Skip to content

Releases: resiliencetheatre/rpi4edgemap

development release 0.9

01 Dec 03:55
Compare
Choose a tag to compare
Pre-release

Development release from meshtastic branch

This development snapshot can be used mainly with meshtastic. There is option to use reticulum but code is still work in progress.

  • New map styles (dark and bright) to work with protomaps v4 pmtiles
  • SecurePTT rx/tx indicator redesign
  • Map style change is possible from radial menu
  • Corrected terrain enable
  • Linux kernel 6.11.10
  • Buildroot master: ed590a22e24bdc714d75005f7fe7a3ad3b001c4d
  • Added macpipe.py to re-key and encrypt LAN access with macsec
  • Meshtastic services are enabled and set by default

You can login with root and password: edgemap

Configure meshtastic radio port at /opt/edgemap/meshpipe/meshtastic.env

See first boot at README for maps partition create, TLS setup and linking pmtiles to right directory.

After this you need to connect your end user device (EUD) to edgemap created wifi access point: '[DNS NAME]' and use PSK: 'abc12345'.

You can open http://[DNS NAME/ where you find link to download CA certificate or you can download CA certificate: http://edgemapx/myCA.crt and store it to your browser.

After these steps you can access your edgemap with http://[DNS NAME]/

This release contains my test SSH key (in /root/.ssh/authorized_keys). Remove that.

development release 0.8

22 Nov 00:22
Compare
Choose a tag to compare
Pre-release

Development release from meshtastic branch

This development snapshot can be used mainly with meshtastic. There is option to use reticulum but code is still work in progress.

  • Updated meshtastic python library to 2.5.4. and tested to be working with meshtastic firmware 2.5.11.

You can login with root and password: edgemap

Link following services under /etc/systemd/system/multi-user.target.wants for meshtastic use:

# First remove all wss, rns and meshchat services (reticulum stuff):
rm  /etc/systemd/system/multi-user.target.wants/wss*
rm  /etc/systemd/system/multi-user.target.wants/rns*
rm  /etc/systemd/system/multi-user.target.wants/meshchat*

# Then link these for auto start on boot (meshtastic stuff):
ln -s /etc/systemd/system/wss-statusin.service /etc/systemd/system/multi-user.target.wants/wss-statusin.service
ln -s /etc/systemd/system/wss-meshpipe.service /etc/systemd/system/multi-user.target.wants/wss-meshpipe.service
ln -s /etc/systemd/system/wss-gpssocket.service /etc/systemd/system/multi-user.target.wants/wss-gpssocket.service
ln -s /etc/systemd/system/meshpipe.service /etc/systemd/system/multi-user.target.wants/meshpipe.service
ln -s /etc/systemd/system/gpsreader.service /etc/systemd/system/multi-user.target.wants/gpsreader.service

Configure meshtastic radio port at /opt/edgemap/meshpipe/meshtastic.env

See first boot at README for maps partition create, TLS setup and linking pmtiles to right directory.

After this you need to connect your end user device (EUD) to edgemap created wifi access point: '[DNS NAME]' and use PSK: 'abc12345'.

You can open http://[DNS NAME/ where you find link to download CA certificate or you can download CA certificate: http://edgemapx/myCA.crt and store it to your browser.

After these steps you can access your edgemap with http://[DNS NAME]/

This release contains my test SSH key (in /root/.ssh/authorized_keys). Remove that.

development release 0.7

02 Nov 04:39
Compare
Choose a tag to compare
Pre-release

Development release

  • Meshtastic python library has bug but meshtastic 2.5.7 should work. Bug affects telemetry display on UI
  • Reticulum development is still work in progress. Works but not optimal.

See first boot at README for maps partition create, TLS setup and linking pmtiles to right directory.

After this you need to connect your end user device (EUD) to edgemap created wifi access point: '[DNS NAME]' and use PSK: 'abc12345'.

Download CA certificate: http://edgemapx/myCA.crt and store it to your browser.

After these steps you can access your edgemap with http://[DNS NAME]/

This release contains my test SSH key (in /root/.ssh/authorized_keys). Remove that.