8 #include "esp_tls_crypto.h" 18 namespace web_server_idf {
21 #define HTTPD_409 "409 Conflict" 24 #define CRLF_STR "\r\n" 25 #define CRLF_LEN (sizeof(CRLF_STR) - 1) 27 static const char *
const TAG =
"web_server_idf";
40 httpd_config_t config = HTTPD_DEFAULT_CONFIG();
41 config.server_port = this->
port_;
42 config.uri_match_fn = [](
const char * ,
const char * ,
size_t ) {
return true; };
43 if (httpd_start(&this->
server_, &config) == ESP_OK) {
44 const httpd_uri_t handler_get = {
50 httpd_register_uri_handler(this->
server_, &handler_get);
52 const httpd_uri_t handler_post = {
58 httpd_register_uri_handler(this->
server_, &handler_post);
60 const httpd_uri_t handler_options = {
62 .method = HTTP_OPTIONS,
66 httpd_register_uri_handler(this->
server_, &handler_options);
71 ESP_LOGVV(TAG,
"Enter AsyncWebServer::request_post_handler. uri=%s", r->uri);
73 if (content_type.has_value() && *content_type !=
"application/x-www-form-urlencoded") {
74 ESP_LOGW(TAG,
"Only application/x-www-form-urlencoded supported for POST request");
80 ESP_LOGW(TAG,
"Content length is requred for post: %s", r->uri);
81 httpd_resp_send_err(r, HTTPD_411_LENGTH_REQUIRED,
nullptr);
85 if (r->content_len > HTTPD_MAX_REQ_HDR_LEN) {
86 ESP_LOGW(TAG,
"Request size is to big: %zu", r->content_len);
87 httpd_resp_send_err(r, HTTPD_400_BAD_REQUEST,
nullptr);
91 std::string post_query;
92 if (r->content_len > 0) {
93 post_query.resize(r->content_len);
94 const int ret = httpd_req_recv(r, &post_query[0], r->content_len + 1);
96 if (ret == HTTPD_SOCK_ERR_TIMEOUT) {
97 httpd_resp_send_err(r, HTTPD_408_REQ_TIMEOUT,
nullptr);
98 return ESP_ERR_TIMEOUT;
100 httpd_resp_send_err(r, HTTPD_400_BAD_REQUEST,
nullptr);
110 ESP_LOGVV(TAG,
"Enter AsyncWebServer::request_handler. method=%u, uri=%s", r->method, r->uri);
117 if (handler->canHandle(request)) {
120 handler->handleRequest(request);
128 return ESP_ERR_NOT_FOUND;
133 for (
const auto &pair : this->params_) {
145 auto *str = strchr(this->req_->uri,
'?');
146 if (str ==
nullptr) {
147 return this->req_->uri;
149 return std::string(this->req_->uri, str - this->req_->uri);
159 this->init_response_(
nullptr, code, content_type);
161 httpd_resp_send(*
this, content, HTTPD_RESP_USE_STRLEN);
163 httpd_resp_send(*
this,
nullptr, 0);
168 httpd_resp_set_status(*
this,
"302 Found");
169 httpd_resp_set_hdr(*
this,
"Location", url.c_str());
170 httpd_resp_send(*
this,
nullptr, 0);
174 httpd_resp_set_status(*
this, code == 200 ? HTTPD_200
175 : code == 404 ? HTTPD_404
176 : code == 409 ? HTTPD_409
179 if (content_type && *content_type) {
180 httpd_resp_set_type(*
this, content_type);
182 httpd_resp_set_hdr(*
this,
"Accept-Ranges",
"none");
185 httpd_resp_set_hdr(*
this, pair.first.c_str(), pair.second.c_str());
193 if (username ==
nullptr || password ==
nullptr || *username == 0) {
196 auto auth = this->get_header(
"Authorization");
197 if (!auth.has_value()) {
201 auto *auth_str = auth.value().c_str();
203 const auto auth_prefix_len =
sizeof(
"Basic ") - 1;
204 if (strncmp(
"Basic ", auth_str, auth_prefix_len) != 0) {
205 ESP_LOGW(TAG,
"Only Basic authorization supported yet");
209 std::string user_info;
210 user_info += username;
212 user_info += password;
215 esp_crypto_base64_encode(
nullptr, 0, &n, reinterpret_cast<const uint8_t *>(user_info.c_str()), user_info.size());
217 auto digest = std::unique_ptr<char[]>(
new char[n + 1]);
218 esp_crypto_base64_encode(reinterpret_cast<uint8_t *>(digest.get()), n, &out,
219 reinterpret_cast<const uint8_t *>(user_info.c_str()), user_info.size());
221 return strncmp(digest.get(), auth_str + auth_prefix_len, auth.value().size() - auth_prefix_len) == 0;
225 httpd_resp_set_hdr(*
this,
"Connection",
"keep-alive");
226 auto auth_val =
str_sprintf(
"Basic realm=\"%s\"", realm ? realm :
"Login Required");
227 httpd_resp_set_hdr(*
this,
"WWW-Authenticate", auth_val.c_str());
228 httpd_resp_send_err(*
this, HTTPD_401_UNAUTHORIZED,
nullptr);
232 auto find = this->params_.find(name);
233 if (find != this->params_.end()) {
240 if (url_query.has_value()) {
249 this->params_.insert({
name, param});
254 httpd_resp_set_hdr(*this->req_, name, value);
263 const int length = vsnprintf(
nullptr, 0, fmt, args);
270 vsnprintf(&str[0], length + 1, fmt, args);
277 for (
auto *ses : this->sessions_) {
285 if (this->on_connect_) {
286 this->on_connect_(rsp);
288 this->sessions_.insert(rsp);
292 for (
auto *ses : this->sessions_) {
298 for (
auto *ses : this->sessions_) {
299 ses->try_send_nodefer(message, event,
id, reconnect);
305 for (
auto *ses : this->sessions_) {
306 ses->deferrable_send_state(source, event_type, message_generator);
313 :
server_(server), web_server_(ws), entities_iterator_(new
esphome::web_server::ListEntitiesIterator(ws, server)) {
314 httpd_req_t *req = *request;
316 httpd_resp_set_status(req, HTTPD_200);
317 httpd_resp_set_type(req,
"text/event-stream");
318 httpd_resp_set_hdr(req,
"Cache-Control",
"no-cache");
319 httpd_resp_set_hdr(req,
"Connection",
"keep-alive");
322 httpd_resp_set_hdr(req, pair.first.c_str(), pair.second.c_str());
325 httpd_resp_send_chunk(req, CRLF_STR, CRLF_LEN);
327 req->sess_ctx =
this;
330 this->
hd_ = req->handle;
331 this->
fd_ = httpd_req_to_sockfd(req);
340 root[
"name"] = group.second.name;
341 root[
"sorting_weight"] = group.second.weight;
369 [&item](
const DeferredEvent &test) ->
bool {
return test == item; });
403 if (bytes_sent == HTTPD_SOCK_ERR_TIMEOUT || bytes_sent == HTTPD_SOCK_ERR_FAIL) {
422 uint32_t reconnect) {
423 if (this->
fd_ == 0) {
434 const char chunk_len_header[] =
" " CRLF_STR;
435 const int chunk_len_header_len =
sizeof(chunk_len_header) - 1;
451 if (event && *event) {
457 if (message && *message) {
471 int chunk_len =
event_buffer_.size() - CRLF_LEN - chunk_len_header_len;
472 char chunk_len_str[9];
473 snprintf(chunk_len_str, 9,
"%08x", chunk_len);
489 if (source ==
nullptr)
491 if (event_type ==
nullptr)
493 if (message_generator ==
nullptr)
496 if (0 != strcmp(event_type,
"state_detail_all") && 0 != strcmp(event_type,
"state")) {
497 ESP_LOGE(TAG,
"Can't defer non-state event");
508 std::string message = message_generator(
web_server_, source);
518 #endif // !defined(USE_ESP_IDF)
value_type const & value() const
AsyncWebParameter * getParam(const std::string &name)
AsyncEventSourceResponse(const AsyncWebServerRequest *request, esphome::web_server_idf::AsyncEventSource *server, esphome::web_server::WebServer *ws)
This class allows users to create a web server with their ESP nodes.
void send(AsyncWebServerResponse *response)
bool hasHeader(const char *name) const
optional< std::string > get_header(const char *name) const
std::unique_ptr< esphome::web_server::ListEntitiesIterator > entities_iterator_
static esp_err_t request_handler(httpd_req_t *r)
bool try_send_nodefer(const char *message, const char *event=nullptr, uint32_t id=0, uint32_t reconnect=0)
virtual size_t get_content_size() const =0
std::string(esphome::web_server::WebServer *, void *) message_generator_t
uint32_t IRAM_ATTR HOT millis()
std::map< uint64_t, SortingGroup > sorting_groups_
void deferrable_send_state(void *source, const char *event_type, message_generator_t *message_generator)
friend class AsyncEventSourceResponse
optional< std::string > request_get_header(httpd_req_t *req, const char *name)
void print(const char *str)
~AsyncEventSource() override
bool request_has_header(httpd_req_t *req, const char *name)
AsyncEventSource * server_
message_generator_t * message_generator_
void process_deferred_queue_()
void init_response_(AsyncWebServerResponse *rsp, int code, const char *content_type)
std::vector< AsyncWebHandler * > handlers_
std::string event_buffer_
std::string str_sprintf(const char *fmt,...)
optional< std::string > query_key_value(const std::string &query_url, const std::string &key)
esphome::web_server::WebServer * web_server_
std::string build_json(const json_build_t &f)
Build a JSON string with the provided json build function.
optional< std::string > request_get_url_query(httpd_req_t *req)
void deq_push_back_with_dedup_(void *source, message_generator_t *message_generator)
void addHeader(const char *name, const char *value)
esp_err_t request_handler_(AsyncWebServerRequest *request) const
void requestAuthentication(const char *realm=nullptr) const
bool authenticate(const char *username, const char *password) const
void handleRequest(AsyncWebServerRequest *request) override
std::string to_string(int value)
void redirect(const std::string &url)
void try_send_nodefer(const char *message, const char *event=nullptr, uint32_t id=0, uint32_t reconnect=0)
std::string get_config_json()
Return the webserver configuration as JSON.
Implementation of SPI Controller mode.
std::set< AsyncEventSourceResponse * > sessions_
std::vector< DeferredEvent > deferred_queue_
std::function< void(AsyncWebServerRequest *request)> on_not_found_
void deferrable_send_state(void *source, const char *event_type, message_generator_t *message_generator)
virtual const char * get_content_data() const =0
static esp_err_t request_post_handler(httpd_req_t *r)
static void destroy(void *p)
void printf(const char *fmt,...) __attribute__((format(printf