1use std::{
6 borrow::Cow,
7 net::{IpAddr, Ipv4Addr, Ipv6Addr, SocketAddr},
8};
9
10pub use ::multiaddr::{Error, Protocol};
11use eyre::{Result, eyre};
12use tracing::error;
13
14#[derive(Clone, Debug, Hash, PartialEq, Eq, PartialOrd, Ord)]
15pub struct Multiaddr(::multiaddr::Multiaddr);
16
17impl Multiaddr {
18 pub fn empty() -> Self {
19 Self(::multiaddr::Multiaddr::empty())
20 }
21
22 #[cfg(test)]
23 pub(crate) fn new_internal(inner: ::multiaddr::Multiaddr) -> Self {
24 Self(inner)
25 }
26
27 pub fn iter(&self) -> ::multiaddr::Iter<'_> {
28 self.0.iter()
29 }
30
31 pub fn pop<'a>(&mut self) -> Option<Protocol<'a>> {
32 self.0.pop()
33 }
34
35 pub fn push(&mut self, p: Protocol<'_>) {
36 self.0.push(p)
37 }
38
39 pub fn replace<'a, F>(&self, at: usize, by: F) -> Option<Multiaddr>
40 where
41 F: FnOnce(&Protocol<'_>) -> Option<Protocol<'a>>,
42 {
43 self.0.replace(at, by).map(Self)
44 }
45
46 pub fn len(&self) -> usize {
47 self.0.len()
48 }
49
50 pub fn is_empty(&self) -> bool {
51 self.0.is_empty()
52 }
53
54 pub fn to_anemo_address(&self) -> Result<anemo::types::Address, &'static str> {
57 let mut iter = self.iter();
58
59 match (iter.next(), iter.next()) {
60 (Some(Protocol::Ip4(ipaddr)), Some(Protocol::Udp(port))) => Ok((ipaddr, port).into()),
61 (Some(Protocol::Ip6(ipaddr)), Some(Protocol::Udp(port))) => Ok((ipaddr, port).into()),
62 (Some(Protocol::Dns(hostname)), Some(Protocol::Udp(port))) => {
63 Ok((hostname.as_ref(), port).into())
64 }
65
66 _ => {
67 tracing::warn!("unsupported p2p multiaddr: '{self}'");
68 Err("invalid address")
69 }
70 }
71 }
72
73 pub fn udp_multiaddr_to_listen_address(&self) -> Option<std::net::SocketAddr> {
74 let mut iter = self.iter();
75
76 match (iter.next(), iter.next()) {
77 (Some(Protocol::Ip4(ipaddr)), Some(Protocol::Udp(port))) => Some((ipaddr, port).into()),
78 (Some(Protocol::Ip6(ipaddr)), Some(Protocol::Udp(port))) => Some((ipaddr, port).into()),
79
80 (Some(Protocol::Dns(_)), Some(Protocol::Udp(port))) => {
81 Some((std::net::Ipv4Addr::UNSPECIFIED, port).into())
82 }
83
84 _ => None,
85 }
86 }
87
88 pub fn to_socket_addr(&self) -> Result<SocketAddr> {
93 let mut iter = self.iter();
94 let ip = match iter.next().ok_or_else(|| {
95 eyre!("failed to convert to SocketAddr: Multiaddr does not contain IP")
96 })? {
97 Protocol::Ip4(ip4_addr) => IpAddr::V4(ip4_addr),
98 Protocol::Ip6(ip6_addr) => IpAddr::V6(ip6_addr),
99 unsupported => return Err(eyre!("unsupported protocol {unsupported}")),
100 };
101 let tcp_port = parse_tcp(&mut iter)?;
102 Ok(SocketAddr::new(ip, tcp_port))
103 }
104
105 pub fn is_loosely_valid_tcp_addr(&self) -> bool {
107 let mut iter = self.iter();
108 iter.next(); match iter.next() {
110 Some(Protocol::Tcp(_)) => true,
111 _ => false, }
113 }
114
115 pub fn with_zero_ip(&self) -> Self {
120 let mut new_address = self.0.clone();
121 let Some(protocol) = new_address.iter().next() else {
122 error!("Multiaddr is empty");
123 return Self(new_address);
124 };
125 match protocol {
126 multiaddr::Protocol::Ip4(_)
127 | multiaddr::Protocol::Dns(_)
128 | multiaddr::Protocol::Dns4(_) => {
129 new_address = new_address
130 .replace(0, |_| Some(multiaddr::Protocol::Ip4(Ipv4Addr::UNSPECIFIED)))
131 .unwrap();
132 }
133 multiaddr::Protocol::Ip6(_) | multiaddr::Protocol::Dns6(_) => {
134 new_address = new_address
135 .replace(0, |_| Some(multiaddr::Protocol::Ip6(Ipv6Addr::UNSPECIFIED)))
136 .unwrap();
137 }
138 p => {
139 error!("Unsupported protocol {} in Multiaddr {}!", p, new_address);
140 }
141 }
142 Self(new_address)
143 }
144
145 pub fn with_localhost_ip(&self) -> Self {
149 let mut new_address = self.0.clone();
150 let Some(protocol) = new_address.iter().next() else {
151 error!("Multiaddr is empty");
152 return Self(new_address);
153 };
154 match protocol {
155 multiaddr::Protocol::Ip4(_)
156 | multiaddr::Protocol::Dns(_)
157 | multiaddr::Protocol::Dns4(_) => {
158 new_address = new_address
159 .replace(0, |_| Some(multiaddr::Protocol::Ip4(Ipv4Addr::LOCALHOST)))
160 .unwrap();
161 }
162 multiaddr::Protocol::Ip6(_) | multiaddr::Protocol::Dns6(_) => {
163 new_address = new_address
164 .replace(0, |_| Some(multiaddr::Protocol::Ip6(Ipv6Addr::LOCALHOST)))
165 .unwrap();
166 }
167 p => {
168 error!("Unsupported protocol {} in Multiaddr {}!", p, new_address);
169 }
170 }
171 Self(new_address)
172 }
173
174 pub fn is_localhost_ip(&self) -> bool {
175 let Some(protocol) = self.0.iter().next() else {
176 error!("Multiaddr is empty");
177 return false;
178 };
179 match protocol {
180 multiaddr::Protocol::Ip4(addr) => addr == Ipv4Addr::LOCALHOST,
181 multiaddr::Protocol::Ip6(addr) => addr == Ipv6Addr::LOCALHOST,
182 _ => false,
183 }
184 }
185
186 pub fn hostname(&self) -> Option<String> {
187 for component in self.iter() {
188 match component {
189 Protocol::Ip4(ip) => return Some(ip.to_string()),
190 Protocol::Ip6(ip) => return Some(ip.to_string()),
191 Protocol::Dns(dns) => return Some(dns.to_string()),
192 _ => (),
193 }
194 }
195 None
196 }
197
198 pub fn port(&self) -> Option<u16> {
199 for component in self.iter() {
200 match component {
201 Protocol::Udp(port) | Protocol::Tcp(port) => return Some(port),
202 _ => (),
203 }
204 }
205 None
206 }
207
208 pub fn rewrite_udp_to_tcp(&self) -> Self {
209 let mut new = Self::empty();
210
211 for component in self.iter() {
212 if let Protocol::Udp(port) = component {
213 new.push(Protocol::Tcp(port));
214 } else {
215 new.push(component);
216 }
217 }
218
219 new
220 }
221
222 pub fn rewrite_http_to_https(&self) -> Self {
223 let mut new = Self::empty();
224
225 for component in self.iter() {
226 if let Protocol::Http = component {
227 new.push(Protocol::Https);
228 } else {
229 new.push(component);
230 }
231 }
232
233 new
234 }
235
236 pub fn is_private_or_unroutable(&self, allow_private_addresses: bool) -> bool {
240 let Some(protocol) = self.0.iter().next() else {
241 return true; };
243
244 match protocol {
245 multiaddr::Protocol::Ip4(addr) => {
246 is_ipv4_private_or_unroutable(addr, allow_private_addresses)
247 }
248 multiaddr::Protocol::Ip6(addr) => is_ipv6_private_or_unroutable(addr),
249 multiaddr::Protocol::Dns(hostname) => {
250 !is_valid_fqdn(hostname.as_ref(), allow_private_addresses)
251 }
252 multiaddr::Protocol::Dns4(hostname) => {
253 !is_valid_fqdn(hostname.as_ref(), allow_private_addresses)
254 }
255 multiaddr::Protocol::Dns6(hostname) => {
256 !is_valid_fqdn(hostname.as_ref(), allow_private_addresses)
257 }
258 _ => true, }
260 }
261
262 pub fn is_valid_public_anemo_address(&self, allow_private_addresses: bool) -> bool {
266 if self.is_empty() {
268 return false;
269 }
270
271 if self.to_anemo_address().is_err() {
273 return false;
274 }
275
276 if self.is_private_or_unroutable(allow_private_addresses) {
278 return false;
279 }
280
281 true
282 }
283}
284
285impl std::fmt::Display for Multiaddr {
286 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
287 std::fmt::Display::fmt(&self.0, f)
288 }
289}
290
291impl std::str::FromStr for Multiaddr {
292 type Err = Error;
293
294 fn from_str(s: &str) -> Result<Self, Self::Err> {
295 ::multiaddr::Multiaddr::from_str(s).map(Self)
296 }
297}
298
299impl<'a> TryFrom<&'a str> for Multiaddr {
300 type Error = Error;
301
302 fn try_from(value: &'a str) -> Result<Self, Self::Error> {
303 value.parse()
304 }
305}
306
307impl TryFrom<String> for Multiaddr {
308 type Error = Error;
309
310 fn try_from(value: String) -> Result<Self, Self::Error> {
311 value.parse()
312 }
313}
314
315impl serde::Serialize for Multiaddr {
316 fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
317 where
318 S: serde::Serializer,
319 {
320 serializer.serialize_str(&self.0.to_string())
321 }
322}
323
324impl<'de> serde::Deserialize<'de> for Multiaddr {
325 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
326 where
327 D: serde::Deserializer<'de>,
328 {
329 let s = String::deserialize(deserializer)?;
330 s.parse()
331 .map(Self)
332 .map_err(|e| serde::de::Error::custom(e.to_string()))
333 }
334}
335
336impl std::net::ToSocketAddrs for Multiaddr {
337 type Iter = Box<dyn Iterator<Item = SocketAddr>>;
338
339 fn to_socket_addrs(&self) -> std::io::Result<Self::Iter> {
340 let mut iter = self.iter();
341
342 match (iter.next(), iter.next()) {
343 (Some(Protocol::Ip4(ip4)), Some(Protocol::Tcp(port) | Protocol::Udp(port))) => {
344 (ip4, port)
345 .to_socket_addrs()
346 .map(|iter| Box::new(iter) as _)
347 }
348 (Some(Protocol::Ip6(ip6)), Some(Protocol::Tcp(port) | Protocol::Udp(port))) => {
349 (ip6, port)
350 .to_socket_addrs()
351 .map(|iter| Box::new(iter) as _)
352 }
353 (Some(Protocol::Dns(hostname)), Some(Protocol::Tcp(port) | Protocol::Udp(port))) => {
354 (hostname.as_ref(), port)
355 .to_socket_addrs()
356 .map(|iter| Box::new(iter) as _)
357 }
358 _ => Err(std::io::Error::new(
359 std::io::ErrorKind::InvalidInput,
360 "unable to convert Multiaddr to SocketAddr",
361 )),
362 }
363 }
364}
365
366pub(crate) fn parse_tcp<'a, T: Iterator<Item = Protocol<'a>>>(protocols: &mut T) -> Result<u16> {
367 if let Protocol::Tcp(port) = protocols
368 .next()
369 .ok_or_else(|| eyre!("unexpected end of multiaddr"))?
370 {
371 Ok(port)
372 } else {
373 Err(eyre!("expected tcp protocol"))
374 }
375}
376
377pub(crate) fn parse_http_https<'a, T: Iterator<Item = Protocol<'a>>>(
378 protocols: &mut T,
379) -> Result<&'static str> {
380 match protocols.next() {
381 Some(Protocol::Http) => Ok("http"),
382 Some(Protocol::Https) => Ok("https"),
383 _ => Ok("http"),
384 }
385}
386
387pub(crate) fn parse_end<'a, T: Iterator<Item = Protocol<'a>>>(protocols: &mut T) -> Result<()> {
388 if protocols.next().is_none() {
389 Ok(())
390 } else {
391 Err(eyre!("expected end of multiaddr"))
392 }
393}
394
395pub(crate) fn parse_dns(address: &Multiaddr) -> Result<(Cow<'_, str>, u16, &'static str)> {
397 let mut iter = address.iter();
398
399 let dns_name = match iter
400 .next()
401 .ok_or_else(|| eyre!("unexpected end of multiaddr"))?
402 {
403 Protocol::Dns(dns_name) => dns_name,
404 other => return Err(eyre!("expected dns found {other}")),
405 };
406 let tcp_port = parse_tcp(&mut iter)?;
407 let http_or_https = parse_http_https(&mut iter)?;
408 parse_end(&mut iter)?;
409 Ok((dns_name, tcp_port, http_or_https))
410}
411
412pub(crate) fn parse_ip4(address: &Multiaddr) -> Result<(SocketAddr, &'static str)> {
414 let mut iter = address.iter();
415
416 let ip_addr = match iter
417 .next()
418 .ok_or_else(|| eyre!("unexpected end of multiaddr"))?
419 {
420 Protocol::Ip4(ip4_addr) => IpAddr::V4(ip4_addr),
421 other => return Err(eyre!("expected ip4 found {other}")),
422 };
423 let tcp_port = parse_tcp(&mut iter)?;
424 let http_or_https = parse_http_https(&mut iter)?;
425 parse_end(&mut iter)?;
426 let socket_addr = SocketAddr::new(ip_addr, tcp_port);
427
428 Ok((socket_addr, http_or_https))
429}
430
431pub(crate) fn parse_ip6(address: &Multiaddr) -> Result<(SocketAddr, &'static str)> {
433 let mut iter = address.iter();
434
435 let ip_addr = match iter
436 .next()
437 .ok_or_else(|| eyre!("unexpected end of multiaddr"))?
438 {
439 Protocol::Ip6(ip6_addr) => IpAddr::V6(ip6_addr),
440 other => return Err(eyre!("expected ip6 found {other}")),
441 };
442 let tcp_port = parse_tcp(&mut iter)?;
443 let http_or_https = parse_http_https(&mut iter)?;
444 parse_end(&mut iter)?;
445 let socket_addr = SocketAddr::new(ip_addr, tcp_port);
446
447 Ok((socket_addr, http_or_https))
448}
449
450fn is_ipv4_private_or_unroutable(addr: Ipv4Addr, allow_private_addresses: bool) -> bool {
453 if !allow_private_addresses && addr.is_private() {
454 return true;
456 }
457
458 addr.is_unspecified() ||
460 addr.is_loopback() ||
462 addr.is_link_local() ||
464 addr.is_multicast() ||
466 (addr.octets()[0] == 100 && (addr.octets()[1] & 0b11000000) == 64) ||
468 (addr.octets()[0] == 192 && addr.octets()[1] == 0 && addr.octets()[2] == 0) ||
470 (addr.octets()[0] == 192 && addr.octets()[1] == 0 && addr.octets()[2] == 2) ||
472 (addr.octets()[0] == 198 && addr.octets()[1] == 51 && addr.octets()[2] == 100) ||
473 (addr.octets()[0] == 203 && addr.octets()[1] == 0 && addr.octets()[2] == 113) ||
474 (addr.octets()[0] == 192 && addr.octets()[1] == 31 && addr.octets()[2] == 196) ||
476 (addr.octets()[0] == 192 && addr.octets()[1] == 52 && addr.octets()[2] == 193) ||
478 (addr.octets()[0] == 192 && addr.octets()[1] == 88 && addr.octets()[2] == 99) ||
480 (addr.octets()[0] == 198 && (addr.octets()[1] & 0b11111110) == 18) ||
482 (addr.octets()[0] >= 240)
484}
485
486fn is_ipv6_private_or_unroutable(addr: Ipv6Addr) -> bool {
489 addr.is_unspecified() ||
491 addr.is_loopback() ||
493 addr.is_multicast() ||
495 (addr.segments()[0] == 0x0100 && addr.segments()[1] == 0 &&
497 addr.segments()[2] == 0 && addr.segments()[3] == 0) ||
498 (addr.segments()[0] == 0x2001 && addr.segments()[1] == 0x0000) ||
500 (addr.segments()[0] == 0x2001 && addr.segments()[1] == 0x0002) ||
502 (addr.segments()[0] == 0x2001 && (addr.segments()[1] & 0xfff0) == 0x0010) ||
504 (addr.segments()[0] == 0x2001 && addr.segments()[1] == 0x0db8) ||
506 addr.segments()[0] == 0x2002 ||
508 (addr.segments()[0] & 0xfe00) == 0xfc00 ||
510 (addr.segments()[0] & 0xffc0) == 0xfec0 ||
512 (addr.segments()[0] & 0xffc0) == 0xfe80 ||
514 addr.to_ipv4_mapped().is_some_and(|addr| is_ipv4_private_or_unroutable(addr, false))
516}
517
518fn is_valid_fqdn(hostname: &str, allow_localhost_dns: bool) -> bool {
523 if hostname.ends_with('.') {
524 return false;
526 }
527
528 if hostname.is_empty() || hostname.len() > 253 {
530 return false;
531 }
532
533 let hostname_lower = hostname.to_lowercase();
534 if !allow_localhost_dns {
535 if hostname_lower == "localhost" || hostname_lower.ends_with(".local") {
537 return false;
538 }
539 } else if hostname_lower == "localhost" {
540 return true;
542 }
543
544 let ascii_hostname = match idna::domain_to_ascii(hostname) {
546 Ok(ascii) => ascii,
547 Err(_) => return false, };
549
550 let labels: Vec<&str> = ascii_hostname.split('.').collect();
552
553 if labels.len() < 2 {
555 return false;
556 }
557
558 for label in &labels {
560 if !is_valid_dns_label(label) {
561 return false;
562 }
563 }
564
565 let tld = *labels.last().unwrap();
569 if tld.len() < 2 {
570 return false;
571 }
572
573 let is_valid_tld = if tld.starts_with("xn--") {
575 true
577 } else {
578 tld.chars().all(|c| c.is_ascii_alphabetic())
580 };
581
582 if !is_valid_tld {
583 return false;
584 }
585
586 true
587}
588
589fn is_valid_dns_label(label: &str) -> bool {
591 if label.is_empty() || label.len() > 63 {
593 return false;
594 }
595
596 let bytes = label.as_bytes();
597
598 if !bytes[0].is_ascii_alphanumeric() || !bytes[bytes.len() - 1].is_ascii_alphanumeric() {
600 return false;
601 }
602
603 bytes
605 .iter()
606 .all(|&b| b.is_ascii_alphanumeric() || b == b'-')
607}
608
609#[cfg(test)]
610mod test {
611 use multiaddr::multiaddr;
612
613 use super::Multiaddr;
614
615 #[test]
616 fn test_to_socket_addr_basic() {
617 let multi_addr_ipv4 = Multiaddr(multiaddr!(Ip4([127, 0, 0, 1]), Tcp(10500u16)));
618 let socket_addr_ipv4 = multi_addr_ipv4
619 .to_socket_addr()
620 .expect("Couldn't convert to socket addr");
621 assert_eq!(socket_addr_ipv4.to_string(), "127.0.0.1:10500");
622
623 let multi_addr_ipv6 = Multiaddr(multiaddr!(Ip6([172, 0, 0, 1, 1, 1, 1, 1]), Tcp(10500u16)));
624 let socket_addr_ipv6 = multi_addr_ipv6
625 .to_socket_addr()
626 .expect("Couldn't convert to socket addr");
627 assert_eq!(socket_addr_ipv6.to_string(), "[ac::1:1:1:1:1]:10500");
628 }
629
630 #[test]
631 fn test_to_socket_addr_unsupported_protocol() {
632 let multi_addr_dns = Multiaddr(multiaddr!(Dnsaddr("iota.iota"), Tcp(10500u16)));
633 let _ = multi_addr_dns
634 .to_socket_addr()
635 .expect_err("DNS is unsupported");
636 }
637
638 #[test]
639 fn test_is_loosely_valid_tcp_addr() {
640 let multi_addr_ipv4 = Multiaddr(multiaddr!(Ip4([127, 0, 0, 1]), Tcp(10500u16)));
641 assert!(multi_addr_ipv4.is_loosely_valid_tcp_addr());
642 let multi_addr_ipv6 = Multiaddr(multiaddr!(Ip6([172, 0, 0, 1, 1, 1, 1, 1]), Tcp(10500u16)));
643 assert!(multi_addr_ipv6.is_loosely_valid_tcp_addr());
644 let multi_addr_dns = Multiaddr(multiaddr!(Dnsaddr("iota.iota"), Tcp(10500u16)));
645 assert!(multi_addr_dns.is_loosely_valid_tcp_addr());
646
647 let multi_addr_ipv4 = Multiaddr(multiaddr!(Ip4([127, 0, 0, 1]), Udp(10500u16)));
648 assert!(!multi_addr_ipv4.is_loosely_valid_tcp_addr());
649 let multi_addr_ipv6 = Multiaddr(multiaddr!(Ip6([172, 0, 0, 1, 1, 1, 1, 1]), Udp(10500u16)));
650 assert!(!multi_addr_ipv6.is_loosely_valid_tcp_addr());
651 let multi_addr_dns = Multiaddr(multiaddr!(Dnsaddr("iota.iota"), Udp(10500u16)));
652 assert!(!multi_addr_dns.is_loosely_valid_tcp_addr());
653
654 let invalid_multi_addr_ipv4 = Multiaddr(multiaddr!(Ip4([127, 0, 0, 1])));
655 assert!(!invalid_multi_addr_ipv4.is_loosely_valid_tcp_addr());
656 }
657
658 #[test]
659 fn test_get_hostname_port() {
660 let multi_addr_ip4 = Multiaddr(multiaddr!(Ip4([127, 0, 0, 1]), Tcp(10500u16)));
661 assert_eq!(Some("127.0.0.1".to_string()), multi_addr_ip4.hostname());
662 assert_eq!(Some(10500u16), multi_addr_ip4.port());
663
664 let multi_addr_dns = Multiaddr(multiaddr!(Dns("iota.iota"), Tcp(10501u16)));
665 assert_eq!(Some("iota.iota".to_string()), multi_addr_dns.hostname());
666 assert_eq!(Some(10501u16), multi_addr_dns.port());
667 }
668
669 #[test]
670 fn test_to_anemo_address() {
671 let addr_ip4 = Multiaddr(multiaddr!(Ip4([15, 15, 15, 1]), Udp(10500u16)))
672 .to_anemo_address()
673 .unwrap();
674 assert_eq!("15.15.15.1:10500".to_string(), addr_ip4.to_string());
675
676 let addr_ip6 = Multiaddr(multiaddr!(
677 Ip6([15, 15, 15, 15, 15, 15, 15, 1]),
678 Udp(10500u16)
679 ))
680 .to_anemo_address()
681 .unwrap();
682 assert_eq!("[f:f:f:f:f:f:f:1]:10500".to_string(), addr_ip6.to_string());
683
684 let addr_dns = Multiaddr(multiaddr!(Dns("iota.iota"), Udp(10501u16)))
685 .to_anemo_address()
686 .unwrap();
687 assert_eq!("iota.iota:10501".to_string(), addr_dns.to_string());
688
689 let addr_invalid =
690 Multiaddr(multiaddr!(Dns("iota.iota"), Tcp(10501u16))).to_anemo_address();
691 assert!(addr_invalid.is_err());
692 }
693
694 #[test]
695 fn test_with_zero_ip() {
696 let multi_addr_ip4 =
697 Multiaddr(multiaddr!(Ip4([15, 15, 15, 1]), Tcp(10500u16))).with_zero_ip();
698 assert_eq!(Some("0.0.0.0".to_string()), multi_addr_ip4.hostname());
699 assert_eq!(Some(10500u16), multi_addr_ip4.port());
700
701 let multi_addr_ip6 = Multiaddr(multiaddr!(
702 Ip6([15, 15, 15, 15, 15, 15, 15, 1]),
703 Tcp(10500u16)
704 ))
705 .with_zero_ip();
706 assert_eq!(Some("::".to_string()), multi_addr_ip6.hostname());
707 assert_eq!(Some(10500u16), multi_addr_ip4.port());
708
709 let multi_addr_dns = Multiaddr(multiaddr!(Dns("iota.iota"), Tcp(10501u16))).with_zero_ip();
710 assert_eq!(Some("0.0.0.0".to_string()), multi_addr_dns.hostname());
711 assert_eq!(Some(10501u16), multi_addr_dns.port());
712 }
713
714 #[test]
715 fn test_with_localhost_ip() {
716 let multi_addr_ip4 =
717 Multiaddr(multiaddr!(Ip4([15, 15, 15, 1]), Tcp(10500u16))).with_localhost_ip();
718 assert_eq!(Some("127.0.0.1".to_string()), multi_addr_ip4.hostname());
719 assert_eq!(Some(10500u16), multi_addr_ip4.port());
720
721 let multi_addr_ip6 = Multiaddr(multiaddr!(
722 Ip6([15, 15, 15, 15, 15, 15, 15, 1]),
723 Tcp(10500u16)
724 ))
725 .with_localhost_ip();
726 assert_eq!(Some("::1".to_string()), multi_addr_ip6.hostname());
727 assert_eq!(Some(10500u16), multi_addr_ip4.port());
728
729 let multi_addr_dns =
730 Multiaddr(multiaddr!(Dns("iota.iota"), Tcp(10501u16))).with_localhost_ip();
731 assert_eq!(Some("127.0.0.1".to_string()), multi_addr_dns.hostname());
732 assert_eq!(Some(10501u16), multi_addr_dns.port());
733 }
734
735 #[test]
736 fn test_is_private_or_unroutable_ipv4() {
737 let test_cases = vec![
739 (
741 multiaddr!(Ip4([10, 0, 0, 1]), Udp(10500u16)),
742 "RFC 1918 private - 10.0.0.0/8",
743 true,
744 ),
745 (
746 multiaddr!(Ip4([172, 16, 0, 1]), Udp(10500u16)),
747 "RFC 1918 private - 172.16.0.0/12",
748 true,
749 ),
750 (
751 multiaddr!(Ip4([192, 168, 1, 1]), Udp(10500u16)),
752 "RFC 1918 private - 192.168.0.0/16",
753 true,
754 ),
755 (
757 multiaddr!(Ip4([127, 0, 0, 1]), Udp(10500u16)),
758 "RFC 1122 loopback",
759 true,
760 ),
761 (
763 multiaddr!(Ip4([169, 254, 1, 1]), Udp(10500u16)),
764 "RFC 3927 link-local",
765 true,
766 ),
767 (
769 multiaddr!(Ip4([0, 0, 0, 0]), Udp(10500u16)),
770 "RFC 1122 unspecified",
771 true,
772 ),
773 (
775 multiaddr!(Ip4([224, 0, 0, 1]), Udp(10500u16)),
776 "RFC 3171 multicast",
777 true,
778 ),
779 (
781 multiaddr!(Ip4([100, 64, 0, 1]), Udp(10500u16)),
782 "RFC 6598 carrier-grade NAT",
783 true,
784 ),
785 (
787 multiaddr!(Ip4([192, 0, 0, 1]), Udp(10500u16)),
788 "RFC 6890 IETF Protocol Assignments - 192.0.0.0/24",
789 true,
790 ),
791 (
793 multiaddr!(Ip4([192, 31, 196, 1]), Udp(10500u16)),
794 "RFC 7535 AS112-v4 - 192.31.196.0/24",
795 true,
796 ),
797 (
799 multiaddr!(Ip4([192, 52, 193, 1]), Udp(10500u16)),
800 "RFC 7450 Automatic Multicast Tunneling - 192.52.193.0/24",
801 true,
802 ),
803 (
805 multiaddr!(Ip4([192, 0, 2, 1]), Udp(10500u16)),
806 "RFC 5737 documentation - 192.0.2.0/24",
807 true,
808 ),
809 (
810 multiaddr!(Ip4([198, 51, 100, 1]), Udp(10500u16)),
811 "RFC 5737 documentation - 198.51.100.0/24",
812 true,
813 ),
814 (
815 multiaddr!(Ip4([203, 0, 113, 1]), Udp(10500u16)),
816 "RFC 5737 documentation - 203.0.113.0/24",
817 true,
818 ),
819 (
821 multiaddr!(Ip4([198, 18, 0, 1]), Udp(10500u16)),
822 "RFC 2544 benchmarking - 198.18.0.0/15",
823 true,
824 ),
825 (
827 multiaddr!(Ip4([8, 8, 8, 8]), Udp(10500u16)),
828 "Google DNS - should not be filtered",
829 false,
830 ),
831 (
832 multiaddr!(Ip4([1, 1, 1, 1]), Udp(10500u16)),
833 "Cloudflare DNS - should not be filtered",
834 false,
835 ),
836 (
837 multiaddr!(Ip4([208, 67, 222, 222]), Udp(10500u16)),
838 "OpenDNS - should not be filtered",
839 false,
840 ),
841 ];
842
843 for (multiaddr, description, should_be_filtered) in test_cases {
844 let addr = Multiaddr(multiaddr);
845 let is_filtered = addr.is_private_or_unroutable(false);
846 assert_eq!(
847 is_filtered, should_be_filtered,
848 "Failed for {description}: expected {should_be_filtered} but got {is_filtered}",
849 );
850 }
851 }
852
853 #[test]
854 fn test_is_private_or_unroutable_ipv6() {
855 let test_cases = vec![
857 (
859 multiaddr!(Ip6([0, 0, 0, 0, 0, 0, 0, 1]), Udp(10500u16)),
860 "RFC 4291 loopback",
861 true,
862 ),
863 (
865 multiaddr!(Ip6([0, 0, 0, 0, 0, 0, 0, 0]), Udp(10500u16)),
866 "RFC 4291 unspecified",
867 true,
868 ),
869 (
871 multiaddr!(Ip6([0x0100, 0, 0, 0, 0, 0, 0, 1]), Udp(10500u16)),
872 "RFC 6666 discard-only - 100::/64",
873 true,
874 ),
875 (
877 multiaddr!(Ip6([0xfc00, 0, 0, 0, 0, 0, 0, 1]), Udp(10500u16)),
878 "RFC 4193 unique local - fc00::/7",
879 true,
880 ),
881 (
882 multiaddr!(Ip6([0xfd00, 0, 0, 0, 0, 0, 0, 1]), Udp(10500u16)),
883 "RFC 4193 unique local - fd00::/7",
884 true,
885 ),
886 (
888 multiaddr!(Ip6([0xfe80, 0, 0, 0, 0, 0, 0, 1]), Udp(10500u16)),
889 "RFC 4862 link-local",
890 true,
891 ),
892 (
894 multiaddr!(Ip6([0x2001, 0x0002, 0, 0, 0, 0, 0, 1]), Udp(10500u16)),
895 "RFC 5180 benchmarking - 2001:2::/48",
896 true,
897 ),
898 (
900 multiaddr!(Ip6([0x2001, 0x0db8, 0, 0, 0, 0, 0, 1]), Udp(10500u16)),
901 "RFC 3849 documentation",
902 true,
903 ),
904 (
906 multiaddr!(Ip6([0xff02, 0, 0, 0, 0, 0, 0, 1]), Udp(10500u16)),
907 "IPv6 multicast",
908 true,
909 ),
910 (
912 multiaddr!(
913 Ip6([0x2001, 0x4860, 0x4860, 0, 0, 0, 0, 0x68]),
914 Udp(10500u16)
915 ),
916 "Google DNS IPv6 - should not be filtered",
917 false,
918 ),
919 (
920 multiaddr!(Ip6([0x2606, 0x4700, 0x10, 0, 0, 0, 0, 0x68]), Udp(10500u16)),
921 "Cloudflare DNS IPv6 - should not be filtered",
922 false,
923 ),
924 ];
925
926 for (multiaddr, description, should_be_filtered) in test_cases {
927 let addr = Multiaddr(multiaddr);
928 let is_filtered = addr.is_private_or_unroutable(false);
929 assert_eq!(
930 is_filtered, should_be_filtered,
931 "Failed for {description}: expected {should_be_filtered} but got {is_filtered}",
932 );
933 }
934 }
935
936 #[test]
937 fn test_is_private_or_unroutable_dns() {
938 let test_cases = vec![
940 (
941 multiaddr!(Dns("iota.org"), Udp(10500u16)),
942 "DNS addresses should be allowed for public discovery",
943 false,
944 ),
945 (
946 multiaddr!(Dns4("iota.org"), Udp(10500u16)),
947 "DNS4 addresses should be allowed for public discovery",
948 false,
949 ),
950 (
951 multiaddr!(Dns6("iota.org"), Udp(10500u16)),
952 "DNS6 addresses should be allowed for public discovery",
953 false,
954 ),
955 ];
956
957 for (multiaddr, description, should_be_private) in test_cases {
958 let addr = Multiaddr(multiaddr);
959 let is_private = addr.is_private_or_unroutable(false);
960 assert_eq!(
961 is_private, should_be_private,
962 "Failed for {description}: expected {should_be_private} but got {is_private}",
963 );
964 }
965 }
966
967 #[test]
968 fn test_is_valid_for_public_announcement() {
969 let test_cases = vec![
971 (
972 multiaddr!(Ip4([192, 168, 1, 1]), Udp(10500u16)),
973 "Private IPv4 address should be invalid",
974 false,
975 ),
976 (
977 multiaddr!(Ip4([127, 0, 0, 1]), Udp(10500u16)),
978 "Loopback IPv4 address should be invalid",
979 false,
980 ),
981 (
982 multiaddr!(Ip4([8, 8, 8, 8]), Udp(10500u16)),
983 "Valid public IPv4 address should be valid",
984 true,
985 ),
986 (
987 multiaddr!(Dns("example.com"), Udp(10500u16)),
988 "Valid DNS address should be valid",
989 true,
990 ),
991 (
992 multiaddr!(Ip4([8, 8, 8, 8]), Tcp(10500u16)),
993 "TCP instead of UDP should be invalid for anemo",
994 false,
995 ),
996 ];
997
998 for (multiaddr, description, should_be_valid) in test_cases {
999 let addr = Multiaddr(multiaddr);
1000 let is_valid = addr.is_valid_public_anemo_address(false);
1001 assert_eq!(
1002 is_valid, should_be_valid,
1003 "Failed for {description}: expected {should_be_valid} but got {is_valid}",
1004 );
1005 }
1006 }
1007
1008 #[test]
1009 fn test_is_valid_fqdn() {
1010 use super::is_valid_fqdn;
1011
1012 let valid_cases = vec![
1014 "example.com",
1015 "subdomain.example.com",
1016 "iota.org",
1017 "api.iota.org",
1018 "test123.example-domain.org",
1019 "google.com",
1020 "github.com",
1021 "example.co", "test.example.net",
1023 "api-v1.service.io",
1024 "very-long-subdomain-name-that-is-still-valid.example.org",
1025 "café.com", "москва.рф", "τεστ.gr", "测试.中国", "xn--nxasmq6b.com", ];
1032
1033 for fqdn in valid_cases {
1034 assert!(
1035 is_valid_fqdn(fqdn, false),
1036 "Expected '{fqdn}' to be a valid FQDN",
1037 );
1038 }
1039
1040 let long_domain = "a".repeat(254);
1042 let long_label = "a".repeat(64);
1043 let long_label_domain = format!("{long_label}.com");
1044 let invalid_cases = vec![
1045 "", "localhost", "test.local", "hostname", "a.b", "example.1", "example.c1", ".", ".example.com", "example.com.", "-example.com", "example-.com", "exam_ple.com", "exam ple.com", &long_domain, &long_label_domain, "example..com", "192.168.1.1", "2001:db8::1", "example.com-", "example.", "invalid\u{200D}.com", "test\u{0000}.com", ];
1070
1071 for fqdn in invalid_cases {
1072 assert!(
1073 !is_valid_fqdn(fqdn, false),
1074 "Expected '{fqdn}' to be an invalid FQDN"
1075 );
1076 }
1077 }
1078
1079 #[test]
1080 fn test_is_valid_dns_label() {
1081 use super::is_valid_dns_label;
1082
1083 let max_length_label = "a".repeat(63);
1085 let valid_cases = vec![
1086 "a",
1087 "ab",
1088 "example",
1089 "test123",
1090 "api-v1",
1091 "sub-domain",
1092 "a1b2c3",
1093 "123", &max_length_label, ];
1096
1097 for label in valid_cases {
1098 assert!(
1099 is_valid_dns_label(label),
1100 "Expected '{label}' to be a valid DNS label"
1101 );
1102 }
1103
1104 let too_long_label = "a".repeat(64);
1106 let invalid_cases = vec![
1107 "", "-example", "example-", "ex_ample", "ex ample", "ex.ample", &too_long_label, ];
1115
1116 for label in invalid_cases {
1117 assert!(
1118 !is_valid_dns_label(label),
1119 "Expected '{label}' to be an invalid DNS label"
1120 );
1121 }
1122 }
1123
1124 #[test]
1125 fn test_dns_validation_in_multiaddr() {
1126 let valid_dns_cases = vec![
1130 multiaddr!(Dns("example.com"), Udp(10500u16)),
1131 multiaddr!(Dns("iota.org"), Udp(10500u16)),
1132 multiaddr!(Dns("api.example.com"), Udp(10500u16)),
1133 multiaddr!(Dns("café.com"), Udp(10500u16)),
1135 multiaddr!(Dns("москва.рф"), Udp(10500u16)),
1136 ];
1137
1138 for addr in valid_dns_cases {
1139 let multiaddr = Multiaddr(addr);
1140 assert!(
1141 !multiaddr.is_private_or_unroutable(false),
1142 "Valid DNS address {multiaddr} should not be filtered as private/unroutable"
1143 );
1144 assert!(
1145 multiaddr.is_valid_public_anemo_address(false),
1146 "Valid DNS address {multiaddr} should be valid for public announcement"
1147 );
1148 }
1149
1150 let invalid_dns_cases = vec![
1152 multiaddr!(Dns("localhost"), Udp(10500u16)),
1153 multiaddr!(Dns("hostname.local"), Udp(10500u16)),
1154 multiaddr!(Dns("hostname"), Udp(10500u16)), multiaddr!(Dns(""), Udp(10500u16)), ];
1157
1158 for addr in invalid_dns_cases {
1159 let multiaddr = Multiaddr(addr);
1160 assert!(
1161 multiaddr.is_private_or_unroutable(false),
1162 "Invalid DNS address {multiaddr} should be filtered as private/unroutable"
1163 );
1164 assert!(
1165 !multiaddr.is_valid_public_anemo_address(false),
1166 "Invalid DNS address {multiaddr} should not be valid for public announcement"
1167 );
1168 }
1169 }
1170}