed"); + return CHIP_ERROR_INTERNAL; + } + + if ((currentConfig.ps_params.enabled == WIFI_PS_ENABLED && onoff == false) || + (currentConfig.ps_params.enabled == WIFI_PS_DISABLED && onoff == true)) + { + wifi_ps_params params{ .enabled = onoff ? WIFI_PS_ENABLED : WIFI_PS_DISABLED }; + if (net_mgmt(NET_REQUEST_WIFI_PS, iface, ¶ms, sizeof(params))) + { + ChipLogError(DeviceLayer, "Set low power mode request failed"); + return CHIP_ERROR_INTERNAL; + } + ChipLogProgress(DeviceLayer, "Successfully set low power mode [%d]", onoff); + return CHIP_NO_ERROR; + } + + ChipLogDetail(DeviceLayer, "Low power mode is already in requested state [%d]", onoff); + return CHIP_NO_ERROR; +} + +} // namespace DeviceLayer +} // namespace chip diff --git a/src/platform/telink/wifi/WiFiManager.h b/src/platform/telink/wifi/WiFiManager.h new file mode 100644 index 00000000000000..f48d8f9b372469 --- /dev/null +++ b/src/platform/telink/wifi/WiFiManager.h @@ -0,0 +1,238 @@ +/* + * + * Copyright (c) 2024 Project CHIP Authors + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * @file + * Provides the wrapper for Telink wpa_supplicant API + */ + +#pragma once + +#include +#include +#include +#include +#include + +#include +#include + +struct net_if; +struct wpa_ssid; +using WpaNetwork = struct wpa_ssid; + +namespace chip { +namespace DeviceLayer { + +// emulation of dictionary - might be moved to utils +template +class Map +{ + struct Pair + { + T1 key; + T2 value; + }; + +public: + Map(const Pair (&list)[N]) + { + int idx{ 0 }; + for (const auto & pair : list) + { + mMap[idx++] = pair; + } + } + + T2 operator[](const T1 & key) const + { + for (const auto & it : mMap) + { + if (key == it.key) + return it.value; + } + + return T2{}; + } + + Map() = delete; + Map(const Map &) = delete; + Map(Map &&) = delete; + Map & operator=(const Map &) = delete; + Map & operator=(Map &&) = delete; + ~Map() = default; + +private: + Pair mMap[N]; +}; + +class WiFiManager +{ +public: + enum WiFiRequestStatus : int + { + SUCCESS = 0, + FAILURE = 1, + TERMINATED = 2 + }; + + using ScanResultCallback = void (*)(const NetworkCommissioning::WiFiScanResponse &); + using ScanDoneCallback = void (*)(WiFiRequestStatus); + using ConnectionCallback = void (*)(); + + enum class StationStatus : uint8_t + { + NONE, + DISCONNECTED, + DISABLED, + SCANNING, + CONNECTING, + CONNECTED, + PROVISIONING, + FULLY_PROVISIONED, + UNKNOWN + }; + + static WiFiManager & Instance() + { + static WiFiManager sInstance; + return sInstance; + } + + struct ConnectionHandling + { + ConnectionCallback mOnConnectionSuccess{}; + ConnectionCallback mOnConnectionFailed{}; + System::Clock::Seconds32 mConnectionTimeout{}; + }; + + struct WiFiInfo + { + uint8_t mBssId[DeviceLayer::Internal::kWiFiBSSIDLength]; + app::Clusters::WiFiNetworkDiagnostics::SecurityTypeEnum mSecurityType{}; + app::Clusters::WiFiNetworkDiagnostics::WiFiVersionEnum mWiFiVersion{}; + uint16_t mChannel{}; + int8_t mRssi{}; + uint8_t mSsid[DeviceLayer::Internal::kMaxWiFiSSIDLength]; + size_t mSsidLen{ 0 }; + }; + + struct NetworkStatistics + { + uint32_t mPacketMulticastRxCount{}; + uint32_t mPacketMulticastTxCount{}; + uint32_t mPacketUnicastRxCount{}; + uint32_t mPacketUnicastTxCount{}; + uint32_t mBeaconsSuccessCount{}; + uint32_t mBeaconsLostCount{}; + }; + + struct WiFiNetwork + { + uint8_t ssid[DeviceLayer::Internal::kMaxWiFiSSIDLength]; + size_t ssidLen = 0; + uint8_t pass[DeviceLayer::Internal::kMaxWiFiKeyLength]; + size_t passLen = 0; + + bool IsConfigured() const { return ssidLen > 0; } + ByteSpan GetSsidSpan() const { return ByteSpan(ssid, ssidLen); } + ByteSpan GetPassSpan() const { return ByteSpan(pass, passLen); } + void Clear() { ssidLen = 0; } + void Erase() + { + memset(ssid, 0, DeviceLayer::Internal::kMaxWiFiSSIDLength); + memset(pass, 0, DeviceLayer::Internal::kMaxWiFiKeyLength); + ssidLen = 0; + passLen = 0; + } + }; + + static constexpr uint16_t kRouterSolicitationIntervalMs = 4000; + static constexpr uint16_t kMaxInitialRouterSolicitationDelayMs = 1000; + static constexpr uint8_t kRouterSolicitationMaxCount = 3; + static constexpr uint32_t kConnectionRecoveryMinIntervalMs = CONFIG_CHIP_WIFI_CONNECTION_RECOVERY_MINIMUM_INTERVAL; + static constexpr uint32_t kConnectionRecoveryMaxIntervalMs = CONFIG_CHIP_WIFI_CONNECTION_RECOVERY_MAXIMUM_INTERVAL; + static constexpr uint32_t kConnectionRecoveryJitterMs = CONFIG_CHIP_WIFI_CONNECTION_RECOVERY_JITTER; + static constexpr uint32_t kConnectionRecoveryMaxRetries = CONFIG_CHIP_WIFI_CONNECTION_RECOVERY_MAX_RETRIES_NUMBER; + + CHIP_ERROR Init(); + CHIP_ERROR Scan(const ByteSpan & ssid, ScanResultCallback resultCallback, ScanDoneCallback doneCallback, + bool internalScan = false); + CHIP_ERROR Connect(const ByteSpan & ssid, const ByteSpan & credentials, const ConnectionHandling & handling); + StationStatus GetStationStatus() const; + CHIP_ERROR ClearStationProvisioningData(); + CHIP_ERROR Disconnect(); + CHIP_ERROR GetWiFiInfo(WiFiInfo & info) const; + CHIP_ERROR GetNetworkStatistics(NetworkStatistics & stats) const; + void AbortConnectionRecovery(); + CHIP_ERROR SetLowPowerMode(bool onoff); + +private: + using NetEventHandler = void (*)(Platform::UniquePtr); + + struct ConnectionParams + { + wifi_connect_req_params mParams; + int8_t mRssi{ std::numeric_limits::min() }; + }; + + constexpr static uint32_t kWifiManagementEvents = NET_EVENT_WIFI_SCAN_RESULT | NET_EVENT_WIFI_SCAN_DONE | + NET_EVENT_WIFI_CONNECT_RESULT | NET_EVENT_WIFI_DISCONNECT_RESULT | NET_EVENT_WIFI_IFACE_STATUS; + + // Event handling + static void WifiMgmtEventHandler(net_mgmt_event_callback * cb, uint32_t mgmtEvent, net_if * iface); + static void ScanResultHandler(Platform::UniquePtr data); + static void ScanDoneHandler(Platform::UniquePtr data); + static void ConnectHandler(Platform::UniquePtr data); + static void DisconnectHandler(Platform::UniquePtr data); + static void PostConnectivityStatusChange(ConnectivityChange changeType); + static void SendRouterSolicitation(System::Layer * layer, void * param); + + // Connection Recovery feature + // This feature allows re-scanning and re-connecting the connection to the known network after + // a reboot or when a connection is lost. The following attempts will occur with increasing interval. + // The connection recovery interval starts from kConnectionRecoveryMinIntervalMs and is doubled + // with each occurrence until reaching kConnectionRecoveryMaxIntervalMs. + // When the connection recovery interval reaches the maximum value the randomized kConnectionRecoveryJitterMs + // from the range [-jitter, +jitter] is added to the value to avoid the periodicity. + // To avoid frequent recovery attempts when the signal to an access point is poor quality + // The connection recovery interval will be cleared after the defined delay in kConnectionRecoveryDelayToReset. + static void Recover(System::Layer * layer, void * param); + void ResetRecoveryTime(); + System::Clock::Milliseconds32 CalculateNextRecoveryTime(); + + ConnectionParams mWiFiParams{}; + ConnectionHandling mHandling; + wifi_iface_state mWiFiState; + wifi_iface_state mCachedWiFiState; + net_mgmt_event_callback mWiFiMgmtClbk{}; + ScanResultCallback mScanResultCallback{ nullptr }; + ScanDoneCallback mScanDoneCallback{ nullptr }; + WiFiNetwork mWantedNetwork{}; + bool mInternalScan{ false }; + uint8_t mRouterSolicitationCounter = 0; + bool mSsidFound{ false }; + uint32_t mConnectionRecoveryCounter{ 0 }; + uint32_t mConnectionRecoveryTimeMs{ kConnectionRecoveryMinIntervalMs }; + bool mApplicationDisconnectRequested{ false }; + + static const Map sStatusMap; + static const Map sEventHandlerMap; +}; + +} // namespace DeviceLayer +} // namespace chip diff --git a/src/protocols/Protocols.cpp b/src/protocols/Protocols.cpp index f840bb097249a9..4428d8c8b1540b 100644 --- a/src/protocols/Protocols.cpp +++ b/src/protocols/Protocols.cpp @@ -86,27 +86,27 @@ const char * GetMessageTypeName(Id protocolId, uint8_t msgType) switch (protocolId.GetProtocolId()) { case InteractionModel::Id.GetProtocolId(): - lookupTable = MessageTypeTraits::GetTypeToNameTable()->begin(); + lookupTable = MessageTypeTraits::GetTypeToNameTable()->data(); lookupTableSize = MessageTypeTraits::GetTypeToNameTable()->size(); break; case SecureChannel::Id.GetProtocolId(): - lookupTable = MessageTypeTraits::GetTypeToNameTable()->begin(); + lookupTable = MessageTypeTraits::GetTypeToNameTable()->data(); lookupTableSize = MessageTypeTraits::GetTypeToNameTable()->size(); break; case BDX::Id.GetProtocolId(): - lookupTable = MessageTypeTraits::GetTypeToNameTable()->begin(); + lookupTable = MessageTypeTraits::GetTypeToNameTable()->data(); lookupTableSize = MessageTypeTraits::GetTypeToNameTable()->size(); break; case Echo::Id.GetProtocolId(): - lookupTable = MessageTypeTraits::GetTypeToNameTable()->begin(); + lookupTable = MessageTypeTraits::GetTypeToNameTable()->data(); lookupTableSize = MessageTypeTraits::GetTypeToNameTable()->size(); break; case UserDirectedCommissioning::Id.GetProtocolId(): - lookupTable = MessageTypeTraits::GetTypeToNameTable()->begin(); + lookupTable = MessageTypeTraits::GetTypeToNameTable()->data(); lookupTableSize = MessageTypeTraits::GetTypeToNameTable()->size(); break; diff --git a/src/protocols/secure_channel/tests/TestCASESession.cpp b/src/protocols/secure_channel/tests/TestCASESession.cpp index 1ef821f30c8b50..5fc6a37f72f4ab 100644 --- a/src/protocols/secure_channel/tests/TestCASESession.cpp +++ b/src/protocols/secure_channel/tests/TestCASESession.cpp @@ -61,9 +61,9 @@ class TestContext : public Test::LoopbackMessagingContext { public: // Performs shared setup for all tests in the test suite - void SetUpTestSuite() override; + static void SetUpTestSuite(); // Performs shared teardown for all tests in the test suite - void TearDownTestSuite() override; + static void TearDownTestSuite(); }; void ServiceEvents(TestContext & ctx) @@ -1240,10 +1240,10 @@ static nlTestSuite sSuite = { "Test-CHIP-SecurePairing-CASE", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/protocols/secure_channel/tests/TestPASESession.cpp b/src/protocols/secure_channel/tests/TestPASESession.cpp index 368811a273ff66..d610b304cec481 100644 --- a/src/protocols/secure_channel/tests/TestPASESession.cpp +++ b/src/protocols/secure_channel/tests/TestPASESession.cpp @@ -89,7 +89,7 @@ class TestContext : public chip::Test::LoopbackMessagingContext { public: // Performs shared setup for all tests in the test suite - void SetUpTestSuite() override + static void SetUpTestSuite() { ConfigInitializeNodes(false); chip::Test::LoopbackMessagingContext::SetUpTestSuite(); @@ -541,10 +541,10 @@ static nlTestSuite sSuite = { "Test-CHIP-SecurePairing-PASE", &sTests[0], - TestContext::nlTestSetUpTestSuite, - TestContext::nlTestTearDownTestSuite, - TestContext::nlTestSetUp, - TestContext::nlTestTearDown, + NL_TEST_WRAP_FUNCTION(TestContext::SetUpTestSuite), + NL_TEST_WRAP_FUNCTION(TestContext::TearDownTestSuite), + NL_TEST_WRAP_METHOD(TestContext, SetUp), + NL_TEST_WRAP_METHOD(TestContext, TearDown), }; // clang-format on diff --git a/src/python_testing/TC_DeviceConformance.py b/src/python_testing/TC_DeviceConformance.py index 18ad273a6241d6..1db208fa39f40b 100644 --- a/src/python_testing/TC_DeviceConformance.py +++ b/src/python_testing/TC_DeviceConformance.py @@ -76,17 +76,25 @@ def record_warning(location, problem): success = True allow_provisional = self.user_params.get("allow_provisional", False) + # TODO: automate this once https://github.com/csa-data-model/projects/issues/454 is done. + provisional_cluster_ids = [Clusters.ContentControl.id, Clusters.ScenesManagement.id, Clusters.BallastConfiguration.id, + Clusters.EnergyPreference.id, Clusters.DeviceEnergyManagement.id, Clusters.DeviceEnergyManagementMode.id, Clusters.PulseWidthModulation.id, + Clusters.ProxyConfiguration.id, Clusters.ProxyDiscovery.id, Clusters.ProxyValid.id] for endpoint_id, endpoint in self.endpoints_tlv.items(): for cluster_id, cluster in endpoint.items(): + cluster_location = ClusterPathLocation(endpoint_id=endpoint_id, cluster_id=cluster_id) if cluster_id not in self.xml_clusters.keys(): if (cluster_id & 0xFFFF_0000) != 0: # manufacturer cluster continue - location = ClusterPathLocation(endpoint_id=endpoint_id, cluster_id=cluster_id) # TODO: update this from a warning once we have all the data - record_warning(location=location, problem='Standard cluster found on device, but is not present in spec data') + record_warning(location=cluster_location, + problem='Standard cluster found on device, but is not present in spec data') continue + if not allow_provisional and cluster_id in provisional_cluster_ids: + record_error(location=cluster_location, problem='Provisional cluster found on device') + feature_map = cluster[GlobalAttributeIds.FEATURE_MAP_ID] attribute_list = cluster[GlobalAttributeIds.ATTRIBUTE_LIST_ID] all_command_list = cluster[GlobalAttributeIds.ACCEPTED_COMMAND_LIST_ID] + \ diff --git a/src/python_testing/TC_ICDM_2_1.py b/src/python_testing/TC_ICDM_2_1.py index 21a3082ef282a9..6af092a4ed5116 100644 --- a/src/python_testing/TC_ICDM_2_1.py +++ b/src/python_testing/TC_ICDM_2_1.py @@ -15,98 +15,250 @@ # limitations under the License. # import logging +import re import chip.clusters as Clusters -from matter_testing_support import MatterBaseTest, async_test_body, default_matter_test_main +from matter_testing_support import MatterBaseTest, TestStep, async_test_body, default_matter_test_main from mobly import asserts -logger = logging.getLogger('PythonMatterControllerTEST') -logger.setLevel(logging.INFO) +logger = logging.getLogger(__name__) + +kRootEndpointId = 0 +kMaxUserActiveModeBitmap = 0x1FFFF +kMaxUserActiveModeTriggerInstructionByteLength = 128 + +cluster = Clusters.Objects.IcdManagement +uat = cluster.Bitmaps.UserActiveModeTriggerBitmap +modes = cluster.Enums.OperatingModeEnum +features = cluster.Bitmaps.Feature + +# BitMask for all user active mode trigger hints that are depedent on the UserActiveModeTriggerInstruction +kUatInstructionDependentBitMask = uat.kCustomInstruction | uat.kActuateSensorSeconds | uat.kActuateSensorTimes | uat.kActuateSensorLightsBlink | uat.kResetButtonLightsBlink | uat.kResetButtonSeconds | uat.kResetButtonTimes | uat.kSetupButtonSeconds | uat.kSetupButtonLightsBlink | uat.kSetupButtonTimes | uat.kAppDefinedButton + +# BitMask for UserActiveModeTriggerHint that REQUIRE the prescense of the UserActiveModeTriggerInstruction +kUatInstructionMandatoryBitMask = uat.kCustomInstruction | uat.kActuateSensorSeconds | uat.kActuateSensorTimes | uat.kResetButtonSeconds | uat.kResetButtonTimes | uat.kSetupButtonSeconds | uat.kSetupButtonTimes | uat.kAppDefinedButton + +# BitMask for all user active mode trigger hints that have the UserActiveModeTriggerInstruction as an uint +kUatNumberInstructionBitMask = uat.kActuateSensorSeconds | uat.kActuateSensorTimes | uat.kResetButtonSeconds | uat.kResetButtonTimes | uat.kSetupButtonSeconds | uat.kSetupButtonTimes + +# BitMask for all user active mode trigger hints that provide a color in the UserActiveModeTriggerInstruction +kUatColorInstructionBitMask = uat.kActuateSensorLightsBlink | uat.kResetButtonLightsBlink | uat.kSetupButtonLightsBlink class TC_ICDM_2_1(MatterBaseTest): - async def read_icdm_attribute_expect_success(self, endpoint, attribute): - cluster = Clusters.Objects.IcdManagement - return await self.read_single_attribute_check_success(endpoint=endpoint, cluster=cluster, attribute=attribute) + + # + # Class Helper functions + # + + @staticmethod + def is_valid_uint32_value(var): + return isinstance(var, int) and 0 <= var <= 0xFFFFFFFF + + @staticmethod + def is_valid_uint16_value(var): + return isinstance(var, int) and 0 <= var <= 0xFFFF + + @staticmethod + def is_valid_uint8_value(var): + return isinstance(var, int) and 0 <= var <= 0xFF + + @staticmethod + def set_bits_count(number): + return bin(number).count("1") + + async def _read_icdm_attribute_expect_success(self, attribute): + return await self.read_single_attribute_check_success(endpoint=kRootEndpointId, cluster=cluster, attribute=attribute) + + async def _wildcard_cluster_read(self): + return await self.default_controller.ReadAttribute(self.dut_node_id, [(kRootEndpointId, cluster)]) + + # + # Test Harness Helpers + # + + def desc_TC_ICDM_2_1(self) -> str: + """Returns a description of this test""" + return "[TC_ICDM_2_1] attributes with DUT as Server" + + def steps_TC_ICDM_2_1(self) -> list[TestStep]: + steps = [ + TestStep(1, "Commissioning, already done", is_commissioning=True), + TestStep(2, "TH reads from the DUT the ActiveModeThreshold attribute."), + TestStep(3, "TH reads from the DUT the ActiveModeDuration attribute."), + TestStep(4, "TH reads from the DUT the IdleModeDuration attribute."), + TestStep( + 5, "TH reads from the DUT the ClientsSupportedPerFabric attribute."), + TestStep(6, "TH reads from the DUT the RegisteredClients attribute."), + TestStep(7, "TH reads from the DUT the ICDCounter attribute."), + TestStep( + 8, "TH reads from the DUT the UserActiveModeTriggerHint attribute."), + TestStep( + 9, "TH reads from the DUT the UserActiveModeTriggerInstruction attribute"), + TestStep(10, "TH reads from the DUT the OperatingMode attribute."), + ] + return steps def pics_TC_ICDM_2_1(self) -> list[str]: - return ["ICDM.S"] + """ This function returns a list of PICS for this test case that must be True for the test to be run""" + pics = [ + "ICDM.S", + ] + return pics + + # + # ICDM 2.1 Test Body + # @async_test_body async def test_TC_ICDM_2_1(self): - if not self.check_pics("ICDM.S"): - logger.info("Test skipped because PICS ICDM.S is not set") - return + cluster = Clusters.Objects.IcdManagement + attributes = cluster.Attributes + + # Commissioning + self.step(1) + # Read feature map + featureMap = await self._read_icdm_attribute_expect_success( + attributes.FeatureMap) + + # Validate ActiveModeThreshold + self.step(2) + if self.check_pics("ICDM.S.A0002"): - endpoint = self.user_params.get("endpoint", 0) + activeModeThreshold = await self._read_icdm_attribute_expect_success( + attributes.ActiveModeThreshold) + # Verify ActiveModeThreshold is not bigger than uint16 + asserts.assert_true(self.is_valid_uint16_value(activeModeThreshold), + "ActiveModeThreshold attribute does not fit in a uint16.") - self.print_step(1, "Commissioning, already done") - attributes = Clusters.IcdManagement.Attributes - idleModeDuration = 0 + if featureMap > 0 and features.kLongIdleTimeSupport in features(featureMap): + asserts.assert_greater_equal( + activeModeThreshold, 5000, "Minimum ActiveModeThreshold is 5s for a LIT ICD.") - # Idle Mode Duration attribute test - if (self.check_pics("ICDM.S.A0000")): - self.print_step(2, "Read IdleModeDuration Attribute") + else: + asserts.assert_true( + False, "ActiveModeThreshold is a mandatory attribute and must be present in the PICS file") - idleModeDuration = await self.read_icdm_attribute_expect_success(endpoint=endpoint, - attribute=attributes.IdleModeDuration) - asserts.assert_greater_equal(idleModeDuration, 1, "IdleModeDuration attribute is smaller than minimum value (1).") - asserts.assert_less_equal(idleModeDuration, 64800, "IdleModeDuration attribute is greater than maximum value (64800).") + # Validate ActiveModeDuration + self.step(3) + if self.check_pics("ICDM.S.A0001"): + activeModeDuration = await self._read_icdm_attribute_expect_success( + attributes.ActiveModeDuration) + # Verify ActiveModeDuration is not bigger than uint32 + asserts.assert_true(self.is_valid_uint32_value(activeModeDuration), + "ActiveModeDuration attribute does not fit in a uint32") else: - asserts.assert_true(False, "IdleModeDuration is a mandatory attribute and must be present in the PICS file") - - # Active Mode Duration attribute test - if (self.check_pics("ICDM.S.A0001")): - self.print_step(2, "Read ActiveModeDuration Attribute") - - idleModeDuration *= 1000 # Convert seconds to milliseconds - activeModeDuration = await self.read_icdm_attribute_expect_success(endpoint=endpoint, - attribute=attributes.ActiveModeDuration) - asserts.assert_true(0 <= activeModeDuration <= 65535, - "ActiveModeDuration attribute does not fit in a uint16.") - asserts.assert_less_equal(activeModeDuration, idleModeDuration, - "ActiveModeDuration attribute is greater than the IdleModeDuration attrbiute.") + asserts.assert_true( + False, "ActiveModeDuration is a mandatory attribute and must be present in the PICS file") + + # Validate IdleModeDuration + self.step(4) + if self.check_pics("ICDM.S.A0000"): + idleModeDuration = await self._read_icdm_attribute_expect_success( + attributes.IdleModeDuration) + # Verify IdleModeDuration is not bigger than uint32 + asserts.assert_greater_equal( + idleModeDuration, 1, "IdleModeDuration attribute is smaller than minimum value (1).") + asserts.assert_less_equal( + idleModeDuration, 64800, "IdleModeDuration attribute is greater than maximum value (64800).") + asserts.assert_greater_equal(idleModeDuration * 1000, activeModeDuration, + "ActiveModeDuration attribute is greater than the IdleModeDuration attrbiute.") else: - asserts.assert_true(False, "ActiveModeDuration is a mandatory attribute and must be present in the PICS file") + asserts.assert_true( + False, "IdleModeDuration is a mandatory attribute and must be present in the PICS file") - # Active Mode Threshold attribute test - if (self.check_pics("ICDM.S.A0002")): - self.print_step(2, "Read ActiveModeThreshold Attribute") + # Validate ClientsSupportedPerFabric + self.step(5) + if self.pics_guard(self.check_pics("ICDM.S.A0005")): + clientsSupportedPerFabric = await self._read_icdm_attribute_expect_success( + attributes.ClientsSupportedPerFabric) - activeModeThreshold = await self.read_icdm_attribute_expect_success(endpoint=endpoint, - attribute=attributes.ActiveModeThreshold) - asserts.assert_true(0 <= activeModeThreshold <= 65535, - "ActiveModeThreshold attribute does not fit in a uint16.") + # Verify ClientsSupportedPerFabric is not bigger than uint16 + asserts.assert_true(self.is_valid_uint16_value(clientsSupportedPerFabric), + "ClientsSupportedPerFabric attribute does not fit in a uint16.") + + asserts.assert_greater_equal( + clientsSupportedPerFabric, 1, "ClientsSupportedPerFabric attribute is smaller than minimum value (1).") + + # Validate RegisteredClients + self.step(6) + if self.pics_guard(self.check_pics("ICDM.S.A0003")): + registeredClients = await self._read_icdm_attribute_expect_success( + attributes.RegisteredClients) + + asserts.assert_true(isinstance( + registeredClients, list), "RegisteredClients is not a list.") + + # Validate ICDCounter + self.step(7) + if self.pics_guard(self.check_pics("ICDM.S.A0004")): + + icdCounter = await self._read_icdm_attribute_expect_success( + attributes.ICDCounter) + # Verify ICDCounter is not bigger than uint32 + asserts.assert_true(self.is_valid_uint32_value(icdCounter), + "ActiveModeDuration attribute does not fit in a uint32") + + # Validate UserActiveModeTriggerHint + self.step(8) + if self.pics_guard(self.check_pics("ICDM.S.A0006")): + userActiveModeTriggerHint = await self._read_icdm_attribute_expect_success( + attributes.UserActiveModeTriggerHint) + + # Verify that it is a bitmap32 - Only the first 16 bits are used + asserts.assert_true(0 <= userActiveModeTriggerHint <= kMaxUserActiveModeBitmap, + "UserActiveModeTriggerHint attribute does not fit in a bitmap32") + + # Verify that only a single UserActiveModeTriggerInstruction dependent bit is set + uatHintInstructionDepedentBitmap = uat( + userActiveModeTriggerHint) & kUatInstructionDependentBitMask + + asserts.assert_less_equal( + self.set_bits_count(uatHintInstructionDepedentBitmap), 1, "UserActiveModeTriggerHint has more than 1 bit that is dependent on the UserActiveModeTriggerInstruction") + + # Valdate UserActiveModeTriggerInstruction + self.step(9) + if self.check_pics("ICDM.S.A0007"): + userActiveModeTriggerInstruction = await self._read_icdm_attribute_expect_success( + attributes.UserActiveModeTriggerInstruction) + + # Verify that the UserActiveModeTriggerInstruction has the correct encoding + try: + encodedUATInstruction = userActiveModeTriggerInstruction.encode( + 'utf-8') + except Exception: + asserts.assert_true( + False, "UserActiveModeTriggerInstruction is not encoded in the correct format (utf-8).") + + # Verify byte length of the UserActiveModeTirggerInstruction + asserts.assert_less_equal( + len(encodedUATInstruction), kMaxUserActiveModeTriggerInstructionByteLength, "UserActiveModeTriggerInstruction is longuer than the maximum allowed length (128).") + + if uatHintInstructionDepedentBitmap > 0 and uatHintInstructionDepedentBitmap in kUatNumberInstructionBitMask: + # Validate Instruction is a decimal unsigned integer using the ASCII digits 0-9, and without leading zeros. + asserts.assert_true((re.search(r'^(?!0)[0-9]*$', userActiveModeTriggerInstruction) is not None), + "UserActiveModeTriggerInstruction is not in the correct format for the associated UserActiveModeTriggerHint") + + if uatHintInstructionDepedentBitmap > 0 and uatHintInstructionDepedentBitmap in kUatColorInstructionBitMask: + # TODO: https://github.com/CHIP-Specifications/connectedhomeip-spec/issues/9194 + asserts.assert_true(False, "Nothing to do for now") else: - asserts.assert_true(False, "ActiveModeThreshold is a mandatory attribute and must be present in the PICS file") - - # RegisteredClients attribute test - if (self.check_pics("ICDM.S.A0003")): - self.print_step(2, "Read RegisteredClients Attribute") - - await self.read_icdm_attribute_expect_success(endpoint=endpoint, - attribute=attributes.RegisteredClients) - - # ICDCounter attribute test - if (self.check_pics("ICDM.S.A0003")): - self.print_step(2, "Read ICDCounter Attribute") - - ICDCounter = await self.read_icdm_attribute_expect_success(endpoint=endpoint, - attribute=attributes.ICDCounter) - asserts.assert_true(0 <= ICDCounter <= 4294967295, - "ICDCounter attribute does not fit in a uint32.") - - # ClientsSupportedPerFabric attribute test - if (self.check_pics("ICDM.S.A0003")): - self.print_step(2, "Read ClientsSupportedPerFabric Attribute") - - clientsSupportedPerFabric = await self.read_icdm_attribute_expect_success(endpoint=endpoint, - attribute=attributes.ClientsSupportedPerFabric) - asserts.assert_true(0 <= clientsSupportedPerFabric <= 65535, - "ActiveModeThreshold ClientsSupportedPerFabric does not fit in a uint16.") - asserts.assert_greater_equal(clientsSupportedPerFabric, 1, - "ClientsSupportedPerFabric attribute is smaller than minimum value (1).") + # Check if the UserActiveModeTriggerInstruction was required + asserts.assert_false(uatHintInstructionDepedentBitmap in kUatInstructionMandatoryBitMask, + "UserActiveModeTriggerHint requires the UserActiveModeTriggerInstruction") + + # Verify OperatingMode + self.step(10) + if self.pics_guard(self.check_pics("ICDM.S.A0008")): + operatingMode = await self._read_icdm_attribute_expect_success( + attributes.OperatingMode) + + asserts.assert_true(self.is_valid_uint8_value(operatingMode), + "OperatingMode does not fit in an enum8") + + asserts.assert_less( + operatingMode, modes.kUnknownEnumValue, "OperatingMode can only have 0 and 1 as valid values") if __name__ == "__main__": diff --git a/src/python_testing/TC_ICDM_3_1.py b/src/python_testing/TC_ICDM_3_1.py new file mode 100644 index 00000000000000..87bd7a740ba786 --- /dev/null +++ b/src/python_testing/TC_ICDM_3_1.py @@ -0,0 +1,264 @@ + +# +# Copyright (c) 2023 Project CHIP Authors +# All rights reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +import logging +import os + +import chip.clusters as Clusters +from chip.interaction_model import InteractionModelError, Status +from matter_testing_support import MatterBaseTest, TestStep, async_test_body, default_matter_test_main +from mobly import asserts + +logger = logging.getLogger(__name__) + +kRootEndpointId = 0 + +cluster = Clusters.Objects.IcdManagement +commands = cluster.Commands +monitoredRegistration = cluster.Structs.MonitoringRegistrationStruct + + +# Step 2 Registration entry +kStep2CheckInNodeId = 101 +kStep2MonitoredSubjectStep2 = 1001 +kStep2Key = b"\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" + + +class TC_ICDM_3_1(MatterBaseTest): + + # + # Class Helper functions + # + async def _read_icdm_attribute_expect_success(self, attribute): + return await self.read_single_attribute_check_success(endpoint=kRootEndpointId, cluster=cluster, attribute=attribute) + + async def _send_single_icdm_command(self, command): + return await self.send_single_cmd(command, endpoint=kRootEndpointId) + # + # Test Harness Helpers + # + + def desc_TC_ICDM_3_1(self) -> str: + """Returns a description of this test""" + return "[TC-ICDM-3.1] Register/Unregister Clients with DUT as Server" + + def steps_TC_ICDM_3_1(self) -> list[TestStep]: + steps = [ + TestStep("0a", "Commissioning, already done", + is_commissioning=True), + TestStep( + "0b", "TH reads from the DUT the RegisteredClients attribute. RegisteredClients is empty."), + TestStep( + "1a", "TH reads from the DUT the ClientsSupportedPerFabric attribute."), + TestStep( + "1b", "TH reads from the DUT the ICDCounter attribute."), + TestStep(2, "TH sends RegisterClient command."), + TestStep(3, "TH reads from the DUT the RegisteredClients attribute."), + TestStep( + 4, "If len(RegisteredClients) is less than ClientsSupportedPerFabric, TH repeats RegisterClient command with different CheckInNodeID(s) until the number of entries in RegisteredClients equals ClientsSupportedPerFabric."), + TestStep(5, "TH reads from the DUT the RegisteredClients attribute."), + TestStep( + 6, "TH sends RegisterClient command with a different CheckInNodeID."), + TestStep( + 7, "TTH sends UnregisterClient command with the CheckInNodeID from Step 6."), + TestStep( + 8, "TH sends UnregisterClient command with the CheckInNodeID from Step 2."), + TestStep( + 9, "TH reads from the DUT the RegisteredClients attribute."), + TestStep( + 10, "Repeat Step 9 with the rest of CheckInNodeIDs from the list of RegisteredClients from Step 4, if any."), + TestStep(11, "TH reads from the DUT the RegisteredClients attribute."), + TestStep( + 12, "TH sends UnregisterClient command with the CheckInNodeID from Step 2."), + ] + return steps + + def pics_TC_ICDM_3_1(self) -> list[str]: + """ This function returns a list of PICS for this test case that must be True for the test to be run""" + pics = [ + "ICDM.S", + "ICDM.S.F00" + ] + return pics + + # + # ICDM 3.1 Test Body + # + + @async_test_body + async def test_TC_ICDM_3_1(self): + + cluster = Clusters.Objects.IcdManagement + attributes = cluster.Attributes + + # Pre-Condition: Commissioning + self.step("0a") + + # Pre-Condition: Empty RegisteredClients attribute for all registrations + self.step("0b") + registeredClients = await self._read_icdm_attribute_expect_success( + attributes.RegisteredClients) + + for client in registeredClients: + try: + await self._send_single_icdm_command(commands.UnregisterClient(checkInNodeID=client.checkInNodeID)) + except InteractionModelError as e: + asserts.assert_equal( + e.status, Status.Success, "Unexpected error returned") + pass + + self.step("1a") + if self.pics_guard(self.check_pics("ICDM.S.A0005")): + clientsSupportedPerFabric = await self._read_icdm_attribute_expect_success( + attributes.ClientsSupportedPerFabric) + + self.step("1b") + if self.pics_guard(self.check_pics("ICDM.S.A0005")): + icdCounter = await self._read_icdm_attribute_expect_success(attributes.ICDCounter) + + self.step(2) + if self.pics_guard(self.check_pics("ICDM.S.C00.Rsp")): + try: + response = await self._send_single_icdm_command(commands.RegisterClient(checkInNodeID=kStep2CheckInNodeId, monitoredSubject=kStep2MonitoredSubjectStep2, key=kStep2Key)) + except InteractionModelError as e: + asserts.assert_equal( + e.status, Status.Success, "Unexpected error returned") + pass + + # Validate response contains the ICDCounter + asserts.assert_greater_equal(response.ICDCounter, icdCounter, + "The ICDCounter in the response does not match the read ICDCounter.") + + self.step(3) + if self.pics_guard(self.check_pics("ICDM.S.A0003")): + registeredClients = await self._read_icdm_attribute_expect_success( + attributes.RegisteredClients) + # Validate list size + asserts.assert_equal(len(registeredClients), 1, + "The expected length of RegisteredClients is 1. List has the wrong size.") + + # Validate entry values + asserts.assert_equal( + registeredClients[0].checkInNodeID, kStep2CheckInNodeId, "The read attribute does not match the registered value.") + asserts.assert_equal( + registeredClients[0].monitoredSubject, kStep2MonitoredSubjectStep2, "The read attribute does not match the registered value.") + + self.step(4) + if self.pics_guard(self.check_pics("ICDM.S.C00.Rsp")): + if (len(registeredClients) < clientsSupportedPerFabric): + newClients = [] + # Generate new clients data + for i in range(clientsSupportedPerFabric - len(registeredClients)): + newClients.append({ + "checkInNodeID": i + 1, + "monitoredSubject": i + 1, + "key": os.urandom(16) + }) + + for client in newClients: + try: + response = await self._send_single_icdm_command(commands.RegisterClient(checkInNodeID=client["checkInNodeID"], monitoredSubject=client["monitoredSubject"], key=client["key"])) + except InteractionModelError as e: + asserts.assert_equal( + e.status, Status.Success, "Unexpected error returned") + pass + + # Validate response contains the ICDCounter + asserts.assert_greater_equal(response.ICDCounter, icdCounter, + "The ICDCounter in the response does not match the read ICDCounter.") + + self.step(5) + if self.pics_guard(self.check_pics("ICDM.S.A0003")): + registeredClients = await self._read_icdm_attribute_expect_success( + attributes.RegisteredClients) + + # Validate list size + asserts.assert_equal(len(registeredClients[1:]), len(newClients), + "The expected length of RegisteredClients is clientsSupportedPerFabric. List has the wrong size.") + + for client, expectedClient in zip(registeredClients[1:], newClients): + asserts.assert_equal( + client.checkInNodeID, expectedClient["checkInNodeID"], "The read attribute does not match the registered value.") + asserts.assert_equal( + client.monitoredSubject, expectedClient["monitoredSubject"], "The read attribute does not match the registered value.") + + self.step(6) + if self.pics_guard(self.check_pics("ICDM.S.C00.Rsp")): + try: + response = await self._send_single_icdm_command(commands.RegisterClient(checkInNodeID=0xFFFF, monitoredSubject=0xFFFF, key=os.urandom(16))) + except InteractionModelError as e: + asserts.assert_equal( + e.status, Status.ResourceExhausted, "Unexpected error returned") + pass + + self.step(7) + if self.pics_guard(self.check_pics("ICDM.S.C02.Rsp")): + try: + await self._send_single_icdm_command(commands.UnregisterClient(checkInNodeID=0xFFFF)) + except InteractionModelError as e: + asserts.assert_equal( + e.status, Status.NotFound, "Unexpected error returned") + pass + + self.step(8) + if self.pics_guard(self.check_pics("ICDM.S.C02.Rsp")): + try: + await self._send_single_icdm_command(commands.UnregisterClient(checkInNodeID=kStep2CheckInNodeId)) + except InteractionModelError as e: + asserts.assert_equal( + e.status, Status.Success, "Unexpected error returned") + pass + + self.step(9) + if self.pics_guard(self.check_pics("ICDM.S.A0003")): + registeredClients = await self._read_icdm_attribute_expect_success( + attributes.RegisteredClients) + + for client in registeredClients: + asserts.assert_not_equal(client.checkInNodeID, kStep2CheckInNodeId, + "CheckInNodeID was unregistered. It should not be present in the attribute list.") + + self.step(10) + if self.pics_guard(self.check_pics("ICDM.S.C02.Rsp")): + for client in newClients: + try: + await self._send_single_icdm_command(commands.UnregisterClient(checkInNodeID=client["checkInNodeID"])) + except InteractionModelError as e: + asserts.assert_equal( + e.status, Status.Success, "Unexpected error returned") + pass + + self.step(11) + if self.pics_guard(self.check_pics("ICDM.S.A0003")): + registeredClients = await self._read_icdm_attribute_expect_success( + attributes.RegisteredClients) + + asserts.assert_true( + not registeredClients, "This list should empty. An element did not get deleted.") + + self.step(12) + if self.pics_guard(self.check_pics("ICDM.S.C02.Rsp")): + try: + await self._send_single_icdm_command(commands.UnregisterClient(checkInNodeID=kStep2CheckInNodeId)) + except InteractionModelError as e: + asserts.assert_equal( + e.status, Status.NotFound, "Unexpected error returned") + pass + + +if __name__ == "__main__": + default_matter_test_main() diff --git a/src/python_testing/test_testing/MockTestRunner.py b/src/python_testing/test_testing/MockTestRunner.py index 451e38d4660ac6..5d6592b5a8cd41 100644 --- a/src/python_testing/test_testing/MockTestRunner.py +++ b/src/python_testing/test_testing/MockTestRunner.py @@ -37,9 +37,9 @@ async def __call__(self, *args, **kwargs): class MockTestRunner(): - def __init__(self, filename: str, classname: str, test: str, endpoint: int): + def __init__(self, filename: str, classname: str, test: str, endpoint: int, pics: dict[str, bool] = {}): self.config = MatterTestConfig( - tests=[test], endpoint=endpoint, dut_node_ids=[1]) + tests=[test], endpoint=endpoint, dut_node_ids=[1], pics=pics) self.stack = MatterStackState(self.config) self.default_controller = self.stack.certificate_authorities[0].adminList[0].NewController( nodeId=self.config.controller_node_id, diff --git a/src/python_testing/test_testing/test_TC_ICDM_2_1.py b/src/python_testing/test_testing/test_TC_ICDM_2_1.py new file mode 100755 index 00000000000000..5069eb6ed9d0a7 --- /dev/null +++ b/src/python_testing/test_testing/test_TC_ICDM_2_1.py @@ -0,0 +1,235 @@ +#!/usr/bin/env -S python3 -B +# +# Copyright (c) 2024 Project CHIP Authors +# All rights reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +import string +import sys +from dataclasses import dataclass + +import chip.clusters as Clusters +from chip.clusters import Attribute +from MockTestRunner import MockTestRunner + +c = Clusters.IcdManagement +attr = c.Attributes +uat = c.Bitmaps.UserActiveModeTriggerBitmap + + +@dataclass +class ICDMData(): + FeatureMap: int + IdleModeDuration: int + ActiveModeDuration: int + ActiveModeThreshold: int + RegisteredClients: list + ICDCounter: int + ClientsSupportedPerFabric: int + UserActiveModeTriggerHint: int + UserActiveModeTriggerInstruction: string + OperatingMode: c.Enums.OperatingModeEnum + expect_pass: bool + + +long_string = "Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut e" +too_long_string = long_string + "1" + +TEST_CASES = [ + + # ============================== + # ICDM 2.1 Test cases + # ============================== + # -------- + # Test cases to validate IdleModeDuration + # -------- + # IdleModeDuration under minimum (< 1) + ICDMData(0, 0, 0, 100, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, False), + # IdleModeDuration at minimum + ICDMData(0, 1, 0, 100, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, True), + # IdleModeDuration at maximum + ICDMData(0, 64800, 100, 100, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, True), + # IdleModeDuration over maximum (>64800) + ICDMData(0, 64801, 100, 100, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, False), + # IdleModeDuration < ActiveModeDuration + ICDMData(0, 1, 1001, 100, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, False), + # -------- + # Test cases to validate ActiveModeDuration + # -------- + # ActiveModeDuration under minimum + ICDMData(0, 100, -1, 100, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, False), + # ActiveModeDuration at minimum + ICDMData(0, 100, 0, 100, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, True), + # ActiveModeDuration at maximum - value is max IdleModeDuration value - 1 + ICDMData(0, 64800, 0x3DCC4FF, 100, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, True), + # -------- + # Test cases to validate ActiveModeThreshold + # -------- + # ActiveModeThreshold < minimum + ICDMData(0, 1, 0, -1, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, False), + # ActiveModeThreshold at SIT minimum + ICDMData(0, 1, 0, 0, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, True), + # ActiveModeThreshold under LIT minimum + ICDMData(0x7, 1, 0, 4999, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kLit, False), + # ActiveModeThreshold at LIT minimum + ICDMData(0x7, 1, 0, 5000, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kLit, True), + # ActiveModeThreshold at Maximum + ICDMData(0, 1, 0, 0xFFFF, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, True), + # ActiveModeThreshold over Maximum + ICDMData(0, 1, 0, 0x10000, [], 0, 2, 0, "", + c.Enums.OperatingModeEnum.kSit, False), + # -------- + # Test cases to validate ClientsSupportedPerFabric + # -------- + # ClientsSupportedPerFabric under minimum (< 1) + ICDMData(0, 1, 0, 100, [], 0, 0, 0, "", + c.Enums.OperatingModeEnum.kLit, False), + # ClientsSupportedPerFabric at minimum + ICDMData(0, 1, 0, 100, [], 0, 1, 0, "", + c.Enums.OperatingModeEnum.kLit, True), + # ClientsSupportedPerFabric at maximum + ICDMData(0, 1, 0, 100, [], 0, 255, 0, "", + c.Enums.OperatingModeEnum.kLit, True), + # ClientsSupportedPerFabric > maximum + ICDMData(0, 1, 0, 100, [], 0, 256, 0, "", + c.Enums.OperatingModeEnum.kLit, True), + # -------- + # Test cases to validate RegisteredClients + # -------- + # Incorrect type + ICDMData(0, 1, 0, 100, 0, 0, 1, 0, "", + c.Enums.OperatingModeEnum.kLit, False), + # Correct type + ICDMData(0, 1, 0, 100, [], 0, 1, 0, "", + c.Enums.OperatingModeEnum.kLit, True), + # -------- + # Test cases to validate ICDCounter + # -------- + # ICDCounter under minimum (< 0) + ICDMData(0, 1, 0, 100, [], -1, 1, 0, "", + c.Enums.OperatingModeEnum.kLit, False), + # ICDCounter at minimum + ICDMData(0, 1, 0, 100, [], 0, 1, 0, "", + c.Enums.OperatingModeEnum.kLit, True), + # ICDCounter at maximum + ICDMData(0, 1, 0, 100, [], 0xFFFFFFFF, 1, 0, "", + c.Enums.OperatingModeEnum.kLit, True), + # ICDCounter over maximum + ICDMData(0, 1, 0, 100, [], 0x100000000, 1, 0, "", + c.Enums.OperatingModeEnum.kLit, False), + # -------- + # Test cases to validate UserActiveModeTriggerHint + # -------- + # UserActiveModeTriggerHint outsite valid range + ICDMData(0, 1, 0, 100, [], 0, 1, 0x1FFFF, "", + c.Enums.OperatingModeEnum.kLit, False), + # UserActiveModeTriggerHint outsite valid range + ICDMData(0, 1, 0, 100, [], 0, 1, -1, "", + c.Enums.OperatingModeEnum.kLit, False), + # UserActiveModeTriggerHint with no hints + ICDMData(0, 1, 0, 100, [], 0, 1, 0, "", + c.Enums.OperatingModeEnum.kLit, True), + # UserActiveModeTriggerHint wiht two instruction depedent bits set + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kCustomInstruction | uat.kActuateSensorSeconds, "", + c.Enums.OperatingModeEnum.kLit, False), + # -------- + # Test cases to validate UserActiveModeTriggerInstruction + # -------- + # UserActiveModeTriggerInstruction with wrong encoding + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kCustomInstruction, "Hello\uD83D\uDE00World", + c.Enums.OperatingModeEnum.kLit, False), + # UserActiveModeTriggerInstruction with empty string + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kCustomInstruction, "", + c.Enums.OperatingModeEnum.kLit, True), + # UserActiveModeTriggerInstruction with empty string + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kCustomInstruction, "", + c.Enums.OperatingModeEnum.kLit, True), + # UserActiveModeTriggerInstruction with max string length + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kCustomInstruction, long_string, + c.Enums.OperatingModeEnum.kLit, True), + # UserActiveModeTriggerInstruction > max string length + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kCustomInstruction, too_long_string, + c.Enums.OperatingModeEnum.kLit, False), + # UserActiveModeTriggerInstruction invalid number - Trailing 0s + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kActuateSensorSeconds, "001", + c.Enums.OperatingModeEnum.kLit, False), + # UserActiveModeTriggerInstruction invalid number - Letters + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kActuateSensorSeconds, "not a number", + c.Enums.OperatingModeEnum.kLit, False), + # UserActiveModeTriggerInstruction Valid number + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kActuateSensorSeconds, "100000", + c.Enums.OperatingModeEnum.kLit, True), + # -------- + # Test cases to validate OpertingMode + # -------- + # OpertingMode with negative value + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kActuateSensorSeconds, "100000", + -1, False), + # OpertingMode with Accepted value + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kActuateSensorSeconds, "100000", + c.Enums.OperatingModeEnum.kLit, True), + # OpertingMode with unkown value + ICDMData(0, 1, 0, 100, [], 0, 1, uat.kActuateSensorSeconds, "100000", + c.Enums.OperatingModeEnum.kUnknownEnumValue, False), + +] + + +def test_spec_to_attribute_cache(test_icdm: ICDMData) -> Attribute.AsyncReadTransaction.ReadResponse: + resp = Attribute.AsyncReadTransaction.ReadResponse({}, [], {}) + resp.attributes = {0: {c: {attr.FeatureMap: test_icdm.FeatureMap, attr.IdleModeDuration: test_icdm.IdleModeDuration, attr.ActiveModeDuration: test_icdm.ActiveModeDuration, attr.ActiveModeThreshold: test_icdm.ActiveModeThreshold, + attr.RegisteredClients: test_icdm.RegisteredClients, attr.ICDCounter: test_icdm.ICDCounter, + attr.ClientsSupportedPerFabric: test_icdm.ClientsSupportedPerFabric, attr.UserActiveModeTriggerHint: test_icdm.UserActiveModeTriggerHint, + attr.UserActiveModeTriggerInstruction: test_icdm.UserActiveModeTriggerInstruction, attr.OperatingMode: test_icdm.OperatingMode}}} + return resp + + +def main(): + pics = {"ICDM.S.A0000": True, "ICDM.S.A0001": True, "ICDM.S.A0002": True, "ICDM.S.A0003": True, "ICDM.S.A0004": True, + "ICDM.S.A0005": True, "ICDM.S.A0006": True, "ICDM.S.A0007": True, "ICDM.S.A0008": True, } + + test_runner = MockTestRunner( + 'TC_ICDM_2_1', 'TC_ICDM_2_1', 'test_TC_ICDM_2_1', 0, pics) + failures = [] + for idx, t in enumerate(TEST_CASES): + ok = test_runner.run_test_with_mock_read( + test_spec_to_attribute_cache(t)) == t.expect_pass + if not ok: + failures.append(f"Measured test case failure: {idx} {t}") + + test_runner.Shutdown() + print( + f"Test of tests: run {len(TEST_CASES)}, test response correct: {len(TEST_CASES) - len(failures)} | test response incorrect: {len(failures)}") + for f in failures: + print(f) + + return 1 if failures else 0 + + +if __name__ == "__main__": + sys.exit(main()) diff --git a/src/system/SystemConfig.h b/src/system/SystemConfig.h index 15e6abdb5d4e83..e91f59298f683e 100644 --- a/src/system/SystemConfig.h +++ b/src/system/SystemConfig.h @@ -178,6 +178,23 @@ /* Configuration option variables defined below */ +/** + * @def CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL + * + * @brief + * Enable the use of lwIP pbufs from a custom pool + * + * This config option exist because not all platforms defines LWIP_PBUF_FROM_CUSTOM_POOLS in lwip/opt.h + * Defaults to LWIP_PBUF_FROM_CUSTOM_POOLS if defined, otherwise 0 + */ +#ifndef CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL +#if CHIP_SYSTEM_CONFIG_USE_LWIP && defined(LWIP_PBUF_FROM_CUSTOM_POOLS) +#define CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL LWIP_PBUF_FROM_CUSTOM_POOLS +#else +#define CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL 0 +#endif // CHIP_SYSTEM_CONFIG_USE_LWIP && defined(LWIP_PBUF_FROM_CUSTOM_POOLS) +#endif // CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL + /** * @def CHIP_SYSTEM_CONFIG_POSIX_LOCKING * diff --git a/src/system/SystemPacketBufferInternal.h b/src/system/SystemPacketBufferInternal.h index e6acb76f6b6e80..e4f1391867a5ae 100644 --- a/src/system/SystemPacketBufferInternal.h +++ b/src/system/SystemPacketBufferInternal.h @@ -27,10 +27,6 @@ #include #include -#if CHIP_SYSTEM_CONFIG_USE_LWIP -#include -#endif // CHIP_SYSTEM_CONFIG_USE_LWIP - /** * CHIP_SYSTEM_PACKETBUFFER_FROM_CHIP_HEAP * @@ -82,7 +78,7 @@ * * True if packet buffers are allocated from an LwIP custom pool. */ -#if CHIP_SYSTEM_PACKETBUFFER_FROM_LWIP_POOL && !LWIP_PBUF_FROM_CUSTOM_POOLS +#if CHIP_SYSTEM_PACKETBUFFER_FROM_LWIP_POOL && !CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL #define CHIP_SYSTEM_PACKETBUFFER_FROM_LWIP_STANDARD_POOL 1 #else #define CHIP_SYSTEM_PACKETBUFFER_FROM_LWIP_STANDARD_POOL 0 @@ -93,7 +89,7 @@ * * True if packet buffers are allocated from an LwIP custom pool. */ -#if CHIP_SYSTEM_PACKETBUFFER_FROM_LWIP_POOL && LWIP_PBUF_FROM_CUSTOM_POOLS +#if CHIP_SYSTEM_PACKETBUFFER_FROM_LWIP_POOL && CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL #define CHIP_SYSTEM_PACKETBUFFER_FROM_LWIP_CUSTOM_POOL 1 #else #define CHIP_SYSTEM_PACKETBUFFER_FROM_LWIP_CUSTOM_POOL 0 diff --git a/src/system/SystemStats.cpp b/src/system/SystemStats.cpp index 5ef16369ccc853..3a844b6179040b 100644 --- a/src/system/SystemStats.cpp +++ b/src/system/SystemStats.cpp @@ -38,7 +38,7 @@ namespace System { namespace Stats { static const Label sStatsStrings[chip::System::Stats::kNumEntries] = { -#if CHIP_SYSTEM_CONFIG_USE_LWIP && LWIP_PBUF_FROM_CUSTOM_POOLS +#if CHIP_SYSTEM_CONFIG_USE_LWIP && CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL #define LWIP_PBUF_MEMPOOL(name, num, payload, desc) "SystemLayer_Num" desc, #include "lwippools.h" #undef LWIP_PBUF_MEMPOOL @@ -107,7 +107,7 @@ bool Difference(Snapshot & result, Snapshot & after, Snapshot & before) void UpdateLwipPbufCounts(void) { -#if LWIP_PBUF_FROM_CUSTOM_POOLS +#if CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL size_t lwip_pool_idx = PBUF_CUSTOM_POOL_IDX_END; size_t system_idx = 0; @@ -119,12 +119,12 @@ void UpdateLwipPbufCounts(void) system_idx++; } -#else // LWIP_PBUF_FROM_CUSTOM_POOLS +#else // CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL chip::System::Stats::GetResourcesInUse()[kSystemLayer_NumPacketBufs] = MEMP_STATS_GET(used, MEMP_PBUF_POOL); chip::System::Stats::GetHighWatermarks()[kSystemLayer_NumPacketBufs] = MEMP_STATS_GET(max, MEMP_PBUF_POOL); -#endif // LWIP_PBUF_FROM_CUSTOM_POOLS +#endif // CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL } #endif // CHIP_SYSTEM_CONFIG_USE_LWIP && LWIP_STATS && MEMP_STATS diff --git a/src/system/SystemStats.h b/src/system/SystemStats.h index 24c1dad9ae36c5..35f3e19ca299be 100644 --- a/src/system/SystemStats.h +++ b/src/system/SystemStats.h @@ -27,6 +27,7 @@ // Include configuration headers #include #include +#include // Include dependent headers #include @@ -47,7 +48,7 @@ namespace Stats { enum { -#if CHIP_SYSTEM_CONFIG_USE_LWIP && LWIP_PBUF_FROM_CUSTOM_POOLS +#if CHIP_SYSTEM_CONFIG_USE_LWIP && CHIP_SYSTEM_CONFIG_LWIP_PBUF_FROM_CUSTOM_POOL #define LWIP_PBUF_MEMPOOL(name, num, payload, desc) kSystemLayer_Num##name, #include "lwippools.h" #undef LWIP_PBUF_MEMPOOL diff --git a/src/system/tests/TestSystemTimer.cpp b/src/system/tests/TestSystemTimer.cpp index 6c065b96a01f9a..6271836238b55c 100644 --- a/src/system/tests/TestSystemTimer.cpp +++ b/src/system/tests/TestSystemTimer.cpp @@ -70,7 +70,7 @@ class LayerEvents class LayerEvents::value>::type> @@ -87,7 +87,7 @@ class LayerEvents #include #include +#include #include +#include #include #include +#include #include #include #include @@ -37,6 +40,8 @@ #include #include +#include "SilabsDeviceDataProvider.h" + extern "C" int printf(const char * format, ...) { va_list args; @@ -56,8 +61,11 @@ class NlTest : public pw_rpc::nanopb::NlTest::Service stream_writer = &writer; nlTestSetLogger(&nl_test_logger); - RunRegisteredUnitTests(); - + printf("--- Running nltest ---"); + int status = RunRegisteredUnitTests(); + printf("--- Running gtest ---"); + status += chip::test::RunAllTests(); + printf("Test status: %d", status); stream_writer = nullptr; writer.Finish(); } @@ -194,6 +202,9 @@ int main(void) chip::Platform::MemoryInit(); chip::DeviceLayer::PlatformMgr().InitChipStack(); + // required for inits tied to the event loop + chip::DeviceLayer::SetDeviceInstanceInfoProvider(&chip::DeviceLayer::Silabs::SilabsDeviceDataProvider::GetDeviceDataProvider()); + chip::DeviceLayer::SetCommissionableDataProvider(&chip::DeviceLayer::Silabs::SilabsDeviceDataProvider::GetDeviceDataProvider()); SILABS_LOG("***** CHIP EFR32 device tests *****\r\n"); diff --git a/src/test_driver/mbed/integration_tests/common/utils.py b/src/test_driver/mbed/integration_tests/common/utils.py index 036b612d7ba18c..2b1db4da30ab8e 100644 --- a/src/test_driver/mbed/integration_tests/common/utils.py +++ b/src/test_driver/mbed/integration_tests/common/utils.py @@ -14,6 +14,7 @@ # limitations under the License. +import asyncio import logging import platform import random @@ -114,21 +115,33 @@ def send_zcl_command(devCtrl, line): if len(args) < 5: raise exceptions.InvalidArgumentCount(5, len(args)) - if args[0] not in all_commands: - raise exceptions.UnknownCluster(args[0]) - command = all_commands.get(args[0]).get(args[1], None) + cluster = args[0] + command = args[1] + if cluster not in all_commands: + raise exceptions.UnknownCluster(cluster) + commandObj = all_commands.get(cluster).get(command, None) # When command takes no arguments, (not command) is True - if command is None: - raise exceptions.UnknownCommand(args[0], args[1]) - err, res = devCtrl.ZCLSend(args[0], args[1], int( - args[2]), int(args[3]), int(args[4]), FormatZCLArguments(args[5:], command), blocking=True) - if err != 0: - log.error("Failed to send ZCL command [{}] {}.".format(err, res)) - elif res is not None: - log.info("Success, received command response:") - log.info(res) - else: - log.info("Success, no command response.") + if commandObj is None: + raise exceptions.UnknownCommand(cluster, command) + + try: + req = commandObj(**FormatZCLArguments(args[5:], commandObj)) + except BaseException: + raise exceptions.UnknownCommand(cluster, command) + + nodeid = int(args[2]) + endpoint = int(args[3]) + try: + res = asyncio.run(devCtrl.SendCommand(nodeid, endpoint, req)) + logging.debug(f"CommandResponse {res}") + if res is not None: + log.info("Success, received command response:") + log.info(res) + else: + log.info("Success, no command response.") + except exceptions.InteractionModelError as ex: + return (int(ex.status), None) + log.error("Failed to send ZCL command [{}] {}.".format(int(ex.status), None)) except exceptions.ChipStackException as ex: log.error("An exception occurred during processing ZCL command:") log.error(str(ex)) diff --git a/src/transport/raw/tests/NetworkTestHelpers.h b/src/transport/raw/tests/NetworkTestHelpers.h index bf1e812a87fe02..49890406bc6afb 100644 --- a/src/transport/raw/tests/NetworkTestHelpers.h +++ b/src/transport/raw/tests/NetworkTestHelpers.h @@ -72,7 +72,12 @@ class LoopbackTransportDelegate class LoopbackTransport : public Transport::Base { public: - void InitLoopbackTransport(System::Layer * systemLayer) { mSystemLayer = systemLayer; } + void InitLoopbackTransport(System::Layer * systemLayer) + { + Reset(); + mSystemLayer = systemLayer; + } + void ShutdownLoopbackTransport() { // Make sure no one left packets hanging out that they thought got