2018-07-04 10:51:47 +00:00
|
|
|
package multiaddr
|
|
|
|
|
|
|
|
import (
|
2019-06-09 07:24:20 +00:00
|
|
|
"bytes"
|
2018-07-04 10:51:47 +00:00
|
|
|
"encoding/base32"
|
2019-06-09 07:24:20 +00:00
|
|
|
"encoding/base64"
|
2018-07-04 10:51:47 +00:00
|
|
|
"encoding/binary"
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
|
2021-06-16 20:19:45 +00:00
|
|
|
"github.com/ipfs/go-cid"
|
2022-08-19 16:34:07 +00:00
|
|
|
"github.com/multiformats/go-multibase"
|
2018-07-04 10:51:47 +00:00
|
|
|
mh "github.com/multiformats/go-multihash"
|
|
|
|
)
|
|
|
|
|
|
|
|
type Transcoder interface {
|
2021-06-16 20:19:45 +00:00
|
|
|
// Validates and encodes to bytes a multiaddr that's in the string representation.
|
2018-07-04 10:51:47 +00:00
|
|
|
StringToBytes(string) ([]byte, error)
|
2021-06-16 20:19:45 +00:00
|
|
|
// Validates and decodes to a string a multiaddr that's in the bytes representation.
|
2018-07-04 10:51:47 +00:00
|
|
|
BytesToString([]byte) (string, error)
|
2021-06-16 20:19:45 +00:00
|
|
|
// Validates bytes when parsing a multiaddr that's already in the bytes representation.
|
2019-06-09 07:24:20 +00:00
|
|
|
ValidateBytes([]byte) error
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
func NewTranscoderFromFunctions(
|
|
|
|
s2b func(string) ([]byte, error),
|
|
|
|
b2s func([]byte) (string, error),
|
|
|
|
val func([]byte) error,
|
|
|
|
) Transcoder {
|
|
|
|
return twrp{s2b, b2s, val}
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type twrp struct {
|
|
|
|
strtobyte func(string) ([]byte, error)
|
|
|
|
bytetostr func([]byte) (string, error)
|
2019-06-09 07:24:20 +00:00
|
|
|
validbyte func([]byte) error
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (t twrp) StringToBytes(s string) ([]byte, error) {
|
|
|
|
return t.strtobyte(s)
|
|
|
|
}
|
|
|
|
func (t twrp) BytesToString(b []byte) (string, error) {
|
|
|
|
return t.bytetostr(b)
|
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
func (t twrp) ValidateBytes(b []byte) error {
|
|
|
|
if t.validbyte == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return t.validbyte(b)
|
|
|
|
}
|
|
|
|
|
|
|
|
var TranscoderIP4 = NewTranscoderFromFunctions(ip4StB, ip4BtS, nil)
|
|
|
|
var TranscoderIP6 = NewTranscoderFromFunctions(ip6StB, ip6BtS, nil)
|
|
|
|
var TranscoderIP6Zone = NewTranscoderFromFunctions(ip6zoneStB, ip6zoneBtS, ip6zoneVal)
|
2022-08-19 16:34:07 +00:00
|
|
|
var TranscoderIPCIDR = NewTranscoderFromFunctions(ipcidrStB, ipcidrBtS, nil)
|
|
|
|
|
|
|
|
func ipcidrBtS(b []byte) (string, error) {
|
|
|
|
if len(b) != 1 {
|
|
|
|
return "", fmt.Errorf("invalid length (should be == 1)")
|
|
|
|
}
|
|
|
|
return strconv.Itoa(int(b[0])), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func ipcidrStB(s string) ([]byte, error) {
|
|
|
|
ipMask, err := strconv.ParseUint(s, 10, 8)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return []byte{byte(uint8(ipMask))}, nil
|
|
|
|
}
|
2018-07-04 10:51:47 +00:00
|
|
|
|
|
|
|
func ip4StB(s string) ([]byte, error) {
|
|
|
|
i := net.ParseIP(s).To4()
|
|
|
|
if i == nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse ip4 addr: %s", s)
|
|
|
|
}
|
|
|
|
return i, nil
|
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
func ip6zoneStB(s string) ([]byte, error) {
|
|
|
|
if len(s) == 0 {
|
|
|
|
return nil, fmt.Errorf("empty ip6zone")
|
|
|
|
}
|
2021-06-16 20:19:45 +00:00
|
|
|
if strings.Contains(s, "/") {
|
|
|
|
return nil, fmt.Errorf("IPv6 zone ID contains '/': %s", s)
|
|
|
|
}
|
2019-06-09 07:24:20 +00:00
|
|
|
return []byte(s), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func ip6zoneBtS(b []byte) (string, error) {
|
|
|
|
if len(b) == 0 {
|
|
|
|
return "", fmt.Errorf("invalid length (should be > 0)")
|
|
|
|
}
|
|
|
|
return string(b), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func ip6zoneVal(b []byte) error {
|
|
|
|
if len(b) == 0 {
|
|
|
|
return fmt.Errorf("invalid length (should be > 0)")
|
|
|
|
}
|
|
|
|
// Not supported as this would break multiaddrs.
|
|
|
|
if bytes.IndexByte(b, '/') >= 0 {
|
|
|
|
return fmt.Errorf("IPv6 zone ID contains '/': %s", string(b))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-07-04 10:51:47 +00:00
|
|
|
func ip6StB(s string) ([]byte, error) {
|
|
|
|
i := net.ParseIP(s).To16()
|
|
|
|
if i == nil {
|
2019-06-09 07:24:20 +00:00
|
|
|
return nil, fmt.Errorf("failed to parse ip6 addr: %s", s)
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
return i, nil
|
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
func ip6BtS(b []byte) (string, error) {
|
|
|
|
ip := net.IP(b)
|
|
|
|
if ip4 := ip.To4(); ip4 != nil {
|
|
|
|
// Go fails to prepend the `::ffff:` part.
|
|
|
|
return "::ffff:" + ip4.String(), nil
|
|
|
|
}
|
|
|
|
return ip.String(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func ip4BtS(b []byte) (string, error) {
|
2018-07-04 10:51:47 +00:00
|
|
|
return net.IP(b).String(), nil
|
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
var TranscoderPort = NewTranscoderFromFunctions(portStB, portBtS, nil)
|
2018-07-04 10:51:47 +00:00
|
|
|
|
|
|
|
func portStB(s string) ([]byte, error) {
|
|
|
|
i, err := strconv.Atoi(s)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse port addr: %s", err)
|
|
|
|
}
|
|
|
|
if i >= 65536 {
|
|
|
|
return nil, fmt.Errorf("failed to parse port addr: %s", "greater than 65536")
|
|
|
|
}
|
|
|
|
b := make([]byte, 2)
|
|
|
|
binary.BigEndian.PutUint16(b, uint16(i))
|
|
|
|
return b, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func portBtS(b []byte) (string, error) {
|
|
|
|
i := binary.BigEndian.Uint16(b)
|
|
|
|
return strconv.Itoa(int(i)), nil
|
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
var TranscoderOnion = NewTranscoderFromFunctions(onionStB, onionBtS, nil)
|
2018-07-04 10:51:47 +00:00
|
|
|
|
|
|
|
func onionStB(s string) ([]byte, error) {
|
|
|
|
addr := strings.Split(s, ":")
|
|
|
|
if len(addr) != 2 {
|
2021-06-28 06:53:50 +00:00
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s does not contain a port number", s)
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// onion address without the ".onion" substring
|
|
|
|
if len(addr[0]) != 16 {
|
2021-06-28 06:53:50 +00:00
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s not a Tor onion address", s)
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
onionHostBytes, err := base32.StdEncoding.DecodeString(strings.ToUpper(addr[0]))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decode base32 onion addr: %s %s", s, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// onion port number
|
|
|
|
i, err := strconv.Atoi(addr[1])
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s", err)
|
|
|
|
}
|
|
|
|
if i >= 65536 {
|
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s", "port greater than 65536")
|
|
|
|
}
|
|
|
|
if i < 1 {
|
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s", "port less than 1")
|
|
|
|
}
|
|
|
|
|
|
|
|
onionPortBytes := make([]byte, 2)
|
|
|
|
binary.BigEndian.PutUint16(onionPortBytes, uint16(i))
|
|
|
|
bytes := []byte{}
|
|
|
|
bytes = append(bytes, onionHostBytes...)
|
|
|
|
bytes = append(bytes, onionPortBytes...)
|
|
|
|
return bytes, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func onionBtS(b []byte) (string, error) {
|
|
|
|
addr := strings.ToLower(base32.StdEncoding.EncodeToString(b[0:10]))
|
|
|
|
port := binary.BigEndian.Uint16(b[10:12])
|
|
|
|
return addr + ":" + strconv.Itoa(int(port)), nil
|
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
var TranscoderOnion3 = NewTranscoderFromFunctions(onion3StB, onion3BtS, nil)
|
2018-07-04 10:51:47 +00:00
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
func onion3StB(s string) ([]byte, error) {
|
|
|
|
addr := strings.Split(s, ":")
|
|
|
|
if len(addr) != 2 {
|
2021-06-28 06:53:50 +00:00
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s does not contain a port number", s)
|
2019-06-09 07:24:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// onion address without the ".onion" substring
|
|
|
|
if len(addr[0]) != 56 {
|
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s not a Tor onionv3 address. len == %d", s, len(addr[0]))
|
|
|
|
}
|
|
|
|
onionHostBytes, err := base32.StdEncoding.DecodeString(strings.ToUpper(addr[0]))
|
2018-07-04 10:51:47 +00:00
|
|
|
if err != nil {
|
2019-06-09 07:24:20 +00:00
|
|
|
return nil, fmt.Errorf("failed to decode base32 onion addr: %s %s", s, err)
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
2019-06-09 07:24:20 +00:00
|
|
|
|
|
|
|
// onion port number
|
|
|
|
i, err := strconv.Atoi(addr[1])
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s", err)
|
|
|
|
}
|
|
|
|
if i >= 65536 {
|
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s", "port greater than 65536")
|
|
|
|
}
|
|
|
|
if i < 1 {
|
|
|
|
return nil, fmt.Errorf("failed to parse onion addr: %s", "port less than 1")
|
|
|
|
}
|
|
|
|
|
|
|
|
onionPortBytes := make([]byte, 2)
|
|
|
|
binary.BigEndian.PutUint16(onionPortBytes, uint16(i))
|
|
|
|
bytes := []byte{}
|
|
|
|
bytes = append(bytes, onionHostBytes[0:35]...)
|
|
|
|
bytes = append(bytes, onionPortBytes...)
|
|
|
|
return bytes, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func onion3BtS(b []byte) (string, error) {
|
|
|
|
addr := strings.ToLower(base32.StdEncoding.EncodeToString(b[0:35]))
|
|
|
|
port := binary.BigEndian.Uint16(b[35:37])
|
|
|
|
str := addr + ":" + strconv.Itoa(int(port))
|
|
|
|
return str, nil
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
var TranscoderGarlic64 = NewTranscoderFromFunctions(garlic64StB, garlic64BtS, garlic64Validate)
|
|
|
|
|
|
|
|
// i2p uses an alternate character set for base64 addresses. This returns an appropriate encoder.
|
|
|
|
var garlicBase64Encoding = base64.NewEncoding("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-~")
|
|
|
|
|
|
|
|
func garlic64StB(s string) ([]byte, error) {
|
|
|
|
// i2p base64 address will be between 516 and 616 characters long, depending on
|
|
|
|
// certificate type
|
|
|
|
if len(s) < 516 || len(s) > 616 {
|
2021-06-28 06:53:50 +00:00
|
|
|
return nil, fmt.Errorf("failed to parse garlic addr: %s not an i2p base64 address. len: %d", s, len(s))
|
2019-06-09 07:24:20 +00:00
|
|
|
}
|
|
|
|
garlicHostBytes, err := garlicBase64Encoding.DecodeString(s)
|
2018-07-04 10:51:47 +00:00
|
|
|
if err != nil {
|
2019-06-09 07:24:20 +00:00
|
|
|
return nil, fmt.Errorf("failed to decode base64 i2p addr: %s %s", s, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return garlicHostBytes, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func garlic64BtS(b []byte) (string, error) {
|
|
|
|
if err := garlic64Validate(b); err != nil {
|
2018-07-04 10:51:47 +00:00
|
|
|
return "", err
|
|
|
|
}
|
2019-06-09 07:24:20 +00:00
|
|
|
addr := garlicBase64Encoding.EncodeToString(b)
|
|
|
|
return addr, nil
|
|
|
|
}
|
2018-07-04 10:51:47 +00:00
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
func garlic64Validate(b []byte) error {
|
|
|
|
// A garlic64 address will always be greater than 386 bytes long when encoded.
|
|
|
|
if len(b) < 386 {
|
2021-06-28 06:53:50 +00:00
|
|
|
return fmt.Errorf("failed to validate garlic addr: %s not an i2p base64 address. len: %d", b, len(b))
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
2019-06-09 07:24:20 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var TranscoderGarlic32 = NewTranscoderFromFunctions(garlic32StB, garlic32BtS, garlic32Validate)
|
|
|
|
|
|
|
|
var garlicBase32Encoding = base32.NewEncoding("abcdefghijklmnopqrstuvwxyz234567")
|
|
|
|
|
|
|
|
func garlic32StB(s string) ([]byte, error) {
|
|
|
|
// an i2p base32 address with a length of greater than 55 characters is
|
|
|
|
// using an Encrypted Leaseset v2. all other base32 addresses will always be
|
|
|
|
// exactly 52 characters
|
|
|
|
if len(s) < 55 && len(s) != 52 {
|
|
|
|
return nil, fmt.Errorf("failed to parse garlic addr: %s not a i2p base32 address. len: %d", s, len(s))
|
|
|
|
}
|
|
|
|
for len(s)%8 != 0 {
|
|
|
|
s += "="
|
|
|
|
}
|
|
|
|
garlicHostBytes, err := garlicBase32Encoding.DecodeString(s)
|
2018-07-04 10:51:47 +00:00
|
|
|
if err != nil {
|
2019-06-09 07:24:20 +00:00
|
|
|
return nil, fmt.Errorf("failed to decode base32 garlic addr: %s, err: %v len: %v", s, err, len(s))
|
|
|
|
}
|
|
|
|
return garlicHostBytes, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func garlic32BtS(b []byte) (string, error) {
|
|
|
|
if err := garlic32Validate(b); err != nil {
|
2018-07-04 10:51:47 +00:00
|
|
|
return "", err
|
|
|
|
}
|
2019-06-09 07:24:20 +00:00
|
|
|
return strings.TrimRight(garlicBase32Encoding.EncodeToString(b), "="), nil
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
func garlic32Validate(b []byte) error {
|
|
|
|
// an i2p base64 for an Encrypted Leaseset v2 will be at least 35 bytes
|
|
|
|
// long other than that, they will be exactly 32 bytes
|
|
|
|
if len(b) < 35 && len(b) != 32 {
|
2021-06-28 06:53:50 +00:00
|
|
|
return fmt.Errorf("failed to validate garlic addr: %s not an i2p base32 address. len: %d", b, len(b))
|
2019-06-09 07:24:20 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2018-07-04 10:51:47 +00:00
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
var TranscoderP2P = NewTranscoderFromFunctions(p2pStB, p2pBtS, p2pVal)
|
|
|
|
|
2021-06-16 20:19:45 +00:00
|
|
|
// The encoded peer ID can either be a CID of a key or a raw multihash (identity
|
|
|
|
// or sha256-256).
|
2019-06-09 07:24:20 +00:00
|
|
|
func p2pStB(s string) ([]byte, error) {
|
2021-06-16 20:19:45 +00:00
|
|
|
// check if the address is a base58 encoded sha256 or identity multihash
|
|
|
|
if strings.HasPrefix(s, "Qm") || strings.HasPrefix(s, "1") {
|
|
|
|
m, err := mh.FromB58String(s)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse p2p addr: %s %s", s, err)
|
|
|
|
}
|
|
|
|
return m, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if the address is a CID
|
|
|
|
c, err := cid.Decode(s)
|
2019-06-09 07:24:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse p2p addr: %s %s", s, err)
|
|
|
|
}
|
2021-06-16 20:19:45 +00:00
|
|
|
|
|
|
|
if ty := c.Type(); ty == cid.Libp2pKey {
|
|
|
|
return c.Hash(), nil
|
|
|
|
} else {
|
|
|
|
return nil, fmt.Errorf("failed to parse p2p addr: %s has the invalid codec %d", s, ty)
|
|
|
|
}
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
func p2pVal(b []byte) error {
|
|
|
|
_, err := mh.Cast(b)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func p2pBtS(b []byte) (string, error) {
|
|
|
|
m, err := mh.Cast(b)
|
2018-07-04 10:51:47 +00:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
2019-06-09 07:24:20 +00:00
|
|
|
return m.B58String(), nil
|
|
|
|
}
|
2018-07-04 10:51:47 +00:00
|
|
|
|
2019-06-09 07:24:20 +00:00
|
|
|
var TranscoderUnix = NewTranscoderFromFunctions(unixStB, unixBtS, nil)
|
|
|
|
|
|
|
|
func unixStB(s string) ([]byte, error) {
|
|
|
|
return []byte(s), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func unixBtS(b []byte) (string, error) {
|
|
|
|
return string(b), nil
|
2018-07-04 10:51:47 +00:00
|
|
|
}
|
2019-10-04 15:21:24 +00:00
|
|
|
|
|
|
|
var TranscoderDns = NewTranscoderFromFunctions(dnsStB, dnsBtS, dnsVal)
|
|
|
|
|
|
|
|
func dnsVal(b []byte) error {
|
|
|
|
if bytes.IndexByte(b, '/') >= 0 {
|
|
|
|
return fmt.Errorf("domain name %q contains a slash", string(b))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func dnsStB(s string) ([]byte, error) {
|
|
|
|
return []byte(s), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func dnsBtS(b []byte) (string, error) {
|
|
|
|
return string(b), nil
|
|
|
|
}
|
2022-08-19 16:34:07 +00:00
|
|
|
|
|
|
|
var TranscoderCertHash = NewTranscoderFromFunctions(certHashStB, certHashBtS, nil)
|
|
|
|
|
|
|
|
func certHashStB(s string) ([]byte, error) {
|
|
|
|
_, data, err := multibase.Decode(s)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if _, err := mh.Decode(data); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func certHashBtS(b []byte) (string, error) {
|
|
|
|
return multibase.Encode(multibase.Base64url, b)
|
|
|
|
}
|