2019-02-25 09:42:09 +01:00
|
|
|
%%%-------------------------------------------------------------------
|
|
|
|
%%% @author Evgeny Khramtsov <ekhramtsov@process-one.net>
|
2024-01-22 16:40:01 +01:00
|
|
|
%%% @copyright (C) 2002-2024 ProcessOne, SARL. All Rights Reserved.
|
2019-02-25 09:42:09 +01:00
|
|
|
%%%
|
|
|
|
%%% Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
%%% you may not use this file except in compliance with the License.
|
|
|
|
%%% You may obtain a copy of the License at
|
|
|
|
%%%
|
|
|
|
%%% http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
%%%
|
|
|
|
%%% Unless required by applicable law or agreed to in writing, software
|
|
|
|
%%% distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
%%% WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
%%% See the License for the specific language governing permissions and
|
|
|
|
%%% limitations under the License.
|
|
|
|
%%%
|
|
|
|
%%%-------------------------------------------------------------------
|
|
|
|
-module(mod_mqtt_session).
|
|
|
|
-behaviour(p1_server).
|
2019-06-21 13:39:46 +02:00
|
|
|
-define(VSN, 2).
|
2019-02-25 09:42:09 +01:00
|
|
|
-vsn(?VSN).
|
|
|
|
|
|
|
|
%% API
|
|
|
|
-export([start/3, start_link/3, accept/1, route/2]).
|
|
|
|
%% gen_server callbacks
|
|
|
|
-export([init/1, handle_call/3, handle_cast/2, handle_info/2,
|
|
|
|
terminate/2, code_change/3]).
|
|
|
|
|
|
|
|
-include("logger.hrl").
|
|
|
|
-include("mqtt.hrl").
|
2020-09-03 13:45:57 +02:00
|
|
|
-include_lib("xmpp/include/xmpp.hrl").
|
2022-03-14 13:37:21 +01:00
|
|
|
-include_lib("public_key/include/public_key.hrl").
|
2019-02-25 09:42:09 +01:00
|
|
|
|
|
|
|
-record(state, {vsn = ?VSN :: integer(),
|
|
|
|
version :: undefined | mqtt_version(),
|
|
|
|
socket :: undefined | socket(),
|
2019-06-14 11:33:26 +02:00
|
|
|
peername :: undefined | peername(),
|
2019-02-25 09:42:09 +01:00
|
|
|
timeout = infinity :: timer(),
|
|
|
|
jid :: undefined | jid:jid(),
|
2019-07-17 21:58:14 +02:00
|
|
|
session_expiry = 0 :: milli_seconds(),
|
2019-02-25 09:42:09 +01:00
|
|
|
will :: undefined | publish(),
|
2019-07-17 21:58:14 +02:00
|
|
|
will_delay = 0 :: milli_seconds(),
|
2019-02-25 09:42:09 +01:00
|
|
|
stop_reason :: undefined | error_reason(),
|
2019-06-27 14:22:27 +02:00
|
|
|
acks = #{} :: acks(),
|
|
|
|
subscriptions = #{} :: subscriptions(),
|
|
|
|
topic_aliases = #{} :: topic_aliases(),
|
2019-02-25 09:42:09 +01:00
|
|
|
id = 0 :: non_neg_integer(),
|
|
|
|
in_flight :: undefined | publish() | pubrel(),
|
|
|
|
codec :: mqtt_codec:state(),
|
2019-06-28 21:16:29 +02:00
|
|
|
queue :: undefined | p1_queue:queue(publish()),
|
2022-03-14 13:37:21 +01:00
|
|
|
tls :: boolean(),
|
|
|
|
tls_verify :: boolean()}).
|
2019-02-25 09:42:09 +01:00
|
|
|
|
2019-06-27 14:22:27 +02:00
|
|
|
-type acks() :: #{non_neg_integer() => pubrec()}.
|
|
|
|
-type subscriptions() :: #{binary() => {sub_opts(), non_neg_integer()}}.
|
|
|
|
-type topic_aliases() :: #{non_neg_integer() => binary()}.
|
|
|
|
|
2019-02-25 09:42:09 +01:00
|
|
|
-type error_reason() :: {auth, reason_code()} |
|
|
|
|
{code, reason_code()} |
|
|
|
|
{peer_disconnected, reason_code(), binary()} |
|
|
|
|
{socket, socket_error_reason()} |
|
|
|
|
{codec, mqtt_codec:error_reason()} |
|
|
|
|
{unexpected_packet, atom()} |
|
|
|
|
{tls, inet:posix() | atom() | binary()} |
|
|
|
|
{replaced, pid()} | {resumed, pid()} |
|
|
|
|
subscribe_forbidden | publish_forbidden |
|
|
|
|
will_topic_forbidden | internal_server_error |
|
|
|
|
session_expired | idle_connection |
|
|
|
|
queue_full | shutdown | db_failure |
|
|
|
|
{payload_format_invalid, will | publish} |
|
|
|
|
session_expiry_non_zero | unknown_topic_alias.
|
|
|
|
|
|
|
|
-type state() :: #state{}.
|
2019-06-21 13:39:46 +02:00
|
|
|
-type socket() :: {gen_tcp, inet:socket()} |
|
|
|
|
{fast_tls, fast_tls:tls_socket()} |
|
|
|
|
{mod_mqtt_ws, mod_mqtt_ws:socket()}.
|
2019-02-25 09:42:09 +01:00
|
|
|
-type peername() :: {inet:ip_address(), inet:port_number()}.
|
|
|
|
-type seconds() :: non_neg_integer().
|
|
|
|
-type milli_seconds() :: non_neg_integer().
|
|
|
|
-type timer() :: infinity | {milli_seconds(), integer()}.
|
|
|
|
-type socket_error_reason() :: closed | timeout | inet:posix().
|
|
|
|
|
|
|
|
-define(CALL_TIMEOUT, timer:minutes(1)).
|
|
|
|
-define(RELAY_TIMEOUT, timer:minutes(1)).
|
|
|
|
-define(MAX_UINT32, 4294967295).
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% API
|
|
|
|
%%%===================================================================
|
|
|
|
start(SockMod, Socket, ListenOpts) ->
|
|
|
|
p1_server:start(?MODULE, [SockMod, Socket, ListenOpts],
|
|
|
|
ejabberd_config:fsm_limit_opts(ListenOpts)).
|
|
|
|
|
|
|
|
start_link(SockMod, Socket, ListenOpts) ->
|
|
|
|
p1_server:start_link(?MODULE, [SockMod, Socket, ListenOpts],
|
|
|
|
ejabberd_config:fsm_limit_opts(ListenOpts)).
|
|
|
|
|
|
|
|
-spec accept(pid()) -> ok.
|
|
|
|
accept(Pid) ->
|
|
|
|
p1_server:cast(Pid, accept).
|
|
|
|
|
|
|
|
-spec route(pid(), term()) -> boolean().
|
|
|
|
route(Pid, Term) ->
|
|
|
|
ejabberd_cluster:send(Pid, Term).
|
|
|
|
|
|
|
|
-spec format_error(error_reason()) -> string().
|
|
|
|
format_error(session_expired) ->
|
|
|
|
"Disconnected session is expired";
|
|
|
|
format_error(idle_connection) ->
|
|
|
|
"Idle connection";
|
|
|
|
format_error(queue_full) ->
|
|
|
|
"Message queue is overloaded";
|
|
|
|
format_error(internal_server_error) ->
|
|
|
|
"Internal server error";
|
|
|
|
format_error(db_failure) ->
|
|
|
|
"Database failure";
|
|
|
|
format_error(shutdown) ->
|
|
|
|
"System shutting down";
|
|
|
|
format_error(subscribe_forbidden) ->
|
|
|
|
"Subscribing to this topic is forbidden by service policy";
|
|
|
|
format_error(publish_forbidden) ->
|
|
|
|
"Publishing to this topic is forbidden by service policy";
|
|
|
|
format_error(will_topic_forbidden) ->
|
|
|
|
"Publishing to this will topic is forbidden by service policy";
|
|
|
|
format_error(session_expiry_non_zero) ->
|
|
|
|
"Session Expiry Interval in DISCONNECT packet should have been zero";
|
|
|
|
format_error(unknown_topic_alias) ->
|
|
|
|
"No mapping found for this Topic Alias";
|
|
|
|
format_error({payload_format_invalid, will}) ->
|
|
|
|
"Will payload format doesn't match its indicator";
|
|
|
|
format_error({payload_format_invalid, publish}) ->
|
|
|
|
"PUBLISH payload format doesn't match its indicator";
|
|
|
|
format_error({peer_disconnected, Code, <<>>}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Peer disconnected with reason: ~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
[mqtt_codec:format_reason_code(Code)]);
|
|
|
|
format_error({peer_disconnected, Code, Reason}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Peer disconnected with reason: ~ts (~ts)", [Reason, Code]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error({replaced, Pid}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Replaced by ~p at ~ts", [Pid, node(Pid)]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error({resumed, Pid}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Resumed by ~p at ~ts", [Pid, node(Pid)]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error({unexpected_packet, Name}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Unexpected ~ts packet", [string:to_upper(atom_to_list(Name))]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error({tls, Reason}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("TLS failed: ~ts", [format_tls_error(Reason)]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error({socket, A}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Connection failed: ~ts", [format_inet_error(A)]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error({code, Code}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Protocol error: ~ts", [mqtt_codec:format_reason_code(Code)]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error({auth, Code}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Authentication failed: ~ts", [mqtt_codec:format_reason_code(Code)]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error({codec, CodecError}) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
format("Protocol error: ~ts", [mqtt_codec:format_error(CodecError)]);
|
2019-02-25 09:42:09 +01:00
|
|
|
format_error(A) when is_atom(A) ->
|
|
|
|
atom_to_list(A);
|
|
|
|
format_error(Reason) ->
|
|
|
|
format("Unrecognized error: ~w", [Reason]).
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% gen_server callbacks
|
|
|
|
%%%===================================================================
|
|
|
|
init([SockMod, Socket, ListenOpts]) ->
|
|
|
|
MaxSize = proplists:get_value(max_payload_size, ListenOpts, infinity),
|
2019-06-21 13:39:46 +02:00
|
|
|
State1 = #state{socket = {SockMod, Socket},
|
2019-02-25 09:42:09 +01:00
|
|
|
id = p1_rand:uniform(65535),
|
2019-06-21 13:39:46 +02:00
|
|
|
tls = proplists:get_bool(tls, ListenOpts),
|
2022-03-14 13:37:21 +01:00
|
|
|
tls_verify = proplists:get_bool(tls_verify, ListenOpts),
|
2019-02-25 09:42:09 +01:00
|
|
|
codec = mqtt_codec:new(MaxSize)},
|
|
|
|
Timeout = timer:seconds(30),
|
|
|
|
State2 = set_timeout(State1, Timeout),
|
|
|
|
{ok, State2, Timeout}.
|
|
|
|
|
|
|
|
handle_call({get_state, _}, From, #state{stop_reason = {resumed, Pid}} = State) ->
|
|
|
|
p1_server:reply(From, {error, {resumed, Pid}}),
|
|
|
|
noreply(State);
|
|
|
|
handle_call({get_state, Pid}, From, State) ->
|
|
|
|
case stop(State, {resumed, Pid}) of
|
|
|
|
{stop, Status, State1} ->
|
|
|
|
{stop, Status, State1#state{stop_reason = {replaced, Pid}}};
|
|
|
|
{noreply, State1, _} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Transferring MQTT session state to ~p at ~ts", [Pid, node(Pid)]),
|
2019-02-25 09:42:09 +01:00
|
|
|
Q1 = p1_queue:file_to_ram(State1#state.queue),
|
|
|
|
p1_server:reply(From, {ok, State1#state{queue = Q1}}),
|
2019-07-17 21:58:14 +02:00
|
|
|
SessionExpiry = State1#state.session_expiry,
|
2019-02-25 09:42:09 +01:00
|
|
|
State2 = set_timeout(State1, min(SessionExpiry, ?RELAY_TIMEOUT)),
|
|
|
|
State3 = State2#state{queue = undefined,
|
|
|
|
stop_reason = {resumed, Pid},
|
|
|
|
acks = #{},
|
|
|
|
will = undefined,
|
|
|
|
session_expiry = 0,
|
|
|
|
topic_aliases = #{},
|
|
|
|
subscriptions = #{}},
|
|
|
|
noreply(State3)
|
|
|
|
end;
|
|
|
|
handle_call(Request, From, State) ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Unexpected call from ~p: ~p", [From, Request]),
|
2019-02-25 09:42:09 +01:00
|
|
|
noreply(State).
|
|
|
|
|
2019-06-21 13:39:46 +02:00
|
|
|
handle_cast(accept, #state{socket = {_, Sock}} = State) ->
|
2019-04-23 15:22:27 +02:00
|
|
|
case peername(State) of
|
2019-02-25 09:42:09 +01:00
|
|
|
{ok, IPPort} ->
|
|
|
|
State1 = State#state{peername = IPPort},
|
2019-06-21 13:39:46 +02:00
|
|
|
case starttls(State) of
|
2019-02-25 09:42:09 +01:00
|
|
|
{ok, Socket1} ->
|
|
|
|
State2 = State1#state{socket = Socket1},
|
2019-04-23 15:22:27 +02:00
|
|
|
handle_info({tcp, Sock, <<>>}, State2);
|
2019-02-25 09:42:09 +01:00
|
|
|
{error, Why} ->
|
|
|
|
stop(State1, Why)
|
|
|
|
end;
|
|
|
|
{error, Why} ->
|
|
|
|
stop(State, {socket, Why})
|
|
|
|
end;
|
|
|
|
handle_cast(Msg, State) ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Unexpected cast: ~p", [Msg]),
|
2019-02-25 09:42:09 +01:00
|
|
|
noreply(State).
|
|
|
|
|
|
|
|
handle_info(Msg, #state{stop_reason = {resumed, Pid} = Reason} = State) ->
|
|
|
|
case Msg of
|
|
|
|
{#publish{}, _} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Relaying delayed publish to ~p at ~ts", [Pid, node(Pid)]),
|
2019-02-25 09:42:09 +01:00
|
|
|
ejabberd_cluster:send(Pid, Msg),
|
|
|
|
noreply(State);
|
|
|
|
timeout ->
|
|
|
|
stop(State, Reason);
|
|
|
|
_ ->
|
|
|
|
noreply(State)
|
|
|
|
end;
|
|
|
|
handle_info({#publish{meta = Meta} = Pkt, ExpiryTime}, State) ->
|
|
|
|
ID = next_id(State#state.id),
|
|
|
|
Meta1 = Meta#{expiry_time => ExpiryTime},
|
|
|
|
Pkt1 = Pkt#publish{id = ID, meta = Meta1},
|
|
|
|
State1 = State#state{id = ID},
|
|
|
|
case send(State1, Pkt1) of
|
|
|
|
{ok, State2} -> noreply(State2);
|
|
|
|
{error, State2, Reason} -> stop(State2, Reason)
|
|
|
|
end;
|
|
|
|
handle_info({tcp, TCPSock, TCPData},
|
|
|
|
#state{codec = Codec, socket = Socket} = State) ->
|
|
|
|
case recv_data(Socket, TCPData) of
|
|
|
|
{ok, Data} ->
|
|
|
|
case mqtt_codec:decode(Codec, Data) of
|
|
|
|
{ok, Pkt, Codec1} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Got MQTT packet:~n~ts", [pp(Pkt)]),
|
2019-02-25 09:42:09 +01:00
|
|
|
State1 = State#state{codec = Codec1},
|
|
|
|
case handle_packet(Pkt, State1) of
|
|
|
|
{ok, State2} ->
|
|
|
|
handle_info({tcp, TCPSock, <<>>}, State2);
|
|
|
|
{error, State2, Reason} ->
|
|
|
|
stop(State2, Reason)
|
|
|
|
end;
|
|
|
|
{more, Codec1} ->
|
|
|
|
State1 = State#state{codec = Codec1},
|
|
|
|
State2 = reset_keep_alive(State1),
|
|
|
|
activate(Socket),
|
|
|
|
noreply(State2);
|
|
|
|
{error, Why} ->
|
|
|
|
stop(State, {codec, Why})
|
|
|
|
end;
|
|
|
|
{error, Why} ->
|
|
|
|
stop(State, Why)
|
|
|
|
end;
|
|
|
|
handle_info({tcp_closed, _Sock}, State) ->
|
|
|
|
?DEBUG("MQTT connection reset by peer", []),
|
|
|
|
stop(State, {socket, closed});
|
|
|
|
handle_info({tcp_error, _Sock, Reason}, State) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("MQTT connection error: ~ts", [format_inet_error(Reason)]),
|
2019-02-25 09:42:09 +01:00
|
|
|
stop(State, {socket, Reason});
|
|
|
|
handle_info(timeout, #state{socket = Socket} = State) ->
|
|
|
|
case Socket of
|
|
|
|
undefined ->
|
|
|
|
?DEBUG("MQTT session expired", []),
|
|
|
|
stop(State#state{session_expiry = 0}, session_expired);
|
|
|
|
_ ->
|
|
|
|
?DEBUG("MQTT connection timed out", []),
|
|
|
|
stop(State, idle_connection)
|
|
|
|
end;
|
|
|
|
handle_info({replaced, Pid}, State) ->
|
|
|
|
stop(State#state{session_expiry = 0}, {replaced, Pid});
|
|
|
|
handle_info({timeout, _TRef, publish_will}, State) ->
|
|
|
|
noreply(publish_will(State));
|
|
|
|
handle_info({Ref, badarg}, State) when is_reference(Ref) ->
|
|
|
|
%% TODO: figure out from where this messages comes from
|
|
|
|
noreply(State);
|
|
|
|
handle_info(Info, State) ->
|
2019-06-24 19:32:34 +02:00
|
|
|
?WARNING_MSG("Unexpected info: ~p", [Info]),
|
2019-02-25 09:42:09 +01:00
|
|
|
noreply(State).
|
|
|
|
|
|
|
|
-spec handle_packet(mqtt_packet(), state()) -> {ok, state()} |
|
|
|
|
{error, state(), error_reason()}.
|
|
|
|
handle_packet(#connect{proto_level = Version} = Pkt, State) ->
|
|
|
|
handle_connect(Pkt, State#state{version = Version});
|
|
|
|
handle_packet(#publish{} = Pkt, State) ->
|
|
|
|
handle_publish(Pkt, State);
|
|
|
|
handle_packet(#puback{id = ID}, #state{in_flight = #publish{qos = 1, id = ID}} = State) ->
|
|
|
|
resend(State#state{in_flight = undefined});
|
|
|
|
handle_packet(#puback{id = ID, code = Code}, State) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Ignoring unexpected PUBACK with id=~B and code '~ts'", [ID, Code]),
|
2019-02-25 09:42:09 +01:00
|
|
|
{ok, State};
|
|
|
|
handle_packet(#pubrec{id = ID, code = Code},
|
|
|
|
#state{in_flight = #publish{qos = 2, id = ID}} = State) ->
|
|
|
|
case mqtt_codec:is_error_code(Code) of
|
|
|
|
true ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Got PUBREC with error code '~ts', "
|
2019-02-25 09:42:09 +01:00
|
|
|
"aborting acknowledgement", [Code]),
|
|
|
|
resend(State#state{in_flight = undefined});
|
|
|
|
false ->
|
|
|
|
Pubrel = #pubrel{id = ID},
|
|
|
|
send(State#state{in_flight = Pubrel}, Pubrel)
|
|
|
|
end;
|
|
|
|
handle_packet(#pubrec{id = ID, code = Code}, State) ->
|
|
|
|
case mqtt_codec:is_error_code(Code) of
|
|
|
|
true ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Ignoring unexpected PUBREC with id=~B and code '~ts'",
|
2019-02-25 09:42:09 +01:00
|
|
|
[ID, Code]),
|
|
|
|
{ok, State};
|
|
|
|
false ->
|
|
|
|
Code1 = 'packet-identifier-not-found',
|
2019-06-24 19:32:34 +02:00
|
|
|
?DEBUG("Unexpected PUBREC with id=~B, "
|
2019-09-23 14:17:20 +02:00
|
|
|
"sending PUBREL with error code '~ts'", [ID, Code1]),
|
2019-02-25 09:42:09 +01:00
|
|
|
send(State, #pubrel{id = ID, code = Code1})
|
|
|
|
end;
|
|
|
|
handle_packet(#pubcomp{id = ID}, #state{in_flight = #pubrel{id = ID}} = State) ->
|
|
|
|
resend(State#state{in_flight = undefined});
|
|
|
|
handle_packet(#pubcomp{id = ID}, State) ->
|
|
|
|
?DEBUG("Ignoring unexpected PUBCOMP with id=~B: most likely "
|
|
|
|
"it's a repeated response to duplicated PUBREL", [ID]),
|
|
|
|
{ok, State};
|
|
|
|
handle_packet(#pubrel{id = ID}, State) ->
|
|
|
|
case maps:take(ID, State#state.acks) of
|
|
|
|
{_, Acks} ->
|
|
|
|
send(State#state{acks = Acks}, #pubcomp{id = ID});
|
|
|
|
error ->
|
|
|
|
Code = 'packet-identifier-not-found',
|
2019-06-24 19:32:34 +02:00
|
|
|
?DEBUG("Unexpected PUBREL with id=~B, "
|
2019-09-23 14:17:20 +02:00
|
|
|
"sending PUBCOMP with error code '~ts'", [ID, Code]),
|
2019-02-25 09:42:09 +01:00
|
|
|
Pubcomp = #pubcomp{id = ID, code = Code},
|
|
|
|
send(State, Pubcomp)
|
|
|
|
end;
|
|
|
|
handle_packet(#subscribe{} = Pkt, State) ->
|
|
|
|
handle_subscribe(Pkt, State);
|
|
|
|
handle_packet(#unsubscribe{} = Pkt, State) ->
|
|
|
|
handle_unsubscribe(Pkt, State);
|
|
|
|
handle_packet(#pingreq{}, State) ->
|
|
|
|
send(State, #pingresp{});
|
|
|
|
handle_packet(#disconnect{properties = #{session_expiry_interval := SE}},
|
|
|
|
#state{session_expiry = 0} = State) when SE>0 ->
|
|
|
|
%% Protocol violation
|
|
|
|
{error, State, session_expiry_non_zero};
|
|
|
|
handle_packet(#disconnect{code = Code, properties = Props},
|
|
|
|
#state{jid = #jid{lserver = Server}} = State) ->
|
|
|
|
Reason = maps:get(reason_string, Props, <<>>),
|
|
|
|
Expiry = case maps:get(session_expiry_interval, Props, undefined) of
|
|
|
|
undefined -> State#state.session_expiry;
|
2019-07-17 21:58:14 +02:00
|
|
|
SE -> min(timer:seconds(SE), session_expiry(Server))
|
2019-02-25 09:42:09 +01:00
|
|
|
end,
|
|
|
|
State1 = State#state{session_expiry = Expiry},
|
|
|
|
State2 = case Code of
|
|
|
|
'normal-disconnection' -> State1#state{will = undefined};
|
|
|
|
_ -> State1
|
|
|
|
end,
|
|
|
|
{error, State2, {peer_disconnected, Code, Reason}};
|
|
|
|
handle_packet(Pkt, State) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?WARNING_MSG("Unexpected packet:~n~ts~n** when state:~n~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
[pp(Pkt), pp(State)]),
|
|
|
|
{error, State, {unexpected_packet, element(1, Pkt)}}.
|
|
|
|
|
|
|
|
terminate(_, #state{peername = undefined}) ->
|
|
|
|
ok;
|
|
|
|
terminate(Reason, State) ->
|
|
|
|
Reason1 = case Reason of
|
|
|
|
shutdown -> shutdown;
|
|
|
|
{shutdown, _} -> shutdown;
|
|
|
|
normal -> State#state.stop_reason;
|
|
|
|
{process_limit, _} -> queue_full;
|
|
|
|
_ -> internal_server_error
|
|
|
|
end,
|
|
|
|
case State#state.jid of
|
|
|
|
#jid{} -> unregister_session(State, Reason1);
|
|
|
|
undefined -> log_disconnection(State, Reason1)
|
|
|
|
end,
|
|
|
|
State1 = disconnect(State, Reason1),
|
|
|
|
publish_will(State1).
|
|
|
|
|
|
|
|
code_change(_OldVsn, State, _Extra) ->
|
|
|
|
{ok, upgrade_state(State)}.
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% State transitions
|
|
|
|
%%%===================================================================
|
|
|
|
-spec noreply(state()) -> {noreply, state(), non_neg_integer() | infinity}.
|
|
|
|
noreply(#state{timeout = infinity} = State) ->
|
|
|
|
{noreply, State, infinity};
|
|
|
|
noreply(#state{timeout = {MSecs, StartTime}} = State) ->
|
|
|
|
CurrentTime = current_time(),
|
|
|
|
Timeout = max(0, MSecs - CurrentTime + StartTime),
|
|
|
|
{noreply, State, Timeout}.
|
|
|
|
|
|
|
|
-spec stop(state(), error_reason()) -> {noreply, state(), infinity} |
|
|
|
|
{stop, normal, state()}.
|
|
|
|
stop(#state{session_expiry = 0} = State, Reason) ->
|
|
|
|
{stop, normal, State#state{stop_reason = Reason}};
|
|
|
|
stop(#state{session_expiry = SessExp} = State, Reason) ->
|
|
|
|
case State#state.socket of
|
|
|
|
undefined ->
|
|
|
|
noreply(State);
|
|
|
|
_ ->
|
|
|
|
WillDelay = State#state.will_delay,
|
|
|
|
log_disconnection(State, Reason),
|
|
|
|
State1 = disconnect(State, Reason),
|
|
|
|
State2 = if WillDelay == 0 ->
|
|
|
|
publish_will(State1);
|
|
|
|
WillDelay < SessExp ->
|
2019-07-17 21:58:14 +02:00
|
|
|
erlang:start_timer(WillDelay, self(), publish_will),
|
2019-02-25 09:42:09 +01:00
|
|
|
State1;
|
|
|
|
true ->
|
|
|
|
State1
|
|
|
|
end,
|
2019-07-17 21:58:14 +02:00
|
|
|
State3 = set_timeout(State2, SessExp),
|
2019-02-25 09:42:09 +01:00
|
|
|
State4 = State3#state{stop_reason = Reason},
|
|
|
|
noreply(State4)
|
|
|
|
end.
|
|
|
|
|
2019-06-21 13:39:46 +02:00
|
|
|
%% Here is the code upgrading state between different
|
|
|
|
%% code versions. This is needed when doing session resumption from
|
|
|
|
%% remote node running the version of the code with incompatible #state{}
|
|
|
|
%% record fields. Also used by code_change/3 callback.
|
|
|
|
-spec upgrade_state(tuple()) -> state().
|
2019-02-25 09:42:09 +01:00
|
|
|
upgrade_state(State) ->
|
2019-06-21 13:39:46 +02:00
|
|
|
case element(2, State) of
|
|
|
|
?VSN ->
|
|
|
|
State;
|
|
|
|
VSN when VSN > ?VSN ->
|
|
|
|
erlang:error({downgrade_not_supported, State});
|
|
|
|
VSN ->
|
|
|
|
State1 = upgrade_state(State, VSN),
|
|
|
|
upgrade_state(setelement(2, State1, VSN+1))
|
|
|
|
end.
|
|
|
|
|
2022-05-12 17:25:11 +02:00
|
|
|
-spec upgrade_state(tuple(), integer()) -> tuple().
|
2019-06-21 13:39:46 +02:00
|
|
|
upgrade_state(OldState, 1) ->
|
|
|
|
%% Appending 'tls' field
|
|
|
|
erlang:append_element(OldState, false);
|
|
|
|
upgrade_state(State, _VSN) ->
|
2019-02-25 09:42:09 +01:00
|
|
|
State.
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% Session management
|
|
|
|
%%%===================================================================
|
|
|
|
-spec open_session(state(), jid(), boolean()) -> {ok, boolean(), state()} |
|
|
|
|
{error, state(), error_reason()}.
|
|
|
|
open_session(State, JID, _CleanStart = false) ->
|
|
|
|
USR = {_, S, _} = jid:tolower(JID),
|
|
|
|
case mod_mqtt:lookup_session(USR) of
|
|
|
|
{ok, Pid} ->
|
|
|
|
try p1_server:call(Pid, {get_state, self()}, ?CALL_TIMEOUT) of
|
|
|
|
{ok, State1} ->
|
|
|
|
State2 = upgrade_state(State1),
|
|
|
|
Q1 = case queue_type(S) of
|
|
|
|
ram -> State2#state.queue;
|
|
|
|
_ -> p1_queue:ram_to_file(State2#state.queue)
|
|
|
|
end,
|
|
|
|
Q2 = p1_queue:set_limit(Q1, queue_limit(S)),
|
|
|
|
State3 = State#state{queue = Q2,
|
|
|
|
acks = State2#state.acks,
|
|
|
|
subscriptions = State2#state.subscriptions,
|
|
|
|
id = State2#state.id,
|
|
|
|
in_flight = State2#state.in_flight},
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Resumed state from ~p at ~ts:~n~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
[Pid, node(Pid), pp(State3)]),
|
|
|
|
register_session(State3, JID, Pid);
|
|
|
|
{error, Why} ->
|
|
|
|
{error, State, Why}
|
|
|
|
catch exit:{Why, {p1_server, _, _}} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?WARNING_MSG("Failed to copy session state from ~p at ~ts: ~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
[Pid, node(Pid), format_exit_reason(Why)]),
|
|
|
|
register_session(State, JID, undefined)
|
|
|
|
end;
|
|
|
|
{error, notfound} ->
|
|
|
|
register_session(State, JID, undefined);
|
|
|
|
{error, Why} ->
|
|
|
|
{error, State, Why}
|
|
|
|
end;
|
|
|
|
open_session(State, JID, _CleanStart = true) ->
|
|
|
|
register_session(State, JID, undefined).
|
|
|
|
|
|
|
|
-spec register_session(state(), jid(), undefined | pid()) ->
|
|
|
|
{ok, boolean(), state()} | {error, state(), error_reason()}.
|
|
|
|
register_session(#state{peername = IP} = State, JID, Parent) ->
|
|
|
|
USR = {_, S, _} = jid:tolower(JID),
|
|
|
|
case mod_mqtt:open_session(USR) of
|
|
|
|
ok ->
|
|
|
|
case resubscribe(USR, State#state.subscriptions) of
|
|
|
|
ok ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?INFO_MSG("~ts for ~ts from ~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
[if is_pid(Parent) ->
|
|
|
|
io_lib:format(
|
|
|
|
"Reopened MQTT session via ~p",
|
|
|
|
[Parent]);
|
|
|
|
true ->
|
|
|
|
"Opened MQTT session"
|
|
|
|
end,
|
|
|
|
jid:encode(JID),
|
|
|
|
ejabberd_config:may_hide_data(
|
|
|
|
misc:ip_to_list(IP))]),
|
|
|
|
Q = case State#state.queue of
|
|
|
|
undefined ->
|
|
|
|
p1_queue:new(queue_type(S), queue_limit(S));
|
|
|
|
Q1 ->
|
|
|
|
Q1
|
|
|
|
end,
|
|
|
|
{ok, is_pid(Parent), State#state{jid = JID, queue = Q}};
|
|
|
|
{error, Why} ->
|
|
|
|
mod_mqtt:close_session(USR),
|
|
|
|
{error, State#state{session_expiry = 0}, Why}
|
|
|
|
end;
|
|
|
|
{error, Reason} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?ERROR_MSG("Failed to register MQTT session for ~ts from ~ts: ~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
err_args(JID, IP, Reason)),
|
|
|
|
{error, State, Reason}
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec unregister_session(state(), error_reason()) -> ok.
|
|
|
|
unregister_session(#state{jid = #jid{} = JID, peername = IP} = State, Reason) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
Msg = "Closing MQTT session for ~ts from ~ts: ~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
case Reason of
|
|
|
|
{Tag, _} when Tag == replaced; Tag == resumed ->
|
|
|
|
?DEBUG(Msg, err_args(JID, IP, Reason));
|
|
|
|
{socket, _} ->
|
|
|
|
?INFO_MSG(Msg, err_args(JID, IP, Reason));
|
|
|
|
Tag when Tag == idle_connection; Tag == session_expired; Tag == shutdown ->
|
|
|
|
?INFO_MSG(Msg, err_args(JID, IP, Reason));
|
|
|
|
{peer_disconnected, Code, _} ->
|
|
|
|
case mqtt_codec:is_error_code(Code) of
|
|
|
|
true -> ?WARNING_MSG(Msg, err_args(JID, IP, Reason));
|
|
|
|
false -> ?INFO_MSG(Msg, err_args(JID, IP, Reason))
|
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
?WARNING_MSG(Msg, err_args(JID, IP, Reason))
|
|
|
|
end,
|
|
|
|
USR = jid:tolower(JID),
|
|
|
|
unsubscribe(maps:keys(State#state.subscriptions), USR, #{}),
|
|
|
|
case mod_mqtt:close_session(USR) of
|
|
|
|
ok -> ok;
|
|
|
|
{error, Why} ->
|
|
|
|
?ERROR_MSG(
|
2019-09-23 14:17:20 +02:00
|
|
|
"Failed to close MQTT session for ~ts from ~ts: ~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
err_args(JID, IP, Why))
|
|
|
|
end;
|
|
|
|
unregister_session(_, _) ->
|
|
|
|
ok.
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% CONNECT/PUBLISH/SUBSCRIBE/UNSUBSCRIBE handlers
|
|
|
|
%%%===================================================================
|
|
|
|
-spec handle_connect(connect(), state()) -> {ok, state()} |
|
|
|
|
{error, state(), error_reason()}.
|
|
|
|
handle_connect(#connect{clean_start = CleanStart} = Pkt,
|
|
|
|
#state{jid = undefined, peername = IP} = State) ->
|
2022-03-14 13:37:21 +01:00
|
|
|
case authenticate(Pkt, IP, State) of
|
2019-02-25 09:42:09 +01:00
|
|
|
{ok, JID} ->
|
|
|
|
case validate_will(Pkt, JID) of
|
|
|
|
ok ->
|
|
|
|
case open_session(State, JID, CleanStart) of
|
|
|
|
{ok, SessionPresent, State1} ->
|
|
|
|
State2 = set_session_properties(State1, Pkt),
|
|
|
|
ConnackProps = get_connack_properties(State2, Pkt),
|
|
|
|
Connack = #connack{session_present = SessionPresent,
|
|
|
|
properties = ConnackProps},
|
|
|
|
case send(State2, Connack) of
|
|
|
|
{ok, State3} -> resend(State3);
|
|
|
|
{error, _, _} = Err -> Err
|
|
|
|
end;
|
|
|
|
{error, _, _} = Err ->
|
|
|
|
Err
|
|
|
|
end;
|
|
|
|
{error, Reason} ->
|
|
|
|
{error, State, Reason}
|
|
|
|
end;
|
|
|
|
{error, Code} ->
|
|
|
|
{error, State, {auth, Code}}
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec handle_publish(publish(), state()) -> {ok, state()} |
|
|
|
|
{error, state(), error_reason()}.
|
|
|
|
handle_publish(#publish{qos = QoS, id = ID} = Publish, State) ->
|
|
|
|
case QoS == 2 andalso maps:is_key(ID, State#state.acks) of
|
|
|
|
true ->
|
|
|
|
send(State, maps:get(ID, State#state.acks));
|
|
|
|
false ->
|
|
|
|
case validate_publish(Publish, State) of
|
|
|
|
ok ->
|
|
|
|
State1 = store_topic_alias(State, Publish),
|
|
|
|
Ret = publish(State1, Publish),
|
|
|
|
{Code, Props} = get_publish_code_props(Ret),
|
|
|
|
case Ret of
|
|
|
|
{ok, _} when QoS == 2 ->
|
|
|
|
Pkt = #pubrec{id = ID, code = Code,
|
|
|
|
properties = Props},
|
|
|
|
Acks = maps:put(ID, Pkt, State1#state.acks),
|
|
|
|
State2 = State1#state{acks = Acks},
|
|
|
|
send(State2, Pkt);
|
|
|
|
{error, _} when QoS == 2 ->
|
|
|
|
Pkt = #pubrec{id = ID, code = Code,
|
|
|
|
properties = Props},
|
|
|
|
send(State1, Pkt);
|
|
|
|
_ when QoS == 1 ->
|
|
|
|
Pkt = #puback{id = ID, code = Code,
|
|
|
|
properties = Props},
|
|
|
|
send(State1, Pkt);
|
|
|
|
_ ->
|
|
|
|
{ok, State1}
|
|
|
|
end;
|
|
|
|
{error, Why} ->
|
|
|
|
{error, State, Why}
|
|
|
|
end
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec handle_subscribe(subscribe(), state()) ->
|
|
|
|
{ok, state()} | {error, state(), error_reason()}.
|
|
|
|
handle_subscribe(#subscribe{id = ID, filters = TopicFilters} = Pkt, State) ->
|
|
|
|
case validate_subscribe(Pkt) of
|
|
|
|
ok ->
|
|
|
|
USR = jid:tolower(State#state.jid),
|
|
|
|
SubID = maps:get(subscription_identifier, Pkt#subscribe.properties, 0),
|
|
|
|
OldSubs = State#state.subscriptions,
|
|
|
|
{Codes, NewSubs, Props} = subscribe(TopicFilters, USR, SubID),
|
|
|
|
Subs = maps:merge(OldSubs, NewSubs),
|
|
|
|
State1 = State#state{subscriptions = Subs},
|
|
|
|
Suback = #suback{id = ID, codes = Codes, properties = Props},
|
|
|
|
case send(State1, Suback) of
|
|
|
|
{ok, State2} ->
|
|
|
|
Pubs = select_retained(USR, NewSubs, OldSubs),
|
|
|
|
send_retained(State2, Pubs);
|
|
|
|
{error, _, _} = Err ->
|
|
|
|
Err
|
|
|
|
end;
|
|
|
|
{error, Why} ->
|
|
|
|
{error, State, Why}
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec handle_unsubscribe(unsubscribe(), state()) ->
|
|
|
|
{ok, state()} | {error, state(), error_reason()}.
|
|
|
|
handle_unsubscribe(#unsubscribe{id = ID, filters = TopicFilters}, State) ->
|
|
|
|
USR = jid:tolower(State#state.jid),
|
|
|
|
{Codes, Subs, Props} = unsubscribe(TopicFilters, USR, State#state.subscriptions),
|
|
|
|
State1 = State#state{subscriptions = Subs},
|
|
|
|
Unsuback = #unsuback{id = ID, codes = Codes, properties = Props},
|
|
|
|
send(State1, Unsuback).
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% Aux functions for CONNECT/PUBLISH/SUBSCRIBE/UNSUBSCRIBE handlers
|
|
|
|
%%%===================================================================
|
|
|
|
-spec set_session_properties(state(), connect()) -> state().
|
|
|
|
set_session_properties(#state{version = Version,
|
|
|
|
jid = #jid{lserver = Server}} = State,
|
|
|
|
#connect{clean_start = CleanStart,
|
|
|
|
keep_alive = KeepAlive,
|
|
|
|
properties = Props} = Pkt) ->
|
|
|
|
SEMin = case CleanStart of
|
|
|
|
false when Version == ?MQTT_VERSION_4 -> infinity;
|
2019-07-17 21:58:14 +02:00
|
|
|
_ -> timer:seconds(maps:get(session_expiry_interval, Props, 0))
|
2019-02-25 09:42:09 +01:00
|
|
|
end,
|
|
|
|
SEConfig = session_expiry(Server),
|
|
|
|
State1 = State#state{session_expiry = min(SEMin, SEConfig)},
|
|
|
|
State2 = set_will_properties(State1, Pkt),
|
|
|
|
set_keep_alive(State2, KeepAlive).
|
|
|
|
|
|
|
|
-spec set_will_properties(state(), connect()) -> state().
|
|
|
|
set_will_properties(State, #connect{will = #publish{} = Will,
|
|
|
|
will_properties = Props}) ->
|
|
|
|
{WillDelay, Props1} = case maps:take(will_delay_interval, Props) of
|
|
|
|
error -> {0, Props};
|
|
|
|
Ret -> Ret
|
|
|
|
end,
|
|
|
|
State#state{will = Will#publish{properties = Props1},
|
2019-07-17 21:58:14 +02:00
|
|
|
will_delay = timer:seconds(WillDelay)};
|
2019-02-25 09:42:09 +01:00
|
|
|
set_will_properties(State, _) ->
|
|
|
|
State.
|
|
|
|
|
|
|
|
-spec get_connack_properties(state(), connect()) -> properties().
|
|
|
|
get_connack_properties(#state{session_expiry = SessExp, jid = JID},
|
|
|
|
#connect{client_id = ClientID,
|
2019-10-11 15:46:16 +02:00
|
|
|
keep_alive = KeepAlive,
|
|
|
|
properties = Props}) ->
|
2019-02-25 09:42:09 +01:00
|
|
|
Props1 = case ClientID of
|
|
|
|
<<>> -> #{assigned_client_identifier => JID#jid.lresource};
|
|
|
|
_ -> #{}
|
|
|
|
end,
|
2019-10-11 15:46:16 +02:00
|
|
|
Props2 = case maps:find(authentication_method, Props) of
|
|
|
|
{ok, Method} -> Props1#{authentication_method => Method};
|
|
|
|
error -> Props1
|
|
|
|
end,
|
|
|
|
Props2#{session_expiry_interval => SessExp div 1000,
|
2019-02-25 09:42:09 +01:00
|
|
|
shared_subscription_available => false,
|
|
|
|
topic_alias_maximum => topic_alias_maximum(JID#jid.lserver),
|
|
|
|
server_keep_alive => KeepAlive}.
|
|
|
|
|
|
|
|
-spec subscribe([{binary(), sub_opts()}], jid:ljid(), non_neg_integer()) ->
|
2019-06-27 14:22:27 +02:00
|
|
|
{[reason_code()], subscriptions(), properties()}.
|
2019-02-25 09:42:09 +01:00
|
|
|
subscribe(TopicFilters, USR, SubID) ->
|
|
|
|
subscribe(TopicFilters, USR, SubID, [], #{}, ok).
|
|
|
|
|
|
|
|
-spec subscribe([{binary(), sub_opts()}], jid:ljid(), non_neg_integer(),
|
2019-06-27 14:22:27 +02:00
|
|
|
[reason_code()], subscriptions(), ok | {error, error_reason()}) ->
|
|
|
|
{[reason_code()], subscriptions(), properties()}.
|
2019-02-25 09:42:09 +01:00
|
|
|
subscribe([{TopicFilter, SubOpts}|TopicFilters], USR, SubID, Codes, Subs, Err) ->
|
|
|
|
case mod_mqtt:subscribe(USR, TopicFilter, SubOpts, SubID) of
|
|
|
|
ok ->
|
|
|
|
Code = subscribe_reason_code(SubOpts#sub_opts.qos),
|
|
|
|
subscribe(TopicFilters, USR, SubID, [Code|Codes],
|
|
|
|
maps:put(TopicFilter, {SubOpts, SubID}, Subs), Err);
|
|
|
|
{error, Why} = Err1 ->
|
|
|
|
Code = subscribe_reason_code(Why),
|
|
|
|
subscribe(TopicFilters, USR, SubID, [Code|Codes], Subs, Err1)
|
|
|
|
end;
|
|
|
|
subscribe([], _USR, _SubID, Codes, Subs, Err) ->
|
|
|
|
Props = case Err of
|
|
|
|
ok -> #{};
|
|
|
|
{error, Why} ->
|
|
|
|
#{reason_string => format_reason_string(Why)}
|
|
|
|
end,
|
|
|
|
{lists:reverse(Codes), Subs, Props}.
|
|
|
|
|
2019-06-27 14:22:27 +02:00
|
|
|
-spec unsubscribe([binary()], jid:ljid(), subscriptions()) ->
|
|
|
|
{[reason_code()], subscriptions(), properties()}.
|
2019-02-25 09:42:09 +01:00
|
|
|
unsubscribe(TopicFilters, USR, Subs) ->
|
|
|
|
unsubscribe(TopicFilters, USR, [], Subs, ok).
|
|
|
|
|
|
|
|
-spec unsubscribe([binary()], jid:ljid(),
|
2019-06-27 14:22:27 +02:00
|
|
|
[reason_code()], subscriptions(),
|
2019-02-25 09:42:09 +01:00
|
|
|
ok | {error, error_reason()}) ->
|
2019-06-27 14:22:27 +02:00
|
|
|
{[reason_code()], subscriptions(), properties()}.
|
2019-02-25 09:42:09 +01:00
|
|
|
unsubscribe([TopicFilter|TopicFilters], USR, Codes, Subs, Err) ->
|
|
|
|
case mod_mqtt:unsubscribe(USR, TopicFilter) of
|
|
|
|
ok ->
|
|
|
|
unsubscribe(TopicFilters, USR, [success|Codes],
|
|
|
|
maps:remove(TopicFilter, Subs), Err);
|
|
|
|
{error, notfound} ->
|
|
|
|
unsubscribe(TopicFilters, USR,
|
|
|
|
['no-subscription-existed'|Codes],
|
|
|
|
maps:remove(TopicFilter, Subs), Err);
|
|
|
|
{error, Why} = Err1 ->
|
|
|
|
Code = unsubscribe_reason_code(Why),
|
|
|
|
unsubscribe(TopicFilters, USR, [Code|Codes], Subs, Err1)
|
|
|
|
end;
|
|
|
|
unsubscribe([], _USR, Codes, Subs, Err) ->
|
|
|
|
Props = case Err of
|
|
|
|
ok -> #{};
|
|
|
|
{error, Why} ->
|
|
|
|
#{reason_string => format_reason_string(Why)}
|
|
|
|
end,
|
|
|
|
{lists:reverse(Codes), Subs, Props}.
|
|
|
|
|
2019-06-27 14:22:27 +02:00
|
|
|
-spec select_retained(jid:ljid(), subscriptions(), subscriptions()) -> [{publish(), seconds()}].
|
2019-02-25 09:42:09 +01:00
|
|
|
select_retained(USR, NewSubs, OldSubs) ->
|
|
|
|
lists:flatten(
|
|
|
|
maps:fold(
|
|
|
|
fun(_Filter, {#sub_opts{retain_handling = 2}, _SubID}, Acc) ->
|
|
|
|
Acc;
|
|
|
|
(Filter, {#sub_opts{retain_handling = 1, qos = QoS}, SubID}, Acc) ->
|
|
|
|
case maps:is_key(Filter, OldSubs) of
|
|
|
|
true -> Acc;
|
|
|
|
false -> [mod_mqtt:select_retained(USR, Filter, QoS, SubID)|Acc]
|
|
|
|
end;
|
|
|
|
(Filter, {#sub_opts{qos = QoS}, SubID}, Acc) ->
|
|
|
|
[mod_mqtt:select_retained(USR, Filter, QoS, SubID)|Acc]
|
|
|
|
end, [], NewSubs)).
|
|
|
|
|
|
|
|
-spec send_retained(state(), [{publish(), seconds()}]) ->
|
|
|
|
{ok, state()} | {error, state(), error_reason()}.
|
|
|
|
send_retained(State, [{#publish{meta = Meta} = Pub, Expiry}|Pubs]) ->
|
|
|
|
I = next_id(State#state.id),
|
|
|
|
Meta1 = Meta#{expiry_time => Expiry},
|
|
|
|
Pub1 = Pub#publish{id = I, retain = true, meta = Meta1},
|
|
|
|
case send(State#state{id = I}, Pub1) of
|
|
|
|
{ok, State1} ->
|
|
|
|
send_retained(State1, Pubs);
|
|
|
|
Err ->
|
|
|
|
Err
|
|
|
|
end;
|
|
|
|
send_retained(State, []) ->
|
|
|
|
{ok, State}.
|
|
|
|
|
|
|
|
-spec publish(state(), publish()) -> {ok, non_neg_integer()} |
|
|
|
|
{error, error_reason()}.
|
|
|
|
publish(State, #publish{topic = Topic, properties = Props} = Pkt) ->
|
|
|
|
MessageExpiry = maps:get(message_expiry_interval, Props, ?MAX_UINT32),
|
|
|
|
ExpiryTime = min(unix_time() + MessageExpiry, ?MAX_UINT32),
|
|
|
|
USR = jid:tolower(State#state.jid),
|
|
|
|
Props1 = maps:filter(
|
|
|
|
fun(payload_format_indicator, _) -> true;
|
|
|
|
(content_type, _) -> true;
|
|
|
|
(response_topic, _) -> true;
|
|
|
|
(correlation_data, _) -> true;
|
|
|
|
(user_property, _) -> true;
|
|
|
|
(_, _) -> false
|
|
|
|
end, Props),
|
|
|
|
Topic1 = case Topic of
|
|
|
|
<<>> ->
|
|
|
|
Alias = maps:get(topic_alias, Props),
|
|
|
|
maps:get(Alias, State#state.topic_aliases);
|
|
|
|
_ ->
|
|
|
|
Topic
|
|
|
|
end,
|
|
|
|
Pkt1 = Pkt#publish{topic = Topic1, properties = Props1},
|
|
|
|
mod_mqtt:publish(USR, Pkt1, ExpiryTime).
|
|
|
|
|
|
|
|
-spec store_topic_alias(state(), publish()) -> state().
|
|
|
|
store_topic_alias(State, #publish{topic = <<_, _/binary>> = Topic,
|
|
|
|
properties = #{topic_alias := Alias}}) ->
|
|
|
|
Aliases = maps:put(Alias, Topic, State#state.topic_aliases),
|
|
|
|
State#state{topic_aliases = Aliases};
|
|
|
|
store_topic_alias(State, _) ->
|
|
|
|
State.
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% Socket management
|
|
|
|
%%%===================================================================
|
|
|
|
-spec send(state(), mqtt_packet()) -> {ok, state()} |
|
|
|
|
{error, state(), error_reason()}.
|
|
|
|
send(State, #publish{} = Pkt) ->
|
|
|
|
case is_expired(Pkt) of
|
|
|
|
{false, Pkt1} ->
|
|
|
|
case State#state.in_flight == undefined andalso
|
|
|
|
p1_queue:is_empty(State#state.queue) of
|
|
|
|
true ->
|
|
|
|
Dup = case Pkt1#publish.qos of
|
|
|
|
0 -> undefined;
|
|
|
|
_ -> Pkt1
|
|
|
|
end,
|
|
|
|
State1 = State#state{in_flight = Dup},
|
|
|
|
{ok, do_send(State1, Pkt1)};
|
|
|
|
false ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Queueing packet:~n~ts~n** when state:~n~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
[pp(Pkt), pp(State)]),
|
|
|
|
try p1_queue:in(Pkt, State#state.queue) of
|
|
|
|
Q ->
|
|
|
|
State1 = State#state{queue = Q},
|
|
|
|
{ok, State1}
|
|
|
|
catch error:full ->
|
|
|
|
Q = p1_queue:clear(State#state.queue),
|
|
|
|
State1 = State#state{queue = Q, session_expiry = 0},
|
|
|
|
{error, State1, queue_full}
|
|
|
|
end
|
|
|
|
end;
|
|
|
|
true ->
|
|
|
|
{ok, State}
|
|
|
|
end;
|
|
|
|
send(State, Pkt) ->
|
|
|
|
{ok, do_send(State, Pkt)}.
|
|
|
|
|
|
|
|
-spec resend(state()) -> {ok, state()} | {error, state(), error_reason()}.
|
|
|
|
resend(#state{in_flight = undefined} = State) ->
|
|
|
|
case p1_queue:out(State#state.queue) of
|
|
|
|
{{value, #publish{qos = QoS} = Pkt}, Q} ->
|
|
|
|
case is_expired(Pkt) of
|
|
|
|
true ->
|
|
|
|
resend(State#state{queue = Q});
|
|
|
|
{false, Pkt1} when QoS > 0 ->
|
|
|
|
State1 = State#state{in_flight = Pkt1, queue = Q},
|
|
|
|
{ok, do_send(State1, Pkt1)};
|
|
|
|
{false, Pkt1} ->
|
|
|
|
State1 = do_send(State#state{queue = Q}, Pkt1),
|
|
|
|
resend(State1)
|
|
|
|
end;
|
|
|
|
{empty, _} ->
|
|
|
|
{ok, State}
|
|
|
|
end;
|
|
|
|
resend(#state{in_flight = Pkt} = State) ->
|
|
|
|
{ok, do_send(State, set_dup_flag(Pkt))}.
|
|
|
|
|
|
|
|
-spec do_send(state(), mqtt_packet()) -> state().
|
|
|
|
do_send(#state{socket = {SockMod, Sock} = Socket} = State, Pkt) ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Send MQTT packet:~n~ts", [pp(Pkt)]),
|
2019-02-25 09:42:09 +01:00
|
|
|
Data = mqtt_codec:encode(State#state.version, Pkt),
|
|
|
|
Res = SockMod:send(Sock, Data),
|
|
|
|
check_sock_result(Socket, Res),
|
|
|
|
State;
|
|
|
|
do_send(State, _Pkt) ->
|
|
|
|
State.
|
|
|
|
|
|
|
|
-spec activate(socket()) -> ok.
|
|
|
|
activate({SockMod, Sock} = Socket) ->
|
|
|
|
Res = case SockMod of
|
|
|
|
gen_tcp -> inet:setopts(Sock, [{active, once}]);
|
|
|
|
_ -> SockMod:setopts(Sock, [{active, once}])
|
|
|
|
end,
|
|
|
|
check_sock_result(Socket, Res).
|
|
|
|
|
2019-04-23 15:22:27 +02:00
|
|
|
-spec peername(state()) -> {ok, peername()} | {error, socket_error_reason()}.
