esp_app_main.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556
  1. /*
  2. * Squeezelite for esp32
  3. *
  4. * (c) Sebastien 2019
  5. * Philippe G. 2019, philippe_44@outlook.com
  6. *
  7. * This software is released under the MIT License.
  8. * https://opensource.org/licenses/MIT
  9. *
  10. */
  11. #include "platform_esp32.h"
  12. #include "led.h"
  13. #include <stdio.h>
  14. #include <string.h>
  15. #include "freertos/FreeRTOS.h"
  16. #include "driver/gpio.h"
  17. #include "driver/spi_master.h"
  18. #include "freertos/task.h"
  19. #include "esp_system.h"
  20. #include "esp_spi_flash.h"
  21. #include "esp_wifi.h"
  22. #include <esp_event.h>
  23. #include "nvs_flash.h"
  24. #include "esp_log.h"
  25. #include "freertos/event_groups.h"
  26. #include "mdns.h"
  27. #include "lwip/api.h"
  28. #include "lwip/err.h"
  29. #include "lwip/netdb.h"
  30. #include "nvs_utilities.h"
  31. #include "trace.h"
  32. #include "network_manager.h"
  33. #include "squeezelite-ota.h"
  34. #include <math.h>
  35. #include "audio_controls.h"
  36. #include "platform_config.h"
  37. #include "telnet.h"
  38. #include "messaging.h"
  39. #include "gds.h"
  40. #include "gds_default_if.h"
  41. #include "gds_draw.h"
  42. #include "gds_text.h"
  43. #include "gds_font.h"
  44. #include "display.h"
  45. #include "accessors.h"
  46. #include "cmd_system.h"
  47. #include "tools.h"
  48. static const char certs_namespace[] = "certificates";
  49. static const char certs_key[] = "blob";
  50. static const char certs_version[] = "version";
  51. const char unknown_string_placeholder[] = "unknown";
  52. const char null_string_placeholder[] = "null";
  53. EventGroupHandle_t network_event_group;
  54. bool bypass_network_manager=false;
  55. const int CONNECTED_BIT = BIT0;
  56. #define JOIN_TIMEOUT_MS (10000)
  57. #define LOCAL_MAC_SIZE 20
  58. static const char TAG[] = "esp_app_main";
  59. #define DEFAULT_HOST_NAME "squeezelite"
  60. char * fwurl = NULL;
  61. RTC_NOINIT_ATTR uint32_t RebootCounter ;
  62. RTC_NOINIT_ATTR uint32_t RecoveryRebootCounter ;
  63. RTC_NOINIT_ATTR uint16_t ColdBootIndicatorFlag;
  64. bool cold_boot=true;
  65. static bool bNetworkConnected=false;
  66. extern const uint8_t server_cert_pem_start[] asm("_binary_github_pem_start");
  67. extern const uint8_t server_cert_pem_end[] asm("_binary_github_pem_end");
  68. // as an exception _init function don't need include
  69. extern void services_init(void);
  70. extern void display_init(char *welcome);
  71. extern void target_init(char *target);
  72. const char * str_or_unknown(const char * str) { return (str?str:unknown_string_placeholder); }
  73. const char * str_or_null(const char * str) { return (str?str:null_string_placeholder); }
  74. bool is_recovery_running;
  75. void cb_connection_got_ip(nm_state_t new_state, int sub_state){
  76. const char *hostname;
  77. static ip4_addr_t ip;
  78. tcpip_adapter_ip_info_t ipInfo;
  79. network_get_ip_info(&ipInfo);
  80. if (ip.addr && ipInfo.ip.addr != ip.addr) {
  81. ESP_LOGW(TAG, "IP change, need to reboot");
  82. if(!wait_for_commit()){
  83. ESP_LOGW(TAG,"Unable to commit configuration. ");
  84. }
  85. esp_restart();
  86. }
  87. // initializing mDNS
  88. network_get_hostname(&hostname);
  89. mdns_init();
  90. mdns_hostname_set(hostname);
  91. ESP_LOGI(TAG, "Network connected and mDNS initialized with %s", hostname);
  92. messaging_post_message(MESSAGING_INFO,MESSAGING_CLASS_SYSTEM,"Network connected");
  93. xEventGroupSetBits(network_event_group, CONNECTED_BIT);
  94. bNetworkConnected=true;
  95. led_unpush(LED_GREEN);
  96. if(is_recovery_running){
  97. // when running in recovery, send a LMS discovery message
  98. // to find a running instance. This is to enable using
  99. // the plugin's proxy mode for FW download and avoid
  100. // expired certificate issues.
  101. discover_ota_server(5);
  102. }
  103. }
  104. void cb_connection_sta_disconnected(nm_state_t new_state, int sub_state){
  105. led_blink_pushed(LED_GREEN, 250, 250);
  106. messaging_post_message(MESSAGING_WARNING,MESSAGING_CLASS_SYSTEM,"Wifi disconnected");
  107. bNetworkConnected=false;
  108. xEventGroupClearBits(network_event_group, CONNECTED_BIT);
  109. }
  110. bool wait_for_wifi(){
  111. bool connected=(xEventGroupGetBits(network_event_group) & CONNECTED_BIT)!=0;
  112. if(!connected){
  113. ESP_LOGD(TAG,"Waiting for Network...");
  114. connected = (xEventGroupWaitBits(network_event_group, CONNECTED_BIT,
  115. pdFALSE, pdTRUE, JOIN_TIMEOUT_MS / portTICK_PERIOD_MS)& CONNECTED_BIT)!=0;
  116. if(!connected){
  117. ESP_LOGW(TAG,"Network timeout.");
  118. }
  119. else
  120. {
  121. ESP_LOGI(TAG,"Network Connected!");
  122. }
  123. }
  124. return connected;
  125. }
  126. char * process_ota_url(){
  127. ESP_LOGI(TAG,"Checking for update url");
  128. char * fwurl=config_alloc_get(NVS_TYPE_STR, "fwurl");
  129. if(fwurl!=NULL)
  130. {
  131. ESP_LOGD(TAG,"Deleting nvs entry for Firmware URL %s", fwurl);
  132. config_delete_key("fwurl");
  133. }
  134. return fwurl;
  135. }
  136. esp_log_level_t get_log_level_from_char(char * level){
  137. if(!strcasecmp(level, "NONE" )) { return ESP_LOG_NONE ;}
  138. if(!strcasecmp(level, "ERROR" )) { return ESP_LOG_ERROR ;}
  139. if(!strcasecmp(level, "WARN" )) { return ESP_LOG_WARN ;}
  140. if(!strcasecmp(level, "INFO" )) { return ESP_LOG_INFO ;}
  141. if(!strcasecmp(level, "DEBUG" )) { return ESP_LOG_DEBUG ;}
  142. if(!strcasecmp(level, "VERBOSE" )) { return ESP_LOG_VERBOSE;}
  143. return ESP_LOG_WARN;
  144. }
  145. void set_log_level(char * tag, char * level){
  146. esp_log_level_set(tag, get_log_level_from_char(level));
  147. }
  148. esp_err_t update_certificates(bool force){
  149. nvs_handle handle;
  150. esp_err_t esp_err;
  151. esp_app_desc_t running_app_info;
  152. ESP_LOGI(TAG, "About to check if certificates need to be updated in flash");
  153. esp_err = nvs_open_from_partition(settings_partition, certs_namespace, NVS_READWRITE, &handle);
  154. if (esp_err != ESP_OK) {
  155. LOG_SEND(MESSAGING_INFO,"Unable to update HTTPS certificates. Could not open NVS namespace %s. Error %s", certs_namespace, esp_err_to_name(esp_err));
  156. return esp_err;
  157. }
  158. const esp_partition_t *running = esp_ota_get_running_partition();
  159. ESP_LOGI(TAG, "Running partition [%s] type %d subtype %d (offset 0x%08x)", running->label, running->type, running->subtype, running->address);
  160. if (esp_ota_get_partition_description(running, &running_app_info) == ESP_OK) {
  161. ESP_LOGI(TAG, "Running version: %s", running_app_info.version);
  162. }
  163. size_t len=0;
  164. char *str=NULL;
  165. bool changed=false;
  166. if ( (esp_err= nvs_get_str(handle, certs_version, NULL, &len)) == ESP_OK) {
  167. str=(char *)malloc_init_external(len+1);
  168. if(str){
  169. if ( (esp_err = nvs_get_str(handle, certs_version, str, &len)) == ESP_OK) {
  170. ESP_LOGI(TAG,"Certificate version: %s", str);
  171. }
  172. }
  173. }
  174. if(str!=NULL && running->subtype !=ESP_PARTITION_SUBTYPE_APP_FACTORY){
  175. // If certificates were found in nvs, only update if we're not
  176. // running recovery. This will prevent rolling back to an older version
  177. if(strcmp((char *)running_app_info.version,(char *)str )){
  178. // Versions are different
  179. ESP_LOGW(TAG,"Found a different software version. Updating certificates");
  180. changed=true;
  181. }
  182. free(str);
  183. }
  184. else if(str==NULL){
  185. ESP_LOGW(TAG,"No certificate found. Adding certificates");
  186. changed=true;
  187. }
  188. if(changed || force){
  189. esp_err = nvs_set_blob(handle, certs_key, server_cert_pem_start, (server_cert_pem_end-server_cert_pem_start));
  190. if(esp_err!=ESP_OK){
  191. log_send_messaging(MESSAGING_ERROR,"Failed to store certificate data: %s", esp_err_to_name(esp_err));
  192. }
  193. else {
  194. esp_err = nvs_set_str(handle, certs_version, running_app_info.version);
  195. if(esp_err!=ESP_OK){
  196. log_send_messaging(MESSAGING_ERROR,"Unable to update HTTPS Certificates version: %s",esp_err_to_name(esp_err));
  197. }
  198. else {
  199. esp_err = nvs_commit(handle);
  200. if(esp_err!=ESP_OK){
  201. log_send_messaging(MESSAGING_ERROR,"Failed to commit certificates changes : %s",esp_err_to_name(esp_err));
  202. }
  203. else {
  204. log_send_messaging(MESSAGING_INFO,"HTTPS Certificates were updated with version: %s",running_app_info.version);
  205. }
  206. }
  207. }
  208. }
  209. nvs_close(handle);
  210. return ESP_OK;
  211. }
  212. const char * get_certificate(){
  213. nvs_handle handle;
  214. esp_err_t esp_err;
  215. char *blob =NULL;
  216. //
  217. ESP_LOGD(TAG, "Fetching certificate.");
  218. esp_err = nvs_open_from_partition(settings_partition, certs_namespace, NVS_READONLY, &handle);
  219. if(esp_err == ESP_OK){
  220. size_t len;
  221. esp_err = nvs_get_blob(handle, certs_key, NULL, &len);
  222. if( esp_err == ESP_OK) {
  223. blob = (char *) malloc_init_external(len+1);
  224. if(!blob){
  225. log_send_messaging(MESSAGING_ERROR,"Unable to retrieve HTTPS certificates. %s","Memory allocation failed");
  226. return "";
  227. }
  228. memset(blob,0x00,len+1);
  229. esp_err = nvs_get_blob(handle, certs_key, blob, &len);
  230. if ( esp_err == ESP_OK) {
  231. ESP_LOGD(TAG,"Certificates content is %d bytes long: ", len);
  232. }
  233. else {
  234. log_send_messaging(MESSAGING_ERROR,"Unable to retrieve HTTPS certificates. Get blob failed: %s", esp_err_to_name(esp_err));
  235. }
  236. }
  237. else{
  238. log_send_messaging(MESSAGING_ERROR,"Unable to retrieve HTTPS certificates. Get blob failed: %s",esp_err_to_name(esp_err));
  239. }
  240. nvs_close(handle);
  241. }
  242. else{
  243. log_send_messaging(MESSAGING_ERROR,"Unable to retrieve HTTPS certificates. NVS name space %s open failed: %s",certs_namespace, esp_err_to_name(esp_err));
  244. }
  245. return blob;
  246. }
  247. #define DEFAULT_NAME_WITH_MAC(var,defval) char var[strlen(defval)+sizeof(macStr)]; strcpy(var,defval); strcat(var,macStr)
  248. void register_default_string_val(const char * key, char * value){
  249. char * existing =(char *)config_alloc_get(NVS_TYPE_STR,key );
  250. ESP_LOGD(TAG,"Register default called with: %s= %s",key,value );
  251. if(!existing) {
  252. ESP_LOGI(TAG,"Registering default value for key %s, value %s",key,value );
  253. config_set_default(NVS_TYPE_STR, key,value, 0);
  254. }
  255. else {
  256. ESP_LOGD(TAG,"Value found for %s: %s",key,existing );
  257. }
  258. FREE_AND_NULL(existing);
  259. }
  260. void register_default_with_mac(const char* key, char* defval) {
  261. uint8_t mac[6];
  262. char macStr[LOCAL_MAC_SIZE + 1];
  263. char* fullvalue = NULL;
  264. esp_read_mac((uint8_t*)&mac, ESP_MAC_WIFI_STA);
  265. snprintf(macStr, LOCAL_MAC_SIZE - 1, "-%x%x%x", mac[3], mac[4], mac[5]);
  266. fullvalue = malloc_init_external(strlen(defval)+sizeof(macStr)+1);
  267. if(fullvalue){
  268. strcpy(fullvalue, defval);
  269. strcat(fullvalue, macStr);
  270. register_default_string_val(key,fullvalue);
  271. FREE_AND_NULL(fullvalue);
  272. }
  273. else {
  274. ESP_LOGE(TAG,"Memory allocation failed when registering default value for %s", key);
  275. }
  276. }
  277. void register_default_nvs(){
  278. #ifdef CONFIG_CSPOT_SINK
  279. register_default_string_val("enable_cspot", STR(CONFIG_CSPOT_SINK));
  280. #endif
  281. #ifdef CONFIG_AIRPLAY_SINK
  282. register_default_with_mac("airplay_name", CONFIG_AIRPLAY_NAME);
  283. register_default_string_val("airplay_port", CONFIG_AIRPLAY_PORT);
  284. register_default_string_val( "enable_airplay", STR(CONFIG_AIRPLAY_SINK));
  285. #endif
  286. #ifdef CONFIG_BT_SINK
  287. register_default_string_val( "bt_sink_pin", STR(CONFIG_BT_SINK_PIN));
  288. register_default_string_val( "bt_sink_volume", "127");
  289. register_default_with_mac("bt_name", CONFIG_BT_NAME);
  290. register_default_string_val( "enable_bt_sink", STR(CONFIG_BT_SINK));
  291. register_default_string_val("a2dp_dev_name", CONFIG_A2DP_DEV_NAME);
  292. register_default_string_val("a2dp_ctmt", STR(CONFIG_A2DP_CONNECT_TIMEOUT_MS));
  293. register_default_string_val("a2dp_ctrld", STR(CONFIG_A2DP_CONTROL_DELAY_MS));
  294. register_default_string_val("a2dp_sink_name", CONFIG_A2DP_SINK_NAME);
  295. #endif
  296. register_default_with_mac("host_name", DEFAULT_HOST_NAME);
  297. register_default_with_mac("ap_ssid", CONFIG_DEFAULT_AP_SSID);
  298. register_default_string_val("autoexec","1");
  299. register_default_with_mac("autoexec1",CONFIG_DEFAULT_COMMAND_LINE " -n " DEFAULT_HOST_NAME);
  300. register_default_string_val("release_url", CONFIG_SQUEEZELITE_ESP32_RELEASE_URL);
  301. register_default_string_val("ap_ip_address",CONFIG_DEFAULT_AP_IP);
  302. register_default_string_val("ap_ip_gateway",CONFIG_DEFAULT_AP_GATEWAY );
  303. register_default_string_val("ap_ip_netmask",CONFIG_DEFAULT_AP_NETMASK);
  304. register_default_string_val("ap_channel",STR(CONFIG_DEFAULT_AP_CHANNEL));
  305. register_default_string_val("ap_pwd", CONFIG_DEFAULT_AP_PASSWORD);
  306. register_default_string_val("bypass_wm", "0");
  307. register_default_string_val("equalizer", "");
  308. register_default_string_val("actrls_config", "");
  309. register_default_string_val("lms_ctrls_raw", "n");
  310. register_default_string_val("rotary_config", CONFIG_ROTARY_ENCODER);
  311. char number_buffer[101] = {};
  312. snprintf(number_buffer,sizeof(number_buffer)-1,"%u",OTA_FLASH_ERASE_BLOCK);
  313. register_default_string_val( "ota_erase_blk", number_buffer);
  314. snprintf(number_buffer,sizeof(number_buffer)-1,"%u",OTA_STACK_SIZE);
  315. register_default_string_val( "ota_stack", number_buffer);
  316. snprintf(number_buffer,sizeof(number_buffer)-1,"%d",OTA_TASK_PRIOTITY);
  317. register_default_string_val( "ota_prio", number_buffer);
  318. register_default_string_val( "display_config", CONFIG_DISPLAY_CONFIG);
  319. register_default_string_val( "eth_config", CONFIG_ETH_CONFIG);
  320. register_default_string_val( "i2c_config", CONFIG_I2C_CONFIG);
  321. register_default_string_val( "spi_config", CONFIG_SPI_CONFIG);
  322. register_default_string_val( "set_GPIO", CONFIG_SET_GPIO);
  323. register_default_string_val( "led_brightness", "");
  324. register_default_string_val( "spdif_config", "");
  325. register_default_string_val( "dac_config", "");
  326. register_default_string_val( "dac_controlset", "");
  327. register_default_string_val( "jack_mutes_amp", "n");
  328. register_default_string_val("gpio_exp_config", CONFIG_GPIO_EXP_CONFIG);
  329. register_default_string_val( "bat_config", "");
  330. register_default_string_val( "metadata_config", "");
  331. register_default_string_val( "telnet_enable", "");
  332. register_default_string_val( "telnet_buffer", "40000");
  333. register_default_string_val( "telnet_block", "500");
  334. register_default_string_val( "stats", "n");
  335. register_default_string_val( "rel_api", CONFIG_RELEASE_API);
  336. register_default_string_val("pollmx","600");
  337. register_default_string_val("pollmin","15");
  338. register_default_string_val("ethtmout","8");
  339. register_default_string_val("dhcp_tmout","8");
  340. register_default_string_val("target", CONFIG_TARGET);
  341. #ifdef CONFIG_CSPOT_SINK
  342. char * host_hame = config_alloc_get_default(NVS_TYPE_STR, "host_name", NULL, 0);
  343. register_default_string_val("enable_cspot", STR(CONFIG_CSPOT_SINK));
  344. cJSON * cspot_config = cJSON_CreateObject();
  345. cJSON_AddStringToObject(cspot_config, "deviceName", host_hame);
  346. cJSON_AddNumberToObject(cspot_config, "format", 1);
  347. cJSON_AddNumberToObject(cspot_config, "volume", 32767);
  348. char * cspot_config_str = cJSON_PrintUnformatted(cspot_config);
  349. register_default_string_val("cspot_config", cspot_config_str);
  350. cJSON_Delete(cspot_config);
  351. FREE_AND_NULL(cspot_config_str);
  352. FREE_AND_NULL(host_hame);
  353. #endif
  354. wait_for_commit();
  355. ESP_LOGD(TAG,"Done setting default values in nvs.");
  356. }
  357. uint32_t halSTORAGE_RebootCounterRead(void) { return RebootCounter ; }
  358. uint32_t halSTORAGE_RebootCounterUpdate(int32_t xValue) {
  359. if(RebootCounter >100) {
  360. RebootCounter = 0;
  361. RecoveryRebootCounter = 0;
  362. }
  363. RebootCounter = (xValue != 0) ? (RebootCounter + xValue) : 0;
  364. RecoveryRebootCounter = (xValue != 0) && is_recovery_running ? (RecoveryRebootCounter + xValue) : 0;
  365. return (RebootCounter) ;
  366. }
  367. void handle_ap_connect(nm_state_t new_state, int sub_state){
  368. start_telnet(NULL);
  369. }
  370. void handle_network_up(nm_state_t new_state, int sub_state){
  371. halSTORAGE_RebootCounterUpdate(0);
  372. }
  373. esp_reset_reason_t xReason=ESP_RST_UNKNOWN;
  374. void app_main()
  375. {
  376. if(ColdBootIndicatorFlag != 0xFACE ){
  377. ESP_LOGI(TAG, "System is booting from power on.");
  378. cold_boot = true;
  379. ColdBootIndicatorFlag = 0xFACE;
  380. }
  381. else {
  382. cold_boot = false;
  383. }
  384. const esp_partition_t *running = esp_ota_get_running_partition();
  385. is_recovery_running = (running->subtype == ESP_PARTITION_SUBTYPE_APP_FACTORY);
  386. xReason = esp_reset_reason();
  387. ESP_LOGI(TAG,"Reset reason is: %u", xReason);
  388. if(!is_recovery_running ) {
  389. /* unscheduled restart (HW, Watchdog or similar) thus increment dynamic
  390. * counter then log current boot statistics as a warning */
  391. uint32_t Counter = halSTORAGE_RebootCounterUpdate(1) ; // increment counter
  392. ESP_LOGI(TAG,"Reboot counter=%u\n", Counter) ;
  393. if (Counter == 5) {
  394. guided_factory();
  395. }
  396. }
  397. else {
  398. uint32_t Counter = halSTORAGE_RebootCounterUpdate(1) ; // increment counter
  399. if(RecoveryRebootCounter==1 && Counter>=5){
  400. // First time we are rebooting in recovery after crashing
  401. messaging_post_message(MESSAGING_ERROR,MESSAGING_CLASS_SYSTEM,"System was forced into recovery mode after crash likely caused by some bad configuration\n");
  402. }
  403. ESP_LOGI(TAG,"Recovery Reboot counter=%u\n", Counter) ;
  404. if (RecoveryRebootCounter == 5) {
  405. ESP_LOGW(TAG,"System rebooted too many times. This could be an indication that configuration is corrupted. Erasing config.");
  406. erase_settings_partition();
  407. // reboot one more time
  408. guided_factory();
  409. }
  410. if (RecoveryRebootCounter >5){
  411. messaging_post_message(MESSAGING_ERROR,MESSAGING_CLASS_SYSTEM,"System was forced into recovery mode after crash likely caused by some bad configuration. Configuration was reset to factory.\n");
  412. }
  413. }
  414. char * fwurl = NULL;
  415. MEMTRACE_PRINT_DELTA();
  416. ESP_LOGI(TAG,"Starting app_main");
  417. initialize_nvs();
  418. MEMTRACE_PRINT_DELTA();
  419. ESP_LOGI(TAG,"Setting up telnet.");
  420. init_telnet(); // align on 32 bits boundaries
  421. MEMTRACE_PRINT_DELTA();
  422. ESP_LOGI(TAG,"Setting up config subsystem.");
  423. config_init();
  424. MEMTRACE_PRINT_DELTA();
  425. ESP_LOGD(TAG,"Creating event group for wifi");
  426. network_event_group = xEventGroupCreate();
  427. ESP_LOGD(TAG,"Clearing CONNECTED_BIT from wifi group");
  428. xEventGroupClearBits(network_event_group, CONNECTED_BIT);
  429. ESP_LOGI(TAG,"Registering default values");
  430. register_default_nvs();
  431. MEMTRACE_PRINT_DELTA();
  432. ESP_LOGI(TAG,"Configuring services");
  433. services_init();
  434. MEMTRACE_PRINT_DELTA();
  435. ESP_LOGI(TAG,"Initializing display");
  436. display_init("SqueezeESP32");
  437. MEMTRACE_PRINT_DELTA();
  438. char *target = config_alloc_get_str("target", CONFIG_TARGET, NULL);
  439. if (target) {
  440. target_init(target);
  441. free(target);
  442. }
  443. if(is_recovery_running && display){
  444. GDS_ClearExt(display, true);
  445. GDS_SetFont(display, &Font_line_2 );
  446. GDS_TextPos(display, GDS_FONT_DEFAULT, GDS_TEXT_CENTERED, GDS_TEXT_CLEAR | GDS_TEXT_UPDATE, "RECOVERY");
  447. }
  448. ESP_LOGI(TAG,"Checking if certificates need to be updated");
  449. update_certificates(false);
  450. MEMTRACE_PRINT_DELTA();
  451. ESP_LOGD(TAG,"Getting firmware OTA URL (if any)");
  452. fwurl = process_ota_url();
  453. ESP_LOGD(TAG,"Getting value for WM bypass, nvs 'bypass_wm'");
  454. char * bypass_wm = config_alloc_get_default(NVS_TYPE_STR, "bypass_wm", "0", 0);
  455. if(bypass_wm==NULL)
  456. {
  457. ESP_LOGE(TAG, "Unable to retrieve the Wifi Manager bypass flag");
  458. bypass_network_manager = false;
  459. }
  460. else {
  461. bypass_network_manager=(strcmp(bypass_wm,"1")==0 ||strcasecmp(bypass_wm,"y")==0);
  462. }
  463. if(!is_recovery_running){
  464. ESP_LOGD(TAG,"Getting audio control mapping ");
  465. char *actrls_config = config_alloc_get_default(NVS_TYPE_STR, "actrls_config", "", 0);
  466. if (actrls_init(actrls_config) == ESP_OK) {
  467. ESP_LOGD(TAG,"Initializing audio control buttons type %s", actrls_config);
  468. } else {
  469. ESP_LOGD(TAG,"No audio control buttons");
  470. }
  471. if (actrls_config) free(actrls_config);
  472. }
  473. /* start the wifi manager */
  474. ESP_LOGD(TAG,"Blinking led");
  475. led_blink_pushed(LED_GREEN, 250, 250);
  476. MEMTRACE_PRINT_DELTA();
  477. if(bypass_network_manager){
  478. ESP_LOGW(TAG,"Network manager is disabled. Use command line for wifi control.");
  479. }
  480. else {
  481. ESP_LOGI(TAG,"Starting Network Manager");
  482. network_start();
  483. MEMTRACE_PRINT_DELTA();
  484. network_register_state_callback(NETWORK_WIFI_ACTIVE_STATE,WIFI_CONNECTED_STATE, "cb_connection_got_ip", &cb_connection_got_ip);
  485. network_register_state_callback(NETWORK_ETH_ACTIVE_STATE,ETH_ACTIVE_CONNECTED_STATE, "cb_connection_got_ip",&cb_connection_got_ip);
  486. network_register_state_callback(NETWORK_WIFI_ACTIVE_STATE,WIFI_LOST_CONNECTION_STATE, "cb_connection_sta_disconnected",&cb_connection_sta_disconnected);
  487. /* Start the telnet service after we are certain that the network stack has been properly initialized.
  488. * This can be either after we're started the AP mode, or after we've started the STA mode */
  489. network_register_state_callback(NETWORK_INITIALIZING_STATE,-1, "handle_ap_connect", &handle_ap_connect);
  490. network_register_state_callback(NETWORK_ETH_ACTIVE_STATE,ETH_ACTIVE_LINKDOWN_STATE, "handle_network_up", &handle_network_up);
  491. network_register_state_callback(NETWORK_WIFI_ACTIVE_STATE,WIFI_INITIALIZING_STATE, "handle_network_up", &handle_network_up);
  492. MEMTRACE_PRINT_DELTA();
  493. }
  494. MEMTRACE_PRINT_DELTA_MESSAGE("Starting Console");
  495. console_start();
  496. MEMTRACE_PRINT_DELTA_MESSAGE("Console started");
  497. if(fwurl && strlen(fwurl)>0){
  498. if(is_recovery_running){
  499. while(!bNetworkConnected){
  500. wait_for_wifi();
  501. taskYIELD();
  502. }
  503. ESP_LOGI(TAG,"Updating firmware from link: %s",fwurl);
  504. start_ota(fwurl, NULL, 0);
  505. }
  506. else {
  507. ESP_LOGE(TAG,"Restarted to application partition. We're not going to perform OTA!");
  508. }
  509. free(fwurl);
  510. }
  511. messaging_post_message(MESSAGING_INFO,MESSAGING_CLASS_SYSTEM,"System started");
  512. }