fidl_fuchsia_net_routes_ext/
rules.rs

1// Copyright 2024 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! Extensions for route rules FIDL.
6
7use std::fmt::Debug;
8use std::ops::RangeInclusive;
9
10use async_utils::{fold, stream};
11use fidl::endpoints::{DiscoverableProtocolMarker, ProtocolMarker, Proxy as _};
12use fidl_fuchsia_net_ext::{IntoExt as _, TryIntoExt as _};
13use futures::future::Either;
14use futures::{Stream, TryStreamExt as _};
15use net_types::ip::{GenericOverIp, Ip, Ipv4, Ipv6, Subnet};
16use thiserror::Error;
17use {
18    fidl_fuchsia_net as fnet, fidl_fuchsia_net_routes as fnet_routes,
19    fidl_fuchsia_net_routes_admin as fnet_routes_admin,
20};
21
22use crate::{impl_responder, FidlRouteIpExt, Responder, SliceResponder, WatcherCreationError};
23
24/// Observation extension for the rules part of `fuchsia.net.routes` FIDL API.
25pub trait FidlRuleIpExt: Ip {
26    /// The "rules watcher" protocol to use for this IP version.
27    type RuleWatcherMarker: ProtocolMarker<RequestStream = Self::RuleWatcherRequestStream>;
28    /// The "rules watcher" request stream.
29    type RuleWatcherRequestStream: fidl::endpoints::RequestStream<Ok: Send, ControlHandle: Send>;
30    /// The rule event to be watched.
31    type RuleEvent: From<RuleEvent<Self>>
32        + TryInto<RuleEvent<Self>, Error = RuleFidlConversionError>
33        + Unpin;
34    /// The responder to the watch request.
35    type RuleWatcherWatchResponder: SliceResponder<Self::RuleEvent>;
36
37    /// Turns a FIDL rule watcher request into the extension type.
38    fn into_rule_watcher_request(
39        request: fidl::endpoints::Request<Self::RuleWatcherMarker>,
40    ) -> RuleWatcherRequest<Self>;
41}
42
43impl_responder!(fnet_routes::RuleWatcherV4WatchResponder, &[fnet_routes::RuleEventV4]);
44impl_responder!(fnet_routes::RuleWatcherV6WatchResponder, &[fnet_routes::RuleEventV6]);
45
46impl FidlRuleIpExt for Ipv4 {
47    type RuleWatcherMarker = fnet_routes::RuleWatcherV4Marker;
48    type RuleWatcherRequestStream = fnet_routes::RuleWatcherV4RequestStream;
49    type RuleEvent = fnet_routes::RuleEventV4;
50    type RuleWatcherWatchResponder = fnet_routes::RuleWatcherV4WatchResponder;
51
52    fn into_rule_watcher_request(
53        request: fidl::endpoints::Request<Self::RuleWatcherMarker>,
54    ) -> RuleWatcherRequest<Self> {
55        RuleWatcherRequest::from(request)
56    }
57}
58
59impl FidlRuleIpExt for Ipv6 {
60    type RuleWatcherMarker = fnet_routes::RuleWatcherV6Marker;
61    type RuleWatcherRequestStream = fnet_routes::RuleWatcherV6RequestStream;
62    type RuleEvent = fnet_routes::RuleEventV6;
63    type RuleWatcherWatchResponder = fnet_routes::RuleWatcherV6WatchResponder;
64
65    fn into_rule_watcher_request(
66        request: fidl::endpoints::Request<Self::RuleWatcherMarker>,
67    ) -> RuleWatcherRequest<Self> {
68        RuleWatcherRequest::from(request)
69    }
70}
71
72/// The request for the rules watchers.
73pub enum RuleWatcherRequest<I: FidlRuleIpExt> {
74    /// Hanging-Get style API for observing routing rule changes.
75    Watch {
76        /// Responder for the events.
77        responder: I::RuleWatcherWatchResponder,
78    },
79}
80
81impl From<fnet_routes::RuleWatcherV4Request> for RuleWatcherRequest<Ipv4> {
82    fn from(req: fnet_routes::RuleWatcherV4Request) -> Self {
83        match req {
84            fnet_routes::RuleWatcherV4Request::Watch { responder } => {
85                RuleWatcherRequest::Watch { responder }
86            }
87        }
88    }
89}
90
91impl From<fnet_routes::RuleWatcherV6Request> for RuleWatcherRequest<Ipv6> {
92    fn from(req: fnet_routes::RuleWatcherV6Request) -> Self {
93        match req {
94            fnet_routes::RuleWatcherV6Request::Watch { responder } => {
95                RuleWatcherRequest::Watch { responder }
96            }
97        }
98    }
99}
100
101/// An installed IPv4 routing rule.
102#[derive(Debug, Hash, PartialEq, Eq, Clone)]
103pub struct InstalledRule<I: Ip> {
104    /// Rule sets are ordered by the rule set priority, rule sets are disjoint
105    /// and don’t have interleaving rules among them.
106    pub priority: RuleSetPriority,
107    /// Rules within a rule set are locally ordered, together with the rule set
108    /// priority, this defines a global order for all installed rules.
109    pub index: RuleIndex,
110    /// The matcher part of the rule, the rule is a no-op if the matcher does
111    /// not match the packet.
112    pub matcher: RuleMatcher<I>,
113    /// The action part of the rule that describes what to do if the matcher
114    /// matches the packet.
115    pub action: RuleAction,
116}
117
118impl TryFrom<fnet_routes::InstalledRuleV4> for InstalledRule<Ipv4> {
119    type Error = RuleFidlConversionError;
120    fn try_from(
121        fnet_routes::InstalledRuleV4 {
122        rule_set_priority,
123        rule_index,
124        matcher,
125        action,
126    }: fnet_routes::InstalledRuleV4,
127    ) -> Result<Self, Self::Error> {
128        Ok(Self {
129            priority: rule_set_priority.into(),
130            index: rule_index.into(),
131            matcher: matcher.try_into()?,
132            action: action.into(),
133        })
134    }
135}
136
137impl TryFrom<fnet_routes::InstalledRuleV6> for InstalledRule<Ipv6> {
138    type Error = RuleFidlConversionError;
139    fn try_from(
140        fnet_routes::InstalledRuleV6 {
141        rule_set_priority,
142        rule_index,
143        matcher,
144        action,
145    }: fnet_routes::InstalledRuleV6,
146    ) -> Result<Self, Self::Error> {
147        Ok(Self {
148            priority: rule_set_priority.into(),
149            index: rule_index.into(),
150            matcher: matcher.try_into()?,
151            action: action.into(),
152        })
153    }
154}
155
156impl From<InstalledRule<Ipv4>> for fnet_routes::InstalledRuleV4 {
157    fn from(InstalledRule { priority, index, matcher, action }: InstalledRule<Ipv4>) -> Self {
158        Self {
159            rule_set_priority: priority.into(),
160            rule_index: index.into(),
161            matcher: matcher.into(),
162            action: action.into(),
163        }
164    }
165}
166
167impl From<InstalledRule<Ipv6>> for fnet_routes::InstalledRuleV6 {
168    fn from(InstalledRule { priority, index, matcher, action }: InstalledRule<Ipv6>) -> Self {
169        Self {
170            rule_set_priority: priority.into(),
171            rule_index: index.into(),
172            matcher: matcher.into(),
173            action: action.into(),
174        }
175    }
176}
177
178/// A rules watcher event.
179#[derive(Debug, Clone)]
180pub enum RuleEvent<I: Ip> {
181    /// A rule that already existed when watching started.
182    Existing(InstalledRule<I>),
183    /// Sentinel value indicating no more `existing` events will be
184    /// received.
185    Idle,
186    /// A rule that was added while watching.
187    Added(InstalledRule<I>),
188    /// A rule that was removed while watching.
189    Removed(InstalledRule<I>),
190}
191
192impl TryFrom<fnet_routes::RuleEventV4> for RuleEvent<Ipv4> {
193    type Error = RuleFidlConversionError;
194    fn try_from(event: fnet_routes::RuleEventV4) -> Result<Self, Self::Error> {
195        match event {
196            fnet_routes::RuleEventV4::Existing(rule) => Ok(RuleEvent::Existing(rule.try_into()?)),
197            fnet_routes::RuleEventV4::Idle(fnet_routes::Empty) => Ok(RuleEvent::Idle),
198            fnet_routes::RuleEventV4::Added(rule) => Ok(RuleEvent::Added(rule.try_into()?)),
199            fnet_routes::RuleEventV4::Removed(rule) => Ok(RuleEvent::Removed(rule.try_into()?)),
200            fnet_routes::RuleEventV4::__SourceBreaking { unknown_ordinal } => {
201                Err(RuleFidlConversionError::UnknownOrdinal {
202                    name: "RuleEventV4",
203                    unknown_ordinal,
204                })
205            }
206        }
207    }
208}
209
210impl TryFrom<fnet_routes::RuleEventV6> for RuleEvent<Ipv6> {
211    type Error = RuleFidlConversionError;
212    fn try_from(event: fnet_routes::RuleEventV6) -> Result<Self, Self::Error> {
213        match event {
214            fnet_routes::RuleEventV6::Existing(rule) => Ok(RuleEvent::Existing(rule.try_into()?)),
215            fnet_routes::RuleEventV6::Idle(fnet_routes::Empty) => Ok(RuleEvent::Idle),
216            fnet_routes::RuleEventV6::Added(rule) => Ok(RuleEvent::Added(rule.try_into()?)),
217            fnet_routes::RuleEventV6::Removed(rule) => Ok(RuleEvent::Removed(rule.try_into()?)),
218            fnet_routes::RuleEventV6::__SourceBreaking { unknown_ordinal } => {
219                Err(RuleFidlConversionError::UnknownOrdinal {
220                    name: "RuleEventV6",
221                    unknown_ordinal,
222                })
223            }
224        }
225    }
226}
227
228impl From<RuleEvent<Ipv4>> for fnet_routes::RuleEventV4 {
229    fn from(event: RuleEvent<Ipv4>) -> Self {
230        match event {
231            RuleEvent::Existing(r) => Self::Existing(r.into()),
232            RuleEvent::Idle => Self::Idle(fnet_routes::Empty),
233            RuleEvent::Added(r) => Self::Added(r.into()),
234            RuleEvent::Removed(r) => Self::Removed(r.into()),
235        }
236    }
237}
238
239impl From<RuleEvent<Ipv6>> for fnet_routes::RuleEventV6 {
240    fn from(event: RuleEvent<Ipv6>) -> Self {
241        match event {
242            RuleEvent::Existing(r) => Self::Existing(r.into()),
243            RuleEvent::Idle => Self::Idle(fnet_routes::Empty),
244            RuleEvent::Added(r) => Self::Added(r.into()),
245            RuleEvent::Removed(r) => Self::Removed(r.into()),
246        }
247    }
248}
249
250/// Admin extension for the rules part of `fuchsia.net.routes.admin` FIDL API.
251pub trait FidlRuleAdminIpExt: Ip {
252    /// The "rule table" protocol to use for this IP version.
253    type RuleTableMarker: DiscoverableProtocolMarker<RequestStream = Self::RuleTableRequestStream>;
254    /// The "rule set" protocol to use for this IP Version.
255    type RuleSetMarker: ProtocolMarker<RequestStream = Self::RuleSetRequestStream>;
256    /// The request stream for the rule table protocol.
257    type RuleTableRequestStream: fidl::endpoints::RequestStream<Ok: Send, ControlHandle: Send>;
258    /// The request stream for the rule set protocol.
259    type RuleSetRequestStream: fidl::endpoints::RequestStream<Ok: Send, ControlHandle: Send>;
260    /// The responder for AddRule requests.
261    type RuleSetAddRuleResponder: Responder<
262        Payload = Result<(), fnet_routes_admin::RuleSetError>,
263        ControlHandle = Self::RuleSetControlHandle,
264    >;
265    /// The responder for RemoveRule requests.
266    type RuleSetRemoveRuleResponder: Responder<
267        Payload = Result<(), fnet_routes_admin::RuleSetError>,
268        ControlHandle = Self::RuleSetControlHandle,
269    >;
270    /// The responder for AuthenticateForRouteTable requests.
271    type RuleSetAuthenticateForRouteTableResponder: Responder<
272        Payload = Result<(), fnet_routes_admin::AuthenticateForRouteTableError>,
273        ControlHandle = Self::RuleSetControlHandle,
274    >;
275    /// The control handle for RuleTable protocols.
276    type RuleTableControlHandle: fidl::endpoints::ControlHandle + Send + Clone;
277    /// The control handle for RuleSet protocols.
278    type RuleSetControlHandle: fidl::endpoints::ControlHandle + Send + Clone;
279
280    /// Turns a FIDL rule set request into the extension type.
281    fn into_rule_set_request(
282        request: fidl::endpoints::Request<Self::RuleSetMarker>,
283    ) -> RuleSetRequest<Self>;
284
285    /// Turns a FIDL rule table request into the extension type.
286    fn into_rule_table_request(
287        request: fidl::endpoints::Request<Self::RuleTableMarker>,
288    ) -> RuleTableRequest<Self>;
289}
290
291impl FidlRuleAdminIpExt for Ipv4 {
292    type RuleTableMarker = fnet_routes_admin::RuleTableV4Marker;
293    type RuleSetMarker = fnet_routes_admin::RuleSetV4Marker;
294    type RuleTableRequestStream = fnet_routes_admin::RuleTableV4RequestStream;
295    type RuleSetRequestStream = fnet_routes_admin::RuleSetV4RequestStream;
296    type RuleSetAddRuleResponder = fnet_routes_admin::RuleSetV4AddRuleResponder;
297    type RuleSetRemoveRuleResponder = fnet_routes_admin::RuleSetV4RemoveRuleResponder;
298    type RuleSetAuthenticateForRouteTableResponder =
299        fnet_routes_admin::RuleSetV4AuthenticateForRouteTableResponder;
300    type RuleTableControlHandle = fnet_routes_admin::RuleTableV4ControlHandle;
301    type RuleSetControlHandle = fnet_routes_admin::RuleSetV4ControlHandle;
302
303    fn into_rule_set_request(
304        request: fidl::endpoints::Request<Self::RuleSetMarker>,
305    ) -> RuleSetRequest<Self> {
306        RuleSetRequest::from(request)
307    }
308
309    fn into_rule_table_request(
310        request: fidl::endpoints::Request<Self::RuleTableMarker>,
311    ) -> RuleTableRequest<Self> {
312        RuleTableRequest::from(request)
313    }
314}
315
316impl FidlRuleAdminIpExt for Ipv6 {
317    type RuleTableMarker = fnet_routes_admin::RuleTableV6Marker;
318    type RuleSetMarker = fnet_routes_admin::RuleSetV6Marker;
319    type RuleTableRequestStream = fnet_routes_admin::RuleTableV6RequestStream;
320    type RuleSetRequestStream = fnet_routes_admin::RuleSetV6RequestStream;
321    type RuleSetAddRuleResponder = fnet_routes_admin::RuleSetV6AddRuleResponder;
322    type RuleSetRemoveRuleResponder = fnet_routes_admin::RuleSetV6RemoveRuleResponder;
323    type RuleSetAuthenticateForRouteTableResponder =
324        fnet_routes_admin::RuleSetV6AuthenticateForRouteTableResponder;
325    type RuleTableControlHandle = fnet_routes_admin::RuleTableV6ControlHandle;
326    type RuleSetControlHandle = fnet_routes_admin::RuleSetV6ControlHandle;
327
328    fn into_rule_set_request(
329        request: fidl::endpoints::Request<Self::RuleSetMarker>,
330    ) -> RuleSetRequest<Self> {
331        RuleSetRequest::from(request)
332    }
333
334    fn into_rule_table_request(
335        request: fidl::endpoints::Request<Self::RuleTableMarker>,
336    ) -> RuleTableRequest<Self> {
337        RuleTableRequest::from(request)
338    }
339}
340
341impl_responder!(
342    fnet_routes_admin::RuleSetV4AddRuleResponder,
343    Result<(), fnet_routes_admin::RuleSetError>,
344);
345impl_responder!(
346    fnet_routes_admin::RuleSetV4RemoveRuleResponder,
347    Result<(), fnet_routes_admin::RuleSetError>,
348);
349impl_responder!(
350    fnet_routes_admin::RuleSetV4AuthenticateForRouteTableResponder,
351    Result<(), fnet_routes_admin::AuthenticateForRouteTableError>,
352);
353impl_responder!(
354    fnet_routes_admin::RuleSetV6AddRuleResponder,
355    Result<(), fnet_routes_admin::RuleSetError>,
356);
357impl_responder!(
358    fnet_routes_admin::RuleSetV6RemoveRuleResponder,
359    Result<(), fnet_routes_admin::RuleSetError>,
360);
361impl_responder!(
362    fnet_routes_admin::RuleSetV6AuthenticateForRouteTableResponder,
363    Result<(), fnet_routes_admin::AuthenticateForRouteTableError>,
364);
365
366/// Conversion error for rule elements.
367#[derive(Debug, Error, Clone, Copy, PartialEq)]
368pub enum RuleFidlConversionError {
369    /// A required field was unset. The provided string is the human-readable
370    /// name of the unset field.
371    #[error("BaseMatcher is missing from the RuleMatcher")]
372    BaseMatcherMissing,
373    /// Destination Subnet conversion failed.
374    #[error("failed to convert `destination` to net_types subnet: {0:?}")]
375    DestinationSubnet(net_types::ip::SubnetError),
376    /// Unknown union variant.
377    #[error("unexpected union variant for {name}, got ordinal = ({unknown_ordinal})")]
378    #[allow(missing_docs)]
379    UnknownOrdinal { name: &'static str, unknown_ordinal: u64 },
380}
381
382/// The priority of the rule set, all rule sets are linearized based on this.
383#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]
384pub struct RuleSetPriority(u32);
385
386impl RuleSetPriority {
387    /// Create a new [`RuleSetPriority`].
388    pub const fn new(x: u32) -> Self {
389        Self(x)
390    }
391}
392
393/// The priority for the default rule set, where the default rule that points
394/// to the main table lives.
395pub const DEFAULT_RULE_SET_PRIORITY: RuleSetPriority =
396    RuleSetPriority(fnet_routes::DEFAULT_RULE_SET_PRIORITY);
397
398/// The index of a rule within a provided rule set.
399#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]
400pub struct RuleIndex(u32);
401
402impl RuleIndex {
403    /// Create a new rule index from a scalar.
404    pub const fn new(x: u32) -> Self {
405        Self(x)
406    }
407}
408
409impl From<RuleSetPriority> for u32 {
410    fn from(RuleSetPriority(x): RuleSetPriority) -> Self {
411        x
412    }
413}
414
415impl From<u32> for RuleSetPriority {
416    fn from(x: u32) -> Self {
417        Self(x)
418    }
419}
420
421impl From<RuleIndex> for u32 {
422    fn from(RuleIndex(x): RuleIndex) -> Self {
423        x
424    }
425}
426
427impl From<u32> for RuleIndex {
428    fn from(x: u32) -> Self {
429        Self(x)
430    }
431}
432
433/// How the interface of a packet should be matched against a rule.
434#[derive(Debug, Clone, PartialEq, Eq, Hash)]
435pub enum InterfaceMatcher {
436    /// Match on the name of the device.
437    DeviceName(String),
438    /// There is no bound device.
439    Unbound,
440}
441
442impl TryFrom<fnet_routes::InterfaceMatcher> for InterfaceMatcher {
443    type Error = RuleFidlConversionError;
444    fn try_from(matcher: fnet_routes::InterfaceMatcher) -> Result<Self, Self::Error> {
445        match matcher {
446            fnet_routes::InterfaceMatcher::DeviceName(name) => Ok(Self::DeviceName(name)),
447            fnet_routes::InterfaceMatcher::Unbound(fnet_routes::Unbound) => Ok(Self::Unbound),
448            fnet_routes::InterfaceMatcher::__SourceBreaking { unknown_ordinal } => {
449                Err(RuleFidlConversionError::UnknownOrdinal {
450                    name: "InterfaceMatcher",
451                    unknown_ordinal,
452                })
453            }
454        }
455    }
456}
457
458impl From<InterfaceMatcher> for fnet_routes::InterfaceMatcher {
459    fn from(matcher: InterfaceMatcher) -> Self {
460        match matcher {
461            InterfaceMatcher::DeviceName(name) => fnet_routes::InterfaceMatcher::DeviceName(name),
462            InterfaceMatcher::Unbound => {
463                fnet_routes::InterfaceMatcher::Unbound(fnet_routes::Unbound)
464            }
465        }
466    }
467}
468
469/// The matcher part of the rule that is used to match packets.
470///
471/// The default matcher is the one that matches every packets, i.e., all the
472/// fields are none.
473#[derive(Debug, Clone, Default, Hash, PartialEq, Eq)]
474pub struct RuleMatcher<I: Ip> {
475    /// Matches whether the source address of the packet is from the subnet.
476    pub from: Option<Subnet<I::Addr>>,
477    /// Matches the packet iff the packet was locally generated.
478    pub locally_generated: Option<bool>,
479    /// Matches the packet iff the socket that was bound to the device using
480    /// `SO_BINDTODEVICE`.
481    pub bound_device: Option<InterfaceMatcher>,
482    /// The matcher for the MARK_1 domain.
483    pub mark_1: Option<MarkMatcher>,
484    /// The matcher for the MARK_2 domain.
485    pub mark_2: Option<MarkMatcher>,
486}
487
488impl TryFrom<fnet_routes::RuleMatcherV4> for RuleMatcher<Ipv4> {
489    type Error = RuleFidlConversionError;
490    fn try_from(
491        fnet_routes::RuleMatcherV4 {
492            from,
493            base,
494            __source_breaking: fidl::marker::SourceBreaking,
495        }: fnet_routes::RuleMatcherV4,
496    ) -> Result<Self, Self::Error> {
497        let fnet_routes::BaseMatcher {
498            locally_generated,
499            bound_device,
500            mark_1,
501            mark_2,
502            __source_breaking: fidl::marker::SourceBreaking,
503        } = base.ok_or(RuleFidlConversionError::BaseMatcherMissing)?;
504        Ok(Self {
505            from: from
506                .map(|from| from.try_into_ext().map_err(RuleFidlConversionError::DestinationSubnet))
507                .transpose()?,
508            locally_generated,
509            bound_device: bound_device.map(InterfaceMatcher::try_from).transpose()?,
510            mark_1: mark_1.map(MarkMatcher::try_from).transpose()?,
511            mark_2: mark_2.map(MarkMatcher::try_from).transpose()?,
512        })
513    }
514}
515
516impl From<RuleMatcher<Ipv4>> for fnet_routes::RuleMatcherV4 {
517    fn from(
518        RuleMatcher { from, locally_generated, bound_device, mark_1, mark_2 }: RuleMatcher<Ipv4>,
519    ) -> Self {
520        fnet_routes::RuleMatcherV4 {
521            from: from.map(|from| fnet::Ipv4AddressWithPrefix {
522                addr: from.network().into_ext(),
523                prefix_len: from.prefix(),
524            }),
525            base: Some(fnet_routes::BaseMatcher {
526                locally_generated,
527                bound_device: bound_device.map(fnet_routes::InterfaceMatcher::from),
528                mark_1: mark_1.map(Into::into),
529                mark_2: mark_2.map(Into::into),
530                __source_breaking: fidl::marker::SourceBreaking,
531            }),
532            __source_breaking: fidl::marker::SourceBreaking,
533        }
534    }
535}
536
537impl TryFrom<fnet_routes::RuleMatcherV6> for RuleMatcher<Ipv6> {
538    type Error = RuleFidlConversionError;
539    fn try_from(
540        fnet_routes::RuleMatcherV6 {
541            from,
542            base,
543            __source_breaking: fidl::marker::SourceBreaking,
544        }: fnet_routes::RuleMatcherV6,
545    ) -> Result<Self, Self::Error> {
546        let fnet_routes::BaseMatcher {
547            locally_generated,
548            bound_device,
549            mark_1,
550            mark_2,
551            __source_breaking: fidl::marker::SourceBreaking,
552        } = base.ok_or(RuleFidlConversionError::BaseMatcherMissing)?;
553        Ok(Self {
554            from: from
555                .map(|from| from.try_into_ext().map_err(RuleFidlConversionError::DestinationSubnet))
556                .transpose()?,
557            locally_generated,
558            bound_device: bound_device.map(InterfaceMatcher::try_from).transpose()?,
559            mark_1: mark_1.map(MarkMatcher::try_from).transpose()?,
560            mark_2: mark_2.map(MarkMatcher::try_from).transpose()?,
561        })
562    }
563}
564
565impl From<RuleMatcher<Ipv6>> for fnet_routes::RuleMatcherV6 {
566    fn from(
567        RuleMatcher { from, locally_generated, bound_device, mark_1, mark_2 }: RuleMatcher<Ipv6>,
568    ) -> Self {
569        fnet_routes::RuleMatcherV6 {
570            from: from.map(|from| fnet::Ipv6AddressWithPrefix {
571                addr: from.network().into_ext(),
572                prefix_len: from.prefix(),
573            }),
574            base: Some(fnet_routes::BaseMatcher {
575                locally_generated,
576                bound_device: bound_device.map(fnet_routes::InterfaceMatcher::from),
577                mark_1: mark_1.map(Into::into),
578                mark_2: mark_2.map(Into::into),
579                __source_breaking: fidl::marker::SourceBreaking,
580            }),
581            __source_breaking: fidl::marker::SourceBreaking,
582        }
583    }
584}
585
586#[derive(Debug, Clone, Hash, PartialEq, Eq)]
587/// A matcher to be used against the mark value.
588pub enum MarkMatcher {
589    /// This mark domain does not have a mark.
590    Unmarked,
591    /// This mark domain has a mark.
592    Marked {
593        /// Mask to apply before comparing to the range in `between`.
594        mask: u32,
595        /// The mark is between the given range.
596        between: RangeInclusive<u32>,
597    },
598}
599
600impl TryFrom<fnet_routes::MarkMatcher> for MarkMatcher {
601    type Error = RuleFidlConversionError;
602
603    fn try_from(sel: fnet_routes::MarkMatcher) -> Result<Self, Self::Error> {
604        match sel {
605            fnet_routes::MarkMatcher::Unmarked(fnet_routes::Unmarked) => Ok(MarkMatcher::Unmarked),
606            fnet_routes::MarkMatcher::Marked(fnet_routes::Marked {
607                mask,
608                between: fnet_routes::Between { start, end },
609            }) => Ok(MarkMatcher::Marked { mask, between: RangeInclusive::new(start, end) }),
610            fnet_routes::MarkMatcher::__SourceBreaking { unknown_ordinal } => {
611                Err(RuleFidlConversionError::UnknownOrdinal {
612                    name: "MarkMatcher",
613                    unknown_ordinal,
614                })
615            }
616        }
617    }
618}
619
620impl From<MarkMatcher> for fnet_routes::MarkMatcher {
621    fn from(sel: MarkMatcher) -> Self {
622        match sel {
623            MarkMatcher::Unmarked => fnet_routes::MarkMatcher::Unmarked(fnet_routes::Unmarked),
624            MarkMatcher::Marked { mask, between } => {
625                let (start, end) = between.into_inner();
626                fnet_routes::MarkMatcher::Marked(fnet_routes::Marked {
627                    mask,
628                    between: fnet_routes::Between { start, end },
629                })
630            }
631        }
632    }
633}
634
635#[derive(Debug, Clone, Copy, Hash, PartialEq, Eq)]
636/// Actions of a rule if the matcher matches.
637pub enum RuleAction {
638    /// Return network is unreachable.
639    Unreachable,
640    /// Look for a route in the indicated route table. If there is no matching
641    /// route in the target table, the lookup will continue to consider the
642    /// next rule.
643    Lookup(crate::TableId),
644}
645
646impl From<fnet_routes::RuleAction> for RuleAction {
647    fn from(action: fnet_routes::RuleAction) -> Self {
648        match action {
649            fnet_routes::RuleAction::Lookup(table_id) => {
650                RuleAction::Lookup(crate::TableId::new(table_id))
651            }
652            fnet_routes::RuleAction::Unreachable(fnet_routes::Unreachable) => {
653                RuleAction::Unreachable
654            }
655            fnet_routes::RuleAction::__SourceBreaking { unknown_ordinal } => {
656                panic!("unexpected mark matcher variant, unknown ordinal: {unknown_ordinal}")
657            }
658        }
659    }
660}
661
662impl From<RuleAction> for fnet_routes::RuleAction {
663    fn from(action: RuleAction) -> Self {
664        match action {
665            RuleAction::Unreachable => {
666                fnet_routes::RuleAction::Unreachable(fnet_routes::Unreachable)
667            }
668            RuleAction::Lookup(table_id) => fnet_routes::RuleAction::Lookup(table_id.get()),
669        }
670    }
671}
672
673/// GenericOverIp version of RouteTableV{4, 6}Request.
674#[derive(GenericOverIp, Debug)]
675#[generic_over_ip(I, Ip)]
676pub enum RuleTableRequest<I: FidlRuleAdminIpExt> {
677    /// Creates a new rule set for the global rule table.
678    NewRuleSet {
679        /// The priority of the the rule set.
680        priority: RuleSetPriority,
681        /// The server end of the rule set protocol.
682        rule_set: fidl::endpoints::ServerEnd<I::RuleSetMarker>,
683        /// Control handle to the protocol.
684        control_handle: I::RuleTableControlHandle,
685    },
686}
687
688impl From<fnet_routes_admin::RuleTableV4Request> for RuleTableRequest<Ipv4> {
689    fn from(value: fnet_routes_admin::RuleTableV4Request) -> Self {
690        match value {
691            fnet_routes_admin::RuleTableV4Request::NewRuleSet {
692                priority,
693                rule_set,
694                control_handle,
695            } => Self::NewRuleSet { priority: RuleSetPriority(priority), rule_set, control_handle },
696        }
697    }
698}
699
700impl From<fnet_routes_admin::RuleTableV6Request> for RuleTableRequest<Ipv6> {
701    fn from(value: fnet_routes_admin::RuleTableV6Request) -> Self {
702        match value {
703            fnet_routes_admin::RuleTableV6Request::NewRuleSet {
704                priority,
705                rule_set,
706                control_handle,
707            } => Self::NewRuleSet { priority: RuleSetPriority(priority), rule_set, control_handle },
708        }
709    }
710}
711
712/// GenericOverIp version of RuleSetV{4, 6}Request.
713#[derive(GenericOverIp, Debug)]
714#[generic_over_ip(I, Ip)]
715pub enum RuleSetRequest<I: FidlRuleAdminIpExt> {
716    /// Adds a rule to the rule set.
717    AddRule {
718        /// The index of the rule to be added.
719        index: RuleIndex,
720        /// The matcher of the rule.
721        matcher: Result<RuleMatcher<I>, RuleFidlConversionError>,
722        /// The action of the rule.
723        action: RuleAction,
724        /// The responder for this request.
725        responder: I::RuleSetAddRuleResponder,
726    },
727    /// Removes a rule from the rule set.
728    RemoveRule {
729        /// The index of the rule to be removed.
730        index: RuleIndex,
731        /// The responder for this request.
732        responder: I::RuleSetRemoveRuleResponder,
733    },
734    /// Authenticates the rule set for managing routes on a route table.
735    AuthenticateForRouteTable {
736        /// The table id of the table being authenticated for.
737        table: u32,
738        /// The credential proving authorization for this route table.
739        token: fidl::Event,
740        /// The responder for this request.
741        responder: I::RuleSetAuthenticateForRouteTableResponder,
742    },
743    /// Closes the rule set
744    Close {
745        /// The control handle to rule set protocol.
746        control_handle: I::RuleSetControlHandle,
747    },
748}
749
750impl From<fnet_routes_admin::RuleSetV4Request> for RuleSetRequest<Ipv4> {
751    fn from(value: fnet_routes_admin::RuleSetV4Request) -> Self {
752        match value {
753            fnet_routes_admin::RuleSetV4Request::AddRule { index, matcher, action, responder } => {
754                RuleSetRequest::AddRule {
755                    index: RuleIndex(index),
756                    matcher: matcher.try_into(),
757                    action: action.into(),
758                    responder,
759                }
760            }
761            fnet_routes_admin::RuleSetV4Request::RemoveRule { index, responder } => {
762                RuleSetRequest::RemoveRule { index: RuleIndex(index), responder }
763            }
764            fnet_routes_admin::RuleSetV4Request::AuthenticateForRouteTable {
765                table,
766                token,
767                responder,
768            } => RuleSetRequest::AuthenticateForRouteTable { table, token, responder },
769            fnet_routes_admin::RuleSetV4Request::Close { control_handle } => {
770                RuleSetRequest::Close { control_handle }
771            }
772        }
773    }
774}
775impl From<fnet_routes_admin::RuleSetV6Request> for RuleSetRequest<Ipv6> {
776    fn from(value: fnet_routes_admin::RuleSetV6Request) -> Self {
777        match value {
778            fnet_routes_admin::RuleSetV6Request::AddRule { index, matcher, action, responder } => {
779                RuleSetRequest::AddRule {
780                    index: RuleIndex(index),
781                    matcher: matcher.try_into(),
782                    action: action.into(),
783                    responder,
784                }
785            }
786            fnet_routes_admin::RuleSetV6Request::RemoveRule { index, responder } => {
787                RuleSetRequest::RemoveRule { index: RuleIndex(index), responder }
788            }
789            fnet_routes_admin::RuleSetV6Request::AuthenticateForRouteTable {
790                table,
791                token,
792                responder,
793            } => RuleSetRequest::AuthenticateForRouteTable { table, token, responder },
794            fnet_routes_admin::RuleSetV6Request::Close { control_handle } => {
795                RuleSetRequest::Close { control_handle }
796            }
797        }
798    }
799}
800
801/// Rule set creation errors.
802#[derive(Clone, Debug, Error)]
803pub enum RuleSetCreationError {
804    /// Proxy creation failed.
805    #[error("failed to create proxy: {0}")]
806    CreateProxy(fidl::Error),
807    /// Rule set creation failed.
808    #[error("failed to create route set: {0}")]
809    RuleSet(fidl::Error),
810}
811
812/// Creates a new rule set for the rule table.
813pub fn new_rule_set<I: Ip + FidlRuleAdminIpExt>(
814    rule_table_proxy: &<I::RuleTableMarker as ProtocolMarker>::Proxy,
815    priority: RuleSetPriority,
816) -> Result<<I::RuleSetMarker as ProtocolMarker>::Proxy, RuleSetCreationError> {
817    let (rule_set_proxy, rule_set_server_end) = fidl::endpoints::create_proxy::<I::RuleSetMarker>();
818
819    #[derive(GenericOverIp)]
820    #[generic_over_ip(I, Ip)]
821    struct NewRuleSetInput<'a, I: FidlRuleAdminIpExt> {
822        rule_set_server_end: fidl::endpoints::ServerEnd<I::RuleSetMarker>,
823        rule_table_proxy: &'a <I::RuleTableMarker as ProtocolMarker>::Proxy,
824    }
825    let result = I::map_ip_in(
826        NewRuleSetInput::<'_, I> { rule_set_server_end, rule_table_proxy },
827        |NewRuleSetInput { rule_set_server_end, rule_table_proxy }| {
828            rule_table_proxy.new_rule_set(priority.into(), rule_set_server_end)
829        },
830        |NewRuleSetInput { rule_set_server_end, rule_table_proxy }| {
831            rule_table_proxy.new_rule_set(priority.into(), rule_set_server_end)
832        },
833    );
834
835    result.map_err(RuleSetCreationError::RuleSet)?;
836    Ok(rule_set_proxy)
837}
838
839/// Dispatches `authenticate_for_route_table` on either the `RuleSetV4` or
840/// `RuleSetV6` proxy.
841pub async fn authenticate_for_route_table<I: Ip + FidlRuleAdminIpExt>(
842    rule_set: &<I::RuleSetMarker as ProtocolMarker>::Proxy,
843    table_id: u32,
844    token: fidl::Event,
845) -> Result<Result<(), fnet_routes_admin::AuthenticateForRouteTableError>, fidl::Error> {
846    #[derive(GenericOverIp)]
847    #[generic_over_ip(I, Ip)]
848    struct AuthenticateForRouteTableInput<'a, I: FidlRuleAdminIpExt> {
849        rule_set: &'a <I::RuleSetMarker as ProtocolMarker>::Proxy,
850        table_id: u32,
851        token: fidl::Event,
852    }
853
854    I::map_ip_in(
855        AuthenticateForRouteTableInput { rule_set, table_id, token },
856        |AuthenticateForRouteTableInput { rule_set, table_id, token }| {
857            Either::Left(rule_set.authenticate_for_route_table(table_id, token))
858        },
859        |AuthenticateForRouteTableInput { rule_set, table_id, token }| {
860            Either::Right(rule_set.authenticate_for_route_table(table_id, token))
861        },
862    )
863    .await
864}
865
866/// Dispatches `add_rule` on either the `RuleSetV4` or `RuleSetV6` proxy.
867pub async fn add_rule<I: Ip + FidlRuleAdminIpExt>(
868    rule_set: &<I::RuleSetMarker as ProtocolMarker>::Proxy,
869    index: RuleIndex,
870    matcher: RuleMatcher<I>,
871    action: RuleAction,
872) -> Result<Result<(), fnet_routes_admin::RuleSetError>, fidl::Error> {
873    #[derive(GenericOverIp)]
874    #[generic_over_ip(I, Ip)]
875    struct AddRuleInput<'a, I: FidlRuleAdminIpExt> {
876        rule_set: &'a <I::RuleSetMarker as ProtocolMarker>::Proxy,
877        index: RuleIndex,
878        matcher: RuleMatcher<I>,
879        action: RuleAction,
880    }
881
882    I::map_ip_in(
883        AddRuleInput { rule_set, index, matcher, action },
884        |AddRuleInput { rule_set, index, matcher, action }| {
885            Either::Left(rule_set.add_rule(index.into(), &matcher.into(), &action.into()))
886        },
887        |AddRuleInput { rule_set, index, matcher, action }| {
888            Either::Right(rule_set.add_rule(index.into(), &matcher.into(), &action.into()))
889        },
890    )
891    .await
892}
893
894/// Dispatches `remove_rule` on either the `RuleSetV4` or `RuleSetV6` proxy.
895pub async fn remove_rule<I: Ip + FidlRuleAdminIpExt>(
896    rule_set: &<I::RuleSetMarker as ProtocolMarker>::Proxy,
897    index: RuleIndex,
898) -> Result<Result<(), fnet_routes_admin::RuleSetError>, fidl::Error> {
899    #[derive(GenericOverIp)]
900    #[generic_over_ip(I, Ip)]
901    struct RemoveRuleInput<'a, I: FidlRuleAdminIpExt> {
902        rule_set: &'a <I::RuleSetMarker as ProtocolMarker>::Proxy,
903        index: RuleIndex,
904    }
905
906    I::map_ip_in(
907        RemoveRuleInput { rule_set, index },
908        |RemoveRuleInput { rule_set, index }| Either::Left(rule_set.remove_rule(index.into())),
909        |RemoveRuleInput { rule_set, index }| Either::Right(rule_set.remove_rule(index.into())),
910    )
911    .await
912}
913
914/// Dispatches `close` on either the `RuleSetV4` or `RuleSetV6` proxy.
915///
916/// Waits until the channel is closed before returning.
917pub async fn close_rule_set<I: Ip + FidlRuleAdminIpExt>(
918    rule_set: <I::RuleSetMarker as ProtocolMarker>::Proxy,
919) -> Result<(), fidl::Error> {
920    #[derive(GenericOverIp)]
921    #[generic_over_ip(I, Ip)]
922    struct CloseInput<'a, I: FidlRuleAdminIpExt> {
923        rule_set: &'a <I::RuleSetMarker as ProtocolMarker>::Proxy,
924    }
925
926    let result = I::map_ip_in(
927        CloseInput { rule_set: &rule_set },
928        |CloseInput { rule_set }| rule_set.close(),
929        |CloseInput { rule_set }| rule_set.close(),
930    );
931
932    assert!(rule_set
933        .on_closed()
934        .await
935        .expect("failed to wait for signals")
936        .contains(fidl::Signals::CHANNEL_PEER_CLOSED));
937
938    result
939}
940
941/// Dispatches either `GetRuleWatcherV4` or `GetRuleWatcherV6` on the state proxy.
942pub fn get_rule_watcher<I: FidlRuleIpExt + FidlRouteIpExt>(
943    state_proxy: &<I::StateMarker as fidl::endpoints::ProtocolMarker>::Proxy,
944) -> Result<<I::RuleWatcherMarker as fidl::endpoints::ProtocolMarker>::Proxy, WatcherCreationError>
945{
946    let (watcher_proxy, watcher_server_end) =
947        fidl::endpoints::create_proxy::<I::RuleWatcherMarker>();
948
949    #[derive(GenericOverIp)]
950    #[generic_over_ip(I, Ip)]
951    struct GetWatcherInputs<'a, I: FidlRuleIpExt + FidlRouteIpExt> {
952        watcher_server_end: fidl::endpoints::ServerEnd<I::RuleWatcherMarker>,
953        state_proxy: &'a <I::StateMarker as fidl::endpoints::ProtocolMarker>::Proxy,
954    }
955    let result = I::map_ip_in(
956        GetWatcherInputs::<'_, I> { watcher_server_end, state_proxy },
957        |GetWatcherInputs { watcher_server_end, state_proxy }| {
958            state_proxy.get_rule_watcher_v4(
959                watcher_server_end,
960                &fnet_routes::RuleWatcherOptionsV4::default(),
961            )
962        },
963        |GetWatcherInputs { watcher_server_end, state_proxy }| {
964            state_proxy.get_rule_watcher_v6(
965                watcher_server_end,
966                &fnet_routes::RuleWatcherOptionsV6::default(),
967            )
968        },
969    );
970
971    result.map_err(WatcherCreationError::GetWatcher)?;
972    Ok(watcher_proxy)
973}
974
975/// Calls `Watch()` on the provided `RuleWatcherV4` or `RuleWatcherV6` proxy.
976pub async fn watch<'a, I: FidlRuleIpExt>(
977    watcher_proxy: &'a <I::RuleWatcherMarker as fidl::endpoints::ProtocolMarker>::Proxy,
978) -> Result<Vec<I::RuleEvent>, fidl::Error> {
979    #[derive(GenericOverIp)]
980    #[generic_over_ip(I, Ip)]
981    struct WatchInputs<'a, I: FidlRuleIpExt> {
982        watcher_proxy: &'a <I::RuleWatcherMarker as fidl::endpoints::ProtocolMarker>::Proxy,
983    }
984    #[derive(GenericOverIp)]
985    #[generic_over_ip(I, Ip)]
986    struct WatchOutputs<I: FidlRuleIpExt> {
987        watch_fut: fidl::client::QueryResponseFut<Vec<I::RuleEvent>>,
988    }
989    let WatchOutputs { watch_fut } = net_types::map_ip_twice!(
990        I,
991        WatchInputs { watcher_proxy },
992        |WatchInputs { watcher_proxy }| { WatchOutputs { watch_fut: watcher_proxy.watch() } }
993    );
994    watch_fut.await
995}
996
997/// Route watcher `Watch` errors.
998#[derive(Clone, Debug, Error)]
999pub enum RuleWatchError {
1000    /// The call to `Watch` returned a FIDL error.
1001    #[error("the call to `Watch()` failed: {0}")]
1002    Fidl(fidl::Error),
1003    /// The event returned by `Watch` encountered a conversion error.
1004    #[error("failed to convert event returned by `Watch()`: {0}")]
1005    Conversion(RuleFidlConversionError),
1006    /// The server returned an empty batch of events.
1007    #[error("the call to `Watch()` returned an empty batch of events")]
1008    EmptyEventBatch,
1009}
1010
1011/// Creates a rules event stream from the state proxy.
1012pub fn rule_event_stream_from_state<I: FidlRuleIpExt + FidlRouteIpExt>(
1013    state: &<I::StateMarker as fidl::endpoints::ProtocolMarker>::Proxy,
1014) -> Result<impl Stream<Item = Result<RuleEvent<I>, RuleWatchError>>, WatcherCreationError> {
1015    let watcher = get_rule_watcher::<I>(state)?;
1016    rule_event_stream_from_watcher(watcher)
1017}
1018
1019/// Turns the provided watcher client into a [`RuleEvent`] stream by applying
1020/// Hanging-Get watch.
1021///
1022/// Each call to `Watch` returns a batch of events, which are flattened into a
1023/// single stream. If an error is encountered while calling `Watch` or while
1024/// converting the event, the stream is immediately terminated.
1025pub fn rule_event_stream_from_watcher<I: FidlRuleIpExt>(
1026    watcher: <I::RuleWatcherMarker as fidl::endpoints::ProtocolMarker>::Proxy,
1027) -> Result<impl Stream<Item = Result<RuleEvent<I>, RuleWatchError>>, WatcherCreationError> {
1028    Ok(stream::ShortCircuit::new(
1029        futures::stream::try_unfold(watcher, |watcher| async {
1030            let events_batch = watch::<I>(&watcher).await.map_err(RuleWatchError::Fidl)?;
1031            if events_batch.is_empty() {
1032                return Err(RuleWatchError::EmptyEventBatch);
1033            }
1034            let events_batch = events_batch
1035                .into_iter()
1036                .map(|event| event.try_into().map_err(RuleWatchError::Conversion));
1037            let event_stream = futures::stream::iter(events_batch);
1038            Ok(Some((event_stream, watcher)))
1039        })
1040        // Flatten the stream of event streams into a single event stream.
1041        .try_flatten(),
1042    ))
1043}
1044
1045/// Errors returned by [`collect_rules_until_idle`].
1046#[derive(Clone, Debug, Error)]
1047pub enum CollectRulesUntilIdleError<I: FidlRuleIpExt> {
1048    /// There was an error in the event stream.
1049    #[error("there was an error in the event stream: {0}")]
1050    ErrorInStream(RuleWatchError),
1051    /// There was an unexpected event in the event stream. Only `existing` or
1052    /// `idle` events are expected.
1053    #[error("there was an unexpected event in the event stream: {0:?}")]
1054    UnexpectedEvent(RuleEvent<I>),
1055    /// The event stream unexpectedly ended.
1056    #[error("the event stream unexpectedly ended")]
1057    StreamEnded,
1058}
1059
1060/// Collects all `existing` events from the stream, stopping once the `idle`
1061/// event is observed.
1062pub async fn collect_rules_until_idle<I: FidlRuleIpExt, C: Extend<InstalledRule<I>> + Default>(
1063    event_stream: impl futures::Stream<Item = Result<RuleEvent<I>, RuleWatchError>> + Unpin,
1064) -> Result<C, CollectRulesUntilIdleError<I>> {
1065    fold::fold_while(
1066        event_stream,
1067        Ok(C::default()),
1068        |existing_rules: Result<C, CollectRulesUntilIdleError<I>>, event| {
1069            futures::future::ready(match existing_rules {
1070                Err(_) => {
1071                    unreachable!("`existing_rules` must be `Ok`, because we stop folding on err")
1072                }
1073                Ok(mut existing_rules) => match event {
1074                    Err(e) => {
1075                        fold::FoldWhile::Done(Err(CollectRulesUntilIdleError::ErrorInStream(e)))
1076                    }
1077                    Ok(e) => match e {
1078                        RuleEvent::Existing(e) => {
1079                            existing_rules.extend([e]);
1080                            fold::FoldWhile::Continue(Ok(existing_rules))
1081                        }
1082                        RuleEvent::Idle => fold::FoldWhile::Done(Ok(existing_rules)),
1083                        e @ RuleEvent::Added(_) | e @ RuleEvent::Removed(_) => {
1084                            fold::FoldWhile::Done(Err(CollectRulesUntilIdleError::UnexpectedEvent(
1085                                e,
1086                            )))
1087                        }
1088                    },
1089                },
1090            })
1091        },
1092    )
1093    .await
1094    .short_circuited()
1095    .map_err(|_accumulated_thus_far: Result<C, CollectRulesUntilIdleError<I>>| {
1096        CollectRulesUntilIdleError::StreamEnded
1097    })?
1098}
1099
1100#[cfg(test)]
1101mod tests {
1102    use assert_matches::assert_matches;
1103    use fnet_routes::BaseMatcher;
1104
1105    use super::*;
1106
1107    #[test]
1108    fn missing_base_matcher_v4() {
1109        let fidl_matcher = fidl_fuchsia_net_routes::RuleMatcherV4 {
1110            from: None,
1111            base: None,
1112            __source_breaking: fidl::marker::SourceBreaking,
1113        };
1114        assert_matches!(
1115            RuleMatcher::try_from(fidl_matcher),
1116            Err(RuleFidlConversionError::BaseMatcherMissing)
1117        );
1118    }
1119
1120    #[test]
1121    fn missing_base_matcher_v6() {
1122        let fidl_matcher = fidl_fuchsia_net_routes::RuleMatcherV6 {
1123            from: None,
1124            base: None,
1125            __source_breaking: fidl::marker::SourceBreaking,
1126        };
1127        assert_matches!(
1128            RuleMatcher::try_from(fidl_matcher),
1129            Err(RuleFidlConversionError::BaseMatcherMissing)
1130        );
1131    }
1132
1133    #[test]
1134    fn invalid_destination_subnet_v4() {
1135        let fidl_matcher = fidl_fuchsia_net_routes::RuleMatcherV4 {
1136            // Invalid, because subnets should not have the "host bits" set.
1137            from: Some(net_declare::fidl_ip_v4_with_prefix!("192.168.0.1/24")),
1138            base: Some(BaseMatcher::default()),
1139            __source_breaking: fidl::marker::SourceBreaking,
1140        };
1141        assert_matches!(
1142            RuleMatcher::try_from(fidl_matcher),
1143            Err(RuleFidlConversionError::DestinationSubnet(_))
1144        );
1145    }
1146
1147    #[test]
1148    fn invalid_destination_subnet_v6() {
1149        let fidl_matcher = fidl_fuchsia_net_routes::RuleMatcherV6 {
1150            // Invalid, because subnets should not have the "host bits" set.
1151            from: Some(net_declare::fidl_ip_v6_with_prefix!("fe80::1/64")),
1152            base: Some(BaseMatcher::default()),
1153            __source_breaking: fidl::marker::SourceBreaking,
1154        };
1155        assert_matches!(
1156            RuleMatcher::try_from(fidl_matcher),
1157            Err(RuleFidlConversionError::DestinationSubnet(_))
1158        );
1159    }
1160
1161    #[test]
1162    fn all_unspecified_matcher_v4() {
1163        let fidl_matcher = fidl_fuchsia_net_routes::RuleMatcherV4 {
1164            from: None,
1165            base: Some(BaseMatcher {
1166                locally_generated: None,
1167                bound_device: None,
1168                mark_1: None,
1169                mark_2: None,
1170                __source_breaking: fidl::marker::SourceBreaking,
1171            }),
1172            __source_breaking: fidl::marker::SourceBreaking,
1173        };
1174        assert_matches!(
1175            RuleMatcher::try_from(fidl_matcher),
1176            Ok(RuleMatcher {
1177                from: None,
1178                locally_generated: None,
1179                bound_device: None,
1180                mark_1: None,
1181                mark_2: None,
1182            })
1183        );
1184    }
1185
1186    #[test]
1187    fn all_unspecified_matcher_v6() {
1188        let fidl_matcher = fidl_fuchsia_net_routes::RuleMatcherV6 {
1189            from: None,
1190            base: Some(BaseMatcher {
1191                locally_generated: None,
1192                bound_device: None,
1193                mark_1: None,
1194                mark_2: None,
1195                __source_breaking: fidl::marker::SourceBreaking,
1196            }),
1197            __source_breaking: fidl::marker::SourceBreaking,
1198        };
1199        assert_matches!(
1200            RuleMatcher::try_from(fidl_matcher),
1201            Ok(RuleMatcher {
1202                from: None,
1203                locally_generated: None,
1204                bound_device: None,
1205                mark_1: None,
1206                mark_2: None,
1207            })
1208        );
1209    }
1210}