Skip to content

Commit 9ee695b

Browse files
committed
PR review -Init the pin and rid variables
1 parent 7779420 commit 9ee695b

File tree

1 file changed

+30
-24
lines changed

1 file changed

+30
-24
lines changed

src/python_testing/TC_DRLK_2_9.py

+30-24
Original file line numberDiff line numberDiff line change
@@ -171,17 +171,18 @@ async def generate_max_pincode_len(self, maxPincodeLength):
171171
return ''.join(random.choices(string.digits, k=maxPincodeLength))
172172

173173
async def generate_code(self):
174-
175-
validpincodestr = await self.generate_max_pincode_len(self.maxpincodelength)
176-
self.pin_code = bytes(validpincodestr, 'ascii')
177-
validpincodestr = await self.generate_max_pincode_len(self.maxpincodelength)
178-
self.pin_code1 = bytes(validpincodestr, 'ascii')
179-
validpincodestr = await self.generate_max_pincode_len(self.maxpincodelength)
180-
self.pin_code2 = bytes(validpincodestr, 'ascii')
181-
inavlidpincodestr = await self.generate_max_pincode_len(self.maxpincodelength+1)
182-
self.inavlid_pincode = bytes(inavlidpincodestr, 'ascii')
183-
validpincodestr = await self.generate_max_pincode_len(self.maxrfidcodelength)
184-
self.rfid_tag = bytes(validpincodestr, 'ascii')
174+
if (self.maxpincodelength != None):
175+
validpincodestr = await self.generate_max_pincode_len(self.maxpincodelength)
176+
self.pin_code = bytes(validpincodestr, 'ascii')
177+
validpincodestr = await self.generate_max_pincode_len(self.maxpincodelength)
178+
self.pin_code1 = bytes(validpincodestr, 'ascii')
179+
validpincodestr = await self.generate_max_pincode_len(self.maxpincodelength)
180+
self.pin_code2 = bytes(validpincodestr, 'ascii')
181+
inavlidpincodestr = await self.generate_max_pincode_len(self.maxpincodelength+1)
182+
self.inavlid_pincode = bytes(inavlidpincodestr, 'ascii')
183+
if (self.maxrfidcodelength != None):
184+
validpincodestr = await self.generate_max_pincode_len(self.maxrfidcodelength)
185+
self.rfid_tag = bytes(validpincodestr, 'ascii')
185186

186187
async def send_clear_user_cmd(self, user_index, expected_status: Status = Status.Success):
187188
try:
@@ -259,8 +260,7 @@ async def set_credential_cmd(self, credential_enum: drlkcluster.Enums.Credential
259260
credentialType=credential_enum,
260261
credentialIndex=credentialIndex)
261262
try:
262-
logging.info("maxpincodelength value is %s" % (self.maxpincodelength))
263-
logging.info("maxrfidcodelength value is %s" % (self.maxrfidcodelength))
263+
264264
logging.info("Credential Data is %s" % (credentialData))
265265
response = await self.send_single_cmd(cmd=drlkcluster.Commands.SetCredential(
266266
operationType=operationType,
@@ -366,6 +366,11 @@ async def test_TC_DRLK_2_9(self):
366366
self.inavlid_pincode = b""
367367
self.rfid_tag = b""
368368

369+
self.minpincodelength = None
370+
self.maxpincodelength = None
371+
self.maxrfidcodelength = None
372+
self.minrfidcodelength = None
373+
369374
self.endpoint = self.user_params.get("endpoint", 1)
370375
print("endpoint", self.endpoint)
371376

@@ -532,20 +537,21 @@ async def test_TC_DRLK_2_9(self):
532537
cluster=drlkcluster,
533538
attribute=Clusters.DoorLock.Attributes.FeatureMap)
534539
aliro_enabled = feature_map & Clusters.DoorLock.Bitmaps.Feature.kAliroProvisioning
535-
if (aliro_enabled):
536540
credentials = drlkcluster.Structs.CredentialStruct(credentialIndex=credentialIndex_1,
537541
credentialType=drlkcluster.Enums.CredentialTypeEnum.kAliroNonEvictableEndpointKey)
538-
await self.clear_credentials_cmd(credential=credentials)
539-
else:
540-
try:
541-
await self.send_single_cmd(cmd=Clusters.DoorLock.Commands.ClearCredential(credential=credentials),
542-
endpoint=self.app_cluster_endpoint,
543-
timedRequestTimeoutMs=1000)
544-
asserts.fail("Unexpected success in sending ClearCredential Command with invalid CredentialTpe")
542+
if (aliro_enabled):
545543

546-
except InteractionModelError as e:
547-
asserts.assert_equal(e.status, Status.InvalidCommand,
548-
"Unexpected error sending ClearCredential Command with invalid CredentialTpe")
544+
await self.clear_credentials_cmd(credential=credentials)
545+
else:
546+
try:
547+
await self.send_single_cmd(cmd=Clusters.DoorLock.Commands.ClearCredential(credential=credentials),
548+
endpoint=self.app_cluster_endpoint,
549+
timedRequestTimeoutMs=1000)
550+
asserts.fail("Unexpected success in sending ClearCredential Command with invalid CredentialTpe")
551+
552+
except InteractionModelError as e:
553+
asserts.assert_equal(e.status, Status.InvalidCommand,
554+
"Unexpected error sending ClearCredential Command with invalid CredentialTpe")
549555

550556
self.step("14b")
551557
if self.pics_guard(self.check_pics("DRLK.S.F08") and self.check_pics("DRLK.S.C26.Rsp")):

0 commit comments

Comments
 (0)