blob: 0b5f3e94ac53c88293800a0d508154ee43ec82d9 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
oprypin1ea631f2017-08-18 00:15:19 -070013#include <stdlib.h>
14
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070015#include <algorithm>
jbauch555604a2016-04-26 03:13:22 -070016#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#include <vector>
oprypin1ea631f2017-08-18 00:15:19 -070018
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070019#include "absl/algorithm/container.h"
Mirko Bonadei06d35592020-04-01 13:43:08 +020020#include "absl/strings/match.h"
Ali Tofigh7fa90572022-03-17 15:47:49 +010021#include "absl/strings/string_view.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020022#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080023#include "rtc_base/net_helpers.h"
24#include "rtc_base/network_monitor.h"
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -070025#include "rtc_base/network_monitor_factory.h"
Niels Mölleraa373162021-09-28 16:09:07 +020026#include "rtc_base/physical_socket_server.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000027#if defined(WEBRTC_POSIX)
Henrik Kjellander00725112017-06-30 15:14:45 +020028#include <net/if.h>
Yves Gerey665174f2018-06-19 15:03:05 +020029#include <sys/types.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020030
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020031#include "rtc_base/ifaddrs_converter.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080032#endif // defined(WEBRTC_POSIX)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020033#include "rtc_base/gunit.h"
Steve Anton2acd1632019-03-25 13:48:30 -070034#include "test/gmock.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000035#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +010036#include "rtc_base/logging.h" // For RTC_LOG_GLE
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000037#endif
Jonas Oreland47fa08f2020-12-05 18:09:13 +010038#include "test/field_trial.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000039
Steve Anton2acd1632019-03-25 13:48:30 -070040using ::testing::Contains;
41using ::testing::Not;
42using ::testing::UnorderedElementsAre;
43using ::testing::UnorderedElementsAreArray;
44
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000045namespace rtc {
46
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080047namespace {
48
Ali Tofigh7fa90572022-03-17 15:47:49 +010049IPAddress IPFromString(absl::string_view str) {
Jonas Oreland2ee0e642021-08-25 15:43:02 +020050 IPAddress ip;
51 RTC_CHECK(IPFromString(str, &ip));
52 return ip;
53}
54
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000055class FakeNetworkMonitor : public NetworkMonitorInterface {
honghaiz023f3ef2015-10-19 09:39:32 -070056 public:
honghaizcec0a082016-01-15 14:49:09 -080057 void Start() override { started_ = true; }
58 void Stop() override { started_ = false; }
59 bool started() { return started_; }
Ali Tofigh7fa90572022-03-17 15:47:49 +010060 AdapterType GetAdapterType(absl::string_view if_name) override {
Honghai Zhang351d77b2016-05-20 15:08:29 -070061 // Note that the name matching rules are different from the
62 // GetAdapterTypeFromName in NetworkManager.
Mirko Bonadei06d35592020-04-01 13:43:08 +020063 if (absl::StartsWith(if_name, "wifi")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070064 return ADAPTER_TYPE_WIFI;
65 }
Mirko Bonadei06d35592020-04-01 13:43:08 +020066 if (absl::StartsWith(if_name, "cellular")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070067 return ADAPTER_TYPE_CELLULAR;
68 }
honghaiza7ad7c32016-02-02 12:54:14 -080069 return ADAPTER_TYPE_UNKNOWN;
70 }
Ali Tofigh7fa90572022-03-17 15:47:49 +010071 AdapterType GetVpnUnderlyingAdapterType(absl::string_view if_name) override {
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000072 return ADAPTER_TYPE_UNKNOWN;
73 }
Ali Tofigh7fa90572022-03-17 15:47:49 +010074 NetworkPreference GetNetworkPreference(absl::string_view if_name) override {
Jonas Orelandf7721fb2020-08-07 11:08:34 +020075 return NetworkPreference::NEUTRAL;
76 }
honghaizcec0a082016-01-15 14:49:09 -080077
Ali Tofigh7fa90572022-03-17 15:47:49 +010078 bool IsAdapterAvailable(absl::string_view if_name) override {
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070079 return absl::c_count(unavailable_adapters_, if_name) == 0;
80 }
81
82 // Used to test IsAdapterAvailable.
83 void set_unavailable_adapters(std::vector<std::string> unavailable_adapters) {
84 unavailable_adapters_ = unavailable_adapters;
85 }
86
Jonas Oreland6ca955a2021-03-15 08:27:43 +000087 bool SupportsBindSocketToNetwork() const override { return true; }
88
Ali Tofigh7fa90572022-03-17 15:47:49 +010089 NetworkBindingResult BindSocketToNetwork(int socket_fd,
90 const IPAddress& address,
91 absl::string_view if_name) override {
Jonas Oreland6ca955a2021-03-15 08:27:43 +000092 if (absl::c_count(addresses_, address) > 0) {
93 return NetworkBindingResult::SUCCESS;
94 }
95
96 for (auto const& iter : adapters_) {
Ali Tofigh7fa90572022-03-17 15:47:49 +010097 if (if_name.find(iter) != absl::string_view::npos) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +000098 return NetworkBindingResult::SUCCESS;
99 }
100 }
101 return NetworkBindingResult::ADDRESS_NOT_FOUND;
102 }
103
104 void set_ip_addresses(std::vector<IPAddress> addresses) {
105 addresses_ = addresses;
106 }
107
108 void set_adapters(std::vector<std::string> adapters) { adapters_ = adapters; }
109
Mirko Bonadei37077932021-07-27 17:00:58 +0200110 void InovkeNetworksChangedCallbackForTesting() {
111 InvokeNetworksChangedCallback();
112 }
113
honghaizcec0a082016-01-15 14:49:09 -0800114 private:
115 bool started_ = false;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000116 std::vector<std::string> adapters_;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700117 std::vector<std::string> unavailable_adapters_;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000118 std::vector<IPAddress> addresses_;
honghaiz023f3ef2015-10-19 09:39:32 -0700119};
120
121class FakeNetworkMonitorFactory : public NetworkMonitorFactory {
122 public:
123 FakeNetworkMonitorFactory() {}
honghaizcec0a082016-01-15 14:49:09 -0800124 NetworkMonitorInterface* CreateNetworkMonitor() override {
honghaiz023f3ef2015-10-19 09:39:32 -0700125 return new FakeNetworkMonitor();
126 }
127};
128
Qingsi Wang10a0e512018-05-16 13:37:03 -0700129bool SameNameAndPrefix(const rtc::Network& a, const rtc::Network& b) {
130 if (a.name() != b.name()) {
Harald Alvestrand97597c02021-11-04 12:01:23 +0000131 RTC_LOG(LS_INFO) << "Different interface names.";
Qingsi Wang10a0e512018-05-16 13:37:03 -0700132 return false;
133 }
134 if (a.prefix_length() != b.prefix_length() || a.prefix() != b.prefix()) {
Harald Alvestrand97597c02021-11-04 12:01:23 +0000135 RTC_LOG(LS_INFO) << "Different IP prefixes.";
Qingsi Wang10a0e512018-05-16 13:37:03 -0700136 return false;
137 }
138 return true;
139}
140
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800141} // namespace
142
Mirko Bonadei6a489f22019-04-09 15:11:12 +0200143class NetworkTest : public ::testing::Test, public sigslot::has_slots<> {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000144 public:
145 NetworkTest() : callback_called_(false) {}
146
Yves Gerey665174f2018-06-19 15:03:05 +0200147 void OnNetworksChanged() { callback_called_ = true; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000148
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000149 NetworkManager::Stats MergeNetworkList(
150 BasicNetworkManager& network_manager,
151 const NetworkManager::NetworkList& list,
152 bool* changed) {
153 NetworkManager::Stats stats;
154 network_manager.MergeNetworkList(list, changed, &stats);
155 return stats;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000156 }
157
158 bool IsIgnoredNetwork(BasicNetworkManager& network_manager,
159 const Network& network) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700160 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000161 return network_manager.IsIgnoredNetwork(network);
162 }
163
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700164 IPAddress QueryDefaultLocalAddress(BasicNetworkManager& network_manager,
165 int family) {
166 RTC_DCHECK_RUN_ON(network_manager.thread_);
167 return network_manager.QueryDefaultLocalAddress(family);
168 }
169
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000170 NetworkManager::NetworkList GetNetworks(
Yves Gerey665174f2018-06-19 15:03:05 +0200171 const BasicNetworkManager& network_manager,
172 bool include_ignored) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700173 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000174 NetworkManager::NetworkList list;
175 network_manager.CreateNetworks(include_ignored, &list);
176 return list;
177 }
178
honghaizcec0a082016-01-15 14:49:09 -0800179 FakeNetworkMonitor* GetNetworkMonitor(BasicNetworkManager& network_manager) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700180 RTC_DCHECK_RUN_ON(network_manager.thread_);
honghaizcec0a082016-01-15 14:49:09 -0800181 return static_cast<FakeNetworkMonitor*>(
182 network_manager.network_monitor_.get());
honghaiz023f3ef2015-10-19 09:39:32 -0700183 }
184 void ClearNetworks(BasicNetworkManager& network_manager) {
185 for (const auto& kv : network_manager.networks_map_) {
186 delete kv.second;
187 }
188 network_manager.networks_.clear();
189 network_manager.networks_map_.clear();
190 }
191
Honghai Zhang351d77b2016-05-20 15:08:29 -0700192 AdapterType GetAdapterType(BasicNetworkManager& network_manager) {
193 BasicNetworkManager::NetworkList list;
194 network_manager.GetNetworks(&list);
nissec16fa5e2017-02-07 07:18:43 -0800195 RTC_CHECK_EQ(1, list.size());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700196 return list[0]->type();
197 }
198
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000199#if defined(WEBRTC_POSIX)
200 // Separated from CreateNetworks for tests.
201 static void CallConvertIfAddrs(const BasicNetworkManager& network_manager,
202 struct ifaddrs* interfaces,
203 bool include_ignored,
204 NetworkManager::NetworkList* networks) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700205 RTC_DCHECK_RUN_ON(network_manager.thread_);
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800206 // Use the base IfAddrsConverter for test cases.
jbauch555604a2016-04-26 03:13:22 -0700207 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(new IfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800208 network_manager.ConvertIfAddrs(interfaces, ifaddrs_converter.get(),
209 include_ignored, networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000210 }
honghaizdb8cf502015-12-21 13:08:46 -0800211
Ali Tofigh7fa90572022-03-17 15:47:49 +0100212 struct sockaddr_in6* CreateIpv6Addr(absl::string_view ip_string,
honghaizdb8cf502015-12-21 13:08:46 -0800213 uint32_t scope_id) {
Yves Gerey665174f2018-06-19 15:03:05 +0200214 struct sockaddr_in6* ipv6_addr =
215 static_cast<struct sockaddr_in6*>(malloc(sizeof(struct sockaddr_in6)));
honghaizdb8cf502015-12-21 13:08:46 -0800216 memset(ipv6_addr, 0, sizeof(struct sockaddr_in6));
217 ipv6_addr->sin6_family = AF_INET6;
218 ipv6_addr->sin6_scope_id = scope_id;
219 IPAddress ip;
220 IPFromString(ip_string, &ip);
221 ipv6_addr->sin6_addr = ip.ipv6_address();
222 return ipv6_addr;
223 }
224
225 // Pointers created here need to be released via ReleaseIfAddrs.
226 struct ifaddrs* AddIpv6Address(struct ifaddrs* list,
227 char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100228 absl::string_view ipv6_address,
229 absl::string_view ipv6_netmask,
honghaizdb8cf502015-12-21 13:08:46 -0800230 uint32_t scope_id) {
231 struct ifaddrs* if_addr = new struct ifaddrs;
232 memset(if_addr, 0, sizeof(struct ifaddrs));
233 if_addr->ifa_name = if_name;
234 if_addr->ifa_addr = reinterpret_cast<struct sockaddr*>(
235 CreateIpv6Addr(ipv6_address, scope_id));
236 if_addr->ifa_netmask =
237 reinterpret_cast<struct sockaddr*>(CreateIpv6Addr(ipv6_netmask, 0));
238 if_addr->ifa_next = list;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800239 if_addr->ifa_flags = IFF_RUNNING;
honghaizdb8cf502015-12-21 13:08:46 -0800240 return if_addr;
241 }
242
Honghai Zhang351d77b2016-05-20 15:08:29 -0700243 struct ifaddrs* InstallIpv6Network(char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100244 absl::string_view ipv6_address,
245 absl::string_view ipv6_mask,
Honghai Zhang351d77b2016-05-20 15:08:29 -0700246 BasicNetworkManager& network_manager) {
247 ifaddrs* addr_list = nullptr;
248 addr_list = AddIpv6Address(addr_list, if_name, ipv6_address, ipv6_mask, 0);
249 NetworkManager::NetworkList result;
250 bool changed;
251 NetworkManager::Stats stats;
252 CallConvertIfAddrs(network_manager, addr_list, true, &result);
253 network_manager.MergeNetworkList(result, &changed, &stats);
254 return addr_list;
255 }
256
Ali Tofigh7fa90572022-03-17 15:47:49 +0100257 struct sockaddr_in* CreateIpv4Addr(absl::string_view ip_string) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800258 struct sockaddr_in* ipv4_addr =
259 static_cast<struct sockaddr_in*>(malloc(sizeof(struct sockaddr_in)));
260 memset(ipv4_addr, 0, sizeof(struct sockaddr_in));
261 ipv4_addr->sin_family = AF_INET;
262 IPAddress ip;
263 IPFromString(ip_string, &ip);
264 ipv4_addr->sin_addr = ip.ipv4_address();
265 return ipv4_addr;
266 }
267
268 // Pointers created here need to be released via ReleaseIfAddrs.
269 struct ifaddrs* AddIpv4Address(struct ifaddrs* list,
270 char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100271 absl::string_view ipv4_address,
272 absl::string_view ipv4_netmask) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800273 struct ifaddrs* if_addr = new struct ifaddrs;
274 memset(if_addr, 0, sizeof(struct ifaddrs));
275 if_addr->ifa_name = if_name;
276 if_addr->ifa_addr =
277 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_address));
278 if_addr->ifa_netmask =
279 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_netmask));
280 if_addr->ifa_next = list;
281 if_addr->ifa_flags = IFF_RUNNING;
282 return if_addr;
283 }
284
285 struct ifaddrs* InstallIpv4Network(char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100286 absl::string_view ipv4_address,
287 absl::string_view ipv4_mask,
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800288 BasicNetworkManager& network_manager) {
289 ifaddrs* addr_list = nullptr;
290 addr_list = AddIpv4Address(addr_list, if_name, ipv4_address, ipv4_mask);
291 NetworkManager::NetworkList result;
292 bool changed;
293 NetworkManager::Stats stats;
294 CallConvertIfAddrs(network_manager, addr_list, true, &result);
295 network_manager.MergeNetworkList(result, &changed, &stats);
296 return addr_list;
297 }
298
honghaizdb8cf502015-12-21 13:08:46 -0800299 void ReleaseIfAddrs(struct ifaddrs* list) {
300 struct ifaddrs* if_addr = list;
301 while (if_addr != nullptr) {
302 struct ifaddrs* next_addr = if_addr->ifa_next;
oprypin1ea631f2017-08-18 00:15:19 -0700303 free(if_addr->ifa_addr);
304 free(if_addr->ifa_netmask);
honghaizdb8cf502015-12-21 13:08:46 -0800305 delete if_addr;
306 if_addr = next_addr;
307 }
308 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000309#endif // defined(WEBRTC_POSIX)
310
311 protected:
312 bool callback_called_;
313};
314
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800315class TestBasicNetworkManager : public BasicNetworkManager {
316 public:
Niels Mölleraa373162021-09-28 16:09:07 +0200317 TestBasicNetworkManager(NetworkMonitorFactory* network_monitor_factory,
318 SocketFactory* socket_factory)
319 : BasicNetworkManager(network_monitor_factory, socket_factory) {}
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800320 using BasicNetworkManager::QueryDefaultLocalAddress;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800321 using BasicNetworkManager::set_default_local_addresses;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800322};
323
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000324// Test that the Network ctor works properly.
325TEST_F(NetworkTest, TestNetworkConstruct) {
326 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
327 IPAddress(0x12345600U), 24);
328 EXPECT_EQ("test_eth0", ipv4_network1.name());
329 EXPECT_EQ("Test Network Adapter 1", ipv4_network1.description());
330 EXPECT_EQ(IPAddress(0x12345600U), ipv4_network1.prefix());
331 EXPECT_EQ(24, ipv4_network1.prefix_length());
332 EXPECT_FALSE(ipv4_network1.ignored());
333}
334
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000335TEST_F(NetworkTest, TestIsIgnoredNetworkIgnoresIPsStartingWith0) {
336 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
337 IPAddress(0x12345600U), 24, ADAPTER_TYPE_ETHERNET);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000338 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000339 IPAddress(0x010000U), 24, ADAPTER_TYPE_ETHERNET);
Niels Möller539f3e12021-11-26 16:33:19 +0100340 PhysicalSocketServer socket_server;
341 BasicNetworkManager network_manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700342 network_manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000343 EXPECT_FALSE(IsIgnoredNetwork(network_manager, ipv4_network1));
344 EXPECT_TRUE(IsIgnoredNetwork(network_manager, ipv4_network2));
345}
346
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000347// TODO(phoglund): Remove when ignore list goes away.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000348TEST_F(NetworkTest, TestIgnoreList) {
Yves Gerey665174f2018-06-19 15:03:05 +0200349 Network ignore_me("ignore_me", "Ignore me please!", IPAddress(0x12345600U),
350 24);
351 Network include_me("include_me", "Include me please!", IPAddress(0x12345600U),
352 24);
Niels Möller539f3e12021-11-26 16:33:19 +0100353 PhysicalSocketServer socket_server;
354 BasicNetworkManager default_network_manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700355 default_network_manager.StartUpdating();
356 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, ignore_me));
357 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, include_me));
358
Niels Möller539f3e12021-11-26 16:33:19 +0100359 BasicNetworkManager ignoring_network_manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000360 std::vector<std::string> ignore_list;
361 ignore_list.push_back("ignore_me");
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700362 ignoring_network_manager.set_network_ignore_list(ignore_list);
363 ignoring_network_manager.StartUpdating();
364 EXPECT_TRUE(IsIgnoredNetwork(ignoring_network_manager, ignore_me));
365 EXPECT_FALSE(IsIgnoredNetwork(ignoring_network_manager, include_me));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000366}
367
368// Test is failing on Windows opt: b/11288214
369TEST_F(NetworkTest, DISABLED_TestCreateNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +0100370 PhysicalSocketServer socket_server;
371 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000372 NetworkManager::NetworkList result = GetNetworks(manager, true);
373 // We should be able to bind to any addresses we find.
374 NetworkManager::NetworkList::iterator it;
Yves Gerey665174f2018-06-19 15:03:05 +0200375 for (it = result.begin(); it != result.end(); ++it) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000376 sockaddr_storage storage;
377 memset(&storage, 0, sizeof(storage));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000378 IPAddress ip = (*it)->GetBestIP();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000379 SocketAddress bindaddress(ip, 0);
380 bindaddress.SetScopeID((*it)->scope_id());
Niels Möllerd0b88792021-08-12 10:32:30 +0200381 // TODO(thaloun): Use rtc::Socket once it supports IPv6.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000382 int fd = static_cast<int>(socket(ip.family(), SOCK_STREAM, IPPROTO_TCP));
383 if (fd > 0) {
384 size_t ipsize = bindaddress.ToSockAddrStorage(&storage);
385 EXPECT_GE(ipsize, 0U);
Yves Gerey665174f2018-06-19 15:03:05 +0200386 int success = ::bind(fd, reinterpret_cast<sockaddr*>(&storage),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000387 static_cast<int>(ipsize));
388#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +0100389 if (success)
390 RTC_LOG_GLE(LS_ERROR) << "Socket bind failed.";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000391#endif
392 EXPECT_EQ(0, success);
393#if defined(WEBRTC_WIN)
394 closesocket(fd);
395#else
396 close(fd);
397#endif
398 }
399 delete (*it);
400 }
401}
402
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700403// Test StartUpdating() and StopUpdating(). network_permission_state starts with
404// ALLOWED.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000405TEST_F(NetworkTest, TestUpdateNetworks) {
Niels Mölleraa373162021-09-28 16:09:07 +0200406 PhysicalSocketServer socket_server;
407 BasicNetworkManager manager(nullptr, &socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200408 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
409 &NetworkTest::OnNetworksChanged);
guoweisea1012b2015-08-21 09:06:28 -0700410 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
411 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000412 manager.StartUpdating();
413 Thread::Current()->ProcessMessages(0);
414 EXPECT_TRUE(callback_called_);
415 callback_called_ = false;
416 // Callback should be triggered immediately when StartUpdating
417 // is called, after network update signal is already sent.
418 manager.StartUpdating();
419 EXPECT_TRUE(manager.started());
420 Thread::Current()->ProcessMessages(0);
421 EXPECT_TRUE(callback_called_);
422 manager.StopUpdating();
423 EXPECT_TRUE(manager.started());
424 manager.StopUpdating();
guoweisea1012b2015-08-21 09:06:28 -0700425 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
426 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000427 EXPECT_FALSE(manager.started());
428 manager.StopUpdating();
429 EXPECT_FALSE(manager.started());
430 callback_called_ = false;
431 // Callback should be triggered immediately after StartUpdating is called
432 // when start_count_ is reset to 0.
433 manager.StartUpdating();
434 Thread::Current()->ProcessMessages(0);
435 EXPECT_TRUE(callback_called_);
436}
437
438// Verify that MergeNetworkList() merges network lists properly.
439TEST_F(NetworkTest, TestBasicMergeNetworkList) {
440 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
441 IPAddress(0x12345600U), 24);
442 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
443 IPAddress(0x00010000U), 16);
444 ipv4_network1.AddIP(IPAddress(0x12345678));
445 ipv4_network2.AddIP(IPAddress(0x00010004));
Niels Möller539f3e12021-11-26 16:33:19 +0100446 PhysicalSocketServer socket_server;
447 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000448
449 // Add ipv4_network1 to the list of networks.
450 NetworkManager::NetworkList list;
451 list.push_back(new Network(ipv4_network1));
452 bool changed;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000453 NetworkManager::Stats stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000454 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000455 EXPECT_EQ(stats.ipv6_network_count, 0);
456 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000457 list.clear();
458
459 manager.GetNetworks(&list);
460 EXPECT_EQ(1U, list.size());
Qingsi Wang10a0e512018-05-16 13:37:03 -0700461 EXPECT_TRUE(SameNameAndPrefix(ipv4_network1, *list[0]));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000462 Network* net1 = list[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700463 uint16_t net_id1 = net1->id();
464 EXPECT_EQ(1, net_id1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000465 list.clear();
466
467 // Replace ipv4_network1 with ipv4_network2.
468 list.push_back(new Network(ipv4_network2));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000469 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000470 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000471 EXPECT_EQ(stats.ipv6_network_count, 0);
472 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000473 list.clear();
474
475 manager.GetNetworks(&list);
476 EXPECT_EQ(1U, list.size());
Qingsi Wang10a0e512018-05-16 13:37:03 -0700477 EXPECT_TRUE(SameNameAndPrefix(ipv4_network2, *list[0]));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000478 Network* net2 = list[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700479 uint16_t net_id2 = net2->id();
480 // Network id will increase.
481 EXPECT_LT(net_id1, net_id2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000482 list.clear();
483
484 // Add Network2 back.
485 list.push_back(new Network(ipv4_network1));
486 list.push_back(new Network(ipv4_network2));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000487 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000488 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000489 EXPECT_EQ(stats.ipv6_network_count, 0);
490 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000491 list.clear();
492
493 // Verify that we get previous instances of Network objects.
494 manager.GetNetworks(&list);
495 EXPECT_EQ(2U, list.size());
496 EXPECT_TRUE((net1 == list[0] && net2 == list[1]) ||
497 (net1 == list[1] && net2 == list[0]));
honghaiza0c44ea2016-03-23 16:07:48 -0700498 EXPECT_TRUE((net_id1 == list[0]->id() && net_id2 == list[1]->id()) ||
499 (net_id1 == list[1]->id() && net_id2 == list[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000500 list.clear();
501
502 // Call MergeNetworkList() again and verify that we don't get update
503 // notification.
504 list.push_back(new Network(ipv4_network2));
505 list.push_back(new Network(ipv4_network1));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000506 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000507 EXPECT_FALSE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000508 EXPECT_EQ(stats.ipv6_network_count, 0);
509 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000510 list.clear();
511
512 // Verify that we get previous instances of Network objects.
513 manager.GetNetworks(&list);
514 EXPECT_EQ(2U, list.size());
515 EXPECT_TRUE((net1 == list[0] && net2 == list[1]) ||
516 (net1 == list[1] && net2 == list[0]));
Olga Sharonovaf74d2ce2020-03-30 08:20:05 +0000517 EXPECT_TRUE((net_id1 == list[0]->id() && net_id2 == list[1]->id()) ||
518 (net_id1 == list[1]->id() && net_id2 == list[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000519 list.clear();
520}
521
522// Sets up some test IPv6 networks and appends them to list.
523// Four networks are added - public and link local, for two interfaces.
524void SetupNetworks(NetworkManager::NetworkList* list) {
525 IPAddress ip;
526 IPAddress prefix;
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000527 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:ef12", &ip));
528 EXPECT_TRUE(IPFromString("abcd::", &prefix));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000529 // First, fake link-locals.
530 Network ipv6_eth0_linklocalnetwork("test_eth0", "Test NetworkAdapter 1",
531 prefix, 64);
532 ipv6_eth0_linklocalnetwork.AddIP(ip);
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000533 EXPECT_TRUE(IPFromString("abcd::5678:abcd:ef12:3456", &ip));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000534 Network ipv6_eth1_linklocalnetwork("test_eth1", "Test NetworkAdapter 2",
535 prefix, 64);
536 ipv6_eth1_linklocalnetwork.AddIP(ip);
537 // Public networks:
538 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip));
539 prefix = TruncateIP(ip, 64);
540 Network ipv6_eth0_publicnetwork1_ip1("test_eth0", "Test NetworkAdapter 1",
541 prefix, 64);
542 ipv6_eth0_publicnetwork1_ip1.AddIP(ip);
543 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
544 prefix = TruncateIP(ip, 64);
545 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 1",
546 prefix, 64);
547 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
548 list->push_back(new Network(ipv6_eth0_linklocalnetwork));
549 list->push_back(new Network(ipv6_eth1_linklocalnetwork));
550 list->push_back(new Network(ipv6_eth0_publicnetwork1_ip1));
551 list->push_back(new Network(ipv6_eth1_publicnetwork1_ip1));
552}
553
554// Test that the basic network merging case works.
555TEST_F(NetworkTest, TestIPv6MergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +0100556 PhysicalSocketServer socket_server;
557 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200558 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
559 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000560 NetworkManager::NetworkList original_list;
561 SetupNetworks(&original_list);
562 bool changed = false;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000563 NetworkManager::Stats stats =
564 MergeNetworkList(manager, original_list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000565 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000566 EXPECT_EQ(stats.ipv6_network_count, 4);
567 EXPECT_EQ(stats.ipv4_network_count, 0);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000568 NetworkManager::NetworkList list;
569 manager.GetNetworks(&list);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000570 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700571 EXPECT_THAT(list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000572}
573
574// Tests that when two network lists that describe the same set of networks are
575// merged, that the changed callback is not called, and that the original
576// objects remain in the result list.
577TEST_F(NetworkTest, TestNoChangeMerge) {
Niels Möller539f3e12021-11-26 16:33:19 +0100578 PhysicalSocketServer socket_server;
579 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200580 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
581 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000582 NetworkManager::NetworkList original_list;
583 SetupNetworks(&original_list);
584 bool changed = false;
585 MergeNetworkList(manager, original_list, &changed);
586 EXPECT_TRUE(changed);
587 // Second list that describes the same networks but with new objects.
588 NetworkManager::NetworkList second_list;
589 SetupNetworks(&second_list);
590 changed = false;
591 MergeNetworkList(manager, second_list, &changed);
592 EXPECT_FALSE(changed);
593 NetworkManager::NetworkList resulting_list;
594 manager.GetNetworks(&resulting_list);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000595 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700596 EXPECT_THAT(resulting_list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000597 // Doublecheck that the new networks aren't in the list.
Steve Anton2acd1632019-03-25 13:48:30 -0700598 for (const Network* network : second_list) {
599 EXPECT_THAT(resulting_list, Not(Contains(network)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000600 }
601}
602
603// Test that we can merge a network that is the same as another network but with
604// a different IP. The original network should remain in the list, but have its
605// IP changed.
606TEST_F(NetworkTest, MergeWithChangedIP) {
Niels Möller539f3e12021-11-26 16:33:19 +0100607 PhysicalSocketServer socket_server;
608 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200609 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
610 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000611 NetworkManager::NetworkList original_list;
612 SetupNetworks(&original_list);
613 // Make a network that we're going to change.
614 IPAddress ip;
615 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip));
616 IPAddress prefix = TruncateIP(ip, 64);
Yves Gerey665174f2018-06-19 15:03:05 +0200617 Network* network_to_change =
618 new Network("test_eth0", "Test Network Adapter 1", prefix, 64);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000619 Network* changed_network = new Network(*network_to_change);
620 network_to_change->AddIP(ip);
621 IPAddress changed_ip;
622 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip));
623 changed_network->AddIP(changed_ip);
624 original_list.push_back(network_to_change);
625 bool changed = false;
626 MergeNetworkList(manager, original_list, &changed);
627 NetworkManager::NetworkList second_list;
628 SetupNetworks(&second_list);
629 second_list.push_back(changed_network);
630 changed = false;
631 MergeNetworkList(manager, second_list, &changed);
632 EXPECT_TRUE(changed);
633 NetworkManager::NetworkList list;
634 manager.GetNetworks(&list);
635 EXPECT_EQ(original_list.size(), list.size());
636 // Make sure the original network is still in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700637 EXPECT_THAT(list, Contains(network_to_change));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000638 EXPECT_EQ(changed_ip, network_to_change->GetIPs().at(0));
639}
640
Mirko Bonadei9b88e292022-03-18 13:35:27 +0100641// TODO(bugs.webrtc.org/13846): Re-enable when the ASan issue is fixed.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000642// Testing a similar case to above, but checking that a network can be updated
643// with additional IPs (not just a replacement).
Mirko Bonadei9b88e292022-03-18 13:35:27 +0100644TEST_F(NetworkTest, DISABLED_TestMultipleIPMergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +0100645 PhysicalSocketServer socket_server;
646 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200647 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
648 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000649 NetworkManager::NetworkList original_list;
650 SetupNetworks(&original_list);
651 bool changed = false;
652 MergeNetworkList(manager, original_list, &changed);
653 EXPECT_TRUE(changed);
654 IPAddress ip;
655 IPAddress check_ip;
656 IPAddress prefix;
657 // Add a second IP to the public network on eth0 (2401:fa00:4:1000/64).
658 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip));
659 prefix = TruncateIP(ip, 64);
660 Network ipv6_eth0_publicnetwork1_ip2("test_eth0", "Test NetworkAdapter 1",
661 prefix, 64);
662 // This is the IP that already existed in the public network on eth0.
663 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip));
664 ipv6_eth0_publicnetwork1_ip2.AddIP(ip);
665 original_list.push_back(new Network(ipv6_eth0_publicnetwork1_ip2));
666 changed = false;
667 MergeNetworkList(manager, original_list, &changed);
668 EXPECT_TRUE(changed);
669 // There should still be four networks.
670 NetworkManager::NetworkList list;
671 manager.GetNetworks(&list);
672 EXPECT_EQ(4U, list.size());
673 // Check the gathered IPs.
674 int matchcount = 0;
675 for (NetworkManager::NetworkList::iterator it = list.begin();
676 it != list.end(); ++it) {
Qingsi Wang10a0e512018-05-16 13:37:03 -0700677 if (SameNameAndPrefix(**it, *original_list[2])) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000678 ++matchcount;
679 EXPECT_EQ(1, matchcount);
680 // This should be the same network object as before.
681 EXPECT_EQ((*it), original_list[2]);
682 // But with two addresses now.
Steve Anton2acd1632019-03-25 13:48:30 -0700683 EXPECT_THAT((*it)->GetIPs(),
684 UnorderedElementsAre(InterfaceAddress(check_ip),
685 InterfaceAddress(ip)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000686 } else {
687 // Check the IP didn't get added anywhere it wasn't supposed to.
Steve Anton2acd1632019-03-25 13:48:30 -0700688 EXPECT_THAT((*it)->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000689 }
690 }
691}
692
693// Test that merge correctly distinguishes multiple networks on an interface.
694TEST_F(NetworkTest, TestMultiplePublicNetworksOnOneInterfaceMerge) {
Niels Möller539f3e12021-11-26 16:33:19 +0100695 PhysicalSocketServer socket_server;
696 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200697 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
698 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000699 NetworkManager::NetworkList original_list;
700 SetupNetworks(&original_list);
701 bool changed = false;
702 MergeNetworkList(manager, original_list, &changed);
703 EXPECT_TRUE(changed);
704 IPAddress ip;
705 IPAddress prefix;
706 // A second network for eth0.
707 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip));
708 prefix = TruncateIP(ip, 64);
709 Network ipv6_eth0_publicnetwork2_ip1("test_eth0", "Test NetworkAdapter 1",
710 prefix, 64);
711 ipv6_eth0_publicnetwork2_ip1.AddIP(ip);
712 original_list.push_back(new Network(ipv6_eth0_publicnetwork2_ip1));
713 changed = false;
714 MergeNetworkList(manager, original_list, &changed);
715 EXPECT_TRUE(changed);
716 // There should be five networks now.
717 NetworkManager::NetworkList list;
718 manager.GetNetworks(&list);
719 EXPECT_EQ(5U, list.size());
720 // Check the resulting addresses.
721 for (NetworkManager::NetworkList::iterator it = list.begin();
722 it != list.end(); ++it) {
723 if ((*it)->prefix() == ipv6_eth0_publicnetwork2_ip1.prefix() &&
724 (*it)->name() == ipv6_eth0_publicnetwork2_ip1.name()) {
725 // Check the new network has 1 IP and that it's the correct one.
726 EXPECT_EQ(1U, (*it)->GetIPs().size());
727 EXPECT_EQ(ip, (*it)->GetIPs().at(0));
728 } else {
729 // Check the IP didn't get added anywhere it wasn't supposed to.
Steve Anton2acd1632019-03-25 13:48:30 -0700730 EXPECT_THAT((*it)->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000731 }
732 }
733}
734
honghaizdb8cf502015-12-21 13:08:46 -0800735// Test that DumpNetworks does not crash.
736TEST_F(NetworkTest, TestCreateAndDumpNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +0100737 PhysicalSocketServer socket_server;
738 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700739 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800740 NetworkManager::NetworkList list = GetNetworks(manager, true);
741 bool changed;
742 MergeNetworkList(manager, list, &changed);
743 manager.DumpNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000744}
745
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100746TEST_F(NetworkTest, TestIPv6Toggle) {
Niels Möller539f3e12021-11-26 16:33:19 +0100747 PhysicalSocketServer socket_server;
748 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700749 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000750 bool ipv6_found = false;
751 NetworkManager::NetworkList list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000752 list = GetNetworks(manager, true);
753 for (NetworkManager::NetworkList::iterator it = list.begin();
754 it != list.end(); ++it) {
755 if ((*it)->prefix().family() == AF_INET6) {
756 ipv6_found = true;
757 break;
758 }
759 }
760 EXPECT_TRUE(ipv6_found);
761 for (NetworkManager::NetworkList::iterator it = list.begin();
762 it != list.end(); ++it) {
763 delete (*it);
764 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000765}
766
deadbeef3427f532017-07-26 16:09:33 -0700767// Test that when network interfaces are sorted and given preference values,
768// IPv6 comes first.
769TEST_F(NetworkTest, IPv6NetworksPreferredOverIPv4) {
Niels Möller539f3e12021-11-26 16:33:19 +0100770 PhysicalSocketServer socket_server;
771 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000772 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
773 IPAddress(0x12345600U), 24);
774 ipv4_network1.AddIP(IPAddress(0x12345600U));
775
776 IPAddress ip;
777 IPAddress prefix;
778 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
779 prefix = TruncateIP(ip, 64);
780 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 2",
781 prefix, 64);
782 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
783
784 NetworkManager::NetworkList list;
785 list.push_back(new Network(ipv4_network1));
786 list.push_back(new Network(ipv6_eth1_publicnetwork1_ip1));
787 Network* net1 = list[0];
788 Network* net2 = list[1];
789
790 bool changed = false;
791 MergeNetworkList(manager, list, &changed);
792 ASSERT_TRUE(changed);
793 // After sorting IPv6 network should be higher order than IPv4 networks.
794 EXPECT_TRUE(net1->preference() < net2->preference());
795}
796
deadbeef3427f532017-07-26 16:09:33 -0700797// When two interfaces are equivalent in everything but name, they're expected
798// to be preference-ordered by name. For example, "eth0" before "eth1".
799TEST_F(NetworkTest, NetworksSortedByInterfaceName) {
Niels Möller539f3e12021-11-26 16:33:19 +0100800 PhysicalSocketServer socket_server;
801 BasicNetworkManager manager(&socket_server);
deadbeef3427f532017-07-26 16:09:33 -0700802 Network* eth0 = new Network("test_eth0", "Test Network Adapter 1",
803 IPAddress(0x65432100U), 24);
804 eth0->AddIP(IPAddress(0x65432100U));
805 Network* eth1 = new Network("test_eth1", "Test Network Adapter 2",
806 IPAddress(0x12345600U), 24);
807 eth1->AddIP(IPAddress(0x12345600U));
808 NetworkManager::NetworkList list;
809 // Add them to the list in the opposite of the expected sorted order, to
810 // ensure sorting actually occurs.
811 list.push_back(eth1);
812 list.push_back(eth0);
813
814 bool changed = false;
815 MergeNetworkList(manager, list, &changed);
816 ASSERT_TRUE(changed);
817 // "test_eth0" should be preferred over "test_eth1".
818 EXPECT_TRUE(eth0->preference() > eth1->preference());
819}
820
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000821TEST_F(NetworkTest, TestNetworkAdapterTypes) {
822 Network wifi("wlan0", "Wireless Adapter", IPAddress(0x12345600U), 24,
823 ADAPTER_TYPE_WIFI);
824 EXPECT_EQ(ADAPTER_TYPE_WIFI, wifi.type());
825 Network ethernet("eth0", "Ethernet", IPAddress(0x12345600U), 24,
826 ADAPTER_TYPE_ETHERNET);
827 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, ethernet.type());
828 Network cellular("test_cell", "Cellular Adapter", IPAddress(0x12345600U), 24,
829 ADAPTER_TYPE_CELLULAR);
830 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, cellular.type());
831 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24,
832 ADAPTER_TYPE_VPN);
833 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
834 Network unknown("test", "Test Adapter", IPAddress(0x12345600U), 24,
835 ADAPTER_TYPE_UNKNOWN);
836 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, unknown.type());
837}
838
839#if defined(WEBRTC_POSIX)
840// Verify that we correctly handle interfaces with no address.
841TEST_F(NetworkTest, TestConvertIfAddrsNoAddress) {
842 ifaddrs list;
843 memset(&list, 0, sizeof(list));
844 list.ifa_name = const_cast<char*>("test_iface");
845
846 NetworkManager::NetworkList result;
Niels Möller539f3e12021-11-26 16:33:19 +0100847 PhysicalSocketServer socket_server;
848 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700849 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000850 CallConvertIfAddrs(manager, &list, true, &result);
851 EXPECT_TRUE(result.empty());
852}
honghaizdb8cf502015-12-21 13:08:46 -0800853
854// Verify that if there are two addresses on one interface, only one network
855// is generated.
856TEST_F(NetworkTest, TestConvertIfAddrsMultiAddressesOnOneInterface) {
857 char if_name[20] = "rmnet0";
858 ifaddrs* list = nullptr;
859 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:1",
860 "FFFF:FFFF:FFFF:FFFF::", 0);
861 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:2",
862 "FFFF:FFFF:FFFF:FFFF::", 0);
863 NetworkManager::NetworkList result;
Niels Möller539f3e12021-11-26 16:33:19 +0100864 PhysicalSocketServer socket_server;
865 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700866 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800867 CallConvertIfAddrs(manager, list, true, &result);
868 EXPECT_EQ(1U, result.size());
869 bool changed;
870 // This ensures we release the objects created in CallConvertIfAddrs.
871 MergeNetworkList(manager, result, &changed);
872 ReleaseIfAddrs(list);
873}
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800874
875TEST_F(NetworkTest, TestConvertIfAddrsNotRunning) {
876 ifaddrs list;
877 memset(&list, 0, sizeof(list));
878 list.ifa_name = const_cast<char*>("test_iface");
879 sockaddr ifa_addr;
880 sockaddr ifa_netmask;
881 list.ifa_addr = &ifa_addr;
882 list.ifa_netmask = &ifa_netmask;
883
884 NetworkManager::NetworkList result;
Niels Möller539f3e12021-11-26 16:33:19 +0100885 PhysicalSocketServer socket_server;
886 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700887 manager.StartUpdating();
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800888 CallConvertIfAddrs(manager, &list, true, &result);
889 EXPECT_TRUE(result.empty());
890}
Honghai Zhang351d77b2016-05-20 15:08:29 -0700891
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700892// Tests that the network type can be determined from the network monitor when
893// it would otherwise be unknown.
