blob: 9b53eb36c9e56df8ac8e77806b862803d225f734 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
Ali Tofigh7fa90572022-03-17 15:47:49 +010013#include "absl/strings/string_view.h"
14
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000015#if defined(WEBRTC_POSIX)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000016#include <net/if.h>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#endif // WEBRTC_POSIX
18
19#if defined(WEBRTC_WIN)
Mirko Bonadei01914412018-03-23 16:30:58 +010020#include <iphlpapi.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020021
Yves Gerey665174f2018-06-19 15:03:05 +020022#include "rtc_base/win32.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080023#elif !defined(__native_client__)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020024#include "rtc_base/ifaddrs_converter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000025#endif
26
jbauch555604a2016-04-26 03:13:22 -070027#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000028
Steve Anton2acd1632019-03-25 13:48:30 -070029#include "absl/algorithm/container.h"
Niels Möllerd959f3a2022-04-19 11:29:19 +020030#include "absl/memory/memory.h"
Steve Anton2acd1632019-03-25 13:48:30 -070031#include "absl/strings/match.h"
32#include "absl/strings/string_view.h"
Danil Chapovalov5286dcf2022-07-18 17:04:56 +020033#include "api/task_queue/pending_task_safety_flag.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020034#include "api/transport/field_trial_based_config.h"
Danil Chapovalov5286dcf2022-07-18 17:04:56 +020035#include "api/units/time_delta.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020036#include "rtc_base/checks.h"
37#include "rtc_base/logging.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020038#include "rtc_base/memory/always_valid_pointer.h"
Steve Anton10542f22019-01-11 09:11:00 -080039#include "rtc_base/network_monitor.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020040#include "rtc_base/socket.h" // includes something that makes windows happy
Steve Anton10542f22019-01-11 09:11:00 -080041#include "rtc_base/string_encode.h"
42#include "rtc_base/string_utils.h"
Jonas Olsson366a50c2018-09-06 13:41:30 +020043#include "rtc_base/strings/string_builder.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020044#include "rtc_base/thread.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000045
46namespace rtc {
47namespace {
Danil Chapovalov5286dcf2022-07-18 17:04:56 +020048using ::webrtc::SafeTask;
49using ::webrtc::TimeDelta;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000050
Jonas Orelandac554eb2021-08-27 09:43:38 +020051// List of MAC addresses of known VPN (for windows).
52constexpr uint8_t kVpns[2][6] = {
53 // Cisco AnyConnect.
54 {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0},
55 // GlobalProtect Virtual Ethernet.
56 {0x2, 0x50, 0x41, 0x0, 0x0, 0x1},
57};
58
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000059// Fetch list of networks every two seconds.
60const int kNetworksUpdateIntervalMs = 2000;
61
62const int kHighestNetworkPreference = 127;
63
Niels Möllerd959f3a2022-04-19 11:29:19 +020064struct AddressList {
65 std::unique_ptr<Network> net;
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +000066 std::vector<InterfaceAddress> ips;
Niels Möllerd959f3a2022-04-19 11:29:19 +020067};
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000068
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000069bool SortNetworks(const Network* a, const Network* b) {
70 // Network types will be preferred above everything else while sorting
71 // Networks.
72
73 // Networks are sorted first by type.
74 if (a->type() != b->type()) {
75 return a->type() < b->type();
76 }
77
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000078 IPAddress ip_a = a->GetBestIP();
79 IPAddress ip_b = b->GetBestIP();
80
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000081 // After type, networks are sorted by IP address precedence values
82 // from RFC 3484-bis
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000083 if (IPAddressPrecedence(ip_a) != IPAddressPrecedence(ip_b)) {
84 return IPAddressPrecedence(ip_a) > IPAddressPrecedence(ip_b);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000085 }
86
87 // TODO(mallinath) - Add VPN and Link speed conditions while sorting.
88
89 // Networks are sorted last by key.
deadbeef3427f532017-07-26 16:09:33 -070090 return a->key() < b->key();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000091}
92
Jonas Oreland2105d642020-05-13 10:15:34 +020093uint16_t ComputeNetworkCostByType(int type,
Jonas Orelandb477fc72021-08-23 12:16:33 +020094 bool is_vpn,
95 bool use_differentiated_cellular_costs,
96 bool add_network_cost_to_vpn) {
Jonas Oreland08d18062020-04-02 07:19:12 +020097 // TODO(jonaso) : Rollout support for cellular network cost using A/B
98 // experiment to make sure it does not introduce regressions.
Jonas Orelandb477fc72021-08-23 12:16:33 +020099 int vpnCost = (is_vpn && add_network_cost_to_vpn) ? kNetworkCostVpn : 0;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700100 switch (type) {
101 case rtc::ADAPTER_TYPE_ETHERNET:
102 case rtc::ADAPTER_TYPE_LOOPBACK:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200103 return kNetworkCostMin + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700104 case rtc::ADAPTER_TYPE_WIFI:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200105 return kNetworkCostLow + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700106 case rtc::ADAPTER_TYPE_CELLULAR:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200107 return kNetworkCostCellular + vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200108 case rtc::ADAPTER_TYPE_CELLULAR_2G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200109 return (use_differentiated_cellular_costs ? kNetworkCostCellular2G
110 : kNetworkCostCellular) +
111 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200112 case rtc::ADAPTER_TYPE_CELLULAR_3G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200113 return (use_differentiated_cellular_costs ? kNetworkCostCellular3G
114 : kNetworkCostCellular) +
115 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200116 case rtc::ADAPTER_TYPE_CELLULAR_4G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200117 return (use_differentiated_cellular_costs ? kNetworkCostCellular4G
118 : kNetworkCostCellular) +
119 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200120 case rtc::ADAPTER_TYPE_CELLULAR_5G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200121 return (use_differentiated_cellular_costs ? kNetworkCostCellular5G
122 : kNetworkCostCellular) +
123 vpnCost;
Qingsi Wang9f1de692018-06-28 15:38:09 -0700124 case rtc::ADAPTER_TYPE_ANY:
125 // Candidates gathered from the any-address/wildcard ports, as backups,
126 // are given the maximum cost so that if there are other candidates with
127 // known interface types, we would not select candidate pairs using these
128 // backup candidates if other selection criteria with higher precedence
129 // (network conditions over the route) are the same. Note that setting the
130 // cost to kNetworkCostUnknown would be problematic since
131 // ADAPTER_TYPE_CELLULAR would then have a higher cost. See
132 // P2PTransportChannel::SortConnectionsAndUpdateState for how we rank and
133 // select candidate pairs, where the network cost is among the criteria.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200134 return kNetworkCostMax + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700135 case rtc::ADAPTER_TYPE_VPN:
136 // The cost of a VPN should be computed using its underlying network type.
Artem Titovd3251962021-11-15 16:57:07 +0100137 RTC_DCHECK_NOTREACHED();
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700138 return kNetworkCostUnknown;
139 default:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200140 return kNetworkCostUnknown + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700141 }
142}
143
thakis06689a12015-12-30 15:05:30 -0800144#if !defined(__native_client__)
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100145bool IsIgnoredIPv6(bool allow_mac_based_ipv6, const InterfaceAddress& ip) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000146 if (ip.family() != AF_INET6) {
147 return false;
148 }
149
150 // Link-local addresses require scope id to be bound successfully.
151 // However, our IPAddress structure doesn't carry that so the
152 // information is lost and causes binding failure.
153 if (IPIsLinkLocal(ip)) {
154 return true;
155 }
156
157 // Any MAC based IPv6 should be avoided to prevent the MAC tracking.
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100158 if (IPIsMacBased(ip) && !allow_mac_based_ipv6) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000159 return true;
160 }
161
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800162 // Ignore deprecated IPv6.
163 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED) {
164 return true;
165 }
166
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000167 return false;
168}
thakis06689a12015-12-30 15:05:30 -0800169#endif // !defined(__native_client__)
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000170
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200171// Note: consider changing to const Network* as arguments
172// if/when considering other changes that should not trigger
173// OnNetworksChanged.
174bool ShouldAdapterChangeTriggerNetworkChange(rtc::AdapterType old_type,
175 rtc::AdapterType new_type) {
176 // skip triggering OnNetworksChanged if
177 // changing from one cellular to another.
178 if (Network::IsCellular(old_type) && Network::IsCellular(new_type))
179 return false;
180 return true;
181}
182
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000183} // namespace
184
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800185// These addresses are used as the targets to find out the default local address
186// on a multi-homed endpoint. They are actually DNS servers.
187const char kPublicIPv4Host[] = "8.8.8.8";
188const char kPublicIPv6Host[] = "2001:4860:4860::8888";
189const int kPublicPort = 53; // DNS port.
190
Mirko Bonadei13f9c622022-04-29 16:38:32 +0200191namespace webrtc_network_internal {
192bool CompareNetworks(const std::unique_ptr<Network>& a,
193 const std::unique_ptr<Network>& b) {
194 if (a->prefix_length() != b->prefix_length()) {
195 return a->prefix_length() < b->prefix_length();
196 }
197 if (a->name() != b->name()) {
198 return a->name() < b->name();
199 }
200 return a->prefix() < b->prefix();
201}
202} // namespace webrtc_network_internal
203
Ali Tofigh7fa90572022-03-17 15:47:49 +0100204std::string MakeNetworkKey(absl::string_view name,
Yves Gerey665174f2018-06-19 15:03:05 +0200205 const IPAddress& prefix,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000206 int prefix_length) {
Jonas Olsson366a50c2018-09-06 13:41:30 +0200207 rtc::StringBuilder ost;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000208 ost << name << "%" << prefix.ToString() << "/" << prefix_length;
Jonas Olsson84df1c72018-09-14 16:59:32 +0200209 return ost.Release();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000210}
Qingsi Wange53ac042018-05-08 11:55:07 -0700211// Test if the network name matches the type<number> pattern, e.g. eth0. The
212// matching is case-sensitive.
Steve Anton2acd1632019-03-25 13:48:30 -0700213bool MatchTypeNameWithIndexPattern(absl::string_view network_name,
214 absl::string_view type_name) {
215 if (!absl::StartsWith(network_name, type_name)) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700216 return false;
217 }
Steve Anton2acd1632019-03-25 13:48:30 -0700218 return absl::c_none_of(network_name.substr(type_name.size()),
219 [](char c) { return !isdigit(c); });
Qingsi Wange53ac042018-05-08 11:55:07 -0700220}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000221
Qingsi Wange53ac042018-05-08 11:55:07 -0700222// A cautious note that this method may not provide an accurate adapter type
223// based on the string matching. Incorrect type of adapters can affect the
224// result of the downstream network filtering, see e.g.
225// BasicPortAllocatorSession::GetNetworks when
226// PORTALLOCATOR_DISABLE_COSTLY_NETWORKS is turned on.
Ali Tofigh2ab914c2022-04-13 12:55:15 +0200227AdapterType GetAdapterTypeFromName(absl::string_view network_name) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700228 if (MatchTypeNameWithIndexPattern(network_name, "lo")) {
229 // Note that we have a more robust way to determine if a network interface
230 // is a loopback interface by checking the flag IFF_LOOPBACK in ifa_flags of
231 // an ifaddr struct. See ConvertIfAddrs in this file.
232 return ADAPTER_TYPE_LOOPBACK;
233 }
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700234
Qingsi Wange53ac042018-05-08 11:55:07 -0700235 if (MatchTypeNameWithIndexPattern(network_name, "eth")) {
236 return ADAPTER_TYPE_ETHERNET;
237 }
238
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000239 if (MatchTypeNameWithIndexPattern(network_name, "wlan") ||
240 MatchTypeNameWithIndexPattern(network_name, "v4-wlan")) {
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700241 return ADAPTER_TYPE_WIFI;
242 }
243
Qingsi Wange53ac042018-05-08 11:55:07 -0700244 if (MatchTypeNameWithIndexPattern(network_name, "ipsec") ||
245 MatchTypeNameWithIndexPattern(network_name, "tun") ||
246 MatchTypeNameWithIndexPattern(network_name, "utun") ||
247 MatchTypeNameWithIndexPattern(network_name, "tap")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800248 return ADAPTER_TYPE_VPN;
249 }
250#if defined(WEBRTC_IOS)
251 // Cell networks are pdp_ipN on iOS.
Qingsi Wange53ac042018-05-08 11:55:07 -0700252 if (MatchTypeNameWithIndexPattern(network_name, "pdp_ip")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800253 return ADAPTER_TYPE_CELLULAR;
254 }
Qingsi Wange53ac042018-05-08 11:55:07 -0700255 if (MatchTypeNameWithIndexPattern(network_name, "en")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800256 // This may not be most accurate because sometimes Ethernet interface
257 // name also starts with "en" but it is better than showing it as
258 // "unknown" type.
259 // TODO(honghaiz): Write a proper IOS network manager.
260 return ADAPTER_TYPE_WIFI;
261 }
262#elif defined(WEBRTC_ANDROID)
Qingsi Wange53ac042018-05-08 11:55:07 -0700263 if (MatchTypeNameWithIndexPattern(network_name, "rmnet") ||
264 MatchTypeNameWithIndexPattern(network_name, "rmnet_data") ||
265 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet") ||
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800266 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet_data") ||
267 MatchTypeNameWithIndexPattern(network_name, "clat")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800268 return ADAPTER_TYPE_CELLULAR;
269 }
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800270#endif
271
272 return ADAPTER_TYPE_UNKNOWN;
273}
274
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700275NetworkManager::EnumerationPermission NetworkManager::enumeration_permission()
276 const {
guoweisea1012b2015-08-21 09:06:28 -0700277 return ENUMERATION_ALLOWED;
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700278}
279
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800280bool NetworkManager::GetDefaultLocalAddress(int family, IPAddress* addr) const {
281 return false;
282}
283
Qingsi Wang7852d292018-10-31 11:17:07 -0700284webrtc::MdnsResponderInterface* NetworkManager::GetMdnsResponder() const {
Qingsi Wang09619332018-09-12 22:51:55 -0700285 return nullptr;
286}
287
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200288NetworkManagerBase::NetworkManagerBase(
Jonas Orelande62c2f22022-03-29 11:04:48 +0200289 const webrtc::FieldTrialsView* field_trials)
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200290 : enumeration_permission_(NetworkManager::ENUMERATION_ALLOWED),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200291 signal_network_preference_change_(
292 field_trials
293 ? field_trials->IsEnabled("WebRTC-SignalNetworkPreferenceChange")
294 : false) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000295
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700296NetworkManager::EnumerationPermission
297NetworkManagerBase::enumeration_permission() const {
298 return enumeration_permission_;
299}
300
Niels Möller22211442022-04-07 11:43:28 +0200301std::vector<const Network*> NetworkManagerBase::GetAnyAddressNetworks() {
302 std::vector<const Network*> networks;
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000303 if (!ipv4_any_address_network_) {
304 const rtc::IPAddress ipv4_any_address(INADDR_ANY);
Niels Möller22211442022-04-07 11:43:28 +0200305 ipv4_any_address_network_ = std::make_unique<Network>(
306 "any", "any", ipv4_any_address, 0, ADAPTER_TYPE_ANY);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800307 ipv4_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800308 ipv4_any_address_network_->set_mdns_responder_provider(this);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000309 ipv4_any_address_network_->AddIP(ipv4_any_address);
310 }
Niels Möller22211442022-04-07 11:43:28 +0200311 networks.push_back(ipv4_any_address_network_.get());
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000312
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100313 if (!ipv6_any_address_network_) {
314 const rtc::IPAddress ipv6_any_address(in6addr_any);
Niels Möller22211442022-04-07 11:43:28 +0200315 ipv6_any_address_network_ = std::make_unique<Network>(
316 "any", "any", ipv6_any_address, 0, ADAPTER_TYPE_ANY);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100317 ipv6_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800318 ipv6_any_address_network_->set_mdns_responder_provider(this);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100319 ipv6_any_address_network_->AddIP(ipv6_any_address);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000320 }
Niels Möller22211442022-04-07 11:43:28 +0200321 networks.push_back(ipv6_any_address_network_.get());
322 return networks;
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000323}
324
Niels Möller22211442022-04-07 11:43:28 +0200325std::vector<const Network*> NetworkManagerBase::GetNetworks() const {
326 std::vector<const Network*> result;
327 result.insert(result.begin(), networks_.begin(), networks_.end());
328 return result;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000329}
330
Niels Möllerd959f3a2022-04-19 11:29:19 +0200331void NetworkManagerBase::MergeNetworkList(
332 std::vector<std::unique_ptr<Network>> new_networks,
333 bool* changed) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000334 NetworkManager::Stats stats;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200335 MergeNetworkList(std::move(new_networks), changed, &stats);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000336}
337
Niels Möllerd959f3a2022-04-19 11:29:19 +0200338void NetworkManagerBase::MergeNetworkList(
339 std::vector<std::unique_ptr<Network>> new_networks,
340 bool* changed,
341 NetworkManager::Stats* stats) {
honghaizdb8cf502015-12-21 13:08:46 -0800342 *changed = false;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000343 // AddressList in this map will track IP addresses for all Networks
344 // with the same key.
345 std::map<std::string, AddressList> consolidated_address_list;
Mirko Bonadei13f9c622022-04-29 16:38:32 +0200346 absl::c_sort(new_networks, rtc::webrtc_network_internal::CompareNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000347 // First, build a set of network-keys to the ipaddresses.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200348 for (auto& network : new_networks) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000349 bool might_add_to_merged_list = false;
Yves Gerey665174f2018-06-19 15:03:05 +0200350 std::string key = MakeNetworkKey(network->name(), network->prefix(),
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000351 network->prefix_length());
Niels Möllerd959f3a2022-04-19 11:29:19 +0200352 const std::vector<InterfaceAddress>& addresses = network->GetIPs();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000353 if (consolidated_address_list.find(key) ==
354 consolidated_address_list.end()) {
355 AddressList addrlist;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200356 addrlist.net = std::move(network);
357 consolidated_address_list[key] = std::move(addrlist);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000358 might_add_to_merged_list = true;
359 }
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000360 AddressList& current_list = consolidated_address_list[key];
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000361 for (const InterfaceAddress& address : addresses) {
362 current_list.ips.push_back(address);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000363 }
Niels Möllerd959f3a2022-04-19 11:29:19 +0200364 if (might_add_to_merged_list) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000365 if (current_list.ips[0].family() == AF_INET) {
366 stats->ipv4_network_count++;
367 } else {
nisseede5da42017-01-12 05:15:36 -0800368 RTC_DCHECK(current_list.ips[0].family() == AF_INET6);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000369 stats->ipv6_network_count++;
370 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000371 }
372 }
373
374 // Next, look for existing network objects to re-use.
honghaizdb8cf502015-12-21 13:08:46 -0800375 // Result of Network merge. Element in this list should have unique key.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200376 std::vector<Network*> merged_list;
377 for (auto& kv : consolidated_address_list) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000378 const std::string& key = kv.first;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200379 std::unique_ptr<Network> net = std::move(kv.second.net);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000380 auto existing = networks_map_.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000381 if (existing == networks_map_.end()) {
Niels Möllerd959f3a2022-04-19 11:29:19 +0200382 // This network is new.
honghaiza0c44ea2016-03-23 16:07:48 -0700383 net->set_id(next_available_network_id_++);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200384 // We might have accumulated IPAddresses from the first
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000385 // step, set it here.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000386 net->SetIPs(kv.second.ips, true);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200387 // Place it in the network map.
388 merged_list.push_back(net.get());
389 networks_map_[key] = std::move(net);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000390 *changed = true;
391 } else {
392 // This network exists in the map already. Reset its IP addresses.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200393 Network* existing_net = existing->second.get();
honghaizdb8cf502015-12-21 13:08:46 -0800394 *changed = existing_net->SetIPs(kv.second.ips, *changed);
395 merged_list.push_back(existing_net);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700396 if (net->type() != ADAPTER_TYPE_UNKNOWN &&
397 net->type() != existing_net->type()) {
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200398 if (ShouldAdapterChangeTriggerNetworkChange(existing_net->type(),
399 net->type())) {
400 *changed = true;
401 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700402 existing_net->set_type(net->type());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700403 }
honghaizdb8cf502015-12-21 13:08:46 -0800404 // If the existing network was not active, networks have changed.
405 if (!existing_net->active()) {
406 *changed = true;
407 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200408 if (net->network_preference() != existing_net->network_preference()) {
409 existing_net->set_network_preference(net->network_preference());
410 if (signal_network_preference_change_) {
411 *changed = true;
412 }
413 }
nisseede5da42017-01-12 05:15:36 -0800414 RTC_DCHECK(net->active());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000415 }
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800416 networks_map_[key]->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000417 }
Artem Titov96e3b992021-07-26 16:03:14 +0200418 // It may still happen that the merged list is a subset of `networks_`.
honghaizdb8cf502015-12-21 13:08:46 -0800419 // To detect this change, we compare their sizes.
420 if (merged_list.size() != networks_.size()) {
421 *changed = true;
422 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000423
Artem Titov96e3b992021-07-26 16:03:14 +0200424 // If the network list changes, we re-assign `networks_` to the merged list
honghaizdb8cf502015-12-21 13:08:46 -0800425 // and re-sort it.
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000426 if (*changed) {
honghaizdb8cf502015-12-21 13:08:46 -0800427 networks_ = merged_list;
428 // Reset the active states of all networks.
429 for (const auto& kv : networks_map_) {
Niels Möllerd959f3a2022-04-19 11:29:19 +0200430 const std::unique_ptr<Network>& network = kv.second;
Artem Titov96e3b992021-07-26 16:03:14 +0200431 // If `network` is in the newly generated `networks_`, it is active.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200432 bool found = absl::c_linear_search(networks_, network.get());
honghaize3c6c822016-02-17 13:00:28 -0800433 network->set_active(found);
honghaizdb8cf502015-12-21 13:08:46 -0800434 }
Steve Anton2acd1632019-03-25 13:48:30 -0700435 absl::c_sort(networks_, SortNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000436 // Now network interfaces are sorted, we should set the preference value
437 // for each of the interfaces we are planning to use.
438 // Preference order of network interfaces might have changed from previous
439 // sorting due to addition of higher preference network interface.
440 // Since we have already sorted the network interfaces based on our
441 // requirements, we will just assign a preference value starting with 127,
442 // in decreasing order.
443 int pref = kHighestNetworkPreference;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000444 for (Network* network : networks_) {
445 network->set_preference(pref);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000446 if (pref > 0) {
447 --pref;
448 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100449 RTC_LOG(LS_ERROR) << "Too many network interfaces to handle!";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000450 break;
451 }
452 }
453 }
454}
455
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800456void NetworkManagerBase::set_default_local_addresses(const IPAddress& ipv4,
457 const IPAddress& ipv6) {
458 if (ipv4.family() == AF_INET) {
459 default_local_ipv4_address_ = ipv4;
460 }
461 if (ipv6.family() == AF_INET6) {
462 default_local_ipv6_address_ = ipv6;
463 }
464}
465
466bool NetworkManagerBase::GetDefaultLocalAddress(int family,
467 IPAddress* ipaddr) const {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800468 if (family == AF_INET && !default_local_ipv4_address_.IsNil()) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800469 *ipaddr = default_local_ipv4_address_;
470 return true;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800471 } else if (family == AF_INET6 && !default_local_ipv6_address_.IsNil()) {
honghaizaf83fe62016-04-18 14:50:44 -0700472 Network* ipv6_network = GetNetworkFromAddress(default_local_ipv6_address_);
473 if (ipv6_network) {
474 // If the default ipv6 network's BestIP is different than
475 // default_local_ipv6_address_, use it instead.
476 // This is to prevent potential IP address leakage. See WebRTC bug 5376.
477 *ipaddr = ipv6_network->GetBestIP();
478 } else {
479 *ipaddr = default_local_ipv6_address_;
480 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800481 return true;
482 }
483 return false;
484}
485
honghaizaf83fe62016-04-18 14:50:44 -0700486Network* NetworkManagerBase::GetNetworkFromAddress(
487 const rtc::IPAddress& ip) const {
488 for (Network* network : networks_) {
489 const auto& ips = network->GetIPs();
Steve Anton2acd1632019-03-25 13:48:30 -0700490 if (absl::c_any_of(ips, [&](const InterfaceAddress& existing_ip) {
491 return ip == static_cast<rtc::IPAddress>(existing_ip);
492 })) {
honghaizaf83fe62016-04-18 14:50:44 -0700493 return network;
494 }
495 }
496 return nullptr;
497}
498
Jonas Orelandac554eb2021-08-27 09:43:38 +0200499bool NetworkManagerBase::IsVpnMacAddress(
500 rtc::ArrayView<const uint8_t> address) {
501 if (address.data() == nullptr && address.size() == 0) {
502 return false;
503 }
504 for (const auto& vpn : kVpns) {
505 if (sizeof(vpn) == address.size() &&
506 memcmp(vpn, address.data(), address.size()) == 0) {
507 return true;
508 }
509 }
510 return false;
511}
512
Niels Mölleraa373162021-09-28 16:09:07 +0200513BasicNetworkManager::BasicNetworkManager(
514 NetworkMonitorFactory* network_monitor_factory,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200515 SocketFactory* socket_factory,
Jonas Orelande62c2f22022-03-29 11:04:48 +0200516 const webrtc::FieldTrialsView* field_trials)
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200517 : field_trials_(field_trials),
518 network_monitor_factory_(network_monitor_factory),
Niels Mölleraa373162021-09-28 16:09:07 +0200519 socket_factory_(socket_factory),
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100520 allow_mac_based_ipv6_(
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200521 field_trials_->IsEnabled("WebRTC-AllowMACBasedIPv6")),
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000522 bind_using_ifname_(
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200523 !field_trials_->IsDisabled("WebRTC-BindUsingInterfaceName")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000524
Niels Möller27c14522022-02-07 16:44:21 +0100525BasicNetworkManager::~BasicNetworkManager() {
526 if (task_safety_flag_) {
527 task_safety_flag_->SetNotAlive();
528 }
529}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000530
honghaiz023f3ef2015-10-19 09:39:32 -0700531void BasicNetworkManager::OnNetworksChanged() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700532 RTC_DCHECK_RUN_ON(thread_);
Mirko Bonadei675513b2017-11-09 11:09:25 +0100533 RTC_LOG(LS_INFO) << "Network change was observed";
honghaiz023f3ef2015-10-19 09:39:32 -0700534 UpdateNetworksOnce();
535}
536
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000537#if defined(__native_client__)
538
Niels Möllerd959f3a2022-04-19 11:29:19 +0200539bool BasicNetworkManager::CreateNetworks(
540 bool include_ignored,
541 std::vector<std::unique_ptr<Network>>* networks) const {
Artem Titovd3251962021-11-15 16:57:07 +0100542 RTC_DCHECK_NOTREACHED();
Mirko Bonadei675513b2017-11-09 11:09:25 +0100543 RTC_LOG(LS_WARNING) << "BasicNetworkManager doesn't work on NaCl yet";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000544 return false;
545}
546
547#elif defined(WEBRTC_POSIX)
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200548NetworkMonitorInterface::InterfaceInfo BasicNetworkManager::GetInterfaceInfo(
549 struct ifaddrs* cursor) const {
550 if (cursor->ifa_flags & IFF_LOOPBACK) {
551 return {
552 .adapter_type = ADAPTER_TYPE_LOOPBACK,
553 .underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN,
554 .network_preference = NetworkPreference::NEUTRAL,
555 .available = true,
556 };
557 } else if (network_monitor_) {
558 return network_monitor_->GetInterfaceInfo(cursor->ifa_name);
559 } else {
560 return {.adapter_type = GetAdapterTypeFromName(cursor->ifa_name),
561 .underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN,
562 .network_preference = NetworkPreference::NEUTRAL,
563 .available = true};
564 }
565}
566
Niels Möllerd959f3a2022-04-19 11:29:19 +0200567void BasicNetworkManager::ConvertIfAddrs(
568 struct ifaddrs* interfaces,
569 IfAddrsConverter* ifaddrs_converter,
570 bool include_ignored,
571 std::vector<std::unique_ptr<Network>>* networks) const {
572 std::map<std::string, Network*> current_networks;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800573
deadbeef37f5ecf2017-02-27 14:06:41 -0800574 for (struct ifaddrs* cursor = interfaces; cursor != nullptr;
575 cursor = cursor->ifa_next) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000576 IPAddress prefix;
577 IPAddress mask;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800578 InterfaceAddress ip;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000579 int scope_id = 0;
580
581 // Some interfaces may not have address assigned.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800582 if (!cursor->ifa_addr || !cursor->ifa_netmask) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000583 continue;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800584 }
585 // Skip ones which are down.
586 if (!(cursor->ifa_flags & IFF_RUNNING)) {
587 continue;
588 }
589 // Skip unknown family.
590 if (cursor->ifa_addr->sa_family != AF_INET &&
591 cursor->ifa_addr->sa_family != AF_INET6) {
592 continue;
593 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800594 // Convert to InterfaceAddress.
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200595 // TODO(webrtc:13114): Convert ConvertIfAddrs to use rtc::Netmask.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800596 if (!ifaddrs_converter->ConvertIfAddrsToIPAddress(cursor, &ip, &mask)) {
597 continue;
598 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000599
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800600 // Special case for IPv6 address.
601 if (cursor->ifa_addr->sa_family == AF_INET6) {
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100602 if (IsIgnoredIPv6(allow_mac_based_ipv6_, ip)) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000603 continue;
604 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800605 scope_id =
606 reinterpret_cast<sockaddr_in6*>(cursor->ifa_addr)->sin6_scope_id;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000607 }
608
609 int prefix_length = CountIPMaskBits(mask);
610 prefix = TruncateIP(ip, prefix_length);
Yves Gerey665174f2018-06-19 15:03:05 +0200611 std::string key =
612 MakeNetworkKey(std::string(cursor->ifa_name), prefix, prefix_length);
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200613
Honghai Zhang351d77b2016-05-20 15:08:29 -0700614 auto iter = current_networks.find(key);
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200615 if (iter != current_networks.end()) {
616 // We have already added this network, simply add extra IP.
617 iter->second->AddIP(ip);
618#if RTC_DCHECK_IS_ON
619 // Validate that different IP of same network has same properties
620 auto existing_network = iter->second;
621
622 NetworkMonitorInterface::InterfaceInfo if_info = GetInterfaceInfo(cursor);
623 if (if_info.adapter_type != ADAPTER_TYPE_VPN &&
624 IsConfiguredVpn(prefix, prefix_length)) {
625 if_info.underlying_type_for_vpn = if_info.adapter_type;
626 if_info.adapter_type = ADAPTER_TYPE_VPN;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000627 }
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200628
629 RTC_DCHECK(existing_network->type() == if_info.adapter_type);
630 RTC_DCHECK(existing_network->underlying_type_for_vpn() ==
631 if_info.underlying_type_for_vpn);
632 RTC_DCHECK(existing_network->network_preference() ==
633 if_info.network_preference);
634 if (!if_info.available) {
635 RTC_DCHECK(existing_network->ignored());
636 }
637#endif // RTC_DCHECK_IS_ON
638 continue;
639 }
640
641 // Create a new network.
642 NetworkMonitorInterface::InterfaceInfo if_info = GetInterfaceInfo(cursor);
643
644 // Check manually configured VPN override.
645 if (if_info.adapter_type != ADAPTER_TYPE_VPN &&
646 IsConfiguredVpn(prefix, prefix_length)) {
647 if_info.underlying_type_for_vpn = if_info.adapter_type;
648 if_info.adapter_type = ADAPTER_TYPE_VPN;
649 }
650
651 auto network =
652 std::make_unique<Network>(cursor->ifa_name, cursor->ifa_name, prefix,
653 prefix_length, if_info.adapter_type);
654 network->set_default_local_address_provider(this);
655 network->set_scope_id(scope_id);
656 network->AddIP(ip);
657 if (!if_info.available) {
658 network->set_ignored(true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000659 } else {
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200660 network->set_ignored(IsIgnoredNetwork(*network));
661 }
662 network->set_underlying_type_for_vpn(if_info.underlying_type_for_vpn);
663 network->set_network_preference(if_info.network_preference);
664 if (include_ignored || !network->ignored()) {
665 current_networks[key] = network.get();
666 networks->push_back(std::move(network));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000667 }
668 }
669}
670
Niels Möllerd959f3a2022-04-19 11:29:19 +0200671bool BasicNetworkManager::CreateNetworks(
672 bool include_ignored,
673 std::vector<std::unique_ptr<Network>>* networks) const {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000674 struct ifaddrs* interfaces;
675 int error = getifaddrs(&interfaces);
676 if (error != 0) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000677 RTC_LOG_ERR(LS_ERROR) << "getifaddrs failed to gather interface data: "
678 << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000679 return false;
680 }
681
jbauch555604a2016-04-26 03:13:22 -0700682 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(CreateIfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800683 ConvertIfAddrs(interfaces, ifaddrs_converter.get(), include_ignored,
684 networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000685
686 freeifaddrs(interfaces);
687 return true;
688}
689
690#elif defined(WEBRTC_WIN)
691
692unsigned int GetPrefix(PIP_ADAPTER_PREFIX prefixlist,
Yves Gerey665174f2018-06-19 15:03:05 +0200693 const IPAddress& ip,
694 IPAddress* prefix) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000695 IPAddress current_prefix;
696 IPAddress best_prefix;
697 unsigned int best_length = 0;
698 while (prefixlist) {
699 // Look for the longest matching prefix in the prefixlist.
deadbeef37f5ecf2017-02-27 14:06:41 -0800700 if (prefixlist->Address.lpSockaddr == nullptr ||
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000701 prefixlist->Address.lpSockaddr->sa_family != ip.family()) {
702 prefixlist = prefixlist->Next;
703 continue;
704 }
705 switch (prefixlist->Address.lpSockaddr->sa_family) {
706 case AF_INET: {
707 sockaddr_in* v4_addr =
708 reinterpret_cast<sockaddr_in*>(prefixlist->Address.lpSockaddr);
709 current_prefix = IPAddress(v4_addr->sin_addr);
710 break;
711 }
712 case AF_INET6: {
Yves Gerey665174f2018-06-19 15:03:05 +0200713 sockaddr_in6* v6_addr =
714 reinterpret_cast<sockaddr_in6*>(prefixlist->Address.lpSockaddr);
715 current_prefix = IPAddress(v6_addr->sin6_addr);
716 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000717 }
718 default: {
719 prefixlist = prefixlist->Next;
720 continue;
721 }
722 }
723 if (TruncateIP(ip, prefixlist->PrefixLength) == current_prefix &&
724 prefixlist->PrefixLength > best_length) {
725 best_prefix = current_prefix;
726 best_length = prefixlist->PrefixLength;
727 }
728 prefixlist = prefixlist->Next;
729 }
730 *prefix = best_prefix;
731 return best_length;
732}
733
Niels Möllerd959f3a2022-04-19 11:29:19 +0200734bool BasicNetworkManager::CreateNetworks(
735 bool include_ignored,
736 std::vector<std::unique_ptr<Network>>* networks) const {
737 std::map<std::string, Network*> current_networks;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000738 // MSDN recommends a 15KB buffer for the first try at GetAdaptersAddresses.
739 size_t buffer_size = 16384;
jbauch555604a2016-04-26 03:13:22 -0700740 std::unique_ptr<char[]> adapter_info(new char[buffer_size]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000741 PIP_ADAPTER_ADDRESSES adapter_addrs =
742 reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
743 int adapter_flags = (GAA_FLAG_SKIP_DNS_SERVER | GAA_FLAG_SKIP_ANYCAST |
744 GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_INCLUDE_PREFIX);
745 int ret = 0;
746 do {
747 adapter_info.reset(new char[buffer_size]);
748 adapter_addrs = reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
Yves Gerey665174f2018-06-19 15:03:05 +0200749 ret = GetAdaptersAddresses(AF_UNSPEC, adapter_flags, 0, adapter_addrs,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000750 reinterpret_cast<PULONG>(&buffer_size));
751 } while (ret == ERROR_BUFFER_OVERFLOW);
752 if (ret != ERROR_SUCCESS) {
753 return false;
754 }
755 int count = 0;
756 while (adapter_addrs) {
757 if (adapter_addrs->OperStatus == IfOperStatusUp) {
758 PIP_ADAPTER_UNICAST_ADDRESS address = adapter_addrs->FirstUnicastAddress;
759 PIP_ADAPTER_PREFIX prefixlist = adapter_addrs->FirstPrefix;
Hans Wennborg597e03f2022-04-01 10:23:25 +0200760 std::string description = ToUtf8(adapter_addrs->Description,
761 wcslen(adapter_addrs->Description));
762
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000763 for (; address; address = address->Next) {
Hans Wennborg597e03f2022-04-01 10:23:25 +0200764 std::string name = rtc::ToString(count);
765#if !defined(NDEBUG)
766 name = ToUtf8(adapter_addrs->FriendlyName,
767 wcslen(adapter_addrs->FriendlyName));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000768#endif
769
770 IPAddress ip;
771 int scope_id = 0;
jbauch555604a2016-04-26 03:13:22 -0700772 std::unique_ptr<Network> network;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000773 switch (address->Address.lpSockaddr->sa_family) {
774 case AF_INET: {
775 sockaddr_in* v4_addr =
776 reinterpret_cast<sockaddr_in*>(address->Address.lpSockaddr);
777 ip = IPAddress(v4_addr->sin_addr);
778 break;
779 }
780 case AF_INET6: {
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100781 sockaddr_in6* v6_addr =
782 reinterpret_cast<sockaddr_in6*>(address->Address.lpSockaddr);
783 scope_id = v6_addr->sin6_scope_id;
784 ip = IPAddress(v6_addr->sin6_addr);
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000785
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100786 if (IsIgnoredIPv6(allow_mac_based_ipv6_, InterfaceAddress(ip))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000787 continue;
788 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100789
790 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000791 }
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800792 default: {
793 continue;
794 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000795 }
796
797 IPAddress prefix;
798 int prefix_length = GetPrefix(prefixlist, ip, &prefix);
799 std::string key = MakeNetworkKey(name, prefix, prefix_length);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000800 auto existing_network = current_networks.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000801 if (existing_network == current_networks.end()) {
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000802 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Yura Yaroshevich0ce868c2018-05-15 11:15:32 +0300803 switch (adapter_addrs->IfType) {
804 case IF_TYPE_SOFTWARE_LOOPBACK:
805 adapter_type = ADAPTER_TYPE_LOOPBACK;
806 break;
807 case IF_TYPE_ETHERNET_CSMACD:
808 case IF_TYPE_ETHERNET_3MBIT:
809 case IF_TYPE_IEEE80212:
810 case IF_TYPE_FASTETHER:
811 case IF_TYPE_FASTETHER_FX:
812 case IF_TYPE_GIGABITETHERNET:
813 adapter_type = ADAPTER_TYPE_ETHERNET;
814 break;
815 case IF_TYPE_IEEE80211:
816 adapter_type = ADAPTER_TYPE_WIFI;
817 break;
818 case IF_TYPE_WWANPP:
819 case IF_TYPE_WWANPP2:
820 adapter_type = ADAPTER_TYPE_CELLULAR;
821 break;
822 default:
823 // TODO(phoglund): Need to recognize other types as well.
824 adapter_type = ADAPTER_TYPE_UNKNOWN;
825 break;
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000826 }
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200827 auto underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN;
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200828 if (adapter_type != ADAPTER_TYPE_VPN &&
829 IsConfiguredVpn(prefix, prefix_length)) {
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200830 underlying_type_for_vpn = adapter_type;
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200831 adapter_type = ADAPTER_TYPE_VPN;
832 }
Jonas Orelandac554eb2021-08-27 09:43:38 +0200833 if (adapter_type != ADAPTER_TYPE_VPN &&
834 IsVpnMacAddress(rtc::ArrayView<const uint8_t>(
835 reinterpret_cast<const uint8_t*>(
836 adapter_addrs->PhysicalAddress),
837 adapter_addrs->PhysicalAddressLength))) {
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200838 underlying_type_for_vpn = adapter_type;
Jonas Orelandac554eb2021-08-27 09:43:38 +0200839 adapter_type = ADAPTER_TYPE_VPN;
840 }
841
Niels Möllerd959f3a2022-04-19 11:29:19 +0200842 auto network = std::make_unique<Network>(name, description, prefix,
843 prefix_length, adapter_type);
Jonas Oreland61dbcd12022-05-31 11:34:20 +0200844 network->set_underlying_type_for_vpn(underlying_type_for_vpn);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800845 network->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800846 network->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000847 network->set_scope_id(scope_id);
848 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000849 bool ignored = IsIgnoredNetwork(*network);
850 network->set_ignored(ignored);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000851 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800852 current_networks[key] = network.get();
Niels Möllerd959f3a2022-04-19 11:29:19 +0200853 networks->push_back(std::move(network));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000854 }
855 } else {
856 (*existing_network).second->AddIP(ip);
857 }
858 }
859 // Count is per-adapter - all 'Networks' created from the same
860 // adapter need to have the same name.
861 ++count;
862 }
863 adapter_addrs = adapter_addrs->Next;
864 }
865 return true;
866}
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000867#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000868
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000869bool BasicNetworkManager::IsIgnoredNetwork(const Network& network) const {
870 // Ignore networks on the explicit ignore list.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000871 for (const std::string& ignored_name : network_ignore_list_) {
872 if (network.name() == ignored_name) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000873 return true;
874 }
875 }
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000876
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000877#if defined(WEBRTC_POSIX)
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000878 // Filter out VMware/VirtualBox interfaces, typically named vmnet1,
879 // vmnet8, or vboxnet0.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000880 if (strncmp(network.name().c_str(), "vmnet", 5) == 0 ||
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000881 strncmp(network.name().c_str(), "vnic", 4) == 0 ||
882 strncmp(network.name().c_str(), "vboxnet", 7) == 0) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000883 return true;
884 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000885#elif defined(WEBRTC_WIN)
886 // Ignore any HOST side vmware adapters with a description like:
887 // VMware Virtual Ethernet Adapter for VMnet1
888 // but don't ignore any GUEST side adapters with a description like:
889 // VMware Accelerated AMD PCNet Adapter #2
deadbeef37f5ecf2017-02-27 14:06:41 -0800890 if (strstr(network.description().c_str(), "VMnet") != nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000891 return true;
892 }
893#endif
894
895 // Ignore any networks with a 0.x.y.z IP
896 if (network.prefix().family() == AF_INET) {
897 return (network.prefix().v4AddressAsHostOrderInteger() < 0x01000000);
898 }
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000899
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000900 return false;
901}
902
903void BasicNetworkManager::StartUpdating() {
904 thread_ = Thread::Current();
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700905 // Redundant but necessary for thread annotations.
906 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000907 if (start_count_) {
908 // If network interfaces are already discovered and signal is sent,
909 // we should trigger network signal immediately for the new clients
910 // to start allocating ports.
911 if (sent_first_update_)
Danil Chapovalov5286dcf2022-07-18 17:04:56 +0200912 thread_->PostTask(SafeTask(task_safety_flag_, [this] {
Niels Möller27c14522022-02-07 16:44:21 +0100913 RTC_DCHECK_RUN_ON(thread_);
914 SignalNetworksChanged();
915 }));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000916 } else {
Niels Möller27c14522022-02-07 16:44:21 +0100917 RTC_DCHECK(task_safety_flag_ == nullptr);
918 task_safety_flag_ = webrtc::PendingTaskSafetyFlag::Create();
Danil Chapovalov5286dcf2022-07-18 17:04:56 +0200919 thread_->PostTask(SafeTask(task_safety_flag_, [this] {
Niels Möller27c14522022-02-07 16:44:21 +0100920 RTC_DCHECK_RUN_ON(thread_);
921 UpdateNetworksContinually();
922 }));
honghaiz023f3ef2015-10-19 09:39:32 -0700923 StartNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000924 }
925 ++start_count_;
926}
927
928void BasicNetworkManager::StopUpdating() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700929 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000930 if (!start_count_)
931 return;
932
933 --start_count_;
934 if (!start_count_) {
Niels Möller27c14522022-02-07 16:44:21 +0100935 task_safety_flag_->SetNotAlive();
936 task_safety_flag_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000937 sent_first_update_ = false;
honghaiz023f3ef2015-10-19 09:39:32 -0700938 StopNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000939 }
940}
941
honghaiz023f3ef2015-10-19 09:39:32 -0700942void BasicNetworkManager::StartNetworkMonitor() {
Taylor Brandstetter07fc24d2020-08-12 01:58:10 +0000943 if (network_monitor_factory_ == nullptr) {
944 return;
honghaiz023f3ef2015-10-19 09:39:32 -0700945 }
honghaiz023f3ef2015-10-19 09:39:32 -0700946 if (!network_monitor_) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200947 network_monitor_.reset(
948 network_monitor_factory_->CreateNetworkMonitor(*field_trials_));
honghaizcec0a082016-01-15 14:49:09 -0800949 if (!network_monitor_) {
950 return;
951 }
Mirko Bonadei37077932021-07-27 17:00:58 +0200952 network_monitor_->SetNetworksChangedCallback(
953 [this]() { OnNetworksChanged(); });
honghaiz023f3ef2015-10-19 09:39:32 -0700954 }
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000955
956 if (network_monitor_->SupportsBindSocketToNetwork()) {
957 // Set NetworkBinder on SocketServer so that
958 // PhysicalSocket::Bind will call
959 // BasicNetworkManager::BindSocketToNetwork(), (that will lookup interface
960 // name and then call network_monitor_->BindSocketToNetwork()).
961 thread_->socketserver()->set_network_binder(this);
962 }
963
honghaiz023f3ef2015-10-19 09:39:32 -0700964 network_monitor_->Start();
965}
966
967void BasicNetworkManager::StopNetworkMonitor() {
968 if (!network_monitor_) {
969 return;
970 }
971 network_monitor_->Stop();
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000972
973 if (network_monitor_->SupportsBindSocketToNetwork()) {
974 // Reset NetworkBinder on SocketServer.
975 if (thread_->socketserver()->network_binder() == this) {
976 thread_->socketserver()->set_network_binder(nullptr);
977 }
978 }
honghaiz023f3ef2015-10-19 09:39:32 -0700979}
980
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800981IPAddress BasicNetworkManager::QueryDefaultLocalAddress(int family) const {
nisseede5da42017-01-12 05:15:36 -0800982 RTC_DCHECK(family == AF_INET || family == AF_INET6);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800983
Niels Mölleraa373162021-09-28 16:09:07 +0200984 // TODO(bugs.webrtc.org/13145): Delete support for null `socket_factory_`,
985 // require socket factory to be provided to constructor.
986 SocketFactory* socket_factory = socket_factory_;
987 if (!socket_factory) {
988 socket_factory = thread_->socketserver();
989 }
990 RTC_DCHECK(socket_factory);
991
Niels Möllerd0b88792021-08-12 10:32:30 +0200992 std::unique_ptr<Socket> socket(
Niels Mölleraa373162021-09-28 16:09:07 +0200993 socket_factory->CreateSocket(family, SOCK_DGRAM));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800994 if (!socket) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000995 RTC_LOG_ERR(LS_ERROR) << "Socket creation failed";
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800996 return IPAddress();
997 }
998
guoweis56271ed2016-01-15 14:45:06 -0800999 if (socket->Connect(SocketAddress(
1000 family == AF_INET ? kPublicIPv4Host : kPublicIPv6Host, kPublicPort)) <
1001 0) {
Yves Gerey665174f2018-06-19 15:03:05 +02001002 if (socket->GetError() != ENETUNREACH &&
1003 socket->GetError() != EHOSTUNREACH) {
skvlad75024012016-09-29 12:59:35 -07001004 // Ignore the expected case of "host/net unreachable" - which happens if
1005 // the network is V4- or V6-only.
Mirko Bonadei675513b2017-11-09 11:09:25 +01001006 RTC_LOG(LS_INFO) << "Connect failed with " << socket->GetError();
skvlad75024012016-09-29 12:59:35 -07001007 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001008 return IPAddress();
1009 }
1010 return socket->GetLocalAddress().ipaddr();
1011}
1012
honghaiz023f3ef2015-10-19 09:39:32 -07001013void BasicNetworkManager::UpdateNetworksOnce() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001014 if (!start_count_)
1015 return;
1016
Niels Möllerd959f3a2022-04-19 11:29:19 +02001017 std::vector<std::unique_ptr<Network>> list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001018 if (!CreateNetworks(false, &list)) {
1019 SignalError();
1020 } else {
1021 bool changed;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001022 NetworkManager::Stats stats;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001023 MergeNetworkList(std::move(list), &changed, &stats);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001024 set_default_local_addresses(QueryDefaultLocalAddress(AF_INET),
1025 QueryDefaultLocalAddress(AF_INET6));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001026 if (changed || !sent_first_update_) {
1027 SignalNetworksChanged();
1028 sent_first_update_ = true;
1029 }
1030 }
honghaiz023f3ef2015-10-19 09:39:32 -07001031}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001032
honghaiz023f3ef2015-10-19 09:39:32 -07001033void BasicNetworkManager::UpdateNetworksContinually() {
1034 UpdateNetworksOnce();
Danil Chapovalov5286dcf2022-07-18 17:04:56 +02001035 thread_->PostDelayedTask(SafeTask(task_safety_flag_,
1036 [this] {
1037 RTC_DCHECK_RUN_ON(thread_);
1038 UpdateNetworksContinually();
1039 }),
1040 TimeDelta::Millis(kNetworksUpdateIntervalMs));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001041}
1042
honghaizdb8cf502015-12-21 13:08:46 -08001043void BasicNetworkManager::DumpNetworks() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001044 RTC_DCHECK_RUN_ON(thread_);
Niels Möller22211442022-04-07 11:43:28 +02001045 std::vector<const Network*> list = GetNetworks();
Mirko Bonadei675513b2017-11-09 11:09:25 +01001046 RTC_LOG(LS_INFO) << "NetworkManager detected " << list.size() << " networks:";
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001047 for (const Network* network : list) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001048 RTC_LOG(LS_INFO) << network->ToString() << ": " << network->description()
1049 << ", active ? " << network->active()
1050 << ((network->ignored()) ? ", Ignored" : "");
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001051 }
1052}
1053
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001054NetworkBindingResult BasicNetworkManager::BindSocketToNetwork(
1055 int socket_fd,
1056 const IPAddress& address) {
1057 RTC_DCHECK_RUN_ON(thread_);
1058 std::string if_name;
1059 if (bind_using_ifname_) {
1060 Network* net = GetNetworkFromAddress(address);
1061 if (net != nullptr) {
1062 if_name = net->name();
1063 }
1064 }
1065 return network_monitor_->BindSocketToNetwork(socket_fd, address, if_name);
1066}
1067
Ali Tofigh7fa90572022-03-17 15:47:49 +01001068Network::Network(absl::string_view name,
1069 absl::string_view desc,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001070 const IPAddress& prefix,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001071 int prefix_length,
1072 AdapterType type)
1073 : name_(name),
1074 description_(desc),
1075 prefix_(prefix),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001076 prefix_length_(prefix_length),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001077 key_(MakeNetworkKey(name, prefix, prefix_length)),
1078 scope_id_(0),
1079 ignored_(false),
1080 type_(type),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001081 preference_(0) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001082
Steve Anton9de3aac2017-10-24 10:08:26 -07001083Network::Network(const Network&) = default;
1084
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001085Network::~Network() = default;
1086
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001087// Sets the addresses of this network. Returns true if the address set changed.
1088// Change detection is short circuited if the changed argument is true.
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001089bool Network::SetIPs(const std::vector<InterfaceAddress>& ips, bool changed) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001090 // Detect changes with a nested loop; n-squared but we expect on the order
1091 // of 2-3 addresses per network.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001092 changed = changed || ips.size() != ips_.size();
1093 if (!changed) {
1094 for (const InterfaceAddress& ip : ips) {
Steve Anton2acd1632019-03-25 13:48:30 -07001095 if (!absl::c_linear_search(ips_, ip)) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001096 changed = true;
1097 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001098 }
1099 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001100 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001101
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001102 ips_ = ips;
1103 return changed;
1104}
1105
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001106// Select the best IP address to use from this Network.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001107IPAddress Network::GetBestIP() const {
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001108 if (ips_.size() == 0) {
1109 return IPAddress();
1110 }
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001111
1112 if (prefix_.family() == AF_INET) {
1113 return static_cast<IPAddress>(ips_.at(0));
1114 }
1115
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001116 InterfaceAddress selected_ip, ula_ip;
1117
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001118 for (const InterfaceAddress& ip : ips_) {
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001119 // Ignore any address which has been deprecated already.
1120 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED)
1121 continue;
1122
1123 // ULA address should only be returned when we have no other
1124 // global IP.
1125 if (IPIsULA(static_cast<const IPAddress&>(ip))) {
1126 ula_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001127 continue;
1128 }
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001129 selected_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001130
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001131 // Search could stop once a temporary non-deprecated one is found.
1132 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_TEMPORARY)
1133 break;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001134 }
1135
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001136 // No proper global IPv6 address found, use ULA instead.
1137 if (IPIsUnspec(selected_ip) && !IPIsUnspec(ula_ip)) {
1138 selected_ip = ula_ip;
1139 }
1140
1141 return static_cast<IPAddress>(selected_ip);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001142}
1143
Qingsi Wang5ae259e2019-02-13 15:46:07 -08001144webrtc::MdnsResponderInterface* Network::GetMdnsResponder() const {
1145 if (mdns_responder_provider_ == nullptr) {
1146 return nullptr;
1147 }
1148 return mdns_responder_provider_->GetMdnsResponder();
1149}
1150
Jonas Orelande62c2f22022-03-29 11:04:48 +02001151uint16_t Network::GetCost(const webrtc::FieldTrialsView* field_trials) const {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001152 return GetCost(
Jonas Orelande62c2f22022-03-29 11:04:48 +02001153 *webrtc::AlwaysValidPointer<const webrtc::FieldTrialsView,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001154 webrtc::FieldTrialBasedConfig>(field_trials));
1155}
1156
Jonas Orelande62c2f22022-03-29 11:04:48 +02001157uint16_t Network::GetCost(const webrtc::FieldTrialsView& field_trials) const {
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001158 AdapterType type = IsVpn() ? underlying_type_for_vpn_ : type_;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001159 const bool use_differentiated_cellular_costs =
1160 field_trials.IsEnabled("WebRTC-UseDifferentiatedCellularCosts");
1161 const bool add_network_cost_to_vpn =
1162 field_trials.IsEnabled("WebRTC-AddNetworkCostToVpn");
Jonas Orelandb477fc72021-08-23 12:16:33 +02001163 return ComputeNetworkCostByType(type, IsVpn(),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001164 use_differentiated_cellular_costs,
1165 add_network_cost_to_vpn);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001166}
1167
Jonas Oreland30019052022-01-28 14:11:44 +01001168// This is the inverse of ComputeNetworkCostByType().
1169std::pair<rtc::AdapterType, bool /* vpn */>
1170Network::GuessAdapterFromNetworkCost(int network_cost) {
1171 switch (network_cost) {
1172 case kNetworkCostMin:
1173 return {rtc::ADAPTER_TYPE_ETHERNET, false};
1174 case kNetworkCostMin + kNetworkCostVpn:
1175 return {rtc::ADAPTER_TYPE_ETHERNET, true};
1176 case kNetworkCostLow:
1177 return {rtc::ADAPTER_TYPE_WIFI, false};
1178 case kNetworkCostLow + kNetworkCostVpn:
1179 return {rtc::ADAPTER_TYPE_WIFI, true};
1180 case kNetworkCostCellular:
1181 return {rtc::ADAPTER_TYPE_CELLULAR, false};
1182 case kNetworkCostCellular + kNetworkCostVpn:
1183 return {rtc::ADAPTER_TYPE_CELLULAR, true};
1184 case kNetworkCostCellular2G:
1185 return {rtc::ADAPTER_TYPE_CELLULAR_2G, false};
1186 case kNetworkCostCellular2G + kNetworkCostVpn:
1187 return {rtc::ADAPTER_TYPE_CELLULAR_2G, true};
1188 case kNetworkCostCellular3G:
1189 return {rtc::ADAPTER_TYPE_CELLULAR_3G, false};
1190 case kNetworkCostCellular3G + kNetworkCostVpn:
1191 return {rtc::ADAPTER_TYPE_CELLULAR_3G, true};
1192 case kNetworkCostCellular4G:
1193 return {rtc::ADAPTER_TYPE_CELLULAR_4G, false};
1194 case kNetworkCostCellular4G + kNetworkCostVpn:
1195 return {rtc::ADAPTER_TYPE_CELLULAR_4G, true};
1196 case kNetworkCostCellular5G:
1197 return {rtc::ADAPTER_TYPE_CELLULAR_5G, false};
1198 case kNetworkCostCellular5G + kNetworkCostVpn:
1199 return {rtc::ADAPTER_TYPE_CELLULAR_5G, true};
1200 case kNetworkCostUnknown:
1201 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1202 case kNetworkCostUnknown + kNetworkCostVpn:
1203 return {rtc::ADAPTER_TYPE_UNKNOWN, true};
1204 case kNetworkCostMax:
1205 return {rtc::ADAPTER_TYPE_ANY, false};
1206 case kNetworkCostMax + kNetworkCostVpn:
1207 return {rtc::ADAPTER_TYPE_ANY, true};
1208 }
1209 RTC_LOG(LS_VERBOSE) << "Unknown network cost: " << network_cost;
1210 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1211}
1212
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001213std::string Network::ToString() const {
Jonas Olsson366a50c2018-09-06 13:41:30 +02001214 rtc::StringBuilder ss;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001215 // Print out the first space-terminated token of the network desc, plus
1216 // the IP address.
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001217 ss << "Net[" << description_.substr(0, description_.find(' ')) << ":"
1218 << prefix_.ToSensitiveString() << "/" << prefix_length_ << ":"
1219 << AdapterTypeToString(type_);
1220 if (IsVpn()) {
1221 ss << "/" << AdapterTypeToString(underlying_type_for_vpn_);
1222 }
Qingsi Wang10a0e512018-05-16 13:37:03 -07001223 ss << ":id=" << id_ << "]";
Jonas Olsson84df1c72018-09-14 16:59:32 +02001224 return ss.Release();
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001225}
1226
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001227void BasicNetworkManager::set_vpn_list(const std::vector<NetworkMask>& vpn) {
1228 if (thread_ == nullptr) {
1229 vpn_ = vpn;
1230 } else {
1231 thread_->Invoke<void>(RTC_FROM_HERE, [this, vpn] { vpn_ = vpn; });
1232 }
1233}
1234
1235bool BasicNetworkManager::IsConfiguredVpn(IPAddress prefix,
1236 int prefix_length) const {
1237 RTC_DCHECK_RUN_ON(thread_);
1238 for (const auto& vpn : vpn_) {
1239 if (prefix_length >= vpn.prefix_length()) {
1240 auto copy = TruncateIP(prefix, vpn.prefix_length());
1241 if (copy == vpn.address()) {
1242 return true;
1243 }
1244 }
1245 }
1246 return false;
1247}
1248
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001249} // namespace rtc