Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable secure mode by default #76

Closed
drbild opened this issue Feb 13, 2019 · 1 comment
Closed

Enable secure mode by default #76

drbild opened this issue Feb 13, 2019 · 1 comment

Comments

@drbild
Copy link
Contributor

drbild commented Feb 13, 2019

The last thing missing from a fully functioning firmware is enabling the wifi and xbridges service by default.

For the latter, we need to cherry-pick one commit from this PR - xaprw: enable secure-mode xbridge on boot

For the WiFi, we need to decide how to manage the credentials. I see two options.

  1. Merge the Xaptum-Guest wifi credentials into master, since most of our work happens in the office. I don't mind if that password appears in the private git repo history.

    For now, when provisioning a firmware for a customer, we'll need to change the default credentials to theirs and rebuild the firmware.

    Once Fej has the captive daemon ready, we can connect to the Xaptum wifi and then change the credentials via the control channel.

  2. Keep the credentials commit off of master on separate branch. When building a firmware, that commit needs to be cherry-picked (or rebased) onto the active branch.

@drbild
Copy link
Contributor Author

drbild commented Feb 15, 2019

Closed by #81

@drbild drbild closed this as completed Feb 15, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants