You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We had a discussion that adapter lorawan modifies / creates / deletes custom configuration of mqtt-client instance.
lorawan creates mqtt-client custom config at states bypassing the jsonCustom.json configuration and uses attributes evaluated ("grabbed") at time x. This for sure will miss future changes.
I suggest to evaluate whether we should block the possibility that any other adapter than admin (which is definitly using the adapter's jsonConfig.json config) and the "owing" adapter (mqtt-client at this example) is allowed to write to the custom config data dor mqtt-cleint.x
Why?
Accessing data in a way not expected by the owning adapter and the kernel could lead to unexpected errors.