mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
1506144d3a
Do not allocate client->if_name twice in esp_http_client_init(). Signed-off-by: Harshit Malpani <harshit.malpani@espressif.com> Closes https://github.com/espressif/esp-idf/pull/13945
1851 lines
69 KiB
C
1851 lines
69 KiB
C
/*
|
|
* SPDX-FileCopyrightText: 2015-2024 Espressif Systems (Shanghai) CO LTD
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
|
|
#include <string.h>
|
|
#include <inttypes.h>
|
|
|
|
#include "esp_log.h"
|
|
#include "esp_assert.h"
|
|
#include "esp_check.h"
|
|
#include "http_parser.h"
|
|
#include "http_header.h"
|
|
#include "esp_transport.h"
|
|
#include "esp_transport_tcp.h"
|
|
#include "http_utils.h"
|
|
#include "http_auth.h"
|
|
#include "sdkconfig.h"
|
|
#include "esp_http_client.h"
|
|
#include "errno.h"
|
|
#include "esp_random.h"
|
|
#include "esp_tls.h"
|
|
|
|
#ifdef CONFIG_ESP_HTTP_CLIENT_ENABLE_HTTPS
|
|
#include "esp_transport_ssl.h"
|
|
#endif
|
|
|
|
ESP_EVENT_DEFINE_BASE(ESP_HTTP_CLIENT_EVENT);
|
|
|
|
static const char *TAG = "HTTP_CLIENT";
|
|
|
|
ESP_STATIC_ASSERT((int)ESP_HTTP_CLIENT_TLS_VER_ANY == (int)ESP_TLS_VER_ANY, "Enum mismatch in esp_http_client and esp-tls");
|
|
ESP_STATIC_ASSERT((int)ESP_HTTP_CLIENT_TLS_VER_MAX <= (int)ESP_TLS_VER_TLS_MAX, "HTTP client supported TLS is not supported in esp-tls");
|
|
|
|
/**
|
|
* HTTP Buffer
|
|
*/
|
|
typedef struct {
|
|
char *data; /*!< The HTTP data received from the server */
|
|
int len; /*!< The HTTP data len received from the server */
|
|
char *raw_data; /*!< The HTTP data after decoding */
|
|
char *orig_raw_data;/*!< The Original pointer to HTTP data after decoding */
|
|
int raw_len; /*!< The HTTP data len after decoding */
|
|
char *output_ptr; /*!< The destination address of the data to be copied to after decoding */
|
|
} esp_http_buffer_t;
|
|
|
|
/**
|
|
* private HTTP Data structure
|
|
*/
|
|
typedef struct {
|
|
http_header_handle_t headers; /*!< http header */
|
|
esp_http_buffer_t *buffer; /*!< data buffer as linked list */
|
|
int status_code; /*!< status code (integer) */
|
|
int64_t content_length; /*!< data length */
|
|
int chunk_length; /*!< chunk length */
|
|
int data_offset; /*!< offset to http data (Skip header) */
|
|
int64_t data_process; /*!< data processed */
|
|
int method; /*!< http method */
|
|
bool is_chunked;
|
|
} esp_http_data_t;
|
|
|
|
typedef struct {
|
|
char *url;
|
|
char *scheme;
|
|
char *host;
|
|
int port;
|
|
char *username;
|
|
char *password;
|
|
char *path;
|
|
char *query;
|
|
char *cert_pem;
|
|
esp_http_client_method_t method;
|
|
esp_http_client_auth_type_t auth_type;
|
|
esp_http_client_transport_t transport_type;
|
|
int max_store_header_size;
|
|
} connection_info_t;
|
|
|
|
typedef enum {
|
|
HTTP_STATE_UNINIT = 0,
|
|
HTTP_STATE_INIT,
|
|
HTTP_STATE_CONNECTED,
|
|
HTTP_STATE_REQ_COMPLETE_HEADER,
|
|
HTTP_STATE_REQ_COMPLETE_DATA,
|
|
HTTP_STATE_RES_COMPLETE_HEADER,
|
|
HTTP_STATE_RES_ON_DATA_START,
|
|
HTTP_STATE_RES_COMPLETE_DATA,
|
|
HTTP_STATE_CLOSE
|
|
} esp_http_state_t;
|
|
|
|
typedef enum {
|
|
SESSION_TICKET_UNUSED = 0,
|
|
SESSION_TICKET_NOT_SAVED,
|
|
SESSION_TICKET_SAVED,
|
|
} session_ticket_state_t;
|
|
|
|
/**
|
|
* HTTP client class
|
|
*/
|
|
struct esp_http_client {
|
|
int redirect_counter;
|
|
int max_redirection_count;
|
|
int max_authorization_retries;
|
|
int process_again;
|
|
struct http_parser *parser;
|
|
struct http_parser_settings *parser_settings;
|
|
esp_transport_list_handle_t transport_list;
|
|
esp_transport_handle_t transport;
|
|
esp_http_data_t *request;
|
|
esp_http_data_t *response;
|
|
void *user_data;
|
|
esp_http_auth_data_t *auth_data;
|
|
char *post_data;
|
|
char *location;
|
|
char *auth_header;
|
|
char *current_header_key;
|
|
char *current_header_value;
|
|
int post_len;
|
|
connection_info_t connection_info;
|
|
bool is_chunk_complete;
|
|
esp_http_state_t state;
|
|
http_event_handle_cb event_handler;
|
|
int timeout_ms;
|
|
int buffer_size_rx;
|
|
int buffer_size_tx;
|
|
bool disable_auto_redirect;
|
|
esp_http_client_event_t event;
|
|
int data_written_index;
|
|
int data_write_left;
|
|
bool first_line_prepared;
|
|
int header_index;
|
|
bool is_async;
|
|
esp_transport_keep_alive_t keep_alive_cfg;
|
|
struct ifreq *if_name;
|
|
unsigned cache_data_in_fetch_hdr: 1;
|
|
#ifdef CONFIG_ESP_TLS_CLIENT_SESSION_TICKETS
|
|
session_ticket_state_t session_ticket_state;
|
|
#endif
|
|
};
|
|
|
|
typedef struct esp_http_client esp_http_client_t;
|
|
|
|
static esp_err_t _clear_connection_info(esp_http_client_handle_t client);
|
|
/**
|
|
* Default settings
|
|
*/
|
|
#define DEFAULT_HTTP_PORT (80)
|
|
#define DEFAULT_HTTPS_PORT (443)
|
|
|
|
#define ASYNC_TRANS_CONNECT_FAIL -1
|
|
#define ASYNC_TRANS_CONNECTING 0
|
|
#define ASYNC_TRANS_CONNECT_PASS 1
|
|
|
|
static const char *DEFAULT_HTTP_USER_AGENT = "ESP32 HTTP Client/1.0";
|
|
static const char *DEFAULT_HTTP_PROTOCOL = "HTTP/1.1";
|
|
static const char *DEFAULT_HTTP_PATH = "/";
|
|
static const int DEFAULT_MAX_REDIRECT = 10;
|
|
static const int DEFAULT_MAX_AUTH_RETRIES = 10;
|
|
static const int DEFAULT_TIMEOUT_MS = 5000;
|
|
static const int DEFAULT_KEEP_ALIVE_IDLE = 5;
|
|
static const int DEFAULT_KEEP_ALIVE_INTERVAL= 5;
|
|
static const int DEFAULT_KEEP_ALIVE_COUNT= 3;
|
|
|
|
static const char *HTTP_METHOD_MAPPING[] = {
|
|
"GET",
|
|
"POST",
|
|
"PUT",
|
|
"PATCH",
|
|
"DELETE",
|
|
"HEAD",
|
|
"NOTIFY",
|
|
"SUBSCRIBE",
|
|
"UNSUBSCRIBE",
|
|
"OPTIONS",
|
|
"COPY",
|
|
"MOVE",
|
|
"LOCK",
|
|
"UNLOCK",
|
|
"PROPFIND",
|
|
"PROPPATCH",
|
|
"MKCOL"
|
|
};
|
|
|
|
static esp_err_t esp_http_client_request_send(esp_http_client_handle_t client, int write_len);
|
|
static esp_err_t esp_http_client_connect(esp_http_client_handle_t client);
|
|
static esp_err_t esp_http_client_send_post_data(esp_http_client_handle_t client);
|
|
|
|
static esp_err_t http_dispatch_event(esp_http_client_t *client, esp_http_client_event_id_t event_id, void *data, int len)
|
|
{
|
|
esp_http_client_event_t *event = &client->event;
|
|
|
|
if (client->event_handler) {
|
|
event->event_id = event_id;
|
|
event->user_data = client->user_data;
|
|
event->data = data;
|
|
event->data_len = len;
|
|
return client->event_handler(event);
|
|
}
|
|
return ESP_OK;
|
|
}
|
|
|
|
static void http_dispatch_event_to_event_loop(int32_t event_id, const void* event_data, size_t event_data_size)
|
|
{
|
|
esp_err_t err = esp_event_post(ESP_HTTP_CLIENT_EVENT, event_id, event_data, event_data_size, portMAX_DELAY);
|
|
if (err != ESP_OK) {
|
|
ESP_LOGE(TAG, "Failed to post http_client event: %"PRId32", error: %s", event_id, esp_err_to_name(err));
|
|
}
|
|
}
|
|
|
|
static int http_on_message_begin(http_parser *parser)
|
|
{
|
|
esp_http_client_t *client = parser->data;
|
|
ESP_LOGD(TAG, "on_message_begin");
|
|
|
|
client->response->is_chunked = false;
|
|
client->is_chunk_complete = false;
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_url(http_parser *parser, const char *at, size_t length)
|
|
{
|
|
ESP_LOGD(TAG, "http_on_url");
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_status(http_parser *parser, const char *at, size_t length)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_header_event(esp_http_client_handle_t client)
|
|
{
|
|
if (client->current_header_key != NULL && client->current_header_value != NULL) {
|
|
ESP_LOGD(TAG, "HEADER=%s:%s", client->current_header_key, client->current_header_value);
|
|
client->event.header_key = client->current_header_key;
|
|
client->event.header_value = client->current_header_value;
|
|
http_dispatch_event(client, HTTP_EVENT_ON_HEADER, NULL, 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ON_HEADER, &client, sizeof(esp_http_client_handle_t));
|
|
free(client->current_header_key);
|
|
free(client->current_header_value);
|
|
client->current_header_key = NULL;
|
|
client->current_header_value = NULL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_header_field(http_parser *parser, const char *at, size_t length)
|
|
{
|
|
esp_http_client_t *client = parser->data;
|
|
http_on_header_event(client);
|
|
http_utils_append_string(&client->current_header_key, at, length);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_header_value(http_parser *parser, const char *at, size_t length)
|
|
{
|
|
esp_http_client_handle_t client = parser->data;
|
|
if (client->current_header_key == NULL) {
|
|
return 0;
|
|
}
|
|
if (strcasecmp(client->current_header_key, "Location") == 0) {
|
|
http_utils_append_string(&client->location, at, length);
|
|
} else if (strcasecmp(client->current_header_key, "Transfer-Encoding") == 0
|
|
&& memcmp(at, "chunked", length) == 0) {
|
|
client->response->is_chunked = true;
|
|
} else if (strcasecmp(client->current_header_key, "WWW-Authenticate") == 0) {
|
|
http_utils_append_string(&client->auth_header, at, length);
|
|
}
|
|
http_utils_append_string(&client->current_header_value, at, length);
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_headers_complete(http_parser *parser)
|
|
{
|
|
esp_http_client_handle_t client = parser->data;
|
|
http_on_header_event(client);
|
|
client->response->status_code = parser->status_code;
|
|
client->response->data_offset = parser->nread;
|
|
client->response->content_length = parser->content_length;
|
|
client->response->data_process = 0;
|
|
ESP_LOGD(TAG, "http_on_headers_complete, status=%d, offset=%d, nread=%" PRId32, parser->status_code, client->response->data_offset, parser->nread);
|
|
client->state = HTTP_STATE_RES_COMPLETE_HEADER;
|
|
if (client->connection_info.method == HTTP_METHOD_HEAD) {
|
|
/* In a HTTP_RESPONSE parser returning '1' from on_headers_complete will tell the
|
|
parser that it should not expect a body. This is used when receiving a response
|
|
to a HEAD request which may contain 'Content-Length' or 'Transfer-Encoding: chunked'
|
|
headers that indicate the presence of a body.*/
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_body(http_parser *parser, const char *at, size_t length)
|
|
{
|
|
esp_http_client_t *client = parser->data;
|
|
ESP_LOGD(TAG, "http_on_body %zu", length);
|
|
|
|
if (client->response->buffer->output_ptr) {
|
|
memcpy(client->response->buffer->output_ptr, (char *)at, length);
|
|
client->response->buffer->output_ptr += length;
|
|
} else {
|
|
/* Do not cache body when http_on_body is called from esp_http_client_perform */
|
|
if (client->state < HTTP_STATE_RES_ON_DATA_START && client->cache_data_in_fetch_hdr) {
|
|
ESP_LOGD(TAG, "Body received in fetch header state, %p, %zu", at, length);
|
|
esp_http_buffer_t *res_buffer = client->response->buffer;
|
|
assert(res_buffer->orig_raw_data == res_buffer->raw_data);
|
|
res_buffer->orig_raw_data = (char *)realloc(res_buffer->orig_raw_data, res_buffer->raw_len + length);
|
|
if (!res_buffer->orig_raw_data) {
|
|
ESP_LOGE(TAG, "Failed to allocate memory for storing decoded data");
|
|
return -1;
|
|
}
|
|
memcpy(res_buffer->orig_raw_data + res_buffer->raw_len, at, length);
|
|
res_buffer->raw_data = res_buffer->orig_raw_data;
|
|
}
|
|
}
|
|
|
|
client->response->data_process += length;
|
|
client->response->buffer->raw_len += length;
|
|
http_dispatch_event(client, HTTP_EVENT_ON_DATA, (void *)at, length);
|
|
esp_http_client_on_data_t evt_data = {};
|
|
evt_data.data_process = client->response->data_process;
|
|
evt_data.client = client;
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ON_DATA, &evt_data, sizeof(esp_http_client_on_data_t));
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_message_complete(http_parser *parser)
|
|
{
|
|
ESP_LOGD(TAG, "http_on_message_complete, parser=%p", parser);
|
|
esp_http_client_handle_t client = parser->data;
|
|
client->is_chunk_complete = true;
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_chunk_complete(http_parser *parser)
|
|
{
|
|
ESP_LOGD(TAG, "http_on_chunk_complete");
|
|
return 0;
|
|
}
|
|
|
|
static int http_on_chunk_header(http_parser *parser)
|
|
{
|
|
esp_http_client_handle_t client = parser->data;
|
|
client->response->chunk_length = parser->content_length;
|
|
ESP_LOGD(TAG, "http_on_chunk_header, chunk_length");
|
|
return 0;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_header(esp_http_client_handle_t client, const char *key, const char *value)
|
|
{
|
|
return http_header_set(client->request->headers, key, value);
|
|
}
|
|
|
|
esp_err_t esp_http_client_get_header(esp_http_client_handle_t client, const char *key, char **value)
|
|
{
|
|
return http_header_get(client->request->headers, key, value);
|
|
}
|
|
|
|
esp_err_t esp_http_client_delete_header(esp_http_client_handle_t client, const char *key)
|
|
{
|
|
return http_header_delete(client->request->headers, key);
|
|
}
|
|
|
|
esp_err_t esp_http_client_get_username(esp_http_client_handle_t client, char **value)
|
|
{
|
|
if (client == NULL || value == NULL) {
|
|
ESP_LOGE(TAG, "client or value must not be NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
*value = client->connection_info.username;
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_username(esp_http_client_handle_t client, const char *username)
|
|
{
|
|
if (client == NULL) {
|
|
ESP_LOGE(TAG, "client must not be NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
if (client->connection_info.username != NULL) {
|
|
free(client->connection_info.username);
|
|
}
|
|
client->connection_info.username = username ? strdup(username) : NULL;
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_get_password(esp_http_client_handle_t client, char **value)
|
|
{
|
|
if (client == NULL || value == NULL) {
|
|
ESP_LOGE(TAG, "client or value must not be NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
*value = client->connection_info.password;
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_cancel_request(esp_http_client_handle_t client)
|
|
{
|
|
if (client == NULL) {
|
|
ESP_LOGD(TAG, "Client handle is NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
if (client->state < HTTP_STATE_CONNECTED) {
|
|
ESP_LOGD(TAG, "Invalid State: %d", client->state);
|
|
return ESP_ERR_INVALID_STATE;
|
|
}
|
|
if (esp_transport_close(client->transport) != 0) {
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
esp_err_t err = esp_http_client_connect(client);
|
|
// esp_http_client_connect() will return ESP_ERR_HTTP_CONNECTING in case of non-blocking mode and if the connection has not been established.
|
|
if (err == ESP_OK || (client->is_async && err == ESP_ERR_HTTP_CONNECTING)) {
|
|
client->response->data_process = client->response->content_length;
|
|
return ESP_OK;
|
|
}
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_password(esp_http_client_handle_t client, const char *password)
|
|
{
|
|
if (client == NULL) {
|
|
ESP_LOGE(TAG, "client must not be NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
if (client->connection_info.password != NULL) {
|
|
memset(client->connection_info.password, 0, strlen(client->connection_info.password));
|
|
free(client->connection_info.password);
|
|
}
|
|
client->connection_info.password = password ? strdup(password) : NULL;
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_authtype(esp_http_client_handle_t client, esp_http_client_auth_type_t auth_type)
|
|
{
|
|
if (client == NULL) {
|
|
ESP_LOGE(TAG, "client must not be NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
client->connection_info.auth_type = auth_type;
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_get_user_data(esp_http_client_handle_t client, void **data)
|
|
{
|
|
if (NULL == client || NULL == data) {
|
|
ESP_LOGE(TAG, "client or data must not be NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
*data = client->user_data;
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_user_data(esp_http_client_handle_t client, void *data)
|
|
{
|
|
if (NULL == client) {
|
|
ESP_LOGE(TAG, "client must not be NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
client->user_data = data;
|
|
return ESP_OK;
|
|
}
|
|
|
|
static esp_err_t _set_config(esp_http_client_handle_t client, const esp_http_client_config_t *config)
|
|
{
|
|
esp_err_t ret = ESP_OK;
|
|
client->connection_info.method = config->method;
|
|
client->connection_info.port = config->port;
|
|
client->connection_info.auth_type = config->auth_type;
|
|
client->event_handler = config->event_handler;
|
|
client->timeout_ms = config->timeout_ms;
|
|
client->max_redirection_count = config->max_redirection_count;
|
|
client->max_authorization_retries = config->max_authorization_retries;
|
|
client->user_data = config->user_data;
|
|
client->buffer_size_rx = config->buffer_size;
|
|
client->buffer_size_tx = config->buffer_size_tx;
|
|
client->disable_auto_redirect = config->disable_auto_redirect;
|
|
|
|
if (config->buffer_size == 0) {
|
|
client->buffer_size_rx = DEFAULT_HTTP_BUF_SIZE;
|
|
}
|
|
|
|
if (config->buffer_size_tx == 0) {
|
|
client->buffer_size_tx = DEFAULT_HTTP_BUF_SIZE;
|
|
}
|
|
|
|
if (client->max_redirection_count == 0) {
|
|
client->max_redirection_count = DEFAULT_MAX_REDIRECT;
|
|
}
|
|
|
|
if (client->max_authorization_retries == 0) {
|
|
client->max_authorization_retries = DEFAULT_MAX_AUTH_RETRIES;
|
|
} else if (client->max_authorization_retries == -1) {
|
|
client->max_authorization_retries = 0;
|
|
}
|
|
|
|
if (config->path) {
|
|
client->connection_info.path = strdup(config->path);
|
|
} else {
|
|
client->connection_info.path = strdup(DEFAULT_HTTP_PATH);
|
|
}
|
|
ESP_RETURN_ON_FALSE(client->connection_info.path, ESP_ERR_NO_MEM, TAG, "Memory exhausted");
|
|
|
|
if (config->host) {
|
|
client->connection_info.host = strdup(config->host);
|
|
|
|
ESP_GOTO_ON_FALSE(client->connection_info.host, ESP_ERR_NO_MEM, error, TAG, "Memory exhausted");
|
|
}
|
|
|
|
if (config->query) {
|
|
client->connection_info.query = strdup(config->query);
|
|
ESP_GOTO_ON_FALSE(client->connection_info.query, ESP_ERR_NO_MEM, error, TAG, "Memory exhausted");
|
|
}
|
|
|
|
if (config->username) {
|
|
client->connection_info.username = strdup(config->username);
|
|
ESP_GOTO_ON_FALSE(client->connection_info.username, ESP_ERR_NO_MEM, error, TAG, "Memory exhausted");
|
|
}
|
|
|
|
if (config->password) {
|
|
client->connection_info.password = strdup(config->password);
|
|
ESP_GOTO_ON_FALSE(client->connection_info.password, ESP_ERR_NO_MEM, error, TAG, "Memory exhausted");
|
|
}
|
|
|
|
if (config->transport_type == HTTP_TRANSPORT_OVER_SSL) {
|
|
http_utils_assign_string(&client->connection_info.scheme, "https", -1);
|
|
if (client->connection_info.port == 0) {
|
|
client->connection_info.port = DEFAULT_HTTPS_PORT;
|
|
}
|
|
} else {
|
|
http_utils_assign_string(&client->connection_info.scheme, "http", -1);
|
|
if (client->connection_info.port == 0) {
|
|
client->connection_info.port = DEFAULT_HTTP_PORT;
|
|
}
|
|
}
|
|
if (client->timeout_ms == 0) {
|
|
client->timeout_ms = DEFAULT_TIMEOUT_MS;
|
|
}
|
|
if (config->is_async) {
|
|
client->is_async = true;
|
|
}
|
|
|
|
return ret;
|
|
|
|
error:
|
|
_clear_connection_info(client);
|
|
return ret;
|
|
}
|
|
|
|
static esp_err_t _clear_connection_info(esp_http_client_handle_t client)
|
|
{
|
|
free(client->connection_info.path);
|
|
free(client->connection_info.host);
|
|
free(client->connection_info.query);
|
|
free(client->connection_info.username);
|
|
if (client->connection_info.password) {
|
|
memset(client->connection_info.password, 0, strlen(client->connection_info.password));
|
|
free(client->connection_info.password);
|
|
}
|
|
free(client->connection_info.scheme);
|
|
free(client->connection_info.url);
|
|
memset(&client->connection_info, 0, sizeof(connection_info_t));
|
|
return ESP_OK;
|
|
}
|
|
|
|
static esp_err_t _clear_auth_data(esp_http_client_handle_t client)
|
|
{
|
|
if (client->auth_data == NULL) {
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
free(client->auth_data->method);
|
|
free(client->auth_data->realm);
|
|
free(client->auth_data->algorithm);
|
|
free(client->auth_data->qop);
|
|
free(client->auth_data->nonce);
|
|
free(client->auth_data->opaque);
|
|
free(client->auth_data->uri);
|
|
memset(client->auth_data, 0, sizeof(esp_http_auth_data_t));
|
|
return ESP_OK;
|
|
}
|
|
|
|
static esp_err_t esp_http_client_prepare(esp_http_client_handle_t client)
|
|
{
|
|
client->process_again = 0;
|
|
client->response->data_process = 0;
|
|
client->first_line_prepared = false;
|
|
/**
|
|
* Clear location field before making a new HTTP request. Location
|
|
* field should not be cleared in http_on_header* callbacks because
|
|
* callbacks can be invoked multiple times for same header, and
|
|
* hence can lead to data corruption.
|
|
*/
|
|
if (client->location != NULL) {
|
|
free(client->location);
|
|
client->location = NULL;
|
|
}
|
|
if (client->auth_header != NULL) {
|
|
free(client->auth_header);
|
|
client->auth_header = NULL;
|
|
}
|
|
http_parser_init(client->parser, HTTP_RESPONSE);
|
|
if (client->connection_info.username) {
|
|
char *auth_response = NULL;
|
|
|
|
if (client->connection_info.auth_type == HTTP_AUTH_TYPE_BASIC) {
|
|
auth_response = http_auth_basic(client->connection_info.username, client->connection_info.password);
|
|
#ifdef CONFIG_ESP_HTTP_CLIENT_ENABLE_DIGEST_AUTH
|
|
} else if (client->connection_info.auth_type == HTTP_AUTH_TYPE_DIGEST && client->auth_data) {
|
|
client->auth_data->uri = NULL;
|
|
http_utils_assign_string(&client->auth_data->uri,client->connection_info.path,-1);
|
|
if (client->connection_info.query){
|
|
http_utils_append_string(&client->auth_data->uri,"?",-1);
|
|
http_utils_append_string(&client->auth_data->uri,client->connection_info.query,-1);
|
|
}
|
|
client->auth_data->cnonce = ((uint64_t)esp_random() << 32) + esp_random();
|
|
auth_response = http_auth_digest(client->connection_info.username, client->connection_info.password, client->auth_data);
|
|
#endif
|
|
}
|
|
|
|
if (auth_response) {
|
|
ESP_LOGD(TAG, "auth_response=%s", auth_response);
|
|
esp_http_client_set_header(client, "Authorization", auth_response);
|
|
free(auth_response);
|
|
}
|
|
}
|
|
return ESP_OK;
|
|
}
|
|
|
|
static char *_get_host_header(char *host, int port)
|
|
{
|
|
int err = 0;
|
|
char *host_name;
|
|
if (port != DEFAULT_HTTP_PORT && port != DEFAULT_HTTPS_PORT) {
|
|
err = asprintf(&host_name, "%s:%d", host, port);
|
|
} else {
|
|
err = asprintf(&host_name, "%s", host);
|
|
}
|
|
if (err == -1) {
|
|
return NULL;
|
|
}
|
|
return host_name;
|
|
}
|
|
|
|
static bool init_common_tcp_transport(esp_http_client_handle_t client, const esp_http_client_config_t *config, esp_transport_handle_t transport)
|
|
{
|
|
if (config->keep_alive_enable == true) {
|
|
client->keep_alive_cfg.keep_alive_enable = true;
|
|
client->keep_alive_cfg.keep_alive_idle = (config->keep_alive_idle == 0) ? DEFAULT_KEEP_ALIVE_IDLE : config->keep_alive_idle;
|
|
client->keep_alive_cfg.keep_alive_interval = (config->keep_alive_interval == 0) ? DEFAULT_KEEP_ALIVE_INTERVAL : config->keep_alive_interval;
|
|
client->keep_alive_cfg.keep_alive_count = (config->keep_alive_count == 0) ? DEFAULT_KEEP_ALIVE_COUNT : config->keep_alive_count;
|
|
esp_transport_tcp_set_keep_alive(transport, &client->keep_alive_cfg);
|
|
}
|
|
|
|
if (config->if_name) {
|
|
if (client->if_name == NULL) {
|
|
client->if_name = calloc(1, sizeof(struct ifreq));
|
|
ESP_RETURN_ON_FALSE(client->if_name, false, TAG, "Memory exhausted");
|
|
memcpy(client->if_name, config->if_name, sizeof(struct ifreq));
|
|
}
|
|
esp_transport_tcp_set_interface_name(transport, client->if_name);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
esp_http_client_handle_t esp_http_client_init(const esp_http_client_config_t *config)
|
|
{
|
|
|
|
esp_http_client_handle_t client;
|
|
esp_err_t ret = ESP_OK;
|
|
esp_transport_handle_t tcp = NULL;
|
|
char *host_name;
|
|
bool _success;
|
|
|
|
_success = (
|
|
(client = calloc(1, sizeof(esp_http_client_t))) &&
|
|
(client->parser = calloc(1, sizeof(struct http_parser))) &&
|
|
(client->parser_settings = calloc(1, sizeof(struct http_parser_settings))) &&
|
|
(client->auth_data = calloc(1, sizeof(esp_http_auth_data_t))) &&
|
|
(client->request = calloc(1, sizeof(esp_http_data_t))) &&
|
|
(client->request->headers = http_header_init()) &&
|
|
(client->request->buffer = calloc(1, sizeof(esp_http_buffer_t))) &&
|
|
(client->response = calloc(1, sizeof(esp_http_data_t))) &&
|
|
(client->response->headers = http_header_init()) &&
|
|
(client->response->buffer = calloc(1, sizeof(esp_http_buffer_t)))
|
|
);
|
|
|
|
if (!_success) {
|
|
ESP_LOGE(TAG, "Error allocate memory");
|
|
goto error;
|
|
}
|
|
|
|
_success = (
|
|
(client->transport_list = esp_transport_list_init()) &&
|
|
(tcp = esp_transport_tcp_init()) &&
|
|
(esp_transport_set_default_port(tcp, DEFAULT_HTTP_PORT) == ESP_OK) &&
|
|
(esp_transport_list_add(client->transport_list, tcp, "http") == ESP_OK)
|
|
);
|
|
if (!_success) {
|
|
ESP_LOGE(TAG, "Error initialize transport");
|
|
goto error;
|
|
}
|
|
|
|
ESP_GOTO_ON_FALSE(init_common_tcp_transport(client, config, tcp), ESP_FAIL, error, TAG, "Failed to set TCP config");
|
|
|
|
#ifdef CONFIG_ESP_HTTP_CLIENT_ENABLE_HTTPS
|
|
esp_transport_handle_t ssl = NULL;
|
|
_success = (
|
|
(ssl = esp_transport_ssl_init()) &&
|
|
(esp_transport_set_default_port(ssl, DEFAULT_HTTPS_PORT) == ESP_OK) &&
|
|
(esp_transport_list_add(client->transport_list, ssl, "https") == ESP_OK)
|
|
);
|
|
|
|
if (!_success) {
|
|
ESP_LOGE(TAG, "Error initialize SSL Transport");
|
|
goto error;
|
|
}
|
|
|
|
ESP_GOTO_ON_FALSE(init_common_tcp_transport(client, config, ssl), ESP_FAIL, error, TAG, "Failed to set SSL config");
|
|
|
|
if (config->crt_bundle_attach != NULL) {
|
|
#ifdef CONFIG_MBEDTLS_CERTIFICATE_BUNDLE
|
|
esp_transport_ssl_crt_bundle_attach(ssl, config->crt_bundle_attach);
|
|
#else //CONFIG_MBEDTLS_CERTIFICATE_BUNDLE
|
|
ESP_LOGE(TAG, "use_crt_bundle configured but not enabled in menuconfig: Please enable MBEDTLS_CERTIFICATE_BUNDLE option");
|
|
#endif
|
|
} else if (config->use_global_ca_store == true) {
|
|
esp_transport_ssl_enable_global_ca_store(ssl);
|
|
} else if (config->cert_pem) {
|
|
if (!config->cert_len) {
|
|
esp_transport_ssl_set_cert_data(ssl, config->cert_pem, strlen(config->cert_pem));
|
|
} else {
|
|
esp_transport_ssl_set_cert_data_der(ssl, config->cert_pem, config->cert_len);
|
|
}
|
|
}
|
|
|
|
if (config->client_cert_pem) {
|
|
if (!config->client_cert_len) {
|
|
esp_transport_ssl_set_client_cert_data(ssl, config->client_cert_pem, strlen(config->client_cert_pem));
|
|
} else {
|
|
esp_transport_ssl_set_client_cert_data_der(ssl, config->client_cert_pem, config->client_cert_len);
|
|
}
|
|
}
|
|
esp_transport_ssl_set_tls_version(ssl, config->tls_version);
|
|
|
|
#if CONFIG_ESP_TLS_USE_SECURE_ELEMENT
|
|
if (config->use_secure_element) {
|
|
esp_transport_ssl_use_secure_element(ssl);
|
|
}
|
|
#endif
|
|
|
|
#if CONFIG_ESP_TLS_USE_DS_PERIPHERAL
|
|
if (config->ds_data != NULL) {
|
|
esp_transport_ssl_set_ds_data(ssl, config->ds_data);
|
|
}
|
|
#endif
|
|
|
|
#if CONFIG_ESP_TLS_CLIENT_SESSION_TICKETS
|
|
if (config->save_client_session) {
|
|
client->session_ticket_state = SESSION_TICKET_NOT_SAVED;
|
|
}
|
|
#endif
|
|
|
|
#if CONFIG_ESP_HTTP_CLIENT_ENABLE_CUSTOM_TRANSPORT
|
|
if (config->transport) {
|
|
client->transport = config->transport;
|
|
}
|
|
#endif
|
|
|
|
if (config->client_key_pem) {
|
|
if (!config->client_key_len) {
|
|
esp_transport_ssl_set_client_key_data(ssl, config->client_key_pem, strlen(config->client_key_pem));
|
|
} else {
|
|
esp_transport_ssl_set_client_key_data_der(ssl, config->client_key_pem, config->client_key_len);
|
|
}
|
|
}
|
|
#ifdef CONFIG_MBEDTLS_HARDWARE_ECDSA_SIGN
|
|
if (config->use_ecdsa_peripheral) {
|
|
esp_transport_ssl_set_client_key_ecdsa_peripheral(ssl, config->ecdsa_key_efuse_blk);
|
|
}
|
|
#endif
|
|
if (config->client_key_password && config->client_key_password_len > 0) {
|
|
esp_transport_ssl_set_client_key_password(ssl, config->client_key_password, config->client_key_password_len);
|
|
}
|
|
|
|
if (config->skip_cert_common_name_check) {
|
|
esp_transport_ssl_skip_common_name_check(ssl);
|
|
}
|
|
|
|
if (config->common_name) {
|
|
esp_transport_ssl_set_common_name(ssl, config->common_name);
|
|
}
|
|
#endif
|
|
|
|
if (_set_config(client, config) != ESP_OK) {
|
|
ESP_LOGE(TAG, "Error set configurations");
|
|
goto error;
|
|
}
|
|
_success = (
|
|
(client->request->buffer->data = malloc(client->buffer_size_tx)) &&
|
|
(client->response->buffer->data = malloc(client->buffer_size_rx))
|
|
);
|
|
|
|
if (!_success) {
|
|
ESP_LOGE(TAG, "Allocation failed");
|
|
goto error;
|
|
}
|
|
|
|
const char *user_agent = config->user_agent == NULL ? DEFAULT_HTTP_USER_AGENT : config->user_agent;
|
|
|
|
if (config->host != NULL && config->path != NULL) {
|
|
if (client->connection_info.host == NULL) {
|
|
ESP_LOGE(TAG, "invalid host");
|
|
goto error;
|
|
}
|
|
host_name = _get_host_header(client->connection_info.host, client->connection_info.port);
|
|
if (host_name == NULL) {
|
|
ESP_LOGE(TAG, "Failed to allocate memory for host header");
|
|
goto error;
|
|
}
|
|
_success = (
|
|
(esp_http_client_set_header(client, "User-Agent", user_agent) == ESP_OK) &&
|
|
(esp_http_client_set_header(client, "Host", host_name) == ESP_OK)
|
|
);
|
|
free(host_name);
|
|
if (!_success) {
|
|
ESP_LOGE(TAG, "Error while setting default configurations");
|
|
goto error;
|
|
}
|
|
} else if (config->url != NULL) {
|
|
if (esp_http_client_set_url(client, config->url) != ESP_OK) {
|
|
ESP_LOGE(TAG, "Failed to set URL");
|
|
goto error;
|
|
}
|
|
if (client->connection_info.host == NULL) {
|
|
ESP_LOGE(TAG, "invalid host");
|
|
goto error;
|
|
}
|
|
host_name = _get_host_header(client->connection_info.host, client->connection_info.port);
|
|
if (host_name == NULL) {
|
|
ESP_LOGE(TAG, "Failed to allocate memory for host header");
|
|
goto error;
|
|
}
|
|
|
|
_success = (
|
|
(esp_http_client_set_header(client, "User-Agent", user_agent) == ESP_OK) &&
|
|
(esp_http_client_set_header(client, "Host", host_name) == ESP_OK)
|
|
);
|
|
|
|
free(host_name);
|
|
if (!_success) {
|
|
ESP_LOGE(TAG, "Error while setting default configurations");
|
|
goto error;
|
|
}
|
|
} else {
|
|
ESP_LOGE(TAG, "config should have either URL or host & path");
|
|
goto error;
|
|
}
|
|
|
|
/* As default behavior, cache data received in fetch header state. This will be
|
|
* used in esp_http_client_read API only. For esp_http_perform we shall disable
|
|
* this as data will be processed by event handler */
|
|
client->cache_data_in_fetch_hdr = 1;
|
|
|
|
client->parser_settings->on_message_begin = http_on_message_begin;
|
|
client->parser_settings->on_url = http_on_url;
|
|
client->parser_settings->on_status = http_on_status;
|
|
client->parser_settings->on_header_field = http_on_header_field;
|
|
client->parser_settings->on_header_value = http_on_header_value;
|
|
client->parser_settings->on_headers_complete = http_on_headers_complete;
|
|
client->parser_settings->on_body = http_on_body;
|
|
client->parser_settings->on_message_complete = http_on_message_complete;
|
|
client->parser_settings->on_chunk_complete = http_on_chunk_complete;
|
|
client->parser_settings->on_chunk_header = http_on_chunk_header;
|
|
client->parser->data = client;
|
|
client->event.client = client;
|
|
|
|
client->state = HTTP_STATE_INIT;
|
|
|
|
if (ret == ESP_OK) {
|
|
return client;
|
|
}
|
|
|
|
error:
|
|
esp_http_client_cleanup(client);
|
|
return NULL;
|
|
}
|
|
|
|
static void esp_http_client_cached_buf_cleanup(esp_http_buffer_t *res_buffer)
|
|
{
|
|
/* Free cached data if any, that was received during fetch header stage */
|
|
if (res_buffer && res_buffer->orig_raw_data) {
|
|
free(res_buffer->orig_raw_data);
|
|
res_buffer->orig_raw_data = NULL;
|
|
res_buffer->raw_data = NULL;
|
|
res_buffer->raw_len = 0;
|
|
}
|
|
}
|
|
|
|
esp_err_t esp_http_client_cleanup(esp_http_client_handle_t client)
|
|
{
|
|
if (client == NULL) {
|
|
return ESP_FAIL;
|
|
}
|
|
esp_http_client_close(client);
|
|
if (client->transport_list) {
|
|
esp_transport_list_destroy(client->transport_list);
|
|
}
|
|
if (client->request) {
|
|
http_header_destroy(client->request->headers);
|
|
if (client->request->buffer) {
|
|
free(client->request->buffer->data);
|
|
}
|
|
free(client->request->buffer);
|
|
free(client->request);
|
|
}
|
|
if (client->response) {
|
|
http_header_destroy(client->response->headers);
|
|
if (client->response->buffer) {
|
|
free(client->response->buffer->data);
|
|
esp_http_client_cached_buf_cleanup(client->response->buffer);
|
|
}
|
|
free(client->response->buffer);
|
|
free(client->response);
|
|
}
|
|
if (client->if_name) {
|
|
free(client->if_name);
|
|
}
|
|
free(client->parser);
|
|
free(client->parser_settings);
|
|
_clear_connection_info(client);
|
|
_clear_auth_data(client);
|
|
free(client->auth_data);
|
|
free(client->current_header_key);
|
|
free(client->location);
|
|
free(client->auth_header);
|
|
free(client);
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_redirection(esp_http_client_handle_t client)
|
|
{
|
|
if (client == NULL) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
if (client->location == NULL) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
ESP_LOGD(TAG, "Redirect to %s", client->location);
|
|
esp_err_t err = esp_http_client_set_url(client, client->location);
|
|
if (err == ESP_OK) {
|
|
client->redirect_counter ++;
|
|
client->process_again = 1; // used only in the blocking mode (when esp_http_client_perform() is called)
|
|
}
|
|
return err;
|
|
}
|
|
|
|
esp_err_t esp_http_client_reset_redirect_counter(esp_http_client_handle_t client)
|
|
{
|
|
if (client == NULL) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
client->redirect_counter = 0;
|
|
return ESP_OK;
|
|
}
|
|
|
|
static esp_err_t esp_http_check_response(esp_http_client_handle_t client)
|
|
{
|
|
if (client->response->status_code >= HttpStatus_Ok && client->response->status_code < HttpStatus_MultipleChoices) {
|
|
client->redirect_counter = 0;
|
|
return ESP_OK;
|
|
}
|
|
if (client->redirect_counter >= client->max_redirection_count) {
|
|
ESP_LOGE(TAG, "Error, reach max_redirection_count count=%d", client->redirect_counter);
|
|
return ESP_ERR_HTTP_MAX_REDIRECT;
|
|
}
|
|
switch (client->response->status_code) {
|
|
case HttpStatus_MovedPermanently:
|
|
case HttpStatus_Found:
|
|
case HttpStatus_SeeOther:
|
|
case HttpStatus_TemporaryRedirect:
|
|
case HttpStatus_PermanentRedirect:
|
|
if (client->disable_auto_redirect) {
|
|
http_dispatch_event(client, HTTP_EVENT_REDIRECT, NULL, 0);
|
|
} else {
|
|
if (esp_http_client_set_redirection(client) != ESP_OK){
|
|
return ESP_FAIL;
|
|
};
|
|
}
|
|
esp_http_client_redirect_event_data_t evt_data = {
|
|
.status_code = client->response->status_code,
|
|
.client = client,
|
|
};
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_REDIRECT, &evt_data, sizeof(esp_http_client_redirect_event_data_t));
|
|
break;
|
|
case HttpStatus_Unauthorized:
|
|
esp_http_client_add_auth(client);
|
|
}
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_url(esp_http_client_handle_t client, const char *url)
|
|
{
|
|
esp_err_t ret = ESP_OK;
|
|
char *old_host = NULL;
|
|
struct http_parser_url purl;
|
|
int old_port;
|
|
|
|
if (client == NULL || url == NULL) {
|
|
ESP_LOGE(TAG, "client or url must not NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
http_parser_url_init(&purl);
|
|
|
|
int parser_status = http_parser_parse_url(url, strlen(url), 0, &purl);
|
|
|
|
if (parser_status != 0) {
|
|
ESP_LOGE(TAG, "Error parse url %s", url);
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
if (client->connection_info.host) {
|
|
old_host = strdup(client->connection_info.host);
|
|
}
|
|
old_port = client->connection_info.port;
|
|
|
|
if (purl.field_data[UF_HOST].len) {
|
|
http_utils_assign_string(&client->connection_info.host, url + purl.field_data[UF_HOST].off, purl.field_data[UF_HOST].len);
|
|
ESP_GOTO_ON_FALSE(client->connection_info.host, ESP_ERR_NO_MEM, error, TAG, "Memory exhausted");
|
|
}
|
|
// Close the connection if host was changed
|
|
if (old_host && client->connection_info.host
|
|
&& strcasecmp(old_host, (const void *)client->connection_info.host) != 0) {
|
|
ESP_LOGD(TAG, "New host assign = %s", client->connection_info.host);
|
|
if (esp_http_client_set_header(client, "Host", client->connection_info.host) != ESP_OK) {
|
|
free(old_host);
|
|
return ESP_ERR_NO_MEM;
|
|
}
|
|
/* Free cached data if any, as we are closing this connection */
|
|
esp_http_client_cached_buf_cleanup(client->response->buffer);
|
|
esp_http_client_close(client);
|
|
}
|
|
|
|
if (old_host) {
|
|
free(old_host);
|
|
old_host = NULL;
|
|
}
|
|
|
|
if (purl.field_data[UF_SCHEMA].len) {
|
|
http_utils_assign_string(&client->connection_info.scheme, url + purl.field_data[UF_SCHEMA].off, purl.field_data[UF_SCHEMA].len);
|
|
ESP_RETURN_ON_FALSE(client->connection_info.scheme, ESP_ERR_NO_MEM, TAG, "Memory exhausted");
|
|
|
|
if (strcasecmp(client->connection_info.scheme, "http") == 0) {
|
|
client->connection_info.port = DEFAULT_HTTP_PORT;
|
|
} else if (strcasecmp(client->connection_info.scheme, "https") == 0) {
|
|
client->connection_info.port = DEFAULT_HTTPS_PORT;
|
|
}
|
|
}
|
|
|
|
if (purl.field_data[UF_PORT].len) {
|
|
client->connection_info.port = strtol((const char*)(url + purl.field_data[UF_PORT].off), NULL, 10);
|
|
}
|
|
|
|
if (old_port != client->connection_info.port) {
|
|
/* Free cached data if any, as we are closing this connection */
|
|
esp_http_client_cached_buf_cleanup(client->response->buffer);
|
|
esp_http_client_close(client);
|
|
}
|
|
|
|
if (purl.field_data[UF_USERINFO].len) {
|
|
char *user_info = NULL;
|
|
http_utils_assign_string(&user_info, url + purl.field_data[UF_USERINFO].off, purl.field_data[UF_USERINFO].len);
|
|
if (user_info) {
|
|
char *username = user_info;
|
|
char *password = strchr(user_info, ':');
|
|
if (password) {
|
|
*password = 0;
|
|
password ++;
|
|
http_utils_assign_string(&client->connection_info.password, password, -1);
|
|
ESP_RETURN_ON_FALSE(client->connection_info.password, ESP_ERR_NO_MEM, TAG, "Memory exhausted");
|
|
}
|
|
http_utils_assign_string(&client->connection_info.username, username, -1);
|
|
ESP_RETURN_ON_FALSE(client->connection_info.username, ESP_ERR_NO_MEM, TAG, "Memory exhausted");
|
|
free(user_info);
|
|
} else {
|
|
return ESP_ERR_NO_MEM;
|
|
}
|
|
}
|
|
|
|
//Reset path and query if there are no information
|
|
if (purl.field_data[UF_PATH].len) {
|
|
http_utils_assign_string(&client->connection_info.path, url + purl.field_data[UF_PATH].off, purl.field_data[UF_PATH].len);
|
|
} else {
|
|
http_utils_assign_string(&client->connection_info.path, "/", -1);
|
|
}
|
|
ESP_RETURN_ON_FALSE(client->connection_info.path, ESP_ERR_NO_MEM, TAG, "Memory exhausted");
|
|
|
|
if (purl.field_data[UF_QUERY].len) {
|
|
http_utils_assign_string(&client->connection_info.query, url + purl.field_data[UF_QUERY].off, purl.field_data[UF_QUERY].len);
|
|
ESP_RETURN_ON_FALSE(client->connection_info.query, ESP_ERR_NO_MEM, TAG, "Memory exhausted");
|
|
} else if (client->connection_info.query) {
|
|
free(client->connection_info.query);
|
|
client->connection_info.query = NULL;
|
|
}
|
|
|
|
return ret;
|
|
|
|
error:
|
|
free(old_host);
|
|
return ret;
|
|
}
|
|
|
|
int esp_http_client_get_errno(esp_http_client_handle_t client)
|
|
{
|
|
if (!client) {
|
|
ESP_LOGE(TAG, "Invalid client handle");
|
|
return -1;
|
|
}
|
|
return esp_transport_get_errno(client->transport);
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_method(esp_http_client_handle_t client, esp_http_client_method_t method)
|
|
{
|
|
client->connection_info.method = method;
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_timeout_ms(esp_http_client_handle_t client, int timeout_ms)
|
|
{
|
|
if (client == NULL) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
client->timeout_ms = timeout_ms;
|
|
return ESP_OK;
|
|
}
|
|
|
|
static int esp_http_client_get_data(esp_http_client_handle_t client)
|
|
{
|
|
if (client->state < HTTP_STATE_RES_ON_DATA_START) {
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
if (client->connection_info.method == HTTP_METHOD_HEAD) {
|
|
return 0;
|
|
}
|
|
|
|
esp_http_buffer_t *res_buffer = client->response->buffer;
|
|
|
|
ESP_LOGD(TAG, "data_process=%"PRId64", content_length=%"PRId64, client->response->data_process, client->response->content_length);
|
|
errno = 0;
|
|
int rlen = esp_transport_read(client->transport, res_buffer->data, client->buffer_size_rx, client->timeout_ms);
|
|
if (rlen >= 0) {
|
|
// When tls error is ESP_TLS_ERR_SSL_WANT_READ (-0x6900), esp_trasnport_read returns ERR_TCP_TRANSPORT_CONNECTION_TIMEOUT (0x0).
|
|
// We should not execute http_parser_execute() on this condition as it sets the internal state machine in an
|
|
// invalid state.
|
|
if (!(client->is_async && rlen == 0)) {
|
|
http_parser_execute(client->parser, client->parser_settings, res_buffer->data, rlen);
|
|
}
|
|
}
|
|
return rlen;
|
|
}
|
|
|
|
bool esp_http_client_is_complete_data_received(esp_http_client_handle_t client)
|
|
{
|
|
if (client->response->is_chunked) {
|
|
if (!client->is_chunk_complete) {
|
|
ESP_LOGD(TAG, "Chunks were not completely read");
|
|
return false;
|
|
}
|
|
} else {
|
|
if (client->response->data_process != client->response->content_length) {
|
|
ESP_LOGD(TAG, "Data processed %"PRId64" != Data specified in content length %"PRId64, client->response->data_process, client->response->content_length);
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
int esp_http_client_read(esp_http_client_handle_t client, char *buffer, int len)
|
|
{
|
|
esp_http_buffer_t *res_buffer = client->response->buffer;
|
|
|
|
int rlen = ESP_FAIL, ridx = 0;
|
|
if (res_buffer->raw_len) {
|
|
int remain_len = client->response->buffer->raw_len;
|
|
if (remain_len > len) {
|
|
remain_len = len;
|
|
}
|
|
memcpy(buffer, res_buffer->raw_data, remain_len);
|
|
res_buffer->raw_len -= remain_len;
|
|
res_buffer->raw_data += remain_len;
|
|
ridx = remain_len;
|
|
if (res_buffer->raw_len == 0) {
|
|
esp_http_client_cached_buf_cleanup(res_buffer);
|
|
}
|
|
}
|
|
int need_read = len - ridx;
|
|
bool is_data_remain = true;
|
|
while (need_read > 0 && is_data_remain) {
|
|
if (client->response->is_chunked) {
|
|
is_data_remain = !client->is_chunk_complete;
|
|
} else {
|
|
is_data_remain = client->response->data_process < client->response->content_length;
|
|
}
|
|
ESP_LOGD(TAG, "is_data_remain=%d, is_chunked=%d, content_length=%"PRId64, is_data_remain, client->response->is_chunked, client->response->content_length);
|
|
if (!is_data_remain) {
|
|
break;
|
|
}
|
|
int byte_to_read = need_read;
|
|
if (byte_to_read > client->buffer_size_rx) {
|
|
byte_to_read = client->buffer_size_rx;
|
|
}
|
|
errno = 0;
|
|
rlen = esp_transport_read(client->transport, res_buffer->data, byte_to_read, client->timeout_ms);
|
|
ESP_LOGD(TAG, "need_read=%d, byte_to_read=%d, rlen=%d, ridx=%d", need_read, byte_to_read, rlen, ridx);
|
|
|
|
if (rlen <= 0) {
|
|
if (errno != 0) {
|
|
esp_log_level_t sev = ESP_LOG_WARN;
|
|
/* Check for cleanly closed connection */
|
|
if (rlen == ERR_TCP_TRANSPORT_CONNECTION_CLOSED_BY_FIN && client->response->is_chunked) {
|
|
/* Explicit call to parser for invoking `message_complete` callback */
|
|
http_parser_execute(client->parser, client->parser_settings, res_buffer->data, 0);
|
|
/* ...and lowering the message severity, as closed connection from server side is expected in chunked transport */
|
|
sev = ESP_LOG_DEBUG;
|
|
}
|
|
ESP_LOG_LEVEL(sev, TAG, "esp_transport_read returned:%d and errno:%d ", rlen, errno);
|
|
}
|
|
|
|
if (rlen == ERR_TCP_TRANSPORT_CONNECTION_TIMEOUT) {
|
|
ESP_LOGD(TAG, "Connection timed out before data was ready!");
|
|
/* Returning the number of bytes read upto the point where connection timed out */
|
|
if (ridx) {
|
|
return ridx;
|
|
}
|
|
return -ESP_ERR_HTTP_EAGAIN;
|
|
}
|
|
|
|
if (rlen != ERR_TCP_TRANSPORT_CONNECTION_CLOSED_BY_FIN) {
|
|
esp_err_t err = esp_transport_translate_error(rlen);
|
|
ESP_LOGE(TAG, "transport_read: error - %d | %s", err, esp_err_to_name(err));
|
|
}
|
|
|
|
if (rlen < 0 && ridx == 0 && !esp_http_client_is_complete_data_received(client)) {
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return ESP_FAIL;
|
|
}
|
|
return ridx;
|
|
}
|
|
res_buffer->output_ptr = buffer + ridx;
|
|
http_parser_execute(client->parser, client->parser_settings, res_buffer->data, rlen);
|
|
ridx += res_buffer->raw_len;
|
|
need_read -= res_buffer->raw_len;
|
|
|
|
res_buffer->raw_len = 0; //clear
|
|
res_buffer->output_ptr = NULL;
|
|
}
|
|
|
|
return ridx;
|
|
}
|
|
|
|
esp_err_t esp_http_client_perform(esp_http_client_handle_t client)
|
|
{
|
|
esp_err_t err;
|
|
do {
|
|
if (client->process_again) {
|
|
esp_http_client_prepare(client);
|
|
}
|
|
switch (client->state) {
|
|
/* In case of blocking esp_http_client_perform(), the following states will fall through one after the after;
|
|
in case of non-blocking esp_http_client_perform(), if there is an error condition, like EINPROGRESS or EAGAIN,
|
|
then the esp_http_client_perform() API will return ESP_ERR_HTTP_EAGAIN error. The user may call
|
|
esp_http_client_perform API again, and for this reason, we maintain the states */
|
|
case HTTP_STATE_INIT:
|
|
if ((err = esp_http_client_connect(client)) != ESP_OK) {
|
|
if (client->is_async && err == ESP_ERR_HTTP_CONNECTING) {
|
|
return ESP_ERR_HTTP_EAGAIN;
|
|
}
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return err;
|
|
}
|
|
/* falls through */
|
|
case HTTP_STATE_CONNECTED:
|
|
if ((err = esp_http_client_request_send(client, client->post_len)) != ESP_OK) {
|
|
if (client->is_async && errno == EAGAIN) {
|
|
return ESP_ERR_HTTP_EAGAIN;
|
|
}
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return err;
|
|
}
|
|
/* falls through */
|
|
case HTTP_STATE_REQ_COMPLETE_HEADER:
|
|
if ((err = esp_http_client_send_post_data(client)) != ESP_OK) {
|
|
if (client->is_async && errno == EAGAIN) {
|
|
return ESP_ERR_HTTP_EAGAIN;
|
|
}
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return err;
|
|
}
|
|
/* falls through */
|
|
case HTTP_STATE_REQ_COMPLETE_DATA:
|
|
/* Disable caching response body, as data should
|
|
* be handled by application event handler */
|
|
client->cache_data_in_fetch_hdr = 0;
|
|
int64_t ret = esp_http_client_fetch_headers(client);
|
|
if (ret < 0) {
|
|
if ((client->is_async && errno == EAGAIN) || ret == -ESP_ERR_HTTP_EAGAIN) {
|
|
return ESP_ERR_HTTP_EAGAIN;
|
|
}
|
|
/* Enable caching after error condition because next
|
|
* request could be performed using native APIs */
|
|
client->cache_data_in_fetch_hdr = 1;
|
|
if (esp_transport_get_errno(client->transport) == ENOTCONN) {
|
|
ESP_LOGW(TAG, "Close connection due to FIN received");
|
|
esp_http_client_close(client);
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return ESP_ERR_HTTP_CONNECTION_CLOSED;
|
|
}
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return ESP_ERR_HTTP_FETCH_HEADER;
|
|
}
|
|
/* falls through */
|
|
case HTTP_STATE_RES_ON_DATA_START:
|
|
/* Enable caching after fetch headers state because next
|
|
* request could be performed using native APIs */
|
|
client->cache_data_in_fetch_hdr = 1;
|
|
if ((err = esp_http_check_response(client)) != ESP_OK) {
|
|
ESP_LOGE(TAG, "Error response");
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return err;
|
|
}
|
|
while (client->response->is_chunked && !client->is_chunk_complete) {
|
|
if (esp_http_client_get_data(client) <= 0) {
|
|
if (client->is_async && errno == EAGAIN) {
|
|
return ESP_ERR_HTTP_EAGAIN;
|
|
}
|
|
ESP_LOGD(TAG, "Read finish or server requests close");
|
|
break;
|
|
}
|
|
}
|
|
while (client->response->data_process < client->response->content_length) {
|
|
if (esp_http_client_get_data(client) <= 0) {
|
|
if (client->is_async && errno == EAGAIN) {
|
|
return ESP_ERR_HTTP_EAGAIN;
|
|
}
|
|
ESP_LOGD(TAG, "Read finish or server requests close");
|
|
break;
|
|
}
|
|
}
|
|
http_dispatch_event(client, HTTP_EVENT_ON_FINISH, NULL, 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ON_FINISH, &client, sizeof(esp_http_client_handle_t));
|
|
|
|
client->response->buffer->raw_len = 0;
|
|
if (!http_should_keep_alive(client->parser)) {
|
|
ESP_LOGD(TAG, "Close connection");
|
|
esp_http_client_close(client);
|
|
} else {
|
|
if (client->state > HTTP_STATE_CONNECTED) {
|
|
client->state = HTTP_STATE_CONNECTED;
|
|
client->first_line_prepared = false;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
} while (client->process_again);
|
|
return ESP_OK;
|
|
}
|
|
|
|
int64_t esp_http_client_fetch_headers(esp_http_client_handle_t client)
|
|
{
|
|
if (client->state < HTTP_STATE_REQ_COMPLETE_HEADER) {
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
client->state = HTTP_STATE_REQ_COMPLETE_DATA;
|
|
esp_http_buffer_t *buffer = client->response->buffer;
|
|
client->response->status_code = -1;
|
|
|
|
while (client->state < HTTP_STATE_RES_COMPLETE_HEADER) {
|
|
errno = 0;
|
|
buffer->len = esp_transport_read(client->transport, buffer->data, client->buffer_size_rx, client->timeout_ms);
|
|
if (buffer->len <= 0) {
|
|
if (buffer->len == ERR_TCP_TRANSPORT_CONNECTION_TIMEOUT) {
|
|
ESP_LOGW(TAG, "Connection timed out before data was ready!");
|
|
return -ESP_ERR_HTTP_EAGAIN;
|
|
}
|
|
return ESP_FAIL;
|
|
}
|
|
http_parser_execute(client->parser, client->parser_settings, buffer->data, buffer->len);
|
|
}
|
|
client->state = HTTP_STATE_RES_ON_DATA_START;
|
|
ESP_LOGD(TAG, "content_length = %"PRId64, client->response->content_length);
|
|
if (client->response->content_length <= 0) {
|
|
client->response->is_chunked = true;
|
|
return 0;
|
|
}
|
|
return client->response->content_length;
|
|
}
|
|
|
|
static esp_err_t esp_http_client_connect(esp_http_client_handle_t client)
|
|
{
|
|
esp_err_t err;
|
|
|
|
if (client->state == HTTP_STATE_UNINIT) {
|
|
ESP_LOGE(TAG, "Client has not been initialized");
|
|
return ESP_ERR_INVALID_STATE;
|
|
}
|
|
|
|
if ((err = esp_http_client_prepare(client)) != ESP_OK) {
|
|
ESP_LOGE(TAG, "Failed to initialize request data");
|
|
esp_http_client_close(client);
|
|
return err;
|
|
}
|
|
|
|
if (client->state < HTTP_STATE_CONNECTED) {
|
|
#ifdef CONFIG_ESP_HTTP_CLIENT_ENABLE_CUSTOM_TRANSPORT
|
|
// If the custom transport is enabled and defined, we skip the selection of appropriate transport from the list
|
|
// based on the scheme, since we already have the transport
|
|
if (!client->transport)
|
|
#endif
|
|
{
|
|
ESP_LOGD(TAG, "Begin connect to: %s://%s:%d", client->connection_info.scheme, client->connection_info.host, client->connection_info.port);
|
|
client->transport = esp_transport_list_get_transport(client->transport_list, client->connection_info.scheme);
|
|
}
|
|
|
|
#ifdef CONFIG_ESP_TLS_CLIENT_SESSION_TICKETS
|
|
if (client->session_ticket_state == SESSION_TICKET_SAVED) {
|
|
esp_transport_ssl_session_ticket_operation(client->transport, ESP_TRANSPORT_SESSION_TICKET_USE);
|
|
}
|
|
#endif
|
|
if (client->transport == NULL) {
|
|
ESP_LOGE(TAG, "No transport found");
|
|
#ifndef CONFIG_ESP_HTTP_CLIENT_ENABLE_HTTPS
|
|
if (strcasecmp(client->connection_info.scheme, "https") == 0) {
|
|
ESP_LOGE(TAG, "Please enable HTTPS at menuconfig to allow requesting via https");
|
|
}
|
|
#endif
|
|
return ESP_ERR_HTTP_INVALID_TRANSPORT;
|
|
}
|
|
if (!client->is_async) {
|
|
if (esp_transport_connect(client->transport, client->connection_info.host, client->connection_info.port, client->timeout_ms) < 0) {
|
|
ESP_LOGE(TAG, "Connection failed, sock < 0");
|
|
return ESP_ERR_HTTP_CONNECT;
|
|
}
|
|
} else {
|
|
int ret = esp_transport_connect_async(client->transport, client->connection_info.host, client->connection_info.port, client->timeout_ms);
|
|
if (ret == ASYNC_TRANS_CONNECT_FAIL) {
|
|
ESP_LOGE(TAG, "Connection failed");
|
|
if (strcasecmp(client->connection_info.scheme, "http") == 0) {
|
|
ESP_LOGE(TAG, "Asynchronous mode doesn't work for HTTP based connection");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
return ESP_ERR_HTTP_CONNECT;
|
|
} else if (ret == ASYNC_TRANS_CONNECTING) {
|
|
ESP_LOGD(TAG, "Connection not yet established");
|
|
return ESP_ERR_HTTP_CONNECTING;
|
|
}
|
|
}
|
|
client->state = HTTP_STATE_CONNECTED;
|
|
http_dispatch_event(client, HTTP_EVENT_ON_CONNECTED, NULL, 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ON_CONNECTED, &client, sizeof(esp_http_client_handle_t));
|
|
#ifdef CONFIG_ESP_TLS_CLIENT_SESSION_TICKETS
|
|
if (client->session_ticket_state != SESSION_TICKET_UNUSED) {
|
|
esp_transport_ssl_session_ticket_operation(client->transport, ESP_TRANSPORT_SESSION_TICKET_SAVE);
|
|
client->session_ticket_state = SESSION_TICKET_SAVED;
|
|
}
|
|
#endif
|
|
|
|
}
|
|
return ESP_OK;
|
|
}
|
|
|
|
static int http_client_prepare_first_line(esp_http_client_handle_t client, int write_len)
|
|
{
|
|
if (write_len >= 0) {
|
|
http_header_set_format(client->request->headers, "Content-Length", "%d", write_len);
|
|
} else {
|
|
esp_http_client_set_header(client, "Transfer-Encoding", "chunked");
|
|
}
|
|
|
|
const char *method = HTTP_METHOD_MAPPING[client->connection_info.method];
|
|
|
|
int first_line_len = snprintf(client->request->buffer->data,
|
|
client->buffer_size_tx, "%s %s",
|
|
method,
|
|
client->connection_info.path);
|
|
if (first_line_len >= client->buffer_size_tx) {
|
|
ESP_LOGE(TAG, "Out of buffer");
|
|
return -1;
|
|
}
|
|
|
|
if (client->connection_info.query) {
|
|
first_line_len += snprintf(client->request->buffer->data + first_line_len,
|
|
client->buffer_size_tx - first_line_len, "?%s", client->connection_info.query);
|
|
if (first_line_len >= client->buffer_size_tx) {
|
|
ESP_LOGE(TAG, "Out of buffer");
|
|
return -1;
|
|
|
|
}
|
|
}
|
|
first_line_len += snprintf(client->request->buffer->data + first_line_len,
|
|
client->buffer_size_tx - first_line_len, " %s\r\n", DEFAULT_HTTP_PROTOCOL);
|
|
if (first_line_len >= client->buffer_size_tx) {
|
|
ESP_LOGE(TAG, "Out of buffer");
|
|
return -1;
|
|
}
|
|
return first_line_len;
|
|
}
|
|
|
|
static esp_err_t esp_http_client_request_send(esp_http_client_handle_t client, int write_len)
|
|
{
|
|
int first_line_len = 0;
|
|
if (!client->first_line_prepared) {
|
|
if ((first_line_len = http_client_prepare_first_line(client, write_len)) < 0) {
|
|
return first_line_len;
|
|
}
|
|
client->first_line_prepared = true;
|
|
client->header_index = 0;
|
|
client->data_written_index = 0;
|
|
client->data_write_left = 0;
|
|
}
|
|
|
|
if (client->data_write_left > 0) {
|
|
/* sending leftover data from previous call to esp_http_client_request_send() API */
|
|
int wret = 0;
|
|
if (((wret = esp_http_client_write(client, client->request->buffer->data + client->data_written_index, client->data_write_left)) < 0)) {
|
|
ESP_LOGE(TAG, "Error write request");
|
|
return ESP_ERR_HTTP_WRITE_DATA;
|
|
}
|
|
client->data_write_left -= wret;
|
|
client->data_written_index += wret;
|
|
if (client->is_async && client->data_write_left > 0) {
|
|
return ESP_ERR_HTTP_WRITE_DATA; /* In case of EAGAIN error, we return ESP_ERR_HTTP_WRITE_DATA,
|
|
and the handling of EAGAIN should be done in the higher level APIs. */
|
|
}
|
|
}
|
|
|
|
int wlen = client->buffer_size_tx - first_line_len;
|
|
while ((client->header_index = http_header_generate_string(client->request->headers, client->header_index, client->request->buffer->data + first_line_len, &wlen))) {
|
|
if (wlen <= 0) {
|
|
break;
|
|
}
|
|
if (first_line_len) {
|
|
wlen += first_line_len;
|
|
first_line_len = 0;
|
|
}
|
|
client->request->buffer->data[wlen] = 0;
|
|
ESP_LOGD(TAG, "Write header[%d]: %s", client->header_index, client->request->buffer->data);
|
|
|
|
client->data_write_left = wlen;
|
|
client->data_written_index = 0;
|
|
while (client->data_write_left > 0) {
|
|
int wret = esp_transport_write(client->transport, client->request->buffer->data + client->data_written_index, client->data_write_left, client->timeout_ms);
|
|
if (wret <= 0) {
|
|
ESP_LOGE(TAG, "Error write request");
|
|
esp_http_client_close(client);
|
|
return ESP_ERR_HTTP_WRITE_DATA;
|
|
}
|
|
client->data_write_left -= wret;
|
|
client->data_written_index += wret;
|
|
}
|
|
wlen = client->buffer_size_tx;
|
|
}
|
|
|
|
client->data_written_index = 0;
|
|
client->data_write_left = client->post_len;
|
|
client->state = HTTP_STATE_REQ_COMPLETE_HEADER;
|
|
http_dispatch_event(client, HTTP_EVENT_HEADERS_SENT, NULL, 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_HEADERS_SENT, &client, sizeof(esp_http_client_handle_t));
|
|
return ESP_OK;
|
|
}
|
|
|
|
static esp_err_t esp_http_client_send_post_data(esp_http_client_handle_t client)
|
|
{
|
|
if (client->state != HTTP_STATE_REQ_COMPLETE_HEADER) {
|
|
ESP_LOGE(TAG, "Invalid state");
|
|
return ESP_ERR_INVALID_STATE;
|
|
}
|
|
if (!(client->post_data && client->post_len)) {
|
|
goto success;
|
|
}
|
|
|
|
int wret = esp_http_client_write(client, client->post_data + client->data_written_index, client->data_write_left);
|
|
if (wret < 0) {
|
|
return wret;
|
|
}
|
|
client->data_write_left -= wret;
|
|
client->data_written_index += wret;
|
|
|
|
if (client->data_write_left <= 0) {
|
|
goto success;
|
|
} else {
|
|
return ESP_ERR_HTTP_WRITE_DATA;
|
|
}
|
|
|
|
success:
|
|
client->state = HTTP_STATE_REQ_COMPLETE_DATA;
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_open(esp_http_client_handle_t client, int write_len)
|
|
{
|
|
client->post_len = write_len;
|
|
esp_err_t err;
|
|
if ((err = esp_http_client_connect(client)) != ESP_OK) {
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return err;
|
|
}
|
|
if ((err = esp_http_client_request_send(client, write_len)) != ESP_OK) {
|
|
http_dispatch_event(client, HTTP_EVENT_ERROR, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_ERROR, &client, sizeof(esp_http_client_handle_t));
|
|
return err;
|
|
}
|
|
return ESP_OK;
|
|
}
|
|
|
|
int esp_http_client_write(esp_http_client_handle_t client, const char *buffer, int len)
|
|
{
|
|
if (client->state < HTTP_STATE_REQ_COMPLETE_HEADER) {
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
int wlen = 0, widx = 0;
|
|
while (len > 0) {
|
|
wlen = esp_transport_write(client->transport, buffer + widx, len, client->timeout_ms);
|
|
/* client->async_block is initialised in case of non-blocking IO, and in this case we return how
|
|
much ever data was written by the esp_transport_write() API. */
|
|
if (client->is_async || wlen <= 0) {
|
|
return wlen;
|
|
}
|
|
widx += wlen;
|
|
len -= wlen;
|
|
}
|
|
return widx;
|
|
}
|
|
|
|
esp_err_t esp_http_client_close(esp_http_client_handle_t client)
|
|
{
|
|
if (client->state >= HTTP_STATE_INIT) {
|
|
http_dispatch_event(client, HTTP_EVENT_DISCONNECTED, esp_transport_get_error_handle(client->transport), 0);
|
|
http_dispatch_event_to_event_loop(HTTP_EVENT_DISCONNECTED, &client, sizeof(esp_http_client_handle_t));
|
|
client->state = HTTP_STATE_INIT;
|
|
return esp_transport_close(client->transport);
|
|
}
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_post_field(esp_http_client_handle_t client, const char *data, int len)
|
|
{
|
|
esp_err_t err = ESP_OK;
|
|
client->post_data = (char *)data;
|
|
client->post_len = len;
|
|
ESP_LOGD(TAG, "set post file length = %d", len);
|
|
if (client->post_data) {
|
|
char *value = NULL;
|
|
if ((err = esp_http_client_get_header(client, "Content-Type", &value)) != ESP_OK) {
|
|
return err;
|
|
}
|
|
if (value == NULL) {
|
|
err = esp_http_client_set_header(client, "Content-Type", "application/x-www-form-urlencoded");
|
|
}
|
|
} else {
|
|
client->post_len = 0;
|
|
err = esp_http_client_set_header(client, "Content-Type", NULL);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
int esp_http_client_get_post_field(esp_http_client_handle_t client, char **data)
|
|
{
|
|
if (client->post_data) {
|
|
*data = client->post_data;
|
|
return client->post_len;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int esp_http_client_get_status_code(esp_http_client_handle_t client)
|
|
{
|
|
return client->response->status_code;
|
|
}
|
|
|
|
int64_t esp_http_client_get_content_length(esp_http_client_handle_t client)
|
|
{
|
|
return client->response->content_length;
|
|
}
|
|
|
|
bool esp_http_client_is_chunked_response(esp_http_client_handle_t client)
|
|
{
|
|
return client->response->is_chunked;
|
|
}
|
|
|
|
esp_http_client_transport_t esp_http_client_get_transport_type(esp_http_client_handle_t client)
|
|
{
|
|
if (!strcasecmp(client->connection_info.scheme, "https") ) {
|
|
return HTTP_TRANSPORT_OVER_SSL;
|
|
} else if (!strcasecmp(client->connection_info.scheme, "http")) {
|
|
return HTTP_TRANSPORT_OVER_TCP;
|
|
} else {
|
|
return HTTP_TRANSPORT_UNKNOWN;
|
|
}
|
|
}
|
|
|
|
esp_err_t esp_http_client_set_auth_data(esp_http_client_handle_t client, const char *auth_data, int len)
|
|
{
|
|
if (client == NULL || auth_data == NULL || len <= 0) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
http_utils_append_string(&client->auth_header, auth_data, len);
|
|
return ESP_OK;
|
|
}
|
|
|
|
void esp_http_client_add_auth(esp_http_client_handle_t client)
|
|
{
|
|
if (client == NULL) {
|
|
return;
|
|
}
|
|
if (client->state != HTTP_STATE_RES_ON_DATA_START) {
|
|
return;
|
|
}
|
|
if (client->redirect_counter >= client->max_authorization_retries) {
|
|
ESP_LOGE(TAG, "Error, reached max_authorization_retries count=%d", client->redirect_counter);
|
|
return;
|
|
}
|
|
|
|
char *auth_header = client->auth_header;
|
|
if (auth_header) {
|
|
http_utils_trim_whitespace(&auth_header);
|
|
ESP_LOGD(TAG, "UNAUTHORIZED: %s", auth_header);
|
|
client->redirect_counter++;
|
|
#ifdef CONFIG_ESP_HTTP_CLIENT_ENABLE_DIGEST_AUTH
|
|
if (http_utils_str_starts_with(auth_header, "Digest") == 0) {
|
|
ESP_LOGD(TAG, "type = Digest");
|
|
client->connection_info.auth_type = HTTP_AUTH_TYPE_DIGEST;
|
|
} else {
|
|
#endif
|
|
#ifdef CONFIG_ESP_HTTP_CLIENT_ENABLE_BASIC_AUTH
|
|
if (http_utils_str_starts_with(auth_header, "Basic") == 0) {
|
|
ESP_LOGD(TAG, "type = Basic");
|
|
client->connection_info.auth_type = HTTP_AUTH_TYPE_BASIC;
|
|
} else {
|
|
#endif
|
|
client->connection_info.auth_type = HTTP_AUTH_TYPE_NONE;
|
|
ESP_LOGE(TAG, "This authentication method is not supported: %s", auth_header);
|
|
return;
|
|
#ifdef CONFIG_ESP_HTTP_CLIENT_ENABLE_BASIC_AUTH
|
|
}
|
|
#endif
|
|
#ifdef CONFIG_ESP_HTTP_CLIENT_ENABLE_DIGEST_AUTH
|
|
}
|
|
#endif
|
|
|
|
_clear_auth_data(client);
|
|
|
|
client->auth_data->method = strdup(HTTP_METHOD_MAPPING[client->connection_info.method]);
|
|
|
|
client->auth_data->nc = 1;
|
|
client->auth_data->realm = http_utils_get_string_between(auth_header, "realm=\"", "\"");
|
|
client->auth_data->algorithm = http_utils_get_string_between(auth_header, "algorithm=", ",");
|
|
if (client->auth_data->algorithm == NULL) {
|
|
client->auth_data->algorithm = http_utils_get_string_after(auth_header, "algorithm=");
|
|
}
|
|
if (client->auth_data->algorithm == NULL) {
|
|
client->auth_data->algorithm = strdup("MD5");
|
|
}
|
|
client->auth_data->qop = http_utils_get_string_between(auth_header, "qop=\"", "\"");
|
|
client->auth_data->nonce = http_utils_get_string_between(auth_header, "nonce=\"", "\"");
|
|
client->auth_data->opaque = http_utils_get_string_between(auth_header, "opaque=\"", "\"");
|
|
client->process_again = 1;
|
|
} else {
|
|
client->connection_info.auth_type = HTTP_AUTH_TYPE_NONE;
|
|
ESP_LOGW(TAG, "This request requires authentication, but does not provide header information for that");
|
|
}
|
|
}
|
|
|
|
int esp_http_client_read_response(esp_http_client_handle_t client, char *buffer, int len)
|
|
{
|
|
int read_len = 0;
|
|
while (read_len < len) {
|
|
int data_read = esp_http_client_read(client, buffer + read_len, len - read_len);
|
|
if (data_read <= 0) {
|
|
return read_len;
|
|
}
|
|
read_len += data_read;
|
|
}
|
|
return read_len;
|
|
}
|
|
|
|
esp_err_t esp_http_client_flush_response(esp_http_client_handle_t client, int *len)
|
|
{
|
|
if (client == NULL) {
|
|
ESP_LOGE(TAG, "client must not be NULL");
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
int read_len = 0;
|
|
while (!esp_http_client_is_complete_data_received(client)) {
|
|
int data_read = esp_http_client_get_data(client);
|
|
if (data_read < 0) {
|
|
return ESP_FAIL;
|
|
}
|
|
read_len += data_read;
|
|
}
|
|
if (len) {
|
|
*len = read_len;
|
|
}
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t esp_http_client_get_url(esp_http_client_handle_t client, char *url, const int len)
|
|
{
|
|
if (client == NULL || url == NULL) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
if (client->connection_info.host && client->connection_info.scheme && client->connection_info.path) {
|
|
snprintf(url, len, "%s://%s%s", client->connection_info.scheme, client->connection_info.host, client->connection_info.path);
|
|
return ESP_OK;
|
|
} else {
|
|
ESP_LOGE(TAG, "Failed to get URL");
|
|
}
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
esp_err_t esp_http_client_get_chunk_length(esp_http_client_handle_t client, int *len)
|
|
{
|
|
if (client == NULL || len == NULL) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
if (esp_http_client_is_chunked_response(client)) {
|
|
*len = client->response->chunk_length;
|
|
} else {
|
|
ESP_LOGE(TAG, "Response is not chunked");
|
|
return ESP_FAIL;
|
|
}
|
|
return ESP_OK;
|
|
}
|