2022-11-04 22:51:07 +00:00
|
|
|
# State machine for the charger
|
|
|
|
#
|
|
|
|
#
|
|
|
|
|
|
|
|
#------------------------------------------------------------
|
|
|
|
|
|
|
|
import pyPlcTcpSocket
|
|
|
|
import time # for time.sleep()
|
2023-04-19 07:05:21 +00:00
|
|
|
from helpers import prettyHexMessage, combineValueAndMultiplier
|
2023-05-25 21:08:52 +00:00
|
|
|
from mytestsuite import *
|
2023-04-19 07:05:21 +00:00
|
|
|
from random import random
|
2022-11-07 12:38:06 +00:00
|
|
|
from exiConnector import * # for EXI data handling/converting
|
2023-05-25 21:08:52 +00:00
|
|
|
import requests
|
2022-11-04 22:51:07 +00:00
|
|
|
|
|
|
|
stateWaitForSupportedApplicationProtocolRequest = 0
|
|
|
|
stateWaitForSessionSetupRequest = 1
|
|
|
|
stateWaitForServiceDiscoveryRequest = 2
|
2022-11-08 21:53:18 +00:00
|
|
|
stateWaitForServicePaymentSelectionRequest = 3
|
2022-11-09 18:11:18 +00:00
|
|
|
stateWaitForFlexibleRequest = 4
|
2022-11-08 21:53:18 +00:00
|
|
|
stateWaitForChargeParameterDiscoveryRequest = 5
|
2022-11-04 22:51:07 +00:00
|
|
|
stateWaitForCableCheckRequest = 6
|
|
|
|
stateWaitForPreChargeRequest = 7
|
|
|
|
stateWaitForPowerDeliveryRequest = 8
|
|
|
|
|
|
|
|
class fsmEvse():
|
2022-11-22 20:34:27 +00:00
|
|
|
def addToTrace(self, s):
|
2022-11-22 20:48:05 +00:00
|
|
|
self.callbackAddToTrace("[EVSE] " + s)
|
2022-12-19 17:09:39 +00:00
|
|
|
|
|
|
|
def publishStatus(self, s):
|
|
|
|
self.callbackShowStatus(s, "evseState")
|
2023-05-25 21:08:52 +00:00
|
|
|
|
|
|
|
def publishSoCs(self, remaining_soc: int, full_soc: int = -1, bulk_soc: int = -1, origin: str = ""):
|
|
|
|
if self.callbackSoCStatus is not None:
|
|
|
|
self.callbackSoCStatus(remaining_soc, full_soc, bulk_soc, origin)
|
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
def enterState(self, n):
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("from " + str(self.state) + " entering " + str(n))
|
2023-03-18 18:14:23 +00:00
|
|
|
if (self.state!=0) and (n==0):
|
|
|
|
self.publishStatus("Waiting f AppHandShake")
|
2022-11-04 22:51:07 +00:00
|
|
|
self.state = n
|
|
|
|
self.cyclesInState = 0
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
def isTooLong(self):
|
|
|
|
# The timeout handling function.
|
2023-05-03 19:26:49 +00:00
|
|
|
return (self.cyclesInState > 100) # 100*33ms=3.3s
|
2023-05-25 21:08:52 +00:00
|
|
|
|
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
def stateFunctionWaitForSupportedApplicationProtocolRequest(self):
|
|
|
|
if (len(self.rxData)>0):
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("In state WaitForSupportedApplicationProtocolRequest, received " + prettyHexMessage(self.rxData))
|
2022-11-07 12:38:06 +00:00
|
|
|
exidata = removeV2GTPHeader(self.rxData)
|
2022-11-04 22:51:07 +00:00
|
|
|
self.rxData = []
|
2022-11-08 12:15:36 +00:00
|
|
|
strConverterResult = exiDecode(exidata, "DH") # Decode Handshake-request
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace(strConverterResult)
|
2022-11-07 12:38:06 +00:00
|
|
|
if (strConverterResult.find("ProtocolNamespace=urn:din")>0):
|
|
|
|
# todo: of course we should care for schemaID and prio also here
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("Detected DIN")
|
2023-05-13 22:22:26 +00:00
|
|
|
# TESTSUITE: When the EVSE received the Handshake, it selects a new test case.
|
|
|
|
testsuite_choose_testcase()
|
2022-11-08 11:01:54 +00:00
|
|
|
# Eh for encode handshake, SupportedApplicationProtocolResponse
|
|
|
|
msg = addV2GTPHeader(exiEncode("Eh"))
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-11-07 12:38:06 +00:00
|
|
|
self.Tcp.transmit(msg)
|
2022-12-19 17:09:39 +00:00
|
|
|
self.publishStatus("Schema negotiated")
|
2022-11-08 21:53:18 +00:00
|
|
|
self.enterState(stateWaitForSessionSetupRequest)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
def stateFunctionWaitForSessionSetupRequest(self):
|
|
|
|
if (len(self.rxData)>0):
|
2023-03-29 06:44:09 +00:00
|
|
|
self.simulatedPresentVoltage = 0
|
2023-03-18 18:14:23 +00:00
|
|
|
self.addToTrace("In state WaitForSessionSetupRequest, received " + prettyHexMessage(self.rxData))
|
2022-11-08 11:01:54 +00:00
|
|
|
exidata = removeV2GTPHeader(self.rxData)
|
2022-11-04 22:51:07 +00:00
|
|
|
self.rxData = []
|
2022-11-08 21:53:18 +00:00
|
|
|
strConverterResult = exiDecode(exidata, "DD")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace(strConverterResult)
|
2022-11-08 21:53:18 +00:00
|
|
|
if (strConverterResult.find("SessionSetupReq")>0):
|
2022-11-08 11:01:54 +00:00
|
|
|
# todo: check the request content, and fill response parameters
|
|
|
|
msg = addV2GTPHeader(exiEncode("EDa")) # EDa for Encode, Din, SessionSetupResponse
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2023-05-15 20:34:49 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_SequenceError_for_SessionSetup)):
|
|
|
|
# send a SessionSetupResponse with Responsecode SequenceError
|
|
|
|
msg = addV2GTPHeader("809a0232417b661514a4cb91e0A02d0691559529548c0841e0fc1af4507460c0")
|
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.publishStatus("Session established")
|
2022-11-08 21:53:18 +00:00
|
|
|
self.enterState(stateWaitForServiceDiscoveryRequest)
|
2022-11-04 22:51:07 +00:00
|
|
|
if (self.isTooLong()):
|
|
|
|
self.enterState(0)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
def stateFunctionWaitForServiceDiscoveryRequest(self):
|
|
|
|
if (len(self.rxData)>0):
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("In state WaitForServiceDiscoveryRequest, received " + prettyHexMessage(self.rxData))
|
2022-11-08 21:53:18 +00:00
|
|
|
exidata = removeV2GTPHeader(self.rxData)
|
2022-11-04 22:51:07 +00:00
|
|
|
self.rxData = []
|
2022-11-08 21:53:18 +00:00
|
|
|
strConverterResult = exiDecode(exidata, "DD")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace(strConverterResult)
|
2022-11-08 21:53:18 +00:00
|
|
|
if (strConverterResult.find("ServiceDiscoveryReq")>0):
|
|
|
|
# todo: check the request content, and fill response parameters
|
|
|
|
msg = addV2GTPHeader(exiEncode("EDb")) # EDb for Encode, Din, ServiceDiscoveryResponse
|
2023-05-15 20:34:49 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_SequenceError_for_ServiceDiscoveryRes)):
|
|
|
|
# send a ServiceDiscoveryRes with Responsecode SequenceError
|
|
|
|
msg = addV2GTPHeader("809a021a3b7c417774813311a0A120024100c4")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.publishStatus("Services discovered")
|
2022-11-08 21:53:18 +00:00
|
|
|
self.enterState(stateWaitForServicePaymentSelectionRequest)
|
2022-11-04 22:51:07 +00:00
|
|
|
if (self.isTooLong()):
|
|
|
|
self.enterState(0)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-08 21:53:18 +00:00
|
|
|
def stateFunctionWaitForServicePaymentSelectionRequest(self):
|
2022-11-04 22:51:07 +00:00
|
|
|
if (len(self.rxData)>0):
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("In state WaitForServicePaymentSelectionRequest, received " + prettyHexMessage(self.rxData))
|
2022-11-08 21:53:18 +00:00
|
|
|
exidata = removeV2GTPHeader(self.rxData)
|
2022-11-04 22:51:07 +00:00
|
|
|
self.rxData = []
|
2022-11-08 21:53:18 +00:00
|
|
|
strConverterResult = exiDecode(exidata, "DD")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace(strConverterResult)
|
2022-11-08 21:53:18 +00:00
|
|
|
if (strConverterResult.find("ServicePaymentSelectionReq")>0):
|
|
|
|
# todo: check the request content, and fill response parameters
|
|
|
|
msg = addV2GTPHeader(exiEncode("EDc")) # EDc for Encode, Din, ServicePaymentSelectionResponse
|
2023-05-15 20:34:49 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_SequenceError_for_ServicePaymentSelectionRes)):
|
|
|
|
# send a ServicePaymentSelectionRes with Responsecode SequenceError
|
|
|
|
msg = addV2GTPHeader("809a021a3b7c417774813311c0A0")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.publishStatus("ServicePayment selected")
|
2022-11-09 18:11:18 +00:00
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified. The Ioniq sends PowerDeliveryReq as next.
|
2022-11-04 22:51:07 +00:00
|
|
|
if (self.isTooLong()):
|
|
|
|
self.enterState(0)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-09 18:11:18 +00:00
|
|
|
def stateFunctionWaitForFlexibleRequest(self):
|
2022-11-04 22:51:07 +00:00
|
|
|
if (len(self.rxData)>0):
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("In state WaitForFlexibleRequest, received " + prettyHexMessage(self.rxData))
|
2022-11-08 21:53:18 +00:00
|
|
|
exidata = removeV2GTPHeader(self.rxData)
|
2022-11-04 22:51:07 +00:00
|
|
|
self.rxData = []
|
2022-11-08 21:53:18 +00:00
|
|
|
strConverterResult = exiDecode(exidata, "DD")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace(strConverterResult)
|
2022-11-09 18:11:18 +00:00
|
|
|
if (strConverterResult.find("PowerDeliveryReq")>0):
|
|
|
|
# todo: check the request content, and fill response parameters
|
2023-05-25 21:08:52 +00:00
|
|
|
self.addToTrace("Received PowerDeliveryReq. Extracting SoC parameters")
|
|
|
|
info = json.loads(strConverterResult)
|
|
|
|
remaining_soc = int(info.get("EVRESSSOC", -1))
|
|
|
|
self.publishSoCs(remaining_soc, origin="PowerDeliveryReq")
|
2022-11-09 18:11:18 +00:00
|
|
|
msg = addV2GTPHeader(exiEncode("EDh")) # EDh for Encode, Din, PowerDeliveryResponse
|
2023-05-20 09:07:02 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_Failed_for_PowerDeliveryRes)):
|
|
|
|
# send a PowerDeliveryResponse with Responsecode Failed
|
|
|
|
msg = addV2GTPHeader("809a0125e6cecc51408420400000")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.publishStatus("PowerDelivery")
|
2023-05-25 21:08:52 +00:00
|
|
|
self.Tcp.transmit(msg)
|
2022-11-09 18:11:18 +00:00
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified in DIN
|
2022-11-08 21:53:18 +00:00
|
|
|
if (strConverterResult.find("ChargeParameterDiscoveryReq")>0):
|
2023-05-25 21:08:52 +00:00
|
|
|
self.addToTrace("Received ChargeParameterDiscoveryReq. Extracting SoC parameters via DC")
|
|
|
|
info = json.loads(strConverterResult)
|
|
|
|
remaining_soc = int(info.get("DC_EVStatus.EVRESSSOC", -1))
|
|
|
|
full_soc = int(info.get("FullSOC", -1))
|
|
|
|
bulk_soc = int(info.get("BulkSOC", -1))
|
|
|
|
self.publishSoCs(remaining_soc, full_soc, bulk_soc, origin="ChargeParameterDiscoveryReq")
|
|
|
|
|
2022-11-08 21:53:18 +00:00
|
|
|
# todo: check the request content, and fill response parameters
|
|
|
|
msg = addV2GTPHeader(exiEncode("EDe")) # EDe for Encode, Din, ChargeParameterDiscoveryResponse
|
2023-05-20 09:07:02 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_ServiceSelectionInvalid_for_ChargeParameterDiscovery)):
|
|
|
|
# send a ChargeParameterDiscoveryResponse with Responsecode ServiceSelectionInvalid
|
|
|
|
msg = addV2GTPHeader("809a0125e6cecd50810001ec00201004051828758405500080000101844138101c2432c04081436c900c0c000041435ecc044606000200")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.publishStatus("ChargeParamDiscovery")
|
2023-05-25 21:08:52 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified in DIN
|
2022-11-08 21:53:18 +00:00
|
|
|
if (strConverterResult.find("CableCheckReq")>0):
|
|
|
|
# todo: check the request content, and fill response parameters
|
2023-05-22 06:20:37 +00:00
|
|
|
# todo: make a real cable check, and while it is ongoing, send "Ongoing".
|
2023-05-25 21:08:52 +00:00
|
|
|
self.addToTrace("Received CableCheckReq. Extracting SoC parameters via DC")
|
|
|
|
info = json.loads(strConverterResult)
|
|
|
|
remaining_soc = int(info.get("DC_EVStatus.EVRESSSOC", -1))
|
|
|
|
self.publishSoCs(remaining_soc, -1, -1, origin="CableCheckReq")
|
|
|
|
|
2022-11-08 21:53:18 +00:00
|
|
|
msg = addV2GTPHeader(exiEncode("EDf")) # EDf for Encode, Din, CableCheckResponse
|
2023-05-22 06:20:37 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_Failed_for_CableCheckRes)):
|
|
|
|
# send a CableCheckResponse with Responsecode Failed
|
|
|
|
msg = addV2GTPHeader("809a0125e6cecc5020804080000400")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.publishStatus("CableCheck")
|
2023-05-13 22:22:26 +00:00
|
|
|
if (not testsuite_faultinjection_is_triggered(TC_EVSE_Timeout_during_CableCheck)):
|
2023-05-25 21:08:52 +00:00
|
|
|
self.Tcp.transmit(msg)
|
2023-03-29 06:44:09 +00:00
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified in DIN
|
2022-11-09 18:11:18 +00:00
|
|
|
if (strConverterResult.find("PreChargeReq")>0):
|
2023-04-19 07:05:21 +00:00
|
|
|
# check the request content, and fill response parameters
|
|
|
|
uTarget = 220 # default in case we cannot decode the requested voltage
|
|
|
|
try:
|
|
|
|
y = json.loads(strConverterResult)
|
|
|
|
strEVTargetVoltageValue = y["EVTargetVoltage.Value"]
|
|
|
|
strEVTargetVoltageMultiplier = y["EVTargetVoltage.Multiplier"]
|
|
|
|
uTarget = combineValueAndMultiplier(strEVTargetVoltageValue, strEVTargetVoltageMultiplier)
|
|
|
|
self.addToTrace("EV wants EVTargetVoltage " + str(uTarget))
|
|
|
|
except:
|
|
|
|
self.addToTrace("ERROR: Could not decode the PreChargeReq")
|
|
|
|
|
2023-03-29 06:44:09 +00:00
|
|
|
# simulating preCharge
|
2023-04-19 07:05:21 +00:00
|
|
|
if (self.simulatedPresentVoltage<uTarget/2):
|
|
|
|
self.simulatedPresentVoltage = uTarget/2
|
|
|
|
if (self.simulatedPresentVoltage<uTarget-30):
|
|
|
|
self.simulatedPresentVoltage += 20
|
|
|
|
if (self.simulatedPresentVoltage<uTarget):
|
2023-04-16 12:09:28 +00:00
|
|
|
self.simulatedPresentVoltage += 5
|
2023-03-29 06:44:09 +00:00
|
|
|
strPresentVoltage = str(self.simulatedPresentVoltage) # "345"
|
2023-04-19 07:05:21 +00:00
|
|
|
self.callbackShowStatus(strPresentVoltage, "EVSEPresentVoltage")
|
2022-11-16 18:33:37 +00:00
|
|
|
msg = addV2GTPHeader(exiEncode("EDg_"+strPresentVoltage)) # EDg for Encode, Din, PreChargeResponse
|
2023-05-04 06:53:01 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_Shutdown_during_PreCharge)):
|
|
|
|
# send a PreChargeResponse with StatusCode EVSE_Shutdown, to simulate a user-triggered session stop
|
|
|
|
msg = addV2GTPHeader("809a02180189551e24fc9e9160004100008182800000")
|
2023-05-22 06:20:37 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_Failed_for_PreChargeRes)):
|
|
|
|
# send a PreChargeResponse with ResponseCode Failed
|
|
|
|
msg = addV2GTPHeader("809a0125e6cecc516080408000008284de880800")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2023-03-29 06:44:09 +00:00
|
|
|
self.publishStatus("PreCharging " + strPresentVoltage)
|
2023-05-13 22:22:26 +00:00
|
|
|
if (not testsuite_faultinjection_is_triggered(TC_EVSE_Timeout_during_PreCharge)):
|
2023-05-25 21:08:52 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified in DIN
|
2022-11-11 11:29:13 +00:00
|
|
|
if (strConverterResult.find("ContractAuthenticationReq")>0):
|
|
|
|
# todo: check the request content, and fill response parameters
|
|
|
|
msg = addV2GTPHeader(exiEncode("EDl")) # EDl for Encode, Din, ContractAuthenticationResponse
|
2023-05-20 09:07:02 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_SequenceError_for_ContractAuthenticationRes)):
|
|
|
|
# send a ContractAuthenticationResponse with Responsecode SequenceError
|
|
|
|
msg = addV2GTPHeader("809a021a3b7c417774813310c0A200")
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.publishStatus("ContractAuthentication")
|
2023-05-25 21:08:52 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified in DIN
|
2022-12-08 23:22:18 +00:00
|
|
|
if (strConverterResult.find("CurrentDemandReq")>0):
|
2023-04-19 07:05:21 +00:00
|
|
|
# check the request content, and fill response parameters
|
|
|
|
uTarget = 220 # default in case we cannot decode the requested voltage
|
|
|
|
try:
|
|
|
|
y = json.loads(strConverterResult)
|
|
|
|
strEVTargetVoltageValue = y["EVTargetVoltage.Value"]
|
|
|
|
strEVTargetVoltageMultiplier = y["EVTargetVoltage.Multiplier"]
|
|
|
|
uTarget = combineValueAndMultiplier(strEVTargetVoltageValue, strEVTargetVoltageMultiplier)
|
|
|
|
self.addToTrace("EV wants EVTargetVoltage " + str(uTarget))
|
2023-05-25 21:08:52 +00:00
|
|
|
|
|
|
|
remaining_soc = int(y.get("DC_EVStatus.EVRESSSOC", -1))
|
|
|
|
full_soc = int(y.get("FullSOC", -1))
|
|
|
|
bulk_soc = int(y.get("BulkSOC", -1))
|
|
|
|
self.publishSoCs(remaining_soc, full_soc, bulk_soc, origin="CurrentDemandReq")
|
|
|
|
|
|
|
|
self.callbackShowStatus(str(remaining_soc), "soc")
|
|
|
|
|
2023-04-19 07:05:21 +00:00
|
|
|
except:
|
|
|
|
self.addToTrace("ERROR: Could not decode the CurrentDemandReq")
|
|
|
|
self.simulatedPresentVoltage = uTarget + 3*random() # The charger provides the voltage which is demanded by the car.
|
2023-03-29 06:44:09 +00:00
|
|
|
strPresentVoltage = str(self.simulatedPresentVoltage)
|
2023-04-19 07:05:21 +00:00
|
|
|
self.callbackShowStatus(strPresentVoltage, "EVSEPresentVoltage")
|
2023-04-26 18:41:45 +00:00
|
|
|
strEVSEPresentCurrent = "1" # Just as a dummy current
|
2023-03-29 06:44:09 +00:00
|
|
|
msg = addV2GTPHeader(exiEncode("EDi_"+strPresentVoltage + "_" + strEVSEPresentCurrent)) # EDi for Encode, Din, CurrentDemandRes
|
2023-05-04 06:53:01 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_Malfunction_during_CurrentDemand)):
|
|
|
|
# send a CurrentDemandResponse with StatusCode EVSE_Malfunction, to simulate e.g. a voltage overshoot
|
|
|
|
msg = addV2GTPHeader("809a02203fa9e71c31bc920100821b430b933b4b7339032b93937b908e08043000081828440201818000040060a11c06030306402038441380")
|
2023-05-13 22:22:26 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_Shutdown_during_CurrentDemand)):
|
|
|
|
# send a CurrentDemandResponse with StatusCode EVSE_Shutdown, to simulate a user stop request
|
|
|
|
msg = addV2GTPHeader("809a0125e15c2cd0e000410000018280001818000000040a1b648030300002038486580800")
|
2023-05-22 06:20:37 +00:00
|
|
|
if (testsuite_faultinjection_is_triggered(TC_EVSE_ResponseCode_Failed_for_CurrentDemandRes)):
|
|
|
|
# send a CurrentDemandResponse with ResponseCode Failed
|
|
|
|
msg = addV2GTPHeader("809a0125e6cecc50e0804080000082867dc8081818000000040a1b64802030882702038486580800")
|
2022-12-08 23:22:18 +00:00
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.publishStatus("CurrentDemand")
|
2023-05-13 22:22:26 +00:00
|
|
|
if (not testsuite_faultinjection_is_triggered(TC_EVSE_Timeout_during_CurrentDemand)):
|
2023-05-25 21:08:52 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified in DIN
|
2022-12-08 23:22:18 +00:00
|
|
|
if (strConverterResult.find("WeldingDetectionReq")>0):
|
|
|
|
# todo: check the request content, and fill response parameters
|
|
|
|
msg = addV2GTPHeader(exiEncode("EDj")) # EDj for Encode, Din, WeldingDetectionRes
|
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.publishStatus("WeldingDetection")
|
2023-05-25 21:08:52 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified in DIN
|
2022-12-08 23:22:18 +00:00
|
|
|
if (strConverterResult.find("SessionStopReq")>0):
|
|
|
|
# todo: check the request content, and fill response parameters
|
|
|
|
msg = addV2GTPHeader(exiEncode("EDk")) # EDk for Encode, Din, SessionStopRes
|
|
|
|
self.addToTrace("responding " + prettyHexMessage(msg))
|
2022-12-19 17:09:39 +00:00
|
|
|
self.publishStatus("SessionStop")
|
2023-05-25 21:08:52 +00:00
|
|
|
self.Tcp.transmit(msg)
|
|
|
|
self.enterState(stateWaitForFlexibleRequest) # todo: not clear, what is specified in DIN
|
|
|
|
|
2022-11-11 11:29:13 +00:00
|
|
|
|
|
|
|
|
2022-11-09 18:11:18 +00:00
|
|
|
if (self.isTooLong()):
|
|
|
|
self.enterState(0)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-09 18:11:18 +00:00
|
|
|
def stateFunctionWaitForChargeParameterDiscoveryRequest(self):
|
|
|
|
if (self.isTooLong()):
|
|
|
|
self.enterState(0)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-09 18:11:18 +00:00
|
|
|
def stateFunctionWaitForCableCheckRequest(self):
|
2022-11-04 22:51:07 +00:00
|
|
|
if (self.isTooLong()):
|
|
|
|
self.enterState(0)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
def stateFunctionWaitForPreChargeRequest(self):
|
|
|
|
if (self.isTooLong()):
|
|
|
|
self.enterState(0)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
def stateFunctionWaitForPowerDeliveryRequest(self):
|
|
|
|
if (len(self.rxData)>0):
|
2022-11-22 20:34:27 +00:00
|
|
|
self.addToTrace("In state WaitForPowerDeliveryRequest, received " + prettyHexMessage(self.rxData))
|
|
|
|
self.addToTrace("Todo: Reaction in state WaitForPowerDeliveryRequest is not implemented yet.")
|
2022-11-04 22:51:07 +00:00
|
|
|
self.rxData = []
|
|
|
|
self.enterState(0)
|
|
|
|
if (self.isTooLong()):
|
|
|
|
self.enterState(0)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
|
|
|
|
|
|
|
stateFunctions = {
|
2022-11-04 22:51:07 +00:00
|
|
|
stateWaitForSupportedApplicationProtocolRequest: stateFunctionWaitForSupportedApplicationProtocolRequest,
|
|
|
|
stateWaitForSessionSetupRequest: stateFunctionWaitForSessionSetupRequest,
|
|
|
|
stateWaitForServiceDiscoveryRequest: stateFunctionWaitForServiceDiscoveryRequest,
|
2022-11-08 21:53:18 +00:00
|
|
|
stateWaitForServicePaymentSelectionRequest: stateFunctionWaitForServicePaymentSelectionRequest,
|
2022-11-09 18:11:18 +00:00
|
|
|
stateWaitForFlexibleRequest: stateFunctionWaitForFlexibleRequest,
|
2022-11-08 21:53:18 +00:00
|
|
|
stateWaitForChargeParameterDiscoveryRequest: stateFunctionWaitForChargeParameterDiscoveryRequest,
|
2022-11-04 22:51:07 +00:00
|
|
|
stateWaitForCableCheckRequest: stateFunctionWaitForCableCheckRequest,
|
|
|
|
stateWaitForPreChargeRequest: stateFunctionWaitForPreChargeRequest,
|
|
|
|
stateWaitForPowerDeliveryRequest: stateFunctionWaitForPowerDeliveryRequest,
|
|
|
|
}
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-07 08:21:25 +00:00
|
|
|
def reInit(self):
|
2023-05-25 21:08:52 +00:00
|
|
|
self.addToTrace("re-initializing fsmEvse")
|
2022-11-07 08:21:25 +00:00
|
|
|
self.state = 0
|
|
|
|
self.cyclesInState = 0
|
|
|
|
self.rxData = []
|
2023-03-29 06:44:09 +00:00
|
|
|
self.simulatedPresentVoltage = 0
|
2023-03-18 18:14:23 +00:00
|
|
|
self.Tcp.resetTheConnection()
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2023-03-18 18:14:23 +00:00
|
|
|
def socketStateNotification(self, notification):
|
|
|
|
if (notification==0):
