ESP-IDF ESP-32 HTTP/HTTPS OTA(Over The Air) Firmware Update

Поділитися
Вставка
  • Опубліковано 8 вер 2024
  • ESP-IDF ESP-32 Http OTA update, Complete understanding of OTA code and partition table for OTA.
    All issues related to partition table and version number explained.

КОМЕНТАРІ • 34

  • @hanumantgaikwad6046
    @hanumantgaikwad6046 5 місяців тому

    Great videos. Can please make video on Esp idf + mqtt+gsm 4g +ota

  • @vpsr-014
    @vpsr-014 Рік тому +1

    Good info, can you please make a video "ESP-IDF ESP-32 AWS+MQTT+OTA" .

  • @jamesdulangon1265
    @jamesdulangon1265 2 роки тому

    Keep making these videos bro!

  • @mtraven23
    @mtraven23 5 місяців тому +1

    your tutorial helped me understand a lot more, but it didn't go into how the sever gets set up. In fact, every tutorial I have found just skips this as if there is nothing to it. Anyways, how do you setup (and start) the server to host the file on your local network (not interest in web based servers)

    • @Pzapza
      @Pzapza 2 місяці тому

      exactly! No one talks about that. Did you find any good resource?

  • @user-qj1jx6wi4l
    @user-qj1jx6wi4l 5 місяців тому +1

    hi. can you explain that server certificate part?

  • @PDAControl
    @PDAControl Рік тому

    Initially, thanks for this tutorial, I consult you, as I have seen you can update ota from AWS, but in my case I want to use my hosting with web domain and host my .bin in my hosting, something like doing ota over the Internet, the truth is not It has worked for me, you have some advice or suggestion, thank you !!!

    • @embeddedhacks
      @embeddedhacks  Рік тому

      If you could mail me hosted .bin file path at embeddedhacks24@gmail.com.
      Check if you have given read write permission to the host file.

  • @user-qj1jx6wi4l
    @user-qj1jx6wi4l 6 місяців тому

    hi, i tried this using esp32 s3. in there can I use ap mode of same esp32 . if tht so what will be my url? can you help me to solve this conflict?

  • @houngguy1
    @houngguy1 2 роки тому +1

    This video was very helpful to me. But I have one question.
    When I run openssl on the Linux server, the code runs normally.
    However, when accessing the target binary with openssl on Windows, the following error occurs.
    E (7043) esp_image: invalid segment length 0x21a24147
    E (7043) advanced_https_ota_example: Image validation failed, image is corrupted
    E (7043) advanced_https_ota_example: ESP_HTTPS_OTA upgrade failed 0x1503
    Can you tell me under what circumstances this would cause a problem like this?
    Thank you so much again...

    • @KK-ib5nh
      @KK-ib5nh Рік тому

      Hey did you got any solution?

    • @andresolivatrevisan1322
      @andresolivatrevisan1322 7 місяців тому

      Create a python script inside \server_certs folder as server.py and run it using python (to do so, navigate with ESP IDF command to server_certs folder and write: python server.py)
      import http.server
      import ssl
      import argparse
      import os
      import socket
      import certifi
      parser = argparse.ArgumentParser()
      parser.add_argument('-p', '--port', dest='port', type= int,
      help= "Server Port", default= 8070)
      args = parser.parse_args()
      httpd = http.server.HTTPServer(('', args.port),
      http.server.SimpleHTTPRequestHandler)
      httpd.socket = ssl.wrap_socket (httpd.socket,
      keyfile= "ca_key.pem",
      certfile= "ca_cert.pem", server_side=True);
      print("Http server is on your computer IP, over port ", args.port);
      httpd.serve_forever();@@KK-ib5nh

  • @Sandipmaurya001
    @Sandipmaurya001 Рік тому +1

    can you make video on server part? like how to make server and how to update binary by server

    • @embeddedhacks
      @embeddedhacks  Рік тому

      Do you mean to say esp32 as a server?

    • @Sandipmaurya001
      @Sandipmaurya001 Рік тому

      @@embeddedhacks yeah

    • @embeddedhacks
      @embeddedhacks  Рік тому

      You can mail me on embeddedhacks24@gmail.com on what exactly you want to achieve using esp32 as a server.

    • @Bhargavi_vlogs996
      @Bhargavi_vlogs996 5 місяців тому

      Hi bro have u done this​@@Sandipmaurya001

  • @YousufAlam-jx4qd
    @YousufAlam-jx4qd Рік тому

    Sir, Can I used wing ftp server to perform ota ?

  • @KK-ib5nh
    @KK-ib5nh Рік тому

    I am using esp idf simple_ota example but i facing this error how to solve it any idea
    E (7301) esp_ota_ops: OTA image has invalid magic byte (expected 0xE9, saw 0x7b) E (7301) esp_https_ota: Error: esp_ota_write failed! err=0x1503 E (7311) simple_ota_example: Firmware upgrade failed

  • @nishchithshetty1259
    @nishchithshetty1259 Рік тому

    which url your using? because i dont have any servers and certificates please give suggetion

    • @embeddedhacks
      @embeddedhacks  Рік тому

      You can search how to upload a file on aws s3

  • @kaninnovations_apk9453
    @kaninnovations_apk9453 2 роки тому

    sir need your help with esp32s3 jtag communication. Can you please make a video on it?

  • @habib7240
    @habib7240 2 роки тому

    Please post how to write own project code video..

    • @embeddedhacks
      @embeddedhacks  2 роки тому

      Just see this video to get complete idea to build a project from scratch www.youtube.com/watch?v=COB_vB%20tTdiY&t=24s

    • @habib7240
      @habib7240 2 роки тому

      @@embeddedhacks but... This video unavailable

    • @embeddedhacks
      @embeddedhacks  2 роки тому

      checkout this link ua-cam.com/video/COB_vBtTdiY/v-deo.html

    • @habib7240
      @habib7240 2 роки тому

      @@embeddedhacks thankyou
      Please post more esp32 videos

  • @rameshsaud7513
    @rameshsaud7513 2 роки тому

    sir new videos please

    • @embeddedhacks
      @embeddedhacks  2 роки тому +1

      share the topics you want to learn

    • @rameshsaud7513
      @rameshsaud7513 2 роки тому

      It would be grate if you make a series on explanation on every libraries and their functions. Basically basic building blocks.

  • @user-nv1bk2iu5v
    @user-nv1bk2iu5v Рік тому

    Hello, I run an NGINX HTTPS service on Alibaba Cloud, and now the debugging LOG is like this, I feels like the server configuration is wrong, can you help me analyze it?
    D (19913) HTTP_CLIENT: on_message_begin
    D (19913) HTTP_CLIENT: HEADER=Server:nginx/1.17.10
    D (19913) HTTP_CLIENT: HEADER=Date:Wed, 21 Dec 2022 15:29:40 GMT
    D (19913) HTTP_CLIENT: HEADER=Content-Type:application/octet-stream
    D (19923) HTTP_CLIENT: HEADER=Content-Length:995664
    D (19923) HTTP_CLIENT: HEADER=Last-Modified:Wed, 21 Dec 2022 13:59:27 GMT
    D (19933) HTTP_CLIENT: HEADER=Connection:keep-alive
    D (19933) HTTP_CLIENT: HEADER=ETag:"63a3113f-f3150"
    D (19943) HTTP_CLIENT: HEADER=Accept-Ranges:bytes
    D (19943) HTTP_CLIENT: http_on_headers_complete, status=200, offset=259, nread=259
    D (19953) HTTP_CLIENT: http_on_body 253
    I (19953) HTTP_CLIENT: Body received in fetch header state, 0x3ffb9807, 253
    D (19963) HTTP_CLIENT: content_length = 995664
    I (19973) esp_https_ota: Starting OTA...
    I (19973) esp_https_ota: Writing to partition subtype 17 at offset 0x220000
    D (19983) esp_https_ota: ota_upgrade_buf_size:289 bulk_flash_erase:0
    D (19993) HTTP_CLIENT: Data processed 253 != Data specified in content length 995664
    D (19993) HTTP_CLIENT: enter_esp_http_client_read
    D (20003) HTTP_CLIENT: is_data_remain=1, is_chunked=0, content_length=995664
    D (20013) TRANSPORT_BASE: remain data in cache, need to read again
    D (20013) HTTP_CLIENT: need_read=36, byte_to_read=36, rlen=36, ridx=253
    D (20023) HTTP_CLIENT: http_on_body 36
    I (20023) advanced_https_ota_example: Running firmware version: 1
    E (20033) esp_https_ota: erase_size:FFFFFFFE
    Guru Meditation Error: Core 1 panic'ed (Cache disabled but cached memory region accessed).
    Core 1 register dump:
    PC : 0x40160648 PS : 0x00060f34 A0 : 0x800847dd A1 : 0x3ffc7ec0
    A2 : 0x00000003 A3 : 0x3f40a420 A4 : 0x3f40a170 A5 : 0x00004e41
    A6 : 0x3f40a420 A7 : 0x40404040 A8 : 0x8008dc08 A9 : 0x3ffc7ed0
    A10 : 0x00000003 A11 : 0x3f40a420 A12 : 0x3f40a170 A13 : 0x3ffc7ef0
    A14 : 0x3ffc7ed0 A15 : 0x0000000c SAR : 0x00000020 EXCCAUSE: 0x00000007
    EXCVADDR: 0x00000000 LBEG : 0x4000c2e0 LEND : 0x4000c2f6 LCOUNT : 0xffffffff
    Backtrace:0x40160645:0x3ffc7ec00x400847da:0x3ffc7f10 0x400da57f:0x3ffc7f60 0x400d9255:0x3ffc7f80 0x400f91df:0x3ffc7fa0 0x400f969d:0x3ffc7fc0 0x400d6d50:0x3ffc8000 0x4008b7fd:0x3ffc81c0

    • @embeddedhacks
      @embeddedhacks  Рік тому

      Can you share your code on embeddedhacks24@gmail.com