nextcloud-spreed-signaling/container/ip_list.go
2026-01-08 10:24:06 +01:00

135 lines
2.8 KiB
Go

/**
* Standalone signaling server for the Nextcloud Spreed app.
* Copyright (C) 2023 struktur AG
*
* @author Joachim Bauch <bauch@struktur.de>
*
* @license GNU AGPL version 3 or any later version
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
package container
import (
"bytes"
"fmt"
"net"
"slices"
"strings"
"github.com/strukturag/nextcloud-spreed-signaling/internal"
)
type IPList struct {
ips []*net.IPNet
}
func (a *IPList) String() string {
var b bytes.Buffer
b.WriteString("[")
for idx, n := range a.ips {
if idx > 0 {
b.WriteString(", ")
}
b.WriteString(n.String())
}
b.WriteString("]")
return b.String()
}
func (a *IPList) Empty() bool {
return len(a.ips) == 0
}
func (a *IPList) Contains(ip net.IP) bool {
return slices.ContainsFunc(a.ips, func(n *net.IPNet) bool {
return n.Contains(ip)
})
}
func parseIPNet(s string) (*net.IPNet, error) {
var ipnet *net.IPNet
if strings.ContainsRune(s, '/') {
var err error
if _, ipnet, err = net.ParseCIDR(s); err != nil {
return nil, fmt.Errorf("invalid IP address/subnet %s: %w", s, err)
}
} else {
ip := net.ParseIP(s)
if ip == nil {
return nil, fmt.Errorf("invalid IP address %s", s)
}
ipnet = &net.IPNet{
IP: ip,
Mask: net.CIDRMask(len(ip)*8, len(ip)*8),
}
}
return ipnet, nil
}
func ParseIPList(allowed string) (*IPList, error) {
var allowedIps []*net.IPNet
for ip := range internal.SplitEntries(allowed, ",") {
i, err := parseIPNet(ip)
if err != nil {
return nil, err
}
allowedIps = append(allowedIps, i)
}
result := &IPList{
ips: allowedIps,
}
return result, nil
}
func DefaultAllowedIPs() *IPList {
allowedIps := []*net.IPNet{
{
IP: net.ParseIP("127.0.0.1"),
Mask: net.CIDRMask(32, 32),
},
{
IP: net.ParseIP("::1"),
Mask: net.CIDRMask(128, 128),
},
}
result := &IPList{
ips: allowedIps,
}
return result
}
var (
privateIpNets = []string{
// Loopback addresses.
"127.0.0.0/8",
"::1",
// Private addresses.
"10.0.0.0/8",
"172.16.0.0/12",
"192.168.0.0/16",
}
)
func DefaultPrivateIPs() *IPList {
allowed, err := ParseIPList(strings.Join(privateIpNets, ","))
if err != nil {
panic(fmt.Errorf("could not parse private ips %+v: %w", privateIpNets, err))
}
return allowed
}