blob: 26200bc4a0071fa3abfba9f1356631ac90250684 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
jbauch555604a2016-04-26 03:13:22 -070011#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012#include <signal.h>
13#include <stdarg.h>
14
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020015#include "rtc_base/gunit.h"
16#include "rtc_base/logging.h"
17#include "rtc_base/networkmonitor.h"
18#include "rtc_base/physicalsocketserver.h"
19#include "rtc_base/socket_unittest.h"
20#include "rtc_base/testutils.h"
21#include "rtc_base/thread.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000022
23namespace rtc {
24
Mirko Bonadei675513b2017-11-09 11:09:25 +010025#define MAYBE_SKIP_IPV4 \
26 if (!HasIPv4Enabled()) { \
27 RTC_LOG(LS_INFO) << "No IPv4... skipping"; \
28 return; \
deadbeef9a6f4d42017-05-15 19:43:33 -070029 }
30
Mirko Bonadei675513b2017-11-09 11:09:25 +010031#define MAYBE_SKIP_IPV6 \
32 if (!HasIPv6Enabled()) { \
33 RTC_LOG(LS_INFO) << "No IPv6... skipping"; \
34 return; \
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -070035 }
36
jbauch095ae152015-12-18 01:39:55 -080037class PhysicalSocketTest;
38
39class FakeSocketDispatcher : public SocketDispatcher {
40 public:
41 explicit FakeSocketDispatcher(PhysicalSocketServer* ss)
42 : SocketDispatcher(ss) {
43 }
44
jbauchf2a2bf42016-02-03 16:45:32 -080045 FakeSocketDispatcher(SOCKET s, PhysicalSocketServer* ss)
46 : SocketDispatcher(s, ss) {
47 }
48
jbauch095ae152015-12-18 01:39:55 -080049 protected:
50 SOCKET DoAccept(SOCKET socket, sockaddr* addr, socklen_t* addrlen) override;
jbauchf2a2bf42016-02-03 16:45:32 -080051 int DoSend(SOCKET socket, const char* buf, int len, int flags) override;
52 int DoSendTo(SOCKET socket, const char* buf, int len, int flags,
53 const struct sockaddr* dest_addr, socklen_t addrlen) override;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000054};
55
jbauch095ae152015-12-18 01:39:55 -080056class FakePhysicalSocketServer : public PhysicalSocketServer {
57 public:
58 explicit FakePhysicalSocketServer(PhysicalSocketTest* test)
59 : test_(test) {
60 }
61
jbauch095ae152015-12-18 01:39:55 -080062 AsyncSocket* CreateAsyncSocket(int family, int type) override {
63 SocketDispatcher* dispatcher = new FakeSocketDispatcher(this);
jbauchf2a2bf42016-02-03 16:45:32 -080064 if (!dispatcher->Create(family, type)) {
jbauch095ae152015-12-18 01:39:55 -080065 delete dispatcher;
66 return nullptr;
67 }
jbauchf2a2bf42016-02-03 16:45:32 -080068 return dispatcher;
69 }
70
71 AsyncSocket* WrapSocket(SOCKET s) override {
72 SocketDispatcher* dispatcher = new FakeSocketDispatcher(s, this);
73 if (!dispatcher->Initialize()) {
74 delete dispatcher;
75 return nullptr;
76 }
77 return dispatcher;
jbauch095ae152015-12-18 01:39:55 -080078 }
79
80 PhysicalSocketTest* GetTest() const { return test_; }
81
82 private:
83 PhysicalSocketTest* test_;
84};
85
deadbeefc874d122017-02-13 15:41:59 -080086class FakeNetworkBinder : public NetworkBinderInterface {
87 public:
88 NetworkBindingResult BindSocketToNetwork(int, const IPAddress&) override {
deadbeef9ffa13f2017-02-21 16:18:00 -080089 ++num_binds_;
deadbeefc874d122017-02-13 15:41:59 -080090 return result_;
91 }
92
93 void set_result(NetworkBindingResult result) { result_ = result; }
94
deadbeef9ffa13f2017-02-21 16:18:00 -080095 int num_binds() { return num_binds_; }
96
deadbeefc874d122017-02-13 15:41:59 -080097 private:
98 NetworkBindingResult result_ = NetworkBindingResult::SUCCESS;
deadbeef9ffa13f2017-02-21 16:18:00 -080099 int num_binds_ = 0;
deadbeefc874d122017-02-13 15:41:59 -0800100};
101
jbauch095ae152015-12-18 01:39:55 -0800102class PhysicalSocketTest : public SocketTest {
103 public:
104 // Set flag to simluate failures when calling "::accept" on a AsyncSocket.
105 void SetFailAccept(bool fail) { fail_accept_ = fail; }
106 bool FailAccept() const { return fail_accept_; }
107
jbauchf2a2bf42016-02-03 16:45:32 -0800108 // Maximum size to ::send to a socket. Set to < 0 to disable limiting.
109 void SetMaxSendSize(int max_size) { max_send_size_ = max_size; }
110 int MaxSendSize() const { return max_send_size_; }
111
jbauch095ae152015-12-18 01:39:55 -0800112 protected:
113 PhysicalSocketTest()
114 : server_(new FakePhysicalSocketServer(this)),
nisse7eaa4ea2017-05-08 05:25:41 -0700115 thread_(server_.get()),
jbauchf2a2bf42016-02-03 16:45:32 -0800116 fail_accept_(false),
nisse7eaa4ea2017-05-08 05:25:41 -0700117 max_send_size_(-1) {}
jbauch095ae152015-12-18 01:39:55 -0800118
119 void ConnectInternalAcceptError(const IPAddress& loopback);
jbauchf2a2bf42016-02-03 16:45:32 -0800120 void WritableAfterPartialWrite(const IPAddress& loopback);
jbauch095ae152015-12-18 01:39:55 -0800121
jbauch555604a2016-04-26 03:13:22 -0700122 std::unique_ptr<FakePhysicalSocketServer> server_;
nisse7eaa4ea2017-05-08 05:25:41 -0700123 rtc::AutoSocketServerThread thread_;
jbauch095ae152015-12-18 01:39:55 -0800124 bool fail_accept_;
jbauchf2a2bf42016-02-03 16:45:32 -0800125 int max_send_size_;
jbauch095ae152015-12-18 01:39:55 -0800126};
127
128SOCKET FakeSocketDispatcher::DoAccept(SOCKET socket,
129 sockaddr* addr,
130 socklen_t* addrlen) {
131 FakePhysicalSocketServer* ss =
132 static_cast<FakePhysicalSocketServer*>(socketserver());
133 if (ss->GetTest()->FailAccept()) {
134 return INVALID_SOCKET;
135 }
136
137 return SocketDispatcher::DoAccept(socket, addr, addrlen);
138}
139
jbauchf2a2bf42016-02-03 16:45:32 -0800140int FakeSocketDispatcher::DoSend(SOCKET socket, const char* buf, int len,
141 int flags) {
142 FakePhysicalSocketServer* ss =
143 static_cast<FakePhysicalSocketServer*>(socketserver());
144 if (ss->GetTest()->MaxSendSize() >= 0) {
145 len = std::min(len, ss->GetTest()->MaxSendSize());
146 }
147
148 return SocketDispatcher::DoSend(socket, buf, len, flags);
149}
150
151int FakeSocketDispatcher::DoSendTo(SOCKET socket, const char* buf, int len,
152 int flags, const struct sockaddr* dest_addr, socklen_t addrlen) {
153 FakePhysicalSocketServer* ss =
154 static_cast<FakePhysicalSocketServer*>(socketserver());
155 if (ss->GetTest()->MaxSendSize() >= 0) {
156 len = std::min(len, ss->GetTest()->MaxSendSize());
157 }
158
159 return SocketDispatcher::DoSendTo(socket, buf, len, flags, dest_addr,
160 addrlen);
161}
162
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000163TEST_F(PhysicalSocketTest, TestConnectIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700164 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000165 SocketTest::TestConnectIPv4();
166}
167
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700168TEST_F(PhysicalSocketTest, TestConnectIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000169 SocketTest::TestConnectIPv6();
170}
171
172TEST_F(PhysicalSocketTest, TestConnectWithDnsLookupIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700173 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000174 SocketTest::TestConnectWithDnsLookupIPv4();
175}
176
177TEST_F(PhysicalSocketTest, TestConnectWithDnsLookupIPv6) {
178 SocketTest::TestConnectWithDnsLookupIPv6();
179}
180
181TEST_F(PhysicalSocketTest, TestConnectFailIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700182 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000183 SocketTest::TestConnectFailIPv4();
184}
185
jbauch095ae152015-12-18 01:39:55 -0800186void PhysicalSocketTest::ConnectInternalAcceptError(const IPAddress& loopback) {
kwibergd0d81482017-04-18 03:18:22 -0700187 webrtc::testing::StreamSink sink;
jbauch095ae152015-12-18 01:39:55 -0800188 SocketAddress accept_addr;
189
190 // Create two clients.
jbauch555604a2016-04-26 03:13:22 -0700191 std::unique_ptr<AsyncSocket> client1(
192 server_->CreateAsyncSocket(loopback.family(), SOCK_STREAM));
jbauch095ae152015-12-18 01:39:55 -0800193 sink.Monitor(client1.get());
194 EXPECT_EQ(AsyncSocket::CS_CLOSED, client1->GetState());
Jonas Olssonabbe8412018-04-03 13:40:05 +0200195 EXPECT_TRUE(IsUnspecOrEmptyIP(client1->GetLocalAddress().ipaddr()));
jbauch095ae152015-12-18 01:39:55 -0800196
jbauch555604a2016-04-26 03:13:22 -0700197 std::unique_ptr<AsyncSocket> client2(
198 server_->CreateAsyncSocket(loopback.family(), SOCK_STREAM));
jbauch095ae152015-12-18 01:39:55 -0800199 sink.Monitor(client2.get());
200 EXPECT_EQ(AsyncSocket::CS_CLOSED, client2->GetState());
Jonas Olssonabbe8412018-04-03 13:40:05 +0200201 EXPECT_TRUE(IsUnspecOrEmptyIP(client2->GetLocalAddress().ipaddr()));
jbauch095ae152015-12-18 01:39:55 -0800202
203 // Create server and listen.
jbauch555604a2016-04-26 03:13:22 -0700204 std::unique_ptr<AsyncSocket> server(
jbauch095ae152015-12-18 01:39:55 -0800205 server_->CreateAsyncSocket(loopback.family(), SOCK_STREAM));
206 sink.Monitor(server.get());
207 EXPECT_EQ(0, server->Bind(SocketAddress(loopback, 0)));
208 EXPECT_EQ(0, server->Listen(5));
209 EXPECT_EQ(AsyncSocket::CS_CONNECTING, server->GetState());
210
211 // Ensure no pending server connections, since we haven't done anything yet.
kwibergd0d81482017-04-18 03:18:22 -0700212 EXPECT_FALSE(sink.Check(server.get(), webrtc::testing::SSE_READ));
jbauch095ae152015-12-18 01:39:55 -0800213 EXPECT_TRUE(nullptr == server->Accept(&accept_addr));
214 EXPECT_TRUE(accept_addr.IsNil());
215
216 // Attempt first connect to listening socket.
217 EXPECT_EQ(0, client1->Connect(server->GetLocalAddress()));
218 EXPECT_FALSE(client1->GetLocalAddress().IsNil());
219 EXPECT_NE(server->GetLocalAddress(), client1->GetLocalAddress());
220
221 // Client is connecting, outcome not yet determined.
222 EXPECT_EQ(AsyncSocket::CS_CONNECTING, client1->GetState());
kwibergd0d81482017-04-18 03:18:22 -0700223 EXPECT_FALSE(sink.Check(client1.get(), webrtc::testing::SSE_OPEN));
224 EXPECT_FALSE(sink.Check(client1.get(), webrtc::testing::SSE_CLOSE));
jbauch095ae152015-12-18 01:39:55 -0800225
226 // Server has pending connection, try to accept it (will fail).
kwibergd0d81482017-04-18 03:18:22 -0700227 EXPECT_TRUE_WAIT((sink.Check(server.get(), webrtc::testing::SSE_READ)),
228 kTimeout);
jbauch095ae152015-12-18 01:39:55 -0800229 // Simulate "::accept" returning an error.
230 SetFailAccept(true);
jbauch555604a2016-04-26 03:13:22 -0700231 std::unique_ptr<AsyncSocket> accepted(server->Accept(&accept_addr));
jbauch095ae152015-12-18 01:39:55 -0800232 EXPECT_FALSE(accepted);
233 ASSERT_TRUE(accept_addr.IsNil());
234
235 // Ensure no more pending server connections.
kwibergd0d81482017-04-18 03:18:22 -0700236 EXPECT_FALSE(sink.Check(server.get(), webrtc::testing::SSE_READ));
jbauch095ae152015-12-18 01:39:55 -0800237 EXPECT_TRUE(nullptr == server->Accept(&accept_addr));
238 EXPECT_TRUE(accept_addr.IsNil());
239
240 // Attempt second connect to listening socket.
241 EXPECT_EQ(0, client2->Connect(server->GetLocalAddress()));
242 EXPECT_FALSE(client2->GetLocalAddress().IsNil());
243 EXPECT_NE(server->GetLocalAddress(), client2->GetLocalAddress());
244
245 // Client is connecting, outcome not yet determined.
246 EXPECT_EQ(AsyncSocket::CS_CONNECTING, client2->GetState());
kwibergd0d81482017-04-18 03:18:22 -0700247 EXPECT_FALSE(sink.Check(client2.get(), webrtc::testing::SSE_OPEN));
248 EXPECT_FALSE(sink.Check(client2.get(), webrtc::testing::SSE_CLOSE));
jbauch095ae152015-12-18 01:39:55 -0800249
250 // Server has pending connection, try to accept it (will succeed).
kwibergd0d81482017-04-18 03:18:22 -0700251 EXPECT_TRUE_WAIT((sink.Check(server.get(), webrtc::testing::SSE_READ)),
252 kTimeout);
jbauch095ae152015-12-18 01:39:55 -0800253 SetFailAccept(false);
jbauch555604a2016-04-26 03:13:22 -0700254 std::unique_ptr<AsyncSocket> accepted2(server->Accept(&accept_addr));
jbauch095ae152015-12-18 01:39:55 -0800255 ASSERT_TRUE(accepted2);
256 EXPECT_FALSE(accept_addr.IsNil());
257 EXPECT_EQ(accepted2->GetRemoteAddress(), accept_addr);
258}
259
260TEST_F(PhysicalSocketTest, TestConnectAcceptErrorIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700261 MAYBE_SKIP_IPV4;
jbauch095ae152015-12-18 01:39:55 -0800262 ConnectInternalAcceptError(kIPv4Loopback);
263}
264
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700265TEST_F(PhysicalSocketTest, TestConnectAcceptErrorIPv6) {
266 MAYBE_SKIP_IPV6;
jbauch095ae152015-12-18 01:39:55 -0800267 ConnectInternalAcceptError(kIPv6Loopback);
268}
269
jbauchf2a2bf42016-02-03 16:45:32 -0800270void PhysicalSocketTest::WritableAfterPartialWrite(const IPAddress& loopback) {
271 // Simulate a really small maximum send size.
272 const int kMaxSendSize = 128;
273 SetMaxSendSize(kMaxSendSize);
274
275 // Run the default send/receive socket tests with a smaller amount of data
276 // to avoid long running times due to the small maximum send size.
277 const size_t kDataSize = 128 * 1024;
278 TcpInternal(loopback, kDataSize, kMaxSendSize);
279}
280
danilchapb7b9dca2016-08-05 05:55:43 -0700281// https://bugs.chromium.org/p/webrtc/issues/detail?id=6167
282#if defined(WEBRTC_WIN)
283#define MAYBE_TestWritableAfterPartialWriteIPv4 DISABLED_TestWritableAfterPartialWriteIPv4
284#else
285#define MAYBE_TestWritableAfterPartialWriteIPv4 TestWritableAfterPartialWriteIPv4
286#endif
287TEST_F(PhysicalSocketTest, MAYBE_TestWritableAfterPartialWriteIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700288 MAYBE_SKIP_IPV4;
jbauchf2a2bf42016-02-03 16:45:32 -0800289 WritableAfterPartialWrite(kIPv4Loopback);
290}
291
danilchapb7b9dca2016-08-05 05:55:43 -0700292// https://bugs.chromium.org/p/webrtc/issues/detail?id=6167
293#if defined(WEBRTC_WIN)
294#define MAYBE_TestWritableAfterPartialWriteIPv6 DISABLED_TestWritableAfterPartialWriteIPv6
295#else
296#define MAYBE_TestWritableAfterPartialWriteIPv6 TestWritableAfterPartialWriteIPv6
297#endif
298TEST_F(PhysicalSocketTest, MAYBE_TestWritableAfterPartialWriteIPv6) {
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700299 MAYBE_SKIP_IPV6;
jbauchf2a2bf42016-02-03 16:45:32 -0800300 WritableAfterPartialWrite(kIPv6Loopback);
301}
302
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700303TEST_F(PhysicalSocketTest, TestConnectFailIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000304 SocketTest::TestConnectFailIPv6();
305}
306
307TEST_F(PhysicalSocketTest, TestConnectWithDnsLookupFailIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700308 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000309 SocketTest::TestConnectWithDnsLookupFailIPv4();
310}
311
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700312TEST_F(PhysicalSocketTest, TestConnectWithDnsLookupFailIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000313 SocketTest::TestConnectWithDnsLookupFailIPv6();
314}
315
316
317TEST_F(PhysicalSocketTest, TestConnectWithClosedSocketIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700318 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000319 SocketTest::TestConnectWithClosedSocketIPv4();
320}
321
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700322TEST_F(PhysicalSocketTest, TestConnectWithClosedSocketIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000323 SocketTest::TestConnectWithClosedSocketIPv6();
324}
325
326TEST_F(PhysicalSocketTest, TestConnectWhileNotClosedIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700327 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000328 SocketTest::TestConnectWhileNotClosedIPv4();
329}
330
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700331TEST_F(PhysicalSocketTest, TestConnectWhileNotClosedIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000332 SocketTest::TestConnectWhileNotClosedIPv6();
333}
334
335TEST_F(PhysicalSocketTest, TestServerCloseDuringConnectIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700336 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000337 SocketTest::TestServerCloseDuringConnectIPv4();
338}
339
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700340TEST_F(PhysicalSocketTest, TestServerCloseDuringConnectIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000341 SocketTest::TestServerCloseDuringConnectIPv6();
342}
343
344TEST_F(PhysicalSocketTest, TestClientCloseDuringConnectIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700345 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000346 SocketTest::TestClientCloseDuringConnectIPv4();
347}
348
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700349TEST_F(PhysicalSocketTest, TestClientCloseDuringConnectIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000350 SocketTest::TestClientCloseDuringConnectIPv6();
351}
352
353TEST_F(PhysicalSocketTest, TestServerCloseIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700354 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000355 SocketTest::TestServerCloseIPv4();
356}
357
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700358TEST_F(PhysicalSocketTest, TestServerCloseIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000359 SocketTest::TestServerCloseIPv6();
360}
361
362TEST_F(PhysicalSocketTest, TestCloseInClosedCallbackIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700363 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000364 SocketTest::TestCloseInClosedCallbackIPv4();
365}
366
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700367TEST_F(PhysicalSocketTest, TestCloseInClosedCallbackIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000368 SocketTest::TestCloseInClosedCallbackIPv6();
369}
370
henrike@webrtc.orgc732a3e2014-10-09 22:08:15 +0000371TEST_F(PhysicalSocketTest, TestSocketServerWaitIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700372 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000373 SocketTest::TestSocketServerWaitIPv4();
374}
375
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700376TEST_F(PhysicalSocketTest, TestSocketServerWaitIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000377 SocketTest::TestSocketServerWaitIPv6();
378}
379
380TEST_F(PhysicalSocketTest, TestTcpIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700381 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000382 SocketTest::TestTcpIPv4();
383}
384
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700385TEST_F(PhysicalSocketTest, TestTcpIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000386 SocketTest::TestTcpIPv6();
387}
388
389TEST_F(PhysicalSocketTest, TestUdpIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700390 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000391 SocketTest::TestUdpIPv4();
392}
393
Taylor Brandstetter2b3bf6b2016-05-19 14:57:31 -0700394TEST_F(PhysicalSocketTest, TestUdpIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000395 SocketTest::TestUdpIPv6();
396}
397
henrike@webrtc.org6f833c32014-06-27 16:21:49 +0000398// Disable for TSan v2, see
399// https://code.google.com/p/webrtc/issues/detail?id=3498 for details.
deadbeefc97be6a2015-09-25 11:00:38 -0700400// Also disable for MSan, see:
401// https://code.google.com/p/webrtc/issues/detail?id=4958
402// TODO(deadbeef): Enable again once test is reimplemented to be unflaky.
minyuedf200d12015-10-17 13:10:46 -0700403// Also disable for ASan.
Henrik Kjellander0be3e042015-10-30 21:21:03 +0100404// Disabled on Android: https://code.google.com/p/webrtc/issues/detail?id=4364
ivocf399f212015-11-19 06:44:32 -0800405// Disabled on Linux: https://bugs.chromium.org/p/webrtc/issues/detail?id=5233
minyuedf200d12015-10-17 13:10:46 -0700406#if defined(THREAD_SANITIZER) || defined(MEMORY_SANITIZER) || \
ivocf399f212015-11-19 06:44:32 -0800407 defined(ADDRESS_SANITIZER) || defined(WEBRTC_ANDROID) || \
408 defined(WEBRTC_LINUX)
minyuedf200d12015-10-17 13:10:46 -0700409#define MAYBE_TestUdpReadyToSendIPv4 DISABLED_TestUdpReadyToSendIPv4
410#else
411#define MAYBE_TestUdpReadyToSendIPv4 TestUdpReadyToSendIPv4
412#endif
413TEST_F(PhysicalSocketTest, MAYBE_TestUdpReadyToSendIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700414 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000415 SocketTest::TestUdpReadyToSendIPv4();
416}
417
danilchapb7b9dca2016-08-05 05:55:43 -0700418// https://bugs.chromium.org/p/webrtc/issues/detail?id=6167
419#if defined(WEBRTC_WIN)
420#define MAYBE_TestUdpReadyToSendIPv6 DISABLED_TestUdpReadyToSendIPv6
421#else
422#define MAYBE_TestUdpReadyToSendIPv6 TestUdpReadyToSendIPv6
423#endif
424TEST_F(PhysicalSocketTest, MAYBE_TestUdpReadyToSendIPv6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000425 SocketTest::TestUdpReadyToSendIPv6();
426}
427
428TEST_F(PhysicalSocketTest, TestGetSetOptionsIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700429 MAYBE_SKIP_IPV4;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000430 SocketTest::TestGetSetOptionsIPv4();
431}
432
433TEST_F(PhysicalSocketTest, TestGetSetOptionsIPv6) {
434 SocketTest::TestGetSetOptionsIPv6();
435}
436
437#if defined(WEBRTC_POSIX)
438
Taylor Brandstetter6f825352016-08-11 15:38:28 -0700439// We don't get recv timestamps on Mac.
Stefan Holmer9131efd2016-05-23 18:19:26 +0200440#if !defined(WEBRTC_MAC)
441TEST_F(PhysicalSocketTest, TestSocketRecvTimestampIPv4) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700442 MAYBE_SKIP_IPV4;
Taylor Brandstetter6f825352016-08-11 15:38:28 -0700443 SocketTest::TestSocketRecvTimestampIPv4();
Stefan Holmer9131efd2016-05-23 18:19:26 +0200444}
445
Taylor Brandstetter6f825352016-08-11 15:38:28 -0700446TEST_F(PhysicalSocketTest, TestSocketRecvTimestampIPv6) {
447 SocketTest::TestSocketRecvTimestampIPv6();
Stefan Holmer9131efd2016-05-23 18:19:26 +0200448}
449#endif
450
deadbeefc874d122017-02-13 15:41:59 -0800451// Verify that if the socket was unable to be bound to a real network interface
452// (not loopback), Bind will return an error.
453TEST_F(PhysicalSocketTest,
454 BindFailsIfNetworkBinderFailsForNonLoopbackInterface) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700455 MAYBE_SKIP_IPV4;
deadbeefc874d122017-02-13 15:41:59 -0800456 FakeNetworkBinder fake_network_binder;
457 server_->set_network_binder(&fake_network_binder);
458 std::unique_ptr<AsyncSocket> socket(
459 server_->CreateAsyncSocket(AF_INET, SOCK_DGRAM));
460 fake_network_binder.set_result(NetworkBindingResult::FAILURE);
461 EXPECT_EQ(-1, socket->Bind(SocketAddress("192.168.0.1", 0)));
462 server_->set_network_binder(nullptr);
463}
464
deadbeef9ffa13f2017-02-21 16:18:00 -0800465// Network binder shouldn't be used if the socket is bound to the "any" IP.
466TEST_F(PhysicalSocketTest,
467 NetworkBinderIsNotUsedForAnyIp) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700468 MAYBE_SKIP_IPV4;
deadbeef9ffa13f2017-02-21 16:18:00 -0800469 FakeNetworkBinder fake_network_binder;
470 server_->set_network_binder(&fake_network_binder);
471 std::unique_ptr<AsyncSocket> socket(
472 server_->CreateAsyncSocket(AF_INET, SOCK_DGRAM));
473 EXPECT_EQ(0, socket->Bind(SocketAddress("0.0.0.0", 0)));
474 EXPECT_EQ(0, fake_network_binder.num_binds());
475 server_->set_network_binder(nullptr);
476}
477
deadbeefc874d122017-02-13 15:41:59 -0800478// For a loopback interface, failures to bind to the interface should be
479// tolerated.
480TEST_F(PhysicalSocketTest,
481 BindSucceedsIfNetworkBinderFailsForLoopbackInterface) {
deadbeef9a6f4d42017-05-15 19:43:33 -0700482 MAYBE_SKIP_IPV4;
deadbeefc874d122017-02-13 15:41:59 -0800483 FakeNetworkBinder fake_network_binder;
484 server_->set_network_binder(&fake_network_binder);
485 std::unique_ptr<AsyncSocket> socket(
486 server_->CreateAsyncSocket(AF_INET, SOCK_DGRAM));
487 fake_network_binder.set_result(NetworkBindingResult::FAILURE);
488 EXPECT_EQ(0, socket->Bind(SocketAddress(kIPv4Loopback, 0)));
489 server_->set_network_binder(nullptr);
490}
491
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000492class PosixSignalDeliveryTest : public testing::Test {
493 public:
494 static void RecordSignal(int signum) {
495 signals_received_.push_back(signum);
496 signaled_thread_ = Thread::Current();
497 }
498
499 protected:
Steve Anton9de3aac2017-10-24 10:08:26 -0700500 void SetUp() override { ss_.reset(new PhysicalSocketServer()); }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000501
Steve Anton9de3aac2017-10-24 10:08:26 -0700502 void TearDown() override {
deadbeef37f5ecf2017-02-27 14:06:41 -0800503 ss_.reset(nullptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000504 signals_received_.clear();
deadbeef37f5ecf2017-02-27 14:06:41 -0800505 signaled_thread_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000506 }
507
508 bool ExpectSignal(int signum) {
509 if (signals_received_.empty()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100510 RTC_LOG(LS_ERROR) << "ExpectSignal(): No signal received";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000511 return false;
512 }
513 if (signals_received_[0] != signum) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100514 RTC_LOG(LS_ERROR) << "ExpectSignal(): Received signal "
515 << signals_received_[0] << ", expected " << signum;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000516 return false;
517 }
518 signals_received_.erase(signals_received_.begin());
519 return true;
520 }
521
522 bool ExpectNone() {
523 bool ret = signals_received_.empty();
524 if (!ret) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100525 RTC_LOG(LS_ERROR) << "ExpectNone(): Received signal "
526 << signals_received_[0] << ", expected none";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000527 }
528 return ret;
529 }
530
531 static std::vector<int> signals_received_;
532 static Thread *signaled_thread_;
533
jbauch555604a2016-04-26 03:13:22 -0700534 std::unique_ptr<PhysicalSocketServer> ss_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000535};
536
537std::vector<int> PosixSignalDeliveryTest::signals_received_;
deadbeef37f5ecf2017-02-27 14:06:41 -0800538Thread* PosixSignalDeliveryTest::signaled_thread_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000539
540// Test receiving a synchronous signal while not in Wait() and then entering
541// Wait() afterwards.
henrike@webrtc.orgc732a3e2014-10-09 22:08:15 +0000542TEST_F(PosixSignalDeliveryTest, RaiseThenWait) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000543 ASSERT_TRUE(ss_->SetPosixSignalHandler(SIGTERM, &RecordSignal));
544 raise(SIGTERM);
545 EXPECT_TRUE(ss_->Wait(0, true));
546 EXPECT_TRUE(ExpectSignal(SIGTERM));
547 EXPECT_TRUE(ExpectNone());
548}
549
550// Test that we can handle getting tons of repeated signals and that we see all
551// the different ones.
henrike@webrtc.orgc732a3e2014-10-09 22:08:15 +0000552TEST_F(PosixSignalDeliveryTest, InsanelyManySignals) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000553 ss_->SetPosixSignalHandler(SIGTERM, &RecordSignal);
554 ss_->SetPosixSignalHandler(SIGINT, &RecordSignal);
555 for (int i = 0; i < 10000; ++i) {
556 raise(SIGTERM);
557 }
558 raise(SIGINT);
559 EXPECT_TRUE(ss_->Wait(0, true));
560 // Order will be lowest signal numbers first.
561 EXPECT_TRUE(ExpectSignal(SIGINT));
562 EXPECT_TRUE(ExpectSignal(SIGTERM));
563 EXPECT_TRUE(ExpectNone());
564}
565
566// Test that a signal during a Wait() call is detected.
henrike@webrtc.orgc732a3e2014-10-09 22:08:15 +0000567TEST_F(PosixSignalDeliveryTest, SignalDuringWait) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000568 ss_->SetPosixSignalHandler(SIGALRM, &RecordSignal);
569 alarm(1);
570 EXPECT_TRUE(ss_->Wait(1500, true));
571 EXPECT_TRUE(ExpectSignal(SIGALRM));
572 EXPECT_TRUE(ExpectNone());
573}
574
575class RaiseSigTermRunnable : public Runnable {
Steve Anton9de3aac2017-10-24 10:08:26 -0700576 void Run(Thread* thread) override {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000577 thread->socketserver()->Wait(1000, false);
578
579 // Allow SIGTERM. This will be the only thread with it not masked so it will
580 // be delivered to us.
581 sigset_t mask;
582 sigemptyset(&mask);
deadbeef37f5ecf2017-02-27 14:06:41 -0800583 pthread_sigmask(SIG_SETMASK, &mask, nullptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000584
585 // Raise it.
586 raise(SIGTERM);
587 }
588};
589
590// Test that it works no matter what thread the kernel chooses to give the
591// signal to (since it's not guaranteed to be the one that Wait() runs on).
henrike@webrtc.orgc732a3e2014-10-09 22:08:15 +0000592TEST_F(PosixSignalDeliveryTest, SignalOnDifferentThread) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000593 ss_->SetPosixSignalHandler(SIGTERM, &RecordSignal);
594 // Mask out SIGTERM so that it can't be delivered to this thread.
595 sigset_t mask;
596 sigemptyset(&mask);
597 sigaddset(&mask, SIGTERM);
deadbeef37f5ecf2017-02-27 14:06:41 -0800598 EXPECT_EQ(0, pthread_sigmask(SIG_SETMASK, &mask, nullptr));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000599 // Start a new thread that raises it. It will have to be delivered to that
600 // thread. Our implementation should safely handle it and dispatch
601 // RecordSignal() on this thread.
tommie7251592017-07-14 14:44:46 -0700602 std::unique_ptr<Thread> thread(Thread::CreateWithSocketServer());
jbauch555604a2016-04-26 03:13:22 -0700603 std::unique_ptr<RaiseSigTermRunnable> runnable(new RaiseSigTermRunnable());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000604 thread->Start(runnable.get());
605 EXPECT_TRUE(ss_->Wait(1500, true));
606 EXPECT_TRUE(ExpectSignal(SIGTERM));
607 EXPECT_EQ(Thread::Current(), signaled_thread_);
608 EXPECT_TRUE(ExpectNone());
609}
610
611#endif
612
613} // namespace rtc