]> git.ipfire.org Git - thirdparty/pdns.git/blame_incremental - pdns/iputils.hh
Merge pull request #15412 from omoerbeek/rec-cookies
[thirdparty/pdns.git] / pdns / iputils.hh
... / ...
CommitLineData
1/*
2 * This file is part of PowerDNS or dnsdist.
3 * Copyright -- PowerDNS.COM B.V. and its contributors
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of version 2 of the GNU General Public License as
7 * published by the Free Software Foundation.
8 *
9 * In addition, for the avoidance of any doubt, permission is granted to
10 * link this program with OpenSSL and to (re)distribute the binaries
11 * produced as the result of such linking.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
21 */
22#pragma once
23#include <string>
24#include <sys/socket.h>
25#include <netinet/in.h>
26#include <arpa/inet.h>
27#include <iostream>
28#include <cstdio>
29#include <functional>
30#include "pdnsexception.hh"
31#include "misc.hh"
32#include <netdb.h>
33#include <sstream>
34#include <sys/un.h>
35
36#include "namespaces.hh"
37
38#ifdef __APPLE__
39#include <libkern/OSByteOrder.h>
40
41#define htobe16(x) OSSwapHostToBigInt16(x)
42#define htole16(x) OSSwapHostToLittleInt16(x)
43#define be16toh(x) OSSwapBigToHostInt16(x)
44#define le16toh(x) OSSwapLittleToHostInt16(x)
45
46#define htobe32(x) OSSwapHostToBigInt32(x)
47#define htole32(x) OSSwapHostToLittleInt32(x)
48#define be32toh(x) OSSwapBigToHostInt32(x)
49#define le32toh(x) OSSwapLittleToHostInt32(x)
50
51#define htobe64(x) OSSwapHostToBigInt64(x)
52#define htole64(x) OSSwapHostToLittleInt64(x)
53#define be64toh(x) OSSwapBigToHostInt64(x)
54#define le64toh(x) OSSwapLittleToHostInt64(x)
55#endif
56
57#ifdef __sun
58
59#define htobe16(x) BE_16(x)
60#define htole16(x) LE_16(x)
61#define be16toh(x) BE_IN16(&(x))
62#define le16toh(x) LE_IN16(&(x))
63
64#define htobe32(x) BE_32(x)
65#define htole32(x) LE_32(x)
66#define be32toh(x) BE_IN32(&(x))
67#define le32toh(x) LE_IN32(&(x))
68
69#define htobe64(x) BE_64(x)
70#define htole64(x) LE_64(x)
71#define be64toh(x) BE_IN64(&(x))
72#define le64toh(x) LE_IN64(&(x))
73
74#endif
75
76#ifdef __FreeBSD__
77#include <sys/endian.h>
78#endif
79
80#if defined(__NetBSD__) && defined(IP_PKTINFO) && !defined(IP_SENDSRCADDR)
81// The IP_PKTINFO option in NetBSD was incompatible with Linux until a
82// change that also introduced IP_SENDSRCADDR for FreeBSD compatibility.
83#undef IP_PKTINFO
84#endif
85
86union ComboAddress
87{
88 sockaddr_in sin4{};
89 sockaddr_in6 sin6;
90
91 bool operator==(const ComboAddress& rhs) const
92 {
93 if (std::tie(sin4.sin_family, sin4.sin_port) != std::tie(rhs.sin4.sin_family, rhs.sin4.sin_port)) {
94 return false;
95 }
96 if (sin4.sin_family == AF_INET) {
97 return sin4.sin_addr.s_addr == rhs.sin4.sin_addr.s_addr;
98 }
99 return memcmp(&sin6.sin6_addr.s6_addr, &rhs.sin6.sin6_addr.s6_addr, sizeof(sin6.sin6_addr.s6_addr)) == 0;
100 }
101
102 bool operator!=(const ComboAddress& rhs) const
103 {
104 return (!operator==(rhs));
105 }
106
107 bool operator<(const ComboAddress& rhs) const
108 {
109 if (sin4.sin_family == 0) {
110 return false;
111 }
112 if (std::tie(sin4.sin_family, sin4.sin_port) < std::tie(rhs.sin4.sin_family, rhs.sin4.sin_port)) {
113 return true;
114 }
115 if (std::tie(sin4.sin_family, sin4.sin_port) > std::tie(rhs.sin4.sin_family, rhs.sin4.sin_port)) {
116 return false;
117 }
118 if (sin4.sin_family == AF_INET) {
119 return sin4.sin_addr.s_addr < rhs.sin4.sin_addr.s_addr;
120 }
121 return memcmp(&sin6.sin6_addr.s6_addr, &rhs.sin6.sin6_addr.s6_addr, sizeof(sin6.sin6_addr.s6_addr)) < 0;
122 }
123
124 bool operator>(const ComboAddress& rhs) const
125 {
126 return rhs.operator<(*this);
127 }
128
129 struct addressPortOnlyHash
130 {
131 uint32_t operator()(const ComboAddress& address) const
132 {
133 // NOLINTBEGIN(cppcoreguidelines-pro-type-reinterpret-cast)
134 if (address.sin4.sin_family == AF_INET) {
135 const auto* start = reinterpret_cast<const unsigned char*>(&address.sin4.sin_addr.s_addr);
136 auto tmp = burtle(start, 4, 0);
137 return burtle(reinterpret_cast<const uint8_t*>(&address.sin4.sin_port), 2, tmp);
138 }
139 const auto* start = reinterpret_cast<const unsigned char*>(&address.sin6.sin6_addr.s6_addr);
140 auto tmp = burtle(start, 16, 0);
141 return burtle(reinterpret_cast<const unsigned char*>(&address.sin6.sin6_port), 2, tmp);
142 // NOLINTEND(cppcoreguidelines-pro-type-reinterpret-cast)
143 }
144 };
145
146 struct addressOnlyHash
147 {
148 uint32_t operator()(const ComboAddress& address) const
149 {
150 const unsigned char* start = nullptr;
151 uint32_t len = 0;
152 // NOLINTBEGIN(cppcoreguidelines-pro-type-reinterpret-cast)
153 if (address.sin4.sin_family == AF_INET) {
154 start = reinterpret_cast<const unsigned char*>(&address.sin4.sin_addr.s_addr);
155 len = 4;
156 }
157 else {
158 start = reinterpret_cast<const unsigned char*>(&address.sin6.sin6_addr.s6_addr);
159 len = 16;
160 }
161 // NOLINTEND(cppcoreguidelines-pro-type-reinterpret-cast)
162 return burtle(start, len, 0);
163 }
164 };
165
166 struct addressOnlyLessThan
167 {
168 bool operator()(const ComboAddress& lhs, const ComboAddress& rhs) const
169 {
170 if (lhs.sin4.sin_family < rhs.sin4.sin_family) {
171 return true;
172 }
173 if (lhs.sin4.sin_family > rhs.sin4.sin_family) {
174 return false;
175 }
176 if (lhs.sin4.sin_family == AF_INET) {
177 return lhs.sin4.sin_addr.s_addr < rhs.sin4.sin_addr.s_addr;
178 }
179 return memcmp(&lhs.sin6.sin6_addr.s6_addr, &rhs.sin6.sin6_addr.s6_addr, sizeof(lhs.sin6.sin6_addr.s6_addr)) < 0;
180 }
181 };
182
183 struct addressOnlyEqual
184 {
185 bool operator()(const ComboAddress& lhs, const ComboAddress& rhs) const
186 {
187 if (lhs.sin4.sin_family != rhs.sin4.sin_family) {
188 return false;
189 }
190 if (lhs.sin4.sin_family == AF_INET) {
191 return lhs.sin4.sin_addr.s_addr == rhs.sin4.sin_addr.s_addr;
192 }
193 return memcmp(&lhs.sin6.sin6_addr.s6_addr, &rhs.sin6.sin6_addr.s6_addr, sizeof(lhs.sin6.sin6_addr.s6_addr)) == 0;
194 }
195 };
196
197 [[nodiscard]] socklen_t getSocklen() const
198 {
199 if (sin4.sin_family == AF_INET) {
200 return sizeof(sin4);
201 }
202 return sizeof(sin6);
203 }
204
205 ComboAddress()
206 {
207 sin4.sin_family = AF_INET;
208 sin4.sin_addr.s_addr = 0;
209 sin4.sin_port = 0;
210 sin6.sin6_scope_id = 0;
211 sin6.sin6_flowinfo = 0;
212 }
213
214 ComboAddress(const struct sockaddr* socketAddress, socklen_t salen)
215 {
216 setSockaddr(socketAddress, salen);
217 };
218
219 ComboAddress(const struct sockaddr_in6* socketAddress)
220 {
221 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
222 setSockaddr(reinterpret_cast<const struct sockaddr*>(socketAddress), sizeof(struct sockaddr_in6));
223 };
224
225 ComboAddress(const struct sockaddr_in* socketAddress)
226 {
227 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
228 setSockaddr(reinterpret_cast<const struct sockaddr*>(socketAddress), sizeof(struct sockaddr_in));
229 };
230
231 void setSockaddr(const struct sockaddr* socketAddress, socklen_t salen)
232 {
233 if (salen > sizeof(struct sockaddr_in6)) {
234 throw PDNSException("ComboAddress can't handle other than sockaddr_in or sockaddr_in6");
235 }
236 memcpy(this, socketAddress, salen);
237 }
238
239 // 'port' sets a default value in case 'str' does not set a port
240 explicit ComboAddress(const string& str, uint16_t port = 0)
241 {
242 memset(&sin6, 0, sizeof(sin6));
243 sin4.sin_family = AF_INET;
244 sin4.sin_port = 0;
245 if (makeIPv4sockaddr(str, &sin4) != 0) {
246 sin6.sin6_family = AF_INET6;
247 if (makeIPv6sockaddr(str, &sin6) < 0) {
248 throw PDNSException("Unable to convert presentation address '" + str + "'");
249 }
250 }
251 if (sin4.sin_port == 0) { // 'str' overrides port!
252 sin4.sin_port = htons(port);
253 }
254 }
255
256 [[nodiscard]] bool isIPv6() const
257 {
258 return sin4.sin_family == AF_INET6;
259 }
260 [[nodiscard]] bool isIPv4() const
261 {
262 return sin4.sin_family == AF_INET;
263 }
264
265 [[nodiscard]] bool isMappedIPv4() const
266 {
267 if (sin4.sin_family != AF_INET6) {
268 return false;
269 }
270
271 int iter = 0;
272 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
273 const auto* ptr = reinterpret_cast<const unsigned char*>(&sin6.sin6_addr.s6_addr);
274 for (iter = 0; iter < 10; ++iter) {
275 if (ptr[iter] != 0) { // NOLINT(cppcoreguidelines-pro-bounds-pointer-arithmetic)
276 return false;
277 }
278 }
279 for (; iter < 12; ++iter) {
280 if (ptr[iter] != 0xff) { // NOLINT(cppcoreguidelines-pro-bounds-pointer-arithmetic)
281 return false;
282 }
283 }
284 return true;
285 }
286
287 [[nodiscard]] bool isUnspecified() const
288 {
289 const ComboAddress unspecifiedV4("0.0.0.0:0");
290 const ComboAddress unspecifiedV6("[::]:0");
291 return *this == unspecifiedV4 || *this == unspecifiedV6;
292 }
293
294 [[nodiscard]] ComboAddress mapToIPv4() const
295 {
296 if (!isMappedIPv4()) {
297 throw PDNSException("ComboAddress can't map non-mapped IPv6 address back to IPv4");
298 }
299 ComboAddress ret;
300 ret.sin4.sin_family = AF_INET;
301 ret.sin4.sin_port = sin4.sin_port;
302
303 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
304 const auto* ptr = reinterpret_cast<const unsigned char*>(&sin6.sin6_addr.s6_addr);
305 ptr += (sizeof(sin6.sin6_addr.s6_addr) - sizeof(ret.sin4.sin_addr.s_addr)); // NOLINT(cppcoreguidelines-pro-bounds-pointer-arithmetic)
306 memcpy(&ret.sin4.sin_addr.s_addr, ptr, sizeof(ret.sin4.sin_addr.s_addr));
307 return ret;
308 }
309
310 [[nodiscard]] string toString() const
311 {
312 std::array<char, 1024> host{};
313 if (sin4.sin_family != 0) {
314 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
315 int retval = getnameinfo(reinterpret_cast<const struct sockaddr*>(this), getSocklen(), host.data(), host.size(), nullptr, 0, NI_NUMERICHOST);
316 if (retval == 0) {
317 return host.data();
318 }
319 return "invalid " + string(gai_strerror(retval));
320 }
321 return "invalid";
322 }
323
324 //! Ignores any interface specifiers possibly available in the sockaddr data.
325 [[nodiscard]] string toStringNoInterface() const
326 {
327 std::array<char, 1024> host{};
328 if (sin4.sin_family == AF_INET) {
329 const auto* ret = inet_ntop(sin4.sin_family, &sin4.sin_addr, host.data(), host.size());
330 if (ret != nullptr) {
331 return host.data();
332 }
333 }
334 else if (sin4.sin_family == AF_INET6) {
335 const auto* ret = inet_ntop(sin4.sin_family, &sin6.sin6_addr, host.data(), host.size());
336 if (ret != nullptr) {
337 return host.data();
338 }
339 }
340 else {
341 return "invalid";
342 }
343 return "invalid " + stringerror();
344 }
345
346 [[nodiscard]] string toStringReversed() const
347 {
348 if (isIPv4()) {
349 const auto address = ntohl(sin4.sin_addr.s_addr);
350 auto aaa = (address >> 0) & 0xFF;
351 auto bbb = (address >> 8) & 0xFF;
352 auto ccc = (address >> 16) & 0xFF;
353 auto ddd = (address >> 24) & 0xFF;
354 return std::to_string(aaa) + "." + std::to_string(bbb) + "." + std::to_string(ccc) + "." + std::to_string(ddd);
355 }
356 const auto* addr = &sin6.sin6_addr;
357 std::stringstream res{};
358 res << std::hex;
359 for (int i = 15; i >= 0; i--) {
360 auto byte = addr->s6_addr[i]; // NOLINT(cppcoreguidelines-pro-bounds-constant-array-index)
361 res << ((byte >> 0) & 0xF) << ".";
362 res << ((byte >> 4) & 0xF);
363 if (i != 0) {
364 res << ".";
365 }
366 }
367 return res.str();
368 }
369
370 [[nodiscard]] string toStringWithPort() const
371 {
372 if (sin4.sin_family == AF_INET) {
373 return toString() + ":" + std::to_string(ntohs(sin4.sin_port));
374 }
375 return "[" + toString() + "]:" + std::to_string(ntohs(sin4.sin_port));
376 }
377
378 [[nodiscard]] string toStringWithPortExcept(int port) const
379 {
380 if (ntohs(sin4.sin_port) == port) {
381 return toString();
382 }
383 if (sin4.sin_family == AF_INET) {
384 return toString() + ":" + std::to_string(ntohs(sin4.sin_port));
385 }
386 return "[" + toString() + "]:" + std::to_string(ntohs(sin4.sin_port));
387 }
388
389 [[nodiscard]] string toLogString() const
390 {
391 return toStringWithPortExcept(53);
392 }
393
394 [[nodiscard]] string toStructuredLogString() const
395 {
396 return toStringWithPort();
397 }
398
399 [[nodiscard]] string toByteString() const
400 {
401 // NOLINTBEGIN(cppcoreguidelines-pro-type-reinterpret-cast)
402 if (isIPv4()) {
403 return {reinterpret_cast<const char*>(&sin4.sin_addr.s_addr), sizeof(sin4.sin_addr.s_addr)};
404 }
405 return {reinterpret_cast<const char*>(&sin6.sin6_addr.s6_addr), sizeof(sin6.sin6_addr.s6_addr)};
406 // NOLINTEND(cppcoreguidelines-pro-type-reinterpret-cast)
407 }
408
409 void truncate(unsigned int bits) noexcept;
410
411 [[nodiscard]] uint16_t getNetworkOrderPort() const noexcept
412 {
413 return sin4.sin_port;
414 }
415 [[nodiscard]] uint16_t getPort() const noexcept
416 {
417 return ntohs(getNetworkOrderPort());
418 }
419 void setPort(uint16_t port)
420 {
421 sin4.sin_port = htons(port);
422 }
423
424 void reset()
425 {
426 memset(&sin6, 0, sizeof(sin6));
427 }
428
429 //! Get the total number of address bits (either 32 or 128 depending on IP version)
430 [[nodiscard]] uint8_t getBits() const
431 {
432 if (isIPv4()) {
433 return 32;
434 }
435 if (isIPv6()) {
436 return 128;
437 }
438 return 0;
439 }
440 /** Get the value of the bit at the provided bit index. When the index >= 0,
441 the index is relative to the LSB starting at index zero. When the index < 0,
442 the index is relative to the MSB starting at index -1 and counting down.
443 */
444 [[nodiscard]] bool getBit(int index) const
445 {
446 if (isIPv4()) {
447 if (index >= 32) {
448 return false;
449 }
450 if (index < 0) {
451 if (index < -32) {
452 return false;
453 }
454 index = 32 + index;
455 }
456
457 uint32_t ls_addr = ntohl(sin4.sin_addr.s_addr);
458
459 return ((ls_addr & (1U << index)) != 0x00000000);
460 }
461 if (isIPv6()) {
462 if (index >= 128) {
463 return false;
464 }
465 if (index < 0) {
466 if (index < -128) {
467 return false;
468 }
469 index = 128 + index;
470 }
471
472 const auto* ls_addr = reinterpret_cast<const uint8_t*>(sin6.sin6_addr.s6_addr); // NOLINT(cppcoreguidelines-pro-type-reinterpret-cast)
473 uint8_t byte_idx = index / 8;
474 uint8_t bit_idx = index % 8;
475
476 return ((ls_addr[15 - byte_idx] & (1U << bit_idx)) != 0x00); // NOLINT(cppcoreguidelines-pro-bounds-pointer-arithmetic)
477 }
478 return false;
479 }
480
481 /*! Returns a comma-separated string of IP addresses
482 *
483 * \param c An stl container with ComboAddresses
484 * \param withPort Also print the port (default true)
485 * \param portExcept Print the port, except when this is the port (default 53)
486 */
487 template <template <class...> class Container, class... Args>
488 static string caContainerToString(const Container<ComboAddress, Args...>& container, const bool withPort = true, const uint16_t portExcept = 53)
489 {
490 vector<string> strs;
491 for (const auto& address : container) {
492 if (withPort) {
493 strs.push_back(address.toStringWithPortExcept(portExcept));
494 continue;
495 }
496 strs.push_back(address.toString());
497 }
498 return boost::join(strs, ",");
499 };
500};
501
502union SockaddrWrapper
503{
504 sockaddr_in sin4{};
505 sockaddr_in6 sin6;
506 sockaddr_un sinun;
507
508 [[nodiscard]] socklen_t getSocklen() const
509 {
510 if (sin4.sin_family == AF_INET) {
511 return sizeof(sin4);
512 }
513 if (sin6.sin6_family == AF_INET6) {
514 return sizeof(sin6);
515 }
516 if (sinun.sun_family == AF_UNIX) {
517 return sizeof(sinun);
518 }
519 return 0;
520 }
521
522 SockaddrWrapper()
523 {
524 sin4.sin_family = AF_INET;
525 sin4.sin_addr.s_addr = 0;
526 sin4.sin_port = 0;
527 }
528
529 SockaddrWrapper(const struct sockaddr* socketAddress, socklen_t salen)
530 {
531 setSockaddr(socketAddress, salen);
532 };
533
534 SockaddrWrapper(const struct sockaddr_in6* socketAddress)
535 {
536 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
537 setSockaddr(reinterpret_cast<const struct sockaddr*>(socketAddress), sizeof(struct sockaddr_in6));
538 };
539
540 SockaddrWrapper(const struct sockaddr_in* socketAddress)
541 {
542 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
543 setSockaddr(reinterpret_cast<const struct sockaddr*>(socketAddress), sizeof(struct sockaddr_in));
544 };
545
546 SockaddrWrapper(const struct sockaddr_un* socketAddress)
547 {
548 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
549 setSockaddr(reinterpret_cast<const struct sockaddr*>(socketAddress), sizeof(struct sockaddr_un));
550 };
551
552 void setSockaddr(const struct sockaddr* socketAddress, socklen_t salen)
553 {
554 if (salen > sizeof(struct sockaddr_un)) {
555 throw PDNSException("ComboAddress can't handle other than sockaddr_in, sockaddr_in6 or sockaddr_un");
556 }
557 memcpy(this, socketAddress, salen);
558 }
559
560 explicit SockaddrWrapper(const string& str, uint16_t port = 0)
561 {
562 memset(&sinun, 0, sizeof(sinun));
563 sin4.sin_family = AF_INET;
564 sin4.sin_port = 0;
565 if (str == "\"\"" || str == "''") {
566 throw PDNSException("Stray quotation marks in address.");
567 }
568 if (makeIPv4sockaddr(str, &sin4) != 0) {
569 sin6.sin6_family = AF_INET6;
570 if (makeIPv6sockaddr(str, &sin6) < 0) {
571 sinun.sun_family = AF_UNIX;
572 // only attempt Unix socket address if address candidate does not contain a port
573 if (str.find(':') != string::npos || makeUNsockaddr(str, &sinun) < 0) {
574 throw PDNSException("Unable to convert presentation address '" + str + "'");
575 }
576 }
577 }
578 if (sinun.sun_family != AF_UNIX && sin4.sin_port == 0) { // 'str' overrides port!
579 sin4.sin_port = htons(port);
580 }
581 }
582
583 [[nodiscard]] bool isIPv6() const
584 {
585 return sin4.sin_family == AF_INET6;
586 }
587 [[nodiscard]] bool isIPv4() const
588 {
589 return sin4.sin_family == AF_INET;
590 }
591 [[nodiscard]] bool isUnixSocket() const
592 {
593 return sin4.sin_family == AF_UNIX;
594 }
595
596 [[nodiscard]] string toString() const
597 {
598 if (sinun.sun_family == AF_UNIX) {
599 return sinun.sun_path;
600 }
601 std::array<char, 1024> host{};
602 if (sin4.sin_family != 0) {
603 // NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast)
604 int retval = getnameinfo(reinterpret_cast<const struct sockaddr*>(this), getSocklen(), host.data(), host.size(), nullptr, 0, NI_NUMERICHOST);
605 if (retval == 0) {
606 return host.data();
607 }
608 return "invalid " + string(gai_strerror(retval));
609 }
610 return "invalid";
611 }
612
613 [[nodiscard]] string toStringWithPort() const
614 {
615 if (sinun.sun_family == AF_UNIX) {
616 return toString();
617 }
618 if (sin4.sin_family == AF_INET) {
619 return toString() + ":" + std::to_string(ntohs(sin4.sin_port));
620 }
621 return "[" + toString() + "]:" + std::to_string(ntohs(sin4.sin_port));
622 }
623
624 void reset()
625 {
626 memset(&sinun, 0, sizeof(sinun));
627 }
628};
629
630/** This exception is thrown by the Netmask class and by extension by the NetmaskGroup class */
631class NetmaskException : public PDNSException
632{
633public:
634 NetmaskException(const string& arg) :
635 PDNSException(arg) {}
636};
637
638inline ComboAddress makeComboAddress(const string& str)
639{
640 ComboAddress address;
641 address.sin4.sin_family = AF_INET;
642 if (inet_pton(AF_INET, str.c_str(), &address.sin4.sin_addr) <= 0) {
643 address.sin4.sin_family = AF_INET6;
644 if (makeIPv6sockaddr(str, &address.sin6) < 0) {
645 throw NetmaskException("Unable to convert '" + str + "' to a netmask");
646 }
647 }
648 return address;
649}
650
651inline ComboAddress makeComboAddressFromRaw(uint8_t version, const char* raw, size_t len)
652{
653 ComboAddress address;
654
655 if (version == 4) {
656 address.sin4.sin_family = AF_INET;
657 if (len != sizeof(address.sin4.sin_addr)) {
658 throw NetmaskException("invalid raw address length");
659 }
660 memcpy(&address.sin4.sin_addr, raw, sizeof(address.sin4.sin_addr));
661 }
662 else if (version == 6) {
663 address.sin6.sin6_family = AF_INET6;
664 if (len != sizeof(address.sin6.sin6_addr)) {
665 throw NetmaskException("invalid raw address length");
666 }
667 memcpy(&address.sin6.sin6_addr, raw, sizeof(address.sin6.sin6_addr));
668 }
669 else {
670 throw NetmaskException("invalid address family");
671 }
672
673 return address;
674}
675
676inline ComboAddress makeComboAddressFromRaw(uint8_t version, const string& str)
677{
678 return makeComboAddressFromRaw(version, str.c_str(), str.size());
679}
680
681/** This class represents a netmask and can be queried to see if a certain
682 IP address is matched by this mask */
683class Netmask
684{
685public:
686 Netmask()
687 {
688 d_network.sin4.sin_family = 0; // disable this doing anything useful
689 d_network.sin4.sin_port = 0; // this guarantees d_network compares identical
690 }
691
692 Netmask(const ComboAddress& network, uint8_t bits = 0xff) :
693 d_network(network)
694 {
695 d_network.sin4.sin_port = 0;
696 setBits(bits);
697 }
698
699 Netmask(const sockaddr_in* network, uint8_t bits = 0xff) :
700 d_network(network)
701 {
702 d_network.sin4.sin_port = 0;
703 setBits(bits);
704 }
705 Netmask(const sockaddr_in6* network, uint8_t bits = 0xff) :
706 d_network(network)
707 {
708 d_network.sin4.sin_port = 0;
709 setBits(bits);
710 }
711 void setBits(uint8_t value)
712 {
713 d_bits = d_network.isIPv4() ? std::min(value, static_cast<uint8_t>(32U)) : std::min(value, static_cast<uint8_t>(128U));
714
715 if (d_bits < 32) {
716 d_mask = ~(0xFFFFFFFF >> d_bits);
717 }
718 else {
719 // note that d_mask is unused for IPv6
720 d_mask = 0xFFFFFFFF;
721 }
722
723 if (isIPv4()) {
724 d_network.sin4.sin_addr.s_addr = htonl(ntohl(d_network.sin4.sin_addr.s_addr) & d_mask);
725 }
726 else if (isIPv6()) {
727 uint8_t bytes = d_bits / 8;
728 auto* address = reinterpret_cast<uint8_t*>(&d_network.sin6.sin6_addr.s6_addr); // NOLINT(cppcoreguidelines-pro-type-reinterpret-cast)
729 uint8_t bits = d_bits % 8;
730 auto mask = static_cast<uint8_t>(~(0xFF >> bits));
731
732 if (bytes < sizeof(d_network.sin6.sin6_addr.s6_addr)) {
733 address[bytes] &= mask; // NOLINT(cppcoreguidelines-pro-bounds-pointer-arithmetic)
734 }
735
736 for (size_t idx = bytes + 1; idx < sizeof(d_network.sin6.sin6_addr.s6_addr); ++idx) {
737 address[idx] = 0; // NOLINT(cppcoreguidelines-pro-bounds-pointer-arithmetic)
738 }
739 }
740 }
741
742 enum stringType
743 {
744 humanString,
745 byteString,
746 };
747 //! Constructor supplies the mask, which cannot be changed
748 Netmask(const string& mask, stringType type = humanString)
749 {
750 if (type == byteString) {
751 uint8_t afi = mask.at(0);
752 size_t len = afi == 4 ? 4 : 16;
753 uint8_t bits = mask.at(len + 1);
754
755 d_network = makeComboAddressFromRaw(afi, mask.substr(1, len));
756
757 setBits(bits);
758 }
759 else {
760 pair<string, string> split = splitField(mask, '/');
761 d_network = makeComboAddress(split.first);
762
763 if (!split.second.empty()) {
764 setBits(pdns::checked_stoi<uint8_t>(split.second));
765 }
766 else if (d_network.sin4.sin_family == AF_INET) {
767 setBits(32);
768 }
769 else {
770 setBits(128);
771 }
772 }
773 }
774
775 [[nodiscard]] bool match(const ComboAddress& address) const
776 {
777 return match(&address);
778 }
779
780 //! If this IP address in socket address matches
781 bool match(const ComboAddress* address) const
782 {
783 if (d_network.sin4.sin_family != address->sin4.sin_family) {
784 return false;
785 }
786 if (d_network.sin4.sin_family == AF_INET) {
787 return match4(htonl((unsigned int)address->sin4.sin_addr.s_addr));
788 }
789 if (d_network.sin6.sin6_family == AF_INET6) {
790 uint8_t bytes = d_bits / 8;
791 uint8_t index = 0;
792 // NOLINTBEGIN(cppcoreguidelines-pro-type-reinterpret-cast)
793 const auto* lhs = reinterpret_cast<const uint8_t*>(&d_network.sin6.sin6_addr.s6_addr);
794 const auto* rhs = reinterpret_cast<const uint8_t*>(&address->sin6.sin6_addr.s6_addr);
795 // NOLINTEND(cppcoreguidelines-pro-type-reinterpret-cast)
796
797 // NOLINTBEGIN(cppcoreguidelines-pro-bounds-pointer-arithmetic)
798 for (index = 0; index < bytes; ++index) {
799 if (lhs[index] != rhs[index]) {
800 return false;
801 }
802 }
803 // still here, now match remaining bits
804 uint8_t bits = d_bits % 8;
805 auto mask = static_cast<uint8_t>(~(0xFF >> bits));
806
807 return ((lhs[index]) == (rhs[index] & mask));
808 // NOLINTEND(cppcoreguidelines-pro-bounds-pointer-arithmetic)
809 }
810 return false;
811 }
812
813 //! If this ASCII IP address matches
814 [[nodiscard]] bool match(const string& arg) const
815 {
816 ComboAddress address = makeComboAddress(arg);
817 return match(&address);
818 }
819
820 //! If this IP address in native format matches
821 [[nodiscard]] bool match4(uint32_t arg) const
822 {
823 return (arg & d_mask) == (ntohl(d_network.sin4.sin_addr.s_addr));
824 }
825
826 [[nodiscard]] string toString() const
827 {
828 return d_network.toStringNoInterface() + "/" + std::to_string((unsigned int)d_bits);
829 }
830
831 [[nodiscard]] string toStringNoMask() const
832 {
833 return d_network.toStringNoInterface();
834 }
835
836 [[nodiscard]] string toByteString() const
837 {
838 ostringstream tmp;
839
840 tmp << (d_network.isIPv4() ? "\x04" : "\x06")
841 << d_network.toByteString()
842 << getBits();
843
844 return tmp.str();
845 }
846
847 [[nodiscard]] const ComboAddress& getNetwork() const
848 {
849 return d_network;
850 }
851
852 [[nodiscard]] const ComboAddress& getMaskedNetwork() const
853 {
854 return getNetwork();
855 }
856
857 [[nodiscard]] uint8_t getBits() const
858 {
859 return d_bits;
860 }
861
862 [[nodiscard]] bool isIPv6() const
863 {
864 return d_network.sin6.sin6_family == AF_INET6;
865 }
866
867 [[nodiscard]] bool isIPv4() const
868 {
869 return d_network.sin4.sin_family == AF_INET;
870 }
871
872 bool operator<(const Netmask& rhs) const
873 {
874 if (empty() && !rhs.empty()) {
875 return false;
876 }
877 if (!empty() && rhs.empty()) {
878 return true;
879 }
880 if (d_bits > rhs.d_bits) {
881 return true;
882 }
883 if (d_bits < rhs.d_bits) {
884 return false;
885 }
886
887 return d_network < rhs.d_network;
888 }
889
890 bool operator>(const Netmask& rhs) const
891 {
892 return rhs.operator<(*this);
893 }
894
895 bool operator==(const Netmask& rhs) const
896 {
897 return std::tie(d_network, d_bits) == std::tie(rhs.d_network, rhs.d_bits);
898 }
899
900 bool operator!=(const Netmask& rhs) const
901 {
902 return !operator==(rhs);
903 }
904
905 [[nodiscard]] bool empty() const
906 {
907 return d_network.sin4.sin_family == 0;
908 }
909
910 //! Get normalized version of the netmask. This means that all address bits below the network bits are zero.
911 [[nodiscard]] Netmask getNormalized() const
912 {
913 return {getMaskedNetwork(), d_bits};
914 }
915 //! Get Netmask for super network of this one (i.e. with fewer network bits)
916 [[nodiscard]] Netmask getSuper(uint8_t bits) const
917 {
918 return {d_network, std::min(d_bits, bits)};
919 }
920
921 //! Get the total number of address bits for this netmask (either 32 or 128 depending on IP version)
922 [[nodiscard]] uint8_t getFullBits() const
923 {
924 return d_network.getBits();
925 }
926
927 /** Get the value of the bit at the provided bit index. When the index >= 0,
928 the index is relative to the LSB starting at index zero. When the index < 0,
929 the index is relative to the MSB starting at index -1 and counting down.
930 When the index points outside the network bits, it always yields zero.
931 */
932 [[nodiscard]] bool getBit(int bit) const
933 {
934 if (bit < -d_bits) {
935 return false;
936 }
937 if (bit >= 0) {
938 if (isIPv4()) {
939 if (bit >= 32 || bit < (32 - d_bits)) {
940 return false;
941 }
942 }
943 if (isIPv6()) {
944 if (bit >= 128 || bit < (128 - d_bits)) {
945 return false;
946 }
947 }
948 }
949 return d_network.getBit(bit);
950 }
951
952 struct Hash
953 {
954 size_t operator()(const Netmask& netmask) const
955 {
956 return burtle(&netmask.d_bits, 1, ComboAddress::addressOnlyHash()(netmask.d_network));
957 }
958 };
959
960private:
961 ComboAddress d_network;
962 uint32_t d_mask{0};
963 uint8_t d_bits{0};
964};
965
966namespace std
967{
968template <>
969struct hash<Netmask>
970{
971 auto operator()(const Netmask& netmask) const
972 {
973 return Netmask::Hash{}(netmask);
974 }
975};
976}
977
978/** Binary tree map implementation with <Netmask,T> pair.
979 *
980 * This is an binary tree implementation for storing attributes for IPv4 and IPv6 prefixes.
981 * The most simple use case is simple NetmaskTree<bool> used by NetmaskGroup, which only
982 * wants to know if given IP address is matched in the prefixes stored.
983 *
984 * This element is useful for anything that needs to *STORE* prefixes, and *MATCH* IP addresses
985 * to a *LIST* of *PREFIXES*. Not the other way round.
986 *
987 * You can store IPv4 and IPv6 addresses to same tree, separate payload storage is kept per AFI.
988 * Network prefixes (Netmasks) are always recorded in normalized fashion, meaning that only
989 * the network bits are set. This is what is returned in the insert() and lookup() return
990 * values.
991 *
992 * Use swap if you need to move the tree to another NetmaskTree instance, it is WAY faster
993 * than using copy ctor or assignment operator, since it moves the nodes and tree root to
994 * new home instead of actually recreating the tree.
995 *
996 * Please see NetmaskGroup for example of simple use case. Other usecases can be found
997 * from GeoIPBackend and Sortlist, and from dnsdist.
998 */
999template <typename T, class K = Netmask>
1000class NetmaskTree
1001{
1002public:
1003 class Iterator;
1004
1005 using key_type = K;
1006 using value_type = T;
1007 using node_type = std::pair<const key_type, value_type>;
1008 using size_type = size_t;
1009 using iterator = class Iterator;
1010
1011private:
1012 /** Single node in tree, internal use only.
1013 */
1014 class TreeNode : boost::noncopyable
1015 {
1016 public:
1017 explicit TreeNode() noexcept :
1018 parent(nullptr), node(), assigned(false), d_bits(0)
1019 {
1020 }
1021 explicit TreeNode(const key_type& key) :
1022 parent(nullptr), node({key.getNormalized(), value_type()}), assigned(false), d_bits(key.getFullBits())
1023 {
1024 }
1025
1026 //<! Makes a left leaf node with specified key.
1027 TreeNode* make_left(const key_type& key)
1028 {
1029 d_bits = node.first.getBits();
1030 left = make_unique<TreeNode>(key);
1031 left->parent = this;
1032 return left.get();
1033 }
1034
1035 //<! Makes a right leaf node with specified key.
1036 TreeNode* make_right(const key_type& key)
1037 {
1038 d_bits = node.first.getBits();
1039 right = make_unique<TreeNode>(key);
1040 right->parent = this;
1041 return right.get();
1042 }
1043
1044 //<! Splits branch at indicated bit position by inserting key
1045 TreeNode* split(const key_type& key, int bits)
1046 {
1047 if (parent == nullptr) {
1048 // not to be called on the root node
1049 throw std::logic_error(
1050 "NetmaskTree::TreeNode::split(): must not be called on root node");
1051 }
1052
1053 // determine reference from parent
1054 unique_ptr<TreeNode>& parent_ref = (parent->left.get() == this ? parent->left : parent->right);
1055 if (parent_ref.get() != this) {
1056 throw std::logic_error(
1057 "NetmaskTree::TreeNode::split(): parent node reference is invalid");
1058 }
1059
1060 // create new tree node for the new key and
1061 // attach the new node under our former parent
1062 auto new_intermediate_node = make_unique<TreeNode>(key);
1063 new_intermediate_node->d_bits = bits;
1064 new_intermediate_node->parent = parent;
1065 auto* new_intermediate_node_raw = new_intermediate_node.get();
1066
1067 // hereafter new_intermediate points to "this"
1068 // ie the child of the new intermediate node
1069 std::swap(parent_ref, new_intermediate_node);
1070 // and we now assign this to current_node so
1071 // it's clear it no longer refers to the new
1072 // intermediate node
1073 std::unique_ptr<TreeNode> current_node = std::move(new_intermediate_node);
1074
1075 // attach "this" node below the new node
1076 // (left or right depending on bit)
1077 // technically the raw pointer escapes the duration of the
1078 // unique pointer, but just below we store the unique pointer
1079 // in the parent, so it lives as long as necessary
1080 // coverity[escape]
1081 current_node->parent = new_intermediate_node_raw;
1082 if (current_node->node.first.getBit(-1 - bits)) {
1083 new_intermediate_node_raw->right = std::move(current_node);
1084 }
1085 else {
1086 new_intermediate_node_raw->left = std::move(current_node);
1087 }
1088
1089 return new_intermediate_node_raw;
1090 }
1091
1092 //<! Forks branch for new key at indicated bit position
1093 TreeNode* fork(const key_type& key, int bits)
1094 {
1095 if (parent == nullptr) {
1096 // not to be called on the root node
1097 throw std::logic_error(
1098 "NetmaskTree::TreeNode::fork(): must not be called on root node");
1099 }
1100
1101 // determine reference from parent
1102 unique_ptr<TreeNode>& parent_ref = (parent->left.get() == this ? parent->left : parent->right);
1103 if (parent_ref.get() != this) {
1104 throw std::logic_error(
1105 "NetmaskTree::TreeNode::fork(): parent node reference is invalid");
1106 }
1107
1108 // create new tree node for the branch point
1109
1110 // the current node will now be a child of the new branch node
1111 // (hereafter new_child1 points to "this")
1112 unique_ptr<TreeNode> new_child1 = std::move(parent_ref);
1113 // attach the branch node under our former parent
1114 parent_ref = make_unique<TreeNode>(node.first.getSuper(bits));
1115 auto* branch_node = parent_ref.get();
1116 branch_node->d_bits = bits;
1117 branch_node->parent = parent;
1118
1119 // create second new leaf node for the new key
1120 unique_ptr<TreeNode> new_child2 = make_unique<TreeNode>(key);
1121 TreeNode* new_node = new_child2.get();
1122
1123 // attach the new child nodes below the branch node
1124 // (left or right depending on bit)
1125 new_child1->parent = branch_node;
1126 new_child2->parent = branch_node;
1127 if (new_child1->node.first.getBit(-1 - bits)) {
1128 branch_node->right = std::move(new_child1);
1129 branch_node->left = std::move(new_child2);
1130 }
1131 else {
1132 branch_node->right = std::move(new_child2);
1133 branch_node->left = std::move(new_child1);
1134 }
1135 // now we have attached the new unique pointers to the tree:
1136 // - branch_node is below its parent
1137 // - new_child1 (ourselves) is below branch_node
1138 // - new_child2, the new leaf node, is below branch_node as well
1139
1140 return new_node;
1141 }
1142
1143 //<! Traverse left branch depth-first
1144 TreeNode* traverse_l()
1145 {
1146 TreeNode* tnode = this;
1147
1148 while (tnode->left) {
1149 tnode = tnode->left.get();
1150 }
1151 return tnode;
1152 }
1153
1154 //<! Traverse tree depth-first and in-order (L-N-R)
1155 TreeNode* traverse_lnr()
1156 {
1157 TreeNode* tnode = this;
1158
1159 // precondition: descended left as deep as possible
1160 if (tnode->right) {
1161 // descend right
1162 tnode = tnode->right.get();
1163 // descend left as deep as possible and return next node
1164 return tnode->traverse_l();
1165 }
1166
1167 // ascend to parent
1168 while (tnode->parent != nullptr) {
1169 TreeNode* prev_child = tnode;
1170 tnode = tnode->parent;
1171
1172 // return this node, but only when we come from the left child branch
1173 if (tnode->left && tnode->left.get() == prev_child) {
1174 return tnode;
1175 }
1176 }
1177 return nullptr;
1178 }
1179
1180 //<! Traverse only assigned nodes
1181 TreeNode* traverse_lnr_assigned()
1182 {
1183 TreeNode* tnode = traverse_lnr();
1184
1185 while (tnode != nullptr && !tnode->assigned) {
1186 tnode = tnode->traverse_lnr();
1187 }
1188 return tnode;
1189 }
1190
1191 unique_ptr<TreeNode> left;
1192 unique_ptr<TreeNode> right;
1193 TreeNode* parent;
1194
1195 node_type node;
1196 bool assigned; //<! Whether this node is assigned-to by the application
1197
1198 int d_bits; //<! How many bits have been used so far
1199 };
1200
1201 void cleanup_tree(TreeNode* node)
1202 {
1203 // only cleanup this node if it has no children and node not assigned
1204 if (!(node->left || node->right || node->assigned)) {
1205 // get parent node ptr
1206 TreeNode* pparent = node->parent;
1207 // delete this node
1208 if (pparent) {
1209 if (pparent->left.get() == node) {
1210 pparent->left.reset();
1211 }
1212 else {
1213 pparent->right.reset();
1214 }
1215 // now recurse up to the parent
1216 cleanup_tree(pparent);
1217 }
1218 }
1219 }
1220
1221 void copyTree(const NetmaskTree& rhs)
1222 {
1223 try {
1224 TreeNode* node = rhs.d_root.get();
1225 if (node != nullptr) {
1226 node = node->traverse_l();
1227 }
1228 while (node != nullptr) {
1229 if (node->assigned) {
1230 insert(node->node.first).second = node->node.second;
1231 }
1232 node = node->traverse_lnr();
1233 }
1234 }
1235 catch (const NetmaskException&) {
1236 abort();
1237 }
1238 catch (const std::logic_error&) {
1239 abort();
1240 }
1241 }
1242
1243public:
1244 class Iterator
1245 {
1246 public:
1247 using value_type = node_type;
1248 using reference = node_type&;
1249 using pointer = node_type*;
1250 using iterator_category = std::forward_iterator_tag;
1251 using difference_type = size_type;
1252
1253 private:
1254 friend class NetmaskTree;
1255
1256 const NetmaskTree* d_tree;
1257 TreeNode* d_node;
1258
1259 Iterator(const NetmaskTree* tree, TreeNode* node) :
1260 d_tree(tree), d_node(node)
1261 {
1262 }
1263
1264 public:
1265 Iterator() :
1266 d_tree(nullptr), d_node(nullptr) {}
1267
1268 Iterator& operator++() // prefix
1269 {
1270 if (d_node == nullptr) {
1271 throw std::logic_error(
1272 "NetmaskTree::Iterator::operator++: iterator is invalid");
1273 }
1274 d_node = d_node->traverse_lnr_assigned();
1275 return *this;
1276 }
1277 Iterator operator++(int) // postfix
1278 {
1279 Iterator tmp(*this);
1280 operator++();
1281 return tmp;
1282 }
1283
1284 reference operator*()
1285 {
1286 if (d_node == nullptr) {
1287 throw std::logic_error(
1288 "NetmaskTree::Iterator::operator*: iterator is invalid");
1289 }
1290 return d_node->node;
1291 }
1292
1293 pointer operator->()
1294 {
1295 if (d_node == nullptr) {
1296 throw std::logic_error(
1297 "NetmaskTree::Iterator::operator->: iterator is invalid");
1298 }
1299 return &d_node->node;
1300 }
1301
1302 bool operator==(const Iterator& rhs)
1303 {
1304 return (d_tree == rhs.d_tree && d_node == rhs.d_node);
1305 }
1306 bool operator!=(const Iterator& rhs)
1307 {
1308 return !(*this == rhs);
1309 }
1310 };
1311
1312 NetmaskTree() noexcept :
1313 d_root(new TreeNode()), d_left(nullptr)
1314 {
1315 }
1316
1317 NetmaskTree(const NetmaskTree& rhs) :
1318 d_root(new TreeNode()), d_left(nullptr)
1319 {
1320 copyTree(rhs);
1321 }
1322
1323 ~NetmaskTree() = default;
1324
1325 NetmaskTree& operator=(const NetmaskTree& rhs)
1326 {
1327 if (this != &rhs) {
1328 clear();
1329 copyTree(rhs);
1330 }
1331 return *this;
1332 }
1333
1334 NetmaskTree(NetmaskTree&&) noexcept = default;
1335 NetmaskTree& operator=(NetmaskTree&&) noexcept = default;
1336
1337 [[nodiscard]] iterator begin() const
1338 {
1339 return Iterator(this, d_left);
1340 }
1341 [[nodiscard]] iterator end() const
1342 {
1343 return Iterator(this, nullptr);
1344 }
1345 iterator begin()
1346 {
1347 return Iterator(this, d_left);
1348 }
1349 iterator end()
1350 {
1351 return Iterator(this, nullptr);
1352 }
1353
1354 node_type& insert(const string& mask)
1355 {
1356 return insert(key_type(mask));
1357 }
1358
1359 //<! Creates new value-pair in tree and returns it.
1360 node_type& insert(const key_type& key)
1361 {
1362 TreeNode* node{};
1363 bool is_left = true;
1364
1365 // we turn left on IPv4 and right on IPv6
1366 if (key.isIPv4()) {
1367 node = d_root->left.get();
1368 if (node == nullptr) {
1369
1370 d_root->left = make_unique<TreeNode>(key);
1371 node = d_root->left.get();
1372 node->assigned = true;
1373 node->parent = d_root.get();
1374 d_size++;
1375 d_left = node;
1376 return node->node;
1377 }
1378 }
1379 else if (key.isIPv6()) {
1380 node = d_root->right.get();
1381 if (node == nullptr) {
1382
1383 d_root->right = make_unique<TreeNode>(key);
1384 node = d_root->right.get();
1385 node->assigned = true;
1386 node->parent = d_root.get();
1387 d_size++;
1388 if (!d_root->left) {
1389 d_left = node;
1390 }
1391 return node->node;
1392 }
1393 if (d_root->left) {
1394 is_left = false;
1395 }
1396 }
1397 else {
1398 throw NetmaskException("invalid address family");
1399 }
1400
1401 // we turn left on 0 and right on 1
1402 int bits = 0;
1403 for (; bits < key.getBits(); bits++) {
1404 bool vall = key.getBit(-1 - bits);
1405
1406 if (bits >= node->d_bits) {
1407 // the end of the current node is reached; continue with the next
1408 if (vall) {
1409 if (node->left || node->assigned) {
1410 is_left = false;
1411 }
1412 if (!node->right) {
1413 // the right branch doesn't exist yet; attach our key here
1414 node = node->make_right(key);
1415 break;
1416 }
1417 node = node->right.get();
1418 }
1419 else {
1420 if (!node->left) {
1421 // the left branch doesn't exist yet; attach our key here
1422 node = node->make_left(key);
1423 break;
1424 }
1425 node = node->left.get();
1426 }
1427 continue;
1428 }
1429 if (bits >= node->node.first.getBits()) {
1430 // the matching branch ends here, yet the key netmask has more bits; add a
1431 // child node below the existing branch leaf.
1432 if (vall) {
1433 if (node->assigned) {
1434 is_left = false;
1435 }
1436 node = node->make_right(key);
1437 }
1438 else {
1439 node = node->make_left(key);
1440 }
1441 break;
1442 }
1443 bool valr = node->node.first.getBit(-1 - bits);
1444 if (vall != valr) {
1445 if (vall) {
1446 is_left = false;
1447 }
1448 // the branch matches just upto this point, yet continues in a different
1449 // direction; fork the branch.
1450 node = node->fork(key, bits);
1451 break;
1452 }
1453 }
1454
1455 if (node->node.first.getBits() > key.getBits()) {
1456 // key is a super-network of the matching node; split the branch and
1457 // insert a node for the key above the matching node.
1458 node = node->split(key, key.getBits());
1459 }
1460
1461 if (node->left) {
1462 is_left = false;
1463 }
1464
1465 node_type& value = node->node;
1466
1467 if (!node->assigned) {
1468 // only increment size if not assigned before
1469 d_size++;
1470 // update the pointer to the left-most tree node
1471 if (is_left) {
1472 d_left = node;
1473 }
1474 node->assigned = true;
1475 }
1476 else {
1477 // tree node exists for this value
1478 if (is_left && d_left != node) {
1479 throw std::logic_error(
1480 "NetmaskTree::insert(): lost track of left-most node in tree");
1481 }
1482 }
1483
1484 return value;
1485 }
1486
1487 //<! Creates or updates value
1488 void insert_or_assign(const key_type& mask, const value_type& value)
1489 {
1490 insert(mask).second = value;
1491 }
1492
1493 void insert_or_assign(const string& mask, const value_type& value)
1494 {
1495 insert(key_type(mask)).second = value;
1496 }
1497
1498 //<! check if given key is present in TreeMap
1499 [[nodiscard]] bool has_key(const key_type& key) const
1500 {
1501 const node_type* ptr = lookup(key);
1502 return ptr && ptr->first == key;
1503 }
1504
1505 //<! Returns "best match" for key_type, which might not be value
1506 [[nodiscard]] node_type* lookup(const key_type& value) const
1507 {
1508 uint8_t max_bits = value.getBits();
1509 return lookupImpl(value, max_bits);
1510 }
1511
1512 //<! Perform best match lookup for value, using at most max_bits
1513 [[nodiscard]] node_type* lookup(const ComboAddress& value, int max_bits = 128) const
1514 {
1515 uint8_t addr_bits = value.getBits();
1516 if (max_bits < 0 || max_bits > addr_bits) {
1517 max_bits = addr_bits;
1518 }
1519
1520 return lookupImpl(key_type(value, max_bits), max_bits);
1521 }
1522
1523 //<! Removes key from TreeMap.
1524 void erase(const key_type& key)
1525 {
1526 TreeNode* node = nullptr;
1527
1528 if (key.isIPv4()) {
1529 node = d_root->left.get();
1530 }
1531 else if (key.isIPv6()) {
1532 node = d_root->right.get();
1533 }
1534 else {
1535 throw NetmaskException("invalid address family");
1536 }
1537 // no tree, no value
1538 if (node == nullptr) {
1539 return;
1540 }
1541 int bits = 0;
1542 for (; node && bits < key.getBits(); bits++) {
1543 bool vall = key.getBit(-1 - bits);
1544 if (bits >= node->d_bits) {
1545 // the end of the current node is reached; continue with the next
1546 if (vall) {
1547 node = node->right.get();
1548 }
1549 else {
1550 node = node->left.get();
1551 }
1552 continue;
1553 }
1554 if (bits >= node->node.first.getBits()) {
1555 // the matching branch ends here
1556 if (key.getBits() != node->node.first.getBits()) {
1557 node = nullptr;
1558 }
1559 break;
1560 }
1561 bool valr = node->node.first.getBit(-1 - bits);
1562 if (vall != valr) {
1563 // the branch matches just upto this point, yet continues in a different
1564 // direction
1565 node = nullptr;
1566 break;
1567 }
1568 }
1569 if (node) {
1570 if (d_size == 0) {
1571 throw std::logic_error(
1572 "NetmaskTree::erase(): size of tree is zero before erase");
1573 }
1574 d_size--;
1575 node->assigned = false;
1576 node->node.second = value_type();
1577
1578 if (node == d_left) {
1579 d_left = d_left->traverse_lnr_assigned();
1580 }
1581 cleanup_tree(node);
1582 }
1583 }
1584
1585 void erase(const string& key)
1586 {
1587 erase(key_type(key));
1588 }
1589
1590 //<! checks whether the container is empty.
1591 [[nodiscard]] bool empty() const
1592 {
1593 return (d_size == 0);
1594 }
1595
1596 //<! returns the number of elements
1597 [[nodiscard]] size_type size() const
1598 {
1599 return d_size;
1600 }
1601
1602 //<! See if given ComboAddress matches any prefix
1603 [[nodiscard]] bool match(const ComboAddress& value) const
1604 {
1605 return (lookup(value) != nullptr);
1606 }
1607
1608 [[nodiscard]] bool match(const std::string& value) const
1609 {
1610 return match(ComboAddress(value));
1611 }
1612
1613 //<! Clean out the tree
1614 void clear()
1615 {
1616 d_root = make_unique<TreeNode>();
1617 d_left = nullptr;
1618 d_size = 0;
1619 }
1620
1621 //<! swaps the contents with another NetmaskTree
1622 void swap(NetmaskTree& rhs) noexcept
1623 {
1624 std::swap(d_root, rhs.d_root);
1625 std::swap(d_left, rhs.d_left);
1626 std::swap(d_size, rhs.d_size);
1627 }
1628
1629private:
1630 [[nodiscard]] node_type* lookupImpl(const key_type& value, uint8_t max_bits) const
1631 {
1632 TreeNode* node = nullptr;
1633
1634 if (value.isIPv4()) {
1635 node = d_root->left.get();
1636 }
1637 else if (value.isIPv6()) {
1638 node = d_root->right.get();
1639 }
1640 else {
1641 throw NetmaskException("invalid address family");
1642 }
1643 if (node == nullptr) {
1644 return nullptr;
1645 }
1646
1647 node_type* ret = nullptr;
1648
1649 int bits = 0;
1650 for (; bits < max_bits; bits++) {
1651 bool vall = value.getBit(-1 - bits);
1652 if (bits >= node->d_bits) {
1653 // the end of the current node is reached; continue with the next
1654 // (we keep track of last assigned node)
1655 if (node->assigned && bits == node->node.first.getBits()) {
1656 ret = &node->node;
1657 }
1658 if (vall) {
1659 if (!node->right) {
1660 break;
1661 }
1662 node = node->right.get();
1663 }
1664 else {
1665 if (!node->left) {
1666 break;
1667 }
1668 node = node->left.get();
1669 }
1670 continue;
1671 }
1672 if (bits >= node->node.first.getBits()) {
1673 // the matching branch ends here
1674 break;
1675 }
1676 bool valr = node->node.first.getBit(-1 - bits);
1677 if (vall != valr) {
1678 // the branch matches just upto this point, yet continues in a different
1679 // direction
1680 break;
1681 }
1682 }
1683 // needed if we did not find one in loop
1684 if (node->assigned && bits == node->node.first.getBits()) {
1685 ret = &node->node;
1686 }
1687 // this can be nullptr.
1688 return ret;
1689 }
1690
1691 unique_ptr<TreeNode> d_root; //<! Root of our tree
1692 TreeNode* d_left;
1693 size_type d_size{0};
1694};
1695
1696/** This class represents a group of supplemental Netmask classes. An IP address matches
1697 if it is matched by one or more of the Netmask objects within.
1698*/
1699class NetmaskGroup
1700{
1701public:
1702 NetmaskGroup() noexcept = default;
1703
1704 //! If this IP address is matched by any of the classes within
1705
1706 bool match(const ComboAddress* address) const
1707 {
1708 const auto& ret = tree.lookup(*address);
1709 if (ret != nullptr) {
1710 return ret->second;
1711 }
1712 return false;
1713 }
1714
1715 [[nodiscard]] bool match(const ComboAddress& address) const
1716 {
1717 return match(&address);
1718 }
1719
1720 bool lookup(const ComboAddress* address, Netmask* nmp) const
1721 {
1722 const auto& ret = tree.lookup(*address);
1723 if (ret != nullptr) {
1724 if (nmp != nullptr) {
1725 *nmp = ret->first;
1726 }
1727 return ret->second;
1728 }
1729 return false;
1730 }
1731
1732 bool lookup(const ComboAddress& address, Netmask* nmp) const
1733 {
1734 return lookup(&address, nmp);
1735 }
1736
1737 //! Add this string to the list of possible matches
1738 void addMask(const string& address, bool positive = true)
1739 {
1740 if (!address.empty() && address[0] == '!') {
1741 addMask(Netmask(address.substr(1)), false);
1742 }
1743 else {
1744 addMask(Netmask(address), positive);
1745 }
1746 }
1747
1748 //! Add this Netmask to the list of possible matches
1749 void addMask(const Netmask& netmask, bool positive = true)
1750 {
1751 tree.insert(netmask).second = positive;
1752 }
1753
1754 void addMasks(const NetmaskGroup& group, boost::optional<bool> positive)
1755 {
1756 for (const auto& entry : group.tree) {
1757 addMask(entry.first, positive ? *positive : entry.second);
1758 }
1759 }
1760
1761 //! Delete this Netmask from the list of possible matches
1762 void deleteMask(const Netmask& netmask)
1763 {
1764 tree.erase(netmask);
1765 }
1766
1767 void deleteMasks(const NetmaskGroup& group)
1768 {
1769 for (const auto& entry : group.tree) {
1770 deleteMask(entry.first);
1771 }
1772 }
1773
1774 void deleteMask(const std::string& address)
1775 {
1776 if (!address.empty()) {
1777 deleteMask(Netmask(address));
1778 }
1779 }
1780
1781 void clear()
1782 {
1783 tree.clear();
1784 }
1785
1786 [[nodiscard]] bool empty() const
1787 {
1788 return tree.empty();
1789 }
1790
1791 [[nodiscard]] size_t size() const
1792 {
1793 return tree.size();
1794 }
1795
1796 [[nodiscard]] string toString() const
1797 {
1798 ostringstream str;
1799 for (auto iter = tree.begin(); iter != tree.end(); ++iter) {
1800 if (iter != tree.begin()) {
1801 str << ", ";
1802 }
1803 if (!(iter->second)) {
1804 str << "!";
1805 }
1806 str << iter->first.toString();
1807 }
1808 return str.str();
1809 }
1810
1811 [[nodiscard]] std::vector<std::string> toStringVector() const
1812 {
1813 std::vector<std::string> out;
1814 out.reserve(tree.size());
1815 for (const auto& entry : tree) {
1816 out.push_back((entry.second ? "" : "!") + entry.first.toString());
1817 }
1818 return out;
1819 }
1820
1821 void toMasks(const string& ips)
1822 {
1823 vector<string> parts;
1824 stringtok(parts, ips, ", \t");
1825
1826 for (const auto& part : parts) {
1827 addMask(part);
1828 }
1829 }
1830
1831private:
1832 NetmaskTree<bool> tree;
1833};
1834
1835struct SComboAddress
1836{
1837 SComboAddress(const ComboAddress& orig) :
1838 ca(orig) {}
1839 ComboAddress ca;
1840 bool operator<(const SComboAddress& rhs) const
1841 {
1842 return ComboAddress::addressOnlyLessThan()(ca, rhs.ca);
1843 }
1844 operator const ComboAddress&() const
1845 {
1846 return ca;
1847 }
1848};
1849
1850class NetworkError : public runtime_error
1851{
1852public:
1853 NetworkError(const string& why = "Network Error") :
1854 runtime_error(why.c_str())
1855 {}
1856 NetworkError(const char* why = "Network Error") :
1857 runtime_error(why)
1858 {}
1859};
1860
1861class AddressAndPortRange
1862{
1863public:
1864 AddressAndPortRange() :
1865 d_addrMask(0), d_portMask(0)
1866 {
1867 d_addr.sin4.sin_family = 0; // disable this doing anything useful
1868 d_addr.sin4.sin_port = 0; // this guarantees d_network compares identical
1869 }
1870
1871 AddressAndPortRange(ComboAddress address, uint8_t addrMask, uint8_t portMask = 0) :
1872 d_addr(address), d_addrMask(addrMask), d_portMask(portMask)
1873 {
1874 if (!d_addr.isIPv4()) {
1875 d_portMask = 0;
1876 }
1877
1878 uint16_t port = d_addr.getPort();
1879 if (d_portMask < 16) {
1880 auto mask = static_cast<uint16_t>(~(0xFFFF >> d_portMask));
1881 port = port & mask;
1882 }
1883
1884 if (d_addrMask < d_addr.getBits()) {
1885 if (d_portMask > 0) {
1886 throw std::runtime_error("Trying to create a AddressAndPortRange with a reduced address mask (" + std::to_string(d_addrMask) + ") and a port range (" + std::to_string(d_portMask) + ")");
1887 }
1888 d_addr = Netmask(d_addr, d_addrMask).getMaskedNetwork();
1889 }
1890 d_addr.setPort(port);
1891 }
1892
1893 [[nodiscard]] uint8_t getFullBits() const
1894 {
1895 return d_addr.getBits() + 16;
1896 }
1897
1898 [[nodiscard]] uint8_t getBits() const
1899 {
1900 if (d_addrMask < d_addr.getBits()) {
1901 return d_addrMask;
1902 }
1903
1904 return d_addr.getBits() + d_portMask;
1905 }
1906
1907 /** Get the value of the bit at the provided bit index. When the index >= 0,
1908 the index is relative to the LSB starting at index zero. When the index < 0,
1909 the index is relative to the MSB starting at index -1 and counting down.
1910 */
1911 [[nodiscard]] bool getBit(int index) const
1912 {
1913 if (index >= getFullBits()) {
1914 return false;
1915 }
1916 if (index < 0) {
1917 index = getFullBits() + index;
1918 }
1919
1920 if (index < 16) {
1921 /* we are into the port bits */
1922 uint16_t port = d_addr.getPort();
1923 return ((port & (1U << index)) != 0x0000);
1924 }
1925
1926 index -= 16;
1927
1928 return d_addr.getBit(index);
1929 }
1930
1931 [[nodiscard]] bool isIPv4() const
1932 {
1933 return d_addr.isIPv4();
1934 }
1935
1936 [[nodiscard]] bool isIPv6() const
1937 {
1938 return d_addr.isIPv6();
1939 }
1940
1941 [[nodiscard]] AddressAndPortRange getNormalized() const
1942 {
1943 return {d_addr, d_addrMask, d_portMask};
1944 }
1945
1946 [[nodiscard]] AddressAndPortRange getSuper(uint8_t bits) const
1947 {
1948 if (bits <= d_addrMask) {
1949 return {d_addr, bits, 0};
1950 }
1951 if (bits <= d_addrMask + d_portMask) {
1952 return {d_addr, d_addrMask, static_cast<uint8_t>(d_portMask - (bits - d_addrMask))};
1953 }
1954
1955 return {d_addr, d_addrMask, d_portMask};
1956 }
1957
1958 [[nodiscard]] const ComboAddress& getNetwork() const
1959 {
1960 return d_addr;
1961 }
1962
1963 [[nodiscard]] string toString() const
1964 {
1965 if (d_addrMask < d_addr.getBits() || d_portMask == 0) {
1966 return d_addr.toStringNoInterface() + "/" + std::to_string(d_addrMask);
1967 }
1968 return d_addr.toStringNoInterface() + ":" + std::to_string(d_addr.getPort()) + "/" + std::to_string(d_portMask);
1969 }
1970
1971 [[nodiscard]] bool empty() const
1972 {
1973 return d_addr.sin4.sin_family == 0;
1974 }
1975
1976 bool operator==(const AddressAndPortRange& rhs) const
1977 {
1978 return std::tie(d_addr, d_addrMask, d_portMask) == std::tie(rhs.d_addr, rhs.d_addrMask, rhs.d_portMask);
1979 }
1980
1981 bool operator<(const AddressAndPortRange& rhs) const
1982 {
1983 if (empty() && !rhs.empty()) {
1984 return false;
1985 }
1986
1987 if (!empty() && rhs.empty()) {
1988 return true;
1989 }
1990
1991 if (d_addrMask > rhs.d_addrMask) {
1992 return true;
1993 }
1994
1995 if (d_addrMask < rhs.d_addrMask) {
1996 return false;
1997 }
1998
1999 if (d_addr < rhs.d_addr) {
2000 return true;
2001 }
2002
2003 if (d_addr > rhs.d_addr) {
2004 return false;
2005 }
2006
2007 if (d_portMask > rhs.d_portMask) {
2008 return true;
2009 }
2010
2011 if (d_portMask < rhs.d_portMask) {
2012 return false;
2013 }
2014
2015 return d_addr.getPort() < rhs.d_addr.getPort();
2016 }
2017
2018 bool operator>(const AddressAndPortRange& rhs) const
2019 {
2020 return rhs.operator<(*this);
2021 }
2022
2023 struct hash
2024 {
2025 uint32_t operator()(const AddressAndPortRange& apr) const
2026 {
2027 ComboAddress::addressOnlyHash hashOp;
2028 uint16_t port = apr.d_addr.getPort();
2029 /* it's fine to hash the whole address and port because the non-relevant parts have
2030 been masked to 0 */
2031 return burtle(reinterpret_cast<const unsigned char*>(&port), sizeof(port), hashOp(apr.d_addr)); // NOLINT(cppcoreguidelines-pro-type-reinterpret-cast)
2032 }
2033 };
2034
2035private:
2036 ComboAddress d_addr;
2037 uint8_t d_addrMask;
2038 /* only used for v4 addresses */
2039 uint8_t d_portMask;
2040};
2041
2042int SSocket(int family, int type, int flags);
2043int SConnect(int sockfd, const ComboAddress& remote);
2044/* tries to connect to remote for a maximum of timeout seconds.
2045 sockfd should be set to non-blocking beforehand.
2046 returns 0 on success (the socket is writable), throw a
2047 runtime_error otherwise */
2048int SConnectWithTimeout(int sockfd, const ComboAddress& remote, const struct timeval& timeout);
2049int SBind(int sockfd, const ComboAddress& local);
2050int SAccept(int sockfd, ComboAddress& remote);
2051int SListen(int sockfd, int limit);
2052int SSetsockopt(int sockfd, int level, int opname, int value);
2053void setSocketIgnorePMTU(int sockfd, int family);
2054void setSocketForcePMTU(int sockfd, int family);
2055bool setReusePort(int sockfd);
2056
2057#if defined(IP_PKTINFO)
2058#define GEN_IP_PKTINFO IP_PKTINFO
2059#elif defined(IP_RECVDSTADDR)
2060#define GEN_IP_PKTINFO IP_RECVDSTADDR
2061#endif
2062
2063bool IsAnyAddress(const ComboAddress& addr);
2064bool HarvestDestinationAddress(const struct msghdr* msgh, ComboAddress* destination);
2065bool HarvestTimestamp(struct msghdr* msgh, struct timeval* timeval);
2066void fillMSGHdr(struct msghdr* msgh, struct iovec* iov, cmsgbuf_aligned* cbuf, size_t cbufsize, char* data, size_t datalen, ComboAddress* addr);
2067int sendOnNBSocket(int fileDesc, const struct msghdr* msgh);
2068size_t sendMsgWithOptions(int socketDesc, const void* buffer, size_t len, const ComboAddress* dest, const ComboAddress* local, unsigned int localItf, int flags);
2069
2070/* requires a non-blocking, connected TCP socket */
2071bool isTCPSocketUsable(int sock);
2072
2073extern template class NetmaskTree<bool>;
2074ComboAddress parseIPAndPort(const std::string& input, uint16_t port);
2075
2076std::set<std::string> getListOfNetworkInterfaces();
2077std::vector<ComboAddress> getListOfAddressesOfNetworkInterface(const std::string& itf);
2078std::vector<Netmask> getListOfRangesOfNetworkInterface(const std::string& itf);
2079
2080/* These functions throw if the value was already set to a higher value,
2081 or on error */
2082void setSocketBuffer(int fileDesc, int optname, uint32_t size);
2083void setSocketReceiveBuffer(int fileDesc, uint32_t size);
2084void setSocketSendBuffer(int fileDesc, uint32_t size);
2085uint32_t raiseSocketReceiveBufferToMax(int socket);
2086uint32_t raiseSocketSendBufferToMax(int socket);