|
|
|
|
# The TCP informs us, that the connection is broken.
|
|
|
|
# Let's restart the state machine.
|
|
|
|
self.publishStatus("TCP conn broken")
|
|
|
|
self.addToTrace("re-initializing fsmEvse due to broken connection")
|
|
|
|
self.reInit()
|
|
|
|
if (notification==1):
|
|
|
|
# The TCP informs us, that it is listening, means waiting for incoming connection.
|
|
|
|
self.publishStatus("Listening TCP")
|
|
|
|
if (notification==2):
|
|
|
|
# The TCP informs us, that a connection is established.
|
|
|
|
self.publishStatus("TCP connected")
|
2022-11-07 08:21:25 +00:00
|
|
|
|
2023-05-25 21:08:52 +00:00
|
|
|
def __init__(self, addressManager, callbackAddToTrace, hardwareInterface, callbackShowStatus, callbackSoCStatus = None):
|
2022-11-22 20:34:27 +00:00
|
|
|
self.callbackAddToTrace = callbackAddToTrace
|
2022-12-19 17:09:39 +00:00
|
|
|
self.callbackShowStatus = callbackShowStatus
|
2023-05-25 21:08:52 +00:00
|
|
|
self.callbackSoCStatus = callbackSoCStatus
|
2022-12-19 17:09:39 +00:00
|
|
|
#todo self.addressManager = addressManager
|
|
|
|
#todo self.hardwareInterface = hardwareInterface
|
2023-05-25 21:08:52 +00:00
|
|
|
self.addToTrace("initializing fsmEvse")
|
2022-11-29 07:40:34 +00:00
|
|
|
self.faultInjectionDelayUntilSocketOpen_s = 0
|
|
|
|
if (self.faultInjectionDelayUntilSocketOpen_s>0):
|
|
|
|
self.addToTrace("Fault injection: waiting " + str(self.faultInjectionDelayUntilSocketOpen_s) + " s until opening the TCP socket.")
|
|
|
|
time.sleep(self.faultInjectionDelayUntilSocketOpen_s)
|
2023-03-18 18:14:23 +00:00
|
|
|
self.Tcp = pyPlcTcpSocket.pyPlcTcpServerSocket(self.callbackAddToTrace, self.socketStateNotification)
|
2022-11-04 22:51:07 +00:00
|
|
|
self.state = 0
|
|
|
|
self.cyclesInState = 0
|
|
|
|
self.rxData = []
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
def mainfunction(self):
|
|
|
|
self.Tcp.mainfunction() # call the lower-level worker
|
|
|
|
if (self.Tcp.isRxDataAvailable()):
|
|
|
|
self.rxData = self.Tcp.getRxData()
|
2022-11-22 20:34:27 +00:00
|
|
|
#self.addToTrace("received " + str(self.rxData))
|
2022-11-04 22:51:07 +00:00
|
|
|
# run the state machine:
|
|
|
|
self.cyclesInState += 1 # for timeout handling, count how long we are in a state
|
|
|
|
self.stateFunctions[self.state](self)
|
2023-05-25 21:08:52 +00:00
|
|
|
|
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
if __name__ == "__main__":
|
|
|
|
print("Testing the evse state machine")
|
|
|
|
evse = fsmEvse()
|
|
|
|
print("Press Ctrl-Break for aborting")
|
|
|
|
while (True):
|
|
|
|
time.sleep(0.1)
|
|
|
|
evse.mainfunction()
|
2023-05-25 21:08:52 +00:00
|
|
|
|
2022-11-04 22:51:07 +00:00
|
|
|
|