Microsoft Azure IoTHub client libraries

Dependents:   sht15_remote_monitoring RobotArmDemo iothub_client_sample_amqp f767zi_mqtt ... more

This library implements the Microsoft Azure IoTHub client library. The code is replicated from https://github.com/Azure/azure-iot-sdks

Committer:
AzureIoTClient
Date:
Fri Mar 24 16:35:32 2017 -0700
Revision:
62:5a4cdacf5090
Parent:
60:41648c4e7036
Child:
69:b6f532f8c608
1.1.10

Who changed what in which revision?

UserRevisionLine numberNew contents of line
AzureIoTClient 42:448eecc3676e 1 // Copyright (c) Microsoft. All rights reserved.
AzureIoTClient 42:448eecc3676e 2 // Licensed under the MIT license. See LICENSE file in the project root for full license information.
AzureIoTClient 42:448eecc3676e 3
Azure.IoT Build 45:54c11b1b1407 4 #ifdef DONT_USE_UPLOADTOBLOB
Azure.IoT Build 45:54c11b1b1407 5 #error "trying to compile iothub_client_ll_uploadtoblob.c while the symbol DONT_USE_UPLOADTOBLOB is #define'd"
Azure.IoT Build 45:54c11b1b1407 6 #else
Azure.IoT Build 45:54c11b1b1407 7
AzureIoTClient 42:448eecc3676e 8 #include <stdlib.h>
AzureIoTClient 42:448eecc3676e 9 #include <string.h>
AzureIoTClient 60:41648c4e7036 10 #include "azure_c_shared_utility/optimize_size.h"
AzureIoTClient 42:448eecc3676e 11 #include "azure_c_shared_utility/gballoc.h"
AzureIoTClient 42:448eecc3676e 12 #include "azure_c_shared_utility/string_tokenizer.h"
AzureIoTClient 42:448eecc3676e 13 #include "azure_c_shared_utility/doublylinkedlist.h"
Azure.IoT Build 45:54c11b1b1407 14 #include "azure_c_shared_utility/xlogging.h"
AzureIoTClient 42:448eecc3676e 15 #include "azure_c_shared_utility/tickcounter.h"
AzureIoTClient 42:448eecc3676e 16 #include "azure_c_shared_utility/httpapiexsas.h"
AzureIoTClient 42:448eecc3676e 17
AzureIoTClient 42:448eecc3676e 18 #include "iothub_client_ll.h"
AzureIoTClient 48:cc5d91f2b06d 19 #include "iothub_client_options.h"
AzureIoTClient 42:448eecc3676e 20 #include "iothub_client_private.h"
AzureIoTClient 42:448eecc3676e 21 #include "iothub_client_version.h"
AzureIoTClient 42:448eecc3676e 22 #include "iothub_transport_ll.h"
AzureIoTClient 42:448eecc3676e 23 #include "parson.h"
AzureIoTClient 42:448eecc3676e 24 #include "iothub_client_ll_uploadtoblob.h"
AzureIoTClient 42:448eecc3676e 25 #include "blob.h"
AzureIoTClient 42:448eecc3676e 26
AzureIoTClient 47:aaa262b5f898 27
AzureIoTClient 47:aaa262b5f898 28 #ifdef WINCE
AzureIoTClient 47:aaa262b5f898 29 #include <stdarg.h>
AzureIoTClient 47:aaa262b5f898 30 // Returns number of characters copied.
AzureIoTClient 47:aaa262b5f898 31 int snprintf(char * s, size_t n, const char * format, ...)
AzureIoTClient 47:aaa262b5f898 32 {
AzureIoTClient 48:cc5d91f2b06d 33 int result;
AzureIoTClient 48:cc5d91f2b06d 34 va_list args;
AzureIoTClient 48:cc5d91f2b06d 35 va_start(args, format);
AzureIoTClient 48:cc5d91f2b06d 36 result = vsnprintf(s, n, format, args);
AzureIoTClient 48:cc5d91f2b06d 37 va_end(args);
AzureIoTClient 48:cc5d91f2b06d 38 return result;
AzureIoTClient 47:aaa262b5f898 39 }
AzureIoTClient 47:aaa262b5f898 40 #endif
AzureIoTClient 47:aaa262b5f898 41
AzureIoTClient 47:aaa262b5f898 42
AzureIoTClient 42:448eecc3676e 43 /*Codes_SRS_IOTHUBCLIENT_LL_02_085: [ IoTHubClient_LL_UploadToBlob shall use the same authorization as step 1. to prepare and perform a HTTP request with the following parameters: ]*/
AzureIoTClient 42:448eecc3676e 44 #define FILE_UPLOAD_FAILED_BODY "{ \"isSuccess\":false, \"statusCode\":-1,\"statusDescription\" : \"client not able to connect with the server\" }"
AzureIoTClient 42:448eecc3676e 45
AzureIoTClient 42:448eecc3676e 46 #define AUTHORIZATION_SCHEME_VALUES \
AzureIoTClient 42:448eecc3676e 47 DEVICE_KEY, \
AzureIoTClient 46:6a69294b6119 48 X509, \
AzureIoTClient 42:448eecc3676e 49 SAS_TOKEN
AzureIoTClient 42:448eecc3676e 50 DEFINE_ENUM(AUTHORIZATION_SCHEME, AUTHORIZATION_SCHEME_VALUES);
AzureIoTClient 42:448eecc3676e 51
AzureIoTClient 46:6a69294b6119 52 typedef struct UPLOADTOBLOB_X509_CREDENTIALS_TAG
AzureIoTClient 46:6a69294b6119 53 {
AzureIoTClient 46:6a69294b6119 54 const char* x509certificate;
AzureIoTClient 46:6a69294b6119 55 const char* x509privatekey;
AzureIoTClient 46:6a69294b6119 56 }UPLOADTOBLOB_X509_CREDENTIALS;
AzureIoTClient 46:6a69294b6119 57
AzureIoTClient 42:448eecc3676e 58 typedef struct IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA_TAG
AzureIoTClient 42:448eecc3676e 59 {
AzureIoTClient 42:448eecc3676e 60 STRING_HANDLE deviceId; /*needed for file upload*/
AzureIoTClient 42:448eecc3676e 61 const char* hostname; /*needed for file upload*/
AzureIoTClient 42:448eecc3676e 62 AUTHORIZATION_SCHEME authorizationScheme; /*needed for file upload*/
AzureIoTClient 42:448eecc3676e 63 union {
AzureIoTClient 42:448eecc3676e 64 STRING_HANDLE deviceKey; /*used when authorizationScheme is DEVICE_KEY*/
AzureIoTClient 42:448eecc3676e 65 STRING_HANDLE sas; /*used when authorizationScheme is SAS_TOKEN*/
AzureIoTClient 46:6a69294b6119 66 UPLOADTOBLOB_X509_CREDENTIALS x509credentials; /*assumed to be used when both deviceKey and deviceSasToken are NULL*/
AzureIoTClient 42:448eecc3676e 67 } credentials; /*needed for file upload*/
AzureIoTClient 62:5a4cdacf5090 68 char* certificates; /*if there are any certificates used*/
AzureIoTClient 42:448eecc3676e 69 }IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA;
AzureIoTClient 42:448eecc3676e 70
AzureIoTClient 42:448eecc3676e 71 IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE IoTHubClient_LL_UploadToBlob_Create(const IOTHUB_CLIENT_CONFIG* config)
AzureIoTClient 42:448eecc3676e 72 {
AzureIoTClient 42:448eecc3676e 73 IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA* handleData = malloc(sizeof(IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA));
AzureIoTClient 42:448eecc3676e 74 if (handleData == NULL)
AzureIoTClient 42:448eecc3676e 75 {
AzureIoTClient 42:448eecc3676e 76 LogError("oom - malloc");
AzureIoTClient 42:448eecc3676e 77 /*return as is*/
AzureIoTClient 42:448eecc3676e 78 }
AzureIoTClient 42:448eecc3676e 79 else
AzureIoTClient 42:448eecc3676e 80 {
AzureIoTClient 42:448eecc3676e 81 size_t iotHubNameLength = strlen(config->iotHubName);
AzureIoTClient 42:448eecc3676e 82 size_t iotHubSuffixLength = strlen(config->iotHubSuffix);
AzureIoTClient 42:448eecc3676e 83 handleData->deviceId = STRING_construct(config->deviceId);
AzureIoTClient 42:448eecc3676e 84 if (handleData->deviceId == NULL)
AzureIoTClient 42:448eecc3676e 85 {
AzureIoTClient 42:448eecc3676e 86 LogError("unable to STRING_construct");
AzureIoTClient 42:448eecc3676e 87 free(handleData);
AzureIoTClient 42:448eecc3676e 88 handleData = NULL;
AzureIoTClient 42:448eecc3676e 89 }
AzureIoTClient 42:448eecc3676e 90 else
AzureIoTClient 42:448eecc3676e 91 {
AzureIoTClient 42:448eecc3676e 92 handleData->hostname = malloc(iotHubNameLength + 1 + iotHubSuffixLength + 1); /*first +1 is because "." the second +1 is because \0*/
AzureIoTClient 42:448eecc3676e 93 if (handleData->hostname == NULL)
AzureIoTClient 42:448eecc3676e 94 {
AzureIoTClient 42:448eecc3676e 95 LogError("malloc failed");
AzureIoTClient 42:448eecc3676e 96 STRING_delete(handleData->deviceId);
AzureIoTClient 42:448eecc3676e 97 free(handleData);
AzureIoTClient 42:448eecc3676e 98 handleData = NULL;
AzureIoTClient 42:448eecc3676e 99 }
AzureIoTClient 42:448eecc3676e 100 else
AzureIoTClient 42:448eecc3676e 101 {
AzureIoTClient 58:15b0d29b2667 102 (void)memcpy((char*)handleData->hostname, config->iotHubName, iotHubNameLength);
AzureIoTClient 42:448eecc3676e 103 ((char*)handleData->hostname)[iotHubNameLength] = '.';
AzureIoTClient 58:15b0d29b2667 104 (void)memcpy((char*)handleData->hostname + iotHubNameLength + 1, config->iotHubSuffix, iotHubSuffixLength + 1); /*+1 will copy the \0 too*/
AzureIoTClient 62:5a4cdacf5090 105 handleData->certificates = NULL;
AzureIoTClient 46:6a69294b6119 106 if ((config->deviceSasToken != NULL) && (config->deviceKey == NULL))
AzureIoTClient 42:448eecc3676e 107 {
AzureIoTClient 42:448eecc3676e 108 handleData->authorizationScheme = SAS_TOKEN;
AzureIoTClient 42:448eecc3676e 109 handleData->credentials.sas = STRING_construct(config->deviceSasToken);
AzureIoTClient 42:448eecc3676e 110 if (handleData->credentials.sas == NULL)
AzureIoTClient 42:448eecc3676e 111 {
AzureIoTClient 42:448eecc3676e 112 LogError("unable to STRING_construct");
AzureIoTClient 42:448eecc3676e 113 free((void*)handleData->hostname);
AzureIoTClient 42:448eecc3676e 114 STRING_delete(handleData->deviceId);
AzureIoTClient 42:448eecc3676e 115 free(handleData);
AzureIoTClient 42:448eecc3676e 116 handleData = NULL;
AzureIoTClient 42:448eecc3676e 117 }
AzureIoTClient 42:448eecc3676e 118 else
AzureIoTClient 42:448eecc3676e 119 {
AzureIoTClient 42:448eecc3676e 120 /*return as is*/
AzureIoTClient 42:448eecc3676e 121 }
AzureIoTClient 42:448eecc3676e 122 }
AzureIoTClient 46:6a69294b6119 123 else if ((config->deviceSasToken == NULL) && (config->deviceKey != NULL))
AzureIoTClient 42:448eecc3676e 124 {
AzureIoTClient 42:448eecc3676e 125 handleData->authorizationScheme = DEVICE_KEY;
AzureIoTClient 42:448eecc3676e 126 handleData->credentials.deviceKey = STRING_construct(config->deviceKey);
AzureIoTClient 42:448eecc3676e 127 if (handleData->credentials.deviceKey == NULL)
AzureIoTClient 42:448eecc3676e 128 {
AzureIoTClient 42:448eecc3676e 129 LogError("unable to STRING_construct");
AzureIoTClient 42:448eecc3676e 130 free((void*)handleData->hostname);
AzureIoTClient 42:448eecc3676e 131 STRING_delete(handleData->deviceId);
AzureIoTClient 42:448eecc3676e 132 free(handleData);
AzureIoTClient 42:448eecc3676e 133 handleData = NULL;
AzureIoTClient 42:448eecc3676e 134 }
AzureIoTClient 42:448eecc3676e 135 else
AzureIoTClient 42:448eecc3676e 136 {
AzureIoTClient 42:448eecc3676e 137 /*return as is*/
AzureIoTClient 42:448eecc3676e 138 }
AzureIoTClient 42:448eecc3676e 139 }
AzureIoTClient 46:6a69294b6119 140 else if ((config->deviceSasToken == NULL) && (config->deviceKey == NULL))
AzureIoTClient 46:6a69294b6119 141 {
AzureIoTClient 46:6a69294b6119 142 handleData->authorizationScheme = X509;
AzureIoTClient 46:6a69294b6119 143 handleData->credentials.x509credentials.x509certificate = NULL;
AzureIoTClient 46:6a69294b6119 144 handleData->credentials.x509credentials.x509privatekey = NULL;
AzureIoTClient 46:6a69294b6119 145 /*return as is*/
AzureIoTClient 46:6a69294b6119 146 }
AzureIoTClient 42:448eecc3676e 147 }
AzureIoTClient 42:448eecc3676e 148 }
AzureIoTClient 42:448eecc3676e 149 }
AzureIoTClient 42:448eecc3676e 150 return (IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE)handleData;
AzureIoTClient 42:448eecc3676e 151
AzureIoTClient 42:448eecc3676e 152 }
AzureIoTClient 42:448eecc3676e 153
AzureIoTClient 42:448eecc3676e 154 /*returns 0 when correlationId, sasUri contain data*/
AzureIoTClient 42:448eecc3676e 155 static int IoTHubClient_LL_UploadToBlob_step1and2(IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA* handleData, HTTPAPIEX_HANDLE iotHubHttpApiExHandle, HTTP_HEADERS_HANDLE requestHttpHeaders, const char* destinationFileName,
AzureIoTClient 42:448eecc3676e 156 STRING_HANDLE correlationId, STRING_HANDLE sasUri)
AzureIoTClient 42:448eecc3676e 157 {
AzureIoTClient 42:448eecc3676e 158 int result;
AzureIoTClient 42:448eecc3676e 159
AzureIoTClient 42:448eecc3676e 160 /*Codes_SRS_IOTHUBCLIENT_LL_02_066: [ IoTHubClient_LL_UploadToBlob shall create an HTTP relative path formed from "/devices/" + deviceId + "/files/" + destinationFileName + "?api-version=API_VERSION". ]*/
AzureIoTClient 42:448eecc3676e 161 STRING_HANDLE relativePath = STRING_construct("/devices/");
AzureIoTClient 42:448eecc3676e 162 if (relativePath == NULL)
AzureIoTClient 42:448eecc3676e 163 {
AzureIoTClient 42:448eecc3676e 164 /*Codes_SRS_IOTHUBCLIENT_LL_02_067: [ If creating the relativePath fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 165 LogError("unable to STRING_construct");
AzureIoTClient 60:41648c4e7036 166 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 167 }
AzureIoTClient 42:448eecc3676e 168 else
AzureIoTClient 42:448eecc3676e 169 {
AzureIoTClient 42:448eecc3676e 170 if (!(
AzureIoTClient 42:448eecc3676e 171 (STRING_concat_with_STRING(relativePath, handleData->deviceId) == 0) &&
AzureIoTClient 42:448eecc3676e 172 (STRING_concat(relativePath, "/files/") == 0) &&
AzureIoTClient 42:448eecc3676e 173 (STRING_concat(relativePath, destinationFileName) == 0) &&
AzureIoTClient 42:448eecc3676e 174 (STRING_concat(relativePath, API_VERSION) == 0)
AzureIoTClient 42:448eecc3676e 175 ))
AzureIoTClient 42:448eecc3676e 176 {
AzureIoTClient 42:448eecc3676e 177 /*Codes_SRS_IOTHUBCLIENT_LL_02_067: [ If creating the relativePath fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 178 LogError("unable to concatenate STRING");
AzureIoTClient 60:41648c4e7036 179 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 180 }
AzureIoTClient 42:448eecc3676e 181 else
AzureIoTClient 42:448eecc3676e 182 {
AzureIoTClient 42:448eecc3676e 183 /*Codes_SRS_IOTHUBCLIENT_LL_02_068: [ IoTHubClient_LL_UploadToBlob shall create an HTTP responseContent BUFFER_HANDLE. ]*/
AzureIoTClient 42:448eecc3676e 184 BUFFER_HANDLE responseContent = BUFFER_new();
AzureIoTClient 42:448eecc3676e 185 if (responseContent == NULL)
AzureIoTClient 42:448eecc3676e 186 {
AzureIoTClient 42:448eecc3676e 187 /*Codes_SRS_IOTHUBCLIENT_LL_02_069: [ If creating the HTTP response buffer handle fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 60:41648c4e7036 188 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 189 LogError("unable to BUFFER_new");
AzureIoTClient 42:448eecc3676e 190 }
AzureIoTClient 42:448eecc3676e 191 else
AzureIoTClient 42:448eecc3676e 192 {
AzureIoTClient 42:448eecc3676e 193 /*Codes_SRS_IOTHUBCLIENT_LL_02_072: [ IoTHubClient_LL_UploadToBlob shall add the following name:value to request HTTP headers: ] "Content-Type": "application/json" "Accept": "application/json" "User-Agent": "iothubclient/" IOTHUB_SDK_VERSION*/
AzureIoTClient 46:6a69294b6119 194 /*Codes_SRS_IOTHUBCLIENT_LL_02_107: [ - "Authorization" header shall not be build. ]*/
AzureIoTClient 42:448eecc3676e 195 if (!(
AzureIoTClient 42:448eecc3676e 196 (HTTPHeaders_AddHeaderNameValuePair(requestHttpHeaders, "Content-Type", "application/json") == HTTP_HEADERS_OK) &&
AzureIoTClient 42:448eecc3676e 197 (HTTPHeaders_AddHeaderNameValuePair(requestHttpHeaders, "Accept", "application/json") == HTTP_HEADERS_OK) &&
AzureIoTClient 42:448eecc3676e 198 (HTTPHeaders_AddHeaderNameValuePair(requestHttpHeaders, "User-Agent", "iothubclient/" IOTHUB_SDK_VERSION) == HTTP_HEADERS_OK) &&
AzureIoTClient 46:6a69294b6119 199 (handleData->authorizationScheme==X509 || (HTTPHeaders_AddHeaderNameValuePair(requestHttpHeaders, "Authorization", "") == HTTP_HEADERS_OK))
AzureIoTClient 42:448eecc3676e 200 ))
AzureIoTClient 42:448eecc3676e 201 {
AzureIoTClient 42:448eecc3676e 202 /*Codes_SRS_IOTHUBCLIENT_LL_02_071: [ If creating the HTTP headers fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 203 LogError("unable to HTTPHeaders_AddHeaderNameValuePair");
AzureIoTClient 60:41648c4e7036 204 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 205 }
AzureIoTClient 42:448eecc3676e 206 else
AzureIoTClient 42:448eecc3676e 207 {
AzureIoTClient 42:448eecc3676e 208 int wasIoTHubRequestSuccess = 0; /*!=0 means responseContent has a buffer that should be parsed by parson after executing the below switch*/
AzureIoTClient 46:6a69294b6119 209 /* set the result to error by default */
AzureIoTClient 60:41648c4e7036 210 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 211 switch (handleData->authorizationScheme)
AzureIoTClient 42:448eecc3676e 212 {
AzureIoTClient 42:448eecc3676e 213 default:
AzureIoTClient 42:448eecc3676e 214 {
AzureIoTClient 42:448eecc3676e 215 /*wasIoTHubRequestSuccess takes care of the return value*/
AzureIoTClient 42:448eecc3676e 216 LogError("Internal Error: unexpected value in handleData->authorizationScheme = %d", handleData->authorizationScheme);
AzureIoTClient 60:41648c4e7036 217 result = __FAILURE__;
AzureIoTClient 46:6a69294b6119 218 break;
AzureIoTClient 46:6a69294b6119 219 }
AzureIoTClient 46:6a69294b6119 220 case(X509):
AzureIoTClient 46:6a69294b6119 221 {
AzureIoTClient 46:6a69294b6119 222 unsigned int statusCode;
AzureIoTClient 46:6a69294b6119 223 /*Codes_SRS_IOTHUBCLIENT_LL_02_108: [ IoTHubClient_LL_UploadToBlob shall execute HTTPAPIEX_ExecuteRequest passing the following information for arguments: ]*/
AzureIoTClient 46:6a69294b6119 224 if (HTTPAPIEX_ExecuteRequest(
AzureIoTClient 46:6a69294b6119 225 iotHubHttpApiExHandle, /*HTTPAPIEX_HANDLE handle - the handle created at the beginning of `IoTHubClient_LL_UploadToBlob`*/
AzureIoTClient 46:6a69294b6119 226 HTTPAPI_REQUEST_GET, /*HTTPAPI_REQUEST_TYPE requestType - HTTPAPI_REQUEST_GET*/
AzureIoTClient 46:6a69294b6119 227 STRING_c_str(relativePath), /*const char* relativePath - the HTTP relative path*/
AzureIoTClient 46:6a69294b6119 228 requestHttpHeaders, /*HTTP_HEADERS_HANDLE requestHttpHeadersHandle - request HTTP headers*/
AzureIoTClient 46:6a69294b6119 229 NULL, /*BUFFER_HANDLE requestContent - NULL*/
AzureIoTClient 46:6a69294b6119 230 &statusCode, /*unsigned int* statusCode - the address of an unsigned int that will contain the HTTP status code*/
AzureIoTClient 46:6a69294b6119 231 NULL, /*HTTP_HEADERS_HANDLE responseHttpHeadersHandl - NULL*/
AzureIoTClient 46:6a69294b6119 232 responseContent /*BUFFER_HANDLE responseContent - the HTTP response BUFFER_HANDLE - responseContent*/
AzureIoTClient 46:6a69294b6119 233 ) != HTTPAPIEX_OK)
AzureIoTClient 46:6a69294b6119 234 {
AzureIoTClient 46:6a69294b6119 235 /*Codes_SRS_IOTHUBCLIENT_LL_02_076: [ If HTTPAPIEX_ExecuteRequest call fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 60:41648c4e7036 236 result = __FAILURE__;
AzureIoTClient 46:6a69294b6119 237 LogError("unable to HTTPAPIEX_ExecuteRequest");
AzureIoTClient 46:6a69294b6119 238 }
AzureIoTClient 46:6a69294b6119 239 else
AzureIoTClient 46:6a69294b6119 240 {
AzureIoTClient 46:6a69294b6119 241 /*Codes_SRS_IOTHUBCLIENT_LL_02_077: [ If HTTP statusCode is greater than or equal to 300 then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 46:6a69294b6119 242 if (statusCode >= 300)
AzureIoTClient 46:6a69294b6119 243 {
AzureIoTClient 60:41648c4e7036 244 result = __FAILURE__;
AzureIoTClient 46:6a69294b6119 245 LogError("HTTP code was %u", statusCode);
AzureIoTClient 46:6a69294b6119 246 }
AzureIoTClient 46:6a69294b6119 247 else
AzureIoTClient 46:6a69294b6119 248 {
AzureIoTClient 46:6a69294b6119 249 wasIoTHubRequestSuccess = 1;
AzureIoTClient 46:6a69294b6119 250 }
AzureIoTClient 46:6a69294b6119 251 }
AzureIoTClient 42:448eecc3676e 252 break;
AzureIoTClient 42:448eecc3676e 253 }
AzureIoTClient 42:448eecc3676e 254 case (SAS_TOKEN):
AzureIoTClient 42:448eecc3676e 255 {
AzureIoTClient 42:448eecc3676e 256 const char* sasToken = STRING_c_str(handleData->credentials.sas);
AzureIoTClient 42:448eecc3676e 257 /*Codes_SRS_IOTHUBCLIENT_LL_02_073: [ If the credentials used to create handle have "sasToken" then IoTHubClient_LL_UploadToBlob shall add the following HTTP request headers: ]*/
AzureIoTClient 42:448eecc3676e 258 if (HTTPHeaders_ReplaceHeaderNameValuePair(requestHttpHeaders, "Authorization", sasToken) != HTTP_HEADERS_OK)
AzureIoTClient 42:448eecc3676e 259 {
AzureIoTClient 42:448eecc3676e 260 /*Codes_SRS_IOTHUBCLIENT_LL_02_074: [ If adding "Authorization" fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR ]*/
AzureIoTClient 60:41648c4e7036 261 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 262 LogError("unable to HTTPHeaders_AddHeaderNameValuePair");
AzureIoTClient 42:448eecc3676e 263 }
AzureIoTClient 42:448eecc3676e 264 else
AzureIoTClient 42:448eecc3676e 265 {
AzureIoTClient 42:448eecc3676e 266 unsigned int statusCode;
AzureIoTClient 42:448eecc3676e 267 /*Codes_SRS_IOTHUBCLIENT_LL_02_075: [ IoTHubClient_LL_UploadToBlob shall execute HTTPAPIEX_ExecuteRequest passing the following information for arguments: ]*/
AzureIoTClient 42:448eecc3676e 268 if (HTTPAPIEX_ExecuteRequest(
AzureIoTClient 42:448eecc3676e 269 iotHubHttpApiExHandle, /*HTTPAPIEX_HANDLE handle - the handle created at the beginning of `IoTHubClient_LL_UploadToBlob`*/
AzureIoTClient 42:448eecc3676e 270 HTTPAPI_REQUEST_GET, /*HTTPAPI_REQUEST_TYPE requestType - HTTPAPI_REQUEST_GET*/
AzureIoTClient 42:448eecc3676e 271 STRING_c_str(relativePath), /*const char* relativePath - the HTTP relative path*/
AzureIoTClient 42:448eecc3676e 272 requestHttpHeaders, /*HTTP_HEADERS_HANDLE requestHttpHeadersHandle - request HTTP headers*/
AzureIoTClient 42:448eecc3676e 273 NULL, /*BUFFER_HANDLE requestContent - NULL*/
AzureIoTClient 42:448eecc3676e 274 &statusCode, /*unsigned int* statusCode - the address of an unsigned int that will contain the HTTP status code*/
AzureIoTClient 42:448eecc3676e 275 NULL, /*HTTP_HEADERS_HANDLE responseHttpHeadersHandl - NULL*/
AzureIoTClient 42:448eecc3676e 276 responseContent /*BUFFER_HANDLE responseContent - the HTTP response BUFFER_HANDLE - responseContent*/
AzureIoTClient 42:448eecc3676e 277 ) != HTTPAPIEX_OK)
AzureIoTClient 42:448eecc3676e 278 {
AzureIoTClient 42:448eecc3676e 279 /*Codes_SRS_IOTHUBCLIENT_LL_02_076: [ If HTTPAPIEX_ExecuteRequest call fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 60:41648c4e7036 280 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 281 LogError("unable to HTTPAPIEX_ExecuteRequest");
AzureIoTClient 42:448eecc3676e 282 }
AzureIoTClient 42:448eecc3676e 283 else
AzureIoTClient 42:448eecc3676e 284 {
AzureIoTClient 42:448eecc3676e 285 /*Codes_SRS_IOTHUBCLIENT_LL_02_077: [ If HTTP statusCode is greater than or equal to 300 then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 286 if (statusCode >= 300)
AzureIoTClient 42:448eecc3676e 287 {
AzureIoTClient 60:41648c4e7036 288 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 289 LogError("HTTP code was %u", statusCode);
AzureIoTClient 42:448eecc3676e 290 }
AzureIoTClient 42:448eecc3676e 291 else
AzureIoTClient 42:448eecc3676e 292 {
AzureIoTClient 42:448eecc3676e 293 wasIoTHubRequestSuccess = 1;
AzureIoTClient 42:448eecc3676e 294 }
AzureIoTClient 42:448eecc3676e 295 }
AzureIoTClient 42:448eecc3676e 296 }
AzureIoTClient 42:448eecc3676e 297 break;
AzureIoTClient 42:448eecc3676e 298 }
AzureIoTClient 42:448eecc3676e 299 case(DEVICE_KEY):
AzureIoTClient 42:448eecc3676e 300 {
AzureIoTClient 42:448eecc3676e 301 /*Codes_SRS_IOTHUBCLIENT_LL_02_078: [ If the credentials used to create handle have "deviceKey" then IoTHubClient_LL_UploadToBlob shall create an HTTPAPIEX_SAS_HANDLE passing as arguments: ]*/
AzureIoTClient 42:448eecc3676e 302 STRING_HANDLE uriResource = STRING_construct(handleData->hostname);
AzureIoTClient 42:448eecc3676e 303 if (uriResource == NULL)
AzureIoTClient 42:448eecc3676e 304 {
AzureIoTClient 42:448eecc3676e 305 /*Codes_SRS_IOTHUBCLIENT_LL_02_089: [ If creating the HTTPAPIEX_SAS_HANDLE fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 60:41648c4e7036 306 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 307 LogError("unable to STRING_construct");
AzureIoTClient 42:448eecc3676e 308 }
AzureIoTClient 42:448eecc3676e 309 else
AzureIoTClient 42:448eecc3676e 310 {
AzureIoTClient 42:448eecc3676e 311 if (!(
AzureIoTClient 42:448eecc3676e 312 (STRING_concat(uriResource, "/devices/") == 0) &&
AzureIoTClient 42:448eecc3676e 313 (STRING_concat_with_STRING(uriResource, handleData->deviceId) == 0)
AzureIoTClient 42:448eecc3676e 314 ))
AzureIoTClient 42:448eecc3676e 315 {
AzureIoTClient 42:448eecc3676e 316 /*Codes_SRS_IOTHUBCLIENT_LL_02_089: [ If creating the HTTPAPIEX_SAS_HANDLE fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 317 LogError("unable to STRING_concat_with_STRING");
AzureIoTClient 60:41648c4e7036 318 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 319 }
AzureIoTClient 42:448eecc3676e 320 else
AzureIoTClient 42:448eecc3676e 321 {
AzureIoTClient 42:448eecc3676e 322 STRING_HANDLE empty = STRING_new();
AzureIoTClient 42:448eecc3676e 323 if (empty == NULL)
AzureIoTClient 42:448eecc3676e 324 {
AzureIoTClient 42:448eecc3676e 325 LogError("unable to STRING_new");
AzureIoTClient 60:41648c4e7036 326 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 327 }
AzureIoTClient 42:448eecc3676e 328 else
AzureIoTClient 42:448eecc3676e 329 {
AzureIoTClient 42:448eecc3676e 330 /*Codes_SRS_IOTHUBCLIENT_LL_02_089: [ If creating the HTTPAPIEX_SAS_HANDLE fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 331 HTTPAPIEX_SAS_HANDLE sasHandle = HTTPAPIEX_SAS_Create(handleData->credentials.deviceKey, uriResource, empty);
AzureIoTClient 42:448eecc3676e 332 if (sasHandle == NULL)
AzureIoTClient 42:448eecc3676e 333 {
AzureIoTClient 42:448eecc3676e 334 LogError("unable to HTTPAPIEX_SAS_Create");
AzureIoTClient 60:41648c4e7036 335 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 336 }
AzureIoTClient 42:448eecc3676e 337 else
AzureIoTClient 42:448eecc3676e 338 {
AzureIoTClient 42:448eecc3676e 339 unsigned int statusCode;
AzureIoTClient 42:448eecc3676e 340 /*Codes_SRS_IOTHUBCLIENT_LL_02_090: [ IoTHubClient_LL_UploadToBlob shall call HTTPAPIEX_SAS_ExecuteRequest passing as arguments: ]*/
AzureIoTClient 42:448eecc3676e 341 if (HTTPAPIEX_SAS_ExecuteRequest(
AzureIoTClient 42:448eecc3676e 342 sasHandle, /*HTTPAPIEX_SAS_HANDLE sasHandle - the created HTTPAPIEX_SAS_HANDLE*/
AzureIoTClient 42:448eecc3676e 343 iotHubHttpApiExHandle, /*HTTPAPIEX_HANDLE handle - the created HTTPAPIEX_HANDLE*/
AzureIoTClient 42:448eecc3676e 344 HTTPAPI_REQUEST_GET, /*HTTPAPI_REQUEST_TYPE requestType - HTTPAPI_REQUEST_GET*/
AzureIoTClient 42:448eecc3676e 345 STRING_c_str(relativePath), /*const char* relativePath - the HTTP relative path*/
AzureIoTClient 42:448eecc3676e 346 requestHttpHeaders, /*HTTP_HEADERS_HANDLE requestHttpHeadersHandle - request HTTP headers*/
AzureIoTClient 42:448eecc3676e 347 NULL, /*BUFFER_HANDLE requestContent - NULL*/
AzureIoTClient 42:448eecc3676e 348 &statusCode, /*unsigned int* statusCode - the address of an unsigned int that will contain the HTTP status code*/
AzureIoTClient 42:448eecc3676e 349 NULL, /*HTTP_HEADERS_HANDLE responseHeadersHandle - NULL*/
AzureIoTClient 42:448eecc3676e 350 responseContent
AzureIoTClient 42:448eecc3676e 351 ) != HTTPAPIEX_OK)
AzureIoTClient 42:448eecc3676e 352 {
AzureIoTClient 42:448eecc3676e 353 /*Codes_SRS_IOTHUBCLIENT_LL_02_079: [ If HTTPAPIEX_SAS_ExecuteRequest fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 354 LogError("unable to HTTPAPIEX_SAS_ExecuteRequest");
AzureIoTClient 60:41648c4e7036 355 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 356 }
AzureIoTClient 42:448eecc3676e 357 else
AzureIoTClient 42:448eecc3676e 358 {
AzureIoTClient 42:448eecc3676e 359 if (statusCode >= 300)
AzureIoTClient 42:448eecc3676e 360 {
AzureIoTClient 42:448eecc3676e 361 /*Codes_SRS_IOTHUBCLIENT_LL_02_080: [ If status code is greater than or equal to 300 then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 60:41648c4e7036 362 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 363 LogError("HTTP code was %u", statusCode);
AzureIoTClient 42:448eecc3676e 364 }
AzureIoTClient 42:448eecc3676e 365 else
AzureIoTClient 42:448eecc3676e 366 {
AzureIoTClient 42:448eecc3676e 367 wasIoTHubRequestSuccess = 1;
AzureIoTClient 42:448eecc3676e 368 }
AzureIoTClient 42:448eecc3676e 369 }
AzureIoTClient 42:448eecc3676e 370 HTTPAPIEX_SAS_Destroy(sasHandle);
AzureIoTClient 42:448eecc3676e 371 }
AzureIoTClient 42:448eecc3676e 372 STRING_delete(empty);
AzureIoTClient 42:448eecc3676e 373 }
AzureIoTClient 42:448eecc3676e 374 }
AzureIoTClient 42:448eecc3676e 375 STRING_delete(uriResource);
AzureIoTClient 42:448eecc3676e 376 }
AzureIoTClient 42:448eecc3676e 377 }
AzureIoTClient 42:448eecc3676e 378 } /*switch*/
AzureIoTClient 42:448eecc3676e 379
AzureIoTClient 42:448eecc3676e 380 if (wasIoTHubRequestSuccess == 0)
AzureIoTClient 42:448eecc3676e 381 {
AzureIoTClient 42:448eecc3676e 382 /*do nothing, shall be reported as an error*/
AzureIoTClient 42:448eecc3676e 383 }
AzureIoTClient 42:448eecc3676e 384 else
AzureIoTClient 42:448eecc3676e 385 {
AzureIoTClient 42:448eecc3676e 386 const unsigned char*responseContent_u_char = BUFFER_u_char(responseContent);
AzureIoTClient 42:448eecc3676e 387 size_t responseContent_length = BUFFER_length(responseContent);
AzureIoTClient 42:448eecc3676e 388 STRING_HANDLE responseAsString = STRING_from_byte_array(responseContent_u_char, responseContent_length);
AzureIoTClient 42:448eecc3676e 389 if (responseAsString == NULL)
AzureIoTClient 42:448eecc3676e 390 {
AzureIoTClient 60:41648c4e7036 391 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 392 LogError("unable to get the response as string");
AzureIoTClient 42:448eecc3676e 393 }
AzureIoTClient 42:448eecc3676e 394 else
AzureIoTClient 42:448eecc3676e 395 {
AzureIoTClient 42:448eecc3676e 396 /*Codes_SRS_IOTHUBCLIENT_LL_02_081: [ Otherwise, IoTHubClient_LL_UploadToBlob shall use parson to extract and save the following information from the response buffer: correlationID and SasUri. ]*/
AzureIoTClient 42:448eecc3676e 397 JSON_Value* allJson = json_parse_string(STRING_c_str(responseAsString));
AzureIoTClient 42:448eecc3676e 398 if (allJson == NULL)
AzureIoTClient 42:448eecc3676e 399 {
AzureIoTClient 42:448eecc3676e 400 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 401 LogError("unable to json_parse_string");
AzureIoTClient 60:41648c4e7036 402 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 403 }
AzureIoTClient 42:448eecc3676e 404 else
AzureIoTClient 42:448eecc3676e 405 {
AzureIoTClient 42:448eecc3676e 406 JSON_Object* jsonObject = json_value_get_object(allJson);
AzureIoTClient 42:448eecc3676e 407 if (jsonObject == NULL)
AzureIoTClient 42:448eecc3676e 408 {
AzureIoTClient 42:448eecc3676e 409 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 410 LogError("unable to json_value_get_object");
AzureIoTClient 60:41648c4e7036 411 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 412 }
AzureIoTClient 42:448eecc3676e 413 else
AzureIoTClient 42:448eecc3676e 414 {
AzureIoTClient 42:448eecc3676e 415 const char* json_correlationId;
AzureIoTClient 42:448eecc3676e 416 json_correlationId = json_object_get_string(jsonObject, "correlationId");
AzureIoTClient 42:448eecc3676e 417 if (json_correlationId == NULL)
AzureIoTClient 42:448eecc3676e 418 {
AzureIoTClient 42:448eecc3676e 419 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 420 LogError("unable to json_object_get_string(jsonObject, \"correlationId\")");
AzureIoTClient 60:41648c4e7036 421 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 422 }
AzureIoTClient 42:448eecc3676e 423 else
AzureIoTClient 42:448eecc3676e 424 {
AzureIoTClient 42:448eecc3676e 425 if (STRING_copy(correlationId, json_correlationId) != 0)
AzureIoTClient 42:448eecc3676e 426 {
AzureIoTClient 42:448eecc3676e 427 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 428 LogError("unable to copy json_correlationId");
AzureIoTClient 60:41648c4e7036 429 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 430 }
AzureIoTClient 42:448eecc3676e 431 else
AzureIoTClient 42:448eecc3676e 432 {
AzureIoTClient 42:448eecc3676e 433 const char* json_hostName = json_object_get_string(jsonObject, "hostName");
AzureIoTClient 42:448eecc3676e 434 if (json_hostName == NULL)
AzureIoTClient 42:448eecc3676e 435 {
AzureIoTClient 42:448eecc3676e 436 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 437 LogError("unable to json_object_get_string(jsonObject, \"hostName\")");
AzureIoTClient 60:41648c4e7036 438 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 439 }
AzureIoTClient 42:448eecc3676e 440 else
AzureIoTClient 42:448eecc3676e 441 {
AzureIoTClient 42:448eecc3676e 442 const char* json_containerName = json_object_get_string(jsonObject, "containerName");
AzureIoTClient 42:448eecc3676e 443 if (json_containerName == NULL)
AzureIoTClient 42:448eecc3676e 444 {
AzureIoTClient 42:448eecc3676e 445 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 446 LogError("unable to json_object_get_string(jsonObject, \"containerName\")");
AzureIoTClient 60:41648c4e7036 447 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 448 }
AzureIoTClient 42:448eecc3676e 449 else
AzureIoTClient 42:448eecc3676e 450 {
AzureIoTClient 42:448eecc3676e 451 const char* json_blobName = json_object_get_string(jsonObject, "blobName");
AzureIoTClient 42:448eecc3676e 452 if (json_blobName == NULL)
AzureIoTClient 42:448eecc3676e 453 {
AzureIoTClient 42:448eecc3676e 454 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 455 LogError("unable to json_object_get_string(jsonObject, \"blobName\")");
AzureIoTClient 60:41648c4e7036 456 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 457 }
AzureIoTClient 42:448eecc3676e 458 else
AzureIoTClient 42:448eecc3676e 459 {
AzureIoTClient 42:448eecc3676e 460 const char* json_sasToken = json_object_get_string(jsonObject, "sasToken");
AzureIoTClient 42:448eecc3676e 461 if (json_sasToken == NULL)
AzureIoTClient 42:448eecc3676e 462 {
AzureIoTClient 42:448eecc3676e 463 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 464 LogError("unable to json_object_get_string(jsonObject, \"sasToken\")");
AzureIoTClient 60:41648c4e7036 465 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 466 }
AzureIoTClient 42:448eecc3676e 467 else
AzureIoTClient 42:448eecc3676e 468 {
AzureIoTClient 42:448eecc3676e 469 /*good JSON received from the service*/
AzureIoTClient 42:448eecc3676e 470
AzureIoTClient 42:448eecc3676e 471 if (STRING_copy(sasUri, "https://") != 0)
AzureIoTClient 42:448eecc3676e 472 {
AzureIoTClient 42:448eecc3676e 473 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 474 LogError("unable to STRING_copy");
AzureIoTClient 60:41648c4e7036 475 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 476 }
AzureIoTClient 42:448eecc3676e 477 else
AzureIoTClient 42:448eecc3676e 478 {
AzureIoTClient 42:448eecc3676e 479 if (!(
AzureIoTClient 42:448eecc3676e 480 (STRING_concat(sasUri, json_hostName) == 0) &&
AzureIoTClient 42:448eecc3676e 481 (STRING_concat(sasUri, "/") == 0) &&
AzureIoTClient 42:448eecc3676e 482 (STRING_concat(sasUri, json_containerName) == 0) &&
AzureIoTClient 42:448eecc3676e 483 (STRING_concat(sasUri, "/") == 0) &&
AzureIoTClient 42:448eecc3676e 484 (STRING_concat(sasUri, json_blobName) == 0) &&
AzureIoTClient 42:448eecc3676e 485 (STRING_concat(sasUri, json_sasToken) == 0)
AzureIoTClient 42:448eecc3676e 486 ))
AzureIoTClient 42:448eecc3676e 487 {
AzureIoTClient 42:448eecc3676e 488 /*Codes_SRS_IOTHUBCLIENT_LL_02_082: [ If extracting and saving the correlationId or SasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 489 LogError("unable to STRING_concat");
AzureIoTClient 60:41648c4e7036 490 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 491 }
AzureIoTClient 42:448eecc3676e 492 else
AzureIoTClient 42:448eecc3676e 493 {
AzureIoTClient 42:448eecc3676e 494 result = 0; /*success in step 1*/
AzureIoTClient 42:448eecc3676e 495 }
AzureIoTClient 42:448eecc3676e 496 }
AzureIoTClient 42:448eecc3676e 497 }
AzureIoTClient 42:448eecc3676e 498 }
AzureIoTClient 42:448eecc3676e 499 }
AzureIoTClient 42:448eecc3676e 500 }
AzureIoTClient 42:448eecc3676e 501 }
AzureIoTClient 42:448eecc3676e 502 }
AzureIoTClient 42:448eecc3676e 503 }
AzureIoTClient 42:448eecc3676e 504 json_value_free(allJson);
AzureIoTClient 42:448eecc3676e 505 }
AzureIoTClient 42:448eecc3676e 506 STRING_delete(responseAsString);
AzureIoTClient 42:448eecc3676e 507 }
AzureIoTClient 42:448eecc3676e 508 }
AzureIoTClient 42:448eecc3676e 509 }
AzureIoTClient 42:448eecc3676e 510 BUFFER_delete(responseContent);
AzureIoTClient 42:448eecc3676e 511 }
AzureIoTClient 42:448eecc3676e 512 }
AzureIoTClient 42:448eecc3676e 513 STRING_delete(relativePath);
AzureIoTClient 42:448eecc3676e 514 }
AzureIoTClient 42:448eecc3676e 515
AzureIoTClient 42:448eecc3676e 516 return result;
AzureIoTClient 42:448eecc3676e 517 }
AzureIoTClient 42:448eecc3676e 518
AzureIoTClient 42:448eecc3676e 519 /*returns 0 when the IoTHub has been informed about the file upload status*/
AzureIoTClient 42:448eecc3676e 520 static int IoTHubClient_LL_UploadToBlob_step3(IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA* handleData, STRING_HANDLE correlationId, HTTPAPIEX_HANDLE iotHubHttpApiExHandle, HTTP_HEADERS_HANDLE requestHttpHeaders, BUFFER_HANDLE messageBody)
AzureIoTClient 42:448eecc3676e 521 {
AzureIoTClient 42:448eecc3676e 522 int result;
AzureIoTClient 42:448eecc3676e 523 /*here is step 3. depending on the outcome of step 2 it needs to inform IoTHub about the file upload status*/
AzureIoTClient 42:448eecc3676e 524 /*if step 1 failed, there's nothing that step 3 needs to report.*/
AzureIoTClient 42:448eecc3676e 525 /*this POST "tries" to happen*/
AzureIoTClient 42:448eecc3676e 526
AzureIoTClient 42:448eecc3676e 527 /*Codes_SRS_IOTHUBCLIENT_LL_02_085: [ IoTHubClient_LL_UploadToBlob shall use the same authorization as step 1. to prepare and perform a HTTP request with the following parameters: ]*/
AzureIoTClient 42:448eecc3676e 528 STRING_HANDLE uriResource = STRING_construct(handleData->hostname);
AzureIoTClient 42:448eecc3676e 529 if (uriResource == NULL)
AzureIoTClient 42:448eecc3676e 530 {
AzureIoTClient 42:448eecc3676e 531 LogError("unable to construct URI");
AzureIoTClient 60:41648c4e7036 532 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 533 }
AzureIoTClient 42:448eecc3676e 534 else
AzureIoTClient 42:448eecc3676e 535 {
AzureIoTClient 42:448eecc3676e 536 if (!(
AzureIoTClient 42:448eecc3676e 537 (STRING_concat(uriResource, "/devices/") == 0) &&
AzureIoTClient 42:448eecc3676e 538 (STRING_concat_with_STRING(uriResource, handleData->deviceId) == 0) &&
AzureIoTClient 42:448eecc3676e 539 (STRING_concat(uriResource, "/files/notifications") == 0)
AzureIoTClient 42:448eecc3676e 540 ))
AzureIoTClient 42:448eecc3676e 541 {
AzureIoTClient 42:448eecc3676e 542 LogError("unable to STRING_concat");
AzureIoTClient 60:41648c4e7036 543 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 544 }
AzureIoTClient 42:448eecc3676e 545 else
AzureIoTClient 42:448eecc3676e 546 {
AzureIoTClient 42:448eecc3676e 547 STRING_HANDLE relativePathNotification = STRING_construct("/devices/");
AzureIoTClient 42:448eecc3676e 548 if (relativePathNotification == NULL)
AzureIoTClient 42:448eecc3676e 549 {
AzureIoTClient 60:41648c4e7036 550 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 551 LogError("unable to STRING_construct");
AzureIoTClient 42:448eecc3676e 552 }
AzureIoTClient 42:448eecc3676e 553 else
AzureIoTClient 42:448eecc3676e 554 {
AzureIoTClient 42:448eecc3676e 555 if (!(
AzureIoTClient 42:448eecc3676e 556 (STRING_concat_with_STRING(relativePathNotification, handleData->deviceId) == 0) &&
AzureIoTClient 42:448eecc3676e 557 (STRING_concat(relativePathNotification, "/files/notifications/") == 0) &&
AzureIoTClient 42:448eecc3676e 558 (STRING_concat(relativePathNotification, STRING_c_str(correlationId)) == 0) &&
AzureIoTClient 42:448eecc3676e 559 (STRING_concat(relativePathNotification, API_VERSION) == 0)
AzureIoTClient 42:448eecc3676e 560 ))
AzureIoTClient 42:448eecc3676e 561 {
AzureIoTClient 42:448eecc3676e 562 LogError("unable to STRING_concat_with_STRING");
AzureIoTClient 60:41648c4e7036 563 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 564 }
AzureIoTClient 42:448eecc3676e 565 else
AzureIoTClient 42:448eecc3676e 566 {
AzureIoTClient 42:448eecc3676e 567 /*Codes_SRS_IOTHUBCLIENT_LL_02_086: [ If performing the HTTP request fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 568 switch (handleData->authorizationScheme)
AzureIoTClient 42:448eecc3676e 569 {
AzureIoTClient 42:448eecc3676e 570 default:
AzureIoTClient 42:448eecc3676e 571 {
AzureIoTClient 42:448eecc3676e 572 LogError("internal error: unknown authorization Scheme");
AzureIoTClient 60:41648c4e7036 573 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 574 break;
AzureIoTClient 42:448eecc3676e 575 }
AzureIoTClient 46:6a69294b6119 576 case (X509):
AzureIoTClient 46:6a69294b6119 577 {
AzureIoTClient 46:6a69294b6119 578 unsigned int notificationStatusCode;
AzureIoTClient 46:6a69294b6119 579 if (HTTPAPIEX_ExecuteRequest(
AzureIoTClient 46:6a69294b6119 580 iotHubHttpApiExHandle,
AzureIoTClient 46:6a69294b6119 581 HTTPAPI_REQUEST_POST,
AzureIoTClient 46:6a69294b6119 582 STRING_c_str(relativePathNotification),
AzureIoTClient 46:6a69294b6119 583 requestHttpHeaders,
AzureIoTClient 46:6a69294b6119 584 messageBody,
AzureIoTClient 46:6a69294b6119 585 &notificationStatusCode,
AzureIoTClient 46:6a69294b6119 586 NULL,
AzureIoTClient 46:6a69294b6119 587 NULL) != HTTPAPIEX_OK)
AzureIoTClient 46:6a69294b6119 588 {
AzureIoTClient 46:6a69294b6119 589 LogError("unable to do HTTPAPIEX_ExecuteRequest");
AzureIoTClient 60:41648c4e7036 590 result = __FAILURE__;
AzureIoTClient 46:6a69294b6119 591 }
AzureIoTClient 46:6a69294b6119 592 else
AzureIoTClient 46:6a69294b6119 593 {
AzureIoTClient 46:6a69294b6119 594 if (notificationStatusCode >= 300)
AzureIoTClient 46:6a69294b6119 595 {
AzureIoTClient 46:6a69294b6119 596 /*Codes_SRS_IOTHUBCLIENT_LL_02_087: [If the statusCode of the HTTP request is greater than or equal to 300 then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR]*/
AzureIoTClient 46:6a69294b6119 597 LogError("server didn't like the notification request");
AzureIoTClient 60:41648c4e7036 598 result = __FAILURE__;
AzureIoTClient 46:6a69294b6119 599 }
AzureIoTClient 46:6a69294b6119 600 else
AzureIoTClient 46:6a69294b6119 601 {
AzureIoTClient 46:6a69294b6119 602 result = 0;
AzureIoTClient 46:6a69294b6119 603 }
AzureIoTClient 46:6a69294b6119 604 }
AzureIoTClient 46:6a69294b6119 605 break;
AzureIoTClient 46:6a69294b6119 606 }
AzureIoTClient 42:448eecc3676e 607 case (DEVICE_KEY):
AzureIoTClient 42:448eecc3676e 608 {
AzureIoTClient 42:448eecc3676e 609 STRING_HANDLE empty = STRING_new();
AzureIoTClient 42:448eecc3676e 610 if (empty == NULL)
AzureIoTClient 42:448eecc3676e 611 {
AzureIoTClient 42:448eecc3676e 612 LogError("unable to STRING_new");
AzureIoTClient 60:41648c4e7036 613 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 614 }
AzureIoTClient 42:448eecc3676e 615 else
AzureIoTClient 42:448eecc3676e 616 {
AzureIoTClient 42:448eecc3676e 617 HTTPAPIEX_SAS_HANDLE sasHandle = HTTPAPIEX_SAS_Create(handleData->credentials.deviceKey, uriResource, empty);
AzureIoTClient 42:448eecc3676e 618 if (sasHandle == NULL)
AzureIoTClient 42:448eecc3676e 619 {
AzureIoTClient 42:448eecc3676e 620 LogError("unable to HTTPAPIEX_SAS_Create");
AzureIoTClient 60:41648c4e7036 621 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 622 }
AzureIoTClient 42:448eecc3676e 623 else
AzureIoTClient 42:448eecc3676e 624 {
AzureIoTClient 42:448eecc3676e 625 unsigned int statusCode;
AzureIoTClient 42:448eecc3676e 626 if (HTTPAPIEX_SAS_ExecuteRequest(
AzureIoTClient 42:448eecc3676e 627 sasHandle, /*HTTPAPIEX_SAS_HANDLE sasHandle - the created HTTPAPIEX_SAS_HANDLE*/
AzureIoTClient 42:448eecc3676e 628 iotHubHttpApiExHandle, /*HTTPAPIEX_HANDLE handle - the created HTTPAPIEX_HANDLE*/
AzureIoTClient 42:448eecc3676e 629 HTTPAPI_REQUEST_POST, /*HTTPAPI_REQUEST_TYPE requestType - HTTPAPI_REQUEST_GET*/
AzureIoTClient 42:448eecc3676e 630 STRING_c_str(relativePathNotification), /*const char* relativePath - the HTTP relative path*/
AzureIoTClient 42:448eecc3676e 631 requestHttpHeaders, /*HTTP_HEADERS_HANDLE requestHttpHeadersHandle - request HTTP headers*/
AzureIoTClient 42:448eecc3676e 632 messageBody, /*BUFFER_HANDLE requestContent*/
AzureIoTClient 42:448eecc3676e 633 &statusCode, /*unsigned int* statusCode - the address of an unsigned int that will contain the HTTP status code*/
AzureIoTClient 42:448eecc3676e 634 NULL, /*HTTP_HEADERS_HANDLE responseHeadersHandle - NULL*/
AzureIoTClient 42:448eecc3676e 635 NULL
AzureIoTClient 42:448eecc3676e 636 ) != HTTPAPIEX_OK)
AzureIoTClient 42:448eecc3676e 637 {
AzureIoTClient 42:448eecc3676e 638 /*Codes_SRS_IOTHUBCLIENT_LL_02_079: [ If HTTPAPIEX_SAS_ExecuteRequest fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 639 LogError("unable to HTTPAPIEX_SAS_ExecuteRequest");
AzureIoTClient 60:41648c4e7036 640 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 641 ;
AzureIoTClient 42:448eecc3676e 642 }
AzureIoTClient 42:448eecc3676e 643 else
AzureIoTClient 42:448eecc3676e 644 {
AzureIoTClient 42:448eecc3676e 645 if (statusCode >= 300)
AzureIoTClient 42:448eecc3676e 646 {
AzureIoTClient 42:448eecc3676e 647 /*Codes_SRS_IOTHUBCLIENT_LL_02_087: [If the statusCode of the HTTP request is greater than or equal to 300 then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR]*/
AzureIoTClient 60:41648c4e7036 648 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 649 LogError("HTTP code was %u", statusCode);
AzureIoTClient 42:448eecc3676e 650 }
AzureIoTClient 42:448eecc3676e 651 else
AzureIoTClient 42:448eecc3676e 652 {
AzureIoTClient 42:448eecc3676e 653 result = 0;
AzureIoTClient 42:448eecc3676e 654 }
AzureIoTClient 42:448eecc3676e 655 }
AzureIoTClient 42:448eecc3676e 656 HTTPAPIEX_SAS_Destroy(sasHandle);
AzureIoTClient 42:448eecc3676e 657 }
AzureIoTClient 42:448eecc3676e 658 STRING_delete(empty);
AzureIoTClient 42:448eecc3676e 659 }
AzureIoTClient 42:448eecc3676e 660 break;
AzureIoTClient 42:448eecc3676e 661 }
AzureIoTClient 42:448eecc3676e 662 case(SAS_TOKEN):
AzureIoTClient 42:448eecc3676e 663 {
AzureIoTClient 42:448eecc3676e 664 unsigned int notificationStatusCode;
AzureIoTClient 42:448eecc3676e 665 if (HTTPAPIEX_ExecuteRequest(
AzureIoTClient 42:448eecc3676e 666 iotHubHttpApiExHandle,
AzureIoTClient 42:448eecc3676e 667 HTTPAPI_REQUEST_POST,
AzureIoTClient 42:448eecc3676e 668 STRING_c_str(relativePathNotification),
AzureIoTClient 42:448eecc3676e 669 requestHttpHeaders,
AzureIoTClient 42:448eecc3676e 670 messageBody,
AzureIoTClient 42:448eecc3676e 671 &notificationStatusCode,
AzureIoTClient 42:448eecc3676e 672 NULL,
AzureIoTClient 42:448eecc3676e 673 NULL) != HTTPAPIEX_OK)
AzureIoTClient 42:448eecc3676e 674 {
AzureIoTClient 42:448eecc3676e 675 LogError("unable to do HTTPAPIEX_ExecuteRequest");
AzureIoTClient 60:41648c4e7036 676 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 677 }
AzureIoTClient 42:448eecc3676e 678 else
AzureIoTClient 42:448eecc3676e 679 {
AzureIoTClient 42:448eecc3676e 680 if (notificationStatusCode >= 300)
AzureIoTClient 42:448eecc3676e 681 {
AzureIoTClient 42:448eecc3676e 682 /*Codes_SRS_IOTHUBCLIENT_LL_02_087: [If the statusCode of the HTTP request is greater than or equal to 300 then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR]*/
AzureIoTClient 42:448eecc3676e 683 LogError("server didn't like the notification request");
AzureIoTClient 60:41648c4e7036 684 result = __FAILURE__;
AzureIoTClient 42:448eecc3676e 685 }
AzureIoTClient 42:448eecc3676e 686 else
AzureIoTClient 42:448eecc3676e 687 {
AzureIoTClient 42:448eecc3676e 688 result = 0;
AzureIoTClient 42:448eecc3676e 689 }
AzureIoTClient 42:448eecc3676e 690 }
AzureIoTClient 42:448eecc3676e 691 break;
AzureIoTClient 42:448eecc3676e 692 }
AzureIoTClient 42:448eecc3676e 693 } /*switch authorizationScheme*/
AzureIoTClient 42:448eecc3676e 694 }
AzureIoTClient 42:448eecc3676e 695 STRING_delete(relativePathNotification);
AzureIoTClient 42:448eecc3676e 696 }
AzureIoTClient 42:448eecc3676e 697 }
AzureIoTClient 42:448eecc3676e 698 STRING_delete(uriResource);
AzureIoTClient 42:448eecc3676e 699 }
AzureIoTClient 42:448eecc3676e 700 return result;
AzureIoTClient 42:448eecc3676e 701 }
AzureIoTClient 42:448eecc3676e 702
AzureIoTClient 42:448eecc3676e 703 IOTHUB_CLIENT_RESULT IoTHubClient_LL_UploadToBlob_Impl(IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE handle, const char* destinationFileName, const unsigned char* source, size_t size)
AzureIoTClient 42:448eecc3676e 704 {
AzureIoTClient 42:448eecc3676e 705 IOTHUB_CLIENT_RESULT result;
AzureIoTClient 48:cc5d91f2b06d 706 BUFFER_HANDLE toBeTransmitted;
AzureIoTClient 48:cc5d91f2b06d 707 int requiredStringLength;
AzureIoTClient 48:cc5d91f2b06d 708 char* requiredString;
AzureIoTClient 42:448eecc3676e 709
AzureIoTClient 42:448eecc3676e 710 /*Codes_SRS_IOTHUBCLIENT_LL_02_061: [ If handle is NULL then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_INVALID_ARG. ]*/
AzureIoTClient 42:448eecc3676e 711 /*Codes_SRS_IOTHUBCLIENT_LL_02_062: [ If destinationFileName is NULL then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_INVALID_ARG. ]*/
AzureIoTClient 42:448eecc3676e 712 /*Codes_SRS_IOTHUBCLIENT_LL_02_063: [ If source is NULL and size is greater than 0 then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_INVALID_ARG. ]*/
AzureIoTClient 42:448eecc3676e 713 if (
AzureIoTClient 42:448eecc3676e 714 (handle == NULL) ||
AzureIoTClient 42:448eecc3676e 715 (destinationFileName == NULL) ||
Azure.IoT Build 45:54c11b1b1407 716 ((source == NULL) && (size > 0))
AzureIoTClient 42:448eecc3676e 717 )
AzureIoTClient 42:448eecc3676e 718 {
AzureIoTClient 42:448eecc3676e 719 LogError("invalid argument detected handle=%p destinationFileName=%p source=%p size=%zu", handle, destinationFileName, source, size);
AzureIoTClient 42:448eecc3676e 720 result = IOTHUB_CLIENT_INVALID_ARG;
AzureIoTClient 42:448eecc3676e 721 }
AzureIoTClient 42:448eecc3676e 722 else
AzureIoTClient 42:448eecc3676e 723 {
AzureIoTClient 42:448eecc3676e 724 IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA* handleData = (IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA*)handle;
AzureIoTClient 42:448eecc3676e 725
AzureIoTClient 42:448eecc3676e 726 /*Codes_SRS_IOTHUBCLIENT_LL_02_064: [ IoTHubClient_LL_UploadToBlob shall create an HTTPAPIEX_HANDLE to the IoTHub hostname. ]*/
AzureIoTClient 42:448eecc3676e 727 HTTPAPIEX_HANDLE iotHubHttpApiExHandle = HTTPAPIEX_Create(handleData->hostname);
AzureIoTClient 42:448eecc3676e 728
AzureIoTClient 42:448eecc3676e 729 /*Codes_SRS_IOTHUBCLIENT_LL_02_065: [ If creating the HTTPAPIEX_HANDLE fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 42:448eecc3676e 730 if (iotHubHttpApiExHandle == NULL)
AzureIoTClient 42:448eecc3676e 731 {
AzureIoTClient 42:448eecc3676e 732 LogError("unable to HTTPAPIEX_Create");
AzureIoTClient 42:448eecc3676e 733 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 734 }
AzureIoTClient 42:448eecc3676e 735 else
AzureIoTClient 42:448eecc3676e 736 {
AzureIoTClient 46:6a69294b6119 737 if (
AzureIoTClient 46:6a69294b6119 738 (handleData->authorizationScheme == X509) &&
AzureIoTClient 46:6a69294b6119 739
AzureIoTClient 46:6a69294b6119 740 /*transmit the x509certificate and x509privatekey*/
AzureIoTClient 46:6a69294b6119 741 /*Codes_SRS_IOTHUBCLIENT_LL_02_106: [ - x509certificate and x509privatekey saved options shall be passed on the HTTPAPIEX_SetOption ]*/
AzureIoTClient 46:6a69294b6119 742 (!(
AzureIoTClient 48:cc5d91f2b06d 743 (HTTPAPIEX_SetOption(iotHubHttpApiExHandle, OPTION_X509_CERT, handleData->credentials.x509credentials.x509certificate) == HTTPAPIEX_OK) &&
AzureIoTClient 48:cc5d91f2b06d 744 (HTTPAPIEX_SetOption(iotHubHttpApiExHandle, OPTION_X509_PRIVATE_KEY, handleData->credentials.x509credentials.x509privatekey) == HTTPAPIEX_OK)
AzureIoTClient 46:6a69294b6119 745 ))
AzureIoTClient 46:6a69294b6119 746 )
AzureIoTClient 42:448eecc3676e 747 {
AzureIoTClient 46:6a69294b6119 748 LogError("unable to HTTPAPIEX_SetOption for x509");
AzureIoTClient 42:448eecc3676e 749 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 750 }
AzureIoTClient 42:448eecc3676e 751 else
AzureIoTClient 42:448eecc3676e 752 {
AzureIoTClient 62:5a4cdacf5090 753 /*Codes_SRS_IOTHUBCLIENT_LL_02_111: [ If certificates is non-NULL then certificates shall be passed to HTTPAPIEX_SetOption with optionName TrustedCerts. ]*/
AzureIoTClient 62:5a4cdacf5090 754 if ((handleData->certificates != NULL) && (HTTPAPIEX_SetOption(iotHubHttpApiExHandle, "TrustedCerts", handleData->certificates) != HTTPAPIEX_OK))
AzureIoTClient 42:448eecc3676e 755 {
AzureIoTClient 62:5a4cdacf5090 756 LogError("unable to set TrustedCerts!");
AzureIoTClient 42:448eecc3676e 757 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 758 }
AzureIoTClient 42:448eecc3676e 759 else
AzureIoTClient 42:448eecc3676e 760 {
AzureIoTClient 62:5a4cdacf5090 761
AzureIoTClient 62:5a4cdacf5090 762 STRING_HANDLE correlationId = STRING_new();
AzureIoTClient 62:5a4cdacf5090 763 if (correlationId == NULL)
AzureIoTClient 42:448eecc3676e 764 {
AzureIoTClient 46:6a69294b6119 765 LogError("unable to STRING_new");
AzureIoTClient 42:448eecc3676e 766 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 767 }
AzureIoTClient 42:448eecc3676e 768 else
AzureIoTClient 42:448eecc3676e 769 {
AzureIoTClient 62:5a4cdacf5090 770 STRING_HANDLE sasUri = STRING_new();
AzureIoTClient 62:5a4cdacf5090 771 if (sasUri == NULL)
AzureIoTClient 42:448eecc3676e 772 {
AzureIoTClient 62:5a4cdacf5090 773 LogError("unable to STRING_new");
AzureIoTClient 42:448eecc3676e 774 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 775 }
AzureIoTClient 42:448eecc3676e 776 else
AzureIoTClient 42:448eecc3676e 777 {
AzureIoTClient 62:5a4cdacf5090 778 /*Codes_SRS_IOTHUBCLIENT_LL_02_070: [ IoTHubClient_LL_UploadToBlob shall create request HTTP headers. ]*/
AzureIoTClient 62:5a4cdacf5090 779 HTTP_HEADERS_HANDLE requestHttpHeaders = HTTPHeaders_Alloc(); /*these are build by step 1 and used by step 3 too*/
AzureIoTClient 62:5a4cdacf5090 780 if (requestHttpHeaders == NULL)
AzureIoTClient 42:448eecc3676e 781 {
AzureIoTClient 62:5a4cdacf5090 782 LogError("unable to HTTPHeaders_Alloc");
AzureIoTClient 42:448eecc3676e 783 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 784 }
AzureIoTClient 42:448eecc3676e 785 else
AzureIoTClient 42:448eecc3676e 786 {
AzureIoTClient 62:5a4cdacf5090 787 /*do step 1*/
AzureIoTClient 62:5a4cdacf5090 788 if (IoTHubClient_LL_UploadToBlob_step1and2(handleData, iotHubHttpApiExHandle, requestHttpHeaders, destinationFileName, correlationId, sasUri) != 0)
AzureIoTClient 46:6a69294b6119 789 {
AzureIoTClient 62:5a4cdacf5090 790 LogError("error in IoTHubClient_LL_UploadToBlob_step1");
AzureIoTClient 42:448eecc3676e 791 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 792 }
AzureIoTClient 42:448eecc3676e 793 else
AzureIoTClient 42:448eecc3676e 794 {
AzureIoTClient 62:5a4cdacf5090 795 /*do step 2.*/
AzureIoTClient 42:448eecc3676e 796
AzureIoTClient 62:5a4cdacf5090 797 unsigned int httpResponse;
AzureIoTClient 62:5a4cdacf5090 798 BUFFER_HANDLE responseToIoTHub = BUFFER_new();
AzureIoTClient 62:5a4cdacf5090 799 if (responseToIoTHub == NULL)
AzureIoTClient 62:5a4cdacf5090 800 {
AzureIoTClient 42:448eecc3676e 801 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 62:5a4cdacf5090 802 LogError("unable to BUFFER_new");
AzureIoTClient 42:448eecc3676e 803 }
AzureIoTClient 42:448eecc3676e 804 else
AzureIoTClient 42:448eecc3676e 805 {
AzureIoTClient 62:5a4cdacf5090 806 int step2success;
AzureIoTClient 62:5a4cdacf5090 807 /*Codes_SRS_IOTHUBCLIENT_LL_02_083: [ IoTHubClient_LL_UploadToBlob shall call Blob_UploadFromSasUri and capture the HTTP return code and HTTP body. ]*/
AzureIoTClient 62:5a4cdacf5090 808 step2success = (Blob_UploadFromSasUri(STRING_c_str(sasUri), source, size, &httpResponse, responseToIoTHub, handleData->certificates) == BLOB_OK);
AzureIoTClient 62:5a4cdacf5090 809 if (!step2success)
AzureIoTClient 62:5a4cdacf5090 810 {
AzureIoTClient 62:5a4cdacf5090 811 /*Codes_SRS_IOTHUBCLIENT_LL_02_084: [ If Blob_UploadFromSasUri fails then IoTHubClient_LL_UploadToBlob shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 62:5a4cdacf5090 812 LogError("unable to Blob_UploadFromSasUri");
AzureIoTClient 46:6a69294b6119 813
AzureIoTClient 62:5a4cdacf5090 814 /*do step 3*/ /*try*/
AzureIoTClient 62:5a4cdacf5090 815 /*Codes_SRS_IOTHUBCLIENT_LL_02_091: [ If step 2 fails without establishing an HTTP dialogue, then the HTTP message body shall look like: ]*/
AzureIoTClient 62:5a4cdacf5090 816 if (BUFFER_build(responseToIoTHub, (const unsigned char*)FILE_UPLOAD_FAILED_BODY, sizeof(FILE_UPLOAD_FAILED_BODY) / sizeof(FILE_UPLOAD_FAILED_BODY[0])) == 0)
AzureIoTClient 62:5a4cdacf5090 817 {
AzureIoTClient 62:5a4cdacf5090 818 if (IoTHubClient_LL_UploadToBlob_step3(handleData, correlationId, iotHubHttpApiExHandle, requestHttpHeaders, responseToIoTHub) != 0)
AzureIoTClient 62:5a4cdacf5090 819 {
AzureIoTClient 62:5a4cdacf5090 820 LogError("IoTHubClient_LL_UploadToBlob_step3 failed");
AzureIoTClient 62:5a4cdacf5090 821 }
AzureIoTClient 62:5a4cdacf5090 822 }
AzureIoTClient 42:448eecc3676e 823 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 824 }
AzureIoTClient 42:448eecc3676e 825 else
AzureIoTClient 42:448eecc3676e 826 {
AzureIoTClient 62:5a4cdacf5090 827 /*must make a json*/
AzureIoTClient 62:5a4cdacf5090 828
AzureIoTClient 62:5a4cdacf5090 829 requiredStringLength = snprintf(NULL, 0, "{\"isSuccess\":%s, \"statusCode\":%d, \"statusDescription\":\"%s\"}", ((httpResponse < 300) ? "true" : "false"), httpResponse, BUFFER_u_char(responseToIoTHub));
AzureIoTClient 62:5a4cdacf5090 830
AzureIoTClient 62:5a4cdacf5090 831 requiredString = malloc(requiredStringLength + 1);
AzureIoTClient 62:5a4cdacf5090 832 if (requiredString == 0)
AzureIoTClient 42:448eecc3676e 833 {
AzureIoTClient 62:5a4cdacf5090 834 LogError("unable to malloc");
AzureIoTClient 42:448eecc3676e 835 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 42:448eecc3676e 836 }
AzureIoTClient 42:448eecc3676e 837 else
AzureIoTClient 42:448eecc3676e 838 {
AzureIoTClient 62:5a4cdacf5090 839 /*do again snprintf*/
AzureIoTClient 62:5a4cdacf5090 840 (void)snprintf(requiredString, requiredStringLength + 1, "{\"isSuccess\":%s, \"statusCode\":%d, \"statusDescription\":\"%s\"}", ((httpResponse < 300) ? "true" : "false"), httpResponse, BUFFER_u_char(responseToIoTHub));
AzureIoTClient 62:5a4cdacf5090 841 toBeTransmitted = BUFFER_create((const unsigned char*)requiredString, requiredStringLength);
AzureIoTClient 62:5a4cdacf5090 842 if (toBeTransmitted == NULL)
AzureIoTClient 46:6a69294b6119 843 {
AzureIoTClient 62:5a4cdacf5090 844 LogError("unable to BUFFER_create");
AzureIoTClient 46:6a69294b6119 845 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 46:6a69294b6119 846 }
AzureIoTClient 46:6a69294b6119 847 else
AzureIoTClient 46:6a69294b6119 848 {
AzureIoTClient 62:5a4cdacf5090 849 if (IoTHubClient_LL_UploadToBlob_step3(handleData, correlationId, iotHubHttpApiExHandle, requestHttpHeaders, toBeTransmitted) != 0)
AzureIoTClient 62:5a4cdacf5090 850 {
AzureIoTClient 62:5a4cdacf5090 851 LogError("IoTHubClient_LL_UploadToBlob_step3 failed");
AzureIoTClient 62:5a4cdacf5090 852 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 62:5a4cdacf5090 853 }
AzureIoTClient 62:5a4cdacf5090 854 else
AzureIoTClient 62:5a4cdacf5090 855 {
AzureIoTClient 62:5a4cdacf5090 856 result = (httpResponse < 300) ? IOTHUB_CLIENT_OK : IOTHUB_CLIENT_ERROR;
AzureIoTClient 62:5a4cdacf5090 857 }
AzureIoTClient 62:5a4cdacf5090 858 BUFFER_delete(toBeTransmitted);
AzureIoTClient 46:6a69294b6119 859 }
AzureIoTClient 62:5a4cdacf5090 860 free(requiredString);
AzureIoTClient 42:448eecc3676e 861 }
AzureIoTClient 42:448eecc3676e 862 }
AzureIoTClient 62:5a4cdacf5090 863 BUFFER_delete(responseToIoTHub);
AzureIoTClient 42:448eecc3676e 864 }
AzureIoTClient 42:448eecc3676e 865 }
AzureIoTClient 62:5a4cdacf5090 866 HTTPHeaders_Free(requestHttpHeaders);
AzureIoTClient 42:448eecc3676e 867 }
AzureIoTClient 62:5a4cdacf5090 868 STRING_delete(sasUri);
AzureIoTClient 42:448eecc3676e 869 }
AzureIoTClient 62:5a4cdacf5090 870 STRING_delete(correlationId);
AzureIoTClient 42:448eecc3676e 871 }
AzureIoTClient 42:448eecc3676e 872 }
AzureIoTClient 42:448eecc3676e 873 }
AzureIoTClient 42:448eecc3676e 874 HTTPAPIEX_Destroy(iotHubHttpApiExHandle);
AzureIoTClient 42:448eecc3676e 875 }
AzureIoTClient 42:448eecc3676e 876 }
AzureIoTClient 42:448eecc3676e 877 return result;
AzureIoTClient 42:448eecc3676e 878 }
AzureIoTClient 42:448eecc3676e 879
AzureIoTClient 42:448eecc3676e 880 void IoTHubClient_LL_UploadToBlob_Destroy(IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE handle)
AzureIoTClient 42:448eecc3676e 881 {
AzureIoTClient 42:448eecc3676e 882 if (handle == NULL)
AzureIoTClient 42:448eecc3676e 883 {
AzureIoTClient 62:5a4cdacf5090 884 LogError("unexpected NULL argument");
AzureIoTClient 42:448eecc3676e 885 }
AzureIoTClient 42:448eecc3676e 886 else
AzureIoTClient 42:448eecc3676e 887 {
AzureIoTClient 42:448eecc3676e 888 IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA* handleData = (IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA*)handle;
AzureIoTClient 42:448eecc3676e 889 switch (handleData->authorizationScheme)
AzureIoTClient 42:448eecc3676e 890 {
AzureIoTClient 42:448eecc3676e 891 case(SAS_TOKEN):
AzureIoTClient 42:448eecc3676e 892 {
AzureIoTClient 42:448eecc3676e 893 STRING_delete(handleData->credentials.sas);
AzureIoTClient 42:448eecc3676e 894 break;
AzureIoTClient 42:448eecc3676e 895 }
AzureIoTClient 42:448eecc3676e 896 case(DEVICE_KEY):
AzureIoTClient 42:448eecc3676e 897 {
AzureIoTClient 42:448eecc3676e 898 STRING_delete(handleData->credentials.deviceKey);
AzureIoTClient 42:448eecc3676e 899 break;
AzureIoTClient 42:448eecc3676e 900 }
AzureIoTClient 46:6a69294b6119 901 case(X509):
AzureIoTClient 46:6a69294b6119 902 {
AzureIoTClient 46:6a69294b6119 903 if (handleData->credentials.x509credentials.x509certificate != NULL)
AzureIoTClient 46:6a69294b6119 904 {
AzureIoTClient 46:6a69294b6119 905 free((void*)handleData->credentials.x509credentials.x509certificate);
AzureIoTClient 46:6a69294b6119 906 }
AzureIoTClient 46:6a69294b6119 907 if (handleData->credentials.x509credentials.x509privatekey != NULL)
AzureIoTClient 46:6a69294b6119 908 {
AzureIoTClient 46:6a69294b6119 909 free((void*)handleData->credentials.x509credentials.x509privatekey);
AzureIoTClient 46:6a69294b6119 910 }
AzureIoTClient 46:6a69294b6119 911 break;
AzureIoTClient 46:6a69294b6119 912 }
AzureIoTClient 42:448eecc3676e 913 default:
AzureIoTClient 42:448eecc3676e 914 {
AzureIoTClient 42:448eecc3676e 915 LogError("INTERNAL ERROR");
AzureIoTClient 42:448eecc3676e 916 break;
AzureIoTClient 42:448eecc3676e 917 }
AzureIoTClient 42:448eecc3676e 918 }
AzureIoTClient 42:448eecc3676e 919 free((void*)handleData->hostname);
AzureIoTClient 42:448eecc3676e 920 STRING_delete(handleData->deviceId);
AzureIoTClient 62:5a4cdacf5090 921 if (handleData->certificates != NULL)
AzureIoTClient 62:5a4cdacf5090 922 {
AzureIoTClient 62:5a4cdacf5090 923 free(handleData->certificates);
AzureIoTClient 62:5a4cdacf5090 924 }
AzureIoTClient 42:448eecc3676e 925 free(handleData);
AzureIoTClient 42:448eecc3676e 926 }
AzureIoTClient 42:448eecc3676e 927 }
AzureIoTClient 46:6a69294b6119 928
AzureIoTClient 46:6a69294b6119 929 IOTHUB_CLIENT_RESULT IoTHubClient_LL_UploadToBlob_SetOption(IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE handle, const char* optionName, const void* value)
AzureIoTClient 46:6a69294b6119 930 {
AzureIoTClient 46:6a69294b6119 931 IOTHUB_CLIENT_RESULT result;
AzureIoTClient 46:6a69294b6119 932 /*Codes_SRS_IOTHUBCLIENT_LL_02_110: [ If parameter handle is NULL then IoTHubClient_LL_UploadToBlob_SetOption shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 46:6a69294b6119 933 if (handle == NULL)
AzureIoTClient 46:6a69294b6119 934 {
AzureIoTClient 46:6a69294b6119 935 LogError("invalid argument detected: IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE handle=%p, const char* optionName=%s, const void* value=%p", handle, optionName, value);
AzureIoTClient 46:6a69294b6119 936 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 46:6a69294b6119 937 }
AzureIoTClient 46:6a69294b6119 938 else
AzureIoTClient 46:6a69294b6119 939 {
AzureIoTClient 46:6a69294b6119 940 IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA* handleData = (IOTHUB_CLIENT_LL_UPLOADTOBLOB_HANDLE_DATA*)handle;
AzureIoTClient 46:6a69294b6119 941
AzureIoTClient 46:6a69294b6119 942 /*Codes_SRS_IOTHUBCLIENT_LL_02_100: [ x509certificate - then value then is a null terminated string that contains the x509 certificate. ]*/
AzureIoTClient 48:cc5d91f2b06d 943 if (strcmp(optionName, OPTION_X509_CERT) == 0)
AzureIoTClient 46:6a69294b6119 944 {
AzureIoTClient 46:6a69294b6119 945 /*Codes_SRS_IOTHUBCLIENT_LL_02_109: [ If the authentication scheme is NOT x509 then IoTHubClient_LL_UploadToBlob_SetOption shall return IOTHUB_CLIENT_INVALID_ARG. ]*/
AzureIoTClient 46:6a69294b6119 946 if (handleData->authorizationScheme != X509)
AzureIoTClient 46:6a69294b6119 947 {
AzureIoTClient 46:6a69294b6119 948 LogError("trying to set a x509 certificate while the authentication scheme is not x509");
AzureIoTClient 46:6a69294b6119 949 result = IOTHUB_CLIENT_INVALID_ARG;
AzureIoTClient 46:6a69294b6119 950 }
AzureIoTClient 46:6a69294b6119 951 else
AzureIoTClient 46:6a69294b6119 952 {
AzureIoTClient 46:6a69294b6119 953 /*Codes_SRS_IOTHUBCLIENT_LL_02_103: [ The options shall be saved. ]*/
AzureIoTClient 46:6a69294b6119 954 /*try to make a copy of the certificate*/
AzureIoTClient 46:6a69294b6119 955 char* temp;
AzureIoTClient 46:6a69294b6119 956 if (mallocAndStrcpy_s(&temp, value) != 0)
AzureIoTClient 46:6a69294b6119 957 {
AzureIoTClient 46:6a69294b6119 958 /*Codes_SRS_IOTHUBCLIENT_LL_02_104: [ If saving fails, then IoTHubClient_LL_UploadToBlob_SetOption shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 46:6a69294b6119 959 LogError("unable to mallocAndStrcpy_s");
AzureIoTClient 46:6a69294b6119 960 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 46:6a69294b6119 961 }
AzureIoTClient 46:6a69294b6119 962 else
AzureIoTClient 46:6a69294b6119 963 {
AzureIoTClient 46:6a69294b6119 964 /*Codes_SRS_IOTHUBCLIENT_LL_02_105: [ Otherwise IoTHubClient_LL_UploadToBlob_SetOption shall succeed and return IOTHUB_CLIENT_OK. ]*/
AzureIoTClient 46:6a69294b6119 965 if (handleData->credentials.x509credentials.x509certificate != NULL) /*free any previous values, if any*/
AzureIoTClient 46:6a69294b6119 966 {
AzureIoTClient 46:6a69294b6119 967 free((void*)handleData->credentials.x509credentials.x509certificate);
AzureIoTClient 46:6a69294b6119 968 }
AzureIoTClient 46:6a69294b6119 969 handleData->credentials.x509credentials.x509certificate = temp;
AzureIoTClient 46:6a69294b6119 970 result = IOTHUB_CLIENT_OK;
AzureIoTClient 46:6a69294b6119 971 }
AzureIoTClient 46:6a69294b6119 972 }
AzureIoTClient 46:6a69294b6119 973 }
AzureIoTClient 46:6a69294b6119 974 /*Codes_SRS_IOTHUBCLIENT_LL_02_101: [ x509privatekey - then value is a null terminated string that contains the x509 privatekey. ]*/
AzureIoTClient 48:cc5d91f2b06d 975 else if (strcmp(optionName, OPTION_X509_PRIVATE_KEY) == 0)
AzureIoTClient 46:6a69294b6119 976 {
AzureIoTClient 46:6a69294b6119 977 /*Codes_SRS_IOTHUBCLIENT_LL_02_109: [ If the authentication scheme is NOT x509 then IoTHubClient_LL_UploadToBlob_SetOption shall return IOTHUB_CLIENT_INVALID_ARG. ]*/
AzureIoTClient 46:6a69294b6119 978 if (handleData->authorizationScheme != X509)
AzureIoTClient 46:6a69294b6119 979 {
AzureIoTClient 46:6a69294b6119 980 LogError("trying to set a x509 privatekey while the authentication scheme is not x509");
AzureIoTClient 46:6a69294b6119 981 result = IOTHUB_CLIENT_INVALID_ARG;
AzureIoTClient 46:6a69294b6119 982 }
AzureIoTClient 46:6a69294b6119 983 else
AzureIoTClient 46:6a69294b6119 984 {
AzureIoTClient 46:6a69294b6119 985 /*Codes_SRS_IOTHUBCLIENT_LL_02_103: [ The options shall be saved. ]*/
AzureIoTClient 46:6a69294b6119 986 /*try to make a copy of the privatekey*/
AzureIoTClient 46:6a69294b6119 987 char* temp;
AzureIoTClient 46:6a69294b6119 988 if (mallocAndStrcpy_s(&temp, value) != 0)
AzureIoTClient 46:6a69294b6119 989 {
AzureIoTClient 46:6a69294b6119 990 /*Codes_SRS_IOTHUBCLIENT_LL_02_104: [ If saving fails, then IoTHubClient_LL_UploadToBlob_SetOption shall fail and return IOTHUB_CLIENT_ERROR. ]*/
AzureIoTClient 46:6a69294b6119 991 LogError("unable to mallocAndStrcpy_s");
AzureIoTClient 46:6a69294b6119 992 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 46:6a69294b6119 993 }
AzureIoTClient 46:6a69294b6119 994 else
AzureIoTClient 46:6a69294b6119 995 {
AzureIoTClient 46:6a69294b6119 996 /*Codes_SRS_IOTHUBCLIENT_LL_02_105: [ Otherwise IoTHubClient_LL_UploadToBlob_SetOption shall succeed and return IOTHUB_CLIENT_OK. ]*/
AzureIoTClient 46:6a69294b6119 997 if (handleData->credentials.x509credentials.x509privatekey != NULL) /*free any previous values, if any*/
AzureIoTClient 46:6a69294b6119 998 {
AzureIoTClient 46:6a69294b6119 999 free((void*)handleData->credentials.x509credentials.x509privatekey);
AzureIoTClient 46:6a69294b6119 1000 }
AzureIoTClient 46:6a69294b6119 1001 handleData->credentials.x509credentials.x509privatekey = temp;
AzureIoTClient 46:6a69294b6119 1002 result = IOTHUB_CLIENT_OK;
AzureIoTClient 46:6a69294b6119 1003 }
AzureIoTClient 46:6a69294b6119 1004 }
AzureIoTClient 46:6a69294b6119 1005 }
AzureIoTClient 62:5a4cdacf5090 1006 else if (strcmp("TrustedCerts", optionName) == 0)
AzureIoTClient 62:5a4cdacf5090 1007 {
AzureIoTClient 62:5a4cdacf5090 1008 if (value == NULL)
AzureIoTClient 62:5a4cdacf5090 1009 {
AzureIoTClient 62:5a4cdacf5090 1010 LogError("NULL is a not a valid value for TrustedCerts");
AzureIoTClient 62:5a4cdacf5090 1011 result = IOTHUB_CLIENT_INVALID_ARG;
AzureIoTClient 62:5a4cdacf5090 1012 }
AzureIoTClient 62:5a4cdacf5090 1013 else
AzureIoTClient 62:5a4cdacf5090 1014 {
AzureIoTClient 62:5a4cdacf5090 1015 char* tempCopy;
AzureIoTClient 62:5a4cdacf5090 1016 if (mallocAndStrcpy_s(&tempCopy, value) != 0)
AzureIoTClient 62:5a4cdacf5090 1017 {
AzureIoTClient 62:5a4cdacf5090 1018 LogError("failure in mallocAndStrcpy_s");
AzureIoTClient 62:5a4cdacf5090 1019 result = IOTHUB_CLIENT_ERROR;
AzureIoTClient 62:5a4cdacf5090 1020 }
AzureIoTClient 62:5a4cdacf5090 1021 else
AzureIoTClient 62:5a4cdacf5090 1022 {
AzureIoTClient 62:5a4cdacf5090 1023 if (handleData->certificates != NULL)
AzureIoTClient 62:5a4cdacf5090 1024 {
AzureIoTClient 62:5a4cdacf5090 1025 free(handleData->certificates);
AzureIoTClient 62:5a4cdacf5090 1026 }
AzureIoTClient 62:5a4cdacf5090 1027 handleData->certificates = tempCopy;
AzureIoTClient 62:5a4cdacf5090 1028 result = IOTHUB_CLIENT_OK;
AzureIoTClient 62:5a4cdacf5090 1029 }
AzureIoTClient 62:5a4cdacf5090 1030 }
AzureIoTClient 62:5a4cdacf5090 1031 }
AzureIoTClient 46:6a69294b6119 1032 else
AzureIoTClient 46:6a69294b6119 1033 {
AzureIoTClient 46:6a69294b6119 1034 /*Codes_SRS_IOTHUBCLIENT_LL_02_102: [ If an unknown option is presented then IoTHubClient_LL_UploadToBlob_SetOption shall return IOTHUB_CLIENT_INVALID_ARG. ]*/
AzureIoTClient 46:6a69294b6119 1035 result = IOTHUB_CLIENT_INVALID_ARG;
AzureIoTClient 46:6a69294b6119 1036 }
AzureIoTClient 46:6a69294b6119 1037 }
AzureIoTClient 46:6a69294b6119 1038 return result;
AzureIoTClient 46:6a69294b6119 1039 }
AzureIoTClient 46:6a69294b6119 1040
AzureIoTClient 46:6a69294b6119 1041
Azure.IoT Build 45:54c11b1b1407 1042 #endif /*DONT_USE_UPLOADTOBLOB*/
AzureIoTClient 46:6a69294b6119 1043
AzureIoTClient 46:6a69294b6119 1044