blob: 4bfe93fa0c517e82c9b91e5b352b0dac0436abb7 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
oprypin1ea631f2017-08-18 00:15:19 -070013#include <stdlib.h>
14
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070015#include <algorithm>
jbauch555604a2016-04-26 03:13:22 -070016#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#include <vector>
oprypin1ea631f2017-08-18 00:15:19 -070018
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070019#include "absl/algorithm/container.h"
Mirko Bonadei06d35592020-04-01 13:43:08 +020020#include "absl/strings/match.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020021#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080022#include "rtc_base/net_helpers.h"
23#include "rtc_base/network_monitor.h"
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -070024#include "rtc_base/network_monitor_factory.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000025#if defined(WEBRTC_POSIX)
Henrik Kjellander00725112017-06-30 15:14:45 +020026#include <net/if.h>
Yves Gerey665174f2018-06-19 15:03:05 +020027#include <sys/types.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020028
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020029#include "rtc_base/ifaddrs_converter.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080030#endif // defined(WEBRTC_POSIX)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020031#include "rtc_base/gunit.h"
Steve Anton2acd1632019-03-25 13:48:30 -070032#include "test/gmock.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000033#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +010034#include "rtc_base/logging.h" // For RTC_LOG_GLE
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000035#endif
Jonas Oreland47fa08f2020-12-05 18:09:13 +010036#include "test/field_trial.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000037
Steve Anton2acd1632019-03-25 13:48:30 -070038using ::testing::Contains;
39using ::testing::Not;
40using ::testing::UnorderedElementsAre;
41using ::testing::UnorderedElementsAreArray;
42
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000043namespace rtc {
44
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080045namespace {
46
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000047class FakeNetworkMonitor : public NetworkMonitorInterface {
honghaiz023f3ef2015-10-19 09:39:32 -070048 public:
honghaizcec0a082016-01-15 14:49:09 -080049 void Start() override { started_ = true; }
50 void Stop() override { started_ = false; }
51 bool started() { return started_; }
honghaiza7ad7c32016-02-02 12:54:14 -080052 AdapterType GetAdapterType(const std::string& if_name) override {
Honghai Zhang351d77b2016-05-20 15:08:29 -070053 // Note that the name matching rules are different from the
54 // GetAdapterTypeFromName in NetworkManager.
Mirko Bonadei06d35592020-04-01 13:43:08 +020055 if (absl::StartsWith(if_name, "wifi")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070056 return ADAPTER_TYPE_WIFI;
57 }
Mirko Bonadei06d35592020-04-01 13:43:08 +020058 if (absl::StartsWith(if_name, "cellular")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070059 return ADAPTER_TYPE_CELLULAR;
60 }
honghaiza7ad7c32016-02-02 12:54:14 -080061 return ADAPTER_TYPE_UNKNOWN;
62 }
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000063 AdapterType GetVpnUnderlyingAdapterType(const std::string& if_name) override {
64 return ADAPTER_TYPE_UNKNOWN;
65 }
Jonas Orelandf7721fb2020-08-07 11:08:34 +020066 NetworkPreference GetNetworkPreference(const std::string& if_name) override {
67 return NetworkPreference::NEUTRAL;
68 }
honghaizcec0a082016-01-15 14:49:09 -080069
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070070 bool IsAdapterAvailable(const std::string& if_name) override {
71 return absl::c_count(unavailable_adapters_, if_name) == 0;
72 }
73
74 // Used to test IsAdapterAvailable.
75 void set_unavailable_adapters(std::vector<std::string> unavailable_adapters) {
76 unavailable_adapters_ = unavailable_adapters;
77 }
78
Jonas Oreland6ca955a2021-03-15 08:27:43 +000079 bool SupportsBindSocketToNetwork() const override { return true; }
80
81 NetworkBindingResult BindSocketToNetwork(
82 int socket_fd,
83 const IPAddress& address,
84 const std::string& if_name) override {
85 if (absl::c_count(addresses_, address) > 0) {
86 return NetworkBindingResult::SUCCESS;
87 }
88
89 for (auto const& iter : adapters_) {
90 if (if_name.find(iter) != std::string::npos) {
91 return NetworkBindingResult::SUCCESS;
92 }
93 }
94 return NetworkBindingResult::ADDRESS_NOT_FOUND;
95 }
96
97 void set_ip_addresses(std::vector<IPAddress> addresses) {
98 addresses_ = addresses;
99 }
100
101 void set_adapters(std::vector<std::string> adapters) { adapters_ = adapters; }
102
Mirko Bonadei37077932021-07-27 17:00:58 +0200103 void InovkeNetworksChangedCallbackForTesting() {
104 InvokeNetworksChangedCallback();
105 }
106
honghaizcec0a082016-01-15 14:49:09 -0800107 private:
108 bool started_ = false;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000109 std::vector<std::string> adapters_;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700110 std::vector<std::string> unavailable_adapters_;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000111 std::vector<IPAddress> addresses_;
honghaiz023f3ef2015-10-19 09:39:32 -0700112};
113
114class FakeNetworkMonitorFactory : public NetworkMonitorFactory {
115 public:
116 FakeNetworkMonitorFactory() {}
honghaizcec0a082016-01-15 14:49:09 -0800117 NetworkMonitorInterface* CreateNetworkMonitor() override {
honghaiz023f3ef2015-10-19 09:39:32 -0700118 return new FakeNetworkMonitor();
119 }
120};
121
Qingsi Wang10a0e512018-05-16 13:37:03 -0700122bool SameNameAndPrefix(const rtc::Network& a, const rtc::Network& b) {
123 if (a.name() != b.name()) {
124 RTC_LOG(INFO) << "Different interface names.";
125 return false;
126 }
127 if (a.prefix_length() != b.prefix_length() || a.prefix() != b.prefix()) {
128 RTC_LOG(INFO) << "Different IP prefixes.";
129 return false;
130 }
131 return true;
132}
133
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800134} // namespace
135
Mirko Bonadei6a489f22019-04-09 15:11:12 +0200136class NetworkTest : public ::testing::Test, public sigslot::has_slots<> {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000137 public:
138 NetworkTest() : callback_called_(false) {}
139
Yves Gerey665174f2018-06-19 15:03:05 +0200140 void OnNetworksChanged() { callback_called_ = true; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000141
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000142 NetworkManager::Stats MergeNetworkList(
143 BasicNetworkManager& network_manager,
144 const NetworkManager::NetworkList& list,
145 bool* changed) {
146 NetworkManager::Stats stats;
147 network_manager.MergeNetworkList(list, changed, &stats);
148 return stats;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000149 }
150
151 bool IsIgnoredNetwork(BasicNetworkManager& network_manager,
152 const Network& network) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700153 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000154 return network_manager.IsIgnoredNetwork(network);
155 }
156
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700157 IPAddress QueryDefaultLocalAddress(BasicNetworkManager& network_manager,
158 int family) {
159 RTC_DCHECK_RUN_ON(network_manager.thread_);
160 return network_manager.QueryDefaultLocalAddress(family);
161 }
162
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000163 NetworkManager::NetworkList GetNetworks(
Yves Gerey665174f2018-06-19 15:03:05 +0200164 const BasicNetworkManager& network_manager,
165 bool include_ignored) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700166 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000167 NetworkManager::NetworkList list;
168 network_manager.CreateNetworks(include_ignored, &list);
169 return list;
170 }
171
honghaizcec0a082016-01-15 14:49:09 -0800172 FakeNetworkMonitor* GetNetworkMonitor(BasicNetworkManager& network_manager) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700173 RTC_DCHECK_RUN_ON(network_manager.thread_);
honghaizcec0a082016-01-15 14:49:09 -0800174 return static_cast<FakeNetworkMonitor*>(
175 network_manager.network_monitor_.get());
honghaiz023f3ef2015-10-19 09:39:32 -0700176 }
177 void ClearNetworks(BasicNetworkManager& network_manager) {
178 for (const auto& kv : network_manager.networks_map_) {
179 delete kv.second;
180 }
181 network_manager.networks_.clear();
182 network_manager.networks_map_.clear();
183 }
184
Honghai Zhang351d77b2016-05-20 15:08:29 -0700185 AdapterType GetAdapterType(BasicNetworkManager& network_manager) {
186 BasicNetworkManager::NetworkList list;
187 network_manager.GetNetworks(&list);
nissec16fa5e2017-02-07 07:18:43 -0800188 RTC_CHECK_EQ(1, list.size());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700189 return list[0]->type();
190 }
191
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000192#if defined(WEBRTC_POSIX)
193 // Separated from CreateNetworks for tests.
194 static void CallConvertIfAddrs(const BasicNetworkManager& network_manager,
195 struct ifaddrs* interfaces,
196 bool include_ignored,
197 NetworkManager::NetworkList* networks) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700198 RTC_DCHECK_RUN_ON(network_manager.thread_);
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800199 // Use the base IfAddrsConverter for test cases.
