ESP-IDF ESP-32 HTTP/HTTPS OTA(Over The Air) Firmware Update

Поделиться
HTML-код
  • Опубликовано: 22 янв 2022
  • ESP-IDF ESP-32 Http OTA update, Complete understanding of OTA code and partition table for OTA.
    All issues related to partition table and version number explained.

Комментарии • 34

  • @jamesdulangon1265
    @jamesdulangon1265 2 года назад

    Keep making these videos bro!

  • @vpsr-014
    @vpsr-014 Год назад +1

    Good info, can you please make a video "ESP-IDF ESP-32 AWS+MQTT+OTA" .

  • @hanumantgaikwad6046
    @hanumantgaikwad6046 3 месяца назад

    Great videos. Can please make video on Esp idf + mqtt+gsm 4g +ota

  • @user-qj1jx6wi4l
    @user-qj1jx6wi4l 3 месяца назад +1

    hi. can you explain that server certificate part?

  • @YousufAlam-jx4qd
    @YousufAlam-jx4qd 11 месяцев назад

    Sir, Can I used wing ftp server to perform ota ?

  • @houngguy1
    @houngguy1 2 года назад +1

    This video was very helpful to me. But I have one question.
    When I run openssl on the Linux server, the code runs normally.
    However, when accessing the target binary with openssl on Windows, the following error occurs.
    E (7043) esp_image: invalid segment length 0x21a24147
    E (7043) advanced_https_ota_example: Image validation failed, image is corrupted
    E (7043) advanced_https_ota_example: ESP_HTTPS_OTA upgrade failed 0x1503
    Can you tell me under what circumstances this would cause a problem like this?
    Thank you so much again...

    • @KK-ib5nh
      @KK-ib5nh Год назад

      Hey did you got any solution?

    • @andresolivatrevisan1322
      @andresolivatrevisan1322 5 месяцев назад

      Create a python script inside \server_certs folder as server.py and run it using python (to do so, navigate with ESP IDF command to server_certs folder and write: python server.py)
      import http.server
      import ssl
      import argparse
      import os
      import socket
      import certifi
      parser = argparse.ArgumentParser()
      parser.add_argument('-p', '--port', dest='port', type= int,
      help= "Server Port", default= 8070)
      args = parser.parse_args()
      httpd = http.server.HTTPServer(('', args.port),
      http.server.SimpleHTTPRequestHandler)
      httpd.socket = ssl.wrap_socket (httpd.socket,
      keyfile= "ca_key.pem",
      certfile= "ca_cert.pem", server_side=True);
      print("Http server is on your computer IP, over port ", args.port);
      httpd.serve_forever();@@KK-ib5nh

  • @PDAControl
    @PDAControl Год назад

    Initially, thanks for this tutorial, I consult you, as I have seen you can update ota from AWS, but in my case I want to use my hosting with web domain and host my .bin in my hosting, something like doing ota over the Internet, the truth is not It has worked for me, you have some advice or suggestion, thank you !!!

    • @embeddedhacks
      @embeddedhacks  Год назад

      If you could mail me hosted .bin file path at embeddedhacks24@gmail.com.
      Check if you have given read write permission to the host file.

  • @user-qj1jx6wi4l
    @user-qj1jx6wi4l 4 месяца назад

    hi, i tried this using esp32 s3. in there can I use ap mode of same esp32 . if tht so what will be my url? can you help me to solve this conflict?

  • @mtraven23
    @mtraven23 3 месяца назад +1

    your tutorial helped me understand a lot more, but it didn't go into how the sever gets set up. In fact, every tutorial I have found just skips this as if there is nothing to it. Anyways, how do you setup (and start) the server to host the file on your local network (not interest in web based servers)

    • @Pzapza
      @Pzapza 17 дней назад

      exactly! No one talks about that. Did you find any good resource?

  • @nishchithshetty1259
    @nishchithshetty1259 Год назад

    which url your using? because i dont have any servers and certificates please give suggetion

    • @embeddedhacks
      @embeddedhacks  Год назад

      You can search how to upload a file on aws s3

  • @KK-ib5nh
    @KK-ib5nh Год назад

    I am using esp idf simple_ota example but i facing this error how to solve it any idea
    E (7301) esp_ota_ops: OTA image has invalid magic byte (expected 0xE9, saw 0x7b) E (7301) esp_https_ota: Error: esp_ota_write failed! err=0x1503 E (7311) simple_ota_example: Firmware upgrade failed

  • @kaninnovations_apk9453
    @kaninnovations_apk9453 2 года назад

    sir need your help with esp32s3 jtag communication. Can you please make a video on it?

  • @Sandipmaurya001
    @Sandipmaurya001 Год назад +1

    can you make video on server part? like how to make server and how to update binary by server

    • @embeddedhacks
      @embeddedhacks  Год назад

      Do you mean to say esp32 as a server?

    • @Sandipmaurya001
      @Sandipmaurya001 Год назад

      @@embeddedhacks yeah

    • @embeddedhacks
      @embeddedhacks  Год назад

      You can mail me on embeddedhacks24@gmail.com on what exactly you want to achieve using esp32 as a server.

    • @Bhargavi_vlogs996
      @Bhargavi_vlogs996 4 месяца назад

      Hi bro have u done this​@@Sandipmaurya001

  • @habib7240
    @habib7240 2 года назад

    Please post how to write own project code video..

    • @embeddedhacks
      @embeddedhacks  2 года назад

      Just see this video to get complete idea to build a project from scratch www.youtube.com/watch?v=COB_vB%20tTdiY&t=24s

    • @habib7240
      @habib7240 2 года назад

      @@embeddedhacks but... This video unavailable

    • @embeddedhacks
      @embeddedhacks  2 года назад

      checkout this link ruclips.net/video/COB_vBtTdiY/видео.html

    • @habib7240
      @habib7240 2 года назад

      @@embeddedhacks thankyou
      Please post more esp32 videos

  • @rameshsaud7513
    @rameshsaud7513 2 года назад

    sir new videos please

    • @embeddedhacks
      @embeddedhacks  2 года назад +1

      share the topics you want to learn

    • @rameshsaud7513
      @rameshsaud7513 2 года назад

      It would be grate if you make a series on explanation on every libraries and their functions. Basically basic building blocks.

  • @user-nv1bk2iu5v
    @user-nv1bk2iu5v Год назад

    Hello, I run an NGINX HTTPS service on Alibaba Cloud, and now the debugging LOG is like this, I feels like the server configuration is wrong, can you help me analyze it?
    D (19913) HTTP_CLIENT: on_message_begin
    D (19913) HTTP_CLIENT: HEADER=Server:nginx/1.17.10
    D (19913) HTTP_CLIENT: HEADER=Date:Wed, 21 Dec 2022 15:29:40 GMT
    D (19913) HTTP_CLIENT: HEADER=Content-Type:application/octet-stream
    D (19923) HTTP_CLIENT: HEADER=Content-Length:995664
    D (19923) HTTP_CLIENT: HEADER=Last-Modified:Wed, 21 Dec 2022 13:59:27 GMT
    D (19933) HTTP_CLIENT: HEADER=Connection:keep-alive
    D (19933) HTTP_CLIENT: HEADER=ETag:"63a3113f-f3150"
    D (19943) HTTP_CLIENT: HEADER=Accept-Ranges:bytes
    D (19943) HTTP_CLIENT: http_on_headers_complete, status=200, offset=259, nread=259
    D (19953) HTTP_CLIENT: http_on_body 253
    I (19953) HTTP_CLIENT: Body received in fetch header state, 0x3ffb9807, 253
    D (19963) HTTP_CLIENT: content_length = 995664
    I (19973) esp_https_ota: Starting OTA...
    I (19973) esp_https_ota: Writing to partition subtype 17 at offset 0x220000
    D (19983) esp_https_ota: ota_upgrade_buf_size:289 bulk_flash_erase:0
    D (19993) HTTP_CLIENT: Data processed 253 != Data specified in content length 995664
    D (19993) HTTP_CLIENT: enter_esp_http_client_read
    D (20003) HTTP_CLIENT: is_data_remain=1, is_chunked=0, content_length=995664
    D (20013) TRANSPORT_BASE: remain data in cache, need to read again
    D (20013) HTTP_CLIENT: need_read=36, byte_to_read=36, rlen=36, ridx=253
    D (20023) HTTP_CLIENT: http_on_body 36
    I (20023) advanced_https_ota_example: Running firmware version: 1
    E (20033) esp_https_ota: erase_size:FFFFFFFE
    Guru Meditation Error: Core 1 panic'ed (Cache disabled but cached memory region accessed).
    Core 1 register dump:
    PC : 0x40160648 PS : 0x00060f34 A0 : 0x800847dd A1 : 0x3ffc7ec0
    A2 : 0x00000003 A3 : 0x3f40a420 A4 : 0x3f40a170 A5 : 0x00004e41
    A6 : 0x3f40a420 A7 : 0x40404040 A8 : 0x8008dc08 A9 : 0x3ffc7ed0
    A10 : 0x00000003 A11 : 0x3f40a420 A12 : 0x3f40a170 A13 : 0x3ffc7ef0
    A14 : 0x3ffc7ed0 A15 : 0x0000000c SAR : 0x00000020 EXCCAUSE: 0x00000007
    EXCVADDR: 0x00000000 LBEG : 0x4000c2e0 LEND : 0x4000c2f6 LCOUNT : 0xffffffff
    Backtrace:0x40160645:0x3ffc7ec00x400847da:0x3ffc7f10 0x400da57f:0x3ffc7f60 0x400d9255:0x3ffc7f80 0x400f91df:0x3ffc7fa0 0x400f969d:0x3ffc7fc0 0x400d6d50:0x3ffc8000 0x4008b7fd:0x3ffc81c0

    • @embeddedhacks
      @embeddedhacks  Год назад

      Can you share your code on embeddedhacks24@gmail.com