simple http request (temperature data) from mbed lpc1768 with application board to thingsboard device/dashboard
Fork of http-example by
source/main-https-socket-reuse.cpp@31:cba9d9dea21a, 2018-06-29 (annotated)
- Committer:
- daklowprofile
- Date:
- Fri Jun 29 03:19:58 2018 +0000
- Revision:
- 31:cba9d9dea21a
don't change anything
Who changed what in which revision?
| User | Revision | Line number | New contents of line |
|---|---|---|---|
| daklowprofile | 31:cba9d9dea21a | 1 | #include "select-demo.h" |
| daklowprofile | 31:cba9d9dea21a | 2 | |
| daklowprofile | 31:cba9d9dea21a | 3 | /** |
| daklowprofile | 31:cba9d9dea21a | 4 | * This demo shows how to re-use sockets, so the TLS handshake only has to happen once |
| daklowprofile | 31:cba9d9dea21a | 5 | */ |
| daklowprofile | 31:cba9d9dea21a | 6 | |
| daklowprofile | 31:cba9d9dea21a | 7 | #if DEMO == DEMO_HTTPS_SOCKET_REUSE |
| daklowprofile | 31:cba9d9dea21a | 8 | |
| daklowprofile | 31:cba9d9dea21a | 9 | #include "mbed.h" |
| daklowprofile | 31:cba9d9dea21a | 10 | #include "easy-connect.h" |
| daklowprofile | 31:cba9d9dea21a | 11 | #include "https_request.h" |
| daklowprofile | 31:cba9d9dea21a | 12 | |
| daklowprofile | 31:cba9d9dea21a | 13 | /* List of trusted root CA certificates |
| daklowprofile | 31:cba9d9dea21a | 14 | * currently one: Let's Encrypt, the CA for httpbin.org |
| daklowprofile | 31:cba9d9dea21a | 15 | * |
| daklowprofile | 31:cba9d9dea21a | 16 | * To add more root certificates, just concatenate them. |
| daklowprofile | 31:cba9d9dea21a | 17 | */ |
| daklowprofile | 31:cba9d9dea21a | 18 | const char SSL_CA_PEM[] = "-----BEGIN CERTIFICATE-----\n" |
| daklowprofile | 31:cba9d9dea21a | 19 | "MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/\n" |
| daklowprofile | 31:cba9d9dea21a | 20 | "MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT\n" |
| daklowprofile | 31:cba9d9dea21a | 21 | "DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow\n" |
| daklowprofile | 31:cba9d9dea21a | 22 | "SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT\n" |
| daklowprofile | 31:cba9d9dea21a | 23 | "GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC\n" |
| daklowprofile | 31:cba9d9dea21a | 24 | "AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF\n" |
| daklowprofile | 31:cba9d9dea21a | 25 | "q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8\n" |
| daklowprofile | 31:cba9d9dea21a | 26 | "SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0\n" |
| daklowprofile | 31:cba9d9dea21a | 27 | "Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA\n" |
| daklowprofile | 31:cba9d9dea21a | 28 | "a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj\n" |
| daklowprofile | 31:cba9d9dea21a | 29 | "/PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T\n" |
| daklowprofile | 31:cba9d9dea21a | 30 | "AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG\n" |
| daklowprofile | 31:cba9d9dea21a | 31 | "CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv\n" |
| daklowprofile | 31:cba9d9dea21a | 32 | "bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k\n" |
| daklowprofile | 31:cba9d9dea21a | 33 | "c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw\n" |
| daklowprofile | 31:cba9d9dea21a | 34 | "VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC\n" |
| daklowprofile | 31:cba9d9dea21a | 35 | "ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz\n" |
| daklowprofile | 31:cba9d9dea21a | 36 | "MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu\n" |
| daklowprofile | 31:cba9d9dea21a | 37 | "Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF\n" |
| daklowprofile | 31:cba9d9dea21a | 38 | "AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo\n" |
| daklowprofile | 31:cba9d9dea21a | 39 | "uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/\n" |
| daklowprofile | 31:cba9d9dea21a | 40 | "wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu\n" |
| daklowprofile | 31:cba9d9dea21a | 41 | "X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG\n" |
| daklowprofile | 31:cba9d9dea21a | 42 | "PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6\n" |
| daklowprofile | 31:cba9d9dea21a | 43 | "KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==\n" |
| daklowprofile | 31:cba9d9dea21a | 44 | "-----END CERTIFICATE-----\n"; |
| daklowprofile | 31:cba9d9dea21a | 45 | |
| daklowprofile | 31:cba9d9dea21a | 46 | void dump_response(HttpResponse* res) { |
| daklowprofile | 31:cba9d9dea21a | 47 | mbedtls_printf("Status: %d - %s\n", res->get_status_code(), res->get_status_message().c_str()); |
| daklowprofile | 31:cba9d9dea21a | 48 | |
| daklowprofile | 31:cba9d9dea21a | 49 | mbedtls_printf("Headers:\n"); |
| daklowprofile | 31:cba9d9dea21a | 50 | for (size_t ix = 0; ix < res->get_headers_length(); ix++) { |
| daklowprofile | 31:cba9d9dea21a | 51 | mbedtls_printf("\t%s: %s\n", res->get_headers_fields()[ix]->c_str(), res->get_headers_values()[ix]->c_str()); |
| daklowprofile | 31:cba9d9dea21a | 52 | } |
| daklowprofile | 31:cba9d9dea21a | 53 | mbedtls_printf("\nBody (%d bytes):\n\n%s\n", res->get_body_length(), res->get_body_as_string().c_str()); |
| daklowprofile | 31:cba9d9dea21a | 54 | } |
| daklowprofile | 31:cba9d9dea21a | 55 | |
| daklowprofile | 31:cba9d9dea21a | 56 | int main() { |
| daklowprofile | 31:cba9d9dea21a | 57 | NetworkInterface* network = easy_connect(true); |
| daklowprofile | 31:cba9d9dea21a | 58 | if (!network) { |
| daklowprofile | 31:cba9d9dea21a | 59 | return 1; |
| daklowprofile | 31:cba9d9dea21a | 60 | } |
| daklowprofile | 31:cba9d9dea21a | 61 | |
| daklowprofile | 31:cba9d9dea21a | 62 | // Create a TLS socket (which holds a TCPSocket) |
| daklowprofile | 31:cba9d9dea21a | 63 | printf("\n----- Setting up TLS connection -----\n"); |
| daklowprofile | 31:cba9d9dea21a | 64 | |
| daklowprofile | 31:cba9d9dea21a | 65 | TLSSocket* socket = new TLSSocket(network, "httpbin.org", 443, SSL_CA_PEM); |
| daklowprofile | 31:cba9d9dea21a | 66 | socket->set_debug(true); |
| daklowprofile | 31:cba9d9dea21a | 67 | if (socket->connect() != 0) { |
| daklowprofile | 31:cba9d9dea21a | 68 | printf("TLS Connect failed %d\n", socket->error()); |
| daklowprofile | 31:cba9d9dea21a | 69 | return 1; |
| daklowprofile | 31:cba9d9dea21a | 70 | } |
| daklowprofile | 31:cba9d9dea21a | 71 | |
| daklowprofile | 31:cba9d9dea21a | 72 | // GET request to httpbin.org |
| daklowprofile | 31:cba9d9dea21a | 73 | { |
| daklowprofile | 31:cba9d9dea21a | 74 | HttpsRequest* get_req = new HttpsRequest(socket, HTTP_GET, "https://httpbin.org/status/418"); |
| daklowprofile | 31:cba9d9dea21a | 75 | get_req->set_debug(true); |
| daklowprofile | 31:cba9d9dea21a | 76 | |
| daklowprofile | 31:cba9d9dea21a | 77 | HttpResponse* get_res = get_req->send(); |
| daklowprofile | 31:cba9d9dea21a | 78 | if (!get_res) { |
| daklowprofile | 31:cba9d9dea21a | 79 | printf("HttpRequest failed (error code %d)\n", get_req->get_error()); |
| daklowprofile | 31:cba9d9dea21a | 80 | return 1; |
| daklowprofile | 31:cba9d9dea21a | 81 | } |
| daklowprofile | 31:cba9d9dea21a | 82 | printf("\n----- HTTPS GET response -----\n"); |
| daklowprofile | 31:cba9d9dea21a | 83 | dump_response(get_res); |
| daklowprofile | 31:cba9d9dea21a | 84 | |
| daklowprofile | 31:cba9d9dea21a | 85 | delete get_req; |
| daklowprofile | 31:cba9d9dea21a | 86 | } |
| daklowprofile | 31:cba9d9dea21a | 87 | |
| daklowprofile | 31:cba9d9dea21a | 88 | // POST request to httpbin.org |
| daklowprofile | 31:cba9d9dea21a | 89 | { |
| daklowprofile | 31:cba9d9dea21a | 90 | HttpsRequest* post_req = new HttpsRequest(socket, HTTP_POST, "https://httpbin.org/post"); |
| daklowprofile | 31:cba9d9dea21a | 91 | post_req->set_debug(true); |
| daklowprofile | 31:cba9d9dea21a | 92 | post_req->set_header("Content-Type", "application/json"); |
| daklowprofile | 31:cba9d9dea21a | 93 | |
| daklowprofile | 31:cba9d9dea21a | 94 | const char body[] = "{\"hello\":\"world\"}"; |
| daklowprofile | 31:cba9d9dea21a | 95 | |
| daklowprofile | 31:cba9d9dea21a | 96 | HttpResponse* post_res = post_req->send(body, strlen(body)); |
| daklowprofile | 31:cba9d9dea21a | 97 | if (!post_res) { |
| daklowprofile | 31:cba9d9dea21a | 98 | printf("HttpRequest failed (error code %d)\n", post_req->get_error()); |
| daklowprofile | 31:cba9d9dea21a | 99 | return 1; |
| daklowprofile | 31:cba9d9dea21a | 100 | } |
| daklowprofile | 31:cba9d9dea21a | 101 | |
| daklowprofile | 31:cba9d9dea21a | 102 | printf("\n----- HTTPS POST response -----\n"); |
| daklowprofile | 31:cba9d9dea21a | 103 | dump_response(post_res); |
| daklowprofile | 31:cba9d9dea21a | 104 | |
| daklowprofile | 31:cba9d9dea21a | 105 | delete post_req; |
| daklowprofile | 31:cba9d9dea21a | 106 | } |
| daklowprofile | 31:cba9d9dea21a | 107 | |
| daklowprofile | 31:cba9d9dea21a | 108 | delete socket; |
| daklowprofile | 31:cba9d9dea21a | 109 | |
| daklowprofile | 31:cba9d9dea21a | 110 | wait(osWaitForever); |
| daklowprofile | 31:cba9d9dea21a | 111 | } |
| daklowprofile | 31:cba9d9dea21a | 112 | |
| daklowprofile | 31:cba9d9dea21a | 113 | #endif |
