blob: e7b9982cc6b48fa81d13f3d3c7667aface5927da [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
oprypin1ea631f2017-08-18 00:15:19 -070013#include <stdlib.h>
14
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070015#include <algorithm>
jbauch555604a2016-04-26 03:13:22 -070016#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#include <vector>
oprypin1ea631f2017-08-18 00:15:19 -070018
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070019#include "absl/algorithm/container.h"
Mirko Bonadei06d35592020-04-01 13:43:08 +020020#include "absl/strings/match.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020021#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080022#include "rtc_base/net_helpers.h"
23#include "rtc_base/network_monitor.h"
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -070024#include "rtc_base/network_monitor_factory.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000025#if defined(WEBRTC_POSIX)
Henrik Kjellander00725112017-06-30 15:14:45 +020026#include <net/if.h>
Yves Gerey665174f2018-06-19 15:03:05 +020027#include <sys/types.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020028
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020029#include "rtc_base/ifaddrs_converter.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080030#endif // defined(WEBRTC_POSIX)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020031#include "rtc_base/gunit.h"
Steve Anton2acd1632019-03-25 13:48:30 -070032#include "test/gmock.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000033#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +010034#include "rtc_base/logging.h" // For RTC_LOG_GLE
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000035#endif
Jonas Oreland47fa08f2020-12-05 18:09:13 +010036#include "test/field_trial.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000037
Steve Anton2acd1632019-03-25 13:48:30 -070038using ::testing::Contains;
39using ::testing::Not;
40using ::testing::UnorderedElementsAre;
41using ::testing::UnorderedElementsAreArray;
42
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000043namespace rtc {
44
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080045namespace {
46
Jonas Oreland2ee0e642021-08-25 15:43:02 +020047IPAddress IPFromString(const std::string& str) {
48 IPAddress ip;
49 RTC_CHECK(IPFromString(str, &ip));
50 return ip;
51}
52
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000053class FakeNetworkMonitor : public NetworkMonitorInterface {
honghaiz023f3ef2015-10-19 09:39:32 -070054 public:
honghaizcec0a082016-01-15 14:49:09 -080055 void Start() override { started_ = true; }
56 void Stop() override { started_ = false; }
57 bool started() { return started_; }
honghaiza7ad7c32016-02-02 12:54:14 -080058 AdapterType GetAdapterType(const std::string& if_name) override {
Honghai Zhang351d77b2016-05-20 15:08:29 -070059 // Note that the name matching rules are different from the
60 // GetAdapterTypeFromName in NetworkManager.
Mirko Bonadei06d35592020-04-01 13:43:08 +020061 if (absl::StartsWith(if_name, "wifi")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070062 return ADAPTER_TYPE_WIFI;
63 }
Mirko Bonadei06d35592020-04-01 13:43:08 +020064 if (absl::StartsWith(if_name, "cellular")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070065 return ADAPTER_TYPE_CELLULAR;
66 }
honghaiza7ad7c32016-02-02 12:54:14 -080067 return ADAPTER_TYPE_UNKNOWN;
68 }
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000069 AdapterType GetVpnUnderlyingAdapterType(const std::string& if_name) override {
70 return ADAPTER_TYPE_UNKNOWN;
71 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +020072 NetworkPreference GetNetworkPreference(const std::string& if_name) override {
73 return NetworkPreference::NEUTRAL;
74 }
honghaizcec0a082016-01-15 14:49:09 -080075
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070076 bool IsAdapterAvailable(const std::string& if_name) override {
77 return absl::c_count(unavailable_adapters_, if_name) == 0;
78 }
79
80 // Used to test IsAdapterAvailable.
81 void set_unavailable_adapters(std::vector<std::string> unavailable_adapters) {
82 unavailable_adapters_ = unavailable_adapters;
83 }
84
Jonas Oreland6ca955a2021-03-15 08:27:43 +000085 bool SupportsBindSocketToNetwork() const override { return true; }
86
87 NetworkBindingResult BindSocketToNetwork(
88 int socket_fd,
89 const IPAddress& address,
90 const std::string& if_name) override {
91 if (absl::c_count(addresses_, address) > 0) {
92 return NetworkBindingResult::SUCCESS;
93 }
94
95 for (auto const& iter : adapters_) {
96 if (if_name.find(iter) != std::string::npos) {
97 return NetworkBindingResult::SUCCESS;
98 }
99 }
100 return NetworkBindingResult::ADDRESS_NOT_FOUND;
101 }
102
103 void set_ip_addresses(std::vector<IPAddress> addresses) {
104 addresses_ = addresses;
105 }
106
107 void set_adapters(std::vector<std::string> adapters) { adapters_ = adapters; }
108
Mirko Bonadei37077932021-07-27 17:00:58 +0200109 void InovkeNetworksChangedCallbackForTesting() {
110 InvokeNetworksChangedCallback();
111 }
112
honghaizcec0a082016-01-15 14:49:09 -0800113 private:
114 bool started_ = false;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000115 std::vector<std::string> adapters_;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700116 std::vector<std::string> unavailable_adapters_;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000117 std::vector<IPAddress> addresses_;
honghaiz023f3ef2015-10-19 09:39:32 -0700118};
119
120class FakeNetworkMonitorFactory : public NetworkMonitorFactory {
121 public:
122 FakeNetworkMonitorFactory() {}
honghaizcec0a082016-01-15 14:49:09 -0800123 NetworkMonitorInterface* CreateNetworkMonitor() override {
honghaiz023f3ef2015-10-19 09:39:32 -0700124 return new FakeNetworkMonitor();
125 }
126};
127
Qingsi Wang10a0e512018-05-16 13:37:03 -0700128bool SameNameAndPrefix(const rtc::Network& a, const rtc::Network& b) {
129 if (a.name() != b.name()) {
130 RTC_LOG(INFO) << "Different interface names.";
131 return false;
132 }
133 if (a.prefix_length() != b.prefix_length() || a.prefix() != b.prefix()) {
134 RTC_LOG(INFO) << "Different IP prefixes.";
135 return false;
136 }
137 return true;
138}
139
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800140} // namespace
141
Mirko Bonadei6a489f22019-04-09 15:11:12 +0200142class NetworkTest : public ::testing::Test, public sigslot::has_slots<> {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000143 public:
144 NetworkTest() : callback_called_(false) {}
145
Yves Gerey665174f2018-06-19 15:03:05 +0200146 void OnNetworksChanged() { callback_called_ = true; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000147
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000148 NetworkManager::Stats MergeNetworkList(
149 BasicNetworkManager& network_manager,
150 const NetworkManager::NetworkList& list,
151 bool* changed) {
152 NetworkManager::Stats stats;
153 network_manager.MergeNetworkList(list, changed, &stats);
154 return stats;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000155 }
156
157 bool IsIgnoredNetwork(BasicNetworkManager& network_manager,
158 const Network& network) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700159 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000160 return network_manager.IsIgnoredNetwork(network);
161 }
162
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700163 IPAddress QueryDefaultLocalAddress(BasicNetworkManager& network_manager,
164 int family) {
165 RTC_DCHECK_RUN_ON(network_manager.thread_);
166 return network_manager.QueryDefaultLocalAddress(family);
167 }
168
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000169 NetworkManager::NetworkList GetNetworks(
Yves Gerey665174f2018-06-19 15:03:05 +0200170 const BasicNetworkManager& network_manager,
171 bool include_ignored) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700172 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000173 NetworkManager::NetworkList list;
174 network_manager.CreateNetworks(include_ignored, &list);
175 return list;
176 }
177
honghaizcec0a082016-01-15 14:49:09 -0800178 FakeNetworkMonitor* GetNetworkMonitor(BasicNetworkManager& network_manager) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700179 RTC_DCHECK_RUN_ON(network_manager.thread_);
honghaizcec0a082016-01-15 14:49:09 -0800180 return static_cast<FakeNetworkMonitor*>(
181 network_manager.network_monitor_.get());
honghaiz023f3ef2015-10-19 09:39:32 -0700182 }
183 void ClearNetworks(BasicNetworkManager& network_manager) {
184 for (const auto& kv : network_manager.networks_map_) {
185 delete kv.second;
186 }
187 network_manager.networks_.clear();
188 network_manager.networks_map_.clear();
189 }
190
Honghai Zhang351d77b2016-05-20 15:08:29 -0700191 AdapterType GetAdapterType(BasicNetworkManager& network_manager) {
192 BasicNetworkManager::NetworkList list;
193 network_manager.GetNetworks(&list);
nissec16fa5e2017-02-07 07:18:43 -0800194 RTC_CHECK_EQ(1, list.size());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700195 return list[0]->type();
196 }
197
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000198#if defined(WEBRTC_POSIX)
199 // Separated from CreateNetworks for tests.
200 static void CallConvertIfAddrs(const BasicNetworkManager& network_manager,
201 struct ifaddrs* interfaces,
202 bool include_ignored,
203 NetworkManager::NetworkList* networks) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700204 RTC_DCHECK_RUN_ON(network_manager.thread_);
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800205 // Use the base IfAddrsConverter for test cases.
jbauch555604a2016-04-26 03:13:22 -0700206 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(new IfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800207 network_manager.ConvertIfAddrs(interfaces, ifaddrs_converter.get(),
208 include_ignored, networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000209 }
honghaizdb8cf502015-12-21 13:08:46 -0800210
211 struct sockaddr_in6* CreateIpv6Addr(const std::string& ip_string,
212 uint32_t scope_id) {
Yves Gerey665174f2018-06-19 15:03:05 +0200213 struct sockaddr_in6* ipv6_addr =
214 static_cast<struct sockaddr_in6*>(malloc(sizeof(struct sockaddr_in6)));
honghaizdb8cf502015-12-21 13:08:46 -0800215 memset(ipv6_addr, 0, sizeof(struct sockaddr_in6));
216 ipv6_addr->sin6_family = AF_INET6;
217 ipv6_addr->sin6_scope_id = scope_id;
218 IPAddress ip;
219 IPFromString(ip_string, &ip);
220 ipv6_addr->sin6_addr = ip.ipv6_address();
221 return ipv6_addr;
222 }
223
224 // Pointers created here need to be released via ReleaseIfAddrs.
225 struct ifaddrs* AddIpv6Address(struct ifaddrs* list,
226 char* if_name,
227 const std::string& ipv6_address,
228 const std::string& ipv6_netmask,
229 uint32_t scope_id) {
230 struct ifaddrs* if_addr = new struct ifaddrs;
231 memset(if_addr, 0, sizeof(struct ifaddrs));
232 if_addr->ifa_name = if_name;
233 if_addr->ifa_addr = reinterpret_cast<struct sockaddr*>(
234 CreateIpv6Addr(ipv6_address, scope_id));
235 if_addr->ifa_netmask =
236 reinterpret_cast<struct sockaddr*>(CreateIpv6Addr(ipv6_netmask, 0));
237 if_addr->ifa_next = list;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800238 if_addr->ifa_flags = IFF_RUNNING;
honghaizdb8cf502015-12-21 13:08:46 -0800239 return if_addr;
240 }
241
Honghai Zhang351d77b2016-05-20 15:08:29 -0700242 struct ifaddrs* InstallIpv6Network(char* if_name,
243 const std::string& ipv6_address,
244 const std::string& ipv6_mask,
245 BasicNetworkManager& network_manager) {
246 ifaddrs* addr_list = nullptr;
247 addr_list = AddIpv6Address(addr_list, if_name, ipv6_address, ipv6_mask, 0);
248 NetworkManager::NetworkList result;
249 bool changed;
250 NetworkManager::Stats stats;
251 CallConvertIfAddrs(network_manager, addr_list, true, &result);
252 network_manager.MergeNetworkList(result, &changed, &stats);
253 return addr_list;
254 }
255
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800256 struct sockaddr_in* CreateIpv4Addr(const std::string& ip_string) {
257 struct sockaddr_in* ipv4_addr =
258 static_cast<struct sockaddr_in*>(malloc(sizeof(struct sockaddr_in)));
259 memset(ipv4_addr, 0, sizeof(struct sockaddr_in));
260 ipv4_addr->sin_family = AF_INET;
261 IPAddress ip;
262 IPFromString(ip_string, &ip);
263 ipv4_addr->sin_addr = ip.ipv4_address();
264 return ipv4_addr;
265 }
266
267 // Pointers created here need to be released via ReleaseIfAddrs.
268 struct ifaddrs* AddIpv4Address(struct ifaddrs* list,
269 char* if_name,
270 const std::string& ipv4_address,
271 const std::string& ipv4_netmask) {
272 struct ifaddrs* if_addr = new struct ifaddrs;
273 memset(if_addr, 0, sizeof(struct ifaddrs));
274 if_addr->ifa_name = if_name;
275 if_addr->ifa_addr =
276 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_address));
277 if_addr->ifa_netmask =
278 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_netmask));
279 if_addr->ifa_next = list;
280 if_addr->ifa_flags = IFF_RUNNING;
281 return if_addr;
282 }
283
284 struct ifaddrs* InstallIpv4Network(char* if_name,
285 const std::string& ipv4_address,
286 const std::string& ipv4_mask,
287 BasicNetworkManager& network_manager) {
288 ifaddrs* addr_list = nullptr;
289 addr_list = AddIpv4Address(addr_list, if_name, ipv4_address, ipv4_mask);
290 NetworkManager::NetworkList result;
291 bool changed;
292 NetworkManager::Stats stats;
293 CallConvertIfAddrs(network_manager, addr_list, true, &result);
294 network_manager.MergeNetworkList(result, &changed, &stats);
295 return addr_list;
296 }
297
honghaizdb8cf502015-12-21 13:08:46 -0800298 void ReleaseIfAddrs(struct ifaddrs* list) {
299 struct ifaddrs* if_addr = list;
300 while (if_addr != nullptr) {
301 struct ifaddrs* next_addr = if_addr->ifa_next;
oprypin1ea631f2017-08-18 00:15:19 -0700302 free(if_addr->ifa_addr);
303 free(if_addr->ifa_netmask);
honghaizdb8cf502015-12-21 13:08:46 -0800304 delete if_addr;
305 if_addr = next_addr;
306 }
307 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000308#endif // defined(WEBRTC_POSIX)
309
310 protected:
311 bool callback_called_;
312};
313
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800314class TestBasicNetworkManager : public BasicNetworkManager {
315 public:
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700316 TestBasicNetworkManager(NetworkMonitorFactory* network_monitor_factory)
317 : BasicNetworkManager(network_monitor_factory) {}
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800318 using BasicNetworkManager::QueryDefaultLocalAddress;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800319 using BasicNetworkManager::set_default_local_addresses;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800320};
321
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000322// Test that the Network ctor works properly.
323TEST_F(NetworkTest, TestNetworkConstruct) {
324 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
325 IPAddress(0x12345600U), 24);
326 EXPECT_EQ("test_eth0", ipv4_network1.name());
327 EXPECT_EQ("Test Network Adapter 1", ipv4_network1.description());
328 EXPECT_EQ(IPAddress(0x12345600U), ipv4_network1.prefix());
329 EXPECT_EQ(24, ipv4_network1.prefix_length());
330 EXPECT_FALSE(ipv4_network1.ignored());
331}
332
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000333TEST_F(NetworkTest, TestIsIgnoredNetworkIgnoresIPsStartingWith0) {
334 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
335 IPAddress(0x12345600U), 24, ADAPTER_TYPE_ETHERNET);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000336 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000337 IPAddress(0x010000U), 24, ADAPTER_TYPE_ETHERNET);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000338 BasicNetworkManager network_manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700339 network_manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000340 EXPECT_FALSE(IsIgnoredNetwork(network_manager, ipv4_network1));
341 EXPECT_TRUE(IsIgnoredNetwork(network_manager, ipv4_network2));
342}
343
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000344// TODO(phoglund): Remove when ignore list goes away.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000345TEST_F(NetworkTest, TestIgnoreList) {
Yves Gerey665174f2018-06-19 15:03:05 +0200346 Network ignore_me("ignore_me", "Ignore me please!", IPAddress(0x12345600U),
347 24);
348 Network include_me("include_me", "Include me please!", IPAddress(0x12345600U),
349 24);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700350 BasicNetworkManager default_network_manager;
351 default_network_manager.StartUpdating();
352 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, ignore_me));
353 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, include_me));
354
355 BasicNetworkManager ignoring_network_manager;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000356 std::vector<std::string> ignore_list;
357 ignore_list.push_back("ignore_me");
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700358 ignoring_network_manager.set_network_ignore_list(ignore_list);
359 ignoring_network_manager.StartUpdating();
360 EXPECT_TRUE(IsIgnoredNetwork(ignoring_network_manager, ignore_me));
361 EXPECT_FALSE(IsIgnoredNetwork(ignoring_network_manager, include_me));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000362}
363
364// Test is failing on Windows opt: b/11288214
365TEST_F(NetworkTest, DISABLED_TestCreateNetworks) {
366 BasicNetworkManager manager;
367 NetworkManager::NetworkList result = GetNetworks(manager, true);
368 // We should be able to bind to any addresses we find.
369 NetworkManager::NetworkList::iterator it;
Yves Gerey665174f2018-06-19 15:03:05 +0200370 for (it = result.begin(); it != result.end(); ++it) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000371 sockaddr_storage storage;
372 memset(&storage, 0, sizeof(storage));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000373 IPAddress ip = (*it)->GetBestIP();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000374 SocketAddress bindaddress(ip, 0);
375 bindaddress.SetScopeID((*it)->scope_id());
Niels Möllerd0b88792021-08-12 10:32:30 +0200376 // TODO(thaloun): Use rtc::Socket once it supports IPv6.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000377 int fd = static_cast<int>(socket(ip.family(), SOCK_STREAM, IPPROTO_TCP));
378 if (fd > 0) {
379 size_t ipsize = bindaddress.ToSockAddrStorage(&storage);
380 EXPECT_GE(ipsize, 0U);
Yves Gerey665174f2018-06-19 15:03:05 +0200381 int success = ::bind(fd, reinterpret_cast<sockaddr*>(&storage),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000382 static_cast<int>(ipsize));
383#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +0100384 if (success)
385 RTC_LOG_GLE(LS_ERROR) << "Socket bind failed.";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000386#endif
387 EXPECT_EQ(0, success);
388#if defined(WEBRTC_WIN)
389 closesocket(fd);
390#else
391 close(fd);
392#endif
393 }
394 delete (*it);
395 }
396}
397
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700398// Test StartUpdating() and StopUpdating(). network_permission_state starts with
399// ALLOWED.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000400TEST_F(NetworkTest, TestUpdateNetworks) {
401 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200402 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
403 &NetworkTest::OnNetworksChanged);
guoweisea1012b2015-08-21 09:06:28 -0700404 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
405 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000406 manager.StartUpdating();
407 Thread::Current()->ProcessMessages(0);
408 EXPECT_TRUE(callback_called_);
409 callback_called_ = false;
410 // Callback should be triggered immediately when StartUpdating
411 // is called, after network update signal is already sent.
412 manager.StartUpdating();
413 EXPECT_TRUE(manager.started());
414 Thread::Current()->ProcessMessages(0);
415 EXPECT_TRUE(callback_called_);
416 manager.StopUpdating();
417 EXPECT_TRUE(manager.started());
418 manager.StopUpdating();
guoweisea1012b2015-08-21 09:06:28 -0700419 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
420 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000421 EXPECT_FALSE(manager.started());
422 manager.StopUpdating();
423 EXPECT_FALSE(manager.started());
424 callback_called_ = false;
425 // Callback should be triggered immediately after StartUpdating is called
426 // when start_count_ is reset to 0.
427 manager.StartUpdating();
428 Thread::Current()->ProcessMessages(0);
429 EXPECT_TRUE(callback_called_);
430}
431
432// Verify that MergeNetworkList() merges network lists properly.
433TEST_F(NetworkTest, TestBasicMergeNetworkList) {
434 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
435 IPAddress(0x12345600U), 24);
436 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
437 IPAddress(0x00010000U), 16);
438 ipv4_network1.AddIP(IPAddress(0x12345678));
439 ipv4_network2.AddIP(IPAddress(0x00010004));
440 BasicNetworkManager manager;
441
442 // Add ipv4_network1 to the list of networks.
443 NetworkManager::NetworkList list;
444 list.push_back(new Network(ipv4_network1));
445 bool changed;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000446 NetworkManager::Stats stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000447 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000448 EXPECT_EQ(stats.ipv6_network_count, 0);
449 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000450 list.clear();
451
452 manager.GetNetworks(&list);
453 EXPECT_EQ(1U, list.size());
Qingsi Wang10a0e512018-05-16 13:37:03 -0700454 EXPECT_TRUE(SameNameAndPrefix(ipv4_network1, *list[0]));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000455 Network* net1 = list[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700456 uint16_t net_id1 = net1->id();
457 EXPECT_EQ(1, net_id1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000458 list.clear();
459
460 // Replace ipv4_network1 with ipv4_network2.
461 list.push_back(new Network(ipv4_network2));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000462 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000463 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000464 EXPECT_EQ(stats.ipv6_network_count, 0);
465 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000466 list.clear();
467
468 manager.GetNetworks(&list);
469 EXPECT_EQ(1U, list.size());
Qingsi Wang10a0e512018-05-16 13:37:03 -0700470 EXPECT_TRUE(SameNameAndPrefix(ipv4_network2, *list[0]));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000471 Network* net2 = list[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700472 uint16_t net_id2 = net2->id();
473 // Network id will increase.
474 EXPECT_LT(net_id1, net_id2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000475 list.clear();
476
477 // Add Network2 back.
478 list.push_back(new Network(ipv4_network1));
479 list.push_back(new Network(ipv4_network2));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000480 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000481 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000482 EXPECT_EQ(stats.ipv6_network_count, 0);
483 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000484 list.clear();
485
486 // Verify that we get previous instances of Network objects.
487 manager.GetNetworks(&list);
488 EXPECT_EQ(2U, list.size());
489 EXPECT_TRUE((net1 == list[0] && net2 == list[1]) ||
490 (net1 == list[1] && net2 == list[0]));
honghaiza0c44ea2016-03-23 16:07:48 -0700491 EXPECT_TRUE((net_id1 == list[0]->id() && net_id2 == list[1]->id()) ||
492 (net_id1 == list[1]->id() && net_id2 == list[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000493 list.clear();
494
495 // Call MergeNetworkList() again and verify that we don't get update
496 // notification.
497 list.push_back(new Network(ipv4_network2));
498 list.push_back(new Network(ipv4_network1));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000499 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000500 EXPECT_FALSE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000501 EXPECT_EQ(stats.ipv6_network_count, 0);
502 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000503 list.clear();
504
505 // Verify that we get previous instances of Network objects.
506 manager.GetNetworks(&list);
507 EXPECT_EQ(2U, list.size());
508 EXPECT_TRUE((net1 == list[0] && net2 == list[1]) ||
509 (net1 == list[1] && net2 == list[0]));
Olga Sharonovaf74d2ce2020-03-30 08:20:05 +0000510 EXPECT_TRUE((net_id1 == list[0]->id() && net_id2 == list[1]->id()) ||
511 (net_id1 == list[1]->id() && net_id2 == list[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000512 list.clear();
513}
514
515// Sets up some test IPv6 networks and appends them to list.
516// Four networks are added - public and link local, for two interfaces.
517void SetupNetworks(NetworkManager::NetworkList* list) {
518 IPAddress ip;
519 IPAddress prefix;
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000520 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:ef12", &ip));
521 EXPECT_TRUE(IPFromString("abcd::", &prefix));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000522 // First, fake link-locals.
523 Network ipv6_eth0_linklocalnetwork("test_eth0", "Test NetworkAdapter 1",
524 prefix, 64);
525 ipv6_eth0_linklocalnetwork.AddIP(ip);
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000526 EXPECT_TRUE(IPFromString("abcd::5678:abcd:ef12:3456", &ip));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000527 Network ipv6_eth1_linklocalnetwork("test_eth1", "Test NetworkAdapter 2",
528 prefix, 64);
529 ipv6_eth1_linklocalnetwork.AddIP(ip);
530 // Public networks:
531 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip));
532 prefix = TruncateIP(ip, 64);
533 Network ipv6_eth0_publicnetwork1_ip1("test_eth0", "Test NetworkAdapter 1",
534 prefix, 64);
535 ipv6_eth0_publicnetwork1_ip1.AddIP(ip);
536 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
537 prefix = TruncateIP(ip, 64);
538 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 1",
539 prefix, 64);
540 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
541 list->push_back(new Network(ipv6_eth0_linklocalnetwork));
542 list->push_back(new Network(ipv6_eth1_linklocalnetwork));
543 list->push_back(new Network(ipv6_eth0_publicnetwork1_ip1));
544 list->push_back(new Network(ipv6_eth1_publicnetwork1_ip1));
545}
546
547// Test that the basic network merging case works.
548TEST_F(NetworkTest, TestIPv6MergeNetworkList) {
549 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200550 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
551 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000552 NetworkManager::NetworkList original_list;
553 SetupNetworks(&original_list);
554 bool changed = false;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000555 NetworkManager::Stats stats =
556 MergeNetworkList(manager, original_list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000557 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000558 EXPECT_EQ(stats.ipv6_network_count, 4);
559 EXPECT_EQ(stats.ipv4_network_count, 0);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000560 NetworkManager::NetworkList list;
561 manager.GetNetworks(&list);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000562 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700563 EXPECT_THAT(list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000564}
565
566// Tests that when two network lists that describe the same set of networks are
567// merged, that the changed callback is not called, and that the original
568// objects remain in the result list.
569TEST_F(NetworkTest, TestNoChangeMerge) {
570 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200571 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
572 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000573 NetworkManager::NetworkList original_list;
574 SetupNetworks(&original_list);
575 bool changed = false;
576 MergeNetworkList(manager, original_list, &changed);
577 EXPECT_TRUE(changed);
578 // Second list that describes the same networks but with new objects.
579 NetworkManager::NetworkList second_list;
580 SetupNetworks(&second_list);
581 changed = false;
582 MergeNetworkList(manager, second_list, &changed);
583 EXPECT_FALSE(changed);
584 NetworkManager::NetworkList resulting_list;
585 manager.GetNetworks(&resulting_list);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000586 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700587 EXPECT_THAT(resulting_list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000588 // Doublecheck that the new networks aren't in the list.
Steve Anton2acd1632019-03-25 13:48:30 -0700589 for (const Network* network : second_list) {
590 EXPECT_THAT(resulting_list, Not(Contains(network)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000591 }
592}
593
594// Test that we can merge a network that is the same as another network but with
595// a different IP. The original network should remain in the list, but have its
596// IP changed.
597TEST_F(NetworkTest, MergeWithChangedIP) {
598 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200599 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
600 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000601 NetworkManager::NetworkList original_list;
602 SetupNetworks(&original_list);
603 // Make a network that we're going to change.
604 IPAddress ip;
605 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip));
606 IPAddress prefix = TruncateIP(ip, 64);
Yves Gerey665174f2018-06-19 15:03:05 +0200607 Network* network_to_change =
608 new Network("test_eth0", "Test Network Adapter 1", prefix, 64);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000609 Network* changed_network = new Network(*network_to_change);
610 network_to_change->AddIP(ip);
611 IPAddress changed_ip;
612 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip));
613 changed_network->AddIP(changed_ip);
614 original_list.push_back(network_to_change);
615 bool changed = false;
616 MergeNetworkList(manager, original_list, &changed);
617 NetworkManager::NetworkList second_list;
618 SetupNetworks(&second_list);
619 second_list.push_back(changed_network);
620 changed = false;
621 MergeNetworkList(manager, second_list, &changed);
622 EXPECT_TRUE(changed);
623 NetworkManager::NetworkList list;
624 manager.GetNetworks(&list);
625 EXPECT_EQ(original_list.size(), list.size());
626 // Make sure the original network is still in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700627 EXPECT_THAT(list, Contains(network_to_change));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000628 EXPECT_EQ(changed_ip, network_to_change->GetIPs().at(0));
629}
630
631// Testing a similar case to above, but checking that a network can be updated
632// with additional IPs (not just a replacement).
633TEST_F(NetworkTest, TestMultipleIPMergeNetworkList) {
634 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200635 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
636 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000637 NetworkManager::NetworkList original_list;
638 SetupNetworks(&original_list);
639 bool changed = false;
640 MergeNetworkList(manager, original_list, &changed);
641 EXPECT_TRUE(changed);
642 IPAddress ip;
643 IPAddress check_ip;
644 IPAddress prefix;
645 // Add a second IP to the public network on eth0 (2401:fa00:4:1000/64).
646 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip));
647 prefix = TruncateIP(ip, 64);
648 Network ipv6_eth0_publicnetwork1_ip2("test_eth0", "Test NetworkAdapter 1",
649 prefix, 64);
650 // This is the IP that already existed in the public network on eth0.
651 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip));
652 ipv6_eth0_publicnetwork1_ip2.AddIP(ip);
653 original_list.push_back(new Network(ipv6_eth0_publicnetwork1_ip2));
654 changed = false;
655 MergeNetworkList(manager, original_list, &changed);
656 EXPECT_TRUE(changed);
657 // There should still be four networks.
658 NetworkManager::NetworkList list;
659 manager.GetNetworks(&list);
660 EXPECT_EQ(4U, list.size());
661 // Check the gathered IPs.
662 int matchcount = 0;
663 for (NetworkManager::NetworkList::iterator it = list.begin();
664 it != list.end(); ++it) {
Qingsi Wang10a0e512018-05-16 13:37:03 -0700665 if (SameNameAndPrefix(**it, *original_list[2])) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000666 ++matchcount;
667 EXPECT_EQ(1, matchcount);
668 // This should be the same network object as before.
669 EXPECT_EQ((*it), original_list[2]);
670 // But with two addresses now.
Steve Anton2acd1632019-03-25 13:48:30 -0700671 EXPECT_THAT((*it)->GetIPs(),
672 UnorderedElementsAre(InterfaceAddress(check_ip),
673 InterfaceAddress(ip)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000674 } else {
675 // Check the IP didn't get added anywhere it wasn't supposed to.
Steve Anton2acd1632019-03-25 13:48:30 -0700676 EXPECT_THAT((*it)->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000677 }
678 }
679}
680
681// Test that merge correctly distinguishes multiple networks on an interface.
682TEST_F(NetworkTest, TestMultiplePublicNetworksOnOneInterfaceMerge) {
683 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200684 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
685 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000686 NetworkManager::NetworkList original_list;
687 SetupNetworks(&original_list);
688 bool changed = false;
689 MergeNetworkList(manager, original_list, &changed);
690 EXPECT_TRUE(changed);
691 IPAddress ip;
692 IPAddress prefix;
693 // A second network for eth0.
694 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip));
695 prefix = TruncateIP(ip, 64);
696 Network ipv6_eth0_publicnetwork2_ip1("test_eth0", "Test NetworkAdapter 1",
697 prefix, 64);
698 ipv6_eth0_publicnetwork2_ip1.AddIP(ip);
699 original_list.push_back(new Network(ipv6_eth0_publicnetwork2_ip1));
700 changed = false;
701 MergeNetworkList(manager, original_list, &changed);
702 EXPECT_TRUE(changed);
703 // There should be five networks now.
704 NetworkManager::NetworkList list;
705 manager.GetNetworks(&list);
706 EXPECT_EQ(5U, list.size());
707 // Check the resulting addresses.
708 for (NetworkManager::NetworkList::iterator it = list.begin();
709 it != list.end(); ++it) {
710 if ((*it)->prefix() == ipv6_eth0_publicnetwork2_ip1.prefix() &&
711 (*it)->name() == ipv6_eth0_publicnetwork2_ip1.name()) {
712 // Check the new network has 1 IP and that it's the correct one.
713 EXPECT_EQ(1U, (*it)->GetIPs().size());
714 EXPECT_EQ(ip, (*it)->GetIPs().at(0));
715 } else {
716 // Check the IP didn't get added anywhere it wasn't supposed to.
Steve Anton2acd1632019-03-25 13:48:30 -0700717 EXPECT_THAT((*it)->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000718 }
719 }
720}
721
honghaizdb8cf502015-12-21 13:08:46 -0800722// Test that DumpNetworks does not crash.
723TEST_F(NetworkTest, TestCreateAndDumpNetworks) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000724 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700725 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800726 NetworkManager::NetworkList list = GetNetworks(manager, true);
727 bool changed;
728 MergeNetworkList(manager, list, &changed);
729 manager.DumpNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000730}
731
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100732TEST_F(NetworkTest, TestIPv6Toggle) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000733 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700734 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000735 bool ipv6_found = false;
736 NetworkManager::NetworkList list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000737 list = GetNetworks(manager, true);
738 for (NetworkManager::NetworkList::iterator it = list.begin();
739 it != list.end(); ++it) {
740 if ((*it)->prefix().family() == AF_INET6) {
741 ipv6_found = true;
742 break;
743 }
744 }
745 EXPECT_TRUE(ipv6_found);
746 for (NetworkManager::NetworkList::iterator it = list.begin();
747 it != list.end(); ++it) {
748 delete (*it);
749 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000750}
751
deadbeef3427f532017-07-26 16:09:33 -0700752// Test that when network interfaces are sorted and given preference values,
753// IPv6 comes first.
754TEST_F(NetworkTest, IPv6NetworksPreferredOverIPv4) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000755 BasicNetworkManager manager;
756 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
757 IPAddress(0x12345600U), 24);
758 ipv4_network1.AddIP(IPAddress(0x12345600U));
759
760 IPAddress ip;
761 IPAddress prefix;
762 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
763 prefix = TruncateIP(ip, 64);
764 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 2",
765 prefix, 64);
766 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
767
768 NetworkManager::NetworkList list;
769 list.push_back(new Network(ipv4_network1));
770 list.push_back(new Network(ipv6_eth1_publicnetwork1_ip1));
771 Network* net1 = list[0];
772 Network* net2 = list[1];
773
774 bool changed = false;
775 MergeNetworkList(manager, list, &changed);
776 ASSERT_TRUE(changed);
777 // After sorting IPv6 network should be higher order than IPv4 networks.
778 EXPECT_TRUE(net1->preference() < net2->preference());
779}
780
deadbeef3427f532017-07-26 16:09:33 -0700781// When two interfaces are equivalent in everything but name, they're expected
782// to be preference-ordered by name. For example, "eth0" before "eth1".
783TEST_F(NetworkTest, NetworksSortedByInterfaceName) {
784 BasicNetworkManager manager;
785 Network* eth0 = new Network("test_eth0", "Test Network Adapter 1",
786 IPAddress(0x65432100U), 24);
787 eth0->AddIP(IPAddress(0x65432100U));
788 Network* eth1 = new Network("test_eth1", "Test Network Adapter 2",
789 IPAddress(0x12345600U), 24);
790 eth1->AddIP(IPAddress(0x12345600U));
791 NetworkManager::NetworkList list;
792 // Add them to the list in the opposite of the expected sorted order, to
793 // ensure sorting actually occurs.
794 list.push_back(eth1);
795 list.push_back(eth0);
796
797 bool changed = false;
798 MergeNetworkList(manager, list, &changed);
799 ASSERT_TRUE(changed);
800 // "test_eth0" should be preferred over "test_eth1".
801 EXPECT_TRUE(eth0->preference() > eth1->preference());
802}
803
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000804TEST_F(NetworkTest, TestNetworkAdapterTypes) {
805 Network wifi("wlan0", "Wireless Adapter", IPAddress(0x12345600U), 24,
806 ADAPTER_TYPE_WIFI);
807 EXPECT_EQ(ADAPTER_TYPE_WIFI, wifi.type());
808 Network ethernet("eth0", "Ethernet", IPAddress(0x12345600U), 24,
809 ADAPTER_TYPE_ETHERNET);
810 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, ethernet.type());
811 Network cellular("test_cell", "Cellular Adapter", IPAddress(0x12345600U), 24,
812 ADAPTER_TYPE_CELLULAR);
813 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, cellular.type());
814 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24,
815 ADAPTER_TYPE_VPN);
816 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
817 Network unknown("test", "Test Adapter", IPAddress(0x12345600U), 24,
818 ADAPTER_TYPE_UNKNOWN);
819 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, unknown.type());
820}
821
822#if defined(WEBRTC_POSIX)
823// Verify that we correctly handle interfaces with no address.
824TEST_F(NetworkTest, TestConvertIfAddrsNoAddress) {
825 ifaddrs list;
826 memset(&list, 0, sizeof(list));
827 list.ifa_name = const_cast<char*>("test_iface");
828
829 NetworkManager::NetworkList result;
830 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700831 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000832 CallConvertIfAddrs(manager, &list, true, &result);
833 EXPECT_TRUE(result.empty());
834}
honghaizdb8cf502015-12-21 13:08:46 -0800835
836// Verify that if there are two addresses on one interface, only one network
837// is generated.
838TEST_F(NetworkTest, TestConvertIfAddrsMultiAddressesOnOneInterface) {
839 char if_name[20] = "rmnet0";
840 ifaddrs* list = nullptr;
841 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:1",
842 "FFFF:FFFF:FFFF:FFFF::", 0);
843 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:2",
844 "FFFF:FFFF:FFFF:FFFF::", 0);
845 NetworkManager::NetworkList result;
846 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700847 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800848 CallConvertIfAddrs(manager, list, true, &result);
849 EXPECT_EQ(1U, result.size());
850 bool changed;
851 // This ensures we release the objects created in CallConvertIfAddrs.
852 MergeNetworkList(manager, result, &changed);
853 ReleaseIfAddrs(list);
854}
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800855
856TEST_F(NetworkTest, TestConvertIfAddrsNotRunning) {
857 ifaddrs list;
858 memset(&list, 0, sizeof(list));
859 list.ifa_name = const_cast<char*>("test_iface");
860 sockaddr ifa_addr;
861 sockaddr ifa_netmask;
862 list.ifa_addr = &ifa_addr;
863 list.ifa_netmask = &ifa_netmask;
864
865 NetworkManager::NetworkList result;
866 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700867 manager.StartUpdating();
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800868 CallConvertIfAddrs(manager, &list, true, &result);
869 EXPECT_TRUE(result.empty());
870}
Honghai Zhang351d77b2016-05-20 15:08:29 -0700871
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700872// Tests that the network type can be determined from the network monitor when
873// it would otherwise be unknown.
Honghai Zhang351d77b2016-05-20 15:08:29 -0700874TEST_F(NetworkTest, TestGetAdapterTypeFromNetworkMonitor) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700875 char if_name[20] = "wifi0";
876 std::string ipv6_address = "1000:2000:3000:4000:0:0:0:1";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700877 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700878 BasicNetworkManager manager_without_monitor;
879 manager_without_monitor.StartUpdating();
880 // A network created without a network monitor will get UNKNOWN type.
881 ifaddrs* addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
882 manager_without_monitor);
883 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, GetAdapterType(manager_without_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700884 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700885
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700886 // With the fake network monitor the type should be correctly determined.
887 FakeNetworkMonitorFactory factory;
888 BasicNetworkManager manager_with_monitor(&factory);
889 manager_with_monitor.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700890 // Add the same ipv6 address as before but it has the right network type
891 // detected by the network monitor now.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700892 addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
893 manager_with_monitor);
894 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700895 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700896}
897
898// Test that the network type can be determined based on name matching in
899// a few cases. Note that UNKNOWN type for non-matching strings has been tested
900// in the above test.
901TEST_F(NetworkTest, TestGetAdapterTypeFromNameMatching) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800902 std::string ipv4_address1 = "192.0.0.121";
903 std::string ipv4_mask = "255.255.255.0";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700904 std::string ipv6_address1 = "1000:2000:3000:4000:0:0:0:1";
905 std::string ipv6_address2 = "1000:2000:3000:8000:0:0:0:1";
906 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
907 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700908 manager.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700909
deadbeef4cd599f2017-07-27 15:05:29 -0700910 // IPSec interface; name is in form "ipsec<index>".
911 char if_name[20] = "ipsec11";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700912 ifaddrs* addr_list =
913 InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
deadbeef4cd599f2017-07-27 15:05:29 -0700914 EXPECT_EQ(ADAPTER_TYPE_VPN, GetAdapterType(manager));
915 ClearNetworks(manager);
916 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700917
Qingsi Wange53ac042018-05-08 11:55:07 -0700918 strcpy(if_name, "lo0");
919 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
920 EXPECT_EQ(ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager));
921 ClearNetworks(manager);
922 ReleaseIfAddrs(addr_list);
923
924 strcpy(if_name, "eth0");
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800925 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
Qingsi Wange53ac042018-05-08 11:55:07 -0700926 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, GetAdapterType(manager));
927 ClearNetworks(manager);
928 ReleaseIfAddrs(addr_list);
929
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700930 strcpy(if_name, "wlan0");
931 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
932 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
933 ClearNetworks(manager);
934 ReleaseIfAddrs(addr_list);
935
deadbeef4cd599f2017-07-27 15:05:29 -0700936#if defined(WEBRTC_IOS)
937 strcpy(if_name, "pdp_ip0");
938 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700939 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
940 ClearNetworks(manager);
941 ReleaseIfAddrs(addr_list);
942
Honghai Zhang63ab8102016-05-26 20:30:15 -0700943 strcpy(if_name, "en0");
944 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
945 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
946 ClearNetworks(manager);
947 ReleaseIfAddrs(addr_list);
948
Honghai Zhang351d77b2016-05-20 15:08:29 -0700949#elif defined(WEBRTC_ANDROID)
deadbeef4cd599f2017-07-27 15:05:29 -0700950 strcpy(if_name, "rmnet0");
951 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700952 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
953 ClearNetworks(manager);
954 ReleaseIfAddrs(addr_list);
955
Honghai Zhang351d77b2016-05-20 15:08:29 -0700956 strcpy(if_name, "v4-rmnet_data0");
957 addr_list = InstallIpv6Network(if_name, ipv6_address2, ipv6_mask, manager);
958 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
959 ClearNetworks(manager);
960 ReleaseIfAddrs(addr_list);
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800961
962 strcpy(if_name, "clat4");
963 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
964 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
965 ClearNetworks(manager);
966 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700967#endif
968}
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700969
970// Test that an adapter won't be included in the network list if there's a
971// network monitor that says it's unavailable.
972TEST_F(NetworkTest, TestNetworkMonitorIsAdapterAvailable) {
973 char if_name1[20] = "pdp_ip0";
974 char if_name2[20] = "pdp_ip1";
975 ifaddrs* list = nullptr;
976 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
977 "FFFF:FFFF:FFFF:FFFF::", 0);
978 list = AddIpv6Address(list, if_name2, "1000:2000:3000:4000:0:0:0:2",
979 "FFFF:FFFF:FFFF:FFFF::", 0);
980 NetworkManager::NetworkList result;
981
982 // Sanity check that both interfaces are included by default.
983 FakeNetworkMonitorFactory factory;
984 BasicNetworkManager manager(&factory);
985 manager.StartUpdating();
986 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
987 EXPECT_EQ(2u, result.size());
988 bool changed;
989 // This ensures we release the objects created in CallConvertIfAddrs.
990 MergeNetworkList(manager, result, &changed);
991 result.clear();
992
993 // Now simulate one interface being unavailable.
994 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
995 network_monitor->set_unavailable_adapters({if_name1});
996 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
997 EXPECT_EQ(1u, result.size());
998 EXPECT_EQ(if_name2, result[0]->name());
999
1000 MergeNetworkList(manager, result, &changed);
1001 ReleaseIfAddrs(list);
1002}
1003
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001004#endif // defined(WEBRTC_POSIX)
1005
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001006// Test MergeNetworkList successfully combines all IPs for the same
1007// prefix/length into a single Network.
1008TEST_F(NetworkTest, TestMergeNetworkList) {
1009 BasicNetworkManager manager;
1010 NetworkManager::NetworkList list;
1011
1012 // Create 2 IPAddress classes with only last digit different.
1013 IPAddress ip1, ip2;
1014 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1015 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2));
1016
1017 // Create 2 networks with the same prefix and length.
1018 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1019 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1020
1021 // Add different IP into each.
1022 net1->AddIP(ip1);
1023 net2->AddIP(ip2);
1024
1025 list.push_back(net1);
1026 list.push_back(net2);
1027 bool changed;
1028 MergeNetworkList(manager, list, &changed);
1029 EXPECT_TRUE(changed);
1030
1031 NetworkManager::NetworkList list2;
1032 manager.GetNetworks(&list2);
1033
1034 // Make sure the resulted networklist has only 1 element and 2
1035 // IPAddresses.
1036 EXPECT_EQ(list2.size(), 1uL);
1037 EXPECT_EQ(list2[0]->GetIPs().size(), 2uL);
Taylor Brandstetter01cb5f22018-03-07 15:49:32 -08001038 EXPECT_EQ(list2[0]->GetIPs()[0], InterfaceAddress(ip1));
1039 EXPECT_EQ(list2[0]->GetIPs()[1], InterfaceAddress(ip2));
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001040}
1041
honghaizdb8cf502015-12-21 13:08:46 -08001042// Test that MergeNetworkList successfully detects the change if
1043// a network becomes inactive and then active again.
1044TEST_F(NetworkTest, TestMergeNetworkListWithInactiveNetworks) {
1045 BasicNetworkManager manager;
1046 Network network1("test_wifi", "Test Network Adapter 1",
1047 IPAddress(0x12345600U), 24);
1048 Network network2("test_eth0", "Test Network Adapter 2",
1049 IPAddress(0x00010000U), 16);
1050 network1.AddIP(IPAddress(0x12345678));
1051 network2.AddIP(IPAddress(0x00010004));
1052 NetworkManager::NetworkList list;
1053 Network* net1 = new Network(network1);
1054 list.push_back(net1);
1055 bool changed;
1056 MergeNetworkList(manager, list, &changed);
1057 EXPECT_TRUE(changed);
1058 list.clear();
1059 manager.GetNetworks(&list);
1060 ASSERT_EQ(1U, list.size());
1061 EXPECT_EQ(net1, list[0]);
1062
1063 list.clear();
1064 Network* net2 = new Network(network2);
1065 list.push_back(net2);
1066 MergeNetworkList(manager, list, &changed);
1067 EXPECT_TRUE(changed);
1068 list.clear();
1069 manager.GetNetworks(&list);
1070 ASSERT_EQ(1U, list.size());
1071 EXPECT_EQ(net2, list[0]);
1072
1073 // Now network1 is inactive. Try to merge it again.
1074 list.clear();
1075 list.push_back(new Network(network1));
1076 MergeNetworkList(manager, list, &changed);
1077 EXPECT_TRUE(changed);
1078 list.clear();
1079 manager.GetNetworks(&list);
1080 ASSERT_EQ(1U, list.size());
1081 EXPECT_TRUE(list[0]->active());
1082 EXPECT_EQ(net1, list[0]);
1083}
1084
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001085// Test that the filtering logic follows the defined ruleset in network.h.
1086TEST_F(NetworkTest, TestIPv6Selection) {
1087 InterfaceAddress ip;
1088 std::string ipstr;
1089
1090 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
1091 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
1092
1093 // Create a network with this prefix.
Yves Gerey665174f2018-06-19 15:03:05 +02001094 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
1095 64);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001096
1097 // When there is no address added, it should return an unspecified
1098 // address.
1099 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1100 EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
1101
1102 // Deprecated one should not be returned.
1103 ipv6_network.AddIP(ip);
1104 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1105
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001106 // Add ULA one. ULA is unique local address which is starting either
1107 // with 0xfc or 0xfd.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001108 ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
1109 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1110 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001111 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001112
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001113 // Add global one.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001114 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
1115 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1116 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001117 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001118
1119 // Add global dynamic temporary one.
1120 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
1121 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
1122 ipv6_network.AddIP(ip);
1123 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1124}
1125
honghaiz023f3ef2015-10-19 09:39:32 -07001126TEST_F(NetworkTest, TestNetworkMonitoring) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001127 FakeNetworkMonitorFactory factory;
1128 BasicNetworkManager manager(&factory);
honghaiz023f3ef2015-10-19 09:39:32 -07001129 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1130 &NetworkTest::OnNetworksChanged);
honghaiz023f3ef2015-10-19 09:39:32 -07001131 manager.StartUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001132 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1133 EXPECT_TRUE(network_monitor && network_monitor->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001134 EXPECT_TRUE_WAIT(callback_called_, 1000);
1135 callback_called_ = false;
1136
1137 // Clear the networks so that there will be network changes below.
1138 ClearNetworks(manager);
1139 // Network manager is started, so the callback is called when the network
1140 // monitor fires the network-change event.
Mirko Bonadei37077932021-07-27 17:00:58 +02001141 network_monitor->InovkeNetworksChangedCallbackForTesting();
honghaiz023f3ef2015-10-19 09:39:32 -07001142 EXPECT_TRUE_WAIT(callback_called_, 1000);
1143
honghaizcec0a082016-01-15 14:49:09 -08001144 // Network manager is stopped.
honghaiz023f3ef2015-10-19 09:39:32 -07001145 manager.StopUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001146 EXPECT_FALSE(GetNetworkMonitor(manager)->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001147}
1148
Edward Lemur8dc945c2016-07-21 10:16:40 +02001149// Fails on Android: https://bugs.chromium.org/p/webrtc/issues/detail?id=4364.
1150#if defined(WEBRTC_ANDROID)
1151#define MAYBE_DefaultLocalAddress DISABLED_DefaultLocalAddress
1152#else
1153#define MAYBE_DefaultLocalAddress DefaultLocalAddress
1154#endif
1155TEST_F(NetworkTest, MAYBE_DefaultLocalAddress) {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001156 IPAddress ip;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001157 FakeNetworkMonitorFactory factory;
1158 TestBasicNetworkManager manager(&factory);
guoweis56271ed2016-01-15 14:45:06 -08001159 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1160 &NetworkTest::OnNetworksChanged);
guoweis56271ed2016-01-15 14:45:06 -08001161 manager.StartUpdating();
1162 EXPECT_TRUE_WAIT(callback_called_, 1000);
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001163
1164 // Make sure we can query default local address when an address for such
1165 // address family exists.
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001166 std::vector<Network*> networks;
1167 manager.GetNetworks(&networks);
guoweis56271ed2016-01-15 14:45:06 -08001168 EXPECT_TRUE(!networks.empty());
Steve Anton9de3aac2017-10-24 10:08:26 -07001169 for (const auto* network : networks) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001170 if (network->GetBestIP().family() == AF_INET) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001171 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET) != IPAddress());
guoweis56271ed2016-01-15 14:45:06 -08001172 } else if (network->GetBestIP().family() == AF_INET6 &&
1173 !IPIsLoopback(network->GetBestIP())) {
1174 // Existence of an IPv6 loopback address doesn't mean it has IPv6 network
1175 // enabled.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001176 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET6) != IPAddress());
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001177 }
1178 }
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001179
1180 // GetDefaultLocalAddress should return the valid default address after set.
1181 manager.set_default_local_addresses(GetLoopbackIP(AF_INET),
1182 GetLoopbackIP(AF_INET6));
1183 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET, &ip));
1184 EXPECT_EQ(ip, GetLoopbackIP(AF_INET));
1185 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1186 EXPECT_EQ(ip, GetLoopbackIP(AF_INET6));
honghaizaf83fe62016-04-18 14:50:44 -07001187
1188 // More tests on GetDefaultLocalAddress with ipv6 addresses where the set
1189 // default address may be different from the best IP address of any network.
1190 InterfaceAddress ip1;
1191 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:1111",
1192 IPV6_ADDRESS_FLAG_TEMPORARY, &ip1));
1193 // Create a network with a prefix of ip1.
1194 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip1, 64),
1195 64);
1196 IPAddress ip2;
1197 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:2222", &ip2));
1198 ipv6_network.AddIP(ip1);
1199 ipv6_network.AddIP(ip2);
1200 BasicNetworkManager::NetworkList list(1, new Network(ipv6_network));
1201 bool changed;
1202 MergeNetworkList(manager, list, &changed);
1203 // If the set default address is not in any network, GetDefaultLocalAddress
1204 // should return it.
1205 IPAddress ip3;
1206 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:3333", &ip3));
1207 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip3);
1208 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1209 EXPECT_EQ(ip3, ip);
1210 // If the set default address is in a network, GetDefaultLocalAddress will
1211 // return the best IP in that network.
1212 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip2);
1213 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1214 EXPECT_EQ(static_cast<IPAddress>(ip1), ip);
1215
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001216 manager.StopUpdating();
1217}
1218
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001219// Test that MergeNetworkList does not set change = true
1220// when changing from cellular_X to cellular_Y.
1221TEST_F(NetworkTest, TestWhenNetworkListChangeReturnsChangedFlag) {
1222 BasicNetworkManager manager;
1223
1224 IPAddress ip1;
1225 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1226 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1227 net1->set_type(ADAPTER_TYPE_CELLULAR_3G);
1228 net1->AddIP(ip1);
1229 NetworkManager::NetworkList list;
1230 list.push_back(net1);
1231
1232 {
1233 bool changed;
1234 MergeNetworkList(manager, list, &changed);
1235 EXPECT_TRUE(changed);
1236 NetworkManager::NetworkList list2;
1237 manager.GetNetworks(&list2);
1238 EXPECT_EQ(list2.size(), 1uL);
1239 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_3G, list2[0]->type());
1240 }
1241
1242 // Modify net1 from 3G to 4G
1243 {
1244 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1245 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1246 net2->AddIP(ip1);
1247 list.clear();
1248 list.push_back(net2);
1249 bool changed;
1250 MergeNetworkList(manager, list, &changed);
1251
1252 // Change from 3G to 4G shall not trigger OnNetworksChanged,
1253 // i.e changed = false.
1254 EXPECT_FALSE(changed);
1255 NetworkManager::NetworkList list2;
1256 manager.GetNetworks(&list2);
1257 ASSERT_EQ(list2.size(), 1uL);
1258 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1259 }
1260
1261 // Don't modify.
1262 {
1263 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1264 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1265 net2->AddIP(ip1);
1266 list.clear();
1267 list.push_back(net2);
1268 bool changed;
1269 MergeNetworkList(manager, list, &changed);
1270
1271 // No change.
1272 EXPECT_FALSE(changed);
1273 NetworkManager::NetworkList list2;
1274 manager.GetNetworks(&list2);
1275 ASSERT_EQ(list2.size(), 1uL);
1276 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1277 }
1278}
1279
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001280#if defined(WEBRTC_POSIX)
1281TEST_F(NetworkTest, IgnoresMACBasedIPv6Address) {
1282 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1283 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
1284 BasicNetworkManager manager;
1285 manager.StartUpdating();
1286
1287 // IPSec interface; name is in form "ipsec<index>".
1288 char if_name[20] = "ipsec11";
1289 ifaddrs* addr_list =
1290 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1291
1292 BasicNetworkManager::NetworkList list;
1293 manager.GetNetworks(&list);
1294 EXPECT_EQ(list.size(), 0u);
1295 ReleaseIfAddrs(addr_list);
1296}
1297
1298TEST_F(NetworkTest, WebRTC_AllowMACBasedIPv6Address) {
1299 webrtc::test::ScopedFieldTrials field_trials(
1300 "WebRTC-AllowMACBasedIPv6/Enabled/");
1301 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1302 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
1303 BasicNetworkManager manager;
1304 manager.StartUpdating();
1305
1306 // IPSec interface; name is in form "ipsec<index>".
1307 char if_name[20] = "ipsec11";
1308 ifaddrs* addr_list =
1309 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1310
1311 BasicNetworkManager::NetworkList list;
1312 manager.GetNetworks(&list);
1313 EXPECT_EQ(list.size(), 1u);
1314 ReleaseIfAddrs(addr_list);
1315}
1316#endif
1317
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001318#if defined(WEBRTC_POSIX)
1319TEST_F(NetworkTest, WebRTC_BindUsingInterfaceName) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001320 char if_name1[20] = "wlan0";
1321 char if_name2[20] = "v4-wlan0";
1322 ifaddrs* list = nullptr;
1323 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
1324 "FFFF:FFFF:FFFF:FFFF::", 0);
1325 list = AddIpv4Address(list, if_name2, "192.168.0.2", "255.255.255.255");
1326 NetworkManager::NetworkList result;
1327
1328 // Sanity check that both interfaces are included by default.
1329 FakeNetworkMonitorFactory factory;
1330 BasicNetworkManager manager(&factory);
1331 manager.StartUpdating();
1332 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1333 EXPECT_EQ(2u, result.size());
1334 ReleaseIfAddrs(list);
1335 bool changed;
1336 // This ensures we release the objects created in CallConvertIfAddrs.
1337 MergeNetworkList(manager, result, &changed);
1338 result.clear();
1339
1340 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1341
1342 IPAddress ipv6;
1343 EXPECT_TRUE(IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6));
1344 IPAddress ipv4;
1345 EXPECT_TRUE(IPFromString("192.168.0.2", &ipv4));
1346
1347 // The network monitor only knwos about the ipv6 address, interface.
1348 network_monitor->set_adapters({"wlan0"});
1349 network_monitor->set_ip_addresses({ipv6});
1350 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv6),
1351 NetworkBindingResult::SUCCESS);
1352
1353 // But it will bind anyway using string matching...
1354 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv4),
1355 NetworkBindingResult::SUCCESS);
1356}
1357#endif
1358
Jonas Orelandb477fc72021-08-23 12:16:33 +02001359TEST_F(NetworkTest, NetworkCostVpn_Default) {
1360 IPAddress ip1;
1361 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1362
1363 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1364 net1->set_type(ADAPTER_TYPE_VPN);
1365 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1366
1367 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1368 net2->set_type(ADAPTER_TYPE_ETHERNET);
1369
1370 EXPECT_EQ(net1->GetCost(), net2->GetCost());
1371 delete net1;
1372 delete net2;
1373}
1374
1375TEST_F(NetworkTest, NetworkCostVpn_VpnMoreExpensive) {
1376 webrtc::test::ScopedFieldTrials field_trials(
1377 "WebRTC-AddNetworkCostToVpn/Enabled/");
1378
1379 IPAddress ip1;
1380 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1381
1382 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1383 net1->set_type(ADAPTER_TYPE_VPN);
1384 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1385
1386 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1387 net2->set_type(ADAPTER_TYPE_ETHERNET);
1388
1389 EXPECT_GT(net1->GetCost(), net2->GetCost());
1390 delete net1;
1391 delete net2;
1392}
1393
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001394TEST_F(NetworkTest, VpnList) {
1395 {
1396 BasicNetworkManager manager;
1397 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1398 manager.StartUpdating();
1399 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1400 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.12.1"), 24));
1401 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 16));
1402 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 24));
1403 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.1.1"), 32));
1404 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.0.0"), 16));
1405 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 15));
1406 }
1407 {
1408 BasicNetworkManager manager;
1409 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 24)});
1410 manager.StartUpdating();
1411 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1412 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.1"), 32));
1413 }
1414}
1415
1416#if defined(WEBRTC_POSIX)
1417// TODO(webrtc:13114): Implement the InstallIpv4Network for windows.
1418TEST_F(NetworkTest, VpnListOverrideAdapterType) {
1419 BasicNetworkManager manager;
1420 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1421 manager.StartUpdating();
1422
1423 char if_name[20] = "eth0";
1424 auto addr_list =
1425 InstallIpv4Network(if_name, "192.168.1.23", "255.255.255.255", manager);
1426
1427 BasicNetworkManager::NetworkList list;
1428 manager.GetNetworks(&list);
1429 ASSERT_EQ(1u, list.size());
1430 EXPECT_EQ(ADAPTER_TYPE_VPN, list[0]->type());
1431 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, list[0]->underlying_type_for_vpn());
1432 ClearNetworks(manager);
1433 ReleaseIfAddrs(addr_list);
1434}
1435#endif // defined(WEBRTC_POSIX)
1436
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001437} // namespace rtc