-
Notifications
You must be signed in to change notification settings - Fork 407
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Identity
Refactoring
#1445
Identity
Refactoring
#1445
Conversation
@JaroslawLegierski, I moved forward on this. There is more changes than what I expected. I guess someone could say : "as usual" 😬 Maybe you want to review/take a look at this ? About Redis implementation (See some TODO in code) :
I don't know if naming is so good but didn't find anything better for now. Hope this goes in the right direction. |
Maybe we also need some tests about : #1421. |
Thank You very much - I will continue tests/review in next week |
OK - this is very good idea - I will also check Leshan server behavior when the client's IP address changes |
This is not is related to "new Identity concept " however during project building I noticed the following new WARNING
|
I finished first part of tests "new identity concept" using InMemoryRegistrationStore
only device with unsecure connection is not able to send data to the server after IP address change (which is obvious and expected 😉 ) |
Currently when unsecure device changes IP address the response on Send is 500 Internal Server Error. |
Please find bellow results of tests using RedisRegistrationStore:
|
Regarding LwM2mIdentitySerDes and LwM2mPeerSerDes are You thinking about something like this solution ? |
Yep exactly. Could you provide a PR targeting Thx for testing this 🙏, do you also review the code ? if no, do you plan to do it (it's just to know for organization 🙂 ) ? So what is missing now ?
|
OK done in PR
I did a quick check only. Only one remark is described here (already included in PR)
Today I must focus on another task but I will come back to these questions on Monday |
I think that current names are OK
Do you mean by type fields something like this:
for usecure ? or
for psk: ?
I commented this here (I also confirmed this with my French colleagues). |
About |
Regarding 'type' I prepared simple implementation in this branch. Please let me know if this is what you have in mind. |
Yep I had something like this in mind. So about :
Do you thing this is better with or without it ? |
OK - already corrected in this commit
Apart from development cases (data validation), I think that this field can be usefull in some maintenance cases (such as collection information from Redis about existing session grouped by identity type). |
e3c50ad
to
4dcedbb
Compare
@JaroslawLegierski, I rebased this branch (resolving conflict) on |
OK thx for info. |
I re-read this discussion and missing point are :
|
Oops I completely forgot about keys. PR already created I am (mostly) out of the office this week, but @Warmek will help us with this topic. |
Sorry for messy commits (work during breaks in training is not good idea) 😅 |
@Warmek you asked at (#1421 (comment)):
I'm answering here because this is the most appropriate place. |
@Warmek, @JaroslawLegierski Do you start to work on "adding automatic test about address changing" OR plan to work on it ? If not I will begin to work on this tomorrow. I would like to not wait too much before to merge this because this is a very impacting PR which could probably generate conflict with parallel work. 🙂 |
I started to implement those tests, but I have an issue running them. I used NioNatUtil as you suggested above, but when i import it into tests and run the test i get following exception: Do you have an idea what might cause it and how to fix it? |
So the alternative are :
|
The trick didn't work, but I think it still would be easier to modify NatUtli to fix this mismatch than to write the same tool myself. Tell me what you think about it |
OK I will try to do it myself tomorrow, just to be sure.
I'm not sure what means fixing the mismatch, I guess we don't want to go back to slf4j 1.7.x and not sure that californium want to move to slf4j 2.x. (Note that we are not sure this is really the problem) We don't need all feature of |
About
I was not able to reproduce it using (58384ed) . So I can not test my trick either 😬 Anyway on my side, I will explore the |
I moved forward about implementing our own Nat Utility. I face some difficulty to integrate it correctly in integration tests API but finally I think it is not so bad. |
004d3aa
to
2c146b2
Compare
Co-authored-by: Simon Bernard <sbernard@sierrawireless.com>
2c146b2
to
dba8cb1
Compare
dba8cb1
to
6a05894
Compare
I fixed some issue in For now I didn't add tests for OSCORE. There still an issue about Concerning this PR, I think it is in a reviewable / testable state. Only last little point which I would like to understand before to integrate it in My tests results show :
which is a bit different than @JaroslawLegierski's result at #1445 (comment). It would be good to clarify this before to integrate the PR 🤔 @JaroslawLegierski @Warmek, I don't know if you want to review and/or test it ? (let me know if you plan to do it) |
I retested today Notification (observation) after IP change - and I want to confirm that for unsecure client final result is NOT OK (I got RST from the server) |
Great, so on my side, I have nothing more to add to this PR. @JaroslawLegierski, @Warmek let me know :
|
We are good to integrate into master |
@sbernard31 When are you planing to integrate this PR into master? |
I don't know, do we need @JaroslawLegierski green-light ? |
I talked with him and we have his greenlight |
So I integrated it in |
This aims to implement #1436, based on @JaroslawLegierski work (#1436 (comment))