Thank you
for your quick response. Please keep in mind that I am very
new to LwM2M and Leshan. If anything I write in this email
indicates that I have an incorrect understanding of these
subjects, please correct me.
- Which part
of Leshan do you plan to reuse ? which version ?
We would use
the client, server and bootstrap server libraries, so pretty
much all of it. I have been working with version 2.x of the
source code. I have also been using the demos from these
URLs:
https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-server-demo.jar
https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-client-demo.jar
https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-bsserver-demo.jar
I am
assuming that all three of these URLs are based on the
newest 2.x code. Is this correct?
- When your
client support only 1 server not sure to see how you can use
ACL ?
We would
only be using one server per client. However, we will have
many client/server pairs. We would want to code up an object
implementation only one time with all possible
functionality, use that implementation for all client/server
pairs, but restrict what each client/server pair can do with
permissions.
- which part
of Leshan do you need
The client,
server and bootstrap server, so basically everything.
We would
want to use the latest supported version possible. Right
now, I think 1.1.x is most likely.
- describe a
bit more the use case, etc.
We are
building a general-purpose product that will be used by
multiple customers. (With each customer having multiple
client/server pairs). Data would be collected and analyzed
from a wide variety of different sources, so maximum
flexibility and generality is preferred.
Thanks,
Peter
Hi,
I work for Oracle. We are
evaluating Leshan for possible inclusion into a software
product that we are developing.
Good to hear.
Which part of Leshan do you plan to reuse ? which version ?
I cannot
find anywhere in the code where this variable is used to
enforce permissions for servers attempting to perform
operations on objects.
This class is used by Bootstrap Server.
This aims to store the ACL configuration which will be used to
create request about populating ACL Object (2) to the client
during a bootstrap session.
(So this is not aimed to be used by the client directly)
Does the code enforce permissions for
servers attempting to perform operations on objects?
This concerns the client part and this is
not implemented for now in Leshan Client. (See
https://github.com/eclipse/leshan/wiki/LWM2M-Supported-features#access-control)
By the way, note that Leshan Client does not support multi
server too and ACL is mostly useful in this case. When your
client support only 1 server not sure to see how you can use
ACL ? (except maybe for testing purpose?)
But you should be able to use Leshan Bootstrap Server to
configure another LWM2M client which supports ACL.
If no, are there any plans to add
such a feature to the code?
Not planned for now.
I think this should be possible for you to add this kind of
behavior without code modification in Leshan Library. (see
this old thread maybe not so up to date :
https://github.com/eclipse/leshan/issues/403#issuecomment-337162354)
But depending of your needed, maybe we can also consider to
add it to Leshan library.
So please describe more precisely your needs ? (which part of
Leshan do you need, which version of LWM2M, describe a bit
more the use case, etc. )
Simon
Le 11/06/2022 à 03:04, Peter Sramka a
écrit :
I work for
Oracle. We are evaluating Leshan for possible inclusion
into a software product that we are developing.
I was
looking at the nested class
ACLConfig which starts at line 356 of this
file:
https://github.com/eclipse/leshan/blob/master/leshan-server-core/src/main/java/org/eclipse/leshan/server/bootstrap/BootstrapConfig.java
This class
has an instance variable
acls.
I cannot find anywhere in the code where this variable is
used to enforce permissions for servers attempting to
perform operations on objects.
Does the
code enforce permissions for servers attempting to perform
operations on objects?
If yes,
please direct me to the place in the source code where
this is happening.
If no, are
there any plans to add such a feature to the code?
Thank you,
Peter
Sramka
Principal
Engineer
Oracle
_______________________________________________
leshan-dev mailing list
leshan-dev@xxxxxxxxxxx
To unsubscribe from this list, visit https://www.eclipse.org/mailman/listinfo/leshan-dev