Lines Matching +full:clean +full:- +full:command

1 .. zephyr:code-sample:: hawkbit-api
3 :relevant-api: hawkbit
29 :zephyr:board:`Freedom-K64F <frdm_k64f>` MCU by default. The application should
45 the Freedom-K64F Development Kit (``BOARD=frdm_k64f``).
59 .. code-block:: console
68 .. code-block:: console
70 sudo docker run -p 8080:8080 hawkbit/hawkbit-update-server:latest \
71 --hawkbit.dmf.rabbitmq.enabled=false \
72 --hawkbit.server.ddi.security.authentication.anonymous.enabled=true
75 the server URL, ``<your-ip-address>:8080``, and logging into the server using
81 hawkBit can be built for the :zephyr:board:`Freedom-K64F <frdm_k64f>` as follows:
83 .. zephyr-app-commands::
84 :zephyr-app: samples/subsys/mgmt/hawkbit
90 and port during runtime, you can use the following command:
92 .. zephyr-app-commands::
93 :zephyr-app: samples/subsys/mgmt/hawkbit
95 :conf: "prj.conf overlay-runtime.conf"
101 ``root-rsa-2048.pem`` key. The key is located in the MCUboot repository.
106 Upload the :file:`zephyr.signed.confirmed.bin` file to image slot-0
109 .. code-block:: console
111 west flash --bin-file build/zephyr/zephyr.signed.confirmed.bin
140 following command:
142 .. code-block:: console
157 Below steps clone and build the hawkbit with self-signed certificate
160 .. code-block:: console
163 cd hawkbit/hawkbit-runtime/hawkbit-update-server/src/main/resources
167 .. code-block:: console
169 openssl genrsa -des3 -out server.key 2048
173 .. code-block:: console
175 openssl req -new -key server.key -out server.csr
177 Once you run the command, it will prompt you to enter your Country,
178 State, City, Company name and enter the Command Name field with
179 ``<your-ip-address>``.
181 * Generate the self-signed x509 certificate suitable to use on web server.
183 .. code-block:: console
185 openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
189 .. code-block:: console
196 .. code-block:: console
198 openssl pkcs12 -export -in server.pem -out keystore.pkcs12
200 * Following command imports a .p12 into pkcs12 Java keystore
202 .. code-block:: console
204 keytool -importkeystore -srckeystore keystore.pkcs12 -srcstoretype pkcs12 \
205 -destkeystore hb-pass.jks -deststoretype pkcs12 \
206 -alias 1 -deststorepass <password_of_p12>
210 .. code-block:: console
216 .. code-block:: console
222 .. code-block:: console
226 hawkbit.artifact.url.protocols.download-http.protocol=https
227 hawkbit.artifact.url.protocols.download-http.port=8443
229 security.require-ssl=true
230 server.use-forward-headers=true
232 server.ssl.key-store= <hb-pass.jks file location>
233 server.ssl.key-store-type=JKS
234 server.ssl.key-password= <password_of_key>
235 server.ssl.key-store-password= <password_of_key_store>
238 server.ssl.enabled-protocols=TLSv1.2
244 .. code-block:: console
248 mvn clean install -DskipTests=true
252 .. code-block:: console
254 java -jar ./hawkbit-runtime/hawkbit-update-server/target/ \
255 hawkbit-update-server-#version#-SNAPSHOT.jar
263 ``hawkBit https`` can be built for the :zephyr:board:`Freedom-K64F <frdm_k64f>` as follows:
265 .. zephyr-app-commands::
266 :zephyr-app: samples/subsys/mgmt/hawkbit
268 :conf: "prj.conf overlay-tls.conf"