Skip to content

Commit 124f306

Browse files
committed
Appended steps to check modify of both PIN and Aliro credentiaType is as expected
1 parent 1a27981 commit 124f306

File tree

1 file changed

+98
-41
lines changed

1 file changed

+98
-41
lines changed

src/python_testing/TC_DRLK_2_9.py

+98-41
Original file line numberDiff line numberDiff line change
@@ -114,23 +114,35 @@ def steps_TC_DRLK_2_9(self) -> list[TestStep]:
114114
"Verify that the DUT responds with GetUserResponse Command."),
115115
TestStep("22", "TH sends ClearCredential Command to DUT to clear all the credentials.",
116116
"Verify that the DUT sends SUCCESS response."),
117-
TestStep("23a", "TH sends ClearAliroReaderConfig Command to DUT.",
117+
TestStep("23", "TH sends ClearUser Command to DUT to clear all the users.",
118118
"Verify that the DUT sends SUCCESS response."),
119-
TestStep("23b", ",TH sends SetAliroReaderConfig Command to DUT without GroupResolvingKey.",
119+
TestStep("24", "TH sends SetUser Command to DUT.",
120+
"Verify that the DUT sends SUCCESS response."),
121+
TestStep("25", "TH sends ClearAliroReaderConfig Command to DUT.",
122+
"Verify that the DUT sends SUCCESS response."),
123+
TestStep("26", ",TH sends SetAliroReaderConfig Command to DUT without GroupResolvingKey.",
120124
"Verify that DUT sends success response."),
121-
TestStep("24", "TH sends SetCredential Command CredentialType as AliroEvictableEndpointKey.",
125+
TestStep("27", ",TH sends SetAliroReaderConfig Command to DUT with GroupResolvingKey.",
126+
"Verify that DUT sends success response."),
127+
TestStep("28", "TH sends SetCredential Command CredentialType as AliroEvictableEndpointKey.",
122128
"Verify that the DUT responds with SetCredentialResponse commad with status success "),
123-
TestStep("25", "TH sends GetUser Command to DUT.",
129+
TestStep("29", "TH sends SetCredential Command to DUT with CredentialType.PIN.",
130+
"Verify that the DUT sends SetCredentialResponse command with Status SUCCESS."),
131+
TestStep("30", "TH sends GetUser Command to DUT.",
124132
"Verify that the DUT sends SUCCESS response."),
125-
TestStep("26", "TH sends SetCredential Command to modify PIN CredentialType",
133+
TestStep("31", "TH sends SetCredential Command to modify PIN CredentialType",
126134
"Verify that the DUT responds with SetCredentialResponse command with status success "),
127-
TestStep("27", "TH sends GetUser Command to DUT.",
135+
TestStep("32", "TH sends GetUser Command to DUT.",
128136
"Verify that the DUT sends SUCCESS response."),
129-
TestStep("28", "TH sends ClearCredential Command to DUT.",
137+
TestStep("33", "TH sends SetCredential Command to modify AliroEvictableEndpointKey CredentialType",
138+
"Verify that the DUT responds with SetCredentialResponse command with status success "),
139+
TestStep("34", "TH sends GetUser Command to DUT.",
140+
"Verify that the DUT sends SUCCESS response."),
141+
TestStep("35", "TH sends ClearCredential Command to DUT.",
130142
"Verify that the DUT sends SUCCESS response."),
131-
TestStep("29", "TH sends ClearUser Command to DUT.",
143+
TestStep("36", "TH sends ClearUser Command to DUT.",
132144
"Verify that the DUT sends SUCCESS response."),
133-
TestStep("30", "TH sends ClearAliroReaderConfig Command to DUT.",
145+
TestStep("37", "TH sends ClearAliroReaderConfig Command to DUT.",
134146
"Verify that the DUT sends SUCCESS response."), ]
135147

136148
return steps
@@ -242,7 +254,7 @@ async def set_credential_cmd(self, credential_enum: drlkcluster.Enums.Credential
242254
timedRequestTimeoutMs=1000)
243255
asserts.assert_true(type_matches(response, drlkcluster.Commands.SetCredentialResponse),
244256
"Unexpected return type for SetCredential")
245-
257+
asserts.assert_equal(response.userIndex, NullValue)
246258
if (statuscode != custom_stautus_code):
247259
asserts.assert_true(response.status == statuscode,
248260
"Error sending SetCredential command, status={}".format(str(response.status)))
@@ -272,7 +284,8 @@ async def send_clear_aliro_reader_config_cmd(self, expected_status: Status = Sta
272284
except InteractionModelError as e:
273285
asserts.assert_equal(e.status, expected_status, f"Unexpected error returned: {e}")
274286

275-
async def send_set_aliro_reader_config_cmd(self, expected_status: Status = Status.Success):
287+
async def send_set_aliro_reader_config_cmd(self, use_group_resolving_key: bool,
288+
expected_status: Status = Status.Success):
276289
try:
277290

278291
signingKey = bytes.fromhex("89d085fc302ca53e279bfcdecdf3c4adb2f5d9bc9ea6c49e9566d144367df3ff")
@@ -281,23 +294,22 @@ async def send_set_aliro_reader_config_cmd(self, expected_status: Status = Statu
281294
groupIdentifier = bytes.fromhex("89d085fc302ca53e279bfcdecdf3c4ad")
282295
groupResolvingKey = bytes.fromhex("89d0859bfcdecdf3c4adfc302ca53e27")
283296

284-
grp_resolve = False
285-
286297
# Checks Pics condition
287-
if self.check_pics("DRLK.S.F0e") is False:
288-
grp_resolve = self.pics_guard(self.check_pics("DRLK.S.F0d") and self.check_pics("DRLK.S.C28.Rsp"))
298+
if use_group_resolving_key is False:
299+
pics_check = self.pics_guard(self.check_pics("DRLK.S.F0d") and not self.check_pics("DRLK.S.F0e") and
300+
self.check_pics("DRLK.S.C28.Rsp"))
289301
else:
290-
grp_resolve = self.pics_guard(self.check_pics("DRLK.S.C28.Rsp"))
302+
pics_check = self.pics_guard(self.check_pics("DRLK.S.F0e") and self.check_pics("DRLK.S.C28.Rsp"))
291303

292-
if not grp_resolve:
304+
if not use_group_resolving_key and pics_check:
293305
await self.send_single_cmd(cmd=Clusters.DoorLock.Commands.SetAliroReaderConfig(
294306
signingKey=signingKey,
295307
verificationKey=verificationKey,
296-
groupIdentifier=self.groupIdentifier),
308+
groupIdentifier=groupIdentifier),
297309
endpoint=self.app_cluster_endpoint,
298310
timedRequestTimeoutMs=1000)
299311
asserts.assert_equal(expected_status, Status.Success)
300-
elif grp_resolve:
312+
elif use_group_resolving_key and pics_check:
301313
await self.send_single_cmd(cmd=Clusters.DoorLock.Commands.SetAliroReaderConfig(
302314
signingKey=signingKey,
303315
verificationKey=verificationKey,
@@ -334,11 +346,14 @@ async def test_TC_DRLK_2_9(self):
334346
self.inavlid_pincode = b""
335347
self.rfid_tag = b""
336348

337-
# Aliro Keys for setting Aliro configuration and credential
349+
# Aliro Keys for setting Aliro configuration and credential
338350

339-
aliroevictableendpointkey = bytes.fromhex(
351+
aliroevictableendpointkey1 = bytes.fromhex(
340352
"047a4c772d753924cdf3779a3c84fec2debaa6f0b3084450878acc7ddcce7856ae57b1ebbe2561015103dd7474c2a183675378ec55f1e465ac3436bf3dd5ca54d4")
341353

354+
aliroevictableendpointkey2 = bytes.fromhex(
355+
"047a4c662d753924cdf3779a3c84fec2debaa6f0b3084450878acc7ddcce7856ae57b1ebbe2561015103dd7474c2a183675378ec55f1e465ac3436bf3dd5ca54d4")
356+
342357
self.step("1")
343358
if self.pics_guard(self.check_pics("DRLK.S.F08") and self.check_pics("DRLK.S.A0011")):
344359
self.numberoftotaluserssupported = await self.read_attributes_from_dut(endpoint=self.app_cluster_endpoint,
@@ -623,60 +638,102 @@ async def test_TC_DRLK_2_9(self):
623638
await self.get_user(userIndex_1, user_name, user_unique_id1, credentiallist, Status.Success)
624639

625640
self.step("22")
626-
if self.pics_guard(self.check_pics("DRLK.S.F01") and self.check_pics("DRLK.S.C26.Rsp")):
641+
if self.pics_guard(self.check_pics("DRLK.S.C26.Rsp")):
642+
await self.clear_credentials_cmd(credential=NullValue)
627643

628-
credentials = drlkcluster.Structs.CredentialStruct(credentialIndex=1,
629-
credentialType=drlkcluster.Enums.CredentialTypeEnum.kRfid)
630-
await self.clear_credentials_cmd(credential=credentials)
644+
self.step("23")
645+
if self.pics_guard(self.check_pics("DRLK.S.F08") and self.check_pics("DRLK.S.C1d.Rsp")):
646+
await self.send_clear_user_cmd(userIndex_1)
631647

632-
self.step("23a")
648+
self.step("24")
649+
if self.pics_guard(self.check_pics("DRLK.S.F08") and self.check_pics("DRLK.S.C1a.Rsp")):
650+
try:
651+
await self.send_single_cmd(cmd=drlkcluster.Commands.SetUser(
652+
operationType=Clusters.DoorLock.Enums.DataOperationTypeEnum.kAdd,
653+
userIndex=userIndex_1,
654+
userName=user_name,
655+
userUniqueID=user_unique_id1,
656+
userStatus=Clusters.DoorLock.Enums.UserStatusEnum.kOccupiedEnabled,
657+
userType=Clusters.DoorLock.Enums.UserTypeEnum.kUnrestrictedUser,
658+
credentialRule=Clusters.DoorLock.Enums.CredentialRuleEnum.kSingle),
659+
endpoint=self.app_cluster_endpoint,
660+
timedRequestTimeoutMs=1000)
661+
except InteractionModelError as e:
662+
logging.exception(e)
663+
664+
self.step("25")
633665
if self.check_pics("DRLK.S.C29.Rsp"):
634666
await self.send_clear_aliro_reader_config_cmd()
635667

636-
self.step("23b")
637-
await self.send_set_aliro_reader_config_cmd(expected_status=Status.Success)
668+
self.step("26")
669+
await self.send_set_aliro_reader_config_cmd(use_group_resolving_key=False, expected_status=Status.Success)
670+
self.step("27")
671+
await self.send_set_aliro_reader_config_cmd(use_group_resolving_key=True, expected_status=Status.Success)
638672

639-
self.step("24")
640-
if self.pics_guard(self.check_pics("DRLK.S.F0d") and self.check_pics("DRLK.S.F08")
673+
self.step("28")
674+
if self.pics_guard(self.check_pics("DRLK.S.F0d")
641675
and self.check_pics("DRLK.S.C22.Rsp") and self.check_pics("DRLK.S.C23.Tx")):
642-
await self.set_credential_cmd(credentialData=aliroevictableendpointkey,
676+
await self.set_credential_cmd(credentialData=aliroevictableendpointkey1,
643677
operationType=drlkcluster.Enums.DataOperationTypeEnum.kAdd,
644678
credential_enum=drlkcluster.Enums.CredentialTypeEnum.kAliroEvictableEndpointKey,
645679
credentialIndex=credentialIndex_1, userIndex=userIndex_1, userStatus=NullValue, userType=NullValue, statuscode=Status.Success)
646-
self.step("25")
680+
681+
self.step("29")
682+
if self.pics_guard(self.check_pics("DRLK.S.F00")
683+
and self.check_pics("DRLK.S.C22.Rsp") and self.check_pics("DRLK.S.C23.Tx")):
684+
await self.set_credential_cmd(credentialData=self.pin_code,
685+
operationType=drlkcluster.Enums.DataOperationTypeEnum.kAdd,
686+
credential_enum=drlkcluster.Enums.CredentialTypeEnum.kPin,
687+
credentialIndex=credentialIndex_1, userIndex=userIndex_1, userStatus=NullValue, userType=NullValue, statuscode=Status.Success)
688+
self.step("30")
647689
if self.pics_guard(self.check_pics("DRLK.S.F00") and self.check_pics("DRLK.S.F0d") and self.check_pics("DRLK.S.C1b.Rsp")):
648690

649691
credentiallist: list[drlkcluster.Structs.CredentialStruct]
650692
credentiallist = [drlkcluster.Structs.CredentialStruct(credentialIndex=credentialIndex_1,
651-
credentialType=drlkcluster.Enums.CredentialTypeEnum.kPin),
693+
credentialType=drlkcluster.Enums.CredentialTypeEnum.kAliroEvictableEndpointKey),
652694
drlkcluster.Structs.CredentialStruct(credentialIndex=credentialIndex_1,
653-
credentialType=drlkcluster.Enums.CredentialTypeEnum.kAliroEvictableEndpointKey)]
695+
credentialType=drlkcluster.Enums.CredentialTypeEnum.kPin)]
654696
await self.get_user(userIndex_1, user_name, user_unique_id1, credentiallist, Status.Success)
655-
self.step("26")
697+
self.step("31")
656698
if self.pics_guard(self.check_pics("DRLK.S.F00") and self.check_pics("DRLK.S.C22.Rsp") and self.check_pics("DRLK.S.C23.Tx")):
657699
await self.set_credential_cmd(credentialData=self.pin_code2,
658700
operationType=drlkcluster.Enums.DataOperationTypeEnum.kModify,
659701
credential_enum=drlkcluster.Enums.CredentialTypeEnum.kPin,
660702
credentialIndex=credentialIndex_1, userIndex=userIndex_1, userStatus=NullValue, userType=NullValue, statuscode=Status.Success)
661703

662-
self.step("27")
704+
self.step("32")
663705
if self.pics_guard(self.check_pics("DRLK.S.F00") and self.check_pics("DRLK.S.F0d") and self.check_pics("DRLK.S.C1b.Rsp")):
664706

665707
credentiallist: list[drlkcluster.Structs.CredentialStruct]
666708
credentiallist = [drlkcluster.Structs.CredentialStruct(credentialIndex=credentialIndex_1,
667-
credentialType=drlkcluster.Enums.CredentialTypeEnum.kPin),
709+
credentialType=drlkcluster.Enums.CredentialTypeEnum.kAliroEvictableEndpointKey),
668710
drlkcluster.Structs.CredentialStruct(credentialIndex=credentialIndex_1,
669-
credentialType=drlkcluster.Enums.CredentialTypeEnum.kAliroEvictableEndpointKey)]
711+
credentialType=drlkcluster.Enums.CredentialTypeEnum.kPin)]
670712
await self.get_user(userIndex_1, user_name, user_unique_id1, credentiallist, Status.Success)
713+
self.step("33")
714+
if self.pics_guard(self.check_pics("DRLK.S.F0d") and self.check_pics("DRLK.S.C22.Rsp") and self.check_pics("DRLK.S.C23.Tx")):
715+
await self.set_credential_cmd(credentialData=aliroevictableendpointkey2,
716+
operationType=drlkcluster.Enums.DataOperationTypeEnum.kModify,
717+
credential_enum=drlkcluster.Enums.CredentialTypeEnum.kAliroEvictableEndpointKey,
718+
credentialIndex=credentialIndex_1, userIndex=userIndex_1, userStatus=NullValue, userType=NullValue, statuscode=Status.Success)
719+
self.step("34")
720+
if self.pics_guard(self.check_pics("DRLK.S.F00") and self.check_pics("DRLK.S.F0d") and self.check_pics("DRLK.S.C1b.Rsp")):
671721

672-
self.step("28")
722+
credentiallist: list[drlkcluster.Structs.CredentialStruct]
723+
credentiallist = [drlkcluster.Structs.CredentialStruct(credentialIndex=credentialIndex_1,
724+
credentialType=drlkcluster.Enums.CredentialTypeEnum.kAliroEvictableEndpointKey),
725+
drlkcluster.Structs.CredentialStruct(credentialIndex=credentialIndex_1,
726+
credentialType=drlkcluster.Enums.CredentialTypeEnum.kPin)]
727+
await self.get_user(userIndex_1, user_name, user_unique_id1, credentiallist, Status.Success)
728+
729+
self.step("35")
673730
if self.pics_guard(self.check_pics("DRLK.S.C26.Rsp")):
674731
await self.clear_credentials_cmd(credential=NullValue)
675732

676-
self.step("29")
733+
self.step("36")
677734
if self.pics_guard(self.check_pics("DRLK.S.F08") and self.check_pics("DRLK.S.C1d.Rsp")):
678735
await self.send_clear_user_cmd(userIndex_1)
679-
self.step("30")
736+
self.step("37")
680737
if self.pics_guard(self.check_pics("DRLK.S.C29.Rsp")):
681738
await self.send_clear_aliro_reader_config_cmd()
682739

0 commit comments

Comments
 (0)