Compare commits
22 Commits
feature/bl
...
master
Author | SHA1 | Date |
---|---|---|
Hendrik Schutter | b4a750bda0 | |
Hendrik Schutter | b9e0769843 | |
Hendrik Schutter | 8e614e76c7 | |
Hendrik Schutter | a930f709ff | |
Hendrik Schutter | 78dbbfaba5 | |
Hendrik Schutter | 9d23788ac8 | |
Hendrik Schutter | e73a05fc42 | |
Hendrik Schutter | a62d3265ca | |
Hendrik Schutter | e88b6e2664 | |
Hendrik Schutter | 0f03f2da1c | |
Hendrik Schutter | e5801dd1e1 | |
Hendrik Schutter | c3d6e3c8a2 | |
Hendrik Schutter | 9600b76a80 | |
Hendrik Schutter | 7fe1f18985 | |
Hendrik Schutter | f3749b9985 | |
Hendrik Schutter | b29887e0ac | |
Hendrik Schutter | 77e87ec840 | |
Hendrik Schutter | 7f0e82fd29 | |
Hendrik Schutter | e4c620c9c5 | |
Hendrik Schutter | 14028679e1 | |
Hendrik Schutter | 05dfe8528b | |
Hendrik Schutter | f74985da4c |
|
@ -60,3 +60,4 @@ test/build/
|
|||
|
||||
*.orig
|
||||
|
||||
Doxygen/html/
|
||||
|
|
15
README.md
15
README.md
|
@ -1,19 +1,4 @@
|
|||
# ESP32-Mesh-OTA
|
||||
|
||||
## Work in progress
|
||||
<img src="https://patenschaft.bienenweide.org/img/loading.gif" alt="code_example_output" width="50"/>
|
||||
|
||||
## Todo for first release
|
||||
|
||||
### Refactoring
|
||||
- architecture
|
||||
- full error handling through all functions
|
||||
- export as a component library
|
||||
|
||||
### Features
|
||||
- root node: Download new Firmware from HTTPS server instead using newest ota partition
|
||||
- add example main app
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
idf_component_register(SRCS "HTTPS_client.c" "Mesh_network_handler.c" "Mesh_network.c" "Mesh_OTA.c"
|
||||
idf_component_register(SRCS "Mesh_OTA_Util.c" "Mesh_Network.c" "Mesh_Network_Handler.c" "HTTPS_Client.c" "Mesh_OTA_Partition_Access.c" "Mesh_OTA_Globals.c" "Mesh_OTA.c"
|
||||
INCLUDE_DIRS "include"
|
||||
REQUIRES nvs_flash
|
||||
esp_http_client
|
||||
|
|
|
@ -1,7 +1,18 @@
|
|||
#include "HTTPS_client.h"
|
||||
/**
|
||||
* @file HTTPS_Client.c
|
||||
* @brief Used to download the OTA image from the server
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Additional Infos: Connects via HTTPS and HTTPS Basic Auth to the Server.
|
||||
* Downloads the image in segments
|
||||
*/
|
||||
|
||||
#include "HTTPS_Client.h"
|
||||
|
||||
static const char *TAG = "https_client";
|
||||
|
||||
//HTTP GET data
|
||||
static const char *REQUEST = "GET " CONFIG_OTA_HTTPS_URL " HTTP/1.1\r\n"
|
||||
"Host: "CONFIG_OTA_HTTPS_SERVER_COMMON_NAME"\r\n"
|
||||
"User-Agent: esp-idf/1.0 esp32\r\n"
|
||||
|
@ -11,12 +22,22 @@ static const char *REQUEST = "GET " CONFIG_OTA_HTTPS_URL " HTTP/1.1\r\n"
|
|||
|
||||
static HTTPS_Client_t sHTTPS_ClientConfig;
|
||||
|
||||
https_client_ret_t https_clientInitEmbedTLS();
|
||||
https_client_ret_t errHTTPSClientConnectToServer();
|
||||
https_client_ret_t errHTTPSClientValidateServer();
|
||||
https_client_ret_t errHTTPSClientSendRequest();
|
||||
https_client_ret_t https_clientInitEmbedTLS(void);
|
||||
https_client_ret_t errHTTPSClientConnectToServer(void);
|
||||
https_client_ret_t errHTTPSClientValidateServer(void);
|
||||
https_client_ret_t errHTTPSClientSendRequest(void);
|
||||
|
||||
https_client_ret_t errHTTPSClientInitialize()
|
||||
/**
|
||||
* @fn https_client_ret_t errHTTPSClientInitialize(void)
|
||||
* @brief Initialize the client
|
||||
* @param void
|
||||
* @return HTTPS_Client error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Initialize embedTLS
|
||||
*/
|
||||
https_client_ret_t errHTTPSClientInitialize(void)
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
|
||||
|
@ -30,27 +51,39 @@ https_client_ret_t errHTTPSClientInitialize()
|
|||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientRetrieveData(char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32BytesRead)
|
||||
/**
|
||||
* @fn https_client_ret_t errHTTPSClientRetrieveData(char* const cpu8Data, const uint32_t* const cpcu32DataLenght, uint32_t* pu32BytesRead)
|
||||
* @brief receive a image segment from server
|
||||
* @param cpu8Data data buffer
|
||||
* @param cpcu32DataLenght desired byte amount
|
||||
* @param pu32BytesRead actual received byte amount
|
||||
* @return HTTPS_Client error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Read segement and handle all events like EOF or timeout
|
||||
*/
|
||||
https_client_ret_t errHTTPSClientRetrieveData(char* const cpu8Data, const uint32_t* const cpcu32DataLenght, uint32_t* pu32BytesRead)
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetRetrieveData = ESP_OK;
|
||||
bool bRetriveData = true;
|
||||
|
||||
bzero(pu8Data, *pu32DataLenght);
|
||||
*pu32BytesRead = 0U;
|
||||
bzero(cpu8Data, *cpcu32DataLenght);
|
||||
(*pu32BytesRead) = 0U;
|
||||
|
||||
while (bRetriveData)
|
||||
{
|
||||
mbedtls_ssl_conf_read_timeout(&sHTTPS_ClientConfig.conf, HTTPS_READ_TIMEOUT); //set timeout
|
||||
//Reading HTTP response
|
||||
i32RetRetrieveData = mbedtls_ssl_read(&sHTTPS_ClientConfig.ssl, (unsigned char *)(pu8Data+(*pu32BytesRead)), ((*pu32DataLenght)-(*pu32BytesRead)));
|
||||
i32RetRetrieveData = mbedtls_ssl_read(&sHTTPS_ClientConfig.ssl, (unsigned char *)(cpu8Data+(*pu32BytesRead)), ((*cpcu32DataLenght)-(*pu32BytesRead)));
|
||||
|
||||
if(i32RetRetrieveData > 0)
|
||||
{
|
||||
//Data received
|
||||
*pu32BytesRead = *pu32BytesRead + i32RetRetrieveData;
|
||||
|
||||
if(*pu32DataLenght > 0)
|
||||
if(*cpcu32DataLenght > 0)
|
||||
{
|
||||
//buffer not full yet --> read some more
|
||||
bRetriveData = true;
|
||||
|
@ -85,7 +118,17 @@ https_client_ret_t errHTTPSClientRetrieveData(char* pu8Data, uint32_t* pu32DataL
|
|||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientReset()
|
||||
/**
|
||||
* @fn https_client_ret_t errHTTPSClientReset(void)
|
||||
* @brief reset client for next receive of image
|
||||
* @param void
|
||||
* @return HTTPS_Client error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* reset session
|
||||
*/
|
||||
https_client_ret_t errHTTPSClientReset(void)
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
|
||||
|
@ -102,9 +145,18 @@ https_client_ret_t errHTTPSClientReset()
|
|||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t https_clientInitEmbedTLS()
|
||||
/**
|
||||
* @fn https_client_ret_t https_clientInitEmbedTLS(void)
|
||||
* @brief init embedTLS
|
||||
* @param void
|
||||
* @return HTTPS_Client error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* attach certs for tls
|
||||
*/
|
||||
https_client_ret_t https_clientInitEmbedTLS(void)
|
||||
{
|
||||
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetEmbedTLS = ESP_OK;
|
||||
static bool bAlreadySetup = false;
|
||||
|
@ -167,20 +219,13 @@ https_client_ret_t https_clientInitEmbedTLS()
|
|||
i32RetEmbedTLS = mbedtls_ssl_setup(&sHTTPS_ClientConfig.ssl, &sHTTPS_ClientConfig.conf); //call this only once
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_setup returned 0x%x\n\n", i32RetEmbedTLS);
|
||||
|
||||
// uint8_t buffer[20];
|
||||
//mbedtls_strerror(i32RetEmbedTLS, buffer, 20);
|
||||
//ESP_LOGE(TAG, "%s", buffer);
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_setup returned 0x%x\n", i32RetEmbedTLS);
|
||||
}
|
||||
else
|
||||
{
|
||||
bAlreadySetup = true;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
|
@ -196,7 +241,17 @@ https_client_ret_t https_clientInitEmbedTLS()
|
|||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientConnectToServer()
|
||||
/**
|
||||
* @fn https_client_ret_t errHTTPSClientConnectToServer(void)
|
||||
* @brief connect to server
|
||||
* @param void
|
||||
* @return HTTPS_Client error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* open TLS session
|
||||
*/
|
||||
https_client_ret_t errHTTPSClientConnectToServer(void)
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetServerConnect = ESP_OK;
|
||||
|
@ -229,7 +284,17 @@ https_client_ret_t errHTTPSClientConnectToServer()
|
|||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientValidateServer()
|
||||
/**
|
||||
* @fn https_client_ret_t errHTTPSClientValidateServer(void)
|
||||
* @brief validate server
|
||||
* @param void
|
||||
* @return HTTPS_Client error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* check CDN and cert
|
||||
*/
|
||||
https_client_ret_t errHTTPSClientValidateServer(void)
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetValidateServer = ESP_OK;
|
||||
|
@ -247,7 +312,17 @@ https_client_ret_t errHTTPSClientValidateServer()
|
|||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientSendRequest()
|
||||
/**
|
||||
* @fn https_client_ret_t errHTTPSClientSendRequest(void)
|
||||
* @brief send request to server
|
||||
* @param void
|
||||
* @return HTTPS_Client error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* send HTTP GET request
|
||||
*/
|
||||
https_client_ret_t errHTTPSClientSendRequest(void)
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetSendRequest = ESP_OK;
|
|
@ -1,26 +1,59 @@
|
|||
/**
|
||||
* @file Mesh_Network.c
|
||||
* @brief Mesh network layer used by OTA and APP
|
||||
* @author Hendrik Schutter, init based in ESP32-IDE code
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Additional Infos: Start network and send and receive data.
|
||||
*/
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
#include "Mesh_Network.h"
|
||||
|
||||
static const char *LOG_TAG = "mesh_network";
|
||||
static uint8_t tx_buf[CONFIG_MESH_MESSAGE_SIZE] = { 0, };
|
||||
static uint8_t rx_buf[CONFIG_MESH_MESSAGE_SIZE] = { 0, };
|
||||
uint8_t u8ownMAC[6];
|
||||
esp_netif_t* netif_sta;
|
||||
bool bIsMeshConnected;
|
||||
int32_t i32MeshLayer;
|
||||
mesh_addr_t meshParentAddr;
|
||||
void (*pAppRxHandle)(uint8_t*, uint8_t* );
|
||||
void (*pOTAChildConnectHandle)(uint8_t* );
|
||||
void (*pOTAMessageHandle)(MESH_PACKET_t* );
|
||||
void (*pChangeStateOfServerWorkerHandle)(bool );
|
||||
|
||||
esp_err_t errMeshNetworkInitialize()
|
||||
//w: errMeshNetworkInitialize
|
||||
//r: errMeshNetworkInitialize;vMeshNetworkGetOwnAddr;errMeshNetworkGetChildren
|
||||
uint8_t u8ownMAC[6];
|
||||
|
||||
//w: errMeshNetworkInitialize; vMeshNetworkMeshEventHandler
|
||||
//r: vMeshNetworkMeshEventHandler
|
||||
esp_netif_t* pNetifSta;
|
||||
|
||||
//w: errMeshNetworkInitialize; vMeshNetworkMeshEventHandler
|
||||
//r: errMeshNetworkInitialize;
|
||||
bool bIsMeshConnected;
|
||||
|
||||
//w: errMeshNetworkInitialize; vMeshNetworkMeshEventHandler
|
||||
//r: vMeshNetworkMeshEventHandler
|
||||
int32_t i32MeshLayer;
|
||||
|
||||
//w: errMeshNetworkInitialize; vMeshNetworkMeshEventHandler
|
||||
//r: vMeshNetworkMeshEventHandler
|
||||
mesh_addr_t meshParentAddr;
|
||||
|
||||
//function pointer for callbacks
|
||||
void (*pAppRxHandle)(const uint8_t* const, const uint8_t* const);
|
||||
void (*pOTAChildConnectHandle)(const uint8_t* const);
|
||||
void (*pOTAMessageHandle)(const MESH_PACKET_t* const);
|
||||
void (*pChangeStateOfServerWorkerHandle)(const bool );
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkInitialize()
|
||||
* @brief Starts the mesh network
|
||||
* @param void
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter, init based in ESP32-IDE code
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Initialize the network
|
||||
*/
|
||||
esp_err_t errMeshNetworkInitialize(void)
|
||||
{
|
||||
//init module variables
|
||||
esp_err_t err;
|
||||
bIsMeshConnected = false;
|
||||
i32MeshLayer = -1;
|
||||
netif_sta = NULL;
|
||||
pNetifSta = NULL;
|
||||
|
||||
err = nvs_flash_init(); //init non-volatile storage
|
||||
|
||||
|
@ -38,7 +71,7 @@ esp_err_t errMeshNetworkInitialize()
|
|||
ERROR_CHECK(esp_event_loop_create_default());
|
||||
|
||||
//create network interfaces for mesh (only station instance saved for further manipulation, soft AP instance ignored
|
||||
ERROR_CHECK(esp_netif_create_default_wifi_mesh_netifs(&netif_sta, NULL));
|
||||
ERROR_CHECK(esp_netif_create_default_wifi_mesh_netifs(&pNetifSta, NULL));
|
||||
|
||||
//wifi initialization
|
||||
ERROR_CHECK(errMeshNetworkInitializeWiFi());
|
||||
|
@ -47,7 +80,7 @@ esp_err_t errMeshNetworkInitialize()
|
|||
ERROR_CHECK(esp_mesh_init());
|
||||
|
||||
//mesh initialization
|
||||
ERROR_CHECK(esp_event_handler_register(MESH_EVENT, ESP_EVENT_ANY_ID, &vMeshEventHandler, NULL));
|
||||
ERROR_CHECK(esp_event_handler_register(MESH_EVENT, ESP_EVENT_ANY_ID, &vMeshNetworkMeshEventHandler, NULL));
|
||||
|
||||
//set mesh topology
|
||||
ERROR_CHECK(esp_mesh_set_topology(CONFIG_MESH_TOPOLOGY));
|
||||
|
@ -91,18 +124,38 @@ esp_err_t errMeshNetworkInitialize()
|
|||
return ESP_OK;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkInitializeWiFi()
|
||||
* @brief Starts the WiFI
|
||||
* @param void
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter, init based in ESP32-IDE code
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* start the wifi
|
||||
*/
|
||||
esp_err_t errMeshNetworkInitializeWiFi()
|
||||
{
|
||||
//wifi initialization
|
||||
esp_err_t err = ESP_OK;
|
||||
wifi_init_config_t config = WIFI_INIT_CONFIG_DEFAULT();
|
||||
ERROR_CHECK(esp_wifi_init(&config));
|
||||
ERROR_CHECK(esp_event_handler_register(IP_EVENT, IP_EVENT_STA_GOT_IP, &vIPEventHandler, NULL));
|
||||
ERROR_CHECK(esp_event_handler_register(IP_EVENT, IP_EVENT_STA_GOT_IP, &vMeshNetworkIpEventHandler, NULL));
|
||||
ERROR_CHECK(esp_wifi_set_storage(WIFI_STORAGE_FLASH));
|
||||
ERROR_CHECK(esp_wifi_start());
|
||||
return err;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkInitializeRouter(mesh_cfg_t* cfg)
|
||||
* @brief Starts the router
|
||||
* @param cfg router config
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter, init based in ESP32-IDE code
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Initialize the network
|
||||
*/
|
||||
esp_err_t errMeshNetworkInitializeRouter(mesh_cfg_t* cfg)
|
||||
{
|
||||
//router initialization
|
||||
|
@ -115,75 +168,109 @@ esp_err_t errMeshNetworkInitializeRouter(mesh_cfg_t* cfg)
|
|||
return err;
|
||||
}
|
||||
|
||||
//returns true if MAC address is equal
|
||||
bool bCheckMACEquality(uint8_t* pu8aMAC, uint8_t* pu8bMAC)
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkSetChildConnectedHandle(void (*pChildConnectHandleTmp)(const uint8_t* const cpcu8Data))
|
||||
* @brief set callback for event when child connects
|
||||
* @param (*pChildConnectHandleTmp)(const uint8_t* const cpcu8Data) function pointer
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*/
|
||||
esp_err_t errMeshNetworkSetChildConnectedHandle(void (*pChildConnectHandleTmp)(const uint8_t* const cpcu8Data))
|
||||
{
|
||||
bool bRet = true;
|
||||
uint8_t index = 0;
|
||||
|
||||
while ((index < 6) && (bRet == true))
|
||||
{
|
||||
if(pu8aMAC[index] != pu8bMAC[index])
|
||||
{
|
||||
bRet = false;
|
||||
}
|
||||
index++;
|
||||
}
|
||||
return bRet;
|
||||
pOTAChildConnectHandle = pChildConnectHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errGetChildren(mesh_addr_t* pChildren, uint16_t* pu16ChildrenSize)
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkSetAppReceiveHandle(void (*pAppRxHandleTmp)(const uint8_t* const cpcu8Data, const uint8_t* const pu8Sender))
|
||||
* @brief set callback for event when application data is received
|
||||
* @param (*pAppRxHandleTmp)(const uint8_t* const cpcu8Data, const uint8_t* const pu8Sender) function pointer
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*/
|
||||
esp_err_t errMeshNetworkSetAppReceiveHandle(void (*pAppRxHandleTmp)(const uint8_t* const cpcu8Data, const uint8_t* const pu8Sender))
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
int route_table_size = 0;
|
||||
*pu16ChildrenSize = 0;
|
||||
mesh_addr_t route_table[CONFIG_MESH_ROUTE_TABLE_SIZE];
|
||||
ERROR_CHECK(esp_mesh_get_routing_table((mesh_addr_t *) &route_table, (CONFIG_MESH_ROUTE_TABLE_SIZE * 6), &route_table_size));
|
||||
pAppRxHandle = pAppRxHandleTmp; //set handle from app as receive handle if an app packet is received
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkSetOTAMessageHandleHandle(void (*pOTAMessageHandleTmp)(const MESH_PACKET_t* const cpcuMeshPacket))
|
||||
* @brief set callback for event when OTA message is received
|
||||
* @param (*pOTAMessageHandleTmp)(const MESH_PACKET_t* const cpcuMeshPacket) function pointer
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*/
|
||||
esp_err_t errMeshNetworkSetOTAMessageHandleHandle(void (*pOTAMessageHandleTmp)(const MESH_PACKET_t* const cpcuMeshPacket))
|
||||
{
|
||||
pOTAMessageHandle = pOTAMessageHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkSetChangeStateOfServerWorkerHandle(void (*pChangeStateOfServerWorkerHandleTmp)(const bool cbState))
|
||||
* @brief set callback for event when connectify to server is changed
|
||||
* @param (*pChangeStateOfServerWorkerHandleTmp)(const bool cbState) function pointer
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*/
|
||||
esp_err_t errMeshNetworkSetChangeStateOfServerWorkerHandle(void (*pChangeStateOfServerWorkerHandleTmp)(const bool cbState))
|
||||
{
|
||||
pChangeStateOfServerWorkerHandle = pChangeStateOfServerWorkerHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkSendMeshPacket(const mesh_addr_t* const cpcAddrDest, const MESH_PACKET_t* const cpcPacket)
|
||||
* @brief send packet to mesh node
|
||||
* @param cpcAddrDest address from mesh node
|
||||
* @param cpcPacket packet to send
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*/
|
||||
esp_err_t errMeshNetworkSendMeshPacket(const mesh_addr_t* const cpcAddrDest, const MESH_PACKET_t* const cpcPacket)
|
||||
{
|
||||
esp_err_t err;
|
||||
mesh_data_t data;
|
||||
uint8_t tx_buf[CONFIG_MESH_MESSAGE_SIZE] = { 0, };
|
||||
data.data = tx_buf;
|
||||
data.size = sizeof(tx_buf);
|
||||
data.proto = MESH_PROTO_BIN;
|
||||
data.tos = MESH_TOS_P2P;
|
||||
memcpy(tx_buf, (uint8_t *)cpcPacket, sizeof(MESH_PACKET_t));
|
||||
|
||||
err = esp_mesh_send(cpcAddrDest, &data, MESH_DATA_P2P, NULL, 0);
|
||||
|
||||
if (err == ESP_OK)
|
||||
{
|
||||
for(uint16_t index = 0; index < esp_mesh_get_routing_table_size(); index++)
|
||||
{
|
||||
if(! (bCheckMACEquality(u8ownMAC, route_table[index].addr)) )
|
||||
{
|
||||
//child node
|
||||
//ESP_LOGI(LOG_TAG, "adding Node: \"0x%x, 0x%x, 0x%x, 0x%x, 0x%x, 0x%x\" ", route_table[index].addr[0], route_table[index].addr[1], route_table[index].addr[2], route_table[index].addr[3], route_table[index].addr[4], route_table[index].addr[5]);
|
||||
pChildren[*pu16ChildrenSize] = route_table[index];
|
||||
*pu16ChildrenSize = (*pu16ChildrenSize)+1;
|
||||
}
|
||||
}
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errGetParentNode(mesh_addr_t* pMeshParentAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
if((bIsMeshConnected == false) || (esp_mesh_is_root()))
|
||||
{
|
||||
//this node is not connected or is the root --> this node has no parent
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
else
|
||||
{
|
||||
//node has parent
|
||||
memcpy(pMeshParentAddr, &meshParentAddr, sizeof(mesh_addr_t));
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
void vGetOwnAddr(mesh_addr_t* pMeshOwnAddr)
|
||||
{
|
||||
memcpy(pMeshOwnAddr->addr, u8ownMAC, 6);
|
||||
}
|
||||
|
||||
bool bIsRootNode()
|
||||
/**
|
||||
* @fn bool bMeshNetworkIsRootNode()
|
||||
* @brief return true if this node is the root
|
||||
* @param void
|
||||
* @return boolean
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
bool bMeshNetworkIsRootNode(void)
|
||||
{
|
||||
return esp_mesh_is_root();
|
||||
}
|
||||
|
||||
bool bIsNodeNeighbour(mesh_addr_t* pNode)
|
||||
/**
|
||||
* @fn bool bMeshNetworkIsNodeNeighbour(const mesh_addr_t* const cpcNode)
|
||||
* @brief return true if node is neighbour if this
|
||||
* @param cpcNode to check
|
||||
* @return boolean
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
bool bMeshNetworkIsNodeNeighbour(const mesh_addr_t* const cpcNode)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
bool bReturn = false;
|
||||
|
@ -191,11 +278,11 @@ bool bIsNodeNeighbour(mesh_addr_t* pNode)
|
|||
mesh_addr_t childrenAddr[CONFIG_MESH_ROUTE_TABLE_SIZE]; //array of children attached to this node
|
||||
uint16_t u16ChildrenSize = 0U; //number of children attached to this node
|
||||
|
||||
err = errGetParentNode(&addrParent);
|
||||
err = errMeshNetworkGetParentNode(&addrParent);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
if(bCheckMACEquality(pNode->addr, addrParent.addr) == true)
|
||||
if(bMeshNetworkCheckMacEquality(cpcNode->addr, addrParent.addr) == true)
|
||||
{
|
||||
bReturn = true; //node was found
|
||||
}
|
||||
|
@ -205,11 +292,11 @@ bool bIsNodeNeighbour(mesh_addr_t* pNode)
|
|||
{
|
||||
err = ESP_OK; //reset error code
|
||||
|
||||
ERROR_CHECK(errGetChildren(childrenAddr, &u16ChildrenSize)); //get all children
|
||||
ERROR_CHECK(errMeshNetworkGetChildren(childrenAddr, &u16ChildrenSize)); //get all children
|
||||
|
||||
for (uint16_t u16Index = 0; ((u16Index < u16ChildrenSize) && (err == ESP_OK) && (bReturn == false)); u16Index++)
|
||||
{
|
||||
if(bCheckMACEquality(pNode->addr, childrenAddr[u16Index].addr) == true)
|
||||
if(bMeshNetworkCheckMacEquality(cpcNode->addr, childrenAddr[u16Index].addr) == true)
|
||||
{
|
||||
bReturn = true; //node was found
|
||||
}
|
||||
|
@ -218,51 +305,46 @@ bool bIsNodeNeighbour(mesh_addr_t* pNode)
|
|||
return bReturn;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetAppReceiveHandle(void (*pAppRxHandleTmp)(uint8_t * pu8Data, uint8_t* pu8Sender))
|
||||
|
||||
/**
|
||||
* @fn bool bMeshNetworkCheckMacEquality(const uint8_t* const cpcu8aMAC, const uint8_t* const cpcu8bMAC)
|
||||
* @brief returns true if MAC address is equal, compares only the first 5 bytes, the last is node specific
|
||||
* @param cpcu8aMAC first MAC
|
||||
* @param cpcu8bMAC second MAC
|
||||
* @return boolean
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
bool bMeshNetworkCheckMacEquality(const uint8_t* const cpcu8aMAC, const uint8_t* const cpcu8bMAC)
|
||||
{
|
||||
pAppRxHandle = pAppRxHandleTmp; //set handle from app as receive handle if an app packet is received
|
||||
return ESP_OK;
|
||||
bool bRet = true;
|
||||
uint8_t index = 0;
|
||||
|
||||
while ((index < 5) && (bRet == true))
|
||||
{
|
||||
if(cpcu8aMAC[index] != cpcu8bMAC[index])
|
||||
{
|
||||
bRet = false;
|
||||
}
|
||||
index++;
|
||||
}
|
||||
return bRet;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetChildConnectedHandle(void (*pChildConnectHandleTmp)(uint8_t * pu8Data))
|
||||
{
|
||||
pOTAChildConnectHandle = pChildConnectHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetOTAMessageHandleHandle(void (*pOTAMessageHandleTmp)(MESH_PACKET_t* puMeshPacket))
|
||||
{
|
||||
pOTAMessageHandle = pOTAMessageHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetChangeStateOfServerWorkerHandle(void (*pChangeStateOfServerWorkerHandleTmp)(bool bState))
|
||||
{
|
||||
pChangeStateOfServerWorkerHandle = pChangeStateOfServerWorkerHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errSendMeshPacket(mesh_addr_t* pAddrDest, MESH_PACKET_t* pPacket)
|
||||
{
|
||||
esp_err_t err;
|
||||
mesh_data_t data;
|
||||
data.data = tx_buf;
|
||||
data.size = sizeof(tx_buf);
|
||||
data.proto = MESH_PROTO_BIN;
|
||||
data.tos = MESH_TOS_P2P;
|
||||
memcpy(tx_buf, (uint8_t *)pPacket, sizeof(MESH_PACKET_t));
|
||||
|
||||
err = esp_mesh_send(pAddrDest, &data, MESH_DATA_P2P, NULL, 0);
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errStartReceiveTask()
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkStartReceiveTask()
|
||||
* @brief start the task to receive the mesh packets
|
||||
* @param void
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
esp_err_t errMeshNetworkStartReceiveTask(void)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
BaseType_t xReturned;
|
||||
|
||||
xReturned = xTaskCreate(vTaskReceiveMeshData, "ReceiveMeshData", 7000, NULL, 5, NULL);
|
||||
xReturned = xTaskCreate(vMeshNetworkTaskReceiveMeshData, "ReceiveMeshData", 7000, NULL, 5, NULL);
|
||||
|
||||
if(xReturned != pdPASS)
|
||||
{
|
||||
|
@ -271,11 +353,65 @@ esp_err_t errStartReceiveTask()
|
|||
return err;
|
||||
}
|
||||
|
||||
void vTaskReceiveMeshData(void *arg)
|
||||
/**
|
||||
* @fn vMeshNetworkGetOwnAddr(mesh_addr_t* const cpMeshOwnAddr)
|
||||
* @brief return own MAC addr
|
||||
* @param cpMeshOwnAddr pointer to own mac
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshNetworkGetOwnAddr(mesh_addr_t* const cpMeshOwnAddr)
|
||||
{
|
||||
memcpy(cpMeshOwnAddr->addr, u8ownMAC, 6);
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkGetChildren(mesh_addr_t* const cpChildren, uint16_t* const cpu16ChildrenSize)
|
||||
* @brief get all connected children to node in array
|
||||
* @param cpChildren pointer to array
|
||||
* @param cpu16ChildrenSize pointer to size of array
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
esp_err_t errMeshNetworkGetChildren(mesh_addr_t* const cpChildren, uint16_t* const cpu16ChildrenSize)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
int route_table_size = 0;
|
||||
*cpu16ChildrenSize = 0;
|
||||
mesh_addr_t route_table[CONFIG_MESH_ROUTE_TABLE_SIZE];
|
||||
ERROR_CHECK(esp_mesh_get_routing_table((mesh_addr_t *) &route_table, (CONFIG_MESH_ROUTE_TABLE_SIZE * 6), &route_table_size));
|
||||
|
||||
if (err == ESP_OK)
|
||||
{
|
||||
for(uint16_t index = 0; index < esp_mesh_get_routing_table_size(); index++)
|
||||
{
|
||||
if(! (bMeshNetworkCheckMacEquality(u8ownMAC, route_table[index].addr)) )
|
||||
{
|
||||
//child node
|
||||
cpChildren[*cpu16ChildrenSize] = route_table[index];
|
||||
(*cpu16ChildrenSize) = (*cpu16ChildrenSize)+1;
|
||||
}
|
||||
}
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vMeshNetworkTaskReceiveMeshData(void *arg)
|
||||
* @brief Task to receive all mesh packets
|
||||
* @param arg
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshNetworkTaskReceiveMeshData(void *arg)
|
||||
{
|
||||
esp_err_t err;
|
||||
mesh_addr_t from;
|
||||
mesh_data_t data;
|
||||
uint8_t rx_buf[CONFIG_MESH_MESSAGE_SIZE] = { 0, };
|
||||
int flag = 0;
|
||||
data.data = rx_buf;
|
||||
data.size = CONFIG_MESH_MESSAGE_SIZE;
|
||||
|
@ -319,6 +455,30 @@ void vTaskReceiveMeshData(void *arg)
|
|||
} //end while
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshNetworkGetParentNode(mesh_addr_t* const cpMeshParentAddr)
|
||||
* @brief get parrent node if connected to it
|
||||
* @param cpMeshParentAddr pointer to parent node addrs
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
esp_err_t errMeshNetworkGetParentNode(mesh_addr_t* const cpMeshParentAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
if((bIsMeshConnected == false) || (esp_mesh_is_root()))
|
||||
{
|
||||
//this node is not connected or is the root --> this node has no parent
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
else
|
||||
{
|
||||
//node has parent
|
||||
memcpy(cpMeshParentAddr, &meshParentAddr, sizeof(mesh_addr_t));
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
|
|
@ -1,9 +1,29 @@
|
|||
|
||||
#include "Mesh_OTA.h"
|
||||
/**
|
||||
* @file Mesh_Network_Handler.c
|
||||
* @brief Handler for events from mesh network (no messages)
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Additional Infos: IP event received or parrent or child connected or disconnected
|
||||
*/
|
||||
|
||||
#include "Mesh_Network.h"
|
||||
|
||||
static const char *LOG_TAG = "mesh_network_handler";
|
||||
|
||||
void vIPEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void *vpEventData)
|
||||
/**
|
||||
* @fn void vMeshNetworkIpEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void *vpEventData)
|
||||
* @brief received an IP event
|
||||
* @param arg
|
||||
* @param event_base
|
||||
* @param i32EventID
|
||||
* @param vpEventData
|
||||
* @return void
|
||||
* @author ESP-IDF
|
||||
* @date 20.01.2021
|
||||
*/
|
||||
void vMeshNetworkIpEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void *vpEventData)
|
||||
{
|
||||
ip_event_got_ip_t *event = (ip_event_got_ip_t *) vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<IP_EVENT_STA_GOT_IP>IP:" IPSTR, IP2STR(&event->ip_info.ip));
|
||||
|
@ -13,7 +33,18 @@ void vIPEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID,
|
|||
}
|
||||
}
|
||||
|
||||
void vMeshEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void* vpEventData)
|
||||
/**
|
||||
* @fn void vMeshNetworkMeshEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void* vpEventData)
|
||||
* @brief received an mesh event
|
||||
* @param arg
|
||||
* @param event_base
|
||||
* @param i32EventID
|
||||
* @param vpEventData
|
||||
* @return void
|
||||
* @author ESP-IDF
|
||||
* @date 20.01.2021
|
||||
*/
|
||||
void vMeshNetworkMeshEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void* vpEventData)
|
||||
{
|
||||
mesh_addr_t id = {0,};
|
||||
static uint16_t last_layer = 0;
|
||||
|
@ -90,12 +121,12 @@ last_layer = i32MeshLayer;
|
|||
bIsMeshConnected = true;
|
||||
if (esp_mesh_is_root())
|
||||
{
|
||||
if(esp_netif_dhcpc_start(netif_sta) == ESP_ERR_ESP_NETIF_DHCP_ALREADY_STARTED) //get a IP from router
|
||||
if(esp_netif_dhcpc_start(pNetifSta) == ESP_ERR_ESP_NETIF_DHCP_ALREADY_STARTED) //get a IP from router
|
||||
{
|
||||
if(pChangeStateOfServerWorkerHandle){pChangeStateOfServerWorkerHandle(true);}// signal reconnect
|
||||
}
|
||||
}
|
||||
errStartReceiveTask();//start receiving
|
||||
errMeshNetworkStartReceiveTask();//start receiving
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_PARENT_DISCONNECTED:
|
|
@ -1,17 +1,29 @@
|
|||
/**
|
||||
* @file Mesh_OTA.c
|
||||
* @brief Start and implement OTA updates via HTTPS from server and other mesh nodes (bidirectional)
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
#include "Mesh_OTA_Util.h"
|
||||
#include "Mesh_OTA_Globals.h"
|
||||
#include "Mesh_OTA_Partition_Access.h"
|
||||
|
||||
static const char *LOG_TAG = "mesh_ota";
|
||||
|
||||
xQueueHandle queueNodes; //nodes that should be checked for ota update (contains children and parent)
|
||||
xQueueHandle queueMessageOTA; //mesh ota controll messages like "OTA_Version_Response" "OTA_ACK"
|
||||
|
||||
SemaphoreHandle_t bsStartStopServerWorker; //binary semaphore
|
||||
SemaphoreHandle_t bsOTAProcess; //binary semaphore
|
||||
|
||||
const esp_partition_t* pOTAPartition; //pointer to ota partition
|
||||
bool bWantReboot; //flag to signal pending reboot
|
||||
|
||||
esp_err_t errMeshOTAInitialize()
|
||||
/**
|
||||
* @fn esp_err_t errMeshOTAInitialize(void)
|
||||
* @brief Starts Mesh OTA functionality
|
||||
* @param void
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Initialize queues and tasks
|
||||
* Set callbacks
|
||||
*/
|
||||
esp_err_t errMeshOTAInitialize(void)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
BaseType_t xReturned;
|
||||
|
@ -21,7 +33,7 @@ esp_err_t errMeshOTAInitialize()
|
|||
queueNodes = xQueueCreate(QUEUE_NODES_SIZE, sizeof(mesh_addr_t));
|
||||
if (queueNodes == 0) // Queue not created
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Queue for Nodes");
|
||||
ESP_LOGE(LOG_TAG, "Unable to create queue for nodes");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
|
@ -31,7 +43,7 @@ esp_err_t errMeshOTAInitialize()
|
|||
queueMessageOTA = xQueueCreate(QUEUE_MESSAGE_OTA_SIZE, sizeof(MESH_PACKET_t));
|
||||
if (queueMessageOTA == 0) // Queue not created
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Queue for OTA Messages");
|
||||
ESP_LOGE(LOG_TAG, "Unable to create queue for OTA messages");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
@ -41,7 +53,7 @@ esp_err_t errMeshOTAInitialize()
|
|||
bsStartStopServerWorker = xSemaphoreCreateBinary();
|
||||
if( bsStartStopServerWorker == NULL )
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Mutex to represent state of Server worker");
|
||||
ESP_LOGE(LOG_TAG, "Unable to create mutex to represent state of server worker");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
@ -51,7 +63,7 @@ esp_err_t errMeshOTAInitialize()
|
|||
bsOTAProcess = xSemaphoreCreateBinary();
|
||||
if( bsOTAProcess == NULL )
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Mutex to grant access to OTA Process");
|
||||
ESP_LOGE(LOG_TAG, "Unable to create mutex to grant access to OTA process");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
@ -61,14 +73,15 @@ esp_err_t errMeshOTAInitialize()
|
|||
xSemaphoreGive(bsOTAProcess); //unlock binary semaphore
|
||||
if( bsOTAProcess == NULL )
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to unlock Mutex to grant access to OTA Process");
|
||||
ESP_LOGE(LOG_TAG, "Unable to unlock mutex to grant access to OTA process");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
ERROR_CHECK(errMeshNetworkSetChildConnectedHandle(vAddNodeToPossibleUpdatableQueue));
|
||||
ERROR_CHECK(errMeshNetworkSetOTAMessageHandleHandle(vAddOTAControllMessageToQueue));
|
||||
ERROR_CHECK(errMeshNetworkSetChangeStateOfServerWorkerHandle(vChangeStateOfServerWorker));
|
||||
//register callbacks in network
|
||||
ERROR_CHECK(errMeshNetworkSetChildConnectedHandle(vMeshOtaUtilAddNodeToPossibleUpdatableQueue));
|
||||
ERROR_CHECK(errMeshNetworkSetOTAMessageHandleHandle(vMeshOtaUtilAddOtaMessageToQueue));
|
||||
ERROR_CHECK(errMeshNetworkSetChangeStateOfServerWorkerHandle(vMeshOtaUtilChangeStateOfServerWorker));
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
|
@ -83,7 +96,7 @@ esp_err_t errMeshOTAInitialize()
|
|||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
xReturned = xTaskCreate(vTaskServerWorker, "vTaskServerWorker", 8192, NULL, 5, NULL);
|
||||
xReturned = xTaskCreate(vMeshOtaTaskServerWorker, "vMeshOtaTaskServerWorker", 8192, NULL, 5, NULL);
|
||||
if(xReturned != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create the server worker task");
|
||||
|
@ -94,75 +107,27 @@ esp_err_t errMeshOTAInitialize()
|
|||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
xReturned = xTaskCreate(vTaskOTAWorker, "vTaskOTAWorker", 8192, NULL, 5, NULL);
|
||||
xReturned = xTaskCreate(vMeshOtaTaskOTAWorker, "vMeshOtaTaskOTAWorker", 8192, NULL, 5, NULL);
|
||||
if(xReturned != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create the OTA worker task");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
void vAddNodeToPossibleUpdatableQueue(uint8_t* pu8MAC)
|
||||
/**
|
||||
* @fn void vMeshOtaTaskServerWorker(void *arg)
|
||||
* @brief Task for updating from server via HTTPS
|
||||
* @param arg
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaTaskServerWorker(void *arg)
|
||||
{
|
||||
//send payload to node queues
|
||||
mesh_addr_t addrNode;
|
||||
memcpy(&addrNode.addr, (uint8_t *)pu8MAC, 6); //copy MAC
|
||||
|
||||
if (xQueueSend(queueNodes, &addrNode, portMAX_DELAY) != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to push node into node queue");
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "added node \"%x:%x:%x:%x:%x:%x\" to possible updatable queue", addrNode.addr[0], addrNode.addr[1], addrNode.addr[2], addrNode.addr[3], addrNode.addr[4], addrNode.addr[5]);
|
||||
}
|
||||
}
|
||||
|
||||
void vAddOTAControllMessageToQueue(MESH_PACKET_t* puMeshPacket)
|
||||
{
|
||||
//send ota packet to packet queue
|
||||
if (xQueueSend(queueMessageOTA, puMeshPacket, portMAX_DELAY) != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to push ota packet into packet queue");
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "added ota message to queue: %i (type)", puMeshPacket->type);
|
||||
}
|
||||
}
|
||||
|
||||
void vChangeStateOfServerWorker(bool bState) //allow access via function ptn to networl_handler
|
||||
{
|
||||
static bool bLastState = false;
|
||||
|
||||
if(bState != bLastState) //change only if necessary
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "server worker change handler");
|
||||
|
||||
if(bState == true)
|
||||
{
|
||||
if (xSemaphoreGive(bsStartStopServerWorker) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to give mutex to activate the server worker");
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
if (xSemaphoreTake(bsStartStopServerWorker,( TickType_t ) 10 ) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to obtain mutex to deactivate the server worker");
|
||||
}
|
||||
}
|
||||
bLastState = bState;
|
||||
}
|
||||
}
|
||||
|
||||
void vTaskServerWorker(void *arg)
|
||||
{
|
||||
esp_err_t err;
|
||||
esp_err_t err = ESP_OK;
|
||||
bool bNewOTAImage; //true if a new ota image was downloaded and validated
|
||||
bool bFirstRun = true;
|
||||
|
||||
|
@ -179,6 +144,7 @@ void vTaskServerWorker(void *arg)
|
|||
|
||||
if(bFirstRun == true)
|
||||
{
|
||||
//init on first run
|
||||
ERROR_CHECK(errHTTPSClientInitialize());
|
||||
bFirstRun = false;
|
||||
}
|
||||
|
@ -187,7 +153,7 @@ void vTaskServerWorker(void *arg)
|
|||
ERROR_CHECK(errHTTPSClientValidateServer());
|
||||
ERROR_CHECK(errHTTPSClientSendRequest());
|
||||
|
||||
ERROR_CHECK(errOTAHTTPS(&bNewOTAImage));
|
||||
ERROR_CHECK(errMeshOtaPartitionAccessHttps(&bNewOTAImage));
|
||||
errHTTPSClientReset();
|
||||
|
||||
if(bNewOTAImage == true)
|
||||
|
@ -195,18 +161,26 @@ void vTaskServerWorker(void *arg)
|
|||
//set want reboot
|
||||
ESP_LOGI(LOG_TAG, "Updated successfully via HTTPS, set pending reboot");
|
||||
bWantReboot = true;
|
||||
vAddAllNeighboursToQueue(); //add all existing neighbours to queue (aparent will not be added because this node is the root)
|
||||
}
|
||||
vTaskDelay( (SERVER_CHECK_INTERVAL*1000) / portTICK_PERIOD_MS); //sleep till next server checks
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void vTaskOTAWorker(void *arg)
|
||||
/**
|
||||
* @fn void vMeshOtaTaskServerWorker(void *arg)
|
||||
* @brief Task for updating from nodes in mesh network
|
||||
* @param arg
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaTaskOTAWorker(void *arg)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
bool bNewOTAImage; //true if a new ota image was downloaded and validated
|
||||
mesh_addr_t meshNodeAddr; //node that should be checked for ota update
|
||||
BaseType_t xReturned;
|
||||
|
||||
while(true)
|
||||
{
|
||||
|
@ -216,34 +190,37 @@ void vTaskOTAWorker(void *arg)
|
|||
if((uxQueueSpacesAvailable(queueNodes) - QUEUE_NODES_SIZE) == 0)
|
||||
{
|
||||
//nodes queue is empty
|
||||
ESP_LOGI(LOG_TAG, "nodes queue is empty");
|
||||
|
||||
if(bWantReboot == true)
|
||||
xReturned = xSemaphoreTake(bsOTAProcess, portMAX_DELAY); //wait for binary semaphore that allows to start the OTA process
|
||||
if((xReturned == pdTRUE) && (bWantReboot == true) && (OTA_ALLOW_REBOOT == 1))
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "ESP32 Reboot ...");
|
||||
//vTaskDelay( (1000) / portTICK_PERIOD_MS);
|
||||
//esp_restart();
|
||||
ESP_LOGE(LOG_TAG, "ESP32 Reboot ...");
|
||||
vTaskDelay( (1000) / portTICK_PERIOD_MS);
|
||||
esp_restart();
|
||||
}
|
||||
|
||||
ERROR_CHECK(errOTAMeshSlave(&bNewOTAImage));
|
||||
xSemaphoreGive(bsOTAProcess); //free binary semaphore, this allows other tasks to start the OTA process
|
||||
ERROR_CHECK(errMeshOtaSlaveEndpoint(&bNewOTAImage, &meshNodeAddr));
|
||||
}
|
||||
else
|
||||
{
|
||||
//queue not empty
|
||||
ESP_LOGI(LOG_TAG, "nodes queue not empty: %i", (QUEUE_NODES_SIZE - uxQueueSpacesAvailable(queueNodes)));
|
||||
|
||||
if (xQueueReceive(queueNodes, &meshNodeAddr, ((100) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from Queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
ERROR_CHECK(errOTAMeshMaster(&bNewOTAImage, &meshNodeAddr));
|
||||
ERROR_CHECK(errMeshOtaMasterEndpoint(&bNewOTAImage, &meshNodeAddr));
|
||||
|
||||
if (err != ESP_OK)
|
||||
{
|
||||
//OTA process faild --> add back to queue
|
||||
vAddNodeToPossibleUpdatableQueue(meshNodeAddr.addr);
|
||||
vMeshOtaUtilAddNodeToPossibleUpdatableQueue(meshNodeAddr.addr);
|
||||
}
|
||||
else
|
||||
{
|
||||
vMeshOtaUtilClearNeighboursQueue(&meshNodeAddr); //remove this node from queue
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -252,98 +229,32 @@ void vTaskOTAWorker(void *arg)
|
|||
//set want reboot
|
||||
ESP_LOGI(LOG_TAG, "Updated successfully via Mesh, set pending reboot");
|
||||
bWantReboot = true;
|
||||
vAddAllNeighboursToQueue(); //add all existing neighbours to queue
|
||||
|
||||
vMeshOtaUtilAddAllNeighboursToQueue(&meshNodeAddr); //add all existing neighbours to queue
|
||||
}
|
||||
vTaskDelay( (1000) / portTICK_PERIOD_MS);
|
||||
}
|
||||
}
|
||||
|
||||
esp_err_t errOTAHTTPS(bool* pbNewOTAImage)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
char u8OTABuffer[OTA_HTTPS_SEGMENT_SIZE]; //store image segment from server before ota write
|
||||
uint32_t u32BufferLenght = OTA_HTTPS_SEGMENT_SIZE; //size of buffer
|
||||
uint32_t u32BytesRead = 0; //number of bytes that are read from server, <= u32BufferLenght
|
||||
char pcRemoteVersionNumber[12]; //string for version number in server image
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
static esp_ota_handle_t otaHandle; //OTA process handle
|
||||
uint32_t u32StartOffset = 0U; //start offset for image (exclude the http response data)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadate from boot partition
|
||||
uint32_t u32OTABytesWritten = 0U; //counter unsed for progress log
|
||||
|
||||
ERROR_CHECK(errHTTPSClientRetrieveData(u8OTABuffer, &u32BufferLenght, &u32BytesRead)); //read first bytes if image, including the version
|
||||
|
||||
ERROR_CHECK(errExtractVersionNumber(u8OTABuffer, &u32BytesRead, pcRemoteVersionNumber)); //extract version numbers
|
||||
|
||||
if(err == ESP_OK) //check if version number is found
|
||||
{
|
||||
xSemaphoreTake(bsOTAProcess, portMAX_DELAY); //wait for binary semaphore that allows to start the OTA process
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
|
||||
if(bNewerVersion((bootPartitionDesc).version, pcRemoteVersionNumber)) //compare local and remote version
|
||||
{
|
||||
// server image is newer --> OTA update required
|
||||
ESP_LOGI(LOG_TAG, "Server: image is newer --> OTA update required");
|
||||
|
||||
ERROR_CHECK(errFindImageStart(u8OTABuffer, &u32BufferLenght, &u32StartOffset)); //get image start offset
|
||||
|
||||
ERROR_CHECK(esp_ota_begin(pOTAPartition, OTA_SIZE_UNKNOWN, &otaHandle)); //start ota update process
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//image download and ota partition write
|
||||
ESP_LOGI(LOG_TAG, "start OTA download via HTTPS");
|
||||
do
|
||||
{
|
||||
vPrintOTAProgress(&(pOTAPartition->size), &u32OTABytesWritten, Receiver);
|
||||
ERROR_CHECK(esp_ota_write(otaHandle, (const void*) u8OTABuffer+u32StartOffset, (u32BytesRead-u32StartOffset)));
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//write was succsesfull
|
||||
u32StartOffset = 0U; //reset the offset for next download
|
||||
ERROR_CHECK(errHTTPSClientRetrieveData(u8OTABuffer, &u32BufferLenght, &u32BytesRead)); //download next data segment
|
||||
u32OTABytesWritten = u32OTABytesWritten + u32BytesRead; //update counter
|
||||
}
|
||||
}
|
||||
while ((u32BytesRead > 0) && (err == ESP_OK) && (u32OTABytesWritten <= pOTAPartition->size)); //loop until error or complete image downloaded
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//no error occurred --> finish ota update process
|
||||
ERROR_CHECK(esp_ota_end(otaHandle)); //finish process
|
||||
ERROR_CHECK(esp_ota_set_boot_partition(pOTAPartition)); //set new image as boot
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
*pbNewOTAImage = true; //image validated
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
//error occurred --> abort ota update process
|
||||
ESP_LOGE(LOG_TAG, "abort ota process due to error 0x%x -> %s", err, esp_err_to_name(err));
|
||||
ERROR_CHECK(esp_ota_abort(otaHandle));
|
||||
*pbNewOTAImage = false; //ota update failed
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "server image is NOT newer --> OTA update NOT required");
|
||||
}
|
||||
xSemaphoreGive(bsOTAProcess); //free binary semaphore, this allows other tasks to start the OTA process
|
||||
} //end version number extracted
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errOTAMeshSlave(bool* pbNewOTAImage)
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaSlaveEndpoint(bool* const cpbNewOTAImage)
|
||||
* @brief Endpoint for OTA process that is called from remote node
|
||||
* @param cpbNewOTAImage pointer to boolean to signal if a new image was successfully received
|
||||
* @param cpcMeshNodeAddr pointer to mesh node that transmitted the update
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Answers the OTA_Version_Request with OTA_Version_Response
|
||||
* calls errMeshOtaPartitionAccessMeshReceive OR errMeshOtaPartitionAccessMeshTransmit based on version number
|
||||
*/
|
||||
esp_err_t errMeshOtaSlaveEndpoint(bool* const cpbNewOTAImage, mesh_addr_t* const cpcMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t sOTAMessage;
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
const esp_partition_t* cpBootPartition = NULL; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadate from boot partition
|
||||
*pbNewOTAImage = false; //set default false
|
||||
*cpbNewOTAImage = false; //set default false
|
||||
|
||||
//read OTAMessages queue
|
||||
if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
|
@ -351,7 +262,6 @@ esp_err_t errOTAMeshSlave(bool* pbNewOTAImage)
|
|||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sOTAMessage, ((100) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from Queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
|
@ -359,26 +269,28 @@ esp_err_t errOTAMeshSlave(bool* pbNewOTAImage)
|
|||
{
|
||||
xSemaphoreTake(bsOTAProcess, portMAX_DELAY); //wait for binary semaphore that allows to start the OTA process
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
memcpy(cpcMeshNodeAddr, &sOTAMessage.meshSenderAddr, sizeof(mesh_addr_t));
|
||||
|
||||
cpBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(cpBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
|
||||
//send OTA_Version_Response to sender of OTA_Version_Request packet wirh version in payload
|
||||
ERROR_CHECK(errSendOTAVersionResponse(&sOTAMessage.meshSenderAddr));
|
||||
ERROR_CHECK(errMeshOtaUtilSendOtaVersionResponse(&sOTAMessage.meshSenderAddr));
|
||||
|
||||
if((bNewerVersion((bootPartitionDesc).version, (char*) sOTAMessage.au8Payload)) && (err == ESP_OK)) //compare local and remote version
|
||||
if((bMeshOtaUtilNewerVersion((bootPartitionDesc).version, (char*) sOTAMessage.au8Payload)) && (err == ESP_OK)) //compare local and remote version
|
||||
{
|
||||
//remote newer as local
|
||||
ESP_LOGI(LOG_TAG, "remote image on node is newer --> OTA update required");
|
||||
// --> this version older --> start OTA_Rx --> set pbNewOTAImage true
|
||||
ERROR_CHECK(errOTAMeshReceive(pbNewOTAImage, &sOTAMessage.meshSenderAddr));
|
||||
ESP_LOGI(LOG_TAG, "remote image on node is newer --> OTA update required from node \"%x:%x:%x:%x:%x:%x\"", sOTAMessage.meshSenderAddr.addr[0], sOTAMessage.meshSenderAddr.addr[1], sOTAMessage.meshSenderAddr.addr[2], sOTAMessage.meshSenderAddr.addr[3], sOTAMessage.meshSenderAddr.addr[4], sOTAMessage.meshSenderAddr.addr[5]);
|
||||
// --> this version older --> start OTA_Rx --> set cpbNewOTAImage true
|
||||
ERROR_CHECK(errMeshOtaPartitionAccessMeshReceive(cpbNewOTAImage, &sOTAMessage.meshSenderAddr));
|
||||
}
|
||||
|
||||
if((bNewerVersion((char*) sOTAMessage.au8Payload, (bootPartitionDesc).version)) && (err == ESP_OK)) //compare remote and local version
|
||||
if((bMeshOtaUtilNewerVersion((char*) sOTAMessage.au8Payload, (bootPartitionDesc).version)) && (err == ESP_OK)) //compare remote and local version
|
||||
{
|
||||
//local newer as remote
|
||||
ESP_LOGI(LOG_TAG, "remote image on node is older --> OTA send required");
|
||||
ESP_LOGI(LOG_TAG, "remote image on node is older --> OTA send required to node \"%x:%x:%x:%x:%x:%x\"", sOTAMessage.meshSenderAddr.addr[0], sOTAMessage.meshSenderAddr.addr[1], sOTAMessage.meshSenderAddr.addr[2], sOTAMessage.meshSenderAddr.addr[3], sOTAMessage.meshSenderAddr.addr[4], sOTAMessage.meshSenderAddr.addr[5]);
|
||||
// --> this version newer --> start OTA_Tx
|
||||
ERROR_CHECK(errOTAMeshTransmit(&sOTAMessage.meshSenderAddr));
|
||||
ERROR_CHECK(errMeshOtaPartitionAccessMeshTransmit(&sOTAMessage.meshSenderAddr));
|
||||
}
|
||||
xSemaphoreGive(bsOTAProcess); //free binary semaphore, this allows other tasks to start the OTA process
|
||||
}
|
||||
|
@ -386,61 +298,73 @@ esp_err_t errOTAMeshSlave(bool* pbNewOTAImage)
|
|||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errOTAMeshMaster(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr)
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaMasterEndpoint(bool* const cpbNewOTAImage, const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
* @brief Endpoint for OTA process that calls remote node
|
||||
* @param cpbNewOTAImage pointer to boolean to signal if a new image was successfully received
|
||||
* @param cpcMeshNodeAddr pointer to remote node addr
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Sends the OTA_Version_Request to remote node
|
||||
* calls errMeshOtaPartitionAccessMeshReceive OR errMeshOtaPartitionAccessMeshTransmit based on version number received
|
||||
*/
|
||||
esp_err_t errMeshOtaMasterEndpoint(bool* const cpbNewOTAImage, const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t sOTAMessage;
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
const esp_partition_t* cpBootPartition = NULL; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadata from boot partition
|
||||
bool bNodeIsConnected = false;
|
||||
bool bNodeIsResponding = false;
|
||||
bool bSameVersion = false;
|
||||
|
||||
*pbNewOTAImage = false; //set default false
|
||||
*cpbNewOTAImage = false; //set default false
|
||||
|
||||
if(bIsNodeNeighbour(pMeshNodeAddr) == true) //check if node is still connected
|
||||
if(bMeshNetworkIsNodeNeighbour(cpcMeshNodeAddr) == true) //check if node is still connected
|
||||
{
|
||||
bNodeIsConnected = true; //node is one of the neighbours
|
||||
xSemaphoreTake(bsOTAProcess, portMAX_DELAY); //wait for binary semaphore that allows to start the OTA process
|
||||
|
||||
ERROR_CHECK(errSendOTAVersionRequest(pMeshNodeAddr)); //send OTA_VERSION_REQUEST with local version in payload
|
||||
ERROR_CHECK(errMeshOtaUtilSendOtaVersionRequest(cpcMeshNodeAddr)); //send OTA_VERSION_REQUEST with local version in payload
|
||||
|
||||
for (uint32_t u32Index = 0; u32Index < QUEUE_MESSAGE_OTA_SIZE; u32Index++) //loop through all OTA messages
|
||||
for (uint32_t u32Index = 0; ((u32Index < QUEUE_MESSAGE_OTA_SIZE) && (bSameVersion == false)); u32Index++) //loop through all OTA messages
|
||||
{
|
||||
if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
//if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
// {
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sOTAMessage, ((3000) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sOTAMessage, ((3000) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (sOTAMessage.type == OTA_Version_Response) && (bMeshNetworkCheckMacEquality(sOTAMessage.meshSenderAddr.addr, cpcMeshNodeAddr->addr))) //if OTA_Version_Request
|
||||
{
|
||||
bSameVersion = true;
|
||||
bNodeIsResponding = true;
|
||||
cpBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(cpBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
|
||||
if((bMeshOtaUtilNewerVersion((bootPartitionDesc).version, (char*) sOTAMessage.au8Payload)) && (err == ESP_OK)) //compare local and remote version
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
//remote newer as local
|
||||
bSameVersion = false;
|
||||
ESP_LOGI(LOG_TAG, "remote image on node is newer --> OTA update required from node \"%x:%x:%x:%x:%x:%x\"", sOTAMessage.meshSenderAddr.addr[0], sOTAMessage.meshSenderAddr.addr[1], sOTAMessage.meshSenderAddr.addr[2], sOTAMessage.meshSenderAddr.addr[3], sOTAMessage.meshSenderAddr.addr[4], sOTAMessage.meshSenderAddr.addr[5]);
|
||||
// --> this version older --> start OTA_Rx --> set cpbNewOTAImage true
|
||||
ERROR_CHECK(errMeshOtaPartitionAccessMeshReceive(cpbNewOTAImage, &sOTAMessage.meshSenderAddr));
|
||||
u32Index = QUEUE_MESSAGE_OTA_SIZE;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (sOTAMessage.type == OTA_Version_Response) && (bCheckMACEquality(sOTAMessage.meshSenderAddr.addr, pMeshNodeAddr->addr))) //if OTA_Version_Request
|
||||
if((bMeshOtaUtilNewerVersion((char*) sOTAMessage.au8Payload, (bootPartitionDesc).version)) && (err == ESP_OK)) //compare remote and local version
|
||||
{
|
||||
bNodeIsResponding = true;
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
|
||||
if((bNewerVersion((bootPartitionDesc).version, (char*) sOTAMessage.au8Payload)) && (err == ESP_OK)) //compare local and remote version
|
||||
{
|
||||
//remote newer as local
|
||||
ESP_LOGI(LOG_TAG, "Mesh: remote image on node is newer --> OTA update required");
|
||||
// --> this version older --> start OTA_Rx --> set pbNewOTAImage true
|
||||
ERROR_CHECK(errOTAMeshReceive(pbNewOTAImage, &sOTAMessage.meshSenderAddr));
|
||||
}
|
||||
|
||||
if((bNewerVersion((char*) sOTAMessage.au8Payload, (bootPartitionDesc).version)) && (err == ESP_OK)) //compare remote and local version
|
||||
{
|
||||
//local newer as remote
|
||||
ESP_LOGI(LOG_TAG, "Mesh: remote image on node is older --> OTA send required");
|
||||
// --> this version newer --> start OTA_Tx
|
||||
ERROR_CHECK(errOTAMeshTransmit(&sOTAMessage.meshSenderAddr));
|
||||
}
|
||||
}
|
||||
else if (err == ESP_OK)
|
||||
{
|
||||
//received from wrong node or type --> back to queue
|
||||
vAddOTAControllMessageToQueue(&sOTAMessage);
|
||||
//local newer as remote
|
||||
bSameVersion = false;
|
||||
ESP_LOGI(LOG_TAG, "remote image on node is older --> OTA send required to node \"%x:%x:%x:%x:%x:%x\"", sOTAMessage.meshSenderAddr.addr[0], sOTAMessage.meshSenderAddr.addr[1], sOTAMessage.meshSenderAddr.addr[2], sOTAMessage.meshSenderAddr.addr[3], sOTAMessage.meshSenderAddr.addr[4], sOTAMessage.meshSenderAddr.addr[5]);
|
||||
// --> this version newer --> start OTA_Tx
|
||||
ERROR_CHECK(errMeshOtaPartitionAccessMeshTransmit(&sOTAMessage.meshSenderAddr));
|
||||
u32Index = QUEUE_MESSAGE_OTA_SIZE;
|
||||
}
|
||||
}
|
||||
else
|
||||
|
@ -455,438 +379,8 @@ esp_err_t errOTAMeshMaster(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr)
|
|||
if((bNodeIsResponding == false) && (bNodeIsConnected == true))
|
||||
{
|
||||
//add node back to queue if connected and NOT responding
|
||||
vAddNodeToPossibleUpdatableQueue(pMeshNodeAddr->addr);
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
bool bNewerVersion(const char* pu8Local, const char* pu8Remote)
|
||||
{
|
||||
/*
|
||||
* Return true if remote version is newer (higher) than local version
|
||||
*/
|
||||
char u8LocalTmp[12]; //local version
|
||||
char u8RemoteTmp[12]; //remote version
|
||||
char* pu8saveptrLocal; //context for strok_r
|
||||
char* pu8saveptrRemote; //context for strok_r
|
||||
bool bReturn = false; //flag to stop loop
|
||||
uint8_t u8Index = 0; //numbers counter in version string
|
||||
|
||||
strncpy(u8LocalTmp, pu8Local, 12); //copy in tmp
|
||||
strncpy(u8RemoteTmp, pu8Remote, 12); //copy in tmp
|
||||
|
||||
char* pu8TokenLocal = strtok_r(u8LocalTmp, ".", &pu8saveptrLocal); //split tokens
|
||||
char* pu8TokenRemote = strtok_r(u8RemoteTmp, ".", &pu8saveptrRemote); //split tokens
|
||||
|
||||
while( (u8Index <= 2) && (bReturn == false)) //loop through tokens
|
||||
{
|
||||
u8Index++;
|
||||
if(atoi(pu8TokenLocal) < atoi(pu8TokenRemote))
|
||||
{
|
||||
bReturn = true; //version number difference --> stop loop
|
||||
}
|
||||
pu8TokenLocal = strtok_r(NULL, ".", &pu8saveptrLocal); //split tokens
|
||||
pu8TokenRemote = strtok_r(NULL, ".", &pu8saveptrRemote); //split tokens
|
||||
}
|
||||
return bReturn;
|
||||
}
|
||||
|
||||
esp_err_t errFindImageStart(const char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32StartOffset)
|
||||
{
|
||||
/*
|
||||
Offset value
|
||||
0 = 0xE9 (first byte in image --> magic byte)
|
||||
48 = first digit of version number
|
||||
*/
|
||||
|
||||
esp_err_t errReturn = ESP_OK;
|
||||
bool bImageStartOffsetFound = false;
|
||||
uint32_t u32DataIndex = 0;
|
||||
uint32_t u32FirstDotOffset = 0;
|
||||
uint32_t u32SecondDotOffset = 0;
|
||||
uint8_t u8FirstDotIndex = 0;
|
||||
uint8_t u8SecondDotIndex = 0;
|
||||
|
||||
*pu32StartOffset = 0U; //reset offset to zero
|
||||
|
||||
while((u32DataIndex < *pu32DataLenght) && (bImageStartOffsetFound == false))
|
||||
{
|
||||
//search for magic byte
|
||||
if(pu8Data[u32DataIndex] == 0xe9)
|
||||
{
|
||||
//magic byte found
|
||||
while ((u8FirstDotIndex < 3) && (u32FirstDotOffset == 0))
|
||||
{
|
||||
//search first dot in version number
|
||||
if((u32DataIndex+49+u8FirstDotIndex) < *pu32DataLenght)
|
||||
{
|
||||
if((pu8Data[(u32DataIndex+49+u8FirstDotIndex)] == 0x2e))
|
||||
{
|
||||
//first dot found
|
||||
u32FirstDotOffset = (u32DataIndex+49+u8FirstDotIndex);
|
||||
}
|
||||
}
|
||||
u8FirstDotIndex++;
|
||||
}
|
||||
|
||||
while ((u8SecondDotIndex < 3) && (u32SecondDotOffset == 0) && (u32FirstDotOffset != 0))
|
||||
{
|
||||
//search first dot in version number
|
||||
if((u32FirstDotOffset+(u8SecondDotIndex+2)) < *pu32DataLenght)
|
||||
{
|
||||
if((pu8Data[(u32FirstDotOffset+(u8SecondDotIndex+2))] == 0x2e))
|
||||
{
|
||||
//second dot found
|
||||
u32SecondDotOffset = (u32FirstDotOffset+(u8SecondDotIndex+2));
|
||||
}
|
||||
}
|
||||
u8SecondDotIndex++;
|
||||
}
|
||||
|
||||
if((u32FirstDotOffset != 0) && (u32SecondDotOffset != 0))
|
||||
{
|
||||
//image start found based on magic byte and version number systax
|
||||
*pu32StartOffset = u32DataIndex; //store image start offset
|
||||
bImageStartOffsetFound = true;
|
||||
}
|
||||
else
|
||||
{
|
||||
// this is propably not the magic byte --> reset
|
||||
u32FirstDotOffset = 0;
|
||||
u32SecondDotOffset = 0;
|
||||
u8FirstDotIndex = 0;
|
||||
u8SecondDotIndex = 0;
|
||||
}
|
||||
}
|
||||
u32DataIndex++;
|
||||
}
|
||||
|
||||
if(bImageStartOffsetFound == false)
|
||||
{
|
||||
errReturn = ESP_ERR_NOT_FOUND;
|
||||
}
|
||||
|
||||
return errReturn;
|
||||
}
|
||||
|
||||
esp_err_t errExtractVersionNumber(const char* pu8Data, uint32_t* pu32DataLenght, char* pc8RemoteVersionNumber)
|
||||
{
|
||||
uint32_t u32StartOffset;
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
strcpy(pc8RemoteVersionNumber, "999.999.999"); //init value
|
||||
err = errFindImageStart(pu8Data, pu32DataLenght, &u32StartOffset); //get image start offset
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//image found
|
||||
strncpy(pc8RemoteVersionNumber, pu8Data+(u32StartOffset+48), 11); //copy version number
|
||||
pc8RemoteVersionNumber[12] = '\0';
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
void vPrintOTAProgress(const uint32_t* const pu32TotalImageSize, const uint32_t* const pu32BytesWritten, OTA_MESH_ROLE_t eRole)
|
||||
{
|
||||
uint32_t u32Percentage = 0U;
|
||||
static uint32_t u32LastPercentage = 0U;
|
||||
|
||||
if((*pu32BytesWritten) >= (*pu32TotalImageSize))
|
||||
{
|
||||
u32Percentage = 100;
|
||||
}
|
||||
else
|
||||
{
|
||||
u32Percentage = (uint32_t) (((float) (*pu32BytesWritten)/(float) (*pu32TotalImageSize)) * 100.0);
|
||||
}
|
||||
|
||||
if((u32Percentage-u32LastPercentage) >= OTA_PROGRESS_LOG_INTERVAL)
|
||||
{
|
||||
if(eRole == Transmitter)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "Transmitting OTA update: %i %%", u32Percentage);
|
||||
}
|
||||
|
||||
if(eRole == Receiver)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "Receiving OTA update: %i %%", u32Percentage);
|
||||
}
|
||||
|
||||
|
||||
|
||||
u32LastPercentage = u32Percentage;
|
||||
}
|
||||
}
|
||||
|
||||
void vAddAllNeighboursToQueue(void)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
mesh_addr_t addrParent; //addr of parent node
|
||||
mesh_addr_t childrenAddr[CONFIG_MESH_ROUTE_TABLE_SIZE]; //array of children attached to this node
|
||||
uint16_t u16ChildrenSize = 0U; //number of children attached to this node
|
||||
|
||||
err = errGetParentNode(&addrParent);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
vAddNodeToPossibleUpdatableQueue(addrParent.addr);
|
||||
ESP_LOGI(LOG_TAG, "added parent");
|
||||
}
|
||||
|
||||
err = ESP_OK; //reset error code
|
||||
|
||||
ERROR_CHECK(errGetChildren(childrenAddr, &u16ChildrenSize)); //get all children
|
||||
|
||||
for (uint16_t u16Index = 0; ((u16Index < u16ChildrenSize) && (err == ESP_OK)); u16Index++)
|
||||
{
|
||||
vAddNodeToPossibleUpdatableQueue(childrenAddr[u16Index].addr);
|
||||
ESP_LOGI(LOG_TAG, "added child");
|
||||
}
|
||||
}
|
||||
|
||||
esp_err_t errSendOTAVersionResponse(mesh_addr_t* pMeshReceiverAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t packet;
|
||||
packet.type = OTA_Version_Response;
|
||||
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadata from boot partition
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadate of partition
|
||||
memcpy(&packet.au8Payload, &bootPartitionDesc.version, 12); //copy local version to OTA_Version_Response packet
|
||||
err = errSendMeshPacket(pMeshReceiverAddr, &packet);
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errSendOTAVersionRequest(mesh_addr_t* pMeshReceiverAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t packet;
|
||||
packet.type = OTA_Version_Request;
|
||||
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadata from boot partition
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadate of partition
|
||||
memcpy(&packet.au8Payload, &bootPartitionDesc.version, 12); //copy local version to OTA_Version_Request packet
|
||||
err = errSendMeshPacket(pMeshReceiverAddr, &packet);
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errOTAMeshTransmit(mesh_addr_t* pMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
MESH_PACKET_t sMeshPacket; //packet for sending and receiving
|
||||
uint32_t u32Index = 0U; //index for partition read offset
|
||||
bool bAbort = false; //abort the OTA process
|
||||
bool bNodeIsResponding = false; //remote node is still active
|
||||
uint32_t u32OTABytesWritten = 0U;
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
|
||||
//loop through partition to read in segmensts until end or error or abort called
|
||||
while( ((OTA_MESH_SEGMENT_SIZE * u32Index) < pBootPartition->size) && (err == ESP_OK) && (bAbort == false))
|
||||
{
|
||||
bNodeIsResponding = false; //reset to default
|
||||
|
||||
// read partition with offset based in index
|
||||
ERROR_CHECK(esp_partition_read(pBootPartition, (OTA_MESH_SEGMENT_SIZE * u32Index), sMeshPacket.au8Payload, OTA_MESH_SEGMENT_SIZE));
|
||||
u32OTABytesWritten = ((u32Index+1) * OTA_MESH_SEGMENT_SIZE);
|
||||
vPrintOTAProgress(&(pBootPartition->size), &u32OTABytesWritten, Transmitter);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//no error while read --> send OTA_DATA packet
|
||||
sMeshPacket.type = OTA_Data;
|
||||
|
||||
if((OTA_MESH_SEGMENT_SIZE * (u32Index+1)) >= pBootPartition->size) //check if last segment
|
||||
{
|
||||
//last partition image segment --> send OTA_Complete
|
||||
sMeshPacket.type = OTA_Complete;
|
||||
}
|
||||
|
||||
err = errSendMeshPacket(pMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
else
|
||||
{
|
||||
// error while read --> send OTA_ABORT and abort this OTA process
|
||||
sMeshPacket.type = OTA_Abort;
|
||||
bAbort = true;
|
||||
errSendMeshPacket(pMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
|
||||
// loop through all OTA messages or until abort is called or error
|
||||
for (uint32_t u32Index = 0; ((u32Index < QUEUE_MESSAGE_OTA_SIZE) && (bAbort == false) && (err == ESP_OK)); u32Index++) //loop through all OTA messages
|
||||
{
|
||||
if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
{
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sMeshPacket, ((3000) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (bCheckMACEquality(sMeshPacket.meshSenderAddr.addr, pMeshNodeAddr->addr))) //if OTA_Version_Request
|
||||
{
|
||||
//packet from node received
|
||||
switch (sMeshPacket.type)
|
||||
{
|
||||
case OTA_ACK: //increase index for next round
|
||||
u32Index++;
|
||||
bNodeIsResponding = true;
|
||||
break;
|
||||
case OTA_Abort: //abort this OTA process
|
||||
bAbort = true;
|
||||
bNodeIsResponding = true;
|
||||
break;
|
||||
default:
|
||||
//receives wrong OTA message type from node --> back to queue
|
||||
vAddOTAControllMessageToQueue(&sMeshPacket);
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if (err == ESP_OK)
|
||||
{
|
||||
//received from wrong node --> back to queue
|
||||
vAddOTAControllMessageToQueue(&sMeshPacket);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
// OTA Message queue is empty --> wait some time
|
||||
vTaskDelay( (1000/QUEUE_MESSAGE_OTA_SIZE) / portTICK_PERIOD_MS);
|
||||
}
|
||||
|
||||
}//end OTA message loop
|
||||
|
||||
if(bNodeIsResponding == false)
|
||||
{
|
||||
//no abort was called but node didn’t responded
|
||||
bAbort = true;
|
||||
err = ESP_FAIL; //this OTA process failed with error
|
||||
}
|
||||
}//end of partition segment loop
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errOTAMeshReceive(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t sMeshPacket; //packet for sending and receiving
|
||||
bool bComplete = false; //complete the OTA process
|
||||
bool bAbort = false; //abort the OTA process
|
||||
bool bNodeIsResponding = false; //remote node is still active
|
||||
uint32_t u32OTABytesWritten = 0U; //counter unsed for progress log
|
||||
static esp_ota_handle_t otaHandle; //OTA process handle
|
||||
*pbNewOTAImage = false;
|
||||
|
||||
ERROR_CHECK(esp_ota_begin(pOTAPartition, OTA_SIZE_UNKNOWN, &otaHandle)); //start ota update process
|
||||
|
||||
//partition segement loop through partition to read in segmensts until end or error or abort called
|
||||
while((bComplete == false) && (err == ESP_OK) && (bAbort == false) && (u32OTABytesWritten <= pOTAPartition->size))
|
||||
{
|
||||
bNodeIsResponding = false; //reset to default
|
||||
|
||||
// loop through all OTA messages or until abort is called
|
||||
for (uint32_t u32Index = 0; ((u32Index < QUEUE_MESSAGE_OTA_SIZE) && (bAbort == false)); u32Index++) //loop through all OTA messages
|
||||
{
|
||||
if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
{
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sMeshPacket, ((3000) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (bCheckMACEquality(sMeshPacket.meshSenderAddr.addr, pMeshNodeAddr->addr))) //if OTA_Version_Request
|
||||
{
|
||||
//packet from node received
|
||||
switch (sMeshPacket.type)
|
||||
{
|
||||
case OTA_Complete: //signal end of this OTA process, fall through because same behavior as OTA_Data
|
||||
bComplete = true;
|
||||
//fall through
|
||||
case OTA_Data: //data segement received
|
||||
bNodeIsResponding = true;
|
||||
ERROR_CHECK(esp_ota_write(otaHandle, sMeshPacket.au8Payload, OTA_MESH_SEGMENT_SIZE));
|
||||
u32OTABytesWritten = ((u32Index+1) * OTA_MESH_SEGMENT_SIZE);
|
||||
vPrintOTAProgress(&(pOTAPartition->size), &u32OTABytesWritten, Receiver);
|
||||
break;
|
||||
case OTA_Abort: //abort this OTA process
|
||||
bAbort = true;
|
||||
bNodeIsResponding = true;
|
||||
break;
|
||||
default:
|
||||
//receives wrong OTA message type from node --> back to queue
|
||||
vAddOTAControllMessageToQueue(&sMeshPacket);
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if (err == ESP_OK)
|
||||
{
|
||||
//received from wrong node --> back to queue
|
||||
vAddOTAControllMessageToQueue(&sMeshPacket);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
// OTA Message queue is empty --> wait some time
|
||||
vTaskDelay( (1000/QUEUE_MESSAGE_OTA_SIZE) / portTICK_PERIOD_MS);
|
||||
}
|
||||
|
||||
}//end of OTA message loop
|
||||
|
||||
if(bNodeIsResponding == false)
|
||||
{
|
||||
//no abort was called but node didn’t responded --> error
|
||||
bAbort = true; //this will stop the partition segement loop
|
||||
err = ESP_FAIL; //this OTA process failed with error
|
||||
}
|
||||
else
|
||||
{
|
||||
//node has responded with OTA_DATA or OTA_Complete or OTA_ABORT
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
|
||||
if(bAbort == false)
|
||||
{
|
||||
//no error while ota write --> send OTA_ACK packet
|
||||
sMeshPacket.type = OTA_ACK;
|
||||
err = errSendMeshPacket(pMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
// error while read --> send OTA_ABORT and abort this OTA process
|
||||
sMeshPacket.type = OTA_Abort;
|
||||
bAbort = true;
|
||||
errSendMeshPacket(pMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
}
|
||||
}//end of partition segement loop
|
||||
|
||||
if(bComplete == true)
|
||||
{
|
||||
//all OTA segments received --> validate
|
||||
ERROR_CHECK(esp_ota_end(otaHandle));
|
||||
ERROR_CHECK(esp_ota_set_boot_partition(pOTAPartition));
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//successfully updated OTA partition
|
||||
*pbNewOTAImage = true;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
//not all OTA segments received --> abort this OTA process
|
||||
ERROR_CHECK(esp_ota_abort(otaHandle));
|
||||
ESP_LOGI(LOG_TAG, "OTA-Master: connected and NOT responding --> add node back to queue ");
|
||||
vMeshOtaUtilAddNodeToPossibleUpdatableQueue(cpcMeshNodeAddr->addr);
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
|
|
@ -0,0 +1,22 @@
|
|||
/**
|
||||
* @file Mesh_OTA_Globals.c
|
||||
* @brief global variables unsed in Mesh_OTA
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
|
||||
#include "Mesh_OTA_Globals.h"
|
||||
|
||||
xQueueHandle queueNodes; //nodes that should be checked for ota update (contains children and parent)
|
||||
xQueueHandle queueMessageOTA; //mesh ota controll messages like "OTA_Version_Response" "OTA_ACK"
|
||||
|
||||
SemaphoreHandle_t bsStartStopServerWorker; //binary semaphore
|
||||
SemaphoreHandle_t bsOTAProcess; //binary semaphore
|
||||
|
||||
//w: errMeshOTAInitialize;
|
||||
//r: errMeshOTAInitialize; errMeshOtaPartitionAccessHttps; errMeshOtaPartitionAccessMeshReceive;
|
||||
const esp_partition_t* pOTAPartition; //pointer to ota partition
|
||||
|
||||
//w: errMeshOTAInitialize; vMeshOtaTaskOTAWorker; vMeshOtaTaskServerWorker
|
||||
//r: errMeshOTAInitialize; vMeshOtaTaskOTAWorker; vMeshOtaTaskServerWorker
|
||||
bool bWantReboot; //flag to signal pending reboot
|
|
@ -0,0 +1,341 @@
|
|||
/**
|
||||
* @file Mesh_OTA_Partition_Access.c
|
||||
* @brief Write and read partition if requested from Mesh_OTA
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Additional Infos: Write image via HTTPS
|
||||
* Receive or transmit via Mesh
|
||||
*/
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
#include "Mesh_OTA_Util.h"
|
||||
#include "Mesh_OTA_Globals.h"
|
||||
#include "Mesh_OTA_Partition_Access.h"
|
||||
|
||||
static const char *LOG_TAG = "mesh_ota_partition_access";
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaPartitionAccessHttps(bool* const cpbNewOTAImage)
|
||||
* @brief Downloads and writes the image from the server to partition
|
||||
* @param cpbNewOTAImage pointer to boolean to signal if a new image was successfully received
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Checks if the image on server is newer
|
||||
* Downloads the image in segements
|
||||
* Handles OTA process
|
||||
*/
|
||||
esp_err_t errMeshOtaPartitionAccessHttps(bool* const cpbNewOTAImage)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
char u8OTABuffer[OTA_HTTPS_SEGMENT_SIZE]; //store image segment from server before ota write
|
||||
uint32_t u32BufferLenght = OTA_HTTPS_SEGMENT_SIZE; //size of buffer
|
||||
uint32_t u32BytesRead = 0; //number of bytes that are read from server, <= u32BufferLenght
|
||||
char pcRemoteVersionNumber[12]; //string for version number in server image
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
static esp_ota_handle_t otaHandle; //OTA process handle
|
||||
uint32_t u32StartOffset = 0U; //start offset for image (exclude the http response data)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadate from boot partition
|
||||
uint32_t u32OTABytesWritten = 0U; //counter unsed for progress log
|
||||
|
||||
ERROR_CHECK(errHTTPSClientRetrieveData(u8OTABuffer, &u32BufferLenght, &u32BytesRead)); //read first bytes if image, including the version
|
||||
|
||||
ERROR_CHECK(errMeshOtaUtilExtractVersionNumber(u8OTABuffer, &u32BytesRead, pcRemoteVersionNumber)); //extract version numbers
|
||||
|
||||
//check if version number is found
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
xSemaphoreTake(bsOTAProcess, portMAX_DELAY); //wait for binary semaphore that allows to start the OTA process
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
|
||||
if(bMeshOtaUtilNewerVersion((bootPartitionDesc).version, pcRemoteVersionNumber)) //compare local and remote version
|
||||
{
|
||||
// server image is newer --> OTA update required
|
||||
ESP_LOGI(LOG_TAG, "Server: image is newer --> OTA update required");
|
||||
|
||||
ERROR_CHECK(errMeshOtaUtilFindImageStart(u8OTABuffer, &u32BufferLenght, &u32StartOffset)); //get image start offset
|
||||
ERROR_CHECK(esp_ota_begin(pOTAPartition, OTA_SIZE_UNKNOWN, &otaHandle)); //start ota update process
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//image download and ota partition write
|
||||
ESP_LOGI(LOG_TAG, "start OTA download via HTTPS");
|
||||
do
|
||||
{
|
||||
vMeshOtaUtilPrintOtaProgress(&(pOTAPartition->size), &u32OTABytesWritten, Receiver);
|
||||
ERROR_CHECK(esp_ota_write(otaHandle, (const void*) u8OTABuffer+u32StartOffset, (u32BytesRead-u32StartOffset)));
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//write was succsesfull
|
||||
u32StartOffset = 0U; //reset the offset for next download
|
||||
ERROR_CHECK(errHTTPSClientRetrieveData(u8OTABuffer, &u32BufferLenght, &u32BytesRead)); //download next data segment
|
||||
u32OTABytesWritten = u32OTABytesWritten + u32BytesRead; //update counter
|
||||
}
|
||||
}
|
||||
//loop until error or complete image downloaded
|
||||
while ((u32BytesRead > 0) && (err == ESP_OK) && (u32OTABytesWritten <= pOTAPartition->size));
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//no error occurred --> finish ota update process
|
||||
ERROR_CHECK(esp_ota_end(otaHandle)); //finish process
|
||||
ERROR_CHECK(esp_ota_set_boot_partition(pOTAPartition)); //set new image as boot
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
*cpbNewOTAImage = true; //image validated
|
||||
vMeshOtaUtilAddAllNeighboursToQueue(NULL); //add all existing neighbours to queue (aparent will not be added because this node is the root)
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
//error occurred --> abort ota update process
|
||||
ESP_LOGE(LOG_TAG, "abort OTA process due to error 0x%x -> %s", err, esp_err_to_name(err));
|
||||
ERROR_CHECK(esp_ota_abort(otaHandle));
|
||||
*cpbNewOTAImage = false; //ota update failed
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "server image is NOT newer --> OTA update NOT required");
|
||||
}
|
||||
xSemaphoreGive(bsOTAProcess); //free binary semaphore, this allows other tasks to start the OTA process
|
||||
} //end version number extracted
|
||||
return err;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaPartitionAccessMeshTransmit(const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
* @brief Reads the local image and sends it to node
|
||||
* @param cpcMeshNodeAddr pointer to mesh node addr to send the image segments to
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Reads the newest OTA image in segments
|
||||
* Sends the image to mesh node in segments
|
||||
* Handles OTA process
|
||||
*/
|
||||
esp_err_t errMeshOtaPartitionAccessMeshTransmit(const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
const esp_partition_t* pBootPartition = NULL; //pointer to boot partition (that will booted after reset)
|
||||
MESH_PACKET_t sMeshPacket; //packet for sending and receiving
|
||||
// uint32_t u32Index = 0U; //index for partition read offset
|
||||
bool bAbort = false; //abort the OTA process
|
||||
bool bNodeIsResponding = false; //remote node is still active
|
||||
uint32_t u32OTABytesWritten = 0U; //counter of bytes unsed for progress log
|
||||
uint32_t u32SegmentCounter = 0U; //counter of segments unsed for progress log
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
|
||||
//loop through partition to read in segmensts until end or error or abort called
|
||||
while( ((OTA_MESH_SEGMENT_SIZE * u32SegmentCounter) < pBootPartition->size) && (err == ESP_OK) && (bAbort == false))
|
||||
{
|
||||
bNodeIsResponding = false; //reset to default for this loop
|
||||
|
||||
// read partition with offset based in index
|
||||
ERROR_CHECK(esp_partition_read(pBootPartition, (OTA_MESH_SEGMENT_SIZE * u32SegmentCounter), sMeshPacket.au8Payload, OTA_MESH_SEGMENT_SIZE));
|
||||
u32OTABytesWritten = ((u32SegmentCounter+1) * OTA_MESH_SEGMENT_SIZE); //calc bytes that are written in this ota process
|
||||
vMeshOtaUtilPrintOtaProgress(&(pBootPartition->size), &u32OTABytesWritten, Transmitter);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//no error while read --> send OTA_DATA packet
|
||||
sMeshPacket.type = OTA_Data;
|
||||
|
||||
if((OTA_MESH_SEGMENT_SIZE * (u32SegmentCounter+1)) >= pBootPartition->size) //check if last segment
|
||||
{
|
||||
//last partition image segment --> send OTA_Complete
|
||||
ESP_LOGI(LOG_TAG, "OTA-TX: last segment--> send Complete");
|
||||
sMeshPacket.type = OTA_Complete;
|
||||
}
|
||||
|
||||
err = errMeshNetworkSendMeshPacket(cpcMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
else
|
||||
{
|
||||
// error while read --> send OTA_ABORT and abort this OTA process
|
||||
sMeshPacket.type = OTA_Abort;
|
||||
bAbort = true;
|
||||
ESP_LOGE(LOG_TAG, "OTA-TX: error while read --> send ABORT");
|
||||
errMeshNetworkSendMeshPacket(cpcMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
|
||||
// loop through all OTA messages or until abort is called or error
|
||||
for (uint32_t u32Index = 0; ((u32Index < QUEUE_MESSAGE_OTA_SIZE) && (bAbort == false) && (err == ESP_OK)); u32Index++) //loop through all OTA messages
|
||||
{
|
||||
//get OTA message from queue
|
||||
if (xQueueReceive(queueMessageOTA, &sMeshPacket, ((OTA_MESH_TIMEOUT) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
//check if from correct node
|
||||
if((err == ESP_OK) && (bMeshNetworkCheckMacEquality(sMeshPacket.meshSenderAddr.addr, cpcMeshNodeAddr->addr)))
|
||||
{
|
||||
//packet from node received --> handle it
|
||||
switch (sMeshPacket.type)
|
||||
{
|
||||
case OTA_ACK: //start next loop for segment
|
||||
bNodeIsResponding = true;
|
||||
u32Index = QUEUE_MESSAGE_OTA_SIZE; //this will end the loop through all OTA messages
|
||||
break;
|
||||
case OTA_Abort: //abort this OTA process
|
||||
bAbort = true;
|
||||
bNodeIsResponding = true;
|
||||
break;
|
||||
default:
|
||||
ESP_LOGI(LOG_TAG, "OTA-TX: no ACK or ABORT message received");
|
||||
break;
|
||||
}
|
||||
}
|
||||
}//end OTA message loop
|
||||
|
||||
if(bNodeIsResponding == false)
|
||||
{
|
||||
//no abort was called but node didn’t responded
|
||||
ESP_LOGE(LOG_TAG, "OTA-TX: no abort was called but node didn’t responded --> error");
|
||||
bAbort = true;
|
||||
err = ESP_FAIL; //this OTA process failed with error
|
||||
}
|
||||
u32SegmentCounter++;
|
||||
}//end of partition segment loop
|
||||
vMeshOtaUtilClearOtaMessageQueue(cpcMeshNodeAddr); //remove all OTA messages from remote node
|
||||
return err;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaPartitionAccessMeshReceive(bool* const cpbNewOTAImage, const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
* @brief Downloads and writes the image from the remote node
|
||||
* @param cpbNewOTAImage pointer to boolean to signal if a new image was successfully received
|
||||
* @param cpcMeshNodeAddr pointer to mesh node addr to receive the image segments from
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Receives the images segments from remote node
|
||||
* Writtes segments to OTA partition
|
||||
* Handles OTA process
|
||||
*/
|
||||
esp_err_t errMeshOtaPartitionAccessMeshReceive(bool* const cpbNewOTAImage, const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t sMeshPacket; //packet for sending and receiving
|
||||
bool bComplete = false; //complete the OTA process
|
||||
bool bAbort = false; //abort the OTA process
|
||||
bool bNodeIsResponding = false; //remote node is still active
|
||||
uint32_t u32OTABytesWritten = 0U; //counter unsed for progress log
|
||||
static esp_ota_handle_t otaHandle; //OTA process handle
|
||||
*cpbNewOTAImage = false; //set default to false
|
||||
uint32_t u32SegmentCounter = 0U; //counter of segments unsed for progress log
|
||||
|
||||
ERROR_CHECK(esp_ota_begin(pOTAPartition, OTA_SIZE_UNKNOWN, &otaHandle)); //start ota update process
|
||||
|
||||
//partition segement loop through partition to read in segmensts until end or error or abort called
|
||||
while((bComplete == false) && (err == ESP_OK) && (bAbort == false) && (u32OTABytesWritten <= pOTAPartition->size))
|
||||
{
|
||||
bNodeIsResponding = false; //reset to default
|
||||
|
||||
// loop through all OTA messages or until abort is called
|
||||
for (uint32_t u32Index = 0; ((u32Index < QUEUE_MESSAGE_OTA_SIZE) && (bAbort == false)); u32Index++) //loop through all OTA messages
|
||||
{
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sMeshPacket, ((OTA_MESH_TIMEOUT) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (bMeshNetworkCheckMacEquality(sMeshPacket.meshSenderAddr.addr, cpcMeshNodeAddr->addr))) //if OTA_Version_Request
|
||||
{
|
||||
//packet from node received
|
||||
switch (sMeshPacket.type)
|
||||
{
|
||||
case OTA_Complete: //signal end of this OTA process, fall through because same behavior as OTA_Data
|
||||
bComplete = true;
|
||||
//fall through
|
||||
case OTA_Data: //data segement received
|
||||
bNodeIsResponding = true;
|
||||
ERROR_CHECK(esp_ota_write(otaHandle, sMeshPacket.au8Payload, OTA_MESH_SEGMENT_SIZE));
|
||||
u32OTABytesWritten = ((u32SegmentCounter+1) * OTA_MESH_SEGMENT_SIZE); //calc bytes that are written in this ota process
|
||||
vMeshOtaUtilPrintOtaProgress(&(pOTAPartition->size), &u32OTABytesWritten, Receiver);
|
||||
u32Index = QUEUE_MESSAGE_OTA_SIZE; //this will end the loop through all OTA messages
|
||||
break;
|
||||
case OTA_Abort: //abort this OTA process
|
||||
ESP_LOGE(LOG_TAG, "OTA-RX: receives abort");
|
||||
bAbort = true;
|
||||
bNodeIsResponding = true;
|
||||
ESP_LOGE(LOG_TAG, "OTA-RX: receives abort --> abort this OTA process on this node");
|
||||
//this will end the loop through all OTA messages
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if (err == ESP_OK)
|
||||
{
|
||||
//received from wrong node --> back to queue
|
||||
vMeshOtaUtilAddOtaMessageToQueue(&sMeshPacket);
|
||||
}
|
||||
}//end of OTA message loop
|
||||
|
||||
if(bNodeIsResponding == false)
|
||||
{
|
||||
//no abort was called but node didn’t responded --> error
|
||||
ESP_LOGI(LOG_TAG, "OTA-RX: no abort was called but node didn’t responded --> error");
|
||||
bAbort = true; //this will stop the partition segement loop
|
||||
err = ESP_FAIL; //this OTA process failed with error
|
||||
}
|
||||
else
|
||||
{
|
||||
//node has responded with OTA_DATA or OTA_Complete or OTA_ABORT
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
|
||||
if(bAbort == false)
|
||||
{
|
||||
//no error while ota write --> send OTA_ACK packet
|
||||
sMeshPacket.type = OTA_ACK;
|
||||
err = errMeshNetworkSendMeshPacket(cpcMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
// error while read --> send OTA_ABORT and abort this OTA process
|
||||
sMeshPacket.type = OTA_Abort;
|
||||
bAbort = true;
|
||||
ESP_LOGI(LOG_TAG, "OTA-RX: abort --> send ABORT");
|
||||
errMeshNetworkSendMeshPacket(cpcMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
}
|
||||
u32SegmentCounter++;
|
||||
}//end of partition segement loop
|
||||
|
||||
if(bComplete == true)
|
||||
{
|
||||
//all OTA segments received --> validate
|
||||
ESP_LOGI(LOG_TAG, "OTA-RX: validate image ");
|
||||
ERROR_CHECK(esp_ota_end(otaHandle)); //validate image
|
||||
ERROR_CHECK(esp_ota_set_boot_partition(pOTAPartition));
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//successfully updated OTA partition
|
||||
*cpbNewOTAImage = true;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
//not all OTA segments received --> abort this OTA process
|
||||
ERROR_CHECK(esp_ota_abort(otaHandle));
|
||||
}
|
||||
vMeshOtaUtilClearOtaMessageQueue(cpcMeshNodeAddr);
|
||||
return err;
|
||||
}
|
||||
|
|
@ -0,0 +1,466 @@
|
|||
/**
|
||||
* @file Mesh_OTA_Util.c
|
||||
* @brief Utility and helper functions to perfrom mesh OTA updates
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
|
||||
#include "Mesh_OTA_Util.h"
|
||||
#include "Mesh_OTA_Globals.h"
|
||||
|
||||
static const char *LOG_TAG = "mesh_ota";
|
||||
|
||||
/**
|
||||
* @fn bool bMeshOtaUtilNewerVersion(const char* cpu8Local, const char* cpu8Remote)
|
||||
* @brief compares to version strings
|
||||
* @param cpu8Local local image version string
|
||||
* @param cpu8Remote remote image version string
|
||||
* @return bool
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Returns true if remote is newer
|
||||
*/
|
||||
bool bMeshOtaUtilNewerVersion(const char* cpu8Local, const char* cpu8Remote)
|
||||
{
|
||||
char u8LocalTmp[12]; //local version
|
||||
char u8RemoteTmp[12]; //remote version
|
||||
char* pu8saveptrLocal = NULL; //context for strok_r
|
||||
char* pu8saveptrRemote = NULL; //context for strok_r
|
||||
bool bReturn = false; //flag to stop loop
|
||||
uint8_t u8Index = 0; //numbers counter in version string
|
||||
|
||||
strncpy(u8LocalTmp, cpu8Local, 12); //copy in tmp
|
||||
strncpy(u8RemoteTmp, cpu8Remote, 12); //copy in tmp
|
||||
|
||||
char* pu8TokenLocal = strtok_r(u8LocalTmp, ".", &pu8saveptrLocal); //split tokens
|
||||
char* pu8TokenRemote = strtok_r(u8RemoteTmp, ".", &pu8saveptrRemote); //split tokens
|
||||
|
||||
while( (u8Index <= 2) && (bReturn == false)) //loop through tokens
|
||||
{
|
||||
u8Index++;
|
||||
if(atoi(pu8TokenLocal) < atoi(pu8TokenRemote))
|
||||
{
|
||||
bReturn = true; //version number difference --> stop loop
|
||||
}
|
||||
pu8TokenLocal = strtok_r(NULL, ".", &pu8saveptrLocal); //split tokens
|
||||
pu8TokenRemote = strtok_r(NULL, ".", &pu8saveptrRemote); //split tokens
|
||||
}
|
||||
return bReturn;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaUtilExtractVersionNumber(const char* cpu8Data, uint32_t* const cpcu32DataLenght, char* const pc8RemoteVersionNumber)
|
||||
* @brief extract version number from image data
|
||||
* @param cpu8Data image data buffer
|
||||
* @param cpcu32DataLenght pointer to lenght of image data
|
||||
* @param pc8RemoteVersionNumber pointer version number
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutters
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Search version number in raw image data
|
||||
*/
|
||||
esp_err_t errMeshOtaUtilExtractVersionNumber(const char* cpu8Data, uint32_t* const cpcu32DataLenght, char* const pc8RemoteVersionNumber)
|
||||
{
|
||||
uint32_t u32StartOffset;
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
strcpy(pc8RemoteVersionNumber, "999.999.999"); //init value
|
||||
err = errMeshOtaUtilFindImageStart(cpu8Data, cpcu32DataLenght, &u32StartOffset); //get image start offset
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//image found
|
||||
strncpy(pc8RemoteVersionNumber, cpu8Data+(u32StartOffset+48), 11); //copy version number
|
||||
pc8RemoteVersionNumber[12] = '\0';
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaUtilFindImageStart(const char* const cpu8Data, const uint32_t* const cpcu32DataLenght, uint32_t* const cpu32StartOffset)
|
||||
* @brief find start offset from image raw data
|
||||
* @param cpu8Data image data buffer
|
||||
* @param cpcu32DataLenght pointer to lenght of image data
|
||||
* @param cpu32StartOffset pointer to determined offset
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Search offset in raw image data from server (exclude HTTP response)
|
||||
*/
|
||||
esp_err_t errMeshOtaUtilFindImageStart(const char* const cpu8Data, const uint32_t* const cpcu32DataLenght, uint32_t* const cpu32StartOffset)
|
||||
{
|
||||
|
||||
// Offset value
|
||||
// 0 = 0xE9 (first byte in image --> magic byte)
|
||||
// 48 = first digit of version number
|
||||
|
||||
esp_err_t errReturn = ESP_OK;
|
||||
bool bImageStartOffsetFound = false;
|
||||
uint32_t u32DataIndex = 0;
|
||||
uint32_t u32FirstDotOffset = 0;
|
||||
uint32_t u32SecondDotOffset = 0;
|
||||
uint8_t u8FirstDotIndex = 0;
|
||||
uint8_t u8SecondDotIndex = 0;
|
||||
|
||||
*cpu32StartOffset = 0U; //reset offset to zero
|
||||
|
||||
while((u32DataIndex < *cpcu32DataLenght) && (bImageStartOffsetFound == false))
|
||||
{
|
||||
//search for magic byte
|
||||
if(cpu8Data[u32DataIndex] == 0xe9)
|
||||
{
|
||||
//magic byte found
|
||||
while ((u8FirstDotIndex < 3) && (u32FirstDotOffset == 0))
|
||||
{
|
||||
//search first dot in version number
|
||||
if((u32DataIndex+49+u8FirstDotIndex) < *cpcu32DataLenght)
|
||||
{
|
||||
if((cpu8Data[(u32DataIndex+49+u8FirstDotIndex)] == 0x2e))
|
||||
{
|
||||
//first dot found
|
||||
u32FirstDotOffset = (u32DataIndex+49+u8FirstDotIndex);
|
||||
}
|
||||
}
|
||||
u8FirstDotIndex++;
|
||||
}
|
||||
|
||||
while ((u8SecondDotIndex < 3) && (u32SecondDotOffset == 0) && (u32FirstDotOffset != 0))
|
||||
{
|
||||
//search first dot in version number
|
||||
if((u32FirstDotOffset+(u8SecondDotIndex+2)) < *cpcu32DataLenght)
|
||||
{
|
||||
if((cpu8Data[(u32FirstDotOffset+(u8SecondDotIndex+2))] == 0x2e))
|
||||
{
|
||||
//second dot found
|
||||
u32SecondDotOffset = (u32FirstDotOffset+(u8SecondDotIndex+2));
|
||||
}
|
||||
}
|
||||
u8SecondDotIndex++;
|
||||
}
|
||||
|
||||
if((u32FirstDotOffset != 0) && (u32SecondDotOffset != 0))
|
||||
{
|
||||
//image start found based on magic byte and version number systax
|
||||
*cpu32StartOffset = u32DataIndex; //store image start offset
|
||||
bImageStartOffsetFound = true;
|
||||
}
|
||||
else
|
||||
{
|
||||
// this is propably not the magic byte --> reset
|
||||
u32FirstDotOffset = 0;
|
||||
u32SecondDotOffset = 0;
|
||||
u8FirstDotIndex = 0;
|
||||
u8SecondDotIndex = 0;
|
||||
}
|
||||
}
|
||||
u32DataIndex++;
|
||||
}
|
||||
|
||||
if(bImageStartOffsetFound == false)
|
||||
{
|
||||
errReturn = ESP_ERR_NOT_FOUND;
|
||||
}
|
||||
|
||||
return errReturn;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaUtilSendOtaVersionRequest(const mesh_addr_t* const cpcMeshReceiverAddr)
|
||||
* @brief send OTA_Version_Request to node
|
||||
* @param cpcMeshReceiverAddr node addr
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
esp_err_t errMeshOtaUtilSendOtaVersionRequest(const mesh_addr_t* const cpcMeshReceiverAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t packet;
|
||||
packet.type = OTA_Version_Request;
|
||||
|
||||
const esp_partition_t* pBootPartition = NULL; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadata from boot partition
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadate of partition
|
||||
memcpy(&packet.au8Payload, &bootPartitionDesc.version, 12); //copy local version to OTA_Version_Request packet
|
||||
err = errMeshNetworkSendMeshPacket(cpcMeshReceiverAddr, &packet);
|
||||
return err;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn esp_err_t errMeshOtaUtilSendOtaVersionResponse(const mesh_addr_t* const cpcMeshReceiverAddr)
|
||||
* @brief send OTA_Version_Response to node
|
||||
* @param cpcMeshReceiverAddr node addr
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
esp_err_t errMeshOtaUtilSendOtaVersionResponse(const mesh_addr_t* const cpcMeshReceiverAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t packet;
|
||||
packet.type = OTA_Version_Response;
|
||||
|
||||
const esp_partition_t* pBootPartition = NULL; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadata from boot partition
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadate of partition
|
||||
memcpy(&packet.au8Payload, &bootPartitionDesc.version, 12); //copy local version to OTA_Version_Response packet
|
||||
|
||||
ESP_LOGD(LOG_TAG, "Send OTA_Version_Response to 0x%x", cpcMeshReceiverAddr->addr[5]);
|
||||
|
||||
err = errMeshNetworkSendMeshPacket(cpcMeshReceiverAddr, &packet);
|
||||
return err;
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vMeshOtaUtilPrintOtaProgress(const uint32_t* const cpcu32TotalImageSize, const uint32_t* const cpcu32BytesWritten, const OTA_MESH_ROLE_t ceRole)
|
||||
* @brief print LOG for OTA process progress
|
||||
* @param cpcu32TotalImageSize size of OTA partition
|
||||
* @param cpcu32BytesWritten actual bytes written
|
||||
* @param ceRole role if this OTA process
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaUtilPrintOtaProgress(const uint32_t* const cpcu32TotalImageSize, const uint32_t* const cpcu32BytesWritten, const OTA_MESH_ROLE_t ceRole)
|
||||
{
|
||||
uint32_t u32Percentage = 0U;
|
||||
static uint32_t u32LastPercentage = 0U;
|
||||
|
||||
if((*cpcu32BytesWritten) >= (*cpcu32TotalImageSize))
|
||||
{
|
||||
u32Percentage = 100;
|
||||
}
|
||||
else
|
||||
{
|
||||
u32Percentage = (uint32_t) (((float) (*cpcu32BytesWritten)/(float) (*cpcu32TotalImageSize)) * 100.0);
|
||||
}
|
||||
|
||||
if((u32Percentage-u32LastPercentage) >= OTA_PROGRESS_LOG_INTERVAL)
|
||||
{
|
||||
if(ceRole == Transmitter)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "Transmitting OTA update: %i %%", u32Percentage);
|
||||
}
|
||||
|
||||
if(ceRole == Receiver)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "Receiving OTA update: %i %%", u32Percentage);
|
||||
}
|
||||
|
||||
|
||||
|
||||
u32LastPercentage = u32Percentage;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vMeshOtaUtilAddAllNeighboursToQueue(void)
|
||||
* @brief add all neigbhours (children and parent) to queue, except node used in parameter
|
||||
* @param const mesh_addr_t* const cpcMeshNodeAddr
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaUtilAddAllNeighboursToQueue(const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
mesh_addr_t addrParent; //addr of parent node
|
||||
mesh_addr_t childrenAddr[CONFIG_MESH_ROUTE_TABLE_SIZE]; //array of children attached to this node
|
||||
uint16_t u16ChildrenSize = 0U; //number of children attached to this node
|
||||
|
||||
err = errMeshNetworkGetParentNode(&addrParent);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
if (cpcMeshNodeAddr != NULL)
|
||||
{
|
||||
if((bMeshNetworkCheckMacEquality(addrParent.addr, cpcMeshNodeAddr->addr)))
|
||||
{
|
||||
//same node --> don't add
|
||||
}
|
||||
else
|
||||
{
|
||||
vMeshOtaUtilAddNodeToPossibleUpdatableQueue(addrParent.addr);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
vMeshOtaUtilAddNodeToPossibleUpdatableQueue(addrParent.addr);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
err = ESP_OK; //reset error code
|
||||
|
||||
ERROR_CHECK(errMeshNetworkGetChildren(childrenAddr, &u16ChildrenSize)); //get all children
|
||||
|
||||
for (uint16_t u16Index = 0; ((u16Index < u16ChildrenSize) && (err == ESP_OK)); u16Index++)
|
||||
{
|
||||
if (cpcMeshNodeAddr != NULL)
|
||||
{
|
||||
if((bMeshNetworkCheckMacEquality(childrenAddr[u16Index].addr, cpcMeshNodeAddr->addr)))
|
||||
{
|
||||
//same node --> don't add
|
||||
}
|
||||
else
|
||||
{
|
||||
vMeshOtaUtilAddNodeToPossibleUpdatableQueue(childrenAddr[u16Index].addr);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
vMeshOtaUtilAddNodeToPossibleUpdatableQueue(childrenAddr[u16Index].addr);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vMeshOtaUtilClearOtaMessageQueue(const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
* @brief remode all OTA messages from this node in queue
|
||||
* @param cpcMeshNodeAddr node addr
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaUtilClearOtaMessageQueue(const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
{
|
||||
MESH_PACKET_t sMeshPacket; //packet for sending and receiving
|
||||
for (uint32_t u32Index = 0; (u32Index < QUEUE_MESSAGE_OTA_SIZE); u32Index++) //loop through all OTA messages
|
||||
{
|
||||
if (xQueueReceive(queueMessageOTA, &sMeshPacket, 0) == pdTRUE)
|
||||
{
|
||||
if(!(bMeshNetworkCheckMacEquality(sMeshPacket.meshSenderAddr.addr, cpcMeshNodeAddr->addr)))
|
||||
{
|
||||
//received OTA message is NOT from cpcMeshNodeAddr --> keep it in queue
|
||||
vMeshOtaUtilAddOtaMessageToQueue(&sMeshPacket);
|
||||
}
|
||||
}
|
||||
}//end OTA message loop
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vMeshOtaUtilClearNeighboursQueue(const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
* @brief remode all instances of this node in queue
|
||||
* @param cpcMeshNodeAddr node addr
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaUtilClearNeighboursQueue(const mesh_addr_t* const cpcMeshNodeAddr)
|
||||
{
|
||||
mesh_addr_t sNode; //packet for sending and receiving
|
||||
for (uint32_t u32Index = 0; (u32Index < QUEUE_NODES_SIZE); u32Index++) //loop through all node queue
|
||||
{
|
||||
if (xQueueReceive(queueNodes, &sNode, 0) == pdTRUE)
|
||||
{
|
||||
if((bMeshNetworkCheckMacEquality(sNode.addr, cpcMeshNodeAddr->addr)))
|
||||
{
|
||||
//same node --> don't add again
|
||||
}
|
||||
else
|
||||
{
|
||||
//node is NOT cpcMeshNodeAddr --> keep it in queue
|
||||
vMeshOtaUtilAddNodeToPossibleUpdatableQueue(sNode.addr);
|
||||
}
|
||||
|
||||
}
|
||||
}//end nodes
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vMeshOtaUtilAddNodeToPossibleUpdatableQueue(const uint8_t* const cpcu8MAC)
|
||||
* @brief add node instance to queue
|
||||
* @param cpcu8MAC MAC addr of node
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaUtilAddNodeToPossibleUpdatableQueue(const uint8_t* const cpcu8MAC)
|
||||
{
|
||||
//send payload to node queues
|
||||
mesh_addr_t addrNode;
|
||||
memcpy(&addrNode.addr, (uint8_t *)cpcu8MAC, 6); //copy MAC
|
||||
|
||||
if (xQueueSend(queueNodes, &addrNode, portMAX_DELAY) != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to push node into node queue");
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGD(LOG_TAG, "added node \"%x:%x:%x:%x:%x:%x\" to possible updatable queue", addrNode.addr[0], addrNode.addr[1], addrNode.addr[2], addrNode.addr[3], addrNode.addr[4], addrNode.addr[5]);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vMeshOtaUtilAddOtaMessageToQueue(const MESH_PACKET_t* const cpcuMeshPacket)
|
||||
* @brief add OTA message to queue
|
||||
* @param cpcuMeshPacket OTA message
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaUtilAddOtaMessageToQueue(const MESH_PACKET_t* const cpcuMeshPacket)
|
||||
{
|
||||
//send ota packet to packet queue
|
||||
if (xQueueSend(queueMessageOTA, cpcuMeshPacket, portMAX_DELAY) != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to push ota packet into packet queue");
|
||||
}
|
||||
else
|
||||
{
|
||||
switch (cpcuMeshPacket->type)
|
||||
{
|
||||
case OTA_Abort:
|
||||
ESP_LOGD(LOG_TAG, "added ota message to queue: OTA_Abort from 0x%x", cpcuMeshPacket->meshSenderAddr.addr[5]);
|
||||
break;
|
||||
case OTA_Version_Request:
|
||||
ESP_LOGD(LOG_TAG, "added ota message to queue: OTA_Version_Request from 0x%x", cpcuMeshPacket->meshSenderAddr.addr[5]);
|
||||
break;
|
||||
|
||||
case OTA_Version_Response:
|
||||
ESP_LOGD(LOG_TAG, "added ota message to queue: OTA_Version Response from 0x%x", cpcuMeshPacket->meshSenderAddr.addr[5]);
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vMeshOtaUtilChangeStateOfServerWorker(const bool cbState)
|
||||
* @brief callback for mesh network if connectivity to server changed
|
||||
* @param cbState boolean state
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
void vMeshOtaUtilChangeStateOfServerWorker(const bool cbState)
|
||||
{
|
||||
static bool bLastState = false;
|
||||
|
||||
if(cbState != bLastState) //change only if necessary
|
||||
{
|
||||
if(cbState == true)
|
||||
{
|
||||
if (xSemaphoreGive(bsStartStopServerWorker) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to give mutex to activate the server worker");
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
if (xSemaphoreTake(bsStartStopServerWorker,( TickType_t ) 10 ) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to obtain mutex to deactivate the server worker");
|
||||
}
|
||||
}
|
||||
bLastState = cbState;
|
||||
}
|
||||
}
|
|
@ -1,3 +1,13 @@
|
|||
/**
|
||||
* @file HTTPS_Client.h
|
||||
* @brief Used to download the OTA image from the server
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Additional Infos: Connects via HTTPS and HTTPS Basic Auth to the Server.
|
||||
* Downloads the image in segments
|
||||
*/
|
||||
|
||||
#ifndef H_HTTPS_CLIENT
|
||||
#define H_HTTPS_CLIENT
|
||||
|
||||
|
@ -5,19 +15,10 @@
|
|||
#include <stdlib.h>
|
||||
#include "freertos/FreeRTOS.h"
|
||||
#include "freertos/task.h"
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_system.h"
|
||||
#include "nvs_flash.h"
|
||||
#include "esp_netif.h"
|
||||
|
||||
#include "lwip/err.h"
|
||||
#include "lwip/sockets.h"
|
||||
#include "lwip/sys.h"
|
||||
#include "lwip/netdb.h"
|
||||
#include "lwip/dns.h"
|
||||
|
||||
#include "mbedtls/platform.h"
|
||||
#include "mbedtls/net_sockets.h"
|
||||
#include "mbedtls/esp_debug.h"
|
||||
|
@ -66,12 +67,12 @@ struct HTTPS_Client
|
|||
typedef int32_t https_client_ret_t;
|
||||
typedef struct HTTPS_Client HTTPS_Client_t;
|
||||
|
||||
https_client_ret_t errHTTPSClientInitialize();
|
||||
https_client_ret_t errHTTPSClientConnectToServer();
|
||||
https_client_ret_t errHTTPSClientValidateServer();
|
||||
https_client_ret_t errHTTPSClientSendRequest();
|
||||
https_client_ret_t errHTTPSClientRetrieveData(char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32BytesRead);
|
||||
https_client_ret_t errHTTPSClientReset();
|
||||
https_client_ret_t errHTTPSClientInitialize(void);
|
||||
https_client_ret_t errHTTPSClientConnectToServer(void);
|
||||
https_client_ret_t errHTTPSClientValidateServer(void);
|
||||
https_client_ret_t errHTTPSClientSendRequest(void);
|
||||
https_client_ret_t errHTTPSClientRetrieveData(char* const cpu8Data, const uint32_t* const cpcu32DataLenght, uint32_t* pu32BytesRead);
|
||||
https_client_ret_t errHTTPSClientReset(void);
|
||||
|
||||
#endif /* H_HTTPS_CLIENT */
|
||||
|
|
@ -0,0 +1,120 @@
|
|||
/**
|
||||
* @file Mesh_Network.h
|
||||
* @brief Mesh network layer used by OTA and APP
|
||||
* @author Hendrik Schutter, init based in ESP32-IDE code
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Additional Infos: Start network and send and receive data.
|
||||
*/
|
||||
|
||||
#ifndef H_MESH_NETWORK
|
||||
#define H_MESH_NETWORK
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
#include "nvs_flash.h"
|
||||
|
||||
#ifndef CONFIG_MESH_MESSAGE_SIZE
|
||||
#define CONFIG_MESH_MESSAGE_SIZE 1500
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_TOPOLOGY
|
||||
#define CONFIG_MESH_TOPOLOGY MESH_TOPO_TREE
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_MAX_LAYER
|
||||
#define CONFIG_MESH_MAX_LAYER 6
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_ID
|
||||
#define CONFIG_MESH_ID "00, 00, 00, 00, 00, 00"
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_AUTHMODE
|
||||
#define CONFIG_MESH_AP_AUTHMODE WIFI_AUTH_WPA2_PSK
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_CONNECTIONS
|
||||
#define CONFIG_MESH_AP_CONNECTIONS 6
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_PASSWD
|
||||
#define CONFIG_MESH_AP_PASSWD "MAP_PASSWD"
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_CHANNEL
|
||||
#define CONFIG_MESH_CHANNEL 0
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTER_SSID
|
||||
#define CONFIG_MESH_ROUTER_SSID "ROUTER_SSID"
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTER_PASSWD
|
||||
#define CONFIG_MESH_ROUTER_PASSWD "ROUTER_PASSWD"
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTE_TABLE_SIZE
|
||||
#define CONFIG_MESH_ROUTE_TABLE_SIZE 50
|
||||
#endif
|
||||
|
||||
#define MESH_NETWORK_PAYLOAD_SIZE 1024U
|
||||
|
||||
struct meshPacket
|
||||
{
|
||||
enum otaMeshPacketType
|
||||
{
|
||||
APP_Data, //data for application
|
||||
OTA_Version_Request, //send own version in payload
|
||||
OTA_Version_Response, //send own version in payload
|
||||
OTA_Data, //send image segment
|
||||
OTA_ACK, //ack image segment
|
||||
OTA_Complete, //signal end of image
|
||||
OTA_Abort //abort OTA process
|
||||
} type;
|
||||
uint8_t au8Payload[MESH_NETWORK_PAYLOAD_SIZE];
|
||||
mesh_addr_t meshSenderAddr;
|
||||
};
|
||||
|
||||
typedef struct meshPacket MESH_PACKET_t;
|
||||
|
||||
#define ERROR_CHECK(x) if (err == ESP_OK) \
|
||||
{ \
|
||||
err = (x); \
|
||||
if (err != ESP_OK) \
|
||||
{ \
|
||||
ESP_LOGE(LOG_TAG, "%s failed with error: 0x%x -> %s", #x, err, esp_err_to_name(err)); \
|
||||
} \
|
||||
} \
|
||||
|
||||
extern bool bIsMeshConnected;
|
||||
extern int32_t i32MeshLayer;
|
||||
extern mesh_addr_t meshParentAddr;
|
||||
extern esp_netif_t* pNetifSta;
|
||||
extern uint8_t u8ownMAC[6];
|
||||
extern void (*pOTAChildConnectHandle)(const uint8_t* const);
|
||||
extern void (*pChangeStateOfServerWorkerHandle)(const bool );
|
||||
|
||||
esp_err_t errMeshNetworkInitialize(void);
|
||||
esp_err_t errMeshNetworkInitializeWiFi(void);
|
||||
esp_err_t errMeshNetworkInitializeRouter(mesh_cfg_t* cfg);
|
||||
|
||||
esp_err_t errMeshNetworkSetChildConnectedHandle(void (*pChildConnectHandleTmp)(const uint8_t* const cpcu8Data));
|
||||
esp_err_t errMeshNetworkSetAppReceiveHandle(void (*pAppRxHandleTmp)(const uint8_t* const cpcu8Data, const uint8_t* const cpcu8Sender));
|
||||
esp_err_t errMeshNetworkSetOTAMessageHandleHandle(void (*pOTAMessageHandleTmp)(const MESH_PACKET_t* const cpcuMeshPacket));
|
||||
esp_err_t errMeshNetworkSetChangeStateOfServerWorkerHandle(void (*pChangeStateOfServerWorkerHandleTmp)(const bool cbState));
|
||||
|
||||
bool bMeshNetworkIsRootNode(void);
|
||||
bool bMeshNetworkIsNodeNeighbour(const mesh_addr_t* const cpcNode);
|
||||
bool bMeshNetworkCheckMacEquality(const uint8_t* const cpcu8aMAC, const uint8_t* const cpcu8bMAC);
|
||||
|
||||
esp_err_t errMeshNetworkStartReceiveTask(void);
|
||||
esp_err_t errMeshNetworkGetParentNode(mesh_addr_t* const cpMeshParentAddr);
|
||||
esp_err_t errMeshNetworkGetChildren(mesh_addr_t* const cpChildren, uint16_t* const cpu16ChildrenSize);
|
||||
esp_err_t errMeshNetworkSendMeshPacket(const mesh_addr_t* const cpcAddrDest, const MESH_PACKET_t* const cpcPacket);
|
||||
|
||||
void vMeshNetworkTaskReceiveMeshData(void *arg);
|
||||
void vMeshNetworkGetOwnAddr(mesh_addr_t* const cpMeshOwnAddr);
|
||||
void vMeshNetworkIpEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void *vpEventData);
|
||||
void vMeshNetworkMeshEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void* vpEventData);
|
||||
|
||||
#endif /* H_MESH_NETWORK */
|
||||
|
|
@ -1,28 +1,31 @@
|
|||
/**
|
||||
* @file Mesh_OTA.h
|
||||
* @brief Start and implement OTA updates via HTTPS from server and other mesh nodes (bidirectional)
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
|
||||
#ifndef H_MESH_OTA
|
||||
#define H_MESH_OTA
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
#include "nvs_flash.h"
|
||||
#include "driver/gpio.h"
|
||||
#include "esp_ota_ops.h"
|
||||
#include "esp_partition.h"
|
||||
|
||||
#include "Mesh_network.h"
|
||||
#include "HTTPS_client.h"
|
||||
#include "Mesh_Network.h"
|
||||
#include "HTTPS_Client.h"
|
||||
|
||||
#define ERASE_NVS //erase non volatile storage if full
|
||||
#define QUEUE_NODES_SIZE 10
|
||||
#define QUEUE_MESSAGE_OTA_SIZE 10
|
||||
#define QUEUE_NODES_SIZE 20
|
||||
#define QUEUE_MESSAGE_OTA_SIZE 20
|
||||
#define SERVER_CHECK_INTERVAL 30 //in seconds
|
||||
#define OTA_HTTPS_SEGMENT_SIZE 2048U
|
||||
#define OTA_PROGRESS_LOG_INTERVAL 7U
|
||||
#define OTA_MESH_SEGMENT_SIZE MESH_NETWORK_PAYLOAD_SIZE
|
||||
#define OTA_MESH_TIMEOUT 20000U //in ms
|
||||
#define OTA_ALLOW_REBOOT 1
|
||||
|
||||
#define ERROR_CHECK(x) if (err == ESP_OK) \
|
||||
{ \
|
||||
|
@ -33,41 +36,14 @@
|
|||
} \
|
||||
} \
|
||||
|
||||
enum otaMeshRole
|
||||
{
|
||||
Transmitter,
|
||||
Receiver
|
||||
};
|
||||
|
||||
typedef enum otaMeshRole OTA_MESH_ROLE_t;
|
||||
|
||||
esp_err_t errMeshOTAInitialize();
|
||||
|
||||
esp_err_t errOTAHTTPS(bool* pbNewOTAImage);
|
||||
esp_err_t errOTAMeshSlave(bool* pbNewOTAImage);
|
||||
esp_err_t errOTAMeshMaster(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr);
|
||||
esp_err_t errOTAMeshTransmit(mesh_addr_t* pMeshNodeAddr);
|
||||
esp_err_t errOTAMeshReceive(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr);
|
||||
|
||||
|
||||
//helper functions
|
||||
bool bNewerVersion(const char* pu8Local, const char* pu8Remote);
|
||||
esp_err_t errExtractVersionNumber(const char* pu8Data, uint32_t* pu32DataLenght, char* pc8RemoteVersionNumber);
|
||||
esp_err_t errFindImageStart(const char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32StartOffset);
|
||||
void vPrintOTAProgress(const uint32_t* const pu32TotalImageSize, const uint32_t* const pu32BytesWritten, OTA_MESH_ROLE_t eRole);
|
||||
void vAddAllNeighboursToQueue(void);
|
||||
esp_err_t errSendOTAVersionResponse(mesh_addr_t* meshReceiverAddr);
|
||||
esp_err_t errSendOTAVersionRequest(mesh_addr_t* meshReceiverAddr);
|
||||
|
||||
//Handler
|
||||
void vAddNodeToPossibleUpdatableQueue(uint8_t* pu8MAC);
|
||||
void vAddOTAControllMessageToQueue(MESH_PACKET_t* puMeshPacket);
|
||||
void vChangeStateOfServerWorker(bool state);
|
||||
esp_err_t errMeshOTAInitialize(void);
|
||||
|
||||
//Tasks
|
||||
void vTaskServerWorker(void *arg);
|
||||
void vTaskOTAWorker(void *arg);
|
||||
|
||||
void vMeshOtaTaskServerWorker(void *arg);
|
||||
void vMeshOtaTaskOTAWorker(void *arg);
|
||||
|
||||
//OTA process endpoints
|
||||
esp_err_t errMeshOtaSlaveEndpoint(bool* const cpbNewOTAImage, mesh_addr_t* const cpcMeshNodeAddr);
|
||||
esp_err_t errMeshOtaMasterEndpoint(bool* const cpbNewOTAImage, const mesh_addr_t* const cpcMeshNodeAddr);
|
||||
|
||||
#endif /* H_MESH_OTA */
|
||||
|
|
|
@ -0,0 +1,27 @@
|
|||
/**
|
||||
* @file Mesh_OTA_Globals.h
|
||||
* @brief global variables unsed in Mesh_OTA
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef H_MESH_OTA_GLOBALS
|
||||
#define H_MESH_OTA_GLOBALS
|
||||
|
||||
#include "esp_system.h"
|
||||
#include "esp_partition.h"
|
||||
|
||||
#include "Mesh_Network.h"
|
||||
#include "HTTPS_Client.h"
|
||||
|
||||
extern xQueueHandle queueNodes; //nodes that should be checked for ota update (contains children and parent)
|
||||
extern xQueueHandle queueMessageOTA; //mesh ota controll messages like "OTA_Version_Response" "OTA_ACK"
|
||||
|
||||
extern SemaphoreHandle_t bsStartStopServerWorker; //binary semaphore
|
||||
extern SemaphoreHandle_t bsOTAProcess; //binary semaphore
|
||||
|
||||
extern const esp_partition_t* pOTAPartition; //pointer to ota partition
|
||||
extern bool bWantReboot; //flag to signal pending reboot
|
||||
|
||||
#endif /* H_MESH_OTA_GLOBALS */
|
|
@ -0,0 +1,37 @@
|
|||
/**
|
||||
* @file Mesh_OTA_Partition_Access.h
|
||||
* @brief Write and read partition if requested from Mesh_OTA
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*
|
||||
* Additional Infos: Write image via HTTPS
|
||||
* Receive or transmit via Mesh
|
||||
*/
|
||||
|
||||
#ifndef H_MESH_OTA_PARTITION_ACCESS
|
||||
#define H_MESH_OTA_PARTITION_ACCESS
|
||||
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "nvs_flash.h"
|
||||
#include "esp_ota_ops.h"
|
||||
#include "esp_partition.h"
|
||||
|
||||
#include "Mesh_Network.h"
|
||||
#include "HTTPS_Client.h"
|
||||
|
||||
#define ERROR_CHECK(x) if (err == ESP_OK) \
|
||||
{ \
|
||||
err = (x); \
|
||||
if (err != ESP_OK) \
|
||||
{ \
|
||||
ESP_LOGE(LOG_TAG, "%s failed with error: 0x%x -> %s", #x, err, esp_err_to_name(err)); \
|
||||
} \
|
||||
} \
|
||||
|
||||
esp_err_t errMeshOtaPartitionAccessHttps(bool* const cpbNewOTAImage);
|
||||
esp_err_t errMeshOtaPartitionAccessMeshTransmit(const mesh_addr_t* const cpcMeshNodeAddr);
|
||||
esp_err_t errMeshOtaPartitionAccessMeshReceive(bool* const cpbNewOTAImage, const mesh_addr_t* const cpcMeshNodeAddr);
|
||||
|
||||
#endif /* H_MESH_OTA_PARTITION_ACCESS */
|
|
@ -0,0 +1,44 @@
|
|||
/**
|
||||
* @file Mesh_OTA_Util.h
|
||||
* @brief Utility and helper functions to perfrom mesh OTA updates
|
||||
* @author Hendrik Schutter
|
||||
* @date 21.01.2021
|
||||
*/
|
||||
|
||||
#ifndef H_MESH_OTA_UTIL
|
||||
#define H_MESH_OTA_UTIL
|
||||
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
|
||||
#include "Mesh_Network.h"
|
||||
#include "HTTPS_Client.h"
|
||||
#include "Mesh_OTA.h"
|
||||
|
||||
enum otaMeshRole
|
||||
{
|
||||
Transmitter,
|
||||
Receiver
|
||||
};
|
||||
|
||||
typedef enum otaMeshRole OTA_MESH_ROLE_t;
|
||||
|
||||
//helper functions
|
||||
bool bMeshOtaUtilNewerVersion(const char* cpu8Local, const char* cpu8Remote);
|
||||
esp_err_t errMeshOtaUtilExtractVersionNumber(const char* cpu8Data, uint32_t* const cpu32DataLenght, char* const pc8RemoteVersionNumber);
|
||||
esp_err_t errMeshOtaUtilFindImageStart(const char* const cpu8Data, const uint32_t* const cpu32DataLenght, uint32_t* const cpu32StartOffset);
|
||||
esp_err_t errMeshOtaUtilSendOtaVersionRequest(const mesh_addr_t* const cpcMeshReceiverAddr);
|
||||
esp_err_t errMeshOtaUtilSendOtaVersionResponse(const mesh_addr_t* const cpcMeshReceiverAddr);
|
||||
void vMeshOtaUtilPrintOtaProgress(const uint32_t* const cpcu32TotalImageSize, const uint32_t* const cpcu32BytesWritten, const OTA_MESH_ROLE_t ceRole);
|
||||
void vMeshOtaUtilAddAllNeighboursToQueue(const mesh_addr_t* const cpcMeshNodeAddr);
|
||||
void vMeshOtaUtilClearOtaMessageQueue(const mesh_addr_t* const cpcMeshNodeAddr);
|
||||
void vMeshOtaUtilClearNeighboursQueue(const mesh_addr_t* const cpcMeshNodeAddr);
|
||||
|
||||
//Handler
|
||||
void vMeshOtaUtilAddNodeToPossibleUpdatableQueue(const uint8_t* const cpcu8MAC);
|
||||
void vMeshOtaUtilAddOtaMessageToQueue(const MESH_PACKET_t* const cpcuMeshPacket);
|
||||
void vMeshOtaUtilChangeStateOfServerWorker(const bool cbState);
|
||||
|
||||
#endif /* H_MESH_OTA_UTIL */
|
||||
|
|
@ -1,105 +0,0 @@
|
|||
#ifndef H_MESH_NETWORK
|
||||
#define H_MESH_NETWORK
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
|
||||
#ifndef CONFIG_MESH_MESSAGE_SIZE
|
||||
#define CONFIG_MESH_MESSAGE_SIZE 1500
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_TOPOLOGY
|
||||
#define CONFIG_MESH_TOPOLOGY MESH_TOPO_TREE
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_MAX_LAYER
|
||||
#define CONFIG_MESH_MAX_LAYER 6
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_ID
|
||||
#define CONFIG_MESH_ID "00, 00, 00, 00, 00, 00"
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_AUTHMODE
|
||||
#define CONFIG_MESH_AP_AUTHMODE WIFI_AUTH_WPA2_PSK
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_CONNECTIONS
|
||||
#define CONFIG_MESH_AP_CONNECTIONS 6
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_PASSWD
|
||||
#define CONFIG_MESH_AP_PASSWD "MAP_PASSWD"
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_CHANNEL
|
||||
#define CONFIG_MESH_CHANNEL 0
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTER_SSID
|
||||
#define CONFIG_MESH_ROUTER_SSID "ROUTER_SSID"
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTER_PASSWD
|
||||
#define CONFIG_MESH_ROUTER_PASSWD "ROUTER_PASSWD"
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTE_TABLE_SIZE
|
||||
#define CONFIG_MESH_ROUTE_TABLE_SIZE 50
|
||||
#endif
|
||||
|
||||
#define MESH_NETWORK_PAYLOAD_SIZE 1024U
|
||||
|
||||
struct meshPacket
|
||||
{
|
||||
enum otaMeshPacketType
|
||||
{
|
||||
APP_Data, //data for application
|
||||
OTA_Version_Request, //send own version in payload
|
||||
OTA_Version_Response, //send own version in payload
|
||||
OTA_Data, //send image segment
|
||||
OTA_ACK, //ack image segment
|
||||
OTA_Complete, //signal end of image
|
||||
OTA_Abort //abort OTA process
|
||||
} type;
|
||||
uint8_t au8Payload[MESH_NETWORK_PAYLOAD_SIZE];
|
||||
mesh_addr_t meshSenderAddr;
|
||||
};
|
||||
|
||||
typedef struct meshPacket MESH_PACKET_t;
|
||||
|
||||
extern bool bIsMeshConnected;
|
||||
extern int32_t i32MeshLayer;
|
||||
extern mesh_addr_t meshParentAddr;
|
||||
extern esp_netif_t* netif_sta;
|
||||
extern uint8_t u8ownMAC[6];
|
||||
extern void (*pOTAChildConnectHandle)(uint8_t* );
|
||||
extern void (*pChangeStateOfServerWorkerHandle)(bool );
|
||||
|
||||
esp_err_t errMeshNetworkInitialize();
|
||||
esp_err_t errMeshNetworkInitializeWiFi();
|
||||
esp_err_t errMeshNetworkInitializeRouter(mesh_cfg_t* cfg);
|
||||
|
||||
esp_err_t errMeshNetworkSetAppReceiveHandle(void (*pAppRxHandleTmp)(uint8_t * pu8Data, uint8_t* pu8Sender));
|
||||
esp_err_t errMeshNetworkSetChildConnectedHandle(void (*pChildConnectHandleTmp)(uint8_t * pu8Data));
|
||||
esp_err_t errMeshNetworkSetOTAMessageHandleHandle(void (*pOTAMessageHandleTmp)(MESH_PACKET_t* puMeshPacket));
|
||||
|
||||
esp_err_t errMeshNetworkSetChangeStateOfServerWorkerHandle(void (*pChangeStateOfServerWorkerHandleTmp)(bool bState));
|
||||
|
||||
bool bCheckMACEquality(uint8_t* pu8aMAC, uint8_t* pu8bMAC);
|
||||
void vGetOwnAddr(mesh_addr_t* pMeshOwnAddr);
|
||||
esp_err_t errGetParentNode(mesh_addr_t* pMeshParentAddr);
|
||||
esp_err_t errGetChildren(mesh_addr_t* pChildren, uint16_t* pu16ChildrenSize);
|
||||
bool bIsRootNode();
|
||||
bool bIsNodeNeighbour(mesh_addr_t* pNode);
|
||||
|
||||
esp_err_t errStartReceiveTask();
|
||||
void vTaskReceiveMeshData(void *arg);
|
||||
void vMeshEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void* vpEventData);
|
||||
void vIPEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void *event_data);
|
||||
|
||||
esp_err_t errSendMeshPacket(mesh_addr_t* pAddrDest, MESH_PACKET_t* pPacket);
|
||||
|
||||
|
||||
|
||||
|
||||
#endif /* H_MESH_NETWORK */
|
||||
|
|
@ -1,8 +1,9 @@
|
|||
#include <limits.h>
|
||||
#include "unity.h"
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
#include "Mesh_OTA_Util.h"
|
||||
#include "test_image_hex.h"
|
||||
#include "Mesh_Network.h"
|
||||
|
||||
// ### ### ### distinguish newer image version ### ### ###
|
||||
|
||||
|
@ -10,56 +11,56 @@ TEST_CASE("Remote got patch", "[distinguish newer image version]")
|
|||
{
|
||||
char versionLocal[] = "1.2.3"; //current running image
|
||||
char versionRemote[] = "1.2.4"; //image from server
|
||||
TEST_ASSERT_TRUE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_TRUE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
|
||||
TEST_CASE("Remote got minor", "[distinguish newer image version]")
|
||||
{
|
||||
char versionLocal[] = "1.2.3"; //current running image
|
||||
char versionRemote[] = "1.3.3"; //image from server
|
||||
TEST_ASSERT_TRUE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_TRUE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
|
||||
TEST_CASE("Remote got major", "[distinguish newer image version]")
|
||||
{
|
||||
char versionLocal[] = "1.2.3"; //current running image
|
||||
char versionRemote[] = "2.2.3"; //image from server
|
||||
TEST_ASSERT_TRUE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_TRUE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
|
||||
TEST_CASE("Local got patch", "[distinguish newer image version]")
|
||||
{
|
||||
char versionLocal[] = "1.2.4"; //current running image
|
||||
char versionRemote[] = "1.2.3"; //image from server
|
||||
TEST_ASSERT_FALSE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_FALSE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
|
||||
TEST_CASE("Local got minor", "[distinguish newer image version]")
|
||||
{
|
||||
char versionLocal[] = "1.3.3"; //current running image
|
||||
char versionRemote[] = "1.2.3"; //image from server
|
||||
TEST_ASSERT_FALSE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_FALSE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
|
||||
TEST_CASE("Local got major", "[distinguish newer image version]")
|
||||
{
|
||||
char versionLocal[] = "2.2.3"; //current running image
|
||||
char versionRemote[] = "1.2.3"; //image from server
|
||||
TEST_ASSERT_FALSE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_FALSE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
|
||||
TEST_CASE("Remote got alpha and patch", "[distinguish newer image version]")
|
||||
{
|
||||
char versionLocal[] = "2.2.3"; //current running image
|
||||
char versionRemote[] = "a2.2.4"; //image from server
|
||||
TEST_ASSERT_TRUE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_TRUE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
|
||||
TEST_CASE("Remote got max", "[distinguish newer image version]")
|
||||
{
|
||||
char versionLocal[] = "2.2.3"; //current running image
|
||||
char versionRemote[] = "999.999.999"; //image from server
|
||||
TEST_ASSERT_TRUE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_TRUE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
|
||||
// ### ### ### find start offset in firmware image ### ### ###
|
||||
|
@ -68,7 +69,7 @@ TEST_CASE("with http response + 0.0.1", "[find start offset in firmware image]"
|
|||
{
|
||||
uint32_t u32StartOffset;
|
||||
uint32_t u32DataLenght = sizeof(dataWithHttpRespone0_0_1)/sizeof(dataWithHttpRespone0_0_1[0]);
|
||||
esp_err_t err = errFindImageStart(dataWithHttpRespone0_0_1, &u32DataLenght, &u32StartOffset);
|
||||
esp_err_t err = errMeshOtaUtilFindImageStart(dataWithHttpRespone0_0_1, &u32DataLenght, &u32StartOffset);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_EQUAL_INT(305, u32StartOffset);
|
||||
|
@ -83,7 +84,7 @@ TEST_CASE("without http response + 0.0.1", "[find start offset in firmware imag
|
|||
{
|
||||
uint32_t u32StartOffset;
|
||||
uint32_t u32DataLenght = sizeof(dataWithoutHttpRespone0_0_1)/sizeof(dataWithoutHttpRespone0_0_1[0]);
|
||||
esp_err_t err = errFindImageStart(dataWithoutHttpRespone0_0_1, &u32DataLenght, &u32StartOffset);
|
||||
esp_err_t err = errMeshOtaUtilFindImageStart(dataWithoutHttpRespone0_0_1, &u32DataLenght, &u32StartOffset);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_EQUAL_INT(0, u32StartOffset);
|
||||
|
@ -99,7 +100,7 @@ TEST_CASE("with http response + 999.999.999", "[find start offset in firmware i
|
|||
{
|
||||
uint32_t u32StartOffset;
|
||||
uint32_t u32DataLenght = sizeof(dataWithHttpRespone999_999_999)/sizeof(dataWithHttpRespone999_999_999[0]);
|
||||
esp_err_t err = errFindImageStart(dataWithHttpRespone999_999_999, &u32DataLenght, &u32StartOffset);
|
||||
esp_err_t err = errMeshOtaUtilFindImageStart(dataWithHttpRespone999_999_999, &u32DataLenght, &u32StartOffset);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_EQUAL_INT(305, u32StartOffset);
|
||||
|
@ -114,7 +115,7 @@ TEST_CASE("without http response + 999.999.999", "[find start offset in firmwar
|
|||
{
|
||||
uint32_t u32StartOffset;
|
||||
uint32_t u32DataLenght = sizeof(dataWithoutHttpRespone999_999_999)/sizeof(dataWithoutHttpRespone999_999_999[0]);
|
||||
esp_err_t err = errFindImageStart(dataWithoutHttpRespone999_999_999, &u32DataLenght, &u32StartOffset);
|
||||
esp_err_t err = errMeshOtaUtilFindImageStart(dataWithoutHttpRespone999_999_999, &u32DataLenght, &u32StartOffset);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_EQUAL_INT(0, u32StartOffset);
|
||||
|
@ -129,7 +130,7 @@ TEST_CASE("with http response + 999.9.999", "[find start offset in firmware ima
|
|||
{
|
||||
uint32_t u32StartOffset;
|
||||
uint32_t u32DataLenght = sizeof(dataWithHttpRespone999_9_999)/sizeof(dataWithHttpRespone999_9_999[0]);
|
||||
esp_err_t err = errFindImageStart(dataWithHttpRespone999_9_999, &u32DataLenght, &u32StartOffset);
|
||||
esp_err_t err = errMeshOtaUtilFindImageStart(dataWithHttpRespone999_9_999, &u32DataLenght, &u32StartOffset);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_EQUAL_INT(302, u32StartOffset);
|
||||
|
@ -144,7 +145,7 @@ TEST_CASE("with http response + 999.99.999", "[find start offset in firmware im
|
|||
{
|
||||
uint32_t u32StartOffset;
|
||||
uint32_t u32DataLenght = sizeof(dataWithHttpRespone999_99_999)/sizeof(dataWithHttpRespone999_99_999[0]);
|
||||
esp_err_t err = errFindImageStart(dataWithHttpRespone999_99_999, &u32DataLenght, &u32StartOffset);
|
||||
esp_err_t err = errMeshOtaUtilFindImageStart(dataWithHttpRespone999_99_999, &u32DataLenght, &u32StartOffset);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_EQUAL_INT(299, u32StartOffset);
|
||||
|
@ -162,10 +163,10 @@ TEST_CASE("extract version 0.0.1", "[extract image version number]")
|
|||
char versionLocal[] = "0.0.0"; //current running image
|
||||
char versionRemote[12];//image from server
|
||||
uint32_t u32DataLenght = sizeof(dataWithHttpRespone0_0_1)/sizeof(dataWithHttpRespone0_0_1[0]);
|
||||
esp_err_t err = errExtractVersionNumber(dataWithHttpRespone0_0_1, &u32DataLenght, versionRemote);
|
||||
esp_err_t err = errMeshOtaUtilExtractVersionNumber(dataWithHttpRespone0_0_1, &u32DataLenght, versionRemote);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_TRUE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_TRUE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
else
|
||||
{
|
||||
|
@ -178,10 +179,10 @@ TEST_CASE("extract version 999.999.999", "[extract image version number]")
|
|||
char versionLocal[] = "0.0.0"; //current running image
|
||||
char versionRemote[12];//image from server
|
||||
uint32_t u32DataLenght = sizeof(dataWithHttpRespone999_999_999)/sizeof(dataWithHttpRespone999_999_999[0]);
|
||||
esp_err_t err = errExtractVersionNumber(dataWithHttpRespone999_999_999, &u32DataLenght, versionRemote);
|
||||
esp_err_t err = errMeshOtaUtilExtractVersionNumber(dataWithHttpRespone999_999_999, &u32DataLenght, versionRemote);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_TRUE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_TRUE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
else
|
||||
{
|
||||
|
@ -194,10 +195,10 @@ TEST_CASE("extract version 999.99.999", "[extract image version number]")
|
|||
char versionLocal[] = "999.100.999"; //current running image
|
||||
char versionRemote[12];//image from server
|
||||
uint32_t u32DataLenght = sizeof(dataWithHttpRespone999_99_999)/sizeof(dataWithHttpRespone999_99_999[0]);
|
||||
esp_err_t err = errExtractVersionNumber(dataWithHttpRespone999_99_999, &u32DataLenght, versionRemote);
|
||||
esp_err_t err = errMeshOtaUtilExtractVersionNumber(dataWithHttpRespone999_99_999, &u32DataLenght, versionRemote);
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
TEST_ASSERT_FALSE( bNewerVersion(versionLocal, versionRemote) );
|
||||
TEST_ASSERT_FALSE( bMeshOtaUtilNewerVersion(versionLocal, versionRemote) );
|
||||
}
|
||||
else
|
||||
{
|
||||
|
@ -206,6 +207,71 @@ TEST_CASE("extract version 999.99.999", "[extract image version number]")
|
|||
}
|
||||
|
||||
|
||||
TEST_CASE("same MACs", "[check MAC equality]")
|
||||
{
|
||||
unsigned char cMAC_A[] = "012345678901";
|
||||
unsigned char cMAC_B[] = "012345678901";
|
||||
|
||||
TEST_ASSERT_TRUE( bMeshNetworkCheckMacEquality(cMAC_A,cMAC_B) );
|
||||
}
|
||||
|
||||
TEST_CASE("different MACs", "[check MAC equality]")
|
||||
{
|
||||
unsigned char cMAC_A[] = "012345678901";
|
||||
unsigned char cMAC_B[] = "087464874718";
|
||||
|
||||
TEST_ASSERT_FALSE( bMeshNetworkCheckMacEquality(cMAC_A,cMAC_B) );
|
||||
}
|
||||
|
||||
TEST_CASE("same MACs last A_byte+1", "[check MAC equality]")
|
||||
{
|
||||
unsigned char cMAC_A[] = "012345678902";
|
||||
unsigned char cMAC_B[] = "012345678901";
|
||||
|
||||
TEST_ASSERT_TRUE( bMeshNetworkCheckMacEquality(cMAC_A,cMAC_B) );
|
||||
}
|
||||
|
||||
TEST_CASE("same MACs last B_byte+1", "[check MAC equality]")
|
||||
{
|
||||
unsigned char cMAC_A[] = "012345678901";
|
||||
unsigned char cMAC_B[] = "012345678902";
|
||||
|
||||
TEST_ASSERT_TRUE( bMeshNetworkCheckMacEquality(cMAC_A,cMAC_B) );
|
||||
}
|
||||
|
||||
TEST_CASE("same MACs last B_byte+2", "[check MAC equality]")
|
||||
{
|
||||
unsigned char cMAC_A[] = "012345678901";
|
||||
unsigned char cMAC_B[] = "012345678903";
|
||||
|
||||
TEST_ASSERT_TRUE( bMeshNetworkCheckMacEquality(cMAC_A,cMAC_B) );
|
||||
}
|
||||
|
||||
TEST_CASE("same Node0", "[check MAC equality]")
|
||||
{
|
||||
unsigned char cMAC_A[] = "ac67b27162b0";
|
||||
unsigned char cMAC_B[] = "ac67b27162b0";
|
||||
|
||||
TEST_ASSERT_TRUE( bMeshNetworkCheckMacEquality(cMAC_A,cMAC_B) );
|
||||
}
|
||||
|
||||
TEST_CASE("same Node0 first MAC+1", "[check MAC equality]")
|
||||
{
|
||||
unsigned char cMAC_A[] = "ac67b27162b1";
|
||||
unsigned char cMAC_B[] = "ac67b27162b0";
|
||||
|
||||
TEST_ASSERT_TRUE( bMeshNetworkCheckMacEquality(cMAC_A,cMAC_B) );
|
||||
}
|
||||
|
||||
TEST_CASE("same Node0 second MAC+1", "[check MAC equality]")
|
||||
{
|
||||
unsigned char cMAC_A[] = "ac67b27162b0";
|
||||
unsigned char cMAC_B[] = "ac67b27162b1";
|
||||
|
||||
TEST_ASSERT_TRUE( bMeshNetworkCheckMacEquality(cMAC_A,cMAC_B) );
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -214,10 +280,3 @@ TEST_CASE("extract version 999.99.999", "[extract image version number]")
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -1,13 +1,32 @@
|
|||
/**
|
||||
* @file Blinky_LED.c
|
||||
* @brief Demo application using the mesh network
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Additional Infos: If button "BOOT" on ESP32-Module is pressed, all LED2 (blue) in the network will toggle the state.
|
||||
*/
|
||||
|
||||
#include "Blinky_LED.h"
|
||||
|
||||
static const char *LOG_TAG = "blinky_led";
|
||||
static bool bLEDisOn = false; //set led default off
|
||||
static mesh_addr_t addrParent; //addr of parent node
|
||||
static mesh_addr_t addrParent; //addr of parent node
|
||||
static mesh_addr_t childrenAddr[CONFIG_MESH_ROUTE_TABLE_SIZE]; //array of children attached to this node
|
||||
static uint16_t u16ChildrenSize; //number of children attached to this node
|
||||
xQueueHandle queueBlinkyLEDPackets; //handle for led action queue
|
||||
|
||||
esp_err_t errBlinkyLEDInitialize()
|
||||
/**
|
||||
* @fn esp_err_t errBlinkyLEDInitialize()
|
||||
* @brief Starts the demp app
|
||||
* @param void
|
||||
* @return ESP32 error code
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Initialize the queue and starts the tasks
|
||||
*/
|
||||
esp_err_t errBlinkyLEDInitialize(void)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
BaseType_t xReturned;
|
||||
|
@ -42,16 +61,37 @@ esp_err_t errBlinkyLEDInitialize()
|
|||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
#ifdef NEW_VERSION
|
||||
gpio_set_level(GPIO_LED_GREEN, 1); //switch on
|
||||
#endif
|
||||
|
||||
#ifndef NEW_VERSION
|
||||
gpio_set_level(GPIO_LED_GREEN, 0); //switch off
|
||||
#endif
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
void vGPIOInitialize()
|
||||
/**
|
||||
* @fn void vGPIOInitialize(void)
|
||||
* @brief sets the GPIO pins to correct modes
|
||||
* @param void
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Initialize GPIO
|
||||
*/
|
||||
void vGPIOInitialize(void)
|
||||
{
|
||||
gpio_config_t gpioConf;
|
||||
|
||||
//LED as Output
|
||||
gpio_reset_pin(GPIO_LED);
|
||||
gpio_set_direction(GPIO_LED, GPIO_MODE_OUTPUT);
|
||||
gpio_reset_pin(GPIO_LED_BLUE);
|
||||
gpio_set_direction(GPIO_LED_BLUE, GPIO_MODE_OUTPUT);
|
||||
gpio_reset_pin(GPIO_LED_GREEN);
|
||||
gpio_set_direction(GPIO_LED_GREEN, GPIO_MODE_OUTPUT);
|
||||
|
||||
//BTN as Input
|
||||
gpioConf.intr_type = GPIO_INTR_DISABLE;
|
||||
|
@ -62,7 +102,18 @@ void vGPIOInitialize()
|
|||
gpio_config(&gpioConf);
|
||||
}
|
||||
|
||||
void rxHandle(uint8_t* pu8Data, uint8_t* pu8Sender)
|
||||
/**
|
||||
* @fn void rxHandle(const uint8_t* const pu8Data, const uint8_t* const pu8Sender)
|
||||
* @brief callback handler from mesh network layer
|
||||
* @param pu8Data data received
|
||||
* @param pu8Sender sender node from data
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Adds the data into queue
|
||||
*/
|
||||
void rxHandle(const uint8_t* const pu8Data, const uint8_t* const pu8Sender)
|
||||
{
|
||||
//send payload to app queue
|
||||
BLINKY_PACKET_t bTmpPacket;
|
||||
|
@ -74,6 +125,16 @@ void rxHandle(uint8_t* pu8Data, uint8_t* pu8Sender)
|
|||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vTaskReadUserInput(void *arg)
|
||||
* @brief FreeRTOS task reading the user input (button)
|
||||
* @param args parameter for task
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Adds a button press to the queue
|
||||
*/
|
||||
void vTaskReadUserInput(void *arg)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
@ -107,20 +168,20 @@ void vTaskReadUserInput(void *arg)
|
|||
|
||||
memcpy(meshPacket.au8Payload, &bTmpPacket, sizeof(BLINKY_PACKET_t));
|
||||
|
||||
if(bIsRootNode() == false)
|
||||
if(bMeshNetworkIsRootNode() == false)
|
||||
{
|
||||
//this node is not root --> send led action to parent
|
||||
ERROR_CHECK(errGetParentNode(&addrParent));
|
||||
ERROR_CHECK(errSendMeshPacket(&addrParent, &meshPacket));
|
||||
ERROR_CHECK(errMeshNetworkGetParentNode(&addrParent));
|
||||
ERROR_CHECK(errMeshNetworkSendMeshPacket(&addrParent, &meshPacket));
|
||||
}
|
||||
else
|
||||
{
|
||||
//this node is root --> send led action to children
|
||||
ERROR_CHECK(errGetChildren(childrenAddr, &u16ChildrenSize));
|
||||
ERROR_CHECK(errMeshNetworkGetChildren(childrenAddr, &u16ChildrenSize));
|
||||
|
||||
for (uint16_t u16Index = 0; u16Index < u16ChildrenSize; u16Index++)
|
||||
{
|
||||
ERROR_CHECK (errSendMeshPacket(&childrenAddr[u16Index], &meshPacket));
|
||||
ERROR_CHECK (errMeshNetworkSendMeshPacket(&childrenAddr[u16Index], &meshPacket));
|
||||
}
|
||||
}
|
||||
vTaskDelay(200 / portTICK_PERIOD_MS);
|
||||
|
@ -129,6 +190,16 @@ void vTaskReadUserInput(void *arg)
|
|||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @fn void vTaskReceiveData(void *arg)
|
||||
* @brief FreeRTOS task reading queue and setting the LED
|
||||
* @param args parameter for task
|
||||
* @return void
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Sets the LED off or on based on data in queue
|
||||
*/
|
||||
void vTaskReceiveData(void *arg)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
@ -152,35 +223,35 @@ void vTaskReceiveData(void *arg)
|
|||
{
|
||||
case LED_ON:
|
||||
bLEDisOn = true;
|
||||
gpio_set_level(GPIO_LED, 1); //switch on
|
||||
gpio_set_level(GPIO_LED_BLUE, 1); //switch on
|
||||
ESP_LOGI(LOG_TAG,"switch LED ON");
|
||||
break;
|
||||
|
||||
case LED_OFF:
|
||||
bLEDisOn = false;
|
||||
gpio_set_level(GPIO_LED, 0); //switch off
|
||||
gpio_set_level(GPIO_LED_BLUE, 0); //switch off
|
||||
ESP_LOGI(LOG_TAG,"switch LED OFF");
|
||||
break;
|
||||
|
||||
default:
|
||||
bLEDisOn = false;
|
||||
gpio_set_level(GPIO_LED, 0); //switch off
|
||||
gpio_set_level(GPIO_LED_BLUE, 0); //switch off
|
||||
ESP_LOGI(LOG_TAG,"switch LED OFF");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
ERROR_CHECK(errGetChildren(childrenAddr, &u16ChildrenSize)); //get all children attached to this node
|
||||
ERROR_CHECK(errMeshNetworkGetChildren(childrenAddr, &u16ChildrenSize)); //get all children attached to this node
|
||||
memcpy(meshPacket.au8Payload, &bTmpPacket, sizeof(BLINKY_PACKET_t)); //copy led action in mesh packet payload
|
||||
|
||||
for (uint16_t u16Index = 0; u16Index < u16ChildrenSize; u16Index++)
|
||||
{
|
||||
//loop through children
|
||||
if(bCheckMACEquality(bTmpPacket.meshSenderAddr.addr, childrenAddr[u16Index].addr) == false) //exclude the sender node
|
||||
if(bMeshNetworkCheckMacEquality(bTmpPacket.meshSenderAddr.addr, childrenAddr[u16Index].addr) == false) //exclude the sender node
|
||||
{
|
||||
ERROR_CHECK (errSendMeshPacket(&childrenAddr[u16Index], &meshPacket)); //send to child
|
||||
ERROR_CHECK (errMeshNetworkSendMeshPacket(&childrenAddr[u16Index], &meshPacket)); //send to child
|
||||
}
|
||||
}
|
||||
vTaskDelay(200 / portTICK_PERIOD_MS);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,3 +1,12 @@
|
|||
/**
|
||||
* @file Blinky_LED.h
|
||||
* @brief Demo application using the mesh network
|
||||
* @author Hendrik Schutter
|
||||
* @date 20.01.2021
|
||||
*
|
||||
* Additional Infos: If button "BOOT" on ESP32-Module is pressed, all LED2 (blue) in the network will toggle the state.
|
||||
*/
|
||||
|
||||
#ifndef H_BLINKY_LED
|
||||
#define H_BLINKY_LED
|
||||
|
||||
|
@ -11,8 +20,11 @@
|
|||
|
||||
#include "Mesh_OTA.h"
|
||||
|
||||
#define NEW_VERSION
|
||||
|
||||
#define GPIO_BOOT_BTN 0 //GPIO0 (Boot BTN)
|
||||
#define GPIO_LED 2 //GPIO2 (internal blue LED in DevKit V1.0)
|
||||
#define GPIO_LED_BLUE 2 //GPIO2 (internal blue LED in DevKit V1.0)
|
||||
#define GPIO_LED_GREEN 13 //GPIO13
|
||||
|
||||
#define GPIO_INPUT_PIN_SEL (1ULL<<GPIO_BOOT_BTN)
|
||||
|
||||
|
@ -28,9 +40,9 @@ struct blinky_packet
|
|||
|
||||
typedef struct blinky_packet BLINKY_PACKET_t;
|
||||
|
||||
esp_err_t errBlinkyLEDInitialize();
|
||||
void vGPIOInitialize();
|
||||
void rxHandle(uint8_t* pu8Data, uint8_t* pu8Sender);
|
||||
esp_err_t errBlinkyLEDInitialize(void);
|
||||
void vGPIOInitialize(void);
|
||||
void rxHandle(const uint8_t* const pu8Data, const uint8_t* const pu8Sender);
|
||||
void vTaskReadUserInput(void *arg);
|
||||
void vTaskReceiveData(void *arg);
|
||||
|
||||
|
|
17
main/Main.c
17
main/Main.c
|
@ -1,15 +1,9 @@
|
|||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include <stdio.h>
|
||||
#include "sdkconfig.h"
|
||||
#include "freertos/FreeRTOS.h"
|
||||
#include "freertos/task.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
#include "nvs_flash.h"
|
||||
#include "driver/gpio.h"
|
||||
#include "esp_ota_ops.h"
|
||||
#include "esp_partition.h"
|
||||
#include "esp_spi_flash.h"
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
#include "Blinky_LED.h"
|
||||
|
@ -19,7 +13,6 @@ static const char *LOG_TAG = "esp_main";
|
|||
void app_main(void)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
ESP_LOGI(LOG_TAG, "hardcoded: 0.0.1");
|
||||
|
||||
ESP_LOGI(LOG_TAG, "start mesh network");
|
||||
err = errMeshNetworkInitialize();
|
||||
|
|
|
@ -32,7 +32,7 @@ CONFIG_APP_COMPILE_TIME_DATE=y
|
|||
# CONFIG_APP_EXCLUDE_PROJECT_VER_VAR is not set
|
||||
# CONFIG_APP_EXCLUDE_PROJECT_NAME_VAR is not set
|
||||
CONFIG_APP_PROJECT_VER_FROM_CONFIG=y
|
||||
CONFIG_APP_PROJECT_VER="0.0.1"
|
||||
CONFIG_APP_PROJECT_VER="0.1.3"
|
||||
CONFIG_APP_RETRIEVE_LEN_ELF_SHA=16
|
||||
# end of Application manager
|
||||
|
||||
|
|
Loading…
Reference in New Issue