use bytes::{Buf, BufMut, Bytes, BytesMut};
use bytestring::ByteString;
use std::convert::TryFrom;
use std::num::{NonZeroU16, NonZeroU32};
use crate::error::{DecodeError, EncodeError};
use crate::types::{ConnectFlags, QoS, MQTT, MQTT_LEVEL_5, WILL_QOS_SHIFT};
use crate::utils::{self, Decode, Encode, Property};
use crate::v5::codec::{encode::*, property_type as pt, UserProperties, UserProperty};
#[derive(Default, Debug, PartialEq, Clone)]
pub struct Connect {
pub clean_start: bool,
pub keep_alive: u16,
pub session_expiry_interval_secs: Option<u32>,
pub auth_method: Option<ByteString>,
pub auth_data: Option<Bytes>,
pub request_problem_info: Option<bool>,
pub request_response_info: Option<bool>,
pub receive_max: Option<NonZeroU16>,
pub topic_alias_max: u16,
pub user_properties: UserProperties,
pub max_packet_size: Option<NonZeroU32>,
pub last_will: Option<LastWill>,
pub client_id: ByteString,
pub username: Option<ByteString>,
pub password: Option<Bytes>,
}
#[derive(Debug, PartialEq, Clone)]
pub struct LastWill {
pub qos: QoS,
pub retain: bool,
pub topic: ByteString,
pub message: Bytes,
pub will_delay_interval_sec: Option<u32>,
pub correlation_data: Option<Bytes>,
pub message_expiry_interval: Option<NonZeroU32>,
pub content_type: Option<ByteString>,
pub user_properties: UserProperties,
pub is_utf8_payload: Option<bool>,
pub response_topic: Option<ByteString>,
}
impl LastWill {
fn properties_len(&self) -> usize {
encoded_property_size(&self.will_delay_interval_sec)
+ encoded_property_size(&self.correlation_data)
+ encoded_property_size(&self.message_expiry_interval)
+ encoded_property_size(&self.content_type)
+ encoded_property_size(&self.is_utf8_payload)
+ encoded_property_size(&self.response_topic)
+ self.user_properties.encoded_size()
}
}
impl Connect {
fn properties_len(&self) -> usize {
let mut prop_len = encoded_property_size(&self.session_expiry_interval_secs)
+ encoded_property_size(&self.auth_method)
+ encoded_property_size(&self.auth_data)
+ encoded_property_size(&self.request_problem_info)
+ encoded_property_size(&self.request_response_info)
+ encoded_property_size(&self.receive_max)
+ encoded_property_size(&self.max_packet_size)
+ self.user_properties.encoded_size();
if self.topic_alias_max > 0 {
prop_len += 1 + self.topic_alias_max.encoded_size();
}
prop_len
}
pub(crate) fn decode(src: &mut Bytes) -> Result<Self, DecodeError> {
ensure!(src.remaining() >= 10, DecodeError::InvalidLength);
let len = src.get_u16();
ensure!(len == 4 && &src.bytes()[0..4] == MQTT, DecodeError::InvalidProtocol);
src.advance(4);
let level = src.get_u8();
ensure!(level == MQTT_LEVEL_5, DecodeError::UnsupportedProtocolLevel);
let flags = ConnectFlags::from_bits(src.get_u8())
.ok_or_else(|| DecodeError::ConnectReservedFlagSet)?;
let keep_alive = src.get_u16();
let mut session_expiry_interval_secs = None;
let mut auth_method = None;
let mut auth_data = None;
let mut request_problem_info = None;
let mut request_response_info = None;
let mut receive_max = None;
let mut topic_alias_max = None;
let mut user_properties = Vec::new();
let mut max_packet_size = None;
let prop_src = &mut utils::take_properties(src)?;
while prop_src.has_remaining() {
match prop_src.get_u8() {
pt::SESS_EXPIRY_INT => session_expiry_interval_secs.read_value(prop_src)?,
pt::AUTH_METHOD => auth_method.read_value(prop_src)?,
pt::AUTH_DATA => auth_data.read_value(prop_src)?,
pt::REQ_PROB_INFO => request_problem_info.read_value(prop_src)?,
pt::REQ_RESP_INFO => request_response_info.read_value(prop_src)?,
pt::RECEIVE_MAX => receive_max.read_value(prop_src)?,
pt::TOPIC_ALIAS_MAX => topic_alias_max.read_value(prop_src)?,
pt::USER => user_properties.push(UserProperty::decode(prop_src)?),
pt::MAX_PACKET_SIZE => max_packet_size.read_value(prop_src)?,
_ => return Err(DecodeError::MalformedPacket),
}
}
let client_id = ByteString::decode(src)?;
ensure!(
!client_id.is_empty() || flags.contains(ConnectFlags::CLEAN_START),
DecodeError::InvalidClientId
);
let last_will = if flags.contains(ConnectFlags::WILL) {
Some(decode_last_will(src, flags)?)
} else {
None
};
let username = if flags.contains(ConnectFlags::USERNAME) {
Some(ByteString::decode(src)?)
} else {
None
};
let password = if flags.contains(ConnectFlags::PASSWORD) {
Some(Bytes::decode(src)?)
} else {
None
};
Ok(Connect {
clean_start: flags.contains(ConnectFlags::CLEAN_START),
keep_alive,
session_expiry_interval_secs,
auth_method,
auth_data,
request_problem_info,
request_response_info,
receive_max,
topic_alias_max: topic_alias_max.unwrap_or(0u16),
user_properties,
max_packet_size,
client_id,
last_will,
username,
password,
})
}
}
fn decode_last_will(src: &mut Bytes, flags: ConnectFlags) -> Result<LastWill, DecodeError> {
let mut will_delay_interval_sec = None;
let mut correlation_data = None;
let mut message_expiry_interval = None;
let mut content_type = None;
let mut user_properties = Vec::new();
let mut is_utf8_payload = None;
let mut response_topic = None;
let prop_src = &mut utils::take_properties(src)?;
while prop_src.has_remaining() {
match prop_src.get_u8() {
pt::WILL_DELAY_INT => will_delay_interval_sec.read_value(prop_src)?,
pt::CORR_DATA => correlation_data.read_value(prop_src)?,
pt::MSG_EXPIRY_INT => message_expiry_interval.read_value(prop_src)?,
pt::CONTENT_TYPE => content_type.read_value(prop_src)?,
pt::UTF8_PAYLOAD => is_utf8_payload.read_value(prop_src)?,
pt::RESP_TOPIC => response_topic.read_value(prop_src)?,
pt::USER => user_properties.push(UserProperty::decode(prop_src)?),
_ => return Err(DecodeError::MalformedPacket),
}
}
let topic = ByteString::decode(src)?;
let message = Bytes::decode(src)?;
Ok(LastWill {
qos: QoS::try_from((flags & ConnectFlags::WILL_QOS).bits() >> WILL_QOS_SHIFT)?,
retain: flags.contains(ConnectFlags::WILL_RETAIN),
topic,
message,
will_delay_interval_sec,
correlation_data,
message_expiry_interval,
content_type,
user_properties,
is_utf8_payload,
response_topic,
})
}
impl EncodeLtd for Connect {
fn encoded_size(&self, _limit: u32) -> usize {
let prop_len = self.properties_len();
6
+ 1
+ 1
+ 2
+ var_int_len(prop_len) as usize
+ prop_len
+ self.client_id.encoded_size()
+ self.last_will.as_ref().map_or(0, |will| {
let prop_len = will.properties_len();
var_int_len(prop_len) as usize + prop_len + will.topic.encoded_size() + will.message.encoded_size()
})
+ self.username.as_ref().map_or(0, |v| v.encoded_size())
+ self.password.as_ref().map_or(0, |v| v.encoded_size())
}
fn encode(&self, buf: &mut BytesMut, _size: u32) -> Result<(), EncodeError> {
Bytes::from_static(b"MQTT").encode(buf)?;
let mut flags = ConnectFlags::empty();
if self.username.is_some() {
flags |= ConnectFlags::USERNAME;
}
if self.password.is_some() {
flags |= ConnectFlags::PASSWORD;
}
if let Some(will) = self.last_will.as_ref() {
flags |= ConnectFlags::WILL;
if will.retain {
flags |= ConnectFlags::WILL_RETAIN;
}
flags |= ConnectFlags::from_bits_truncate(u8::from(will.qos) << WILL_QOS_SHIFT);
}
if self.clean_start {
flags |= ConnectFlags::CLEAN_START;
}
buf.put_slice(&[MQTT_LEVEL_5, flags.bits()]);
self.keep_alive.encode(buf)?;
let prop_len = self.properties_len();
utils::write_variable_length(prop_len as u32, buf);
encode_property(&self.session_expiry_interval_secs, pt::SESS_EXPIRY_INT, buf)?;
encode_property(&self.auth_method, pt::AUTH_METHOD, buf)?;
encode_property(&self.auth_data, pt::AUTH_DATA, buf)?;
encode_property(&self.request_problem_info, pt::REQ_PROB_INFO, buf)?;
encode_property(&self.request_response_info, pt::REQ_RESP_INFO, buf)?;
encode_property(&self.receive_max, pt::RECEIVE_MAX, buf)?;
encode_property(&self.max_packet_size, pt::MAX_PACKET_SIZE, buf)?;
if self.topic_alias_max > 0 {
buf.put_u8(pt::TOPIC_ALIAS_MAX);
self.topic_alias_max.encode(buf)?;
}
self.user_properties.encode(buf)?;
self.client_id.encode(buf)?;
if let Some(will) = self.last_will.as_ref() {
let prop_len = will.properties_len();
utils::write_variable_length(prop_len as u32, buf);
will.topic.encode(buf)?;
will.message.encode(buf)?;
}
if let Some(s) = self.username.as_ref() {
s.encode(buf)?;
}
if let Some(pwd) = self.password.as_ref() {
pwd.encode(buf)?;
}
Ok(())
}
}