1
//! Implements a usable view of Tor network parameters.
2
//!
3
//! The Tor consensus document contains a number of 'network
4
//! parameters', which are integer-valued items voted on by the
5
//! directory authorities.  They are used to tune the behavior of
6
//! numerous aspects of the network.
7
//! A set of Tor network parameters
8
//!
9
//! The Tor consensus document contains a number of 'network
10
//! parameters', which are integer-valued items voted on by the
11
//! directory authorities.  These parameters are used to tune the
12
//! behavior of numerous aspects of the network.
13
//!
14
//! This type differs from
15
//! [`NetParams`](tor_netdoc::doc::netstatus::NetParams) in that it
16
//! only exposes a set of parameters recognized by arti.  In return
17
//! for this restriction, it makes sure that the values it gives are
18
//! in range, and provides default values for any parameters that are
19
//! missing.
20

            
21
use tor_units::{
22
    BoundedInt32, IntegerDays, IntegerMilliseconds, IntegerMinutes, IntegerSeconds, Percentage,
23
    SendMeVersion,
24
};
25

            
26
/// Upper limit for channel padding timeouts
27
///
28
/// This is just a safety catch which might help prevent integer overflow,
29
/// and also might prevent a client getting permanently stuck in a state
30
/// where it ought to send padding but never does.
31
///
32
/// The actual value is stolen from C Tor as per
33
///   <https://gitlab.torproject.org/tpo/core/arti/-/merge_requests/586#note_2813638>
34
/// pending an update to the specifications
35
///   <https://gitlab.torproject.org/tpo/core/torspec/-/issues/120>
36
pub const CHANNEL_PADDING_TIMEOUT_UPPER_BOUND: i32 = 60_000;
37

            
38
/// An object that can be constructed from an i32, with saturating semantics.
39
pub trait FromInt32Saturating {
40
    /// Construct an instance of this object from `val`.
41
    ///
42
    /// If `val` is too low, treat it as the lowest value that would be
43
    /// valid.  If `val` is too high, treat it as the highest value that
44
    /// would be valid.
45
    fn from_saturating(val: i32) -> Self;
46

            
47
    /// Try to construct an instance of this object from `val`.
48
    ///
49
    /// If `val` is out of range, return an error instead.
50
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
51
    where
52
        Self: Sized;
53
}
54

            
55
impl FromInt32Saturating for i32 {
56
    fn from_saturating(val: i32) -> Self {
57
        val
58
    }
59

            
60
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
61
    where
62
        Self: Sized,
63
    {
64
        Ok(val)
65
    }
66
}
67
impl<const L: i32, const H: i32> FromInt32Saturating for BoundedInt32<L, H> {
68
53
    fn from_saturating(val: i32) -> Self {
69
53
        Self::saturating_new(val)
70
53
    }
71

            
72
17115
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
73
17115
    where
74
17115
        Self: Sized,
75
    {
76
17115
        Self::checked_new(val)
77
17115
    }
78
}
79
impl<T: Copy + Into<f64> + FromInt32Saturating> FromInt32Saturating for Percentage<T> {
80
4
    fn from_saturating(val: i32) -> Self {
81
4
        Self::new(T::from_saturating(val))
82
4
    }
83

            
84
1154
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
85
1154
    where
86
1154
        Self: Sized,
87
    {
88
1154
        Ok(Self::new(T::from_checked(val)?))
89
1154
    }
90
}
91
impl<T: FromInt32Saturating + TryInto<u64>> FromInt32Saturating for IntegerMilliseconds<T> {
92
    fn from_saturating(val: i32) -> Self {
93
        Self::new(T::from_saturating(val))
94
    }
95

            
96
2740
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
97
2740
    where
98
2740
        Self: Sized,
99
    {
100
2740
        Ok(Self::new(T::from_checked(val)?))
101
2740
    }
102
}
103
impl<T: FromInt32Saturating + TryInto<u64>> FromInt32Saturating for IntegerSeconds<T> {
104
    fn from_saturating(val: i32) -> Self {
105
        Self::new(T::from_saturating(val))
106
    }
107

            
108
106
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
109
106
    where
110
106
        Self: Sized,
111
    {
112
106
        Ok(Self::new(T::from_checked(val)?))
113
106
    }
114
}
115
impl<T: FromInt32Saturating + TryInto<u64>> FromInt32Saturating for IntegerMinutes<T> {
116
    fn from_saturating(val: i32) -> Self {
117
        Self::new(T::from_saturating(val))
118
    }
119

            
120
4
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
121
4
    where
122
4
        Self: Sized,
123
    {
124
4
        Ok(Self::new(T::from_checked(val)?))
125
4
    }
126
}
127
impl<T: FromInt32Saturating + TryInto<u64>> FromInt32Saturating for IntegerDays<T> {
128
    fn from_saturating(val: i32) -> Self {
129
        Self::new(T::from_saturating(val))
130
    }
131

            
132
6
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
133
6
    where
134
6
        Self: Sized,
135
    {
136
6
        Ok(Self::new(T::from_checked(val)?))
137
6
    }
138
}
139
impl FromInt32Saturating for SendMeVersion {
140
    fn from_saturating(val: i32) -> Self {
141
        Self::new(val.clamp(0, 255) as u8)
142
    }
143

            
144
10
    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
145
10
    where
146
10
        Self: Sized,
147
    {
148
10
        let val = BoundedInt32::<0, 255>::checked_new(val)?;
149
10
        Ok(Self::new(val.get() as u8))
150
10
    }
151
}
152

            
153
/// A macro to help us declare the net parameters object.  It lets us
154
/// put the information about each parameter in just one place, even
155
/// though it will later get split between the struct declaration, the
156
/// Default implementation, and the implementation of
157
/// `saturating_update_override`.
158
macro_rules! declare_net_parameters {
159
    {
160
        $(#[$s_meta:meta])* $s_v:vis struct $s_name:ident {
161
            $(
162
                $(#[$p_meta:meta])* $p_v:vis
163
                    $p_name:ident : $p_type:ty
164
                    = ($p_dflt:expr) from $p_string:literal
165
            ),*
166
            $( , )?
167
        }
168
    } =>
169
    {
170
        $(#[$s_meta])* $s_v struct $s_name {
171
            $(
172
                $(#[$p_meta])* $p_v $p_name : $p_type
173
            ),*
174
        }
175

            
176
        impl $s_name {
177
            /// Try to construct an instance of with its default values.
178
            ///
179
            /// (This should always succeed, unless one of the default values
180
            /// is out-of-bounds for the type.)
181
16418
            fn default_values() -> Result<Self, tor_units::Error> {
182
                Ok(Self {
183
16418
                    $( $p_name : $p_dflt.try_into()? ),*
184
                })
185
16418
            }
186
            /// Replace the current value for the parameter identified in the
187
            /// consensus with `key` with a new value `val`.
188
            ///
189
            /// Uses saturating semantics if the new value is out-of-range.
190
            ///
191
            /// Returns true if the key was recognized, and false otherwise.
192
17133
            fn set_saturating(&mut self, key: &str, val: i32) -> bool {
193
17133
                match key {
194
8
                    $( $p_string => self.$p_name = {
195
                        type T = $p_type;
196
                        match T::from_checked(val) {
197
                            Ok(v) => v,
198
                            Err(e) => {
199
                                tracing::warn!("For key {key}, clamping out of range value: {e:?}");
200
                                T::from_saturating(val)
201
                            }
202
                        }
203
                    }, )*
204
8
                    _ => return false,
205
                }
206
17125
                true
207
17133
            }
208
        }
209
    }
210
}
211

            
212
declare_net_parameters! {
213

            
214
/// This structure holds recognized configuration parameters. All values are type-safe,
215
/// and where applicable clamped to be within range.
216
#[derive(Clone, Debug)]
217
#[non_exhaustive]
218
pub struct NetParameters {
219
    /// A weighting factor for bandwidth calculations
220
    pub bw_weight_scale: BoundedInt32<1, { i32::MAX }> = (10_000)
221
        from "bwweightscale",
222
    /// If true, do not attempt to learn circuit-build timeouts at all.
223
    pub cbt_learning_disabled: BoundedInt32<0, 1> = (0)
224
        from "cbtdisabled",
225
    /// Number of histograms bins to consider when estimating Xm for a
226
    /// Pareto-based circuit timeout estimator.
227
    pub cbt_num_xm_modes: BoundedInt32<1, 20> = (10)
228
        from "cbtnummodes",
229
    /// How many recent circuit success/timeout statuses do we remember
230
    /// when trying to tell if our circuit timeouts are too low?
231
    pub cbt_success_count: BoundedInt32<3, 1_000> = (20)
232
        from "cbtrecentcount",
233
    /// How many timeouts (in the last `cbt_success_count` observations)
234
    /// indicates that our circuit timeouts are too low?
235
    pub cbt_max_timeouts: BoundedInt32<3, 10_000> = (18)
236
        from "cbtmaxtimeouts",
237
    /// Smallest number of circuit build times we have to view in order to use
238
    /// our Pareto-based circuit timeout estimator.
239
    pub cbt_min_circs_for_estimate: BoundedInt32<1, 10_000> = (100)
240
        from "cbtmincircs",
241
    /// Quantile to use when determining the correct circuit timeout value
242
    /// with our Pareto estimator.
243
    ///
244
    /// (We continue building circuits after this timeout, but only
245
    /// for build-time measurement purposes.)
246
    pub cbt_timeout_quantile: Percentage<BoundedInt32<10, 99>> = (80)
247
        from "cbtquantile",
248
    /// Quantile to use when determining when to abandon circuits completely
249
    /// with our Pareto estimator.
250
    pub cbt_abandon_quantile: Percentage<BoundedInt32<10, 99>> = (99)
251
        from "cbtclosequantile",
252
    /// Lowest permissible timeout value for Pareto timeout estimator.
253
    pub cbt_min_timeout: IntegerMilliseconds<BoundedInt32<10, { i32::MAX }>> = (10)
254
        from "cbtmintimeout",
255
    /// Timeout value to use for our Pareto timeout estimator when we have
256
    /// no initial estimate.
257
    pub cbt_initial_timeout: IntegerMilliseconds<BoundedInt32<10, { i32::MAX }>> = (60_000)
258
        from "cbtinitialtimeout",
259
    /// When we don't have a good build-time estimate yet, how long
260
    /// (in seconds) do we wait between trying to launch build-time
261
    /// testing circuits through the network?
262
    pub cbt_testing_delay: IntegerSeconds<BoundedInt32<1, { i32::MAX }>> = (10)
263
        from "cbttestfreq",
264
    /// How many circuits can be open before we will no longer
265
    /// consider launching testing circuits to learn average build
266
    /// times?
267
    pub cbt_max_open_circuits_for_testing: BoundedInt32<0, 14> = (10)
268
        from "cbtmaxopencircs",
269

            
270
    /// Specifies which congestion control algorithm clients should use.
271
    /// Current values are 0 for the fixed window algorithm and 2 for Vegas.
272
    pub cc_alg: BoundedInt32<0, 2> = (2)
273
        from "cc_alg",
274

            
275
    /// Vegas only. This parameter defines the integer number of 'cc_sendme_inc' multiples
276
    /// of gap allowed between inflight and cwnd, to still declare the cwnd full.
277
    pub cc_cwnd_full_gap: BoundedInt32<0, { i16::MAX as i32 }> = (4444)
278
        from "cc_cwnd_full_gap",
279
    /// Vegas only. This parameter defines a low watermark in percent.
280
    pub cc_cwnd_full_minpct: Percentage<BoundedInt32<0, 100>> = (25)
281
        from "cc_cwnd_full_minpct",
282
    /// Vegas only. This parameter governs how often a cwnd must be full.
283
    pub cc_cwnd_full_per_cwnd: BoundedInt32<0, 1> = (1)
284
        from "cc_cwnd_full_per_cwnd",
285

            
286
    /// Initial congestion window for new congestion control Tor clients.
287
    pub cc_cwnd_init: BoundedInt32<31, 10_000> = (4 * 31)
288
        from "cc_cwnd_init",
289
    /// Percentage of the current congestion window to increment by during slow start,
290
    /// every congestion window.
291
    pub cc_cwnd_inc_pct_ss: Percentage<BoundedInt32<1, 500>> = (50)
292
        from "cc_cwnd_inc_pct_ss",
293
    /// How much to increment the congestion window by during steady state,
294
    /// every congestion window.
295
    pub cc_cwnd_inc: BoundedInt32<1, 1000> = (31)
296
        from "cc_cwnd_inc",
297
    /// How often we update our congestion window, per cwnd worth of packets.
298
    /// (For example, if this is 2, we will update the window twice every window.)
299
    pub cc_cwnd_inc_rate: BoundedInt32<1, 250> = (1)
300
        from "cc_cwnd_inc_rate",
301
    /// The minimum allowed congestion window.
302
    pub cc_cwnd_min: BoundedInt32<31, 1000> = (31)
303
        from "cc_cwnd_min",
304
    /// The maximum allowed congestion window.
305
    pub cc_cwnd_max: BoundedInt32<500, { i32::MAX }> = (i32::MAX)
306
        from "cc_cwnd_max",
307

            
308
    /// This specifies the N in N-EWMA smoothing of RTT and BDP estimation,
309
    /// as a percent of the number of SENDME acks in a congestion window.
310
    ///
311
    /// A percentage over 100% indicates smoothing with more than one
312
    /// congestion window's worth of SENDMEs.
313
    pub cc_ewma_cwnd_pct: Percentage<BoundedInt32<1, 255>> = (50)
314
        from "cc_ewma_cwnd_pct",
315
    /// This specifies the max N in N_EWMA smoothing of RTT and BDP estimation.
316
    pub cc_ewma_max: BoundedInt32<2, { i32::MAX }> = (10)
317
        from "cc_ewma_max",
318
    /// This specifies the N in N_EWMA smoothing of RTT during Slow Start.
319
    pub cc_ewma_ss: BoundedInt32<2, { i32::MAX }> = (2)
320
        from "cc_ewma_ss",
321
    /// Describes a percentile average between RTT_min and RTT_current_ewma,
322
    /// for use to reset RTT_min, when the congestion window hits cwnd_min.
323
    pub cc_rtt_reset_pct: Percentage<BoundedInt32<0, 100>> = (100)
324
        from "cc_rtt_reset_pct",
325
    /// Specifies how many cells a SENDME acks.
326
    pub cc_sendme_inc: BoundedInt32<1, 254> = (31)
327
        from "cc_sendme_inc",
328
    /// This parameter provides a hard-max on the congestion window in Slow Start.
329
    pub cc_ss_max: BoundedInt32<500, { i32::MAX }> = (5000)
330
        from "cc_ss_max",
331

            
332
    /// Vegas alpha parameter for an Exit circuit.
333
    pub cc_vegas_alpha_exit: BoundedInt32<0, 1000> = (3 * 62)
334
        from "cc_vegas_alpha_exit",
335
    /// Vegas beta parameter for an Exit circuit.
336
    pub cc_vegas_beta_exit: BoundedInt32<0, 1000> = (4 * 62)
337
        from "cc_vegas_beta_exit",
338
    /// Vegas delta parameter for an Exit circuit.
339
    pub cc_vegas_delta_exit: BoundedInt32<0, 1000> = (5 * 62)
340
        from "cc_vegas_delta_exit",
341
    /// Vegas gamma parameter for an Exit circuit.
342
    pub cc_vegas_gamma_exit: BoundedInt32<0, 1000> = (3 * 62)
343
        from "cc_vegas_gamma_exit",
344

            
345
    /// Vegas alpha parameter for an Onion circuit.
346
    pub cc_vegas_alpha_onion: BoundedInt32<0, 1000> = (3 * 62)
347
        from "cc_vegas_alpha_onion",
348
    /// Vegas beta parameter for an Onion circuit.
349
    pub cc_vegas_beta_onion: BoundedInt32<0, 1000> = (6 * 62)
350
        from "cc_vegas_beta_onion",
351
    /// Vegas delta parameter for an Onion circuit.
352
    pub cc_vegas_delta_onion: BoundedInt32<0, 1000> = (7 * 62)
353
        from "cc_vegas_delta_onion",
354
    /// Vegas gamma parameter for an Onion circuit.
355
    pub cc_vegas_gamma_onion: BoundedInt32<0, 1000> = (4 * 62)
356
        from "cc_vegas_gamma_onion",
357

            
358
    /// Parameter for Exit circuit that describe the the RFC3742 'cap', after which
359
    /// congestion window increments are reduced. The MAX disables RFC3742.
360
    pub cc_vegas_sscap_exit: BoundedInt32<100, { i32::MAX }> = (600)
361
        from "cc_sscap_exit",
362
    /// Parameter for Onion circuit that describe the the RFC3742 'cap', after which
363
    /// congestion window increments are reduced. The MAX disables RFC3742.
364
    pub cc_vegas_sscap_onion: BoundedInt32<100, { i32::MAX }> = (475)
365
        from "cc_sscap_onion",
366

            
367
    // Stream flow control parameters.
368
    // TODO: There is a `circwindow` for circuit flow control, but is there a similar package window
369
    // parameter for pre-cc stream flow control?
370

            
371
    /// The outbuf length, in relay cell multiples, before we send an XOFF.
372
    /// Used by clients (including onion services).
373
    ///
374
    /// See prop 324.
375
    pub cc_xoff_client: BoundedInt32<1, 10_000> = (500)
376
        from "cc_xoff_client",
377
    /// The outbuf length, in relay cell multiples, before we send an XOFF.
378
    /// Used by exits.
379
    ///
380
    /// See prop 324.
381
    pub cc_xoff_exit: BoundedInt32<1, 10_000> = (500)
382
        from "cc_xoff_exit",
383
    /// Specifies how many full packed cells of bytes must arrive before we can compute a rate,
384
    /// as well as how often we can send XONs.
385
    ///
386
    /// See prop 324.
387
    pub cc_xon_rate: BoundedInt32<1, 5000> = (500)
388
        from "cc_xon_rate",
389
    /// Specifies how much the edge drain rate can change before we send another advisory cell.
390
    ///
391
    /// See prop 324.
392
    pub cc_xon_change_pct: BoundedInt32<1, 99> = (25)
393
        from "cc_xon_change_pct",
394
    /// Specifies the `N` in the `N_EWMA` of rates.
395
    ///
396
    /// See prop 324.
397
    pub cc_xon_ewma_cnt: BoundedInt32<2, 100> = (2)
398
        from "cc_xon_ewma_cnt",
399

            
400
    /// The maximum cell window size?
401
    pub circuit_window: BoundedInt32<100, 1000> = (1_000)
402
        from "circwindow",
403
    /// The decay parameter for circuit priority
404
    pub circuit_priority_half_life: IntegerMilliseconds<BoundedInt32<1, { i32::MAX }>> = (30_000)
405
        from "CircuitPriorityHalflifeMsec",
406
    /// Whether to perform circuit extensions by Ed25519 ID
407
    pub extend_by_ed25519_id: BoundedInt32<0, 1> = (0)
408
        from "ExtendByEd25519ID",
409

            
410
    /// If we have excluded so many possible guards that the
411
    /// available fraction is below this threshold, we should use a different
412
    /// guard sample.
413
    pub guard_meaningful_restriction: Percentage<BoundedInt32<1,100>> = (20)
414
        from "guard-meaningful-restriction-percent",
415

            
416
    /// We should warn the user if they have excluded so many guards
417
    /// that the available fraction is below this threshold.
418
    pub guard_extreme_restriction: Percentage<BoundedInt32<1,100>> = (1)
419
        from "guard-extreme-restriction-percent",
420

            
421
    /// How long should we keep an unconfirmed guard (one we have not
422
    /// contacted) before removing it from the guard sample?
423
    pub guard_lifetime_unconfirmed: IntegerDays<BoundedInt32<1, 3650>> = (120)
424
        from "guard-lifetime-days",
425

            
426
    /// How long should we keep a _confirmed_ guard (one we have contacted)
427
    /// before removing it from the guard sample?
428
    pub guard_lifetime_confirmed: IntegerDays<BoundedInt32<1, 3650>> = (60)
429
        from "guard-confirmed-min-lifetime-days",
430

            
431
    /// If all circuits have failed for this interval, then treat the internet
432
    /// as "probably down", and treat any guard failures in that interval
433
    /// as unproven.
434
    pub guard_internet_likely_down: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (600)
435
        from "guard-internet-likely-down-interval",
436
    /// Largest number of guards that a client should try to maintain in
437
    /// a sample of possible guards.
438
    pub guard_max_sample_size: BoundedInt32<1, {i32::MAX}> = (60)
439
        from "guard-max-sample-size",
440
    /// Largest fraction of guard bandwidth on the network that a client
441
    /// should try to remain in a sample of possible guards.
442
    pub guard_max_sample_threshold: Percentage<BoundedInt32<1,100>> = (20)
443
        from "guard-max-sample-threshold",
444

            
445
    /// If the client ever has fewer than this many guards in their sample,
446
    /// after filtering out unusable guards, they should try to add more guards
447
    /// to the sample (if allowed).
448
    pub guard_filtered_min_sample_size: BoundedInt32<1,{i32::MAX}> = (20)
449
        from "guard-min-filtered-sample-size",
450

            
451
    /// The number of confirmed guards that the client should treat as
452
    /// "primary guards".
453
    pub guard_n_primary: BoundedInt32<1,{i32::MAX}> = (3)
454
        from "guard-n-primary-guards",
455
    /// The number of primary guards that the client should use in parallel.
456
    /// Other primary guards won't get used unless earlier ones are down.
457
    pub guard_use_parallelism: BoundedInt32<1, {i32::MAX}> = (1)
458
        from "guard-n-primary-guards-to-use",
459
    /// The number of primary guards that the client should use in
460
    /// parallel.  Other primary directory guards won't get used
461
    /// unless earlier ones are down.
462
    pub guard_dir_use_parallelism: BoundedInt32<1, {i32::MAX}> = (3)
463
        from "guard-n-primary-dir-guards-to-use",
464

            
465
    /// When trying to confirm nonprimary guards, if a guard doesn't
466
    /// answer for more than this long in seconds, treat any lower-
467
    /// priority guards as possibly usable.
468
    pub guard_nonprimary_connect_timeout: IntegerSeconds<BoundedInt32<1,{i32::MAX}>> = (15)
469
        from "guard-nonprimary-guard-connect-timeout",
470
    /// When trying to confirm nonprimary guards, if a guard doesn't
471
    /// answer for more than _this_ long in seconds, treat it as down.
472
    pub guard_nonprimary_idle_timeout: IntegerSeconds<BoundedInt32<1,{i32::MAX}>> = (600)
473
        from "guard-nonprimary-guard-idle-timeout",
474
    /// If a guard has been unlisted in the consensus for at least this
475
    /// long, remove it from the consensus.
476
    pub guard_remove_unlisted_after: IntegerDays<BoundedInt32<1,3650>> = (20)
477
        from "guard-remove-unlisted-guards-after-days",
478

            
479

            
480
    /// The minimum threshold for circuit patch construction
481
    pub min_circuit_path_threshold: Percentage<BoundedInt32<25, 95>> = (60)
482
        from "min_paths_for_circs_pct",
483

            
484
    /// Channel padding, low end of random padding interval, milliseconds
485
    ///
486
    /// `nf_ito` stands for "netflow inactive timeout".
487
    pub nf_ito_low: IntegerMilliseconds<BoundedInt32<0, CHANNEL_PADDING_TIMEOUT_UPPER_BOUND>> = (1500)
488
        from "nf_ito_low",
489
    /// Channel padding, high end of random padding interval, milliseconds
490
    pub nf_ito_high: IntegerMilliseconds<BoundedInt32<0, CHANNEL_PADDING_TIMEOUT_UPPER_BOUND>> = (9500)
491
        from "nf_ito_high",
492
    /// Channel padding, low end of random padding interval (reduced padding) milliseconds
493
    pub nf_ito_low_reduced: IntegerMilliseconds<BoundedInt32<0, CHANNEL_PADDING_TIMEOUT_UPPER_BOUND>> = (9000)
494
        from "nf_ito_low_reduced",
495
    /// Channel padding, high end of random padding interval (reduced padding) , milliseconds
496
    pub nf_ito_high_reduced: IntegerMilliseconds<BoundedInt32<0, CHANNEL_PADDING_TIMEOUT_UPPER_BOUND>> = (14000)
497
        from "nf_ito_high_reduced",
498

            
499
    /// The minimum sendme version to accept.
500
    pub sendme_accept_min_version: SendMeVersion = (0)
501
        from "sendme_accept_min_version",
502
    /// The minimum sendme version to transmit.
503
    pub sendme_emit_min_version: SendMeVersion = (0)
504
        from "sendme_emit_min_version",
505