Honghai Zhang351d77b2016-05-20 15:08:29 -0700894TEST_F(NetworkTest, TestGetAdapterTypeFromNetworkMonitor) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700895 char if_name[20] = "wifi0";
896 std::string ipv6_address = "1000:2000:3000:4000:0:0:0:1";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700897 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Niels Mölleraa373162021-09-28 16:09:07 +0200898 PhysicalSocketServer socket_server;
899 BasicNetworkManager manager_without_monitor(nullptr, &socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700900 manager_without_monitor.StartUpdating();
901 // A network created without a network monitor will get UNKNOWN type.
902 ifaddrs* addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
903 manager_without_monitor);
904 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, GetAdapterType(manager_without_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700905 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700906
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700907 // With the fake network monitor the type should be correctly determined.
908 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +0200909 BasicNetworkManager manager_with_monitor(&factory, &socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700910 manager_with_monitor.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700911 // Add the same ipv6 address as before but it has the right network type
912 // detected by the network monitor now.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700913 addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
914 manager_with_monitor);
915 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700916 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700917}
918
919// Test that the network type can be determined based on name matching in
920// a few cases. Note that UNKNOWN type for non-matching strings has been tested
921// in the above test.
922TEST_F(NetworkTest, TestGetAdapterTypeFromNameMatching) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800923 std::string ipv4_address1 = "192.0.0.121";
924 std::string ipv4_mask = "255.255.255.0";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700925 std::string ipv6_address1 = "1000:2000:3000:4000:0:0:0:1";
926 std::string ipv6_address2 = "1000:2000:3000:8000:0:0:0:1";
927 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Niels Möller539f3e12021-11-26 16:33:19 +0100928 PhysicalSocketServer socket_server;
929 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700930 manager.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700931
deadbeef4cd599f2017-07-27 15:05:29 -0700932 // IPSec interface; name is in form "ipsec<index>".
933 char if_name[20] = "ipsec11";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700934 ifaddrs* addr_list =
935 InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
deadbeef4cd599f2017-07-27 15:05:29 -0700936 EXPECT_EQ(ADAPTER_TYPE_VPN, GetAdapterType(manager));
937 ClearNetworks(manager);
938 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700939
Qingsi Wange53ac042018-05-08 11:55:07 -0700940 strcpy(if_name, "lo0");
941 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
942 EXPECT_EQ(ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager));
943 ClearNetworks(manager);
944 ReleaseIfAddrs(addr_list);
945
946 strcpy(if_name, "eth0");
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800947 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
Qingsi Wange53ac042018-05-08 11:55:07 -0700948 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, GetAdapterType(manager));
949 ClearNetworks(manager);
950 ReleaseIfAddrs(addr_list);
951
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700952 strcpy(if_name, "wlan0");
953 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
954 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
955 ClearNetworks(manager);
956 ReleaseIfAddrs(addr_list);
957
deadbeef4cd599f2017-07-27 15:05:29 -0700958#if defined(WEBRTC_IOS)
959 strcpy(if_name, "pdp_ip0");
960 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700961 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
962 ClearNetworks(manager);
963 ReleaseIfAddrs(addr_list);
964
Honghai Zhang63ab8102016-05-26 20:30:15 -0700965 strcpy(if_name, "en0");
966 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
967 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
968 ClearNetworks(manager);
969 ReleaseIfAddrs(addr_list);
970
Honghai Zhang351d77b2016-05-20 15:08:29 -0700971#elif defined(WEBRTC_ANDROID)
deadbeef4cd599f2017-07-27 15:05:29 -0700972 strcpy(if_name, "rmnet0");
973 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700974 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
975 ClearNetworks(manager);
976 ReleaseIfAddrs(addr_list);
977
Honghai Zhang351d77b2016-05-20 15:08:29 -0700978 strcpy(if_name, "v4-rmnet_data0");
979 addr_list = InstallIpv6Network(if_name, ipv6_address2, ipv6_mask, manager);
980 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
981 ClearNetworks(manager);
982 ReleaseIfAddrs(addr_list);
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800983
984 strcpy(if_name, "clat4");
985 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
986 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
987 ClearNetworks(manager);
988 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700989#endif
990}
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700991
992// Test that an adapter won't be included in the network list if there's a
993// network monitor that says it's unavailable.
994TEST_F(NetworkTest, TestNetworkMonitorIsAdapterAvailable) {
995 char if_name1[20] = "pdp_ip0";
996 char if_name2[20] = "pdp_ip1";
997 ifaddrs* list = nullptr;
998 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
999 "FFFF:FFFF:FFFF:FFFF::", 0);
1000 list = AddIpv6Address(list, if_name2, "1000:2000:3000:4000:0:0:0:2",
1001 "FFFF:FFFF:FFFF:FFFF::", 0);
1002 NetworkManager::NetworkList result;
1003
1004 // Sanity check that both interfaces are included by default.
1005 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001006 PhysicalSocketServer socket_server;
1007 BasicNetworkManager manager(&factory, &socket_server);
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001008 manager.StartUpdating();
1009 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1010 EXPECT_EQ(2u, result.size());
1011 bool changed;
1012 // This ensures we release the objects created in CallConvertIfAddrs.
1013 MergeNetworkList(manager, result, &changed);
1014 result.clear();
1015
1016 // Now simulate one interface being unavailable.
1017 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1018 network_monitor->set_unavailable_adapters({if_name1});
1019 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1020 EXPECT_EQ(1u, result.size());
1021 EXPECT_EQ(if_name2, result[0]->name());
1022
1023 MergeNetworkList(manager, result, &changed);
1024 ReleaseIfAddrs(list);
1025}
1026
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001027#endif // defined(WEBRTC_POSIX)
1028
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001029// Test MergeNetworkList successfully combines all IPs for the same
1030// prefix/length into a single Network.
1031TEST_F(NetworkTest, TestMergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +01001032 PhysicalSocketServer socket_server;
1033 BasicNetworkManager manager(&socket_server);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001034 NetworkManager::NetworkList list;
1035
1036 // Create 2 IPAddress classes with only last digit different.
1037 IPAddress ip1, ip2;
1038 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1039 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2));
1040
1041 // Create 2 networks with the same prefix and length.
1042 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1043 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1044
1045 // Add different IP into each.
1046 net1->AddIP(ip1);
1047 net2->AddIP(ip2);
1048
1049 list.push_back(net1);
1050 list.push_back(net2);
1051 bool changed;
1052 MergeNetworkList(manager, list, &changed);
1053 EXPECT_TRUE(changed);
1054
1055 NetworkManager::NetworkList list2;
1056 manager.GetNetworks(&list2);
1057
1058 // Make sure the resulted networklist has only 1 element and 2
1059 // IPAddresses.
1060 EXPECT_EQ(list2.size(), 1uL);
1061 EXPECT_EQ(list2[0]->GetIPs().size(), 2uL);
Mirko Bonadeib2a57852022-03-18 12:19:56 +01001062 EXPECT_THAT(list2[0]->GetIPs(), UnorderedElementsAre(InterfaceAddress(ip1),
1063 InterfaceAddress(ip2)));
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001064}
1065
honghaizdb8cf502015-12-21 13:08:46 -08001066// Test that MergeNetworkList successfully detects the change if
1067// a network becomes inactive and then active again.
1068TEST_F(NetworkTest, TestMergeNetworkListWithInactiveNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +01001069 PhysicalSocketServer socket_server;
1070 BasicNetworkManager manager(&socket_server);
honghaizdb8cf502015-12-21 13:08:46 -08001071 Network network1("test_wifi", "Test Network Adapter 1",
1072 IPAddress(0x12345600U), 24);
1073 Network network2("test_eth0", "Test Network Adapter 2",
1074 IPAddress(0x00010000U), 16);
1075 network1.AddIP(IPAddress(0x12345678));
1076 network2.AddIP(IPAddress(0x00010004));
1077 NetworkManager::NetworkList list;
1078 Network* net1 = new Network(network1);
1079 list.push_back(net1);
1080 bool changed;
1081 MergeNetworkList(manager, list, &changed);
1082 EXPECT_TRUE(changed);
1083 list.clear();
1084 manager.GetNetworks(&list);
1085 ASSERT_EQ(1U, list.size());
1086 EXPECT_EQ(net1, list[0]);
1087
1088 list.clear();
1089 Network* net2 = new Network(network2);
1090 list.push_back(net2);
1091 MergeNetworkList(manager, list, &changed);
1092 EXPECT_TRUE(changed);
1093 list.clear();
1094 manager.GetNetworks(&list);
1095 ASSERT_EQ(1U, list.size());
1096 EXPECT_EQ(net2, list[0]);
1097
1098 // Now network1 is inactive. Try to merge it again.
1099 list.clear();
1100 list.push_back(new Network(network1));
1101 MergeNetworkList(manager, list, &changed);
1102 EXPECT_TRUE(changed);
1103 list.clear();
1104 manager.GetNetworks(&list);
1105 ASSERT_EQ(1U, list.size());
1106 EXPECT_TRUE(list[0]->active());
1107 EXPECT_EQ(net1, list[0]);
1108}
1109
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001110// Test that the filtering logic follows the defined ruleset in network.h.
1111TEST_F(NetworkTest, TestIPv6Selection) {
1112 InterfaceAddress ip;
1113 std::string ipstr;
1114
1115 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
1116 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
1117
1118 // Create a network with this prefix.
Yves Gerey665174f2018-06-19 15:03:05 +02001119 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
1120 64);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001121
1122 // When there is no address added, it should return an unspecified
1123 // address.
1124 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1125 EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
1126
1127 // Deprecated one should not be returned.
1128 ipv6_network.AddIP(ip);
1129 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1130
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001131 // Add ULA one. ULA is unique local address which is starting either
1132 // with 0xfc or 0xfd.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001133 ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
1134 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1135 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001136 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001137
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001138 // Add global one.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001139 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
1140 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1141 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001142 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001143
1144 // Add global dynamic temporary one.
1145 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
1146 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
1147 ipv6_network.AddIP(ip);
1148 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1149}
1150
honghaiz023f3ef2015-10-19 09:39:32 -07001151TEST_F(NetworkTest, TestNetworkMonitoring) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001152 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001153 PhysicalSocketServer socket_server;
1154 BasicNetworkManager manager(&factory, &socket_server);
honghaiz023f3ef2015-10-19 09:39:32 -07001155 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1156 &NetworkTest::OnNetworksChanged);
honghaiz023f3ef2015-10-19 09:39:32 -07001157 manager.StartUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001158 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1159 EXPECT_TRUE(network_monitor && network_monitor->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001160 EXPECT_TRUE_WAIT(callback_called_, 1000);
1161 callback_called_ = false;
1162
1163 // Clear the networks so that there will be network changes below.
1164 ClearNetworks(manager);
1165 // Network manager is started, so the callback is called when the network
1166 // monitor fires the network-change event.
Mirko Bonadei37077932021-07-27 17:00:58 +02001167 network_monitor->InovkeNetworksChangedCallbackForTesting();
honghaiz023f3ef2015-10-19 09:39:32 -07001168 EXPECT_TRUE_WAIT(callback_called_, 1000);
1169
honghaizcec0a082016-01-15 14:49:09 -08001170 // Network manager is stopped.
honghaiz023f3ef2015-10-19 09:39:32 -07001171 manager.StopUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001172 EXPECT_FALSE(GetNetworkMonitor(manager)->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001173}
1174
Edward Lemur8dc945c2016-07-21 10:16:40 +02001175// Fails on Android: https://bugs.chromium.org/p/webrtc/issues/detail?id=4364.
1176#if defined(WEBRTC_ANDROID)
1177#define MAYBE_DefaultLocalAddress DISABLED_DefaultLocalAddress
1178#else
1179#define MAYBE_DefaultLocalAddress DefaultLocalAddress
1180#endif
1181TEST_F(NetworkTest, MAYBE_DefaultLocalAddress) {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001182 IPAddress ip;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001183 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001184 PhysicalSocketServer socket_server;
1185 TestBasicNetworkManager manager(&factory, &socket_server);
guoweis56271ed2016-01-15 14:45:06 -08001186 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1187 &NetworkTest::OnNetworksChanged);
guoweis56271ed2016-01-15 14:45:06 -08001188 manager.StartUpdating();
1189 EXPECT_TRUE_WAIT(callback_called_, 1000);
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001190
1191 // Make sure we can query default local address when an address for such
1192 // address family exists.
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001193 std::vector<Network*> networks;
1194 manager.GetNetworks(&networks);
guoweis56271ed2016-01-15 14:45:06 -08001195 EXPECT_TRUE(!networks.empty());
Steve Anton9de3aac2017-10-24 10:08:26 -07001196 for (const auto* network : networks) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001197 if (network->GetBestIP().family() == AF_INET) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001198 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET) != IPAddress());
guoweis56271ed2016-01-15 14:45:06 -08001199 } else if (network->GetBestIP().family() == AF_INET6 &&
1200 !IPIsLoopback(network->GetBestIP())) {
1201 // Existence of an IPv6 loopback address doesn't mean it has IPv6 network
1202 // enabled.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001203 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET6) != IPAddress());
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001204 }
1205 }
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001206
1207 // GetDefaultLocalAddress should return the valid default address after set.
1208 manager.set_default_local_addresses(GetLoopbackIP(AF_INET),
1209 GetLoopbackIP(AF_INET6));
1210 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET, &ip));
1211 EXPECT_EQ(ip, GetLoopbackIP(AF_INET));
1212 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1213 EXPECT_EQ(ip, GetLoopbackIP(AF_INET6));
honghaizaf83fe62016-04-18 14:50:44 -07001214
1215 // More tests on GetDefaultLocalAddress with ipv6 addresses where the set
1216 // default address may be different from the best IP address of any network.
1217 InterfaceAddress ip1;
1218 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:1111",
1219 IPV6_ADDRESS_FLAG_TEMPORARY, &ip1));
1220 // Create a network with a prefix of ip1.
1221 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip1, 64),
1222 64);
1223 IPAddress ip2;
1224 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:2222", &ip2));
1225 ipv6_network.AddIP(ip1);
1226 ipv6_network.AddIP(ip2);
1227 BasicNetworkManager::NetworkList list(1, new Network(ipv6_network));
1228 bool changed;
1229 MergeNetworkList(manager, list, &changed);
1230 // If the set default address is not in any network, GetDefaultLocalAddress
1231 // should return it.
1232 IPAddress ip3;
1233 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:3333", &ip3));
1234 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip3);
1235 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1236 EXPECT_EQ(ip3, ip);
1237 // If the set default address is in a network, GetDefaultLocalAddress will
1238 // return the best IP in that network.
1239 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip2);
1240 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1241 EXPECT_EQ(static_cast<IPAddress>(ip1), ip);
1242
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001243 manager.StopUpdating();
1244}
1245
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001246// Test that MergeNetworkList does not set change = true
1247// when changing from cellular_X to cellular_Y.
1248TEST_F(NetworkTest, TestWhenNetworkListChangeReturnsChangedFlag) {
Niels Möller539f3e12021-11-26 16:33:19 +01001249 PhysicalSocketServer socket_server;
1250 BasicNetworkManager manager(&socket_server);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001251
1252 IPAddress ip1;
1253 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1254 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1255 net1->set_type(ADAPTER_TYPE_CELLULAR_3G);
1256 net1->AddIP(ip1);
1257 NetworkManager::NetworkList list;
1258 list.push_back(net1);
1259
1260 {
1261 bool changed;
1262 MergeNetworkList(manager, list, &changed);
1263 EXPECT_TRUE(changed);
1264 NetworkManager::NetworkList list2;
1265 manager.GetNetworks(&list2);
1266 EXPECT_EQ(list2.size(), 1uL);
1267 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_3G, list2[0]->type());
1268 }
1269
1270 // Modify net1 from 3G to 4G
1271 {
1272 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1273 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1274 net2->AddIP(ip1);
1275 list.clear();
1276 list.push_back(net2);
1277 bool changed;
1278 MergeNetworkList(manager, list, &changed);
1279
1280 // Change from 3G to 4G shall not trigger OnNetworksChanged,
1281 // i.e changed = false.
1282 EXPECT_FALSE(changed);
1283 NetworkManager::NetworkList list2;
1284 manager.GetNetworks(&list2);
1285 ASSERT_EQ(list2.size(), 1uL);
1286 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1287 }
1288
1289 // Don't modify.
1290 {
1291 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1292 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1293 net2->AddIP(ip1);
1294 list.clear();
1295 list.push_back(net2);
1296 bool changed;
1297 MergeNetworkList(manager, list, &changed);
1298
1299 // No change.
1300 EXPECT_FALSE(changed);
1301 NetworkManager::NetworkList list2;
1302 manager.GetNetworks(&list2);
1303 ASSERT_EQ(list2.size(), 1uL);
1304 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1305 }
1306}
1307
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001308#if defined(WEBRTC_POSIX)
1309TEST_F(NetworkTest, IgnoresMACBasedIPv6Address) {
1310 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1311 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
Niels Möller539f3e12021-11-26 16:33:19 +01001312 PhysicalSocketServer socket_server;
1313 BasicNetworkManager manager(&socket_server);
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001314 manager.StartUpdating();
1315
1316 // IPSec interface; name is in form "ipsec<index>".
1317 char if_name[20] = "ipsec11";
1318 ifaddrs* addr_list =
1319 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1320
1321 BasicNetworkManager::NetworkList list;
1322 manager.GetNetworks(&list);
1323 EXPECT_EQ(list.size(), 0u);
1324 ReleaseIfAddrs(addr_list);
1325}
1326
1327TEST_F(NetworkTest, WebRTC_AllowMACBasedIPv6Address) {
1328 webrtc::test::ScopedFieldTrials field_trials(
1329 "WebRTC-AllowMACBasedIPv6/Enabled/");
1330 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1331 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
Niels Möller539f3e12021-11-26 16:33:19 +01001332 PhysicalSocketServer socket_server;
1333 BasicNetworkManager manager(&socket_server);
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001334 manager.StartUpdating();
1335
1336 // IPSec interface; name is in form "ipsec<index>".
1337 char if_name[20] = "ipsec11";
1338 ifaddrs* addr_list =
1339 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1340
1341 BasicNetworkManager::NetworkList list;
1342 manager.GetNetworks(&list);
1343 EXPECT_EQ(list.size(), 1u);
1344 ReleaseIfAddrs(addr_list);
1345}
1346#endif
1347
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001348#if defined(WEBRTC_POSIX)
1349TEST_F(NetworkTest, WebRTC_BindUsingInterfaceName) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001350 char if_name1[20] = "wlan0";
1351 char if_name2[20] = "v4-wlan0";
1352 ifaddrs* list = nullptr;
1353 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
1354 "FFFF:FFFF:FFFF:FFFF::", 0);
1355 list = AddIpv4Address(list, if_name2, "192.168.0.2", "255.255.255.255");
1356 NetworkManager::NetworkList result;
1357
1358 // Sanity check that both interfaces are included by default.
1359 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001360 PhysicalSocketServer socket_server;
1361 BasicNetworkManager manager(&factory, &socket_server);
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001362 manager.StartUpdating();
1363 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1364 EXPECT_EQ(2u, result.size());
1365 ReleaseIfAddrs(list);
1366 bool changed;
1367 // This ensures we release the objects created in CallConvertIfAddrs.
1368 MergeNetworkList(manager, result, &changed);
1369 result.clear();
1370
1371 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1372
1373 IPAddress ipv6;
1374 EXPECT_TRUE(IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6));
1375 IPAddress ipv4;
1376 EXPECT_TRUE(IPFromString("192.168.0.2", &ipv4));
1377
1378 // The network monitor only knwos about the ipv6 address, interface.
1379 network_monitor->set_adapters({"wlan0"});
1380 network_monitor->set_ip_addresses({ipv6});
1381 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv6),
1382 NetworkBindingResult::SUCCESS);
1383
1384 // But it will bind anyway using string matching...
1385 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv4),
1386 NetworkBindingResult::SUCCESS);
1387}
1388#endif
1389
Jonas Orelandb477fc72021-08-23 12:16:33 +02001390TEST_F(NetworkTest, NetworkCostVpn_Default) {
1391 IPAddress ip1;
1392 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1393
1394 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1395 net1->set_type(ADAPTER_TYPE_VPN);
1396 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1397
1398 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1399 net2->set_type(ADAPTER_TYPE_ETHERNET);
1400
1401 EXPECT_EQ(net1->GetCost(), net2->GetCost());
1402 delete net1;
1403 delete net2;
1404}
1405
1406TEST_F(NetworkTest, NetworkCostVpn_VpnMoreExpensive) {
1407 webrtc::test::ScopedFieldTrials field_trials(
1408 "WebRTC-AddNetworkCostToVpn/Enabled/");
1409
1410 IPAddress ip1;
1411 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1412
1413 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1414 net1->set_type(ADAPTER_TYPE_VPN);
1415 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1416
1417 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1418 net2->set_type(ADAPTER_TYPE_ETHERNET);
1419
1420 EXPECT_GT(net1->GetCost(), net2->GetCost());
1421 delete net1;
1422 delete net2;
1423}
1424
Jonas Oreland30019052022-01-28 14:11:44 +01001425TEST_F(NetworkTest, GuessAdapterFromNetworkCost) {
1426 webrtc::test::ScopedFieldTrials field_trials(
1427 "WebRTC-AddNetworkCostToVpn/Enabled/"
1428 "WebRTC-UseDifferentiatedCellularCosts/Enabled/");
1429
1430 IPAddress ip1;
1431 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1432
1433 for (auto type : kAllAdapterTypes) {
1434 if (type == rtc::ADAPTER_TYPE_VPN)
1435 continue;
1436 Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
1437 net1.set_type(type);
1438 auto [guess, vpn] = Network::GuessAdapterFromNetworkCost(net1.GetCost());
1439 EXPECT_FALSE(vpn);
1440 if (type == rtc::ADAPTER_TYPE_LOOPBACK) {
1441 EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET);
1442 } else {
1443 EXPECT_EQ(type, guess);
1444 }
1445 }
1446
1447 // VPN
1448 for (auto type : kAllAdapterTypes) {
1449 if (type == rtc::ADAPTER_TYPE_VPN)
1450 continue;
1451 Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
1452 net1.set_type(rtc::ADAPTER_TYPE_VPN);
1453 net1.set_underlying_type_for_vpn(type);
1454 auto [guess, vpn] = Network::GuessAdapterFromNetworkCost(net1.GetCost());
1455 EXPECT_TRUE(vpn);
1456 if (type == rtc::ADAPTER_TYPE_LOOPBACK) {
1457 EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET);
1458 } else {
1459 EXPECT_EQ(type, guess);
1460 }
1461 }
1462}
1463
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001464TEST_F(NetworkTest, VpnList) {
Niels Möller539f3e12021-11-26 16:33:19 +01001465 PhysicalSocketServer socket_server;
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001466 {
Niels Möller539f3e12021-11-26 16:33:19 +01001467 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001468 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1469 manager.StartUpdating();
1470 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1471 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.12.1"), 24));
1472 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 16));
1473 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 24));
1474 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.1.1"), 32));
1475 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.0.0"), 16));
1476 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 15));
1477 }
1478 {
Niels Möller539f3e12021-11-26 16:33:19 +01001479 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001480 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 24)});
1481 manager.StartUpdating();
1482 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1483 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.1"), 32));
1484 }
1485}
1486
1487#if defined(WEBRTC_POSIX)
1488// TODO(webrtc:13114): Implement the InstallIpv4Network for windows.
1489TEST_F(NetworkTest, VpnListOverrideAdapterType) {
Niels Möller539f3e12021-11-26 16:33:19 +01001490 PhysicalSocketServer socket_server;
1491 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001492 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1493 manager.StartUpdating();
1494
1495 char if_name[20] = "eth0";
1496 auto addr_list =
1497 InstallIpv4Network(if_name, "192.168.1.23", "255.255.255.255", manager);
1498
1499 BasicNetworkManager::NetworkList list;
1500 manager.GetNetworks(&list);
1501 ASSERT_EQ(1u, list.size());
1502 EXPECT_EQ(ADAPTER_TYPE_VPN, list[0]->type());
1503 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, list[0]->underlying_type_for_vpn());
1504 ClearNetworks(manager);
1505 ReleaseIfAddrs(addr_list);
1506}
1507#endif // defined(WEBRTC_POSIX)
1508
Jonas Orelandac554eb2021-08-27 09:43:38 +02001509TEST_F(NetworkTest, HardcodedVpn) {
1510 const uint8_t cisco[] = {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0};
1511 const uint8_t global[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x1};
1512 const uint8_t unknown[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x0};
1513 const uint8_t five_bytes[] = {0x2, 0x50, 0x41, 0x0, 0x0};
1514 EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(cisco));
1515 EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(global));
1516
1517 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(
1518 rtc::ArrayView<const uint8_t>(cisco, 5)));
1519 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(five_bytes));
1520 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(unknown));
1521 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(nullptr));
1522}
1523
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001524} // namespace rtc