freedom_models/
account.rs

1use crate::Hateoas;
2use ipnet::Ipv4Net;
3#[cfg(feature = "serde")]
4use serde::{Deserialize, Serialize};
5#[cfg(feature = "serde")]
6use serde_with::serde_as;
7use std::collections::HashMap;
8use time::OffsetDateTime;
9use url::Url;
10
11#[cfg(feature = "serde")]
12use super::utils;
13
14/// Account CIDR
15///
16/// An IP range indicating the whitelisted IP address for connecting to the ATLAS FPS
17#[cfg_attr(
18    feature = "serde",
19    derive(Serialize, Deserialize),
20    serde(rename_all = "camelCase")
21)]
22#[derive(Debug, Clone, PartialEq, Eq, PartialOrd, Ord, Hash)]
23pub struct AccountCidr {
24    pub name: String,
25    pub cidr: Ipv4Net,
26}
27
28impl std::ops::Deref for AccountCidr {
29    type Target = Ipv4Net;
30
31    fn deref(&self) -> &Self::Target {
32        &self.cidr
33    }
34}
35
36#[cfg_attr(
37    feature = "serde",
38    derive(Serialize, Deserialize),
39    serde(rename_all = "camelCase")
40)]
41#[derive(Debug, Clone, PartialEq)]
42pub struct Tier {
43    pub tier: u32,
44    pub price: f32,
45    #[cfg_attr(
46        feature = "serde",
47        serde(rename = "_links", with = "utils::links::serde", default)
48    )]
49    pub links: HashMap<String, Url>,
50}
51
52impl Hateoas for Tier {
53    fn get_links(&self) -> &HashMap<String, url::Url> {
54        &self.links
55    }
56
57    fn get_links_mut(&mut self) -> &mut HashMap<String, url::Url> {
58        &mut self.links
59    }
60}
61
62#[cfg_attr(
63    feature = "serde",
64    serde_as,
65    derive(Serialize, Deserialize),
66    serde(rename_all = "camelCase")
67)]
68#[derive(Debug, Clone, PartialEq)]
69pub struct Account {
70    #[cfg_attr(feature = "serde", serde(with = "time::serde::iso8601"))]
71    pub created: OffsetDateTime,
72    #[cfg_attr(
73        feature = "serde",
74        serde(default, with = "time::serde::iso8601::option")
75    )]
76    pub modified: Option<OffsetDateTime>,
77    #[cfg_attr(feature = "serde", serde(default))]
78    pub internal_meta_data: Option<HashMap<String, String>>,
79    pub name: String,
80    pub storage_key: String,
81    #[cfg_attr(feature = "serde", serde(default))]
82    pub storage_group: Option<String>,
83    pub tiers: Vec<Tier>,
84    pub post_process_done_by_account: bool,
85    pub weeks_of_data_storage: u32,
86    pub verified: bool,
87    #[cfg_attr(feature = "serde", serde(default))]
88    #[cfg_attr(feature = "serde", serde_as(as = "VecSkipError<_>"))]
89    pub access_realtime_cidr: Vec<AccountCidr>,
90    #[cfg_attr(feature = "serde", serde(default))]
91    #[cfg_attr(feature = "serde", serde_as(as = "VecSkipError<_>"))]
92    pub access_api_cidr: Vec<AccountCidr>,
93    #[cfg_attr(feature = "serde", serde(default))]
94    pub external_id: Option<String>,
95    #[cfg_attr(feature = "serde", serde(default))]
96    pub fps_host_name: Option<String>,
97    #[cfg_attr(
98        feature = "serde",
99        serde(rename = "_links", with = "utils::links::serde", default)
100    )]
101    pub links: HashMap<String, Url>,
102}
103
104impl Hateoas for Account {
105    fn get_links(&self) -> &HashMap<String, url::Url> {
106        &self.links
107    }
108
109    fn get_links_mut(&mut self) -> &mut HashMap<String, url::Url> {
110        &mut self.links
111    }
112}
113
114#[cfg(test)]
115mod tests {
116    use std::net::Ipv4Addr;
117
118    use super::*;
119
120    #[cfg(feature = "serde")]
121    #[test]
122    fn ip_cidr_deserialize() {
123        let json = serde_json::json!({
124            "name": "Test Account",
125            "cidr": "192.168.1.96/28"
126        });
127
128        let cidr: AccountCidr = serde_json::from_value(json).unwrap();
129        assert_eq!(cidr.name, "Test Account");
130        assert_eq!(
131            cidr.cidr,
132            Ipv4Net::new_assert(Ipv4Addr::new(192, 168, 1, 96), 28)
133        );
134    }
135
136    #[test]
137    fn ip_cidr_check_28() {
138        let cidr = AccountCidr {
139            name: "Test".into(),
140            cidr: Ipv4Net::new_assert(Ipv4Addr::new(192, 168, 1, 96), 28),
141        };
142
143        assert!(cidr.contains(&Ipv4Addr::new(192, 168, 1, 99)));
144        assert!(cidr.contains(&Ipv4Addr::new(192, 168, 1, 97)));
145        assert!(!cidr.contains(&Ipv4Addr::new(192, 168, 0, 99)));
146    }
147
148    #[test]
149    fn ip_cidr_check_32() {
150        let cidr = AccountCidr {
151            name: "Test".into(),
152            cidr: Ipv4Net::new_assert(Ipv4Addr::new(192, 168, 1, 96), 32),
153        };
154
155        assert!(cidr.contains(&Ipv4Addr::new(192, 168, 1, 96)));
156        assert!(!cidr.contains(&Ipv4Addr::new(192, 168, 1, 97)));
157        assert!(!cidr.contains(&Ipv4Addr::new(192, 168, 1, 95)));
158        assert!(!cidr.contains(&Ipv4Addr::new(0, 0, 0, 0)));
159    }
160}