Skip to content

Conversation

@martfra
Copy link
Contributor

@martfra martfra commented Jul 31, 2025

This PR introduces a new boolean client.tls.server_cert_auth ROS parameter (true by default) to optionally disable verification of the server certificate. This is helpful in case the MQTT broker uses a self-signed certificate, which cannot be verified at the client side. The implementation uses the set_enable_server_cert_auth method of the Eclipse Paho MQTT C++ Client Library (see also code on GitHub). Closes #86.

@lreiher lreiher requested a review from Copilot August 4, 2025 09:17
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds a new ROS parameter to optionally disable server certificate verification for MQTT connections with self-signed certificates. The change allows users to bypass SSL certificate validation when connecting to MQTT brokers that use self-signed certificates.

  • Introduces client.tls.server_cert_auth parameter (defaults to true) to control server certificate verification
  • Updates configuration structure and client setup to use the new parameter
  • Documents the new parameter in README with default value

Reviewed Changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 1 comment.

File Description
mqtt_client/src/MqttClient.cpp Adds parameter declaration, loading logic, and SSL configuration setup
mqtt_client/include/mqtt_client/MqttClient.hpp Extends TLS configuration structure with server_cert_auth field
README.md Documents the new server_cert_auth parameter with default value

@lreiher lreiher merged commit 8d81fce into ika-rwth-aachen:main Aug 8, 2025
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Feature Request: Disable Verification of the Server Certificate

2 participants