/** * @file src/confighttp.cpp * @brief Definitions for the Web UI Config HTTP server. * * @todo Authentication, better handling of routes common to nvhttp, cleanup */ #define BOOST_BIND_GLOBAL_PLACEHOLDERS #include "process.h" #include #include #include #include #include #include #include #include #include #include #include #include "config.h" #include "confighttp.h" #include "crypto.h" #include "file_handler.h" #include "globals.h" #include "httpcommon.h" #include "logging.h" #include "network.h" #include "nvhttp.h" #include "platform/common.h" #include "rtsp.h" #include "utility.h" #include "uuid.h" #include "version.h" #include "process.h" using namespace std::literals; namespace confighttp { namespace fs = std::filesystem; namespace pt = boost::property_tree; using https_server_t = SimpleWeb::Server; using args_t = SimpleWeb::CaseInsensitiveMultimap; using resp_https_t = std::shared_ptr::Response>; using req_https_t = std::shared_ptr::Request>; std::string sessionCookie; static std::chrono::time_point cookie_creation_time; enum class op_e { ADD, ///< Add client REMOVE ///< Remove client }; void print_req(const req_https_t &request) { BOOST_LOG(debug) << "METHOD :: "sv << request->method; BOOST_LOG(debug) << "DESTINATION :: "sv << request->path; for (auto &[name, val] : request->header) { BOOST_LOG(debug) << name << " -- " << (name == "Authorization" ? "CREDENTIALS REDACTED" : val); } BOOST_LOG(debug) << " [--] "sv; for (auto &[name, val] : request->parse_query_string()) { BOOST_LOG(debug) << name << " -- " << val; } BOOST_LOG(debug) << " [--] "sv; } void send_unauthorized(resp_https_t response, req_https_t request) { auto address = net::addr_to_normalized_string(request->remote_endpoint().address()); BOOST_LOG(info) << "Web UI: ["sv << address << "] -- not authorized"sv; response->write(SimpleWeb::StatusCode::client_error_unauthorized); } void send_redirect(resp_https_t response, req_https_t request, const char *path) { auto address = net::addr_to_normalized_string(request->remote_endpoint().address()); BOOST_LOG(info) << "Web UI: ["sv << address << "] -- not authorized"sv; const SimpleWeb::CaseInsensitiveMultimap headers { { "Location", path } }; response->write(SimpleWeb::StatusCode::redirection_temporary_redirect, headers); } std::string getCookieValue(const std::string& cookieString, const std::string& key) { std::string keyWithEqual = key + "="; std::size_t startPos = cookieString.find(keyWithEqual); if (startPos == std::string::npos) { return ""; } startPos += keyWithEqual.length(); std::size_t endPos = cookieString.find(";", startPos); if (endPos == std::string::npos) { return cookieString.substr(startPos); } return cookieString.substr(startPos, endPos - startPos); } bool checkIPOrigin(resp_https_t response, req_https_t request) { auto address = net::addr_to_normalized_string(request->remote_endpoint().address()); auto ip_type = net::from_address(address); if (ip_type > http::origin_web_ui_allowed) { BOOST_LOG(info) << "Web UI: ["sv << address << "] -- denied"sv; response->write(SimpleWeb::StatusCode::client_error_forbidden); return false; } return true; } bool authenticate(resp_https_t response, req_https_t request, bool needsRedirect = false) { if (!checkIPOrigin(response, request)) { return false; } // If credentials are shown, redirect the user to a /welcome page if (config::sunshine.username.empty()) { send_redirect(response, request, "/welcome"); return false; } auto fg = util::fail_guard([&]() { if (needsRedirect) { send_redirect(response, request, "/login"); } else { send_unauthorized(response, request); } }); if (sessionCookie.empty()) { return false; } // Cookie has expired if (std::chrono::steady_clock::now() - cookie_creation_time > SESSION_EXPIRE_DURATION) { sessionCookie.clear(); return false; } auto cookies = request->header.find("cookie"); if (cookies == request->header.end()) { return false; } auto authCookie = getCookieValue(cookies->second, "auth"); if (authCookie.empty() || authCookie != sessionCookie) { return false; } fg.disable(); return true; } void not_found(resp_https_t response, req_https_t request) { pt::ptree tree; tree.put("root..status_code", 404); std::ostringstream data; pt::write_xml(data, tree); response->write(data.str()); *response << "HTTP/1.1 404 NOT FOUND\r\n" << data.str(); } void fetchStaticPage(resp_https_t response, req_https_t request, const std::string& page, bool needsAuthenticate) { if (needsAuthenticate) { if (!authenticate(response, request, true)) return; } print_req(request); std::string content = file_handler::read_file((WEB_DIR + page).c_str()); const SimpleWeb::CaseInsensitiveMultimap headers { { "Content-Type", "text/html; charset=utf-8" }, { "Access-Control-Allow-Origin", "https://images.igdb.com/"} }; response->write(content, headers); }; void getIndexPage(resp_https_t response, req_https_t request) { fetchStaticPage(response, request, "index.html", true); } void getPinPage(resp_https_t response, req_https_t request) { fetchStaticPage(response, request, "pin.html", true); } void getAppsPage(resp_https_t response, req_https_t request) { fetchStaticPage(response, request, "apps.html", true); } void getConfigPage(resp_https_t response, req_https_t request) { fetchStaticPage(response, request, "config.html", true); } void getPasswordPage(resp_https_t response, req_https_t request) { fetchStaticPage(response, request, "password.html", true); } void getWelcomePage(resp_https_t response, req_https_t request) { if (!checkIPOrigin(response, request)) { return; } if (!config::sunshine.username.empty()) { send_redirect(response, request, "/"); return; } fetchStaticPage(response, request, "welcome.html", false); } void getLoginPage(resp_https_t response, req_https_t request) { if (!checkIPOrigin(response, request)) { return; } fetchStaticPage(response, request, "login.html", false); } void getTroubleshootingPage(resp_https_t response, req_https_t request) { fetchStaticPage(response, request, "troubleshooting.html", true); } /** * @todo combine function with getSunshineLogoImage and possibly getNodeModules * @todo use mime_types map */ void getFaviconImage(resp_https_t response, req_https_t request) { if (!checkIPOrigin(response, request)) { return; } print_req(request); std::ifstream in(WEB_DIR "images/apollo.ico", std::ios::binary); const SimpleWeb::CaseInsensitiveMultimap headers { { "Content-Type", "image/x-icon" } }; response->write(SimpleWeb::StatusCode::success_ok, in, headers); } /** * @todo combine function with getFaviconImage and possibly getNodeModules * @todo use mime_types map */ void getSunshineLogoImage(resp_https_t response, req_https_t request) { if (!checkIPOrigin(response, request)) { return; } print_req(request); std::ifstream in(WEB_DIR "images/logo-apollo-45.png", std::ios::binary); const SimpleWeb::CaseInsensitiveMultimap headers { { "Content-Type", "image/png" } }; response->write(SimpleWeb::StatusCode::success_ok, in, headers); } bool isChildPath(fs::path const &base, fs::path const &query) { auto relPath = fs::relative(base, query); return *(relPath.begin()) != fs::path(".."); } void getNodeModules(resp_https_t response, req_https_t request) { if (!checkIPOrigin(response, request)) { return; } print_req(request); fs::path webDirPath(WEB_DIR); fs::path nodeModulesPath(webDirPath / "assets"); // .relative_path is needed to shed any leading slash that might exist in the request path auto filePath = fs::weakly_canonical(webDirPath / fs::path(request->path).relative_path()); // Don't do anything if file does not exist or is outside the assets directory if (!isChildPath(filePath, nodeModulesPath)) { BOOST_LOG(warning) << "Someone requested a path " << filePath << " that is outside the assets folder"; response->write(SimpleWeb::StatusCode::client_error_bad_request, "Bad Request"); } else if (!fs::exists(filePath)) { response->write(SimpleWeb::StatusCode::client_error_not_found); } else { auto relPath = fs::relative(filePath, webDirPath); // get the mime type from the file extension mime_types map // remove the leading period from the extension auto mimeType = mime_types.find(relPath.extension().string().substr(1)); // check if the extension is in the map at the x position if (mimeType != mime_types.end()) { // if it is, set the content type to the mime type SimpleWeb::CaseInsensitiveMultimap headers; headers.emplace("Content-Type", mimeType->second); std::ifstream in(filePath.string(), std::ios::binary); response->write(SimpleWeb::StatusCode::success_ok, in, headers); } // do not return any file if the type is not in the map } } void getApps(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); std::string content = file_handler::read_file(config::stream.file_apps.c_str()); const SimpleWeb::CaseInsensitiveMultimap headers { { "Content-Type", "application/json" } }; response->write(content, headers); } void getLogs(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); std::string content = file_handler::read_file(config::sunshine.log_file.c_str()); const SimpleWeb::CaseInsensitiveMultimap headers { { "Content-Type", "text/plain" } }; response->write(SimpleWeb::StatusCode::success_ok, content, headers); } void saveApp(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); std::stringstream ss; ss << request->content.rdbuf(); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); pt::ptree inputTree, fileTree; BOOST_LOG(info) << config::stream.file_apps; try { // TODO: Input Validation pt::read_json(ss, inputTree); pt::read_json(config::stream.file_apps, fileTree); if (inputTree.get_child("prep-cmd").empty()) { inputTree.erase("prep-cmd"); } if (inputTree.get_child("detached").empty()) { inputTree.erase("detached"); } auto &apps_node = fileTree.get_child("apps"s); int index = inputTree.get("index"); inputTree.erase("index"); if (index == -1) { apps_node.push_back(std::make_pair("", inputTree)); } else { // Unfortunately Boost PT does not allow to directly edit the array, copy should do the trick pt::ptree newApps; int i = 0; for (const auto &kv : apps_node) { if (i == index) { newApps.push_back(std::make_pair("", inputTree)); } else { newApps.push_back(std::make_pair("", kv.second)); } i++; } fileTree.erase("apps"); fileTree.push_back(std::make_pair("apps", newApps)); } pt::write_json(config::stream.file_apps, fileTree); } catch (std::exception &e) { BOOST_LOG(warning) << "SaveApp: "sv << e.what(); outputTree.put("status", "false"); outputTree.put("error", "Invalid Input JSON"); return; } outputTree.put("status", "true"); proc::refresh(config::stream.file_apps); } void deleteApp(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); pt::ptree fileTree; try { pt::read_json(config::stream.file_apps, fileTree); auto &apps_node = fileTree.get_child("apps"s); int index = stoi(request->path_match[1]); if (index < 0) { outputTree.put("status", "false"); outputTree.put("error", "Invalid Index"); return; } else { // Unfortunately Boost PT does not allow to directly edit the array, copy should do the trick pt::ptree newApps; int i = 0; for (const auto &kv : apps_node) { if (i++ != index) { newApps.push_back(std::make_pair("", kv.second)); } } fileTree.erase("apps"); fileTree.push_back(std::make_pair("apps", newApps)); } pt::write_json(config::stream.file_apps, fileTree); } catch (std::exception &e) { BOOST_LOG(warning) << "DeleteApp: "sv << e.what(); outputTree.put("status", "false"); outputTree.put("error", "Invalid File JSON"); return; } outputTree.put("status", "true"); proc::refresh(config::stream.file_apps); } void uploadCover(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; std::stringstream ss; std::stringstream configStream; ss << request->content.rdbuf(); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; SimpleWeb::StatusCode code = SimpleWeb::StatusCode::success_ok; if (outputTree.get_child_optional("error").has_value()) { code = SimpleWeb::StatusCode::client_error_bad_request; } pt::write_json(data, outputTree); response->write(code, data.str()); }); pt::ptree inputTree; try { pt::read_json(ss, inputTree); } catch (std::exception &e) { BOOST_LOG(warning) << "UploadCover: "sv << e.what(); outputTree.put("status", "false"); outputTree.put("error", e.what()); return; } auto key = inputTree.get("key", ""); if (key.empty()) { outputTree.put("error", "Cover key is required"); return; } auto url = inputTree.get("url", ""); const std::string coverdir = platf::appdata().string() + "/covers/"; file_handler::make_directory(coverdir); std::basic_string path = coverdir + http::url_escape(key) + ".png"; if (!url.empty()) { if (http::url_get_host(url) != "images.igdb.com") { outputTree.put("error", "Only images.igdb.com is allowed"); return; } if (!http::download_file(url, path)) { outputTree.put("error", "Failed to download cover"); return; } } else { auto data = SimpleWeb::Crypto::Base64::decode(inputTree.get("data")); std::ofstream imgfile(path); imgfile.write(data.data(), (int) data.size()); } outputTree.put("path", path); } void getConfig(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); outputTree.put("status", "true"); outputTree.put("platform", SUNSHINE_PLATFORM); outputTree.put("version", PROJECT_VER); #ifdef _WIN32 outputTree.put("vdisplayStatus", (int)proc::vDisplayDriverStatus); #endif auto vars = config::parse_config(file_handler::read_file(config::sunshine.config_file.c_str())); for (auto &[name, value] : vars) { outputTree.put(std::move(name), std::move(value)); } } void getLocale(resp_https_t response, req_https_t request) { // we need to return the locale whether authenticated or not print_req(request); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); outputTree.put("status", "true"); outputTree.put("locale", config::sunshine.locale); } void saveConfig(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); std::stringstream ss; std::stringstream configStream; ss << request->content.rdbuf(); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); pt::ptree inputTree; try { // TODO: Input Validation pt::read_json(ss, inputTree); for (const auto &kv : inputTree) { std::string value = inputTree.get(kv.first); if (value.length() == 0 || value.compare("null") == 0) continue; configStream << kv.first << " = " << value << std::endl; } file_handler::write_file(config::sunshine.config_file.c_str(), configStream.str()); } catch (std::exception &e) { BOOST_LOG(warning) << "SaveConfig: "sv << e.what(); outputTree.put("status", "false"); outputTree.put("error", e.what()); return; } } void restart(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); // We may not return from this call platf::restart(); } void quit(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); BOOST_LOG(warning) << "Requested quit from config page!"sv; #ifdef _WIN32 // If we're running in a service, return a special status to // tell it to terminate too, otherwise it will just respawn us. if (GetConsoleWindow() == NULL) { lifetime::exit_sunshine(ERROR_SHUTDOWN_IN_PROGRESS, true); } else #endif { lifetime::exit_sunshine(0, true); } // We do want to return here // If user get a return, then the exit has failed. // This might not be thread safe but we're exiting anyways std::thread write_resp([response]{ sleep(5000); response->write(); }); write_resp.detach(); } void savePassword(resp_https_t response, req_https_t request) { if (!config::sunshine.username.empty() && !authenticate(response, request)) return; print_req(request); std::stringstream ss; std::stringstream configStream; ss << request->content.rdbuf(); pt::ptree inputTree, outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); try { // TODO: Input Validation pt::read_json(ss, inputTree); auto username = inputTree.count("currentUsername") > 0 ? inputTree.get("currentUsername") : ""; auto newUsername = inputTree.get("newUsername"); auto password = inputTree.count("currentPassword") > 0 ? inputTree.get("currentPassword") : ""; auto newPassword = inputTree.count("newPassword") > 0 ? inputTree.get("newPassword") : ""; auto confirmPassword = inputTree.count("confirmNewPassword") > 0 ? inputTree.get("confirmNewPassword") : ""; if (newUsername.length() == 0) newUsername = username; if (newUsername.length() == 0) { outputTree.put("status", false); outputTree.put("error", "Invalid Username"); } else { auto hash = util::hex(crypto::hash(password + config::sunshine.salt)).to_string(); if (config::sunshine.username.empty() || (boost::iequals(username, config::sunshine.username) && hash == config::sunshine.password)) { if (newPassword.empty() || newPassword != confirmPassword) { outputTree.put("status", false); outputTree.put("error", "Password Mismatch"); } else { http::save_user_creds(config::sunshine.credentials_file, newUsername, newPassword); http::reload_user_creds(config::sunshine.credentials_file); // Force user to re-login sessionCookie.clear(); outputTree.put("status", true); } } else { outputTree.put("status", false); outputTree.put("error", "Invalid Current Credentials"); } } } catch (std::exception &e) { BOOST_LOG(warning) << "SavePassword: "sv << e.what(); outputTree.put("status", false); outputTree.put("error", e.what()); return; } } void login(resp_https_t response, req_https_t request) { if (!checkIPOrigin(response, request)) { return; } auto fg = util::fail_guard([&]{ response->write(SimpleWeb::StatusCode::client_error_unauthorized); }); std::stringstream ss; ss << request->content.rdbuf(); pt::ptree inputTree; try { pt::read_json(ss, inputTree); std::string username = inputTree.get("username"); std::string password = inputTree.get("password"); std::string hash = util::hex(crypto::hash(password + config::sunshine.salt)).to_string(); if (!boost::iequals(username, config::sunshine.username) || hash != config::sunshine.password) { return; } sessionCookie = crypto::rand_alphabet(64); cookie_creation_time = std::chrono::steady_clock::now(); const SimpleWeb::CaseInsensitiveMultimap headers { { "Set-Cookie", "auth=" + sessionCookie + "; Secure; Max-Age=2592000; Path=/" } }; response->write(headers); fg.disable(); } catch (std::exception &e) { BOOST_LOG(warning) << "Web UI Login failed: ["sv << net::addr_to_normalized_string(request->remote_endpoint().address()) << "]: "sv << e.what(); response->write(SimpleWeb::StatusCode::server_error_internal_server_error); fg.disable(); return; } } void savePin(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); std::stringstream ss; ss << request->content.rdbuf(); pt::ptree inputTree, outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); try { // TODO: Input Validation pt::read_json(ss, inputTree); std::string pin = inputTree.get("pin"); std::string name = inputTree.get("name"); outputTree.put("status", nvhttp::pin(pin, name)); } catch (std::exception &e) { BOOST_LOG(warning) << "SavePin: "sv << e.what(); outputTree.put("status", false); outputTree.put("error", e.what()); return; } } void getOTP(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); try { auto args = request->parse_query_string(); auto it = args.find("passphrase"); if (it == std::end(args)) { throw std::runtime_error("Passphrase not provided!"); } if (it->second.size() < 4) { throw std::runtime_error("Passphrase too short!"); } std::string passphrase = it->second; std::string deviceName; it = args.find("deviceName"); if (it != std::end(args)) { deviceName = it->second; } outputTree.put("otp", nvhttp::request_otp(passphrase, deviceName)); outputTree.put("status", true); outputTree.put("message", "OTP created, effective within 3 minutes."); } catch (std::exception &e) { BOOST_LOG(warning) << "OTP creation failed: "sv << e.what(); outputTree.put("status", false); outputTree.put("message", e.what()); return; } } void unpairAll(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); nvhttp::erase_all_clients(); proc::proc.terminate(); outputTree.put("status", true); } void unpair(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); std::stringstream ss; ss << request->content.rdbuf(); pt::ptree inputTree, outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); try { // TODO: Input Validation pt::read_json(ss, inputTree); std::string uuid = inputTree.get("uuid"); outputTree.put("status", nvhttp::unpair_client(uuid)); } catch (std::exception &e) { BOOST_LOG(warning) << "Unpair: "sv << e.what(); outputTree.put("status", false); outputTree.put("error", e.what()); return; } } void listClients(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); pt::ptree named_certs = nvhttp::get_all_clients(); pt::ptree outputTree; outputTree.put("status", false); auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); outputTree.add_child("named_certs", named_certs); outputTree.put("status", true); } void closeApp(resp_https_t response, req_https_t request) { if (!authenticate(response, request)) return; print_req(request); pt::ptree outputTree; auto g = util::fail_guard([&]() { std::ostringstream data; pt::write_json(data, outputTree); response->write(data.str()); }); proc::proc.terminate(); outputTree.put("status", true); } void start() { auto shutdown_event = mail::man->event(mail::shutdown); auto port_https = net::map_port(PORT_HTTPS); auto address_family = net::af_from_enum_string(config::sunshine.address_family); https_server_t server { config::nvhttp.cert, config::nvhttp.pkey }; server.default_resource["GET"] = not_found; server.resource["^/$"]["GET"] = getIndexPage; server.resource["^/pin/?$"]["GET"] = getPinPage; server.resource["^/apps/?$"]["GET"] = getAppsPage; server.resource["^/config/?$"]["GET"] = getConfigPage; server.resource["^/password/?$"]["GET"] = getPasswordPage; server.resource["^/welcome/?$"]["GET"] = getWelcomePage; server.resource["^/login/?$"]["GET"] = getLoginPage; server.resource["^/troubleshooting/?$"]["GET"] = getTroubleshootingPage; server.resource["^/api/login"]["POST"] = login; server.resource["^/api/pin$"]["POST"] = savePin; server.resource["^/api/otp$"]["GET"] = getOTP; server.resource["^/api/apps$"]["GET"] = getApps; server.resource["^/api/logs$"]["GET"] = getLogs; server.resource["^/api/apps$"]["POST"] = saveApp; server.resource["^/api/config$"]["GET"] = getConfig; server.resource["^/api/config$"]["POST"] = saveConfig; server.resource["^/api/configLocale$"]["GET"] = getLocale; server.resource["^/api/restart$"]["POST"] = restart; server.resource["^/api/quit$"]["POST"] = quit; server.resource["^/api/password$"]["POST"] = savePassword; server.resource["^/api/apps/([0-9]+)$"]["DELETE"] = deleteApp; server.resource["^/api/clients/unpair-all$"]["POST"] = unpairAll; server.resource["^/api/clients/list$"]["GET"] = listClients; server.resource["^/api/clients/unpair$"]["POST"] = unpair; server.resource["^/api/apps/close$"]["POST"] = closeApp; server.resource["^/api/covers/upload$"]["POST"] = uploadCover; server.resource["^/images/apollo.ico$"]["GET"] = getFaviconImage; server.resource["^/images/logo-apollo-45.png$"]["GET"] = getSunshineLogoImage; server.resource["^/assets\\/.+$"]["GET"] = getNodeModules; server.config.reuse_address = true; server.config.address = net::af_to_any_address_string(address_family); server.config.port = port_https; auto accept_and_run = [&](auto *server) { try { server->start([](unsigned short port) { BOOST_LOG(info) << "Configuration UI available at [https://localhost:"sv << port << "]"; }); } catch (boost::system::system_error &err) { // It's possible the exception gets thrown after calling server->stop() from a different thread if (shutdown_event->peek()) { return; } BOOST_LOG(fatal) << "Couldn't start Configuration HTTPS server on port ["sv << port_https << "]: "sv << err.what(); shutdown_event->raise(true); return; } }; std::thread tcp { accept_and_run, &server }; // Wait for any event shutdown_event->view(); server.stop(); tcp.join(); } } // namespace confighttp