blob: b2bce3771426460a79dc98cdec631b02c7ea7ec0 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
Ali Tofigh7fa90572022-03-17 15:47:49 +010013#include "absl/strings/string_view.h"
14
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000015#if defined(WEBRTC_POSIX)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000016#include <net/if.h>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#endif // WEBRTC_POSIX
18
19#if defined(WEBRTC_WIN)
Mirko Bonadei01914412018-03-23 16:30:58 +010020#include <iphlpapi.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020021
Yves Gerey665174f2018-06-19 15:03:05 +020022#include "rtc_base/win32.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080023#elif !defined(__native_client__)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020024#include "rtc_base/ifaddrs_converter.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000025#endif
26
jbauch555604a2016-04-26 03:13:22 -070027#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000028
Steve Anton2acd1632019-03-25 13:48:30 -070029#include "absl/algorithm/container.h"
30#include "absl/strings/match.h"
31#include "absl/strings/string_view.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020032#include "api/transport/field_trial_based_config.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020033#include "rtc_base/checks.h"
34#include "rtc_base/logging.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020035#include "rtc_base/memory/always_valid_pointer.h"
Steve Anton10542f22019-01-11 09:11:00 -080036#include "rtc_base/network_monitor.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020037#include "rtc_base/socket.h" // includes something that makes windows happy
Steve Anton10542f22019-01-11 09:11:00 -080038#include "rtc_base/string_encode.h"
39#include "rtc_base/string_utils.h"
Jonas Olsson366a50c2018-09-06 13:41:30 +020040#include "rtc_base/strings/string_builder.h"
Niels Möller27c14522022-02-07 16:44:21 +010041#include "rtc_base/task_utils/to_queued_task.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020042#include "rtc_base/thread.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000043
44namespace rtc {
45namespace {
46
Jonas Orelandac554eb2021-08-27 09:43:38 +020047// List of MAC addresses of known VPN (for windows).
48constexpr uint8_t kVpns[2][6] = {
49 // Cisco AnyConnect.
50 {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0},
51 // GlobalProtect Virtual Ethernet.
52 {0x2, 0x50, 0x41, 0x0, 0x0, 0x1},
53};
54
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000055// Fetch list of networks every two seconds.
56const int kNetworksUpdateIntervalMs = 2000;
57
58const int kHighestNetworkPreference = 127;
59
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000060typedef struct {
61 Network* net;
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +000062 std::vector<InterfaceAddress> ips;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +000063} AddressList;
64
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000065bool CompareNetworks(const Network* a, const Network* b) {
66 if (a->prefix_length() == b->prefix_length()) {
67 if (a->name() == b->name()) {
68 return a->prefix() < b->prefix();
69 }
70 }
71 return a->name() < b->name();
72}
73
74bool SortNetworks(const Network* a, const Network* b) {
75 // Network types will be preferred above everything else while sorting
76 // Networks.
77
78 // Networks are sorted first by type.
79 if (a->type() != b->type()) {
80 return a->type() < b->type();
81 }
82
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000083 IPAddress ip_a = a->GetBestIP();
84 IPAddress ip_b = b->GetBestIP();
85
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000086 // After type, networks are sorted by IP address precedence values
87 // from RFC 3484-bis
guoweis@webrtc.org369a6372014-09-17 22:37:29 +000088 if (IPAddressPrecedence(ip_a) != IPAddressPrecedence(ip_b)) {
89 return IPAddressPrecedence(ip_a) > IPAddressPrecedence(ip_b);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000090 }
91
92 // TODO(mallinath) - Add VPN and Link speed conditions while sorting.
93
94 // Networks are sorted last by key.
deadbeef3427f532017-07-26 16:09:33 -070095 return a->key() < b->key();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000096}
97
Jonas Oreland2105d642020-05-13 10:15:34 +020098uint16_t ComputeNetworkCostByType(int type,
Jonas Orelandb477fc72021-08-23 12:16:33 +020099 bool is_vpn,
100 bool use_differentiated_cellular_costs,
101 bool add_network_cost_to_vpn) {
Jonas Oreland08d18062020-04-02 07:19:12 +0200102 // TODO(jonaso) : Rollout support for cellular network cost using A/B
103 // experiment to make sure it does not introduce regressions.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200104 int vpnCost = (is_vpn && add_network_cost_to_vpn) ? kNetworkCostVpn : 0;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700105 switch (type) {
106 case rtc::ADAPTER_TYPE_ETHERNET:
107 case rtc::ADAPTER_TYPE_LOOPBACK:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200108 return kNetworkCostMin + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700109 case rtc::ADAPTER_TYPE_WIFI:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200110 return kNetworkCostLow + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700111 case rtc::ADAPTER_TYPE_CELLULAR:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200112 return kNetworkCostCellular + vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200113 case rtc::ADAPTER_TYPE_CELLULAR_2G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200114 return (use_differentiated_cellular_costs ? kNetworkCostCellular2G
115 : kNetworkCostCellular) +
116 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200117 case rtc::ADAPTER_TYPE_CELLULAR_3G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200118 return (use_differentiated_cellular_costs ? kNetworkCostCellular3G
119 : kNetworkCostCellular) +
120 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200121 case rtc::ADAPTER_TYPE_CELLULAR_4G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200122 return (use_differentiated_cellular_costs ? kNetworkCostCellular4G
123 : kNetworkCostCellular) +
124 vpnCost;
Jonas Oreland2105d642020-05-13 10:15:34 +0200125 case rtc::ADAPTER_TYPE_CELLULAR_5G:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200126 return (use_differentiated_cellular_costs ? kNetworkCostCellular5G
127 : kNetworkCostCellular) +
128 vpnCost;
Qingsi Wang9f1de692018-06-28 15:38:09 -0700129 case rtc::ADAPTER_TYPE_ANY:
130 // Candidates gathered from the any-address/wildcard ports, as backups,
131 // are given the maximum cost so that if there are other candidates with
132 // known interface types, we would not select candidate pairs using these
133 // backup candidates if other selection criteria with higher precedence
134 // (network conditions over the route) are the same. Note that setting the
135 // cost to kNetworkCostUnknown would be problematic since
136 // ADAPTER_TYPE_CELLULAR would then have a higher cost. See
137 // P2PTransportChannel::SortConnectionsAndUpdateState for how we rank and
138 // select candidate pairs, where the network cost is among the criteria.
Jonas Orelandb477fc72021-08-23 12:16:33 +0200139 return kNetworkCostMax + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700140 case rtc::ADAPTER_TYPE_VPN:
141 // The cost of a VPN should be computed using its underlying network type.
Artem Titovd3251962021-11-15 16:57:07 +0100142 RTC_DCHECK_NOTREACHED();
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700143 return kNetworkCostUnknown;
144 default:
Jonas Orelandb477fc72021-08-23 12:16:33 +0200145 return kNetworkCostUnknown + vpnCost;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700146 }
147}
148
thakis06689a12015-12-30 15:05:30 -0800149#if !defined(__native_client__)
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100150bool IsIgnoredIPv6(bool allow_mac_based_ipv6, const InterfaceAddress& ip) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000151 if (ip.family() != AF_INET6) {
152 return false;
153 }
154
155 // Link-local addresses require scope id to be bound successfully.
156 // However, our IPAddress structure doesn't carry that so the
157 // information is lost and causes binding failure.
158 if (IPIsLinkLocal(ip)) {
159 return true;
160 }
161
162 // Any MAC based IPv6 should be avoided to prevent the MAC tracking.
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100163 if (IPIsMacBased(ip) && !allow_mac_based_ipv6) {
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000164 return true;
165 }
166
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800167 // Ignore deprecated IPv6.
168 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED) {
169 return true;
170 }
171
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000172 return false;
173}
thakis06689a12015-12-30 15:05:30 -0800174#endif // !defined(__native_client__)
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000175
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200176// Note: consider changing to const Network* as arguments
177// if/when considering other changes that should not trigger
178// OnNetworksChanged.
179bool ShouldAdapterChangeTriggerNetworkChange(rtc::AdapterType old_type,
180 rtc::AdapterType new_type) {
181 // skip triggering OnNetworksChanged if
182 // changing from one cellular to another.
183 if (Network::IsCellular(old_type) && Network::IsCellular(new_type))
184 return false;
185 return true;
186}
187
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000188} // namespace
189
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800190// These addresses are used as the targets to find out the default local address
191// on a multi-homed endpoint. They are actually DNS servers.
192const char kPublicIPv4Host[] = "8.8.8.8";
193const char kPublicIPv6Host[] = "2001:4860:4860::8888";
194const int kPublicPort = 53; // DNS port.
195
Ali Tofigh7fa90572022-03-17 15:47:49 +0100196std::string MakeNetworkKey(absl::string_view name,
Yves Gerey665174f2018-06-19 15:03:05 +0200197 const IPAddress& prefix,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000198 int prefix_length) {
Jonas Olsson366a50c2018-09-06 13:41:30 +0200199 rtc::StringBuilder ost;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000200 ost << name << "%" << prefix.ToString() << "/" << prefix_length;
Jonas Olsson84df1c72018-09-14 16:59:32 +0200201 return ost.Release();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000202}
Qingsi Wange53ac042018-05-08 11:55:07 -0700203// Test if the network name matches the type<number> pattern, e.g. eth0. The
204// matching is case-sensitive.
Steve Anton2acd1632019-03-25 13:48:30 -0700205bool MatchTypeNameWithIndexPattern(absl::string_view network_name,
206 absl::string_view type_name) {
207 if (!absl::StartsWith(network_name, type_name)) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700208 return false;
209 }
Steve Anton2acd1632019-03-25 13:48:30 -0700210 return absl::c_none_of(network_name.substr(type_name.size()),
211 [](char c) { return !isdigit(c); });
Qingsi Wange53ac042018-05-08 11:55:07 -0700212}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000213
Qingsi Wange53ac042018-05-08 11:55:07 -0700214// A cautious note that this method may not provide an accurate adapter type
215// based on the string matching. Incorrect type of adapters can affect the
216// result of the downstream network filtering, see e.g.
217// BasicPortAllocatorSession::GetNetworks when
218// PORTALLOCATOR_DISABLE_COSTLY_NETWORKS is turned on.
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800219AdapterType GetAdapterTypeFromName(const char* network_name) {
Qingsi Wange53ac042018-05-08 11:55:07 -0700220 if (MatchTypeNameWithIndexPattern(network_name, "lo")) {
221 // Note that we have a more robust way to determine if a network interface
222 // is a loopback interface by checking the flag IFF_LOOPBACK in ifa_flags of
223 // an ifaddr struct. See ConvertIfAddrs in this file.
224 return ADAPTER_TYPE_LOOPBACK;
225 }
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700226
Qingsi Wange53ac042018-05-08 11:55:07 -0700227 if (MatchTypeNameWithIndexPattern(network_name, "eth")) {
228 return ADAPTER_TYPE_ETHERNET;
229 }
230
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000231 if (MatchTypeNameWithIndexPattern(network_name, "wlan") ||
232 MatchTypeNameWithIndexPattern(network_name, "v4-wlan")) {
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700233 return ADAPTER_TYPE_WIFI;
234 }
235
Qingsi Wange53ac042018-05-08 11:55:07 -0700236 if (MatchTypeNameWithIndexPattern(network_name, "ipsec") ||
237 MatchTypeNameWithIndexPattern(network_name, "tun") ||
238 MatchTypeNameWithIndexPattern(network_name, "utun") ||
239 MatchTypeNameWithIndexPattern(network_name, "tap")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800240 return ADAPTER_TYPE_VPN;
241 }
242#if defined(WEBRTC_IOS)
243 // Cell networks are pdp_ipN on iOS.
Qingsi Wange53ac042018-05-08 11:55:07 -0700244 if (MatchTypeNameWithIndexPattern(network_name, "pdp_ip")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800245 return ADAPTER_TYPE_CELLULAR;
246 }
Qingsi Wange53ac042018-05-08 11:55:07 -0700247 if (MatchTypeNameWithIndexPattern(network_name, "en")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800248 // This may not be most accurate because sometimes Ethernet interface
249 // name also starts with "en" but it is better than showing it as
250 // "unknown" type.
251 // TODO(honghaiz): Write a proper IOS network manager.
252 return ADAPTER_TYPE_WIFI;
253 }
254#elif defined(WEBRTC_ANDROID)
Qingsi Wange53ac042018-05-08 11:55:07 -0700255 if (MatchTypeNameWithIndexPattern(network_name, "rmnet") ||
256 MatchTypeNameWithIndexPattern(network_name, "rmnet_data") ||
257 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet") ||
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800258 MatchTypeNameWithIndexPattern(network_name, "v4-rmnet_data") ||
259 MatchTypeNameWithIndexPattern(network_name, "clat")) {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800260 return ADAPTER_TYPE_CELLULAR;
261 }
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800262#endif
263
264 return ADAPTER_TYPE_UNKNOWN;
265}
266
Yves Gerey665174f2018-06-19 15:03:05 +0200267NetworkManager::NetworkManager() {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000268
Yves Gerey665174f2018-06-19 15:03:05 +0200269NetworkManager::~NetworkManager() {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000270
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700271NetworkManager::EnumerationPermission NetworkManager::enumeration_permission()
272 const {
guoweisea1012b2015-08-21 09:06:28 -0700273 return ENUMERATION_ALLOWED;
Guo-wei Shieh86cb9232015-08-19 10:57:53 -0700274}
275
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800276bool NetworkManager::GetDefaultLocalAddress(int family, IPAddress* addr) const {
277 return false;
278}
279
Qingsi Wang7852d292018-10-31 11:17:07 -0700280webrtc::MdnsResponderInterface* NetworkManager::GetMdnsResponder() const {
Qingsi Wang09619332018-09-12 22:51:55 -0700281 return nullptr;
282}
283
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200284NetworkManagerBase::NetworkManagerBase(
285 const webrtc::WebRtcKeyValueConfig* field_trials)
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200286 : enumeration_permission_(NetworkManager::ENUMERATION_ALLOWED),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200287 signal_network_preference_change_(
288 field_trials
289 ? field_trials->IsEnabled("WebRTC-SignalNetworkPreferenceChange")
290 : false) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000291
292NetworkManagerBase::~NetworkManagerBase() {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000293 for (const auto& kv : networks_map_) {
294 delete kv.second;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000295 }
296}
297
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700298NetworkManager::EnumerationPermission
299NetworkManagerBase::enumeration_permission() const {
300 return enumeration_permission_;
301}
302
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000303void NetworkManagerBase::GetAnyAddressNetworks(NetworkList* networks) {
304 if (!ipv4_any_address_network_) {
305 const rtc::IPAddress ipv4_any_address(INADDR_ANY);
306 ipv4_any_address_network_.reset(
Qingsi Wang9f1de692018-06-28 15:38:09 -0700307 new rtc::Network("any", "any", ipv4_any_address, 0, ADAPTER_TYPE_ANY));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800308 ipv4_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800309 ipv4_any_address_network_->set_mdns_responder_provider(this);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000310 ipv4_any_address_network_->AddIP(ipv4_any_address);
311 }
312 networks->push_back(ipv4_any_address_network_.get());
313
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100314 if (!ipv6_any_address_network_) {
315 const rtc::IPAddress ipv6_any_address(in6addr_any);
316 ipv6_any_address_network_.reset(
317 new rtc::Network("any", "any", ipv6_any_address, 0, ADAPTER_TYPE_ANY));
318 ipv6_any_address_network_->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800319 ipv6_any_address_network_->set_mdns_responder_provider(this);
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100320 ipv6_any_address_network_->AddIP(ipv6_any_address);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000321 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100322 networks->push_back(ipv6_any_address_network_.get());
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000323}
324
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000325void NetworkManagerBase::GetNetworks(NetworkList* result) const {
guoweis@webrtc.org2444d962015-01-30 00:09:28 +0000326 result->clear();
deadbeef3427f532017-07-26 16:09:33 -0700327 result->insert(result->begin(), networks_.begin(), networks_.end());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000328}
329
330void NetworkManagerBase::MergeNetworkList(const NetworkList& new_networks,
331 bool* changed) {
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000332 NetworkManager::Stats stats;
333 MergeNetworkList(new_networks, changed, &stats);
334}
335
336void NetworkManagerBase::MergeNetworkList(const NetworkList& new_networks,
337 bool* changed,
338 NetworkManager::Stats* stats) {
honghaizdb8cf502015-12-21 13:08:46 -0800339 *changed = false;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000340 // AddressList in this map will track IP addresses for all Networks
341 // with the same key.
