added lwm2m x509 test
This commit is contained in:
parent
4ec25beeb3
commit
92719c2ac2
@ -26,13 +26,13 @@ import java.util.Arrays;
|
|||||||
|
|
||||||
@RunWith(ClasspathSuite.class)
|
@RunWith(ClasspathSuite.class)
|
||||||
@ClasspathSuite.ClassnameFilters({
|
@ClasspathSuite.ClassnameFilters({
|
||||||
"org.thingsboard.server.transport.*.rpc.sql.*Test",
|
// "org.thingsboard.server.transport.*.rpc.sql.*Test",
|
||||||
"org.thingsboard.server.transport.*.telemetry.timeseries.sql.*Test",
|
// "org.thingsboard.server.transport.*.telemetry.timeseries.sql.*Test",
|
||||||
"org.thingsboard.server.transport.*.telemetry.attributes.sql.*Test",
|
// "org.thingsboard.server.transport.*.telemetry.attributes.sql.*Test",
|
||||||
"org.thingsboard.server.transport.*.attributes.updates.sql.*Test",
|
// "org.thingsboard.server.transport.*.attributes.updates.sql.*Test",
|
||||||
"org.thingsboard.server.transport.*.attributes.request.sql.*Test",
|
// "org.thingsboard.server.transport.*.attributes.request.sql.*Test",
|
||||||
"org.thingsboard.server.transport.*.claim.sql.*Test",
|
// "org.thingsboard.server.transport.*.claim.sql.*Test",
|
||||||
"org.thingsboard.server.transport.*.provision.sql.*Test",
|
// "org.thingsboard.server.transport.*.provision.sql.*Test",
|
||||||
"org.thingsboard.server.transport.lwm2m.*Test"
|
"org.thingsboard.server.transport.lwm2m.*Test"
|
||||||
})
|
})
|
||||||
public class TransportSqlTestSuite {
|
public class TransportSqlTestSuite {
|
||||||
|
|||||||
@ -17,6 +17,7 @@ package org.thingsboard.server.transport.lwm2m;
|
|||||||
|
|
||||||
import com.fasterxml.jackson.core.type.TypeReference;
|
import com.fasterxml.jackson.core.type.TypeReference;
|
||||||
import org.apache.commons.io.IOUtils;
|
import org.apache.commons.io.IOUtils;
|
||||||
|
import org.eclipse.leshan.core.util.Hex;
|
||||||
import org.junit.After;
|
import org.junit.After;
|
||||||
import org.junit.Assert;
|
import org.junit.Assert;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
@ -35,6 +36,23 @@ import org.thingsboard.server.controller.AbstractWebsocketTest;
|
|||||||
import org.thingsboard.server.controller.TbTestWebSocketClient;
|
import org.thingsboard.server.controller.TbTestWebSocketClient;
|
||||||
import org.thingsboard.server.dao.service.DaoSqlTest;
|
import org.thingsboard.server.dao.service.DaoSqlTest;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.io.InputStream;
|
||||||
|
import java.math.BigInteger;
|
||||||
|
import java.security.AlgorithmParameters;
|
||||||
|
import java.security.GeneralSecurityException;
|
||||||
|
import java.security.KeyFactory;
|
||||||
|
import java.security.KeyStore;
|
||||||
|
import java.security.PrivateKey;
|
||||||
|
import java.security.PublicKey;
|
||||||
|
import java.security.cert.Certificate;
|
||||||
|
import java.security.cert.X509Certificate;
|
||||||
|
import java.security.spec.ECGenParameterSpec;
|
||||||
|
import java.security.spec.ECParameterSpec;
|
||||||
|
import java.security.spec.ECPoint;
|
||||||
|
import java.security.spec.ECPrivateKeySpec;
|
||||||
|
import java.security.spec.ECPublicKeySpec;
|
||||||
|
import java.security.spec.KeySpec;
|
||||||
import java.util.Base64;
|
import java.util.Base64;
|
||||||
import java.util.concurrent.Executors;
|
import java.util.concurrent.Executors;
|
||||||
import java.util.concurrent.ScheduledExecutorService;
|
import java.util.concurrent.ScheduledExecutorService;
|
||||||
@ -46,6 +64,114 @@ public class AbstractLwM2MIntegrationTest extends AbstractWebsocketTest {
|
|||||||
protected ScheduledExecutorService executor;
|
protected ScheduledExecutorService executor;
|
||||||
protected TbTestWebSocketClient wsClient;
|
protected TbTestWebSocketClient wsClient;
|
||||||
|
|
||||||
|
protected final PublicKey clientPublicKey; // client public key used for RPK
|
||||||
|
protected final PrivateKey clientPrivateKey; // client private key used for RPK
|
||||||
|
protected final PublicKey serverPublicKey; // server public key used for RPK
|
||||||
|
protected final PrivateKey serverPrivateKey; // server private key used for RPK
|
||||||
|
|
||||||
|
// client private key used for X509
|
||||||
|
protected final PrivateKey clientPrivateKeyFromCert;
|
||||||
|
// server private key used for X509
|
||||||
|
protected final PrivateKey serverPrivateKeyFromCert;
|
||||||
|
// client certificate signed by rootCA with a good CN (CN start by leshan_integration_test)
|
||||||
|
protected final X509Certificate clientX509Cert;
|
||||||
|
// client certificate signed by rootCA but with bad CN (CN does not start by leshan_integration_test)
|
||||||
|
protected final X509Certificate clientX509CertWithBadCN;
|
||||||
|
// client certificate self-signed with a good CN (CN start by leshan_integration_test)
|
||||||
|
protected final X509Certificate clientX509CertSelfSigned;
|
||||||
|
// client certificate signed by another CA (not rootCA) with a good CN (CN start by leshan_integration_test)
|
||||||
|
protected final X509Certificate clientX509CertNotTrusted;
|
||||||
|
// server certificate signed by rootCA
|
||||||
|
protected final X509Certificate serverX509Cert;
|
||||||
|
// self-signed server certificate
|
||||||
|
protected final X509Certificate serverX509CertSelfSigned;
|
||||||
|
// rootCA used by the server
|
||||||
|
protected final X509Certificate rootCAX509Cert;
|
||||||
|
// certificates trustedby the server (should contain rootCA)
|
||||||
|
protected final Certificate[] trustedCertificates = new Certificate[1];
|
||||||
|
|
||||||
|
public AbstractLwM2MIntegrationTest() {
|
||||||
|
// create client credentials
|
||||||
|
try {
|
||||||
|
// Get point values
|
||||||
|
byte[] publicX = Hex
|
||||||
|
.decodeHex("89c048261979208666f2bfb188be1968fc9021c416ce12828c06f4e314c167b5".toCharArray());
|
||||||
|
byte[] publicY = Hex
|
||||||
|
.decodeHex("cbf1eb7587f08e01688d9ada4be859137ca49f79394bad9179326b3090967b68".toCharArray());
|
||||||
|
byte[] privateS = Hex
|
||||||
|
.decodeHex("e67b68d2aaeb6550f19d98cade3ad62b39532e02e6b422e1f7ea189dabaea5d2".toCharArray());
|
||||||
|
|
||||||
|
// Get Elliptic Curve Parameter spec for secp256r1
|
||||||
|
AlgorithmParameters algoParameters = AlgorithmParameters.getInstance("EC");
|
||||||
|
algoParameters.init(new ECGenParameterSpec("secp256r1"));
|
||||||
|
ECParameterSpec parameterSpec = algoParameters.getParameterSpec(ECParameterSpec.class);
|
||||||
|
|
||||||
|
// Create key specs
|
||||||
|
KeySpec publicKeySpec = new ECPublicKeySpec(new ECPoint(new BigInteger(publicX), new BigInteger(publicY)),
|
||||||
|
parameterSpec);
|
||||||
|
KeySpec privateKeySpec = new ECPrivateKeySpec(new BigInteger(privateS), parameterSpec);
|
||||||
|
|
||||||
|
// Get keys
|
||||||
|
clientPublicKey = KeyFactory.getInstance("EC").generatePublic(publicKeySpec);
|
||||||
|
clientPrivateKey = KeyFactory.getInstance("EC").generatePrivate(privateKeySpec);
|
||||||
|
|
||||||
|
// Get certificates from key store
|
||||||
|
char[] clientKeyStorePwd = "client".toCharArray();
|
||||||
|
KeyStore clientKeyStore = KeyStore.getInstance(KeyStore.getDefaultType());
|
||||||
|
try (InputStream clientKeyStoreFile = this.getClass().getClassLoader().getResourceAsStream("lwm2m/credentials/clientKeyStore.jks")) {
|
||||||
|
clientKeyStore.load(clientKeyStoreFile, clientKeyStorePwd);
|
||||||
|
}
|
||||||
|
|
||||||
|
clientPrivateKeyFromCert = (PrivateKey) clientKeyStore.getKey("client", clientKeyStorePwd);
|
||||||
|
clientX509Cert = (X509Certificate) clientKeyStore.getCertificate("client");
|
||||||
|
clientX509CertWithBadCN = (X509Certificate) clientKeyStore.getCertificate("client_bad_cn");
|
||||||
|
clientX509CertSelfSigned = (X509Certificate) clientKeyStore.getCertificate("client_self_signed");
|
||||||
|
clientX509CertNotTrusted = (X509Certificate) clientKeyStore.getCertificate("client_not_trusted");
|
||||||
|
} catch (GeneralSecurityException | IOException e) {
|
||||||
|
throw new RuntimeException(e);
|
||||||
|
}
|
||||||
|
|
||||||
|
// create server credentials
|
||||||
|
try {
|
||||||
|
// Get point values
|
||||||
|
byte[] publicX = Hex
|
||||||
|
.decodeHex("fcc28728c123b155be410fc1c0651da374fc6ebe7f96606e90d927d188894a73".toCharArray());
|
||||||
|
byte[] publicY = Hex
|
||||||
|
.decodeHex("d2ffaa73957d76984633fc1cc54d0b763ca0559a9dff9706e9f4557dacc3f52a".toCharArray());
|
||||||
|
byte[] privateS = Hex
|
||||||
|
.decodeHex("1dae121ba406802ef07c193c1ee4df91115aabd79c1ed7f4c0ef7ef6a5449400".toCharArray());
|
||||||
|
|
||||||
|
// Get Elliptic Curve Parameter spec for secp256r1
|
||||||
|
AlgorithmParameters algoParameters = AlgorithmParameters.getInstance("EC");
|
||||||
|
algoParameters.init(new ECGenParameterSpec("secp256r1"));
|
||||||
|
ECParameterSpec parameterSpec = algoParameters.getParameterSpec(ECParameterSpec.class);
|
||||||
|
|
||||||
|
// Create key specs
|
||||||
|
KeySpec publicKeySpec = new ECPublicKeySpec(new ECPoint(new BigInteger(publicX), new BigInteger(publicY)),
|
||||||
|
parameterSpec);
|
||||||
|
KeySpec privateKeySpec = new ECPrivateKeySpec(new BigInteger(privateS), parameterSpec);
|
||||||
|
|
||||||
|
// // Get keys
|
||||||
|
serverPublicKey = KeyFactory.getInstance("EC").generatePublic(publicKeySpec);
|
||||||
|
serverPrivateKey = KeyFactory.getInstance("EC").generatePrivate(privateKeySpec);
|
||||||
|
|
||||||
|
// Get certificates from key store
|
||||||
|
char[] serverKeyStorePwd = "server".toCharArray();
|
||||||
|
KeyStore serverKeyStore = KeyStore.getInstance(KeyStore.getDefaultType());
|
||||||
|
try (InputStream serverKeyStoreFile = this.getClass().getClassLoader().getResourceAsStream("lwm2m/credentials/serverKeyStore.jks")) {
|
||||||
|
serverKeyStore.load(serverKeyStoreFile, serverKeyStorePwd);
|
||||||
|
}
|
||||||
|
|
||||||
|
serverPrivateKeyFromCert = (PrivateKey) serverKeyStore.getKey("server", serverKeyStorePwd);
|
||||||
|
rootCAX509Cert = (X509Certificate) serverKeyStore.getCertificate("rootCA");
|
||||||
|
serverX509Cert = (X509Certificate) serverKeyStore.getCertificate("server");
|
||||||
|
serverX509CertSelfSigned = (X509Certificate) serverKeyStore.getCertificate("server_self_signed");
|
||||||
|
trustedCertificates[0] = rootCAX509Cert;
|
||||||
|
} catch (GeneralSecurityException | IOException e) {
|
||||||
|
throw new RuntimeException(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Before
|
@Before
|
||||||
public void beforeTest() throws Exception {
|
public void beforeTest() throws Exception {
|
||||||
executor = Executors.newScheduledThreadPool(10);
|
executor = Executors.newScheduledThreadPool(10);
|
||||||
@ -60,7 +186,8 @@ public class AbstractLwM2MIntegrationTest extends AbstractWebsocketTest {
|
|||||||
lwModel.setTenantId(tenantId);
|
lwModel.setTenantId(tenantId);
|
||||||
byte[] bytes = IOUtils.toByteArray(AbstractLwM2MIntegrationTest.class.getClassLoader().getResourceAsStream("lwm2m/" + resourceName));
|
byte[] bytes = IOUtils.toByteArray(AbstractLwM2MIntegrationTest.class.getClassLoader().getResourceAsStream("lwm2m/" + resourceName));
|
||||||
lwModel.setData(Base64.getEncoder().encodeToString(bytes));
|
lwModel.setData(Base64.getEncoder().encodeToString(bytes));
|
||||||
lwModel = doPostWithTypedResponse("/api/resource", lwModel, new TypeReference<>(){});
|
lwModel = doPostWithTypedResponse("/api/resource", lwModel, new TypeReference<>() {
|
||||||
|
});
|
||||||
Assert.assertNotNull(lwModel);
|
Assert.assertNotNull(lwModel);
|
||||||
}
|
}
|
||||||
wsClient = buildAndConnectWebSocketClient();
|
wsClient = buildAndConnectWebSocketClient();
|
||||||
@ -69,7 +196,7 @@ public class AbstractLwM2MIntegrationTest extends AbstractWebsocketTest {
|
|||||||
protected void createDeviceProfile(String transportConfiguration) throws Exception {
|
protected void createDeviceProfile(String transportConfiguration) throws Exception {
|
||||||
deviceProfile = new DeviceProfile();
|
deviceProfile = new DeviceProfile();
|
||||||
|
|
||||||
deviceProfile.setName("LwM2M No Security");
|
deviceProfile.setName("LwM2M");
|
||||||
deviceProfile.setType(DeviceProfileType.DEFAULT);
|
deviceProfile.setType(DeviceProfileType.DEFAULT);
|
||||||
deviceProfile.setTenantId(tenantId);
|
deviceProfile.setTenantId(tenantId);
|
||||||
deviceProfile.setTransportType(DeviceTransportType.LWM2M);
|
deviceProfile.setTransportType(DeviceTransportType.LWM2M);
|
||||||
@ -87,7 +214,7 @@ public class AbstractLwM2MIntegrationTest extends AbstractWebsocketTest {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@After
|
@After
|
||||||
public void after() {
|
public void after() throws InterruptedException {
|
||||||
executor.shutdownNow();
|
executor.shutdownNow();
|
||||||
wsClient.close();
|
wsClient.close();
|
||||||
}
|
}
|
||||||
|
|||||||
@ -15,6 +15,8 @@
|
|||||||
*/
|
*/
|
||||||
package org.thingsboard.server.transport.lwm2m;
|
package org.thingsboard.server.transport.lwm2m;
|
||||||
|
|
||||||
|
import org.eclipse.californium.core.network.config.NetworkConfig;
|
||||||
|
import org.eclipse.leshan.client.object.Security;
|
||||||
import org.jetbrains.annotations.NotNull;
|
import org.jetbrains.annotations.NotNull;
|
||||||
import org.junit.Assert;
|
import org.junit.Assert;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
@ -39,6 +41,7 @@ import org.thingsboard.server.transport.lwm2m.secure.credentials.NoSecClientCred
|
|||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
|
import static org.eclipse.leshan.client.object.Security.noSec;
|
||||||
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
|
||||||
|
|
||||||
public class NoSecLwM2MIntegrationTest extends AbstractLwM2MIntegrationTest {
|
public class NoSecLwM2MIntegrationTest extends AbstractLwM2MIntegrationTest {
|
||||||
@ -91,6 +94,10 @@ public class NoSecLwM2MIntegrationTest extends AbstractLwM2MIntegrationTest {
|
|||||||
" }\n" +
|
" }\n" +
|
||||||
"}";
|
"}";
|
||||||
|
|
||||||
|
private final int port = 5685;
|
||||||
|
private final Security security = noSec("coap://localhost:" + port, 123);
|
||||||
|
private final NetworkConfig coapConfig = new NetworkConfig().setString("COAP_PORT", Integer.toString(port));
|
||||||
|
|
||||||
@NotNull
|
@NotNull
|
||||||
private Device createDevice(String deviceAEndpoint) throws Exception {
|
private Device createDevice(String deviceAEndpoint) throws Exception {
|
||||||
Device device = new Device();
|
Device device = new Device();
|
||||||
@ -138,7 +145,7 @@ public class NoSecLwM2MIntegrationTest extends AbstractLwM2MIntegrationTest {
