| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150 | /*Copyright (c) 2017-2021 Sebastien L*/#include "http_server_handlers.h"#include "esp_http_server.h"#include "cmd_system.h"#include <inttypes.h>#include "squeezelite-ota.h"#include "nvs_utilities.h"#include <stdio.h>#include <stdlib.h>#include "cJSON.h"#include "esp_system.h"#include "freertos/FreeRTOS.h"#include "freertos/task.h"#include "platform_config.h"#include "sys/param.h"#include "esp_vfs.h"#include "messaging.h"#include "platform_esp32.h"#include "esp_console.h"#include "argtable3/argtable3.h"#include "platform_console.h"#include "accessors.h"#include "webapp/webpack.h"#include "network_wifi.h"#include "network_status.h"#include "tools.h"#define HTTP_STACK_SIZE	(5*1024)const char str_na[]="N/A";#define STR_OR_NA(s) s?s:str_na/* @brief tag used for ESP serial console messages */static const char TAG[] = "httpd_handlers";/* @brief task handle for the http server */SemaphoreHandle_t http_server_config_mutex = NULL;extern RingbufHandle_t messaging;#define AUTH_TOKEN_SIZE 50typedef struct session_context {    char * auth_token;    bool authenticated;    char * sess_ip_address;    u16_t port;} session_context_t;union sockaddr_aligned {	struct sockaddr     sa;    struct sockaddr_storage st;    struct sockaddr_in  sin;    struct sockaddr_in6 sin6;} aligned_sockaddr_t;esp_err_t post_handler_buff_receive(httpd_req_t * req);static const char redirect_payload1[]="<html><head><title>Redirecting to Captive Portal</title><meta http-equiv='refresh' content='0; url=";static const char redirect_payload2[]="'></head><body><p>Please wait, refreshing.  If page does not refresh, click <a href='";static const char redirect_payload3[]="'>here</a> to login.</p></body></html>";/** * @brief embedded binary data. * @see file "component.mk" * @see https://docs.espressif.com/projects/esp-idf/en/latest/api-guides/build-system.html#embedding-binary-data */esp_err_t redirect_processor(httpd_req_t *req, httpd_err_code_t error);char * alloc_get_http_header(httpd_req_t * req, const char * key){    char*  buf = NULL;    size_t buf_len;    /* Get header value string length and allocate memory for length + 1,     * extra byte for null termination */    buf_len = httpd_req_get_hdr_value_len(req, key) + 1;    if (buf_len > 1) {        buf = malloc_init_external(buf_len);        /* Copy null terminated value string into buffer */        if (httpd_req_get_hdr_value_str(req, "Host", buf, buf_len) == ESP_OK) {            ESP_LOGD_LOC(TAG, "Found header => %s: %s",key, buf);        }    }    return buf;}char * http_alloc_get_socket_address(httpd_req_t *req, u8_t local, in_port_t * portl) {	socklen_t len;	union sockaddr_aligned addr;	len = sizeof(addr);	ip_addr_t * ip_addr=NULL;	char * ipstr = malloc_init_external(INET6_ADDRSTRLEN);	typedef int (*getaddrname_fn_t)(int s, struct sockaddr *name, socklen_t *namelen);	getaddrname_fn_t get_addr = NULL;	int s = httpd_req_to_sockfd(req);	if(s == -1) {		free(ipstr);		return strdup_psram("httpd_req_to_sockfd error");	}	ESP_LOGV_LOC(TAG,"httpd socket descriptor: %u", s);	get_addr = local?&lwip_getsockname:&lwip_getpeername;	if(get_addr(s, (struct sockaddr *)&addr, &len) <0){		ESP_LOGE_LOC(TAG,"Failed to retrieve socket address");		sprintf(ipstr,"N/A (0.0.0.%u)",local);	}	else {		if (addr.sin.sin_family!= AF_INET) {			ip_addr = (ip_addr_t *)&(addr.sin6.sin6_addr);			inet_ntop(addr.sa.sa_family, ip_addr, ipstr, INET6_ADDRSTRLEN);			ESP_LOGV_LOC(TAG,"Processing an IPV6 address : %s", ipstr);			*portl =  addr.sin6.sin6_port;			unmap_ipv4_mapped_ipv6(ip_2_ip4(ip_addr), ip_2_ip6(ip_addr));		}		else {			ip_addr = (ip_addr_t *)&(addr.sin.sin_addr);			inet_ntop(addr.sa.sa_family, ip_addr, ipstr, INET6_ADDRSTRLEN);			ESP_LOGV_LOC(TAG,"Processing an IPV6 address : %s", ipstr);			*portl =  addr.sin.sin_port;		}		inet_ntop(AF_INET, ip_addr, ipstr, INET6_ADDRSTRLEN);		ESP_LOGV_LOC(TAG,"Retrieved ip address:port = %s:%u",ipstr, *portl);	}	return ipstr;}bool is_captive_portal_host_name(httpd_req_t *req){	const char * host_name=NULL;	const char * ap_host_name=NULL;	char * ap_ip_address=NULL;	bool request_contains_hostname = false;	esp_err_t hn_err =ESP_OK, err=ESP_OK;	ESP_LOGD_LOC(TAG,  "Getting adapter host name");	if((err  = tcpip_adapter_get_hostname(TCPIP_ADAPTER_IF_STA, &host_name )) !=ESP_OK) {		ESP_LOGE_LOC(TAG,  "Unable to get host name. Error: %s",esp_err_to_name(err));	}	else {		ESP_LOGD_LOC(TAG,  "Host name is %s",host_name);	}   ESP_LOGD_LOC(TAG,  "Getting host name from request");	char *req_host = alloc_get_http_header(req, "Host");	if(tcpip_adapter_is_netif_up(TCPIP_ADAPTER_IF_AP)){		ESP_LOGD_LOC(TAG,  "Soft AP is enabled. getting ip info");		// Access point is up and running. Get the current IP address		tcpip_adapter_ip_info_t ip_info;		esp_err_t ap_ip_err = tcpip_adapter_get_ip_info(TCPIP_ADAPTER_IF_AP, &ip_info);		if(ap_ip_err != ESP_OK){			ESP_LOGE_LOC(TAG,  "Unable to get local AP ip address. Error: %s",esp_err_to_name(ap_ip_err));		}		else {			ESP_LOGD_LOC(TAG,  "getting host name for TCPIP_ADAPTER_IF_AP");			if((hn_err  = tcpip_adapter_get_hostname(TCPIP_ADAPTER_IF_AP, &ap_host_name )) !=ESP_OK) {				ESP_LOGE_LOC(TAG,  "Unable to get host name. Error: %s",esp_err_to_name(hn_err));				err=err==ESP_OK?hn_err:err;			}			else {				ESP_LOGD_LOC(TAG,  "Soft AP Host name is %s",ap_host_name);			}			ap_ip_address =  malloc_init_external(IP4ADDR_STRLEN_MAX);			memset(ap_ip_address, 0x00, IP4ADDR_STRLEN_MAX);			if(ap_ip_address){				ESP_LOGD_LOC(TAG,  "Converting soft ip address to string");				ip4addr_ntoa_r(&ip_info.ip, ap_ip_address, IP4ADDR_STRLEN_MAX);				ESP_LOGD_LOC(TAG,"TCPIP_ADAPTER_IF_AP is up and has ip address %s ", ap_ip_address);			}		}	}    if((request_contains_hostname 		= (host_name!=NULL) && (req_host!=NULL) && strcasestr(req_host,host_name)) == true){    	ESP_LOGD_LOC(TAG,"http request host = system host name %s", req_host);    }    else if((request_contains_hostname 		= (ap_host_name!=NULL) && (req_host!=NULL) && strcasestr(req_host,ap_host_name)) == true){    	ESP_LOGD_LOC(TAG,"http request host = AP system host name %s", req_host);    }    FREE_AND_NULL(ap_ip_address);    FREE_AND_NULL(req_host);    return request_contains_hostname;}/* Custom function to free context */void free_ctx_func(void *ctx){	session_context_t * context = (session_context_t *)ctx;    if(context){    	ESP_LOGD(TAG, "Freeing up socket context");    	FREE_AND_NULL(context->auth_token);    	FREE_AND_NULL(context->sess_ip_address);    	free(context);    }}session_context_t* get_session_context(httpd_req_t *req){	bool newConnection=false;	if (! req->sess_ctx) {		ESP_LOGD(TAG,"New connection context. Allocating session buffer");		req->sess_ctx = malloc_init_external(sizeof(session_context_t));		req->free_ctx = free_ctx_func;		newConnection = true;		// get the remote IP address only once per session	}	session_context_t *ctx_data = (session_context_t*)req->sess_ctx;	FREE_AND_NULL(ctx_data->sess_ip_address);	ctx_data->sess_ip_address = http_alloc_get_socket_address(req, 0, &ctx_data->port);	if(newConnection){		ESP_LOGI(TAG, "serving %s to peer %s port %u", req->uri, ctx_data->sess_ip_address , ctx_data->port);	}	return (session_context_t *)req->sess_ctx;}bool is_user_authenticated(httpd_req_t *req){	session_context_t *ctx_data = get_session_context(req);	if(ctx_data->authenticated){		ESP_LOGD_LOC(TAG,"User is authenticated.");		return true;	}	ESP_LOGD(TAG, "Heap internal:%zu (min:%zu) external:%zu (min:%zu) dma:%zu (min:%zu)",			heap_caps_get_free_size(MALLOC_CAP_INTERNAL),			heap_caps_get_minimum_free_size(MALLOC_CAP_INTERNAL),			heap_caps_get_free_size(MALLOC_CAP_SPIRAM),			heap_caps_get_minimum_free_size(MALLOC_CAP_SPIRAM),			heap_caps_get_free_size(MALLOC_CAP_DMA),			heap_caps_get_minimum_free_size(MALLOC_CAP_DMA));	// todo:  ask for user to authenticate	return false;}/* Copies the full path into destination buffer and returns * pointer to requested file name */static const char* get_path_from_uri(char *dest, const char *uri, size_t destsize){    size_t pathlen = strlen(uri);    memset(dest,0x0,destsize);    const char *quest = strchr(uri, '?');    if (quest) {        pathlen = MIN(pathlen, quest - uri);    }    const char *hash = strchr(uri, '#');    if (hash) {        pathlen = MIN(pathlen, hash - uri);    }    if ( pathlen + 1 > destsize) {        /* Full path string won't fit into destination buffer */        return NULL;    }    strlcpy(dest , uri, pathlen + 1);    // strip trailing blanks    char * sr = dest+pathlen;    while(*sr== ' ') *sr-- = '\0';    char * last_fs = strchr(dest,'/');    if(!last_fs) ESP_LOGD_LOC(TAG,"no / found in %s", dest);    char * p=last_fs;    while(p && *(++p)!='\0'){    	if(*p == '/') {    		last_fs=p;    	}    }    /* Return pointer to path, skipping the base */    return last_fs? ++last_fs: dest;}#define IS_FILE_EXT(filename, ext) \    (strcasecmp(&filename[strlen(filename) - sizeof(ext) + 1], ext) == 0)/* Set HTTP response content type according to file extension */static esp_err_t set_content_type_from_file(httpd_req_t *req, const char *filename){    if(strlen(filename) ==0){    	// for root page, etc.    	return httpd_resp_set_type(req, HTTPD_TYPE_TEXT);    } else if (IS_FILE_EXT(filename, ".pdf")) {        return httpd_resp_set_type(req, "application/pdf");    } else if (IS_FILE_EXT(filename, ".html")) {        return httpd_resp_set_type(req, HTTPD_TYPE_TEXT);    } else if (IS_FILE_EXT(filename, ".jpeg")) {        return httpd_resp_set_type(req, "image/jpeg");    } else if (IS_FILE_EXT(filename, ".png")) {        return httpd_resp_set_type(req, "image/png");    } else if (IS_FILE_EXT(filename, ".ico")) {        return httpd_resp_set_type(req, "image/x-icon");    } else if (IS_FILE_EXT(filename, ".css")) {        return httpd_resp_set_type(req, "text/css");    } else if (IS_FILE_EXT(filename, ".js")) {        return httpd_resp_set_type(req, "text/javascript");    } else if (IS_FILE_EXT(filename, ".json")) {        return httpd_resp_set_type(req, HTTPD_TYPE_JSON);    } else if (IS_FILE_EXT(filename, ".map")) {        return httpd_resp_set_type(req, "map");    }    /* This is a limited set only */    /* For any other type always set as plain text */    return httpd_resp_set_type(req, "text/plain");}static esp_err_t set_content_type_from_req(httpd_req_t *req){	char filepath[FILE_PATH_MAX];	const char *filename = get_path_from_uri(filepath, req->uri, sizeof(filepath));   if (!filename) {	   ESP_LOGE_LOC(TAG, "Filename is too long");	   /* Respond with 500 Internal Server Error */	   httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Filename too long");	   return ESP_FAIL;   }   /* If name has trailing '/', respond with directory contents */   if (filename[strlen(filename) - 1] == '/' && strlen(filename)>1) {	   httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Browsing files forbidden.");	   return ESP_FAIL;   }   set_content_type_from_file(req, filename);   return ESP_OK;}int resource_get_index(const char * fileName){	for(int i=0;resource_lookups[i][0]!='\0';i++){		if(strstr(resource_lookups[i], fileName)){			return i;		}	}	return -1;}esp_err_t root_get_handler(httpd_req_t *req){	esp_err_t err = ESP_OK;    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    httpd_resp_set_hdr(req, "Access-Control-Allow-Origin", "*");    httpd_resp_set_hdr(req, "Accept-Encoding", "identity");    if(!is_user_authenticated(req)){    	// todo:  send password entry page and return    }	int idx=-1;	if((idx=resource_get_index("index.html"))>=0){		const size_t file_size = (resource_map_end[idx] - resource_map_start[idx]);		httpd_resp_set_hdr(req, "Content-Encoding", "gzip");		err = set_content_type_from_req(req);		if(err == ESP_OK){			httpd_resp_send(req, (const char *)resource_map_start[idx], file_size);		} 	}    else{		httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "index.html not found");	   return ESP_FAIL;	}	ESP_LOGD_LOC(TAG, "done serving [%s]", req->uri);    return err;}esp_err_t resource_filehandler(httpd_req_t *req){    char filepath[FILE_PATH_MAX];   ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);   const char *filename = get_path_from_uri(filepath, req->uri, sizeof(filepath));   if (!filename) {	   ESP_LOGE_LOC(TAG, "Filename is too long");	   /* Respond with 500 Internal Server Error */	   httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Filename too long");	   return ESP_FAIL;   }   /* If name has trailing '/', respond with directory contents */   if (filename[strlen(filename) - 1] == '/') {	   httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Browsing files forbidden.");	   return ESP_FAIL;   }	if(strlen(filename) !=0 && IS_FILE_EXT(filename, ".map")){		return httpd_resp_sendstr(req, "");	}	int idx=-1;	if((idx=resource_get_index(filename))>=0){	    set_content_type_from_file(req, filename);		if(strstr(resource_lookups[idx], ".gz")) {			httpd_resp_set_hdr(req, "Content-Encoding", "gzip");		}	    const size_t file_size = (resource_map_end[idx] - resource_map_start[idx]);	    httpd_resp_send(req, (const char *)resource_map_start[idx], file_size);	}	else {	   ESP_LOGE_LOC(TAG, "Unknown resource [%s] from path [%s] ", filename,filepath);	   /* Respond with 404 Not Found */	   httpd_resp_send_err(req, HTTPD_404_NOT_FOUND, "File does not exist");	   return ESP_FAIL;   }   ESP_LOGD_LOC(TAG, "Resource sending complete");   return ESP_OK;}esp_err_t ap_scan_handler(httpd_req_t *req){    const char empty[] = "{}";	ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }	network_async_scan();	esp_err_t err = set_content_type_from_req(req);	if(err == ESP_OK){		httpd_resp_send(req, (const char *)empty, HTTPD_RESP_USE_STRLEN);	}	return err;}esp_err_t console_cmd_get_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }    /* if we can get the mutex, write the last version of the AP list */	esp_err_t err = set_content_type_from_req(req);	cJSON * cmdlist = get_cmd_list();	char * json_buffer = cJSON_Print(cmdlist);	if(json_buffer){		httpd_resp_send(req, (const char *)json_buffer, HTTPD_RESP_USE_STRLEN);		free(json_buffer);	}	else{		ESP_LOGD_LOC(TAG,  "Error retrieving command json string. ");		httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Unable to format command");	}	cJSON_Delete(cmdlist);	ESP_LOGD_LOC(TAG, "done serving [%s]", req->uri);	return err;}esp_err_t console_cmd_post_handler(httpd_req_t *req){	char success[]="{\"Result\" : \"Success\" }";	ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);	//bool bOTA=false;	//char * otaURL=NULL;	esp_err_t err = post_handler_buff_receive(req);	if(err!=ESP_OK){		return err;	}	if(!is_user_authenticated(req)){		// todo:  redirect to login page		// return ESP_OK;	}	err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}	char *command= ((rest_server_context_t *)(req->user_ctx))->scratch;	cJSON *root = cJSON_Parse(command);	if(root == NULL){		ESP_LOGE_LOC(TAG, "Parsing command. Received content was: %s",command);		httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Malformed command json.  Unable to parse content.");		return ESP_FAIL;	}	char * root_str = cJSON_Print(root);	if(root_str!=NULL){		ESP_LOGD(TAG, "Processing command item: \n%s", root_str);		free(root_str);	}	cJSON *item=cJSON_GetObjectItemCaseSensitive(root, "command");	if(!item){		ESP_LOGE_LOC(TAG, "Command not found. Received content was: %s",command);		httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Malformed command json.  Unable to parse content.");		err = ESP_FAIL;	}	else{		// navigate to the first child of the config structure		char *cmd = cJSON_GetStringValue(item);		if(!console_push(cmd, strlen(cmd) + 1)){			httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Unable to push command for execution");		}		else {			httpd_resp_send(req, (const char *)success, strlen(success));		}	}	ESP_LOGD_LOC(TAG, "done serving [%s]", req->uri);	return err;}esp_err_t ap_get_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }    /* if we can get the mutex, write the last version of the AP list */	esp_err_t err = set_content_type_from_req(req);	if( err == ESP_OK && network_status_lock_json_buffer(( TickType_t ) 200/portTICK_PERIOD_MS)){		char *buff = network_status_alloc_get_ap_list_json();		network_status_unlock_json_buffer();		if(buff!=NULL){			httpd_resp_send(req, (const char *)buff, HTTPD_RESP_USE_STRLEN);			free(buff);		}		else {			ESP_LOGD_LOC(TAG,  "Error retrieving ap list json string. ");			httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Unable to retrieve AP list");		}	}	else {		httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "AP list unavailable");		ESP_LOGE_LOC(TAG,   "GET /ap.json failed to obtain mutex");	}	ESP_LOGD_LOC(TAG, "done serving [%s]", req->uri);	return err;}esp_err_t config_get_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }	esp_err_t err = set_content_type_from_req(req);	if(err == ESP_OK){		char * json = config_alloc_get_json(false);		if(json==NULL){			ESP_LOGD_LOC(TAG,  "Error retrieving config json string. ");			httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Error retrieving configuration object");			err=ESP_FAIL;		}		else {			ESP_LOGD_LOC(TAG,  "config json : %s",json );			cJSON * gplist=get_gpio_list(false);			char * gpliststr=cJSON_PrintUnformatted(gplist);			httpd_resp_sendstr_chunk(req,"{ \"gpio\":");			httpd_resp_sendstr_chunk(req,gpliststr);			httpd_resp_sendstr_chunk(req,", \"config\":");			httpd_resp_sendstr_chunk(req, (const char *)json);			httpd_resp_sendstr_chunk(req,"}");			httpd_resp_sendstr_chunk(req,NULL);			free(gpliststr);			free(json);		}	}	return err;}esp_err_t post_handler_buff_receive(httpd_req_t * req){    esp_err_t err = ESP_OK;    int total_len = req->content_len;    int cur_len = 0;    char *buf = ((rest_server_context_t *)(req->user_ctx))->scratch;    int received = 0;    if (total_len >= SCRATCH_BUFSIZE) {        /* Respond with 500 Internal Server Error */    	ESP_LOGE_LOC(TAG,"Received content was too long. ");        httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR , "Content too long");        err = ESP_FAIL;    }    while (err == ESP_OK && cur_len < total_len) {        received = httpd_req_recv(req, buf + cur_len, total_len);        if (received <= 0) {            /* Respond with 500 Internal Server Error */        	ESP_LOGE_LOC(TAG,"Not all data was received. ");            httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR , "Not all data was received");            err = ESP_FAIL;        }        else {        	cur_len += received;        }    }    if(err == ESP_OK) {    	buf[total_len] = '\0';    }    return err;}esp_err_t config_post_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);	bool bOTA=false;	char * otaURL=NULL;    esp_err_t err = post_handler_buff_receive(req);    if(err!=ESP_OK){        return err;    }    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }	err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}    char *buf = ((rest_server_context_t *)(req->user_ctx))->scratch;    cJSON *root = cJSON_Parse(buf);    if(root == NULL){    	ESP_LOGE_LOC(TAG, "Parsing config json failed. Received content was: %s",buf);    	httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Malformed config json.  Unable to parse content.");    	return ESP_FAIL;    }    char * root_str = cJSON_Print(root);	if(root_str!=NULL){		ESP_LOGD(TAG, "Processing config item: \n%s", root_str);		free(root_str);	}    cJSON *item=cJSON_GetObjectItemCaseSensitive(root, "config");    if(!item){    	ESP_LOGE_LOC(TAG, "Parsing config json failed. Received content was: %s",buf);    	httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Malformed config json.  Unable to parse content.");    	err = ESP_FAIL;    }    else{    	// navigate to the first child of the config structure    	if(item->child) item=item->child;    }	while (item && err == ESP_OK)	{		cJSON *prev_item = item;		item=item->next;		char * entry_str = cJSON_Print(prev_item);		if(entry_str!=NULL){			ESP_LOGD_LOC(TAG, "Processing config item: \n%s", entry_str);			free(entry_str);		}		if(prev_item->string==NULL) {			ESP_LOGD_LOC(TAG,"Config value does not have a name");			httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Malformed config json.  Value does not have a name.");			err = ESP_FAIL;		}		if(err == ESP_OK){			ESP_LOGD_LOC(TAG,"Found config value name [%s]", prev_item->string);			nvs_type_t item_type=  config_get_item_type(prev_item);			if(item_type!=0){				void * val = config_safe_alloc_get_entry_value(item_type, prev_item);				if(val!=NULL){					if(strcmp(prev_item->string, "fwurl")==0) {						if(item_type!=NVS_TYPE_STR){							ESP_LOGE_LOC(TAG,"Firmware url should be type %d. Found type %d instead.",NVS_TYPE_STR,item_type );							httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Malformed config json.  Wrong type for firmware URL.");							err = ESP_FAIL;						}						else {							// we're getting a request to do an OTA from that URL							ESP_LOGW_LOC(TAG,   "Found OTA request!");							otaURL=strdup_psram(val);							bOTA=true;						}					}					else {						if(config_set_value(item_type, prev_item->string , val) != ESP_OK){							ESP_LOGE_LOC(TAG,"Unable to store value for [%s]", prev_item->string);							httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR , "Unable to store config value");							err = ESP_FAIL;						}						else {							ESP_LOGD_LOC(TAG,"Successfully set value for [%s]",prev_item->string);						}					}					free(val);				}				else {					char messageBuffer[101]={};					ESP_LOGE_LOC(TAG,"Value not found for [%s]", prev_item->string);					snprintf(messageBuffer,sizeof(messageBuffer),"Malformed config json.  Missing value for entry %s.",prev_item->string);					httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, messageBuffer);					err = ESP_FAIL;				}			}			else {				ESP_LOGE_LOC(TAG,"Unable to determine the type of config value [%s]", prev_item->string);				httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Malformed config json.  Missing value for entry.");				err = ESP_FAIL;			}		}	}	if(err==ESP_OK){		httpd_resp_sendstr(req, "{ \"result\" : \"OK\" }");		messaging_post_message(MESSAGING_INFO,MESSAGING_CLASS_SYSTEM,"Save Success");	}    cJSON_Delete(root);	if(bOTA) {		if(is_recovery_running){			ESP_LOGW_LOC(TAG,   "Starting process OTA for url %s",otaURL);		}		else {			ESP_LOGW_LOC(TAG,   "Restarting system to process OTA for url %s",otaURL);		}		network_reboot_ota(otaURL);		free(otaURL);	}    return err;}esp_err_t connect_post_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    char success[]="{}";    char * ssid=NULL;    char * password=NULL;    char * host_name=NULL;	esp_err_t err = post_handler_buff_receive(req);	if(err!=ESP_OK){		return err;	}	err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}	char *buf = ((rest_server_context_t *)(req->user_ctx))->scratch;    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }	cJSON *root = cJSON_Parse(buf);	if(root==NULL){		httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR , "JSON parsing error.");		return ESP_FAIL;	}	cJSON * ssid_object = cJSON_GetObjectItem(root, "ssid");	if(ssid_object !=NULL){		ssid = strdup_psram(ssid_object->valuestring);	}	cJSON * password_object = cJSON_GetObjectItem(root, "pwd");	if(password_object !=NULL){		password = strdup_psram(password_object->valuestring);	}	cJSON * host_name_object = cJSON_GetObjectItem(root, "host_name");	if(host_name_object !=NULL){		host_name = strdup_psram(host_name_object->valuestring);	}	cJSON_Delete(root);	if(host_name!=NULL){		if(config_set_value(NVS_TYPE_STR, "host_name", host_name) != ESP_OK){			ESP_LOGW_LOC(TAG,  "Unable to save host name configuration");		}	}	if(ssid !=NULL && strlen(ssid) <= MAX_SSID_SIZE && strlen(password) <= MAX_PASSWORD_SIZE  ){		network_async_connect(ssid, password);		httpd_resp_send(req, (const char *)success, strlen(success));	}	else {		httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Malformed json. Missing or invalid ssid/password.");		err = ESP_FAIL;	}	FREE_AND_NULL(ssid);	FREE_AND_NULL(password);	FREE_AND_NULL(host_name);	return err;}esp_err_t connect_delete_handler(httpd_req_t *req){	char success[]="{}";    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }	esp_err_t err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}	httpd_resp_send(req, (const char *)success, strlen(success));	network_async_delete();    return ESP_OK;}esp_err_t reboot_ota_post_handler(httpd_req_t *req){	char success[]="{}";	ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }    esp_err_t err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}	httpd_resp_send(req, (const char *)success, strlen(success));	network_async_reboot(OTA);    return ESP_OK;}esp_err_t reboot_post_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    char success[]="{}";    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }    esp_err_t err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}	httpd_resp_send(req, (const char *)success, strlen(success));	network_async_reboot(RESTART);	return ESP_OK;}esp_err_t recovery_post_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    char success[]="{}";    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }    esp_err_t err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}	httpd_resp_send(req, (const char *)success, strlen(success));	network_async_reboot(RECOVERY);	return ESP_OK;}esp_err_t flash_post_handler(httpd_req_t *req){	esp_err_t err =ESP_OK;	if(is_recovery_running){		ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);		char success[]="File uploaded. Flashing started.";		if(!is_user_authenticated(req)){			// todo:  redirect to login page			// return ESP_OK;		}		err = httpd_resp_set_type(req, HTTPD_TYPE_TEXT);		if(err != ESP_OK){			return err;		}		char * binary_buffer = malloc_init_external(req->content_len);		if(binary_buffer == NULL){			ESP_LOGE(TAG, "File too large : %d bytes", req->content_len);			/* Respond with 400 Bad Request */			httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST,								"Binary file too large. Unable to allocate memory!");			return ESP_FAIL;		}		ESP_LOGI(TAG, "Receiving ota binary file");		/* Retrieve the pointer to scratch buffer for temporary storage */		char *buf = ((rest_server_context_t *)(req->user_ctx))->scratch;		char *head=binary_buffer;		int received;		/* Content length of the request gives		 * the size of the file being uploaded */		int remaining = req->content_len;		while (remaining > 0) {			ESP_LOGI(TAG, "Remaining size : %d", remaining);			/* Receive the file part by part into a buffer */			if ((received = httpd_req_recv(req, buf, MIN(remaining, SCRATCH_BUFSIZE))) <= 0) {				if (received == HTTPD_SOCK_ERR_TIMEOUT) {					/* Retry if timeout occurred */					continue;				}				FREE_RESET(binary_buffer);				ESP_LOGE(TAG, "File reception failed!");				/* Respond with 500 Internal Server Error */				httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Failed to receive file");				err = ESP_FAIL;				goto bail_out;			}			/* Write buffer content to file on storage */			if (received ) {				memcpy(head,buf,received );				head+=received;			}			/* Keep track of remaining size of			 * the file left to be uploaded */			remaining -= received;		}		/* Close file upon upload completion */		ESP_LOGI(TAG, "File reception complete. Invoking OTA process.");		err = start_ota(NULL, binary_buffer, req->content_len);		if(err!=ESP_OK){			httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "OTA processing failed");			goto bail_out;		}		//todo:  handle this in ajax.  For now, just send the root page		httpd_resp_send(req, (const char *)success, strlen(success));	}bail_out:	return err;}char * get_ap_ip_address(){	static char ap_ip_address[IP4ADDR_STRLEN_MAX]={};	tcpip_adapter_ip_info_t ip_info;	esp_err_t err=ESP_OK;	memset(ap_ip_address, 0x00, sizeof(ap_ip_address));	ESP_LOGD_LOC(TAG,  "checking if soft AP is enabled");	if(tcpip_adapter_is_netif_up(TCPIP_ADAPTER_IF_AP)){		ESP_LOGD_LOC(TAG,  "Soft AP is enabled. getting ip info");		// Access point is up and running. Get the current IP address		err = tcpip_adapter_get_ip_info(TCPIP_ADAPTER_IF_AP, &ip_info);		if(err != ESP_OK){			ESP_LOGE_LOC(TAG,  "Unable to get local AP ip address. Error: %s",esp_err_to_name(err));		}		else {			ESP_LOGV_LOC(TAG,  "Converting soft ip address to string");			ip4addr_ntoa_r(&ip_info.ip, ap_ip_address, IP4ADDR_STRLEN_MAX);			ESP_LOGD_LOC(TAG,"TCPIP_ADAPTER_IF_AP is up and has ip address %s ", ap_ip_address);		}	}	else{		ESP_LOGD_LOC(TAG,"AP Is not enabled. Returning blank string");	}	return ap_ip_address;}esp_err_t process_redirect(httpd_req_t *req, const char * status){	const char location_prefix[] = "http://";	char * ap_ip_address=get_ap_ip_address();	char * remote_ip=NULL;	in_port_t port=0;	char *redirect_url = NULL;	ESP_LOGD_LOC(TAG,  "Getting remote socket address");	remote_ip = http_alloc_get_socket_address(req,0, &port);	size_t buf_size = strlen(redirect_payload1) +strlen(redirect_payload2) + strlen(redirect_payload3) +2*(strlen(location_prefix)+strlen(ap_ip_address))+1;	char * redirect=malloc_init_external(buf_size);	if(strcasestr(status,"302")){		size_t url_buf_size = strlen(location_prefix) + strlen(ap_ip_address)+1;		redirect_url = malloc_init_external(url_buf_size);		memset(redirect_url,0x00,url_buf_size);		snprintf(redirect_url, buf_size,"%s%s/",location_prefix, ap_ip_address);		ESP_LOGW_LOC(TAG,  "Redirecting host [%s] to %s (from uri %s)",remote_ip, redirect_url,req->uri);		httpd_resp_set_hdr(req,"Location",redirect_url);		snprintf(redirect, buf_size,"OK");	}	else {		snprintf(redirect, buf_size,"%s%s%s%s%s%s%s",redirect_payload1, location_prefix, ap_ip_address,redirect_payload2, location_prefix, ap_ip_address,redirect_payload3);		ESP_LOGW_LOC(TAG,  "Responding to host [%s] (from uri %s) with redirect html page %s",remote_ip, req->uri,redirect);	}	httpd_resp_set_type(req, HTTPD_TYPE_TEXT);	httpd_resp_set_hdr(req,"Cache-Control","no-cache");	httpd_resp_set_status(req, status);	httpd_resp_send(req, redirect, HTTPD_RESP_USE_STRLEN);	FREE_AND_NULL(redirect);	FREE_AND_NULL(redirect_url);	FREE_AND_NULL(remote_ip);	return ESP_OK;}esp_err_t redirect_200_ev_handler(httpd_req_t *req){	ESP_LOGD_LOC(TAG,"Processing known redirect url %s",req->uri);	process_redirect(req,"200 OK");	return ESP_OK;}esp_err_t redirect_processor(httpd_req_t *req, httpd_err_code_t error){	esp_err_t err=ESP_OK;	const char * host_name=NULL;	const char * ap_host_name=NULL;	char * user_agent=NULL;	char * remote_ip=NULL;	char * sta_ip_address=NULL;	char * ap_ip_address=get_ap_ip_address();	char * socket_local_address=NULL;	bool request_contains_hostname = false;	bool request_contains_ap_ip_address 	= false;	bool request_is_sta_ip_address 	= false;	bool connected_to_ap_ip_interface 	= false;	bool connected_to_sta_ip_interface = false;	bool useragentiscaptivenetwork = false;    in_port_t port=0;    ESP_LOGV_LOC(TAG,  "Getting remote socket address");    remote_ip = http_alloc_get_socket_address(req,0, &port);	ESP_LOGW_LOC(TAG, "%s requested invalid URL: [%s]",remote_ip, req->uri);    if(network_status_lock_sta_ip_string(portMAX_DELAY)){		sta_ip_address = strdup_psram(network_status_get_sta_ip_string());		network_status_unlock_sta_ip_string();	}	else {    	ESP_LOGE(TAG,"Unable to obtain local IP address from WiFi Manager.");    	httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR , NULL);	}    ESP_LOGV_LOC(TAG,  "Getting host name from request");    char *req_host = alloc_get_http_header(req, "Host");    user_agent = alloc_get_http_header(req,"User-Agent");    if((useragentiscaptivenetwork = (user_agent!=NULL  && strcasestr(user_agent,"CaptiveNetworkSupport"))==true)){    	ESP_LOGW_LOC(TAG,"Found user agent that supports captive networks! [%s]",user_agent);    }	esp_err_t hn_err = ESP_OK;	ESP_LOGV_LOC(TAG,  "Getting adapter host name");	if((hn_err  = tcpip_adapter_get_hostname(TCPIP_ADAPTER_IF_STA, &host_name )) !=ESP_OK) {		ESP_LOGE_LOC(TAG,  "Unable to get host name. Error: %s",esp_err_to_name(hn_err));		err=err==ESP_OK?hn_err:err;	}	else {		ESP_LOGV_LOC(TAG,  "Host name is %s",host_name);	}	in_port_t loc_port=0;	ESP_LOGV_LOC(TAG,  "Getting local socket address");	socket_local_address= http_alloc_get_socket_address(req,1, &loc_port);    ESP_LOGD_LOC(TAG,  "Peer IP: %s [port %u], System AP IP address: %s, System host: %s. Requested Host: [%s], uri [%s]",STR_OR_NA(remote_ip), port, STR_OR_NA(ap_ip_address), STR_OR_NA(host_name), STR_OR_NA(req_host), req->uri);    /* captive portal functionality: redirect to access point IP for HOST that are not the access point IP OR the STA IP */	/* determine if Host is from the STA IP address */    if((request_contains_hostname 		= (host_name!=NULL) && (req_host!=NULL) && strcasestr(req_host,host_name)) == true){    	ESP_LOGD_LOC(TAG,"http request host = system host name %s", req_host);    }    else if((request_contains_hostname 		= (ap_host_name!=NULL) && (req_host!=NULL) && strcasestr(req_host,ap_host_name)) == true){    	ESP_LOGD_LOC(TAG,"http request host = AP system host name %s", req_host);    }    if((request_contains_ap_ip_address 	= (ap_ip_address!=NULL) && (req_host!=NULL) && strcasestr(req_host,ap_ip_address))== true){    	ESP_LOGD_LOC(TAG,"http request host is access point ip address %s", req_host);    }    if((connected_to_ap_ip_interface 	= (ap_ip_address!=NULL) && (socket_local_address!=NULL) && strcasestr(socket_local_address,ap_ip_address))==true){    	ESP_LOGD_LOC(TAG,"http request is connected to access point interface IP %s", ap_ip_address);    }    if((request_is_sta_ip_address 	= (sta_ip_address!=NULL) && (req_host!=NULL) && strcasestr(req_host,sta_ip_address))==true){    	ESP_LOGD_LOC(TAG,"http request host is WiFi client ip address %s", req_host);    }    if((connected_to_sta_ip_interface = (sta_ip_address!=NULL) && (socket_local_address!=NULL) && strcasestr(sta_ip_address,socket_local_address))==true){    	ESP_LOGD_LOC(TAG,"http request is connected to WiFi client ip address %s", sta_ip_address);    }   if((error == 0) || (error == HTTPD_404_NOT_FOUND && connected_to_ap_ip_interface && !(request_contains_ap_ip_address || request_contains_hostname ))) {		process_redirect(req,"302 Found");	}	else {		ESP_LOGD_LOC(TAG,"URL not found, and not processing captive portal so throw regular 404 error");		httpd_resp_send_err(req, error, NULL);	}	FREE_AND_NULL(socket_local_address);	FREE_AND_NULL(req_host);	FREE_AND_NULL(user_agent);    FREE_AND_NULL(sta_ip_address);	FREE_AND_NULL(remote_ip);	return err;}esp_err_t redirect_ev_handler(httpd_req_t *req){	return redirect_processor(req,0);}esp_err_t messages_get_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }    esp_err_t err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}	cJSON * json_messages=  messaging_retrieve_messages(messaging);	if(json_messages!=NULL){		char * json_text= cJSON_Print(json_messages);		httpd_resp_send(req, (const char *)json_text, strlen(json_text));		free(json_text);		cJSON_Delete(json_messages);	}	else {		httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR , "Unable to retrieve messages");	}	return ESP_OK;}esp_err_t status_get_handler(httpd_req_t *req){    ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);    if(!is_user_authenticated(req)){    	// todo:  redirect to login page    	// return ESP_OK;    }    esp_err_t err = set_content_type_from_req(req);	if(err != ESP_OK){		return err;	}	if(network_status_lock_json_buffer(( TickType_t ) 200/portTICK_PERIOD_MS)) {		char *buff = network_status_alloc_get_ip_info_json();		network_status_unlock_json_buffer();		if(buff) {			httpd_resp_send(req, (const char *)buff, strlen(buff));			free(buff);		}		else {			httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR , "Empty status object");		}	}	else {		httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR , "Error retrieving status object");	}	// update status for next status call	network_async_update_status();	return ESP_OK;}esp_err_t err_handler(httpd_req_t *req, httpd_err_code_t error){	esp_err_t err = ESP_OK;    if(error != HTTPD_404_NOT_FOUND){    	err = httpd_resp_send_err(req, error, NULL);    }    else {    	err = redirect_processor(req,error);    }	return err;}
 |