使用nghttp2实现IOS 的 APNS的推送测试例子

能用代码就不废话

调用例子和代码

//调用示例:
int main(int argc , char**argv)
{
     testapns( "/path/to/your/ca",
              "/path/yourkey_cert.pem",
            "/path/yourkey_cert.pem",
              "api.push.apple.com",
              "/3/device/DB10092BAF5385B9AD58AB696DC7E8ECC6061F04AFD79E1387EB38D0E3712DCB",
              "alert",
             "com.company.game",
            "10",
            "0",
           "{ \"aps\" : { \"alert\" : \"Hello\" } }"
                                     
             );

      return 0;
}

#ifdef HAVE_CONFIG_H
#  include 
#endif /* HAVE_CONFIG_H */

#include 
#include 

# include 

#include 
#  include 
#  include 
#  include 
#include 
#include 

#include 
#include 
#include 
#include 
#include 
#include 

#include 

#include 
#include 
#include 
  #include 

#include 

#include 


struct Connection {
  SSL *ssl;
  nghttp2_session *session;
  /* WANT_READ if SSL/TLS connection needs more input; or WANT_WRITE
     if it needs more output; or IO_NONE. This is necessary because
     SSL/TLS re-negotiation is possible at any time. nghttp2 API
     offers similar functions like nghttp2_session_want_read() and
     nghttp2_session_want_write() but they do not take into account
     SSL/TSL connection. */
  int want_io;
};


struct XRequest {
    const char *host;
    /* In this program, path contains query component as well. */
    const  char *path;
    /* This is the concatenation of host and port with ":" inbetween. */
    const  char *hostport;
    /* Stream ID for this request. */
    int32_t stream_id;
    uint16_t port;
    
    const char *pdata;
    const char *topic;
    const char *pushtype;
    const char *priority;
    const char *expiration;
    size_t nleft;
    size_t nsize;
};



enum { IO_NONE, WANT_READ, WANT_WRITE };



int get_cert_password_cb2(char *buf,int size, int rwflag, void *userdata)
{

    std::string password="123456";
    //g_pConfigData->GetStr(CONF_KX_CERT_PASS, &password);
   // Capns_client::log->debug("desc=get_cert_password password=%s\n",password.c_str());

    strcpy(buf,password.c_str());

    return password.length();
}


static void die(const char *msg) {
  fprintf(stderr, "FATAL: %s\n", msg);
  exit(EXIT_FAILURE);
}

/*
 * Prints error containing the function name |func| and error code
 * |error_code| and exit.
 */
static void diec(const char *func, int error_code) {
  fprintf(stderr, "FATAL: %s: error_code=%d, msg=%s\n", func, error_code,
          nghttp2_strerror(error_code));
  exit(EXIT_FAILURE);
}


static void dief(const char *func, const char *msg) {
  fprintf(stderr, "FATAL: %s: %s\n", func, msg);
  exit(EXIT_FAILURE);
}

/*
 * The implementation of nghttp2_send_callback type. Here we write
 * |data| with size |length| to the network and return the number of
 * bytes actually written. See the documentation of
 * nghttp2_send_callback for the details.
 */
static ssize_t send_callback(nghttp2_session *session, const uint8_t *data,
                             size_t length, int flags, void *user_data) {
  struct Connection *connection;
  int rv;
  (void)session;
  (void)flags;

  connection = (struct Connection *)user_data;
  //connection->want_io = IO_NONE;
  ERR_clear_error();
  rv = SSL_write(connection->ssl, data, (int)length);
  if (rv <= 0) {
    int err = SSL_get_error(connection->ssl, rv);
    if (err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ) {
      connection->want_io =
          (err == SSL_ERROR_WANT_READ ? WANT_READ : WANT_WRITE);
      rv = NGHTTP2_ERR_WOULDBLOCK;
    } else {
      rv = NGHTTP2_ERR_CALLBACK_FAILURE;
    }
  }
  return rv;
}

/*
 * The implementation of nghttp2_recv_callback type. Here we read data
 * from the network and write them in |buf|. The capacity of |buf| is
 * |length| bytes. Returns the number of bytes stored in |buf|. See
 * the documentation of nghttp2_recv_callback for the details.
 */
static ssize_t recv_callback(nghttp2_session *session, uint8_t *buf,
                             size_t length, int flags, void *user_data) {
  struct Connection *connection;
  int rv;
  (void)session;
  (void)flags;

  connection = (struct Connection *)user_data;
  connection->want_io = IO_NONE;
  ERR_clear_error();
  rv = SSL_read(connection->ssl, buf, (int)length);
  if (rv < 0) {
    int err = SSL_get_error(connection->ssl, rv);
    if (err == SSL_ERROR_WANT_WRITE || err == SSL_ERROR_WANT_READ) {
      connection->want_io =
          (err == SSL_ERROR_WANT_READ ? WANT_READ : WANT_WRITE);
      rv = NGHTTP2_ERR_WOULDBLOCK;
    } else {
      rv = NGHTTP2_ERR_CALLBACK_FAILURE;
    }
  } else if (rv == 0) {
    rv = NGHTTP2_ERR_EOF;
  }
  return rv;
}

static int on_frame_send_callback(nghttp2_session *session,
                                  const nghttp2_frame *frame, void *user_data) {
  size_t i;
  (void)user_data;

  switch (frame->hd.type) {
  case NGHTTP2_HEADERS:
    if (nghttp2_session_get_stream_user_data(session, frame->hd.stream_id)) {
      const nghttp2_nv *nva = frame->headers.nva;
      printf("[INFO] C ----------------------------> S (HEADERS)\n");
      for (i = 0; i < frame->headers.nvlen; ++i) {
        fwrite(nva[i].name, 1, nva[i].namelen, stdout);
        printf(": ");
        fwrite(nva[i].value, 1, nva[i].valuelen, stdout);
        printf("\n");
      }
    }
    break;
  case NGHTTP2_RST_STREAM:
    printf("[INFO] C ----------------------------> S (RST_STREAM)\n");
    break;
  case NGHTTP2_GOAWAY:
    printf("[INFO] C ----------------------------> S (GOAWAY)\n");
    break;
  }
  return 0;
}

static int on_frame_recv_callback(nghttp2_session *session,
                                  const nghttp2_frame *frame, void *user_data) {
  size_t i;
  (void)user_data;

  switch (frame->hd.type) {
  case NGHTTP2_HEADERS:
    if (frame->headers.cat == NGHTTP2_HCAT_RESPONSE) {
      const nghttp2_nv *nva = frame->headers.nva;
      struct XRequest *req;
      req = (struct XRequest *)nghttp2_session_get_stream_user_data(session, frame->hd.stream_id);
      if (req) {
        printf("[INFO] C <---------------------------- S (HEADERS)\n");
        for (i = 0; i < frame->headers.nvlen; ++i) {
          fwrite(nva[i].name, 1, nva[i].namelen, stdout);
          printf(": ");
          fwrite(nva[i].value, 1, nva[i].valuelen, stdout);
          printf("\n");
        }
      }
    }
    break;
  case NGHTTP2_RST_STREAM:
    printf("[INFO] C <---------------------------- S (RST_STREAM)\n");
    break;
  case NGHTTP2_GOAWAY:
    printf("[INFO] C <---------------------------- S (GOAWAY)\n");
    break;
  }
  return 0;
}

/*
 * The implementation of nghttp2_on_stream_close_callback type. We use
 * this function to know the response is fully received. Since we just
 * fetch 1 resource in this program, after reception of the response,
 * we submit GOAWAY and close the session.
 */
static int on_stream_close_callback(nghttp2_session *session, int32_t stream_id,
                                    uint32_t error_code, void *user_data) {
  struct XRequest *req;
  (void)error_code;
  (void)user_data;

  req =  (struct XRequest *)nghttp2_session_get_stream_user_data(session, stream_id);
  if (req) {
    int rv;
    rv = nghttp2_session_terminate_session(session, NGHTTP2_NO_ERROR);

    if (rv != 0) {
      diec("nghttp2_session_terminate_session", rv);
    }
  }
  return 0;
}

/*
 * The implementation of nghttp2_on_data_chunk_recv_callback type. We
 * use this function to print the received response body.
 */
static int on_data_chunk_recv_callback(nghttp2_session *session, uint8_t flags,
                                       int32_t stream_id, const uint8_t *data,
                                       size_t len, void *user_data) {
  struct XRequest *req;
  (void)flags;
  (void)user_data;

  req =  (struct XRequest *)nghttp2_session_get_stream_user_data(session, stream_id);
  if (req) {
    printf("[INFO] C <---------------------------- S (DATA chunk)\n"
           "%lu bytes\n",
           (unsigned long int)len);
    fwrite(data, 1, len, stdout);
    printf("\n");
  }
  return 0;
}

#define MAKE_NV(NAME, VALUE)                                                   \
  {                                                                            \
    (uint8_t *)NAME, (uint8_t *)VALUE, sizeof(NAME) - 1, sizeof(VALUE) - 1,    \
        NGHTTP2_NV_FLAG_NONE                                                   \
  }

#define MAKE_NV_CS(NAME, VALUE)                                                \
  {                                                                            \
    (uint8_t *)NAME, (uint8_t *)VALUE, sizeof(NAME) - 1, strlen(VALUE),        \
        NGHTTP2_NV_FLAG_NONE                                                   \
  }


ssize_t nghttp2_prd_callback(
nghttp2_session *session, int32_t stream_id, uint8_t *buf, size_t length,
uint32_t *data_flags, nghttp2_data_source *source, void *user_data)
{
    struct XRequest *req = (struct XRequest *)source->ptr;
    
      size_t n = std::min(req->nleft, length);
      memcpy(buf,req->pdata+ req->nsize - req->nleft, n);
      req->nleft -= n;
      if (req->nleft == 0) {
        *data_flags |= NGHTTP2_DATA_FLAG_EOF;
      }
      return n;
}


/*
 * Update |pollfd| based on the state of |connection|.
 */
static void ctl_poll(struct pollfd *pollfd, struct Connection *connection) {
  pollfd->events = 0;
  if (nghttp2_session_want_read(connection->session) ||
      connection->want_io == WANT_READ) {
    pollfd->events |= POLLIN;
  }
  if (nghttp2_session_want_write(connection->session) ||
      connection->want_io == WANT_WRITE) {
    pollfd->events |= POLLOUT;
  }
}



/*
 * Submits the request |req| to the connection |connection|.  This
 * function does not send packets; just append the request to the
 * internal queue in |connection->session|.
 */
static void submit_request(struct Connection *connection, struct XRequest *req) {
  int32_t stream_id;
  /* Make sure that the last item is NULL */
  const nghttp2_nv nva[] = {MAKE_NV(":method", "POST"),
                            MAKE_NV_CS(":path", req->path),
                            MAKE_NV(":scheme", "https"),
                            MAKE_NV_CS(":authority", req->hostport),
                            MAKE_NV("accept", "*/*"),
                            MAKE_NV("user-agent", "nghttp2/" NGHTTP2_VERSION),
              MAKE_NV_CS("apns-topic",req->topic),
              MAKE_NV_CS("apns-priority",req->priority),
              MAKE_NV_CS("apns-expiration",req->expiration),
              MAKE_NV_CS("apns-push-type",req->pushtype),
              MAKE_NV_CS("host",req->host)
      
  };
    
    nghttp2_data_provider *prd = new nghttp2_data_provider();
    prd->source.ptr = req;
    
    prd->read_callback =nghttp2_prd_callback;
    stream_id = nghttp2_submit_request(connection->session, NULL, nva,
                                     sizeof(nva) / sizeof(nva[0]), prd, req);

  if (stream_id < 0) {
    diec("nghttp2_submit_request", stream_id);
  }

  req->stream_id = stream_id;
  printf("[INFO] Stream ID = %d\n", stream_id);
}


static void make_non_block(int fd) {
  int flags, rv;
  while ((flags = fcntl(fd, F_GETFL, 0)) == -1 && errno == EINTR)
    ;
  if (flags == -1) {
    dief("fcntl", strerror(errno));
  }
  while ((rv = fcntl(fd, F_SETFL, flags | O_NONBLOCK)) == -1 && errno == EINTR)
    ;
  if (rv == -1) {
    dief("fcntl", strerror(errno));
  }
}

static void set_tcp_nodelay(int fd) {
  int val = 1;
  int rv;
  rv = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &val, (socklen_t)sizeof(val));
  if (rv == -1) {
    dief("setsockopt", strerror(errno));
  }
}



