esp_app_main.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558
  1. /*
  2. * Squeezelite for esp32
  3. *
  4. * (c) Sebastien 2019
  5. * Philippe G. 2019, philippe_44@outlook.com
  6. *
  7. * This software is released under the MIT License.
  8. * https://opensource.org/licenses/MIT
  9. *
  10. */
  11. #include "platform_esp32.h"
  12. #include "led.h"
  13. #include <stdio.h>
  14. #include <string.h>
  15. #include "freertos/FreeRTOS.h"
  16. #include "driver/gpio.h"
  17. #include "driver/spi_master.h"
  18. #include "freertos/task.h"
  19. #include "esp_system.h"
  20. #include "esp_spi_flash.h"
  21. #include "esp_wifi.h"
  22. #include <esp_event.h>
  23. #include "nvs_flash.h"
  24. #include "esp_log.h"
  25. #include "freertos/event_groups.h"
  26. #include "mdns.h"
  27. #include "lwip/api.h"
  28. #include "lwip/err.h"
  29. #include "lwip/netdb.h"
  30. #include "nvs_utilities.h"
  31. #include "trace.h"
  32. #include "network_manager.h"
  33. #include "squeezelite-ota.h"
  34. #include <math.h>
  35. #include "audio_controls.h"
  36. #include "platform_config.h"
  37. #include "telnet.h"
  38. #include "messaging.h"
  39. #include "gds.h"
  40. #include "gds_default_if.h"
  41. #include "gds_draw.h"
  42. #include "gds_text.h"
  43. #include "gds_font.h"
  44. #include "led_vu.h"
  45. #include "display.h"
  46. #include "accessors.h"
  47. #include "cmd_system.h"
  48. #include "tools.h"
  49. static const char certs_namespace[] = "certificates";
  50. static const char certs_key[] = "blob";
  51. static const char certs_version[] = "version";
  52. const char unknown_string_placeholder[] = "unknown";
  53. const char null_string_placeholder[] = "null";
  54. EventGroupHandle_t network_event_group;
  55. bool bypass_network_manager=false;
  56. const int CONNECTED_BIT = BIT0;
  57. #define JOIN_TIMEOUT_MS (10000)
  58. #define LOCAL_MAC_SIZE 20
  59. static const char TAG[] = "esp_app_main";
  60. #define DEFAULT_HOST_NAME "squeezelite"
  61. char * fwurl = NULL;
  62. RTC_NOINIT_ATTR uint32_t RebootCounter ;
  63. RTC_NOINIT_ATTR uint32_t RecoveryRebootCounter ;
  64. RTC_NOINIT_ATTR uint16_t ColdBootIndicatorFlag;
  65. bool cold_boot=true;
  66. static bool bNetworkConnected=false;
  67. extern const uint8_t server_cert_pem_start[] asm("_binary_github_pem_start");
  68. extern const uint8_t server_cert_pem_end[] asm("_binary_github_pem_end");
  69. // as an exception _init function don't need include
  70. extern void services_init(void);
  71. extern void display_init(char *welcome);
  72. extern void led_vu_init(void);
  73. extern void target_init(char *target);
  74. const char * str_or_unknown(const char * str) { return (str?str:unknown_string_placeholder); }
  75. const char * str_or_null(const char * str) { return (str?str:null_string_placeholder); }
  76. bool is_recovery_running;
  77. void cb_connection_got_ip(nm_state_t new_state, int sub_state){
  78. const char *hostname;
  79. static ip4_addr_t ip;
  80. tcpip_adapter_ip_info_t ipInfo;
  81. network_get_ip_info(&ipInfo);
  82. if (ip.addr && ipInfo.ip.addr != ip.addr) {
  83. ESP_LOGW(TAG, "IP change, need to reboot");
  84. if(!wait_for_commit()){
  85. ESP_LOGW(TAG,"Unable to commit configuration. ");
  86. }
  87. esp_restart();
  88. }
  89. // initializing mDNS
  90. network_get_hostname(&hostname);
  91. mdns_init();
  92. mdns_hostname_set(hostname);
  93. ESP_LOGI(TAG, "Network connected and mDNS initialized with %s", hostname);
  94. messaging_post_message(MESSAGING_INFO,MESSAGING_CLASS_SYSTEM,"Network connected");
  95. xEventGroupSetBits(network_event_group, CONNECTED_BIT);
  96. bNetworkConnected=true;
  97. led_unpush(LED_GREEN);
  98. if(is_recovery_running){
  99. // when running in recovery, send a LMS discovery message
  100. // to find a running instance. This is to enable using
  101. // the plugin's proxy mode for FW download and avoid
  102. // expired certificate issues.
  103. discover_ota_server(5);
  104. }
  105. }
  106. void cb_connection_sta_disconnected(nm_state_t new_state, int sub_state){
  107. led_blink_pushed(LED_GREEN, 250, 250);
  108. messaging_post_message(MESSAGING_WARNING,MESSAGING_CLASS_SYSTEM,"Wifi disconnected");
  109. bNetworkConnected=false;
  110. xEventGroupClearBits(network_event_group, CONNECTED_BIT);
  111. }
  112. bool wait_for_wifi(){
  113. bool connected=(xEventGroupGetBits(network_event_group) & CONNECTED_BIT)!=0;
  114. if(!connected){
  115. ESP_LOGD(TAG,"Waiting for Network...");
  116. connected = (xEventGroupWaitBits(network_event_group, CONNECTED_BIT,
  117. pdFALSE, pdTRUE, JOIN_TIMEOUT_MS / portTICK_PERIOD_MS)& CONNECTED_BIT)!=0;
  118. if(!connected){
  119. ESP_LOGW(TAG,"Network timeout.");
  120. }
  121. else
  122. {
  123. ESP_LOGI(TAG,"Network Connected!");
  124. }
  125. }
  126. return connected;
  127. }
  128. char * process_ota_url(){
  129. ESP_LOGI(TAG,"Checking for update url");
  130. char * fwurl=config_alloc_get(NVS_TYPE_STR, "fwurl");
  131. if(fwurl!=NULL)
  132. {
  133. ESP_LOGD(TAG,"Deleting nvs entry for Firmware URL %s", fwurl);
  134. config_delete_key("fwurl");
  135. }
  136. return fwurl;
  137. }
  138. esp_log_level_t get_log_level_from_char(char * level){
  139. if(!strcasecmp(level, "NONE" )) { return ESP_LOG_NONE ;}
  140. if(!strcasecmp(level, "ERROR" )) { return ESP_LOG_ERROR ;}
  141. if(!strcasecmp(level, "WARN" )) { return ESP_LOG_WARN ;}
  142. if(!strcasecmp(level, "INFO" )) { return ESP_LOG_INFO ;}
  143. if(!strcasecmp(level, "DEBUG" )) { return ESP_LOG_DEBUG ;}
  144. if(!strcasecmp(level, "VERBOSE" )) { return ESP_LOG_VERBOSE;}
  145. return ESP_LOG_WARN;
  146. }
  147. void set_log_level(char * tag, char * level){
  148. esp_log_level_set(tag, get_log_level_from_char(level));
  149. }
  150. esp_err_t update_certificates(bool force){
  151. nvs_handle handle;
  152. esp_err_t esp_err;
  153. esp_app_desc_t running_app_info;
  154. ESP_LOGI(TAG, "About to check if certificates need to be updated in flash");
  155. esp_err = nvs_open_from_partition(settings_partition, certs_namespace, NVS_READWRITE, &handle);
  156. if (esp_err != ESP_OK) {
  157. LOG_SEND(MESSAGING_INFO,"Unable to update HTTPS certificates. Could not open NVS namespace %s. Error %s", certs_namespace, esp_err_to_name(esp_err));
  158. return esp_err;
  159. }
  160. const esp_partition_t *running = esp_ota_get_running_partition();
  161. ESP_LOGI(TAG, "Running partition [%s] type %d subtype %d (offset 0x%08x)", running->label, running->type, running->subtype, running->address);
  162. if (esp_ota_get_partition_description(running, &running_app_info) == ESP_OK) {
  163. ESP_LOGI(TAG, "Running version: %s", running_app_info.version);
  164. }
  165. size_t len=0;
  166. char *str=NULL;
  167. bool changed=false;
  168. if ( (esp_err= nvs_get_str(handle, certs_version, NULL, &len)) == ESP_OK) {
  169. str=(char *)malloc_init_external(len+1);
  170. if(str){
  171. if ( (esp_err = nvs_get_str(handle, certs_version, str, &len)) == ESP_OK) {
  172. ESP_LOGI(TAG,"Certificate version: %s", str);
  173. }
  174. }
  175. }
  176. if(str!=NULL && running->subtype !=ESP_PARTITION_SUBTYPE_APP_FACTORY){
  177. // If certificates were found in nvs, only update if we're not
  178. // running recovery. This will prevent rolling back to an older version
  179. if(strcmp((char *)running_app_info.version,(char *)str )){
  180. // Versions are different
  181. ESP_LOGW(TAG,"Found a different software version. Updating certificates");
  182. changed=true;
  183. }
  184. free(str);
  185. }
  186. else if(str==NULL){
  187. ESP_LOGW(TAG,"No certificate found. Adding certificates");
  188. changed=true;
  189. }
  190. if(changed || force){
  191. esp_err = nvs_set_blob(handle, certs_key, server_cert_pem_start, (server_cert_pem_end-server_cert_pem_start));
  192. if(esp_err!=ESP_OK){
  193. log_send_messaging(MESSAGING_ERROR,"Failed to store certificate data: %s", esp_err_to_name(esp_err));
  194. }
  195. else {
  196. esp_err = nvs_set_str(handle, certs_version, running_app_info.version);
  197. if(esp_err!=ESP_OK){
  198. log_send_messaging(MESSAGING_ERROR,"Unable to update HTTPS Certificates version: %s",esp_err_to_name(esp_err));
  199. }
  200. else {
  201. esp_err = nvs_commit(handle);
  202. if(esp_err!=ESP_OK){
  203. log_send_messaging(MESSAGING_ERROR,"Failed to commit certificates changes : %s",esp_err_to_name(esp_err));
  204. }
  205. else {
  206. log_send_messaging(MESSAGING_INFO,"HTTPS Certificates were updated with version: %s",running_app_info.version);
  207. }
  208. }
  209. }
  210. }
  211. nvs_close(handle);
  212. return ESP_OK;
  213. }
  214. const char * get_certificate(){
  215. nvs_handle handle;
  216. esp_err_t esp_err;
  217. char *blob =NULL;
  218. //
  219. ESP_LOGD(TAG, "Fetching certificate.");
  220. esp_err = nvs_open_from_partition(settings_partition, certs_namespace, NVS_READONLY, &handle);
  221. if(esp_err == ESP_OK){
  222. size_t len;
  223. esp_err = nvs_get_blob(handle, certs_key, NULL, &len);
  224. if( esp_err == ESP_OK) {
  225. blob = (char *) malloc_init_external(len+1);
  226. if(!blob){
  227. log_send_messaging(MESSAGING_ERROR,"Unable to retrieve HTTPS certificates. %s","Memory allocation failed");
  228. return "";
  229. }
  230. memset(blob,0x00,len+1);
  231. esp_err = nvs_get_blob(handle, certs_key, blob, &len);
  232. if ( esp_err == ESP_OK) {
  233. ESP_LOGD(TAG,"Certificates content is %d bytes long: ", len);
  234. }
  235. else {
  236. log_send_messaging(MESSAGING_ERROR,"Unable to retrieve HTTPS certificates. Get blob failed: %s", esp_err_to_name(esp_err));
  237. }
  238. }
  239. else{
  240. log_send_messaging(MESSAGING_ERROR,"Unable to retrieve HTTPS certificates. Get blob failed: %s",esp_err_to_name(esp_err));
  241. }
  242. nvs_close(handle);
  243. }
  244. else{
  245. log_send_messaging(MESSAGING_ERROR,"Unable to retrieve HTTPS certificates. NVS name space %s open failed: %s",certs_namespace, esp_err_to_name(esp_err));
  246. }
  247. return blob;
  248. }
  249. #define DEFAULT_NAME_WITH_MAC(var,defval) char var[strlen(defval)+sizeof(macStr)]; strcpy(var,defval); strcat(var,macStr)
  250. void register_default_string_val(const char * key, char * value){
  251. char * existing =(char *)config_alloc_get(NVS_TYPE_STR,key );
  252. ESP_LOGD(TAG,"Register default called with: %s= %s",key,value );
  253. if(!existing) {
  254. ESP_LOGI(TAG,"Registering default value for key %s, value %s",key,value );
  255. config_set_default(NVS_TYPE_STR, key,value, 0);
  256. }
  257. else {
  258. ESP_LOGD(TAG,"Value found for %s: %s",key,existing );
  259. }
  260. FREE_AND_NULL(existing);
  261. }
  262. void register_default_with_mac(const char* key, char* defval) {
  263. uint8_t mac[6];
  264. char macStr[LOCAL_MAC_SIZE + 1];
  265. char* fullvalue = NULL;
  266. esp_read_mac((uint8_t*)&mac, ESP_MAC_WIFI_STA);
  267. snprintf(macStr, LOCAL_MAC_SIZE - 1, "-%x%x%x", mac[3], mac[4], mac[5]);
  268. fullvalue = malloc_init_external(strlen(defval)+sizeof(macStr)+1);
  269. if(fullvalue){
  270. strcpy(fullvalue, defval);
  271. strcat(fullvalue, macStr);
  272. register_default_string_val(key,fullvalue);
  273. FREE_AND_NULL(fullvalue);
  274. }
  275. else {
  276. ESP_LOGE(TAG,"Memory allocation failed when registering default value for %s", key);
  277. }
  278. }
  279. void register_default_nvs(){
  280. #ifdef CONFIG_CSPOT_SINK
  281. register_default_string_val("enable_cspot", STR(CONFIG_CSPOT_SINK));
  282. #endif
  283. #ifdef CONFIG_AIRPLAY_SINK
  284. register_default_with_mac("airplay_name", CONFIG_AIRPLAY_NAME);
  285. register_default_string_val("airplay_port", CONFIG_AIRPLAY_PORT);
  286. register_default_string_val( "enable_airplay", STR(CONFIG_AIRPLAY_SINK));
  287. #endif
  288. #ifdef CONFIG_BT_SINK
  289. register_default_string_val( "bt_sink_pin", STR(CONFIG_BT_SINK_PIN));
  290. register_default_string_val( "bt_sink_volume", "127");
  291. register_default_with_mac("bt_name", CONFIG_BT_NAME);
  292. register_default_string_val( "enable_bt_sink", STR(CONFIG_BT_SINK));
  293. register_default_string_val("a2dp_dev_name", CONFIG_A2DP_DEV_NAME);
  294. register_default_string_val("a2dp_ctmt", STR(CONFIG_A2DP_CONNECT_TIMEOUT_MS));
  295. register_default_string_val("a2dp_ctrld", STR(CONFIG_A2DP_CONTROL_DELAY_MS));
  296. register_default_string_val("a2dp_sink_name", CONFIG_A2DP_SINK_NAME);
  297. #endif
  298. register_default_with_mac("host_name", DEFAULT_HOST_NAME);
  299. register_default_with_mac("ap_ssid", CONFIG_DEFAULT_AP_SSID);
  300. register_default_string_val("autoexec","1");
  301. register_default_with_mac("autoexec1",CONFIG_DEFAULT_COMMAND_LINE " -n " DEFAULT_HOST_NAME);
  302. register_default_string_val("release_url", CONFIG_SQUEEZELITE_ESP32_RELEASE_URL);
  303. register_default_string_val("ap_ip_address",CONFIG_DEFAULT_AP_IP);
  304. register_default_string_val("ap_ip_gateway",CONFIG_DEFAULT_AP_GATEWAY );
  305. register_default_string_val("ap_ip_netmask",CONFIG_DEFAULT_AP_NETMASK);
  306. register_default_string_val("ap_channel",STR(CONFIG_DEFAULT_AP_CHANNEL));
  307. register_default_string_val("ap_pwd", CONFIG_DEFAULT_AP_PASSWORD);
  308. register_default_string_val("bypass_wm", "0");
  309. register_default_string_val("equalizer", "");
  310. register_default_string_val("actrls_config", "");
  311. register_default_string_val("lms_ctrls_raw", "n");
  312. register_default_string_val("rotary_config", CONFIG_ROTARY_ENCODER);
  313. char number_buffer[101] = {};
  314. snprintf(number_buffer,sizeof(number_buffer)-1,"%u",OTA_FLASH_ERASE_BLOCK);
  315. register_default_string_val( "ota_erase_blk", number_buffer);
  316. snprintf(number_buffer,sizeof(number_buffer)-1,"%u",OTA_STACK_SIZE);
  317. register_default_string_val( "ota_stack", number_buffer);
  318. snprintf(number_buffer,sizeof(number_buffer)-1,"%d",OTA_TASK_PRIOTITY);
  319. register_default_string_val( "ota_prio", number_buffer);
  320. register_default_string_val( "display_config", CONFIG_DISPLAY_CONFIG);
  321. register_default_string_val( "eth_config", CONFIG_ETH_CONFIG);
  322. register_default_string_val( "i2c_config", CONFIG_I2C_CONFIG);
  323. register_default_string_val( "spi_config", CONFIG_SPI_CONFIG);
  324. register_default_string_val( "set_GPIO", CONFIG_SET_GPIO);
  325. register_default_string_val( "led_brightness", "");
  326. register_default_string_val( "spdif_config", "");
  327. register_default_string_val( "dac_config", "");
  328. register_default_string_val( "dac_controlset", "");
  329. register_default_string_val( "jack_mutes_amp", "n");
  330. register_default_string_val("gpio_exp_config", CONFIG_GPIO_EXP_CONFIG);
  331. register_default_string_val( "bat_config", "");
  332. register_default_string_val( "metadata_config", "");
  333. register_default_string_val( "telnet_enable", "");
  334. register_default_string_val( "telnet_buffer", "40000");
  335. register_default_string_val( "telnet_block", "500");
  336. register_default_string_val( "stats", "n");
  337. register_default_string_val( "rel_api", CONFIG_RELEASE_API);
  338. register_default_string_val("pollmx","600");
  339. register_default_string_val("pollmin","15");
  340. register_default_string_val("ethtmout","8");
  341. register_default_string_val("dhcp_tmout","8");
  342. register_default_string_val("target", CONFIG_TARGET);
  343. register_default_string_val("led_vu_config", "");
  344. #ifdef CONFIG_CSPOT_SINK
  345. register_default_string_val("enable_cspot", STR(CONFIG_CSPOT_SINK));
  346. register_default_string_val("cspot_config", "");
  347. #endif
  348. wait_for_commit();
  349. ESP_LOGD(TAG,"Done setting default values in nvs.");
  350. }
  351. uint32_t halSTORAGE_RebootCounterRead(void) { return RebootCounter ; }
  352. uint32_t halSTORAGE_RebootCounterUpdate(int32_t xValue) {
  353. if(RebootCounter >100) {
  354. RebootCounter = 0;
  355. RecoveryRebootCounter = 0;
  356. }
  357. RebootCounter = (xValue != 0) ? (RebootCounter + xValue) : 0;
  358. RecoveryRebootCounter = (xValue != 0) && is_recovery_running ? (RecoveryRebootCounter + xValue) : 0;
  359. return (RebootCounter) ;
  360. }
  361. void handle_ap_connect(nm_state_t new_state, int sub_state){
  362. start_telnet(NULL);
  363. }
  364. void handle_network_up(nm_state_t new_state, int sub_state){
  365. halSTORAGE_RebootCounterUpdate(0);
  366. }
  367. esp_reset_reason_t xReason=ESP_RST_UNKNOWN;
  368. void app_main()
  369. {
  370. if(ColdBootIndicatorFlag != 0xFACE ){
  371. ESP_LOGI(TAG, "System is booting from power on.");
  372. cold_boot = true;
  373. ColdBootIndicatorFlag = 0xFACE;
  374. }
  375. else {
  376. cold_boot = false;
  377. }
  378. const esp_partition_t *running = esp_ota_get_running_partition();
  379. is_recovery_running = (running->subtype == ESP_PARTITION_SUBTYPE_APP_FACTORY);
  380. xReason = esp_reset_reason();
  381. ESP_LOGI(TAG,"Reset reason is: %u", xReason);
  382. if(!is_recovery_running ) {
  383. /* unscheduled restart (HW, Watchdog or similar) thus increment dynamic
  384. * counter then log current boot statistics as a warning */
  385. uint32_t Counter = halSTORAGE_RebootCounterUpdate(1) ; // increment counter
  386. ESP_LOGI(TAG,"Reboot counter=%u\n", Counter) ;
  387. if (Counter == 5) {
  388. guided_factory();
  389. }
  390. }
  391. else {
  392. uint32_t Counter = halSTORAGE_RebootCounterUpdate(1) ; // increment counter
  393. if(RecoveryRebootCounter==1 && Counter>=5){
  394. // First time we are rebooting in recovery after crashing
  395. messaging_post_message(MESSAGING_ERROR,MESSAGING_CLASS_SYSTEM,"System was forced into recovery mode after crash likely caused by some bad configuration\n");
  396. }
  397. ESP_LOGI(TAG,"Recovery Reboot counter=%u\n", Counter) ;
  398. if (RecoveryRebootCounter == 5) {
  399. ESP_LOGW(TAG,"System rebooted too many times. This could be an indication that configuration is corrupted. Erasing config.");
  400. erase_settings_partition();
  401. // reboot one more time
  402. guided_factory();
  403. }
  404. if (RecoveryRebootCounter >5){
  405. messaging_post_message(MESSAGING_ERROR,MESSAGING_CLASS_SYSTEM,"System was forced into recovery mode after crash likely caused by some bad configuration. Configuration was reset to factory.\n");
  406. }
  407. }
  408. char * fwurl = NULL;
  409. MEMTRACE_PRINT_DELTA();
  410. ESP_LOGI(TAG,"Starting app_main");
  411. initialize_nvs();
  412. MEMTRACE_PRINT_DELTA();
  413. ESP_LOGI(TAG,"Setting up telnet.");
  414. init_telnet(); // align on 32 bits boundaries
  415. MEMTRACE_PRINT_DELTA();
  416. ESP_LOGI(TAG,"Setting up config subsystem.");
  417. config_init();
  418. MEMTRACE_PRINT_DELTA();
  419. ESP_LOGD(TAG,"Creating event group for wifi");
  420. network_event_group = xEventGroupCreate();
  421. ESP_LOGD(TAG,"Clearing CONNECTED_BIT from wifi group");
  422. xEventGroupClearBits(network_event_group, CONNECTED_BIT);
  423. ESP_LOGI(TAG,"Registering default values");
  424. register_default_nvs();
  425. MEMTRACE_PRINT_DELTA();
  426. ESP_LOGI(TAG,"Configuring services");
  427. services_init();
  428. MEMTRACE_PRINT_DELTA();
  429. ESP_LOGI(TAG,"Initializing display");
  430. display_init("SqueezeESP32");
  431. MEMTRACE_PRINT_DELTA();
  432. char *target = config_alloc_get_str("target", CONFIG_TARGET, NULL);
  433. if (target) {
  434. target_init(target);
  435. free(target);
  436. }
  437. ESP_LOGI(TAG,"Initializing led_vu");
  438. led_vu_init();
  439. if(is_recovery_running) {
  440. if (display) {
  441. GDS_ClearExt(display, true);
  442. GDS_SetFont(display, &Font_line_2 );
  443. GDS_TextPos(display, GDS_FONT_DEFAULT, GDS_TEXT_CENTERED, GDS_TEXT_CLEAR | GDS_TEXT_UPDATE, "RECOVERY");
  444. }
  445. if(led_display) {
  446. led_vu_color_yellow(LED_VU_BRIGHT);
  447. }
  448. }
  449. ESP_LOGI(TAG,"Checking if certificates need to be updated");
  450. update_certificates(false);
  451. MEMTRACE_PRINT_DELTA();
  452. ESP_LOGD(TAG,"Getting firmware OTA URL (if any)");
  453. fwurl = process_ota_url();
  454. ESP_LOGD(TAG,"Getting value for WM bypass, nvs 'bypass_wm'");
  455. char * bypass_wm = config_alloc_get_default(NVS_TYPE_STR, "bypass_wm", "0", 0);
  456. if(bypass_wm==NULL)
  457. {
  458. ESP_LOGE(TAG, "Unable to retrieve the Wifi Manager bypass flag");
  459. bypass_network_manager = false;
  460. }
  461. else {
  462. bypass_network_manager=(strcmp(bypass_wm,"1")==0 ||strcasecmp(bypass_wm,"y")==0);
  463. }
  464. if(!is_recovery_running){
  465. ESP_LOGD(TAG,"Getting audio control mapping ");
  466. char *actrls_config = config_alloc_get_default(NVS_TYPE_STR, "actrls_config", "", 0);
  467. if (actrls_init(actrls_config) == ESP_OK) {
  468. ESP_LOGD(TAG,"Initializing audio control buttons type %s", actrls_config);
  469. } else {
  470. ESP_LOGD(TAG,"No audio control buttons");
  471. }
  472. if (actrls_config) free(actrls_config);
  473. }
  474. /* start the wifi manager */
  475. ESP_LOGD(TAG,"Blinking led");
  476. led_blink_pushed(LED_GREEN, 250, 250);
  477. MEMTRACE_PRINT_DELTA();
  478. if(bypass_network_manager){
  479. ESP_LOGW(TAG,"Network manager is disabled. Use command line for wifi control.");
  480. }
  481. else {
  482. ESP_LOGI(TAG,"Starting Network Manager");
  483. network_start();
  484. MEMTRACE_PRINT_DELTA();
  485. network_register_state_callback(NETWORK_WIFI_ACTIVE_STATE,WIFI_CONNECTED_STATE, "cb_connection_got_ip", &cb_connection_got_ip);
  486. network_register_state_callback(NETWORK_ETH_ACTIVE_STATE,ETH_ACTIVE_CONNECTED_STATE, "cb_connection_got_ip",&cb_connection_got_ip);
  487. network_register_state_callback(NETWORK_WIFI_ACTIVE_STATE,WIFI_LOST_CONNECTION_STATE, "cb_connection_sta_disconnected",&cb_connection_sta_disconnected);
  488. /* Start the telnet service after we are certain that the network stack has been properly initialized.
  489. * This can be either after we're started the AP mode, or after we've started the STA mode */
  490. network_register_state_callback(NETWORK_INITIALIZING_STATE,-1, "handle_ap_connect", &handle_ap_connect);
  491. network_register_state_callback(NETWORK_ETH_ACTIVE_STATE,ETH_ACTIVE_LINKDOWN_STATE, "handle_network_up", &handle_network_up);
  492. network_register_state_callback(NETWORK_WIFI_ACTIVE_STATE,WIFI_INITIALIZING_STATE, "handle_network_up", &handle_network_up);
  493. MEMTRACE_PRINT_DELTA();
  494. }
  495. MEMTRACE_PRINT_DELTA_MESSAGE("Starting Console");
  496. console_start();
  497. MEMTRACE_PRINT_DELTA_MESSAGE("Console started");
  498. if(fwurl && strlen(fwurl)>0){
  499. if(is_recovery_running){
  500. while(!bNetworkConnected){
  501. wait_for_wifi();
  502. taskYIELD();
  503. }
  504. ESP_LOGI(TAG,"Updating firmware from link: %s",fwurl);
  505. start_ota(fwurl, NULL, 0);
  506. }
  507. else {
  508. ESP_LOGE(TAG,"Restarted to application partition. We're not going to perform OTA!");
  509. }
  510. free(fwurl);
  511. }
  512. messaging_post_message(MESSAGING_INFO,MESSAGING_CLASS_SYSTEM,"System started");
  513. }