mirror of
https://github.com/esphome/esphome.git
synced 2024-11-27 17:27:59 +01:00
2f77d31690
Some checks failed
CI / Check flake8 (push) Blocked by required conditions
CI / Check pylint (push) Blocked by required conditions
CI / Check pyupgrade (push) Blocked by required conditions
CI / Create common environment (push) Waiting to run
CI / Check black (push) Blocked by required conditions
CI / Run script/ci-custom (push) Blocked by required conditions
CI / Run pytest (push) Blocked by required conditions
CI / Check clang-format (push) Blocked by required conditions
CI / Run script/clang-tidy for ESP32 Arduino 1/4 (push) Blocked by required conditions
CI / Run script/clang-tidy for ESP32 Arduino 2/4 (push) Blocked by required conditions
CI / Run script/clang-tidy for ESP32 Arduino 3/4 (push) Blocked by required conditions
CI / Run script/clang-tidy for ESP32 Arduino 4/4 (push) Blocked by required conditions
CI / Run script/clang-tidy for ESP32 IDF (push) Blocked by required conditions
CI / Run script/clang-tidy for ESP8266 (push) Blocked by required conditions
CI / list-components (push) Blocked by required conditions
CI / Component test (push) Blocked by required conditions
CI / Split components for testing into 20 groups maximum (push) Blocked by required conditions
CI / Test split components (push) Blocked by required conditions
CI / CI Status (push) Blocked by required conditions
YAML lint / yamllint (push) Has been cancelled
360 lines
12 KiB
Python
360 lines
12 KiB
Python
from __future__ import annotations
|
|
|
|
import gzip
|
|
import hashlib
|
|
import io
|
|
import logging
|
|
import random
|
|
import socket
|
|
import sys
|
|
import time
|
|
|
|
from esphome.core import EsphomeError
|
|
from esphome.helpers import resolve_ip_address
|
|
|
|
RESPONSE_OK = 0x00
|
|
RESPONSE_REQUEST_AUTH = 0x01
|
|
|
|
RESPONSE_HEADER_OK = 0x40
|
|
RESPONSE_AUTH_OK = 0x41
|
|
RESPONSE_UPDATE_PREPARE_OK = 0x42
|
|
RESPONSE_BIN_MD5_OK = 0x43
|
|
RESPONSE_RECEIVE_OK = 0x44
|
|
RESPONSE_UPDATE_END_OK = 0x45
|
|
RESPONSE_SUPPORTS_COMPRESSION = 0x46
|
|
RESPONSE_CHUNK_OK = 0x47
|
|
|
|
RESPONSE_ERROR_MAGIC = 0x80
|
|
RESPONSE_ERROR_UPDATE_PREPARE = 0x81
|
|
RESPONSE_ERROR_AUTH_INVALID = 0x82
|
|
RESPONSE_ERROR_WRITING_FLASH = 0x83
|
|
RESPONSE_ERROR_UPDATE_END = 0x84
|
|
RESPONSE_ERROR_INVALID_BOOTSTRAPPING = 0x85
|
|
RESPONSE_ERROR_WRONG_CURRENT_FLASH_CONFIG = 0x86
|
|
RESPONSE_ERROR_WRONG_NEW_FLASH_CONFIG = 0x87
|
|
RESPONSE_ERROR_ESP8266_NOT_ENOUGH_SPACE = 0x88
|
|
RESPONSE_ERROR_ESP32_NOT_ENOUGH_SPACE = 0x89
|
|
RESPONSE_ERROR_NO_UPDATE_PARTITION = 0x8A
|
|
RESPONSE_ERROR_MD5_MISMATCH = 0x8B
|
|
RESPONSE_ERROR_UNKNOWN = 0xFF
|
|
|
|
OTA_VERSION_1_0 = 1
|
|
OTA_VERSION_2_0 = 2
|
|
|
|
MAGIC_BYTES = [0x6C, 0x26, 0xF7, 0x5C, 0x45]
|
|
|
|
FEATURE_SUPPORTS_COMPRESSION = 0x01
|
|
|
|
|
|
UPLOAD_BLOCK_SIZE = 8192
|
|
UPLOAD_BUFFER_SIZE = UPLOAD_BLOCK_SIZE * 8
|
|
|
|
_LOGGER = logging.getLogger(__name__)
|
|
|
|
|
|
class ProgressBar:
|
|
def __init__(self):
|
|
self.last_progress = None
|
|
|
|
def update(self, progress):
|
|
bar_length = 60
|
|
status = ""
|
|
if progress >= 1:
|
|
progress = 1
|
|
status = "Done...\r\n"
|
|
new_progress = int(progress * 100)
|
|
if new_progress == self.last_progress:
|
|
return
|
|
self.last_progress = new_progress
|
|
block = int(round(bar_length * progress))
|
|
text = f"\rUploading: [{'=' * block + ' ' * (bar_length - block)}] {new_progress}% {status}"
|
|
sys.stderr.write(text)
|
|
sys.stderr.flush()
|
|
|
|
def done(self):
|
|
sys.stderr.write("\n")
|
|
sys.stderr.flush()
|
|
|
|
|
|
class OTAError(EsphomeError):
|
|
pass
|
|
|
|
|
|
def recv_decode(sock, amount, decode=True):
|
|
data = sock.recv(amount)
|
|
if not decode:
|
|
return data
|
|
return list(data)
|
|
|
|
|
|
def receive_exactly(sock, amount, msg, expect, decode=True):
|
|
if decode:
|
|
data = []
|
|
else:
|
|
data = b""
|
|
|
|
try:
|
|
data += recv_decode(sock, 1, decode=decode)
|
|
except OSError as err:
|
|
raise OTAError(f"Error receiving acknowledge {msg}: {err}") from err
|
|
|
|
try:
|
|
check_error(data, expect)
|
|
except OTAError as err:
|
|
sock.close()
|
|
raise OTAError(f"Error {msg}: {err}") from err
|
|
|
|
while len(data) < amount:
|
|
try:
|
|
data += recv_decode(sock, amount - len(data), decode=decode)
|
|
except OSError as err:
|
|
raise OTAError(f"Error receiving {msg}: {err}") from err
|
|
return data
|
|
|
|
|
|
def check_error(data, expect):
|
|
if not expect:
|
|
return
|
|
dat = data[0]
|
|
if dat == RESPONSE_ERROR_MAGIC:
|
|
raise OTAError("Error: Invalid magic byte")
|
|
if dat == RESPONSE_ERROR_UPDATE_PREPARE:
|
|
raise OTAError(
|
|
"Error: Couldn't prepare flash memory for update. Is the binary too big? "
|
|
"Please try restarting the ESP."
|
|
)
|
|
if dat == RESPONSE_ERROR_AUTH_INVALID:
|
|
raise OTAError("Error: Authentication invalid. Is the password correct?")
|
|
if dat == RESPONSE_ERROR_WRITING_FLASH:
|
|
raise OTAError(
|
|
"Error: Wring OTA data to flash memory failed. See USB logs for more "
|
|
"information."
|
|
)
|
|
if dat == RESPONSE_ERROR_UPDATE_END:
|
|
raise OTAError(
|
|
"Error: Finishing update failed. See the MQTT/USB logs for more "
|
|
"information."
|
|
)
|
|
if dat == RESPONSE_ERROR_INVALID_BOOTSTRAPPING:
|
|
raise OTAError(
|
|
"Error: Please press the reset button on the ESP. A manual reset is "
|
|
"required on the first OTA-Update after flashing via USB."
|
|
)
|
|
if dat == RESPONSE_ERROR_WRONG_CURRENT_FLASH_CONFIG:
|
|
raise OTAError(
|
|
"Error: ESP has been flashed with wrong flash size. Please choose the "
|
|
"correct 'board' option (esp01_1m always works) and then flash over USB."
|
|
)
|
|
if dat == RESPONSE_ERROR_WRONG_NEW_FLASH_CONFIG:
|
|
raise OTAError(
|
|
"Error: ESP does not have the requested flash size (wrong board). Please "
|
|
"choose the correct 'board' option (esp01_1m always works) and try "
|
|
"uploading again."
|
|
)
|
|
if dat == RESPONSE_ERROR_ESP8266_NOT_ENOUGH_SPACE:
|
|
raise OTAError(
|
|
"Error: ESP does not have enough space to store OTA file. Please try "
|
|
"flashing a minimal firmware (remove everything except ota)"
|
|
)
|
|
if dat == RESPONSE_ERROR_ESP32_NOT_ENOUGH_SPACE:
|
|
raise OTAError(
|
|
"Error: The OTA partition on the ESP is too small. ESPHome needs to resize "
|
|
"this partition, please flash over USB."
|
|
)
|
|
if dat == RESPONSE_ERROR_NO_UPDATE_PARTITION:
|
|
raise OTAError(
|
|
"Error: The OTA partition on the ESP couldn't be found. ESPHome needs to create "
|
|
"this partition, please flash over USB."
|
|
)
|
|
if dat == RESPONSE_ERROR_MD5_MISMATCH:
|
|
raise OTAError(
|
|
"Error: Application MD5 code mismatch. Please try again "
|
|
"or flash over USB with a good quality cable."
|
|
)
|
|
if dat == RESPONSE_ERROR_UNKNOWN:
|
|
raise OTAError("Unknown error from ESP")
|
|
if not isinstance(expect, (list, tuple)):
|
|
expect = [expect]
|
|
if dat not in expect:
|
|
raise OTAError(f"Unexpected response from ESP: 0x{data[0]:02X}")
|
|
|
|
|
|
def send_check(sock, data, msg):
|
|
try:
|
|
if isinstance(data, (list, tuple)):
|
|
data = bytes(data)
|
|
elif isinstance(data, int):
|
|
data = bytes([data])
|
|
elif isinstance(data, str):
|
|
data = data.encode("utf8")
|
|
|
|
sock.sendall(data)
|
|
except OSError as err:
|
|
raise OTAError(f"Error sending {msg}: {err}") from err
|
|
|
|
|
|
def perform_ota(
|
|
sock: socket.socket, password: str, file_handle: io.IOBase, filename: str
|
|
) -> None:
|
|
file_contents = file_handle.read()
|
|
file_size = len(file_contents)
|
|
_LOGGER.info("Uploading %s (%s bytes)", filename, file_size)
|
|
|
|
# Enable nodelay, we need it for phase 1
|
|
sock.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)
|
|
send_check(sock, MAGIC_BYTES, "magic bytes")
|
|
|
|
_, version = receive_exactly(sock, 2, "version", RESPONSE_OK)
|
|
_LOGGER.debug("Device support OTA version: %s", version)
|
|
supported_versions = (OTA_VERSION_1_0, OTA_VERSION_2_0)
|
|
if version not in supported_versions:
|
|
raise OTAError(
|
|
f"Device uses unsupported OTA version {version}, this ESPHome supports {supported_versions}"
|
|
)
|
|
|
|
# Features
|
|
send_check(sock, FEATURE_SUPPORTS_COMPRESSION, "features")
|
|
features = receive_exactly(
|
|
sock, 1, "features", [RESPONSE_HEADER_OK, RESPONSE_SUPPORTS_COMPRESSION]
|
|
)[0]
|
|
|
|
if features == RESPONSE_SUPPORTS_COMPRESSION:
|
|
upload_contents = gzip.compress(file_contents, compresslevel=9)
|
|
_LOGGER.info("Compressed to %s bytes", len(upload_contents))
|
|
else:
|
|
upload_contents = file_contents
|
|
|
|
(auth,) = receive_exactly(
|
|
sock, 1, "auth", [RESPONSE_REQUEST_AUTH, RESPONSE_AUTH_OK]
|
|
)
|
|
if auth == RESPONSE_REQUEST_AUTH:
|
|
if not password:
|
|
raise OTAError("ESP requests password, but no password given!")
|
|
nonce = receive_exactly(
|
|
sock, 32, "authentication nonce", [], decode=False
|
|
).decode()
|
|
_LOGGER.debug("Auth: Nonce is %s", nonce)
|
|
cnonce = hashlib.md5(str(random.random()).encode()).hexdigest()
|
|
_LOGGER.debug("Auth: CNonce is %s", cnonce)
|
|
|
|
send_check(sock, cnonce, "auth cnonce")
|
|
|
|
result_md5 = hashlib.md5()
|
|
result_md5.update(password.encode("utf-8"))
|
|
result_md5.update(nonce.encode())
|
|
result_md5.update(cnonce.encode())
|
|
result = result_md5.hexdigest()
|
|
_LOGGER.debug("Auth: Result is %s", result)
|
|
|
|
send_check(sock, result, "auth result")
|
|
receive_exactly(sock, 1, "auth result", RESPONSE_AUTH_OK)
|
|
|
|
upload_size = len(upload_contents)
|
|
upload_size_encoded = [
|
|
(upload_size >> 24) & 0xFF,
|
|
(upload_size >> 16) & 0xFF,
|
|
(upload_size >> 8) & 0xFF,
|
|
(upload_size >> 0) & 0xFF,
|
|
]
|
|
send_check(sock, upload_size_encoded, "binary size")
|
|
receive_exactly(sock, 1, "binary size", RESPONSE_UPDATE_PREPARE_OK)
|
|
|
|
upload_md5 = hashlib.md5(upload_contents).hexdigest()
|
|
_LOGGER.debug("MD5 of upload is %s", upload_md5)
|
|
|
|
send_check(sock, upload_md5, "file checksum")
|
|
receive_exactly(sock, 1, "file checksum", RESPONSE_BIN_MD5_OK)
|
|
|
|
# Disable nodelay for transfer
|
|
sock.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 0)
|
|
# Limit send buffer (usually around 100kB) in order to have progress bar
|
|
# show the actual progress
|
|
|
|
sock.setsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF, UPLOAD_BUFFER_SIZE)
|
|
# Set higher timeout during upload
|
|
sock.settimeout(30.0)
|
|
start_time = time.perf_counter()
|
|
|
|
offset = 0
|
|
progress = ProgressBar()
|
|
while True:
|
|
chunk = upload_contents[offset : offset + UPLOAD_BLOCK_SIZE]
|
|
if not chunk:
|
|
break
|
|
offset += len(chunk)
|
|
|
|
try:
|
|
sock.sendall(chunk)
|
|
if version >= OTA_VERSION_2_0:
|
|
receive_exactly(sock, 1, "chunk OK", RESPONSE_CHUNK_OK)
|
|
except OSError as err:
|
|
sys.stderr.write("\n")
|
|
raise OTAError(f"Error sending data: {err}") from err
|
|
|
|
progress.update(offset / upload_size)
|
|
progress.done()
|
|
|
|
# Enable nodelay for last checks
|
|
sock.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)
|
|
duration = time.perf_counter() - start_time
|
|
|
|
_LOGGER.info("Upload took %.2f seconds, waiting for result...", duration)
|
|
|
|
receive_exactly(sock, 1, "receive OK", RESPONSE_RECEIVE_OK)
|
|
receive_exactly(sock, 1, "Update end", RESPONSE_UPDATE_END_OK)
|
|
send_check(sock, RESPONSE_OK, "end acknowledgement")
|
|
|
|
_LOGGER.info("OTA successful")
|
|
|
|
# Do not connect logs until it is fully on
|
|
time.sleep(1)
|
|
|
|
|
|
def run_ota_impl_(remote_host, remote_port, password, filename):
|
|
try:
|
|
res = resolve_ip_address(remote_host, remote_port)
|
|
except EsphomeError as err:
|
|
_LOGGER.error(
|
|
"Error resolving IP address of %s. Is it connected to WiFi?",
|
|
remote_host,
|
|
)
|
|
_LOGGER.error(
|
|
"(If this error persists, please set a static IP address: "
|
|
"https://esphome.io/components/wifi.html#manual-ips)"
|
|
)
|
|
raise OTAError(err) from err
|
|
|
|
for r in res:
|
|
af, socktype, _, _, sa = r
|
|
_LOGGER.info("Connecting to %s port %s...", sa[0], sa[1])
|
|
sock = socket.socket(af, socktype)
|
|
sock.settimeout(10.0)
|
|
try:
|
|
sock.connect(sa)
|
|
except OSError as err:
|
|
sock.close()
|
|
_LOGGER.error("Connecting to %s port %s failed: %s", sa[0], sa[1], err)
|
|
continue
|
|
|
|
_LOGGER.info("Connected to %s", sa[0])
|
|
with open(filename, "rb") as file_handle:
|
|
try:
|
|
perform_ota(sock, password, file_handle, filename)
|
|
except OTAError as err:
|
|
_LOGGER.error(str(err))
|
|
return 1
|
|
finally:
|
|
sock.close()
|
|
|
|
return 0
|
|
|
|
_LOGGER.error("Connection failed.")
|
|
return 1
|
|
|
|
|
|
def run_ota(remote_host, remote_port, password, filename):
|
|
try:
|
|
return run_ota_impl_(remote_host, remote_port, password, filename)
|
|
except OTAError as err:
|
|
_LOGGER.error(err)
|
|
return 1
|