2016-01-09 00:58:44 +00:00
|
|
|
"""Service calling related helpers."""
|
2018-08-16 07:50:11 +00:00
|
|
|
import asyncio
|
2020-01-30 00:27:25 +00:00
|
|
|
from functools import partial, wraps
|
2016-01-09 00:58:44 +00:00
|
|
|
import logging
|
2020-04-19 21:41:52 +00:00
|
|
|
from typing import (
|
|
|
|
TYPE_CHECKING,
|
|
|
|
Any,
|
|
|
|
Callable,
|
|
|
|
Dict,
|
|
|
|
Iterable,
|
|
|
|
List,
|
|
|
|
Optional,
|
|
|
|
Set,
|
|
|
|
Tuple,
|
|
|
|
)
|
2016-08-07 23:26:35 +00:00
|
|
|
|
2016-04-21 19:22:19 +00:00
|
|
|
import voluptuous as vol
|
|
|
|
|
2019-04-13 19:54:29 +00:00
|
|
|
from homeassistant.auth.permissions.const import CAT_ENTITIES, POLICY_CONTROL
|
2020-02-04 22:42:07 +00:00
|
|
|
from homeassistant.const import (
|
|
|
|
ATTR_AREA_ID,
|
|
|
|
ATTR_ENTITY_ID,
|
2020-03-05 19:44:42 +00:00
|
|
|
CONF_SERVICE,
|
|
|
|
CONF_SERVICE_TEMPLATE,
|
2020-02-04 22:42:07 +00:00
|
|
|
ENTITY_MATCH_ALL,
|
|
|
|
ENTITY_MATCH_NONE,
|
|
|
|
)
|
2018-01-07 22:54:16 +00:00
|
|
|
import homeassistant.core as ha
|
2019-04-12 17:09:17 +00:00
|
|
|
from homeassistant.exceptions import (
|
2019-07-31 19:25:30 +00:00
|
|
|
HomeAssistantError,
|
|
|
|
TemplateError,
|
|
|
|
Unauthorized,
|
|
|
|
UnknownUser,
|
|
|
|
)
|
2020-04-17 18:33:58 +00:00
|
|
|
from homeassistant.helpers import template
|
2019-12-09 15:42:10 +00:00
|
|
|
import homeassistant.helpers.config_validation as cv
|
2020-04-17 18:33:58 +00:00
|
|
|
from homeassistant.helpers.typing import ConfigType, HomeAssistantType, TemplateVarsType
|
2019-04-12 17:09:17 +00:00
|
|
|
from homeassistant.loader import async_get_integration, bind_hass
|
2018-01-07 22:54:16 +00:00
|
|
|
from homeassistant.util.yaml import load_yaml
|
2019-08-15 15:53:25 +00:00
|
|
|
from homeassistant.util.yaml.loader import JSON_TYPE
|
2019-07-21 16:59:02 +00:00
|
|
|
|
2020-04-19 21:41:52 +00:00
|
|
|
if TYPE_CHECKING:
|
|
|
|
from homeassistant.helpers.entity import Entity # noqa
|
|
|
|
|
|
|
|
|
2019-08-15 15:53:25 +00:00
|
|
|
# mypy: allow-untyped-defs, no-check-untyped-defs
|
2019-07-21 16:59:02 +00:00
|
|
|
|
2019-07-31 19:25:30 +00:00
|
|
|
CONF_SERVICE_ENTITY_ID = "entity_id"
|
|
|
|
CONF_SERVICE_DATA = "data"
|
|
|
|
CONF_SERVICE_DATA_TEMPLATE = "data_template"
|
2016-01-09 00:58:44 +00:00
|
|
|
|
|
|
|
_LOGGER = logging.getLogger(__name__)
|
|
|
|
|
2019-07-31 19:25:30 +00:00
|
|
|
SERVICE_DESCRIPTION_CACHE = "service_description_cache"
|
2018-01-07 22:54:16 +00:00
|
|
|
|
2016-01-09 00:58:44 +00:00
|
|
|
|
2017-10-08 15:17:54 +00:00
|
|
|
@bind_hass
|
2019-07-31 19:25:30 +00:00
|
|
|
def call_from_config(
|
2020-04-17 18:33:58 +00:00
|
|
|
hass: HomeAssistantType,
|
|
|
|
config: ConfigType,
|
|
|
|
blocking: bool = False,
|
|
|
|
variables: TemplateVarsType = None,
|
|
|
|
validate_config: bool = True,
|
|
|
|
) -> None:
|
2016-01-09 00:58:44 +00:00
|
|
|
"""Call a service based on a config hash."""