|
|
|
|
peername(#state{socket = {SockMod, Sock}}) ->
|
|
|
|
case SockMod of
|
|
|
|
gen_tcp -> inet:peername(Sock);
|
|
|
|
_ -> SockMod:peername(Sock)
|
|
|
|
end.
|
|
|
|
|
2019-02-25 09:42:09 +01:00
|
|
|
-spec disconnect(state(), error_reason()) -> state().
|
|
|
|
disconnect(#state{socket = {SockMod, Sock}} = State, Err) ->
|
|
|
|
State1 = case Err of
|
|
|
|
{auth, Code} ->
|
|
|
|
do_send(State, #connack{code = Code});
|
|
|
|
{codec, {Tag, _, _}} when Tag == unsupported_protocol_version;
|
|
|
|
Tag == unsupported_protocol_name ->
|
|
|
|
do_send(State#state{version = ?MQTT_VERSION_4},
|
|
|
|
#connack{code = connack_reason_code(Err)});
|
|
|
|
_ when State#state.version == undefined ->
|
|
|
|
State;
|
|
|
|
{Tag, _} when Tag == socket; Tag == tls ->
|
|
|
|
State;
|
|
|
|
{peer_disconnected, _, _} ->
|
|
|
|
State;
|
|
|
|
_ ->
|
|
|
|
Props = #{reason_string => format_reason_string(Err)},
|
|
|
|
case State#state.jid of
|
|
|
|
undefined ->
|
|
|
|
Code = connack_reason_code(Err),
|
|
|
|
Pkt = #connack{code = Code, properties = Props},
|
|
|
|
do_send(State, Pkt);
|
|
|
|
_ when State#state.version == ?MQTT_VERSION_5 ->
|
|
|
|
Code = disconnect_reason_code(Err),
|
|
|
|
Pkt = #disconnect{code = Code, properties = Props},
|
|
|
|
do_send(State, Pkt);
|
|
|
|
_ ->
|
|
|
|
State
|
|
|
|
end
|
|
|
|
end,
|
|
|
|
SockMod:close(Sock),
|
|
|
|
State1#state{socket = undefined,
|
|
|
|
version = undefined,
|
|
|
|
codec = mqtt_codec:renew(State#state.codec)};
|
|
|
|
disconnect(State, _) ->
|
|
|
|
State.
|
|
|
|
|
|
|
|
-spec check_sock_result(socket(), ok | {error, inet:posix()}) -> ok.
|
|
|
|
check_sock_result(_, ok) ->
|
|
|
|
ok;
|
|
|
|
check_sock_result({_, Sock}, {error, Why}) ->
|
|
|
|
self() ! {tcp_closed, Sock},
|
|
|
|
?DEBUG("MQTT socket error: ~p", [format_inet_error(Why)]).
|
|
|
|
|
2019-06-21 13:39:46 +02:00
|
|
|
-spec starttls(state()) -> {ok, socket()} | {error, error_reason()}.
|
|
|
|
starttls(#state{socket = {gen_tcp, Socket}, tls = true}) ->
|
2019-02-25 09:42:09 +01:00
|
|
|
case ejabberd_pkix:get_certfile() of
|
|
|
|
{ok, Cert} ->
|
2022-03-14 13:37:21 +01:00
|
|
|
CAFileOpt =
|
|
|
|
case ejabberd_option:c2s_cafile(ejabberd_config:get_myname()) of
|
|
|
|
undefined -> [];
|
|
|
|
CAFile -> [{cafile, CAFile}]
|
|
|
|
end,
|
|
|
|
case fast_tls:tcp_to_tls(Socket, [{certfile, Cert}] ++ CAFileOpt) of
|
2019-02-25 09:42:09 +01:00
|
|
|
{ok, TLSSock} ->
|
|
|
|
{ok, {fast_tls, TLSSock}};
|
|
|
|
{error, Why} ->
|
|
|
|
{error, {tls, Why}}
|
|
|
|
end;
|
|
|
|
error ->
|
|
|
|
{error, {tls, no_certfile}}
|
|
|
|
end;
|
2019-06-21 13:39:46 +02:00
|
|
|
starttls(#state{socket = Socket}) ->
|
2019-02-25 09:42:09 +01:00
|
|
|
{ok, Socket}.
|
|
|
|
|
|
|
|
-spec recv_data(socket(), binary()) -> {ok, binary()} | {error, error_reason()}.
|
|
|
|
recv_data({fast_tls, Sock}, Data) ->
|
|
|
|
case fast_tls:recv_data(Sock, Data) of
|
|
|
|
{ok, _} = OK -> OK;
|
|
|
|
{error, E} when is_atom(E) -> {error, {socket, E}};
|
2021-02-11 20:34:21 +01:00
|
|
|
{error, E} when is_binary(E) -> {error, {tls, E}}
|
2019-02-25 09:42:09 +01:00
|
|
|
end;
|
|
|
|
recv_data(_, Data) ->
|
|
|
|
{ok, Data}.
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% Formatters
|
|
|
|
%%%===================================================================
|
|
|
|
-spec pp(any()) -> iolist().
|
|
|
|
pp(Term) ->
|
|
|
|
io_lib_pretty:print(Term, fun pp/2).
|
|
|
|
|
|
|
|
-spec format_inet_error(socket_error_reason()) -> string().
|
|
|
|
format_inet_error(closed) ->
|
|
|
|
"connection closed";
|
|
|
|
format_inet_error(timeout) ->
|
|
|
|
format_inet_error(etimedout);
|
|
|
|
format_inet_error(Reason) ->
|
|
|
|
case inet:format_error(Reason) of
|
|
|
|
"unknown POSIX error" -> atom_to_list(Reason);
|
|
|
|
Txt -> Txt
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec format_tls_error(atom() | binary()) -> string() | binary().
|
2019-06-21 13:39:46 +02:00
|
|
|
format_tls_error(no_certfile) ->
|
|
|
|
"certificate not configured";
|
2019-02-25 09:42:09 +01:00
|
|
|
format_tls_error(Reason) when is_atom(Reason) ->
|
|
|
|
format_inet_error(Reason);
|
|
|
|
format_tls_error(Reason) ->
|
|
|
|
Reason.
|
|
|
|
|
|
|
|
-spec format_exit_reason(term()) -> string().
|
|
|
|
format_exit_reason(noproc) ->
|
|
|
|
"process is dead";
|
|
|
|
format_exit_reason(normal) ->
|
|
|
|
"process has exited";
|
|
|
|
format_exit_reason(killed) ->
|
|
|
|
"process has been killed";
|
|
|
|
format_exit_reason(timeout) ->
|
|
|
|
"remote call to process timed out";
|
|
|
|
format_exit_reason(Why) ->
|
|
|
|
format("unexpected error: ~p", [Why]).
|
|
|
|
|
|
|
|
%% Same as format_error/1, but hides sensitive data
|
|
|
|
%% and returns result as binary
|
|
|
|
-spec format_reason_string(error_reason()) -> binary().
|
|
|
|
format_reason_string({resumed, _}) ->
|
|
|
|
<<"Resumed by another connection">>;
|
|
|
|
format_reason_string({replaced, _}) ->
|
|
|
|
<<"Replaced by another connection">>;
|
|
|
|
format_reason_string(Err) ->
|
|
|
|
list_to_binary(format_error(Err)).
|
|
|
|
|
|
|
|
-spec format(io:format(), list()) -> string().
|
|
|
|
format(Fmt, Args) ->
|
|
|
|
lists:flatten(io_lib:format(Fmt, Args)).
|
|
|
|
|
|
|
|
-spec pp(atom(), non_neg_integer()) -> [atom()] | no.
|
|
|
|
pp(state, 17) -> record_info(fields, state);
|
|
|
|
pp(Rec, Size) -> mqtt_codec:pp(Rec, Size).
|
|
|
|
|
|
|
|
-spec publish_reason_code(error_reason()) -> reason_code().
|
|
|
|
publish_reason_code(publish_forbidden) -> 'topic-name-invalid';
|
|
|
|
publish_reason_code(_) -> 'implementation-specific-error'.
|
|
|
|
|
|
|
|
-spec subscribe_reason_code(qos() | error_reason()) -> reason_code().
|
|
|
|
subscribe_reason_code(0) -> 'granted-qos-0';
|
|
|
|
subscribe_reason_code(1) -> 'granted-qos-1';
|
|
|
|
subscribe_reason_code(2) -> 'granted-qos-2';
|
|
|
|
subscribe_reason_code(subscribe_forbidden) -> 'topic-filter-invalid';
|
|
|
|
subscribe_reason_code(_) -> 'implementation-specific-error'.
|
|
|
|
|
|
|
|
-spec unsubscribe_reason_code(error_reason()) -> reason_code().
|
|
|
|
unsubscribe_reason_code(_) -> 'implementation-specific-error'.
|
|
|
|
|
|
|
|
-spec disconnect_reason_code(error_reason()) -> reason_code().
|
|
|
|
disconnect_reason_code({code, Code}) -> Code;
|
|
|
|
disconnect_reason_code({codec, Err}) -> mqtt_codec:error_reason_code(Err);
|
|
|
|
disconnect_reason_code({unexpected_packet, _}) -> 'protocol-error';
|
|
|
|
disconnect_reason_code({replaced, _}) -> 'session-taken-over';
|
|
|
|
disconnect_reason_code({resumed, _}) -> 'session-taken-over';
|
|
|
|
disconnect_reason_code(internal_server_error) -> 'implementation-specific-error';
|
|
|
|
disconnect_reason_code(db_failure) -> 'implementation-specific-error';
|
|
|
|
disconnect_reason_code(idle_connection) -> 'keep-alive-timeout';
|
|
|
|
disconnect_reason_code(queue_full) -> 'quota-exceeded';
|
|
|
|
disconnect_reason_code(shutdown) -> 'server-shutting-down';
|
|
|
|
disconnect_reason_code(subscribe_forbidden) -> 'topic-filter-invalid';
|
|
|
|
disconnect_reason_code(publish_forbidden) -> 'topic-name-invalid';
|
|
|
|
disconnect_reason_code(will_topic_forbidden) -> 'topic-name-invalid';
|
|
|
|
disconnect_reason_code({payload_format_invalid, _}) -> 'payload-format-invalid';
|
|
|
|
disconnect_reason_code(session_expiry_non_zero) -> 'protocol-error';
|
|
|
|
disconnect_reason_code(unknown_topic_alias) -> 'protocol-error';
|
|
|
|
disconnect_reason_code(_) -> 'unspecified-error'.
|
|
|
|
|
|
|
|
-spec connack_reason_code(error_reason()) -> reason_code().
|
|
|
|
connack_reason_code({Tag, Code}) when Tag == auth; Tag == code -> Code;
|
|
|
|
connack_reason_code({codec, Err}) -> mqtt_codec:error_reason_code(Err);
|
|
|
|
connack_reason_code({unexpected_packet, _}) -> 'protocol-error';
|
|
|
|
connack_reason_code(internal_server_error) -> 'implementation-specific-error';
|
|
|
|
connack_reason_code(db_failure) -> 'implementation-specific-error';
|
|
|
|
connack_reason_code(idle_connection) -> 'keep-alive-timeout';
|
|
|
|
connack_reason_code(queue_full) -> 'quota-exceeded';
|
|
|
|
connack_reason_code(shutdown) -> 'server-shutting-down';
|
|
|
|
connack_reason_code(will_topic_forbidden) -> 'topic-name-invalid';
|
|
|
|
connack_reason_code({payload_format_invalid, _}) -> 'payload-format-invalid';
|
|
|
|
connack_reason_code(session_expiry_non_zero) -> 'protocol-error';
|
|
|
|
connack_reason_code(_) -> 'unspecified-error'.
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% Configuration processing
|
|
|
|
%%%===================================================================
|
|
|
|
-spec queue_type(binary()) -> ram | file.
|
|
|
|
queue_type(Host) ->
|
2019-06-14 11:33:26 +02:00
|
|
|
mod_mqtt_opt:queue_type(Host).
|
2019-02-25 09:42:09 +01:00
|
|
|
|
|
|
|
-spec queue_limit(binary()) -> non_neg_integer() | unlimited.
|
|
|
|
queue_limit(Host) ->
|
2019-06-14 11:33:26 +02:00
|
|
|
mod_mqtt_opt:max_queue(Host).
|
2019-02-25 09:42:09 +01:00
|
|
|
|
2019-07-17 21:58:14 +02:00
|
|
|
-spec session_expiry(binary()) -> milli_seconds().
|
2019-02-25 09:42:09 +01:00
|
|
|
session_expiry(Host) ->
|
2019-06-14 11:33:26 +02:00
|
|
|
mod_mqtt_opt:session_expiry(Host).
|
2019-02-25 09:42:09 +01:00
|
|
|
|
|
|
|
-spec topic_alias_maximum(binary()) -> non_neg_integer().
|
|
|
|
topic_alias_maximum(Host) ->
|
2019-06-14 11:33:26 +02:00
|
|
|
mod_mqtt_opt:max_topic_aliases(Host).
|
2019-02-25 09:42:09 +01:00
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% Timings
|
|
|
|
%%%===================================================================
|
|
|
|
-spec current_time() -> milli_seconds().
|
|
|
|
current_time() ->
|
2019-02-27 09:56:20 +01:00
|
|
|
erlang:monotonic_time(millisecond).
|
2019-02-25 09:42:09 +01:00
|
|
|
|
|
|
|
-spec unix_time() -> seconds().
|
|
|
|
unix_time() ->
|
2019-02-27 09:56:20 +01:00
|
|
|
erlang:system_time(second).
|
2019-02-25 09:42:09 +01:00
|
|
|
|
|
|
|
-spec set_keep_alive(state(), seconds()) -> state().
|
|
|
|
set_keep_alive(State, 0) ->
|
|
|
|
?DEBUG("Disabling MQTT keep-alive", []),
|
|
|
|
State#state{timeout = infinity};
|
|
|
|
set_keep_alive(State, Secs) ->
|
|
|
|
Secs1 = round(Secs * 1.5),
|
|
|
|
?DEBUG("Setting MQTT keep-alive to ~B seconds", [Secs1]),
|
|
|
|
set_timeout(State, timer:seconds(Secs1)).
|
|
|
|
|
|
|
|
-spec reset_keep_alive(state()) -> state().
|
|
|
|
reset_keep_alive(#state{timeout = {MSecs, _}, jid = #jid{}} = State) ->
|
|
|
|
set_timeout(State, MSecs);
|
|
|
|
reset_keep_alive(State) ->
|
|
|
|
State.
|
|
|
|
|
|
|
|
-spec set_timeout(state(), milli_seconds()) -> state().
|
|
|
|
set_timeout(State, MSecs) ->
|
|
|
|
Time = current_time(),
|
|
|
|
State#state{timeout = {MSecs, Time}}.
|
|
|
|
|
|
|
|
-spec is_expired(publish()) -> true | {false, publish()}.
|
|
|
|
is_expired(#publish{meta = Meta, properties = Props} = Pkt) ->
|
|
|
|
case maps:get(expiry_time, Meta, ?MAX_UINT32) of
|
|
|
|
?MAX_UINT32 ->
|
|
|
|
{false, Pkt};
|
|
|
|
ExpiryTime ->
|
|
|
|
Left = ExpiryTime - unix_time(),
|
|
|
|
if Left > 0 ->
|
|
|
|
Props1 = Props#{message_expiry_interval => Left},
|
|
|
|
{false, Pkt#publish{properties = Props1}};
|
|
|
|
true ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Dropping expired packet:~n~ts", [pp(Pkt)]),
|
2019-02-25 09:42:09 +01:00
|
|
|
true
|
|
|
|
end
|
|
|
|
end.
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% Authentication
|
|
|
|
%%%===================================================================
|
|
|
|
-spec parse_credentials(connect()) -> {ok, jid:jid()} | {error, reason_code()}.
|
2022-01-11 17:19:12 +01:00
|
|
|
parse_credentials(#connect{client_id = <<>>} = C) ->
|
|
|
|
parse_credentials(C#connect{client_id = p1_rand:get_string()});
|
2019-02-25 09:42:09 +01:00
|
|
|
parse_credentials(#connect{username = <<>>, client_id = ClientID}) ->
|
|
|
|
Host = ejabberd_config:get_myname(),
|
|
|
|
JID = case jid:make(ClientID, Host) of
|
|
|
|
error -> jid:make(str:sha(ClientID), Host);
|
|
|
|
J -> J
|
|
|
|
end,
|
|
|
|
parse_credentials(JID, ClientID);
|
|
|
|
parse_credentials(#connect{username = User} = Pkt) ->
|
|
|
|
try jid:decode(User) of
|
|
|
|
#jid{luser = <<>>} ->
|
|
|
|
case jid:make(User, ejabberd_config:get_myname()) of
|
|
|
|
error ->
|
|
|
|
{error, 'bad-user-name-or-password'};
|
|
|
|
JID ->
|
|
|
|
parse_credentials(JID, Pkt#connect.client_id)
|
|
|
|
end;
|
|
|
|
JID ->
|
|
|
|
parse_credentials(JID, Pkt#connect.client_id)
|
|
|
|
catch _:{bad_jid, _} ->
|
|
|
|
{error, 'bad-user-name-or-password'}
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec parse_credentials(jid:jid(), binary()) -> {ok, jid:jid()} | {error, reason_code()}.
|
|
|
|
parse_credentials(JID, ClientID) ->
|
|
|
|
case gen_mod:is_loaded(JID#jid.lserver, mod_mqtt) of
|
|
|
|
false ->
|
|
|
|
{error, 'server-unavailable'};
|
|
|
|
true ->
|
|
|
|
case jid:replace_resource(JID, ClientID) of
|
|
|
|
error ->
|
|
|
|
{error, 'client-identifier-not-valid'};
|
|
|
|
JID1 ->
|
|
|
|
{ok, JID1}
|
|
|
|
end
|
|
|
|
end.
|
|
|
|
|
2022-03-14 13:37:21 +01:00
|
|
|
-spec authenticate(connect(), peername(), state()) -> {ok, jid:jid()} | {error, reason_code()}.
|
|
|
|
authenticate(Pkt, IP, State) ->
|
|
|
|
case authenticate(Pkt, State) of
|
2019-10-11 15:46:16 +02:00
|
|
|
{ok, JID, AuthModule} ->
|
|
|
|
?INFO_MSG("Accepted MQTT authentication for ~ts by ~s backend from ~s",
|
|
|
|
[jid:encode(JID),
|
|
|
|
ejabberd_auth:backend_type(AuthModule),
|
|
|
|
ejabberd_config:may_hide_data(misc:ip_to_list(IP))]),
|
|
|
|
{ok, JID};
|
|
|
|
{error, _} = Err ->
|
|
|
|
Err
|
|
|
|
end.
|
|
|
|
|
2022-03-14 13:37:21 +01:00
|
|
|
-spec authenticate(connect(), state()) -> {ok, jid:jid(), module()} | {error, reason_code()}.
|
|
|
|
authenticate(#connect{password = Pass, properties = Props} = Pkt, State) ->
|
2019-02-25 09:42:09 +01:00
|
|
|
case parse_credentials(Pkt) of
|
|
|
|
{ok, #jid{luser = LUser, lserver = LServer} = JID} ->
|
2019-10-11 15:46:16 +02:00
|
|
|
case maps:find(authentication_method, Props) of
|
|
|
|
{ok, <<"X-OAUTH2">>} ->
|
|
|
|
Token = maps:get(authentication_data, Props, <<>>),
|
|
|
|
case ejabberd_oauth:check_token(
|
|
|
|
LUser, LServer, [<<"sasl_auth">>], Token) of
|
|
|
|
true -> {ok, JID, ejabberd_oauth};
|
|
|
|
_ -> {error, 'not-authorized'}
|
|
|
|
end;
|
|
|
|
{ok, _} ->
|
|
|
|
{error, 'bad-authentication-method'};
|
|
|
|
error ->
|
2022-03-14 13:37:21 +01:00
|
|
|
case Pass of
|
|
|
|
<<>> ->
|
|
|
|
case tls_auth(JID, State) of
|
|
|
|
true ->
|
|
|
|
{ok, JID, pkix};
|
|
|
|
false ->
|
2023-02-01 16:58:25 +01:00
|
|
|
{error, 'not-authorized'};
|
|
|
|
no_cert ->
|
|
|
|
case ejabberd_auth:check_password_with_authmodule(
|
|
|
|
LUser, <<>>, LServer, Pass) of
|
|
|
|
{true, AuthModule} -> {ok, JID, AuthModule};
|
|
|
|
false -> {error, 'not-authorized'}
|
|
|
|
end
|
2022-03-14 13:37:21 +01:00
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
case ejabberd_auth:check_password_with_authmodule(
|
|
|
|
LUser, <<>>, LServer, Pass) of
|
|
|
|
{true, AuthModule} -> {ok, JID, AuthModule};
|
|
|
|
false -> {error, 'not-authorized'}
|
|
|
|
end
|
|
|
|
end
|
2019-10-11 15:46:16 +02:00
|
|
|
end;
|
|
|
|
{error, _} = Err ->
|
|
|
|
Err
|
2019-02-25 09:42:09 +01:00
|
|
|
end.
|
|
|
|
|
2023-02-01 17:32:22 +01:00
|
|
|
-spec tls_auth(jid:jid(), state()) -> boolean() | no_cert.
|
2022-03-14 13:37:21 +01:00
|
|
|
tls_auth(_JID, #state{tls_verify = false}) ->
|
2023-02-01 16:58:25 +01:00
|
|
|
no_cert;
|
2022-03-14 13:37:21 +01:00
|
|
|
tls_auth(JID, State) ->
|
|
|
|
case State#state.socket of
|
|
|
|
{fast_tls, Sock} ->
|
|
|
|
case fast_tls:get_peer_certificate(Sock, otp) of
|
|
|
|
{ok, Cert} ->
|
|
|
|
case fast_tls:get_verify_result(Sock) of
|
|
|
|
0 ->
|
|
|
|
case get_cert_jid(Cert) of
|
|
|
|
{ok, JID2} ->
|
|
|
|
jid:remove_resource(jid:tolower(JID)) ==
|
|
|
|
jid:remove_resource(jid:tolower(JID2));
|
|
|
|
error ->
|
|
|
|
false
|
|
|
|
end;
|
|
|
|
VerifyRes ->
|
|
|
|
Reason = fast_tls:get_cert_verify_string(VerifyRes, Cert),
|
|
|
|
?WARNING_MSG("TLS verify failed: ~s", [Reason]),
|
|
|
|
false
|
|
|
|
end;
|
|
|
|
error ->
|
2023-02-01 16:58:25 +01:00
|
|
|
no_cert
|
2022-03-14 13:37:21 +01:00
|
|
|
end;
|
|
|
|
_ ->
|
2023-02-01 16:58:25 +01:00
|
|
|
no_cert
|
2022-03-14 13:37:21 +01:00
|
|
|
end.
|
|
|
|
|
|
|
|
get_cert_jid(Cert) ->
|
|
|
|
case Cert#'OTPCertificate'.tbsCertificate#'OTPTBSCertificate'.subject of
|
|
|
|
{rdnSequence, Attrs1} ->
|
|
|
|
Attrs = lists:flatten(Attrs1),
|
|
|
|
case lists:keyfind(?'id-at-commonName',
|
|
|
|
#'AttributeTypeAndValue'.type, Attrs) of
|
|
|
|
#'AttributeTypeAndValue'{value = {utf8String, Val}} ->
|
|
|
|
try jid:decode(Val) of
|
|
|
|
#jid{luser = <<>>} ->
|
|
|
|
case jid:make(Val, ejabberd_config:get_myname()) of
|
|
|
|
error ->
|
|
|
|
error;
|
|
|
|
JID ->
|
|
|
|
{ok, JID}
|
|
|
|
end;
|
|
|
|
JID ->
|
|
|
|
{ok, JID}
|
|
|
|
catch _:{bad_jid, _} ->
|
|
|
|
error
|
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
error
|
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
error
|
|
|
|
end.
|
|
|
|
|
2019-02-25 09:42:09 +01:00
|
|
|
%%%===================================================================
|
|
|
|
%%% Validators
|
|
|
|
%%%===================================================================
|
2019-06-27 10:32:54 +02:00
|
|
|
-spec validate_will(connect(), jid:jid()) -> ok | {error, error_reason()}.
|
2019-02-25 09:42:09 +01:00
|
|
|
validate_will(#connect{will = undefined}, _) ->
|
|
|
|
ok;
|
|
|
|
validate_will(#connect{will = #publish{topic = Topic, payload = Payload},
|
|
|
|
will_properties = Props}, JID) ->
|
|
|
|
case mod_mqtt:check_publish_access(Topic, jid:tolower(JID)) of
|
|
|
|
deny -> {error, will_topic_forbidden};
|
|
|
|
allow -> validate_payload(Props, Payload, will)
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec validate_publish(publish(), state()) -> ok | {error, error_reason()}.
|
|
|
|
validate_publish(#publish{topic = Topic, payload = Payload,
|
|
|
|
properties = Props}, State) ->
|
|
|
|
case validate_topic(Topic, Props, State) of
|
|
|
|
ok -> validate_payload(Props, Payload, publish);
|
|
|
|
Err -> Err
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec validate_subscribe(subscribe()) -> ok | {error, error_reason()}.
|
|
|
|
validate_subscribe(#subscribe{filters = Filters}) ->
|
|
|
|
case lists:any(
|
|
|
|
fun({<<"$share/", _/binary>>, _}) -> true;
|
|
|
|
(_) -> false
|
|
|
|
end, Filters) of
|
|
|
|
true ->
|
|
|
|
{error, {code, 'shared-subscriptions-not-supported'}};
|
|
|
|
false ->
|
|
|
|
ok
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec validate_topic(binary(), properties(), state()) -> ok | {error, error_reason()}.
|
|
|
|
validate_topic(<<>>, Props, State) ->
|
|
|
|
case maps:get(topic_alias, Props, 0) of
|
|
|
|
0 ->
|
|
|
|
{error, {code, 'topic-alias-invalid'}};
|
|
|
|
Alias ->
|
|
|
|
case maps:is_key(Alias, State#state.topic_aliases) of
|
|
|
|
true -> ok;
|
|
|
|
false -> {error, unknown_topic_alias}
|
|
|
|
end
|
|
|
|
end;
|
|
|
|
validate_topic(_, #{topic_alias := Alias}, State) ->
|
|
|
|
JID = State#state.jid,
|
|
|
|
Max = topic_alias_maximum(JID#jid.lserver),
|
|
|
|
if Alias > Max ->
|
|
|
|
{error, {code, 'topic-alias-invalid'}};
|
|
|
|
true ->
|
|
|
|
ok
|
|
|
|
end;
|
|
|
|
validate_topic(_, _, _) ->
|
|
|
|
ok.
|
|
|
|
|
|
|
|
-spec validate_payload(properties(), binary(), will | publish) -> ok | {error, error_reason()}.
|
|
|
|
validate_payload(#{payload_format_indicator := utf8}, Payload, Type) ->
|
|
|
|
try mqtt_codec:utf8(Payload) of
|
|
|
|
_ -> ok
|
|
|
|
catch _:_ ->
|
|
|
|
{error, {payload_format_invalid, Type}}
|
|
|
|
end;
|
|
|
|
validate_payload(_, _, _) ->
|
|
|
|
ok.
|
|
|
|
|
|
|
|
%%%===================================================================
|
|
|
|
%%% Misc
|
|
|
|
%%%===================================================================
|
2019-06-27 14:22:27 +02:00
|
|
|
-spec resubscribe(jid:ljid(), subscriptions()) -> ok | {error, error_reason()}.
|
2019-02-25 09:42:09 +01:00
|
|
|
resubscribe(USR, Subs) ->
|
|
|
|
case maps:fold(
|
|
|
|
fun(TopicFilter, {SubOpts, ID}, ok) ->
|
|
|
|
mod_mqtt:subscribe(USR, TopicFilter, SubOpts, ID);
|
|
|
|
(_, _, {error, _} = Err) ->
|
|
|
|
Err
|
|
|
|
end, ok, Subs) of
|
|
|
|
ok ->
|
|
|
|
ok;
|
|
|
|
{error, _} = Err1 ->
|
|
|
|
unsubscribe(maps:keys(Subs), USR, #{}),
|
|
|
|
Err1
|
|
|
|
end.
|
|
|
|
|
|
|
|
-spec publish_will(state()) -> state().
|
|
|
|
publish_will(#state{will = #publish{} = Will,
|
|
|
|
jid = #jid{} = JID} = State) ->
|
|
|
|
case publish(State, Will) of
|
|
|
|
{ok, _} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?DEBUG("Will of ~ts has been published to ~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
[jid:encode(JID), Will#publish.topic]);
|
|
|
|
{error, Why} ->
|
2019-09-23 14:17:20 +02:00
|
|
|
?WARNING_MSG("Failed to publish will of ~ts to ~ts: ~ts",
|
2019-02-25 09:42:09 +01:00
|
|
|
[jid:encode(JID), Will#publish.topic,
|
|
|
|
format_error(Why)])
|
|
|
|
end,
|
|
|
|
State#state{will = undefined};
|
|
|
|
publish_will(State) ->
|
|
|
|
State.
|
|
|
|
|
|
|
|
-spec next_id(non_neg_integer()) -> pos_integer().
|
|
|
|
next_id(ID) ->
|
|
|
|
(ID rem 65535) + 1.
|
|
|
|
|
|
|
|
-spec set_dup_flag(mqtt_packet()) -> mqtt_packet().
|
|
|
|
set_dup_flag(#publish{qos = QoS} = Pkt) when QoS>0 ->
|
|
|
|
Pkt#publish{dup = true};
|
|
|
|
set_dup_flag(Pkt) ->
|
|
|
|
Pkt.
|
|
|
|
|
|
|
|
-spec get_publish_code_props({ok, non_neg_integer()} |
|
|
|
|
{error, error_reason()}) -> {reason_code(), properties()}.
|
|
|
|
get_publish_code_props({ok, 0}) ->
|
|
|
|
{'no-matching-subscribers', #{}};
|
|
|
|
get_publish_code_props({ok, _}) ->
|
|
|
|
{success, #{}};
|
|
|
|
get_publish_code_props({error, Err}) ->
|
|
|
|
Code = publish_reason_code(Err),
|
|
|
|
Reason = format_reason_string(Err),
|
|
|
|
{Code, #{reason_string => Reason}}.
|
|
|
|
|
|
|
|
-spec err_args(undefined | jid:jid(), peername(), error_reason()) -> iolist().
|
|
|
|
err_args(undefined, IP, Reason) ->
|
|
|
|
[ejabberd_config:may_hide_data(misc:ip_to_list(IP)),
|
|
|
|
format_error(Reason)];
|
|
|
|
err_args(JID, IP, Reason) ->
|
|
|
|
[jid:encode(JID),
|
|
|
|
ejabberd_config:may_hide_data(misc:ip_to_list(IP)),
|
|
|
|
format_error(Reason)].
|
|
|
|
|
|
|
|
-spec log_disconnection(state(), error_reason()) -> ok.
|
|
|
|
log_disconnection(#state{jid = JID, peername = IP}, Reason) ->
|
|
|
|
Msg = case JID of
|
2019-09-23 14:17:20 +02:00
|
|
|
undefined -> "Rejected MQTT connection from ~ts: ~ts";
|
|
|
|
_ -> "Closing MQTT connection for ~ts from ~ts: ~ts"
|
2019-02-25 09:42:09 +01:00
|
|
|
end,
|
|
|
|
case Reason of
|
|
|
|
{Tag, _} when Tag == replaced; Tag == resumed; Tag == socket ->
|
|
|
|
?DEBUG(Msg, err_args(JID, IP, Reason));
|
|
|
|
idle_connection ->
|
|
|
|
?DEBUG(Msg, err_args(JID, IP, Reason));
|
|
|
|
Tag when Tag == session_expired; Tag == shutdown ->
|
|
|
|
?INFO_MSG(Msg, err_args(JID, IP, Reason));
|
|
|
|
{peer_disconnected, Code, _} ->
|
|
|
|
case mqtt_codec:is_error_code(Code) of
|
|
|
|
true -> ?WARNING_MSG(Msg, err_args(JID, IP, Reason));
|
|
|
|
false -> ?DEBUG(Msg, err_args(JID, IP, Reason))
|
|
|
|
end;
|
|
|
|
_ ->
|
|
|
|
?WARNING_MSG(Msg, err_args(JID, IP, Reason))
|
|
|
|
end.
|