This means that ros2 daemon is now enabled and bound with security enclaves.
After daemon is spawned, other unsecure users can see the connectivity and endpoints in the secured network since it can query those data via XMLRPC to the ros2 daemon process.
Bug report
Required Info:
Steps to reproduce issue
This means that
ros2 daemon
is now enabled and bound with security enclaves. After daemon is spawned, other unsecure users can see the connectivity and endpoints in the secured network since it can query those data via XMLRPC to the ros2 daemon process.Expected behavior
This is what i would like to discuss on this issue. Maybe
ros2 daemon
should not inherit the security information silently?Actual behavior
ros2 daemon
inherits the security enclaves silently, possibly expose the secured network.Additional information
Related issue: https://github.com/ros2/sros2/issues/306