@@ -84,7 +84,6 @@ extern "C" {
84
84
#define F_UpdateEnd () (mode_z ? F_Update.endz() : F_Update.end())
85
85
#define F_abort () if (mode_z) F_Update.abortz(); else F_Update.abort()
86
86
#define F_writeStream () (mode_z ? F_Update.writezStream(*_stream, updateSize) : F_Update.writeStream(*_stream))
87
- #define F_isGzStream () false
88
87
#elif __has_include("ESP32-targz.h")
89
88
#pragma message "Using GzUpdateClass as Update agent"
90
89
#include < ESP32-targz.h>
@@ -160,24 +159,12 @@ class CryptoMemAsset : public CryptoAsset
160
159
};
161
160
162
161
163
- // signature validation available methods
164
- /*
165
- enum SigType_t
166
- {
167
- FOTA_SIG_PREPEND, // signature is contatenated with file (default)
168
- FOTA_SIG_FILE, // signature is in a separate file
169
- FOTA_SIG_JSON_PROPERTY, // signature is a JSON property
170
- FOTA_SIG_HTTP_HEADER // signature is a HTTP header
171
- };
172
- */
173
-
174
162
struct FOTAConfig_t
175
163
{
176
164
const char * name { nullptr };
177
165
const char * manifest_url { nullptr };
178
166
SemverClass sem {0 };
179
167
bool check_sig { false };
180
- // SigType_t type_sig {FOTA_SIG_PREPEND};
181
168
bool unsafe { false };
182
169
bool use_device_id { false };
183
170
CryptoAsset* root_ca { nullptr };
@@ -210,13 +197,9 @@ class esp32FOTA : public UpdateClass
210
197
esp32FOTA (const String &firwmareType, const String &firmwareSemanticVersion, bool validate = false , bool allow_insecure_https = false )
211
198
: esp32FOTA(firwmareType.c_str(), firmwareSemanticVersion.c_str(), validate, allow_insecure_https){};
212
199
213
-
214
-
215
200
template <typename T> void setPubKey ( T* asset ) { _cfg.pub_key = (CryptoAsset*)asset; _cfg.check_sig = true ; }
216
201
template <typename T> void setRootCA ( T* asset ) { _cfg.root_ca = (CryptoAsset*)asset; _cfg.unsafe = false ; }
217
202
218
- // template <class U> static U& getInstance() { static U updater; return updater; }
219
-
220
203
void forceUpdate (const char * firmwareHost, uint16_t firmwarePort, const char * firmwarePath, bool validate );
221
204
void forceUpdate (const char * firmwareURL, bool validate );
222
205
void forceUpdate (bool validate );
0 commit comments