NuMaker connection with AWS IoT thru MQTT/HTTPS
Dependencies: MQTT
main.cpp@44:2f9dc54e7f95, 2021-09-01 (annotated)
- Committer:
- ccli8
- Date:
- Wed Sep 01 13:26:25 2021 +0800
- Revision:
- 44:2f9dc54e7f95
- Parent:
- 41:b878d7cd7035
- Child:
- 45:7d315fb1ba3e
Upgrade to ATS CA and ATS endpoint
1. Update CA certificate from VeriSign to ATS
2. Change endpoint type to ATS
Sever name has the format: account-specific-prefix.iot.your-region.amazonaws.com
where account-specific-prefix must end with '-ats'.
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
ccli8 |
1:5ffad9f24d63 | 1 | /* This example demonstrates connection with AWS IoT through MQTT/HTTPS protocol. |
ccli8 |
1:5ffad9f24d63 | 2 | * |
ccli8 |
1:5ffad9f24d63 | 3 | * AWS IoT: Thing Shadow MQTT Topics |
ccli8 |
1:5ffad9f24d63 | 4 | * http://docs.aws.amazon.com/iot/latest/developerguide/thing-shadow-mqtt.html |
ccli8 |
1:5ffad9f24d63 | 5 | * |
ccli8 |
1:5ffad9f24d63 | 6 | * AWS IoT: Publish to a topic through HTTPS/POST method: |
ccli8 |
1:5ffad9f24d63 | 7 | * http://docs.aws.amazon.com/iot/latest/developerguide/protocols.html |
ccli8 |
1:5ffad9f24d63 | 8 | * |
ccli8 |
1:5ffad9f24d63 | 9 | * AWS IoT: Thing Shadow RESTful API: |
ccli8 |
1:5ffad9f24d63 | 10 | * http://docs.aws.amazon.com/iot/latest/developerguide/thing-shadow-rest-api.html |
ccli8 |
1:5ffad9f24d63 | 11 | */ |
ccli8 |
1:5ffad9f24d63 | 12 | |
ccli8 |
1:5ffad9f24d63 | 13 | #define AWS_IOT_MQTT_TEST 1 |
ccli8 |
1:5ffad9f24d63 | 14 | #define AWS_IOT_HTTPS_TEST 0 |
ccli8 |
1:5ffad9f24d63 | 15 | |
ccli8 |
1:5ffad9f24d63 | 16 | #include "mbed.h" |
ccli8 |
17:6f0ff065cd76 | 17 | #include "MyTLSSocket.h" |
ccli8 |
1:5ffad9f24d63 | 18 | |
ccli8 |
1:5ffad9f24d63 | 19 | #if AWS_IOT_MQTT_TEST |
ccli8 |
1:5ffad9f24d63 | 20 | /* MQTT-specific header files */ |
ccli8 |
1:5ffad9f24d63 | 21 | #include "MQTTmbed.h" |
ccli8 |
1:5ffad9f24d63 | 22 | #include "MQTTClient.h" |
ccli8 |
1:5ffad9f24d63 | 23 | #endif // End of AWS_IOT_MQTT_TEST |
ccli8 |
1:5ffad9f24d63 | 24 | |
ccli8 |
1:5ffad9f24d63 | 25 | |
ccli8 |
1:5ffad9f24d63 | 26 | namespace { |
ccli8 |
1:5ffad9f24d63 | 27 | |
ccli8 |
1:5ffad9f24d63 | 28 | /* List of trusted root CA certificates |
ccli8 |
1:5ffad9f24d63 | 29 | * currently only GlobalSign, the CA for os.mbed.com |
ccli8 |
1:5ffad9f24d63 | 30 | * |
ccli8 |
1:5ffad9f24d63 | 31 | * To add more than one root, just concatenate them. |
ccli8 |
1:5ffad9f24d63 | 32 | */ |
ccli8 |
1:5ffad9f24d63 | 33 | const char SSL_CA_CERT_PEM[] = "-----BEGIN CERTIFICATE-----\n" |
ccli8 |
44:2f9dc54e7f95 | 34 | "MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF\n" |
ccli8 |
44:2f9dc54e7f95 | 35 | "ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6\n" |
ccli8 |
44:2f9dc54e7f95 | 36 | "b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL\n" |
ccli8 |
44:2f9dc54e7f95 | 37 | "MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv\n" |
ccli8 |
44:2f9dc54e7f95 | 38 | "b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj\n" |
ccli8 |
44:2f9dc54e7f95 | 39 | "ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM\n" |
ccli8 |
44:2f9dc54e7f95 | 40 | "9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw\n" |
ccli8 |
44:2f9dc54e7f95 | 41 | "IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6\n" |
ccli8 |
44:2f9dc54e7f95 | 42 | "VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L\n" |
ccli8 |
44:2f9dc54e7f95 | 43 | "93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm\n" |
ccli8 |
44:2f9dc54e7f95 | 44 | "jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC\n" |
ccli8 |
44:2f9dc54e7f95 | 45 | "AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA\n" |
ccli8 |
44:2f9dc54e7f95 | 46 | "A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI\n" |
ccli8 |
44:2f9dc54e7f95 | 47 | "U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs\n" |
ccli8 |
44:2f9dc54e7f95 | 48 | "N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv\n" |
ccli8 |
44:2f9dc54e7f95 | 49 | "o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU\n" |
ccli8 |
44:2f9dc54e7f95 | 50 | "5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy\n" |
ccli8 |
44:2f9dc54e7f95 | 51 | "rqXRfboQnoZsG4q5WTP468SQvvG5\n" |
ccli8 |
1:5ffad9f24d63 | 52 | "-----END CERTIFICATE-----\n"; |
ccli8 |
1:5ffad9f24d63 | 53 | |
ccli8 |
1:5ffad9f24d63 | 54 | /* User certificate which has been activated and attached with specific thing and policy */ |
ccli8 |
1:5ffad9f24d63 | 55 | const char SSL_USER_CERT_PEM[] = "-----BEGIN CERTIFICATE-----\n" |
ccli8 |
8:d5ea623ffc1f | 56 | "MIIDWTCCAkGgAwIBAgIUAzDIpEQWV/yKVo8suGhvjmFY0n4wDQYJKoZIhvcNAQEL\n" |
ccli8 |
8:d5ea623ffc1f | 57 | "BQAwTTFLMEkGA1UECwxCQW1hem9uIFdlYiBTZXJ2aWNlcyBPPUFtYXpvbi5jb20g\n" |
ccli8 |
8:d5ea623ffc1f | 58 | "SW5jLiBMPVNlYXR0bGUgU1Q9V2FzaGluZ3RvbiBDPVVTMB4XDTE4MDQxNzA5NDMx\n" |
ccli8 |
8:d5ea623ffc1f | 59 | "M1oXDTQ5MTIzMTIzNTk1OVowHjEcMBoGA1UEAwwTQVdTIElvVCBDZXJ0aWZpY2F0\n" |
ccli8 |
8:d5ea623ffc1f | 60 | "ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKsLlECiw4ud5laejJmL\n" |
ccli8 |
8:d5ea623ffc1f | 61 | "bBhafKLdCRx6tkcjBYyEUoAC3Qs2ogqGngQgjU4QJoWpEBO/U1M+e1QtlZ2o/CiL\n" |
ccli8 |
8:d5ea623ffc1f | 62 | "MViHA3rYvP86N/TH8pFA3aPKaeEp+WIt5v4OXdfPkVNKTotiRuRCpzRzrY4xKp11\n" |
ccli8 |
8:d5ea623ffc1f | 63 | "ouKkVKf3FcNuKIMt/uEhje90KofBbFHQY3HFYe19qIg1m/IBV+npmNlAKElGNSB7\n" |
ccli8 |
8:d5ea623ffc1f | 64 | "xHHLzzUuue38s+ceJyzsWuPjFiVYoeyPHF8gDVWf28XJ4KUFs80Deycqe9efroud\n" |
ccli8 |
8:d5ea623ffc1f | 65 | "cQY/6aLDWDJXHvhenwoAIbHqUsYRoWoanrg5Cq3id5+pzVkadNV3+x9bGwROhpbQ\n" |
ccli8 |
8:d5ea623ffc1f | 66 | "M9ECAwEAAaNgMF4wHwYDVR0jBBgwFoAUVUXg3+Dd1qSnAT9LN413zSdNoE0wHQYD\n" |
ccli8 |
8:d5ea623ffc1f | 67 | "VR0OBBYEFIx86SOxw5k/50GtyRjUwlj+9d1gMAwGA1UdEwEB/wQCMAAwDgYDVR0P\n" |
ccli8 |
8:d5ea623ffc1f | 68 | "AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQCI1fqqjvLAFzL2E1nvWMrkaWN2\n" |
ccli8 |
8:d5ea623ffc1f | 69 | "EQK44uOcw53ZzgNNH7fJ85BW8T2l1yZx/Blgs10pEp7vmccnRoR7nYbUGO8++9nG\n" |
ccli8 |
8:d5ea623ffc1f | 70 | "S7bfZhiaE2syJqqvLwPGdqR6fvDdfEpmhgJ1CqeMCqun9XZvUTsgBn7Sqqz7P99h\n" |
ccli8 |
8:d5ea623ffc1f | 71 | "gGmDRKS/CtsPai0Df0ZPNuV/YuUkpHKJSDm+ZTnzevMS3KXkG1cc/sIuc4IwF+aj\n" |
ccli8 |
8:d5ea623ffc1f | 72 | "nbyzdC2fN0r+34srQ8/9aXezOTQ0NBWtoJCCkD+LL6PYJJkAgLA2jcbcbuRJUQ7n\n" |
ccli8 |
8:d5ea623ffc1f | 73 | "Zsp25kKX40fuyIcgPRsd/7sao3zTVYxwKy8r6/mbgrPiMeHvJZ8y3nwUpsPO\n" |
ccli8 |
1:5ffad9f24d63 | 74 | "-----END CERTIFICATE-----\n"; |
ccli8 |
1:5ffad9f24d63 | 75 | |
ccli8 |
1:5ffad9f24d63 | 76 | /* User private key paired with above */ |
ccli8 |
1:5ffad9f24d63 | 77 | const char SSL_USER_PRIV_KEY_PEM[] = "-----BEGIN RSA PRIVATE KEY-----\n" |
ccli8 |
8:d5ea623ffc1f | 78 | "MIIEowIBAAKCAQEAqwuUQKLDi53mVp6MmYtsGFp8ot0JHHq2RyMFjIRSgALdCzai\n" |
ccli8 |
8:d5ea623ffc1f | 79 | "CoaeBCCNThAmhakQE79TUz57VC2Vnaj8KIsxWIcDeti8/zo39MfykUDdo8pp4Sn5\n" |
ccli8 |
8:d5ea623ffc1f | 80 | "Yi3m/g5d18+RU0pOi2JG5EKnNHOtjjEqnXWi4qRUp/cVw24ogy3+4SGN73Qqh8Fs\n" |
ccli8 |
8:d5ea623ffc1f | 81 | "UdBjccVh7X2oiDWb8gFX6emY2UAoSUY1IHvEccvPNS657fyz5x4nLOxa4+MWJVih\n" |
ccli8 |
8:d5ea623ffc1f | 82 | "7I8cXyANVZ/bxcngpQWzzQN7Jyp715+ui51xBj/posNYMlce+F6fCgAhsepSxhGh\n" |
ccli8 |
8:d5ea623ffc1f | 83 | "ahqeuDkKreJ3n6nNWRp01Xf7H1sbBE6GltAz0QIDAQABAoIBAAzl7KILJA/NMmdp\n" |
ccli8 |
8:d5ea623ffc1f | 84 | "wVR6zQXxHODzJhK9ti0bGPoFqGr6zExiLEn66MOK6NzwHteJbirvDIuEdKxeW5/t\n" |
ccli8 |
8:d5ea623ffc1f | 85 | "9EXiaTAxzjNfULE2ZK3Svhnx+ES3qNBP5/xdVcPmtXDmuCC9w7qDCLGBzTYJWxcT\n" |
ccli8 |
8:d5ea623ffc1f | 86 | "4hDJpCTPG4sm+L8p+Wga+dNkQl3CFyHHINDZ0pKcP0kDDt6inKfiU7uU4lFYbCZy\n" |
ccli8 |
8:d5ea623ffc1f | 87 | "PceUgIOTQiNVoPQYtkHgZAtmD9rcwdq2/0GZEbzTkZuSE9S8+WlGxJP5xMGzeVsv\n" |
ccli8 |
8:d5ea623ffc1f | 88 | "zZ/scx0LM7fz5Zq0lsvAwSB1mcs04DaaNpU7Z0tXDIS249RTqdtpPkJzmevpAGhF\n" |
ccli8 |
8:d5ea623ffc1f | 89 | "VNe30/kCgYEA4rflfqyw/YHWKRxCGJRO+q0gPvlBIes30noz5Hxl0knb/J5Ng4Nx\n" |
ccli8 |
8:d5ea623ffc1f | 90 | "xMaIMZgCbwHbw5i01JOPvVKICROKb8wkli4Y2eVzxMPKk2CSpji16RQZ4eOl3YXL\n" |
ccli8 |
8:d5ea623ffc1f | 91 | "1Vnn07Ei+GpsGgDNF0HWf/Ur7es/KdAPCWbKJyoSR90+WN29gP2+Zp8CgYEAwSLv\n" |
ccli8 |
8:d5ea623ffc1f | 92 | "Kt/vdd6XKnR9xR3IajsW/X2GR/x/m2JffJPOP6VpDTKAbv86hVHDV0oBEDMDc7qy\n" |
ccli8 |
8:d5ea623ffc1f | 93 | "023ognyFCPb9Gzol2lq8egjMsisA2bgoB9HqldrSYlaZ0wPe0QJBf1gZ29jPyVJ0\n" |
ccli8 |
8:d5ea623ffc1f | 94 | "ciaBbNbSRhwTrwet7Bae9EbpJsyvBxVh00v0f48CgYEAvKQKviXudmCL01UB4fW0\n" |
ccli8 |
8:d5ea623ffc1f | 95 | "6XsXs44tlY1juyuW9exTxG9ULZOCJ4U9Kl+OfsVecQL42ny7KY1GMl7zdanerDsN\n" |
ccli8 |
8:d5ea623ffc1f | 96 | "zi+42cTDWNsYORxHqSrSoYbqKjwCjJmBCppt/IQM9umF3PUBsPJFCd7zmFj/C0lk\n" |
ccli8 |
8:d5ea623ffc1f | 97 | "2Yu/dGrbHxSFheeqgCOhQz0CgYBfZxdHUYji64o2cYay+QxH1Vp86yWKp6KNKeHL\n" |
ccli8 |
8:d5ea623ffc1f | 98 | "EuP9soKa/0hMDA1nT8UzeB3gV6Kr5xxwrkj9M+8vR3otmeKa4tlZWsFqfS2VXo9/\n" |
ccli8 |
8:d5ea623ffc1f | 99 | "lWTQk1/7LZYckzvceMXL1sQnQgkaBH366SRjlBYYhcP/YMa76Uypk+GVxePrltdU\n" |
ccli8 |
8:d5ea623ffc1f | 100 | "3Z8v5wKBgEXL38yc9LqTIWe1U40ZZKvp2A8c86jtstorEEFqXharE8kxcEpL8ZLL\n" |
ccli8 |
8:d5ea623ffc1f | 101 | "wjgPKdfNMIuApHSrhG7a7gU1rgJyDy1sOIwSvgTYrWfITPTVu5owvSZEblx4KYOm\n" |
ccli8 |
8:d5ea623ffc1f | 102 | "g8hke3Oego4v9cwctkQss3/HZ6rs3PR942oAetuxLy3KPF83IeFm\n" |
ccli8 |
1:5ffad9f24d63 | 103 | "-----END RSA PRIVATE KEY-----\n"; |
ccli8 |
1:5ffad9f24d63 | 104 | |
ccli8 |
1:5ffad9f24d63 | 105 | #if AWS_IOT_MQTT_TEST |
ccli8 |
1:5ffad9f24d63 | 106 | |
ccli8 |
44:2f9dc54e7f95 | 107 | #define AWS_IOT_MQTT_SERVER_NAME "a1fljoeglhtf61-ats.iot.us-east-2.amazonaws.com" |
ccli8 |
1:5ffad9f24d63 | 108 | #define AWS_IOT_MQTT_SERVER_PORT 8883 |
ccli8 |
1:5ffad9f24d63 | 109 | |
ccli8 |
1:5ffad9f24d63 | 110 | #define AWS_IOT_MQTT_THINGNAME "Nuvoton-Mbed-D001" |
ccli8 |
1:5ffad9f24d63 | 111 | #define AWS_IOT_MQTT_CLIENTNAME "Nuvoton Client" |
ccli8 |
1:5ffad9f24d63 | 112 | |
ccli8 |
1:5ffad9f24d63 | 113 | /* User self-test topic */ |
ccli8 |
1:5ffad9f24d63 | 114 | const char USER_MQTT_TOPIC[] = "Nuvoton/Mbed/D001"; |
ccli8 |
1:5ffad9f24d63 | 115 | const char *USER_MQTT_TOPIC_FILTERS[] = { |
ccli8 |
1:5ffad9f24d63 | 116 | "Nuvoton/Mbed/+" |
ccli8 |
1:5ffad9f24d63 | 117 | }; |
ccli8 |
1:5ffad9f24d63 | 118 | const char USER_MQTT_TOPIC_PUBLISH_MESSAGE[] = "{ \"message\": \"Hello from Nuvoton Mbed device\" }"; |
ccli8 |
1:5ffad9f24d63 | 119 | |
ccli8 |
1:5ffad9f24d63 | 120 | /* Update thing shadow */ |
ccli8 |
1:5ffad9f24d63 | 121 | const char UPDATETHINGSHADOW_MQTT_TOPIC[] = "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/update"; |
ccli8 |
1:5ffad9f24d63 | 122 | const char *UPDATETHINGSHADOW_MQTT_TOPIC_FILTERS[] = { |
ccli8 |
1:5ffad9f24d63 | 123 | "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/update/accepted", |
ccli8 |
1:5ffad9f24d63 | 124 | "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/update/rejected" |
ccli8 |
1:5ffad9f24d63 | 125 | }; |
ccli8 |
1:5ffad9f24d63 | 126 | const char UPDATETHINGSHADOW_MQTT_TOPIC_PUBLISH_MESSAGE[] = "{ \"state\": { \"reported\": { \"attribute1\": 3, \"attribute2\": \"1\" } } }"; |
ccli8 |
1:5ffad9f24d63 | 127 | |
ccli8 |
1:5ffad9f24d63 | 128 | /* Get thing shadow */ |
ccli8 |
1:5ffad9f24d63 | 129 | const char GETTHINGSHADOW_MQTT_TOPIC[] = "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/get"; |
ccli8 |
1:5ffad9f24d63 | 130 | const char *GETTHINGSHADOW_MQTT_TOPIC_FILTERS[] = { |
ccli8 |
1:5ffad9f24d63 | 131 | "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/get/accepted", |
ccli8 |
1:5ffad9f24d63 | 132 | "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/get/rejected" |
ccli8 |
1:5ffad9f24d63 | 133 | }; |
ccli8 |
1:5ffad9f24d63 | 134 | const char GETTHINGSHADOW_MQTT_TOPIC_PUBLISH_MESSAGE[] = ""; |
ccli8 |
1:5ffad9f24d63 | 135 | |
ccli8 |
1:5ffad9f24d63 | 136 | /* Delete thing shadow */ |
ccli8 |
1:5ffad9f24d63 | 137 | const char DELETETHINGSHADOW_MQTT_TOPIC[] = "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/delete"; |
ccli8 |
1:5ffad9f24d63 | 138 | const char *DELETETHINGSHADOW_MQTT_TOPIC_FILTERS[] = { |
ccli8 |
1:5ffad9f24d63 | 139 | "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/delete/accepted", |
ccli8 |
1:5ffad9f24d63 | 140 | "$aws/things/" AWS_IOT_MQTT_THINGNAME "/shadow/delete/rejected" |
ccli8 |
1:5ffad9f24d63 | 141 | }; |
ccli8 |
1:5ffad9f24d63 | 142 | const char DELETETHINGSHADOW_MQTT_TOPIC_PUBLISH_MESSAGE[] = ""; |
ccli8 |
1:5ffad9f24d63 | 143 | |
ccli8 |
1:5ffad9f24d63 | 144 | /* MQTT user buffer size */ |
ccli8 |
1:5ffad9f24d63 | 145 | const int MQTT_USER_BUFFER_SIZE = 600; |
ccli8 |
1:5ffad9f24d63 | 146 | |
ccli8 |
1:5ffad9f24d63 | 147 | /* Configure MAX_MQTT_PACKET_SIZE to meet your application. |
ccli8 |
1:5ffad9f24d63 | 148 | * We may meet unknown MQTT error with MAX_MQTT_PACKET_SIZE too small, but |
ccli8 |
1:5ffad9f24d63 | 149 | * MQTT lib doesn't tell enough error message. Try to enlarge it. */ |
ccli8 |
1:5ffad9f24d63 | 150 | const int MAX_MQTT_PACKET_SIZE = 1000; |
ccli8 |
1:5ffad9f24d63 | 151 | |
ccli8 |
35:36578356ed8a | 152 | /* Timeout for receiving message with subscribed topic */ |
ccli8 |
35:36578356ed8a | 153 | const int MQTT_RECEIVE_MESSAGE_WITH_SUBSCRIBED_TOPIC_TIMEOUT_MS = 5000; |
ccli8 |
35:36578356ed8a | 154 | |
ccli8 |
1:5ffad9f24d63 | 155 | #endif // End of AWS_IOT_MQTT_TEST |
ccli8 |
1:5ffad9f24d63 | 156 | |
ccli8 |
1:5ffad9f24d63 | 157 | #if AWS_IOT_HTTPS_TEST |
ccli8 |
1:5ffad9f24d63 | 158 | |
ccli8 |
44:2f9dc54e7f95 | 159 | #define AWS_IOT_HTTPS_SERVER_NAME "a1fljoeglhtf61-ats.iot.us-east-2.amazonaws.com" |
ccli8 |
1:5ffad9f24d63 | 160 | #define AWS_IOT_HTTPS_SERVER_PORT 8443 |
ccli8 |
1:5ffad9f24d63 | 161 | |
ccli8 |
1:5ffad9f24d63 | 162 | #define AWS_IOT_HTTPS_THINGNAME "Nuvoton-Mbed-D001" |
ccli8 |
1:5ffad9f24d63 | 163 | |
ccli8 |
1:5ffad9f24d63 | 164 | /* Publish to user topic through HTTPS/POST |
ccli8 |
1:5ffad9f24d63 | 165 | * HTTP POST https://"endpoint"/topics/"yourTopicHierarchy" */ |
ccli8 |
1:5ffad9f24d63 | 166 | const char USER_TOPIC_HTTPS_PATH[] = "/topics/Nuvoton/Mbed/D001?qos=1"; |
ccli8 |
1:5ffad9f24d63 | 167 | const char USER_TOPIC_HTTPS_REQUEST_METHOD[] = "POST"; |
ccli8 |
1:5ffad9f24d63 | 168 | const char USER_TOPIC_HTTPS_REQUEST_MESSAGE_BODY[] = "{ \"message\": \"Hello from Nuvoton Mbed device\" }"; |
ccli8 |
1:5ffad9f24d63 | 169 | |
ccli8 |
1:5ffad9f24d63 | 170 | /* Update thing shadow by publishing to UpdateThingShadow topic through HTTPS/POST |
ccli8 |
1:5ffad9f24d63 | 171 | * HTTP POST https://"endpoint"/topics/$aws/things/"thingName"/shadow/update */ |
ccli8 |
1:5ffad9f24d63 | 172 | const char UPDATETHINGSHADOW_TOPIC_HTTPS_PATH[] = "/topics/$aws/things/" AWS_IOT_HTTPS_THINGNAME "/shadow/update?qos=1"; |
ccli8 |
1:5ffad9f24d63 | 173 | const char UPDATETHINGSHADOW_TOPIC_HTTPS_REQUEST_METHOD[] = "POST"; |
ccli8 |
1:5ffad9f24d63 | 174 | const char UPDATETHINGSHADOW_TOPIC_HTTPS_REQUEST_MESSAGE_BODY[] = "{ \"state\": { \"reported\": { \"attribute1\": 3, \"attribute2\": \"1\" } } }"; |
ccli8 |
1:5ffad9f24d63 | 175 | |
ccli8 |
1:5ffad9f24d63 | 176 | /* Get thing shadow by publishing to GetThingShadow topic through HTTPS/POST |
ccli8 |
1:5ffad9f24d63 | 177 | * HTTP POST https://"endpoint"/topics/$aws/things/"thingName"/shadow/get */ |
ccli8 |
1:5ffad9f24d63 | 178 | const char GETTHINGSHADOW_TOPIC_HTTPS_PATH[] = "/topics/$aws/things/" AWS_IOT_HTTPS_THINGNAME "/shadow/get?qos=1"; |
ccli8 |
1:5ffad9f24d63 | 179 | const char GETTHINGSHADOW_TOPIC_HTTPS_REQUEST_METHOD[] = "POST"; |
ccli8 |
1:5ffad9f24d63 | 180 | const char GETTHINGSHADOW_TOPIC_HTTPS_REQUEST_MESSAGE_BODY[] = ""; |
ccli8 |
1:5ffad9f24d63 | 181 | |
ccli8 |
1:5ffad9f24d63 | 182 | /* Delete thing shadow by publishing to DeleteThingShadow topic through HTTPS/POST |
ccli8 |
1:5ffad9f24d63 | 183 | * HTTP POST https://"endpoint"/topics/$aws/things/"thingName"/shadow/delete */ |
ccli8 |
1:5ffad9f24d63 | 184 | const char DELETETHINGSHADOW_TOPIC_HTTPS_PATH[] = "/topics/$aws/things/" AWS_IOT_HTTPS_THINGNAME "/shadow/delete?qos=1"; |
ccli8 |
1:5ffad9f24d63 | 185 | const char DELETETHINGSHADOW_TOPIC_HTTPS_REQUEST_METHOD[] = "POST"; |
ccli8 |
1:5ffad9f24d63 | 186 | const char DELETETHINGSHADOW_TOPIC_HTTPS_REQUEST_MESSAGE_BODY[] = ""; |
ccli8 |
1:5ffad9f24d63 | 187 | |
ccli8 |
1:5ffad9f24d63 | 188 | /* Update thing shadow RESTfully through HTTPS/POST |
ccli8 |
1:5ffad9f24d63 | 189 | * HTTP POST https://endpoint/things/thingName/shadow */ |
ccli8 |
1:5ffad9f24d63 | 190 | const char UPDATETHINGSHADOW_THING_HTTPS_PATH[] = "/things/" AWS_IOT_HTTPS_THINGNAME "/shadow"; |
ccli8 |
1:5ffad9f24d63 | 191 | const char UPDATETHINGSHADOW_THING_HTTPS_REQUEST_METHOD[] = "POST"; |
ccli8 |
1:5ffad9f24d63 | 192 | const char UPDATETHINGSHADOW_THING_HTTPS_REQUEST_MESSAGE_BODY[] = "{ \"state\": { \"desired\": { \"attribute1\": 1, \"attribute2\": \"2\" }, \"reported\": { \"attribute1\": 2, \"attribute2\": \"1\" } } }"; |
ccli8 |
1:5ffad9f24d63 | 193 | |
ccli8 |
1:5ffad9f24d63 | 194 | /* Get thing shadow RESTfully through HTTPS/GET |
ccli8 |
1:5ffad9f24d63 | 195 | * HTTP GET https://"endpoint"/things/"thingName"/shadow */ |
ccli8 |
1:5ffad9f24d63 | 196 | const char GETTHINGSHADOW_THING_HTTPS_PATH[] = "/things/" AWS_IOT_HTTPS_THINGNAME "/shadow"; |
ccli8 |
1:5ffad9f24d63 | 197 | const char GETTHINGSHADOW_THING_HTTPS_REQUEST_METHOD[] = "GET"; |
ccli8 |
1:5ffad9f24d63 | 198 | const char GETTHINGSHADOW_THING_HTTPS_REQUEST_MESSAGE_BODY[] = ""; |
ccli8 |
1:5ffad9f24d63 | 199 | |
ccli8 |
1:5ffad9f24d63 | 200 | /* Delete thing shadow RESTfully through HTTPS/DELETE |
ccli8 |
1:5ffad9f24d63 | 201 | * HTTP DELETE https://endpoint/things/thingName/shadow */ |
ccli8 |
1:5ffad9f24d63 | 202 | const char DELETETHINGSHADOW_THING_HTTPS_PATH[] = "/things/" AWS_IOT_HTTPS_THINGNAME "/shadow"; |
ccli8 |
1:5ffad9f24d63 | 203 | const char DELETETHINGSHADOW_THING_HTTPS_REQUEST_METHOD[] = "DELETE"; |
ccli8 |
1:5ffad9f24d63 | 204 | const char DELETETHINGSHADOW_THING_HTTPS_REQUEST_MESSAGE_BODY[] = ""; |
ccli8 |
1:5ffad9f24d63 | 205 | |
ccli8 |
1:5ffad9f24d63 | 206 | /* HTTPS user buffer size */ |
ccli8 |
1:5ffad9f24d63 | 207 | const int HTTPS_USER_BUFFER_SIZE = 600; |
ccli8 |
1:5ffad9f24d63 | 208 | |
ccli8 |
1:5ffad9f24d63 | 209 | const char *HTTPS_OK_STR = "200 OK"; |
ccli8 |
1:5ffad9f24d63 | 210 | |
ccli8 |
1:5ffad9f24d63 | 211 | #endif // End of AWS_IOT_HTTPS_TEST |
ccli8 |
1:5ffad9f24d63 | 212 | |
ccli8 |
1:5ffad9f24d63 | 213 | } |
ccli8 |
1:5ffad9f24d63 | 214 | |
ccli8 |
1:5ffad9f24d63 | 215 | #if AWS_IOT_MQTT_TEST |
ccli8 |
1:5ffad9f24d63 | 216 | |
ccli8 |
1:5ffad9f24d63 | 217 | /** |
ccli8 |
1:5ffad9f24d63 | 218 | * /brief AWS_IoT_MQTT_Test implements the logic with AWS IoT User/Thing Shadow topics through MQTT. |
ccli8 |
1:5ffad9f24d63 | 219 | */ |
ccli8 |
1:5ffad9f24d63 | 220 | class AWS_IoT_MQTT_Test { |
ccli8 |
1:5ffad9f24d63 | 221 | |
ccli8 |
1:5ffad9f24d63 | 222 | public: |
ccli8 |
1:5ffad9f24d63 | 223 | /** |
ccli8 |
1:5ffad9f24d63 | 224 | * @brief AWS_IoT_MQTT_Test Constructor |
ccli8 |
1:5ffad9f24d63 | 225 | * |
ccli8 |
1:5ffad9f24d63 | 226 | * @param[in] domain Domain name of the MQTT server |
ccli8 |
1:5ffad9f24d63 | 227 | * @param[in] port Port number of the MQTT server |
ccli8 |
1:5ffad9f24d63 | 228 | * @param[in] net_iface Network interface |
ccli8 |
1:5ffad9f24d63 | 229 | */ |
ccli8 |
1:5ffad9f24d63 | 230 | AWS_IoT_MQTT_Test(const char * domain, const uint16_t port, NetworkInterface *net_iface) : |
ccli8 |
41:b878d7cd7035 | 231 | _domain(domain), _port(port), _net_iface(net_iface) { |
ccli8 |
41:b878d7cd7035 | 232 | _tlssocket = new MyTLSSocket; |
ccli8 |
17:6f0ff065cd76 | 233 | _mqtt_client = new MQTT::Client<MyTLSSocket, Countdown, MAX_MQTT_PACKET_SIZE>(*_tlssocket); |
ccli8 |
1:5ffad9f24d63 | 234 | } |
ccli8 |
1:5ffad9f24d63 | 235 | |
ccli8 |
1:5ffad9f24d63 | 236 | /** |
ccli8 |
1:5ffad9f24d63 | 237 | * @brief AWS_IoT_MQTT_Test Destructor |
ccli8 |
1:5ffad9f24d63 | 238 | */ |
ccli8 |
1:5ffad9f24d63 | 239 | ~AWS_IoT_MQTT_Test() { |
ccli8 |
1:5ffad9f24d63 | 240 | delete _mqtt_client; |
ccli8 |
1:5ffad9f24d63 | 241 | _mqtt_client = NULL; |
ccli8 |
1:5ffad9f24d63 | 242 | |
ccli8 |
1:5ffad9f24d63 | 243 | _tlssocket->close(); |
ccli8 |
1:5ffad9f24d63 | 244 | delete _tlssocket; |
ccli8 |
1:5ffad9f24d63 | 245 | _tlssocket = NULL; |
ccli8 |
1:5ffad9f24d63 | 246 | } |
ccli8 |
1:5ffad9f24d63 | 247 | /** |
ccli8 |
1:5ffad9f24d63 | 248 | * @brief Start AWS IoT test through MQTT |
ccli8 |
1:5ffad9f24d63 | 249 | */ |
ccli8 |
1:5ffad9f24d63 | 250 | void start_test() { |
ccli8 |
1:5ffad9f24d63 | 251 | |
ccli8 |
1:5ffad9f24d63 | 252 | int tls_rc; |
ccli8 |
1:5ffad9f24d63 | 253 | int mqtt_rc; |
ccli8 |
41:b878d7cd7035 | 254 | |
ccli8 |
1:5ffad9f24d63 | 255 | do { |
ccli8 |
41:b878d7cd7035 | 256 | /* Set host name of the remote host, used for certificate checking */ |
ccli8 |
41:b878d7cd7035 | 257 | _tlssocket->set_hostname(_domain); |
ccli8 |
41:b878d7cd7035 | 258 | |
ccli8 |
41:b878d7cd7035 | 259 | /* Set the certification of Root CA */ |
ccli8 |
41:b878d7cd7035 | 260 | tls_rc = _tlssocket->set_root_ca_cert(SSL_CA_CERT_PEM); |
ccli8 |
41:b878d7cd7035 | 261 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 262 | printf("TLSSocket::set_root_ca_cert(...) returned %d\n", tls_rc); |
ccli8 |
41:b878d7cd7035 | 263 | break; |
ccli8 |
41:b878d7cd7035 | 264 | } |
ccli8 |
41:b878d7cd7035 | 265 | |
ccli8 |
41:b878d7cd7035 | 266 | /* Set client certificate and client private key */ |
ccli8 |
41:b878d7cd7035 | 267 | tls_rc = _tlssocket->set_client_cert_key(SSL_USER_CERT_PEM, SSL_USER_PRIV_KEY_PEM); |
ccli8 |
41:b878d7cd7035 | 268 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 269 | printf("TLSSocket::set_client_cert_key(...) returned %d\n", tls_rc); |
ccli8 |
41:b878d7cd7035 | 270 | break; |
ccli8 |
41:b878d7cd7035 | 271 | } |
ccli8 |
41:b878d7cd7035 | 272 | |
ccli8 |
41:b878d7cd7035 | 273 | /* Blocking mode */ |
ccli8 |
41:b878d7cd7035 | 274 | _tlssocket->set_blocking(true); |
ccli8 |
41:b878d7cd7035 | 275 | |
ccli8 |
41:b878d7cd7035 | 276 | /* Open a network socket on the network stack of the given network interface */ |
ccli8 |
41:b878d7cd7035 | 277 | printf("Opening network socket on network stack\n"); |
ccli8 |
41:b878d7cd7035 | 278 | tls_rc = _tlssocket->open(_net_iface); |
ccli8 |
41:b878d7cd7035 | 279 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 280 | printf("Opens network socket on network stack failed: %d\n", tls_rc); |
ccli8 |
41:b878d7cd7035 | 281 | break; |
ccli8 |
41:b878d7cd7035 | 282 | } |
ccli8 |
41:b878d7cd7035 | 283 | printf("Opens network socket on network stack OK\n"); |
ccli8 |
41:b878d7cd7035 | 284 | |
ccli8 |
41:b878d7cd7035 | 285 | /* DNS resolution */ |
ccli8 |
41:b878d7cd7035 | 286 | printf("DNS resolution for %s...\n", _domain); |
ccli8 |
41:b878d7cd7035 | 287 | SocketAddress sockaddr; |
ccli8 |
41:b878d7cd7035 | 288 | tls_rc = _net_iface->gethostbyname(_domain, &sockaddr); |
ccli8 |
41:b878d7cd7035 | 289 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 290 | printf("DNS resolution for %s failed with %d\n", _domain, tls_rc); |
ccli8 |
41:b878d7cd7035 | 291 | break; |
ccli8 |
41:b878d7cd7035 | 292 | } |
ccli8 |
41:b878d7cd7035 | 293 | sockaddr.set_port(_port); |
ccli8 |
41:b878d7cd7035 | 294 | printf("DNS resolution for %s: %s:%d\n", _domain, sockaddr.get_ip_address(), sockaddr.get_port()); |
ccli8 |
41:b878d7cd7035 | 295 | |
ccli8 |
1:5ffad9f24d63 | 296 | /* Connect to the server */ |
ccli8 |
1:5ffad9f24d63 | 297 | /* Initialize TLS-related stuff */ |
ccli8 |
1:5ffad9f24d63 | 298 | printf("Connecting with %s:%d\n", _domain, _port); |
ccli8 |
41:b878d7cd7035 | 299 | tls_rc = _tlssocket->connect(sockaddr); |
ccli8 |
1:5ffad9f24d63 | 300 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
3:4c8cccd32e34 | 301 | printf("Connects with %s:%d failed: %d\n", _domain, _port, tls_rc); |
ccli8 |
1:5ffad9f24d63 | 302 | break; |
ccli8 |
1:5ffad9f24d63 | 303 | } |
ccli8 |
1:5ffad9f24d63 | 304 | printf("Connects with %s:%d OK\n", _domain, _port); |
ccli8 |
41:b878d7cd7035 | 305 | |
ccli8 |
1:5ffad9f24d63 | 306 | /* See the link below for AWS IoT support for MQTT: |
ccli8 |
1:5ffad9f24d63 | 307 | * http://docs.aws.amazon.com/iot/latest/developerguide/protocols.html */ |
ccli8 |
41:b878d7cd7035 | 308 | |
ccli8 |
1:5ffad9f24d63 | 309 | /* MQTT connect */ |
ccli8 |
1:5ffad9f24d63 | 310 | /* The message broker does not support persistent sessions (connections made with |
ccli8 |
1:5ffad9f24d63 | 311 | * the cleanSession flag set to false. */ |
ccli8 |
1:5ffad9f24d63 | 312 | MQTTPacket_connectData conn_data = MQTTPacket_connectData_initializer; |
ccli8 |
1:5ffad9f24d63 | 313 | /* AWS IoT message broker implementation is based on MQTT version 3.1.1 |
ccli8 |
1:5ffad9f24d63 | 314 | * 3 = 3.1 |
ccli8 |
1:5ffad9f24d63 | 315 | * 4 = 3.1.1 */ |
ccli8 |
1:5ffad9f24d63 | 316 | conn_data.MQTTVersion = 4; |
ccli8 |
1:5ffad9f24d63 | 317 | /* Version number of this structure. Must be 0 */ |
ccli8 |
1:5ffad9f24d63 | 318 | conn_data.struct_version = 0; |
ccli8 |
1:5ffad9f24d63 | 319 | /* The message broker uses the client ID to identify each client. The client ID is passed |
ccli8 |
1:5ffad9f24d63 | 320 | * in from the client to the message broker as part of the MQTT payload. Two clients with |
ccli8 |
1:5ffad9f24d63 | 321 | * the same client ID are not allowed to be connected concurrently to the message broker. |
ccli8 |
1:5ffad9f24d63 | 322 | * When a client connects to the message broker using a client ID that another client is using, |
ccli8 |
1:5ffad9f24d63 | 323 | * a CONNACK message will be sent to both clients and the currently connected client will be |
ccli8 |
1:5ffad9f24d63 | 324 | * disconnected. */ |
ccli8 |
1:5ffad9f24d63 | 325 | conn_data.clientID.cstring = AWS_IOT_MQTT_CLIENTNAME; |
ccli8 |
1:5ffad9f24d63 | 326 | /* The message broker does not support persistent sessions (connections made with |
ccli8 |
1:5ffad9f24d63 | 327 | * the cleanSession flag set to false. The AWS IoT message broker assumes all sessions |
ccli8 |
1:5ffad9f24d63 | 328 | * are clean sessions and messages are not stored across sessions. If an MQTT client |
ccli8 |
1:5ffad9f24d63 | 329 | * attempts to connect to the AWS IoT message broker with the cleanSession set to false, |
ccli8 |
1:5ffad9f24d63 | 330 | * the client will be disconnected. */ |
ccli8 |
1:5ffad9f24d63 | 331 | conn_data.cleansession = 1; |
ccli8 |
1:5ffad9f24d63 | 332 | //conn_data.username.cstring = "USERNAME"; |
ccli8 |
1:5ffad9f24d63 | 333 | //conn_data.password.cstring = "PASSWORD"; |
ccli8 |
41:b878d7cd7035 | 334 | |
ccli8 |
1:5ffad9f24d63 | 335 | MQTT::connackData connack_data; |
ccli8 |
41:b878d7cd7035 | 336 | |
ccli8 |
1:5ffad9f24d63 | 337 | /* _tlssocket must connect to the network endpoint before calling this. */ |
ccli8 |
1:5ffad9f24d63 | 338 | printf("MQTT connecting"); |
ccli8 |
1:5ffad9f24d63 | 339 | if ((mqtt_rc = _mqtt_client->connect(conn_data, connack_data)) != 0) { |
ccli8 |
1:5ffad9f24d63 | 340 | printf("\rMQTT connects failed: %d\n", mqtt_rc); |
ccli8 |
1:5ffad9f24d63 | 341 | break; |
ccli8 |
1:5ffad9f24d63 | 342 | } |
ccli8 |
1:5ffad9f24d63 | 343 | printf("\rMQTT connects OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 344 | |
ccli8 |
1:5ffad9f24d63 | 345 | /* Subscribe/publish user topic */ |
ccli8 |
1:5ffad9f24d63 | 346 | printf("Subscribing/publishing user topic\n"); |
ccli8 |
1:5ffad9f24d63 | 347 | if (! sub_pub_topic(USER_MQTT_TOPIC, USER_MQTT_TOPIC_FILTERS, sizeof (USER_MQTT_TOPIC_FILTERS) / sizeof (USER_MQTT_TOPIC_FILTERS[0]), USER_MQTT_TOPIC_PUBLISH_MESSAGE)) { |
ccli8 |
1:5ffad9f24d63 | 348 | break; |
ccli8 |
1:5ffad9f24d63 | 349 | } |
ccli8 |
1:5ffad9f24d63 | 350 | printf("Subscribes/publishes user topic OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 351 | |
ccli8 |
1:5ffad9f24d63 | 352 | /* Subscribe/publish UpdateThingShadow topic */ |
ccli8 |
1:5ffad9f24d63 | 353 | printf("Subscribing/publishing UpdateThingShadow topic\n"); |
ccli8 |
1:5ffad9f24d63 | 354 | if (! sub_pub_topic(UPDATETHINGSHADOW_MQTT_TOPIC, UPDATETHINGSHADOW_MQTT_TOPIC_FILTERS, sizeof (UPDATETHINGSHADOW_MQTT_TOPIC_FILTERS) / sizeof (UPDATETHINGSHADOW_MQTT_TOPIC_FILTERS[0]), UPDATETHINGSHADOW_MQTT_TOPIC_PUBLISH_MESSAGE)) { |
ccli8 |
1:5ffad9f24d63 | 355 | break; |
ccli8 |
1:5ffad9f24d63 | 356 | } |
ccli8 |
1:5ffad9f24d63 | 357 | printf("Subscribes/publishes UpdateThingShadow topic OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 358 | |
ccli8 |
1:5ffad9f24d63 | 359 | /* Subscribe/publish GetThingShadow topic */ |
ccli8 |
1:5ffad9f24d63 | 360 | printf("Subscribing/publishing GetThingShadow topic\n"); |
ccli8 |
1:5ffad9f24d63 | 361 | if (! sub_pub_topic(GETTHINGSHADOW_MQTT_TOPIC, GETTHINGSHADOW_MQTT_TOPIC_FILTERS, sizeof (GETTHINGSHADOW_MQTT_TOPIC_FILTERS) / sizeof (GETTHINGSHADOW_MQTT_TOPIC_FILTERS[0]), GETTHINGSHADOW_MQTT_TOPIC_PUBLISH_MESSAGE)) { |
ccli8 |
1:5ffad9f24d63 | 362 | break; |
ccli8 |
1:5ffad9f24d63 | 363 | } |
ccli8 |
1:5ffad9f24d63 | 364 | printf("Subscribes/publishes GetThingShadow topic OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 365 | |
ccli8 |
1:5ffad9f24d63 | 366 | /* Subscribe/publish DeleteThingShadow topic */ |
ccli8 |
1:5ffad9f24d63 | 367 | printf("Subscribing/publishing DeleteThingShadow topic\n"); |
ccli8 |
1:5ffad9f24d63 | 368 | if (! sub_pub_topic(DELETETHINGSHADOW_MQTT_TOPIC, DELETETHINGSHADOW_MQTT_TOPIC_FILTERS, sizeof (DELETETHINGSHADOW_MQTT_TOPIC_FILTERS) / sizeof (DELETETHINGSHADOW_MQTT_TOPIC_FILTERS[0]), DELETETHINGSHADOW_MQTT_TOPIC_PUBLISH_MESSAGE)) { |
ccli8 |
1:5ffad9f24d63 | 369 | break; |
ccli8 |
1:5ffad9f24d63 | 370 | } |
ccli8 |
1:5ffad9f24d63 | 371 | printf("Subscribes/publishes DeleteThingShadow topic OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 372 | |
ccli8 |
1:5ffad9f24d63 | 373 | } while (0); |
ccli8 |
41:b878d7cd7035 | 374 | |
ccli8 |
1:5ffad9f24d63 | 375 | printf("MQTT disconnecting"); |
ccli8 |
1:5ffad9f24d63 | 376 | if ((mqtt_rc = _mqtt_client->disconnect()) != 0) { |
ccli8 |
23:5111e398e651 | 377 | printf("\rMQTT disconnects failed %d\n\n", mqtt_rc); |
ccli8 |
1:5ffad9f24d63 | 378 | } |
ccli8 |
23:5111e398e651 | 379 | printf("\rMQTT disconnects OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 380 | |
ccli8 |
1:5ffad9f24d63 | 381 | _tlssocket->close(); |
ccli8 |
1:5ffad9f24d63 | 382 | } |
ccli8 |
1:5ffad9f24d63 | 383 | |
ccli8 |
1:5ffad9f24d63 | 384 | protected: |
ccli8 |
1:5ffad9f24d63 | 385 | |
ccli8 |
1:5ffad9f24d63 | 386 | /** |
ccli8 |
1:5ffad9f24d63 | 387 | * @brief Subscribe/publish specific topic |
ccli8 |
1:5ffad9f24d63 | 388 | */ |
ccli8 |
1:5ffad9f24d63 | 389 | bool sub_pub_topic(const char *topic, const char **topic_filters, size_t topic_filters_size, const char *publish_message_body) { |
ccli8 |
41:b878d7cd7035 | 390 | |
ccli8 |
1:5ffad9f24d63 | 391 | bool ret = false; |
ccli8 |
1:5ffad9f24d63 | 392 | int mqtt_rc; |
ccli8 |
41:b878d7cd7035 | 393 | |
ccli8 |
1:5ffad9f24d63 | 394 | do { |
ccli8 |
1:5ffad9f24d63 | 395 | const char **topic_filter; |
ccli8 |
1:5ffad9f24d63 | 396 | const char **topic_filter_end = topic_filters + topic_filters_size; |
ccli8 |
1:5ffad9f24d63 | 397 | |
ccli8 |
1:5ffad9f24d63 | 398 | for (topic_filter = topic_filters; topic_filter != topic_filter_end; topic_filter ++) { |
ccli8 |
1:5ffad9f24d63 | 399 | /* AWS IoT does not support publishing and subscribing with QoS 2. |
ccli8 |
1:5ffad9f24d63 | 400 | * The AWS IoT message broker does not send a PUBACK or SUBACK when QoS 2 is requested. */ |
ccli8 |
1:5ffad9f24d63 | 401 | printf("MQTT subscribing to %s", *topic_filter); |
ccli8 |
1:5ffad9f24d63 | 402 | if ((mqtt_rc = _mqtt_client->subscribe(*topic_filter, MQTT::QOS1, message_arrived)) != 0) { |
ccli8 |
1:5ffad9f24d63 | 403 | printf("\rMQTT subscribes to %s failed: %d\n", *topic_filter, mqtt_rc); |
ccli8 |
1:5ffad9f24d63 | 404 | continue; |
ccli8 |
1:5ffad9f24d63 | 405 | } |
ccli8 |
1:5ffad9f24d63 | 406 | printf("\rMQTT subscribes to %s OK\n", *topic_filter); |
ccli8 |
1:5ffad9f24d63 | 407 | } |
ccli8 |
1:5ffad9f24d63 | 408 | |
ccli8 |
35:36578356ed8a | 409 | /* Clear count of received message with subscribed topic */ |
ccli8 |
35:36578356ed8a | 410 | clear_message_arrive_count(); |
ccli8 |
35:36578356ed8a | 411 | |
ccli8 |
1:5ffad9f24d63 | 412 | MQTT::Message message; |
ccli8 |
1:5ffad9f24d63 | 413 | |
ccli8 |
1:5ffad9f24d63 | 414 | int _bpos; |
ccli8 |
41:b878d7cd7035 | 415 | |
ccli8 |
1:5ffad9f24d63 | 416 | _bpos = snprintf(_buffer, sizeof (_buffer) - 1, publish_message_body); |
ccli8 |
1:5ffad9f24d63 | 417 | if (_bpos < 0 || ((size_t) _bpos) > (sizeof (_buffer) - 1)) { |
ccli8 |
1:5ffad9f24d63 | 418 | printf("snprintf failed: %d\n", _bpos); |
ccli8 |
1:5ffad9f24d63 | 419 | break; |
ccli8 |
1:5ffad9f24d63 | 420 | } |
ccli8 |
1:5ffad9f24d63 | 421 | _buffer[_bpos] = 0; |
ccli8 |
1:5ffad9f24d63 | 422 | /* AWS IoT does not support publishing and subscribing with QoS 2. |
ccli8 |
1:5ffad9f24d63 | 423 | * The AWS IoT message broker does not send a PUBACK or SUBACK when QoS 2 is requested. */ |
ccli8 |
1:5ffad9f24d63 | 424 | message.qos = MQTT::QOS1; |
ccli8 |
1:5ffad9f24d63 | 425 | message.retained = false; |
ccli8 |
1:5ffad9f24d63 | 426 | message.dup = false; |
ccli8 |
1:5ffad9f24d63 | 427 | message.payload = _buffer; |
ccli8 |
1:5ffad9f24d63 | 428 | message.payloadlen = strlen(_buffer); |
ccli8 |
1:5ffad9f24d63 | 429 | /* Print publish message */ |
ccli8 |
1:5ffad9f24d63 | 430 | printf("Message to publish:\n"); |
ccli8 |
1:5ffad9f24d63 | 431 | printf("%s\n", _buffer); |
ccli8 |
1:5ffad9f24d63 | 432 | printf("MQTT publishing message to %s", topic); |
ccli8 |
1:5ffad9f24d63 | 433 | if ((mqtt_rc = _mqtt_client->publish(topic, message)) != 0) { |
ccli8 |
1:5ffad9f24d63 | 434 | printf("\rMQTT publishes message to %s failed: %d\n", topic, mqtt_rc); |
ccli8 |
1:5ffad9f24d63 | 435 | break; |
ccli8 |
1:5ffad9f24d63 | 436 | } |
ccli8 |
1:5ffad9f24d63 | 437 | printf("\rMQTT publishes message to %s OK\n", topic); |
ccli8 |
41:b878d7cd7035 | 438 | |
ccli8 |
1:5ffad9f24d63 | 439 | /* Receive message with subscribed topic */ |
ccli8 |
35:36578356ed8a | 440 | printf("MQTT receives message with subscribed %s...\n", topic); |
ccli8 |
35:36578356ed8a | 441 | Timer timer; |
ccli8 |
35:36578356ed8a | 442 | timer.start(); |
ccli8 |
1:5ffad9f24d63 | 443 | while (! _message_arrive_count) { |
ccli8 |
35:36578356ed8a | 444 | if (timer.read_ms() >= MQTT_RECEIVE_MESSAGE_WITH_SUBSCRIBED_TOPIC_TIMEOUT_MS) { |
ccli8 |
35:36578356ed8a | 445 | printf("MQTT receives message with subscribed %s TIMEOUT\n", topic); |
ccli8 |
35:36578356ed8a | 446 | break; |
ccli8 |
35:36578356ed8a | 447 | } |
ccli8 |
35:36578356ed8a | 448 | |
ccli8 |
1:5ffad9f24d63 | 449 | _mqtt_client->yield(100); |
ccli8 |
1:5ffad9f24d63 | 450 | } |
ccli8 |
35:36578356ed8a | 451 | if (_message_arrive_count) { |
ccli8 |
35:36578356ed8a | 452 | printf("MQTT receives message with subscribed %s OK\n", topic); |
ccli8 |
35:36578356ed8a | 453 | } |
ccli8 |
1:5ffad9f24d63 | 454 | printf("\n"); |
ccli8 |
1:5ffad9f24d63 | 455 | |
ccli8 |
1:5ffad9f24d63 | 456 | /* Unsubscribe |
ccli8 |
1:5ffad9f24d63 | 457 | * We meet second unsubscribe failed. This is caused by MQTT lib bug. */ |
ccli8 |
1:5ffad9f24d63 | 458 | for (topic_filter = topic_filters; topic_filter != topic_filter_end; topic_filter ++) { |
ccli8 |
1:5ffad9f24d63 | 459 | printf("MQTT unsubscribing from %s", *topic_filter); |
ccli8 |
1:5ffad9f24d63 | 460 | if ((mqtt_rc = _mqtt_client->unsubscribe(*topic_filter)) != 0) { |
ccli8 |
1:5ffad9f24d63 | 461 | printf("\rMQTT unsubscribes from %s failed: %d\n", *topic_filter, mqtt_rc); |
ccli8 |
1:5ffad9f24d63 | 462 | continue; |
ccli8 |
1:5ffad9f24d63 | 463 | } |
ccli8 |
1:5ffad9f24d63 | 464 | printf("\rMQTT unsubscribes from %s OK\n", *topic_filter); |
ccli8 |
1:5ffad9f24d63 | 465 | } |
ccli8 |
1:5ffad9f24d63 | 466 | |
ccli8 |
1:5ffad9f24d63 | 467 | ret = true; |
ccli8 |
41:b878d7cd7035 | 468 | |
ccli8 |
1:5ffad9f24d63 | 469 | } while (0); |
ccli8 |
41:b878d7cd7035 | 470 | |
ccli8 |
1:5ffad9f24d63 | 471 | return ret; |
ccli8 |
1:5ffad9f24d63 | 472 | } |
ccli8 |
41:b878d7cd7035 | 473 | |
ccli8 |
1:5ffad9f24d63 | 474 | protected: |
ccli8 |
17:6f0ff065cd76 | 475 | MyTLSSocket * _tlssocket; |
ccli8 |
17:6f0ff065cd76 | 476 | MQTT::Client<MyTLSSocket, Countdown, MAX_MQTT_PACKET_SIZE> * _mqtt_client; |
ccli8 |
1:5ffad9f24d63 | 477 | |
ccli8 |
1:5ffad9f24d63 | 478 | const char *_domain; /**< Domain name of the MQTT server */ |
ccli8 |
1:5ffad9f24d63 | 479 | const uint16_t _port; /**< Port number of the MQTT server */ |
ccli8 |
1:5ffad9f24d63 | 480 | char _buffer[MQTT_USER_BUFFER_SIZE]; /**< User buffer */ |
ccli8 |
41:b878d7cd7035 | 481 | NetworkInterface *_net_iface; |
ccli8 |
41:b878d7cd7035 | 482 | |
ccli8 |
1:5ffad9f24d63 | 483 | private: |
ccli8 |
1:5ffad9f24d63 | 484 | static volatile uint16_t _message_arrive_count; |
ccli8 |
1:5ffad9f24d63 | 485 | |
ccli8 |
1:5ffad9f24d63 | 486 | static void message_arrived(MQTT::MessageData& md) { |
ccli8 |
1:5ffad9f24d63 | 487 | MQTT::Message &message = md.message; |
ccli8 |
1:5ffad9f24d63 | 488 | printf("Message arrived: qos %d, retained %d, dup %d, packetid %d\r\n", message.qos, message.retained, message.dup, message.id); |
ccli8 |
1:5ffad9f24d63 | 489 | printf("Payload:\n"); |
ccli8 |
1:5ffad9f24d63 | 490 | printf("%.*s\n", message.payloadlen, (char*)message.payload); |
ccli8 |
1:5ffad9f24d63 | 491 | ++ _message_arrive_count; |
ccli8 |
1:5ffad9f24d63 | 492 | } |
ccli8 |
41:b878d7cd7035 | 493 | |
ccli8 |
1:5ffad9f24d63 | 494 | static void clear_message_arrive_count() { |
ccli8 |
1:5ffad9f24d63 | 495 | _message_arrive_count = 0; |
ccli8 |
1:5ffad9f24d63 | 496 | } |
ccli8 |
1:5ffad9f24d63 | 497 | }; |
ccli8 |
1:5ffad9f24d63 | 498 | |
ccli8 |
1:5ffad9f24d63 | 499 | volatile uint16_t AWS_IoT_MQTT_Test::_message_arrive_count = 0; |
ccli8 |
1:5ffad9f24d63 | 500 | |
ccli8 |
1:5ffad9f24d63 | 501 | #endif // End of AWS_IOT_MQTT_TEST |
ccli8 |
1:5ffad9f24d63 | 502 | |
ccli8 |
1:5ffad9f24d63 | 503 | |
ccli8 |
1:5ffad9f24d63 | 504 | #if AWS_IOT_HTTPS_TEST |
ccli8 |
1:5ffad9f24d63 | 505 | |
ccli8 |
1:5ffad9f24d63 | 506 | /** |
ccli8 |
1:5ffad9f24d63 | 507 | * /brief AWS_IoT_HTTPS_Test implements the logic with AWS IoT User/Thing Shadow topics (publish-only) |
ccli8 |
1:5ffad9f24d63 | 508 | * and Thing Shadow RESTful API through HTTPS. |
ccli8 |
1:5ffad9f24d63 | 509 | */ |
ccli8 |
1:5ffad9f24d63 | 510 | class AWS_IoT_HTTPS_Test { |
ccli8 |
1:5ffad9f24d63 | 511 | |
ccli8 |
1:5ffad9f24d63 | 512 | public: |
ccli8 |
1:5ffad9f24d63 | 513 | /** |
ccli8 |
1:5ffad9f24d63 | 514 | * @brief AWS_IoT_HTTPS_Test Constructor |
ccli8 |
1:5ffad9f24d63 | 515 | * |
ccli8 |
1:5ffad9f24d63 | 516 | * @param[in] domain Domain name of the HTTPS server |
ccli8 |
1:5ffad9f24d63 | 517 | * @param[in] port Port number of the HTTPS server |
ccli8 |
1:5ffad9f24d63 | 518 | * @param[in] net_iface Network interface |
ccli8 |
1:5ffad9f24d63 | 519 | */ |
ccli8 |
1:5ffad9f24d63 | 520 | AWS_IoT_HTTPS_Test(const char * domain, const uint16_t port, NetworkInterface *net_iface) : |
ccli8 |
41:b878d7cd7035 | 521 | _domain(domain), _port(port), _net_iface(net_iface) { |
ccli8 |
41:b878d7cd7035 | 522 | _tlssocket = new MyTLSSocket; |
ccli8 |
1:5ffad9f24d63 | 523 | } |
ccli8 |
1:5ffad9f24d63 | 524 | /** |
ccli8 |
1:5ffad9f24d63 | 525 | * @brief AWS_IoT_HTTPS_Test Destructor |
ccli8 |
1:5ffad9f24d63 | 526 | */ |
ccli8 |
1:5ffad9f24d63 | 527 | ~AWS_IoT_HTTPS_Test() { |
ccli8 |
1:5ffad9f24d63 | 528 | _tlssocket->close(); |
ccli8 |
1:5ffad9f24d63 | 529 | delete _tlssocket; |
ccli8 |
1:5ffad9f24d63 | 530 | _tlssocket = NULL; |
ccli8 |
1:5ffad9f24d63 | 531 | } |
ccli8 |
1:5ffad9f24d63 | 532 | /** |
ccli8 |
1:5ffad9f24d63 | 533 | * @brief Start AWS IoT test through HTTPS |
ccli8 |
1:5ffad9f24d63 | 534 | * |
ccli8 |
1:5ffad9f24d63 | 535 | * @param[in] path The path of the file to fetch from the HTTPS server |
ccli8 |
1:5ffad9f24d63 | 536 | */ |
ccli8 |
1:5ffad9f24d63 | 537 | void start_test() { |
ccli8 |
41:b878d7cd7035 | 538 | |
ccli8 |
1:5ffad9f24d63 | 539 | int tls_rc; |
ccli8 |
41:b878d7cd7035 | 540 | |
ccli8 |
1:5ffad9f24d63 | 541 | do { |
ccli8 |
41:b878d7cd7035 | 542 | /* Set host name of the remote host, used for certificate checking */ |
ccli8 |
41:b878d7cd7035 | 543 | _tlssocket->set_hostname(_domain); |
ccli8 |
41:b878d7cd7035 | 544 | |
ccli8 |
41:b878d7cd7035 | 545 | /* Set the certification of Root CA */ |
ccli8 |
41:b878d7cd7035 | 546 | tls_rc = _tlssocket->set_root_ca_cert(SSL_CA_CERT_PEM); |
ccli8 |
41:b878d7cd7035 | 547 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 548 | printf("TLSSocket::set_root_ca_cert(...) returned %d\n", tls_rc); |
ccli8 |
41:b878d7cd7035 | 549 | break; |
ccli8 |
41:b878d7cd7035 | 550 | } |
ccli8 |
41:b878d7cd7035 | 551 | |
ccli8 |
41:b878d7cd7035 | 552 | /* Set client certificate and client private key */ |
ccli8 |
41:b878d7cd7035 | 553 | tls_rc = _tlssocket->set_client_cert_key(SSL_USER_CERT_PEM, SSL_USER_PRIV_KEY_PEM); |
ccli8 |
41:b878d7cd7035 | 554 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 555 | printf("TLSSocket::set_client_cert_key(...) returned %d\n", tls_rc); |
ccli8 |
41:b878d7cd7035 | 556 | break; |
ccli8 |
41:b878d7cd7035 | 557 | } |
ccli8 |
41:b878d7cd7035 | 558 | |
ccli8 |
41:b878d7cd7035 | 559 | /* Open a network socket on the network stack of the given network interface */ |
ccli8 |
41:b878d7cd7035 | 560 | printf("Opening network socket on network stack\n"); |
ccli8 |
41:b878d7cd7035 | 561 | tls_rc = _tlssocket->open(_net_iface); |
ccli8 |
41:b878d7cd7035 | 562 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 563 | printf("Opens network socket on network stack failed: %d\n", tls_rc); |
ccli8 |
41:b878d7cd7035 | 564 | break; |
ccli8 |
41:b878d7cd7035 | 565 | } |
ccli8 |
41:b878d7cd7035 | 566 | printf("Opens network socket on network stack OK\n"); |
ccli8 |
41:b878d7cd7035 | 567 | |
ccli8 |
41:b878d7cd7035 | 568 | /* DNS resolution */ |
ccli8 |
41:b878d7cd7035 | 569 | printf("DNS resolution for %s...\n", _domain); |
ccli8 |
41:b878d7cd7035 | 570 | SocketAddress sockaddr; |
ccli8 |
41:b878d7cd7035 | 571 | tls_rc = _net_iface->gethostbyname(_domain, &sockaddr); |
ccli8 |
41:b878d7cd7035 | 572 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 573 | printf("DNS resolution for %s failed with %d\n", _domain, tls_rc); |
ccli8 |
41:b878d7cd7035 | 574 | break; |
ccli8 |
41:b878d7cd7035 | 575 | } |
ccli8 |
41:b878d7cd7035 | 576 | sockaddr.set_port(_port); |
ccli8 |
41:b878d7cd7035 | 577 | printf("DNS resolution for %s: %s:%d\n", _domain, sockaddr.get_ip_address(), sockaddr.get_port()); |
ccli8 |
41:b878d7cd7035 | 578 | |
ccli8 |
1:5ffad9f24d63 | 579 | /* Connect to the server */ |
ccli8 |
1:5ffad9f24d63 | 580 | /* Initialize TLS-related stuff */ |
ccli8 |
1:5ffad9f24d63 | 581 | printf("Connecting with %s:%d\n", _domain, _port); |
ccli8 |
41:b878d7cd7035 | 582 | tls_rc = _tlssocket->connect(sockaddr); |
ccli8 |
1:5ffad9f24d63 | 583 | if (tls_rc != NSAPI_ERROR_OK) { |
ccli8 |
3:4c8cccd32e34 | 584 | printf("Connects with %s:%d failed: %d\n", _domain, _port, tls_rc); |
ccli8 |
1:5ffad9f24d63 | 585 | break; |
ccli8 |
1:5ffad9f24d63 | 586 | } |
ccli8 |
41:b878d7cd7035 | 587 | printf("Connects with %s:%d OK\n", _domain, _port); |
ccli8 |
41:b878d7cd7035 | 588 | |
ccli8 |
41:b878d7cd7035 | 589 | /* Non-blocking mode |
ccli8 |
41:b878d7cd7035 | 590 | * |
ccli8 |
41:b878d7cd7035 | 591 | * Don't change to non-blocking mode before connect; otherwise, we may meet NSAPI_ERROR_IN_PROGRESS. |
ccli8 |
41:b878d7cd7035 | 592 | */ |
ccli8 |
41:b878d7cd7035 | 593 | _tlssocket->set_blocking(false); |
ccli8 |
1:5ffad9f24d63 | 594 | |
ccli8 |
1:5ffad9f24d63 | 595 | /* Publish to user topic through HTTPS/POST */ |
ccli8 |
1:5ffad9f24d63 | 596 | printf("Publishing to user topic through HTTPS/POST\n"); |
ccli8 |
1:5ffad9f24d63 | 597 | if (! run_req_resp(USER_TOPIC_HTTPS_PATH, USER_TOPIC_HTTPS_REQUEST_METHOD, USER_TOPIC_HTTPS_REQUEST_MESSAGE_BODY)) { |
ccli8 |
1:5ffad9f24d63 | 598 | break; |
ccli8 |
1:5ffad9f24d63 | 599 | } |
ccli8 |
1:5ffad9f24d63 | 600 | printf("Publishes to user topic through HTTPS/POST OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 601 | |
ccli8 |
1:5ffad9f24d63 | 602 | /* Update thing shadow by publishing to UpdateThingShadow topic through HTTPS/POST */ |
ccli8 |
1:5ffad9f24d63 | 603 | printf("Updating thing shadow by publishing to Update Thing Shadow topic through HTTPS/POST\n"); |
ccli8 |
1:5ffad9f24d63 | 604 | if (! run_req_resp(UPDATETHINGSHADOW_TOPIC_HTTPS_PATH, UPDATETHINGSHADOW_TOPIC_HTTPS_REQUEST_METHOD, UPDATETHINGSHADOW_TOPIC_HTTPS_REQUEST_MESSAGE_BODY)) { |
ccli8 |
1:5ffad9f24d63 | 605 | break; |
ccli8 |
1:5ffad9f24d63 | 606 | } |
ccli8 |
1:5ffad9f24d63 | 607 | printf("Update thing shadow by publishing to Update Thing Shadow topic through HTTPS/POST OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 608 | |
ccli8 |
1:5ffad9f24d63 | 609 | /* Get thing shadow by publishing to GetThingShadow topic through HTTPS/POST */ |
ccli8 |
1:5ffad9f24d63 | 610 | printf("Getting thing shadow by publishing to GetThingShadow topic through HTTPS/POST\n"); |
ccli8 |
1:5ffad9f24d63 | 611 | if (! run_req_resp(GETTHINGSHADOW_TOPIC_HTTPS_PATH, GETTHINGSHADOW_TOPIC_HTTPS_REQUEST_METHOD, GETTHINGSHADOW_TOPIC_HTTPS_REQUEST_MESSAGE_BODY)) { |
ccli8 |
1:5ffad9f24d63 | 612 | break; |
ccli8 |
1:5ffad9f24d63 | 613 | } |
ccli8 |
1:5ffad9f24d63 | 614 | printf("Get thing shadow by publishing to GetThingShadow topic through HTTPS/POST OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 615 | |
ccli8 |
1:5ffad9f24d63 | 616 | /* Delete thing shadow by publishing to DeleteThingShadow topic through HTTPS/POST */ |
ccli8 |
1:5ffad9f24d63 | 617 | printf("Deleting thing shadow by publishing to DeleteThingShadow topic through HTTPS/POST\n"); |
ccli8 |
1:5ffad9f24d63 | 618 | if (! run_req_resp(DELETETHINGSHADOW_TOPIC_HTTPS_PATH, DELETETHINGSHADOW_TOPIC_HTTPS_REQUEST_METHOD, DELETETHINGSHADOW_TOPIC_HTTPS_REQUEST_MESSAGE_BODY)) { |
ccli8 |
1:5ffad9f24d63 | 619 | break; |
ccli8 |
1:5ffad9f24d63 | 620 | } |
ccli8 |
1:5ffad9f24d63 | 621 | printf("Delete thing shadow by publishing to DeleteThingShadow topic through HTTPS/POST OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 622 | |
ccli8 |
1:5ffad9f24d63 | 623 | /* Update thing shadow RESTfully through HTTPS/POST */ |
ccli8 |
1:5ffad9f24d63 | 624 | printf("Updating thing shadow RESTfully through HTTPS/POST\n"); |
ccli8 |
1:5ffad9f24d63 | 625 | if (! run_req_resp(UPDATETHINGSHADOW_THING_HTTPS_PATH, UPDATETHINGSHADOW_THING_HTTPS_REQUEST_METHOD, UPDATETHINGSHADOW_THING_HTTPS_REQUEST_MESSAGE_BODY)) { |
ccli8 |
1:5ffad9f24d63 | 626 | break; |
ccli8 |
1:5ffad9f24d63 | 627 | } |
ccli8 |
1:5ffad9f24d63 | 628 | printf("Update thing shadow RESTfully through HTTPS/POST OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 629 | |
ccli8 |
1:5ffad9f24d63 | 630 | /* Get thing shadow RESTfully through HTTPS/GET */ |
ccli8 |
1:5ffad9f24d63 | 631 | printf("Getting thing shadow RESTfully through HTTPS/GET\n"); |
ccli8 |
1:5ffad9f24d63 | 632 | if (! run_req_resp(GETTHINGSHADOW_THING_HTTPS_PATH, GETTHINGSHADOW_THING_HTTPS_REQUEST_METHOD, GETTHINGSHADOW_THING_HTTPS_REQUEST_MESSAGE_BODY)) { |
ccli8 |
1:5ffad9f24d63 | 633 | break; |
ccli8 |
1:5ffad9f24d63 | 634 | } |
ccli8 |
1:5ffad9f24d63 | 635 | printf("Get thing shadow RESTfully through HTTPS/GET OK\n\n"); |
ccli8 |
41:b878d7cd7035 | 636 | |
ccli8 |
1:5ffad9f24d63 | 637 | /* Delete thing shadow RESTfully through HTTPS/DELETE */ |
ccli8 |
1:5ffad9f24d63 | 638 | printf("Deleting thing shadow RESTfully through HTTPS/DELETE\n"); |
ccli8 |
1:5ffad9f24d63 | 639 | if (! run_req_resp(DELETETHINGSHADOW_THING_HTTPS_PATH, DELETETHINGSHADOW_THING_HTTPS_REQUEST_METHOD, DELETETHINGSHADOW_THING_HTTPS_REQUEST_MESSAGE_BODY)) { |
ccli8 |
1:5ffad9f24d63 | 640 | break; |
ccli8 |
1:5ffad9f24d63 | 641 | } |
ccli8 |
1:5ffad9f24d63 | 642 | printf("Delete thing shadow RESTfully through HTTPS/DELETE OK\n\n"); |
ccli8 |
1:5ffad9f24d63 | 643 | |
ccli8 |
1:5ffad9f24d63 | 644 | } while (0); |
ccli8 |
1:5ffad9f24d63 | 645 | |
ccli8 |
1:5ffad9f24d63 | 646 | /* Close socket */ |
ccli8 |
1:5ffad9f24d63 | 647 | _tlssocket->close(); |
ccli8 |
1:5ffad9f24d63 | 648 | } |
ccli8 |
1:5ffad9f24d63 | 649 | |
ccli8 |
1:5ffad9f24d63 | 650 | protected: |
ccli8 |
1:5ffad9f24d63 | 651 | |
ccli8 |
1:5ffad9f24d63 | 652 | /** |
ccli8 |
1:5ffad9f24d63 | 653 | * @brief Run request/response through HTTPS |
ccli8 |
1:5ffad9f24d63 | 654 | */ |
ccli8 |
1:5ffad9f24d63 | 655 | bool run_req_resp(const char *https_path, const char *https_request_method, const char *https_request_message_body) { |
ccli8 |
41:b878d7cd7035 | 656 | |
ccli8 |
1:5ffad9f24d63 | 657 | bool ret = false; |
ccli8 |
41:b878d7cd7035 | 658 | |
ccli8 |
1:5ffad9f24d63 | 659 | do { |
ccli8 |
1:5ffad9f24d63 | 660 | int tls_rc; |
ccli8 |
1:5ffad9f24d63 | 661 | bool _got200 = false; |
ccli8 |
1:5ffad9f24d63 | 662 | |
ccli8 |
1:5ffad9f24d63 | 663 | int _bpos; |
ccli8 |
1:5ffad9f24d63 | 664 | |
ccli8 |
1:5ffad9f24d63 | 665 | /* Fill the request buffer */ |
ccli8 |
1:5ffad9f24d63 | 666 | _bpos = snprintf(_buffer, sizeof(_buffer) - 1, |
ccli8 |
1:5ffad9f24d63 | 667 | "%s %s HTTP/1.1\r\n" "Host: %s\r\n" "Content-Length: %d\r\n" "\r\n" "%s", |
ccli8 |
1:5ffad9f24d63 | 668 | https_request_method, https_path, AWS_IOT_HTTPS_SERVER_NAME, strlen(https_request_message_body), https_request_message_body); |
ccli8 |
1:5ffad9f24d63 | 669 | if (_bpos < 0 || ((size_t) _bpos) > (sizeof (_buffer) - 1)) { |
ccli8 |
1:5ffad9f24d63 | 670 | printf("snprintf failed: %d\n", _bpos); |
ccli8 |
1:5ffad9f24d63 | 671 | break; |
ccli8 |
1:5ffad9f24d63 | 672 | } |
ccli8 |
1:5ffad9f24d63 | 673 | _buffer[_bpos] = 0; |
ccli8 |
1:5ffad9f24d63 | 674 | /* Print request message */ |
ccli8 |
1:5ffad9f24d63 | 675 | printf("HTTPS: Request message:\n"); |
ccli8 |
1:5ffad9f24d63 | 676 | printf("%s\n", _buffer); |
ccli8 |
41:b878d7cd7035 | 677 | |
ccli8 |
1:5ffad9f24d63 | 678 | int offset = 0; |
ccli8 |
1:5ffad9f24d63 | 679 | do { |
ccli8 |
1:5ffad9f24d63 | 680 | tls_rc = _tlssocket->send((const unsigned char *) _buffer + offset, _bpos - offset); |
ccli8 |
1:5ffad9f24d63 | 681 | if (tls_rc > 0) { |
ccli8 |
1:5ffad9f24d63 | 682 | offset += tls_rc; |
ccli8 |
1:5ffad9f24d63 | 683 | } |
ccli8 |
1:5ffad9f24d63 | 684 | } while (offset < _bpos && |
ccli8 |
41:b878d7cd7035 | 685 | (tls_rc > 0 || tls_rc == NSAPI_ERROR_WOULD_BLOCK)); |
ccli8 |
41:b878d7cd7035 | 686 | if (tls_rc < 0 && |
ccli8 |
41:b878d7cd7035 | 687 | tls_rc != NSAPI_ERROR_WOULD_BLOCK) { |
ccli8 |
1:5ffad9f24d63 | 688 | print_mbedtls_error("_tlssocket->send", tls_rc); |
ccli8 |
1:5ffad9f24d63 | 689 | break; |
ccli8 |
1:5ffad9f24d63 | 690 | } |
ccli8 |
1:5ffad9f24d63 | 691 | |
ccli8 |
1:5ffad9f24d63 | 692 | /* Read data out of the socket */ |
ccli8 |
1:5ffad9f24d63 | 693 | offset = 0; |
ccli8 |
1:5ffad9f24d63 | 694 | size_t content_length = 0; |
ccli8 |
1:5ffad9f24d63 | 695 | size_t offset_end = 0; |
ccli8 |
1:5ffad9f24d63 | 696 | char *line_beg = _buffer; |
ccli8 |
1:5ffad9f24d63 | 697 | char *line_end = NULL; |
ccli8 |
1:5ffad9f24d63 | 698 | do { |
ccli8 |
1:5ffad9f24d63 | 699 | tls_rc = _tlssocket->recv((unsigned char *) _buffer + offset, sizeof(_buffer) - offset - 1); |
ccli8 |
1:5ffad9f24d63 | 700 | if (tls_rc > 0) { |
ccli8 |
1:5ffad9f24d63 | 701 | offset += tls_rc; |
ccli8 |
1:5ffad9f24d63 | 702 | } |
ccli8 |
1:5ffad9f24d63 | 703 | |
ccli8 |
1:5ffad9f24d63 | 704 | /* Make it null-terminated */ |
ccli8 |
1:5ffad9f24d63 | 705 | _buffer[offset] = 0; |
ccli8 |
1:5ffad9f24d63 | 706 | |
ccli8 |
1:5ffad9f24d63 | 707 | /* Scan response message |
ccli8 |
1:5ffad9f24d63 | 708 | * |
ccli8 |
1:5ffad9f24d63 | 709 | * 1. A status line which includes the status code and reason message (e.g., HTTP/1.1 200 OK) |
ccli8 |
1:5ffad9f24d63 | 710 | * 2. Response header fields (e.g., Content-Type: text/html) |
ccli8 |
1:5ffad9f24d63 | 711 | * 3. An empty line (\r\n) |
ccli8 |
1:5ffad9f24d63 | 712 | * 4. An optional message body |
ccli8 |
1:5ffad9f24d63 | 713 | */ |
ccli8 |
1:5ffad9f24d63 | 714 | if (! offset_end) { |
ccli8 |
1:5ffad9f24d63 | 715 | line_end = strstr(line_beg, "\r\n"); |
ccli8 |
1:5ffad9f24d63 | 716 | if (line_end) { |
ccli8 |
1:5ffad9f24d63 | 717 | /* Scan status line */ |
ccli8 |
1:5ffad9f24d63 | 718 | if (! _got200) { |
ccli8 |
1:5ffad9f24d63 | 719 | _got200 = strstr(line_beg, HTTPS_OK_STR) != NULL; |
ccli8 |
1:5ffad9f24d63 | 720 | } |
ccli8 |
1:5ffad9f24d63 | 721 | |
ccli8 |
1:5ffad9f24d63 | 722 | /* Scan response header fields for Content-Length |
ccli8 |
1:5ffad9f24d63 | 723 | * |
ccli8 |
1:5ffad9f24d63 | 724 | * NOTE: Assume chunked transfer (Transfer-Encoding: chunked) is not used |
ccli8 |
1:5ffad9f24d63 | 725 | * NOTE: Assume response field name are in lower case |
ccli8 |
1:5ffad9f24d63 | 726 | */ |
ccli8 |
1:5ffad9f24d63 | 727 | if (content_length == 0) { |
ccli8 |
1:5ffad9f24d63 | 728 | sscanf(line_beg, "content-length:%d", &content_length); |
ccli8 |
1:5ffad9f24d63 | 729 | } |
ccli8 |
1:5ffad9f24d63 | 730 | |
ccli8 |
1:5ffad9f24d63 | 731 | /* An empty line indicates end of response header fields */ |
ccli8 |
1:5ffad9f24d63 | 732 | if (line_beg == line_end) { |
ccli8 |
1:5ffad9f24d63 | 733 | offset_end = line_end - _buffer + 2 + content_length; |
ccli8 |
1:5ffad9f24d63 | 734 | } |
ccli8 |
1:5ffad9f24d63 | 735 | |
ccli8 |
1:5ffad9f24d63 | 736 | /* Go to next line */ |
ccli8 |
1:5ffad9f24d63 | 737 | line_beg = line_end + 2; |
ccli8 |
1:5ffad9f24d63 | 738 | line_end = NULL; |
ccli8 |
1:5ffad9f24d63 | 739 | } |
ccli8 |
1:5ffad9f24d63 | 740 | } |
ccli8 |
1:5ffad9f24d63 | 741 | } while ((offset_end == 0 || offset < offset_end) && |
ccli8 |
41:b878d7cd7035 | 742 | (tls_rc > 0 || tls_rc == NSAPI_ERROR_WOULD_BLOCK)); |
ccli8 |
1:5ffad9f24d63 | 743 | if (tls_rc < 0 && |
ccli8 |
41:b878d7cd7035 | 744 | tls_rc != NSAPI_ERROR_WOULD_BLOCK) { |
ccli8 |
1:5ffad9f24d63 | 745 | print_mbedtls_error("_tlssocket->read", tls_rc); |
ccli8 |
1:5ffad9f24d63 | 746 | break; |
ccli8 |
1:5ffad9f24d63 | 747 | } |
ccli8 |
1:5ffad9f24d63 | 748 | _bpos = offset; |
ccli8 |
1:5ffad9f24d63 | 749 | |
ccli8 |
1:5ffad9f24d63 | 750 | _buffer[_bpos] = 0; |
ccli8 |
1:5ffad9f24d63 | 751 | |
ccli8 |
1:5ffad9f24d63 | 752 | /* Print status messages */ |
ccli8 |
1:5ffad9f24d63 | 753 | printf("HTTPS: Received %d chars from server\n", _bpos); |
ccli8 |
1:5ffad9f24d63 | 754 | printf("HTTPS: Received 200 OK status ... %s\n", _got200 ? "[OK]" : "[FAIL]"); |
ccli8 |
1:5ffad9f24d63 | 755 | printf("HTTPS: Received message:\n"); |
ccli8 |
1:5ffad9f24d63 | 756 | printf("%s\n", _buffer); |
ccli8 |
41:b878d7cd7035 | 757 | |
ccli8 |
1:5ffad9f24d63 | 758 | ret = true; |
ccli8 |
41:b878d7cd7035 | 759 | |
ccli8 |
1:5ffad9f24d63 | 760 | } while (0); |
ccli8 |
41:b878d7cd7035 | 761 | |
ccli8 |
1:5ffad9f24d63 | 762 | return ret; |
ccli8 |
1:5ffad9f24d63 | 763 | } |
ccli8 |
41:b878d7cd7035 | 764 | |
ccli8 |
1:5ffad9f24d63 | 765 | protected: |
ccli8 |
17:6f0ff065cd76 | 766 | MyTLSSocket * _tlssocket; |
ccli8 |
1:5ffad9f24d63 | 767 | |
ccli8 |
1:5ffad9f24d63 | 768 | const char *_domain; /**< Domain name of the HTTPS server */ |
ccli8 |
1:5ffad9f24d63 | 769 | const uint16_t _port; /**< Port number of the HTTPS server */ |
ccli8 |
1:5ffad9f24d63 | 770 | char _buffer[HTTPS_USER_BUFFER_SIZE]; /**< User buffer */ |
ccli8 |
41:b878d7cd7035 | 771 | NetworkInterface *_net_iface; |
ccli8 |
1:5ffad9f24d63 | 772 | }; |
ccli8 |
1:5ffad9f24d63 | 773 | |
ccli8 |
1:5ffad9f24d63 | 774 | #endif // End of AWS_IOT_HTTPS_TEST |
ccli8 |
1:5ffad9f24d63 | 775 | |
ccli8 |
1:5ffad9f24d63 | 776 | int main() { |
ccli8 |
41:b878d7cd7035 | 777 | |
ccli8 |
1:5ffad9f24d63 | 778 | /* The default 9600 bps is too slow to print full TLS debug info and could |
ccli8 |
1:5ffad9f24d63 | 779 | * cause the other party to time out. */ |
ccli8 |
1:5ffad9f24d63 | 780 | |
ccli8 |
1:5ffad9f24d63 | 781 | printf("\nStarting AWS IoT test\n"); |
ccli8 |
1:5ffad9f24d63 | 782 | |
ccli8 |
1:5ffad9f24d63 | 783 | #if defined(MBED_MAJOR_VERSION) |
ccli8 |
1:5ffad9f24d63 | 784 | printf("Using Mbed OS %d.%d.%d\n", MBED_MAJOR_VERSION, MBED_MINOR_VERSION, MBED_PATCH_VERSION); |
ccli8 |
1:5ffad9f24d63 | 785 | #else |
ccli8 |
1:5ffad9f24d63 | 786 | printf("Using Mbed OS from master.\n"); |
ccli8 |
1:5ffad9f24d63 | 787 | #endif |
ccli8 |
1:5ffad9f24d63 | 788 | |
ccli8 |
12:97762a6f55e9 | 789 | NetworkInterface *net = NetworkInterface::get_default_instance(); |
ccli8 |
12:97762a6f55e9 | 790 | if (NULL == net) { |
ccli8 |
1:5ffad9f24d63 | 791 | printf("Connecting to the network failed. See serial output.\n"); |
ccli8 |
1:5ffad9f24d63 | 792 | return 1; |
ccli8 |
1:5ffad9f24d63 | 793 | } |
ccli8 |
12:97762a6f55e9 | 794 | nsapi_error_t status = net->connect(); |
ccli8 |
12:97762a6f55e9 | 795 | if (status != NSAPI_ERROR_OK) { |
ccli8 |
12:97762a6f55e9 | 796 | printf("Connecting to the network failed %d!\n", status); |
ccli8 |
12:97762a6f55e9 | 797 | return -1; |
ccli8 |
12:97762a6f55e9 | 798 | } |
ccli8 |
41:b878d7cd7035 | 799 | SocketAddress sockaddr; |
ccli8 |
41:b878d7cd7035 | 800 | status = net->get_ip_address(&sockaddr); |
ccli8 |
41:b878d7cd7035 | 801 | if (status != NSAPI_ERROR_OK) { |
ccli8 |
41:b878d7cd7035 | 802 | printf("Network interface get_ip_address(...) failed with %d", status); |
ccli8 |
41:b878d7cd7035 | 803 | return -1; |
ccli8 |
41:b878d7cd7035 | 804 | } |
ccli8 |
41:b878d7cd7035 | 805 | printf("Connected to the network successfully. IP address: %s\n", sockaddr.get_ip_address()); |
ccli8 |
41:b878d7cd7035 | 806 | |
ccli8 |
1:5ffad9f24d63 | 807 | #if AWS_IOT_MQTT_TEST |
ccli8 |
12:97762a6f55e9 | 808 | AWS_IoT_MQTT_Test *mqtt_test = new AWS_IoT_MQTT_Test(AWS_IOT_MQTT_SERVER_NAME, AWS_IOT_MQTT_SERVER_PORT, net); |
ccli8 |
1:5ffad9f24d63 | 809 | mqtt_test->start_test(); |
ccli8 |
1:5ffad9f24d63 | 810 | delete mqtt_test; |
ccli8 |
1:5ffad9f24d63 | 811 | #endif // End of AWS_IOT_MQTT_TEST |
ccli8 |
41:b878d7cd7035 | 812 | |
ccli8 |
1:5ffad9f24d63 | 813 | #if AWS_IOT_HTTPS_TEST |
ccli8 |
12:97762a6f55e9 | 814 | AWS_IoT_HTTPS_Test *https_test = new AWS_IoT_HTTPS_Test(AWS_IOT_HTTPS_SERVER_NAME, AWS_IOT_HTTPS_SERVER_PORT, net); |
ccli8 |
1:5ffad9f24d63 | 815 | https_test->start_test(); |
ccli8 |
1:5ffad9f24d63 | 816 | delete https_test; |
ccli8 |
1:5ffad9f24d63 | 817 | #endif // End of AWS_IOT_HTTPS_TEST |
ccli8 |
36:1bec082ad582 | 818 | |
ccli8 |
36:1bec082ad582 | 819 | /* Some cellular modems e.g.: QUECTEL EC2X need graceful exit; otherwise, they will break in next reboot. */ |
ccli8 |
36:1bec082ad582 | 820 | status = net->disconnect(); |
ccli8 |
36:1bec082ad582 | 821 | if (status != NSAPI_ERROR_OK) { |
ccli8 |
36:1bec082ad582 | 822 | printf("\n\nDisconnect from network interface failed %d\n", status); |
ccli8 |
36:1bec082ad582 | 823 | } |
ccli8 |
1:5ffad9f24d63 | 824 | } |