Skip to main content
Version: 0.13.1

Device Firmware Management using Cumulocity

Thin-edge provides an operation plugin to manage device firmware using Cumulocity. Firmware management is currently supported only for child devices and not for the main tedge device.

  • The firmware update operations are defined and triggered from Cumulocity
  • Thin-edge acts as the proxy between Cumulocity and the child device facilitating the routing of firmware update requests as well as the transfer of firmware binary files from cloud to the device.
  • Updating the firmware of a device is done by some device specific firmware management software. Since thin-edge can not directly interact with that piece of software over whatever third-party protocol it supports, an additional piece of software, referred to as child-device-connector in the rest of this doc, must be developed by the child device admin to perform the actual installation itself, in coordination with thin-edge.
  • The child-device-connector may be installed directly on the child device or alongside thin-edge as well, as long as it can access the HTTP and MQTT APIs of thin-edge interact with the child device directly.

This document describes:

  • how to install, configure and use the c8y-firmware-plugin
  • how to implement a child-device-connector following the protocol of c8y-firmware-plugin

Installation​

The plugin will be installed at /usr/bin/c8y-firmware-plugin by the debian package. The systemd service definition files for the plugin are also installed at /lib/systemd/system/c8y-firmware-plugin.service.

No operations files are created under /etc/tedge/operations/c8y/ as this plugin doesn't support firmware updates for the tedge device. Operation files for child devices must be created as part of their bootstrap process, which is explained later.

Configuration​

The plugin supports a single tedge configuration named firmware.child.update.timeout, that defines the amount of time the plugin wait for a child device to finish a firmware update once the request is delivered. The default timeout value (in seconds) is 3600 and can be updated with:

sudo tedge config set firmware.child.update.timeout <value_in_seconds>

Usage​

c8y-firmware-plugin --help
Output
Thin-edge device firmware management for Cumulocity

USAGE:
c8y-firmware-plugin [OPTIONS]

OPTIONS:
--config-dir <CONFIG_DIR>
[default: /etc/tedge]

--debug
Turn-on the debug log level.

If off only reports ERROR, WARN, and INFO If on also reports DEBUG

-h, --help
Print help information

-i, --init
Create required directories

-V, --version
Print version information

`c8y-firmware-plugin` subscribes to `c8y/s/ds` listening for firmware operation requests (message
`515`).
Notifying the Cumulocity tenant of their progress (messages `501`, `502` and `503`).
During a successful operation, `c8y-firmware-plugin` updates the installed firmware info in
Cumulocity tenant with SmartREST message `115`.

The thin-edge `CONFIG_DIR` is used to find where:
* to store temporary files on download: `tedge config get tmp.path`,
* to log operation errors and progress: `tedge config get log.path`,
* to connect the MQTT bus: `tedge config get mqtt.bind.port`,
* to timeout pending operations: `tedge config get firmware.child.update.timeout

The c8y-firmware-plugin has to be run as a daemon on the device. On systemd supported OSes, it can be run as a daemon service as follows:

sudo systemctl enable c8y-firmware-plugin
sudo systemctl start c8y-firmware-plugin

Firmware update protocol between thin-edge and the child-devices​

The plugin manages the download and delivery of firmware files for child-devices connected to the thin-edge device, acting as a proxy between the cloud and the child-devices. The firmware updates are downloaded from the cloud on the thin-edge device then made available to the child-devices over HTTP. The child devices are notified of incoming firmware update requests via MQTT. The child-device-connector has to subscribe to these MQTT messages, download the firmware files via HTTP, and notify the firmware plugin of the firmware update progress via MQTT.

  • The responsibilities of the plugin are:
    • to download the firmware files pushed from the cloud, caching it to be shared with child devices
    • to handle network failures during the download even on flaky networks
    • to publish the downloaded firmware files over a local HTTP server and make them available to the child-devices,
    • to notify the child-devices when firmware updates are available,
    • to receive forward the firmware update status updates from the child devices to the cloud
  • By contrast, the plugin is not responsible for:
    • checking the integrity of the downloaded file which is a third-party binary
    • installing the firmware files on the child-devices.
  • The child-device-connector is required to listen for firmware update related MQTT notifications from the plugin and behave accordingly along the protocol defined by this plugin.
    • Being specific to each type of child device based on its device specific protocol for applying a firmware update.
    • This software can be installed on the child device.
    • This software can also be installed on the main device, when the target device cannot be altered or connected to the main device over MQTT and HTTP.

Child device connector connecting to thin-edge device​

The child-device-connector is responsible for handling the firmware update requests sent by the thin-edge and translating it to the relevant 3rd-party device specific API to install the firmware on that device. The child-device-connector interacts with thin-edge over its MQTT and HTTP APIs. In cases where the child device connector is installed alongside thin-edge on the same device, these APIs can be accessed via a local IP or even 127.0.0.1. The MQTT APIs are exposed via port 1883 and the HTTP APIs are exposed via port 8000, by default. When the child device connector is running directly on the external child device, the MQTT and HTTP APIs of thin-edge need to be accessed over the network using its IP address and ports, which are configured using the tedge config settings mqtt.client.host or mqtt.client.port for MQTT and http.address and http.port for HTTP.

Child devices declaring firmware management support​

For child devices, the operation files must be created under /etc/tedge/operations/c8y/$CHILD_DEVICE_ID, where $CHILD_DEVICE_ID should be replaced with the child's identity. These files are not created by the plugin itself, but must be created by the child device connector or by any other means for each child device as follows:

tree /etc/tedge/operations/c8y
Output
/etc/tedge/operations/c8y
|-- child-1
| |-- c8y_Firmware
|-- child-2
|-- c8y_Firmware

The Cumulocity mapper will detect the creation of these child device operation files and report them as supported operations for those child devices.

The child device connector handling firmware update requests from thin-edge device​

When the plugin receives a firmware update request file for a child device, it downloads the firmware file, caches it to be reused on other child devices as well and exposes it to the child device via its file-transfer service. It also notifies the cloud on the progress of this firmware update operation as and when it gets status updates from the child device.

The following diagram captures the required interactions between all relevant parties:

The following keywords are used in the following section for brevity:

  • TEDGE_DATA_PATH: The path set by tedge config data.path. Default: /var/tedge
  • TEDGE_TMP_PATH: The path set by tedge config tmp.path. Default: /tmp
  • FIRMWARE_CACHE_PATH: $TEDGE_DATA_PATH/cache
  • FIRMWARE_OP_PATH: $TEDGE_DATA_PATH/firmware
  • FILE_TRANSFER_REPO: $TEDGE_DATA_PATH/file-transfer
  • TEDGE_HTTP_ADDRESS: The combination of tedge configs http.address:http.port
  • OP_ID: An operation ID
  • FILE_ID: A firmware file id derived from the SHA-256 digest of the firmware url
  1. The plugin, on reception of a c8y_Firmware request from Cumulocity for a child device named $CHILD_DEVICE_ID in the SmartREST format 515,$CHILD_DEVICE_ID,$FIRMWARE_NAME,$FIRMWARE_VERSION,$FIRMWARE_URL
    1. Validate if the same firmware update operation is already in progress by iterating over all the operation files in the $FIRMWARE_OP_PATH directory. The operation files contains the last firmware_update request's JSON payload along with the device ID. If an operation file with the child_id id, name, version and url fields matching the incoming $FIRMWARE_NAME,$FIRMWARE_VERSION and $FIRMWARE_URL is found, the same request is re-sent to the child device by just incrementing the attempt count value. The operation file content is also overwritten the with updated attempt count.
    2. If a pending operation match is not found, do a look up if the firmware file for the given url already exists in its firmware cache at $FIRMWARE_CACHE_PATH. The file name for the lookup is derived from the SHA-256 digest of the firmware url.
    3. If a cached copy is not found in the firmware cache, the plugin downloads the firmware file from the url to $FIRMWARE_CACHE_PATH with the name derived from the SHA-256 digest of the firmware url. If a cached firmware copy is found, downloading is skipped.
    4. Create an operation file at $FIRMWARE_OP_PATH/$OP_ID with a JSON record containing the following fields:
      • operation_id: A unique id generated by the plugin
      • child_id: The child device ID received in the cloud request
      • name: Name of the firmware received in the cloud request
      • version: Version of the firmware received in the cloud request
      • server_url: The firmware URL received in the cloud request
      • tedge_url: The file-transfer service entry URL for the downloaded firmware file (http://$TEDGE_HTTP_ADDRESS/tedge/file-transfer/$CHILD_DEVICE_ID/firmware_update/$FILE_ID)
      • sha256: The SHA-256 checksum of the firmware file served via the tedge_url
      • attempt: The count that indicates if this request is being resent or not, with an initial value of 1
    5. After creating the operation file, do a look up if the firmware file for the given url already exists
  2. The cached firmware file is published via the file-transfer repository of tedge-agent by creating a symlink to the cached firmware file is created in the file-transfer repository at $FILE_TRANSFER_REPO/$CHILD_DEVICE_ID/firmware_update/$FILE_ID making this file available via the HTTP endpoint: http://$TEDGE_HTTP_ADDRESS/tedge/file-transfer/$CHILD_DEVICE_ID/firmware_update/$FILE_ID.
  3. Once the updated firmware file is published via the HTTP file transfer service, the plugin send the firmware_update request to the child device connector by publishing an MQTT message:
    • Topic: tedge/$CHILD_DEVICE_ID/commands/req/firmware_update
    • The payload is a JSON record with the following fields
      • id: A unique id generated by the plugin
      • name: Name of the firmware received in the cloud request
      • version: Version of the firmware received in the cloud request
      • url: The file-transfer service entry URL(http://$TEDGE_HTTP_ADDRESS/tedge/file-transfer/$CHILD_DEVICE_ID/firmware_update/$FILE_ID)
      • sha256: The SHA-256 checksum of the firmware file served via the url
      • attempt: The count that indicates if this request is being resent or not, starting from 1 for the original request
  4. On reception of the firmware update request on the topic tedge/$CHILD_DEVICE_ID/commands/req/firmware_update, the child device connector is expected to do the following:
    1. Send an acknowledgement of the receipt of the request by sending an executing status message via MQTT:
      • Topic: tedge/$CHILD_DEVICE_ID/commands/res/firmware_update
      • Payload must be a JSON record with the following fields
        • id: The id of the request
        • status: "executing"
    2. GETs the firmware file from the url specified by the notification message.
    3. Validate the integrity of the downloaded binary by matching its SHA-256 hash value against the sha256 checksum value received in the request.
    4. Apply the downloaded firmware file update on the device using whatever device specific protocol.
  5. After applying the update, send the final operation status update to thin-edge via MQTT:
    1. Topic: tedge/$CHILD_DEVICE_ID/commands/res/firmware_update
    2. The payload must be a JSON record with the following fields:
      • id: The id of the request received
      • status: successful or failed based on the result of updating the firmware
      • reason: The reason for the failure, applicable only for failed status.
  6. On reception of an operation status message, the plugin maps it to SmartREST and forwards it to the cloud.
    • When a successful or failed status message is finally received, then the plugin cleans up the corresponding operation file at $FIRMWARE_OP_PATH/$OP_ID and the firmware file entry in the file transfer repository at $FILE_TRANSFER_REPO/$CHILD_DEVICE_ID/firmware_update/$FILE_ID.
    • If a notification message is received while none is expected, i.e with an operation id that doesn't exist at $TEDGE_DATA_PATH/firmware/<id>, then this notification message is deemed stale and ignored.

Logging​

The plugin logs its progress and errors on to its stderr.

The following details are logged:

  • All the c8y_Firmware requests received from Cumulocity
  • All the mapped firmware_update requests sent to each child device
  • The firmware_update responses received from the child devices
  • All errors are reported with the operation context