Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[QUESTION] Documentation confusion about embedded AWS cert/key files (CA-350) #234

Open
3 tasks done
gamename opened this issue Nov 24, 2024 · 1 comment
Open
3 tasks done

Comments

@gamename
Copy link

Checklist

  • Checked the issue tracker for similar issues to ensure this is not a duplicate.
  • Provided a clear description of your suggestion.
  • Included any relevant context or examples.

Issue or Suggestion Description

The documentation here clearly says:

There is currently only one option for how to load the key & cert.

Embed the files into the app binary (default)

However, in fleet provisioning here, the directory spiffs_image/certs implies the certs can be external to the app and stored in NVS.

Which is correct? It would certainly be useful if we could store AWS IoT certs/keys in NVS and avoid directly embedding them in the binaries.

Thanks,
-T

@github-actions github-actions bot changed the title [QUESTION] Documentation confusion about embedded AWS cert/key files [QUESTION] Documentation confusion about embedded AWS cert/key files (CA-350) Nov 24, 2024
@avsheth
Copy link
Collaborator

avsheth commented Dec 4, 2024

Hi @gamename
Thanks for pointing out the discrepancy in the documentation. We will fix that.
Examples do support another mean to provide certificates and key, as done in mqtt tls_mutual_auth example here.

Although examples only showcases couple of ways to read certificates and key, one can always use NVS or other partitions or SPIFFS to read the certificate into RAM and pass it off to mbedTLS.

Hope this helps.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants