1002 lines
31 KiB
C++
1002 lines
31 KiB
C++
#define IS_VALID_DETECT 0xa00ab00bc00bd00d;
|
|
|
|
#include "Arduino.h"
|
|
#include "esp_crt_bundle.h"
|
|
#include "esp_ota_ops.h"
|
|
#include "esp_http_client.h"
|
|
#include "esp_https_ota.h"
|
|
#include "esp_task_wdt.h"
|
|
#include "Config.h"
|
|
#include "esp32-hal-log.h"
|
|
#include "hal/wdt_hal.h"
|
|
#include "esp_chip_info.h"
|
|
#include "esp_netif_sntp.h"
|
|
#include "esp_core_dump.h"
|
|
#include "FS.h"
|
|
#include "SPIFFS.h"
|
|
#ifdef CONFIG_SOC_SPIRAM_SUPPORTED
|
|
#include "esp_psram.h"
|
|
#endif
|
|
|
|
#ifndef NUKI_HUB_UPDATER
|
|
#include "NukiWrapper.h"
|
|
#include "NukiNetworkLock.h"
|
|
#include "NukiOpenerWrapper.h"
|
|
#include "Gpio.h"
|
|
#include "CharBuffer.h"
|
|
#include "NukiDeviceId.h"
|
|
#include "WebCfgServer.h"
|
|
#include "Logger.h"
|
|
#include "PreferencesKeys.h"
|
|
#include "RestartReason.h"
|
|
#include "EspMillis.h"
|
|
#include "NimBLEDevice.h"
|
|
|
|
/*
|
|
#ifdef DEBUG_NUKIHUB
|
|
#include <WString.h>
|
|
#include <MycilaWebSerial.h>
|
|
#endif
|
|
*/
|
|
|
|
NukiNetworkLock* networkLock = nullptr;
|
|
NukiNetworkOpener* networkOpener = nullptr;
|
|
BleScanner::Scanner* bleScanner = nullptr;
|
|
NukiWrapper* nuki = nullptr;
|
|
NukiOfficial* nukiOfficial = nullptr;
|
|
NukiOpenerWrapper* nukiOpener = nullptr;
|
|
NukiDeviceId* deviceIdLock = nullptr;
|
|
NukiDeviceId* deviceIdOpener = nullptr;
|
|
Gpio* gpio = nullptr;
|
|
|
|
bool lockEnabled = false;
|
|
bool openerEnabled = false;
|
|
bool wifiConnected = false;
|
|
bool rebootLock = false;
|
|
|
|
TaskHandle_t nukiTaskHandle = nullptr;
|
|
|
|
int64_t restartTs = (pow(2,63) - (5 * 1000 * 60000)) / 1000;
|
|
|
|
#else
|
|
#include "../../src/WebCfgServer.h"
|
|
#include "../../src/Logger.h"
|
|
#include "../../src/PreferencesKeys.h"
|
|
#include "../../src/RestartReason.h"
|
|
#include "../../src/NukiNetwork.h"
|
|
#include "../../src/EspMillis.h"
|
|
|
|
int64_t restartTs = 10 * 60 * 1000;
|
|
|
|
#endif
|
|
|
|
char log_print_buffer[1024];
|
|
|
|
PsychicHttpServer* psychicServer = nullptr;
|
|
PsychicHttpsServer* psychicSSLServer = nullptr;
|
|
NukiNetwork* network = nullptr;
|
|
WebCfgServer* webCfgServer = nullptr;
|
|
WebCfgServer* webCfgServerSSL = nullptr;
|
|
Preferences* preferences = nullptr;
|
|
|
|
RTC_NOINIT_ATTR int espRunning;
|
|
RTC_NOINIT_ATTR int restartReason;
|
|
RTC_NOINIT_ATTR uint64_t restartReasonValidDetect;
|
|
RTC_NOINIT_ATTR bool rebuildGpioRequested;
|
|
RTC_NOINIT_ATTR uint64_t bootloopValidDetect;
|
|
RTC_NOINIT_ATTR int8_t bootloopCounter;
|
|
RTC_NOINIT_ATTR bool forceEnableWebServer;
|
|
RTC_NOINIT_ATTR bool disableNetwork;
|
|
RTC_NOINIT_ATTR bool wifiFallback;
|
|
RTC_NOINIT_ATTR bool ethCriticalFailure;
|
|
bool coredumpPrinted = true;
|
|
bool timeSynced = false;
|
|
|
|
int lastHTTPeventId = -1;
|
|
bool doOta = false;
|
|
bool restartReason_isValid;
|
|
RestartReason currentRestartReason = RestartReason::NotApplicable;
|
|
|
|
TaskHandle_t otaTaskHandle = nullptr;
|
|
TaskHandle_t networkTaskHandle = nullptr;
|
|
|
|
ssize_t write_fn(void* cookie, const char* buf, ssize_t size)
|
|
{
|
|
Log->write((uint8_t *)buf, (size_t)size);
|
|
return size;
|
|
}
|
|
|
|
void ets_putc_handler(char c)
|
|
{
|
|
static char buf[1024];
|
|
static size_t buf_pos = 0;
|
|
buf[buf_pos] = c;
|
|
buf_pos++;
|
|
if (c == '\n' || buf_pos == sizeof(buf))
|
|
{
|
|
write_fn(NULL, buf, buf_pos);
|
|
buf_pos = 0;
|
|
}
|
|
}
|
|
|
|
int _log_vprintf(const char *fmt, va_list args)
|
|
{
|
|
int ret = vsnprintf(log_print_buffer, sizeof(log_print_buffer), fmt, args);
|
|
if (ret >= 0)
|
|
{
|
|
Log->write((uint8_t *)log_print_buffer, (size_t)ret);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void setReroute()
|
|
{
|
|
esp_log_set_vprintf(_log_vprintf);
|
|
|
|
#ifdef DEBUG_NUKIHUB
|
|
esp_log_level_set("*", ESP_LOG_DEBUG);
|
|
esp_log_level_set("nvs", ESP_LOG_INFO);
|
|
esp_log_level_set("wifi", ESP_LOG_INFO);
|
|
#else
|
|
/*
|
|
esp_log_level_set("*", ESP_LOG_NONE);
|
|
esp_log_level_set("httpd", ESP_LOG_ERROR);
|
|
esp_log_level_set("httpd_sess", ESP_LOG_ERROR);
|
|
esp_log_level_set("httpd_parse", ESP_LOG_ERROR);
|
|
esp_log_level_set("httpd_txrx", ESP_LOG_ERROR);
|
|
esp_log_level_set("httpd_uri", ESP_LOG_ERROR);
|
|
esp_log_level_set("event", ESP_LOG_ERROR);
|
|
esp_log_level_set("psychic", ESP_LOG_ERROR);
|
|
esp_log_level_set("ARDUINO", ESP_LOG_DEBUG);
|
|
esp_log_level_set("nvs", ESP_LOG_ERROR);
|
|
esp_log_level_set("wifi", ESP_LOG_ERROR);
|
|
*/
|
|
#endif
|
|
|
|
if(preferences->getBool(preference_mqtt_log_enabled))
|
|
{
|
|
esp_log_level_set("mqtt", ESP_LOG_NONE);
|
|
}
|
|
|
|
}
|
|
|
|
uint8_t checkPartition()
|
|
{
|
|
const esp_partition_t* running_partition = esp_ota_get_running_partition();
|
|
Log->print(("Partition size: "));
|
|
Log->println(running_partition->size);
|
|
Log->print(("Partition subtype: "));
|
|
Log->println(running_partition->subtype);
|
|
|
|
if(running_partition->size == 1966080)
|
|
{
|
|
return 0; //OLD PARTITION TABLE
|
|
}
|
|
else if(running_partition->subtype == ESP_PARTITION_SUBTYPE_APP_OTA_0)
|
|
{
|
|
return 1; //NEW PARTITION TABLE, RUNNING MAIN APP
|
|
}
|
|
else
|
|
{
|
|
return 2; //NEW PARTITION TABLE, RUNNING UPDATER APP
|
|
}
|
|
}
|
|
|
|
void cbSyncTime(struct timeval *tv) {
|
|
Log->println("NTP time synced");
|
|
timeSynced = true;
|
|
}
|
|
|
|
void networkTask(void *pvParameters)
|
|
{
|
|
int64_t networkLoopTs = 0;
|
|
bool reroute = true;
|
|
if(preferences->getBool(preference_show_secrets, false))
|
|
{
|
|
preferences->putBool(preference_show_secrets, false);
|
|
}
|
|
while(true)
|
|
{
|
|
int64_t ts = espMillis();
|
|
if(ts > 120000 && ts < 125000)
|
|
{
|
|
if(bootloopCounter > 0)
|
|
{
|
|
bootloopCounter = (int8_t)0;
|
|
Log->println(("Bootloop counter reset"));
|
|
}
|
|
}
|
|
|
|
network->update();
|
|
bool connected = network->isConnected();
|
|
|
|
if(connected && reroute)
|
|
{
|
|
if(preferences->getBool(preference_update_time, false))
|
|
{
|
|
esp_netif_sntp_start();
|
|
}
|
|
reroute = false;
|
|
setReroute();
|
|
}
|
|
|
|
#ifndef NUKI_HUB_UPDATER
|
|
wifiConnected = network->wifiConnected();
|
|
|
|
if(connected && lockEnabled)
|
|
{
|
|
rebootLock = networkLock->update();
|
|
}
|
|
|
|
if(connected && openerEnabled)
|
|
{
|
|
networkOpener->update();
|
|
}
|
|
#endif
|
|
|
|
if(espMillis() - networkLoopTs > 120000)
|
|
{
|
|
Log->println("networkTask is running");
|
|
networkLoopTs = espMillis();
|
|
}
|
|
|
|
if(espMillis() > restartTs)
|
|
{
|
|
uint8_t partitionType = checkPartition();
|
|
|
|
if(partitionType!=1)
|
|
{
|
|
esp_ota_set_boot_partition(esp_ota_get_next_update_partition(NULL));
|
|
}
|
|
|
|
restartEsp(RestartReason::RestartTimer);
|
|
}
|
|
esp_task_wdt_reset();
|
|
}
|
|
}
|
|
|
|
#ifndef NUKI_HUB_UPDATER
|
|
void nukiTask(void *pvParameters)
|
|
{
|
|
if (preferences->getBool(preference_mqtt_ssl_enabled, false))
|
|
{
|
|
#ifdef CONFIG_SOC_SPIRAM_SUPPORTED
|
|
if (esp_psram_get_size() <= 0)
|
|
{
|
|
Log->println("Waiting 20 seconds to start BLE because of MQTT SSL");
|
|
delay(20000);
|
|
}
|
|
#else
|
|
Log->println("Waiting 20 seconds to start BLE because of MQTT SSL");
|
|
delay(20000);
|
|
#endif
|
|
}
|
|
int64_t nukiLoopTs = 0;
|
|
bool whiteListed = false;
|
|
while(true)
|
|
{
|
|
if(disableNetwork || wifiConnected)
|
|
{
|
|
bleScanner->update();
|
|
delay(20);
|
|
|
|
bool needsPairing = (lockEnabled && !nuki->isPaired()) || (openerEnabled && !nukiOpener->isPaired());
|
|
|
|
if (needsPairing)
|
|
{
|
|
delay(2500);
|
|
}
|
|
else if (!whiteListed)
|
|
{
|
|
whiteListed = true;
|
|
if(lockEnabled)
|
|
{
|
|
bleScanner->whitelist(nuki->getBleAddress());
|
|
}
|
|
if(openerEnabled)
|
|
{
|
|
bleScanner->whitelist(nukiOpener->getBleAddress());
|
|
}
|
|
}
|
|
|
|
if(lockEnabled)
|
|
{
|
|
nuki->update(rebootLock);
|
|
rebootLock = false;
|
|
}
|
|
if(openerEnabled)
|
|
{
|
|
nukiOpener->update();
|
|
}
|
|
}
|
|
|
|
if(espMillis() - nukiLoopTs > 120000)
|
|
{
|
|
Log->println("nukiTask is running");
|
|
nukiLoopTs = espMillis();
|
|
}
|
|
|
|
esp_task_wdt_reset();
|
|
}
|
|
}
|
|
|
|
void bootloopDetection()
|
|
{
|
|
uint64_t cmp = IS_VALID_DETECT;
|
|
bool bootloopIsValid = (bootloopValidDetect == cmp);
|
|
Log->println(bootloopIsValid);
|
|
|
|
if(!bootloopIsValid)
|
|
{
|
|
bootloopCounter = (int8_t)0;
|
|
bootloopValidDetect = IS_VALID_DETECT;
|
|
return;
|
|
}
|
|
|
|
if(esp_reset_reason() == esp_reset_reason_t::ESP_RST_PANIC ||
|
|
esp_reset_reason() == esp_reset_reason_t::ESP_RST_INT_WDT ||
|
|
esp_reset_reason() == esp_reset_reason_t::ESP_RST_TASK_WDT ||
|
|
esp_reset_reason() == esp_reset_reason_t::ESP_RST_WDT)
|
|
{
|
|
bootloopCounter++;
|
|
Log->print(("Bootloop counter incremented: "));
|
|
Log->println(bootloopCounter);
|
|
|
|
if(bootloopCounter == 10)
|
|
{
|
|
Log->print(("Bootloop detected."));
|
|
|
|
preferences->putInt(preference_buffer_size, CHAR_BUFFER_SIZE);
|
|
preferences->putInt(preference_task_size_network, NETWORK_TASK_SIZE);
|
|
preferences->putInt(preference_task_size_nuki, NUKI_TASK_SIZE);
|
|
preferences->putInt(preference_authlog_max_entries, MAX_AUTHLOG);
|
|
preferences->putInt(preference_keypad_max_entries, MAX_KEYPAD);
|
|
preferences->putInt(preference_timecontrol_max_entries, MAX_TIMECONTROL);
|
|
preferences->putInt(preference_auth_max_entries, MAX_AUTH);
|
|
bootloopCounter = 0;
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
esp_err_t _http_event_handler(esp_http_client_event_t *evt)
|
|
{
|
|
if (lastHTTPeventId != int(evt->event_id))
|
|
{
|
|
Log->println("");
|
|
switch (evt->event_id)
|
|
{
|
|
case HTTP_EVENT_ERROR:
|
|
Log->println("HTTP_EVENT_ERROR");
|
|
break;
|
|
case HTTP_EVENT_ON_CONNECTED:
|
|
Log->print("HTTP_EVENT_ON_CONNECTED");
|
|
break;
|
|
case HTTP_EVENT_HEADER_SENT:
|
|
Log->print("HTTP_EVENT_HEADER_SENT");
|
|
break;
|
|
case HTTP_EVENT_ON_HEADER:
|
|
Log->print("HTTP_EVENT_ON_HEADER");
|
|
break;
|
|
case HTTP_EVENT_ON_DATA:
|
|
Log->print("HTTP_EVENT_ON_DATA");
|
|
break;
|
|
case HTTP_EVENT_ON_FINISH:
|
|
Log->println("HTTP_EVENT_ON_FINISH");
|
|
break;
|
|
case HTTP_EVENT_DISCONNECTED:
|
|
Log->println("HTTP_EVENT_DISCONNECTED");
|
|
break;
|
|
case HTTP_EVENT_REDIRECT:
|
|
Log->print("HTTP_EVENT_REDIRECT");
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
Log->print(".");
|
|
}
|
|
lastHTTPeventId = int(evt->event_id);
|
|
wdt_hal_context_t rtc_wdt_ctx = RWDT_HAL_CONTEXT_DEFAULT();
|
|
wdt_hal_write_protect_disable(&rtc_wdt_ctx);
|
|
wdt_hal_feed(&rtc_wdt_ctx);
|
|
wdt_hal_write_protect_enable(&rtc_wdt_ctx);
|
|
|
|
return ESP_OK;
|
|
}
|
|
|
|
void otaTask(void *pvParameter)
|
|
{
|
|
uint8_t partitionType = checkPartition();
|
|
String updateUrl;
|
|
|
|
if(partitionType==1)
|
|
{
|
|
updateUrl = preferences->getString(preference_ota_updater_url);
|
|
preferences->putString(preference_ota_updater_url, "");
|
|
}
|
|
else
|
|
{
|
|
updateUrl = preferences->getString(preference_ota_main_url);
|
|
preferences->putString(preference_ota_main_url, "");
|
|
}
|
|
|
|
while(!network->isConnected())
|
|
{
|
|
Log->println("OTA waiting for network");
|
|
vTaskDelay(5000 / portTICK_PERIOD_MS);
|
|
}
|
|
|
|
Log->println("Starting OTA task");
|
|
esp_http_client_config_t config =
|
|
{
|
|
.url = updateUrl.c_str(),
|
|
.event_handler = _http_event_handler,
|
|
.crt_bundle_attach = esp_crt_bundle_attach,
|
|
.keep_alive_enable = true,
|
|
};
|
|
|
|
esp_https_ota_config_t ota_config =
|
|
{
|
|
.http_config = &config,
|
|
};
|
|
Log->print(("Attempting to download update from "));
|
|
Log->println(config.url);
|
|
|
|
int retryMax = 3;
|
|
int retryCount = 0;
|
|
|
|
while (retryCount <= retryMax)
|
|
{
|
|
esp_err_t ret = esp_https_ota(&ota_config);
|
|
if (ret == ESP_OK)
|
|
{
|
|
Log->println("OTA Succeeded, Rebooting...");
|
|
esp_ota_set_boot_partition(esp_ota_get_next_update_partition(NULL));
|
|
restartEsp(RestartReason::OTACompleted);
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
Log->println("Firmware upgrade failed, retrying in 5 seconds");
|
|
retryCount++;
|
|
esp_task_wdt_reset();
|
|
delay(5000);
|
|
continue;
|
|
}
|
|
while (1)
|
|
{
|
|
vTaskDelay(1000 / portTICK_PERIOD_MS);
|
|
}
|
|
}
|
|
Log->println("Firmware upgrade failed, restarting");
|
|
esp_ota_set_boot_partition(esp_ota_get_next_update_partition(NULL));
|
|
restartEsp(RestartReason::OTAAborted);
|
|
}
|
|
|
|
void setupTasks(bool ota)
|
|
{
|
|
// configMAX_PRIORITIES is 25
|
|
esp_task_wdt_config_t twdt_config =
|
|
{
|
|
.timeout_ms = 300000,
|
|
.idle_core_mask = 0,
|
|
.trigger_panic = true,
|
|
};
|
|
esp_task_wdt_reconfigure(&twdt_config);
|
|
|
|
esp_chip_info_t info;
|
|
esp_chip_info(&info);
|
|
uint8_t espCores = info.cores;
|
|
|
|
if(ota)
|
|
{
|
|
xTaskCreatePinnedToCore(otaTask, "ota", 8192, NULL, 2, &otaTaskHandle, (espCores > 1) ? 1 : 0);
|
|
esp_task_wdt_add(otaTaskHandle);
|
|
}
|
|
else
|
|
{
|
|
if(!disableNetwork)
|
|
{
|
|
xTaskCreatePinnedToCore(networkTask, "ntw", preferences->getInt(preference_task_size_network, NETWORK_TASK_SIZE), NULL, 3, &networkTaskHandle, (espCores > 1) ? 1 : 0);
|
|
esp_task_wdt_add(networkTaskHandle);
|
|
}
|
|
#ifndef NUKI_HUB_UPDATER
|
|
if(!network->isApOpen() && (lockEnabled || openerEnabled))
|
|
{
|
|
xTaskCreatePinnedToCore(nukiTask, "nuki", preferences->getInt(preference_task_size_nuki, NUKI_TASK_SIZE), NULL, 2, &nukiTaskHandle, 0);
|
|
esp_task_wdt_add(nukiTaskHandle);
|
|
}
|
|
#endif
|
|
}
|
|
}
|
|
|
|
void logCoreDump()
|
|
{
|
|
coredumpPrinted = false;
|
|
delay(500);
|
|
Serial.println("Printing coredump and saving to coredump.hex on SPIFFS");
|
|
size_t size = 0;
|
|
size_t address = 0;
|
|
if (esp_core_dump_image_get(&address, &size) == ESP_OK)
|
|
{
|
|
const esp_partition_t *pt = NULL;
|
|
pt = esp_partition_find_first(ESP_PARTITION_TYPE_DATA, ESP_PARTITION_SUBTYPE_DATA_COREDUMP, "coredump");
|
|
|
|
if (pt != NULL)
|
|
{
|
|
uint8_t bf[256];
|
|
char str_dst[640];
|
|
int16_t toRead;
|
|
|
|
if (!SPIFFS.begin(true))
|
|
{
|
|
Log->println("SPIFFS Mount Failed");
|
|
}
|
|
|
|
File file = SPIFFS.open("/coredump.hex", FILE_WRITE);
|
|
if (!file) {
|
|
Log->println("Failed to open /coredump.hex for writing");
|
|
}
|
|
else
|
|
{
|
|
file.printf("%s\r\n", NUKI_HUB_HW);
|
|
file.printf("%s\r\n", NUKI_HUB_BUILD);
|
|
}
|
|
|
|
Serial.printf("%s\r\n", NUKI_HUB_HW);
|
|
Serial.printf("%s\r\n", NUKI_HUB_BUILD);
|
|
|
|
for (int16_t i = 0; i < (size/256)+1; i++)
|
|
{
|
|
strcpy(str_dst, "");
|
|
toRead = (size - i*256) > 256 ? 256 : (size - i*256);
|
|
|
|
esp_err_t er = esp_partition_read(pt, i*256, bf, toRead);
|
|
if (er != ESP_OK)
|
|
{
|
|
Serial.printf("FAIL [%x]", er);
|
|
break;
|
|
}
|
|
|
|
for (int16_t j = 0; j < 256; j++)
|
|
{
|
|
char str_tmp[2];
|
|
if (bf[j] <= 0x0F)
|
|
{
|
|
sprintf(str_tmp, "0%x", bf[j]);
|
|
}
|
|
else
|
|
{
|
|
sprintf(str_tmp, "%x", bf[j]);
|
|
}
|
|
strcat(str_dst, str_tmp);
|
|
}
|
|
Serial.printf("%s", str_dst);
|
|
|
|
if (file) {
|
|
file.printf("%s", str_dst);
|
|
}
|
|
}
|
|
|
|
Serial.println("");
|
|
|
|
if (file) {
|
|
file.println("");
|
|
file.close();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
Serial.println("Partition NULL");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
Serial.println("esp_core_dump_image_get() FAIL");
|
|
}
|
|
coredumpPrinted = true;
|
|
}
|
|
|
|
void setup()
|
|
{
|
|
//Set Log level to error for all TAGS
|
|
esp_log_level_set("*", ESP_LOG_ERROR);
|
|
//Set Log level to none for mqtt TAG
|
|
esp_log_level_set("mqtt", ESP_LOG_NONE);
|
|
//Start Serial and setup Log class
|
|
Serial.begin(115200);
|
|
Log = &Serial;
|
|
|
|
#ifndef NUKI_HUB_UPDATER
|
|
//
|
|
stdout = funopen(NULL, NULL, &write_fn, NULL, NULL);
|
|
static char linebuf[1024];
|
|
setvbuf(stdout, linebuf, _IOLBF, sizeof(linebuf));
|
|
esp_rom_install_channel_putc(1, &ets_putc_handler);
|
|
//ets_install_putc1(&ets_putc_handler);
|
|
#endif
|
|
|
|
preferences = new Preferences();
|
|
preferences->begin("nukihub", false);
|
|
initPreferences(preferences);
|
|
initializeRestartReason();
|
|
|
|
if(esp_reset_reason() == esp_reset_reason_t::ESP_RST_PANIC ||
|
|
esp_reset_reason() == esp_reset_reason_t::ESP_RST_INT_WDT ||
|
|
esp_reset_reason() == esp_reset_reason_t::ESP_RST_TASK_WDT ||
|
|
esp_reset_reason() == esp_reset_reason_t::ESP_RST_WDT)
|
|
{
|
|
logCoreDump();
|
|
}
|
|
|
|
uint8_t partitionType = checkPartition();
|
|
|
|
//default disableNetwork RTC_ATTR to false on power-on
|
|
if(espRunning != 1)
|
|
{
|
|
espRunning = 1;
|
|
forceEnableWebServer = false;
|
|
disableNetwork = false;
|
|
wifiFallback = false;
|
|
ethCriticalFailure = false;
|
|
}
|
|
|
|
//determine if an OTA update was requested
|
|
if((partitionType==1 && preferences->getString(preference_ota_updater_url, "").length() > 0) || (partitionType==2 && preferences->getString(preference_ota_main_url, "").length() > 0))
|
|
{
|
|
doOta = true;
|
|
}
|
|
|
|
#ifdef NUKI_HUB_UPDATER
|
|
Log->print(("Nuki Hub OTA version "));
|
|
Log->println(NUKI_HUB_VERSION);
|
|
Log->print(("Nuki Hub OTA build "));
|
|
Log->println();
|
|
|
|
if(preferences->getString(preference_updater_version, "") != NUKI_HUB_VERSION)
|
|
{
|
|
preferences->putString(preference_updater_version, NUKI_HUB_VERSION);
|
|
}
|
|
if(preferences->getString(preference_updater_build, "") != NUKI_HUB_BUILD)
|
|
{
|
|
preferences->putString(preference_updater_build, NUKI_HUB_BUILD);
|
|
}
|
|
if(preferences->getString(preference_updater_date, "") != NUKI_HUB_DATE)
|
|
{
|
|
preferences->putString(preference_updater_date, NUKI_HUB_DATE);
|
|
}
|
|
|
|
network = new NukiNetwork(preferences);
|
|
network->initialize();
|
|
|
|
if(!doOta)
|
|
{
|
|
#ifdef CONFIG_SOC_SPIRAM_SUPPORTED
|
|
bool failed = false;
|
|
|
|
if (esp_psram_get_size() <= 0) {
|
|
Log->println("Not running on PSRAM enabled device");
|
|
failed = true;
|
|
}
|
|
else
|
|
{
|
|
if (!SPIFFS.begin(true)) {
|
|
Log->println("SPIFFS Mount Failed");
|
|
failed = true;
|
|
}
|
|
else
|
|
{
|
|
File file = SPIFFS.open("/http_ssl.crt");
|
|
if (!file || file.isDirectory()) {
|
|
failed = true;
|
|
Log->println("http_ssl.crt not found");
|
|
}
|
|
else
|
|
{
|
|
Log->println("Reading http_ssl.crt");
|
|
size_t filesize = file.size();
|
|
char cert[filesize + 1];
|
|
|
|
file.read((uint8_t *)cert, sizeof(cert));
|
|
file.close();
|
|
cert[filesize] = '\0';
|
|
|
|
File file2 = SPIFFS.open("/http_ssl.key");
|
|
if (!file2 || file2.isDirectory()) {
|
|
failed = true;
|
|
Log->println("http_ssl.key not found");
|
|
}
|
|
else
|
|
{
|
|
Log->println("Reading http_ssl.key");
|
|
size_t filesize2 = file2.size();
|
|
char key[filesize2 + 1];
|
|
|
|
file2.read((uint8_t *)key, sizeof(key));
|
|
file2.close();
|
|
key[filesize2] = '\0';
|
|
|
|
psychicServer = new PsychicHttpServer();
|
|
psychicServer->config.ctrl_port = 20424;
|
|
psychicServer->onNotFound([](PsychicRequest* request, PsychicResponse* response) {
|
|
String url = "https://" + request->host() + request->url();
|
|
if (preferences->getString(preference_https_fqdn, "") != "")
|
|
{
|
|
url = "https://" + preferences->getString(preference_https_fqdn) + request->url();
|
|
}
|
|
|
|
response->setCode(301);
|
|
response->addHeader("Cache-Control", "no-cache");
|
|
return response->redirect(url.c_str());
|
|
});
|
|
psychicServer->begin();
|
|
psychicSSLServer = new PsychicHttpsServer;
|
|
psychicSSLServer->ssl_config.httpd.max_open_sockets = 8;
|
|
psychicSSLServer->setCertificate(cert, key);
|
|
psychicSSLServer->config.stack_size = HTTPD_TASK_SIZE;
|
|
webCfgServerSSL = new WebCfgServer(network, preferences, network->networkDeviceType() == NetworkDeviceType::WiFi, partitionType, psychicSSLServer);
|
|
webCfgServerSSL->initialize();
|
|
psychicSSLServer->onNotFound([](PsychicRequest* request, PsychicResponse* response) {
|
|
return response->redirect("/");
|
|
});
|
|
psychicSSLServer->begin();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (failed)
|
|
{
|
|
#endif
|
|
psychicServer = new PsychicHttpServer;
|
|
psychicServer->config.stack_size = HTTPD_TASK_SIZE;
|
|
webCfgServer = new WebCfgServer(network, preferences, network->networkDeviceType() == NetworkDeviceType::WiFi, partitionType, psychicServer);
|
|
webCfgServer->initialize();
|
|
psychicServer->onNotFound([](PsychicRequest* request, PsychicResponse* response) {
|
|
return response->redirect("/");
|
|
});
|
|
psychicServer->begin();
|
|
#ifdef CONFIG_SOC_SPIRAM_SUPPORTED
|
|
}
|
|
#endif
|
|
}
|
|
#else
|
|
if(preferences->getBool(preference_enable_bootloop_reset, false))
|
|
{
|
|
bootloopDetection();
|
|
}
|
|
|
|
Log->print(("Nuki Hub version "));
|
|
Log->println(NUKI_HUB_VERSION);
|
|
Log->print(("Nuki Hub build "));
|
|
Log->println(NUKI_HUB_BUILD);
|
|
|
|
uint32_t devIdOpener = preferences->getUInt(preference_device_id_opener);
|
|
|
|
deviceIdLock = new NukiDeviceId(preferences, preference_device_id_lock);
|
|
deviceIdOpener = new NukiDeviceId(preferences, preference_device_id_opener);
|
|
|
|
if(deviceIdLock->get() != 0 && devIdOpener == 0)
|
|
{
|
|
deviceIdOpener->assignId(deviceIdLock->get());
|
|
}
|
|
|
|
char16_t buffer_size = preferences->getInt(preference_buffer_size, CHAR_BUFFER_SIZE);
|
|
CharBuffer::initialize(buffer_size);
|
|
|
|
gpio = new Gpio(preferences);
|
|
String gpioDesc;
|
|
gpio->getConfigurationText(gpioDesc, gpio->pinConfiguration(), "\n\r");
|
|
Log->print(gpioDesc.c_str());
|
|
|
|
const String mqttLockPath = preferences->getString(preference_mqtt_lock_path);
|
|
|
|
network = new NukiNetwork(preferences, gpio, mqttLockPath, CharBuffer::get(), buffer_size);
|
|
network->initialize();
|
|
|
|
lockEnabled = preferences->getBool(preference_lock_enabled);
|
|
openerEnabled = preferences->getBool(preference_opener_enabled);
|
|
|
|
if(network->isApOpen())
|
|
{
|
|
forceEnableWebServer = true;
|
|
doOta = false;
|
|
lockEnabled = false;
|
|
openerEnabled = false;
|
|
}
|
|
|
|
if(lockEnabled || openerEnabled)
|
|
{
|
|
bleScanner = new BleScanner::Scanner();
|
|
// Scan interval and window according to Nuki recommendations:
|
|
// https://developer.nuki.io/t/bluetooth-specification-questions/1109/27
|
|
bleScanner->initialize("NukiHub", true, 40, 40);
|
|
bleScanner->setScanDuration(0);
|
|
}
|
|
|
|
Log->println(lockEnabled ? F("Nuki Lock enabled") : F("Nuki Lock disabled"));
|
|
if(lockEnabled)
|
|
{
|
|
nukiOfficial = new NukiOfficial(preferences);
|
|
networkLock = new NukiNetworkLock(network, nukiOfficial, preferences, CharBuffer::get(), buffer_size);
|
|
|
|
if(!disableNetwork)
|
|
{
|
|
networkLock->initialize();
|
|
}
|
|
|
|
nuki = new NukiWrapper("NukiHub", deviceIdLock, bleScanner, networkLock, nukiOfficial, gpio, preferences);
|
|
nuki->initialize();
|
|
}
|
|
|
|
Log->println(openerEnabled ? F("Nuki Opener enabled") : F("Nuki Opener disabled"));
|
|
if(openerEnabled)
|
|
{
|
|
networkOpener = new NukiNetworkOpener(network, preferences, CharBuffer::get(), buffer_size);
|
|
|
|
if(!disableNetwork)
|
|
{
|
|
networkOpener->initialize();
|
|
}
|
|
|
|
nukiOpener = new NukiOpenerWrapper("NukiHub", deviceIdOpener, bleScanner, networkOpener, gpio, preferences);
|
|
nukiOpener->initialize();
|
|
}
|
|
|
|
if(!doOta && !disableNetwork && (forceEnableWebServer || preferences->getBool(preference_webserver_enabled, true) || preferences->getBool(preference_webserial_enabled, false)))
|
|
{
|
|
if(forceEnableWebServer || preferences->getBool(preference_webserver_enabled, true))
|
|
{
|
|
#ifdef CONFIG_SOC_SPIRAM_SUPPORTED
|
|
bool failed = false;
|
|
|
|
if (esp_psram_get_size() <= 0) {
|
|
Log->println("Not running on PSRAM enabled device");
|
|
failed = true;
|
|
}
|
|
else
|
|
{
|
|
if (!SPIFFS.begin(true)) {
|
|
Log->println("SPIFFS Mount Failed");
|
|
failed = true;
|
|
}
|
|
else
|
|
{
|
|
File file = SPIFFS.open("/http_ssl.crt");
|
|
if (!file || file.isDirectory()) {
|
|
failed = true;
|
|
Log->println("http_ssl.crt not found");
|
|
}
|
|
else
|
|
{
|
|
Log->println("Reading http_ssl.crt");
|
|
size_t filesize = file.size();
|
|
char cert[filesize + 1];
|
|
|
|
file.read((uint8_t *)cert, sizeof(cert));
|
|
file.close();
|
|
cert[filesize] = '\0';
|
|
|
|
File file2 = SPIFFS.open("/http_ssl.key");
|
|
if (!file2 || file2.isDirectory()) {
|
|
failed = true;
|
|
Log->println("http_ssl.key not found");
|
|
}
|
|
else
|
|
{
|
|
Log->println("Reading http_ssl.key");
|
|
size_t filesize2 = file2.size();
|
|
char key[filesize2 + 1];
|
|
|
|
file2.read((uint8_t *)key, sizeof(key));
|
|
file2.close();
|
|
key[filesize2] = '\0';
|
|
|
|
psychicServer = new PsychicHttpServer();
|
|
psychicServer->config.ctrl_port = 20424;
|
|
psychicServer->onNotFound([](PsychicRequest* request, PsychicResponse* response) {
|
|
String url = "https://" + request->host() + request->url();
|
|
if (preferences->getString(preference_https_fqdn, "") != "")
|
|
{
|
|
url = "https://" + preferences->getString(preference_https_fqdn) + request->url();
|
|
}
|
|
|
|
response->setCode(301);
|
|
response->addHeader("Cache-Control", "no-cache");
|
|
return response->redirect(url.c_str());
|
|
});
|
|
psychicServer->begin();
|
|
psychicSSLServer = new PsychicHttpsServer;
|
|
psychicSSLServer->ssl_config.httpd.max_open_sockets = 8;
|
|
psychicSSLServer->setCertificate(cert, key);
|
|
psychicSSLServer->config.stack_size = HTTPD_TASK_SIZE;
|
|
webCfgServerSSL = new WebCfgServer(nuki, nukiOpener, network, gpio, preferences, network->networkDeviceType() == NetworkDeviceType::WiFi, partitionType, psychicSSLServer);
|
|
webCfgServerSSL->initialize();
|
|
psychicSSLServer->onNotFound([](PsychicRequest* request, PsychicResponse* response) {
|
|
return response->redirect("/");
|
|
});
|
|
psychicSSLServer->begin();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (failed)
|
|
{
|
|
#endif
|
|
psychicServer = new PsychicHttpServer;
|
|
psychicServer->config.stack_size = HTTPD_TASK_SIZE;
|
|
webCfgServer = new WebCfgServer(nuki, nukiOpener, network, gpio, preferences, network->networkDeviceType() == NetworkDeviceType::WiFi, partitionType, psychicServer);
|
|
webCfgServer->initialize();
|
|
psychicServer->onNotFound([](PsychicRequest* request, PsychicResponse* response) {
|
|
return response->redirect("/");
|
|
});
|
|
psychicServer->begin();
|
|
#ifdef CONFIG_SOC_SPIRAM_SUPPORTED
|
|
}
|
|
#endif
|
|
}
|
|
/*
|
|
#ifdef DEBUG_NUKIHUB
|
|
else psychicServer->onNotFound([](PsychicRequest* request) { return request->redirect("/webserial"); });
|
|
|
|
if(preferences->getBool(preference_webserial_enabled, false))
|
|
{
|
|
WebSerial.setAuthentication(preferences->getString(preference_cred_user), preferences->getString(preference_cred_password));
|
|
WebSerial.begin(psychicServer);
|
|
WebSerial.setBuffer(1024);
|
|
}
|
|
#endif
|
|
*/
|
|
|
|
String timeserver = preferences->getString(preference_time_server, "pool.ntp.org");
|
|
esp_sntp_config_t config = ESP_NETIF_SNTP_DEFAULT_CONFIG(timeserver.c_str());
|
|
config.start = false;
|
|
config.server_from_dhcp = true;
|
|
config.renew_servers_after_new_IP = true;
|
|
config.index_of_first_server = 1;
|
|
|
|
if (network->networkDeviceType() == NetworkDeviceType::WiFi)
|
|
{
|
|
config.ip_event_to_renew = IP_EVENT_STA_GOT_IP;
|
|
}
|
|
else
|
|
{
|
|
config.ip_event_to_renew = IP_EVENT_ETH_GOT_IP;
|
|
}
|
|
config.sync_cb = cbSyncTime;
|
|
esp_netif_sntp_init(&config);
|
|
}
|
|
#endif
|
|
|
|
if(doOta)
|
|
{
|
|
setupTasks(true);
|
|
}
|
|
else
|
|
{
|
|
setupTasks(false);
|
|
}
|
|
|
|
#ifdef DEBUG_NUKIHUB
|
|
Log->print("Task Name\tStatus\tPrio\tHWM\tTask\tAffinity\n");
|
|
char stats_buffer[1024];
|
|
vTaskList(stats_buffer);
|
|
Log->println(stats_buffer);
|
|
#endif
|
|
}
|
|
|
|
void loop()
|
|
{
|
|
vTaskDelete(NULL);
|
|
}
|
|
|
|
void printBeforeSetupInfo()
|
|
{
|
|
}
|
|
|
|
void printAfterSetupInfo()
|
|
{
|
|
}
|