Microsoft Azure IoTHub client AMQP transport
Dependents: sht15_remote_monitoring RobotArmDemo iothub_client_sample_amqp iothub_client_sample_amqp ... more
This library implements the AMQP transport for Microsoft Azure IoTHub client. The code is replicated from https://github.com/Azure/azure-iot-sdks
iothubtransportamqp.c@4:57e049bce51e, 2015-10-22 (annotated)
- Committer:
- AzureIoTClient
- Date:
- Thu Oct 22 18:33:15 2015 -0700
- Revision:
- 4:57e049bce51e
- Child:
- 5:8d58d20699dd
v1.0.0-preview.4
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
AzureIoTClient | 4:57e049bce51e | 1 | // Copyright (c) Microsoft. All rights reserved. |
AzureIoTClient | 4:57e049bce51e | 2 | // Licensed under the MIT license. See LICENSE file in the project root for full license information. |
AzureIoTClient | 4:57e049bce51e | 3 | |
AzureIoTClient | 4:57e049bce51e | 4 | #include <stdlib.h> |
AzureIoTClient | 4:57e049bce51e | 5 | #ifdef _CRTDBG_MAP_ALLOC |
AzureIoTClient | 4:57e049bce51e | 6 | #include <crtdbg.h> |
AzureIoTClient | 4:57e049bce51e | 7 | #endif |
AzureIoTClient | 4:57e049bce51e | 8 | #include "gballoc.h" |
AzureIoTClient | 4:57e049bce51e | 9 | |
AzureIoTClient | 4:57e049bce51e | 10 | #include "proton/message.h" |
AzureIoTClient | 4:57e049bce51e | 11 | #include "proton/messenger.h" |
AzureIoTClient | 4:57e049bce51e | 12 | |
AzureIoTClient | 4:57e049bce51e | 13 | #include "iot_logging.h" |
AzureIoTClient | 4:57e049bce51e | 14 | #include "strings.h" |
AzureIoTClient | 4:57e049bce51e | 15 | #include "urlencode.h" |
AzureIoTClient | 4:57e049bce51e | 16 | #include "doublylinkedlist.h" |
AzureIoTClient | 4:57e049bce51e | 17 | #include "crt_abstractions.h" |
AzureIoTClient | 4:57e049bce51e | 18 | #include "sastoken.h" |
AzureIoTClient | 4:57e049bce51e | 19 | |
AzureIoTClient | 4:57e049bce51e | 20 | #include "iothub_client_ll.h" |
AzureIoTClient | 4:57e049bce51e | 21 | #include "iothub_client_private.h" |
AzureIoTClient | 4:57e049bce51e | 22 | #include "iothubtransportamqp.h" |
AzureIoTClient | 4:57e049bce51e | 23 | #include "iothub_client_amqp_internal.h" |
AzureIoTClient | 4:57e049bce51e | 24 | |
AzureIoTClient | 4:57e049bce51e | 25 | static const size_t NUMBER_OF_MESSENGER_STOP_TRIES = PROTON_MESSENGER_STOP_TRIES; |
AzureIoTClient | 4:57e049bce51e | 26 | static const size_t MAXIMUM_EVENT_LENGTH = PROTON_MAXIMUM_EVENT_LENGTH; |
AzureIoTClient | 4:57e049bce51e | 27 | |
AzureIoTClient | 4:57e049bce51e | 28 | |
AzureIoTClient | 4:57e049bce51e | 29 | #define amqp_batch_result_values \ |
AzureIoTClient | 4:57e049bce51e | 30 | amqp_batch_nowork, \ |
AzureIoTClient | 4:57e049bce51e | 31 | amqp_batch_batch, \ |
AzureIoTClient | 4:57e049bce51e | 32 | amqp_batch_nobatch, \ |
AzureIoTClient | 4:57e049bce51e | 33 | amqp_batch_error \ |
AzureIoTClient | 4:57e049bce51e | 34 | |
AzureIoTClient | 4:57e049bce51e | 35 | DEFINE_ENUM(amqp_batch_result, amqp_batch_result_values); |
AzureIoTClient | 4:57e049bce51e | 36 | |
AzureIoTClient | 4:57e049bce51e | 37 | static const int IO_PROCESSING_YIELD_IN_MILLISECONDS = PROTON_PROCESSING_YIELD_IN_MILLISECONDS; |
AzureIoTClient | 4:57e049bce51e | 38 | |
AzureIoTClient | 4:57e049bce51e | 39 | static void processReceives(TRANSPORT_HANDLE handle); |
AzureIoTClient | 4:57e049bce51e | 40 | |
AzureIoTClient | 4:57e049bce51e | 41 | typedef struct MESSENGER_CONTAINER_TAG |
AzureIoTClient | 4:57e049bce51e | 42 | { |
AzureIoTClient | 4:57e049bce51e | 43 | // |
AzureIoTClient | 4:57e049bce51e | 44 | // This links all of these records onto the messageCorral in the transport state. |
AzureIoTClient | 4:57e049bce51e | 45 | DLIST_ENTRY entry; |
AzureIoTClient | 4:57e049bce51e | 46 | |
AzureIoTClient | 4:57e049bce51e | 47 | // |
AzureIoTClient | 4:57e049bce51e | 48 | // This is a messenger that couldn't be stopped. (You have to admire its initiative.) We'll keep trying to stop it when |
AzureIoTClient | 4:57e049bce51e | 49 | // we have a spare moment. |
AzureIoTClient | 4:57e049bce51e | 50 | pn_messenger_t* messengerThatDidNotStop; |
AzureIoTClient | 4:57e049bce51e | 51 | } MESSENGER_CONTAINER, *PMESSENGER_CONTAINER; |
AzureIoTClient | 4:57e049bce51e | 52 | |
AzureIoTClient | 4:57e049bce51e | 53 | // |
AzureIoTClient | 4:57e049bce51e | 54 | // Transport specific structure used to contain everything needed to send an event item. |
AzureIoTClient | 4:57e049bce51e | 55 | // |
AzureIoTClient | 4:57e049bce51e | 56 | typedef struct AMQP_WORK_ITEM_TAG |
AzureIoTClient | 4:57e049bce51e | 57 | { |
AzureIoTClient | 4:57e049bce51e | 58 | // |
AzureIoTClient | 4:57e049bce51e | 59 | // At what time should we give up on sending this message. |
AzureIoTClient | 4:57e049bce51e | 60 | size_t expiry; |
AzureIoTClient | 4:57e049bce51e | 61 | |
AzureIoTClient | 4:57e049bce51e | 62 | // |
AzureIoTClient | 4:57e049bce51e | 63 | // Used by the transport to determine if the IO operation is complete. |
AzureIoTClient | 4:57e049bce51e | 64 | pn_tracker_t tracker; |
AzureIoTClient | 4:57e049bce51e | 65 | |
AzureIoTClient | 4:57e049bce51e | 66 | // |
AzureIoTClient | 4:57e049bce51e | 67 | // This acts as a listhead for all of the messages that make up one transfer frame. |
AzureIoTClient | 4:57e049bce51e | 68 | // If no batching is being done then this list will have at most one item. If batching |
AzureIoTClient | 4:57e049bce51e | 69 | // is being done then this could be lengthy! |
AzureIoTClient | 4:57e049bce51e | 70 | DLIST_ENTRY eventMessages; |
AzureIoTClient | 4:57e049bce51e | 71 | |
AzureIoTClient | 4:57e049bce51e | 72 | // |
AzureIoTClient | 4:57e049bce51e | 73 | // This is used to hold this work item either on the work in progress list or on the available work item list. |
AzureIoTClient | 4:57e049bce51e | 74 | DLIST_ENTRY link; |
AzureIoTClient | 4:57e049bce51e | 75 | } AMQP_WORK_ITEM, *PAMQP_WORK_ITEM; |
AzureIoTClient | 4:57e049bce51e | 76 | |
AzureIoTClient | 4:57e049bce51e | 77 | static void rollbackEvent(PAMQP_TRANSPORT_STATE transportState); |
AzureIoTClient | 4:57e049bce51e | 78 | |
AzureIoTClient | 4:57e049bce51e | 79 | static bool checkForErrorsThenWork(PAMQP_TRANSPORT_STATE transportState) |
AzureIoTClient | 4:57e049bce51e | 80 | { |
AzureIoTClient | 4:57e049bce51e | 81 | pn_error_t* errorStruct; |
AzureIoTClient | 4:57e049bce51e | 82 | bool result; |
AzureIoTClient | 4:57e049bce51e | 83 | errorStruct = pn_messenger_error(transportState->messenger); |
AzureIoTClient | 4:57e049bce51e | 84 | if (pn_error_code(errorStruct) != 0) |
AzureIoTClient | 4:57e049bce51e | 85 | { |
AzureIoTClient | 4:57e049bce51e | 86 | LogError("An error was detected in the networking manager: %d\r\n", pn_error_code(errorStruct)); |
AzureIoTClient | 4:57e049bce51e | 87 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 88 | result = false; |
AzureIoTClient | 4:57e049bce51e | 89 | } |
AzureIoTClient | 4:57e049bce51e | 90 | else |
AzureIoTClient | 4:57e049bce51e | 91 | { |
AzureIoTClient | 4:57e049bce51e | 92 | int protonResult; |
AzureIoTClient | 4:57e049bce51e | 93 | protonResult = pn_messenger_work(transportState->messenger, IO_PROCESSING_YIELD_IN_MILLISECONDS); |
AzureIoTClient | 4:57e049bce51e | 94 | if ((protonResult < 0) && (protonResult != PN_TIMEOUT)) |
AzureIoTClient | 4:57e049bce51e | 95 | { |
AzureIoTClient | 4:57e049bce51e | 96 | LogError("A networking error occured. Proton error code: %d\r\n", protonResult); |
AzureIoTClient | 4:57e049bce51e | 97 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 98 | result = false; |
AzureIoTClient | 4:57e049bce51e | 99 | } |
AzureIoTClient | 4:57e049bce51e | 100 | else |
AzureIoTClient | 4:57e049bce51e | 101 | { |
AzureIoTClient | 4:57e049bce51e | 102 | result = true; |
AzureIoTClient | 4:57e049bce51e | 103 | } |
AzureIoTClient | 4:57e049bce51e | 104 | } |
AzureIoTClient | 4:57e049bce51e | 105 | return result; |
AzureIoTClient | 4:57e049bce51e | 106 | } |
AzureIoTClient | 4:57e049bce51e | 107 | /* Code_SRS_IOTHUBTRANSPORTTAMQP_07_001: [All IoTHubMessage_Properties shall be enumerated and entered in the pn_message_properties Map.] */ |
AzureIoTClient | 4:57e049bce51e | 108 | static int setProperties(PDLIST_ENTRY messagesMakingUpBatch, pn_message_t* msg) |
AzureIoTClient | 4:57e049bce51e | 109 | { |
AzureIoTClient | 4:57e049bce51e | 110 | int result = 0; |
AzureIoTClient | 4:57e049bce51e | 111 | size_t index; |
AzureIoTClient | 4:57e049bce51e | 112 | |
AzureIoTClient | 4:57e049bce51e | 113 | pn_data_t* propData; |
AzureIoTClient | 4:57e049bce51e | 114 | const char*const* keys; |
AzureIoTClient | 4:57e049bce51e | 115 | const char*const* values; |
AzureIoTClient | 4:57e049bce51e | 116 | size_t propertyCount = 0; |
AzureIoTClient | 4:57e049bce51e | 117 | |
AzureIoTClient | 4:57e049bce51e | 118 | IOTHUB_MESSAGE_LIST* currentMessage = containingRecord(messagesMakingUpBatch->Flink, IOTHUB_MESSAGE_LIST, entry); |
AzureIoTClient | 4:57e049bce51e | 119 | MAP_HANDLE mapProperties = IoTHubMessage_Properties(currentMessage->messageHandle); |
AzureIoTClient | 4:57e049bce51e | 120 | if (mapProperties == NULL) |
AzureIoTClient | 4:57e049bce51e | 121 | { |
AzureIoTClient | 4:57e049bce51e | 122 | LogError("Failure IoTHubMessage_Properties.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 123 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 124 | } |
AzureIoTClient | 4:57e049bce51e | 125 | else if (Map_GetInternals(mapProperties, &keys, &values, &propertyCount) != MAP_OK) |
AzureIoTClient | 4:57e049bce51e | 126 | { |
AzureIoTClient | 4:57e049bce51e | 127 | LogError("Failure retrieving Map_GetInternals.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 128 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 129 | } |
AzureIoTClient | 4:57e049bce51e | 130 | else if (propertyCount > 0) |
AzureIoTClient | 4:57e049bce51e | 131 | { |
AzureIoTClient | 4:57e049bce51e | 132 | if ( (propData = pn_message_properties(msg) ) == NULL) |
AzureIoTClient | 4:57e049bce51e | 133 | { |
AzureIoTClient | 4:57e049bce51e | 134 | LogError("Failure pn_message_properties.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 135 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 136 | } |
AzureIoTClient | 4:57e049bce51e | 137 | else if (pn_data_put_map(propData) != 0) |
AzureIoTClient | 4:57e049bce51e | 138 | { |
AzureIoTClient | 4:57e049bce51e | 139 | LogError("Failure pn_data_put_map.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 140 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 141 | } |
AzureIoTClient | 4:57e049bce51e | 142 | else if (pn_data_enter(propData) == false ) |
AzureIoTClient | 4:57e049bce51e | 143 | { |
AzureIoTClient | 4:57e049bce51e | 144 | LogError("Failure pn_data_enter.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 145 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 146 | } |
AzureIoTClient | 4:57e049bce51e | 147 | else |
AzureIoTClient | 4:57e049bce51e | 148 | { |
AzureIoTClient | 4:57e049bce51e | 149 | for (index = 0; index < propertyCount; index++) |
AzureIoTClient | 4:57e049bce51e | 150 | { |
AzureIoTClient | 4:57e049bce51e | 151 | if (pn_data_put_symbol(propData, pn_bytes(strlen(keys[index]), keys[index])) != 0) |
AzureIoTClient | 4:57e049bce51e | 152 | { |
AzureIoTClient | 4:57e049bce51e | 153 | LogError("Failure pn_data_put_symbol.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 154 | break; |
AzureIoTClient | 4:57e049bce51e | 155 | } |
AzureIoTClient | 4:57e049bce51e | 156 | else if (pn_data_put_string(propData, pn_bytes(strlen(values[index]), values[index])) != 0) |
AzureIoTClient | 4:57e049bce51e | 157 | { |
AzureIoTClient | 4:57e049bce51e | 158 | LogError("Failure pn_data_put_string.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 159 | break; |
AzureIoTClient | 4:57e049bce51e | 160 | } |
AzureIoTClient | 4:57e049bce51e | 161 | } |
AzureIoTClient | 4:57e049bce51e | 162 | if (index != propertyCount) |
AzureIoTClient | 4:57e049bce51e | 163 | { |
AzureIoTClient | 4:57e049bce51e | 164 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 165 | } |
AzureIoTClient | 4:57e049bce51e | 166 | else if (!pn_data_exit(propData) ) |
AzureIoTClient | 4:57e049bce51e | 167 | { |
AzureIoTClient | 4:57e049bce51e | 168 | LogError("Failure pn_data_exit.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 169 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 170 | } |
AzureIoTClient | 4:57e049bce51e | 171 | else |
AzureIoTClient | 4:57e049bce51e | 172 | { |
AzureIoTClient | 4:57e049bce51e | 173 | result = 0; |
AzureIoTClient | 4:57e049bce51e | 174 | } |
AzureIoTClient | 4:57e049bce51e | 175 | } |
AzureIoTClient | 4:57e049bce51e | 176 | } |
AzureIoTClient | 4:57e049bce51e | 177 | return result; |
AzureIoTClient | 4:57e049bce51e | 178 | } |
AzureIoTClient | 4:57e049bce51e | 179 | |
AzureIoTClient | 4:57e049bce51e | 180 | static int getMapString(pn_data_t* propData, pn_bytes_t* mapValue) |
AzureIoTClient | 4:57e049bce51e | 181 | { |
AzureIoTClient | 4:57e049bce51e | 182 | int result; |
AzureIoTClient | 4:57e049bce51e | 183 | if (pn_data_next(propData) == true) |
AzureIoTClient | 4:57e049bce51e | 184 | { |
AzureIoTClient | 4:57e049bce51e | 185 | if (pn_data_type(propData) == PN_STRING) |
AzureIoTClient | 4:57e049bce51e | 186 | { |
AzureIoTClient | 4:57e049bce51e | 187 | *mapValue = pn_data_get_string(propData); |
AzureIoTClient | 4:57e049bce51e | 188 | result = 0; |
AzureIoTClient | 4:57e049bce51e | 189 | } |
AzureIoTClient | 4:57e049bce51e | 190 | else |
AzureIoTClient | 4:57e049bce51e | 191 | { |
AzureIoTClient | 4:57e049bce51e | 192 | LogError("Failure pn_data_type.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 193 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 194 | } |
AzureIoTClient | 4:57e049bce51e | 195 | } |
AzureIoTClient | 4:57e049bce51e | 196 | else |
AzureIoTClient | 4:57e049bce51e | 197 | { |
AzureIoTClient | 4:57e049bce51e | 198 | LogError("Failure pn_data_next.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 199 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 200 | } |
AzureIoTClient | 4:57e049bce51e | 201 | return result; |
AzureIoTClient | 4:57e049bce51e | 202 | } |
AzureIoTClient | 4:57e049bce51e | 203 | |
AzureIoTClient | 4:57e049bce51e | 204 | static int getMapInt(pn_data_t* propData, int32_t* mapValue) |
AzureIoTClient | 4:57e049bce51e | 205 | { |
AzureIoTClient | 4:57e049bce51e | 206 | int result; |
AzureIoTClient | 4:57e049bce51e | 207 | if (pn_data_next(propData) == true) |
AzureIoTClient | 4:57e049bce51e | 208 | { |
AzureIoTClient | 4:57e049bce51e | 209 | if (pn_data_type(propData) == PN_INT) |
AzureIoTClient | 4:57e049bce51e | 210 | { |
AzureIoTClient | 4:57e049bce51e | 211 | *mapValue = pn_data_get_int(propData); |
AzureIoTClient | 4:57e049bce51e | 212 | result = 0; |
AzureIoTClient | 4:57e049bce51e | 213 | } |
AzureIoTClient | 4:57e049bce51e | 214 | else |
AzureIoTClient | 4:57e049bce51e | 215 | { |
AzureIoTClient | 4:57e049bce51e | 216 | LogError("Failure pn_data_type.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 217 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 218 | } |
AzureIoTClient | 4:57e049bce51e | 219 | } |
AzureIoTClient | 4:57e049bce51e | 220 | else |
AzureIoTClient | 4:57e049bce51e | 221 | { |
AzureIoTClient | 4:57e049bce51e | 222 | LogError("Failure pn_data_next.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 223 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 224 | } |
AzureIoTClient | 4:57e049bce51e | 225 | return result; |
AzureIoTClient | 4:57e049bce51e | 226 | } |
AzureIoTClient | 4:57e049bce51e | 227 | |
AzureIoTClient | 4:57e049bce51e | 228 | /* Code_SRS_IOTHUBTRANSPORTTAMQP_07_002: [On messages the properties shall be retrieved from the message using pn_message_properties and will be entered in the IoTHubMessage_Properties Map.] */ |
AzureIoTClient | 4:57e049bce51e | 229 | static int cloneProperties(IOTHUB_MESSAGE_HANDLE ioTMessage, pn_message_t* msg) |
AzureIoTClient | 4:57e049bce51e | 230 | { |
AzureIoTClient | 4:57e049bce51e | 231 | int result = 0; |
AzureIoTClient | 4:57e049bce51e | 232 | size_t index = 0; |
AzureIoTClient | 4:57e049bce51e | 233 | pn_data_t* propData = pn_message_properties(msg); |
AzureIoTClient | 4:57e049bce51e | 234 | if (propData == NULL) |
AzureIoTClient | 4:57e049bce51e | 235 | { |
AzureIoTClient | 4:57e049bce51e | 236 | LogError("Failure pn_message_properties.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 237 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 238 | } |
AzureIoTClient | 4:57e049bce51e | 239 | else if (pn_data_next(propData) == false ) |
AzureIoTClient | 4:57e049bce51e | 240 | { |
AzureIoTClient | 4:57e049bce51e | 241 | // This should fail if there is no next sibling which means that there |
AzureIoTClient | 4:57e049bce51e | 242 | // are no property and it should continue |
AzureIoTClient | 4:57e049bce51e | 243 | result = 0; |
AzureIoTClient | 4:57e049bce51e | 244 | } |
AzureIoTClient | 4:57e049bce51e | 245 | else |
AzureIoTClient | 4:57e049bce51e | 246 | { |
AzureIoTClient | 4:57e049bce51e | 247 | size_t propertyCount = pn_data_get_map(propData)/2; |
AzureIoTClient | 4:57e049bce51e | 248 | if (propertyCount > 0) |
AzureIoTClient | 4:57e049bce51e | 249 | { |
AzureIoTClient | 4:57e049bce51e | 250 | if (pn_data_enter(propData) == false) |
AzureIoTClient | 4:57e049bce51e | 251 | { |
AzureIoTClient | 4:57e049bce51e | 252 | LogError("Failure pn_data_enter.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 253 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 254 | } |
AzureIoTClient | 4:57e049bce51e | 255 | else |
AzureIoTClient | 4:57e049bce51e | 256 | { |
AzureIoTClient | 4:57e049bce51e | 257 | // Get the Properties from the Message |
AzureIoTClient | 4:57e049bce51e | 258 | MAP_HANDLE properties = IoTHubMessage_Properties(ioTMessage); |
AzureIoTClient | 4:57e049bce51e | 259 | if (properties == NULL) |
AzureIoTClient | 4:57e049bce51e | 260 | { |
AzureIoTClient | 4:57e049bce51e | 261 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 262 | } |
AzureIoTClient | 4:57e049bce51e | 263 | else |
AzureIoTClient | 4:57e049bce51e | 264 | { |
AzureIoTClient | 4:57e049bce51e | 265 | for (index = 0; index < propertyCount; index++) |
AzureIoTClient | 4:57e049bce51e | 266 | { |
AzureIoTClient | 4:57e049bce51e | 267 | pn_bytes_t propValue; |
AzureIoTClient | 4:57e049bce51e | 268 | pn_bytes_t propName; |
AzureIoTClient | 4:57e049bce51e | 269 | if (getMapString(propData, &propValue) != 0) |
AzureIoTClient | 4:57e049bce51e | 270 | { |
AzureIoTClient | 4:57e049bce51e | 271 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 272 | break; |
AzureIoTClient | 4:57e049bce51e | 273 | } |
AzureIoTClient | 4:57e049bce51e | 274 | if (getMapString(propData, &propName) != 0) |
AzureIoTClient | 4:57e049bce51e | 275 | { |
AzureIoTClient | 4:57e049bce51e | 276 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 277 | break; |
AzureIoTClient | 4:57e049bce51e | 278 | } |
AzureIoTClient | 4:57e049bce51e | 279 | |
AzureIoTClient | 4:57e049bce51e | 280 | if (Map_AddOrUpdate(properties, propValue.start, propName.start) != MAP_OK) |
AzureIoTClient | 4:57e049bce51e | 281 | { |
AzureIoTClient | 4:57e049bce51e | 282 | LogError("Failure Map_AddOrUpdate.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 283 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 284 | break; |
AzureIoTClient | 4:57e049bce51e | 285 | } |
AzureIoTClient | 4:57e049bce51e | 286 | } |
AzureIoTClient | 4:57e049bce51e | 287 | if (index != propertyCount) |
AzureIoTClient | 4:57e049bce51e | 288 | { |
AzureIoTClient | 4:57e049bce51e | 289 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 290 | } |
AzureIoTClient | 4:57e049bce51e | 291 | else if (!pn_data_exit(propData) ) |
AzureIoTClient | 4:57e049bce51e | 292 | { |
AzureIoTClient | 4:57e049bce51e | 293 | LogError("Failure pn_data_exit.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 294 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 295 | } |
AzureIoTClient | 4:57e049bce51e | 296 | else |
AzureIoTClient | 4:57e049bce51e | 297 | { |
AzureIoTClient | 4:57e049bce51e | 298 | result = 0; |
AzureIoTClient | 4:57e049bce51e | 299 | } |
AzureIoTClient | 4:57e049bce51e | 300 | } |
AzureIoTClient | 4:57e049bce51e | 301 | } |
AzureIoTClient | 4:57e049bce51e | 302 | } |
AzureIoTClient | 4:57e049bce51e | 303 | } |
AzureIoTClient | 4:57e049bce51e | 304 | return result; |
AzureIoTClient | 4:57e049bce51e | 305 | } |
AzureIoTClient | 4:57e049bce51e | 306 | |
AzureIoTClient | 4:57e049bce51e | 307 | static void putSecondListAfterHeadOfFirst(PDLIST_ENTRY first, PDLIST_ENTRY second) |
AzureIoTClient | 4:57e049bce51e | 308 | { |
AzureIoTClient | 4:57e049bce51e | 309 | DList_AppendTailList(first->Flink, second); |
AzureIoTClient | 4:57e049bce51e | 310 | DList_RemoveEntryList(second); |
AzureIoTClient | 4:57e049bce51e | 311 | DList_InitializeListHead(second); // Just to be tidy. |
AzureIoTClient | 4:57e049bce51e | 312 | } |
AzureIoTClient | 4:57e049bce51e | 313 | |
AzureIoTClient | 4:57e049bce51e | 314 | static bool stopMessenger(pn_messenger_t* messenger) |
AzureIoTClient | 4:57e049bce51e | 315 | { |
AzureIoTClient | 4:57e049bce51e | 316 | bool succeeded; |
AzureIoTClient | 4:57e049bce51e | 317 | int result; |
AzureIoTClient | 4:57e049bce51e | 318 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_021: [Invoke pn_messenger_stop on the messenger.]*/ |
AzureIoTClient | 4:57e049bce51e | 319 | result = pn_messenger_stop(messenger); |
AzureIoTClient | 4:57e049bce51e | 320 | if (result == 0) |
AzureIoTClient | 4:57e049bce51e | 321 | { |
AzureIoTClient | 4:57e049bce51e | 322 | succeeded = true; |
AzureIoTClient | 4:57e049bce51e | 323 | } |
AzureIoTClient | 4:57e049bce51e | 324 | else if (result != PN_INPROGRESS) |
AzureIoTClient | 4:57e049bce51e | 325 | { |
AzureIoTClient | 4:57e049bce51e | 326 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_023: [If pn_messenger_stop returns any result other than PN_INPROGRESS then place the messenger on a list for attempting to stop later.]*/ |
AzureIoTClient | 4:57e049bce51e | 327 | succeeded = false; |
AzureIoTClient | 4:57e049bce51e | 328 | } |
AzureIoTClient | 4:57e049bce51e | 329 | else |
AzureIoTClient | 4:57e049bce51e | 330 | { |
AzureIoTClient | 4:57e049bce51e | 331 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_024: [If pn_messenger_stop returns PN_INPROGRESS invoke pn_messenger_stopped a fixed number of time, seeking a return of true.]*/ |
AzureIoTClient | 4:57e049bce51e | 332 | size_t numberOfTrys; |
AzureIoTClient | 4:57e049bce51e | 333 | succeeded = false; |
AzureIoTClient | 4:57e049bce51e | 334 | for (numberOfTrys = NUMBER_OF_MESSENGER_STOP_TRIES; numberOfTrys > 0; numberOfTrys--) |
AzureIoTClient | 4:57e049bce51e | 335 | { |
AzureIoTClient | 4:57e049bce51e | 336 | pn_messenger_work(messenger,100); |
AzureIoTClient | 4:57e049bce51e | 337 | if (pn_messenger_stopped(messenger)) |
AzureIoTClient | 4:57e049bce51e | 338 | { |
AzureIoTClient | 4:57e049bce51e | 339 | succeeded = true; |
AzureIoTClient | 4:57e049bce51e | 340 | break; |
AzureIoTClient | 4:57e049bce51e | 341 | } |
AzureIoTClient | 4:57e049bce51e | 342 | } |
AzureIoTClient | 4:57e049bce51e | 343 | } |
AzureIoTClient | 4:57e049bce51e | 344 | return succeeded; |
AzureIoTClient | 4:57e049bce51e | 345 | } |
AzureIoTClient | 4:57e049bce51e | 346 | |
AzureIoTClient | 4:57e049bce51e | 347 | static void herdTheMessengers(PAMQP_TRANSPORT_STATE state, bool logMessengerStopFailures) |
AzureIoTClient | 4:57e049bce51e | 348 | { |
AzureIoTClient | 4:57e049bce51e | 349 | PDLIST_ENTRY currentMessengerLink = state->messengerCorral.Flink; |
AzureIoTClient | 4:57e049bce51e | 350 | |
AzureIoTClient | 4:57e049bce51e | 351 | // |
AzureIoTClient | 4:57e049bce51e | 352 | // We walk the list of messenger containers. We try to stop each one in turn. |
AzureIoTClient | 4:57e049bce51e | 353 | // |
AzureIoTClient | 4:57e049bce51e | 354 | // If we are able to stop the contained messenger, we will free the actual messenger. We will then free the messenger container. |
AzureIoTClient | 4:57e049bce51e | 355 | // |
AzureIoTClient | 4:57e049bce51e | 356 | while (currentMessengerLink != &state->messengerCorral) |
AzureIoTClient | 4:57e049bce51e | 357 | { |
AzureIoTClient | 4:57e049bce51e | 358 | PDLIST_ENTRY nextLink = currentMessengerLink->Flink; |
AzureIoTClient | 4:57e049bce51e | 359 | pn_messenger_t* oldMessenger = containingRecord(currentMessengerLink, MESSENGER_CONTAINER, entry)->messengerThatDidNotStop; |
AzureIoTClient | 4:57e049bce51e | 360 | if (stopMessenger(oldMessenger)) |
AzureIoTClient | 4:57e049bce51e | 361 | { |
AzureIoTClient | 4:57e049bce51e | 362 | (void)(DList_RemoveEntryList(currentMessengerLink)); |
AzureIoTClient | 4:57e049bce51e | 363 | free(containingRecord(currentMessengerLink, MESSENGER_CONTAINER, entry)); |
AzureIoTClient | 4:57e049bce51e | 364 | pn_messenger_free(oldMessenger); |
AzureIoTClient | 4:57e049bce51e | 365 | } |
AzureIoTClient | 4:57e049bce51e | 366 | else |
AzureIoTClient | 4:57e049bce51e | 367 | { |
AzureIoTClient | 4:57e049bce51e | 368 | if (logMessengerStopFailures == true) |
AzureIoTClient | 4:57e049bce51e | 369 | { |
AzureIoTClient | 4:57e049bce51e | 370 | LogError("Unable to free the messenger at address: %p\r\n", oldMessenger); |
AzureIoTClient | 4:57e049bce51e | 371 | } |
AzureIoTClient | 4:57e049bce51e | 372 | } |
AzureIoTClient | 4:57e049bce51e | 373 | currentMessengerLink = nextLink; |
AzureIoTClient | 4:57e049bce51e | 374 | } |
AzureIoTClient | 4:57e049bce51e | 375 | } |
AzureIoTClient | 4:57e049bce51e | 376 | |
AzureIoTClient | 4:57e049bce51e | 377 | static void disposeOfOldMessenger(PAMQP_TRANSPORT_STATE state) |
AzureIoTClient | 4:57e049bce51e | 378 | { |
AzureIoTClient | 4:57e049bce51e | 379 | if (state->messenger) |
AzureIoTClient | 4:57e049bce51e | 380 | { |
AzureIoTClient | 4:57e049bce51e | 381 | if (stopMessenger(state->messenger)) |
AzureIoTClient | 4:57e049bce51e | 382 | { |
AzureIoTClient | 4:57e049bce51e | 383 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_022: [If pn_messenger_stop returns 0 then invoke pn_messenger_free on the messenger.]*/ |
AzureIoTClient | 4:57e049bce51e | 384 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_025: [If pn_messenger_stopped returns true, then call pn_messenger_free.]*/ |
AzureIoTClient | 4:57e049bce51e | 385 | // |
AzureIoTClient | 4:57e049bce51e | 386 | // Yay. It successfully stopped. |
AzureIoTClient | 4:57e049bce51e | 387 | // |
AzureIoTClient | 4:57e049bce51e | 388 | pn_messenger_free(state->messenger); |
AzureIoTClient | 4:57e049bce51e | 389 | } |
AzureIoTClient | 4:57e049bce51e | 390 | else |
AzureIoTClient | 4:57e049bce51e | 391 | { |
AzureIoTClient | 4:57e049bce51e | 392 | // |
AzureIoTClient | 4:57e049bce51e | 393 | // If we couldn't destroy it, then put it on a list and try to do it later in our "spare" time. |
AzureIoTClient | 4:57e049bce51e | 394 | // |
AzureIoTClient | 4:57e049bce51e | 395 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_023: [If pn_messenger_stop returns any result other than PN_INPROGRESS then place the messenger on a list for attempting to stop later.]*/ |
AzureIoTClient | 4:57e049bce51e | 396 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_026: [If pn_messenger_stopped never returns true, then place the messenger on a list for attempting to stop later.]*/ |
AzureIoTClient | 4:57e049bce51e | 397 | PMESSENGER_CONTAINER newContainer = malloc(sizeof(MESSENGER_CONTAINER)); |
AzureIoTClient | 4:57e049bce51e | 398 | if (newContainer == NULL) |
AzureIoTClient | 4:57e049bce51e | 399 | { |
AzureIoTClient | 4:57e049bce51e | 400 | // |
AzureIoTClient | 4:57e049bce51e | 401 | // Darn! This is not good. These containers are not very big. If we can't allocate one, things are pretty bad. |
AzureIoTClient | 4:57e049bce51e | 402 | // However, it doesn't make sense to actually free this messenger. It hasn't been stopped and we can NOT be sure who |
AzureIoTClient | 4:57e049bce51e | 403 | // is referencing the memory that it has allocated. The safest thing to do in this very bad situation is to drop |
AzureIoTClient | 4:57e049bce51e | 404 | // it on the floor. It's a leak, but a leak is better than anything else. There is a pretty good likelyhood that |
AzureIoTClient | 4:57e049bce51e | 405 | // the app is exiting soon. The dropped memory will be cleaned up by exit. |
AzureIoTClient | 4:57e049bce51e | 406 | ; |
AzureIoTClient | 4:57e049bce51e | 407 | } |
AzureIoTClient | 4:57e049bce51e | 408 | else |
AzureIoTClient | 4:57e049bce51e | 409 | { |
AzureIoTClient | 4:57e049bce51e | 410 | newContainer->messengerThatDidNotStop = state->messenger; |
AzureIoTClient | 4:57e049bce51e | 411 | DList_InsertTailList(&state->messengerCorral, &newContainer->entry); |
AzureIoTClient | 4:57e049bce51e | 412 | } |
AzureIoTClient | 4:57e049bce51e | 413 | } |
AzureIoTClient | 4:57e049bce51e | 414 | state->messenger = NULL; |
AzureIoTClient | 4:57e049bce51e | 415 | } |
AzureIoTClient | 4:57e049bce51e | 416 | } |
AzureIoTClient | 4:57e049bce51e | 417 | |
AzureIoTClient | 4:57e049bce51e | 418 | static void clientTransportAMQP_Destroy(TRANSPORT_HANDLE handle) |
AzureIoTClient | 4:57e049bce51e | 419 | { |
AzureIoTClient | 4:57e049bce51e | 420 | PAMQP_TRANSPORT_STATE transportState = (PAMQP_TRANSPORT_STATE)handle; |
AzureIoTClient | 4:57e049bce51e | 421 | |
AzureIoTClient | 4:57e049bce51e | 422 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_010: [clientTransportAMQP_Destroy shall do nothing if the handle is NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 423 | if (transportState) |
AzureIoTClient | 4:57e049bce51e | 424 | { |
AzureIoTClient | 4:57e049bce51e | 425 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_018: [clientTransportAMQP_Destroy shall free all the resources currently in use.]*/ |
AzureIoTClient | 4:57e049bce51e | 426 | // |
AzureIoTClient | 4:57e049bce51e | 427 | // Go through all of the active work items. Complete their associated messages. |
AzureIoTClient | 4:57e049bce51e | 428 | // |
AzureIoTClient | 4:57e049bce51e | 429 | while (!DList_IsListEmpty(&transportState->workInProgress)) |
AzureIoTClient | 4:57e049bce51e | 430 | { |
AzureIoTClient | 4:57e049bce51e | 431 | PDLIST_ENTRY currentEntry = DList_RemoveHeadList(&transportState->workInProgress); |
AzureIoTClient | 4:57e049bce51e | 432 | PAMQP_WORK_ITEM currentItem = containingRecord(currentEntry, AMQP_WORK_ITEM, link); |
AzureIoTClient | 4:57e049bce51e | 433 | IoTHubClient_LL_SendComplete(transportState->savedClientHandle, ¤tItem->eventMessages, IOTHUB_BATCHSTATE_FAILED); |
AzureIoTClient | 4:57e049bce51e | 434 | DList_InsertTailList(&transportState->availableWorkItems, ¤tItem->link); |
AzureIoTClient | 4:57e049bce51e | 435 | } |
AzureIoTClient | 4:57e049bce51e | 436 | |
AzureIoTClient | 4:57e049bce51e | 437 | // |
AzureIoTClient | 4:57e049bce51e | 438 | // Get rid of work items that aren't being used, and that should be everything given the above loop! |
AzureIoTClient | 4:57e049bce51e | 439 | // |
AzureIoTClient | 4:57e049bce51e | 440 | while (!DList_IsListEmpty(&transportState->availableWorkItems)) |
AzureIoTClient | 4:57e049bce51e | 441 | { |
AzureIoTClient | 4:57e049bce51e | 442 | PDLIST_ENTRY currentEntry = DList_RemoveHeadList(&transportState->availableWorkItems); |
AzureIoTClient | 4:57e049bce51e | 443 | free(containingRecord(currentEntry, AMQP_WORK_ITEM, link)); |
AzureIoTClient | 4:57e049bce51e | 444 | } |
AzureIoTClient | 4:57e049bce51e | 445 | |
AzureIoTClient | 4:57e049bce51e | 446 | disposeOfOldMessenger(transportState); |
AzureIoTClient | 4:57e049bce51e | 447 | |
AzureIoTClient | 4:57e049bce51e | 448 | // |
AzureIoTClient | 4:57e049bce51e | 449 | // herdTheMessengers will NOT free a messenger that couldn't be stopped. Therefore the following |
AzureIoTClient | 4:57e049bce51e | 450 | // function could result in a memory leak of old messengers. This is by FAR less of a problem then |
AzureIoTClient | 4:57e049bce51e | 451 | // having memory returned in to pool that something else might still be referring to. (To get all folksy |
AzureIoTClient | 4:57e049bce51e | 452 | // here, don't put a sick chicken back in the hen house.) |
AzureIoTClient | 4:57e049bce51e | 453 | // |
AzureIoTClient | 4:57e049bce51e | 454 | |
AzureIoTClient | 4:57e049bce51e | 455 | herdTheMessengers(transportState, true); |
AzureIoTClient | 4:57e049bce51e | 456 | if (transportState->message) |
AzureIoTClient | 4:57e049bce51e | 457 | { |
AzureIoTClient | 4:57e049bce51e | 458 | pn_message_free(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 459 | } |
AzureIoTClient | 4:57e049bce51e | 460 | STRING_delete(transportState->messageAddress); |
AzureIoTClient | 4:57e049bce51e | 461 | STRING_delete(transportState->eventAddress); |
AzureIoTClient | 4:57e049bce51e | 462 | STRING_delete(transportState->urledDeviceId); |
AzureIoTClient | 4:57e049bce51e | 463 | STRING_delete(transportState->devicesPortionPath); |
AzureIoTClient | 4:57e049bce51e | 464 | STRING_delete(transportState->cbsAddress); |
AzureIoTClient | 4:57e049bce51e | 465 | STRING_delete(transportState->deviceKey); |
AzureIoTClient | 4:57e049bce51e | 466 | STRING_delete(transportState->zeroLengthString); |
AzureIoTClient | 4:57e049bce51e | 467 | if (transportState->trustedCertificates != NULL) |
AzureIoTClient | 4:57e049bce51e | 468 | { |
AzureIoTClient | 4:57e049bce51e | 469 | free(transportState->trustedCertificates); |
AzureIoTClient | 4:57e049bce51e | 470 | } |
AzureIoTClient | 4:57e049bce51e | 471 | |
AzureIoTClient | 4:57e049bce51e | 472 | free(transportState); |
AzureIoTClient | 4:57e049bce51e | 473 | } |
AzureIoTClient | 4:57e049bce51e | 474 | } |
AzureIoTClient | 4:57e049bce51e | 475 | |
AzureIoTClient | 4:57e049bce51e | 476 | static int putToken(PAMQP_TRANSPORT_STATE transportState, STRING_HANDLE token) |
AzureIoTClient | 4:57e049bce51e | 477 | { |
AzureIoTClient | 4:57e049bce51e | 478 | int result = 0; |
AzureIoTClient | 4:57e049bce51e | 479 | |
AzureIoTClient | 4:57e049bce51e | 480 | pn_data_t *properties; |
AzureIoTClient | 4:57e049bce51e | 481 | pn_atom_t messageId; |
AzureIoTClient | 4:57e049bce51e | 482 | |
AzureIoTClient | 4:57e049bce51e | 483 | messageId.u.as_ulong = transportState->sendTokenMessageId; |
AzureIoTClient | 4:57e049bce51e | 484 | messageId.type = PN_ULONG; |
AzureIoTClient | 4:57e049bce51e | 485 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_130: [putToken clears the single messages that is used for all communication via proton.]*/ |
AzureIoTClient | 4:57e049bce51e | 486 | pn_message_clear(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 487 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_131: [putToken obtains the properties of the message.]*/ |
AzureIoTClient | 4:57e049bce51e | 488 | properties = pn_message_properties(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 489 | if (properties == NULL) |
AzureIoTClient | 4:57e049bce51e | 490 | { |
AzureIoTClient | 4:57e049bce51e | 491 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_132: [If this fails then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 492 | LogError("unable to pn_message_properties\r\n"); |
AzureIoTClient | 4:57e049bce51e | 493 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 494 | } |
AzureIoTClient | 4:57e049bce51e | 495 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_133: [putToken constructs a proton map which describes the put token operation. If this construction fails then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 496 | else if (!((pn_data_put_map(properties) == 0) && |
AzureIoTClient | 4:57e049bce51e | 497 | (pn_data_enter(properties) == true) && |
AzureIoTClient | 4:57e049bce51e | 498 | (pn_data_put_string(properties, pn_bytes(strlen(PROTON_MAP_OPERATIONS_KEY), PROTON_MAP_OPERATIONS_KEY)) == 0) && // key |
AzureIoTClient | 4:57e049bce51e | 499 | (pn_data_put_string(properties, pn_bytes(strlen(PROTON_MAP_PUT_TOKEN_OPERATION), PROTON_MAP_PUT_TOKEN_OPERATION)) == 0) && // value |
AzureIoTClient | 4:57e049bce51e | 500 | (pn_data_put_string(properties, pn_bytes(strlen(PROTON_MAP_TYPE_KEY), PROTON_MAP_TYPE_KEY)) == 0) && // key |
AzureIoTClient | 4:57e049bce51e | 501 | (pn_data_put_string(properties, pn_bytes(strlen(PROTON_MAP_TOKEN_TYPE), PROTON_MAP_TOKEN_TYPE)) == 0) && // value |
AzureIoTClient | 4:57e049bce51e | 502 | (pn_data_put_string(properties, pn_bytes(strlen(PROTON_MAP_NAME_KEY), PROTON_MAP_NAME_KEY)) == 0) && // key |
AzureIoTClient | 4:57e049bce51e | 503 | (pn_data_put_string(properties, pn_bytes(STRING_length(transportState->devicesPortionPath), STRING_c_str(transportState->devicesPortionPath))) == 0) && // value |
AzureIoTClient | 4:57e049bce51e | 504 | (pn_data_exit(properties)) |
AzureIoTClient | 4:57e049bce51e | 505 | )) |
AzureIoTClient | 4:57e049bce51e | 506 | { |
AzureIoTClient | 4:57e049bce51e | 507 | LogError("unable to build CBS put token map\r\n"); |
AzureIoTClient | 4:57e049bce51e | 508 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 509 | } |
AzureIoTClient | 4:57e049bce51e | 510 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_134: [putToken sets the address (CBS endpoint) that this put token operation is targeted to.]*/ |
AzureIoTClient | 4:57e049bce51e | 511 | else if (pn_message_set_reply_to(transportState->message, CBS_REPLY_TO) != 0) |
AzureIoTClient | 4:57e049bce51e | 512 | { |
AzureIoTClient | 4:57e049bce51e | 513 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_135: [If this fails then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 514 | LogError("unable to pn_message_set_reply_to\r\n"); |
AzureIoTClient | 4:57e049bce51e | 515 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 516 | } |
AzureIoTClient | 4:57e049bce51e | 517 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_136: [putToken sets the reply to address for the put token operation.]*/ |
AzureIoTClient | 4:57e049bce51e | 518 | else if (pn_message_set_address(transportState->message, STRING_c_str(transportState->cbsAddress)) != 0) |
AzureIoTClient | 4:57e049bce51e | 519 | { |
AzureIoTClient | 4:57e049bce51e | 520 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_137: [If this fails then putToken fails.] */ |
AzureIoTClient | 4:57e049bce51e | 521 | LogError("unable to pn_message_set_address\r\n"); |
AzureIoTClient | 4:57e049bce51e | 522 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 523 | } |
AzureIoTClient | 4:57e049bce51e | 524 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_138: [putToken sets the message to not be inferred.]*/ |
AzureIoTClient | 4:57e049bce51e | 525 | else if (pn_message_set_inferred(transportState->message, false) != 0) |
AzureIoTClient | 4:57e049bce51e | 526 | { |
AzureIoTClient | 4:57e049bce51e | 527 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_139: [If this fails then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 528 | LogError("unable to pn_message_set_inferred\r\n"); |
AzureIoTClient | 4:57e049bce51e | 529 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 530 | } |
AzureIoTClient | 4:57e049bce51e | 531 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_140: [putToken sets the messageId of the message to the expiry of the token.]*/ |
AzureIoTClient | 4:57e049bce51e | 532 | else if (pn_message_set_id(transportState->message, messageId) != 0) |
AzureIoTClient | 4:57e049bce51e | 533 | { |
AzureIoTClient | 4:57e049bce51e | 534 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_141: [If this fails then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 535 | LogError("Unable to set the message id on the transfer of the token to the CBS\r\n"); |
AzureIoTClient | 4:57e049bce51e | 536 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 537 | } |
AzureIoTClient | 4:57e049bce51e | 538 | else |
AzureIoTClient | 4:57e049bce51e | 539 | { |
AzureIoTClient | 4:57e049bce51e | 540 | pn_data_t* body; |
AzureIoTClient | 4:57e049bce51e | 541 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_142: [putToken obtains the body of the message.]*/ |
AzureIoTClient | 4:57e049bce51e | 542 | body = pn_message_body(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 543 | if (body == NULL) |
AzureIoTClient | 4:57e049bce51e | 544 | { |
AzureIoTClient | 4:57e049bce51e | 545 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_143: [If this fails then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 546 | LogError("Unable to pn_message_body\r\n"); |
AzureIoTClient | 4:57e049bce51e | 547 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 548 | } |
AzureIoTClient | 4:57e049bce51e | 549 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_144: [putToken places the actual SAS token into the body of the message.]*/ |
AzureIoTClient | 4:57e049bce51e | 550 | else if (pn_data_put_string(body, pn_bytes(STRING_length(token), STRING_c_str(token))) != 0) |
AzureIoTClient | 4:57e049bce51e | 551 | { |
AzureIoTClient | 4:57e049bce51e | 552 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_145: [If this fails then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 553 | LogError("Unable to pn_data_put_string\r\n"); |
AzureIoTClient | 4:57e049bce51e | 554 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 555 | } |
AzureIoTClient | 4:57e049bce51e | 556 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_146: [putToken invokes pn_messenger_put.]*/ |
AzureIoTClient | 4:57e049bce51e | 557 | else if (pn_messenger_put(transportState->messenger, transportState->message) != 0) |
AzureIoTClient | 4:57e049bce51e | 558 | { |
AzureIoTClient | 4:57e049bce51e | 559 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_147: [If this fails then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 560 | LogError("Unable to pn_messenger_put\r\n"); |
AzureIoTClient | 4:57e049bce51e | 561 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 562 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 563 | } |
AzureIoTClient | 4:57e049bce51e | 564 | else |
AzureIoTClient | 4:57e049bce51e | 565 | { |
AzureIoTClient | 4:57e049bce51e | 566 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_148: [A proton tracker is obtained.]*/ |
AzureIoTClient | 4:57e049bce51e | 567 | pn_tracker_t tracker = pn_messenger_outgoing_tracker(transportState->messenger); |
AzureIoTClient | 4:57e049bce51e | 568 | time_t beginningOfWaitLoop = get_time(NULL); |
AzureIoTClient | 4:57e049bce51e | 569 | time_t currentTime; |
AzureIoTClient | 4:57e049bce51e | 570 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 571 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_149: [putToken will loop invoking pn_messenger_work waiting for the message to reach a terminal delivery state.]*/ |
AzureIoTClient | 4:57e049bce51e | 572 | do |
AzureIoTClient | 4:57e049bce51e | 573 | { |
AzureIoTClient | 4:57e049bce51e | 574 | int protonResult; |
AzureIoTClient | 4:57e049bce51e | 575 | if (checkForErrorsThenWork(transportState) == false) |
AzureIoTClient | 4:57e049bce51e | 576 | { |
AzureIoTClient | 4:57e049bce51e | 577 | break; |
AzureIoTClient | 4:57e049bce51e | 578 | } |
AzureIoTClient | 4:57e049bce51e | 579 | else |
AzureIoTClient | 4:57e049bce51e | 580 | { |
AzureIoTClient | 4:57e049bce51e | 581 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_150: [If a terminal delivery state is not reached then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 582 | if ((protonResult = pn_messenger_status(transportState->messenger, tracker)) != PN_STATUS_PENDING) |
AzureIoTClient | 4:57e049bce51e | 583 | { |
AzureIoTClient | 4:57e049bce51e | 584 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_151: [On reaching a terminal delivery state, if the message status is NOT accepted then putToken fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 585 | if (protonResult != PN_STATUS_ACCEPTED) |
AzureIoTClient | 4:57e049bce51e | 586 | { |
AzureIoTClient | 4:57e049bce51e | 587 | LogError("Error sending the token: %s\r\n", pn_error_text(pn_messenger_error(transportState->messenger))); |
AzureIoTClient | 4:57e049bce51e | 588 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 589 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 590 | } |
AzureIoTClient | 4:57e049bce51e | 591 | else |
AzureIoTClient | 4:57e049bce51e | 592 | { |
AzureIoTClient | 4:57e049bce51e | 593 | result = 0; |
AzureIoTClient | 4:57e049bce51e | 594 | } |
AzureIoTClient | 4:57e049bce51e | 595 | break; |
AzureIoTClient | 4:57e049bce51e | 596 | } |
AzureIoTClient | 4:57e049bce51e | 597 | } |
AzureIoTClient | 4:57e049bce51e | 598 | currentTime = get_time(NULL); |
AzureIoTClient | 4:57e049bce51e | 599 | } while (difftime(currentTime, beginningOfWaitLoop) < transportState->cbsRequestAcceptTime); |
AzureIoTClient | 4:57e049bce51e | 600 | |
AzureIoTClient | 4:57e049bce51e | 601 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_152: [The tracker is settled.]*/ |
AzureIoTClient | 4:57e049bce51e | 602 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 603 | if (result == 0) |
AzureIoTClient | 4:57e049bce51e | 604 | { |
AzureIoTClient | 4:57e049bce51e | 605 | // |
AzureIoTClient | 4:57e049bce51e | 606 | // Successfully sent the token. Wait around for a reply. |
AzureIoTClient | 4:57e049bce51e | 607 | // |
AzureIoTClient | 4:57e049bce51e | 608 | transportState->waitingForPutTokenReply = true; |
AzureIoTClient | 4:57e049bce51e | 609 | beginningOfWaitLoop = get_time(NULL); |
AzureIoTClient | 4:57e049bce51e | 610 | result = __LINE__; |
AzureIoTClient | 4:57e049bce51e | 611 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_153: [putToken will again loop waiting for a reply.]*/ |
AzureIoTClient | 4:57e049bce51e | 612 | do |
AzureIoTClient | 4:57e049bce51e | 613 | { |
AzureIoTClient | 4:57e049bce51e | 614 | processReceives(transportState); |
AzureIoTClient | 4:57e049bce51e | 615 | if (transportState->waitingForPutTokenReply == true) |
AzureIoTClient | 4:57e049bce51e | 616 | { |
AzureIoTClient | 4:57e049bce51e | 617 | if (checkForErrorsThenWork(transportState) == false) |
AzureIoTClient | 4:57e049bce51e | 618 | { |
AzureIoTClient | 4:57e049bce51e | 619 | break; |
AzureIoTClient | 4:57e049bce51e | 620 | } |
AzureIoTClient | 4:57e049bce51e | 621 | } |
AzureIoTClient | 4:57e049bce51e | 622 | else |
AzureIoTClient | 4:57e049bce51e | 623 | { |
AzureIoTClient | 4:57e049bce51e | 624 | result = 0; |
AzureIoTClient | 4:57e049bce51e | 625 | break; |
AzureIoTClient | 4:57e049bce51e | 626 | } |
AzureIoTClient | 4:57e049bce51e | 627 | currentTime = get_time(NULL); |
AzureIoTClient | 4:57e049bce51e | 628 | } while (difftime(currentTime, beginningOfWaitLoop) < transportState->cbsReplyTime); |
AzureIoTClient | 4:57e049bce51e | 629 | } |
AzureIoTClient | 4:57e049bce51e | 630 | else |
AzureIoTClient | 4:57e049bce51e | 631 | { |
AzureIoTClient | 4:57e049bce51e | 632 | LogError("An network error occured while waiting for a CBS reply.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 633 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 634 | } |
AzureIoTClient | 4:57e049bce51e | 635 | } |
AzureIoTClient | 4:57e049bce51e | 636 | } |
AzureIoTClient | 4:57e049bce51e | 637 | pn_message_clear(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 638 | return result; |
AzureIoTClient | 4:57e049bce51e | 639 | } |
AzureIoTClient | 4:57e049bce51e | 640 | |
AzureIoTClient | 4:57e049bce51e | 641 | static void renewIfNecessaryTheCBS(PAMQP_TRANSPORT_STATE transportState) |
AzureIoTClient | 4:57e049bce51e | 642 | { |
AzureIoTClient | 4:57e049bce51e | 643 | |
AzureIoTClient | 4:57e049bce51e | 644 | // |
AzureIoTClient | 4:57e049bce51e | 645 | // There is an expiry stored in the state. It has the last expiry value used to define a |
AzureIoTClient | 4:57e049bce51e | 646 | // sas token. If we are within 20 minutes OR we're PAST that expiration generate a new |
AzureIoTClient | 4:57e049bce51e | 647 | // expiry time and create a new sas token and "put" it to the cbs. |
AzureIoTClient | 4:57e049bce51e | 648 | // |
AzureIoTClient | 4:57e049bce51e | 649 | |
AzureIoTClient | 4:57e049bce51e | 650 | size_t secondsSinceEpoch; |
AzureIoTClient | 4:57e049bce51e | 651 | int differenceWithLastExpiry; |
AzureIoTClient | 4:57e049bce51e | 652 | |
AzureIoTClient | 4:57e049bce51e | 653 | transportState->putTokenWasSuccessful = false; |
AzureIoTClient | 4:57e049bce51e | 654 | // |
AzureIoTClient | 4:57e049bce51e | 655 | // Get the number of seconds since the epoch. |
AzureIoTClient | 4:57e049bce51e | 656 | // |
AzureIoTClient | 4:57e049bce51e | 657 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_163: [Invocation of renewIfNecessaryTheCBS will first obtain the current number of seconds since the epoch.*/ |
AzureIoTClient | 4:57e049bce51e | 658 | secondsSinceEpoch = (size_t)(difftime(get_time(NULL), EPOCH_TIME_T_VALUE)+0); // adding zero because a compiler feels it's necessary. |
AzureIoTClient | 4:57e049bce51e | 659 | differenceWithLastExpiry = transportState->lastExpiryUsed - secondsSinceEpoch; |
AzureIoTClient | 4:57e049bce51e | 660 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_164: [If the difference between lastExpiryUsed and the current value is less than refresh seconds then renewIfNecessaryTheCBS will attempt to renew the SAS.]*/ |
AzureIoTClient | 4:57e049bce51e | 661 | if ((differenceWithLastExpiry <= 0) || |
AzureIoTClient | 4:57e049bce51e | 662 | (((size_t)differenceWithLastExpiry) < transportState->sasRefreshLine)) // Within refresh minutes (or past if negative) of the expiration |
AzureIoTClient | 4:57e049bce51e | 663 | { |
AzureIoTClient | 4:57e049bce51e | 664 | // |
AzureIoTClient | 4:57e049bce51e | 665 | // We already have the seconds since the epoch. Add an hour to it and generate the new SAS. |
AzureIoTClient | 4:57e049bce51e | 666 | // |
AzureIoTClient | 4:57e049bce51e | 667 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_165: [If SAS renewal is to occur then lifetime seconds is added to the current number of seconds.]*/ |
AzureIoTClient | 4:57e049bce51e | 668 | size_t possibleNewExpiry = secondsSinceEpoch + transportState->sasTokenLifetime; |
AzureIoTClient | 4:57e049bce51e | 669 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_169: [SASToken_Create is invoked.] */ |
AzureIoTClient | 4:57e049bce51e | 670 | STRING_HANDLE newSASToken = SASToken_Create(transportState->deviceKey, transportState->devicesPortionPath, transportState->zeroLengthString, possibleNewExpiry); |
AzureIoTClient | 4:57e049bce51e | 671 | if (newSASToken == NULL) |
AzureIoTClient | 4:57e049bce51e | 672 | { |
AzureIoTClient | 4:57e049bce51e | 673 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_170: [If SASToken_Create returns NULL then renewal is considered a failure and we move on to the next phase of DoWork.]*/ |
AzureIoTClient | 4:57e049bce51e | 674 | LogError("Could not generate a new SAS token for the CBS\r\n"); |
AzureIoTClient | 4:57e049bce51e | 675 | } |
AzureIoTClient | 4:57e049bce51e | 676 | else |
AzureIoTClient | 4:57e049bce51e | 677 | { |
AzureIoTClient | 4:57e049bce51e | 678 | // |
AzureIoTClient | 4:57e049bce51e | 679 | // We are going to save off in the transport state this POSSIBLE expiry value. Sending token and response processing code |
AzureIoTClient | 4:57e049bce51e | 680 | // will use it as the message id and correlation id for the request/response. This will work |
AzureIoTClient | 4:57e049bce51e | 681 | // because the code that sends the token will wait for AT LEAST one second for a valid response. If a valid response comes |
AzureIoTClient | 4:57e049bce51e | 682 | // back in that period of time then even if for some bizarre reason we need to renew again in less than a second, we know |
AzureIoTClient | 4:57e049bce51e | 683 | // there won't be a spurious response (because we just got the resonse!). |
AzureIoTClient | 4:57e049bce51e | 684 | // |
AzureIoTClient | 4:57e049bce51e | 685 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_166: [This value is saved in the state as sendTokenMessageId.]*/ |
AzureIoTClient | 4:57e049bce51e | 686 | transportState->sendTokenMessageId = possibleNewExpiry; |
AzureIoTClient | 4:57e049bce51e | 687 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_171: [renewIfNecessaryTheCBS will invoke a local static function putToken.]*/ |
AzureIoTClient | 4:57e049bce51e | 688 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_172: [If putToken fails then the renewal is considered a failure and we move on to the next phase of DoWork.]*/ |
AzureIoTClient | 4:57e049bce51e | 689 | if (putToken(transportState, newSASToken) == 0) |
AzureIoTClient | 4:57e049bce51e | 690 | { |
AzureIoTClient | 4:57e049bce51e | 691 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_173: [Note that putToken actually sets a state value which will indicate whether the CBS accepted the token and responded with success.]*/ |
AzureIoTClient | 4:57e049bce51e | 692 | if (transportState->putTokenWasSuccessful == true) |
AzureIoTClient | 4:57e049bce51e | 693 | { |
AzureIoTClient | 4:57e049bce51e | 694 | transportState->lastExpiryUsed = possibleNewExpiry; |
AzureIoTClient | 4:57e049bce51e | 695 | } |
AzureIoTClient | 4:57e049bce51e | 696 | } |
AzureIoTClient | 4:57e049bce51e | 697 | STRING_delete(newSASToken); |
AzureIoTClient | 4:57e049bce51e | 698 | } |
AzureIoTClient | 4:57e049bce51e | 699 | } |
AzureIoTClient | 4:57e049bce51e | 700 | } |
AzureIoTClient | 4:57e049bce51e | 701 | |
AzureIoTClient | 4:57e049bce51e | 702 | static bool protonMessengerInit(PAMQP_TRANSPORT_STATE amqpState) |
AzureIoTClient | 4:57e049bce51e | 703 | { |
AzureIoTClient | 4:57e049bce51e | 704 | if (!amqpState->messengerInitialized) |
AzureIoTClient | 4:57e049bce51e | 705 | { |
AzureIoTClient | 4:57e049bce51e | 706 | rollbackEvent(amqpState); |
AzureIoTClient | 4:57e049bce51e | 707 | disposeOfOldMessenger(amqpState); |
AzureIoTClient | 4:57e049bce51e | 708 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_027: [DoWork shall invoke pn_messenger to create a new messenger.]*/ |
AzureIoTClient | 4:57e049bce51e | 709 | if ((amqpState->messenger = pn_messenger(NULL)) == NULL) |
AzureIoTClient | 4:57e049bce51e | 710 | { |
AzureIoTClient | 4:57e049bce51e | 711 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_028: [If pn_messenger returns NULL then the messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 712 | LogError("The messenger is not able to be created.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 713 | } |
AzureIoTClient | 4:57e049bce51e | 714 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_01_001: [If the option "TrustedCerts" has been set (length greater than 0), the trusted certificates string shall be passed to Proton by a call to pn_messenger_set_trusted_certificates.] */ |
AzureIoTClient | 4:57e049bce51e | 715 | else if ((amqpState->trustedCertificates != NULL) && |
AzureIoTClient | 4:57e049bce51e | 716 | (strlen(amqpState->trustedCertificates) > 0) && |
AzureIoTClient | 4:57e049bce51e | 717 | (pn_messenger_set_trusted_certificates(amqpState->messenger, amqpState->trustedCertificates) != 0)) |
AzureIoTClient | 4:57e049bce51e | 718 | { |
AzureIoTClient | 4:57e049bce51e | 719 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_01_002: [If pn_messenger_set_trusted_certificates fails, then messenger initialization shall fail.] */ |
AzureIoTClient | 4:57e049bce51e | 720 | LogError("unable to pass certificate information via pn_messenger_set_trusted_certificates\r\n"); |
AzureIoTClient | 4:57e049bce51e | 721 | } |
AzureIoTClient | 4:57e049bce51e | 722 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_029: [pn_messenger_start shall be invoked.]*/ |
AzureIoTClient | 4:57e049bce51e | 723 | else if (pn_messenger_start(amqpState->messenger) != 0) |
AzureIoTClient | 4:57e049bce51e | 724 | { |
AzureIoTClient | 4:57e049bce51e | 725 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_030: [If pn_messenger_start returns a non-zero value then messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 726 | LogError("unable to pn_messenger_start\r\n"); |
AzureIoTClient | 4:57e049bce51e | 727 | } |
AzureIoTClient | 4:57e049bce51e | 728 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_031: [pn_messenger_set_blocking shall be invoked.]*/ |
AzureIoTClient | 4:57e049bce51e | 729 | else if (pn_messenger_set_blocking(amqpState->messenger, false) != 0) |
AzureIoTClient | 4:57e049bce51e | 730 | { |
AzureIoTClient | 4:57e049bce51e | 731 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_032: [If pn_messenger_set_blocking returns a non-zero value then messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 732 | LogError("unable to pn_messenger_set_blocking\r\n"); |
AzureIoTClient | 4:57e049bce51e | 733 | } |
AzureIoTClient | 4:57e049bce51e | 734 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_033: [pn_messenger_set_snd_settle_mode shall be invoked.]*/ |
AzureIoTClient | 4:57e049bce51e | 735 | else if (pn_messenger_set_snd_settle_mode(amqpState->messenger, PN_SND_UNSETTLED) != 0) |
AzureIoTClient | 4:57e049bce51e | 736 | { |
AzureIoTClient | 4:57e049bce51e | 737 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_034: [If pn_messenger_set_snd_settle_mode returns a non-zero value then messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 738 | LogError("unable to set the send settle mode\r\n"); |
AzureIoTClient | 4:57e049bce51e | 739 | } |
AzureIoTClient | 4:57e049bce51e | 740 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_035: [pn_messenger_set_rcv_settle_mode shall be invoked.]*/ |
AzureIoTClient | 4:57e049bce51e | 741 | else if (pn_messenger_set_rcv_settle_mode(amqpState->messenger, PN_RCV_FIRST) != 0) |
AzureIoTClient | 4:57e049bce51e | 742 | { |
AzureIoTClient | 4:57e049bce51e | 743 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_036: [If pn_messenger_set_rcv_settle_mode returns a non-zero value then messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 744 | LogError("unable to set the receive settle mode\r\n"); |
AzureIoTClient | 4:57e049bce51e | 745 | } |
AzureIoTClient | 4:57e049bce51e | 746 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_037: [pn_messenger_set_outgoing_window shall be invoked.]*/ |
AzureIoTClient | 4:57e049bce51e | 747 | else if (pn_messenger_set_outgoing_window(amqpState->messenger, PROTON_OUTGOING_WINDOW_SIZE) != 0) |
AzureIoTClient | 4:57e049bce51e | 748 | { |
AzureIoTClient | 4:57e049bce51e | 749 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_038: [If pn_messenger_set_outgoing_window returns a non-zero value then messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 750 | LogError("unable to pn_messenger_set_outgoing_window\r\n"); |
AzureIoTClient | 4:57e049bce51e | 751 | } |
AzureIoTClient | 4:57e049bce51e | 752 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_039: [pn_messenger_set_incoming_window shall be invoked.]*/ |
AzureIoTClient | 4:57e049bce51e | 753 | else if (pn_messenger_set_incoming_window(amqpState->messenger, PROTON_INCOMING_WINDOW_SIZE) != 0) |
AzureIoTClient | 4:57e049bce51e | 754 | { |
AzureIoTClient | 4:57e049bce51e | 755 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_040: [If pn_messenger_set_incoming_window returns a non-zero value then messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 756 | LogError("unable to pn_messenger_set_incoming_window\r\n"); |
AzureIoTClient | 4:57e049bce51e | 757 | } |
AzureIoTClient | 4:57e049bce51e | 758 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_156: [pn_messenger_subscribe will be invoked on the cbs address.]*/ |
AzureIoTClient | 4:57e049bce51e | 759 | else if ((amqpState->cbsSubscription = pn_messenger_subscribe(amqpState->messenger, (const char*)STRING_c_str(amqpState->cbsAddress))) == NULL) |
AzureIoTClient | 4:57e049bce51e | 760 | { |
AzureIoTClient | 4:57e049bce51e | 761 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_157: [If the pn_messenger_subscribe returns a non-zero value then messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 762 | LogError("unable to create a subscription to the cbs address\r\n"); |
AzureIoTClient | 4:57e049bce51e | 763 | } |
AzureIoTClient | 4:57e049bce51e | 764 | else |
AzureIoTClient | 4:57e049bce51e | 765 | { |
AzureIoTClient | 4:57e049bce51e | 766 | //We've got the subscription. Now we attempt to connect to the cbs. |
AzureIoTClient | 4:57e049bce51e | 767 | /*Codes_During messenger initialization a state variable known as lastExpiryUsed will be set to zero.*/ |
AzureIoTClient | 4:57e049bce51e | 768 | amqpState->lastExpiryUsed = 0; |
AzureIoTClient | 4:57e049bce51e | 769 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_159: [renewIfNecessaryCBS will be invoked.]*/ |
AzureIoTClient | 4:57e049bce51e | 770 | renewIfNecessaryTheCBS(amqpState); |
AzureIoTClient | 4:57e049bce51e | 771 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_160: [If after renewIfNecessaryCBS is invoked, the state variable putTokenWasSuccessful is false then the messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 772 | if (amqpState->putTokenWasSuccessful == true) |
AzureIoTClient | 4:57e049bce51e | 773 | { |
AzureIoTClient | 4:57e049bce51e | 774 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_041: [pn_messenger_subscribe shall be invoked.]*/ |
AzureIoTClient | 4:57e049bce51e | 775 | if ((amqpState->messageSubscription = pn_messenger_subscribe(amqpState->messenger, (const char*)STRING_c_str(amqpState->messageAddress))) == NULL) |
AzureIoTClient | 4:57e049bce51e | 776 | { |
AzureIoTClient | 4:57e049bce51e | 777 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_042: [If pn_messenger_subscribe returns a non-zero value then messenger initialization fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 778 | LogError("unable to create a subscription to the message address\r\n"); |
AzureIoTClient | 4:57e049bce51e | 779 | } |
AzureIoTClient | 4:57e049bce51e | 780 | else |
AzureIoTClient | 4:57e049bce51e | 781 | { |
AzureIoTClient | 4:57e049bce51e | 782 | amqpState->messengerInitialized = true; |
AzureIoTClient | 4:57e049bce51e | 783 | } |
AzureIoTClient | 4:57e049bce51e | 784 | } |
AzureIoTClient | 4:57e049bce51e | 785 | } |
AzureIoTClient | 4:57e049bce51e | 786 | } |
AzureIoTClient | 4:57e049bce51e | 787 | return amqpState->messengerInitialized; |
AzureIoTClient | 4:57e049bce51e | 788 | } |
AzureIoTClient | 4:57e049bce51e | 789 | |
AzureIoTClient | 4:57e049bce51e | 790 | static amqp_batch_result prepareBatch(size_t maximumPayload, PDLIST_ENTRY waitingToSend, PDLIST_ENTRY messagesMakingUpBatch, size_t* payloadSize, const unsigned char** payload) |
AzureIoTClient | 4:57e049bce51e | 791 | { |
AzureIoTClient | 4:57e049bce51e | 792 | amqp_batch_result result; |
AzureIoTClient | 4:57e049bce51e | 793 | if (DList_IsListEmpty(waitingToSend)) |
AzureIoTClient | 4:57e049bce51e | 794 | { |
AzureIoTClient | 4:57e049bce51e | 795 | result = amqp_batch_nowork; |
AzureIoTClient | 4:57e049bce51e | 796 | } |
AzureIoTClient | 4:57e049bce51e | 797 | else |
AzureIoTClient | 4:57e049bce51e | 798 | { |
AzureIoTClient | 4:57e049bce51e | 799 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_074: [If there is a waitingToSend entry remove it from the list.]*/ |
AzureIoTClient | 4:57e049bce51e | 800 | IOTHUB_MESSAGE_LIST* currentMessage; |
AzureIoTClient | 4:57e049bce51e | 801 | IOTHUBMESSAGE_CONTENT_TYPE contentType; |
AzureIoTClient | 4:57e049bce51e | 802 | size_t messageLength; |
AzureIoTClient | 4:57e049bce51e | 803 | const unsigned char* messagePayload; |
AzureIoTClient | 4:57e049bce51e | 804 | DList_InitializeListHead(messagesMakingUpBatch); |
AzureIoTClient | 4:57e049bce51e | 805 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_086: [If the pn_messenger_put succeeds then DoWork will save off a tracker obtained by invoking pn_messenger_outgoing_tracker and save it the head of the availableWorkItems. The eventMessages in the AMQP_WORK_ITEM head will also contain the IOTHUB_MESSAGE_LIST.]*/ |
AzureIoTClient | 4:57e049bce51e | 806 | DList_InsertTailList(messagesMakingUpBatch, DList_RemoveHeadList(waitingToSend)); |
AzureIoTClient | 4:57e049bce51e | 807 | currentMessage = containingRecord(messagesMakingUpBatch->Flink, IOTHUB_MESSAGE_LIST, entry); |
AzureIoTClient | 4:57e049bce51e | 808 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_075: [Get its size and payload address by calling IoTHubMessage_GetByteArray.]*/ |
AzureIoTClient | 4:57e049bce51e | 809 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_02_008: [If the message type is IOTHUBMESSAGE_STRING then get the data by using IoTHubMesage_GetString and set the size to the length of the string.] */ |
AzureIoTClient | 4:57e049bce51e | 810 | contentType = IoTHubMessage_GetContentType(currentMessage->messageHandle); |
AzureIoTClient | 4:57e049bce51e | 811 | if (!( |
AzureIoTClient | 4:57e049bce51e | 812 | ((contentType == IOTHUBMESSAGE_BYTEARRAY) && (IoTHubMessage_GetByteArray(currentMessage->messageHandle, &messagePayload, &messageLength) == IOTHUB_MESSAGE_OK)) || |
AzureIoTClient | 4:57e049bce51e | 813 | ((contentType == IOTHUBMESSAGE_STRING) && ( |
AzureIoTClient | 4:57e049bce51e | 814 | messagePayload = (const unsigned char*)IoTHubMessage_GetString(currentMessage->messageHandle), |
AzureIoTClient | 4:57e049bce51e | 815 | (messageLength = (messagePayload == NULL) ? 0 : strlen((const char*)messagePayload)), |
AzureIoTClient | 4:57e049bce51e | 816 | messagePayload != NULL) |
AzureIoTClient | 4:57e049bce51e | 817 | ) |
AzureIoTClient | 4:57e049bce51e | 818 | )) |
AzureIoTClient | 4:57e049bce51e | 819 | { |
AzureIoTClient | 4:57e049bce51e | 820 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_076: [If that fails then fail that event.]*/ |
AzureIoTClient | 4:57e049bce51e | 821 | LogError("Failure in getting message content. Type had decimal value = %d\r\n", contentType); |
AzureIoTClient | 4:57e049bce51e | 822 | result = amqp_batch_error; |
AzureIoTClient | 4:57e049bce51e | 823 | } |
AzureIoTClient | 4:57e049bce51e | 824 | else if (messageLength > maximumPayload) |
AzureIoTClient | 4:57e049bce51e | 825 | { |
AzureIoTClient | 4:57e049bce51e | 826 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_077: [If the size of the payload is greater than the maximum (currently 256*1024) fail that event.]*/ |
AzureIoTClient | 4:57e049bce51e | 827 | LogError("Batch length is too large.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 828 | result = amqp_batch_error; |
AzureIoTClient | 4:57e049bce51e | 829 | } |
AzureIoTClient | 4:57e049bce51e | 830 | else |
AzureIoTClient | 4:57e049bce51e | 831 | { |
AzureIoTClient | 4:57e049bce51e | 832 | *payloadSize = messageLength; |
AzureIoTClient | 4:57e049bce51e | 833 | *payload = messagePayload; |
AzureIoTClient | 4:57e049bce51e | 834 | result = amqp_batch_nobatch; |
AzureIoTClient | 4:57e049bce51e | 835 | } |
AzureIoTClient | 4:57e049bce51e | 836 | } |
AzureIoTClient | 4:57e049bce51e | 837 | return result; |
AzureIoTClient | 4:57e049bce51e | 838 | } |
AzureIoTClient | 4:57e049bce51e | 839 | |
AzureIoTClient | 4:57e049bce51e | 840 | static bool prepareSimpleProtonMessage(pn_message_t* message, STRING_HANDLE endpoint, size_t payloadLength, const unsigned char* payload) |
AzureIoTClient | 4:57e049bce51e | 841 | { |
AzureIoTClient | 4:57e049bce51e | 842 | bool result = false; |
AzureIoTClient | 4:57e049bce51e | 843 | pn_data_t * body; |
AzureIoTClient | 4:57e049bce51e | 844 | |
AzureIoTClient | 4:57e049bce51e | 845 | pn_message_clear(message); |
AzureIoTClient | 4:57e049bce51e | 846 | if (pn_message_set_address(message, STRING_c_str(endpoint)) != 0) |
AzureIoTClient | 4:57e049bce51e | 847 | { |
AzureIoTClient | 4:57e049bce51e | 848 | LogError("Unable to set amqp address for proton message.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 849 | } |
AzureIoTClient | 4:57e049bce51e | 850 | else if (pn_message_set_inferred(message, true) != 0) |
AzureIoTClient | 4:57e049bce51e | 851 | { |
AzureIoTClient | 4:57e049bce51e | 852 | LogError("Unable to set inferred to true for proton message.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 853 | } |
AzureIoTClient | 4:57e049bce51e | 854 | else if ((body = pn_message_body(message)) == NULL) |
AzureIoTClient | 4:57e049bce51e | 855 | { |
AzureIoTClient | 4:57e049bce51e | 856 | LogError("Unable to set proton message body.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 857 | } |
AzureIoTClient | 4:57e049bce51e | 858 | else if (pn_data_put_binary(body, pn_bytes(payloadLength, (const char*)payload)) != 0) |
AzureIoTClient | 4:57e049bce51e | 859 | { |
AzureIoTClient | 4:57e049bce51e | 860 | LogError("Unable to set binary data for message body.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 861 | } |
AzureIoTClient | 4:57e049bce51e | 862 | else |
AzureIoTClient | 4:57e049bce51e | 863 | { |
AzureIoTClient | 4:57e049bce51e | 864 | result = true; |
AzureIoTClient | 4:57e049bce51e | 865 | } |
AzureIoTClient | 4:57e049bce51e | 866 | |
AzureIoTClient | 4:57e049bce51e | 867 | return result; |
AzureIoTClient | 4:57e049bce51e | 868 | } |
AzureIoTClient | 4:57e049bce51e | 869 | |
AzureIoTClient | 4:57e049bce51e | 870 | static void rollbackEvent(PAMQP_TRANSPORT_STATE transportState) |
AzureIoTClient | 4:57e049bce51e | 871 | { |
AzureIoTClient | 4:57e049bce51e | 872 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_175: [The list of work in progress is tested to see if it is empty.]*/ |
AzureIoTClient | 4:57e049bce51e | 873 | while (!DList_IsListEmpty(&transportState->workInProgress)) |
AzureIoTClient | 4:57e049bce51e | 874 | { |
AzureIoTClient | 4:57e049bce51e | 875 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_176: [If it is not empty then the list is traversed.]*/ |
AzureIoTClient | 4:57e049bce51e | 876 | int settleResult; |
AzureIoTClient | 4:57e049bce51e | 877 | int protonResult; |
AzureIoTClient | 4:57e049bce51e | 878 | PDLIST_ENTRY newestEntry = transportState->workInProgress.Blink; |
AzureIoTClient | 4:57e049bce51e | 879 | PAMQP_WORK_ITEM currentWork = containingRecord(newestEntry, AMQP_WORK_ITEM, link); |
AzureIoTClient | 4:57e049bce51e | 880 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_179: [The status of the work item is acquired.]*/ |
AzureIoTClient | 4:57e049bce51e | 881 | protonResult = pn_messenger_status(transportState->messenger, currentWork->tracker); |
AzureIoTClient | 4:57e049bce51e | 882 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_180: [The item is settled.]*/ |
AzureIoTClient | 4:57e049bce51e | 883 | if ((settleResult = pn_messenger_settle(transportState->messenger, currentWork->tracker, 0)) != 0) |
AzureIoTClient | 4:57e049bce51e | 884 | { |
AzureIoTClient | 4:57e049bce51e | 885 | LogError("Attempt to settle a tracker produced an error: %d\r\n", settleResult); |
AzureIoTClient | 4:57e049bce51e | 886 | } |
AzureIoTClient | 4:57e049bce51e | 887 | if ((protonResult == PN_STATUS_ACCEPTED) || |
AzureIoTClient | 4:57e049bce51e | 888 | (protonResult == PN_STATUS_REJECTED) || |
AzureIoTClient | 4:57e049bce51e | 889 | (protonResult == PN_STATUS_RELEASED)) |
AzureIoTClient | 4:57e049bce51e | 890 | { |
AzureIoTClient | 4:57e049bce51e | 891 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_182: [Items that have been settled by the service will have their IOTHUB_MESSAGE_LIST completed.]*/ |
AzureIoTClient | 4:57e049bce51e | 892 | IoTHubClient_LL_SendComplete(transportState->savedClientHandle, ¤tWork->eventMessages, (protonResult == PN_STATUS_ACCEPTED) ? IOTHUB_BATCHSTATE_SUCCESS : IOTHUB_BATCHSTATE_FAILED); |
AzureIoTClient | 4:57e049bce51e | 893 | } |
AzureIoTClient | 4:57e049bce51e | 894 | else |
AzureIoTClient | 4:57e049bce51e | 895 | { |
AzureIoTClient | 4:57e049bce51e | 896 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_178: [Items that are not settled by the service will have their IOTHUB_MESSAGE_LIST removed from the work item and placed back on the waiting to send.]*/ |
AzureIoTClient | 4:57e049bce51e | 897 | putSecondListAfterHeadOfFirst(transportState->waitingToSend->Flink, ¤tWork->eventMessages); |
AzureIoTClient | 4:57e049bce51e | 898 | } |
AzureIoTClient | 4:57e049bce51e | 899 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_181: [The work item is removed from the in progress list and placed on the available list.]*/ |
AzureIoTClient | 4:57e049bce51e | 900 | DList_RemoveEntryList(newestEntry); |
AzureIoTClient | 4:57e049bce51e | 901 | DList_InsertTailList(&transportState->availableWorkItems, newestEntry); |
AzureIoTClient | 4:57e049bce51e | 902 | } |
AzureIoTClient | 4:57e049bce51e | 903 | } |
AzureIoTClient | 4:57e049bce51e | 904 | static void reclaimEventResources(PAMQP_TRANSPORT_STATE transportState) |
AzureIoTClient | 4:57e049bce51e | 905 | { |
AzureIoTClient | 4:57e049bce51e | 906 | PDLIST_ENTRY currentListEntry; |
AzureIoTClient | 4:57e049bce51e | 907 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_064: [Obtain the head of the workInProgress]*/ |
AzureIoTClient | 4:57e049bce51e | 908 | currentListEntry = transportState->workInProgress.Flink; |
AzureIoTClient | 4:57e049bce51e | 909 | while (currentListEntry != &transportState->workInProgress) |
AzureIoTClient | 4:57e049bce51e | 910 | { |
AzureIoTClient | 4:57e049bce51e | 911 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_065: [While head != listhead reclaimEventResources will do as follows.] */ |
AzureIoTClient | 4:57e049bce51e | 912 | int protonResult; |
AzureIoTClient | 4:57e049bce51e | 913 | PAMQP_WORK_ITEM currentWork = containingRecord(currentListEntry, AMQP_WORK_ITEM, link); |
AzureIoTClient | 4:57e049bce51e | 914 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_066: [Check the current status via pn_messenger_status via the tracker stored in the AMQP_WORK_ITEM.]*/ |
AzureIoTClient | 4:57e049bce51e | 915 | if ((protonResult = pn_messenger_status(transportState->messenger, currentWork->tracker)) == PN_STATUS_PENDING) |
AzureIoTClient | 4:57e049bce51e | 916 | { |
AzureIoTClient | 4:57e049bce51e | 917 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_183: [if the amount of time that the work item has been pending exceeds a timeout stored in the work item, the messenger will be marked as not initialized.]*/ |
AzureIoTClient | 4:57e049bce51e | 918 | size_t secondsSinceTheEpoch = (size_t)(difftime(get_time(NULL), EPOCH_TIME_T_VALUE) + 0); |
AzureIoTClient | 4:57e049bce51e | 919 | if (currentWork->expiry < secondsSinceTheEpoch) |
AzureIoTClient | 4:57e049bce51e | 920 | { |
AzureIoTClient | 4:57e049bce51e | 921 | LogError("A event operation timed out.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 922 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 923 | } |
AzureIoTClient | 4:57e049bce51e | 924 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_067: [reclaimEventResources shall go onto the next work item if the proton status is PN_STATUS_PENDING.]*/ |
AzureIoTClient | 4:57e049bce51e | 925 | currentListEntry = currentListEntry->Flink; |
AzureIoTClient | 4:57e049bce51e | 926 | } |
AzureIoTClient | 4:57e049bce51e | 927 | else |
AzureIoTClient | 4:57e049bce51e | 928 | { |
AzureIoTClient | 4:57e049bce51e | 929 | DLIST_ENTRY savedFromCurrentListEntry; |
AzureIoTClient | 4:57e049bce51e | 930 | int settleResult; |
AzureIoTClient | 4:57e049bce51e | 931 | // Yay! It's finished. Take it off the in progress list. |
AzureIoTClient | 4:57e049bce51e | 932 | savedFromCurrentListEntry.Flink = currentListEntry->Flink; // We need to save this because it will be stomped on when we remove it from the work in progress. |
AzureIoTClient | 4:57e049bce51e | 933 | |
AzureIoTClient | 4:57e049bce51e | 934 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_068: [Otherwise reclaimEventResources will use the result of IOTHUB_BATCHSTATE_SUCCESS if the proton status was PN_STATUS_ACCEPTED.]*/ |
AzureIoTClient | 4:57e049bce51e | 935 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_069: [Otherwise reclaimEventResources will use the status of IOTHUB_BATCHSTATE_FAILED if the proton status was NOT PN_STATUS_ACCEPTED.] */ |
AzureIoTClient | 4:57e049bce51e | 936 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_070: [reclaimEventResources will invoke IotHubClient_SendBatchComplete with the IOTHUB_CLIENT_LL_HANDLE, supplied to reclaimEventResources, also pass the eventMessages stored in the AMQP_WORK_ITEM, and finally pass the above IOTHUB_BATCH status.]*/ |
AzureIoTClient | 4:57e049bce51e | 937 | IoTHubClient_LL_SendComplete(transportState->savedClientHandle, ¤tWork->eventMessages, (protonResult == PN_STATUS_ACCEPTED) ? IOTHUB_BATCHSTATE_SUCCESS : IOTHUB_BATCHSTATE_FAILED); |
AzureIoTClient | 4:57e049bce51e | 938 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_090: [reclaimEventResources will release the tracker by invoking pn_messenger_settle.]*/ |
AzureIoTClient | 4:57e049bce51e | 939 | if ((settleResult = pn_messenger_settle(transportState->messenger, currentWork->tracker, 0)) != 0) |
AzureIoTClient | 4:57e049bce51e | 940 | { |
AzureIoTClient | 4:57e049bce51e | 941 | LogError("Attempt to settle a tracker produced an error: %d\r\n", settleResult); |
AzureIoTClient | 4:57e049bce51e | 942 | } |
AzureIoTClient | 4:57e049bce51e | 943 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_071: [reclaimEventResources will take the current work item from the workInProgress list and insert it on the tail of the availableWorkItems list.]*/ |
AzureIoTClient | 4:57e049bce51e | 944 | DList_RemoveEntryList(currentListEntry); |
AzureIoTClient | 4:57e049bce51e | 945 | DList_InsertTailList(&transportState->availableWorkItems, currentListEntry); |
AzureIoTClient | 4:57e049bce51e | 946 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_072: [reclaimEventResources will continue to iterate over the workInProgress list until it returns to the list head.]*/ |
AzureIoTClient | 4:57e049bce51e | 947 | currentListEntry = savedFromCurrentListEntry.Flink; |
AzureIoTClient | 4:57e049bce51e | 948 | } |
AzureIoTClient | 4:57e049bce51e | 949 | } |
AzureIoTClient | 4:57e049bce51e | 950 | } |
AzureIoTClient | 4:57e049bce51e | 951 | |
AzureIoTClient | 4:57e049bce51e | 952 | static void sendEvent(PAMQP_TRANSPORT_STATE transportState) |
AzureIoTClient | 4:57e049bce51e | 953 | { |
AzureIoTClient | 4:57e049bce51e | 954 | while (!DList_IsListEmpty(&transportState->availableWorkItems)) |
AzureIoTClient | 4:57e049bce51e | 955 | { |
AzureIoTClient | 4:57e049bce51e | 956 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_073: [While the availableWorkItems is NOT empty loop.] */ |
AzureIoTClient | 4:57e049bce51e | 957 | PAMQP_WORK_ITEM headOfAvailable = containingRecord(transportState->availableWorkItems.Flink, AMQP_WORK_ITEM, link); |
AzureIoTClient | 4:57e049bce51e | 958 | size_t payloadSize; |
AzureIoTClient | 4:57e049bce51e | 959 | const unsigned char* payloadAddress; |
AzureIoTClient | 4:57e049bce51e | 960 | amqp_batch_result amqpBatchResult; |
AzureIoTClient | 4:57e049bce51e | 961 | amqpBatchResult = prepareBatch(MAXIMUM_EVENT_LENGTH, transportState->waitingToSend, &headOfAvailable->eventMessages, &payloadSize, &payloadAddress); |
AzureIoTClient | 4:57e049bce51e | 962 | if (amqpBatchResult == amqp_batch_nowork) |
AzureIoTClient | 4:57e049bce51e | 963 | { |
AzureIoTClient | 4:57e049bce51e | 964 | // no work to do. Stop trying. |
AzureIoTClient | 4:57e049bce51e | 965 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_089: [If there is nothing on the list then go on to the message.]*/ |
AzureIoTClient | 4:57e049bce51e | 966 | break; |
AzureIoTClient | 4:57e049bce51e | 967 | } |
AzureIoTClient | 4:57e049bce51e | 968 | else if (amqpBatchResult == amqp_batch_error) |
AzureIoTClient | 4:57e049bce51e | 969 | { |
AzureIoTClient | 4:57e049bce51e | 970 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_078: [If the event failed call invoke IotHubClient_SendBatchComplete as above utilizing the eventMessages list of the head of the availableWorkItems and a status of IOTHUB_BATCHSTATE_FAILED.]*/ |
AzureIoTClient | 4:57e049bce51e | 971 | IoTHubClient_LL_SendComplete(transportState->savedClientHandle, &headOfAvailable->eventMessages, IOTHUB_BATCHSTATE_FAILED); |
AzureIoTClient | 4:57e049bce51e | 972 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_079: [Continue this send loop.]*/ |
AzureIoTClient | 4:57e049bce51e | 973 | } |
AzureIoTClient | 4:57e049bce51e | 974 | else |
AzureIoTClient | 4:57e049bce51e | 975 | { |
AzureIoTClient | 4:57e049bce51e | 976 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_080: [If the event did not fail then prepare a proton message using the following proton API: pn_message_set_address, pn_message_set_inferred, pn_message_body and pn_data_put_binary with the above saved size and address values.]*/ |
AzureIoTClient | 4:57e049bce51e | 977 | if (prepareSimpleProtonMessage(transportState->message, transportState->eventAddress, payloadSize, payloadAddress) == false) |
AzureIoTClient | 4:57e049bce51e | 978 | { |
AzureIoTClient | 4:57e049bce51e | 979 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_081: [sendEvent will take the item that had been the head of the waitingToSend and put it back at the head of the waitingToSend list.]*/ |
AzureIoTClient | 4:57e049bce51e | 980 | putSecondListAfterHeadOfFirst(transportState->waitingToSend, &headOfAvailable->eventMessages); |
AzureIoTClient | 4:57e049bce51e | 981 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_082: [sendEvent will then break out of the send loop.]*/ |
AzureIoTClient | 4:57e049bce51e | 982 | break; |
AzureIoTClient | 4:57e049bce51e | 983 | } |
AzureIoTClient | 4:57e049bce51e | 984 | else if (setProperties(&headOfAvailable->eventMessages, transportState->message) != 0) |
AzureIoTClient | 4:57e049bce51e | 985 | { |
AzureIoTClient | 4:57e049bce51e | 986 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_081: [sendEvent will take the item that had been the head of the waitingToSend and put it back at the head of the waitingToSend list.]*/ |
AzureIoTClient | 4:57e049bce51e | 987 | putSecondListAfterHeadOfFirst(transportState->waitingToSend, &headOfAvailable->eventMessages); |
AzureIoTClient | 4:57e049bce51e | 988 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_082: [sendEvent will then break out of the send loop.]*/ |
AzureIoTClient | 4:57e049bce51e | 989 | break; |
AzureIoTClient | 4:57e049bce51e | 990 | } |
AzureIoTClient | 4:57e049bce51e | 991 | else |
AzureIoTClient | 4:57e049bce51e | 992 | { |
AzureIoTClient | 4:57e049bce51e | 993 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_083: [If the proton API is successful then invoke pn_messenger_put.]*/ |
AzureIoTClient | 4:57e049bce51e | 994 | int protonResult; |
AzureIoTClient | 4:57e049bce51e | 995 | protonResult = pn_messenger_put(transportState->messenger, transportState->message); |
AzureIoTClient | 4:57e049bce51e | 996 | if (protonResult != 0) |
AzureIoTClient | 4:57e049bce51e | 997 | { |
AzureIoTClient | 4:57e049bce51e | 998 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_084: [If that fails, sendEvent will take the item that had been the head of the waitingToSend and put it back at the head of the waitingToSend list.]*/ |
AzureIoTClient | 4:57e049bce51e | 999 | putSecondListAfterHeadOfFirst(transportState->waitingToSend, &headOfAvailable->eventMessages); |
AzureIoTClient | 4:57e049bce51e | 1000 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_085: [sendEvent will then break out of the send loop.]*/ |
AzureIoTClient | 4:57e049bce51e | 1001 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 1002 | break; |
AzureIoTClient | 4:57e049bce51e | 1003 | } |
AzureIoTClient | 4:57e049bce51e | 1004 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_184: [The work item will also contain a timeout that shall denote how long the transport will wait before initiating error recovery.]*/ |
AzureIoTClient | 4:57e049bce51e | 1005 | headOfAvailable->expiry = (size_t)(difftime(get_time(NULL), EPOCH_TIME_T_VALUE) + transportState->eventTimeout); |
AzureIoTClient | 4:57e049bce51e | 1006 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_086: [If the pn_messenger_put succeeds then sendEvent will save off a tracker obtained by invoking pn_messenger_outgoing_tracker and save it the head of the availableWorkItems. The eventMessages in the AMQP_WORK_ITEM head will also contain the IOTHUB_MESSAGE_LIST.]*/ |
AzureIoTClient | 4:57e049bce51e | 1007 | headOfAvailable->tracker = pn_messenger_outgoing_tracker(transportState->messenger); |
AzureIoTClient | 4:57e049bce51e | 1008 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_087: [The head of the availableWorkItems will be removed and placed on the workInProgress list.]*/ |
AzureIoTClient | 4:57e049bce51e | 1009 | DList_InsertTailList(&transportState->workInProgress, DList_RemoveHeadList(&transportState->availableWorkItems)); |
AzureIoTClient | 4:57e049bce51e | 1010 | } |
AzureIoTClient | 4:57e049bce51e | 1011 | } |
AzureIoTClient | 4:57e049bce51e | 1012 | } |
AzureIoTClient | 4:57e049bce51e | 1013 | } |
AzureIoTClient | 4:57e049bce51e | 1014 | static void processCBSReply(PAMQP_TRANSPORT_STATE transportState, pn_tracker_t tracker) |
AzureIoTClient | 4:57e049bce51e | 1015 | { |
AzureIoTClient | 4:57e049bce51e | 1016 | bool goodMessage = false; |
AzureIoTClient | 4:57e049bce51e | 1017 | pn_atom_t correlationId; |
AzureIoTClient | 4:57e049bce51e | 1018 | |
AzureIoTClient | 4:57e049bce51e | 1019 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_112: [The correlationId message property is obtained via a call to pn_message_get_correlation_id.]*/ |
AzureIoTClient | 4:57e049bce51e | 1020 | correlationId = pn_message_get_correlation_id(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 1021 | |
AzureIoTClient | 4:57e049bce51e | 1022 | // |
AzureIoTClient | 4:57e049bce51e | 1023 | // If it isn't the one we're looking for, simply accept it, because we don't want to see it and we can't do anything with it. |
AzureIoTClient | 4:57e049bce51e | 1024 | // |
AzureIoTClient | 4:57e049bce51e | 1025 | |
AzureIoTClient | 4:57e049bce51e | 1026 | if (correlationId.u.as_ulong != transportState->sendTokenMessageId) |
AzureIoTClient | 4:57e049bce51e | 1027 | { |
AzureIoTClient | 4:57e049bce51e | 1028 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_113: [The id is compared to the state variable sendTokenMessageId. If there is no match, an error is logged, the message is abandoned and processCBSReply returns.]*/ |
AzureIoTClient | 4:57e049bce51e | 1029 | LogError("An old reply from a CBS renewal drifed in. Moving on\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1030 | } |
AzureIoTClient | 4:57e049bce51e | 1031 | else |
AzureIoTClient | 4:57e049bce51e | 1032 | { |
AzureIoTClient | 4:57e049bce51e | 1033 | // |
AzureIoTClient | 4:57e049bce51e | 1034 | // This is the response we're looking for! |
AzureIoTClient | 4:57e049bce51e | 1035 | // |
AzureIoTClient | 4:57e049bce51e | 1036 | |
AzureIoTClient | 4:57e049bce51e | 1037 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_114: [Obtain the properties of the message by invoking pn_message_properties.]*/ |
AzureIoTClient | 4:57e049bce51e | 1038 | pn_data_t* propertyData = pn_message_properties(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 1039 | |
AzureIoTClient | 4:57e049bce51e | 1040 | transportState->waitingForPutTokenReply = false; |
AzureIoTClient | 4:57e049bce51e | 1041 | if (propertyData == NULL) |
AzureIoTClient | 4:57e049bce51e | 1042 | { |
AzureIoTClient | 4:57e049bce51e | 1043 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_115: [If NULL then abandon the message and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1044 | LogError("Invalid response back from the CBS - no application properties\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1045 | } |
AzureIoTClient | 4:57e049bce51e | 1046 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_116: [Advance to the first property of the message via pn_data_next.]*/ |
AzureIoTClient | 4:57e049bce51e | 1047 | else if (pn_data_next(propertyData) == false) |
AzureIoTClient | 4:57e049bce51e | 1048 | { |
AzureIoTClient | 4:57e049bce51e | 1049 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_117: [If this fails, abandon and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1050 | LogError("Invalid response back from the CBS - application properties malformed\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1051 | } |
AzureIoTClient | 4:57e049bce51e | 1052 | else |
AzureIoTClient | 4:57e049bce51e | 1053 | { |
AzureIoTClient | 4:57e049bce51e | 1054 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_118: [Invoke pn_data_get_map to obtain the number of properties.]*/ |
AzureIoTClient | 4:57e049bce51e | 1055 | size_t numberOfProperties = pn_data_get_map(propertyData) / 2; |
AzureIoTClient | 4:57e049bce51e | 1056 | if (numberOfProperties < 1) // We MUST have at least the status property |
AzureIoTClient | 4:57e049bce51e | 1057 | { |
AzureIoTClient | 4:57e049bce51e | 1058 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_119: [If the number of properties is 0 then abandon and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1059 | LogError("Invalid response back from the CBS - invalid number of properties: %zu\r\n", pn_data_get_map(propertyData)); |
AzureIoTClient | 4:57e049bce51e | 1060 | } |
AzureIoTClient | 4:57e049bce51e | 1061 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_120: [Enter the property map by invoking pn_data_enter.]*/ |
AzureIoTClient | 4:57e049bce51e | 1062 | else if (pn_data_enter(propertyData) == false) |
AzureIoTClient | 4:57e049bce51e | 1063 | { |
AzureIoTClient | 4:57e049bce51e | 1064 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_121: [If that fails then abandon and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1065 | LogError("Invalid response back from the CBS - unable to access the sent properties\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1066 | } |
AzureIoTClient | 4:57e049bce51e | 1067 | else |
AzureIoTClient | 4:57e049bce51e | 1068 | { |
AzureIoTClient | 4:57e049bce51e | 1069 | pn_bytes_t propertyName; |
AzureIoTClient | 4:57e049bce51e | 1070 | int32_t resultStatus; |
AzureIoTClient | 4:57e049bce51e | 1071 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_122: [Get the property name.]*/ |
AzureIoTClient | 4:57e049bce51e | 1072 | if (getMapString(propertyData, &propertyName) != 0) |
AzureIoTClient | 4:57e049bce51e | 1073 | { |
AzureIoTClient | 4:57e049bce51e | 1074 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_123: [If that fails then abandon and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1075 | LogError("Unable to acquire the status value from the cbs request\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1076 | } |
AzureIoTClient | 4:57e049bce51e | 1077 | else if (strcmp(propertyName.start, PROTON_MAP_STATUS_CODE) != 0) |
AzureIoTClient | 4:57e049bce51e | 1078 | { |
AzureIoTClient | 4:57e049bce51e | 1079 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_124: [If the property name is not "status-code" than abandon and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1080 | LogError("Unknown application property returned: %s\r\n", propertyName.start); |
AzureIoTClient | 4:57e049bce51e | 1081 | } |
AzureIoTClient | 4:57e049bce51e | 1082 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_125: [Get the actual status code.]*/ |
AzureIoTClient | 4:57e049bce51e | 1083 | else if (getMapInt(propertyData, &resultStatus) != 0) |
AzureIoTClient | 4:57e049bce51e | 1084 | { |
AzureIoTClient | 4:57e049bce51e | 1085 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_126: [If that fails then abandon and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1086 | LogError("Unable to acquire the actual status of the CBS put token\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1087 | } |
AzureIoTClient | 4:57e049bce51e | 1088 | else if (resultStatus != 200) |
AzureIoTClient | 4:57e049bce51e | 1089 | { |
AzureIoTClient | 4:57e049bce51e | 1090 | pn_bytes_t statusDescription; |
AzureIoTClient | 4:57e049bce51e | 1091 | // |
AzureIoTClient | 4:57e049bce51e | 1092 | // Yeah, it's not what we want to hear but it's not as though anything was wrong with |
AzureIoTClient | 4:57e049bce51e | 1093 | // the message. |
AzureIoTClient | 4:57e049bce51e | 1094 | // |
AzureIoTClient | 4:57e049bce51e | 1095 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_127: [If the status code is not equal to 200 then attempt to acquire the explanation from the properties.]*/ |
AzureIoTClient | 4:57e049bce51e | 1096 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_128: [Accept the message and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1097 | goodMessage = true; |
AzureIoTClient | 4:57e049bce51e | 1098 | LogError("The CBS put token operation failed: %d\r\n", resultStatus); |
AzureIoTClient | 4:57e049bce51e | 1099 | if (numberOfProperties >= 2) |
AzureIoTClient | 4:57e049bce51e | 1100 | { |
AzureIoTClient | 4:57e049bce51e | 1101 | // |
AzureIoTClient | 4:57e049bce51e | 1102 | // Well we have an error. See if the next property is the status description. |
AzureIoTClient | 4:57e049bce51e | 1103 | // If it is, then log the value as further explanation |
AzureIoTClient | 4:57e049bce51e | 1104 | // |
AzureIoTClient | 4:57e049bce51e | 1105 | if (getMapString(propertyData, &propertyName) == 0) |
AzureIoTClient | 4:57e049bce51e | 1106 | { |
AzureIoTClient | 4:57e049bce51e | 1107 | if (strcmp(propertyName.start, PROTON_MAP_STATUS_DESCRIPTION) == 0) |
AzureIoTClient | 4:57e049bce51e | 1108 | { |
AzureIoTClient | 4:57e049bce51e | 1109 | if (getMapString(propertyData, &statusDescription) == 0) |
AzureIoTClient | 4:57e049bce51e | 1110 | { |
AzureIoTClient | 4:57e049bce51e | 1111 | LogError("The CBS put token operation failed due to: %s\r\n", statusDescription.start); |
AzureIoTClient | 4:57e049bce51e | 1112 | } |
AzureIoTClient | 4:57e049bce51e | 1113 | } |
AzureIoTClient | 4:57e049bce51e | 1114 | } |
AzureIoTClient | 4:57e049bce51e | 1115 | } |
AzureIoTClient | 4:57e049bce51e | 1116 | } |
AzureIoTClient | 4:57e049bce51e | 1117 | else |
AzureIoTClient | 4:57e049bce51e | 1118 | { |
AzureIoTClient | 4:57e049bce51e | 1119 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_129: [If the status code was 200 then set the state variable putTokenWasSuccessful, accept the message and return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1120 | goodMessage = true; |
AzureIoTClient | 4:57e049bce51e | 1121 | transportState->putTokenWasSuccessful = true; |
AzureIoTClient | 4:57e049bce51e | 1122 | } |
AzureIoTClient | 4:57e049bce51e | 1123 | } |
AzureIoTClient | 4:57e049bce51e | 1124 | } |
AzureIoTClient | 4:57e049bce51e | 1125 | } |
AzureIoTClient | 4:57e049bce51e | 1126 | if (goodMessage == true) |
AzureIoTClient | 4:57e049bce51e | 1127 | { |
AzureIoTClient | 4:57e049bce51e | 1128 | pn_messenger_accept(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1129 | } |
AzureIoTClient | 4:57e049bce51e | 1130 | else |
AzureIoTClient | 4:57e049bce51e | 1131 | { |
AzureIoTClient | 4:57e049bce51e | 1132 | pn_messenger_release(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1133 | } |
AzureIoTClient | 4:57e049bce51e | 1134 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1135 | } |
AzureIoTClient | 4:57e049bce51e | 1136 | |
AzureIoTClient | 4:57e049bce51e | 1137 | static void processMessage(PAMQP_TRANSPORT_STATE transportState, pn_tracker_t tracker) |
AzureIoTClient | 4:57e049bce51e | 1138 | { |
AzureIoTClient | 4:57e049bce51e | 1139 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_111: [If the state variable DoWork_PullMessage is false then the message shall be rejected and processMessage shall return.]*/ |
AzureIoTClient | 4:57e049bce51e | 1140 | if (transportState->DoWork_PullMessages == false) |
AzureIoTClient | 4:57e049bce51e | 1141 | { |
AzureIoTClient | 4:57e049bce51e | 1142 | // |
AzureIoTClient | 4:57e049bce51e | 1143 | // Nothing to do with the message. We reject it. In that way it can come back later. |
AzureIoTClient | 4:57e049bce51e | 1144 | // |
AzureIoTClient | 4:57e049bce51e | 1145 | pn_messenger_reject(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1146 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1147 | } |
AzureIoTClient | 4:57e049bce51e | 1148 | else |
AzureIoTClient | 4:57e049bce51e | 1149 | { |
AzureIoTClient | 4:57e049bce51e | 1150 | pn_data_t *body; |
AzureIoTClient | 4:57e049bce51e | 1151 | |
AzureIoTClient | 4:57e049bce51e | 1152 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_050: [processMessage will acquire the body of the message by invoking pn_message_body.]*/ |
AzureIoTClient | 4:57e049bce51e | 1153 | if ((body = pn_message_body(transportState->message)) == NULL) |
AzureIoTClient | 4:57e049bce51e | 1154 | { |
AzureIoTClient | 4:57e049bce51e | 1155 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_051: [If the body is NULL then the message will be abandoned.]*/ |
AzureIoTClient | 4:57e049bce51e | 1156 | LogError("Failed to get the proton message body\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1157 | pn_messenger_release(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1158 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1159 | } |
AzureIoTClient | 4:57e049bce51e | 1160 | else |
AzureIoTClient | 4:57e049bce51e | 1161 | { |
AzureIoTClient | 4:57e049bce51e | 1162 | pn_bytes_t sizeAndData; |
AzureIoTClient | 4:57e049bce51e | 1163 | bool keepProcessingThisMessage = true; |
AzureIoTClient | 4:57e049bce51e | 1164 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_054: [processMessage will check for a null (note the lowercase) body by invoking pn_data_next.]*/ |
AzureIoTClient | 4:57e049bce51e | 1165 | if (pn_data_next(body) == false) |
AzureIoTClient | 4:57e049bce51e | 1166 | { |
AzureIoTClient | 4:57e049bce51e | 1167 | // |
AzureIoTClient | 4:57e049bce51e | 1168 | // We have a null body. This is reasonable. It should also be pointed out that |
AzureIoTClient | 4:57e049bce51e | 1169 | // pn_data_next call shouldn't be thought of as checking for the existence of something. |
AzureIoTClient | 4:57e049bce51e | 1170 | // It should be thought of as actually MOVING through a tree structure in the message. |
AzureIoTClient | 4:57e049bce51e | 1171 | // |
AzureIoTClient | 4:57e049bce51e | 1172 | sizeAndData.size = 0; |
AzureIoTClient | 4:57e049bce51e | 1173 | sizeAndData.start = NULL; |
AzureIoTClient | 4:57e049bce51e | 1174 | } |
AzureIoTClient | 4:57e049bce51e | 1175 | else |
AzureIoTClient | 4:57e049bce51e | 1176 | { |
AzureIoTClient | 4:57e049bce51e | 1177 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_055: [If the body is NOT null then processMessage will check that the body is of type PN_BINARY.]*/ |
AzureIoTClient | 4:57e049bce51e | 1178 | if (PN_BINARY != pn_data_type(body)) |
AzureIoTClient | 4:57e049bce51e | 1179 | { |
AzureIoTClient | 4:57e049bce51e | 1180 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_056: [processMessage will abandon the message with body types that are NOT PN_BINARY, the IOTHUB_MESSAGE_HANDLE will be destroyed and the loop will be continued.]*/ |
AzureIoTClient | 4:57e049bce51e | 1181 | LogError("Message received via AMQP was not PN_BINARY\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1182 | sizeAndData.size = 0; // Compilers get upset. |
AzureIoTClient | 4:57e049bce51e | 1183 | sizeAndData.start = NULL; |
AzureIoTClient | 4:57e049bce51e | 1184 | pn_messenger_release(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1185 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1186 | keepProcessingThisMessage = false; |
AzureIoTClient | 4:57e049bce51e | 1187 | } |
AzureIoTClient | 4:57e049bce51e | 1188 | else |
AzureIoTClient | 4:57e049bce51e | 1189 | { |
AzureIoTClient | 4:57e049bce51e | 1190 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_057: [The length and a pointer to the payload will be acquired and saved by invoking pn_data_get_binary.]*/ |
AzureIoTClient | 4:57e049bce51e | 1191 | sizeAndData = pn_data_get_binary(body); |
AzureIoTClient | 4:57e049bce51e | 1192 | } |
AzureIoTClient | 4:57e049bce51e | 1193 | } |
AzureIoTClient | 4:57e049bce51e | 1194 | if (keepProcessingThisMessage == true) |
AzureIoTClient | 4:57e049bce51e | 1195 | { |
AzureIoTClient | 4:57e049bce51e | 1196 | IOTHUB_MESSAGE_HANDLE ioTMessage; |
AzureIoTClient | 4:57e049bce51e | 1197 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_058: [The IOTHUB_MESSAGE_HANDLE will be set by invoking IotHubMessage_SetData with the previously saved length and pointer to payload.]*/ |
AzureIoTClient | 4:57e049bce51e | 1198 | if ((ioTMessage = IoTHubMessage_CreateFromByteArray((const unsigned char*)sizeAndData.start, sizeAndData.size)) == NULL) |
AzureIoTClient | 4:57e049bce51e | 1199 | { |
AzureIoTClient | 4:57e049bce51e | 1200 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_059: [processMessage will abandon the message if IotHubMessage_SetData returns any status other than IOTHUB_MESSAGE_OK.]*/ |
AzureIoTClient | 4:57e049bce51e | 1201 | LogError("Failed to set data for IoT hub message\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1202 | pn_messenger_release(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1203 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1204 | } |
AzureIoTClient | 4:57e049bce51e | 1205 | else if (cloneProperties(ioTMessage, transportState->message) != 0) |
AzureIoTClient | 4:57e049bce51e | 1206 | { |
AzureIoTClient | 4:57e049bce51e | 1207 | LogError("Failed to set data for IoT hub message\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1208 | pn_messenger_release(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1209 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1210 | } |
AzureIoTClient | 4:57e049bce51e | 1211 | else |
AzureIoTClient | 4:57e049bce51e | 1212 | { |
AzureIoTClient | 4:57e049bce51e | 1213 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_060: [If IOTHUB_MESSAGE_OK had been returned IoTHubClient_LL_MessageCallback will be invoked with the IOTHUB_MESSAGE_HANDLE.]*/ |
AzureIoTClient | 4:57e049bce51e | 1214 | IOTHUBMESSAGE_DISPOSITION_RESULT upperLayerDisposition = IoTHubClient_LL_MessageCallback(transportState->savedClientHandle, ioTMessage); |
AzureIoTClient | 4:57e049bce51e | 1215 | |
AzureIoTClient | 4:57e049bce51e | 1216 | if (upperLayerDisposition == IOTHUBMESSAGE_ACCEPTED) |
AzureIoTClient | 4:57e049bce51e | 1217 | { |
AzureIoTClient | 4:57e049bce51e | 1218 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_02_006: [If IoTHubClient_MessageCallback returns IOTHUBMESSAGE_ACCEPTED value then the message will be accepted.] */ |
AzureIoTClient | 4:57e049bce51e | 1219 | pn_messenger_accept(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1220 | } |
AzureIoTClient | 4:57e049bce51e | 1221 | else if (upperLayerDisposition == IOTHUBMESSAGE_ABANDONED) |
AzureIoTClient | 4:57e049bce51e | 1222 | { |
AzureIoTClient | 4:57e049bce51e | 1223 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_02_007: [If IoTHubClient_MessageCallback returns IOTHUBMESSAGE_ABANDONED value then the message will be abandoned.] */ |
AzureIoTClient | 4:57e049bce51e | 1224 | pn_messenger_release(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1225 | } |
AzureIoTClient | 4:57e049bce51e | 1226 | else |
AzureIoTClient | 4:57e049bce51e | 1227 | { |
AzureIoTClient | 4:57e049bce51e | 1228 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_061: [If IoTHubClient_MessageCallback returns IOTHUBMESSAGE_REJECTED value then the message will be rejected.]*/ |
AzureIoTClient | 4:57e049bce51e | 1229 | pn_messenger_reject(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1230 | } |
AzureIoTClient | 4:57e049bce51e | 1231 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1232 | } |
AzureIoTClient | 4:57e049bce51e | 1233 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_063: [processMessage will destroy the IOTHUB_MESSAGE_HANDLE by invoking IoTHubMessage_Destroy.]*/ |
AzureIoTClient | 4:57e049bce51e | 1234 | IoTHubMessage_Destroy(ioTMessage); |
AzureIoTClient | 4:57e049bce51e | 1235 | } |
AzureIoTClient | 4:57e049bce51e | 1236 | } |
AzureIoTClient | 4:57e049bce51e | 1237 | } |
AzureIoTClient | 4:57e049bce51e | 1238 | } |
AzureIoTClient | 4:57e049bce51e | 1239 | |
AzureIoTClient | 4:57e049bce51e | 1240 | static void processReceives(TRANSPORT_HANDLE handle) |
AzureIoTClient | 4:57e049bce51e | 1241 | { |
AzureIoTClient | 4:57e049bce51e | 1242 | PAMQP_TRANSPORT_STATE transportState = (PAMQP_TRANSPORT_STATE)handle; |
AzureIoTClient | 4:57e049bce51e | 1243 | int receiveResult; |
AzureIoTClient | 4:57e049bce51e | 1244 | |
AzureIoTClient | 4:57e049bce51e | 1245 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_043: [If DoWork_PullMessage is false then DoWork will cancel any preceding messages by invoking pn_messenger_recv.]*/ |
AzureIoTClient | 4:57e049bce51e | 1246 | |
AzureIoTClient | 4:57e049bce51e | 1247 | if ((transportState->DoWork_PullMessages == false) && (transportState->waitingForPutTokenReply == false)) |
AzureIoTClient | 4:57e049bce51e | 1248 | { |
AzureIoTClient | 4:57e049bce51e | 1249 | if ((receiveResult = pn_messenger_recv(transportState->messenger, 0)) != 0) |
AzureIoTClient | 4:57e049bce51e | 1250 | { |
AzureIoTClient | 4:57e049bce51e | 1251 | if ((receiveResult != PN_INPROGRESS) && (receiveResult != PN_TIMEOUT)) |
AzureIoTClient | 4:57e049bce51e | 1252 | { |
AzureIoTClient | 4:57e049bce51e | 1253 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_046: [If pn_messenger_recv fails it will be logged.]*/ |
AzureIoTClient | 4:57e049bce51e | 1254 | LogError("Error attempting to receive messages: %d\r\n", receiveResult); |
AzureIoTClient | 4:57e049bce51e | 1255 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_105: [processReceives will then go on to the next action of DoWork.]*/ |
AzureIoTClient | 4:57e049bce51e | 1256 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 1257 | } |
AzureIoTClient | 4:57e049bce51e | 1258 | } |
AzureIoTClient | 4:57e049bce51e | 1259 | } |
AzureIoTClient | 4:57e049bce51e | 1260 | else |
AzureIoTClient | 4:57e049bce51e | 1261 | { |
AzureIoTClient | 4:57e049bce51e | 1262 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_044: [If the DoWork_PullMessage or the waitingForPutTokenReply flag is true then processReceives will pull messages with pn_messenger_recv.]*/ |
AzureIoTClient | 4:57e049bce51e | 1263 | if ((receiveResult = pn_messenger_recv(transportState->messenger, PROTON_INCOMING_WINDOW_SIZE)) != 0) |
AzureIoTClient | 4:57e049bce51e | 1264 | { |
AzureIoTClient | 4:57e049bce51e | 1265 | if ((receiveResult != PN_INPROGRESS) && (receiveResult != PN_TIMEOUT)) |
AzureIoTClient | 4:57e049bce51e | 1266 | { |
AzureIoTClient | 4:57e049bce51e | 1267 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_046: [If pn_messenger_recv fails it will be logged.]*/ |
AzureIoTClient | 4:57e049bce51e | 1268 | LogError("Error attempting to receive messages: %d\r\n", receiveResult); |
AzureIoTClient | 4:57e049bce51e | 1269 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_105: [processReceives will then go on to the next action of DoWork.]*/ |
AzureIoTClient | 4:57e049bce51e | 1270 | transportState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 1271 | } |
AzureIoTClient | 4:57e049bce51e | 1272 | } |
AzureIoTClient | 4:57e049bce51e | 1273 | else |
AzureIoTClient | 4:57e049bce51e | 1274 | { |
AzureIoTClient | 4:57e049bce51e | 1275 | // |
AzureIoTClient | 4:57e049bce51e | 1276 | // If any are present we need to dispose of messages in the incoming queue. |
AzureIoTClient | 4:57e049bce51e | 1277 | // |
AzureIoTClient | 4:57e049bce51e | 1278 | size_t depthOfReceiveQueue; |
AzureIoTClient | 4:57e049bce51e | 1279 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_045: [processReceives will check the number of messages received by invoking pn_messenger_incoming.]*/ |
AzureIoTClient | 4:57e049bce51e | 1280 | for (depthOfReceiveQueue = pn_messenger_incoming(transportState->messenger); depthOfReceiveQueue > 0; depthOfReceiveQueue--) |
AzureIoTClient | 4:57e049bce51e | 1281 | { |
AzureIoTClient | 4:57e049bce51e | 1282 | int result; |
AzureIoTClient | 4:57e049bce51e | 1283 | pn_message_clear(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 1284 | // |
AzureIoTClient | 4:57e049bce51e | 1285 | // Ok something is there. First thing is to get it. |
AzureIoTClient | 4:57e049bce51e | 1286 | // |
AzureIoTClient | 4:57e049bce51e | 1287 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_047: [processReceives will retrieve a message with pn_messenger_get.]*/ |
AzureIoTClient | 4:57e049bce51e | 1288 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_048: [If pn_messenger_get fails we log and break the receive loop.]*/ |
AzureIoTClient | 4:57e049bce51e | 1289 | if ((result = pn_messenger_get(transportState->messenger, transportState->message)) != 0) |
AzureIoTClient | 4:57e049bce51e | 1290 | { |
AzureIoTClient | 4:57e049bce51e | 1291 | // |
AzureIoTClient | 4:57e049bce51e | 1292 | // Well that's pretty odd. We shouldn't have gotten here if the message queue was empty! |
AzureIoTClient | 4:57e049bce51e | 1293 | // |
AzureIoTClient | 4:57e049bce51e | 1294 | LogError("Message reception queue unexpectedly empty! Code: %d\r\n", result); |
AzureIoTClient | 4:57e049bce51e | 1295 | break; |
AzureIoTClient | 4:57e049bce51e | 1296 | } |
AzureIoTClient | 4:57e049bce51e | 1297 | else |
AzureIoTClient | 4:57e049bce51e | 1298 | { |
AzureIoTClient | 4:57e049bce51e | 1299 | // |
AzureIoTClient | 4:57e049bce51e | 1300 | // We'll need a tracker to dispose of the message. We need the subscription to determine who should process it. |
AzureIoTClient | 4:57e049bce51e | 1301 | // |
AzureIoTClient | 4:57e049bce51e | 1302 | pn_subscription_t* theMessageSource; |
AzureIoTClient | 4:57e049bce51e | 1303 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_049: [processReceives shall acquire a tracker by invoking pn_messenger_incoming_tracker.]*/ |
AzureIoTClient | 4:57e049bce51e | 1304 | pn_tracker_t tracker = pn_messenger_incoming_tracker(transportState->messenger); |
AzureIoTClient | 4:57e049bce51e | 1305 | |
AzureIoTClient | 4:57e049bce51e | 1306 | // |
AzureIoTClient | 4:57e049bce51e | 1307 | // Currently we can receive two types of messages. We can recieve status messages from the $CBS that indicates the success |
AzureIoTClient | 4:57e049bce51e | 1308 | // or failure of renewing the SAS for the device. |
AzureIoTClient | 4:57e049bce51e | 1309 | // |
AzureIoTClient | 4:57e049bce51e | 1310 | // Otherwise we can recieve a simple message. We can get a pointer to the subscription from the tracker. We can compare |
AzureIoTClient | 4:57e049bce51e | 1311 | // that pointer to the subscriptions that we stored when we initialized the messenger. We then dispatch appropriately. |
AzureIoTClient | 4:57e049bce51e | 1312 | // |
AzureIoTClient | 4:57e049bce51e | 1313 | |
AzureIoTClient | 4:57e049bce51e | 1314 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_106: [processReceives acquires the subscription of the message by invoking pn_messneger_incoming_subscription.] This value is henceforth known as theMessageSource.*/ |
AzureIoTClient | 4:57e049bce51e | 1315 | theMessageSource = pn_messenger_incoming_subscription(transportState->messenger); |
AzureIoTClient | 4:57e049bce51e | 1316 | if (theMessageSource == transportState->messageSubscription) |
AzureIoTClient | 4:57e049bce51e | 1317 | { |
AzureIoTClient | 4:57e049bce51e | 1318 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_108: [If theMessageSource is equal to the state variable cbsSubscription invoke processCBSReply.]*/ |
AzureIoTClient | 4:57e049bce51e | 1319 | processMessage(transportState, tracker); |
AzureIoTClient | 4:57e049bce51e | 1320 | } |
AzureIoTClient | 4:57e049bce51e | 1321 | else if (theMessageSource == transportState->cbsSubscription) |
AzureIoTClient | 4:57e049bce51e | 1322 | { |
AzureIoTClient | 4:57e049bce51e | 1323 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_108: [If theMessageSource is equal to the state variable cbsSubscription invoke processCBSReply.]*/ |
AzureIoTClient | 4:57e049bce51e | 1324 | processCBSReply(transportState, tracker); |
AzureIoTClient | 4:57e049bce51e | 1325 | } |
AzureIoTClient | 4:57e049bce51e | 1326 | else |
AzureIoTClient | 4:57e049bce51e | 1327 | { |
AzureIoTClient | 4:57e049bce51e | 1328 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_109: [Otherwise, log an error and abandon the message so that it never returns.]*/ |
AzureIoTClient | 4:57e049bce51e | 1329 | LogError("Message received from an unknown sender\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1330 | pn_messenger_release(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1331 | pn_messenger_settle(transportState->messenger, tracker, 0); |
AzureIoTClient | 4:57e049bce51e | 1332 | } |
AzureIoTClient | 4:57e049bce51e | 1333 | } |
AzureIoTClient | 4:57e049bce51e | 1334 | } |
AzureIoTClient | 4:57e049bce51e | 1335 | pn_message_clear(transportState->message); |
AzureIoTClient | 4:57e049bce51e | 1336 | } |
AzureIoTClient | 4:57e049bce51e | 1337 | } |
AzureIoTClient | 4:57e049bce51e | 1338 | } |
AzureIoTClient | 4:57e049bce51e | 1339 | |
AzureIoTClient | 4:57e049bce51e | 1340 | static void clientTransportAMQP_DoWork(TRANSPORT_HANDLE handle, IOTHUB_CLIENT_LL_HANDLE iotHubClientHandle) |
AzureIoTClient | 4:57e049bce51e | 1341 | { |
AzureIoTClient | 4:57e049bce51e | 1342 | PAMQP_TRANSPORT_STATE transportState = (PAMQP_TRANSPORT_STATE)handle; |
AzureIoTClient | 4:57e049bce51e | 1343 | |
AzureIoTClient | 4:57e049bce51e | 1344 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_019: [clientTransportAMQP_Dowork shall do no work if handle is NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1345 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_020: [clientTransportAMQP_Dowork shall do no work if iotHubClientHandle is NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1346 | if (transportState && iotHubClientHandle) |
AzureIoTClient | 4:57e049bce51e | 1347 | { |
AzureIoTClient | 4:57e049bce51e | 1348 | transportState->savedClientHandle = iotHubClientHandle; |
AzureIoTClient | 4:57e049bce51e | 1349 | if (protonMessengerInit(transportState)) |
AzureIoTClient | 4:57e049bce51e | 1350 | { |
AzureIoTClient | 4:57e049bce51e | 1351 | renewIfNecessaryTheCBS(transportState); |
AzureIoTClient | 4:57e049bce51e | 1352 | if (transportState->messengerInitialized == true) reclaimEventResources(transportState); |
AzureIoTClient | 4:57e049bce51e | 1353 | if (transportState->messengerInitialized == true) sendEvent(transportState); |
AzureIoTClient | 4:57e049bce51e | 1354 | if (transportState->messengerInitialized == true) processReceives(transportState); |
AzureIoTClient | 4:57e049bce51e | 1355 | |
AzureIoTClient | 4:57e049bce51e | 1356 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_088: [pn_messenger_work shall be invoked following all the above actions.]*/ |
AzureIoTClient | 4:57e049bce51e | 1357 | if (transportState->messengerInitialized == true) checkForErrorsThenWork(transportState); |
AzureIoTClient | 4:57e049bce51e | 1358 | } |
AzureIoTClient | 4:57e049bce51e | 1359 | |
AzureIoTClient | 4:57e049bce51e | 1360 | // |
AzureIoTClient | 4:57e049bce51e | 1361 | // Try to get rid of any old messengers that we were NOT able to stop. |
AzureIoTClient | 4:57e049bce51e | 1362 | // |
AzureIoTClient | 4:57e049bce51e | 1363 | herdTheMessengers(transportState, false); |
AzureIoTClient | 4:57e049bce51e | 1364 | } |
AzureIoTClient | 4:57e049bce51e | 1365 | return; |
AzureIoTClient | 4:57e049bce51e | 1366 | } |
AzureIoTClient | 4:57e049bce51e | 1367 | |
AzureIoTClient | 4:57e049bce51e | 1368 | static bool createUrledDeviceId(PAMQP_TRANSPORT_STATE state, const IOTHUBTRANSPORT_CONFIG* config) |
AzureIoTClient | 4:57e049bce51e | 1369 | { |
AzureIoTClient | 4:57e049bce51e | 1370 | return ((state->urledDeviceId = URL_EncodeString(config->upperConfig->deviceId)) == NULL) ? (false) : (true); |
AzureIoTClient | 4:57e049bce51e | 1371 | } |
AzureIoTClient | 4:57e049bce51e | 1372 | static bool createDevicesPortionPath(PAMQP_TRANSPORT_STATE state, const char* host) |
AzureIoTClient | 4:57e049bce51e | 1373 | { |
AzureIoTClient | 4:57e049bce51e | 1374 | return (((state->devicesPortionPath = STRING_construct(host)) == NULL) || |
AzureIoTClient | 4:57e049bce51e | 1375 | (STRING_concat(state->devicesPortionPath, "/devices/") != 0) || |
AzureIoTClient | 4:57e049bce51e | 1376 | (STRING_concat_with_STRING(state->devicesPortionPath, state->urledDeviceId) != 0)) ? (false) : (true); |
AzureIoTClient | 4:57e049bce51e | 1377 | } |
AzureIoTClient | 4:57e049bce51e | 1378 | static bool createEventAddress(PAMQP_TRANSPORT_STATE state) |
AzureIoTClient | 4:57e049bce51e | 1379 | { |
AzureIoTClient | 4:57e049bce51e | 1380 | return (((state->eventAddress = STRING_construct(AMQPS_SCHEME)) == NULL) || |
AzureIoTClient | 4:57e049bce51e | 1381 | (STRING_concat_with_STRING(state->eventAddress, state->devicesPortionPath) != 0) || |
AzureIoTClient | 4:57e049bce51e | 1382 | (STRING_concat(state->eventAddress, EVENT_ENDPOINT) != 0)) ? (false) : (true); |
AzureIoTClient | 4:57e049bce51e | 1383 | } |
AzureIoTClient | 4:57e049bce51e | 1384 | |
AzureIoTClient | 4:57e049bce51e | 1385 | static bool createMessageAddress(PAMQP_TRANSPORT_STATE state) |
AzureIoTClient | 4:57e049bce51e | 1386 | { |
AzureIoTClient | 4:57e049bce51e | 1387 | return (((state->messageAddress = STRING_construct(AMQPS_SCHEME)) == NULL) || |
AzureIoTClient | 4:57e049bce51e | 1388 | (STRING_concat_with_STRING(state->messageAddress, state->devicesPortionPath) != 0) || |
AzureIoTClient | 4:57e049bce51e | 1389 | (STRING_concat(state->messageAddress, MESSAGE_ENDPOINT) != 0)) ? (false) : (true); |
AzureIoTClient | 4:57e049bce51e | 1390 | } |
AzureIoTClient | 4:57e049bce51e | 1391 | |
AzureIoTClient | 4:57e049bce51e | 1392 | static bool createCbsAddress(PAMQP_TRANSPORT_STATE state, const char* host) |
AzureIoTClient | 4:57e049bce51e | 1393 | { |
AzureIoTClient | 4:57e049bce51e | 1394 | return (((state->cbsAddress = STRING_construct(AMQPS_SCHEME)) == NULL) || |
AzureIoTClient | 4:57e049bce51e | 1395 | (STRING_concat(state->cbsAddress,host) != 0) || |
AzureIoTClient | 4:57e049bce51e | 1396 | (STRING_concat(state->cbsAddress, CBS_ENDPOINT) != 0)) ? (false) : (true); |
AzureIoTClient | 4:57e049bce51e | 1397 | } |
AzureIoTClient | 4:57e049bce51e | 1398 | |
AzureIoTClient | 4:57e049bce51e | 1399 | static STRING_HANDLE createHost(const IOTHUBTRANSPORT_CONFIG* config) |
AzureIoTClient | 4:57e049bce51e | 1400 | { |
AzureIoTClient | 4:57e049bce51e | 1401 | STRING_HANDLE result = NULL; |
AzureIoTClient | 4:57e049bce51e | 1402 | if (((result = STRING_construct(config->upperConfig->iotHubName)) == NULL) || |
AzureIoTClient | 4:57e049bce51e | 1403 | (STRING_concat(result, ".") != 0) || |
AzureIoTClient | 4:57e049bce51e | 1404 | (STRING_concat(result, config->upperConfig->iotHubSuffix) != 0)) |
AzureIoTClient | 4:57e049bce51e | 1405 | { |
AzureIoTClient | 4:57e049bce51e | 1406 | if (result != NULL) |
AzureIoTClient | 4:57e049bce51e | 1407 | { |
AzureIoTClient | 4:57e049bce51e | 1408 | STRING_delete(result); |
AzureIoTClient | 4:57e049bce51e | 1409 | result = NULL; |
AzureIoTClient | 4:57e049bce51e | 1410 | } |
AzureIoTClient | 4:57e049bce51e | 1411 | } |
AzureIoTClient | 4:57e049bce51e | 1412 | return result; |
AzureIoTClient | 4:57e049bce51e | 1413 | } |
AzureIoTClient | 4:57e049bce51e | 1414 | |
AzureIoTClient | 4:57e049bce51e | 1415 | static TRANSPORT_HANDLE clientTransportAMQP_Create(const IOTHUBTRANSPORT_CONFIG* config) |
AzureIoTClient | 4:57e049bce51e | 1416 | { |
AzureIoTClient | 4:57e049bce51e | 1417 | PAMQP_TRANSPORT_STATE amqpState = NULL; |
AzureIoTClient | 4:57e049bce51e | 1418 | if (!config) |
AzureIoTClient | 4:57e049bce51e | 1419 | { |
AzureIoTClient | 4:57e049bce51e | 1420 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_001: [If parameter config is NULL then clientTransportAMQP_Create shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1421 | LogError("IoTHub amqp client tranport null configuration parameter.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1422 | } |
AzureIoTClient | 4:57e049bce51e | 1423 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_002: [clientTransportAMQP_Create shall fail and return NULL if any other fields of the config structure are NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1424 | else if (config->upperConfig->protocol == NULL) |
AzureIoTClient | 4:57e049bce51e | 1425 | { |
AzureIoTClient | 4:57e049bce51e | 1426 | LogError("invalid configuration (NULL protocol detected)\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1427 | } |
AzureIoTClient | 4:57e049bce51e | 1428 | else if (config->upperConfig->deviceId == NULL) |
AzureIoTClient | 4:57e049bce51e | 1429 | { |
AzureIoTClient | 4:57e049bce51e | 1430 | LogError("invalid configuration (NULL deviceId detected)\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1431 | } |
AzureIoTClient | 4:57e049bce51e | 1432 | else if (config->upperConfig->deviceKey == NULL) |
AzureIoTClient | 4:57e049bce51e | 1433 | { |
AzureIoTClient | 4:57e049bce51e | 1434 | LogError("invalid configuration (NULL deviceKey detected)\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1435 | } |
AzureIoTClient | 4:57e049bce51e | 1436 | else if (config->upperConfig->iotHubName == NULL) |
AzureIoTClient | 4:57e049bce51e | 1437 | { |
AzureIoTClient | 4:57e049bce51e | 1438 | LogError("invalid configuration (NULL iotHubName detected)\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1439 | } |
AzureIoTClient | 4:57e049bce51e | 1440 | else if (config->upperConfig->iotHubSuffix == NULL) |
AzureIoTClient | 4:57e049bce51e | 1441 | { |
AzureIoTClient | 4:57e049bce51e | 1442 | LogError("invalid configuration (NULL iotHubSuffix detected)\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1443 | } |
AzureIoTClient | 4:57e049bce51e | 1444 | else if (!config->waitingToSend) |
AzureIoTClient | 4:57e049bce51e | 1445 | { |
AzureIoTClient | 4:57e049bce51e | 1446 | LogError("invalid configuration (NULL waitingToSend list detected)\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1447 | } |
AzureIoTClient | 4:57e049bce51e | 1448 | else if (strlen(config->upperConfig->deviceId) > 128U) |
AzureIoTClient | 4:57e049bce51e | 1449 | { |
AzureIoTClient | 4:57e049bce51e | 1450 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_016: [clientTransportAMQP_Create shall fail and return NULL if the deviceId length is greater than 128.]*/ |
AzureIoTClient | 4:57e049bce51e | 1451 | LogError("deviceName is too long\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1452 | } |
AzureIoTClient | 4:57e049bce51e | 1453 | else if ((strlen(config->upperConfig->deviceId) == 0) || |
AzureIoTClient | 4:57e049bce51e | 1454 | (strlen(config->upperConfig->deviceKey) == 0) || |
AzureIoTClient | 4:57e049bce51e | 1455 | (strlen(config->upperConfig->iotHubName) == 0) || |
AzureIoTClient | 4:57e049bce51e | 1456 | (strlen(config->upperConfig->iotHubSuffix) == 0)) |
AzureIoTClient | 4:57e049bce51e | 1457 | { |
AzureIoTClient | 4:57e049bce51e | 1458 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_017: [clientTransportAMQP_Create shall fail and return NULL if any string config field is zero length.]*/ |
AzureIoTClient | 4:57e049bce51e | 1459 | LogError("zero length config parameter\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1460 | } |
AzureIoTClient | 4:57e049bce51e | 1461 | else |
AzureIoTClient | 4:57e049bce51e | 1462 | { |
AzureIoTClient | 4:57e049bce51e | 1463 | amqpState = malloc(sizeof(AMQP_TRANSPORT_STATE)); |
AzureIoTClient | 4:57e049bce51e | 1464 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_003: [clientTransportAMQP_Create shall fail and return NULL if memory allocation of the transports basic internal state structures fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 1465 | if (amqpState == NULL) |
AzureIoTClient | 4:57e049bce51e | 1466 | { |
AzureIoTClient | 4:57e049bce51e | 1467 | LogError("Could not allocate AMQP transport state\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1468 | } |
AzureIoTClient | 4:57e049bce51e | 1469 | else |
AzureIoTClient | 4:57e049bce51e | 1470 | { |
AzureIoTClient | 4:57e049bce51e | 1471 | amqpState->messageAddress = NULL; |
AzureIoTClient | 4:57e049bce51e | 1472 | amqpState->eventAddress = NULL; |
AzureIoTClient | 4:57e049bce51e | 1473 | amqpState->urledDeviceId = NULL; |
AzureIoTClient | 4:57e049bce51e | 1474 | amqpState->devicesPortionPath = NULL; |
AzureIoTClient | 4:57e049bce51e | 1475 | amqpState->cbsAddress = NULL; |
AzureIoTClient | 4:57e049bce51e | 1476 | amqpState->deviceKey = NULL; |
AzureIoTClient | 4:57e049bce51e | 1477 | amqpState->savedClientHandle = NULL; |
AzureIoTClient | 4:57e049bce51e | 1478 | amqpState->messenger = NULL; |
AzureIoTClient | 4:57e049bce51e | 1479 | amqpState->messageSubscription = NULL; |
AzureIoTClient | 4:57e049bce51e | 1480 | amqpState->cbsSubscription = NULL; |
AzureIoTClient | 4:57e049bce51e | 1481 | amqpState->zeroLengthString = NULL; |
AzureIoTClient | 4:57e049bce51e | 1482 | amqpState->messengerInitialized = false; |
AzureIoTClient | 4:57e049bce51e | 1483 | amqpState->waitingForPutTokenReply = false; |
AzureIoTClient | 4:57e049bce51e | 1484 | amqpState->cbsRequestAcceptTime = CBS_DEFAULT_REQUEST_ACCEPT_TIME; |
AzureIoTClient | 4:57e049bce51e | 1485 | amqpState->cbsReplyTime = CBS_DEFAULT_REPLY_TIME; |
AzureIoTClient | 4:57e049bce51e | 1486 | amqpState->sasTokenLifetime = SAS_TOKEN_DEFAULT_LIFETIME; |
AzureIoTClient | 4:57e049bce51e | 1487 | amqpState->sasRefreshLine = SAS_TOKEN_DEFAULT_REFRESH_LINE; |
AzureIoTClient | 4:57e049bce51e | 1488 | amqpState->eventTimeout = EVENT_TIMEOUT_DEFAULT; |
AzureIoTClient | 4:57e049bce51e | 1489 | amqpState->waitingToSend = config->waitingToSend; |
AzureIoTClient | 4:57e049bce51e | 1490 | DList_InitializeListHead(&amqpState->workInProgress); |
AzureIoTClient | 4:57e049bce51e | 1491 | DList_InitializeListHead(&amqpState->availableWorkItems); |
AzureIoTClient | 4:57e049bce51e | 1492 | DList_InitializeListHead(&amqpState->messengerCorral); |
AzureIoTClient | 4:57e049bce51e | 1493 | amqpState->DoWork_PullMessages = false; |
AzureIoTClient | 4:57e049bce51e | 1494 | amqpState->trustedCertificates = NULL; |
AzureIoTClient | 4:57e049bce51e | 1495 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_003: [clientTransportAMQP_Create shall fail and return NULL if memory allocation of the transports basic internal state structures fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 1496 | if ((amqpState->message = pn_message()) == NULL) |
AzureIoTClient | 4:57e049bce51e | 1497 | { |
AzureIoTClient | 4:57e049bce51e | 1498 | LogError("Unable to preallocate the proton message!\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1499 | clientTransportAMQP_Destroy(amqpState); |
AzureIoTClient | 4:57e049bce51e | 1500 | amqpState = NULL; |
AzureIoTClient | 4:57e049bce51e | 1501 | } |
AzureIoTClient | 4:57e049bce51e | 1502 | else |
AzureIoTClient | 4:57e049bce51e | 1503 | { |
AzureIoTClient | 4:57e049bce51e | 1504 | size_t workItemsToPreallocate; |
AzureIoTClient | 4:57e049bce51e | 1505 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_003: [clientTransportAMQP_Create shall fail and return NULL if memory allocation of the transports basic internal state structures fails.]*/ |
AzureIoTClient | 4:57e049bce51e | 1506 | for (workItemsToPreallocate = PROTON_EVENT_OUTGOING_WINDOW_SIZE; workItemsToPreallocate > 0; workItemsToPreallocate--) |
AzureIoTClient | 4:57e049bce51e | 1507 | { |
AzureIoTClient | 4:57e049bce51e | 1508 | PAMQP_WORK_ITEM currentItem = malloc(sizeof(AMQP_WORK_ITEM)); |
AzureIoTClient | 4:57e049bce51e | 1509 | if (!currentItem) |
AzureIoTClient | 4:57e049bce51e | 1510 | { |
AzureIoTClient | 4:57e049bce51e | 1511 | // |
AzureIoTClient | 4:57e049bce51e | 1512 | // Not a particularly good sign. Fail the create. |
AzureIoTClient | 4:57e049bce51e | 1513 | // |
AzureIoTClient | 4:57e049bce51e | 1514 | LogError("Unable to preallocate work item!\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1515 | clientTransportAMQP_Destroy(amqpState); |
AzureIoTClient | 4:57e049bce51e | 1516 | amqpState = NULL; |
AzureIoTClient | 4:57e049bce51e | 1517 | break; |
AzureIoTClient | 4:57e049bce51e | 1518 | } |
AzureIoTClient | 4:57e049bce51e | 1519 | else |
AzureIoTClient | 4:57e049bce51e | 1520 | { |
AzureIoTClient | 4:57e049bce51e | 1521 | DList_InsertTailList(&amqpState->availableWorkItems, ¤tItem->link); |
AzureIoTClient | 4:57e049bce51e | 1522 | } |
AzureIoTClient | 4:57e049bce51e | 1523 | } |
AzureIoTClient | 4:57e049bce51e | 1524 | if (amqpState != NULL) |
AzureIoTClient | 4:57e049bce51e | 1525 | { |
AzureIoTClient | 4:57e049bce51e | 1526 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_095: [clientTransportAMQP_Create shall create an immutable string, referred henceforth as host, from the following pieces: "config->iotHubName + "." + config->iotHubSuffix.]*/ |
AzureIoTClient | 4:57e049bce51e | 1527 | STRING_HANDLE host = createHost(config); |
AzureIoTClient | 4:57e049bce51e | 1528 | if (host != NULL) |
AzureIoTClient | 4:57e049bce51e | 1529 | { |
AzureIoTClient | 4:57e049bce51e | 1530 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_091: [clientTransportAMQP_Create shall create an immutable string, referred henceforth as urledDeviceId, by url encoding the config->deviceId.]*/ |
AzureIoTClient | 4:57e049bce51e | 1531 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_093: [clientTransportAMQP_Create shall create an immutable string, referred henceforth as devicePortionOfPath, from the following pieces: host + "/devices/" + urledDeviceId.]*/ |
AzureIoTClient | 4:57e049bce51e | 1532 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_097: [clientTransportAMQP_Create shall create an immutable string, referred henceforth as eventAddress, from the following pieces: "amqps://" + devicesPortionOfPath + "/messages/events".]*/ |
AzureIoTClient | 4:57e049bce51e | 1533 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_099: [clientTransportAMQP_Create shall create an immutable string, referred henceforth as messageAddress, from the following pieces: "amqps://" + devicesPortionOfPath + "/messages/devicebound".]*/ |
AzureIoTClient | 4:57e049bce51e | 1534 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_101: [clientTransportAMQP_Create shall create an immutable string, referred henceforth as cbsAddress, from the following pieces: "amqps://" + host + "/$cbs".]*/ |
AzureIoTClient | 4:57e049bce51e | 1535 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_103: [clientTransportAMQP_Create shall create an immutable string, referred henceforth as deviceKey, from the config->deviceKey.]*/ |
AzureIoTClient | 4:57e049bce51e | 1536 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_186: [An empty string shall be created. If this fails then clientTransportAMQP shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1537 | if ((!createUrledDeviceId(amqpState, config)) || |
AzureIoTClient | 4:57e049bce51e | 1538 | (!createDevicesPortionPath(amqpState, STRING_c_str(host))) || |
AzureIoTClient | 4:57e049bce51e | 1539 | (!createEventAddress(amqpState)) || |
AzureIoTClient | 4:57e049bce51e | 1540 | (!createMessageAddress(amqpState)) || |
AzureIoTClient | 4:57e049bce51e | 1541 | (!createCbsAddress(amqpState, STRING_c_str(host))) || |
AzureIoTClient | 4:57e049bce51e | 1542 | ((amqpState->deviceKey = STRING_construct(config->upperConfig->deviceKey)) == NULL) || |
AzureIoTClient | 4:57e049bce51e | 1543 | ((amqpState->zeroLengthString = STRING_new()) == NULL)) |
AzureIoTClient | 4:57e049bce51e | 1544 | { |
AzureIoTClient | 4:57e049bce51e | 1545 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_092: [If creating the urledDeviceId fails for any reason then clientTransportAMQP_Create shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1546 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_094: [If creating the devicePortionOfPath fails for any reason then clientTransportAMQP_Create shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1547 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_098: [If creating the eventAddress fails for any reason then clientTransportAMQP_Create shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1548 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_100: [If creating the messageAddress fails for any reason then clientTransportAMQP_Create shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1549 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_102: [If creating the cbsAddress fails for any reason then clientTransportAMQP_Create shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1550 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_104: [If creating the deviceKey fails for any reason then clientTransportAMQP_Create shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1551 | clientTransportAMQP_Destroy(amqpState); |
AzureIoTClient | 4:57e049bce51e | 1552 | amqpState = NULL; |
AzureIoTClient | 4:57e049bce51e | 1553 | } |
AzureIoTClient | 4:57e049bce51e | 1554 | STRING_delete(host); |
AzureIoTClient | 4:57e049bce51e | 1555 | } |
AzureIoTClient | 4:57e049bce51e | 1556 | else |
AzureIoTClient | 4:57e049bce51e | 1557 | { |
AzureIoTClient | 4:57e049bce51e | 1558 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_096: [If creating the schemeAndHost fails for any reason then clientTransportAMQP_Create shall fail and return NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1559 | clientTransportAMQP_Destroy(amqpState); |
AzureIoTClient | 4:57e049bce51e | 1560 | amqpState = NULL; |
AzureIoTClient | 4:57e049bce51e | 1561 | } |
AzureIoTClient | 4:57e049bce51e | 1562 | } |
AzureIoTClient | 4:57e049bce51e | 1563 | } |
AzureIoTClient | 4:57e049bce51e | 1564 | } |
AzureIoTClient | 4:57e049bce51e | 1565 | } |
AzureIoTClient | 4:57e049bce51e | 1566 | return amqpState; |
AzureIoTClient | 4:57e049bce51e | 1567 | } |
AzureIoTClient | 4:57e049bce51e | 1568 | |
AzureIoTClient | 4:57e049bce51e | 1569 | static int clientTransportAMQP_Subscribe(TRANSPORT_HANDLE handle) |
AzureIoTClient | 4:57e049bce51e | 1570 | { |
AzureIoTClient | 4:57e049bce51e | 1571 | int result; |
AzureIoTClient | 4:57e049bce51e | 1572 | if (handle == NULL) |
AzureIoTClient | 4:57e049bce51e | 1573 | { |
AzureIoTClient | 4:57e049bce51e | 1574 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_013: [If the parameter handle is NULL then clientTransportAMQP_Subscribe shall fail and return a non-zero value.]*/ |
AzureIoTClient | 4:57e049bce51e | 1575 | LogError("Invalid handle to IoTHubClient amqp subscribe.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1576 | result = 1; |
AzureIoTClient | 4:57e049bce51e | 1577 | } |
AzureIoTClient | 4:57e049bce51e | 1578 | else |
AzureIoTClient | 4:57e049bce51e | 1579 | { |
AzureIoTClient | 4:57e049bce51e | 1580 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_014: [clientTransportAMQP_Subscribe shall succeed and return a value of zero.]*/ |
AzureIoTClient | 4:57e049bce51e | 1581 | PAMQP_TRANSPORT_STATE transportState = (PAMQP_TRANSPORT_STATE)handle; |
AzureIoTClient | 4:57e049bce51e | 1582 | transportState->DoWork_PullMessages = true; |
AzureIoTClient | 4:57e049bce51e | 1583 | result = 0; |
AzureIoTClient | 4:57e049bce51e | 1584 | } |
AzureIoTClient | 4:57e049bce51e | 1585 | return result; |
AzureIoTClient | 4:57e049bce51e | 1586 | } |
AzureIoTClient | 4:57e049bce51e | 1587 | |
AzureIoTClient | 4:57e049bce51e | 1588 | static void clientTransportAMQP_Unsubscribe(TRANSPORT_HANDLE handle) |
AzureIoTClient | 4:57e049bce51e | 1589 | { |
AzureIoTClient | 4:57e049bce51e | 1590 | PAMQP_TRANSPORT_STATE transportState = (PAMQP_TRANSPORT_STATE)handle; |
AzureIoTClient | 4:57e049bce51e | 1591 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_06_015: [clientTransportAMQP_Unsubscribe shall do nothing if handle is NULL.]*/ |
AzureIoTClient | 4:57e049bce51e | 1592 | if (transportState) |
AzureIoTClient | 4:57e049bce51e | 1593 | { |
AzureIoTClient | 4:57e049bce51e | 1594 | transportState->DoWork_PullMessages = false; |
AzureIoTClient | 4:57e049bce51e | 1595 | } |
AzureIoTClient | 4:57e049bce51e | 1596 | } |
AzureIoTClient | 4:57e049bce51e | 1597 | |
AzureIoTClient | 4:57e049bce51e | 1598 | static IOTHUB_CLIENT_RESULT clientTransportAMQP_GetSendStatus(TRANSPORT_HANDLE handle, IOTHUB_CLIENT_STATUS *iotHubClientStatus) |
AzureIoTClient | 4:57e049bce51e | 1599 | { |
AzureIoTClient | 4:57e049bce51e | 1600 | IOTHUB_CLIENT_RESULT result; |
AzureIoTClient | 4:57e049bce51e | 1601 | |
AzureIoTClient | 4:57e049bce51e | 1602 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_09_001: [clientTransportAMQP_GetSendStatus IoTHubTransportHttp_GetSendStatus shall return IOTHUB_CLIENT_INVALID_ARG if called with NULL parameter] */ |
AzureIoTClient | 4:57e049bce51e | 1603 | if (handle == NULL) |
AzureIoTClient | 4:57e049bce51e | 1604 | { |
AzureIoTClient | 4:57e049bce51e | 1605 | result = IOTHUB_CLIENT_INVALID_ARG; |
AzureIoTClient | 4:57e049bce51e | 1606 | LogError("Invalid handle to IoTHubClient AMQP transport instance.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1607 | } |
AzureIoTClient | 4:57e049bce51e | 1608 | else if (iotHubClientStatus == NULL) |
AzureIoTClient | 4:57e049bce51e | 1609 | { |
AzureIoTClient | 4:57e049bce51e | 1610 | result = IOTHUB_CLIENT_INVALID_ARG; |
AzureIoTClient | 4:57e049bce51e | 1611 | LogError("Invalid pointer to output parameter IOTHUB_CLIENT_STATUS.\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1612 | } |
AzureIoTClient | 4:57e049bce51e | 1613 | else |
AzureIoTClient | 4:57e049bce51e | 1614 | { |
AzureIoTClient | 4:57e049bce51e | 1615 | PAMQP_TRANSPORT_STATE handleData = (PAMQP_TRANSPORT_STATE)handle; |
AzureIoTClient | 4:57e049bce51e | 1616 | |
AzureIoTClient | 4:57e049bce51e | 1617 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_09_002: [clientTransportAMQP_GetSendStatus shall return IOTHUB_CLIENT_OK and status IOTHUB_CLIENT_SEND_STATUS_IDLE if there are currently no event items to be sent or being sent] */ |
AzureIoTClient | 4:57e049bce51e | 1618 | if (!DList_IsListEmpty(handleData->waitingToSend) || !DList_IsListEmpty(&(handleData->workInProgress))) |
AzureIoTClient | 4:57e049bce51e | 1619 | { |
AzureIoTClient | 4:57e049bce51e | 1620 | *iotHubClientStatus = IOTHUB_CLIENT_SEND_STATUS_BUSY; |
AzureIoTClient | 4:57e049bce51e | 1621 | } |
AzureIoTClient | 4:57e049bce51e | 1622 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_09_003: [clientTransportAMQP_GetSendStatus shall return IOTHUB_CLIENT_OK and status IOTHUB_CLIENT_SEND_STATUS_BUSY if there are currently event items to be sent or being sent] */ |
AzureIoTClient | 4:57e049bce51e | 1623 | else |
AzureIoTClient | 4:57e049bce51e | 1624 | { |
AzureIoTClient | 4:57e049bce51e | 1625 | *iotHubClientStatus = IOTHUB_CLIENT_SEND_STATUS_IDLE; |
AzureIoTClient | 4:57e049bce51e | 1626 | } |
AzureIoTClient | 4:57e049bce51e | 1627 | |
AzureIoTClient | 4:57e049bce51e | 1628 | result = IOTHUB_CLIENT_OK; |
AzureIoTClient | 4:57e049bce51e | 1629 | } |
AzureIoTClient | 4:57e049bce51e | 1630 | |
AzureIoTClient | 4:57e049bce51e | 1631 | return result; |
AzureIoTClient | 4:57e049bce51e | 1632 | } |
AzureIoTClient | 4:57e049bce51e | 1633 | |
AzureIoTClient | 4:57e049bce51e | 1634 | static IOTHUB_CLIENT_RESULT clientTransportAMQP_SetOption(TRANSPORT_HANDLE handle, const char* option, const void* value) |
AzureIoTClient | 4:57e049bce51e | 1635 | { |
AzureIoTClient | 4:57e049bce51e | 1636 | IOTHUB_CLIENT_RESULT result; |
AzureIoTClient | 4:57e049bce51e | 1637 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_02_001: [If handle parameter is NULL then clientTransportAMQP_SetOption shall return IOTHUB_CLIENT_INVALID_ARG.] */ |
AzureIoTClient | 4:57e049bce51e | 1638 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_02_002: [If parameter optionName is NULL then clientTransportAMQP_SetOption shall return IOTHUB_CLIENT_INVALID_ARG.] */ |
AzureIoTClient | 4:57e049bce51e | 1639 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_02_003: [If parameter value is NULL then clientTransportAMQP_SetOption shall return IOTHUB_CLIENT_INVALID_ARG.] */ |
AzureIoTClient | 4:57e049bce51e | 1640 | |
AzureIoTClient | 4:57e049bce51e | 1641 | if ( |
AzureIoTClient | 4:57e049bce51e | 1642 | (handle == NULL) || |
AzureIoTClient | 4:57e049bce51e | 1643 | (option == NULL) || |
AzureIoTClient | 4:57e049bce51e | 1644 | (value == NULL) |
AzureIoTClient | 4:57e049bce51e | 1645 | ) |
AzureIoTClient | 4:57e049bce51e | 1646 | { |
AzureIoTClient | 4:57e049bce51e | 1647 | result = IOTHUB_CLIENT_INVALID_ARG; |
AzureIoTClient | 4:57e049bce51e | 1648 | LogError("invalid parameter (NULL) passed to clientTransportAMQP_SetOption\r\n"); |
AzureIoTClient | 4:57e049bce51e | 1649 | } |
AzureIoTClient | 4:57e049bce51e | 1650 | else |
AzureIoTClient | 4:57e049bce51e | 1651 | { |
AzureIoTClient | 4:57e049bce51e | 1652 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_02_005: [clientTransportAMQP_SetOption shall set the option "optionName" to *value.] */ |
AzureIoTClient | 4:57e049bce51e | 1653 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_01_003: ["TrustedCerts"] */ |
AzureIoTClient | 4:57e049bce51e | 1654 | if (strcmp("TrustedCerts", option) == 0) |
AzureIoTClient | 4:57e049bce51e | 1655 | { |
AzureIoTClient | 4:57e049bce51e | 1656 | PAMQP_TRANSPORT_STATE handleData = (PAMQP_TRANSPORT_STATE)handle; |
AzureIoTClient | 4:57e049bce51e | 1657 | char* newTrsutedCertificates; |
AzureIoTClient | 4:57e049bce51e | 1658 | |
AzureIoTClient | 4:57e049bce51e | 1659 | if (mallocAndStrcpy_s(&newTrsutedCertificates, (const char*)value) != 0) |
AzureIoTClient | 4:57e049bce51e | 1660 | { |
AzureIoTClient | 4:57e049bce51e | 1661 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_01_006: [If any other error occurs while setting the option, clientTransportAMQP_SetOption shall return IOTHUB_CLIENT_ERROR.] */ |
AzureIoTClient | 4:57e049bce51e | 1662 | result = IOTHUB_CLIENT_ERROR; |
AzureIoTClient | 4:57e049bce51e | 1663 | } |
AzureIoTClient | 4:57e049bce51e | 1664 | else |
AzureIoTClient | 4:57e049bce51e | 1665 | { |
AzureIoTClient | 4:57e049bce51e | 1666 | /* Codes_SRS_IOTHUBTRANSPORTTAMQP_01_004: [Sets a string that should be used as trusted certificates by the transport, freeing any previous TrustedCerts option value.] */ |
AzureIoTClient | 4:57e049bce51e | 1667 | if (handleData->trustedCertificates != NULL) |
AzureIoTClient | 4:57e049bce51e | 1668 | { |
AzureIoTClient | 4:57e049bce51e | 1669 | free(handleData->trustedCertificates); |
AzureIoTClient | 4:57e049bce51e | 1670 | } |
AzureIoTClient | 4:57e049bce51e | 1671 | |
AzureIoTClient | 4:57e049bce51e | 1672 | handleData->trustedCertificates = newTrsutedCertificates; |
AzureIoTClient | 4:57e049bce51e | 1673 | result = IOTHUB_CLIENT_OK; |
AzureIoTClient | 4:57e049bce51e | 1674 | } |
AzureIoTClient | 4:57e049bce51e | 1675 | } |
AzureIoTClient | 4:57e049bce51e | 1676 | else |
AzureIoTClient | 4:57e049bce51e | 1677 | { |
AzureIoTClient | 4:57e049bce51e | 1678 | /*Codes_SRS_IOTHUBTRANSPORTTAMQP_02_004: [If optionName is not an option supported then clientTransportAMQP_SetOption shall return IOTHUB_CLIENT_INVALID_ARG.]*/ |
AzureIoTClient | 4:57e049bce51e | 1679 | result = IOTHUB_CLIENT_INVALID_ARG; |
AzureIoTClient | 4:57e049bce51e | 1680 | } |
AzureIoTClient | 4:57e049bce51e | 1681 | } |
AzureIoTClient | 4:57e049bce51e | 1682 | |
AzureIoTClient | 4:57e049bce51e | 1683 | return result; |
AzureIoTClient | 4:57e049bce51e | 1684 | } |
AzureIoTClient | 4:57e049bce51e | 1685 | |
AzureIoTClient | 4:57e049bce51e | 1686 | static TRANSPORT_PROVIDER myfunc = { |
AzureIoTClient | 4:57e049bce51e | 1687 | clientTransportAMQP_SetOption, |
AzureIoTClient | 4:57e049bce51e | 1688 | clientTransportAMQP_Create, clientTransportAMQP_Destroy, clientTransportAMQP_Subscribe, clientTransportAMQP_Unsubscribe, clientTransportAMQP_DoWork, clientTransportAMQP_GetSendStatus |
AzureIoTClient | 4:57e049bce51e | 1689 | }; |
AzureIoTClient | 4:57e049bce51e | 1690 | |
AzureIoTClient | 4:57e049bce51e | 1691 | extern const void* AMQP_Protocol(void) |
AzureIoTClient | 4:57e049bce51e | 1692 | { |
AzureIoTClient | 4:57e049bce51e | 1693 | return &myfunc; |
AzureIoTClient | 4:57e049bce51e | 1694 | } |