blob: de731fa5b4e35ed5af0feb37dbdeaa17bb8cf8a6 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
oprypin1ea631f2017-08-18 00:15:19 -070013#include <stdlib.h>
14
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070015#include <algorithm>
jbauch555604a2016-04-26 03:13:22 -070016#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#include <vector>
oprypin1ea631f2017-08-18 00:15:19 -070018
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070019#include "absl/algorithm/container.h"
Mirko Bonadei06d35592020-04-01 13:43:08 +020020#include "absl/strings/match.h"
Ali Tofigh7fa90572022-03-17 15:47:49 +010021#include "absl/strings/string_view.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020022#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080023#include "rtc_base/net_helpers.h"
24#include "rtc_base/network_monitor.h"
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -070025#include "rtc_base/network_monitor_factory.h"
Niels Mölleraa373162021-09-28 16:09:07 +020026#include "rtc_base/physical_socket_server.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000027#if defined(WEBRTC_POSIX)
Henrik Kjellander00725112017-06-30 15:14:45 +020028#include <net/if.h>
Yves Gerey665174f2018-06-19 15:03:05 +020029#include <sys/types.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020030
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020031#include "rtc_base/ifaddrs_converter.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080032#endif // defined(WEBRTC_POSIX)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020033#include "rtc_base/gunit.h"
Steve Anton2acd1632019-03-25 13:48:30 -070034#include "test/gmock.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000035#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +010036#include "rtc_base/logging.h" // For RTC_LOG_GLE
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000037#endif
Jonas Oreland47fa08f2020-12-05 18:09:13 +010038#include "test/field_trial.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020039#include "test/scoped_key_value_config.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000040
Steve Anton2acd1632019-03-25 13:48:30 -070041using ::testing::Contains;
42using ::testing::Not;
43using ::testing::UnorderedElementsAre;
44using ::testing::UnorderedElementsAreArray;
45
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000046namespace rtc {
47
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080048namespace {
49
Ali Tofigh7fa90572022-03-17 15:47:49 +010050IPAddress IPFromString(absl::string_view str) {
Jonas Oreland2ee0e642021-08-25 15:43:02 +020051 IPAddress ip;
52 RTC_CHECK(IPFromString(str, &ip));
53 return ip;
54}
55
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000056class FakeNetworkMonitor : public NetworkMonitorInterface {
honghaiz023f3ef2015-10-19 09:39:32 -070057 public:
honghaizcec0a082016-01-15 14:49:09 -080058 void Start() override { started_ = true; }
59 void Stop() override { started_ = false; }
60 bool started() { return started_; }
Ali Tofigh7fa90572022-03-17 15:47:49 +010061 AdapterType GetAdapterType(absl::string_view if_name) override {
Honghai Zhang351d77b2016-05-20 15:08:29 -070062 // Note that the name matching rules are different from the
63 // GetAdapterTypeFromName in NetworkManager.
Mirko Bonadei06d35592020-04-01 13:43:08 +020064 if (absl::StartsWith(if_name, "wifi")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070065 return ADAPTER_TYPE_WIFI;
66 }
Mirko Bonadei06d35592020-04-01 13:43:08 +020067 if (absl::StartsWith(if_name, "cellular")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070068 return ADAPTER_TYPE_CELLULAR;
69 }
honghaiza7ad7c32016-02-02 12:54:14 -080070 return ADAPTER_TYPE_UNKNOWN;
71 }
Ali Tofigh7fa90572022-03-17 15:47:49 +010072 AdapterType GetVpnUnderlyingAdapterType(absl::string_view if_name) override {
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000073 return ADAPTER_TYPE_UNKNOWN;
74 }
Ali Tofigh7fa90572022-03-17 15:47:49 +010075 NetworkPreference GetNetworkPreference(absl::string_view if_name) override {
Jonas Orelandf7721fb2020-08-07 11:08:34 +020076 return NetworkPreference::NEUTRAL;
77 }
honghaizcec0a082016-01-15 14:49:09 -080078
Ali Tofigh7fa90572022-03-17 15:47:49 +010079 bool IsAdapterAvailable(absl::string_view if_name) override {
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070080 return absl::c_count(unavailable_adapters_, if_name) == 0;
81 }
82
83 // Used to test IsAdapterAvailable.
84 void set_unavailable_adapters(std::vector<std::string> unavailable_adapters) {
85 unavailable_adapters_ = unavailable_adapters;
86 }
87
Jonas Oreland6ca955a2021-03-15 08:27:43 +000088 bool SupportsBindSocketToNetwork() const override { return true; }
89
Ali Tofigh7fa90572022-03-17 15:47:49 +010090 NetworkBindingResult BindSocketToNetwork(int socket_fd,
91 const IPAddress& address,
92 absl::string_view if_name) override {
Jonas Oreland6ca955a2021-03-15 08:27:43 +000093 if (absl::c_count(addresses_, address) > 0) {
94 return NetworkBindingResult::SUCCESS;
95 }
96
97 for (auto const& iter : adapters_) {
Ali Tofigh7fa90572022-03-17 15:47:49 +010098 if (if_name.find(iter) != absl::string_view::npos) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +000099 return NetworkBindingResult::SUCCESS;
100 }
101 }
102 return NetworkBindingResult::ADDRESS_NOT_FOUND;
103 }
104
105 void set_ip_addresses(std::vector<IPAddress> addresses) {
106 addresses_ = addresses;
107 }
108
109 void set_adapters(std::vector<std::string> adapters) { adapters_ = adapters; }
110
Mirko Bonadei37077932021-07-27 17:00:58 +0200111 void InovkeNetworksChangedCallbackForTesting() {
112 InvokeNetworksChangedCallback();
113 }
114
honghaizcec0a082016-01-15 14:49:09 -0800115 private:
116 bool started_ = false;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000117 std::vector<std::string> adapters_;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700118 std::vector<std::string> unavailable_adapters_;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000119 std::vector<IPAddress> addresses_;
honghaiz023f3ef2015-10-19 09:39:32 -0700120};
121
122class FakeNetworkMonitorFactory : public NetworkMonitorFactory {
123 public:
124 FakeNetworkMonitorFactory() {}
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200125 NetworkMonitorInterface* CreateNetworkMonitor(
Jonas Orelande62c2f22022-03-29 11:04:48 +0200126 const webrtc::FieldTrialsView& field_trials) override {
honghaiz023f3ef2015-10-19 09:39:32 -0700127 return new FakeNetworkMonitor();
128 }
129};
130
Qingsi Wang10a0e512018-05-16 13:37:03 -0700131bool SameNameAndPrefix(const rtc::Network& a, const rtc::Network& b) {
132 if (a.name() != b.name()) {
Harald Alvestrand97597c02021-11-04 12:01:23 +0000133 RTC_LOG(LS_INFO) << "Different interface names.";
Qingsi Wang10a0e512018-05-16 13:37:03 -0700134 return false;
135 }
136 if (a.prefix_length() != b.prefix_length() || a.prefix() != b.prefix()) {
Harald Alvestrand97597c02021-11-04 12:01:23 +0000137 RTC_LOG(LS_INFO) << "Different IP prefixes.";
Qingsi Wang10a0e512018-05-16 13:37:03 -0700138 return false;
139 }
140 return true;
141}
142
Niels Möllerd959f3a2022-04-19 11:29:19 +0200143std::vector<const Network*> CopyNetworkPointers(
144 const std::vector<std::unique_ptr<Network>>& owning_list) {
145 std::vector<const Network*> ptr_list;
146 ptr_list.reserve(owning_list.size());
147 for (const auto& network : owning_list) {
148 ptr_list.push_back(network.get());
149 }
150 return ptr_list;
151}
152
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800153} // namespace
154
Mirko Bonadei6a489f22019-04-09 15:11:12 +0200155class NetworkTest : public ::testing::Test, public sigslot::has_slots<> {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000156 public:
157 NetworkTest() : callback_called_(false) {}
158
Yves Gerey665174f2018-06-19 15:03:05 +0200159 void OnNetworksChanged() { callback_called_ = true; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000160
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000161 NetworkManager::Stats MergeNetworkList(
162 BasicNetworkManager& network_manager,
Niels Möllerd959f3a2022-04-19 11:29:19 +0200163 std::vector<std::unique_ptr<Network>> list,
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000164 bool* changed) {
165 NetworkManager::Stats stats;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200166 network_manager.MergeNetworkList(std::move(list), changed, &stats);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000167 return stats;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000168 }
169
170 bool IsIgnoredNetwork(BasicNetworkManager& network_manager,
171 const Network& network) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700172 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000173 return network_manager.IsIgnoredNetwork(network);
174 }
175
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700176 IPAddress QueryDefaultLocalAddress(BasicNetworkManager& network_manager,
177 int family) {
178 RTC_DCHECK_RUN_ON(network_manager.thread_);
179 return network_manager.QueryDefaultLocalAddress(family);
180 }
181
Niels Möllerd959f3a2022-04-19 11:29:19 +0200182 std::vector<std::unique_ptr<Network>> GetNetworks(
Yves Gerey665174f2018-06-19 15:03:05 +0200183 const BasicNetworkManager& network_manager,
184 bool include_ignored) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700185 RTC_DCHECK_RUN_ON(network_manager.thread_);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200186 std::vector<std::unique_ptr<Network>> list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000187 network_manager.CreateNetworks(include_ignored, &list);
188 return list;
189 }
190
honghaizcec0a082016-01-15 14:49:09 -0800191 FakeNetworkMonitor* GetNetworkMonitor(BasicNetworkManager& network_manager) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700192 RTC_DCHECK_RUN_ON(network_manager.thread_);
honghaizcec0a082016-01-15 14:49:09 -0800193 return static_cast<FakeNetworkMonitor*>(
194 network_manager.network_monitor_.get());
honghaiz023f3ef2015-10-19 09:39:32 -0700195 }
196 void ClearNetworks(BasicNetworkManager& network_manager) {
honghaiz023f3ef2015-10-19 09:39:32 -0700197 network_manager.networks_.clear();
198 network_manager.networks_map_.clear();
199 }
200
Honghai Zhang351d77b2016-05-20 15:08:29 -0700201 AdapterType GetAdapterType(BasicNetworkManager& network_manager) {
Niels Möller22211442022-04-07 11:43:28 +0200202 std::vector<const Network*> list = network_manager.GetNetworks();
nissec16fa5e2017-02-07 07:18:43 -0800203 RTC_CHECK_EQ(1, list.size());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700204 return list[0]->type();
205 }
206
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000207#if defined(WEBRTC_POSIX)
208 // Separated from CreateNetworks for tests.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200209 static void CallConvertIfAddrs(
210 const BasicNetworkManager& network_manager,
211 struct ifaddrs* interfaces,
212 bool include_ignored,
213 std::vector<std::unique_ptr<Network>>* networks) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700214 RTC_DCHECK_RUN_ON(network_manager.thread_);
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800215 // Use the base IfAddrsConverter for test cases.
jbauch555604a2016-04-26 03:13:22 -0700216 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(new IfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800217 network_manager.ConvertIfAddrs(interfaces, ifaddrs_converter.get(),
218 include_ignored, networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000219 }
honghaizdb8cf502015-12-21 13:08:46 -0800220
Ali Tofigh7fa90572022-03-17 15:47:49 +0100221 struct sockaddr_in6* CreateIpv6Addr(absl::string_view ip_string,
honghaizdb8cf502015-12-21 13:08:46 -0800222 uint32_t scope_id) {
Yves Gerey665174f2018-06-19 15:03:05 +0200223 struct sockaddr_in6* ipv6_addr =
224 static_cast<struct sockaddr_in6*>(malloc(sizeof(struct sockaddr_in6)));
honghaizdb8cf502015-12-21 13:08:46 -0800225 memset(ipv6_addr, 0, sizeof(struct sockaddr_in6));
226 ipv6_addr->sin6_family = AF_INET6;
227 ipv6_addr->sin6_scope_id = scope_id;
228 IPAddress ip;
229 IPFromString(ip_string, &ip);
230 ipv6_addr->sin6_addr = ip.ipv6_address();
231 return ipv6_addr;
232 }
233
234 // Pointers created here need to be released via ReleaseIfAddrs.
235 struct ifaddrs* AddIpv6Address(struct ifaddrs* list,
236 char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100237 absl::string_view ipv6_address,
238 absl::string_view ipv6_netmask,
honghaizdb8cf502015-12-21 13:08:46 -0800239 uint32_t scope_id) {
240 struct ifaddrs* if_addr = new struct ifaddrs;
241 memset(if_addr, 0, sizeof(struct ifaddrs));
242 if_addr->ifa_name = if_name;
243 if_addr->ifa_addr = reinterpret_cast<struct sockaddr*>(
244 CreateIpv6Addr(ipv6_address, scope_id));
245 if_addr->ifa_netmask =
246 reinterpret_cast<struct sockaddr*>(CreateIpv6Addr(ipv6_netmask, 0));
247 if_addr->ifa_next = list;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800248 if_addr->ifa_flags = IFF_RUNNING;
honghaizdb8cf502015-12-21 13:08:46 -0800249 return if_addr;
250 }
251
Honghai Zhang351d77b2016-05-20 15:08:29 -0700252 struct ifaddrs* InstallIpv6Network(char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100253 absl::string_view ipv6_address,
254 absl::string_view ipv6_mask,
Honghai Zhang351d77b2016-05-20 15:08:29 -0700255 BasicNetworkManager& network_manager) {
256 ifaddrs* addr_list = nullptr;
257 addr_list = AddIpv6Address(addr_list, if_name, ipv6_address, ipv6_mask, 0);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200258 std::vector<std::unique_ptr<Network>> result;
Honghai Zhang351d77b2016-05-20 15:08:29 -0700259 bool changed;
260 NetworkManager::Stats stats;
261 CallConvertIfAddrs(network_manager, addr_list, true, &result);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200262 network_manager.MergeNetworkList(std::move(result), &changed, &stats);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700263 return addr_list;
264 }
265
Ali Tofigh7fa90572022-03-17 15:47:49 +0100266 struct sockaddr_in* CreateIpv4Addr(absl::string_view ip_string) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800267 struct sockaddr_in* ipv4_addr =
268 static_cast<struct sockaddr_in*>(malloc(sizeof(struct sockaddr_in)));
269 memset(ipv4_addr, 0, sizeof(struct sockaddr_in));
270 ipv4_addr->sin_family = AF_INET;
271 IPAddress ip;
272 IPFromString(ip_string, &ip);
273 ipv4_addr->sin_addr = ip.ipv4_address();
274 return ipv4_addr;
275 }
276
277 // Pointers created here need to be released via ReleaseIfAddrs.
278 struct ifaddrs* AddIpv4Address(struct ifaddrs* list,
279 char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100280 absl::string_view ipv4_address,
281 absl::string_view ipv4_netmask) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800282 struct ifaddrs* if_addr = new struct ifaddrs;
283 memset(if_addr, 0, sizeof(struct ifaddrs));
284 if_addr->ifa_name = if_name;
285 if_addr->ifa_addr =
286 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_address));
287 if_addr->ifa_netmask =
288 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_netmask));
289 if_addr->ifa_next = list;
290 if_addr->ifa_flags = IFF_RUNNING;
291 return if_addr;
292 }
293
294 struct ifaddrs* InstallIpv4Network(char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100295 absl::string_view ipv4_address,
296 absl::string_view ipv4_mask,
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800297 BasicNetworkManager& network_manager) {
298 ifaddrs* addr_list = nullptr;
299 addr_list = AddIpv4Address(addr_list, if_name, ipv4_address, ipv4_mask);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200300 std::vector<std::unique_ptr<Network>> result;
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800301 bool changed;
302 NetworkManager::Stats stats;
303 CallConvertIfAddrs(network_manager, addr_list, true, &result);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200304 network_manager.MergeNetworkList(std::move(result), &changed, &stats);
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800305 return addr_list;
306 }
307
honghaizdb8cf502015-12-21 13:08:46 -0800308 void ReleaseIfAddrs(struct ifaddrs* list) {
309 struct ifaddrs* if_addr = list;
310 while (if_addr != nullptr) {
311 struct ifaddrs* next_addr = if_addr->ifa_next;
oprypin1ea631f2017-08-18 00:15:19 -0700312 free(if_addr->ifa_addr);
313 free(if_addr->ifa_netmask);
honghaizdb8cf502015-12-21 13:08:46 -0800314 delete if_addr;
315 if_addr = next_addr;
316 }
317 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000318#endif // defined(WEBRTC_POSIX)
319
320 protected:
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200321 webrtc::test::ScopedKeyValueConfig field_trials_;
Niels Möller83830f32022-05-20 09:12:57 +0200322 rtc::AutoThread main_thread_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000323 bool callback_called_;
324};
325
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800326class TestBasicNetworkManager : public BasicNetworkManager {
327 public:
Niels Mölleraa373162021-09-28 16:09:07 +0200328 TestBasicNetworkManager(NetworkMonitorFactory* network_monitor_factory,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200329 SocketFactory* socket_factory,
Jonas Orelande62c2f22022-03-29 11:04:48 +0200330 const webrtc::FieldTrialsView& field_trials)
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200331 : BasicNetworkManager(network_monitor_factory,
332 socket_factory,
333 &field_trials) {}
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800334 using BasicNetworkManager::QueryDefaultLocalAddress;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800335 using BasicNetworkManager::set_default_local_addresses;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800336};
337
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000338// Test that the Network ctor works properly.
339TEST_F(NetworkTest, TestNetworkConstruct) {
340 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
341 IPAddress(0x12345600U), 24);
342 EXPECT_EQ("test_eth0", ipv4_network1.name());
343 EXPECT_EQ("Test Network Adapter 1", ipv4_network1.description());
344 EXPECT_EQ(IPAddress(0x12345600U), ipv4_network1.prefix());
345 EXPECT_EQ(24, ipv4_network1.prefix_length());
346 EXPECT_FALSE(ipv4_network1.ignored());
347}
348
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000349TEST_F(NetworkTest, TestIsIgnoredNetworkIgnoresIPsStartingWith0) {
350 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
351 IPAddress(0x12345600U), 24, ADAPTER_TYPE_ETHERNET);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000352 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000353 IPAddress(0x010000U), 24, ADAPTER_TYPE_ETHERNET);
Niels Möller539f3e12021-11-26 16:33:19 +0100354 PhysicalSocketServer socket_server;
355 BasicNetworkManager network_manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700356 network_manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000357 EXPECT_FALSE(IsIgnoredNetwork(network_manager, ipv4_network1));
358 EXPECT_TRUE(IsIgnoredNetwork(network_manager, ipv4_network2));
359}
360
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000361// TODO(phoglund): Remove when ignore list goes away.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000362TEST_F(NetworkTest, TestIgnoreList) {
Yves Gerey665174f2018-06-19 15:03:05 +0200363 Network ignore_me("ignore_me", "Ignore me please!", IPAddress(0x12345600U),
364 24);
365 Network include_me("include_me", "Include me please!", IPAddress(0x12345600U),
366 24);
Niels Möller539f3e12021-11-26 16:33:19 +0100367 PhysicalSocketServer socket_server;
368 BasicNetworkManager default_network_manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700369 default_network_manager.StartUpdating();
370 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, ignore_me));
371 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, include_me));
372
Niels Möller539f3e12021-11-26 16:33:19 +0100373 BasicNetworkManager ignoring_network_manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000374 std::vector<std::string> ignore_list;
375 ignore_list.push_back("ignore_me");
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700376 ignoring_network_manager.set_network_ignore_list(ignore_list);
377 ignoring_network_manager.StartUpdating();
378 EXPECT_TRUE(IsIgnoredNetwork(ignoring_network_manager, ignore_me));
379 EXPECT_FALSE(IsIgnoredNetwork(ignoring_network_manager, include_me));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000380}
381
382// Test is failing on Windows opt: b/11288214
383TEST_F(NetworkTest, DISABLED_TestCreateNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +0100384 PhysicalSocketServer socket_server;
385 BasicNetworkManager manager(&socket_server);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200386 std::vector<std::unique_ptr<Network>> result = GetNetworks(manager, true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000387 // We should be able to bind to any addresses we find.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200388 for (auto it = result.begin(); it != result.end(); ++it) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000389 sockaddr_storage storage;
390 memset(&storage, 0, sizeof(storage));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000391 IPAddress ip = (*it)->GetBestIP();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000392 SocketAddress bindaddress(ip, 0);
393 bindaddress.SetScopeID((*it)->scope_id());
Niels Möllerd0b88792021-08-12 10:32:30 +0200394 // TODO(thaloun): Use rtc::Socket once it supports IPv6.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000395 int fd = static_cast<int>(socket(ip.family(), SOCK_STREAM, IPPROTO_TCP));
396 if (fd > 0) {
397 size_t ipsize = bindaddress.ToSockAddrStorage(&storage);
398 EXPECT_GE(ipsize, 0U);
Yves Gerey665174f2018-06-19 15:03:05 +0200399 int success = ::bind(fd, reinterpret_cast<sockaddr*>(&storage),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000400 static_cast<int>(ipsize));
401#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +0100402 if (success)
403 RTC_LOG_GLE(LS_ERROR) << "Socket bind failed.";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000404#endif
405 EXPECT_EQ(0, success);
406#if defined(WEBRTC_WIN)
407 closesocket(fd);
408#else
409 close(fd);
410#endif
411 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000412 }
413}
414
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700415// Test StartUpdating() and StopUpdating(). network_permission_state starts with
416// ALLOWED.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000417TEST_F(NetworkTest, TestUpdateNetworks) {
Niels Mölleraa373162021-09-28 16:09:07 +0200418 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200419 BasicNetworkManager manager(nullptr, &socket_server, &field_trials_);
Yves Gerey665174f2018-06-19 15:03:05 +0200420 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
421 &NetworkTest::OnNetworksChanged);
guoweisea1012b2015-08-21 09:06:28 -0700422 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
423 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000424 manager.StartUpdating();
425 Thread::Current()->ProcessMessages(0);
426 EXPECT_TRUE(callback_called_);
427 callback_called_ = false;
428 // Callback should be triggered immediately when StartUpdating
429 // is called, after network update signal is already sent.
430 manager.StartUpdating();
431 EXPECT_TRUE(manager.started());
432 Thread::Current()->ProcessMessages(0);
433 EXPECT_TRUE(callback_called_);
434 manager.StopUpdating();
435 EXPECT_TRUE(manager.started());
436 manager.StopUpdating();
guoweisea1012b2015-08-21 09:06:28 -0700437 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
438 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000439 EXPECT_FALSE(manager.started());
440 manager.StopUpdating();
441 EXPECT_FALSE(manager.started());
442 callback_called_ = false;
443 // Callback should be triggered immediately after StartUpdating is called
444 // when start_count_ is reset to 0.
445 manager.StartUpdating();
446 Thread::Current()->ProcessMessages(0);
447 EXPECT_TRUE(callback_called_);
448}
449
450// Verify that MergeNetworkList() merges network lists properly.
451TEST_F(NetworkTest, TestBasicMergeNetworkList) {
452 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
453 IPAddress(0x12345600U), 24);
454 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
455 IPAddress(0x00010000U), 16);
456 ipv4_network1.AddIP(IPAddress(0x12345678));
457 ipv4_network2.AddIP(IPAddress(0x00010004));
Niels Möller539f3e12021-11-26 16:33:19 +0100458 PhysicalSocketServer socket_server;
459 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000460
461 // Add ipv4_network1 to the list of networks.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200462 std::vector<std::unique_ptr<Network>> list;
463 list.push_back(std::make_unique<Network>(ipv4_network1));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000464 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200465 NetworkManager::Stats stats =
466 MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000467 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000468 EXPECT_EQ(stats.ipv6_network_count, 0);
469 EXPECT_EQ(stats.ipv4_network_count, 1);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200470 list.clear(); // It is fine to call .clear() on a moved-from vector.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000471
Niels Möller22211442022-04-07 11:43:28 +0200472 std::vector<const rtc::Network*> current = manager.GetNetworks();
473 EXPECT_EQ(1U, current.size());
474 EXPECT_TRUE(SameNameAndPrefix(ipv4_network1, *current[0]));
475 const Network* net1 = current[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700476 uint16_t net_id1 = net1->id();
477 EXPECT_EQ(1, net_id1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000478
479 // Replace ipv4_network1 with ipv4_network2.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200480 list.push_back(std::make_unique<Network>(ipv4_network2));
481 stats = MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000482 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000483 EXPECT_EQ(stats.ipv6_network_count, 0);
484 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000485 list.clear();
486
Niels Möller22211442022-04-07 11:43:28 +0200487 current = manager.GetNetworks();
488 EXPECT_EQ(1U, current.size());
489 EXPECT_TRUE(SameNameAndPrefix(ipv4_network2, *current[0]));
490 const Network* net2 = current[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700491 uint16_t net_id2 = net2->id();
492 // Network id will increase.
493 EXPECT_LT(net_id1, net_id2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000494
495 // Add Network2 back.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200496 list.push_back(std::make_unique<Network>(ipv4_network1));
497 list.push_back(std::make_unique<Network>(ipv4_network2));
498 stats = MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000499 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000500 EXPECT_EQ(stats.ipv6_network_count, 0);
501 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000502 list.clear();
503
504 // Verify that we get previous instances of Network objects.
Niels Möller22211442022-04-07 11:43:28 +0200505 current = manager.GetNetworks();
506 EXPECT_EQ(2U, current.size());
507 EXPECT_TRUE((net1 == current[0] && net2 == current[1]) ||
508 (net1 == current[1] && net2 == current[0]));
509 EXPECT_TRUE((net_id1 == current[0]->id() && net_id2 == current[1]->id()) ||
510 (net_id1 == current[1]->id() && net_id2 == current[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000511
512 // Call MergeNetworkList() again and verify that we don't get update
513 // notification.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200514 list.push_back(std::make_unique<Network>(ipv4_network2));
515 list.push_back(std::make_unique<Network>(ipv4_network1));
516 stats = MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000517 EXPECT_FALSE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000518 EXPECT_EQ(stats.ipv6_network_count, 0);
519 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000520 list.clear();
521
522 // Verify that we get previous instances of Network objects.
Niels Möller22211442022-04-07 11:43:28 +0200523 current = manager.GetNetworks();
524 EXPECT_EQ(2U, current.size());
525 EXPECT_TRUE((net1 == current[0] && net2 == current[1]) ||
526 (net1 == current[1] && net2 == current[0]));
527 EXPECT_TRUE((net_id1 == current[0]->id() && net_id2 == current[1]->id()) ||
528 (net_id1 == current[1]->id() && net_id2 == current[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000529}
530
531// Sets up some test IPv6 networks and appends them to list.
532// Four networks are added - public and link local, for two interfaces.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200533void SetupNetworks(std::vector<std::unique_ptr<Network>>* list) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000534 IPAddress ip;
535 IPAddress prefix;
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000536 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:ef12", &ip));
537 EXPECT_TRUE(IPFromString("abcd::", &prefix));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000538 // First, fake link-locals.
539 Network ipv6_eth0_linklocalnetwork("test_eth0", "Test NetworkAdapter 1",
540 prefix, 64);
541 ipv6_eth0_linklocalnetwork.AddIP(ip);
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000542 EXPECT_TRUE(IPFromString("abcd::5678:abcd:ef12:3456", &ip));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000543 Network ipv6_eth1_linklocalnetwork("test_eth1", "Test NetworkAdapter 2",
544 prefix, 64);
545 ipv6_eth1_linklocalnetwork.AddIP(ip);
546 // Public networks:
547 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip));
548 prefix = TruncateIP(ip, 64);
549 Network ipv6_eth0_publicnetwork1_ip1("test_eth0", "Test NetworkAdapter 1",
550 prefix, 64);
551 ipv6_eth0_publicnetwork1_ip1.AddIP(ip);
552 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
553 prefix = TruncateIP(ip, 64);
554 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 1",
555 prefix, 64);
556 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200557 list->push_back(std::make_unique<Network>(ipv6_eth0_linklocalnetwork));
558 list->push_back(std::make_unique<Network>(ipv6_eth1_linklocalnetwork));
559 list->push_back(std::make_unique<Network>(ipv6_eth0_publicnetwork1_ip1));
560 list->push_back(std::make_unique<Network>(ipv6_eth1_publicnetwork1_ip1));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000561}
562
563// Test that the basic network merging case works.
564TEST_F(NetworkTest, TestIPv6MergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +0100565 PhysicalSocketServer socket_server;
566 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200567 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
568 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200569 std::vector<std::unique_ptr<Network>> networks;
570 SetupNetworks(&networks);
571 std::vector<const Network*> original_list = CopyNetworkPointers(networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000572 bool changed = false;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000573 NetworkManager::Stats stats =
Niels Möllerd959f3a2022-04-19 11:29:19 +0200574 MergeNetworkList(manager, std::move(networks), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000575 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000576 EXPECT_EQ(stats.ipv6_network_count, 4);
577 EXPECT_EQ(stats.ipv4_network_count, 0);
Niels Möller22211442022-04-07 11:43:28 +0200578 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000579 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700580 EXPECT_THAT(list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000581}
582
583// Tests that when two network lists that describe the same set of networks are
584// merged, that the changed callback is not called, and that the original
585// objects remain in the result list.
586TEST_F(NetworkTest, TestNoChangeMerge) {
Niels Möller539f3e12021-11-26 16:33:19 +0100587 PhysicalSocketServer socket_server;
588 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200589 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
590 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200591 std::vector<std::unique_ptr<Network>> networks;
592 SetupNetworks(&networks);
593 std::vector<const Network*> original_list = CopyNetworkPointers(networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000594 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200595 MergeNetworkList(manager, std::move(networks), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000596 EXPECT_TRUE(changed);
597 // Second list that describes the same networks but with new objects.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200598 std::vector<std::unique_ptr<Network>> second_networks;
599 SetupNetworks(&second_networks);
600 std::vector<const Network*> second_list =
601 CopyNetworkPointers(second_networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000602 changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200603 MergeNetworkList(manager, std::move(second_networks), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000604 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +0200605 std::vector<const Network*> resulting_list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000606 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700607 EXPECT_THAT(resulting_list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000608 // Doublecheck that the new networks aren't in the list.
Steve Anton2acd1632019-03-25 13:48:30 -0700609 for (const Network* network : second_list) {
610 EXPECT_THAT(resulting_list, Not(Contains(network)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000611 }
612}
613
614// Test that we can merge a network that is the same as another network but with
615// a different IP. The original network should remain in the list, but have its
616// IP changed.
617TEST_F(NetworkTest, MergeWithChangedIP) {
Niels Möller539f3e12021-11-26 16:33:19 +0100618 PhysicalSocketServer socket_server;
619 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200620 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
621 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200622 std::vector<std::unique_ptr<Network>> original_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000623 SetupNetworks(&original_list);
624 // Make a network that we're going to change.
625 IPAddress ip;
626 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip));
627 IPAddress prefix = TruncateIP(ip, 64);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200628 std::unique_ptr<Network> network_to_change = std::make_unique<Network>(
629 "test_eth0", "Test Network Adapter 1", prefix, 64);
630 std::unique_ptr<Network> changed_network =
631 std::make_unique<Network>(*network_to_change);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000632 network_to_change->AddIP(ip);
633 IPAddress changed_ip;
634 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip));
635 changed_network->AddIP(changed_ip);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200636 const Network* const network_to_change_ptr = network_to_change.get();
637 original_list.push_back(std::move(network_to_change));
638 const size_t original_size = original_list.size();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000639 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200640 MergeNetworkList(manager, std::move(original_list), &changed);
641 std::vector<std::unique_ptr<Network>> second_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000642 SetupNetworks(&second_list);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200643 second_list.push_back(std::move(changed_network));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000644 changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200645 MergeNetworkList(manager, std::move(second_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000646 EXPECT_TRUE(changed);
Niels Möller22211442022-04-07 11:43:28 +0200647 std::vector<const Network*> list = manager.GetNetworks();
Niels Möllerd959f3a2022-04-19 11:29:19 +0200648 EXPECT_EQ(original_size, list.size());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000649 // Make sure the original network is still in the merged list.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200650 EXPECT_THAT(list, Contains(network_to_change_ptr));
651 EXPECT_EQ(changed_ip, network_to_change_ptr->GetIPs().at(0));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000652}
653
Niels Möllerd959f3a2022-04-19 11:29:19 +0200654TEST_F(NetworkTest, TestMultipleIPMergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +0100655 PhysicalSocketServer socket_server;
656 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200657 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
658 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200659 std::vector<std::unique_ptr<Network>> original_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000660 SetupNetworks(&original_list);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200661 const Network* const network_ptr = original_list[2].get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000662 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200663 MergeNetworkList(manager, std::move(original_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000664 EXPECT_TRUE(changed);
665 IPAddress ip;
666 IPAddress check_ip;
667 IPAddress prefix;
668 // Add a second IP to the public network on eth0 (2401:fa00:4:1000/64).
669 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip));
670 prefix = TruncateIP(ip, 64);
671 Network ipv6_eth0_publicnetwork1_ip2("test_eth0", "Test NetworkAdapter 1",
672 prefix, 64);
673 // This is the IP that already existed in the public network on eth0.
674 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip));
675 ipv6_eth0_publicnetwork1_ip2.AddIP(ip);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200676
677 std::vector<std::unique_ptr<Network>> second_list;
678 SetupNetworks(&second_list);
679 second_list.push_back(
680 std::make_unique<Network>(ipv6_eth0_publicnetwork1_ip2));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000681 changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200682 const auto network_copy = std::make_unique<Network>(*second_list[2]);
683 MergeNetworkList(manager, std::move(second_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000684 EXPECT_TRUE(changed);
685 // There should still be four networks.
Niels Möller22211442022-04-07 11:43:28 +0200686 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000687 EXPECT_EQ(4U, list.size());
688 // Check the gathered IPs.
689 int matchcount = 0;
Niels Möller22211442022-04-07 11:43:28 +0200690 for (const Network* network : list) {
Niels Möllerd959f3a2022-04-19 11:29:19 +0200691 if (SameNameAndPrefix(*network, *network_copy)) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000692 ++matchcount;
693 EXPECT_EQ(1, matchcount);
694 // This should be the same network object as before.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200695 EXPECT_EQ(network, network_ptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000696 // But with two addresses now.
Niels Möller22211442022-04-07 11:43:28 +0200697 EXPECT_THAT(network->GetIPs(),
Steve Anton2acd1632019-03-25 13:48:30 -0700698 UnorderedElementsAre(InterfaceAddress(check_ip),
699 InterfaceAddress(ip)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000700 } else {
701 // Check the IP didn't get added anywhere it wasn't supposed to.
Niels Möller22211442022-04-07 11:43:28 +0200702 EXPECT_THAT(network->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000703 }
704 }
705}
706
707// Test that merge correctly distinguishes multiple networks on an interface.
708TEST_F(NetworkTest, TestMultiplePublicNetworksOnOneInterfaceMerge) {
Niels Möller539f3e12021-11-26 16:33:19 +0100709 PhysicalSocketServer socket_server;
710 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200711 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
712 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200713 std::vector<std::unique_ptr<Network>> original_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000714 SetupNetworks(&original_list);
715 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200716 MergeNetworkList(manager, std::move(original_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000717 EXPECT_TRUE(changed);
718 IPAddress ip;
719 IPAddress prefix;
720 // A second network for eth0.
721 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip));
722 prefix = TruncateIP(ip, 64);
723 Network ipv6_eth0_publicnetwork2_ip1("test_eth0", "Test NetworkAdapter 1",
724 prefix, 64);
725 ipv6_eth0_publicnetwork2_ip1.AddIP(ip);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200726 std::vector<std::unique_ptr<Network>> second_list;
727 SetupNetworks(&second_list);
728 second_list.push_back(
729 std::make_unique<Network>(ipv6_eth0_publicnetwork2_ip1));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000730 changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200731 MergeNetworkList(manager, std::move(second_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000732 EXPECT_TRUE(changed);
733 // There should be five networks now.
Niels Möller22211442022-04-07 11:43:28 +0200734 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000735 EXPECT_EQ(5U, list.size());
736 // Check the resulting addresses.
Niels Möller22211442022-04-07 11:43:28 +0200737 for (const Network* network : list) {
738 if (network->prefix() == ipv6_eth0_publicnetwork2_ip1.prefix() &&
739 network->name() == ipv6_eth0_publicnetwork2_ip1.name()) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000740 // Check the new network has 1 IP and that it's the correct one.
Niels Möller22211442022-04-07 11:43:28 +0200741 EXPECT_EQ(1U, network->GetIPs().size());
742 EXPECT_EQ(ip, network->GetIPs().at(0));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000743 } else {
744 // Check the IP didn't get added anywhere it wasn't supposed to.
Niels Möller22211442022-04-07 11:43:28 +0200745 EXPECT_THAT(network->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000746 }
747 }
748}
749
honghaizdb8cf502015-12-21 13:08:46 -0800750// Test that DumpNetworks does not crash.
751TEST_F(NetworkTest, TestCreateAndDumpNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +0100752 PhysicalSocketServer socket_server;
753 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700754 manager.StartUpdating();
Niels Möllerd959f3a2022-04-19 11:29:19 +0200755 std::vector<std::unique_ptr<Network>> list = GetNetworks(manager, true);
honghaizdb8cf502015-12-21 13:08:46 -0800756 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200757 MergeNetworkList(manager, std::move(list), &changed);
honghaizdb8cf502015-12-21 13:08:46 -0800758 manager.DumpNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000759}
760
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100761TEST_F(NetworkTest, TestIPv6Toggle) {
Niels Möller539f3e12021-11-26 16:33:19 +0100762 PhysicalSocketServer socket_server;
763 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700764 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000765 bool ipv6_found = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200766 for (const auto& network : GetNetworks(manager, true)) {
767 if (network->prefix().family() == AF_INET6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000768 ipv6_found = true;
769 break;
770 }
771 }
772 EXPECT_TRUE(ipv6_found);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000773}
774
deadbeef3427f532017-07-26 16:09:33 -0700775// Test that when network interfaces are sorted and given preference values,
776// IPv6 comes first.
777TEST_F(NetworkTest, IPv6NetworksPreferredOverIPv4) {
Niels Möller539f3e12021-11-26 16:33:19 +0100778 PhysicalSocketServer socket_server;
779 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000780 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
781 IPAddress(0x12345600U), 24);
782 ipv4_network1.AddIP(IPAddress(0x12345600U));
783
784 IPAddress ip;
785 IPAddress prefix;
786 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
787 prefix = TruncateIP(ip, 64);
788 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 2",
789 prefix, 64);
790 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
791
Niels Möllerd959f3a2022-04-19 11:29:19 +0200792 std::vector<std::unique_ptr<Network>> list;
793 list.push_back(std::make_unique<Network>(ipv4_network1));
794 list.push_back(std::make_unique<Network>(ipv6_eth1_publicnetwork1_ip1));
795 const Network* net1 = list[0].get();
796 const Network* net2 = list[1].get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000797
798 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200799 MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000800 ASSERT_TRUE(changed);
801 // After sorting IPv6 network should be higher order than IPv4 networks.
802 EXPECT_TRUE(net1->preference() < net2->preference());
803}
804
deadbeef3427f532017-07-26 16:09:33 -0700805// When two interfaces are equivalent in everything but name, they're expected
806// to be preference-ordered by name. For example, "eth0" before "eth1".
807TEST_F(NetworkTest, NetworksSortedByInterfaceName) {
Niels Möller539f3e12021-11-26 16:33:19 +0100808 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200809 BasicNetworkManager manager(&socket_server, &field_trials_);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200810 auto eth0 = std::make_unique<Network>("test_eth0", "Test Network Adapter 1",
811 IPAddress(0x65432100U), 24);
deadbeef3427f532017-07-26 16:09:33 -0700812 eth0->AddIP(IPAddress(0x65432100U));
Niels Möllerd959f3a2022-04-19 11:29:19 +0200813 auto eth1 = std::make_unique<Network>("test_eth1", "Test Network Adapter 2",
814 IPAddress(0x12345600U), 24);
deadbeef3427f532017-07-26 16:09:33 -0700815 eth1->AddIP(IPAddress(0x12345600U));
Niels Möllerd959f3a2022-04-19 11:29:19 +0200816 std::vector<std::unique_ptr<Network>> list;
817 const Network* eth0_ptr = eth0.get();
818 const Network* eth1_ptr = eth1.get();
deadbeef3427f532017-07-26 16:09:33 -0700819 // Add them to the list in the opposite of the expected sorted order, to
820 // ensure sorting actually occurs.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200821 list.push_back(std::move(eth1));
822 list.push_back(std::move(eth0));
deadbeef3427f532017-07-26 16:09:33 -0700823
824 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200825 MergeNetworkList(manager, std::move(list), &changed);
deadbeef3427f532017-07-26 16:09:33 -0700826 ASSERT_TRUE(changed);
827 // "test_eth0" should be preferred over "test_eth1".
Niels Möllerd959f3a2022-04-19 11:29:19 +0200828 EXPECT_TRUE(eth0_ptr->preference() > eth1_ptr->preference());
deadbeef3427f532017-07-26 16:09:33 -0700829}
830
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000831TEST_F(NetworkTest, TestNetworkAdapterTypes) {
832 Network wifi("wlan0", "Wireless Adapter", IPAddress(0x12345600U), 24,
833 ADAPTER_TYPE_WIFI);
834 EXPECT_EQ(ADAPTER_TYPE_WIFI, wifi.type());
835 Network ethernet("eth0", "Ethernet", IPAddress(0x12345600U), 24,
836 ADAPTER_TYPE_ETHERNET);
837 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, ethernet.type());
838 Network cellular("test_cell", "Cellular Adapter", IPAddress(0x12345600U), 24,
839 ADAPTER_TYPE_CELLULAR);
840 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, cellular.type());
841 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24,
842 ADAPTER_TYPE_VPN);
843 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
844 Network unknown("test", "Test Adapter", IPAddress(0x12345600U), 24,
845 ADAPTER_TYPE_UNKNOWN);
846 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, unknown.type());
847}
848
849#if defined(WEBRTC_POSIX)
850// Verify that we correctly handle interfaces with no address.
851TEST_F(NetworkTest, TestConvertIfAddrsNoAddress) {
852 ifaddrs list;
853 memset(&list, 0, sizeof(list));
854 list.ifa_name = const_cast<char*>("test_iface");
855
Niels Möllerd959f3a2022-04-19 11:29:19 +0200856 std::vector<std::unique_ptr<Network>> result;
Niels Möller539f3e12021-11-26 16:33:19 +0100857 PhysicalSocketServer socket_server;
858 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700859 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000860 CallConvertIfAddrs(manager, &list, true, &result);
861 EXPECT_TRUE(result.empty());
862}
honghaizdb8cf502015-12-21 13:08:46 -0800863
864// Verify that if there are two addresses on one interface, only one network
865// is generated.
866TEST_F(NetworkTest, TestConvertIfAddrsMultiAddressesOnOneInterface) {
867 char if_name[20] = "rmnet0";
868 ifaddrs* list = nullptr;
869 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:1",
870 "FFFF:FFFF:FFFF:FFFF::", 0);
871 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:2",
872 "FFFF:FFFF:FFFF:FFFF::", 0);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200873 std::vector<std::unique_ptr<Network>> result;
Niels Möller539f3e12021-11-26 16:33:19 +0100874 PhysicalSocketServer socket_server;
875 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700876 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800877 CallConvertIfAddrs(manager, list, true, &result);
878 EXPECT_EQ(1U, result.size());
879 bool changed;
880 // This ensures we release the objects created in CallConvertIfAddrs.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200881 MergeNetworkList(manager, std::move(result), &changed);
honghaizdb8cf502015-12-21 13:08:46 -0800882 ReleaseIfAddrs(list);
883}
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800884
885TEST_F(NetworkTest, TestConvertIfAddrsNotRunning) {
886 ifaddrs list;
887 memset(&list, 0, sizeof(list));
888 list.ifa_name = const_cast<char*>("test_iface");
889 sockaddr ifa_addr;
890 sockaddr ifa_netmask;
891 list.ifa_addr = &ifa_addr;
892 list.ifa_netmask = &ifa_netmask;
893
Niels Möllerd959f3a2022-04-19 11:29:19 +0200894 std::vector<std::unique_ptr<Network>> result;
Niels Möller539f3e12021-11-26 16:33:19 +0100895 PhysicalSocketServer socket_server;
896 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700897 manager.StartUpdating();
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800898 CallConvertIfAddrs(manager, &list, true, &result);
899 EXPECT_TRUE(result.empty());
900}
Honghai Zhang351d77b2016-05-20 15:08:29 -0700901
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700902// Tests that the network type can be determined from the network monitor when
903// it would otherwise be unknown.
Honghai Zhang351d77b2016-05-20 15:08:29 -0700904TEST_F(NetworkTest, TestGetAdapterTypeFromNetworkMonitor) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700905 char if_name[20] = "wifi0";
906 std::string ipv6_address = "1000:2000:3000:4000:0:0:0:1";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700907 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Niels Mölleraa373162021-09-28 16:09:07 +0200908 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200909 BasicNetworkManager manager_without_monitor(nullptr, &socket_server,
910 &field_trials_);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700911 manager_without_monitor.StartUpdating();
912 // A network created without a network monitor will get UNKNOWN type.
913 ifaddrs* addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
914 manager_without_monitor);
915 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, GetAdapterType(manager_without_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700916 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700917
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700918 // With the fake network monitor the type should be correctly determined.
919 FakeNetworkMonitorFactory factory;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200920 BasicNetworkManager manager_with_monitor(&factory, &socket_server,
921 &field_trials_);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700922 manager_with_monitor.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700923 // Add the same ipv6 address as before but it has the right network type
924 // detected by the network monitor now.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700925 addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
926 manager_with_monitor);
927 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700928 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700929}
930
931// Test that the network type can be determined based on name matching in
932// a few cases. Note that UNKNOWN type for non-matching strings has been tested
933// in the above test.
934TEST_F(NetworkTest, TestGetAdapterTypeFromNameMatching) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800935 std::string ipv4_address1 = "192.0.0.121";
936 std::string ipv4_mask = "255.255.255.0";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700937 std::string ipv6_address1 = "1000:2000:3000:4000:0:0:0:1";
938 std::string ipv6_address2 = "1000:2000:3000:8000:0:0:0:1";
939 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Niels Möller539f3e12021-11-26 16:33:19 +0100940 PhysicalSocketServer socket_server;
941 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700942 manager.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700943
deadbeef4cd599f2017-07-27 15:05:29 -0700944 // IPSec interface; name is in form "ipsec<index>".
945 char if_name[20] = "ipsec11";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700946 ifaddrs* addr_list =
947 InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
deadbeef4cd599f2017-07-27 15:05:29 -0700948 EXPECT_EQ(ADAPTER_TYPE_VPN, GetAdapterType(manager));
949 ClearNetworks(manager);
950 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700951
Qingsi Wange53ac042018-05-08 11:55:07 -0700952 strcpy(if_name, "lo0");
953 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
954 EXPECT_EQ(ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager));
955 ClearNetworks(manager);
956 ReleaseIfAddrs(addr_list);
957
958 strcpy(if_name, "eth0");
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800959 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
Qingsi Wange53ac042018-05-08 11:55:07 -0700960 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, GetAdapterType(manager));
961 ClearNetworks(manager);
962 ReleaseIfAddrs(addr_list);
963
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700964 strcpy(if_name, "wlan0");
965 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
966 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
967 ClearNetworks(manager);
968 ReleaseIfAddrs(addr_list);
969
deadbeef4cd599f2017-07-27 15:05:29 -0700970#if defined(WEBRTC_IOS)
971 strcpy(if_name, "pdp_ip0");
972 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700973 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
974 ClearNetworks(manager);
975 ReleaseIfAddrs(addr_list);
976
Honghai Zhang63ab8102016-05-26 20:30:15 -0700977 strcpy(if_name, "en0");
978 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
979 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
980 ClearNetworks(manager);
981 ReleaseIfAddrs(addr_list);
982
Honghai Zhang351d77b2016-05-20 15:08:29 -0700983#elif defined(WEBRTC_ANDROID)
deadbeef4cd599f2017-07-27 15:05:29 -0700984 strcpy(if_name, "rmnet0");
985 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700986 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
987 ClearNetworks(manager);
988 ReleaseIfAddrs(addr_list);
989
Honghai Zhang351d77b2016-05-20 15:08:29 -0700990 strcpy(if_name, "v4-rmnet_data0");
991 addr_list = InstallIpv6Network(if_name, ipv6_address2, ipv6_mask, manager);
992 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
993 ClearNetworks(manager);
994 ReleaseIfAddrs(addr_list);
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800995
996 strcpy(if_name, "clat4");
997 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
998 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
999 ClearNetworks(manager);
1000 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -07001001#endif
1002}
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001003
1004// Test that an adapter won't be included in the network list if there's a
1005// network monitor that says it's unavailable.
1006TEST_F(NetworkTest, TestNetworkMonitorIsAdapterAvailable) {
1007 char if_name1[20] = "pdp_ip0";
1008 char if_name2[20] = "pdp_ip1";
1009 ifaddrs* list = nullptr;
1010 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
1011 "FFFF:FFFF:FFFF:FFFF::", 0);
1012 list = AddIpv6Address(list, if_name2, "1000:2000:3000:4000:0:0:0:2",
1013 "FFFF:FFFF:FFFF:FFFF::", 0);
Niels Möllerd959f3a2022-04-19 11:29:19 +02001014 std::vector<std::unique_ptr<Network>> result;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001015
1016 // Sanity check that both interfaces are included by default.
1017 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001018 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001019 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001020 manager.StartUpdating();
1021 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1022 EXPECT_EQ(2u, result.size());
1023 bool changed;
1024 // This ensures we release the objects created in CallConvertIfAddrs.
Niels Möllerd959f3a2022-04-19 11:29:19 +02001025 MergeNetworkList(manager, std::move(result), &changed);
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001026 result.clear();
1027
1028 // Now simulate one interface being unavailable.
1029 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1030 network_monitor->set_unavailable_adapters({if_name1});
1031 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1032 EXPECT_EQ(1u, result.size());
1033 EXPECT_EQ(if_name2, result[0]->name());
1034
Niels Möllerd959f3a2022-04-19 11:29:19 +02001035 MergeNetworkList(manager, std::move(result), &changed);
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001036 ReleaseIfAddrs(list);
1037}
1038
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001039#endif // defined(WEBRTC_POSIX)
1040
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001041// Test MergeNetworkList successfully combines all IPs for the same
1042// prefix/length into a single Network.
1043TEST_F(NetworkTest, TestMergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +01001044 PhysicalSocketServer socket_server;
1045 BasicNetworkManager manager(&socket_server);
Niels Möllerd959f3a2022-04-19 11:29:19 +02001046 std::vector<std::unique_ptr<Network>> list;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001047
1048 // Create 2 IPAddress classes with only last digit different.
1049 IPAddress ip1, ip2;
1050 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1051 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2));
1052
1053 // Create 2 networks with the same prefix and length.
Niels Möllerd959f3a2022-04-19 11:29:19 +02001054 auto net1 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
1055 auto net2 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001056
1057 // Add different IP into each.
1058 net1->AddIP(ip1);
1059 net2->AddIP(ip2);
1060
Niels Möllerd959f3a2022-04-19 11:29:19 +02001061 list.push_back(std::move(net1));
1062 list.push_back(std::move(net2));
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001063 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001064 MergeNetworkList(manager, std::move(list), &changed);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001065 EXPECT_TRUE(changed);
1066
Niels Möller22211442022-04-07 11:43:28 +02001067 std::vector<const Network*> list2 = manager.GetNetworks();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001068
1069 // Make sure the resulted networklist has only 1 element and 2
1070 // IPAddresses.
1071 EXPECT_EQ(list2.size(), 1uL);
1072 EXPECT_EQ(list2[0]->GetIPs().size(), 2uL);
Mirko Bonadeib2a57852022-03-18 12:19:56 +01001073 EXPECT_THAT(list2[0]->GetIPs(), UnorderedElementsAre(InterfaceAddress(ip1),
1074 InterfaceAddress(ip2)));
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001075}
1076
honghaizdb8cf502015-12-21 13:08:46 -08001077// Test that MergeNetworkList successfully detects the change if
1078// a network becomes inactive and then active again.
1079TEST_F(NetworkTest, TestMergeNetworkListWithInactiveNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +01001080 PhysicalSocketServer socket_server;
1081 BasicNetworkManager manager(&socket_server);
honghaizdb8cf502015-12-21 13:08:46 -08001082 Network network1("test_wifi", "Test Network Adapter 1",
1083 IPAddress(0x12345600U), 24);
1084 Network network2("test_eth0", "Test Network Adapter 2",
1085 IPAddress(0x00010000U), 16);
1086 network1.AddIP(IPAddress(0x12345678));
1087 network2.AddIP(IPAddress(0x00010004));
Niels Möllerd959f3a2022-04-19 11:29:19 +02001088 std::vector<std::unique_ptr<Network>> list;
1089 auto net1 = std::make_unique<Network>(network1);
1090 const Network* const net1_ptr = net1.get();
1091 list.push_back(std::move(net1));
honghaizdb8cf502015-12-21 13:08:46 -08001092 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001093 MergeNetworkList(manager, std::move(list), &changed);
honghaizdb8cf502015-12-21 13:08:46 -08001094 EXPECT_TRUE(changed);
1095 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001096
1097 std::vector<const Network*> current = manager.GetNetworks();
1098 ASSERT_EQ(1U, current.size());
Niels Möllerd959f3a2022-04-19 11:29:19 +02001099 EXPECT_EQ(net1_ptr, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001100
1101 list.clear();
Niels Möllerd959f3a2022-04-19 11:29:19 +02001102 auto net2 = std::make_unique<Network>(network2);
1103 const Network* const net2_ptr = net2.get();
1104 list.push_back(std::move(net2));
1105 MergeNetworkList(manager, std::move(list), &changed);
honghaizdb8cf502015-12-21 13:08:46 -08001106 EXPECT_TRUE(changed);
1107 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001108
1109 current = manager.GetNetworks();
1110 ASSERT_EQ(1U, current.size());
Niels Möllerd959f3a2022-04-19 11:29:19 +02001111 EXPECT_EQ(net2_ptr, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001112 // Now network1 is inactive. Try to merge it again.
1113 list.clear();
Niels Möllerd959f3a2022-04-19 11:29:19 +02001114 list.push_back(std::make_unique<Network>(network1));
1115 MergeNetworkList(manager, std::move(list), &changed);
honghaizdb8cf502015-12-21 13:08:46 -08001116 EXPECT_TRUE(changed);
1117 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001118 current = manager.GetNetworks();
1119 ASSERT_EQ(1U, current.size());
1120 EXPECT_TRUE(current[0]->active());
Niels Möllerd959f3a2022-04-19 11:29:19 +02001121 EXPECT_EQ(net1_ptr, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001122}
1123
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001124// Test that the filtering logic follows the defined ruleset in network.h.
1125TEST_F(NetworkTest, TestIPv6Selection) {
1126 InterfaceAddress ip;
1127 std::string ipstr;
1128
1129 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
1130 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
1131
1132 // Create a network with this prefix.
Yves Gerey665174f2018-06-19 15:03:05 +02001133 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
1134 64);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001135
1136 // When there is no address added, it should return an unspecified
1137 // address.
1138 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1139 EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
1140
1141 // Deprecated one should not be returned.
1142 ipv6_network.AddIP(ip);
1143 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1144
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001145 // Add ULA one. ULA is unique local address which is starting either
1146 // with 0xfc or 0xfd.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001147 ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
1148 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1149 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001150 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001151
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001152 // Add global one.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001153 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
1154 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1155 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001156 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001157
1158 // Add global dynamic temporary one.
1159 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
1160 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
1161 ipv6_network.AddIP(ip);
1162 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1163}
1164
honghaiz023f3ef2015-10-19 09:39:32 -07001165TEST_F(NetworkTest, TestNetworkMonitoring) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001166 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001167 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001168 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
honghaiz023f3ef2015-10-19 09:39:32 -07001169 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1170 &NetworkTest::OnNetworksChanged);
honghaiz023f3ef2015-10-19 09:39:32 -07001171 manager.StartUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001172 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1173 EXPECT_TRUE(network_monitor && network_monitor->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001174 EXPECT_TRUE_WAIT(callback_called_, 1000);
1175 callback_called_ = false;
1176
1177 // Clear the networks so that there will be network changes below.
1178 ClearNetworks(manager);
1179 // Network manager is started, so the callback is called when the network
1180 // monitor fires the network-change event.
Mirko Bonadei37077932021-07-27 17:00:58 +02001181 network_monitor->InovkeNetworksChangedCallbackForTesting();
honghaiz023f3ef2015-10-19 09:39:32 -07001182 EXPECT_TRUE_WAIT(callback_called_, 1000);
1183
honghaizcec0a082016-01-15 14:49:09 -08001184 // Network manager is stopped.
honghaiz023f3ef2015-10-19 09:39:32 -07001185 manager.StopUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001186 EXPECT_FALSE(GetNetworkMonitor(manager)->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001187}
1188
Edward Lemur8dc945c2016-07-21 10:16:40 +02001189// Fails on Android: https://bugs.chromium.org/p/webrtc/issues/detail?id=4364.
1190#if defined(WEBRTC_ANDROID)
1191#define MAYBE_DefaultLocalAddress DISABLED_DefaultLocalAddress
1192#else
1193#define MAYBE_DefaultLocalAddress DefaultLocalAddress
1194#endif
1195TEST_F(NetworkTest, MAYBE_DefaultLocalAddress) {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001196 IPAddress ip;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001197 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001198 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001199 TestBasicNetworkManager manager(&factory, &socket_server, field_trials_);
guoweis56271ed2016-01-15 14:45:06 -08001200 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1201 &NetworkTest::OnNetworksChanged);
guoweis56271ed2016-01-15 14:45:06 -08001202 manager.StartUpdating();
1203 EXPECT_TRUE_WAIT(callback_called_, 1000);
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001204
1205 // Make sure we can query default local address when an address for such
1206 // address family exists.
Niels Möller22211442022-04-07 11:43:28 +02001207 std::vector<const Network*> networks = manager.GetNetworks();
guoweis56271ed2016-01-15 14:45:06 -08001208 EXPECT_TRUE(!networks.empty());
Niels Möller22211442022-04-07 11:43:28 +02001209 for (const Network* network : networks) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001210 if (network->GetBestIP().family() == AF_INET) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001211 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET) != IPAddress());
guoweis56271ed2016-01-15 14:45:06 -08001212 } else if (network->GetBestIP().family() == AF_INET6 &&
1213 !IPIsLoopback(network->GetBestIP())) {
1214 // Existence of an IPv6 loopback address doesn't mean it has IPv6 network
1215 // enabled.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001216 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET6) != IPAddress());
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001217 }
1218 }
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001219
1220 // GetDefaultLocalAddress should return the valid default address after set.
1221 manager.set_default_local_addresses(GetLoopbackIP(AF_INET),
1222 GetLoopbackIP(AF_INET6));
1223 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET, &ip));
1224 EXPECT_EQ(ip, GetLoopbackIP(AF_INET));
1225 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1226 EXPECT_EQ(ip, GetLoopbackIP(AF_INET6));
honghaizaf83fe62016-04-18 14:50:44 -07001227
1228 // More tests on GetDefaultLocalAddress with ipv6 addresses where the set
1229 // default address may be different from the best IP address of any network.
1230 InterfaceAddress ip1;
1231 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:1111",
1232 IPV6_ADDRESS_FLAG_TEMPORARY, &ip1));
1233 // Create a network with a prefix of ip1.
1234 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip1, 64),
1235 64);
1236 IPAddress ip2;
1237 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:2222", &ip2));
1238 ipv6_network.AddIP(ip1);
1239 ipv6_network.AddIP(ip2);
Niels Möllerd959f3a2022-04-19 11:29:19 +02001240 std::vector<std::unique_ptr<Network>> list;
1241 list.push_back(std::make_unique<Network>(ipv6_network));
honghaizaf83fe62016-04-18 14:50:44 -07001242 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001243 MergeNetworkList(manager, std::move(list), &changed);
honghaizaf83fe62016-04-18 14:50:44 -07001244 // If the set default address is not in any network, GetDefaultLocalAddress
1245 // should return it.
1246 IPAddress ip3;
1247 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:3333", &ip3));
1248 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip3);
1249 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1250 EXPECT_EQ(ip3, ip);
1251 // If the set default address is in a network, GetDefaultLocalAddress will
1252 // return the best IP in that network.
1253 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip2);
1254 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1255 EXPECT_EQ(static_cast<IPAddress>(ip1), ip);
1256
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001257 manager.StopUpdating();
1258}
1259
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001260// Test that MergeNetworkList does not set change = true
1261// when changing from cellular_X to cellular_Y.
1262TEST_F(NetworkTest, TestWhenNetworkListChangeReturnsChangedFlag) {
Niels Möller539f3e12021-11-26 16:33:19 +01001263 PhysicalSocketServer socket_server;
1264 BasicNetworkManager manager(&socket_server);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001265
1266 IPAddress ip1;
1267 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
Niels Möllerd959f3a2022-04-19 11:29:19 +02001268 auto net1 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001269 net1->set_type(ADAPTER_TYPE_CELLULAR_3G);
1270 net1->AddIP(ip1);
Niels Möllerd959f3a2022-04-19 11:29:19 +02001271 std::vector<std::unique_ptr<Network>> list;
1272 list.push_back(std::move(net1));
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001273
1274 {
1275 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001276 MergeNetworkList(manager, std::move(list), &changed);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001277 EXPECT_TRUE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001278 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001279 EXPECT_EQ(list2.size(), 1uL);
1280 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_3G, list2[0]->type());
1281 }
1282
1283 // Modify net1 from 3G to 4G
1284 {
Niels Möllerd959f3a2022-04-19 11:29:19 +02001285 auto net2 =
1286 std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001287 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1288 net2->AddIP(ip1);
1289 list.clear();
Niels Möllerd959f3a2022-04-19 11:29:19 +02001290 list.push_back(std::move(net2));
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001291 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001292 MergeNetworkList(manager, std::move(list), &changed);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001293
1294 // Change from 3G to 4G shall not trigger OnNetworksChanged,
1295 // i.e changed = false.
1296 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001297 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001298 ASSERT_EQ(list2.size(), 1uL);
1299 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1300 }
1301
1302 // Don't modify.
1303 {
Niels Möllerd959f3a2022-04-19 11:29:19 +02001304 auto net2 =
1305 std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001306 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1307 net2->AddIP(ip1);
1308 list.clear();
Niels Möllerd959f3a2022-04-19 11:29:19 +02001309 list.push_back(std::move(net2));
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001310 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001311 MergeNetworkList(manager, std::move(list), &changed);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001312
1313 // No change.
1314 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001315 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001316 ASSERT_EQ(list2.size(), 1uL);
1317 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1318 }
1319}
1320
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001321#if defined(WEBRTC_POSIX)
1322TEST_F(NetworkTest, IgnoresMACBasedIPv6Address) {
1323 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1324 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
Niels Möller539f3e12021-11-26 16:33:19 +01001325 PhysicalSocketServer socket_server;
1326 BasicNetworkManager manager(&socket_server);
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001327 manager.StartUpdating();
1328
1329 // IPSec interface; name is in form "ipsec<index>".
1330 char if_name[20] = "ipsec11";
1331 ifaddrs* addr_list =
1332 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1333
Niels Möller22211442022-04-07 11:43:28 +02001334 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001335 EXPECT_EQ(list.size(), 0u);
1336 ReleaseIfAddrs(addr_list);
1337}
1338
1339TEST_F(NetworkTest, WebRTC_AllowMACBasedIPv6Address) {
1340 webrtc::test::ScopedFieldTrials field_trials(
1341 "WebRTC-AllowMACBasedIPv6/Enabled/");
1342 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1343 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
Niels Möller539f3e12021-11-26 16:33:19 +01001344 PhysicalSocketServer socket_server;
1345 BasicNetworkManager manager(&socket_server);
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001346 manager.StartUpdating();
1347
1348 // IPSec interface; name is in form "ipsec<index>".
1349 char if_name[20] = "ipsec11";
1350 ifaddrs* addr_list =
1351 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1352
Niels Möller22211442022-04-07 11:43:28 +02001353 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001354 EXPECT_EQ(list.size(), 1u);
1355 ReleaseIfAddrs(addr_list);
1356}
1357#endif
1358
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001359#if defined(WEBRTC_POSIX)
1360TEST_F(NetworkTest, WebRTC_BindUsingInterfaceName) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001361 char if_name1[20] = "wlan0";
1362 char if_name2[20] = "v4-wlan0";
1363 ifaddrs* list = nullptr;
1364 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
1365 "FFFF:FFFF:FFFF:FFFF::", 0);
1366 list = AddIpv4Address(list, if_name2, "192.168.0.2", "255.255.255.255");
Niels Möllerd959f3a2022-04-19 11:29:19 +02001367 std::vector<std::unique_ptr<Network>> result;
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001368
1369 // Sanity check that both interfaces are included by default.
1370 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001371 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001372 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001373 manager.StartUpdating();
1374 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1375 EXPECT_EQ(2u, result.size());
1376 ReleaseIfAddrs(list);
1377 bool changed;
1378 // This ensures we release the objects created in CallConvertIfAddrs.
Niels Möllerd959f3a2022-04-19 11:29:19 +02001379 MergeNetworkList(manager, std::move(result), &changed);
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001380 result.clear();
1381
1382 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1383
1384 IPAddress ipv6;
1385 EXPECT_TRUE(IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6));
1386 IPAddress ipv4;
1387 EXPECT_TRUE(IPFromString("192.168.0.2", &ipv4));
1388
1389 // The network monitor only knwos about the ipv6 address, interface.
1390 network_monitor->set_adapters({"wlan0"});
1391 network_monitor->set_ip_addresses({ipv6});
1392 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv6),
1393 NetworkBindingResult::SUCCESS);
1394
1395 // But it will bind anyway using string matching...
1396 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv4),
1397 NetworkBindingResult::SUCCESS);
1398}
1399#endif
1400
Jonas Orelandb477fc72021-08-23 12:16:33 +02001401TEST_F(NetworkTest, NetworkCostVpn_Default) {
1402 IPAddress ip1;
1403 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001404 webrtc::test::ScopedKeyValueConfig field_trials;
Jonas Orelandb477fc72021-08-23 12:16:33 +02001405
1406 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1407 net1->set_type(ADAPTER_TYPE_VPN);
1408 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1409
1410 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1411 net2->set_type(ADAPTER_TYPE_ETHERNET);
1412
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001413 EXPECT_EQ(net1->GetCost(field_trials), net2->GetCost(field_trials));
Jonas Orelandb477fc72021-08-23 12:16:33 +02001414 delete net1;
1415 delete net2;
1416}
1417
1418TEST_F(NetworkTest, NetworkCostVpn_VpnMoreExpensive) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001419 webrtc::test::ScopedKeyValueConfig field_trials(
Jonas Orelandb477fc72021-08-23 12:16:33 +02001420 "WebRTC-AddNetworkCostToVpn/Enabled/");
1421
1422 IPAddress ip1;
1423 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1424
1425 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1426 net1->set_type(ADAPTER_TYPE_VPN);
1427 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1428
1429 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1430 net2->set_type(ADAPTER_TYPE_ETHERNET);
1431
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001432 EXPECT_GT(net1->GetCost(field_trials), net2->GetCost(field_trials));
Jonas Orelandb477fc72021-08-23 12:16:33 +02001433 delete net1;
1434 delete net2;
1435}
1436
Jonas Oreland30019052022-01-28 14:11:44 +01001437TEST_F(NetworkTest, GuessAdapterFromNetworkCost) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001438 webrtc::test::ScopedKeyValueConfig field_trials(
Jonas Oreland30019052022-01-28 14:11:44 +01001439 "WebRTC-AddNetworkCostToVpn/Enabled/"
1440 "WebRTC-UseDifferentiatedCellularCosts/Enabled/");
1441
1442 IPAddress ip1;
1443 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1444
1445 for (auto type : kAllAdapterTypes) {
1446 if (type == rtc::ADAPTER_TYPE_VPN)
1447 continue;
1448 Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
1449 net1.set_type(type);
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001450 auto [guess, vpn] =
1451 Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials));
Jonas Oreland30019052022-01-28 14:11:44 +01001452 EXPECT_FALSE(vpn);
1453 if (type == rtc::ADAPTER_TYPE_LOOPBACK) {
1454 EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET);
1455 } else {
1456 EXPECT_EQ(type, guess);
1457 }
1458 }
1459
1460 // VPN
1461 for (auto type : kAllAdapterTypes) {
1462 if (type == rtc::ADAPTER_TYPE_VPN)
1463 continue;
1464 Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
1465 net1.set_type(rtc::ADAPTER_TYPE_VPN);
1466 net1.set_underlying_type_for_vpn(type);
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001467 auto [guess, vpn] =
1468 Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials));
Jonas Oreland30019052022-01-28 14:11:44 +01001469 EXPECT_TRUE(vpn);
1470 if (type == rtc::ADAPTER_TYPE_LOOPBACK) {
1471 EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET);
1472 } else {
1473 EXPECT_EQ(type, guess);
1474 }
1475 }
1476}
1477
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001478TEST_F(NetworkTest, VpnList) {
Niels Möller539f3e12021-11-26 16:33:19 +01001479 PhysicalSocketServer socket_server;
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001480 {
Niels Möller539f3e12021-11-26 16:33:19 +01001481 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001482 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1483 manager.StartUpdating();
1484 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1485 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.12.1"), 24));
1486 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 16));
1487 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 24));
1488 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.1.1"), 32));
1489 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.0.0"), 16));
1490 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 15));
1491 }
1492 {
Niels Möller539f3e12021-11-26 16:33:19 +01001493 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001494 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 24)});
1495 manager.StartUpdating();
1496 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1497 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.1"), 32));
1498 }
1499}
1500
1501#if defined(WEBRTC_POSIX)
1502// TODO(webrtc:13114): Implement the InstallIpv4Network for windows.
1503TEST_F(NetworkTest, VpnListOverrideAdapterType) {
Niels Möller539f3e12021-11-26 16:33:19 +01001504 PhysicalSocketServer socket_server;
1505 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001506 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1507 manager.StartUpdating();
1508
1509 char if_name[20] = "eth0";
1510 auto addr_list =
1511 InstallIpv4Network(if_name, "192.168.1.23", "255.255.255.255", manager);
1512
Niels Möller22211442022-04-07 11:43:28 +02001513 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001514 ASSERT_EQ(1u, list.size());
1515 EXPECT_EQ(ADAPTER_TYPE_VPN, list[0]->type());
1516 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, list[0]->underlying_type_for_vpn());
1517 ClearNetworks(manager);
1518 ReleaseIfAddrs(addr_list);
1519}
1520#endif // defined(WEBRTC_POSIX)
1521
Jonas Orelandac554eb2021-08-27 09:43:38 +02001522TEST_F(NetworkTest, HardcodedVpn) {
1523 const uint8_t cisco[] = {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0};
1524 const uint8_t global[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x1};
1525 const uint8_t unknown[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x0};
1526 const uint8_t five_bytes[] = {0x2, 0x50, 0x41, 0x0, 0x0};
1527 EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(cisco));
1528 EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(global));
1529
1530 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(
1531 rtc::ArrayView<const uint8_t>(cisco, 5)));
1532 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(five_bytes));
1533 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(unknown));
1534 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(nullptr));
1535}
1536
Mirko Bonadei13f9c622022-04-29 16:38:32 +02001537TEST(CompareNetworks, IrreflexivityTest) {
1538 // x < x is false
1539 auto network = std::make_unique<Network>(
1540 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1541 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network, network));
1542}
1543
1544TEST(CompareNetworks, AsymmetryTest) {
1545 // x < y and y < x cannot be both true
1546 auto network_a = std::make_unique<Network>(
1547 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1548 auto network_b = std::make_unique<Network>(
1549 "test_eth1", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1550 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b));
1551 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_b, network_a));
1552
1553 auto network_c = std::make_unique<Network>(
1554 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345500U), 24);
1555 auto network_d = std::make_unique<Network>(
1556 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1557 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_c, network_d));
1558 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_c));
1559}
1560
1561TEST(CompareNetworks, TransitivityTest) {
1562 // x < y and y < z imply x < z
1563 auto network_a = std::make_unique<Network>(
1564 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1565 auto network_b = std::make_unique<Network>(
1566 "test_eth1", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1567 auto network_c = std::make_unique<Network>(
1568 "test_eth2", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1569 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b));
1570 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_b, network_c));
1571
1572 auto network_d = std::make_unique<Network>(
1573 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1574 auto network_e = std::make_unique<Network>(
1575 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345700U), 24);
1576 auto network_f = std::make_unique<Network>(
1577 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345800U), 24);
1578 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_d, network_e));
1579 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_e, network_f));
1580 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_d, network_f));
1581 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_c));
1582}
1583
1584TEST(CompareNetworks, TransitivityOfIncomparabilityTest) {
1585 // x == y and y == z imply x == z,
1586 // where x == y means x < y and y < x are both false
1587 auto network_a = std::make_unique<Network>(
1588 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 23);
1589 auto network_b = std::make_unique<Network>(
1590 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1591 auto network_c = std::make_unique<Network>(
1592 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345700U), 24);
1593
1594 // network_a < network_b
1595 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b));
1596 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_b, network_a));
1597
1598 // network_b < network_c
1599 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_b, network_c));
1600 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_c, network_b));
1601
1602 // network_a < network_c
1603 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_c));
1604 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_c, network_a));
1605
1606 auto network_d = std::make_unique<Network>(
1607 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1608 auto network_e = std::make_unique<Network>(
1609 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1610 auto network_f = std::make_unique<Network>(
1611 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1612
1613 // network_d == network_e
1614 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_e));
1615 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_e, network_d));
1616
1617 // network_e == network_f
1618 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_e, network_f));
1619 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_f, network_e));
1620
1621 // network_d == network_f
1622 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_f));
1623 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_f, network_d));
1624}
1625
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001626} // namespace rtc