jbauch555604a2016-04-26 03:13:22 -0700200 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(new IfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800201 network_manager.ConvertIfAddrs(interfaces, ifaddrs_converter.get(),
202 include_ignored, networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000203 }
honghaizdb8cf502015-12-21 13:08:46 -0800204
205 struct sockaddr_in6* CreateIpv6Addr(const std::string& ip_string,
206 uint32_t scope_id) {
Yves Gerey665174f2018-06-19 15:03:05 +0200207 struct sockaddr_in6* ipv6_addr =
208 static_cast<struct sockaddr_in6*>(malloc(sizeof(struct sockaddr_in6)));
honghaizdb8cf502015-12-21 13:08:46 -0800209 memset(ipv6_addr, 0, sizeof(struct sockaddr_in6));
210 ipv6_addr->sin6_family = AF_INET6;
211 ipv6_addr->sin6_scope_id = scope_id;
212 IPAddress ip;
213 IPFromString(ip_string, &ip);
214 ipv6_addr->sin6_addr = ip.ipv6_address();
215 return ipv6_addr;
216 }
217
218 // Pointers created here need to be released via ReleaseIfAddrs.
219 struct ifaddrs* AddIpv6Address(struct ifaddrs* list,
220 char* if_name,
221 const std::string& ipv6_address,
222 const std::string& ipv6_netmask,
223 uint32_t scope_id) {
224 struct ifaddrs* if_addr = new struct ifaddrs;
225 memset(if_addr, 0, sizeof(struct ifaddrs));
226 if_addr->ifa_name = if_name;
227 if_addr->ifa_addr = reinterpret_cast<struct sockaddr*>(
228 CreateIpv6Addr(ipv6_address, scope_id));
229 if_addr->ifa_netmask =
230 reinterpret_cast<struct sockaddr*>(CreateIpv6Addr(ipv6_netmask, 0));
231 if_addr->ifa_next = list;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800232 if_addr->ifa_flags = IFF_RUNNING;
honghaizdb8cf502015-12-21 13:08:46 -0800233 return if_addr;
234 }
235
Honghai Zhang351d77b2016-05-20 15:08:29 -0700236 struct ifaddrs* InstallIpv6Network(char* if_name,
237 const std::string& ipv6_address,
238 const std::string& ipv6_mask,
239 BasicNetworkManager& network_manager) {
240 ifaddrs* addr_list = nullptr;
241 addr_list = AddIpv6Address(addr_list, if_name, ipv6_address, ipv6_mask, 0);
242 NetworkManager::NetworkList result;
243 bool changed;
244 NetworkManager::Stats stats;
245 CallConvertIfAddrs(network_manager, addr_list, true, &result);
246 network_manager.MergeNetworkList(result, &changed, &stats);
247 return addr_list;
248 }
249
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800250 struct sockaddr_in* CreateIpv4Addr(const std::string& ip_string) {
251 struct sockaddr_in* ipv4_addr =
252 static_cast<struct sockaddr_in*>(malloc(sizeof(struct sockaddr_in)));
253 memset(ipv4_addr, 0, sizeof(struct sockaddr_in));
254 ipv4_addr->sin_family = AF_INET;
255 IPAddress ip;
256 IPFromString(ip_string, &ip);
257 ipv4_addr->sin_addr = ip.ipv4_address();
258 return ipv4_addr;
259 }
260
261 // Pointers created here need to be released via ReleaseIfAddrs.
262 struct ifaddrs* AddIpv4Address(struct ifaddrs* list,
263 char* if_name,
264 const std::string& ipv4_address,
265 const std::string& ipv4_netmask) {
266 struct ifaddrs* if_addr = new struct ifaddrs;
267 memset(if_addr, 0, sizeof(struct ifaddrs));
268 if_addr->ifa_name = if_name;
269 if_addr->ifa_addr =
270 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_address));
271 if_addr->ifa_netmask =
272 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_netmask));
273 if_addr->ifa_next = list;
274 if_addr->ifa_flags = IFF_RUNNING;
275 return if_addr;
276 }
277
278 struct ifaddrs* InstallIpv4Network(char* if_name,
279 const std::string& ipv4_address,
280 const std::string& ipv4_mask,
281 BasicNetworkManager& network_manager) {
282 ifaddrs* addr_list = nullptr;
283 addr_list = AddIpv4Address(addr_list, if_name, ipv4_address, ipv4_mask);
284 NetworkManager::NetworkList result;
285 bool changed;
286 NetworkManager::Stats stats;
287 CallConvertIfAddrs(network_manager, addr_list, true, &result);
288 network_manager.MergeNetworkList(result, &changed, &stats);
289 return addr_list;
290 }
291
honghaizdb8cf502015-12-21 13:08:46 -0800292 void ReleaseIfAddrs(struct ifaddrs* list) {
293 struct ifaddrs* if_addr = list;
294 while (if_addr != nullptr) {
295 struct ifaddrs* next_addr = if_addr->ifa_next;
oprypin1ea631f2017-08-18 00:15:19 -0700296 free(if_addr->ifa_addr);
297 free(if_addr->ifa_netmask);
honghaizdb8cf502015-12-21 13:08:46 -0800298 delete if_addr;
299 if_addr = next_addr;
300 }
301 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000302#endif // defined(WEBRTC_POSIX)
303
304 protected:
305 bool callback_called_;
306};
307
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800308class TestBasicNetworkManager : public BasicNetworkManager {
309 public:
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700310 TestBasicNetworkManager(NetworkMonitorFactory* network_monitor_factory)
311 : BasicNetworkManager(network_monitor_factory) {}
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800312 using BasicNetworkManager::QueryDefaultLocalAddress;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800313 using BasicNetworkManager::set_default_local_addresses;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800314};
315
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000316// Test that the Network ctor works properly.
