Releases: resiliencetheatre/rpi4edgemapdisplay
development release 0.6
Development release to test sensor alarms with Edgemap.
- Utilizes Meshtastic detection sensor module to deliver switch close event as sensor alarm
- Configuration example for wisblock meshtastic starter kit in README.md
See Configuration instructions on README for map data download, meshtastic and GPS serial port configuration.
To create your custom TLS certificate authority and certificates, use provided script:
# /opt/edgemap/ca/tls-setup.sh
Usage: tls-setup.sh [CA-NAME] [DNS-NAME]
# Example:
/opt/edgemap/ca/tls-setup.sh edgeCA edgemapx
# Reboot after this completes:
reboot
This will create CA, device certificate and set hostname to 'edgemapx' and serves that hostname via wifi access point with DNS.
After this you need to connect your end user device (EUD) to edgemap created wifi access point: 'edgemapx' and use PSK: 'abc12345'.
Download CA certificate: http://edgemapx/myCA.crt and store it to your browser.
After these steps you can access your edgemap with https://edgemapx/
development release 0.5
Edgemap with SecurePTT and video conference
- Normal image, not initramfs. System configurations to rootfs are persisted
- defconfig: rpi4_secureptt_6.1_defconfig
- Push-To-Talk DTS overlays for GPIO and CodecZero based PTT buttons
- SecurePTT - image includes one-time-pad secured Push To Talk components
- Janus based tactical video conference for 6 peers. Requires TLS.
- TLS certificates to Apache, 1 year, see: /opt/edgemap/ca/README.txt
- dnsmasq DNS for wifi AP connected devices
- Simplified planet.pmtiles loading with https capable wget
- Partition changes, now we have 3 partitions: boot,rootfs and maps
- Changed gpsd and meshpipe env file locations
- Blinkstick support for indicating SecurePTT channel status
- Latest kernel and RPi firmware
Usage
You can login into unit with console cable or SSH with user 'root' and password: 'edgemap'. Note that first SSH login might take a while to complete because entropy requirement.
After first boot, create non encrypted partition for 'maps' (mounts as /opt/data):
# create-partition-noenc.sh
# reboot
After partition is created and visible, use wget to download planet.pmtiles:
# cd /opt/data
# wget --no-check-certificate https://build.protomaps.com/20240520.pmtiles -O planet.pmtiles
NOTE: This might take several hours to complete. Ethernet port is by default dhcp client, so connect that to your router.
Setting Meshtastic and gpsd serial ports
# Meshtastic radio
/opt/edgemap/meshpipe/meshtastic.env
# GPS receiver
/etc/default/gpsd
You can use /dev/ttyUSB0 and /dev/ttyACM0 etc or use 'by-id' paths to devices:
# GPS
/dev/serial/by-id/usb-Prolific_Technology_Inc._USB-Serial_Controller-if00-port0
# Meshtastic
/dev/serial/by-id/usb-1a86_USB_Single_Serial_5715022418-if00
Access Edgemap web UI
Join 'edgemap' wifi access point with psk 'abc12345' and you are served with DNS name 'edgemap' pointing to 10.1.1.1 (RPi4 address). First you could download 'myCA.crt' and install certificate to your browser, use address: http://edgemap/myCA.crt to download CA certificate. Install it to browser and head to address: https://edgemap/ for Edgemap user interface.
You should create your own certificates (CA + device) and use those. Instructions for this you can find at /opt/edgemap/ca/README
Notes
SecurePTT requires 'parameter files and keys' to operate, these should be equipped to /opt/secureptt. This release does not contain SecurePTT configurations but if you'd like to test this, drop me an message and I can provide test configurations. For PTT button wiring, please see README.md at my Github page [1].
TLS & certificates are horror & OPSEC disaster on tactical edge, but video conference requires TLS.
[1] https://github.com/resiliencetheatre/rpi4edgemapdisplay/tree/secureptt