123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190 |
- /*
- Copyright 2018 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package net
- import (
- "errors"
- "fmt"
- "math"
- "math/big"
- "net"
- "strconv"
- )
- // ParseCIDRs parses a list of cidrs and return error if any is invalid.
- // order is maintained
- func ParseCIDRs(cidrsString []string) ([]*net.IPNet, error) {
- cidrs := make([]*net.IPNet, 0, len(cidrsString))
- for _, cidrString := range cidrsString {
- _, cidr, err := net.ParseCIDR(cidrString)
- if err != nil {
- return nil, fmt.Errorf("failed to parse cidr value:%q with error:%v", cidrString, err)
- }
- cidrs = append(cidrs, cidr)
- }
- return cidrs, nil
- }
- // IsDualStackIPs returns if a slice of ips is:
- // - all are valid ips
- // - at least one ip from each family (v4 or v6)
- func IsDualStackIPs(ips []net.IP) (bool, error) {
- v4Found := false
- v6Found := false
- for _, ip := range ips {
- if ip == nil {
- return false, fmt.Errorf("ip %v is invalid", ip)
- }
- if v4Found && v6Found {
- continue
- }
- if IsIPv6(ip) {
- v6Found = true
- continue
- }
- v4Found = true
- }
- return (v4Found && v6Found), nil
- }
- // IsDualStackIPStrings returns if
- // - all are valid ips
- // - at least one ip from each family (v4 or v6)
- func IsDualStackIPStrings(ips []string) (bool, error) {
- parsedIPs := make([]net.IP, 0, len(ips))
- for _, ip := range ips {
- parsedIP := net.ParseIP(ip)
- parsedIPs = append(parsedIPs, parsedIP)
- }
- return IsDualStackIPs(parsedIPs)
- }
- // IsDualStackCIDRs returns if
- // - all are valid cidrs
- // - at least one cidr from each family (v4 or v6)
- func IsDualStackCIDRs(cidrs []*net.IPNet) (bool, error) {
- v4Found := false
- v6Found := false
- for _, cidr := range cidrs {
- if cidr == nil {
- return false, fmt.Errorf("cidr %v is invalid", cidr)
- }
- if v4Found && v6Found {
- continue
- }
- if IsIPv6(cidr.IP) {
- v6Found = true
- continue
- }
- v4Found = true
- }
- return v4Found && v6Found, nil
- }
- // IsDualStackCIDRStrings returns if
- // - all are valid cidrs
- // - at least one cidr from each family (v4 or v6)
- func IsDualStackCIDRStrings(cidrs []string) (bool, error) {
- parsedCIDRs, err := ParseCIDRs(cidrs)
- if err != nil {
- return false, err
- }
- return IsDualStackCIDRs(parsedCIDRs)
- }
- // IsIPv6 returns if netIP is IPv6.
- func IsIPv6(netIP net.IP) bool {
- return netIP != nil && netIP.To4() == nil
- }
- // IsIPv6String returns if ip is IPv6.
- func IsIPv6String(ip string) bool {
- netIP := net.ParseIP(ip)
- return IsIPv6(netIP)
- }
- // IsIPv6CIDRString returns if cidr is IPv6.
- // This assumes cidr is a valid CIDR.
- func IsIPv6CIDRString(cidr string) bool {
- ip, _, _ := net.ParseCIDR(cidr)
- return IsIPv6(ip)
- }
- // IsIPv6CIDR returns if a cidr is ipv6
- func IsIPv6CIDR(cidr *net.IPNet) bool {
- ip := cidr.IP
- return IsIPv6(ip)
- }
- // ParsePort parses a string representing an IP port. If the string is not a
- // valid port number, this returns an error.
- func ParsePort(port string, allowZero bool) (int, error) {
- portInt, err := strconv.ParseUint(port, 10, 16)
- if err != nil {
- return 0, err
- }
- if portInt == 0 && !allowZero {
- return 0, errors.New("0 is not a valid port number")
- }
- return int(portInt), nil
- }
- // BigForIP creates a big.Int based on the provided net.IP
- func BigForIP(ip net.IP) *big.Int {
- b := ip.To4()
- if b == nil {
- b = ip.To16()
- }
- return big.NewInt(0).SetBytes(b)
- }
- // AddIPOffset adds the provided integer offset to a base big.Int representing a
- // net.IP
- func AddIPOffset(base *big.Int, offset int) net.IP {
- return net.IP(big.NewInt(0).Add(base, big.NewInt(int64(offset))).Bytes())
- }
- // RangeSize returns the size of a range in valid addresses.
- // returns the size of the subnet (or math.MaxInt64 if the range size would overflow int64)
- func RangeSize(subnet *net.IPNet) int64 {
- ones, bits := subnet.Mask.Size()
- if bits == 32 && (bits-ones) >= 31 || bits == 128 && (bits-ones) >= 127 {
- return 0
- }
- // this checks that we are not overflowing an int64
- if bits-ones >= 63 {
- return math.MaxInt64
- }
- return int64(1) << uint(bits-ones)
- }
- // GetIndexedIP returns a net.IP that is subnet.IP + index in the contiguous IP space.
- func GetIndexedIP(subnet *net.IPNet, index int) (net.IP, error) {
- ip := AddIPOffset(BigForIP(subnet.IP), index)
- if !subnet.Contains(ip) {
- return nil, fmt.Errorf("can't generate IP with index %d from subnet. subnet too small. subnet: %q", index, subnet)
- }
- return ip, nil
- }
|