42 Commits

Author SHA1 Message Date
c2dc9463ca Merge branch 'FirstReleaseOutThereBranch' 2021-03-30 11:09:15 +02:00
7c1e230965 release script added 2021-03-30 11:03:45 +02:00
c004e57abb sink has been moved 2021-03-15 17:26:43 +01:00
c4708b1284 fix 2021-03-08 15:22:37 +01:00
0759475be8 fix 2021-03-08 15:19:01 +01:00
03ae897425 test file 2021-03-03 22:35:52 +01:00
6611220851 better blink 2021-03-03 19:16:22 +01:00
fe1bc101a3 version 2021-03-03 19:06:12 +01:00
daf281eb89 enable counter again 2021-03-01 11:58:29 +01:00
fa3df2bb32 fix 2021-03-01 11:43:15 +01:00
f310f604a6 x 2021-03-01 11:40:53 +01:00
e9afbbb379 x 2021-03-01 11:38:14 +01:00
e478f00ceb x 2021-03-01 11:37:53 +01:00
6555208d8c debug 2021-03-01 11:35:52 +01:00
577f1fbd42 debug 2021-03-01 11:34:16 +01:00
7dfac6e471 debug 2021-03-01 11:26:28 +01:00
4abe77f3c1 fix 2021-03-01 11:25:07 +01:00
acd5b2123a fix 2021-03-01 11:24:08 +01:00
3b3d5ee6a6 struct/union 2021-03-01 11:22:14 +01:00
6e73dccd66 changes 2021-03-01 11:16:54 +01:00
991f2724a6 fix 2021-03-01 11:10:02 +01:00
fc101e30f4 sntp change 2021-03-01 11:08:04 +01:00
e6e1bac2c3 check 2021-02-28 22:16:10 +01:00
3e5310557c fix 2021-02-28 22:14:51 +01:00
cee2116f3a rawSEconds 2021-02-28 22:14:25 +01:00
681c5d8695 ntoh 2021-02-28 22:06:17 +01:00
192fa69f68 xmt 2021-02-28 22:01:06 +01:00
2dc99d2b01 second pcap 2021-02-28 21:49:42 +01:00
ef71142ce3 test 2021-02-28 21:29:26 +01:00
d08fab14fa test 2021-02-28 21:28:10 +01:00
f04376ddd9 test 2021-02-28 21:24:45 +01:00
45d5f8af9b fix 2021-02-28 21:00:50 +01:00
0cb99a4854 fix 2021-02-28 20:57:04 +01:00
444e118e54 sntp implementation 2021-02-28 20:55:21 +01:00
145109a280 something broken now 2021-02-28 19:38:33 +01:00
9fcc43b012 retry 2021-02-28 13:31:29 +01:00
b81c9f445f changes 2021-02-28 12:53:43 +01:00
8e84fbe287 changes 2021-02-28 12:53:06 +01:00
7addea50a3 changes 2021-02-28 12:51:58 +01:00
7154b0abc3 changes 2021-02-28 12:40:38 +01:00
897e7039f2 forgotten 2021-02-28 12:37:26 +01:00
1b1180a72f start 2021-02-28 12:35:43 +01:00
22 changed files with 240 additions and 672 deletions

2
.gitignore vendored
View File

@ -6,5 +6,5 @@ cube/pubsubc.a
test test
.bash_history .bash_history
.vscode .vscode
tools/ENV

View File

@ -98,7 +98,7 @@ int main(void)
MX_SPI2_Init(); MX_SPI2_Init();
MX_TIM1_Init(); MX_TIM1_Init();
MX_USART1_UART_Init(); MX_USART1_UART_Init();
// MX_IWDG_Init(); MX_IWDG_Init();
/* USER CODE BEGIN 2 */ /* USER CODE BEGIN 2 */
my_setup_2(); my_setup_2();

View File

@ -2,12 +2,11 @@
#define _NETWORK_ABSTRACTION_LAYER_IMPL_H_ #define _NETWORK_ABSTRACTION_LAYER_IMPL_H_
#include <stdint.h> #include <stdint.h>
#include <stdbool.h>
uint64_t networkSntpQuery(); uint64_t networkSntpQuery();
int8_t networkUdpSend(char *hostname, uint16_t port, uint8_t *buf, uint16_t bufLen); int8_t networkUdpSend(char *hostname, uint16_t port, uint8_t *buf, uint16_t bufLen);
void networkImplInit(); void networkImplInit();
bool isNetworkAvailable();
#endif /* _NETWORK_ABSTRACTION_LAYER_IMPL_H_ */ #endif /* _NETWORK_ABSTRACTION_LAYER_IMPL_H_ */

View File

@ -12,7 +12,7 @@ typedef enum {
LED_BLUE LED_BLUE
} signalPin_t; } signalPin_t;
typedef enum { ON, OFF, TOGGLE, BLINK } signalAction_t; typedef enum { ON, OFF, TOGGLE, BLINK, BLINK_FAST } signalAction_t;
void showInit(); void showInit();
void show(signalPin_t signalPin, signalAction_t action); void show(signalPin_t signalPin, signalAction_t action);

View File

@ -7,10 +7,9 @@
int wizInit(); int wizInit();
bool isNetworkAvailable(); bool wizIsNetworkAvailable();
uint8_t* wizGetIPAddress(); uint8_t* wizGetIPAddress();
bool wizDnsQuery(char *name, uint8_t *ip); bool wizDnsQuery(char *name, uint8_t *ip);
uint64_t wizSntpQuery();
#endif // _WIZHELPER_H_ #endif // _WIZHELPER_H_

View File

@ -48,7 +48,7 @@ void counterMinuteTick(void *handle) {
minuteBuffer->s.totalRunningHours = deviceStats->totalRunningHours; minuteBuffer->s.totalRunningHours = deviceStats->totalRunningHours;
minuteBuffer->s.totalPowercycles = deviceStats->totalPowercycles; minuteBuffer->s.totalPowercycles = deviceStats->totalPowercycles;
minuteBuffer->s.totalWatchdogResets = deviceStats->totalWatchdogResets; minuteBuffer->s.totalWatchdogResets = deviceStats->totalWatchdogResets;
minuteBuffer->s.version = strtol(VERSION, NULL, 16); minuteBuffer->s.version = strtoll(VERSION, NULL, 16);
memset(minuteBuffer->s.deviceId, 0, sizeof(minuteBuffer->s.deviceId)); memset(minuteBuffer->s.deviceId, 0, sizeof(minuteBuffer->s.deviceId));

View File

@ -3,6 +3,7 @@
#include <iwdg.h> #include <iwdg.h>
#include <logger.h> #include <logger.h>
#include <sinkStruct.h> #include <sinkStruct.h>
#include <show.h>
#include <config.h> #include <config.h>
#include <networkAbstractionLayer_impl.h> #include <networkAbstractionLayer_impl.h>
@ -14,12 +15,13 @@ static t_seconds seconds = { .seconds = 0, .missedUpdates = 0, .valid = false };
static t_configBlock *config; static t_configBlock *config;
static void networkSecondsHandler(void *handle) { static void networkSecondsHandler(void *handle) {
static bool tryAgain = false; static bool tryAgain = false;
seconds.seconds += 1; seconds.seconds += 1;
if (! seconds.valid) { if (! seconds.valid && isNetworkAvailable()) {
coloredMsg(LOG_YELLOW, "nsh, initially querying time"); coloredMsg(LOG_YELLOW, "nsh, initially querying time");
uint64_t tmpSeconds = networkSntpQuery(); uint64_t tmpSeconds = networkSntpQuery();
if (tmpSeconds != 0) { if (tmpSeconds != 0) {
@ -27,6 +29,7 @@ static void networkSecondsHandler(void *handle) {
seconds.seconds = tmpSeconds; seconds.seconds = tmpSeconds;
seconds.missedUpdates = 0; seconds.missedUpdates = 0;
seconds.valid = true; seconds.valid = true;
show(LED_GREEN, ON);
} else { } else {
coloredMsg(LOG_YELLOW, "nsh, failed"); coloredMsg(LOG_YELLOW, "nsh, failed");
seconds.missedUpdates += 1; seconds.missedUpdates += 1;
@ -38,6 +41,7 @@ static void networkSecondsHandler(void *handle) {
coloredMsg(LOG_YELLOW, "nsh, success, network time is %lu", tmpSeconds); coloredMsg(LOG_YELLOW, "nsh, success, network time is %lu", tmpSeconds);
seconds.missedUpdates = 0; seconds.missedUpdates = 0;
tryAgain = false; tryAgain = false;
show(LED_GREEN, ON);
if (seconds.seconds != tmpSeconds) { if (seconds.seconds != tmpSeconds) {
coloredMsg(LOG_YELLOW, "nsh, local time updated"); coloredMsg(LOG_YELLOW, "nsh, local time updated");
seconds.seconds = tmpSeconds; seconds.seconds = tmpSeconds;

View File

@ -4,20 +4,27 @@
#include <networkAbstractionLayer_impl.h> #include <networkAbstractionLayer_impl.h>
#include <logger.h> #include <logger.h>
#include <PontCoopScheduler.h> #include <PontCoopScheduler.h>
#include <wizHelper.h> #include <wizHelper.h>
#include <wizchip_conf.h> #include <wizchip_conf.h>
#include <socket.h> #include <socket.h>
#include <wizchip_conf.h>
#include <config.h> #include <config.h>
#include <sntp.h>
static t_configBlock *config; static t_configBlock *config;
const uint16_t MAX_RECV_RETRY_COUNT = 100;
const uint64_t UNIX_NTP_EPOCH_DIFF = 2208988800; static const uint64_t UNIX_NTP_EPOCH_DIFF = 2208988800;
static const uint16_t NTP_PORT = 123;
static const uint16_t MAX_SNTP_RETRIES = 100;
extern const uint8_t SNTP_SOCK;
const uint8_t SEND_LI_VN_MODE = 0xe3; // LI: unknown (3), VN: 4, Mode: Client (3) const uint8_t SEND_LI_VN_MODE = 0xe3; // LI: unknown (3), VN: 4, Mode: Client (3)
typedef struct { typedef struct s_ntpStruct {
uint8_t li_vn_mode; uint8_t li_vn_mode;
uint8_t stratum; uint8_t stratum;
uint8_t poll; uint8_t poll;
@ -25,113 +32,167 @@ typedef struct {
uint32_t rootdelay; uint32_t rootdelay;
uint32_t rootdisp; uint32_t rootdisp;
uint32_t refid; uint32_t refid;
uint64_t reftime; //uint64_t reftime;
uint64_t org; uint32_t reftime_h;
uint64_t rec; uint32_t reftime_l;
uint64_t xmt; //uint64_t org;
uint32_t org_h;
uint32_t org_l;
//uint64_t rec;
uint32_t rec_h;
uint32_t rec_l;
//uint64_t xmt;
uint32_t xmt_h;
uint32_t xmt_l;
} t_ntpStruct;
typedef union __attribute__((__packed__)) {
t_ntpStruct s;
uint8_t b[sizeof(t_ntpStruct)];
} ntpMsg_t; } ntpMsg_t;
extern uint8_t SNTP_SOCK; typedef struct {
ntpMsg_t ntpMsg;
const uint16_t NTP_PORT = 123; uint8_t ntpAddr[4];
uint16_t retryCount;
enum { uint64_t seconds;
enum {
SNTP_STATE_IDLE, SNTP_STATE_IDLE,
SNTP_STATE_START, SNTP_STATE_START,
SNTP_STATE_SEND, SNTP_STATE_SEND,
SNTP_STATE_RECV, SNTP_STATE_RECV,
SNTP_STATE_ERROR, SNTP_STATE_DONE,
SNTP_STATE_DONE SNTP_STATE_ERROR
} sntpState = SNTP_STATE_IDLE; } sntpState;
uint64_t seconds; } sntpEngineHandle_t;
sntpEngineHandle_t sntpEngineHandle = {
.seconds = 0,
.retryCount = 0,
.sntpState = SNTP_STATE_IDLE
};
/* void networkSntpEngine(void *handle) {
static void networkSntpEngine(void *handle) { sntpEngineHandle_t *localHandle = (sntpEngineHandle_t*) handle;
static uint16_t retryCount = 0; if (isNetworkAvailable()) {
switch (localHandle->sntpState) {
coloredMsg(LOG_BLUE, "nes, %u", sntpState);
switch (sntpState) {
case SNTP_STATE_START: case SNTP_STATE_START:
coloredMsg(LOG_BLUE, "nes, about to send"); coloredMsg(LOG_BLUE, "nes, resolve ntp server");
uint8_t ntpAddr[4]; if (! wizDnsQuery(config->ntpServer, localHandle->ntpAddr)) {
if (! wizDnsQuery(config->ntpServer, ntpAddr)) {
coloredMsg(LOG_BLUE, "nes, failed to resolve ntp server"); coloredMsg(LOG_BLUE, "nes, failed to resolve ntp server");
sntpState = SNTP_STATE_ERROR; localHandle->sntpState = SNTP_STATE_ERROR;
} else { } else {
localHandle->sntpState = SNTP_STATE_SEND;
schAdd(networkSntpEngine, (void*) localHandle, 10, 0);
}
break;
case SNTP_STATE_SEND:
coloredMsg(LOG_BLUE, "nes, about to call SNTP");
localHandle->retryCount = 0;
socket(SNTP_SOCK, Sn_MR_UDP, NTP_PORT, 0); socket(SNTP_SOCK, Sn_MR_UDP, NTP_PORT, 0);
retryCount = 0;
uint8_t sockState = getSn_SR(SNTP_SOCK); uint8_t sockState = getSn_SR(SNTP_SOCK);
if (sockState == SOCK_UDP) { if (sockState == SOCK_UDP) {
ntpMsg_t ntpMsg; memset(&(localHandle->ntpMsg), 0, sizeof(localHandle->ntpMsg));
memset(&ntpMsg, 0, sizeof(ntpMsg)); localHandle->ntpMsg.s.li_vn_mode = SEND_LI_VN_MODE;
ntpMsg.li_vn_mode = SEND_LI_VN_MODE; localHandle->ntpMsg.s.xmt_l = 1;
sendto(SNTP_SOCK, (uint8_t*)&ntpMsg, sizeof(ntpMsg), ntpAddr, NTP_PORT); sendto(SNTP_SOCK, localHandle->ntpMsg.b,
sizeof(localHandle->ntpMsg.b), localHandle->ntpAddr, NTP_PORT);
coloredMsg(LOG_BLUE, "nes, sent"); coloredMsg(LOG_BLUE, "nes, sent");
sntpState = SNTP_STATE_RECV; localHandle->sntpState = SNTP_STATE_RECV;
schAdd(networkSntpEngine, NULL, 1000, 0); schAdd(networkSntpEngine, (void*) localHandle, 100, 0);
} else { } else {
coloredMsg(LOG_BLUE, "nes, socket in unexpected state: %d", sockState); coloredMsg(LOG_BLUE, "nes, socket in unexpected state %d", sockState);
sntpState = SNTP_STATE_ERROR; localHandle->sntpState = SNTP_STATE_ERROR;
}
} }
break; break;
case SNTP_STATE_RECV: case SNTP_STATE_RECV:
coloredMsg(LOG_BLUE, "nes, check receive"); coloredMsg(LOG_BLUE, "nes, check receive");
localHandle->retryCount += 1;
uint16_t recvLen = getSn_RX_RSR(SNTP_SOCK); uint16_t recvLen = getSn_RX_RSR(SNTP_SOCK);
if (recvLen == 0) { if (recvLen == 0) {
retryCount += 1; if (localHandle->retryCount > MAX_SNTP_RETRIES) {
if (retryCount > MAX_RECV_RETRY_COUNT) { coloredMsg(LOG_BLUE, "nes, max retry count reached, failed");
coloredMsg(LOG_BLUE, "nes max retry count reached, failed"); localHandle->sntpState = SNTP_STATE_ERROR;
sntpState = SNTP_STATE_ERROR;
} else { } else {
coloredMsg(LOG_BLUE, "nes, nothing received yet, try again"); coloredMsg(LOG_BLUE, "nes, nothing received yet, try again");
schAdd(networkSntpEngine, NULL, 100, 0); schAdd(networkSntpEngine, (void*) localHandle, 100, 0);
} }
} else if (recvLen == sizeof(ntpMsg_t)) { } else if (recvLen >= sizeof(localHandle->ntpMsg)) {
ntpMsg_t ntpMsg; memset(&(localHandle->ntpMsg), 0, sizeof(localHandle->ntpMsg));
memset(&ntpMsg, 0, sizeof(ntpMsg_t));
uint8_t srcAddr[4]; uint8_t srcAddr[4];
uint16_t srcPort; uint16_t srcPort;
recvfrom(SNTP_SOCK, (uint8_t*)&ntpMsg, sizeof(ntpMsg_t), srcAddr, &srcPort);
recvfrom(SNTP_SOCK, localHandle->ntpMsg.b,
sizeof(localHandle->ntpMsg.b), srcAddr, &srcPort);
uint8_t *buf = localHandle->ntpMsg.b;
uint8_t x = 0;
coloredMsg(LOG_BLUE, "nes, %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x",
buf[x+0], buf[x+1], buf[x+2], buf[x+3], buf[x+4], buf[x+5], buf[x+6], buf[x+7],
buf[x+8], buf[x+9], buf[x+10], buf[x+11], buf[x+12], buf[x+13], buf[x+14], buf[x+15]);
x += 16;
coloredMsg(LOG_BLUE, "nes, %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x",
buf[x+0], buf[x+1], buf[x+2], buf[x+3], buf[x+4], buf[x+5], buf[x+6], buf[x+7],
buf[x+8], buf[x+9], buf[x+10], buf[x+11], buf[x+12], buf[x+13], buf[x+14], buf[x+15]);
x += 16;
coloredMsg(LOG_BLUE, "nes, %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x",
buf[x+0], buf[x+1], buf[x+2], buf[x+3], buf[x+4], buf[x+5], buf[x+6], buf[x+7],
buf[x+8], buf[x+9], buf[x+10], buf[x+11], buf[x+12], buf[x+13], buf[x+14], buf[x+15]);
x += 16;
coloredMsg(LOG_BLUE, "nes, %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x",
buf[x+0], buf[x+1], buf[x+2], buf[x+3], buf[x+4], buf[x+5], buf[x+6], buf[x+7],
buf[x+8], buf[x+9], buf[x+10], buf[x+11], buf[x+12], buf[x+13], buf[x+14], buf[x+15]);
close(SNTP_SOCK); close(SNTP_SOCK);
coloredMsg(LOG_BLUE, "nes, msg received from %d.%d.%d.%d:%d", coloredMsg(LOG_BLUE, "nes, msg received from %d.%d.%d.%d:%d",
srcAddr[0], srcAddr[1], srcAddr[2], srcAddr[3], srcAddr[0], srcAddr[1], srcAddr[2], srcAddr[3],
srcPort); srcPort);
coloredMsg(LOG_BLUE, "nes, received in the %d. cycles", retryCount);
seconds = ntpMsg.rec - UNIX_NTP_EPOCH_DIFF; coloredMsg(LOG_BLUE, "nes, received in the %d. cycles", localHandle->retryCount);
coloredMsg(LOG_BLUE, "nes, seconds: %lu", seconds); uint32_t xmt_h =
sntpState = SNTP_STATE_DONE; (localHandle->ntpMsg.s.xmt_h & 0x0000000ff) << 24 |
(localHandle->ntpMsg.s.xmt_h & 0x00000ff00) << 8 |
(localHandle->ntpMsg.s.xmt_h & 0x000ff0000) >> 8 |
(localHandle->ntpMsg.s.xmt_h & 0x0ff000000) >> 24;
localHandle->seconds = ((uint64_t)xmt_h) - UNIX_NTP_EPOCH_DIFF;
coloredMsg(LOG_BLUE, "nes, xmt: %08x", xmt_h);
coloredMsg(LOG_BLUE, "nes, seconds: %lu", localHandle->seconds);
localHandle->sntpState = SNTP_STATE_DONE;
} else { } else {
coloredMsg(LOG_BLUE, "nes, invalid number of octets received: %d", recvLen); coloredMsg(LOG_BLUE, "nes, invalid number of octets received: %d", recvLen);
sntpState = SNTP_STATE_ERROR; localHandle->sntpState = SNTP_STATE_ERROR;
} }
break; break;
default: default:
coloredMsg(LOG_BLUE, "nes, unexpected state"); coloredMsg(LOG_BLUE, "nes, unexpected state");
} }
} else {
coloredMsg(LOG_BLUE, "nes, no network yet, try again");
schAdd(networkSntpEngine, (void*) localHandle, 100, 0);
}
} }
*/
uint64_t networkSntpQuery() { uint64_t networkSntpQuery() {
/*
uint64_t res = 0; uint64_t res = 0;
if (sntpState == SNTP_STATE_IDLE) {
sntpState = SNTP_STATE_START;
schAdd(networkSntpEngine, NULL, 1, 0);
} else if (sntpState == SNTP_STATE_ERROR) {
sntpState = SNTP_STATE_IDLE;
} else if (sntpState == SNTP_STATE_DONE) {
sntpState = SNTP_STATE_IDLE;
res = seconds;
}
return res;
*/
return 0;
}
if (sntpEngineHandle.sntpState == SNTP_STATE_IDLE) {
coloredMsg(LOG_BLUE, "nsq, start sntp request");
sntpEngineHandle.sntpState = SNTP_STATE_START;
schAdd(networkSntpEngine, (void*) &sntpEngineHandle, 1, 0);
} else if (sntpEngineHandle.sntpState == SNTP_STATE_DONE) {
coloredMsg(LOG_BLUE, "nsq, start sntp done");
res = sntpEngineHandle.seconds;
coloredMsg(LOG_BLUE, "nsq, time is %lu", res);
sntpEngineHandle.sntpState = SNTP_STATE_IDLE;
} else if (sntpEngineHandle.sntpState == SNTP_STATE_ERROR) {
coloredMsg(LOG_BLUE, "nsq, start sntp failed");
sntpEngineHandle.sntpState = SNTP_STATE_IDLE;
}
return res;
}
extern uint8_t SINK_SOCK; extern uint8_t SINK_SOCK;
@ -159,6 +220,10 @@ int8_t networkUdpSend(char *hostname, uint16_t port, uint8_t *buf, uint16_t bufL
return 1; return 1;
} }
bool isNetworkAvailable() {
return wizIsNetworkAvailable();
}
void networkImplInit() { void networkImplInit() {
config = getConfig(); config = getConfig();
wizInit(); wizInit();

View File

@ -1,6 +1,7 @@
#include <main.h> #include <main.h>
#include <show.h> #include <show.h>
#include <PontCoopScheduler.h> #include <PontCoopScheduler.h>
#include <show.h>
#include <stdint.h> #include <stdint.h>
#include <stdlib.h> #include <stdlib.h>
@ -24,9 +25,20 @@ showElement_t showElement[] = {
}; };
static void showHandler(void *handle) { static void showHandler(void *handle) {
const uint8_t MAX_CNT = 3;
static uint8_t cnt = 0;
cnt += 1;
if (cnt > MAX_CNT) {
cnt = 0;
}
uint8_t idx = 0; uint8_t idx = 0;
while (showElement[idx].port) { while (showElement[idx].port) {
if (showElement[idx].currentState == BLINK) { if (showElement[idx].currentState == BLINK) {
if (cnt == MAX_CNT) {
HAL_GPIO_TogglePin(showElement[idx].port, showElement[idx].pin);
}
} else if (showElement[idx].currentState == BLINK_FAST) {
HAL_GPIO_TogglePin(showElement[idx].port, showElement[idx].pin); HAL_GPIO_TogglePin(showElement[idx].port, showElement[idx].pin);
} }
idx++; idx++;
@ -43,5 +55,5 @@ void show(signalPin_t signalPin, signalAction_t action) {
} }
void showInit() { void showInit() {
schAdd(showHandler, NULL, 0, 250); schAdd(showHandler, NULL, 0, 100);
} }

View File

@ -33,7 +33,7 @@ extern const uint8_t DNS_SOCK;
static bool networkAvailable = false; static bool networkAvailable = false;
bool isNetworkAvailable() { bool wizIsNetworkAvailable() {
return networkAvailable; return networkAvailable;
} }
@ -86,7 +86,7 @@ static void wizDHCPAssign() {
coloredMsg(LOG_BLUE, "wizda, set netinfo again"); coloredMsg(LOG_BLUE, "wizda, set netinfo again");
networkAvailable = true; networkAvailable = true;
show(LED_GREEN, ON); show(LED_GREEN, BLINK_FAST);
coloredMsg(LOG_BLUE, "wizda, network is available"); coloredMsg(LOG_BLUE, "wizda, network is available");
} }

BIN
docs/ntp.pcap Normal file

Binary file not shown.

BIN
docs/ntp2.pcap Normal file

Binary file not shown.

8
docs/test1.txt Normal file
View File

@ -0,0 +1,8 @@
24 02 03 e9 00 00 06 86 00 00 02 cc c0 a8 64 0f
e3 e6 85 7c b7 79 4a eb 00 00 00 00 00 00 00 00
e3 e6 86 b4 cb 75 ef d3 e3 e6 86 b4 cb 7c 22 82
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1614546999
2208988800

1
sink/.gitignore vendored
View File

@ -1 +0,0 @@
build/

View File

@ -1,42 +0,0 @@
BUILD_DIR = build
C_SOURCES = \
../cube/User/Src/sha256.c \
sink20169.c \
logging.c
C_INCLUDES = \
-I. \
-I../cube/User/Inc
VERSION := $(shell git rev-parse --short=8 HEAD)
CC = gcc
CFLAGS = $(C_INCLUDES) -Wall -Werror -std=c99 -DVERSION="\"$(VERSION)\""
LDFLAGS = -lconfig -lcurl
TARGET = sink20169
UNAME_S := $(shell uname -s)
ifeq ($(UNAME_S),OpenBSD)
CFLAGS += -I/usr/local/include -DOpenBSD=1
LDFLAGS += -L/usr/local/lib
endif
all: $(BUILD_DIR)/$(TARGET)
OBJECTS = $(addprefix $(BUILD_DIR)/,$(notdir $(C_SOURCES:.c=.o)))
vpath %.c $(sort $(dir $(C_SOURCES)))
$(BUILD_DIR)/%.o: %.c Makefile | $(BUILD_DIR)
$(CC) -c $(CFLAGS) $< -o $@
$(BUILD_DIR)/$(TARGET): $(OBJECTS) Makefile
$(CC) $(OBJECTS) $(LDFLAGS) -o $@
$(BUILD_DIR):
mkdir $@
.phony: clean
clean:
-rm -rf $(BUILD_DIR)

View File

@ -1,53 +0,0 @@
#define _DEFAULT_SOURCE
#include <syslog.h>
#include <stdarg.h>
#include <stdbool.h>
#include <stdio.h>
#include <string.h>
extern bool verbose;
int facility = LOG_LOCAL0;
void setfacility(const char *facility_p) {
if (! strcmp(facility_p, "LOCAL0")) {
facility = LOG_LOCAL0;
} else if (! strcmp(facility_p, "LOCAL1")) {
facility = LOG_LOCAL1;
} else if (! strcmp(facility_p, "LOCAL2")) {
facility = LOG_LOCAL2;
} else if (! strcmp(facility_p, "LOCAL3")) {
facility = LOG_LOCAL3;
} else if (! strcmp(facility_p, "LOCAL4")) {
facility = LOG_LOCAL4;
} else if (! strcmp(facility_p, "LOCAL5")) {
facility = LOG_LOCAL5;
} else if (! strcmp(facility_p, "LOCAL6")) {
facility = LOG_LOCAL6;
} else if (! strcmp(facility_p, "LOCAL7")) {
facility = LOG_LOCAL7;
} else if (! strcmp(facility_p, "USER")) {
facility = LOG_USER;
} else if (! strcmp(facility_p, "DAEMON")) {
facility = LOG_DAEMON;
}
}
void logmsg(int prio, const char* format, ...) {
va_list vl;
char buf[1024];
va_start(vl, format);
vsnprintf(buf, sizeof(buf), format, vl);
va_end(vl);
if (verbose) {
printf("%s\n", buf);
}
openlog("counter", 0, facility);
syslog(prio, "%s", buf);
closelog();
}

View File

@ -1,8 +0,0 @@
#ifndef _LOGGING_H_
#define _LOGGING_H_
#include <syslog.h>
void logmsg(int prio, const char* format, ...);
void setfacility(const char *facility_p);
#endif // _LOGGING_H_

View File

@ -1,3 +0,0 @@
Make sure libconfig and libcurl are available.
On Linux (Debian) install libconfig-dev and libcurl4-openssl-dev,
on OpenBSD install libconfig and curl.

View File

@ -1,423 +0,0 @@
#define _DEFAULT_SOURCE
#include <stdio.h>
#include <stdlib.h>
#include <stdbool.h>
#include <unistd.h>
#include <errno.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <string.h>
#include <getopt.h>
#include <pwd.h>
#include <libconfig.h>
#include <curl/curl.h>
#include <sinkStruct.h>
#include <logging.h>
#include <sha256.h>
const char DEFAULT_CONFIG_FILENAME[] = "./sink20169.cfg";
typedef struct {
const char *deviceId;
const char *location;
const char *sharedSecret;
} t_device;
typedef struct {
config_t cfg;
uint16_t numOfDevices;
t_device *devices;
} t_configHandle;
typedef struct {
t_configHandle *configHandle;
int receiveSockFd;
} t_receiverHandle;
typedef struct {
t_configHandle *configHandle;
const char *influxUser;
const char *influxPass;
const char *influxServer;
uint16_t influxPort;
const char *influxDatabase;
const char *influxMeasurement;
char influxUrl[1024];
} t_forwarderHandle;
bool verbose = false;
int initConfig(const char *configFilename, t_configHandle *configHandle) {
configHandle->numOfDevices = 0;
configHandle->devices = NULL;
config_init(&(configHandle->cfg));
if (! config_read_file(&(configHandle->cfg), configFilename)) {
logmsg(LOG_ERR, "failed to read config file: %s:%d - %s\n",
config_error_file(&(configHandle->cfg)), config_error_line(&(configHandle->cfg)),
config_error_text(&(configHandle->cfg)));
config_destroy(&(configHandle->cfg));
return -1;
}
config_setting_t *devicesConfig = config_lookup(&(configHandle->cfg), "devices");
if (devicesConfig == NULL) {
logmsg(LOG_ERR, "receiver: no devices configuration found");
return -2;
}
configHandle->numOfDevices = config_setting_length(devicesConfig);
configHandle->devices = (t_device*) malloc(configHandle->numOfDevices * sizeof(t_device));
for (uint16_t i = 0; i < configHandle->numOfDevices; i++) {
config_setting_t *deviceConfig = config_setting_get_elem(devicesConfig, i);
if (! config_setting_lookup_string(deviceConfig, "deviceId", &(configHandle->devices[i].deviceId))) {
logmsg(LOG_ERR, "no deviceId for device %d", i);
return -3;
}
if (! config_setting_lookup_string(deviceConfig, "location", &(configHandle->devices[i].location))) {
logmsg(LOG_ERR, "no location for device %d", i);
return -4;
}
if (! config_setting_lookup_string(deviceConfig, "sharedSecret", &(configHandle->devices[i].sharedSecret))) {
logmsg(LOG_ERR, "no sharedSecret for device %d", i);
return -5;
}
if (strlen(configHandle->devices[i].sharedSecret) >= SHA256_BLOCK_SIZE) {
logmsg(LOG_ERR, "Configured sharedsecret for device %d is too long", i);
return -6;
}
logmsg(LOG_INFO, "Device loaded: %d %s %s %s", i,
configHandle->devices[i].deviceId,
configHandle->devices[i].location,
configHandle->devices[i].sharedSecret);
}
return 0;
}
void deinitConfig(t_configHandle *configHandle) {
config_destroy(&(configHandle->cfg));
if (configHandle->devices) {
free(configHandle->devices);
configHandle->devices = NULL;
}
}
t_device *findDevice(t_configHandle *configHandle, char *deviceId) {
for (uint16_t i = 0; i < configHandle->numOfDevices; i++) {
if (! strcmp(configHandle->devices[i].deviceId, deviceId)) {
return &(configHandle->devices[i]);
}
}
return NULL;
}
int initReceiver(t_configHandle *configHandle, t_receiverHandle *handle) {
handle->configHandle = configHandle;
struct sockaddr_in servaddr;
handle->receiveSockFd = socket(AF_INET, SOCK_DGRAM, 0);
if (handle->receiveSockFd == -1) {
logmsg(LOG_ERR, "failed to create receive socket: %d", errno);
return -1;
}
int receivePort = 20169;
config_lookup_int(&(configHandle->cfg), "receivePort", &receivePort);
if (receivePort < 1 || receivePort > 65535) {
logmsg(LOG_ERR, "illegal receive port configured");
return -2;
}
memset(&servaddr, 0, sizeof(servaddr));
servaddr.sin_family = AF_INET;
servaddr.sin_addr.s_addr = htonl(INADDR_ANY);
servaddr.sin_port = htons(receivePort);
if (-1 == bind(handle->receiveSockFd, (const struct sockaddr *) &servaddr, sizeof(servaddr))) {
logmsg(LOG_ERR, "unable to bind receive: %d", errno);
return -3;
}
return 0;
}
void deinitReceiver(t_receiverHandle *handle) {
close(handle->receiveSockFd);
}
int receiveAndVerifyMinuteBuffer(t_receiverHandle *handle, t_minuteBuffer *buf) {
struct sockaddr_in cliaddr;
socklen_t cliaddrlen = sizeof(cliaddr);
int n = recvfrom(handle->receiveSockFd, buf->b, sizeof(buf->b), MSG_TRUNC,
(struct sockaddr *) &cliaddr, &cliaddrlen);
logmsg(LOG_INFO, "received %d octets from %d.%d.%d.%d",
n,
(cliaddr.sin_addr.s_addr & 0x0ff),
((cliaddr.sin_addr.s_addr >> 8) & 0x0ff),
((cliaddr.sin_addr.s_addr >> 16) & 0x0ff),
((cliaddr.sin_addr.s_addr >> 24) & 0x0ff));
if (n != sizeof(buf->b)) {
logmsg(LOG_INFO, "Illegal packet size: %d", n);
return -1;
}
t_device *device = findDevice(handle->configHandle, buf->s.deviceId);
const char *sharedSecret = device->sharedSecret;
uint8_t receivedHash[SHA256_BLOCK_SIZE];
memcpy(receivedHash, buf->s.hash, SHA256_BLOCK_SIZE);
memcpy(buf->s.hash, sharedSecret, SHA256_BLOCK_SIZE);
SHA256_CTX ctx;
uint8_t calculatedHash[SHA256_BLOCK_SIZE];
sha256_init(&ctx);
sha256_update(&ctx, buf->b, sizeof(buf->b));
sha256_final(&ctx, calculatedHash);
if (memcmp(receivedHash, calculatedHash, SHA256_BLOCK_SIZE) != 0) {
logmsg(LOG_INFO, "Invalid hash in msg for device %s", buf->s.deviceId);
return -5;
}
return 0;
}
int initForwarder(t_configHandle *configHandle, t_forwarderHandle *handle) {
handle->configHandle = configHandle;
handle->influxUser = NULL;
handle->influxPass = NULL;
handle->influxServer = NULL;
handle->influxDatabase = NULL;
handle->influxMeasurement = NULL;
config_lookup_string(&(configHandle->cfg), "influxUser", &(handle->influxUser));
config_lookup_string(&(configHandle->cfg), "influxPass", &(handle->influxPass));
config_lookup_string(&(configHandle->cfg), "influxServer", &(handle->influxServer));
config_lookup_string(&(configHandle->cfg), "influxDatabase", &(handle->influxDatabase));
config_lookup_string(&(configHandle->cfg), "influxMeasurement", &(handle->influxMeasurement));
int influxPort = 8086;
config_lookup_int(&(configHandle->cfg), "influxPort", &influxPort);
if (influxPort < 1 || influxPort > 65535) {
logmsg(LOG_ERR, "illegal influx port configured");
return -2;
}
handle->influxPort = influxPort;
if (! handle->influxServer) {
logmsg(LOG_ERR, "no influxServer configured");
return -1;
}
if (! handle->influxDatabase) {
logmsg(LOG_ERR, "no influxDatabase configured");
return -2;
}
if (! handle->influxMeasurement) {
logmsg(LOG_ERR, "no influxMeasurement configured");
return -3;
}
int res = snprintf(handle->influxUrl, sizeof(handle->influxUrl),
"http://%s:%d/write?db=%s&precision=s",
handle->influxServer, handle->influxPort, handle->influxDatabase);
if (res > sizeof(handle->influxUrl)) {
logmsg(LOG_ERR, "influxUrl has not enough space");
return -4;
}
logmsg(LOG_INFO, "influxUrl is %s", handle->influxUrl);
return 0;
}
void deinitForwarder(t_forwarderHandle *handle) {
}
int httpPostRequest(char *url, const char *user, const char *pass, char *payload) {
CURL *curl = curl_easy_init();
if (! curl) {
logmsg(LOG_ERR, "error instantiating curl");
return -1;
}
curl_easy_setopt(curl, CURLOPT_URL, url);
if (user && pass) {
curl_easy_setopt(curl, CURLOPT_HTTPAUTH, CURLAUTH_DIGEST);
curl_easy_setopt(curl, CURLOPT_USERNAME, user);
curl_easy_setopt(curl, CURLOPT_PASSWORD, pass);
}
curl_easy_setopt(curl, CURLOPT_POSTFIELDS, payload);
CURLcode res = curl_easy_perform(curl);
if (res != CURLE_OK) {
logmsg(LOG_ERR, "post request failed: %s", curl_easy_strerror(res));
return -2;
}
curl_easy_cleanup(curl);
return 0;
}
int forwardMinuteBuffer(t_forwarderHandle *handle, t_minuteBuffer *buf) {
logmsg(LOG_INFO, "D: %s, R: %u, P: %u, W: %u, V: %08x",
buf->s.deviceId, buf->s.totalRunningHours, buf->s.totalPowercycles, buf->s.totalWatchdogResets,
buf->s.version);
t_device *device = findDevice(handle->configHandle, buf->s.deviceId);
const char *location = device->location;
for (uint8_t j = 0; j < SECONDS_PER_MINUTE; j++) {
uint64_t timestamp = buf->s.timestamp + j;
logmsg(LOG_DEBUG, "Time: %lu, Frequency: %u", timestamp, buf->s.frequency[j]);
int frequency_before_point = buf->s.frequency[j] / 1000;
int frequency_behind_point = buf->s.frequency[j] - (frequency_before_point * 1000);
char payload[256];
int res = snprintf(payload, sizeof(payload),
"%s,valid=1,location=%s,host=%s freq=%d.%03d"
#ifdef OpenBSD
" %llu"
#else
" %lu"
#endif
"",
handle->influxMeasurement, location, buf->s.deviceId,
frequency_before_point, frequency_behind_point,
timestamp);
if (res > sizeof(payload)) {
logmsg(LOG_ERR, "payload buffer to small");
return -1;
}
logmsg(LOG_DEBUG, "Payload: %s", payload);
res = httpPostRequest(handle->influxUrl, handle->influxUser, handle->influxPass, payload);
if (res == 0) {
logmsg(LOG_DEBUG, "Successfully sent to InfluxDB");
}
}
logmsg(LOG_INFO, "Successfully sent whole minute to InfluxDB");
return 0;
}
void usage() {
printf("sinkserver for mainsfrequency counter\n");
printf("https://home.hottis.de/gitlab/wolutator/mains-frequency-counter-stm32\n");
printf("Version: " VERSION "\n");
printf("\nUsage\n");
printf(" -f FILENAME R..... Config file to be used\n");
printf(" -v ............... Verbose, writes all logging on stdout too\n");
printf(" -s FACILITY ...... Sets syslog facility, only LOCAL[0..7]\n");
printf(" USER and DAEMON are supported\n");
printf(" -n USER .......... If started as root drop privileges and become\n");
printf(" USER\n");
printf(" -b ............... fork into background\n");
printf(" -h ............... This help\n");
}
int main(int argc, char **argv) {
t_configHandle configHandle;
t_forwarderHandle forwarderHandle;
t_receiverHandle receiverHandle;
const char *configFilename = DEFAULT_CONFIG_FILENAME;
const char *dropPrivilegesToUser = NULL;
bool doFork = false;
int c;
while ((c = getopt(argc, argv, "f:vs:hn:b")) != -1) {
switch (c) {
case 'f':
configFilename = strdup(optarg);
break;
case 'v':
verbose = true;
break;
case 's':
setfacility(optarg);
break;
case 'n':
dropPrivilegesToUser = strdup(optarg);
break;
case 'b':
doFork = true;
break;
case 'h':
usage();
exit(0);
break;
}
}
if ((getuid() == 0) && (dropPrivilegesToUser != NULL)) {
logmsg(LOG_INFO, "dropping root privileges, become %s", dropPrivilegesToUser);
struct passwd *userEntry = getpwnam(dropPrivilegesToUser);
if (userEntry == NULL) {
logmsg(LOG_ERR, "can not find entry for user %s", dropPrivilegesToUser);
exit(1);
}
if (setuid(userEntry->pw_uid) != 0) {
logmsg(LOG_ERR, "unable to drop root privileges to %d", userEntry->pw_uid);
exit(2);
}
}
if (0 != initConfig(configFilename, &configHandle)) {
logmsg(LOG_ERR, "error when reading configuration");
exit(3);
}
if (doFork) {
int pid = fork();
if (pid == -1) {
logmsg(LOG_ERR, "error when forking into background: %d", errno);
exit(4);
}
if (pid != 0) {
logmsg(LOG_INFO, "successfully forking into background, child's pid is %d", pid);
exit(0);
}
}
if (0 != initReceiver(&configHandle, &receiverHandle)) {
logmsg(LOG_ERR, "error when initializing receiver");
exit(5);
}
if (0 != initForwarder(&configHandle, &forwarderHandle)) {
logmsg(LOG_ERR, "error when initializing forwarder");
exit(6);
}
while (1) {
t_minuteBuffer buf;
if (receiveAndVerifyMinuteBuffer(&receiverHandle, &buf) < 0) {
logmsg(LOG_ERR, "error in receiveAndVerify");
continue;
}
if (forwardMinuteBuffer(&forwarderHandle, &buf) < 0) {
logmsg(LOG_ERR, "error in send");
}
}
deinitForwarder(&forwarderHandle);
deinitReceiver(&receiverHandle);
deinitConfig(&configHandle);
}

View File

@ -1,18 +0,0 @@
// influxUser = "";
// influxPass = "";
influxServer = "172.16.10.16";
influxPort = 8086;
influxDatabase = "smarthome2";
influxMeasurement = "mainsfrequency";
receivePort = 20169;
devices = (
{
deviceId = "MainsCnt01";
// sharedSecret must have exactly 31 characters
sharedSecret = "Uj6*uKDp@8Kvfa4g5eRMLUfVsSuqjxW";
// location must neither contains spaces nor commas or any other URL-special characters
location = "Essen_DE";
}
);

2
tools/ENV.tmpl Normal file
View File

@ -0,0 +1,2 @@
export PRIVATETOKEN=privateToken

27
tools/release.sh Executable file
View File

@ -0,0 +1,27 @@
#!/bin/bash
RELEASENAME=$1
RELEASETAG=$2
DESCRIPTION=$3
if [ "$RELEASENAME" = "" -o "$RELEASETAG" = "" -o "$DESCRIPTION" = "" ]; then
echo "release.sh RELEASENAME RELEASETAG DESCRIPTION"
exit 1
fi
RELEASETAGTARGET=`git rev-parse --short=8 HEAD`
gitlabreleaseuploader.py \
--privateToken $PRIVATETOKEN \
--projectId 128 \
--projectUrl https://home.hottis.de/gitlab/wolutator/mains-frequency-counter-stm32 \
--releaseName "$RELEASENAME" \
--createRelease \
--releaseTag $RELEASETAG \
--releaseTagTarget $RELEASETAGTARGET \
--createReleaseTag \
--description "$DESCRIPTION" \
--instanceUrl https://home.hottis.de/gitlab \
--verbose \
--file cube/build/cube.elf