Skip to content

Commit

Permalink
Base code name changes
Browse files Browse the repository at this point in the history
Why use less words when more do?
  • Loading branch information
cecille committed Jan 13, 2023
1 parent 487fd89 commit f04b276
Showing 1 changed file with 30 additions and 30 deletions.
60 changes: 30 additions & 30 deletions src/python_testing/TC_ACE_1_3.py
Original file line number Diff line number Diff line change
Expand Up @@ -77,12 +77,12 @@ async def test_TC_ACE_1_3(self):
catTags=[cat1v1, cat2v2])

self.print_step(2, "TH0 writes ACL all view on PIXIT.ACE.TESTENDPOINT")
TH0_admin_acl = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kAdminister,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
TH0_admin_acl = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kAdminister,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[TH0_nodeid],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0, cluster=0x001f)])
all_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
all_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])
acl = [TH0_admin_acl, all_view]
Expand All @@ -98,8 +98,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_success(TH3)

self.print_step(6, "TH0 writes ACL TH1 view on EP0")
th1_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
th1_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[TH1_nodeid],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])
acl = [TH0_admin_acl, th1_view]
Expand All @@ -114,8 +114,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_unsupported_access(TH3)

self.print_step(10, "TH0 writes ACL TH2 view on EP0")
th2_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
th2_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[TH2_nodeid],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -131,8 +131,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_unsupported_access(TH3)

self.print_step(14, "TH0 writes ACL TH3 view on EP0")
th3_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
th3_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[TH3_nodeid],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -148,8 +148,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_success(TH3)

self.print_step(18, "TH0 writes ACL TH1 TH2 view on EP0")
th12_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
th12_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[TH1_nodeid, TH2_nodeid],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -165,8 +165,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_unsupported_access(TH3)

self.print_step(22, "TH0 writes ACL TH1 TH3 view on EP0")
th13_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
th13_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[TH1_nodeid, TH3_nodeid],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -182,8 +182,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_success(TH3)

self.print_step(26, "TH0 writes ACL TH2 TH3 view on EP0")
th23_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
th23_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[TH2_nodeid, TH3_nodeid],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -199,8 +199,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_success(TH3)

self.print_step(30, "TH0 writes ACL TH1 TH2 TH3 view on EP0")
th123_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
th123_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[TH1_nodeid, TH2_nodeid, TH3_nodeid],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -216,8 +216,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_success(TH3)

self.print_step(34, "TH0 writes ACL cat1v1 view on EP0")
cat1v1_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
cat1v1_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[acl_subject(cat1v1)],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])
acl = [TH0_admin_acl, cat1v1_view]
Expand All @@ -233,8 +233,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_success(TH3)

self.print_step(38, "TH0 writes ACL cat1v2 view on EP0")
cat1v2_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
cat1v2_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[acl_subject(cat1v2)],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -251,8 +251,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_unsupported_access(TH3)

self.print_step(42, "TH0 writes ACL cat1v3 view on EP0")
cat1v3_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
cat1v3_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[acl_subject(cat1v3)],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -269,8 +269,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_unsupported_access(TH3)

self.print_step(46, "TH0 writes ACL cat2v1 view on EP0")
cat2v1_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
cat2v1_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[acl_subject(cat2v1)],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -287,8 +287,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_success(TH3)

self.print_step(50, "TH0 writes ACL cat2v2 view on EP0")
cat2v2_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
cat2v2_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[acl_subject(cat2v2)],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand All @@ -305,8 +305,8 @@ async def test_TC_ACE_1_3(self):
await self.read_descriptor_expect_success(TH3)

self.print_step(54, "TH0 writes ACL cat2v3 view on EP0")
cat2v3_view = Clusters.AccessControl.Structs.AccessControlEntry(privilege=Clusters.AccessControl.Enums.Privilege.kView,
authMode=Clusters.AccessControl.Enums.AuthMode.kCase,
cat2v3_view = Clusters.AccessControl.Structs.AccessControlEntryStruct(privilege=Clusters.AccessControl.Enums.AccessControlEntryPrivilegeEnum.kView,
authMode=Clusters.AccessControl.Enums.AccessControlEntryAuthModeEnum.kCase,
subjects=[acl_subject(cat2v3)],
targets=[Clusters.AccessControl.Structs.Target(endpoint=0)])

Expand Down

0 comments on commit f04b276

Please sign in to comment.