Microsoft Azure IoTHub client libraries
Dependents: sht15_remote_monitoring RobotArmDemo iothub_client_sample_amqp f767zi_mqtt ... more
This library implements the Microsoft Azure IoTHub client library. The code is replicated from https://github.com/Azure/azure-iot-sdks
Diff: blob.c
- Revision:
- 43:038d8511e817
- Parent:
- 42:448eecc3676e
- Child:
- 45:54c11b1b1407
--- a/blob.c Tue Jun 07 10:49:08 2016 -0700 +++ b/blob.c Fri Jun 17 17:02:44 2016 -0700 @@ -11,6 +11,10 @@ #include "azure_c_shared_utility/httpapiex.h" #include "azure_c_shared_utility/iot_logging.h" +#include "azure_c_shared_utility/base64.h" + +/*a block has 4MB*/ +#define BLOCK_SIZE (4*1024*1024) BLOB_RESULT Blob_UploadFromSasUri(const char* SASURI, const unsigned char* source, size_t size, unsigned int* httpStatus, BUFFER_HANDLE httpResponse) { @@ -27,19 +31,20 @@ if ( (size > 0) && (source == NULL) - ) + ) { - LogError("combination of source = %p and size = %zd is invalid", source, size); + LogError("combination of source = %p and size = %zu is invalid", source, size); result = BLOB_INVALID_ARG; } - /*Codes_SRS_BLOB_02_003: [ If size is bigger or equal to 64M then Blob_UploadFromSasUri shall fail and return BLOB_NOT_IMPLEMENTED. ]*/ - else if (size >= 64 * 1024 * 1024) + /*Codes_SRS_BLOB_02_034: [ If size is bigger than 50000*4*1024*1024 then Blob_UploadFromSasUri shall fail and return BLOB_INVALID_ARG. ]*/ + else if (size > 50000ULL * 4 * 1024 * 1024) /*https://msdn.microsoft.com/en-us/library/azure/dd179467.aspx says "Each block can be a different size, up to a maximum of 4 MB, and a block blob can include a maximum of 50,000 blocks."*/ { - LogError("upload of files greater than 64M is not implemented"); - result = BLOB_NOT_IMPLEMENTED; + LogError("size too big (%zu)", size); + result = BLOB_INVALID_ARG; } else { + /*Codes_SRS_BLOB_02_017: [ Blob_UploadFromSasUri shall copy from SASURI the hostname to a new const char* ]*/ /*Codes_SRS_BLOB_02_004: [ Blob_UploadFromSasUri shall copy from SASURI the hostname to a new const char*. ]*/ /*to find the hostname, the following logic is applied:*/ /*the hostname starts at the first character after "://"*/ @@ -78,6 +83,7 @@ hostname[hostnameSize] = '\0'; /*Codes_SRS_BLOB_02_006: [ Blob_UploadFromSasUri shall create a new HTTPAPI_EX_HANDLE by calling HTTPAPIEX_Create passing the hostname. ]*/ + /*Codes_SRS_BLOB_02_018: [ Blob_UploadFromSasUri shall create a new HTTPAPI_EX_HANDLE by calling HTTPAPIEX_Create passing the hostname. ]*/ httpApiExHandle = HTTPAPIEX_Create(hostname); if (httpApiExHandle == NULL) { @@ -88,52 +94,261 @@ else { /*Codes_SRS_BLOB_02_008: [ Blob_UploadFromSasUri shall compute the relative path of the request from the SASURI parameter. ]*/ + /*Codes_SRS_BLOB_02_019: [ Blob_UploadFromSasUri shall compute the base relative path of the request from the SASURI parameter. ]*/ const char* relativePath = hostnameEnd; /*this is where the relative path begins in the SasUri*/ - /*Codes_SRS_BLOB_02_010: [ Blob_UploadFromSasUri shall create a BUFFER_HANDLE from source and size parameters. ]*/ - BUFFER_HANDLE requestBuffer = BUFFER_create(source, size); - if (requestBuffer == NULL) + if (size < 64 * 1024 * 1024) /*code path for sizes <64MB*/ { - /*Codes_SRS_BLOB_02_011: [ If any of the previous steps related to building the HTTPAPI_EX_ExecuteRequest parameters fails, then Blob_UploadFromSasUri shall fail and return BLOB_ERROR. ]*/ - LogError("unable to BUFFER_create"); - result = BLOB_ERROR; - } - else - { - /*Codes_SRS_BLOB_02_009: [ Blob_UploadFromSasUri shall create an HTTP_HEADERS_HANDLE for the request HTTP headers carrying the following headers: ]*/ - HTTP_HEADERS_HANDLE requestHttpHeaders = HTTPHeaders_Alloc(); - if (requestHttpHeaders == NULL) + /*Codes_SRS_BLOB_02_010: [ Blob_UploadFromSasUri shall create a BUFFER_HANDLE from source and size parameters. ]*/ + BUFFER_HANDLE requestBuffer = BUFFER_create(source, size); + if (requestBuffer == NULL) { /*Codes_SRS_BLOB_02_011: [ If any of the previous steps related to building the HTTPAPI_EX_ExecuteRequest parameters fails, then Blob_UploadFromSasUri shall fail and return BLOB_ERROR. ]*/ - LogError("unable to HTTPHeaders_Alloc"); + LogError("unable to BUFFER_create"); result = BLOB_ERROR; } else { - if (HTTPHeaders_AddHeaderNameValuePair(requestHttpHeaders, "x-ms-blob-type", "BlockBlob") != HTTP_HEADERS_OK) + /*Codes_SRS_BLOB_02_009: [ Blob_UploadFromSasUri shall create an HTTP_HEADERS_HANDLE for the request HTTP headers carrying the following headers: ]*/ + HTTP_HEADERS_HANDLE requestHttpHeaders = HTTPHeaders_Alloc(); + if (requestHttpHeaders == NULL) { /*Codes_SRS_BLOB_02_011: [ If any of the previous steps related to building the HTTPAPI_EX_ExecuteRequest parameters fails, then Blob_UploadFromSasUri shall fail and return BLOB_ERROR. ]*/ - LogError("unable to HTTPHeaders_AddHeaderNameValuePair"); + LogError("unable to HTTPHeaders_Alloc"); result = BLOB_ERROR; } else { - /*Codes_SRS_BLOB_02_012: [ Blob_UploadFromSasUri shall call HTTPAPIEX_ExecuteRequest passing the parameters previously build, httpStatus and httpResponse ]*/ - if (HTTPAPIEX_ExecuteRequest(httpApiExHandle, HTTPAPI_REQUEST_PUT, relativePath, requestHttpHeaders, requestBuffer, httpStatus, NULL, httpResponse) != HTTPAPIEX_OK) + if (HTTPHeaders_AddHeaderNameValuePair(requestHttpHeaders, "x-ms-blob-type", "BlockBlob") != HTTP_HEADERS_OK) + { + /*Codes_SRS_BLOB_02_011: [ If any of the previous steps related to building the HTTPAPI_EX_ExecuteRequest parameters fails, then Blob_UploadFromSasUri shall fail and return BLOB_ERROR. ]*/ + LogError("unable to HTTPHeaders_AddHeaderNameValuePair"); + result = BLOB_ERROR; + } + else { - /*Codes_SRS_BLOB_02_013: [ If HTTPAPIEX_ExecuteRequest fails, then Blob_UploadFromSasUri shall fail and return BLOB_HTTP_ERROR. ]*/ - LogError("failed to HTTPAPIEX_ExecuteRequest"); - result = BLOB_HTTP_ERROR; + /*Codes_SRS_BLOB_02_012: [ Blob_UploadFromSasUri shall call HTTPAPIEX_ExecuteRequest passing the parameters previously build, httpStatus and httpResponse ]*/ + if (HTTPAPIEX_ExecuteRequest(httpApiExHandle, HTTPAPI_REQUEST_PUT, relativePath, requestHttpHeaders, requestBuffer, httpStatus, NULL, httpResponse) != HTTPAPIEX_OK) + { + /*Codes_SRS_BLOB_02_013: [ If HTTPAPIEX_ExecuteRequest fails, then Blob_UploadFromSasUri shall fail and return BLOB_HTTP_ERROR. ]*/ + LogError("failed to HTTPAPIEX_ExecuteRequest"); + result = BLOB_HTTP_ERROR; + } + else + { + /*Codes_SRS_BLOB_02_015: [ Otherwise, HTTPAPIEX_ExecuteRequest shall succeed and return BLOB_OK. ]*/ + result = BLOB_OK; + } + } + HTTPHeaders_Free(requestHttpHeaders); + } + BUFFER_delete(requestBuffer); + } + } + else /*code path for size >= 64MB*/ + { + size_t toUpload = size; + /*Codes_SRS_BLOB_02_028: [ Blob_UploadFromSasUri shall construct an XML string with the following content: ]*/ + STRING_HANDLE xml = STRING_construct("<?xml version=\"1.0\" encoding=\"utf-8\"?>\r\n<BlockList>"); /*the XML "build as we go"*/ + if (xml == NULL) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("failed to STRING_construct"); + result = BLOB_HTTP_ERROR; + } + else + { + /*Codes_SRS_BLOB_02_021: [ For every block of 4MB the following operations shall happen: ]*/ + unsigned int blockID = 0; + int isError = 0; /*used to cleanly exit the loop*/ + do + { + /*setting this block size*/ + size_t thisBlockSize = (toUpload > BLOCK_SIZE) ? BLOCK_SIZE : toUpload; + /*Codes_SRS_BLOB_02_020: [ Blob_UploadFromSasUri shall construct a BASE64 encoded string from the block ID (000000... 0499999) ]*/ + char temp[7]; /*this will contain 000000... 049999*/ + if (sprintf(temp, "%6u", (unsigned int)blockID) != 6) /*produces 000000... 049999*/ + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("failed to sprintf"); + result = BLOB_ERROR; + isError = 1; } else { - /*Codes_SRS_BLOB_02_015: [ Otherwise, HTTPAPIEX_ExecuteRequest shall succeed and return BLOB_OK. ]*/ - result = BLOB_OK; + STRING_HANDLE blockIdString = Base64_Encode_Bytes(temp, 6); + if (blockIdString == NULL) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("unable to Base64_Encode_Bytes"); + result = BLOB_ERROR; + isError = 1; + } + else + { + /*add the blockId base64 encoded to the XML*/ + if (!( + (STRING_concat(xml, "<Latest>")==0) && + (STRING_concat_with_STRING(xml, blockIdString)==0) && + (STRING_concat(xml, "</Latest>") == 0) + )) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("unable to STRING_concat"); + result = BLOB_ERROR; + isError = 1; + } + else + { + /*Codes_SRS_BLOB_02_022: [ Blob_UploadFromSasUri shall construct a new relativePath from following string: base relativePath + "&comp=block&blockid=BASE64 encoded string of blockId" ]*/ + STRING_HANDLE newRelativePath = STRING_construct(relativePath); + if (newRelativePath == NULL) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("unable to STRING_construct"); + result = BLOB_ERROR; + isError = 1; + } + else + { + if (!( + (STRING_concat(newRelativePath, "&comp=block&blockid=") == 0) && + (STRING_concat_with_STRING(newRelativePath, blockIdString) == 0) + )) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("unable to STRING concatenate"); + result = BLOB_ERROR; + isError = 1; + } + else + { + /*Codes_SRS_BLOB_02_023: [ Blob_UploadFromSasUri shall create a BUFFER_HANDLE from source and size parameters. ]*/ + BUFFER_HANDLE requestContent = BUFFER_create(source + (size - toUpload), thisBlockSize); + if (requestContent == NULL) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("unable to BUFFER_create"); + result = BLOB_ERROR; + isError = 1; + } + else + { + /*Codes_SRS_BLOB_02_024: [ Blob_UploadFromSasUri shall call HTTPAPIEX_ExecuteRequest with a PUT operation, passing httpStatus and httpResponse. ]*/ + if (HTTPAPIEX_ExecuteRequest( + httpApiExHandle, + HTTPAPI_REQUEST_PUT, + STRING_c_str(newRelativePath), + NULL, + requestContent, + httpStatus, + NULL, + httpResponse) != HTTPAPIEX_OK + ) + { + /*Codes_SRS_BLOB_02_025: [ If HTTPAPIEX_ExecuteRequest fails then Blob_UploadFromSasUri shall fail and return BLOB_HTTP_ERROR. ]*/ + LogError("unable to HTTPAPIEX_ExecuteRequest"); + result = BLOB_HTTP_ERROR; + isError = 1; + } + else if (*httpStatus >= 300) + { + /*Codes_SRS_BLOB_02_026: [ Otherwise, if HTTP response code is >=300 then Blob_UploadFromSasUri shall succeed and return BLOB_OK. ]*/ + LogError("HTTP status from storage does not indicate success (%d)", (int)*httpStatus); + result = BLOB_OK; + isError = 1; + } + else + { + /*Codes_SRS_BLOB_02_027: [ Otherwise Blob_UploadFromSasUri shall continue execution. ]*/ + } + BUFFER_delete(requestContent); + } + } + STRING_delete(newRelativePath); + } + } + STRING_delete(blockIdString); + } + } + + blockID++; + toUpload -= thisBlockSize; + } while ((toUpload > 0) && !isError); + + if (isError) + { + /*do nothing, it will be reported "as is"*/ + } + else + { + /*complete the XML*/ + if (STRING_concat(xml, "</BlockList>") != 0) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("failed to STRING_concat"); + result = BLOB_ERROR; + } + else + { + /*Codes_SRS_BLOB_02_029: [Blob_UploadFromSasUri shall construct a new relativePath from following string : base relativePath + "&comp=blocklist"]*/ + STRING_HANDLE newRelativePath = STRING_construct(relativePath); + if (newRelativePath == NULL) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("failed to STRING_construct"); + result = BLOB_ERROR; + } + else + { + if (STRING_concat(newRelativePath, "&comp=blocklist") != 0) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("failed to STRING_concat"); + result = BLOB_ERROR; + } + else + { + /*Codes_SRS_BLOB_02_030: [ Blob_UploadFromSasUri shall call HTTPAPIEX_ExecuteRequest with a PUT operation, passing the new relativePath, httpStatus and httpResponse and the XML string as content. ]*/ + const unsigned char* s = (const unsigned char*)STRING_c_str(xml); + BUFFER_HANDLE xmlAsBuffer = BUFFER_create(s, strlen(s)); + if (xmlAsBuffer == NULL) + { + /*Codes_SRS_BLOB_02_033: [ If any previous operation that doesn't have an explicit failure description fails then Blob_UploadFromSasUri shall fail and return BLOB_ERROR ]*/ + LogError("failed to BUFFER_create"); + result = BLOB_ERROR; + } + else + { + if (HTTPAPIEX_ExecuteRequest( + httpApiExHandle, + HTTPAPI_REQUEST_PUT, + STRING_c_str(newRelativePath), + NULL, + xmlAsBuffer, + httpStatus, + NULL, + httpResponse + ) != HTTPAPIEX_OK) + { + /*Codes_SRS_BLOB_02_031: [ If HTTPAPIEX_ExecuteRequest fails then Blob_UploadFromSasUri shall fail and return BLOB_HTTP_ERROR. ]*/ + LogError("unable to HTTPAPIEX_ExecuteRequest"); + result = BLOB_HTTP_ERROR; + } + else + { + /*Codes_SRS_BLOB_02_032: [ Otherwise, Blob_UploadFromSasUri shall succeed and return BLOB_OK. ]*/ + result = BLOB_OK; + } + BUFFER_delete(xmlAsBuffer); + } + } + STRING_delete(newRelativePath); + } } } - HTTPHeaders_Free(requestHttpHeaders); + STRING_delete(xml); } - BUFFER_delete(requestBuffer); } HTTPAPIEX_Destroy(httpApiExHandle); }