1#[cfg(target_os = "fuchsia")]
15pub mod sync;
16
17use std::collections::HashMap;
18use std::fmt::Debug;
19use std::num::{NonZeroU16, NonZeroU64};
20use std::ops::RangeInclusive;
21
22use async_utils::fold::FoldWhile;
23use fidl::marker::SourceBreaking;
24use fidl_fuchsia_net_ext::IntoExt;
25use futures::{Stream, StreamExt as _, TryStreamExt as _};
26use thiserror::Error;
27use {
28 fidl_fuchsia_net as fnet, fidl_fuchsia_net_filter as fnet_filter,
29 fidl_fuchsia_net_interfaces as fnet_interfaces,
30 fidl_fuchsia_net_interfaces_ext as fnet_interfaces_ext, fidl_fuchsia_net_root as fnet_root,
31};
32
33#[derive(Debug, Error, PartialEq)]
36pub enum FidlConversionError {
37 #[error("union is of an unknown variant: {0}")]
38 UnknownUnionVariant(&'static str),
39 #[error("namespace ID not provided")]
40 MissingNamespaceId,
41 #[error("namespace domain not provided")]
42 MissingNamespaceDomain,
43 #[error("routine ID not provided")]
44 MissingRoutineId,
45 #[error("routine type not provided")]
46 MissingRoutineType,
47 #[error("IP installation hook not provided")]
48 MissingIpInstallationHook,
49 #[error("NAT installation hook not provided")]
50 MissingNatInstallationHook,
51 #[error("interface matcher specified an invalid ID of 0")]
52 ZeroInterfaceId,
53 #[error("invalid address range (start must be <= end)")]
54 InvalidAddressRange,
55 #[error("address range start and end addresses are not the same IP family")]
56 AddressRangeFamilyMismatch,
57 #[error("prefix length of subnet is longer than number of bits in IP address")]
58 SubnetPrefixTooLong,
59 #[error("host bits are set in subnet network")]
60 SubnetHostBitsSet,
61 #[error("invalid port matcher range (start must be <= end)")]
62 InvalidPortMatcherRange,
63 #[error("transparent proxy action specified an invalid local port of 0")]
64 UnspecifiedTransparentProxyPort,
65 #[error("NAT action specified an invalid rewrite port of 0")]
66 UnspecifiedNatPort,
67 #[error("invalid port range (start must be <= end)")]
68 InvalidPortRange,
69 #[error("non-error result variant could not be converted to an error")]
70 NotAnError,
71}
72
73mod type_names {
76 pub(super) const RESOURCE_ID: &str = "fuchsia.net.filter/ResourceId";
77 pub(super) const DOMAIN: &str = "fuchsia.net.filter/Domain";
78 pub(super) const IP_INSTALLATION_HOOK: &str = "fuchsia.net.filter/IpInstallationHook";
79 pub(super) const NAT_INSTALLATION_HOOK: &str = "fuchsia.net.filter/NatInstallationHook";
80 pub(super) const ROUTINE_TYPE: &str = "fuchsia.net.filter/RoutineType";
81 pub(super) const INTERFACE_MATCHER: &str = "fuchsia.net.filter/InterfaceMatcher";
82 pub(super) const ADDRESS_MATCHER_TYPE: &str = "fuchsia.net.filter/AddressMatcherType";
83 pub(super) const TRANSPORT_PROTOCOL: &str = "fuchsia.net.filter/TransportProtocol";
84 pub(super) const ACTION: &str = "fuchsia.net.filter/Action";
85 pub(super) const MARK_ACTION: &str = "fuchsia.net.filter/MarkAction";
86 pub(super) const TRANSPARENT_PROXY: &str = "fuchsia.net.filter/TransparentProxy";
87 pub(super) const RESOURCE: &str = "fuchsia.net.filter/Resource";
88 pub(super) const EVENT: &str = "fuchsia.net.filter/Event";
89 pub(super) const CHANGE: &str = "fuchsia.net.filter/Change";
90 pub(super) const CHANGE_VALIDATION_ERROR: &str = "fuchsia.net.filter/ChangeValidationError";
91 pub(super) const CHANGE_VALIDATION_RESULT: &str = "fuchsia.net.filter/ChangeValidationResult";
92 pub(super) const COMMIT_ERROR: &str = "fuchsia.net.filter/CommitError";
93 pub(super) const COMMIT_RESULT: &str = "fuchsia.net.filter/CommitResult";
94 pub(super) const NET_INTERFACES_PORT_CLASS: &str = "fuchsia.net.interfaces/PortClass";
95 pub(super) const HARDWARE_NETWORK_PORT_CLASS: &str = "fuchsia.hardware.network/PortClass";
96}
97
98#[derive(Debug, Clone, PartialEq, Eq, Hash, Ord, PartialOrd)]
100pub struct NamespaceId(pub String);
101
102#[derive(Debug, Clone, PartialEq, Eq, Hash)]
104pub struct RoutineId {
105 pub namespace: NamespaceId,
106 pub name: String,
107}
108
109impl From<fnet_filter::RoutineId> for RoutineId {
110 fn from(id: fnet_filter::RoutineId) -> Self {
111 let fnet_filter::RoutineId { namespace, name } = id;
112 Self { namespace: NamespaceId(namespace), name }
113 }
114}
115
116impl From<RoutineId> for fnet_filter::RoutineId {
117 fn from(id: RoutineId) -> Self {
118 let RoutineId { namespace, name } = id;
119 let NamespaceId(namespace) = namespace;
120 Self { namespace, name }
121 }
122}
123
124#[derive(Debug, Clone, PartialEq, Eq, Hash)]
126pub struct RuleId {
127 pub routine: RoutineId,
128 pub index: u32,
129}
130
131impl From<fnet_filter::RuleId> for RuleId {
132 fn from(id: fnet_filter::RuleId) -> Self {
133 let fnet_filter::RuleId { routine, index } = id;
134 Self { routine: routine.into(), index }
135 }
136}
137
138impl From<RuleId> for fnet_filter::RuleId {
139 fn from(id: RuleId) -> Self {
140 let RuleId { routine, index } = id;
141 Self { routine: routine.into(), index }
142 }
143}
144
145#[derive(Debug, Clone, PartialEq, Eq, Hash)]
147pub enum ResourceId {
148 Namespace(NamespaceId),
149 Routine(RoutineId),
150 Rule(RuleId),
151}
152
153impl TryFrom<fnet_filter::ResourceId> for ResourceId {
154 type Error = FidlConversionError;
155
156 fn try_from(id: fnet_filter::ResourceId) -> Result<Self, Self::Error> {
157 match id {
158 fnet_filter::ResourceId::Namespace(id) => Ok(Self::Namespace(NamespaceId(id))),
159 fnet_filter::ResourceId::Routine(id) => Ok(Self::Routine(id.into())),
160 fnet_filter::ResourceId::Rule(id) => Ok(Self::Rule(id.into())),
161 fnet_filter::ResourceId::__SourceBreaking { .. } => {
162 Err(FidlConversionError::UnknownUnionVariant(type_names::RESOURCE_ID))
163 }
164 }
165 }
166}
167
168impl From<ResourceId> for fnet_filter::ResourceId {
169 fn from(id: ResourceId) -> Self {
170 match id {
171 ResourceId::Namespace(NamespaceId(id)) => fnet_filter::ResourceId::Namespace(id),
172 ResourceId::Routine(id) => fnet_filter::ResourceId::Routine(id.into()),
173 ResourceId::Rule(id) => fnet_filter::ResourceId::Rule(id.into()),
174 }
175 }
176}
177
178#[derive(Debug, Clone, PartialEq)]
180pub enum Domain {
181 Ipv4,
182 Ipv6,
183 AllIp,
184}
185
186impl From<Domain> for fnet_filter::Domain {
187 fn from(domain: Domain) -> Self {
188 match domain {
189 Domain::Ipv4 => fnet_filter::Domain::Ipv4,
190 Domain::Ipv6 => fnet_filter::Domain::Ipv6,
191 Domain::AllIp => fnet_filter::Domain::AllIp,
192 }
193 }
194}
195
196impl TryFrom<fnet_filter::Domain> for Domain {
197 type Error = FidlConversionError;
198
199 fn try_from(domain: fnet_filter::Domain) -> Result<Self, Self::Error> {
200 match domain {
201 fnet_filter::Domain::Ipv4 => Ok(Self::Ipv4),
202 fnet_filter::Domain::Ipv6 => Ok(Self::Ipv6),
203 fnet_filter::Domain::AllIp => Ok(Self::AllIp),
204 fnet_filter::Domain::__SourceBreaking { .. } => {
205 Err(FidlConversionError::UnknownUnionVariant(type_names::DOMAIN))
206 }
207 }
208 }
209}
210
211#[derive(Debug, Clone, PartialEq)]
213pub struct Namespace {
214 pub id: NamespaceId,
215 pub domain: Domain,
216}
217
218impl From<Namespace> for fnet_filter::Namespace {
219 fn from(namespace: Namespace) -> Self {
220 let Namespace { id, domain } = namespace;
221 let NamespaceId(id) = id;
222 Self { id: Some(id), domain: Some(domain.into()), __source_breaking: SourceBreaking }
223 }
224}
225
226impl TryFrom<fnet_filter::Namespace> for Namespace {
227 type Error = FidlConversionError;
228
229 fn try_from(namespace: fnet_filter::Namespace) -> Result<Self, Self::Error> {
230 let fnet_filter::Namespace { id, domain, __source_breaking } = namespace;
231 let id = NamespaceId(id.ok_or(FidlConversionError::MissingNamespaceId)?);
232 let domain = domain.ok_or(FidlConversionError::MissingNamespaceDomain)?.try_into()?;
233 Ok(Self { id, domain })
234 }
235}
236
237#[derive(Debug, Clone, Copy, PartialEq)]
239pub enum IpHook {
240 Ingress,
241 LocalIngress,
242 Forwarding,
243 LocalEgress,
244 Egress,
245}
246
247impl From<IpHook> for fnet_filter::IpInstallationHook {
248 fn from(hook: IpHook) -> Self {
249 match hook {
250 IpHook::Ingress => Self::Ingress,
251 IpHook::LocalIngress => Self::LocalIngress,
252 IpHook::Forwarding => Self::Forwarding,
253 IpHook::LocalEgress => Self::LocalEgress,
254 IpHook::Egress => Self::Egress,
255 }
256 }
257}
258
259impl TryFrom<fnet_filter::IpInstallationHook> for IpHook {
260 type Error = FidlConversionError;
261
262 fn try_from(hook: fnet_filter::IpInstallationHook) -> Result<Self, Self::Error> {
263 match hook {
264 fnet_filter::IpInstallationHook::Ingress => Ok(Self::Ingress),
265 fnet_filter::IpInstallationHook::LocalIngress => Ok(Self::LocalIngress),
266 fnet_filter::IpInstallationHook::Forwarding => Ok(Self::Forwarding),
267 fnet_filter::IpInstallationHook::LocalEgress => Ok(Self::LocalEgress),
268 fnet_filter::IpInstallationHook::Egress => Ok(Self::Egress),
269 fnet_filter::IpInstallationHook::__SourceBreaking { .. } => {
270 Err(FidlConversionError::UnknownUnionVariant(type_names::IP_INSTALLATION_HOOK))
271 }
272 }
273 }
274}
275
276#[derive(Debug, Clone, Copy, PartialEq)]
278pub enum NatHook {
279 Ingress,
280 LocalIngress,
281 LocalEgress,
282 Egress,
283}
284
285impl From<NatHook> for fnet_filter::NatInstallationHook {
286 fn from(hook: NatHook) -> Self {
287 match hook {
288 NatHook::Ingress => Self::Ingress,
289 NatHook::LocalIngress => Self::LocalIngress,
290 NatHook::LocalEgress => Self::LocalEgress,
291 NatHook::Egress => Self::Egress,
292 }
293 }
294}
295
296impl TryFrom<fnet_filter::NatInstallationHook> for NatHook {
297 type Error = FidlConversionError;
298
299 fn try_from(hook: fnet_filter::NatInstallationHook) -> Result<Self, Self::Error> {
300 match hook {
301 fnet_filter::NatInstallationHook::Ingress => Ok(Self::Ingress),
302 fnet_filter::NatInstallationHook::LocalIngress => Ok(Self::LocalIngress),
303 fnet_filter::NatInstallationHook::LocalEgress => Ok(Self::LocalEgress),
304 fnet_filter::NatInstallationHook::Egress => Ok(Self::Egress),
305 fnet_filter::NatInstallationHook::__SourceBreaking { .. } => {
306 Err(FidlConversionError::UnknownUnionVariant(type_names::NAT_INSTALLATION_HOOK))
307 }
308 }
309 }
310}
311
312#[derive(Debug, Clone, PartialEq)]
314pub struct InstalledIpRoutine {
315 pub hook: IpHook,
316 pub priority: i32,
317}
318
319impl From<InstalledIpRoutine> for fnet_filter::InstalledIpRoutine {
320 fn from(routine: InstalledIpRoutine) -> Self {
321 let InstalledIpRoutine { hook, priority } = routine;
322 Self {
323 hook: Some(hook.into()),
324 priority: Some(priority),
325 __source_breaking: SourceBreaking,
326 }
327 }
328}
329
330impl TryFrom<fnet_filter::InstalledIpRoutine> for InstalledIpRoutine {
331 type Error = FidlConversionError;
332
333 fn try_from(routine: fnet_filter::InstalledIpRoutine) -> Result<Self, Self::Error> {
334 let fnet_filter::InstalledIpRoutine { hook, priority, __source_breaking } = routine;
335 let hook = hook.ok_or(FidlConversionError::MissingIpInstallationHook)?;
336 let priority = priority.unwrap_or(fnet_filter::DEFAULT_ROUTINE_PRIORITY);
337 Ok(Self { hook: hook.try_into()?, priority })
338 }
339}
340
341#[derive(Debug, Clone, PartialEq)]
343pub struct InstalledNatRoutine {
344 pub hook: NatHook,
345 pub priority: i32,
346}
347
348impl From<InstalledNatRoutine> for fnet_filter::InstalledNatRoutine {
349 fn from(routine: InstalledNatRoutine) -> Self {
350 let InstalledNatRoutine { hook, priority } = routine;
351 Self {
352 hook: Some(hook.into()),
353 priority: Some(priority),
354 __source_breaking: SourceBreaking,
355 }
356 }
357}
358
359impl TryFrom<fnet_filter::InstalledNatRoutine> for InstalledNatRoutine {
360 type Error = FidlConversionError;
361
362 fn try_from(routine: fnet_filter::InstalledNatRoutine) -> Result<Self, Self::Error> {
363 let fnet_filter::InstalledNatRoutine { hook, priority, __source_breaking } = routine;
364 let hook = hook.ok_or(FidlConversionError::MissingNatInstallationHook)?;
365 let priority = priority.unwrap_or(fnet_filter::DEFAULT_ROUTINE_PRIORITY);
366 Ok(Self { hook: hook.try_into()?, priority })
367 }
368}
369
370#[derive(Debug, Clone, PartialEq)]
372pub enum RoutineType {
373 Ip(Option<InstalledIpRoutine>),
374 Nat(Option<InstalledNatRoutine>),
375}
376
377impl RoutineType {
378 pub fn is_installed(&self) -> bool {
379 match self {
382 Self::Ip(Some(_)) | Self::Nat(Some(_)) => true,
383 Self::Ip(None) | Self::Nat(None) => false,
384 }
385 }
386}
387
388impl From<RoutineType> for fnet_filter::RoutineType {
389 fn from(routine: RoutineType) -> Self {
390 match routine {
391 RoutineType::Ip(installation) => Self::Ip(fnet_filter::IpRoutine {
392 installation: installation.map(Into::into),
393 __source_breaking: SourceBreaking,
394 }),
395 RoutineType::Nat(installation) => Self::Nat(fnet_filter::NatRoutine {
396 installation: installation.map(Into::into),
397 __source_breaking: SourceBreaking,
398 }),
399 }
400 }
401}
402
403impl TryFrom<fnet_filter::RoutineType> for RoutineType {
404 type Error = FidlConversionError;
405
406 fn try_from(type_: fnet_filter::RoutineType) -> Result<Self, Self::Error> {
407 match type_ {
408 fnet_filter::RoutineType::Ip(fnet_filter::IpRoutine {
409 installation,
410 __source_breaking,
411 }) => Ok(RoutineType::Ip(installation.map(TryInto::try_into).transpose()?)),
412 fnet_filter::RoutineType::Nat(fnet_filter::NatRoutine {
413 installation,
414 __source_breaking,
415 }) => Ok(RoutineType::Nat(installation.map(TryInto::try_into).transpose()?)),
416 fnet_filter::RoutineType::__SourceBreaking { .. } => {
417 Err(FidlConversionError::UnknownUnionVariant(type_names::ROUTINE_TYPE))
418 }
419 }
420 }
421}
422
423#[derive(Debug, Clone, PartialEq)]
425pub struct Routine {
426 pub id: RoutineId,
427 pub routine_type: RoutineType,
428}
429
430impl From<Routine> for fnet_filter::Routine {
431 fn from(routine: Routine) -> Self {
432 let Routine { id, routine_type: type_ } = routine;
433 Self { id: Some(id.into()), type_: Some(type_.into()), __source_breaking: SourceBreaking }
434 }
435}
436
437impl TryFrom<fnet_filter::Routine> for Routine {
438 type Error = FidlConversionError;
439
440 fn try_from(routine: fnet_filter::Routine) -> Result<Self, Self::Error> {
441 let fnet_filter::Routine { id, type_, __source_breaking } = routine;
442 let id = id.ok_or(FidlConversionError::MissingRoutineId)?;
443 let type_ = type_.ok_or(FidlConversionError::MissingRoutineType)?;
444 Ok(Self { id: id.into(), routine_type: type_.try_into()? })
445 }
446}
447
448#[derive(Debug, Clone, PartialEq)]
450pub enum InterfaceMatcher {
451 Id(NonZeroU64),
452 Name(fnet_interfaces::Name),
453 PortClass(fnet_interfaces_ext::PortClass),
454}
455
456impl From<InterfaceMatcher> for fnet_filter::InterfaceMatcher {
457 fn from(matcher: InterfaceMatcher) -> Self {
458 match matcher {
459 InterfaceMatcher::Id(id) => Self::Id(id.get()),
460 InterfaceMatcher::Name(name) => Self::Name(name),
461 InterfaceMatcher::PortClass(port_class) => Self::PortClass(port_class.into()),
462 }
463 }
464}
465
466impl TryFrom<fnet_filter::InterfaceMatcher> for InterfaceMatcher {
467 type Error = FidlConversionError;
468
469 fn try_from(matcher: fnet_filter::InterfaceMatcher) -> Result<Self, Self::Error> {
470 match matcher {
471 fnet_filter::InterfaceMatcher::Id(id) => {
472 let id = NonZeroU64::new(id).ok_or(FidlConversionError::ZeroInterfaceId)?;
473 Ok(Self::Id(id))
474 }
475 fnet_filter::InterfaceMatcher::Name(name) => Ok(Self::Name(name)),
476 fnet_filter::InterfaceMatcher::PortClass(port_class) => {
477 port_class.try_into().map(Self::PortClass).map_err(|e| match e {
478 fnet_interfaces_ext::UnknownPortClassError::NetInterfaces(_) => {
479 FidlConversionError::UnknownUnionVariant(
480 type_names::NET_INTERFACES_PORT_CLASS,
481 )
482 }
483 fnet_interfaces_ext::UnknownPortClassError::HardwareNetwork(_) => {
484 FidlConversionError::UnknownUnionVariant(
485 type_names::HARDWARE_NETWORK_PORT_CLASS,
486 )
487 }
488 })
489 }
490 fnet_filter::InterfaceMatcher::__SourceBreaking { .. } => {
491 Err(FidlConversionError::UnknownUnionVariant(type_names::INTERFACE_MATCHER))
492 }
493 }
494 }
495}
496
497#[derive(Clone, Copy, Eq, Hash, PartialEq)]
503pub struct Subnet(fnet::Subnet);
504
505impl Subnet {
506 pub fn get(&self) -> fnet::Subnet {
507 let Subnet(subnet) = &self;
508 *subnet
509 }
510}
511
512impl From<Subnet> for fnet::Subnet {
513 fn from(subnet: Subnet) -> Self {
514 let Subnet(subnet) = subnet;
515 subnet
516 }
517}
518
519impl TryFrom<fnet::Subnet> for Subnet {
520 type Error = FidlConversionError;
521
522 fn try_from(subnet: fnet::Subnet) -> Result<Self, Self::Error> {
523 let fnet::Subnet { addr, prefix_len } = subnet;
524
525 let result = match addr {
530 fnet::IpAddress::Ipv4(v4) => {
531 net_types::ip::Subnet::<net_types::ip::Ipv4Addr>::new(v4.into_ext(), prefix_len)
532 .map(|_| Subnet(subnet))
533 }
534 fnet::IpAddress::Ipv6(v6) => {
535 net_types::ip::Subnet::<net_types::ip::Ipv6Addr>::new(v6.into_ext(), prefix_len)
536 .map(|_| Subnet(subnet))
537 }
538 };
539 result.map_err(|e| match e {
540 net_types::ip::SubnetError::PrefixTooLong => FidlConversionError::SubnetPrefixTooLong,
541 net_types::ip::SubnetError::HostBitsSet => FidlConversionError::SubnetHostBitsSet,
542 })
543 }
544}
545
546impl Debug for Subnet {
547 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
548 let fnet::Subnet { addr, prefix_len } = self.0;
549
550 match addr {
551 fnet::IpAddress::Ipv4(v4) => {
552 let subnet = net_types::ip::Subnet::<net_types::ip::Ipv4Addr>::new(
553 v4.into_ext(),
554 prefix_len,
555 );
556
557 match subnet {
558 Ok(inner) => inner.fmt(f),
559 Err(err) => err.fmt(f),
560 }
561 }
562 fnet::IpAddress::Ipv6(v6) => {
563 let subnet = net_types::ip::Subnet::<net_types::ip::Ipv6Addr>::new(
564 v6.into_ext(),
565 prefix_len,
566 );
567
568 match subnet {
569 Ok(inner) => inner.fmt(f),
570 Err(err) => err.fmt(f),
571 }
572 }
573 }
574 }
575}
576
577#[derive(Debug, Clone, PartialEq)]
583pub struct AddressRange {
584 range: RangeInclusive<fnet::IpAddress>,
585}
586
587impl AddressRange {
588 pub fn start(&self) -> fnet::IpAddress {
589 *self.range.start()
590 }
591
592 pub fn end(&self) -> fnet::IpAddress {
593 *self.range.end()
594 }
595}
596
597impl From<AddressRange> for fnet_filter::AddressRange {
598 fn from(range: AddressRange) -> Self {
599 Self { start: range.start(), end: range.end() }
600 }
601}
602
603impl TryFrom<fnet_filter::AddressRange> for AddressRange {
604 type Error = FidlConversionError;
605
606 fn try_from(range: fnet_filter::AddressRange) -> Result<Self, Self::Error> {
607 let fnet_filter::AddressRange { start, end } = range;
608 match (start, end) {
609 (
610 fnet::IpAddress::Ipv4(fnet::Ipv4Address { addr: start_bytes }),
611 fnet::IpAddress::Ipv4(fnet::Ipv4Address { addr: end_bytes }),
612 ) => {
613 if u32::from_be_bytes(start_bytes) > u32::from_be_bytes(end_bytes) {
614 Err(FidlConversionError::InvalidAddressRange)
615 } else {
616 Ok(Self { range: start..=end })
617 }
618 }
619 (
620 fnet::IpAddress::Ipv6(fnet::Ipv6Address { addr: start_bytes }),
621 fnet::IpAddress::Ipv6(fnet::Ipv6Address { addr: end_bytes }),
622 ) => {
623 if u128::from_be_bytes(start_bytes) > u128::from_be_bytes(end_bytes) {
624 Err(FidlConversionError::InvalidAddressRange)
625 } else {
626 Ok(Self { range: start..=end })
627 }
628 }
629 _ => Err(FidlConversionError::AddressRangeFamilyMismatch),
630 }
631 }
632}
633
634#[derive(Clone, PartialEq)]
636pub enum AddressMatcherType {
637 Subnet(Subnet),
638 Range(AddressRange),
639}
640
641impl From<AddressMatcherType> for fnet_filter::AddressMatcherType {
642 fn from(matcher: AddressMatcherType) -> Self {
643 match matcher {
644 AddressMatcherType::Subnet(subnet) => Self::Subnet(subnet.into()),
645 AddressMatcherType::Range(range) => Self::Range(range.into()),
646 }
647 }
648}
649
650impl TryFrom<fnet_filter::AddressMatcherType> for AddressMatcherType {
651 type Error = FidlConversionError;
652
653 fn try_from(matcher: fnet_filter::AddressMatcherType) -> Result<Self, Self::Error> {
654 match matcher {
655 fnet_filter::AddressMatcherType::Subnet(subnet) => Ok(Self::Subnet(subnet.try_into()?)),
656 fnet_filter::AddressMatcherType::Range(range) => Ok(Self::Range(range.try_into()?)),
657 fnet_filter::AddressMatcherType::__SourceBreaking { .. } => {
658 Err(FidlConversionError::UnknownUnionVariant(type_names::ADDRESS_MATCHER_TYPE))
659 }
660 }
661 }
662}
663
664impl Debug for AddressMatcherType {
665 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
666 match self {
667 AddressMatcherType::Subnet(subnet) => subnet.fmt(f),
668 AddressMatcherType::Range(address_range) => address_range.fmt(f),
669 }
670 }
671}
672
673#[derive(Debug, Clone, PartialEq)]
675pub struct AddressMatcher {
676 pub matcher: AddressMatcherType,
677 pub invert: bool,
678}
679
680impl From<AddressMatcher> for fnet_filter::AddressMatcher {
681 fn from(matcher: AddressMatcher) -> Self {
682 let AddressMatcher { matcher, invert } = matcher;
683 Self { matcher: matcher.into(), invert }
684 }
685}
686
687impl TryFrom<fnet_filter::AddressMatcher> for AddressMatcher {
688 type Error = FidlConversionError;
689
690 fn try_from(matcher: fnet_filter::AddressMatcher) -> Result<Self, Self::Error> {
691 let fnet_filter::AddressMatcher { matcher, invert } = matcher;
692 Ok(Self { matcher: matcher.try_into()?, invert })
693 }
694}
695
696#[derive(Debug, Clone, PartialEq)]
700pub struct PortMatcher {
701 range: RangeInclusive<u16>,
702 pub invert: bool,
703}
704
705#[derive(Debug, Error, PartialEq)]
707pub enum PortMatcherError {
708 #[error("invalid port range (start must be <= end)")]
709 InvalidPortRange,
710}
711
712impl PortMatcher {
713 pub fn new(start: u16, end: u16, invert: bool) -> Result<Self, PortMatcherError> {
714 if start > end {
715 return Err(PortMatcherError::InvalidPortRange);
716 }
717 Ok(Self { range: start..=end, invert })
718 }
719
720 pub fn range(&self) -> &RangeInclusive<u16> {
721 &self.range
722 }
723
724 pub fn start(&self) -> u16 {
725 *self.range.start()
726 }
727
728 pub fn end(&self) -> u16 {
729 *self.range.end()
730 }
731}
732
733impl From<PortMatcher> for fnet_filter::PortMatcher {
734 fn from(matcher: PortMatcher) -> Self {
735 let PortMatcher { range, invert } = matcher;
736 Self { start: *range.start(), end: *range.end(), invert }
737 }
738}
739
740impl TryFrom<fnet_filter::PortMatcher> for PortMatcher {
741 type Error = FidlConversionError;
742
743 fn try_from(matcher: fnet_filter::PortMatcher) -> Result<Self, Self::Error> {
744 let fnet_filter::PortMatcher { start, end, invert } = matcher;
745 if start > end {
746 return Err(FidlConversionError::InvalidPortMatcherRange);
747 }
748 Ok(Self { range: start..=end, invert })
749 }
750}
751
752#[derive(Clone, PartialEq)]
754pub enum TransportProtocolMatcher {
755 Tcp { src_port: Option<PortMatcher>, dst_port: Option<PortMatcher> },
756 Udp { src_port: Option<PortMatcher>, dst_port: Option<PortMatcher> },
757 Icmp,
758 Icmpv6,
759}
760
761impl From<TransportProtocolMatcher> for fnet_filter::TransportProtocol {
762 fn from(matcher: TransportProtocolMatcher) -> Self {
763 match matcher {
764 TransportProtocolMatcher::Tcp { src_port, dst_port } => {
765 Self::Tcp(fnet_filter::TcpMatcher {
766 src_port: src_port.map(Into::into),
767 dst_port: dst_port.map(Into::into),
768 __source_breaking: SourceBreaking,
769 })
770 }
771 TransportProtocolMatcher::Udp { src_port, dst_port } => {
772 Self::Udp(fnet_filter::UdpMatcher {
773 src_port: src_port.map(Into::into),
774 dst_port: dst_port.map(Into::into),
775 __source_breaking: SourceBreaking,
776 })
777 }
778 TransportProtocolMatcher::Icmp => Self::Icmp(fnet_filter::IcmpMatcher::default()),
779 TransportProtocolMatcher::Icmpv6 => Self::Icmpv6(fnet_filter::Icmpv6Matcher::default()),
780 }
781 }
782}
783
784impl TryFrom<fnet_filter::TransportProtocol> for TransportProtocolMatcher {
785 type Error = FidlConversionError;
786
787 fn try_from(matcher: fnet_filter::TransportProtocol) -> Result<Self, Self::Error> {
788 match matcher {
789 fnet_filter::TransportProtocol::Tcp(fnet_filter::TcpMatcher {
790 src_port,
791 dst_port,
792 __source_breaking,
793 }) => Ok(Self::Tcp {
794 src_port: src_port.map(TryInto::try_into).transpose()?,
795 dst_port: dst_port.map(TryInto::try_into).transpose()?,
796 }),
797 fnet_filter::TransportProtocol::Udp(fnet_filter::UdpMatcher {
798 src_port,
799 dst_port,
800 __source_breaking,
801 }) => Ok(Self::Udp {
802 src_port: src_port.map(TryInto::try_into).transpose()?,
803 dst_port: dst_port.map(TryInto::try_into).transpose()?,
804 }),
805 fnet_filter::TransportProtocol::Icmp(fnet_filter::IcmpMatcher {
806 __source_breaking,
807 }) => Ok(Self::Icmp),
808 fnet_filter::TransportProtocol::Icmpv6(fnet_filter::Icmpv6Matcher {
809 __source_breaking,
810 }) => Ok(Self::Icmpv6),
811 fnet_filter::TransportProtocol::__SourceBreaking { .. } => {
812 Err(FidlConversionError::UnknownUnionVariant(type_names::TRANSPORT_PROTOCOL))
813 }
814 }
815 }
816}
817
818impl Debug for TransportProtocolMatcher {
819 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
820 match self {
822 TransportProtocolMatcher::Tcp { src_port, dst_port } => {
823 let mut debug_struct = f.debug_struct("Tcp");
824
825 if let Some(port) = &src_port {
827 let _ = debug_struct.field("src_port", port);
828 }
829
830 if let Some(port) = &dst_port {
831 let _ = debug_struct.field("dst_port", port);
832 }
833
834 debug_struct.finish()
835 }
836 TransportProtocolMatcher::Udp { src_port, dst_port } => {
837 let mut debug_struct = f.debug_struct("Udp");
838
839 if let Some(port) = &src_port {
841 let _ = debug_struct.field("src_port", port);
842 }
843
844 if let Some(port) = &dst_port {
845 let _ = debug_struct.field("dst_port", port);
846 }
847
848 debug_struct.finish()
849 }
850 TransportProtocolMatcher::Icmp => f.write_str("Icmp"),
851 TransportProtocolMatcher::Icmpv6 => f.write_str("Icmpv6"),
852 }
853 }
854}
855
856#[derive(Default, Clone, PartialEq)]
858pub struct Matchers {
859 pub in_interface: Option<InterfaceMatcher>,
860 pub out_interface: Option<InterfaceMatcher>,
861 pub src_addr: Option<AddressMatcher>,
862 pub dst_addr: Option<AddressMatcher>,
863 pub transport_protocol: Option<TransportProtocolMatcher>,
864}
865
866impl From<Matchers> for fnet_filter::Matchers {
867 fn from(matchers: Matchers) -> Self {
868 let Matchers { in_interface, out_interface, src_addr, dst_addr, transport_protocol } =
869 matchers;
870 Self {
871 in_interface: in_interface.map(Into::into),
872 out_interface: out_interface.map(Into::into),
873 src_addr: src_addr.map(Into::into),
874 dst_addr: dst_addr.map(Into::into),
875 transport_protocol: transport_protocol.map(Into::into),
876 __source_breaking: SourceBreaking,
877 }
878 }
879}
880
881impl TryFrom<fnet_filter::Matchers> for Matchers {
882 type Error = FidlConversionError;
883
884 fn try_from(matchers: fnet_filter::Matchers) -> Result<Self, Self::Error> {
885 let fnet_filter::Matchers {
886 in_interface,
887 out_interface,
888 src_addr,
889 dst_addr,
890 transport_protocol,
891 __source_breaking,
892 } = matchers;
893 Ok(Self {
894 in_interface: in_interface.map(TryInto::try_into).transpose()?,
895 out_interface: out_interface.map(TryInto::try_into).transpose()?,
896 src_addr: src_addr.map(TryInto::try_into).transpose()?,
897 dst_addr: dst_addr.map(TryInto::try_into).transpose()?,
898 transport_protocol: transport_protocol.map(TryInto::try_into).transpose()?,
899 })
900 }
901}
902
903impl Debug for Matchers {
904 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
905 let mut debug_struct = f.debug_struct("Matchers");
906
907 let Matchers { in_interface, out_interface, src_addr, dst_addr, transport_protocol } =
908 &self;
909
910 if let Some(matcher) = in_interface {
912 let _ = debug_struct.field("in_interface", matcher);
913 }
914
915 if let Some(matcher) = out_interface {
916 let _ = debug_struct.field("out_interface", matcher);
917 }
918
919 if let Some(matcher) = src_addr {
920 let _ = debug_struct.field("src_addr", matcher);
921 }
922
923 if let Some(matcher) = dst_addr {
924 let _ = debug_struct.field("dst_addr", matcher);
925 }
926
927 if let Some(matcher) = transport_protocol {
928 let _ = debug_struct.field("transport_protocol", matcher);
929 }
930
931 debug_struct.finish()
932 }
933}
934
935#[derive(Debug, Clone, PartialEq)]
937pub enum Action {
938 Accept,
939 Drop,
940 Jump(String),
941 Return,
942 TransparentProxy(TransparentProxy),
943 Redirect { dst_port: Option<PortRange> },
944 Masquerade { src_port: Option<PortRange> },
945 Mark { domain: fnet::MarkDomain, action: MarkAction },
946}
947
948#[derive(Debug, Clone, PartialEq)]
949pub enum MarkAction {
950 SetMark { clearing_mask: fnet::Mark, mark: fnet::Mark },
951}
952
953#[derive(Debug, Clone, PartialEq)]
955pub enum TransparentProxy {
956 LocalAddr(fnet::IpAddress),
957 LocalPort(NonZeroU16),
958 LocalAddrAndPort(fnet::IpAddress, NonZeroU16),
959}
960
961#[derive(Debug, Clone, PartialEq)]
962pub struct PortRange(pub RangeInclusive<NonZeroU16>);
963
964impl From<PortRange> for fnet_filter::PortRange {
965 fn from(range: PortRange) -> Self {
966 let PortRange(range) = range;
967 Self { start: range.start().get(), end: range.end().get() }
968 }
969}
970
971impl TryFrom<fnet_filter::PortRange> for PortRange {
972 type Error = FidlConversionError;
973
974 fn try_from(range: fnet_filter::PortRange) -> Result<Self, Self::Error> {
975 let fnet_filter::PortRange { start, end } = range;
976 if start > end {
977 Err(FidlConversionError::InvalidPortRange)
978 } else {
979 let start = NonZeroU16::new(start).ok_or(FidlConversionError::UnspecifiedNatPort)?;
980 let end = NonZeroU16::new(end).ok_or(FidlConversionError::UnspecifiedNatPort)?;
981 Ok(Self(start..=end))
982 }
983 }
984}
985
986impl From<Action> for fnet_filter::Action {
987 fn from(action: Action) -> Self {
988 match action {
989 Action::Accept => Self::Accept(fnet_filter::Empty {}),
990 Action::Drop => Self::Drop(fnet_filter::Empty {}),
991 Action::Jump(target) => Self::Jump(target),
992 Action::Return => Self::Return_(fnet_filter::Empty {}),
993 Action::TransparentProxy(proxy) => Self::TransparentProxy(match proxy {
994 TransparentProxy::LocalAddr(addr) => {
995 fnet_filter::TransparentProxy_::LocalAddr(addr)
996 }
997 TransparentProxy::LocalPort(port) => {
998 fnet_filter::TransparentProxy_::LocalPort(port.get())
999 }
1000 TransparentProxy::LocalAddrAndPort(addr, port) => {
1001 fnet_filter::TransparentProxy_::LocalAddrAndPort(fnet_filter::SocketAddr {
1002 addr,
1003 port: port.get(),
1004 })
1005 }
1006 }),
1007 Action::Redirect { dst_port } => Self::Redirect(fnet_filter::Redirect {
1008 dst_port: dst_port.map(Into::into),
1009 __source_breaking: SourceBreaking,
1010 }),
1011 Action::Masquerade { src_port } => Self::Masquerade(fnet_filter::Masquerade {
1012 src_port: src_port.map(Into::into),
1013 __source_breaking: SourceBreaking,
1014 }),
1015 Action::Mark { domain, action } => {
1016 Self::Mark(fnet_filter::Mark { domain, action: action.into() })
1017 }
1018 }
1019 }
1020}
1021
1022impl TryFrom<fnet_filter::Action> for Action {
1023 type Error = FidlConversionError;
1024
1025 fn try_from(action: fnet_filter::Action) -> Result<Self, Self::Error> {
1026 match action {
1027 fnet_filter::Action::Accept(fnet_filter::Empty {}) => Ok(Self::Accept),
1028 fnet_filter::Action::Drop(fnet_filter::Empty {}) => Ok(Self::Drop),
1029 fnet_filter::Action::Jump(target) => Ok(Self::Jump(target)),
1030 fnet_filter::Action::Return_(fnet_filter::Empty {}) => Ok(Self::Return),
1031 fnet_filter::Action::TransparentProxy(proxy) => {
1032 Ok(Self::TransparentProxy(match proxy {
1033 fnet_filter::TransparentProxy_::LocalAddr(addr) => {
1034 TransparentProxy::LocalAddr(addr)
1035 }
1036 fnet_filter::TransparentProxy_::LocalPort(port) => {
1037 let port = NonZeroU16::new(port)
1038 .ok_or(FidlConversionError::UnspecifiedTransparentProxyPort)?;
1039 TransparentProxy::LocalPort(port)
1040 }
1041 fnet_filter::TransparentProxy_::LocalAddrAndPort(fnet_filter::SocketAddr {
1042 addr,
1043 port,
1044 }) => {
1045 let port = NonZeroU16::new(port)
1046 .ok_or(FidlConversionError::UnspecifiedTransparentProxyPort)?;
1047 TransparentProxy::LocalAddrAndPort(addr, port)
1048 }
1049 fnet_filter::TransparentProxy_::__SourceBreaking { .. } => {
1050 return Err(FidlConversionError::UnknownUnionVariant(
1051 type_names::TRANSPARENT_PROXY,
1052 ))
1053 }
1054 }))
1055 }
1056 fnet_filter::Action::Redirect(fnet_filter::Redirect {
1057 dst_port,
1058 __source_breaking,
1059 }) => Ok(Self::Redirect { dst_port: dst_port.map(TryInto::try_into).transpose()? }),
1060 fnet_filter::Action::Masquerade(fnet_filter::Masquerade {
1061 src_port,
1062 __source_breaking,
1063 }) => Ok(Self::Masquerade { src_port: src_port.map(TryInto::try_into).transpose()? }),
1064 fnet_filter::Action::Mark(fnet_filter::Mark { domain, action }) => {
1065 Ok(Self::Mark { domain, action: action.try_into()? })
1066 }
1067 fnet_filter::Action::__SourceBreaking { .. } => {
1068 Err(FidlConversionError::UnknownUnionVariant(type_names::ACTION))
1069 }
1070 }
1071 }
1072}
1073
1074impl From<MarkAction> for fnet_filter::MarkAction {
1075 fn from(action: MarkAction) -> Self {
1076 match action {
1077 MarkAction::SetMark { clearing_mask, mark } => {
1078 Self::SetMark(fnet_filter::SetMark { clearing_mask, mark })
1079 }
1080 }
1081 }
1082}
1083
1084impl TryFrom<fnet_filter::MarkAction> for MarkAction {
1085 type Error = FidlConversionError;
1086 fn try_from(action: fnet_filter::MarkAction) -> Result<Self, Self::Error> {
1087 match action {
1088 fnet_filter::MarkAction::SetMark(fnet_filter::SetMark { clearing_mask, mark }) => {
1089 Ok(Self::SetMark { clearing_mask, mark })
1090 }
1091 fnet_filter::MarkAction::__SourceBreaking { .. } => {
1092 Err(FidlConversionError::UnknownUnionVariant(type_names::MARK_ACTION))
1093 }
1094 }
1095 }
1096}
1097
1098#[derive(Debug, Clone, PartialEq)]
1100pub struct Rule {
1101 pub id: RuleId,
1102 pub matchers: Matchers,
1103 pub action: Action,
1104}
1105
1106impl From<Rule> for fnet_filter::Rule {
1107 fn from(rule: Rule) -> Self {
1108 let Rule { id, matchers, action } = rule;
1109 Self { id: id.into(), matchers: matchers.into(), action: action.into() }
1110 }
1111}
1112
1113impl TryFrom<fnet_filter::Rule> for Rule {
1114 type Error = FidlConversionError;
1115
1116 fn try_from(rule: fnet_filter::Rule) -> Result<Self, Self::Error> {
1117 let fnet_filter::Rule { id, matchers, action } = rule;
1118 Ok(Self { id: id.into(), matchers: matchers.try_into()?, action: action.try_into()? })
1119 }
1120}
1121
1122#[derive(Debug, Clone, PartialEq)]
1124pub enum Resource {
1125 Namespace(Namespace),
1126 Routine(Routine),
1127 Rule(Rule),
1128}
1129
1130impl Resource {
1131 pub fn id(&self) -> ResourceId {
1132 match self {
1133 Self::Namespace(Namespace { id, domain: _ }) => ResourceId::Namespace(id.clone()),
1134 Self::Routine(Routine { id, routine_type: _ }) => ResourceId::Routine(id.clone()),
1135 Self::Rule(Rule { id, matchers: _, action: _ }) => ResourceId::Rule(id.clone()),
1136 }
1137 }
1138}
1139
1140impl From<Resource> for fnet_filter::Resource {
1141 fn from(resource: Resource) -> Self {
1142 match resource {
1143 Resource::Namespace(namespace) => Self::Namespace(namespace.into()),
1144 Resource::Routine(routine) => Self::Routine(routine.into()),
1145 Resource::Rule(rule) => Self::Rule(rule.into()),
1146 }
1147 }
1148}
1149
1150impl TryFrom<fnet_filter::Resource> for Resource {
1151 type Error = FidlConversionError;
1152
1153 fn try_from(resource: fnet_filter::Resource) -> Result<Self, Self::Error> {
1154 match resource {
1155 fnet_filter::Resource::Namespace(namespace) => {
1156 Ok(Self::Namespace(namespace.try_into()?))
1157 }
1158 fnet_filter::Resource::Routine(routine) => Ok(Self::Routine(routine.try_into()?)),
1159 fnet_filter::Resource::Rule(rule) => Ok(Self::Rule(rule.try_into()?)),
1160 fnet_filter::Resource::__SourceBreaking { .. } => {
1161 Err(FidlConversionError::UnknownUnionVariant(type_names::RESOURCE))
1162 }
1163 }
1164 }
1165}
1166
1167#[derive(Debug, Clone, PartialEq, Eq, Hash, PartialOrd, Ord)]
1169pub struct ControllerId(pub String);
1170
1171#[derive(Debug, Clone, PartialEq)]
1173pub enum Event {
1174 Existing(ControllerId, Resource),
1175 Idle,
1176 Added(ControllerId, Resource),
1177 Removed(ControllerId, ResourceId),
1178 EndOfUpdate,
1179}
1180
1181impl From<Event> for fnet_filter::Event {
1182 fn from(event: Event) -> Self {
1183 match event {
1184 Event::Existing(controller, resource) => {
1185 let ControllerId(id) = controller;
1186 Self::Existing(fnet_filter::ExistingResource {
1187 controller: id,
1188 resource: resource.into(),
1189 })
1190 }
1191 Event::Idle => Self::Idle(fnet_filter::Empty {}),
1192 Event::Added(controller, resource) => {
1193 let ControllerId(id) = controller;
1194 Self::Added(fnet_filter::AddedResource {
1195 controller: id,
1196 resource: resource.into(),
1197 })
1198 }
1199 Event::Removed(controller, resource) => {
1200 let ControllerId(id) = controller;
1201 Self::Removed(fnet_filter::RemovedResource {
1202 controller: id,
1203 resource: resource.into(),
1204 })
1205 }
1206 Event::EndOfUpdate => Self::EndOfUpdate(fnet_filter::Empty {}),
1207 }
1208 }
1209}
1210
1211impl TryFrom<fnet_filter::Event> for Event {
1212 type Error = FidlConversionError;
1213
1214 fn try_from(event: fnet_filter::Event) -> Result<Self, Self::Error> {
1215 match event {
1216 fnet_filter::Event::Existing(fnet_filter::ExistingResource {
1217 controller,
1218 resource,
1219 }) => Ok(Self::Existing(ControllerId(controller), resource.try_into()?)),
1220 fnet_filter::Event::Idle(fnet_filter::Empty {}) => Ok(Self::Idle),
1221 fnet_filter::Event::Added(fnet_filter::AddedResource { controller, resource }) => {
1222 Ok(Self::Added(ControllerId(controller), resource.try_into()?))
1223 }
1224 fnet_filter::Event::Removed(fnet_filter::RemovedResource { controller, resource }) => {
1225 Ok(Self::Removed(ControllerId(controller), resource.try_into()?))
1226 }
1227 fnet_filter::Event::EndOfUpdate(fnet_filter::Empty {}) => Ok(Self::EndOfUpdate),
1228 fnet_filter::Event::__SourceBreaking { .. } => {
1229 Err(FidlConversionError::UnknownUnionVariant(type_names::EVENT))
1230 }
1231 }
1232 }
1233}
1234
1235#[derive(Debug, Error)]
1237pub enum WatcherCreationError {
1238 #[error("failed to create filter watcher proxy: {0}")]
1239 CreateProxy(fidl::Error),
1240 #[error("failed to get filter watcher: {0}")]
1241 GetWatcher(fidl::Error),
1242}
1243
1244#[derive(Debug, Error)]
1246pub enum WatchError {
1247 #[error("the call to `Watch()` failed: {0}")]
1249 Fidl(fidl::Error),
1250 #[error("failed to convert event returned by `Watch()`: {0}")]
1252 Conversion(FidlConversionError),
1253 #[error("the call to `Watch()` returned an empty batch of events")]
1255 EmptyEventBatch,
1256}
1257
1258pub fn event_stream_from_state(
1265 state: fnet_filter::StateProxy,
1266) -> Result<impl Stream<Item = Result<Event, WatchError>>, WatcherCreationError> {
1267 let (watcher, server_end) = fidl::endpoints::create_proxy::<fnet_filter::WatcherMarker>();
1268 state
1269 .get_watcher(&fnet_filter::WatcherOptions::default(), server_end)
1270 .map_err(WatcherCreationError::GetWatcher)?;
1271
1272 let stream = futures::stream::try_unfold(watcher, |watcher| async {
1273 let events = watcher.watch().await.map_err(WatchError::Fidl)?;
1274 if events.is_empty() {
1275 return Err(WatchError::EmptyEventBatch);
1276 }
1277
1278 let event_stream = futures::stream::iter(events).map(Ok).and_then(|event| {
1279 futures::future::ready(event.try_into().map_err(WatchError::Conversion))
1280 });
1281 Ok(Some((event_stream, watcher)))
1282 })
1283 .try_flatten();
1284
1285 Ok(stream)
1286}
1287
1288#[derive(Debug, Error)]
1290pub enum GetExistingResourcesError {
1291 #[error("there was an error in the event stream: {0}")]
1293 ErrorInStream(WatchError),
1294 #[error("there was an unexpected event in the event stream: {0:?}")]
1297 UnexpectedEvent(Event),
1298 #[error("a duplicate existing resource was reported")]
1300 DuplicateResource(Resource),
1301 #[error("the event stream unexpectedly ended")]
1303 StreamEnded,
1304}
1305
1306pub trait Update {
1309 fn add(&mut self, controller: ControllerId, resource: Resource) -> Option<Resource>;
1314
1315 fn remove(&mut self, controller: ControllerId, resource: &ResourceId) -> Option<Resource>;
1319}
1320
1321impl Update for HashMap<ControllerId, HashMap<ResourceId, Resource>> {
1322 fn add(&mut self, controller: ControllerId, resource: Resource) -> Option<Resource> {
1323 self.entry(controller).or_default().insert(resource.id(), resource)
1324 }
1325
1326 fn remove(&mut self, controller: ControllerId, resource: &ResourceId) -> Option<Resource> {
1327 self.get_mut(&controller)?.remove(resource)
1328 }
1329}
1330
1331pub async fn get_existing_resources<C: Update + Default>(
1334 stream: impl Stream<Item = Result<Event, WatchError>>,
1335) -> Result<C, GetExistingResourcesError> {
1336 async_utils::fold::fold_while(
1337 stream,
1338 Ok(C::default()),
1339 |resources: Result<C, GetExistingResourcesError>, event| {
1340 let mut resources =
1341 resources.expect("`resources` must be `Ok`, because we stop folding on err");
1342 futures::future::ready(match event {
1343 Err(e) => FoldWhile::Done(Err(GetExistingResourcesError::ErrorInStream(e))),
1344 Ok(e) => match e {
1345 Event::Existing(controller, resource) => {
1346 if let Some(resource) = resources.add(controller, resource) {
1347 FoldWhile::Done(Err(GetExistingResourcesError::DuplicateResource(
1348 resource,
1349 )))
1350 } else {
1351 FoldWhile::Continue(Ok(resources))
1352 }
1353 }
1354 Event::Idle => FoldWhile::Done(Ok(resources)),
1355 e @ (Event::Added(_, _) | Event::Removed(_, _) | Event::EndOfUpdate) => {
1356 FoldWhile::Done(Err(GetExistingResourcesError::UnexpectedEvent(e)))
1357 }
1358 },
1359 })
1360 },
1361 )
1362 .await
1363 .short_circuited()
1364 .map_err(|_resources| GetExistingResourcesError::StreamEnded)?
1365}
1366
1367#[derive(Debug, Error)]
1369pub enum WaitForConditionError {
1370 #[error("there was an error in the event stream: {0}")]
1372 ErrorInStream(WatchError),
1373 #[error("observed an added event for an already existing resource: {0:?}")]
1375 AddedAlreadyExisting(Resource),
1376 #[error("observed a removed event for a non-existent resource: {0:?}")]
1378 RemovedNonExistent(ResourceId),
1379 #[error("the event stream unexpectedly ended")]
1381 StreamEnded,
1382}
1383
1384pub async fn wait_for_condition<
1390 C: Update,
1391 S: Stream<Item = Result<Event, WatchError>>,
1392 F: Fn(&C) -> bool,
1393>(
1394 event_stream: S,
1395 initial_state: &mut C,
1396 predicate: F,
1397) -> Result<(), WaitForConditionError> {
1398 async_utils::fold::try_fold_while(
1399 event_stream.map_err(WaitForConditionError::ErrorInStream),
1400 initial_state,
1401 |resources: &mut C, event| {
1402 futures::future::ready(match event {
1403 Event::Existing(controller, resource) | Event::Added(controller, resource) => {
1404 if let Some(resource) = resources.add(controller, resource) {
1405 Err(WaitForConditionError::AddedAlreadyExisting(resource))
1406 } else {
1407 Ok(FoldWhile::Continue(resources))
1408 }
1409 }
1410 Event::Removed(controller, resource) => resources
1411 .remove(controller, &resource)
1412 .map(|_| FoldWhile::Continue(resources))
1413 .ok_or(WaitForConditionError::RemovedNonExistent(resource)),
1414 Event::Idle | Event::EndOfUpdate => {
1418 if predicate(&resources) {
1419 Ok(FoldWhile::Done(()))
1420 } else {
1421 Ok(FoldWhile::Continue(resources))
1422 }
1423 }
1424 })
1425 },
1426 )
1427 .await?
1428 .short_circuited()
1429 .map_err(|_resources: &mut C| WaitForConditionError::StreamEnded)
1430}
1431
1432#[derive(Debug, Error)]
1434pub enum ControllerCreationError {
1435 #[error("failed to create namespace controller proxy: {0}")]
1436 CreateProxy(fidl::Error),
1437 #[error("failed to open namespace controller: {0}")]
1438 OpenController(fidl::Error),
1439 #[error("server did not emit OnIdAssigned event")]
1440 NoIdAssigned,
1441 #[error("failed to observe ID assignment event: {0}")]
1442 IdAssignment(fidl::Error),
1443}
1444
1445#[derive(Debug, Error, PartialEq)]
1449pub enum ChangeValidationError {
1450 #[error("change contains a resource that is missing a required field")]
1451 MissingRequiredField,
1452 #[error("rule specifies an invalid interface matcher")]
1453 InvalidInterfaceMatcher,
1454 #[error("rule specifies an invalid address matcher")]
1455 InvalidAddressMatcher,
1456 #[error("rule specifies an invalid port matcher")]
1457 InvalidPortMatcher,
1458 #[error("rule specifies an invalid transparent proxy action")]
1459 InvalidTransparentProxyAction,
1460 #[error("rule specifies an invalid NAT action")]
1461 InvalidNatAction,
1462 #[error("rule specifies an invalid port range")]
1463 InvalidPortRange,
1464}
1465
1466impl TryFrom<fnet_filter::ChangeValidationError> for ChangeValidationError {
1467 type Error = FidlConversionError;
1468
1469 fn try_from(error: fnet_filter::ChangeValidationError) -> Result<Self, Self::Error> {
1470 match error {
1471 fnet_filter::ChangeValidationError::MissingRequiredField => {
1472 Ok(Self::MissingRequiredField)
1473 }
1474 fnet_filter::ChangeValidationError::InvalidInterfaceMatcher => {
1475 Ok(Self::InvalidInterfaceMatcher)
1476 }
1477 fnet_filter::ChangeValidationError::InvalidAddressMatcher => {
1478 Ok(Self::InvalidAddressMatcher)
1479 }
1480 fnet_filter::ChangeValidationError::InvalidPortMatcher => Ok(Self::InvalidPortMatcher),
1481 fnet_filter::ChangeValidationError::InvalidTransparentProxyAction => {
1482 Ok(Self::InvalidTransparentProxyAction)
1483 }
1484 fnet_filter::ChangeValidationError::InvalidNatAction => Ok(Self::InvalidNatAction),
1485 fnet_filter::ChangeValidationError::InvalidPortRange => Ok(Self::InvalidPortRange),
1486 fnet_filter::ChangeValidationError::Ok
1487 | fnet_filter::ChangeValidationError::NotReached => {
1488 Err(FidlConversionError::NotAnError)
1489 }
1490 fnet_filter::ChangeValidationError::__SourceBreaking { unknown_ordinal: _ } => {
1491 Err(FidlConversionError::UnknownUnionVariant(type_names::CHANGE_VALIDATION_ERROR))
1492 }
1493 }
1494 }
1495}
1496
1497#[derive(Debug, Error)]
1499pub enum PushChangesError {
1500 #[error("failed to call FIDL method: {0}")]
1501 CallMethod(fidl::Error),
1502 #[error("too many changes were pushed to the server")]
1503 TooManyChanges,
1504 #[error("invalid change(s) pushed: {0:?}")]
1505 ErrorOnChange(Vec<(Change, ChangeValidationError)>),
1506 #[error("unknown FIDL type: {0}")]
1507 FidlConversion(#[from] FidlConversionError),
1508}
1509
1510#[derive(Debug, Error, PartialEq)]
1514pub enum ChangeCommitError {
1515 #[error("the change referred to an unknown namespace")]
1516 NamespaceNotFound,
1517 #[error("the change referred to an unknown routine")]
1518 RoutineNotFound,
1519 #[error("the change referred to an unknown rule")]
1520 RuleNotFound,
1521 #[error("the specified resource already exists")]
1522 AlreadyExists,
1523 #[error("the change includes a rule that jumps to an installed routine")]
1524 TargetRoutineIsInstalled,
1525}
1526
1527impl TryFrom<fnet_filter::CommitError> for ChangeCommitError {
1528 type Error = FidlConversionError;
1529
1530 fn try_from(error: fnet_filter::CommitError) -> Result<Self, Self::Error> {
1531 match error {
1532 fnet_filter::CommitError::NamespaceNotFound => Ok(Self::NamespaceNotFound),
1533 fnet_filter::CommitError::RoutineNotFound => Ok(Self::RoutineNotFound),
1534 fnet_filter::CommitError::RuleNotFound => Ok(Self::RuleNotFound),
1535 fnet_filter::CommitError::AlreadyExists => Ok(Self::AlreadyExists),
1536 fnet_filter::CommitError::TargetRoutineIsInstalled => {
1537 Ok(Self::TargetRoutineIsInstalled)
1538 }
1539 fnet_filter::CommitError::Ok | fnet_filter::CommitError::NotReached => {
1540 Err(FidlConversionError::NotAnError)
1541 }
1542 fnet_filter::CommitError::__SourceBreaking { unknown_ordinal: _ } => {
1543 Err(FidlConversionError::UnknownUnionVariant(type_names::COMMIT_ERROR))
1544 }
1545 }
1546 }
1547}
1548
1549#[derive(Debug, Error)]
1551pub enum CommitError {
1552 #[error("failed to call FIDL method: {0}")]
1553 CallMethod(fidl::Error),
1554 #[error("rule has a matcher that is unavailable in its context: {0:?}")]
1555 RuleWithInvalidMatcher(RuleId),
1556 #[error("rule has an action that is invalid for its routine: {0:?}")]
1557 RuleWithInvalidAction(RuleId),
1558 #[error(
1559 "rule has a TransparentProxy action but not a valid transport protocol matcher: {0:?}"
1560 )]
1561 TransparentProxyWithInvalidMatcher(RuleId),
1562 #[error(
1563 "rule has a Redirect action that specifies a destination port but not a valid transport \
1564 protocol matcher: {0:?}"
1565 )]
1566 RedirectWithInvalidMatcher(RuleId),
1567 #[error(
1568 "rule has a Masquerade action that specifies a source port but not a valid transport \
1569 protocol matcher: {0:?}"
1570 )]
1571 MasqueradeWithInvalidMatcher(RuleId),
1572 #[error("routine forms a cycle {0:?}")]
1573 CyclicalRoutineGraph(RoutineId),
1574 #[error("invalid change was pushed: {0:?}")]
1575 ErrorOnChange(Vec<(Change, ChangeCommitError)>),
1576 #[error("unknown FIDL type: {0}")]
1577 FidlConversion(#[from] FidlConversionError),
1578}
1579
1580#[derive(Debug, Clone, PartialEq)]
1582pub enum Change {
1583 Create(Resource),
1584 Remove(ResourceId),
1585}
1586
1587impl From<Change> for fnet_filter::Change {
1588 fn from(change: Change) -> Self {
1589 match change {
1590 Change::Create(resource) => Self::Create(resource.into()),
1591 Change::Remove(resource) => Self::Remove(resource.into()),
1592 }
1593 }
1594}
1595
1596impl TryFrom<fnet_filter::Change> for Change {
1597 type Error = FidlConversionError;
1598
1599 fn try_from(change: fnet_filter::Change) -> Result<Self, Self::Error> {
1600 match change {
1601 fnet_filter::Change::Create(resource) => Ok(Self::Create(resource.try_into()?)),
1602 fnet_filter::Change::Remove(resource) => Ok(Self::Remove(resource.try_into()?)),
1603 fnet_filter::Change::__SourceBreaking { .. } => {
1604 Err(FidlConversionError::UnknownUnionVariant(type_names::CHANGE))
1605 }
1606 }
1607 }
1608}
1609
1610pub struct Controller {
1612 controller: fnet_filter::NamespaceControllerProxy,
1613 id: ControllerId,
1617 pending_changes: Vec<Change>,
1621}
1622
1623impl Controller {
1624 pub async fn new_root(
1625 root: &fnet_root::FilterProxy,
1626 ControllerId(id): &ControllerId,
1627 ) -> Result<Self, ControllerCreationError> {
1628 let (controller, server_end) = fidl::endpoints::create_proxy();
1629 root.open_controller(id, server_end).map_err(ControllerCreationError::OpenController)?;
1630
1631 let fnet_filter::NamespaceControllerEvent::OnIdAssigned { id } = controller
1632 .take_event_stream()
1633 .next()
1634 .await
1635 .ok_or(ControllerCreationError::NoIdAssigned)?
1636 .map_err(ControllerCreationError::IdAssignment)?;
1637 Ok(Self { controller, id: ControllerId(id), pending_changes: Vec::new() })
1638 }
1639
1640 pub async fn new(
1646 control: &fnet_filter::ControlProxy,
1647 ControllerId(id): &ControllerId,
1648 ) -> Result<Self, ControllerCreationError> {
1649 let (controller, server_end) = fidl::endpoints::create_proxy();
1650 control.open_controller(id, server_end).map_err(ControllerCreationError::OpenController)?;
1651
1652 let fnet_filter::NamespaceControllerEvent::OnIdAssigned { id } = controller
1653 .take_event_stream()
1654 .next()
1655 .await
1656 .ok_or(ControllerCreationError::NoIdAssigned)?
1657 .map_err(ControllerCreationError::IdAssignment)?;
1658 Ok(Self { controller, id: ControllerId(id), pending_changes: Vec::new() })
1659 }
1660
1661 pub fn id(&self) -> &ControllerId {
1662 &self.id
1663 }
1664
1665 pub async fn push_changes(&mut self, changes: Vec<Change>) -> Result<(), PushChangesError> {
1666 let fidl_changes = changes.iter().cloned().map(Into::into).collect::<Vec<_>>();
1667 let result = self
1668 .controller
1669 .push_changes(&fidl_changes)
1670 .await
1671 .map_err(PushChangesError::CallMethod)?;
1672 handle_change_validation_result(result, &changes)?;
1673 self.pending_changes.extend(changes);
1677 Ok(())
1678 }
1679
1680 async fn commit_with_options(
1681 &mut self,
1682 options: fnet_filter::CommitOptions,
1683 ) -> Result<(), CommitError> {
1684 let committed_changes = std::mem::take(&mut self.pending_changes);
1685 let result = self.controller.commit(options).await.map_err(CommitError::CallMethod)?;
1686 handle_commit_result(result, committed_changes)
1687 }
1688
1689 pub async fn commit(&mut self) -> Result<(), CommitError> {
1690 self.commit_with_options(fnet_filter::CommitOptions::default()).await
1691 }
1692
1693 pub async fn commit_idempotent(&mut self) -> Result<(), CommitError> {
1694 self.commit_with_options(fnet_filter::CommitOptions {
1695 idempotent: Some(true),
1696 __source_breaking: SourceBreaking,
1697 })
1698 .await
1699 }
1700}
1701
1702pub(crate) fn handle_change_validation_result(
1703 change_validation_result: fnet_filter::ChangeValidationResult,
1704 changes: &Vec<Change>,
1705) -> Result<(), PushChangesError> {
1706 match change_validation_result {
1707 fnet_filter::ChangeValidationResult::Ok(fnet_filter::Empty {}) => Ok(()),
1708 fnet_filter::ChangeValidationResult::TooManyChanges(fnet_filter::Empty {}) => {
1709 Err(PushChangesError::TooManyChanges)
1710 }
1711 fnet_filter::ChangeValidationResult::ErrorOnChange(results) => {
1712 let errors: Result<_, PushChangesError> =
1713 changes.iter().zip(results).try_fold(Vec::new(), |mut errors, (change, result)| {
1714 match result {
1715 fnet_filter::ChangeValidationError::Ok
1716 | fnet_filter::ChangeValidationError::NotReached => Ok(errors),
1717 error @ (fnet_filter::ChangeValidationError::MissingRequiredField
1718 | fnet_filter::ChangeValidationError::InvalidInterfaceMatcher
1719 | fnet_filter::ChangeValidationError::InvalidAddressMatcher
1720 | fnet_filter::ChangeValidationError::InvalidPortMatcher
1721 | fnet_filter::ChangeValidationError::InvalidTransparentProxyAction
1722 | fnet_filter::ChangeValidationError::InvalidNatAction
1723 | fnet_filter::ChangeValidationError::InvalidPortRange) => {
1724 let error = error
1725 .try_into()
1726 .expect("`Ok` and `NotReached` are handled in another arm");
1727 errors.push((change.clone(), error));
1728 Ok(errors)
1729 }
1730 fnet_filter::ChangeValidationError::__SourceBreaking { .. } => {
1731 Err(FidlConversionError::UnknownUnionVariant(
1732 type_names::CHANGE_VALIDATION_ERROR,
1733 )
1734 .into())
1735 }
1736 }
1737 });
1738 Err(PushChangesError::ErrorOnChange(errors?))
1739 }
1740 fnet_filter::ChangeValidationResult::__SourceBreaking { .. } => {
1741 Err(FidlConversionError::UnknownUnionVariant(type_names::CHANGE_VALIDATION_RESULT)
1742 .into())
1743 }
1744 }
1745}
1746
1747pub(crate) fn handle_commit_result(
1748 commit_result: fnet_filter::CommitResult,
1749 committed_changes: Vec<Change>,
1750) -> Result<(), CommitError> {
1751 match commit_result {
1752 fnet_filter::CommitResult::Ok(fnet_filter::Empty {}) => Ok(()),
1753 fnet_filter::CommitResult::RuleWithInvalidMatcher(rule_id) => {
1754 Err(CommitError::RuleWithInvalidMatcher(rule_id.into()))
1755 }
1756 fnet_filter::CommitResult::RuleWithInvalidAction(rule_id) => {
1757 Err(CommitError::RuleWithInvalidAction(rule_id.into()))
1758 }
1759 fnet_filter::CommitResult::TransparentProxyWithInvalidMatcher(rule_id) => {
1760 Err(CommitError::TransparentProxyWithInvalidMatcher(rule_id.into()))
1761 }
1762 fnet_filter::CommitResult::RedirectWithInvalidMatcher(rule_id) => {
1763 Err(CommitError::RedirectWithInvalidMatcher(rule_id.into()))
1764 }
1765 fnet_filter::CommitResult::MasqueradeWithInvalidMatcher(rule_id) => {
1766 Err(CommitError::MasqueradeWithInvalidMatcher(rule_id.into()))
1767 }
1768 fnet_filter::CommitResult::CyclicalRoutineGraph(routine_id) => {
1769 Err(CommitError::CyclicalRoutineGraph(routine_id.into()))
1770 }
1771 fnet_filter::CommitResult::ErrorOnChange(results) => {
1772 let errors: Result<_, CommitError> = committed_changes
1773 .into_iter()
1774 .zip(results)
1775 .try_fold(Vec::new(), |mut errors, (change, result)| match result {
1776 fnet_filter::CommitError::Ok | fnet_filter::CommitError::NotReached => {
1777 Ok(errors)
1778 }
1779 error @ (fnet_filter::CommitError::NamespaceNotFound
1780 | fnet_filter::CommitError::RoutineNotFound
1781 | fnet_filter::CommitError::RuleNotFound
1782 | fnet_filter::CommitError::AlreadyExists
1783 | fnet_filter::CommitError::TargetRoutineIsInstalled) => {
1784 let error = error
1785 .try_into()
1786 .expect("`Ok` and `NotReached` are handled in another arm");
1787 errors.push((change, error));
1788 Ok(errors)
1789 }
1790 fnet_filter::CommitError::__SourceBreaking { .. } => {
1791 Err(FidlConversionError::UnknownUnionVariant(type_names::COMMIT_ERROR)
1792 .into())
1793 }
1794 });
1795 Err(CommitError::ErrorOnChange(errors?))
1796 }
1797 fnet_filter::CommitResult::__SourceBreaking { .. } => {
1798 Err(FidlConversionError::UnknownUnionVariant(type_names::COMMIT_RESULT).into())
1799 }
1800 }
1801}
1802
1803#[cfg(test)]
1804mod tests {
1805
1806 use assert_matches::assert_matches;
1807 use futures::channel::mpsc;
1808 use futures::task::Poll;
1809 use futures::{FutureExt as _, SinkExt as _};
1810 use net_declare::{fidl_ip, fidl_subnet};
1811 use test_case::test_case;
1812
1813 use super::*;
1814
1815 #[test_case(
1816 fnet_filter::ResourceId::Namespace(String::from("namespace")),
1817 ResourceId::Namespace(NamespaceId(String::from("namespace")));
1818 "NamespaceId"
1819 )]
1820 #[test_case(fnet_filter::Domain::Ipv4, Domain::Ipv4; "Domain")]
1821 #[test_case(
1822 fnet_filter::Namespace {
1823 id: Some(String::from("namespace")),
1824 domain: Some(fnet_filter::Domain::Ipv4),
1825 ..Default::default()
1826 },
1827 Namespace { id: NamespaceId(String::from("namespace")), domain: Domain::Ipv4 };
1828 "Namespace"
1829 )]
1830 #[test_case(fnet_filter::IpInstallationHook::Egress, IpHook::Egress; "IpHook")]
1831 #[test_case(fnet_filter::NatInstallationHook::Egress, NatHook::Egress; "NatHook")]
1832 #[test_case(
1833 fnet_filter::InstalledIpRoutine {
1834 hook: Some(fnet_filter::IpInstallationHook::Egress),
1835 priority: Some(1),
1836 ..Default::default()
1837 },
1838 InstalledIpRoutine {
1839 hook: IpHook::Egress,
1840 priority: 1,
1841 };
1842 "InstalledIpRoutine"
1843 )]
1844 #[test_case(
1845 fnet_filter::RoutineType::Ip(fnet_filter::IpRoutine {
1846 installation: Some(fnet_filter::InstalledIpRoutine {
1847 hook: Some(fnet_filter::IpInstallationHook::LocalEgress),
1848 priority: Some(1),
1849 ..Default::default()
1850 }),
1851 ..Default::default()
1852 }),
1853 RoutineType::Ip(Some(InstalledIpRoutine { hook: IpHook::LocalEgress, priority: 1 }));
1854 "RoutineType"
1855 )]
1856 #[test_case(
1857 fnet_filter::Routine {
1858 id: Some(fnet_filter::RoutineId {
1859 namespace: String::from("namespace"),
1860 name: String::from("routine"),
1861 }),
1862 type_: Some(fnet_filter::RoutineType::Nat(fnet_filter::NatRoutine::default())),
1863 ..Default::default()
1864 },
1865 Routine {
1866 id: RoutineId {
1867 namespace: NamespaceId(String::from("namespace")),
1868 name: String::from("routine"),
1869 },
1870 routine_type: RoutineType::Nat(None),
1871 };
1872 "Routine"
1873 )]
1874 #[test_case(
1875 fnet_filter::InterfaceMatcher::Id(1),
1876 InterfaceMatcher::Id(NonZeroU64::new(1).unwrap());
1877 "InterfaceMatcher"
1878 )]
1879 #[test_case(
1880 fnet_filter::AddressMatcherType::Subnet(fidl_subnet!("192.0.2.0/24")),
1881 AddressMatcherType::Subnet(Subnet(fidl_subnet!("192.0.2.0/24")));
1882 "AddressMatcherType"
1883 )]
1884 #[test_case(
1885 fnet_filter::AddressMatcher {
1886 matcher: fnet_filter::AddressMatcherType::Subnet(fidl_subnet!("192.0.2.0/24")),
1887 invert: true,
1888 },
1889 AddressMatcher {
1890 matcher: AddressMatcherType::Subnet(Subnet(fidl_subnet!("192.0.2.0/24"))),
1891 invert: true,
1892 };
1893 "AddressMatcher"
1894 )]
1895 #[test_case(
1896 fnet_filter::AddressRange {
1897 start: fidl_ip!("192.0.2.0"),
1898 end: fidl_ip!("192.0.2.1"),
1899 },
1900 AddressRange {
1901 range: fidl_ip!("192.0.2.0")..=fidl_ip!("192.0.2.1"),
1902 };
1903 "AddressRange"
1904 )]
1905 #[test_case(
1906 fnet_filter::TransportProtocol::Udp(fnet_filter::UdpMatcher {
1907 src_port: Some(fnet_filter::PortMatcher { start: 1024, end: u16::MAX, invert: false }),
1908 dst_port: None,
1909 ..Default::default()
1910 }),
1911 TransportProtocolMatcher::Udp {
1912 src_port: Some(PortMatcher { range: 1024..=u16::MAX, invert: false }),
1913 dst_port: None,
1914 };
1915 "TransportProtocol"
1916 )]
1917 #[test_case(
1918 fnet_filter::Matchers {
1919 in_interface: Some(fnet_filter::InterfaceMatcher::Name(String::from("wlan"))),
1920 transport_protocol: Some(fnet_filter::TransportProtocol::Tcp(fnet_filter::TcpMatcher {
1921 src_port: None,
1922 dst_port: Some(fnet_filter::PortMatcher { start: 22, end: 22, invert: false }),
1923 ..Default::default()
1924 })),
1925 ..Default::default()
1926 },
1927 Matchers {
1928 in_interface: Some(InterfaceMatcher::Name(String::from("wlan"))),
1929 transport_protocol: Some(TransportProtocolMatcher::Tcp {
1930 src_port: None,
1931 dst_port: Some(PortMatcher { range: 22..=22, invert: false }),
1932 }),
1933 ..Default::default()
1934 };
1935 "Matchers"
1936 )]
1937 #[test_case(
1938 fnet_filter::Action::Accept(fnet_filter::Empty {}),
1939 Action::Accept;
1940 "Action"
1941 )]
1942 #[test_case(
1943 fnet_filter::Rule {
1944 id: fnet_filter::RuleId {
1945 routine: fnet_filter::RoutineId {
1946 namespace: String::from("namespace"),
1947 name: String::from("routine"),
1948 },
1949 index: 1,
1950 },
1951 matchers: fnet_filter::Matchers {
1952 transport_protocol: Some(fnet_filter::TransportProtocol::Icmp(
1953 fnet_filter::IcmpMatcher::default()
1954 )),
1955 ..Default::default()
1956 },
1957 action: fnet_filter::Action::Drop(fnet_filter::Empty {}),
1958 },
1959 Rule {
1960 id: RuleId {
1961 routine: RoutineId {
1962 namespace: NamespaceId(String::from("namespace")),
1963 name: String::from("routine"),
1964 },
1965 index: 1,
1966 },
1967 matchers: Matchers {
1968 transport_protocol: Some(TransportProtocolMatcher::Icmp),
1969 ..Default::default()
1970 },
1971 action: Action::Drop,
1972 };
1973 "Rule"
1974 )]
1975 #[test_case(
1976 fnet_filter::Resource::Namespace(fnet_filter::Namespace {
1977 id: Some(String::from("namespace")),
1978 domain: Some(fnet_filter::Domain::Ipv4),
1979 ..Default::default()
1980 }),
1981 Resource::Namespace(Namespace {
1982 id: NamespaceId(String::from("namespace")),
1983 domain: Domain::Ipv4
1984 });
1985 "Resource"
1986 )]
1987 #[test_case(
1988 fnet_filter::Event::EndOfUpdate(fnet_filter::Empty {}),
1989 Event::EndOfUpdate;
1990 "Event"
1991 )]
1992 #[test_case(
1993 fnet_filter::Change::Remove(fnet_filter::ResourceId::Namespace(String::from("namespace"))),
1994 Change::Remove(ResourceId::Namespace(NamespaceId(String::from("namespace"))));
1995 "Change"
1996 )]
1997 fn convert_from_fidl_and_back<F, E>(fidl_type: F, local_type: E)
1998 where
1999 E: TryFrom<F> + Clone + Debug + PartialEq,
2000 <E as TryFrom<F>>::Error: Debug + PartialEq,
2001 F: From<E> + Clone + Debug + PartialEq,
2002 {
2003 assert_eq!(fidl_type.clone().try_into(), Ok(local_type.clone()));
2004 assert_eq!(<_ as Into<F>>::into(local_type), fidl_type.clone());
2005 }
2006
2007 #[test]
2008 fn resource_id_try_from_unknown_variant() {
2009 assert_eq!(
2010 ResourceId::try_from(fnet_filter::ResourceId::__SourceBreaking { unknown_ordinal: 0 }),
2011 Err(FidlConversionError::UnknownUnionVariant(type_names::RESOURCE_ID))
2012 );
2013 }
2014
2015 #[test]
2016 fn domain_try_from_unknown_variant() {
2017 assert_eq!(
2018 Domain::try_from(fnet_filter::Domain::__SourceBreaking { unknown_ordinal: 0 }),
2019 Err(FidlConversionError::UnknownUnionVariant(type_names::DOMAIN))
2020 );
2021 }
2022
2023 #[test]
2024 fn namespace_try_from_missing_properties() {
2025 assert_eq!(
2026 Namespace::try_from(fnet_filter::Namespace {
2027 id: None,
2028 domain: Some(fnet_filter::Domain::Ipv4),
2029 ..Default::default()
2030 }),
2031 Err(FidlConversionError::MissingNamespaceId)
2032 );
2033 assert_eq!(
2034 Namespace::try_from(fnet_filter::Namespace {
2035 id: Some(String::from("namespace")),
2036 domain: None,
2037 ..Default::default()
2038 }),
2039 Err(FidlConversionError::MissingNamespaceDomain)
2040 );
2041 }
2042
2043 #[test]
2044 fn ip_installation_hook_try_from_unknown_variant() {
2045 assert_eq!(
2046 IpHook::try_from(fnet_filter::IpInstallationHook::__SourceBreaking {
2047 unknown_ordinal: 0
2048 }),
2049 Err(FidlConversionError::UnknownUnionVariant(type_names::IP_INSTALLATION_HOOK))
2050 );
2051 }
2052
2053 #[test]
2054 fn nat_installation_hook_try_from_unknown_variant() {
2055 assert_eq!(
2056 NatHook::try_from(fnet_filter::NatInstallationHook::__SourceBreaking {
2057 unknown_ordinal: 0
2058 }),
2059 Err(FidlConversionError::UnknownUnionVariant(type_names::NAT_INSTALLATION_HOOK))
2060 );
2061 }
2062
2063 #[test]
2064 fn installed_ip_routine_try_from_missing_hook() {
2065 assert_eq!(
2066 InstalledIpRoutine::try_from(fnet_filter::InstalledIpRoutine {
2067 hook: None,
2068 ..Default::default()
2069 }),
2070 Err(FidlConversionError::MissingIpInstallationHook)
2071 );
2072 }
2073
2074 #[test]
2075 fn installed_nat_routine_try_from_missing_hook() {
2076 assert_eq!(
2077 InstalledNatRoutine::try_from(fnet_filter::InstalledNatRoutine {
2078 hook: None,
2079 ..Default::default()
2080 }),
2081 Err(FidlConversionError::MissingNatInstallationHook)
2082 );
2083 }
2084
2085 #[test]
2086 fn routine_type_try_from_unknown_variant() {
2087 assert_eq!(
2088 RoutineType::try_from(fnet_filter::RoutineType::__SourceBreaking {
2089 unknown_ordinal: 0
2090 }),
2091 Err(FidlConversionError::UnknownUnionVariant(type_names::ROUTINE_TYPE))
2092 );
2093 }
2094
2095 #[test]
2096 fn routine_try_from_missing_properties() {
2097 assert_eq!(
2098 Routine::try_from(fnet_filter::Routine { id: None, ..Default::default() }),
2099 Err(FidlConversionError::MissingRoutineId)
2100 );
2101 assert_eq!(
2102 Routine::try_from(fnet_filter::Routine {
2103 id: Some(fnet_filter::RoutineId {
2104 namespace: String::from("namespace"),
2105 name: String::from("routine"),
2106 }),
2107 type_: None,
2108 ..Default::default()
2109 }),
2110 Err(FidlConversionError::MissingRoutineType)
2111 );
2112 }
2113
2114 #[test]
2115 fn interface_matcher_try_from_unknown_variant() {
2116 assert_eq!(
2117 InterfaceMatcher::try_from(fnet_filter::InterfaceMatcher::__SourceBreaking {
2118 unknown_ordinal: 0
2119 }),
2120 Err(FidlConversionError::UnknownUnionVariant(type_names::INTERFACE_MATCHER))
2121 );
2122 }
2123
2124 #[test]
2125 fn interface_matcher_try_from_invalid() {
2126 assert_eq!(
2127 InterfaceMatcher::try_from(fnet_filter::InterfaceMatcher::Id(0)),
2128 Err(FidlConversionError::ZeroInterfaceId)
2129 );
2130 }
2131
2132 #[test]
2133 fn address_matcher_type_try_from_unknown_variant() {
2134 assert_eq!(
2135 AddressMatcherType::try_from(fnet_filter::AddressMatcherType::__SourceBreaking {
2136 unknown_ordinal: 0
2137 }),
2138 Err(FidlConversionError::UnknownUnionVariant(type_names::ADDRESS_MATCHER_TYPE))
2139 );
2140 }
2141
2142 #[test]
2143 fn subnet_try_from_invalid() {
2144 assert_eq!(
2145 Subnet::try_from(fnet::Subnet { addr: fidl_ip!("192.0.2.1"), prefix_len: 33 }),
2146 Err(FidlConversionError::SubnetPrefixTooLong)
2147 );
2148 assert_eq!(
2149 Subnet::try_from(fidl_subnet!("192.0.2.1/24")),
2150 Err(FidlConversionError::SubnetHostBitsSet)
2151 );
2152 }
2153
2154 #[test]
2155 fn address_range_try_from_invalid() {
2156 assert_eq!(
2157 AddressRange::try_from(fnet_filter::AddressRange {
2158 start: fidl_ip!("192.0.2.1"),
2159 end: fidl_ip!("192.0.2.0"),
2160 }),
2161 Err(FidlConversionError::InvalidAddressRange)
2162 );
2163 assert_eq!(
2164 AddressRange::try_from(fnet_filter::AddressRange {
2165 start: fidl_ip!("2001:db8::1"),
2166 end: fidl_ip!("2001:db8::"),
2167 }),
2168 Err(FidlConversionError::InvalidAddressRange)
2169 );
2170 }
2171
2172 #[test]
2173 fn address_range_try_from_family_mismatch() {
2174 assert_eq!(
2175 AddressRange::try_from(fnet_filter::AddressRange {
2176 start: fidl_ip!("192.0.2.0"),
2177 end: fidl_ip!("2001:db8::"),
2178 }),
2179 Err(FidlConversionError::AddressRangeFamilyMismatch)
2180 );
2181 }
2182
2183 #[test]
2184 fn port_matcher_try_from_invalid() {
2185 assert_eq!(
2186 PortMatcher::try_from(fnet_filter::PortMatcher { start: 1, end: 0, invert: false }),
2187 Err(FidlConversionError::InvalidPortMatcherRange)
2188 );
2189 }
2190
2191 #[test]
2192 fn transport_protocol_try_from_unknown_variant() {
2193 assert_eq!(
2194 TransportProtocolMatcher::try_from(fnet_filter::TransportProtocol::__SourceBreaking {
2195 unknown_ordinal: 0
2196 }),
2197 Err(FidlConversionError::UnknownUnionVariant(type_names::TRANSPORT_PROTOCOL))
2198 );
2199 }
2200
2201 #[test]
2202 fn action_try_from_unknown_variant() {
2203 assert_eq!(
2204 Action::try_from(fnet_filter::Action::__SourceBreaking { unknown_ordinal: 0 }),
2205 Err(FidlConversionError::UnknownUnionVariant(type_names::ACTION))
2206 );
2207 }
2208
2209 #[test]
2210 fn resource_try_from_unknown_variant() {
2211 assert_eq!(
2212 Resource::try_from(fnet_filter::Resource::__SourceBreaking { unknown_ordinal: 0 }),
2213 Err(FidlConversionError::UnknownUnionVariant(type_names::RESOURCE))
2214 );
2215 }
2216
2217 #[test]
2218 fn event_try_from_unknown_variant() {
2219 assert_eq!(
2220 Event::try_from(fnet_filter::Event::__SourceBreaking { unknown_ordinal: 0 }),
2221 Err(FidlConversionError::UnknownUnionVariant(type_names::EVENT))
2222 );
2223 }
2224
2225 #[test]
2226 fn change_try_from_unknown_variant() {
2227 assert_eq!(
2228 Change::try_from(fnet_filter::Change::__SourceBreaking { unknown_ordinal: 0 }),
2229 Err(FidlConversionError::UnknownUnionVariant(type_names::CHANGE))
2230 );
2231 }
2232
2233 fn test_controller_a() -> ControllerId {
2234 ControllerId(String::from("test-controller-a"))
2235 }
2236
2237 fn test_controller_b() -> ControllerId {
2238 ControllerId(String::from("test-controller-b"))
2239 }
2240
2241 pub(crate) fn test_resource_id() -> ResourceId {
2242 ResourceId::Namespace(NamespaceId(String::from("test-namespace")))
2243 }
2244
2245 pub(crate) fn test_resource() -> Resource {
2246 Resource::Namespace(Namespace {
2247 id: NamespaceId(String::from("test-namespace")),
2248 domain: Domain::AllIp,
2249 })
2250 }
2251
2252 pub(crate) fn invalid_resource() -> Resource {
2253 Resource::Rule(Rule {
2254 id: RuleId {
2255 routine: RoutineId {
2256 namespace: NamespaceId(String::from("namespace")),
2257 name: String::from("routine"),
2258 },
2259 index: 0,
2260 },
2261 matchers: Matchers {
2262 transport_protocol: Some(TransportProtocolMatcher::Tcp {
2263 #[allow(clippy::reversed_empty_ranges)]
2264 src_port: Some(PortMatcher { range: u16::MAX..=0, invert: false }),
2265 dst_port: None,
2266 }),
2267 ..Default::default()
2268 },
2269 action: Action::Drop,
2270 })
2271 }
2272
2273 pub(crate) fn unknown_resource_id() -> ResourceId {
2274 ResourceId::Namespace(NamespaceId(String::from("does-not-exist")))
2275 }
2276
2277 #[fuchsia_async::run_singlethreaded(test)]
2278 async fn event_stream_from_state_conversion_error() {
2279 let (proxy, mut request_stream) =
2280 fidl::endpoints::create_proxy_and_stream::<fnet_filter::StateMarker>();
2281 let stream = event_stream_from_state(proxy).expect("get event stream");
2282 futures::pin_mut!(stream);
2283
2284 let send_invalid_event = async {
2285 let fnet_filter::StateRequest::GetWatcher { options: _, request, control_handle: _ } =
2286 request_stream
2287 .next()
2288 .await
2289 .expect("client should call state")
2290 .expect("request should not error");
2291 let fnet_filter::WatcherRequest::Watch { responder } = request
2292 .into_stream()
2293 .next()
2294 .await
2295 .expect("client should call watch")
2296 .expect("request should not error");
2297 responder
2298 .send(&[fnet_filter::Event::Added(fnet_filter::AddedResource {
2299 controller: String::from("controller"),
2300 resource: fnet_filter::Resource::Namespace(fnet_filter::Namespace {
2301 id: None,
2302 domain: None,
2303 ..Default::default()
2304 }),
2305 })])
2306 .expect("send batch with invalid event");
2307 };
2308 let ((), result) = futures::future::join(send_invalid_event, stream.next()).await;
2309 assert_matches!(
2310 result,
2311 Some(Err(WatchError::Conversion(FidlConversionError::MissingNamespaceId)))
2312 );
2313 }
2314
2315 #[fuchsia_async::run_singlethreaded(test)]
2316 async fn event_stream_from_state_empty_event_batch() {
2317 let (proxy, mut request_stream) =
2318 fidl::endpoints::create_proxy_and_stream::<fnet_filter::StateMarker>();
2319 let stream = event_stream_from_state(proxy).expect("get event stream");
2320 futures::pin_mut!(stream);
2321
2322 let send_empty_batch = async {
2323 let fnet_filter::StateRequest::GetWatcher { options: _, request, control_handle: _ } =
2324 request_stream
2325 .next()
2326 .await
2327 .expect("client should call state")
2328 .expect("request should not error");
2329 let fnet_filter::WatcherRequest::Watch { responder } = request
2330 .into_stream()
2331 .next()
2332 .await
2333 .expect("client should call watch")
2334 .expect("request should not error");
2335 responder.send(&[]).expect("send empty batch");
2336 };
2337 let ((), result) = futures::future::join(send_empty_batch, stream.next()).await;
2338 assert_matches!(result, Some(Err(WatchError::EmptyEventBatch)));
2339 }
2340
2341 #[fuchsia_async::run_singlethreaded(test)]
2342 async fn get_existing_resources_success() {
2343 let event_stream = futures::stream::iter([
2344 Ok(Event::Existing(test_controller_a(), test_resource())),
2345 Ok(Event::Existing(test_controller_b(), test_resource())),
2346 Ok(Event::Idle),
2347 Ok(Event::Removed(test_controller_a(), test_resource_id())),
2348 ]);
2349 futures::pin_mut!(event_stream);
2350
2351 let existing = get_existing_resources::<HashMap<_, _>>(event_stream.by_ref())
2352 .await
2353 .expect("get existing resources");
2354 assert_eq!(
2355 existing,
2356 HashMap::from([
2357 (test_controller_a(), HashMap::from([(test_resource_id(), test_resource())])),
2358 (test_controller_b(), HashMap::from([(test_resource_id(), test_resource())])),
2359 ])
2360 );
2361
2362 let trailing_events = event_stream.collect::<Vec<_>>().await;
2363 assert_matches!(
2364 &trailing_events[..],
2365 [Ok(Event::Removed(controller, resource))] if controller == &test_controller_a() &&
2366 resource == &test_resource_id()
2367 );
2368 }
2369
2370 #[fuchsia_async::run_singlethreaded(test)]
2371 async fn get_existing_resources_error_in_stream() {
2372 let event_stream =
2373 futures::stream::once(futures::future::ready(Err(WatchError::EmptyEventBatch)));
2374 futures::pin_mut!(event_stream);
2375 assert_matches!(
2376 get_existing_resources::<HashMap<_, _>>(event_stream).await,
2377 Err(GetExistingResourcesError::ErrorInStream(WatchError::EmptyEventBatch))
2378 )
2379 }
2380
2381 #[fuchsia_async::run_singlethreaded(test)]
2382 async fn get_existing_resources_unexpected_event() {
2383 let event_stream = futures::stream::once(futures::future::ready(Ok(Event::EndOfUpdate)));
2384 futures::pin_mut!(event_stream);
2385 assert_matches!(
2386 get_existing_resources::<HashMap<_, _>>(event_stream).await,
2387 Err(GetExistingResourcesError::UnexpectedEvent(Event::EndOfUpdate))
2388 )
2389 }
2390
2391 #[fuchsia_async::run_singlethreaded(test)]
2392 async fn get_existing_resources_duplicate_resource() {
2393 let event_stream = futures::stream::iter([
2394 Ok(Event::Existing(test_controller_a(), test_resource())),
2395 Ok(Event::Existing(test_controller_a(), test_resource())),
2396 ]);
2397 futures::pin_mut!(event_stream);
2398 assert_matches!(
2399 get_existing_resources::<HashMap<_, _>>(event_stream).await,
2400 Err(GetExistingResourcesError::DuplicateResource(resource))
2401 if resource == test_resource()
2402 )
2403 }
2404
2405 #[fuchsia_async::run_singlethreaded(test)]
2406 async fn get_existing_resources_stream_ended() {
2407 let event_stream = futures::stream::once(futures::future::ready(Ok(Event::Existing(
2408 test_controller_a(),
2409 test_resource(),
2410 ))));
2411 futures::pin_mut!(event_stream);
2412 assert_matches!(
2413 get_existing_resources::<HashMap<_, _>>(event_stream).await,
2414 Err(GetExistingResourcesError::StreamEnded)
2415 )
2416 }
2417
2418 #[fuchsia_async::run_singlethreaded(test)]
2419 async fn wait_for_condition_add_remove() {
2420 let mut state = HashMap::new();
2421
2422 let has_resource = |resources: &HashMap<_, HashMap<_, _>>| {
2425 resources.get(&test_controller_a()).map_or(false, |controller| {
2426 controller
2427 .get(&test_resource_id())
2428 .map_or(false, |resource| resource == &test_resource())
2429 })
2430 };
2431 assert_matches!(
2432 wait_for_condition(futures::stream::pending(), &mut state, has_resource).now_or_never(),
2433 None
2434 );
2435 assert!(state.is_empty());
2436 assert_matches!(
2437 wait_for_condition(
2438 futures::stream::iter([
2439 Ok(Event::Added(test_controller_b(), test_resource())),
2440 Ok(Event::EndOfUpdate),
2441 Ok(Event::Added(test_controller_a(), test_resource())),
2442 Ok(Event::EndOfUpdate),
2443 ]),
2444 &mut state,
2445 has_resource
2446 )
2447 .now_or_never(),
2448 Some(Ok(()))
2449 );
2450 assert_eq!(
2451 state,
2452 HashMap::from([
2453 (test_controller_a(), HashMap::from([(test_resource_id(), test_resource())])),
2454 (test_controller_b(), HashMap::from([(test_resource_id(), test_resource())])),
2455 ])
2456 );
2457
2458 assert_matches!(
2460 wait_for_condition(
2461 futures::stream::iter([
2462 Ok(Event::Added(test_controller_a(), test_resource())),
2463 Ok(Event::EndOfUpdate),
2464 ]),
2465 &mut state,
2466 has_resource
2467 )
2468 .now_or_never(),
2469 Some(Err(WaitForConditionError::AddedAlreadyExisting(r))) if r == test_resource()
2470 );
2471 assert_eq!(
2472 state,
2473 HashMap::from([
2474 (test_controller_a(), HashMap::from([(test_resource_id(), test_resource())])),
2475 (test_controller_b(), HashMap::from([(test_resource_id(), test_resource())])),
2476 ])
2477 );
2478
2479 let does_not_have_resource = |resources: &HashMap<_, HashMap<_, _>>| {
2482 resources.get(&test_controller_a()).map_or(false, |controller| controller.is_empty())
2483 };
2484 assert_matches!(
2485 wait_for_condition(futures::stream::pending(), &mut state, does_not_have_resource)
2486 .now_or_never(),
2487 None
2488 );
2489 assert_eq!(
2490 state,
2491 HashMap::from([
2492 (test_controller_a(), HashMap::from([(test_resource_id(), test_resource())])),
2493 (test_controller_b(), HashMap::from([(test_resource_id(), test_resource())])),
2494 ])
2495 );
2496 assert_matches!(
2497 wait_for_condition(
2498 futures::stream::iter([
2499 Ok(Event::Removed(test_controller_b(), test_resource_id())),
2500 Ok(Event::EndOfUpdate),
2501 Ok(Event::Removed(test_controller_a(), test_resource_id())),
2502 Ok(Event::EndOfUpdate),
2503 ]),
2504 &mut state,
2505 does_not_have_resource
2506 )
2507 .now_or_never(),
2508 Some(Ok(()))
2509 );
2510 assert_eq!(
2511 state,
2512 HashMap::from([
2513 (test_controller_a(), HashMap::new()),
2514 (test_controller_b(), HashMap::new()),
2515 ])
2516 );
2517
2518 assert_matches!(
2520 wait_for_condition(
2521 futures::stream::iter([
2522 Ok(Event::Removed(test_controller_a(), test_resource_id())),
2523 Ok(Event::EndOfUpdate),
2524 ]),
2525 &mut state,
2526 does_not_have_resource
2527 ).now_or_never(),
2528 Some(Err(WaitForConditionError::RemovedNonExistent(r))) if r == test_resource_id()
2529 );
2530 assert_eq!(
2531 state,
2532 HashMap::from([
2533 (test_controller_a(), HashMap::new()),
2534 (test_controller_b(), HashMap::new()),
2535 ])
2536 );
2537 }
2538
2539 #[test]
2540 fn predicate_not_tested_until_update_complete() {
2541 let mut state = HashMap::new();
2542 let (mut tx, rx) = mpsc::unbounded();
2543
2544 let wait = wait_for_condition(rx, &mut state, |state| !state.is_empty()).fuse();
2545 futures::pin_mut!(wait);
2546
2547 let mut exec = fuchsia_async::TestExecutor::new();
2551 exec.run_singlethreaded(async {
2552 tx.send(Ok(Event::Added(test_controller_a(), test_resource())))
2553 .await
2554 .expect("receiver should not be closed");
2555 });
2556 assert_matches!(exec.run_until_stalled(&mut wait), Poll::Pending);
2557
2558 exec.run_singlethreaded(async {
2559 tx.send(Ok(Event::EndOfUpdate)).await.expect("receiver should not be closed");
2560 wait.await.expect("condition should be satisfied once update is complete");
2561 });
2562 }
2563
2564 #[fuchsia_async::run_singlethreaded(test)]
2565 async fn wait_for_condition_error_in_stream() {
2566 let mut state = HashMap::new();
2567 let event_stream =
2568 futures::stream::once(futures::future::ready(Err(WatchError::EmptyEventBatch)));
2569 assert_matches!(
2570 wait_for_condition(event_stream, &mut state, |_| true).await,
2571 Err(WaitForConditionError::ErrorInStream(WatchError::EmptyEventBatch))
2572 );
2573 assert!(state.is_empty());
2574 }
2575
2576 #[fuchsia_async::run_singlethreaded(test)]
2577 async fn wait_for_condition_stream_ended() {
2578 let mut state = HashMap::new();
2579 let event_stream = futures::stream::empty();
2580 assert_matches!(
2581 wait_for_condition(event_stream, &mut state, |_| true).await,
2582 Err(WaitForConditionError::StreamEnded)
2583 );
2584 assert!(state.is_empty());
2585 }
2586
2587 pub(crate) async fn handle_open_controller(
2588 mut request_stream: fnet_filter::ControlRequestStream,
2589 ) -> fnet_filter::NamespaceControllerRequestStream {
2590 let (id, request, _control_handle) = request_stream
2591 .next()
2592 .await
2593 .expect("client should open controller")
2594 .expect("request should not error")
2595 .into_open_controller()
2596 .expect("client should open controller");
2597 let (stream, control_handle) = request.into_stream_and_control_handle();
2598 control_handle.send_on_id_assigned(&id).expect("send assigned ID");
2599
2600 stream
2601 }
2602
2603 pub(crate) async fn handle_push_changes(
2604 stream: &mut fnet_filter::NamespaceControllerRequestStream,
2605 push_changes_result: fnet_filter::ChangeValidationResult,
2606 ) {
2607 let (_changes, responder) = stream
2608 .next()
2609 .await
2610 .expect("client should push changes")
2611 .expect("request should not error")
2612 .into_push_changes()
2613 .expect("client should push changes");
2614 responder.send(push_changes_result).expect("send empty batch");
2615 }
2616
2617 pub(crate) async fn handle_commit(
2618 stream: &mut fnet_filter::NamespaceControllerRequestStream,
2619 commit_result: fnet_filter::CommitResult,
2620 ) {
2621 let (_options, responder) = stream
2622 .next()
2623 .await
2624 .expect("client should commit")
2625 .expect("request should not error")
2626 .into_commit()
2627 .expect("client should commit");
2628 responder.send(commit_result).expect("send commit result");
2629 }
2630
2631 #[fuchsia_async::run_singlethreaded(test)]
2632 async fn controller_push_changes_reports_invalid_change() {
2633 let (control, request_stream) =
2634 fidl::endpoints::create_proxy_and_stream::<fnet_filter::ControlMarker>();
2635 let push_invalid_change = async {
2636 let mut controller = Controller::new(&control, &ControllerId(String::from("test")))
2637 .await
2638 .expect("create controller");
2639 let result = controller
2640 .push_changes(vec![
2641 Change::Create(test_resource()),
2642 Change::Create(invalid_resource()),
2643 Change::Remove(test_resource_id()),
2644 ])
2645 .await;
2646 assert_matches!(
2647 result,
2648 Err(PushChangesError::ErrorOnChange(errors)) if errors == vec![(
2649 Change::Create(invalid_resource()),
2650 ChangeValidationError::InvalidPortMatcher
2651 )]
2652 );
2653 };
2654
2655 let handle_controller = async {
2656 let mut stream = handle_open_controller(request_stream).await;
2657 handle_push_changes(
2658 &mut stream,
2659 fnet_filter::ChangeValidationResult::ErrorOnChange(vec![
2660 fnet_filter::ChangeValidationError::Ok,
2661 fnet_filter::ChangeValidationError::InvalidPortMatcher,
2662 fnet_filter::ChangeValidationError::NotReached,
2663 ]),
2664 )
2665 .await;
2666 };
2667
2668 let ((), ()) = futures::future::join(push_invalid_change, handle_controller).await;
2669 }
2670
2671 #[fuchsia_async::run_singlethreaded(test)]
2672 async fn controller_commit_reports_invalid_change() {
2673 let (control, request_stream) =
2674 fidl::endpoints::create_proxy_and_stream::<fnet_filter::ControlMarker>();
2675 let commit_invalid_change = async {
2676 let mut controller = Controller::new(&control, &ControllerId(String::from("test")))
2677 .await
2678 .expect("create controller");
2679 controller
2680 .push_changes(vec![
2681 Change::Create(test_resource()),
2682 Change::Remove(unknown_resource_id()),
2683 Change::Remove(test_resource_id()),
2684 ])
2685 .await
2686 .expect("push changes");
2687 let result = controller.commit().await;
2688 assert_matches!(
2689 result,
2690 Err(CommitError::ErrorOnChange(errors)) if errors == vec![(
2691 Change::Remove(unknown_resource_id()),
2692 ChangeCommitError::NamespaceNotFound,
2693 )]
2694 );
2695 };
2696 let handle_controller = async {
2697 let mut stream = handle_open_controller(request_stream).await;
2698 handle_push_changes(
2699 &mut stream,
2700 fnet_filter::ChangeValidationResult::Ok(fnet_filter::Empty {}),
2701 )
2702 .await;
2703 handle_commit(
2704 &mut stream,
2705 fnet_filter::CommitResult::ErrorOnChange(vec![
2706 fnet_filter::CommitError::Ok,
2707 fnet_filter::CommitError::NamespaceNotFound,
2708 fnet_filter::CommitError::Ok,
2709 ]),
2710 )
2711 .await;
2712 };
2713 let ((), ()) = futures::future::join(commit_invalid_change, handle_controller).await;
2714 }
2715}