# System commands (ESP only)
# Restart the ESP
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"cmd":"restart"}'
TIP
With Home Assistant, this command is directly available through MQTT auto discovery as a switch into the HASS OpenMQTTGateway device entities list.
# Erase the ESP settings
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"cmd":"erase"}'
TIP
With Home Assistant, this command is directly available through MQTT auto discovery as a switch into the HASS OpenMQTTGateway device entities list.
# Retrieve current status of the ESP
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"cmd":"status"}'
# Auto discovery
You can deactivate the MQTT auto-discovery function, which enables you to create devices/entities with the Home Assistant convention automatically. This function is set to true
at startup for 30 minutes unless you deactivate it.
# Deactivate
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"disc":false}'
# Activate
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"disc":true}'
If you want the settings to be kept upon gateway restart, you can save the state by adding "save":true
(ESP32 only).
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"disc":false, "save":true}'
TIP
Auto discovery is enabled by default on release binaries and platformio.
# AutoDiscovery compatible with OpenHAB (default: false)
OpenHAB does not support the key is_defined
in the json template, to remove it at runtime and make the auto discovery compatible you can use the following command with a retain flag.
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"ohdisc":true}'
If you want the settings to be kept upon gateway restart, you can save the state by adding "save":true
(ESP32 only).
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"ohdisc":true, "save":true}'
TIP
This command can also be used with other controllers that does not support the is_defined key.
# Activate Offline mode
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"offline":true,"save":true}'
# Change the WiFi credentials
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"wifi_ssid":"ssid", "wifi_pass":"password"}'
TIP
If the new connection fails the gateway will fallback to the previous connection.
# Change the gateway password
The password must be 8 characters minimum.
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"gw_pass":"12345678"}'
# Change the MQTT broker credentials
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m
'{
"mqtt_user": "user_name",
"mqtt_pass": "password",
"mqtt_server": "host",
"mqtt_port": "port",
"mqtt_validate": false,
"mqtt_secure": false
}'
2
3
4
5
6
7
8
9
INFO
By default this function is not available on the pre built binary of RFBridge, in order to have less code size and enable to have OTA update working properly. So as to enable it remove from the rf bridge env:
build_flags = '-UMQTTsetMQTT'
TIP
If the new connection fails the gateway will fallback to the previous connection.
# Change the MQTT main topic, discovery prefix, and or gateway name
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m
'{
"mqtt_topic": "topic/",
"discovery_prefix": "prefix",
"gateway_name": "name"
}'
2
3
4
5
6
INFO
This will change the subscribed and published mqtt_topic/gateway_name that the gateway uses. No parameters are mandatory, the current topic or gateway name will be used if not supplied.
# Switching brokers and using signed and client certificates
In the user_config.h
file it is possible to specify multiple MQTT brokers and client certificates.
Additionally, support for multiple brokers and client certificates has been added. To use this, it is required that the server certificate, client certificate, and client key are provided as their own constant string value as demonstrated in the file.
To add more than one broker and switch between them it is necessary to provide all of the relevant certificates/keys and add their respective variable names in the cnt_parameters_array
structure, as shown in user_config.h
..
To switch between these connections with an MQTT command message, the format is as follows:
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m
'{
"mqtt_user": "user",
"mqtt_pass": "password",
"mqtt_server": "host",
"mqtt_port": "port",
"mqtt_secure": true,
"mqtt_validate": true,
"cnt_index":1,
"save_cnt": true
}'
2
3
4
5
6
7
8
9
10
11
TIP
The cnt_index
value corresponds to the 0 to 2 index of the cnt_parameters_array
in user_config.h
.
0 being the default index, containing the onboarding parameters.
To read the connection parameters:
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m
'{
"cnt_index":1,
"read_cnt": true
}'
2
3
4
5
To test a connection change without saving:
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m
'{
"cnt_index":1,
"test_cnt": true
}'
2
3
4
5
TIP
If the client can't connect to the MQTT broker corresponding to the current cnt_index
, it will increment the index to the next valid connection set and restart with it.
# Saving/Loading connection parameters/certificates at runtime
This chapter details the process for managing certificates/connections parameters used for secure MQTT communication with OpenMQTTGateway
# Storing and Loading Certificates
- Flash Memory Storage: Certificates can be saved to the flash memory using specific indices. Valid indices for storing certificates are 1 and 2, as 0 is reserved for the default certificate.
- RAM Memory Loading: Certificates can be loaded from RAM, where valid indices range from 0 to 2. The device publishes a hash of the certificate to the broker to verify its identity. If the connection using the current certificate fails, the device will revert to the previous certificate.
# Use Case: Changing a Group of Certificates
When updating certificates, follow these steps to ensure that the new certificates are correctly loaded and used:
- Push Certificates via MQTT: Send the new certificates one by one through MQTT, using indices 1 or 2. Replace newline characters (\n) in the certificates with spaces.
{
"cnt_index": 1,
"mqtt_server_cert": "-----BEGIN CERTIFICATE----- MIIDQTCC----END CERTIFICATE-----"
}
2
3
4
Accepted certificates are:
mqtt_server_cert
mqtt_client_cert
mqtt_client_key
ota_server_cert
- Verify Certificates in RAM: After pushing the certificates, verify that they have been correctly loaded into RAM.
{
"cnt_index": 1,
"read_cnt": true
}
2
3
4
- Test and Save Certificates: Once verification is complete, test the connection using the new certificates. If the connection is successful, send the command to save the certificates to flash.
{
"cnt_index": 1,
"save_cnt": true
}
2
3
4
Broker Connection: The broker will attempt to use the newly received certificates for the connection.
Successful Connection Handling: If the connection is successful, the certificates are permanently stored in the flash memory at the specified index.
Handling Connection Failures: If the connection fails, the device will revert to the previously used certificate index, and the new certificates will not be saved.
# Firmware update from MQTT (ESP only)
When the gateway used is from a standard ESP32 environment listed and defined here (opens new window), it can be updated through a simple MQTT command:
mosquitto_pub -t "home/OpenMQTTGateway_ESP32_BLE/commands/MQTTtoSYS/firmware_update" -m '{
"version": "latest"
}'
2
3
This would download the latest version firmware binary from Github and install it. It can be used with version 1.5.0 and above.
Note that this update option is also autodiscovered through Home Assistant convention, you can update directly from the device page with 2 clicks.
You can also indicate the target version to update:
mosquitto_pub -t "home/OpenMQTTGateway_ESP32_BLE/commands/MQTTtoSYS/firmware_update" -m '{
"version": "v1.2.0"
}'
2
3
OpenMQTTGateway checks at start and every hour if an update is available.
Alternatively if you want to choose the update URL you can use the command below (ESP32 and ESP8266):
Without certificate, in this case the gateway will use the ota_server_cert certificate defined in default_ota_cert.h
mosquitto_pub -t "home/OpenMQTTGateway_ESP32_BLE/commands/MQTTtoSYS/firmware_update" -m '{
"version": "test",
"password": "OTAPASSWORD",
"url": "https://github.com/1technophile/OpenMQTTGateway/releases/download/v0.9.12/esp32dev-ble-firmware.bin"
}'
2
3
4
5
With certificate (replace the \n in the certificate by spaces to publish it easily):
mosquitto_pub -t "home/OpenMQTTGateway_ESP32_BLE/commands/MQTTtoSYS/firmware_update" -m '{
"version": "test",
"password": "OTAPASSWORD",
"url": "https://github.com/1technophile/OpenMQTTGateway/releases/download/v0.9.12/esp32dev-ble-firmware.bin",
"ota_server_cert": "-----BEGIN CERTIFICATE----- MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= -----END CERTIFICATE-----"}'
2
3
4
5
A bash script is available here also to simplify the use of the server_cert
parameter.
Alternatively the OTA certificate can also be saved with the cnt_index for future use:
mosquitto_pub -t "home/OpenMQTTGateway_ESP32_BLE/commands/MQTTtoSYS/config" -m '{
"cnt_index": 1,
"save_cnt":true,
"ota_server_cert": "-----BEGIN CERTIFICATE----- MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= -----END CERTIFICATE-----"
}'
2
3
4
5
The other connection parameters corresponding to the index need to be valid for the save function to work. This command will switch to connection parameters of index 1.
To enable this functionality, MQTT_HTTPS_FW_UPDATE
will need to be defined or the line that defines in in user_config.h will need to be uncommented.
TIP
If using an unsecure MQTT broker it is highly recommended to disable the password checking by setting the macro MQTT_HTTPS_FW_UPDATE_USE_PASSWORD
to 0 (default is 1 (enabled)), otherwise a clear text password may be sent over the network.
The server_cert
parameter is optional. If the update server has changed or certificate updated or not set in user_config.h
then you can provide the certificate here.
WARNING
The pre-built binaries for rfbridge and avatto-bakeey-ir have the above WiFi and MQTT broker credentials and the Firmware update via MQTT options disabled. This is due to the restricted available flash, so as to still be able to use OTA firmware updates for these boards.
# Communication layers
# MQTT
OpenMQTTGateway uses per default MQTT on top of Ethernet or WiFi for communicating (default: true).
The MQTT communication can be deactivated with the following command:
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"mqtt":false}'
Once activated the MQTT API is no longer accessible
# Serial
Added to MQTT, OpenMQTTGateway cans use Serial to transmit or receive json data (default: false):
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"serial":true}'
The build need to have the following macro:
'-DZgatewaySERIAL="SERIAL"'
An example scenario is a slave offline ESP32 dedicated to RF decoding connected to another online ESP32 through Serial.
# Indicators
# Change the LED indicator brightness
Minimum: 0, Maximum: 255, Default defined by DEFAULT_ADJ_BRIGHTNESS
mosquitto_pub -t "home/OpenMQTTGateway/commands/MQTTtoSYS/config" -m '{"brightness":200}'
# State LED usage
The gateway can support up to 3 LED to display its operating state:
LED_INFO switched ON when network and MQTT connection are OK 5s ON, 5s OFF when MQTT is disconnected 2s ON, 2s OFF when NETWORK is disconnected
LED_RECEIVE Blink for
TimeLedON
1s when the gateway receive a signal from one of its module so as to send to MQTTLED_SEND Blink for
TimeLedON
1s when the gateway send a signal with one of its module from an MQTT command