Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Contribute to GitLab
Sign in
Toggle navigation
nexboot
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
esp
nexboot
Commits
c55372c5
Commit
c55372c5
authored
May 25, 2018
by
Franco (nextime) Lanza
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add readme.md
parent
70ed0920
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
37 additions
and
0 deletions
+37
-0
README.md
README.md
+37
-0
No files found.
README.md
0 → 100644
View file @
c55372c5
# Nexboot - Bootloader for ESP32 developement boards
I was unable to find any bootloader for ESP32 doing what i would like to have, so,
i started to write my own.
### How to install
*
install and configure esp-ipf and the esp32 toolkit
*
git clone the whole repository and subrepositories under your own project dir
*
make menuconfig to configure nexboot
*
erase the flash in your board ( suggested, not really needed )
*
build and upload as usual with make and make flash on your esp32 developement board.
### Assumptions:
*
you are updating your esp32 developement board.
*
your board have 4MB of flash size, or you will have to change the partitions.csv file
*
you know what you are doing
*
No, it isn't finished and ready to use in production.
*
Yes, i will continue to work on it to improve it and eventually make it production ready.
*
No, i will not fix your computer
### Features
*
update OTA over WiFi, in AP or STA mode, wpa2 supported.
*
update OTA via web browser, on the ESP32 board IP
*
Force bootloader mode on boot by activating GPIO26
*
It leave you 3MB of space for your OTA firmware ( with a 4MB flash )
### Planned
*
HTTPS instead of HTTP ( configurable )
*
Authenticate login on HTTP/s
*
Firmware encryption
*
Firmware hash pre-verification
*
Better HTML/JS
### Status
Fairly limited atm, but it works. Really need a better interface and a lot of other things.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment