Toyomasa Watarai
/
Wio_3G_HTTP-GET-Firebase-example
Wio 3G with Firebase example
Fork of Wio_3G_HTTP-GET-example by
Revision 79:7cade4176d12, committed 2018-08-26
- Comitter:
- MACRUM
- Date:
- Sun Aug 26 01:51:34 2018 +0000
- Parent:
- 78:7f66af24c678
- Commit message:
- Enabled Firebase config
Changed in this revision
diff -r 7f66af24c678 -r 7cade4176d12 main.cpp --- a/main.cpp Thu Aug 23 10:12:47 2018 +0000 +++ b/main.cpp Sun Aug 26 01:51:34 2018 +0000 @@ -1,123 +1,73 @@ #include "mbed.h" -#include <sstream> #include "easy-connect.h" #include "https_request.h" -#include "ssl_ca_pem.h" -// For your API Token, refer to "API token" in your application setting page -const char API_TOKEN[] = "api-token"; -// Your domain name can be seen in the usage explanation with curl. -const char URL[] = "https://{domain}.cybozu.com/k/v1/record.json"; - -// app_id, application id, can be checked with your application's URL -// e.g. https://{domain}.cybozu.com/k/2/ -> app_id is 2 -int app_id = 1; - -#if defined(__CC_ARM) -// To avoid "invalid multibyte character sequence" warning -#pragma diag_suppress 870 -#endif +Serial pc(USBTX, USBRX); -#if !defined(TARGET_WIO_3G) -#error Selected target is not supported. -#endif - -// on-board resources -Serial pc(USBTX, USBRX, 115200); -DigitalOut GrovePower(PB_10, 1); - -#define D20 (PB_4) +/* List of trusted root CA certificates + * This is the root CA for Google from GeoTrustGlobalCA + * + * To add more root certificates, just concatenate them. + */ +const char SSL_CA_PEM[] = "-----BEGIN CERTIFICATE-----\n" +"MIIDujCCAqKgAwIBAgILBAAAAAABD4Ym5g0wDQYJKoZIhvcNAQEFBQAwTDEgMB4G\n" +"A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNp\n" +"Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDYxMjE1MDgwMDAwWhcNMjExMjE1\n" +"MDgwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMjETMBEG\n" +"A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI\n" +"hvcNAQEBBQADggEPADCCAQoCggEBAKbPJA6+Lm8omUVCxKs+IVSbC9N/hHD6ErPL\n" +"v4dfxn+G07IwXNb9rfF73OX4YJYJkhD10FPe+3t+c4isUoh7SqbKSaZeqKeMWhG8\n" +"eoLrvozps6yWJQeXSpkqBy+0Hne/ig+1AnwblrjFuTosvNYSuetZfeLQBoZfXklq\n" +"tTleiDTsvHgMCJiEbKjNS7SgfQx5TfC4LcshytVsW33hoCmEofnTlEnLJGKRILzd\n" +"C9XZzPnqJworc5HGnRusyMvo4KD0L5CLTfuwNhv2GXqF4G3yYROIXJ/gkwpRl4pa\n" +"zq+r1feqCapgvdzZX99yqWATXgAByUr6P6TqBwMhAo6CygPCm48CAwEAAaOBnDCB\n" +"mTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUm+IH\n" +"V2ccHsBqBt5ZtJot39wZhi4wNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5n\n" +"bG9iYWxzaWduLm5ldC9yb290LXIyLmNybDAfBgNVHSMEGDAWgBSb4gdXZxwewGoG\n" +"3lm0mi3f3BmGLjANBgkqhkiG9w0BAQUFAAOCAQEAmYFThxxol4aR7OBKuEQLq4Gs\n" +"J0/WwbgcQ3izDJr86iw8bmEbTUsp9Z8FHSbBuOmDAGJFtqkIk7mpM0sYmsL4h4hO\n" +"291xNBrBVNpGP+DTKqttVCL1OmLNIG+6KYnX3ZHu01yiPqFbQfXf5WRDLenVOavS\n" +"ot+3i9DAgBkcRcAtjOj4LaR0VknFBbVPFd5uRHg5h6h+u/N5GJG79G+dwfCMNYxd\n" +"AfvDbbnvRG15RjF+Cv6pgsH/76tuIMRQyV+dTZsXjAzlAcmgQWpzU/qlULRuJQ/7\n" +"TBj0/VLZjmmx6BEP3ojY+x1J96relc8geMJgEtslQIxq/H5COEBkEveegeGTLg==\n" +"-----END CERTIFICATE-----"; -// Grove sensors - -// buzzer -DigitalOut buzzer(D38); +void dump_response(HttpResponse* res) { + mbedtls_printf("Status: %d - %s\n", res->get_status_code(), res->get_status_message().c_str()); -// button or touch sensor -InterruptIn btn(D20); -int id = 0; - -void push() -{ - id++; + mbedtls_printf("Headers:\n"); + for (size_t ix = 0; ix < res->get_headers_length(); ix++) { + mbedtls_printf("\t%s: %s\n", res->get_headers_fields()[ix]->c_str(), res->get_headers_values()[ix]->c_str()); + } + mbedtls_printf("\nBody (%d bytes):\n\n%s\n", res->get_body_length(), res->get_body_as_string().c_str()); } -// JSON simplicity parser -char* j_paser( const char *buf , char *word , char *out ) -{ - int i = 0; - char *p; - char _word[64] = "\"\0"; - - strcat(_word , word ); - strcat(_word , "\"" ); - - p = strstr( (char*)buf , _word ) + 2 + strlen(_word); +int main() { + pc.baud(115200); - while( (p[i] != ',')&&(p[i] != '\n')&&(p[i] != '"') ) { - out[i] = p[i]; - i++; - } - out[i] = '\0'; - - return p; -} - -// main method. retrieve data from kintone by HTTP GET -int main() -{ - btn.mode(PullUp); - btn.fall(push); // set interrupt handler - - NetworkInterface* network = NULL; - network = easy_connect(true); // If true, prints out connection details. + NetworkInterface* network = easy_connect(true); if (!network) { - pc.printf("\n----- Network Error -----\n"); - return -1; + return 1; } - pc.printf("\n----- Network Connected -----\n"); - wait(2.0); - - while(1) { - // Set url - std::stringstream ss_url; - std::string s_url(URL); + // GET request to firebase.google.com + { + printf("\n----- HTTPS GET request -----\n"); - ss_url << s_url << "?app=" << app_id << "&id=" << id; - string url = ss_url.str(); - pc.printf("%s\n", url.c_str()); - - pc.printf("\n----- HTTPS GET request -----\n"); - HttpsRequest* get_req = new HttpsRequest(network, SSL_CA_PEM, HTTP_GET, url.c_str()); - get_req->set_header("X-Cybozu-API-Token", API_TOKEN); - HttpResponse* get_res = get_req->send(); - - pc.printf("\n----- HTTPS GET response [%d]-----\n", get_res->get_status_code()); + HttpsRequest* get_req = new HttpsRequest(network, SSL_CA_PEM, HTTP_GET, "https://firebase.google.com/styles/docs.css"); + get_req->set_debug(true); - if(get_res->get_status_code() == 200) { - pc.printf("\n----- HTTPS GET response 200 -----\n"); - const char* body = get_res->get_body_as_string().c_str(); - - pc.printf("%s\n", body); - - // Response JSON parse - char value[256]; - - char* p = j_paser(body, "日付", value); - j_paser(p,"value", value); - pc.printf("date:%s\n", value); - - p = j_paser(body, "文字列__1行_", value); - j_paser(p,"value", value); - pc.printf("%s\n", value); - - buzzer = 1; - wait(0.1); - buzzer = 0; + HttpResponse* get_res = get_req->send(); + if (!get_res) { + printf("HttpRequest failed (error code %d)\n", get_req->get_error()); + return 1; } + printf("\n----- HTTPS GET response -----\n"); + dump_response(get_res); delete get_req; - wait(10.0); } + + Thread::wait(osWaitForever); } +
diff -r 7f66af24c678 -r 7cade4176d12 mbed_app.json --- a/mbed_app.json Thu Aug 23 10:12:47 2018 +0000 +++ b/mbed_app.json Sun Aug 26 01:51:34 2018 +0000 @@ -1,5 +1,6 @@ { "macros": [ + "MBEDTLS_USER_CONFIG_FILE=\"mbedtls_entropy_config.h\"" ], "config": { "sock-type": "TCP",
diff -r 7f66af24c678 -r 7cade4176d12 mbedtls_entropy_config.h --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/mbedtls_entropy_config.h Sun Aug 26 01:51:34 2018 +0000 @@ -0,0 +1,38 @@ +/* + * Copyright (C) 2006-2018, Arm Limited, All Rights Reserved + * SPDX-License-Identifier: Apache-2.0 + * + * Licensed under the Apache License, Version 2.0 (the "License"); you may + * not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + * This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#if !defined(MBEDTLS_ENTROPY_HARDWARE_ALT) && \ + !defined(MBEDTLS_ENTROPY_NV_SEED) && !defined(MBEDTLS_TEST_NULL_ENTROPY) +#error "This hardware does not have an entropy source." +#endif /* !MBEDTLS_ENTROPY_HARDWARE_ALT && !MBEDTLS_ENTROPY_NV_SEED && + * !MBEDTLS_TEST_NULL_ENTROPY */ + +#if !defined(MBEDTLS_SHA1_C) +#define MBEDTLS_SHA1_C +#endif /* !MBEDTLS_SHA1_C */ + +/* + * This value is sufficient for handling 2048 bit RSA keys. + * + * Set this value higher to enable handling larger keys, but be aware that this + * will increase the stack usage. + */ +#define MBEDTLS_MPI_MAX_SIZE 256 + +#define MBEDTLS_MPI_WINDOW_SIZE 1
diff -r 7f66af24c678 -r 7cade4176d12 ssl_ca_pem.h --- a/ssl_ca_pem.h Thu Aug 23 10:12:47 2018 +0000 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,29 +0,0 @@ -const char SSL_CA_PEM[] = "-----BEGIN CERTIFICATE-----\n" -"MIIFADCCA+igAwIBAgIBBzANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMx\n" -"EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT\n" -"HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVs\n" -"ZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTExMDUwMzA3MDAw\n" -"MFoXDTMxMDUwMzA3MDAwMFowgcYxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6\n" -"b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQgVGVj\n" -"aG5vbG9naWVzLCBJbmMuMTMwMQYDVQQLEypodHRwOi8vY2VydHMuc3RhcmZpZWxk\n" -"dGVjaC5jb20vcmVwb3NpdG9yeS8xNDAyBgNVBAMTK1N0YXJmaWVsZCBTZWN1cmUg\n" -"Q2VydGlmaWNhdGUgQXV0aG9yaXR5IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IB\n" -"DwAwggEKAoIBAQDlkGZL7PlGcakgg77pbL9KyUhpgXVObST2yxcT+LBxWYR6ayuF\n" -"pDS1FuXLzOlBcCykLtb6Mn3hqN6UEKwxwcDYav9ZJ6t21vwLdGu4p64/xFT0tDFE\n" -"3ZNWjKRMXpuJyySDm+JXfbfYEh/JhW300YDxUJuHrtQLEAX7J7oobRfpDtZNuTlV\n" -"Bv8KJAV+L8YdcmzUiymMV33a2etmGtNPp99/UsQwxaXJDgLFU793OGgGJMNmyDd+\n" -"MB5FcSM1/5DYKp2N57CSTTx/KgqT3M0WRmX3YISLdkuRJ3MUkuDq7o8W6o0OPnYX\n" -"v32JgIBEQ+ct4EMJddo26K3biTr1XRKOIwSDAgMBAAGjggEsMIIBKDAPBgNVHRMB\n" -"Af8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUJUWBaFAmOD07LSy+\n" -"zWrZtj2zZmMwHwYDVR0jBBgwFoAUfAwyH6fZMH/EfWijYqihzqsHWycwOgYIKwYB\n" -"BQUHAQEELjAsMCoGCCsGAQUFBzABhh5odHRwOi8vb2NzcC5zdGFyZmllbGR0ZWNo\n" -"LmNvbS8wOwYDVR0fBDQwMjAwoC6gLIYqaHR0cDovL2NybC5zdGFyZmllbGR0ZWNo\n" -"LmNvbS9zZnJvb3QtZzIuY3JsMEwGA1UdIARFMEMwQQYEVR0gADA5MDcGCCsGAQUF\n" -"BwIBFitodHRwczovL2NlcnRzLnN0YXJmaWVsZHRlY2guY29tL3JlcG9zaXRvcnkv\n" -"MA0GCSqGSIb3DQEBCwUAA4IBAQBWZcr+8z8KqJOLGMfeQ2kTNCC+Tl94qGuc22pN\n" -"QdvBE+zcMQAiXvcAngzgNGU0+bE6TkjIEoGIXFs+CFN69xpk37hQYcxTUUApS8L0\n" -"rjpf5MqtJsxOYUPl/VemN3DOQyuwlMOS6eFfqhBJt2nk4NAfZKQrzR9voPiEJBjO\n" -"eT2pkb9UGBOJmVQRDVXFJgt5T1ocbvlj2xSApAer+rKluYjdkf5lO6Sjeb6JTeHQ\n" -"sPTIFwwKlhR8Cbds4cLYVdQYoKpBaXAko7nv6VrcPuuUSvC33l8Odvr7+2kDRUBQ\n" -"7nIMpBKGgc0T0U7EPMpODdIm8QC3tKai4W56gf0wrHofx1l7\n" -"-----END CERTIFICATE-----\n"; \ No newline at end of file