* Report non-awaited/non-locked config entry platform forwards Its currently possible for config entries to be reloaded while their platforms are being forwarded if platform forwards are not awaited or done after the config entry is setup since the lock will not be held in this case. In https://developers.home-assistant.io/blog/2022/07/08/config_entry_forwards we advised to await platform forwards to ensure this does not happen, however for sleeping devices and late discovered devices, platform forwards may happen later. If config platform forwards are happening during setup, they should be awaited If config entry platform forwards are not happening during setup, instead async_late_forward_entry_setups should be used which will hold the lock to prevent the config entry from being unloaded while its platforms are being setup * Report non-awaited/non-locked config entry platform forwards Its currently possible for config entries to be reloaded while their platforms are being forwarded if platform forwards are not awaited or done after the config entry is setup since the lock will not be held in this case. In https://developers.home-assistant.io/blog/2022/07/08/config_entry_forwards we advised to await platform forwards to ensure this does not happen, however for sleeping devices and late discovered devices, platform forwards may happen later. If config platform forwards are happening during setup, they should be awaited If config entry platform forwards are not happening during setup, instead async_late_forward_entry_setups should be used which will hold the lock to prevent the config entry from being unloaded while its platforms are being setup * run with error on to find them * cert_exp, hold lock * cert_exp, hold lock * shelly async_late_forward_entry_setups * compact * compact * found another * patch up mobileapp * patch up hue tests * patch up smartthings * fix mqtt * fix esphome * zwave_js * mqtt * rework * fixes * fix mocking * fix mocking * do not call async_forward_entry_setup directly * docstrings * docstrings * docstrings * add comments * doc strings * fixed all in core, turn off strict * coverage * coverage * missing * coverage
223 lines
7.3 KiB
Python
223 lines
7.3 KiB
Python
"""Support for Telldus Live."""
|
|
|
|
import asyncio
|
|
from functools import partial
|
|
import logging
|
|
|
|
from tellduslive import DIM, TURNON, UP, Session
|
|
import voluptuous as vol
|
|
|
|
from homeassistant import config_entries
|
|
from homeassistant.config_entries import ConfigEntry
|
|
from homeassistant.const import CONF_HOST, CONF_SCAN_INTERVAL
|
|
from homeassistant.core import HomeAssistant
|
|
from homeassistant.helpers import config_validation as cv, device_registry as dr
|
|
from homeassistant.helpers.dispatcher import async_dispatcher_send
|
|
from homeassistant.helpers.event import async_call_later
|
|
from homeassistant.helpers.typing import ConfigType
|
|
|
|
from .const import (
|
|
DOMAIN,
|
|
KEY_SCAN_INTERVAL,
|
|
KEY_SESSION,
|
|
MIN_UPDATE_INTERVAL,
|
|
NOT_SO_PRIVATE_KEY,
|
|
PUBLIC_KEY,
|
|
SCAN_INTERVAL,
|
|
SIGNAL_UPDATE_ENTITY,
|
|
TELLDUS_DISCOVERY_NEW,
|
|
)
|
|
|
|
APPLICATION_NAME = "Home Assistant"
|
|
|
|
_LOGGER = logging.getLogger(__name__)
|
|
|
|
CONFIG_SCHEMA = vol.Schema(
|
|
{
|
|
DOMAIN: vol.Schema(
|
|
{
|
|
vol.Optional(CONF_HOST, default=DOMAIN): cv.string,
|
|
vol.Optional(CONF_SCAN_INTERVAL, default=SCAN_INTERVAL): vol.All(
|
|
cv.time_period, vol.Clamp(min=MIN_UPDATE_INTERVAL)
|
|
),
|
|
}
|
|
)
|
|
},
|
|
extra=vol.ALLOW_EXTRA,
|
|
)
|
|
|
|
DATA_CONFIG_ENTRY_LOCK = "tellduslive_config_entry_lock"
|
|
CONFIG_ENTRY_IS_SETUP = "telldus_config_entry_is_setup"
|
|
|
|
NEW_CLIENT_TASK = "telldus_new_client_task"
|
|
INTERVAL_TRACKER = f"{DOMAIN}_INTERVAL"
|
|
|
|
|
|
async def async_setup_entry(hass: HomeAssistant, entry: ConfigEntry) -> bool:
|
|
"""Create a tellduslive session."""
|
|
conf = entry.data[KEY_SESSION]
|
|
|
|
if CONF_HOST in conf:
|
|
# Session(**conf) does blocking IO when
|
|
# communicating with local devices.
|
|
session = await hass.async_add_executor_job(partial(Session, **conf))
|
|
else:
|
|
session = Session(
|
|
PUBLIC_KEY, NOT_SO_PRIVATE_KEY, application=APPLICATION_NAME, **conf
|
|
)
|
|
|
|
if not session.is_authorized:
|
|
_LOGGER.error("Authentication Error")
|
|
return False
|
|
|
|
hass.data[DATA_CONFIG_ENTRY_LOCK] = asyncio.Lock()
|
|
hass.data[CONFIG_ENTRY_IS_SETUP] = set()
|
|
hass.data[NEW_CLIENT_TASK] = hass.loop.create_task(
|
|
async_new_client(hass, session, entry)
|
|
)
|
|
|
|
return True
|
|
|
|
|
|
async def async_new_client(hass, session, entry):
|
|
"""Add the hubs associated with the current client to device_registry."""
|
|
interval = entry.data[KEY_SCAN_INTERVAL]
|
|
_LOGGER.debug("Update interval %s seconds", interval)
|
|
client = TelldusLiveClient(hass, entry, session, interval)
|
|
hass.data[DOMAIN] = client
|
|
dev_reg = dr.async_get(hass)
|
|
for hub in await client.async_get_hubs():
|
|
_LOGGER.debug("Connected hub %s", hub["name"])
|
|
dev_reg.async_get_or_create(
|
|
config_entry_id=entry.entry_id,
|
|
identifiers={(DOMAIN, hub["id"])},
|
|
manufacturer="Telldus",
|
|
name=hub["name"],
|
|
model=hub["type"],
|
|
sw_version=hub["version"],
|
|
)
|
|
await client.update()
|
|
|
|
|
|
async def async_setup(hass: HomeAssistant, config: ConfigType) -> bool:
|
|
"""Set up the Telldus Live component."""
|
|
if DOMAIN not in config:
|
|
return True
|
|
|
|
hass.async_create_task(
|
|
hass.config_entries.flow.async_init(
|
|
DOMAIN,
|
|
context={"source": config_entries.SOURCE_IMPORT},
|
|
data={
|
|
CONF_HOST: config[DOMAIN].get(CONF_HOST),
|
|
KEY_SCAN_INTERVAL: config[DOMAIN][CONF_SCAN_INTERVAL],
|
|
},
|
|
)
|
|
)
|
|
return True
|
|
|
|
|
|
async def async_unload_entry(hass: HomeAssistant, config_entry: ConfigEntry) -> bool:
|
|
"""Unload a config entry."""
|
|
if not hass.data[NEW_CLIENT_TASK].done():
|
|
hass.data[NEW_CLIENT_TASK].cancel()
|
|
interval_tracker = hass.data.pop(INTERVAL_TRACKER)
|
|
interval_tracker()
|
|
unload_ok = await hass.config_entries.async_unload_platforms(
|
|
config_entry, CONFIG_ENTRY_IS_SETUP
|
|
)
|
|
del hass.data[DOMAIN]
|
|
del hass.data[DATA_CONFIG_ENTRY_LOCK]
|
|
del hass.data[CONFIG_ENTRY_IS_SETUP]
|
|
return unload_ok
|
|
|
|
|
|
class TelldusLiveClient:
|
|
"""Get the latest data and update the states."""
|
|
|
|
def __init__(self, hass, config_entry, session, interval):
|
|
"""Initialize the Tellus data object."""
|
|
self._known_devices = set()
|
|
self._device_infos = {}
|
|
|
|
self._hass = hass
|
|
self._config_entry = config_entry
|
|
self._client = session
|
|
self._interval = interval
|
|
|
|
async def async_get_hubs(self):
|
|
"""Return hubs registered for the user."""
|
|
clients = await self._hass.async_add_executor_job(self._client.get_clients)
|
|
return clients or []
|
|
|
|
def device_info(self, device_id):
|
|
"""Return device info."""
|
|
return self._device_infos.get(device_id)
|
|
|
|
@staticmethod
|
|
def identify_device(device):
|
|
"""Find out what type of HA component to create."""
|
|
if device.is_sensor:
|
|
return "sensor"
|
|
|
|
if device.methods & DIM:
|
|
return "light"
|
|
if device.methods & UP:
|
|
return "cover"
|
|
if device.methods & TURNON:
|
|
return "switch"
|
|
if device.methods == 0:
|
|
return "binary_sensor"
|
|
_LOGGER.warning("Unidentified device type (methods: %d)", device.methods)
|
|
return "switch"
|
|
|
|
async def _discover(self, device_id):
|
|
"""Discover the component."""
|
|
device = self._client.device(device_id)
|
|
component = self.identify_device(device)
|
|
self._device_infos.update(
|
|
{device_id: await self._hass.async_add_executor_job(device.info)}
|
|
)
|
|
async with self._hass.data[DATA_CONFIG_ENTRY_LOCK]:
|
|
if component not in self._hass.data[CONFIG_ENTRY_IS_SETUP]:
|
|
await self._hass.config_entries.async_forward_entry_setups(
|
|
self._config_entry, [component]
|
|
)
|
|
self._hass.data[CONFIG_ENTRY_IS_SETUP].add(component)
|
|
device_ids = []
|
|
if device.is_sensor:
|
|
device_ids.extend(
|
|
(device.device_id, item.name, item.scale) for item in device.items
|
|
)
|
|
else:
|
|
device_ids.append(device_id)
|
|
for _id in device_ids:
|
|
async_dispatcher_send(
|
|
self._hass, TELLDUS_DISCOVERY_NEW.format(component, DOMAIN), _id
|
|
)
|
|
|
|
async def update(self, *args):
|
|
"""Periodically poll the servers for current state."""
|
|
try:
|
|
if not await self._hass.async_add_executor_job(self._client.update):
|
|
_LOGGER.warning("Failed request")
|
|
return
|
|
dev_ids = {dev.device_id for dev in self._client.devices}
|
|
new_devices = dev_ids - self._known_devices
|
|
# just await each discover as `gather` use up all HTTPAdapter pools
|
|
for d_id in new_devices:
|
|
await self._discover(d_id)
|
|
self._known_devices |= new_devices
|
|
async_dispatcher_send(self._hass, SIGNAL_UPDATE_ENTITY)
|
|
finally:
|
|
self._hass.data[INTERVAL_TRACKER] = async_call_later(
|
|
self._hass, self._interval, self.update
|
|
)
|
|
|
|
def device(self, device_id):
|
|
"""Return device representation."""
|
|
return self._client.device(device_id)
|
|
|
|
def is_available(self, device_id):
|
|
"""Return device availability."""
|
|
return device_id in self._client.device_ids
|