mirror of
https://github.com/alexandrebobkov/ESP-Nodes.git
synced 2025-08-08 09:50:52 +00:00
929 lines
37 KiB
C
929 lines
37 KiB
C
// SPDX-FileCopyrightText: 2024 Cesanta Software Limited
|
|
// SPDX-License-Identifier: GPL-2.0-only or commercial
|
|
// Generated by Mongoose Wizard, https://mongoose.ws/wizard/
|
|
|
|
#include "mongoose.h"
|
|
#include "mongoose_glue.h"
|
|
|
|
#if MG_ARCH == MG_ARCH_UNIX || MG_ARCH == MG_ARCH_WIN32
|
|
#define HTTP_URL "http://0.0.0.0:8080"
|
|
#define HTTPS_URL "https://0.0.0.0:8443"
|
|
#else
|
|
#define HTTP_URL "http://0.0.0.0:80"
|
|
#define HTTPS_URL "https://0.0.0.0:443"
|
|
#endif
|
|
|
|
#ifndef offsetof
|
|
#define offsetof(st, m) ((size_t) ((char *) &((st *) 0)->m - (char *) 0))
|
|
#endif
|
|
|
|
#define NO_CACHE_HEADERS "Cache-Control: no-cache\r\n"
|
|
#define JSON_HEADERS "Content-Type: application/json\r\n" NO_CACHE_HEADERS
|
|
|
|
// How to create a self signed Elliptic Curve certificate, see
|
|
// https://github.com/cesanta/mongoose/blob/master/test/certs/generate.sh
|
|
#define TLS_CERT \
|
|
"-----BEGIN CERTIFICATE-----\n" \
|
|
"MIIBMTCB2aADAgECAgkAluqkgeuV/zUwCgYIKoZIzj0EAwIwEzERMA8GA1UEAwwI\n" \
|
|
"TW9uZ29vc2UwHhcNMjQwNTA3MTQzNzM2WhcNMzQwNTA1MTQzNzM2WjARMQ8wDQYD\n" \
|
|
"VQQDDAZzZXJ2ZXIwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASo3oEiG+BuTt5y\n" \
|
|
"ZRyfwNr0C+SP+4M0RG2pYkb2v+ivbpfi72NHkmXiF/kbHXtgmSrn/PeTqiA8M+mg\n" \
|
|
"BhYjDX+zoxgwFjAUBgNVHREEDTALgglsb2NhbGhvc3QwCgYIKoZIzj0EAwIDRwAw\n" \
|
|
"RAIgTXW9MITQSwzqbNTxUUdt9DcB+8pPUTbWZpiXcA26GMYCIBiYw+DSFMLHmkHF\n" \
|
|
"+5U3NXW3gVCLN9ntD5DAx8LTG8sB\n" \
|
|
"-----END CERTIFICATE-----\n"
|
|
|
|
#define TLS_KEY \
|
|
"-----BEGIN EC PRIVATE KEY-----\n" \
|
|
"MHcCAQEEIAVdo8UAScxG7jiuNY2UZESNX/KPH8qJ0u0gOMMsAzYWoAoGCCqGSM49\n" \
|
|
"AwEHoUQDQgAEqN6BIhvgbk7ecmUcn8Da9Avkj/uDNERtqWJG9r/or26X4u9jR5Jl\n" \
|
|
"4hf5Gx17YJkq5/z3k6ogPDPpoAYWIw1/sw==\n" \
|
|
"-----END EC PRIVATE KEY-----\n"
|
|
|
|
struct mg_mgr g_mgr; // Mongoose event manager
|
|
|
|
#if WIZARD_ENABLE_HTTP || WIZARD_ENABLE_HTTPS
|
|
// Every time device state changes, this counter increments.
|
|
// Used by the heartbeat endpoint, to signal the UI when to refresh
|
|
static unsigned long s_device_change_version = 0;
|
|
|
|
struct attribute {
|
|
const char *name;
|
|
const char *type;
|
|
const char *format;
|
|
size_t offset;
|
|
size_t size;
|
|
bool readonly;
|
|
};
|
|
|
|
struct apihandler {
|
|
const char *name;
|
|
const char *type;
|
|
bool readonly;
|
|
int read_level;
|
|
int write_level;
|
|
unsigned long version;
|
|
};
|
|
|
|
struct apihandler_custom {
|
|
struct apihandler common;
|
|
void (*reply)(struct mg_connection *, struct mg_http_message *);
|
|
};
|
|
|
|
struct apihandler_upload {
|
|
struct apihandler common;
|
|
void *(*opener)(char *, size_t); // Open function (OTA and upload)
|
|
bool (*closer)(void *); // Closer function (OTA and upload)
|
|
bool (*writer)(void *, void *, size_t); // Writer function (OTA and upload)
|
|
};
|
|
|
|
struct apihandler_ota {
|
|
struct apihandler common;
|
|
void *(*opener)(char *, size_t); // Open function (OTA and upload)
|
|
bool (*closer)(void *); // Closer function (OTA and upload)
|
|
bool (*writer)(void *, void *, size_t); // Writer function (OTA and upload)
|
|
};
|
|
|
|
struct apihandler_action {
|
|
struct apihandler common;
|
|
bool (*checker)(void); // Checker function for actions
|
|
void (*starter)(struct mg_str); // Starter function for actions
|
|
};
|
|
|
|
struct apihandler_data {
|
|
struct apihandler common;
|
|
const struct attribute *attributes; // Points to the strucure descriptor
|
|
size_t data_size; // Size of C structure
|
|
void (*getter)(void *); // Getter/check/begin function
|
|
void (*setter)(void *); // Setter/start/end function
|
|
};
|
|
|
|
struct apihandler_array {
|
|
struct apihandler common;
|
|
const struct attribute *attributes; // Points to the strucure descriptor
|
|
size_t data_size; // Size of C structure
|
|
void (*getter)(uint64_t, void *); // Getter/check/begin function
|
|
void (*setter)(uint64_t, void *); // Setter/start/end function
|
|
uint64_t (*sizer)(void); // Array size, for data handlers only
|
|
};
|
|
|
|
struct attribute s_state_attributes[] = {
|
|
{"speed", "int", NULL, offsetof(struct state, speed), 0, false},
|
|
{"temperature", "int", NULL, offsetof(struct state, temperature), 0, false},
|
|
{"humidity", "int", NULL, offsetof(struct state, humidity), 0, false},
|
|
{"uptime", "int", NULL, offsetof(struct state, uptime), 0, false},
|
|
{"version", "string", NULL, offsetof(struct state, version), 20, false},
|
|
{"online", "bool", NULL, offsetof(struct state, online), 0, false},
|
|
{"lights", "bool", NULL, offsetof(struct state, lights), 0, false},
|
|
{"level", "int", NULL, offsetof(struct state, level), 0, false},
|
|
{NULL, NULL, NULL, 0, 0, false}
|
|
};
|
|
struct attribute s_leds_attributes[] = {
|
|
{"led1", "bool", NULL, offsetof(struct leds, led1), 0, false},
|
|
{"led2", "bool", NULL, offsetof(struct leds, led2), 0, false},
|
|
{"led3", "bool", NULL, offsetof(struct leds, led3), 0, false},
|
|
{NULL, NULL, NULL, 0, 0, false}
|
|
};
|
|
struct attribute s_network_settings_attributes[] = {
|
|
{"ip_address", "string", NULL, offsetof(struct network_settings, ip_address), 20, false},
|
|
{"gw_address", "string", NULL, offsetof(struct network_settings, gw_address), 20, false},
|
|
{"netmask", "string", NULL, offsetof(struct network_settings, netmask), 20, false},
|
|
{"dhcp", "bool", NULL, offsetof(struct network_settings, dhcp), 0, false},
|
|
{NULL, NULL, NULL, 0, 0, false}
|
|
};
|
|
struct attribute s_settings_attributes[] = {
|
|
{"string_val", "string", NULL, offsetof(struct settings, string_val), 40, false},
|
|
{"log_level", "string", NULL, offsetof(struct settings, log_level), 10, false},
|
|
{"double_val", "double", "%.5f", offsetof(struct settings, double_val), 0, false},
|
|
{"int_val", "int", NULL, offsetof(struct settings, int_val), 0, false},
|
|
{"bool_val", "bool", NULL, offsetof(struct settings, bool_val), 0, false},
|
|
{NULL, NULL, NULL, 0, 0, false}
|
|
};
|
|
struct attribute s_security_attributes[] = {
|
|
{"admin_password", "string", NULL, offsetof(struct security, admin_password), 40, false},
|
|
{"user_password", "string", NULL, offsetof(struct security, user_password), 40, false},
|
|
{NULL, NULL, NULL, 0, 0, false}
|
|
};
|
|
|
|
struct apihandler_action s_apihandler_reboot = {{"reboot", "action", false, 3, 7, 0UL}, glue_check_reboot, glue_start_reboot};
|
|
struct apihandler_action s_apihandler_reformat = {{"reformat", "action", false, 3, 7, 0UL}, glue_check_reformat, glue_start_reformat};
|
|
struct apihandler_ota s_apihandler_firmware_update = {{"firmware_update", "ota", false, 3, 7, 0UL}, glue_ota_begin_firmware_update, glue_ota_end_firmware_update, glue_ota_write_firmware_update};
|
|
struct apihandler_upload s_apihandler_file_upload = {{"file_upload", "upload", false, 3, 7, 0UL}, glue_file_open_file_upload, glue_file_close_file_upload, glue_file_write_file_upload};
|
|
struct apihandler_custom s_apihandler_graph_data = {{"graph_data", "custom", false, 3, 3, 0UL}, glue_reply_graph_data};
|
|
struct apihandler_data s_apihandler_state = {{"state", "data", true, 0, 0, 0UL}, s_state_attributes, sizeof(struct state), (void (*)(void *)) glue_get_state, NULL};
|
|
struct apihandler_data s_apihandler_leds = {{"leds", "data", false, 3, 3, 0UL}, s_leds_attributes, sizeof(struct leds), (void (*)(void *)) glue_get_leds, (void (*)(void *)) glue_set_leds};
|
|
struct apihandler_data s_apihandler_network_settings = {{"network_settings", "data", false, 3, 7, 0UL}, s_network_settings_attributes, sizeof(struct network_settings), (void (*)(void *)) glue_get_network_settings, (void (*)(void *)) glue_set_network_settings};
|
|
struct apihandler_data s_apihandler_settings = {{"settings", "data", false, 3, 7, 0UL}, s_settings_attributes, sizeof(struct settings), (void (*)(void *)) glue_get_settings, (void (*)(void *)) glue_set_settings};
|
|
struct apihandler_data s_apihandler_security = {{"security", "data", false, 7, 7, 0UL}, s_security_attributes, sizeof(struct security), (void (*)(void *)) glue_get_security, (void (*)(void *)) glue_set_security};
|
|
struct apihandler_custom s_apihandler_loglevels = {{"loglevels", "custom", false, 0, 0, 0UL}, glue_reply_loglevels};
|
|
struct apihandler_custom s_apihandler_events = {{"events", "custom", false, 0, 0, 0UL}, glue_reply_events};
|
|
|
|
static struct apihandler *s_apihandlers[] = {
|
|
(struct apihandler *) &s_apihandler_reboot,
|
|
(struct apihandler *) &s_apihandler_reformat,
|
|
(struct apihandler *) &s_apihandler_firmware_update,
|
|
(struct apihandler *) &s_apihandler_file_upload,
|
|
(struct apihandler *) &s_apihandler_graph_data,
|
|
(struct apihandler *) &s_apihandler_state,
|
|
(struct apihandler *) &s_apihandler_leds,
|
|
(struct apihandler *) &s_apihandler_network_settings,
|
|
(struct apihandler *) &s_apihandler_settings,
|
|
(struct apihandler *) &s_apihandler_security,
|
|
(struct apihandler *) &s_apihandler_loglevels,
|
|
(struct apihandler *) &s_apihandler_events
|
|
};
|
|
|
|
static struct apihandler *get_api_handler(struct mg_str name) {
|
|
size_t num_handlers = sizeof(s_apihandlers) / sizeof(s_apihandlers[0]);
|
|
size_t i;
|
|
if (name.len == 0) return NULL;
|
|
if (num_handlers == 0) return NULL;
|
|
for (i = 0; i < num_handlers; i++) {
|
|
struct apihandler *h = s_apihandlers[i];
|
|
size_t n = strlen(h->name);
|
|
if (n > name.len) continue;
|
|
if (strncmp(name.buf, h->name, n) != 0) continue;
|
|
if (name.len > n && name.buf[n] != '/') continue;
|
|
return h;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static struct apihandler *find_handler(struct mg_http_message *hm) {
|
|
if (hm->uri.len < 6 || strncmp(hm->uri.buf, "/api/", 5) != 0) return NULL;
|
|
return get_api_handler(mg_str_n(hm->uri.buf + 5, hm->uri.len - 5));
|
|
}
|
|
|
|
void mg_json_get_str2(struct mg_str json, const char *path, char *buf,
|
|
size_t len) {
|
|
struct mg_str s = mg_json_get_tok(json, path);
|
|
if (s.len > 1 && s.buf[0] == '"') {
|
|
mg_json_unescape(mg_str_n(s.buf + 1, s.len - 2), buf, len);
|
|
}
|
|
}
|
|
|
|
void mongoose_set_http_handlers(const char *name, ...) {
|
|
struct apihandler *h = get_api_handler(mg_str(name));
|
|
va_list ap;
|
|
va_start(ap, name);
|
|
if (h == NULL) {
|
|
MG_ERROR(("No API with name [%s]", name));
|
|
} else if (strcmp(h->type, "data") == 0) {
|
|
((struct apihandler_data *) h)->getter = va_arg(ap, void (*)(void *));
|
|
((struct apihandler_data *) h)->setter = va_arg(ap, void (*)(void *));
|
|
} else if (strcmp(h->type, "action") == 0) {
|
|
((struct apihandler_action *) h)->checker = va_arg(ap, bool (*)(void));
|
|
((struct apihandler_action *) h)->starter =
|
|
va_arg(ap, void (*)(struct mg_str));
|
|
} else if (strcmp(h->type, "ota") == 0 || strcmp(h->type, "upload") == 0) {
|
|
((struct apihandler_ota *) h)->opener =
|
|
va_arg(ap, void *(*) (char *, size_t));
|
|
((struct apihandler_ota *) h)->closer = va_arg(ap, bool (*)(void *));
|
|
((struct apihandler_ota *) h)->writer =
|
|
va_arg(ap, bool (*)(void *, void *, size_t));
|
|
} else if (strcmp(h->type, "custom") == 0) {
|
|
((struct apihandler_custom *) h)->reply =
|
|
va_arg(ap, void (*)(struct mg_connection *, struct mg_http_message *));
|
|
} else {
|
|
MG_ERROR(("Setting [%s] failed: not implemented", name));
|
|
}
|
|
va_end(ap);
|
|
}
|
|
|
|
#if WIZARD_ENABLE_HTTP_UI_LOGIN
|
|
|
|
struct user {
|
|
struct user *next;
|
|
char name[32]; // User name
|
|
char token[21]; // Login token
|
|
int level; // Access level
|
|
};
|
|
|
|
static struct user *s_users; // List of authenticated users
|
|
|
|
// Parse HTTP requests, return authenticated user or NULL
|
|
static struct user *authenticate(struct mg_http_message *hm) {
|
|
char user[100], pass[100];
|
|
struct user *u, *result = NULL;
|
|
mg_http_creds(hm, user, sizeof(user), pass, sizeof(pass));
|
|
|
|
if (user[0] != '\0' && pass[0] != '\0') {
|
|
// Both user and password is set, auth by user/password via glue API
|
|
int level = glue_authenticate(user, pass);
|
|
MG_DEBUG(("user %s, level: %d", user, level));
|
|
if (level > 0) { // Proceed only if the firmware authenticated us
|
|
// uint64_t uid = hash(3, mg_str(user), mg_str(":"), mg_str(pass));
|
|
for (u = s_users; u != NULL && result == NULL; u = u->next) {
|
|
if (strcmp(user, u->name) == 0) result = u;
|
|
}
|
|
// Not yet authenticated, add to the list
|
|
if (result == NULL) {
|
|
result = (struct user *) calloc(1, sizeof(*result));
|
|
mg_snprintf(result->name, sizeof(result->name), "%s", user);
|
|
mg_random_str(result->token, sizeof(result->token) - 1);
|
|
result->level = level, result->next = s_users, s_users = result;
|
|
}
|
|
}
|
|
} else if (user[0] == '\0' && pass[0] != '\0') {
|
|
for (u = s_users; u != NULL && result == NULL; u = u->next) {
|
|
if (strcmp(u->token, pass) == 0) result = u;
|
|
}
|
|
}
|
|
MG_VERBOSE(("[%s/%s] -> %s", user, pass, result ? "OK" : "FAIL"));
|
|
return result;
|
|
}
|
|
|
|
static void handle_login(struct mg_connection *c, struct user *u) {
|
|
char cookie[256];
|
|
mg_snprintf(cookie, sizeof(cookie),
|
|
"Set-Cookie: access_token=%s; Path=/; "
|
|
"%sHttpOnly; SameSite=Lax; Max-Age=%d\r\n",
|
|
u->token, c->is_tls ? "Secure; " : "", 3600 * 24);
|
|
mg_http_reply(c, 200, cookie, "{%m:%m,%m:%d}", //
|
|
MG_ESC("user"), MG_ESC(u->name), //
|
|
MG_ESC("level"), u->level);
|
|
}
|
|
|
|
static void handle_logout(struct mg_connection *c) {
|
|
char cookie[256];
|
|
mg_snprintf(cookie, sizeof(cookie),
|
|
"Set-Cookie: access_token=; Path=/; "
|
|
"Expires=Thu, 01 Jan 1970 00:00:00 UTC; "
|
|
"%sHttpOnly; Max-Age=0; \r\n",
|
|
c->is_tls ? "Secure; " : "");
|
|
mg_http_reply(c, 401, cookie, "Unauthorized\n");
|
|
}
|
|
#endif // WIZARD_ENABLE_HTTP_UI_LOGIN
|
|
|
|
struct upload_state {
|
|
char marker; // Tells that we're a file upload connection
|
|
size_t expected; // POST data length, bytes
|
|
size_t received; // Already received bytes
|
|
void *fp; // Opened file
|
|
bool (*fn_close)(void *); // Close function
|
|
bool (*fn_write)(void *, void *, size_t); // Write function
|
|
};
|
|
|
|
struct action_state {
|
|
char marker; // Tells that we're an action connection
|
|
bool (*fn)(void); // Action status function
|
|
};
|
|
|
|
static void close_uploaded_file(struct upload_state *us) {
|
|
us->marker = 0;
|
|
if (us->fn_close != NULL && us->fp != NULL) {
|
|
us->fn_close(us->fp);
|
|
us->fp = NULL;
|
|
}
|
|
memset(us, 0, sizeof(*us));
|
|
}
|
|
|
|
static void upload_handler(struct mg_connection *c, int ev, void *ev_data) {
|
|
struct upload_state *us = (struct upload_state *) c->data;
|
|
if (sizeof(*us) > sizeof(c->data)) {
|
|
mg_error(
|
|
c, "FAILURE: sizeof(c->data) == %lu, need %lu. Set -DMG_DATA_SIZE=XXX",
|
|
sizeof(c->data), sizeof(*us));
|
|
return;
|
|
}
|
|
// Catch uploaded file data for both MG_EV_READ and MG_EV_HTTP_HDRS
|
|
if (us->marker == 'U' && ev == MG_EV_READ && us->expected > 0 &&
|
|
c->recv.len > 0) {
|
|
size_t alignment = 512; // Maximum flash write granularity (iMXRT, Pico)
|
|
size_t aligned = (us->received + c->recv.len < us->expected)
|
|
? aligned = MG_ROUND_DOWN(c->recv.len, alignment)
|
|
: c->recv.len; // Last write can be unaligned
|
|
bool ok = aligned > 0 ? us->fn_write(us->fp, c->recv.buf, aligned) : true;
|
|
us->received += aligned;
|
|
MG_DEBUG(("%lu chunk: %lu/%lu, %lu/%lu, ok: %d", c->id, aligned,
|
|
c->recv.len, us->received, us->expected, ok));
|
|
mg_iobuf_del(&c->recv, 0, aligned); // Delete received data
|
|
if (ok == false) {
|
|
mg_http_reply(c, 400, "", "Upload error\n");
|
|
close_uploaded_file(us);
|
|
c->is_draining = 1; // Close connection when response it sent
|
|
} else if (us->received >= us->expected) {
|
|
// Uploaded everything. Send response back
|
|
MG_INFO(("%lu done, %lu bytes", c->id, us->received));
|
|
mg_http_reply(c, 200, NULL, "%lu ok\n", us->received);
|
|
close_uploaded_file(us);
|
|
c->is_draining = 1; // Close connection when response it sent
|
|
}
|
|
}
|
|
|
|
// Close uploading file descriptor
|
|
if (us->marker == 'U' && ev == MG_EV_CLOSE) close_uploaded_file(us);
|
|
(void) ev_data;
|
|
}
|
|
|
|
static void prep_upload(struct mg_connection *c, struct mg_http_message *hm,
|
|
void *(*fn_open)(char *, size_t),
|
|
bool (*fn_close)(void *),
|
|
bool (*fn_write)(void *, void *, size_t)) {
|
|
struct upload_state *us = (struct upload_state *) c->data;
|
|
struct mg_str parts[3];
|
|
char path[MG_PATH_MAX];
|
|
memset(us, 0, sizeof(*us)); // Cleanup upload state
|
|
memset(parts, 0, sizeof(parts)); // Init match parts
|
|
mg_match(hm->uri, mg_str("/api/*/#"), parts); // Fetch file name
|
|
mg_url_decode(parts[1].buf, parts[1].len, path, sizeof(path), 0);
|
|
us->fp = fn_open(path, hm->body.len);
|
|
MG_DEBUG(("file: [%s] size: %lu fp: %p", path, hm->body.len, us->fp));
|
|
us->marker = 'U'; // Mark us as an upload connection
|
|
if (us->fp == NULL) {
|
|
mg_http_reply(c, 400, JSON_HEADERS, "File open error\n");
|
|
c->is_draining = 1;
|
|
} else {
|
|
us->expected = hm->body.len; // Store number of bytes we expect
|
|
us->fn_close = fn_close; // Store closing function
|
|
us->fn_write = fn_write; // Store writing function
|
|
mg_iobuf_del(&c->recv, 0, hm->head.len); // Delete HTTP headers
|
|
c->fn = upload_handler; // Change event handler function
|
|
c->pfn = NULL; // Detach HTTP handler
|
|
mg_call(c, MG_EV_READ, &c->recv.len); // Write initial data
|
|
}
|
|
}
|
|
|
|
static void handle_uploads(struct mg_connection *c, int ev, void *ev_data) {
|
|
struct upload_state *us = (struct upload_state *) c->data;
|
|
|
|
// Catch /upload requests early, without buffering whole body
|
|
// When we receive MG_EV_HTTP_HDRS event, that means we've received all
|
|
// HTTP headers but not necessarily full HTTP body
|
|
if (ev == MG_EV_HTTP_HDRS && us->marker == 0) {
|
|
struct mg_http_message *hm = (struct mg_http_message *) ev_data;
|
|
struct apihandler *h = find_handler(hm);
|
|
if (h != NULL &&
|
|
(strcmp(h->type, "upload") == 0 || strcmp(h->type, "ota") == 0)) {
|
|
struct apihandler_upload *hu = (struct apihandler_upload *) h;
|
|
prep_upload(c, hm, hu->opener, hu->closer, hu->writer);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void handle_action(struct mg_connection *c, struct mg_http_message *hm,
|
|
bool (*check_fn)(void),
|
|
void (*start_fn)(struct mg_str)) {
|
|
if (hm->body.len > 0) {
|
|
start_fn(hm->body);
|
|
if (check_fn()) {
|
|
struct action_state *as = (struct action_state *) c->data;
|
|
as->marker = 'A';
|
|
as->fn = check_fn;
|
|
} else {
|
|
mg_http_reply(c, 200, JSON_HEADERS, "false");
|
|
}
|
|
} else {
|
|
mg_http_reply(c, 200, JSON_HEADERS, "%s", check_fn() ? "true" : "false");
|
|
}
|
|
}
|
|
|
|
size_t print_struct(void (*out)(char, void *), void *ptr, va_list *ap) {
|
|
const struct attribute *a = va_arg(*ap, struct attribute *);
|
|
char *data = va_arg(*ap, char *);
|
|
size_t i, len = 0;
|
|
for (i = 0; a[i].name != NULL; i++) {
|
|
char *attrptr = data + a[i].offset;
|
|
len += mg_xprintf(out, ptr, "%s%m:", i == 0 ? "" : ",", MG_ESC(a[i].name));
|
|
if (strcmp(a[i].type, "int") == 0) {
|
|
len += mg_xprintf(out, ptr, "%d", *(int *) attrptr);
|
|
} else if (strcmp(a[i].type, "double") == 0) {
|
|
const char *fmt = a[i].format;
|
|
if (fmt == NULL) fmt = "%g";
|
|
len += mg_xprintf(out, ptr, fmt, *(double *) attrptr);
|
|
} else if (strcmp(a[i].type, "bool") == 0) {
|
|
len += mg_xprintf(out, ptr, "%s", *(bool *) attrptr ? "true" : "false");
|
|
} else if (strcmp(a[i].type, "string") == 0) {
|
|
len += mg_xprintf(out, ptr, "%m", MG_ESC(attrptr));
|
|
} else {
|
|
len += mg_xprintf(out, ptr, "null");
|
|
}
|
|
}
|
|
return len;
|
|
}
|
|
|
|
static void handle_object(struct mg_connection *c, struct mg_http_message *hm,
|
|
struct apihandler_data *h) {
|
|
void *data = calloc(1, h->data_size);
|
|
h->getter(data);
|
|
if (hm->body.len > 0 && h->data_size > 0) {
|
|
char *tmp = calloc(1, h->data_size);
|
|
size_t i;
|
|
memcpy(tmp, data, h->data_size);
|
|
for (i = 0; h->attributes[i].name != NULL; i++) {
|
|
const struct attribute *a = &h->attributes[i];
|
|
char jpath[100];
|
|
mg_snprintf(jpath, sizeof(jpath), "$.%s", a->name);
|
|
if (strcmp(a->type, "int") == 0) {
|
|
double d;
|
|
if (mg_json_get_num(hm->body, jpath, &d)) {
|
|
int v = (int) d;
|
|
memcpy(tmp + a->offset, &v, sizeof(v));
|
|
}
|
|
} else if (strcmp(a->type, "bool") == 0) {
|
|
mg_json_get_bool(hm->body, jpath, (bool *) (tmp + a->offset));
|
|
} else if (strcmp(a->type, "double") == 0) {
|
|
mg_json_get_num(hm->body, jpath, (double *) (tmp + a->offset));
|
|
} else if (strcmp(a->type, "string") == 0) {
|
|
mg_json_get_str2(hm->body, jpath, tmp + a->offset, a->size);
|
|
}
|
|
}
|
|
// If structure changes, increment version
|
|
if (memcmp(data, tmp, h->data_size) != 0) s_device_change_version++;
|
|
if (h->setter != NULL) h->setter(tmp); // Can be NULL if readonly
|
|
free(tmp);
|
|
h->getter(data); // Re-sync again after setting
|
|
}
|
|
mg_http_reply(c, 200, JSON_HEADERS, "{%M}\n", print_struct, h->attributes,
|
|
data);
|
|
free(data);
|
|
}
|
|
|
|
static size_t print_array(void (*out)(char, void *), void *ptr, va_list *ap) {
|
|
struct apihandler_array *ha = va_arg(*ap, struct apihandler_array *);
|
|
uint64_t size = *va_arg(*ap, uint64_t *);
|
|
uint64_t start = *va_arg(*ap, uint64_t *);
|
|
size_t i, max = 20, len = 0;
|
|
void *data = calloc(1, ha->data_size);
|
|
for (i = 0; i < max && start + i < size; i++) {
|
|
ha->getter(start + i, data);
|
|
if (i > 0) len += mg_xprintf(out, ptr, ",");
|
|
len += mg_xprintf(out, ptr, "{%M}", print_struct, ha->attributes, data);
|
|
}
|
|
free(data);
|
|
return len;
|
|
}
|
|
|
|
static void handle_array(struct mg_connection *c, struct mg_http_message *hm,
|
|
struct apihandler_array *h) {
|
|
char buf[40] = "";
|
|
uint64_t size = h->sizer();
|
|
uint64_t start = 0;
|
|
mg_http_get_var(&hm->query, "start", buf, sizeof(buf));
|
|
if (!mg_str_to_num(mg_str(buf), 10, &start, sizeof(start))) start = 0;
|
|
mg_http_reply(c, 200, JSON_HEADERS, "{%m:%llu, %m:%llu, %m:[%M]}\n",
|
|
MG_ESC("size"), size, MG_ESC("start"), start, MG_ESC("data"),
|
|
print_array, h, &size, &start);
|
|
}
|
|
|
|
size_t print_timeseries(void (*out)(char, void *), void *ptr, va_list *ap) {
|
|
uint32_t *timestamps = va_arg(*ap, uint32_t *);
|
|
double *values = va_arg(*ap, double *);
|
|
size_t count = va_arg(*ap, size_t);
|
|
size_t i, len = 0;
|
|
for (i = 0; i < count; i++) {
|
|
const char *comma = i == 0 ? "" : ",";
|
|
len += mg_xprintf(out, ptr, "%s[%lu,%g]", comma, timestamps[i], values[i]);
|
|
}
|
|
return len;
|
|
}
|
|
|
|
static void handle_api_call(struct mg_connection *c, struct mg_http_message *hm,
|
|
struct apihandler *h) {
|
|
if (strcmp(h->type, "object") == 0 || strcmp(h->type, "data") == 0) {
|
|
handle_object(c, hm, (struct apihandler_data *) h);
|
|
} else if (strcmp(h->type, "array") == 0) {
|
|
handle_array(c, hm, (struct apihandler_array *) h);
|
|
} else if (strcmp(h->type, "action") == 0) {
|
|
struct apihandler_action *ha = (struct apihandler_action *) h;
|
|
handle_action(c, hm, ha->checker, ha->starter);
|
|
// } else if (strcmp(h->type, "graph") == 0) {
|
|
// handle_graph(c, hm, (struct apihandler_graph *) h);
|
|
} else if (strcmp(h->type, "custom") == 0) {
|
|
((struct apihandler_custom *) h)->reply(c, hm);
|
|
} else {
|
|
mg_http_reply(c, 500, JSON_HEADERS, "API type %s unknown\n", h->type);
|
|
}
|
|
}
|
|
|
|
void glue_update_state(void) {
|
|
s_device_change_version++;
|
|
}
|
|
|
|
// Mongoose event handler function, gets called by the mg_mgr_poll()
|
|
static void http_ev_handler(struct mg_connection *c, int ev, void *ev_data) {
|
|
if (ev == MG_EV_HTTP_HDRS && c->data[0] == 0) {
|
|
#if WIZARD_ENABLE_HTTP_UI_LOGIN
|
|
struct mg_http_message *hm = (struct mg_http_message *) ev_data;
|
|
if (mg_match(hm->uri, mg_str("/api/#"), NULL) ||
|
|
mg_match(hm->uri, mg_str("/websocket"), NULL)) {
|
|
struct apihandler *h = find_handler(hm);
|
|
struct user *u = authenticate(hm);
|
|
if ((u == NULL ||
|
|
(h != NULL && (u->level < h->read_level ||
|
|
(hm->body.len > 0 && u->level < h->write_level))))) {
|
|
mg_http_reply(c, 403, JSON_HEADERS, "Not Authorised\n");
|
|
c->data[0] = 'Z'; // Mark this connection as handled
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
|
|
// We're checking c->is_websocket cause WS connection use c->data
|
|
if (c->is_websocket == 0) handle_uploads(c, ev, ev_data);
|
|
if (ev == MG_EV_POLL && c->is_websocket == 0 && c->data[0] == 'A') {
|
|
// Check if action in progress is complete
|
|
struct action_state *as = (struct action_state *) c->data;
|
|
if (as->fn() == false) {
|
|
mg_http_reply(c, 200, JSON_HEADERS, "true");
|
|
memset(as, 0, sizeof(*as));
|
|
}
|
|
} else if (ev == MG_EV_HTTP_MSG && c->is_websocket == 0 && c->data[0] == 0) {
|
|
struct mg_http_message *hm = (struct mg_http_message *) ev_data;
|
|
#if WIZARD_ENABLE_HTTP || WIZARD_ENABLE_HTTPS
|
|
struct apihandler *h = find_handler(hm);
|
|
#if WIZARD_ENABLE_HTTP_UI_LOGIN
|
|
struct user *u = authenticate(hm);
|
|
if (mg_match(hm->uri, mg_str("/api/login"), NULL)) {
|
|
handle_login(c, u);
|
|
} else if (mg_match(hm->uri, mg_str("/api/logout"), NULL)) {
|
|
handle_logout(c);
|
|
} else
|
|
#endif
|
|
if (mg_match(hm->uri, mg_str("/api/ok"), NULL)) {
|
|
mg_http_reply(c, 200, JSON_HEADERS, "true\n");
|
|
} else if (mg_match(hm->uri, mg_str("/websocket"), NULL)) {
|
|
mg_ws_upgrade(c, hm, NULL);
|
|
} else if (mg_match(hm->uri, mg_str("/api/heartbeat"), NULL)) {
|
|
mg_http_reply(c, 200, JSON_HEADERS, "{%m:%lu}\n", MG_ESC("version"),
|
|
s_device_change_version);
|
|
} else if (h != NULL) {
|
|
handle_api_call(c, hm, h);
|
|
} else if (c->data[0] == 0)
|
|
#endif // WIZARD_ENABLE_HTTP || WIZARD_ENABLE_HTTPS
|
|
{
|
|
#if WIZARD_ENABLE_HTTP_UI
|
|
struct mg_http_serve_opts opts;
|
|
memset(&opts, 0, sizeof(opts));
|
|
opts.root_dir = "/web_root/";
|
|
opts.fs = &mg_fs_packed;
|
|
opts.extra_headers = NO_CACHE_HEADERS;
|
|
mg_http_serve_dir(c, hm, &opts);
|
|
#else
|
|
mg_http_reply(c, 200, "", ":)\n");
|
|
#endif // WIZARD_ENABLE_HTTP_UI
|
|
}
|
|
// Show this request
|
|
MG_DEBUG(("%lu %.*s %.*s %lu -> %.*s %lu", c->id, hm->method.len,
|
|
hm->method.buf, hm->uri.len, hm->uri.buf, hm->body.len,
|
|
c->send.len > 15 ? 3 : 0, &c->send.buf[9], c->send.len));
|
|
} else if (ev == MG_EV_WS_MSG) {
|
|
// Got websocket frame. Received data is wm->data
|
|
struct mg_ws_message *wm = (struct mg_ws_message *) ev_data;
|
|
mg_ws_send(c, wm->data.buf, wm->data.len, WEBSOCKET_OP_TEXT);
|
|
} else if (ev == MG_EV_WS_MSG || ev == MG_EV_WS_CTL) {
|
|
// Ignore received data
|
|
} else if (ev == MG_EV_ACCEPT) {
|
|
if (c->fn_data != NULL) { // TLS listener
|
|
struct mg_tls_opts opts;
|
|
memset(&opts, 0, sizeof(opts));
|
|
opts.cert = mg_str(TLS_CERT);
|
|
opts.key = mg_str(TLS_KEY);
|
|
mg_tls_init(c, &opts);
|
|
}
|
|
}
|
|
}
|
|
|
|
#if WIZARD_ENABLE_WEBSOCKET
|
|
struct ws_handler {
|
|
unsigned timeout_ms;
|
|
void (*fn)(struct mg_connection *);
|
|
};
|
|
static struct ws_handler
|
|
s_ws_handlers[sizeof(((struct mg_connection *) 0)->data) /
|
|
sizeof(struct ws_handler)];
|
|
static size_t s_ws_handlers_count;
|
|
|
|
void mongoose_add_ws_handler(unsigned ms, void (*fn)(struct mg_connection *)) {
|
|
size_t max = sizeof(s_ws_handlers) / sizeof(s_ws_handlers[0]);
|
|
if (s_ws_handlers_count >= max) {
|
|
MG_ERROR(("WS handlers limit exceeded, max %lu", max));
|
|
} else {
|
|
s_ws_handlers[s_ws_handlers_count].timeout_ms = ms;
|
|
s_ws_handlers[s_ws_handlers_count].fn = fn;
|
|
s_ws_handlers_count++;
|
|
}
|
|
};
|
|
|
|
static void send_websocket_data(void) {
|
|
struct mg_connection *c;
|
|
uint64_t now = mg_millis();
|
|
|
|
for (c = g_mgr.conns; c != NULL; c = c->next) {
|
|
uint64_t *timers = (uint64_t *) &c->data[0];
|
|
size_t i;
|
|
|
|
if (c->is_websocket == 0) continue; // Not a websocket connection? Skip
|
|
if (c->send.len > 2048) continue; // Too much data already? Skip
|
|
|
|
for (i = 0; i < s_ws_handlers_count; i++) {
|
|
if (c->pfn_data == NULL ||
|
|
mg_timer_expired(&timers[i], s_ws_handlers[i].timeout_ms, now)) {
|
|
s_ws_handlers[i].fn(c);
|
|
c->pfn_data = (void *) 1;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#else
|
|
void mongoose_add_ws_handler(unsigned ms, void (*fn)(struct mg_connection *)) {
|
|
(void) ms, (void) fn;
|
|
MG_ERROR(("Websocket support is not enabled!"));
|
|
}
|
|
#endif // WIZARD_ENABLE_WEBSOCKET
|
|
|
|
#endif // WIZARD_ENABLE_HTTP || WIZARD_ENABLE_HTTPS
|
|
|
|
#if WIZARD_ENABLE_SNTP
|
|
static uint64_t s_sntp_timer = 0;
|
|
bool s_sntp_response_received = false;
|
|
static void sntp_ev_handler(struct mg_connection *c, int ev, void *ev_data) {
|
|
if (ev == MG_EV_SNTP_TIME) {
|
|
uint64_t t = *(uint64_t *) ev_data;
|
|
glue_sntp_on_time(t);
|
|
s_sntp_response_received = true;
|
|
s_sntp_timer += (WIZARD_SNTP_INTERVAL_SECONDS) * 1000;
|
|
}
|
|
(void) c;
|
|
}
|
|
|
|
static void sntp_timer(void *param) {
|
|
// uint64_t t1 = mg_now(), t2 = mg_millis();
|
|
uint64_t timeout = (WIZARD_SNTP_INTERVAL_SECONDS) * 1000;
|
|
if (s_sntp_response_received == false) timeout = 1000;
|
|
// This function is called every second. Once we received a response,
|
|
// trigger SNTP sync less frequently, as set by the define
|
|
if (mg_timer_expired(&s_sntp_timer, timeout, mg_millis())) {
|
|
mg_sntp_connect(param, WIZARD_SNTP_URL, sntp_ev_handler, NULL);
|
|
}
|
|
}
|
|
#endif // WIZARD_ENABLE_SNTP
|
|
|
|
#if WIZARD_ENABLE_MQTT
|
|
static struct mongoose_mqtt_handlers s_mqtt_handlers = {
|
|
glue_mqtt_connect, glue_mqtt_tls_init, glue_mqtt_on_connect,
|
|
glue_mqtt_on_message, glue_mqtt_on_cmd};
|
|
|
|
struct mg_connection *g_mqtt_conn; // MQTT client connection
|
|
|
|
static void mqtt_event_handler(struct mg_connection *c, int ev, void *ev_data) {
|
|
if (ev == MG_EV_CONNECT) {
|
|
s_mqtt_handlers.tls_init_fn(c);
|
|
} else if (ev == MG_EV_MQTT_OPEN) {
|
|
s_mqtt_handlers.on_connect_fn(c, *(int *) ev_data);
|
|
} else if (ev == MG_EV_MQTT_CMD) {
|
|
s_mqtt_handlers.on_cmd_fn(c, ev_data);
|
|
} else if (ev == MG_EV_MQTT_MSG) {
|
|
struct mg_mqtt_message *mm = (struct mg_mqtt_message *) ev_data;
|
|
s_mqtt_handlers.on_message_fn(c, mm->topic, mm->data);
|
|
} else if (ev == MG_EV_CLOSE) {
|
|
g_mqtt_conn = NULL;
|
|
}
|
|
}
|
|
|
|
static void mqtt_timer(void *arg) {
|
|
if (g_mqtt_conn == NULL) {
|
|
g_mqtt_conn = s_mqtt_handlers.connect_fn(mqtt_event_handler);
|
|
}
|
|
(void) arg;
|
|
}
|
|
|
|
void mongoose_set_mqtt_handlers(struct mongoose_mqtt_handlers *h) {
|
|
if (h->connect_fn) s_mqtt_handlers.connect_fn = h->connect_fn;
|
|
if (h->tls_init_fn) s_mqtt_handlers.tls_init_fn = h->tls_init_fn;
|
|
if (h->on_message_fn) s_mqtt_handlers.on_message_fn = h->on_message_fn;
|
|
if (h->on_connect_fn) s_mqtt_handlers.on_connect_fn = h->on_connect_fn;
|
|
if (h->on_cmd_fn) s_mqtt_handlers.on_cmd_fn = h->on_cmd_fn;
|
|
}
|
|
#endif // WIZARD_ENABLE_MQTT
|
|
|
|
#if WIZARD_ENABLE_MODBUS
|
|
static struct mongoose_modbus_handlers s_modbus_handlers = {
|
|
glue_modbus_read_reg, glue_modbus_write_reg};
|
|
|
|
static void handle_modbus_pdu(struct mg_connection *c, uint8_t *buf,
|
|
size_t len) {
|
|
MG_DEBUG(("Received PDU %p len %lu, hexdump:", buf, len));
|
|
mg_hexdump(buf, len);
|
|
// size_t hdr_size = 8, max_data_size = sizeof(response) - hdr_size;
|
|
if (len < 12) {
|
|
MG_ERROR(("PDU too small"));
|
|
} else {
|
|
uint8_t func = buf[7]; // Function
|
|
bool success = false;
|
|
size_t response_len = 0;
|
|
uint8_t response[260];
|
|
memcpy(response, buf, 8);
|
|
// uint16_t tid = mg_ntohs(*(uint16_t *) &buf[0]); // Transaction ID
|
|
// uint16_t pid = mg_ntohs(*(uint16_t *) &buf[0]); // Protocol ID
|
|
// uint16_t len = mg_ntohs(*(uint16_t *) &buf[4]); // PDU length
|
|
// uint8_t uid = buf[6]; // Unit identifier
|
|
if (func == 6) { // write single holding register
|
|
uint16_t start = mg_ntohs(*(uint16_t *) &buf[8]);
|
|
uint16_t value = mg_ntohs(*(uint16_t *) &buf[10]);
|
|
success = s_modbus_handlers.write_reg_fn(start, value);
|
|
*(uint16_t *) &response[8] = mg_htons(start);
|
|
*(uint16_t *) &response[10] = mg_htons(value);
|
|
response_len = 12;
|
|
MG_DEBUG(("Glue returned %s", success ? "success" : "failure"));
|
|
} else if (func == 16) { // Write multiple
|
|
uint16_t start = mg_ntohs(*(uint16_t *) &buf[8]);
|
|
uint16_t num = mg_ntohs(*(uint16_t *) &buf[10]);
|
|
uint16_t i, *data = (uint16_t *) &buf[13];
|
|
if ((size_t) (num * 2 + 10) < sizeof(response)) {
|
|
for (i = 0; i < num; i++) {
|
|
success = s_modbus_handlers.write_reg_fn((uint16_t) (start + i),
|
|
mg_htons(data[i]));
|
|
if (success == false) break;
|
|
}
|
|
*(uint16_t *) &response[8] = mg_htons(start);
|
|
*(uint16_t *) &response[10] = mg_htons(num);
|
|
response_len = 12;
|
|
MG_DEBUG(("Glue returned %s", success ? "success" : "failure"));
|
|
}
|
|
} else if (func == 3 || func == 4) { // Read multiple
|
|
uint16_t start = mg_ntohs(*(uint16_t *) &buf[8]);
|
|
uint16_t num = mg_ntohs(*(uint16_t *) &buf[10]);
|
|
if ((size_t) (num * 2 + 9) < sizeof(response)) {
|
|
uint16_t i, val, *data = (uint16_t *) &response[9];
|
|
for (i = 0; i < num; i++) {
|
|
success = s_modbus_handlers.read_reg_fn((uint16_t) (start + i), &val);
|
|
if (success == false) break;
|
|
data[i] = mg_htons(val);
|
|
}
|
|
response[8] = (uint8_t) (num * 2);
|
|
response_len = 9 + response[8];
|
|
MG_DEBUG(("Glue returned %s", success ? "success" : "failure"));
|
|
}
|
|
}
|
|
if (success == false) {
|
|
response_len = 9;
|
|
response[7] |= 0x80;
|
|
response[8] = 4; // Server Device Failure
|
|
}
|
|
*(uint16_t *) &response[4] = mg_htons((uint16_t) (response_len - 6));
|
|
MG_DEBUG(("Sending PDU response %lu:", response_len));
|
|
mg_hexdump(response, response_len);
|
|
mg_send(c, response, response_len);
|
|
}
|
|
}
|
|
|
|
static void modbus_ev_handler(struct mg_connection *c, int ev, void *ev_data) {
|
|
// if (ev == MG_EV_OPEN) c->is_hexdumping = 1;
|
|
if (ev == MG_EV_READ) {
|
|
uint16_t len;
|
|
if (c->recv.len < 7) return; // Less than minimum length, buffer more
|
|
len = mg_ntohs(*(uint16_t *) &c->recv.buf[4]); // PDU length
|
|
MG_INFO(("Got %lu, expecting %lu", c->recv.len, len + 6));
|
|
if (c->recv.len < len + 6U) return; // Partial frame, buffer more
|
|
handle_modbus_pdu(c, c->recv.buf, len + 6); // Parse PDU and call user
|
|
mg_iobuf_del(&c->recv, 0, len + 6U); // Delete received PDU
|
|
}
|
|
(void) ev_data;
|
|
}
|
|
|
|
void mongoose_set_modbus_handlers(struct mongoose_modbus_handlers *h) {
|
|
if (h->read_reg_fn) s_modbus_handlers.read_reg_fn = h->read_reg_fn;
|
|
if (h->write_reg_fn) s_modbus_handlers.write_reg_fn = h->write_reg_fn;
|
|
}
|
|
#endif // WIZARD_ENABLE_MODBUS
|
|
|
|
#if WIZARD_CAPTIVE_PORTAL
|
|
|
|
#if MG_ARCH == MG_ARCH_UNIX || MG_ARCH == MG_ARCH_WIN32
|
|
#define CAPTIVE_PORTAL_URL "udp://0.0.0.0:5533"
|
|
#else
|
|
#define CAPTIVE_PORTAL_URL "udp://0.0.0.0:53"
|
|
#endif
|
|
|
|
static const uint8_t answer[] = {
|
|
0xc0, 0x0c, // Point to the name in the DNS question
|
|
0, 1, // 2 bytes - record type, A
|
|
0, 1, // 2 bytes - address class, INET
|
|
0, 0, 0, 120, // 4 bytes - TTL
|
|
0, 4 // 2 bytes - address length
|
|
};
|
|
|
|
static void dns_fn(struct mg_connection *c, int ev, void *ev_data) {
|
|
if (ev == MG_EV_READ) {
|
|
struct mg_dns_rr rr; // Parse first question, offset 12 is header size
|
|
size_t n = mg_dns_parse_rr(c->recv.buf, c->recv.len, 12, true, &rr);
|
|
MG_DEBUG(("DNS request parsed, result=%d", (int) n));
|
|
if (n > 0) {
|
|
char buf[512];
|
|
uint32_t ip;
|
|
struct mg_dns_header *h = (struct mg_dns_header *) buf;
|
|
memset(buf, 0, sizeof(buf)); // Clear the whole datagram
|
|
h->txnid = ((struct mg_dns_header *) c->recv.buf)->txnid; // Copy tnxid
|
|
h->num_questions = mg_htons(1); // We use only the 1st question
|
|
h->num_answers = mg_htons(1); // And only one answer
|
|
h->flags = mg_htons(0x8400); // Authoritative response
|
|
memcpy(buf + sizeof(*h), c->recv.buf + sizeof(*h), n); // Copy question
|
|
memcpy(buf + sizeof(*h) + n, answer, sizeof(answer)); // And answer
|
|
#if MG_ENABLE_TCPIP
|
|
ip = MG_TCPIP_IFACE(c->mgr)->ip;
|
|
#else
|
|
ip = MG_TCPIP_IP;
|
|
#endif
|
|
memcpy(buf + sizeof(*h) + n + sizeof(answer), &ip, 4);
|
|
mg_send(c, buf, 12 + n + sizeof(answer) + 4); // And send it!
|
|
}
|
|
mg_iobuf_del(&c->recv, 0, c->recv.len);
|
|
}
|
|
(void) ev_data;
|
|
}
|
|
#endif // WIZARD_CAPTIVE_PORTAL
|
|
|
|
void mongoose_init(void) {
|
|
mg_mgr_init(&g_mgr); // Initialise event manager
|
|
mg_log_set(MG_LL_DEBUG); // Set log level to debug
|
|
|
|
#if WIZARD_ENABLE_HTTP
|
|
MG_INFO(("Starting HTTP listener"));
|
|
mg_http_listen(&g_mgr, HTTP_URL, http_ev_handler, NULL);
|
|
#endif
|
|
#if WIZARD_ENABLE_HTTPS
|
|
MG_INFO(("Starting HTTPS listener"));
|
|
mg_http_listen(&g_mgr, HTTPS_URL, http_ev_handler, "");
|
|
#endif
|
|
|
|
#if WIZARD_ENABLE_SNTP
|
|
MG_INFO(("Starting SNTP timer"));
|
|
mg_timer_add(&g_mgr, 1000, MG_TIMER_REPEAT, sntp_timer, &g_mgr);
|
|
#endif
|
|
|
|
#if WIZARD_DNS_TYPE == 2
|
|
g_mgr.dns4.url = WIZARD_DNS_URL;
|
|
#endif
|
|
|
|
#if WIZARD_ENABLE_MQTT
|
|
MG_INFO(("Starting MQTT reconnection timer"));
|
|
mg_timer_add(&g_mgr, 1000, MG_TIMER_REPEAT, mqtt_timer, &g_mgr);
|
|
#endif
|
|
|
|
#if WIZARD_ENABLE_MODBUS
|
|
{
|
|
char url[100];
|
|
mg_snprintf(url, sizeof(url), "tcp://0.0.0.0:%d", WIZARD_MODBUS_PORT);
|
|
MG_INFO(("Starting Modbus-TCP server on port %d", WIZARD_MODBUS_PORT));
|
|
mg_listen(&g_mgr, url, modbus_ev_handler, NULL);
|
|
}
|
|
#endif
|
|
|
|
#if WIZARD_CAPTIVE_PORTAL
|
|
MG_INFO(("Starting captive portal"));
|
|
mg_listen(&g_mgr, CAPTIVE_PORTAL_URL, dns_fn, NULL);
|
|
#endif
|
|
|
|
MG_INFO(("Mongoose init complete"));
|
|
}
|
|
|
|
void mongoose_poll(void) {
|
|
glue_lock();
|
|
mg_mgr_poll(&g_mgr, 10);
|
|
#if WIZARD_ENABLE_WEBSOCKET
|
|
send_websocket_data();
|
|
#endif
|
|
glue_unlock();
|
|
}
|