Cogs and Levers A blog full of technical stuff

Learning Rust Part 15 - Systems Programming

Introduction

Rust’s combination of low-level control, memory safety, and performance makes it an excellent choice for systems programming. Rust supports direct memory management, OS interfacing, and embedded programming while minimizing undefined behavior. In this post, we’ll explore essential systems programming topics, including memory management, device driver development, and embedded systems programming.

Low-level Memory Management

Rust’s memory management model enforces safe practices without a garbage collector. Tools like Box, Rc, Arc, and unsafe allow for direct memory management.

Using Box for Heap Allocation

Box<T> is used for heap allocation, ideal for large data structures that may not fit on the stack. By default, Rust allocates on the stack, but Box moves data to the heap.

fn main() {
    let boxed_value = Box::new(10);
    println!("Boxed value: {}", boxed_value);
}

Unsafe Rust for Manual Memory Management

Rust ensures safety by default, but unsafe blocks enable direct memory access, pointer manipulation, and interfacing with other languages, useful for hardware interactions or optimizing critical code paths.

fn unsafe_memory() {
    let x = 10;
    let r = &x as *const i32;

    unsafe {
        println!("Unsafe pointer dereference: {}", *r);
    }
}

Interfacing with Operating System APIs

Rust’s std::os and libc crates provide access to OS-specific APIs, enabling low-level system calls, process management, and file descriptor handling.

Working with Files and File Descriptors

While std::fs handles files at a high level, std::os::unix and std::os::windows provide OS-specific functionality for working with raw file descriptors.

use std::os::unix::io::{RawFd, AsRawFd};
use std::fs::File;

fn main() -> std::io::Result<()> {
    let file = File::open("example.txt")?;
    let raw_fd: RawFd = file.as_raw_fd();
    println!("Raw file descriptor: {}", raw_fd);
    Ok(())
}

Calling OS Functions with libc

The libc crate allows calling C library functions directly, giving access to various POSIX functions for low-level system programming.

extern crate libc;
use libc::{getpid, c_int};

fn main() {
    let pid: c_int = unsafe { getpid() };
    println!("Process ID: {}", pid);
}

Writing Device Drivers

Rust is increasingly popular for device drivers because of its safety guarantees. While driver development requires unsafe code to interact directly with hardware, Rust’s borrow checker reduces common errors.

Example: Writing a Basic Character Device Driver

Creating an actual device driver requires interacting with kernel space. Below is a basic structure that mimics a character device driver.

#![no_std]
#![no_main]

extern crate embedded_hal as hal;
use hal::blocking::serial::Write;
use core::fmt::Write as FmtWrite;

struct Serial;

impl Write<u8> for Serial {
    type Error = ();

    fn bwrite_all(&mut self, buffer: &[u8]) -> Result<(), Self::Error> {
        for &byte in buffer {
            unsafe { core::ptr::write_volatile(0x4000_0000 as *mut u8, byte) };
        }
        Ok(())
    }
}

This sample initializes a Serial struct to write directly to a memory-mapped I/O address.

Embedded Systems with no_std

Rust’s no_std environment enables development without the standard library, essential for embedded systems where resources are limited. In no_std projects, libraries like embedded-hal provide low-level functionalities for microcontrollers.

Creating a no_std Embedded Project

To work in an embedded environment, first disable the standard library by specifying #![no_std]. Libraries like cortex-m and embedded-hal provide core functionalities for microcontrollers.

#![no_std]
#![no_main]

extern crate cortex_m_rt as rt;
use rt::entry;

#[entry]
fn main() -> ! {
    // Your embedded code here
    loop {}
}

The #[entry] macro designates the entry point, while #![no_std] removes the dependency on the standard library.

Building Kernels and Operating Systems

Rust is becoming popular for experimental operating systems and kernel development due to its safety and performance. Kernel development in Rust uses no_std, allowing low-level hardware control.

Example Structure for a Basic OS Kernel

To create a basic OS kernel, use #![no_std] and #![no_main] with a custom entry point, typically _start. Since the standard library is unavailable, you handle everything directly with low-level code.

#![no_std]
#![no_main]

use core::panic::PanicInfo;

#[no_mangle]
pub extern "C" fn _start() -> ! {
    loop {}
}

#[panic_handler]
fn panic(_info: &PanicInfo) -> ! {
    loop {}
}

This code provides a minimal structure for a Rust-based OS kernel, with _start as the entry point and a custom panic_handler.

Performance Optimizations and Profiling

Rust offers various tools for profiling and optimizing performance, including compiler flags, profiling tools, and benchmarking libraries like criterion.

Compiler Flags for Optimization

Using cargo build --release enables optimizations, significantly improving performance by enabling Rust’s optimization passes.

cargo build --release

Profiling with perf

For detailed profiling, Rust projects can use perf on Linux to gain insights into CPU usage and performance bottlenecks.

Compile with Release Mode

cargo build --release

Run with perf

perf record ./target/release/your_binary
perf report

Criterion for Benchmarking

criterion is a Rust library for benchmarking, providing reliable and statistically sound measurements for performance testing.

use criterion::{black_box, criterion_group, criterion_main, Criterion};

fn fibonacci(n: u64) -> u64 {
    match n {
        0 => 1,
        1 => 1,
        n => fibonacci(n - 1) + fibonacci(n - 2),
    }
}

fn criterion_benchmark(c: &mut Criterion) {
    c.bench_function("fib 20", |b| b.iter(|| fibonacci(black_box(20))));
}

criterion_group!(benches, criterion_benchmark);
criterion_main!(benches);

Run with cargo bench to get detailed performance data.

Summary

Rust’s systems programming capabilities make it an exceptional tool for low-level development. With control over memory, access to OS APIs, support for embedded systems, and tools for profiling and optimization, Rust combines safety and performance, enabling a wide range of system-level applications.

Learning Rust Part 14 - Security and Cryptography

Introduction

Rust’s strong memory safety guarantees and growing ecosystem of security libraries make it an excellent choice for building secure applications. From encryption and password hashing to secure communication and cross-compilation for secure systems, Rust provides a solid foundation for high-security applications. In this post, we’ll explore key tools and techniques for secure application development in Rust.

Encryption Libraries (e.g., rust-crypto, ring)

Rust offers a range of encryption libraries, including rust-crypto and ring, which provide cryptographic algorithms like AES, RSA, and SHA-2. These libraries enable secure encryption, decryption, hashing, and digital signatures.

Using ring for Encryption and Hashing

The ring library is popular for cryptographic operations in Rust, offering efficiency and ease of use.

Example: Hashing with SHA-256

use ring::digest::{Context, SHA256, Digest};

fn sha256_hash(data: &[u8]) -> Digest {
    let mut context = Context::new(&SHA256);
    context.update(data);
    context.finish()
}

fn main() {
    let data = b"Hello, Rust!";
    let hash = sha256_hash(data);
    println!("SHA-256 hash: {:?}", hash);
}

Example: AES Encryption and Decryption with ring

The ring library provides AES-GCM for authenticated encryption, ensuring both confidentiality and data integrity.

use ring::aead::{AES_256_GCM, SealingKey, UnboundKey, LessSafeKey, Nonce, Aad, OpeningKey};
use ring::rand::{SystemRandom, SecureRandom};

fn aes_encrypt(data: &[u8], key: &[u8]) -> Vec<u8> {
    let unbound_key = UnboundKey::new(&AES_256_GCM, key).unwrap();
    let sealing_key = LessSafeKey::new(unbound_key);
    let nonce = Nonce::assume_unique_for_key([0u8; 12]);
    let mut in_out = data.to_vec();
    sealing_key.seal_in_place_append_tag(nonce, Aad::empty(), &mut in_out).unwrap();
    in_out
}

Password Hashing and Secure Storage

Password hashing is crucial for securely storing user passwords. Libraries like argon2 provide key derivation functions (e.g., Argon2, scrypt, bcrypt) that are secure against brute-force attacks.

Argon2 with argon2 Library

The argon2 crate enables secure password hashing, an essential feature for storing user credentials.

use argon2::{self, Config};

fn hash_password(password: &[u8], salt: &[u8]) -> Vec<u8> {
    let config = Config::default();
    argon2::hash_raw(password, salt, &config).unwrap()
}

fn main() {
    let password = b"super_secret_password";
    let salt = b"random_salt";
    let hash = hash_password(password, salt);
    println!("Password hash: {:?}", hash);
}

Secure Storage

Storing sensitive information, like API keys and secrets, securely is essential. You can use encrypted databases or dedicated secure storage libraries like secrecy to ensure data stays confidential in memory.

TLS and SSL with rustls

For secure communication, Rust provides rustls, a TLS library built on ring. Unlike C-based libraries like OpenSSL, rustls is memory-safe and avoids common vulnerabilities.

Setting up a TLS Server with rustls

Using rustls, you can build a TLS-enabled server that ensures secure data transmission.

use rustls::{ServerConfig, NoClientAuth};
use std::sync::Arc;
use tokio_rustls::TlsAcceptor;
use tokio::net::TcpListener;

#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
    let certs = load_certs("cert.pem")?;
    let key = load_private_key("key.pem")?;
    let config = ServerConfig::builder()
        .with_safe_defaults()
        .with_no_client_auth()
        .with_single_cert(certs, key)?;

    let listener = TcpListener::bind("127.0.0.1:8443").await?;
    let acceptor = TlsAcceptor::from(Arc::new(config));

    loop {
        let (socket, _) = listener.accept().await?;
        let acceptor = acceptor.clone();
        tokio::spawn(async move {
            let _tls_stream = acceptor.accept(socket).await.unwrap();
            println!("TLS connection established");
        });
    }
}

In this example, rustls is configured with certificates for server authentication, and incoming connections are wrapped in TLS for secure communication.

Cross-compilation for Secure Systems

Cross-compilation allows you to build Rust applications for secure or embedded environments, such as ARM-based systems or Linux-based IoT devices. Tools like rustup and custom target configurations facilitate cross-compiling Rust code.

Example: Cross-compiling for ARM

To cross-compile for an ARM-based system (e.g., Raspberry Pi), use rustup to install the appropriate target.

rustup target add armv7-unknown-linux-gnueabihf
cargo build --target armv7-unknown-linux-gnueabihf

For more secure systems, you can use musl as a static linking target, ensuring binary compatibility and reducing dependencies.

rustup target add x86_64-unknown-linux-musl
cargo build --target x86_64-unknown-linux-musl

Security Best Practices in Rust

While Rust’s safety guarantees are a strong foundation, additional best practices can further enhance application security:

  • Minimize unsafe blocks: Limit the use of unsafe code to avoid memory vulnerabilities.
  • Use password hashing for sensitive data: Store passwords using Argon2, bcrypt, or scrypt, not as plaintext.
  • Leverage strong typing and lifetimes: Rust’s type system prevents common errors by ensuring proper data handling.
  • Employ secure libraries: Use libraries like ring, rustls, and argon2 rather than implementing cryptographic functions, as custom cryptography is challenging to secure.

Security Audits and Code Analysis

Rust’s ecosystem includes tools for static analysis and security auditing, such as cargo-audit, which checks dependencies for known vulnerabilities.

cargo install cargo-audit
cargo audit

cargo-audit is especially useful for detecting security issues in third-party libraries.

Secure Memory Management

Rust’s zero-cost abstractions ensure safety without sacrificing performance, which is critical for secure memory handling. Libraries like secrecy help secure data in memory, preventing leaks and ensuring sensitive data is cleared when no longer needed.

Using secrecy for Sensitive Data

The secrecy crate provides secure wrappers around sensitive data types, ensuring they’re wiped from memory when dropped.

use secrecy::{Secret, ExposeSecret};

fn main() {
    let password = Secret::new(String::from("super_secret_password"));
    println!("Password: {}", password.expose_secret());
}

secrecy is useful for managing in-memory secrets, ensuring sensitive data is not accidentally leaked.

Summary

Rust’s security-focused libraries, memory safety guarantees, and secure-by-default principles make it ideal for developing cryptographic applications and secure systems. With tools for encryption, password hashing, TLS, cross-compilation, and secure memory handling, Rust provides a strong foundation for building secure, high-performance applications.

Learning Rust Part 13 - Networking and Protocols

Introduction

Rust’s networking capabilities are both powerful and versatile, supporting everything from low-level socket programming to high-level protocols. Whether you’re working with standard protocols like HTTP and MQTT or crafting custom protocols, Rust’s libraries offer the tools needed for high-performance and reliable network communication.

Socket Programming (TCP/UDP)

Socket programming is fundamental to network communication. Rust’s std::net module provides basic support for TCP and UDP sockets, suitable for low-level client-server applications.

TCP Sockets

TCP (Transmission Control Protocol) is connection-oriented, ensuring reliable data transmission. Rust’s TcpListener and TcpStream make it easy to listen for and send TCP data.

Simple TCP Server

use std::net::{TcpListener, TcpStream};
use std::io::{Read, Write};

fn handle_client(mut stream: TcpStream) {
    let mut buffer = [0; 512];
    stream.read(&mut buffer).unwrap();
    stream.write(&buffer).unwrap();
}

fn main() {
    let listener = TcpListener::bind("127.0.0.1:7878").unwrap();
    for stream in listener.incoming() {
        let stream = stream.unwrap();
        handle_client(stream);
    }
}

UDP Sockets

UDP (User Datagram Protocol) is connectionless and best suited for fast, unreliable message delivery. Rust’s UdpSocket allows for easy creation of UDP clients and servers.

Simple UDP Client and Server

use std::net::UdpSocket;

fn main() -> std::io::Result<()> {
    let socket = UdpSocket::bind("127.0.0.1:7878")?;
    socket.send_to(b"Hello, UDP!", "127.0.0.1:7879")?;

    let mut buffer = [0; 512];
    let (amt, src) = socket.recv_from(&mut buffer)?;
    println!("Received {} bytes from {}: {:?}", amt, src, &buffer[..amt]);
    Ok(())
}

Low-Level Network Access with tokio and async-std

For non-blocking network applications, Rust offers asynchronous libraries like tokio and async-std, which enable high-performance I/O without blocking the main thread—ideal for servers handling numerous concurrent connections.

TCP with tokio

tokio is Rust’s most popular async runtime, commonly used in web servers and microservices. Here’s a basic asynchronous TCP server using tokio.

use tokio::net::TcpListener;
use tokio::io::{self, AsyncReadExt, AsyncWriteExt};

#[tokio::main]
async fn main() -> io::Result<()> {
    let listener = TcpListener::bind("127.0.0.1:7878").await?;
    loop {
        let (mut socket, _) = listener.accept().await?;
        tokio::spawn(async move {
            let mut buffer = [0; 512];
            let _ = socket.read(&mut buffer).await;
            let _ = socket.write_all(&buffer).await;
        });
    }
}

TCP with async-std

async-std is an alternative async library similar to tokio, providing asynchronous versions of Rust’s standard library functions.

use async_std::net::TcpListener;
use async_std::prelude::*;
use async_std::task;

fn main() -> std::io::Result<()> {
    task::block_on(async {
        let listener = TcpListener::bind("127.0.0.1:7878").await?;
        while let Ok((mut socket, _)) = listener.accept().await {
            task::spawn(async move {
                let mut buffer = vec![0; 512];
                let _ = socket.read(&mut buffer).await;
                let _ = socket.write_all(&buffer).await;
            });
        }
        Ok(())
    })
}

Protocols (HTTP, MQTT, gRPC)

Rust has libraries for common application-layer protocols like HTTP, MQTT, and gRPC, which are widely used in web development, IoT, and microservices.

HTTP with reqwest and hyper

For HTTP clients, reqwest provides an easy-to-use API, while hyper is a low-level HTTP library for both clients and servers.

use reqwest::Error;

#[tokio::main]
async fn main() -> Result<(), Error> {
    let response = reqwest::get("https://httpbin.org/get").await?;
    println!("Status: {}", response.status());
    Ok(())
}

MQTT with rumqttc

MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol often used in IoT applications. The rumqttc library is popular for MQTT in Rust.

use rumqttc::{MqttOptions, Client, QoS};

fn main() {
    let mut mqttoptions = MqttOptions::new("client_id", "broker.hivemq.com", 1883);
    let (mut client, mut connection) = Client::new(mqttoptions, 10);
    client.subscribe("hello/world", QoS::AtLeastOnce).unwrap();

    for notification in connection.iter() {
        println!("{:?}", notification);
    }
}

gRPC with tonic

gRPC is an RPC framework based on HTTP/2, ideal for high-performance microservices. tonic provides async support for gRPC in Rust.

use tonic::{transport::Server, Request, Response, Status};
use hello_world::greeter_server::{Greeter, GreeterServer};
use hello_world::HelloReply;

mod hello_world {
    tonic::include_proto!("helloworld");
}

#[derive(Default)]
pub struct MyGreeter;

#[tonic::async_trait]
impl Greeter for MyGreeter {
    async fn say_hello(
        &self,
        request: Request<hello_world::HelloRequest>,
    ) -> Result<Response<HelloReply>, Status> {
        let reply = hello_world::HelloReply {
            message: format!("Hello {}", request.into_inner().name),
        };
        Ok(Response::new(reply))
    }
}

#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
    let addr = "127.0.0.1:50051".parse().unwrap();
    let greeter = MyGreeter::default();

    Server::builder()
        .add_service(GreeterServer::new(greeter))
        .serve(addr)
        .await?;
    Ok(())
}

Custom Protocols with Rust

Rust’s type safety and low-level control make it ideal for creating custom network protocols. Using tokio or async-std, you can manage connections, implement unique message structures, and handle various communication patterns.

Defining a Simple Custom Protocol

Suppose you need a custom protocol where messages start with a fixed header followed by a payload. Here’s how to define this structure and handle parsing.

use tokio::io::{self, AsyncReadExt, AsyncWriteExt};
use tokio::net::TcpStream;

async fn send_message(mut stream: TcpStream, message: &[u8]) -> io::Result<()> {
    let header = (message.len() as u16).to_be_bytes(); // Message length header
    stream.write_all(&header).await?;
    stream.write_all(message).await?;
    Ok(())
}

async fn receive_message(mut stream: TcpStream) -> io::Result<Vec<u8>> {
    let mut header = [0; 2];
    stream.read_exact(&mut header).await?;
    let length = u16::from_be_bytes(header) as usize;
    let mut buffer = vec![0; length];
    stream.read_exact(&mut buffer).await?;
    Ok(buffer)
}

Serializing/Deserializing Network Messages

Rust’s serialization libraries, like serde, simplify encoding and decoding network messages. Using serde, you can define structured data and serialize it to JSON, MessagePack, or other formats.

Using serde with JSON

The serde_json crate makes it easy to serialize and deserialize Rust types to JSON, which is suitable for APIs or custom protocols.

use serde::{Serialize, Deserialize};
use serde_json;

#[derive(Serialize, Deserialize, Debug)]
struct Message {
    id: u32,
    content: String,
}

fn main() -> serde_json::Result<()> {
    let msg = Message { id: 1, content: "Hello, Rust!".to_string() };
    let json = serde_json::to_string(&msg)?;
    println!("Serialized: {}", json);

    let deserialized: Message = serde_json::from_str(&json)?;
    println!("Deserialized: {:?}", deserialized);
    Ok(())
}

Summary

Rust’s networking capabilities support a wide range of applications, from low-level socket programming to high-level protocol handling. With libraries like tokio, async-std, and serde, Rust enables both synchronous and asynchronous communication, making it a great choice for building robust networked applications.

Learning Rust Part 12 - Web Development

Introduction

Rust has gained significant traction in web development thanks to its speed, safety, and a growing ecosystem of web frameworks and libraries. From high-performance APIs to cross-platform applications with WebAssembly, Rust provides numerous tools for both backend and frontend development. This post explores popular tools in Rust’s web development toolkit, covering HTTP clients, REST API frameworks, asynchronous web frameworks, WebAssembly, frontend libraries, and cross-platform solutions like Tauri.

HTTP Clients and Servers

Rust provides several libraries for making HTTP requests and building HTTP servers.

reqwest - HTTP Client

reqwest is a user-friendly HTTP client built on top of hyper, offering an easy interface for making asynchronous requests.

use reqwest::Error;

#[tokio::main]
async fn main() -> Result<(), Error> {
    let response = reqwest::get("https://api.github.com").await?;
    println!("Status: {}", response.status());
    Ok(())
}

hyper - Low-Level HTTP Client and Server

hyper is a low-level HTTP library suitable for building HTTP servers and clients where you need fine-grained control.

use hyper::{Body, Request, Response, Server};
use hyper::service::{make_service_fn, service_fn};

async fn handle_request(_: Request<Body>) -> Result<Response<Body>, hyper::Error> {
    Ok(Response::new(Body::from("Hello, World!")))
}

#[tokio::main]
async fn main() {
    let make_svc = make_service_fn(|_| async { Ok::<_, hyper::Error>(service_fn(handle_request)) });
    let addr = ([127, 0, 0, 1], 3000).into();

    let server = Server::bind(&addr).serve(make_svc);
    println!("Listening on http://{}", addr);

    if let Err(e) = server.await {
        eprintln!("Server error: {}", e);
    }
}

actix-web is a high-performance web framework suitable for building complex applications and REST APIs. Based on the actix actor framework, it offers excellent concurrency.

use actix_web::{get, App, HttpServer, Responder};

#[get("/")]
async fn hello() -> impl Responder {
    "Hello, Actix-web!"
}

#[actix_rt::main]
async fn main() -> std::io::Result<()> {
    HttpServer::new(|| App::new().service(hello))
        .bind("127.0.0.1:8080")?
        .run()
        .await
}

REST API Development

Rust’s ecosystem supports building robust REST APIs with frameworks like warp and rocket, in addition to actix-web.

Building REST APIs with warp

warp is a lightweight, flexible, and composable web framework that’s asynchronous by default, ideal for creating RESTful APIs with minimal boilerplate.

use warp::Filter;

#[tokio::main]
async fn main() {
    let hello = warp::path::end().map(|| warp::reply::json(&"Hello, Warp!"));

    warp::serve(hello)
        .run(([127, 0, 0, 1], 3030))
        .await;
}

Building REST APIs with rocket

rocket is known for its simplicity and ease of use, managing routing, parameter parsing, and JSON serialization automatically.

#[macro_use] extern crate rocket;

#[get("/")]
fn hello() -> &'static str {
    "Hello, Rocket!"
}

#[launch]
fn rocket() -> _ {
    rocket::build().mount("/", routes![hello])
}

Asynchronous Web Frameworks (warp, rocket)

Both warp and rocket support asynchronous programming, enabling scalable, non-blocking web services.

Asynchronous Handler Example in warp

In warp, asynchronous handlers are defined using async functions, allowing for efficient handling of multiple connections.

use warp::Filter;

#[tokio::main]
async fn main() {
    let hello = warp::path::end().map(|| async { warp::reply::json(&"Hello, async Warp!") });

    warp::serve(hello)
        .run(([127, 0, 0, 1], 3030))
        .await;
}

WebAssembly (Wasm) and Rust

WebAssembly (Wasm) allows Rust to run in the browser, making high-performance applications possible on the web. Rust’s wasm-pack tool simplifies packaging and deploying Rust code as Wasm.

Setting up a WebAssembly Project with wasm-pack

Install wasm-pack:

cargo install wasm-pack

Create a new project:

wasm-pack new my_wasm_project
cd my_wasm_project

Build and generate Wasm:

wasm-pack build --target web

Rust with Wasm is ideal for applications requiring high-performance computations, like game engines or real-time data visualizations.

Frontend Development with Yew and Sycamore

Rust has emerging frontend frameworks like Yew and Sycamore for building interactive web applications.

Yew

Yew is inspired by React, allowing Rust code to manage component-based UIs in the browser via WebAssembly.

use yew::prelude::*;

struct App;

impl Component for App {
    type Message = ();
    type Properties = ();

    fn create(_: Self::Properties, _: ComponentLink<Self>) -> Self {
        App
    }

    fn update(&mut self, _: Self::Message) -> bool {
        true
    }

    fn view(&self) -> Html {
        html! {
            <div>
                <h1>{ "Hello, Yew!" }</h1>
            </div>
        }
    }
}

fn main() {
    yew::start_app::<App>();
}

Sycamore

Sycamore is another WebAssembly-based frontend library, offering reactivity and efficient rendering, much like React or Solid.js.

use sycamore::prelude::*;

#[component]
fn App<G: Html>() -> View<G> {
    view! {
        h1 { "Hello, Sycamore!" }
    }
}

fn main() {
    sycamore::render(|| view! { App {} });
}

Cross-platform Web and Mobile Apps with Tauri

Tauri is a Rust-based framework for building lightweight, secure desktop applications with web technologies. Tauri uses Rust for the backend and HTML/CSS/JavaScript for the frontend, providing an alternative to Electron with lower memory usage.

Setting Up Tauri

Install Tauri CLI:

cargo install tauri-cli

Create a new Tauri project:

tauri init

Build and run the app:

cargo tauri dev

Tauri is ideal for web-based desktop applications that require native capabilities like filesystem access and system notifications.

Summary

Rust’s growing web ecosystem includes powerful libraries and frameworks for server-side development, REST APIs, and cross-platform applications. Whether building high-performance APIs with warp, creating frontend interfaces with Yew, or deploying Rust with WebAssembly, Rust provides a robust toolkit for modern web development.

Learning Rust Part 11 - Crates and Package Management

Introduction

Rust’s package manager, Cargo, provides an all-in-one toolset for building, dependency management, testing, and more. Beyond managing individual projects, Cargo also supports multi-package workspaces, making it ideal for complex Rust applications. With additional tools like Clippy for linting and Rustfmt for formatting, Cargo enables streamlined package development and code maintenance.

Cargo Basics (Build System and Package Manager)

Cargo serves as Rust’s build system and package manager, handling tasks from project creation to compiling, testing, and managing dependencies. Each project includes a Cargo.toml file, which defines package metadata, dependencies, and configurations.

Creating a New Project

To start a new Rust project, use cargo new, which sets up a folder with a Cargo.toml file, src/main.rs or src/lib.rs, and other necessary project files.

cargo new my_project --bin    # Creates a binary project
cargo new my_library          # Creates a library project

Building and Running

Cargo provides commands for compiling and running Rust projects, ensuring an efficient development cycle.

cargo build           # Compiles the project
cargo run             # Builds and runs the project
cargo build --release # Builds an optimized release version

Cargo Workspaces

Cargo workspaces allow you to manage multiple interdependent packages within a single project, making it easier to develop complex applications with multiple crates.

Creating a Workspace

Define a workspace by creating a Cargo.toml at the project’s root and specifying member crates. Each member crate has its own folder with its own Cargo.toml.

# Cargo.toml
[workspace]
members = ["crate1", "crate2"]

With this setup, you can run cargo build or cargo test for all workspace members at once, simplifying multi-crate development.

Dependencies and Versioning

Cargo simplifies dependency management with the [dependencies] section in Cargo.toml. You can specify dependencies by version, Git repository, or local path.

Adding Dependencies

Add dependencies to Cargo.toml, and Cargo will download and build them automatically.

[dependencies]
serde = "1.0"                      # Version from crates.io
rand = { version = "0.8" }         # Alternate syntax for version
my_local_crate = { path = "../my_local_crate" } # Local dependency

Semantic Versioning

Cargo follows semantic versioning (major.minor.patch) for specifying compatible versions.

serde = "1.0"  # Compatible with 1.0 or higher, but below 2.0
serde = "~1.0" # Compatible with 1.0.x only

Publishing to Crates.io

Publishing a crate to crates.io makes it available to the Rust community. To publish, create an account on crates.io and generate an API token.

Steps to Publish

  1. Update Cargo.toml: Include essential information like name, description, license, and repository link.
  2. Login and Publish: Use cargo login with your API token, then cargo publish to upload the crate.
cargo login <API_TOKEN>
cargo publish

Versioning for Updates

After publishing, increment the version in Cargo.toml before publishing updates. Follow semantic versioning rules for breaking changes, new features, and patches.

version = "1.1.0" # Update for new features

Rust Toolchain Management (rustup and cargo-install)

Rustup manages Rust’s toolchain, making it easy to install, update, or switch between versions. Rustup supports stable, beta, and nightly versions of Rust.

Using Rustup

# Install Rust
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh

# Update Rust
rustup update

# Switch to the nightly toolchain
rustup default nightly

Installing Packages Globally with cargo install

cargo install allows you to install Rust binaries globally, useful for tools like Clippy or custom Rust tools from GitHub.

cargo install ripgrep     # Install ripgrep, a fast search tool
cargo install cargo-edit  # Install a cargo subcommand from GitHub

Clippy for Linting

Clippy is Rust’s linter, designed to catch common mistakes, stylistic issues, and potential bugs. Run Clippy with cargo clippy, and it will analyze your code for possible improvements.

Using Clippy

If Clippy isn’t already installed, add it as a component.

rustup component add clippy
cargo clippy

Clippy provides suggestions with severity levels like “warning” and “help,” encouraging idiomatic and optimized Rust code. For instance, Clippy might recommend avoiding redundant clones or inefficient operations.

Rustfmt for Code Formatting

Rustfmt automatically formats Rust code according to Rust’s style guide, ensuring consistency across the codebase. Rustfmt is especially useful in collaborative projects and CI pipelines.

Formatting with Rustfmt

Run Rustfmt with cargo fmt to format your code in place, following Rust’s official style guide.

rustup component add rustfmt
cargo fmt

Rustfmt can also be customized with a .rustfmt.toml file, where you can set options for indentation, line width, and more.

# .rustfmt.toml
max_width = 100  # Set max line width
hard_tabs = false

Summary

Rust’s Cargo package manager and associated toolchain provide an efficient approach to project management, dependency handling, and distribution. Cargo workspaces simplify managing multi-crate projects, while tools like Clippy and Rustfmt maintain code quality and style. With support for publishing and version control, Cargo and Rust’s ecosystem streamline the development, distribution, and maintenance of reliable Rust projects.