`_
-directory.
-
-.. note::
- Please take special care of the following EVerest module configuration keys, ensuring that they
- point to file system locations which are saved as listed above.
-
- .. list-table:: List of configuration keys pointing to configuration files and directories
- :header-rows: 1
-
- * - EVerest Module
- - Configuration Key
- - Recommended Content
- * - OCPP
- - ChargePointConfigPath
- - :code:`/etc/everest/ocpp-config.json`
- * - OCPP
- - UserConfigPath
- - :code:`/var/lib/everest/ocpp16/user-config.json`
- * - OCPP
- - DatabasePath
- - :code:`/var/lib/everest/ocpp16`
- * - OCPP201
- - CertsPath
- - :code:`/etc/everest/certs`
- * - OCPP201
- - CoreDatabasePath
- - :code:`/var/lib/everest/ocpp201`
- * - OCPP201
- - DeviceModelDatabasePath
- - :code:`/var/lib/everest/ocpp201/device_model_storage.db`
-
-.. note::
- It is assumed that only either OCPP or OCPP201 module is operational at the same time.
-
-.. note::
- Please note, that in case :code:`/etc/everest/config.yaml` is a symlink, after a firmware update
- it is resolved and created as plain file on the updated system.
-
-.. _rollback_mechanism:
-
-Rollback Mechanism
-------------------
-
-The internal storage of chargebyte devices is subdivided into several partitions. This forms a redundant setup with systems A and B, where one system is active and running while the other is inactive. This allows the inactive system to be updated in the background without interrupting the main operation. After a firmware update is performed and the system boots into the new firmware, the previously active system still exists, but is now inactive. It will be used for future firmware updates, and immediately after an update, it serves as a fallback option. This is possible because it can be safely assumed that the previously active system is still in a recent state or at least not in a worse condition than before the firmware update.
-
-The process of using the previous system as a fallback after a firmware update is called the rollback mechanism. Several software components must work together to provide this feature. The main purpose is to ensure that after a firmware update is installed, all software components run smoothly, even with the restored/retained configuration files of the previous system.
-
-How it works
-^^^^^^^^^^^^
-
-As mentioned, the filesystem architecture of chargebyte devices consists of several partitions. During the manufacturing process, two of these partitions are flashed with the same firmware version of the charging software, and both would be bootable per se. After initially starting the board, only the first partition (rootfs A) is activated and used by the bootloader to complete the boot process. When this boot process reaches the point at which it considers itself to be in a known-to-be-good state, it disables the other partition (rootfs B).
-
-The rollback mechanism is activated only while performing a firmware update on chargebyte devices. After starting the update process, the update image file will be installed to the other, currently deactivated partition. The currently booted rootfs filesystem remains unaffected during the update. As soon as the update is successfully installed, the currently booted partition is deactivated. Depending on the update method used, a reboot may occur immediately, such as during an update from a USB pen drive. The bootloader is then responsible for booting the partition with the new firmware image. After successfully starting the charging software, the rollback mechanism is deactivated, and the charging software is fully operational.
-
-But in case something went wrong during the update, the boot process will not be marked as successful. In this case, the bootloader will switch back to boot the previous system again.
-
-As noted, a successfully booted new firmware will disable the rollback mechanism. On the other hand, if the previous system is booted again - and it can be assumed that this system also boots successfully - the previous system will disable the rollback mechanism. Ultimately, the rollback mechanism is automatically disabled after a firmware update is installed or a rollback is performed. In either case, the device operates with functional firmware, providing a stable base for normal operation and future firmware updates.
-
-However, it is worth mentioning that the partitions are not synchronized. Thus, if one rootfs is customized, such as by integrating custom software applications, the other partition remains unaffected. Only the configuration and certificate files stored in :code:`/etc/everest`, database files stored in :code:`/var/lib/everest` as well as custom network device configurations are migrated during the installation of an update. This point must be especially considered before performing a standard firmware update from chargebyte. In the case of customized file system contents, it is recommended to create a customized firmware image update based on the standard update image. For more information regarding the creation of own firmware image updates please refer to section :ref:`firmware_customization` or contact the chargebyte support.
-
-Performing the Rollback Mechanism Manually
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
-In some situations, e.g., rescuing data of the other partition after a firmware update, it might be necessary to perform a manual rollback to the other partition.
-
-The chargebyte device uses the RAUC update framework for updating the device with a new firmware version and managing the boot partitions. Before using RAUC command line tool, it is necessary to establish a connection via SSH or Debug UART. After the connection is established, the status of the RAUC managed partitions can be retrieved by using the :code:`rauc status` console command. The following figure shows the console output of the RAUC status command. Here the board was booted from the first partition “rootfs.0” (A).
-
-.. image:: _static/images/rauc_status.png
- :alt: RAUC status
- :align: center
-
-.. raw:: html
-
-
- Console output of the "rauc status" command
-
-
-The rollback to the other partition can now be performed by using the command :code:`rauc status mark-active other`. The console output should now look like the following figure.
-
-.. image:: _static/images/rauc_status_mark_other.png
- :alt: RAUC status mark-active
- :align: center
-
-.. raw:: html
-
-
- Console output of the "rauc status mark-active other" command
-
-
-After rebooting of the board with command reboot the board should be successfully booted on the other partition. To revert to the initial partition, just repeat this process.
-
-Development Tools
-^^^^^^^^^^^^^^^^^
-
-During development it may be useful to access/mount the inactive partition. Then it is required to first determine the inactive partition using rauc command line tool. To simplify things, a helper shell script is included in the firmware which is called :code:`mount-other-rootfs`. It takes one command line argument as parameter, that is, a target directory used as mountpoint for the inactive root filesystem.
-
-.. code-block:: console
-
- mount-other-rootfs /mnt
-
-Note, that this helper script does not modify any RAUC status information regarding this slot.
-
-.. _programming:
-
-Programming
-===========
-
-It is possible for customers to add new programs and software and/or modify configuration files. Customers can then integrate their custom-developed software components using the Yocto Project to create new Linux firmware images. Please refer to our Board Support Package documentation in our public GitHub repository at: https://github.com/chargebyte/chargebyte-bsp for detailed instructions.
-
-Some general notes and recommendation for custom software development:
-
-* Develop your customer software on your local PC Linux environment, where you can use a compiler, debugger etc. you are familiar with. If the software you developed does not depend on specific hardware components, you can use the `Software-in-the-Loop `_ (SiL) environment provided by EVerest to test your software. If everything works as expected in this setup, you can then switch to cross-compiling for the target system.
-* Using tools like autotools, cmake and pkg-config in your own projects makes the integration and cross-compiling process much easier. Yocto itself has rich support for these widely used tools and provides many examples on how to use them.
-* If you start your project from scratch, have a look at libraries which are already required by EVerest Stack and/or Linux distribution. Re-use these libraries to keep the overall firmware footprint small. The benefit is when updating the boards, it will take less time when transferring the firmware update image and flashing it to internal storage.
-* You need to determine how your software components will interact with the EVerest stack. You can develop your software as an EVerest module and use one of the EVerest interfaces for interaction. Alternatively, you can utilize the simple MQTT-based API provided by the EVerest '`API `_' module, which gives you access to the EVerest stack internals. Check section :ref:`adding-a-custom-everest-module` to figure out how to create an EVerest module.
-
-.. _firmware_customization:
-
-Firmware Update Customization and Signing
------------------------------------------
-
-After making sure that the customized software is working on the board, there might be the requirement to pack this with our pre-flashed firmware to create your own firmware update file which should be signed. This facilitates the production process. The following steps illustrate how to create your own signed firmware update image. For this you would need a native Linux machine or a Linux virtual machine which includes the tool "`RAUC `_". RAUC is the framework we use for performing our firmware update. During the steps, the tool will be used to extract our firmware image, re-pack it including your customized software and sign the new firmware update image. Note that you need your own Public Key Infrastructure (PKI) to sign firmware update images later.
-
-**Steps:**
-
-#. Download chargebyte's digital certificate found on `our website `_ which is used to validate distributed firmware update images.
-#. Use the latest firmware image. How to download the firmware image is described in the section :ref:`download_firmware_images`.
-#. Download and install RAUC tool for the host environment; follow the guide here: https://github.com/rauc/rauc/#user-content-prerequisites . It is also possible, that your Linux distribution already ships with pre-compiled packages which just need to be installed with your package management system. In this case, you can skip this step.
-
- .. code-block:: console
-
- sudo apt-get install build-essential automake libtool libdbus-1-dev libglib2.0-dev libcurl3-dev libssl-dev libjson-glib-dev
- git clone https://github.com/rauc/rauc
- cd rauc
- ./autogen.sh
- ./configure --prefix=/usr
- make
- sudo make install
- cd ..
-
-#. Create your own PKI if you do not have one already (see https://rauc.readthedocs.io/en/latest/advanced.html#security).
-#. Extract the root filesystem image shipped by chargebyte from the firmware update image file. Note that the directory "bundle-staging" will be created, and the content of the firmware update image file will be extracted into it.
-
- .. code-block:: console
-
- rauc extract --keyring=.crt .image bundle-staging
-
- .. note::
- Alternatively, if the above command does not work, you can use the following command:
- .. code-block:: console
-
- unsquashfs -d bundle-staging .image
-
- But this will not verify the signature of the firmware image.
-
-#. Mount the ext4 root filesystem image as a loop device.
-
- .. code-block:: console
-
- sudo mkdir -p /tmp/rootfs
- sudo mount bundle-staging/core-image-minimal-tarragon.ext4 /tmp/rootfs -o loop
-
-#. Modify and extend the root file system image with your customized software by changing the files/directories below the mountpoint.
-
- * Install your PKI certificate which is used later during firmware updates to verify your firmware update file. For this step you need to copy your PKI certificate, created in step 4, and place it under :code:`/tmp/rootfs/etc/rauc/`. Then, replace the :code:`/tmp/rootfs/etc/rauc/keyring.pem` symlink with your PKI certificate.
-
- .. code-block:: console
-
- cp .crt /tmp/rootfs/etc/rauc/
- cd /tmp/rootfs/etc/rauc/
- ln -sf .crt /tmp/rootfs/etc/rauc/keyring.pem
-
- * Copy your additional files, software components etc. from your developer board into this corresponding directory below :code:`/tmp/rootfs`.
-
-#. Unmount the loop device with
-
- .. code-block:: console
-
- sudo umount /tmp/rootfs
-
-
-#. Make sure that the customized filesystem is in a clean state. This is important since otherwise, the installation process and/or the production process would fail.
-
- .. code-block:: console
-
- fsck.ext4 -f bundle-staging/core-image-minimal-.ext4
-
-#. This step only needs to be done, if you want chargebyte to initially flash your own firmware during the manufacturing process of the chargebyte boards.
-
- Create MD5 hashsum of the file with the following command. This hash is used during production process to ensure that the image file is not altered but installed correctly into flash. Please send us this hash.
-
- .. code-block:: console
-
- md5sum bundle-staging/core-image-minimal-.ext4
-
-#. Pack your modified root filesystem image into a firmware update file. The firmware update file must be signed with your PKI using the RAUC tool.
-
- .. code-block:: console
-
- rauc bundle --keyring=.crt --key=.key --cert=.crt bundle-staging .image
-
-#. Test the firmware update image file. On the test board, transfer your PKI to the board via SFTP to :code:`/etc/rauc` folder so that the board accepts your firmware updates. The symbolic link refers originally to our chargebyte certificates, so you probably would need to change this. Once finished, the system should be rebooted.
-
- .. code-block:: console
-
- cd /etc/rauc
- ln -sf .crt /etc/rauc/keyring.pem
- reboot
-
-#. Transfer your newly created firmware update image :code:`.image` via SFTP to :code:`/srv` folder on your test board.
-#. Install the image via SSH or debug UART with the command :code:`rauc install /srv/.image`. Wait until the update is installed and reboot the test board.
-
-Board Customization with USB
-----------------------------
-
-For easier customization of the boards, such as modifying configuration files or updating to new customized firmware, a USB flash drive can be used. This is a two-step process. In the first step, chargebyte's :code:`/etc/rauc/keyring.pem` is replaced with the customer's CA certificate. This step is also done automatically when you insert a USB flash drive into the board's USB port. In the second step, a script that you need to write is triggered automatically to perform the desired customization on the board. Below is a description of how this feature behaves and the requirements that must be fulfilled for a successful process.
-
-Replacement of :code:`/etc/rauc/keyring.pem`
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
-#. Send us your public CA certificate so that we can sign i.e. cross-sign it for you with our certificates.
-#. On a USB flash drive, place your cross-signed CA certificate together with the corresponding signature file. The pair has to be named as follows: :code:`fwupdate-keyring.pem` & :code:`fwupdate-keyring.pem.p7s`. You would get this pair from us as a result of step 1.
-#. Insert the USB flash drive in the USB port of the board. The following behavior will be triggered automatically:
-
- #. The onboard yellow diagnostics LED is turned on to indicate the detected USB flash drive.
- #. It is checked whether the pair :code:`fwupdate-keyring.pem` and :code:`fwupdate-keyring.pem.p7s` exist on the USB flash drive.
- #. It is checked whether :code:`fwupdate-keyring.pem` contains at least one X.509 certificate.
- #. It is checked whether the signature of :code:`fwupdate-keyring.pem` is valid against the current certificate found in :code:`/etc/rauc/keyring.pem`. This is originally a symbolic link referring to our CA certificates. Therefore, step 1 is needed.
- #. If the verification has succeeded, the current :code:`/etc/rauc/keyring.pem` will be deleted, and the content of :code:`fwupdate-keyring.pem` is saved as new :code:`/etc/rauc/keyring.pem`. From this point in time, this new certificate is active for all later uses, i.e. further customizations but also regular firmware updates.
-
-Performing Customization through :code:`autorun.sh`
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
-This assumes that the first step has successfully ended, and the file :code:`/etc/rauc/keyring.pem` now contains your CA certificate. However, this will also work later at any time, as long as the CA certificate matches to the script signature.
-
-#. Write a script that contains the customization you want to do. This has to be named :code:`autorun.sh`.
-#. Sign it by your key and certificate. The resulting signature file must be named :code:`autorun.sh.p7s`.
-#. Place the key and certificate pair on a USB flash drive and insert it in the USB port of the board. The following behavior will be triggered automatically:
-
- #. It is checked whether the pair :code:`autorun.sh` and :code:`autorun.sh.p7s` exist on the USB flash drive.
- #. It is checked whether the signature of :code:`autorun.sh` is valid against the current certificate found in :code:`/etc/rauc/keyring.pem`. Remember, this now usually contains your CA certificate.
- #. If the verification has succeeded, the current working directory is changed to the mount point where the USB flash drive was mounted, and the :code:`autorun.sh` script is executed by means of :code:`/bin/sh`. The changed working directory should make it easier to reference files you want to install from the USB flash drive.
-
-**Notes**
-
-* If a :code:`reboot` is called within the :code:`autorun.sh` script, this will not end the execution of the script immediately, but the upcoming lines of the script will continue to be executed until the reboot command is propagated through the system.
-* Every time the USB flash drive is inserted or a reboot is performed, a re-execution of the customized :code:`autorun.sh`script will be prevented if it has not been changed. This does not depend on the success of the script, i.e. the return value of the script. This is done by saving the MD5 checksum of :code:`autorun.sh` found on the USB flash drive in the file :code:`/var/cache/usb-autorun/executed.list`. This behavior can be controlled in :code:`autorun.sh` by e.g., removing the :code:`executed.list` file completely or just deleting single MD5 checksums from it.
-* Please keep in mind, that certificate verifications are done without time checking since it cannot be ensured that the device has a valid date/time at the moment when you want to use this feature.
-* To sign :code:`autorun.sh` and get :code:`autorun.sh.p7s` as a signature file, the following commands can be used - typically on a Linux developer host system:
-
- .. code-block:: console
-
- openssl smime -sign -outform DER -binary -inkey .key -signer .crt -in autorun.sh -out autorun.sh.p7s
-
-* To verify :code:`autorun.sh` against your CA certificate, the following command can be used:
-
- .. code-block:: console
-
- openssl smime -verify -no_check_time -inform DER -CAfile .crt -content autorun.sh -in autorun.sh.p7s
diff --git a/includes/firmware_upgrade.inc b/includes/firmware_upgrade.inc
deleted file mode 100644
index e9b8e0e..0000000
--- a/includes/firmware_upgrade.inc
+++ /dev/null
@@ -1,99 +0,0 @@
-********
-Firmware
-********
-
-Introduction to Yocto
-=====================
-
-chargebyte hardware platforms are shipped with pre-flashed firmware including one of the following charging stacks:
-
-* EVerest charging stack along with platform specific EVerest modules e.g. CbSystem.
-* chargebyte's proprietary charging stack (only available for Charge Control C)
-
-The shipped firmware was created using the Yocto project; an open-source collaboration initiative that provides templates, tools, and methods to help developers create custom Linux-based systems for embedded devices. It supports a wide range of hardware architectures and provides a consistent, reproducible environment for developing, building, and maintaining embedded systems. To get familiar with the Yocto project, you can find all the required information on the project's `website `_.
-
-.. _firmware_update:
-
-Firmware Upgrade
-================
-
-The following sections describe different ways to install a firmware upgrade on your chargebyte product. Please ensure that the power supply is stable during a firmware upgrade. In case of an unsuccessful update or of power loss during the installation of the update, the chargebyte device performs a rollback to the previous stable version of the charging firmware. For more information about the rollback mechanism, see the section :ref:`rollback_mechanism`. The update is finished when the board is rebooted.
-
-The currently installed firmware version can be checked by reading the content of the file :code:`VERSION` found under :code:`/usr/share/secc`.
-
-.. _download_firmware_images:
-
-Download EVerest Firmware Images
---------------------------------
-
-EVerest firmware images are released by chargebyte on our meta-chargebyte-everest repository, which is the Yocto layer to build the firmware images.
-The image files can be found in the `"Release" section `_ of the
-repository. Here you can find the latest firmware images and also older released versions.
-
-.. note::
-
- Please read the release notes of the firmware image before downloading and installing it. In the
- release notes you can find information about the changes and new features of the firmware image and
- also the version information which "everest-core" tag the firmware image is based on. This information
- is especially important if you build up your cross-compile environment in section :ref:`cross_compiling`.
- Please check that your cross-compile environment is using the same "everest-core" tag as the firmware
- image you want to install.
-
-Device Access
--------------
-
-There are different possibilities to access the device for configuration or update purposes. Please look at section :ref:`connecting-via-ssh-or-serial-interface` for further details.
-
-Update via USB
---------------
-
-**Preparation of the USB update**
-
-#. Download the firmware update image file onto your workstation.
-#. Plug a USB flash drive into your workstation.
-#. Format the USB flash drive as EXT2/3/4, FAT16/32, exFAT or NTFS.
-#. Copy the firmware update image file (:code:`*.image`) onto the USB flash drive's root directory.
-
-Please note that you should not place multiple :code:`*.image` files onto the root folder of the USB flash drive, since it is not guaranteed in which order the files are tried and applied.
-
-**Updating the Firmware**
-
-#. Connect the board to the power supply.
-#. Wait until the board is booted.
-#. Connect to the board via SSH or Debug UART to backup all your own implementation, configuration and databases files.
-#. Plug in the USB flash drive with the Firmware Update Image file in the USB port of the board.
-#. Observe the LED update indications and wait until the whole firmware update and reboot process is finished - it takes up to 5 minutes.
-#. When the firmware update process is finished and the USB flash drive can be unplugged.
-
-Update via SSH and SFTP
------------------------
-
-#. Connect to the board via SSH (e.g. PuTTY).
-#. Backup all your own implementation, configuration and databases files if necessary.
-#. Transfer the update image file via SFTP to the board and store it in the directory :code:`/srv` with e.g. filename my-update.image. On Windows systems you can use e.g. WinSCP or Filezilla.
-#. Run the following command via SSH console: :code:`rauc install /srv/my-update.image`.
-#. The update process should start and report progress and success via console messages.
-#. Reboot into the new system by running the following command via SSH console: :code:`reboot`.
-#. Re-login into the new system and delete the file :code:`/srv/my-update.image`.
-
-Update via SSH or Serial Console and HTTP or FTP
-------------------------------------------------
-
-#. Connect to the board via SSH (e.g. PuTTY) or serial terminal.
-#. Backup all your own implementation, configuration and databases files if necessary.
-#. Place the update image file on a HTTP or FTP server which is reachable via network by your chargebyte device.
-#. Note the URL of the download. In case authentication is required, you must provide the credentials in the URL, e.g. :code:`http://username:passwd@my-site.com/update.image`.
-#. Run the following command via SSH console: :code:`rauc install `, where you replace the URL with your actual URL.
-#. The update process should start and report progress and success via console messages.
-#. After success, reboot into the new system by running the following command via SSH console: :code:`reboot`.
-
-Update via OCPP
----------------
-
-The firmware update via OCPP commands :code:`UpdateFirmware` and :code:`FirmwareStatusNotification` is implemented. Such an update via OCPP automatically triggers a reboot of the charge point after successfully installing the new firmware. The central system is notified about the successful installation before the reboot of the charge point.
-
-Support for casync based Firmware Updates
------------------------------------------
-As mentioned in the previous sections, the firmware update mechanism uses `RAUC `_ as update framework. The traditional method of updating a device is that a big firmware update image file is transferred to the device and then installed. However, this approach is sometimes not ideal, for example when during different firmware releases only few parts changed. To address such scenarios, RAUC itself supports casync based bundles. For more details, please refer to RAUC's own documentation: https://rauc.readthedocs.io/en/latest/advanced.html#rauc-casync-support. It is obvious that such kind of firmware updates require an established Internet connection (or a locally available HTTP/FTP server which can be reached by the charging station) - but the concept does not work for USB pen drive firmware updates.
-
-On casync-enabled chargebyte firmware versions, it is possible to pass a URL referring to a casync firmware update image directly to the RAUC framework via :code:`rauc install `. Please remember that RAUC will use the passed URL to construct a base URL for accessing the smaller chunks. For example the URL :code:`http://example.com/update.raucb` would lead to the assumption that all chunks can be accessed via the base URL :code:`http://example.com/update.castr/`. Note, that the chunk store is a whole directory with many small files inside, not a simple file - the file extension like directory naming might suggest this.
diff --git a/includes/troubleshooting_contact.inc b/includes/troubleshooting_contact.inc
deleted file mode 100644
index 6ef3911..0000000
--- a/includes/troubleshooting_contact.inc
+++ /dev/null
@@ -1,33 +0,0 @@
-Contact
--------
-
-Support
-^^^^^^^
-
-EVerest is an open-source project with a lot of modules, which is supported by a big community.
-chargebyte is an active part of this community. However chargebyte is not able to provide support
-for every aspect of EVerest. In order to get quick answers, here are some suggestions:
-
-Do you have general questions about EVerest, please use the EVerest community's
-`Zulip `_.
-
-Do you have questions about the chargebyte BSP (incl. Yocto), please use
-`our support desk `_.
-
-.. note::
- Before submitting a support request, make sure that all relevant log files have been captured.
- The chapter :ref:`logging_and_debugging` describes the debugging options EVerest offers and shows
- which logs are relevant for the respective case.
-
-Address
-^^^^^^^
-
-chargebyte GmbH
-
-Bitterfelder Straße 1-5
-
-04129 Leipzig
-
-Germany
-
-Website: ``_