libcoap_rs/session/client.rs
1// SPDX-License-Identifier: BSD-2-Clause
2/*
3 * Copyright © The libcoap-rs Contributors, all rights reserved.
4 * This file is part of the libcoap-rs project, see the README file for
5 * general information on this project and the NOTICE.md and LICENSE files
6 * for information regarding copyright ownership and terms of use.
7 *
8 * session/client.rs - Types relating to client-side CoAP sessions.
9 */
10
11use std::{
12 cell::{Ref, RefMut},
13 net::SocketAddr,
14};
15
16use libcoap_sys::{
17 coap_new_client_session, coap_proto_t_COAP_PROTO_DTLS, coap_proto_t_COAP_PROTO_TCP, coap_proto_t_COAP_PROTO_UDP,
18 coap_register_event_handler, coap_session_get_app_data, coap_session_get_context, coap_session_get_type,
19 coap_session_init_token, coap_session_release, coap_session_set_app_data, coap_session_t,
20 coap_session_type_t_COAP_SESSION_TYPE_CLIENT, coap_session_type_t_COAP_SESSION_TYPE_HELLO,
21 coap_session_type_t_COAP_SESSION_TYPE_NONE, coap_session_type_t_COAP_SESSION_TYPE_SERVER, COAP_TOKEN_DEFAULT_MAX,
22};
23
24use super::{CoapSessionCommon, CoapSessionInner, CoapSessionInnerProvider};
25#[cfg(feature = "dtls")]
26use crate::crypto::ClientCryptoContext;
27use crate::{
28 context::CoapContext,
29 error::SessionCreationError,
30 event::event_handler_callback,
31 mem::{CoapFfiRcCell, DropInnerExclusively},
32 prng::coap_prng_try_fill,
33 types::CoapAddress,
34};
35
36#[derive(Debug)]
37struct CoapClientSessionInner<'a> {
38 inner: CoapSessionInner<'a>,
39 #[cfg(feature = "dtls")]
40 // This field is actually referred to be libcoap, so it isn't actually unused.
41 #[allow(unused)]
42 crypto_ctx: Option<ClientCryptoContext<'a>>,
43}
44
45impl<'a> CoapClientSessionInner<'a> {
46 /// Initializes a new [`CoapClientSessionInner`] for an unencrypted session from its raw counterpart
47 /// with the provided initial information.
48 ///
49 /// Also initializes the message token to a random value to prevent off-path response spoofing
50 /// (see [RFC 7252, section 5.3.1](https://datatracker.ietf.org/doc/html/rfc7252#section-5.3.1)).
51 ///
52 /// # Safety
53 /// The provided pointer for `raw_session` must be valid and point to the newly constructed raw
54 /// session.
55 unsafe fn new(raw_session: *mut coap_session_t) -> CoapFfiRcCell<CoapClientSessionInner<'a>> {
56 // For insecure protocols, generate a random initial token to prevent off-path response
57 // spoofing, see https://datatracker.ietf.org/doc/html/rfc7252#section-5.3.1
58 let mut token = [0; COAP_TOKEN_DEFAULT_MAX as usize];
59 coap_prng_try_fill(&mut token).expect("unable to generate random initial token");
60 coap_session_init_token(raw_session, token.len(), token.as_ptr());
61
62 let inner_session = CoapFfiRcCell::new(CoapClientSessionInner {
63 inner: CoapSessionInner::new(raw_session),
64 #[cfg(feature = "dtls")]
65 crypto_ctx: None,
66 });
67
68 // SAFETY: raw session is valid, inner session pointer must be valid as it was just created
69 // from one of Rust's smart pointers.
70 coap_session_set_app_data(raw_session, inner_session.create_raw_weak());
71
72 inner_session
73 }
74
75 /// Initializes a new [`CoapClientSessionInner`] for an encrypted session from its raw counterpart
76 /// with the provided initial information.
77 ///
78 /// # Safety
79 /// The provided pointer for `raw_session` must be valid and point to the newly constructed raw
80 /// session.
81 #[cfg(feature = "dtls")]
82 unsafe fn new_with_crypto_ctx(
83 raw_session: *mut coap_session_t,
84 crypto_ctx: ClientCryptoContext<'a>,
85 ) -> CoapFfiRcCell<CoapClientSessionInner<'a>> {
86 let inner_session = CoapFfiRcCell::new(CoapClientSessionInner {
87 inner: CoapSessionInner::new(raw_session),
88 crypto_ctx: Some(crypto_ctx),
89 });
90
91 // SAFETY: raw session is valid, inner session pointer must be valid as it was just created
92 // from one of Rust's smart pointers.
93 coap_session_set_app_data(raw_session, inner_session.create_raw_weak());
94
95 inner_session
96 }
97}
98
99/// Representation of a client-side CoAP session.
100#[derive(Debug, Clone)]
101pub struct CoapClientSession<'a> {
102 inner: CoapFfiRcCell<CoapClientSessionInner<'a>>,
103}
104
105impl CoapClientSession<'_> {
106 /// Create a new DTLS encrypted session with the given peer `addr` using the given `crypto_ctx`.
107 ///
108 /// # Errors
109 /// Will return a [SessionCreationError] if libcoap was unable to create a session (most likely
110 /// because it was not possible to bind to a port).
111 #[cfg(feature = "dtls")]
112 pub fn connect_dtls<'a>(
113 ctx: &mut CoapContext<'a>,
114 addr: SocketAddr,
115 crypto_ctx: impl Into<ClientCryptoContext<'a>>,
116 ) -> Result<CoapClientSession<'a>, SessionCreationError> {
117 let crypto_ctx = crypto_ctx.into();
118 // SAFETY: The returned raw session lives for as long as the constructed
119 // CoapClientSessionInner does, which is limited to the lifetime of crypto_ctx.
120 // When the CoapClientSessionInner instance is dropped, the session is dropped before the
121 // crypto context is.
122 let raw_session = unsafe {
123 match &crypto_ctx {
124 #[cfg(feature = "dtls-psk")]
125 ClientCryptoContext::Psk(psk_ctx) => {
126 psk_ctx.create_raw_session(ctx, &addr.into(), coap_proto_t_COAP_PROTO_DTLS)?
127 },
128 #[cfg(feature = "dtls-pki")]
129 ClientCryptoContext::Pki(pki_ctx) => {
130 pki_ctx.create_raw_session(ctx, &addr.into(), coap_proto_t_COAP_PROTO_DTLS)?
131 },
132 #[cfg(feature = "dtls-rpk")]
133 ClientCryptoContext::Rpk(rpk_ctx) => {
134 rpk_ctx.create_raw_session(ctx, &addr.into(), coap_proto_t_COAP_PROTO_DTLS)?
135 },
136 }
137 };
138
139 // SAFETY: raw_session was just checked to be valid pointer.
140 Ok(CoapClientSession {
141 inner: unsafe { CoapClientSessionInner::new_with_crypto_ctx(raw_session.as_ptr(), crypto_ctx) },
142 })
143 }
144
145 /// Create a new unencrypted session with the given peer over UDP.
146 ///
147 /// # Errors
148 /// Will return a [SessionCreationError] if libcoap was unable to create a session (most likely
149 /// because it was not possible to bind to a port).
150 pub fn connect_udp<'a>(
151 ctx: &mut CoapContext<'a>,
152 addr: SocketAddr,
153 ) -> Result<CoapClientSession<'a>, SessionCreationError> {
154 // SAFETY: self.raw_context is guaranteed to be valid, local_if can be null.
155 let session = unsafe {
156 coap_new_client_session(
157 ctx.as_mut_raw_context(),
158 std::ptr::null(),
159 CoapAddress::from(addr).as_raw_address(),
160 coap_proto_t_COAP_PROTO_UDP,
161 )
162 };
163 if session.is_null() {
164 return Err(SessionCreationError::Unknown);
165 }
166 // SAFETY: Session was just checked for validity.
167 Ok(CoapClientSession {
168 inner: unsafe { CoapClientSessionInner::new(session) },
169 })
170 }
171
172 /// Create a new unencrypted session with the given peer over TCP.
173 ///
174 /// # Errors
175 /// Will return a [SessionCreationError] if libcoap was unable to create a session (most likely
176 /// because it was not possible to bind to a port).
177 pub fn connect_tcp<'a>(
178 ctx: &mut CoapContext<'a>,
179 addr: SocketAddr,
180 ) -> Result<CoapClientSession<'a>, SessionCreationError> {
181 // SAFETY: self.raw_context is guaranteed to be valid, local_if can be null.
182 let session = unsafe {
183 coap_new_client_session(
184 ctx.as_mut_raw_context(),
185 std::ptr::null(),
186 CoapAddress::from(addr).as_raw_address(),
187 coap_proto_t_COAP_PROTO_TCP,
188 )
189 };
190 if session.is_null() {
191 return Err(SessionCreationError::Unknown);
192 }
193 // SAFETY: Session was just checked for validity.
194 Ok(CoapClientSession {
195 inner: unsafe { CoapClientSessionInner::new(session) },
196 })
197 }
198
199 /// Restores a [CoapClientSession] from its raw counterpart.
200 ///
201 /// Note that it is not possible to statically infer the lifetime of the created session from
202 /// the raw pointer, i.e., the session will be created with an arbitrary lifetime.
203 /// Therefore, callers of this function should ensure that the created session instance does not
204 /// outlive the context it is bound to.
205 /// Failing to do so will result in a panic/abort in the context destructor as it is unable to
206 /// claim exclusive ownership of the client session.
207 ///
208 /// # Panics
209 ///
210 /// Panics if the given pointer is a null pointer or the raw session is not a client-side
211 /// session with app data.
212 ///
213 /// # Safety
214 /// The provided pointer must be valid, the provided session's app data must be a valid argument
215 /// to [`CoapFfiRawCell<CoapClientSessionInner>::clone_raw_rc`].
216 pub(crate) unsafe fn from_raw<'a>(raw_session: *mut coap_session_t) -> CoapClientSession<'a> {
217 assert!(!raw_session.is_null(), "provided raw session was null");
218 let raw_session_type = coap_session_get_type(raw_session);
219 // Variant names are named by bindgen, we have no influence on this.
220 // Ref: https://github.com/rust-lang/rust/issues/39371
221 #[allow(non_upper_case_globals)]
222 match raw_session_type {
223 coap_session_type_t_COAP_SESSION_TYPE_NONE => panic!("provided session has no type"),
224 coap_session_type_t_COAP_SESSION_TYPE_CLIENT => {
225 let raw_app_data_ptr = coap_session_get_app_data(raw_session);
226 assert!(!raw_app_data_ptr.is_null(), "provided raw session has no app data");
227 let inner = CoapFfiRcCell::clone_raw_rc(raw_app_data_ptr);
228 CoapClientSession { inner }
229 },
230 coap_session_type_t_COAP_SESSION_TYPE_SERVER | coap_session_type_t_COAP_SESSION_TYPE_HELLO => {
231 panic!("attempted to create CoapClientSession from raw server session")
232 },
233 _ => unreachable!("unknown session type"),
234 }
235 }
236}
237
238impl DropInnerExclusively for CoapClientSession<'_> {
239 fn drop_exclusively(self) {
240 self.inner.drop_exclusively();
241 }
242}
243
244impl Drop for CoapClientSessionInner<'_> {
245 fn drop(&mut self) {
246 // SAFETY:
247 // - raw_session is always valid as long as we are not dropped yet (as this is the only
248 // function that calls coap_session_release on client-side sessions).
249 // - Application data validity is asserted.
250 // - For event handling access, see later comment.
251 unsafe {
252 let app_data = coap_session_get_app_data(self.inner.raw_session);
253 assert!(!app_data.is_null());
254 // Recreate weak pointer instance so that it can be dropped (which in turn reduces the
255 // weak reference count, avoiding memory leaks).
256 CoapFfiRcCell::<CoapClientSessionInner>::raw_ptr_to_weak(app_data);
257 // We need to temporarily disable event handling so that our own event handler does not
258 // access this already partially invalid session (and recursively also calls this Drop
259 // implementation), causing a SIGABRT.
260 // This is fine, because:
261 // - While this destructor is called, nothing is concurrently accessing the raw context
262 // (as libcoap is single-threaded and all types are !Send)
263 // - The only way this could be problematic would be if libcoap assumed sessions to be
264 // unchanging during a call to coap_io_process. However, this would be considered a
265 // bug in libcoap (as the documentation does not explicitly forbid this AFAIK).
266 let raw_context = coap_session_get_context(self.inner.raw_session);
267 assert!(!raw_context.is_null());
268 coap_register_event_handler(raw_context, None);
269 // Let libcoap do its cleanup of the raw session and free the associated memory.
270 coap_session_release(self.inner.raw_session);
271 // Restore event handler.
272 coap_register_event_handler(raw_context, Some(event_handler_callback));
273 }
274 }
275}
276
277impl<'a> CoapSessionInnerProvider<'a> for CoapClientSession<'a> {
278 fn inner_ref<'b>(&'b self) -> Ref<'b, CoapSessionInner<'a>> {
279 Ref::map(self.inner.borrow(), |v| &v.inner)
280 }
281
282 fn inner_mut<'b>(&'b self) -> RefMut<'b, CoapSessionInner<'a>> {
283 RefMut::map(self.inner.borrow_mut(), |v| &mut v.inner)
284 }
285}
286
287impl<'a, T: CoapSessionCommon<'a>> PartialEq<T> for CoapClientSession<'_> {
288 fn eq(&self, other: &T) -> bool {
289 // SAFETY: Pointers are only compared, never accessed.
290 self.if_index() == other.if_index()
291 && unsafe { self.raw_session() == other.raw_session() }
292 && self.addr_local() == other.addr_local()
293 && self.addr_remote() == other.addr_remote()
294 }
295}
296
297impl Eq for CoapClientSession<'_> {}