Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
Dependents: RZ_A2M_Mbed_samples_20201012 RZ_A2M_Mbed_samples
Diff: source/https_request.h
- Revision:
- 32:fa4d71265625
- Parent:
- 29:383e9bfbfbed
- Parent:
- 31:b3730a2c4f39
- Child:
- 36:d46da03715db
diff -r 3ad153a3fdfd -r fa4d71265625 source/https_request.h
--- a/source/https_request.h Thu Sep 06 14:01:09 2018 -0500
+++ b/source/https_request.h Tue Oct 30 11:02:12 2018 +0800
@@ -21,12 +21,8 @@
#include <string>
#include <vector>
#include <map>
-#include "http_parser.h"
-#include "http_response.h"
-#include "http_request_builder.h"
-#include "http_request_parser.h"
-#include "http_parsed_url.h"
-#include "tls_socket.h"
+#include "http_request_base.h"
+#include "TLSSocket.h"
#ifndef HTTP_RECEIVE_BUFFER_SIZE
#define HTTP_RECEIVE_BUFFER_SIZE 8 * 1024
@@ -35,13 +31,13 @@
/**
* \brief HttpsRequest implements the logic for interacting with HTTPS servers.
*/
-class HttpsRequest {
+class HttpsRequest : public HttpRequestBase {
public:
/**
* HttpsRequest Constructor
* Initializes the TCP socket, sets up event handlers and flags.
*
- * @param[in] net_iface The network interface
+ * @param[in] network The network interface
* @param[in] ssl_ca_pem String containing the trusted CAs
* @param[in] method HTTP method to use
* @param[in] url URL to the resource
@@ -49,20 +45,21 @@
If not set, the complete body will be allocated on the HttpResponse object,
which might use lots of memory.
*/
- HttpsRequest(NetworkInterface* net_iface,
+ HttpsRequest(NetworkInterface* network,
const char* ssl_ca_pem,
http_method method,
const char* url,
Callback<void(const char *at, uint32_t length)> body_callback = 0)
+ : HttpRequestBase(NULL, body_callback)
{
_parsed_url = new ParsedUrl(url);
- _body_callback = body_callback;
_request_builder = new HttpRequestBuilder(method, _parsed_url);
_response = NULL;
- _debug = false;
- _tlssocket = new TLSSocket(net_iface, _parsed_url->host(), _parsed_url->port(), ssl_ca_pem);
- _we_created_the_socket = true;
+ _socket = new TLSSocket();
+ ((TLSSocket*)_socket)->open(network);
+ ((TLSSocket*)_socket)->set_root_ca_cert(ssl_ca_pem);
+ _we_created_socket = true;
}
/**
@@ -80,309 +77,22 @@
http_method method,
const char* url,
Callback<void(const char *at, uint32_t length)> body_callback = 0)
+ : HttpRequestBase(socket, body_callback)
{
_parsed_url = new ParsedUrl(url);
_body_callback = body_callback;
_request_builder = new HttpRequestBuilder(method, _parsed_url);
_response = NULL;
- _debug = false;
- _tlssocket = socket;
- _we_created_the_socket = false;
- }
-
- /**
- * HttpsRequest Destructor
- */
- ~HttpsRequest() {
- if (_request_builder) {
- delete _request_builder;
- }
-
- if (_tlssocket && _we_created_the_socket) {
- delete _tlssocket;
- }
-
- if (_parsed_url) {
- delete _parsed_url;
- }
-
- if (_response) {
- delete _response;
- }
- }
-
- /**
- * Execute the HTTPS request.
- *
- * @param[in] body Pointer to the request body
- * @param[in] body_size Size of the request body
- * @return An HttpResponse pointer on success, or NULL on failure.
- * See get_error() for the error code.
- */
- HttpResponse* send(const void* body = NULL, nsapi_size_t body_size = 0) {
- nsapi_size_or_error_t ret = open_socket();
-
- if (ret != NSAPI_ERROR_OK) {
- _error = ret;
- return NULL;
- }
-
- uint32_t request_size = 0;
- char* request = _request_builder->build(body, body_size, request_size);
-
- ret = send_buffer((const unsigned char*)request, request_size);
-
- free(request);
-
- if (ret < 0) {
- _error = ret;
- return NULL;
- }
-
- return create_http_response();
- }
-
- /**
- * Execute the HTTPS request.
- * This sends the request through chunked-encoding.
- * @param body_cb Callback which generates the next chunk of the request
- * @return An HttpResponse pointer on success, or NULL on failure.
- * See get_error() for the error code.
- */
- HttpResponse* send(Callback<const void*(uint32_t*)> body_cb) {
-
- nsapi_error_t ret;
-
- if ((ret = open_socket()) != NSAPI_ERROR_OK) {
- _error = ret;
- return NULL;
- }
-
- set_header("Transfer-Encoding", "chunked");
-
- uint32_t request_size = 0;
- char* request = _request_builder->build(NULL, 0, request_size);
-
- // first... send this request headers without the body
- nsapi_size_or_error_t total_send_count = send_buffer((unsigned char*)request, request_size);
-
- if (total_send_count < 0) {
- free(request);
- _error = total_send_count;
- return NULL;
- }
-
- // ok... now it's time to start sending chunks...
- while (1) {
- uint32_t size;
- const void *buffer = body_cb(&size);
-
- if (size == 0) break;
-
- // so... size in HEX, \r\n, data, \r\n again
- char size_buff[10]; // if sending length of more than 8 digits, you have another problem on a microcontroller...
- uint32_t size_buff_size = sprintf(size_buff, "%X\r\n", size);
- if ((total_send_count = send_buffer((const unsigned char*)size_buff, size_buff_size)) < 0) {
- free(request);
- _error = total_send_count;
- return NULL;
- }
-
- // now send the normal buffer... and then \r\n at the end
- total_send_count = send_buffer((const unsigned char*)buffer, size);
- if (total_send_count < 0) {
- free(request);
- _error = total_send_count;
- return NULL;
- }
-
- // and... \r\n
- const char* rn = "\r\n";
- if ((total_send_count = send_buffer((const unsigned char*)rn, 2)) < 0) {
- free(request);
- _error = total_send_count;
- return NULL;
- }
- }
-
- // finalize...?
- const char* fin = "0\r\n\r\n";
- if ((total_send_count = send_buffer((const unsigned char*)fin, strlen(fin))) < 0) {
- free(request);
- _error = total_send_count;
- return NULL;
- }
-
- free(request);
-
- return create_http_response();
- }
-
- /**
- * Closes the underlying TCP socket
- */
- void close() {
- _tlssocket->get_tcp_socket()->close();
+ _we_created_socket = false;
}
- /**
- * Set a header for the request.
- *
- * The 'Host' and 'Content-Length' headers are set automatically.
- * Setting the same header twice will overwrite the previous entry.
- *
- * @param[in] key Header key
- * @param[in] value Header value
- */
- void set_header(string key, string value) {
- _request_builder->set_header(key, value);
- }
-
- /**
- * Get the error code.
- *
- * When send() fails, this error is set.
- */
- nsapi_error_t get_error() {
- return _error;
- }
-
- /**
- * Set the debug flag.
- *
- * If this flag is set, debug information from mbed TLS will be logged to stdout.
- */
- void set_debug(bool debug) {
- _debug = debug;
-
- _tlssocket->set_debug(debug);
- }
-
+ virtual ~HttpsRequest() {}
protected:
- /**
- * Helper for pretty-printing mbed TLS error codes
- */
- static void print_mbedtls_error(const char *name, int err) {
- char buf[128];
- mbedtls_strerror(err, buf, sizeof (buf));
- mbedtls_printf("%s() failed: -0x%04x (%d): %s\r\n", name, -err, err, buf);
- }
-
- void onError(TCPSocket *s, int error) {
- s->close();
- _error = error;
- }
-
- nsapi_error_t onErrorAndReturn(TCPSocket *s, int error) {
- s->close();
- return error;
- }
-
-private:
- nsapi_error_t open_socket() {
- // not tried to connect before?
- if (_tlssocket->error() != 0) {
- return _tlssocket->error();
- }
-
- _socket_was_open = _tlssocket->connected();
-
- if (!_socket_was_open) {
- nsapi_error_t r = _tlssocket->connect();
- if (r != NSAPI_ERROR_OK) {
- return r;
- }
- }
-
- return NSAPI_ERROR_OK;
- }
-
- nsapi_size_or_error_t send_buffer(const unsigned char *buffer, uint32_t buffer_size) {
- nsapi_size_or_error_t ret = mbedtls_ssl_write(_tlssocket->get_ssl_context(), (const unsigned char *) buffer, buffer_size);
-
- if (ret < 0) {
- if (ret != MBEDTLS_ERR_SSL_WANT_READ &&
- ret != MBEDTLS_ERR_SSL_WANT_WRITE) {
- print_mbedtls_error("mbedtls_ssl_write", ret);
- return onErrorAndReturn(_tlssocket->get_tcp_socket(), -1 );
- }
- else {
- return ret;
- }
- }
-
- return NSAPI_ERROR_OK;
+ virtual nsapi_error_t connect_socket(char *host, uint16_t port) {
+ return ((TLSSocket*)_socket)->connect(host, port);
}
-
- HttpResponse* create_http_response() {
- nsapi_size_or_error_t ret;
-
- // Create a response object
- _response = new HttpResponse();
- // And a response parser
- HttpParser parser(_response, HTTP_RESPONSE, _body_callback);
-
- // Set up a receive buffer (on the heap)
- uint8_t* recv_buffer = (uint8_t*)malloc(HTTP_RECEIVE_BUFFER_SIZE);
-
- /* Read data out of the socket */
- while ((ret = mbedtls_ssl_read(_tlssocket->get_ssl_context(), (unsigned char *) recv_buffer, HTTP_RECEIVE_BUFFER_SIZE)) > 0) {
- // Don't know if this is actually needed, but OK
- uint32_t _bpos = static_cast<uint32_t>(ret);
- recv_buffer[_bpos] = 0;
-
- uint32_t nparsed = parser.execute((const char*)recv_buffer, _bpos);
- if (nparsed != _bpos) {
- print_mbedtls_error("parser_error", nparsed);
- // parser error...
- _error = -2101;
- free(recv_buffer);
- return NULL;
- }
-
- if (_response->is_message_complete()) {
- break;
- }
- }
- if (ret < 0) {
- if (ret != MBEDTLS_ERR_SSL_WANT_READ && ret != MBEDTLS_ERR_SSL_WANT_WRITE) {
- print_mbedtls_error("mbedtls_ssl_read", ret);
- onError(_tlssocket->get_tcp_socket(), -1 );
- }
- else {
- _error = ret;
- }
- free(recv_buffer);
- return NULL;
- }
-
- parser.finish();
-
- if (!_socket_was_open) {
- _tlssocket->get_tcp_socket()->close();
- }
-
- free(recv_buffer);
-
- return _response;
- }
-
-protected:
- TLSSocket* _tlssocket;
- bool _we_created_the_socket;
-
- Callback<void(const char *at, uint32_t length)> _body_callback;
- ParsedUrl* _parsed_url;
- HttpRequestBuilder* _request_builder;
- HttpResponse* _response;
-
- bool _socket_was_open;
-
- nsapi_error_t _error;
- bool _debug;
-
};
#endif // _MBED_HTTPS_REQUEST_H_