Lines Matching +full:- +full:- +full:update
1 .. zephyr:code-sample:: hawkbit-api
3 :relevant-api: hawkbit
5 Update a device using Eclipse hawkBit DDI API.
10 The Eclipse hawkBit update server provides REST resources which are consumed by the
11 device to retrieve software update tasks. This API is based on HTTP standards
15 update mode.
22 an available update, it will install the update. You can access the sample
29 :zephyr:board:`Freedom-K64F <frdm_k64f>` MCU by default. The application should
45 the Freedom-K64F Development Kit (``BOARD=frdm_k64f``).
59 .. code-block:: console
68 .. code-block:: console
70 sudo docker run -p 8080:8080 hawkbit/hawkbit-update-server:latest \
71 --hawkbit.dmf.rabbitmq.enabled=false \
72 --hawkbit.server.ddi.security.authentication.anonymous.enabled=true
75 the server URL, ``<your-ip-address>:8080``, and logging into the server using
81 hawkBit can be built for the :zephyr:board:`Freedom-K64F <frdm_k64f>` as follows:
83 .. zephyr-app-commands::
84 :zephyr-app: samples/subsys/mgmt/hawkbit
92 .. zephyr-app-commands::
93 :zephyr-app: samples/subsys/mgmt/hawkbit
95 :conf: "prj.conf overlay-runtime.conf"
101 ``root-rsa-2048.pem`` key. The key is located in the MCUboot repository.
106 Upload the :file:`zephyr.signed.confirmed.bin` file to image slot-0
109 .. code-block:: console
111 west flash --bin-file build/zephyr/zephyr.signed.confirmed.bin
116 upload a firmware binary to the server, and update it using this UI.
136 Step 7: Run the update
142 .. code-block:: console
147 updates, and then download the update you've just created. If everything goes
148 fine the message ``Update installed`` will be printed on the terminal.
157 Below steps clone and build the hawkbit with self-signed certificate
160 .. code-block:: console
163 cd hawkbit/hawkbit-runtime/hawkbit-update-server/src/main/resources
167 .. code-block:: console
169 openssl genrsa -des3 -out server.key 2048
173 .. code-block:: console
175 openssl req -new -key server.key -out server.csr
179 ``<your-ip-address>``.
181 * Generate the self-signed x509 certificate suitable to use on web server.
183 .. code-block:: console
185 openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
189 .. code-block:: console
196 .. code-block:: console
198 openssl pkcs12 -export -in server.pem -out keystore.pkcs12
202 .. code-block:: console
204 keytool -importkeystore -srckeystore keystore.pkcs12 -srcstoretype pkcs12 \
205 -destkeystore hb-pass.jks -deststoretype pkcs12 \
206 -alias 1 -deststorepass <password_of_p12>
210 .. code-block:: console
216 .. code-block:: console
222 .. code-block:: console
226 hawkbit.artifact.url.protocols.download-http.protocol=https
227 hawkbit.artifact.url.protocols.download-http.port=8443
229 security.require-ssl=true
230 server.use-forward-headers=true
232 server.ssl.key-store= <hb-pass.jks file location>
233 server.ssl.key-store-type=JKS
234 server.ssl.key-password= <password_of_key>
235 server.ssl.key-store-password= <password_of_key_store>
238 server.ssl.enabled-protocols=TLSv1.2
244 .. code-block:: console
248 mvn clean install -DskipTests=true
252 .. code-block:: console
254 java -jar ./hawkbit-runtime/hawkbit-update-server/target/ \
255 hawkbit-update-server-#version#-SNAPSHOT.jar
263 ``hawkBit https`` can be built for the :zephyr:board:`Freedom-K64F <frdm_k64f>` as follows:
265 .. zephyr-app-commands::
266 :zephyr-app: samples/subsys/mgmt/hawkbit
268 :conf: "prj.conf overlay-tls.conf"
271 Repeat the steps from 5 to 7, to update the device over https.