NetworkParseTests.cs 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345
  1. using System;
  2. using System.Collections.ObjectModel;
  3. using System.Globalization;
  4. using System.Linq;
  5. using System.Net;
  6. using Jellyfin.Networking.Configuration;
  7. using Jellyfin.Networking.Manager;
  8. using MediaBrowser.Common.Configuration;
  9. using MediaBrowser.Common.Net;
  10. using Microsoft.AspNetCore.HttpOverrides;
  11. using Microsoft.Extensions.Logging.Abstractions;
  12. using Moq;
  13. using Xunit;
  14. namespace Jellyfin.Networking.Tests
  15. {
  16. public class NetworkParseTests
  17. {
  18. internal static IConfigurationManager GetMockConfig(NetworkConfiguration conf)
  19. {
  20. var configManager = new Mock<IConfigurationManager>
  21. {
  22. CallBase = true
  23. };
  24. configManager.Setup(x => x.GetConfiguration(It.IsAny<string>())).Returns(conf);
  25. return configManager.Object;
  26. }
  27. /// <summary>
  28. /// Checks the ability to ignore virtual interfaces.
  29. /// </summary>
  30. /// <param name="interfaces">Mock network setup, in the format (IP address, interface index, interface name) | .... </param>
  31. /// <param name="lan">LAN addresses.</param>
  32. /// <param name="value">Bind addresses that are excluded.</param>
  33. [Theory]
  34. // All valid
  35. [InlineData("192.168.1.208/24,-16,eth16|200.200.200.200/24,11,eth11", "192.168.1.0/24;200.200.200.0/24", "[192.168.1.208/24,200.200.200.200/24]")]
  36. // eth16 only
  37. [InlineData("192.168.1.208/24,-16,eth16|200.200.200.200/24,11,eth11", "192.168.1.0/24", "[192.168.1.208/24]")]
  38. // All interfaces excluded. (including loopbacks)
  39. [InlineData("192.168.1.208/24,-16,vEthernet1|192.168.2.208/24,-16,vEthernet212|200.200.200.200/24,11,eth11", "192.168.1.0/24", "[]")]
  40. // vEthernet1 and vEthernet212 should be excluded.
  41. [InlineData("192.168.1.200/24,-20,vEthernet1|192.168.2.208/24,-16,vEthernet212|200.200.200.200/24,11,eth11", "192.168.1.0/24;200.200.200.200/24", "[200.200.200.200/24]")]
  42. // Overlapping interface,
  43. [InlineData("192.168.1.110/24,-20,br0|192.168.1.10/24,-16,br0|200.200.200.200/24,11,eth11", "192.168.1.0/24", "[192.168.1.110/24,192.168.1.10/24]")]
  44. public void IgnoreVirtualInterfaces(string interfaces, string lan, string value)
  45. {
  46. var conf = new NetworkConfiguration()
  47. {
  48. EnableIPV6 = true,
  49. EnableIPV4 = true,
  50. IgnoreVirtualInterfaces = true,
  51. VirtualInterfaceNames = "veth",
  52. LocalNetworkSubnets = lan?.Split(';') ?? throw new ArgumentNullException(nameof(lan))
  53. };
  54. NetworkManager.MockNetworkSettings = interfaces;
  55. using var nm = new NetworkManager(GetMockConfig(conf), new NullLogger<NetworkManager>());
  56. NetworkManager.MockNetworkSettings = string.Empty;
  57. Assert.Equal(value, "[" + string.Join(",", nm.GetInternalBindAddresses().Select(x => x.Address + "/" + x.Subnet.PrefixLength)) + "]");
  58. }
  59. [Theory]
  60. [InlineData("192.168.5.85/24", "192.168.5.1")]
  61. [InlineData("192.168.5.85/24", "192.168.5.254")]
  62. [InlineData("10.128.240.50/30", "10.128.240.48")]
  63. [InlineData("10.128.240.50/30", "10.128.240.49")]
  64. [InlineData("10.128.240.50/30", "10.128.240.50")]
  65. [InlineData("10.128.240.50/30", "10.128.240.51")]
  66. [InlineData("127.0.0.1/8", "127.0.0.1")]
  67. public void IpV4SubnetMaskMatchesValidIpAddress(string netMask, string ipAddress)
  68. {
  69. var split = netMask.Split("/");
  70. var mask = int.Parse(split[1], CultureInfo.InvariantCulture);
  71. var ipa = IPAddress.Parse(split[0]);
  72. var ipn = new IPNetwork(ipa, mask);
  73. Assert.True(ipn.Contains(IPAddress.Parse(ipAddress)));
  74. }
  75. [Theory]
  76. [InlineData("192.168.5.85/24", "192.168.4.254")]
  77. [InlineData("192.168.5.85/24", "191.168.5.254")]
  78. [InlineData("10.128.240.50/30", "10.128.240.47")]
  79. [InlineData("10.128.240.50/30", "10.128.240.52")]
  80. [InlineData("10.128.240.50/30", "10.128.239.50")]
  81. [InlineData("10.128.240.50/30", "10.127.240.51")]
  82. public void IpV4SubnetMaskDoesNotMatchInvalidIpAddress(string netMask, string ipAddress)
  83. {
  84. var split = netMask.Split("/");
  85. var mask = int.Parse(split[1], CultureInfo.InvariantCulture);
  86. var ipa = IPAddress.Parse(split[0]);
  87. var ipn = new IPNetwork(ipa, mask);
  88. Assert.False(ipn.Contains(IPAddress.Parse(ipAddress)));
  89. }
  90. [Theory]
  91. [InlineData("2001:db8:abcd:0012::0/64", "2001:0DB8:ABCD:0012:0000:0000:0000:0000")]
  92. [InlineData("2001:db8:abcd:0012::0/64", "2001:0DB8:ABCD:0012:FFFF:FFFF:FFFF:FFFF")]
  93. [InlineData("2001:db8:abcd:0012::0/64", "2001:0DB8:ABCD:0012:0001:0000:0000:0000")]
  94. [InlineData("2001:db8:abcd:0012::0/64", "2001:0DB8:ABCD:0012:FFFF:FFFF:FFFF:FFF0")]
  95. [InlineData("2001:db8:abcd:0012::0/128", "2001:0DB8:ABCD:0012:0000:0000:0000:0000")]
  96. public void IpV6SubnetMaskMatchesValidIpAddress(string netMask, string ipAddress)
  97. {
  98. var split = netMask.Split("/");
  99. var mask = int.Parse(split[1], CultureInfo.InvariantCulture);
  100. var ipa = IPAddress.Parse(split[0]);
  101. var ipn = new IPNetwork(ipa, mask);
  102. Assert.True(ipn.Contains(IPAddress.Parse(ipAddress)));
  103. }
  104. [Theory]
  105. [InlineData("2001:db8:abcd:0012::0/64", "2001:0DB8:ABCD:0011:FFFF:FFFF:FFFF:FFFF")]
  106. [InlineData("2001:db8:abcd:0012::0/64", "2001:0DB8:ABCD:0013:0000:0000:0000:0000")]
  107. [InlineData("2001:db8:abcd:0012::0/64", "2001:0DB8:ABCD:0013:0001:0000:0000:0000")]
  108. [InlineData("2001:db8:abcd:0012::0/64", "2001:0DB8:ABCD:0011:FFFF:FFFF:FFFF:FFF0")]
  109. [InlineData("2001:db8:abcd:0012::0/128", "2001:0DB8:ABCD:0012:0000:0000:0000:0001")]
  110. public void IpV6SubnetMaskDoesNotMatchInvalidIpAddress(string netMask, string ipAddress)
  111. {
  112. var split = netMask.Split("/");
  113. var mask = int.Parse(split[1], CultureInfo.InvariantCulture);
  114. var ipa = IPAddress.Parse(split[0]);
  115. var ipn = new IPNetwork(ipa, mask);
  116. Assert.False(ipn.Contains(IPAddress.Parse(ipAddress)));
  117. }
  118. [Theory]
  119. // Testing bind interfaces.
  120. // On my system eth16 is internal, eth11 external (Windows defines the indexes).
  121. //
  122. // This test is to replicate how DLNA requests work throughout the system.
  123. // User on internal network, we're bound internal and external - so result is internal.
  124. [InlineData("192.168.1.1", "eth16,eth11", false, "eth16")]
  125. // User on external network, we're bound internal and external - so result is external.
  126. [InlineData("8.8.8.8", "eth16,eth11", false, "eth11")]
  127. // User on internal network, we're bound internal only - so result is internal.
  128. [InlineData("10.10.10.10", "eth16", false, "eth16")]
  129. // User on internal network, no binding specified - so result is the 1st internal.
  130. [InlineData("192.168.1.1", "", false, "eth16")]
  131. // User on external network, internal binding only - so result is the 1st internal.
  132. [InlineData("jellyfin.org", "eth16", false, "eth16")]
  133. // User on external network, no binding - so result is the 1st external.
  134. [InlineData("jellyfin.org", "", false, "eth11")]
  135. // Dns failure - should skip the test.
  136. // https://en.wikipedia.org/wiki/.test
  137. [InlineData("invalid.domain.test", "", false, "eth11")]
  138. // User assumed to be internal, no binding - so result is the 1st internal.
  139. [InlineData("", "", false, "eth16")]
  140. public void TestBindInterfaces(string source, string bindAddresses, bool ipv6enabled, string result)
  141. {
  142. if (source == null)
  143. {
  144. throw new ArgumentNullException(nameof(source));
  145. }
  146. if (bindAddresses == null)
  147. {
  148. throw new ArgumentNullException(nameof(bindAddresses));
  149. }
  150. if (result == null)
  151. {
  152. throw new ArgumentNullException(nameof(result));
  153. }
  154. var conf = new NetworkConfiguration()
  155. {
  156. LocalNetworkAddresses = bindAddresses.Split(','),
  157. EnableIPV6 = ipv6enabled,
  158. EnableIPV4 = true
  159. };
  160. NetworkManager.MockNetworkSettings = "192.168.1.208/24,-16,eth16|200.200.200.200/24,11,eth11";
  161. using var nm = new NetworkManager(GetMockConfig(conf), new NullLogger<NetworkManager>());
  162. NetworkManager.MockNetworkSettings = string.Empty;
  163. _ = nm.TryParseInterface(result, out Collection<IPData>? resultObj);
  164. // Check to see if dns resolution is working. If not, skip test.
  165. _ = NetworkExtensions.TryParseHost(source, out var host);
  166. if (resultObj != null && host.Length > 0)
  167. {
  168. result = resultObj.First().Address.ToString();
  169. var intf = nm.GetBindInterface(source, out _);
  170. Assert.Equal(intf, result);
  171. }
  172. }
  173. [Theory]
  174. // Testing bind interfaces. These are set for my system so won't work elsewhere.
  175. // On my system eth16 is internal, eth11 external (Windows defines the indexes).
  176. //
  177. // This test is to replicate how subnet bound ServerPublisherUri work throughout the system.
  178. // User on internal network, we're bound internal and external - so result is internal override.
  179. [InlineData("192.168.1.1", "192.168.1.0/24", "eth16,eth11", false, "192.168.1.0/24=internal.jellyfin", "internal.jellyfin")]
  180. // User on external network, we're bound internal and external - so result is override.
  181. [InlineData("8.8.8.8", "192.168.1.0/24", "eth16,eth11", false, "0.0.0.0=http://helloworld.com", "http://helloworld.com")]
  182. // User on internal network, we're bound internal only, but the address isn't in the LAN - so return the override.
  183. [InlineData("10.10.10.10", "192.168.1.0/24", "eth16", false, "0.0.0.0=http://internalButNotDefinedAsLan.com", "http://internalButNotDefinedAsLan.com")]
  184. // User on internal network, no binding specified - so result is the 1st internal.
  185. [InlineData("192.168.1.1", "192.168.1.0/24", "", false, "0.0.0.0=http://helloworld.com", "eth16")]
  186. // User on external network, internal binding only - so assumption is a proxy forward, return external override.
  187. [InlineData("jellyfin.org", "192.168.1.0/24", "eth16", false, "0.0.0.0=http://helloworld.com", "http://helloworld.com")]
  188. // User on external network, no binding - so result is the 1st external which is overriden.
  189. [InlineData("jellyfin.org", "192.168.1.0/24", "", false, "0.0.0.0=http://helloworld.com", "http://helloworld.com")]
  190. // User assumed to be internal, no binding - so result is the 1st internal.
  191. [InlineData("", "192.168.1.0/24", "", false, "0.0.0.0=http://helloworld.com", "eth16")]
  192. // User is internal, no binding - so result is the 1st internal, which is then overridden.
  193. [InlineData("192.168.1.1", "192.168.1.0/24", "", false, "eth16=http://helloworld.com", "http://helloworld.com")]
  194. public void TestBindInterfaceOverrides(string source, string lan, string bindAddresses, bool ipv6enabled, string publishedServers, string result)
  195. {
  196. if (lan == null)
  197. {
  198. throw new ArgumentNullException(nameof(lan));
  199. }
  200. if (bindAddresses == null)
  201. {
  202. throw new ArgumentNullException(nameof(bindAddresses));
  203. }
  204. var conf = new NetworkConfiguration()
  205. {
  206. LocalNetworkSubnets = lan.Split(','),
  207. LocalNetworkAddresses = bindAddresses.Split(','),
  208. EnableIPV6 = ipv6enabled,
  209. EnableIPV4 = true,
  210. PublishedServerUriBySubnet = new string[] { publishedServers }
  211. };
  212. NetworkManager.MockNetworkSettings = "192.168.1.208/24,-16,eth16|200.200.200.200/24,11,eth11";
  213. using var nm = new NetworkManager(GetMockConfig(conf), new NullLogger<NetworkManager>());
  214. NetworkManager.MockNetworkSettings = string.Empty;
  215. if (nm.TryParseInterface(result, out Collection<IPData>? resultObj) && resultObj != null)
  216. {
  217. // Parse out IPAddresses so we can do a string comparison. (Ignore subnet masks).
  218. result = resultObj.First().Address.ToString();
  219. }
  220. var intf = nm.GetBindInterface(source, out int? _);
  221. Assert.Equal(result, intf);
  222. }
  223. [Theory]
  224. [InlineData("185.10.10.10,200.200.200.200", "79.2.3.4", true)]
  225. [InlineData("185.10.10.10", "185.10.10.10", false)]
  226. [InlineData("", "100.100.100.100", false)]
  227. public void HasRemoteAccess_GivenWhitelist_AllowsOnlyIpsInWhitelist(string addresses, string remoteIp, bool denied)
  228. {
  229. // Comma separated list of IP addresses or IP/netmask entries for networks that will be allowed to connect remotely.
  230. // If left blank, all remote addresses will be allowed.
  231. var conf = new NetworkConfiguration()
  232. {
  233. EnableIPV4 = true,
  234. RemoteIPFilter = addresses.Split(','),
  235. IsRemoteIPFilterBlacklist = false
  236. };
  237. using var nm = new NetworkManager(GetMockConfig(conf), new NullLogger<NetworkManager>());
  238. Assert.NotEqual(nm.HasRemoteAccess(IPAddress.Parse(remoteIp)), denied);
  239. }
  240. [Theory]
  241. [InlineData("185.10.10.10", "79.2.3.4", false)]
  242. [InlineData("185.10.10.10", "185.10.10.10", true)]
  243. [InlineData("", "100.100.100.100", false)]
  244. public void HasRemoteAccess_GivenBlacklist_BlacklistTheIps(string addresses, string remoteIp, bool denied)
  245. {
  246. // Comma separated list of IP addresses or IP/netmask entries for networks that will be allowed to connect remotely.
  247. // If left blank, all remote addresses will be allowed.
  248. var conf = new NetworkConfiguration()
  249. {
  250. EnableIPV4 = true,
  251. RemoteIPFilter = addresses.Split(','),
  252. IsRemoteIPFilterBlacklist = true
  253. };
  254. using var nm = new NetworkManager(GetMockConfig(conf), new NullLogger<NetworkManager>());
  255. Assert.NotEqual(nm.HasRemoteAccess(IPAddress.Parse(remoteIp)), denied);
  256. }
  257. [Theory]
  258. [InlineData("192.168.1.209/24,-16,eth16", "192.168.1.0/24", "", "192.168.1.209")] // Only 1 address so use it.
  259. [InlineData("192.168.1.208/24,-16,eth16|10.0.0.1/24,10,eth7", "192.168.1.0/24", "", "192.168.1.208")] // LAN address is specified by default.
  260. [InlineData("192.168.1.208/24,-16,eth16|10.0.0.1/24,10,eth7", "192.168.1.0/24", "10.0.0.1", "10.0.0.1")] // return bind address
  261. public void GetBindInterface_NoSourceGiven_Success(string interfaces, string lan, string bind, string result)
  262. {
  263. var conf = new NetworkConfiguration
  264. {
  265. EnableIPV4 = true,
  266. LocalNetworkSubnets = lan.Split(','),
  267. LocalNetworkAddresses = bind.Split(',')
  268. };
  269. NetworkManager.MockNetworkSettings = interfaces;
  270. using var nm = new NetworkManager(GetMockConfig(conf), new NullLogger<NetworkManager>());
  271. var interfaceToUse = nm.GetBindInterface(string.Empty, out _);
  272. Assert.Equal(result, interfaceToUse);
  273. }
  274. [Theory]
  275. [InlineData("192.168.1.209/24,-16,eth16", "192.168.1.0/24", "", "192.168.1.210", "192.168.1.209")] // Source on LAN
  276. [InlineData("192.168.1.208/24,-16,eth16|10.0.0.1/24,10,eth7", "192.168.1.0/24", "", "192.168.1.209", "192.168.1.208")] // Source on LAN
  277. [InlineData("192.168.1.208/24,-16,eth16|10.0.0.1/24,10,eth7", "192.168.1.0/24", "", "8.8.8.8", "10.0.0.1")] // Source external.
  278. [InlineData("192.168.1.208/24,-16,eth16|10.0.0.1/24,10,eth7", "192.168.1.0/24", "10.0.0.1", "192.168.1.209", "10.0.0.1")] // LAN not bound, so return external.
  279. [InlineData("192.168.1.208/24,-16,eth16|10.0.0.1/24,10,eth7", "192.168.1.0/24", "192.168.1.208,10.0.0.1", "8.8.8.8", "10.0.0.1")] // return external bind address
  280. [InlineData("192.168.1.208/24,-16,eth16|10.0.0.1/24,10,eth7", "192.168.1.0/24", "192.168.1.208,10.0.0.1", "192.168.1.210", "192.168.1.208")] // return LAN bind address
  281. public void GetBindInterface_ValidSourceGiven_Success(string interfaces, string lan, string bind, string source, string result)
  282. {
  283. var conf = new NetworkConfiguration
  284. {
  285. EnableIPV4 = true,
  286. LocalNetworkSubnets = lan.Split(','),
  287. LocalNetworkAddresses = bind.Split(',')
  288. };
  289. NetworkManager.MockNetworkSettings = interfaces;
  290. using var nm = new NetworkManager(GetMockConfig(conf), new NullLogger<NetworkManager>());
  291. var interfaceToUse = nm.GetBindInterface(source, out _);
  292. Assert.Equal(result, interfaceToUse);
  293. }
  294. }
  295. }