blob: ce79fe40ce53a3b7efe4d5d5a87f79b5864eab0c [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
Ali Tofigh7fa90572022-03-17 15:47:49 +010013#include "absl/strings/string_view.h"
Diep Buia5d80a72022-08-26 15:35:54 +000014#include "rtc_base/experiments/field_trial_parser.h"
Ali Tofigh7fa90572022-03-17 15:47:49 +010015
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000016#if defined(WEBRTC_POSIX)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#include <net/if.h>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000018#endif // WEBRTC_POSIX
19
20#if defined(WEBRTC_WIN)
Mirko Bonadei01914412018-03-23 16:30:58 +010021#include <iphlpapi.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020022
Yves Gerey665174f2018-06-19 15:03:05 +020023#include "rtc_base/win32.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080024#elif !defined(__native_client__)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020025#include "rtc_base/ifaddrs_converter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000026#endif
27
jbauch555604a2016-04-26 03:13:22 -070028#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000029
Steve Anton2acd1632019-03-25 13:48:30 -070030#include "absl/algorithm/container.h"
Niels Möllerd959f3a2022-04-19 11:29:19 +020031#include "absl/memory/memory.h"
Steve Anton2acd1632019-03-25 13:48:30 -070032#include "absl/strings/match.h"
33#include "absl/strings/string_view.h"
Danil Chapovalov5286dcf2022-07-18 17:04:56 +020034#include "api/task_queue/pending_task_safety_flag.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020035#include "api/transport/field_trial_based_config.h"
Danil Chapovalov5286dcf2022-07-18 17:04:56 +020036#include "api/units/time_delta.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020037#include "rtc_base/checks.h"
38#include "rtc_base/logging.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020039#include "rtc_base/memory/always_valid_pointer.h"
Steve Anton10542f22019-01-11 09:11:00 -080040#include "rtc_base/network_monitor.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020041#include "rtc_base/socket.h" // includes something that makes windows happy
Steve Anton10542f22019-01-11 09:11:00 -080042#include "rtc_base/string_encode.h"
43#include "rtc_base/string_utils.h"
Jonas Olsson366a50c2018-09-06 13:41:30 +020044#include "rtc_base/strings/string_builder.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020045#include "rtc_base/thread.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000046
47namespace rtc {
48namespace {
Danil Chapovalov5286dcf2022-07-18 17:04:56 +020049using ::webrtc::SafeTask;
50using ::webrtc::TimeDelta;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000051
Jonas Orelandac554eb2021-08-27 09:43:38 +020052// List of MAC addresses of known VPN (for windows).
53constexpr uint8_t kVpns[2][6] = {
54 // Cisco AnyConnect.
55 {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0},
56 // GlobalProtect Virtual Ethernet.
57 {0x2, 0x50, 0x41, 0x0, 0x0, 0x1},
58};
59
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000060// Fetch list of networks every two seconds.
61const int kNetworksUpdateIntervalMs = 2000;
62
63const int kHighestNetworkPreference = 127;
64
Niels Möllerd959f3a2022-04-19 11:29:19 +020065struct AddressList {
66 std::unique_ptr<Network> net;
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +000067 std::vector<InterfaceAddress> ips;
Niels Möllerd959f3a2022-04-19 11:29:19 +020068};
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000069
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000070bool SortNetworks(const Network* a, const Network* b) {
71 // Network types will be preferred above everything else while sorting
72 // Networks.
73
74 // Networks are sorted first by type.
75 if (a->type() != b->type()) {
76 return a->type() < b->type();
77 }
78
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000079 IPAddress ip_a = a->GetBestIP();
80 IPAddress ip_b = b->GetBestIP();
81
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000082 // After type, networks are sorted by IP address precedence values
83 // from RFC 3484-bis
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000084 if (IPAddressPrecedence(ip_a) != IPAddressPrecedence(ip_b)) {
85 return IPAddressPrecedence(ip_a) > IPAddressPrecedence(ip_b);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000086 }
87
88 // TODO(mallinath) - Add VPN and Link speed conditions while sorting.
89
90 // Networks are sorted last by key.
deadbeef3427f532017-07-26 16:09:33 -070091 return a->key() < b->key();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000092}
93
Jonas Oreland2105d642020-05-13 10:15:34 +020094uint16_t ComputeNetworkCostByType(int type,
Jonas Orelandb477fc72021-08-23 12:16:33 +020095 bool is_vpn,
96 bool use_differentiated_cellular_costs,
97 bool add_network_cost_to_vpn) {
Jonas Oreland08d18062020-04-02 07:19:12 +020098 // TODO(jonaso) : Rollout support for cellular network cost using A/B
99 // experiment to make sure it does not introduce regressions.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200100 int vpnCost = (is_vpn && add_network_cost_to_vpn) ? kNetworkCostVpn : 0;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700101 switch (type) {
102 case rtc::ADAPTER_TYPE_ETHERNET:
103 case rtc::ADAPTER_TYPE_LOOPBACK:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200104 return kNetworkCostMin + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700105 case rtc::ADAPTER_TYPE_WIFI:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200106 return kNetworkCostLow + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700107 case rtc::ADAPTER_TYPE_CELLULAR:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200108 return kNetworkCostCellular + vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200109 case rtc::ADAPTER_TYPE_CELLULAR_2G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200110 return (use_differentiated_cellular_costs ? kNetworkCostCellular2G
111 : kNetworkCostCellular) +
112 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200113 case rtc::ADAPTER_TYPE_CELLULAR_3G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200114 return (use_differentiated_cellular_costs ? kNetworkCostCellular3G
115 : kNetworkCostCellular) +
116 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200117 case rtc::ADAPTER_TYPE_CELLULAR_4G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200118 return (use_differentiated_cellular_costs ? kNetworkCostCellular4G
119 : kNetworkCostCellular) +
120 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200121 case rtc::ADAPTER_TYPE_CELLULAR_5G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200122 return (use_differentiated_cellular_costs ? kNetworkCostCellular5G
123 : kNetworkCostCellular) +
124 vpnCost;
Qingsi Wang9f1de692018-06-28 15:38:09 -0700125 case rtc::ADAPTER_TYPE_ANY:
126 // Candidates gathered from the any-address/wildcard ports, as backups,
127 // are given the maximum cost so that if there are other candidates with
128 // known interface types, we would not select candidate pairs using these
129 // backup candidates if other selection criteria with higher precedence
130 // (network conditions over the route) are the same. Note that setting the
131 // cost to kNetworkCostUnknown would be problematic since
132 // ADAPTER_TYPE_CELLULAR would then have a higher cost. See
133 // P2PTransportChannel::SortConnectionsAndUpdateState for how we rank and
134 // select candidate pairs, where the network cost is among the criteria.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200135 return kNetworkCostMax + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700136 case rtc::ADAPTER_TYPE_VPN:
137 // The cost of a VPN should be computed using its underlying network type.
Artem Titovd3251962021-11-15 16:57:07 +0100138 RTC_DCHECK_NOTREACHED();
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700139 return kNetworkCostUnknown;
140 default:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200141 return kNetworkCostUnknown + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700142 }
143}
144
thakis06689a12015-12-30 15:05:30 -0800145#if !defined(__native_client__)
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100146bool IsIgnoredIPv6(bool allow_mac_based_ipv6, const InterfaceAddress& ip) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000147 if (ip.family() != AF_INET6) {
148 return false;
149 }
150
151 // Link-local addresses require scope id to be bound successfully.
152 // However, our IPAddress structure doesn't carry that so the
153 // information is lost and causes binding failure.
154 if (IPIsLinkLocal(ip)) {
155 return true;
156 }
157
158 // Any MAC based IPv6 should be avoided to prevent the MAC tracking.
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100159 if (IPIsMacBased(ip) && !allow_mac_based_ipv6) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000160 return true;
161 }
162
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800163 // Ignore deprecated IPv6.
164 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED) {
165 return true;
166 }
167
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000168 return false;
169}
thakis06689a12015-12-30 15:05:30 -0800170#endif // !defined(__native_client__)
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000171
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200172// Note: consider changing to const Network* as arguments
173// if/when considering other changes that should not trigger
174// OnNetworksChanged.
175bool ShouldAdapterChangeTriggerNetworkChange(rtc::AdapterType old_type,
176 rtc::AdapterType new_type) {
177 // skip triggering OnNetworksChanged if
178 // changing from one cellular to another.
179 if (Network::IsCellular(old_type) && Network::IsCellular(new_type))
180 return false;
181 return true;
182}
183
Diep Buia5d80a72022-08-26 15:35:54 +0000184bool PreferGlobalIPv6Address(const webrtc::FieldTrialsView* field_trials) {
185 // Bug fix to prefer global IPv6 address over link local.
186 // Field trial key reserved in bugs.webrtc.org/14334
187 if (field_trials &&
188 field_trials->IsEnabled("WebRTC-IPv6NetworkResolutionFixes")) {
189 webrtc::FieldTrialParameter<bool> prefer_global_ipv6_address_enabled(
190 "PreferGlobalIPv6Address", false);
191 webrtc::ParseFieldTrial(
192 {&prefer_global_ipv6_address_enabled},
193 field_trials->Lookup("WebRTC-IPv6NetworkResolutionFixes"));
194 return prefer_global_ipv6_address_enabled;
195 }
196 return false;
197}
198
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000199} // namespace
200
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800201// These addresses are used as the targets to find out the default local address
202// on a multi-homed endpoint. They are actually DNS servers.
203const char kPublicIPv4Host[] = "8.8.8.8";
204const char kPublicIPv6Host[] = "2001:4860:4860::8888";
205const int kPublicPort = 53; // DNS port.
206
Mirko Bonadei13f9c622022-04-29 16:38:32 +0200207namespace webrtc_network_internal {
208bool CompareNetworks(const std::unique_ptr<Network>& a,
209 const std::unique_ptr<Network>& b) {
210 if (a->prefix_length() != b->prefix_length()) {
211 return a->prefix_length() < b->prefix_length();
212 }
213 if (a->name() != b->name()) {
214 return a->name() < b->name();
215 }
216 return a->prefix() < b->prefix();
217}
218} // namespace webrtc_network_internal
219
Ali Tofigh7fa90572022-03-17 15:47:49 +0100220std::string MakeNetworkKey(absl::string_view name,
Yves Gerey665174f2018-06-19 15:03:05 +0200221 const IPAddress& prefix,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000222 int prefix_length) {
Jonas Olsson366a50c2018-09-06 13:41:30 +0200223 rtc::StringBuilder ost;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000224 ost << name << "%" << prefix.ToString() << "/" << prefix_length;
Jonas Olsson84df1c72018-09-14 16:59:32 +0200225 return ost.Release();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000226}
Qingsi Wange53ac042018-05-08 11:55:07 -0700227// Test if the network name matches the type<number> pattern, e.g. eth0. The
228// matching is case-sensitive.
Steve Anton2acd1632019-03-25 13:48:30 -0700229bool MatchTypeNameWithIndexPattern(absl::string_view network_name,
230 absl::string_view type_name) {
231 if (!absl::StartsWith(network_name, type_name)) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700232 return false;
233 }
Steve Anton2acd1632019-03-25 13:48:30 -0700234 return absl::c_none_of(network_name.substr(type_name.size()),
235 [](char c) { return !isdigit(c); });
Qingsi Wange53ac042018-05-08 11:55:07 -0700236}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000237
Qingsi Wange53ac042018-05-08 11:55:07 -0700238// A cautious note that this method may not provide an accurate adapter type
239// based on the string matching. Incorrect type of adapters can affect the
240// result of the downstream network filtering, see e.g.
241// BasicPortAllocatorSession::GetNetworks when
242// PORTALLOCATOR_DISABLE_COSTLY_NETWORKS is turned on.
Ali Tofigh2ab914c2022-04-13 12:55:15 +0200243AdapterType GetAdapterTypeFromName(absl::string_view network_name) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700244 if (MatchTypeNameWithIndexPattern(network_name, "lo")) {
245 // Note that we have a more robust way to determine if a network interface
246 // is a loopback interface by checking the flag IFF_LOOPBACK in ifa_flags of
247 // an ifaddr struct. See ConvertIfAddrs in this file.
248 return ADAPTER_TYPE_LOOPBACK;
249 }
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700250
Qingsi Wange53ac042018-05-08 11:55:07 -0700251 if (MatchTypeNameWithIndexPattern(network_name, "eth")) {
252 return ADAPTER_TYPE_ETHERNET;
253 }
254
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000255 if (MatchTypeNameWithIndexPattern(network_name, "wlan") ||
256 MatchTypeNameWithIndexPattern(network_name, "v4-wlan")) {
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700257 return ADAPTER_TYPE_WIFI;
258 }
259
Qingsi Wange53ac042018-05-08 11:55:07 -0700260 if (MatchTypeNameWithIndexPattern(network_name, "ipsec") ||
261 MatchTypeNameWithIndexPattern(network_name, "tun") ||
262 MatchTypeNameWithIndexPattern(network_name, "utun") ||
263 MatchTypeNameWithIndexPattern(network_name, "tap")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800264 return ADAPTER_TYPE_VPN;
265 }
266#if defined(WEBRTC_IOS)
267 // Cell networks are pdp_ipN on iOS.
Qingsi Wange53ac042018-05-08 11:55:07 -0700268 if (MatchTypeNameWithIndexPattern(network_name, "pdp_ip")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800269 return ADAPTER_TYPE_CELLULAR;
270 }
Qingsi Wange53ac042018-05-08 11:55:07 -0700271 if (MatchTypeNameWithIndexPattern(network_name, "en")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800272 // This may not be most accurate because sometimes Ethernet interface
273 // name also starts with "en" but it is better than showing it as
274 // "unknown" type.
275 // TODO(honghaiz): Write a proper IOS network manager.
276 return ADAPTER_TYPE_WIFI;
277 }
278#elif defined(WEBRTC_ANDROID)
Qingsi Wange53ac042018-05-08 11:55:07 -0700279 if (MatchTypeNameWithIndexPattern(network_name, "rmnet") ||
280 MatchTypeNameWithIndexPattern(network_name, "rmnet_data") ||
281 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet") ||
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800282 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet_data") ||
Artem Titovb555e832022-09-19 09:07:32 +0200283 MatchTypeNameWithIndexPattern(network_name, "clat") ||
284 MatchTypeNameWithIndexPattern(network_name, "ccmni")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800285 return ADAPTER_TYPE_CELLULAR;
286 }
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800287#endif
288
289 return ADAPTER_TYPE_UNKNOWN;
290}
291
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700292NetworkManager::EnumerationPermission NetworkManager::enumeration_permission()
293 const {
guoweisea1012b2015-08-21 09:06:28 -0700294 return ENUMERATION_ALLOWED;
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700295}
296
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800297bool NetworkManager::GetDefaultLocalAddress(int family, IPAddress* addr) const {
298 return false;
299}
300
Qingsi Wang7852d292018-10-31 11:17:07 -0700301webrtc::MdnsResponderInterface* NetworkManager::GetMdnsResponder() const {
Qingsi Wang09619332018-09-12 22:51:55 -0700302 return nullptr;
303}
304
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200305NetworkManagerBase::NetworkManagerBase(
Jonas Orelande62c2f22022-03-29 11:04:48 +0200306 const webrtc::FieldTrialsView* field_trials)
Diep Bui1e589eb2022-08-02 07:37:30 +0000307 : field_trials_(field_trials),
308 enumeration_permission_(NetworkManager::ENUMERATION_ALLOWED),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200309 signal_network_preference_change_(
310 field_trials
311 ? field_trials->IsEnabled("WebRTC-SignalNetworkPreferenceChange")
312 : false) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000313
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700314NetworkManager::EnumerationPermission
315NetworkManagerBase::enumeration_permission() const {
316 return enumeration_permission_;
317}
318
Diep Bui3d9b5592022-11-17 21:25:49 +0000319std::unique_ptr<Network> NetworkManagerBase::CreateNetwork(
320 absl::string_view name,
321 absl::string_view description,
322 const IPAddress& prefix,
323 int prefix_length,
324 AdapterType type) const {
325 return std::make_unique<Network>(name, description, prefix, prefix_length,
326 type, field_trials_.get());
327}
328
Niels Möller22211442022-04-07 11:43:28 +0200329std::vector<const Network*> NetworkManagerBase::GetAnyAddressNetworks() {
330 std::vector<const Network*> networks;
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000331 if (!ipv4_any_address_network_) {
332 const rtc::IPAddress ipv4_any_address(INADDR_ANY);
Diep Bui3d9b5592022-11-17 21:25:49 +0000333 ipv4_any_address_network_ =
334 CreateNetwork("any", "any", ipv4_any_address, 0, ADAPTER_TYPE_ANY);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800335 ipv4_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800336 ipv4_any_address_network_->set_mdns_responder_provider(this);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000337 ipv4_any_address_network_->AddIP(ipv4_any_address);
338 }
Niels Möller22211442022-04-07 11:43:28 +0200339 networks.push_back(ipv4_any_address_network_.get());
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000340
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100341 if (!ipv6_any_address_network_) {
342 const rtc::IPAddress ipv6_any_address(in6addr_any);
Diep Bui3d9b5592022-11-17 21:25:49 +0000343 ipv6_any_address_network_ =
344 CreateNetwork("any", "any", ipv6_any_address, 0, ADAPTER_TYPE_ANY);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100345 ipv6_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800346 ipv6_any_address_network_->set_mdns_responder_provider(this);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100347 ipv6_any_address_network_->AddIP(ipv6_any_address);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000348 }
Niels Möller22211442022-04-07 11:43:28 +0200349 networks.push_back(ipv6_any_address_network_.get());
350 return networks;
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000351}
352
Niels Möller22211442022-04-07 11:43:28 +0200353std::vector<const Network*> NetworkManagerBase::GetNetworks() const {
354 std::vector<const Network*> result;
355 result.insert(result.begin(), networks_.begin(), networks_.end());
356 return result;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000357}
358
Niels Möllerd959f3a2022-04-19 11:29:19 +0200359void NetworkManagerBase::MergeNetworkList(
360 std::vector<std::unique_ptr<Network>> new_networks,
361 bool* changed) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000362 NetworkManager::Stats stats;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200363 MergeNetworkList(std::move(new_networks), changed, &stats);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000364}
365
Niels Möllerd959f3a2022-04-19 11:29:19 +0200366void NetworkManagerBase::MergeNetworkList(
367 std::vector<std::unique_ptr<Network>> new_networks,
368 bool* changed,
369 NetworkManager::Stats* stats) {
honghaizdb8cf502015-12-21 13:08:46 -0800370 *changed = false;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000371 // AddressList in this map will track IP addresses for all Networks
372 // with the same key.
373 std::map<std::string, AddressList> consolidated_address_list;
Mirko Bonadei13f9c622022-04-29 16:38:32 +0200374 absl::c_sort(new_networks, rtc::webrtc_network_internal::CompareNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000375 // First, build a set of network-keys to the ipaddresses.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200376 for (auto& network : new_networks) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000377 bool might_add_to_merged_list = false;
Yves Gerey665174f2018-06-19 15:03:05 +0200378 std::string key = MakeNetworkKey(network->name(), network->prefix(),
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000379 network->prefix_length());
Niels Möllerd959f3a2022-04-19 11:29:19 +0200380 const std::vector<InterfaceAddress>& addresses = network->GetIPs();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000381 if (consolidated_address_list.find(key) ==
382 consolidated_address_list.end()) {
383 AddressList addrlist;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200384 addrlist.net = std::move(network);
385 consolidated_address_list[key] = std::move(addrlist);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000386 might_add_to_merged_list = true;
387 }
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000388 AddressList& current_list = consolidated_address_list[key];
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000389 for (const InterfaceAddress& address : addresses) {
390 current_list.ips.push_back(address);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000391 }
Niels Möllerd959f3a2022-04-19 11:29:19 +0200392 if (might_add_to_merged_list) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000393 if (current_list.ips[0].family() == AF_INET) {
394 stats->ipv4_network_count++;
395 } else {
nisseede5da42017-01-12 05:15:36 -0800396 RTC_DCHECK(current_list.ips[0].family() == AF_INET6);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000397 stats->ipv6_network_count++;
398 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000399 }
400 }
401
402 // Next, look for existing network objects to re-use.
honghaizdb8cf502015-12-21 13:08:46 -0800403 // Result of Network merge. Element in this list should have unique key.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200404 std::vector<Network*> merged_list;
405 for (auto& kv : consolidated_address_list) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000406 const std::string& key = kv.first;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200407 std::unique_ptr<Network> net = std::move(kv.second.net);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000408 auto existing = networks_map_.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000409 if (existing == networks_map_.end()) {
Niels Möllerd959f3a2022-04-19 11:29:19 +0200410 // This network is new.
honghaiza0c44ea2016-03-23 16:07:48 -0700411 net->set_id(next_available_network_id_++);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200412 // We might have accumulated IPAddresses from the first
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000413 // step, set it here.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000414 net->SetIPs(kv.second.ips, true);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200415 // Place it in the network map.
416 merged_list.push_back(net.get());
417 networks_map_[key] = std::move(net);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000418 *changed = true;
419 } else {
420 // This network exists in the map already. Reset its IP addresses.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200421 Network* existing_net = existing->second.get();
honghaizdb8cf502015-12-21 13:08:46 -0800422 *changed = existing_net->SetIPs(kv.second.ips, *changed);
423 merged_list.push_back(existing_net);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700424 if (net->type() != ADAPTER_TYPE_UNKNOWN &&
425 net->type() != existing_net->type()) {
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200426 if (ShouldAdapterChangeTriggerNetworkChange(existing_net->type(),
427 net->type())) {
428 *changed = true;
429 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700430 existing_net->set_type(net->type());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700431 }
honghaizdb8cf502015-12-21 13:08:46 -0800432 // If the existing network was not active, networks have changed.
433 if (!existing_net->active()) {
434 *changed = true;
435 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200436 if (net->network_preference() != existing_net->network_preference()) {
437 existing_net->set_network_preference(net->network_preference());
438 if (signal_network_preference_change_) {
439 *changed = true;
440 }
441 }
nisseede5da42017-01-12 05:15:36 -0800442 RTC_DCHECK(net->active());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000443 }
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800444 networks_map_[key]->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000445 }
Artem Titov96e3b992021-07-26 16:03:14 +0200446 // It may still happen that the merged list is a subset of `networks_`.
honghaizdb8cf502015-12-21 13:08:46 -0800447 // To detect this change, we compare their sizes.
448 if (merged_list.size() != networks_.size()) {
449 *changed = true;
450 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000451
Artem Titov96e3b992021-07-26 16:03:14 +0200452 // If the network list changes, we re-assign `networks_` to the merged list
honghaizdb8cf502015-12-21 13:08:46 -0800453 // and re-sort it.
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000454 if (*changed) {
honghaizdb8cf502015-12-21 13:08:46 -0800455 networks_ = merged_list;
456 // Reset the active states of all networks.
457 for (const auto& kv : networks_map_) {
Niels Möllerd959f3a2022-04-19 11:29:19 +0200458 const std::unique_ptr<Network>& network = kv.second;
Artem Titov96e3b992021-07-26 16:03:14 +0200459 // If `network` is in the newly generated `networks_`, it is active.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200460 bool found = absl::c_linear_search(networks_, network.get());
honghaize3c6c822016-02-17 13:00:28 -0800461 network->set_active(found);
honghaizdb8cf502015-12-21 13:08:46 -0800462 }
Steve Anton2acd1632019-03-25 13:48:30 -0700463 absl::c_sort(networks_, SortNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000464 // Now network interfaces are sorted, we should set the preference value
465 // for each of the interfaces we are planning to use.
466 // Preference order of network interfaces might have changed from previous
467 // sorting due to addition of higher preference network interface.
468 // Since we have already sorted the network interfaces based on our
469 // requirements, we will just assign a preference value starting with 127,
470 // in decreasing order.
471 int pref = kHighestNetworkPreference;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000472 for (Network* network : networks_) {
473 network->set_preference(pref);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000474 if (pref > 0) {
475 --pref;
476 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100477 RTC_LOG(LS_ERROR) << "Too many network interfaces to handle!";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000478 break;
479 }
480 }
481 }
482}
483
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800484void NetworkManagerBase::set_default_local_addresses(const IPAddress& ipv4,
485 const IPAddress& ipv6) {
486 if (ipv4.family() == AF_INET) {
487 default_local_ipv4_address_ = ipv4;
488 }
489 if (ipv6.family() == AF_INET6) {
490 default_local_ipv6_address_ = ipv6;
491 }
492}
493
494bool NetworkManagerBase::GetDefaultLocalAddress(int family,
495 IPAddress* ipaddr) const {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800496 if (family == AF_INET && !default_local_ipv4_address_.IsNil()) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800497 *ipaddr = default_local_ipv4_address_;
498 return true;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800499 } else if (family == AF_INET6 && !default_local_ipv6_address_.IsNil()) {
honghaizaf83fe62016-04-18 14:50:44 -0700500 Network* ipv6_network = GetNetworkFromAddress(default_local_ipv6_address_);
501 if (ipv6_network) {
502 // If the default ipv6 network's BestIP is different than
503 // default_local_ipv6_address_, use it instead.
504 // This is to prevent potential IP address leakage. See WebRTC bug 5376.
505 *ipaddr = ipv6_network->GetBestIP();
506 } else {
507 *ipaddr = default_local_ipv6_address_;
508 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800509 return true;
510 }
511 return false;
512}
513
honghaizaf83fe62016-04-18 14:50:44 -0700514Network* NetworkManagerBase::GetNetworkFromAddress(
515 const rtc::IPAddress& ip) const {
516 for (Network* network : networks_) {
517 const auto& ips = network->GetIPs();
Steve Anton2acd1632019-03-25 13:48:30 -0700518 if (absl::c_any_of(ips, [&](const InterfaceAddress& existing_ip) {
519 return ip == static_cast<rtc::IPAddress>(existing_ip);
520 })) {
honghaizaf83fe62016-04-18 14:50:44 -0700521 return network;
522 }
523 }
524 return nullptr;
525}
526
Jonas Orelandac554eb2021-08-27 09:43:38 +0200527bool NetworkManagerBase::IsVpnMacAddress(
528 rtc::ArrayView<const uint8_t> address) {
529 if (address.data() == nullptr && address.size() == 0) {
530 return false;
531 }
532 for (const auto& vpn : kVpns) {
533 if (sizeof(vpn) == address.size() &&
534 memcmp(vpn, address.data(), address.size()) == 0) {
535 return true;
536 }
537 }
538 return false;
539}
540
Niels Mölleraa373162021-09-28 16:09:07 +0200541BasicNetworkManager::BasicNetworkManager(
542 NetworkMonitorFactory* network_monitor_factory,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200543 SocketFactory* socket_factory,
Diep Bui3d9b5592022-11-17 21:25:49 +0000544 const webrtc::FieldTrialsView* field_trials_view)
545 : NetworkManagerBase(field_trials_view),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200546 network_monitor_factory_(network_monitor_factory),
Niels Mölleraa373162021-09-28 16:09:07 +0200547 socket_factory_(socket_factory),
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100548 allow_mac_based_ipv6_(
Diep Bui3d9b5592022-11-17 21:25:49 +0000549 field_trials()->IsEnabled("WebRTC-AllowMACBasedIPv6")),
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000550 bind_using_ifname_(
Diep Bui3d9b5592022-11-17 21:25:49 +0000551 !field_trials()->IsDisabled("WebRTC-BindUsingInterfaceName")) {
Daniel.L (Byoungchan Lee)489f6482022-07-20 15:17:41 +0900552 RTC_DCHECK(socket_factory_);
553}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000554
Niels Möller27c14522022-02-07 16:44:21 +0100555BasicNetworkManager::~BasicNetworkManager() {
556 if (task_safety_flag_) {
557 task_safety_flag_->SetNotAlive();
558 }
559}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000560
honghaiz023f3ef2015-10-19 09:39:32 -0700561void BasicNetworkManager::OnNetworksChanged() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700562 RTC_DCHECK_RUN_ON(thread_);
Mirko Bonadei675513b2017-11-09 11:09:25 +0100563 RTC_LOG(LS_INFO) << "Network change was observed";
honghaiz023f3ef2015-10-19 09:39:32 -0700564 UpdateNetworksOnce();
565}
566
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000567#if defined(__native_client__)
568
Niels Möllerd959f3a2022-04-19 11:29:19 +0200569bool BasicNetworkManager::CreateNetworks(
570 bool include_ignored,
571 std::vector<std::unique_ptr<Network>>* networks) const {
Artem Titovd3251962021-11-15 16:57:07 +0100572 RTC_DCHECK_NOTREACHED();
Mirko Bonadei675513b2017-11-09 11:09:25 +0100573 RTC_LOG(LS_WARNING) << "BasicNetworkManager doesn't work on NaCl yet";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000574 return false;
575}
576
577#elif defined(WEBRTC_POSIX)
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200578NetworkMonitorInterface::InterfaceInfo BasicNetworkManager::GetInterfaceInfo(
579 struct ifaddrs* cursor) const {
580 if (cursor->ifa_flags & IFF_LOOPBACK) {
581 return {
582 .adapter_type = ADAPTER_TYPE_LOOPBACK,
583 .underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN,
584 .network_preference = NetworkPreference::NEUTRAL,
585 .available = true,
586 };
587 } else if (network_monitor_) {
588 return network_monitor_->GetInterfaceInfo(cursor->ifa_name);
589 } else {
590 return {.adapter_type = GetAdapterTypeFromName(cursor->ifa_name),
591 .underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN,
592 .network_preference = NetworkPreference::NEUTRAL,
593 .available = true};
594 }
595}
596
Niels Möllerd959f3a2022-04-19 11:29:19 +0200597void BasicNetworkManager::ConvertIfAddrs(
598 struct ifaddrs* interfaces,
599 IfAddrsConverter* ifaddrs_converter,
600 bool include_ignored,
601 std::vector<std::unique_ptr<Network>>* networks) const {
602 std::map<std::string, Network*> current_networks;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800603
deadbeef37f5ecf2017-02-27 14:06:41 -0800604 for (struct ifaddrs* cursor = interfaces; cursor != nullptr;
605 cursor = cursor->ifa_next) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000606 IPAddress prefix;
607 IPAddress mask;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800608 InterfaceAddress ip;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000609 int scope_id = 0;
610
611 // Some interfaces may not have address assigned.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800612 if (!cursor->ifa_addr || !cursor->ifa_netmask) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000613 continue;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800614 }
615 // Skip ones which are down.
616 if (!(cursor->ifa_flags & IFF_RUNNING)) {
617 continue;
618 }
619 // Skip unknown family.
620 if (cursor->ifa_addr->sa_family != AF_INET &&
621 cursor->ifa_addr->sa_family != AF_INET6) {
622 continue;
623 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800624 // Convert to InterfaceAddress.
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200625 // TODO(webrtc:13114): Convert ConvertIfAddrs to use rtc::Netmask.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800626 if (!ifaddrs_converter->ConvertIfAddrsToIPAddress(cursor, &ip, &mask)) {
627 continue;
628 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000629
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800630 // Special case for IPv6 address.
631 if (cursor->ifa_addr->sa_family == AF_INET6) {
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100632 if (IsIgnoredIPv6(allow_mac_based_ipv6_, ip)) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000633 continue;
634 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800635 scope_id =
636 reinterpret_cast<sockaddr_in6*>(cursor->ifa_addr)->sin6_scope_id;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000637 }
638
639 int prefix_length = CountIPMaskBits(mask);
640 prefix = TruncateIP(ip, prefix_length);
Yves Gerey665174f2018-06-19 15:03:05 +0200641 std::string key =
642 MakeNetworkKey(std::string(cursor->ifa_name), prefix, prefix_length);
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200643
Honghai Zhang351d77b2016-05-20 15:08:29 -0700644 auto iter = current_networks.find(key);
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200645 if (iter != current_networks.end()) {
646 // We have already added this network, simply add extra IP.
647 iter->second->AddIP(ip);
648#if RTC_DCHECK_IS_ON
649 // Validate that different IP of same network has same properties
650 auto existing_network = iter->second;
651
652 NetworkMonitorInterface::InterfaceInfo if_info = GetInterfaceInfo(cursor);
653 if (if_info.adapter_type != ADAPTER_TYPE_VPN &&
654 IsConfiguredVpn(prefix, prefix_length)) {
655 if_info.underlying_type_for_vpn = if_info.adapter_type;
656 if_info.adapter_type = ADAPTER_TYPE_VPN;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000657 }
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200658
659 RTC_DCHECK(existing_network->type() == if_info.adapter_type);
660 RTC_DCHECK(existing_network->underlying_type_for_vpn() ==
661 if_info.underlying_type_for_vpn);
662 RTC_DCHECK(existing_network->network_preference() ==
663 if_info.network_preference);
664 if (!if_info.available) {
665 RTC_DCHECK(existing_network->ignored());
666 }
667#endif // RTC_DCHECK_IS_ON
668 continue;
669 }
670
671 // Create a new network.
672 NetworkMonitorInterface::InterfaceInfo if_info = GetInterfaceInfo(cursor);
673
674 // Check manually configured VPN override.
675 if (if_info.adapter_type != ADAPTER_TYPE_VPN &&
676 IsConfiguredVpn(prefix, prefix_length)) {
677 if_info.underlying_type_for_vpn = if_info.adapter_type;
678 if_info.adapter_type = ADAPTER_TYPE_VPN;
679 }
680
Diep Bui3d9b5592022-11-17 21:25:49 +0000681 auto network = CreateNetwork(cursor->ifa_name, cursor->ifa_name, prefix,
682 prefix_length, if_info.adapter_type);
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200683 network->set_default_local_address_provider(this);
684 network->set_scope_id(scope_id);
685 network->AddIP(ip);
686 if (!if_info.available) {
687 network->set_ignored(true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000688 } else {
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200689 network->set_ignored(IsIgnoredNetwork(*network));
690 }
691 network->set_underlying_type_for_vpn(if_info.underlying_type_for_vpn);
692 network->set_network_preference(if_info.network_preference);
693 if (include_ignored || !network->ignored()) {
694 current_networks[key] = network.get();
695 networks->push_back(std::move(network));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000696 }
697 }
698}
699
Niels Möllerd959f3a2022-04-19 11:29:19 +0200700bool BasicNetworkManager::CreateNetworks(
701 bool include_ignored,
702 std::vector<std::unique_ptr<Network>>* networks) const {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000703 struct ifaddrs* interfaces;
704 int error = getifaddrs(&interfaces);
705 if (error != 0) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000706 RTC_LOG_ERR(LS_ERROR) << "getifaddrs failed to gather interface data: "
707 << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000708 return false;
709 }
710
jbauch555604a2016-04-26 03:13:22 -0700711 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(CreateIfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800712 ConvertIfAddrs(interfaces, ifaddrs_converter.get(), include_ignored,
713 networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000714
715 freeifaddrs(interfaces);
716 return true;
717}
718
719#elif defined(WEBRTC_WIN)
720
721unsigned int GetPrefix(PIP_ADAPTER_PREFIX prefixlist,
Yves Gerey665174f2018-06-19 15:03:05 +0200722 const IPAddress& ip,
723 IPAddress* prefix) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000724 IPAddress current_prefix;
725 IPAddress best_prefix;
726 unsigned int best_length = 0;
727 while (prefixlist) {
728 // Look for the longest matching prefix in the prefixlist.
deadbeef37f5ecf2017-02-27 14:06:41 -0800729 if (prefixlist->Address.lpSockaddr == nullptr ||
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000730 prefixlist->Address.lpSockaddr->sa_family != ip.family()) {
731 prefixlist = prefixlist->Next;
732 continue;
733 }
734 switch (prefixlist->Address.lpSockaddr->sa_family) {
735 case AF_INET: {
736 sockaddr_in* v4_addr =
737 reinterpret_cast<sockaddr_in*>(prefixlist->Address.lpSockaddr);
738 current_prefix = IPAddress(v4_addr->sin_addr);
739 break;
740 }
741 case AF_INET6: {
Yves Gerey665174f2018-06-19 15:03:05 +0200742 sockaddr_in6* v6_addr =
743 reinterpret_cast<sockaddr_in6*>(prefixlist->Address.lpSockaddr);
744 current_prefix = IPAddress(v6_addr->sin6_addr);
745 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000746 }
747 default: {
748 prefixlist = prefixlist->Next;
749 continue;
750 }
751 }
752 if (TruncateIP(ip, prefixlist->PrefixLength) == current_prefix &&
753 prefixlist->PrefixLength > best_length) {
754 best_prefix = current_prefix;
755 best_length = prefixlist->PrefixLength;
756 }
757 prefixlist = prefixlist->Next;
758 }
759 *prefix = best_prefix;
760 return best_length;
761}
762
Niels Möllerd959f3a2022-04-19 11:29:19 +0200763bool BasicNetworkManager::CreateNetworks(
764 bool include_ignored,
765 std::vector<std::unique_ptr<Network>>* networks) const {
766 std::map<std::string, Network*> current_networks;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000767 // MSDN recommends a 15KB buffer for the first try at GetAdaptersAddresses.
768 size_t buffer_size = 16384;
jbauch555604a2016-04-26 03:13:22 -0700769 std::unique_ptr<char[]> adapter_info(new char[buffer_size]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000770 PIP_ADAPTER_ADDRESSES adapter_addrs =
771 reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
772 int adapter_flags = (GAA_FLAG_SKIP_DNS_SERVER | GAA_FLAG_SKIP_ANYCAST |
773 GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_INCLUDE_PREFIX);
774 int ret = 0;
775 do {
776 adapter_info.reset(new char[buffer_size]);
777 adapter_addrs = reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
Yves Gerey665174f2018-06-19 15:03:05 +0200778 ret = GetAdaptersAddresses(AF_UNSPEC, adapter_flags, 0, adapter_addrs,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000779 reinterpret_cast<PULONG>(&buffer_size));
780 } while (ret == ERROR_BUFFER_OVERFLOW);
781 if (ret != ERROR_SUCCESS) {
782 return false;
783 }
784 int count = 0;
785 while (adapter_addrs) {
786 if (adapter_addrs->OperStatus == IfOperStatusUp) {
787 PIP_ADAPTER_UNICAST_ADDRESS address = adapter_addrs->FirstUnicastAddress;
788 PIP_ADAPTER_PREFIX prefixlist = adapter_addrs->FirstPrefix;
Hans Wennborg597e03f2022-04-01 10:23:25 +0200789 std::string description = ToUtf8(adapter_addrs->Description,
790 wcslen(adapter_addrs->Description));
791
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000792 for (; address; address = address->Next) {
Hans Wennborg597e03f2022-04-01 10:23:25 +0200793 std::string name = rtc::ToString(count);
794#if !defined(NDEBUG)
795 name = ToUtf8(adapter_addrs->FriendlyName,
796 wcslen(adapter_addrs->FriendlyName));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000797#endif
798
799 IPAddress ip;
800 int scope_id = 0;
jbauch555604a2016-04-26 03:13:22 -0700801 std::unique_ptr<Network> network;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000802 switch (address->Address.lpSockaddr->sa_family) {
803 case AF_INET: {
804 sockaddr_in* v4_addr =
805 reinterpret_cast<sockaddr_in*>(address->Address.lpSockaddr);
806 ip = IPAddress(v4_addr->sin_addr);
807 break;
808 }
809 case AF_INET6: {
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100810 sockaddr_in6* v6_addr =
811 reinterpret_cast<sockaddr_in6*>(address->Address.lpSockaddr);
812 scope_id = v6_addr->sin6_scope_id;
813 ip = IPAddress(v6_addr->sin6_addr);
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000814
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100815 if (IsIgnoredIPv6(allow_mac_based_ipv6_, InterfaceAddress(ip))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000816 continue;
817 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100818
819 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000820 }
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800821 default: {
822 continue;
823 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000824 }
825
826 IPAddress prefix;
827 int prefix_length = GetPrefix(prefixlist, ip, &prefix);
828 std::string key = MakeNetworkKey(name, prefix, prefix_length);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000829 auto existing_network = current_networks.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000830 if (existing_network == current_networks.end()) {
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000831 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Yura Yaroshevich0ce868c2018-05-15 11:15:32 +0300832 switch (adapter_addrs->IfType) {
833 case IF_TYPE_SOFTWARE_LOOPBACK:
834 adapter_type = ADAPTER_TYPE_LOOPBACK;
835 break;
836 case IF_TYPE_ETHERNET_CSMACD:
837 case IF_TYPE_ETHERNET_3MBIT:
838 case IF_TYPE_IEEE80212:
839 case IF_TYPE_FASTETHER:
840 case IF_TYPE_FASTETHER_FX:
841 case IF_TYPE_GIGABITETHERNET:
842 adapter_type = ADAPTER_TYPE_ETHERNET;
843 break;
844 case IF_TYPE_IEEE80211:
845 adapter_type = ADAPTER_TYPE_WIFI;
846 break;
847 case IF_TYPE_WWANPP:
848 case IF_TYPE_WWANPP2:
849 adapter_type = ADAPTER_TYPE_CELLULAR;
850 break;
851 default:
852 // TODO(phoglund): Need to recognize other types as well.
853 adapter_type = ADAPTER_TYPE_UNKNOWN;
854 break;
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000855 }
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200856 auto underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN;
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200857 if (adapter_type != ADAPTER_TYPE_VPN &&
858 IsConfiguredVpn(prefix, prefix_length)) {
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200859 underlying_type_for_vpn = adapter_type;
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200860 adapter_type = ADAPTER_TYPE_VPN;
861 }
Jonas Orelandac554eb2021-08-27 09:43:38 +0200862 if (adapter_type != ADAPTER_TYPE_VPN &&
863 IsVpnMacAddress(rtc::ArrayView<const uint8_t>(
864 reinterpret_cast<const uint8_t*>(
865 adapter_addrs->PhysicalAddress),
866 adapter_addrs->PhysicalAddressLength))) {
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200867 underlying_type_for_vpn = adapter_type;
Jonas Orelandac554eb2021-08-27 09:43:38 +0200868 adapter_type = ADAPTER_TYPE_VPN;
869 }
870
Diep Bui3d9b5592022-11-17 21:25:49 +0000871 auto network = CreateNetwork(name, description, prefix, prefix_length,
872 adapter_type);
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200873 network->set_underlying_type_for_vpn(underlying_type_for_vpn);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800874 network->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800875 network->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000876 network->set_scope_id(scope_id);
877 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000878 bool ignored = IsIgnoredNetwork(*network);
879 network->set_ignored(ignored);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000880 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800881 current_networks[key] = network.get();
Niels Möllerd959f3a2022-04-19 11:29:19 +0200882 networks->push_back(std::move(network));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000883 }
884 } else {
885 (*existing_network).second->AddIP(ip);
886 }
887 }
888 // Count is per-adapter - all 'Networks' created from the same
889 // adapter need to have the same name.
890 ++count;
891 }
892 adapter_addrs = adapter_addrs->Next;
893 }
894 return true;
895}
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000896#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000897
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000898bool BasicNetworkManager::IsIgnoredNetwork(const Network& network) const {
899 // Ignore networks on the explicit ignore list.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000900 for (const std::string& ignored_name : network_ignore_list_) {
901 if (network.name() == ignored_name) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000902 return true;
903 }
904 }
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000905
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000906#if defined(WEBRTC_POSIX)
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000907 // Filter out VMware/VirtualBox interfaces, typically named vmnet1,
908 // vmnet8, or vboxnet0.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000909 if (strncmp(network.name().c_str(), "vmnet", 5) == 0 ||
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000910 strncmp(network.name().c_str(), "vnic", 4) == 0 ||
911 strncmp(network.name().c_str(), "vboxnet", 7) == 0) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000912 return true;
913 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000914#elif defined(WEBRTC_WIN)
915 // Ignore any HOST side vmware adapters with a description like:
916 // VMware Virtual Ethernet Adapter for VMnet1
917 // but don't ignore any GUEST side adapters with a description like:
918 // VMware Accelerated AMD PCNet Adapter #2
deadbeef37f5ecf2017-02-27 14:06:41 -0800919 if (strstr(network.description().c_str(), "VMnet") != nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000920 return true;
921 }
922#endif
923
924 // Ignore any networks with a 0.x.y.z IP
925 if (network.prefix().family() == AF_INET) {
926 return (network.prefix().v4AddressAsHostOrderInteger() < 0x01000000);
927 }
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000928
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000929 return false;
930}
931
932void BasicNetworkManager::StartUpdating() {
933 thread_ = Thread::Current();
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700934 // Redundant but necessary for thread annotations.
935 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000936 if (start_count_) {
937 // If network interfaces are already discovered and signal is sent,
938 // we should trigger network signal immediately for the new clients
939 // to start allocating ports.
940 if (sent_first_update_)
Danil Chapovalov5286dcf2022-07-18 17:04:56 +0200941 thread_->PostTask(SafeTask(task_safety_flag_, [this] {
Niels Möller27c14522022-02-07 16:44:21 +0100942 RTC_DCHECK_RUN_ON(thread_);
943 SignalNetworksChanged();
944 }));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000945 } else {
Niels Möller27c14522022-02-07 16:44:21 +0100946 RTC_DCHECK(task_safety_flag_ == nullptr);
947 task_safety_flag_ = webrtc::PendingTaskSafetyFlag::Create();
Danil Chapovalov5286dcf2022-07-18 17:04:56 +0200948 thread_->PostTask(SafeTask(task_safety_flag_, [this] {
Niels Möller27c14522022-02-07 16:44:21 +0100949 RTC_DCHECK_RUN_ON(thread_);
950 UpdateNetworksContinually();
951 }));
honghaiz023f3ef2015-10-19 09:39:32 -0700952 StartNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000953 }
954 ++start_count_;
955}
956
957void BasicNetworkManager::StopUpdating() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700958 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000959 if (!start_count_)
960 return;
961
962 --start_count_;
963 if (!start_count_) {
Niels Möller27c14522022-02-07 16:44:21 +0100964 task_safety_flag_->SetNotAlive();
965 task_safety_flag_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000966 sent_first_update_ = false;
honghaiz023f3ef2015-10-19 09:39:32 -0700967 StopNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000968 }
969}
970
honghaiz023f3ef2015-10-19 09:39:32 -0700971void BasicNetworkManager::StartNetworkMonitor() {
Taylor Brandstetter07fc24d2020-08-12 01:58:10 +0000972 if (network_monitor_factory_ == nullptr) {
973 return;
honghaiz023f3ef2015-10-19 09:39:32 -0700974 }
honghaiz023f3ef2015-10-19 09:39:32 -0700975 if (!network_monitor_) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200976 network_monitor_.reset(
Diep Bui3d9b5592022-11-17 21:25:49 +0000977 network_monitor_factory_->CreateNetworkMonitor(*field_trials()));
honghaizcec0a082016-01-15 14:49:09 -0800978 if (!network_monitor_) {
979 return;
980 }
Mirko Bonadei37077932021-07-27 17:00:58 +0200981 network_monitor_->SetNetworksChangedCallback(
982 [this]() { OnNetworksChanged(); });
honghaiz023f3ef2015-10-19 09:39:32 -0700983 }
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000984
985 if (network_monitor_->SupportsBindSocketToNetwork()) {
986 // Set NetworkBinder on SocketServer so that
987 // PhysicalSocket::Bind will call
988 // BasicNetworkManager::BindSocketToNetwork(), (that will lookup interface
989 // name and then call network_monitor_->BindSocketToNetwork()).
990 thread_->socketserver()->set_network_binder(this);
991 }
992
honghaiz023f3ef2015-10-19 09:39:32 -0700993 network_monitor_->Start();
994}
995
996void BasicNetworkManager::StopNetworkMonitor() {
997 if (!network_monitor_) {
998 return;
999 }
1000 network_monitor_->Stop();
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001001
1002 if (network_monitor_->SupportsBindSocketToNetwork()) {
1003 // Reset NetworkBinder on SocketServer.
1004 if (thread_->socketserver()->network_binder() == this) {
1005 thread_->socketserver()->set_network_binder(nullptr);
1006 }
1007 }
honghaiz023f3ef2015-10-19 09:39:32 -07001008}
1009
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001010IPAddress BasicNetworkManager::QueryDefaultLocalAddress(int family) const {
nisseede5da42017-01-12 05:15:36 -08001011 RTC_DCHECK(family == AF_INET || family == AF_INET6);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001012
Niels Möllerd0b88792021-08-12 10:32:30 +02001013 std::unique_ptr<Socket> socket(
Daniel.L (Byoungchan Lee)489f6482022-07-20 15:17:41 +09001014 socket_factory_->CreateSocket(family, SOCK_DGRAM));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001015 if (!socket) {
Harald Alvestrand5f341302021-11-24 10:01:32 +00001016 RTC_LOG_ERR(LS_ERROR) << "Socket creation failed";
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001017 return IPAddress();
1018 }
1019
guoweis56271ed2016-01-15 14:45:06 -08001020 if (socket->Connect(SocketAddress(
1021 family == AF_INET ? kPublicIPv4Host : kPublicIPv6Host, kPublicPort)) <
1022 0) {
Yves Gerey665174f2018-06-19 15:03:05 +02001023 if (socket->GetError() != ENETUNREACH &&
1024 socket->GetError() != EHOSTUNREACH) {
skvlad75024012016-09-29 12:59:35 -07001025 // Ignore the expected case of "host/net unreachable" - which happens if
1026 // the network is V4- or V6-only.
Mirko Bonadei675513b2017-11-09 11:09:25 +01001027 RTC_LOG(LS_INFO) << "Connect failed with " << socket->GetError();
skvlad75024012016-09-29 12:59:35 -07001028 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001029 return IPAddress();
1030 }
1031 return socket->GetLocalAddress().ipaddr();
1032}
1033
honghaiz023f3ef2015-10-19 09:39:32 -07001034void BasicNetworkManager::UpdateNetworksOnce() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001035 if (!start_count_)
1036 return;
1037
Niels Möllerd959f3a2022-04-19 11:29:19 +02001038 std::vector<std::unique_ptr<Network>> list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001039 if (!CreateNetworks(false, &list)) {
1040 SignalError();
1041 } else {
1042 bool changed;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001043 NetworkManager::Stats stats;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001044 MergeNetworkList(std::move(list), &changed, &stats);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001045 set_default_local_addresses(QueryDefaultLocalAddress(AF_INET),
1046 QueryDefaultLocalAddress(AF_INET6));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001047 if (changed || !sent_first_update_) {
1048 SignalNetworksChanged();
1049 sent_first_update_ = true;
1050 }
1051 }
honghaiz023f3ef2015-10-19 09:39:32 -07001052}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001053
honghaiz023f3ef2015-10-19 09:39:32 -07001054void BasicNetworkManager::UpdateNetworksContinually() {
1055 UpdateNetworksOnce();
Danil Chapovalov5286dcf2022-07-18 17:04:56 +02001056 thread_->PostDelayedTask(SafeTask(task_safety_flag_,
1057 [this] {
1058 RTC_DCHECK_RUN_ON(thread_);
1059 UpdateNetworksContinually();
1060 }),
1061 TimeDelta::Millis(kNetworksUpdateIntervalMs));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001062}
1063
honghaizdb8cf502015-12-21 13:08:46 -08001064void BasicNetworkManager::DumpNetworks() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001065 RTC_DCHECK_RUN_ON(thread_);
Niels Möller22211442022-04-07 11:43:28 +02001066 std::vector<const Network*> list = GetNetworks();
Mirko Bonadei675513b2017-11-09 11:09:25 +01001067 RTC_LOG(LS_INFO) << "NetworkManager detected " << list.size() << " networks:";
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001068 for (const Network* network : list) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001069 RTC_LOG(LS_INFO) << network->ToString() << ": " << network->description()
1070 << ", active ? " << network->active()
1071 << ((network->ignored()) ? ", Ignored" : "");
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001072 }
1073}
1074
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001075NetworkBindingResult BasicNetworkManager::BindSocketToNetwork(
1076 int socket_fd,
1077 const IPAddress& address) {
1078 RTC_DCHECK_RUN_ON(thread_);
1079 std::string if_name;
1080 if (bind_using_ifname_) {
1081 Network* net = GetNetworkFromAddress(address);
1082 if (net != nullptr) {
1083 if_name = net->name();
1084 }
1085 }
1086 return network_monitor_->BindSocketToNetwork(socket_fd, address, if_name);
1087}
1088
Ali Tofigh7fa90572022-03-17 15:47:49 +01001089Network::Network(absl::string_view name,
1090 absl::string_view desc,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001091 const IPAddress& prefix,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001092 int prefix_length,
Diep Bui1e589eb2022-08-02 07:37:30 +00001093 AdapterType type,
1094 const webrtc::FieldTrialsView* field_trials)
1095 : field_trials_(field_trials),
1096 name_(name),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001097 description_(desc),
1098 prefix_(prefix),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001099 prefix_length_(prefix_length),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001100 key_(MakeNetworkKey(name, prefix, prefix_length)),
1101 scope_id_(0),
1102 ignored_(false),
1103 type_(type),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001104 preference_(0) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001105
Steve Anton9de3aac2017-10-24 10:08:26 -07001106Network::Network(const Network&) = default;
1107
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001108Network::~Network() = default;
1109
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001110// Sets the addresses of this network. Returns true if the address set changed.
1111// Change detection is short circuited if the changed argument is true.
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001112bool Network::SetIPs(const std::vector<InterfaceAddress>& ips, bool changed) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001113 // Detect changes with a nested loop; n-squared but we expect on the order
1114 // of 2-3 addresses per network.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001115 changed = changed || ips.size() != ips_.size();
1116 if (!changed) {
1117 for (const InterfaceAddress& ip : ips) {
Steve Anton2acd1632019-03-25 13:48:30 -07001118 if (!absl::c_linear_search(ips_, ip)) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001119 changed = true;
1120 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001121 }
1122 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001123 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001124
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001125 ips_ = ips;
1126 return changed;
1127}
1128
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001129// Select the best IP address to use from this Network.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001130IPAddress Network::GetBestIP() const {
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001131 if (ips_.size() == 0) {
1132 return IPAddress();
1133 }
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001134
1135 if (prefix_.family() == AF_INET) {
1136 return static_cast<IPAddress>(ips_.at(0));
1137 }
1138
Diep Bui1e589eb2022-08-02 07:37:30 +00001139 InterfaceAddress selected_ip, link_local_ip, ula_ip;
1140 const bool prefer_global_ipv6_to_link_local =
Diep Buia5d80a72022-08-26 15:35:54 +00001141 PreferGlobalIPv6Address(field_trials_);
1142
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001143 for (const InterfaceAddress& ip : ips_) {
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001144 // Ignore any address which has been deprecated already.
1145 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED)
1146 continue;
1147
Diep Bui1e589eb2022-08-02 07:37:30 +00001148 if (prefer_global_ipv6_to_link_local && IPIsLinkLocal(ip)) {
1149 link_local_ip = ip;
1150 continue;
1151 }
1152
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001153 // ULA address should only be returned when we have no other
1154 // global IP.
1155 if (IPIsULA(static_cast<const IPAddress&>(ip))) {
1156 ula_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001157 continue;
1158 }
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001159 selected_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001160
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001161 // Search could stop once a temporary non-deprecated one is found.
1162 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_TEMPORARY)
1163 break;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001164 }
1165
Diep Bui1e589eb2022-08-02 07:37:30 +00001166 if (IPIsUnspec(selected_ip)) {
1167 if (prefer_global_ipv6_to_link_local && !IPIsUnspec(link_local_ip)) {
1168 // No proper global IPv6 address found, use link local address instead.
1169 selected_ip = link_local_ip;
1170 } else if (!IPIsUnspec(ula_ip)) {
1171 // No proper global and link local address found, use ULA instead.
1172 selected_ip = ula_ip;
1173 }
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001174 }
1175
1176 return static_cast<IPAddress>(selected_ip);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001177}
1178
Qingsi Wang5ae259e2019-02-13 15:46:07 -08001179webrtc::MdnsResponderInterface* Network::GetMdnsResponder() const {
1180 if (mdns_responder_provider_ == nullptr) {
1181 return nullptr;
1182 }
1183 return mdns_responder_provider_->GetMdnsResponder();
1184}
1185
Jonas Orelande62c2f22022-03-29 11:04:48 +02001186uint16_t Network::GetCost(const webrtc::FieldTrialsView* field_trials) const {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001187 return GetCost(
Jonas Orelande62c2f22022-03-29 11:04:48 +02001188 *webrtc::AlwaysValidPointer<const webrtc::FieldTrialsView,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001189 webrtc::FieldTrialBasedConfig>(field_trials));
1190}
1191
Jonas Orelande62c2f22022-03-29 11:04:48 +02001192uint16_t Network::GetCost(const webrtc::FieldTrialsView& field_trials) const {
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001193 AdapterType type = IsVpn() ? underlying_type_for_vpn_ : type_;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001194 const bool use_differentiated_cellular_costs =
1195 field_trials.IsEnabled("WebRTC-UseDifferentiatedCellularCosts");
1196 const bool add_network_cost_to_vpn =
1197 field_trials.IsEnabled("WebRTC-AddNetworkCostToVpn");
Jonas Orelandb477fc72021-08-23 12:16:33 +02001198 return ComputeNetworkCostByType(type, IsVpn(),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001199 use_differentiated_cellular_costs,
1200 add_network_cost_to_vpn);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001201}
1202
Jonas Oreland30019052022-01-28 14:11:44 +01001203// This is the inverse of ComputeNetworkCostByType().
1204std::pair<rtc::AdapterType, bool /* vpn */>
1205Network::GuessAdapterFromNetworkCost(int network_cost) {
1206 switch (network_cost) {
1207 case kNetworkCostMin:
1208 return {rtc::ADAPTER_TYPE_ETHERNET, false};
1209 case kNetworkCostMin + kNetworkCostVpn:
1210 return {rtc::ADAPTER_TYPE_ETHERNET, true};
1211 case kNetworkCostLow:
1212 return {rtc::ADAPTER_TYPE_WIFI, false};
1213 case kNetworkCostLow + kNetworkCostVpn:
1214 return {rtc::ADAPTER_TYPE_WIFI, true};
1215 case kNetworkCostCellular:
1216 return {rtc::ADAPTER_TYPE_CELLULAR, false};
1217 case kNetworkCostCellular + kNetworkCostVpn:
1218 return {rtc::ADAPTER_TYPE_CELLULAR, true};
1219 case kNetworkCostCellular2G:
1220 return {rtc::ADAPTER_TYPE_CELLULAR_2G, false};
1221 case kNetworkCostCellular2G + kNetworkCostVpn:
1222 return {rtc::ADAPTER_TYPE_CELLULAR_2G, true};
1223 case kNetworkCostCellular3G:
1224 return {rtc::ADAPTER_TYPE_CELLULAR_3G, false};
1225 case kNetworkCostCellular3G + kNetworkCostVpn:
1226 return {rtc::ADAPTER_TYPE_CELLULAR_3G, true};
1227 case kNetworkCostCellular4G:
1228 return {rtc::ADAPTER_TYPE_CELLULAR_4G, false};
1229 case kNetworkCostCellular4G + kNetworkCostVpn:
1230 return {rtc::ADAPTER_TYPE_CELLULAR_4G, true};
1231 case kNetworkCostCellular5G:
1232 return {rtc::ADAPTER_TYPE_CELLULAR_5G, false};
1233 case kNetworkCostCellular5G + kNetworkCostVpn:
1234 return {rtc::ADAPTER_TYPE_CELLULAR_5G, true};
1235 case kNetworkCostUnknown:
1236 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1237 case kNetworkCostUnknown + kNetworkCostVpn:
1238 return {rtc::ADAPTER_TYPE_UNKNOWN, true};
1239 case kNetworkCostMax:
1240 return {rtc::ADAPTER_TYPE_ANY, false};
1241 case kNetworkCostMax + kNetworkCostVpn:
1242 return {rtc::ADAPTER_TYPE_ANY, true};
1243 }
1244 RTC_LOG(LS_VERBOSE) << "Unknown network cost: " << network_cost;
1245 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1246}
1247
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001248std::string Network::ToString() const {
Jonas Olsson366a50c2018-09-06 13:41:30 +02001249 rtc::StringBuilder ss;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001250 // Print out the first space-terminated token of the network desc, plus
1251 // the IP address.
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001252 ss << "Net[" << description_.substr(0, description_.find(' ')) << ":"
1253 << prefix_.ToSensitiveString() << "/" << prefix_length_ << ":"
1254 << AdapterTypeToString(type_);
1255 if (IsVpn()) {
1256 ss << "/" << AdapterTypeToString(underlying_type_for_vpn_);
1257 }
Qingsi Wang10a0e512018-05-16 13:37:03 -07001258 ss << ":id=" << id_ << "]";
Jonas Olsson84df1c72018-09-14 16:59:32 +02001259 return ss.Release();
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001260}
1261
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001262void BasicNetworkManager::set_vpn_list(const std::vector<NetworkMask>& vpn) {
1263 if (thread_ == nullptr) {
1264 vpn_ = vpn;
1265 } else {
Danil Chapovalov9e09a1f2022-09-08 18:38:10 +02001266 thread_->BlockingCall([this, vpn] { vpn_ = vpn; });
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001267 }
1268}
1269
1270bool BasicNetworkManager::IsConfiguredVpn(IPAddress prefix,
1271 int prefix_length) const {
1272 RTC_DCHECK_RUN_ON(thread_);
1273 for (const auto& vpn : vpn_) {
1274 if (prefix_length >= vpn.prefix_length()) {
1275 auto copy = TruncateIP(prefix, vpn.prefix_length());
1276 if (copy == vpn.address()) {
1277 return true;
1278 }
1279 }
1280 }
1281 return false;
1282}
1283
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001284} // namespace rtc