This repository has been archived on 2024-10-30. You can view files and clone it, but cannot push or open issues or pull requests.
esp-firewall/SourceCode/arduino/lib/Firewall/Firewall.cpp

376 lines
12 KiB
C++
Raw Normal View History

2022-04-10 20:46:54 +02:00
#include "Firewall.h"
2022-04-11 11:47:50 +02:00
ESPFirewall::ESPFirewall(int port)
2022-04-10 20:46:54 +02:00
{
2022-04-18 13:11:02 +02:00
this->setup_eeprom();
2022-04-18 22:56:30 +02:00
this->setup_certificate();
this->firewall_api = new httpsserver::HTTPSServer(this->certificate, port);
2022-04-11 11:47:50 +02:00
this->setup_routing();
2022-04-10 20:46:54 +02:00
}
2022-04-18 22:56:30 +02:00
void ESPFirewall::setup_certificate()
{
this->certificate = new httpsserver::SSLCert();
int createCertResult = httpsserver::createSelfSignedCert(
*this->certificate,
httpsserver::KEYSIZE_2048,
"CN=myesp32.local,O=FancyCompany,C=DE",
"20190101000000",
"20300101000000");
if (createCertResult != 0)
{
log_e("Cerating certificate failed. Error Code = 0x%02X, check SSLCert.hpp for details", createCertResult);
while (true)
delay(500);
}
log_i("Creating the certificate was successful");
}
String ESPFirewall::protocol_to_string(firewall_protocol_t &protocol)
{
switch (protocol)
{
case FW_TCP:
return "TCP";
case FW_UDP:
return "UDP";
default:
return "ALL";
}
}
2022-04-18 22:56:30 +02:00
firewall_protocol_t ESPFirewall::string_to_protocol(std::string &protocol)
{
2022-04-18 22:56:30 +02:00
if (protocol.compare("TCP") == 0)
return FW_TCP;
2022-04-18 22:56:30 +02:00
else if (protocol.compare("UDP") == 0)
return FW_UDP;
else
return FW_ALL;
}
String ESPFirewall::target_to_string(firewall_target_t &target)
{
switch (target)
{
case FW_REJECT:
return "REJECT";
case FW_DROP:
return "DROP";
default:
return "ACCEPT";
}
}
2022-04-18 22:56:30 +02:00
firewall_target_t ESPFirewall::string_to_target(std::string &target)
{
2022-04-18 22:56:30 +02:00
if (target.compare("REJECT") == 0)
return FW_REJECT;
2022-04-18 22:56:30 +02:00
else if (target.compare("DROP") == 0)
return FW_DROP;
else
return FW_ACCEPT;
}
2022-04-18 13:11:02 +02:00
void ESPFirewall::setup_eeprom()
2022-04-18 11:16:01 +02:00
{
2022-04-18 13:11:02 +02:00
EEPROM.begin(this->eeprom_size);
this->amount_of_rules = EEPROM.read(this->eeprom_settings_head);
uint8_t security_number = EEPROM.read(this->eeprom_settings_head + 1);
if (this->amount_of_rules > 50 || security_number != this->security_number)
{
this->amount_of_rules = 0;
EEPROM.write(this->eeprom_settings_head, this->amount_of_rules);
EEPROM.write(this->eeprom_settings_head + 1, this->security_number);
EEPROM.commit();
}
log_i("Amount of existing Rules %i", this->amount_of_rules);
this->eeprom_read_firewall_rules();
2022-04-18 11:16:01 +02:00
}
2022-04-18 13:11:02 +02:00
void ESPFirewall::eeprom_write_firewall_rule(firewall_rule_t *rule_ptr)
{
2022-04-18 17:35:52 +02:00
EEPROM.write(this->eeprom_settings_head, this->amount_of_rules);
2022-04-18 13:11:02 +02:00
EEPROM.writeString(this->eeprom_rules_head, rule_ptr->source);
this->eeprom_rules_head += IP4ADDR_STRLEN_MAX;
EEPROM.writeString(this->eeprom_rules_head, rule_ptr->destination);
this->eeprom_rules_head += IP4ADDR_STRLEN_MAX;
2022-04-18 17:35:52 +02:00
EEPROM.write(this->eeprom_rules_head, rule_ptr->protocol);
2022-04-18 13:11:02 +02:00
this->eeprom_rules_head += sizeof(firewall_protocol_t);
2022-04-18 17:35:52 +02:00
EEPROM.write(this->eeprom_rules_head, rule_ptr->target);
2022-04-18 13:11:02 +02:00
this->eeprom_rules_head += sizeof(firewall_target_t);
EEPROM.commit();
}
void ESPFirewall::eeprom_write_firewall_rules()
{
this->eeprom_rules_head = eeprom_start_firewall_rules;
firewall_rule_t *rule_ptr = this->head;
while (rule_ptr != NULL)
{
this->eeprom_write_firewall_rule(rule_ptr);
rule_ptr = rule_ptr->next;
}
}
void ESPFirewall::eeprom_read_firewall_rule(uint8_t &eeprom_address, uint8_t &rule_nr)
2022-04-18 13:11:02 +02:00
{
firewall_rule_t *rule_ptr = (firewall_rule_t *)malloc(sizeof(firewall_rule_t));
rule_ptr->key = rule_nr;
strcpy(rule_ptr->source, EEPROM.readString(eeprom_address).c_str());
2022-04-18 13:11:02 +02:00
eeprom_address += IP4ADDR_STRLEN_MAX;
strcpy(rule_ptr->destination, EEPROM.readString(eeprom_address).c_str());
2022-04-18 13:11:02 +02:00
eeprom_address += IP4ADDR_STRLEN_MAX;
rule_ptr->protocol = static_cast<firewall_protocol_t>(EEPROM.read(eeprom_address));
2022-04-18 17:35:52 +02:00
eeprom_address += sizeof(firewall_protocol_t);
rule_ptr->target = static_cast<firewall_target_t>(EEPROM.read(eeprom_address));
2022-04-18 17:35:52 +02:00
eeprom_address += sizeof(firewall_target_t);
2022-04-18 17:55:34 +02:00
add_rule_to_firewall(rule_ptr);
log_i("%s, %s, %s, %s",
rule_ptr->source,
rule_ptr->destination,
2022-04-18 17:55:34 +02:00
protocol_to_string(rule_ptr->protocol),
target_to_string(rule_ptr->target));
}
void ESPFirewall::eeprom_read_firewall_rules()
{
uint8_t eeprom_address = eeprom_start_firewall_rules;
for (uint8_t i = 1; i <= this->amount_of_rules; i++)
{
eeprom_read_firewall_rule(eeprom_address, i);
}
2022-04-18 11:16:01 +02:00
}
2022-04-18 17:55:34 +02:00
void ESPFirewall::add_rule_to_firewall(firewall_rule_t *rule_ptr)
2022-04-11 11:47:50 +02:00
{
firewall_rule_t *temp;
2022-04-18 17:55:34 +02:00
if (this->head == NULL)
2022-04-11 11:47:50 +02:00
{
2022-04-18 17:55:34 +02:00
this->head = rule_ptr;
rule_ptr->next = NULL;
2022-04-11 17:02:58 +02:00
return;
2022-04-11 11:47:50 +02:00
}
2022-04-18 17:55:34 +02:00
temp = this->head;
2022-04-11 11:47:50 +02:00
while (temp->next != NULL)
{
temp = temp->next;
}
2022-04-18 17:55:34 +02:00
temp->next = rule_ptr;
rule_ptr->next = NULL;
2022-04-11 17:02:58 +02:00
return;
2022-04-11 11:47:50 +02:00
}
firewall_rule_t *ESPFirewall::get_rule_from_firewall(uint8_t key)
2022-04-11 13:49:48 +02:00
{
2022-04-11 21:27:27 +02:00
firewall_rule_t *rule_ptr = this->head;
2022-04-18 17:55:34 +02:00
if (this->head == NULL)
2022-04-11 13:49:48 +02:00
{
2022-04-11 21:27:27 +02:00
return NULL;
}
while (rule_ptr->key != key)
{
if (rule_ptr->next == NULL)
{
return NULL;
}
else
{
rule_ptr = rule_ptr->next;
}
2022-04-11 17:02:58 +02:00
}
2022-04-11 21:27:27 +02:00
return rule_ptr;
}
bool ESPFirewall::delete_rule_from_firewall(uint8_t key)
2022-04-11 22:17:55 +02:00
{
2022-04-18 13:11:02 +02:00
if (this->head == NULL)
2022-04-11 22:17:55 +02:00
{
return false;
}
firewall_rule_t *current_rule_ptr = this->head;
firewall_rule_t *previous_rule_ptr = NULL;
firewall_rule_t *temp = NULL;
while (current_rule_ptr->key != key)
{
if (current_rule_ptr->next == NULL)
{
return false;
}
else
{
previous_rule_ptr = current_rule_ptr;
current_rule_ptr = current_rule_ptr->next;
}
}
2022-04-18 13:11:02 +02:00
if (current_rule_ptr == this->head)
2022-04-11 22:17:55 +02:00
{
2022-04-18 13:11:02 +02:00
this->head = head->next;
temp = this->head;
2022-04-11 22:17:55 +02:00
}
else
{
previous_rule_ptr->next = current_rule_ptr->next;
temp = previous_rule_ptr->next;
}
while (temp != NULL)
{
temp->key--;
temp = temp->next;
}
free(current_rule_ptr);
2022-04-18 13:11:02 +02:00
this->amount_of_rules--;
this->eeprom_write_firewall_rules();
2022-04-11 22:17:55 +02:00
return true;
}
2022-04-11 21:27:27 +02:00
void ESPFirewall::setup_routing()
{
2022-04-18 22:56:30 +02:00
httpsserver::ResourceNode *firewall_get = new httpsserver::ResourceNode("/api/v1/firewall", "GET", std::bind(&ESPFirewall::get_firewall_rule_handler, this, std::placeholders::_1));
this->firewall_api->registerNode(firewall_get);
// this->firewall_api->on("^\\/api/v1/firewall\\/([0-9]+)$", HTTP_GET, std::bind(&ESPFirewall::get_firewall_rule_handler, this, std::placeholders::_1));
// this->firewall_api->on("/api/v1/firewall", HTTP_GET, std::bind(&ESPFirewall::get_firewall_rules_handler, this, std::placeholders::_1));
// this->firewall_api->on("/api/v1/firewall", HTTP_POST, std::bind(&ESPFirewall::post_firewall_handler, this, std::placeholders::_1));
// this->firewall_api->on("^\\/api/v1/firewall\\/([0-9]+)$", HTTP_DELETE, std::bind(&ESPFirewall::delete_firewall_handler, this, std::placeholders::_1));
2022-04-18 22:56:30 +02:00
// this->firewall_api->on("/api/v1/device/restart", HTTP_GET, std::bind(&ESPFirewall::restart_device_handler, this, std::placeholders::_1));
// this->firewall_api->onNotFound(std::bind(&ESPFirewall::not_found, this, std::placeholders::_1));
// this->firewall_api->begin();
2022-04-11 21:27:27 +02:00
}
2022-04-18 22:56:30 +02:00
void ESPFirewall::json_generic_response(httpsserver::HTTPResponse *response, String serialized, int response_code)
2022-04-11 21:27:27 +02:00
{
2022-04-18 22:56:30 +02:00
response->setHeader("Content-Type", "application/json");
response->setStatusCode(response_code);
response->print(serialized);
}
void ESPFirewall::json_message_response(httpsserver::HTTPResponse *response, String message, int response_code)
{
response->setHeader("Content-Type", "application/json");
response->setStatusCode(response_code);
StaticJsonDocument<JSON_OBJECT_SIZE(1)> json;
String serialized;
2022-04-11 21:27:27 +02:00
json["message"] = message;
2022-04-18 22:56:30 +02:00
serializeJson(json, serialized);
response->print(serialized);
2022-04-11 17:02:58 +02:00
}
2022-04-11 21:27:27 +02:00
String ESPFirewall::construct_json_firewall_rule(firewall_rule_t *rule_ptr)
{
2022-04-18 22:56:30 +02:00
StaticJsonDocument<JSON_OBJECT_SIZE(5)> doc;
2022-04-11 21:27:27 +02:00
doc["key"] = rule_ptr->key;
doc["source"] = rule_ptr->source;
doc["destination"] = rule_ptr->destination;
doc["protocol"] = protocol_to_string(rule_ptr->protocol);
doc["target"] = target_to_string(rule_ptr->target);
String response;
2022-04-11 21:27:27 +02:00
serializeJson(doc, response);
return response;
}
2022-04-11 21:27:27 +02:00
String ESPFirewall::construct_json_firewall()
{
firewall_rule_t *rule_ptr = this->head;
2022-04-18 18:45:37 +02:00
// Size for approx. 12 Rules
2022-04-11 21:27:27 +02:00
StaticJsonDocument<2048> doc;
String response;
doc["amount_of_rules"] = this->amount_of_rules;
2022-04-11 21:27:27 +02:00
JsonArray rules = doc.createNestedArray("rules");
while (rule_ptr != NULL)
{
2022-04-11 21:27:27 +02:00
JsonObject rule = rules.createNestedObject();
rule["key"] = rule_ptr->key;
rule["source"] = rule_ptr->source;
rule["destination"] = rule_ptr->destination;
rule["protocol"] = protocol_to_string(rule_ptr->protocol);
rule["target"] = target_to_string(rule_ptr->target);
2022-04-11 21:27:27 +02:00
rule_ptr = rule_ptr->next;
}
2022-04-11 21:27:27 +02:00
serializeJson(doc, response);
return response;
}
2022-04-18 22:56:30 +02:00
void ESPFirewall::not_found(httpsserver::HTTPRequest *request, httpsserver::HTTPResponse *response)
2022-04-11 21:27:27 +02:00
{
2022-04-18 22:56:30 +02:00
this->json_message_response(response, "not found", 404);
2022-04-11 21:27:27 +02:00
}
2022-04-18 22:56:30 +02:00
void ESPFirewall::restart_device_handler(httpsserver::HTTPRequest *request, httpsserver::HTTPResponse *response)
{
2022-04-18 22:56:30 +02:00
this->json_message_response(response, "restarting device in 2 sec", 200);
sleep(2000);
esp_restart();
}
2022-04-18 22:56:30 +02:00
void ESPFirewall::get_firewall_rule_handler(httpsserver::HTTPRequest *request, httpsserver::HTTPResponse *response)
2022-04-11 21:27:27 +02:00
{
2022-04-18 22:56:30 +02:00
httpsserver::ResourceParameters *params = request->getParams();
int rule_number = atoi(params->getPathParameter(0).c_str());
2022-04-18 18:45:37 +02:00
firewall_rule_t *rule_ptr = this->get_rule_from_firewall(rule_number);
2022-04-11 21:27:27 +02:00
if (rule_ptr == NULL)
{
2022-04-18 22:56:30 +02:00
this->json_message_response(response, "rule not found", 404);
}
2022-04-11 21:27:27 +02:00
else
{
2022-04-18 22:56:30 +02:00
response->setHeader("Content-Type", "application/json");
response->setStatusCode(200);
response->print(this->construct_json_firewall_rule(rule_ptr));
2022-04-11 21:27:27 +02:00
}
}
2022-04-18 22:56:30 +02:00
void ESPFirewall::get_firewall_rules_handler(httpsserver::HTTPRequest *request, httpsserver::HTTPResponse *response)
2022-04-11 21:27:27 +02:00
{
2022-04-18 22:56:30 +02:00
this->json_generic_response(response, this->construct_json_firewall(), 200);
}
2022-04-18 22:56:30 +02:00
bool ESPFirewall::request_has_firewall_parameter(httpsserver::ResourceParameters *params)
2022-04-11 22:17:55 +02:00
{
2022-04-18 22:56:30 +02:00
return params->isQueryParameterSet("source") || params->isQueryParameterSet("destination") || params->isQueryParameterSet("protocol") || params->isQueryParameterSet("target");
2022-04-11 22:17:55 +02:00
}
2022-04-18 22:56:30 +02:00
void ESPFirewall::post_firewall_handler(httpsserver::HTTPRequest *request, httpsserver::HTTPResponse *response)
2022-04-11 17:02:58 +02:00
{
2022-04-18 22:56:30 +02:00
httpsserver::ResourceParameters *params = request->getParams();
if (request_has_firewall_parameter(params))
2022-04-11 17:02:58 +02:00
{
2022-04-11 22:17:55 +02:00
firewall_rule_t *rule_ptr = (firewall_rule_t *)malloc(sizeof(firewall_rule_t));
rule_ptr->key = ++amount_of_rules;
2022-04-11 18:06:21 +02:00
2022-04-11 22:17:55 +02:00
// carefully copying c-string that is shorter then the destination char-array length
2022-04-18 22:56:30 +02:00
std::string source;
params->getQueryParameter("source", source);
2022-04-11 22:17:55 +02:00
strcpy(rule_ptr->source, source.length() <= IP4ADDR_STRLEN_MAX ? source.c_str() : "");
2022-04-18 22:56:30 +02:00
std::string destination;
params->getQueryParameter("destination", destination);
2022-04-11 22:17:55 +02:00
strcpy(rule_ptr->destination, destination.length() <= IP4ADDR_STRLEN_MAX ? destination.c_str() : "");
2022-04-18 22:56:30 +02:00
std::string protocol;
params->getQueryParameter("protocol", protocol);
rule_ptr->protocol = string_to_protocol(protocol);
2022-04-18 22:56:30 +02:00
std::string target;
params->getQueryParameter("target", target);
rule_ptr->target = string_to_target(target);
2022-04-11 18:06:21 +02:00
2022-04-18 18:45:37 +02:00
this->add_rule_to_firewall(rule_ptr);
this->eeprom_write_firewall_rule(rule_ptr);
2022-04-18 22:56:30 +02:00
this->json_generic_response(response, this->construct_json_firewall_rule(rule_ptr), 200);
2022-04-11 13:49:48 +02:00
}
else
{
2022-04-18 22:56:30 +02:00
this->json_message_response(response, "not enough parameter", 400);
2022-04-11 13:49:48 +02:00
}
2022-04-11 11:47:50 +02:00
}
2022-04-18 22:56:30 +02:00
void ESPFirewall::delete_firewall_handler(httpsserver::HTTPRequest *request, httpsserver::HTTPResponse *response)
2022-04-11 18:06:21 +02:00
{
2022-04-18 22:56:30 +02:00
httpsserver::ResourceParameters *params = request->getParams();
int rule_number = atoi(params->getPathParameter(0).c_str());
2022-04-18 18:45:37 +02:00
if (this->delete_rule_from_firewall(rule_number))
2022-04-11 22:17:55 +02:00
{
2022-04-18 22:56:30 +02:00
this->json_message_response(response, "firewall rule deleted", 200);
2022-04-11 22:17:55 +02:00
}
2022-04-18 22:56:30 +02:00
this->json_message_response(response, "cannot delete firewall rule", 500);
2022-04-11 17:02:58 +02:00
}