-
-
Notifications
You must be signed in to change notification settings - Fork 82
Add dynamic encryption key #1151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #1151 +/- ##
=========================================
Coverage 100.00% 100.00%
=========================================
Files 19 19
Lines 2783 2789 +6
=========================================
+ Hits 2783 2789 +6 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
CodSpeed Performance ReportMerging #1151 will not alter performanceComparing Summary
|
|
Can we merge this now? |
|
I am working on this today to get the actual python code implemented |
WalkthroughThe changes introduce support for a new noise encryption key management feature in the API. This involves extending the protobuf API definition to add a new RPC method for setting a noise encryption key, along with corresponding request and response message types. The client library is updated to provide an asynchronous method for invoking this RPC. The protocol core is updated to recognize the new message types. The API model layer adds dataclasses for the new request and response types. Tests are added and updated to cover the new client method and model-to-protobuf conversions. Changes
Sequence Diagram(s)sequenceDiagram
participant Client
participant APIClient
participant Device
Client->>APIClient: noise_encryption_set_key(key)
APIClient->>Device: NoiseEncryptionSetKeyRequest(key)
Device-->>APIClient: NoiseEncryptionSetKeyResponse(success)
APIClient-->>Client: Return success
📜 Recent review detailsConfiguration used: CodeRabbit UI 📒 Files selected for processing (6)
🧰 Additional context used📓 Path-based instructions (1)`**`: - Do not generate or add any sequence diagrams
🧬 Code Graph Analysis (3)aioesphomeapi/core.py (1)
tests/test_model.py (1)
aioesphomeapi/client.py (3)
⏰ Context from checks skipped due to timeout of 90000ms (1)
🔇 Additional comments (14)
✨ Finishing Touches
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
What does this implement/fix?
Draft to reserve proto IDs
This change allows a plaintext API client to generate and send a desired encryption key that the device should use from now. All clients will be gracefully disconnected once the device saves the key and will need to reconnect with the new key.
Related PRs:
Types of changes
Related issue or feature (if applicable):
Pull request in esphome (if applicable):
Checklist:
tests/folder).