ESP-IDF ESP-32 Http OTA update, Complete understanding of OTA code and partition table for OTA. All issues related to partition table and version number explained.
your tutorial helped me understand a lot more, but it didn't go into how the sever gets set up. In fact, every tutorial I have found just skips this as if there is nothing to it. Anyways, how do you setup (and start) the server to host the file on your local network (not interest in web based servers)
Initially, thanks for this tutorial, I consult you, as I have seen you can update ota from AWS, but in my case I want to use my hosting with web domain and host my .bin in my hosting, something like doing ota over the Internet, the truth is not It has worked for me, you have some advice or suggestion, thank you !!!
This video was very helpful to me. But I have one question. When I run openssl on the Linux server, the code runs normally. However, when accessing the target binary with openssl on Windows, the following error occurs. E (7043) esp_image: invalid segment length 0x21a24147 E (7043) advanced_https_ota_example: Image validation failed, image is corrupted E (7043) advanced_https_ota_example: ESP_HTTPS_OTA upgrade failed 0x1503 Can you tell me under what circumstances this would cause a problem like this? Thank you so much again...
Create a python script inside \server_certs folder as server.py and run it using python (to do so, navigate with ESP IDF command to server_certs folder and write: python server.py) import http.server import ssl import argparse import os import socket import certifi parser = argparse.ArgumentParser() parser.add_argument('-p', '--port', dest='port', type= int, help= "Server Port", default= 8070) args = parser.parse_args() httpd = http.server.HTTPServer(('', args.port), http.server.SimpleHTTPRequestHandler) httpd.socket = ssl.wrap_socket (httpd.socket, keyfile= "ca_key.pem", certfile= "ca_cert.pem", server_side=True); print("Http server is on your computer IP, over port ", args.port); httpd.serve_forever();@@KK-ib5nh
I am using esp idf simple_ota example but i facing this error how to solve it any idea E (7301) esp_ota_ops: OTA image has invalid magic byte (expected 0xE9, saw 0x7b) E (7301) esp_https_ota: Error: esp_ota_write failed! err=0x1503 E (7311) simple_ota_example: Firmware upgrade failed
Hello, I run an NGINX HTTPS service on Alibaba Cloud, and now the debugging LOG is like this, I feels like the server configuration is wrong, can you help me analyze it? D (19913) HTTP_CLIENT: on_message_begin D (19913) HTTP_CLIENT: HEADER=Server:nginx/1.17.10 D (19913) HTTP_CLIENT: HEADER=Date:Wed, 21 Dec 2022 15:29:40 GMT D (19913) HTTP_CLIENT: HEADER=Content-Type:application/octet-stream D (19923) HTTP_CLIENT: HEADER=Content-Length:995664 D (19923) HTTP_CLIENT: HEADER=Last-Modified:Wed, 21 Dec 2022 13:59:27 GMT D (19933) HTTP_CLIENT: HEADER=Connection:keep-alive D (19933) HTTP_CLIENT: HEADER=ETag:"63a3113f-f3150" D (19943) HTTP_CLIENT: HEADER=Accept-Ranges:bytes D (19943) HTTP_CLIENT: http_on_headers_complete, status=200, offset=259, nread=259 D (19953) HTTP_CLIENT: http_on_body 253 I (19953) HTTP_CLIENT: Body received in fetch header state, 0x3ffb9807, 253 D (19963) HTTP_CLIENT: content_length = 995664 I (19973) esp_https_ota: Starting OTA... I (19973) esp_https_ota: Writing to partition subtype 17 at offset 0x220000 D (19983) esp_https_ota: ota_upgrade_buf_size:289 bulk_flash_erase:0 D (19993) HTTP_CLIENT: Data processed 253 != Data specified in content length 995664 D (19993) HTTP_CLIENT: enter_esp_http_client_read D (20003) HTTP_CLIENT: is_data_remain=1, is_chunked=0, content_length=995664 D (20013) TRANSPORT_BASE: remain data in cache, need to read again D (20013) HTTP_CLIENT: need_read=36, byte_to_read=36, rlen=36, ridx=253 D (20023) HTTP_CLIENT: http_on_body 36 I (20023) advanced_https_ota_example: Running firmware version: 1 E (20033) esp_https_ota: erase_size:FFFFFFFE Guru Meditation Error: Core 1 panic'ed (Cache disabled but cached memory region accessed). Core 1 register dump: PC : 0x40160648 PS : 0x00060f34 A0 : 0x800847dd A1 : 0x3ffc7ec0 A2 : 0x00000003 A3 : 0x3f40a420 A4 : 0x3f40a170 A5 : 0x00004e41 A6 : 0x3f40a420 A7 : 0x40404040 A8 : 0x8008dc08 A9 : 0x3ffc7ed0 A10 : 0x00000003 A11 : 0x3f40a420 A12 : 0x3f40a170 A13 : 0x3ffc7ef0 A14 : 0x3ffc7ed0 A15 : 0x0000000c SAR : 0x00000020 EXCCAUSE: 0x00000007 EXCVADDR: 0x00000000 LBEG : 0x4000c2e0 LEND : 0x4000c2f6 LCOUNT : 0xffffffff Backtrace:0x40160645:0x3ffc7ec00x400847da:0x3ffc7f10 0x400da57f:0x3ffc7f60 0x400d9255:0x3ffc7f80 0x400f91df:0x3ffc7fa0 0x400f969d:0x3ffc7fc0 0x400d6d50:0x3ffc8000 0x4008b7fd:0x3ffc81c0