• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

Alan-Jowett / sonde / 23861000511
82%

Build:
DEFAULT BRANCH: main
Ran 01 Apr 2026 05:14PM UTC
Jobs 1
Files 85
Run time 1min
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

01 Apr 2026 05:08PM UTC coverage: 85.489% (+0.5%) from 85.024%
23861000511

push

github

web-flow
fix: phone builds complete PEER_REQUEST frame, node just relays (#495) (#615)

* fix: phone builds complete PEER_REQUEST frame, node just relays (#495)

The phone (pairing tool) builds the entire ESP-NOW PEER_REQUEST frame
including header, AES-256-GCM ciphertext, and tag — encrypted with
phone_psk. The node stores and forwards this blob verbatim.

Fixes:
- ble-pairing-protocol.md: node doesn't need \phone_psk\
- sonde-pair: \ncrypt_pairing_request_aead\ builds complete frame
- sonde-node: PEER_REQUEST just transmits stored blob
- sonde-gateway: \process_frame_aead\ accepts PEER_REQUEST

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

* Address review findings: AEAD validation, shared PairingRequest parser, PSK zeroization

- uild_peer_request_frame_aead: validate with decode_frame_aead and
  check msg_type == MSG_PEER_REQUEST instead of length-only checks
- peer_request_exchange_aead: use decoded header nonce instead of manual
  byte-offset slicing
- Extract shared parse_pairing_request() helper used by both HMAC and
  AEAD handle_peer_request paths to prevent drift
- Keep reference to matched PhonePskRecord in AEAD handler instead of
  copying PSK out of \Zeroizing\ wrapper into plain \[u8; 32]\
- Fix double \set_early_wake_flag()\ call — call once and log errors
- Add happy-path AEAD PEER_REQUEST integration test that registers a
  phone PSK, constructs a properly nested encrypted frame, and verifies
  the gateway returns a PEER_ACK decryptable with \
ode_psk\
- Add test for wrong \msg_type\ rejection in \uild_peer_request_frame_aead\

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

* fix: remove unused Sha256Provider import in aead_engine test

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

* Validate key_hint derived from PSK in both HMAC and AEAD pairing paths

HMAC path: verify that
ode_key_hint from the CBOR payload AND the
frame header both match the canonical derivation fr... (continued)

346 of 370 new or added lines in 4 files covered. (93.51%)

181 existing lines in 6 files now uncovered.

26912 of 31480 relevant lines covered (85.49%)

136.09 hits per line

Uncovered Changes

Lines Coverage ∆ File
21
89.86
-1.2% crates/sonde-gateway/src/engine.rs
2
94.74
-2.0% crates/sonde-node/src/wake_cycle.rs
1
99.22
0.06% crates/sonde-pair/src/crypto.rs

Coverage Regressions

Lines Coverage ∆ File
121
94.74
-2.0% crates/sonde-node/src/wake_cycle.rs
35
95.1
-1.94% crates/sonde-pair/src/phase1.rs
16
89.86
-1.2% crates/sonde-gateway/src/engine.rs
6
89.71
4.68% crates/sonde-node/src/peer_request.rs
2
86.7
1.41% crates/sonde-e2e/src/harness.rs
1
0.0
0.0% crates/sonde-protocol/src/error.rs
Jobs
ID Job ID Ran Files Coverage
1 23861000511.1 01 Apr 2026 05:14PM UTC 85
85.49
GitHub Action Run
Source Files on build 23861000511
  • Tree
  • List 85
  • Changed 7
  • Source Changed 4
  • Coverage Changed 7
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Repo
  • Github Actions Build #23861000511
  • d8c9852f on github
  • Prev Build on main (#23828687502)
  • Next Build on main (#23875279758)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc