//! quicproquo CLI client library. //! //! # KeyPackage expiry and refresh //! //! KeyPackages are single-use (consumed when someone fetches them for an invite) and the server //! may enforce a TTL (e.g. 24 hours). To stay invitable, run `qpq refresh-keypackage` //! periodically (e.g. before the server TTL) or after your KeyPackage was consumed: //! //! ```bash //! qpq refresh-keypackage --state qpq-state.bin --server 127.0.0.1:7000 //! ``` //! //! Use the same `--access-token` (or `QPQ_ACCESS_TOKEN`) as for other authenticated //! commands. See the [running-the-client](https://docs.quicproquo.dev/getting-started/running-the-client) //! docs for details. use std::sync::RwLock; use std::sync::atomic::{AtomicBool, Ordering}; pub mod client; pub use client::commands::{ cmd_chat, cmd_check_key, cmd_create_group, cmd_demo_group, cmd_export, cmd_export_verify, cmd_fetch_key, cmd_health, cmd_health_json, cmd_invite, cmd_join, cmd_login, cmd_ping, cmd_recv, cmd_register, cmd_register_state, cmd_refresh_keypackage, cmd_register_user, cmd_send, cmd_whoami, opaque_login, receive_pending_plaintexts, whoami_json, }; pub use client::repl::run_repl; pub use client::rpc::{connect_node, connect_node_opt, create_channel, enqueue, fetch_wait, resolve_user}; // Global auth context — RwLock so the REPL can set it after OPAQUE login. pub(crate) static AUTH_CONTEXT: RwLock> = RwLock::new(None); /// When `true`, [`connect_node`] skips TLS certificate verification. /// Set via [`set_insecure_skip_verify`]; read by the RPC layer. pub(crate) static INSECURE_SKIP_VERIFY: AtomicBool = AtomicBool::new(false); /// Enable or disable insecure (no-verify) TLS mode globally. /// /// **Development only.** When enabled, all outgoing connections skip certificate /// verification, making them vulnerable to MITM attacks. pub fn set_insecure_skip_verify(enabled: bool) { INSECURE_SKIP_VERIFY.store(enabled, Ordering::Relaxed); } #[derive(Clone, Debug)] pub struct ClientAuth { pub(crate) version: u16, pub(crate) access_token: Vec, pub(crate) device_id: Vec, } impl ClientAuth { /// Build a client auth context from optional token and device id. pub fn from_parts(access_token: String, device_id: Option) -> Self { let token = access_token.into_bytes(); let device = device_id.unwrap_or_default().into_bytes(); Self { version: 1, access_token: token, device_id: device, } } /// Build from raw token bytes (e.g. a 32-byte OPAQUE session token). pub fn from_raw(raw_token: Vec, device_id: Option) -> Self { let device = device_id.unwrap_or_default().into_bytes(); Self { version: 1, access_token: raw_token, device_id: device, } } } /// Set (or replace) the global auth context. pub fn init_auth(ctx: ClientAuth) { let mut guard = AUTH_CONTEXT.write().expect("AUTH_CONTEXT poisoned"); *guard = Some(ctx); }