-
Notifications
You must be signed in to change notification settings - Fork 369
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Storing client X509CertPath chain on TlsEndpointContext #548
Comments
Why? Though we know the requirement from LWM2M, there will be a solution (in the future), but currently I see much more urgent work in issue #429. So for now, I strongly recommend to use different endpoint to setup the right credentials and trusts for different LWM2M servers. If you have a different use case, just inform us. |
Yes, the Ignoring dependencies, the
I don't really get this. Besides the dependency on Thanks. |
I thought, your intention was to improve the LWM2M client. If it's only the LWM2M server, then this is no issue. So the main blocker now is the work on issue #429 |
Yes, this is for the server side only, I'll work in a pull request. Thanks! |
Do you still plan to provide a PR? I would prefer, if the |
yes, I would, I'm having some issues with my local tests which I need to fix before uploading the PR, I could try to move the class. |
Currently, on NettyContextUtils#buildEndpointContext, the
X500Principal
is being extracted, it would be useful to have the whole certificate chain, this could be retrieved fromSSLSession#getPeerCertificateChain()
.I have a working code for this and I wonder if you are willing to merge it.
On
NettyContextUtils
we do this instead of storing theX500Principal
:And we'll need some helper methods:
Of course, we'll need to update the tests.
Having this on the 2.0.x branch would avoid us to fork the project just to add this change and it might be useful for more people using TCP.
The text was updated successfully, but these errors were encountered: