Strictly necessary cookies are on by default and cannot be turned off. Functional, Performance and Tracking/targeting/sharing cookies can be turned on below based on your preferences (this banner will remain available for you to accept cookies). You may change your cookie settings by deleting cookies from your browser. Then this banner will appear again. You can learn more details about cookies HERE.
Strictly necessary (always on)
Functional, Performance and Tracking/targeting/sharing (default off)
Version : *A
This tutorial provides instructions on using OTA with the CY8CKIT-064S0S2-4343W kit. If you do not have a kit, you can purchase one from...
Version : *A
This tutorial provides instructions on using OTA with the CY8CKIT-064S0S2-4343W kit. If you do not have a kit, you can purchase one from the website at this link: CY8CKIT-064S0S2-4343W.
Before you begin, follow the Getting Started Guide for the Cypress CY8CKIT-064S0S2-4343W Kit and ensure you are able to perform a build and run the Amazon FreeRTOS MQTT demo project. As a result, you are already familiar with the development environment and how to work with the hardware.
Note: In this tutorial, the path to the FreeRTOS download directory is referred to as <freertos>.
When a successfully validated OTA image is applied to a device using the PSoC64 Standard Secure AWS MCU and the device is unable to communicate with AWS IoT Core, the device will not be able to automatically rollback to the original known good image. This may result in the device being unreachable from AWS IoT Core for any further updates. This functionality is still under development by the Cypress team.
FreeRTOS Over-the-Air description can be found here.
To digitally sign firmware images, you need a code-signing certificate and private key. For testing purposes, you can create a self‐signed certificate and private key. For production environments, purchase a certificate through a well‐known certificate authority (CA).
Use the AWS Command Line Interface to import your code-signing certificate, private key, and certificate chain into AWS Certificate Manager. For more information see Installing the AWS CLI in the AWS Command Line Interface User Guide.
Open a command prompt or terminal with administrator permissions.
Generate the private key using the following command:
Paste the contents of <filename>.crt in aws_ota_codesigner_certificate.h at <amazon-freertos>/demos/include. Follow the format explained in the file. This is used to verify the signature generated by AWS and streamed with the image to the kit.
Register the certificate and private key with AWS Certificate Manager (ACM). An ARN is created in this stage and stored in certarn.json. This ARN is needed when you create an OTA job.