Skip to content

Conversation

@chrizap
Copy link
Contributor

@chrizap chrizap commented Nov 27, 2025

provided

Signed-off-by: Christofer Gilje Skjæveland christofer.skjaeveland@zaptec.com

Describe your changes

This change ensures that URLs without an explicit scheme are handled correctly for security profiles 2 and 3.

Previously, when a URL like test.uri.com/path/ was provided under security profile 2, it would incorrectly resolve to wss://test.uri.com:80/path/cp0001. With this fix, it now falls back to the correct default secure port, resulting in wss://test.uri.com:443/path/cp0001.

Issue ticket number and link

Checklist before requesting a review

  • I have performed a self-review of my code
  • I have made corresponding changes to the documentation
  • If OCPP 2.0.1 or OCPP2.1: I have updated the OCPP 2.x status document
  • I read the contribution documentation and made sure that my changes meet its requirements

provided

Signed-off-by: Christofer Gilje Skjæveland <christofer.skjaeveland@zaptec.com>
@chrizap chrizap changed the title fix: Choose correct port for secured transport when scheme is not fix: Correct port when scheme is not provided Nov 27, 2025
@Pietfried Pietfried self-assigned this Dec 2, 2025
Copy link
Contributor

@Pietfried Pietfried left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, thanks @chrizap

@Pietfried Pietfried merged commit 0085313 into EVerest:main Dec 4, 2025
4 of 5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants