1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174 |
- using System;
- using System.Collections.Generic;
- using System.Collections.ObjectModel;
- using System.Globalization;
- using System.Linq;
- using System.Net;
- using System.Net.NetworkInformation;
- using System.Net.Sockets;
- using System.Threading.Tasks;
- using Jellyfin.Networking.Configuration;
- using MediaBrowser.Common.Configuration;
- using MediaBrowser.Common.Net;
- using Microsoft.AspNetCore.Http;
- using Microsoft.AspNetCore.HttpOverrides;
- using Microsoft.Extensions.Logging;
- namespace Jellyfin.Networking.Manager
- {
- /// <summary>
- /// Class to take care of network interface management.
- /// </summary>
- public class NetworkManager : INetworkManager, IDisposable
- {
- /// <summary>
- /// Threading lock for network properties.
- /// </summary>
- private readonly object _initLock;
- /// <summary>
- /// Dictionary containing interface addresses and their subnets.
- /// </summary>
- private readonly List<IPData> _interfaces;
- /// <summary>
- /// List of all interface MAC addresses.
- /// </summary>
- private readonly List<PhysicalAddress> _macAddresses;
- private readonly ILogger<NetworkManager> _logger;
- private readonly IConfigurationManager _configurationManager;
- private readonly object _eventFireLock;
- /// <summary>
- /// Holds the published server URLs and the IPs to use them on.
- /// </summary>
- private readonly Dictionary<IPData, string> _publishedServerUrls;
- private Collection<IPNetwork> _remoteAddressFilter;
- /// <summary>
- /// Used to stop "event-racing conditions".
- /// </summary>
- private bool _eventfire;
- /// <summary>
- /// Unfiltered user defined LAN subnets (<see cref="NetworkConfiguration.LocalNetworkSubnets"/>)
- /// or internal interface network subnets if undefined by user.
- /// </summary>
- private Collection<IPNetwork> _lanSubnets;
- /// <summary>
- /// User defined list of subnets to excluded from the LAN.
- /// </summary>
- private Collection<IPNetwork> _excludedSubnets;
- /// <summary>
- /// List of interfaces to bind to.
- /// </summary>
- private List<IPAddress> _bindAddresses;
- /// <summary>
- /// List of interface addresses to exclude from bind.
- /// </summary>
- private List<IPAddress> _bindExclusions;
- /// <summary>
- /// True if this object is disposed.
- /// </summary>
- private bool _disposed;
- /// <summary>
- /// Initializes a new instance of the <see cref="NetworkManager"/> class.
- /// </summary>
- /// <param name="configurationManager">IServerConfigurationManager instance.</param>
- /// <param name="logger">Logger to use for messages.</param>
- #pragma warning disable CS8618 // Non-nullable field is uninitialized. : Values are set in UpdateSettings function. Compiler doesn't yet recognise this.
- public NetworkManager(IConfigurationManager configurationManager, ILogger<NetworkManager> logger)
- {
- _logger = logger ?? throw new ArgumentNullException(nameof(logger));
- _configurationManager = configurationManager ?? throw new ArgumentNullException(nameof(configurationManager));
- _initLock = new();
- _interfaces = new List<IPData>();
- _macAddresses = new List<PhysicalAddress>();
- _publishedServerUrls = new Dictionary<IPData, string>();
- _eventFireLock = new object();
- _remoteAddressFilter = new Collection<IPNetwork>();
- UpdateSettings(_configurationManager.GetNetworkConfiguration());
- NetworkChange.NetworkAddressChanged += OnNetworkAddressChanged;
- NetworkChange.NetworkAvailabilityChanged += OnNetworkAvailabilityChanged;
- _configurationManager.NamedConfigurationUpdated += ConfigurationUpdated;
- }
- #pragma warning restore CS8618 // Non-nullable field is uninitialized.
- /// <summary>
- /// Event triggered on network changes.
- /// </summary>
- public event EventHandler? NetworkChanged;
- /// <summary>
- /// Gets or sets a value indicating whether testing is taking place.
- /// </summary>
- public static string MockNetworkSettings { get; set; } = string.Empty;
- /// <summary>
- /// Gets a value indicating whether IP4 is enabled.
- /// </summary>
- public bool IsIpv4Enabled => _configurationManager.GetNetworkConfiguration().EnableIPV4;
- /// <summary>
- /// Gets a value indicating whether IP6 is enabled.
- /// </summary>
- public bool IsIpv6Enabled => _configurationManager.GetNetworkConfiguration().EnableIPV6;
- /// <summary>
- /// Gets a value indicating whether is all IPv6 interfaces are trusted as internal.
- /// </summary>
- public bool TrustAllIpv6Interfaces { get; private set; }
- /// <summary>
- /// Gets the Published server override list.
- /// </summary>
- public Dictionary<IPData, string> PublishedServerUrls => _publishedServerUrls;
- /// <inheritdoc/>
- public void Dispose()
- {
- Dispose(true);
- GC.SuppressFinalize(this);
- }
- /// <summary>
- /// Handler for network change events.
- /// </summary>
- /// <param name="sender">Sender.</param>
- /// <param name="e">A <see cref="NetworkAvailabilityEventArgs"/> containing network availability information.</param>
- private void OnNetworkAvailabilityChanged(object? sender, NetworkAvailabilityEventArgs e)
- {
- _logger.LogDebug("Network availability changed.");
- OnNetworkChanged();
- }
- /// <summary>
- /// Handler for network change events.
- /// </summary>
- /// <param name="sender">Sender.</param>
- /// <param name="e">An <see cref="EventArgs"/>.</param>
- private void OnNetworkAddressChanged(object? sender, EventArgs e)
- {
- _logger.LogDebug("Network address change detected.");
- OnNetworkChanged();
- }
- /// <summary>
- /// Triggers our event, and re-loads interface information.
- /// </summary>
- private void OnNetworkChanged()
- {
- lock (_eventFireLock)
- {
- if (!_eventfire)
- {
- _logger.LogDebug("Network Address Change Event.");
- // As network events tend to fire one after the other only fire once every second.
- _eventfire = true;
- OnNetworkChangeAsync().GetAwaiter().GetResult();
- }
- }
- }
- /// <summary>
- /// Async task that waits for 2 seconds before re-initialising the settings, as typically these events fire multiple times in succession.
- /// </summary>
- /// <returns>A <see cref="Task"/> representing the asynchronous operation.</returns>
- private async Task OnNetworkChangeAsync()
- {
- try
- {
- await Task.Delay(2000).ConfigureAwait(false);
- InitialiseInterfaces();
- // Recalculate LAN caches.
- InitialiseLan(_configurationManager.GetNetworkConfiguration());
- NetworkChanged?.Invoke(this, EventArgs.Empty);
- }
- finally
- {
- _eventfire = false;
- }
- }
- /// <summary>
- /// Generate a list of all the interface ip addresses and submasks where that are in the active/unknown state.
- /// Generate a list of all active mac addresses that aren't loopback addresses.
- /// </summary>
- private void InitialiseInterfaces()
- {
- lock (_initLock)
- {
- _logger.LogDebug("Refreshing interfaces.");
- _interfaces.Clear();
- _macAddresses.Clear();
- try
- {
- IEnumerable<NetworkInterface> nics = NetworkInterface.GetAllNetworkInterfaces()
- .Where(i => i.SupportsMulticast && i.OperationalStatus == OperationalStatus.Up);
- foreach (NetworkInterface adapter in nics)
- {
- try
- {
- IPInterfaceProperties ipProperties = adapter.GetIPProperties();
- PhysicalAddress mac = adapter.GetPhysicalAddress();
- // Populate MAC list
- if (adapter.NetworkInterfaceType != NetworkInterfaceType.Loopback && PhysicalAddress.None.Equals(mac))
- {
- _macAddresses.Add(mac);
- }
- // Populate interface list
- foreach (UnicastIPAddressInformation info in ipProperties.UnicastAddresses)
- {
- if (IsIpv4Enabled && info.Address.AddressFamily == AddressFamily.InterNetwork)
- {
- var interfaceObject = new IPData(info.Address, new IPNetwork(info.Address, info.PrefixLength), adapter.Name);
- interfaceObject.Index = ipProperties.GetIPv4Properties().Index;
- interfaceObject.Name = adapter.Name.ToLowerInvariant();
- _interfaces.Add(interfaceObject);
- }
- else if (IsIpv6Enabled && info.Address.AddressFamily == AddressFamily.InterNetworkV6)
- {
- var interfaceObject = new IPData(info.Address, new IPNetwork(info.Address, info.PrefixLength), adapter.Name);
- interfaceObject.Index = ipProperties.GetIPv6Properties().Index;
- interfaceObject.Name = adapter.Name.ToLowerInvariant();
- _interfaces.Add(interfaceObject);
- }
- }
- }
- #pragma warning disable CA1031 // Do not catch general exception types
- catch (Exception ex)
- #pragma warning restore CA1031 // Do not catch general exception types
- {
- // Ignore error, and attempt to continue.
- _logger.LogError(ex, "Error encountered parsing interfaces.");
- }
- }
- }
- #pragma warning disable CA1031 // Do not catch general exception types
- catch (Exception ex)
- #pragma warning restore CA1031 // Do not catch general exception types
- {
- _logger.LogError(ex, "Error obtaining interfaces.");
- }
- // If for some reason we don't have an interface info, resolve the DNS name.
- if (_interfaces.Count == 0)
- {
- _logger.LogError("No interfaces information available. Resolving DNS name.");
- var hostName = Dns.GetHostName();
- if (Uri.CheckHostName(hostName).Equals(UriHostNameType.Dns))
- {
- try
- {
- IPHostEntry hip = Dns.GetHostEntry(hostName);
- foreach (var address in hip.AddressList)
- {
- _interfaces.Add(new IPData(address, null));
- }
- }
- catch (SocketException ex)
- {
- // Log and then ignore socket errors, as the result value will just be an empty array.
- _logger.LogWarning("GetHostEntryAsync failed with {Message}.", ex.Message);
- }
- }
- if (_interfaces.Count == 0)
- {
- _logger.LogWarning("No interfaces information available. Using loopback.");
- }
- }
- if (IsIpv4Enabled && !IsIpv6Enabled)
- {
- _interfaces.Add(new IPData(IPAddress.Loopback, new IPNetwork(IPAddress.Loopback, 8), "lo"));
- }
- if (!IsIpv4Enabled && IsIpv6Enabled)
- {
- _interfaces.Add(new IPData(IPAddress.IPv6Loopback, new IPNetwork(IPAddress.IPv6Loopback, 128), "lo"));
- }
- _logger.LogDebug("Discovered {0} interfaces.", _interfaces.Count);
- _logger.LogDebug("Interfaces addresses : {0}", _interfaces.Select(s => s.Address).ToString());
- }
- }
- /// <summary>
- /// Initialises internal LAN cache.
- /// </summary>
- private void InitialiseLan(NetworkConfiguration config)
- {
- lock (_initLock)
- {
- _logger.LogDebug("Refreshing LAN information.");
- // Get configuration options
- string[] subnets = config.LocalNetworkSubnets;
- _ = TryParseSubnets(subnets, out _lanSubnets, false);
- _ = TryParseSubnets(subnets, out _excludedSubnets, true);
- if (_lanSubnets.Count == 0)
- {
- // If no LAN addresses are specified, all private subnets are deemed to be the LAN
- _logger.LogDebug("Using LAN interface addresses as user provided no LAN details.");
- if (IsIpv6Enabled)
- {
- _lanSubnets.Add(new IPNetwork(IPAddress.Parse("fc00::"), 7)); // ULA
- _lanSubnets.Add(new IPNetwork(IPAddress.Parse("fe80::"), 10)); // Site local
- }
- if (IsIpv4Enabled)
- {
- _lanSubnets.Add(new IPNetwork(IPAddress.Parse("10.0.0.0"), 8));
- _lanSubnets.Add(new IPNetwork(IPAddress.Parse("172.16.0.0"), 12));
- _lanSubnets.Add(new IPNetwork(IPAddress.Parse("192.168.0.0"), 16));
- }
- }
- _logger.LogInformation("Defined LAN addresses : {0}", _lanSubnets.Select(s => s.Prefix + "/" + s.PrefixLength));
- _logger.LogInformation("Defined LAN exclusions : {0}", _excludedSubnets.Select(s => s.Prefix + "/" + s.PrefixLength));
- _logger.LogInformation("Using LAN addresses: {0}", _lanSubnets.Where(s => !_excludedSubnets.Contains(s)).Select(s => s.Prefix + "/" + s.PrefixLength));
- }
- }
- /// <summary>
- /// Initialises the network bind addresses.
- /// </summary>
- private void InitialiseBind(NetworkConfiguration config)
- {
- lock (_initLock)
- {
- // Use explicit bind addresses
- if (config.LocalNetworkAddresses.Length > 0)
- {
- _bindAddresses = config.LocalNetworkAddresses.Select(p => IPAddress.TryParse(p, out var address)
- ? address
- : (_interfaces.Where(x => x.Name.Equals(p, StringComparison.OrdinalIgnoreCase)).Select(x => x.Address).FirstOrDefault() ?? IPAddress.None)).ToList();
- _bindAddresses.RemoveAll(x => x == IPAddress.None);
- }
- else
- {
- // Use all addresses from all interfaces
- _bindAddresses = _interfaces.Select(x => x.Address).ToList();
- }
- _bindExclusions = new List<IPAddress>();
- // Add all interfaces matching any virtual machine interface prefix to _bindExclusions
- if (config.IgnoreVirtualInterfaces)
- {
- // Remove potentially exisiting * and split config string into prefixes
- var virtualInterfacePrefixes = config.VirtualInterfaceNames.Replace("*", string.Empty, StringComparison.OrdinalIgnoreCase).ToLowerInvariant().Split(',');
- // Check all interfaces for matches against the prefixes and add the interface IPs to _bindExclusions
- if (_bindAddresses.Count > 0 && virtualInterfacePrefixes.Length > 0)
- {
- var localInterfaces = _interfaces.ToList();
- foreach (var virtualInterfacePrefix in virtualInterfacePrefixes)
- {
- var excludedInterfaceIps = localInterfaces.Where(intf => intf.Name.StartsWith(virtualInterfacePrefix, StringComparison.OrdinalIgnoreCase))
- .Select(intf => intf.Address);
- foreach (var interfaceIp in excludedInterfaceIps)
- {
- _bindExclusions.Add(interfaceIp);
- }
- }
- }
- }
- // Remove all excluded addresses from _bindAddresses
- _bindAddresses.RemoveAll(x => _bindExclusions.Contains(x));
- _logger.LogInformation("Using bind addresses: {0}", _bindAddresses);
- _logger.LogInformation("Using bind exclusions: {0}", _bindExclusions);
- }
- }
- /// <summary>
- /// Initialises the remote address values.
- /// </summary>
- private void InitialiseRemote(NetworkConfiguration config)
- {
- lock (_initLock)
- {
- // Parse config values into filter collection
- var remoteIPFilter = config.RemoteIPFilter;
- if (remoteIPFilter.Any() && !string.IsNullOrWhiteSpace(remoteIPFilter.First()))
- {
- // Parse all IPs with netmask to a subnet
- _ = TryParseSubnets(remoteIPFilter.Where(x => x.Contains('/', StringComparison.OrdinalIgnoreCase)).ToArray(), out _remoteAddressFilter, false);
- // Parse everything else as an IP and construct subnet with a single IP
- var ips = remoteIPFilter.Where(x => !x.Contains('/', StringComparison.OrdinalIgnoreCase));
- foreach (var ip in ips)
- {
- if (IPAddress.TryParse(ip, out var ipp))
- {
- _remoteAddressFilter.Add(new IPNetwork(ipp, ipp.AddressFamily == AddressFamily.InterNetwork ? 32 : 128));
- }
- }
- }
- }
- }
- /// <summary>
- /// Parses the user defined overrides into the dictionary object.
- /// Overrides are the equivalent of localised publishedServerUrl, enabling
- /// different addresses to be advertised over different subnets.
- /// format is subnet=ipaddress|host|uri
- /// when subnet = 0.0.0.0, any external address matches.
- /// </summary>
- private void InitialiseOverrides(NetworkConfiguration config)
- {
- lock (_initLock)
- {
- _publishedServerUrls.Clear();
- string[] overrides = config.PublishedServerUriBySubnet;
- foreach (var entry in overrides)
- {
- var parts = entry.Split('=');
- if (parts.Length != 2)
- {
- _logger.LogError("Unable to parse bind override: {Entry}", entry);
- }
- else
- {
- var replacement = parts[1].Trim();
- var ipParts = parts[0].Split("/");
- if (string.Equals(parts[0], "all", StringComparison.OrdinalIgnoreCase))
- {
- _publishedServerUrls[new IPData(IPAddress.Broadcast, null)] = replacement;
- }
- else if (string.Equals(parts[0], "external", StringComparison.OrdinalIgnoreCase))
- {
- _publishedServerUrls[new IPData(IPAddress.Any, new IPNetwork(IPAddress.Any, 0))] = replacement;
- _publishedServerUrls[new IPData(IPAddress.IPv6Any, new IPNetwork(IPAddress.IPv6Any, 0))] = replacement;
- }
- else if (IPAddress.TryParse(ipParts[0], out IPAddress? result))
- {
- var data = new IPData(result, null);
- if (ipParts.Length > 1 && int.TryParse(ipParts[1], out var netmask))
- {
- data.Subnet = new IPNetwork(result, netmask);
- }
- _publishedServerUrls[data] = replacement;
- }
- else if (TryParseInterface(parts[0], out var ifaces))
- {
- foreach (var iface in ifaces)
- {
- _publishedServerUrls[iface] = replacement;
- }
- }
- else
- {
- _logger.LogError("Unable to parse bind ip address. {Parts}", parts[1]);
- }
- }
- }
- }
- }
- private void ConfigurationUpdated(object? sender, ConfigurationUpdateEventArgs evt)
- {
- if (evt.Key.Equals("network", StringComparison.Ordinal))
- {
- UpdateSettings((NetworkConfiguration)evt.NewConfiguration);
- }
- }
- /// <summary>
- /// Reloads all settings and re-initialises the instance.
- /// </summary>
- /// <param name="configuration">The <see cref="NetworkConfiguration"/> to use.</param>
- public void UpdateSettings(object configuration)
- {
- NetworkConfiguration config = (NetworkConfiguration)configuration ?? throw new ArgumentNullException(nameof(configuration));
- if (string.IsNullOrEmpty(MockNetworkSettings))
- {
- InitialiseInterfaces();
- }
- else // Used in testing only.
- {
- // Format is <IPAddress>,<Index>,<Name>: <next interface>. Set index to -ve to simulate a gateway.
- var interfaceList = MockNetworkSettings.Split('|');
- foreach (var details in interfaceList)
- {
- var parts = details.Split(',');
- var split = parts[0].Split("/");
- var address = IPAddress.Parse(split[0]);
- var network = new IPNetwork(address, int.Parse(split[1], CultureInfo.InvariantCulture));
- var index = int.Parse(parts[1], CultureInfo.InvariantCulture);
- if (address.AddressFamily == AddressFamily.InterNetwork)
- {
- _interfaces.Add(new IPData(address, network, parts[2]));
- }
- else if (address.AddressFamily == AddressFamily.InterNetworkV6)
- {
- _interfaces.Add(new IPData(address, network, parts[2]));
- }
- }
- }
- InitialiseLan(config);
- InitialiseBind(config);
- InitialiseRemote(config);
- InitialiseOverrides(config);
- }
- /// <summary>
- /// Protected implementation of Dispose pattern.
- /// </summary>
- /// <param name="disposing"><c>True</c> to dispose the managed state.</param>
- protected virtual void Dispose(bool disposing)
- {
- if (!_disposed)
- {
- if (disposing)
- {
- _configurationManager.NamedConfigurationUpdated -= ConfigurationUpdated;
- NetworkChange.NetworkAddressChanged -= OnNetworkAddressChanged;
- NetworkChange.NetworkAvailabilityChanged -= OnNetworkAvailabilityChanged;
- }
- _disposed = true;
- }
- }
- /// <inheritdoc/>
- public bool TryParseInterface(string intf, out Collection<IPData> result)
- {
- result = new Collection<IPData>();
- if (string.IsNullOrEmpty(intf))
- {
- return false;
- }
- if (_interfaces != null)
- {
- // Match all interfaces starting with names starting with token
- var matchedInterfaces = _interfaces.Where(s => s.Name.Equals(intf.ToLowerInvariant(), StringComparison.OrdinalIgnoreCase));
- if (matchedInterfaces.Any())
- {
- _logger.LogInformation("Interface {Token} used in settings. Using its interface addresses.", intf);
- // Use interface IP instead of name
- foreach (IPData iface in matchedInterfaces)
- {
- if ((IsIpv4Enabled && iface.Address.AddressFamily == AddressFamily.InterNetwork)
- || (IsIpv6Enabled && iface.Address.AddressFamily == AddressFamily.InterNetworkV6))
- {
- result.Add(iface);
- }
- }
- return true;
- }
- }
- return false;
- }
- /// <summary>
- /// Try parsing an array of strings into subnets, respecting exclusions.
- /// </summary>
- /// <param name="values">Input string to be parsed.</param>
- /// <param name="result">Collection of <see cref="IPNetwork"/>.</param>
- /// <param name="negated">Boolean signaling if negated or not negated values should be parsed.</param>
- /// <returns><c>True</c> if parsing was successful.</returns>
- public bool TryParseSubnets(string[] values, out Collection<IPNetwork> result, bool negated = false)
- {
- result = new Collection<IPNetwork>();
- if (values == null || values.Length == 0)
- {
- return false;
- }
- for (int a = 0; a < values.Length; a++)
- {
- string[] v = values[a].Trim().Split("/");
- try
- {
- var address = IPAddress.None;
- if (negated && v[0].StartsWith('!'))
- {
- _ = IPAddress.TryParse(v[0][1..], out address);
- }
- else if (!negated)
- {
- _ = IPAddress.TryParse(v[0][0..], out address);
- }
- if (address != IPAddress.None && address != null)
- {
- if (int.TryParse(v[1], out var netmask))
- {
- result.Add(new IPNetwork(address, netmask));
- }
- else if (address.AddressFamily == AddressFamily.InterNetwork)
- {
- result.Add(new IPNetwork(address, 32));
- }
- else if (address.AddressFamily == AddressFamily.InterNetworkV6)
- {
- result.Add(new IPNetwork(address, 128));
- }
- }
- }
- catch (ArgumentException e)
- {
- _logger.LogWarning(e, "Ignoring LAN value {Value}.", v);
- }
- }
- if (result.Count > 0)
- {
- return true;
- }
- return false;
- }
- /// <inheritdoc/>
- public bool HasRemoteAccess(IPAddress remoteIp)
- {
- var config = _configurationManager.GetNetworkConfiguration();
- if (config.EnableRemoteAccess)
- {
- // Comma separated list of IP addresses or IP/netmask entries for networks that will be allowed to connect remotely.
- // If left blank, all remote addresses will be allowed.
- if (_remoteAddressFilter.Any() && !_lanSubnets.Any(x => x.Contains(remoteIp)))
- {
- // remoteAddressFilter is a whitelist or blacklist.
- var matches = _remoteAddressFilter.Count(remoteNetwork => remoteNetwork.Contains(remoteIp));
- if ((!config.IsRemoteIPFilterBlacklist && matches > 0)
- || (config.IsRemoteIPFilterBlacklist && matches == 0))
- {
- return true;
- }
- return false;
- }
- }
- else if (!_lanSubnets.Where(x => x.Contains(remoteIp)).Any())
- {
- // Remote not enabled. So everyone should be LAN.
- return false;
- }
- return true;
- }
- /// <inheritdoc/>
- public IReadOnlyCollection<PhysicalAddress> GetMacAddresses()
- {
- // Populated in construction - so always has values.
- return _macAddresses;
- }
- /// <inheritdoc/>
- public List<IPData> GetLoopbacks()
- {
- var loopbackNetworks = new List<IPData>();
- if (IsIpv4Enabled)
- {
- loopbackNetworks.Add(new IPData(IPAddress.Loopback, new IPNetwork(IPAddress.Loopback, 8), "lo"));
- }
- if (IsIpv6Enabled)
- {
- loopbackNetworks.Add(new IPData(IPAddress.IPv6Loopback, new IPNetwork(IPAddress.IPv6Loopback, 128), "lo"));
- }
- return loopbackNetworks;
- }
- /// <inheritdoc/>
- public List<IPData> GetAllBindInterfaces(bool individualInterfaces = false)
- {
- if (_bindAddresses.Count == 0)
- {
- if (_bindExclusions.Count > 0)
- {
- foreach (var exclusion in _bindExclusions)
- {
- // Return all the interfaces except the ones specifically excluded.
- _interfaces.RemoveAll(intf => intf.Address == exclusion);
- }
- return _interfaces;
- }
- // No bind address and no exclusions, so listen on all interfaces.
- var result = new List<IPData>();
- if (individualInterfaces)
- {
- foreach (var iface in _interfaces)
- {
- result.Add(iface);
- }
- return result;
- }
- if (IsIpv4Enabled && IsIpv6Enabled)
- {
- // Kestrel source code shows it uses Sockets.DualMode - so this also covers IPAddress.Any by default
- result.Add(new IPData(IPAddress.IPv6Any, new IPNetwork(IPAddress.IPv6Any, 0)));
- }
- else if (IsIpv4Enabled)
- {
- result.Add(new IPData(IPAddress.Any, new IPNetwork(IPAddress.Any, 0)));
- }
- else if (IsIpv6Enabled)
- {
- // Cannot use IPv6Any as Kestrel will bind to IPv4 addresses too.
- foreach (var iface in _interfaces)
- {
- if (iface.AddressFamily == AddressFamily.InterNetworkV6)
- {
- result.Add(iface);
- }
- }
- }
- return result;
- }
- // Remove any excluded bind interfaces.
- foreach (var exclusion in _bindExclusions)
- {
- // Return all the interfaces except the ones specifically excluded.
- _bindAddresses.Remove(exclusion);
- }
- return _bindAddresses.Select(s => new IPData(s, null)).ToList();
- }
- /// <inheritdoc/>
- public string GetBindInterface(string source, out int? port)
- {
- _ = NetworkExtensions.TryParseHost(source, out var address, IsIpv4Enabled, IsIpv6Enabled);
- var result = GetBindInterface(address.FirstOrDefault(), out port);
- return result;
- }
- /// <inheritdoc/>
- public string GetBindInterface(HttpRequest source, out int? port)
- {
- string result;
- _ = NetworkExtensions.TryParseHost(source.Host.Host, out var addresses, IsIpv4Enabled, IsIpv6Enabled);
- result = GetBindInterface(addresses.FirstOrDefault(), out port);
- port ??= source.Host.Port;
- return result;
- }
- /// <inheritdoc/>
- public string GetBindInterface(IPAddress? source, out int? port)
- {
- port = null;
- string result;
- if (source != null)
- {
- if (IsIpv4Enabled && source.AddressFamily == AddressFamily.InterNetworkV6)
- {
- _logger.LogWarning("IPv6 is disabled in Jellyfin, but enabled in the OS. This may affect how the interface is selected.");
- }
- if (IsIpv6Enabled && source.AddressFamily == AddressFamily.InterNetwork)
- {
- _logger.LogWarning("IPv4 is disabled in Jellyfin, but enabled in the OS. This may affect how the interface is selected.");
- }
- bool isExternal = !_lanSubnets.Any(network => network.Contains(source));
- _logger.LogDebug("GetBindInterface with source. External: {IsExternal}:", isExternal);
- if (MatchesPublishedServerUrl(source, isExternal, out string res, out port))
- {
- _logger.LogInformation("{Source}: Using BindAddress {Address}:{Port}", source, res, port);
- return res;
- }
- // No preference given, so move on to bind addresses.
- if (MatchesBindInterface(source, isExternal, out result))
- {
- return result;
- }
- if (isExternal && MatchesExternalInterface(source, out result))
- {
- return result;
- }
- }
- // Get the first LAN interface address that's not excluded and not a loopback address.
- var availableInterfaces = _interfaces.Where(x => !IPAddress.IsLoopback(x.Address))
- .OrderByDescending(x => _bindAddresses.Contains(x.Address))
- .ThenByDescending(x => IsInLocalNetwork(x.Address))
- .ThenBy(x => x.Index);
- if (availableInterfaces.Any())
- {
- if (source != null)
- {
- foreach (var intf in availableInterfaces)
- {
- if (intf.Address.Equals(source))
- {
- result = NetworkExtensions.FormatIpString(intf.Address);
- _logger.LogDebug("{Source}: GetBindInterface: Has found matching interface. {Result}", source, result);
- return result;
- }
- }
- // Does the request originate in one of the interface subnets?
- // (For systems with multiple internal network cards, and multiple subnets)
- foreach (var intf in availableInterfaces)
- {
- if (intf.Subnet.Contains(source))
- {
- result = NetworkExtensions.FormatIpString(intf.Address);
- _logger.LogDebug("{Source}: GetBindInterface: Has source, matched best internal interface on range. {Result}", source, result);
- return result;
- }
- }
- }
- result = NetworkExtensions.FormatIpString(availableInterfaces.First().Address);
- _logger.LogDebug("{Source}: GetBindInterface: Matched first internal interface. {Result}", source, result);
- return result;
- }
- // There isn't any others, so we'll use the loopback.
- result = IsIpv4Enabled && !IsIpv6Enabled ? "127.0.0.1" : "::1";
- _logger.LogWarning("{Source}: GetBindInterface: Loopback {Result} returned.", source, result);
- return result;
- }
- /// <inheritdoc/>
- public List<IPData> GetInternalBindAddresses()
- {
- if (_bindAddresses.Count == 0)
- {
- if (_bindExclusions.Count > 0)
- {
- // Return all the internal interfaces except the ones excluded.
- return _interfaces.Where(p => !_bindExclusions.Contains(p.Address)).ToList();
- }
- // No bind address, so return all internal interfaces.
- return _interfaces;
- }
- // Select all local bind addresses
- return _interfaces.Where(x => _bindAddresses.Contains(x.Address))
- .Where(x => IsInLocalNetwork(x.Address))
- .OrderBy(x => x.Index).ToList();
- }
- /// <inheritdoc/>
- public bool IsInLocalNetwork(string address)
- {
- if (IPAddress.TryParse(address, out var ep))
- {
- return IPAddress.IsLoopback(ep) || (_lanSubnets.Any(x => x.Contains(ep)) && !_excludedSubnets.Any(x => x.Contains(ep)));
- }
- if (NetworkExtensions.TryParseHost(address, out var addresses, IsIpv4Enabled, IsIpv6Enabled))
- {
- bool match = false;
- foreach (var ept in addresses)
- {
- match |= IPAddress.IsLoopback(ept) || (_lanSubnets.Any(x => x.Contains(ept)) && !_excludedSubnets.Any(x => x.Contains(ept)));
- }
- return match;
- }
- return false;
- }
- /// <inheritdoc/>
- public bool IsInLocalNetwork(IPAddress address)
- {
- if (address == null)
- {
- throw new ArgumentNullException(nameof(address));
- }
- // See conversation at https://github.com/jellyfin/jellyfin/pull/3515.
- if (TrustAllIpv6Interfaces && address.AddressFamily == AddressFamily.InterNetworkV6)
- {
- return true;
- }
- // As private addresses can be redefined by Configuration.LocalNetworkAddresses
- var match = CheckIfLanAndNotExcluded(address);
- return address.Equals(IPAddress.Loopback) || address.Equals(IPAddress.IPv6Loopback) || match;
- }
- private IPData? FindInterfaceForIp(IPAddress address, bool localNetwork = false)
- {
- if (address == null)
- {
- throw new ArgumentNullException(nameof(address));
- }
- var interfaces = _interfaces;
- if (localNetwork)
- {
- interfaces = interfaces.Where(x => IsInLocalNetwork(x.Address)).ToList();
- }
- foreach (var intf in _interfaces)
- {
- if (intf.Subnet.Contains(address))
- {
- return intf;
- }
- }
- return null;
- }
- private bool CheckIfLanAndNotExcluded(IPAddress address)
- {
- bool match = false;
- foreach (var lanSubnet in _lanSubnets)
- {
- match |= lanSubnet.Contains(address);
- }
- foreach (var excludedSubnet in _excludedSubnets)
- {
- match &= !excludedSubnet.Contains(address);
- }
- NetworkExtensions.IsIPv6LinkLocal(address);
- return match;
- }
- /// <summary>
- /// Attempts to match the source against the published server URL overrides.
- /// </summary>
- /// <param name="source">IP source address to use.</param>
- /// <param name="isInExternalSubnet">True if the source is in an external subnet.</param>
- /// <param name="bindPreference">The published server URL that matches the source address.</param>
- /// <param name="port">The resultant port, if one exists.</param>
- /// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
- private bool MatchesPublishedServerUrl(IPAddress source, bool isInExternalSubnet, out string bindPreference, out int? port)
- {
- bindPreference = string.Empty;
- port = null;
- var validPublishedServerUrls = _publishedServerUrls.Where(x => x.Key.Address.Equals(IPAddress.Any)).ToList();
- validPublishedServerUrls.AddRange(_publishedServerUrls.Where(x => x.Key.Address.Equals(IPAddress.IPv6Any)));
- validPublishedServerUrls.AddRange(_publishedServerUrls.Where(x => x.Key.Subnet.Contains(source)));
- validPublishedServerUrls = validPublishedServerUrls.GroupBy(x => x.Key).Select(y => y.First()).ToList();
- // Check for user override.
- foreach (var data in validPublishedServerUrls)
- {
- // Get address interface
- var intf = _interfaces.FirstOrDefault(s => s.Subnet.Contains(data.Key.Address));
- // Remaining. Match anything.
- if (data.Key.Address.Equals(IPAddress.Broadcast))
- {
- bindPreference = data.Value;
- break;
- }
- else if ((data.Key.Address.Equals(IPAddress.Any) || data.Key.Address.Equals(IPAddress.IPv6Any)) && isInExternalSubnet)
- {
- // External.
- bindPreference = data.Value;
- break;
- }
- else if (intf?.Address != null)
- {
- // Match ip address.
- bindPreference = data.Value;
- break;
- }
- }
- if (string.IsNullOrEmpty(bindPreference))
- {
- return false;
- }
- // Has it got a port defined?
- var parts = bindPreference.Split(':');
- if (parts.Length > 1)
- {
- if (int.TryParse(parts[1], out int p))
- {
- bindPreference = parts[0];
- port = p;
- }
- }
- return true;
- }
- /// <summary>
- /// Attempts to match the source against a user defined bind interface.
- /// </summary>
- /// <param name="source">IP source address to use.</param>
- /// <param name="isInExternalSubnet">True if the source is in the external subnet.</param>
- /// <param name="result">The result, if a match is found.</param>
- /// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
- private bool MatchesBindInterface(IPAddress source, bool isInExternalSubnet, out string result)
- {
- result = string.Empty;
- int count = _bindAddresses.Count;
- if (count == 1 && (_bindAddresses[0].Equals(IPAddress.Any) || _bindAddresses[0].Equals(IPAddress.IPv6Any)))
- {
- // Ignore IPAny addresses.
- count = 0;
- }
- if (count != 0)
- {
- // Check to see if any of the bind interfaces are in the same subnet as the source.
- IPAddress? defaultGateway = null;
- IPAddress? bindAddress = null;
- if (isInExternalSubnet)
- {
- // Find all external bind addresses. Store the default gateway, but check to see if there is a better match first.
- foreach (var addr in _bindAddresses)
- {
- if (defaultGateway == null && !IsInLocalNetwork(addr))
- {
- defaultGateway = addr;
- }
- var intf = _interfaces.Where(x => x.Subnet.Contains(addr)).FirstOrDefault();
- if (bindAddress == null && intf != null && intf.Subnet.Contains(source))
- {
- bindAddress = intf.Address;
- }
- if (defaultGateway != null && bindAddress != null)
- {
- break;
- }
- }
- }
- else
- {
- // Look for the best internal address.
- foreach (var bA in _bindAddresses.Where(x => IsInLocalNetwork(x)))
- {
- var intf = FindInterfaceForIp(source, true);
- if (intf != null)
- {
- bindAddress = intf.Address;
- break;
- }
- }
- }
- if (bindAddress != null)
- {
- result = NetworkExtensions.FormatIpString(bindAddress);
- _logger.LogDebug("{Source}: GetBindInterface: Has source, found a matching bind interface subnet. {Result}", source, result);
- return true;
- }
- if (isInExternalSubnet && defaultGateway != null)
- {
- result = NetworkExtensions.FormatIpString(defaultGateway);
- _logger.LogDebug("{Source}: GetBindInterface: Using first user defined external interface. {Result}", source, result);
- return true;
- }
- result = NetworkExtensions.FormatIpString(_bindAddresses[0]);
- _logger.LogDebug("{Source}: GetBindInterface: Selected first user defined interface. {Result}", source, result);
- if (isInExternalSubnet)
- {
- _logger.LogWarning("{Source}: External request received, only an internal interface bind found.", source);
- }
- return true;
- }
- return false;
- }
- /// <summary>
- /// Attempts to match the source against an external interface.
- /// </summary>
- /// <param name="source">IP source address to use.</param>
- /// <param name="result">The result, if a match is found.</param>
- /// <returns><c>true</c> if a match is found, <c>false</c> otherwise.</returns>
- private bool MatchesExternalInterface(IPAddress source, out string result)
- {
- result = string.Empty;
- // Get the first WAN interface address that isn't a loopback.
- var extResult = _interfaces.Where(p => !IsInLocalNetwork(p.Address));
- IPAddress? hasResult = null;
- // Does the request originate in one of the interface subnets?
- // (For systems with multiple internal network cards, and multiple subnets)
- foreach (var intf in extResult)
- {
- hasResult ??= intf.Address;
- if (!IsInLocalNetwork(intf.Address) && intf.Subnet.Contains(source))
- {
- result = NetworkExtensions.FormatIpString(intf.Address);
- _logger.LogDebug("{Source}: GetBindInterface: Selected best external on interface on range. {Result}", source, result);
- return true;
- }
- }
- if (hasResult != null)
- {
- result = NetworkExtensions.FormatIpString(hasResult);
- _logger.LogDebug("{Source}: GetBindInterface: Selected first external interface. {Result}", source, result);
- return true;
- }
- _logger.LogDebug("{Source}: External request received, but no WAN interface found. Need to route through internal network.", source);
- return false;
- }
- }
- }
|