Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix admin id used in the peer-to-local session in messaging context. #8049

Merged

Conversation

bzbarsky-apple
Copy link
Contributor

Without this, trying to use NewExchangeToLocal to simulate an
unsolicited incoming message fails to do the right thing because we
end up not matching up the MRP ack to the message's exchange
correctly, since the admin ids mismatch.

Problem

Tests that I was trying to write failed.

Change overview

Use what I think is the right admin id for the secure session here.

Testing

Will be tested by those tests I am trying to write.

Without this, trying to use NewExchangeToLocal to simulate an
unsolicited incoming message fails to do the right thing because we
end up not matching up the MRP ack to the message's exchange
correctly, since the admin ids mismatch.
@woody-apple woody-apple merged commit 55f0609 into project-chip:master Jul 3, 2021
@bzbarsky-apple bzbarsky-apple deleted the fix-messaging-context branch July 7, 2021 16:31
nikita-s-wrk pushed a commit to nikita-s-wrk/connectedhomeip that referenced this pull request Sep 23, 2021
…roject-chip#8049)

Without this, trying to use NewExchangeToLocal to simulate an
unsolicited incoming message fails to do the right thing because we
end up not matching up the MRP ack to the message's exchange
correctly, since the admin ids mismatch.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants