X-Git-Url: https://gerrit.automotivelinux.org/gerrit/gitweb?a=blobdiff_plain;f=src%2Fafbs-api.c;h=1a3399f9b3999776002e8aa819bb87198f77cd51;hb=1250a56369315c017abfe429c556b863730b9b44;hp=f5a55a43aea3df88f208766f6eef427585b36d84;hpb=e7c246a1b0d30b8156c7033061a61ecb5d2bdfc8;p=src%2Fapp-framework-binder.git diff --git a/src/afbs-api.c b/src/afbs-api.c index f5a55a43..1a3399f9 100644 --- a/src/afbs-api.c +++ b/src/afbs-api.c @@ -27,23 +27,34 @@ typedef struct { // Request Creation of new context if it does not exist -PUBLIC json_object* clientContextCreate (AFB_request *request) { +STATIC json_object* clientContextCreate (AFB_request *request) { json_object *jresp; int res; char *token; AFB_clientCtx *client=request->client; // get client context from request - + // check we do not already have a session - if (client->handle != NULL) { + if ((client != NULL) && (client->ctx != NULL)) { request->errcode=MHD_HTTP_FORBIDDEN; return (jsonNewMessage(AFB_FAIL, "Token exist use refresh")); } - // request a new client context token and check result - ctxTokenCreate (request); + // request a new client context token and check result + if (AFB_UNAUTH == ctxTokenCreate (request)) { + request->errcode=MHD_HTTP_UNAUTHORIZED; + jresp= jsonNewMessage(AFB_FAIL, "No/Invalid initial token provided [should match --token=xxxx]"); + return (jresp); + } + + // request a new client context token and check result + if (AFB_SUCCESS != ctxTokenCreate (request)) { + request->errcode=MHD_HTTP_UNAUTHORIZED; + jresp= jsonNewMessage(AFB_FAIL, "Token Session Not Activated [restart with --token=xxxx]"); + return (jresp); + } - // add a client handle to session - client->handle = malloc (sizeof (MyClientApplicationHandle)); + // add a client context to session + client->ctx = malloc (sizeof (MyClientApplicationHandle)); // Send response to UI jresp = json_object_new_object(); @@ -53,19 +64,16 @@ PUBLIC json_object* clientContextCreate (AFB_request *request) { } // Renew an existing context -PUBLIC json_object* clientContextRefresh (AFB_request *request) { +STATIC json_object* clientContextRefresh (AFB_request *request) { json_object *jresp; - // check we do not already have a session - if (request->client == NULL) return (jsonNewMessage(AFB_FAIL, "No Previous Token use Create")); - // note: we do not need to parse the old token as clientContextRefresh doit for us - if (ctxTokenRefresh (request)) { - jresp = json_object_new_object(); - json_object_object_add(jresp, "token", json_object_new_string (request->client->token)); - } else { + if (AFB_SUCCESS != ctxTokenRefresh (request)) { request->errcode=MHD_HTTP_UNAUTHORIZED; jresp= jsonNewMessage(AFB_FAIL, "Token Exchange Broken Refresh Refused"); + } else { + jresp = json_object_new_object(); + json_object_object_add(jresp, "token", json_object_new_string (request->client->token)); } return (jresp); @@ -73,49 +81,156 @@ PUBLIC json_object* clientContextRefresh (AFB_request *request) { // Verify a context is still valid -PUBLIC json_object* clientContextCheck (AFB_request *request) { - json_object *jresp; - int isvalid; - - // check is token is valid - isvalid= ctxTokenCheck (request); - - // add an error code to respond - if (!isvalid) request->errcode=MHD_HTTP_UNAUTHORIZED; +STATIC json_object* clientContextCheck (AFB_request *request) { - // prepare response for client side application - jresp = json_object_new_object(); - json_object_object_add(jresp, "isvalid", json_object_new_boolean (isvalid)); + json_object *jresp = json_object_new_object(); + // add an error code to respond + if (AFB_SUCCESS != ctxTokenCheck (request)) { + request->errcode=MHD_HTTP_UNAUTHORIZED; + json_object_object_add(jresp, "isvalid", json_object_new_boolean (FALSE)); + } else { + json_object_object_add(jresp, "isvalid", json_object_new_boolean (TRUE)); + } + return (jresp); } + + // Close and Free context -PUBLIC json_object* clientContextReset (AFB_request *request) { +STATIC json_object* clientContextReset (AFB_request *request) { json_object *jresp; - - jresp = json_object_new_object(); - json_object_object_add(jresp, "done", json_object_new_boolean (ctxTokenReset (request))); + + // note: we do not need to parse the old token as clientContextRefresh doit for us + if (AFB_SUCCESS != ctxTokenReset (request)) { + request->errcode=MHD_HTTP_UNAUTHORIZED; + jresp= jsonNewMessage(AFB_FAIL, "No Token Client Context [use --token=xxx]"); + } else { + jresp = json_object_new_object(); + json_object_object_add(jresp, "uuid", json_object_new_string (request->client->uuid)); + } return (jresp); } +// In this case or handle is quite basic +typedef struct { + int fd; +} appPostCtx; + +// This function is call when PostForm processing is completed +STATIC void DonePostForm (AFB_request *request) { + AFB_PostHandle *postHandle = (AFB_PostHandle*)request->post->data; + appPostCtx *appCtx= postHandle->ctx; + + // Close upload file ID + close (appCtx->fd); + + // Free application specific handle + free (postHandle->ctx); + + if (verbose) fprintf (stderr, "DonePostForm upload done\n"); +} + + +// WARNING: PostForm callback are call multiple time (one or each key within form) +// When processing POST_JSON request->data hold a PostHandle and not data directly as for POST_JSON +STATIC json_object* ProcessPostForm (AFB_request *request, AFB_PostItem *item) { + + AFB_PostHandle *postHandle; + appPostCtx *appCtx; + char filepath[512]; + + // When Post is fully processed the same callback is call with a item==NULL + if (item == NULL) { + // Close file, Free handle + + request->errcode = MHD_HTTP_OK; + return(jsonNewMessage(AFB_SUCCESS,"File [%s] uploaded at [%s] error=\n", item->filename, request->config->sessiondir)); + } + + // Let's make sure this is a valid PostForm request + if (!request->post && request->post->type != AFB_POST_FORM) { + request->errcode = MHD_HTTP_FORBIDDEN; + return(jsonNewMessage(AFB_FAIL,"This is not a valid PostForm request\n")); + } else { + // In AFB_POST_FORM case post->data is a PostForm handle + postHandle = (AFB_PostHandle*) request->post->data; + appCtx = (appPostCtx*) postHandle->ctx; + } + + // Check this is a file element + if (0 != strcmp (item->key, "file")) { + request->errcode = MHD_HTTP_FORBIDDEN; + return (jsonNewMessage(AFB_FAIL,"No File within element key=%s\n", item->key)); + } + + // This is the 1st Item iteration let's open output file and allocate necessary resources + if (postHandle->ctx == NULL) { + int fd; + + strncpy (filepath, request->config->sessiondir, sizeof(filepath)); + strncat (filepath, "/", sizeof(filepath)); + strncat (filepath, item->filename, sizeof(filepath)); + + if((fd = open(request->config->sessiondir, O_RDONLY)) < 0) { + request->errcode = MHD_HTTP_FORBIDDEN; + return (jsonNewMessage(AFB_FAIL,"Fail to Upload file [%s] at [%s] error=\n", item->filename, request->config->sessiondir, strerror(errno))); + }; + + // Create an application specific context + appCtx = malloc (sizeof(appPostCtx)); // May place anything here until post->completeCB handle resources liberation + appCtx->fd = fd; + + // attach application to postHandle + postHandle->ctx = (void*) appCtx; // May place anything here until post->completeCB handle resources liberation + postHandle->completeCB = (AFB_apiCB)DonePostForm; // CallBack when Form Processing is finished + + } else { + // this is not the call, FD is already open + appCtx = (appPostCtx*) postHandle->ctx; + } + + // We have something to write + if (item->len > 0) { + + if (!write (appCtx->fd, item->data, item->len)) { + request->errcode = MHD_HTTP_FORBIDDEN; + return (jsonNewMessage(AFB_FAIL,"Fail to write file [%s] at [%s] error=\n", item->filename, strerror(errno))); + } + } + + // every event should return Sucess or Form processing stop + request->errcode = MHD_HTTP_OK; + return NULL; +} + +// This function is call when Client Session Context is removed +// Note: when freeCtxCB==NULL standard free/malloc is called +STATIC void clientContextFree(AFB_clientCtx *client) { + fprintf (stderr,"Plugin[%s] Closing Session uuid=[%s]\n", client->plugin->prefix, client->uuid); + free (client->ctx); +} STATIC AFB_restapi pluginApis[]= { - {"ping" , (AFB_apiCB)apiPingTest ,"Ping Rest Test Service", NULL}, - {"token-create" , (AFB_apiCB)clientContextCreate ,"Request Client Context Creation",NULL}, - {"token-refresh" , (AFB_apiCB)clientContextRefresh,"Refresh Client Context Token",NULL}, - {"token-check" , (AFB_apiCB)clientContextCheck ,"Check Client Context Token",NULL}, - {"token-reset" , (AFB_apiCB)clientContextReset ,"Close Client Context and Free resources",NULL}, - {0,0,0,0} + {"ping" , (AFB_apiCB)apiPingTest ,"Ping Rest Test Service"}, + {"token-create" , (AFB_apiCB)clientContextCreate ,"Request Client Context Creation"}, + {"token-refresh" , (AFB_apiCB)clientContextRefresh,"Refresh Client Context Token"}, + {"token-check" , (AFB_apiCB)clientContextCheck ,"Check Client Context Token"}, + {"token-reset" , (AFB_apiCB)clientContextReset ,"Close Client Context and Free resources"}, + {"file-upload" , (AFB_apiCB)ProcessPostForm ,"Demo for file upload"}, + {NULL} }; PUBLIC AFB_plugin *afsvRegister () { AFB_plugin *plugin = malloc (sizeof (AFB_plugin)); - plugin->type = AFB_PLUGIN; + plugin->type = AFB_PLUGIN_JSON; plugin->info = "Application Framework Binder Service"; plugin->prefix= "afbs"; // url base plugin->apis = pluginApis; + plugin->handle= (void*) "What ever you want"; + plugin->freeCtxCB= (void*) clientContextFree; return (plugin); }; \ No newline at end of file