fidl_fuchsia_net_filter_ext/
lib.rs

1// Copyright 2023 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! Extensions for the fuchsia.net.filter FIDL library.
6//!
7//! Note that this library as written is not meant for inclusion in the SDK. It
8//! is only meant to be used in conjunction with a netstack that is compiled
9//! against the same API level of the `fuchsia.net.filter` FIDL library. This
10//! library opts in to compile-time and runtime breakage when the FIDL library
11//! is evolved in order to enforce that it is updated along with the FIDL
12//! library itself.
13
14#[cfg(target_os = "fuchsia")]
15pub mod sync;
16
17use std::collections::HashMap;
18use std::fmt::Debug;
19use std::num::{NonZeroU16, NonZeroU64};
20use std::ops::RangeInclusive;
21
22use async_utils::fold::FoldWhile;
23use fidl::marker::SourceBreaking;
24use fidl_fuchsia_net_ext::IntoExt;
25use futures::{Stream, StreamExt as _, TryStreamExt as _};
26use thiserror::Error;
27use {
28    fidl_fuchsia_net as fnet, fidl_fuchsia_net_filter as fnet_filter,
29    fidl_fuchsia_net_interfaces as fnet_interfaces,
30    fidl_fuchsia_net_interfaces_ext as fnet_interfaces_ext, fidl_fuchsia_net_root as fnet_root,
31};
32
33/// Conversion errors from `fnet_filter` FIDL types to the
34/// equivalents defined in this module.
35#[derive(Debug, Error, PartialEq)]
36pub enum FidlConversionError {
37    #[error("union is of an unknown variant: {0}")]
38    UnknownUnionVariant(&'static str),
39    #[error("namespace ID not provided")]
40    MissingNamespaceId,
41    #[error("namespace domain not provided")]
42    MissingNamespaceDomain,
43    #[error("routine ID not provided")]
44    MissingRoutineId,
45    #[error("routine type not provided")]
46    MissingRoutineType,
47    #[error("IP installation hook not provided")]
48    MissingIpInstallationHook,
49    #[error("NAT installation hook not provided")]
50    MissingNatInstallationHook,
51    #[error("interface matcher specified an invalid ID of 0")]
52    ZeroInterfaceId,
53    #[error("invalid address range (start must be <= end)")]
54    InvalidAddressRange,
55    #[error("address range start and end addresses are not the same IP family")]
56    AddressRangeFamilyMismatch,
57    #[error("prefix length of subnet is longer than number of bits in IP address")]
58    SubnetPrefixTooLong,
59    #[error("host bits are set in subnet network")]
60    SubnetHostBitsSet,
61    #[error("invalid port matcher range (start must be <= end)")]
62    InvalidPortMatcherRange,
63    #[error("transparent proxy action specified an invalid local port of 0")]
64    UnspecifiedTransparentProxyPort,
65    #[error("NAT action specified an invalid rewrite port of 0")]
66    UnspecifiedNatPort,
67    #[error("invalid port range (start must be <= end)")]
68    InvalidPortRange,
69    #[error("non-error result variant could not be converted to an error")]
70    NotAnError,
71}
72
73// TODO(https://fxbug.dev/317058051): remove this when the Rust FIDL bindings
74// expose constants for these.
75mod type_names {
76    pub(super) const RESOURCE_ID: &str = "fuchsia.net.filter/ResourceId";
77    pub(super) const DOMAIN: &str = "fuchsia.net.filter/Domain";
78    pub(super) const IP_INSTALLATION_HOOK: &str = "fuchsia.net.filter/IpInstallationHook";
79    pub(super) const NAT_INSTALLATION_HOOK: &str = "fuchsia.net.filter/NatInstallationHook";
80    pub(super) const ROUTINE_TYPE: &str = "fuchsia.net.filter/RoutineType";
81    pub(super) const INTERFACE_MATCHER: &str = "fuchsia.net.filter/InterfaceMatcher";
82    pub(super) const ADDRESS_MATCHER_TYPE: &str = "fuchsia.net.filter/AddressMatcherType";
83    pub(super) const TRANSPORT_PROTOCOL: &str = "fuchsia.net.filter/TransportProtocol";
84    pub(super) const ACTION: &str = "fuchsia.net.filter/Action";
85    pub(super) const MARK_ACTION: &str = "fuchsia.net.filter/MarkAction";
86    pub(super) const TRANSPARENT_PROXY: &str = "fuchsia.net.filter/TransparentProxy";
87    pub(super) const RESOURCE: &str = "fuchsia.net.filter/Resource";
88    pub(super) const EVENT: &str = "fuchsia.net.filter/Event";
89    pub(super) const CHANGE: &str = "fuchsia.net.filter/Change";
90    pub(super) const CHANGE_VALIDATION_ERROR: &str = "fuchsia.net.filter/ChangeValidationError";
91    pub(super) const CHANGE_VALIDATION_RESULT: &str = "fuchsia.net.filter/ChangeValidationResult";
92    pub(super) const COMMIT_ERROR: &str = "fuchsia.net.filter/CommitError";
93    pub(super) const COMMIT_RESULT: &str = "fuchsia.net.filter/CommitResult";
94    pub(super) const NET_INTERFACES_PORT_CLASS: &str = "fuchsia.net.interfaces/PortClass";
95    pub(super) const HARDWARE_NETWORK_PORT_CLASS: &str = "fuchsia.hardware.network/PortClass";
96}
97
98/// Extension type for [`fnet_filter::NamespaceId`].
99#[derive(Debug, Clone, PartialEq, Eq, Hash, Ord, PartialOrd)]
100pub struct NamespaceId(pub String);
101
102/// Extension type for [`fnet_filter::RoutineId`].
103#[derive(Debug, Clone, PartialEq, Eq, Hash)]
104pub struct RoutineId {
105    pub namespace: NamespaceId,
106    pub name: String,
107}
108
109impl From<fnet_filter::RoutineId> for RoutineId {
110    fn from(id: fnet_filter::RoutineId) -> Self {
111        let fnet_filter::RoutineId { namespace, name } = id;
112        Self { namespace: NamespaceId(namespace), name }
113    }
114}
115
116impl From<RoutineId> for fnet_filter::RoutineId {
117    fn from(id: RoutineId) -> Self {
118        let RoutineId { namespace, name } = id;
119        let NamespaceId(namespace) = namespace;
120        Self { namespace, name }
121    }
122}
123
124/// Extension type for [`fnet_filter::RuleId`].
125#[derive(Debug, Clone, PartialEq, Eq, Hash)]
126pub struct RuleId {
127    pub routine: RoutineId,
128    pub index: u32,
129}
130
131impl From<fnet_filter::RuleId> for RuleId {
132    fn from(id: fnet_filter::RuleId) -> Self {
133        let fnet_filter::RuleId { routine, index } = id;
134        Self { routine: routine.into(), index }
135    }
136}
137
138impl From<RuleId> for fnet_filter::RuleId {
139    fn from(id: RuleId) -> Self {
140        let RuleId { routine, index } = id;
141        Self { routine: routine.into(), index }
142    }
143}
144
145/// Extension type for [`fnet_filter::ResourceId`].
146#[derive(Debug, Clone, PartialEq, Eq, Hash)]
147pub enum ResourceId {
148    Namespace(NamespaceId),
149    Routine(RoutineId),
150    Rule(RuleId),
151}
152
153impl TryFrom<fnet_filter::ResourceId> for ResourceId {
154    type Error = FidlConversionError;
155
156    fn try_from(id: fnet_filter::ResourceId) -> Result<Self, Self::Error> {
157        match id {
158            fnet_filter::ResourceId::Namespace(id) => Ok(Self::Namespace(NamespaceId(id))),
159            fnet_filter::ResourceId::Routine(id) => Ok(Self::Routine(id.into())),
160            fnet_filter::ResourceId::Rule(id) => Ok(Self::Rule(id.into())),
161            fnet_filter::ResourceId::__SourceBreaking { .. } => {
162                Err(FidlConversionError::UnknownUnionVariant(type_names::RESOURCE_ID))
163            }
164        }
165    }
166}
167
168impl From<ResourceId> for fnet_filter::ResourceId {
169    fn from(id: ResourceId) -> Self {
170        match id {
171            ResourceId::Namespace(NamespaceId(id)) => fnet_filter::ResourceId::Namespace(id),
172            ResourceId::Routine(id) => fnet_filter::ResourceId::Routine(id.into()),
173            ResourceId::Rule(id) => fnet_filter::ResourceId::Rule(id.into()),
174        }
175    }
176}
177
178/// Extension type for [`fnet_filter::Domain`].
179#[derive(Debug, Clone, PartialEq)]
180pub enum Domain {
181    Ipv4,
182    Ipv6,
183    AllIp,
184}
185
186impl From<Domain> for fnet_filter::Domain {
187    fn from(domain: Domain) -> Self {
188        match domain {
189            Domain::Ipv4 => fnet_filter::Domain::Ipv4,
190            Domain::Ipv6 => fnet_filter::Domain::Ipv6,
191            Domain::AllIp => fnet_filter::Domain::AllIp,
192        }
193    }
194}
195
196impl TryFrom<fnet_filter::Domain> for Domain {
197    type Error = FidlConversionError;
198
199    fn try_from(domain: fnet_filter::Domain) -> Result<Self, Self::Error> {
200        match domain {
201            fnet_filter::Domain::Ipv4 => Ok(Self::Ipv4),
202            fnet_filter::Domain::Ipv6 => Ok(Self::Ipv6),
203            fnet_filter::Domain::AllIp => Ok(Self::AllIp),
204            fnet_filter::Domain::__SourceBreaking { .. } => {
205                Err(FidlConversionError::UnknownUnionVariant(type_names::DOMAIN))
206            }
207        }
208    }
209}
210
211/// Extension type for [`fnet_filter::Namespace`].
212#[derive(Debug, Clone, PartialEq)]
213pub struct Namespace {
214    pub id: NamespaceId,
215    pub domain: Domain,
216}
217
218impl From<Namespace> for fnet_filter::Namespace {
219    fn from(namespace: Namespace) -> Self {
220        let Namespace { id, domain } = namespace;
221        let NamespaceId(id) = id;
222        Self { id: Some(id), domain: Some(domain.into()), __source_breaking: SourceBreaking }
223    }
224}
225
226impl TryFrom<fnet_filter::Namespace> for Namespace {
227    type Error = FidlConversionError;
228
229    fn try_from(namespace: fnet_filter::Namespace) -> Result<Self, Self::Error> {
230        let fnet_filter::Namespace { id, domain, __source_breaking } = namespace;
231        let id = NamespaceId(id.ok_or(FidlConversionError::MissingNamespaceId)?);
232        let domain = domain.ok_or(FidlConversionError::MissingNamespaceDomain)?.try_into()?;
233        Ok(Self { id, domain })
234    }
235}
236
237/// Extension type for [`fnet_filter::IpInstallationHook`].
238#[derive(Debug, Clone, Copy, PartialEq)]
239pub enum IpHook {
240    Ingress,
241    LocalIngress,
242    Forwarding,
243    LocalEgress,
244    Egress,
245}
246
247impl From<IpHook> for fnet_filter::IpInstallationHook {
248    fn from(hook: IpHook) -> Self {
249        match hook {
250            IpHook::Ingress => Self::Ingress,
251            IpHook::LocalIngress => Self::LocalIngress,
252            IpHook::Forwarding => Self::Forwarding,
253            IpHook::LocalEgress => Self::LocalEgress,
254            IpHook::Egress => Self::Egress,
255        }
256    }
257}
258
259impl TryFrom<fnet_filter::IpInstallationHook> for IpHook {
260    type Error = FidlConversionError;
261
262    fn try_from(hook: fnet_filter::IpInstallationHook) -> Result<Self, Self::Error> {
263        match hook {
264            fnet_filter::IpInstallationHook::Ingress => Ok(Self::Ingress),
265            fnet_filter::IpInstallationHook::LocalIngress => Ok(Self::LocalIngress),
266            fnet_filter::IpInstallationHook::Forwarding => Ok(Self::Forwarding),
267            fnet_filter::IpInstallationHook::LocalEgress => Ok(Self::LocalEgress),
268            fnet_filter::IpInstallationHook::Egress => Ok(Self::Egress),
269            fnet_filter::IpInstallationHook::__SourceBreaking { .. } => {
270                Err(FidlConversionError::UnknownUnionVariant(type_names::IP_INSTALLATION_HOOK))
271            }
272        }
273    }
274}
275
276/// Extension type for [`fnet_filter::NatInstallationHook`].
277#[derive(Debug, Clone, Copy, PartialEq)]
278pub enum NatHook {
279    Ingress,
280    LocalIngress,
281    LocalEgress,
282    Egress,
283}
284
285impl From<NatHook> for fnet_filter::NatInstallationHook {
286    fn from(hook: NatHook) -> Self {
287        match hook {
288            NatHook::Ingress => Self::Ingress,
289            NatHook::LocalIngress => Self::LocalIngress,
290            NatHook::LocalEgress => Self::LocalEgress,
291            NatHook::Egress => Self::Egress,
292        }
293    }
294}
295
296impl TryFrom<fnet_filter::NatInstallationHook> for NatHook {
297    type Error = FidlConversionError;
298
299    fn try_from(hook: fnet_filter::NatInstallationHook) -> Result<Self, Self::Error> {
300        match hook {
301            fnet_filter::NatInstallationHook::Ingress => Ok(Self::Ingress),
302            fnet_filter::NatInstallationHook::LocalIngress => Ok(Self::LocalIngress),
303            fnet_filter::NatInstallationHook::LocalEgress => Ok(Self::LocalEgress),
304            fnet_filter::NatInstallationHook::Egress => Ok(Self::Egress),
305            fnet_filter::NatInstallationHook::__SourceBreaking { .. } => {
306                Err(FidlConversionError::UnknownUnionVariant(type_names::NAT_INSTALLATION_HOOK))
307            }
308        }
309    }
310}
311
312/// Extension type for [`fnet_filter::InstalledIpRoutine`].
313#[derive(Debug, Clone, PartialEq)]
314pub struct InstalledIpRoutine {
315    pub hook: IpHook,
316    pub priority: i32,
317}
318
319impl From<InstalledIpRoutine> for fnet_filter::InstalledIpRoutine {
320    fn from(routine: InstalledIpRoutine) -> Self {
321        let InstalledIpRoutine { hook, priority } = routine;
322        Self {
323            hook: Some(hook.into()),
324            priority: Some(priority),
325            __source_breaking: SourceBreaking,
326        }
327    }
328}
329
330impl TryFrom<fnet_filter::InstalledIpRoutine> for InstalledIpRoutine {
331    type Error = FidlConversionError;
332
333    fn try_from(routine: fnet_filter::InstalledIpRoutine) -> Result<Self, Self::Error> {
334        let fnet_filter::InstalledIpRoutine { hook, priority, __source_breaking } = routine;
335        let hook = hook.ok_or(FidlConversionError::MissingIpInstallationHook)?;
336        let priority = priority.unwrap_or(fnet_filter::DEFAULT_ROUTINE_PRIORITY);
337        Ok(Self { hook: hook.try_into()?, priority })
338    }
339}
340
341/// Extension type for [`fnet_filter::InstalledNatRoutine`].
342#[derive(Debug, Clone, PartialEq)]
343pub struct InstalledNatRoutine {
344    pub hook: NatHook,
345    pub priority: i32,
346}
347
348impl From<InstalledNatRoutine> for fnet_filter::InstalledNatRoutine {
349    fn from(routine: InstalledNatRoutine) -> Self {
350        let InstalledNatRoutine { hook, priority } = routine;
351        Self {
352            hook: Some(hook.into()),
353            priority: Some(priority),
354            __source_breaking: SourceBreaking,
355        }
356    }
357}
358
359impl TryFrom<fnet_filter::InstalledNatRoutine> for InstalledNatRoutine {
360    type Error = FidlConversionError;
361
362    fn try_from(routine: fnet_filter::InstalledNatRoutine) -> Result<Self, Self::Error> {
363        let fnet_filter::InstalledNatRoutine { hook, priority, __source_breaking } = routine;
364        let hook = hook.ok_or(FidlConversionError::MissingNatInstallationHook)?;
365        let priority = priority.unwrap_or(fnet_filter::DEFAULT_ROUTINE_PRIORITY);
366        Ok(Self { hook: hook.try_into()?, priority })
367    }
368}
369
370/// Extension type for [`fnet_filter::RoutineType`].
371#[derive(Debug, Clone, PartialEq)]
372pub enum RoutineType {
373    Ip(Option<InstalledIpRoutine>),
374    Nat(Option<InstalledNatRoutine>),
375}
376
377impl RoutineType {
378    pub fn is_installed(&self) -> bool {
379        // The `InstalledIpRoutine` or `InstalledNatRoutine` configuration is
380        // optional, and when omitted, signifies an uninstalled routine.
381        match self {
382            Self::Ip(Some(_)) | Self::Nat(Some(_)) => true,
383            Self::Ip(None) | Self::Nat(None) => false,
384        }
385    }
386}
387
388impl From<RoutineType> for fnet_filter::RoutineType {
389    fn from(routine: RoutineType) -> Self {
390        match routine {
391            RoutineType::Ip(installation) => Self::Ip(fnet_filter::IpRoutine {
392                installation: installation.map(Into::into),
393                __source_breaking: SourceBreaking,
394            }),
395            RoutineType::Nat(installation) => Self::Nat(fnet_filter::NatRoutine {
396                installation: installation.map(Into::into),
397                __source_breaking: SourceBreaking,
398            }),
399        }
400    }
401}
402
403impl TryFrom<fnet_filter::RoutineType> for RoutineType {
404    type Error = FidlConversionError;
405
406    fn try_from(type_: fnet_filter::RoutineType) -> Result<Self, Self::Error> {
407        match type_ {
408            fnet_filter::RoutineType::Ip(fnet_filter::IpRoutine {
409                installation,
410                __source_breaking,
411            }) => Ok(RoutineType::Ip(installation.map(TryInto::try_into).transpose()?)),
412            fnet_filter::RoutineType::Nat(fnet_filter::NatRoutine {
413                installation,
414                __source_breaking,
415            }) => Ok(RoutineType::Nat(installation.map(TryInto::try_into).transpose()?)),
416            fnet_filter::RoutineType::__SourceBreaking { .. } => {
417                Err(FidlConversionError::UnknownUnionVariant(type_names::ROUTINE_TYPE))
418            }
419        }
420    }
421}
422
423/// Extension type for [`fnet_filter::Routine`].
424#[derive(Debug, Clone, PartialEq)]
425pub struct Routine {
426    pub id: RoutineId,
427    pub routine_type: RoutineType,
428}
429
430impl From<Routine> for fnet_filter::Routine {
431    fn from(routine: Routine) -> Self {
432        let Routine { id, routine_type: type_ } = routine;
433        Self { id: Some(id.into()), type_: Some(type_.into()), __source_breaking: SourceBreaking }
434    }
435}
436
437impl TryFrom<fnet_filter::Routine> for Routine {
438    type Error = FidlConversionError;
439
440    fn try_from(routine: fnet_filter::Routine) -> Result<Self, Self::Error> {
441        let fnet_filter::Routine { id, type_, __source_breaking } = routine;
442        let id = id.ok_or(FidlConversionError::MissingRoutineId)?;
443        let type_ = type_.ok_or(FidlConversionError::MissingRoutineType)?;
444        Ok(Self { id: id.into(), routine_type: type_.try_into()? })
445    }
446}
447
448/// Extension type for [`fnet_filter::InterfaceMatcher`].
449#[derive(Debug, Clone, PartialEq)]
450pub enum InterfaceMatcher {
451    Id(NonZeroU64),
452    Name(fnet_interfaces::Name),
453    PortClass(fnet_interfaces_ext::PortClass),
454}
455
456impl From<InterfaceMatcher> for fnet_filter::InterfaceMatcher {
457    fn from(matcher: InterfaceMatcher) -> Self {
458        match matcher {
459            InterfaceMatcher::Id(id) => Self::Id(id.get()),
460            InterfaceMatcher::Name(name) => Self::Name(name),
461            InterfaceMatcher::PortClass(port_class) => Self::PortClass(port_class.into()),
462        }
463    }
464}
465
466impl TryFrom<fnet_filter::InterfaceMatcher> for InterfaceMatcher {
467    type Error = FidlConversionError;
468
469    fn try_from(matcher: fnet_filter::InterfaceMatcher) -> Result<Self, Self::Error> {
470        match matcher {
471            fnet_filter::InterfaceMatcher::Id(id) => {
472                let id = NonZeroU64::new(id).ok_or(FidlConversionError::ZeroInterfaceId)?;
473                Ok(Self::Id(id))
474            }
475            fnet_filter::InterfaceMatcher::Name(name) => Ok(Self::Name(name)),
476            fnet_filter::InterfaceMatcher::PortClass(port_class) => {
477                port_class.try_into().map(Self::PortClass).map_err(|e| match e {
478                    fnet_interfaces_ext::UnknownPortClassError::NetInterfaces(_) => {
479                        FidlConversionError::UnknownUnionVariant(
480                            type_names::NET_INTERFACES_PORT_CLASS,
481                        )
482                    }
483                    fnet_interfaces_ext::UnknownPortClassError::HardwareNetwork(_) => {
484                        FidlConversionError::UnknownUnionVariant(
485                            type_names::HARDWARE_NETWORK_PORT_CLASS,
486                        )
487                    }
488                })
489            }
490            fnet_filter::InterfaceMatcher::__SourceBreaking { .. } => {
491                Err(FidlConversionError::UnknownUnionVariant(type_names::INTERFACE_MATCHER))
492            }
493        }
494    }
495}
496
497/// Extension type for the `Subnet` variant of [`fnet_filter::AddressMatcherType`].
498///
499/// This type witnesses to the invariant that the prefix length of the subnet is
500/// no greater than the number of bits in the IP address, and that no host bits
501/// in the network address are set.
502#[derive(Clone, Copy, Eq, Hash, PartialEq)]
503pub struct Subnet(fnet::Subnet);
504
505impl Subnet {
506    pub fn get(&self) -> fnet::Subnet {
507        let Subnet(subnet) = &self;
508        *subnet
509    }
510}
511
512impl From<Subnet> for fnet::Subnet {
513    fn from(subnet: Subnet) -> Self {
514        let Subnet(subnet) = subnet;
515        subnet
516    }
517}
518
519impl TryFrom<fnet::Subnet> for Subnet {
520    type Error = FidlConversionError;
521
522    fn try_from(subnet: fnet::Subnet) -> Result<Self, Self::Error> {
523        let fnet::Subnet { addr, prefix_len } = subnet;
524
525        // We convert to `net_types::ip::Subnet` to validate the subnet's
526        // properties, but we don't store the subnet as that type because we
527        // want to avoid forcing all `Resource` types in this library to be
528        // parameterized on IP version.
529        let result = match addr {
530            fnet::IpAddress::Ipv4(v4) => {
531                net_types::ip::Subnet::<net_types::ip::Ipv4Addr>::new(v4.into_ext(), prefix_len)
532                    .map(|_| Subnet(subnet))
533            }
534            fnet::IpAddress::Ipv6(v6) => {
535                net_types::ip::Subnet::<net_types::ip::Ipv6Addr>::new(v6.into_ext(), prefix_len)
536                    .map(|_| Subnet(subnet))
537            }
538        };
539        result.map_err(|e| match e {
540            net_types::ip::SubnetError::PrefixTooLong => FidlConversionError::SubnetPrefixTooLong,
541            net_types::ip::SubnetError::HostBitsSet => FidlConversionError::SubnetHostBitsSet,
542        })
543    }
544}
545
546impl Debug for Subnet {
547    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
548        let fnet::Subnet { addr, prefix_len } = self.0;
549
550        match addr {
551            fnet::IpAddress::Ipv4(v4) => {
552                let subnet = net_types::ip::Subnet::<net_types::ip::Ipv4Addr>::new(
553                    v4.into_ext(),
554                    prefix_len,
555                );
556
557                match subnet {
558                    Ok(inner) => inner.fmt(f),
559                    Err(err) => err.fmt(f),
560                }
561            }
562            fnet::IpAddress::Ipv6(v6) => {
563                let subnet = net_types::ip::Subnet::<net_types::ip::Ipv6Addr>::new(
564                    v6.into_ext(),
565                    prefix_len,
566                );
567
568                match subnet {
569                    Ok(inner) => inner.fmt(f),
570                    Err(err) => err.fmt(f),
571                }
572            }
573        }
574    }
575}
576
577/// Extension type for [`fnet_filter::AddressRange`].
578///
579/// This type witnesses to the invariant that `start` is in the same IP family
580/// as `end`, and that `start <= end`. (Comparisons are performed on the
581/// numerical big-endian representation of the IP address.)
582#[derive(Debug, Clone, PartialEq)]
583pub struct AddressRange {
584    range: RangeInclusive<fnet::IpAddress>,
585}
586
587impl AddressRange {
588    pub fn start(&self) -> fnet::IpAddress {
589        *self.range.start()
590    }
591
592    pub fn end(&self) -> fnet::IpAddress {
593        *self.range.end()
594    }
595}
596
597impl From<AddressRange> for fnet_filter::AddressRange {
598    fn from(range: AddressRange) -> Self {
599        Self { start: range.start(), end: range.end() }
600    }
601}
602
603impl TryFrom<fnet_filter::AddressRange> for AddressRange {
604    type Error = FidlConversionError;
605
606    fn try_from(range: fnet_filter::AddressRange) -> Result<Self, Self::Error> {
607        let fnet_filter::AddressRange { start, end } = range;
608        match (start, end) {
609            (
610                fnet::IpAddress::Ipv4(fnet::Ipv4Address { addr: start_bytes }),
611                fnet::IpAddress::Ipv4(fnet::Ipv4Address { addr: end_bytes }),
612            ) => {
613                if u32::from_be_bytes(start_bytes) > u32::from_be_bytes(end_bytes) {
614                    Err(FidlConversionError::InvalidAddressRange)
615                } else {
616                    Ok(Self { range: start..=end })
617                }
618            }
619            (
620                fnet::IpAddress::Ipv6(fnet::Ipv6Address { addr: start_bytes }),
621                fnet::IpAddress::Ipv6(fnet::Ipv6Address { addr: end_bytes }),
622            ) => {
623                if u128::from_be_bytes(start_bytes) > u128::from_be_bytes(end_bytes) {
624                    Err(FidlConversionError::InvalidAddressRange)
625                } else {
626                    Ok(Self { range: start..=end })
627                }
628            }
629            _ => Err(FidlConversionError::AddressRangeFamilyMismatch),
630        }
631    }
632}
633
634/// Extension type for [`fnet_filter::AddressMatcherType`].
635#[derive(Clone, PartialEq)]
636pub enum AddressMatcherType {
637    Subnet(Subnet),
638    Range(AddressRange),
639}
640
641impl From<AddressMatcherType> for fnet_filter::AddressMatcherType {
642    fn from(matcher: AddressMatcherType) -> Self {
643        match matcher {
644            AddressMatcherType::Subnet(subnet) => Self::Subnet(subnet.into()),
645            AddressMatcherType::Range(range) => Self::Range(range.into()),
646        }
647    }
648}
649
650impl TryFrom<fnet_filter::AddressMatcherType> for AddressMatcherType {
651    type Error = FidlConversionError;
652
653    fn try_from(matcher: fnet_filter::AddressMatcherType) -> Result<Self, Self::Error> {
654        match matcher {
655            fnet_filter::AddressMatcherType::Subnet(subnet) => Ok(Self::Subnet(subnet.try_into()?)),
656            fnet_filter::AddressMatcherType::Range(range) => Ok(Self::Range(range.try_into()?)),
657            fnet_filter::AddressMatcherType::__SourceBreaking { .. } => {
658                Err(FidlConversionError::UnknownUnionVariant(type_names::ADDRESS_MATCHER_TYPE))
659            }
660        }
661    }
662}
663
664impl Debug for AddressMatcherType {
665    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
666        match self {
667            AddressMatcherType::Subnet(subnet) => subnet.fmt(f),
668            AddressMatcherType::Range(address_range) => address_range.fmt(f),
669        }
670    }
671}
672
673/// Extension type for [`fnet_filter::AddressMatcher`].
674#[derive(Debug, Clone, PartialEq)]
675pub struct AddressMatcher {
676    pub matcher: AddressMatcherType,
677    pub invert: bool,
678}
679
680impl From<AddressMatcher> for fnet_filter::AddressMatcher {
681    fn from(matcher: AddressMatcher) -> Self {
682        let AddressMatcher { matcher, invert } = matcher;
683        Self { matcher: matcher.into(), invert }
684    }
685}
686
687impl TryFrom<fnet_filter::AddressMatcher> for AddressMatcher {
688    type Error = FidlConversionError;
689
690    fn try_from(matcher: fnet_filter::AddressMatcher) -> Result<Self, Self::Error> {
691        let fnet_filter::AddressMatcher { matcher, invert } = matcher;
692        Ok(Self { matcher: matcher.try_into()?, invert })
693    }
694}
695
696/// Extension type for [`fnet_filter::PortMatcher`].
697///
698/// This type witnesses to the invariant that `start <= end`.
699#[derive(Debug, Clone, PartialEq)]
700pub struct PortMatcher {
701    range: RangeInclusive<u16>,
702    pub invert: bool,
703}
704
705/// Errors when creating a `PortMatcher`.
706#[derive(Debug, Error, PartialEq)]
707pub enum PortMatcherError {
708    #[error("invalid port range (start must be <= end)")]
709    InvalidPortRange,
710}
711
712impl PortMatcher {
713    pub fn new(start: u16, end: u16, invert: bool) -> Result<Self, PortMatcherError> {
714        if start > end {
715            return Err(PortMatcherError::InvalidPortRange);
716        }
717        Ok(Self { range: start..=end, invert })
718    }
719
720    pub fn range(&self) -> &RangeInclusive<u16> {
721        &self.range
722    }
723
724    pub fn start(&self) -> u16 {
725        *self.range.start()
726    }
727
728    pub fn end(&self) -> u16 {
729        *self.range.end()
730    }
731}
732
733impl From<PortMatcher> for fnet_filter::PortMatcher {
734    fn from(matcher: PortMatcher) -> Self {
735        let PortMatcher { range, invert } = matcher;
736        Self { start: *range.start(), end: *range.end(), invert }
737    }
738}
739
740impl TryFrom<fnet_filter::PortMatcher> for PortMatcher {
741    type Error = FidlConversionError;
742
743    fn try_from(matcher: fnet_filter::PortMatcher) -> Result<Self, Self::Error> {
744        let fnet_filter::PortMatcher { start, end, invert } = matcher;
745        if start > end {
746            return Err(FidlConversionError::InvalidPortMatcherRange);
747        }
748        Ok(Self { range: start..=end, invert })
749    }
750}
751
752/// Extension type for [`fnet_filter::TransportProtocol`].
753#[derive(Clone, PartialEq)]
754pub enum TransportProtocolMatcher {
755    Tcp { src_port: Option<PortMatcher>, dst_port: Option<PortMatcher> },
756    Udp { src_port: Option<PortMatcher>, dst_port: Option<PortMatcher> },
757    Icmp,
758    Icmpv6,
759}
760
761impl From<TransportProtocolMatcher> for fnet_filter::TransportProtocol {
762    fn from(matcher: TransportProtocolMatcher) -> Self {
763        match matcher {
764            TransportProtocolMatcher::Tcp { src_port, dst_port } => {
765                Self::Tcp(fnet_filter::TcpMatcher {
766                    src_port: src_port.map(Into::into),
767                    dst_port: dst_port.map(Into::into),
768                    __source_breaking: SourceBreaking,
769                })
770            }
771            TransportProtocolMatcher::Udp { src_port, dst_port } => {
772                Self::Udp(fnet_filter::UdpMatcher {
773                    src_port: src_port.map(Into::into),
774                    dst_port: dst_port.map(Into::into),
775                    __source_breaking: SourceBreaking,
776                })
777            }
778            TransportProtocolMatcher::Icmp => Self::Icmp(fnet_filter::IcmpMatcher::default()),
779            TransportProtocolMatcher::Icmpv6 => Self::Icmpv6(fnet_filter::Icmpv6Matcher::default()),
780        }
781    }
782}
783
784impl TryFrom<fnet_filter::TransportProtocol> for TransportProtocolMatcher {
785    type Error = FidlConversionError;
786
787    fn try_from(matcher: fnet_filter::TransportProtocol) -> Result<Self, Self::Error> {
788        match matcher {
789            fnet_filter::TransportProtocol::Tcp(fnet_filter::TcpMatcher {
790                src_port,
791                dst_port,
792                __source_breaking,
793            }) => Ok(Self::Tcp {
794                src_port: src_port.map(TryInto::try_into).transpose()?,
795                dst_port: dst_port.map(TryInto::try_into).transpose()?,
796            }),
797            fnet_filter::TransportProtocol::Udp(fnet_filter::UdpMatcher {
798                src_port,
799                dst_port,
800                __source_breaking,
801            }) => Ok(Self::Udp {
802                src_port: src_port.map(TryInto::try_into).transpose()?,
803                dst_port: dst_port.map(TryInto::try_into).transpose()?,
804            }),
805            fnet_filter::TransportProtocol::Icmp(fnet_filter::IcmpMatcher {
806                __source_breaking,
807            }) => Ok(Self::Icmp),
808            fnet_filter::TransportProtocol::Icmpv6(fnet_filter::Icmpv6Matcher {
809                __source_breaking,
810            }) => Ok(Self::Icmpv6),
811            fnet_filter::TransportProtocol::__SourceBreaking { .. } => {
812                Err(FidlConversionError::UnknownUnionVariant(type_names::TRANSPORT_PROTOCOL))
813            }
814        }
815    }
816}
817
818impl Debug for TransportProtocolMatcher {
819    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
820        // Omit empty fields.
821        match self {
822            TransportProtocolMatcher::Tcp { src_port, dst_port } => {
823                let mut debug_struct = f.debug_struct("Tcp");
824
825                // Omit empty fields.
826                if let Some(port) = &src_port {
827                    let _ = debug_struct.field("src_port", port);
828                }
829
830                if let Some(port) = &dst_port {
831                    let _ = debug_struct.field("dst_port", port);
832                }
833
834                debug_struct.finish()
835            }
836            TransportProtocolMatcher::Udp { src_port, dst_port } => {
837                let mut debug_struct = f.debug_struct("Udp");
838
839                // Omit empty fields.
840                if let Some(port) = &src_port {
841                    let _ = debug_struct.field("src_port", port);
842                }
843
844                if let Some(port) = &dst_port {
845                    let _ = debug_struct.field("dst_port", port);
846                }
847
848                debug_struct.finish()
849            }
850            TransportProtocolMatcher::Icmp => f.write_str("Icmp"),
851            TransportProtocolMatcher::Icmpv6 => f.write_str("Icmpv6"),
852        }
853    }
854}
855
856/// Extension type for [`fnet_filter::Matchers`].
857#[derive(Default, Clone, PartialEq)]
858pub struct Matchers {
859    pub in_interface: Option<InterfaceMatcher>,
860    pub out_interface: Option<InterfaceMatcher>,
861    pub src_addr: Option<AddressMatcher>,
862    pub dst_addr: Option<AddressMatcher>,
863    pub transport_protocol: Option<TransportProtocolMatcher>,
864}
865
866impl From<Matchers> for fnet_filter::Matchers {
867    fn from(matchers: Matchers) -> Self {
868        let Matchers { in_interface, out_interface, src_addr, dst_addr, transport_protocol } =
869            matchers;
870        Self {
871            in_interface: in_interface.map(Into::into),
872            out_interface: out_interface.map(Into::into),
873            src_addr: src_addr.map(Into::into),
874            dst_addr: dst_addr.map(Into::into),
875            transport_protocol: transport_protocol.map(Into::into),
876            __source_breaking: SourceBreaking,
877        }
878    }
879}
880
881impl TryFrom<fnet_filter::Matchers> for Matchers {
882    type Error = FidlConversionError;
883
884    fn try_from(matchers: fnet_filter::Matchers) -> Result<Self, Self::Error> {
885        let fnet_filter::Matchers {
886            in_interface,
887            out_interface,
888            src_addr,
889            dst_addr,
890            transport_protocol,
891            __source_breaking,
892        } = matchers;
893        Ok(Self {
894            in_interface: in_interface.map(TryInto::try_into).transpose()?,
895            out_interface: out_interface.map(TryInto::try_into).transpose()?,
896            src_addr: src_addr.map(TryInto::try_into).transpose()?,
897            dst_addr: dst_addr.map(TryInto::try_into).transpose()?,
898            transport_protocol: transport_protocol.map(TryInto::try_into).transpose()?,
899        })
900    }
901}
902
903impl Debug for Matchers {
904    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
905        let mut debug_struct = f.debug_struct("Matchers");
906
907        let Matchers { in_interface, out_interface, src_addr, dst_addr, transport_protocol } =
908            &self;
909
910        // Omit empty fields.
911        if let Some(matcher) = in_interface {
912            let _ = debug_struct.field("in_interface", matcher);
913        }
914
915        if let Some(matcher) = out_interface {
916            let _ = debug_struct.field("out_interface", matcher);
917        }
918
919        if let Some(matcher) = src_addr {
920            let _ = debug_struct.field("src_addr", matcher);
921        }
922
923        if let Some(matcher) = dst_addr {
924            let _ = debug_struct.field("dst_addr", matcher);
925        }
926
927        if let Some(matcher) = transport_protocol {
928            let _ = debug_struct.field("transport_protocol", matcher);
929        }
930
931        debug_struct.finish()
932    }
933}
934
935/// Extension type for [`fnet_filter::Action`].
936#[derive(Debug, Clone, PartialEq)]
937pub enum Action {
938    Accept,
939    Drop,
940    Jump(String),
941    Return,
942    TransparentProxy(TransparentProxy),
943    Redirect { dst_port: Option<PortRange> },
944    Masquerade { src_port: Option<PortRange> },
945    Mark { domain: fnet::MarkDomain, action: MarkAction },
946}
947
948#[derive(Debug, Clone, PartialEq)]
949pub enum MarkAction {
950    SetMark { clearing_mask: fnet::Mark, mark: fnet::Mark },
951}
952
953/// Extension type for [`fnet_filter::TransparentProxy_`].
954#[derive(Debug, Clone, PartialEq)]
955pub enum TransparentProxy {
956    LocalAddr(fnet::IpAddress),
957    LocalPort(NonZeroU16),
958    LocalAddrAndPort(fnet::IpAddress, NonZeroU16),
959}
960
961#[derive(Debug, Clone, PartialEq)]
962pub struct PortRange(pub RangeInclusive<NonZeroU16>);
963
964impl From<PortRange> for fnet_filter::PortRange {
965    fn from(range: PortRange) -> Self {
966        let PortRange(range) = range;
967        Self { start: range.start().get(), end: range.end().get() }
968    }
969}
970
971impl TryFrom<fnet_filter::PortRange> for PortRange {
972    type Error = FidlConversionError;
973
974    fn try_from(range: fnet_filter::PortRange) -> Result<Self, Self::Error> {
975        let fnet_filter::PortRange { start, end } = range;
976        if start > end {
977            Err(FidlConversionError::InvalidPortRange)
978        } else {
979            let start = NonZeroU16::new(start).ok_or(FidlConversionError::UnspecifiedNatPort)?;
980            let end = NonZeroU16::new(end).ok_or(FidlConversionError::UnspecifiedNatPort)?;
981            Ok(Self(start..=end))
982        }
983    }
984}
985
986impl From<Action> for fnet_filter::Action {
987    fn from(action: Action) -> Self {
988        match action {
989            Action::Accept => Self::Accept(fnet_filter::Empty {}),
990            Action::Drop => Self::Drop(fnet_filter::Empty {}),
991            Action::Jump(target) => Self::Jump(target),
992            Action::Return => Self::Return_(fnet_filter::Empty {}),
993            Action::TransparentProxy(proxy) => Self::TransparentProxy(match proxy {
994                TransparentProxy::LocalAddr(addr) => {
995                    fnet_filter::TransparentProxy_::LocalAddr(addr)
996                }
997                TransparentProxy::LocalPort(port) => {
998                    fnet_filter::TransparentProxy_::LocalPort(port.get())
999                }
1000                TransparentProxy::LocalAddrAndPort(addr, port) => {
1001                    fnet_filter::TransparentProxy_::LocalAddrAndPort(fnet_filter::SocketAddr {
1002                        addr,
1003                        port: port.get(),
1004                    })
1005                }
1006            }),
1007            Action::Redirect { dst_port } => Self::Redirect(fnet_filter::Redirect {
1008                dst_port: dst_port.map(Into::into),
1009                __source_breaking: SourceBreaking,
1010            }),
1011            Action::Masquerade { src_port } => Self::Masquerade(fnet_filter::Masquerade {
1012                src_port: src_port.map(Into::into),
1013                __source_breaking: SourceBreaking,
1014            }),
1015            Action::Mark { domain, action } => {
1016                Self::Mark(fnet_filter::Mark { domain, action: action.into() })
1017            }
1018        }
1019    }
1020}
1021
1022impl TryFrom<fnet_filter::Action> for Action {
1023    type Error = FidlConversionError;
1024
1025    fn try_from(action: fnet_filter::Action) -> Result<Self, Self::Error> {
1026        match action {
1027            fnet_filter::Action::Accept(fnet_filter::Empty {}) => Ok(Self::Accept),
1028            fnet_filter::Action::Drop(fnet_filter::Empty {}) => Ok(Self::Drop),
1029            fnet_filter::Action::Jump(target) => Ok(Self::Jump(target)),
1030            fnet_filter::Action::Return_(fnet_filter::Empty {}) => Ok(Self::Return),
1031            fnet_filter::Action::TransparentProxy(proxy) => {
1032                Ok(Self::TransparentProxy(match proxy {
1033                    fnet_filter::TransparentProxy_::LocalAddr(addr) => {
1034                        TransparentProxy::LocalAddr(addr)
1035                    }
1036                    fnet_filter::TransparentProxy_::LocalPort(port) => {
1037                        let port = NonZeroU16::new(port)
1038                            .ok_or(FidlConversionError::UnspecifiedTransparentProxyPort)?;
1039                        TransparentProxy::LocalPort(port)
1040                    }
1041                    fnet_filter::TransparentProxy_::LocalAddrAndPort(fnet_filter::SocketAddr {
1042                        addr,
1043                        port,
1044                    }) => {
1045                        let port = NonZeroU16::new(port)
1046                            .ok_or(FidlConversionError::UnspecifiedTransparentProxyPort)?;
1047                        TransparentProxy::LocalAddrAndPort(addr, port)
1048                    }
1049                    fnet_filter::TransparentProxy_::__SourceBreaking { .. } => {
1050                        return Err(FidlConversionError::UnknownUnionVariant(
1051                            type_names::TRANSPARENT_PROXY,
1052                        ))
1053                    }
1054                }))
1055            }
1056            fnet_filter::Action::Redirect(fnet_filter::Redirect {
1057                dst_port,
1058                __source_breaking,
1059            }) => Ok(Self::Redirect { dst_port: dst_port.map(TryInto::try_into).transpose()? }),
1060            fnet_filter::Action::Masquerade(fnet_filter::Masquerade {
1061                src_port,
1062                __source_breaking,
1063            }) => Ok(Self::Masquerade { src_port: src_port.map(TryInto::try_into).transpose()? }),
1064            fnet_filter::Action::Mark(fnet_filter::Mark { domain, action }) => {
1065                Ok(Self::Mark { domain, action: action.try_into()? })
1066            }
1067            fnet_filter::Action::__SourceBreaking { .. } => {
1068                Err(FidlConversionError::UnknownUnionVariant(type_names::ACTION))
1069            }
1070        }
1071    }
1072}
1073
1074impl From<MarkAction> for fnet_filter::MarkAction {
1075    fn from(action: MarkAction) -> Self {
1076        match action {
1077            MarkAction::SetMark { clearing_mask, mark } => {
1078                Self::SetMark(fnet_filter::SetMark { clearing_mask, mark })
1079            }
1080        }
1081    }
1082}
1083
1084impl TryFrom<fnet_filter::MarkAction> for MarkAction {
1085    type Error = FidlConversionError;
1086    fn try_from(action: fnet_filter::MarkAction) -> Result<Self, Self::Error> {
1087        match action {
1088            fnet_filter::MarkAction::SetMark(fnet_filter::SetMark { clearing_mask, mark }) => {
1089                Ok(Self::SetMark { clearing_mask, mark })
1090            }
1091            fnet_filter::MarkAction::__SourceBreaking { .. } => {
1092                Err(FidlConversionError::UnknownUnionVariant(type_names::MARK_ACTION))
1093            }
1094        }
1095    }
1096}
1097
1098/// Extension type for [`fnet_filter::Rule`].
1099#[derive(Debug, Clone, PartialEq)]
1100pub struct Rule {
1101    pub id: RuleId,
1102    pub matchers: Matchers,
1103    pub action: Action,
1104}
1105
1106impl From<Rule> for fnet_filter::Rule {
1107    fn from(rule: Rule) -> Self {
1108        let Rule { id, matchers, action } = rule;
1109        Self { id: id.into(), matchers: matchers.into(), action: action.into() }
1110    }
1111}
1112
1113impl TryFrom<fnet_filter::Rule> for Rule {
1114    type Error = FidlConversionError;
1115
1116    fn try_from(rule: fnet_filter::Rule) -> Result<Self, Self::Error> {
1117        let fnet_filter::Rule { id, matchers, action } = rule;
1118        Ok(Self { id: id.into(), matchers: matchers.try_into()?, action: action.try_into()? })
1119    }
1120}
1121
1122/// Extension type for [`fnet_filter::Resource`].
1123#[derive(Debug, Clone, PartialEq)]
1124pub enum Resource {
1125    Namespace(Namespace),
1126    Routine(Routine),
1127    Rule(Rule),
1128}
1129
1130impl Resource {
1131    pub fn id(&self) -> ResourceId {
1132        match self {
1133            Self::Namespace(Namespace { id, domain: _ }) => ResourceId::Namespace(id.clone()),
1134            Self::Routine(Routine { id, routine_type: _ }) => ResourceId::Routine(id.clone()),
1135            Self::Rule(Rule { id, matchers: _, action: _ }) => ResourceId::Rule(id.clone()),
1136        }
1137    }
1138}
1139
1140impl From<Resource> for fnet_filter::Resource {
1141    fn from(resource: Resource) -> Self {
1142        match resource {
1143            Resource::Namespace(namespace) => Self::Namespace(namespace.into()),
1144            Resource::Routine(routine) => Self::Routine(routine.into()),
1145            Resource::Rule(rule) => Self::Rule(rule.into()),
1146        }
1147    }
1148}
1149
1150impl TryFrom<fnet_filter::Resource> for Resource {
1151    type Error = FidlConversionError;
1152
1153    fn try_from(resource: fnet_filter::Resource) -> Result<Self, Self::Error> {
1154        match resource {
1155            fnet_filter::Resource::Namespace(namespace) => {
1156                Ok(Self::Namespace(namespace.try_into()?))
1157            }
1158            fnet_filter::Resource::Routine(routine) => Ok(Self::Routine(routine.try_into()?)),
1159            fnet_filter::Resource::Rule(rule) => Ok(Self::Rule(rule.try_into()?)),
1160            fnet_filter::Resource::__SourceBreaking { .. } => {
1161                Err(FidlConversionError::UnknownUnionVariant(type_names::RESOURCE))
1162            }
1163        }
1164    }
1165}
1166
1167/// Extension type for [`fnet_filter::ControllerId`].
1168#[derive(Debug, Clone, PartialEq, Eq, Hash, PartialOrd, Ord)]
1169pub struct ControllerId(pub String);
1170
1171/// Extension type for [`fnet_filter::Event`].
1172#[derive(Debug, Clone, PartialEq)]
1173pub enum Event {
1174    Existing(ControllerId, Resource),
1175    Idle,
1176    Added(ControllerId, Resource),
1177    Removed(ControllerId, ResourceId),
1178    EndOfUpdate,
1179}
1180
1181impl From<Event> for fnet_filter::Event {
1182    fn from(event: Event) -> Self {
1183        match event {
1184            Event::Existing(controller, resource) => {
1185                let ControllerId(id) = controller;
1186                Self::Existing(fnet_filter::ExistingResource {
1187                    controller: id,
1188                    resource: resource.into(),
1189                })
1190            }
1191            Event::Idle => Self::Idle(fnet_filter::Empty {}),
1192            Event::Added(controller, resource) => {
1193                let ControllerId(id) = controller;
1194                Self::Added(fnet_filter::AddedResource {
1195                    controller: id,
1196                    resource: resource.into(),
1197                })
1198            }
1199            Event::Removed(controller, resource) => {
1200                let ControllerId(id) = controller;
1201                Self::Removed(fnet_filter::RemovedResource {
1202                    controller: id,
1203                    resource: resource.into(),
1204                })
1205            }
1206            Event::EndOfUpdate => Self::EndOfUpdate(fnet_filter::Empty {}),
1207        }
1208    }
1209}
1210
1211impl TryFrom<fnet_filter::Event> for Event {
1212    type Error = FidlConversionError;
1213
1214    fn try_from(event: fnet_filter::Event) -> Result<Self, Self::Error> {
1215        match event {
1216            fnet_filter::Event::Existing(fnet_filter::ExistingResource {
1217                controller,
1218                resource,
1219            }) => Ok(Self::Existing(ControllerId(controller), resource.try_into()?)),
1220            fnet_filter::Event::Idle(fnet_filter::Empty {}) => Ok(Self::Idle),
1221            fnet_filter::Event::Added(fnet_filter::AddedResource { controller, resource }) => {
1222                Ok(Self::Added(ControllerId(controller), resource.try_into()?))
1223            }
1224            fnet_filter::Event::Removed(fnet_filter::RemovedResource { controller, resource }) => {
1225                Ok(Self::Removed(ControllerId(controller), resource.try_into()?))
1226            }
1227            fnet_filter::Event::EndOfUpdate(fnet_filter::Empty {}) => Ok(Self::EndOfUpdate),
1228            fnet_filter::Event::__SourceBreaking { .. } => {
1229                Err(FidlConversionError::UnknownUnionVariant(type_names::EVENT))
1230            }
1231        }
1232    }
1233}
1234
1235/// Filter watcher creation errors.
1236#[derive(Debug, Error)]
1237pub enum WatcherCreationError {
1238    #[error("failed to create filter watcher proxy: {0}")]
1239    CreateProxy(fidl::Error),
1240    #[error("failed to get filter watcher: {0}")]
1241    GetWatcher(fidl::Error),
1242}
1243
1244/// Filter watcher `Watch` errors.
1245#[derive(Debug, Error)]
1246pub enum WatchError {
1247    /// The call to `Watch` returned a FIDL error.
1248    #[error("the call to `Watch()` failed: {0}")]
1249    Fidl(fidl::Error),
1250    /// The event returned by `Watch` encountered a conversion error.
1251    #[error("failed to convert event returned by `Watch()`: {0}")]
1252    Conversion(FidlConversionError),
1253    /// The server returned an empty batch of events.
1254    #[error("the call to `Watch()` returned an empty batch of events")]
1255    EmptyEventBatch,
1256}
1257
1258/// Connects to the watcher protocol and converts the Hanging-Get style API into
1259/// an Event stream.
1260///
1261/// Each call to `Watch` returns a batch of events, which are flattened into a
1262/// single stream. If an error is encountered while calling `Watch` or while
1263/// converting the event, the stream is immediately terminated.
1264pub fn event_stream_from_state(
1265    state: fnet_filter::StateProxy,
1266) -> Result<impl Stream<Item = Result<Event, WatchError>>, WatcherCreationError> {
1267    let (watcher, server_end) = fidl::endpoints::create_proxy::<fnet_filter::WatcherMarker>();
1268    state
1269        .get_watcher(&fnet_filter::WatcherOptions::default(), server_end)
1270        .map_err(WatcherCreationError::GetWatcher)?;
1271
1272    let stream = futures::stream::try_unfold(watcher, |watcher| async {
1273        let events = watcher.watch().await.map_err(WatchError::Fidl)?;
1274        if events.is_empty() {
1275            return Err(WatchError::EmptyEventBatch);
1276        }
1277
1278        let event_stream = futures::stream::iter(events).map(Ok).and_then(|event| {
1279            futures::future::ready(event.try_into().map_err(WatchError::Conversion))
1280        });
1281        Ok(Some((event_stream, watcher)))
1282    })
1283    .try_flatten();
1284
1285    Ok(stream)
1286}
1287
1288/// Errors returned by [`get_existing_resources`].
1289#[derive(Debug, Error)]
1290pub enum GetExistingResourcesError {
1291    /// There was an error in the event stream.
1292    #[error("there was an error in the event stream: {0}")]
1293    ErrorInStream(WatchError),
1294    /// There was an unexpected event in the event stream. Only `existing` or
1295    /// `idle` events are expected.
1296    #[error("there was an unexpected event in the event stream: {0:?}")]
1297    UnexpectedEvent(Event),
1298    /// A duplicate existing resource was reported in the event stream.
1299    #[error("a duplicate existing resource was reported")]
1300    DuplicateResource(Resource),
1301    /// The event stream unexpectedly ended.
1302    #[error("the event stream unexpectedly ended")]
1303    StreamEnded,
1304}
1305
1306/// A trait for types holding filtering state that can be updated by change
1307/// events.
1308pub trait Update {
1309    /// Add the resource to the specified controller's state.
1310    ///
1311    /// Optionally returns a resource that has already been added to the
1312    /// controller with the same [`ResourceId`].
1313    fn add(&mut self, controller: ControllerId, resource: Resource) -> Option<Resource>;
1314
1315    /// Remove the resource from the specified controller's state.
1316    ///
1317    /// Returns the removed resource, if present.
1318    fn remove(&mut self, controller: ControllerId, resource: &ResourceId) -> Option<Resource>;
1319}
1320
1321impl Update for HashMap<ControllerId, HashMap<ResourceId, Resource>> {
1322    fn add(&mut self, controller: ControllerId, resource: Resource) -> Option<Resource> {
1323        self.entry(controller).or_default().insert(resource.id(), resource)
1324    }
1325
1326    fn remove(&mut self, controller: ControllerId, resource: &ResourceId) -> Option<Resource> {
1327        self.get_mut(&controller)?.remove(resource)
1328    }
1329}
1330
1331/// Collects all `existing` events from the stream, stopping once the `idle`
1332/// event is observed.
1333pub async fn get_existing_resources<C: Update + Default>(
1334    stream: impl Stream<Item = Result<Event, WatchError>>,
1335) -> Result<C, GetExistingResourcesError> {
1336    async_utils::fold::fold_while(
1337        stream,
1338        Ok(C::default()),
1339        |resources: Result<C, GetExistingResourcesError>, event| {
1340            let mut resources =
1341                resources.expect("`resources` must be `Ok`, because we stop folding on err");
1342            futures::future::ready(match event {
1343                Err(e) => FoldWhile::Done(Err(GetExistingResourcesError::ErrorInStream(e))),
1344                Ok(e) => match e {
1345                    Event::Existing(controller, resource) => {
1346                        if let Some(resource) = resources.add(controller, resource) {
1347                            FoldWhile::Done(Err(GetExistingResourcesError::DuplicateResource(
1348                                resource,
1349                            )))
1350                        } else {
1351                            FoldWhile::Continue(Ok(resources))
1352                        }
1353                    }
1354                    Event::Idle => FoldWhile::Done(Ok(resources)),
1355                    e @ (Event::Added(_, _) | Event::Removed(_, _) | Event::EndOfUpdate) => {
1356                        FoldWhile::Done(Err(GetExistingResourcesError::UnexpectedEvent(e)))
1357                    }
1358                },
1359            })
1360        },
1361    )
1362    .await
1363    .short_circuited()
1364    .map_err(|_resources| GetExistingResourcesError::StreamEnded)?
1365}
1366
1367/// Errors returned by [`wait_for_condition`].
1368#[derive(Debug, Error)]
1369pub enum WaitForConditionError {
1370    /// There was an error in the event stream.
1371    #[error("there was an error in the event stream: {0}")]
1372    ErrorInStream(WatchError),
1373    /// There was an `Added` event for an already existing resource.
1374    #[error("observed an added event for an already existing resource: {0:?}")]
1375    AddedAlreadyExisting(Resource),
1376    /// There was a `Removed` event for a non-existent resource.
1377    #[error("observed a removed event for a non-existent resource: {0:?}")]
1378    RemovedNonExistent(ResourceId),
1379    /// The event stream unexpectedly ended.
1380    #[error("the event stream unexpectedly ended")]
1381    StreamEnded,
1382}
1383
1384/// Wait for a condition on filtering state to be satisfied.
1385///
1386/// With the given `initial_state`, take events from `event_stream` and update
1387/// the state, calling `predicate` whenever the state changes. When predicates
1388/// returns `True` yield `Ok(())`.
1389pub async fn wait_for_condition<
1390    C: Update,
1391    S: Stream<Item = Result<Event, WatchError>>,
1392    F: Fn(&C) -> bool,
1393>(
1394    event_stream: S,
1395    initial_state: &mut C,
1396    predicate: F,
1397) -> Result<(), WaitForConditionError> {
1398    async_utils::fold::try_fold_while(
1399        event_stream.map_err(WaitForConditionError::ErrorInStream),
1400        initial_state,
1401        |resources: &mut C, event| {
1402            futures::future::ready(match event {
1403                Event::Existing(controller, resource) | Event::Added(controller, resource) => {
1404                    if let Some(resource) = resources.add(controller, resource) {
1405                        Err(WaitForConditionError::AddedAlreadyExisting(resource))
1406                    } else {
1407                        Ok(FoldWhile::Continue(resources))
1408                    }
1409                }
1410                Event::Removed(controller, resource) => resources
1411                    .remove(controller, &resource)
1412                    .map(|_| FoldWhile::Continue(resources))
1413                    .ok_or(WaitForConditionError::RemovedNonExistent(resource)),
1414                // Wait until a transactional update has been completed to call
1415                // the predicate so it's not run against partially-updated
1416                // state.
1417                Event::Idle | Event::EndOfUpdate => {
1418                    if predicate(&resources) {
1419                        Ok(FoldWhile::Done(()))
1420                    } else {
1421                        Ok(FoldWhile::Continue(resources))
1422                    }
1423                }
1424            })
1425        },
1426    )
1427    .await?
1428    .short_circuited()
1429    .map_err(|_resources: &mut C| WaitForConditionError::StreamEnded)
1430}
1431
1432/// Namespace controller creation errors.
1433#[derive(Debug, Error)]
1434pub enum ControllerCreationError {
1435    #[error("failed to create namespace controller proxy: {0}")]
1436    CreateProxy(fidl::Error),
1437    #[error("failed to open namespace controller: {0}")]
1438    OpenController(fidl::Error),
1439    #[error("server did not emit OnIdAssigned event")]
1440    NoIdAssigned,
1441    #[error("failed to observe ID assignment event: {0}")]
1442    IdAssignment(fidl::Error),
1443}
1444
1445/// Errors for individual changes pushed.
1446///
1447/// Extension type for the error variants of [`fnet_filter::ChangeValidationError`].
1448#[derive(Debug, Error, PartialEq)]
1449pub enum ChangeValidationError {
1450    #[error("change contains a resource that is missing a required field")]
1451    MissingRequiredField,
1452    #[error("rule specifies an invalid interface matcher")]
1453    InvalidInterfaceMatcher,
1454    #[error("rule specifies an invalid address matcher")]
1455    InvalidAddressMatcher,
1456    #[error("rule specifies an invalid port matcher")]
1457    InvalidPortMatcher,
1458    #[error("rule specifies an invalid transparent proxy action")]
1459    InvalidTransparentProxyAction,
1460    #[error("rule specifies an invalid NAT action")]
1461    InvalidNatAction,
1462    #[error("rule specifies an invalid port range")]
1463    InvalidPortRange,
1464}
1465
1466impl TryFrom<fnet_filter::ChangeValidationError> for ChangeValidationError {
1467    type Error = FidlConversionError;
1468
1469    fn try_from(error: fnet_filter::ChangeValidationError) -> Result<Self, Self::Error> {
1470        match error {
1471            fnet_filter::ChangeValidationError::MissingRequiredField => {
1472                Ok(Self::MissingRequiredField)
1473            }
1474            fnet_filter::ChangeValidationError::InvalidInterfaceMatcher => {
1475                Ok(Self::InvalidInterfaceMatcher)
1476            }
1477            fnet_filter::ChangeValidationError::InvalidAddressMatcher => {
1478                Ok(Self::InvalidAddressMatcher)
1479            }
1480            fnet_filter::ChangeValidationError::InvalidPortMatcher => Ok(Self::InvalidPortMatcher),
1481            fnet_filter::ChangeValidationError::InvalidTransparentProxyAction => {
1482                Ok(Self::InvalidTransparentProxyAction)
1483            }
1484            fnet_filter::ChangeValidationError::InvalidNatAction => Ok(Self::InvalidNatAction),
1485            fnet_filter::ChangeValidationError::InvalidPortRange => Ok(Self::InvalidPortRange),
1486            fnet_filter::ChangeValidationError::Ok
1487            | fnet_filter::ChangeValidationError::NotReached => {
1488                Err(FidlConversionError::NotAnError)
1489            }
1490            fnet_filter::ChangeValidationError::__SourceBreaking { unknown_ordinal: _ } => {
1491                Err(FidlConversionError::UnknownUnionVariant(type_names::CHANGE_VALIDATION_ERROR))
1492            }
1493        }
1494    }
1495}
1496
1497/// Errors for the NamespaceController.PushChanges method.
1498#[derive(Debug, Error)]
1499pub enum PushChangesError {
1500    #[error("failed to call FIDL method: {0}")]
1501    CallMethod(fidl::Error),
1502    #[error("too many changes were pushed to the server")]
1503    TooManyChanges,
1504    #[error("invalid change(s) pushed: {0:?}")]
1505    ErrorOnChange(Vec<(Change, ChangeValidationError)>),
1506    #[error("unknown FIDL type: {0}")]
1507    FidlConversion(#[from] FidlConversionError),
1508}
1509
1510/// Errors for individual changes committed.
1511///
1512/// Extension type for the error variants of [`fnet_filter::CommitError`].
1513#[derive(Debug, Error, PartialEq)]
1514pub enum ChangeCommitError {
1515    #[error("the change referred to an unknown namespace")]
1516    NamespaceNotFound,
1517    #[error("the change referred to an unknown routine")]
1518    RoutineNotFound,
1519    #[error("the change referred to an unknown rule")]
1520    RuleNotFound,
1521    #[error("the specified resource already exists")]
1522    AlreadyExists,
1523    #[error("the change includes a rule that jumps to an installed routine")]
1524    TargetRoutineIsInstalled,
1525}
1526
1527impl TryFrom<fnet_filter::CommitError> for ChangeCommitError {
1528    type Error = FidlConversionError;
1529
1530    fn try_from(error: fnet_filter::CommitError) -> Result<Self, Self::Error> {
1531        match error {
1532            fnet_filter::CommitError::NamespaceNotFound => Ok(Self::NamespaceNotFound),
1533            fnet_filter::CommitError::RoutineNotFound => Ok(Self::RoutineNotFound),
1534            fnet_filter::CommitError::RuleNotFound => Ok(Self::RuleNotFound),
1535            fnet_filter::CommitError::AlreadyExists => Ok(Self::AlreadyExists),
1536            fnet_filter::CommitError::TargetRoutineIsInstalled => {
1537                Ok(Self::TargetRoutineIsInstalled)
1538            }
1539            fnet_filter::CommitError::Ok | fnet_filter::CommitError::NotReached => {
1540                Err(FidlConversionError::NotAnError)
1541            }
1542            fnet_filter::CommitError::__SourceBreaking { unknown_ordinal: _ } => {
1543                Err(FidlConversionError::UnknownUnionVariant(type_names::COMMIT_ERROR))
1544            }
1545        }
1546    }
1547}
1548
1549/// Errors for the NamespaceController.Commit method.
1550#[derive(Debug, Error)]
1551pub enum CommitError {
1552    #[error("failed to call FIDL method: {0}")]
1553    CallMethod(fidl::Error),
1554    #[error("rule has a matcher that is unavailable in its context: {0:?}")]
1555    RuleWithInvalidMatcher(RuleId),
1556    #[error("rule has an action that is invalid for its routine: {0:?}")]
1557    RuleWithInvalidAction(RuleId),
1558    #[error(
1559        "rule has a TransparentProxy action but not a valid transport protocol matcher: {0:?}"
1560    )]
1561    TransparentProxyWithInvalidMatcher(RuleId),
1562    #[error(
1563        "rule has a Redirect action that specifies a destination port but not a valid transport \
1564        protocol matcher: {0:?}"
1565    )]
1566    RedirectWithInvalidMatcher(RuleId),
1567    #[error(
1568        "rule has a Masquerade action that specifies a source port but not a valid transport \
1569        protocol matcher: {0:?}"
1570    )]
1571    MasqueradeWithInvalidMatcher(RuleId),
1572    #[error("routine forms a cycle {0:?}")]
1573    CyclicalRoutineGraph(RoutineId),
1574    #[error("invalid change was pushed: {0:?}")]
1575    ErrorOnChange(Vec<(Change, ChangeCommitError)>),
1576    #[error("unknown FIDL type: {0}")]
1577    FidlConversion(#[from] FidlConversionError),
1578}
1579
1580/// Extension type for [`fnet_filter::Change`].
1581#[derive(Debug, Clone, PartialEq)]
1582pub enum Change {
1583    Create(Resource),
1584    Remove(ResourceId),
1585}
1586
1587impl From<Change> for fnet_filter::Change {
1588    fn from(change: Change) -> Self {
1589        match change {
1590            Change::Create(resource) => Self::Create(resource.into()),
1591            Change::Remove(resource) => Self::Remove(resource.into()),
1592        }
1593    }
1594}
1595
1596impl TryFrom<fnet_filter::Change> for Change {
1597    type Error = FidlConversionError;
1598
1599    fn try_from(change: fnet_filter::Change) -> Result<Self, Self::Error> {
1600        match change {
1601            fnet_filter::Change::Create(resource) => Ok(Self::Create(resource.try_into()?)),
1602            fnet_filter::Change::Remove(resource) => Ok(Self::Remove(resource.try_into()?)),
1603            fnet_filter::Change::__SourceBreaking { .. } => {
1604                Err(FidlConversionError::UnknownUnionVariant(type_names::CHANGE))
1605            }
1606        }
1607    }
1608}
1609
1610/// A controller for filtering state.
1611pub struct Controller {
1612    controller: fnet_filter::NamespaceControllerProxy,
1613    // The client provides an ID when creating a new controller, but the server
1614    // may need to assign a different ID to avoid conflicts; either way, the
1615    // server informs the client of the final `ControllerId` on creation.
1616    id: ControllerId,
1617    // Changes that have been pushed to the server but not yet committed. This
1618    // allows the `Controller` to report more informative errors by correlating
1619    // error codes with particular changes.
1620    pending_changes: Vec<Change>,
1621}
1622
1623impl Controller {
1624    pub async fn new_root(
1625        root: &fnet_root::FilterProxy,
1626        ControllerId(id): &ControllerId,
1627    ) -> Result<Self, ControllerCreationError> {
1628        let (controller, server_end) = fidl::endpoints::create_proxy();
1629        root.open_controller(id, server_end).map_err(ControllerCreationError::OpenController)?;
1630
1631        let fnet_filter::NamespaceControllerEvent::OnIdAssigned { id } = controller
1632            .take_event_stream()
1633            .next()
1634            .await
1635            .ok_or(ControllerCreationError::NoIdAssigned)?
1636            .map_err(ControllerCreationError::IdAssignment)?;
1637        Ok(Self { controller, id: ControllerId(id), pending_changes: Vec::new() })
1638    }
1639
1640    /// Creates a new `Controller`.
1641    ///
1642    /// Note that the provided `ControllerId` may need to be modified server-
1643    /// side to avoid collisions; to obtain the final ID assigned to the
1644    /// `Controller`, use the `id` method.
1645    pub async fn new(
1646        control: &fnet_filter::ControlProxy,
1647        ControllerId(id): &ControllerId,
1648    ) -> Result<Self, ControllerCreationError> {
1649        let (controller, server_end) = fidl::endpoints::create_proxy();
1650        control.open_controller(id, server_end).map_err(ControllerCreationError::OpenController)?;
1651
1652        let fnet_filter::NamespaceControllerEvent::OnIdAssigned { id } = controller
1653            .take_event_stream()
1654            .next()
1655            .await
1656            .ok_or(ControllerCreationError::NoIdAssigned)?
1657            .map_err(ControllerCreationError::IdAssignment)?;
1658        Ok(Self { controller, id: ControllerId(id), pending_changes: Vec::new() })
1659    }
1660
1661    pub fn id(&self) -> &ControllerId {
1662        &self.id
1663    }
1664
1665    pub async fn push_changes(&mut self, changes: Vec<Change>) -> Result<(), PushChangesError> {
1666        let fidl_changes = changes.iter().cloned().map(Into::into).collect::<Vec<_>>();
1667        let result = self
1668            .controller
1669            .push_changes(&fidl_changes)
1670            .await
1671            .map_err(PushChangesError::CallMethod)?;
1672        handle_change_validation_result(result, &changes)?;
1673        // Maintain a client-side copy of the pending changes we've pushed to
1674        // the server in order to provide better error messages if a commit
1675        // fails.
1676        self.pending_changes.extend(changes);
1677        Ok(())
1678    }
1679
1680    async fn commit_with_options(
1681        &mut self,
1682        options: fnet_filter::CommitOptions,
1683    ) -> Result<(), CommitError> {
1684        let committed_changes = std::mem::take(&mut self.pending_changes);
1685        let result = self.controller.commit(options).await.map_err(CommitError::CallMethod)?;
1686        handle_commit_result(result, committed_changes)
1687    }
1688
1689    pub async fn commit(&mut self) -> Result<(), CommitError> {
1690        self.commit_with_options(fnet_filter::CommitOptions::default()).await
1691    }
1692
1693    pub async fn commit_idempotent(&mut self) -> Result<(), CommitError> {
1694        self.commit_with_options(fnet_filter::CommitOptions {
1695            idempotent: Some(true),
1696            __source_breaking: SourceBreaking,
1697        })
1698        .await
1699    }
1700}
1701
1702pub(crate) fn handle_change_validation_result(
1703    change_validation_result: fnet_filter::ChangeValidationResult,
1704    changes: &Vec<Change>,
1705) -> Result<(), PushChangesError> {
1706    match change_validation_result {
1707        fnet_filter::ChangeValidationResult::Ok(fnet_filter::Empty {}) => Ok(()),
1708        fnet_filter::ChangeValidationResult::TooManyChanges(fnet_filter::Empty {}) => {
1709            Err(PushChangesError::TooManyChanges)
1710        }
1711        fnet_filter::ChangeValidationResult::ErrorOnChange(results) => {
1712            let errors: Result<_, PushChangesError> =
1713                changes.iter().zip(results).try_fold(Vec::new(), |mut errors, (change, result)| {
1714                    match result {
1715                        fnet_filter::ChangeValidationError::Ok
1716                        | fnet_filter::ChangeValidationError::NotReached => Ok(errors),
1717                        error @ (fnet_filter::ChangeValidationError::MissingRequiredField
1718                        | fnet_filter::ChangeValidationError::InvalidInterfaceMatcher
1719                        | fnet_filter::ChangeValidationError::InvalidAddressMatcher
1720                        | fnet_filter::ChangeValidationError::InvalidPortMatcher
1721                        | fnet_filter::ChangeValidationError::InvalidTransparentProxyAction
1722                        | fnet_filter::ChangeValidationError::InvalidNatAction
1723                        | fnet_filter::ChangeValidationError::InvalidPortRange) => {
1724                            let error = error
1725                                .try_into()
1726                                .expect("`Ok` and `NotReached` are handled in another arm");
1727                            errors.push((change.clone(), error));
1728                            Ok(errors)
1729                        }
1730                        fnet_filter::ChangeValidationError::__SourceBreaking { .. } => {
1731                            Err(FidlConversionError::UnknownUnionVariant(
1732                                type_names::CHANGE_VALIDATION_ERROR,
1733                            )
1734                            .into())
1735                        }
1736                    }
1737                });
1738            Err(PushChangesError::ErrorOnChange(errors?))
1739        }
1740        fnet_filter::ChangeValidationResult::__SourceBreaking { .. } => {
1741            Err(FidlConversionError::UnknownUnionVariant(type_names::CHANGE_VALIDATION_RESULT)
1742                .into())
1743        }
1744    }
1745}
1746
1747pub(crate) fn handle_commit_result(
1748    commit_result: fnet_filter::CommitResult,
1749    committed_changes: Vec<Change>,
1750) -> Result<(), CommitError> {
1751    match commit_result {
1752        fnet_filter::CommitResult::Ok(fnet_filter::Empty {}) => Ok(()),
1753        fnet_filter::CommitResult::RuleWithInvalidMatcher(rule_id) => {
1754            Err(CommitError::RuleWithInvalidMatcher(rule_id.into()))
1755        }
1756        fnet_filter::CommitResult::RuleWithInvalidAction(rule_id) => {
1757            Err(CommitError::RuleWithInvalidAction(rule_id.into()))
1758        }
1759        fnet_filter::CommitResult::TransparentProxyWithInvalidMatcher(rule_id) => {
1760            Err(CommitError::TransparentProxyWithInvalidMatcher(rule_id.into()))
1761        }
1762        fnet_filter::CommitResult::RedirectWithInvalidMatcher(rule_id) => {
1763            Err(CommitError::RedirectWithInvalidMatcher(rule_id.into()))
1764        }
1765        fnet_filter::CommitResult::MasqueradeWithInvalidMatcher(rule_id) => {
1766            Err(CommitError::MasqueradeWithInvalidMatcher(rule_id.into()))
1767        }
1768        fnet_filter::CommitResult::CyclicalRoutineGraph(routine_id) => {
1769            Err(CommitError::CyclicalRoutineGraph(routine_id.into()))
1770        }
1771        fnet_filter::CommitResult::ErrorOnChange(results) => {
1772            let errors: Result<_, CommitError> = committed_changes
1773                .into_iter()
1774                .zip(results)
1775                .try_fold(Vec::new(), |mut errors, (change, result)| match result {
1776                    fnet_filter::CommitError::Ok | fnet_filter::CommitError::NotReached => {
1777                        Ok(errors)
1778                    }
1779                    error @ (fnet_filter::CommitError::NamespaceNotFound
1780                    | fnet_filter::CommitError::RoutineNotFound
1781                    | fnet_filter::CommitError::RuleNotFound
1782                    | fnet_filter::CommitError::AlreadyExists
1783                    | fnet_filter::CommitError::TargetRoutineIsInstalled) => {
1784                        let error = error
1785                            .try_into()
1786                            .expect("`Ok` and `NotReached` are handled in another arm");
1787                        errors.push((change, error));
1788                        Ok(errors)
1789                    }
1790                    fnet_filter::CommitError::__SourceBreaking { .. } => {
1791                        Err(FidlConversionError::UnknownUnionVariant(type_names::COMMIT_ERROR)
1792                            .into())
1793                    }
1794                });
1795            Err(CommitError::ErrorOnChange(errors?))
1796        }
1797        fnet_filter::CommitResult::__SourceBreaking { .. } => {
1798            Err(FidlConversionError::UnknownUnionVariant(type_names::COMMIT_RESULT).into())
1799        }
1800    }
1801}
1802
1803#[cfg(test)]
1804mod tests {
1805
1806    use assert_matches::assert_matches;
1807    use futures::channel::mpsc;
1808    use futures::task::Poll;
1809    use futures::{FutureExt as _, SinkExt as _};
1810    use net_declare::{fidl_ip, fidl_subnet};
1811    use test_case::test_case;
1812
1813    use super::*;
1814
1815    #[test_case(
1816        fnet_filter::ResourceId::Namespace(String::from("namespace")),
1817        ResourceId::Namespace(NamespaceId(String::from("namespace")));
1818        "NamespaceId"
1819    )]
1820    #[test_case(fnet_filter::Domain::Ipv4, Domain::Ipv4; "Domain")]
1821    #[test_case(
1822        fnet_filter::Namespace {
1823            id: Some(String::from("namespace")),
1824            domain: Some(fnet_filter::Domain::Ipv4),
1825            ..Default::default()
1826        },
1827        Namespace { id: NamespaceId(String::from("namespace")), domain: Domain::Ipv4 };
1828        "Namespace"
1829    )]
1830    #[test_case(fnet_filter::IpInstallationHook::Egress, IpHook::Egress; "IpHook")]
1831    #[test_case(fnet_filter::NatInstallationHook::Egress, NatHook::Egress; "NatHook")]
1832    #[test_case(
1833        fnet_filter::InstalledIpRoutine {
1834            hook: Some(fnet_filter::IpInstallationHook::Egress),
1835            priority: Some(1),
1836            ..Default::default()
1837        },
1838        InstalledIpRoutine {
1839            hook: IpHook::Egress,
1840            priority: 1,
1841        };
1842        "InstalledIpRoutine"
1843    )]
1844    #[test_case(
1845        fnet_filter::RoutineType::Ip(fnet_filter::IpRoutine {
1846            installation: Some(fnet_filter::InstalledIpRoutine {
1847                hook: Some(fnet_filter::IpInstallationHook::LocalEgress),
1848                priority: Some(1),
1849                ..Default::default()
1850            }),
1851            ..Default::default()
1852        }),
1853        RoutineType::Ip(Some(InstalledIpRoutine { hook: IpHook::LocalEgress, priority: 1 }));
1854        "RoutineType"
1855    )]
1856    #[test_case(
1857        fnet_filter::Routine {
1858            id: Some(fnet_filter::RoutineId {
1859                namespace: String::from("namespace"),
1860                name: String::from("routine"),
1861            }),
1862            type_: Some(fnet_filter::RoutineType::Nat(fnet_filter::NatRoutine::default())),
1863            ..Default::default()
1864        },
1865        Routine {
1866            id: RoutineId {
1867                namespace: NamespaceId(String::from("namespace")),
1868                name: String::from("routine"),
1869            },
1870            routine_type: RoutineType::Nat(None),
1871        };
1872        "Routine"
1873    )]
1874    #[test_case(
1875        fnet_filter::InterfaceMatcher::Id(1),
1876        InterfaceMatcher::Id(NonZeroU64::new(1).unwrap());
1877        "InterfaceMatcher"
1878    )]
1879    #[test_case(
1880        fnet_filter::AddressMatcherType::Subnet(fidl_subnet!("192.0.2.0/24")),
1881        AddressMatcherType::Subnet(Subnet(fidl_subnet!("192.0.2.0/24")));
1882        "AddressMatcherType"
1883    )]
1884    #[test_case(
1885        fnet_filter::AddressMatcher {
1886            matcher: fnet_filter::AddressMatcherType::Subnet(fidl_subnet!("192.0.2.0/24")),
1887            invert: true,
1888        },
1889        AddressMatcher {
1890            matcher: AddressMatcherType::Subnet(Subnet(fidl_subnet!("192.0.2.0/24"))),
1891            invert: true,
1892        };
1893        "AddressMatcher"
1894    )]
1895    #[test_case(
1896        fnet_filter::AddressRange {
1897            start: fidl_ip!("192.0.2.0"),
1898            end: fidl_ip!("192.0.2.1"),
1899        },
1900        AddressRange {
1901            range: fidl_ip!("192.0.2.0")..=fidl_ip!("192.0.2.1"),
1902        };
1903        "AddressRange"
1904    )]
1905    #[test_case(
1906        fnet_filter::TransportProtocol::Udp(fnet_filter::UdpMatcher {
1907            src_port: Some(fnet_filter::PortMatcher { start: 1024, end: u16::MAX, invert: false }),
1908            dst_port: None,
1909            ..Default::default()
1910        }),
1911        TransportProtocolMatcher::Udp {
1912            src_port: Some(PortMatcher { range: 1024..=u16::MAX, invert: false }),
1913            dst_port: None,
1914        };
1915        "TransportProtocol"
1916    )]
1917    #[test_case(
1918        fnet_filter::Matchers {
1919            in_interface: Some(fnet_filter::InterfaceMatcher::Name(String::from("wlan"))),
1920            transport_protocol: Some(fnet_filter::TransportProtocol::Tcp(fnet_filter::TcpMatcher {
1921                src_port: None,
1922                dst_port: Some(fnet_filter::PortMatcher { start: 22, end: 22, invert: false }),
1923                ..Default::default()
1924            })),
1925            ..Default::default()
1926        },
1927        Matchers {
1928            in_interface: Some(InterfaceMatcher::Name(String::from("wlan"))),
1929            transport_protocol: Some(TransportProtocolMatcher::Tcp {
1930                src_port: None,
1931                dst_port: Some(PortMatcher { range: 22..=22, invert: false }),
1932            }),
1933            ..Default::default()
1934        };
1935        "Matchers"
1936    )]
1937    #[test_case(
1938        fnet_filter::Action::Accept(fnet_filter::Empty {}),
1939        Action::Accept;
1940        "Action"
1941    )]
1942    #[test_case(
1943        fnet_filter::Rule {
1944            id: fnet_filter::RuleId {
1945                routine: fnet_filter::RoutineId {
1946                    namespace: String::from("namespace"),
1947                    name: String::from("routine"),
1948                },
1949                index: 1,
1950            },
1951            matchers: fnet_filter::Matchers {
1952                transport_protocol: Some(fnet_filter::TransportProtocol::Icmp(
1953                    fnet_filter::IcmpMatcher::default()
1954                )),
1955                ..Default::default()
1956            },
1957            action: fnet_filter::Action::Drop(fnet_filter::Empty {}),
1958        },
1959        Rule {
1960            id: RuleId {
1961                routine: RoutineId {
1962                    namespace: NamespaceId(String::from("namespace")),
1963                    name: String::from("routine"),
1964                },
1965                index: 1,
1966            },
1967            matchers: Matchers {
1968                transport_protocol: Some(TransportProtocolMatcher::Icmp),
1969                ..Default::default()
1970            },
1971            action: Action::Drop,
1972        };
1973        "Rule"
1974    )]
1975    #[test_case(
1976        fnet_filter::Resource::Namespace(fnet_filter::Namespace {
1977            id: Some(String::from("namespace")),
1978            domain: Some(fnet_filter::Domain::Ipv4),
1979            ..Default::default()
1980        }),
1981        Resource::Namespace(Namespace {
1982            id: NamespaceId(String::from("namespace")),
1983            domain: Domain::Ipv4
1984        });
1985        "Resource"
1986    )]
1987    #[test_case(
1988        fnet_filter::Event::EndOfUpdate(fnet_filter::Empty {}),
1989        Event::EndOfUpdate;
1990        "Event"
1991    )]
1992    #[test_case(
1993        fnet_filter::Change::Remove(fnet_filter::ResourceId::Namespace(String::from("namespace"))),
1994        Change::Remove(ResourceId::Namespace(NamespaceId(String::from("namespace"))));
1995        "Change"
1996    )]
1997    fn convert_from_fidl_and_back<F, E>(fidl_type: F, local_type: E)
1998    where
1999        E: TryFrom<F> + Clone + Debug + PartialEq,
2000        <E as TryFrom<F>>::Error: Debug + PartialEq,
2001        F: From<E> + Clone + Debug + PartialEq,
2002    {
2003        assert_eq!(fidl_type.clone().try_into(), Ok(local_type.clone()));
2004        assert_eq!(<_ as Into<F>>::into(local_type), fidl_type.clone());
2005    }
2006
2007    #[test]
2008    fn resource_id_try_from_unknown_variant() {
2009        assert_eq!(
2010            ResourceId::try_from(fnet_filter::ResourceId::__SourceBreaking { unknown_ordinal: 0 }),
2011            Err(FidlConversionError::UnknownUnionVariant(type_names::RESOURCE_ID))
2012        );
2013    }
2014
2015    #[test]
2016    fn domain_try_from_unknown_variant() {
2017        assert_eq!(
2018            Domain::try_from(fnet_filter::Domain::__SourceBreaking { unknown_ordinal: 0 }),
2019            Err(FidlConversionError::UnknownUnionVariant(type_names::DOMAIN))
2020        );
2021    }
2022
2023    #[test]
2024    fn namespace_try_from_missing_properties() {
2025        assert_eq!(
2026            Namespace::try_from(fnet_filter::Namespace {
2027                id: None,
2028                domain: Some(fnet_filter::Domain::Ipv4),
2029                ..Default::default()
2030            }),
2031            Err(FidlConversionError::MissingNamespaceId)
2032        );
2033        assert_eq!(
2034            Namespace::try_from(fnet_filter::Namespace {
2035                id: Some(String::from("namespace")),
2036                domain: None,
2037                ..Default::default()
2038            }),
2039            Err(FidlConversionError::MissingNamespaceDomain)
2040        );
2041    }
2042
2043    #[test]
2044    fn ip_installation_hook_try_from_unknown_variant() {
2045        assert_eq!(
2046            IpHook::try_from(fnet_filter::IpInstallationHook::__SourceBreaking {
2047                unknown_ordinal: 0
2048            }),
2049            Err(FidlConversionError::UnknownUnionVariant(type_names::IP_INSTALLATION_HOOK))
2050        );
2051    }
2052
2053    #[test]
2054    fn nat_installation_hook_try_from_unknown_variant() {
2055        assert_eq!(
2056            NatHook::try_from(fnet_filter::NatInstallationHook::__SourceBreaking {
2057                unknown_ordinal: 0
2058            }),
2059            Err(FidlConversionError::UnknownUnionVariant(type_names::NAT_INSTALLATION_HOOK))
2060        );
2061    }
2062
2063    #[test]
2064    fn installed_ip_routine_try_from_missing_hook() {
2065        assert_eq!(
2066            InstalledIpRoutine::try_from(fnet_filter::InstalledIpRoutine {
2067                hook: None,
2068                ..Default::default()
2069            }),
2070            Err(FidlConversionError::MissingIpInstallationHook)
2071        );
2072    }
2073
2074    #[test]
2075    fn installed_nat_routine_try_from_missing_hook() {
2076        assert_eq!(
2077            InstalledNatRoutine::try_from(fnet_filter::InstalledNatRoutine {
2078                hook: None,
2079                ..Default::default()
2080            }),
2081            Err(FidlConversionError::MissingNatInstallationHook)
2082        );
2083    }
2084
2085    #[test]
2086    fn routine_type_try_from_unknown_variant() {
2087        assert_eq!(
2088            RoutineType::try_from(fnet_filter::RoutineType::__SourceBreaking {
2089                unknown_ordinal: 0
2090            }),
2091            Err(FidlConversionError::UnknownUnionVariant(type_names::ROUTINE_TYPE))
2092        );
2093    }
2094
2095    #[test]
2096    fn routine_try_from_missing_properties() {
2097        assert_eq!(
2098            Routine::try_from(fnet_filter::Routine { id: None, ..Default::default() }),
2099            Err(FidlConversionError::MissingRoutineId)
2100        );
2101        assert_eq!(
2102            Routine::try_from(fnet_filter::Routine {
2103                id: Some(fnet_filter::RoutineId {
2104                    namespace: String::from("namespace"),
2105                    name: String::from("routine"),
2106                }),
2107                type_: None,
2108                ..Default::default()
2109            }),
2110            Err(FidlConversionError::MissingRoutineType)
2111        );
2112    }
2113
2114    #[test]
2115    fn interface_matcher_try_from_unknown_variant() {
2116        assert_eq!(
2117            InterfaceMatcher::try_from(fnet_filter::InterfaceMatcher::__SourceBreaking {
2118                unknown_ordinal: 0
2119            }),
2120            Err(FidlConversionError::UnknownUnionVariant(type_names::INTERFACE_MATCHER))
2121        );
2122    }
2123
2124    #[test]
2125    fn interface_matcher_try_from_invalid() {
2126        assert_eq!(
2127            InterfaceMatcher::try_from(fnet_filter::InterfaceMatcher::Id(0)),
2128            Err(FidlConversionError::ZeroInterfaceId)
2129        );
2130    }
2131
2132    #[test]
2133    fn address_matcher_type_try_from_unknown_variant() {
2134        assert_eq!(
2135            AddressMatcherType::try_from(fnet_filter::AddressMatcherType::__SourceBreaking {
2136                unknown_ordinal: 0
2137            }),
2138            Err(FidlConversionError::UnknownUnionVariant(type_names::ADDRESS_MATCHER_TYPE))
2139        );
2140    }
2141
2142    #[test]
2143    fn subnet_try_from_invalid() {
2144        assert_eq!(
2145            Subnet::try_from(fnet::Subnet { addr: fidl_ip!("192.0.2.1"), prefix_len: 33 }),
2146            Err(FidlConversionError::SubnetPrefixTooLong)
2147        );
2148        assert_eq!(
2149            Subnet::try_from(fidl_subnet!("192.0.2.1/24")),
2150            Err(FidlConversionError::SubnetHostBitsSet)
2151        );
2152    }
2153
2154    #[test]
2155    fn address_range_try_from_invalid() {
2156        assert_eq!(
2157            AddressRange::try_from(fnet_filter::AddressRange {
2158                start: fidl_ip!("192.0.2.1"),
2159                end: fidl_ip!("192.0.2.0"),
2160            }),
2161            Err(FidlConversionError::InvalidAddressRange)
2162        );
2163        assert_eq!(
2164            AddressRange::try_from(fnet_filter::AddressRange {
2165                start: fidl_ip!("2001:db8::1"),
2166                end: fidl_ip!("2001:db8::"),
2167            }),
2168            Err(FidlConversionError::InvalidAddressRange)
2169        );
2170    }
2171
2172    #[test]
2173    fn address_range_try_from_family_mismatch() {
2174        assert_eq!(
2175            AddressRange::try_from(fnet_filter::AddressRange {
2176                start: fidl_ip!("192.0.2.0"),
2177                end: fidl_ip!("2001:db8::"),
2178            }),
2179            Err(FidlConversionError::AddressRangeFamilyMismatch)
2180        );
2181    }
2182
2183    #[test]
2184    fn port_matcher_try_from_invalid() {
2185        assert_eq!(
2186            PortMatcher::try_from(fnet_filter::PortMatcher { start: 1, end: 0, invert: false }),
2187            Err(FidlConversionError::InvalidPortMatcherRange)
2188        );
2189    }
2190
2191    #[test]
2192    fn transport_protocol_try_from_unknown_variant() {
2193        assert_eq!(
2194            TransportProtocolMatcher::try_from(fnet_filter::TransportProtocol::__SourceBreaking {
2195                unknown_ordinal: 0
2196            }),
2197            Err(FidlConversionError::UnknownUnionVariant(type_names::TRANSPORT_PROTOCOL))
2198        );
2199    }
2200
2201    #[test]
2202    fn action_try_from_unknown_variant() {
2203        assert_eq!(
2204            Action::try_from(fnet_filter::Action::__SourceBreaking { unknown_ordinal: 0 }),
2205            Err(FidlConversionError::UnknownUnionVariant(type_names::ACTION))
2206        );
2207    }
2208
2209    #[test]
2210    fn resource_try_from_unknown_variant() {
2211        assert_eq!(
2212            Resource::try_from(fnet_filter::Resource::__SourceBreaking { unknown_ordinal: 0 }),
2213            Err(FidlConversionError::UnknownUnionVariant(type_names::RESOURCE))
2214        );
2215    }
2216
2217    #[test]
2218    fn event_try_from_unknown_variant() {
2219        assert_eq!(
2220            Event::try_from(fnet_filter::Event::__SourceBreaking { unknown_ordinal: 0 }),
2221            Err(FidlConversionError::UnknownUnionVariant(type_names::EVENT))
2222        );
2223    }
2224
2225    #[test]
2226    fn change_try_from_unknown_variant() {
2227        assert_eq!(
2228            Change::try_from(fnet_filter::Change::__SourceBreaking { unknown_ordinal: 0 }),
2229            Err(FidlConversionError::UnknownUnionVariant(type_names::CHANGE))
2230        );
2231    }
2232
2233    fn test_controller_a() -> ControllerId {
2234        ControllerId(String::from("test-controller-a"))
2235    }
2236
2237    fn test_controller_b() -> ControllerId {
2238        ControllerId(String::from("test-controller-b"))
2239    }
2240
2241    pub(crate) fn test_resource_id() -> ResourceId {
2242        ResourceId::Namespace(NamespaceId(String::from("test-namespace")))
2243    }
2244
2245    pub(crate) fn test_resource() -> Resource {
2246        Resource::Namespace(Namespace {
2247            id: NamespaceId(String::from("test-namespace")),
2248            domain: Domain::AllIp,
2249        })
2250    }
2251
2252    pub(crate) fn invalid_resource() -> Resource {
2253        Resource::Rule(Rule {
2254            id: RuleId {
2255                routine: RoutineId {
2256                    namespace: NamespaceId(String::from("namespace")),
2257                    name: String::from("routine"),
2258                },
2259                index: 0,
2260            },
2261            matchers: Matchers {
2262                transport_protocol: Some(TransportProtocolMatcher::Tcp {
2263                    #[allow(clippy::reversed_empty_ranges)]
2264                    src_port: Some(PortMatcher { range: u16::MAX..=0, invert: false }),
2265                    dst_port: None,
2266                }),
2267                ..Default::default()
2268            },
2269            action: Action::Drop,
2270        })
2271    }
2272
2273    pub(crate) fn unknown_resource_id() -> ResourceId {
2274        ResourceId::Namespace(NamespaceId(String::from("does-not-exist")))
2275    }
2276
2277    #[fuchsia_async::run_singlethreaded(test)]
2278    async fn event_stream_from_state_conversion_error() {
2279        let (proxy, mut request_stream) =
2280            fidl::endpoints::create_proxy_and_stream::<fnet_filter::StateMarker>();
2281        let stream = event_stream_from_state(proxy).expect("get event stream");
2282        futures::pin_mut!(stream);
2283
2284        let send_invalid_event = async {
2285            let fnet_filter::StateRequest::GetWatcher { options: _, request, control_handle: _ } =
2286                request_stream
2287                    .next()
2288                    .await
2289                    .expect("client should call state")
2290                    .expect("request should not error");
2291            let fnet_filter::WatcherRequest::Watch { responder } = request
2292                .into_stream()
2293                .next()
2294                .await
2295                .expect("client should call watch")
2296                .expect("request should not error");
2297            responder
2298                .send(&[fnet_filter::Event::Added(fnet_filter::AddedResource {
2299                    controller: String::from("controller"),
2300                    resource: fnet_filter::Resource::Namespace(fnet_filter::Namespace {
2301                        id: None,
2302                        domain: None,
2303                        ..Default::default()
2304                    }),
2305                })])
2306                .expect("send batch with invalid event");
2307        };
2308        let ((), result) = futures::future::join(send_invalid_event, stream.next()).await;
2309        assert_matches!(
2310            result,
2311            Some(Err(WatchError::Conversion(FidlConversionError::MissingNamespaceId)))
2312        );
2313    }
2314
2315    #[fuchsia_async::run_singlethreaded(test)]
2316    async fn event_stream_from_state_empty_event_batch() {
2317        let (proxy, mut request_stream) =
2318            fidl::endpoints::create_proxy_and_stream::<fnet_filter::StateMarker>();
2319        let stream = event_stream_from_state(proxy).expect("get event stream");
2320        futures::pin_mut!(stream);
2321
2322        let send_empty_batch = async {
2323            let fnet_filter::StateRequest::GetWatcher { options: _, request, control_handle: _ } =
2324                request_stream
2325                    .next()
2326                    .await
2327                    .expect("client should call state")
2328                    .expect("request should not error");
2329            let fnet_filter::WatcherRequest::Watch { responder } = request
2330                .into_stream()
2331                .next()
2332                .await
2333                .expect("client should call watch")
2334                .expect("request should not error");
2335            responder.send(&[]).expect("send empty batch");
2336        };
2337        let ((), result) = futures::future::join(send_empty_batch, stream.next()).await;
2338        assert_matches!(result, Some(Err(WatchError::EmptyEventBatch)));
2339    }
2340
2341    #[fuchsia_async::run_singlethreaded(test)]
2342    async fn get_existing_resources_success() {
2343        let event_stream = futures::stream::iter([
2344            Ok(Event::Existing(test_controller_a(), test_resource())),
2345            Ok(Event::Existing(test_controller_b(), test_resource())),
2346            Ok(Event::Idle),
2347            Ok(Event::Removed(test_controller_a(), test_resource_id())),
2348        ]);
2349        futures::pin_mut!(event_stream);
2350
2351        let existing = get_existing_resources::<HashMap<_, _>>(event_stream.by_ref())
2352            .await
2353            .expect("get existing resources");
2354        assert_eq!(
2355            existing,
2356            HashMap::from([
2357                (test_controller_a(), HashMap::from([(test_resource_id(), test_resource())])),
2358                (test_controller_b(), HashMap::from([(test_resource_id(), test_resource())])),
2359            ])
2360        );
2361
2362        let trailing_events = event_stream.collect::<Vec<_>>().await;
2363        assert_matches!(
2364            &trailing_events[..],
2365            [Ok(Event::Removed(controller, resource))] if controller == &test_controller_a() &&
2366                                                           resource == &test_resource_id()
2367        );
2368    }
2369
2370    #[fuchsia_async::run_singlethreaded(test)]
2371    async fn get_existing_resources_error_in_stream() {
2372        let event_stream =
2373            futures::stream::once(futures::future::ready(Err(WatchError::EmptyEventBatch)));
2374        futures::pin_mut!(event_stream);
2375        assert_matches!(
2376            get_existing_resources::<HashMap<_, _>>(event_stream).await,
2377            Err(GetExistingResourcesError::ErrorInStream(WatchError::EmptyEventBatch))
2378        )
2379    }
2380
2381    #[fuchsia_async::run_singlethreaded(test)]
2382    async fn get_existing_resources_unexpected_event() {
2383        let event_stream = futures::stream::once(futures::future::ready(Ok(Event::EndOfUpdate)));
2384        futures::pin_mut!(event_stream);
2385        assert_matches!(
2386            get_existing_resources::<HashMap<_, _>>(event_stream).await,
2387            Err(GetExistingResourcesError::UnexpectedEvent(Event::EndOfUpdate))
2388        )
2389    }
2390
2391    #[fuchsia_async::run_singlethreaded(test)]
2392    async fn get_existing_resources_duplicate_resource() {
2393        let event_stream = futures::stream::iter([
2394            Ok(Event::Existing(test_controller_a(), test_resource())),
2395            Ok(Event::Existing(test_controller_a(), test_resource())),
2396        ]);
2397        futures::pin_mut!(event_stream);
2398        assert_matches!(
2399            get_existing_resources::<HashMap<_, _>>(event_stream).await,
2400            Err(GetExistingResourcesError::DuplicateResource(resource))
2401                if resource == test_resource()
2402        )
2403    }
2404
2405    #[fuchsia_async::run_singlethreaded(test)]
2406    async fn get_existing_resources_stream_ended() {
2407        let event_stream = futures::stream::once(futures::future::ready(Ok(Event::Existing(
2408            test_controller_a(),
2409            test_resource(),
2410        ))));
2411        futures::pin_mut!(event_stream);
2412        assert_matches!(
2413            get_existing_resources::<HashMap<_, _>>(event_stream).await,
2414            Err(GetExistingResourcesError::StreamEnded)
2415        )
2416    }
2417
2418    #[fuchsia_async::run_singlethreaded(test)]
2419    async fn wait_for_condition_add_remove() {
2420        let mut state = HashMap::new();
2421
2422        // Verify that checking for the presence of a resource blocks until the
2423        // resource is added.
2424        let has_resource = |resources: &HashMap<_, HashMap<_, _>>| {
2425            resources.get(&test_controller_a()).map_or(false, |controller| {
2426                controller
2427                    .get(&test_resource_id())
2428                    .map_or(false, |resource| resource == &test_resource())
2429            })
2430        };
2431        assert_matches!(
2432            wait_for_condition(futures::stream::pending(), &mut state, has_resource).now_or_never(),
2433            None
2434        );
2435        assert!(state.is_empty());
2436        assert_matches!(
2437            wait_for_condition(
2438                futures::stream::iter([
2439                    Ok(Event::Added(test_controller_b(), test_resource())),
2440                    Ok(Event::EndOfUpdate),
2441                    Ok(Event::Added(test_controller_a(), test_resource())),
2442                    Ok(Event::EndOfUpdate),
2443                ]),
2444                &mut state,
2445                has_resource
2446            )
2447            .now_or_never(),
2448            Some(Ok(()))
2449        );
2450        assert_eq!(
2451            state,
2452            HashMap::from([
2453                (test_controller_a(), HashMap::from([(test_resource_id(), test_resource())])),
2454                (test_controller_b(), HashMap::from([(test_resource_id(), test_resource())])),
2455            ])
2456        );
2457
2458        // Re-add the resource and observe an error.
2459        assert_matches!(
2460            wait_for_condition(
2461                futures::stream::iter([
2462                    Ok(Event::Added(test_controller_a(), test_resource())),
2463                    Ok(Event::EndOfUpdate),
2464                ]),
2465                &mut state,
2466                has_resource
2467            )
2468            .now_or_never(),
2469            Some(Err(WaitForConditionError::AddedAlreadyExisting(r))) if r == test_resource()
2470        );
2471        assert_eq!(
2472            state,
2473            HashMap::from([
2474                (test_controller_a(), HashMap::from([(test_resource_id(), test_resource())])),
2475                (test_controller_b(), HashMap::from([(test_resource_id(), test_resource())])),
2476            ])
2477        );
2478
2479        // Verify that checking for the absence of a resource blocks until the
2480        // resource is removed.
2481        let does_not_have_resource = |resources: &HashMap<_, HashMap<_, _>>| {
2482            resources.get(&test_controller_a()).map_or(false, |controller| controller.is_empty())
2483        };
2484        assert_matches!(
2485            wait_for_condition(futures::stream::pending(), &mut state, does_not_have_resource)
2486                .now_or_never(),
2487            None
2488        );
2489        assert_eq!(
2490            state,
2491            HashMap::from([
2492                (test_controller_a(), HashMap::from([(test_resource_id(), test_resource())])),
2493                (test_controller_b(), HashMap::from([(test_resource_id(), test_resource())])),
2494            ])
2495        );
2496        assert_matches!(
2497            wait_for_condition(
2498                futures::stream::iter([
2499                    Ok(Event::Removed(test_controller_b(), test_resource_id())),
2500                    Ok(Event::EndOfUpdate),
2501                    Ok(Event::Removed(test_controller_a(), test_resource_id())),
2502                    Ok(Event::EndOfUpdate),
2503                ]),
2504                &mut state,
2505                does_not_have_resource
2506            )
2507            .now_or_never(),
2508            Some(Ok(()))
2509        );
2510        assert_eq!(
2511            state,
2512            HashMap::from([
2513                (test_controller_a(), HashMap::new()),
2514                (test_controller_b(), HashMap::new()),
2515            ])
2516        );
2517
2518        // Remove a non-existent resource and observe an error.
2519        assert_matches!(
2520            wait_for_condition(
2521                futures::stream::iter([
2522                    Ok(Event::Removed(test_controller_a(), test_resource_id())),
2523                    Ok(Event::EndOfUpdate),
2524                ]),
2525                &mut state,
2526                does_not_have_resource
2527            ).now_or_never(),
2528            Some(Err(WaitForConditionError::RemovedNonExistent(r))) if r == test_resource_id()
2529        );
2530        assert_eq!(
2531            state,
2532            HashMap::from([
2533                (test_controller_a(), HashMap::new()),
2534                (test_controller_b(), HashMap::new()),
2535            ])
2536        );
2537    }
2538
2539    #[test]
2540    fn predicate_not_tested_until_update_complete() {
2541        let mut state = HashMap::new();
2542        let (mut tx, rx) = mpsc::unbounded();
2543
2544        let wait = wait_for_condition(rx, &mut state, |state| !state.is_empty()).fuse();
2545        futures::pin_mut!(wait);
2546
2547        // Sending an `Added` event should *not* allow the wait operation to
2548        // complete, because the predicate should only be tested once the full
2549        // update has been observed.
2550        let mut exec = fuchsia_async::TestExecutor::new();
2551        exec.run_singlethreaded(async {
2552            tx.send(Ok(Event::Added(test_controller_a(), test_resource())))
2553                .await
2554                .expect("receiver should not be closed");
2555        });
2556        assert_matches!(exec.run_until_stalled(&mut wait), Poll::Pending);
2557
2558        exec.run_singlethreaded(async {
2559            tx.send(Ok(Event::EndOfUpdate)).await.expect("receiver should not be closed");
2560            wait.await.expect("condition should be satisfied once update is complete");
2561        });
2562    }
2563
2564    #[fuchsia_async::run_singlethreaded(test)]
2565    async fn wait_for_condition_error_in_stream() {
2566        let mut state = HashMap::new();
2567        let event_stream =
2568            futures::stream::once(futures::future::ready(Err(WatchError::EmptyEventBatch)));
2569        assert_matches!(
2570            wait_for_condition(event_stream, &mut state, |_| true).await,
2571            Err(WaitForConditionError::ErrorInStream(WatchError::EmptyEventBatch))
2572        );
2573        assert!(state.is_empty());
2574    }
2575
2576    #[fuchsia_async::run_singlethreaded(test)]
2577    async fn wait_for_condition_stream_ended() {
2578        let mut state = HashMap::new();
2579        let event_stream = futures::stream::empty();
2580        assert_matches!(
2581            wait_for_condition(event_stream, &mut state, |_| true).await,
2582            Err(WaitForConditionError::StreamEnded)
2583        );
2584        assert!(state.is_empty());
2585    }
2586
2587    pub(crate) async fn handle_open_controller(
2588        mut request_stream: fnet_filter::ControlRequestStream,
2589    ) -> fnet_filter::NamespaceControllerRequestStream {
2590        let (id, request, _control_handle) = request_stream
2591            .next()
2592            .await
2593            .expect("client should open controller")
2594            .expect("request should not error")
2595            .into_open_controller()
2596            .expect("client should open controller");
2597        let (stream, control_handle) = request.into_stream_and_control_handle();
2598        control_handle.send_on_id_assigned(&id).expect("send assigned ID");
2599
2600        stream
2601    }
2602
2603    pub(crate) async fn handle_push_changes(
2604        stream: &mut fnet_filter::NamespaceControllerRequestStream,
2605        push_changes_result: fnet_filter::ChangeValidationResult,
2606    ) {
2607        let (_changes, responder) = stream
2608            .next()
2609            .await
2610            .expect("client should push changes")
2611            .expect("request should not error")
2612            .into_push_changes()
2613            .expect("client should push changes");
2614        responder.send(push_changes_result).expect("send empty batch");
2615    }
2616
2617    pub(crate) async fn handle_commit(
2618        stream: &mut fnet_filter::NamespaceControllerRequestStream,
2619        commit_result: fnet_filter::CommitResult,
2620    ) {
2621        let (_options, responder) = stream
2622            .next()
2623            .await
2624            .expect("client should commit")
2625            .expect("request should not error")
2626            .into_commit()
2627            .expect("client should commit");
2628        responder.send(commit_result).expect("send commit result");
2629    }
2630
2631    #[fuchsia_async::run_singlethreaded(test)]
2632    async fn controller_push_changes_reports_invalid_change() {
2633        let (control, request_stream) =
2634            fidl::endpoints::create_proxy_and_stream::<fnet_filter::ControlMarker>();
2635        let push_invalid_change = async {
2636            let mut controller = Controller::new(&control, &ControllerId(String::from("test")))
2637                .await
2638                .expect("create controller");
2639            let result = controller
2640                .push_changes(vec![
2641                    Change::Create(test_resource()),
2642                    Change::Create(invalid_resource()),
2643                    Change::Remove(test_resource_id()),
2644                ])
2645                .await;
2646            assert_matches!(
2647                result,
2648                Err(PushChangesError::ErrorOnChange(errors)) if errors == vec![(
2649                    Change::Create(invalid_resource()),
2650                    ChangeValidationError::InvalidPortMatcher
2651                )]
2652            );
2653        };
2654
2655        let handle_controller = async {
2656            let mut stream = handle_open_controller(request_stream).await;
2657            handle_push_changes(
2658                &mut stream,
2659                fnet_filter::ChangeValidationResult::ErrorOnChange(vec![
2660                    fnet_filter::ChangeValidationError::Ok,
2661                    fnet_filter::ChangeValidationError::InvalidPortMatcher,
2662                    fnet_filter::ChangeValidationError::NotReached,
2663                ]),
2664            )
2665            .await;
2666        };
2667
2668        let ((), ()) = futures::future::join(push_invalid_change, handle_controller).await;
2669    }
2670
2671    #[fuchsia_async::run_singlethreaded(test)]
2672    async fn controller_commit_reports_invalid_change() {
2673        let (control, request_stream) =
2674            fidl::endpoints::create_proxy_and_stream::<fnet_filter::ControlMarker>();
2675        let commit_invalid_change = async {
2676            let mut controller = Controller::new(&control, &ControllerId(String::from("test")))
2677                .await
2678                .expect("create controller");
2679            controller
2680                .push_changes(vec![
2681                    Change::Create(test_resource()),
2682                    Change::Remove(unknown_resource_id()),
2683                    Change::Remove(test_resource_id()),
2684                ])
2685                .await
2686                .expect("push changes");
2687            let result = controller.commit().await;
2688            assert_matches!(
2689                result,
2690                Err(CommitError::ErrorOnChange(errors)) if errors == vec![(
2691                    Change::Remove(unknown_resource_id()),
2692                    ChangeCommitError::NamespaceNotFound,
2693                )]
2694            );
2695        };
2696        let handle_controller = async {
2697            let mut stream = handle_open_controller(request_stream).await;
2698            handle_push_changes(
2699                &mut stream,
2700                fnet_filter::ChangeValidationResult::Ok(fnet_filter::Empty {}),
2701            )
2702            .await;
2703            handle_commit(
2704                &mut stream,
2705                fnet_filter::CommitResult::ErrorOnChange(vec![
2706                    fnet_filter::CommitError::Ok,
2707                    fnet_filter::CommitError::NamespaceNotFound,
2708                    fnet_filter::CommitError::Ok,
2709                ]),
2710            )
2711            .await;
2712        };
2713        let ((), ()) = futures::future::join(commit_invalid_change, handle_controller).await;
2714    }
2715}