blob: 52026308b740474109d126a4cd056104f7e339de [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
Ali Tofigh7fa90572022-03-17 15:47:49 +010013#include "absl/strings/string_view.h"
14
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000015#if defined(WEBRTC_POSIX)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000016#include <net/if.h>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#endif // WEBRTC_POSIX
18
19#if defined(WEBRTC_WIN)
Mirko Bonadei01914412018-03-23 16:30:58 +010020#include <iphlpapi.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020021
Yves Gerey665174f2018-06-19 15:03:05 +020022#include "rtc_base/win32.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080023#elif !defined(__native_client__)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020024#include "rtc_base/ifaddrs_converter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000025#endif
26
jbauch555604a2016-04-26 03:13:22 -070027#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000028
Steve Anton2acd1632019-03-25 13:48:30 -070029#include "absl/algorithm/container.h"
30#include "absl/strings/match.h"
31#include "absl/strings/string_view.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020032#include "rtc_base/checks.h"
33#include "rtc_base/logging.h"
Steve Anton10542f22019-01-11 09:11:00 -080034#include "rtc_base/network_monitor.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020035#include "rtc_base/socket.h" // includes something that makes windows happy
Steve Anton10542f22019-01-11 09:11:00 -080036#include "rtc_base/string_encode.h"
37#include "rtc_base/string_utils.h"
Jonas Olsson366a50c2018-09-06 13:41:30 +020038#include "rtc_base/strings/string_builder.h"
Niels Möller27c14522022-02-07 16:44:21 +010039#include "rtc_base/task_utils/to_queued_task.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020040#include "rtc_base/thread.h"
Jonas Oreland2105d642020-05-13 10:15:34 +020041#include "system_wrappers/include/field_trial.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000042
43namespace rtc {
44namespace {
45
Jonas Orelandac554eb2021-08-27 09:43:38 +020046// List of MAC addresses of known VPN (for windows).
47constexpr uint8_t kVpns[2][6] = {
48 // Cisco AnyConnect.
49 {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0},
50 // GlobalProtect Virtual Ethernet.
51 {0x2, 0x50, 0x41, 0x0, 0x0, 0x1},
52};
53
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000054// Fetch list of networks every two seconds.
55const int kNetworksUpdateIntervalMs = 2000;
56
57const int kHighestNetworkPreference = 127;
58
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000059typedef struct {
60 Network* net;
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +000061 std::vector<InterfaceAddress> ips;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000062} AddressList;
63
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000064bool CompareNetworks(const Network* a, const Network* b) {
65 if (a->prefix_length() == b->prefix_length()) {
66 if (a->name() == b->name()) {
67 return a->prefix() < b->prefix();
68 }
69 }
70 return a->name() < b->name();
71}
72
73bool SortNetworks(const Network* a, const Network* b) {
74 // Network types will be preferred above everything else while sorting
75 // Networks.
76
77 // Networks are sorted first by type.
78 if (a->type() != b->type()) {
79 return a->type() < b->type();
80 }
81
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000082 IPAddress ip_a = a->GetBestIP();
83 IPAddress ip_b = b->GetBestIP();
84
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000085 // After type, networks are sorted by IP address precedence values
86 // from RFC 3484-bis
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000087 if (IPAddressPrecedence(ip_a) != IPAddressPrecedence(ip_b)) {
88 return IPAddressPrecedence(ip_a) > IPAddressPrecedence(ip_b);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000089 }
90
91 // TODO(mallinath) - Add VPN and Link speed conditions while sorting.
92
93 // Networks are sorted last by key.
deadbeef3427f532017-07-26 16:09:33 -070094 return a->key() < b->key();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000095}
96
Jonas Oreland2105d642020-05-13 10:15:34 +020097uint16_t ComputeNetworkCostByType(int type,
Jonas Orelandb477fc72021-08-23 12:16:33 +020098 bool is_vpn,
99 bool use_differentiated_cellular_costs,
100 bool add_network_cost_to_vpn) {
Jonas Oreland08d18062020-04-02 07:19:12 +0200101 // TODO(jonaso) : Rollout support for cellular network cost using A/B
102 // experiment to make sure it does not introduce regressions.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200103 int vpnCost = (is_vpn && add_network_cost_to_vpn) ? kNetworkCostVpn : 0;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700104 switch (type) {
105 case rtc::ADAPTER_TYPE_ETHERNET:
106 case rtc::ADAPTER_TYPE_LOOPBACK:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200107 return kNetworkCostMin + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700108 case rtc::ADAPTER_TYPE_WIFI:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200109 return kNetworkCostLow + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700110 case rtc::ADAPTER_TYPE_CELLULAR:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200111 return kNetworkCostCellular + vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200112 case rtc::ADAPTER_TYPE_CELLULAR_2G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200113 return (use_differentiated_cellular_costs ? kNetworkCostCellular2G
114 : kNetworkCostCellular) +
115 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200116 case rtc::ADAPTER_TYPE_CELLULAR_3G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200117 return (use_differentiated_cellular_costs ? kNetworkCostCellular3G
118 : kNetworkCostCellular) +
119 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200120 case rtc::ADAPTER_TYPE_CELLULAR_4G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200121 return (use_differentiated_cellular_costs ? kNetworkCostCellular4G
122 : kNetworkCostCellular) +
123 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200124 case rtc::ADAPTER_TYPE_CELLULAR_5G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200125 return (use_differentiated_cellular_costs ? kNetworkCostCellular5G
126 : kNetworkCostCellular) +
127 vpnCost;
Qingsi Wang9f1de692018-06-28 15:38:09 -0700128 case rtc::ADAPTER_TYPE_ANY:
129 // Candidates gathered from the any-address/wildcard ports, as backups,
130 // are given the maximum cost so that if there are other candidates with
131 // known interface types, we would not select candidate pairs using these
132 // backup candidates if other selection criteria with higher precedence
133 // (network conditions over the route) are the same. Note that setting the
134 // cost to kNetworkCostUnknown would be problematic since
135 // ADAPTER_TYPE_CELLULAR would then have a higher cost. See
136 // P2PTransportChannel::SortConnectionsAndUpdateState for how we rank and
137 // select candidate pairs, where the network cost is among the criteria.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200138 return kNetworkCostMax + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700139 case rtc::ADAPTER_TYPE_VPN:
140 // The cost of a VPN should be computed using its underlying network type.
Artem Titovd3251962021-11-15 16:57:07 +0100141 RTC_DCHECK_NOTREACHED();
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700142 return kNetworkCostUnknown;
143 default:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200144 return kNetworkCostUnknown + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700145 }
146}
147
thakis06689a12015-12-30 15:05:30 -0800148#if !defined(__native_client__)
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100149bool IsIgnoredIPv6(bool allow_mac_based_ipv6, const InterfaceAddress& ip) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000150 if (ip.family() != AF_INET6) {
151 return false;
152 }
153
154 // Link-local addresses require scope id to be bound successfully.
155 // However, our IPAddress structure doesn't carry that so the
156 // information is lost and causes binding failure.
157 if (IPIsLinkLocal(ip)) {
158 return true;
159 }
160
161 // Any MAC based IPv6 should be avoided to prevent the MAC tracking.
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100162 if (IPIsMacBased(ip) && !allow_mac_based_ipv6) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000163 return true;
164 }
165
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800166 // Ignore deprecated IPv6.
167 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED) {
168 return true;
169 }
170
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000171 return false;
172}
thakis06689a12015-12-30 15:05:30 -0800173#endif // !defined(__native_client__)
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000174
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200175// Note: consider changing to const Network* as arguments
176// if/when considering other changes that should not trigger
177// OnNetworksChanged.
178bool ShouldAdapterChangeTriggerNetworkChange(rtc::AdapterType old_type,
179 rtc::AdapterType new_type) {
180 // skip triggering OnNetworksChanged if
181 // changing from one cellular to another.
182 if (Network::IsCellular(old_type) && Network::IsCellular(new_type))
183 return false;
184 return true;
185}
186
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000187} // namespace
188
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800189// These addresses are used as the targets to find out the default local address
190// on a multi-homed endpoint. They are actually DNS servers.
191const char kPublicIPv4Host[] = "8.8.8.8";
192const char kPublicIPv6Host[] = "2001:4860:4860::8888";
193const int kPublicPort = 53; // DNS port.
194
Ali Tofigh7fa90572022-03-17 15:47:49 +0100195std::string MakeNetworkKey(absl::string_view name,
Yves Gerey665174f2018-06-19 15:03:05 +0200196 const IPAddress& prefix,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000197 int prefix_length) {
Jonas Olsson366a50c2018-09-06 13:41:30 +0200198 rtc::StringBuilder ost;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000199 ost << name << "%" << prefix.ToString() << "/" << prefix_length;
Jonas Olsson84df1c72018-09-14 16:59:32 +0200200 return ost.Release();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000201}
Qingsi Wange53ac042018-05-08 11:55:07 -0700202// Test if the network name matches the type<number> pattern, e.g. eth0. The
203// matching is case-sensitive.
Steve Anton2acd1632019-03-25 13:48:30 -0700204bool MatchTypeNameWithIndexPattern(absl::string_view network_name,
205 absl::string_view type_name) {
206 if (!absl::StartsWith(network_name, type_name)) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700207 return false;
208 }
Steve Anton2acd1632019-03-25 13:48:30 -0700209 return absl::c_none_of(network_name.substr(type_name.size()),
210 [](char c) { return !isdigit(c); });
Qingsi Wange53ac042018-05-08 11:55:07 -0700211}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000212
Qingsi Wange53ac042018-05-08 11:55:07 -0700213// A cautious note that this method may not provide an accurate adapter type
214// based on the string matching. Incorrect type of adapters can affect the
215// result of the downstream network filtering, see e.g.
216// BasicPortAllocatorSession::GetNetworks when
217// PORTALLOCATOR_DISABLE_COSTLY_NETWORKS is turned on.
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800218AdapterType GetAdapterTypeFromName(const char* network_name) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700219 if (MatchTypeNameWithIndexPattern(network_name, "lo")) {
220 // Note that we have a more robust way to determine if a network interface
221 // is a loopback interface by checking the flag IFF_LOOPBACK in ifa_flags of
222 // an ifaddr struct. See ConvertIfAddrs in this file.
223 return ADAPTER_TYPE_LOOPBACK;
224 }
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700225
Qingsi Wange53ac042018-05-08 11:55:07 -0700226 if (MatchTypeNameWithIndexPattern(network_name, "eth")) {
227 return ADAPTER_TYPE_ETHERNET;
228 }
229
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000230 if (MatchTypeNameWithIndexPattern(network_name, "wlan") ||
231 MatchTypeNameWithIndexPattern(network_name, "v4-wlan")) {
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700232 return ADAPTER_TYPE_WIFI;
233 }
234
Qingsi Wange53ac042018-05-08 11:55:07 -0700235 if (MatchTypeNameWithIndexPattern(network_name, "ipsec") ||
236 MatchTypeNameWithIndexPattern(network_name, "tun") ||
237 MatchTypeNameWithIndexPattern(network_name, "utun") ||
238 MatchTypeNameWithIndexPattern(network_name, "tap")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800239 return ADAPTER_TYPE_VPN;
240 }
241#if defined(WEBRTC_IOS)
242 // Cell networks are pdp_ipN on iOS.
Qingsi Wange53ac042018-05-08 11:55:07 -0700243 if (MatchTypeNameWithIndexPattern(network_name, "pdp_ip")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800244 return ADAPTER_TYPE_CELLULAR;
245 }
Qingsi Wange53ac042018-05-08 11:55:07 -0700246 if (MatchTypeNameWithIndexPattern(network_name, "en")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800247 // This may not be most accurate because sometimes Ethernet interface
248 // name also starts with "en" but it is better than showing it as
249 // "unknown" type.
250 // TODO(honghaiz): Write a proper IOS network manager.
251 return ADAPTER_TYPE_WIFI;
252 }
253#elif defined(WEBRTC_ANDROID)
Qingsi Wange53ac042018-05-08 11:55:07 -0700254 if (MatchTypeNameWithIndexPattern(network_name, "rmnet") ||
255 MatchTypeNameWithIndexPattern(network_name, "rmnet_data") ||
256 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet") ||
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800257 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet_data") ||
258 MatchTypeNameWithIndexPattern(network_name, "clat")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800259 return ADAPTER_TYPE_CELLULAR;
260 }
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800261#endif
262
263 return ADAPTER_TYPE_UNKNOWN;
264}
265
Yves Gerey665174f2018-06-19 15:03:05 +0200266NetworkManager::NetworkManager() {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000267
Yves Gerey665174f2018-06-19 15:03:05 +0200268NetworkManager::~NetworkManager() {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000269
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700270NetworkManager::EnumerationPermission NetworkManager::enumeration_permission()
271 const {
guoweisea1012b2015-08-21 09:06:28 -0700272 return ENUMERATION_ALLOWED;
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700273}
274
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800275bool NetworkManager::GetDefaultLocalAddress(int family, IPAddress* addr) const {
276 return false;
277}
278
Qingsi Wang7852d292018-10-31 11:17:07 -0700279webrtc::MdnsResponderInterface* NetworkManager::GetMdnsResponder() const {
Qingsi Wang09619332018-09-12 22:51:55 -0700280 return nullptr;
281}
282
guoweis@webrtc.org2444d962015-01-30 00:09:28 +0000283NetworkManagerBase::NetworkManagerBase()
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200284 : enumeration_permission_(NetworkManager::ENUMERATION_ALLOWED),
285 signal_network_preference_change_(webrtc::field_trial::IsEnabled(
286 "WebRTC-SignalNetworkPreferenceChange")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000287
288NetworkManagerBase::~NetworkManagerBase() {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000289 for (const auto& kv : networks_map_) {
290 delete kv.second;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000291 }
292}
293
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700294NetworkManager::EnumerationPermission
295NetworkManagerBase::enumeration_permission() const {
296 return enumeration_permission_;
297}
298
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000299void NetworkManagerBase::GetAnyAddressNetworks(NetworkList* networks) {
300 if (!ipv4_any_address_network_) {
301 const rtc::IPAddress ipv4_any_address(INADDR_ANY);
302 ipv4_any_address_network_.reset(
Qingsi Wang9f1de692018-06-28 15:38:09 -0700303 new rtc::Network("any", "any", ipv4_any_address, 0, ADAPTER_TYPE_ANY));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800304 ipv4_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800305 ipv4_any_address_network_->set_mdns_responder_provider(this);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000306 ipv4_any_address_network_->AddIP(ipv4_any_address);
307 }
308 networks->push_back(ipv4_any_address_network_.get());
309
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100310 if (!ipv6_any_address_network_) {
311 const rtc::IPAddress ipv6_any_address(in6addr_any);
312 ipv6_any_address_network_.reset(
313 new rtc::Network("any", "any", ipv6_any_address, 0, ADAPTER_TYPE_ANY));
314 ipv6_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800315 ipv6_any_address_network_->set_mdns_responder_provider(this);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100316 ipv6_any_address_network_->AddIP(ipv6_any_address);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000317 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100318 networks->push_back(ipv6_any_address_network_.get());
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000319}
320
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000321void NetworkManagerBase::GetNetworks(NetworkList* result) const {
guoweis@webrtc.org2444d962015-01-30 00:09:28 +0000322 result->clear();
deadbeef3427f532017-07-26 16:09:33 -0700323 result->insert(result->begin(), networks_.begin(), networks_.end());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000324}
325
326void NetworkManagerBase::MergeNetworkList(const NetworkList& new_networks,
327 bool* changed) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000328 NetworkManager::Stats stats;
329 MergeNetworkList(new_networks, changed, &stats);
330}
331
332void NetworkManagerBase::MergeNetworkList(const NetworkList& new_networks,
333 bool* changed,
334 NetworkManager::Stats* stats) {
honghaizdb8cf502015-12-21 13:08:46 -0800335 *changed = false;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000336 // AddressList in this map will track IP addresses for all Networks
337 // with the same key.
338 std::map<std::string, AddressList> consolidated_address_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000339 NetworkList list(new_networks);
Steve Anton2acd1632019-03-25 13:48:30 -0700340 absl::c_sort(list, CompareNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000341 // First, build a set of network-keys to the ipaddresses.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000342 for (Network* network : list) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000343 bool might_add_to_merged_list = false;
Yves Gerey665174f2018-06-19 15:03:05 +0200344 std::string key = MakeNetworkKey(network->name(), network->prefix(),
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000345 network->prefix_length());
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000346 if (consolidated_address_list.find(key) ==
347 consolidated_address_list.end()) {
348 AddressList addrlist;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000349 addrlist.net = network;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000350 consolidated_address_list[key] = addrlist;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000351 might_add_to_merged_list = true;
352 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000353 const std::vector<InterfaceAddress>& addresses = network->GetIPs();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000354 AddressList& current_list = consolidated_address_list[key];
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000355 for (const InterfaceAddress& address : addresses) {
356 current_list.ips.push_back(address);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000357 }
358 if (!might_add_to_merged_list) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000359 delete network;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000360 } else {
361 if (current_list.ips[0].family() == AF_INET) {
362 stats->ipv4_network_count++;
363 } else {
nisseede5da42017-01-12 05:15:36 -0800364 RTC_DCHECK(current_list.ips[0].family() == AF_INET6);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000365 stats->ipv6_network_count++;
366 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000367 }
368 }
369
370 // Next, look for existing network objects to re-use.
honghaizdb8cf502015-12-21 13:08:46 -0800371 // Result of Network merge. Element in this list should have unique key.
372 NetworkList merged_list;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000373 for (const auto& kv : consolidated_address_list) {
374 const std::string& key = kv.first;
375 Network* net = kv.second.net;
376 auto existing = networks_map_.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000377 if (existing == networks_map_.end()) {
Jonas Oreland7e914822020-03-23 12:44:58 +0100378 // This network is new. Place it in the network map.
Olga Sharonovaf74d2ce2020-03-30 08:20:05 +0000379 merged_list.push_back(net);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000380 networks_map_[key] = net;
honghaiza0c44ea2016-03-23 16:07:48 -0700381 net->set_id(next_available_network_id_++);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000382 // Also, we might have accumulated IPAddresses from the first
383 // step, set it here.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000384 net->SetIPs(kv.second.ips, true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000385 *changed = true;
386 } else {
387 // This network exists in the map already. Reset its IP addresses.
honghaizdb8cf502015-12-21 13:08:46 -0800388 Network* existing_net = existing->second;
389 *changed = existing_net->SetIPs(kv.second.ips, *changed);
390 merged_list.push_back(existing_net);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700391 if (net->type() != ADAPTER_TYPE_UNKNOWN &&
392 net->type() != existing_net->type()) {
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200393 if (ShouldAdapterChangeTriggerNetworkChange(existing_net->type(),
394 net->type())) {
395 *changed = true;
396 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700397 existing_net->set_type(net->type());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700398 }
honghaizdb8cf502015-12-21 13:08:46 -0800399 // If the existing network was not active, networks have changed.
400 if (!existing_net->active()) {
401 *changed = true;
402 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200403 if (net->network_preference() != existing_net->network_preference()) {
404 existing_net->set_network_preference(net->network_preference());
405 if (signal_network_preference_change_) {
406 *changed = true;
407 }
408 }
nisseede5da42017-01-12 05:15:36 -0800409 RTC_DCHECK(net->active());
honghaizdb8cf502015-12-21 13:08:46 -0800410 if (existing_net != net) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000411 delete net;
412 }
413 }
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800414 networks_map_[key]->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000415 }
Artem Titov96e3b992021-07-26 16:03:14 +0200416 // It may still happen that the merged list is a subset of `networks_`.
honghaizdb8cf502015-12-21 13:08:46 -0800417 // To detect this change, we compare their sizes.
418 if (merged_list.size() != networks_.size()) {
419 *changed = true;
420 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000421
Artem Titov96e3b992021-07-26 16:03:14 +0200422 // If the network list changes, we re-assign `networks_` to the merged list
honghaizdb8cf502015-12-21 13:08:46 -0800423 // and re-sort it.
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000424 if (*changed) {
honghaizdb8cf502015-12-21 13:08:46 -0800425 networks_ = merged_list;
426 // Reset the active states of all networks.
427 for (const auto& kv : networks_map_) {
honghaize3c6c822016-02-17 13:00:28 -0800428 Network* network = kv.second;
Artem Titov96e3b992021-07-26 16:03:14 +0200429 // If `network` is in the newly generated `networks_`, it is active.
Steve Anton2acd1632019-03-25 13:48:30 -0700430 bool found = absl::c_linear_search(networks_, network);
honghaize3c6c822016-02-17 13:00:28 -0800431 network->set_active(found);
honghaizdb8cf502015-12-21 13:08:46 -0800432 }
Steve Anton2acd1632019-03-25 13:48:30 -0700433 absl::c_sort(networks_, SortNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000434 // Now network interfaces are sorted, we should set the preference value
435 // for each of the interfaces we are planning to use.
436 // Preference order of network interfaces might have changed from previous
437 // sorting due to addition of higher preference network interface.
438 // Since we have already sorted the network interfaces based on our
439 // requirements, we will just assign a preference value starting with 127,
440 // in decreasing order.
441 int pref = kHighestNetworkPreference;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000442 for (Network* network : networks_) {
443 network->set_preference(pref);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000444 if (pref > 0) {
445 --pref;
446 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100447 RTC_LOG(LS_ERROR) << "Too many network interfaces to handle!";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000448 break;
449 }
450 }
451 }
452}
453
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800454void NetworkManagerBase::set_default_local_addresses(const IPAddress& ipv4,
455 const IPAddress& ipv6) {
456 if (ipv4.family() == AF_INET) {
457 default_local_ipv4_address_ = ipv4;
458 }
459 if (ipv6.family() == AF_INET6) {
460 default_local_ipv6_address_ = ipv6;
461 }
462}
463
464bool NetworkManagerBase::GetDefaultLocalAddress(int family,
465 IPAddress* ipaddr) const {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800466 if (family == AF_INET && !default_local_ipv4_address_.IsNil()) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800467 *ipaddr = default_local_ipv4_address_;
468 return true;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800469 } else if (family == AF_INET6 && !default_local_ipv6_address_.IsNil()) {
honghaizaf83fe62016-04-18 14:50:44 -0700470 Network* ipv6_network = GetNetworkFromAddress(default_local_ipv6_address_);
471 if (ipv6_network) {
472 // If the default ipv6 network's BestIP is different than
473 // default_local_ipv6_address_, use it instead.
474 // This is to prevent potential IP address leakage. See WebRTC bug 5376.
475 *ipaddr = ipv6_network->GetBestIP();
476 } else {
477 *ipaddr = default_local_ipv6_address_;
478 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800479 return true;
480 }
481 return false;
482}
483
honghaizaf83fe62016-04-18 14:50:44 -0700484Network* NetworkManagerBase::GetNetworkFromAddress(
485 const rtc::IPAddress& ip) const {
486 for (Network* network : networks_) {
487 const auto& ips = network->GetIPs();
Steve Anton2acd1632019-03-25 13:48:30 -0700488 if (absl::c_any_of(ips, [&](const InterfaceAddress& existing_ip) {
489 return ip == static_cast<rtc::IPAddress>(existing_ip);
490 })) {
honghaizaf83fe62016-04-18 14:50:44 -0700491 return network;
492 }
493 }
494 return nullptr;
495}
496
Jonas Orelandac554eb2021-08-27 09:43:38 +0200497bool NetworkManagerBase::IsVpnMacAddress(
498 rtc::ArrayView<const uint8_t> address) {
499 if (address.data() == nullptr && address.size() == 0) {
500 return false;
501 }
502 for (const auto& vpn : kVpns) {
503 if (sizeof(vpn) == address.size() &&
504 memcmp(vpn, address.data(), address.size()) == 0) {
505 return true;
506 }
507 }
508 return false;
509}
510
Niels Mölleraa373162021-09-28 16:09:07 +0200511BasicNetworkManager::BasicNetworkManager()
512 : BasicNetworkManager(nullptr, nullptr) {}
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700513
Niels Möller539f3e12021-11-26 16:33:19 +0100514BasicNetworkManager::BasicNetworkManager(SocketFactory* socket_factory)
515 : BasicNetworkManager(nullptr, socket_factory) {}
516
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700517BasicNetworkManager::BasicNetworkManager(
518 NetworkMonitorFactory* network_monitor_factory)
Niels Mölleraa373162021-09-28 16:09:07 +0200519 : BasicNetworkManager(network_monitor_factory, nullptr) {}
520
521BasicNetworkManager::BasicNetworkManager(
522 NetworkMonitorFactory* network_monitor_factory,
523 SocketFactory* socket_factory)
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100524 : network_monitor_factory_(network_monitor_factory),
Niels Mölleraa373162021-09-28 16:09:07 +0200525 socket_factory_(socket_factory),
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100526 allow_mac_based_ipv6_(
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000527 webrtc::field_trial::IsEnabled("WebRTC-AllowMACBasedIPv6")),
528 bind_using_ifname_(
Jonas Orelandb5274ef2021-05-04 09:09:24 +0200529 !webrtc::field_trial::IsDisabled("WebRTC-BindUsingInterfaceName")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000530
Niels Möller27c14522022-02-07 16:44:21 +0100531BasicNetworkManager::~BasicNetworkManager() {
532 if (task_safety_flag_) {
533 task_safety_flag_->SetNotAlive();
534 }
535}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000536
honghaiz023f3ef2015-10-19 09:39:32 -0700537void BasicNetworkManager::OnNetworksChanged() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700538 RTC_DCHECK_RUN_ON(thread_);
Mirko Bonadei675513b2017-11-09 11:09:25 +0100539 RTC_LOG(LS_INFO) << "Network change was observed";
honghaiz023f3ef2015-10-19 09:39:32 -0700540 UpdateNetworksOnce();
541}
542
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000543#if defined(__native_client__)
544
545bool BasicNetworkManager::CreateNetworks(bool include_ignored,
546 NetworkList* networks) const {
Artem Titovd3251962021-11-15 16:57:07 +0100547 RTC_DCHECK_NOTREACHED();
Mirko Bonadei675513b2017-11-09 11:09:25 +0100548 RTC_LOG(LS_WARNING) << "BasicNetworkManager doesn't work on NaCl yet";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000549 return false;
550}
551
552#elif defined(WEBRTC_POSIX)
553void BasicNetworkManager::ConvertIfAddrs(struct ifaddrs* interfaces,
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800554 IfAddrsConverter* ifaddrs_converter,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000555 bool include_ignored,
556 NetworkList* networks) const {
557 NetworkMap current_networks;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800558
deadbeef37f5ecf2017-02-27 14:06:41 -0800559 for (struct ifaddrs* cursor = interfaces; cursor != nullptr;
560 cursor = cursor->ifa_next) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000561 IPAddress prefix;
562 IPAddress mask;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800563 InterfaceAddress ip;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000564 int scope_id = 0;
565
566 // Some interfaces may not have address assigned.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800567 if (!cursor->ifa_addr || !cursor->ifa_netmask) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000568 continue;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800569 }
570 // Skip ones which are down.
571 if (!(cursor->ifa_flags & IFF_RUNNING)) {
572 continue;
573 }
574 // Skip unknown family.
575 if (cursor->ifa_addr->sa_family != AF_INET &&
576 cursor->ifa_addr->sa_family != AF_INET6) {
577 continue;
578 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800579 // Convert to InterfaceAddress.
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200580 // TODO(webrtc:13114): Convert ConvertIfAddrs to use rtc::Netmask.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800581 if (!ifaddrs_converter->ConvertIfAddrsToIPAddress(cursor, &ip, &mask)) {
582 continue;
583 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000584
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800585 // Special case for IPv6 address.
586 if (cursor->ifa_addr->sa_family == AF_INET6) {
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100587 if (IsIgnoredIPv6(allow_mac_based_ipv6_, ip)) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000588 continue;
589 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800590 scope_id =
591 reinterpret_cast<sockaddr_in6*>(cursor->ifa_addr)->sin6_scope_id;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000592 }
593
Honghai Zhang351d77b2016-05-20 15:08:29 -0700594 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700595 AdapterType vpn_underlying_adapter_type = ADAPTER_TYPE_UNKNOWN;
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200596 NetworkPreference network_preference = NetworkPreference::NEUTRAL;
Honghai Zhang351d77b2016-05-20 15:08:29 -0700597 if (cursor->ifa_flags & IFF_LOOPBACK) {
598 adapter_type = ADAPTER_TYPE_LOOPBACK;
599 } else {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800600 // If there is a network_monitor, use it to get the adapter type.
601 // Otherwise, get the adapter type based on a few name matching rules.
602 if (network_monitor_) {
603 adapter_type = network_monitor_->GetAdapterType(cursor->ifa_name);
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200604 network_preference =
605 network_monitor_->GetNetworkPreference(cursor->ifa_name);
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800606 }
607 if (adapter_type == ADAPTER_TYPE_UNKNOWN) {
608 adapter_type = GetAdapterTypeFromName(cursor->ifa_name);
609 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700610 }
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700611
612 if (adapter_type == ADAPTER_TYPE_VPN && network_monitor_) {
613 vpn_underlying_adapter_type =
614 network_monitor_->GetVpnUnderlyingAdapterType(cursor->ifa_name);
615 }
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200616
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000617 int prefix_length = CountIPMaskBits(mask);
618 prefix = TruncateIP(ip, prefix_length);
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200619
620 if (adapter_type != ADAPTER_TYPE_VPN &&
621 IsConfiguredVpn(prefix, prefix_length)) {
622 vpn_underlying_adapter_type = adapter_type;
623 adapter_type = ADAPTER_TYPE_VPN;
624 }
625
Yves Gerey665174f2018-06-19 15:03:05 +0200626 std::string key =
627 MakeNetworkKey(std::string(cursor->ifa_name), prefix, prefix_length);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700628 auto iter = current_networks.find(key);
629 if (iter == current_networks.end()) {
Noah Richards2e266e92015-04-07 11:51:56 -0700630 // TODO(phoglund): Need to recognize other types as well.
jbauch555604a2016-04-26 03:13:22 -0700631 std::unique_ptr<Network> network(
632 new Network(cursor->ifa_name, cursor->ifa_name, prefix, prefix_length,
633 adapter_type));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800634 network->set_default_local_address_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000635 network->set_scope_id(scope_id);
636 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000637 network->set_ignored(IsIgnoredNetwork(*network));
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700638 network->set_underlying_type_for_vpn(vpn_underlying_adapter_type);
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200639 network->set_network_preference(network_preference);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000640 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800641 current_networks[key] = network.get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000642 networks->push_back(network.release());
643 }
644 } else {
Honghai Zhang351d77b2016-05-20 15:08:29 -0700645 Network* existing_network = iter->second;
646 existing_network->AddIP(ip);
647 if (adapter_type != ADAPTER_TYPE_UNKNOWN) {
648 existing_network->set_type(adapter_type);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700649 existing_network->set_underlying_type_for_vpn(
650 vpn_underlying_adapter_type);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700651 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200652 existing_network->set_network_preference(network_preference);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000653 }
654 }
655}
656
657bool BasicNetworkManager::CreateNetworks(bool include_ignored,
658 NetworkList* networks) const {
659 struct ifaddrs* interfaces;
660 int error = getifaddrs(&interfaces);
661 if (error != 0) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000662 RTC_LOG_ERR(LS_ERROR) << "getifaddrs failed to gather interface data: "
663 << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000664 return false;
665 }
666
jbauch555604a2016-04-26 03:13:22 -0700667 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(CreateIfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800668 ConvertIfAddrs(interfaces, ifaddrs_converter.get(), include_ignored,
669 networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000670
671 freeifaddrs(interfaces);
672 return true;
673}
674
675#elif defined(WEBRTC_WIN)
676
677unsigned int GetPrefix(PIP_ADAPTER_PREFIX prefixlist,
Yves Gerey665174f2018-06-19 15:03:05 +0200678 const IPAddress& ip,
679 IPAddress* prefix) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000680 IPAddress current_prefix;
681 IPAddress best_prefix;
682 unsigned int best_length = 0;
683 while (prefixlist) {
684 // Look for the longest matching prefix in the prefixlist.
deadbeef37f5ecf2017-02-27 14:06:41 -0800685 if (prefixlist->Address.lpSockaddr == nullptr ||
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000686 prefixlist->Address.lpSockaddr->sa_family != ip.family()) {
687 prefixlist = prefixlist->Next;
688 continue;
689 }
690 switch (prefixlist->Address.lpSockaddr->sa_family) {
691 case AF_INET: {
692 sockaddr_in* v4_addr =
693 reinterpret_cast<sockaddr_in*>(prefixlist->Address.lpSockaddr);
694 current_prefix = IPAddress(v4_addr->sin_addr);
695 break;
696 }
697 case AF_INET6: {
Yves Gerey665174f2018-06-19 15:03:05 +0200698 sockaddr_in6* v6_addr =
699 reinterpret_cast<sockaddr_in6*>(prefixlist->Address.lpSockaddr);
700 current_prefix = IPAddress(v6_addr->sin6_addr);
701 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000702 }
703 default: {
704 prefixlist = prefixlist->Next;
705 continue;
706 }
707 }
708 if (TruncateIP(ip, prefixlist->PrefixLength) == current_prefix &&
709 prefixlist->PrefixLength > best_length) {
710 best_prefix = current_prefix;
711 best_length = prefixlist->PrefixLength;
712 }
713 prefixlist = prefixlist->Next;
714 }
715 *prefix = best_prefix;
716 return best_length;
717}
718
719bool BasicNetworkManager::CreateNetworks(bool include_ignored,
720 NetworkList* networks) const {
721 NetworkMap current_networks;
722 // MSDN recommends a 15KB buffer for the first try at GetAdaptersAddresses.
723 size_t buffer_size = 16384;
jbauch555604a2016-04-26 03:13:22 -0700724 std::unique_ptr<char[]> adapter_info(new char[buffer_size]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000725 PIP_ADAPTER_ADDRESSES adapter_addrs =
726 reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
727 int adapter_flags = (GAA_FLAG_SKIP_DNS_SERVER | GAA_FLAG_SKIP_ANYCAST |
728 GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_INCLUDE_PREFIX);
729 int ret = 0;
730 do {
731 adapter_info.reset(new char[buffer_size]);
732 adapter_addrs = reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
Yves Gerey665174f2018-06-19 15:03:05 +0200733 ret = GetAdaptersAddresses(AF_UNSPEC, adapter_flags, 0, adapter_addrs,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000734 reinterpret_cast<PULONG>(&buffer_size));
735 } while (ret == ERROR_BUFFER_OVERFLOW);
736 if (ret != ERROR_SUCCESS) {
737 return false;
738 }
739 int count = 0;
740 while (adapter_addrs) {
741 if (adapter_addrs->OperStatus == IfOperStatusUp) {
742 PIP_ADAPTER_UNICAST_ADDRESS address = adapter_addrs->FirstUnicastAddress;
743 PIP_ADAPTER_PREFIX prefixlist = adapter_addrs->FirstPrefix;
744 std::string name;
745 std::string description;
tfarinaa41ab932015-10-30 16:08:48 -0700746#if !defined(NDEBUG)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000747 name = ToUtf8(adapter_addrs->FriendlyName,
748 wcslen(adapter_addrs->FriendlyName));
749#endif
750 description = ToUtf8(adapter_addrs->Description,
751 wcslen(adapter_addrs->Description));
752 for (; address; address = address->Next) {
tfarinaa41ab932015-10-30 16:08:48 -0700753#if defined(NDEBUG)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000754 name = rtc::ToString(count);
755#endif
756
757 IPAddress ip;
758 int scope_id = 0;
jbauch555604a2016-04-26 03:13:22 -0700759 std::unique_ptr<Network> network;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000760 switch (address->Address.lpSockaddr->sa_family) {
761 case AF_INET: {
762 sockaddr_in* v4_addr =
763 reinterpret_cast<sockaddr_in*>(address->Address.lpSockaddr);
764 ip = IPAddress(v4_addr->sin_addr);
765 break;
766 }
767 case AF_INET6: {
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100768 sockaddr_in6* v6_addr =
769 reinterpret_cast<sockaddr_in6*>(address->Address.lpSockaddr);
770 scope_id = v6_addr->sin6_scope_id;
771 ip = IPAddress(v6_addr->sin6_addr);
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000772
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100773 if (IsIgnoredIPv6(allow_mac_based_ipv6_, InterfaceAddress(ip))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000774 continue;
775 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100776
777 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000778 }
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800779 default: {
780 continue;
781 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000782 }
783
784 IPAddress prefix;
785 int prefix_length = GetPrefix(prefixlist, ip, &prefix);
786 std::string key = MakeNetworkKey(name, prefix, prefix_length);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000787 auto existing_network = current_networks.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000788 if (existing_network == current_networks.end()) {
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000789 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Yura Yaroshevich0ce868c2018-05-15 11:15:32 +0300790 switch (adapter_addrs->IfType) {
791 case IF_TYPE_SOFTWARE_LOOPBACK:
792 adapter_type = ADAPTER_TYPE_LOOPBACK;
793 break;
794 case IF_TYPE_ETHERNET_CSMACD:
795 case IF_TYPE_ETHERNET_3MBIT:
796 case IF_TYPE_IEEE80212:
797 case IF_TYPE_FASTETHER:
798 case IF_TYPE_FASTETHER_FX:
799 case IF_TYPE_GIGABITETHERNET:
800 adapter_type = ADAPTER_TYPE_ETHERNET;
801 break;
802 case IF_TYPE_IEEE80211:
803 adapter_type = ADAPTER_TYPE_WIFI;
804 break;
805 case IF_TYPE_WWANPP:
806 case IF_TYPE_WWANPP2:
807 adapter_type = ADAPTER_TYPE_CELLULAR;
808 break;
809 default:
810 // TODO(phoglund): Need to recognize other types as well.
811 adapter_type = ADAPTER_TYPE_UNKNOWN;
812 break;
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000813 }
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200814 auto vpn_underlying_adapter_type = ADAPTER_TYPE_UNKNOWN;
815 if (adapter_type != ADAPTER_TYPE_VPN &&
816 IsConfiguredVpn(prefix, prefix_length)) {
817 vpn_underlying_adapter_type = adapter_type;
818 adapter_type = ADAPTER_TYPE_VPN;
819 }
Jonas Orelandac554eb2021-08-27 09:43:38 +0200820 if (adapter_type != ADAPTER_TYPE_VPN &&
821 IsVpnMacAddress(rtc::ArrayView<const uint8_t>(
822 reinterpret_cast<const uint8_t*>(
823 adapter_addrs->PhysicalAddress),
824 adapter_addrs->PhysicalAddressLength))) {
825 vpn_underlying_adapter_type = adapter_type;
826 adapter_type = ADAPTER_TYPE_VPN;
827 }
828
jbauch555604a2016-04-26 03:13:22 -0700829 std::unique_ptr<Network> network(new Network(
830 name, description, prefix, prefix_length, adapter_type));
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200831 network->set_underlying_type_for_vpn(vpn_underlying_adapter_type);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800832 network->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800833 network->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000834 network->set_scope_id(scope_id);
835 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000836 bool ignored = IsIgnoredNetwork(*network);
837 network->set_ignored(ignored);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000838 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800839 current_networks[key] = network.get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000840 networks->push_back(network.release());
841 }
842 } else {
843 (*existing_network).second->AddIP(ip);
844 }
845 }
846 // Count is per-adapter - all 'Networks' created from the same
847 // adapter need to have the same name.
848 ++count;
849 }
850 adapter_addrs = adapter_addrs->Next;
851 }
852 return true;
853}
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000854#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000855
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000856bool BasicNetworkManager::IsIgnoredNetwork(const Network& network) const {
857 // Ignore networks on the explicit ignore list.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000858 for (const std::string& ignored_name : network_ignore_list_) {
859 if (network.name() == ignored_name) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000860 return true;
861 }
862 }
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000863
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000864#if defined(WEBRTC_POSIX)
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000865 // Filter out VMware/VirtualBox interfaces, typically named vmnet1,
866 // vmnet8, or vboxnet0.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000867 if (strncmp(network.name().c_str(), "vmnet", 5) == 0 ||
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000868 strncmp(network.name().c_str(), "vnic", 4) == 0 ||
869 strncmp(network.name().c_str(), "vboxnet", 7) == 0) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000870 return true;
871 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000872#elif defined(WEBRTC_WIN)
873 // Ignore any HOST side vmware adapters with a description like:
874 // VMware Virtual Ethernet Adapter for VMnet1
875 // but don't ignore any GUEST side adapters with a description like:
876 // VMware Accelerated AMD PCNet Adapter #2
deadbeef37f5ecf2017-02-27 14:06:41 -0800877 if (strstr(network.description().c_str(), "VMnet") != nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000878 return true;
879 }
880#endif
881
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700882 if (network_monitor_ &&
883 !network_monitor_->IsAdapterAvailable(network.name())) {
884 return true;
885 }
886
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000887 // Ignore any networks with a 0.x.y.z IP
888 if (network.prefix().family() == AF_INET) {
889 return (network.prefix().v4AddressAsHostOrderInteger() < 0x01000000);
890 }
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000891
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000892 return false;
893}
894
895void BasicNetworkManager::StartUpdating() {
896 thread_ = Thread::Current();
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700897 // Redundant but necessary for thread annotations.
898 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000899 if (start_count_) {
900 // If network interfaces are already discovered and signal is sent,
901 // we should trigger network signal immediately for the new clients
902 // to start allocating ports.
903 if (sent_first_update_)
Niels Möller27c14522022-02-07 16:44:21 +0100904 thread_->PostTask(ToQueuedTask(task_safety_flag_, [this] {
905 RTC_DCHECK_RUN_ON(thread_);
906 SignalNetworksChanged();
907 }));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000908 } else {
Niels Möller27c14522022-02-07 16:44:21 +0100909 RTC_DCHECK(task_safety_flag_ == nullptr);
910 task_safety_flag_ = webrtc::PendingTaskSafetyFlag::Create();
911 thread_->PostTask(ToQueuedTask(task_safety_flag_, [this] {
912 RTC_DCHECK_RUN_ON(thread_);
913 UpdateNetworksContinually();
914 }));
honghaiz023f3ef2015-10-19 09:39:32 -0700915 StartNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000916 }
917 ++start_count_;
918}
919
920void BasicNetworkManager::StopUpdating() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700921 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000922 if (!start_count_)
923 return;
924
925 --start_count_;
926 if (!start_count_) {
Niels Möller27c14522022-02-07 16:44:21 +0100927 task_safety_flag_->SetNotAlive();
928 task_safety_flag_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000929 sent_first_update_ = false;
honghaiz023f3ef2015-10-19 09:39:32 -0700930 StopNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000931 }
932}
933
honghaiz023f3ef2015-10-19 09:39:32 -0700934void BasicNetworkManager::StartNetworkMonitor() {
Taylor Brandstetter07fc24d2020-08-12 01:58:10 +0000935 if (network_monitor_factory_ == nullptr) {
936 return;
honghaiz023f3ef2015-10-19 09:39:32 -0700937 }
honghaiz023f3ef2015-10-19 09:39:32 -0700938 if (!network_monitor_) {
Taylor Brandstetter07fc24d2020-08-12 01:58:10 +0000939 network_monitor_.reset(network_monitor_factory_->CreateNetworkMonitor());
honghaizcec0a082016-01-15 14:49:09 -0800940 if (!network_monitor_) {
941 return;
942 }
Mirko Bonadei37077932021-07-27 17:00:58 +0200943 network_monitor_->SetNetworksChangedCallback(
944 [this]() { OnNetworksChanged(); });
honghaiz023f3ef2015-10-19 09:39:32 -0700945 }
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000946
947 if (network_monitor_->SupportsBindSocketToNetwork()) {
948 // Set NetworkBinder on SocketServer so that
949 // PhysicalSocket::Bind will call
950 // BasicNetworkManager::BindSocketToNetwork(), (that will lookup interface
951 // name and then call network_monitor_->BindSocketToNetwork()).
952 thread_->socketserver()->set_network_binder(this);
953 }
954
honghaiz023f3ef2015-10-19 09:39:32 -0700955 network_monitor_->Start();
956}
957
958void BasicNetworkManager::StopNetworkMonitor() {
959 if (!network_monitor_) {
960 return;
961 }
962 network_monitor_->Stop();
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000963
964 if (network_monitor_->SupportsBindSocketToNetwork()) {
965 // Reset NetworkBinder on SocketServer.
966 if (thread_->socketserver()->network_binder() == this) {
967 thread_->socketserver()->set_network_binder(nullptr);
968 }
969 }
honghaiz023f3ef2015-10-19 09:39:32 -0700970}
971
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800972IPAddress BasicNetworkManager::QueryDefaultLocalAddress(int family) const {
nisseede5da42017-01-12 05:15:36 -0800973 RTC_DCHECK(family == AF_INET || family == AF_INET6);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800974
Niels Mölleraa373162021-09-28 16:09:07 +0200975 // TODO(bugs.webrtc.org/13145): Delete support for null `socket_factory_`,
976 // require socket factory to be provided to constructor.
977 SocketFactory* socket_factory = socket_factory_;
978 if (!socket_factory) {
979 socket_factory = thread_->socketserver();
980 }
981 RTC_DCHECK(socket_factory);
982
Niels Möllerd0b88792021-08-12 10:32:30 +0200983 std::unique_ptr<Socket> socket(
Niels Mölleraa373162021-09-28 16:09:07 +0200984 socket_factory->CreateSocket(family, SOCK_DGRAM));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800985 if (!socket) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000986 RTC_LOG_ERR(LS_ERROR) << "Socket creation failed";
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800987 return IPAddress();
988 }
989
guoweis56271ed2016-01-15 14:45:06 -0800990 if (socket->Connect(SocketAddress(
991 family == AF_INET ? kPublicIPv4Host : kPublicIPv6Host, kPublicPort)) <
992 0) {
Yves Gerey665174f2018-06-19 15:03:05 +0200993 if (socket->GetError() != ENETUNREACH &&
994 socket->GetError() != EHOSTUNREACH) {
skvlad75024012016-09-29 12:59:35 -0700995 // Ignore the expected case of "host/net unreachable" - which happens if
996 // the network is V4- or V6-only.
Mirko Bonadei675513b2017-11-09 11:09:25 +0100997 RTC_LOG(LS_INFO) << "Connect failed with " << socket->GetError();
skvlad75024012016-09-29 12:59:35 -0700998 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800999 return IPAddress();
1000 }
1001 return socket->GetLocalAddress().ipaddr();
1002}
1003
honghaiz023f3ef2015-10-19 09:39:32 -07001004void BasicNetworkManager::UpdateNetworksOnce() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001005 if (!start_count_)
1006 return;
1007
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001008 NetworkList list;
1009 if (!CreateNetworks(false, &list)) {
1010 SignalError();
1011 } else {
1012 bool changed;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001013 NetworkManager::Stats stats;
1014 MergeNetworkList(list, &changed, &stats);
1015 set_default_local_addresses(QueryDefaultLocalAddress(AF_INET),
1016 QueryDefaultLocalAddress(AF_INET6));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001017 if (changed || !sent_first_update_) {
1018 SignalNetworksChanged();
1019 sent_first_update_ = true;
1020 }
1021 }
honghaiz023f3ef2015-10-19 09:39:32 -07001022}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001023
honghaiz023f3ef2015-10-19 09:39:32 -07001024void BasicNetworkManager::UpdateNetworksContinually() {
1025 UpdateNetworksOnce();
Niels Möller27c14522022-02-07 16:44:21 +01001026 thread_->PostDelayedTask(ToQueuedTask(task_safety_flag_,
1027 [this] {
1028 RTC_DCHECK_RUN_ON(thread_);
1029 UpdateNetworksContinually();
1030 }),
1031 kNetworksUpdateIntervalMs);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001032}
1033
honghaizdb8cf502015-12-21 13:08:46 -08001034void BasicNetworkManager::DumpNetworks() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001035 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001036 NetworkList list;
honghaizdb8cf502015-12-21 13:08:46 -08001037 GetNetworks(&list);
Mirko Bonadei675513b2017-11-09 11:09:25 +01001038 RTC_LOG(LS_INFO) << "NetworkManager detected " << list.size() << " networks:";
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001039 for (const Network* network : list) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001040 RTC_LOG(LS_INFO) << network->ToString() << ": " << network->description()
1041 << ", active ? " << network->active()
1042 << ((network->ignored()) ? ", Ignored" : "");
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001043 }
1044}
1045
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001046NetworkBindingResult BasicNetworkManager::BindSocketToNetwork(
1047 int socket_fd,
1048 const IPAddress& address) {
1049 RTC_DCHECK_RUN_ON(thread_);
1050 std::string if_name;
1051 if (bind_using_ifname_) {
1052 Network* net = GetNetworkFromAddress(address);
1053 if (net != nullptr) {
1054 if_name = net->name();
1055 }
1056 }
1057 return network_monitor_->BindSocketToNetwork(socket_fd, address, if_name);
1058}
1059
Ali Tofigh7fa90572022-03-17 15:47:49 +01001060Network::Network(absl::string_view name,
1061 absl::string_view desc,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001062 const IPAddress& prefix,
1063 int prefix_length)
1064 : name_(name),
1065 description_(desc),
1066 prefix_(prefix),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001067 prefix_length_(prefix_length),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001068 key_(MakeNetworkKey(name, prefix, prefix_length)),
1069 scope_id_(0),
1070 ignored_(false),
1071 type_(ADAPTER_TYPE_UNKNOWN),
Jonas Oreland2105d642020-05-13 10:15:34 +02001072 preference_(0),
1073 use_differentiated_cellular_costs_(webrtc::field_trial::IsEnabled(
Jonas Orelandb477fc72021-08-23 12:16:33 +02001074 "WebRTC-UseDifferentiatedCellularCosts")),
1075 add_network_cost_to_vpn_(
1076 webrtc::field_trial::IsEnabled("WebRTC-AddNetworkCostToVpn")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001077
Ali Tofigh7fa90572022-03-17 15:47:49 +01001078Network::Network(absl::string_view name,
1079 absl::string_view desc,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001080 const IPAddress& prefix,
1081 int prefix_length,
1082 AdapterType type)
1083 : name_(name),
1084 description_(desc),
1085 prefix_(prefix),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001086 prefix_length_(prefix_length),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001087 key_(MakeNetworkKey(name, prefix, prefix_length)),
1088 scope_id_(0),
1089 ignored_(false),
1090 type_(type),
Jonas Oreland2105d642020-05-13 10:15:34 +02001091 preference_(0),
1092 use_differentiated_cellular_costs_(webrtc::field_trial::IsEnabled(
Jonas Orelandb477fc72021-08-23 12:16:33 +02001093 "WebRTC-UseDifferentiatedCellularCosts")),
1094 add_network_cost_to_vpn_(
1095 webrtc::field_trial::IsEnabled("WebRTC-AddNetworkCostToVpn")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001096
Steve Anton9de3aac2017-10-24 10:08:26 -07001097Network::Network(const Network&) = default;
1098
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001099Network::~Network() = default;
1100
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001101// Sets the addresses of this network. Returns true if the address set changed.
1102// Change detection is short circuited if the changed argument is true.
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001103bool Network::SetIPs(const std::vector<InterfaceAddress>& ips, bool changed) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001104 // Detect changes with a nested loop; n-squared but we expect on the order
1105 // of 2-3 addresses per network.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001106 changed = changed || ips.size() != ips_.size();
1107 if (!changed) {
1108 for (const InterfaceAddress& ip : ips) {
Steve Anton2acd1632019-03-25 13:48:30 -07001109 if (!absl::c_linear_search(ips_, ip)) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001110 changed = true;
1111 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001112 }
1113 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001114 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001115
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001116 ips_ = ips;
1117 return changed;
1118}
1119
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001120// Select the best IP address to use from this Network.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001121IPAddress Network::GetBestIP() const {
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001122 if (ips_.size() == 0) {
1123 return IPAddress();
1124 }
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001125
1126 if (prefix_.family() == AF_INET) {
1127 return static_cast<IPAddress>(ips_.at(0));
1128 }
1129
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001130 InterfaceAddress selected_ip, ula_ip;
1131
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001132 for (const InterfaceAddress& ip : ips_) {
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001133 // Ignore any address which has been deprecated already.
1134 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED)
1135 continue;
1136
1137 // ULA address should only be returned when we have no other
1138 // global IP.
1139 if (IPIsULA(static_cast<const IPAddress&>(ip))) {
1140 ula_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001141 continue;
1142 }
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001143 selected_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001144
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001145 // Search could stop once a temporary non-deprecated one is found.
1146 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_TEMPORARY)
1147 break;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001148 }
1149
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001150 // No proper global IPv6 address found, use ULA instead.
1151 if (IPIsUnspec(selected_ip) && !IPIsUnspec(ula_ip)) {
1152 selected_ip = ula_ip;
1153 }
1154
1155 return static_cast<IPAddress>(selected_ip);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001156}
1157
Qingsi Wang5ae259e2019-02-13 15:46:07 -08001158webrtc::MdnsResponderInterface* Network::GetMdnsResponder() const {
1159 if (mdns_responder_provider_ == nullptr) {
1160 return nullptr;
1161 }
1162 return mdns_responder_provider_->GetMdnsResponder();
1163}
1164
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001165uint16_t Network::GetCost() const {
1166 AdapterType type = IsVpn() ? underlying_type_for_vpn_ : type_;
Jonas Orelandb477fc72021-08-23 12:16:33 +02001167 return ComputeNetworkCostByType(type, IsVpn(),
1168 use_differentiated_cellular_costs_,
1169 add_network_cost_to_vpn_);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001170}
1171
Jonas Oreland30019052022-01-28 14:11:44 +01001172// This is the inverse of ComputeNetworkCostByType().
1173std::pair<rtc::AdapterType, bool /* vpn */>
1174Network::GuessAdapterFromNetworkCost(int network_cost) {
1175 switch (network_cost) {
1176 case kNetworkCostMin:
1177 return {rtc::ADAPTER_TYPE_ETHERNET, false};
1178 case kNetworkCostMin + kNetworkCostVpn:
1179 return {rtc::ADAPTER_TYPE_ETHERNET, true};
1180 case kNetworkCostLow:
1181 return {rtc::ADAPTER_TYPE_WIFI, false};
1182 case kNetworkCostLow + kNetworkCostVpn:
1183 return {rtc::ADAPTER_TYPE_WIFI, true};
1184 case kNetworkCostCellular:
1185 return {rtc::ADAPTER_TYPE_CELLULAR, false};
1186 case kNetworkCostCellular + kNetworkCostVpn:
1187 return {rtc::ADAPTER_TYPE_CELLULAR, true};
1188 case kNetworkCostCellular2G:
1189 return {rtc::ADAPTER_TYPE_CELLULAR_2G, false};
1190 case kNetworkCostCellular2G + kNetworkCostVpn:
1191 return {rtc::ADAPTER_TYPE_CELLULAR_2G, true};
1192 case kNetworkCostCellular3G:
1193 return {rtc::ADAPTER_TYPE_CELLULAR_3G, false};
1194 case kNetworkCostCellular3G + kNetworkCostVpn:
1195 return {rtc::ADAPTER_TYPE_CELLULAR_3G, true};
1196 case kNetworkCostCellular4G:
1197 return {rtc::ADAPTER_TYPE_CELLULAR_4G, false};
1198 case kNetworkCostCellular4G + kNetworkCostVpn:
1199 return {rtc::ADAPTER_TYPE_CELLULAR_4G, true};
1200 case kNetworkCostCellular5G:
1201 return {rtc::ADAPTER_TYPE_CELLULAR_5G, false};
1202 case kNetworkCostCellular5G + kNetworkCostVpn:
1203 return {rtc::ADAPTER_TYPE_CELLULAR_5G, true};
1204 case kNetworkCostUnknown:
1205 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1206 case kNetworkCostUnknown + kNetworkCostVpn:
1207 return {rtc::ADAPTER_TYPE_UNKNOWN, true};
1208 case kNetworkCostMax:
1209 return {rtc::ADAPTER_TYPE_ANY, false};
1210 case kNetworkCostMax + kNetworkCostVpn:
1211 return {rtc::ADAPTER_TYPE_ANY, true};
1212 }
1213 RTC_LOG(LS_VERBOSE) << "Unknown network cost: " << network_cost;
1214 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1215}
1216
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001217std::string Network::ToString() const {
Jonas Olsson366a50c2018-09-06 13:41:30 +02001218 rtc::StringBuilder ss;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001219 // Print out the first space-terminated token of the network desc, plus
1220 // the IP address.
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001221 ss << "Net[" << description_.substr(0, description_.find(' ')) << ":"
1222 << prefix_.ToSensitiveString() << "/" << prefix_length_ << ":"
1223 << AdapterTypeToString(type_);
1224 if (IsVpn()) {
1225 ss << "/" << AdapterTypeToString(underlying_type_for_vpn_);
1226 }
Qingsi Wang10a0e512018-05-16 13:37:03 -07001227 ss << ":id=" << id_ << "]";
Jonas Olsson84df1c72018-09-14 16:59:32 +02001228 return ss.Release();
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001229}
1230
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001231void BasicNetworkManager::set_vpn_list(const std::vector<NetworkMask>& vpn) {
1232 if (thread_ == nullptr) {
1233 vpn_ = vpn;
1234 } else {
1235 thread_->Invoke<void>(RTC_FROM_HERE, [this, vpn] { vpn_ = vpn; });
1236 }
1237}
1238
1239bool BasicNetworkManager::IsConfiguredVpn(IPAddress prefix,
1240 int prefix_length) const {
1241 RTC_DCHECK_RUN_ON(thread_);
1242 for (const auto& vpn : vpn_) {
1243 if (prefix_length >= vpn.prefix_length()) {
1244 auto copy = TruncateIP(prefix, vpn.prefix_length());
1245 if (copy == vpn.address()) {
1246 return true;
1247 }
1248 }
1249 }
1250 return false;
1251}
1252
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001253} // namespace rtc