blob: f008594d01bcd50a3ce729b9607eb04c089ae7be [file] [log] [blame]
#
# Copyright (c) 2023 Project CHIP Authors
# All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
import glob
import logging
import os
import typing
import xml.etree.ElementTree as ElementTree
from copy import deepcopy
from dataclasses import dataclass
from enum import Enum, auto
from typing import Callable, Optional
import chip.clusters as Clusters
from chip.tlv import uint
from conformance_support import (OPTIONAL_CONFORM, TOP_LEVEL_CONFORMANCE_TAGS, ConformanceDecision, ConformanceException,
ConformanceParseParameters, feature, is_disallowed, mandatory, optional, or_operation,
parse_callable_from_xml)
from global_attribute_ids import GlobalAttributeIds
from matter_testing_support import (AttributePathLocation, ClusterPathLocation, CommandPathLocation, EventPathLocation,
FeaturePathLocation, ProblemNotice, ProblemSeverity)
_PRIVILEGE_STR = {
None: "N/A",
Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView: "V",
Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kOperate: "O",
Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kManage: "M",
Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kAdminister: "A",
}
def to_access_code(privilege: Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum) -> str:
return _PRIVILEGE_STR.get(privilege, "")
@dataclass
class XmlFeature:
code: str
name: str
conformance: Callable[[uint], ConformanceDecision]
@dataclass
class XmlAttribute:
name: str
datatype: str
conformance: Callable[[uint], ConformanceDecision]
read_access: Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum
write_access: Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum
write_optional: bool
def access_string(self):
read_marker = "R" if self.read_access is not Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue else ""
write_marker = "W" if self.write_access is not Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue else ""
read_access_marker = f'{to_access_code(self.read_access)}'
write_access_marker = f'{to_access_code(self.write_access)}'
return f'{read_marker}{write_marker} {read_access_marker}{write_access_marker}'
def __str__(self):
return f'{self.name}: datatype: {self.datatype} conformance: {str(self.conformance)}, access = {self.access_string()}'
@dataclass
class XmlCommand:
id: int
name: str
conformance: Callable[[uint], ConformanceDecision]
@dataclass
class XmlEvent:
name: str
conformance: Callable[[uint], ConformanceDecision]
@dataclass
class XmlCluster:
name: str
revision: int
derived: str
feature_map: dict[str, uint]
attribute_map: dict[str, uint]
command_map: dict[str, uint]
# mask to XmlFeature
features: dict[uint, XmlFeature]
# IDs to class
attributes: dict[uint, XmlAttribute]
accepted_commands: dict[uint, XmlCommand]
generated_commands: dict[uint, XmlCommand]
unknown_commands: list[XmlCommand]
events: dict[uint, XmlEvent]
pics: str
class CommandType(Enum):
ACCEPTED = auto()
GENERATED = auto()
# This will happen for derived clusters, where the direction isn't noted. On normal clusters, this is a problem.
UNKNOWN = auto()
# workaround for aliased clusters PICS not appearing in the xml. Remove this once https://github.com/csa-data-model/projects/issues/461 is addressed
ALIAS_PICS = {0x040C: 'CMOCONC',
0x040D: 'CDOCONC',
0x0413: 'NDOCONC',
0x0415: 'OZCONC',
0x042A: 'PMICONC',
0x042B: 'FLDCONC',
0x042C: 'PMHCONC',
0x042D: 'PMKCONC',
0x042E: 'TVOCCONC',
0x042F: 'RNCONC',
0x0071: 'HEPAFREMON',
0x0072: 'ACFREMON',
0x0405: 'RH'}
class ClusterParser:
def __init__(self, cluster, cluster_id, name):
self._problems: list[ProblemNotice] = []
self._cluster = cluster
self._cluster_id = cluster_id
self._name = name
self._derived = None
try:
classification = next(cluster.iter('classification'))
hierarchy = classification.attrib['hierarchy']
if hierarchy.lower() == 'derived':
self._derived = classification.attrib['baseCluster']
except (KeyError, StopIteration):
self._derived = None
try:
classification = next(cluster.iter('classification'))
self._pics = classification.attrib['picsCode']
except (KeyError, StopIteration):
self._pics = None
if self._cluster_id in ALIAS_PICS.keys():
self._pics = ALIAS_PICS[cluster_id]
self.feature_elements = self.get_all_feature_elements()
self.attribute_elements = self.get_all_attribute_elements()
self.command_elements = self.get_all_command_elements()
self.event_elements = self.get_all_event_elements()
self.params = ConformanceParseParameters(feature_map=self.create_feature_map(), attribute_map=self.create_attribute_map(),
command_map=self.create_command_map())
def get_location_from_element(self, element: ElementTree.Element):
# Conformance is missing, so let's record the problem and treat it as optional for lack of a better choice
if element.tag == 'feature':
location = FeaturePathLocation(endpoint_id=0, cluster_id=self._cluster_id, feature_code=element.attrib['code'])
elif element.tag == 'command':
location = CommandPathLocation(endpoint_id=0, cluster_id=self._cluster_id, command_id=int(element.attrib['id'], 0))
elif element.tag == 'attribute':
location = AttributePathLocation(endpoint_id=0, cluster_id=self._cluster_id, attribute_id=int(element.attrib['id'], 0))
elif element.tag == 'event':
location = EventPathLocation(endpoint_id=0, cluster_id=self._cluster_id, event_id=int(element.attrib['id'], 0))
else:
location = ClusterPathLocation(endpoint_id=0, cluster_id=self._cluster_id)
return location
def get_conformance(self, element: ElementTree.Element) -> ElementTree.Element:
for sub in element:
if sub.tag in TOP_LEVEL_CONFORMANCE_TAGS:
return sub
location = self.get_location_from_element(element)
self._problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem='Unable to find conformance element'))
return ElementTree.Element(OPTIONAL_CONFORM)
def get_access(self, element: ElementTree.Element) -> Optional[ElementTree.Element]:
for sub in element:
if sub.tag == 'access':
return sub
return None
def get_all_type(self, type_container: str, type_name: str, key_name: str) -> list[tuple[ElementTree.Element, ElementTree.Element, ElementTree.Element]]:
ret = []
container_tags = self._cluster.iter(type_container)
for container in container_tags:
elements = container.iter(type_name)
for element in elements:
try:
element.attrib[key_name]
except KeyError:
# This is a conformance tag, which uses the same name
continue
conformance = self.get_conformance(element)
access = self.get_access(element)
ret.append((element, conformance, access))
return ret
def get_all_feature_elements(self) -> list[tuple[ElementTree.Element, ElementTree.Element]]:
''' Returns a list of features and their conformances'''
return self.get_all_type('features', 'feature', 'code')
def get_all_attribute_elements(self) -> list[tuple[ElementTree.Element, ElementTree.Element]]:
''' Returns a list of attributes and their conformances'''
return self.get_all_type('attributes', 'attribute', 'id')
def get_all_command_elements(self) -> list[tuple[ElementTree.Element, ElementTree.Element]]:
''' Returns a list of commands and their conformances '''
return self.get_all_type('commands', 'command', 'id')
def get_all_event_elements(self) -> list[tuple[ElementTree.Element, ElementTree.Element]]:
''' Returns a list of events and their conformances'''
return self.get_all_type('events', 'event', 'id')
def create_feature_map(self) -> dict[str, uint]:
features = {}
for element, _, _ in self.feature_elements:
features[element.attrib['code']] = 1 << int(element.attrib['bit'], 0)
return features
def create_attribute_map(self) -> dict[str, uint]:
attributes = {}
for element, conformance, _ in self.attribute_elements:
attributes[element.attrib['name']] = int(element.attrib['id'], 0)
return attributes
def create_command_map(self) -> dict[str, uint]:
commands = {}
for element, _, _ in self.command_elements:
commands[element.attrib['name']] = int(element.attrib['id'], 0)
return commands
def parse_conformance(self, conformance_xml: ElementTree.Element) -> Callable:
try:
return parse_callable_from_xml(conformance_xml, self.params)
except ConformanceException as ex:
# Just point to the general cluster, because something is mismatched, but it's not clear what
location = ClusterPathLocation(endpoint_id=0, cluster_id=self._cluster_id)
self._problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem=str(ex)))
return None
def parse_write_optional(self, element_xml: ElementTree.Element, access_xml: ElementTree.Element) -> bool:
return access_xml.attrib['write'] == 'optional'
def parse_access(self, element_xml: ElementTree.Element, access_xml: ElementTree.Element, conformance: Callable) -> tuple[Optional[Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum], Optional[Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum], Optional[Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum]]:
''' Returns a tuple of access types for read / write / invoke'''
def str_to_access_type(privilege_str: str) -> Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum:
if privilege_str == 'view':
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView
if privilege_str == 'operate':
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kOperate
if privilege_str == 'manage':
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kManage
if privilege_str == 'admin':
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kAdminister
# We don't know what this means, for now, assume no access and mark a warning
location = self.get_location_from_element(element_xml)
self._problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem=f'Unknown access type {privilege_str}'))
return Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
if access_xml is None:
# Derived clusters can inherit their access from the base and that's fine, so don't add an error
# Similarly, pure base clusters can have the access defined in the derived clusters. If neither has it defined,
# we will determine this at the end when we put these together.
# Things with deprecated conformance don't get an access element, and that is also fine.
# If a device properly passes the conformance test, such elements are guaranteed not to appear on the device.
if self._derived is not None or is_disallowed(conformance):
return (None, None, None)
location = self.get_location_from_element(element_xml)
self._problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem='Unable to find access element'))
return (None, None, None)
try:
read_access = str_to_access_type(access_xml.attrib['readPrivilege'])
except KeyError:
read_access = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
try:
write_access = str_to_access_type(access_xml.attrib['writePrivilege'])
except KeyError:
write_access = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
try:
invoke_access = str_to_access_type(access_xml.attrib['invokePrivilege'])
except KeyError:
invoke_access = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
return (read_access, write_access, invoke_access)
def parse_features(self) -> dict[uint, XmlFeature]:
features = {}
for element, conformance_xml, _ in self.feature_elements:
mask = 1 << int(element.attrib['bit'], 0)
conformance = self.parse_conformance(conformance_xml)
if conformance is None:
continue
features[mask] = XmlFeature(code=element.attrib['code'], name=element.attrib['name'],
conformance=conformance)
return features
def parse_attributes(self) -> dict[uint, XmlAttribute]:
attributes = {}
for element, conformance_xml, access_xml in self.attribute_elements:
code = int(element.attrib['id'], 0)
# Some deprecated attributes don't have their types included, for now, lets just fallback to UNKNOWN
try:
datatype = element.attrib['type']
except KeyError:
datatype = 'UNKNOWN'
conformance = self.parse_conformance(conformance_xml)
if conformance is None:
continue
if code in attributes:
# This is one of those fun ones where two different rows have the same id and name, but differ in conformance and ranges
# I don't have a good way to relate the ranges to the conformance, but they're both acceptable, so let's just or them.
conformance = or_operation([conformance, attributes[code].conformance])
read_access, write_access, _ = self.parse_access(element, access_xml, conformance)
write_optional = False
if write_access not in [None, Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue]:
write_optional = self.parse_write_optional(element, access_xml)
attributes[code] = XmlAttribute(name=element.attrib['name'], datatype=datatype,
conformance=conformance, read_access=read_access, write_access=write_access, write_optional=write_optional)
# Add in the global attributes for the base class
for id in GlobalAttributeIds:
# TODO: Add data type here. Right now it's unused. We should parse this from the spec.
attributes[id] = XmlAttribute(name=id.to_name(), datatype="", conformance=mandatory(
), read_access=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView, write_access=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue, write_optional=False)
return attributes
def get_command_type(self, element: ElementTree.Element) -> CommandType:
try:
if element.attrib['direction'].lower() == 'responsefromserver':
return CommandType.GENERATED
if element.attrib['direction'].lower() == 'commandtoclient':
return CommandType.UNKNOWN
if element.attrib['direction'].lower() == 'commandtoserver':
return CommandType.ACCEPTED
raise Exception(f"Unknown direction: {element.attrib['direction']}")
except KeyError:
return CommandType.UNKNOWN
def parse_unknown_commands(self) -> list[XmlCommand]:
commands = []
for element, conformance_xml, access_xml in self.command_elements:
if self.get_command_type(element) != CommandType.UNKNOWN:
continue
code = int(element.attrib['id'], 0)
conformance = self.parse_conformance(conformance_xml)
commands.append(XmlCommand(id=code, name=element.attrib['name'], conformance=conformance))
return commands
def parse_commands(self, command_type: CommandType) -> dict[uint, XmlCommand]:
commands = {}
for element, conformance_xml, access_xml in self.command_elements:
if self.get_command_type(element) != command_type:
continue
code = int(element.attrib['id'], 0)
conformance = self.parse_conformance(conformance_xml)
if conformance is None:
continue
if code in commands:
conformance = or_operation([conformance, commands[code].conformance])
commands[code] = XmlCommand(id=code, name=element.attrib['name'], conformance=conformance)
return commands
def parse_events(self) -> dict[uint, XmlAttribute]:
events = {}
for element, conformance_xml, access_xml in self.event_elements:
code = int(element.attrib['id'], 0)
conformance = self.parse_conformance(conformance_xml)
if conformance is None:
continue
if code in events:
conformance = or_operation([conformance, events[code].conformance])
events[code] = XmlEvent(name=element.attrib['name'], conformance=conformance)
return events
def create_cluster(self) -> XmlCluster:
try:
revision = int(self._cluster.attrib['revision'], 0)
except ValueError:
revision = 0
return XmlCluster(revision=revision, derived=self._derived,
name=self._name, feature_map=self.params.feature_map,
attribute_map=self.params.attribute_map, command_map=self.params.command_map,
features=self.parse_features(),
attributes=self.parse_attributes(),
accepted_commands=self.parse_commands(CommandType.ACCEPTED),
generated_commands=self.parse_commands(CommandType.GENERATED),
unknown_commands=self.parse_unknown_commands(),
events=self.parse_events(), pics=self._pics)
def get_problems(self) -> list[ProblemNotice]:
return self._problems
def add_cluster_data_from_xml(xml: ElementTree.Element, clusters: dict[int, XmlCluster], pure_base_clusters: dict[str, XmlCluster], ids_by_name: dict[str, int], problems: list[ProblemNotice]) -> None:
''' Adds cluster data to the supplied dicts as appropriate
xml: XML element read from from the XML cluster file
clusters: dict of id -> XmlCluster. This function will append new clusters as appropriate to this dict.
pure_base_clusters: dict of base name -> XmlCluster. This data structure is used to hold pure base clusters that don't have
an ID. This function will append new pure base clusters as appropriate to this dict.
ids_by_name: dict of cluster name -> ID. This function will append new IDs as appropriate to this dict.
problems: list of any problems encountered during spec parsing. This function will append problems as appropriate to this list.
'''
cluster = xml.iter('cluster')
for c in cluster:
ids = c.iter('clusterId')
for id in ids:
name = id.get('name')
cluster_id = id.get('id')
if cluster_id:
cluster_id = int(id.get('id'), 0)
ids_by_name[name] = cluster_id
parser = ClusterParser(c, cluster_id, name)
new = parser.create_cluster()
problems = problems + parser.get_problems()
if cluster_id:
clusters[cluster_id] = new
else:
# Fully derived clusters have no id, but also shouldn't appear on a device.
# We do need to keep them, though, because we need to update the derived
# clusters. We keep them in a special dict by name, so they can be thrown
# away later.
pure_base_clusters[name] = new
def check_clusters_for_unknown_commands(clusters: dict[int, XmlCluster], problems: list[ProblemNotice]):
for id, cluster in clusters.items():
for cmd in cluster.unknown_commands:
problems.append(ProblemNotice(test_name="Spec XML parsing", location=CommandPathLocation(
endpoint_id=0, cluster_id=id, command_id=cmd.id), severity=ProblemSeverity.WARNING, problem="Command with unknown direction"))
def build_xml_clusters() -> tuple[list[XmlCluster], list[ProblemNotice]]:
dir = os.path.join(os.path.dirname(os.path.realpath(__file__)), '..', '..', 'data_model', 'clusters')
clusters: dict[int, XmlCluster] = {}
pure_base_clusters: dict[str, XmlCluster] = {}
ids_by_name: dict[str, int] = {}
problems: list[ProblemNotice] = []
for xml in glob.glob(f"{dir}/*.xml"):
logging.info(f'Parsing file {xml}')
tree = ElementTree.parse(f'{xml}')
root = tree.getroot()
add_cluster_data_from_xml(root, clusters, pure_base_clusters, ids_by_name, problems)
# There are a few clusters where the conformance columns are listed as desc. These clusters need specific, targeted tests
# to properly assess conformance. Here, we list them as Optional to allow these for the general test. Targeted tests are described below.
# Descriptor - TagList feature - this feature is mandated when the duplicate condition holds for the endpoint. It is tested in DESC-2.2
# Actions cluster - all commands - these need to be listed in the ActionsList attribute to be supported.
# We do not currently have a test for this. Please see https://github.com/CHIP-Specifications/chip-test-plans/issues/3646.
def remove_problem(location: typing.Union[CommandPathLocation, FeaturePathLocation]):
nonlocal problems
problems = [p for p in problems if p.location != location]
descriptor_id = Clusters.Descriptor.id
code = 'TAGLIST'
mask = clusters[descriptor_id].feature_map[code]
clusters[descriptor_id].features[mask].conformance = optional()
remove_problem(FeaturePathLocation(endpoint_id=0, cluster_id=descriptor_id, feature_code=code))
action_id = Clusters.Actions.id
for c in Clusters.ClusterObjects.ALL_ACCEPTED_COMMANDS[action_id]:
clusters[action_id].accepted_commands[c].conformance = optional()
remove_problem(CommandPathLocation(endpoint_id=0, cluster_id=action_id, command_id=c))
combine_derived_clusters_with_base(clusters, pure_base_clusters, ids_by_name, problems)
# TODO: All these fixups should be removed BEFORE SVE if at all possible
# Workaround for Color Control cluster - the spec uses a non-standard conformance. Set all to optional now, will need
# to implement either arithmetic conformance handling (once spec changes land here) or specific test
# https://github.com/CHIP-Specifications/connectedhomeip-spec/pull/7808 for spec changes.
# see 3.2.8. Defined Primaries Information Attribute Set, affects Primary<#>X/Y/Intensity attributes.
cc_id = Clusters.ColorControl.id
cc_attr = Clusters.ColorControl.Attributes
affected_attributes = [cc_attr.Primary1X,
cc_attr.Primary1Y,
cc_attr.Primary1Intensity,
cc_attr.Primary2X,
cc_attr.Primary2Y,
cc_attr.Primary2Intensity,
cc_attr.Primary3X,
cc_attr.Primary3Y,
cc_attr.Primary3Intensity,
cc_attr.Primary4X,
cc_attr.Primary4Y,
cc_attr.Primary4Intensity,
cc_attr.Primary5X,
cc_attr.Primary5Y,
cc_attr.Primary5Intensity,
cc_attr.Primary6X,
cc_attr.Primary6Y,
cc_attr.Primary6Intensity,
]
for a in affected_attributes:
clusters[cc_id].attributes[a.attribute_id].conformance = optional()
# Workaround for temp control cluster - this is parsed incorrectly in the DM XML and is missing all its attributes
# Remove this workaround when https://github.com/csa-data-model/projects/issues/330 is fixed
temp_control_id = Clusters.TemperatureControl.id
if temp_control_id in clusters and not clusters[temp_control_id].attributes:
view = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView
none = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
clusters[temp_control_id].attributes = {
0x00: XmlAttribute(name='TemperatureSetpoint', datatype='temperature', conformance=feature(0x01, 'TN'), read_access=view, write_access=none, write_optional=False),
0x01: XmlAttribute(name='MinTemperature', datatype='temperature', conformance=feature(0x01, 'TN'), read_access=view, write_access=none, write_optional=False),
0x02: XmlAttribute(name='MaxTemperature', datatype='temperature', conformance=feature(0x01, 'TN'), read_access=view, write_access=none, write_optional=False),
0x03: XmlAttribute(name='Step', datatype='temperature', conformance=feature(0x04, 'STEP'), read_access=view, write_access=none, write_optional=False),
0x04: XmlAttribute(name='SelectedTemperatureLevel', datatype='uint8', conformance=feature(0x02, 'TL'), read_access=view, write_access=none, write_optional=False),
0x05: XmlAttribute(name='SupportedTemperatureLevels', datatype='list', conformance=feature(0x02, 'TL'), read_access=view, write_access=none, write_optional=False),
}
check_clusters_for_unknown_commands(clusters, problems)
return clusters, problems
def combine_derived_clusters_with_base(xml_clusters: dict[int, XmlCluster], pure_base_clusters: dict[str, XmlCluster], ids_by_name: dict[str, int], problems: list[ProblemNotice]) -> None:
''' Overrides base elements with the derived cluster values for derived clusters. '''
def combine_attributes(base: dict[uint, XmlAttribute], derived: dict[uint, XmlAttribute], cluster_id: uint, problems: list[ProblemNotice]) -> dict[uint, XmlAttribute]:
ret = deepcopy(base)
extras = {k: v for k, v in derived.items() if k not in base.keys()}
overrides = {k: v for k, v in derived.items() if k in base.keys()}
ret.update(extras)
for id, override in overrides.items():
if override.conformance:
ret[id].conformance = override.conformance
if override.read_access:
ret[id].read_access = override.read_access
if override.write_access:
ret[id].write_access = override.write_access
if ret[id].read_access is None and ret[id].write_access is None:
location = AttributePathLocation(endpoint_id=0, cluster_id=cluster_id, attribute_id=id)
problems.append(ProblemNotice(test_name='Spec XML parsing', location=location,
severity=ProblemSeverity.WARNING, problem='Unable to find access element'))
if ret[id].read_access is None:
ret[id].read_access == Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
if ret[id].write_access is None:
ret[id].write_access = Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kUnknownEnumValue
return ret
# We have the information now about which clusters are derived, so we need to fix them up. Apply first the base cluster,
# then add the specific cluster overtop
for id, c in xml_clusters.items():
if c.derived:
base_name = c.derived
if base_name in ids_by_name:
base = xml_clusters[ids_by_name[c.derived]]
else:
base = pure_base_clusters[base_name]
feature_map = deepcopy(base.feature_map)
feature_map.update(c.feature_map)
attribute_map = deepcopy(base.attribute_map)
attribute_map.update(c.attribute_map)
command_map = deepcopy(base.command_map)
command_map.update(c.command_map)
features = deepcopy(base.features)
features.update(c.features)
attributes = combine_attributes(base.attributes, c.attributes, id, problems)
accepted_commands = deepcopy(base.accepted_commands)
accepted_commands.update(c.accepted_commands)
generated_commands = deepcopy(base.generated_commands)
generated_commands.update(c.generated_commands)
events = deepcopy(base.events)
events.update(c.events)
unknown_commands = deepcopy(base.unknown_commands)
for cmd in c.unknown_commands:
if cmd.id in accepted_commands.keys() and cmd.name == accepted_commands[cmd.id].name:
accepted_commands[cmd.id].conformance = cmd.conformance
elif cmd.id in generated_commands.keys() and cmd.name == generated_commands[cmd.id].name:
generated_commands[cmd.id].conformance = cmd.conformance
else:
unknown_commands.append(cmd)
new = XmlCluster(revision=c.revision, derived=c.derived, name=c.name,
feature_map=feature_map, attribute_map=attribute_map, command_map=command_map,
features=features, attributes=attributes, accepted_commands=accepted_commands,
generated_commands=generated_commands, unknown_commands=unknown_commands, events=events, pics=c.pics)
xml_clusters[id] = new