Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Custom Key/value pairs for targets #737

Closed
SebastianSchildt opened this issue Sep 5, 2018 · 3 comments
Closed

Custom Key/value pairs for targets #737

SebastianSchildt opened this issue Sep 5, 2018 · 3 comments
Milestone

Comments

@SebastianSchildt
Copy link

Hi,

We are using Hawkbit with a custom backend (an Appstore), and thus we have more data to manage regarding targets then Hawkbit needs by itself. Where possible, we would like to prevent having some "shadow database" mirroring and synchronising with Hawkbits state, but instead put relevant information into Hawkbit, so we have only one central repository of information.

To that end it would be tremendously helpful, if Targets in Hawkbit could be extended with arbitrary custom key/value pairs.

We found an 80% solution with the PUT /{tenant}/controller/v1/{controllerid}/configDatacall in the DDI API, however these fields are under control of the device. What we need (and I guess would be useful for lots of other applications as well), is a similar mehtod, but where the fields are under control of the backend (and can not be changed by the target itself)

@fayvaz @rai20 @laverman I think this would make our KUKSA appstore architecture cleaner and more secure

@sbabic
Copy link

sbabic commented Sep 7, 2018 via email

@SebastianSchildt
Copy link
Author

Hello Stefano,

yes, I understand the feature makes sense as it is now. To be clear: I did not propose to change the behavior as it is now, but rather complement it with something similar, which is not under the control of the device itself.

This may either be a completely different set auf attributes/annotations that is not even visible on the DDI interface, or as you suggested some masking/flagging of "device-readonly" in the existing attributes. However, on a first look it seems more complicated because at the moment attributes are free, if I see it correctly: The device can report whatever it wants. If there would be some access limitations, where do they need to come from, and does it mean all "allowed" attributes for a device must be provisioned somewhere? What would happen if a device tries to add an attributes where the mask/access rights are not defined? That would not be very transparent on the device side.

@sbabic
Copy link

sbabic commented Sep 13, 2018 via email

@schabdo schabdo added this to the 0.2.5 milestone Nov 28, 2018
@schabdo schabdo closed this as completed Nov 28, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants