From f08283277999ac6479d95216533e6118b37a7111 Mon Sep 17 00:00:00 2001 From: chrysn Date: Tue, 25 Feb 2025 23:32:08 +0100 Subject: [PATCH] docs(book/coap): document coap-server-config-storage policy group --- book/src/tooling/coap.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/book/src/tooling/coap.md b/book/src/tooling/coap.md index 25cc45f36..c948dda50 100644 --- a/book/src/tooling/coap.md +++ b/book/src/tooling/coap.md @@ -106,6 +106,10 @@ Examples of described policy entries are: In Ariel OS, the policies are selected through [laze modules][laze-modules-book]: * `coap-server-config-demokeys` selects a set of hard-coded identities and policies usable for examples. * `coap-server-config-unprotected` allows access from any client without any authentication or integrity protection. +* `coap-server-config-storage` reads configuration of the application, currently in a `peers.yml` file ([example](https://github.com/ariel-os/ariel-os/blob/main/tests/coap/peers.yml)). + CoAP clients described in there are assigned permissions as described there; the file format is currently only documented in the example file, and still in flux. + The device generates an EDHOC key at first startup, [stores it locally](../storage.md), and reports its public credential at startup. + The list of supported policies is being extended.