|
|||||||
|
|
||||||
wsClient.registerWaitForUpdate();
|
wsClient.registerWaitForUpdate();
|
||||||
LwM2MTestClient client = new LwM2MTestClient(executor, deviceAEndpoint);
|
LwM2MTestClient client = new LwM2MTestClient(executor, deviceAEndpoint);
|
||||||
client.init();
|
client.init(security, coapConfig);
|
||||||
String msg = wsClient.waitForUpdate();
|
String msg = wsClient.waitForUpdate();
|
||||||
|
|
||||||
EntityDataUpdate update = mapper.readValue(msg, EntityDataUpdate.class);
|
EntityDataUpdate update = mapper.readValue(msg, EntityDataUpdate.class);
|
||||||
|
|||||||
@ -0,0 +1,205 @@
|
|||||||
|
/**
|
||||||
|
* Copyright © 2016-2021 The Thingsboard Authors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.thingsboard.server.transport.lwm2m;
|
||||||
|
|
||||||
|
import org.eclipse.californium.core.network.config.NetworkConfig;
|
||||||
|
import org.eclipse.leshan.client.object.Security;
|
||||||
|
import org.jetbrains.annotations.NotNull;
|
||||||
|
import org.junit.Assert;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.thingsboard.common.util.JacksonUtil;
|
||||||
|
import org.thingsboard.server.common.data.Device;
|
||||||
|
import org.thingsboard.server.common.data.query.EntityData;
|
||||||
|
import org.thingsboard.server.common.data.query.EntityDataPageLink;
|
||||||
|
import org.thingsboard.server.common.data.query.EntityDataQuery;
|
||||||
|
import org.thingsboard.server.common.data.query.EntityKey;
|
||||||
|
import org.thingsboard.server.common.data.query.EntityKeyType;
|
||||||
|
import org.thingsboard.server.common.data.query.SingleEntityFilter;
|
||||||
|
import org.thingsboard.server.common.data.security.DeviceCredentials;
|
||||||
|
import org.thingsboard.server.common.data.security.DeviceCredentialsType;
|
||||||
|
import org.thingsboard.server.common.transport.util.SslUtil;
|
||||||
|
import org.thingsboard.server.service.telemetry.cmd.TelemetryPluginCmdsWrapper;
|
||||||
|
import org.thingsboard.server.service.telemetry.cmd.v2.EntityDataCmd;
|
||||||
|
import org.thingsboard.server.service.telemetry.cmd.v2.EntityDataUpdate;
|
||||||
|
import org.thingsboard.server.service.telemetry.cmd.v2.LatestValueCmd;
|
||||||
|
import org.thingsboard.server.transport.lwm2m.client.LwM2MTestClient;
|
||||||
|
import org.thingsboard.server.transport.lwm2m.secure.credentials.LwM2MCredentials;
|
||||||
|
import org.thingsboard.server.transport.lwm2m.secure.credentials.X509ClientCredentialsConfig;
|
||||||
|
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import static org.eclipse.leshan.client.object.Security.x509;
|
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
|
||||||
|
|
||||||
|
public class X509LwM2MIntegrationTest extends AbstractLwM2MIntegrationTest {
|
||||||
|
|
||||||
|
protected final String TRANSPORT_CONFIGURATION = "{\n" +
|
||||||
|
" \"type\": \"LWM2M\",\n" +
|
||||||
|
" \"observeAttr\": {\n" +
|
||||||
|
" \"keyName\": {\n" +
|
||||||
|
" \"/3_1.0/0/9\": \"batteryLevel\"\n" +
|
||||||
|
" },\n" +
|
||||||
|
" \"observe\": [],\n" +
|
||||||
|
" \"attribute\": [\n" +
|
||||||
|
" ],\n" +
|
||||||
|
" \"telemetry\": [\n" +
|
||||||
|
" \"/3_1.0/0/9\"\n" +
|
||||||
|
" ],\n" +
|
||||||
|
" \"attributeLwm2m\": {}\n" +
|
||||||
|
" },\n" +
|
||||||
|
" \"bootstrap\": {\n" +
|
||||||
|
" \"servers\": {\n" +
|
||||||
|
" \"binding\": \"UQ\",\n" +
|
||||||
|
" \"shortId\": 123,\n" +
|
||||||
|
" \"lifetime\": 300,\n" +
|
||||||
|
" \"notifIfDisabled\": true,\n" +
|
||||||
|
" \"defaultMinPeriod\": 1\n" +
|
||||||
|
" },\n" +
|
||||||
|
" \"lwm2mServer\": {\n" +
|
||||||
|
" \"host\": \"localhost\",\n" +
|
||||||
|
" \"port\": 5686,\n" +
|
||||||
|
" \"serverId\": 123,\n" +
|
||||||
|
" \"serverPublicKey\": \"\",\n" +
|
||||||
|
" \"bootstrapServerIs\": false,\n" +
|
||||||
|
" \"clientHoldOffTime\": 1,\n" +
|
||||||
|
" \"bootstrapServerAccountTimeout\": 0\n" +
|
||||||
|
" },\n" +
|
||||||
|
" \"bootstrapServer\": {\n" +
|
||||||
|
" \"host\": \"localhost\",\n" +
|
||||||
|
" \"port\": 5687,\n" +
|
||||||
|
" \"serverId\": 111,\n" +
|
||||||
|
" \"securityMode\": \"NO_SEC\",\n" +
|
||||||
|
" \"serverPublicKey\": \"\",\n" +
|
||||||
|
" \"bootstrapServerIs\": true,\n" +
|
||||||
|
" \"clientHoldOffTime\": 1,\n" +
|
||||||
|
" \"bootstrapServerAccountTimeout\": 0\n" +
|
||||||
|
" }\n" +
|
||||||
|
" },\n" +
|
||||||
|
" \"clientLwM2mSettings\": {\n" +
|
||||||
|
" \"clientOnlyObserveAfterConnect\": 1\n" +
|
||||||
|
" }\n" +
|
||||||
|
"}";
|
||||||
|
|
||||||
|
|
||||||
|
private final int port = 5686;
|
||||||
|
private final NetworkConfig coapConfig = new NetworkConfig().setString("COAP_SECURE_PORT", Integer.toString(port));
|
||||||
|
private final String endpoint = "deviceAEndpoint";
|
||||||
|
private final String serverUri = "coaps://localhost:" + port;
|
||||||
|
|
||||||
|
@NotNull
|
||||||
|
private Device createDevice(String credentialsId, X509ClientCredentialsConfig credentialsConfig) throws Exception {
|
||||||
|
Device device = new Device();
|
||||||
|
device.setName("Device A");
|
||||||
|
device.setDeviceProfileId(deviceProfile.getId());
|
||||||
|
device.setTenantId(tenantId);
|
||||||
|
device = doPost("/api/device", device, Device.class);
|
||||||
|
Assert.assertNotNull(device);
|
||||||
|
|
||||||
|
DeviceCredentials deviceCredentials =
|
||||||
|
doGet("/api/device/" + device.getId().getId().toString() + "/credentials", DeviceCredentials.class);
|
||||||
|
Assert.assertEquals(device.getId(), deviceCredentials.getDeviceId());
|
||||||
|
deviceCredentials.setCredentialsType(DeviceCredentialsType.LWM2M_CREDENTIALS);
|
||||||
|
|
||||||
|
deviceCredentials.setCredentialsId(credentialsId);
|
||||||
|
|
||||||
|
LwM2MCredentials X509Credentials = new LwM2MCredentials();
|
||||||
|
|
||||||
|
X509Credentials.setClient(credentialsConfig);
|
||||||
|
|
||||||
|
deviceCredentials.setCredentialsValue(JacksonUtil.toString(X509Credentials));
|
||||||
|
doPost("/api/device/credentials", deviceCredentials).andExpect(status().isOk());
|
||||||
|
return device;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testConnectAndObserveTelemetry() throws Exception {
|
||||||
|
createDeviceProfile(TRANSPORT_CONFIGURATION);
|
||||||
|
|
||||||
|
Device device = createDevice(endpoint, new X509ClientCredentialsConfig(null, null));
|
||||||
|
|
||||||
|
SingleEntityFilter sef = new SingleEntityFilter();
|
||||||
|
sef.setSingleEntity(device.getId());
|
||||||
|
LatestValueCmd latestCmd = new LatestValueCmd();
|
||||||
|
latestCmd.setKeys(Collections.singletonList(new EntityKey(EntityKeyType.TIME_SERIES, "batteryLevel")));
|
||||||
|
EntityDataQuery edq = new EntityDataQuery(sef, new EntityDataPageLink(1, 0, null, null),
|
||||||
|
Collections.emptyList(), Collections.emptyList(), Collections.emptyList());
|
||||||
|
|
||||||
|
EntityDataCmd cmd = new EntityDataCmd(1, edq, null, latestCmd, null);
|
||||||
|
TelemetryPluginCmdsWrapper wrapper = new TelemetryPluginCmdsWrapper();
|
||||||
|
wrapper.setEntityDataCmds(Collections.singletonList(cmd));
|
||||||
|
|
||||||
|
wsClient.send(mapper.writeValueAsString(wrapper));
|
||||||
|
wsClient.waitForReply();
|
||||||
|
|
||||||
|
wsClient.registerWaitForUpdate();
|
||||||
|
LwM2MTestClient client = new LwM2MTestClient(executor, endpoint);
|
||||||
|
Security security = x509(serverUri, 123, clientX509Cert.getEncoded(), clientPrivateKeyFromCert.getEncoded(), serverX509Cert.getEncoded());
|
||||||
|
client.init(security, coapConfig);
|
||||||
|
String msg = wsClient.waitForUpdate();
|
||||||
|
|
||||||
|
EntityDataUpdate update = mapper.readValue(msg, EntityDataUpdate.class);
|
||||||
|
Assert.assertEquals(1, update.getCmdId());
|
||||||
|
List<EntityData> eData = update.getUpdate();
|
||||||
|
Assert.assertNotNull(eData);
|
||||||
|
Assert.assertEquals(1, eData.size());
|
||||||
|
Assert.assertEquals(device.getId(), eData.get(0).getEntityId());
|
||||||
|
Assert.assertNotNull(eData.get(0).getLatest().get(EntityKeyType.TIME_SERIES));
|
||||||
|
var tsValue = eData.get(0).getLatest().get(EntityKeyType.TIME_SERIES).get("batteryLevel");
|
||||||
|
Assert.assertEquals(42, Long.parseLong(tsValue.getValue()));
|
||||||
|
client.destroy();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testConnectWithCertAndObserveTelemetry() throws Exception {
|
||||||
|
createDeviceProfile(TRANSPORT_CONFIGURATION);
|
||||||
|
Device device = createDevice(null, new X509ClientCredentialsConfig(SslUtil.getCertificateString(clientX509CertNotTrusted), endpoint));
|
||||||
|
|
||||||
|
SingleEntityFilter sef = new SingleEntityFilter();
|
||||||
|
sef.setSingleEntity(device.getId());
|
||||||
|
LatestValueCmd latestCmd = new LatestValueCmd();
|
||||||
|
latestCmd.setKeys(Collections.singletonList(new EntityKey(EntityKeyType.TIME_SERIES, "batteryLevel")));
|
||||||
|
EntityDataQuery edq = new EntityDataQuery(sef, new EntityDataPageLink(1, 0, null, null),
|
||||||
|
Collections.emptyList(), Collections.emptyList(), Collections.emptyList());
|
||||||
|
|
||||||
|
EntityDataCmd cmd = new EntityDataCmd(1, edq, null, latestCmd, null);
|
||||||
|
TelemetryPluginCmdsWrapper wrapper = new TelemetryPluginCmdsWrapper();
|
||||||
|
wrapper.setEntityDataCmds(Collections.singletonList(cmd));
|
||||||
|
|
||||||
|
wsClient.send(mapper.writeValueAsString(wrapper));
|
||||||
|
wsClient.waitForReply();
|
||||||
|
|
||||||
|
wsClient.registerWaitForUpdate();
|
||||||
|
LwM2MTestClient client = new LwM2MTestClient(executor, endpoint);
|
||||||
|
|
||||||
|
Security security = x509(serverUri, 123, clientX509CertNotTrusted.getEncoded(), clientPrivateKeyFromCert.getEncoded(), serverX509Cert.getEncoded());
|
||||||
|
|
||||||
|
client.init(security, coapConfig);
|
||||||
|
String msg = wsClient.waitForUpdate();
|
||||||
|
|
||||||
|
EntityDataUpdate update = mapper.readValue(msg, EntityDataUpdate.class);
|
||||||
|
Assert.assertEquals(1, update.getCmdId());
|
||||||
|
List<EntityData> eData = update.getUpdate();
|
||||||
|
Assert.assertNotNull(eData);
|
||||||
|
Assert.assertEquals(1, eData.size());
|
||||||
|
Assert.assertEquals(device.getId(), eData.get(0).getEntityId());
|
||||||
|
Assert.assertNotNull(eData.get(0).getLatest().get(EntityKeyType.TIME_SERIES));
|
||||||
|
var tsValue = eData.get(0).getLatest().get(EntityKeyType.TIME_SERIES).get("batteryLevel");
|
||||||
|
Assert.assertEquals(42, Long.parseLong(tsValue.getValue()));
|
||||||
|
client.destroy();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@ -32,6 +32,7 @@ import org.eclipse.californium.scandium.dtls.SessionAdapter;
|
|||||||
import org.eclipse.leshan.client.californium.LeshanClient;
|
import org.eclipse.leshan.client.californium.LeshanClient;
|
||||||
import org.eclipse.leshan.client.californium.LeshanClientBuilder;
|
import org.eclipse.leshan.client.californium.LeshanClientBuilder;
|
||||||
import org.eclipse.leshan.client.engine.DefaultRegistrationEngineFactory;
|
import org.eclipse.leshan.client.engine.DefaultRegistrationEngineFactory;
|
||||||
|
import org.eclipse.leshan.client.object.Security;
|
||||||
import org.eclipse.leshan.client.object.Server;
|
import org.eclipse.leshan.client.object.Server;
|
||||||
import org.eclipse.leshan.client.observer.LwM2mClientObserver;
|
import org.eclipse.leshan.client.observer.LwM2mClientObserver;
|
||||||
import org.eclipse.leshan.client.resource.ObjectsInitializer;
|
import org.eclipse.leshan.client.resource.ObjectsInitializer;
|
||||||
@ -54,7 +55,6 @@ import java.util.ArrayList;
|
|||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.concurrent.ScheduledExecutorService;
|
import java.util.concurrent.ScheduledExecutorService;
|
||||||
|
|
||||||
import static org.eclipse.leshan.client.object.Security.noSec;
|
|
||||||
import static org.eclipse.leshan.core.LwM2mId.DEVICE;
|
import static org.eclipse.leshan.core.LwM2mId.DEVICE;
|
||||||
import static org.eclipse.leshan.core.LwM2mId.SECURITY;
|
import static org.eclipse.leshan.core.LwM2mId.SECURITY;
|
||||||
import static org.eclipse.leshan.core.LwM2mId.SERVER;
|
import static org.eclipse.leshan.core.LwM2mId.SERVER;
|
||||||
@ -67,7 +67,7 @@ public class LwM2MTestClient {
|
|||||||
private final String endpoint;
|
private final String endpoint;
|
||||||
private LeshanClient client;
|
private LeshanClient client;
|
||||||
|
|
||||||
public void init() {
|
public void init(Security security, NetworkConfig coapConfig) {
|
||||||
String[] resources = new String[]{"0.xml", "1.xml", "2.xml", "3.xml"};
|
String[] resources = new String[]{"0.xml", "1.xml", "2.xml", "3.xml"};
|
||||||
List<ObjectModel> models = new ArrayList<>();
|
List<ObjectModel> models = new ArrayList<>();
|
||||||
for (String resourceName : resources) {
|
for (String resourceName : resources) {
|
||||||
@ -75,13 +75,10 @@ public class LwM2MTestClient {
|
|||||||
}
|
}
|
||||||
LwM2mModel model = new StaticModel(models);
|
LwM2mModel model = new StaticModel(models);
|
||||||
ObjectsInitializer initializer = new ObjectsInitializer(model);
|
ObjectsInitializer initializer = new ObjectsInitializer(model);
|
||||||
initializer.setInstancesForObject(SECURITY, noSec("coap://localhost:5685", 123));
|
initializer.setInstancesForObject(SECURITY, security);
|
||||||
initializer.setInstancesForObject(SERVER, new Server(123, 300, BindingMode.U, false));
|
initializer.setInstancesForObject(SERVER, new Server(123, 300, BindingMode.U, false));
|
||||||
initializer.setInstancesForObject(DEVICE, new SimpleLwM2MDevice());
|
initializer.setInstancesForObject(DEVICE, new SimpleLwM2MDevice());
|
||||||
|
|
||||||
NetworkConfig coapConfig = new NetworkConfig();
|
|
||||||
coapConfig.setString("COAP_PORT", Integer.toString(5685));
|
|
||||||
|
|
||||||
DtlsConnectorConfig.Builder dtlsConfig = new DtlsConnectorConfig.Builder();
|
DtlsConnectorConfig.Builder dtlsConfig = new DtlsConnectorConfig.Builder();
|
||||||
dtlsConfig.setRecommendedCipherSuitesOnly(true);
|
dtlsConfig.setRecommendedCipherSuitesOnly(true);
|
||||||
|
|
||||||
@ -256,7 +253,7 @@ public class LwM2MTestClient {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public void destroy() {
|
public void destroy() {
|
||||||
client.stop(false);
|
client.destroy(true);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -0,0 +1,2 @@
|
|||||||
|
transport.lwm2m.security.key_store=lwm2m/credentials/serverKeyStore.jks
|
||||||
|
transport.lwm2m.security.key_store_password=server
|
||||||
Binary file not shown.
Binary file not shown.
@ -43,7 +43,7 @@ public class TbLwM2MAuthorizer implements Authorizer {
|
|||||||
if (senderIdentity.isX509()) {
|
if (senderIdentity.isX509()) {
|
||||||
TbX509DtlsSessionInfo sessionInfo = sessionStorage.get(registration.getEndpoint());
|
TbX509DtlsSessionInfo sessionInfo = sessionStorage.get(registration.getEndpoint());
|
||||||
if (sessionInfo != null) {
|
if (sessionInfo != null) {
|
||||||
if (senderIdentity.getX509CommonName().equals(sessionInfo.getX509CommonName())) {
|
if (sessionInfo.getX509CommonName().endsWith(senderIdentity.getX509CommonName())) {
|
||||||
clientContext.registerClient(registration, sessionInfo.getCredentials());
|
clientContext.registerClient(registration, sessionInfo.getCredentials());
|
||||||
// X509 certificate is valid and matches endpoint.
|
// X509 certificate is valid and matches endpoint.
|
||||||
return registration;
|
return registration;
|
||||||
|
|||||||
@ -15,14 +15,17 @@
|
|||||||
*/
|
*/
|
||||||
package org.thingsboard.server.transport.lwm2m.secure.credentials;
|
package org.thingsboard.server.transport.lwm2m.secure.credentials;
|
||||||
|
|
||||||
|
import lombok.AllArgsConstructor;
|
||||||
import lombok.Data;
|
import lombok.Data;
|
||||||
|
import lombok.NoArgsConstructor;
|
||||||
import org.eclipse.leshan.core.SecurityMode;
|
import org.eclipse.leshan.core.SecurityMode;
|
||||||
|
|
||||||
import static org.eclipse.leshan.core.SecurityMode.X509;
|
import static org.eclipse.leshan.core.SecurityMode.X509;
|
||||||
|
|
||||||
@Data
|
@Data
|
||||||
|
@NoArgsConstructor
|
||||||
|
@AllArgsConstructor
|
||||||
public class X509ClientCredentialsConfig implements LwM2MClientCredentialsConfig {
|
public class X509ClientCredentialsConfig implements LwM2MClientCredentialsConfig {
|
||||||
private boolean allowTrustedOnly;
|
|
||||||
private String cert;
|
private String cert;
|
||||||
private String endpoint;
|
private String endpoint;
|
||||||
|
|
||||||
|
|||||||
@ -63,6 +63,7 @@ import org.thingsboard.server.transport.lwm2m.server.client.LwM2mClientProfile;
|
|||||||
import org.thingsboard.server.transport.lwm2m.server.client.Lwm2mClientRpcRequest;
|
import org.thingsboard.server.transport.lwm2m.server.client.Lwm2mClientRpcRequest;
|
||||||
import org.thingsboard.server.transport.lwm2m.server.client.ResultsAddKeyValueProto;
|
import org.thingsboard.server.transport.lwm2m.server.client.ResultsAddKeyValueProto;
|
||||||
import org.thingsboard.server.transport.lwm2m.server.client.ResultsAnalyzerParameters;
|
import org.thingsboard.server.transport.lwm2m.server.client.ResultsAnalyzerParameters;
|
||||||
|
import org.thingsboard.server.transport.lwm2m.server.store.TbLwM2MDtlsSessionStore;
|
||||||
import org.thingsboard.server.transport.lwm2m.utils.LwM2mValueConverterImpl;
|
import org.thingsboard.server.transport.lwm2m.utils.LwM2mValueConverterImpl;
|
||||||
|
|
||||||
import javax.annotation.PostConstruct;
|
import javax.annotation.PostConstruct;
|
||||||
@ -129,12 +130,13 @@ public class DefaultLwM2MTransportMsgHandler implements LwM2mTransportMsgHandler
|
|||||||
private final LwM2MJsonAdaptor adaptor;
|
private final LwM2MJsonAdaptor adaptor;
|
||||||
private final LwM2mClientContext clientContext;
|
private final LwM2mClientContext clientContext;
|
||||||
private final LwM2mTransportRequest lwM2mTransportRequest;
|
private final LwM2mTransportRequest lwM2mTransportRequest;
|
||||||
|
private final TbLwM2MDtlsSessionStore sessionStore;
|
||||||
|
|
||||||
public DefaultLwM2MTransportMsgHandler(TransportService transportService, LwM2MTransportServerConfig config, LwM2mTransportServerHelper helper,
|
public DefaultLwM2MTransportMsgHandler(TransportService transportService, LwM2MTransportServerConfig config, LwM2mTransportServerHelper helper,
|
||||||
LwM2mClientContext clientContext,
|
LwM2mClientContext clientContext,
|
||||||
@Lazy LwM2mTransportRequest lwM2mTransportRequest,
|
@Lazy LwM2mTransportRequest lwM2mTransportRequest,
|
||||||
FirmwareDataCache firmwareDataCache,
|
FirmwareDataCache firmwareDataCache,
|
||||||
LwM2mTransportContext context, LwM2MJsonAdaptor adaptor) {
|
LwM2mTransportContext context, LwM2MJsonAdaptor adaptor, TbLwM2MDtlsSessionStore sessionStore) {
|
||||||
this.transportService = transportService;
|
this.transportService = transportService;
|
||||||
this.config = config;
|
this.config = config;
|
||||||
this.helper = helper;
|
this.helper = helper;
|
||||||
@ -143,6 +145,7 @@ public class DefaultLwM2MTransportMsgHandler implements LwM2mTransportMsgHandler
|
|||||||
this.firmwareDataCache = firmwareDataCache;
|
this.firmwareDataCache = firmwareDataCache;
|
||||||
this.context = context;
|
this.context = context;
|
||||||
this.adaptor = adaptor;
|
this.adaptor = adaptor;
|
||||||
|
this.sessionStore = sessionStore;
|
||||||
}
|
}
|
||||||
|
|
||||||
@PostConstruct
|
@PostConstruct
|
||||||
@ -243,6 +246,7 @@ public class DefaultLwM2MTransportMsgHandler implements LwM2mTransportMsgHandler
|
|||||||
SessionInfoProto sessionInfo = this.getSessionInfoOrCloseSession(registration);
|
SessionInfoProto sessionInfo = this.getSessionInfoOrCloseSession(registration);
|
||||||
if (sessionInfo != null) {
|
if (sessionInfo != null) {
|
||||||
transportService.deregisterSession(sessionInfo);
|
transportService.deregisterSession(sessionInfo);
|
||||||
|
sessionStore.remove(registration.getEndpoint());
|
||||||
this.doCloseSession(sessionInfo);
|
this.doCloseSession(sessionInfo);
|
||||||
clientContext.removeClientByRegistrationId(registration.getId());
|