/*
 * Performs the network I/O.
 */
static void exec_io(struct Connection *connection) {
  int rv;
  rv = nghttp2_session_recv(connection->session);
  if (rv != 0) {
    diec("nghttp2_session_recv", rv);
  }
  rv = nghttp2_session_send(connection->session);
  if (rv != 0) {
    diec("nghttp2_session_send", rv);
  }
}


int testapns( const std::string &m_capath,
              const std::string &m_cerfile,
              const std::string &m_keyfile,
              const std::string &m_host,
              const std::string &urlpath,
              const std::string &pushtype,
             const std::string &topic,
             const std::string &priority,
             const std::string &expiration,
            const std::string &data
                                     
             )
{
    nfds_t npollfds = 1;
    struct pollfd pollfds[1];

    struct sockaddr_in   m_server_addr;
    struct hostent       m_host_info;

    int m_port;

    int err;
    int ret=0;
    struct timeval tv;
    time_t now=time(NULL);
    #define ERR_STRING_LEN  256
    char errString[ERR_STRING_LEN]={0};
    #define GET_SSL_ERR_STRING  \
    ERR_error_string_n(ERR_get_error(),errString,ERR_STRING_LEN-1)

    int hostbuf_len=1024;
    char *hostbuf=NULL;
    bool retry=false;

    /* Create an SSL_METHOD structure (choose an SSL/TLS protocol version) */
    const SSL_METHOD * m_method = SSLv23_method();
    if(!m_method)
    {
        return -1;
    }


    /* Create an SSL_CTX structure */
    SSL_CTX *  m_ctx = SSL_CTX_new(m_method);
    if(!m_ctx)
    {
        return -1;
    }

    SSL_CTX_set_default_passwd_cb(m_ctx,get_cert_password_cb2);


    /* Load the CA from the Path */
    if(SSL_CTX_load_verify_locations(m_ctx, NULL, m_capath.c_str()) <= 0)
    {
     GET_SSL_ERR_STRING  ;
     std::cout << "err=failed_to_set_ca ssl_err= " << errString << "\n";
     return -1;
    }

    /* Load the client certificate into the SSL_CTX structure */
    if (SSL_CTX_use_certificate_file(m_ctx, m_cerfile.c_str(), SSL_FILETYPE_PEM) <= 0) {
        GET_SSL_ERR_STRING  ;
        std::cout << "SSL_CTX_use_certificate_filessl_err= " << errString << "\n";
        return -1;
    }

    /* Load the private-key corresponding to the client certificate */
    if (SSL_CTX_use_PrivateKey_file(m_ctx, m_keyfile.c_str(), SSL_FILETYPE_PEM) <= 0) {
     GET_SSL_ERR_STRING  ;
     std::cout << "SSL_CTX_use_PrivateKey_file = " << errString << "\n";
     return -1;
    }

    /* Check if the client certificate and private-key matches */
    if (!SSL_CTX_check_private_key(m_ctx)) {
      GET_SSL_ERR_STRING  ;
       std::cout << "SSL_CTX_check_private_key = " << errString << "\n";
       return -1;
    }

    /* Set up a TCP socket */
    int m_sock = socket (PF_INET, SOCK_STREAM, IPPROTO_TCP);
    if(m_sock == -1)
    {
        err=-1;
        return -1;
    }

    memset (&m_server_addr, '\0', sizeof(m_server_addr));
    m_server_addr.sin_family      = AF_INET;
    m_server_addr.sin_port        = htons(m_port);       /* Server Port number */

    if((hostbuf=(char *)malloc(hostbuf_len))==NULL)
    {
        return -1;
    }

    struct hostent  *phost=NULL;
    int ret1=0;
    phost = gethostbyname(m_host.c_str());

    m_server_addr.sin_addr = *(struct in_addr*)phost->h_addr_list[0];
    char m_connect_ip[30];
     inet_ntop(AF_INET, &m_server_addr.sin_addr, m_connect_ip,sizeof(m_connect_ip));
           m_connect_ip[15]='\0';
    m_server_addr.sin_port = htons(443);
    printf("host ip %s \n", m_connect_ip);


    /* Establish a TCP/IP connection to the SSL client */
    err = ::connect(m_sock, (struct sockaddr*) &m_server_addr, sizeof(m_server_addr));
    if(err == -1)
    {
        return -1;
    }


    /* An SSL structure is created */
    SSL *m_ssl = SSL_new(m_ctx);
    if(!m_ssl)
    {
        err=-1;
        return -1;
    }

    /* Assign the socket into the SSL structure (SSL and socket without BIO) */
    SSL_set_fd(m_ssl, m_sock);

    /* Perform SSL Handshake on the SSL client */
    err = SSL_connect(m_ssl);
    if(err <= 0)
    {
        GET_SSL_ERR_STRING  ;
        err=-1;
        return -1;
    }

    struct Connection connection;
    connection.ssl = m_ssl;
    nghttp2_session_callbacks *callbacks;
    int rv = nghttp2_session_callbacks_new(&callbacks);

    nghttp2_session_callbacks_set_send_callback(callbacks, send_callback);

     nghttp2_session_callbacks_set_recv_callback(callbacks, recv_callback);

     nghttp2_session_callbacks_set_on_frame_send_callback(callbacks,
                                                          on_frame_send_callback);

     nghttp2_session_callbacks_set_on_frame_recv_callback(callbacks,
                                                          on_frame_recv_callback);

     nghttp2_session_callbacks_set_on_stream_close_callback(
         callbacks, on_stream_close_callback);

     nghttp2_session_callbacks_set_on_data_chunk_recv_callback(
         callbacks, on_data_chunk_recv_callback);



    rv = nghttp2_session_client_new(&connection.session, callbacks, &connection);

    nghttp2_session_callbacks_del(callbacks);

    if (rv != 0) {
      diec("nghttp2_session_client_new", rv);
    }

    rv = nghttp2_submit_settings(connection.session, NGHTTP2_FLAG_NONE, NULL, 0);


    connection.want_io = IO_NONE;

     /* Here make file descriptor non-block */
    make_non_block(m_sock);
    set_tcp_nodelay(m_sock);

    if (rv != 0) {
      diec("nghttp2_submit_settings", rv);
    }
    struct XRequest req;
    req.host = m_host.c_str();
    req.path = urlpath.c_str();
    req.hostport = m_host.c_str();
    req.pdata = data.c_str();
    req.nsize = req.nleft = strlen(req.pdata);
    req.expiration = expiration.c_str();
    req.priority = priority.c_str();
    req.pushtype = pushtype.c_str();
    req.topic = topic.c_str();
    /* Submit the HTTP request to the outbound queue. */
    submit_request(&connection, &req);


    pollfds[0].fd = m_sock;
    ctl_poll(pollfds, &connection);

    /* Event loop */
    while (nghttp2_session_want_read(connection.session) ||
         nghttp2_session_want_write(connection.session)) {
    int nfds = poll(pollfds, npollfds, -1);
    if (nfds == -1) {
      dief("poll", strerror(errno));
    }
    if (pollfds[0].revents & (POLLIN | POLLOUT)) {
      exec_io(&connection);
    }
    if ((pollfds[0].revents & POLLHUP) || (pollfds[0].revents & POLLERR)) {
      die("Connection error");
    }
    ctl_poll(pollfds, &connection);
    }

    nghttp2_session_del(connection.session);
    SSL_shutdown(m_ssl);
    SSL_free(m_ssl);
    SSL_CTX_free(m_ctx);
    shutdown(m_sock, SHUT_WR);
    close(m_sock);
    
    return 0;

}

 

你可能感兴趣的:(Ios开发)