Lines Matching +full:sample +full:- +full:period +full:- +full:mode
1 .. zephyr:code-sample:: hawkbit-api
3 :relevant-api: hawkbit
14 This sample shows how to use hawkBit DDI API in both a polling and manual
15 update mode.
17 Polling mode run automatically on a predefined period, probing the server
19 access the sample source code for this hawkbit_polling.
21 Manual mode requires the user to call the server probe and then, if there is
22 an available update, it will install the update. You can access the sample
23 source code for this mode hawkbit_manual
29 :zephyr:board:`Freedom-K64F <frdm_k64f>` MCU by default. The application should
43 The below steps describe how to build and run the hawkBit sample in
44 Zephyr. Where examples are given, it is assumed the sample is being build for
45 the Freedom-K64F Development Kit (``BOARD=frdm_k64f``).
59 .. code-block:: console
68 .. code-block:: console
70 sudo docker run -p 8080:8080 hawkbit/hawkbit-update-server:latest \
71 --hawkbit.dmf.rabbitmq.enabled=false \
72 --hawkbit.server.ddi.security.authentication.anonymous.enabled=true
75 the server URL, ``<your-ip-address>:8080``, and logging into the server using
81 hawkBit can be built for the :zephyr:board:`Freedom-K64F <frdm_k64f>` as follows:
83 .. zephyr-app-commands::
84 :zephyr-app: samples/subsys/mgmt/hawkbit
92 .. zephyr-app-commands::
93 :zephyr-app: samples/subsys/mgmt/hawkbit
95 :conf: "prj.conf overlay-runtime.conf"
101 ``root-rsa-2048.pem`` key. The key is located in the MCUboot repository.
106 Upload the :file:`zephyr.signed.confirmed.bin` file to image slot-0
109 .. code-block:: console
111 west flash --bin-file build/zephyr/zephyr.signed.confirmed.bin
113 Once the image is flashed and booted, the sample will print the image build
122 build the sample again, so that the build time will be different.
142 .. code-block:: console
157 Below steps clone and build the hawkbit with self-signed certificate
160 .. code-block:: console
163 cd hawkbit/hawkbit-runtime/hawkbit-update-server/src/main/resources
167 .. code-block:: console
169 openssl genrsa -des3 -out server.key 2048
173 .. code-block:: console
175 openssl req -new -key server.key -out server.csr
179 ``<your-ip-address>``.
181 * Generate the self-signed x509 certificate suitable to use on web server.
183 .. code-block:: console
185 openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
189 .. code-block:: console
196 .. code-block:: console
198 openssl pkcs12 -export -in server.pem -out keystore.pkcs12
202 .. code-block:: console
204 keytool -importkeystore -srckeystore keystore.pkcs12 -srcstoretype pkcs12 \
205 -destkeystore hb-pass.jks -deststoretype pkcs12 \
206 -alias 1 -deststorepass <password_of_p12>
210 .. code-block:: console
216 .. code-block:: console
222 .. code-block:: console
226 hawkbit.artifact.url.protocols.download-http.protocol=https
227 hawkbit.artifact.url.protocols.download-http.port=8443
229 security.require-ssl=true
230 server.use-forward-headers=true
232 server.ssl.key-store= <hb-pass.jks file location>
233 server.ssl.key-store-type=JKS
234 server.ssl.key-password= <password_of_key>
235 server.ssl.key-store-password= <password_of_key_store>
238 server.ssl.enabled-protocols=TLSv1.2
244 .. code-block:: console
248 mvn clean install -DskipTests=true
252 .. code-block:: console
254 java -jar ./hawkbit-runtime/hawkbit-update-server/target/ \
255 hawkbit-update-server-#version#-SNAPSHOT.jar
263 ``hawkBit https`` can be built for the :zephyr:board:`Freedom-K64F <frdm_k64f>` as follows:
265 .. zephyr-app-commands::
266 :zephyr-app: samples/subsys/mgmt/hawkbit
268 :conf: "prj.conf overlay-tls.conf"