Add PoC
This commit is contained in:
commit
9468622c3e
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
|
@ -0,0 +1 @@
|
||||||
|
data/*
|
3
README.md
Normal file
3
README.md
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
openssl s_client -showcerts -servername letsencrypt.org -connect letsencrypt.org:443 </dev/null
|
||||||
|
cat le_x3_11_2018.pem | openssl x509 -inform PEM -outform DER -out data/ca_le.der
|
||||||
|
ar q data/certs.ar data/ca_le.der
|
0
data/.empty
Normal file
0
data/.empty
Normal file
27
le_x3_11_2018.pem
Normal file
27
le_x3_11_2018.pem
Normal file
|
@ -0,0 +1,27 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
|
||||||
|
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
|
||||||
|
DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
|
||||||
|
SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
|
||||||
|
GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
|
||||||
|
AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
|
||||||
|
q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
|
||||||
|
SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
|
||||||
|
Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
|
||||||
|
a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
|
||||||
|
/PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
|
||||||
|
AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
|
||||||
|
CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
|
||||||
|
bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
|
||||||
|
c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
|
||||||
|
VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
|
||||||
|
ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
|
||||||
|
MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
|
||||||
|
Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
|
||||||
|
AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
|
||||||
|
uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
|
||||||
|
wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
|
||||||
|
X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
|
||||||
|
PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
|
||||||
|
KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
|
||||||
|
-----END CERTIFICATE-----
|
161
ota_test.ino
Normal file
161
ota_test.ino
Normal file
|
@ -0,0 +1,161 @@
|
||||||
|
#include <ESP8266WebServer.h> //Local WebServer used to serve the configuration portal
|
||||||
|
#include <WiFiManager.h> //https://github.com/tzapu/WiFiManager WiFi Configuration Magic
|
||||||
|
#include <ESP8266WiFi.h>
|
||||||
|
#include <DNSServer.h>
|
||||||
|
#include <ESP8266WiFiMulti.h>
|
||||||
|
#include <ESP8266HTTPClient.h>
|
||||||
|
#include <ESP8266httpUpdate.h>
|
||||||
|
#include <time.h>
|
||||||
|
#include <CertStoreBearSSL.h>
|
||||||
|
#include <FS.h>
|
||||||
|
|
||||||
|
#define DEVICE_NAME "OTA TEST DEVICE"
|
||||||
|
#define TZ 1 // (utc+) TZ in hours
|
||||||
|
#define DST_MN 0 // use 60mn for summer time in some countries
|
||||||
|
#define TZ_MN ((TZ)*60)
|
||||||
|
#define TZ_SEC ((TZ)*3600)
|
||||||
|
#define DST_SEC ((DST_MN)*60)
|
||||||
|
|
||||||
|
ESP8266WiFiMulti WiFiMulti;
|
||||||
|
BearSSL::CertStore certStore;
|
||||||
|
WiFiManager wifiManager;
|
||||||
|
String config_password;
|
||||||
|
|
||||||
|
class SPIFFSCertStoreFile : public BearSSL::CertStoreFile {
|
||||||
|
public:
|
||||||
|
SPIFFSCertStoreFile(const char *name) {
|
||||||
|
_name = name;
|
||||||
|
};
|
||||||
|
virtual ~SPIFFSCertStoreFile() override {};
|
||||||
|
|
||||||
|
// The main API
|
||||||
|
virtual bool open(bool write = false) override {
|
||||||
|
_file = SPIFFS.open(_name, write ? "w" : "r");
|
||||||
|
return _file;
|
||||||
|
}
|
||||||
|
virtual bool seek(size_t absolute_pos) override {
|
||||||
|
return _file.seek(absolute_pos, SeekSet);
|
||||||
|
}
|
||||||
|
virtual ssize_t read(void *dest, size_t bytes) override {
|
||||||
|
return _file.readBytes((char*)dest, bytes);
|
||||||
|
}
|
||||||
|
virtual ssize_t write(void *dest, size_t bytes) override {
|
||||||
|
return _file.write((uint8_t*)dest, bytes);
|
||||||
|
}
|
||||||
|
virtual void close() override {
|
||||||
|
_file.close();
|
||||||
|
}
|
||||||
|
|
||||||
|
private:
|
||||||
|
File _file;
|
||||||
|
const char *_name;
|
||||||
|
};
|
||||||
|
|
||||||
|
SPIFFSCertStoreFile certs_idx("/certs.idx"); // auto generated. No upload required
|
||||||
|
SPIFFSCertStoreFile certs_ar("/certs.ar"); // use fetch_le_root_crt.py and then upload
|
||||||
|
|
||||||
|
// Set time via NTP, as required for x.509 validation
|
||||||
|
void setClock() {
|
||||||
|
configTime(TZ_SEC, DST_SEC, "pool.ntp.org", "time.nist.gov");
|
||||||
|
|
||||||
|
Serial.print(F("Waiting for NTP time sync: "));
|
||||||
|
time_t now = time(nullptr);
|
||||||
|
while (now < 8 * 3600 * 2) {
|
||||||
|
yield();
|
||||||
|
delay(500);
|
||||||
|
Serial.print(F("."));
|
||||||
|
now = time(nullptr);
|
||||||
|
}
|
||||||
|
|
||||||
|
Serial.println(F(""));
|
||||||
|
struct tm timeinfo;
|
||||||
|
gmtime_r(&now, &timeinfo);
|
||||||
|
Serial.print(F("Current time: "));
|
||||||
|
Serial.print(asctime(&timeinfo));
|
||||||
|
}
|
||||||
|
|
||||||
|
void setup() {
|
||||||
|
Serial.begin(115200);
|
||||||
|
// USE_SERIAL.setDebugOutput(true);
|
||||||
|
Serial.println();
|
||||||
|
Serial.println();
|
||||||
|
Serial.println();
|
||||||
|
|
||||||
|
for (uint8_t t = 4; t > 0; t--) {
|
||||||
|
Serial.printf("[SETUP] WAIT %d...\n", t);
|
||||||
|
Serial.flush();
|
||||||
|
delay(1000);
|
||||||
|
}
|
||||||
|
|
||||||
|
WiFi.mode(WIFI_STA);
|
||||||
|
|
||||||
|
SPIFFS.begin();
|
||||||
|
|
||||||
|
int numCerts = certStore.initCertStore(&certs_idx, &certs_ar);
|
||||||
|
Serial.print(F("Number of CA certs read: ")); Serial.println(numCerts);
|
||||||
|
if (numCerts == 0) {
|
||||||
|
Serial.println(F("No certs found. Did you run certs-from-mozill.py and upload the SPIFFS directory before running?"));
|
||||||
|
// TODO: bailout?
|
||||||
|
}
|
||||||
|
|
||||||
|
if (SPIFFS.exists("/config_password.txt")) {
|
||||||
|
File f = SPIFFS.open("/config_password.txt", "r");
|
||||||
|
if (f && f.size()) {
|
||||||
|
while (f.available()){
|
||||||
|
config_password += char(f.read());
|
||||||
|
}
|
||||||
|
f.close();
|
||||||
|
}
|
||||||
|
wifiManager.autoConnect(DEVICE_NAME, config_password.c_str());
|
||||||
|
} else {
|
||||||
|
Serial.println(F("Failed to find file. Upload config_password.txt with the configuration password included"));
|
||||||
|
// TODO: bailout?
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void loop() {
|
||||||
|
checkUpdate();
|
||||||
|
delay(10000);
|
||||||
|
}
|
||||||
|
|
||||||
|
void checkUpdate() {
|
||||||
|
// wait for WiFi connection
|
||||||
|
if ((WiFiMulti.run() == WL_CONNECTED)) {
|
||||||
|
setClock();
|
||||||
|
|
||||||
|
BearSSL::WiFiClientSecure client;
|
||||||
|
bool mfln = client.probeMaxFragmentLength("companioncu.be", 443, 1024); // server must be the same as in ESPhttpUpdate.update()
|
||||||
|
Serial.printf("MFLN supported: %s\n", mfln ? "yes" : "no");
|
||||||
|
if (mfln) {
|
||||||
|
client.setBufferSizes(1024, 1024);
|
||||||
|
}
|
||||||
|
client.setCertStore(&certStore);
|
||||||
|
|
||||||
|
// The line below is optional. It can be used to blink the LED on the board during flashing
|
||||||
|
// The LED will be on during download of one buffer of data from the network. The LED will
|
||||||
|
// be off during writing that buffer to flash
|
||||||
|
// On a good connection the LED should flash regularly. On a bad connection the LED will be
|
||||||
|
// on much longer than it will be off. Other pins than LED_BUILTIN may be used. The second
|
||||||
|
// value is used to put the LED on. If the LED is on with HIGH, that value should be passed
|
||||||
|
ESPhttpUpdate.setLedPin(LED_BUILTIN, LOW);
|
||||||
|
|
||||||
|
t_httpUpdate_return ret = ESPhttpUpdate.update(client, "https://iotupdates.companioncu.be/update");
|
||||||
|
// Or:
|
||||||
|
//t_httpUpdate_return ret = ESPhttpUpdate.update(client, "server", 443, "file.bin");
|
||||||
|
|
||||||
|
|
||||||
|
switch (ret) {
|
||||||
|
case HTTP_UPDATE_FAILED:
|
||||||
|
Serial.printf("HTTP_UPDATE_FAILED Error (%d): %s\n", ESPhttpUpdate.getLastError(), ESPhttpUpdate.getLastErrorString().c_str());
|
||||||
|
break;
|
||||||
|
|
||||||
|
case HTTP_UPDATE_NO_UPDATES:
|
||||||
|
Serial.println("HTTP_UPDATE_NO_UPDATES");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case HTTP_UPDATE_OK:
|
||||||
|
Serial.println("HTTP_UPDATE_OK");
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in a new issue