Skip to main content

A library for certifying Wiliot-compliant boards

Project description

wiliot-certificate Version 4.4.0

wiliot-certificate is a Python library that provides tools for testing and certifying boards for compatibility with Wiliot’s ecosystem. This python package includes the following CLI utilities:

  • Gateway Certificate (wlt-cert-gw)
  • Bridge Certificate (wlt-cert-brg)

Version:

wiliot-certificate versions 4.4.0 are compatible with firmware version 4.4.6 (ESP: 4.4.44, BLE: 4.4.93)

Installing wiliot-certificate

Uninstall wiliot-deployment-tools if installed (relevant for old wlt-gw-certificate users):

pip uninstall wiliot-deployment-tools

Install wiliot-certificate:

pip install wiliot-certificate

Using wiliot-certificate

Gateway Certificate

Test Wiliot Gateway capabilities. The Gateway Certificate includes different test that run sequentially to test each capability reported by the Gateway. To run the Gateway Certificate the Gateway needs to use a public MQTT Broker (Eclipse):

Host: mqtt.eclipseprojects.io TLS TCP Port: 8883 TLS Websocket Port: 443 TCP Port: 1883 Websocket Port: 80

More information can be found at https://mqtt.eclipseprojects.io/.

Gateway Certificate Release Notes:

Release:

  • Standalone wiliot-certificate package
  • Python 3.13 support
  • Gateway API version 205 support
  • Registration test added
  • Bridge OTA stage added under actions
  • Aggregation flag supported by StressTest
  • -update flag compatibility fix. Upgrades bootloader if needed
  • -actions flag to select specific actions to test
  • ACL (Access control list) test for gateways reporting API version 205 in the connection test

The following capabilities are not tested in this version

  • Access control list stress stress
  • Validation schema verification
  • Board type registered within the Board Type Management system
  • Bridge OTA progress reporting
Usage: wlt-cert-gw [-h] -owner OWNER -gw GW [-suffix SUFFIX] [-tests {connection,uplink,downlink,stress}]

Gateway Certificate - CLI Tool to test Wiliot GWs

Required arguments:
  -gw GW        Gateway ID

Optional arguments:
  -owner OWNER  Owner ID (Required for non-registration tests)
  -tests        Pick specific tests to run
  -actions      Pick specific actions to test during the ActionsTest
  -update       Update the firmware of the test board
  -pps          Pick specific PPS rate for the stress test
  -agg          Duration uplink stages wait before processing packets
  -suffix       Allow for different suffixes after the Gateway ID in MQTT topics
  -env          Wiliot environment for registration and bridgeOTA tests
  -h, --help    show this help message and exit

Bridge Certificate

Test Wiliot Bridge capabilities. The Bridge Certificate includes different tests that run sequentially to test each capability reported by the bridge.

update Gateway sim version :

  • Update your gateway and bridge using Wiliot's platform. (https://platform.wiliot.com/)
  • Transfer the gateway to dev mode - run the following command: py ut\dev_mode.py --gw [GW] --enable
  • Connect the gateway to your laptop via USB connection:
  • Run the following: wlt-cert-brg --gw SIM --brg --port <COM_PORT>
  • For other options of running, see the 'run example' section.

Bridge Certificate Release Notes:

Release

  • First release of Bridge Certificate – includes validation tests for bridge functionality.
  • Additional details are available in the JSON files.

The following capabilities are not tested in this version

Power management

  • Functionality of energize and transmit in sleep mode Edge management
  • Timing of heartbeat and interface packets Module Energy 2400
  • Functionality of energy pattern, output power and duty cycle Module Energy SUB1G
  • Functionality of energy pattern and duty cycle Module Datapath
  • RSSI edge cases: -127 and 0
  • Functionality of transmission pattern, output power
  • Pacer interval with channel 10 and 500k modulation
  • Pacer interval using GEN3 Pixels
  • Packet filter: the following configuration - DEBUG, TEMP & DEBUG, TEMPS & DEBUG & ADVANCE
  • Rx rate feature with extended advertising
  • Functionality of adaptive pacer algorithm
  • Supported Pixels for extended advertising and GEN3 Calibration
  • Functionality of output power and interval calibration
  • Functionality of calibration transmission patterns for the configuration STANDARD & EU & DISABLE
usage: wlt-cert-brg [-h] [--brg BRG] [--brg_cloud_connectivity BRG_CLOUD_CONNECTIVITY] [--brg1 BRG1] --gw GW [--data {tags,sim}] [--port PORT] [--clean] [--tl TL] [--run RUN]
                              [--drun DRUN] [--exit_on_test_failure] [--exit_on_param_failure] [--analyze_interference]

# Bridge Certificate CLI

options:
  -h, --help            show this help message and exit
  --brg, -b BRG         Bridge id to run on the tests
  --brg_cloud_connectivity, -bcc BRG_CLOUD_CONNECTIVITY
                        Bridge with cloud connectivity id to run on the tests
  --brg1, -b1 BRG1      Second bridge id to run on tests two bridges needed
  --gw, -g GW           GW id to run on the test, SIM prefix is used for Gateway simulation
  --data, -d {tags,sim}
                        Choose if data generated from real tags or by simulation
  --port, -p PORT       Enable UT using UART connection for Gateway Simulation or Data Simulation
  --clean               Clean all logs
  --tl TL               Test list file to use
  --run RUN             String to filter tests to run
  --drun DRUN           String to filter tests not to run
  --exit_on_test_failure
                        Stop running the tests if a test failed
  --exit_on_param_failure
                        Sets exit_on_param_failure mode to true in order to prevent tests from continuing iteration over all possibilities in case of failure
  --analyze_interference, -ai
                        Analyze interference before tests start (relevant only for Gateway Simulator)

run examples:
  Run command example with COM PORT connection:
  wlt-cert-brg --gw SIM --brg <XXXXXXXXXXXX> --port <COM_PORT>
  Run command example with remote GW connection:
  wlt-cert-brg --gw <YYYYYYYYYYYY> --brg <XXXXXXXXXXXX>
  Run command example for running datapath module tests only:
  wlt-cert-brg --gw <YYYYYYYYYYYY> --brg <XXXXXXXXXXXX> --run datapath
  Run command example with sanity test list:
  wlt-cert-brg --gw <YYYYYYYYYYYY> --brg <XXXXXXXXXXXX> --tl certificate_sanity_test_list.txt
  Run command example with COM PORT connection for bridge with cloud connectivity:
  wlt-cert-brg --gw SIM --brg_cloud_connectivity <XXXXXXXXXXXX> --tl certificate_bcc_test_list.txt --port <COM_PORT>
  Run command example with remote GW connection for bridge with cloud connectivity:
  wlt-cert-brg --gw <YYYYYYYYYYYY> --brg_cloud_connectivity <XXXXXXXXXXXX> --tl certificate_bcc_test_list.txt

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wiliot_certificate-4.4.0.tar.gz (58.5 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

wiliot_certificate-4.4.0-py3-none-any.whl (58.6 MB view details)

Uploaded Python 3

File details

Details for the file wiliot_certificate-4.4.0.tar.gz.

File metadata

  • Download URL: wiliot_certificate-4.4.0.tar.gz
  • Upload date:
  • Size: 58.5 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.12

File hashes

Hashes for wiliot_certificate-4.4.0.tar.gz
Algorithm Hash digest
SHA256 fa6289eb26af241bd022a9a7de150a1382d0d1cae5accceb5b4b397a1b5d574c
MD5 298bd323a147658b7fd622baced7c8e8
BLAKE2b-256 bb717a1abb8c58110b04d76864b8f1486d113d3b10594cc65422fc3df0391043

See more details on using hashes here.

File details

Details for the file wiliot_certificate-4.4.0-py3-none-any.whl.

File metadata

File hashes

Hashes for wiliot_certificate-4.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 5f869a8902115b55af62590cb2d7c25a66a3b80b97b90c3279cc4857c7ff888b
MD5 b843137aa13ccb99be86c26e8b1a9e90
BLAKE2b-256 0b964fb19b5265e1e72dc68c9cd4361da23cdb5563487a2727c3b33b6f33aab7

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page