Skip to content

Commit

Permalink
update readme + secret
Browse files Browse the repository at this point in the history
  • Loading branch information
led0nk committed Feb 18, 2025
1 parent 5da3d5c commit 9fd0eef
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 20 deletions.
1 change: 1 addition & 0 deletions .github/workflows/opcua-plc.yml
Original file line number Diff line number Diff line change
Expand Up @@ -157,6 +157,7 @@ jobs:
if tcping -c 4 -T 1s "$ENDPOINT" | grep -qi "Connected"; then
echo "available=true" >> "$GITHUB_OUTPUT"
echo "TEST_KEPWARE_ENDPOINT=${{ secrets.TEST_KEPWARE_ENDPOINT }}" >> "$GITHUB_ENV"
echo "TEST_KEPWARE_FINGERPRINT=${{ secrets.TEST_KEPWARE_FINGERPRINT }}" >> "$GITHUB_ENV"
echo "using kepware for testing"
else
echo "available=false" >> "$GITHUB_OUTPUT"
Expand Down
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -200,6 +200,7 @@ OPC UA supports various security modes and security policies. These options defi
- **Description**: A Base64‐encoded PEM bundle (certificate + private key).
- When using encryption (`Sign` or `SignAndEncrypt`), the client must present a certificate to the server. If you **do not** provide one, the system **auto‐generates** a random certificate at startup.
- The auto‐generated certificate is logged in Base64 so you can copy/paste it into your configuration. This allows the server to trust the same client certificate across restarts instead of generating a new one each time.
- Whenever a certificate is created, and the OPC UA server's settings do not allow automatic acceptance of client certificates, you will need to manually trust the client certificate in the server's settings. The client's name will be displayed, enabling you to uniquely identify it in the certificate list.


If you want to connect with security options, you will at least have to provide the following sample:
Expand Down
Loading

0 comments on commit 9fd0eef

Please sign in to comment.