blob: 7a1266c8c087021864315f61141f47618ef5ee2c [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
Ali Tofigh7fa90572022-03-17 15:47:49 +010013#include "absl/strings/string_view.h"
14
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000015#if defined(WEBRTC_POSIX)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000016#include <net/if.h>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#endif // WEBRTC_POSIX
18
19#if defined(WEBRTC_WIN)
Mirko Bonadei01914412018-03-23 16:30:58 +010020#include <iphlpapi.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020021
Yves Gerey665174f2018-06-19 15:03:05 +020022#include "rtc_base/win32.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080023#elif !defined(__native_client__)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020024#include "rtc_base/ifaddrs_converter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000025#endif
26
jbauch555604a2016-04-26 03:13:22 -070027#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000028
Steve Anton2acd1632019-03-25 13:48:30 -070029#include "absl/algorithm/container.h"
Niels Möllerd959f3a2022-04-19 11:29:19 +020030#include "absl/memory/memory.h"
Steve Anton2acd1632019-03-25 13:48:30 -070031#include "absl/strings/match.h"
32#include "absl/strings/string_view.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020033#include "api/transport/field_trial_based_config.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020034#include "rtc_base/checks.h"
35#include "rtc_base/logging.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020036#include "rtc_base/memory/always_valid_pointer.h"
Steve Anton10542f22019-01-11 09:11:00 -080037#include "rtc_base/network_monitor.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020038#include "rtc_base/socket.h" // includes something that makes windows happy
Steve Anton10542f22019-01-11 09:11:00 -080039#include "rtc_base/string_encode.h"
40#include "rtc_base/string_utils.h"
Jonas Olsson366a50c2018-09-06 13:41:30 +020041#include "rtc_base/strings/string_builder.h"
Niels Möller27c14522022-02-07 16:44:21 +010042#include "rtc_base/task_utils/to_queued_task.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020043#include "rtc_base/thread.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000044
45namespace rtc {
46namespace {
47
Jonas Orelandac554eb2021-08-27 09:43:38 +020048// List of MAC addresses of known VPN (for windows).
49constexpr uint8_t kVpns[2][6] = {
50 // Cisco AnyConnect.
51 {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0},
52 // GlobalProtect Virtual Ethernet.
53 {0x2, 0x50, 0x41, 0x0, 0x0, 0x1},
54};
55
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000056// Fetch list of networks every two seconds.
57const int kNetworksUpdateIntervalMs = 2000;
58
59const int kHighestNetworkPreference = 127;
60
Niels Möllerd959f3a2022-04-19 11:29:19 +020061struct AddressList {
62 std::unique_ptr<Network> net;
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +000063 std::vector<InterfaceAddress> ips;
Niels Möllerd959f3a2022-04-19 11:29:19 +020064};
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000065
Niels Möllerd959f3a2022-04-19 11:29:19 +020066bool CompareNetworks(const std::unique_ptr<Network>& a,
67 const std::unique_ptr<Network>& b) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000068 if (a->prefix_length() == b->prefix_length()) {
69 if (a->name() == b->name()) {
70 return a->prefix() < b->prefix();
71 }
72 }
73 return a->name() < b->name();
74}
75
76bool SortNetworks(const Network* a, const Network* b) {
77 // Network types will be preferred above everything else while sorting
78 // Networks.
79
80 // Networks are sorted first by type.
81 if (a->type() != b->type()) {
82 return a->type() < b->type();
83 }
84
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000085 IPAddress ip_a = a->GetBestIP();
86 IPAddress ip_b = b->GetBestIP();
87
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000088 // After type, networks are sorted by IP address precedence values
89 // from RFC 3484-bis
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000090 if (IPAddressPrecedence(ip_a) != IPAddressPrecedence(ip_b)) {
91 return IPAddressPrecedence(ip_a) > IPAddressPrecedence(ip_b);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000092 }
93
94 // TODO(mallinath) - Add VPN and Link speed conditions while sorting.
95
96 // Networks are sorted last by key.
deadbeef3427f532017-07-26 16:09:33 -070097 return a->key() < b->key();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000098}
99
Jonas Oreland2105d642020-05-13 10:15:34 +0200100uint16_t ComputeNetworkCostByType(int type,
Jonas Orelandb477fc72021-08-23 12:16:33 +0200101 bool is_vpn,
102 bool use_differentiated_cellular_costs,
103 bool add_network_cost_to_vpn) {
Jonas Oreland08d18062020-04-02 07:19:12 +0200104 // TODO(jonaso) : Rollout support for cellular network cost using A/B
105 // experiment to make sure it does not introduce regressions.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200106 int vpnCost = (is_vpn && add_network_cost_to_vpn) ? kNetworkCostVpn : 0;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700107 switch (type) {
108 case rtc::ADAPTER_TYPE_ETHERNET:
109 case rtc::ADAPTER_TYPE_LOOPBACK:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200110 return kNetworkCostMin + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700111 case rtc::ADAPTER_TYPE_WIFI:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200112 return kNetworkCostLow + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700113 case rtc::ADAPTER_TYPE_CELLULAR:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200114 return kNetworkCostCellular + vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200115 case rtc::ADAPTER_TYPE_CELLULAR_2G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200116 return (use_differentiated_cellular_costs ? kNetworkCostCellular2G
117 : kNetworkCostCellular) +
118 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200119 case rtc::ADAPTER_TYPE_CELLULAR_3G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200120 return (use_differentiated_cellular_costs ? kNetworkCostCellular3G
121 : kNetworkCostCellular) +
122 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200123 case rtc::ADAPTER_TYPE_CELLULAR_4G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200124 return (use_differentiated_cellular_costs ? kNetworkCostCellular4G
125 : kNetworkCostCellular) +
126 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200127 case rtc::ADAPTER_TYPE_CELLULAR_5G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200128 return (use_differentiated_cellular_costs ? kNetworkCostCellular5G
129 : kNetworkCostCellular) +
130 vpnCost;
Qingsi Wang9f1de692018-06-28 15:38:09 -0700131 case rtc::ADAPTER_TYPE_ANY:
132 // Candidates gathered from the any-address/wildcard ports, as backups,
133 // are given the maximum cost so that if there are other candidates with
134 // known interface types, we would not select candidate pairs using these
135 // backup candidates if other selection criteria with higher precedence
136 // (network conditions over the route) are the same. Note that setting the
137 // cost to kNetworkCostUnknown would be problematic since
138 // ADAPTER_TYPE_CELLULAR would then have a higher cost. See
139 // P2PTransportChannel::SortConnectionsAndUpdateState for how we rank and
140 // select candidate pairs, where the network cost is among the criteria.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200141 return kNetworkCostMax + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700142 case rtc::ADAPTER_TYPE_VPN:
143 // The cost of a VPN should be computed using its underlying network type.
Artem Titovd3251962021-11-15 16:57:07 +0100144 RTC_DCHECK_NOTREACHED();
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700145 return kNetworkCostUnknown;
146 default:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200147 return kNetworkCostUnknown + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700148 }
149}
150
thakis06689a12015-12-30 15:05:30 -0800151#if !defined(__native_client__)
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100152bool IsIgnoredIPv6(bool allow_mac_based_ipv6, const InterfaceAddress& ip) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000153 if (ip.family() != AF_INET6) {
154 return false;
155 }
156
157 // Link-local addresses require scope id to be bound successfully.
158 // However, our IPAddress structure doesn't carry that so the
159 // information is lost and causes binding failure.
160 if (IPIsLinkLocal(ip)) {
161 return true;
162 }
163
164 // Any MAC based IPv6 should be avoided to prevent the MAC tracking.
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100165 if (IPIsMacBased(ip) && !allow_mac_based_ipv6) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000166 return true;
167 }
168
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800169 // Ignore deprecated IPv6.
170 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED) {
171 return true;
172 }
173
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000174 return false;
175}
thakis06689a12015-12-30 15:05:30 -0800176#endif // !defined(__native_client__)
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000177
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200178// Note: consider changing to const Network* as arguments
179// if/when considering other changes that should not trigger
180// OnNetworksChanged.
181bool ShouldAdapterChangeTriggerNetworkChange(rtc::AdapterType old_type,
182 rtc::AdapterType new_type) {
183 // skip triggering OnNetworksChanged if
184 // changing from one cellular to another.
185 if (Network::IsCellular(old_type) && Network::IsCellular(new_type))
186 return false;
187 return true;
188}
189
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000190} // namespace
191
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800192// These addresses are used as the targets to find out the default local address
193// on a multi-homed endpoint. They are actually DNS servers.
194const char kPublicIPv4Host[] = "8.8.8.8";
195const char kPublicIPv6Host[] = "2001:4860:4860::8888";
196const int kPublicPort = 53; // DNS port.
197
Ali Tofigh7fa90572022-03-17 15:47:49 +0100198std::string MakeNetworkKey(absl::string_view name,
Yves Gerey665174f2018-06-19 15:03:05 +0200199 const IPAddress& prefix,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000200 int prefix_length) {
Jonas Olsson366a50c2018-09-06 13:41:30 +0200201 rtc::StringBuilder ost;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000202 ost << name << "%" << prefix.ToString() << "/" << prefix_length;
Jonas Olsson84df1c72018-09-14 16:59:32 +0200203 return ost.Release();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000204}
Qingsi Wange53ac042018-05-08 11:55:07 -0700205// Test if the network name matches the type<number> pattern, e.g. eth0. The
206// matching is case-sensitive.
Steve Anton2acd1632019-03-25 13:48:30 -0700207bool MatchTypeNameWithIndexPattern(absl::string_view network_name,
208 absl::string_view type_name) {
209 if (!absl::StartsWith(network_name, type_name)) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700210 return false;
211 }
Steve Anton2acd1632019-03-25 13:48:30 -0700212 return absl::c_none_of(network_name.substr(type_name.size()),
213 [](char c) { return !isdigit(c); });
Qingsi Wange53ac042018-05-08 11:55:07 -0700214}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000215
Qingsi Wange53ac042018-05-08 11:55:07 -0700216// A cautious note that this method may not provide an accurate adapter type
217// based on the string matching. Incorrect type of adapters can affect the
218// result of the downstream network filtering, see e.g.
219// BasicPortAllocatorSession::GetNetworks when
220// PORTALLOCATOR_DISABLE_COSTLY_NETWORKS is turned on.
Ali Tofigh2ab914c2022-04-13 12:55:15 +0200221AdapterType GetAdapterTypeFromName(absl::string_view network_name) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700222 if (MatchTypeNameWithIndexPattern(network_name, "lo")) {
223 // Note that we have a more robust way to determine if a network interface
224 // is a loopback interface by checking the flag IFF_LOOPBACK in ifa_flags of
225 // an ifaddr struct. See ConvertIfAddrs in this file.
226 return ADAPTER_TYPE_LOOPBACK;
227 }
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700228
Qingsi Wange53ac042018-05-08 11:55:07 -0700229 if (MatchTypeNameWithIndexPattern(network_name, "eth")) {
230 return ADAPTER_TYPE_ETHERNET;
231 }
232
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000233 if (MatchTypeNameWithIndexPattern(network_name, "wlan") ||
234 MatchTypeNameWithIndexPattern(network_name, "v4-wlan")) {
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700235 return ADAPTER_TYPE_WIFI;
236 }
237
Qingsi Wange53ac042018-05-08 11:55:07 -0700238 if (MatchTypeNameWithIndexPattern(network_name, "ipsec") ||
239 MatchTypeNameWithIndexPattern(network_name, "tun") ||
240 MatchTypeNameWithIndexPattern(network_name, "utun") ||
241 MatchTypeNameWithIndexPattern(network_name, "tap")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800242 return ADAPTER_TYPE_VPN;
243 }
244#if defined(WEBRTC_IOS)
245 // Cell networks are pdp_ipN on iOS.
Qingsi Wange53ac042018-05-08 11:55:07 -0700246 if (MatchTypeNameWithIndexPattern(network_name, "pdp_ip")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800247 return ADAPTER_TYPE_CELLULAR;
248 }
Qingsi Wange53ac042018-05-08 11:55:07 -0700249 if (MatchTypeNameWithIndexPattern(network_name, "en")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800250 // This may not be most accurate because sometimes Ethernet interface
251 // name also starts with "en" but it is better than showing it as
252 // "unknown" type.
253 // TODO(honghaiz): Write a proper IOS network manager.
254 return ADAPTER_TYPE_WIFI;
255 }
256#elif defined(WEBRTC_ANDROID)
Qingsi Wange53ac042018-05-08 11:55:07 -0700257 if (MatchTypeNameWithIndexPattern(network_name, "rmnet") ||
258 MatchTypeNameWithIndexPattern(network_name, "rmnet_data") ||
259 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet") ||
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800260 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet_data") ||
261 MatchTypeNameWithIndexPattern(network_name, "clat")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800262 return ADAPTER_TYPE_CELLULAR;
263 }
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800264#endif
265
266 return ADAPTER_TYPE_UNKNOWN;
267}
268
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700269NetworkManager::EnumerationPermission NetworkManager::enumeration_permission()
270 const {
guoweisea1012b2015-08-21 09:06:28 -0700271 return ENUMERATION_ALLOWED;
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700272}
273
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800274bool NetworkManager::GetDefaultLocalAddress(int family, IPAddress* addr) const {
275 return false;
276}
277
Qingsi Wang7852d292018-10-31 11:17:07 -0700278webrtc::MdnsResponderInterface* NetworkManager::GetMdnsResponder() const {
Qingsi Wang09619332018-09-12 22:51:55 -0700279 return nullptr;
280}
281
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200282NetworkManagerBase::NetworkManagerBase(
Jonas Orelande62c2f22022-03-29 11:04:48 +0200283 const webrtc::FieldTrialsView* field_trials)
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200284 : enumeration_permission_(NetworkManager::ENUMERATION_ALLOWED),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200285 signal_network_preference_change_(
286 field_trials
287 ? field_trials->IsEnabled("WebRTC-SignalNetworkPreferenceChange")
288 : false) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000289
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700290NetworkManager::EnumerationPermission
291NetworkManagerBase::enumeration_permission() const {
292 return enumeration_permission_;
293}
294
Niels Möller22211442022-04-07 11:43:28 +0200295std::vector<const Network*> NetworkManagerBase::GetAnyAddressNetworks() {
296 std::vector<const Network*> networks;
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000297 if (!ipv4_any_address_network_) {
298 const rtc::IPAddress ipv4_any_address(INADDR_ANY);
Niels Möller22211442022-04-07 11:43:28 +0200299 ipv4_any_address_network_ = std::make_unique<Network>(
300 "any", "any", ipv4_any_address, 0, ADAPTER_TYPE_ANY);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800301 ipv4_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800302 ipv4_any_address_network_->set_mdns_responder_provider(this);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000303 ipv4_any_address_network_->AddIP(ipv4_any_address);
304 }
Niels Möller22211442022-04-07 11:43:28 +0200305 networks.push_back(ipv4_any_address_network_.get());
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000306
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100307 if (!ipv6_any_address_network_) {
308 const rtc::IPAddress ipv6_any_address(in6addr_any);
Niels Möller22211442022-04-07 11:43:28 +0200309 ipv6_any_address_network_ = std::make_unique<Network>(
310 "any", "any", ipv6_any_address, 0, ADAPTER_TYPE_ANY);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100311 ipv6_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800312 ipv6_any_address_network_->set_mdns_responder_provider(this);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100313 ipv6_any_address_network_->AddIP(ipv6_any_address);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000314 }
Niels Möller22211442022-04-07 11:43:28 +0200315 networks.push_back(ipv6_any_address_network_.get());
316 return networks;
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000317}
318
Niels Möller22211442022-04-07 11:43:28 +0200319std::vector<const Network*> NetworkManagerBase::GetNetworks() const {
320 std::vector<const Network*> result;
321 result.insert(result.begin(), networks_.begin(), networks_.end());
322 return result;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000323}
324
Niels Möllerd959f3a2022-04-19 11:29:19 +0200325void NetworkManagerBase::MergeNetworkList(
326 std::vector<std::unique_ptr<Network>> new_networks,
327 bool* changed) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000328 NetworkManager::Stats stats;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200329 MergeNetworkList(std::move(new_networks), changed, &stats);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000330}
331
Niels Möllerd959f3a2022-04-19 11:29:19 +0200332void NetworkManagerBase::MergeNetworkList(
333 std::vector<std::unique_ptr<Network>> new_networks,
334 bool* changed,
335 NetworkManager::Stats* stats) {
honghaizdb8cf502015-12-21 13:08:46 -0800336 *changed = false;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000337 // AddressList in this map will track IP addresses for all Networks
338 // with the same key.
339 std::map<std::string, AddressList> consolidated_address_list;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200340 absl::c_sort(new_networks, CompareNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000341 // First, build a set of network-keys to the ipaddresses.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200342 for (auto& network : new_networks) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000343 bool might_add_to_merged_list = false;
Yves Gerey665174f2018-06-19 15:03:05 +0200344 std::string key = MakeNetworkKey(network->name(), network->prefix(),
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000345 network->prefix_length());
Niels Möllerd959f3a2022-04-19 11:29:19 +0200346 const std::vector<InterfaceAddress>& addresses = network->GetIPs();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000347 if (consolidated_address_list.find(key) ==
348 consolidated_address_list.end()) {
349 AddressList addrlist;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200350 addrlist.net = std::move(network);
351 consolidated_address_list[key] = std::move(addrlist);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000352 might_add_to_merged_list = true;
353 }
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000354 AddressList& current_list = consolidated_address_list[key];
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000355 for (const InterfaceAddress& address : addresses) {
356 current_list.ips.push_back(address);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000357 }
Niels Möllerd959f3a2022-04-19 11:29:19 +0200358 if (might_add_to_merged_list) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000359 if (current_list.ips[0].family() == AF_INET) {
360 stats->ipv4_network_count++;
361 } else {
nisseede5da42017-01-12 05:15:36 -0800362 RTC_DCHECK(current_list.ips[0].family() == AF_INET6);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000363 stats->ipv6_network_count++;
364 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000365 }
366 }
367
368 // Next, look for existing network objects to re-use.
honghaizdb8cf502015-12-21 13:08:46 -0800369 // Result of Network merge. Element in this list should have unique key.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200370 std::vector<Network*> merged_list;
371 for (auto& kv : consolidated_address_list) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000372 const std::string& key = kv.first;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200373 std::unique_ptr<Network> net = std::move(kv.second.net);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000374 auto existing = networks_map_.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000375 if (existing == networks_map_.end()) {
Niels Möllerd959f3a2022-04-19 11:29:19 +0200376 // This network is new.
honghaiza0c44ea2016-03-23 16:07:48 -0700377 net->set_id(next_available_network_id_++);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200378 // We might have accumulated IPAddresses from the first
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000379 // step, set it here.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000380 net->SetIPs(kv.second.ips, true);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200381 // Place it in the network map.
382 merged_list.push_back(net.get());
383 networks_map_[key] = std::move(net);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000384 *changed = true;
385 } else {
386 // This network exists in the map already. Reset its IP addresses.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200387 Network* existing_net = existing->second.get();
honghaizdb8cf502015-12-21 13:08:46 -0800388 *changed = existing_net->SetIPs(kv.second.ips, *changed);
389 merged_list.push_back(existing_net);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700390 if (net->type() != ADAPTER_TYPE_UNKNOWN &&
391 net->type() != existing_net->type()) {
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200392 if (ShouldAdapterChangeTriggerNetworkChange(existing_net->type(),
393 net->type())) {
394 *changed = true;
395 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700396 existing_net->set_type(net->type());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700397 }
honghaizdb8cf502015-12-21 13:08:46 -0800398 // If the existing network was not active, networks have changed.
399 if (!existing_net->active()) {
400 *changed = true;
401 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200402 if (net->network_preference() != existing_net->network_preference()) {
403 existing_net->set_network_preference(net->network_preference());
404 if (signal_network_preference_change_) {
405 *changed = true;
406 }
407 }
nisseede5da42017-01-12 05:15:36 -0800408 RTC_DCHECK(net->active());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000409 }
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800410 networks_map_[key]->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000411 }
Artem Titov96e3b992021-07-26 16:03:14 +0200412 // It may still happen that the merged list is a subset of `networks_`.
honghaizdb8cf502015-12-21 13:08:46 -0800413 // To detect this change, we compare their sizes.
414 if (merged_list.size() != networks_.size()) {
415 *changed = true;
416 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000417
Artem Titov96e3b992021-07-26 16:03:14 +0200418 // If the network list changes, we re-assign `networks_` to the merged list
honghaizdb8cf502015-12-21 13:08:46 -0800419 // and re-sort it.
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000420 if (*changed) {
honghaizdb8cf502015-12-21 13:08:46 -0800421 networks_ = merged_list;
422 // Reset the active states of all networks.
423 for (const auto& kv : networks_map_) {
Niels Möllerd959f3a2022-04-19 11:29:19 +0200424 const std::unique_ptr<Network>& network = kv.second;
Artem Titov96e3b992021-07-26 16:03:14 +0200425 // If `network` is in the newly generated `networks_`, it is active.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200426 bool found = absl::c_linear_search(networks_, network.get());
honghaize3c6c822016-02-17 13:00:28 -0800427 network->set_active(found);
honghaizdb8cf502015-12-21 13:08:46 -0800428 }
Steve Anton2acd1632019-03-25 13:48:30 -0700429 absl::c_sort(networks_, SortNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000430 // Now network interfaces are sorted, we should set the preference value
431 // for each of the interfaces we are planning to use.
432 // Preference order of network interfaces might have changed from previous
433 // sorting due to addition of higher preference network interface.
434 // Since we have already sorted the network interfaces based on our
435 // requirements, we will just assign a preference value starting with 127,
436 // in decreasing order.
437 int pref = kHighestNetworkPreference;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000438 for (Network* network : networks_) {
439 network->set_preference(pref);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000440 if (pref > 0) {
441 --pref;
442 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100443 RTC_LOG(LS_ERROR) << "Too many network interfaces to handle!";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000444 break;
445 }
446 }
447 }
448}
449
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800450void NetworkManagerBase::set_default_local_addresses(const IPAddress& ipv4,
451 const IPAddress& ipv6) {
452 if (ipv4.family() == AF_INET) {
453 default_local_ipv4_address_ = ipv4;
454 }
455 if (ipv6.family() == AF_INET6) {
456 default_local_ipv6_address_ = ipv6;
457 }
458}
459
460bool NetworkManagerBase::GetDefaultLocalAddress(int family,
461 IPAddress* ipaddr) const {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800462 if (family == AF_INET && !default_local_ipv4_address_.IsNil()) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800463 *ipaddr = default_local_ipv4_address_;
464 return true;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800465 } else if (family == AF_INET6 && !default_local_ipv6_address_.IsNil()) {
honghaizaf83fe62016-04-18 14:50:44 -0700466 Network* ipv6_network = GetNetworkFromAddress(default_local_ipv6_address_);
467 if (ipv6_network) {
468 // If the default ipv6 network's BestIP is different than
469 // default_local_ipv6_address_, use it instead.
470 // This is to prevent potential IP address leakage. See WebRTC bug 5376.
471 *ipaddr = ipv6_network->GetBestIP();
472 } else {
473 *ipaddr = default_local_ipv6_address_;
474 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800475 return true;
476 }
477 return false;
478}
479
honghaizaf83fe62016-04-18 14:50:44 -0700480Network* NetworkManagerBase::GetNetworkFromAddress(
481 const rtc::IPAddress& ip) const {
482 for (Network* network : networks_) {
483 const auto& ips = network->GetIPs();
Steve Anton2acd1632019-03-25 13:48:30 -0700484 if (absl::c_any_of(ips, [&](const InterfaceAddress& existing_ip) {
485 return ip == static_cast<rtc::IPAddress>(existing_ip);
486 })) {
honghaizaf83fe62016-04-18 14:50:44 -0700487 return network;
488 }
489 }
490 return nullptr;
491}
492
Jonas Orelandac554eb2021-08-27 09:43:38 +0200493bool NetworkManagerBase::IsVpnMacAddress(
494 rtc::ArrayView<const uint8_t> address) {
495 if (address.data() == nullptr && address.size() == 0) {
496 return false;
497 }
498 for (const auto& vpn : kVpns) {
499 if (sizeof(vpn) == address.size() &&
500 memcmp(vpn, address.data(), address.size()) == 0) {
501 return true;
502 }
503 }
504 return false;
505}
506
Niels Mölleraa373162021-09-28 16:09:07 +0200507BasicNetworkManager::BasicNetworkManager(
508 NetworkMonitorFactory* network_monitor_factory,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200509 SocketFactory* socket_factory,
Jonas Orelande62c2f22022-03-29 11:04:48 +0200510 const webrtc::FieldTrialsView* field_trials)
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200511 : field_trials_(field_trials),
512 network_monitor_factory_(network_monitor_factory),
Niels Mölleraa373162021-09-28 16:09:07 +0200513 socket_factory_(socket_factory),
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100514 allow_mac_based_ipv6_(
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200515 field_trials_->IsEnabled("WebRTC-AllowMACBasedIPv6")),
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000516 bind_using_ifname_(
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200517 !field_trials_->IsDisabled("WebRTC-BindUsingInterfaceName")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000518
Niels Möller27c14522022-02-07 16:44:21 +0100519BasicNetworkManager::~BasicNetworkManager() {
520 if (task_safety_flag_) {
521 task_safety_flag_->SetNotAlive();
522 }
523}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000524
honghaiz023f3ef2015-10-19 09:39:32 -0700525void BasicNetworkManager::OnNetworksChanged() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700526 RTC_DCHECK_RUN_ON(thread_);
Mirko Bonadei675513b2017-11-09 11:09:25 +0100527 RTC_LOG(LS_INFO) << "Network change was observed";
honghaiz023f3ef2015-10-19 09:39:32 -0700528 UpdateNetworksOnce();
529}
530
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000531#if defined(__native_client__)
532
Niels Möllerd959f3a2022-04-19 11:29:19 +0200533bool BasicNetworkManager::CreateNetworks(
534 bool include_ignored,
535 std::vector<std::unique_ptr<Network>>* networks) const {
Artem Titovd3251962021-11-15 16:57:07 +0100536 RTC_DCHECK_NOTREACHED();
Mirko Bonadei675513b2017-11-09 11:09:25 +0100537 RTC_LOG(LS_WARNING) << "BasicNetworkManager doesn't work on NaCl yet";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000538 return false;
539}
540
541#elif defined(WEBRTC_POSIX)
Niels Möllerd959f3a2022-04-19 11:29:19 +0200542void BasicNetworkManager::ConvertIfAddrs(
543 struct ifaddrs* interfaces,
544 IfAddrsConverter* ifaddrs_converter,
545 bool include_ignored,
546 std::vector<std::unique_ptr<Network>>* networks) const {
547 std::map<std::string, Network*> current_networks;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800548
deadbeef37f5ecf2017-02-27 14:06:41 -0800549 for (struct ifaddrs* cursor = interfaces; cursor != nullptr;
550 cursor = cursor->ifa_next) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000551 IPAddress prefix;
552 IPAddress mask;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800553 InterfaceAddress ip;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000554 int scope_id = 0;
555
556 // Some interfaces may not have address assigned.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800557 if (!cursor->ifa_addr || !cursor->ifa_netmask) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000558 continue;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800559 }
560 // Skip ones which are down.
561 if (!(cursor->ifa_flags & IFF_RUNNING)) {
562 continue;
563 }
564 // Skip unknown family.
565 if (cursor->ifa_addr->sa_family != AF_INET &&
566 cursor->ifa_addr->sa_family != AF_INET6) {
567 continue;
568 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800569 // Convert to InterfaceAddress.
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200570 // TODO(webrtc:13114): Convert ConvertIfAddrs to use rtc::Netmask.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800571 if (!ifaddrs_converter->ConvertIfAddrsToIPAddress(cursor, &ip, &mask)) {
572 continue;
573 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000574
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800575 // Special case for IPv6 address.
576 if (cursor->ifa_addr->sa_family == AF_INET6) {
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100577 if (IsIgnoredIPv6(allow_mac_based_ipv6_, ip)) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000578 continue;
579 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800580 scope_id =
581 reinterpret_cast<sockaddr_in6*>(cursor->ifa_addr)->sin6_scope_id;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000582 }
583
Honghai Zhang351d77b2016-05-20 15:08:29 -0700584 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700585 AdapterType vpn_underlying_adapter_type = ADAPTER_TYPE_UNKNOWN;
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200586 NetworkPreference network_preference = NetworkPreference::NEUTRAL;
Honghai Zhang351d77b2016-05-20 15:08:29 -0700587 if (cursor->ifa_flags & IFF_LOOPBACK) {
588 adapter_type = ADAPTER_TYPE_LOOPBACK;
589 } else {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800590 // If there is a network_monitor, use it to get the adapter type.
591 // Otherwise, get the adapter type based on a few name matching rules.
592 if (network_monitor_) {
593 adapter_type = network_monitor_->GetAdapterType(cursor->ifa_name);
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200594 network_preference =
595 network_monitor_->GetNetworkPreference(cursor->ifa_name);
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800596 }
597 if (adapter_type == ADAPTER_TYPE_UNKNOWN) {
598 adapter_type = GetAdapterTypeFromName(cursor->ifa_name);
599 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700600 }
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700601
602 if (adapter_type == ADAPTER_TYPE_VPN && network_monitor_) {
603 vpn_underlying_adapter_type =
604 network_monitor_->GetVpnUnderlyingAdapterType(cursor->ifa_name);
605 }
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200606
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000607 int prefix_length = CountIPMaskBits(mask);
608 prefix = TruncateIP(ip, prefix_length);
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200609
610 if (adapter_type != ADAPTER_TYPE_VPN &&
611 IsConfiguredVpn(prefix, prefix_length)) {
612 vpn_underlying_adapter_type = adapter_type;
613 adapter_type = ADAPTER_TYPE_VPN;
614 }
615
Yves Gerey665174f2018-06-19 15:03:05 +0200616 std::string key =
617 MakeNetworkKey(std::string(cursor->ifa_name), prefix, prefix_length);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700618 auto iter = current_networks.find(key);
619 if (iter == current_networks.end()) {
Noah Richards2e266e92015-04-07 11:51:56 -0700620 // TODO(phoglund): Need to recognize other types as well.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200621 auto network =
622 std::make_unique<Network>(cursor->ifa_name, cursor->ifa_name, prefix,
623 prefix_length, adapter_type);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800624 network->set_default_local_address_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000625 network->set_scope_id(scope_id);
626 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000627 network->set_ignored(IsIgnoredNetwork(*network));
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700628 network->set_underlying_type_for_vpn(vpn_underlying_adapter_type);
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200629 network->set_network_preference(network_preference);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000630 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800631 current_networks[key] = network.get();
Niels Möllerd959f3a2022-04-19 11:29:19 +0200632 networks->push_back(std::move(network));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000633 }
634 } else {
Honghai Zhang351d77b2016-05-20 15:08:29 -0700635 Network* existing_network = iter->second;
636 existing_network->AddIP(ip);
637 if (adapter_type != ADAPTER_TYPE_UNKNOWN) {
638 existing_network->set_type(adapter_type);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700639 existing_network->set_underlying_type_for_vpn(
640 vpn_underlying_adapter_type);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700641 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200642 existing_network->set_network_preference(network_preference);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000643 }
644 }
645}
646
Niels Möllerd959f3a2022-04-19 11:29:19 +0200647bool BasicNetworkManager::CreateNetworks(
648 bool include_ignored,
649 std::vector<std::unique_ptr<Network>>* networks) const {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000650 struct ifaddrs* interfaces;
651 int error = getifaddrs(&interfaces);
652 if (error != 0) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000653 RTC_LOG_ERR(LS_ERROR) << "getifaddrs failed to gather interface data: "
654 << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000655 return false;
656 }
657
jbauch555604a2016-04-26 03:13:22 -0700658 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(CreateIfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800659 ConvertIfAddrs(interfaces, ifaddrs_converter.get(), include_ignored,
660 networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000661
662 freeifaddrs(interfaces);
663 return true;
664}
665
666#elif defined(WEBRTC_WIN)
667
668unsigned int GetPrefix(PIP_ADAPTER_PREFIX prefixlist,
Yves Gerey665174f2018-06-19 15:03:05 +0200669 const IPAddress& ip,
670 IPAddress* prefix) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000671 IPAddress current_prefix;
672 IPAddress best_prefix;
673 unsigned int best_length = 0;
674 while (prefixlist) {
675 // Look for the longest matching prefix in the prefixlist.
deadbeef37f5ecf2017-02-27 14:06:41 -0800676 if (prefixlist->Address.lpSockaddr == nullptr ||
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000677 prefixlist->Address.lpSockaddr->sa_family != ip.family()) {
678 prefixlist = prefixlist->Next;
679 continue;
680 }
681 switch (prefixlist->Address.lpSockaddr->sa_family) {
682 case AF_INET: {
683 sockaddr_in* v4_addr =
684 reinterpret_cast<sockaddr_in*>(prefixlist->Address.lpSockaddr);
685 current_prefix = IPAddress(v4_addr->sin_addr);
686 break;
687 }
688 case AF_INET6: {
Yves Gerey665174f2018-06-19 15:03:05 +0200689 sockaddr_in6* v6_addr =
690 reinterpret_cast<sockaddr_in6*>(prefixlist->Address.lpSockaddr);
691 current_prefix = IPAddress(v6_addr->sin6_addr);
692 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000693 }
694 default: {
695 prefixlist = prefixlist->Next;
696 continue;
697 }
698 }
699 if (TruncateIP(ip, prefixlist->PrefixLength) == current_prefix &&
700 prefixlist->PrefixLength > best_length) {
701 best_prefix = current_prefix;
702 best_length = prefixlist->PrefixLength;
703 }
704 prefixlist = prefixlist->Next;
705 }
706 *prefix = best_prefix;
707 return best_length;
708}
709
Niels Möllerd959f3a2022-04-19 11:29:19 +0200710bool BasicNetworkManager::CreateNetworks(
711 bool include_ignored,
712 std::vector<std::unique_ptr<Network>>* networks) const {
713 std::map<std::string, Network*> current_networks;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000714 // MSDN recommends a 15KB buffer for the first try at GetAdaptersAddresses.
715 size_t buffer_size = 16384;
jbauch555604a2016-04-26 03:13:22 -0700716 std::unique_ptr<char[]> adapter_info(new char[buffer_size]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000717 PIP_ADAPTER_ADDRESSES adapter_addrs =
718 reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
719 int adapter_flags = (GAA_FLAG_SKIP_DNS_SERVER | GAA_FLAG_SKIP_ANYCAST |
720 GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_INCLUDE_PREFIX);
721 int ret = 0;
722 do {
723 adapter_info.reset(new char[buffer_size]);
724 adapter_addrs = reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
Yves Gerey665174f2018-06-19 15:03:05 +0200725 ret = GetAdaptersAddresses(AF_UNSPEC, adapter_flags, 0, adapter_addrs,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000726 reinterpret_cast<PULONG>(&buffer_size));
727 } while (ret == ERROR_BUFFER_OVERFLOW);
728 if (ret != ERROR_SUCCESS) {
729 return false;
730 }
731 int count = 0;
732 while (adapter_addrs) {
733 if (adapter_addrs->OperStatus == IfOperStatusUp) {
734 PIP_ADAPTER_UNICAST_ADDRESS address = adapter_addrs->FirstUnicastAddress;
735 PIP_ADAPTER_PREFIX prefixlist = adapter_addrs->FirstPrefix;
Hans Wennborg597e03f2022-04-01 10:23:25 +0200736 std::string description = ToUtf8(adapter_addrs->Description,
737 wcslen(adapter_addrs->Description));
738
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000739 for (; address; address = address->Next) {
Hans Wennborg597e03f2022-04-01 10:23:25 +0200740 std::string name = rtc::ToString(count);
741#if !defined(NDEBUG)
742 name = ToUtf8(adapter_addrs->FriendlyName,
743 wcslen(adapter_addrs->FriendlyName));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000744#endif
745
746 IPAddress ip;
747 int scope_id = 0;
jbauch555604a2016-04-26 03:13:22 -0700748 std::unique_ptr<Network> network;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000749 switch (address->Address.lpSockaddr->sa_family) {
750 case AF_INET: {
751 sockaddr_in* v4_addr =
752 reinterpret_cast<sockaddr_in*>(address->Address.lpSockaddr);
753 ip = IPAddress(v4_addr->sin_addr);
754 break;
755 }
756 case AF_INET6: {
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100757 sockaddr_in6* v6_addr =
758 reinterpret_cast<sockaddr_in6*>(address->Address.lpSockaddr);
759 scope_id = v6_addr->sin6_scope_id;
760 ip = IPAddress(v6_addr->sin6_addr);
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000761
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100762 if (IsIgnoredIPv6(allow_mac_based_ipv6_, InterfaceAddress(ip))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000763 continue;
764 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100765
766 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000767 }
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800768 default: {
769 continue;
770 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000771 }
772
773 IPAddress prefix;
774 int prefix_length = GetPrefix(prefixlist, ip, &prefix);
775 std::string key = MakeNetworkKey(name, prefix, prefix_length);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000776 auto existing_network = current_networks.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000777 if (existing_network == current_networks.end()) {
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000778 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Yura Yaroshevich0ce868c2018-05-15 11:15:32 +0300779 switch (adapter_addrs->IfType) {
780 case IF_TYPE_SOFTWARE_LOOPBACK:
781 adapter_type = ADAPTER_TYPE_LOOPBACK;
782 break;
783 case IF_TYPE_ETHERNET_CSMACD:
784 case IF_TYPE_ETHERNET_3MBIT:
785 case IF_TYPE_IEEE80212:
786 case IF_TYPE_FASTETHER:
787 case IF_TYPE_FASTETHER_FX:
788 case IF_TYPE_GIGABITETHERNET:
789 adapter_type = ADAPTER_TYPE_ETHERNET;
790 break;
791 case IF_TYPE_IEEE80211:
792 adapter_type = ADAPTER_TYPE_WIFI;
793 break;
794 case IF_TYPE_WWANPP:
795 case IF_TYPE_WWANPP2:
796 adapter_type = ADAPTER_TYPE_CELLULAR;
797 break;
798 default:
799 // TODO(phoglund): Need to recognize other types as well.
800 adapter_type = ADAPTER_TYPE_UNKNOWN;
801 break;
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000802 }
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200803 auto vpn_underlying_adapter_type = ADAPTER_TYPE_UNKNOWN;
804 if (adapter_type != ADAPTER_TYPE_VPN &&
805 IsConfiguredVpn(prefix, prefix_length)) {
806 vpn_underlying_adapter_type = adapter_type;
807 adapter_type = ADAPTER_TYPE_VPN;
808 }
Jonas Orelandac554eb2021-08-27 09:43:38 +0200809 if (adapter_type != ADAPTER_TYPE_VPN &&
810 IsVpnMacAddress(rtc::ArrayView<const uint8_t>(
811 reinterpret_cast<const uint8_t*>(
812 adapter_addrs->PhysicalAddress),
813 adapter_addrs->PhysicalAddressLength))) {
814 vpn_underlying_adapter_type = adapter_type;
815 adapter_type = ADAPTER_TYPE_VPN;
816 }
817
Niels Möllerd959f3a2022-04-19 11:29:19 +0200818 auto network = std::make_unique<Network>(name, description, prefix,
819 prefix_length, adapter_type);
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200820 network->set_underlying_type_for_vpn(vpn_underlying_adapter_type);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800821 network->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800822 network->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000823 network->set_scope_id(scope_id);
824 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000825 bool ignored = IsIgnoredNetwork(*network);
826 network->set_ignored(ignored);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000827 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800828 current_networks[key] = network.get();
Niels Möllerd959f3a2022-04-19 11:29:19 +0200829 networks->push_back(std::move(network));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000830 }
831 } else {
832 (*existing_network).second->AddIP(ip);
833 }
834 }
835 // Count is per-adapter - all 'Networks' created from the same
836 // adapter need to have the same name.
837 ++count;
838 }
839 adapter_addrs = adapter_addrs->Next;
840 }
841 return true;
842}
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000843#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000844
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000845bool BasicNetworkManager::IsIgnoredNetwork(const Network& network) const {
846 // Ignore networks on the explicit ignore list.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000847 for (const std::string& ignored_name : network_ignore_list_) {
848 if (network.name() == ignored_name) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000849 return true;
850 }
851 }
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000852
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000853#if defined(WEBRTC_POSIX)
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000854 // Filter out VMware/VirtualBox interfaces, typically named vmnet1,
855 // vmnet8, or vboxnet0.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000856 if (strncmp(network.name().c_str(), "vmnet", 5) == 0 ||
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000857 strncmp(network.name().c_str(), "vnic", 4) == 0 ||
858 strncmp(network.name().c_str(), "vboxnet", 7) == 0) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000859 return true;
860 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000861#elif defined(WEBRTC_WIN)
862 // Ignore any HOST side vmware adapters with a description like:
863 // VMware Virtual Ethernet Adapter for VMnet1
864 // but don't ignore any GUEST side adapters with a description like:
865 // VMware Accelerated AMD PCNet Adapter #2
deadbeef37f5ecf2017-02-27 14:06:41 -0800866 if (strstr(network.description().c_str(), "VMnet") != nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000867 return true;
868 }
869#endif
870
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700871 if (network_monitor_ &&
872 !network_monitor_->IsAdapterAvailable(network.name())) {
873 return true;
874 }
875
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000876 // Ignore any networks with a 0.x.y.z IP
877 if (network.prefix().family() == AF_INET) {
878 return (network.prefix().v4AddressAsHostOrderInteger() < 0x01000000);
879 }
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000880
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000881 return false;
882}
883
884void BasicNetworkManager::StartUpdating() {
885 thread_ = Thread::Current();
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700886 // Redundant but necessary for thread annotations.
887 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000888 if (start_count_) {
889 // If network interfaces are already discovered and signal is sent,
890 // we should trigger network signal immediately for the new clients
891 // to start allocating ports.
892 if (sent_first_update_)
Niels Möller27c14522022-02-07 16:44:21 +0100893 thread_->PostTask(ToQueuedTask(task_safety_flag_, [this] {
894 RTC_DCHECK_RUN_ON(thread_);
895 SignalNetworksChanged();
896 }));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000897 } else {
Niels Möller27c14522022-02-07 16:44:21 +0100898 RTC_DCHECK(task_safety_flag_ == nullptr);
899 task_safety_flag_ = webrtc::PendingTaskSafetyFlag::Create();
900 thread_->PostTask(ToQueuedTask(task_safety_flag_, [this] {
901 RTC_DCHECK_RUN_ON(thread_);
902 UpdateNetworksContinually();
903 }));
honghaiz023f3ef2015-10-19 09:39:32 -0700904 StartNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000905 }
906 ++start_count_;
907}
908
909void BasicNetworkManager::StopUpdating() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700910 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000911 if (!start_count_)
912 return;
913
914 --start_count_;
915 if (!start_count_) {
Niels Möller27c14522022-02-07 16:44:21 +0100916 task_safety_flag_->SetNotAlive();
917 task_safety_flag_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000918 sent_first_update_ = false;
honghaiz023f3ef2015-10-19 09:39:32 -0700919 StopNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000920 }
921}
922
honghaiz023f3ef2015-10-19 09:39:32 -0700923void BasicNetworkManager::StartNetworkMonitor() {
Taylor Brandstetter07fc24d2020-08-12 01:58:10 +0000924 if (network_monitor_factory_ == nullptr) {
925 return;
honghaiz023f3ef2015-10-19 09:39:32 -0700926 }
honghaiz023f3ef2015-10-19 09:39:32 -0700927 if (!network_monitor_) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200928 network_monitor_.reset(
929 network_monitor_factory_->CreateNetworkMonitor(*field_trials_));
honghaizcec0a082016-01-15 14:49:09 -0800930 if (!network_monitor_) {
931 return;
932 }
Mirko Bonadei37077932021-07-27 17:00:58 +0200933 network_monitor_->SetNetworksChangedCallback(
934 [this]() { OnNetworksChanged(); });
honghaiz023f3ef2015-10-19 09:39:32 -0700935 }
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000936
937 if (network_monitor_->SupportsBindSocketToNetwork()) {
938 // Set NetworkBinder on SocketServer so that
939 // PhysicalSocket::Bind will call
940 // BasicNetworkManager::BindSocketToNetwork(), (that will lookup interface
941 // name and then call network_monitor_->BindSocketToNetwork()).
942 thread_->socketserver()->set_network_binder(this);
943 }
944
honghaiz023f3ef2015-10-19 09:39:32 -0700945 network_monitor_->Start();
946}
947
948void BasicNetworkManager::StopNetworkMonitor() {
949 if (!network_monitor_) {
950 return;
951 }
952 network_monitor_->Stop();
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000953
954 if (network_monitor_->SupportsBindSocketToNetwork()) {
955 // Reset NetworkBinder on SocketServer.
956 if (thread_->socketserver()->network_binder() == this) {
957 thread_->socketserver()->set_network_binder(nullptr);
958 }
959 }
honghaiz023f3ef2015-10-19 09:39:32 -0700960}
961
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800962IPAddress BasicNetworkManager::QueryDefaultLocalAddress(int family) const {
nisseede5da42017-01-12 05:15:36 -0800963 RTC_DCHECK(family == AF_INET || family == AF_INET6);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800964
Niels Mölleraa373162021-09-28 16:09:07 +0200965 // TODO(bugs.webrtc.org/13145): Delete support for null `socket_factory_`,
966 // require socket factory to be provided to constructor.
967 SocketFactory* socket_factory = socket_factory_;
968 if (!socket_factory) {
969 socket_factory = thread_->socketserver();
970 }
971 RTC_DCHECK(socket_factory);
972
Niels Möllerd0b88792021-08-12 10:32:30 +0200973 std::unique_ptr<Socket> socket(
Niels Mölleraa373162021-09-28 16:09:07 +0200974 socket_factory->CreateSocket(family, SOCK_DGRAM));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800975 if (!socket) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000976 RTC_LOG_ERR(LS_ERROR) << "Socket creation failed";
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800977 return IPAddress();
978 }
979
guoweis56271ed2016-01-15 14:45:06 -0800980 if (socket->Connect(SocketAddress(
981 family == AF_INET ? kPublicIPv4Host : kPublicIPv6Host, kPublicPort)) <
982 0) {
Yves Gerey665174f2018-06-19 15:03:05 +0200983 if (socket->GetError() != ENETUNREACH &&
984 socket->GetError() != EHOSTUNREACH) {
skvlad75024012016-09-29 12:59:35 -0700985 // Ignore the expected case of "host/net unreachable" - which happens if
986 // the network is V4- or V6-only.
Mirko Bonadei675513b2017-11-09 11:09:25 +0100987 RTC_LOG(LS_INFO) << "Connect failed with " << socket->GetError();
skvlad75024012016-09-29 12:59:35 -0700988 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800989 return IPAddress();
990 }
991 return socket->GetLocalAddress().ipaddr();
992}
993
honghaiz023f3ef2015-10-19 09:39:32 -0700994void BasicNetworkManager::UpdateNetworksOnce() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000995 if (!start_count_)
996 return;
997
Niels Möllerd959f3a2022-04-19 11:29:19 +0200998 std::vector<std::unique_ptr<Network>> list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000999 if (!CreateNetworks(false, &list)) {
1000 SignalError();
1001 } else {
1002 bool changed;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001003 NetworkManager::Stats stats;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001004 MergeNetworkList(std::move(list), &changed, &stats);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001005 set_default_local_addresses(QueryDefaultLocalAddress(AF_INET),
1006 QueryDefaultLocalAddress(AF_INET6));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001007 if (changed || !sent_first_update_) {
1008 SignalNetworksChanged();
1009 sent_first_update_ = true;
1010 }
1011 }
honghaiz023f3ef2015-10-19 09:39:32 -07001012}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001013
honghaiz023f3ef2015-10-19 09:39:32 -07001014void BasicNetworkManager::UpdateNetworksContinually() {
1015 UpdateNetworksOnce();
Niels Möller27c14522022-02-07 16:44:21 +01001016 thread_->PostDelayedTask(ToQueuedTask(task_safety_flag_,
1017 [this] {
1018 RTC_DCHECK_RUN_ON(thread_);
1019 UpdateNetworksContinually();
1020 }),
1021 kNetworksUpdateIntervalMs);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001022}
1023
honghaizdb8cf502015-12-21 13:08:46 -08001024void BasicNetworkManager::DumpNetworks() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001025 RTC_DCHECK_RUN_ON(thread_);
Niels Möller22211442022-04-07 11:43:28 +02001026 std::vector<const Network*> list = GetNetworks();
Mirko Bonadei675513b2017-11-09 11:09:25 +01001027 RTC_LOG(LS_INFO) << "NetworkManager detected " << list.size() << " networks:";
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001028 for (const Network* network : list) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001029 RTC_LOG(LS_INFO) << network->ToString() << ": " << network->description()
1030 << ", active ? " << network->active()
1031 << ((network->ignored()) ? ", Ignored" : "");
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001032 }
1033}
1034
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001035NetworkBindingResult BasicNetworkManager::BindSocketToNetwork(
1036 int socket_fd,
1037 const IPAddress& address) {
1038 RTC_DCHECK_RUN_ON(thread_);
1039 std::string if_name;
1040 if (bind_using_ifname_) {
1041 Network* net = GetNetworkFromAddress(address);
1042 if (net != nullptr) {
1043 if_name = net->name();
1044 }
1045 }
1046 return network_monitor_->BindSocketToNetwork(socket_fd, address, if_name);
1047}
1048
Ali Tofigh7fa90572022-03-17 15:47:49 +01001049Network::Network(absl::string_view name,
1050 absl::string_view desc,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001051 const IPAddress& prefix,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001052 int prefix_length,
1053 AdapterType type)
1054 : name_(name),
1055 description_(desc),
1056 prefix_(prefix),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001057 prefix_length_(prefix_length),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001058 key_(MakeNetworkKey(name, prefix, prefix_length)),
1059 scope_id_(0),
1060 ignored_(false),
1061 type_(type),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001062 preference_(0) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001063
Steve Anton9de3aac2017-10-24 10:08:26 -07001064Network::Network(const Network&) = default;
1065
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001066Network::~Network() = default;
1067
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001068// Sets the addresses of this network. Returns true if the address set changed.
1069// Change detection is short circuited if the changed argument is true.
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001070bool Network::SetIPs(const std::vector<InterfaceAddress>& ips, bool changed) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001071 // Detect changes with a nested loop; n-squared but we expect on the order
1072 // of 2-3 addresses per network.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001073 changed = changed || ips.size() != ips_.size();
1074 if (!changed) {
1075 for (const InterfaceAddress& ip : ips) {
Steve Anton2acd1632019-03-25 13:48:30 -07001076 if (!absl::c_linear_search(ips_, ip)) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001077 changed = true;
1078 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001079 }
1080 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001081 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001082
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001083 ips_ = ips;
1084 return changed;
1085}
1086
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001087// Select the best IP address to use from this Network.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001088IPAddress Network::GetBestIP() const {
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001089 if (ips_.size() == 0) {
1090 return IPAddress();
1091 }
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001092
1093 if (prefix_.family() == AF_INET) {
1094 return static_cast<IPAddress>(ips_.at(0));
1095 }
1096
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001097 InterfaceAddress selected_ip, ula_ip;
1098
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001099 for (const InterfaceAddress& ip : ips_) {
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001100 // Ignore any address which has been deprecated already.
1101 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED)
1102 continue;
1103
1104 // ULA address should only be returned when we have no other
1105 // global IP.
1106 if (IPIsULA(static_cast<const IPAddress&>(ip))) {
1107 ula_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001108 continue;
1109 }
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001110 selected_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001111
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001112 // Search could stop once a temporary non-deprecated one is found.
1113 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_TEMPORARY)
1114 break;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001115 }
1116
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001117 // No proper global IPv6 address found, use ULA instead.
1118 if (IPIsUnspec(selected_ip) && !IPIsUnspec(ula_ip)) {
1119 selected_ip = ula_ip;
1120 }
1121
1122 return static_cast<IPAddress>(selected_ip);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001123}
1124
Qingsi Wang5ae259e2019-02-13 15:46:07 -08001125webrtc::MdnsResponderInterface* Network::GetMdnsResponder() const {
1126 if (mdns_responder_provider_ == nullptr) {
1127 return nullptr;
1128 }
1129 return mdns_responder_provider_->GetMdnsResponder();
1130}
1131
Jonas Orelande62c2f22022-03-29 11:04:48 +02001132uint16_t Network::GetCost(const webrtc::FieldTrialsView* field_trials) const {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001133 return GetCost(
Jonas Orelande62c2f22022-03-29 11:04:48 +02001134 *webrtc::AlwaysValidPointer<const webrtc::FieldTrialsView,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001135 webrtc::FieldTrialBasedConfig>(field_trials));
1136}
1137
Jonas Orelande62c2f22022-03-29 11:04:48 +02001138uint16_t Network::GetCost(const webrtc::FieldTrialsView& field_trials) const {
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001139 AdapterType type = IsVpn() ? underlying_type_for_vpn_ : type_;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001140 const bool use_differentiated_cellular_costs =
1141 field_trials.IsEnabled("WebRTC-UseDifferentiatedCellularCosts");
1142 const bool add_network_cost_to_vpn =
1143 field_trials.IsEnabled("WebRTC-AddNetworkCostToVpn");
Jonas Orelandb477fc72021-08-23 12:16:33 +02001144 return ComputeNetworkCostByType(type, IsVpn(),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001145 use_differentiated_cellular_costs,
1146 add_network_cost_to_vpn);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001147}
1148
Jonas Oreland30019052022-01-28 14:11:44 +01001149// This is the inverse of ComputeNetworkCostByType().
1150std::pair<rtc::AdapterType, bool /* vpn */>
1151Network::GuessAdapterFromNetworkCost(int network_cost) {
1152 switch (network_cost) {
1153 case kNetworkCostMin:
1154 return {rtc::ADAPTER_TYPE_ETHERNET, false};
1155 case kNetworkCostMin + kNetworkCostVpn:
1156 return {rtc::ADAPTER_TYPE_ETHERNET, true};
1157 case kNetworkCostLow:
1158 return {rtc::ADAPTER_TYPE_WIFI, false};
1159 case kNetworkCostLow + kNetworkCostVpn:
1160 return {rtc::ADAPTER_TYPE_WIFI, true};
1161 case kNetworkCostCellular:
1162 return {rtc::ADAPTER_TYPE_CELLULAR, false};
1163 case kNetworkCostCellular + kNetworkCostVpn:
1164 return {rtc::ADAPTER_TYPE_CELLULAR, true};
1165 case kNetworkCostCellular2G:
1166 return {rtc::ADAPTER_TYPE_CELLULAR_2G, false};
1167 case kNetworkCostCellular2G + kNetworkCostVpn:
1168 return {rtc::ADAPTER_TYPE_CELLULAR_2G, true};
1169 case kNetworkCostCellular3G:
1170 return {rtc::ADAPTER_TYPE_CELLULAR_3G, false};
1171 case kNetworkCostCellular3G + kNetworkCostVpn:
1172 return {rtc::ADAPTER_TYPE_CELLULAR_3G, true};
1173 case kNetworkCostCellular4G:
1174 return {rtc::ADAPTER_TYPE_CELLULAR_4G, false};
1175 case kNetworkCostCellular4G + kNetworkCostVpn:
1176 return {rtc::ADAPTER_TYPE_CELLULAR_4G, true};
1177 case kNetworkCostCellular5G:
1178 return {rtc::ADAPTER_TYPE_CELLULAR_5G, false};
1179 case kNetworkCostCellular5G + kNetworkCostVpn:
1180 return {rtc::ADAPTER_TYPE_CELLULAR_5G, true};
1181 case kNetworkCostUnknown:
1182 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1183 case kNetworkCostUnknown + kNetworkCostVpn:
1184 return {rtc::ADAPTER_TYPE_UNKNOWN, true};
1185 case kNetworkCostMax:
1186 return {rtc::ADAPTER_TYPE_ANY, false};
1187 case kNetworkCostMax + kNetworkCostVpn:
1188 return {rtc::ADAPTER_TYPE_ANY, true};
1189 }
1190 RTC_LOG(LS_VERBOSE) << "Unknown network cost: " << network_cost;
1191 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1192}
1193
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001194std::string Network::ToString() const {
Jonas Olsson366a50c2018-09-06 13:41:30 +02001195 rtc::StringBuilder ss;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001196 // Print out the first space-terminated token of the network desc, plus
1197 // the IP address.
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001198 ss << "Net[" << description_.substr(0, description_.find(' ')) << ":"
1199 << prefix_.ToSensitiveString() << "/" << prefix_length_ << ":"
1200 << AdapterTypeToString(type_);
1201 if (IsVpn()) {
1202 ss << "/" << AdapterTypeToString(underlying_type_for_vpn_);
1203 }
Qingsi Wang10a0e512018-05-16 13:37:03 -07001204 ss << ":id=" << id_ << "]";
Jonas Olsson84df1c72018-09-14 16:59:32 +02001205 return ss.Release();
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001206}
1207
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001208void BasicNetworkManager::set_vpn_list(const std::vector<NetworkMask>& vpn) {
1209 if (thread_ == nullptr) {
1210 vpn_ = vpn;
1211 } else {
1212 thread_->Invoke<void>(RTC_FROM_HERE, [this, vpn] { vpn_ = vpn; });
1213 }
1214}
1215
1216bool BasicNetworkManager::IsConfiguredVpn(IPAddress prefix,
1217 int prefix_length) const {
1218 RTC_DCHECK_RUN_ON(thread_);
1219 for (const auto& vpn : vpn_) {
1220 if (prefix_length >= vpn.prefix_length()) {
1221 auto copy = TruncateIP(prefix, vpn.prefix_length());
1222 if (copy == vpn.address()) {
1223 return true;
1224 }
1225 }
1226 }
1227 return false;
1228}
1229
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001230} // namespace rtc