Skip to content

EVerest ChargeSOM 0.9.0#99

Open
FaHaGit wants to merge 7 commits intoeverest/charge_somfrom
everest/chargesom-0.9.0
Open

EVerest ChargeSOM 0.9.0#99
FaHaGit wants to merge 7 commits intoeverest/charge_somfrom
everest/chargesom-0.9.0

Conversation

@FaHaGit
Copy link
Copy Markdown
Contributor

@FaHaGit FaHaGit commented May 4, 2026

Refresh EVerest ChargeSOM documentation for release 0.9.0

FaHaGit added 7 commits April 29, 2026 15:20
Signed-off-by: Fabian Hartung <fabian.hartung@chargebyte.com>
Signed-off-by: Fabian Hartung <fabian.hartung@chargebyte.com>
Signed-off-by: Fabian Hartung <fabian.hartung@chargebyte.com>
Signed-off-by: Fabian Hartung <fabian.hartung@chargebyte.com>

docs: fix GitHub link for evse_board_support in EVerest documentation

Signed-off-by: Fabian Hartung <fabian.hartung@chargebyte.com>
Signed-off-by: Fabian Hartung <fabian.hartung@chargebyte.com>
Signed-off-by: Fabian Hartung <fabian.hartung@chargebyte.com>
Signed-off-by: Fabian Hartung <fabian.hartung@chargebyte.com>
@FaHaGit FaHaGit requested review from barsnick and lategoodbye May 4, 2026 13:17
@FaHaGit FaHaGit changed the title Everest ChargeSOM 0.9.0 EVerest ChargeSOM 0.9.0 May 4, 2026
This is the Hardware Abstraction Layer (HAL) for Charge SOM in EVerest. It implements
the `evse_board_support <https://github.com/EVerest/everest-core/blob/main/interfaces/evse_board_support.yaml>`_
This is the Hardware Abstraction Layer (HAL) for the Charge SOM in EVerest. It implements
the `evse_board_support <https://github.com/EVerest/everest/blob/main/interfaces/evse_board_support.yaml>`_
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
the `evse_board_support <https://github.com/EVerest/everest/blob/main/interfaces/evse_board_support.yaml>`_
the `evse_board_support <https://github.com/EVerest/EVerest/blob/main/interfaces/evse_board_support.yaml>`_

Comment thread docs/source/troubleshooting.rst
For TLS and especially Plug & Charge, private keys should be protected according to the requirements of the
certificate authority or certificate management system. In many production environments, this means using
hardware-backed key storage such as a TPM, HSM, or comparable technology.
Charge SOM already includes a TPM and is therefore suitable for the secure storage of private keys.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, it's correct that the Charge SOM has a TPM. But as long as it hasn't been proplerly evaluate as a key storage, I would suggest our customers should contact us in case they want to implement a real world PnC scenario.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants