Skip to content
This repository was archived by the owner on May 8, 2025. It is now read-only.

Commit ec13eac

Browse files
Merge pull request #20 from kylekirkby/adding_ga4
Added GTM code (enabling GA4 analytics)
2 parents fc050ff + 5b8a444 commit ec13eac

File tree

3 files changed

+18
-18
lines changed

3 files changed

+18
-18
lines changed

_config-production.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,4 +11,4 @@ production: true
1111
# Google Analytics
1212
google_analytics:
1313
enabled: true
14-
code: G-83W8JRZD44
14+
code: GTM-MSHJQDC

_config.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ http2_resources:
9595
href: /assets/fonts/lato/Lato-regular.woff2
9696
google_analytics:
9797
enabled: false
98-
code: G-83W8JRZD44
98+
code: GTM-XXXX
9999
cookies:
100100
necessary:
101101
- name: cookieControl
@@ -202,4 +202,4 @@ asset_pipeline:
202202
compress: true
203203
output_path: assets/js
204204
gzip: true
205-
breadcrumb_banner: /assets/images/breadcrumb-banner.jpg
205+
breadcrumb_banner: /assets/images/breadcrumb-banner.jpg

_documentation/readme-zephyr.md

+15-15
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Building and using MCUboot with Zephyr
44

55
# Building and using MCUboot with Zephyr
66

7-
MCUboot began its life as the bootloader for Mynewt. It has since
7+
MCUboot began its life as the bootloader for Mynewt. It has since
88
acquired the ability to be used as a bootloader for Zephyr as well.
99
There are some pretty significant differences in how apps are built
1010
for Zephyr, and these are documented here.
@@ -46,10 +46,10 @@ Install additional packages required for development with MCUboot:
4646
## Building the bootloader itself
4747

4848
The bootloader is an ordinary Zephyr application, at least from
49-
Zephyr's point of view. There is a bit of configuration that needs to
50-
be made before building it. Most of this can be done as documented in
51-
the `CMakeLists.txt` file in boot/zephyr. There are comments there for
52-
guidance. It is important to select a signature algorithm, and decide
49+
Zephyr's point of view. There is a bit of configuration that needs to
50+
be made before building it. Most of this can be done as documented in
51+
the `CMakeLists.txt` file in boot/zephyr. There are comments there for
52+
guidance. It is important to select a signature algorithm, and decide
5353
if the primary slot should be validated on every boot.
5454

5555
To build MCUboot, create a build directory in boot/zephyr, and build
@@ -93,7 +93,7 @@ board and then just make a copy of it to get started on your own
9393
application; see samples/zephyr/README.md for a tutorial.
9494

9595
The Zephyr `CONFIG_BOOTLOADER_MCUBOOT` configuration option
96-
[documentation](http://docs.zephyrproject.org/reference/kconfig/CONFIG_BOOTLOADER_MCUBOOT.html)
96+
[documentation](https://docs.zephyrproject.org/latest/kconfig.html#CONFIG_BOOTLOADER_MCUBOOT)
9797
provides additional details regarding the changes it makes to the image
9898
placement and generation in order for an application to be bootable by
9999
MCUboot.
@@ -105,11 +105,11 @@ With this, build the application as your normally would.
105105
In order to upgrade to an image (or even boot it, if
106106
`MCUBOOT_VALIDATE_PRIMARY_SLOT` is enabled), the images must be signed.
107107
To make development easier, MCUboot is distributed with some example
108-
keys. It is important to stress that these should never be used for
108+
keys. It is important to stress that these should never be used for
109109
production, since the private key is publicly available in this
110-
repository. See below on how to make your own signatures.
110+
repository. See below on how to make your own signatures.
111111

112-
Images can be signed with the `scripts/imgtool.py` script. It is best
112+
Images can be signed with the `scripts/imgtool.py` script. It is best
113113
to look at `samples/zephyr/Makefile` for examples on how to use this.
114114

115115
### Flashing the application
@@ -124,16 +124,16 @@ information. Additionally you will need to make sure that the flash tool does
124124
not perform a mass erase (erasing the whole of the flash) or else you would be
125125
deleting MCUboot.
126126
These images can also be marked for upgrade, and loaded into the secondary slot,
127-
at which point the bootloader should perform an upgrade. It is up to
127+
at which point the bootloader should perform an upgrade. It is up to
128128
the image to mark the primary slot as "image ok" before the next reboot,
129129
otherwise the bootloader will revert the application.
130130

131131
## Managing signing keys
132132

133133
The signing keys used by MCUboot are represented in standard formats,
134-
and can be generated and processed using conventional tools. However,
134+
and can be generated and processed using conventional tools. However,
135135
`scripts/imgtool.py` is able to generate key pairs in all of the
136-
supported formats. See [the docs](/documentation/imgtool/) for more details on
136+
supported formats. See [the docs](/documentation/imgtool/) for more details on
137137
this tool.
138138

139139
### Generating a new keypair
@@ -145,14 +145,14 @@ subcommand:
145145
$ ./scripts/imgtool.py keygen -k mykey.pem -t rsa-2048
146146
```
147147

148-
The argument to `-t` should be the desired key type. See the
148+
The argument to `-t` should be the desired key type. See the
149149
[the docs](/documentation/imgtool/) for more details on the possible key types.
150150

151151
### Extracting the public key
152152

153153
The generated keypair above contains both the public and the private
154-
key. It is necessary to extract the public key and insert it into the
155-
bootloader. The keys live in `boot/zephyr/keys.c`, and can be
154+
key. It is necessary to extract the public key and insert it into the
155+
bootloader. The keys live in `boot/zephyr/keys.c`, and can be
156156
extracted using imgtool:
157157

158158
```

0 commit comments

Comments
 (0)