Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove Mutual Authentication (Fixing KUKSA Server token handling) #29

Merged
merged 1 commit into from
May 14, 2024

Conversation

erikbosch
Copy link
Contributor

@erikbosch erikbosch commented May 10, 2024

This is a follow up to #23. Previously we always had default client key/certs and fed them to KUKSA Server unless some other key/cert was given. So in short, they were never null or empty string. Now they might be empty unless specified in config or similar, so we must handle that scenario. But opting for removing client key support instead.

@erikbosch erikbosch force-pushed the erik_release branch 2 times, most recently from 93dd2d7 to ef5cf21 Compare May 10, 2024 12:10
@erikbosch erikbosch changed the title Fixing KUKSA Server token handling Remove Mutual Authetnication (Fixing KUKSA Server token handling) May 10, 2024
@@ -297,8 +297,6 @@ async def connect(self, _=None):
subprotocols = ["VISSv2"]
if not self.insecure:
context = ssl.create_default_context()
context.load_cert_chain(
certfile=self.certificate, keyfile=self.keyfile)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we do not want to remove support for client auth then this statement must be modified by checking that both are not null before calling it

@erikbosch erikbosch changed the title Remove Mutual Authetnication (Fixing KUKSA Server token handling) Remove Mutual Authentication (Fixing KUKSA Server token handling) May 10, 2024
@erikbosch
Copy link
Contributor Author

@SebastianSchildt - I noticed a side effect for ws/server connection after removing default certs/tokens, instead of adapting I think this could be a good time to remove client key/cert handling, as we anyway do not support it in Server or databroker, and do not plan to support it.

@@ -35,6 +35,7 @@ jobs:
> dependencies.txt

- name: Dash license check
uses: eclipse-kuksa/kuksa-actions/check-dash@2
uses: eclipse-kuksa/kuksa-actions/check-dash@4
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Trying out the dash update as well @SebastianSchildt

Not actively supported anyway and current handling for ws did not work after
removing default certs
Copy link
Contributor

@SebastianSchildt SebastianSchildt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agree this feature can be removed. Did some manual testing, no regression (as expected) GRPC side, and als was successful using VISS
lgtm 👑

@SebastianSchildt SebastianSchildt merged commit d72777a into eclipse-kuksa:main May 14, 2024
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants