2021-11-03 20:58:57 +00:00
|
|
|
// Copyright (c) 2020 Cesanta Software Limited
|
|
|
|
// All rights reserved
|
|
|
|
//
|
|
|
|
// Example MQTT client. It performs the following steps:
|
|
|
|
// 1. Connects to the AWS IoT MQTT server
|
|
|
|
// 2. When connected, subscribes to the topic `s_rx_topic`
|
|
|
|
// 3. Publishes message `hello` to the `s_tx_topic` periodically
|
|
|
|
//
|
|
|
|
|
2024-11-10 08:45:34 +00:00
|
|
|
// How to build and run this example:
|
|
|
|
// 1. Login to AWS IoT
|
|
|
|
// 2. Click "Settings" on the left bar, copy the domain, change s_url below
|
|
|
|
// 3. Click Security -> Policies -> Create Policy, fill fields:
|
|
|
|
// Name : PolicyAllow
|
2021-11-03 20:58:57 +00:00
|
|
|
// Action : iot:*
|
|
|
|
// Resource ARN: *
|
|
|
|
// Effect : allow
|
|
|
|
// then, click "Create"
|
2024-11-10 08:45:34 +00:00
|
|
|
// 4. Create EC private key file and CSR (Certificate Signing Request)
|
|
|
|
// type "make csr", see Makefile
|
|
|
|
// 5. Click Security -> Certificates -> Add Certificate -> Create Certificate
|
|
|
|
// Choose "Create certificate with certificate signing request (CSR)"
|
|
|
|
// Choose "crt.csr" created on a previous step
|
|
|
|
// Choose "Active" to activate certificate
|
|
|
|
// Click Create
|
2024-11-12 08:55:46 +00:00
|
|
|
// Attach PolicyAllow policy to the created certificate
|
2024-11-10 08:45:34 +00:00
|
|
|
// Downoad AmazonRootCA1.pem as ca.pem and generated certificate as crt.pem
|
|
|
|
// Select certificate, attach PolicyAllow to it
|
|
|
|
// 6. Type "make" to build and run the example
|
2021-11-03 20:58:57 +00:00
|
|
|
|
2024-11-10 08:45:34 +00:00
|
|
|
static const char *s_url =
|
|
|
|
"mqtts://a1pjwh2bop1ojt-ats.iot.eu-west-1.amazonaws.com";
|
2021-11-03 20:58:57 +00:00
|
|
|
static const char *s_rx_topic = "d/rx";
|
|
|
|
static const char *s_tx_topic = "d/tx";
|
|
|
|
static int s_qos = 1;
|
|
|
|
|
|
|
|
#include "mongoose.h"
|
|
|
|
|
2024-01-08 17:34:34 -03:00
|
|
|
static void fn(struct mg_connection *c, int ev, void *ev_data) {
|
2021-11-03 20:58:57 +00:00
|
|
|
if (ev == MG_EV_OPEN) {
|
|
|
|
// c->is_hexdumping = 1;
|
2023-09-17 09:07:57 +01:00
|
|
|
} else if (ev == MG_EV_CONNECT) {
|
|
|
|
if (mg_url_is_ssl(s_url)) {
|
2024-11-10 08:45:34 +00:00
|
|
|
struct mg_tls_opts opts = {.ca = mg_unpacked("/ca.pem"),
|
|
|
|
.cert = mg_unpacked("/crt.pem"),
|
|
|
|
.key = mg_unpacked("/key.pem"),
|
2023-09-17 09:07:57 +01:00
|
|
|
.name = mg_url_host(s_url)};
|
|
|
|
mg_tls_init(c, &opts);
|
|
|
|
}
|
2021-11-03 20:58:57 +00:00
|
|
|
} else if (ev == MG_EV_ERROR) {
|
|
|
|
// On error, log error message
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_ERROR(("%p %s", c->fd, (char *) ev_data));
|
2021-11-03 20:58:57 +00:00
|
|
|
} else if (ev == MG_EV_MQTT_OPEN) {
|
|
|
|
// MQTT connect is successful
|
|
|
|
struct mg_str topic = mg_str(s_rx_topic);
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_INFO(("Connected to %s", s_url));
|
|
|
|
MG_INFO(("Subscribing to %s", s_rx_topic));
|
2023-04-20 09:59:27 +03:00
|
|
|
struct mg_mqtt_opts sub_opts;
|
|
|
|
memset(&sub_opts, 0, sizeof(sub_opts));
|
|
|
|
sub_opts.topic = topic;
|
|
|
|
sub_opts.qos = s_qos;
|
|
|
|
mg_mqtt_sub(c, &sub_opts);
|
2023-01-09 10:58:07 +00:00
|
|
|
c->data[0] = 'X'; // Set a label that we're logged in
|
2021-11-03 20:58:57 +00:00
|
|
|
} else if (ev == MG_EV_MQTT_MSG) {
|
|
|
|
// When we receive MQTT message, print it
|
|
|
|
struct mg_mqtt_message *mm = (struct mg_mqtt_message *) ev_data;
|
2024-03-15 07:42:24 +00:00
|
|
|
MG_INFO(("Received on %.*s : %.*s", (int) mm->topic.len, mm->topic.buf,
|
|
|
|
(int) mm->data.len, mm->data.buf));
|
2023-01-09 10:58:07 +00:00
|
|
|
} else if (ev == MG_EV_POLL && c->data[0] == 'X') {
|
2021-11-03 20:58:57 +00:00
|
|
|
static unsigned long prev_second;
|
|
|
|
unsigned long now_second = (*(unsigned long *) ev_data) / 1000;
|
|
|
|
if (now_second != prev_second) {
|
|
|
|
struct mg_str topic = mg_str(s_tx_topic), data = mg_str("{\"a\":123}");
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_INFO(("Publishing to %s", s_tx_topic));
|
2023-04-20 09:59:27 +03:00
|
|
|
struct mg_mqtt_opts pub_opts;
|
|
|
|
memset(&pub_opts, 0, sizeof(pub_opts));
|
|
|
|
pub_opts.topic = topic;
|
|
|
|
pub_opts.message = data;
|
|
|
|
pub_opts.qos = s_qos, pub_opts.retain = false;
|
|
|
|
mg_mqtt_pub(c, &pub_opts);
|
2021-11-03 20:58:57 +00:00
|
|
|
prev_second = now_second;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ev == MG_EV_ERROR || ev == MG_EV_CLOSE) {
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_INFO(("Got event %d, stopping...", ev));
|
2024-01-08 17:34:34 -03:00
|
|
|
*(bool *) c->fn_data = true; // Signal that we're done
|
2021-11-03 20:58:57 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(void) {
|
|
|
|
struct mg_mgr mgr;
|
2021-12-23 11:00:18 +00:00
|
|
|
struct mg_mqtt_opts opts = {.clean = true};
|
2021-11-03 20:58:57 +00:00
|
|
|
bool done = false;
|
2024-11-10 08:45:34 +00:00
|
|
|
mg_log_set(MG_LL_DEBUG);
|
2021-11-03 20:58:57 +00:00
|
|
|
mg_mgr_init(&mgr); // Initialise event manager
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_INFO(("Connecting to %s", s_url)); // Inform that we're starting
|
2021-11-03 20:58:57 +00:00
|
|
|
mg_mqtt_connect(&mgr, s_url, &opts, fn, &done); // Create client connection
|
|
|
|
while (!done) mg_mgr_poll(&mgr, 1000); // Loop until done
|
|
|
|
mg_mgr_free(&mgr); // Finished, cleanup
|
|
|
|
return 0;
|
|
|
|
}
|