http_server_handlers.c 43 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176
  1. /*
  2. Copyright (c) 2017-2021 Sebastien L
  3. */
  4. #define LOG_LOCAL_LEVEL ESP_LOG_DEBUG
  5. #include "http_server_handlers.h"
  6. #include "Config.h"
  7. #include "DataRequest.pb.h"
  8. #include "Locking.h"
  9. #include "Status.pb.h"
  10. #include "accessors.h"
  11. #include "argtable3/argtable3.h"
  12. #include "cJSON.h"
  13. #include "cmd_system.h"
  14. #include "esp_console.h"
  15. #include "esp_http_server.h"
  16. #include "esp_system.h"
  17. #include "esp_vfs.h"
  18. #include "freertos/FreeRTOS.h"
  19. #include "freertos/task.h"
  20. #include "messaging.h"
  21. #include "network_status.h"
  22. #include "network_wifi.h"
  23. #include "pb_decode.h"
  24. #include "pb_encode.h"
  25. #include "platform_console.h"
  26. #include "platform_esp32.h"
  27. #include "squeezelite-ota.h"
  28. #include "sys/param.h"
  29. #include "tools.h"
  30. #include <inttypes.h>
  31. #include <stdio.h>
  32. #include <stdlib.h>
  33. #include "tools_http_utils.h"
  34. #include "bootstate.h"
  35. #define HTTP_STACK_SIZE (5 * 1024)
  36. const char str_na[] = "N/A";
  37. #define STR_OR_NA(s) s ? s : str_na
  38. /* @brief tag used for ESP serial console messages */
  39. static const char TAG[] = "httpd_handlers";
  40. static const char* www_dir = "/spiffs/www";
  41. SemaphoreHandle_t http_server_config_mutex = NULL;
  42. extern RingbufHandle_t messaging;
  43. #define AUTH_TOKEN_SIZE 50
  44. typedef struct session_context {
  45. char* auth_token;
  46. bool authenticated;
  47. char* sess_ip_address;
  48. u16_t port;
  49. SemaphoreHandle_t signal;
  50. } session_context_t;
  51. extern cJSON* get_gpio_list(bool refresh);
  52. union sockaddr_aligned {
  53. struct sockaddr sa;
  54. struct sockaddr_storage st;
  55. struct sockaddr_in sin;
  56. struct sockaddr_in6 sin6;
  57. } aligned_sockaddr_t;
  58. esp_err_t post_handler_buff_receive(httpd_req_t* req);
  59. static const char redirect_payload1[] = "<html><head><title>Redirecting to Captive "
  60. "Portal</title><meta http-equiv='refresh' content='0; url=";
  61. static const char redirect_payload2[] =
  62. "'></head><body><p>Please wait, refreshing. If page does not refresh, click <a href='";
  63. static const char redirect_payload3[] = "'>here</a> to login.</p></body></html>";
  64. /**
  65. * @brief embedded binary data.
  66. * @see file "component.mk"
  67. * @see
  68. * https://docs.espressif.com/projects/esp-idf/en/latest/api-guides/build-system.html#embedding-binary-data
  69. */
  70. esp_err_t redirect_processor(httpd_req_t* req, httpd_err_code_t error);
  71. char* alloc_get_http_header(httpd_req_t* req, const char* key) {
  72. char* buf = NULL;
  73. size_t buf_len;
  74. /* Get header value string length and allocate memory for length + 1,
  75. * extra byte for null termination */
  76. buf_len = httpd_req_get_hdr_value_len(req, key) + 1;
  77. if (buf_len > 1) {
  78. buf = malloc_init_external(buf_len);
  79. /* Copy null terminated value string into buffer */
  80. if (httpd_req_get_hdr_value_str(req, "Host", buf, buf_len) == ESP_OK) {
  81. ESP_LOGD_LOC(TAG, "Found header => %s: %s", key, buf);
  82. }
  83. }
  84. return buf;
  85. }
  86. char* http_alloc_get_socket_address(httpd_req_t* req, u8_t local, in_port_t* portl) {
  87. socklen_t len;
  88. union sockaddr_aligned addr;
  89. len = sizeof(addr);
  90. ip_addr_t* ip_addr = NULL;
  91. char* ipstr = malloc_init_external(INET6_ADDRSTRLEN);
  92. typedef int (*getaddrname_fn_t)(int s, struct sockaddr* name, socklen_t* namelen);
  93. getaddrname_fn_t get_addr = NULL;
  94. int s = httpd_req_to_sockfd(req);
  95. if (s == -1) {
  96. free(ipstr);
  97. return strdup_psram("httpd_req_to_sockfd error");
  98. }
  99. ESP_LOGV_LOC(TAG, "httpd socket descriptor: %u", s);
  100. get_addr = local ? &lwip_getsockname : &lwip_getpeername;
  101. if (get_addr(s, (struct sockaddr*)&addr, &len) < 0) {
  102. ESP_LOGE_LOC(TAG, "Failed to retrieve socket address");
  103. sprintf(ipstr, "N/A (0.0.0.%u)", local);
  104. } else {
  105. if (addr.sin.sin_family != AF_INET) {
  106. ip_addr = (ip_addr_t*)&(addr.sin6.sin6_addr);
  107. inet_ntop(addr.sa.sa_family, ip_addr, ipstr, INET6_ADDRSTRLEN);
  108. ESP_LOGV_LOC(TAG, "Processing an IPV6 address : %s", ipstr);
  109. *portl = addr.sin6.sin6_port;
  110. unmap_ipv4_mapped_ipv6(ip_2_ip4(ip_addr), ip_2_ip6(ip_addr));
  111. } else {
  112. ip_addr = (ip_addr_t*)&(addr.sin.sin_addr);
  113. inet_ntop(addr.sa.sa_family, ip_addr, ipstr, INET6_ADDRSTRLEN);
  114. ESP_LOGV_LOC(TAG, "Processing an IPV6 address : %s", ipstr);
  115. *portl = addr.sin.sin_port;
  116. }
  117. inet_ntop(AF_INET, ip_addr, ipstr, INET6_ADDRSTRLEN);
  118. ESP_LOGV_LOC(TAG, "Retrieved ip address:port = %s:%u", ipstr, *portl);
  119. }
  120. return ipstr;
  121. }
  122. bool is_captive_portal_host_name(httpd_req_t* req) {
  123. const char* host_name = NULL;
  124. const char* ap_host_name = NULL;
  125. char* ap_ip_address = NULL;
  126. bool request_contains_hostname = false;
  127. esp_err_t hn_err = ESP_OK, err = ESP_OK;
  128. ESP_LOGD_LOC(TAG, "Getting adapter host name");
  129. if ((err = tcpip_adapter_get_hostname(TCPIP_ADAPTER_IF_STA, &host_name)) != ESP_OK) {
  130. ESP_LOGE_LOC(TAG, "Unable to get host name. Error: %s", esp_err_to_name(err));
  131. } else {
  132. ESP_LOGD_LOC(TAG, "Host name is %s", host_name);
  133. }
  134. ESP_LOGD_LOC(TAG, "Getting host name from request");
  135. char* req_host = alloc_get_http_header(req, "Host");
  136. if (tcpip_adapter_is_netif_up(TCPIP_ADAPTER_IF_AP)) {
  137. ESP_LOGD_LOC(TAG, "Soft AP is enabled. getting ip info");
  138. // Access point is up and running. Get the current IP address
  139. tcpip_adapter_ip_info_t ip_info;
  140. esp_err_t ap_ip_err = tcpip_adapter_get_ip_info(TCPIP_ADAPTER_IF_AP, &ip_info);
  141. if (ap_ip_err != ESP_OK) {
  142. ESP_LOGE_LOC(
  143. TAG, "Unable to get local AP ip address. Error: %s", esp_err_to_name(ap_ip_err));
  144. } else {
  145. ESP_LOGD_LOC(TAG, "getting host name for TCPIP_ADAPTER_IF_AP");
  146. if ((hn_err = tcpip_adapter_get_hostname(TCPIP_ADAPTER_IF_AP, &ap_host_name)) !=
  147. ESP_OK) {
  148. ESP_LOGE_LOC(TAG, "Unable to get host name. Error: %s", esp_err_to_name(hn_err));
  149. err = err == ESP_OK ? hn_err : err;
  150. } else {
  151. ESP_LOGD_LOC(TAG, "Soft AP Host name is %s", ap_host_name);
  152. }
  153. ap_ip_address = malloc_init_external(IP4ADDR_STRLEN_MAX);
  154. memset(ap_ip_address, 0x00, IP4ADDR_STRLEN_MAX);
  155. if (ap_ip_address) {
  156. ESP_LOGD_LOC(TAG, "Converting soft ip address to string");
  157. ip4addr_ntoa_r(&ip_info.ip, ap_ip_address, IP4ADDR_STRLEN_MAX);
  158. ESP_LOGD_LOC(
  159. TAG, "TCPIP_ADAPTER_IF_AP is up and has ip address %s ", ap_ip_address);
  160. }
  161. }
  162. }
  163. if ((request_contains_hostname = (host_name != NULL) && (req_host != NULL) &&
  164. strcasestr(req_host, host_name)) == true) {
  165. ESP_LOGD_LOC(TAG, "http request host = system host name %s", req_host);
  166. } else if ((request_contains_hostname = (ap_host_name != NULL) && (req_host != NULL) &&
  167. strcasestr(req_host, ap_host_name)) == true) {
  168. ESP_LOGD_LOC(TAG, "http request host = AP system host name %s", req_host);
  169. }
  170. FREE_AND_NULL(ap_ip_address);
  171. FREE_AND_NULL(req_host);
  172. return request_contains_hostname;
  173. }
  174. /* Custom function to free context */
  175. void free_ctx_func(void* ctx) {
  176. session_context_t* context = (session_context_t*)ctx;
  177. if (context) {
  178. ESP_LOGD(TAG, "Freeing up socket context");
  179. FREE_AND_NULL(context->auth_token);
  180. FREE_AND_NULL(context->sess_ip_address);
  181. free(context);
  182. }
  183. }
  184. session_context_t* get_session_context(httpd_req_t* req) {
  185. bool newConnection = false;
  186. ESP_LOGD_LOC(TAG,"Getting session context for %s",req->uri);
  187. if (!req->sess_ctx) {
  188. ESP_LOGD(TAG, "New connection context. Allocating session buffer");
  189. req->sess_ctx = malloc_init_external(sizeof(session_context_t));
  190. req->free_ctx = free_ctx_func;
  191. newConnection = true;
  192. // get the remote IP address only once per session
  193. }
  194. session_context_t* ctx_data = (session_context_t*)req->sess_ctx;
  195. FREE_AND_NULL(ctx_data->sess_ip_address);
  196. ctx_data->sess_ip_address = http_alloc_get_socket_address(req, 0, &ctx_data->port);
  197. if (newConnection) {
  198. ESP_LOGI(TAG, "serving %s to peer %s port %u", req->uri, ctx_data->sess_ip_address,
  199. ctx_data->port);
  200. }
  201. return (session_context_t*)req->sess_ctx;
  202. }
  203. bool is_spiffs_safe_thread(httpd_req_t* req) {
  204. session_context_t* ctx_data = get_session_context(req);
  205. return ctx_data->signal != NULL;
  206. }
  207. void finalize_dispatch(httpd_req_t* req) {
  208. ESP_LOGD_LOC(TAG,"Finalizing dispatch");
  209. session_context_t* ctx_data = get_session_context(req);
  210. if (!ctx_data) {
  211. ESP_LOGE(TAG, "Invalid HTTP Context");
  212. } else {
  213. xSemaphoreGive(ctx_data->signal);
  214. }
  215. }
  216. void dispatch_response(httpd_req_t* req, network_manager_ret_cb_t cb) {
  217. session_context_t* ctx_data = get_session_context(req);
  218. if (!ctx_data) {
  219. ESP_LOGE(TAG, "Invalid HTTP Context");
  220. return;
  221. }
  222. ctx_data->signal = xSemaphoreCreateBinary();
  223. ESP_LOGD_LOC(TAG,"FIRING async task for %s",req->uri);
  224. network_async_callback_withret(req, cb);
  225. ESP_LOGD_LOC(TAG,"WAITING for async task to complete for %s",req->uri);
  226. if (xSemaphoreTake(ctx_data->signal, portMAX_DELAY) != pdTRUE) {
  227. ESP_LOGE(TAG, "Async http failed for %s", req->uri);
  228. }
  229. ESP_LOGD_LOC(TAG,"COMPLETED Async task for %s",req->uri);
  230. vSemaphoreDelete(ctx_data->signal);
  231. ctx_data->signal = NULL;
  232. }
  233. bool is_user_authenticated(httpd_req_t* req) {
  234. session_context_t* ctx_data = get_session_context(req);
  235. if (ctx_data->authenticated) {
  236. ESP_LOGD_LOC(TAG, "User is authenticated.");
  237. return true;
  238. }
  239. ESP_LOGD(TAG, "Heap internal:%zu (min:%zu) external:%zu (min:%zu) dma:%zu (min:%zu)",
  240. heap_caps_get_free_size(MALLOC_CAP_INTERNAL),
  241. heap_caps_get_minimum_free_size(MALLOC_CAP_INTERNAL),
  242. heap_caps_get_free_size(MALLOC_CAP_SPIRAM),
  243. heap_caps_get_minimum_free_size(MALLOC_CAP_SPIRAM), heap_caps_get_free_size(MALLOC_CAP_DMA),
  244. heap_caps_get_minimum_free_size(MALLOC_CAP_DMA));
  245. // todo: ask for user to authenticate
  246. return false;
  247. }
  248. /* Copies the full path into destination buffer and returns
  249. * pointer to requested file name */
  250. static const char* get_path_from_uri(char* dest, const char* uri, size_t destsize) {
  251. size_t pathlen = strlen(uri);
  252. memset(dest, 0x0, destsize);
  253. const char* quest = strchr(uri, '?');
  254. if (quest) {
  255. pathlen = MIN(pathlen, quest - uri);
  256. }
  257. const char* hash = strchr(uri, '#');
  258. if (hash) {
  259. pathlen = MIN(pathlen, hash - uri);
  260. }
  261. if (pathlen + 1 > destsize) {
  262. /* Full path string won't fit into destination buffer */
  263. return NULL;
  264. }
  265. strlcpy(dest, uri, pathlen + 1);
  266. // strip trailing blanks
  267. char* sr = dest + pathlen;
  268. while (*sr == ' ')
  269. *sr-- = '\0';
  270. char* last_fs = strchr(dest, '/');
  271. if (!last_fs) ESP_LOGD_LOC(TAG, "no / found in %s", dest);
  272. char* p = last_fs;
  273. while (p && *(++p) != '\0') {
  274. if (*p == '/') {
  275. last_fs = p;
  276. }
  277. }
  278. /* Return pointer to path, skipping the base */
  279. return last_fs ? ++last_fs : dest;
  280. }
  281. bool hasFileExtension(const char* filename, const char* ext) {
  282. size_t fn_len = strlen(filename);
  283. size_t ext_len = strlen(ext);
  284. if (ext_len > fn_len) {
  285. return false;
  286. }
  287. return strcasecmp(&filename[fn_len - ext_len], ext) == 0;
  288. }
  289. static esp_err_t set_content_type_from_file(httpd_req_t* req, const char* full_name) {
  290. char filename[strlen(full_name) + 1];
  291. strcpy(filename, full_name);
  292. if (hasFileExtension(full_name, ".gz")) {
  293. httpd_resp_set_hdr(req, "Content-Encoding", "gzip");
  294. // Remove the .gz extension for MIME type detection
  295. filename[strlen(full_name) - 3] = '\0';
  296. }
  297. if (hasFileExtension(filename, ".html") || hasFileExtension(filename, ".htm")) {
  298. return httpd_resp_set_type(req, "text/html");
  299. } else if (hasFileExtension(filename, ".css")) {
  300. return httpd_resp_set_type(req, "text/css");
  301. } else if (hasFileExtension(filename, ".js")) {
  302. return httpd_resp_set_type(req, "application/javascript");
  303. } else if (hasFileExtension(filename, ".json")) {
  304. return httpd_resp_set_type(req, "application/json");
  305. } else if (hasFileExtension(filename, ".xml")) {
  306. return httpd_resp_set_type(req, "application/xml");
  307. } else if (hasFileExtension(filename, ".jpg") || hasFileExtension(filename, ".jpeg")) {
  308. return httpd_resp_set_type(req, "image/jpeg");
  309. } else if (hasFileExtension(filename, ".png")) {
  310. return httpd_resp_set_type(req, "image/png");
  311. } else if (hasFileExtension(filename, ".gif")) {
  312. return httpd_resp_set_type(req, "image/gif");
  313. } else if (hasFileExtension(filename, ".svg")) {
  314. return httpd_resp_set_type(req, "image/svg+xml");
  315. } else if (hasFileExtension(filename, ".ico")) {
  316. return httpd_resp_set_type(req, "image/x-icon");
  317. } else if (hasFileExtension(filename, ".pdf")) {
  318. return httpd_resp_set_type(req, "application/pdf");
  319. } else if (hasFileExtension(filename, ".txt")) {
  320. return httpd_resp_set_type(req, "text/plain");
  321. } else if (hasFileExtension(filename, ".bin") || hasFileExtension(filename, ".dat")) {
  322. return httpd_resp_set_type(req, "application/octet-stream");
  323. } else if (hasFileExtension(filename, ".mp3")) {
  324. return httpd_resp_set_type(req, "audio/mpeg");
  325. } else if (hasFileExtension(filename, ".mp4")) {
  326. return httpd_resp_set_type(req, "video/mp4");
  327. } else if (hasFileExtension(filename, ".avi")) {
  328. return httpd_resp_set_type(req, "video/x-msvideo");
  329. }
  330. // Default MIME type for unknown files
  331. return httpd_resp_set_type(req, "application/octet-stream");
  332. }
  333. static esp_err_t set_content_type_from_req(httpd_req_t* req) {
  334. char filepath[FILE_PATH_MAX];
  335. const char* filename = get_path_from_uri(filepath, req->uri, sizeof(filepath));
  336. if (!filename) {
  337. ESP_LOGE_LOC(TAG, "Filename is too long");
  338. /* Respond with 500 Internal Server Error */
  339. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Filename too long");
  340. return ESP_FAIL;
  341. }
  342. /* If name has trailing '/', respond with directory contents */
  343. if (filename[strlen(filename) - 1] == '/' && strlen(filename) > 1) {
  344. httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Browsing files forbidden.");
  345. return ESP_FAIL;
  346. }
  347. set_content_type_from_file(req, filename);
  348. return ESP_OK;
  349. }
  350. // esp_err_t root_get_handler(httpd_req_t *req){
  351. // esp_err_t err = ESP_OK;
  352. // ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  353. // httpd_resp_set_hdr(req, "Access-Control-Allow-Origin", "*");
  354. // httpd_resp_set_hdr(req, "Accept-Encoding", "identity");
  355. // if(!is_user_authenticated(req)){
  356. // // todo: send password entry page and return
  357. // }
  358. // int idx=-1;
  359. // if((idx=resource_get_index("index.html"))>=0){
  360. // const size_t file_size = (resource_map_end[idx] - resource_map_start[idx]);
  361. // httpd_resp_set_hdr(req, "Content-Encoding", "gzip");
  362. // err = set_content_type_from_req(req);
  363. // if(err == ESP_OK){
  364. // httpd_resp_send(req, (const char *)resource_map_start[idx], file_size);
  365. // }
  366. // }
  367. // else{
  368. // httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "index.html not found");
  369. // return ESP_FAIL;
  370. // }
  371. // ESP_LOGD_LOC(TAG, "done serving [%s]", req->uri);
  372. // return err;
  373. // }
  374. static bool resolve_file_path(const char* uri, char* resolvedpath, size_t resolvedsize) {
  375. struct stat file_stat;
  376. // Assume the base path is the directory where files are served from
  377. // Generate the expected file path
  378. snprintf(resolvedpath, resolvedsize, "%s%s", www_dir, uri);
  379. // Check if file exists
  380. if (stat(resolvedpath, &file_stat) == 0) {
  381. // File exists
  382. return true;
  383. } else {
  384. // Check for compressed file
  385. strncat(resolvedpath, ".gz", resolvedsize - strlen(resolvedpath) - 1);
  386. if (stat(resolvedpath, &file_stat) == 0) {
  387. // Compressed file exists
  388. return true;
  389. }
  390. }
  391. // Neither uncompressed nor compressed file exists
  392. return false;
  393. }
  394. esp_err_t send_file_chunked(httpd_req_t* req, const char* filename) {
  395. struct stat file_stat = {};
  396. if (stat(filename, &file_stat) == -1) {
  397. ESP_LOGE(TAG, "Failed to stat file : %s", filename);
  398. /* Respond with 404 Not Found */
  399. httpd_resp_send_err(req, HTTPD_404_NOT_FOUND, "File does not exist");
  400. return ESP_FAIL;
  401. }
  402. FILE* fd = fopen(filename, "r");
  403. if (!fd) {
  404. ESP_LOGE(TAG, "Failed to read existing file : %s", filename);
  405. /* Respond with 500 Internal Server Error */
  406. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Failed to read existing file");
  407. return ESP_FAIL;
  408. }
  409. ESP_LOGD_LOC(TAG, "Setting content type for %s (%ld bytes)...", filename, file_stat.st_size);
  410. set_content_type_from_file(req, filename);
  411. ESP_LOGI(TAG, "Sending file : %s (%ld bytes)...", filename, file_stat.st_size);
  412. /* Retrieve the pointer to scratch buffer for temporary storage */
  413. char* chunk = ((rest_server_context_t*)(req->user_ctx))->scratch;
  414. size_t chunksize;
  415. do {
  416. ESP_LOGD_LOC(TAG,"More data to send");
  417. /* Read file in chunks into the scratch buffer */
  418. chunksize = fread(chunk, 1, SCRATCH_BUFSIZE, fd);
  419. ESP_LOGD_LOC(TAG,"Read chunk size: %d",chunksize);
  420. if (chunksize > 0) {
  421. /* Send the buffer contents as HTTP response chunk */
  422. if (httpd_resp_send_chunk(req, chunk, chunksize) != ESP_OK) {
  423. fclose(fd);
  424. ESP_LOGE(TAG, "File sending failed!");
  425. /* Abort sending file */
  426. ESP_LOGD_LOC(TAG,"Sending NULL chunk");
  427. httpd_resp_sendstr_chunk(req, NULL);
  428. ESP_LOGD_LOC(TAG,"Sending 500 internal error");
  429. /* Respond with 500 Internal Server Error */
  430. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Failed to send file");
  431. ESP_LOGD_LOC(TAG,"returning");
  432. return ESP_FAIL;
  433. }
  434. }
  435. /* Keep looping till the whole file is sent */
  436. } while (chunksize != 0);
  437. /* Close file after sending complete */
  438. fclose(fd);
  439. ESP_LOGI(TAG, "File sending complete for %s", req->uri);
  440. /* Respond with an empty chunk to signal HTTP response completion */
  441. ESP_LOGD_LOC(TAG,"Closing connection");
  442. httpd_resp_send_chunk(req, NULL, 0);
  443. return ESP_OK;
  444. }
  445. esp_err_t file_get_handler(httpd_req_t* req) {
  446. esp_err_t err = ESP_OK;
  447. char filepath[FILE_PATH_MAX];
  448. if (!is_spiffs_safe_thread(req)) {
  449. dispatch_response(req, (network_manager_ret_cb_t)file_get_handler);
  450. return ESP_OK;
  451. }
  452. // const char* filename = get_path_from_uri(filepath, req->uri, sizeof(filepath));
  453. ESP_LOGD_LOC(TAG, "Serving file from [%s]", req->uri);
  454. if (err == ESP_OK && req->uri[strlen(req->uri) - 1] == '/') {
  455. httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, "Browsing files forbidden.");
  456. err = ESP_FAIL;
  457. }
  458. if (err == ESP_OK && strlen(req->uri) != 0 && hasFileExtension(req->uri, ".map")) {
  459. err = httpd_resp_sendstr(req, "");
  460. } else {
  461. if (err == ESP_OK && !resolve_file_path(req->uri, filepath, sizeof(filepath))) {
  462. httpd_resp_send_err(req, HTTPD_404_NOT_FOUND, "File not found");
  463. err = ESP_FAIL;
  464. }
  465. err = send_file_chunked(req, filepath);
  466. }
  467. finalize_dispatch(req);
  468. return err;
  469. }
  470. esp_err_t root_get_handler(httpd_req_t* req) {
  471. size_t sz;
  472. char filepath[FILE_PATH_MAX];
  473. esp_err_t err = ESP_OK;
  474. ESP_LOGD(TAG, "Serving [%s]", req->uri);
  475. if (!is_spiffs_safe_thread(req)) {
  476. dispatch_response(req, (network_manager_ret_cb_t)root_get_handler);
  477. return ESP_OK;
  478. }
  479. if (!is_user_authenticated(req)) {
  480. // TODO: Send password entry page and return
  481. }
  482. httpd_resp_set_hdr(req, "Access-Control-Allow-Origin", "*");
  483. httpd_resp_set_hdr(req, "Accept-Encoding", "identity");
  484. if (!resolve_file_path("/index.html", filepath, sizeof(filepath))) {
  485. httpd_resp_send_err(req, HTTPD_404_NOT_FOUND, "File not found");
  486. err = ESP_FAIL;
  487. }
  488. err = send_file_chunked(req, filepath);
  489. finalize_dispatch(req);
  490. return err;
  491. }
  492. esp_err_t resource_filehandler(httpd_req_t* req) {
  493. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  494. esp_err_t err = file_get_handler(req);
  495. ESP_LOGD_LOC(TAG, "Resource sending complete");
  496. return err;
  497. }
  498. esp_err_t console_cmd_get_handler(httpd_req_t* req) {
  499. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  500. if (!is_user_authenticated(req)) {
  501. // todo: redirect to login page
  502. // return ESP_OK;
  503. }
  504. /* if we can get the mutex, write the last version of the AP list */
  505. esp_err_t err = set_content_type_from_req(req);
  506. cJSON* cmdlist = get_cmd_list();
  507. char* json_buffer = cJSON_Print(cmdlist);
  508. if (json_buffer) {
  509. httpd_resp_send(req, (const char*)json_buffer, HTTPD_RESP_USE_STRLEN);
  510. free(json_buffer);
  511. } else {
  512. ESP_LOGD_LOC(TAG, "Error retrieving command json string. ");
  513. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Unable to format command");
  514. }
  515. cJSON_Delete(cmdlist);
  516. ESP_LOGD_LOC(TAG, "done serving [%s]", req->uri);
  517. return err;
  518. }
  519. esp_err_t console_cmd_post_handler(httpd_req_t* req) {
  520. char success[] = "{\"Result\" : \"Success\" }";
  521. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  522. // bool bOTA=false;
  523. // char * otaURL=NULL;
  524. esp_err_t err = post_handler_buff_receive(req);
  525. if (err != ESP_OK) {
  526. return err;
  527. }
  528. if (!is_user_authenticated(req)) {
  529. // todo: redirect to login page
  530. // return ESP_OK;
  531. }
  532. err = set_content_type_from_req(req);
  533. if (err != ESP_OK) {
  534. return err;
  535. }
  536. char* command = ((rest_server_context_t*)(req->user_ctx))->scratch;
  537. cJSON* root = cJSON_Parse(command);
  538. if (root == NULL) {
  539. ESP_LOGE_LOC(TAG, "Parsing command. Received content was: %s", command);
  540. httpd_resp_send_err(
  541. req, HTTPD_400_BAD_REQUEST, "Malformed command json. Unable to parse content.");
  542. return ESP_FAIL;
  543. }
  544. char* root_str = cJSON_Print(root);
  545. if (root_str != NULL) {
  546. ESP_LOGD(TAG, "Processing command item: \n%s", root_str);
  547. free(root_str);
  548. }
  549. cJSON* item = cJSON_GetObjectItemCaseSensitive(root, "command");
  550. if (!item) {
  551. ESP_LOGE_LOC(TAG, "Command not found. Received content was: %s", command);
  552. httpd_resp_send_err(
  553. req, HTTPD_400_BAD_REQUEST, "Malformed command json. Unable to parse content.");
  554. err = ESP_FAIL;
  555. } else {
  556. // navigate to the first child of the config structure
  557. char* cmd = cJSON_GetStringValue(item);
  558. if (!console_push(cmd, strlen(cmd) + 1)) {
  559. httpd_resp_send_err(
  560. req, HTTPD_500_INTERNAL_SERVER_ERROR, "Unable to push command for execution");
  561. } else {
  562. httpd_resp_send(req, (const char*)success, strlen(success));
  563. }
  564. }
  565. ESP_LOGD_LOC(TAG, "done serving [%s]", req->uri);
  566. return err;
  567. }
  568. esp_err_t post_handler_buff_receive(httpd_req_t* req) {
  569. esp_err_t err = ESP_OK;
  570. int total_len = req->content_len;
  571. int cur_len = 0;
  572. char* buf = ((rest_server_context_t*)(req->user_ctx))->scratch;
  573. int received = 0;
  574. if (total_len >= SCRATCH_BUFSIZE) {
  575. /* Respond with 500 Internal Server Error */
  576. ESP_LOGE_LOC(TAG, "Received content was too long. ");
  577. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Content too long");
  578. err = ESP_FAIL;
  579. }
  580. while (err == ESP_OK && cur_len < total_len) {
  581. received = httpd_req_recv(req, buf + cur_len, total_len);
  582. if (received <= 0) {
  583. /* Respond with 500 Internal Server Error */
  584. ESP_LOGE_LOC(TAG, "Not all data was received. ");
  585. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Not all data was received");
  586. err = ESP_FAIL;
  587. } else {
  588. cur_len += received;
  589. }
  590. }
  591. if (err == ESP_OK) {
  592. buf[total_len] = '\0';
  593. }
  594. return err;
  595. }
  596. esp_err_t send_response(httpd_req_t* req, sys_request_response* response) {
  597. esp_err_t err = ESP_OK;
  598. pb_ostream_t http_stream = PB_OSTREAM_SIZING;
  599. http_stream.callback = &out_http_binding;
  600. http_stream.state = req;
  601. http_stream.max_size = SIZE_MAX;
  602. if (!pb_encode(&http_stream, &sys_request_response_msg, response)) {
  603. err = ESP_FAIL;
  604. }
  605. /* Respond with an empty chunk to signal HTTP response completion */
  606. httpd_resp_send_chunk(req, NULL, 0);
  607. return err;
  608. }
  609. esp_err_t data_post_handler(httpd_req_t* req) {
  610. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  611. sys_request_payload payload;
  612. sys_request_response response;
  613. response.result = sys_request_result_SUCCESS;
  614. response.message = "";
  615. char* otaURL = NULL;
  616. if (!is_user_authenticated(req)) {
  617. // todo: redirect to login page
  618. // return ESP_OK;
  619. }
  620. esp_err_t err = set_content_type_from_req(req);
  621. if (err != ESP_OK) {
  622. return err;
  623. }
  624. pb_istream_t http_stream = PB_ISTREAM_EMPTY;
  625. http_stream.callback = &in_http_binding;
  626. http_stream.state = req;
  627. http_stream.bytes_left = req->content_len;
  628. if (!pb_decode(&http_stream, &sys_request_payload_msg, &payload)) {
  629. httpd_resp_send_err(req, HTTPD_400_BAD_REQUEST, http_stream.errmsg);
  630. return ESP_FAIL;
  631. }
  632. ESP_LOGI(TAG, "Received Payload");
  633. dump_structure(&sys_request_payload_msg, &payload);
  634. switch (payload.type) {
  635. case sys_request_type_CONFIG:
  636. if (payload.action == sys_request_action_GET) {
  637. if (!config_http_send_config(req)) {
  638. err = ESP_FAIL;
  639. }
  640. } else {
  641. // we are setting a config object
  642. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Not implemented");
  643. err = ESP_FAIL;
  644. }
  645. break;
  646. case sys_request_type_STATUS:
  647. if (payload.action == sys_request_action_GET) {
  648. if(!network_status_send_object(req)){
  649. err = ESP_FAIL;
  650. }
  651. }
  652. else {
  653. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Invalid request type");
  654. err = ESP_FAIL;
  655. }
  656. break;
  657. case sys_request_type_SCAN:
  658. if (payload.action == sys_request_action_GET) {
  659. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "SCAN List should be retrieved with request type STATUS");
  660. err = ESP_FAIL;
  661. } else {
  662. network_async_scan();
  663. }
  664. break;
  665. case sys_request_type_OTA:
  666. if (payload.which_data != sys_request_payload_URL_tag) {
  667. response.result = sys_request_result_ERROR;
  668. response.message = "Missing URL";
  669. } else {
  670. otaURL = strdup_psram(payload.data.URL);
  671. if (is_recovery_running) {
  672. ESP_LOGW_LOC(TAG, "Starting process OTA for url %s", otaURL);
  673. } else {
  674. ESP_LOGW_LOC(TAG, "Restarting system to process OTA for url %s", otaURL);
  675. }
  676. network_reboot_ota(otaURL);
  677. }
  678. break;
  679. default:
  680. break;
  681. }
  682. send_response(req, &response);
  683. pb_release(&sys_request_payload_msg, &payload);
  684. return err;
  685. }
  686. esp_err_t connect_post_handler(httpd_req_t* req) {
  687. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  688. char success[] = "{}";
  689. char* ssid = NULL;
  690. char* password = NULL;
  691. char* host_name = NULL;
  692. esp_err_t err = post_handler_buff_receive(req);
  693. if (err != ESP_OK) {
  694. return err;
  695. }
  696. err = set_content_type_from_req(req);
  697. if (err != ESP_OK) {
  698. return err;
  699. }
  700. char* buf = ((rest_server_context_t*)(req->user_ctx))->scratch;
  701. if (!is_user_authenticated(req)) {
  702. // todo: redirect to login page
  703. // return ESP_OK;
  704. }
  705. cJSON* root = cJSON_Parse(buf);
  706. if (root == NULL) {
  707. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "JSON parsing error.");
  708. return ESP_FAIL;
  709. }
  710. cJSON* ssid_object = cJSON_GetObjectItem(root, "ssid");
  711. if (ssid_object != NULL) {
  712. ssid = strdup_psram(ssid_object->valuestring);
  713. }
  714. cJSON* password_object = cJSON_GetObjectItem(root, "pwd");
  715. if (password_object != NULL) {
  716. password = strdup_psram(password_object->valuestring);
  717. }
  718. cJSON* host_name_object = cJSON_GetObjectItem(root, "host_name");
  719. if (host_name_object != NULL) {
  720. host_name = strdup_psram(host_name_object->valuestring);
  721. }
  722. cJSON_Delete(root);
  723. // if(host_name!=NULL){
  724. // if(config_set_value(NVS_TYPE_STR, "host_name", host_name) != ESP_OK){
  725. // ESP_LOGW_LOC(TAG, "Unable to save host name configuration");
  726. // }
  727. // }
  728. #pragma message("Update this to protocol buffers")
  729. if (ssid != NULL && strlen(ssid) <= platform->net.max_ssid_size &&
  730. strlen(password) <= platform->net.max_password_size) {
  731. network_async_connect(ssid, password);
  732. httpd_resp_send(req, (const char*)success, strlen(success));
  733. } else {
  734. httpd_resp_send_err(
  735. req, HTTPD_400_BAD_REQUEST, "Malformed json. Missing or invalid ssid/password.");
  736. err = ESP_FAIL;
  737. }
  738. // FREE_AND_NULL(ssid);
  739. // FREE_AND_NULL(password);
  740. // FREE_AND_NULL(host_name);
  741. // TODO: Add support for the commented code
  742. return err;
  743. }
  744. esp_err_t connect_delete_handler(httpd_req_t* req) {
  745. char success[] = "{}";
  746. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  747. if (!is_user_authenticated(req)) {
  748. // todo: redirect to login page
  749. // return ESP_OK;
  750. }
  751. esp_err_t err = set_content_type_from_req(req);
  752. if (err != ESP_OK) {
  753. return err;
  754. }
  755. httpd_resp_send(req, (const char*)success, strlen(success));
  756. network_async_delete();
  757. return ESP_OK;
  758. }
  759. esp_err_t reboot_ota_post_handler(httpd_req_t* req) {
  760. char success[] = "{}";
  761. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  762. if (!is_user_authenticated(req)) {
  763. // todo: redirect to login page
  764. // return ESP_OK;
  765. }
  766. esp_err_t err = set_content_type_from_req(req);
  767. if (err != ESP_OK) {
  768. return err;
  769. }
  770. httpd_resp_send(req, (const char*)success, strlen(success));
  771. network_async_reboot(OTA);
  772. return ESP_OK;
  773. }
  774. esp_err_t reboot_post_handler(httpd_req_t* req) {
  775. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  776. char success[] = "{}";
  777. if (!is_user_authenticated(req)) {
  778. // todo: redirect to login page
  779. // return ESP_OK;
  780. }
  781. esp_err_t err = set_content_type_from_req(req);
  782. if (err != ESP_OK) {
  783. return err;
  784. }
  785. httpd_resp_send(req, (const char*)success, strlen(success));
  786. network_async_reboot(RESTART);
  787. return ESP_OK;
  788. }
  789. esp_err_t recovery_post_handler(httpd_req_t* req) {
  790. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  791. char success[] = "{}";
  792. if (!is_user_authenticated(req)) {
  793. // todo: redirect to login page
  794. // return ESP_OK;
  795. }
  796. esp_err_t err = set_content_type_from_req(req);
  797. if (err != ESP_OK) {
  798. return err;
  799. }
  800. httpd_resp_send(req, (const char*)success, strlen(success));
  801. network_async_reboot(RECOVERY);
  802. return ESP_OK;
  803. }
  804. esp_err_t flash_post_handler(httpd_req_t* req) {
  805. esp_err_t err = ESP_OK;
  806. if (is_recovery_running) {
  807. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  808. char success[] = "File uploaded. Flashing started.";
  809. if (!is_user_authenticated(req)) {
  810. // todo: redirect to login page
  811. // return ESP_OK;
  812. }
  813. err = httpd_resp_set_type(req, HTTPD_TYPE_TEXT);
  814. if (err != ESP_OK) {
  815. return err;
  816. }
  817. char* binary_buffer = malloc_init_external(req->content_len);
  818. if (binary_buffer == NULL) {
  819. ESP_LOGE(TAG, "File too large : %d bytes", req->content_len);
  820. /* Respond with 400 Bad Request */
  821. httpd_resp_send_err(
  822. req, HTTPD_400_BAD_REQUEST, "Binary file too large. Unable to allocate memory!");
  823. return ESP_FAIL;
  824. }
  825. ESP_LOGI(TAG, "Receiving ota binary file");
  826. /* Retrieve the pointer to scratch buffer for temporary storage */
  827. char* buf = ((rest_server_context_t*)(req->user_ctx))->scratch;
  828. char* head = binary_buffer;
  829. int received;
  830. /* Content length of the request gives
  831. * the size of the file being uploaded */
  832. int remaining = req->content_len;
  833. while (remaining > 0) {
  834. ESP_LOGI(TAG, "Remaining size : %d", remaining);
  835. /* Receive the file part by part into a buffer */
  836. if ((received = httpd_req_recv(req, buf, MIN(remaining, SCRATCH_BUFSIZE))) <= 0) {
  837. if (received == HTTPD_SOCK_ERR_TIMEOUT) {
  838. /* Retry if timeout occurred */
  839. continue;
  840. }
  841. // FREE_RESET(binary_buffer);
  842. // TODO: Add support for the commented code
  843. ESP_LOGE(TAG, "File reception failed!");
  844. /* Respond with 500 Internal Server Error */
  845. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Failed to receive file");
  846. err = ESP_FAIL;
  847. goto bail_out;
  848. }
  849. /* Write buffer content to file on storage */
  850. if (received) {
  851. memcpy(head, buf, received);
  852. head += received;
  853. }
  854. /* Keep track of remaining size of
  855. * the file left to be uploaded */
  856. remaining -= received;
  857. }
  858. /* Close file upon upload completion */
  859. ESP_LOGI(TAG, "File reception complete. Invoking OTA process.");
  860. err = start_ota(NULL, binary_buffer, req->content_len);
  861. if (err != ESP_OK) {
  862. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "OTA processing failed");
  863. goto bail_out;
  864. }
  865. // todo: handle this in ajax. For now, just send the root page
  866. httpd_resp_send(req, (const char*)success, strlen(success));
  867. }
  868. bail_out:
  869. return err;
  870. }
  871. char* get_ap_ip_address() {
  872. static char ap_ip_address[IP4ADDR_STRLEN_MAX] = {};
  873. tcpip_adapter_ip_info_t ip_info;
  874. esp_err_t err = ESP_OK;
  875. memset(ap_ip_address, 0x00, sizeof(ap_ip_address));
  876. ESP_LOGD_LOC(TAG, "checking if soft AP is enabled");
  877. if (tcpip_adapter_is_netif_up(TCPIP_ADAPTER_IF_AP)) {
  878. ESP_LOGD_LOC(TAG, "Soft AP is enabled. getting ip info");
  879. // Access point is up and running. Get the current IP address
  880. err = tcpip_adapter_get_ip_info(TCPIP_ADAPTER_IF_AP, &ip_info);
  881. if (err != ESP_OK) {
  882. ESP_LOGE_LOC(TAG, "Unable to get local AP ip address. Error: %s", esp_err_to_name(err));
  883. } else {
  884. ESP_LOGV_LOC(TAG, "Converting soft ip address to string");
  885. ip4addr_ntoa_r(&ip_info.ip, ap_ip_address, IP4ADDR_STRLEN_MAX);
  886. ESP_LOGD_LOC(TAG, "TCPIP_ADAPTER_IF_AP is up and has ip address %s ", ap_ip_address);
  887. }
  888. } else {
  889. ESP_LOGD_LOC(TAG, "AP Is not enabled. Returning blank string");
  890. }
  891. return ap_ip_address;
  892. }
  893. esp_err_t process_redirect(httpd_req_t* req, const char* status) {
  894. const char location_prefix[] = "http://";
  895. char* ap_ip_address = get_ap_ip_address();
  896. char* remote_ip = NULL;
  897. in_port_t port = 0;
  898. char* redirect_url = NULL;
  899. ESP_LOGD_LOC(TAG, "Getting remote socket address");
  900. remote_ip = http_alloc_get_socket_address(req, 0, &port);
  901. size_t buf_size = strlen(redirect_payload1) + strlen(redirect_payload2) +
  902. strlen(redirect_payload3) +
  903. 2 * (strlen(location_prefix) + strlen(ap_ip_address)) + 1;
  904. char* redirect = malloc_init_external(buf_size);
  905. if (strcasestr(status, "302")) {
  906. size_t url_buf_size = strlen(location_prefix) + strlen(ap_ip_address) + 1;
  907. redirect_url = malloc_init_external(url_buf_size);
  908. memset(redirect_url, 0x00, url_buf_size);
  909. snprintf(redirect_url, buf_size, "%s%s/", location_prefix, ap_ip_address);
  910. ESP_LOGW_LOC(
  911. TAG, "Redirecting host [%s] to %s (from uri %s)", remote_ip, redirect_url, req->uri);
  912. httpd_resp_set_hdr(req, "Location", redirect_url);
  913. snprintf(redirect, buf_size, "OK");
  914. } else {
  915. snprintf(redirect, buf_size, "%s%s%s%s%s%s%s", redirect_payload1, location_prefix,
  916. ap_ip_address, redirect_payload2, location_prefix, ap_ip_address, redirect_payload3);
  917. ESP_LOGW_LOC(TAG, "Responding to host [%s] (from uri %s) with redirect html page %s",
  918. remote_ip, req->uri, redirect);
  919. }
  920. httpd_resp_set_type(req, HTTPD_TYPE_TEXT);
  921. httpd_resp_set_hdr(req, "Cache-Control", "no-cache");
  922. httpd_resp_set_status(req, status);
  923. httpd_resp_send(req, redirect, HTTPD_RESP_USE_STRLEN);
  924. FREE_AND_NULL(redirect);
  925. FREE_AND_NULL(redirect_url);
  926. FREE_AND_NULL(remote_ip);
  927. return ESP_OK;
  928. }
  929. esp_err_t redirect_200_ev_handler(httpd_req_t* req) {
  930. ESP_LOGD_LOC(TAG, "Processing known redirect url %s", req->uri);
  931. process_redirect(req, "200 OK");
  932. return ESP_OK;
  933. }
  934. esp_err_t redirect_processor(httpd_req_t* req, httpd_err_code_t error) {
  935. esp_err_t err = ESP_OK;
  936. const char* host_name = NULL;
  937. const char* ap_host_name = NULL;
  938. char* user_agent = NULL;
  939. char* remote_ip = NULL;
  940. char* sta_ip_address = NULL;
  941. char* ap_ip_address = get_ap_ip_address();
  942. char* socket_local_address = NULL;
  943. bool request_contains_hostname = false;
  944. bool request_contains_ap_ip_address = false;
  945. bool request_is_sta_ip_address = false;
  946. bool connected_to_ap_ip_interface = false;
  947. bool connected_to_sta_ip_interface = false;
  948. bool useragentiscaptivenetwork = false;
  949. in_port_t port = 0;
  950. ESP_LOGV_LOC(TAG, "Getting remote socket address");
  951. remote_ip = http_alloc_get_socket_address(req, 0, &port);
  952. ESP_LOGW_LOC(TAG, "%s requested invalid URL: [%s]", remote_ip, req->uri);
  953. sta_ip_address = strdup_psram(sys_status->net.ip.ip);
  954. ESP_LOGV_LOC(TAG, "Getting host name from request");
  955. char* req_host = alloc_get_http_header(req, "Host");
  956. user_agent = alloc_get_http_header(req, "User-Agent");
  957. if ((useragentiscaptivenetwork =
  958. (user_agent != NULL && strcasestr(user_agent, "CaptiveNetworkSupport")) == true)) {
  959. ESP_LOGW_LOC(TAG, "Found user agent that supports captive networks! [%s]", user_agent);
  960. }
  961. esp_err_t hn_err = ESP_OK;
  962. ESP_LOGV_LOC(TAG, "Getting adapter host name");
  963. if ((hn_err = tcpip_adapter_get_hostname(TCPIP_ADAPTER_IF_STA, &host_name)) != ESP_OK) {
  964. ESP_LOGE_LOC(TAG, "Unable to get host name. Error: %s", esp_err_to_name(hn_err));
  965. err = err == ESP_OK ? hn_err : err;
  966. } else {
  967. ESP_LOGV_LOC(TAG, "Host name is %s", host_name);
  968. }
  969. in_port_t loc_port = 0;
  970. ESP_LOGV_LOC(TAG, "Getting local socket address");
  971. socket_local_address = http_alloc_get_socket_address(req, 1, &loc_port);
  972. ESP_LOGD_LOC(TAG,
  973. "Peer IP: %s [port %u], System AP IP address: %s, System host: %s. Requested Host: [%s], "
  974. "uri [%s]",
  975. STR_OR_NA(remote_ip), port, STR_OR_NA(ap_ip_address), STR_OR_NA(host_name),
  976. STR_OR_NA(req_host), req->uri);
  977. /* captive portal functionality: redirect to access point IP for HOST that are not the access
  978. * point IP OR the STA IP */
  979. /* determine if Host is from the STA IP address */
  980. if ((request_contains_hostname = (host_name != NULL) && (req_host != NULL) &&
  981. strcasestr(req_host, host_name)) == true) {
  982. ESP_LOGD_LOC(TAG, "http request host = system host name %s", req_host);
  983. } else if ((request_contains_hostname = (ap_host_name != NULL) && (req_host != NULL) &&
  984. strcasestr(req_host, ap_host_name)) == true) {
  985. ESP_LOGD_LOC(TAG, "http request host = AP system host name %s", req_host);
  986. }
  987. if ((request_contains_ap_ip_address = (ap_ip_address != NULL) && (req_host != NULL) &&
  988. strcasestr(req_host, ap_ip_address)) == true) {
  989. ESP_LOGD_LOC(TAG, "http request host is access point ip address %s", req_host);
  990. }
  991. if ((connected_to_ap_ip_interface = (ap_ip_address != NULL) && (socket_local_address != NULL) &&
  992. strcasestr(socket_local_address, ap_ip_address)) == true) {
  993. ESP_LOGD_LOC(
  994. TAG, "http request is connected to access point interface IP %s", ap_ip_address);
  995. }
  996. if ((request_is_sta_ip_address = (sta_ip_address != NULL) && (req_host != NULL) &&
  997. strcasestr(req_host, sta_ip_address)) == true) {
  998. ESP_LOGD_LOC(TAG, "http request host is WiFi client ip address %s", req_host);
  999. }
  1000. if ((connected_to_sta_ip_interface =
  1001. (sta_ip_address != NULL) && (socket_local_address != NULL) &&
  1002. strcasestr(sta_ip_address, socket_local_address)) == true) {
  1003. ESP_LOGD_LOC(TAG, "http request is connected to WiFi client ip address %s", sta_ip_address);
  1004. }
  1005. if ((error == 0) || (error == HTTPD_404_NOT_FOUND && connected_to_ap_ip_interface &&
  1006. !(request_contains_ap_ip_address || request_contains_hostname))) {
  1007. process_redirect(req, "302 Found");
  1008. } else {
  1009. ESP_LOGD_LOC(
  1010. TAG, "URL not found, and not processing captive portal so throw regular 404 error");
  1011. httpd_resp_send_err(req, error, NULL);
  1012. }
  1013. FREE_AND_NULL(socket_local_address);
  1014. FREE_AND_NULL(req_host);
  1015. FREE_AND_NULL(user_agent);
  1016. FREE_AND_NULL(sta_ip_address);
  1017. FREE_AND_NULL(remote_ip);
  1018. return err;
  1019. }
  1020. esp_err_t redirect_ev_handler(httpd_req_t* req) { return redirect_processor(req, 0); }
  1021. esp_err_t messages_get_handler(httpd_req_t* req) {
  1022. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  1023. if (!is_user_authenticated(req)) {
  1024. // todo: redirect to login page
  1025. // return ESP_OK;
  1026. }
  1027. esp_err_t err = set_content_type_from_req(req);
  1028. if (err != ESP_OK) {
  1029. return err;
  1030. }
  1031. cJSON* json_messages = messaging_retrieve_messages(messaging);
  1032. if (json_messages != NULL) {
  1033. char* json_text = cJSON_Print(json_messages);
  1034. httpd_resp_send(req, (const char*)json_text, strlen(json_text));
  1035. free(json_text);
  1036. cJSON_Delete(json_messages);
  1037. } else {
  1038. httpd_resp_send_err(req, HTTPD_500_INTERNAL_SERVER_ERROR, "Unable to retrieve messages");
  1039. }
  1040. return ESP_OK;
  1041. }
  1042. esp_err_t status_get_handler(httpd_req_t* req) {
  1043. ESP_LOGD_LOC(TAG, "serving [%s]", req->uri);
  1044. if (!is_user_authenticated(req)) {
  1045. // todo: redirect to login page
  1046. // return ESP_OK;
  1047. }
  1048. esp_err_t err = httpd_resp_set_type(req, "application/octet-stream");
  1049. if (err != ESP_OK) {
  1050. return err;
  1051. }
  1052. network_status_send_object(req);
  1053. return ESP_OK;
  1054. }
  1055. esp_err_t err_handler(httpd_req_t* req, httpd_err_code_t error) {
  1056. esp_err_t err = ESP_OK;
  1057. if (error != HTTPD_404_NOT_FOUND) {
  1058. err = httpd_resp_send_err(req, error, NULL);
  1059. } else {
  1060. err = redirect_processor(req, error);
  1061. }
  1062. return err;
  1063. }