firmware/src/mesh/http/WebServer.cpp

215 lines
6.0 KiB
C++
Raw Normal View History

#include "mesh/http/WebServer.h"
#include "NodeDB.h"
#include "graphics/Screen.h"
#include "main.h"
#include "mesh/http/WiFiAPClient.h"
#include "sleep.h"
2020-10-22 03:57:44 +00:00
#include <HTTPBodyParser.hpp>
#include <HTTPMultipartBodyParser.hpp>
#include <HTTPURLEncodedBodyParser.hpp>
#include <WebServer.h>
#include <WiFi.h>
#ifdef ARCH_ESP32
2021-01-09 21:47:10 +00:00
#include "esp_task_wdt.h"
#endif
// Persistant Data Storage
#include <Preferences.h>
Preferences prefs;
/*
Including the esp32_https_server library will trigger a compile time error. I've
tracked it down to a reoccurrance of this bug:
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57824
The work around is described here:
https://forums.xilinx.com/t5/Embedded-Development-Tools/Error-with-Standard-Libaries-in-Zynq/td-p/450032
Long story short is we need "#undef str" before including the esp32_https_server.
- Jm Casler (jm@casler.org) Oct 2020
*/
#undef str
// Includes for the https server
// https://github.com/fhessel/esp32_https_server
#include <HTTPRequest.hpp>
#include <HTTPResponse.hpp>
#include <HTTPSServer.hpp>
#include <HTTPServer.hpp>
#include <SSLCert.hpp>
// The HTTPS Server comes in a separate namespace. For easier use, include it here.
using namespace httpsserver;
#include "mesh/http/ContentHandler.h"
2021-08-18 03:40:46 +00:00
static SSLCert *cert;
static HTTPSServer *secureServer;
static HTTPServer *insecureServer;
2021-08-18 03:40:46 +00:00
volatile bool isWebServerReady;
volatile bool isCertReady;
2020-10-22 03:57:44 +00:00
2021-08-18 03:40:46 +00:00
static void handleWebResponse()
{
2021-08-18 03:40:46 +00:00
if (isWifiAvailable()) {
2021-08-18 03:40:46 +00:00
if (isWebServerReady) {
if (secureServer)
2021-08-18 03:40:46 +00:00
secureServer->loop();
insecureServer->loop();
}
}
}
2021-08-18 03:40:46 +00:00
static void taskCreateCert(void *parameter)
{
prefs.begin("MeshtasticHTTPS", false);
#if 0
// Delete the saved certs (used in debugging)
DEBUG_MSG("Deleting any saved SSL keys ...\n");
// prefs.clear();
prefs.remove("PK");
prefs.remove("cert");
#endif
2021-08-18 03:40:46 +00:00
DEBUG_MSG("Checking if we have a previously saved SSL Certificate.\n");
size_t pkLen = prefs.getBytesLength("PK");
size_t certLen = prefs.getBytesLength("cert");
if (pkLen && certLen) {
DEBUG_MSG("Existing SSL Certificate found!\n");
2021-08-18 03:40:46 +00:00
uint8_t *pkBuffer = new uint8_t[pkLen];
prefs.getBytes("PK", pkBuffer, pkLen);
uint8_t *certBuffer = new uint8_t[certLen];
prefs.getBytes("cert", certBuffer, certLen);
cert = new SSLCert(certBuffer, certLen, pkBuffer, pkLen);
DEBUG_MSG("Retrieved Private Key: %d Bytes\n", cert->getPKLength());
DEBUG_MSG("Retrieved Certificate: %d Bytes\n", cert->getCertLength());
} else {
DEBUG_MSG("Creating the certificate. This may take a while. Please wait...\n");
yield();
cert = new SSLCert();
yield();
int createCertResult = createSelfSignedCert(*cert, KEYSIZE_2048, "CN=meshtastic.local,O=Meshtastic,C=US",
"20190101000000", "20300101000000");
yield();
if (createCertResult != 0) {
DEBUG_MSG("Creating the certificate failed\n");
} else {
DEBUG_MSG("Creating the certificate was successful\n");
DEBUG_MSG("Created Private Key: %d Bytes\n", cert->getPKLength());
DEBUG_MSG("Created Certificate: %d Bytes\n", cert->getCertLength());
prefs.putBytes("PK", (uint8_t *)cert->getPKData(), cert->getPKLength());
prefs.putBytes("cert", (uint8_t *)cert->getCertData(), cert->getCertLength());
}
}
2021-08-18 03:40:46 +00:00
isCertReady = true;
// Must delete self, can't just fall out
vTaskDelete(NULL);
}
void createSSLCert()
{
2021-08-18 03:40:46 +00:00
if (isWifiAvailable() && !isCertReady) {
2022-01-24 18:39:17 +00:00
bool runLoop = false;
2021-08-18 03:40:46 +00:00
// Create a new process just to handle creating the cert.
// This is a workaround for Bug: https://github.com/fhessel/esp32_https_server/issues/48
// jm@casler.org (Oct 2020)
xTaskCreate(taskCreateCert, /* Task function. */
"createCert", /* String with name of task. */
// 16384, /* Stack size in bytes. */
8192, /* Stack size in bytes. */
NULL, /* Parameter passed as input of the task */
16, /* Priority of the task. */
NULL); /* Task handle. */
2021-08-18 03:40:46 +00:00
DEBUG_MSG("Waiting for SSL Cert to be generated.\n");
while (!isCertReady) {
if ((millis() / 500) % 2) {
if (runLoop) {
DEBUG_MSG(".");
yield();
esp_task_wdt_reset();
#if HAS_SCREEN
if (millis() / 1000 >= 3) {
screen->setSSLFrames();
}
2022-05-06 13:41:37 +00:00
#endif
}
runLoop = false;
} else {
runLoop = true;
2021-11-26 20:09:16 +00:00
}
2021-08-18 03:40:46 +00:00
}
DEBUG_MSG("SSL Cert Ready!\n");
}
}
WebServerThread *webServerThread;
WebServerThread::WebServerThread() : concurrency::OSThread("WebServerThread") {
if(!config.network.wifi_enabled) {
setInterval(INT32_MAX);
enabled = false;
}
}
int32_t WebServerThread::runOnce()
{
if(!config.network.wifi_enabled) {
setInterval(INT32_MAX);
enabled = false;
}
handleWebResponse();
2022-01-06 06:12:32 +00:00
if (requestRestart && (millis() / 1000) > requestRestart) {
ESP.restart();
}
// Loop every 5ms.
return (5);
}
void initWebServer()
{
DEBUG_MSG("Initializing Web Server ...\n");
// We can now use the new certificate to setup our server as usual.
secureServer = new HTTPSServer(cert);
insecureServer = new HTTPServer();
registerHandlers(insecureServer, secureServer);
if (secureServer) {
2021-08-18 03:40:46 +00:00
DEBUG_MSG("Starting Secure Web Server...\n");
secureServer->start();
}
DEBUG_MSG("Starting Insecure Web Server...\n");
insecureServer->start();
2021-08-18 03:40:46 +00:00
if (insecureServer->isRunning()) {
DEBUG_MSG("Web Servers Ready! :-) \n");
isWebServerReady = true;
} else {
2021-08-18 03:40:46 +00:00
DEBUG_MSG("Web Servers Failed! ;-( \n");
}
}