342 std::map<std::string, AddressList> consolidated_address_list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000343 NetworkList list(new_networks);
Steve Anton2acd1632019-03-25 13:48:30 -0700344 absl::c_sort(list, CompareNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000345 // First, build a set of network-keys to the ipaddresses.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000346 for (Network* network : list) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000347 bool might_add_to_merged_list = false;
Yves Gerey665174f2018-06-19 15:03:05 +0200348 std::string key = MakeNetworkKey(network->name(), network->prefix(),
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000349 network->prefix_length());
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000350 if (consolidated_address_list.find(key) ==
351 consolidated_address_list.end()) {
352 AddressList addrlist;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000353 addrlist.net = network;
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000354 consolidated_address_list[key] = addrlist;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000355 might_add_to_merged_list = true;
356 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000357 const std::vector<InterfaceAddress>& addresses = network->GetIPs();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000358 AddressList& current_list = consolidated_address_list[key];
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000359 for (const InterfaceAddress& address : addresses) {
360 current_list.ips.push_back(address);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000361 }
362 if (!might_add_to_merged_list) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000363 delete network;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000364 } else {
365 if (current_list.ips[0].family() == AF_INET) {
366 stats->ipv4_network_count++;
367 } else {
nisseede5da42017-01-12 05:15:36 -0800368 RTC_DCHECK(current_list.ips[0].family() == AF_INET6);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000369 stats->ipv6_network_count++;
370 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000371 }
372 }
373
374 // Next, look for existing network objects to re-use.
honghaizdb8cf502015-12-21 13:08:46 -0800375 // Result of Network merge. Element in this list should have unique key.
376 NetworkList merged_list;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000377 for (const auto& kv : consolidated_address_list) {
378 const std::string& key = kv.first;
379 Network* net = kv.second.net;
380 auto existing = networks_map_.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000381 if (existing == networks_map_.end()) {
Jonas Oreland7e914822020-03-23 12:44:58 +0100382 // This network is new. Place it in the network map.
Olga Sharonovaf74d2ce2020-03-30 08:20:05 +0000383 merged_list.push_back(net);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000384 networks_map_[key] = net;
honghaiza0c44ea2016-03-23 16:07:48 -0700385 net->set_id(next_available_network_id_++);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +0000386 // Also, we might have accumulated IPAddresses from the first
387 // step, set it here.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000388 net->SetIPs(kv.second.ips, true);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000389 *changed = true;
390 } else {
391 // This network exists in the map already. Reset its IP addresses.
honghaizdb8cf502015-12-21 13:08:46 -0800392 Network* existing_net = existing->second;
393 *changed = existing_net->SetIPs(kv.second.ips, *changed);
394 merged_list.push_back(existing_net);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700395 if (net->type() != ADAPTER_TYPE_UNKNOWN &&
396 net->type() != existing_net->type()) {
Jonas Orelandc7ea04a2020-04-03 10:12:28 +0200397 if (ShouldAdapterChangeTriggerNetworkChange(existing_net->type(),
398 net->type())) {
399 *changed = true;
400 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700401 existing_net->set_type(net->type());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700402 }
honghaizdb8cf502015-12-21 13:08:46 -0800403 // If the existing network was not active, networks have changed.
404 if (!existing_net->active()) {
405 *changed = true;
406 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200407 if (net->network_preference() != existing_net->network_preference()) {
408 existing_net->set_network_preference(net->network_preference());
409 if (signal_network_preference_change_) {
410 *changed = true;
411 }
412 }
nisseede5da42017-01-12 05:15:36 -0800413 RTC_DCHECK(net->active());
honghaizdb8cf502015-12-21 13:08:46 -0800414 if (existing_net != net) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000415 delete net;
416 }
417 }
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800418 networks_map_[key]->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000419 }
Artem Titov96e3b992021-07-26 16:03:14 +0200420 // It may still happen that the merged list is a subset of `networks_`.
honghaizdb8cf502015-12-21 13:08:46 -0800421 // To detect this change, we compare their sizes.
422 if (merged_list.size() != networks_.size()) {
423 *changed = true;
424 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000425
Artem Titov96e3b992021-07-26 16:03:14 +0200426 // If the network list changes, we re-assign `networks_` to the merged list
honghaizdb8cf502015-12-21 13:08:46 -0800427 // and re-sort it.
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000428 if (*changed) {
honghaizdb8cf502015-12-21 13:08:46 -0800429 networks_ = merged_list;
430 // Reset the active states of all networks.
431 for (const auto& kv : networks_map_) {
honghaize3c6c822016-02-17 13:00:28 -0800432 Network* network = kv.second;
Artem Titov96e3b992021-07-26 16:03:14 +0200433 // If `network` is in the newly generated `networks_`, it is active.
Steve Anton2acd1632019-03-25 13:48:30 -0700434 bool found = absl::c_linear_search(networks_, network);
honghaize3c6c822016-02-17 13:00:28 -0800435 network->set_active(found);
honghaizdb8cf502015-12-21 13:08:46 -0800436 }
Steve Anton2acd1632019-03-25 13:48:30 -0700437 absl::c_sort(networks_, SortNetworks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000438 // Now network interfaces are sorted, we should set the preference value
439 // for each of the interfaces we are planning to use.
440 // Preference order of network interfaces might have changed from previous
441 // sorting due to addition of higher preference network interface.
442 // Since we have already sorted the network interfaces based on our
443 // requirements, we will just assign a preference value starting with 127,
444 // in decreasing order.
445 int pref = kHighestNetworkPreference;
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000446 for (Network* network : networks_) {
447 network->set_preference(pref);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000448 if (pref > 0) {
449 --pref;
450 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100451 RTC_LOG(LS_ERROR) << "Too many network interfaces to handle!";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000452 break;
453 }
454 }
455 }
456}
457
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800458void NetworkManagerBase::set_default_local_addresses(const IPAddress& ipv4,
459 const IPAddress& ipv6) {
460 if (ipv4.family() == AF_INET) {
461 default_local_ipv4_address_ = ipv4;
462 }
463 if (ipv6.family() == AF_INET6) {
464 default_local_ipv6_address_ = ipv6;
465 }
466}
467
468bool NetworkManagerBase::GetDefaultLocalAddress(int family,
469 IPAddress* ipaddr) const {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800470 if (family == AF_INET && !default_local_ipv4_address_.IsNil()) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800471 *ipaddr = default_local_ipv4_address_;
472 return true;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800473 } else if (family == AF_INET6 && !default_local_ipv6_address_.IsNil()) {
honghaizaf83fe62016-04-18 14:50:44 -0700474 Network* ipv6_network = GetNetworkFromAddress(default_local_ipv6_address_);
475 if (ipv6_network) {
476 // If the default ipv6 network's BestIP is different than
477 // default_local_ipv6_address_, use it instead.
478 // This is to prevent potential IP address leakage. See WebRTC bug 5376.
479 *ipaddr = ipv6_network->GetBestIP();
480 } else {
481 *ipaddr = default_local_ipv6_address_;
482 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800483 return true;
484 }
485 return false;
486}
487
honghaizaf83fe62016-04-18 14:50:44 -0700488Network* NetworkManagerBase::GetNetworkFromAddress(
489 const rtc::IPAddress& ip) const {
490 for (Network* network : networks_) {
491 const auto& ips = network->GetIPs();
Steve Anton2acd1632019-03-25 13:48:30 -0700492 if (absl::c_any_of(ips, [&](const InterfaceAddress& existing_ip) {
493 return ip == static_cast<rtc::IPAddress>(existing_ip);
494 })) {
honghaizaf83fe62016-04-18 14:50:44 -0700495 return network;
496 }
497 }
498 return nullptr;
499}
500
Jonas Orelandac554eb2021-08-27 09:43:38 +0200501bool NetworkManagerBase::IsVpnMacAddress(
502 rtc::ArrayView<const uint8_t> address) {
503 if (address.data() == nullptr && address.size() == 0) {
504 return false;
505 }
506 for (const auto& vpn : kVpns) {
507 if (sizeof(vpn) == address.size() &&
508 memcmp(vpn, address.data(), address.size()) == 0) {
509 return true;
510 }
511 }
512 return false;
513}
514
Niels Mölleraa373162021-09-28 16:09:07 +0200515BasicNetworkManager::BasicNetworkManager(
516 NetworkMonitorFactory* network_monitor_factory,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200517 SocketFactory* socket_factory,
518 const webrtc::WebRtcKeyValueConfig* field_trials)
519 : field_trials_(field_trials),
520 network_monitor_factory_(network_monitor_factory),
Niels Mölleraa373162021-09-28 16:09:07 +0200521 socket_factory_(socket_factory),
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100522 allow_mac_based_ipv6_(
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200523 field_trials_->IsEnabled("WebRTC-AllowMACBasedIPv6")),
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000524 bind_using_ifname_(
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200525 !field_trials_->IsDisabled("WebRTC-BindUsingInterfaceName")) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000526
Niels Möller27c14522022-02-07 16:44:21 +0100527BasicNetworkManager::~BasicNetworkManager() {
528 if (task_safety_flag_) {
529 task_safety_flag_->SetNotAlive();
530 }
531}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000532
honghaiz023f3ef2015-10-19 09:39:32 -0700533void BasicNetworkManager::OnNetworksChanged() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700534 RTC_DCHECK_RUN_ON(thread_);
Mirko Bonadei675513b2017-11-09 11:09:25 +0100535 RTC_LOG(LS_INFO) << "Network change was observed";
honghaiz023f3ef2015-10-19 09:39:32 -0700536 UpdateNetworksOnce();
537}
538
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000539#if defined(__native_client__)
540
541bool BasicNetworkManager::CreateNetworks(bool include_ignored,
542 NetworkList* networks) const {
Artem Titovd3251962021-11-15 16:57:07 +0100543 RTC_DCHECK_NOTREACHED();
Mirko Bonadei675513b2017-11-09 11:09:25 +0100544 RTC_LOG(LS_WARNING) << "BasicNetworkManager doesn't work on NaCl yet";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000545 return false;
546}
547
548#elif defined(WEBRTC_POSIX)
549void BasicNetworkManager::ConvertIfAddrs(struct ifaddrs* interfaces,
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800550 IfAddrsConverter* ifaddrs_converter,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000551 bool include_ignored,
552 NetworkList* networks) const {
553 NetworkMap current_networks;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800554
deadbeef37f5ecf2017-02-27 14:06:41 -0800555 for (struct ifaddrs* cursor = interfaces; cursor != nullptr;
556 cursor = cursor->ifa_next) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000557 IPAddress prefix;
558 IPAddress mask;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800559 InterfaceAddress ip;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000560 int scope_id = 0;
561
562 // Some interfaces may not have address assigned.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800563 if (!cursor->ifa_addr || !cursor->ifa_netmask) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000564 continue;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800565 }
566 // Skip ones which are down.
567 if (!(cursor->ifa_flags & IFF_RUNNING)) {
568 continue;
569 }
570 // Skip unknown family.
571 if (cursor->ifa_addr->sa_family != AF_INET &&
572 cursor->ifa_addr->sa_family != AF_INET6) {
573 continue;
574 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800575 // Convert to InterfaceAddress.
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200576 // TODO(webrtc:13114): Convert ConvertIfAddrs to use rtc::Netmask.
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800577 if (!ifaddrs_converter->ConvertIfAddrsToIPAddress(cursor, &ip, &mask)) {
578 continue;
579 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000580
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800581 // Special case for IPv6 address.
582 if (cursor->ifa_addr->sa_family == AF_INET6) {
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100583 if (IsIgnoredIPv6(allow_mac_based_ipv6_, ip)) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000584 continue;
585 }
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800586 scope_id =
587 reinterpret_cast<sockaddr_in6*>(cursor->ifa_addr)->sin6_scope_id;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000588 }
589
Honghai Zhang351d77b2016-05-20 15:08:29 -0700590 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700591 AdapterType vpn_underlying_adapter_type = ADAPTER_TYPE_UNKNOWN;
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200592 NetworkPreference network_preference = NetworkPreference::NEUTRAL;
Honghai Zhang351d77b2016-05-20 15:08:29 -0700593 if (cursor->ifa_flags & IFF_LOOPBACK) {
594 adapter_type = ADAPTER_TYPE_LOOPBACK;
595 } else {
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800596 // If there is a network_monitor, use it to get the adapter type.
597 // Otherwise, get the adapter type based on a few name matching rules.
598 if (network_monitor_) {
599 adapter_type = network_monitor_->GetAdapterType(cursor->ifa_name);
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200600 network_preference =
601 network_monitor_->GetNetworkPreference(cursor->ifa_name);
Taylor Brandstetter8bac1d92018-01-24 17:38:00 -0800602 }
603 if (adapter_type == ADAPTER_TYPE_UNKNOWN) {
604 adapter_type = GetAdapterTypeFromName(cursor->ifa_name);
605 }
Honghai Zhang351d77b2016-05-20 15:08:29 -0700606 }
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700607
608 if (adapter_type == ADAPTER_TYPE_VPN && network_monitor_) {
609 vpn_underlying_adapter_type =
610 network_monitor_->GetVpnUnderlyingAdapterType(cursor->ifa_name);
611 }
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200612
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000613 int prefix_length = CountIPMaskBits(mask);
614 prefix = TruncateIP(ip, prefix_length);
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200615
616 if (adapter_type != ADAPTER_TYPE_VPN &&
617 IsConfiguredVpn(prefix, prefix_length)) {
618 vpn_underlying_adapter_type = adapter_type;
619 adapter_type = ADAPTER_TYPE_VPN;
620 }
621
Yves Gerey665174f2018-06-19 15:03:05 +0200622 std::string key =
623 MakeNetworkKey(std::string(cursor->ifa_name), prefix, prefix_length);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700624 auto iter = current_networks.find(key);
625 if (iter == current_networks.end()) {
Noah Richards2e266e92015-04-07 11:51:56 -0700626 // TODO(phoglund): Need to recognize other types as well.
jbauch555604a2016-04-26 03:13:22 -0700627 std::unique_ptr<Network> network(
628 new Network(cursor->ifa_name, cursor->ifa_name, prefix, prefix_length,
629 adapter_type));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800630 network->set_default_local_address_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000631 network->set_scope_id(scope_id);
632 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000633 network->set_ignored(IsIgnoredNetwork(*network));
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700634 network->set_underlying_type_for_vpn(vpn_underlying_adapter_type);
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200635 network->set_network_preference(network_preference);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000636 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800637 current_networks[key] = network.get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000638 networks->push_back(network.release());
639 }
640 } else {
Honghai Zhang351d77b2016-05-20 15:08:29 -0700641 Network* existing_network = iter->second;
642 existing_network->AddIP(ip);
643 if (adapter_type != ADAPTER_TYPE_UNKNOWN) {
644 existing_network->set_type(adapter_type);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -0700645 existing_network->set_underlying_type_for_vpn(
646 vpn_underlying_adapter_type);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700647 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +0200648 existing_network->set_network_preference(network_preference);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000649 }
650 }
651}
652
653bool BasicNetworkManager::CreateNetworks(bool include_ignored,
654 NetworkList* networks) const {
655 struct ifaddrs* interfaces;
656 int error = getifaddrs(&interfaces);
657 if (error != 0) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000658 RTC_LOG_ERR(LS_ERROR) << "getifaddrs failed to gather interface data: "
659 << error;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000660 return false;
661 }
662
jbauch555604a2016-04-26 03:13:22 -0700663 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(CreateIfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800664 ConvertIfAddrs(interfaces, ifaddrs_converter.get(), include_ignored,
665 networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000666
667 freeifaddrs(interfaces);
668 return true;
669}
670
671#elif defined(WEBRTC_WIN)
672
673unsigned int GetPrefix(PIP_ADAPTER_PREFIX prefixlist,
Yves Gerey665174f2018-06-19 15:03:05 +0200674 const IPAddress& ip,
675 IPAddress* prefix) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000676 IPAddress current_prefix;
677 IPAddress best_prefix;
678 unsigned int best_length = 0;
679 while (prefixlist) {
680 // Look for the longest matching prefix in the prefixlist.
deadbeef37f5ecf2017-02-27 14:06:41 -0800681 if (prefixlist->Address.lpSockaddr == nullptr ||
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000682 prefixlist->Address.lpSockaddr->sa_family != ip.family()) {
683 prefixlist = prefixlist->Next;
684 continue;
685 }
686 switch (prefixlist->Address.lpSockaddr->sa_family) {
687 case AF_INET: {
688 sockaddr_in* v4_addr =
689 reinterpret_cast<sockaddr_in*>(prefixlist->Address.lpSockaddr);
690 current_prefix = IPAddress(v4_addr->sin_addr);
691 break;
692 }
693 case AF_INET6: {
Yves Gerey665174f2018-06-19 15:03:05 +0200694 sockaddr_in6* v6_addr =
695 reinterpret_cast<sockaddr_in6*>(prefixlist->Address.lpSockaddr);
696 current_prefix = IPAddress(v6_addr->sin6_addr);
697 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000698 }
699 default: {
700 prefixlist = prefixlist->Next;
701 continue;
702 }
703 }
704 if (TruncateIP(ip, prefixlist->PrefixLength) == current_prefix &&
705 prefixlist->PrefixLength > best_length) {
706 best_prefix = current_prefix;
707 best_length = prefixlist->PrefixLength;
708 }
709 prefixlist = prefixlist->Next;
710 }
711 *prefix = best_prefix;
712 return best_length;
713}
714
715bool BasicNetworkManager::CreateNetworks(bool include_ignored,
716 NetworkList* networks) const {
717 NetworkMap current_networks;
718 // MSDN recommends a 15KB buffer for the first try at GetAdaptersAddresses.
719 size_t buffer_size = 16384;
jbauch555604a2016-04-26 03:13:22 -0700720 std::unique_ptr<char[]> adapter_info(new char[buffer_size]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000721 PIP_ADAPTER_ADDRESSES adapter_addrs =
722 reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
723 int adapter_flags = (GAA_FLAG_SKIP_DNS_SERVER | GAA_FLAG_SKIP_ANYCAST |
724 GAA_FLAG_SKIP_MULTICAST | GAA_FLAG_INCLUDE_PREFIX);
725 int ret = 0;
726 do {
727 adapter_info.reset(new char[buffer_size]);
728 adapter_addrs = reinterpret_cast<PIP_ADAPTER_ADDRESSES>(adapter_info.get());
Yves Gerey665174f2018-06-19 15:03:05 +0200729 ret = GetAdaptersAddresses(AF_UNSPEC, adapter_flags, 0, adapter_addrs,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000730 reinterpret_cast<PULONG>(&buffer_size));
731 } while (ret == ERROR_BUFFER_OVERFLOW);
732 if (ret != ERROR_SUCCESS) {
733 return false;
734 }
735 int count = 0;
736 while (adapter_addrs) {
737 if (adapter_addrs->OperStatus == IfOperStatusUp) {
738 PIP_ADAPTER_UNICAST_ADDRESS address = adapter_addrs->FirstUnicastAddress;
739 PIP_ADAPTER_PREFIX prefixlist = adapter_addrs->FirstPrefix;
740 std::string name;
741 std::string description;
tfarinaa41ab932015-10-30 16:08:48 -0700742#if !defined(NDEBUG)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000743 name = ToUtf8(adapter_addrs->FriendlyName,
744 wcslen(adapter_addrs->FriendlyName));
745#endif
746 description = ToUtf8(adapter_addrs->Description,
747 wcslen(adapter_addrs->Description));
748 for (; address; address = address->Next) {
tfarinaa41ab932015-10-30 16:08:48 -0700749#if defined(NDEBUG)
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000750 name = rtc::ToString(count);
751#endif
752
753 IPAddress ip;
754 int scope_id = 0;
jbauch555604a2016-04-26 03:13:22 -0700755 std::unique_ptr<Network> network;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000756 switch (address->Address.lpSockaddr->sa_family) {
757 case AF_INET: {
758 sockaddr_in* v4_addr =
759 reinterpret_cast<sockaddr_in*>(address->Address.lpSockaddr);
760 ip = IPAddress(v4_addr->sin_addr);
761 break;
762 }
763 case AF_INET6: {
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100764 sockaddr_in6* v6_addr =
765 reinterpret_cast<sockaddr_in6*>(address->Address.lpSockaddr);
766 scope_id = v6_addr->sin6_scope_id;
767 ip = IPAddress(v6_addr->sin6_addr);
guoweis@webrtc.orgb91d0f52015-03-17 14:43:20 +0000768
Jonas Oreland47fa08f2020-12-05 18:09:13 +0100769 if (IsIgnoredIPv6(allow_mac_based_ipv6_, InterfaceAddress(ip))) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000770 continue;
771 }
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100772
773 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000774 }
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800775 default: {
776 continue;
777 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000778 }
779
780 IPAddress prefix;
781 int prefix_length = GetPrefix(prefixlist, ip, &prefix);
782 std::string key = MakeNetworkKey(name, prefix, prefix_length);
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000783 auto existing_network = current_networks.find(key);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000784 if (existing_network == current_networks.end()) {
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000785 AdapterType adapter_type = ADAPTER_TYPE_UNKNOWN;
Yura Yaroshevich0ce868c2018-05-15 11:15:32 +0300786 switch (adapter_addrs->IfType) {
787 case IF_TYPE_SOFTWARE_LOOPBACK:
788 adapter_type = ADAPTER_TYPE_LOOPBACK;
789 break;
790 case IF_TYPE_ETHERNET_CSMACD:
791 case IF_TYPE_ETHERNET_3MBIT:
792 case IF_TYPE_IEEE80212:
793 case IF_TYPE_FASTETHER:
794 case IF_TYPE_FASTETHER_FX:
795 case IF_TYPE_GIGABITETHERNET:
796 adapter_type = ADAPTER_TYPE_ETHERNET;
797 break;
798 case IF_TYPE_IEEE80211:
799 adapter_type = ADAPTER_TYPE_WIFI;
800 break;
801 case IF_TYPE_WWANPP:
802 case IF_TYPE_WWANPP2:
803 adapter_type = ADAPTER_TYPE_CELLULAR;
804 break;
805 default:
806 // TODO(phoglund): Need to recognize other types as well.
807 adapter_type = ADAPTER_TYPE_UNKNOWN;
808 break;
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000809 }
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200810 auto vpn_underlying_adapter_type = ADAPTER_TYPE_UNKNOWN;
811 if (adapter_type != ADAPTER_TYPE_VPN &&
812 IsConfiguredVpn(prefix, prefix_length)) {
813 vpn_underlying_adapter_type = adapter_type;
814 adapter_type = ADAPTER_TYPE_VPN;
815 }
Jonas Orelandac554eb2021-08-27 09:43:38 +0200816 if (adapter_type != ADAPTER_TYPE_VPN &&
817 IsVpnMacAddress(rtc::ArrayView<const uint8_t>(
818 reinterpret_cast<const uint8_t*>(
819 adapter_addrs->PhysicalAddress),
820 adapter_addrs->PhysicalAddressLength))) {
821 vpn_underlying_adapter_type = adapter_type;
822 adapter_type = ADAPTER_TYPE_VPN;
823 }
824
jbauch555604a2016-04-26 03:13:22 -0700825 std::unique_ptr<Network> network(new Network(
826 name, description, prefix, prefix_length, adapter_type));
Jonas Oreland2ee0e642021-08-25 15:43:02 +0200827 network->set_underlying_type_for_vpn(vpn_underlying_adapter_type);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800828 network->set_default_local_address_provider(this);
Qingsi Wang5ae259e2019-02-13 15:46:07 -0800829 network->set_mdns_responder_provider(this);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000830 network->set_scope_id(scope_id);
831 network->AddIP(ip);
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000832 bool ignored = IsIgnoredNetwork(*network);
833 network->set_ignored(ignored);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000834 if (include_ignored || !network->ignored()) {
honghaizdb8cf502015-12-21 13:08:46 -0800835 current_networks[key] = network.get();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000836 networks->push_back(network.release());
837 }
838 } else {
839 (*existing_network).second->AddIP(ip);
840 }
841 }
842 // Count is per-adapter - all 'Networks' created from the same
843 // adapter need to have the same name.
844 ++count;
845 }
846 adapter_addrs = adapter_addrs->Next;
847 }
848 return true;
849}
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000850#endif // WEBRTC_WIN
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000851
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000852bool BasicNetworkManager::IsIgnoredNetwork(const Network& network) const {
853 // Ignore networks on the explicit ignore list.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +0000854 for (const std::string& ignored_name : network_ignore_list_) {
855 if (network.name() == ignored_name) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000856 return true;
857 }
858 }
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000859
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000860#if defined(WEBRTC_POSIX)
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000861 // Filter out VMware/VirtualBox interfaces, typically named vmnet1,
862 // vmnet8, or vboxnet0.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000863 if (strncmp(network.name().c_str(), "vmnet", 5) == 0 ||
pthatcher@webrtc.orgdfef0282015-01-07 17:20:52 +0000864 strncmp(network.name().c_str(), "vnic", 4) == 0 ||
865 strncmp(network.name().c_str(), "vboxnet", 7) == 0) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000866 return true;
867 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000868#elif defined(WEBRTC_WIN)
869 // Ignore any HOST side vmware adapters with a description like:
870 // VMware Virtual Ethernet Adapter for VMnet1
871 // but don't ignore any GUEST side adapters with a description like:
872 // VMware Accelerated AMD PCNet Adapter #2
deadbeef37f5ecf2017-02-27 14:06:41 -0800873 if (strstr(network.description().c_str(), "VMnet") != nullptr) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000874 return true;
875 }
876#endif
877
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700878 if (network_monitor_ &&
879 !network_monitor_->IsAdapterAvailable(network.name())) {
880 return true;
881 }
882
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000883 // Ignore any networks with a 0.x.y.z IP
884 if (network.prefix().family() == AF_INET) {
885 return (network.prefix().v4AddressAsHostOrderInteger() < 0x01000000);
886 }
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000887
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000888 return false;
889}
890
891void BasicNetworkManager::StartUpdating() {
892 thread_ = Thread::Current();
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700893 // Redundant but necessary for thread annotations.
894 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000895 if (start_count_) {
896 // If network interfaces are already discovered and signal is sent,
897 // we should trigger network signal immediately for the new clients
898 // to start allocating ports.
899 if (sent_first_update_)
Niels Möller27c14522022-02-07 16:44:21 +0100900 thread_->PostTask(ToQueuedTask(task_safety_flag_, [this] {
901 RTC_DCHECK_RUN_ON(thread_);
902 SignalNetworksChanged();
903 }));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000904 } else {
Niels Möller27c14522022-02-07 16:44:21 +0100905 RTC_DCHECK(task_safety_flag_ == nullptr);
906 task_safety_flag_ = webrtc::PendingTaskSafetyFlag::Create();
907 thread_->PostTask(ToQueuedTask(task_safety_flag_, [this] {
908 RTC_DCHECK_RUN_ON(thread_);
909 UpdateNetworksContinually();
910 }));
honghaiz023f3ef2015-10-19 09:39:32 -0700911 StartNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000912 }
913 ++start_count_;
914}
915
916void BasicNetworkManager::StopUpdating() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700917 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000918 if (!start_count_)
919 return;
920
921 --start_count_;
922 if (!start_count_) {
Niels Möller27c14522022-02-07 16:44:21 +0100923 task_safety_flag_->SetNotAlive();
924 task_safety_flag_ = nullptr;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000925 sent_first_update_ = false;
honghaiz023f3ef2015-10-19 09:39:32 -0700926 StopNetworkMonitor();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000927 }
928}
929
honghaiz023f3ef2015-10-19 09:39:32 -0700930void BasicNetworkManager::StartNetworkMonitor() {
Taylor Brandstetter07fc24d2020-08-12 01:58:10 +0000931 if (network_monitor_factory_ == nullptr) {
932 return;
honghaiz023f3ef2015-10-19 09:39:32 -0700933 }
honghaiz023f3ef2015-10-19 09:39:32 -0700934 if (!network_monitor_) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200935 network_monitor_.reset(
936 network_monitor_factory_->CreateNetworkMonitor(*field_trials_));
honghaizcec0a082016-01-15 14:49:09 -0800937 if (!network_monitor_) {
938 return;
939 }
Mirko Bonadei37077932021-07-27 17:00:58 +0200940 network_monitor_->SetNetworksChangedCallback(
941 [this]() { OnNetworksChanged(); });
honghaiz023f3ef2015-10-19 09:39:32 -0700942 }
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000943
944 if (network_monitor_->SupportsBindSocketToNetwork()) {
945 // Set NetworkBinder on SocketServer so that
946 // PhysicalSocket::Bind will call
947 // BasicNetworkManager::BindSocketToNetwork(), (that will lookup interface
948 // name and then call network_monitor_->BindSocketToNetwork()).
949 thread_->socketserver()->set_network_binder(this);
950 }
951
honghaiz023f3ef2015-10-19 09:39:32 -0700952 network_monitor_->Start();
953}
954
955void BasicNetworkManager::StopNetworkMonitor() {
956 if (!network_monitor_) {
957 return;
958 }
959 network_monitor_->Stop();
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000960
961 if (network_monitor_->SupportsBindSocketToNetwork()) {
962 // Reset NetworkBinder on SocketServer.
963 if (thread_->socketserver()->network_binder() == this) {
964 thread_->socketserver()->set_network_binder(nullptr);
965 }
966 }
honghaiz023f3ef2015-10-19 09:39:32 -0700967}
968
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800969IPAddress BasicNetworkManager::QueryDefaultLocalAddress(int family) const {
nisseede5da42017-01-12 05:15:36 -0800970 RTC_DCHECK(family == AF_INET || family == AF_INET6);
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800971
Niels Mölleraa373162021-09-28 16:09:07 +0200972 // TODO(bugs.webrtc.org/13145): Delete support for null `socket_factory_`,
973 // require socket factory to be provided to constructor.
974 SocketFactory* socket_factory = socket_factory_;
975 if (!socket_factory) {
976 socket_factory = thread_->socketserver();
977 }
978 RTC_DCHECK(socket_factory);
979
Niels Möllerd0b88792021-08-12 10:32:30 +0200980 std::unique_ptr<Socket> socket(
Niels Mölleraa373162021-09-28 16:09:07 +0200981 socket_factory->CreateSocket(family, SOCK_DGRAM));
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800982 if (!socket) {
Harald Alvestrand5f341302021-11-24 10:01:32 +0000983 RTC_LOG_ERR(LS_ERROR) << "Socket creation failed";
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800984 return IPAddress();
985 }
986
guoweis56271ed2016-01-15 14:45:06 -0800987 if (socket->Connect(SocketAddress(
988 family == AF_INET ? kPublicIPv4Host : kPublicIPv6Host, kPublicPort)) <
989 0) {
Yves Gerey665174f2018-06-19 15:03:05 +0200990 if (socket->GetError() != ENETUNREACH &&
991 socket->GetError() != EHOSTUNREACH) {
skvlad75024012016-09-29 12:59:35 -0700992 // Ignore the expected case of "host/net unreachable" - which happens if
993 // the network is V4- or V6-only.
Mirko Bonadei675513b2017-11-09 11:09:25 +0100994 RTC_LOG(LS_INFO) << "Connect failed with " << socket->GetError();
skvlad75024012016-09-29 12:59:35 -0700995 }
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800996 return IPAddress();
997 }
998 return socket->GetLocalAddress().ipaddr();
999}
1000
honghaiz023f3ef2015-10-19 09:39:32 -07001001void BasicNetworkManager::UpdateNetworksOnce() {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001002 if (!start_count_)
1003 return;
1004
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001005 NetworkList list;
1006 if (!CreateNetworks(false, &list)) {
1007 SignalError();
1008 } else {
1009 bool changed;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001010 NetworkManager::Stats stats;
1011 MergeNetworkList(list, &changed, &stats);
1012 set_default_local_addresses(QueryDefaultLocalAddress(AF_INET),
1013 QueryDefaultLocalAddress(AF_INET6));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001014 if (changed || !sent_first_update_) {
1015 SignalNetworksChanged();
1016 sent_first_update_ = true;
1017 }
1018 }
honghaiz023f3ef2015-10-19 09:39:32 -07001019}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001020
honghaiz023f3ef2015-10-19 09:39:32 -07001021void BasicNetworkManager::UpdateNetworksContinually() {
1022 UpdateNetworksOnce();
Niels Möller27c14522022-02-07 16:44:21 +01001023 thread_->PostDelayedTask(ToQueuedTask(task_safety_flag_,
1024 [this] {
1025 RTC_DCHECK_RUN_ON(thread_);
1026 UpdateNetworksContinually();
1027 }),
1028 kNetworksUpdateIntervalMs);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001029}
1030
honghaizdb8cf502015-12-21 13:08:46 -08001031void BasicNetworkManager::DumpNetworks() {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001032 RTC_DCHECK_RUN_ON(thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001033 NetworkList list;
honghaizdb8cf502015-12-21 13:08:46 -08001034 GetNetworks(&list);
Mirko Bonadei675513b2017-11-09 11:09:25 +01001035 RTC_LOG(LS_INFO) << "NetworkManager detected " << list.size() << " networks:";
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001036 for (const Network* network : list) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001037 RTC_LOG(LS_INFO) << network->ToString() << ": " << network->description()
1038 << ", active ? " << network->active()
1039 << ((network->ignored()) ? ", Ignored" : "");
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001040 }
1041}
1042
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001043NetworkBindingResult BasicNetworkManager::BindSocketToNetwork(
1044 int socket_fd,
1045 const IPAddress& address) {
1046 RTC_DCHECK_RUN_ON(thread_);
1047 std::string if_name;
1048 if (bind_using_ifname_) {
1049 Network* net = GetNetworkFromAddress(address);
1050 if (net != nullptr) {
1051 if_name = net->name();
1052 }
1053 }
1054 return network_monitor_->BindSocketToNetwork(socket_fd, address, if_name);
1055}
1056
Ali Tofigh7fa90572022-03-17 15:47:49 +01001057Network::Network(absl::string_view name,
1058 absl::string_view desc,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001059 const IPAddress& prefix,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001060 int prefix_length,
1061 AdapterType type)
1062 : name_(name),
1063 description_(desc),
1064 prefix_(prefix),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001065 prefix_length_(prefix_length),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001066 key_(MakeNetworkKey(name, prefix, prefix_length)),
1067 scope_id_(0),
1068 ignored_(false),
1069 type_(type),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001070 preference_(0) {}
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001071
Steve Anton9de3aac2017-10-24 10:08:26 -07001072Network::Network(const Network&) = default;
1073
kwiberg@webrtc.org67186fe2015-03-09 22:21:53 +00001074Network::~Network() = default;
1075
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001076// Sets the addresses of this network. Returns true if the address set changed.
1077// Change detection is short circuited if the changed argument is true.
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001078bool Network::SetIPs(const std::vector<InterfaceAddress>& ips, bool changed) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001079 // Detect changes with a nested loop; n-squared but we expect on the order
1080 // of 2-3 addresses per network.
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001081 changed = changed || ips.size() != ips_.size();
1082 if (!changed) {
1083 for (const InterfaceAddress& ip : ips) {
Steve Anton2acd1632019-03-25 13:48:30 -07001084 if (!absl::c_linear_search(ips_, ip)) {
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001085 changed = true;
1086 break;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001087 }
1088 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001089 }
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001090
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001091 ips_ = ips;
1092 return changed;
1093}
1094
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001095// Select the best IP address to use from this Network.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001096IPAddress Network::GetBestIP() const {
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001097 if (ips_.size() == 0) {
1098 return IPAddress();
1099 }
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001100
1101 if (prefix_.family() == AF_INET) {
1102 return static_cast<IPAddress>(ips_.at(0));
1103 }
1104
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001105 InterfaceAddress selected_ip, ula_ip;
1106
pthatcher@webrtc.org5950b642014-12-01 23:18:27 +00001107 for (const InterfaceAddress& ip : ips_) {
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001108 // Ignore any address which has been deprecated already.
1109 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED)
1110 continue;
1111
1112 // ULA address should only be returned when we have no other
1113 // global IP.
1114 if (IPIsULA(static_cast<const IPAddress&>(ip))) {
1115 ula_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001116 continue;
1117 }
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001118 selected_ip = ip;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001119
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001120 // Search could stop once a temporary non-deprecated one is found.
1121 if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_TEMPORARY)
1122 break;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001123 }
1124
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001125 // No proper global IPv6 address found, use ULA instead.
1126 if (IPIsUnspec(selected_ip) && !IPIsUnspec(ula_ip)) {
1127 selected_ip = ula_ip;
1128 }
1129
1130 return static_cast<IPAddress>(selected_ip);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001131}
1132
Qingsi Wang5ae259e2019-02-13 15:46:07 -08001133webrtc::MdnsResponderInterface* Network::GetMdnsResponder() const {
1134 if (mdns_responder_provider_ == nullptr) {
1135 return nullptr;
1136 }
1137 return mdns_responder_provider_->GetMdnsResponder();
1138}
1139
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001140uint16_t Network::GetCost(
1141 const webrtc::WebRtcKeyValueConfig* field_trials) const {
1142 return GetCost(
1143 *webrtc::AlwaysValidPointer<const webrtc::WebRtcKeyValueConfig,
1144 webrtc::FieldTrialBasedConfig>(field_trials));
1145}
1146
1147uint16_t Network::GetCost(
1148 const webrtc::WebRtcKeyValueConfig& field_trials) const {
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001149 AdapterType type = IsVpn() ? underlying_type_for_vpn_ : type_;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001150 const bool use_differentiated_cellular_costs =
1151 field_trials.IsEnabled("WebRTC-UseDifferentiatedCellularCosts");
1152 const bool add_network_cost_to_vpn =
1153 field_trials.IsEnabled("WebRTC-AddNetworkCostToVpn");
Jonas Orelandb477fc72021-08-23 12:16:33 +02001154 return ComputeNetworkCostByType(type, IsVpn(),
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001155 use_differentiated_cellular_costs,
1156 add_network_cost_to_vpn);
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001157}
1158
Jonas Oreland30019052022-01-28 14:11:44 +01001159// This is the inverse of ComputeNetworkCostByType().
1160std::pair<rtc::AdapterType, bool /* vpn */>
1161Network::GuessAdapterFromNetworkCost(int network_cost) {
1162 switch (network_cost) {
1163 case kNetworkCostMin:
1164 return {rtc::ADAPTER_TYPE_ETHERNET, false};
1165 case kNetworkCostMin + kNetworkCostVpn:
1166 return {rtc::ADAPTER_TYPE_ETHERNET, true};
1167 case kNetworkCostLow:
1168 return {rtc::ADAPTER_TYPE_WIFI, false};
1169 case kNetworkCostLow + kNetworkCostVpn:
1170 return {rtc::ADAPTER_TYPE_WIFI, true};
1171 case kNetworkCostCellular:
1172 return {rtc::ADAPTER_TYPE_CELLULAR, false};
1173 case kNetworkCostCellular + kNetworkCostVpn:
1174 return {rtc::ADAPTER_TYPE_CELLULAR, true};
1175 case kNetworkCostCellular2G:
1176 return {rtc::ADAPTER_TYPE_CELLULAR_2G, false};
1177 case kNetworkCostCellular2G + kNetworkCostVpn:
1178 return {rtc::ADAPTER_TYPE_CELLULAR_2G, true};
1179 case kNetworkCostCellular3G:
1180 return {rtc::ADAPTER_TYPE_CELLULAR_3G, false};
1181 case kNetworkCostCellular3G + kNetworkCostVpn:
1182 return {rtc::ADAPTER_TYPE_CELLULAR_3G, true};
1183 case kNetworkCostCellular4G:
1184 return {rtc::ADAPTER_TYPE_CELLULAR_4G, false};
1185 case kNetworkCostCellular4G + kNetworkCostVpn:
1186 return {rtc::ADAPTER_TYPE_CELLULAR_4G, true};
1187 case kNetworkCostCellular5G:
1188 return {rtc::ADAPTER_TYPE_CELLULAR_5G, false};
1189 case kNetworkCostCellular5G + kNetworkCostVpn:
1190 return {rtc::ADAPTER_TYPE_CELLULAR_5G, true};
1191 case kNetworkCostUnknown:
1192 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1193 case kNetworkCostUnknown + kNetworkCostVpn:
1194 return {rtc::ADAPTER_TYPE_UNKNOWN, true};
1195 case kNetworkCostMax:
1196 return {rtc::ADAPTER_TYPE_ANY, false};
1197 case kNetworkCostMax + kNetworkCostVpn:
1198 return {rtc::ADAPTER_TYPE_ANY, true};
1199 }
1200 RTC_LOG(LS_VERBOSE) << "Unknown network cost: " << network_cost;
1201 return {rtc::ADAPTER_TYPE_UNKNOWN, false};
1202}
1203
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001204std::string Network::ToString() const {
Jonas Olsson366a50c2018-09-06 13:41:30 +02001205 rtc::StringBuilder ss;
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001206 // Print out the first space-terminated token of the network desc, plus
1207 // the IP address.
Qingsi Wangde2ed7d2018-04-27 14:25:37 -07001208 ss << "Net[" << description_.substr(0, description_.find(' ')) << ":"
1209 << prefix_.ToSensitiveString() << "/" << prefix_length_ << ":"
1210 << AdapterTypeToString(type_);
1211 if (IsVpn()) {
1212 ss << "/" << AdapterTypeToString(underlying_type_for_vpn_);
1213 }
Qingsi Wang10a0e512018-05-16 13:37:03 -07001214 ss << ":id=" << id_ << "]";
Jonas Olsson84df1c72018-09-14 16:59:32 +02001215 return ss.Release();
guoweis@webrtc.orgfa603982014-09-09 23:42:40 +00001216}
1217
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001218void BasicNetworkManager::set_vpn_list(const std::vector<NetworkMask>& vpn) {
1219 if (thread_ == nullptr) {
1220 vpn_ = vpn;
1221 } else {
1222 thread_->Invoke<void>(RTC_FROM_HERE, [this, vpn] { vpn_ = vpn; });
1223 }
1224}
1225
1226bool BasicNetworkManager::IsConfiguredVpn(IPAddress prefix,
1227 int prefix_length) const {
1228 RTC_DCHECK_RUN_ON(thread_);
1229 for (const auto& vpn : vpn_) {
1230 if (prefix_length >= vpn.prefix_length()) {
1231 auto copy = TruncateIP(prefix, vpn.prefix_length());
1232 if (copy == vpn.address()) {
1233 return true;
1234 }
1235 }
1236 }
1237 return false;
1238}
1239
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001240} // namespace rtc