            
506
    /// How long should never-used client circuits stay available,
507
    /// in the steady state?
508
    pub unused_client_circ_timeout: IntegerSeconds<BoundedInt32<60, 86_400>> = (30*60)
509
        from "nf_conntimeout_clients",
510
    /// When we're learning circuit timeouts, how long should never-used client
511
    /// circuits stay available?
512
    pub unused_client_circ_timeout_while_learning_cbt: IntegerSeconds<BoundedInt32<10, 60_000>> = (3*60)
513
        from "cbtlearntimeout",
514

            
515
    /// Lower bound on the number of INTRODUCE2 cells to allow per introduction
516
    /// circuit before the service decides to rotate to a new introduction
517
    /// circuit.
518
    pub hs_introcirc_requests_min: BoundedInt32<0, {i32::MAX}> = (16384)
519
        from "hs_intro_min_introduce2",
520

            
521
    /// Upper bound on the number of INTRODUCE2 cells to allow per introduction
522
    /// circuit before the service decides to rotate to a new introduction
523
    /// circuit.
524
    pub hs_introcirc_requests_max: BoundedInt32<0, {i32::MAX}> = (32768)
525
        from "hs_intro_max_introduce2",
526

            
527
    /// Lower bound on the lifetime of an introduction point.
528
    pub hs_intro_min_lifetime: IntegerSeconds<BoundedInt32<0, {i32::MAX}>> = (18 * 60 * 60)
529
        from "hs_intro_min_lifetime",
530

            
531
    /// Upper bound on the lifetime of an introduction point.
532
    pub hs_intro_max_lifetime: IntegerSeconds<BoundedInt32<0, {i32::MAX}>> = (24 * 60 * 60)
533
        from "hs_intro_max_lifetime",
534

            
535
    /// Number of "extra" introduction points that an onion service is allowed
536
    /// to open based on demand.
537
    pub hs_intro_num_extra_intropoints: BoundedInt32<0, 128> = (2)
538
        from "hs_intro_num_extra",
539

            
540
    /// Largest number of allowable relay cells received
541
    /// in reply to an hsdir download attempt.
542
    pub hsdir_dl_max_reply_cells: BoundedInt32<2, 2304> = (110)
543
        from "hsdir_dl_max_reply_cells",
544

            
545
    /// Largest number of allowable relay cells received
546
    /// in reply to an hsdir upload attempt.
547
    pub hsdir_ul_max_reply_cells: BoundedInt32<2, 1024> = (8)
548
        from "hsdir_ul_max_reply_cells",
549

            
550
    /// The duration of a time period, as used in the onion service directory
551
    /// protocol.
552
    ///
553
    /// During each "time period", each onion service gets a different blinded
554
    /// ID, and the hash ring gets a new layout.
555
    pub hsdir_timeperiod_length: IntegerMinutes<BoundedInt32<5, 14400>> = (1440)
556
        from "hsdir_interval",
557

            
558
    /// The number of positions at the hash ring where an onion service
559
    /// descriptor should be stored.
560
    pub hsdir_n_replicas: BoundedInt32<1, 16> = (2)
561
        from "hsdir_n_replicas",
562

            
563
    /// The number of HSDir instances, at each position in the hash ring, that
564
    /// should be considered when downloading an onion service descriptor.
565
    pub hsdir_spread_fetch: BoundedInt32<1, 128> = (3)
566
        from "hsdir_spread_fetch",
567

            
568
    /// The number of HSDir instances, at each position in the hash ring, that
569
    /// should be considered when uploading an onion service descriptor.
570
    pub hsdir_spread_store: BoundedInt32<1,128> = (4)
571
        from "hsdir_spread_store",
572

            
573
    /// Largest allowable v3 onion service size (in bytes).
574
    pub hsdir_max_desc_size: BoundedInt32<1, {i32::MAX}> = (50_000)
575
        from "HSV3MaxDescriptorSize",
576

            
577
    /// Largest number of failures to rendezvous that an onion service should
578
    /// allow for a request.
579
    pub hs_service_rendezvous_failures_max: BoundedInt32<1, 10> = (2)
580
        from "hs_service_max_rdv_failures",
581

            
582
    /// If set to 1, introduction points use the INTRODUCE1 rate limiting
583
    /// defense when no `DosParams` are sent.
584
    ///
585
    /// See <https://spec.torproject.org/param-spec.html#HiddenServiceEnableIntroDoSDefense>
586
    pub hs_intro_dos_enabled: BoundedInt32<0, 1> = (0)
587
        from "HiddenServiceEnableIntroDoSDefense",
588

            
589
    /// Default _rate_ value for an introduction point to use for INTRODUCE1 rate
590
    /// limiting when no `DosParams` value is sent, in messages per second.
591
    ///
592
    /// See
593
    /// <https://spec.torproject.org/param-spec.html#HiddenServiceEnableIntroDoSBurstPerSec>
594
    pub hs_intro_dos_max_burst: BoundedInt32<0, {i32::MAX}> = (200)
595
        from "HiddenServiceEnableIntroDoSBurstPerSec",
596

            
597
    /// Default _burst_ value for an introduction point to use for INTRODUCE1 rate
598
    /// limiting when no `DosParams` value is sent.
599
    ///
600
    /// See
601
    /// <https://spec.torproject.org/param-spec.html#HiddenServiceEnableIntroDoSRatePerSec>
602
    pub hs_intro_dos_rate: BoundedInt32<0, {i32::MAX}> = (25)
603
        from  "HiddenServiceEnableIntroDoSRatePerSec",
604

            
605
    /// Maximum Proof-of-Work V1 effort clients should send. Services will cap higher efforts to
606
    /// this value.
607
    ///
608
    /// See
609
    /// <https://spec.torproject.org/proposals/362-update-pow-control-loop.html>
610
    // TODO POW: Make u32, or change spec.
611
    pub hs_pow_v1_max_effort: BoundedInt32<0, {i32::MAX}> = (10_000)
612
        from "HiddenServiceProofOfWorkV1MaxEffort",
613

            
614
    /// The maximum age for items in the onion service intro queue, when Proof-of-Work V1 is
615
    /// enabled.
616
    ///
617
    /// See
618
    /// <https://spec.torproject.org/proposals/362-update-pow-control-loop.html>
619
    pub hs_pow_v1_service_intro_timeout: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (300)
620
        from "HiddenServiceProofOfWorkV1ServiceIntroTimeoutSeconds",
621

            
622
    /// The default Proof-of-Work V1 decay adjustment value.
623
    ///
624
    /// See
625
    /// <https://spec.torproject.org/proposals/362-update-pow-control-loop.html>
626
    pub hs_pow_v1_default_decay_adjustment: Percentage<BoundedInt32<0, 99>> = (0)
627
        from "HiddenServiceProofOfWorkV1ServiceDefaultDecayAdjustment",
628

            
629
    /// The type of vanguards to use by default when building onion service circuits:
630
    ///
631
    /// ```text
632
    ///    0: No vanguards.
633
    ///    1: Lite vanguards.
634
    ///    2: Full vanguards.
635
    /// ```
636
    ///
637
    /// See
638
    /// <https://spec.torproject.org/param-spec.html#vanguards>
639
    pub vanguards_enabled: BoundedInt32<0, 2> = (1)
640
        from "vanguards-enabled",
641

            
642
    /// If higher than `vanguards-enabled`,
643
    /// and we are running an onion service,
644
    /// we use this level for all our onion service circuits:
645
    ///
646
    /// ```text
647
    ///    0: No vanguards.
648
    ///    1: Lite vanguards.
649
    ///    2: Full vanguards.
650
    /// ```
651
    ///
652
    /// See
653
    /// <https://spec.torproject.org/param-spec.html#vanguards>
654
    pub vanguards_hs_service: BoundedInt32<0, 2> = (2)
655
        from "vanguards-hs-service",
656

            
657
    /// The number of vanguards in the L2 vanguard set.
658
    ///
659
    /// See
660
    /// <https://spec.torproject.org/param-spec.html#vanguards>
661
    pub guard_hs_l2_number: BoundedInt32<1, {i32::MAX}> = (4)
662
        from  "guard-hs-l2-number",
663

            
664
    /// The minimum lifetime of L2 vanguards.
665
    ///
666
    /// See
667
    /// <https://spec.torproject.org/param-spec.html#vanguards>
668
    pub guard_hs_l2_lifetime_min: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (86400)
669
        from  "guard-hs-l2-lifetime-min",
670

            
671
    /// The maximum lifetime of L2 vanguards.
672
    ///
673
    /// See
674
    /// <https://spec.torproject.org/param-spec.html#vanguards>
675
    pub guard_hs_l2_lifetime_max: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (1036800)
676
        from  "guard-hs-l2-lifetime-max",
677

            
678
    /// The number of vanguards in the L3 vanguard set.
679
    ///
680
    /// See
681
    /// <https://spec.torproject.org/param-spec.html#vanguards>
682
    pub guard_hs_l3_number: BoundedInt32<1, {i32::MAX}> = (8)
683
        from  "guard-hs-l3-number",
684

            
685
    /// The minimum lifetime of L3 vanguards.
686
    ///
687
    /// See
688
    /// <https://spec.torproject.org/param-spec.html#vanguards>
689
    pub guard_hs_l3_lifetime_min: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (3600)
690
        from  "guard-hs-l3-lifetime-min",
691

            
692
    /// The maximum lifetime of L3 vanguards.
693
    ///
694
    /// See
695
    /// <https://spec.torproject.org/param-spec.html#vanguards>
696
    pub guard_hs_l3_lifetime_max: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (172800)
697
        from  "guard-hs-l3-lifetime-max",
698

            
699
    /// The KIST to use by default when building inter-relay channels:
700
    ///
701
    /// ```text
702
    ///    0: No KIST.
703
    ///    1: KIST using TCP_NOTSENT_LOWAT.
704
    /// ```
705
    ///
706
    // TODO(KIST): add this to param spec
707
    // TODO(KIST): make this default to 1 (KIST with TCP_NOTSENT_LOWAT)
708
    // when we're confident it behaves correctly in conjunction with cc
709
    pub kist_enabled: BoundedInt32<0, 1> = (0)
710
        from "kist-enabled",
711

            
712
    /// If `kist_enabled` is `1` (KIST using TCP_NOTSENT_LOWAT),
713
    /// the TCP_NOTSENT_LOWAT value to set for each channel.
714
    ///
715
    /// If `kist_enabled` is `0` (disabled),
716
    /// the TCP_NOTSENT_LOWAT option is set to 0xFFFFFFFF (u32::MAX).
717
    ///
718
    // TODO(KIST): technically, this should be a u32, not an i32.
719
    // However, because we're using it to limit the amount of unsent data in TCP sockets,
720
    // it's unlikely we're ever going to want to set this to a high value,
721
    // so an upper bound of i32::MAX is good enough for our purposes.
722
    pub kist_tcp_notsent_lowat: BoundedInt32<1, {i32::MAX}> = (1)
723
        from  "kist-tcp-notsent-lowat",
724

            
725
    /// If true, we use lists of family members
726
    /// when making decisions about which relays belong to the same family.
727
    pub use_family_lists: BoundedInt32<0,1> = (1)
728
        from "use-family-lists",
729

            
730
    /// If true, we use lists of family IDs
731
    /// when making decisions about which relays belong to the same family.
732
    pub use_family_ids: BoundedInt32<0,1> = (1)
733
        from "use-family-ids",
734
}
735

            
736
}
737

            
738
impl Default for NetParameters {
739
16418
    fn default() -> Self {
740
16418
        NetParameters::default_values().expect("Default parameters were out-of-bounds")
741
16418
    }
742
}
743

            
744
// This impl is a bit silly, but it makes the `params` method on NetDirProvider
745
// work out.
746
impl AsRef<NetParameters> for NetParameters {
747
1363
    fn as_ref(&self) -> &NetParameters {
748
1363
        self
749
1363
    }
750
}
751

            
752
impl NetParameters {
753
    /// Construct a new NetParameters from a given list of key=value parameters.
754
    ///
755
    /// Unrecognized parameters are ignored.
756
1414
    pub fn from_map(p: &tor_netdoc::doc::netstatus::NetParams<i32>) -> Self {
757
1414
        let mut params = NetParameters::default();
758
1414
        let unrecognized = params.saturating_update(p.iter());
759
1414
        for u in unrecognized {
760
            tracing::debug!("Ignored unrecognized net param: {u}");
761
        }
762
1414
        params
763
1414
    }
764

            
765
    /// Replace a list of parameters, using the logic of
766
    /// `set_saturating`.
767
    ///
768
    /// Return a vector of the parameter names we didn't recognize.
769
21048
    pub(crate) fn saturating_update<'a, S>(
770
21048
        &mut self,
771
21048
        iter: impl Iterator<Item = (S, &'a i32)>,
772
21048
    ) -> Vec<S>
773
21048
    where
774
21048
        S: AsRef<str>,
775
    {
776
21048
        let mut unrecognized = Vec::new();
777
38181
        for (k, v) in iter {
778
17133
            if !self.set_saturating(k.as_ref(), *v) {
779
8
                unrecognized.push(k);
780
17125
            }
781
        }
782
21048
        unrecognized
783
21048
    }
784
}
785

            
786
#[cfg(test)]
787
#[allow(clippy::many_single_char_names)]
788
#[allow(clippy::cognitive_complexity)]
789
mod test {
790
    // @@ begin test lint list maintained by maint/add_warning @@
791
    #![allow(clippy::bool_assert_comparison)]
792
    #![allow(clippy::clone_on_copy)]
793
    #![allow(clippy::dbg_macro)]
794
    #![allow(clippy::mixed_attributes_style)]
795
    #![allow(clippy::print_stderr)]
796
    #![allow(clippy::print_stdout)]
797
    #![allow(clippy::single_char_pattern)]
798
    #![allow(clippy::unwrap_used)]
799
    #![allow(clippy::unchecked_time_subtraction)]
800
    #![allow(clippy::useless_vec)]
801
    #![allow(clippy::needless_pass_by_value)]
802
    //! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
803
    use super::*;
804
    use std::string::String;
805

            
806
    #[test]
807
    fn empty_list() {
808
        let mut x = NetParameters::default();
809
        let y = Vec::<(&String, &i32)>::new();
810
        let u = x.saturating_update(y.into_iter());
811
        assert!(u.is_empty());
812
    }
813

            
814
    #[test]
815
    fn unknown_parameter() {
816
        let mut x = NetParameters::default();
817
        let mut y = Vec::<(&String, &i32)>::new();
818
        let k = &String::from("This_is_not_a_real_key");
819
        let v = &456;
820
        y.push((k, v));
821
        let u = x.saturating_update(y.into_iter());
822
        assert_eq!(u, vec![&String::from("This_is_not_a_real_key")]);
823
    }
824

            
825
    // #[test]
826
    // fn duplicate_parameter() {}
827

            
828
    #[test]
829
    fn single_good_parameter() {
830
        let mut x = NetParameters::default();
831
        let mut y = Vec::<(&String, &i32)>::new();
832
        let k = &String::from("min_paths_for_circs_pct");
833
        let v = &54;
834
        y.push((k, v));
835
        let z = x.saturating_update(y.into_iter());
836
        assert!(z.is_empty());
837
        assert_eq!(x.min_circuit_path_threshold.as_percent().get(), 54);
838
    }
839

            
840
    #[test]
841
    fn multiple_good_parameters() {
842
        let mut x = NetParameters::default();
843
        let mut y = Vec::<(&String, &i32)>::new();
844
        let k = &String::from("min_paths_for_circs_pct");
845
        let v = &54;
846
        y.push((k, v));
847
        let k = &String::from("circwindow");
848
        let v = &900;
849
        y.push((k, v));
850
        let z = x.saturating_update(y.into_iter());
851
        assert!(z.is_empty());
852
        assert_eq!(x.min_circuit_path_threshold.as_percent().get(), 54);
853
        assert_eq!(x.circuit_window.get(), 900);
854
    }
855

            
856
    #[test]
857
    fn good_out_of_range() {
858
        let mut x = NetParameters::default();
859
        let mut y = Vec::<(&String, &i32)>::new();
860
        let k = &String::from("sendme_accept_min_version");
861
        let v = &30;
862
        y.push((k, v));
863
        let k = &String::from("min_paths_for_circs_pct");
864
        let v = &255;
865
        y.push((k, v));
866
        let z = x.saturating_update(y.into_iter());
867
        assert!(z.is_empty());
868
        assert_eq!(x.sendme_accept_min_version.get(), 30);
869
        assert_eq!(x.min_circuit_path_threshold.as_percent().get(), 95);
870
    }
871

            
872
    #[test]
873
    fn good_invalid_rep() {
874
        let mut x = NetParameters::default();
875
        let mut y = Vec::<(&String, &i32)>::new();
876
        let k = &String::from("sendme_accept_min_version");
877
        let v = &30;
878
        y.push((k, v));
879
        let k = &String::from("min_paths_for_circs_pct");
880
        let v = &9000;
881
        y.push((k, v));
882
        let z = x.saturating_update(y.into_iter());
883
        assert!(z.is_empty());
884
        assert_eq!(x.sendme_accept_min_version.get(), 30);
885
        assert_eq!(x.min_circuit_path_threshold.as_percent().get(), 95);
886
    }
887

            
888
    // #[test]
889
    // fn good_duplicate() {}
890
    #[test]
891
    fn good_unknown() {
892
        let mut x = NetParameters::default();
893
        let mut y = Vec::<(&String, &i32)>::new();
894
        let k = &String::from("sendme_accept_min_version");
895
        let v = &30;
896
        y.push((k, v));
897
        let k = &String::from("not_a_real_parameter");
898
        let v = &9000;
899
        y.push((k, v));
900
        let z = x.saturating_update(y.into_iter());
901
        assert_eq!(z, vec![&String::from("not_a_real_parameter")]);
902
        assert_eq!(x.sendme_accept_min_version.get(), 30);
903
    }
904

            
905
    #[test]
906
    fn from_consensus() {
907
        let mut p = NetParameters::default();
908
        let mut mp: std::collections::HashMap<String, i32> = std::collections::HashMap::new();
909
        mp.insert("bwweightscale".to_string(), 70);
910
        mp.insert("min_paths_for_circs_pct".to_string(), 45);
911
        mp.insert("im_a_little_teapot".to_string(), 1);
912
        mp.insert("circwindow".to_string(), 99999);
913
        mp.insert("ExtendByEd25519ID".to_string(), 1);
914

            
915
        let z = p.saturating_update(mp.iter());
916
        assert_eq!(z, vec![&String::from("im_a_little_teapot")]);
917

            
918
        assert_eq!(p.bw_weight_scale.get(), 70);
919
        assert_eq!(p.min_circuit_path_threshold.as_percent().get(), 45);
920
        let b_val: bool = p.extend_by_ed25519_id.into();
921
        assert!(b_val);
922
    }
923

            
924
    #[test]
925
    fn all_parameters() {
926
        use std::time::Duration;
927
        let mut p = NetParameters::default();
928
        let mp = [
929
            ("bwweightscale", 10),
930
            ("cbtdisabled", 1),
931
            ("cbtnummodes", 11),
932
            ("cbtrecentcount", 12),
933
            ("cbtmaxtimeouts", 13),
934
            ("cbtmincircs", 5),
935
            ("cbtquantile", 61),
936
            ("cbtclosequantile", 15),
937
            ("cbtlearntimeout", 1900),
938
            ("cbtmintimeout", 2020),
939
            ("cbtinitialtimeout", 2050),
940
            ("cbttestfreq", 110),
941
            ("cbtmaxopencircs", 14),
942
            ("circwindow", 999),
943
            ("CircuitPriorityHalflifeMsec", 222),
944
            ("guard-lifetime-days", 36),
945
            ("guard-confirmed-min-lifetime-days", 37),
946
            ("guard-internet-likely-down-interval", 38),
947
            ("guard-max-sample-size", 39),
948
            ("guard-max-sample-threshold", 40),
949
            ("guard-min-filtered-sample-size", 41),
950
            ("guard-n-primary-guards", 42),
951
            ("guard-n-primary-guards-to-use", 43),
952
            ("guard-n-primary-dir-guards-to-use", 44),
953
            ("guard-nonprimary-guard-connect-timeout", 45),
954
            ("guard-nonprimary-guard-idle-timeout", 46),
955
            ("guard-remove-unlisted-guards-after-days", 47),
956
            ("guard-meaningful-restriction-percent", 12),
957
            ("guard-extreme-restriction-percent", 3),
958
            ("ExtendByEd25519ID", 0),
959
            ("min_paths_for_circs_pct", 51),
960
            ("nf_conntimeout_clients", 606),
961
            ("nf_ito_low", 1_000),
962
            ("nf_ito_high", 20_000),
963
            ("nf_ito_low_reduced", 3_000),
964
            ("nf_ito_high_reduced", 40_000),
965
            ("sendme_accept_min_version", 31),
966
            ("sendme_emit_min_version", 32),
967
        ];
968
        let ignored = p.saturating_update(mp.iter().map(|(a, b)| (a, b)));
969
        assert!(ignored.is_empty());
970

            
971
        assert_eq!(p.bw_weight_scale.get(), 10);
972
        assert!(bool::from(p.cbt_learning_disabled));
973
        assert_eq!(p.cbt_num_xm_modes.get(), 11);
974
        assert_eq!(p.cbt_success_count.get(), 12);
975
        assert_eq!(p.cbt_max_timeouts.get(), 13);
976
        assert_eq!(p.cbt_min_circs_for_estimate.get(), 5);
977
        assert_eq!(p.cbt_timeout_quantile.as_percent().get(), 61);
978
        assert_eq!(p.cbt_abandon_quantile.as_percent().get(), 15);
979
        assert_eq!(p.nf_ito_low.as_millis().get(), 1_000);
980
        assert_eq!(p.nf_ito_high.as_millis().get(), 20_000);
981
        assert_eq!(p.nf_ito_low_reduced.as_millis().get(), 3_000);
982
        assert_eq!(p.nf_ito_high_reduced.as_millis().get(), 40_000);
983
        assert_eq!(
984
            Duration::try_from(p.unused_client_circ_timeout_while_learning_cbt).unwrap(),
985
            Duration::from_secs(1900)
986
        );
987
        assert_eq!(
988
            Duration::try_from(p.cbt_min_timeout).unwrap(),
989
            Duration::from_millis(2020)
990
        );
991
        assert_eq!(
992
            Duration::try_from(p.cbt_initial_timeout).unwrap(),
993
            Duration::from_millis(2050)
994
        );
995
        assert_eq!(
996
            Duration::try_from(p.cbt_testing_delay).unwrap(),
997
            Duration::from_secs(110)
998
        );
999
        assert_eq!(p.cbt_max_open_circuits_for_testing.get(), 14);
        assert_eq!(p.circuit_window.get(), 999);
        assert_eq!(
            Duration::try_from(p.circuit_priority_half_life).unwrap(),
            Duration::from_millis(222)
        );
        assert!(!bool::from(p.extend_by_ed25519_id));
        assert_eq!(p.min_circuit_path_threshold.as_percent().get(), 51);
        assert_eq!(
            Duration::try_from(p.unused_client_circ_timeout).unwrap(),
            Duration::from_secs(606)
        );
        assert_eq!(p.sendme_accept_min_version.get(), 31);
        assert_eq!(p.sendme_emit_min_version.get(), 32);
        assert_eq!(
            Duration::try_from(p.guard_lifetime_unconfirmed).unwrap(),
            Duration::from_secs(86400 * 36)
        );
        assert_eq!(
            Duration::try_from(p.guard_lifetime_confirmed).unwrap(),
            Duration::from_secs(86400 * 37)
        );
        assert_eq!(
            Duration::try_from(p.guard_internet_likely_down).unwrap(),
            Duration::from_secs(38)
        );
        assert_eq!(p.guard_max_sample_size.get(), 39);
        assert_eq!(p.guard_max_sample_threshold.as_percent().get(), 40);
        assert_eq!(p.guard_filtered_min_sample_size.get(), 41);
        assert_eq!(p.guard_n_primary.get(), 42);
        assert_eq!(p.guard_use_parallelism.get(), 43);
        assert_eq!(p.guard_dir_use_parallelism.get(), 44);
        assert_eq!(
            Duration::try_from(p.guard_nonprimary_connect_timeout).unwrap(),
            Duration::from_secs(45)
        );
        assert_eq!(
            Duration::try_from(p.guard_nonprimary_idle_timeout).unwrap(),
            Duration::from_secs(46)
        );
        assert_eq!(
            Duration::try_from(p.guard_remove_unlisted_after).unwrap(),
            Duration::from_secs(86400 * 47)
        );
        assert_eq!(p.guard_meaningful_restriction.as_percent().get(), 12);
        assert_eq!(p.guard_extreme_restriction.as_percent().get(), 3);
    }
}