You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1033 lines
43 KiB
1033 lines
43 KiB
using System;
|
|
using System.Collections.Generic;
|
|
using System.Globalization;
|
|
using System.Linq;
|
|
using System.Net;
|
|
using System.Net.NetworkInformation;
|
|
using System.Net.Sockets;
|
|
using System.Threading.Tasks;
|
|
using Jellyfin.Networking.Configuration;
|
|
using MediaBrowser.Common.Configuration;
|
|
using MediaBrowser.Common.Net;
|
|
using Microsoft.AspNetCore.Http;
|
|
using Microsoft.AspNetCore.HttpOverrides;
|
|
using Microsoft.Extensions.Logging;
|
|
|
|
namespace Jellyfin.Networking.Manager
|
|
{
|
|
/// <summary>
|
|
/// Class to take care of network interface management.
|
|
/// </summary>
|
|
public class NetworkManager : INetworkManager, IDisposable
|
|
{
|
|
/// <summary>
|
|
/// Threading lock for network properties.
|
|
/// </summary>
|
|
private readonly object _initLock;
|
|
|
|
/// <summary>
|
|
/// List of all interface MAC addresses.
|
|
/// </summary>
|
|
private readonly List<PhysicalAddress> _macAddresses;
|
|
|
|
private readonly ILogger<NetworkManager> _logger;
|
|
|
|
private readonly IConfigurationManager _configurationManager;
|
|
|
|
private readonly object _eventFireLock;
|
|
|
|
/// <summary>
|
|
/// Holds the published server URLs and the IPs to use them on.
|
|
/// </summary>
|
|
private readonly Dictionary<IPData, string> _publishedServerUrls;
|
|
|
|
private List<IPNetwork> _remoteAddressFilter;
|
|
|
|
/// <summary>
|
|
/// Used to stop "event-racing conditions".
|
|
/// </summary>
|
|
private bool _eventfire;
|
|
|
|
/// <summary>
|
|
/// Dictionary containing interface addresses and their subnets.
|
|
/// </summary>
|
|
private List<IPData> _interfaces;
|
|
|
|
/// <summary>
|
|
/// Unfiltered user defined LAN subnets (<see cref="NetworkConfiguration.LocalNetworkSubnets"/>)
|
|
/// or internal interface network subnets if undefined by user.
|
|
/// </summary>
|
|
private List<IPNetwork> _lanSubnets;
|
|
|
|
/// <summary>
|
|
/// User defined list of subnets to excluded from the LAN.
|
|
/// </summary>
|
|
private List<IPNetwork> _excludedSubnets;
|
|
|
|
/// <summary>
|
|
/// True if this object is disposed.
|
|
/// </summary>
|
|
private bool _disposed;
|
|
|
|
/// <summary>
|
|
/// Initializes a new instance of the <see cref="NetworkManager"/> class.
|
|
/// </summary>
|
|
/// <param name="configurationManager">IServerConfigurationManager instance.</param>
|
|
/// <param name="logger">Logger to use for messages.</param>
|
|
#pragma warning disable CS8618 // Non-nullable field is uninitialized. : Values are set in UpdateSettings function. Compiler doesn't yet recognise this.
|
|
public NetworkManager(IConfigurationManager configurationManager, ILogger<NetworkManager> logger)
|
|
{
|
|
_logger = logger ?? throw new ArgumentNullException(nameof(logger));
|
|
_configurationManager = configurationManager ?? throw new ArgumentNullException(nameof(configurationManager));
|
|
_initLock = new();
|
|
_interfaces = new List<IPData>();
|
|
_macAddresses = new List<PhysicalAddress>();
|
|
_publishedServerUrls = new Dictionary<IPData, string>();
|
|
_eventFireLock = new object();
|
|
_remoteAddressFilter = new List<IPNetwork>();
|
|
|
|
UpdateSettings(_configurationManager.GetNetworkConfiguration());
|
|
|
|
NetworkChange.NetworkAddressChanged += OnNetworkAddressChanged;
|
|
NetworkChange.NetworkAvailabilityChanged += OnNetworkAvailabilityChanged;
|
|
|
|
_configurationManager.NamedConfigurationUpdated += ConfigurationUpdated;
|
|
}
|
|
#pragma warning restore CS8618 // Non-nullable field is uninitialized.
|
|
|
|
/// <summary>
|
|
/// Event triggered on network changes.
|
|
/// </summary>
|
|
public event EventHandler? NetworkChanged;
|
|
|
|
/// <summary>
|
|
/// Gets or sets a value indicating whether testing is taking place.
|
|
/// </summary>
|
|
public static string MockNetworkSettings { get; set; } = string.Empty;
|
|
|
|
/// <summary>
|
|
/// Gets a value indicating whether IP4 is enabled.
|
|
/// </summary>
|
|
public bool IsIpv4Enabled => _configurationManager.GetNetworkConfiguration().EnableIPV4;
|
|
|
|
/// <summary>
|
|
/// Gets a value indicating whether IP6 is enabled.
|
|
/// </summary>
|
|
public bool IsIpv6Enabled => _configurationManager.GetNetworkConfiguration().EnableIPV6;
|
|
|
|
/// <summary>
|
|
/// Gets a value indicating whether is all IPv6 interfaces are trusted as internal.
|
|
/// </summary>
|
|
public bool TrustAllIpv6Interfaces { get; private set; }
|
|
|
|
/// <summary>
|
|
/// Gets the Published server override list.
|
|
/// </summary>
|
|
public Dictionary<IPData, string> PublishedServerUrls => _publishedServerUrls;
|
|
|
|
/// <inheritdoc/>
|
|
public void Dispose()
|
|
{
|
|
Dispose(true);
|
|
GC.SuppressFinalize(this);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Handler for network change events.
|
|
/// </summary>
|
|
/// <param name="sender">Sender.</param>
|
|
/// <param name="e">A <see cref="NetworkAvailabilityEventArgs"/> containing network availability information.</param>
|
|
private void OnNetworkAvailabilityChanged(object? sender, NetworkAvailabilityEventArgs e)
|
|
{
|
|
_logger.LogDebug("Network availability changed.");
|
|
OnNetworkChanged();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Handler for network change events.
|
|
/// </summary>
|
|
/// <param name="sender">Sender.</param>
|
|
/// <param name="e">An <see cref="EventArgs"/>.</param>
|
|
private void OnNetworkAddressChanged(object? sender, EventArgs e)
|
|
{
|
|
_logger.LogDebug("Network address change detected.");
|
|
OnNetworkChanged();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Triggers our event, and re-loads interface information.
|
|
/// </summary>
|
|
private void OnNetworkChanged()
|
|
{
|
|
lock (_eventFireLock)
|
|
{
|
|
if (!_eventfire)
|
|
{
|
|
_logger.LogDebug("Network Address Change Event.");
|
|
// As network events tend to fire one after the other only fire once every second.
|
|
_eventfire = true;
|
|
OnNetworkChangeAsync().GetAwaiter().GetResult();
|
|
}
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Async task that waits for 2 seconds before re-initialising the settings, as typically these events fire multiple times in succession.
|
|
/// </summary>
|
|
/// <returns>A <see cref="Task"/> representing the asynchronous operation.</returns>
|
|
private async Task OnNetworkChangeAsync()
|
|
{
|
|
try
|
|
{
|
|
await Task.Delay(2000).ConfigureAwait(false);
|
|
var networkConfig = _configurationManager.GetNetworkConfiguration();
|
|
InitialiseLan(networkConfig);
|
|
InitialiseInterfaces();
|
|
EnforceBindSettings(networkConfig);
|
|
|
|
NetworkChanged?.Invoke(this, EventArgs.Empty);
|
|
}
|
|
finally
|
|
{
|
|
_eventfire = false;
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Generate a list of all the interface ip addresses and submasks where that are in the active/unknown state.
|
|
/// Generate a list of all active mac addresses that aren't loopback addresses.
|
|
/// </summary>
|
|
private void InitialiseInterfaces()
|
|
{
|
|
lock (_initLock)
|
|
{
|
|
_logger.LogDebug("Refreshing interfaces.");
|
|
|
|
_interfaces.Clear();
|
|
_macAddresses.Clear();
|
|
|
|
try
|
|
{
|
|
var nics = NetworkInterface.GetAllNetworkInterfaces()
|
|
.Where(i => i.SupportsMulticast && i.OperationalStatus == OperationalStatus.Up);
|
|
|
|
foreach (NetworkInterface adapter in nics)
|
|
{
|
|
try
|
|
{
|
|
var ipProperties = adapter.GetIPProperties();
|
|
var mac = adapter.GetPhysicalAddress();
|
|
|
|
// Populate MAC list
|
|
if (adapter.NetworkInterfaceType != NetworkInterfaceType.Loopback && PhysicalAddress.None.Equals(mac))
|
|
{
|
|
_macAddresses.Add(mac);
|
|
}
|
|
|
|
// Populate interface list
|
|
foreach (var info in ipProperties.UnicastAddresses)
|
|
{
|
|
if (IsIpv4Enabled && info.Address.AddressFamily == AddressFamily.InterNetwork)
|
|
{
|
|
var interfaceObject = new IPData(info.Address, new IPNetwork(info.Address, info.PrefixLength), adapter.Name);
|
|
interfaceObject.Index = ipProperties.GetIPv4Properties().Index;
|
|
interfaceObject.Name = adapter.Name.ToLowerInvariant();
|
|
|
|
_interfaces.Add(interfaceObject);
|
|
}
|
|
else if (IsIpv6Enabled && info.Address.AddressFamily == AddressFamily.InterNetworkV6)
|
|
{
|
|
var interfaceObject = new IPData(info.Address, new IPNetwork(info.Address, info.PrefixLength), adapter.Name);
|
|
interfaceObject.Index = ipProperties.GetIPv6Properties().Index;
|
|
interfaceObject.Name = adapter.Name.ToLowerInvariant();
|
|
|
|
_interfaces.Add(interfaceObject);
|
|
}
|
|
}
|
|
}
|
|
#pragma warning disable CA1031 // Do not catch general exception types
|
|
catch (Exception ex)
|
|
#pragma warning restore CA1031 // Do not catch general exception types
|
|
{
|
|
// Ignore error, and attempt to continue.
|
|
_logger.LogError(ex, "Error encountered parsing interfaces.");
|
|
}
|
|
}
|
|
}
|
|
#pragma warning disable CA1031 // Do not catch general exception types
|
|
catch (Exception ex)
|
|
#pragma warning restore CA1031 // Do not catch general exception types
|
|
{
|
|
_logger.LogError(ex, "Error obtaining interfaces.");
|
|
}
|
|
|
|
if (_interfaces.Count == 0)
|
|
{
|
|
_logger.LogWarning("No interface information available. Using loopback interface(s).");
|
|
|
|
if (IsIpv4Enabled && !IsIpv6Enabled)
|
|
{
|
|
_interfaces.Add(new IPData(IPAddress.Loopback, new IPNetwork(IPAddress.Loopback, 8), "lo"));
|
|
}
|
|
|
|
if (!IsIpv4Enabled && IsIpv6Enabled)
|
|
{
|
|
_interfaces.Add(new IPData(IPAddress.IPv6Loopback, new IPNetwork(IPAddress.IPv6Loopback, 128), "lo"));
|
|
}
|
|
}
|
|
|
|
_logger.LogDebug("Discovered {0} interfaces.", _interfaces.Count);
|
|
_logger.LogDebug("Interfaces addresses : {0}", _interfaces.Select(s => s.Address).ToString());
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Initialises internal LAN cache.
|
|
/// </summary>
|
|
private void InitialiseLan(NetworkConfiguration config)
|
|
{
|
|
lock (_initLock)
|
|
{
|
|
_logger.LogDebug("Refreshing LAN information.");
|
|
|
|
// Get configuration options
|
|
string[] subnets = config.LocalNetworkSubnets;
|
|
|
|
_ = NetworkExtensions.TryParseSubnets(subnets, out _lanSubnets, false);
|
|
_ = NetworkExtensions.TryParseSubnets(subnets, out _excludedSubnets, true);
|
|
|
|
if (_lanSubnets.Count == 0)
|
|
{
|
|
// If no LAN addresses are specified, all private subnets and Loopback are deemed to be the LAN
|
|
_logger.LogDebug("Using LAN interface addresses as user provided no LAN details.");
|
|
|
|
if (IsIpv6Enabled)
|
|
{
|
|
_lanSubnets.Add(new IPNetwork(IPAddress.IPv6Loopback, 128)); // RFC 4291 (Loopback)
|
|
_lanSubnets.Add(new IPNetwork(IPAddress.Parse("fe80::"), 10)); // RFC 4291 (Site local)
|
|
_lanSubnets.Add(new IPNetwork(IPAddress.Parse("fc00::"), 7)); // RFC 4193 (Unique local)
|
|
}
|
|
|
|
if (IsIpv4Enabled)
|
|
{
|
|
_lanSubnets.Add(new IPNetwork(IPAddress.Loopback, 8)); // RFC 5735 (Loopback)
|
|
_lanSubnets.Add(new IPNetwork(IPAddress.Parse("10.0.0.0"), 8)); // RFC 1918 (private)
|
|
_lanSubnets.Add(new IPNetwork(IPAddress.Parse("172.16.0.0"), 12)); // RFC 1918 (private)
|
|
_lanSubnets.Add(new IPNetwork(IPAddress.Parse("192.168.0.0"), 16)); // RFC 1918 (private)
|
|
}
|
|
}
|
|
|
|
_logger.LogInformation("Defined LAN addresses : {0}", _lanSubnets.Select(s => s.Prefix + "/" + s.PrefixLength));
|
|
_logger.LogInformation("Defined LAN exclusions : {0}", _excludedSubnets.Select(s => s.Prefix + "/" + s.PrefixLength));
|
|
_logger.LogInformation("Using LAN addresses: {0}", _lanSubnets.Where(s => !_excludedSubnets.Contains(s)).Select(s => s.Prefix + "/" + s.PrefixLength));
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Enforce bind addresses and exclusions on available interfaces.
|
|
/// </summary>
|
|
private void EnforceBindSettings(NetworkConfiguration config)
|
|
{
|
|
lock (_initLock)
|
|
{
|
|
// Respect explicit bind addresses
|
|
var localNetworkAddresses = config.LocalNetworkAddresses;
|
|
if (localNetworkAddresses.Length > 0 && !string.IsNullOrWhiteSpace(localNetworkAddresses.First()))
|
|
{
|
|
var bindAddresses = localNetworkAddresses.Select(p => IPAddress.TryParse(p, out var addresses)
|
|
? addresses
|
|
: (_interfaces.Where(x => x.Name.Equals(p, StringComparison.OrdinalIgnoreCase))
|
|
.Select(x => x.Address)
|
|
.FirstOrDefault() ?? IPAddress.None))
|
|
.ToList();
|
|
bindAddresses.RemoveAll(x => x == IPAddress.None);
|
|
_interfaces = _interfaces.Where(x => bindAddresses.Contains(x.Address)).ToList();
|
|
|
|
if (bindAddresses.Contains(IPAddress.Loopback))
|
|
{
|
|
_interfaces.Add(new IPData(IPAddress.Loopback, new IPNetwork(IPAddress.Loopback, 8), "lo"));
|
|
}
|
|
|
|
if (bindAddresses.Contains(IPAddress.IPv6Loopback))
|
|
{
|
|
_interfaces.Add(new IPData(IPAddress.IPv6Loopback, new IPNetwork(IPAddress.IPv6Loopback, 128), "lo"));
|
|
}
|
|
}
|
|
|
|
// Remove all interfaces matching any virtual machine interface prefix
|
|
if (config.IgnoreVirtualInterfaces)
|
|
{
|
|
// Remove potentially exisiting * and split config string into prefixes
|
|
var virtualInterfacePrefixes = config.VirtualInterfaceNames
|
|
.Select(i => i.ToLowerInvariant()
|
|
.Replace("*", string.Empty, StringComparison.OrdinalIgnoreCase));
|
|
|
|
// Check all interfaces for matches against the prefixes and remove them
|
|
if (_interfaces.Count > 0 && virtualInterfacePrefixes.Any())
|
|
{
|
|
foreach (var virtualInterfacePrefix in virtualInterfacePrefixes)
|
|
{
|
|
_interfaces.RemoveAll(x => x.Name.StartsWith(virtualInterfacePrefix, StringComparison.OrdinalIgnoreCase));
|
|
}
|
|
}
|
|
}
|
|
|
|
// Remove all IPv4 interfaces if IPv4 is disabled
|
|
if (!IsIpv4Enabled)
|
|
{
|
|
_interfaces.RemoveAll(x => x.AddressFamily == AddressFamily.InterNetwork);
|
|
}
|
|
|
|
// Remove all IPv6 interfaces if IPv6 is disabled
|
|
if (!IsIpv6Enabled)
|
|
{
|
|
_interfaces.RemoveAll(x => x.AddressFamily == AddressFamily.InterNetworkV6);
|
|
}
|
|
|
|
_logger.LogInformation("Using bind addresses: {0}", _interfaces.Select(x => x.Address));
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Initialises the remote address values.
|
|
/// </summary>
|
|
private void InitialiseRemote(NetworkConfiguration config)
|
|
{
|
|
lock (_initLock)
|
|
{
|
|
// Parse config values into filter collection
|
|
var remoteIPFilter = config.RemoteIPFilter;
|
|
if (remoteIPFilter.Any() && !string.IsNullOrWhiteSpace(remoteIPFilter.First()))
|
|
{
|
|
// Parse all IPs with netmask to a subnet
|
|
_ = NetworkExtensions.TryParseSubnets(remoteIPFilter.Where(x => x.Contains('/', StringComparison.OrdinalIgnoreCase)).ToArray(), out _remoteAddressFilter, false);
|
|
|
|
// Parse everything else as an IP and construct subnet with a single IP
|
|
var ips = remoteIPFilter.Where(x => !x.Contains('/', StringComparison.OrdinalIgnoreCase));
|
|
foreach (var ip in ips)
|
|
{
|
|
if (IPAddress.TryParse(ip, out var ipp))
|
|
{
|
|
_remoteAddressFilter.Add(new IPNetwork(ipp, ipp.AddressFamily == AddressFamily.InterNetwork ? 32 : 128));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Parses the user defined overrides into the dictionary object.
|
|
/// Overrides are the equivalent of localised publishedServerUrl, enabling
|
|
/// different addresses to be advertised over different subnets.
|
|
/// format is subnet=ipaddress|host|uri
|
|
/// when subnet = 0.0.0.0, any external address matches.
|
|
/// </summary>
|
|
private void InitialiseOverrides(NetworkConfiguration config)
|
|
{
|
|
lock (_initLock)
|
|
{
|
|
_publishedServerUrls.Clear();
|
|
string[] overrides = config.PublishedServerUriBySubnet;
|
|
|
|
foreach (var entry in overrides)
|
|
{
|
|
var parts = entry.Split('=');
|
|
if (parts.Length != 2)
|
|
{
|
|
_logger.LogError("Unable to parse bind override: {Entry}", entry);
|
|
}
|
|
else
|
|
{
|
|
var replacement = parts[1].Trim();
|
|
var ipParts = parts[0].Split("/");
|
|
if (string.Equals(parts[0], "all", StringComparison.OrdinalIgnoreCase))
|
|
{
|
|
_publishedServerUrls[new IPData(IPAddress.Broadcast, null)] = replacement;
|
|
}
|
|
else if (string.Equals(parts[0], "external", StringComparison.OrdinalIgnoreCase))
|
|
{
|
|
_publishedServerUrls[new IPData(IPAddress.Any, new IPNetwork(IPAddress.Any, 0))] = replacement;
|
|
_publishedServerUrls[new IPData(IPAddress.IPv6Any, new IPNetwork(IPAddress.IPv6Any, 0))] = replacement;
|
|
}
|
|
else if (string.Equals(parts[0], "internal", StringComparison.OrdinalIgnoreCase))
|
|
{
|
|
foreach (var lan in _lanSubnets)
|
|
{
|
|
var lanPrefix = lan.Prefix;
|
|
_publishedServerUrls[new IPData(lanPrefix, new IPNetwork(lanPrefix, lan.PrefixLength))] = replacement;
|
|
}
|
|
}
|
|
else if (IPAddress.TryParse(ipParts[0], out IPAddress? result))
|
|
{
|
|
var data = new IPData(result, null);
|
|
if (ipParts.Length > 1 && int.TryParse(ipParts[1], out var netmask))
|
|
{
|
|
data.Subnet = new IPNetwork(result, netmask);
|
|
}
|
|
|
|
_publishedServerUrls[data] = replacement;
|
|
}
|
|
else if (TryParseInterface(ipParts[0], out var ifaces))
|
|
{
|
|
foreach (var iface in ifaces)
|
|
{
|
|
_publishedServerUrls[iface] = replacement;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
_logger.LogError("Unable to parse bind override: {Entry}", entry);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
private void ConfigurationUpdated(object? sender, ConfigurationUpdateEventArgs evt)
|
|
{
|
|
if (evt.Key.Equals("network", StringComparison.Ordinal))
|
|
{
|
|
UpdateSettings((NetworkConfiguration)evt.NewConfiguration);
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Reloads all settings and re-initialises the instance.
|
|
/// </summary>
|
|
/// <param name="configuration">The <see cref="NetworkConfiguration"/> to use.</param>
|
|
public void UpdateSettings(object configuration)
|
|
{
|
|
NetworkConfiguration config = (NetworkConfiguration)configuration ?? throw new ArgumentNullException(nameof(configuration));
|
|
|
|
InitialiseLan(config);
|
|
InitialiseRemote(config);
|
|
|
|
if (string.IsNullOrEmpty(MockNetworkSettings))
|
|
{
|
|
InitialiseInterfaces();
|
|
}
|
|
else // Used in testing only.
|
|
{
|
|
// Format is <IPAddress>,<Index>,<Name>: <next interface>. Set index to -ve to simulate a gateway.
|
|
var interfaceList = MockNetworkSettings.Split('|');
|
|
foreach (var details in interfaceList)
|
|
{
|
|
var parts = details.Split(',');
|
|
var split = parts[0].Split("/");
|
|
var address = IPAddress.Parse(split[0]);
|
|
var network = new IPNetwork(address, int.Parse(split[1], CultureInfo.InvariantCulture));
|
|
var index = int.Parse(parts[1], CultureInfo.InvariantCulture);
|
|
if (address.AddressFamily == AddressFamily.InterNetwork || address.AddressFamily == AddressFamily.InterNetworkV6)
|
|
{
|
|
var data = new IPData(address, network, parts[2]);
|
|
data.Index = index;
|
|
_interfaces.Add(data);
|
|
}
|
|
}
|
|
}
|
|
|
|
EnforceBindSettings(config);
|
|
InitialiseOverrides(config);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Protected implementation of Dispose pattern.
|
|
/// </summary>
|
|
/// <param name="disposing"><c>True</c> to dispose the managed state.</param>
|
|
protected virtual void Dispose(bool disposing)
|
|
{
|
|
if (!_disposed)
|
|
{
|
|
if (disposing)
|
|
{
|
|
_configurationManager.NamedConfigurationUpdated -= ConfigurationUpdated;
|
|
NetworkChange.NetworkAddressChanged -= OnNetworkAddressChanged;
|
|
NetworkChange.NetworkAvailabilityChanged -= OnNetworkAvailabilityChanged;
|
|
}
|
|
|
|
_disposed = true;
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public bool TryParseInterface(string intf, out List<IPData> result)
|
|
{
|
|
result = new List<IPData>();
|
|
if (string.IsNullOrEmpty(intf))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (_interfaces != null)
|
|
{
|
|
// Match all interfaces starting with names starting with token
|
|
var matchedInterfaces = _interfaces.Where(s => s.Name.Equals(intf.ToLowerInvariant(), StringComparison.OrdinalIgnoreCase)).OrderBy(x => x.Index);
|
|
if (matchedInterfaces.Any())
|
|
{
|
|
_logger.LogInformation("Interface {Token} used in settings. Using its interface addresses.", intf);
|
|
|
|
// Use interface IP instead of name
|
|
foreach (IPData iface in matchedInterfaces)
|
|
{
|
|
if ((IsIpv4Enabled && iface.Address.AddressFamily == AddressFamily.InterNetwork)
|
|
|| (IsIpv6Enabled && iface.Address.AddressFamily == AddressFamily.InterNetworkV6))
|
|
{
|
|
result.Add(iface);
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public bool HasRemoteAccess(IPAddress remoteIp)
|
|
{
|
|
var config = _configurationManager.GetNetworkConfiguration();
|
|
if (config.EnableRemoteAccess)
|
|
{
|
|
// Comma separated list of IP addresses or IP/netmask entries for networks that will be allowed to connect remotely.
|
|
// If left blank, all remote addresses will be allowed.
|
|
if (_remoteAddressFilter.Any() && !_lanSubnets.Any(x => x.Contains(remoteIp)))
|
|
{
|
|
// remoteAddressFilter is a whitelist or blacklist.
|
|
var matches = _remoteAddressFilter.Count(remoteNetwork => remoteNetwork.Contains(remoteIp));
|
|
if ((!config.IsRemoteIPFilterBlacklist && matches > 0)
|
|
|| (config.IsRemoteIPFilterBlacklist && matches == 0))
|
|
{
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
}
|
|
else if (!_lanSubnets.Where(x => x.Contains(remoteIp)).Any())
|
|
{
|
|
// Remote not enabled. So everyone should be LAN.
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public IReadOnlyList<PhysicalAddress> GetMacAddresses()
|
|
{
|
|
// Populated in construction - so always has values.
|
|
return _macAddresses;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public IReadOnlyList<IPData> GetLoopbacks()
|
|
{
|
|
var loopbackNetworks = new List<IPData>();
|
|
if (IsIpv4Enabled)
|
|
{
|
|
loopbackNetworks.Add(new IPData(IPAddress.Loopback, new IPNetwork(IPAddress.Loopback, 8), "lo"));
|
|
}
|
|
|
|
if (IsIpv6Enabled)
|
|
{
|
|
loopbackNetworks.Add(new IPData(IPAddress.IPv6Loopback, new IPNetwork(IPAddress.IPv6Loopback, 128), "lo"));
|
|
}
|
|
|
|
return loopbackNetworks;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public IReadOnlyList<IPData> GetAllBindInterfaces(bool individualInterfaces = false)
|
|
{
|
|
if (_interfaces.Count == 0)
|
|
{
|
|
// No bind address and no exclusions, so listen on all interfaces.
|
|
var result = new List<IPData>();
|
|
|
|
if (individualInterfaces)
|
|
{
|
|
foreach (var iface in _interfaces)
|
|
{
|
|
result.Add(iface);
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
if (IsIpv4Enabled && IsIpv6Enabled)
|
|
{
|
|
// Kestrel source code shows it uses Sockets.DualMode - so this also covers IPAddress.Any by default
|
|
result.Add(new IPData(IPAddress.IPv6Any, new IPNetwork(IPAddress.IPv6Any, 0)));
|
|
}
|
|
else if (IsIpv4Enabled)
|
|
{
|
|
result.Add(new IPData(IPAddress.Any, new IPNetwork(IPAddress.Any, 0)));
|
|
}
|
|
else if (IsIpv6Enabled)
|
|
{
|
|
// Cannot use IPv6Any as Kestrel will bind to IPv4 addresses too.
|
|
foreach (var iface in _interfaces)
|
|
{
|
|
if (iface.AddressFamily == AddressFamily.InterNetworkV6)
|
|
{
|
|
result.Add(iface);
|
|
}
|
|
}
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
return _interfaces;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public string GetBindInterface(string source, out int? port)
|
|
{
|
|
_ = NetworkExtensions.TryParseHost(source, out var address, IsIpv4Enabled, IsIpv6Enabled);
|
|
var result = GetBindInterface(address.FirstOrDefault(), out port);
|
|
return result;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public string GetBindInterface(HttpRequest source, out int? port)
|
|
{
|
|
string result;
|
|
_ = NetworkExtensions.TryParseHost(source.Host.Host, out var addresses, IsIpv4Enabled, IsIpv6Enabled);
|
|
result = GetBindInterface(addresses.FirstOrDefault(), out port);
|
|
port ??= source.Host.Port;
|
|
|
|
return result;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public string GetBindInterface(IPAddress? source, out int? port)
|
|
{
|
|
port = null;
|
|
|
|
string result;
|
|
|
|
if (source != null)
|
|
{
|
|
if (IsIpv4Enabled && !IsIpv6Enabled && source.AddressFamily == AddressFamily.InterNetworkV6)
|
|
{
|
|
_logger.LogWarning("IPv6 is disabled in Jellyfin, but enabled in the OS. This may affect how the interface is selected.");
|
|
}
|
|
|
|
if (!IsIpv4Enabled && IsIpv6Enabled && source.AddressFamily == AddressFamily.InterNetwork)
|
|
{
|
|
_logger.LogWarning("IPv4 is disabled in Jellyfin, but enabled in the OS. This may affect how the interface is selected.");
|
|
}
|
|
|
|
bool isExternal = !_lanSubnets.Any(network => network.Contains(source));
|
|
_logger.LogDebug("GetBindInterface with source. External: {IsExternal}:", isExternal);
|
|
|
|
if (MatchesPublishedServerUrl(source, isExternal, out string res, out port))
|
|
{
|
|
if (port != null)
|
|
{
|
|
_logger.LogInformation("{Source}: Using BindAddress {Address}:{Port}", source, res, port);
|
|
}
|
|
else
|
|
{
|
|
_logger.LogInformation("{Source}: Using BindAddress {Address}", source, res);
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
// No preference given, so move on to bind addresses.
|
|
if (MatchesBindInterface(source, isExternal, out result))
|
|
{
|
|
return result;
|
|
}
|
|
|
|
if (isExternal && MatchesExternalInterface(source, out result))
|
|
{
|
|
return result;
|
|
}
|
|
}
|
|
|
|
// Get the first LAN interface address that's not excluded and not a loopback address.
|
|
var availableInterfaces = _interfaces.Where(x => !IPAddress.IsLoopback(x.Address))
|
|
.OrderByDescending(x => IsInLocalNetwork(x.Address))
|
|
.ThenBy(x => x.Index);
|
|
|
|
if (availableInterfaces.Any())
|
|
{
|
|
if (source != null)
|
|
{
|
|
foreach (var intf in availableInterfaces)
|
|
{
|
|
if (intf.Address.Equals(source))
|
|
{
|
|
result = NetworkExtensions.FormatIpString(intf.Address);
|
|
_logger.LogDebug("{Source}: GetBindInterface: Has found matching interface: {Result}", source, result);
|
|
return result;
|
|
}
|
|
}
|
|
|
|
// Does the request originate in one of the interface subnets?
|
|
// (For systems with multiple internal network cards, and multiple subnets)
|
|
foreach (var intf in availableInterfaces)
|
|
{
|
|
if (intf.Subnet.Contains(source))
|
|
{
|
|
result = NetworkExtensions.FormatIpString(intf.Address);
|
|
_logger.LogDebug("{Source}: GetBindInterface: Has source, matched best internal interface on range: {Result}", source, result);
|
|
return result;
|
|
}
|
|
}
|
|
}
|
|
|
|
result = NetworkExtensions.FormatIpString(availableInterfaces.First().Address);
|
|
_logger.LogDebug("{Source}: GetBindInterface: Matched first internal interface: {Result}", source, result);
|
|
return result;
|
|
}
|
|
|
|
// There isn't any others, so we'll use the loopback.
|
|
result = IsIpv4Enabled && !IsIpv6Enabled ? "127.0.0.1" : "::1";
|
|
_logger.LogWarning("{Source}: GetBindInterface: Loopback {Result} returned.", source, result);
|
|
return result;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public IReadOnlyList<IPData> GetInternalBindAddresses()
|
|
{
|
|
// Select all local bind addresses
|
|
return _interfaces.Where(x => IsInLocalNetwork(x.Address))
|
|
.OrderBy(x => x.Index)
|
|
.ToList();
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public bool IsInLocalNetwork(string address)
|
|
{
|
|
if (IPAddress.TryParse(address, out var ep))
|
|
{
|
|
return IPAddress.IsLoopback(ep) || (_lanSubnets.Any(x => x.Contains(ep)) && !_excludedSubnets.Any(x => x.Contains(ep)));
|
|
}
|
|
|
|
if (NetworkExtensions.TryParseHost(address, out var addresses, IsIpv4Enabled, IsIpv6Enabled))
|
|
{
|
|
bool match = false;
|
|
foreach (var ept in addresses)
|
|
{
|
|
match |= IPAddress.IsLoopback(ept) || (_lanSubnets.Any(x => x.Contains(ept)) && !_excludedSubnets.Any(x => x.Contains(ept)));
|
|
}
|
|
|
|
return match;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public bool IsInLocalNetwork(IPAddress address)
|
|
{
|
|
if (address == null)
|
|
{
|
|
throw new ArgumentNullException(nameof(address));
|
|
}
|
|
|
|
// See conversation at https://github.com/jellyfin/jellyfin/pull/3515.
|
|
if (TrustAllIpv6Interfaces && address.AddressFamily == AddressFamily.InterNetworkV6)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
// As private addresses can be redefined by Configuration.LocalNetworkAddresses
|
|
var match = CheckIfLanAndNotExcluded(address);
|
|
|
|
return address.Equals(IPAddress.Loopback) || address.Equals(IPAddress.IPv6Loopback) || match;
|
|
}
|
|
|
|
private bool CheckIfLanAndNotExcluded(IPAddress address)
|
|
{
|
|
bool match = false;
|
|
foreach (var lanSubnet in _lanSubnets)
|
|
{
|
|
match |= lanSubnet.Contains(address);
|
|
}
|
|
|
|
foreach (var excludedSubnet in _excludedSubnets)
|
|
{
|
|
match &= !excludedSubnet.Contains(address);
|
|
}
|
|
|
|
NetworkExtensions.IsIPv6LinkLocal(address);
|
|
return match;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Attempts to match the source against the published server URL overrides.
|
|
/// </summary>
|
|
/// <param name="source">IP source address to use.</param>
|
|
/// <param name="isInExternalSubnet">True if the source is in an external subnet.</param>
|
|
/// <param name="bindPreference">The published server URL that matches the source address.</param>
|
|
/// <param name="port">The resultant port, if one exists.</param>
|
|
/// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
|
|
private bool MatchesPublishedServerUrl(IPAddress source, bool isInExternalSubnet, out string bindPreference, out int? port)
|
|
{
|
|
bindPreference = string.Empty;
|
|
port = null;
|
|
|
|
var validPublishedServerUrls = _publishedServerUrls.Where(x => x.Key.Address.Equals(IPAddress.Any)).ToList();
|
|
validPublishedServerUrls.AddRange(_publishedServerUrls.Where(x => x.Key.Address.Equals(IPAddress.IPv6Any)));
|
|
validPublishedServerUrls.AddRange(_publishedServerUrls.Where(x => x.Key.Subnet.Contains(source)));
|
|
validPublishedServerUrls = validPublishedServerUrls.GroupBy(x => x.Key).Select(y => y.First()).ToList();
|
|
|
|
// Check for user override.
|
|
foreach (var data in validPublishedServerUrls)
|
|
{
|
|
// Get address interface
|
|
var intf = _interfaces.OrderBy(x => x.Index).FirstOrDefault(s => s.Subnet.Contains(data.Key.Address));
|
|
|
|
// Remaining. Match anything.
|
|
if (data.Key.Address.Equals(IPAddress.Broadcast))
|
|
{
|
|
bindPreference = data.Value;
|
|
break;
|
|
}
|
|
else if ((data.Key.Address.Equals(IPAddress.Any) || data.Key.Address.Equals(IPAddress.IPv6Any)) && isInExternalSubnet)
|
|
{
|
|
// External.
|
|
bindPreference = data.Value;
|
|
break;
|
|
}
|
|
else if (intf?.Address != null)
|
|
{
|
|
// Match ip address.
|
|
bindPreference = data.Value;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (string.IsNullOrEmpty(bindPreference))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
// Has it got a port defined?
|
|
var parts = bindPreference.Split(':');
|
|
if (parts.Length > 1)
|
|
{
|
|
if (int.TryParse(parts[1], out int p))
|
|
{
|
|
bindPreference = parts[0];
|
|
port = p;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Attempts to match the source against a user defined bind interface.
|
|
/// </summary>
|
|
/// <param name="source">IP source address to use.</param>
|
|
/// <param name="isInExternalSubnet">True if the source is in the external subnet.</param>
|
|
/// <param name="result">The result, if a match is found.</param>
|
|
/// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
|
|
private bool MatchesBindInterface(IPAddress source, bool isInExternalSubnet, out string result)
|
|
{
|
|
result = string.Empty;
|
|
|
|
int count = _interfaces.Count;
|
|
if (count == 1 && (_interfaces[0].Equals(IPAddress.Any) || _interfaces[0].Equals(IPAddress.IPv6Any)))
|
|
{
|
|
// Ignore IPAny addresses.
|
|
count = 0;
|
|
}
|
|
|
|
if (count > 0)
|
|
{
|
|
IPAddress? bindAddress = null;
|
|
var externalInterfaces = _interfaces.Where(x => !IsInLocalNetwork(x.Address))
|
|
.OrderBy(x => x.Index)
|
|
.ToList();
|
|
|
|
if (isInExternalSubnet)
|
|
{
|
|
if (externalInterfaces.Any())
|
|
{
|
|
// Check to see if any of the external bind interfaces are in the same subnet as the source.
|
|
// If none exists, this will select the first external interface if there is one.
|
|
bindAddress = externalInterfaces
|
|
.OrderByDescending(x => x.Subnet.Contains(source))
|
|
.ThenBy(x => x.Index)
|
|
.Select(x => x.Address)
|
|
.FirstOrDefault();
|
|
|
|
if (bindAddress != null)
|
|
{
|
|
result = NetworkExtensions.FormatIpString(bindAddress);
|
|
_logger.LogDebug("{Source}: GetBindInterface: Has source, found a matching external bind interface: {Result}", source, result);
|
|
return true;
|
|
}
|
|
}
|
|
|
|
_logger.LogWarning("{Source}: External request received, no external interface bind found, trying internal interfaces.", source);
|
|
}
|
|
else
|
|
{
|
|
// Check to see if any of the internal bind interfaces are in the same subnet as the source.
|
|
// If none exists, this will select the first internal interface if there is one.
|
|
bindAddress = _interfaces.Where(x => IsInLocalNetwork(x.Address))
|
|
.OrderByDescending(x => x.Subnet.Contains(source))
|
|
.ThenBy(x => x.Index)
|
|
.Select(x => x.Address)
|
|
.FirstOrDefault();
|
|
|
|
if (bindAddress != null)
|
|
{
|
|
result = NetworkExtensions.FormatIpString(bindAddress);
|
|
_logger.LogWarning("{Source}: Request received, matching internal interface bind found: {Result}", source, result);
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Attempts to match the source against an external interface.
|
|
/// </summary>
|
|
/// <param name="source">IP source address to use.</param>
|
|
/// <param name="result">The result, if a match is found.</param>
|
|
/// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
|
|
private bool MatchesExternalInterface(IPAddress source, out string result)
|
|
{
|
|
result = string.Empty;
|
|
// Get the first WAN interface address that isn't a loopback.
|
|
var extResult = _interfaces.Where(p => !IsInLocalNetwork(p.Address)).OrderBy(x => x.Index);
|
|
|
|
IPAddress? hasResult = null;
|
|
// Does the request originate in one of the interface subnets?
|
|
// (For systems with multiple internal network cards, and multiple subnets)
|
|
foreach (var intf in extResult)
|
|
{
|
|
hasResult ??= intf.Address;
|
|
if (!IsInLocalNetwork(intf.Address) && intf.Subnet.Contains(source))
|
|
{
|
|
result = NetworkExtensions.FormatIpString(intf.Address);
|
|
_logger.LogDebug("{Source}: GetBindInterface: Selected best external on interface on range: {Result}", source, result);
|
|
return true;
|
|
}
|
|
}
|
|
|
|
if (hasResult != null)
|
|
{
|
|
result = NetworkExtensions.FormatIpString(hasResult);
|
|
_logger.LogDebug("{Source}: GetBindInterface: Selected first external interface: {Result}", source, result);
|
|
return true;
|
|
}
|
|
|
|
_logger.LogDebug("{Source}: External request received, but no WAN interface found. Need to route through internal network.", source);
|
|
return false;
|
|
}
|
|
}
|
|
}
|