blob: 295d39c5d97b701f88075bf71afb899d8111d137 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
13#if defined(WEBRTC_POSIX)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000014#include <net/if.h>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000015#endif // WEBRTC_POSIX
16
17#if defined(WEBRTC_WIN)
Mirko Bonadei01914412018-03-23 16:30:58 +010018#include <iphlpapi.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020019
Yves Gerey665174f2018-06-19 15:03:05 +020020#include "rtc_base/win32.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080021#elif !defined(__native_client__)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020022#include "rtc_base/ifaddrs_converter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000023#endif
24
jbauch555604a2016-04-26 03:13:22 -070025#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000026
Steve Anton2acd1632019-03-25 13:48:30 -070027#include "absl/algorithm/container.h"
28#include "absl/strings/match.h"
29#include "absl/strings/string_view.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020030#include "rtc_base/checks.h"
31#include "rtc_base/logging.h"
Steve Anton10542f22019-01-11 09:11:00 -080032#include "rtc_base/network_monitor.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020033#include "rtc_base/socket.h" // includes something that makes windows happy
Steve Anton10542f22019-01-11 09:11:00 -080034#include "rtc_base/string_encode.h"
35#include "rtc_base/string_utils.h"
Jonas Olsson366a50c2018-09-06 13:41:30 +020036#include "rtc_base/strings/string_builder.h"
Niels Möller27c14522022-02-07 16:44:21 +010037#include "rtc_base/task_utils/to_queued_task.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020038#include "rtc_base/thread.h"
Jonas Oreland2105d642020-05-13 10:15:34 +020039#include "system_wrappers/include/field_trial.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000040
41namespace rtc {
42namespace {
43
Jonas Orelandac554eb2021-08-27 09:43:38 +020044// List of MAC addresses of known VPN (for windows).
45constexpr uint8_t kVpns[2][6] = {
46 // Cisco AnyConnect.
47 {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0},
48 // GlobalProtect Virtual Ethernet.
49 {0x2, 0x50, 0x41, 0x0, 0x0, 0x1},
50};
51
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000052// Fetch list of networks every two seconds.
53const int kNetworksUpdateIntervalMs = 2000;
54
55const int kHighestNetworkPreference = 127;
56
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000057typedef struct {
58 Network* net;
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +000059 std::vector<InterfaceAddress> ips;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000060} AddressList;
61
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000062bool CompareNetworks(const Network* a, const Network* b) {
63 if (a->prefix_length() == b->prefix_length()) {
64 if (a->name() == b->name()) {
65 return a->prefix() < b->prefix();
66 }
67 }
68 return a->name() < b->name();
69}
70
71bool SortNetworks(const Network* a, const Network* b) {
72 // Network types will be preferred above everything else while sorting
73 // Networks.
74
75 // Networks are sorted first by type.
76 if (a->type() != b->type()) {
77 return a->type() < b->type();
78 }
79
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000080 IPAddress ip_a = a->GetBestIP();
81 IPAddress ip_b = b->GetBestIP();
82
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000083 // After type, networks are sorted by IP address precedence values
84 // from RFC 3484-bis
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000085 if (IPAddressPrecedence(ip_a) != IPAddressPrecedence(ip_b)) {
86 return IPAddressPrecedence(ip_a) > IPAddressPrecedence(ip_b);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000087 }
88
89 // TODO(mallinath) - Add VPN and Link speed conditions while sorting.
90
91 // Networks are sorted last by key.
deadbeef3427f532017-07-26 16:09:33 -070092 return a->key() < b->key();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000093}
94
Jonas Oreland2105d642020-05-13 10:15:34 +020095uint16_t ComputeNetworkCostByType(int type,
Jonas Orelandb477fc72021-08-23 12:16:33 +020096 bool is_vpn,
97 bool use_differentiated_cellular_costs,
98 bool add_network_cost_to_vpn) {
Jonas Oreland08d18062020-04-02 07:19:12 +020099 // TODO(jonaso) : Rollout support for cellular network cost using A/B
100 // experiment to make sure it does not introduce regressions.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200101 int vpnCost = (is_vpn && add_network_cost_to_vpn) ? kNetworkCostVpn : 0;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700102 switch (type) {
103 case rtc::ADAPTER_TYPE_ETHERNET:
104 case rtc::ADAPTER_TYPE_LOOPBACK:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200105 return kNetworkCostMin + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700106 case rtc::ADAPTER_TYPE_WIFI:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200107 return kNetworkCostLow + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700108 case rtc::ADAPTER_TYPE_CELLULAR:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200109 return kNetworkCostCellular + vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200110 case rtc::ADAPTER_TYPE_CELLULAR_2G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200111 return (use_differentiated_cellular_costs ? kNetworkCostCellular2G
112 : kNetworkCostCellular) +
113 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200114 case rtc::ADAPTER_TYPE_CELLULAR_3G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200115 return (use_differentiated_cellular_costs ? kNetworkCostCellular3G
116 : kNetworkCostCellular) +
117 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200118 case rtc::ADAPTER_TYPE_CELLULAR_4G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200119 return (use_differentiated_cellular_costs ? kNetworkCostCellular4G
120 : kNetworkCostCellular) +
121 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200122 case rtc::ADAPTER_TYPE_CELLULAR_5G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200123 return (use_differentiated_cellular_costs ? kNetworkCostCellular5G
124 : kNetworkCostCellular) +
125 vpnCost;
Qingsi Wang9f1de692018-06-28 15:38:09 -0700126 case rtc::ADAPTER_TYPE_ANY:
127 // Candidates gathered from the any-address/wildcard ports, as backups,
128 // are given the maximum cost so that if there are other candidates with
129 // known interface types, we would not select candidate pairs using these
130 // backup candidates if other selection criteria with higher precedence
131 // (network conditions over the route) are the same. Note that setting the
132 // cost to kNetworkCostUnknown would be problematic since
133 // ADAPTER_TYPE_CELLULAR would then have a higher cost. See
134 // P2PTransportChannel::SortConnectionsAndUpdateState for how we rank and
135 // select candidate pairs, where the network cost is among the criteria.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200136 return kNetworkCostMax + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700137 case rtc::ADAPTER_TYPE_VPN:
138 // The cost of a VPN should be computed using its underlying network type.
Artem Titovd3251962021-11-15 16:57:07 +0100139 RTC_DCHECK_NOTREACHED();
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700140 return kNetworkCostUnknown;
141 default:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200142 return kNetworkCostUnknown + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700143 }
144}
145
thakis06689a12015-12-30 15:05:30 -0800146#if !defined(__native_client__)
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100147bool IsIgnoredIPv6(bool allow_mac_based_ipv6, const InterfaceAddress& ip) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000148 if (ip.family() != AF_INET6) {
149 return false;
150 }
151
152 // Link-local addresses require scope id to be bound successfully.
153 // However, our IPAddress structure doesn't carry that so the
154 // information is lost and causes binding failure.
155 if (IPIsLinkLocal(ip)) {
156 return true;
157 }
158
159 // Any MAC based IPv6 should be avoided to prevent the MAC tracking.
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100160 if (IPIsMacBased(ip) && !allow_mac_based_ipv6) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000161 return true;
162 }
163
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800164 // Ignore deprecated IPv6.
165 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED) {
166 return true;
167 }
168
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000169 return false;
170}
thakis06689a12015-12-30 15:05:30 -0800171#endif // !defined(__native_client__)
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000172
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200173// Note: consider changing to const Network* as arguments
174// if/when considering other changes that should not trigger
175// OnNetworksChanged.
176bool ShouldAdapterChangeTriggerNetworkChange(rtc::AdapterType old_type,
177 rtc::AdapterType new_type) {
178 // skip triggering OnNetworksChanged if
179 // changing from one cellular to another.
180 if (Network::IsCellular(old_type) && Network::IsCellular(new_type))
181 return false;
182 return true;
183}
184
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000185} // namespace
186
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800187// These addresses are used as the targets to find out the default local address
188// on a multi-homed endpoint. They are actually DNS servers.
189const char kPublicIPv4Host[] = "8.8.8.8";
190const char kPublicIPv6Host[] = "2001:4860:4860::8888";
191const int kPublicPort = 53; // DNS port.
192
Yves Gerey665174f2018-06-19 15:03:05 +0200193std::string MakeNetworkKey(const std::string& name,
194 const IPAddress& prefix,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000195 int prefix_length) {
Jonas Olsson366a50c2018-09-06 13:41:30 +0200196 rtc::StringBuilder ost;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000197 ost << name << "%" << prefix.ToString() << "/" << prefix_length;
Jonas Olsson84df1c72018-09-14 16:59:32 +0200198 return ost.Release();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000199}
Qingsi Wange53ac042018-05-08 11:55:07 -0700200// Test if the network name matches the type<number> pattern, e.g. eth0. The
201// matching is case-sensitive.
Steve Anton2acd1632019-03-25 13:48:30 -0700202bool MatchTypeNameWithIndexPattern(absl::string_view network_name,
203 absl::string_view type_name) {
204 if (!absl::StartsWith(network_name, type_name)) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700205 return false;
206 }
Steve Anton2acd1632019-03-25 13:48:30 -0700207 return absl::c_none_of(network_name.substr(type_name.size()),
208 [](char c) { return !isdigit(c); });
Qingsi Wange53ac042018-05-08 11:55:07 -0700209}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000210
Qingsi Wange53ac042018-05-08 11:55:07 -0700211// A cautious note that this method may not provide an accurate adapter type
212// based on the string matching. Incorrect type of adapters can affect the
213// result of the downstream network filtering, see e.g.
214// BasicPortAllocatorSession::GetNetworks when
215// PORTALLOCATOR_DISABLE_COSTLY_NETWORKS is turned on.
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800216AdapterType GetAdapterTypeFromName(const char* network_name) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700217 if (MatchTypeNameWithIndexPattern(network_name, "lo")) {
218 // Note that we have a more robust way to determine if a network interface
219 // is a loopback interface by checking the flag IFF_LOOPBACK in ifa_flags of
220 // an ifaddr struct. See ConvertIfAddrs in this file.
221 return ADAPTER_TYPE_LOOPBACK;
222 }
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700223
Qingsi Wange53ac042018-05-08 11:55:07 -0700224 if (MatchTypeNameWithIndexPattern(network_name, "eth")) {
225 return ADAPTER_TYPE_ETHERNET;
226 }
227
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000228 if (MatchTypeNameWithIndexPattern(network_name, "wlan") ||
229 MatchTypeNameWithIndexPattern(network_name, "v4-wlan")) {
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700230 return ADAPTER_TYPE_WIFI;
231 }
232
Qingsi Wange53ac042018-05-08 11:55:07 -0700233 if (MatchTypeNameWithIndexPattern(network_name, "ipsec") ||
234 MatchTypeNameWithIndexPattern(network_name, "tun") ||
235 MatchTypeNameWithIndexPattern(network_name, "utun") ||
236 MatchTypeNameWithIndexPattern(network_name, "tap")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800237 return ADAPTER_TYPE_VPN;
238 }
239#if defined(WEBRTC_IOS)
240 // Cell networks are pdp_ipN on iOS.
Qingsi Wange53ac042018-05-08 11:55:07 -0700241 if (MatchTypeNameWithIndexPattern(network_name, "pdp_ip")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800242 return ADAPTER_TYPE_CELLULAR;
243 }
Qingsi Wange53ac042018-05-08 11:55:07 -0700244 if (MatchTypeNameWithIndexPattern(network_name, "en")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800245 // This may not be most accurate because sometimes Ethernet interface
246 // name also starts with "en" but it is better than showing it as
247 // "unknown" type.
248 // TODO(honghaiz): Write a proper IOS network manager.
249 return ADAPTER_TYPE_WIFI;
250 }
251#elif defined(WEBRTC_ANDROID)
Qingsi Wange53ac042018-05-08 11:55:07 -0700252 if (MatchTypeNameWithIndexPattern(network_name, "rmnet") ||
253 MatchTypeNameWithIndexPattern(network_name, "rmnet_data") ||
254 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet") ||
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800255 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet_data") ||
256 MatchTypeNameWithIndexPattern(network_name, "clat")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800257 return ADAPTER_TYPE_CELLULAR;
258 }
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800259#endif
260
261 return ADAPTER_TYPE_UNKNOWN;
262}
263
Yves Gerey665174f2018-06-19 15:03:05 +0200264NetworkManager::NetworkManager() {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000265
Yves Gerey665174f2018-06-19 15:03:05 +0200266NetworkManager::~NetworkManager() {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000267
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700268NetworkManager::EnumerationPermission NetworkManager::enumeration_permission()
269 const {
guoweisea1012b2015-08-21 09:06:28 -0700270 return ENUMERATION_ALLOWED;
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700271}
272
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800273bool NetworkManager::GetDefaultLocalAddress(int family, IPAddress* addr) const {
274 return false;
275}
276
Qingsi Wang7852d292018-10-31 11:17:07 -0700277webrtc::MdnsResponderInterface* NetworkManager::GetMdnsResponder() const {
Qingsi Wang09619332018-09-12 22:51:55 -0700278 return nullptr;
279}
280
guoweis@webrtc.org2444d962015-01-30 00:09:28 +0000281NetworkManagerBase::NetworkManagerBase()
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200282 : enumeration_permission_(NetworkManager::ENUMERATION_ALLOWED),
283 signal_network_preference_change_(webrtc::field_trial::IsEnabled(
284 "WebRTC-SignalNetworkPreferenceChange")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000285
286NetworkManagerBase::~NetworkManagerBase() {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000287 for (const auto& kv : networks_map_) {
288 delete kv.second;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000289 }
290}
291
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700292NetworkManager::EnumerationPermission
293NetworkManagerBase::enumeration_permission() const {
294 return enumeration_permission_;
295}
296
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000297void NetworkManagerBase::GetAnyAddressNetworks(NetworkList* networks) {
298 if (!ipv4_any_address_network_) {
299 const rtc::IPAddress ipv4_any_address(INADDR_ANY);
300 ipv4_any_address_network_.reset(
Qingsi Wang9f1de692018-06-28 15:38:09 -0700301 new rtc::Network("any", "any", ipv4_any_address, 0, ADAPTER_TYPE_ANY));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800302 ipv4_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800303 ipv4_any_address_network_->set_mdns_responder_provider(this);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000304 ipv4_any_address_network_->AddIP(ipv4_any_address);
305 }
306 networks->push_back(ipv4_any_address_network_.get());
307
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100308 if (!ipv6_any_address_network_) {
309 const rtc::IPAddress ipv6_any_address(in6addr_any);
310 ipv6_any_address_network_.reset(
311 new rtc::Network("any", "any", ipv6_any_address, 0, ADAPTER_TYPE_ANY));
312 ipv6_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800313 ipv6_any_address_network_->set_mdns_responder_provider(this);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100314 ipv6_any_address_network_->AddIP(ipv6_any_address);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000315 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100316 networks->push_back(ipv6_any_address_network_.get());
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000317}
318
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000319void NetworkManagerBase::GetNetworks(NetworkList* result) const {
guoweis@webrtc.org2444d962015-01-30 00:09:28 +0000320 result->clear();
deadbeef3427f532017-07-26 16:09:33 -0700321 result->insert(result->begin(), networks_.begin(), networks_.end());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000322}
323
324void NetworkManagerBase::MergeNetworkList(const NetworkList& new_networks,
325 bool* changed) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000326 NetworkManager::Stats stats;
327 MergeNetworkList(new_networks, changed, &stats);
328}
329
330void NetworkManagerBase::MergeNetworkList(const NetworkList& new_networks,
331 bool* changed,
332 NetworkManager::Stats* stats) {
honghaizdb8cf502015-12-21 13:08:46 -0800333 *changed = false;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000334 // AddressList in this map will track IP addresses for all Networks
335 // with the same key.
336 std::map<std::string, AddressList> consolidated_address_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000337 NetworkList list(new_networks);
Steve Anton2acd1632019-03-25 13:48:30 -0700338 absl::c_sort(list, CompareNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000339 // First, build a set of network-keys to the ipaddresses.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000340 for (Network* network : list) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000341 bool might_add_to_merged_list = false;
Yves Gerey665174f2018-06-19 15:03:05 +0200342 std::string key = MakeNetworkKey(network->name(), network->prefix(),
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000343 network->prefix_length());
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000344 if (consolidated_address_list.find(key) ==
345 consolidated_address_list.end()) {
346 AddressList addrlist;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000347 addrlist.net = network;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000348 consolidated_address_list[key] = addrlist;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000349 might_add_to_merged_list = true;
350 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000351 const std::vector<InterfaceAddress>& addresses = network->GetIPs();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000352 AddressList& current_list = consolidated_address_list[key];
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000353 for (const InterfaceAddress& address : addresses) {
354 current_list.ips.push_back(address);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000355 }
356 if (!might_add_to_merged_list) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000357 delete network;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000358 } else {
359 if (current_list.ips[0].family() == AF_INET) {
360 stats->ipv4_network_count++;
361 } else {
nisseede5da42017-01-12 05:15:36 -0800362 RTC_DCHECK(current_list.ips[0].family() == AF_INET6);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000363 stats->ipv6_network_count++;
364 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000365 }
366 }
367
368 // Next, look for existing network objects to re-use.
honghaizdb8cf502015-12-21 13:08:46 -0800369 // Result of Network merge. Element in this list should have unique key.
370 NetworkList merged_list;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000371 for (const auto& kv : consolidated_address_list) {
372 const std::string& key = kv.first;
373 Network* net = kv.second.net;
374 auto existing = networks_map_.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000375 if (existing == networks_map_.end()) {
Jonas Oreland7e914822020-03-23 12:44:58 +0100376 // This network is new. Place it in the network map.
Olga Sharonovaf74d2ce2020-03-30 08:20:05 +0000377 merged_list.push_back(net);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000378 networks_map_[key] = net;
honghaiza0c44ea2016-03-23 16:07:48 -0700379 net->set_id(next_available_network_id_++);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000380 // Also, we might have accumulated IPAddresses from the first
381 // step, set it here.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000382 net->SetIPs(kv.second.ips, true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000383 *changed = true;
384 } else {
385 // This network exists in the map already. Reset its IP addresses.
honghaizdb8cf502015-12-21 13:08:46 -0800386 Network* existing_net = existing->second;
387 *changed = existing_net->SetIPs(kv.second.ips, *changed);
388 merged_list.push_back(existing_net);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700389 if (net->type() != ADAPTER_TYPE_UNKNOWN &&
390 net->type() != existing_net->type()) {
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200391 if (ShouldAdapterChangeTriggerNetworkChange(existing_net->type(),
392 net->type())) {
393 *changed = true;
394 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700395 existing_net->set_type(net->type());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700396 }
honghaizdb8cf502015-12-21 13:08:46 -0800397 // If the existing network was not active, networks have changed.
398 if (!existing_net->active()) {
399 *changed = true;
400 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200401 if (net->network_preference() != existing_net->network_preference()) {
402 existing_net->set_network_preference(net->network_preference());
403 if (signal_network_preference_change_) {
404 *changed = true;
405 }
406 }
nisseede5da42017-01-12 05:15:36 -0800407 RTC_DCHECK(net->active());
honghaizdb8cf502015-12-21 13:08:46 -0800408 if (existing_net != net) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000409 delete net;
410 }
411 }
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800412 networks_map_[key]->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000413 }
Artem Titov96e3b992021-07-26 16:03:14 +0200414 // It may still happen that the merged list is a subset of `networks_`.
honghaizdb8cf502015-12-21 13:08:46 -0800415 // To detect this change, we compare their sizes.
416 if (merged_list.size() != networks_.size()) {
417 *changed = true;
418 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000419
Artem Titov96e3b992021-07-26 16:03:14 +0200420 // If the network list changes, we re-assign `networks_` to the merged list
honghaizdb8cf502015-12-21 13:08:46 -0800421 // and re-sort it.
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000422 if (*changed) {
honghaizdb8cf502015-12-21 13:08:46 -0800423 networks_ = merged_list;
424 // Reset the active states of all networks.
425 for (const auto& kv : networks_map_) {
honghaize3c6c822016-02-17 13:00:28 -0800426 Network* network = kv.second;
Artem Titov96e3b992021-07-26 16:03:14 +0200427 // If `network` is in the newly generated `networks_`, it is active.
Steve Anton2acd1632019-03-25 13:48:30 -0700428 bool found = absl::c_linear_search(networks_, network);
honghaize3c6c822016-02-17 13:00:28 -0800429 network->set_active(found);
honghaizdb8cf502015-12-21 13:08:46 -0800430 }
Steve Anton2acd1632019-03-25 13:48:30 -0700431 absl::c_sort(networks_, SortNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000432 // Now network interfaces are sorted, we should set the preference value
433 // for each of the interfaces we are planning to use.
434 // Preference order of network interfaces might have changed from previous
435 // sorting due to addition of higher preference network interface.
436 // Since we have already sorted the network interfaces based on our
437 // requirements, we will just assign a preference value starting with 127,
438 // in decreasing order.
439 int pref = kHighestNetworkPreference;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000440 for (Network* network : networks_) {
441 network->set_preference(pref);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000442 if (pref > 0) {
443 --pref;
444 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100445 RTC_LOG(LS_ERROR) << "Too many network interfaces to handle!";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000446 break;
447 }
448 }
449 }
450}
451
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800452void NetworkManagerBase::set_default_local_addresses(const IPAddress& ipv4,
453 const IPAddress& ipv6) {
454 if (ipv4.family() == AF_INET) {
455 default_local_ipv4_address_ = ipv4;
456 }
457 if (ipv6.family() == AF_INET6) {
458 default_local_ipv6_address_ = ipv6;
459 }
460}
461
462bool NetworkManagerBase::GetDefaultLocalAddress(int family,
463 IPAddress* ipaddr) const {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800464 if (family == AF_INET && !default_local_ipv4_address_.IsNil()) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800465 *ipaddr = default_local_ipv4_address_;
466 return true;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800467 } else if (family == AF_INET6 && !default_local_ipv6_address_.IsNil()) {
honghaizaf83fe62016-04-18 14:50:44 -0700468 Network* ipv6_network = GetNetworkFromAddress(default_local_ipv6_address_);
469 if (ipv6_network) {
470 // If the default ipv6 network's BestIP is different than
471 // default_local_ipv6_address_, use it instead.
472 // This is to prevent potential IP address leakage. See WebRTC bug 5376.
473 *ipaddr = ipv6_network->GetBestIP();
474 } else {
475 *ipaddr = default_local_ipv6_address_;
476 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800477 return true;
478 }
479 return false;
480}
481
honghaizaf83fe62016-04-18 14:50:44 -0700482Network* NetworkManagerBase::GetNetworkFromAddress(
483 const rtc::IPAddress& ip) const {
484 for (Network* network : networks_) {
485 const auto& ips = network->GetIPs();
Steve Anton2acd1632019-03-25 13:48:30 -0700486 if (absl::c_any_of(ips, [&](const InterfaceAddress& existing_ip) {
487 return ip == static_cast<rtc::IPAddress>(existing_ip);
488 })) {
honghaizaf83fe62016-04-18 14:50:44 -0700489 return network;
490 }
491 }
492 return nullptr;
493}
494
Jonas Orelandac554eb2021-08-27 09:43:38 +0200495bool NetworkManagerBase::IsVpnMacAddress(
496 rtc::ArrayView<const uint8_t> address) {
497 if (address.data() == nullptr && address.size() == 0) {
498 return false;
499 }
500 for (const auto& vpn : kVpns) {
501 if (sizeof(vpn) == address.size() &&
502 memcmp(vpn, address.data(), address.size()) == 0) {
503 return true;
504 }
505 }
506 return false;
507}
508
Niels Mölleraa373162021-09-28 16:09:07 +0200509BasicNetworkManager::BasicNetworkManager()
510 : BasicNetworkManager(nullptr, nullptr) {}
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700511
Niels Möller539f3e12021-11-26 16:33:19 +0100512BasicNetworkManager::BasicNetworkManager(SocketFactory* socket_factory)
513 : BasicNetworkManager(nullptr, socket_factory) {}
514
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700515BasicNetworkManager::BasicNetworkManager(
516 NetworkMonitorFactory* network_monitor_factory)
Niels Mölleraa373162021-09-28 16:09:07 +0200517 : BasicNetworkManager(network_monitor_factory, nullptr) {}
518
519BasicNetworkManager::BasicNetworkManager(
520 NetworkMonitorFactory* network_monitor_factory,
521 SocketFactory* socket_factory)
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100522 : network_monitor_factory_(network_monitor_factory),
Niels Mölleraa373162021-09-28 16:09:07 +0200523 socket_factory_(socket_factory),
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100524 allow_mac_based_ipv6_(
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000525 webrtc::field_trial::IsEnabled("WebRTC-AllowMACBasedIPv6")),
526 bind_using_ifname_(
Jonas Orelandb5274ef2021-05-04 09:09:24 +0200527 !webrtc::field_trial::IsDisabled("WebRTC-BindUsingInterfaceName")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000528
Niels Möller27c14522022-02-07 16:44:21 +0100529BasicNetworkManager::~BasicNetworkManager() {
530 if (task_safety_flag_) {
531 task_safety_flag_->SetNotAlive();
532 }
533}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000534
honghaiz023f3ef2015-10-19 09:39:32 -0700535void BasicNetworkManager::OnNetworksChanged() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700536 RTC_DCHECK_RUN_ON(thread_);
Mirko Bonadei675513b2017-11-09 11:09:25 +0100537 RTC_LOG(LS_INFO) << "Network change was observed";
honghaiz023f3ef2015-10-19 09:39:32 -0700538 UpdateNetworksOnce();
539}
540
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000541#if defined(__native_client__)
542
543bool BasicNetworkManager::CreateNetworks(bool include_ignored,
544 NetworkList* networks) const {
Artem Titovd3251962021-11-15 16:57:07 +0100545 RTC_DCHECK_NOTREACHED();
Mirko Bonadei675513b2017-11-09 11:09:25 +0100546 RTC_LOG(LS_WARNING) << "BasicNetworkManager doesn't work on NaCl yet";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000547 return false;
548}
549
550#elif defined(WEBRTC_POSIX)
551void BasicNetworkManager::ConvertIfAddrs(struct ifaddrs* interfaces,
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800552 IfAddrsConverter* ifaddrs_converter,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000553 bool include_ignored,
554 NetworkList* networks) const {
555 NetworkMap current_networks;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800556
deadbeef37f5ecf2017-02-27 14:06:41 -0800557 for (struct ifaddrs* cursor = interfaces; cursor != nullptr;
558 cursor = cursor->ifa_next) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000559 IPAddress prefix;
560 IPAddress mask;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800561 InterfaceAddress ip;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000562 int scope_id = 0;
563
564 // Some interfaces may not have address assigned.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800565 if (!cursor->ifa_addr || !cursor->ifa_netmask) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000566 continue;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800567 }
568 // Skip ones which are down.
569 if (!(cursor->ifa_flags & IFF_RUNNING)) {
570 continue;
571 }
572 // Skip unknown family.
573 if (cursor->ifa_addr->sa_family != AF_INET &&
574 cursor->ifa_addr->sa_family != AF_INET6) {
575 continue;
576 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800577 // Convert to InterfaceAddress.
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200578 // TODO(webrtc:13114): Convert ConvertIfAddrs to use rtc::Netmask.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800579 if (!ifaddrs_converter->ConvertIfAddrsToIPAddress(cursor, &ip, &mask)) {
580 continue;
581 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000582
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800583 // Special case for IPv6 address.
584 if (cursor->ifa_addr->sa_family == AF_INET6) {
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100585 if (IsIgnoredIPv6(allow_mac_based_ipv6_, ip)) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000586 continue;
587 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800588 scope_id =
589 reinterpret_cast<sockaddr_in6*>(cursor->ifa_addr)->sin6_scope_id;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000590 }
591
Honghai Zhang351d77b2016-05-20 15:08:29 -0700592 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700593 AdapterType vpn_underlying_adapter_type = ADAPTER_TYPE_UNKNOWN;
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200594 NetworkPreference network_preference = NetworkPreference::NEUTRAL;
Honghai Zhang351d77b2016-05-20 15:08:29 -0700595 if (cursor->ifa_flags & IFF_LOOPBACK) {
596 adapter_type = ADAPTER_TYPE_LOOPBACK;
597 } else {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800598 // If there is a network_monitor, use it to get the adapter type.
599 // Otherwise, get the adapter type based on a few name matching rules.
600 if (network_monitor_) {
601 adapter_type = network_monitor_->GetAdapterType(cursor->ifa_name);
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200602 network_preference =
603 network_monitor_->GetNetworkPreference(cursor->ifa_name);
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800604 }
605 if (adapter_type == ADAPTER_TYPE_UNKNOWN) {
606 adapter_type = GetAdapterTypeFromName(cursor->ifa_name);
607 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700608 }
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700609
610 if (adapter_type == ADAPTER_TYPE_VPN && network_monitor_) {
611 vpn_underlying_adapter_type =
612 network_monitor_->GetVpnUnderlyingAdapterType(cursor->ifa_name);
613 }
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200614
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000615 int prefix_length = CountIPMaskBits(mask);
616 prefix = TruncateIP(ip, prefix_length);
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200617
618 if (adapter_type != ADAPTER_TYPE_VPN &&
619 IsConfiguredVpn(prefix, prefix_length)) {
620 vpn_underlying_adapter_type = adapter_type;
621 adapter_type = ADAPTER_TYPE_VPN;
622 }
623
Yves Gerey665174f2018-06-19 15:03:05 +0200624 std::string key =
625 MakeNetworkKey(std::string(cursor->ifa_name), prefix, prefix_length);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700626 auto iter = current_networks.find(key);
627 if (iter == current_networks.end()) {
Noah Richards2e266e92015-04-07 11:51:56 -0700628 // TODO(phoglund): Need to recognize other types as well.
jbauch555604a2016-04-26 03:13:22 -0700629 std::unique_ptr<Network> network(
630 new Network(cursor->ifa_name, cursor->ifa_name, prefix, prefix_length,
631 adapter_type));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800632 network->set_default_local_address_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000633 network->set_scope_id(scope_id);
634 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000635 network->set_ignored(IsIgnoredNetwork(*network));
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700636 network->set_underlying_type_for_vpn(vpn_underlying_adapter_type);
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200637 network->set_network_preference(network_preference);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000638 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800639 current_networks[key] = network.get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000640 networks->push_back(network.release());
641 }
642 } else {
Honghai Zhang351d77b2016-05-20 15:08:29 -0700643 Network* existing_network = iter->second;
644 existing_network->AddIP(ip);
645 if (adapter_type != ADAPTER_TYPE_UNKNOWN) {
646 existing_network->set_type(adapter_type);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700647 existing_network->set_underlying_type_for_vpn(
648 vpn_underlying_adapter_type);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700649 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200650 existing_network->set_network_preference(network_preference);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000651 }
652 }
653}
654
655bool BasicNetworkManager::CreateNetworks(bool include_ignored,
656 NetworkList* networks) const {
657 struct ifaddrs* interfaces;
658 int error = getifaddrs(&interfaces);
659 if (error != 0) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000660 RTC_LOG_ERR(LS_ERROR) << "getifaddrs failed to gather interface data: "
661 << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000662 return false;
663 }
664
jbauch555604a2016-04-26 03:13:22 -0700665 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(CreateIfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800666 ConvertIfAddrs(interfaces, ifaddrs_converter.get(), include_ignored,
667 networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000668
669 freeifaddrs(interfaces);
670 return true;
671}
672
673#elif defined(WEBRTC_WIN)
674
675unsigned int GetPrefix(PIP_ADAPTER_PREFIX prefixlist,
Yves Gerey665174f2018-06-19 15:03:05 +0200676 const IPAddress& ip,
677 IPAddress* prefix) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000678 IPAddress current_prefix;
679 IPAddress best_prefix;
680 unsigned int best_length = 0;
681 while (prefixlist) {
682 // Look for the longest matching prefix in the prefixlist.
deadbeef37f5ecf2017-02-27 14:06:41 -0800683 if (prefixlist->Address.lpSockaddr == nullptr ||
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000684 prefixlist->Address.lpSockaddr->sa_family != ip.family()) {
685 prefixlist = prefixlist->Next;
686 continue;
687 }
688 switch (prefixlist->Address.lpSockaddr->sa_family) {
689 case AF_INET: {
690 sockaddr_in* v4_addr =
691 reinterpret_cast<sockaddr_in*>(prefixlist->Address.lpSockaddr);
692 current_prefix = IPAddress(v4_addr->sin_addr);
693 break;
694 }
695 case AF_INET6: {
Yves Gerey665174f2018-06-19 15:03:05 +0200696 sockaddr_in6* v6_addr =
697 reinterpret_cast<sockaddr_in6*>(prefixlist->Address.lpSockaddr);
698 current_prefix = IPAddress(v6_addr->sin6_addr);
699 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000700 }
701 default: {
702 prefixlist = prefixlist->Next;
703 continue;
704 }
705 }
706 if (TruncateIP(ip, prefixlist->PrefixLength) == current_prefix &&
707 prefixlist->PrefixLength > best_length) {
708 best_prefix = current_prefix;
709 best_length = prefixlist->PrefixLength;
710 }
711 prefixlist = prefixlist->Next;
712 }
713 *prefix = best_prefix;
714 return best_length;
715}
716
717bool BasicNetworkManager::CreateNetworks(bool include_ignored,
718 NetworkList* networks) const {
719 NetworkMap current_networks;
720 // MSDN recommends a 15KB buffer for the first try at GetAdaptersAddresses.
721 size_t buffer_size = 16384;
jbauch555604a2016-04-26 03:13:22 -0700722 std::unique_ptr<char[]> adapter_info(new char[buffer_size]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000723 PIP_ADAPTER_ADDRESSES adapter_addrs =
724 reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
725 int adapter_flags = (GAA_FLAG_SKIP_DNS_SERVER | GAA_FLAG_SKIP_ANYCAST |
726 GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_INCLUDE_PREFIX);
727 int ret = 0;
728 do {
729 adapter_info.reset(new char[buffer_size]);
730 adapter_addrs = reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
Yves Gerey665174f2018-06-19 15:03:05 +0200731 ret = GetAdaptersAddresses(AF_UNSPEC, adapter_flags, 0, adapter_addrs,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000732 reinterpret_cast<PULONG>(&buffer_size));
733 } while (ret == ERROR_BUFFER_OVERFLOW);
734 if (ret != ERROR_SUCCESS) {
735 return false;
736 }
737 int count = 0;
738 while (adapter_addrs) {
739 if (adapter_addrs->OperStatus == IfOperStatusUp) {
740 PIP_ADAPTER_UNICAST_ADDRESS address = adapter_addrs->FirstUnicastAddress;
741 PIP_ADAPTER_PREFIX prefixlist = adapter_addrs->FirstPrefix;
742 std::string name;
743 std::string description;
tfarinaa41ab932015-10-30 16:08:48 -0700744#if !defined(NDEBUG)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000745 name = ToUtf8(adapter_addrs->FriendlyName,
746 wcslen(adapter_addrs->FriendlyName));
747#endif
748 description = ToUtf8(adapter_addrs->Description,
749 wcslen(adapter_addrs->Description));
750 for (; address; address = address->Next) {
tfarinaa41ab932015-10-30 16:08:48 -0700751#if defined(NDEBUG)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000752 name = rtc::ToString(count);
753#endif
754
755 IPAddress ip;
756 int scope_id = 0;
jbauch555604a2016-04-26 03:13:22 -0700757 std::unique_ptr<Network> network;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000758 switch (address->Address.lpSockaddr->sa_family) {
759 case AF_INET: {
760 sockaddr_in* v4_addr =
761 reinterpret_cast<sockaddr_in*>(address->Address.lpSockaddr);
762 ip = IPAddress(v4_addr->sin_addr);
763 break;
764 }
765 case AF_INET6: {
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100766 sockaddr_in6* v6_addr =
767 reinterpret_cast<sockaddr_in6*>(address->Address.lpSockaddr);
768 scope_id = v6_addr->sin6_scope_id;
769 ip = IPAddress(v6_addr->sin6_addr);
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000770
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100771 if (IsIgnoredIPv6(allow_mac_based_ipv6_, InterfaceAddress(ip))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000772 continue;
773 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100774
775 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000776 }
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800777 default: {
778 continue;
779 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000780 }
781
782 IPAddress prefix;
783 int prefix_length = GetPrefix(prefixlist, ip, &prefix);
784 std::string key = MakeNetworkKey(name, prefix, prefix_length);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000785 auto existing_network = current_networks.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000786 if (existing_network == current_networks.end()) {
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000787 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Yura Yaroshevich0ce868c2018-05-15 11:15:32 +0300788 switch (adapter_addrs->IfType) {
789 case IF_TYPE_SOFTWARE_LOOPBACK:
790 adapter_type = ADAPTER_TYPE_LOOPBACK;
791 break;
792 case IF_TYPE_ETHERNET_CSMACD:
793 case IF_TYPE_ETHERNET_3MBIT:
794 case IF_TYPE_IEEE80212:
795 case IF_TYPE_FASTETHER:
796 case IF_TYPE_FASTETHER_FX:
797 case IF_TYPE_GIGABITETHERNET:
798 adapter_type = ADAPTER_TYPE_ETHERNET;
799 break;
800 case IF_TYPE_IEEE80211:
801 adapter_type = ADAPTER_TYPE_WIFI;
802 break;
803 case IF_TYPE_WWANPP:
804 case IF_TYPE_WWANPP2:
805 adapter_type = ADAPTER_TYPE_CELLULAR;
806 break;
807 default:
808 // TODO(phoglund): Need to recognize other types as well.
809 adapter_type = ADAPTER_TYPE_UNKNOWN;
810 break;
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000811 }
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200812 auto vpn_underlying_adapter_type = ADAPTER_TYPE_UNKNOWN;
813 if (adapter_type != ADAPTER_TYPE_VPN &&
814 IsConfiguredVpn(prefix, prefix_length)) {
815 vpn_underlying_adapter_type = adapter_type;
816 adapter_type = ADAPTER_TYPE_VPN;
817 }
Jonas Orelandac554eb2021-08-27 09:43:38 +0200818 if (adapter_type != ADAPTER_TYPE_VPN &&
819 IsVpnMacAddress(rtc::ArrayView<const uint8_t>(
820 reinterpret_cast<const uint8_t*>(
821 adapter_addrs->PhysicalAddress),
822 adapter_addrs->PhysicalAddressLength))) {
823 vpn_underlying_adapter_type = adapter_type;
824 adapter_type = ADAPTER_TYPE_VPN;
825 }
826
jbauch555604a2016-04-26 03:13:22 -0700827 std::unique_ptr<Network> network(new Network(
828 name, description, prefix, prefix_length, adapter_type));
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200829 network->set_underlying_type_for_vpn(vpn_underlying_adapter_type);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800830 network->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800831 network->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000832 network->set_scope_id(scope_id);
833 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000834 bool ignored = IsIgnoredNetwork(*network);
835 network->set_ignored(ignored);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000836 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800837 current_networks[key] = network.get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000838 networks->push_back(network.release());
839 }
840 } else {
841 (*existing_network).second->AddIP(ip);
842 }
843 }
844 // Count is per-adapter - all 'Networks' created from the same
845 // adapter need to have the same name.
846 ++count;
847 }
848 adapter_addrs = adapter_addrs->Next;
849 }
850 return true;
851}
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000852#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000853
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000854bool BasicNetworkManager::IsIgnoredNetwork(const Network& network) const {
855 // Ignore networks on the explicit ignore list.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000856 for (const std::string& ignored_name : network_ignore_list_) {
857 if (network.name() == ignored_name) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000858 return true;
859 }
860 }
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000861
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000862#if defined(WEBRTC_POSIX)
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000863 // Filter out VMware/VirtualBox interfaces, typically named vmnet1,
864 // vmnet8, or vboxnet0.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000865 if (strncmp(network.name().c_str(), "vmnet", 5) == 0 ||
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000866 strncmp(network.name().c_str(), "vnic", 4) == 0 ||
867 strncmp(network.name().c_str(), "vboxnet", 7) == 0) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000868 return true;
869 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000870#elif defined(WEBRTC_WIN)
871 // Ignore any HOST side vmware adapters with a description like:
872 // VMware Virtual Ethernet Adapter for VMnet1
873 // but don't ignore any GUEST side adapters with a description like:
874 // VMware Accelerated AMD PCNet Adapter #2
deadbeef37f5ecf2017-02-27 14:06:41 -0800875 if (strstr(network.description().c_str(), "VMnet") != nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000876 return true;
877 }
878#endif
879
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700880 if (network_monitor_ &&
881 !network_monitor_->IsAdapterAvailable(network.name())) {
882 return true;
883 }
884
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000885 // Ignore any networks with a 0.x.y.z IP
886 if (network.prefix().family() == AF_INET) {
887 return (network.prefix().v4AddressAsHostOrderInteger() < 0x01000000);
888 }
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000889
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000890 return false;
891}
892
893void BasicNetworkManager::StartUpdating() {
894 thread_ = Thread::Current();
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700895 // Redundant but necessary for thread annotations.
896 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000897 if (start_count_) {
898 // If network interfaces are already discovered and signal is sent,
899 // we should trigger network signal immediately for the new clients
900 // to start allocating ports.
901 if (sent_first_update_)
Niels Möller27c14522022-02-07 16:44:21 +0100902 thread_->PostTask(ToQueuedTask(task_safety_flag_, [this] {
903 RTC_DCHECK_RUN_ON(thread_);
904 SignalNetworksChanged();
905 }));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000906 } else {
Niels Möller27c14522022-02-07 16:44:21 +0100907 RTC_DCHECK(task_safety_flag_ == nullptr);
908 task_safety_flag_ = webrtc::PendingTaskSafetyFlag::Create();
909 thread_->PostTask(ToQueuedTask(task_safety_flag_, [this] {
910 RTC_DCHECK_RUN_ON(thread_);
911 UpdateNetworksContinually();
912 }));
honghaiz023f3ef2015-10-19 09:39:32 -0700913 StartNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000914 }
915 ++start_count_;
916}
917
918void BasicNetworkManager::StopUpdating() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700919 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000920 if (!start_count_)
921 return;
922
923 --start_count_;
924 if (!start_count_) {
Niels Möller27c14522022-02-07 16:44:21 +0100925 task_safety_flag_->SetNotAlive();
926 task_safety_flag_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000927 sent_first_update_ = false;
honghaiz023f3ef2015-10-19 09:39:32 -0700928 StopNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000929 }
930}
931
honghaiz023f3ef2015-10-19 09:39:32 -0700932void BasicNetworkManager::StartNetworkMonitor() {
Taylor Brandstetter07fc24d2020-08-12 01:58:10 +0000933 if (network_monitor_factory_ == nullptr) {
934 return;
honghaiz023f3ef2015-10-19 09:39:32 -0700935 }
honghaiz023f3ef2015-10-19 09:39:32 -0700936 if (!network_monitor_) {
Taylor Brandstetter07fc24d2020-08-12 01:58:10 +0000937 network_monitor_.reset(network_monitor_factory_->CreateNetworkMonitor());
honghaizcec0a082016-01-15 14:49:09 -0800938 if (!network_monitor_) {
939 return;
940 }
Mirko Bonadei37077932021-07-27 17:00:58 +0200941 network_monitor_->SetNetworksChangedCallback(
942 [this]() { OnNetworksChanged(); });
honghaiz023f3ef2015-10-19 09:39:32 -0700943 }
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000944
945 if (network_monitor_->SupportsBindSocketToNetwork()) {
946 // Set NetworkBinder on SocketServer so that
947 // PhysicalSocket::Bind will call
948 // BasicNetworkManager::BindSocketToNetwork(), (that will lookup interface
949 // name and then call network_monitor_->BindSocketToNetwork()).
950 thread_->socketserver()->set_network_binder(this);
951 }
952
honghaiz023f3ef2015-10-19 09:39:32 -0700953 network_monitor_->Start();
954}
955
956void BasicNetworkManager::StopNetworkMonitor() {
957 if (!network_monitor_) {
958 return;
959 }
960 network_monitor_->Stop();
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000961
962 if (network_monitor_->SupportsBindSocketToNetwork()) {
963 // Reset NetworkBinder on SocketServer.
964 if (thread_->socketserver()->network_binder() == this) {
965 thread_->socketserver()->set_network_binder(nullptr);
966 }
967 }
honghaiz023f3ef2015-10-19 09:39:32 -0700968}
969
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800970IPAddress BasicNetworkManager::QueryDefaultLocalAddress(int family) const {
nisseede5da42017-01-12 05:15:36 -0800971 RTC_DCHECK(family == AF_INET || family == AF_INET6);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800972
Niels Mölleraa373162021-09-28 16:09:07 +0200973 // TODO(bugs.webrtc.org/13145): Delete support for null `socket_factory_`,
974 // require socket factory to be provided to constructor.
975 SocketFactory* socket_factory = socket_factory_;
976 if (!socket_factory) {
977 socket_factory = thread_->socketserver();
978 }
979 RTC_DCHECK(socket_factory);
980
Niels Möllerd0b88792021-08-12 10:32:30 +0200981 std::unique_ptr<Socket> socket(
Niels Mölleraa373162021-09-28 16:09:07 +0200982 socket_factory->CreateSocket(family, SOCK_DGRAM));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800983 if (!socket) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000984 RTC_LOG_ERR(LS_ERROR) << "Socket creation failed";
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800985 return IPAddress();
986 }
987
guoweis56271ed2016-01-15 14:45:06 -0800988 if (socket->Connect(SocketAddress(
989 family == AF_INET ? kPublicIPv4Host : kPublicIPv6Host, kPublicPort)) <
990 0) {
Yves Gerey665174f2018-06-19 15:03:05 +0200991 if (socket->GetError() != ENETUNREACH &&
992 socket->GetError() != EHOSTUNREACH) {
skvlad75024012016-09-29 12:59:35 -0700993 // Ignore the expected case of "host/net unreachable" - which happens if
994 // the network is V4- or V6-only.
Mirko Bonadei675513b2017-11-09 11:09:25 +0100995 RTC_LOG(LS_INFO) << "Connect failed with " << socket->GetError();
skvlad75024012016-09-29 12:59:35 -0700996 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800997 return IPAddress();
998 }
999 return socket->GetLocalAddress().ipaddr();
1000}
1001
honghaiz023f3ef2015-10-19 09:39:32 -07001002void BasicNetworkManager::UpdateNetworksOnce() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001003 if (!start_count_)
1004 return;
1005
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001006 NetworkList list;
1007 if (!CreateNetworks(false, &list)) {
1008 SignalError();
1009 } else {
1010 bool changed;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001011 NetworkManager::Stats stats;
1012 MergeNetworkList(list, &changed, &stats);
1013 set_default_local_addresses(QueryDefaultLocalAddress(AF_INET),
1014 QueryDefaultLocalAddress(AF_INET6));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001015 if (changed || !sent_first_update_) {
1016 SignalNetworksChanged();
1017 sent_first_update_ = true;
1018 }
1019 }
honghaiz023f3ef2015-10-19 09:39:32 -07001020}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001021
honghaiz023f3ef2015-10-19 09:39:32 -07001022void BasicNetworkManager::UpdateNetworksContinually() {
1023 UpdateNetworksOnce();
Niels Möller27c14522022-02-07 16:44:21 +01001024 thread_->PostDelayedTask(ToQueuedTask(task_safety_flag_,
1025 [this] {
1026 RTC_DCHECK_RUN_ON(thread_);
1027 UpdateNetworksContinually();
1028 }),
1029 kNetworksUpdateIntervalMs);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001030}
1031
honghaizdb8cf502015-12-21 13:08:46 -08001032void BasicNetworkManager::DumpNetworks() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001033 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001034 NetworkList list;
honghaizdb8cf502015-12-21 13:08:46 -08001035 GetNetworks(&list);
Mirko Bonadei675513b2017-11-09 11:09:25 +01001036 RTC_LOG(LS_INFO) << "NetworkManager detected " << list.size() << " networks:";
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001037 for (const Network* network : list) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001038 RTC_LOG(LS_INFO) << network->ToString() << ": " << network->description()
1039 << ", active ? " << network->active()
1040 << ((network->ignored()) ? ", Ignored" : "");
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001041 }
1042}
1043
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001044NetworkBindingResult BasicNetworkManager::BindSocketToNetwork(
1045 int socket_fd,
1046 const IPAddress& address) {
1047 RTC_DCHECK_RUN_ON(thread_);
1048 std::string if_name;
1049 if (bind_using_ifname_) {
1050 Network* net = GetNetworkFromAddress(address);
1051 if (net != nullptr) {
1052 if_name = net->name();
1053 }
1054 }
1055 return network_monitor_->BindSocketToNetwork(socket_fd, address, if_name);
1056}
1057
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001058Network::Network(const std::string& name,
1059 const std::string& desc,
1060 const IPAddress& prefix,
1061 int prefix_length)
1062 : name_(name),
1063 description_(desc),
1064 prefix_(prefix),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001065 prefix_length_(prefix_length),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001066 key_(MakeNetworkKey(name, prefix, prefix_length)),
1067 scope_id_(0),
1068 ignored_(false),
1069 type_(ADAPTER_TYPE_UNKNOWN),
Jonas Oreland2105d642020-05-13 10:15:34 +02001070 preference_(0),
1071 use_differentiated_cellular_costs_(webrtc::field_trial::IsEnabled(
Jonas Orelandb477fc72021-08-23 12:16:33 +02001072 "WebRTC-UseDifferentiatedCellularCosts")),
1073 add_network_cost_to_vpn_(
1074 webrtc::field_trial::IsEnabled("WebRTC-AddNetworkCostToVpn")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001075
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001076Network::Network(const std::string& name,
1077 const std::string& desc,
1078 const IPAddress& prefix,
1079 int prefix_length,
1080 AdapterType type)
1081 : name_(name),
1082 description_(desc),
1083 prefix_(prefix),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001084 prefix_length_(prefix_length),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001085 key_(MakeNetworkKey(name, prefix, prefix_length)),
1086 scope_id_(0),
1087 ignored_(false),
1088 type_(type),
Jonas Oreland2105d642020-05-13 10:15:34 +02001089 preference_(0),
1090 use_differentiated_cellular_costs_(webrtc::field_trial::IsEnabled(
Jonas Orelandb477fc72021-08-23 12:16:33 +02001091 "WebRTC-UseDifferentiatedCellularCosts")),
1092 add_network_cost_to_vpn_(
1093 webrtc::field_trial::IsEnabled("WebRTC-AddNetworkCostToVpn")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001094
Steve Anton9de3aac2017-10-24 10:08:26 -07001095Network::Network(const Network&) = default;
1096
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001097Network::~Network() = default;
1098
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001099// Sets the addresses of this network. Returns true if the address set changed.
1100// Change detection is short circuited if the changed argument is true.
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001101bool Network::SetIPs(const std::vector<InterfaceAddress>& ips, bool changed) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001102 // Detect changes with a nested loop; n-squared but we expect on the order
1103 // of 2-3 addresses per network.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001104 changed = changed || ips.size() != ips_.size();
1105 if (!changed) {
1106 for (const InterfaceAddress& ip : ips) {
Steve Anton2acd1632019-03-25 13:48:30 -07001107 if (!absl::c_linear_search(ips_, ip)) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001108 changed = true;
1109 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001110 }
1111 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001112 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001113
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001114 ips_ = ips;
1115 return changed;
1116}
1117
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001118// Select the best IP address to use from this Network.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001119IPAddress Network::GetBestIP() const {
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001120 if (ips_.size() == 0) {
1121 return IPAddress();
1122 }
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001123
1124 if (prefix_.family() == AF_INET) {
1125 return static_cast<IPAddress>(ips_.at(0));
1126 }
1127
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001128 InterfaceAddress selected_ip, ula_ip;
1129
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001130 for (const InterfaceAddress& ip : ips_) {
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001131 // Ignore any address which has been deprecated already.
1132 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED)
1133 continue;
1134
1135 // ULA address should only be returned when we have no other
1136 // global IP.
1137 if (IPIsULA(static_cast<const IPAddress&>(ip))) {
1138 ula_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001139 continue;
1140 }
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001141 selected_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001142
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001143 // Search could stop once a temporary non-deprecated one is found.
1144 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_TEMPORARY)
1145 break;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001146 }
1147
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001148 // No proper global IPv6 address found, use ULA instead.
1149 if (IPIsUnspec(selected_ip) && !IPIsUnspec(ula_ip)) {
1150 selected_ip = ula_ip;
1151 }
1152
1153 return static_cast<IPAddress>(selected_ip);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001154}
1155
Qingsi Wang5ae259e2019-02-13 15:46:07 -08001156webrtc::MdnsResponderInterface* Network::GetMdnsResponder() const {
1157 if (mdns_responder_provider_ == nullptr) {
1158 return nullptr;
1159 }
1160 return mdns_responder_provider_->GetMdnsResponder();
1161}
1162
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001163uint16_t Network::GetCost() const {
1164 AdapterType type = IsVpn() ? underlying_type_for_vpn_ : type_;
Jonas Orelandb477fc72021-08-23 12:16:33 +02001165 return ComputeNetworkCostByType(type, IsVpn(),
1166 use_differentiated_cellular_costs_,
1167 add_network_cost_to_vpn_);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001168}
1169
Jonas Oreland30019052022-01-28 14:11:44 +01001170// This is the inverse of ComputeNetworkCostByType().
1171std::pair<rtc::AdapterType, bool /* vpn */>
1172Network::GuessAdapterFromNetworkCost(int network_cost) {
1173 switch (network_cost) {
1174 case kNetworkCostMin:
1175 return {rtc::ADAPTER_TYPE_ETHERNET, false};
1176 case kNetworkCostMin + kNetworkCostVpn:
1177 return {rtc::ADAPTER_TYPE_ETHERNET, true};
1178 case kNetworkCostLow:
1179 return {rtc::ADAPTER_TYPE_WIFI, false};
1180 case kNetworkCostLow + kNetworkCostVpn:
1181 return {rtc::ADAPTER_TYPE_WIFI, true};
1182 case kNetworkCostCellular:
1183 return {rtc::ADAPTER_TYPE_CELLULAR, false};
1184 case kNetworkCostCellular + kNetworkCostVpn:
1185 return {rtc::ADAPTER_TYPE_CELLULAR, true};
1186 case kNetworkCostCellular2G:
1187 return {rtc::ADAPTER_TYPE_CELLULAR_2G, false};
1188 case kNetworkCostCellular2G + kNetworkCostVpn:
1189 return {rtc::ADAPTER_TYPE_CELLULAR_2G, true};
1190 case kNetworkCostCellular3G:
1191 return {rtc::ADAPTER_TYPE_CELLULAR_3G, false};
1192 case kNetworkCostCellular3G + kNetworkCostVpn:
1193 return {rtc::ADAPTER_TYPE_CELLULAR_3G, true};
1194 case kNetworkCostCellular4G:
1195 return {rtc::ADAPTER_TYPE_CELLULAR_4G, false};
1196 case kNetworkCostCellular4G + kNetworkCostVpn:
1197 return {rtc::ADAPTER_TYPE_CELLULAR_4G, true};
1198 case kNetworkCostCellular5G:
1199 return {rtc::ADAPTER_TYPE_CELLULAR_5G, false};
1200 case kNetworkCostCellular5G + kNetworkCostVpn:
1201 return {rtc::ADAPTER_TYPE_CELLULAR_5G, true};
1202 case kNetworkCostUnknown:
1203 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1204 case kNetworkCostUnknown + kNetworkCostVpn:
1205 return {rtc::ADAPTER_TYPE_UNKNOWN, true};
1206 case kNetworkCostMax:
1207 return {rtc::ADAPTER_TYPE_ANY, false};
1208 case kNetworkCostMax + kNetworkCostVpn:
1209 return {rtc::ADAPTER_TYPE_ANY, true};
1210 }
1211 RTC_LOG(LS_VERBOSE) << "Unknown network cost: " << network_cost;
1212 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1213}
1214
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001215std::string Network::ToString() const {
Jonas Olsson366a50c2018-09-06 13:41:30 +02001216 rtc::StringBuilder ss;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001217 // Print out the first space-terminated token of the network desc, plus
1218 // the IP address.
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001219 ss << "Net[" << description_.substr(0, description_.find(' ')) << ":"
1220 << prefix_.ToSensitiveString() << "/" << prefix_length_ << ":"
1221 << AdapterTypeToString(type_);
1222 if (IsVpn()) {
1223 ss << "/" << AdapterTypeToString(underlying_type_for_vpn_);
1224 }
Qingsi Wang10a0e512018-05-16 13:37:03 -07001225 ss << ":id=" << id_ << "]";
Jonas Olsson84df1c72018-09-14 16:59:32 +02001226 return ss.Release();
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001227}
1228
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001229void BasicNetworkManager::set_vpn_list(const std::vector<NetworkMask>& vpn) {
1230 if (thread_ == nullptr) {
1231 vpn_ = vpn;
1232 } else {
1233 thread_->Invoke<void>(RTC_FROM_HERE, [this, vpn] { vpn_ = vpn; });
1234 }
1235}
1236
1237bool BasicNetworkManager::IsConfiguredVpn(IPAddress prefix,
1238 int prefix_length) const {
1239 RTC_DCHECK_RUN_ON(thread_);
1240 for (const auto& vpn : vpn_) {
1241 if (prefix_length >= vpn.prefix_length()) {
1242 auto copy = TruncateIP(prefix, vpn.prefix_length());
1243 if (copy == vpn.address()) {
1244 return true;
1245 }
1246 }
1247 }
1248 return false;
1249}
1250
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001251} // namespace rtc