Compare commits
5 Commits
v0.9.0-rc.
...
ssl-connec
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
2632698008 | ||
|
|
a42ba8a8c6 | ||
|
|
210c02f0b9 | ||
|
|
a51ac03021 | ||
|
|
e6b726912a |
@@ -7,6 +7,14 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
||||
|
||||
## [unreleased]
|
||||
|
||||
## [0.9.0] - 2024-07-01
|
||||
|
||||
- fix exception in MODBUS timeout callback
|
||||
|
||||
## [0.9.0-RC1] - 2024-06-29
|
||||
|
||||
- add asyncio log and debug mode
|
||||
- stop the HTTP server on shutdown gracefully
|
||||
- Synchronize regular MODBUS commands with the status of the inverter to prevent the inverter from crashing due to
|
||||
unexpected packets. [#111](https://github.com/s-allius/tsun-gen3-proxy/issues/111)
|
||||
- GEN3: avoid sending MODBUS commands to the inverter during the inverter's reporting phase
|
||||
|
||||
@@ -45,7 +45,7 @@ ENV HOME=/home/$SERVICE_NAME
|
||||
# set the working directory in the container
|
||||
WORKDIR /home/$SERVICE_NAME
|
||||
|
||||
VOLUME ["/home/$SERVICE_NAME/log", "/home/$SERVICE_NAME/config"]
|
||||
VOLUME ["/home/$SERVICE_NAME/log", "/home/$SERVICE_NAME/config", "/home/$SERVICE_NAME/cert"]
|
||||
|
||||
# install the requirements from the wheels packages from the builder stage
|
||||
# and unistall python packages and alpine package manger to reduce attack surface
|
||||
@@ -64,7 +64,7 @@ COPY --chmod=0700 entrypoint.sh /root/entrypoint.sh
|
||||
COPY config .
|
||||
COPY src .
|
||||
RUN date > /build-date.txt
|
||||
EXPOSE 5005 8127 10000
|
||||
EXPOSE 5005 8127 10000 10443
|
||||
|
||||
# command to run on container start
|
||||
ENTRYPOINT ["/root/entrypoint.sh"]
|
||||
|
||||
@@ -108,6 +108,7 @@ class Modbus():
|
||||
def close(self):
|
||||
"""free the queue and erase the callback handlers"""
|
||||
logging.debug('Modbus close:')
|
||||
self.__stop_timer()
|
||||
self.rsp_handler = None
|
||||
self.snd_handler = None
|
||||
while not self.que.empty:
|
||||
@@ -252,6 +253,7 @@ class Modbus():
|
||||
# logging.debug(f'Modbus stop timer {self}')
|
||||
if self.tim:
|
||||
self.tim.cancel()
|
||||
self.tim = None
|
||||
|
||||
def __timeout_cb(self) -> None:
|
||||
'''Rsponse timeout handler retransmit pdu or send next pdu'''
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
import logging
|
||||
import asyncio
|
||||
import ssl
|
||||
import signal
|
||||
import os
|
||||
from asyncio import StreamReader, StreamWriter
|
||||
@@ -83,12 +84,17 @@ async def handle_client_v2(reader: StreamReader, writer: StreamWriter):
|
||||
await InverterG3P(reader, writer, addr).server_loop(addr)
|
||||
|
||||
|
||||
async def handle_shutdown(web_task):
|
||||
async def handle_client_v3(reader: StreamReader, writer: StreamWriter):
|
||||
'''Handles a new incoming connection and starts an async loop'''
|
||||
logging.info('Accept on port 10443')
|
||||
addr = writer.get_extra_info('peername')
|
||||
await InverterG3P(reader, writer, addr).server_loop(addr)
|
||||
|
||||
|
||||
async def handle_shutdown(loop, runner):
|
||||
'''Close all TCP connections and stop the event loop'''
|
||||
|
||||
logging.info('Shutdown due to SIGTERM')
|
||||
global proxy_is_up
|
||||
proxy_is_up = False
|
||||
|
||||
#
|
||||
# first, disc all open TCP connections gracefully
|
||||
@@ -116,7 +122,7 @@ async def handle_shutdown(web_task):
|
||||
await web_task
|
||||
|
||||
#
|
||||
# at last, start a coro for stopping the loop
|
||||
# at last, we stop the loop
|
||||
#
|
||||
logging.debug("Stop event loop")
|
||||
loop.stop()
|
||||
@@ -172,6 +178,40 @@ if __name__ == "__main__":
|
||||
#
|
||||
loop.create_task(asyncio.start_server(handle_client, '0.0.0.0', 5005))
|
||||
loop.create_task(asyncio.start_server(handle_client_v2, '0.0.0.0', 10000))
|
||||
|
||||
# https://crypto.stackexchange.com/questions/26591/tls-encryption-with-a-self-signed-pki-and-python-s-asyncio-module
|
||||
'''
|
||||
openssl genrsa -out -des3 ca.key.pem 2048
|
||||
openssl genrsa -out server.key.pem 2048
|
||||
openssl genrsa -out client.key.pem 2048
|
||||
|
||||
openssl req -x509 -new -nodes -key ca.key.pem -sha256 -days 365
|
||||
-out ca.cert.pem -subj /C=US/ST=CA/L=Somewhere/O=Someone/CN=FoobarCA
|
||||
|
||||
openssl req -new -sha256 -key server.key.pem
|
||||
-subj /C=US/ST=CA/L=Somewhere/O=Someone/CN=Foobar -out server.csr
|
||||
openssl x509 -req -in server.csr -CA ca.cert.pem -CAkey ca.key.pem
|
||||
-CAcreateserial -out server.cert.pem -days 365 -sha256
|
||||
|
||||
openssl req -new -sha256 -key client.key.pem
|
||||
-subj /C=US/ST=CA/L=Somewhere/O=Someone/CN=Foobar -out client.csr
|
||||
openssl x509 -req -in client.csr -CA ca.cert.pem -CAkey ca.key.pem
|
||||
-CAcreateserial -out client.cert.pem -days 365 -sha256
|
||||
'''
|
||||
|
||||
server_ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
|
||||
server_ctx.minimum_version = ssl.TLSVersion.TLSv1_2
|
||||
server_ctx.maximum_version = ssl.TLSVersion.TLSv1_3
|
||||
server_ctx.verify_mode = ssl.CERT_REQUIRED
|
||||
server_ctx.options |= ssl.OP_SINGLE_ECDH_USE
|
||||
server_ctx.options |= ssl.OP_NO_COMPRESSION
|
||||
server_ctx.load_cert_chain(certfile='cert/server.pem',
|
||||
keyfile='cert/server.key')
|
||||
server_ctx.load_verify_locations(cafile='cert/ca.pem')
|
||||
server_ctx.set_ciphers('ECDH+AESGCM')
|
||||
|
||||
loop.create_task(asyncio.start_server(handle_client_v3, '0.0.0.0', 10443,
|
||||
ssl=server_ctx))
|
||||
web_task = loop.create_task(webserver('0.0.0.0', 8127))
|
||||
|
||||
#
|
||||
@@ -183,7 +223,7 @@ if __name__ == "__main__":
|
||||
lambda loop=loop: asyncio.create_task(
|
||||
handle_shutdown(web_task)))
|
||||
|
||||
loop.set_debug(log_level == logging.DEBUG)
|
||||
loop.set_debug(True)
|
||||
try:
|
||||
if ConfigErr is None:
|
||||
proxy_is_up = True
|
||||
|
||||
Reference in New Issue
Block a user