214 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			214 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			Go
		
	
	
	
| /*
 | |
| Copyright 2018 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package net
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"math"
 | |
| 	"math/big"
 | |
| 	"net"
 | |
| 	"strconv"
 | |
| )
 | |
| 
 | |
| // ParseCIDRs parses a list of cidrs and return error if any is invalid.
 | |
| // order is maintained
 | |
| func ParseCIDRs(cidrsString []string) ([]*net.IPNet, error) {
 | |
| 	cidrs := make([]*net.IPNet, 0, len(cidrsString))
 | |
| 	for _, cidrString := range cidrsString {
 | |
| 		_, cidr, err := ParseCIDRSloppy(cidrString)
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("failed to parse cidr value:%q with error:%v", cidrString, err)
 | |
| 		}
 | |
| 		cidrs = append(cidrs, cidr)
 | |
| 	}
 | |
| 	return cidrs, nil
 | |
| }
 | |
| 
 | |
| // IsDualStackIPs returns if a slice of ips is:
 | |
| // - all are valid ips
 | |
| // - at least one ip from each family (v4 or v6)
 | |
| func IsDualStackIPs(ips []net.IP) (bool, error) {
 | |
| 	v4Found := false
 | |
| 	v6Found := false
 | |
| 	for _, ip := range ips {
 | |
| 		if ip == nil {
 | |
| 			return false, fmt.Errorf("ip %v is invalid", ip)
 | |
| 		}
 | |
| 
 | |
| 		if v4Found && v6Found {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if IsIPv6(ip) {
 | |
| 			v6Found = true
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		v4Found = true
 | |
| 	}
 | |
| 
 | |
| 	return (v4Found && v6Found), nil
 | |
| }
 | |
| 
 | |
| // IsDualStackIPStrings returns if
 | |
| // - all are valid ips
 | |
| // - at least one ip from each family (v4 or v6)
 | |
| func IsDualStackIPStrings(ips []string) (bool, error) {
 | |
| 	parsedIPs := make([]net.IP, 0, len(ips))
 | |
| 	for _, ip := range ips {
 | |
| 		parsedIP := ParseIPSloppy(ip)
 | |
| 		parsedIPs = append(parsedIPs, parsedIP)
 | |
| 	}
 | |
| 	return IsDualStackIPs(parsedIPs)
 | |
| }
 | |
| 
 | |
| // IsDualStackCIDRs returns if
 | |
| // - all are valid cidrs
 | |
| // - at least one cidr from each family (v4 or v6)
 | |
| func IsDualStackCIDRs(cidrs []*net.IPNet) (bool, error) {
 | |
| 	v4Found := false
 | |
| 	v6Found := false
 | |
| 	for _, cidr := range cidrs {
 | |
| 		if cidr == nil {
 | |
| 			return false, fmt.Errorf("cidr %v is invalid", cidr)
 | |
| 		}
 | |
| 
 | |
| 		if v4Found && v6Found {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if IsIPv6(cidr.IP) {
 | |
| 			v6Found = true
 | |
| 			continue
 | |
| 		}
 | |
| 		v4Found = true
 | |
| 	}
 | |
| 
 | |
| 	return v4Found && v6Found, nil
 | |
| }
 | |
| 
 | |
| // IsDualStackCIDRStrings returns if
 | |
| // - all are valid cidrs
 | |
| // - at least one cidr from each family (v4 or v6)
 | |
| func IsDualStackCIDRStrings(cidrs []string) (bool, error) {
 | |
| 	parsedCIDRs, err := ParseCIDRs(cidrs)
 | |
| 	if err != nil {
 | |
| 		return false, err
 | |
| 	}
 | |
| 	return IsDualStackCIDRs(parsedCIDRs)
 | |
| }
 | |
| 
 | |
| // IsIPv6 returns if netIP is IPv6.
 | |
| func IsIPv6(netIP net.IP) bool {
 | |
| 	return netIP != nil && netIP.To4() == nil
 | |
| }
 | |
| 
 | |
| // IsIPv6String returns if ip is IPv6.
 | |
| func IsIPv6String(ip string) bool {
 | |
| 	netIP := ParseIPSloppy(ip)
 | |
| 	return IsIPv6(netIP)
 | |
| }
 | |
| 
 | |
| // IsIPv6CIDRString returns if cidr is IPv6.
 | |
| // This assumes cidr is a valid CIDR.
 | |
| func IsIPv6CIDRString(cidr string) bool {
 | |
| 	ip, _, _ := ParseCIDRSloppy(cidr)
 | |
| 	return IsIPv6(ip)
 | |
| }
 | |
| 
 | |
| // IsIPv6CIDR returns if a cidr is ipv6
 | |
| func IsIPv6CIDR(cidr *net.IPNet) bool {
 | |
| 	ip := cidr.IP
 | |
| 	return IsIPv6(ip)
 | |
| }
 | |
| 
 | |
| // IsIPv4 returns if netIP is IPv4.
 | |
| func IsIPv4(netIP net.IP) bool {
 | |
| 	return netIP != nil && netIP.To4() != nil
 | |
| }
 | |
| 
 | |
| // IsIPv4String returns if ip is IPv4.
 | |
| func IsIPv4String(ip string) bool {
 | |
| 	netIP := ParseIPSloppy(ip)
 | |
| 	return IsIPv4(netIP)
 | |
| }
 | |
| 
 | |
| // IsIPv4CIDR returns if a cidr is ipv4
 | |
| func IsIPv4CIDR(cidr *net.IPNet) bool {
 | |
| 	ip := cidr.IP
 | |
| 	return IsIPv4(ip)
 | |
| }
 | |
| 
 | |
| // IsIPv4CIDRString returns if cidr is IPv4.
 | |
| // This assumes cidr is a valid CIDR.
 | |
| func IsIPv4CIDRString(cidr string) bool {
 | |
| 	ip, _, _ := ParseCIDRSloppy(cidr)
 | |
| 	return IsIPv4(ip)
 | |
| }
 | |
| 
 | |
| // ParsePort parses a string representing an IP port.  If the string is not a
 | |
| // valid port number, this returns an error.
 | |
| func ParsePort(port string, allowZero bool) (int, error) {
 | |
| 	portInt, err := strconv.ParseUint(port, 10, 16)
 | |
| 	if err != nil {
 | |
| 		return 0, err
 | |
| 	}
 | |
| 	if portInt == 0 && !allowZero {
 | |
| 		return 0, errors.New("0 is not a valid port number")
 | |
| 	}
 | |
| 	return int(portInt), nil
 | |
| }
 | |
| 
 | |
| // BigForIP creates a big.Int based on the provided net.IP
 | |
| func BigForIP(ip net.IP) *big.Int {
 | |
| 	// NOTE: Convert to 16-byte representation so we can
 | |
| 	// handle v4 and v6 values the same way.
 | |
| 	return big.NewInt(0).SetBytes(ip.To16())
 | |
| }
 | |
| 
 | |
| // AddIPOffset adds the provided integer offset to a base big.Int representing a net.IP
 | |
| // NOTE: If you started with a v4 address and overflow it, you get a v6 result.
 | |
| func AddIPOffset(base *big.Int, offset int) net.IP {
 | |
| 	r := big.NewInt(0).Add(base, big.NewInt(int64(offset))).Bytes()
 | |
| 	r = append(make([]byte, 16), r...)
 | |
| 	return net.IP(r[len(r)-16:])
 | |
| }
 | |
| 
 | |
| // RangeSize returns the size of a range in valid addresses.
 | |
| // returns the size of the subnet (or math.MaxInt64 if the range size would overflow int64)
 | |
| func RangeSize(subnet *net.IPNet) int64 {
 | |
| 	ones, bits := subnet.Mask.Size()
 | |
| 	if bits == 32 && (bits-ones) >= 31 || bits == 128 && (bits-ones) >= 127 {
 | |
| 		return 0
 | |
| 	}
 | |
| 	// this checks that we are not overflowing an int64
 | |
| 	if bits-ones >= 63 {
 | |
| 		return math.MaxInt64
 | |
| 	}
 | |
| 	return int64(1) << uint(bits-ones)
 | |
| }
 | |
| 
 | |
| // GetIndexedIP returns a net.IP that is subnet.IP + index in the contiguous IP space.
 | |
| func GetIndexedIP(subnet *net.IPNet, index int) (net.IP, error) {
 | |
| 	ip := AddIPOffset(BigForIP(subnet.IP), index)
 | |
| 	if !subnet.Contains(ip) {
 | |
| 		return nil, fmt.Errorf("can't generate IP with index %d from subnet. subnet too small. subnet: %q", index, subnet)
 | |
| 	}
 | |
| 	return ip, nil
 | |
| }
 |