clientContext.removeClientByRegistrationId(registration.getId());
|
||||||
log.info("Client close session: [{}] unReg [{}] name [{}] profile ", registration.getId(), registration.getEndpoint(), sessionInfo.getDeviceType());
|
log.info("Client close session: [{}] unReg [{}] name [{}] profile ", registration.getId(), registration.getEndpoint(), sessionInfo.getDeviceType());
|
||||||
|
|||||||
@ -141,6 +141,7 @@ public class LwM2mClientContextImpl implements LwM2mClientContext {
|
|||||||
LwM2mClient client = new LwM2mClient(context.getNodeId(), registration.getEndpoint(), null, null, credentials, credentials.getDeviceProfile().getUuidId(), UUID.randomUUID());
|
LwM2mClient client = new LwM2mClient(context.getNodeId(), registration.getEndpoint(), null, null, credentials, credentials.getDeviceProfile().getUuidId(), UUID.randomUUID());
|
||||||
lwM2mClientsByEndpoint.put(registration.getEndpoint(), client);
|
lwM2mClientsByEndpoint.put(registration.getEndpoint(), client);
|
||||||
lwM2mClientsByRegistrationId.put(registration.getId(), client);
|
lwM2mClientsByRegistrationId.put(registration.getId(), client);
|
||||||
|
toClientProfile(credentials.getDeviceProfile());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|||||||
@ -36,4 +36,9 @@ public class TbL2M2MDtlsSessionInMemoryStore implements TbLwM2MDtlsSessionStore
|
|||||||
public TbX509DtlsSessionInfo get(String endpoint) {
|
public TbX509DtlsSessionInfo get(String endpoint) {
|
||||||
return store.get(endpoint);
|
return store.get(endpoint);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void remove(String endpoint) {
|
||||||
|
store.remove(endpoint);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -24,6 +24,9 @@ public interface TbLwM2MDtlsSessionStore {
|
|||||||
|
|
||||||
TbX509DtlsSessionInfo get(String endpoint);
|
TbX509DtlsSessionInfo get(String endpoint);
|
||||||
|
|
||||||
|
|
||||||
|
void remove(String endpoint);
|
||||||
|
|
||||||
//TODO: add way to delete the session by endpoint.
|
//TODO: add way to delete the session by endpoint.
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -16,6 +16,8 @@
|
|||||||
package org.thingsboard.server.dao.device;
|
package org.thingsboard.server.dao.device;
|
||||||
|
|
||||||
|
|
||||||
|
import com.fasterxml.jackson.databind.JsonNode;
|
||||||
|
import com.fasterxml.jackson.databind.node.ObjectNode;
|
||||||
import lombok.extern.slf4j.Slf4j;
|
import lombok.extern.slf4j.Slf4j;
|
||||||
import org.hibernate.exception.ConstraintViolationException;
|
import org.hibernate.exception.ConstraintViolationException;
|
||||||
import org.springframework.beans.factory.annotation.Autowired;
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
@ -23,6 +25,7 @@ import org.springframework.cache.annotation.CacheEvict;
|
|||||||
import org.springframework.cache.annotation.Cacheable;
|
import org.springframework.cache.annotation.Cacheable;
|
||||||
import org.springframework.stereotype.Service;
|
import org.springframework.stereotype.Service;
|
||||||
import org.springframework.util.StringUtils;
|
import org.springframework.util.StringUtils;
|
||||||
|
import org.thingsboard.common.util.JacksonUtil;
|
||||||
import org.thingsboard.server.common.data.Device;
|
import org.thingsboard.server.common.data.Device;
|
||||||
import org.thingsboard.server.common.data.device.credentials.BasicMqttCredentials;
|
import org.thingsboard.server.common.data.device.credentials.BasicMqttCredentials;
|
||||||
import org.thingsboard.server.common.data.id.DeviceId;
|
import org.thingsboard.server.common.data.id.DeviceId;
|
||||||
@ -33,7 +36,6 @@ import org.thingsboard.server.common.msg.EncryptionUtil;
|
|||||||
import org.thingsboard.server.dao.entity.AbstractEntityService;
|
import org.thingsboard.server.dao.entity.AbstractEntityService;
|
||||||
import org.thingsboard.server.dao.exception.DataValidationException;
|
import org.thingsboard.server.dao.exception.DataValidationException;
|
||||||
import org.thingsboard.server.dao.service.DataValidator;
|
import org.thingsboard.server.dao.service.DataValidator;
|
||||||
import org.thingsboard.common.util.JacksonUtil;
|
|
||||||
|
|
||||||
import static org.thingsboard.server.common.data.CacheConstants.DEVICE_CREDENTIALS_CACHE;
|
import static org.thingsboard.server.common.data.CacheConstants.DEVICE_CREDENTIALS_CACHE;
|
||||||
import static org.thingsboard.server.dao.service.Validator.validateId;
|
import static org.thingsboard.server.dao.service.Validator.validateId;
|
||||||
@ -140,7 +142,18 @@ public class DeviceCredentialsServiceImpl extends AbstractEntityService implemen
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void formatSimpleLwm2mCredentials(DeviceCredentials deviceCredentials) {
|
private void formatSimpleLwm2mCredentials(DeviceCredentials deviceCredentials) {
|
||||||
|
ObjectNode json = JacksonUtil.fromString(deviceCredentials.getCredentialsValue(), ObjectNode.class);
|
||||||
|
JsonNode client = json.get("client");
|
||||||
|
if (client != null && client.get("securityConfigClientMode").asText().equals("X509") && client.has("cert")) {
|
||||||
|
JsonNode certJson = client.get("cert");
|
||||||
|
if (!certJson.isNull()) {
|
||||||
|
String cert = EncryptionUtil.trimNewLines(certJson.asText());
|
||||||
|
String sha3Hash = EncryptionUtil.getSha3Hash(cert);
|
||||||
|
deviceCredentials.setCredentialsId(sha3Hash);
|
||||||
|
((ObjectNode) client).put("cert", cert);
|
||||||
|
deviceCredentials.setCredentialsValue(JacksonUtil.toString(json));
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user