2019-01-12 04:58:27 +00:00
|
|
|
/*
|
|
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2019-04-07 17:07:55 +00:00
|
|
|
package net
|
2019-01-12 04:58:27 +00:00
|
|
|
|
2019-08-30 18:33:25 +00:00
|
|
|
import (
|
2019-12-12 01:27:03 +00:00
|
|
|
"errors"
|
2019-08-30 18:33:25 +00:00
|
|
|
"fmt"
|
2019-12-12 01:27:03 +00:00
|
|
|
"math"
|
|
|
|
"math/big"
|
2019-08-30 18:33:25 +00:00
|
|
|
"net"
|
|
|
|
"strconv"
|
|
|
|
)
|
|
|
|
|
|
|
|
// ParseCIDRs parses a list of cidrs and return error if any is invalid.
|
|
|
|
// order is maintained
|
|
|
|
func ParseCIDRs(cidrsString []string) ([]*net.IPNet, error) {
|
|
|
|
cidrs := make([]*net.IPNet, 0, len(cidrsString))
|
|
|
|
for _, cidrString := range cidrsString {
|
|
|
|
_, cidr, err := net.ParseCIDR(cidrString)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse cidr value:%q with error:%v", cidrString, err)
|
|
|
|
}
|
|
|
|
cidrs = append(cidrs, cidr)
|
|
|
|
}
|
|
|
|
return cidrs, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsDualStackIPs returns if a slice of ips is:
|
|
|
|
// - all are valid ips
|
|
|
|
// - at least one ip from each family (v4 or v6)
|
|
|
|
func IsDualStackIPs(ips []net.IP) (bool, error) {
|
|
|
|
v4Found := false
|
|
|
|
v6Found := false
|
|
|
|
for _, ip := range ips {
|
|
|
|
if ip == nil {
|
|
|
|
return false, fmt.Errorf("ip %v is invalid", ip)
|
|
|
|
}
|
|
|
|
|
|
|
|
if v4Found && v6Found {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if IsIPv6(ip) {
|
|
|
|
v6Found = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
v4Found = true
|
|
|
|
}
|
|
|
|
|
|
|
|
return (v4Found && v6Found), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsDualStackIPStrings returns if
|
|
|
|
// - all are valid ips
|
|
|
|
// - at least one ip from each family (v4 or v6)
|
|
|
|
func IsDualStackIPStrings(ips []string) (bool, error) {
|
|
|
|
parsedIPs := make([]net.IP, 0, len(ips))
|
|
|
|
for _, ip := range ips {
|
|
|
|
parsedIP := net.ParseIP(ip)
|
|
|
|
parsedIPs = append(parsedIPs, parsedIP)
|
|
|
|
}
|
|
|
|
return IsDualStackIPs(parsedIPs)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsDualStackCIDRs returns if
|
|
|
|
// - all are valid cidrs
|
|
|
|
// - at least one cidr from each family (v4 or v6)
|
|
|
|
func IsDualStackCIDRs(cidrs []*net.IPNet) (bool, error) {
|
|
|
|
v4Found := false
|
|
|
|
v6Found := false
|
|
|
|
for _, cidr := range cidrs {
|
|
|
|
if cidr == nil {
|
|
|
|
return false, fmt.Errorf("cidr %v is invalid", cidr)
|
|
|
|
}
|
|
|
|
|
|
|
|
if v4Found && v6Found {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if IsIPv6(cidr.IP) {
|
|
|
|
v6Found = true
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
v4Found = true
|
|
|
|
}
|
|
|
|
|
|
|
|
return v4Found && v6Found, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsDualStackCIDRStrings returns if
|
|
|
|
// - all are valid cidrs
|
|
|
|
// - at least one cidr from each family (v4 or v6)
|
|
|
|
func IsDualStackCIDRStrings(cidrs []string) (bool, error) {
|
|
|
|
parsedCIDRs, err := ParseCIDRs(cidrs)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
return IsDualStackCIDRs(parsedCIDRs)
|
|
|
|
}
|
2019-01-12 04:58:27 +00:00
|
|
|
|
2019-04-07 17:07:55 +00:00
|
|
|
// IsIPv6 returns if netIP is IPv6.
|
|
|
|
func IsIPv6(netIP net.IP) bool {
|
|
|
|
return netIP != nil && netIP.To4() == nil
|
2019-01-12 04:58:27 +00:00
|
|
|
}
|
|
|
|
|
2019-04-07 17:07:55 +00:00
|
|
|
// IsIPv6String returns if ip is IPv6.
|
|
|
|
func IsIPv6String(ip string) bool {
|
|
|
|
netIP := net.ParseIP(ip)
|
|
|
|
return IsIPv6(netIP)
|
2019-01-12 04:58:27 +00:00
|
|
|
}
|
|
|
|
|
2019-04-07 17:07:55 +00:00
|
|
|
// IsIPv6CIDRString returns if cidr is IPv6.
|
|
|
|
// This assumes cidr is a valid CIDR.
|
|
|
|
func IsIPv6CIDRString(cidr string) bool {
|
|
|
|
ip, _, _ := net.ParseCIDR(cidr)
|
|
|
|
return IsIPv6(ip)
|
2019-01-12 04:58:27 +00:00
|
|
|
}
|
2019-08-30 18:33:25 +00:00
|
|
|
|
|
|
|
// IsIPv6CIDR returns if a cidr is ipv6
|
|
|
|
func IsIPv6CIDR(cidr *net.IPNet) bool {
|
|
|
|
ip := cidr.IP
|
|
|
|
return IsIPv6(ip)
|
|
|
|
}
|
|
|
|
|
2020-12-01 01:06:26 +00:00
|
|
|
// IsIPv4 returns if netIP is IPv4.
|
|
|
|
func IsIPv4(netIP net.IP) bool {
|
|
|
|
return netIP != nil && netIP.To4() != nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsIPv4String returns if ip is IPv4.
|
|
|
|
func IsIPv4String(ip string) bool {
|
|
|
|
netIP := net.ParseIP(ip)
|
|
|
|
return IsIPv4(netIP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsIPv4CIDR returns if a cidr is ipv4
|
|
|
|
func IsIPv4CIDR(cidr *net.IPNet) bool {
|
|
|
|
ip := cidr.IP
|
|
|
|
return IsIPv4(ip)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsIPv4CIDRString returns if cidr is IPv4.
|
|
|
|
// This assumes cidr is a valid CIDR.
|
|
|
|
func IsIPv4CIDRString(cidr string) bool {
|
|
|
|
ip, _, _ := net.ParseCIDR(cidr)
|
|
|
|
return IsIPv4(ip)
|
|
|
|
}
|
|
|
|
|
2019-08-30 18:33:25 +00:00
|
|
|
// ParsePort parses a string representing an IP port. If the string is not a
|
|
|
|
// valid port number, this returns an error.
|
2019-12-12 01:27:03 +00:00
|
|
|
func ParsePort(port string, allowZero bool) (int, error) {
|
|
|
|
portInt, err := strconv.ParseUint(port, 10, 16)
|
2019-08-30 18:33:25 +00:00
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
2019-12-12 01:27:03 +00:00
|
|
|
if portInt == 0 && !allowZero {
|
|
|
|
return 0, errors.New("0 is not a valid port number")
|
2019-08-30 18:33:25 +00:00
|
|
|
}
|
2019-12-12 01:27:03 +00:00
|
|
|
return int(portInt), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// BigForIP creates a big.Int based on the provided net.IP
|
|
|
|
func BigForIP(ip net.IP) *big.Int {
|
2020-03-26 21:07:15 +00:00
|
|
|
// NOTE: Convert to 16-byte representation so we can
|
|
|
|
// handle v4 and v6 values the same way.
|
|
|
|
return big.NewInt(0).SetBytes(ip.To16())
|
2019-12-12 01:27:03 +00:00
|
|
|
}
|
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
// AddIPOffset adds the provided integer offset to a base big.Int representing a net.IP
|
|
|
|
// NOTE: If you started with a v4 address and overflow it, you get a v6 result.
|
2019-12-12 01:27:03 +00:00
|
|
|
func AddIPOffset(base *big.Int, offset int) net.IP {
|
2020-03-26 21:07:15 +00:00
|
|
|
r := big.NewInt(0).Add(base, big.NewInt(int64(offset))).Bytes()
|
|
|
|
r = append(make([]byte, 16), r...)
|
|
|
|
return net.IP(r[len(r)-16:])
|
2019-12-12 01:27:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// RangeSize returns the size of a range in valid addresses.
|
|
|
|
// returns the size of the subnet (or math.MaxInt64 if the range size would overflow int64)
|
|
|
|
func RangeSize(subnet *net.IPNet) int64 {
|
|
|
|
ones, bits := subnet.Mask.Size()
|
|
|
|
if bits == 32 && (bits-ones) >= 31 || bits == 128 && (bits-ones) >= 127 {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
// this checks that we are not overflowing an int64
|
|
|
|
if bits-ones >= 63 {
|
|
|
|
return math.MaxInt64
|
|
|
|
}
|
|
|
|
return int64(1) << uint(bits-ones)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetIndexedIP returns a net.IP that is subnet.IP + index in the contiguous IP space.
|
|
|
|
func GetIndexedIP(subnet *net.IPNet, index int) (net.IP, error) {
|
|
|
|
ip := AddIPOffset(BigForIP(subnet.IP), index)
|
|
|
|
if !subnet.Contains(ip) {
|
|
|
|
return nil, fmt.Errorf("can't generate IP with index %d from subnet. subnet too small. subnet: %q", index, subnet)
|
|
|
|
}
|
|
|
|
return ip, nil
|
2019-08-30 18:33:25 +00:00
|
|
|
}
|