Taking photo using GR-LYCHEE through Pelion Device Management.
This firmware project works for GR-LYCHEE and GR-PEACH.
Steps to build this firmware with Mbed CLI
Import project
$ mbed import http://os.mbed.com/users/coisme/code/Pelion-GR-LYCHEE-camera-firmware/
Setting
- Ethernet (GR-PEACH only)
- Change the file name
mbed_app.RZ_A1H_Ethernet.json
tombed_app.json
- Change the file name
- Wi-Fi
- Change the Wi-Fi setting in
mbed_app.json
, i.e.nsapi.default-wifi-ssid
andnsapi.default-wifi-password
- Change the Wi-Fi setting in
If you haven't set your Pelion API key, run the following command.
$ mbed config -G CLOUD_SDK_API_KEY <API_KEY>
Setting for Pelion Device Management
$ mbed dm init -d "example.com" --model-name "PELION_DEMO" -q --force
Compile
For GR-LYCHEE:
$ mbed compile -t GCC_ARM -m GR_LYCHEE
For GR-PEACH:
$ mbed compile -t GCC_ARM -m RZ_A1H
Write the created .bin
file to your GR-LYCHEE/PEACH.
That's it! :-)
LED Status Indicator
LEDs next to UB0 show the status of your GR-LYCHEE/PEACH.
LED# | GR-LYCHEE | GR-PEACH | Status | Description |
---|---|---|---|---|
LED1 | green | red | Normal | Turned on after the device is registered to Pelion Device Management successfully. |
LED2 | yellow | green | Error | Turned on when the network initialization failed. Check your Wi-Fi setting. |
LED3 | orange | blue | Error | Turned on when the Pelion Device Management Client initialization failed. Check your SD card. |
LED4 | red | red | Error | Turned on when the network is disconnected. Check your Wi-Fi network status. |
Clear device identity
If you want to clear the device's identity, connect to the device via serial terminal. Then input r
command. The device flushes the identity storage, then reboot.
Known Issues
client_error(6) -> Client in reconnection mode NetworkError
appears when connecting to network, but eventually connection will be established.- Warning message
"MBEDTLS_TEST_NULL_ENTROPY has been enabled. This configuration is not secure and is not suitable for production use"
appears when compiling the project for GR-PEACH. This can be ignored in development stage.
mbed_cloud_dev_credentials.c
- Committer:
- Osamu Koizumi
- Date:
- 2019-06-27
- Revision:
- 19:bdc69891952a
- Parent:
- 0:6d2053b84a92
File content as of revision 19:bdc69891952a:
/* * Copyright (c) 2017 ARM Limited. All rights reserved. * SPDX-License-Identifier: Apache-2.0 * Licensed under the Apache License, Version 2.0 (the License); you may * not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an AS IS BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifndef __MBED_CLOUD_DEV_CREDENTIALS_H__ #define __MBED_CLOUD_DEV_CREDENTIALS_H__ #if MBED_CONF_APP_DEVELOPER_MODE == 1 #error "Replace mbed_cloud_dev_credentials.c with your own developer cert." #endif #include <inttypes.h> const char MBED_CLOUD_DEV_BOOTSTRAP_ENDPOINT_NAME[] = ""; const char MBED_CLOUD_DEV_ACCOUNT_ID[] = ""; const char MBED_CLOUD_DEV_BOOTSTRAP_SERVER_URI[] = ""; const uint8_t MBED_CLOUD_DEV_BOOTSTRAP_DEVICE_CERTIFICATE[] = { 0x0 }; const uint8_t MBED_CLOUD_DEV_BOOTSTRAP_SERVER_ROOT_CA_CERTIFICATE[] = { 0x0 }; const uint8_t MBED_CLOUD_DEV_BOOTSTRAP_DEVICE_PRIVATE_KEY[] = { 0x0 }; const char MBED_CLOUD_DEV_MANUFACTURER[] = "dev_manufacturer"; const char MBED_CLOUD_DEV_MODEL_NUMBER[] = "dev_model_num"; const char MBED_CLOUD_DEV_SERIAL_NUMBER[] = "0"; const char MBED_CLOUD_DEV_DEVICE_TYPE[] = "dev_device_type"; const char MBED_CLOUD_DEV_HARDWARE_VERSION[] = "dev_hardware_version"; const uint32_t MBED_CLOUD_DEV_MEMORY_TOTAL_KB = 0; const uint32_t MBED_CLOUD_DEV_BOOTSTRAP_DEVICE_CERTIFICATE_SIZE = sizeof(MBED_CLOUD_DEV_BOOTSTRAP_DEVICE_CERTIFICATE); const uint32_t MBED_CLOUD_DEV_BOOTSTRAP_SERVER_ROOT_CA_CERTIFICATE_SIZE = sizeof(MBED_CLOUD_DEV_BOOTSTRAP_SERVER_ROOT_CA_CERTIFICATE); const uint32_t MBED_CLOUD_DEV_BOOTSTRAP_DEVICE_PRIVATE_KEY_SIZE = sizeof(MBED_CLOUD_DEV_BOOTSTRAP_DEVICE_PRIVATE_KEY); #endif //__MBED_CLOUD_DEV_CREDENTIALS_H__