1
#![cfg_attr(docsrs, feature(doc_cfg))]
2
#![doc = include_str!("../README.md")]
3
// @@ begin lint list maintained by maint/add_warning @@
4
#![allow(renamed_and_removed_lints)] // @@REMOVE_WHEN(ci_arti_stable)
5
#![allow(unknown_lints)] // @@REMOVE_WHEN(ci_arti_nightly)
6
#![warn(missing_docs)]
7
#![warn(noop_method_call)]
8
#![warn(unreachable_pub)]
9
#![warn(clippy::all)]
10
#![deny(clippy::await_holding_lock)]
11
#![deny(clippy::cargo_common_metadata)]
12
#![deny(clippy::cast_lossless)]
13
#![deny(clippy::checked_conversions)]
14
#![warn(clippy::cognitive_complexity)]
15
#![deny(clippy::debug_assert_with_mut_call)]
16
#![deny(clippy::exhaustive_enums)]
17
#![deny(clippy::exhaustive_structs)]
18
#![deny(clippy::expl_impl_clone_on_copy)]
19
#![deny(clippy::fallible_impl_from)]
20
#![deny(clippy::implicit_clone)]
21
#![deny(clippy::large_stack_arrays)]
22
#![warn(clippy::manual_ok_or)]
23
#![deny(clippy::missing_docs_in_private_items)]
24
#![warn(clippy::needless_borrow)]
25
#![warn(clippy::needless_pass_by_value)]
26
#![warn(clippy::option_option)]
27
#![deny(clippy::print_stderr)]
28
#![deny(clippy::print_stdout)]
29
#![warn(clippy::rc_buffer)]
30
#![deny(clippy::ref_option_ref)]
31
#![warn(clippy::semicolon_if_nothing_returned)]
32
#![warn(clippy::trait_duplication_in_bounds)]
33
#![deny(clippy::unchecked_time_subtraction)]
34
#![deny(clippy::unnecessary_wraps)]
35
#![warn(clippy::unseparated_literal_suffix)]
36
#![deny(clippy::unwrap_used)]
37
#![deny(clippy::mod_module_files)]
38
#![allow(clippy::let_unit_value)] // This can reasonably be done for explicitness
39
#![allow(clippy::uninlined_format_args)]
40
#![allow(clippy::significant_drop_in_scrutinee)] // arti/-/merge_requests/588/#note_2812945
41
#![allow(clippy::result_large_err)] // temporary workaround for arti#587
42
#![allow(clippy::needless_raw_string_hashes)] // complained-about code is fine, often best
43
#![allow(clippy::needless_lifetimes)] // See arti#1765
44
#![allow(mismatched_lifetime_syntaxes)] // temporary workaround for arti#2060
45
#![deny(clippy::unused_async)]
46
//! <!-- @@ end lint list maintained by maint/add_warning @@ -->
47

            
48
// TODO #1645 (either remove this, or decide to have it everywhere)
49
#![cfg_attr(not(all(feature = "full", feature = "experimental")), allow(unused))]
50

            
51
mod address;
52
mod builder;
53
mod client;
54
mod protostatus;
55
mod release_date;
56
#[cfg(feature = "rpc")]
57
pub mod rpc;
58
mod util;
59

            
60
pub mod config;
61
pub mod status;
62

            
63
pub use address::{DangerouslyIntoTorAddr, IntoTorAddr, TorAddr, TorAddrError};
64
pub use builder::{MAX_LOCAL_RESOURCE_TIMEOUT, TorClientBuilder};
65
pub use client::{BootstrapBehavior, DormantMode, InertTorClient, StreamPrefs, TorClient};
66
pub use config::TorClientConfig;
67

            
68
pub use tor_circmgr::IsolationToken;
69
pub use tor_circmgr::isolation;
70
pub use tor_error::{ErrorKind, HasKind};
71
pub use tor_proto::client::stream::{DataReader, DataStream, DataWriter};
72

            
73
mod err;
74
pub use err::{Error, ErrorHint, HintableError};
75

            
76
#[cfg(feature = "error_detail")]
77
pub use err::ErrorDetail;
78

            
79
/// Alias for the [`Result`] type corresponding to the high-level [`Error`].
80
pub type Result<T> = std::result::Result<T, Error>;
81

            
82
#[cfg(feature = "experimental-api")]
83
pub use builder::DirProviderBuilder;
84

            
85
#[cfg(all(feature = "onion-service-client", feature = "experimental-api"))]
86
pub use {
87
    tor_hscrypto::pk::{HsClientDescEncKey, HsId},
88
    tor_keymgr::KeystoreSelector,
89
};
90

            
91
#[cfg(feature = "geoip")]
92
pub use tor_geoip::CountryCode;
93

            
94
/// Return a list of the protocols [supported](tor_protover::doc_supported) by this crate.
95
///
96
/// (This is a crate-private method so as not to expose tor_protover in our public API.)
97
///
98
/// *WARNING*: REMOVING ELEMENTS FROM THIS LIST CAN BE DANGEROUS!
99
/// SEE [`tor_protover::doc_changing`]
100
184
pub(crate) fn supported_protocols() -> tor_protover::Protocols {
101
184
    let protocols = tor_proto::supported_client_protocols()
102
184
        .union(&tor_netdoc::supported_protocols())
103
184
        .union(&tor_dirmgr::supported_client_protocols());
104

            
105
    // TODO: the behavior for here seems most questionable!
106
    // We will warn if any hs protocol happens to be recommended and we do not support onion
107
    // services.
108
    // We will also fail to warn if any hs protocol is required, and we support it only as a client
109
    // or only as a service.
110
    // We ought to determine the right behavior here.
111
    // See torspec#319 at https://gitlab.torproject.org/tpo/core/torspec/-/issues/319.
112
    #[cfg(feature = "onion-service-service")]
113
184
    let protocols = protocols.union(&tor_hsservice::supported_hsservice_protocols());
114
    #[cfg(feature = "onion-service-client")]
115
184
    let protocols = protocols.union(&tor_hsclient::supported_hsclient_protocols());
116

            
117
184
    let hs_protocols = {
118
        // As a temporary workaround (again see torspec#319) we are unconditionally adding the
119
        // conditionally supported HSService protocols.
120
        use tor_protover::named::*;
121
184
        [
122
184
            //
123
184
            HSINTRO_V3,
124
184
            HSINTRO_RATELIM,
125
184
            HSREND_V3,
126
184
            HSDIR_V3,
127
184
        ]
128
184
        .into_iter()
129
184
        .collect()
130
    };
131

            
132
184
    protocols.union(&hs_protocols)
133
184
}
134

            
135
/// Return the approximate release date of this version of arti client.
136
///
137
/// See[`release_date::ARTI_CLIENT_RELEASE_DATE`] for rationale.
138
184
pub(crate) fn software_release_date() -> std::time::SystemTime {
139
    use time::OffsetDateTime;
140

            
141
184
    let format = time::macros::format_description!("[year]-[month]-[day]");
142
184
    let date = time::Date::parse(release_date::ARTI_CLIENT_RELEASE_DATE, &format)
143
184
        .expect("Invalid hard-coded release date!?");
144
184
    OffsetDateTime::new_utc(date, time::Time::MIDNIGHT).into()
145
184
}
146

            
147
#[cfg(test)]
148
mod test {
149
    // @@ begin test lint list maintained by maint/add_warning @@
150
    #![allow(clippy::bool_assert_comparison)]
151
    #![allow(clippy::clone_on_copy)]
152
    #![allow(clippy::dbg_macro)]
153
    #![allow(clippy::mixed_attributes_style)]
154
    #![allow(clippy::print_stderr)]
155
    #![allow(clippy::print_stdout)]
156
    #![allow(clippy::single_char_pattern)]
157
    #![allow(clippy::unwrap_used)]
158
    #![allow(clippy::unchecked_time_subtraction)]
159
    #![allow(clippy::useless_vec)]
160
    #![allow(clippy::needless_pass_by_value)]
161
    //! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
162

            
163
    use cfg_if::cfg_if;
164

            
165
    use super::*;
166

            
167
    #[test]
168
    fn protocols_enforced() {
169
        let pr = supported_protocols();
170

            
171
        for recommendation in [
172
            // Required in consensus as of 2024-04-02
173
            "Cons=2 Desc=2 Link=4 Microdesc=2 Relay=2",
174
            // Recommended in consensus as of 2024-04-02
175
            "Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 Microdesc=2 Relay=2",
176
            // Required by c-tor main-branch authorities as of 2024-04-02
177
            "Cons=2 Desc=2 FlowCtrl=1 Link=4 Microdesc=2 Relay=2",
178
            // // Recommended by c-tor main-branch authorities as of 2024-04-02
179
            // TODO: (Cannot deploy yet, see below.)
180
            // "Cons=2 Desc=2 DirCache=2 FlowCtrl=1-2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 Microdesc=2 Relay=2-4",
181
        ] {
182
            let rec: tor_protover::Protocols = recommendation.parse().unwrap();
183

            
184
            let unsupported = rec.difference(&pr);
185

            
186
            assert!(unsupported.is_empty(), "{} not supported", unsupported);
187
        }
188

            
189
        // TODO: Revise this once congestion control is fully implemented and always-on.
190
        {
191
            // Recommended by c-tor main-branch authorities as of 2024-04-02
192
            let rec: tor_protover::Protocols =
193
                "Cons=2 Desc=2 DirCache=2 FlowCtrl=1-2 HSDir=2 HSIntro=4 \
194
                 HSRend=2 Link=4-5 Microdesc=2 Relay=2-4"
195
                    .parse()
196
                    .unwrap();
197

            
198
            // Although this is recommended, it isn't always-on in Arti yet yet.
199
            cfg_if! {
200
                if #[cfg(feature="flowctl-cc")] {
201
                     let permitted_missing: tor_protover::Protocols =
202
                        [].into_iter().collect();
203
                } else {
204
                    let permitted_missing: tor_protover::Protocols =
205
                        [tor_protover::named::FLOWCTRL_CC].into_iter().collect();
206
                }
207
            }
208
            let unsupported = rec.difference(&pr);
209
            assert!(unsupported.difference(&permitted_missing).is_empty());
210
        }
211
    }
212

            
213
    #[test]
214
    fn release_date_format() {
215
        // Make sure we can parse the release date.
216
        let _d: std::time::SystemTime = software_release_date();
217
    }
218
}