1
#![cfg_attr(docsrs, feature(doc_auto_cfg, doc_cfg))]
2
#![doc = include_str!("../README.md")]
3
// @@ begin lint list maintained by maint/add_warning @@
4
#![allow(renamed_and_removed_lints)] // @@REMOVE_WHEN(ci_arti_stable)
5
#![allow(unknown_lints)] // @@REMOVE_WHEN(ci_arti_nightly)
6
#![warn(missing_docs)]
7
#![warn(noop_method_call)]
8
#![warn(unreachable_pub)]
9
#![warn(clippy::all)]
10
#![deny(clippy::await_holding_lock)]
11
#![deny(clippy::cargo_common_metadata)]
12
#![deny(clippy::cast_lossless)]
13
#![deny(clippy::checked_conversions)]
14
#![warn(clippy::cognitive_complexity)]
15
#![deny(clippy::debug_assert_with_mut_call)]
16
#![deny(clippy::exhaustive_enums)]
17
#![deny(clippy::exhaustive_structs)]
18
#![deny(clippy::expl_impl_clone_on_copy)]
19
#![deny(clippy::fallible_impl_from)]
20
#![deny(clippy::implicit_clone)]
21
#![deny(clippy::large_stack_arrays)]
22
#![warn(clippy::manual_ok_or)]
23
#![deny(clippy::missing_docs_in_private_items)]
24
#![warn(clippy::needless_borrow)]
25
#![warn(clippy::needless_pass_by_value)]
26
#![warn(clippy::option_option)]
27
#![deny(clippy::print_stderr)]
28
#![deny(clippy::print_stdout)]
29
#![warn(clippy::rc_buffer)]
30
#![deny(clippy::ref_option_ref)]
31
#![warn(clippy::semicolon_if_nothing_returned)]
32
#![warn(clippy::trait_duplication_in_bounds)]
33
#![deny(clippy::unchecked_duration_subtraction)]
34
#![deny(clippy::unnecessary_wraps)]
35
#![warn(clippy::unseparated_literal_suffix)]
36
#![deny(clippy::unwrap_used)]
37
#![deny(clippy::mod_module_files)]
38
#![allow(clippy::let_unit_value)] // This can reasonably be done for explicitness
39
#![allow(clippy::uninlined_format_args)]
40
#![allow(clippy::significant_drop_in_scrutinee)] // arti/-/merge_requests/588/#note_2812945
41
#![allow(clippy::result_large_err)] // temporary workaround for arti#587
42
#![allow(clippy::needless_raw_string_hashes)] // complained-about code is fine, often best
43
#![allow(clippy::needless_lifetimes)] // See arti#1765
44
//! <!-- @@ end lint list maintained by maint/add_warning @@ -->
45

            
46
// TODO #2010: Remove this global allow, and either propagate it to the functions that need it,
47
// or make those functions less complex.
48
#![allow(clippy::cognitive_complexity)]
49
// TODO #1645 (either remove this, or decide to have it everywhere)
50
#![cfg_attr(
51
    not(all(feature = "full", feature = "experimental")),
52
    allow(unused, unreachable_pub)
53
)]
54

            
55
#[cfg(feature = "bench")]
56
pub mod bench_utils;
57
pub mod channel;
58
mod congestion;
59
mod crypto;
60
pub mod memquota;
61
pub mod stream;
62
pub(crate) mod tunnel;
63
mod util;
64

            
65
pub use util::err::{Error, ResolveError};
66
pub use util::skew::ClockSkew;
67

            
68
pub use channel::params::ChannelPaddingInstructions;
69
pub use congestion::params as ccparams;
70
pub use crypto::cell::{HopNum, HopNumDisplay};
71
pub use tunnel::circuit;
72

            
73
/// A Result type for this crate.
74
pub type Result<T> = std::result::Result<T, Error>;
75

            
76
use std::fmt::Debug;
77
use tor_memquota::{
78
    mq_queue::{self, ChannelSpec as _},
79
    HasMemoryCost,
80
};
81
use tor_rtcompat::DynTimeProvider;
82

            
83
#[doc(hidden)]
84
pub use {derive_deftly, tor_memquota};
85

            
86
/// Timestamp object that we update whenever we get incoming traffic.
87
///
88
/// Used to implement [`time_since_last_incoming_traffic`]
89
static LAST_INCOMING_TRAFFIC: util::ts::AtomicOptTimestamp = util::ts::AtomicOptTimestamp::new();
90

            
91
/// Called whenever we receive incoming traffic.
92
///
93
/// Used to implement [`time_since_last_incoming_traffic`]
94
#[inline]
95
292
pub(crate) fn note_incoming_traffic() {
96
292
    LAST_INCOMING_TRAFFIC.update();
97
292
}
98

            
99
/// Return the amount of time since we last received "incoming traffic".
100
///
101
/// This is a global counter, and is subject to interference from
102
/// other users of the `tor_proto`.  Its only permissible use is for
103
/// checking how recently we have been definitely able to receive
104
/// incoming traffic.
105
///
106
/// When enabled, this timestamp is updated whenever we receive a valid
107
/// cell, and whenever we complete a channel handshake.
108
///
109
/// Returns `None` if we never received "incoming traffic".
110
403307
pub fn time_since_last_incoming_traffic() -> Option<std::time::Duration> {
111
403307
    LAST_INCOMING_TRAFFIC.time_since_update().map(Into::into)
112
403307
}
113

            
114
/// Make an MPSC queue, of any type, that participates in memquota, but a fake one for testing
115
#[cfg(any(test, feature = "testing"))] // Used by Channel::new_fake which is also feature=testing
116
1412
pub(crate) fn fake_mpsc<T: HasMemoryCost + Debug + Send>(
117
1412
    buffer: usize,
118
1412
) -> (
119
1412
    mq_queue::Sender<T, mq_queue::MpscSpec>,
120
1412
    mq_queue::Receiver<T, mq_queue::MpscSpec>,
121
1412
) {
122
1412
    mq_queue::MpscSpec::new(buffer)
123
1412
        .new_mq(
124
1412
            // The fake Account doesn't care about the data ages, so this will do.
125
1412
            //
126
1412
            // Thiw would be wrong to use generally in tests, where we might want to mock time,
127
1412
            // since we end up, here with totally *different* mocked time.
128
1412
            // But it's OK here, and saves passing a runtime parameter into this function.
129
1412
            DynTimeProvider::new(tor_rtmock::MockRuntime::default()),
130
1412
            &tor_memquota::Account::new_noop(),
131
1412
        )
132
1412
        .expect("create fake mpsc")
133
1412
}
134

            
135
/// Return a list of the protocols [supported](tor_protover::doc_supported)
136
/// by this crate, running as a client.
137
237
pub fn supported_client_protocols() -> tor_protover::Protocols {
138
    use tor_protover::named::*;
139
    // WARNING: REMOVING ELEMENTS FROM THIS LIST CAN BE DANGEROUS!
140
    // SEE [`tor_protover::doc_changing`]
141
237
    [
142
237
        LINK_V4,
143
237
        LINK_V5,
144
237
        LINKAUTH_ED25519_SHA256_EXPORTER,
145
237
        FLOWCTRL_AUTH_SENDME,
146
237
        RELAY_NTOR,
147
237
        RELAY_EXTEND_IPv6,
148
237
        RELAY_NTORV3,
149
237
    ]
150
237
    .into_iter()
151
237
    .collect()
152
237
}
153

            
154
#[cfg(test)]
155
mod test {
156
    // @@ begin test lint list maintained by maint/add_warning @@
157
    #![allow(clippy::bool_assert_comparison)]
158
    #![allow(clippy::clone_on_copy)]
159
    #![allow(clippy::dbg_macro)]
160
    #![allow(clippy::mixed_attributes_style)]
161
    #![allow(clippy::print_stderr)]
162
    #![allow(clippy::print_stdout)]
163
    #![allow(clippy::single_char_pattern)]
164
    #![allow(clippy::unwrap_used)]
165
    #![allow(clippy::unchecked_duration_subtraction)]
166
    #![allow(clippy::useless_vec)]
167
    #![allow(clippy::needless_pass_by_value)]
168
    //! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
169

            
170
    use super::*;
171

            
172
    #[test]
173
    fn protocols() {
174
        let pr = supported_client_protocols();
175
        let expected = "FlowCtrl=1 Link=4-5 LinkAuth=3 Relay=2-4".parse().unwrap();
176
        assert_eq!(pr, expected);
177
    }
178
}