This commit moves some IP address and MAC address types from proxmox-ve-config to proxmox, so they can be used re-used across our code base.
The code in this commit is mostly the same as in proxmox-ve-config ('bc9253d8'), but I have made a few changes: * Added additional documentation to some of the structs and their methods * Converted all error types to thiserror Signed-off-by: Stefan Hanreich <s.hanre...@proxmox.com> --- Cargo.toml | 1 + proxmox-network-types/Cargo.toml | 18 + proxmox-network-types/debian/changelog | 5 + proxmox-network-types/debian/control | 39 + proxmox-network-types/debian/copyright | 18 + proxmox-network-types/debian/debcargo.toml | 7 + proxmox-network-types/src/ip_address.rs | 1404 ++++++++++++++++++++ proxmox-network-types/src/lib.rs | 2 + proxmox-network-types/src/mac_address.rs | 120 ++ 9 files changed, 1614 insertions(+) create mode 100644 proxmox-network-types/Cargo.toml create mode 100644 proxmox-network-types/debian/changelog create mode 100644 proxmox-network-types/debian/control create mode 100644 proxmox-network-types/debian/copyright create mode 100644 proxmox-network-types/debian/debcargo.toml create mode 100644 proxmox-network-types/src/ip_address.rs create mode 100644 proxmox-network-types/src/lib.rs create mode 100644 proxmox-network-types/src/mac_address.rs diff --git a/Cargo.toml b/Cargo.toml index 268b39eb..2ca0ea61 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -24,6 +24,7 @@ members = [ "proxmox-login", "proxmox-metrics", "proxmox-network-api", + "proxmox-network-types", "proxmox-notify", "proxmox-openid", "proxmox-product-config", diff --git a/proxmox-network-types/Cargo.toml b/proxmox-network-types/Cargo.toml new file mode 100644 index 00000000..2ac0e96a --- /dev/null +++ b/proxmox-network-types/Cargo.toml @@ -0,0 +1,18 @@ +[package] +name = "proxmox-network-types" +description = "Rust types for common networking entities" +version = "0.1.0" +authors.workspace = true +edition.workspace = true +license.workspace = true +homepage.workspace = true +exclude.workspace = true +rust-version.workspace = true + +[dependencies] +serde = { workspace = true, features = [ "derive" ] } +serde_with = "3.8.1" +thiserror = "2" + +[features] +default = [] diff --git a/proxmox-network-types/debian/changelog b/proxmox-network-types/debian/changelog new file mode 100644 index 00000000..78cb0ab0 --- /dev/null +++ b/proxmox-network-types/debian/changelog @@ -0,0 +1,5 @@ +rust-proxmox-network-types (0.1.0-1) unstable; urgency=medium + + * Initial release. + + -- Proxmox Support Team <supp...@proxmox.com> Mon, 03 Jun 2024 10:51:11 +0200 diff --git a/proxmox-network-types/debian/control b/proxmox-network-types/debian/control new file mode 100644 index 00000000..bc0b2aa4 --- /dev/null +++ b/proxmox-network-types/debian/control @@ -0,0 +1,39 @@ +Source: rust-proxmox-network-types +Section: rust +Priority: optional +Build-Depends: debhelper-compat (= 13), + dh-sequence-cargo +Build-Depends-Arch: cargo:native <!nocheck>, + rustc:native (>= 1.82) <!nocheck>, + libstd-rust-dev <!nocheck>, + librust-serde-1+default-dev <!nocheck>, + librust-serde-1+derive-dev <!nocheck>, + librust-serde-with-3+default-dev (>= 3.8.1-~~) <!nocheck>, + librust-thiserror-2+default-dev <!nocheck> +Maintainer: Proxmox Support Team <supp...@proxmox.com> +Standards-Version: 4.7.0 +Vcs-Git: git://git.proxmox.com/git/proxmox.git +Vcs-Browser: https://git.proxmox.com/?p=proxmox.git +Homepage: https://proxmox.com +X-Cargo-Crate: proxmox-network-types +Rules-Requires-Root: no + +Package: librust-proxmox-network-types-dev +Architecture: any +Multi-Arch: same +Depends: + ${misc:Depends}, + librust-serde-1+default-dev, + librust-serde-1+derive-dev, + librust-serde-with-3+default-dev (>= 3.8.1-~~), + librust-thiserror-2+default-dev +Provides: + librust-proxmox-network-types+default-dev (= ${binary:Version}), + librust-proxmox-network-types-0-dev (= ${binary:Version}), + librust-proxmox-network-types-0+default-dev (= ${binary:Version}), + librust-proxmox-network-types-0.1-dev (= ${binary:Version}), + librust-proxmox-network-types-0.1+default-dev (= ${binary:Version}), + librust-proxmox-network-types-0.1.0-dev (= ${binary:Version}), + librust-proxmox-network-types-0.1.0+default-dev (= ${binary:Version}) +Description: Rust types for common networking entities - Rust source code + Source code for Debianized Rust crate "proxmox-network-types" diff --git a/proxmox-network-types/debian/copyright b/proxmox-network-types/debian/copyright new file mode 100644 index 00000000..1ea8a56b --- /dev/null +++ b/proxmox-network-types/debian/copyright @@ -0,0 +1,18 @@ +Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ + +Files: + * +Copyright: 2019 - 2025 Proxmox Server Solutions GmbH <supp...@proxmox.com> +License: AGPL-3.0-or-later + This program is free software: you can redistribute it and/or modify it under + the terms of the GNU Affero General Public License as published by the Free + Software Foundation, either version 3 of the License, or (at your option) any + later version. + . + This program is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS + FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more + details. + . + You should have received a copy of the GNU Affero General Public License along + with this program. If not, see <https://www.gnu.org/licenses/>. diff --git a/proxmox-network-types/debian/debcargo.toml b/proxmox-network-types/debian/debcargo.toml new file mode 100644 index 00000000..b7864cdb --- /dev/null +++ b/proxmox-network-types/debian/debcargo.toml @@ -0,0 +1,7 @@ +overlay = "." +crate_src_path = ".." +maintainer = "Proxmox Support Team <supp...@proxmox.com>" + +[source] +vcs_git = "git://git.proxmox.com/git/proxmox.git" +vcs_browser = "https://git.proxmox.com/?p=proxmox.git" diff --git a/proxmox-network-types/src/ip_address.rs b/proxmox-network-types/src/ip_address.rs new file mode 100644 index 00000000..3d27d38f --- /dev/null +++ b/proxmox-network-types/src/ip_address.rs @@ -0,0 +1,1404 @@ +use std::net::{IpAddr, Ipv4Addr, Ipv6Addr, AddrParseError}; + +use serde_with::{DeserializeFromStr, SerializeDisplay}; +use thiserror::Error; + +/// The family (v4 or v6) of an IP address or CIDR prefix +#[derive(Clone, Copy, Debug, Eq, PartialEq)] +pub enum Family { + V4, + V6, +} + +impl Family { + pub fn is_ipv4(&self) -> bool { + *self == Self::V4 + } + + pub fn is_ipv6(&self) -> bool { + *self == Self::V6 + } +} + +impl std::fmt::Display for Family { + fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result { + match self { + Family::V4 => f.write_str("Ipv4"), + Family::V6 => f.write_str("Ipv6"), + } + } +} + +#[derive(Error, Debug)] +pub enum CidrError { + #[error("invalid netmask")] + InvalidNetmask, + #[error("invalid IP address")] + InvalidAddress(#[from] AddrParseError), +} + +/// Represents either an [`Ipv4Cidr`] or [`Ipv6Cidr`] CIDR prefix +#[derive( + Clone, Copy, Debug, PartialOrd, Ord, PartialEq, Eq, Hash, SerializeDisplay, DeserializeFromStr, +)] +pub enum Cidr { + Ipv4(Ipv4Cidr), + Ipv6(Ipv6Cidr), +} + +impl Cidr { + pub fn new_v4(addr: impl Into<Ipv4Addr>, mask: u8) -> Result<Self, CidrError> { + Ok(Cidr::Ipv4(Ipv4Cidr::new(addr, mask)?)) + } + + pub fn new_v6(addr: impl Into<Ipv6Addr>, mask: u8) -> Result<Self, CidrError> { + Ok(Cidr::Ipv6(Ipv6Cidr::new(addr, mask)?)) + } + + /// which [`Family`] this CIDr belongs to + pub const fn family(&self) -> Family { + match self { + Cidr::Ipv4(_) => Family::V4, + Cidr::Ipv6(_) => Family::V6, + } + } + + pub fn is_ipv4(&self) -> bool { + matches!(self, Cidr::Ipv4(_)) + } + + pub fn is_ipv6(&self) -> bool { + matches!(self, Cidr::Ipv6(_)) + } + + /// Whether a given IP address is contained in this [`Cidr`] + /// + /// This only works if both [`IpAddr`] are in the same family, otherwise the function returns + /// false. + pub fn contains_address(&self, ip: &IpAddr) -> bool { + match (self, ip) { + (Cidr::Ipv4(cidr), IpAddr::V4(ip)) => cidr.contains_address(ip), + (Cidr::Ipv6(cidr), IpAddr::V6(ip)) => cidr.contains_address(ip), + _ => false, + } + } +} + +impl std::fmt::Display for Cidr { + fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result { + match self { + Self::Ipv4(ip) => f.write_str(ip.to_string().as_str()), + Self::Ipv6(ip) => f.write_str(ip.to_string().as_str()), + } + } +} + +impl std::str::FromStr for Cidr { + type Err = CidrError; + + fn from_str(s: &str) -> Result<Self, Self::Err> { + if let Ok(ip) = s.parse::<Ipv4Cidr>() { + return Ok(Cidr::Ipv4(ip)); + } + + Ok(Cidr::Ipv6(s.parse()?)) + } +} + +impl From<Ipv4Cidr> for Cidr { + fn from(cidr: Ipv4Cidr) -> Self { + Cidr::Ipv4(cidr) + } +} + +impl From<Ipv6Cidr> for Cidr { + fn from(cidr: Ipv6Cidr) -> Self { + Cidr::Ipv6(cidr) + } +} + +impl From<IpAddr> for Cidr { + fn from(value: IpAddr) -> Self { + match value { + IpAddr::V4(addr) => Ipv4Cidr::from(addr).into(), + IpAddr::V6(addr) => Ipv6Cidr::from(addr).into(), + } + } +} + +const IPV4_LENGTH: u8 = 32; + +#[derive( + SerializeDisplay, DeserializeFromStr, Clone, Copy, Debug, PartialOrd, Ord, PartialEq, Eq, Hash, +)] +pub struct Ipv4Cidr { + addr: Ipv4Addr, + mask: u8, +} + +impl Ipv4Cidr { + pub fn new(addr: impl Into<Ipv4Addr>, mask: u8) -> Result<Self, CidrError> { + if mask > IPV4_LENGTH { + return Err(CidrError::InvalidNetmask); + } + + Ok(Self { + addr: addr.into(), + mask, + }) + } + + pub fn contains_address(&self, other: &Ipv4Addr) -> bool { + let bits = u32::from_be_bytes(self.addr.octets()); + let other_bits = u32::from_be_bytes(other.octets()); + + let shift_amount: u32 = IPV4_LENGTH.saturating_sub(self.mask).into(); + + bits.checked_shr(shift_amount).unwrap_or(0) + == other_bits.checked_shr(shift_amount).unwrap_or(0) + } + + pub fn address(&self) -> &Ipv4Addr { + &self.addr + } + + pub fn mask(&self) -> u8 { + self.mask + } +} + +impl<T: Into<Ipv4Addr>> From<T> for Ipv4Cidr { + fn from(value: T) -> Self { + Self { + addr: value.into(), + mask: 32, + } + } +} + +impl std::str::FromStr for Ipv4Cidr { + type Err = CidrError; + + fn from_str(s: &str) -> Result<Self, Self::Err> { + Ok(match s.find('/') { + None => Self { + addr: s.parse()?, + mask: 32, + }, + Some(pos) => { + let mask: u8 = s[(pos + 1)..] + .parse() + .map_err(|_| CidrError::InvalidNetmask)?; + + Self::new(s[..pos].parse::<Ipv4Addr>()?, mask)? + } + }) + } +} + +impl std::fmt::Display for Ipv4Cidr { + fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result { + write!(f, "{}/{}", &self.addr, self.mask) + } +} + +const IPV6_LENGTH: u8 = 128; + +#[derive( + SerializeDisplay, DeserializeFromStr, Clone, Copy, Debug, PartialOrd, Ord, PartialEq, Eq, Hash, +)] +pub struct Ipv6Cidr { + addr: Ipv6Addr, + mask: u8, +} + +impl Ipv6Cidr { + pub fn new(addr: impl Into<Ipv6Addr>, mask: u8) -> Result<Self, CidrError> { + if mask > IPV6_LENGTH { + return Err(CidrError::InvalidNetmask); + } + + Ok(Self { + addr: addr.into(), + mask, + }) + } + + pub fn contains_address(&self, other: &Ipv6Addr) -> bool { + let bits = u128::from_be_bytes(self.addr.octets()); + let other_bits = u128::from_be_bytes(other.octets()); + + let shift_amount: u32 = IPV6_LENGTH.saturating_sub(self.mask).into(); + + bits.checked_shr(shift_amount).unwrap_or(0) + == other_bits.checked_shr(shift_amount).unwrap_or(0) + } + + pub fn address(&self) -> &Ipv6Addr { + &self.addr + } + + pub fn mask(&self) -> u8 { + self.mask + } +} + +impl std::str::FromStr for Ipv6Cidr { + type Err = CidrError; + + fn from_str(s: &str) -> Result<Self, Self::Err> { + Ok(match s.find('/') { + None => Self { + addr: s.parse()?, + mask: 128, + }, + Some(pos) => { + let mask: u8 = s[(pos + 1)..] + .parse() + .map_err(|_| CidrError::InvalidNetmask)?; + + Self::new(s[..pos].parse::<Ipv6Addr>()?, mask)? + } + }) + } +} + +impl std::fmt::Display for Ipv6Cidr { + fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result { + write!(f, "{}/{}", &self.addr, self.mask) + } +} + +impl<T: Into<Ipv6Addr>> From<T> for Ipv6Cidr { + fn from(addr: T) -> Self { + Self { + addr: addr.into(), + mask: 128, + } + } +} + +#[derive(Clone, Copy, Debug, PartialOrd, Ord, PartialEq, Eq, Hash, Error)] +pub enum IpRangeError { + #[error("mismatched ip address families")] + MismatchedFamilies, + #[error("start is greater than last")] + StartGreaterThanLast, + #[error("invalid ip range format")] + InvalidFormat, +} + +/// Represents a range of IPv4 or IPv6 addresses. +/// +/// For more information see [`AddressRange`] +#[derive( + Clone, Debug, PartialEq, Eq, Hash, PartialOrd, Ord, SerializeDisplay, DeserializeFromStr, +)] +pub enum IpRange { + V4(AddressRange<Ipv4Addr>), + V6(AddressRange<Ipv6Addr>), +} + +impl IpRange { + /// Returns the family of the IpRange. + pub fn family(&self) -> Family { + match self { + IpRange::V4(_) => Family::V4, + IpRange::V6(_) => Family::V6, + } + } + + /// Creates a new [`IpRange`] from two [`IpAddr`]. + /// + /// # Errors + /// + /// This function will return an error if start and last IP address are not from the same family. + pub fn new(start: impl Into<IpAddr>, last: impl Into<IpAddr>) -> Result<Self, IpRangeError> { + match (start.into(), last.into()) { + (IpAddr::V4(start), IpAddr::V4(last)) => Self::new_v4(start, last), + (IpAddr::V6(start), IpAddr::V6(last)) => Self::new_v6(start, last), + _ => Err(IpRangeError::MismatchedFamilies), + } + } + + /// construct a new IPv4 Range + pub fn new_v4( + start: impl Into<Ipv4Addr>, + last: impl Into<Ipv4Addr>, + ) -> Result<Self, IpRangeError> { + Ok(IpRange::V4(AddressRange::new_v4(start, last)?)) + } + + /// construct a new IPv6 Range + pub fn new_v6( + start: impl Into<Ipv6Addr>, + last: impl Into<Ipv6Addr>, + ) -> Result<Self, IpRangeError> { + Ok(IpRange::V6(AddressRange::new_v6(start, last)?)) + } + + /// Converts an IpRange into the minimal amount of CIDRs. + /// + /// see the concrete implementations of [`AddressRange<Ipv4Addr>`] or [`AddressRange<Ipv6Addr>`] + /// respectively + pub fn to_cidrs(&self) -> Vec<Cidr> { + match self { + IpRange::V4(range) => range.to_cidrs().into_iter().map(Cidr::from).collect(), + IpRange::V6(range) => range.to_cidrs().into_iter().map(Cidr::from).collect(), + } + } +} + +impl std::str::FromStr for IpRange { + type Err = IpRangeError; + + fn from_str(s: &str) -> Result<Self, Self::Err> { + if let Ok(range) = s.parse() { + return Ok(IpRange::V4(range)); + } + + if let Ok(range) = s.parse() { + return Ok(IpRange::V6(range)); + } + + Err(IpRangeError::InvalidFormat) + } +} + +impl std::fmt::Display for IpRange { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + match self { + IpRange::V4(range) => range.fmt(f), + IpRange::V6(range) => range.fmt(f), + } + } +} + +/// Represents a range of IP addresses from start to last. +/// +/// This type is for encapsulation purposes for the [`IpRange`] enum and should be instantiated via +/// that enum. +/// +/// # Invariants +/// +/// * start and last have the same IP address family +/// * start is less than or equal to last +/// +/// # Textual representation +/// +/// Two IP addresses separated by a hyphen, e.g.: `127.0.0.1-127.0.0.255` +#[derive( + Clone, Debug, PartialEq, Eq, Hash, PartialOrd, Ord, SerializeDisplay, DeserializeFromStr, +)] +pub struct AddressRange<T> { + start: T, + last: T, +} + +impl AddressRange<Ipv4Addr> { + pub(crate) fn new_v4( + start: impl Into<Ipv4Addr>, + last: impl Into<Ipv4Addr>, + ) -> Result<AddressRange<Ipv4Addr>, IpRangeError> { + let (start, last) = (start.into(), last.into()); + + if start > last { + return Err(IpRangeError::StartGreaterThanLast); + } + + Ok(Self { start, last }) + } + + /// Returns the minimum amount of CIDRs that exactly represent the range + /// + /// The idea behind this algorithm is as follows: + /// + /// Start iterating with current = start of the IP range + /// + /// Find two netmasks + /// * The largest CIDR that the current IP can be the first of + /// * The largest CIDR that *only* contains IPs from current - last + /// + /// Add the smaller of the two CIDRs to our result and current to the first IP that is in + /// the range but not in the CIDR we just added. Proceed until we reached the last of the IP + /// range. + /// + pub fn to_cidrs(&self) -> Vec<Ipv4Cidr> { + let mut cidrs = Vec::new(); + + let mut current = u32::from_be_bytes(self.start.octets()); + let last = u32::from_be_bytes(self.last.octets()); + + if current == last { + // valid Ipv4 since netmask is 32 + cidrs.push(Ipv4Cidr::new(current, 32).unwrap()); + return cidrs; + } + + // special case this, since this is the only possibility of overflow + // when calculating delta_min_mask - makes everything a lot easier + if current == u32::MIN && last == u32::MAX { + // valid Ipv4 since it is `0.0.0.0/0` + cidrs.push(Ipv4Cidr::new(current, 0).unwrap()); + return cidrs; + } + + while current <= last { + // netmask of largest CIDR that current IP can be the first of + // cast is safe, because trailing zeroes can at most be 32 + let current_max_mask = IPV4_LENGTH - (current.trailing_zeros() as u8); + + // netmask of largest CIDR that *only* contains IPs of the remaining range + // is at most 32 due to unwrap_or returning 32 and ilog2 being at most 31 + let delta_min_mask = ((last - current) + 1) // safe due to special case above + .checked_ilog2() // should never occur due to special case, but for good measure + .map(|mask| IPV4_LENGTH - mask as u8) + .unwrap_or(IPV4_LENGTH); + + // at most 32, due to current/delta being at most 32 + let netmask = u8::max(current_max_mask, delta_min_mask); + + // netmask is at most 32, therefore safe to unwrap + cidrs.push(Ipv4Cidr::new(current, netmask).unwrap()); + + let delta = 2u32.saturating_pow((IPV4_LENGTH - netmask).into()); + + if let Some(result) = current.checked_add(delta) { + current = result + } else { + // we reached the end of IP address space + break; + } + } + + cidrs + } +} + +impl AddressRange<Ipv6Addr> { + pub(crate) fn new_v6( + start: impl Into<Ipv6Addr>, + last: impl Into<Ipv6Addr>, + ) -> Result<AddressRange<Ipv6Addr>, IpRangeError> { + let (start, last) = (start.into(), last.into()); + + if start > last { + return Err(IpRangeError::StartGreaterThanLast); + } + + Ok(Self { start, last }) + } + + /// Returns the minimum amount of CIDRs that exactly represent the [`AddressRange`]. + /// + /// This function works analogous to the IPv4 version, please refer to the respective + /// documentation of [`AddressRange<Ipv4Addr>`] + pub fn to_cidrs(&self) -> Vec<Ipv6Cidr> { + let mut cidrs = Vec::new(); + + let mut current = u128::from_be_bytes(self.start.octets()); + let last = u128::from_be_bytes(self.last.octets()); + + if current == last { + // valid Ipv6 since netmask is 128 + cidrs.push(Ipv6Cidr::new(current, 128).unwrap()); + return cidrs; + } + + // special case this, since this is the only possibility of overflow + // when calculating delta_min_mask - makes everything a lot easier + if current == u128::MIN && last == u128::MAX { + // valid Ipv6 since it is `::/0` + cidrs.push(Ipv6Cidr::new(current, 0).unwrap()); + return cidrs; + } + + while current <= last { + // netmask of largest CIDR that current IP can be the first of + // cast is safe, because trailing zeroes can at most be 128 + let current_max_mask = IPV6_LENGTH - (current.trailing_zeros() as u8); + + // netmask of largest CIDR that *only* contains IPs of the remaining range + // is at most 128 due to unwrap_or returning 128 and ilog2 being at most 31 + let delta_min_mask = ((last - current) + 1) // safe due to special case above + .checked_ilog2() // should never occur due to special case, but for good measure + .map(|mask| IPV6_LENGTH - mask as u8) + .unwrap_or(IPV6_LENGTH); + + // at most 128, due to current/delta being at most 128 + let netmask = u8::max(current_max_mask, delta_min_mask); + + // netmask is at most 128, therefore safe to unwrap + cidrs.push(Ipv6Cidr::new(current, netmask).unwrap()); + + let delta = 2u128.saturating_pow((IPV6_LENGTH - netmask).into()); + + if let Some(result) = current.checked_add(delta) { + current = result + } else { + // we reached the end of IP address space + break; + } + } + + cidrs + } +} + +impl<T> AddressRange<T> { + /// the first IP address contained in this [`AddressRange`] + pub fn start(&self) -> &T { + &self.start + } + + /// the last IP address contained in this [`AddressRange`] + pub fn last(&self) -> &T { + &self.last + } +} + +impl std::str::FromStr for AddressRange<Ipv4Addr> { + type Err = IpRangeError; + + fn from_str(s: &str) -> Result<Self, Self::Err> { + if let Some((start, last)) = s.split_once('-') { + let start_address = start + .parse::<Ipv4Addr>() + .map_err(|_| IpRangeError::InvalidFormat)?; + + let last_address = last + .parse::<Ipv4Addr>() + .map_err(|_| IpRangeError::InvalidFormat)?; + + return Self::new_v4(start_address, last_address); + } + + Err(IpRangeError::InvalidFormat) + } +} + +impl std::str::FromStr for AddressRange<Ipv6Addr> { + type Err = IpRangeError; + + fn from_str(s: &str) -> Result<Self, Self::Err> { + if let Some((start, last)) = s.split_once('-') { + let start_address = start + .parse::<Ipv6Addr>() + .map_err(|_| IpRangeError::InvalidFormat)?; + + let last_address = last + .parse::<Ipv6Addr>() + .map_err(|_| IpRangeError::InvalidFormat)?; + + return Self::new_v6(start_address, last_address); + } + + Err(IpRangeError::InvalidFormat) + } +} + +impl<T: std::fmt::Display> std::fmt::Display for AddressRange<T> { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + write!(f, "{}-{}", self.start, self.last) + } +} + +#[cfg(test)] +mod tests { + use super::*; + use std::net::{Ipv4Addr, Ipv6Addr}; + + #[test] + fn test_v4_cidr() { + let mut cidr: Ipv4Cidr = "0.0.0.0/0".parse().expect("valid IPv4 CIDR"); + + assert_eq!(cidr.addr, Ipv4Addr::new(0, 0, 0, 0)); + assert_eq!(cidr.mask, 0); + + assert!(cidr.contains_address(&Ipv4Addr::new(0, 0, 0, 0))); + assert!(cidr.contains_address(&Ipv4Addr::new(255, 255, 255, 255))); + + cidr = "192.168.100.1".parse().expect("valid IPv4 CIDR"); + + assert_eq!(cidr.addr, Ipv4Addr::new(192, 168, 100, 1)); + assert_eq!(cidr.mask, 32); + + assert!(cidr.contains_address(&Ipv4Addr::new(192, 168, 100, 1))); + assert!(!cidr.contains_address(&Ipv4Addr::new(192, 168, 100, 2))); + assert!(!cidr.contains_address(&Ipv4Addr::new(192, 168, 100, 0))); + + cidr = "10.100.5.0/24".parse().expect("valid IPv4 CIDR"); + + assert_eq!(cidr.mask, 24); + + assert!(cidr.contains_address(&Ipv4Addr::new(10, 100, 5, 0))); + assert!(cidr.contains_address(&Ipv4Addr::new(10, 100, 5, 1))); + assert!(cidr.contains_address(&Ipv4Addr::new(10, 100, 5, 100))); + assert!(cidr.contains_address(&Ipv4Addr::new(10, 100, 5, 255))); + assert!(!cidr.contains_address(&Ipv4Addr::new(10, 100, 4, 255))); + assert!(!cidr.contains_address(&Ipv4Addr::new(10, 100, 6, 0))); + + "0.0.0.0/-1".parse::<Ipv4Cidr>().unwrap_err(); + "0.0.0.0/33".parse::<Ipv4Cidr>().unwrap_err(); + "256.256.256.256/10".parse::<Ipv4Cidr>().unwrap_err(); + + "fe80::1/64".parse::<Ipv4Cidr>().unwrap_err(); + "qweasd".parse::<Ipv4Cidr>().unwrap_err(); + "".parse::<Ipv4Cidr>().unwrap_err(); + } + + #[test] + fn test_v6_cidr() { + let mut cidr: Ipv6Cidr = "abab::1/64".parse().expect("valid IPv6 CIDR"); + + assert_eq!(cidr.addr, Ipv6Addr::new(0xABAB, 0, 0, 0, 0, 0, 0, 1)); + assert_eq!(cidr.mask, 64); + + assert!(cidr.contains_address(&Ipv6Addr::new(0xABAB, 0, 0, 0, 0, 0, 0, 0))); + assert!(cidr.contains_address(&Ipv6Addr::new( + 0xABAB, 0, 0, 0, 0xAAAA, 0xAAAA, 0xAAAA, 0xAAAA + ))); + assert!(cidr.contains_address(&Ipv6Addr::new( + 0xABAB, 0, 0, 0, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF + ))); + assert!(!cidr.contains_address(&Ipv6Addr::new(0xABAB, 0, 0, 1, 0, 0, 0, 0))); + assert!(!cidr.contains_address(&Ipv6Addr::new( + 0xABAA, 0, 0, 0, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF + ))); + + cidr = "eeee::1".parse().expect("valid IPv6 CIDR"); + + assert_eq!(cidr.mask, 128); + + assert!(cidr.contains_address(&Ipv6Addr::new(0xEEEE, 0, 0, 0, 0, 0, 0, 1))); + assert!(!cidr.contains_address(&Ipv6Addr::new( + 0xEEED, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF + ))); + assert!(!cidr.contains_address(&Ipv6Addr::new(0xEEEE, 0, 0, 0, 0, 0, 0, 0))); + + "eeee::1/-1".parse::<Ipv6Cidr>().unwrap_err(); + "eeee::1/129".parse::<Ipv6Cidr>().unwrap_err(); + "gggg::1/64".parse::<Ipv6Cidr>().unwrap_err(); + + "192.168.0.1".parse::<Ipv6Cidr>().unwrap_err(); + "qweasd".parse::<Ipv6Cidr>().unwrap_err(); + "".parse::<Ipv6Cidr>().unwrap_err(); + } + + #[test] + fn test_ip_range() { + IpRange::new([10, 0, 0, 2], [10, 0, 0, 1]).unwrap_err(); + + IpRange::new( + [0x2001, 0x0db8, 0, 0, 0, 0, 0, 0x1000], + [0x2001, 0x0db8, 0, 0, 0, 0, 0, 0], + ) + .unwrap_err(); + + let v4_range = IpRange::new([10, 0, 0, 0], [10, 0, 0, 100]).unwrap(); + assert_eq!(v4_range.family(), Family::V4); + + let v6_range = IpRange::new( + [0x2001, 0x0db8, 0, 0, 0, 0, 0, 0], + [0x2001, 0x0db8, 0, 0, 0, 0, 0, 0x1000], + ) + .unwrap(); + assert_eq!(v6_range.family(), Family::V6); + + "10.0.0.1-10.0.0.100".parse::<IpRange>().unwrap(); + "2001:db8::1-2001:db8::f".parse::<IpRange>().unwrap(); + + "10.0.0.1-2001:db8::1000".parse::<IpRange>().unwrap_err(); + "2001:db8::1-192.168.0.2".parse::<IpRange>().unwrap_err(); + + "10.0.0.1-10.0.0.0".parse::<IpRange>().unwrap_err(); + "2001:db8::1-2001:db8::0".parse::<IpRange>().unwrap_err(); + } + + #[test] + fn test_ipv4_to_cidrs() { + let range = AddressRange::new_v4([192, 168, 0, 100], [192, 168, 0, 100]).unwrap(); + + assert_eq!( + [Ipv4Cidr::new([192, 168, 0, 100], 32).unwrap()], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([192, 168, 0, 100], [192, 168, 0, 200]).unwrap(); + + assert_eq!( + [ + Ipv4Cidr::new([192, 168, 0, 100], 30).unwrap(), + Ipv4Cidr::new([192, 168, 0, 104], 29).unwrap(), + Ipv4Cidr::new([192, 168, 0, 112], 28).unwrap(), + Ipv4Cidr::new([192, 168, 0, 128], 26).unwrap(), + Ipv4Cidr::new([192, 168, 0, 192], 29).unwrap(), + Ipv4Cidr::new([192, 168, 0, 200], 32).unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([192, 168, 0, 101], [192, 168, 0, 200]).unwrap(); + + assert_eq!( + [ + Ipv4Cidr::new([192, 168, 0, 101], 32).unwrap(), + Ipv4Cidr::new([192, 168, 0, 102], 31).unwrap(), + Ipv4Cidr::new([192, 168, 0, 104], 29).unwrap(), + Ipv4Cidr::new([192, 168, 0, 112], 28).unwrap(), + Ipv4Cidr::new([192, 168, 0, 128], 26).unwrap(), + Ipv4Cidr::new([192, 168, 0, 192], 29).unwrap(), + Ipv4Cidr::new([192, 168, 0, 200], 32).unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([192, 168, 0, 101], [192, 168, 0, 101]).unwrap(); + + assert_eq!( + [Ipv4Cidr::new([192, 168, 0, 101], 32).unwrap()], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([192, 168, 0, 101], [192, 168, 0, 201]).unwrap(); + + assert_eq!( + [ + Ipv4Cidr::new([192, 168, 0, 101], 32).unwrap(), + Ipv4Cidr::new([192, 168, 0, 102], 31).unwrap(), + Ipv4Cidr::new([192, 168, 0, 104], 29).unwrap(), + Ipv4Cidr::new([192, 168, 0, 112], 28).unwrap(), + Ipv4Cidr::new([192, 168, 0, 128], 26).unwrap(), + Ipv4Cidr::new([192, 168, 0, 192], 29).unwrap(), + Ipv4Cidr::new([192, 168, 0, 200], 31).unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([192, 168, 0, 0], [192, 168, 0, 255]).unwrap(); + + assert_eq!( + [Ipv4Cidr::new([192, 168, 0, 0], 24).unwrap(),], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([0, 0, 0, 0], [255, 255, 255, 255]).unwrap(); + + assert_eq!( + [Ipv4Cidr::new([0, 0, 0, 0], 0).unwrap(),], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([0, 0, 0, 1], [255, 255, 255, 255]).unwrap(); + + assert_eq!( + [ + Ipv4Cidr::new([0, 0, 0, 1], 32).unwrap(), + Ipv4Cidr::new([0, 0, 0, 2], 31).unwrap(), + Ipv4Cidr::new([0, 0, 0, 4], 30).unwrap(), + Ipv4Cidr::new([0, 0, 0, 8], 29).unwrap(), + Ipv4Cidr::new([0, 0, 0, 16], 28).unwrap(), + Ipv4Cidr::new([0, 0, 0, 32], 27).unwrap(), + Ipv4Cidr::new([0, 0, 0, 64], 26).unwrap(), + Ipv4Cidr::new([0, 0, 0, 128], 25).unwrap(), + Ipv4Cidr::new([0, 0, 1, 0], 24).unwrap(), + Ipv4Cidr::new([0, 0, 2, 0], 23).unwrap(), + Ipv4Cidr::new([0, 0, 4, 0], 22).unwrap(), + Ipv4Cidr::new([0, 0, 8, 0], 21).unwrap(), + Ipv4Cidr::new([0, 0, 16, 0], 20).unwrap(), + Ipv4Cidr::new([0, 0, 32, 0], 19).unwrap(), + Ipv4Cidr::new([0, 0, 64, 0], 18).unwrap(), + Ipv4Cidr::new([0, 0, 128, 0], 17).unwrap(), + Ipv4Cidr::new([0, 1, 0, 0], 16).unwrap(), + Ipv4Cidr::new([0, 2, 0, 0], 15).unwrap(), + Ipv4Cidr::new([0, 4, 0, 0], 14).unwrap(), + Ipv4Cidr::new([0, 8, 0, 0], 13).unwrap(), + Ipv4Cidr::new([0, 16, 0, 0], 12).unwrap(), + Ipv4Cidr::new([0, 32, 0, 0], 11).unwrap(), + Ipv4Cidr::new([0, 64, 0, 0], 10).unwrap(), + Ipv4Cidr::new([0, 128, 0, 0], 9).unwrap(), + Ipv4Cidr::new([1, 0, 0, 0], 8).unwrap(), + Ipv4Cidr::new([2, 0, 0, 0], 7).unwrap(), + Ipv4Cidr::new([4, 0, 0, 0], 6).unwrap(), + Ipv4Cidr::new([8, 0, 0, 0], 5).unwrap(), + Ipv4Cidr::new([16, 0, 0, 0], 4).unwrap(), + Ipv4Cidr::new([32, 0, 0, 0], 3).unwrap(), + Ipv4Cidr::new([64, 0, 0, 0], 2).unwrap(), + Ipv4Cidr::new([128, 0, 0, 0], 1).unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([0, 0, 0, 0], [255, 255, 255, 254]).unwrap(); + + assert_eq!( + [ + Ipv4Cidr::new([0, 0, 0, 0], 1).unwrap(), + Ipv4Cidr::new([128, 0, 0, 0], 2).unwrap(), + Ipv4Cidr::new([192, 0, 0, 0], 3).unwrap(), + Ipv4Cidr::new([224, 0, 0, 0], 4).unwrap(), + Ipv4Cidr::new([240, 0, 0, 0], 5).unwrap(), + Ipv4Cidr::new([248, 0, 0, 0], 6).unwrap(), + Ipv4Cidr::new([252, 0, 0, 0], 7).unwrap(), + Ipv4Cidr::new([254, 0, 0, 0], 8).unwrap(), + Ipv4Cidr::new([255, 0, 0, 0], 9).unwrap(), + Ipv4Cidr::new([255, 128, 0, 0], 10).unwrap(), + Ipv4Cidr::new([255, 192, 0, 0], 11).unwrap(), + Ipv4Cidr::new([255, 224, 0, 0], 12).unwrap(), + Ipv4Cidr::new([255, 240, 0, 0], 13).unwrap(), + Ipv4Cidr::new([255, 248, 0, 0], 14).unwrap(), + Ipv4Cidr::new([255, 252, 0, 0], 15).unwrap(), + Ipv4Cidr::new([255, 254, 0, 0], 16).unwrap(), + Ipv4Cidr::new([255, 255, 0, 0], 17).unwrap(), + Ipv4Cidr::new([255, 255, 128, 0], 18).unwrap(), + Ipv4Cidr::new([255, 255, 192, 0], 19).unwrap(), + Ipv4Cidr::new([255, 255, 224, 0], 20).unwrap(), + Ipv4Cidr::new([255, 255, 240, 0], 21).unwrap(), + Ipv4Cidr::new([255, 255, 248, 0], 22).unwrap(), + Ipv4Cidr::new([255, 255, 252, 0], 23).unwrap(), + Ipv4Cidr::new([255, 255, 254, 0], 24).unwrap(), + Ipv4Cidr::new([255, 255, 255, 0], 25).unwrap(), + Ipv4Cidr::new([255, 255, 255, 128], 26).unwrap(), + Ipv4Cidr::new([255, 255, 255, 192], 27).unwrap(), + Ipv4Cidr::new([255, 255, 255, 224], 28).unwrap(), + Ipv4Cidr::new([255, 255, 255, 240], 29).unwrap(), + Ipv4Cidr::new([255, 255, 255, 248], 30).unwrap(), + Ipv4Cidr::new([255, 255, 255, 252], 31).unwrap(), + Ipv4Cidr::new([255, 255, 255, 254], 32).unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([0, 0, 0, 0], [0, 0, 0, 0]).unwrap(); + + assert_eq!( + [Ipv4Cidr::new([0, 0, 0, 0], 32).unwrap(),], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v4([255, 255, 255, 255], [255, 255, 255, 255]).unwrap(); + + assert_eq!( + [Ipv4Cidr::new([255, 255, 255, 255], 32).unwrap(),], + range.to_cidrs().as_slice() + ); + } + + #[test] + fn test_ipv6_to_cidrs() { + let range = AddressRange::new_v6( + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1000], + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1000], + ) + .unwrap(); + + assert_eq!( + [Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1000], 128).unwrap()], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1000], + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x2000], + ) + .unwrap(); + + assert_eq!( + [ + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1000], 116).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x2000], 128).unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1001], + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x2000], + ) + .unwrap(); + + assert_eq!( + [ + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1001], 128).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1002], 127).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1004], 126).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1008], 125).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1010], 124).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1020], 123).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1040], 122).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1080], 121).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1100], 120).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1200], 119).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1400], 118).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1800], 117).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x2000], 128).unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1001], + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1001], + ) + .unwrap(); + + assert_eq!( + [Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1001], 128).unwrap(),], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1001], + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x2001], + ) + .unwrap(); + + assert_eq!( + [ + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1001], 128).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1002], 127).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1004], 126).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1008], 125).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1010], 124).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1020], 123).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1040], 122).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1080], 121).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1100], 120).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1200], 119).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1400], 118).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x1800], 117).unwrap(), + Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0x2000], 127).unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0], + [0x2001, 0x0DB8, 0, 0, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF], + ) + .unwrap(); + + assert_eq!( + [Ipv6Cidr::new([0x2001, 0x0DB8, 0, 0, 0, 0, 0, 0], 64).unwrap()], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [0, 0, 0, 0, 0, 0, 0, 0], + [ + 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, + ], + ) + .unwrap(); + + assert_eq!( + [Ipv6Cidr::new([0, 0, 0, 0, 0, 0, 0, 0], 0).unwrap(),], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [0, 0, 0, 0, 0, 0, 0, 0x0001], + [ + 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, + ], + ) + .unwrap(); + + assert_eq!( + [ + "::1/128".parse::<Ipv6Cidr>().unwrap(), + "::2/127".parse::<Ipv6Cidr>().unwrap(), + "::4/126".parse::<Ipv6Cidr>().unwrap(), + "::8/125".parse::<Ipv6Cidr>().unwrap(), + "::10/124".parse::<Ipv6Cidr>().unwrap(), + "::20/123".parse::<Ipv6Cidr>().unwrap(), + "::40/122".parse::<Ipv6Cidr>().unwrap(), + "::80/121".parse::<Ipv6Cidr>().unwrap(), + "::100/120".parse::<Ipv6Cidr>().unwrap(), + "::200/119".parse::<Ipv6Cidr>().unwrap(), + "::400/118".parse::<Ipv6Cidr>().unwrap(), + "::800/117".parse::<Ipv6Cidr>().unwrap(), + "::1000/116".parse::<Ipv6Cidr>().unwrap(), + "::2000/115".parse::<Ipv6Cidr>().unwrap(), + "::4000/114".parse::<Ipv6Cidr>().unwrap(), + "::8000/113".parse::<Ipv6Cidr>().unwrap(), + "::1:0/112".parse::<Ipv6Cidr>().unwrap(), + "::2:0/111".parse::<Ipv6Cidr>().unwrap(), + "::4:0/110".parse::<Ipv6Cidr>().unwrap(), + "::8:0/109".parse::<Ipv6Cidr>().unwrap(), + "::10:0/108".parse::<Ipv6Cidr>().unwrap(), + "::20:0/107".parse::<Ipv6Cidr>().unwrap(), + "::40:0/106".parse::<Ipv6Cidr>().unwrap(), + "::80:0/105".parse::<Ipv6Cidr>().unwrap(), + "::100:0/104".parse::<Ipv6Cidr>().unwrap(), + "::200:0/103".parse::<Ipv6Cidr>().unwrap(), + "::400:0/102".parse::<Ipv6Cidr>().unwrap(), + "::800:0/101".parse::<Ipv6Cidr>().unwrap(), + "::1000:0/100".parse::<Ipv6Cidr>().unwrap(), + "::2000:0/99".parse::<Ipv6Cidr>().unwrap(), + "::4000:0/98".parse::<Ipv6Cidr>().unwrap(), + "::8000:0/97".parse::<Ipv6Cidr>().unwrap(), + "::1:0:0/96".parse::<Ipv6Cidr>().unwrap(), + "::2:0:0/95".parse::<Ipv6Cidr>().unwrap(), + "::4:0:0/94".parse::<Ipv6Cidr>().unwrap(), + "::8:0:0/93".parse::<Ipv6Cidr>().unwrap(), + "::10:0:0/92".parse::<Ipv6Cidr>().unwrap(), + "::20:0:0/91".parse::<Ipv6Cidr>().unwrap(), + "::40:0:0/90".parse::<Ipv6Cidr>().unwrap(), + "::80:0:0/89".parse::<Ipv6Cidr>().unwrap(), + "::100:0:0/88".parse::<Ipv6Cidr>().unwrap(), + "::200:0:0/87".parse::<Ipv6Cidr>().unwrap(), + "::400:0:0/86".parse::<Ipv6Cidr>().unwrap(), + "::800:0:0/85".parse::<Ipv6Cidr>().unwrap(), + "::1000:0:0/84".parse::<Ipv6Cidr>().unwrap(), + "::2000:0:0/83".parse::<Ipv6Cidr>().unwrap(), + "::4000:0:0/82".parse::<Ipv6Cidr>().unwrap(), + "::8000:0:0/81".parse::<Ipv6Cidr>().unwrap(), + "::1:0:0:0/80".parse::<Ipv6Cidr>().unwrap(), + "::2:0:0:0/79".parse::<Ipv6Cidr>().unwrap(), + "::4:0:0:0/78".parse::<Ipv6Cidr>().unwrap(), + "::8:0:0:0/77".parse::<Ipv6Cidr>().unwrap(), + "::10:0:0:0/76".parse::<Ipv6Cidr>().unwrap(), + "::20:0:0:0/75".parse::<Ipv6Cidr>().unwrap(), + "::40:0:0:0/74".parse::<Ipv6Cidr>().unwrap(), + "::80:0:0:0/73".parse::<Ipv6Cidr>().unwrap(), + "::100:0:0:0/72".parse::<Ipv6Cidr>().unwrap(), + "::200:0:0:0/71".parse::<Ipv6Cidr>().unwrap(), + "::400:0:0:0/70".parse::<Ipv6Cidr>().unwrap(), + "::800:0:0:0/69".parse::<Ipv6Cidr>().unwrap(), + "::1000:0:0:0/68".parse::<Ipv6Cidr>().unwrap(), + "::2000:0:0:0/67".parse::<Ipv6Cidr>().unwrap(), + "::4000:0:0:0/66".parse::<Ipv6Cidr>().unwrap(), + "::8000:0:0:0/65".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:1::/64".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:2::/63".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:4::/62".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:8::/61".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:10::/60".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:20::/59".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:40::/58".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:80::/57".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:100::/56".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:200::/55".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:400::/54".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:800::/53".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:1000::/52".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:2000::/51".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:4000::/50".parse::<Ipv6Cidr>().unwrap(), + "0:0:0:8000::/49".parse::<Ipv6Cidr>().unwrap(), + "0:0:1::/48".parse::<Ipv6Cidr>().unwrap(), + "0:0:2::/47".parse::<Ipv6Cidr>().unwrap(), + "0:0:4::/46".parse::<Ipv6Cidr>().unwrap(), + "0:0:8::/45".parse::<Ipv6Cidr>().unwrap(), + "0:0:10::/44".parse::<Ipv6Cidr>().unwrap(), + "0:0:20::/43".parse::<Ipv6Cidr>().unwrap(), + "0:0:40::/42".parse::<Ipv6Cidr>().unwrap(), + "0:0:80::/41".parse::<Ipv6Cidr>().unwrap(), + "0:0:100::/40".parse::<Ipv6Cidr>().unwrap(), + "0:0:200::/39".parse::<Ipv6Cidr>().unwrap(), + "0:0:400::/38".parse::<Ipv6Cidr>().unwrap(), + "0:0:800::/37".parse::<Ipv6Cidr>().unwrap(), + "0:0:1000::/36".parse::<Ipv6Cidr>().unwrap(), + "0:0:2000::/35".parse::<Ipv6Cidr>().unwrap(), + "0:0:4000::/34".parse::<Ipv6Cidr>().unwrap(), + "0:0:8000::/33".parse::<Ipv6Cidr>().unwrap(), + "0:1::/32".parse::<Ipv6Cidr>().unwrap(), + "0:2::/31".parse::<Ipv6Cidr>().unwrap(), + "0:4::/30".parse::<Ipv6Cidr>().unwrap(), + "0:8::/29".parse::<Ipv6Cidr>().unwrap(), + "0:10::/28".parse::<Ipv6Cidr>().unwrap(), + "0:20::/27".parse::<Ipv6Cidr>().unwrap(), + "0:40::/26".parse::<Ipv6Cidr>().unwrap(), + "0:80::/25".parse::<Ipv6Cidr>().unwrap(), + "0:100::/24".parse::<Ipv6Cidr>().unwrap(), + "0:200::/23".parse::<Ipv6Cidr>().unwrap(), + "0:400::/22".parse::<Ipv6Cidr>().unwrap(), + "0:800::/21".parse::<Ipv6Cidr>().unwrap(), + "0:1000::/20".parse::<Ipv6Cidr>().unwrap(), + "0:2000::/19".parse::<Ipv6Cidr>().unwrap(), + "0:4000::/18".parse::<Ipv6Cidr>().unwrap(), + "0:8000::/17".parse::<Ipv6Cidr>().unwrap(), + "1::/16".parse::<Ipv6Cidr>().unwrap(), + "2::/15".parse::<Ipv6Cidr>().unwrap(), + "4::/14".parse::<Ipv6Cidr>().unwrap(), + "8::/13".parse::<Ipv6Cidr>().unwrap(), + "10::/12".parse::<Ipv6Cidr>().unwrap(), + "20::/11".parse::<Ipv6Cidr>().unwrap(), + "40::/10".parse::<Ipv6Cidr>().unwrap(), + "80::/9".parse::<Ipv6Cidr>().unwrap(), + "100::/8".parse::<Ipv6Cidr>().unwrap(), + "200::/7".parse::<Ipv6Cidr>().unwrap(), + "400::/6".parse::<Ipv6Cidr>().unwrap(), + "800::/5".parse::<Ipv6Cidr>().unwrap(), + "1000::/4".parse::<Ipv6Cidr>().unwrap(), + "2000::/3".parse::<Ipv6Cidr>().unwrap(), + "4000::/2".parse::<Ipv6Cidr>().unwrap(), + "8000::/1".parse::<Ipv6Cidr>().unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [0, 0, 0, 0, 0, 0, 0, 0], + [ + 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFE, + ], + ) + .unwrap(); + + assert_eq!( + [ + "::/1".parse::<Ipv6Cidr>().unwrap(), + "8000::/2".parse::<Ipv6Cidr>().unwrap(), + "c000::/3".parse::<Ipv6Cidr>().unwrap(), + "e000::/4".parse::<Ipv6Cidr>().unwrap(), + "f000::/5".parse::<Ipv6Cidr>().unwrap(), + "f800::/6".parse::<Ipv6Cidr>().unwrap(), + "fc00::/7".parse::<Ipv6Cidr>().unwrap(), + "fe00::/8".parse::<Ipv6Cidr>().unwrap(), + "ff00::/9".parse::<Ipv6Cidr>().unwrap(), + "ff80::/10".parse::<Ipv6Cidr>().unwrap(), + "ffc0::/11".parse::<Ipv6Cidr>().unwrap(), + "ffe0::/12".parse::<Ipv6Cidr>().unwrap(), + "fff0::/13".parse::<Ipv6Cidr>().unwrap(), + "fff8::/14".parse::<Ipv6Cidr>().unwrap(), + "fffc::/15".parse::<Ipv6Cidr>().unwrap(), + "fffe::/16".parse::<Ipv6Cidr>().unwrap(), + "ffff::/17".parse::<Ipv6Cidr>().unwrap(), + "ffff:8000::/18".parse::<Ipv6Cidr>().unwrap(), + "ffff:c000::/19".parse::<Ipv6Cidr>().unwrap(), + "ffff:e000::/20".parse::<Ipv6Cidr>().unwrap(), + "ffff:f000::/21".parse::<Ipv6Cidr>().unwrap(), + "ffff:f800::/22".parse::<Ipv6Cidr>().unwrap(), + "ffff:fc00::/23".parse::<Ipv6Cidr>().unwrap(), + "ffff:fe00::/24".parse::<Ipv6Cidr>().unwrap(), + "ffff:ff00::/25".parse::<Ipv6Cidr>().unwrap(), + "ffff:ff80::/26".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffc0::/27".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffe0::/28".parse::<Ipv6Cidr>().unwrap(), + "ffff:fff0::/29".parse::<Ipv6Cidr>().unwrap(), + "ffff:fff8::/30".parse::<Ipv6Cidr>().unwrap(), + "ffff:fffc::/31".parse::<Ipv6Cidr>().unwrap(), + "ffff:fffe::/32".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff::/33".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:8000::/34".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:c000::/35".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:e000::/36".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:f000::/37".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:f800::/38".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:fc00::/39".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:fe00::/40".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ff00::/41".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ff80::/42".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffc0::/43".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffe0::/44".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:fff0::/45".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:fff8::/46".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:fffc::/47".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:fffe::/48".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff::/49".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:8000::/50".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:c000::/51".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:e000::/52".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:f000::/53".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:f800::/54".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:fc00::/55".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:fe00::/56".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ff00::/57".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ff80::/58".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffc0::/59".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffe0::/60".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:fff0::/61".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:fff8::/62".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:fffc::/63".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:fffe::/64".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff::/65".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:8000::/66".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:c000::/67".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:e000::/68".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:f000::/69".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:f800::/70".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:fc00::/71".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:fe00::/72".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:ff00::/73".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:ff80::/74".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:ffc0::/75".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:ffe0::/76".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:fff0::/77".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:fff8::/78".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:fffc::/79".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:fffe::/80".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:ffff::/81".parse::<Ipv6Cidr>().unwrap(), + "ffff:ffff:ffff:ffff:ffff:8000::/82" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:c000::/83" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:e000::/84" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:f000::/85" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:f800::/86" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:fc00::/87" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:fe00::/88" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ff00::/89" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ff80::/90" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffc0::/91" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffe0::/92" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:fff0::/93" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:fff8::/94" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:fffc::/95" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:fffe::/96" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff::/97" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:8000:0/98" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:c000:0/99" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:e000:0/100" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:f000:0/101" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:f800:0/102" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:fc00:0/103" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:fe00:0/104" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ff00:0/105" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ff80:0/106" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffc0:0/107" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffe0:0/108" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:fff0:0/109" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:fff8:0/110" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:fffc:0/111" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:fffe:0/112" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:0/113" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:8000/114" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:c000/115" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:e000/116" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:f000/117" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:f800/118" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fc00/119" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fe00/120" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ff00/121" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ff80/122" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffc0/123" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffe0/124" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fff0/125" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fff8/126" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fffc/127" + .parse::<Ipv6Cidr>() + .unwrap(), + "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fffe/128" + .parse::<Ipv6Cidr>() + .unwrap(), + ], + range.to_cidrs().as_slice() + ); + + let range = + AddressRange::new_v6([0, 0, 0, 0, 0, 0, 0, 0], [0, 0, 0, 0, 0, 0, 0, 0]).unwrap(); + + assert_eq!( + [Ipv6Cidr::new([0, 0, 0, 0, 0, 0, 0, 0], 128).unwrap(),], + range.to_cidrs().as_slice() + ); + + let range = AddressRange::new_v6( + [ + 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, + ], + [ + 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, + ], + ) + .unwrap(); + + assert_eq!( + [Ipv6Cidr::new( + [0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF], + 128 + ) + .unwrap(),], + range.to_cidrs().as_slice() + ); + } +} diff --git a/proxmox-network-types/src/lib.rs b/proxmox-network-types/src/lib.rs new file mode 100644 index 00000000..b952d71c --- /dev/null +++ b/proxmox-network-types/src/lib.rs @@ -0,0 +1,2 @@ +pub mod ip_address; +pub mod mac_address; diff --git a/proxmox-network-types/src/mac_address.rs b/proxmox-network-types/src/mac_address.rs new file mode 100644 index 00000000..2c3aad29 --- /dev/null +++ b/proxmox-network-types/src/mac_address.rs @@ -0,0 +1,120 @@ +use std::fmt::Display; +use std::net::Ipv6Addr; + +use serde_with::{DeserializeFromStr, SerializeDisplay}; +use thiserror::Error; + +#[derive(Error, Debug)] +pub enum MacAddressError { + #[error("the hostname must be from 1 to 63 characters long")] + InvalidLength, + #[error("the hostname contains invalid symbols")] + InvalidSymbols, +} + +/// EUI-48 MAC Address +#[derive(Clone, Debug, DeserializeFromStr, SerializeDisplay, PartialEq, Eq, Hash, PartialOrd, Ord)] +pub struct MacAddress([u8; 6]); + +static LOCAL_PART: [u8; 8] = [0xFE, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]; +static EUI64_MIDDLE_PART: [u8; 2] = [0xFF, 0xFE]; + +impl MacAddress { + pub fn new(address: [u8; 6]) -> Self { + Self(address) + } + + /// generates a link local IPv6-address according to RFC 4291 (Appendix A) + pub fn eui64_link_local_address(&self) -> Ipv6Addr { + let head = &self.0[..3]; + let tail = &self.0[3..]; + + let mut eui64_address: Vec<u8> = LOCAL_PART + .iter() + .chain(head.iter()) + .chain(EUI64_MIDDLE_PART.iter()) + .chain(tail.iter()) + .copied() + .collect(); + + // we need to flip the 7th bit of the first eui64 byte + eui64_address[8] ^= 0x02; + + Ipv6Addr::from( + TryInto::<[u8; 16]>::try_into(eui64_address).expect("is an u8 array with 16 entries"), + ) + } +} + +impl std::str::FromStr for MacAddress { + type Err = MacAddressError; + + fn from_str(s: &str) -> Result<Self, Self::Err> { + let split = s.split(':'); + + let parsed = split + .into_iter() + .map(|elem| u8::from_str_radix(elem, 16)) + .collect::<Result<Vec<u8>, _>>() + .map_err(|_| MacAddressError::InvalidSymbols)?; + + if parsed.len() != 6 { + return Err(MacAddressError::InvalidLength); + } + + // SAFETY: ok because of length check + Ok(Self(parsed.try_into().unwrap())) + } +} + +impl Display for MacAddress { + fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { + write!( + f, + "{:<02X}:{:<02X}:{:<02X}:{:<02X}:{:<02X}:{:<02X}", + self.0[0], self.0[1], self.0[2], self.0[3], self.0[4], self.0[5] + ) + } +} + + +#[cfg(test)] +mod tests { + use super::*; + use std::str::FromStr; + + #[test] + fn test_parse_mac_address() { + for input in [ + "aa:aa:aa:11:22:33", + "AA:BB:FF:11:22:33", + "bc:24:11:AA:bb:Ef", + ] { + let mac_address = input.parse::<MacAddress>().expect("valid mac address"); + + assert_eq!(input.to_uppercase(), mac_address.to_string()); + } + + for input in [ + "aa:aa:aa:11:22:33:aa", + "AA:BB:FF:11:22", + "AA:BB:GG:11:22:33", + "AABBGG112233", + "", + ] { + input + .parse::<MacAddress>() + .expect_err("invalid mac address"); + } + } + + #[test] + fn test_eui64_link_local_address() { + let mac_address: MacAddress = "BC:24:11:49:8D:75".parse().expect("valid MAC address"); + + let link_local_address = + Ipv6Addr::from_str("fe80::be24:11ff:fe49:8d75").expect("valid IPv6 address"); + + assert_eq!(link_local_address, mac_address.eui64_link_local_address()); + } +} -- 2.39.5 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel