Skip to content

Latest commit

 

History

History
40 lines (37 loc) · 1.32 KB

deploy.md

File metadata and controls

40 lines (37 loc) · 1.32 KB

Instructions for end users: TBD

#Instructions if you own the private key:

cd ota/src

#initial steps to be expanded

mkdir ../certificates/0.2.4v cp ../certificates/certs.sector* ../certificates/0.2.4v #set local.mk to the ota-main program make -j6 rebuild OTAVERSION=0.2.4 mv firmware/otamain.bin ../certificates/0.2.4v #set local.mk back to ota-boot program make -j6 rebuild OTAVERSION=0.2.4 cp firmware/otaboot.bin ../certificates/0.2.4v #commit this as version 0.2.4 #set up a new github release 0.2.4 as a pre-release using the just commited master...

#erase the flash and upload the ota-boot program to the device that contains the private key

esptool.py -p /dev/cu.usbserial-* --baud 230400 erase_flash 
make flash OTAVERSION=0.2.4

#run the code to change the sysparam area already #upload the privatekey

esptool.py -p /dev/cu.usbserial-* --baud 230400 write_flash 0xfa000 privatekey.der

#power cycle to prevent the bug for software reset after flash #create the 3 signature files next to the bin file and upload to github one by one #verify the hashes on the computer openssl sha384 ../certificates/otamain.bin xxd ../certificates/otamain.bin.sig #make the release a production release on github #remove the private key

esptool.py -p /dev/cu.usbserial-* --baud 230400 write_flash 0xf5000 ../certificates/blank.bin