1
#![cfg_attr(docsrs, feature(doc_auto_cfg, doc_cfg))]
2
#![doc = include_str!("../README.md")]
3
// @@ begin lint list maintained by maint/add_warning @@
4
#![allow(renamed_and_removed_lints)] // @@REMOVE_WHEN(ci_arti_stable)
5
#![allow(unknown_lints)] // @@REMOVE_WHEN(ci_arti_nightly)
6
#![warn(missing_docs)]
7
#![warn(noop_method_call)]
8
#![warn(unreachable_pub)]
9
#![warn(clippy::all)]
10
#![deny(clippy::await_holding_lock)]
11
#![deny(clippy::cargo_common_metadata)]
12
#![deny(clippy::cast_lossless)]
13
#![deny(clippy::checked_conversions)]
14
#![warn(clippy::cognitive_complexity)]
15
#![deny(clippy::debug_assert_with_mut_call)]
16
#![deny(clippy::exhaustive_enums)]
17
#![deny(clippy::exhaustive_structs)]
18
#![deny(clippy::expl_impl_clone_on_copy)]
19
#![deny(clippy::fallible_impl_from)]
20
#![deny(clippy::implicit_clone)]
21
#![deny(clippy::large_stack_arrays)]
22
#![warn(clippy::manual_ok_or)]
23
#![deny(clippy::missing_docs_in_private_items)]
24
#![warn(clippy::needless_borrow)]
25
#![warn(clippy::needless_pass_by_value)]
26
#![warn(clippy::option_option)]
27
#![deny(clippy::print_stderr)]
28
#![deny(clippy::print_stdout)]
29
#![warn(clippy::rc_buffer)]
30
#![deny(clippy::ref_option_ref)]
31
#![warn(clippy::semicolon_if_nothing_returned)]
32
#![warn(clippy::trait_duplication_in_bounds)]
33
#![deny(clippy::unchecked_duration_subtraction)]
34
#![deny(clippy::unnecessary_wraps)]
35
#![warn(clippy::unseparated_literal_suffix)]
36
#![deny(clippy::unwrap_used)]
37
#![deny(clippy::mod_module_files)]
38
#![allow(clippy::let_unit_value)] // This can reasonably be done for explicitness
39
#![allow(clippy::uninlined_format_args)]
40
#![allow(clippy::significant_drop_in_scrutinee)] // arti/-/merge_requests/588/#note_2812945
41
#![allow(clippy::result_large_err)] // temporary workaround for arti#587
42
#![allow(clippy::needless_raw_string_hashes)] // complained-about code is fine, often best
43
#![allow(clippy::needless_lifetimes)] // See arti#1765
44
//! <!-- @@ end lint list maintained by maint/add_warning @@ -->
45

            
46
pub mod config;
47
pub mod err;
48

            
49
#[cfg(feature = "managed-pts")]
50
pub mod ipc;
51

            
52
#[cfg(feature = "managed-pts")]
53
mod managed;
54

            
55
use crate::config::{TransportConfig, TransportOptions};
56
use crate::err::PtError;
57
use oneshot_fused_workaround as oneshot;
58
use std::collections::HashMap;
59
use std::net::SocketAddr;
60
use std::path::PathBuf;
61
use std::sync::{Arc, RwLock};
62
use tor_config_path::CfgPathResolver;
63
use tor_linkspec::PtTransportName;
64
use tor_rtcompat::Runtime;
65
use tor_socksproto::SocksVersion;
66
#[cfg(any(feature = "tor-channel-factory", feature = "managed-pts"))]
67
use tracing::info;
68
use tracing::warn;
69
#[cfg(feature = "managed-pts")]
70
use {
71
    crate::managed::{PtReactor, PtReactorMessage},
72
    futures::channel::mpsc::{self, UnboundedSender},
73
    futures::task::SpawnExt,
74
    tor_error::error_report,
75
};
76
#[cfg(feature = "tor-channel-factory")]
77
use {
78
    async_trait::async_trait,
79
    tor_chanmgr::{
80
        builder::ChanBuilder,
81
        factory::{AbstractPtError, ChannelFactory},
82
        transport::ExternalProxyPlugin,
83
    },
84
    tracing::trace,
85
};
86

            
87
/// Shared mutable state between the `PtReactor` and `PtMgr`.
88
#[derive(Default, Debug)]
89
struct PtSharedState {
90
    /// Connection information for pluggable transports from currently running binaries.
91
    ///
92
    /// Unmanaged pluggable transports are not included in this map.
93
    #[allow(dead_code)]
94
    managed_cmethods: HashMap<PtTransportName, PtClientMethod>,
95
    /// Current configured set of pluggable transports.
96
    configured: HashMap<PtTransportName, TransportOptions>,
97
}
98

            
99
/// A pluggable transport manager knows how to make different
100
/// kinds of connections to the Tor network, for censorship avoidance.
101
pub struct PtMgr<R> {
102
    /// An underlying `Runtime`, used to spawn background tasks.
103
    #[allow(dead_code)]
104
    runtime: R,
105
    /// State for this `PtMgr` that's shared with the `PtReactor`.
106
    state: Arc<RwLock<PtSharedState>>,
107
    /// PtReactor channel when the `managed-pts` feature is enabled.
108
    #[cfg(feature = "managed-pts")]
109
    tx: UnboundedSender<PtReactorMessage>,
110
}
111

            
112
impl<R: Runtime> PtMgr<R> {
113
    /// Transform the config into a more useful representation indexed by transport name.
114
12
    fn transform_config(
115
12
        binaries: Vec<TransportConfig>,
116
12
    ) -> Result<HashMap<PtTransportName, TransportOptions>, tor_error::Bug> {
117
12
        let mut ret = HashMap::new();
118
        // FIXME(eta): You can currently specify overlapping protocols, and it'll
119
        //             just use the last transport specified.
120
        //             I attempted to fix this, but decided I didn't want to stare into the list
121
        //             builder macro void after trying it for 15 minutes.
122
12
        for thing in binaries {
123
            for tn in thing.protocols.iter() {
124
                ret.insert(tn.clone(), thing.clone().try_into()?);
125
            }
126
        }
127
12
        for opt in ret.values() {
128
            if let TransportOptions::Unmanaged(u) = opt {
129
                if !u.is_localhost() {
130
                    warn!("Configured to connect to a PT on a non-local addresses. This is usually insecure! We recommend running PTs on localhost only.");
131
                }
132
            }
133
        }
134
12
        Ok(ret)
135
12
    }
136

            
137
    /// Create a new PtMgr.
138
    // TODO: maybe don't have the Vec directly exposed?
139
8
    pub fn new(
140
8
        transports: Vec<TransportConfig>,
141
8
        #[allow(unused)] state_dir: PathBuf,
142
8
        path_resolver: Arc<CfgPathResolver>,
143
8
        rt: R,
144
8
    ) -> Result<Self, PtError> {
145
8
        let state = PtSharedState {
146
8
            managed_cmethods: Default::default(),
147
8
            configured: Self::transform_config(transports)?,
148
        };
149
8
        let state = Arc::new(RwLock::new(state));
150

            
151
        // reactor is only needed if we support managed pts
152
        #[cfg(feature = "managed-pts")]
153
8
        let tx = {
154
8
            let (tx, rx) = mpsc::unbounded();
155
8

            
156
8
            let mut reactor =
157
8
                PtReactor::new(rt.clone(), state.clone(), rx, state_dir, path_resolver);
158
8
            rt.spawn(async move {
159
                loop {
160
10
                    match reactor.run_one_step().await {
161
                        Ok(true) => return,
162
2
                        Ok(false) => {}
163
                        Err(e) => {
164
                            error_report!(e, "PtReactor failed");
165
                            return;
166
                        }
167
                    }
168
                }
169
8
            })
170
8
            .map_err(|e| PtError::Spawn { cause: Arc::new(e) })?;
171

            
172
8
            tx
173
8
        };
174
8

            
175
8
        Ok(Self {
176
8
            runtime: rt,
177
8
            state,
178
8
            #[cfg(feature = "managed-pts")]
179
8
            tx,
180
8
        })
181
8
    }
182

            
183
    /// Reload the configuration
184
4
    pub fn reconfigure(
185
4
        &self,
186
4
        how: tor_config::Reconfigure,
187
4
        transports: Vec<TransportConfig>,
188
4
    ) -> Result<(), tor_config::ReconfigureError> {
189
4
        let configured = Self::transform_config(transports)?;
190
4
        if how == tor_config::Reconfigure::CheckAllOrNothing {
191
2
            return Ok(());
192
2
        }
193
2
        {
194
2
            let mut inner = self.state.write().expect("ptmgr poisoned");
195
2
            inner.configured = configured;
196
2
        }
197
2
        // We don't have any way of propagating this sanely; the caller will find out the reactor
198
2
        // has died later on anyway.
199
2
        #[cfg(feature = "managed-pts")]
200
2
        let _ = self.tx.unbounded_send(PtReactorMessage::Reconfigured);
201
2
        Ok(())
202
4
    }
203

            
204
    /// Given a transport name, return a method that we can use to contact that transport.
205
    ///
206
    /// May have to launch a managed transport as needed.
207
    ///
208
    /// Returns Ok(None) if no such transport exists.
209
    #[cfg(feature = "tor-channel-factory")]
210
    async fn get_cmethod_for_transport(
211
        &self,
212
        transport: &PtTransportName,
213
    ) -> Result<Option<PtClientMethod>, PtError> {
214
        #[allow(unused)]
215
        let (cfg, managed_cmethod) = {
216
            // NOTE(eta): This is using a RwLock inside async code (but not across an await point).
217
            //            Arguably this is fine since it's just a small read, and nothing should ever
218
            //            hold this lock for very long.
219
            let inner = self.state.read().expect("ptmgr poisoned");
220
            let cfg = inner.configured.get(transport);
221
            let managed_cmethod = inner.managed_cmethods.get(transport);
222
            (cfg.cloned(), managed_cmethod.cloned())
223
        };
224

            
225
        match cfg {
226
            Some(TransportOptions::Unmanaged(cfg)) => {
227
                let cmethod = cfg.cmethod();
228
                trace!(
229
                    "Found configured unmanaged transport {transport} accessible via {cmethod:?}"
230
                );
231
                Ok(Some(cmethod))
232
            }
233
            #[cfg(feature = "managed-pts")]
234
            Some(TransportOptions::Managed(_cfg)) => {
235
                match managed_cmethod {
236
                    // A configured-and-running cmethod.
237
                    Some(cmethod) => {
238
                        trace!("Found configured managed transport {transport} accessible via {cmethod:?}");
239
                        Ok(Some(cmethod))
240
                    }
241
                    // A configured-but-not-running cmethod.
242
                    None => {
243
                        // There is going to be a lot happening "under the hood" here.
244
                        //
245
                        // When we are asked to get a ChannelFactory for a given
246
                        // connection, we will need to:
247
                        //    - launch the binary for that transport if it is not already running*.
248
                        //    - If we launched the binary, talk to it and see which ports it
249
                        //      is listening on.
250
                        //    - Return a ChannelFactory that connects via one of those ports,
251
                        //      using the appropriate version of SOCKS, passing K=V parameters
252
                        //      encoded properly.
253
                        //
254
                        // * As in other managers, we'll need to avoid trying to launch the same
255
                        //   transport twice if we get two concurrent requests.
256
                        //
257
                        // Later if the binary crashes, we should detect that.  We should relaunch
258
                        // it on demand.
259
                        //
260
                        // On reconfigure, we should shut down any no-longer-used transports.
261
                        //
262
                        // Maybe, we should shut down transports that haven't been used
263
                        // for a long time.
264
                        Ok(Some(self.spawn_transport(transport).await?))
265
                    }
266
                }
267
            }
268
            // No configuration for this transport.
269
            None => {
270
                trace!("Got a request for transport {transport}, which is not configured.");
271
                Ok(None)
272
            }
273
        }
274
    }
275

            
276
    /// Communicate with the PT reactor to launch a managed transport.
277
    #[cfg(all(feature = "tor-channel-factory", feature = "managed-pts"))]
278
    async fn spawn_transport(
279
        &self,
280
        transport: &PtTransportName,
281
    ) -> Result<PtClientMethod, PtError> {
282
        // Tell the reactor to spawn the PT, and wait for it.
283
        // (The reactor will handle coalescing multiple requests.)
284
        info!("Got a request for transport {transport}, which is not currently running. Launching it.");
285

            
286
        let (tx, rx) = oneshot::channel();
287
        self.tx
288
            .unbounded_send(PtReactorMessage::Spawn {
289
                pt: transport.clone(),
290
                result: tx,
291
            })
292
            .map_err(|_| {
293
                PtError::Internal(tor_error::internal!("PT reactor closed unexpectedly"))
294
            })?;
295

            
296
        let method = match rx.await {
297
            Err(_) => {
298
                return Err(PtError::Internal(tor_error::internal!(
299
                    "PT reactor closed unexpectedly"
300
                )));
301
            }
302
            Ok(Err(e)) => {
303
                warn!("PT for {transport} failed to launch: {e}");
304
                return Err(e);
305
            }
306
            Ok(Ok(method)) => method,
307
        };
308

            
309
        info!("Successfully launched PT for {transport} at {method:?}.");
310
        Ok(method)
311
    }
312
}
313

            
314
/// A SOCKS endpoint to connect through a pluggable transport.
315
#[derive(Debug, Clone, PartialEq, Eq)]
316
pub struct PtClientMethod {
317
    /// The SOCKS protocol version to use.
318
    pub(crate) kind: SocksVersion,
319
    /// The socket address to connect to.
320
    pub(crate) endpoint: SocketAddr,
321
}
322

            
323
impl PtClientMethod {
324
    /// Get the SOCKS protocol version to use.
325
    pub fn kind(&self) -> SocksVersion {
326
        self.kind
327
    }
328

            
329
    /// Get the socket address to connect to.
330
    pub fn endpoint(&self) -> SocketAddr {
331
        self.endpoint
332
    }
333
}
334

            
335
#[cfg(feature = "tor-channel-factory")]
336
#[async_trait]
337
impl<R: Runtime> tor_chanmgr::factory::AbstractPtMgr for PtMgr<R> {
338
    async fn factory_for_transport(
339
        &self,
340
        transport: &PtTransportName,
341
    ) -> Result<Option<Arc<dyn ChannelFactory + Send + Sync>>, Arc<dyn AbstractPtError>> {
342
        let cmethod = match self.get_cmethod_for_transport(transport).await {
343
            Err(e) => return Err(Arc::new(e)),
344
            Ok(None) => return Ok(None),
345
            Ok(Some(m)) => m,
346
        };
347

            
348
        let proxy = ExternalProxyPlugin::new(self.runtime.clone(), cmethod.endpoint, cmethod.kind);
349
        let factory = ChanBuilder::new(self.runtime.clone(), proxy);
350
        // FIXME(eta): Should we cache constructed factories? If no: should this still be an Arc?
351
        // FIXME(eta): Should we track what transports are live somehow, so we can shut them down?
352
        Ok(Some(Arc::new(factory)))
353
    }
354
}