|
2019-10-01 14:59:06 +00:00
|
|
|
asyncio.run_coroutine_threadsafe(
|
2019-07-31 19:25:30 +00:00
|
|
|
async_call_from_config(hass, config, blocking, variables, validate_config),
|
|
|
|
hass.loop,
|
|
|
|
).result()
|
2016-10-01 05:34:45 +00:00
|
|
|
|
|
|
|
|
2017-10-08 15:17:54 +00:00
|
|
|
@bind_hass
|
2019-07-31 19:25:30 +00:00
|
|
|
async def async_call_from_config(
|
2020-04-17 18:33:58 +00:00
|
|
|
hass: HomeAssistantType,
|
|
|
|
config: ConfigType,
|
|
|
|
blocking: bool = False,
|
|
|
|
variables: TemplateVarsType = None,
|
|
|
|
validate_config: bool = True,
|
|
|
|
context: Optional[ha.Context] = None,
|
|
|
|
) -> None:
|
2016-10-01 05:34:45 +00:00
|
|
|
"""Call a service based on a config hash."""
|
2020-03-11 23:34:50 +00:00
|
|
|
try:
|
|
|
|
parms = async_prepare_call_from_config(hass, config, variables, validate_config)
|
|
|
|
except HomeAssistantError as ex:
|
|
|
|
if blocking:
|
|
|
|
raise
|
|
|
|
_LOGGER.error(ex)
|
|
|
|
else:
|
|
|
|
await hass.services.async_call(*parms, blocking, context)
|
|
|
|
|
|
|
|
|
|
|
|
@ha.callback
|
|
|
|
@bind_hass
|
2020-04-17 18:33:58 +00:00
|
|
|
def async_prepare_call_from_config(
|
|
|
|
hass: HomeAssistantType,
|
|
|
|
config: ConfigType,
|
|
|
|
variables: TemplateVarsType = None,
|
|
|
|
validate_config: bool = False,
|
|
|
|
) -> Tuple[str, str, Dict[str, Any]]:
|
2020-03-11 23:34:50 +00:00
|
|
|
"""Prepare to call a service based on a config hash."""
|
2016-04-23 05:11:21 +00:00
|
|
|
if validate_config:
|
|
|
|
try:
|
|
|
|
config = cv.SERVICE_SCHEMA(config)
|
|
|
|
except vol.Invalid as ex:
|
2020-03-11 23:34:50 +00:00
|
|
|
raise HomeAssistantError(
|
|
|
|
f"Invalid config for calling service: {ex}"
|
|
|
|
) from ex
|
2016-01-10 00:01:27 +00:00
|
|
|
|
2016-04-21 19:22:19 +00:00
|
|
|
if CONF_SERVICE in config:
|
|
|
|
domain_service = config[CONF_SERVICE]
|
2016-01-09 00:58:44 +00:00
|
|
|
else:
|
2016-04-21 19:22:19 +00:00
|
|
|
try:
|
2016-09-28 04:29:55 +00:00
|
|
|
config[CONF_SERVICE_TEMPLATE].hass = hass
|
2019-07-31 19:25:30 +00:00
|
|
|
domain_service = config[CONF_SERVICE_TEMPLATE].async_render(variables)
|
2016-04-21 19:22:19 +00:00
|
|
|
domain_service = cv.service(domain_service)
|
|
|
|
except TemplateError as ex:
|
2020-03-11 23:34:50 +00:00
|
|
|
raise HomeAssistantError(
|
|
|
|
f"Error rendering service name template: {ex}"
|
|
|
|
) from ex
|
|
|
|
except vol.Invalid as ex:
|
|
|
|
raise HomeAssistantError(
|
|
|
|
f"Template rendered invalid service: {domain_service}"
|
|
|
|
) from ex
|
|
|
|
|
|
|
|
domain, service = domain_service.split(".", 1)
|
2016-04-21 19:22:19 +00:00
|
|
|
service_data = dict(config.get(CONF_SERVICE_DATA, {}))
|
|
|
|
|
|
|
|
if CONF_SERVICE_DATA_TEMPLATE in config:
|
2018-01-19 06:13:14 +00:00
|
|
|
try:
|
|
|
|
template.attach(hass, config[CONF_SERVICE_DATA_TEMPLATE])
|
2019-07-31 19:25:30 +00:00
|
|
|
service_data.update(
|
|
|
|
template.render_complex(config[CONF_SERVICE_DATA_TEMPLATE], variables)
|
|
|
|
)
|
2018-01-19 06:13:14 +00:00
|
|
|
except TemplateError as ex:
|
2020-03-11 23:34:50 +00:00
|
|
|
raise HomeAssistantError(f"Error rendering data template: {ex}") from ex
|
2016-04-21 19:22:19 +00:00
|
|
|
|
|
|
|
if CONF_SERVICE_ENTITY_ID in config:
|
|
|
|
service_data[ATTR_ENTITY_ID] = config[CONF_SERVICE_ENTITY_ID]
|
2016-01-09 00:58:44 +00:00
|
|
|
|
2020-03-11 23:34:50 +00:00
|
|
|
return domain, service, service_data
|
2016-01-24 06:57:14 +00:00
|
|
|
|
|
|
|
|
2017-10-08 15:17:54 +00:00
|
|
|
@bind_hass
|
2020-04-17 18:33:58 +00:00
|
|
|
def extract_entity_ids(
|
|
|
|
hass: HomeAssistantType, service_call: ha.ServiceCall, expand_group: bool = True
|
|
|
|
) -> Set[str]:
|
2017-05-02 16:18:47 +00:00
|
|
|
"""Extract a list of entity ids from a service call.
|
2016-03-07 22:39:52 +00:00
|
|
|
|
2016-01-24 06:57:14 +00:00
|
|
|
Will convert group entity ids to the entity ids it represents.
|
|
|
|
"""
|
2019-10-01 14:59:06 +00:00
|
|
|
return asyncio.run_coroutine_threadsafe(
|
2019-03-04 17:51:12 +00:00
|
|
|
async_extract_entity_ids(hass, service_call, expand_group), hass.loop
|
|
|
|
).result()
|
2016-01-24 06:57:14 +00:00
|
|
|
|
|
|
|
|
2020-01-20 01:55:18 +00:00
|
|
|
@bind_hass
|
2020-04-17 18:33:58 +00:00
|
|
|
async def async_extract_entities(
|
|
|
|
hass: HomeAssistantType,
|
2020-04-19 21:41:52 +00:00
|
|
|
entities: Iterable["Entity"],
|
2020-04-17 18:33:58 +00:00
|
|
|
service_call: ha.ServiceCall,
|
|
|
|
expand_group: bool = True,
|
2020-04-19 21:41:52 +00:00
|
|
|
) -> List["Entity"]:
|
2020-01-20 01:55:18 +00:00
|
|
|
"""Extract a list of entity objects from a service call.
|
|
|
|
|
|
|
|
Will convert group entity ids to the entity ids it represents.
|
|
|
|
"""
|
|
|
|
data_ent_id = service_call.data.get(ATTR_ENTITY_ID)
|
|
|
|
|
|
|
|
if data_ent_id == ENTITY_MATCH_ALL:
|
|
|
|
return [entity for entity in entities if entity.available]
|
|
|
|
|
|
|
|
entity_ids = await async_extract_entity_ids(hass, service_call, expand_group)
|
|
|
|
|
2020-02-04 22:42:07 +00:00
|
|
|
found = []
|
|
|
|
|
|
|
|
for entity in entities:
|
|
|
|
if entity.entity_id not in entity_ids:
|
|
|
|
continue
|
|
|
|
|
|
|
|
entity_ids.remove(entity.entity_id)
|
|
|
|
|
|
|
|
if not entity.available:
|
|
|
|
continue
|
|
|
|
|
|
|
|
found.append(entity)
|
|
|
|
|
|
|
|
if entity_ids:
|
|
|
|
_LOGGER.warning(
|
|
|
|
"Unable to find referenced entities %s", ", ".join(sorted(entity_ids))
|
|
|
|
)
|
|
|
|
|
|
|
|
return found
|
2020-01-20 01:55:18 +00:00
|
|
|
|
|
|
|
|
2019-03-04 17:51:12 +00:00
|
|
|
@bind_hass
|
2020-04-17 18:33:58 +00:00
|
|
|
async def async_extract_entity_ids(
|
|
|
|
hass: HomeAssistantType, service_call: ha.ServiceCall, expand_group: bool = True
|
|
|
|
) -> Set[str]:
|
2019-03-04 17:51:12 +00:00
|
|
|
"""Extract a list of entity ids from a service call.
