blob: a5261545e58e87a0bb6ff2dac316255352767914 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
oprypin1ea631f2017-08-18 00:15:19 -070013#include <stdlib.h>
14
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070015#include <algorithm>
jbauch555604a2016-04-26 03:13:22 -070016#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#include <vector>
oprypin1ea631f2017-08-18 00:15:19 -070018
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070019#include "absl/algorithm/container.h"
Mirko Bonadei06d35592020-04-01 13:43:08 +020020#include "absl/strings/match.h"
Ali Tofigh7fa90572022-03-17 15:47:49 +010021#include "absl/strings/string_view.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020022#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080023#include "rtc_base/net_helpers.h"
24#include "rtc_base/network_monitor.h"
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -070025#include "rtc_base/network_monitor_factory.h"
Niels Mölleraa373162021-09-28 16:09:07 +020026#include "rtc_base/physical_socket_server.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000027#if defined(WEBRTC_POSIX)
Henrik Kjellander00725112017-06-30 15:14:45 +020028#include <net/if.h>
Yves Gerey665174f2018-06-19 15:03:05 +020029#include <sys/types.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020030
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020031#include "rtc_base/ifaddrs_converter.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080032#endif // defined(WEBRTC_POSIX)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020033#include "rtc_base/gunit.h"
Steve Anton2acd1632019-03-25 13:48:30 -070034#include "test/gmock.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000035#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +010036#include "rtc_base/logging.h" // For RTC_LOG_GLE
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000037#endif
Jonas Oreland47fa08f2020-12-05 18:09:13 +010038#include "test/field_trial.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020039#include "test/scoped_key_value_config.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000040
Steve Anton2acd1632019-03-25 13:48:30 -070041using ::testing::Contains;
42using ::testing::Not;
43using ::testing::UnorderedElementsAre;
44using ::testing::UnorderedElementsAreArray;
45
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000046namespace rtc {
47
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080048namespace {
49
Ali Tofigh7fa90572022-03-17 15:47:49 +010050IPAddress IPFromString(absl::string_view str) {
Jonas Oreland2ee0e642021-08-25 15:43:02 +020051 IPAddress ip;
52 RTC_CHECK(IPFromString(str, &ip));
53 return ip;
54}
55
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000056class FakeNetworkMonitor : public NetworkMonitorInterface {
honghaiz023f3ef2015-10-19 09:39:32 -070057 public:
honghaizcec0a082016-01-15 14:49:09 -080058 void Start() override { started_ = true; }
59 void Stop() override { started_ = false; }
60 bool started() { return started_; }
Jonas Oreland61dbcd12022-05-31 11:34:20 +020061 InterfaceInfo GetInterfaceInfo(absl::string_view if_name) override {
62 InterfaceInfo if_info = {
63 .adapter_type = ADAPTER_TYPE_UNKNOWN,
64 .available = absl::c_count(unavailable_adapters_, if_name) == 0,
65 };
Mirko Bonadei06d35592020-04-01 13:43:08 +020066 if (absl::StartsWith(if_name, "wifi")) {
Jonas Oreland61dbcd12022-05-31 11:34:20 +020067 if_info.adapter_type = ADAPTER_TYPE_WIFI;
68 } else if (absl::StartsWith(if_name, "cellular")) {
69 if_info.adapter_type = ADAPTER_TYPE_CELLULAR;
Honghai Zhang351d77b2016-05-20 15:08:29 -070070 }
Jonas Oreland61dbcd12022-05-31 11:34:20 +020071 return if_info;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070072 }
73
74 // Used to test IsAdapterAvailable.
75 void set_unavailable_adapters(std::vector<std::string> unavailable_adapters) {
76 unavailable_adapters_ = unavailable_adapters;
77 }
78
Jonas Oreland6ca955a2021-03-15 08:27:43 +000079 bool SupportsBindSocketToNetwork() const override { return true; }
80
Ali Tofigh7fa90572022-03-17 15:47:49 +010081 NetworkBindingResult BindSocketToNetwork(int socket_fd,
82 const IPAddress& address,
83 absl::string_view if_name) override {
Jonas Oreland6ca955a2021-03-15 08:27:43 +000084 if (absl::c_count(addresses_, address) > 0) {
85 return NetworkBindingResult::SUCCESS;
86 }
87
88 for (auto const& iter : adapters_) {
Ali Tofigh7fa90572022-03-17 15:47:49 +010089 if (if_name.find(iter) != absl::string_view::npos) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +000090 return NetworkBindingResult::SUCCESS;
91 }
92 }
93 return NetworkBindingResult::ADDRESS_NOT_FOUND;
94 }
95
96 void set_ip_addresses(std::vector<IPAddress> addresses) {
97 addresses_ = addresses;
98 }
99
100 void set_adapters(std::vector<std::string> adapters) { adapters_ = adapters; }
101
Mirko Bonadei37077932021-07-27 17:00:58 +0200102 void InovkeNetworksChangedCallbackForTesting() {
103 InvokeNetworksChangedCallback();
104 }
105
honghaizcec0a082016-01-15 14:49:09 -0800106 private:
107 bool started_ = false;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000108 std::vector<std::string> adapters_;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700109 std::vector<std::string> unavailable_adapters_;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000110 std::vector<IPAddress> addresses_;
honghaiz023f3ef2015-10-19 09:39:32 -0700111};
112
113class FakeNetworkMonitorFactory : public NetworkMonitorFactory {
114 public:
115 FakeNetworkMonitorFactory() {}
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200116 NetworkMonitorInterface* CreateNetworkMonitor(
Jonas Orelande62c2f22022-03-29 11:04:48 +0200117 const webrtc::FieldTrialsView& field_trials) override {
honghaiz023f3ef2015-10-19 09:39:32 -0700118 return new FakeNetworkMonitor();
119 }
120};
121
Qingsi Wang10a0e512018-05-16 13:37:03 -0700122bool SameNameAndPrefix(const rtc::Network& a, const rtc::Network& b) {
123 if (a.name() != b.name()) {
Harald Alvestrand97597c02021-11-04 12:01:23 +0000124 RTC_LOG(LS_INFO) << "Different interface names.";
Qingsi Wang10a0e512018-05-16 13:37:03 -0700125 return false;
126 }
127 if (a.prefix_length() != b.prefix_length() || a.prefix() != b.prefix()) {
Harald Alvestrand97597c02021-11-04 12:01:23 +0000128 RTC_LOG(LS_INFO) << "Different IP prefixes.";
Qingsi Wang10a0e512018-05-16 13:37:03 -0700129 return false;
130 }
131 return true;
132}
133
Niels Möllerd959f3a2022-04-19 11:29:19 +0200134std::vector<const Network*> CopyNetworkPointers(
135 const std::vector<std::unique_ptr<Network>>& owning_list) {
136 std::vector<const Network*> ptr_list;
137 ptr_list.reserve(owning_list.size());
138 for (const auto& network : owning_list) {
139 ptr_list.push_back(network.get());
140 }
141 return ptr_list;
142}
143
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800144} // namespace
145
Mirko Bonadei6a489f22019-04-09 15:11:12 +0200146class NetworkTest : public ::testing::Test, public sigslot::has_slots<> {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000147 public:
148 NetworkTest() : callback_called_(false) {}
149
Yves Gerey665174f2018-06-19 15:03:05 +0200150 void OnNetworksChanged() { callback_called_ = true; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000151
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000152 NetworkManager::Stats MergeNetworkList(
153 BasicNetworkManager& network_manager,
Niels Möllerd959f3a2022-04-19 11:29:19 +0200154 std::vector<std::unique_ptr<Network>> list,
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000155 bool* changed) {
156 NetworkManager::Stats stats;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200157 network_manager.MergeNetworkList(std::move(list), changed, &stats);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000158 return stats;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000159 }
160
161 bool IsIgnoredNetwork(BasicNetworkManager& network_manager,
162 const Network& network) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700163 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000164 return network_manager.IsIgnoredNetwork(network);
165 }
166
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700167 IPAddress QueryDefaultLocalAddress(BasicNetworkManager& network_manager,
168 int family) {
169 RTC_DCHECK_RUN_ON(network_manager.thread_);
170 return network_manager.QueryDefaultLocalAddress(family);
171 }
172
Niels Möllerd959f3a2022-04-19 11:29:19 +0200173 std::vector<std::unique_ptr<Network>> GetNetworks(
Yves Gerey665174f2018-06-19 15:03:05 +0200174 const BasicNetworkManager& network_manager,
175 bool include_ignored) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700176 RTC_DCHECK_RUN_ON(network_manager.thread_);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200177 std::vector<std::unique_ptr<Network>> list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000178 network_manager.CreateNetworks(include_ignored, &list);
179 return list;
180 }
181
honghaizcec0a082016-01-15 14:49:09 -0800182 FakeNetworkMonitor* GetNetworkMonitor(BasicNetworkManager& network_manager) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700183 RTC_DCHECK_RUN_ON(network_manager.thread_);
honghaizcec0a082016-01-15 14:49:09 -0800184 return static_cast<FakeNetworkMonitor*>(
185 network_manager.network_monitor_.get());
honghaiz023f3ef2015-10-19 09:39:32 -0700186 }
187 void ClearNetworks(BasicNetworkManager& network_manager) {
honghaiz023f3ef2015-10-19 09:39:32 -0700188 network_manager.networks_.clear();
189 network_manager.networks_map_.clear();
190 }
191
Honghai Zhang351d77b2016-05-20 15:08:29 -0700192 AdapterType GetAdapterType(BasicNetworkManager& network_manager) {
Niels Möller22211442022-04-07 11:43:28 +0200193 std::vector<const Network*> list = network_manager.GetNetworks();
nissec16fa5e2017-02-07 07:18:43 -0800194 RTC_CHECK_EQ(1, list.size());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700195 return list[0]->type();
196 }
197
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000198#if defined(WEBRTC_POSIX)
199 // Separated from CreateNetworks for tests.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200200 static void CallConvertIfAddrs(
201 const BasicNetworkManager& network_manager,
202 struct ifaddrs* interfaces,
203 bool include_ignored,
204 std::vector<std::unique_ptr<Network>>* networks) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700205 RTC_DCHECK_RUN_ON(network_manager.thread_);
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800206 // Use the base IfAddrsConverter for test cases.
jbauch555604a2016-04-26 03:13:22 -0700207 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(new IfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800208 network_manager.ConvertIfAddrs(interfaces, ifaddrs_converter.get(),
209 include_ignored, networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000210 }
honghaizdb8cf502015-12-21 13:08:46 -0800211
Ali Tofigh7fa90572022-03-17 15:47:49 +0100212 struct sockaddr_in6* CreateIpv6Addr(absl::string_view ip_string,
honghaizdb8cf502015-12-21 13:08:46 -0800213 uint32_t scope_id) {
Yves Gerey665174f2018-06-19 15:03:05 +0200214 struct sockaddr_in6* ipv6_addr =
215 static_cast<struct sockaddr_in6*>(malloc(sizeof(struct sockaddr_in6)));
honghaizdb8cf502015-12-21 13:08:46 -0800216 memset(ipv6_addr, 0, sizeof(struct sockaddr_in6));
217 ipv6_addr->sin6_family = AF_INET6;
218 ipv6_addr->sin6_scope_id = scope_id;
219 IPAddress ip;
220 IPFromString(ip_string, &ip);
221 ipv6_addr->sin6_addr = ip.ipv6_address();
222 return ipv6_addr;
223 }
224
225 // Pointers created here need to be released via ReleaseIfAddrs.
226 struct ifaddrs* AddIpv6Address(struct ifaddrs* list,
227 char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100228 absl::string_view ipv6_address,
229 absl::string_view ipv6_netmask,
honghaizdb8cf502015-12-21 13:08:46 -0800230 uint32_t scope_id) {
231 struct ifaddrs* if_addr = new struct ifaddrs;
232 memset(if_addr, 0, sizeof(struct ifaddrs));
233 if_addr->ifa_name = if_name;
234 if_addr->ifa_addr = reinterpret_cast<struct sockaddr*>(
235 CreateIpv6Addr(ipv6_address, scope_id));
236 if_addr->ifa_netmask =
237 reinterpret_cast<struct sockaddr*>(CreateIpv6Addr(ipv6_netmask, 0));
238 if_addr->ifa_next = list;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800239 if_addr->ifa_flags = IFF_RUNNING;
honghaizdb8cf502015-12-21 13:08:46 -0800240 return if_addr;
241 }
242
Honghai Zhang351d77b2016-05-20 15:08:29 -0700243 struct ifaddrs* InstallIpv6Network(char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100244 absl::string_view ipv6_address,
245 absl::string_view ipv6_mask,
Honghai Zhang351d77b2016-05-20 15:08:29 -0700246 BasicNetworkManager& network_manager) {
247 ifaddrs* addr_list = nullptr;
248 addr_list = AddIpv6Address(addr_list, if_name, ipv6_address, ipv6_mask, 0);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200249 std::vector<std::unique_ptr<Network>> result;
Honghai Zhang351d77b2016-05-20 15:08:29 -0700250 bool changed;
251 NetworkManager::Stats stats;
252 CallConvertIfAddrs(network_manager, addr_list, true, &result);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200253 network_manager.MergeNetworkList(std::move(result), &changed, &stats);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700254 return addr_list;
255 }
256
Ali Tofigh7fa90572022-03-17 15:47:49 +0100257 struct sockaddr_in* CreateIpv4Addr(absl::string_view ip_string) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800258 struct sockaddr_in* ipv4_addr =
259 static_cast<struct sockaddr_in*>(malloc(sizeof(struct sockaddr_in)));
260 memset(ipv4_addr, 0, sizeof(struct sockaddr_in));
261 ipv4_addr->sin_family = AF_INET;
262 IPAddress ip;
263 IPFromString(ip_string, &ip);
264 ipv4_addr->sin_addr = ip.ipv4_address();
265 return ipv4_addr;
266 }
267
268 // Pointers created here need to be released via ReleaseIfAddrs.
269 struct ifaddrs* AddIpv4Address(struct ifaddrs* list,
270 char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100271 absl::string_view ipv4_address,
272 absl::string_view ipv4_netmask) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800273 struct ifaddrs* if_addr = new struct ifaddrs;
274 memset(if_addr, 0, sizeof(struct ifaddrs));
275 if_addr->ifa_name = if_name;
276 if_addr->ifa_addr =
277 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_address));
278 if_addr->ifa_netmask =
279 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_netmask));
280 if_addr->ifa_next = list;
281 if_addr->ifa_flags = IFF_RUNNING;
282 return if_addr;
283 }
284
285 struct ifaddrs* InstallIpv4Network(char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100286 absl::string_view ipv4_address,
287 absl::string_view ipv4_mask,
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800288 BasicNetworkManager& network_manager) {
289 ifaddrs* addr_list = nullptr;
290 addr_list = AddIpv4Address(addr_list, if_name, ipv4_address, ipv4_mask);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200291 std::vector<std::unique_ptr<Network>> result;
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800292 bool changed;
293 NetworkManager::Stats stats;
294 CallConvertIfAddrs(network_manager, addr_list, true, &result);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200295 network_manager.MergeNetworkList(std::move(result), &changed, &stats);
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800296 return addr_list;
297 }
298
honghaizdb8cf502015-12-21 13:08:46 -0800299 void ReleaseIfAddrs(struct ifaddrs* list) {
300 struct ifaddrs* if_addr = list;
301 while (if_addr != nullptr) {
302 struct ifaddrs* next_addr = if_addr->ifa_next;
oprypin1ea631f2017-08-18 00:15:19 -0700303 free(if_addr->ifa_addr);
304 free(if_addr->ifa_netmask);
honghaizdb8cf502015-12-21 13:08:46 -0800305 delete if_addr;
306 if_addr = next_addr;
307 }
308 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000309#endif // defined(WEBRTC_POSIX)
310
311 protected:
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200312 webrtc::test::ScopedKeyValueConfig field_trials_;
Niels Möller83830f32022-05-20 09:12:57 +0200313 rtc::AutoThread main_thread_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000314 bool callback_called_;
315};
316
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800317class TestBasicNetworkManager : public BasicNetworkManager {
318 public:
Niels Mölleraa373162021-09-28 16:09:07 +0200319 TestBasicNetworkManager(NetworkMonitorFactory* network_monitor_factory,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200320 SocketFactory* socket_factory,
Jonas Orelande62c2f22022-03-29 11:04:48 +0200321 const webrtc::FieldTrialsView& field_trials)
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200322 : BasicNetworkManager(network_monitor_factory,
323 socket_factory,
324 &field_trials) {}
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800325 using BasicNetworkManager::QueryDefaultLocalAddress;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800326 using BasicNetworkManager::set_default_local_addresses;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800327};
328
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000329// Test that the Network ctor works properly.
330TEST_F(NetworkTest, TestNetworkConstruct) {
331 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
332 IPAddress(0x12345600U), 24);
333 EXPECT_EQ("test_eth0", ipv4_network1.name());
334 EXPECT_EQ("Test Network Adapter 1", ipv4_network1.description());
335 EXPECT_EQ(IPAddress(0x12345600U), ipv4_network1.prefix());
336 EXPECT_EQ(24, ipv4_network1.prefix_length());
Sameer Vijaykara75eb432022-08-11 13:47:20 +0200337 EXPECT_EQ(AF_INET, ipv4_network1.family());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000338 EXPECT_FALSE(ipv4_network1.ignored());
339}
340
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000341TEST_F(NetworkTest, TestIsIgnoredNetworkIgnoresIPsStartingWith0) {
342 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
Diep Bui1e589eb2022-08-02 07:37:30 +0000343 IPAddress(0x12345600U), 24, ADAPTER_TYPE_ETHERNET,
344 &field_trials_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000345 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
Diep Bui1e589eb2022-08-02 07:37:30 +0000346 IPAddress(0x010000U), 24, ADAPTER_TYPE_ETHERNET,
347 &field_trials_);
Niels Möller539f3e12021-11-26 16:33:19 +0100348 PhysicalSocketServer socket_server;
349 BasicNetworkManager network_manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700350 network_manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000351 EXPECT_FALSE(IsIgnoredNetwork(network_manager, ipv4_network1));
352 EXPECT_TRUE(IsIgnoredNetwork(network_manager, ipv4_network2));
353}
354
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000355// TODO(phoglund): Remove when ignore list goes away.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000356TEST_F(NetworkTest, TestIgnoreList) {
Yves Gerey665174f2018-06-19 15:03:05 +0200357 Network ignore_me("ignore_me", "Ignore me please!", IPAddress(0x12345600U),
358 24);
359 Network include_me("include_me", "Include me please!", IPAddress(0x12345600U),
360 24);
Niels Möller539f3e12021-11-26 16:33:19 +0100361 PhysicalSocketServer socket_server;
362 BasicNetworkManager default_network_manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700363 default_network_manager.StartUpdating();
364 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, ignore_me));
365 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, include_me));
366
Niels Möller539f3e12021-11-26 16:33:19 +0100367 BasicNetworkManager ignoring_network_manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000368 std::vector<std::string> ignore_list;
369 ignore_list.push_back("ignore_me");
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700370 ignoring_network_manager.set_network_ignore_list(ignore_list);
371 ignoring_network_manager.StartUpdating();
372 EXPECT_TRUE(IsIgnoredNetwork(ignoring_network_manager, ignore_me));
373 EXPECT_FALSE(IsIgnoredNetwork(ignoring_network_manager, include_me));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000374}
375
376// Test is failing on Windows opt: b/11288214
377TEST_F(NetworkTest, DISABLED_TestCreateNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +0100378 PhysicalSocketServer socket_server;
379 BasicNetworkManager manager(&socket_server);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200380 std::vector<std::unique_ptr<Network>> result = GetNetworks(manager, true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000381 // We should be able to bind to any addresses we find.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200382 for (auto it = result.begin(); it != result.end(); ++it) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000383 sockaddr_storage storage;
384 memset(&storage, 0, sizeof(storage));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000385 IPAddress ip = (*it)->GetBestIP();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000386 SocketAddress bindaddress(ip, 0);
387 bindaddress.SetScopeID((*it)->scope_id());
Niels Möllerd0b88792021-08-12 10:32:30 +0200388 // TODO(thaloun): Use rtc::Socket once it supports IPv6.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000389 int fd = static_cast<int>(socket(ip.family(), SOCK_STREAM, IPPROTO_TCP));
390 if (fd > 0) {
391 size_t ipsize = bindaddress.ToSockAddrStorage(&storage);
392 EXPECT_GE(ipsize, 0U);
Yves Gerey665174f2018-06-19 15:03:05 +0200393 int success = ::bind(fd, reinterpret_cast<sockaddr*>(&storage),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000394 static_cast<int>(ipsize));
395#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +0100396 if (success)
397 RTC_LOG_GLE(LS_ERROR) << "Socket bind failed.";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000398#endif
399 EXPECT_EQ(0, success);
400#if defined(WEBRTC_WIN)
401 closesocket(fd);
402#else
403 close(fd);
404#endif
405 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000406 }
407}
408
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700409// Test StartUpdating() and StopUpdating(). network_permission_state starts with
410// ALLOWED.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000411TEST_F(NetworkTest, TestUpdateNetworks) {
Niels Mölleraa373162021-09-28 16:09:07 +0200412 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200413 BasicNetworkManager manager(nullptr, &socket_server, &field_trials_);
Yves Gerey665174f2018-06-19 15:03:05 +0200414 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
415 &NetworkTest::OnNetworksChanged);
guoweisea1012b2015-08-21 09:06:28 -0700416 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
417 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000418 manager.StartUpdating();
419 Thread::Current()->ProcessMessages(0);
420 EXPECT_TRUE(callback_called_);
421 callback_called_ = false;
422 // Callback should be triggered immediately when StartUpdating
423 // is called, after network update signal is already sent.
424 manager.StartUpdating();
425 EXPECT_TRUE(manager.started());
426 Thread::Current()->ProcessMessages(0);
427 EXPECT_TRUE(callback_called_);
428 manager.StopUpdating();
429 EXPECT_TRUE(manager.started());
430 manager.StopUpdating();
guoweisea1012b2015-08-21 09:06:28 -0700431 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
432 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000433 EXPECT_FALSE(manager.started());
434 manager.StopUpdating();
435 EXPECT_FALSE(manager.started());
436 callback_called_ = false;
437 // Callback should be triggered immediately after StartUpdating is called
438 // when start_count_ is reset to 0.
439 manager.StartUpdating();
440 Thread::Current()->ProcessMessages(0);
441 EXPECT_TRUE(callback_called_);
442}
443
444// Verify that MergeNetworkList() merges network lists properly.
445TEST_F(NetworkTest, TestBasicMergeNetworkList) {
446 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
447 IPAddress(0x12345600U), 24);
448 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
449 IPAddress(0x00010000U), 16);
450 ipv4_network1.AddIP(IPAddress(0x12345678));
451 ipv4_network2.AddIP(IPAddress(0x00010004));
Niels Möller539f3e12021-11-26 16:33:19 +0100452 PhysicalSocketServer socket_server;
453 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000454
455 // Add ipv4_network1 to the list of networks.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200456 std::vector<std::unique_ptr<Network>> list;
457 list.push_back(std::make_unique<Network>(ipv4_network1));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000458 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200459 NetworkManager::Stats stats =
460 MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000461 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000462 EXPECT_EQ(stats.ipv6_network_count, 0);
463 EXPECT_EQ(stats.ipv4_network_count, 1);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200464 list.clear(); // It is fine to call .clear() on a moved-from vector.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000465
Niels Möller22211442022-04-07 11:43:28 +0200466 std::vector<const rtc::Network*> current = manager.GetNetworks();
467 EXPECT_EQ(1U, current.size());
468 EXPECT_TRUE(SameNameAndPrefix(ipv4_network1, *current[0]));
469 const Network* net1 = current[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700470 uint16_t net_id1 = net1->id();
471 EXPECT_EQ(1, net_id1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000472
473 // Replace ipv4_network1 with ipv4_network2.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200474 list.push_back(std::make_unique<Network>(ipv4_network2));
475 stats = MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000476 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000477 EXPECT_EQ(stats.ipv6_network_count, 0);
478 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000479 list.clear();
480
Niels Möller22211442022-04-07 11:43:28 +0200481 current = manager.GetNetworks();
482 EXPECT_EQ(1U, current.size());
483 EXPECT_TRUE(SameNameAndPrefix(ipv4_network2, *current[0]));
484 const Network* net2 = current[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700485 uint16_t net_id2 = net2->id();
486 // Network id will increase.
487 EXPECT_LT(net_id1, net_id2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000488
489 // Add Network2 back.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200490 list.push_back(std::make_unique<Network>(ipv4_network1));
491 list.push_back(std::make_unique<Network>(ipv4_network2));
492 stats = MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000493 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000494 EXPECT_EQ(stats.ipv6_network_count, 0);
495 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000496 list.clear();
497
498 // Verify that we get previous instances of Network objects.
Niels Möller22211442022-04-07 11:43:28 +0200499 current = manager.GetNetworks();
500 EXPECT_EQ(2U, current.size());
501 EXPECT_TRUE((net1 == current[0] && net2 == current[1]) ||
502 (net1 == current[1] && net2 == current[0]));
503 EXPECT_TRUE((net_id1 == current[0]->id() && net_id2 == current[1]->id()) ||
504 (net_id1 == current[1]->id() && net_id2 == current[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000505
506 // Call MergeNetworkList() again and verify that we don't get update
507 // notification.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200508 list.push_back(std::make_unique<Network>(ipv4_network2));
509 list.push_back(std::make_unique<Network>(ipv4_network1));
510 stats = MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000511 EXPECT_FALSE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000512 EXPECT_EQ(stats.ipv6_network_count, 0);
513 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000514 list.clear();
515
516 // Verify that we get previous instances of Network objects.
Niels Möller22211442022-04-07 11:43:28 +0200517 current = manager.GetNetworks();
518 EXPECT_EQ(2U, current.size());
519 EXPECT_TRUE((net1 == current[0] && net2 == current[1]) ||
520 (net1 == current[1] && net2 == current[0]));
521 EXPECT_TRUE((net_id1 == current[0]->id() && net_id2 == current[1]->id()) ||
522 (net_id1 == current[1]->id() && net_id2 == current[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000523}
524
525// Sets up some test IPv6 networks and appends them to list.
526// Four networks are added - public and link local, for two interfaces.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200527void SetupNetworks(std::vector<std::unique_ptr<Network>>* list) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000528 IPAddress ip;
529 IPAddress prefix;
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000530 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:ef12", &ip));
531 EXPECT_TRUE(IPFromString("abcd::", &prefix));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000532 // First, fake link-locals.
533 Network ipv6_eth0_linklocalnetwork("test_eth0", "Test NetworkAdapter 1",
534 prefix, 64);
535 ipv6_eth0_linklocalnetwork.AddIP(ip);
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000536 EXPECT_TRUE(IPFromString("abcd::5678:abcd:ef12:3456", &ip));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000537 Network ipv6_eth1_linklocalnetwork("test_eth1", "Test NetworkAdapter 2",
538 prefix, 64);
539 ipv6_eth1_linklocalnetwork.AddIP(ip);
540 // Public networks:
541 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip));
542 prefix = TruncateIP(ip, 64);
543 Network ipv6_eth0_publicnetwork1_ip1("test_eth0", "Test NetworkAdapter 1",
544 prefix, 64);
545 ipv6_eth0_publicnetwork1_ip1.AddIP(ip);
546 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
547 prefix = TruncateIP(ip, 64);
548 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 1",
549 prefix, 64);
550 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200551 list->push_back(std::make_unique<Network>(ipv6_eth0_linklocalnetwork));
552 list->push_back(std::make_unique<Network>(ipv6_eth1_linklocalnetwork));
553 list->push_back(std::make_unique<Network>(ipv6_eth0_publicnetwork1_ip1));
554 list->push_back(std::make_unique<Network>(ipv6_eth1_publicnetwork1_ip1));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000555}
556
557// Test that the basic network merging case works.
558TEST_F(NetworkTest, TestIPv6MergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +0100559 PhysicalSocketServer socket_server;
560 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200561 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
562 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200563 std::vector<std::unique_ptr<Network>> networks;
564 SetupNetworks(&networks);
565 std::vector<const Network*> original_list = CopyNetworkPointers(networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000566 bool changed = false;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000567 NetworkManager::Stats stats =
Niels Möllerd959f3a2022-04-19 11:29:19 +0200568 MergeNetworkList(manager, std::move(networks), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000569 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000570 EXPECT_EQ(stats.ipv6_network_count, 4);
571 EXPECT_EQ(stats.ipv4_network_count, 0);
Niels Möller22211442022-04-07 11:43:28 +0200572 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000573 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700574 EXPECT_THAT(list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000575}
576
577// Tests that when two network lists that describe the same set of networks are
578// merged, that the changed callback is not called, and that the original
579// objects remain in the result list.
580TEST_F(NetworkTest, TestNoChangeMerge) {
Niels Möller539f3e12021-11-26 16:33:19 +0100581 PhysicalSocketServer socket_server;
582 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200583 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
584 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200585 std::vector<std::unique_ptr<Network>> networks;
586 SetupNetworks(&networks);
587 std::vector<const Network*> original_list = CopyNetworkPointers(networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000588 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200589 MergeNetworkList(manager, std::move(networks), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000590 EXPECT_TRUE(changed);
591 // Second list that describes the same networks but with new objects.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200592 std::vector<std::unique_ptr<Network>> second_networks;
593 SetupNetworks(&second_networks);
594 std::vector<const Network*> second_list =
595 CopyNetworkPointers(second_networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000596 changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200597 MergeNetworkList(manager, std::move(second_networks), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000598 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +0200599 std::vector<const Network*> resulting_list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000600 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700601 EXPECT_THAT(resulting_list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000602 // Doublecheck that the new networks aren't in the list.
Steve Anton2acd1632019-03-25 13:48:30 -0700603 for (const Network* network : second_list) {
604 EXPECT_THAT(resulting_list, Not(Contains(network)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000605 }
606}
607
608// Test that we can merge a network that is the same as another network but with
609// a different IP. The original network should remain in the list, but have its
610// IP changed.
611TEST_F(NetworkTest, MergeWithChangedIP) {
Niels Möller539f3e12021-11-26 16:33:19 +0100612 PhysicalSocketServer socket_server;
613 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200614 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
615 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200616 std::vector<std::unique_ptr<Network>> original_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000617 SetupNetworks(&original_list);
618 // Make a network that we're going to change.
619 IPAddress ip;
620 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip));
621 IPAddress prefix = TruncateIP(ip, 64);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200622 std::unique_ptr<Network> network_to_change = std::make_unique<Network>(
623 "test_eth0", "Test Network Adapter 1", prefix, 64);
624 std::unique_ptr<Network> changed_network =
625 std::make_unique<Network>(*network_to_change);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000626 network_to_change->AddIP(ip);
627 IPAddress changed_ip;
628 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip));
629 changed_network->AddIP(changed_ip);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200630 const Network* const network_to_change_ptr = network_to_change.get();
631 original_list.push_back(std::move(network_to_change));
632 const size_t original_size = original_list.size();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000633 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200634 MergeNetworkList(manager, std::move(original_list), &changed);
635 std::vector<std::unique_ptr<Network>> second_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000636 SetupNetworks(&second_list);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200637 second_list.push_back(std::move(changed_network));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000638 changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200639 MergeNetworkList(manager, std::move(second_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000640 EXPECT_TRUE(changed);
Niels Möller22211442022-04-07 11:43:28 +0200641 std::vector<const Network*> list = manager.GetNetworks();
Niels Möllerd959f3a2022-04-19 11:29:19 +0200642 EXPECT_EQ(original_size, list.size());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000643 // Make sure the original network is still in the merged list.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200644 EXPECT_THAT(list, Contains(network_to_change_ptr));
645 EXPECT_EQ(changed_ip, network_to_change_ptr->GetIPs().at(0));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000646}
647
Niels Möllerd959f3a2022-04-19 11:29:19 +0200648TEST_F(NetworkTest, TestMultipleIPMergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +0100649 PhysicalSocketServer socket_server;
650 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200651 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
652 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200653 std::vector<std::unique_ptr<Network>> original_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000654 SetupNetworks(&original_list);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200655 const Network* const network_ptr = original_list[2].get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000656 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200657 MergeNetworkList(manager, std::move(original_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000658 EXPECT_TRUE(changed);
659 IPAddress ip;
660 IPAddress check_ip;
661 IPAddress prefix;
662 // Add a second IP to the public network on eth0 (2401:fa00:4:1000/64).
663 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip));
664 prefix = TruncateIP(ip, 64);
665 Network ipv6_eth0_publicnetwork1_ip2("test_eth0", "Test NetworkAdapter 1",
666 prefix, 64);
667 // This is the IP that already existed in the public network on eth0.
668 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip));
669 ipv6_eth0_publicnetwork1_ip2.AddIP(ip);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200670
671 std::vector<std::unique_ptr<Network>> second_list;
672 SetupNetworks(&second_list);
673 second_list.push_back(
674 std::make_unique<Network>(ipv6_eth0_publicnetwork1_ip2));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000675 changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200676 const auto network_copy = std::make_unique<Network>(*second_list[2]);
677 MergeNetworkList(manager, std::move(second_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000678 EXPECT_TRUE(changed);
679 // There should still be four networks.
Niels Möller22211442022-04-07 11:43:28 +0200680 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000681 EXPECT_EQ(4U, list.size());
682 // Check the gathered IPs.
683 int matchcount = 0;
Niels Möller22211442022-04-07 11:43:28 +0200684 for (const Network* network : list) {
Niels Möllerd959f3a2022-04-19 11:29:19 +0200685 if (SameNameAndPrefix(*network, *network_copy)) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000686 ++matchcount;
687 EXPECT_EQ(1, matchcount);
688 // This should be the same network object as before.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200689 EXPECT_EQ(network, network_ptr);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000690 // But with two addresses now.
Niels Möller22211442022-04-07 11:43:28 +0200691 EXPECT_THAT(network->GetIPs(),
Steve Anton2acd1632019-03-25 13:48:30 -0700692 UnorderedElementsAre(InterfaceAddress(check_ip),
693 InterfaceAddress(ip)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000694 } else {
695 // Check the IP didn't get added anywhere it wasn't supposed to.
Niels Möller22211442022-04-07 11:43:28 +0200696 EXPECT_THAT(network->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000697 }
698 }
699}
700
701// Test that merge correctly distinguishes multiple networks on an interface.
702TEST_F(NetworkTest, TestMultiplePublicNetworksOnOneInterfaceMerge) {
Niels Möller539f3e12021-11-26 16:33:19 +0100703 PhysicalSocketServer socket_server;
704 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200705 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
706 &NetworkTest::OnNetworksChanged);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200707 std::vector<std::unique_ptr<Network>> original_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000708 SetupNetworks(&original_list);
709 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200710 MergeNetworkList(manager, std::move(original_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000711 EXPECT_TRUE(changed);
712 IPAddress ip;
713 IPAddress prefix;
714 // A second network for eth0.
715 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip));
716 prefix = TruncateIP(ip, 64);
717 Network ipv6_eth0_publicnetwork2_ip1("test_eth0", "Test NetworkAdapter 1",
718 prefix, 64);
719 ipv6_eth0_publicnetwork2_ip1.AddIP(ip);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200720 std::vector<std::unique_ptr<Network>> second_list;
721 SetupNetworks(&second_list);
722 second_list.push_back(
723 std::make_unique<Network>(ipv6_eth0_publicnetwork2_ip1));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000724 changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200725 MergeNetworkList(manager, std::move(second_list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000726 EXPECT_TRUE(changed);
727 // There should be five networks now.
Niels Möller22211442022-04-07 11:43:28 +0200728 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000729 EXPECT_EQ(5U, list.size());
730 // Check the resulting addresses.
Niels Möller22211442022-04-07 11:43:28 +0200731 for (const Network* network : list) {
732 if (network->prefix() == ipv6_eth0_publicnetwork2_ip1.prefix() &&
733 network->name() == ipv6_eth0_publicnetwork2_ip1.name()) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000734 // Check the new network has 1 IP and that it's the correct one.
Niels Möller22211442022-04-07 11:43:28 +0200735 EXPECT_EQ(1U, network->GetIPs().size());
736 EXPECT_EQ(ip, network->GetIPs().at(0));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000737 } else {
738 // Check the IP didn't get added anywhere it wasn't supposed to.
Niels Möller22211442022-04-07 11:43:28 +0200739 EXPECT_THAT(network->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000740 }
741 }
742}
743
honghaizdb8cf502015-12-21 13:08:46 -0800744// Test that DumpNetworks does not crash.
745TEST_F(NetworkTest, TestCreateAndDumpNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +0100746 PhysicalSocketServer socket_server;
747 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700748 manager.StartUpdating();
Niels Möllerd959f3a2022-04-19 11:29:19 +0200749 std::vector<std::unique_ptr<Network>> list = GetNetworks(manager, true);
honghaizdb8cf502015-12-21 13:08:46 -0800750 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200751 MergeNetworkList(manager, std::move(list), &changed);
honghaizdb8cf502015-12-21 13:08:46 -0800752 manager.DumpNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000753}
754
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100755TEST_F(NetworkTest, TestIPv6Toggle) {
Niels Möller539f3e12021-11-26 16:33:19 +0100756 PhysicalSocketServer socket_server;
757 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700758 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000759 bool ipv6_found = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200760 for (const auto& network : GetNetworks(manager, true)) {
761 if (network->prefix().family() == AF_INET6) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000762 ipv6_found = true;
763 break;
764 }
765 }
766 EXPECT_TRUE(ipv6_found);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000767}
768
deadbeef3427f532017-07-26 16:09:33 -0700769// Test that when network interfaces are sorted and given preference values,
770// IPv6 comes first.
771TEST_F(NetworkTest, IPv6NetworksPreferredOverIPv4) {
Niels Möller539f3e12021-11-26 16:33:19 +0100772 PhysicalSocketServer socket_server;
773 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000774 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
775 IPAddress(0x12345600U), 24);
776 ipv4_network1.AddIP(IPAddress(0x12345600U));
777
778 IPAddress ip;
779 IPAddress prefix;
780 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
781 prefix = TruncateIP(ip, 64);
782 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 2",
783 prefix, 64);
784 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
785
Niels Möllerd959f3a2022-04-19 11:29:19 +0200786 std::vector<std::unique_ptr<Network>> list;
787 list.push_back(std::make_unique<Network>(ipv4_network1));
788 list.push_back(std::make_unique<Network>(ipv6_eth1_publicnetwork1_ip1));
789 const Network* net1 = list[0].get();
790 const Network* net2 = list[1].get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000791
792 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200793 MergeNetworkList(manager, std::move(list), &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000794 ASSERT_TRUE(changed);
795 // After sorting IPv6 network should be higher order than IPv4 networks.
796 EXPECT_TRUE(net1->preference() < net2->preference());
797}
798
deadbeef3427f532017-07-26 16:09:33 -0700799// When two interfaces are equivalent in everything but name, they're expected
800// to be preference-ordered by name. For example, "eth0" before "eth1".
801TEST_F(NetworkTest, NetworksSortedByInterfaceName) {
Niels Möller539f3e12021-11-26 16:33:19 +0100802 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200803 BasicNetworkManager manager(&socket_server, &field_trials_);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200804 auto eth0 = std::make_unique<Network>("test_eth0", "Test Network Adapter 1",
805 IPAddress(0x65432100U), 24);
deadbeef3427f532017-07-26 16:09:33 -0700806 eth0->AddIP(IPAddress(0x65432100U));
Niels Möllerd959f3a2022-04-19 11:29:19 +0200807 auto eth1 = std::make_unique<Network>("test_eth1", "Test Network Adapter 2",
808 IPAddress(0x12345600U), 24);
deadbeef3427f532017-07-26 16:09:33 -0700809 eth1->AddIP(IPAddress(0x12345600U));
Niels Möllerd959f3a2022-04-19 11:29:19 +0200810 std::vector<std::unique_ptr<Network>> list;
811 const Network* eth0_ptr = eth0.get();
812 const Network* eth1_ptr = eth1.get();
deadbeef3427f532017-07-26 16:09:33 -0700813 // Add them to the list in the opposite of the expected sorted order, to
814 // ensure sorting actually occurs.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200815 list.push_back(std::move(eth1));
816 list.push_back(std::move(eth0));
deadbeef3427f532017-07-26 16:09:33 -0700817
818 bool changed = false;
Niels Möllerd959f3a2022-04-19 11:29:19 +0200819 MergeNetworkList(manager, std::move(list), &changed);
deadbeef3427f532017-07-26 16:09:33 -0700820 ASSERT_TRUE(changed);
821 // "test_eth0" should be preferred over "test_eth1".
Niels Möllerd959f3a2022-04-19 11:29:19 +0200822 EXPECT_TRUE(eth0_ptr->preference() > eth1_ptr->preference());
deadbeef3427f532017-07-26 16:09:33 -0700823}
824
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000825TEST_F(NetworkTest, TestNetworkAdapterTypes) {
826 Network wifi("wlan0", "Wireless Adapter", IPAddress(0x12345600U), 24,
Diep Bui1e589eb2022-08-02 07:37:30 +0000827 ADAPTER_TYPE_WIFI, &field_trials_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000828 EXPECT_EQ(ADAPTER_TYPE_WIFI, wifi.type());
829 Network ethernet("eth0", "Ethernet", IPAddress(0x12345600U), 24,
Diep Bui1e589eb2022-08-02 07:37:30 +0000830 ADAPTER_TYPE_ETHERNET, &field_trials_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000831 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, ethernet.type());
832 Network cellular("test_cell", "Cellular Adapter", IPAddress(0x12345600U), 24,
Diep Bui1e589eb2022-08-02 07:37:30 +0000833 ADAPTER_TYPE_CELLULAR, &field_trials_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000834 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, cellular.type());
835 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24,
Diep Bui1e589eb2022-08-02 07:37:30 +0000836 ADAPTER_TYPE_VPN, &field_trials_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000837 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
838 Network unknown("test", "Test Adapter", IPAddress(0x12345600U), 24,
Diep Bui1e589eb2022-08-02 07:37:30 +0000839 ADAPTER_TYPE_UNKNOWN, &field_trials_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000840 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, unknown.type());
841}
842
843#if defined(WEBRTC_POSIX)
844// Verify that we correctly handle interfaces with no address.
845TEST_F(NetworkTest, TestConvertIfAddrsNoAddress) {
846 ifaddrs list;
847 memset(&list, 0, sizeof(list));
848 list.ifa_name = const_cast<char*>("test_iface");
849
Niels Möllerd959f3a2022-04-19 11:29:19 +0200850 std::vector<std::unique_ptr<Network>> result;
Niels Möller539f3e12021-11-26 16:33:19 +0100851 PhysicalSocketServer socket_server;
852 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700853 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000854 CallConvertIfAddrs(manager, &list, true, &result);
855 EXPECT_TRUE(result.empty());
856}
honghaizdb8cf502015-12-21 13:08:46 -0800857
858// Verify that if there are two addresses on one interface, only one network
859// is generated.
860TEST_F(NetworkTest, TestConvertIfAddrsMultiAddressesOnOneInterface) {
861 char if_name[20] = "rmnet0";
862 ifaddrs* list = nullptr;
863 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:1",
864 "FFFF:FFFF:FFFF:FFFF::", 0);
865 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:2",
866 "FFFF:FFFF:FFFF:FFFF::", 0);
Niels Möllerd959f3a2022-04-19 11:29:19 +0200867 std::vector<std::unique_ptr<Network>> result;
Niels Möller539f3e12021-11-26 16:33:19 +0100868 PhysicalSocketServer socket_server;
869 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700870 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800871 CallConvertIfAddrs(manager, list, true, &result);
872 EXPECT_EQ(1U, result.size());
873 bool changed;
874 // This ensures we release the objects created in CallConvertIfAddrs.
Niels Möllerd959f3a2022-04-19 11:29:19 +0200875 MergeNetworkList(manager, std::move(result), &changed);
honghaizdb8cf502015-12-21 13:08:46 -0800876 ReleaseIfAddrs(list);
877}
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800878
879TEST_F(NetworkTest, TestConvertIfAddrsNotRunning) {
880 ifaddrs list;
881 memset(&list, 0, sizeof(list));
882 list.ifa_name = const_cast<char*>("test_iface");
883 sockaddr ifa_addr;
884 sockaddr ifa_netmask;
885 list.ifa_addr = &ifa_addr;
886 list.ifa_netmask = &ifa_netmask;
887
Niels Möllerd959f3a2022-04-19 11:29:19 +0200888 std::vector<std::unique_ptr<Network>> result;
Niels Möller539f3e12021-11-26 16:33:19 +0100889 PhysicalSocketServer socket_server;
890 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700891 manager.StartUpdating();
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800892 CallConvertIfAddrs(manager, &list, true, &result);
893 EXPECT_TRUE(result.empty());
894}
Honghai Zhang351d77b2016-05-20 15:08:29 -0700895
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700896// Tests that the network type can be determined from the network monitor when
897// it would otherwise be unknown.
Honghai Zhang351d77b2016-05-20 15:08:29 -0700898TEST_F(NetworkTest, TestGetAdapterTypeFromNetworkMonitor) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700899 char if_name[20] = "wifi0";
900 std::string ipv6_address = "1000:2000:3000:4000:0:0:0:1";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700901 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Niels Mölleraa373162021-09-28 16:09:07 +0200902 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200903 BasicNetworkManager manager_without_monitor(nullptr, &socket_server,
904 &field_trials_);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700905 manager_without_monitor.StartUpdating();
906 // A network created without a network monitor will get UNKNOWN type.
907 ifaddrs* addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
908 manager_without_monitor);
909 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, GetAdapterType(manager_without_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700910 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700911
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700912 // With the fake network monitor the type should be correctly determined.
913 FakeNetworkMonitorFactory factory;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200914 BasicNetworkManager manager_with_monitor(&factory, &socket_server,
915 &field_trials_);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700916 manager_with_monitor.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700917 // Add the same ipv6 address as before but it has the right network type
918 // detected by the network monitor now.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700919 addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
920 manager_with_monitor);
921 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700922 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700923}
924
925// Test that the network type can be determined based on name matching in
926// a few cases. Note that UNKNOWN type for non-matching strings has been tested
927// in the above test.
928TEST_F(NetworkTest, TestGetAdapterTypeFromNameMatching) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800929 std::string ipv4_address1 = "192.0.0.121";
930 std::string ipv4_mask = "255.255.255.0";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700931 std::string ipv6_address1 = "1000:2000:3000:4000:0:0:0:1";
932 std::string ipv6_address2 = "1000:2000:3000:8000:0:0:0:1";
933 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Niels Möller539f3e12021-11-26 16:33:19 +0100934 PhysicalSocketServer socket_server;
935 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700936 manager.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700937
deadbeef4cd599f2017-07-27 15:05:29 -0700938 // IPSec interface; name is in form "ipsec<index>".
939 char if_name[20] = "ipsec11";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700940 ifaddrs* addr_list =
941 InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
deadbeef4cd599f2017-07-27 15:05:29 -0700942 EXPECT_EQ(ADAPTER_TYPE_VPN, GetAdapterType(manager));
943 ClearNetworks(manager);
944 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700945
Qingsi Wange53ac042018-05-08 11:55:07 -0700946 strcpy(if_name, "lo0");
947 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
948 EXPECT_EQ(ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager));
949 ClearNetworks(manager);
950 ReleaseIfAddrs(addr_list);
951
952 strcpy(if_name, "eth0");
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800953 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
Qingsi Wange53ac042018-05-08 11:55:07 -0700954 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, GetAdapterType(manager));
955 ClearNetworks(manager);
956 ReleaseIfAddrs(addr_list);
957
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700958 strcpy(if_name, "wlan0");
959 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
960 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
961 ClearNetworks(manager);
962 ReleaseIfAddrs(addr_list);
963
deadbeef4cd599f2017-07-27 15:05:29 -0700964#if defined(WEBRTC_IOS)
965 strcpy(if_name, "pdp_ip0");
966 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700967 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
968 ClearNetworks(manager);
969 ReleaseIfAddrs(addr_list);
970
Honghai Zhang63ab8102016-05-26 20:30:15 -0700971 strcpy(if_name, "en0");
972 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
973 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
974 ClearNetworks(manager);
975 ReleaseIfAddrs(addr_list);
976
Honghai Zhang351d77b2016-05-20 15:08:29 -0700977#elif defined(WEBRTC_ANDROID)
deadbeef4cd599f2017-07-27 15:05:29 -0700978 strcpy(if_name, "rmnet0");
979 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700980 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
981 ClearNetworks(manager);
982 ReleaseIfAddrs(addr_list);
983
Honghai Zhang351d77b2016-05-20 15:08:29 -0700984 strcpy(if_name, "v4-rmnet_data0");
985 addr_list = InstallIpv6Network(if_name, ipv6_address2, ipv6_mask, manager);
986 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
987 ClearNetworks(manager);
988 ReleaseIfAddrs(addr_list);
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800989
990 strcpy(if_name, "clat4");
991 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
992 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
993 ClearNetworks(manager);
994 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700995#endif
996}
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700997
998// Test that an adapter won't be included in the network list if there's a
999// network monitor that says it's unavailable.
1000TEST_F(NetworkTest, TestNetworkMonitorIsAdapterAvailable) {
1001 char if_name1[20] = "pdp_ip0";
1002 char if_name2[20] = "pdp_ip1";
1003 ifaddrs* list = nullptr;
1004 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
1005 "FFFF:FFFF:FFFF:FFFF::", 0);
1006 list = AddIpv6Address(list, if_name2, "1000:2000:3000:4000:0:0:0:2",
1007 "FFFF:FFFF:FFFF:FFFF::", 0);
Niels Möllerd959f3a2022-04-19 11:29:19 +02001008 std::vector<std::unique_ptr<Network>> result;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001009
1010 // Sanity check that both interfaces are included by default.
1011 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001012 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001013 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001014 manager.StartUpdating();
1015 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1016 EXPECT_EQ(2u, result.size());
1017 bool changed;
1018 // This ensures we release the objects created in CallConvertIfAddrs.
Niels Möllerd959f3a2022-04-19 11:29:19 +02001019 MergeNetworkList(manager, std::move(result), &changed);
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001020 result.clear();
1021
1022 // Now simulate one interface being unavailable.
1023 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1024 network_monitor->set_unavailable_adapters({if_name1});
1025 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1026 EXPECT_EQ(1u, result.size());
1027 EXPECT_EQ(if_name2, result[0]->name());
1028
Niels Möllerd959f3a2022-04-19 11:29:19 +02001029 MergeNetworkList(manager, std::move(result), &changed);
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001030 ReleaseIfAddrs(list);
1031}
1032
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001033#endif // defined(WEBRTC_POSIX)
1034
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001035// Test MergeNetworkList successfully combines all IPs for the same
1036// prefix/length into a single Network.
1037TEST_F(NetworkTest, TestMergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +01001038 PhysicalSocketServer socket_server;
1039 BasicNetworkManager manager(&socket_server);
Niels Möllerd959f3a2022-04-19 11:29:19 +02001040 std::vector<std::unique_ptr<Network>> list;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001041
1042 // Create 2 IPAddress classes with only last digit different.
1043 IPAddress ip1, ip2;
1044 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1045 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2));
1046
1047 // Create 2 networks with the same prefix and length.
Niels Möllerd959f3a2022-04-19 11:29:19 +02001048 auto net1 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
1049 auto net2 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001050
1051 // Add different IP into each.
1052 net1->AddIP(ip1);
1053 net2->AddIP(ip2);
1054
Niels Möllerd959f3a2022-04-19 11:29:19 +02001055 list.push_back(std::move(net1));
1056 list.push_back(std::move(net2));
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001057 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001058 MergeNetworkList(manager, std::move(list), &changed);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001059 EXPECT_TRUE(changed);
1060
Niels Möller22211442022-04-07 11:43:28 +02001061 std::vector<const Network*> list2 = manager.GetNetworks();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001062
1063 // Make sure the resulted networklist has only 1 element and 2
1064 // IPAddresses.
1065 EXPECT_EQ(list2.size(), 1uL);
1066 EXPECT_EQ(list2[0]->GetIPs().size(), 2uL);
Mirko Bonadeib2a57852022-03-18 12:19:56 +01001067 EXPECT_THAT(list2[0]->GetIPs(), UnorderedElementsAre(InterfaceAddress(ip1),
1068 InterfaceAddress(ip2)));
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001069}
1070
honghaizdb8cf502015-12-21 13:08:46 -08001071// Test that MergeNetworkList successfully detects the change if
1072// a network becomes inactive and then active again.
1073TEST_F(NetworkTest, TestMergeNetworkListWithInactiveNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +01001074 PhysicalSocketServer socket_server;
1075 BasicNetworkManager manager(&socket_server);
honghaizdb8cf502015-12-21 13:08:46 -08001076 Network network1("test_wifi", "Test Network Adapter 1",
1077 IPAddress(0x12345600U), 24);
1078 Network network2("test_eth0", "Test Network Adapter 2",
1079 IPAddress(0x00010000U), 16);
1080 network1.AddIP(IPAddress(0x12345678));
1081 network2.AddIP(IPAddress(0x00010004));
Niels Möllerd959f3a2022-04-19 11:29:19 +02001082 std::vector<std::unique_ptr<Network>> list;
1083 auto net1 = std::make_unique<Network>(network1);
1084 const Network* const net1_ptr = net1.get();
1085 list.push_back(std::move(net1));
honghaizdb8cf502015-12-21 13:08:46 -08001086 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001087 MergeNetworkList(manager, std::move(list), &changed);
honghaizdb8cf502015-12-21 13:08:46 -08001088 EXPECT_TRUE(changed);
1089 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001090
1091 std::vector<const Network*> current = manager.GetNetworks();
1092 ASSERT_EQ(1U, current.size());
Niels Möllerd959f3a2022-04-19 11:29:19 +02001093 EXPECT_EQ(net1_ptr, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001094
1095 list.clear();
Niels Möllerd959f3a2022-04-19 11:29:19 +02001096 auto net2 = std::make_unique<Network>(network2);
1097 const Network* const net2_ptr = net2.get();
1098 list.push_back(std::move(net2));
1099 MergeNetworkList(manager, std::move(list), &changed);
honghaizdb8cf502015-12-21 13:08:46 -08001100 EXPECT_TRUE(changed);
1101 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001102
1103 current = manager.GetNetworks();
1104 ASSERT_EQ(1U, current.size());
Niels Möllerd959f3a2022-04-19 11:29:19 +02001105 EXPECT_EQ(net2_ptr, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001106 // Now network1 is inactive. Try to merge it again.
1107 list.clear();
Niels Möllerd959f3a2022-04-19 11:29:19 +02001108 list.push_back(std::make_unique<Network>(network1));
1109 MergeNetworkList(manager, std::move(list), &changed);
honghaizdb8cf502015-12-21 13:08:46 -08001110 EXPECT_TRUE(changed);
1111 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001112 current = manager.GetNetworks();
1113 ASSERT_EQ(1U, current.size());
1114 EXPECT_TRUE(current[0]->active());
Niels Möllerd959f3a2022-04-19 11:29:19 +02001115 EXPECT_EQ(net1_ptr, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001116}
1117
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001118// Test that the filtering logic follows the defined ruleset in network.h.
1119TEST_F(NetworkTest, TestIPv6Selection) {
1120 InterfaceAddress ip;
1121 std::string ipstr;
1122
1123 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
1124 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
1125
1126 // Create a network with this prefix.
Yves Gerey665174f2018-06-19 15:03:05 +02001127 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
1128 64);
Sameer Vijaykara75eb432022-08-11 13:47:20 +02001129 EXPECT_EQ(AF_INET6, ipv6_network.family());
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001130
1131 // When there is no address added, it should return an unspecified
1132 // address.
1133 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1134 EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
1135
1136 // Deprecated one should not be returned.
1137 ipv6_network.AddIP(ip);
1138 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1139
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001140 // Add ULA one. ULA is unique local address which is starting either
1141 // with 0xfc or 0xfd.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001142 ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
1143 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1144 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001145 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001146
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001147 // Add global one.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001148 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
1149 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1150 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001151 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001152
1153 // Add global dynamic temporary one.
1154 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
1155 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
1156 ipv6_network.AddIP(ip);
1157 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1158}
1159
Diep Bui1e589eb2022-08-02 07:37:30 +00001160// Test that the filtering logic follows the defined ruleset in network.h.
1161TEST_F(NetworkTest, TestGetBestIPWithPreferGlobalIPv6ToLinkLocalEnabled) {
1162 webrtc::test::ScopedKeyValueConfig field_trials(
1163 "WebRTC-PreferGlobalIPv6ToLinkLocal/Enabled/");
1164 InterfaceAddress ip, link_local;
1165 std::string ipstr;
1166
1167 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
1168 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
1169
1170 // Create a network with this prefix.
1171 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
1172 64, ADAPTER_TYPE_UNKNOWN, &field_trials);
1173
1174 // When there is no address added, it should return an unspecified
1175 // address.
1176 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1177 EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
1178
1179 // Deprecated one should not be returned.
1180 ipv6_network.AddIP(ip);
1181 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1182
1183 // Add ULA one. ULA is unique local address which is starting either
1184 // with 0xfc or 0xfd.
1185 ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
1186 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1187 ipv6_network.AddIP(ip);
1188 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1189
1190 // Add link local one.
1191 ipstr = "fe80::aabb:ccff:fedd:eeff";
1192 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local));
1193 ipv6_network.AddIP(link_local);
1194 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(link_local));
1195
1196 // Add global one.
1197 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
1198 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1199 ipv6_network.AddIP(ip);
1200 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1201
1202 // Add another link local address, then the compatible address is still global
1203 // one.
1204 ipstr = "fe80::aabb:ccff:fedd:eedd";
1205 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local));
1206 ipv6_network.AddIP(link_local);
1207 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1208
1209 // Add global dynamic temporary one.
1210 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
1211 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
1212 ipv6_network.AddIP(ip);
1213 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1214
1215 // Add another link local address, then the compatible address is still global
1216 // dynamic one.
1217 ipstr = "fe80::aabb:ccff:fedd:eedd";
1218 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local));
1219 ipv6_network.AddIP(link_local);
1220 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1221}
1222
honghaiz023f3ef2015-10-19 09:39:32 -07001223TEST_F(NetworkTest, TestNetworkMonitoring) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001224 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001225 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001226 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
honghaiz023f3ef2015-10-19 09:39:32 -07001227 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1228 &NetworkTest::OnNetworksChanged);
honghaiz023f3ef2015-10-19 09:39:32 -07001229 manager.StartUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001230 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1231 EXPECT_TRUE(network_monitor && network_monitor->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001232 EXPECT_TRUE_WAIT(callback_called_, 1000);
1233 callback_called_ = false;
1234
1235 // Clear the networks so that there will be network changes below.
1236 ClearNetworks(manager);
1237 // Network manager is started, so the callback is called when the network
1238 // monitor fires the network-change event.
Mirko Bonadei37077932021-07-27 17:00:58 +02001239 network_monitor->InovkeNetworksChangedCallbackForTesting();
honghaiz023f3ef2015-10-19 09:39:32 -07001240 EXPECT_TRUE_WAIT(callback_called_, 1000);
1241
honghaizcec0a082016-01-15 14:49:09 -08001242 // Network manager is stopped.
honghaiz023f3ef2015-10-19 09:39:32 -07001243 manager.StopUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001244 EXPECT_FALSE(GetNetworkMonitor(manager)->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001245}
1246
Edward Lemur8dc945c2016-07-21 10:16:40 +02001247// Fails on Android: https://bugs.chromium.org/p/webrtc/issues/detail?id=4364.
1248#if defined(WEBRTC_ANDROID)
1249#define MAYBE_DefaultLocalAddress DISABLED_DefaultLocalAddress
1250#else
1251#define MAYBE_DefaultLocalAddress DefaultLocalAddress
1252#endif
1253TEST_F(NetworkTest, MAYBE_DefaultLocalAddress) {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001254 IPAddress ip;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001255 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001256 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001257 TestBasicNetworkManager manager(&factory, &socket_server, field_trials_);
guoweis56271ed2016-01-15 14:45:06 -08001258 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1259 &NetworkTest::OnNetworksChanged);
guoweis56271ed2016-01-15 14:45:06 -08001260 manager.StartUpdating();
1261 EXPECT_TRUE_WAIT(callback_called_, 1000);
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001262
1263 // Make sure we can query default local address when an address for such
1264 // address family exists.
Niels Möller22211442022-04-07 11:43:28 +02001265 std::vector<const Network*> networks = manager.GetNetworks();
guoweis56271ed2016-01-15 14:45:06 -08001266 EXPECT_TRUE(!networks.empty());
Niels Möller22211442022-04-07 11:43:28 +02001267 for (const Network* network : networks) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001268 if (network->GetBestIP().family() == AF_INET) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001269 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET) != IPAddress());
guoweis56271ed2016-01-15 14:45:06 -08001270 } else if (network->GetBestIP().family() == AF_INET6 &&
1271 !IPIsLoopback(network->GetBestIP())) {
1272 // Existence of an IPv6 loopback address doesn't mean it has IPv6 network
1273 // enabled.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001274 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET6) != IPAddress());
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001275 }
1276 }
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001277
1278 // GetDefaultLocalAddress should return the valid default address after set.
1279 manager.set_default_local_addresses(GetLoopbackIP(AF_INET),
1280 GetLoopbackIP(AF_INET6));
1281 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET, &ip));
1282 EXPECT_EQ(ip, GetLoopbackIP(AF_INET));
1283 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1284 EXPECT_EQ(ip, GetLoopbackIP(AF_INET6));
honghaizaf83fe62016-04-18 14:50:44 -07001285
1286 // More tests on GetDefaultLocalAddress with ipv6 addresses where the set
1287 // default address may be different from the best IP address of any network.
1288 InterfaceAddress ip1;
1289 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:1111",
1290 IPV6_ADDRESS_FLAG_TEMPORARY, &ip1));
1291 // Create a network with a prefix of ip1.
1292 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip1, 64),
1293 64);
1294 IPAddress ip2;
1295 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:2222", &ip2));
1296 ipv6_network.AddIP(ip1);
1297 ipv6_network.AddIP(ip2);
Niels Möllerd959f3a2022-04-19 11:29:19 +02001298 std::vector<std::unique_ptr<Network>> list;
1299 list.push_back(std::make_unique<Network>(ipv6_network));
honghaizaf83fe62016-04-18 14:50:44 -07001300 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001301 MergeNetworkList(manager, std::move(list), &changed);
honghaizaf83fe62016-04-18 14:50:44 -07001302 // If the set default address is not in any network, GetDefaultLocalAddress
1303 // should return it.
1304 IPAddress ip3;
1305 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:3333", &ip3));
1306 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip3);
1307 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1308 EXPECT_EQ(ip3, ip);
1309 // If the set default address is in a network, GetDefaultLocalAddress will
1310 // return the best IP in that network.
1311 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip2);
1312 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1313 EXPECT_EQ(static_cast<IPAddress>(ip1), ip);
1314
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001315 manager.StopUpdating();
1316}
1317
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001318// Test that MergeNetworkList does not set change = true
1319// when changing from cellular_X to cellular_Y.
1320TEST_F(NetworkTest, TestWhenNetworkListChangeReturnsChangedFlag) {
Niels Möller539f3e12021-11-26 16:33:19 +01001321 PhysicalSocketServer socket_server;
1322 BasicNetworkManager manager(&socket_server);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001323
1324 IPAddress ip1;
1325 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
Niels Möllerd959f3a2022-04-19 11:29:19 +02001326 auto net1 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001327 net1->set_type(ADAPTER_TYPE_CELLULAR_3G);
1328 net1->AddIP(ip1);
Niels Möllerd959f3a2022-04-19 11:29:19 +02001329 std::vector<std::unique_ptr<Network>> list;
1330 list.push_back(std::move(net1));
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001331
1332 {
1333 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001334 MergeNetworkList(manager, std::move(list), &changed);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001335 EXPECT_TRUE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001336 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001337 EXPECT_EQ(list2.size(), 1uL);
1338 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_3G, list2[0]->type());
1339 }
1340
1341 // Modify net1 from 3G to 4G
1342 {
Niels Möllerd959f3a2022-04-19 11:29:19 +02001343 auto net2 =
1344 std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001345 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1346 net2->AddIP(ip1);
1347 list.clear();
Niels Möllerd959f3a2022-04-19 11:29:19 +02001348 list.push_back(std::move(net2));
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001349 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001350 MergeNetworkList(manager, std::move(list), &changed);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001351
1352 // Change from 3G to 4G shall not trigger OnNetworksChanged,
1353 // i.e changed = false.
1354 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001355 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001356 ASSERT_EQ(list2.size(), 1uL);
1357 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1358 }
1359
1360 // Don't modify.
1361 {
Niels Möllerd959f3a2022-04-19 11:29:19 +02001362 auto net2 =
1363 std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001364 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1365 net2->AddIP(ip1);
1366 list.clear();
Niels Möllerd959f3a2022-04-19 11:29:19 +02001367 list.push_back(std::move(net2));
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001368 bool changed;
Niels Möllerd959f3a2022-04-19 11:29:19 +02001369 MergeNetworkList(manager, std::move(list), &changed);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001370
1371 // No change.
1372 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001373 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001374 ASSERT_EQ(list2.size(), 1uL);
1375 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1376 }
1377}
1378
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001379#if defined(WEBRTC_POSIX)
1380TEST_F(NetworkTest, IgnoresMACBasedIPv6Address) {
1381 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1382 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
Niels Möller539f3e12021-11-26 16:33:19 +01001383 PhysicalSocketServer socket_server;
1384 BasicNetworkManager manager(&socket_server);
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001385 manager.StartUpdating();
1386
1387 // IPSec interface; name is in form "ipsec<index>".
1388 char if_name[20] = "ipsec11";
1389 ifaddrs* addr_list =
1390 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1391
Niels Möller22211442022-04-07 11:43:28 +02001392 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001393 EXPECT_EQ(list.size(), 0u);
1394 ReleaseIfAddrs(addr_list);
1395}
1396
1397TEST_F(NetworkTest, WebRTC_AllowMACBasedIPv6Address) {
1398 webrtc::test::ScopedFieldTrials field_trials(
1399 "WebRTC-AllowMACBasedIPv6/Enabled/");
1400 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1401 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
Niels Möller539f3e12021-11-26 16:33:19 +01001402 PhysicalSocketServer socket_server;
1403 BasicNetworkManager manager(&socket_server);
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001404 manager.StartUpdating();
1405
1406 // IPSec interface; name is in form "ipsec<index>".
1407 char if_name[20] = "ipsec11";
1408 ifaddrs* addr_list =
1409 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1410
Niels Möller22211442022-04-07 11:43:28 +02001411 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001412 EXPECT_EQ(list.size(), 1u);
1413 ReleaseIfAddrs(addr_list);
1414}
1415#endif
1416
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001417#if defined(WEBRTC_POSIX)
1418TEST_F(NetworkTest, WebRTC_BindUsingInterfaceName) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001419 char if_name1[20] = "wlan0";
1420 char if_name2[20] = "v4-wlan0";
1421 ifaddrs* list = nullptr;
1422 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
1423 "FFFF:FFFF:FFFF:FFFF::", 0);
1424 list = AddIpv4Address(list, if_name2, "192.168.0.2", "255.255.255.255");
Niels Möllerd959f3a2022-04-19 11:29:19 +02001425 std::vector<std::unique_ptr<Network>> result;
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001426
1427 // Sanity check that both interfaces are included by default.
1428 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001429 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001430 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001431 manager.StartUpdating();
1432 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1433 EXPECT_EQ(2u, result.size());
1434 ReleaseIfAddrs(list);
1435 bool changed;
1436 // This ensures we release the objects created in CallConvertIfAddrs.
Niels Möllerd959f3a2022-04-19 11:29:19 +02001437 MergeNetworkList(manager, std::move(result), &changed);
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001438 result.clear();
1439
1440 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1441
1442 IPAddress ipv6;
1443 EXPECT_TRUE(IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6));
1444 IPAddress ipv4;
1445 EXPECT_TRUE(IPFromString("192.168.0.2", &ipv4));
1446
1447 // The network monitor only knwos about the ipv6 address, interface.
1448 network_monitor->set_adapters({"wlan0"});
1449 network_monitor->set_ip_addresses({ipv6});
1450 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv6),
1451 NetworkBindingResult::SUCCESS);
1452
1453 // But it will bind anyway using string matching...
1454 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv4),
1455 NetworkBindingResult::SUCCESS);
1456}
1457#endif
1458
Jonas Orelandb477fc72021-08-23 12:16:33 +02001459TEST_F(NetworkTest, NetworkCostVpn_Default) {
1460 IPAddress ip1;
1461 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001462 webrtc::test::ScopedKeyValueConfig field_trials;
Jonas Orelandb477fc72021-08-23 12:16:33 +02001463
1464 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1465 net1->set_type(ADAPTER_TYPE_VPN);
1466 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1467
1468 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1469 net2->set_type(ADAPTER_TYPE_ETHERNET);
1470
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001471 EXPECT_EQ(net1->GetCost(field_trials), net2->GetCost(field_trials));
Jonas Orelandb477fc72021-08-23 12:16:33 +02001472 delete net1;
1473 delete net2;
1474}
1475
1476TEST_F(NetworkTest, NetworkCostVpn_VpnMoreExpensive) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001477 webrtc::test::ScopedKeyValueConfig field_trials(
Jonas Orelandb477fc72021-08-23 12:16:33 +02001478 "WebRTC-AddNetworkCostToVpn/Enabled/");
1479
1480 IPAddress ip1;
1481 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1482
1483 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1484 net1->set_type(ADAPTER_TYPE_VPN);
1485 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1486
1487 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1488 net2->set_type(ADAPTER_TYPE_ETHERNET);
1489
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001490 EXPECT_GT(net1->GetCost(field_trials), net2->GetCost(field_trials));
Jonas Orelandb477fc72021-08-23 12:16:33 +02001491 delete net1;
1492 delete net2;
1493}
1494
Jonas Oreland30019052022-01-28 14:11:44 +01001495TEST_F(NetworkTest, GuessAdapterFromNetworkCost) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001496 webrtc::test::ScopedKeyValueConfig field_trials(
Jonas Oreland30019052022-01-28 14:11:44 +01001497 "WebRTC-AddNetworkCostToVpn/Enabled/"
1498 "WebRTC-UseDifferentiatedCellularCosts/Enabled/");
1499
1500 IPAddress ip1;
1501 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1502
1503 for (auto type : kAllAdapterTypes) {
1504 if (type == rtc::ADAPTER_TYPE_VPN)
1505 continue;
1506 Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
1507 net1.set_type(type);
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001508 auto [guess, vpn] =
1509 Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials));
Jonas Oreland30019052022-01-28 14:11:44 +01001510 EXPECT_FALSE(vpn);
1511 if (type == rtc::ADAPTER_TYPE_LOOPBACK) {
1512 EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET);
1513 } else {
1514 EXPECT_EQ(type, guess);
1515 }
1516 }
1517
1518 // VPN
1519 for (auto type : kAllAdapterTypes) {
1520 if (type == rtc::ADAPTER_TYPE_VPN)
1521 continue;
1522 Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
1523 net1.set_type(rtc::ADAPTER_TYPE_VPN);
1524 net1.set_underlying_type_for_vpn(type);
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001525 auto [guess, vpn] =
1526 Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials));
Jonas Oreland30019052022-01-28 14:11:44 +01001527 EXPECT_TRUE(vpn);
1528 if (type == rtc::ADAPTER_TYPE_LOOPBACK) {
1529 EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET);
1530 } else {
1531 EXPECT_EQ(type, guess);
1532 }
1533 }
1534}
1535
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001536TEST_F(NetworkTest, VpnList) {
Niels Möller539f3e12021-11-26 16:33:19 +01001537 PhysicalSocketServer socket_server;
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001538 {
Niels Möller539f3e12021-11-26 16:33:19 +01001539 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001540 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1541 manager.StartUpdating();
1542 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1543 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.12.1"), 24));
1544 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 16));
1545 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 24));
1546 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.1.1"), 32));
1547 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.0.0"), 16));
1548 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 15));
1549 }
1550 {
Niels Möller539f3e12021-11-26 16:33:19 +01001551 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001552 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 24)});
1553 manager.StartUpdating();
1554 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1555 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.1"), 32));
1556 }
1557}
1558
1559#if defined(WEBRTC_POSIX)
1560// TODO(webrtc:13114): Implement the InstallIpv4Network for windows.
1561TEST_F(NetworkTest, VpnListOverrideAdapterType) {
Niels Möller539f3e12021-11-26 16:33:19 +01001562 PhysicalSocketServer socket_server;
1563 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001564 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1565 manager.StartUpdating();
1566
1567 char if_name[20] = "eth0";
1568 auto addr_list =
1569 InstallIpv4Network(if_name, "192.168.1.23", "255.255.255.255", manager);
1570
Niels Möller22211442022-04-07 11:43:28 +02001571 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001572 ASSERT_EQ(1u, list.size());
1573 EXPECT_EQ(ADAPTER_TYPE_VPN, list[0]->type());
1574 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, list[0]->underlying_type_for_vpn());
1575 ClearNetworks(manager);
1576 ReleaseIfAddrs(addr_list);
1577}
1578#endif // defined(WEBRTC_POSIX)
1579
Jonas Orelandac554eb2021-08-27 09:43:38 +02001580TEST_F(NetworkTest, HardcodedVpn) {
1581 const uint8_t cisco[] = {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0};
1582 const uint8_t global[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x1};
1583 const uint8_t unknown[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x0};
1584 const uint8_t five_bytes[] = {0x2, 0x50, 0x41, 0x0, 0x0};
1585 EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(cisco));
1586 EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(global));
1587
1588 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(
1589 rtc::ArrayView<const uint8_t>(cisco, 5)));
1590 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(five_bytes));
1591 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(unknown));
1592 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(nullptr));
1593}
1594
Mirko Bonadei13f9c622022-04-29 16:38:32 +02001595TEST(CompareNetworks, IrreflexivityTest) {
1596 // x < x is false
1597 auto network = std::make_unique<Network>(
1598 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1599 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network, network));
1600}
1601
1602TEST(CompareNetworks, AsymmetryTest) {
1603 // x < y and y < x cannot be both true
1604 auto network_a = std::make_unique<Network>(
1605 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1606 auto network_b = std::make_unique<Network>(
1607 "test_eth1", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1608 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b));
1609 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_b, network_a));
1610
1611 auto network_c = std::make_unique<Network>(
1612 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345500U), 24);
1613 auto network_d = std::make_unique<Network>(
1614 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1615 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_c, network_d));
1616 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_c));
1617}
1618
1619TEST(CompareNetworks, TransitivityTest) {
1620 // x < y and y < z imply x < z
1621 auto network_a = std::make_unique<Network>(
1622 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1623 auto network_b = std::make_unique<Network>(
1624 "test_eth1", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1625 auto network_c = std::make_unique<Network>(
1626 "test_eth2", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1627 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b));
1628 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_b, network_c));
1629
1630 auto network_d = std::make_unique<Network>(
1631 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1632 auto network_e = std::make_unique<Network>(
1633 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345700U), 24);
1634 auto network_f = std::make_unique<Network>(
1635 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345800U), 24);
1636 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_d, network_e));
1637 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_e, network_f));
1638 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_d, network_f));
1639 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_c));
1640}
1641
1642TEST(CompareNetworks, TransitivityOfIncomparabilityTest) {
1643 // x == y and y == z imply x == z,
1644 // where x == y means x < y and y < x are both false
1645 auto network_a = std::make_unique<Network>(
1646 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 23);
1647 auto network_b = std::make_unique<Network>(
1648 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1649 auto network_c = std::make_unique<Network>(
1650 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345700U), 24);
1651
1652 // network_a < network_b
1653 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b));
1654 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_b, network_a));
1655
1656 // network_b < network_c
1657 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_b, network_c));
1658 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_c, network_b));
1659
1660 // network_a < network_c
1661 EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_c));
1662 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_c, network_a));
1663
1664 auto network_d = std::make_unique<Network>(
1665 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1666 auto network_e = std::make_unique<Network>(
1667 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1668 auto network_f = std::make_unique<Network>(
1669 "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24);
1670
1671 // network_d == network_e
1672 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_e));
1673 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_e, network_d));
1674
1675 // network_e == network_f
1676 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_e, network_f));
1677 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_f, network_e));
1678
1679 // network_d == network_f
1680 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_f));
1681 EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_f, network_d));
1682}
1683
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001684} // namespace rtc