run hack/update-netparse-cve.sh
This commit is contained in:
@@ -18,12 +18,12 @@ package kubeadm
|
||||
|
||||
import (
|
||||
"context"
|
||||
"net"
|
||||
"strings"
|
||||
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/kubernetes/test/e2e/framework"
|
||||
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
|
||||
netutils "k8s.io/utils/net"
|
||||
|
||||
"github.com/onsi/ginkgo"
|
||||
)
|
||||
@@ -163,14 +163,14 @@ var _ = Describe("networking [setup-networking]", func() {
|
||||
|
||||
// ipWithinSubnet returns true if an IP (targetIP) falls within the reference subnet (refIPNet)
|
||||
func ipWithinSubnet(refIPNet, targetIP string) bool {
|
||||
_, rNet, _ := net.ParseCIDR(refIPNet)
|
||||
tIP := net.ParseIP(targetIP)
|
||||
_, rNet, _ := netutils.ParseCIDRSloppy(refIPNet)
|
||||
tIP := netutils.ParseIPSloppy(targetIP)
|
||||
return rNet.Contains(tIP)
|
||||
}
|
||||
|
||||
// subnetWithinSubnet returns true if a subnet (targetNet) falls within the reference subnet (refIPNet)
|
||||
func subnetWithinSubnet(refIPNet, targetNet string) bool {
|
||||
_, rNet, _ := net.ParseCIDR(refIPNet)
|
||||
tNet, _, _ := net.ParseCIDR(targetNet)
|
||||
_, rNet, _ := netutils.ParseCIDRSloppy(refIPNet)
|
||||
tNet, _, _ := netutils.ParseCIDRSloppy(targetNet)
|
||||
return rNet.Contains(tNet)
|
||||
}
|
||||
|
Reference in New Issue
Block a user