aboutsummaryrefslogtreecommitdiff
path: root/RSSDP/SsdpCommunicationsServer.cs
AgeCommit message (Collapse)Author
2023-11-15Remove RSSDPPatrick Barron
2023-10-12Merge branch 'master' into fix-resharper-warningsStepan Goremykin
# Conflicts: # Emby.Server.Implementations/Net/SocketFactory.cs # RSSDP/SsdpCommunicationsServer.cs # RSSDP/SsdpDeviceLocator.cs # RSSDP/SsdpDevicePublisher.cs
2023-10-11Refactor URI overrides (#10051)Tim Eisele
2023-10-08Use null propagationStepan Goremykin
2023-10-07Remove redundant semicolonStepan Goremykin
2023-02-20Apply review suggestionsShadowghost
2023-02-17Consistently write IP in upercaseShadowghost
2023-02-17Fix interface address assignment and resolution in SSDPShadowghost
2023-02-17Replace ISocket and UdpSocket, fix DLNA and SSDP binding and discoveryShadowghost
2023-01-19Apply review suggestionsShadowghost
2022-10-14Apply review suggestionsShadowghost
2022-07-21Cleanup and fixesShadowghost
2022-07-21Enforce interface bindings on SSDP, add Loopback to LAN if no LAN definedShadowghost
2022-07-21Fix some ssdp errorsShadowghost
2022-03-08SocketFactory: Remove redundant codeBond_009
ExclusiveAddressUse should be false by default afaik
2022-02-06Fix invalid cref (#7277)Cody Robibero
2021-10-03Fix warning: Qualifier is redundant (#2149)KonH
2021-09-06Remove all unused usingsFernando Fernández
2021-05-24Remove some unnecessary allocationscvium
2021-05-05Code Clean up: Convert to null-coalescing operator ?? (#5845)BaronGreenback
Co-authored-by: Cody Robibero <cody@robibe.ro> Co-authored-by: Patrick Barron <18354464+barronpm@users.noreply.github.com>
2020-10-04Updatig netcollection & re-inserting BOMJim Cartlidge
2020-09-14Removing blank lines.Jim Cartlidge
2020-09-14Update based on PR1 changes.Jim Cartlidge
2020-09-12Large number of filesJim Cartlidge
2020-06-26Update SsdpCommunicationsServer.csBaronGreenback
2020-06-26Update SsdpCommunicationsServer.csBaronGreenback
2020-06-24Sending multicasts out of Sockets without setting the broadcast to true - ↵BaronGreenback
causes the error "Bad value for ai_flags" on some systems (#3404) The underlying cause looks to be https://github.com/dotnet/runtime/issues/28630. Basically, it's an access denied bug. It looks like multicasts need the same access rights as broadcasts on some systems.
2020-06-24Removed debugging infoBaronGreenback
2020-06-24Added logging and broadcast = trueBaronGreenback
Not intended for merge into the fork.
2020-06-20Merge branch 'master' into SSDPCody Robibero
2020-06-20brace multiline if statementstelans
2020-06-20fix SA1503 for one line if statementstelans
2020-06-20remove regionstelans
2020-06-16fix SA1513/SA1516telans
2020-06-15fix SA1508telans
2020-06-15fix SA1005telans
2020-04-29Changes styles as suggested by @barronpmBaronGreenback
Added addtional comments & source type as per intellisense suggestion change code as per sonacloud
2020-04-28Whilst fixing issues with SSDP on devices with multiple interfaces, i came ↵BaronGreenback
across a design issue in the current code - namely interfaces without a gateway were ignored. Fixing this required the removal of the code that attempted to detect virtual interfaces. Not wanting to remove functionality, but not able to keep the code in place, I implemented a work around solution (see 4 below). Whilst in the area, I also fixed a few minor bugs i encountered (1, 5, 6 below) and stopped SSDP messages from going out on non-LAN interfaces (3) All these changes are related. Changes 1 IsInPrivateAddressSpace - improved subnet code checking 2 interfaces with no gateway were being excluded from SSDP blasts 3 filtered SSDP blasts from not LAN addresses as defined on the network page. 4 removed #986 mod - as this was part of the issue of #2986. Interfaces can be excluded from the LAN by putting the LAN address in brackets. eg. [10.1.1.1] will exclude an interface with ip address 10.1.1.1 from SSDP 5 fixed a problem where an invalid LAN address causing the SSDP to crash 6 corrected local link filter (FilterIPAddress) to filter on 169.254. addresses
2020-04-28Revert "Whilst fixing issues with SSDP on devices with multiple interfaces, ↵BaronGreenback
i came across a design issue in the current code - namely interfaces without a gateway were ignored." This reverts commit 2aaecb8e148aef6cda67797fa4227a8ebcf7e5bb.
2020-04-28Whilst fixing issues with SSDP on devices with multiple interfaces, i came ↵BaronGreenback
across a design issue in the current code - namely interfaces without a gateway were ignored. Fixing this required the removal of the code that attempted to detect virtual interfaces. Not wanting to remove functionality, but not able to keep the code in place, I implemented a work around solution (see 4 below). Whilst in the area, I also fixed a few minor bugs i encountered (1, 5, 6 below) and stopped SSDP messages from going out on non-LAN interfaces (3) All these changes are related. Changes 1 IsInPrivateAddressSpace - improved subnet code checking 2 interfaces with no gateway were being excluded from SSDP blasts 3 filtered SSDP blasts from not LAN addresses as defined on the network page. 4 removed #986 mod - as this was part of the issue of #2986. Interfaces can be excluded from the LAN by putting the LAN address in brackets. eg. [10.1.1.1] will exclude an interface with ip address 10.1.1.1 from SSDP 5 fixed a problem where an invalid LAN address causing the SSDP to crash 6 corrected local link filter (FilterIPAddress) to filter on 169.254. addresses
2020-03-24Remove unused usingsBond_009
2019-07-25Remove IpAddressInfo and IpEndPointInfo classesBond_009
2019-03-25Lower the amount of running tasksBond_009
2019-02-23Update comments for DLNA IPv6Xu Fasheng
2019-02-22Send DLNA devices message to only the matched interfaceXu Fasheng
This will be the right way for multiple interfaces, or the client will receive all devices message with different IP addresses and could not detect which one could access. And provide one option DlnaOptions.SendOnlyMatchedHost to fallback to old behaviour if this commit missed something.
2019-02-22Add option to toggle if ignore virtual interfacesXu Fasheng
Some VPN like ZerotierOne owns IP address but no gateway, and there is no good idea in NetworkManager.GetIPsDefault() to filter such virtual interfaces, so just provide one option to let user decide it.
2019-01-13Merge branch 'dev' into reformatErwin de Haan
2019-01-13ReSharper conform to 'var' settingsErwin de Haan
2019-01-13Find+Sed BOM removal *.cs: MediaBrowser.Providers-SocketHttpListenerErwin de Haan
2019-01-13Merge pull request #566 from Bond-009/dlnaAndrew Rabert
Avoid printing stacktrace when bind to port 1900 fails