Compare commits
20 Commits
feature/ot
...
feature/bl
Author | SHA1 | Date | |
---|---|---|---|
7301305135 | |||
57c71c401c | |||
94aa8751cb | |||
b274d939c4 | |||
6446049876 | |||
88fd2c69a9 | |||
a0546aa3ef | |||
c542dc05ab | |||
cf99410893 | |||
c6829f0483 | |||
62d16a437a | |||
62b9b1255f | |||
9b4b1d0443 | |||
0a32400a04 | |||
0289d3f1dd | |||
c17756160f | |||
d4182eddb2 | |||
378f6e9ad0 | |||
1cdd9477c3 | |||
0244457d75 |
3
.gitignore
vendored
3
.gitignore
vendored
@ -57,3 +57,6 @@ build/
|
||||
test/build/
|
||||
|
||||
*.old
|
||||
|
||||
*.orig
|
||||
|
||||
|
17
README.md
17
README.md
@ -1,2 +1,19 @@
|
||||
# ESP32-Mesh-OTA
|
||||
|
||||
## Work in progress
|
||||
<img src="https://patenschaft.bienenweide.org/img/loading.gif" alt="code_example_output" width="50"/>
|
||||
|
||||
## Todo for first release
|
||||
|
||||
### Refactoring
|
||||
- architecture
|
||||
- full error handling through all functions
|
||||
- export as a component library
|
||||
|
||||
### Features
|
||||
- root node: Download new Firmware from HTTPS server instead using newest ota partition
|
||||
- add example main app
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
idf_component_register(SRCS "https_client.c" "mesh_ota.c"
|
||||
idf_component_register(SRCS "HTTPS_client.c" "Mesh_network_handler.c" "Mesh_network.c" "Mesh_OTA.c"
|
||||
INCLUDE_DIRS "include"
|
||||
REQUIRES nvs_flash
|
||||
esp_http_client
|
||||
|
280
components/mesh_ota/HTTPS_client.c
Normal file
280
components/mesh_ota/HTTPS_client.c
Normal file
@ -0,0 +1,280 @@
|
||||
#include "HTTPS_client.h"
|
||||
|
||||
static const char *TAG = "https_client";
|
||||
|
||||
static const char *REQUEST = "GET " CONFIG_OTA_HTTPS_URL " HTTP/1.1\r\n"
|
||||
"Host: "CONFIG_OTA_HTTPS_SERVER_COMMON_NAME"\r\n"
|
||||
"User-Agent: esp-idf/1.0 esp32\r\n"
|
||||
"Authorization: Basic " CONFIG_OTA_HTTPS_AUTH "\r\n"
|
||||
"\r\n";
|
||||
|
||||
|
||||
static HTTPS_Client_t sHTTPS_ClientConfig;
|
||||
|
||||
https_client_ret_t https_clientInitEmbedTLS();
|
||||
https_client_ret_t errHTTPSClientConnectToServer();
|
||||
https_client_ret_t errHTTPSClientValidateServer();
|
||||
https_client_ret_t errHTTPSClientSendRequest();
|
||||
|
||||
https_client_ret_t errHTTPSClientInitialize()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
|
||||
i32RetHTTPClient = https_clientInitEmbedTLS();
|
||||
|
||||
if (i32RetHTTPClient == HTTPS_CLIENT_ERROR_INIT_EMBEDTLS)
|
||||
{
|
||||
ESP_LOGE(TAG, "Unable to initialize EmbedTLS");
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR;
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientRetrieveData(char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32BytesRead)
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetRetrieveData = ESP_OK;
|
||||
bool bRetriveData = true;
|
||||
|
||||
bzero(pu8Data, *pu32DataLenght);
|
||||
*pu32BytesRead = 0U;
|
||||
|
||||
while (bRetriveData)
|
||||
{
|
||||
mbedtls_ssl_conf_read_timeout(&sHTTPS_ClientConfig.conf, HTTPS_READ_TIMEOUT); //set timeout
|
||||
//Reading HTTP response
|
||||
i32RetRetrieveData = mbedtls_ssl_read(&sHTTPS_ClientConfig.ssl, (unsigned char *)(pu8Data+(*pu32BytesRead)), ((*pu32DataLenght)-(*pu32BytesRead)));
|
||||
|
||||
if(i32RetRetrieveData > 0)
|
||||
{
|
||||
//Data received
|
||||
*pu32BytesRead = *pu32BytesRead + i32RetRetrieveData;
|
||||
|
||||
if(*pu32DataLenght > 0)
|
||||
{
|
||||
//buffer not full yet --> read some more
|
||||
bRetriveData = true;
|
||||
}
|
||||
else
|
||||
{
|
||||
//buffer full --> stop reading
|
||||
bRetriveData = false;
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetRetrieveData == 0)
|
||||
{
|
||||
//all data read --> stop reading
|
||||
bRetriveData = false;
|
||||
pu32BytesRead = 0;
|
||||
}
|
||||
|
||||
if(i32RetRetrieveData == MBEDTLS_ERR_SSL_TIMEOUT )
|
||||
{
|
||||
//timeout --> stop reading
|
||||
bRetriveData = false;
|
||||
}
|
||||
|
||||
if(i32RetRetrieveData == MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY)
|
||||
{
|
||||
//connection is going to be closed
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR;
|
||||
bRetriveData = false;
|
||||
}
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientReset()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
|
||||
i32RetHTTPClient = mbedtls_ssl_close_notify(&sHTTPS_ClientConfig.ssl); //close session
|
||||
|
||||
if(i32RetHTTPClient != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_close_notify returned 0x%x", i32RetHTTPClient);
|
||||
}
|
||||
|
||||
mbedtls_ssl_session_reset(&sHTTPS_ClientConfig.ssl); //reset embedssl
|
||||
mbedtls_net_free(&sHTTPS_ClientConfig.server_fd); //free ram
|
||||
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t https_clientInitEmbedTLS()
|
||||
{
|
||||
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetEmbedTLS = ESP_OK;
|
||||
static bool bAlreadySetup = false;
|
||||
|
||||
mbedtls_ssl_init(&sHTTPS_ClientConfig.ssl);
|
||||
mbedtls_x509_crt_init(&sHTTPS_ClientConfig.cacert);
|
||||
mbedtls_ctr_drbg_init(&sHTTPS_ClientConfig.ctr_drbg);
|
||||
mbedtls_ssl_config_init(&sHTTPS_ClientConfig.conf);
|
||||
mbedtls_entropy_init(&sHTTPS_ClientConfig.entropy);
|
||||
|
||||
i32RetEmbedTLS = mbedtls_ctr_drbg_seed(&sHTTPS_ClientConfig.ctr_drbg, mbedtls_entropy_func, &sHTTPS_ClientConfig.entropy, NULL, 0);
|
||||
|
||||
if(i32RetEmbedTLS!= ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ctr_drbg_seed returned %d", i32RetEmbedTLS);
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
//Attaching the certificate bundle
|
||||
i32RetEmbedTLS = esp_crt_bundle_attach(&sHTTPS_ClientConfig.conf);
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "esp_crt_bundle_attach returned 0x%x\n\n", i32RetEmbedTLS);
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
//Setting hostname for TLS session.
|
||||
i32RetEmbedTLS = mbedtls_ssl_set_hostname(&sHTTPS_ClientConfig.ssl, CONFIG_OTA_HTTPS_SERVER_COMMON_NAME);
|
||||
// Hostname set here should match CN in server certificate
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_set_hostname returned 0x%x", i32RetEmbedTLS);
|
||||
}
|
||||
}
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
//Setting up the SSL/TLS structure
|
||||
i32RetEmbedTLS = mbedtls_ssl_config_defaults(&sHTTPS_ClientConfig.conf,
|
||||
MBEDTLS_SSL_IS_CLIENT,
|
||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||
MBEDTLS_SSL_PRESET_DEFAULT);
|
||||
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_config_defaults returned %d", i32RetEmbedTLS);
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
mbedtls_ssl_conf_authmode(&sHTTPS_ClientConfig.conf, MBEDTLS_SSL_VERIFY_REQUIRED);
|
||||
mbedtls_ssl_conf_ca_chain(&sHTTPS_ClientConfig.conf, &sHTTPS_ClientConfig.cacert, NULL);
|
||||
mbedtls_ssl_conf_rng(&sHTTPS_ClientConfig.conf, mbedtls_ctr_drbg_random, &sHTTPS_ClientConfig.ctr_drbg);
|
||||
|
||||
if (bAlreadySetup == false) //check if mbedtls_ssl_setup was called before
|
||||
{
|
||||
i32RetEmbedTLS = mbedtls_ssl_setup(&sHTTPS_ClientConfig.ssl, &sHTTPS_ClientConfig.conf); //call this only once
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_setup returned 0x%x\n\n", i32RetEmbedTLS);
|
||||
|
||||
// uint8_t buffer[20];
|
||||
//mbedtls_strerror(i32RetEmbedTLS, buffer, 20);
|
||||
//ESP_LOGE(TAG, "%s", buffer);
|
||||
}
|
||||
else
|
||||
{
|
||||
bAlreadySetup = true;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
mbedtls_net_init(&sHTTPS_ClientConfig.server_fd);
|
||||
}
|
||||
|
||||
if (i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR_INIT_EMBEDTLS;
|
||||
}
|
||||
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientConnectToServer()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetServerConnect = ESP_OK;
|
||||
|
||||
//Connecting to server
|
||||
i32RetServerConnect = mbedtls_net_connect(&sHTTPS_ClientConfig.server_fd, CONFIG_OTA_HTTPS_SERVER_COMMON_NAME, CONFIG_OTA_HTTPS_SERVER_PORT, MBEDTLS_NET_PROTO_TCP);
|
||||
if (i32RetServerConnect != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_net_connect returned %x", i32RetServerConnect);
|
||||
}
|
||||
|
||||
if(i32RetServerConnect == ESP_OK)
|
||||
{
|
||||
mbedtls_ssl_set_bio(&sHTTPS_ClientConfig.ssl, &sHTTPS_ClientConfig.server_fd, mbedtls_net_send, mbedtls_net_recv, mbedtls_net_recv_timeout);
|
||||
|
||||
//Performing the SSL/TLS handshake
|
||||
while ((i32RetServerConnect = mbedtls_ssl_handshake(&sHTTPS_ClientConfig.ssl)) != 0)
|
||||
{
|
||||
if ((i32RetServerConnect != MBEDTLS_ERR_SSL_WANT_READ) && (i32RetServerConnect != MBEDTLS_ERR_SSL_WANT_WRITE))
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_handshake returned 0x%x", i32RetServerConnect);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetServerConnect != ESP_OK)
|
||||
{
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR_INIT_CONNECT_TWO_SERVER;
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientValidateServer()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetValidateServer = ESP_OK;
|
||||
|
||||
//Verifying peer X.509 certificate
|
||||
if ((i32RetValidateServer = mbedtls_ssl_get_verify_result(&sHTTPS_ClientConfig.ssl)) != 0)
|
||||
{
|
||||
ESP_LOGE(TAG, "Failed to verify peer certificate!");
|
||||
}
|
||||
|
||||
if(i32RetValidateServer != ESP_OK)
|
||||
{
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR_INIT_VALIDATE_SERVER;
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t errHTTPSClientSendRequest()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetSendRequest = ESP_OK;
|
||||
uint32_t u32WrittenBytes = 0;
|
||||
bool bWrite = true; //flag to stop loop
|
||||
|
||||
//Writing HTTP request
|
||||
while((u32WrittenBytes < strlen(REQUEST)) && bWrite)
|
||||
{
|
||||
i32RetSendRequest = mbedtls_ssl_write(&sHTTPS_ClientConfig.ssl,
|
||||
(const unsigned char *)REQUEST + u32WrittenBytes,
|
||||
strlen(REQUEST) - u32WrittenBytes);
|
||||
if (i32RetSendRequest >= 0)
|
||||
{
|
||||
//bytes written
|
||||
u32WrittenBytes += i32RetSendRequest;
|
||||
}
|
||||
else if (i32RetSendRequest != MBEDTLS_ERR_SSL_WANT_WRITE && i32RetSendRequest != MBEDTLS_ERR_SSL_WANT_READ)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_write returned 0x%x", i32RetSendRequest);
|
||||
bWrite = false;
|
||||
}
|
||||
}
|
||||
|
||||
if(bWrite == false)
|
||||
{
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR_INIT_SEND_REQUEST;
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
992
components/mesh_ota/Mesh_OTA.c
Normal file
992
components/mesh_ota/Mesh_OTA.c
Normal file
@ -0,0 +1,992 @@
|
||||
#include "Mesh_OTA.h"
|
||||
|
||||
static const char *LOG_TAG = "mesh_ota";
|
||||
|
||||
xQueueHandle queueNodes; //nodes that should be checked for ota update (contains children and parent)
|
||||
xQueueHandle queueMessageOTA; //mesh ota controll messages like "OTA_Version_Response" "OTA_ACK"
|
||||
|
||||
SemaphoreHandle_t bsStartStopServerWorker; //binary semaphore
|
||||
SemaphoreHandle_t bsOTAProcess; //binary semaphore
|
||||
|
||||
const esp_partition_t* pOTAPartition; //pointer to ota partition
|
||||
bool bWantReboot; //flag to signal pending reboot
|
||||
|
||||
bool bOtaAbortTx = false;
|
||||
esp_partition_t* pBootPartitionTx; //pointer to boot partition (that will booted after reset)
|
||||
uint32_t u32OTABytesWrittenTx = 0U;
|
||||
uint32_t u32SegmentCounterTx = 0U;
|
||||
bool bNodeIsRespondingTx = false; //remote node is still active
|
||||
|
||||
esp_err_t errMeshOTAInitialize()
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
BaseType_t xReturned;
|
||||
bWantReboot = false;
|
||||
|
||||
//create queue to store nodes for ota worker task
|
||||
queueNodes = xQueueCreate(QUEUE_NODES_SIZE, sizeof(mesh_addr_t));
|
||||
if (queueNodes == 0) // Queue not created
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Queue for Nodes");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//create queue to store ota messages
|
||||
queueMessageOTA = xQueueCreate(QUEUE_MESSAGE_OTA_SIZE, sizeof(MESH_PACKET_t));
|
||||
if (queueMessageOTA == 0) // Queue not created
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Queue for OTA Messages");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
bsStartStopServerWorker = xSemaphoreCreateBinary();
|
||||
if( bsStartStopServerWorker == NULL )
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Mutex to represent state of Server worker");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
bsOTAProcess = xSemaphoreCreateBinary();
|
||||
if( bsOTAProcess == NULL )
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Mutex to grant access to OTA Process");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
xSemaphoreGive(bsOTAProcess); //unlock binary semaphore
|
||||
if( bsOTAProcess == NULL )
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to unlock Mutex to grant access to OTA Process");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
ERROR_CHECK(errMeshNetworkSetChildConnectedHandle(vAddNodeToPossibleUpdatableQueue));
|
||||
ERROR_CHECK(errMeshNetworkSetOTAMessageHandle(vAddOTAControllMessageToQueue));
|
||||
ERROR_CHECK(errMeshNetworkSetChangeStateOfServerWorkerHandle(vChangeStateOfServerWorker));
|
||||
ERROR_CHECK(errMeshNetworkSetOtaDataHandle(vRecOtaDataHandler));
|
||||
ERROR_CHECK(errMeshNetworkSetOtaAckHandle(vRecOtaAckHandler));
|
||||
//ERROR_CHECK(errMeshNetworkSetOtaCompleteHandle(vRecOtaCompleteHandler));
|
||||
// ERROR_CHECK(errMeshNetworkSetOtaAbortHandle(vRecOtaAbortHandler));
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
pOTAPartition = esp_ota_get_next_update_partition(NULL); //get ota partition
|
||||
|
||||
if(pOTAPartition == NULL)
|
||||
{
|
||||
err = ESP_FAIL;
|
||||
ESP_LOGE(LOG_TAG, "unable to get next ota partition");
|
||||
}
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
xReturned = xTaskCreate(vTaskServerWorker, "vTaskServerWorker", 8192, NULL, 5, NULL);
|
||||
if(xReturned != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create the server worker task");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
xReturned = xTaskCreate(vTaskOTAWorker, "vTaskOTAWorker", 8192, NULL, 5, NULL);
|
||||
if(xReturned != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create the OTA worker task");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
void vAddNodeToPossibleUpdatableQueue(uint8_t* pu8MAC)
|
||||
{
|
||||
//send payload to node queues
|
||||
mesh_addr_t addrNode;
|
||||
memcpy(&addrNode.addr, (uint8_t *)pu8MAC, 6); //copy MAC
|
||||
|
||||
if (xQueueSend(queueNodes, &addrNode, portMAX_DELAY) != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to push node into node queue");
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "added node \"%x:%x:%x:%x:%x:%x\" to possible updatable queue", addrNode.addr[0], addrNode.addr[1], addrNode.addr[2], addrNode.addr[3], addrNode.addr[4], addrNode.addr[5]);
|
||||
}
|
||||
}
|
||||
|
||||
void vAddOTAControllMessageToQueue(MESH_PACKET_t* puMeshPacket)
|
||||
{
|
||||
//send ota packet to packet queue
|
||||
if (xQueueSend(queueMessageOTA, puMeshPacket, portMAX_DELAY) != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to push ota packet into packet queue");
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "added ota message to queue: %i (type)", puMeshPacket->type);
|
||||
}
|
||||
}
|
||||
|
||||
void vChangeStateOfServerWorker(bool bState) //allow access via function ptn to networl_handler
|
||||
{
|
||||
static bool bLastState = false;
|
||||
|
||||
if(bState != bLastState) //change only if necessary
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "server worker change handler");
|
||||
|
||||
if(bState == true)
|
||||
{
|
||||
if (xSemaphoreGive(bsStartStopServerWorker) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to give mutex to activate the server worker");
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
if (xSemaphoreTake(bsStartStopServerWorker,( TickType_t ) 10 ) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to obtain mutex to deactivate the server worker");
|
||||
}
|
||||
}
|
||||
bLastState = bState;
|
||||
}
|
||||
}
|
||||
|
||||
void vTaskServerWorker(void *arg)
|
||||
{
|
||||
esp_err_t err;
|
||||
bool bNewOTAImage; //true if a new ota image was downloaded and validated
|
||||
bool bFirstRun = true;
|
||||
|
||||
while(true)
|
||||
{
|
||||
err = ESP_OK;
|
||||
bNewOTAImage = false;
|
||||
xSemaphoreTake(bsStartStopServerWorker, portMAX_DELAY); //wait for binary semaphore that allows to start the worker
|
||||
xSemaphoreGive(bsStartStopServerWorker); //free binary semaphore, this allows the handler to change is to taken
|
||||
|
||||
if (esp_mesh_is_root()) //check again that this node is the root node
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "Checking firmware image on server");
|
||||
|
||||
if(bFirstRun == true)
|
||||
{
|
||||
ERROR_CHECK(errHTTPSClientInitialize());
|
||||
bFirstRun = false;
|
||||
}
|
||||
|
||||
ERROR_CHECK(errHTTPSClientConnectToServer());
|
||||
ERROR_CHECK(errHTTPSClientValidateServer());
|
||||
ERROR_CHECK(errHTTPSClientSendRequest());
|
||||
|
||||
ERROR_CHECK(errOTAHTTPS(&bNewOTAImage));
|
||||
errHTTPSClientReset();
|
||||
|
||||
if(bNewOTAImage == true)
|
||||
{
|
||||
//set want reboot
|
||||
ESP_LOGI(LOG_TAG, "Updated successfully via HTTPS, set pending reboot");
|
||||
bWantReboot = true;
|
||||
vAddAllNeighboursToQueue(); //add all existing neighbours to queue (aparent will not be added because this node is the root)
|
||||
}
|
||||
vTaskDelay( (SERVER_CHECK_INTERVAL*1000) / portTICK_PERIOD_MS); //sleep till next server checks
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void vTaskOTAWorker(void *arg)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
bool bNewOTAImage; //true if a new ota image was downloaded and validated
|
||||
mesh_addr_t meshNodeAddr; //node that should be checked for ota update
|
||||
|
||||
while(true)
|
||||
{
|
||||
err = ESP_OK;
|
||||
bNewOTAImage = false;
|
||||
|
||||
if((uxQueueSpacesAvailable(queueNodes) - QUEUE_NODES_SIZE) == 0)
|
||||
{
|
||||
//nodes queue is empty
|
||||
ESP_LOGI(LOG_TAG, "nodes queue is empty");
|
||||
|
||||
if(bWantReboot == true)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "ESP32 Reboot ...");
|
||||
//vTaskDelay( (1000) / portTICK_PERIOD_MS);
|
||||
//esp_restart();
|
||||
}
|
||||
|
||||
ERROR_CHECK(errOTAMeshSlave(&bNewOTAImage));
|
||||
}
|
||||
else
|
||||
{
|
||||
//queue not empty
|
||||
ESP_LOGI(LOG_TAG, "nodes queue not empty: %i", (QUEUE_NODES_SIZE - uxQueueSpacesAvailable(queueNodes)));
|
||||
|
||||
if (xQueueReceive(queueNodes, &meshNodeAddr, ((100) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from Queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
ERROR_CHECK(errOTAMeshMaster(&bNewOTAImage, &meshNodeAddr));
|
||||
|
||||
if (err != ESP_OK)
|
||||
{
|
||||
//OTA process faild --> add back to queue
|
||||
vAddNodeToPossibleUpdatableQueue(meshNodeAddr.addr);
|
||||
}
|
||||
}
|
||||
|
||||
if(bNewOTAImage == true)
|
||||
{
|
||||
//set want reboot
|
||||
ESP_LOGI(LOG_TAG, "Updated successfully via Mesh, set pending reboot");
|
||||
bWantReboot = true;
|
||||
vAddAllNeighboursToQueue(); //add all existing neighbours to queue
|
||||
}
|
||||
vTaskDelay( (1000) / portTICK_PERIOD_MS); //TODO this is debug
|
||||
}
|
||||
}
|
||||
|
||||
esp_err_t errOTAHTTPS(bool* pbNewOTAImage)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
char u8OTABuffer[OTA_HTTPS_SEGMENT_SIZE]; //store image segment from server before ota write
|
||||
uint32_t u32BufferLenght = OTA_HTTPS_SEGMENT_SIZE; //size of buffer
|
||||
uint32_t u32BytesRead = 0; //number of bytes that are read from server, <= u32BufferLenght
|
||||
char pcRemoteVersionNumber[12]; //string for version number in server image
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
static esp_ota_handle_t otaHandle; //OTA process handle
|
||||
uint32_t u32StartOffset = 0U; //start offset for image (exclude the http response data)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadate from boot partition
|
||||
uint32_t u32OTABytesWritten = 0U; //counter unsed for progress log
|
||||
|
||||
ERROR_CHECK(errHTTPSClientRetrieveData(u8OTABuffer, &u32BufferLenght, &u32BytesRead)); //read first bytes if image, including the version
|
||||
|
||||
ERROR_CHECK(errExtractVersionNumber(u8OTABuffer, &u32BytesRead, pcRemoteVersionNumber)); //extract version numbers
|
||||
|
||||
if(err == ESP_OK) //check if version number is found
|
||||
{
|
||||
xSemaphoreTake(bsOTAProcess, portMAX_DELAY); //wait for binary semaphore that allows to start the OTA process
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
|
||||
if(bNewerVersion((bootPartitionDesc).version, pcRemoteVersionNumber)) //compare local and remote version
|
||||
{
|
||||
// server image is newer --> OTA update required
|
||||
ESP_LOGI(LOG_TAG, "Server: image is newer --> OTA update required");
|
||||
|
||||
ERROR_CHECK(errFindImageStart(u8OTABuffer, &u32BufferLenght, &u32StartOffset)); //get image start offset
|
||||
|
||||
ERROR_CHECK(esp_ota_begin(pOTAPartition, OTA_SIZE_UNKNOWN, &otaHandle)); //start ota update process
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//image download and ota partition write
|
||||
ESP_LOGI(LOG_TAG, "start OTA download via HTTPS");
|
||||
do
|
||||
{
|
||||
vPrintOTAProgress(&(pOTAPartition->size), &u32OTABytesWritten, Receiver);
|
||||
ERROR_CHECK(esp_ota_write(otaHandle, (const void*) u8OTABuffer+u32StartOffset, (u32BytesRead-u32StartOffset)));
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//write was succsesfull
|
||||
u32StartOffset = 0U; //reset the offset for next download
|
||||
ERROR_CHECK(errHTTPSClientRetrieveData(u8OTABuffer, &u32BufferLenght, &u32BytesRead)); //download next data segment
|
||||
u32OTABytesWritten = u32OTABytesWritten + u32BytesRead; //update counter
|
||||
}
|
||||
}
|
||||
while ((u32BytesRead > 0) && (err == ESP_OK) && (u32OTABytesWritten <= pOTAPartition->size)); //loop until error or complete image downloaded
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//no error occurred --> finish ota update process
|
||||
ERROR_CHECK(esp_ota_end(otaHandle)); //finish process
|
||||
ERROR_CHECK(esp_ota_set_boot_partition(pOTAPartition)); //set new image as boot
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
*pbNewOTAImage = true; //image validated
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
//error occurred --> abort ota update process
|
||||
ESP_LOGE(LOG_TAG, "abort ota process due to error 0x%x -> %s", err, esp_err_to_name(err));
|
||||
ERROR_CHECK(esp_ota_abort(otaHandle));
|
||||
*pbNewOTAImage = false; //ota update failed
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "server image is NOT newer --> OTA update NOT required");
|
||||
}
|
||||
xSemaphoreGive(bsOTAProcess); //free binary semaphore, this allows other tasks to start the OTA process
|
||||
} //end version number extracted
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errOTAMeshSlave(bool* pbNewOTAImage)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t sOTAMessage;
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadate from boot partition
|
||||
*pbNewOTAImage = false; //set default false
|
||||
|
||||
//read OTAMessages queue
|
||||
if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
{
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sOTAMessage, ((100) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from Queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (sOTAMessage.type == OTA_Version_Request)) //if OTA_Version_Request
|
||||
{
|
||||
xSemaphoreTake(bsOTAProcess, portMAX_DELAY); //wait for binary semaphore that allows to start the OTA process
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
|
||||
ESP_LOGI(LOG_TAG, "//send OTA_Version_Response to sender of OTA_Version_Request packet with version in payload");
|
||||
ERROR_CHECK(errSendOTAVersionResponse(&sOTAMessage.meshSenderAddr));
|
||||
|
||||
if((bNewerVersion((bootPartitionDesc).version, (char*) sOTAMessage.au8Payload)) && (err == ESP_OK)) //compare local and remote version
|
||||
{
|
||||
//remote newer as local
|
||||
ESP_LOGI(LOG_TAG, "remote image on node is newer --> OTA update required");
|
||||
// --> this version older --> start OTA_Rx --> set pbNewOTAImage true
|
||||
ERROR_CHECK(errOTAMeshReceive(pbNewOTAImage, &sOTAMessage.meshSenderAddr));
|
||||
}
|
||||
|
||||
if((bNewerVersion((char*) sOTAMessage.au8Payload, (bootPartitionDesc).version)) && (err == ESP_OK)) //compare remote and local version
|
||||
{
|
||||
//local newer as remote
|
||||
ESP_LOGI(LOG_TAG, "remote image on node is older --> OTA send required");
|
||||
// --> this version newer --> start OTA_Tx
|
||||
ERROR_CHECK(errOTAMeshTransmit(&sOTAMessage.meshSenderAddr));
|
||||
}
|
||||
xSemaphoreGive(bsOTAProcess); //free binary semaphore, this allows other tasks to start the OTA process
|
||||
}
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errOTAMeshMaster(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t sOTAMessage;
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadata from boot partition
|
||||
bool bNodeIsConnected = false;
|
||||
bool bNodeIsResponding = false;
|
||||
|
||||
*pbNewOTAImage = false; //set default false
|
||||
|
||||
if(bIsNodeNeighbour(pMeshNodeAddr) == true) //check if node is still connected
|
||||
{
|
||||
bNodeIsConnected = true; //node is one of the neighbours
|
||||
xSemaphoreTake(bsOTAProcess, portMAX_DELAY); //wait for binary semaphore that allows to start the OTA process
|
||||
|
||||
ERROR_CHECK(errSendOTAVersionRequest(pMeshNodeAddr)); //send OTA_VERSION_REQUEST with local version in payload
|
||||
|
||||
for (uint32_t u32Index = 0; u32Index < QUEUE_MESSAGE_OTA_SIZE; u32Index++) //loop through all OTA messages
|
||||
{
|
||||
//if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
// {
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sOTAMessage, ((OTA_MESH_TIMEOUT) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (sOTAMessage.type == OTA_Version_Response) && (bCheckMACEquality(sOTAMessage.meshSenderAddr.addr, pMeshNodeAddr->addr))) //if OTA_Version_Request
|
||||
{
|
||||
bNodeIsResponding = true;
|
||||
u32Index = QUEUE_MESSAGE_OTA_SIZE; //this will exit the loop through all OTA messages
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadata of partition
|
||||
|
||||
if((bNewerVersion((bootPartitionDesc).version, (char*) sOTAMessage.au8Payload)) && (err == ESP_OK)) //compare local and remote version
|
||||
{
|
||||
//remote newer as local
|
||||
ESP_LOGI(LOG_TAG, "Mesh: remote image on node is newer --> OTA update required");
|
||||
// --> this version older --> start OTA_Rx --> set pbNewOTAImage true
|
||||
ERROR_CHECK(errOTAMeshReceive(pbNewOTAImage, &sOTAMessage.meshSenderAddr));
|
||||
}
|
||||
|
||||
if((bNewerVersion((char*) sOTAMessage.au8Payload, (bootPartitionDesc).version)) && (err == ESP_OK)) //compare remote and local version
|
||||
{
|
||||
//local newer as remote
|
||||
ESP_LOGI(LOG_TAG, "Mesh: remote image on node is older --> OTA send required");
|
||||
// --> this version newer --> start OTA_Tx
|
||||
ERROR_CHECK(errOTAMeshTransmit(&sOTAMessage.meshSenderAddr));
|
||||
}
|
||||
}
|
||||
else if (err == ESP_OK)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//received from wrong node or type --> back to queue");
|
||||
vAddOTAControllMessageToQueue(&sOTAMessage);
|
||||
}
|
||||
/* }
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "// OTA Message queue is empty --> wait some time");
|
||||
vTaskDelay(OTA_MESH_TIMEOUT*u32Index / portTICK_PERIOD_MS);
|
||||
}
|
||||
*/
|
||||
}//end loop
|
||||
xSemaphoreGive(bsOTAProcess); //free binary semaphore, this allows other tasks to start the OTA process
|
||||
}
|
||||
|
||||
if((bNodeIsResponding == false) && (bNodeIsConnected == true))
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//add node back to queue if connected and NOT responding");
|
||||
vAddNodeToPossibleUpdatableQueue(pMeshNodeAddr->addr);
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
bool bNewerVersion(const char* pu8Local, const char* pu8Remote)
|
||||
{
|
||||
/*
|
||||
* Return true if remote version is newer (higher) than local version
|
||||
*/
|
||||
char u8LocalTmp[12]; //local version
|
||||
char u8RemoteTmp[12]; //remote version
|
||||
char* pu8saveptrLocal; //context for strok_r
|
||||
char* pu8saveptrRemote; //context for strok_r
|
||||
bool bReturn = false; //flag to stop loop
|
||||
uint8_t u8Index = 0; //numbers counter in version string
|
||||
|
||||
strncpy(u8LocalTmp, pu8Local, 12); //copy in tmp
|
||||
strncpy(u8RemoteTmp, pu8Remote, 12); //copy in tmp
|
||||
|
||||
char* pu8TokenLocal = strtok_r(u8LocalTmp, ".", &pu8saveptrLocal); //split tokens
|
||||
char* pu8TokenRemote = strtok_r(u8RemoteTmp, ".", &pu8saveptrRemote); //split tokens
|
||||
|
||||
while( (u8Index <= 2) && (bReturn == false)) //loop through tokens
|
||||
{
|
||||
u8Index++;
|
||||
if(atoi(pu8TokenLocal) < atoi(pu8TokenRemote))
|
||||
{
|
||||
bReturn = true; //version number difference --> stop loop
|
||||
}
|
||||
pu8TokenLocal = strtok_r(NULL, ".", &pu8saveptrLocal); //split tokens
|
||||
pu8TokenRemote = strtok_r(NULL, ".", &pu8saveptrRemote); //split tokens
|
||||
}
|
||||
return bReturn;
|
||||
}
|
||||
|
||||
esp_err_t errFindImageStart(const char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32StartOffset)
|
||||
{
|
||||
/*
|
||||
Offset value
|
||||
0 = 0xE9 (first byte in image --> magic byte)
|
||||
48 = first digit of version number
|
||||
*/
|
||||
|
||||
esp_err_t errReturn = ESP_OK;
|
||||
bool bImageStartOffsetFound = false;
|
||||
uint32_t u32DataIndex = 0;
|
||||
uint32_t u32FirstDotOffset = 0;
|
||||
uint32_t u32SecondDotOffset = 0;
|
||||
uint8_t u8FirstDotIndex = 0;
|
||||
uint8_t u8SecondDotIndex = 0;
|
||||
|
||||
*pu32StartOffset = 0U; //reset offset to zero
|
||||
|
||||
while((u32DataIndex < *pu32DataLenght) && (bImageStartOffsetFound == false))
|
||||
{
|
||||
//search for magic byte
|
||||
if(pu8Data[u32DataIndex] == 0xe9)
|
||||
{
|
||||
//magic byte found
|
||||
while ((u8FirstDotIndex < 3) && (u32FirstDotOffset == 0))
|
||||
{
|
||||
//search first dot in version number
|
||||
if((u32DataIndex+49+u8FirstDotIndex) < *pu32DataLenght)
|
||||
{
|
||||
if((pu8Data[(u32DataIndex+49+u8FirstDotIndex)] == 0x2e))
|
||||
{
|
||||
//first dot found
|
||||
u32FirstDotOffset = (u32DataIndex+49+u8FirstDotIndex);
|
||||
}
|
||||
}
|
||||
u8FirstDotIndex++;
|
||||
}
|
||||
|
||||
while ((u8SecondDotIndex < 3) && (u32SecondDotOffset == 0) && (u32FirstDotOffset != 0))
|
||||
{
|
||||
//search first dot in version number
|
||||
if((u32FirstDotOffset+(u8SecondDotIndex+2)) < *pu32DataLenght)
|
||||
{
|
||||
if((pu8Data[(u32FirstDotOffset+(u8SecondDotIndex+2))] == 0x2e))
|
||||
{
|
||||
//second dot found
|
||||
u32SecondDotOffset = (u32FirstDotOffset+(u8SecondDotIndex+2));
|
||||
}
|
||||
}
|
||||
u8SecondDotIndex++;
|
||||
}
|
||||
|
||||
if((u32FirstDotOffset != 0) && (u32SecondDotOffset != 0))
|
||||
{
|
||||
//image start found based on magic byte and version number systax
|
||||
*pu32StartOffset = u32DataIndex; //store image start offset
|
||||
bImageStartOffsetFound = true;
|
||||
}
|
||||
else
|
||||
{
|
||||
// this is propably not the magic byte --> reset
|
||||
u32FirstDotOffset = 0;
|
||||
u32SecondDotOffset = 0;
|
||||
u8FirstDotIndex = 0;
|
||||
u8SecondDotIndex = 0;
|
||||
}
|
||||
}
|
||||
u32DataIndex++;
|
||||
}
|
||||
|
||||
if(bImageStartOffsetFound == false)
|
||||
{
|
||||
errReturn = ESP_ERR_NOT_FOUND;
|
||||
}
|
||||
|
||||
return errReturn;
|
||||
}
|
||||
|
||||
esp_err_t errExtractVersionNumber(const char* pu8Data, uint32_t* pu32DataLenght, char* pc8RemoteVersionNumber)
|
||||
{
|
||||
uint32_t u32StartOffset;
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
strcpy(pc8RemoteVersionNumber, "999.999.999"); //init value
|
||||
err = errFindImageStart(pu8Data, pu32DataLenght, &u32StartOffset); //get image start offset
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//image found
|
||||
strncpy(pc8RemoteVersionNumber, pu8Data+(u32StartOffset+48), 11); //copy version number
|
||||
pc8RemoteVersionNumber[12] = '\0';
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
void vPrintOTAProgress(const uint32_t* const pu32TotalImageSize, const uint32_t* const pu32BytesWritten, OTA_MESH_ROLE_t eRole)
|
||||
{
|
||||
uint32_t u32Percentage = 0U;
|
||||
static uint32_t u32LastPercentage = 0U;
|
||||
|
||||
if((*pu32BytesWritten) >= (*pu32TotalImageSize))
|
||||
{
|
||||
u32Percentage = 100;
|
||||
}
|
||||
else
|
||||
{
|
||||
u32Percentage = (uint32_t) (((float) (*pu32BytesWritten)/(float) (*pu32TotalImageSize)) * 100.0);
|
||||
}
|
||||
|
||||
if((u32Percentage-u32LastPercentage) >= OTA_PROGRESS_LOG_INTERVAL)
|
||||
{
|
||||
if(eRole == Transmitter)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Transmitting OTA update: %i %%", u32Percentage);
|
||||
}
|
||||
|
||||
if(eRole == Receiver)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Receiving OTA update: %i %%", u32Percentage);
|
||||
}
|
||||
|
||||
|
||||
|
||||
u32LastPercentage = u32Percentage;
|
||||
}
|
||||
}
|
||||
|
||||
void vAddAllNeighboursToQueue(void)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
mesh_addr_t addrParent; //addr of parent node
|
||||
mesh_addr_t childrenAddr[CONFIG_MESH_ROUTE_TABLE_SIZE]; //array of children attached to this node
|
||||
uint16_t u16ChildrenSize = 0U; //number of children attached to this node
|
||||
|
||||
err = errGetParentNode(&addrParent);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
vAddNodeToPossibleUpdatableQueue(addrParent.addr);
|
||||
ESP_LOGI(LOG_TAG, "added parent");
|
||||
}
|
||||
|
||||
err = ESP_OK; //reset error code
|
||||
|
||||
ERROR_CHECK(errGetChildren(childrenAddr, &u16ChildrenSize)); //get all children
|
||||
|
||||
for (uint16_t u16Index = 0; ((u16Index < u16ChildrenSize) && (err == ESP_OK)); u16Index++)
|
||||
{
|
||||
vAddNodeToPossibleUpdatableQueue(childrenAddr[u16Index].addr);
|
||||
ESP_LOGI(LOG_TAG, "added child");
|
||||
}
|
||||
}
|
||||
|
||||
esp_err_t errSendOTAVersionResponse(mesh_addr_t* pMeshReceiverAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t packet;
|
||||
packet.type = OTA_Version_Response;
|
||||
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadata from boot partition
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadate of partition
|
||||
memcpy(&packet.au8Payload, &bootPartitionDesc.version, 12); //copy local version to OTA_Version_Response packet
|
||||
err = errSendMeshPacket(pMeshReceiverAddr, &packet);
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errSendOTAVersionRequest(mesh_addr_t* pMeshReceiverAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t packet;
|
||||
packet.type = OTA_Version_Request;
|
||||
|
||||
const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
esp_app_desc_t bootPartitionDesc; //Metadata from boot partition
|
||||
|
||||
pBootPartition = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
ERROR_CHECK(esp_ota_get_partition_description(pBootPartition, &bootPartitionDesc)); //get metadate of partition
|
||||
memcpy(&packet.au8Payload, &bootPartitionDesc.version, 12); //copy local version to OTA_Version_Request packet
|
||||
err = errSendMeshPacket(pMeshReceiverAddr, &packet);
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errOTAMeshTransmit(mesh_addr_t* pMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
//const esp_partition_t* pBootPartition; //pointer to boot partition (that will booted after reset)
|
||||
MESH_PACKET_t sMeshPacket; //packet for sending and receiving
|
||||
//uint32_t u32Index = 0U; //index for partition read offset
|
||||
//bool bAbort = false; //abort the OTA process
|
||||
//bool bNodeIsResponding = false; //remote node is still active
|
||||
//uint32_t u32OTABytesWritten = 0U;
|
||||
//uint32_t u32SegmentCounter = 0U;
|
||||
|
||||
pBootPartitionTx = esp_ota_get_boot_partition(); //get boot partition (that will booted after reset), not the running partition
|
||||
|
||||
u32OTABytesWrittenTx = 0U;
|
||||
u32SegmentCounterTx = 0U;
|
||||
bNodeIsRespondingTx = false; //remote node is still active
|
||||
|
||||
//loop through partition to read in segmensts until end or error or abort called
|
||||
// while( ((OTA_MESH_SEGMENT_SIZE * u32SegmentCounter) < pBootPartition->size) && (err == ESP_OK) && (bAbort == false))
|
||||
{
|
||||
//bNodeIsResponding = false; //reset to default
|
||||
/*
|
||||
ESP_LOGI(LOG_TAG, "// read partition with offset based in index");
|
||||
ERROR_CHECK(esp_partition_read(pBootPartition, (OTA_MESH_SEGMENT_SIZE * u32Index), sMeshPacket.au8Payload, OTA_MESH_SEGMENT_SIZE));
