summaryrefslogtreecommitdiff
path: root/internal/netutil
diff options
context:
space:
mode:
Diffstat (limited to 'internal/netutil')
-rw-r--r--internal/netutil/validate.go102
-rw-r--r--internal/netutil/validate_test.go54
2 files changed, 0 insertions, 156 deletions
diff --git a/internal/netutil/validate.go b/internal/netutil/validate.go
deleted file mode 100644
index 798e1fc64..000000000
--- a/internal/netutil/validate.go
+++ /dev/null
@@ -1,102 +0,0 @@
-// GoToSocial
-// Copyright (C) GoToSocial Authors admin@gotosocial.org
-// SPDX-License-Identifier: AGPL-3.0-or-later
-//
-// This program is free software: you can redistribute it and/or modify
-// it under the terms of the GNU Affero General Public License as published by
-// the Free Software Foundation, either version 3 of the License, or
-// (at your option) any later version.
-//
-// This program is distributed in the hope that it will be useful,
-// but WITHOUT ANY WARRANTY; without even the implied warranty of
-// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-// GNU Affero General Public License for more details.
-//
-// You should have received a copy of the GNU Affero General Public License
-// along with this program. If not, see <http://www.gnu.org/licenses/>.
-
-package netutil
-
-import (
- "net/netip"
-)
-
-var (
- // IPv6Reserved contains IPv6 reserved IP prefixes.
- // https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
- IPv6Reserved = [...]netip.Prefix{
- netip.MustParsePrefix("::1/128"), // Loopback
- netip.MustParsePrefix("::/128"), // Unspecified address
- netip.MustParsePrefix("::ffff:0:0/96"), // IPv4-mapped address
- netip.MustParsePrefix("64:ff9b::/96"), // IPv4/IPv6 translation, RFC 6052
- netip.MustParsePrefix("64:ff9b:1::/48"), // IPv4/IPv6 translation, RFC 8215
- netip.MustParsePrefix("100::/64"), // Discard prefix, RFC 6666
- netip.MustParsePrefix("2001::/23"), // IETF Protocol Assignments, RFC 2928
- netip.MustParsePrefix("2001:db8::/32"), // Test, doc, examples
- netip.MustParsePrefix("2002::/16"), // 6to4
- netip.MustParsePrefix("2620:4f:8000::/48"), // Direct Delegation AS112 Service, RFC 7534
- netip.MustParsePrefix("fc00::/7"), // Unique Local
- netip.MustParsePrefix("fe80::/10"), // Link-local
- netip.MustParsePrefix("fec0::/10"), // Site-local, deprecated
- netip.MustParsePrefix("ff00::/8"), // Multicast
- }
-
- // IPv4Reserved contains IPv4 reserved IP prefixes.
- // https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
- IPv4Reserved = [...]netip.Prefix{
- netip.MustParsePrefix("0.0.0.0/8"), // Current network
- netip.MustParsePrefix("10.0.0.0/8"), // Private
- netip.MustParsePrefix("100.64.0.0/10"), // RFC6598
- netip.MustParsePrefix("127.0.0.0/8"), // Loopback
- netip.MustParsePrefix("169.254.0.0/16"), // Link-local
- netip.MustParsePrefix("172.16.0.0/12"), // Private
- netip.MustParsePrefix("192.0.0.0/24"), // RFC6890
- netip.MustParsePrefix("192.0.2.0/24"), // Test, doc, examples
- netip.MustParsePrefix("192.31.196.0/24"), // AS112-v4, RFC 7535
- netip.MustParsePrefix("192.52.193.0/24"), // AMT, RFC 7450
- netip.MustParsePrefix("192.88.99.0/24"), // IPv6 to IPv4 relay
- netip.MustParsePrefix("192.168.0.0/16"), // Private
- netip.MustParsePrefix("192.175.48.0/24"), // Direct Delegation AS112 Service, RFC 7534
- netip.MustParsePrefix("198.18.0.0/15"), // Benchmarking tests
- netip.MustParsePrefix("198.51.100.0/24"), // Test, doc, examples
- netip.MustParsePrefix("203.0.113.0/24"), // Test, doc, examples
- netip.MustParsePrefix("224.0.0.0/4"), // Multicast
- netip.MustParsePrefix("240.0.0.0/4"), // Reserved (includes broadcast / 255.255.255.255)
- }
-)
-
-// ValidateAddr will parse a netip.AddrPort from string, and return the result of ValidateIP() on addr.
-func ValidateAddr(s string) bool {
- ipport, err := netip.ParseAddrPort(s)
- if err != nil {
- return false
- }
- return ValidateIP(ipport.Addr())
-}
-
-// ValidateIP returns whether IP is an IPv4/6 address in non-reserved, public ranges.
-func ValidateIP(ip netip.Addr) bool {
- switch {
- // IPv4: check if IPv4 in reserved nets
- case ip.Is4():
- for _, reserved := range IPv4Reserved {
- if reserved.Contains(ip) {
- return false
- }
- }
- return true
-
- // IPv6: check if IP in IPv6 reserved nets
- case ip.Is6():
- for _, reserved := range IPv6Reserved {
- if reserved.Contains(ip) {
- return false
- }
- }
- return true
-
- // Assume malicious by default
- default:
- return false
- }
-}
diff --git a/internal/netutil/validate_test.go b/internal/netutil/validate_test.go
deleted file mode 100644
index 37def4ce6..000000000
--- a/internal/netutil/validate_test.go
+++ /dev/null
@@ -1,54 +0,0 @@
-package netutil
-
-import (
- "net/netip"
- "testing"
-)
-
-func TestValidateIP(t *testing.T) {
- tests := []struct {
- name string
- ip netip.Addr
- }{
- // IPv4 tests
- {
- name: "IPv4 this host on this network",
- ip: netip.MustParseAddr("0.0.0.0"),
- },
- {
- name: "IPv4 dummy address",
- ip: netip.MustParseAddr("192.0.0.8"),
- },
- {
- name: "IPv4 Port Control Protocol Anycast",
- ip: netip.MustParseAddr("192.0.0.9"),
- },
- {
- name: "IPv4 Traversal Using Relays around NAT Anycast",
- ip: netip.MustParseAddr("192.0.0.10"),
- },
- {
- name: "IPv4 NAT64/DNS64 Discovery 1",
- ip: netip.MustParseAddr("192.0.0.17"),
- },
- {
- name: "IPv4 NAT64/DNS64 Discovery 2",
- ip: netip.MustParseAddr("192.0.0.171"),
- },
- // IPv6 tests
- {
- name: "IPv4-mapped address",
- ip: netip.MustParseAddr("::ffff:169.254.169.254"),
- },
- }
-
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- t.Parallel()
- if valid := ValidateIP(tc.ip); valid != false {
- t.Fatalf("Expected IP %s to be: %t, got: %t", tc.ip, false, valid)
- }
- })
- }
-}