Compare commits

...

2 Commits

Author SHA1 Message Date
BWS Systems
d014240fba Update handling of https info on restart if failure 2019-07-25 13:20:43 -05:00
BWS Systems
5c2d30e24b a few fixes and trying to handle secure https fail on start 2019-07-24 16:10:59 -05:00
8 changed files with 70 additions and 21 deletions

View File

@@ -5,7 +5,7 @@
<groupId>com.bwssystems.HABridge</groupId> <groupId>com.bwssystems.HABridge</groupId>
<artifactId>ha-bridge</artifactId> <artifactId>ha-bridge</artifactId>
<version>5.3.0RC12</version> <version>5.3.0RC13</version>
<packaging>jar</packaging> <packaging>jar</packaging>
<name>HA Bridge</name> <name>HA Bridge</name>

View File

@@ -377,6 +377,13 @@ public class BridgeSecurity {
return newUser; return newUser;
} }
public void removeHttpsSettings() {
securityDescriptor.setUseHttps(false);
securityDescriptor.setKeyfilePassword(null);
securityDescriptor.setKeyfilePath(null);
setSettingsChanged(true);
}
public void removeTestUsers() { public void removeTestUsers() {
if (securityDescriptor.getWhitelist() != null) { if (securityDescriptor.getWhitelist() != null) {
Object anUser = securityDescriptor.getWhitelist().remove(DEPRACATED_INTERNAL_USER); Object anUser = securityDescriptor.getWhitelist().remove(DEPRACATED_INTERNAL_USER);

View File

@@ -15,6 +15,7 @@ import com.bwssystems.HABridge.upnp.UpnpSettingsResource;
import com.bwssystems.HABridge.util.UDPDatagramSender; import com.bwssystems.HABridge.util.UDPDatagramSender;
public class HABridge { public class HABridge {
private static SystemControl theSystem;
/* /*
* This program is based on the work of armzilla from this github repository: * This program is based on the work of armzilla from this github repository:
@@ -39,7 +40,6 @@ public class HABridge {
UDPDatagramSender udpSender; UDPDatagramSender udpSender;
UpnpSettingsResource theSettingResponder; UpnpSettingsResource theSettingResponder;
UpnpListener theUpnpListener; UpnpListener theUpnpListener;
SystemControl theSystem;
BridgeSettings bridgeSettings; BridgeSettings bridgeSettings;
Version theVersion; Version theVersion;
@SuppressWarnings("unused") @SuppressWarnings("unused")
@@ -154,7 +154,13 @@ public class HABridge {
private static void theExceptionHandler(Exception e, Integer thePort) { private static void theExceptionHandler(Exception e, Integer thePort) {
Logger log = LoggerFactory.getLogger(HABridge.class); Logger log = LoggerFactory.getLogger(HABridge.class);
if(e.getMessage().equals("no valid keystore") || e.getMessage().equals("keystore password was incorrect")) {
log.error("Https settings have been removed as {}. Restart system manually after this process exits....", e.getMessage());
log.warn(theSystem.removeHttpsSettings());
}
else {
log.error("Could not start ha-bridge webservice on port [{}] due to: {}", thePort, e.getMessage()); log.error("Could not start ha-bridge webservice on port [{}] due to: {}", thePort, e.getMessage());
System.exit(0); log.warn(theSystem.stop());
}
} }
} }

View File

@@ -599,6 +599,11 @@ public class SystemControl {
} }
} }
public String removeHttpsSettings() {
bridgeSettings.getBridgeSecurity().removeHttpsSettings();
return stop();
}
public String reinit() { public String reinit() {
bridgeSettings.getBridgeControl().setReinit(true); bridgeSettings.getBridgeControl().setReinit(true);
pingListener(); pingListener();

View File

@@ -201,11 +201,15 @@ public class GroupRepository extends BackupHandler {
private String repositoryReader(Path filePath) { private String repositoryReader(Path filePath) {
String content = null; String content = null;
if(Files.notExists(filePath) || !Files.isReadable(filePath)){ if(Files.notExists(filePath)){
log.warn("Error reading the file: " + filePath + " - Does not exist or is not readable. continuing..."); log.debug("Error, the file: " + filePath + " - does not exist. continuing...");
return null; return null;
} }
if(!Files.isReadable(filePath)){
log.warn("Error, the file: " + filePath + " - is not readable. continuing...");
return null;
}
try { try {
content = new String(Files.readAllBytes(filePath)); content = new String(Files.readAllBytes(filePath));

View File

@@ -133,6 +133,11 @@ public class UpnpListener {
} }
public boolean startListening() { public boolean startListening() {
if (bridgeControl.isReinit() || bridgeControl.isStop()) {
log.warn("UPNP Listener exiting as reinit or stop requested....");
return false;
}
log.info("UPNP Discovery Listener starting...."); log.info("UPNP Discovery Listener starting....");
Enumeration<NetworkInterface> ifs = null; Enumeration<NetworkInterface> ifs = null;
@@ -206,6 +211,11 @@ public class UpnpListener {
} }
} }
if (bridgeControl.isReinit() || bridgeControl.isStop()) {
log.warn("UPNP Listener exiting as reinit or stop requested....");
return false;
}
log.info("UPNP Discovery Listener running and ready...."); log.info("UPNP Discovery Listener running and ready....");
boolean loopControl = true; boolean loopControl = true;
boolean error = false; boolean error = false;

View File

@@ -367,6 +367,18 @@ app.service('bridgeService', function ($rootScope, $http, $base64, $location, ng
}; };
this.changeSecuritySettings = function (useLinkButton, secureHueApi, execGarden, useHttps, keyfilePath, keyfilePassword) { this.changeSecuritySettings = function (useLinkButton, secureHueApi, execGarden, useHttps, keyfilePath, keyfilePassword) {
if(useHttps) {
if(!keyfilePassword || keyfilePassword.length == 0 || !keyfilePassword.trim()) {
self.displayErrorMessage("Use HTTPS - ", "Key File Password cannot be empty.");
return;
}
if(!keyfilePath || keyfilePath.length == 0 || !keyfilePath.trim()) {
self.displayErrorMessage("Use HTTPS - ", "Key File Path cannot be empty.");
return;
}
}
var newSecurityInfo = {}; var newSecurityInfo = {};
newSecurityInfo = { newSecurityInfo = {
useLinkButton: useLinkButton, useLinkButton: useLinkButton,
@@ -376,6 +388,7 @@ app.service('bridgeService', function ($rootScope, $http, $base64, $location, ng
keyfilePath: keyfilePath, keyfilePath: keyfilePath,
keyfilePassword: keyfilePassword keyfilePassword: keyfilePassword
}; };
return $http.post(this.state.systemsbase + "/changesecurityinfo", newSecurityInfo).then( return $http.post(this.state.systemsbase + "/changesecurityinfo", newSecurityInfo).then(
function (response) { function (response) {
self.state.securityInfo = response.data; self.state.securityInfo = response.data;
@@ -2082,9 +2095,11 @@ app.controller('SystemController', function ($scope, $location, bridgeService, n
} }
var othertypes = []; var othertypes = [];
othertypes = newhomegenieothertypes.split(",");
var theModuleTypes = [];
var count = 0; var count = 0;
var theModuleTypes = [];
if(newhomegenieothertypes && newhomegenieothertypes.trim() && newhomegenieothertypes.length > 0) {
othertypes = newhomegenieothertypes.split(",");
if (othertypes.length > 0) { if (othertypes.length > 0) {
for (var i = 0; i < othertypes.length; i++) { for (var i = 0; i < othertypes.length; i++) {
var aType = othertypes[i].trim(); var aType = othertypes[i].trim();
@@ -2097,6 +2112,8 @@ app.controller('SystemController', function ($scope, $location, bridgeService, n
} }
} }
} }
}
var theExtension; var theExtension;
if (count == 0) { if (count == 0) {
theExtension = undefined; theExtension = undefined;

View File

@@ -761,7 +761,7 @@
<td><input type="checkbox" ng-model="newhomegeniesecure" ng-true-value=true <td><input type="checkbox" ng-model="newhomegeniesecure" ng-true-value=true
ng-false-value=false></td> ng-false-value=false></td>
<td><button class="btn btn-success" type="submit" <td><button class="btn btn-success" type="submit"
ng-click="addHomeGenietoSettings(newhomegeniename, newhomegenieip, newhomegenieport, newshomegenieusername, newhomegeniepassword, newhomegeniewebhook, newhomegeniesecure, newhomegenieothertypes)">Add</button> ng-click="addHomeGenietoSettings(newhomegeniename, newhomegenieip, newhomegenieport, newhomegenieusername, newhomegeniepassword, newhomegeniewebhook, newhomegeniesecure, newhomegenieothertypes)">Add</button>
</td> </td>
</tr> </tr>
</table> </table>