-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove Mutual Authentication (Fixing KUKSA Server token handling) #29
Conversation
93dd2d7
to
ef5cf21
Compare
@@ -297,8 +297,6 @@ async def connect(self, _=None): | |||
subprotocols = ["VISSv2"] | |||
if not self.insecure: | |||
context = ssl.create_default_context() | |||
context.load_cert_chain( | |||
certfile=self.certificate, keyfile=self.keyfile) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we do not want to remove support for client auth then this statement must be modified by checking that both are not null before calling it
@SebastianSchildt - I noticed a side effect for ws/server connection after removing default certs/tokens, instead of adapting I think this could be a good time to remove client key/cert handling, as we anyway do not support it in Server or databroker, and do not plan to support it. |
8e3d770
to
f66aadb
Compare
@@ -35,6 +35,7 @@ jobs: | |||
> dependencies.txt | |||
|
|||
- name: Dash license check | |||
uses: eclipse-kuksa/kuksa-actions/check-dash@2 | |||
uses: eclipse-kuksa/kuksa-actions/check-dash@4 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Trying out the dash update as well @SebastianSchildt
Not actively supported anyway and current handling for ws did not work after removing default certs
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agree this feature can be removed. Did some manual testing, no regression (as expected) GRPC side, and als was successful using VISS
lgtm 👑
This is a follow up to #23. Previously we always had default client key/certs and fed them to KUKSA Server unless some other key/cert was given. So in short, they were never null or empty string. Now they might be empty unless specified in config or similar, so we must handle that scenario. But opting for removing client key support instead.