|
||||
u32OTABytesWritten = ((u32SegmentCounter+1) * OTA_MESH_SEGMENT_SIZE);
|
||||
vPrintOTAProgress(&(pBootPartition->size), &u32OTABytesWritten, Transmitter);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//ESP_LOGI(LOG_TAG, "//no error while read --> send OTA_DATA packet");
|
||||
sMeshPacket.type = OTA_Data;
|
||||
|
||||
if((OTA_MESH_SEGMENT_SIZE * (u32SegmentCounter+1)) >= pBootPartition->size) //check if last segment
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//last partition image segment --> send OTA_Complete");
|
||||
sMeshPacket.type = OTA_Complete;
|
||||
ESP_LOGE(LOG_TAG, "u32SegmentCounter: %i", u32SegmentCounter);
|
||||
}
|
||||
|
||||
err = errSendMeshPacket(pMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "// error while read --> send OTA_ABORT and abort this OTA process");
|
||||
sMeshPacket.type = OTA_Abort;
|
||||
bAbort = true;
|
||||
errSendMeshPacket(pMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
*/
|
||||
// loop through all OTA messages or until abort is called or error
|
||||
for (uint32_t u32Index = 0; ((u32Index < QUEUE_MESSAGE_OTA_SIZE) && (bOtaAbortTx == false)); u32Index++) //loop through all OTA messages
|
||||
{
|
||||
// if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
// {
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sMeshPacket, ((OTA_MESH_TIMEOUT) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (bCheckMACEquality(sMeshPacket.meshSenderAddr.addr, pMeshNodeAddr->addr))) //if OTA_Version_Request
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//packet from node received");
|
||||
switch (sMeshPacket.type)
|
||||
{
|
||||
case OTA_Abort: //abort this OTA process
|
||||
bOtaAbortTx = true;
|
||||
bNodeIsRespondingTx = true;
|
||||
break;
|
||||
default:
|
||||
ESP_LOGI(LOG_TAG, "//receives wrong OTA message type from node --> back to queue");
|
||||
vAddOTAControllMessageToQueue(&sMeshPacket);
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if (err == ESP_OK)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//received from wrong node --> back to queue");
|
||||
vAddOTAControllMessageToQueue(&sMeshPacket);
|
||||
|
||||
if(bNodeIsRespondingTx == false)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//no abort was called but node didn’t responded");
|
||||
bOtaAbortTx = true;
|
||||
err = ESP_FAIL; //this OTA process failed with error
|
||||
}
|
||||
else
|
||||
{
|
||||
bNodeIsRespondingTx = false;
|
||||
}
|
||||
|
||||
|
||||
}
|
||||
// }
|
||||
// else
|
||||
//{
|
||||
// ESP_LOGI(LOG_TAG, "// OTA Message queue is empty --> wait some time");
|
||||
//vTaskDelay(OTA_MESH_TIMEOUT*u32Index/ portTICK_PERIOD_MS);
|
||||
// }
|
||||
|
||||
}//end OTA message loop
|
||||
|
||||
}
|
||||
// u32SegmentCounter++;
|
||||
//}//end of partition segment loop
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errOTAMeshReceive(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t sMeshPacket; //packet for sending and receiving
|
||||
bool bComplete = false; //complete the OTA process
|
||||
bool bAbort = false; //abort the OTA process
|
||||
bool bNodeIsResponding = false; //remote node is still active
|
||||
uint32_t u32OTABytesWritten = 0U; //counter unsed for progress log
|
||||
static esp_ota_handle_t otaHandle; //OTA process handle
|
||||
*pbNewOTAImage = false;
|
||||
uint32_t u32SegmentCounter = 0U;
|
||||
|
||||
ERROR_CHECK(esp_ota_begin(pOTAPartition, OTA_SIZE_UNKNOWN, &otaHandle)); //start ota update process
|
||||
|
||||
//partition segement loop through partition to read in segmensts until end or error or abort called
|
||||
while((bComplete == false) && (err == ESP_OK) && (bAbort == false) && (u32OTABytesWritten <= pOTAPartition->size))
|
||||
{
|
||||
bNodeIsResponding = false; //reset to default
|
||||
|
||||
// loop through all OTA messages or until abort is called
|
||||
for (uint32_t u32Index = 0; ((u32Index < QUEUE_MESSAGE_OTA_SIZE) && (bAbort == false)); u32Index++) //loop through all OTA messages
|
||||
{
|
||||
//if(uxQueueSpacesAvailable(queueMessageOTA) < QUEUE_MESSAGE_OTA_SIZE)
|
||||
// {
|
||||
//queue not empty
|
||||
if (xQueueReceive(queueMessageOTA, &sMeshPacket, ((OTA_MESH_TIMEOUT) / portTICK_PERIOD_MS)) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive OTA Messages from queue");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
if((err == ESP_OK) && (bCheckMACEquality(sMeshPacket.meshSenderAddr.addr, pMeshNodeAddr->addr))) //if OTA_Version_Request
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//packet from node received");
|
||||
switch (sMeshPacket.type)
|
||||
{
|
||||
case OTA_Complete:
|
||||
ESP_LOGI(LOG_TAG, "//signal end of this OTA process, fall through because same behavior as OTA_Data");
|
||||
bComplete = true;
|
||||
ESP_LOGE(LOG_TAG, "after rec:Complete u32SegmentCounter: %i", u32SegmentCounter);
|
||||
//fall through
|
||||
case OTA_Data:
|
||||
ESP_LOGI(LOG_TAG, "//data segement received");
|
||||
bNodeIsResponding = true;
|
||||
u32Index = QUEUE_MESSAGE_OTA_SIZE; //this will exit the loop through all OTA messages
|
||||
ERROR_CHECK(esp_ota_write(otaHandle, sMeshPacket.au8Payload, OTA_MESH_SEGMENT_SIZE));
|
||||
|
||||
if(err != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "write error - Segement: %i", u32SegmentCounter);
|
||||
}
|
||||
|
||||
u32OTABytesWritten = ((u32SegmentCounter+1) * OTA_MESH_SEGMENT_SIZE);
|
||||
vPrintOTAProgress(&(pOTAPartition->size), &u32OTABytesWritten, Receiver);
|
||||
break;
|
||||
case OTA_Abort: //abort this OTA process
|
||||
bAbort = true;
|
||||
bNodeIsResponding = true;
|
||||
break;
|
||||
default:
|
||||
ESP_LOGI(LOG_TAG, "//receives wrong OTA message type from node --> back to queue");
|
||||
vAddOTAControllMessageToQueue(&sMeshPacket);
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if (err == ESP_OK)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//received from wrong node --> back to queue");
|
||||
vAddOTAControllMessageToQueue(&sMeshPacket);
|
||||
}
|
||||
// }
|
||||
// else
|
||||
// {
|
||||
// ESP_LOGI(LOG_TAG, "// OTA Message queue is empty --> wait some time");
|
||||
// vTaskDelay((OTA_MESH_TIMEOUT*u32Index) / portTICK_PERIOD_MS);
|
||||
// }
|
||||
|
||||
}//end of OTA message loop
|
||||
|
||||
if(bNodeIsResponding == false)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//no abort was called but node didn’t responded --> error");
|
||||
bAbort = true; //this will stop the partition segement loop
|
||||
err = ESP_FAIL; //this OTA process failed with error
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//node has responded with OTA_DATA or OTA_Complete or OTA_ABORT");
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
|
||||
if((bAbort == false) && (bComplete == false))
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//no error while ota write --> send OTA_ACK packet");
|
||||
sMeshPacket.type = OTA_ACK;
|
||||
err = errSendMeshPacket(pMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
}
|
||||
else if (bComplete == false)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "// error while read --> send OTA_ABORT and abort this OTA process");
|
||||
sMeshPacket.type = OTA_Abort;
|
||||
bAbort = true;
|
||||
errSendMeshPacket(pMeshNodeAddr, &sMeshPacket);
|
||||
}
|
||||
}
|
||||
u32SegmentCounter++;
|
||||
}//end of partition segement loop
|
||||
|
||||
if(bComplete == true)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//all OTA segments received --> validate");
|
||||
ERROR_CHECK(esp_ota_end(otaHandle));
|
||||
ERROR_CHECK(esp_ota_set_boot_partition(pOTAPartition));
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//successfully updated OTA partition");
|
||||
*pbNewOTAImage = true;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//not all OTA segments received --> abort this OTA process");
|
||||
ERROR_CHECK(esp_ota_abort(otaHandle));
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
void vRecOtaDataHandler(MESH_PACKET_t* puMeshPacket)
|
||||
{
|
||||
if(bOtaAbortTx == false)
|
||||
{
|
||||
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
void vRecOtaAckHandler(MESH_PACKET_t* puMeshPacket)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
MESH_PACKET_t sMeshPacket; //packet for sending and receiving
|
||||
|
||||
|
||||
|
||||
if(bOtaAbortTx == false)
|
||||
{
|
||||
|
||||
//sender node == ota node ?
|
||||
bNodeIsRespondingTx = true;
|
||||
ESP_LOGI(LOG_TAG, "// read partition with offset based in index");
|
||||
ERROR_CHECK(esp_partition_read(pBootPartitionTx, (OTA_MESH_SEGMENT_SIZE * u32SegmentCounterTx), sMeshPacket.au8Payload, OTA_MESH_SEGMENT_SIZE));
|
||||
|
||||
u32OTABytesWrittenTx = ((u32SegmentCounterTx+1) * OTA_MESH_SEGMENT_SIZE);
|
||||
|
||||
vPrintOTAProgress(&(pBootPartitionTx->size), &u32OTABytesWrittenTx, Transmitter);
|
||||
|
||||
|
||||
sMeshPacket.type = OTA_Data;
|
||||
|
||||
if(err != ESP_OK)
|
||||
{
|
||||
bOtaAbortTx = true;
|
||||
sMeshPacket.type = OTA_Abort;
|
||||
}
|
||||
|
||||
if((OTA_MESH_SEGMENT_SIZE * (u32SegmentCounterTx+1)) >= pBootPartitionTx->size) //check if last segment
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "//last partition image segment --> send OTA_Complete");
|
||||
sMeshPacket.type = OTA_Complete;
|
||||
ESP_LOGE(LOG_TAG, "u32SegmentCounterTx: %i", u32SegmentCounterTx);
|
||||
}
|
||||
|
||||
err = errSendMeshPacket(&puMeshPacket->meshSenderAddr, &sMeshPacket);
|
||||
|
||||
u32SegmentCounterTx++;
|
||||
}
|
||||
|
||||
|
||||
|
||||
}
|
||||
/*
|
||||
void vRecOtaCompleteHandler(MESH_PACKET_t* puMeshPacket)
|
||||
{
|
||||
return;
|
||||
}
|
||||
|
||||
void vRecOtaAbortHandler(MESH_PACKET_t* puMeshPacket)
|
||||
{
|
||||
return;
|
||||
}
|
||||
*/
|
376
components/mesh_ota/Mesh_network.c
Normal file
376
components/mesh_ota/Mesh_network.c
Normal file
@ -0,0 +1,376 @@
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
|
||||
static const char *LOG_TAG = "mesh_network";
|
||||
static uint8_t tx_buf[CONFIG_MESH_MESSAGE_SIZE] = { 0, };
|
||||
static uint8_t rx_buf[CONFIG_MESH_MESSAGE_SIZE] = { 0, };
|
||||
uint8_t u8ownMAC[6];
|
||||
esp_netif_t* netif_sta;
|
||||
bool bIsMeshConnected;
|
||||
int32_t i32MeshLayer;
|
||||
mesh_addr_t meshParentAddr;
|
||||
void (*pAppRxHandle)(uint8_t*, uint8_t* );
|
||||
void (*pOTAChildConnectHandle)(uint8_t* );
|
||||
void (*pOTAMessageHandle)(MESH_PACKET_t* );
|
||||
void (*pChangeStateOfServerWorkerHandle)(bool );
|
||||
|
||||
void (*pOtaDataHandle)(MESH_PACKET_t* );
|
||||
void (*pOtaAckHandle)(MESH_PACKET_t* );
|
||||
void (*pOtaCompleteHandle)(MESH_PACKET_t* );
|
||||
void (*pOtaAbortHandle)(MESH_PACKET_t* );
|
||||
|
||||
|
||||
esp_err_t errMeshNetworkInitialize()
|
||||
{
|
||||
//init module variables
|
||||
esp_err_t err;
|
||||
bIsMeshConnected = false;
|
||||
i32MeshLayer = -1;
|
||||
netif_sta = NULL;
|
||||
|
||||
err = nvs_flash_init(); //init non-volatile storage
|
||||
|
||||
#ifdef ERASE_NVS
|
||||
if(err == ESP_ERR_NVS_NO_FREE_PAGES) //check if storage is full
|
||||
{
|
||||
ERROR_CHECK(nvs_flash_erase());
|
||||
}
|
||||
#endif
|
||||
|
||||
// tcpip initialization
|
||||
ERROR_CHECK(esp_netif_init());
|
||||
|
||||
//event initialization
|
||||
ERROR_CHECK(esp_event_loop_create_default());
|
||||
|
||||
//create network interfaces for mesh (only station instance saved for further manipulation, soft AP instance ignored
|
||||
ERROR_CHECK(esp_netif_create_default_wifi_mesh_netifs(&netif_sta, NULL));
|
||||
|
||||
//wifi initialization
|
||||
ERROR_CHECK(errMeshNetworkInitializeWiFi());
|
||||
|
||||
//mesh initialization
|
||||
ERROR_CHECK(esp_mesh_init());
|
||||
|
||||
//mesh initialization
|
||||
ERROR_CHECK(esp_event_handler_register(MESH_EVENT, ESP_EVENT_ANY_ID, &vMeshEventHandler, NULL));
|
||||
|
||||
//set mesh topology
|
||||
ERROR_CHECK(esp_mesh_set_topology(CONFIG_MESH_TOPOLOGY));
|
||||
|
||||
//set mesh max layer according to the topology
|
||||
ERROR_CHECK(esp_mesh_set_max_layer(CONFIG_MESH_MAX_LAYER));
|
||||
ERROR_CHECK(esp_mesh_set_vote_percentage(1));
|
||||
ERROR_CHECK(esp_mesh_set_xon_qsize(128));
|
||||
|
||||
//Disable mesh PS function
|
||||
ERROR_CHECK(esp_mesh_disable_ps());
|
||||
ERROR_CHECK(esp_mesh_set_ap_assoc_expire(10));
|
||||
|
||||
mesh_cfg_t cfg = MESH_INIT_CONFIG_DEFAULT();
|
||||
|
||||
/* mesh ID */
|
||||
memcpy((uint8_t *) &cfg.mesh_id, CONFIG_MESH_ID, 6);
|
||||
|
||||
ERROR_CHECK(errMeshNetworkInitializeRouter(&cfg));
|
||||
|
||||
/* mesh softAP */
|
||||
ERROR_CHECK(esp_mesh_set_ap_authmode(CONFIG_MESH_AP_AUTHMODE));
|
||||
cfg.mesh_ap.max_connection = CONFIG_MESH_AP_CONNECTIONS;
|
||||
memcpy((uint8_t *) &cfg.mesh_ap.password, CONFIG_MESH_AP_PASSWD,
|
||||
strlen(CONFIG_MESH_AP_PASSWD));
|
||||
ERROR_CHECK(esp_mesh_set_config(&cfg));
|
||||
|
||||
/* mesh start */
|
||||
ERROR_CHECK(esp_mesh_start());
|
||||
|
||||
ERROR_CHECK(esp_base_mac_addr_get(u8ownMAC))
|
||||
|
||||
//debug info
|
||||
ESP_LOGD(LOG_TAG, "mesh starts successfully, heap:%d, %s<%d>%s, ps:%d\n", esp_get_minimum_free_heap_size(),
|
||||
esp_mesh_is_root_fixed() ? "root fixed" : "root not fixed",
|
||||
esp_mesh_get_topology(), esp_mesh_get_topology() ? "(chain)":"(tree)", esp_mesh_is_ps_enabled());
|
||||
|
||||
|
||||
ESP_LOGI(LOG_TAG, "Node MAC: \"%x:%x:%x:%x:%x:%x\" ", u8ownMAC[0], u8ownMAC[1], u8ownMAC[2], u8ownMAC[3], u8ownMAC[4], u8ownMAC[5]);
|
||||
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkInitializeWiFi()
|
||||
{
|
||||
//wifi initialization
|
||||
esp_err_t err = ESP_OK;
|
||||
wifi_init_config_t config = WIFI_INIT_CONFIG_DEFAULT();
|
||||
ERROR_CHECK(esp_wifi_init(&config));
|
||||
ERROR_CHECK(esp_event_handler_register(IP_EVENT, IP_EVENT_STA_GOT_IP, &vIPEventHandler, NULL));
|
||||
ERROR_CHECK(esp_wifi_set_storage(WIFI_STORAGE_FLASH));
|
||||
ERROR_CHECK(esp_wifi_start());
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkInitializeRouter(mesh_cfg_t* cfg)
|
||||
{
|
||||
//router initialization
|
||||
esp_err_t err = ESP_OK;
|
||||
(*cfg).channel = CONFIG_MESH_CHANNEL;
|
||||
(*cfg).router.ssid_len = strlen(CONFIG_MESH_ROUTER_SSID);
|
||||
memcpy((uint8_t *) &(*cfg).router.ssid, CONFIG_MESH_ROUTER_SSID, (*cfg).router.ssid_len);
|
||||
memcpy((uint8_t *) &(*cfg).router.password, CONFIG_MESH_ROUTER_PASSWD,
|
||||
strlen(CONFIG_MESH_ROUTER_PASSWD));
|
||||
return err;
|
||||
}
|
||||
|
||||
//returns true if MAC address is equal
|
||||
bool bCheckMACEquality(uint8_t* pu8aMAC, uint8_t* pu8bMAC)
|
||||
{
|
||||
bool bRet = true;
|
||||
uint8_t index = 0;
|
||||
|
||||
while ((index < 6) && (bRet == true))
|
||||
{
|
||||
if(pu8aMAC[index] != pu8bMAC[index])
|
||||
{
|
||||
bRet = false;
|
||||
}
|
||||
index++;
|
||||
}
|
||||
return bRet;
|
||||
}
|
||||
|
||||
esp_err_t errGetChildren(mesh_addr_t* pChildren, uint16_t* pu16ChildrenSize)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
int route_table_size = 0;
|
||||
*pu16ChildrenSize = 0;
|
||||
mesh_addr_t route_table[CONFIG_MESH_ROUTE_TABLE_SIZE];
|
||||
ERROR_CHECK(esp_mesh_get_routing_table((mesh_addr_t *) &route_table, (CONFIG_MESH_ROUTE_TABLE_SIZE * 6), &route_table_size));
|
||||
|
||||
if (err == ESP_OK)
|
||||
{
|
||||
for(uint16_t index = 0; index < esp_mesh_get_routing_table_size(); index++)
|
||||
{
|
||||
if(! (bCheckMACEquality(u8ownMAC, route_table[index].addr)) )
|
||||
{
|
||||
//child node
|
||||
//ESP_LOGI(LOG_TAG, "adding Node: \"0x%x, 0x%x, 0x%x, 0x%x, 0x%x, 0x%x\" ", route_table[index].addr[0], route_table[index].addr[1], route_table[index].addr[2], route_table[index].addr[3], route_table[index].addr[4], route_table[index].addr[5]);
|
||||
pChildren[*pu16ChildrenSize] = route_table[index];
|
||||
*pu16ChildrenSize = (*pu16ChildrenSize)+1;
|
||||
}
|
||||
}
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errGetParentNode(mesh_addr_t* pMeshParentAddr)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
if((bIsMeshConnected == false) || (esp_mesh_is_root()))
|
||||
{
|
||||
//this node is not connected or is the root --> this node has no parent
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
else
|
||||
{
|
||||
//node has parent
|
||||
memcpy(pMeshParentAddr, &meshParentAddr, sizeof(mesh_addr_t));
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
void vGetOwnAddr(mesh_addr_t* pMeshOwnAddr)
|
||||
{
|
||||
memcpy(pMeshOwnAddr->addr, u8ownMAC, 6);
|
||||
}
|
||||
|
||||
bool bIsRootNode()
|
||||
{
|
||||
return esp_mesh_is_root();
|
||||
}
|
||||
|
||||
bool bIsNodeNeighbour(mesh_addr_t* pNode)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
bool bReturn = false;
|
||||
mesh_addr_t addrParent; //addr of parent node
|
||||
mesh_addr_t childrenAddr[CONFIG_MESH_ROUTE_TABLE_SIZE]; //array of children attached to this node
|
||||
uint16_t u16ChildrenSize = 0U; //number of children attached to this node
|
||||
|
||||
err = errGetParentNode(&addrParent);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
if(bCheckMACEquality(pNode->addr, addrParent.addr) == true)
|
||||
{
|
||||
bReturn = true; //node was found
|
||||
}
|
||||
}
|
||||
|
||||
if(bReturn == false)
|
||||
{
|
||||
err = ESP_OK; //reset error code
|
||||
|
||||
ERROR_CHECK(errGetChildren(childrenAddr, &u16ChildrenSize)); //get all children
|
||||
|
||||
for (uint16_t u16Index = 0; ((u16Index < u16ChildrenSize) && (err == ESP_OK) && (bReturn == false)); u16Index++)
|
||||
{
|
||||
if(bCheckMACEquality(pNode->addr, childrenAddr[u16Index].addr) == true)
|
||||
{
|
||||
bReturn = true; //node was found
|
||||
}
|
||||
}
|
||||
}
|
||||
return bReturn;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetAppReceiveHandle(void (*pAppRxHandleTmp)(uint8_t * pu8Data, uint8_t* pu8Sender))
|
||||
{
|
||||
pAppRxHandle = pAppRxHandleTmp; //set handle from app as receive handle if an app packet is received
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetChildConnectedHandle(void (*pChildConnectHandleTmp)(uint8_t * pu8Data))
|
||||
{
|
||||
pOTAChildConnectHandle = pChildConnectHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetOTAMessageHandle(void (*pOTAMessageHandleTmp)(MESH_PACKET_t* puMeshPacket))
|
||||
{
|
||||
pOTAMessageHandle = pOTAMessageHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetOtaDataHandle(void (*pOtaDataHandleTmp)(MESH_PACKET_t* puMeshPacket))
|
||||
{
|
||||
pOtaDataHandle = pOtaDataHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetOtaAckHandle(void (*pOtaAckHandleTmp)(MESH_PACKET_t* puMeshPacket))
|
||||
{
|
||||
pOtaAckHandle = pOtaAckHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetOtaCompleteHandle(void (*pOtaCompleteHandleTmp)(MESH_PACKET_t* puMeshPacket))
|
||||
{
|
||||
pOtaCompleteHandle = pOtaCompleteHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetOtaAbortHandle(void (*pOtaAbortHandleTmp)(MESH_PACKET_t* puMeshPacket))
|
||||
{
|
||||
pOtaAbortHandle = pOtaAbortHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errMeshNetworkSetChangeStateOfServerWorkerHandle(void (*pChangeStateOfServerWorkerHandleTmp)(bool bState))
|
||||
{
|
||||
pChangeStateOfServerWorkerHandle = pChangeStateOfServerWorkerHandleTmp;
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
esp_err_t errSendMeshPacket(mesh_addr_t* pAddrDest, MESH_PACKET_t* pPacket)
|
||||
{
|
||||
esp_err_t err;
|
||||
mesh_data_t data;
|
||||
data.data = tx_buf;
|
||||
data.size = sizeof(tx_buf);
|
||||
data.proto = MESH_PROTO_BIN;
|
||||
data.tos = MESH_TOS_P2P;
|
||||
memcpy(tx_buf, (uint8_t *)pPacket, sizeof(MESH_PACKET_t));
|
||||
|
||||
err = esp_mesh_send(pAddrDest, &data, MESH_DATA_P2P, NULL, 0);
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t errStartReceiveTask()
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
BaseType_t xReturned;
|
||||
|
||||
xReturned = xTaskCreate(vTaskReceiveMeshData, "ReceiveMeshData", 7000, NULL, 5, NULL);
|
||||
|
||||
if(xReturned != pdPASS)
|
||||
{
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
void vTaskReceiveMeshData(void *arg)
|
||||
{
|
||||
esp_err_t err;
|
||||
mesh_addr_t from;
|
||||
mesh_data_t data;
|
||||
int flag = 0;
|
||||
data.data = rx_buf;
|
||||
data.size = CONFIG_MESH_MESSAGE_SIZE;
|
||||
|
||||
while (true)
|
||||
{
|
||||
data.size = CONFIG_MESH_MESSAGE_SIZE;
|
||||
err = esp_mesh_recv(&from, &data, portMAX_DELAY, &flag, NULL, 0);
|
||||
if (err != ESP_OK || !data.size)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "err:0x%x, size:%d", err, data.size);
|
||||
continue;
|
||||
}
|
||||
MESH_PACKET_t packet;
|
||||
memcpy(&packet, (uint8_t *)rx_buf, sizeof(MESH_PACKET_t)); //parse MESH_PACKET_t
|
||||
memcpy(&packet.meshSenderAddr, &from, sizeof(mesh_addr_t)); //copy sender into packet
|
||||
|
||||
switch (packet.type)
|
||||
{
|
||||
case APP_Data:
|
||||
ESP_LOGD(LOG_TAG, "recv: APP_Data");
|
||||
//call the rx handle from app
|
||||
pAppRxHandle(packet.au8Payload, from.addr); //hand over payload and sender of this mesh packet
|
||||
break;
|
||||
case OTA_Version_Request:
|
||||
case OTA_Version_Response:
|
||||
case OTA_Complete:
|
||||
case OTA_Abort:
|
||||
//call the rx handle from OTA
|
||||
if(pOTAMessageHandle)
|
||||
{
|
||||
pOTAMessageHandle(&packet);
|
||||
}
|
||||
break;
|
||||
case OTA_Data:
|
||||
if(pOtaDataHandle)
|
||||
{
|
||||
pOtaDataHandle(&packet);
|
||||
}
|
||||
break;
|
||||
case OTA_ACK:
|
||||
if(pOtaAckHandle)
|
||||
{
|
||||
pOtaAckHandle(&packet);
|
||||
}
|
||||
break;
|
||||
/* case OTA_Complete:
|
||||
if(pOtaCompleteHandle)
|
||||
{
|
||||
pOtaCompleteHandle(&packet);
|
||||
}
|
||||
break;
|
||||
case OTA_Abort:
|
||||
if(pOtaAbortHandle)
|
||||
{
|
||||
pOtaAbortHandle(&packet);
|
||||
}
|
||||
break;
|
||||
*/
|
||||
default:
|
||||
ESP_LOGE(LOG_TAG, "recv: something");
|
||||
break;
|
||||
}//end switch
|
||||
} //end while
|
||||
}
|
||||
|
||||
|
||||
|
230
components/mesh_ota/Mesh_network_handler.c
Normal file
230
components/mesh_ota/Mesh_network_handler.c
Normal file
@ -0,0 +1,230 @@
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
|
||||
static const char *LOG_TAG = "mesh_network_handler";
|
||||
|
||||
void vIPEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void *vpEventData)
|
||||
{
|
||||
ip_event_got_ip_t *event = (ip_event_got_ip_t *) vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<IP_EVENT_STA_GOT_IP>IP:" IPSTR, IP2STR(&event->ip_info.ip));
|
||||
if(pChangeStateOfServerWorkerHandle)
|
||||
{
|
||||
pChangeStateOfServerWorkerHandle(true); //signal that this node (root node) has access to internet
|
||||
}
|
||||
}
|
||||
|
||||
void vMeshEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void* vpEventData)
|
||||
{
|
||||
mesh_addr_t id = {0,};
|
||||
static uint16_t last_layer = 0;
|
||||
|
||||
switch (i32EventID)
|
||||
{
|
||||
case MESH_EVENT_STARTED:
|
||||
{
|
||||
esp_mesh_get_id(&id);
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_MESH_STARTED>ID:"MACSTR"", MAC2STR(id.addr));
|
||||
bIsMeshConnected = false;
|
||||
i32MeshLayer = esp_mesh_get_layer();
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_STOPPED:
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_STOPPED>");
|
||||
bIsMeshConnected = false;
|
||||
i32MeshLayer = esp_mesh_get_layer();
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_CHILD_CONNECTED:
|
||||
{
|
||||
mesh_event_child_connected_t *child_connected = (mesh_event_child_connected_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_CHILD_CONNECTED>aid:%d, "MACSTR"", child_connected->aid, MAC2STR(child_connected->mac));
|
||||
|
||||
if(pOTAChildConnectHandle){pOTAChildConnectHandle(child_connected->mac);}//add this child to queue using handle
|
||||
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_CHILD_DISCONNECTED:
|
||||
{
|
||||
mesh_event_child_disconnected_t *child_disconnected = (mesh_event_child_disconnected_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_CHILD_DISCONNECTED>aid:%d, "MACSTR"",
|
||||
child_disconnected->aid,
|
||||
MAC2STR(child_disconnected->mac));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROUTING_TABLE_ADD:
|
||||
{
|
||||
mesh_event_routing_table_change_t *routing_table = (mesh_event_routing_table_change_t *)vpEventData;
|
||||
ESP_LOGW(LOG_TAG, "<MESH_EVENT_ROUTING_TABLE_ADD>add %d, new:%d, layer:%d",
|
||||
routing_table->rt_size_change,
|
||||
routing_table->rt_size_new, i32MeshLayer);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROUTING_TABLE_REMOVE:
|
||||
{
|
||||
mesh_event_routing_table_change_t *routing_table = (mesh_event_routing_table_change_t *)vpEventData;
|
||||
ESP_LOGW(LOG_TAG, "<MESH_EVENT_ROUTING_TABLE_REMOVE>remove %d, new:%d, layer:%d",
|
||||
routing_table->rt_size_change,
|
||||
routing_table->rt_size_new, i32MeshLayer);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_NO_PARENT_FOUND:
|
||||
{
|
||||
mesh_event_no_parent_found_t *no_parent = (mesh_event_no_parent_found_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_NO_PARENT_FOUND>scan times:%d",
|
||||
no_parent->scan_times);
|
||||
/* TODO handler for the failure, maybe nominate themselves */
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_PARENT_CONNECTED:
|
||||
{
|
||||
mesh_event_connected_t *connected = (mesh_event_connected_t *)vpEventData;
|
||||
esp_mesh_get_id(&id);
|
||||
i32MeshLayer = connected->self_layer;
|
||||
memcpy(&meshParentAddr.addr, connected->connected.bssid, 6);
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_PARENT_CONNECTED>layer:%d-->%d, parent:"MACSTR"%s, ID:"MACSTR", duty:%d",
|
||||
last_layer, i32MeshLayer, MAC2STR(meshParentAddr.addr),
|
||||
esp_mesh_is_root() ? "<ROOT>" : (i32MeshLayer == 2) ? "<layer2>" : "", //print own node title
|
||||
MAC2STR(id.addr), connected->duty);
|
||||
last_layer = i32MeshLayer;
|
||||
bIsMeshConnected = true;
|
||||
if (esp_mesh_is_root())
|
||||
{
|
||||
if(esp_netif_dhcpc_start(netif_sta) == ESP_ERR_ESP_NETIF_DHCP_ALREADY_STARTED) //get a IP from router
|
||||
{
|
||||
if(pChangeStateOfServerWorkerHandle){pChangeStateOfServerWorkerHandle(true);}// signal reconnect
|
||||
}
|
||||
}
|
||||
errStartReceiveTask();//start receiving
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_PARENT_DISCONNECTED:
|
||||
{
|
||||
mesh_event_disconnected_t *disconnected = (mesh_event_disconnected_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_PARENT_DISCONNECTED>reason:%d", disconnected->reason);
|
||||
bIsMeshConnected = false;
|
||||
if(pChangeStateOfServerWorkerHandle){pChangeStateOfServerWorkerHandle(false);}
|
||||
i32MeshLayer = esp_mesh_get_layer();
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_LAYER_CHANGE:
|
||||
{
|
||||
mesh_event_layer_change_t *layer_change = (mesh_event_layer_change_t *)vpEventData;
|
||||
i32MeshLayer = layer_change->new_layer;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_LAYER_CHANGE>layer:%d-->%d%s",
|
||||
last_layer, i32MeshLayer,
|
||||
esp_mesh_is_root() ? "<ROOT>" : (i32MeshLayer == 2) ? "<layer2>" : "");
|
||||
last_layer = i32MeshLayer;
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_ADDRESS:
|
||||
{
|
||||
mesh_event_root_address_t *root_addr = (mesh_event_root_address_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_ROOT_ADDRESS>root address:"MACSTR"",
|
||||
MAC2STR(root_addr->addr));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_VOTE_STARTED:
|
||||
{
|
||||
mesh_event_vote_started_t *vote_started = (mesh_event_vote_started_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_VOTE_STARTED>attempts:%d, reason:%d, rc_addr:"MACSTR"",
|
||||
vote_started->attempts,
|
||||
vote_started->reason,
|
||||
MAC2STR(vote_started->rc_addr.addr));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_VOTE_STOPPED:
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_VOTE_STOPPED>");
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_SWITCH_REQ:
|
||||
{
|
||||
mesh_event_root_switch_req_t *switch_req = (mesh_event_root_switch_req_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_ROOT_SWITCH_REQ>reason:%d, rc_addr:"MACSTR"", switch_req->reason,
|
||||
MAC2STR( switch_req->rc_addr.addr));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_SWITCH_ACK:
|
||||
{
|
||||
//new root
|
||||
i32MeshLayer = esp_mesh_get_layer();
|
||||
esp_mesh_get_parent_bssid(&meshParentAddr);
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_ROOT_SWITCH_ACK>layer:%d, parent:"MACSTR"", i32MeshLayer, MAC2STR(meshParentAddr.addr));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_TODS_STATE:
|
||||
{
|
||||
mesh_event_toDS_state_t *toDs_state = (mesh_event_toDS_state_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_TODS_REACHABLE>state:%d", *toDs_state);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_FIXED:
|
||||
{
|
||||
mesh_event_root_fixed_t *root_fixed = (mesh_event_root_fixed_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_ROOT_FIXED>%s",
|
||||
root_fixed->is_fixed ? "fixed" : "not fixed");
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_ASKED_YIELD:
|
||||
{
|
||||
mesh_event_root_conflict_t *root_conflict = (mesh_event_root_conflict_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_ROOT_ASKED_YIELD>"MACSTR", rssi:%d, capacity:%d",
|
||||
MAC2STR(root_conflict->addr), root_conflict->rssi, root_conflict->capacity);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_CHANNEL_SWITCH:
|
||||
{
|
||||
mesh_event_channel_switch_t *channel_switch = (mesh_event_channel_switch_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_CHANNEL_SWITCH>new channel:%d", channel_switch->channel);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_SCAN_DONE:
|
||||
{
|
||||
mesh_event_scan_done_t *scan_done = (mesh_event_scan_done_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_SCAN_DONE>number:%d", scan_done->number);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_NETWORK_STATE:
|
||||
{
|
||||
mesh_event_network_state_t *network_state = (mesh_event_network_state_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_NETWORK_STATE>is_rootless:%d", network_state->is_rootless);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_STOP_RECONNECTION:
|
||||
{
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_STOP_RECONNECTION>");
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_FIND_NETWORK:
|
||||
{
|
||||
mesh_event_find_network_t *find_network = (mesh_event_find_network_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_FIND_NETWORK>new channel:%d, router BSSID:"MACSTR"",
|
||||
find_network->channel, MAC2STR(find_network->router_bssid));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROUTER_SWITCH:
|
||||
{
|
||||
mesh_event_router_switch_t *router_switch = (mesh_event_router_switch_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_ROUTER_SWITCH>new router:%s, channel:%d, "MACSTR"",
|
||||
router_switch->ssid, router_switch->channel, MAC2STR(router_switch->bssid));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_PS_PARENT_DUTY:
|
||||
{
|
||||
mesh_event_ps_duty_t *ps_duty = (mesh_event_ps_duty_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_PS_PARENT_DUTY>duty:%d", ps_duty->duty);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_PS_CHILD_DUTY:
|
||||
{
|
||||
mesh_event_ps_duty_t *ps_duty = (mesh_event_ps_duty_t *)vpEventData;
|
||||
ESP_LOGI(LOG_TAG, "<MESH_EVENT_PS_CHILD_DUTY>cidx:%d, "MACSTR", duty:%d", ps_duty->child_connected.aid-1,
|
||||
MAC2STR(ps_duty->child_connected.mac), ps_duty->duty);
|
||||
}
|
||||
break;
|
||||
default:
|
||||
ESP_LOGI(LOG_TAG, "unknown id:%d", i32EventID);
|
||||
break;
|
||||
}
|
||||
}
|
@ -1,292 +0,0 @@
|
||||
#include "https_client.h"
|
||||
|
||||
static const char *TAG = "https_client";
|
||||
|
||||
static const char *REQUEST = "GET " CONFIG_OTA_HTTPS_URL " HTTP/1.1\r\n"
|
||||
"Host: "CONFIG_OTA_HTTPS_SERVER_COMMON_NAME"\r\n"
|
||||
"User-Agent: esp-idf/1.0 esp32\r\n"
|
||||
"Authorization: Basic " CONFIG_OTA_HTTPS_AUTH "\r\n"
|
||||
"\r\n";
|
||||
|
||||
|
||||
static HTTPS_Client_t sHTTPS_ClientConfig;
|
||||
|
||||
https_client_ret_t https_clientInitEmbedTLS();
|
||||
https_client_ret_t https_clientConnectToServer();
|
||||
https_client_ret_t https_clientValidateServer();
|
||||
https_client_ret_t https_clientSendRequest();
|
||||
|
||||
https_client_ret_t https_clientInitialize()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
|
||||
i32RetHTTPClient = https_clientInitEmbedTLS();
|
||||
|
||||
if(i32RetHTTPClient == HTTPS_CLIENT_OK)
|
||||
{
|
||||
i32RetHTTPClient = https_clientConnectToServer();
|
||||
}
|
||||
|
||||
if(i32RetHTTPClient == HTTPS_CLIENT_OK)
|
||||
{
|
||||
i32RetHTTPClient = https_clientValidateServer();
|
||||
}
|
||||
|
||||
if(i32RetHTTPClient == HTTPS_CLIENT_OK)
|
||||
{
|
||||
i32RetHTTPClient = https_clientSendRequest();
|
||||
}
|
||||
|
||||
switch (i32RetHTTPClient)
|
||||
{
|
||||
case HTTPS_CLIENT_ERROR_INIT_EMBEDTLS:
|
||||
ESP_LOGE(TAG, "Unable to initialize EmbedTLS");
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR;
|
||||
break;
|
||||
case HTTPS_CLIENT_ERROR_INIT_CONNECT_TWO_SERVER:
|
||||
ESP_LOGE(TAG, "Unable to connect to server");
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR;
|
||||
break;
|
||||
case HTTPS_CLIENT_ERROR_INIT_VALIDATE_SERVER:
|
||||
ESP_LOGE(TAG, "Unable to validate the server");
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR;
|
||||
break;
|
||||
case HTTPS_CLIENT_ERROR_INIT_SEND_REQUEST:
|
||||
ESP_LOGE(TAG, "Unable to send request to server");
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR;
|
||||
break;
|
||||
case HTTPS_CLIENT_OK:
|
||||
ESP_LOGI(TAG, "HTTPS Client successfully initialized");
|
||||
i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
break;
|
||||
default:
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR;
|
||||
ESP_LOGE(TAG, "Unknown error while init https client");
|
||||
break;
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t https_clientRetrieveData(char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32BytesRead)
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetRetrieveData = ESP_OK;
|
||||
bool bRetriveData = true;
|
||||
|
||||
bzero(pu8Data, *pu32DataLenght);
|
||||
*pu32BytesRead = 0U;
|
||||
|
||||
while (bRetriveData)
|
||||
{
|
||||
//Reading HTTP response
|
||||
i32RetRetrieveData = mbedtls_ssl_read(&sHTTPS_ClientConfig.ssl, (unsigned char *)(pu8Data+(*pu32BytesRead)), ((*pu32DataLenght)-(*pu32BytesRead)));
|
||||
|
||||
if(i32RetRetrieveData > 0)
|
||||
{
|
||||
//Data received
|
||||
*pu32BytesRead = *pu32BytesRead + i32RetRetrieveData;
|
||||
|
||||
if(*pu32DataLenght > 0)
|
||||
{
|
||||
//buffer not full yet --> read some more
|
||||
bRetriveData = true;
|
||||
}
|
||||
else
|
||||
{
|
||||
//buffer full --> stop reading
|
||||
bRetriveData = false;
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetRetrieveData == 0)
|
||||
{
|
||||
//all data read --> stop reading
|
||||
bRetriveData = false;
|
||||
pu32BytesRead = 0;
|
||||
}
|
||||
|
||||
if(i32RetRetrieveData == MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY)
|
||||
{
|
||||
//connection is going to be closed
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR;
|
||||
bRetriveData = false;
|
||||
}
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t https_clientDeinitialize()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
|
||||
i32RetHTTPClient = mbedtls_ssl_close_notify(&sHTTPS_ClientConfig.ssl); //close session
|
||||
|
||||
if(i32RetHTTPClient != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_close_notify returned 0x%x", i32RetHTTPClient);
|
||||
}
|
||||
|
||||
mbedtls_ssl_session_reset(&sHTTPS_ClientConfig.ssl); //reset embedssl
|
||||
mbedtls_net_free(&sHTTPS_ClientConfig.server_fd); //free ram
|
||||
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t https_clientInitEmbedTLS() {
|
||||
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetEmbedTLS = ESP_OK;
|
||||
|
||||
mbedtls_ssl_init(&sHTTPS_ClientConfig.ssl);
|
||||
mbedtls_x509_crt_init(&sHTTPS_ClientConfig.cacert);
|
||||
mbedtls_ctr_drbg_init(&sHTTPS_ClientConfig.ctr_drbg);
|
||||
mbedtls_ssl_config_init(&sHTTPS_ClientConfig.conf);
|
||||
mbedtls_entropy_init(&sHTTPS_ClientConfig.entropy);
|
||||
|
||||
i32RetEmbedTLS = mbedtls_ctr_drbg_seed(&sHTTPS_ClientConfig.ctr_drbg, mbedtls_entropy_func, &sHTTPS_ClientConfig.entropy, NULL, 0);
|
||||
|
||||
if(i32RetEmbedTLS!= ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ctr_drbg_seed returned %d", i32RetEmbedTLS);
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
//Attaching the certificate bundle
|
||||
i32RetEmbedTLS = esp_crt_bundle_attach(&sHTTPS_ClientConfig.conf);
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "esp_crt_bundle_attach returned 0x%x\n\n", i32RetEmbedTLS);
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
//Setting hostname for TLS session.
|
||||
i32RetEmbedTLS = mbedtls_ssl_set_hostname(&sHTTPS_ClientConfig.ssl, CONFIG_OTA_HTTPS_SERVER_COMMON_NAME);
|
||||
// Hostname set here should match CN in server certificate
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_set_hostname returned 0x%x", i32RetEmbedTLS);
|
||||
}
|
||||
}
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
//Setting up the SSL/TLS structure
|
||||
i32RetEmbedTLS = mbedtls_ssl_config_defaults(&sHTTPS_ClientConfig.conf,
|
||||
MBEDTLS_SSL_IS_CLIENT,
|
||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||
MBEDTLS_SSL_PRESET_DEFAULT);
|
||||
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_config_defaults returned %d", i32RetEmbedTLS);
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
mbedtls_ssl_conf_authmode(&sHTTPS_ClientConfig.conf, MBEDTLS_SSL_VERIFY_REQUIRED);
|
||||
mbedtls_ssl_conf_ca_chain(&sHTTPS_ClientConfig.conf, &sHTTPS_ClientConfig.cacert, NULL);
|
||||
mbedtls_ssl_conf_rng(&sHTTPS_ClientConfig.conf, mbedtls_ctr_drbg_random, &sHTTPS_ClientConfig.ctr_drbg);
|
||||
|
||||
i32RetEmbedTLS = mbedtls_ssl_setup(&sHTTPS_ClientConfig.ssl, &sHTTPS_ClientConfig.conf);
|
||||
if(i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_setup returned -0x%x\n\n", i32RetEmbedTLS);
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetEmbedTLS == ESP_OK)
|
||||
{
|
||||
mbedtls_net_init(&sHTTPS_ClientConfig.server_fd);
|
||||
}
|
||||
|
||||
if (i32RetEmbedTLS != ESP_OK)
|
||||
{
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR_INIT_EMBEDTLS;
|
||||
}
|
||||
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t https_clientConnectToServer()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetServerConnect = ESP_OK;
|
||||
|
||||
//Connecting to server
|
||||
i32RetServerConnect = mbedtls_net_connect(&sHTTPS_ClientConfig.server_fd, CONFIG_OTA_HTTPS_SERVER_COMMON_NAME, CONFIG_OTA_HTTPS_SERVER_PORT, MBEDTLS_NET_PROTO_TCP);
|
||||
if (i32RetServerConnect != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_net_connect returned %x", i32RetServerConnect);
|
||||
}
|
||||
|
||||
if(i32RetServerConnect == ESP_OK)
|
||||
{
|
||||
mbedtls_ssl_set_bio(&sHTTPS_ClientConfig.ssl, &sHTTPS_ClientConfig.server_fd, mbedtls_net_send, mbedtls_net_recv, NULL);
|
||||
|
||||
//Performing the SSL/TLS handshake
|
||||
while ((i32RetServerConnect = mbedtls_ssl_handshake(&sHTTPS_ClientConfig.ssl)) != 0)
|
||||
{
|
||||
if ((i32RetServerConnect != MBEDTLS_ERR_SSL_WANT_READ) && (i32RetServerConnect != MBEDTLS_ERR_SSL_WANT_WRITE))
|
||||
{
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_handshake returned 0x%x", i32RetServerConnect);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if(i32RetServerConnect != ESP_OK)
|
||||
{
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR_INIT_CONNECT_TWO_SERVER;
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t https_clientValidateServer()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetValidateServer = ESP_OK;
|
||||
|
||||
//Verifying peer X.509 certificate
|
||||
if ((i32RetValidateServer = mbedtls_ssl_get_verify_result(&sHTTPS_ClientConfig.ssl)) != 0)
|
||||
{
|
||||
ESP_LOGE(TAG, "Failed to verify peer certificate!");
|
||||
}
|
||||
|
||||
if(i32RetValidateServer != ESP_OK)
|
||||
{
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR_INIT_VALIDATE_SERVER;
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
||||
|
||||
https_client_ret_t https_clientSendRequest()
|
||||
{
|
||||
https_client_ret_t i32RetHTTPClient = HTTPS_CLIENT_OK;
|
||||
int32_t i32RetSendRequest = ESP_OK;
|
||||
uint32_t u32WrittenBytes = 0;
|
||||
bool bWrite = true; //flag to stop loop
|
||||
|
||||
//Writing HTTP request
|
||||
while((u32WrittenBytes < strlen(REQUEST)) && bWrite)
|
||||
{
|
||||
i32RetSendRequest = mbedtls_ssl_write(&sHTTPS_ClientConfig.ssl,
|
||||
(const unsigned char *)REQUEST + u32WrittenBytes,
|
||||
strlen(REQUEST) - u32WrittenBytes);
|
||||
if (i32RetSendRequest >= 0)
|
||||
{
|
||||
//bytes written
|
||||
u32WrittenBytes += i32RetSendRequest;
|
||||
} else if (i32RetSendRequest != MBEDTLS_ERR_SSL_WANT_WRITE && i32RetSendRequest != MBEDTLS_ERR_SSL_WANT_READ) {
|
||||
ESP_LOGE(TAG, "mbedtls_ssl_write returned 0x%x", i32RetSendRequest);
|
||||
bWrite = false;
|
||||
}
|
||||
}
|
||||
|
||||
if(bWrite == false)
|
||||
{
|
||||
i32RetHTTPClient = HTTPS_CLIENT_ERROR_INIT_SEND_REQUEST;
|
||||
}
|
||||
return i32RetHTTPClient;
|
||||
}
|
@ -26,7 +26,7 @@
|
||||
#include "mbedtls/ctr_drbg.h"
|
||||
#include "mbedtls/error.h"
|
||||
#include "mbedtls/certs.h"
|
||||
#include "esp_crt_bundle.h"
|
||||
#include "esp_crt_bundle.h"
|
||||
|
||||
#ifndef CONFIG_OTA_HTTPS_URL
|
||||
#define CONFIG_OTA_HTTPS_URL "https://exmaple.com/theImage.bin"
|
||||
@ -51,6 +51,8 @@
|
||||
#define HTTPS_CLIENT_ERROR_INIT_VALIDATE_SERVER -4
|
||||
#define HTTPS_CLIENT_ERROR_INIT_SEND_REQUEST -5
|
||||
|
||||
#define HTTPS_READ_TIMEOUT 1000 //ms
|
||||
|
||||
struct HTTPS_Client
|
||||
{
|
||||
mbedtls_entropy_context entropy;
|
||||
@ -63,10 +65,13 @@ struct HTTPS_Client
|
||||
|
||||
typedef int32_t https_client_ret_t;
|
||||
typedef struct HTTPS_Client HTTPS_Client_t;
|
||||
|
||||
https_client_ret_t https_clientInitialize();
|
||||
https_client_ret_t https_clientRetrieveData(char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32BytesRead);
|
||||
https_client_ret_t https_clientDeinitialize();
|
||||
|
||||
https_client_ret_t errHTTPSClientInitialize();
|
||||
https_client_ret_t errHTTPSClientConnectToServer();
|
||||
https_client_ret_t errHTTPSClientValidateServer();
|
||||
https_client_ret_t errHTTPSClientSendRequest();
|
||||
https_client_ret_t errHTTPSClientRetrieveData(char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32BytesRead);
|
||||
https_client_ret_t errHTTPSClientReset();
|
||||
|
||||
#endif /* H_HTTPS_CLIENT */
|
||||
|
79
components/mesh_ota/include/Mesh_OTA.h
Normal file
79
components/mesh_ota/include/Mesh_OTA.h
Normal file
@ -0,0 +1,79 @@
|
||||
#ifndef H_MESH_OTA
|
||||
#define H_MESH_OTA
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
#include "nvs_flash.h"
|
||||
#include "driver/gpio.h"
|
||||
#include "esp_ota_ops.h"
|
||||
#include "esp_partition.h"
|
||||
|
||||
#include "Mesh_network.h"
|
||||
#include "HTTPS_client.h"
|
||||
|
||||
#define ERASE_NVS //erase non volatile storage if full
|
||||
#define QUEUE_NODES_SIZE 10
|
||||
#define QUEUE_MESSAGE_OTA_SIZE 10
|
||||
#define SERVER_CHECK_INTERVAL 30 //in seconds
|
||||
#define OTA_HTTPS_SEGMENT_SIZE 2048U
|
||||
#define OTA_PROGRESS_LOG_INTERVAL 7U
|
||||
#define OTA_MESH_SEGMENT_SIZE MESH_NETWORK_PAYLOAD_SIZE
|
||||
#define OTA_MESH_TIMEOUT 100U //in ms
|
||||
|
||||
#define ERROR_CHECK(x) if (err == ESP_OK) \
|
||||
{ \
|
||||
err = (x); \
|
||||
if (err != ESP_OK) \
|
||||
{ \
|
||||
ESP_LOGE(LOG_TAG, "%s failed with error: 0x%x -> %s", #x, err, esp_err_to_name(err)); \
|
||||
} \
|
||||
} \
|
||||
|
||||
enum otaMeshRole
|
||||
{
|
||||
Transmitter,
|
||||
Receiver
|
||||
};
|
||||
|
||||
typedef enum otaMeshRole OTA_MESH_ROLE_t;
|
||||
|
||||
esp_err_t errMeshOTAInitialize();
|
||||
|
||||
esp_err_t errOTAHTTPS(bool* pbNewOTAImage);
|
||||
esp_err_t errOTAMeshSlave(bool* pbNewOTAImage);
|
||||
esp_err_t errOTAMeshMaster(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr);
|
||||
esp_err_t errOTAMeshTransmit(mesh_addr_t* pMeshNodeAddr);
|
||||
esp_err_t errOTAMeshReceive(bool* pbNewOTAImage, mesh_addr_t* pMeshNodeAddr);
|
||||
|
||||
|
||||
//helper functions
|
||||
bool bNewerVersion(const char* pu8Local, const char* pu8Remote);
|
||||
esp_err_t errExtractVersionNumber(const char* pu8Data, uint32_t* pu32DataLenght, char* pc8RemoteVersionNumber);
|
||||
esp_err_t errFindImageStart(const char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32StartOffset);
|
||||
void vPrintOTAProgress(const uint32_t* const pu32TotalImageSize, const uint32_t* const pu32BytesWritten, OTA_MESH_ROLE_t eRole);
|
||||
void vAddAllNeighboursToQueue(void);
|
||||
esp_err_t errSendOTAVersionResponse(mesh_addr_t* meshReceiverAddr);
|
||||
esp_err_t errSendOTAVersionRequest(mesh_addr_t* meshReceiverAddr);
|
||||
|
||||
//Handler
|
||||
void vAddNodeToPossibleUpdatableQueue(uint8_t* pu8MAC);
|
||||
void vAddOTAControllMessageToQueue(MESH_PACKET_t* puMeshPacket);
|
||||
void vChangeStateOfServerWorker(bool state);
|
||||
|
||||
void vRecOtaDataHandler(MESH_PACKET_t* puMeshPacket);
|
||||
void vRecOtaAckHandler(MESH_PACKET_t* puMeshPacket);
|
||||
//void vRecOtaCompleteHandler(MESH_PACKET_t* puMeshPacket);
|
||||
//void vRecOtaAbortHandler(MESH_PACKET_t* puMeshPacket);
|
||||
|
||||
//Tasks
|
||||
void vTaskServerWorker(void *arg);
|
||||
void vTaskOTAWorker(void *arg);
|
||||
|
||||
|
||||
|
||||
#endif /* H_MESH_OTA */
|
110
components/mesh_ota/include/Mesh_network.h
Normal file
110
components/mesh_ota/include/Mesh_network.h
Normal file
@ -0,0 +1,110 @@
|
||||
#ifndef H_MESH_NETWORK
|
||||
#define H_MESH_NETWORK
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
|
||||
#ifndef CONFIG_MESH_MESSAGE_SIZE
|
||||
#define CONFIG_MESH_MESSAGE_SIZE 1500
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_TOPOLOGY
|
||||
#define CONFIG_MESH_TOPOLOGY MESH_TOPO_TREE
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_MAX_LAYER
|
||||
#define CONFIG_MESH_MAX_LAYER 6
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_ID
|
||||
#define CONFIG_MESH_ID "00, 00, 00, 00, 00, 00"
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_AUTHMODE
|
||||
#define CONFIG_MESH_AP_AUTHMODE WIFI_AUTH_WPA2_PSK
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_CONNECTIONS
|
||||
#define CONFIG_MESH_AP_CONNECTIONS 6
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_AP_PASSWD
|
||||
#define CONFIG_MESH_AP_PASSWD "MAP_PASSWD"
|
||||
#endif
|
||||
#ifndef CONFIG_MESH_CHANNEL
|
||||
#define CONFIG_MESH_CHANNEL 0
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTER_SSID
|
||||
#define CONFIG_MESH_ROUTER_SSID "ROUTER_SSID"
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTER_PASSWD
|
||||
#define CONFIG_MESH_ROUTER_PASSWD "ROUTER_PASSWD"
|
||||
#endif
|
||||
|
||||
#ifndef CONFIG_MESH_ROUTE_TABLE_SIZE
|
||||
#define CONFIG_MESH_ROUTE_TABLE_SIZE 50
|
||||
#endif
|
||||
|
||||
#define MESH_NETWORK_PAYLOAD_SIZE 1024U
|
||||
|
||||
struct meshPacket
|
||||
{
|
||||
enum otaMeshPacketType
|
||||
{
|
||||
APP_Data, //data for application
|
||||
OTA_Version_Request, //send own version in payload
|
||||
OTA_Version_Response, //send own version in payload
|
||||
OTA_Data, //send image segment
|
||||
OTA_ACK, //ack image segment
|
||||
OTA_Complete, //signal end of image
|
||||
OTA_Abort //abort OTA process
|
||||
} type;
|
||||
uint8_t au8Payload[MESH_NETWORK_PAYLOAD_SIZE];
|
||||
mesh_addr_t meshSenderAddr;
|
||||
};
|
||||
|
||||
typedef struct meshPacket MESH_PACKET_t;
|
||||
|
||||
extern bool bIsMeshConnected;
|
||||
extern int32_t i32MeshLayer;
|
||||
extern mesh_addr_t meshParentAddr;
|
||||
extern esp_netif_t* netif_sta;
|
||||
extern uint8_t u8ownMAC[6];
|
||||
extern void (*pOTAChildConnectHandle)(uint8_t* );
|
||||
extern void (*pChangeStateOfServerWorkerHandle)(bool );
|
||||
|
||||
esp_err_t errMeshNetworkInitialize();
|
||||
esp_err_t errMeshNetworkInitializeWiFi();
|
||||
esp_err_t errMeshNetworkInitializeRouter(mesh_cfg_t* cfg);
|
||||
|
||||
esp_err_t errMeshNetworkSetAppReceiveHandle(void (*pAppRxHandleTmp)(uint8_t * pu8Data, uint8_t* pu8Sender));
|
||||
esp_err_t errMeshNetworkSetChildConnectedHandle(void (*pChildConnectHandleTmp)(uint8_t * pu8Data));
|
||||
esp_err_t errMeshNetworkSetOTAMessageHandle(void (*pOTAMessageHandleTmp)(MESH_PACKET_t* puMeshPacket));
|
||||
|
||||
esp_err_t errMeshNetworkSetOtaDataHandle(void (*pOtaDataHandleTmp)(MESH_PACKET_t* puMeshPacket));
|
||||
esp_err_t errMeshNetworkSetOtaAckHandle(void (*pOtaAckHandleTmp)(MESH_PACKET_t* puMeshPacket));
|
||||
esp_err_t errMeshNetworkSetOtaCompleteHandle(void (*pOtaCompleteHandleTmp)(MESH_PACKET_t* puMeshPacket));
|
||||
esp_err_t errMeshNetworkSetOtaAbortHandle(void (*pOtaAbortHandleTmp)(MESH_PACKET_t* puMeshPacket));
|
||||
|
||||
esp_err_t errMeshNetworkSetChangeStateOfServerWorkerHandle(void (*pChangeStateOfServerWorkerHandleTmp)(bool bState));
|
||||
|
||||
bool bCheckMACEquality(uint8_t* pu8aMAC, uint8_t* pu8bMAC);
|
||||
void vGetOwnAddr(mesh_addr_t* pMeshOwnAddr);
|
||||
esp_err_t errGetParentNode(mesh_addr_t* pMeshParentAddr);
|
||||
esp_err_t errGetChildren(mesh_addr_t* pChildren, uint16_t* pu16ChildrenSize);
|
||||
bool bIsRootNode();
|
||||
bool bIsNodeNeighbour(mesh_addr_t* pNode);
|
||||
|
||||
esp_err_t errStartReceiveTask();
|
||||
void vTaskReceiveMeshData(void *arg);
|
||||
void vMeshEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void* vpEventData);
|
||||
void vIPEventHandler(void *arg, esp_event_base_t event_base, int32_t i32EventID, void *event_data);
|
||||
|
||||
esp_err_t errSendMeshPacket(mesh_addr_t* pAddrDest, MESH_PACKET_t* pPacket);
|
||||
|
||||
|
||||
|
||||
|
||||
#endif /* H_MESH_NETWORK */
|
||||
|
@ -1,22 +0,0 @@
|
||||
#ifndef H_MESH_OTA
|
||||
#define H_MESH_OTA
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
#include "nvs_flash.h"
|
||||
#include "driver/gpio.h"
|
||||
#include "esp_ota_ops.h"
|
||||
#include "esp_partition.h"
|
||||
|
||||
#include "https_client.h"
|
||||
|
||||
bool bNewerVersion(const char* pu8Local, const char* pu8Remote);
|
||||
esp_err_t errExtractVersionNumber(const char* pu8Data, uint32_t* pu32DataLenght, char* pc8RemoteVersionNumber);
|
||||
esp_err_t errFindImageStart(const char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32StartOffset);
|
||||
|
||||
#endif /* H_MESH_OTA */
|
@ -1,128 +0,0 @@
|
||||
#include "mesh_ota.h"
|
||||
|
||||
/*
|
||||
* 999.999.999
|
||||
* Return true if remote version is newer (higher) than local version
|
||||
*/
|
||||
bool bNewerVersion(const char* pu8Local, const char* pu8Remote)
|
||||
{
|
||||
char u8LocalTmp[12]; //local version
|
||||
char u8RemoteTmp[12]; //remote version
|
||||
char* pu8saveptrLocal; //context for strok_r
|
||||
char* pu8saveptrRemote; //context for strok_r
|
||||
bool bReturn = false; //flag to stop loop
|
||||
uint8_t u8Index = 0; //numbers counter in version string
|
||||
|
||||
strcpy(u8LocalTmp, pu8Local); //copy in tmp
|
||||
strcpy(u8RemoteTmp, pu8Remote); //copy in tmp
|
||||
|
||||
char* pu8TokenLocal = strtok_r(u8LocalTmp, ".", &pu8saveptrLocal); //split tokens
|
||||
char* pu8TokenRemote = strtok_r(u8RemoteTmp, ".", &pu8saveptrRemote); //split tokens
|
||||
|
||||
while( (u8Index <= 2) && (bReturn == false)) //loop through tokens
|
||||
{
|
||||
u8Index++;
|
||||
if(atoi(pu8TokenLocal) < atoi(pu8TokenRemote))
|
||||
{
|
||||
bReturn = true; //version number difference --> stop loop
|
||||
}
|
||||
pu8TokenLocal = strtok_r(NULL, ".", &pu8saveptrLocal); //split tokens
|
||||
pu8TokenRemote = strtok_r(NULL, ".", &pu8saveptrRemote); //split tokens
|
||||
}
|
||||
return bReturn;
|
||||
}
|
||||
|
||||
esp_err_t errFindImageStart(const char* pu8Data, uint32_t* pu32DataLenght, uint32_t* pu32StartOffset)
|
||||
{
|
||||
/*
|
||||
Offset value
|
||||
0 = 0xE9 (first byte in image --> magic byte)
|
||||
48 = first digit of version number
|
||||
*/
|
||||
|
||||
esp_err_t errReturn = ESP_OK;
|
||||
bool bImageStartOffsetFound = false;
|
||||
uint32_t u32DataIndex = 0;
|
||||
uint32_t u32FirstDotOffset = 0;
|
||||
uint32_t u32SecondDotOffset = 0;
|
||||
uint8_t u8FirstDotIndex = 0;
|
||||
uint8_t u8SecondDotIndex = 0;
|
||||
|
||||
*pu32StartOffset = 0U; //reset offset to zero
|
||||
|
||||
while((u32DataIndex < *pu32DataLenght) && (bImageStartOffsetFound == false))
|
||||
{
|
||||
//search for magic byte
|
||||
if(pu8Data[u32DataIndex] == 0xe9)
|
||||
{
|
||||
//magic byte found
|
||||
while ((u8FirstDotIndex < 3) && (u32FirstDotOffset == 0))
|
||||
{
|
||||
//search first dot in version number
|
||||
if((u32DataIndex+49+u8FirstDotIndex) < *pu32DataLenght)
|
||||
{
|
||||
if((pu8Data[(u32DataIndex+49+u8FirstDotIndex)] == 0x2e))
|
||||
{
|
||||
//first dot found
|
||||
u32FirstDotOffset = (u32DataIndex+49+u8FirstDotIndex);
|
||||
}
|
||||
}
|
||||
u8FirstDotIndex++;
|
||||
}
|
||||
|
||||
while ((u8SecondDotIndex < 3) && (u32SecondDotOffset == 0) && (u32FirstDotOffset != 0))
|
||||
{
|
||||
//search first dot in version number
|
||||
if((u32FirstDotOffset+(u8SecondDotIndex+2)) < *pu32DataLenght)
|
||||
{
|
||||
if((pu8Data[(u32FirstDotOffset+(u8SecondDotIndex+2))] == 0x2e))
|
||||
{
|
||||
//second dot found
|
||||
u32SecondDotOffset = (u32FirstDotOffset+(u8SecondDotIndex+2));
|
||||
}
|
||||
}
|
||||
u8SecondDotIndex++;
|
||||
}
|
||||
|
||||
if((u32FirstDotOffset != 0) && (u32SecondDotOffset != 0))
|
||||
{
|
||||
//image start found based on magic byte and version number systax
|
||||
*pu32StartOffset = u32DataIndex; //store image start offset
|
||||
bImageStartOffsetFound = true;
|
||||
}
|
||||
else
|
||||
{
|
||||
// this is propably not the magic byte --> reset
|
||||
u32FirstDotOffset = 0;
|
||||
u32SecondDotOffset = 0;
|
||||
u8FirstDotIndex = 0;
|
||||
u8SecondDotIndex = 0;
|
||||
}
|
||||
}
|
||||
u32DataIndex++;
|
||||
}
|
||||
|
||||
if(bImageStartOffsetFound == false)
|
||||
{
|
||||
errReturn = ESP_ERR_NOT_FOUND;
|
||||
}
|
||||
|
||||
return errReturn;
|
||||
}
|
||||
|
||||
esp_err_t errExtractVersionNumber(const char* pu8Data, uint32_t* pu32DataLenght, char* pc8RemoteVersionNumber)
|
||||
{
|
||||
uint32_t u32StartOffset;
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
strcpy(pc8RemoteVersionNumber, "999.999.999"); //init value
|
||||
err = errFindImageStart(pu8Data, pu32DataLenght, &u32StartOffset); //get image start offset
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
//image found
|
||||
strncpy(pc8RemoteVersionNumber, pu8Data+(u32StartOffset+48), 11); //copy version number
|
||||
pc8RemoteVersionNumber[12] = '\0';
|
||||
}
|
||||
return err;
|
||||
}
|
@ -1,7 +1,7 @@
|
||||
#include <limits.h>
|
||||
#include "unity.h"
|
||||
|
||||
#include "mesh_ota.h"
|
||||
#include "Mesh_OTA.h"
|
||||
#include "test_image_hex.h"
|
||||
|
||||
// ### ### ### distinguish newer image version ### ### ###
|
||||
|
186
main/Blinky_LED.c
Normal file
186
main/Blinky_LED.c
Normal file
@ -0,0 +1,186 @@
|
||||
#include "Blinky_LED.h"
|
||||
|
||||
static const char *LOG_TAG = "blinky_led";
|
||||
static bool bLEDisOn = false; //set led default off
|
||||
static mesh_addr_t addrParent; //addr of parent node
|
||||
static mesh_addr_t childrenAddr[CONFIG_MESH_ROUTE_TABLE_SIZE]; //array of children attached to this node
|
||||
static uint16_t u16ChildrenSize; //number of children attached to this node
|
||||
xQueueHandle queueBlinkyLEDPackets; //handle for led action queue
|
||||
|
||||
esp_err_t errBlinkyLEDInitialize()
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
BaseType_t xReturned;
|
||||
|
||||
vGPIOInitialize();
|
||||
|
||||
//create queue to store led action created from BTN and mesh network events
|
||||
queueBlinkyLEDPackets = xQueueCreate(5, sizeof(BLINKY_PACKET_t));
|
||||
if (queueBlinkyLEDPackets == 0) // Queue not created
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to create Queue for Application Packets");
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
|
||||
//register the receiver handle in mesh network
|
||||
ERROR_CHECK(errMeshNetworkSetAppReceiveHandle(rxHandle));
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
xReturned = xTaskCreate(vTaskReadUserInput, "vTaskReadUserInput", 4096, NULL, 5, NULL);
|
||||
if(xReturned != pdPASS)
|
||||
{
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
xReturned = xTaskCreate(vTaskReceiveData, "vTaskReceiveData", 4096, NULL, 5, NULL);
|
||||
if(xReturned != pdPASS)
|
||||
{
|
||||
err = ESP_FAIL;
|
||||
}
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
void vGPIOInitialize()
|
||||
{
|
||||
gpio_config_t gpioConf;
|
||||
|
||||
//LED as Output
|
||||
gpio_reset_pin(GPIO_LED);
|
||||
gpio_set_direction(GPIO_LED, GPIO_MODE_OUTPUT);
|
||||
|
||||
//BTN as Input
|
||||
gpioConf.intr_type = GPIO_INTR_DISABLE;
|
||||
gpioConf.mode = GPIO_MODE_INPUT;
|
||||
gpioConf.pin_bit_mask = GPIO_INPUT_PIN_SEL;
|
||||
gpioConf.pull_down_en = 0;
|
||||
gpioConf.pull_up_en = 1;
|
||||
gpio_config(&gpioConf);
|
||||
}
|
||||
|
||||
void rxHandle(uint8_t* pu8Data, uint8_t* pu8Sender)
|
||||
{
|
||||
//send payload to app queue
|
||||
BLINKY_PACKET_t bTmpPacket;
|
||||
memcpy(&bTmpPacket, (uint8_t *)pu8Data, sizeof(BLINKY_PACKET_t));
|
||||
memcpy(&bTmpPacket.meshSenderAddr, (uint8_t *)pu8Sender, 6); //copy MAC from sender into app packet
|
||||
if (xQueueSend(queueBlinkyLEDPackets, &bTmpPacket, portMAX_DELAY) != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to push packet from mesh into Queue");
|
||||
}
|
||||
}
|
||||
|
||||
void vTaskReadUserInput(void *arg)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
BLINKY_PACKET_t bTmpPacket;
|
||||
MESH_PACKET_t meshPacket;
|
||||
|
||||
bTmpPacket.type = LED_OFF; //default off
|
||||
meshPacket.type = APP_Data; //this is a app packet
|
||||
|
||||
while(true)
|
||||
{
|
||||
//check for BTN press
|
||||
if(gpio_get_level(GPIO_BOOT_BTN) == 0)
|
||||
{
|
||||
err = ESP_OK;
|
||||
|
||||
if(bLEDisOn == false)
|
||||
{
|
||||
bTmpPacket.type = LED_ON;
|
||||
}
|
||||
else
|
||||
{
|
||||
bTmpPacket.type = LED_OFF;
|
||||
}
|
||||
|
||||
//push led action into queue
|
||||
if (xQueueSend(queueBlinkyLEDPackets, &bTmpPacket, portMAX_DELAY) != pdPASS)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to push packet into queue");
|
||||
}
|
||||
|
||||
memcpy(meshPacket.au8Payload, &bTmpPacket, sizeof(BLINKY_PACKET_t));
|
||||
|
||||
if(bIsRootNode() == false)
|
||||
{
|
||||
//this node is not root --> send led action to parent
|
||||
ERROR_CHECK(errGetParentNode(&addrParent));
|
||||
ERROR_CHECK(errSendMeshPacket(&addrParent, &meshPacket));
|
||||
}
|
||||
else
|
||||
{
|
||||
//this node is root --> send led action to children
|
||||
ERROR_CHECK(errGetChildren(childrenAddr, &u16ChildrenSize));
|
||||
|
||||
for (uint16_t u16Index = 0; u16Index < u16ChildrenSize; u16Index++)
|
||||
{
|
||||
ERROR_CHECK (errSendMeshPacket(&childrenAddr[u16Index], &meshPacket));
|
||||
}
|
||||
}
|
||||
vTaskDelay(200 / portTICK_PERIOD_MS);
|
||||
}
|
||||
vTaskDelay(50 / portTICK_PERIOD_MS);
|
||||
}
|
||||
}
|
||||
|
||||
void vTaskReceiveData(void *arg)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
MESH_PACKET_t meshPacket;
|
||||
BLINKY_PACKET_t bTmpPacket;
|
||||
|
||||
bTmpPacket.type = LED_OFF; //default off
|
||||
meshPacket.type = APP_Data; //this is a app packet
|
||||
|
||||
while (1)
|
||||
{
|
||||
if (xQueueReceive(queueBlinkyLEDPackets, &bTmpPacket, portMAX_DELAY) != pdTRUE)
|
||||
{
|
||||
ESP_LOGE(LOG_TAG, "Unable to receive packet from Queue");
|
||||
}
|
||||
else
|
||||
{
|
||||
err = ESP_OK;
|
||||
//Successfully RECEIVED the packet
|
||||
switch (bTmpPacket.type)
|
||||
{
|
||||
case LED_ON:
|
||||
bLEDisOn = true;
|
||||
gpio_set_level(GPIO_LED, 1); //switch on
|
||||
ESP_LOGI(LOG_TAG,"switch LED ON");
|
||||
break;
|
||||
|
||||
case LED_OFF:
|
||||
bLEDisOn = false;
|
||||
gpio_set_level(GPIO_LED, 0); //switch off
|
||||
ESP_LOGI(LOG_TAG,"switch LED OFF");
|
||||
break;
|
||||
|
||||
default:
|
||||
bLEDisOn = false;
|
||||
gpio_set_level(GPIO_LED, 0); //switch off
|
||||
ESP_LOGI(LOG_TAG,"switch LED OFF");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
ERROR_CHECK(errGetChildren(childrenAddr, &u16ChildrenSize)); //get all children attached to this node
|
||||
memcpy(meshPacket.au8Payload, &bTmpPacket, sizeof(BLINKY_PACKET_t)); //copy led action in mesh packet payload
|
||||
|
||||
for (uint16_t u16Index = 0; u16Index < u16ChildrenSize; u16Index++)
|
||||
{
|
||||
//loop through children
|
||||
if(bCheckMACEquality(bTmpPacket.meshSenderAddr.addr, childrenAddr[u16Index].addr) == false) //exclude the sender node
|
||||
{
|
||||
ERROR_CHECK (errSendMeshPacket(&childrenAddr[u16Index], &meshPacket)); //send to child
|
||||
}
|
||||
}
|
||||
vTaskDelay(200 / portTICK_PERIOD_MS);
|
||||
}
|
||||
}
|
39
main/Blinky_LED.h
Normal file
39
main/Blinky_LED.h
Normal file
@ -0,0 +1,39 @@
|
||||
#ifndef H_BLINKY_LED
|
||||
#define H_BLINKY_LED
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_log.h"
|
||||
#include "freertos/FreeRTOS.h"
|
||||
#include "freertos/task.h"
|
||||
#include "driver/gpio.h"
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
|
||||
#define GPIO_BOOT_BTN 0 //GPIO0 (Boot BTN)
|
||||
#define GPIO_LED 2 //GPIO2 (internal blue LED in DevKit V1.0)
|
||||
|
||||
#define GPIO_INPUT_PIN_SEL (1ULL<<GPIO_BOOT_BTN)
|
||||
|
||||
struct blinky_packet
|
||||
{
|
||||
enum blinky_packet_type
|
||||
{
|
||||
LED_OFF,
|
||||
LED_ON,
|
||||
} type;
|
||||
mesh_addr_t meshSenderAddr; //stores addr of sender of this packet
|
||||
};
|
||||
|
||||
typedef struct blinky_packet BLINKY_PACKET_t;
|
||||
|
||||
esp_err_t errBlinkyLEDInitialize();
|
||||
void vGPIOInitialize();
|
||||
void rxHandle(uint8_t* pu8Data, uint8_t* pu8Sender);
|
||||
void vTaskReadUserInput(void *arg);
|
||||
void vTaskReceiveData(void *arg);
|
||||
|
||||
#endif /* H_BLINKY_LED */
|
||||
|
||||
|
@ -1,2 +1,2 @@
|
||||
idf_component_register(SRCS "main.c"
|
||||
idf_component_register(SRCS "Blinky_LED.c" "Main.c"
|
||||
INCLUDE_DIRS ".")
|
||||
|
@ -105,6 +105,12 @@ menu "Mesh OTA Configuration"
|
||||
default 0
|
||||
help
|
||||
mesh network channel.
|
||||
|
||||
config MESH_ID
|
||||
string "ID for mesh network"
|
||||
default "00, 00, 00, 00, 00, 00"
|
||||
help
|
||||
Mesh network id like MAC addr.
|
||||
|
||||
config MESH_ROUTER_SSID
|
||||
string "Router SSID"
|
||||
@ -158,6 +164,13 @@ menu "Mesh OTA Configuration"
|
||||
help
|
||||
The number of devices over the network(max: 300).
|
||||
|
||||
config MESH_MESSAGE_SIZE
|
||||
int "Mesh network messages size"
|
||||
range 1 65536
|
||||
default 1500
|
||||
help
|
||||
Length of messages deliveres by the mesh network.
|
||||
|
||||
config OTA_HTTPS_SERVER_COMMON_NAME
|
||||
string "Common name OTA server"
|
||||
default "exmaple.com"
|
||||
|
37
main/Main.c
Normal file
37
main/Main.c
Normal file
@ -0,0 +1,37 @@
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
#include "nvs_flash.h"
|
||||
#include "driver/gpio.h"
|
||||
#include "esp_ota_ops.h"
|
||||
#include "esp_partition.h"
|
||||
|
||||
#include "Mesh_OTA.h"
|
||||
#include "Blinky_LED.h"
|
||||
|
||||
static const char *LOG_TAG = "esp_main";
|
||||
|
||||
void app_main(void)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
ESP_LOGI(LOG_TAG, "hardcoded: 0.0.1");
|
||||
|
||||
ESP_LOGI(LOG_TAG, "start mesh network");
|
||||
err = errMeshNetworkInitialize();
|
||||
ESP_ERROR_CHECK(err);
|
||||
|
||||
ESP_LOGI(LOG_TAG, "start ota");
|
||||
err = errMeshOTAInitialize();
|
||||
ESP_ERROR_CHECK(err);
|
||||
|
||||
ESP_LOGI(LOG_TAG, "start app");
|
||||
err = errBlinkyLEDInitialize();
|
||||
ESP_ERROR_CHECK(err);
|
||||
}
|
||||
|
||||
|
660
main/main.c
660
main/main.c
@ -1,660 +0,0 @@
|
||||
|
||||
#include <string.h>
|
||||
#include "esp_wifi.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_log.h"
|
||||
#include "esp_mesh.h"
|
||||
#include "esp_mesh_internal.h"
|
||||
#include "nvs_flash.h"
|
||||
#include "driver/gpio.h"
|
||||
#include "esp_ota_ops.h"
|
||||
#include "esp_partition.h"
|
||||
|
||||
#include "mesh_ota.h"
|
||||
|
||||
#define RX_SIZE (1234)
|
||||
#define TX_SIZE (1234)
|
||||
|
||||
static const char *MESH_TAG = "mesh_main";
|
||||
static const uint8_t MESH_ID[6] = { 0x77, 0x77, 0x77, 0x77, 0x77, 0x77};
|
||||
static uint8_t tx_buf[TX_SIZE] = { 0, };
|
||||
static uint8_t rx_buf[RX_SIZE] = { 0, };
|
||||
static bool is_mesh_connected = false;
|
||||
static mesh_addr_t mesh_parent_addr;
|
||||
static uint8_t ownMAC[6];
|
||||
static int mesh_layer = -1;
|
||||
static esp_netif_t *netif_sta = NULL;
|
||||
|
||||
struct ota_mesh_packet
|
||||
{
|
||||
enum ota_mesh_packet_type
|
||||
{
|
||||
APP_Version_Request,
|
||||
APP_Version_Response,
|
||||
OTA_Data,
|
||||
OTA_ACK,
|
||||
OTA_Complete
|
||||
} type;
|
||||
|
||||
uint8_t au8Payload[1024];
|
||||
};
|
||||
|
||||
/*******************************************************
|
||||
* Function Declarations
|
||||
*******************************************************/
|
||||
|
||||
esp_err_t esp_mesh_send_packet(mesh_addr_t* dest, struct ota_mesh_packet* packet);
|
||||
|
||||
/*******************************************************
|
||||
* Function Definitions
|
||||
*******************************************************/
|
||||
|
||||
esp_err_t esp_mesh_ota_send(mesh_addr_t* dest)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
|
||||
static uint32_t u32index;
|
||||
|
||||
const esp_partition_t * currentPartition = esp_ota_get_boot_partition();
|
||||
|
||||
if((*currentPartition).subtype == 0)
|
||||
{
|
||||
|
||||
int data_read = 0;
|
||||
|
||||
struct ota_mesh_packet packet;
|
||||
packet.type=OTA_Data;
|
||||
|
||||
if(u32index == 1024)
|
||||
{
|
||||
//all data read
|
||||
data_read = 0;
|
||||
u32index = 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(MESH_TAG, "OTA-Data read: %i", u32index);
|
||||
err = esp_partition_read(currentPartition, (1024*u32index), packet.au8Payload, 1024 );
|
||||
ESP_ERROR_CHECK(err);
|
||||
data_read = 1024;
|
||||
u32index++;
|
||||
}
|
||||
|
||||
if (data_read > 0)
|
||||
{
|
||||
//send ota fragemnt to node
|
||||
esp_mesh_send_packet(dest, &packet);
|
||||
}
|
||||
|
||||
ESP_ERROR_CHECK(err);
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(MESH_TAG, "Subtype: %d", (*currentPartition).subtype);
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
esp_err_t esp_mesh_ota_receive(mesh_addr_t* dest, struct ota_mesh_packet* packet)
|
||||
{
|
||||
esp_err_t err = ESP_OK;
|
||||
static esp_ota_handle_t otaHandle;
|
||||
static uint32_t u32index;
|
||||
|
||||
const esp_partition_t * currentPartition = esp_ota_get_boot_partition();
|
||||
const esp_partition_t * otaPartition = esp_ota_get_next_update_partition(currentPartition);
|
||||
|
||||
if(u32index == 0)
|
||||
{
|
||||
//first run
|
||||
|
||||
err = esp_ota_begin(otaPartition, OTA_SIZE_UNKNOWN, &otaHandle);
|
||||
ESP_ERROR_CHECK(err);
|
||||
}
|
||||
|
||||
ESP_LOGI(MESH_TAG, "OTA-Data write: %i", u32index);
|
||||
err = esp_ota_write(otaHandle, packet->au8Payload, 1024);
|
||||
|
||||
if(err != ESP_OK)
|
||||
{
|
||||
ESP_LOGE(MESH_TAG, "OTA-Data write error: %i at %i", err, u32index);
|
||||
}
|
||||
|
||||
ESP_ERROR_CHECK(err);
|
||||
|
||||
|
||||
|
||||
if(u32index >= 1023)
|
||||
{
|
||||
//ota update complete
|
||||
|
||||
ESP_LOGI(MESH_TAG, "OTA-Data complete arrived: %i", u32index);
|
||||
err = esp_ota_end(otaHandle);
|
||||
ESP_ERROR_CHECK(err);
|
||||
esp_app_desc_t otaPartitionDesc;
|
||||
err = esp_ota_get_partition_description(otaPartition, &otaPartitionDesc);
|
||||
ESP_ERROR_CHECK(err);
|
||||
ESP_LOGI(MESH_TAG, "otaPartition project_name: %s", (otaPartitionDesc).project_name);
|
||||
|
||||
err = esp_ota_set_boot_partition(otaPartition);
|
||||
ESP_ERROR_CHECK(err);
|
||||
|
||||
struct ota_mesh_packet retPacket;
|
||||
retPacket.type=OTA_Complete;
|
||||
ESP_ERROR_CHECK (esp_mesh_send_packet(dest, &retPacket)); //send back to parent
|
||||
|
||||
//check if this node has children --> Update them
|
||||
|
||||
esp_restart();
|
||||
}
|
||||
|
||||
u32index++;
|
||||
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
//returns true if MAC address is equal
|
||||
bool esp_mesh_check_MAC_Equality(uint8_t* aMAC, uint8_t* bMAC)
|
||||
{
|
||||
for (uint8_t index = 0; index < 6; index++)
|
||||
{
|
||||
if(aMAC[index] != bMAC[index])
|
||||
{
|
||||
return false;
|
||||
}
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
esp_err_t esp_mesh_get_Children(mesh_addr_t children[], uint16_t* pu16ChildrenSize)
|
||||
{
|
||||
*pu16ChildrenSize = 0;
|
||||
mesh_addr_t route_table[CONFIG_MESH_ROUTE_TABLE_SIZE];
|
||||
int route_table_size = 0;
|
||||
esp_mesh_get_routing_table((mesh_addr_t *) &route_table, CONFIG_MESH_ROUTE_TABLE_SIZE * 6, &route_table_size);
|
||||
for(uint16_t index = 0; index < esp_mesh_get_routing_table_size(); index++)
|
||||
{
|
||||
if(! (esp_mesh_check_MAC_Equality(ownMAC, route_table[index].addr)) )
|
||||
{
|
||||
//child node
|
||||
// ESP_LOGI(MESH_TAG, "adding Node: \"0x%x, 0x%x, 0x%x, 0x%x, 0x%x, 0x%x\" ", route_table[index].addr[0], route_table[index].addr[1], route_table[index].addr[2], route_table[index].addr[3], route_table[index].addr[4], route_table[index].addr[5]);
|
||||
children[*pu16ChildrenSize] = route_table[index];
|
||||
*pu16ChildrenSize = (*pu16ChildrenSize)+1;
|
||||
}
|
||||
}
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
|
||||
esp_err_t esp_mesh_send_packet(mesh_addr_t* dest, struct ota_mesh_packet* packet)
|
||||
{
|
||||
esp_err_t err;
|
||||
mesh_data_t data;
|
||||
data.data = tx_buf;
|
||||
data.size = sizeof(tx_buf);
|
||||
data.proto = MESH_PROTO_BIN;
|
||||
data.tos = MESH_TOS_P2P;
|
||||
|
||||
memcpy(tx_buf, (uint8_t *)packet, sizeof(struct ota_mesh_packet));
|
||||
|
||||
err = esp_mesh_send(dest, &data, MESH_DATA_P2P, NULL, 0);
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
void esp_mesh_p2p_rx_main(void *arg)
|
||||
{
|
||||
esp_err_t err;
|
||||
mesh_addr_t from;
|
||||
mesh_data_t data;
|
||||
int flag = 0;
|
||||
data.data = rx_buf;
|
||||
data.size = RX_SIZE;
|
||||
|
||||
while (true)
|
||||
{
|
||||
data.size = RX_SIZE;
|
||||
err = esp_mesh_recv(&from, &data, portMAX_DELAY, &flag, NULL, 0);
|
||||
if (err != ESP_OK || !data.size)
|
||||
{
|
||||
ESP_LOGE(MESH_TAG, "err:0x%x, size:%d", err, data.size);
|
||||
continue;
|
||||
}
|
||||
|
||||
struct ota_mesh_packet packet;
|
||||
memcpy(&packet, (uint8_t *)rx_buf, sizeof(struct ota_mesh_packet));
|
||||
|
||||
switch (packet.type)
|
||||
{
|
||||
case APP_Version_Request:
|
||||
ESP_LOGI(MESH_TAG, "recv: APP_Version_Request");
|
||||
packet.type=APP_Version_Response;
|
||||
packet.au8Payload[0] = 42; //TODO get current running version
|
||||
ESP_ERROR_CHECK (esp_mesh_send_packet(&from, &packet)); //send back to parent
|
||||
break;
|
||||
case APP_Version_Response:
|
||||
ESP_LOGI(MESH_TAG, "recv: APP_Version_Response - App Version %i: ", packet.au8Payload[0]);
|
||||
//check if node is out-dated
|
||||
esp_mesh_ota_send(&from);
|
||||
break;
|
||||
case OTA_Data:
|
||||
ESP_LOGI(MESH_TAG, "recv: OTA_Data");
|
||||
esp_mesh_ota_receive(&from, &packet);
|
||||
packet.type=OTA_ACK;
|
||||
ESP_ERROR_CHECK (esp_mesh_send_packet(&from, &packet)); //send back to parent
|
||||
break;
|
||||
case OTA_ACK:
|
||||
ESP_LOGI(MESH_TAG, "recv: OTA_ACK");
|
||||
esp_mesh_ota_send(&from);
|
||||
break;
|
||||
case OTA_Complete:
|
||||
ESP_LOGI(MESH_TAG, "recv: OTA_Complete");
|
||||
break;
|
||||
default:
|
||||
ESP_LOGE(MESH_TAG, "recv: something");
|
||||
break;
|
||||
}
|
||||
|
||||
} //end while
|
||||
vTaskDelete(NULL);
|
||||
}
|
||||
|
||||
|
||||
esp_err_t esp_mesh_comm_p2p_start(void)
|
||||
{
|
||||
static bool is_comm_p2p_started = false;
|
||||
if (!is_comm_p2p_started)
|
||||
{
|
||||
is_comm_p2p_started = true;
|
||||
xTaskCreate(esp_mesh_p2p_rx_main, "MPRX", 7000, NULL, 5, NULL);
|
||||
}
|
||||
return ESP_OK;
|
||||
}
|
||||
|
||||
void mesh_event_handler(void *arg, esp_event_base_t event_base,
|
||||
int32_t event_id, void *event_data)
|
||||
{
|
||||
mesh_addr_t id = {0,};
|
||||
static uint16_t last_layer = 0;
|
||||
|
||||
switch (event_id)
|
||||
{
|
||||
case MESH_EVENT_STARTED:
|
||||
{
|
||||
esp_mesh_get_id(&id);
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_MESH_STARTED>ID:"MACSTR"", MAC2STR(id.addr));
|
||||
is_mesh_connected = false;
|
||||
mesh_layer = esp_mesh_get_layer();
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_STOPPED: {
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_STOPPED>");
|
||||
is_mesh_connected = false;
|
||||
mesh_layer = esp_mesh_get_layer();
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_CHILD_CONNECTED: {
|
||||
mesh_event_child_connected_t *child_connected = (mesh_event_child_connected_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_CHILD_CONNECTED>aid:%d, "MACSTR"",
|
||||
child_connected->aid,
|
||||
MAC2STR(child_connected->mac));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_CHILD_DISCONNECTED: {
|
||||
mesh_event_child_disconnected_t *child_disconnected = (mesh_event_child_disconnected_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_CHILD_DISCONNECTED>aid:%d, "MACSTR"",
|
||||
child_disconnected->aid,
|
||||
MAC2STR(child_disconnected->mac));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROUTING_TABLE_ADD: {
|
||||
mesh_event_routing_table_change_t *routing_table = (mesh_event_routing_table_change_t *)event_data;
|
||||
ESP_LOGW(MESH_TAG, "<MESH_EVENT_ROUTING_TABLE_ADD>add %d, new:%d, layer:%d",
|
||||
routing_table->rt_size_change,
|
||||
routing_table->rt_size_new, mesh_layer);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROUTING_TABLE_REMOVE: {
|
||||
mesh_event_routing_table_change_t *routing_table = (mesh_event_routing_table_change_t *)event_data;
|
||||
ESP_LOGW(MESH_TAG, "<MESH_EVENT_ROUTING_TABLE_REMOVE>remove %d, new:%d, layer:%d",
|
||||
routing_table->rt_size_change,
|
||||
routing_table->rt_size_new, mesh_layer);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_NO_PARENT_FOUND: {
|
||||
mesh_event_no_parent_found_t *no_parent = (mesh_event_no_parent_found_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_NO_PARENT_FOUND>scan times:%d",
|
||||
no_parent->scan_times);
|
||||
}
|
||||
/* TODO handler for the failure */
|
||||
break;
|
||||
case MESH_EVENT_PARENT_CONNECTED: {
|
||||
mesh_event_connected_t *connected = (mesh_event_connected_t *)event_data;
|
||||
esp_mesh_get_id(&id);
|
||||
mesh_layer = connected->self_layer;
|
||||
memcpy(&mesh_parent_addr.addr, connected->connected.bssid, 6);
|
||||
ESP_LOGI(MESH_TAG,
|
||||
"<MESH_EVENT_PARENT_CONNECTED>layer:%d-->%d, parent:"MACSTR"%s, ID:"MACSTR", duty:%d",
|
||||
last_layer, mesh_layer, MAC2STR(mesh_parent_addr.addr),
|
||||
esp_mesh_is_root() ? "<ROOT>" :
|
||||
(mesh_layer == 2) ? "<layer2>" : "", MAC2STR(id.addr), connected->duty);
|
||||
last_layer = mesh_layer;
|
||||
// mesh_connected_indicator(mesh_layer);
|
||||
is_mesh_connected = true;
|
||||
if (esp_mesh_is_root()) {
|
||||
esp_netif_dhcpc_start(netif_sta);
|
||||
}
|
||||
esp_mesh_comm_p2p_start();//start receiving
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_PARENT_DISCONNECTED: {
|
||||
mesh_event_disconnected_t *disconnected = (mesh_event_disconnected_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG,
|
||||
"<MESH_EVENT_PARENT_DISCONNECTED>reason:%d",
|
||||
disconnected->reason);
|
||||
is_mesh_connected = false;
|
||||
// mesh_disconnected_indicator();
|
||||
mesh_layer = esp_mesh_get_layer();
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_LAYER_CHANGE: {
|
||||
mesh_event_layer_change_t *layer_change = (mesh_event_layer_change_t *)event_data;
|
||||
mesh_layer = layer_change->new_layer;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_LAYER_CHANGE>layer:%d-->%d%s",
|
||||
last_layer, mesh_layer,
|
||||
esp_mesh_is_root() ? "<ROOT>" :
|
||||
(mesh_layer == 2) ? "<layer2>" : "");
|
||||
last_layer = mesh_layer;
|
||||
// mesh_connected_indicator(mesh_layer);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_ADDRESS: {
|
||||
mesh_event_root_address_t *root_addr = (mesh_event_root_address_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_ROOT_ADDRESS>root address:"MACSTR"",
|
||||
MAC2STR(root_addr->addr));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_VOTE_STARTED: {
|
||||
mesh_event_vote_started_t *vote_started = (mesh_event_vote_started_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG,
|
||||
"<MESH_EVENT_VOTE_STARTED>attempts:%d, reason:%d, rc_addr:"MACSTR"",
|
||||
vote_started->attempts,
|
||||
vote_started->reason,
|
||||
MAC2STR(vote_started->rc_addr.addr));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_VOTE_STOPPED: {
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_VOTE_STOPPED>");
|
||||
break;
|
||||
}
|
||||
case MESH_EVENT_ROOT_SWITCH_REQ: {
|
||||
mesh_event_root_switch_req_t *switch_req = (mesh_event_root_switch_req_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG,
|
||||
"<MESH_EVENT_ROOT_SWITCH_REQ>reason:%d, rc_addr:"MACSTR"",
|
||||
switch_req->reason,
|
||||
MAC2STR( switch_req->rc_addr.addr));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_SWITCH_ACK: {
|
||||
/* new root */
|
||||
mesh_layer = esp_mesh_get_layer();
|
||||
esp_mesh_get_parent_bssid(&mesh_parent_addr);
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_ROOT_SWITCH_ACK>layer:%d, parent:"MACSTR"", mesh_layer, MAC2STR(mesh_parent_addr.addr));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_TODS_STATE: {
|
||||
mesh_event_toDS_state_t *toDs_state = (mesh_event_toDS_state_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_TODS_REACHABLE>state:%d", *toDs_state);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_FIXED: {
|
||||
mesh_event_root_fixed_t *root_fixed = (mesh_event_root_fixed_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_ROOT_FIXED>%s",
|
||||
root_fixed->is_fixed ? "fixed" : "not fixed");
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROOT_ASKED_YIELD: {
|
||||
mesh_event_root_conflict_t *root_conflict = (mesh_event_root_conflict_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG,
|
||||
"<MESH_EVENT_ROOT_ASKED_YIELD>"MACSTR", rssi:%d, capacity:%d",
|
||||
MAC2STR(root_conflict->addr),
|
||||
root_conflict->rssi,
|
||||
root_conflict->capacity);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_CHANNEL_SWITCH: {
|
||||
mesh_event_channel_switch_t *channel_switch = (mesh_event_channel_switch_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_CHANNEL_SWITCH>new channel:%d", channel_switch->channel);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_SCAN_DONE: {
|
||||
mesh_event_scan_done_t *scan_done = (mesh_event_scan_done_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_SCAN_DONE>number:%d",
|
||||
scan_done->number);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_NETWORK_STATE: {
|
||||
mesh_event_network_state_t *network_state = (mesh_event_network_state_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_NETWORK_STATE>is_rootless:%d",
|
||||
network_state->is_rootless);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_STOP_RECONNECTION: {
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_STOP_RECONNECTION>");
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_FIND_NETWORK: {
|
||||
mesh_event_find_network_t *find_network = (mesh_event_find_network_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_FIND_NETWORK>new channel:%d, router BSSID:"MACSTR"",
|
||||
find_network->channel, MAC2STR(find_network->router_bssid));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_ROUTER_SWITCH: {
|
||||
mesh_event_router_switch_t *router_switch = (mesh_event_router_switch_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_ROUTER_SWITCH>new router:%s, channel:%d, "MACSTR"",
|
||||
router_switch->ssid, router_switch->channel, MAC2STR(router_switch->bssid));
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_PS_PARENT_DUTY: {
|
||||
mesh_event_ps_duty_t *ps_duty = (mesh_event_ps_duty_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_PS_PARENT_DUTY>duty:%d", ps_duty->duty);
|
||||
}
|
||||
break;
|
||||
case MESH_EVENT_PS_CHILD_DUTY: {
|
||||
mesh_event_ps_duty_t *ps_duty = (mesh_event_ps_duty_t *)event_data;
|
||||
ESP_LOGI(MESH_TAG, "<MESH_EVENT_PS_CHILD_DUTY>cidx:%d, "MACSTR", duty:%d", ps_duty->child_connected.aid-1,
|
||||
MAC2STR(ps_duty->child_connected.mac), ps_duty->duty);
|
||||
}
|
||||
break;
|
||||
default:
|
||||
ESP_LOGI(MESH_TAG, "unknown id:%d", event_id);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
void ip_event_handler(void *arg, esp_event_base_t event_base,
|
||||
int32_t event_id, void *event_data)
|
||||
{
|
||||
ip_event_got_ip_t *event = (ip_event_got_ip_t *) event_data;
|
||||
ESP_LOGI(MESH_TAG, "<IP_EVENT_STA_GOT_IP>IP:" IPSTR, IP2STR(&event->ip_info.ip));
|
||||
|
||||
}
|
||||
|
||||
|
||||
static void test(void *pvParameters)
|
||||
{
|
||||
esp_err_t err;
|
||||
uint32_t u32BufferLenght = 1024U;
|
||||
char buffer[1024U];
|
||||
uint32_t u32BytesRead = 0;
|
||||
char pcRemoteVersionNumber[12];
|
||||
const esp_partition_t * currentPartition;
|
||||
const esp_partition_t * otaPartition;
|
||||
static esp_ota_handle_t otaHandle;
|
||||
uint32_t u32StartOffset;
|
||||
esp_app_desc_t otaPartitionDesc;
|
||||
|
||||
ESP_LOGI(MESH_TAG, "Hello World");
|
||||
currentPartition = esp_ota_get_boot_partition();
|
||||
ESP_LOGI(MESH_TAG, "Type: %d", (*currentPartition).subtype);
|
||||
ESP_LOGI(MESH_TAG, "Start address: %d", (*currentPartition).address);
|
||||
ESP_LOGI(MESH_TAG, "Size: %d", (*currentPartition).size);
|
||||
ESP_LOGI(MESH_TAG, "Encrypted: %d", (*currentPartition).encrypted);
|
||||
|
||||
esp_app_desc_t curPartitionDesc;
|
||||
err = esp_ota_get_partition_description(currentPartition, &curPartitionDesc);
|
||||
ESP_ERROR_CHECK(err);
|
||||
ESP_LOGI(MESH_TAG, "currentPartition project_name: %s", (curPartitionDesc).project_name);
|
||||
ESP_LOGI(MESH_TAG, "currentPartition version: %s", (curPartitionDesc).version);
|
||||
ESP_LOGI(MESH_TAG, "currentPartition Timestamp: %s %s", (curPartitionDesc).date, (curPartitionDesc).time);
|
||||
|
||||
https_clientInitialize();
|
||||
https_clientRetrieveData(buffer, &u32BufferLenght, &u32BytesRead);
|
||||
ESP_LOGI(MESH_TAG, "Data received: %i", u32BytesRead);
|
||||
err = errExtractVersionNumber(buffer, &u32BytesRead, pcRemoteVersionNumber);
|
||||
|
||||
if(err == ESP_OK)
|
||||
{
|
||||
if(bNewerVersion((curPartitionDesc).version, pcRemoteVersionNumber))
|
||||
{
|
||||
ESP_LOGI(MESH_TAG, "Newer Version available");
|
||||
//write ota
|
||||
otaPartition= esp_ota_get_next_update_partition(currentPartition);
|
||||
|
||||
err = errFindImageStart(buffer, &u32BufferLenght, &u32StartOffset);
|
||||
|
||||
ESP_LOGI(MESH_TAG, "first byte offset: %i", u32StartOffset);
|
||||
ESP_LOGI(MESH_TAG, "first byte: %x", buffer[u32StartOffset]);
|
||||
|
||||
err = esp_ota_begin(otaPartition, OTA_SIZE_UNKNOWN, &otaHandle);
|
||||
ESP_ERROR_CHECK(err);
|
||||
|
||||
do
|
||||
{
|
||||
ESP_LOGI(MESH_TAG, "OTA-Data written: %i", u32BytesRead);
|
||||
err = esp_ota_write(otaHandle, (const void*) buffer+u32StartOffset, (u32BytesRead-u32StartOffset));
|
||||
u32StartOffset = 0U;
|
||||
https_clientRetrieveData(buffer, &u32BufferLenght, &u32BytesRead);
|
||||
}
|
||||
while (u32BytesRead > 0);
|
||||
|
||||
err = esp_ota_end(otaHandle);
|
||||
ESP_ERROR_CHECK(err);
|
||||
|
||||
err = esp_ota_get_partition_description(otaPartition, &otaPartitionDesc);
|
||||
ESP_ERROR_CHECK(err);
|
||||
ESP_LOGI(MESH_TAG, "otaPartition project_name: %s", (otaPartitionDesc).project_name);
|
||||
err = esp_ota_set_boot_partition(otaPartition);
|
||||
ESP_ERROR_CHECK(err);
|
||||
//esp_restart();
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(MESH_TAG, "NO newer Version available");
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
ESP_LOGI(MESH_TAG, "errExtractVersionNumber failed: %i", err);
|
||||
}
|
||||
|
||||
https_clientDeinitialize();
|
||||
|
||||
ESP_LOGI(MESH_TAG, "\nend of task\n");
|
||||
while(1)
|
||||
{
|
||||
vTaskDelay(1000 / portTICK_PERIOD_MS);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
void app_main(void)
|
||||
{
|
||||
ESP_LOGI(MESH_TAG, "hardcoded: 0.0.1");
|
||||
/*
|
||||
err = nvs_flash_erase();
|
||||
if(err != ESP_OK){
|
||||
ESP_LOGI(MESH_TAG, "Error: %x", err);
|
||||
while(1){
|
||||
|
||||
}
|
||||
}
|
||||
*/
|
||||
|
||||
ESP_ERROR_CHECK(nvs_flash_init());
|
||||
|
||||
/* tcpip initialization */
|
||||
ESP_ERROR_CHECK(esp_netif_init());
|
||||
|
||||
/* event initialization */
|
||||
ESP_ERROR_CHECK(esp_event_loop_create_default());
|
||||
|
||||
/* create network interfaces for mesh (only station instance saved for further manipulation, soft AP instance ignored */
|
||||
ESP_ERROR_CHECK(esp_netif_create_default_wifi_mesh_netifs(&netif_sta, NULL));
|
||||
|
||||
/* wifi initialization */
|
||||
wifi_init_config_t config = WIFI_INIT_CONFIG_DEFAULT();
|
||||
ESP_ERROR_CHECK(esp_wifi_init(&config));
|
||||
ESP_ERROR_CHECK(esp_event_handler_register(IP_EVENT, IP_EVENT_STA_GOT_IP, &ip_event_handler, NULL));
|
||||
ESP_ERROR_CHECK(esp_wifi_set_storage(WIFI_STORAGE_FLASH));
|
||||
ESP_ERROR_CHECK(esp_wifi_start());
|
||||
|
||||
/* mesh initialization */
|
||||
ESP_ERROR_CHECK(esp_mesh_init());
|
||||
ESP_ERROR_CHECK(esp_event_handler_register(MESH_EVENT, ESP_EVENT_ANY_ID, &mesh_event_handler, NULL));
|
||||
|
||||
/* set mesh topology */
|
||||
ESP_ERROR_CHECK(esp_mesh_set_topology(CONFIG_MESH_TOPOLOGY));
|
||||
|
||||
/* set mesh max layer according to the topology */
|
||||
ESP_ERROR_CHECK(esp_mesh_set_max_layer(CONFIG_MESH_MAX_LAYER));
|
||||
ESP_ERROR_CHECK(esp_mesh_set_vote_percentage(1));
|
||||
ESP_ERROR_CHECK(esp_mesh_set_xon_qsize(128));
|
||||
|
||||
/* Disable mesh PS function */
|
||||
ESP_ERROR_CHECK(esp_mesh_disable_ps());
|
||||
ESP_ERROR_CHECK(esp_mesh_set_ap_assoc_expire(10));
|
||||
|
||||
mesh_cfg_t cfg = MESH_INIT_CONFIG_DEFAULT();
|
||||
|
||||
/* mesh ID */
|
||||
memcpy((uint8_t *) &cfg.mesh_id, MESH_ID, 6);
|
||||
|
||||
/* router */
|
||||
cfg.channel = CONFIG_MESH_CHANNEL;
|
||||
cfg.router.ssid_len = strlen(CONFIG_MESH_ROUTER_SSID);
|
||||
memcpy((uint8_t *) &cfg.router.ssid, CONFIG_MESH_ROUTER_SSID, cfg.router.ssid_len);
|
||||
memcpy((uint8_t *) &cfg.router.password, CONFIG_MESH_ROUTER_PASSWD,
|
||||
strlen(CONFIG_MESH_ROUTER_PASSWD));
|
||||
|
||||
/* mesh softAP */
|
||||
ESP_ERROR_CHECK(esp_mesh_set_ap_authmode(CONFIG_MESH_AP_AUTHMODE));
|
||||
cfg.mesh_ap.max_connection = CONFIG_MESH_AP_CONNECTIONS;
|
||||
memcpy((uint8_t *) &cfg.mesh_ap.password, CONFIG_MESH_AP_PASSWD,
|
||||
strlen(CONFIG_MESH_AP_PASSWD));
|
||||
ESP_ERROR_CHECK(esp_mesh_set_config(&cfg));
|
||||
|
||||
ESP_ERROR_CHECK(esp_base_mac_addr_get(ownMAC));
|
||||
|
||||
ESP_LOGI(MESH_TAG, "Own MAC: \"0x%x, 0x%x, 0x%x, 0x%x, 0x%x, 0x%x\" ", ownMAC[0], ownMAC[1], ownMAC[2], ownMAC[3], ownMAC[4], ownMAC[5]);
|
||||
|
||||
/* mesh start */
|
||||
ESP_ERROR_CHECK(esp_mesh_start());
|
||||
|
||||
ESP_LOGI(MESH_TAG, "mesh starts successfully, heap:%d, %s<%d>%s, ps:%d\n", esp_get_minimum_free_heap_size(),
|
||||
esp_mesh_is_root_fixed() ? "root fixed" : "root not fixed",
|
||||
esp_mesh_get_topology(), esp_mesh_get_topology() ? "(chain)":"(tree)", esp_mesh_is_ps_enabled());
|
||||
|
||||
for(;;)
|
||||
{
|
||||
if(gpio_get_level(0) == 0){
|
||||
break;
|
||||
}
|
||||
vTaskDelay(1000 / portTICK_PERIOD_MS);
|
||||
}
|
||||
xTaskCreate(&test, "test_task", 8192, NULL, 5, NULL);
|
||||
}
|
||||
|
||||
|
34
sdkconfig
34
sdkconfig
@ -150,6 +150,7 @@ CONFIG_MESH_PS_NETWORK_DUTY_APPLIED_ENTIRE=y
|
||||
CONFIG_MESH_PS_NWK_DUTY_RULE=0
|
||||
CONFIG_MESH_MAX_LAYER=6
|
||||
CONFIG_MESH_CHANNEL=13
|
||||
CONFIG_MESH_ID="00, 00, 00, 00, 00, 00"
|
||||
CONFIG_MESH_ROUTER_SSID="labNet"
|
||||
CONFIG_MESH_ROUTER_PASSWD="12345678"
|
||||
CONFIG_WIFI_AUTH_WPA2_PSK=y
|
||||
@ -158,6 +159,7 @@ CONFIG_MESH_AP_AUTHMODE=3
|
||||
CONFIG_MESH_AP_PASSWD="qaws1234"
|
||||
CONFIG_MESH_AP_CONNECTIONS=6
|
||||
CONFIG_MESH_ROUTE_TABLE_SIZE=50
|
||||
CONFIG_MESH_MESSAGE_SIZE=1234
|
||||
CONFIG_OTA_HTTPS_SERVER_COMMON_NAME="ota.hendrikschutter.com"
|
||||
CONFIG_OTA_HTTPS_SERVER_PORT="443"
|
||||
CONFIG_OTA_HTTPS_URL="https://ota.hendrikschutter.com/mesh_ota.bin"
|
||||
@ -362,6 +364,7 @@ CONFIG_ESP_CONSOLE_UART_DEFAULT=y
|
||||
# CONFIG_ESP_CONSOLE_UART_CUSTOM is not set
|
||||
# CONFIG_ESP_CONSOLE_NONE is not set
|
||||
CONFIG_ESP_CONSOLE_UART=y
|
||||
CONFIG_ESP_CONSOLE_MULTIPLE_UART=y
|
||||
CONFIG_ESP_CONSOLE_UART_NUM=0
|
||||
CONFIG_ESP_CONSOLE_UART_BAUDRATE=115200
|
||||
CONFIG_ESP_INT_WDT=y
|
||||
@ -605,7 +608,8 @@ CONFIG_FREERTOS_IDLE_TASK_STACKSIZE=2304
|
||||
CONFIG_FREERTOS_ISR_STACKSIZE=1536
|
||||
# CONFIG_FREERTOS_LEGACY_HOOKS is not set
|
||||
CONFIG_FREERTOS_MAX_TASK_NAME_LEN=16
|
||||
# CONFIG_FREERTOS_SUPPORT_STATIC_ALLOCATION is not set
|
||||
CONFIG_FREERTOS_SUPPORT_STATIC_ALLOCATION=y
|
||||
# CONFIG_FREERTOS_ENABLE_STATIC_TASK_CLEAN_UP is not set
|
||||
CONFIG_FREERTOS_TIMER_TASK_PRIORITY=1
|
||||
CONFIG_FREERTOS_TIMER_TASK_STACK_DEPTH=2048
|
||||
CONFIG_FREERTOS_TIMER_QUEUE_LENGTH=10
|
||||
@ -702,7 +706,6 @@ CONFIG_LWIP_LOOPBACK_MAX_PBUFS=8
|
||||
#
|
||||
# TCP
|
||||
#
|
||||
CONFIG_LWIP_TCP_ISN_HOOK=y
|
||||
CONFIG_LWIP_MAX_ACTIVE_TCP=16
|
||||
CONFIG_LWIP_MAX_LISTENING_TCP=16
|
||||
CONFIG_LWIP_TCP_HIGH_SPEED_RETRANSMISSION=y
|
||||
@ -730,6 +733,14 @@ CONFIG_LWIP_MAX_UDP_PCBS=16
|
||||
CONFIG_LWIP_UDP_RECVMBOX_SIZE=6
|
||||
# end of UDP
|
||||
|
||||
#
|
||||
# Checksums
|
||||
#
|
||||
# CONFIG_LWIP_CHECKSUM_CHECK_IP is not set
|
||||
# CONFIG_LWIP_CHECKSUM_CHECK_UDP is not set
|
||||
CONFIG_LWIP_CHECKSUM_CHECK_ICMP=y
|
||||
# end of Checksums
|
||||
|
||||
CONFIG_LWIP_TCPIP_TASK_STACK_SIZE=3072
|
||||
CONFIG_LWIP_TCPIP_TASK_AFFINITY_NO_AFFINITY=y
|
||||
# CONFIG_LWIP_TCPIP_TASK_AFFINITY_CPU0 is not set
|
||||
@ -762,6 +773,20 @@ CONFIG_LWIP_SNTP_UPDATE_DELAY=3600000
|
||||
|
||||
CONFIG_LWIP_ESP_LWIP_ASSERT=y
|
||||
|
||||
#
|
||||
# Hooks
|
||||
#
|
||||
# CONFIG_LWIP_HOOK_TCP_ISN_NONE is not set
|
||||
CONFIG_LWIP_HOOK_TCP_ISN_DEFAULT=y
|
||||
# CONFIG_LWIP_HOOK_TCP_ISN_CUSTOM is not set
|
||||
CONFIG_LWIP_HOOK_IP6_ROUTE_NONE=y
|
||||
# CONFIG_LWIP_HOOK_IP6_ROUTE_DEFAULT is not set
|
||||
# CONFIG_LWIP_HOOK_IP6_ROUTE_CUSTOM is not set
|
||||
CONFIG_LWIP_HOOK_NETCONN_EXT_RESOLVE_NONE=y
|
||||
# CONFIG_LWIP_HOOK_NETCONN_EXT_RESOLVE_DEFAULT is not set
|
||||
# CONFIG_LWIP_HOOK_NETCONN_EXT_RESOLVE_CUSTOM is not set
|
||||
# end of Hooks
|
||||
|
||||
#
|
||||
# Debug
|
||||
#
|
||||
@ -772,8 +797,10 @@ CONFIG_LWIP_ESP_LWIP_ASSERT=y
|
||||
# CONFIG_LWIP_SOCKETS_DEBUG is not set
|
||||
# CONFIG_LWIP_IP_DEBUG is not set
|
||||
# CONFIG_LWIP_ICMP_DEBUG is not set
|
||||
# CONFIG_LWIP_DHCP_DEBUG is not set
|
||||
# CONFIG_LWIP_IP6_DEBUG is not set
|
||||
# CONFIG_LWIP_ICMP6_DEBUG is not set
|
||||
# CONFIG_LWIP_TCP_DEBUG is not set
|
||||
# end of Debug
|
||||
# end of LWIP
|
||||
|
||||
@ -1082,6 +1109,7 @@ CONFIG_WPA_MBEDTLS_CRYPTO=y
|
||||
# CONFIG_WPA_DEBUG_PRINT is not set
|
||||
# CONFIG_WPA_TESTING_OPTIONS is not set
|
||||
# CONFIG_WPA_WPS_WARS is not set
|
||||
# CONFIG_WPA_11KV_SUPPORT is not set
|
||||
# end of Supplicant
|
||||
# end of Component config
|
||||
|
||||
@ -1204,7 +1232,7 @@ CONFIG_MB_EVENT_QUEUE_TIMEOUT=20
|
||||
CONFIG_MB_TIMER_PORT_ENABLED=y
|
||||
CONFIG_MB_TIMER_GROUP=0
|
||||
CONFIG_MB_TIMER_INDEX=0
|
||||
# CONFIG_SUPPORT_STATIC_ALLOCATION is not set
|
||||
# CONFIG_ENABLE_STATIC_TASK_CLEAN_UP_HOOK is not set
|
||||
CONFIG_TIMER_TASK_PRIORITY=1
|
||||
CONFIG_TIMER_TASK_STACK_DEPTH=2048
|
||||
CONFIG_TIMER_QUEUE_LENGTH=10
|
||||
|
15
style_code.sh
Normal file
15
style_code.sh
Normal file
@ -0,0 +1,15 @@
|
||||
#! /bin/bash
|
||||
|
||||
cd main
|
||||
astyle --style=gnu *.c
|
||||
astyle --style=gnu *.h
|
||||
|
||||
cd ..
|
||||
|
||||
cd components/mesh_ota
|
||||
astyle --style=gnu *.c
|
||||
cd include
|
||||
astyle --style=gnu *.h
|
||||
|
||||
|
||||
|
@ -321,6 +321,7 @@ CONFIG_ESP_CONSOLE_UART_DEFAULT=y
|
||||
# CONFIG_ESP_CONSOLE_UART_CUSTOM is not set
|
||||
# CONFIG_ESP_CONSOLE_NONE is not set
|
||||
CONFIG_ESP_CONSOLE_UART=y
|
||||
CONFIG_ESP_CONSOLE_MULTIPLE_UART=y
|
||||
CONFIG_ESP_CONSOLE_UART_NUM=0
|
||||
CONFIG_ESP_CONSOLE_UART_BAUDRATE=115200
|
||||
CONFIG_ESP_INT_WDT=y
|
||||
@ -560,7 +561,8 @@ CONFIG_FREERTOS_IDLE_TASK_STACKSIZE=2304
|
||||
CONFIG_FREERTOS_ISR_STACKSIZE=1536
|
||||
# CONFIG_FREERTOS_LEGACY_HOOKS is not set
|
||||
CONFIG_FREERTOS_MAX_TASK_NAME_LEN=16
|
||||
# CONFIG_FREERTOS_SUPPORT_STATIC_ALLOCATION is not set
|
||||
CONFIG_FREERTOS_SUPPORT_STATIC_ALLOCATION=y
|
||||
# CONFIG_FREERTOS_ENABLE_STATIC_TASK_CLEAN_UP is not set
|
||||
CONFIG_FREERTOS_TIMER_TASK_PRIORITY=1
|
||||
CONFIG_FREERTOS_TIMER_TASK_STACK_DEPTH=2048
|
||||
CONFIG_FREERTOS_TIMER_QUEUE_LENGTH=10
|
||||
@ -657,7 +659,6 @@ CONFIG_LWIP_LOOPBACK_MAX_PBUFS=8
|
||||
#
|
||||
# TCP
|
||||
#
|
||||
CONFIG_LWIP_TCP_ISN_HOOK=y
|
||||
CONFIG_LWIP_MAX_ACTIVE_TCP=16
|
||||
CONFIG_LWIP_MAX_LISTENING_TCP=16
|
||||
CONFIG_LWIP_TCP_HIGH_SPEED_RETRANSMISSION=y
|
||||
@ -685,6 +686,14 @@ CONFIG_LWIP_MAX_UDP_PCBS=16
|
||||
CONFIG_LWIP_UDP_RECVMBOX_SIZE=6
|
||||
# end of UDP
|
||||
|
||||
#
|
||||
# Checksums
|
||||
#
|
||||
# CONFIG_LWIP_CHECKSUM_CHECK_IP is not set
|
||||
# CONFIG_LWIP_CHECKSUM_CHECK_UDP is not set
|
||||
CONFIG_LWIP_CHECKSUM_CHECK_ICMP=y
|
||||
# end of Checksums
|
||||
|
||||
CONFIG_LWIP_TCPIP_TASK_STACK_SIZE=3072
|
||||
CONFIG_LWIP_TCPIP_TASK_AFFINITY_NO_AFFINITY=y
|
||||
# CONFIG_LWIP_TCPIP_TASK_AFFINITY_CPU0 is not set
|
||||
@ -717,6 +726,20 @@ CONFIG_LWIP_SNTP_UPDATE_DELAY=3600000
|
||||
|
||||
CONFIG_LWIP_ESP_LWIP_ASSERT=y
|
||||
|
||||
#
|
||||
# Hooks
|
||||
#
|
||||
# CONFIG_LWIP_HOOK_TCP_ISN_NONE is not set
|
||||
CONFIG_LWIP_HOOK_TCP_ISN_DEFAULT=y
|
||||
# CONFIG_LWIP_HOOK_TCP_ISN_CUSTOM is not set
|
||||
CONFIG_LWIP_HOOK_IP6_ROUTE_NONE=y
|
||||
# CONFIG_LWIP_HOOK_IP6_ROUTE_DEFAULT is not set
|
||||
# CONFIG_LWIP_HOOK_IP6_ROUTE_CUSTOM is not set
|
||||
CONFIG_LWIP_HOOK_NETCONN_EXT_RESOLVE_NONE=y
|
||||
# CONFIG_LWIP_HOOK_NETCONN_EXT_RESOLVE_DEFAULT is not set
|
||||
# CONFIG_LWIP_HOOK_NETCONN_EXT_RESOLVE_CUSTOM is not set
|
||||
# end of Hooks
|
||||
|
||||
#
|
||||
# Debug
|
||||
#
|
||||
@ -727,8 +750,10 @@ CONFIG_LWIP_ESP_LWIP_ASSERT=y
|
||||
# CONFIG_LWIP_SOCKETS_DEBUG is not set
|
||||
# CONFIG_LWIP_IP_DEBUG is not set
|
||||
# CONFIG_LWIP_ICMP_DEBUG is not set
|
||||
# CONFIG_LWIP_DHCP_DEBUG is not set
|
||||
# CONFIG_LWIP_IP6_DEBUG is not set
|
||||
# CONFIG_LWIP_ICMP6_DEBUG is not set
|
||||
# CONFIG_LWIP_TCP_DEBUG is not set
|
||||
# end of Debug
|
||||
# end of LWIP
|
||||
|
||||
@ -1037,6 +1062,7 @@ CONFIG_WPA_MBEDTLS_CRYPTO=y
|
||||
# CONFIG_WPA_DEBUG_PRINT is not set
|
||||
# CONFIG_WPA_TESTING_OPTIONS is not set
|
||||
# CONFIG_WPA_WPS_WARS is not set
|
||||
# CONFIG_WPA_11KV_SUPPORT is not set
|
||||
# end of Supplicant
|
||||
# end of Component config
|
||||
|
||||
@ -1155,7 +1181,7 @@ CONFIG_MB_EVENT_QUEUE_TIMEOUT=20
|
||||
CONFIG_MB_TIMER_PORT_ENABLED=y
|
||||
CONFIG_MB_TIMER_GROUP=0
|
||||
CONFIG_MB_TIMER_INDEX=0
|
||||
# CONFIG_SUPPORT_STATIC_ALLOCATION is not set
|
||||
# CONFIG_ENABLE_STATIC_TASK_CLEAN_UP_HOOK is not set
|
||||
CONFIG_TIMER_TASK_PRIORITY=1
|
||||
CONFIG_TIMER_TASK_STACK_DEPTH=2048
|
||||
CONFIG_TIMER_QUEUE_LENGTH=10
|
||||
|
Reference in New Issue
Block a user