Skip to content

Commit

Permalink
Child device firmware management specification #1998 (#2007)
Browse files Browse the repository at this point in the history
* Child device firmware management specification #1998
  • Loading branch information
Albin Suresh authored Jun 13, 2023
1 parent 0089b14 commit 7850dd9
Show file tree
Hide file tree
Showing 4 changed files with 237 additions and 0 deletions.
1 change: 1 addition & 0 deletions docs/src/SUMMARY.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,7 @@
- [Plugin API](references/plugin-api.md)
- [Log Management](references/c8y-log-management.md)
- [Configuration Management](references/c8y-configuration-management.md)
- [Firmware Management](references/c8y-firmware-management.md)
- [Thin Edge File Transfer Service](references/tedge-file-transfer-service.md)

- [Index](./SUMMARY.md)
1 change: 1 addition & 0 deletions docs/src/howto-guides/child_device_firmware_management.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ This thin-edge plugin coordinates the firmware update operation handling with Cu
by establishing secure communication with the cloud,
managing firmware file downloads, which are typically large files, even over flaky networks,
caching the downloaded files for re-use across multiple child devices etc.
For more details on the inner workings of this plugin, refer to the [reference guide](./../references/c8y-firmware-management.md).

In order to install the firmware itself on the child device,
an additional piece of software must be developed by the child device owner as well,
Expand Down
234 changes: 234 additions & 0 deletions docs/src/references/c8y-firmware-management.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,234 @@
# Device Firmware Management using Cumulocity

Thin-edge provides an operation plugin to
[manage device firmware using Cumulocity](https://cumulocity.com/guides/users-guide/device-management/#firmware-repo).
Firmware management is currently supported only for child devices and not for the main tedge device.

- The firmware update operations are defined and triggered from Cumulocity
- Thin-edge acts as the proxy between Cumulocity and the child device
facilitating the routing of firmware update requests as well as the transfer of firmware binary files from cloud to the device.
- Updating the firmware of a device is done by some device specific firmware management software.
Since thin-edge can not directly interact with that piece of software over whatever third-party protocol it supports,
an additional piece of software, referred to as `child-device-connector` in the rest of this doc,
must be developed by the child device admin to perform the actual installation itself, in coordination with thin-edge.
- The `child-device-connector` may be installed directly on the child device or alongside thin-edge as well,
as long as it can access the HTTP and MQTT APIs of thin-edge interact with the child device directly.

This document describes:
- how to install, configure and use the `c8y-firmware-plugin`
- how to implement a `child-device-connector` following the protocol of `c8y-firmware-plugin`

## Installation

The plugin will be installed at `/usr/bin/c8y-firmware-plugin` by the debian package.
The systemd service definition files for the plugin are also installed at `/lib/systemd/system/c8y-firmware-plugin.service`.

No operations files are created under `/etc/tedge/operations/c8y/`
as this plugin doesn't support firmware updates for the tedge device.
Operation files for child devices must be created as part of their bootstrap process, which is explained later.

## Configuration

The plugin supports a single tedge configuration named `firmware.child.update.timeout`,
that defines the amount of time the plugin wait for a child device to finish a firmware update once the request is delivered.
The default timeout value (in seconds) is `3600` and can be updated with:

```shell
sudo tedge config set firmware.child.update.timeout <value_in_seconds>
```

## Usage

```shell
c8y-firmware-plugin --help
```

```shell
<!-- cmdrun c8y-firmware-plugin --help -->
```

The `c8y-firmware-plugin` has to be run as a daemon on the device.
On systemd supported OSes, it can be run as a daemon service as follows:

```shell
systemctl start c8y-firmware-plugin
systemctl enable c8y-firmware-plugin
```

## Firmware update protocol between thin-edge and the child-devices

The plugin manages the download and delivery of firmware files for child-devices connected to the thin-edge device,
acting as a proxy between the cloud and the child-devices.
The firmware updates are downloaded from the cloud on the thin-edge device then made available to the child-devices over HTTP.
The child devices are notified of incoming firmware update requests via MQTT.
The `child-device-connector` has to subscribe to these MQTT messages, download the firmware files via HTTP,
and notify the firmware plugin of the firmware update progress via MQTT.

* The responsibilities of the plugin are:
* to download the firmware files pushed from the cloud, caching it to be shared with child devices
* to handle network failures during the download even on flaky networks
* to publish the downloaded firmware files over a local HTTP server and make them available to the child-devices,
* to notify the child-devices when firmware updates are available,
* to receive forward the firmware update status updates from the child devices to the cloud
* By contrast, the plugin is not responsible for:
* checking the integrity of the downloaded file which is a third-party binary
* installing the firmware files on the child-devices.
* The `child-device-connector` is required to listen for firmware update related MQTT notifications from the plugin
and behave accordingly along the protocol defined by this plugin.
* Being specific to each type of child device based on its device specific protocol for applying a firmware update.
* This software can be installed on the child device.
* This software can also be installed on the main device,
when the target device cannot be altered or connected to the main device over MQTT and HTTP.

### Child device connector connecting to thin-edge device

The `child-device-connector` is responsible for handling the firmware update requests sent by the thin-edge
and translating it to the relevant 3rd-party device specific API to install the firmware on that device.
The `child-device-connector` interacts with thin-edge over its MQTT and HTTP APIs.
In cases where the child device connector is installed alongside thin-edge on the same device,
these APIs can be accessed via a local IP or even `127.0.0.1`.
The MQTT APIs are exposed via port 1883 and the HTTP APIs are exposed via port 8000, by default.
When the child device connector is running directly on the external child device,
the MQTT and HTTP APIs of thin-edge need to be accessed over the network using its IP address and ports,
which are configured using the tedge config settings `mqtt.client.host` or `mqtt.client.port` for MQTT
and `http.address` and `http.port` for HTTP.


### Child devices declaring firmware management support

For child devices, the operation files must be created under `/etc/tedge/operations/c8y/$CHILD_DEVICE_ID`,
where `$CHILD_DEVICE_ID` should be replaced with the child's identity.
These files are not created by the plugin itself, but must be created by the child device connector or
by any other means for each child device as follows:


```shell
$ tree /etc/tedge/operations/c8y
/etc/tedge/operations/c8y
|-- child-1
| |-- c8y_Firmware
|-- child-2
|-- c8y_Firmware
```

The Cumulocity mapper will detect the creation of these child device operation files
and report them as supported operations for those child devices.

### The child device connector handling firmware update requests from thin-edge device

When the plugin receives a firmware update request file for a child device,
it downloads the firmware file, caches it to be reused on other child devices as well
and exposes it to the child device via its file-transfer service.
It also notifies the cloud on the progress of this firmware update operation
as and when it gets status updates from the child device.

The following diagram captures the required interactions between all relevant parties:

```mermaid
sequenceDiagram
participant C8Y Cloud
participant C8Y Firmware Plugin
participant Tedge Agent
participant Child Device Connector
C8Y Cloud->>C8Y Firmware Plugin: MQTT: c8y_Firmware request with `child-id` and `c8y.url` for the updated firmware file
C8Y Firmware Plugin->>C8Y Cloud: Download the firmware file from `c8y.url` to firmware cache
C8Y Firmware Plugin->>Tedge Agent: Symlink the cached firmware file to file-transfer repository and generate a `tedge.url` for it
C8Y Firmware Plugin->>Child Device Connector: MQTT: firmware_update request to `child-id` with `tedge.url`
Child Device Connector ->> C8Y Firmware Plugin: MQTT: firmware_update response with operation status: "executing"
C8Y Firmware Plugin ->> C8Y Cloud: MQTT: Update c8y_Firmware operation status to "EXECUTING"
Child Device Connector->>Tedge Agent: HTTP: Download the firmware file from `tedge.url`
Child Device Connector->>Child Device Connector: Apply downloaded firmware file
Child Device Connector ->> C8Y Firmware Plugin: MQTT: firmware_update response with operation status: "successful"
C8Y Firmware Plugin ->> C8Y Cloud: MQTT: Update c8y_Firmware operation status to "SUCCESSFUL"
C8Y Firmware Plugin ->> C8Y Firmware Plugin: Remove the symlink from file-transfer repository but keep the cached firmware copy for reuse
```

The following keywords are used in the following section for brevity:

* `TEDGE_DATA_PATH`: The path set by tedge config `data.path`. Default: `/var/tedge`
* `TEDGE_TMP_PATH`: The path set by tedge config `tmp.path`. Default: `/tmp`
* `FIRMWARE_CACHE_PATH`: `$TEDGE_DATA_PATH/cache`
* `FIRMWARE_OP_PATH`: `$TEDGE_DATA_PATH/firmware`
* `FILE_TRANSFER_REPO`: `$TEDGE_DATA_PATH/file-transfer`
* `TEDGE_HTTP_ADDRESS`: The combination of tedge configs `http.address`:`http.port`
* `OP_ID`: An operation ID
* `FILE_ID`: A firmware file id derived from the SHA-256 digest of the firmware url

1. The plugin, on reception of a `c8y_Firmware` request from Cumulocity for a child device named `$CHILD_DEVICE_ID`
in the SmartREST format `515,$CHILD_DEVICE_ID,$FIRMWARE_NAME,$FIRMWARE_VERSION,$FIRMWARE_URL`
1. Validate if the same firmware update operation is already in progress
by iterating over all the operation files in the `$FIRMWARE_OP_PATH` directory.
The operation files contains the last `firmware_update` request's JSON payload along with the `device` ID.
If an operation file with the `child_id` id, `name`, `version` and `url` fields matching
the incoming `$FIRMWARE_NAME`,`$FIRMWARE_VERSION` and `$FIRMWARE_URL` is found,
the same request is re-sent to the child device by just incrementing the `attempt` count value.
The operation file content is also overwritten the with updated `attempt` count.
1. If a pending operation match is not found, do a look up if the firmware file for the given url already exists
in its firmware cache at `$FIRMWARE_CACHE_PATH`.
The file name for the lookup is derived from the SHA-256 digest of the firmware url.
1. If a cached copy is not found in the firmware cache, the plugin downloads the firmware file from the `url`
to `$FIRMWARE_CACHE_PATH` with the name derived from the SHA-256 digest of the firmware url.
If a cached firmware copy is found, downloading is skipped.
1. Create an operation file at `$FIRMWARE_OP_PATH/$OP_ID`
with a JSON record containing the following fields:
* `operation_id`: A unique id generated by the plugin
* `child_id`: The child device ID received in the cloud request
* `name`: Name of the firmware received in the cloud request
* `version`: Version of the firmware received in the cloud request
* `server_url`: The firmware URL received in the cloud request
* `tedge_url`: The file-transfer service entry URL for the downloaded firmware file (`http://$TEDGE_HTTP_ADDRESS/tedge/file-transfer/$CHILD_DEVICE_ID/firmware_update/$FILE_ID`)
* `sha256`: The SHA-256 checksum of the firmware file served via the `tedge_url`
* `attempt`: The count that indicates if this request is being resent or not, with an initial value of `1`
1. After creating the operation file, do a look up if the firmware file for the given url already exists
1. The cached firmware file is published via the file-transfer repository of `tedge-agent`
by creating a symlink to the cached firmware file is created in the file-transfer repository at
`$FILE_TRANSFER_REPO/$CHILD_DEVICE_ID/firmware_update/$FILE_ID` making this file available via
the HTTP endpoint: `http://$TEDGE_HTTP_ADDRESS/tedge/file-transfer/$CHILD_DEVICE_ID/firmware_update/$FILE_ID`.
1. Once the updated firmware file is published via the HTTP file transfer service,
the plugin send the `firmware_update` request to the child device connector by publishing an MQTT message:
* Topic: `tedge/$CHILD_DEVICE_ID/commands/req/firmware_update`
* The payload is a JSON record with the following fields
* `id`: A unique id generated by the plugin
* `name`: Name of the firmware received in the cloud request
* `version`: Version of the firmware received in the cloud request
* `url`: The file-transfer service entry URL(`http://$TEDGE_HTTP_ADDRESS/tedge/file-transfer/$CHILD_DEVICE_ID/firmware_update/$FILE_ID`)
* `sha256`: The SHA-256 checksum of the firmware file served via the `url`
* `attempt`: The count that indicates if this request is being resent or not, starting from `1` for the original request
1. On reception of the firmware update request on the topic `tedge/$CHILD_DEVICE_ID/commands/req/firmware_update`,
the child device connector is expected to do the following:
1. Send an acknowledgement of the receipt of the request by sending an executing status message via MQTT:
* Topic: `tedge/$CHILD_DEVICE_ID/commands/res/firmware_update`
* Payload must be a JSON record with the following fields
* `id`: The `id` of the request
* `status`: "executing"
1. `GET`s the firmware file from the `url` specified by the notification message.
1. Validate the integrity of the downloaded binary by matching its SHA-256 hash value
against the `sha256` checksum value received in the request.
1. Apply the downloaded firmware file update on the device using whatever device specific protocol.
1. After applying the update, send the final operation status update to thin-edge via MQTT:
1. Topic: `tedge/$CHILD_DEVICE_ID/commands/res/firmware_update`
1. The payload must be a JSON record with the following fields:
* `id`: The `id` of the request received
* `status`: `successful` or `failed` based on the result of updating the firmware
* `reason`: The reason for the failure, applicable only for `failed` status.
1. On reception of an operation status message, the plugin maps it to SmartREST and forwards it to the cloud.
* When a `successful` or `failed` status message is finally received,
then the plugin cleans up the corresponding operation file at `$FIRMWARE_OP_PATH/$OP_ID` and
the firmware file entry in the file transfer repository at `$FILE_TRANSFER_REPO/$CHILD_DEVICE_ID/firmware_update/$FILE_ID`.
* If a notification message is received while none is expected,
i.e with an operation `id` that doesn't exist at `$TEDGE_DATA_PATH/firmware/<id>`,
then this notification message is deemed stale and ignored.

## Logging

The plugin logs its progress and errors on to its `stderr`.

The following details are logged:
* All the `c8y_Firmware` requests received from Cumulocity
* All the mapped `firmware_update` requests sent to each child device
* The `firmware_update` responses received from the chold devices
* All errors are reported with the operation context
1 change: 1 addition & 0 deletions docs/src/references/references.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,4 +28,5 @@
- [Plugin API](./plugin-api.md)
- [Log Management](./c8y-log-management.md)
- [Configuration Management](./c8y-configuration-management.md)
- [Firmware Management](./c8y-firmware-management.md)
- [Thin Edge File Transfer Service](./tedge-file-transfer-service.md)

1 comment on commit 7850dd9

@github-actions
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Robot Results

✅ Passed ❌ Failed ⏭️ Skipped Total Pass %
221 0 5 221 100

Passed Tests

Name ⏱️ Duration Suite
Define Child device 1 ID 0.021 s C8Y Child Alarms Rpi
Normal case when the child device does not exist on c8y cloud 1.746 s C8Y Child Alarms Rpi
Normal case when the child device already exists 0.734 s C8Y Child Alarms Rpi
Reconciliation when the new alarm message arrives, restart the mapper 1.2570000000000001 s C8Y Child Alarms Rpi
Reconciliation when the alarm that is cleared 65.473 s C8Y Child Alarms Rpi
Prerequisite Parent 14.239 s Child Conf Mgmt Plugin
Prerequisite Child 0.227 s Child Conf Mgmt Plugin
Child device bootstrapping 14.559 s Child Conf Mgmt Plugin
Snapshot from device 61.472 s Child Conf Mgmt Plugin
Child device config update 62.334 s Child Conf Mgmt Plugin
Configuration types should be detected on file change (without restarting service) 45.258 s Inotify Crate
Check lock file existence in default folder 1.27 s Lock File
Check PID number in lock file 1.537 s Lock File
Check PID number in lock file after restarting the services 2.001 s Lock File
Check starting same service twice 0.926 s Lock File
Switch off lock file creation 1.322 s Lock File
Set configuration when file exists 15.261 s Configuration Operation
Set configuration when file does not exist 5.756 s Configuration Operation
Set configuration with broken url 4.457 s Configuration Operation
Get configuration 5.051 s Configuration Operation
Get non existent configuration file 4.849 s Configuration Operation
Get non existent configuration type 4.506 s Configuration Operation
Update configuration plugin config via cloud 4.736 s Configuration Operation
Modify configuration plugin config via local filesystem modify inplace 3.37 s Configuration Operation
Modify configuration plugin config via local filesystem overwrite 3.515 s Configuration Operation
Update configuration plugin config via local filesystem copy 2.992 s Configuration Operation
Update configuration plugin config via local filesystem move (different directory) 2.596 s Configuration Operation
Update configuration plugin config via local filesystem move (same directory) 4.688 s Configuration Operation
Update the custom operation dynamically 51.837 s Dynamically Reload Operation
Custom operation successful 60.02 s Custom Operation
Custom operation fails 180.721 s Custom Operation
Successful firmware operation 56.766 s Firmware Operation
Install with empty firmware name 44.537 s Firmware Operation
Prerequisite Parent 15.585 s Firmware Operation Child Device
Prerequisite Child 7.771 s Firmware Operation Child Device
Child device firmware update 6.177 s Firmware Operation Child Device
Child device firmware update with cache 5.818 s Firmware Operation Child Device
Firmware plugin supports restart via service manager #1932 3.932 s Firmware Operation Child Device Retry
Update Inventory data via inventory.json 1.078 s Inventory Update
Inventory includes the agent fragment with version information 1.629 s Inventory Update
Retrieve a JWT tokens 36.502 s Jwt Request
Mapper recovers and processes output of ongoing software update request 16.035 s Recover And Publish Software Update Message
Check running collectd 0.86 s Monitor Device Collectd
Is collectd publishing MQTT messages? 2.874 s Monitor Device Collectd
Check thin-edge monitoring 3.855 s Monitor Device Collectd
Check grouping of measurements 8.382 s Monitor Device Collectd
Main device registration 1.533 s Device Registration
Child device registration 1.701 s Device Registration
Supports restarting the device 45.987 s Restart Device
Update tedge version from previous using Cumulocity 59.896 s Tedge Self Update
Test if all c8y services are up 97.668 s Service Monitoring
Test if all c8y services are down 102.649 s Service Monitoring
Test if all c8y services are using configured service type 101.02 s Service Monitoring
Test if all c8y services using default service type when service type configured as empty 87.392 s Service Monitoring
Check health status of tedge-mapper-c8y service on broker stop start 19.741 s Service Monitoring
Check health status of tedge-mapper-c8y service on broker restart 21.557 s Service Monitoring
Check health status of child device service 18.123 s Service Monitoring
Successful shell command with output 3.188 s Shell Operation
Check Successful shell command with literal double quotes output 3.053 s Shell Operation
Execute multiline shell command 3.122 s Shell Operation
Failed shell command 2.984 s Shell Operation
Software list should be populated during startup 28.239 s Software
Install software via Cumulocity 31.722 s Software
Software list should only show currently installed software and not candidates 23.393 s Software
Child devices support sending simple measurements 1.213 s Child Device Telemetry
Child devices support sending custom measurements 2.9699999999999998 s Child Device Telemetry
Child devices support sending custom events 3.002 s Child Device Telemetry
Child devices support sending custom events overriding the type 1.091 s Child Device Telemetry
Child devices support sending custom alarms #1699 3.03 s Child Device Telemetry
Child devices support sending inventory data via c8y topic 0.79 s Child Device Telemetry
Child device supports sending custom child device measurements directly to c8y 1.088 s Child Device Telemetry
Check retained alarms 210.272 s Raise Alarms
Thin-edge devices support sending simple measurements 3.278 s Thin-Edge Device Telemetry
Thin-edge devices support sending simple measurements with custom type 0.88 s Thin-Edge Device Telemetry
Thin-edge devices support sending custom measurements 0.868 s Thin-Edge Device Telemetry
Thin-edge devices support sending custom events 0.829 s Thin-Edge Device Telemetry
Thin-edge devices support sending custom events overriding the type 0.962 s Thin-Edge Device Telemetry
Thin-edge devices support sending custom alarms #1699 3.097 s Thin-Edge Device Telemetry
Thin-edge device supports sending custom Thin-edge device measurements directly to c8y 1.414 s Thin-Edge Device Telemetry
Thin-edge device support sending inventory data via c8y topic 1.205 s Thin-Edge Device Telemetry
thin-edge components support a custom config-dir location via flags 26.32 s Config Dir
Validate updated data path used by tedge-agent 0.173 s Data Path Config
Validate updated data path used by c8y-firmware-plugin 9.677 s Data Path Config
Validate updated data path used by tedge-agent 0.252 s Log Path Config
Install thin-edge via apt 24.889 s Install Apt
Install latest via script (from current branch) 17.881 s Install Tedge
Install specific version via script (from current branch) 19.326 s Install Tedge
Install latest tedge via script (from main branch) 21.739 s Install Tedge
Install then uninstall latest tedge via script (from main branch) 45.827 s Install Tedge
Support starting and stopping services 31.705 s Service-Control
Supports a reconnect 47.853 s Test-Commands
Supports disconnect then connect 35.174 s Test-Commands
Update unknown setting 26.141 s Test-Commands
Update known setting 31.261 s Test-Commands
It checks MQTT messages using a pattern 58.642 s Test-Mqtt
Stop c8y-configuration-plugin 0.065 s Health C8Y-Configuration-Plugin
Update the service file 0.058 s Health C8Y-Configuration-Plugin
Reload systemd files 0.207 s Health C8Y-Configuration-Plugin
Start c8y-configuration-plugin 0.055 s Health C8Y-Configuration-Plugin
Start watchdog service 10.089 s Health C8Y-Configuration-Plugin
Check PID of c8y-configuration-plugin 0.098 s Health C8Y-Configuration-Plugin
Kill the PID 0.208 s Health C8Y-Configuration-Plugin
Recheck PID of c8y-configuration-plugin 6.457 s Health C8Y-Configuration-Plugin
Compare PID change 0.001 s Health C8Y-Configuration-Plugin
Stop watchdog service 0.167 s Health C8Y-Configuration-Plugin
Remove entry from service file 0.206 s Health C8Y-Configuration-Plugin
Stop c8y-log-plugin 0.118 s Health C8Y-Log-Plugin
Update the service file 0.092 s Health C8Y-Log-Plugin
Reload systemd files 0.473 s Health C8Y-Log-Plugin
Start c8y-log-plugin 0.174 s Health C8Y-Log-Plugin
Start watchdog service 10.132 s Health C8Y-Log-Plugin
Check PID of c8y-log-plugin 0.119 s Health C8Y-Log-Plugin
Kill the PID 0.215 s Health C8Y-Log-Plugin
Recheck PID of c8y-log-plugin 6.373 s Health C8Y-Log-Plugin
Compare PID change 0.007 s Health C8Y-Log-Plugin
Stop watchdog service 0.181 s Health C8Y-Log-Plugin
Remove entry from service file 0.098 s Health C8Y-Log-Plugin
Stop tedge-mapper 0.239 s Health Tedge Mapper C8Y
Update the service file 0.124 s Health Tedge Mapper C8Y
Reload systemd files 0.344 s Health Tedge Mapper C8Y
Start tedge-mapper 0.097 s Health Tedge Mapper C8Y
Start watchdog service 10.11 s Health Tedge Mapper C8Y
Check PID of tedge-mapper 0.15 s Health Tedge Mapper C8Y
Kill the PID 0.253 s Health Tedge Mapper C8Y
Recheck PID of tedge-mapper 6.482 s Health Tedge Mapper C8Y
Compare PID change 0.001 s Health Tedge Mapper C8Y
Stop watchdog service 0.22 s Health Tedge Mapper C8Y
Remove entry from service file 0.11 s Health Tedge Mapper C8Y
Stop tedge-agent 0.198 s Health Tedge-Agent
Update the service file 0.11 s Health Tedge-Agent
Reload systemd files 0.359 s Health Tedge-Agent
Start tedge-agent 0.182 s Health Tedge-Agent
Start watchdog service 10.357 s Health Tedge-Agent
Check PID of tedge-mapper 0.182 s Health Tedge-Agent
Kill the PID 0.202 s Health Tedge-Agent
Recheck PID of tedge-agent 6.357 s Health Tedge-Agent
Compare PID change 0.001 s Health Tedge-Agent
Stop watchdog service 0.094 s Health Tedge-Agent
Remove entry from service file 0.118 s Health Tedge-Agent
Stop tedge-mapper-az 0.13 s Health Tedge-Mapper-Az
Update the service file 0.153 s Health Tedge-Mapper-Az
Reload systemd files 0.299 s Health Tedge-Mapper-Az
Start tedge-mapper-az 0.23 s Health Tedge-Mapper-Az
Start watchdog service 10.222 s Health Tedge-Mapper-Az
Check PID of tedge-mapper-az 0.083 s Health Tedge-Mapper-Az
Kill the PID 0.14 s Health Tedge-Mapper-Az
Recheck PID of tedge-agent 6.322 s Health Tedge-Mapper-Az
Compare PID change 0 s Health Tedge-Mapper-Az
Stop watchdog service 0.079 s Health Tedge-Mapper-Az
Remove entry from service file 0.085 s Health Tedge-Mapper-Az
Stop tedge-mapper-collectd 0.187 s Health Tedge-Mapper-Collectd
Update the service file 0.219 s Health Tedge-Mapper-Collectd
Reload systemd files 0.41 s Health Tedge-Mapper-Collectd
Start tedge-mapper-collectd 0.193 s Health Tedge-Mapper-Collectd
Start watchdog service 10.218 s Health Tedge-Mapper-Collectd
Check PID of tedge-mapper-collectd 0.057 s Health Tedge-Mapper-Collectd
Kill the PID 0.131 s Health Tedge-Mapper-Collectd
Recheck PID of tedge-mapper-collectd 6.507 s Health Tedge-Mapper-Collectd
Compare PID change 0.001 s Health Tedge-Mapper-Collectd
Stop watchdog service 0.176 s Health Tedge-Mapper-Collectd
Remove entry from service file 0.206 s Health Tedge-Mapper-Collectd
tedge-collectd-mapper health status 5.953 s Health Tedge-Mapper-Collectd
c8y-log-plugin health status 5.341 s MQTT health endpoints
c8y-configuration-plugin health status 5.763 s MQTT health endpoints
Publish on a local insecure broker 0.288 s Basic Pub Sub
Publish on a local secure broker 2.322 s Basic Pub Sub
Publish on a local secure broker with client authentication 2.005 s Basic Pub Sub
Check remote mqtt broker #1773 3.917 s Remote Mqtt Broker
Apply name filter 0.174 s Filter Packages List Output
Apply maintainer filter 0.282 s Filter Packages List Output
Apply both filters 0.228 s Filter Packages List Output
No filters 0.182 s Filter Packages List Output
Both filters but name filter as empty string 0.096 s Filter Packages List Output
Both filters but maintainer filter as empty string 0.178 s Filter Packages List Output
Both filters as empty string 0.204 s Filter Packages List Output
Wrong package name 0.375 s Improve Tedge Apt Plugin Error Messages
Wrong version 0.428 s Improve Tedge Apt Plugin Error Messages
Wrong type 0.723 s Improve Tedge Apt Plugin Error Messages
tedge_connect_test_positive 0.242 s Tedge Connect Test
tedge_connect_test_negative 0.772 s Tedge Connect Test
tedge_connect_test_sm_services 6.781 s Tedge Connect Test
tedge_disconnect_test_sm_services 60.26 s Tedge Connect Test
Install thin-edge.io 16.032 s Call Tedge
call tedge -V 0.09 s Call Tedge
call tedge -h 0.088 s Call Tedge
call tedge -h -V 0.066 s Call Tedge
call tedge help 0.087 s Call Tedge
tedge config list 0.072 s Call Tedge Config List
tedge config list --all 0.136 s Call Tedge Config List
set/unset device.type 0.515 s Call Tedge Config List
set/unset device.key_path 0.498 s Call Tedge Config List
set/unset device.cert_path 0.665 s Call Tedge Config List
set/unset c8y.root_cert_path 0.568 s Call Tedge Config List
set/unset c8y.smartrest.templates 0.644 s Call Tedge Config List
set/unset az.root_cert_path 0.831 s Call Tedge Config List
set/unset aws.url 0.462 s Call Tedge Config List
set/unset aws.root_cert_path 0.301 s Call Tedge Config List
set/unset aws.mapper.timestamp 0.247 s Call Tedge Config List
set/unset az.mapper.timestamp 0.262 s Call Tedge Config List
set/unset mqtt.bind.address 0.236 s Call Tedge Config List
set/unset mqtt.bind.port 0.229 s Call Tedge Config List
set/unset http.bind.port 0.273 s Call Tedge Config List
set/unset tmp.path 0.379 s Call Tedge Config List
set/unset logs.path 0.318 s Call Tedge Config List
set/unset run.path 0.242 s Call Tedge Config List
set/unset firmware.child.update.timeout 0.212 s Call Tedge Config List
set/unset c8y.url 0.216 s Call Tedge Config List
set/unset az.url 0.23 s Call Tedge Config List
set/unset mqtt.external.bind.port 0.227 s Call Tedge Config List
mqtt.external.bind.address 0.232 s Call Tedge Config List
mqtt.external.bind.interface 0.247 s Call Tedge Config List
set/unset mqtt.external.ca_path 0.234 s Call Tedge Config List
set/unset mqtt.external.cert_file 0.24 s Call Tedge Config List
set/unset mqtt.external.key_file 0.232 s Call Tedge Config List
set/unset software.plugin.default 0.231 s Call Tedge Config List
Get Put Delete 2.01 s Http File Transfer Api
Set keys should return value on stdout 0.091 s Tedge Config Get
Unset keys should not return anything on stdout and warnings on stderr 0.337 s Tedge Config Get
Invalid keys should not return anything on stdout and warnings on stderr 0.204 s Tedge Config Get
Set configuration via environment variables 1.187 s Tedge Config Get
Set unknown configuration via environment variables 0.155 s Tedge Config Get

Please sign in to comment.