Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DOC] Clarify use of handleCustomJob Function #508

Open
monkeytronics opened this issue Feb 14, 2024 · 2 comments
Open

[DOC] Clarify use of handleCustomJob Function #508

monkeytronics opened this issue Feb 14, 2024 · 2 comments

Comments

@monkeytronics
Copy link

Describe the issue
I am attempting to get an older ESP-IDF V4.3. application up to date. I have pulled the demos. The basic pub/sub examples work nicely. But I am struggling with the OTA.

The V4.3. code used custom jobs in AWS, where we pulled the ota_url and fed it to the http ota updater. We did not use code signing.

I am currently struggling to get the OTA to work here. The example provided is OTA over MQTT. I like this concept as it offers significant saving in terms of memory. So, I would like to use this. I've already set up the IAMs Role and IOT policy for the certificate so the Thing is ready for MQTT jobs and streams.

Would it be possible to provide some guidance on the flow with examples as to how we can get this to work with an unsigned binary. The AWS Console insists on code signing (as far as I can tell) so it's likely we'll need to use the SDK (or CLI as a quick place to test / prove).

Appreciate that this could go into the FreeRTOS forum, but I think it would also be a great addition to the documentation on this repo.

@rawalexe
Copy link
Member

Hello @monkeytronics ,
Thank you for your query, I am collecting all the necessary docs and will update you on it soon.

@rawalexe
Copy link
Member

If you want to create an OTA update, where the service does not sign the image for the update then you could use custom signed images when creating an OTA Update. See "Using a custom signed firmware image" here: https://docs.aws.amazon.com/freertos/latest/userguide/ota-console-workflow.html

It then falls upon the device agent to disregard the signing information about signing and hashing algorithms and not perform signing verification.
However unsigned binary creates a huge hole security posture and not recommended.

Please, let me know if you have more questions

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants