You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Code formating and API documentation update
- Ran npx prettier --write . with latest prettier package in zap project
- Update the API documentation by running npm run apidoc
- Fixing the env.test.js because prettier changed the line numbers of the code
When running ZAP (eg. `npm run zap`), if you see an error about `sqlite3.node` in a pop up window, run:
44
+
39
45
```
40
46
npm rebuild sqlite3
41
47
```
42
48
43
49
### 2. electron-builder:
44
50
45
51
When doing npm install, in post-install, if there is an error on the following command, related to `electron-builder install-app-deps`, `npx electron-rebuild canvas failed` or `node-pre-gyp`, it is because the current `canvas` version is not compatible with Windows, and the installation error will not cause a failure in running ZAP. node-canvas is working on the solution now and the issue will be solved in near future.
@@ -52,20 +59,23 @@ When doing npm install, in post-install, if there is an error on the following c
52
59
### 1. Exceed Timeout
53
60
54
61
If 'npm run test' fails due to `Exceeded timeout of 1500 ms for a test. Use jest.setTimeout(newTimeout) to increase the timeout value, if this is a long-running test.`, set the following environment variables to increase timeouts for all tests.
### 2. Test Suite failed to run (Canvas not found)
60
68
61
69
If 'npm run test' fails due to `Test suite failed to run. Cannot find module '../build/Release/canvas.node'` or `\zap\node_modules\canvas\build\Release\canvas.node is not a valid Win32 application.`, rebuild canvas:
70
+
62
71
```
63
72
npm rebuild canvas --update-binary
64
73
```
65
74
66
75
### 3. get index.html or other server issue
67
76
68
77
If `npm run test` fails due to `get index.html request failed with status code 404` in unit tests or having server connection issues in e2e-ci tests, run:
78
+
69
79
```
70
80
npm run build
71
81
```
@@ -74,4 +84,4 @@ npm run build
74
84
75
85
Check if node version is v18, and try to install it with Chocolatey
76
86
77
-
Also, you can check the faq doc for other known issues: https://github.com/project-chip/zap/blob/master/docs/faq.md
87
+
Also, you can check the faq doc for other known issues: https://github.com/project-chip/zap/blob/master/docs/faq.md
Copy file name to clipboardexpand all lines: docs/access.md
+11-6
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,9 @@ these features to the required and supported access control SDK features. ZAP ge
7
7
8
8
ZAP access control defines three base terms:
9
9
10
-
1.**operation** : it's something that can be done. Example: read, write, invoke.
11
-
2.**role**: it's a privilege of an actor. Such as "View privilege", "Administrative rol", etc.
12
-
3.**modifiers**: special access control conditions, such as _fabric sensitive_ data or _fabric scoped_ data.
10
+
1.**operation** : it's something that can be done. Example: read, write, invoke.
11
+
2.**role**: it's a privilege of an actor. Such as "View privilege", "Administrative rol", etc.
12
+
3.**modifiers**: special access control conditions, such as _fabric sensitive_ data or _fabric scoped_ data.
13
13
14
14
The base terms are defined in the metadata XML under a top tag `<accessControl>`. Example of access control base term definitions:
15
15
@@ -36,12 +36,14 @@ Each individual access condition can be defined with an access triplet in the XM
36
36
Access triplet is a combination of an _operation_, _role_ and _modifier_. They are optional, so you can only have one of these. A missing part of triplet generally means permissivenes, but that's implementation specific for the given SDK. An entity, that defines it's access can have one or more access triplets.
This is a definition of an attribute that has an access triplet, declaring it allows _write_ operation by a _manage_ role, with _fabric-scoped_ modifier applied.
46
48
47
49
## Default permissions
@@ -51,6 +53,7 @@ ZCL entities can define their own individual permissions. However, there is also
51
53
Default permissions are declared via a `<defaultAccess>` tag at the toplevel of the XML.
52
54
53
55
Example:
56
+
54
57
```
55
58
<defaultAccess type="command">
56
59
<access op="invoke"/>
@@ -70,10 +73,12 @@ Example:
70
73
71
74
The basic template helper to use is the `{{#access}} ... {{/access}}` iterator. This iterator iterates over all the given access triplets.
72
75
It supports 2 options:
73
-
*`entity="attribute/command/event"` - if the entity can't be determined from context, this sets the entity type.
74
-
*`includeDefault="true/false"` - determines if default values are included or not.
76
+
77
+
-`entity="attribute/command/event"` - if the entity can't be determined from context, this sets the entity type.
78
+
-`includeDefault="true/false"` - determines if default values are included or not.
0 commit comments