-
Notifications
You must be signed in to change notification settings - Fork 179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Network Connectivity: Add key management interface #2253
Labels
Milestone
Comments
sfoster1
added a commit
that referenced
this issue
Sep 12, 2018
/wifi/keys allows GET to list and POST to add a new keyfile (of arbitrary type and size). These are hashed and stored in /data/user_storage/opentrons_data/network_keys in individual folders by sha256 hash of the contents. This hash is used as a URI for later deletion of the keys, or specification in /wifi/configure eapol options that require key files. Closes #2253
sfoster1
added a commit
that referenced
this issue
Sep 13, 2018
/wifi/keys allows GET to list and POST to add a new keyfile (of arbitrary type and size). These are hashed and stored in /data/user_storage/opentrons_data/network_keys in individual folders by sha256 hash of the contents. This hash is used as a URI for later deletion of the keys, or specification in /wifi/configure eapol options that require key files. Closes #2253
sfoster1
added a commit
that referenced
this issue
Sep 13, 2018
/wifi/keys allows GET to list and POST to add a new keyfile (of arbitrary type and size). These are hashed and stored in /data/user_storage/opentrons_data/network_keys in individual folders by sha256 hash of the contents. This hash is used as a URI for later deletion of the keys, or specification in /wifi/configure eapol options that require key files. Closes #2253
sfoster1
added a commit
that referenced
this issue
Sep 13, 2018
/wifi/keys allows GET to list and POST to add a new keyfile (of arbitrary type and size). These are hashed and stored in /data/user_storage/opentrons_data/network_keys in individual folders by sha256 hash of the contents. This hash is used as a URI for later deletion of the keys, or specification in /wifi/configure eapol options that require key files. Closes #2253
sfoster1
added a commit
that referenced
this issue
Sep 13, 2018
/wifi/keys allows GET to list and POST to add a new keyfile (of arbitrary type and size). These are hashed and stored in /data/user_storage/opentrons_data/network_keys in individual folders by sha256 hash of the contents. This hash is used as a URI for later deletion of the keys, or specification in /wifi/configure eapol options that require key files. Closes #2253
sfoster1
added a commit
that referenced
this issue
Sep 13, 2018
/wifi/keys allows GET to list and POST to add a new keyfile (of arbitrary type and size). These are hashed and stored in /data/user_storage/opentrons_data/network_keys in individual folders by sha256 hash of the contents. This hash is used as a URI for later deletion of the keys, or specification in /wifi/configure eapol options that require key files. Closes #2253
sfoster1
added a commit
that referenced
this issue
Sep 14, 2018
) * feat(api): Add wifi key upload endpoints * refactor(api): Add types to nmcli /wifi/keys allows GET to list and POST to add a new keyfile (of arbitrary type and size). These are hashed and stored in /data/user_storage/opentrons_data/network_keys in individual folders by sha256 hash of the contents. This hash is used as a URI for later deletion of the keys, or specification in /wifi/configure eapol options that require key files. In addition, the nmcli and wifi endpoint modules are now fully typed. Closes #2253
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Some kinds of EAP-secured networks require key files for connecting. These can be private keys or certificates to validate the server against. They can be reasonably large so we should have a separate API interface for managing them.
The text was updated successfully, but these errors were encountered: