nymea-app/libmea-core/nymeaconnection.cpp

175 lines
6.0 KiB
C++

#include "nymeaconnection.h"
#include <QUrl>
#include <QDebug>
#include <QSslKey>
#include <QSettings>
#include "nymeainterface.h"
#include "tcpsocketinterface.h"
#include "websocketinterface.h"
NymeaConnection::NymeaConnection(QObject *parent) : QObject(parent)
{
NymeaInterface *iface = new TcpSocketInterface(this);
registerInterface(iface);
iface = new WebsocketInterface(this);
registerInterface(iface);
}
void NymeaConnection::connect(const QString &url)
{
if (connected()) {
qWarning() << "Already connected. Cannot connect multiple times";
return;
}
m_currentUrl = QUrl(url);
m_currentInterface = m_interfaces.value(m_currentUrl.scheme());
if (!m_currentInterface) {
qWarning() << "Cannot connect to urls of scheme" << m_currentUrl.scheme() << "Supported schemes are" << m_interfaces.keys();
return;
}
qDebug() << "Should connect to url" << m_currentUrl;
m_currentInterface->connect(m_currentUrl);
}
void NymeaConnection::disconnect()
{
if (!m_currentInterface || !m_currentInterface->isConnected()) {
qWarning() << "not connected, cannot disconnect";
return;
}
m_currentInterface->disconnect();
}
void NymeaConnection::acceptCertificate(const QString &url, const QByteArray &fingerprint)
{
QSettings settings;
settings.beginGroup("acceptedCertificates");
settings.setValue(QUrl(url).host(), fingerprint);
settings.endGroup();
}
bool NymeaConnection::isTrusted(const QString &url)
{
QSettings settings;
settings.beginGroup("acceptedCertificates");
return settings.contains(QUrl(url).host());
}
bool NymeaConnection::connected()
{
return m_currentInterface && m_currentInterface->isConnected();
}
QString NymeaConnection::url() const
{
return m_currentUrl.toString();
}
QString NymeaConnection::hostAddress() const
{
return m_currentUrl.host();
}
void NymeaConnection::sendData(const QByteArray &data)
{
if (connected()) {
// qDebug() << "sending data:" << data;
m_currentInterface->sendData(data);
} else {
qWarning() << "Not connected. Cannot send.";
}
}
void NymeaConnection::onSslErrors(const QList<QSslError> &errors)
{
qDebug() << "Connection: SSL errors:" << errors;
QList<QSslError> ignoredErrors;
foreach (const QSslError &error, errors) {
if (error.error() == QSslError::HostNameMismatch) {
qDebug() << "Ignoring host mismatch on certificate.";
ignoredErrors.append(error);
} else if (error.error() == QSslError::SelfSignedCertificate || error.error() == QSslError::CertificateUntrusted) {
qDebug() << "have a self signed certificate." << error.certificate() << error.certificate().issuerInfoAttributes();
QSettings settings;
settings.beginGroup("acceptedCertificates");
QByteArray storedFingerPrint = settings.value(m_currentUrl.host()).toByteArray();
settings.endGroup();
QByteArray certificateFingerprint;
QByteArray digest = error.certificate().digest(QCryptographicHash::Sha256);
for (int i = 0; i < digest.length(); i++) {
if (certificateFingerprint.length() > 0) {
certificateFingerprint.append(":");
}
certificateFingerprint.append(digest.mid(i,1).toHex().toUpper());
}
if (storedFingerPrint == certificateFingerprint) {
ignoredErrors.append(error);
} else {
QStringList info;
info << tr("Common Name:") << error.certificate().issuerInfo(QSslCertificate::CommonName);
info << tr("Oragnisation:") <<error.certificate().issuerInfo(QSslCertificate::Organization);
info << tr("Locality:") << error.certificate().issuerInfo(QSslCertificate::LocalityName);
info << tr("Oragnisational Unit:")<< error.certificate().issuerInfo(QSslCertificate::OrganizationalUnitName);
info << tr("Country:")<< error.certificate().issuerInfo(QSslCertificate::CountryName);
// info << tr("State:")<< error.certificate().issuerInfo(QSslCertificate::StateOrProvinceName);
// info << tr("Name Qualifier:")<< error.certificate().issuerInfo(QSslCertificate::DistinguishedNameQualifier);
// info << tr("Email:")<< error.certificate().issuerInfo(QSslCertificate::EmailAddress);
emit verifyConnectionCertificate(m_currentUrl.toString(), info, certificateFingerprint);
}
} else {
// Reject the connection on all other errors...
qDebug() << "SSL Error:" << error.errorString() << error.certificate();
}
}
m_currentInterface->ignoreSslErrors(ignoredErrors);
}
void NymeaConnection::onError(QAbstractSocket::SocketError error)
{
qWarning() << "Socket error" << error;
emit connectionError();
}
void NymeaConnection::onConnected()
{
if (m_currentInterface != sender()) {
qWarning() << "An inactive interface is emitting signals... ignoring.";
return;
}
qDebug() << "connected";
emit connectedChanged(true);
}
void NymeaConnection::onDisconnected()
{
if (m_currentInterface != sender()) {
qWarning() << "An inactive interface is emitting signals... ignoring.";
return;
}
m_currentInterface = nullptr;
qDebug() << "disconnected";
emit connectedChanged(false);
}
void NymeaConnection::registerInterface(NymeaInterface *iface)
{
QObject::connect(iface, &NymeaInterface::sslErrors, this, &NymeaConnection::onSslErrors);
QObject::connect(iface, &NymeaInterface::error, this, &NymeaConnection::onError);
QObject::connect(iface, &NymeaInterface::connected, this, &NymeaConnection::onConnected);
QObject::connect(iface, &NymeaInterface::disconnected, this, &NymeaConnection::onDisconnected);
// signal forwarding
QObject::connect(iface, &NymeaInterface::dataReady, this, &NymeaConnection::dataAvailable);
foreach (const QString &scheme, iface->supportedSchemes()) {
m_interfaces[scheme] = iface;
}
}