|
2016-01-24 06:57:14 +00:00
|
|
|
|
2019-03-04 17:51:12 +00:00
|
|
|
Will convert group entity ids to the entity ids it represents.
|
|
|
|
"""
|
|
|
|
entity_ids = service_call.data.get(ATTR_ENTITY_ID)
|
|
|
|
area_ids = service_call.data.get(ATTR_AREA_ID)
|
2016-10-29 23:54:26 +00:00
|
|
|
|
2020-04-17 18:33:58 +00:00
|
|
|
extracted: Set[str] = set()
|
2019-03-04 17:51:12 +00:00
|
|
|
|
2020-02-04 22:42:07 +00:00
|
|
|
if entity_ids in (None, ENTITY_MATCH_NONE) and area_ids in (
|
|
|
|
None,
|
|
|
|
ENTITY_MATCH_NONE,
|
|
|
|
):
|
|
|
|
return extracted
|
|
|
|
|
|
|
|
if entity_ids and entity_ids != ENTITY_MATCH_NONE:
|
2019-03-04 17:51:12 +00:00
|
|
|
# Entity ID attr can be a list or a string
|
|
|
|
if isinstance(entity_ids, str):
|
|
|
|
entity_ids = [entity_ids]
|
|
|
|
|
|
|
|
if expand_group:
|
2019-07-31 19:25:30 +00:00
|
|
|
entity_ids = hass.components.group.expand_entity_ids(entity_ids)
|
2019-03-04 17:51:12 +00:00
|
|
|
|
|
|
|
extracted.update(entity_ids)
|
|
|
|
|
2020-02-04 22:42:07 +00:00
|
|
|
if area_ids and area_ids != ENTITY_MATCH_NONE:
|
2019-03-04 17:51:12 +00:00
|
|
|
if isinstance(area_ids, str):
|
|
|
|
area_ids = [area_ids]
|
|
|
|
|
|
|
|
dev_reg, ent_reg = await asyncio.gather(
|
|
|
|
hass.helpers.device_registry.async_get_registry(),
|
|
|
|
hass.helpers.entity_registry.async_get_registry(),
|
|
|
|
)
|
|
|
|
devices = [
|
|
|
|
device
|
|
|
|
for area_id in area_ids
|
2019-07-31 19:25:30 +00:00
|
|
|
for device in hass.helpers.device_registry.async_entries_for_area(
|
|
|
|
dev_reg, area_id
|
|
|
|
)
|
2019-03-04 17:51:12 +00:00
|
|
|
]
|
|
|
|
extracted.update(
|
|
|
|
entry.entity_id
|
|
|
|
for device in devices
|
2019-07-31 19:25:30 +00:00
|
|
|
for entry in hass.helpers.entity_registry.async_entries_for_device(
|
|
|
|
ent_reg, device.id
|
|
|
|
)
|
2019-03-04 17:51:12 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
return extracted
|
2018-01-07 22:54:16 +00:00
|
|
|
|
|
|
|
|
2019-08-15 15:53:25 +00:00
|
|
|
async def _load_services_file(hass: HomeAssistantType, domain: str) -> JSON_TYPE:
|
2019-04-12 17:09:17 +00:00
|
|
|
"""Load services file for an integration."""
|
|
|
|
integration = await async_get_integration(hass, domain)
|
|
|
|
try:
|
|
|
|
return await hass.async_add_executor_job(
|
2019-07-31 19:25:30 +00:00
|
|
|
load_yaml, str(integration.file_path / "services.yaml")
|
|
|
|
)
|
2019-04-12 17:09:17 +00:00
|
|
|
except FileNotFoundError:
|
2019-07-31 19:25:30 +00:00
|
|
|
_LOGGER.warning("Unable to find services.yaml for the %s integration", domain)
|
2019-04-12 17:09:17 +00:00
|
|
|
return {}
|
|
|
|
except HomeAssistantError:
|
2019-07-31 19:25:30 +00:00
|
|
|
_LOGGER.warning("Unable to parse services.yaml for the %s integration", domain)
|
2019-04-12 17:09:17 +00:00
|
|
|
return {}
|
|
|
|
|
|
|
|
|
2018-01-07 22:54:16 +00:00
|
|
|
@bind_hass
|
2020-04-17 18:33:58 +00:00
|
|
|
async def async_get_all_descriptions(
|
|
|
|
hass: HomeAssistantType,
|
|
|
|
) -> Dict[str, Dict[str, Any]]:
|
2018-01-07 22:54:16 +00:00
|
|
|
"""Return descriptions (i.e. user documentation) for all service calls."""
|
2019-04-12 17:09:17 +00:00
|
|
|
descriptions_cache = hass.data.setdefault(SERVICE_DESCRIPTION_CACHE, {})
|
2019-07-31 19:25:30 +00:00
|
|
|
format_cache_key = "{}.{}".format
|
2018-01-07 22:54:16 +00:00
|
|
|
services = hass.services.async_services()
|
|
|
|
|
2019-04-12 17:09:17 +00:00
|
|
|
# See if there are new services not seen before.
|
|
|
|
# Any service that we saw before already has an entry in description_cache.
|
2018-01-19 05:59:03 +00:00
|
|
|
missing = set()
|
2018-01-07 22:54:16 +00:00
|
|
|
for domain in services:
|
|
|
|
for service in services[domain]:
|
2019-04-12 17:09:17 +00:00
|
|
|
if format_cache_key(domain, service) not in descriptions_cache:
|
|
|
|
missing.add(domain)
|
2018-01-19 05:59:03 +00:00
|
|
|
break
|
2018-01-07 22:54:16 +00:00
|
|
|
|
2019-04-12 17:09:17 +00:00
|
|
|
# Files we loaded for missing descriptions
|
|
|
|
loaded = {}
|
|
|
|
|
2018-01-19 05:59:03 +00:00
|
|
|
if missing:
|
2019-07-31 19:25:30 +00:00
|
|
|
contents = await asyncio.gather(
|
|
|
|
*(_load_services_file(hass, domain) for domain in missing)
|
|
|
|
)
|
2019-04-12 17:09:17 +00:00
|
|
|
|
|
|
|
for domain, content in zip(missing, contents):
|
|
|
|
loaded[domain] = content
|
2018-01-07 22:54:16 +00:00
|
|
|
|
|
|
|
# Build response
|
2020-04-17 18:33:58 +00:00
|
|
|
descriptions: Dict[str, Dict[str, Any]] = {}
|
2018-01-07 22:54:16 +00:00
|
|
|
for domain in services:
|
|
|
|
descriptions[domain] = {}
|
|
|
|
|
|
|
|
for service in services[domain]:
|
|
|
|
cache_key = format_cache_key(domain, service)
|
2019-04-12 17:09:17 +00:00
|
|
|
description = descriptions_cache.get(cache_key)
|
2018-01-07 22:54:16 +00:00
|
|
|
|
|
|
|
# Cache missing descriptions
|
|
|
|
if description is None:
|
2019-04-12 17:09:17 +00:00
|
|
|
domain_yaml = loaded[domain]
|
|
|
|
yaml_description = domain_yaml.get(service, {})
|
|
|
|
|
2019-04-18 05:27:11 +00:00
|
|
|
# Don't warn for missing services, because it triggers false
|
|
|
|
# positives for things like scripts, that register as a service
|
2018-01-07 22:54:16 +00:00
|
|
|
|
2019-04-12 17:09:17 +00:00
|
|
|
description = descriptions_cache[cache_key] = {
|
2019-07-31 19:25:30 +00:00
|
|
|
"description": yaml_description.get("description", ""),
|
|
|
|
"fields": yaml_description.get("fields", {}),
|
2018-01-07 22:54:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
descriptions[domain][service] = description
|
|
|
|
|
|
|
|
return descriptions
|
2018-08-16 07:50:11 +00:00
|
|
|
|
|
|
|
|
2019-08-21 21:08:46 +00:00
|
|
|
@ha.callback
|
|
|
|
@bind_hass
|
2020-04-17 18:33:58 +00:00
|
|
|
def async_set_service_schema(
|
|
|
|
hass: HomeAssistantType, domain: str, service: str, schema: Dict[str, Any]
|
|
|
|
) -> None:
|
2019-08-21 21:08:46 +00:00
|
|
|
"""Register a description for a service."""
|
|
|
|
hass.data.setdefault(SERVICE_DESCRIPTION_CACHE, {})
|
|
|
|
|
|
|
|
description = {
|
|
|
|
"description": schema.get("description") or "",
|
|
|
|
"fields": schema.get("fields") or {},
|
|
|
|
}
|
|
|
|
|
2020-01-03 13:47:06 +00:00
|
|
|
hass.data[SERVICE_DESCRIPTION_CACHE][f"{domain}.{service}"] = description
|
2019-08-21 21:08:46 +00:00
|
|
|
|
|
|
|
|
2018-08-16 07:50:11 +00:00
|
|
|
@bind_hass
|
2020-01-20 01:55:18 +00:00
|
|
|
async def entity_service_call(hass, platforms, func, call, required_features=None):
|
2018-08-16 07:50:11 +00:00
|
|
|
"""Handle an entity service call.
|
|
|
|
|
|
|
|
Calls all platforms simultaneously.
|
|
|
|
"""
|
2018-11-21 11:26:08 +00:00
|
|
|
if call.context.user_id:
|
|
|
|
user = await hass.auth.async_get_user(call.context.user_id)
|
|
|
|
if user is None:
|
|
|
|
raise UnknownUser(context=call.context)
|
2018-11-25 17:04:48 +00:00
|
|
|
entity_perms = user.permissions.check_entity
|
2018-11-21 11:26:08 +00:00
|
|
|
else:
|
2018-11-25 17:04:48 +00:00
|
|
|
entity_perms = None
|
2018-11-21 11:26:08 +00:00
|
|
|
|
2019-12-03 00:23:12 +00:00
|
|
|
target_all_entities = call.data.get(ATTR_ENTITY_ID) == ENTITY_MATCH_ALL
|
2018-11-21 11:26:08 +00:00
|
|
|
|
|
|
|
if not target_all_entities:
|
|
|
|
# A set of entities we're trying to target.
|
2019-03-04 17:51:12 +00:00
|
|
|
entity_ids = await async_extract_entity_ids(hass, call, True)
|
2018-08-16 07:50:11 +00:00
|
|
|
|
2018-11-21 11:26:08 +00:00
|
|
|
# If the service function is a string, we'll pass it the service call data
|
2018-08-16 07:50:11 +00:00
|
|
|
if isinstance(func, str):
|
2020-02-02 23:36:39 +00:00
|
|
|
data = {
|
|
|
|
key: val
|
|
|
|
for key, val in call.data.items()
|
|
|
|
if key not in cv.ENTITY_SERVICE_FIELDS
|
|
|
|
}
|
2018-11-21 11:26:08 +00:00
|
|
|
# If the service function is not a string, we pass the service call
|
2018-08-16 07:50:11 +00:00
|
|
|
else:
|
|
|
|
data = call
|
|
|
|
|
2018-11-21 11:26:08 +00:00
|
|
|
# Check the permissions
|
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
# A list with entities to call the service on.
|
|
|
|
entity_candidates = []
|
2018-11-21 11:26:08 +00:00
|
|
|
|
2018-11-25 17:04:48 +00:00
|
|
|
if entity_perms is None:
|
2018-11-21 11:26:08 +00:00
|
|
|
for platform in platforms:
|
|
|
|
if target_all_entities:
|
2020-02-04 23:30:15 +00:00
|
|
|
entity_candidates.extend(platform.entities.values())
|
2018-11-21 11:26:08 +00:00
|
|
|
else:
|
2020-02-04 23:30:15 +00:00
|
|
|
entity_candidates.extend(
|
2019-07-31 19:25:30 +00:00
|
|
|
[
|
|
|
|
entity
|
|
|
|
for entity in platform.entities.values()
|
|
|
|
if entity.entity_id in entity_ids
|
|
|
|
]
|
|
|
|
)
|
2018-11-21 11:26:08 +00:00
|
|
|
|
|
|
|
elif target_all_entities:
|
|
|
|
# If we target all entities, we will select all entities the user
|
|
|
|
# is allowed to control.
|
|
|
|
for platform in platforms:
|
2020-02-04 23:30:15 +00:00
|
|
|
entity_candidates.extend(
|
2019-07-31 19:25:30 +00:00
|
|
|
[
|
|
|
|
entity
|
|
|
|
for entity in platform.entities.values()
|
|
|
|
if entity_perms(entity.entity_id, POLICY_CONTROL)
|
|
|
|
]
|
|
|
|
)
|
2018-11-21 11:26:08 +00:00
|
|
|
|
|
|
|
else:
|
|
|
|
for platform in platforms:
|
|
|
|
platform_entities = []
|
|
|
|
for entity in platform.entities.values():
|
2020-02-02 23:36:39 +00:00
|
|
|
|
2018-11-21 11:26:08 +00:00
|
|
|
if entity.entity_id not in entity_ids:
|
|
|
|
continue
|
|
|
|
|
2018-11-25 17:04:48 +00:00
|
|
|
if not entity_perms(entity.entity_id, POLICY_CONTROL):
|
2018-11-21 11:26:08 +00:00
|
|
|
raise Unauthorized(
|
|
|
|
context=call.context,
|
|
|
|
entity_id=entity.entity_id,
|
2019-07-31 19:25:30 +00:00
|
|
|
permission=POLICY_CONTROL,
|
2018-11-21 11:26:08 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
platform_entities.append(entity)
|
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
entity_candidates.extend(platform_entities)
|
2018-11-21 11:26:08 +00:00
|
|
|
|
2020-02-04 22:42:07 +00:00
|
|
|
if not target_all_entities:
|
2020-02-04 23:30:15 +00:00
|
|
|
for entity in entity_candidates:
|
|
|
|
entity_ids.remove(entity.entity_id)
|
2020-02-04 22:42:07 +00:00
|
|
|
|
|
|
|
if entity_ids:
|
|
|
|
_LOGGER.warning(
|
|
|
|
"Unable to find referenced entities %s", ", ".join(sorted(entity_ids))
|
|
|
|
)
|
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
entities = []
|
2018-08-16 07:50:11 +00:00
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
for entity in entity_candidates:
|
2018-08-16 07:50:11 +00:00
|
|
|
if not entity.available:
|
|
|
|
continue
|
|
|
|
|
2019-04-10 16:44:58 +00:00
|
|
|
# Skip entities that don't have the required feature.
|
2019-07-31 19:25:30 +00:00
|
|
|
if required_features is not None and not any(
|
2020-05-23 16:11:51 +00:00
|
|
|
entity.supported_features & feature_set == feature_set
|
|
|
|
for feature_set in required_features
|
2019-07-31 19:25:30 +00:00
|
|
|
):
|
2019-04-10 16:44:58 +00:00
|
|
|
continue
|
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
entities.append(entity)
|
2018-08-20 15:39:53 +00:00
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
if not entities:
|
|
|
|
return
|
2020-01-31 08:32:43 +00:00
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
done, pending = await asyncio.wait(
|
|
|
|
[
|
|
|
|
entity.async_request_call(
|
|
|
|
_handle_entity_call(hass, entity, func, data, call.context)
|
2020-01-30 00:27:25 +00:00
|
|
|
)
|
2020-02-04 23:30:15 +00:00
|
|
|
for entity in entities
|
|
|
|
]
|
|
|
|
)
|
|
|
|
assert not pending
|
|
|
|
for future in done:
|
|
|
|
future.result() # pop exception if have
|
|
|
|
|
|
|
|
tasks = []
|
|
|
|
|
|
|
|
for entity in entities:
|
|
|
|
if not entity.should_poll:
|
|
|
|
continue
|
2018-08-16 07:50:11 +00:00
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
# Context expires if the turn on commands took a long time.
|
|
|
|
# Set context again so it's there when we update
|
|
|
|
entity.async_set_context(call.context)
|
|
|
|
tasks.append(entity.async_update_ha_state(True))
|
2018-08-16 07:50:11 +00:00
|
|
|
|
|
|
|
if tasks:
|
2019-03-02 07:09:31 +00:00
|
|
|
done, pending = await asyncio.wait(tasks)
|
|
|
|
assert not pending
|
|
|
|
for future in done:
|
|
|
|
future.result() # pop exception if have
|
2019-03-13 05:09:50 +00:00
|
|
|
|
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
async def _handle_entity_call(hass, entity, func, data, context):
|
|
|
|
"""Handle calling service method."""
|
|
|
|
entity.async_set_context(context)
|
|
|
|
|
|
|
|
if isinstance(func, str):
|
|
|
|
result = hass.async_add_job(partial(getattr(entity, func), **data))
|
|
|
|
else:
|
|
|
|
result = hass.async_add_job(func, entity, data)
|
|
|
|
|
|
|
|
# Guard because callback functions do not return a task when passed to async_add_job.
|
|
|
|
if result is not None:
|
|
|
|
await result
|
|
|
|
|
|
|
|
if asyncio.iscoroutine(result):
|
|
|
|
_LOGGER.error(
|
|
|
|
"Service %s for %s incorrectly returns a coroutine object. Await result instead in service handler. Report bug to integration author.",
|
|
|
|
func,
|
|
|
|
entity.entity_id,
|
|
|
|
)
|
|
|
|
await result
|
|
|
|
|
|
|
|
|
2019-03-13 05:09:50 +00:00
|
|
|
@bind_hass
|
|
|
|
@ha.callback
|
2019-04-02 16:34:11 +00:00
|
|
|
def async_register_admin_service(
|
2020-04-17 18:33:58 +00:00
|
|
|
hass: HomeAssistantType,
|
2019-07-31 19:25:30 +00:00
|
|
|
domain: str,
|
|
|
|
service: str,
|
|
|
|
service_func: Callable,
|
|
|
|
schema: vol.Schema = vol.Schema({}, extra=vol.PREVENT_EXTRA),
|
|
|
|
) -> None:
|
2019-03-13 05:09:50 +00:00
|
|
|
"""Register a service that requires admin access."""
|
2019-07-31 19:25:30 +00:00
|
|
|
|
2019-03-13 05:09:50 +00:00
|
|
|
@wraps(service_func)
|
|
|
|
async def admin_handler(call):
|
|
|
|
if call.context.user_id:
|
|
|
|
user = await hass.auth.async_get_user(call.context.user_id)
|
|
|
|
if user is None:
|
|
|
|
raise UnknownUser(context=call.context)
|
|
|
|
if not user.is_admin:
|
|
|
|
raise Unauthorized(context=call.context)
|
|
|
|
|
2020-02-10 03:47:16 +00:00
|
|
|
result = hass.async_add_job(service_func, call)
|
|
|
|
if result is not None:
|
|
|
|
await result
|
2019-03-13 05:09:50 +00:00
|
|
|
|
2019-07-31 19:25:30 +00:00
|
|
|
hass.services.async_register(domain, service, admin_handler, schema)
|
2019-04-13 19:54:29 +00:00
|
|
|
|
|
|
|
|
|
|
|
@bind_hass
|
|
|
|
@ha.callback
|
|
|
|
def verify_domain_control(hass: HomeAssistantType, domain: str) -> Callable:
|
|
|
|
"""Ensure permission to access any entity under domain in service call."""
|
2019-07-31 19:25:30 +00:00
|
|
|
|
2019-04-13 19:54:29 +00:00
|
|
|
def decorator(service_handler: Callable) -> Callable:
|
|
|
|
"""Decorate."""
|
|
|
|
if not asyncio.iscoroutinefunction(service_handler):
|
2019-07-31 19:25:30 +00:00
|
|
|
raise HomeAssistantError("Can only decorate async functions.")
|
2019-04-13 19:54:29 +00:00
|
|
|
|
|
|
|
async def check_permissions(call):
|
|
|
|
"""Check user permission and raise before call if unauthorized."""
|
|
|
|
if not call.context.user_id:
|
|
|
|
return await service_handler(call)
|
|
|
|
|
|
|
|
user = await hass.auth.async_get_user(call.context.user_id)
|
2020-02-04 23:30:15 +00:00
|
|
|
|
2019-04-13 19:54:29 +00:00
|
|
|
if user is None:
|
|
|
|
raise UnknownUser(
|
|
|
|
context=call.context,
|
|
|
|
permission=POLICY_CONTROL,
|
2019-07-31 19:25:30 +00:00
|
|
|
user_id=call.context.user_id,
|
|
|
|
)
|
2019-04-13 19:54:29 +00:00
|
|
|
|
|
|
|
reg = await hass.helpers.entity_registry.async_get_registry()
|
2020-02-04 23:30:15 +00:00
|
|
|
|
2020-04-28 21:31:25 +00:00
|
|
|
authorized = False
|
|
|
|
|
2020-02-04 23:30:15 +00:00
|
|
|
for entity in reg.entities.values():
|
|
|
|
if entity.platform != domain:
|
|
|
|
continue
|
|
|
|
|
|
|
|
if user.permissions.check_entity(entity.entity_id, POLICY_CONTROL):
|
2020-04-28 21:31:25 +00:00
|
|
|
authorized = True
|
|
|
|
break
|
2019-04-13 19:54:29 +00:00
|
|
|
|
2020-04-28 21:31:25 +00:00
|
|
|
if not authorized:
|
|
|
|
raise Unauthorized(
|
|
|
|
context=call.context,
|
|
|
|
permission=POLICY_CONTROL,
|
|
|
|
user_id=call.context.user_id,
|
|
|
|
perm_category=CAT_ENTITIES,
|
|
|
|
)
|
|
|
|
|
|
|
|
return await service_handler(call)
|
2019-04-13 19:54:29 +00:00
|
|
|
|
|
|
|
return check_permissions
|
|
|
|
|
|
|
|
return decorator
|