...
Table of Contents | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Ubuntu MATE 24.04 - eMMC boot
When you run '“make config' ” to configure your build environment and after selecting the board, you will be prompted to choose a boot device. Refer to the picture below and Enter “1” to select eMMC.
...
After selecting eMMC size, you will be prompted to choose a root file system. Refer to the picture below and Enter “7” to select Ubuntu MATE 24.04.1.
...
After the completion of executing “make config”, execute “make” command to build the images.
swupdate installation
After updating the images to the platform and booting the system of the platform, connect to the internet and use the following commands to install swupdate.
Code Block |
---|
sudo apt update sudo apt-get install swupdate |
Apache HTTP Server installation
Use the following command to install apache2.
Code Block |
---|
sudo apt install apache2 |
chromium installation
Use the following commands to install chromium.
Code Block |
---|
sudo add-apt-repository ppa:xtradeb/apps -y sudo apt install chromium |
Generate self-signed certificates
Use the following command to generate self-signed certificates.
...
Code Block |
---|
openssl req -x509 -newkey rsa:4096 -nodes -keyout mycert.key.pem -out mycert.cert.pem -subj "/O=SWUpdate /CN=target" -days 365 |
sw-description configuration file
The sw-description file created describes the structure and content of the software update (packed in a .swu file) and defines what actions SWUpdate should take when performing the update.
...
Code Block |
---|
sha256sum xboot.img |
Building a signed SWU image with CMS signature
There are two files, sw-description and its signature sw-description.sig. The signature file must always directly follow the description file.
...
After executing the script, sw-description.sig will be produced and the “FILES” in the script will be packed (cpio was chosen for its simplicity and because can be streamed) together to the file of update.swu.
...
HW_FILE
Create and edit a file (/etc/hwrevision) in the platform if it does not exist. The example of the contents is shown below.
...
“v1.0” is the hardware revision and it must be the same as “hardware-compatibility” in sw-description.
Update images
You The Ubuntu platform can update images (update.swu) via the command or web server.
Run SWUpdate
You can use the following command to update images for itself.
Code Block |
---|
sudo swupdate -i update.swu -k /home/sunplus/work/my_key/mycert.cert.pem -v |
...
Code Block |
---|
sunplus@ubuntu:~/work/swu_ubuntu$ sudo swupdate -i update.swu -k /home/sunplus/work/my_key/mycert.cert.pem -v [TRACE] : SWUPDATE running : [load_cert_chain] : Read PEM #1: /O=SWUpdate /CN=target /O=SWUpdate /CN=target SWUpdate v Licensed under GPLv2. See source distribution for detailed copyright notices. [TRACE] : SWUPDATE running : [print_registered_bootloaders] : Registered bootloaders: [TRACE] : SWUPDATE running : [print_registered_bootloaders] : uboot loaded. [TRACE] : SWUPDATE running : [print_registered_bootloaders] : none loaded. [TRACE] : SWUPDATE running : [print_registered_bootloaders] : grub loaded. [TRACE] : SWUPDATE running : [print_registered_bootloaders] : ebg loaded. [INFO ] : SWUPDATE running : [main] : Using default bootloader interface: none [INFO ] : SWUPDATE running : [lua_handlers_init] : External Lua handler(s) not found. [TRACE] : SWUPDATE running : [lua_report_exception] : Lua exception: [TRACE] : SWUPDATE running : [lua_report_exception] : [string "require ("swupdate_handlers")"]:1: module 'swupdate_handlers' not found: [TRACE] : SWUPDATE running : [lua_report_exception] : no field package.preload['swupdate_handlers'] [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/local/share/lua/5.4/swupdate_handlers.lua' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/local/share/lua/5.4/swupdate_handlers/init.lua' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/local/lib/lua/5.4/swupdate_handlers.lua' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/local/lib/lua/5.4/swupdate_handlers/init.lua' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/share/lua/5.4/swupdate_handlers.lua' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/share/lua/5.4/swupdate_handlers/init.lua' [TRACE] : SWUPDATE running : [lua_report_exception] : no file './swupdate_handlers.lua' [TRACE] : SWUPDATE running : [lua_report_exception] : no file './swupdate_handlers/init.lua' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/local/lib/lua/5.4/swupdate_handlers.so' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/lib/aarch64-linux-gnu/lua/5.4/swupdate_handlers.so' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/lib/lua/5.4/swupdate_handlers.so' [TRACE] : SWUPDATE running : [lua_report_exception] : no file '/usr/local/lib/lua/5.4/loadall.so' [TRACE] : SWUPDATE running : [lua_report_exception] : no file './swupdate_handlers.so' [INFO ] : SWUPDATE running : [main] : Running on SP7350 Revision v1.0 [INFO ] : SWUPDATE running : [print_registered_handlers] : Registered handlers: [INFO ] : SWUPDATE running : [print_registered_handlers] : dummy [INFO ] : SWUPDATE running : [print_registered_handlers] : archive [INFO ] : SWUPDATE running : [print_registered_handlers] : tar [INFO ] : SWUPDATE running : [print_registered_handlers] : uboot [INFO ] : SWUPDATE running : [print_registered_handlers] : bootloader [INFO ] : SWUPDATE running : [print_registered_handlers] : btrfs [INFO ] : SWUPDATE running : [print_registered_handlers] : copy [INFO ] : SWUPDATE running : [print_registered_handlers] : rawcopy [INFO ] : SWUPDATE running : [print_registered_handlers] : flash [INFO ] : SWUPDATE running : [print_registered_handlers] : delta [INFO ] : SWUPDATE running : [print_registered_handlers] : diskformat [INFO ] : SWUPDATE running : [print_registered_handlers] : diskpart [INFO ] : SWUPDATE running : [print_registered_handlers] : toggleboot [INFO ] : SWUPDATE running : [print_registered_handlers] : gptswap [INFO ] : SWUPDATE running : [print_registered_handlers] : gptpart [INFO ] : SWUPDATE running : [print_registered_handlers] : uniqueuuid [INFO ] : SWUPDATE running : [print_registered_handlers] : flash-hamming1 [INFO ] : SWUPDATE running : [print_registered_handlers] : lua [INFO ] : SWUPDATE running : [print_registered_handlers] : raw [INFO ] : SWUPDATE running : [print_registered_handlers] : rawfile [INFO ] : SWUPDATE running : [print_registered_handlers] : rdiff_image [INFO ] : SWUPDATE running : [print_registered_handlers] : rdiff_file [INFO ] : SWUPDATE running : [print_registered_handlers] : readback [INFO ] : SWUPDATE running : [print_registered_handlers] : shellscript [INFO ] : SWUPDATE running : [print_registered_handlers] : preinstall [INFO ] : SWUPDATE running : [print_registered_handlers] : postinstall [INFO ] : SWUPDATE running : [print_registered_handlers] : ssblswitch [INFO ] : SWUPDATE running : [print_registered_handlers] : swuforward [INFO ] : SWUPDATE running : [print_registered_handlers] : ubivol [INFO ] : SWUPDATE running : [print_registered_handlers] : ubipartition [INFO ] : SWUPDATE running : [print_registered_handlers] : ubiswap [INFO ] : SWUPDATE running : [print_registered_handlers] : ucfw [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_imageload [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_imagedelete [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_imageprune [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_containercreate [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_containerdelete [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_containerstart [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_networkcreate [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_networkdelete [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_volumecreate [INFO ] : SWUPDATE running : [print_registered_handlers] : docker_volumedelete [DEBUG] : SWUPDATE running : [read_module_settings] : No config settings found for module versions [TRACE] : SWUPDATE running : [listener_create] : got no socket at /tmp/swupdateprog from systemd [TRACE] : SWUPDATE running : [network_initializer] : Main loop daemon [TRACE] : SWUPDATE running : [listener_create] : creating socket at /tmp/swupdateprog [TRACE] : SWUPDATE running : [listener_create] : got no socket at /tmp/sockinstctrl from systemd [TRACE] : SWUPDATE running : [listener_create] : creating socket at /tmp/sockinstctrl [DEBUG] : SWUPDATE running : [read_module_settings] : No config settings found for module download [TRACE] : SWUPDATE running : [start_swupdate_subprocess] : Started chunks_downloader with pid 2054 and fd 8 [TRACE] : SWUPDATE running : [network_thread] : Incoming network request: processing... [INFO ] : SWUPDATE started : Software Update started ! [TRACE] : SWUPDATE running : [network_initializer] : Software update started [TRACE] : SWUPDATE running : [start_delta_downloader] : Starting Internal process for downloading chunks [WARN ] : SWUPDATE running : [scan_mtd_devices] : MTD is not present on the target [WARN ] : SWUPDATE running : [mtd_init] : MTD is not present in the system [WARN ] : SWUPDATE running : [mtd_init] : cannot open libmtd [TRACE] : SWUPDATE running : [extract_file_to_tmp] : Found file [TRACE] : SWUPDATE running : [extract_file_to_tmp] : filename sw-description [TRACE] : SWUPDATE running : [extract_file_to_tmp] : size 828 [TRACE] : SWUPDATE running : [extract_file_to_tmp] : Found file [TRACE] : SWUPDATE running : [extract_file_to_tmp] : filename sw-description.sig [TRACE] : SWUPDATE running : [extract_file_to_tmp] : size 2110 [WARN ] : SWUPDATE running : [check_signer_name] : The X.509 common name might not be equal to . [TRACE] : SWUPDATE running : [swupdate_verify_file] : Verified OK [DEBUG] : SWUPDATE running : [parse_cfg] : Parsing config file /tmp/sw-description [TRACE] : SWUPDATE running : [get_common_fields] : Version 1.0 [TRACE] : SWUPDATE running : [get_common_fields] : reboot_required 1 [TRACE] : SWUPDATE running : [parse_hw_compatibility] : Accepted Hw Revision : v1.0 [TRACE] : SWUPDATE running : [_parse_images] : Found Image: uImage in device : /dev/mmcblk0p7 for handler raw [TRACE] : SWUPDATE running : [_parse_images] : Found Image: u-boot.img in device : /dev/mmcblk0p2 for handler raw [TRACE] : SWUPDATE running : [_parse_images] : Found Image: xboot.img in device : /dev/mmcblk0boot0 for handler raw [TRACE] : SWUPDATE running : [parse] : Number of found artifacts: 3 [TRACE] : SWUPDATE running : [parse] : Number of scripts: 0 [TRACE] : SWUPDATE running : [parse] : Number of steps to be run: 3 [TRACE] : SWUPDATE running : [check_hw_compatibility] : Hardware SP7350 Revision: v1.0 [TRACE] : SWUPDATE running : [check_hw_compatibility] : Hardware compatibility verified [DEBUG] : SWUPDATE running : [preupdatecmd] : Running Pre-update command [TRACE] : SWUPDATE running : [extract_files] : Found file [TRACE] : SWUPDATE running : [extract_files] : filename xboot.img [TRACE] : SWUPDATE running : [extract_files] : size 139052 required [TRACE] : SWUPDATE running : [extract_files] : Found file [TRACE] : SWUPDATE running : [extract_files] : filename u-boot.img [TRACE] : SWUPDATE running : [extract_files] : size 937816 required [TRACE] : SWUPDATE running : [extract_files] : Found file [TRACE] : SWUPDATE running : [extract_files] : filename uImage [TRACE] : SWUPDATE running : [extract_files] : size 9354240 required [TRACE] : SWUPDATE running : [extract_padding] : Expecting up to 512 padding bytes at end-of-file [TRACE] : SWUPDATE running : [network_initializer] : Valid image found: copying to FLASH [INFO ] : SWUPDATE running : Installation in progress [TRACE] : SWUPDATE running : [install_single_image] : Found installer for stream xboot.img raw [TRACE] : SWUPDATE running : [blkprotect] : Device /dev/mmcblk0boot0: changed force_ro to 0 [TRACE] : SWUPDATE running : [blkprotect] : Device /dev/mmcblk0boot0: changed force_ro to 1 [TRACE] : SWUPDATE running : [install_single_image] : Found installer for stream u-boot.img raw [TRACE] : SWUPDATE running : [install_single_image] : Found installer for stream uImage raw [INFO ] : SWUPDATE successful ! SWUPDATE successful ! [TRACE] : SWUPDATE running : [network_initializer] : Main thread sleep again ! [INFO ] : No SWUPDATE running : Waiting for requests... [INFO ] : SWUPDATE running : [endupdate] : SWUpdate was successful ! [DEBUG] : SWUPDATE running : [postupdate] : Running Post-update command [TRACE] : SWUPDATE running : [unlink_sockets] : unlink socket /tmp/swupdateprog [TRACE] : SWUPDATE running : [unlink_sockets] : unlink socket /tmp/sockinstctrl sunplus@ubuntu:~/work/swu_ubuntu$ [ 1215.274202] [dhd] STATIC-MSG) dhd_static_buf_exit : Enter [ 1215.981005] reboot: Restarting system INFO: PSCI Power Domain Map: INFO: Domain Node : Level 2, parent_node -1, State ON (0x0) INFO: Domain Node : Level 1, parent_node 0, State ON (0x0) INFO: CPU Node : MPID 0x0, parent_node 1, State ON (0x0) INFO: CPU Node : MPID 0x100, parent_node 1, State ON (0x0) INFO: CPU Node : MPID 0x200, parent_node 1, State ON (0x0) INFO: CPU Node : MPID 0x300, parent_node 1, State ON (0x0) |
Web server
You The Ubuntu platform can update images via the web server for by itself or another platformother Ubuntu platforms.
SWUpdate web interface files
Use the following command to download the SWUpdate GitHub repository.
...
Make a directory named “swupdate” in /var/www/ of the platform. Copy all the directories and files in /examples/www/v2/ of the SWUpdate repository into /var/www/swupdate/ of the platform.
...
Shell script - swupdate.sh
Add the parameters of “-k /home/sunplus/my_key/mycert.cert.pem“ for SWUPDATE_ARGS and “-r /var/www/swupdate -p 8080“ for SWUPDATE_WEBSERVER_ARGS in /usr/lib/swupdate/swupdate.sh of the platform shown below. Then reboot the system to activate the web server.
Code Block |
---|
#!/bin/sh # Override these variables in sourced script(s) located # in /usr/lib/swupdate/conf.d or /etc/swupdate/conf.d SWUPDATE_ARGS="-k /home/sunplus/work/my_key/mycert.cert.pem -v ${SWUPDATE_EXTRA_ARGS}" SWUPDATE_WEBSERVER_ARGS="-r /var/www/swupdate -p 8080" SWUPDATE_SURICATTA_ARGS="" # source all files from /etc/swupdate/conf.d and /usr/lib/swupdate/conf.d/ # A file found in /etc replaces the same file in /usr for f in `(test -d /usr/lib/swupdate/conf.d/ && ls -1 /usr/lib/swupdate/conf.d/; test -d /etc/swupdate/conf.d && ls -1 /etc/swupdate/conf.d) | sort -u`; do if [ -f /etc/swupdate/conf.d/$f ]; then . /etc/swupdate/conf.d/$f else . /usr/lib/swupdate/conf.d/$f fi done # handle variable escaping in a simple way. Use exec to forward open filedescriptors from systemd open. if [ "$SWUPDATE_WEBSERVER_ARGS" != "" -a "$SWUPDATE_SURICATTA_ARGS" != "" ]; then exec /usr/bin/swupdate $SWUPDATE_ARGS -w "$SWUPDATE_WEBSERVER_ARGS" -u "$SWUPDATE_SURICATTA_ARGS" elif [ "$SWUPDATE_WEBSERVER_ARGS" != "" ]; then exec /usr/bin/swupdate $SWUPDATE_ARGS -w "$SWUPDATE_WEBSERVER_ARGS" elif [ "$SWUPDATE_SURICATTA_ARGS" != "" ]; then exec /usr/bin/swupdate $SWUPDATE_ARGS -u "$SWUPDATE_SURICATTA_ARGS" else exec /usr/bin/swupdate $SWUPDATE_ARGS fi |
Localhost web server
Open chrominum and connect to the localhost web server with:
...
After selecting update.swu, SWUpdate will start to process the received images and then restart the system.
...
Another platform's web server
You can use chrominum to connect to another platform’s web server to update the images for it which must accomplish the following steps first.
Install swupdate.
Install apache2.
Copy swupdate inferface files into /var/www/swupdate/.
Create and edit /etc/hwrevision.
Copy the public key (mycert.cert.pem) from the platform which packs update.swu.
Make sure the platform system clock is within the validity period of the public key (mycert.cert.pem).
Modify /usr/lib/swupdate/swupdate.sh.
Reboot the system to activate its web server.
Connect to the internet.
...
Therefore, you can update the images for it.
...
Buildroot 2024.02 - eMMC boot
When you run 'make config' to configure your build environment and after selecting the board, you will be prompted to choose a boot device. Refer to the picture below and Enter “1” to select eMMC.
...
After selecting eMMC size, you will be prompted to choose a root file system. Refer to the picture below and Enter “11” to select Buildroot 2024.02.
...
Buildroot Setup
After the completion of executing “make config”, enter the buildroot configuration by running the following command in the top directory of project.
Code Block |
---|
make bconfig |
Select submenus for swupdate : Target packages → System tools. Select <*> for swupdate . Save the configuration and exit. Then execute “make” command to build the images.
...
Generate self-signed certificates
After updating the images to the platform and booting the system of it, it would fail to start SWUpdate daemon as shown below. It lacks a public key to activate the web server.
...
The procedure to generate self-signed certificates is the same as that in Ubuntu MATE 24.04 - eMMC boot. After generating the public key (mycert.cert.pem) by itself or coping it from other platforms which generate it, pack update.swu and will update the images for this Buildroot platform, add the parameter of SWUPDATE_ARGS=”-k /root/work/my_key/mycert.cert.pem -v” to /usr/lib/swupdate/conf.d/10-mongoose-args of the Buildroot platform and the web server will be activated successfully after reboot.
...
sw-description configuration file
Reference it in Ubuntu MATE 24.04 - eMMC boot.
Building a signed SWU image with CMS signature
Reference it in Ubuntu MATE 24.04 - eMMC boot.
HW_FILE
Reference it in Ubuntu MATE 24.04 - eMMC boot.
Update images
The Buildroot platform can update images (update.swu) via the command by itself or web server only by other Ubuntu platforms.
Run SWUpdate
Reference it in Ubuntu MATE 24.04 - eMMC boot.
Web server
Besides adding the parameter (the path of the public key) to /usr/lib/swupdate/conf.d/10-mongoose-args for activating the web server, make sure the platform system clock is within the validity period of the public key (mycert.cert.pem) and reference the procedure of updating images by other Ubuntu platforms in Ubuntu MATE 24.04 - eMMC boot.
Yocto 4.2.4 - eMMC boot
When you run “make config” to configure your build environment and after selecting the board, you will be prompted to choose a boot device. Refer to the picture below and Enter “1” to select eMMC.
...
After selecting eMMC size, you will be prompted to choose a root file system. Refer to the picture below and Enter “12” to select Yocto 4.2.4.
...
After the execution of “make config”, you can modify linux\rootfs\initramfs\yocto\meta-swupdate\recipes-support\swupdate\swupdate\defconfig according to your requests. An example shown below enables systemd support、checks for hardware / software compatibility、uses environment in RAM as bootloader interface and enables verification of signed images … etc.
Code Block |
---|
#
# Automatically generated file; DO NOT EDIT.
# Swupdate Configuration
#
CONFIG_HAVE_DOT_CONFIG=y
#
# Swupdate Settings
#
#
# General Configuration
#
# CONFIG_CURL is not set
# CONFIG_CURL_SSL is not set
CONFIG_SYSTEMD=y
CONFIG_DEFAULT_CONFIG_FILE="/etc/swupdate.cfg"
CONFIG_SCRIPTS=y
CONFIG_HW_COMPATIBILITY=y
CONFIG_HW_COMPATIBILITY_FILE="/etc/hwrevision"
CONFIG_SW_VERSIONS_FILE="/etc/sw-versions"
#
# Socket Paths
#
CONFIG_SOCKET_CTRL_PATH=""
CONFIG_SOCKET_PROGRESS_PATH=""
CONFIG_SOCKET_REMOTE_HANDLER_DIRECTORY="/tmp/"
CONFIG_MTD=y
CONFIG_LUA=y
CONFIG_LUAPKG="lua"
# CONFIG_FEATURE_SYSLOG is not set
#
# Build Options
#
CONFIG_CROSS_COMPILE=""
CONFIG_SYSROOT=""
CONFIG_EXTRA_LDLIBS=""
#
# Debugging Options
#
# CONFIG_DEBUG is not set
# CONFIG_WERROR is not set
# CONFIG_NOCLEANUP is not set
# CONFIG_BOOTLOADER_EBG is not set
# CONFIG_UBOOT is not set
CONFIG_BOOTLOADER_NONE=y
# CONFIG_BOOTLOADER_GRUB is not set
CONFIG_BOOTLOADER_DEFAULT_NONE=y
# CONFIG_SSL_IMPL_NONE is not set
CONFIG_SSL_IMPL_OPENSSL=y
# CONFIG_SSL_IMPL_MBEDTLS is not set
# CONFIG_DOWNLOAD is not set
CONFIG_HASH_VERIFY=y
CONFIG_SIGNED_IMAGES=y
# CONFIG_SIGALG_RAWRSA is not set
# CONFIG_SIGALG_RSAPSS is not set
CONFIG_SIGALG_CMS=y
# CONFIG_SIGALG_GPG is not set
#
# CMS / PKCS#7 signature verification options
#
# CONFIG_CMS_IGNORE_EXPIRED_CERTIFICATE is not set
# CONFIG_CMS_IGNORE_CERTIFICATE_PURPOSE is not set
# CONFIG_CMS_SKIP_UNKNOWN_SIGNERS is not set
# CONFIG_ENCRYPTED_IMAGES is not set
# CONFIG_SURICATTA is not set
CONFIG_WEBSERVER=y
CONFIG_MONGOOSE=y
CONFIG_MONGOOSEIPV6=y
CONFIG_MONGOOSESSL=y
CONFIG_GUNZIP=y
# CONFIG_ZSTD is not set
#
# Parser Features
#
CONFIG_LIBCONFIG=y
CONFIG_PARSERROOT=""
# CONFIG_JSON is not set
# CONFIG_LUAEXTERNAL is not set
# CONFIG_SETSWDESCRIPTION is not set
#
# Image Handlers
#
# CONFIG_UBIVOL is not set
CONFIG_CFI=y
# CONFIG_CFIHAMMING1 is not set
# CONFIG_DISKPART is not set
CONFIG_RAW=y
# CONFIG_RDIFFHANDLER is not set
CONFIG_LUASCRIPTHANDLER=y
CONFIG_SHELLSCRIPTHANDLER=y
# CONFIG_HANDLER_IN_LUA is not set
# CONFIG_ARCHIVE is not set
# CONFIG_REMOTE_HANDLER is not set
# CONFIG_SWUFORWARDER_HANDLER is not set
# CONFIG_BOOTLOADERHANDLER is not set
# CONFIG_SSBLSWITCH is not set
# CONFIG_UCFWHANDLER is not set
|
Modify linux\rootfs\initramfs\yocto\meta-sunplus\recipes-img\images\img-sp7350.bb to install the webserver of nginx during compilation.
...
Then execute “make” command to build the images.
Generate self-signed certificates
After updating the images to the platform and boot the system of it, it would fail to start SWUpdate daemon as shown below. It lacks a public key to start SWUpdate daemon.
...
The procedure to generate self-signed certificates is the same as that in Ubuntu MATE 24.04 - eMMC boot. After generating the public key (mycert.cert.pem) by itself or coping it from other platforms which generate it, pack update.swu and will update the images for this Yocto platform, add the parameters of “-k /home/root/my_key/mycert.cert.pem“ for SWUPDATE_ARGS in /usr/lib/swupdate/swupdate.sh of the platform shown below. Then it will start SWUpdate daemon successfully after rebooting the system.
Code Block |
---|
#!/bin/sh
# Override these variables in sourced script(s) located
# in /usr/lib/swupdate/conf.d or /etc/swupdate/conf.d
SWUPDATE_ARGS="-k /home/root/work/my_key/mycert.cert.pem -v ${SWUPDATE_EXTRA_ARGS}"
SWUPDATE_WEBSERVER_ARGS=""
SWUPDATE_SURICATTA_ARGS=""
# source all files from /etc/swupdate/conf.d and /usr/lib/swupdate/conf.d/
# A file found in /etc replaces the same file in /usr
for f in `(test -d /usr/lib/swupdate/conf.d/ && ls -1 /usr/lib/swupdate/conf.d/; test -d /etc/swupda
if [ -f /etc/swupdate/conf.d/$f ]; then
. /etc/swupdate/conf.d/$f
else
. /usr/lib/swupdate/conf.d/$f
fi
done
# handle variable escaping in a simmple way. Use exec to forward open filedescriptors from systemd
if [ "$SWUPDATE_WEBSERVER_ARGS" != "" -a "$SWUPDATE_SURICATTA_ARGS" != "" ]; then
exec /usr/bin/swupdate $SWUPDATE_ARGS -w "$SWUPDATE_WEBSERVER_ARGS" -u "$SWUPDATE_SURICATTA_ARGS"
elif [ "$SWUPDATE_WEBSERVER_ARGS" != "" ]; then
exec /usr/bin/swupdate $SWUPDATE_ARGS -w "$SWUPDATE_WEBSERVER_ARGS"
elif [ "$SWUPDATE_SURICATTA_ARGS" != "" ]; then
exec /usr/bin/swupdate $SWUPDATE_ARGS -u "$SWUPDATE_SURICATTA_ARGS"
else
exec /usr/bin/swupdate $SWUPDATE_ARGS |
sw-description configuration file
Reference it in Ubuntu MATE 24.04 - eMMC boot.
Building a signed SWU image with CMS signature
Reference it in Ubuntu MATE 24.04 - eMMC boot.
HW_FILE
Reference it in Ubuntu MATE 24.04 - eMMC boot.
Update images
The Yocto platform can update images (update.swu) via the command by itself or web server only by other Ubuntu platforms.
Run SWUpdate
Reference it in Ubuntu MATE 24.04 - eMMC boot.
Web server
The Yocto system can only update images (update.swu) by other Ubuntu systems. Reference it in Ubuntu MATE 24.04 - eMMC boot.