kopia lustrzana https://github.com/martin-ger/esp_mqtt
526 wiersze
14 KiB
C
526 wiersze
14 KiB
C
/*
|
|
* ----------------------------------------------------------------------------
|
|
* "THE BEER-WARE LICENSE" (Revision 42):
|
|
* Martin d'Allens <martin.dallens@gmail.com> wrote this file. As long as you retain
|
|
* this notice you can do whatever you want with this stuff. If we meet some day,
|
|
* and you think this stuff is worth it, you can buy me a beer in return.
|
|
* ----------------------------------------------------------------------------
|
|
*/
|
|
|
|
// FIXME: sprintf->snprintf everywhere.
|
|
|
|
#include "osapi.h"
|
|
#include "user_interface.h"
|
|
#include "espconn.h"
|
|
#include "mem.h"
|
|
#include "limits.h"
|
|
#include "httpclient.h"
|
|
|
|
|
|
// Debug output.
|
|
#if 0
|
|
#define PRINTF(...) os_printf(__VA_ARGS__)
|
|
#else
|
|
#define PRINTF(...)
|
|
#endif
|
|
|
|
// Internal state.
|
|
typedef struct {
|
|
char * path;
|
|
int port;
|
|
char * post_data;
|
|
char * headers;
|
|
char * hostname;
|
|
char * buffer;
|
|
int buffer_size;
|
|
bool secure;
|
|
http_callback user_callback;
|
|
} request_args;
|
|
|
|
static char * ICACHE_FLASH_ATTR esp_strdup(const char * str)
|
|
{
|
|
if (str == NULL) {
|
|
return NULL;
|
|
}
|
|
char * new_str = (char *)os_malloc(os_strlen(str) + 1); // 1 for null character
|
|
if (new_str == NULL) {
|
|
os_printf("esp_strdup: malloc error");
|
|
return NULL;
|
|
}
|
|
os_strcpy(new_str, str);
|
|
return new_str;
|
|
}
|
|
|
|
static int ICACHE_FLASH_ATTR
|
|
esp_isupper(char c)
|
|
{
|
|
return (c >= 'A' && c <= 'Z');
|
|
}
|
|
|
|
static int ICACHE_FLASH_ATTR
|
|
esp_isalpha(char c)
|
|
{
|
|
return ((c >= 'A' && c <= 'Z') || (c >= 'a' && c <= 'z'));
|
|
}
|
|
|
|
|
|
static int ICACHE_FLASH_ATTR
|
|
esp_isspace(char c)
|
|
{
|
|
return (c == ' ' || c == '\t' || c == '\n' || c == '\12');
|
|
}
|
|
|
|
static int ICACHE_FLASH_ATTR
|
|
esp_isdigit(char c)
|
|
{
|
|
return (c >= '0' && c <= '9');
|
|
}
|
|
|
|
/*
|
|
* Convert a string to a long integer.
|
|
*
|
|
* Ignores `locale' stuff. Assumes that the upper and lower case
|
|
* alphabets and digits are each contiguous.
|
|
*/
|
|
static long ICACHE_FLASH_ATTR
|
|
esp_strtol(const char *nptr, char **endptr, int base)
|
|
{
|
|
const char *s = nptr;
|
|
unsigned long acc;
|
|
int c;
|
|
unsigned long cutoff;
|
|
int neg = 0, any, cutlim;
|
|
|
|
/*
|
|
* Skip white space and pick up leading +/- sign if any.
|
|
* If base is 0, allow 0x for hex and 0 for octal, else
|
|
* assume decimal; if base is already 16, allow 0x.
|
|
*/
|
|
do {
|
|
c = *s++;
|
|
} while (esp_isspace(c));
|
|
if (c == '-') {
|
|
neg = 1;
|
|
c = *s++;
|
|
} else if (c == '+')
|
|
c = *s++;
|
|
if ((base == 0 || base == 16) &&
|
|
c == '0' && (*s == 'x' || *s == 'X')) {
|
|
c = s[1];
|
|
s += 2;
|
|
base = 16;
|
|
} else if ((base == 0 || base == 2) &&
|
|
c == '0' && (*s == 'b' || *s == 'B')) {
|
|
c = s[1];
|
|
s += 2;
|
|
base = 2;
|
|
}
|
|
if (base == 0)
|
|
base = c == '0' ? 8 : 10;
|
|
|
|
/*
|
|
* Compute the cutoff value between legal numbers and illegal
|
|
* numbers. That is the largest legal value, divided by the
|
|
* base. An input number that is greater than this value, if
|
|
* followed by a legal input character, is too big. One that
|
|
* is equal to this value may be valid or not; the limit
|
|
* between valid and invalid numbers is then based on the last
|
|
* digit. For instance, if the range for longs is
|
|
* [-2147483648..2147483647] and the input base is 10,
|
|
* cutoff will be set to 214748364 and cutlim to either
|
|
* 7 (neg==0) or 8 (neg==1), meaning that if we have accumulated
|
|
* a value > 214748364, or equal but the next digit is > 7 (or 8),
|
|
* the number is too big, and we will return a range error.
|
|
*
|
|
* Set any if any `digits' consumed; make it negative to indicate
|
|
* overflow.
|
|
*/
|
|
cutoff = neg ? -(unsigned long)LONG_MIN : LONG_MAX;
|
|
cutlim = cutoff % (unsigned long)base;
|
|
cutoff /= (unsigned long)base;
|
|
for (acc = 0, any = 0;; c = *s++) {
|
|
if (esp_isdigit(c))
|
|
c -= '0';
|
|
else if (esp_isalpha(c))
|
|
c -= esp_isupper(c) ? 'A' - 10 : 'a' - 10;
|
|
else
|
|
break;
|
|
if (c >= base)
|
|
break;
|
|
if (any < 0 || acc > cutoff || (acc == cutoff && c > cutlim))
|
|
any = -1;
|
|
else {
|
|
any = 1;
|
|
acc *= base;
|
|
acc += c;
|
|
}
|
|
}
|
|
if (any < 0) {
|
|
acc = neg ? LONG_MIN : LONG_MAX;
|
|
// errno = ERANGE;
|
|
} else if (neg)
|
|
acc = -acc;
|
|
if (endptr != 0)
|
|
*endptr = (char *)(any ? s - 1 : nptr);
|
|
return (acc);
|
|
}
|
|
|
|
static int ICACHE_FLASH_ATTR chunked_decode(char * chunked, int size)
|
|
{
|
|
char *src = chunked;
|
|
char *end = chunked + size;
|
|
int i, dst = 0;
|
|
|
|
do
|
|
{
|
|
//[chunk-size]
|
|
i = esp_strtol(src, (char **) NULL, 16);
|
|
PRINTF("Chunk Size:%d\r\n", i);
|
|
if (i <= 0)
|
|
break;
|
|
//[chunk-size-end-ptr]
|
|
src = (char *)os_strstr(src, "\r\n") + 2;
|
|
//[chunk-data]
|
|
os_memmove(&chunked[dst], src, i);
|
|
src += i + 2; /* CRLF */
|
|
dst += i;
|
|
} while (src < end);
|
|
|
|
//
|
|
//footer CRLF
|
|
//
|
|
|
|
/* decoded size */
|
|
return dst;
|
|
}
|
|
|
|
static void ICACHE_FLASH_ATTR receive_callback(void * arg, char * buf, unsigned short len)
|
|
{
|
|
struct espconn * conn = (struct espconn *)arg;
|
|
request_args * req = (request_args *)conn->reverse;
|
|
|
|
if (req->buffer == NULL) {
|
|
return;
|
|
}
|
|
|
|
// Let's do the equivalent of a realloc().
|
|
const int new_size = req->buffer_size + len;
|
|
char * new_buffer;
|
|
if (new_size > BUFFER_SIZE_MAX || NULL == (new_buffer = (char *)os_malloc(new_size))) {
|
|
os_printf("Response too long (%d)\n", new_size);
|
|
req->buffer[0] = '\0'; // Discard the buffer to avoid using an incomplete response.
|
|
if (req->secure)
|
|
#ifdef HTTPCS
|
|
espconn_secure_disconnect(conn);
|
|
#else
|
|
os_printf("SSL not available\r\n");
|
|
#endif
|
|
else
|
|
espconn_disconnect(conn);
|
|
return; // The disconnect callback will be called.
|
|
}
|
|
|
|
os_memcpy(new_buffer, req->buffer, req->buffer_size);
|
|
os_memcpy(new_buffer + req->buffer_size - 1 /*overwrite the null character*/, buf, len); // Append new data.
|
|
new_buffer[new_size - 1] = '\0'; // Make sure there is an end of string.
|
|
|
|
os_free(req->buffer);
|
|
req->buffer = new_buffer;
|
|
req->buffer_size = new_size;
|
|
}
|
|
|
|
static void ICACHE_FLASH_ATTR sent_callback(void * arg)
|
|
{
|
|
struct espconn * conn = (struct espconn *)arg;
|
|
request_args * req = (request_args *)conn->reverse;
|
|
|
|
if (req->post_data == NULL) {
|
|
PRINTF("All sent\n");
|
|
}
|
|
else {
|
|
// The headers were sent, now send the contents.
|
|
PRINTF("Sending request body\n");
|
|
if (req->secure)
|
|
#ifdef HTTPCS
|
|
espconn_secure_sent(conn, (uint8_t *)req->post_data, strlen(req->post_data));
|
|
#else
|
|
os_printf("SSL not available\r\n");
|
|
#endif
|
|
else
|
|
espconn_sent(conn, (uint8_t *)req->post_data, strlen(req->post_data));
|
|
os_free(req->post_data);
|
|
req->post_data = NULL;
|
|
}
|
|
}
|
|
|
|
static void ICACHE_FLASH_ATTR connect_callback(void * arg)
|
|
{
|
|
PRINTF("Connected\n");
|
|
struct espconn * conn = (struct espconn *)arg;
|
|
request_args * req = (request_args *)conn->reverse;
|
|
|
|
espconn_regist_recvcb(conn, receive_callback);
|
|
espconn_regist_sentcb(conn, sent_callback);
|
|
|
|
const char * method = "GET";
|
|
char post_headers[32] = "";
|
|
|
|
if (req->post_data != NULL) { // If there is data this is a POST request.
|
|
method = "POST";
|
|
os_sprintf(post_headers, "Content-Length: %d\r\n", strlen(req->post_data));
|
|
}
|
|
|
|
char buf[69 + strlen(method) + strlen(req->path) + strlen(req->hostname) +
|
|
strlen(req->headers) + strlen(post_headers)];
|
|
int len = os_sprintf(buf,
|
|
"%s %s HTTP/1.1\r\n"
|
|
"Host: %s:%d\r\n"
|
|
"Connection: close\r\n"
|
|
"User-Agent: ESP8266\r\n"
|
|
"%s"
|
|
"%s"
|
|
"\r\n",
|
|
method, req->path, req->hostname, req->port, req->headers, post_headers);
|
|
|
|
if (req->secure)
|
|
#ifdef HTTPCS
|
|
espconn_secure_sent(conn, (uint8_t *)buf, len);
|
|
#else
|
|
os_printf("SSL not available\r\n");
|
|
#endif
|
|
else
|
|
espconn_sent(conn, (uint8_t *)buf, len);
|
|
os_free(req->headers);
|
|
req->headers = NULL;
|
|
PRINTF("Sending request header\n");
|
|
}
|
|
|
|
static void ICACHE_FLASH_ATTR disconnect_callback(void * arg)
|
|
{
|
|
PRINTF("Disconnected\n");
|
|
struct espconn *conn = (struct espconn *)arg;
|
|
|
|
if(conn == NULL) {
|
|
return;
|
|
}
|
|
|
|
if(conn->reverse != NULL) {
|
|
request_args * req = (request_args *)conn->reverse;
|
|
int http_status = -1;
|
|
int body_size = 0;
|
|
char * body = "";
|
|
if (req->buffer == NULL) {
|
|
os_printf("Buffer shouldn't be NULL\n");
|
|
}
|
|
else if (req->buffer[0] != '\0') {
|
|
// FIXME: make sure this is not a partial response, using the Content-Length header.
|
|
|
|
const char * version10 = "HTTP/1.0 ";
|
|
const char * version11 = "HTTP/1.1 ";
|
|
if (os_strncmp(req->buffer, version10, strlen(version10)) != 0
|
|
&& os_strncmp(req->buffer, version11, strlen(version11)) != 0) {
|
|
os_printf("Invalid version in %s\n", req->buffer);
|
|
}
|
|
else {
|
|
http_status = atoi(req->buffer + strlen(version10));
|
|
/* find body and zero terminate headers */
|
|
body = (char *)os_strstr(req->buffer, "\r\n\r\n") + 2;
|
|
*body++ = '\0';
|
|
*body++ = '\0';
|
|
|
|
body_size = req->buffer_size - (body - req->buffer);
|
|
|
|
if(os_strstr(req->buffer, "Transfer-Encoding: chunked"))
|
|
{
|
|
body_size = chunked_decode(body, body_size);
|
|
body[body_size] = '\0';
|
|
}
|
|
}
|
|
}
|
|
|
|
if (req->user_callback != NULL) { // Callback is optional.
|
|
req->user_callback(body, http_status, req->buffer, body_size);
|
|
}
|
|
|
|
os_free(req->buffer);
|
|
os_free(req->hostname);
|
|
os_free(req->path);
|
|
os_free(req);
|
|
}
|
|
espconn_delete(conn);
|
|
if(conn->proto.tcp != NULL) {
|
|
os_free(conn->proto.tcp);
|
|
}
|
|
os_free(conn);
|
|
}
|
|
|
|
static void ICACHE_FLASH_ATTR error_callback(void *arg, sint8 errType)
|
|
{
|
|
PRINTF("Disconnected with error\n");
|
|
disconnect_callback(arg);
|
|
}
|
|
|
|
static void ICACHE_FLASH_ATTR dns_callback(const char * hostname, ip_addr_t * addr, void * arg)
|
|
{
|
|
request_args * req = (request_args *)arg;
|
|
|
|
if (addr == NULL) {
|
|
os_printf("DNS failed for %s\n", hostname);
|
|
if (req->user_callback != NULL) {
|
|
req->user_callback("", -1, "", 0);
|
|
}
|
|
os_free(req->buffer);
|
|
os_free(req->post_data);
|
|
os_free(req->headers);
|
|
os_free(req->path);
|
|
os_free(req->hostname);
|
|
os_free(req);
|
|
}
|
|
else {
|
|
PRINTF("DNS found %s " IPSTR "\n", hostname, IP2STR(addr));
|
|
|
|
struct espconn * conn = (struct espconn *)os_malloc(sizeof(struct espconn));
|
|
conn->type = ESPCONN_TCP;
|
|
conn->state = ESPCONN_NONE;
|
|
conn->proto.tcp = (esp_tcp *)os_malloc(sizeof(esp_tcp));
|
|
conn->proto.tcp->local_port = espconn_port();
|
|
conn->proto.tcp->remote_port = req->port;
|
|
conn->reverse = req;
|
|
|
|
os_memcpy(conn->proto.tcp->remote_ip, addr, 4);
|
|
|
|
espconn_regist_connectcb(conn, connect_callback);
|
|
espconn_regist_disconcb(conn, disconnect_callback);
|
|
espconn_regist_reconcb(conn, error_callback);
|
|
|
|
if (req->secure) {
|
|
#ifdef HTTPCS
|
|
espconn_secure_set_size(ESPCONN_CLIENT,5120); // set SSL buffer size
|
|
espconn_secure_connect(conn);
|
|
#else
|
|
os_printf("SSL not available\r\n");
|
|
#endif
|
|
} else {
|
|
espconn_connect(conn);
|
|
}
|
|
}
|
|
}
|
|
|
|
void ICACHE_FLASH_ATTR http_raw_request(const char * hostname, int port, bool secure, const char * path, const char * post_data, const char * headers, http_callback user_callback)
|
|
{
|
|
PRINTF("DNS request\n");
|
|
|
|
request_args * req = (request_args *)os_malloc(sizeof(request_args));
|
|
req->hostname = esp_strdup(hostname);
|
|
req->path = esp_strdup(path);
|
|
req->port = port;
|
|
req->secure = secure;
|
|
req->headers = esp_strdup(headers);
|
|
req->post_data = esp_strdup(post_data);
|
|
req->buffer_size = 1;
|
|
req->buffer = (char *)os_malloc(1);
|
|
req->buffer[0] = '\0'; // Empty string.
|
|
req->user_callback = user_callback;
|
|
|
|
ip_addr_t addr;
|
|
err_t error = espconn_gethostbyname((struct espconn *)req, // It seems we don't need a real espconn pointer here.
|
|
hostname, &addr, dns_callback);
|
|
|
|
if (error == ESPCONN_INPROGRESS) {
|
|
PRINTF("DNS pending\n");
|
|
}
|
|
else if (error == ESPCONN_OK) {
|
|
// Already in the local names table (or hostname was an IP address), execute the callback ourselves.
|
|
dns_callback(hostname, &addr, req);
|
|
}
|
|
else {
|
|
if (error == ESPCONN_ARG) {
|
|
os_printf("DNS arg error %s\n", hostname);
|
|
}
|
|
else {
|
|
os_printf("DNS error code %d\n", error);
|
|
}
|
|
dns_callback(hostname, NULL, req); // Handle all DNS errors the same way.
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Parse an URL of the form http://host:port/path
|
|
* <host> can be a hostname or an IP address
|
|
* <port> is optional
|
|
*/
|
|
void ICACHE_FLASH_ATTR http_post(const char * url, const char * post_data, const char * headers, http_callback user_callback)
|
|
{
|
|
// FIXME: handle HTTP auth with http://user:pass@host/
|
|
// FIXME: get rid of the #anchor part if present.
|
|
|
|
char hostname[128] = "";
|
|
int port = 80;
|
|
bool secure = false;
|
|
|
|
bool is_http = os_strncmp(url, "http://", strlen("http://")) == 0;
|
|
bool is_https = os_strncmp(url, "https://", strlen("https://")) == 0;
|
|
|
|
if (is_http)
|
|
url += strlen("http://"); // Get rid of the protocol.
|
|
else if (is_https) {
|
|
port = 443;
|
|
secure = true;
|
|
url += strlen("https://"); // Get rid of the protocol.
|
|
} else {
|
|
os_printf("URL is not HTTP or HTTPS %s\n", url);
|
|
return;
|
|
}
|
|
|
|
char * path = os_strchr(url, '/');
|
|
if (path == NULL) {
|
|
path = os_strchr(url, '\0'); // Pointer to end of string.
|
|
}
|
|
|
|
char * colon = os_strchr(url, ':');
|
|
if (colon > path) {
|
|
colon = NULL; // Limit the search to characters before the path.
|
|
}
|
|
|
|
if (colon == NULL) { // The port is not present.
|
|
os_memcpy(hostname, url, path - url);
|
|
hostname[path - url] = '\0';
|
|
}
|
|
else {
|
|
port = atoi(colon + 1);
|
|
if (port == 0) {
|
|
os_printf("Port error %s\n", url);
|
|
return;
|
|
}
|
|
|
|
os_memcpy(hostname, url, colon - url);
|
|
hostname[colon - url] = '\0';
|
|
}
|
|
|
|
|
|
if (path[0] == '\0') { // Empty path is not allowed.
|
|
path = "/";
|
|
}
|
|
|
|
PRINTF("hostname=%s\n", hostname);
|
|
PRINTF("port=%d\n", port);
|
|
PRINTF("path=%s\n", path);
|
|
http_raw_request(hostname, port, secure, path, post_data, headers, user_callback);
|
|
}
|
|
|
|
void ICACHE_FLASH_ATTR http_get(const char * url, const char * headers, http_callback user_callback)
|
|
{
|
|
http_post(url, NULL, headers, user_callback);
|
|
}
|
|
|
|
void ICACHE_FLASH_ATTR http_callback_example(char * response_body, int http_status, char * response_headers, int body_size)
|
|
{
|
|
os_printf("http_status=%d\n", http_status);
|
|
if (http_status != HTTP_STATUS_GENERIC_ERROR) {
|
|
os_printf("strlen(headers)=%d\n", strlen(response_headers));
|
|
os_printf("body_size=%d\n", body_size);
|
|
os_printf("body=%s<EOF>\n", response_body); // FIXME: this does not handle binary data.
|
|
}
|
|
}
|
|
|