317TEST_F(NetworkTest, TestNetworkConstruct) {
318 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
319 IPAddress(0x12345600U), 24);
320 EXPECT_EQ("test_eth0", ipv4_network1.name());
321 EXPECT_EQ("Test Network Adapter 1", ipv4_network1.description());
322 EXPECT_EQ(IPAddress(0x12345600U), ipv4_network1.prefix());
323 EXPECT_EQ(24, ipv4_network1.prefix_length());
324 EXPECT_FALSE(ipv4_network1.ignored());
325}
326
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000327TEST_F(NetworkTest, TestIsIgnoredNetworkIgnoresIPsStartingWith0) {
328 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
329 IPAddress(0x12345600U), 24, ADAPTER_TYPE_ETHERNET);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000330 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000331 IPAddress(0x010000U), 24, ADAPTER_TYPE_ETHERNET);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000332 BasicNetworkManager network_manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700333 network_manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000334 EXPECT_FALSE(IsIgnoredNetwork(network_manager, ipv4_network1));
335 EXPECT_TRUE(IsIgnoredNetwork(network_manager, ipv4_network2));
336}
337
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000338// TODO(phoglund): Remove when ignore list goes away.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000339TEST_F(NetworkTest, TestIgnoreList) {
Yves Gerey665174f2018-06-19 15:03:05 +0200340 Network ignore_me("ignore_me", "Ignore me please!", IPAddress(0x12345600U),
341 24);
342 Network include_me("include_me", "Include me please!", IPAddress(0x12345600U),
343 24);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700344 BasicNetworkManager default_network_manager;
345 default_network_manager.StartUpdating();
346 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, ignore_me));
347 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, include_me));
348
349 BasicNetworkManager ignoring_network_manager;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000350 std::vector<std::string> ignore_list;
351 ignore_list.push_back("ignore_me");
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700352 ignoring_network_manager.set_network_ignore_list(ignore_list);
353 ignoring_network_manager.StartUpdating();
354 EXPECT_TRUE(IsIgnoredNetwork(ignoring_network_manager, ignore_me));
355 EXPECT_FALSE(IsIgnoredNetwork(ignoring_network_manager, include_me));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000356}
357
358// Test is failing on Windows opt: b/11288214
359TEST_F(NetworkTest, DISABLED_TestCreateNetworks) {
360 BasicNetworkManager manager;
361 NetworkManager::NetworkList result = GetNetworks(manager, true);
362 // We should be able to bind to any addresses we find.
363 NetworkManager::NetworkList::iterator it;
Yves Gerey665174f2018-06-19 15:03:05 +0200364 for (it = result.begin(); it != result.end(); ++it) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000365 sockaddr_storage storage;
366 memset(&storage, 0, sizeof(storage));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000367 IPAddress ip = (*it)->GetBestIP();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000368 SocketAddress bindaddress(ip, 0);
369 bindaddress.SetScopeID((*it)->scope_id());
Niels Möllerd0b88792021-08-12 10:32:30 +0200370 // TODO(thaloun): Use rtc::Socket once it supports IPv6.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000371 int fd = static_cast<int>(socket(ip.family(), SOCK_STREAM, IPPROTO_TCP));
372 if (fd > 0) {
373 size_t ipsize = bindaddress.ToSockAddrStorage(&storage);
374 EXPECT_GE(ipsize, 0U);
Yves Gerey665174f2018-06-19 15:03:05 +0200375 int success = ::bind(fd, reinterpret_cast<sockaddr*>(&storage),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000376 static_cast<int>(ipsize));
377#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +0100378 if (success)
379 RTC_LOG_GLE(LS_ERROR) << "Socket bind failed.";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000380#endif
381 EXPECT_EQ(0, success);
382#if defined(WEBRTC_WIN)
383 closesocket(fd);
384#else
385 close(fd);
386#endif
387 }
388 delete (*it);
389 }
390}
391
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700392// Test StartUpdating() and StopUpdating(). network_permission_state starts with
393// ALLOWED.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000394TEST_F(NetworkTest, TestUpdateNetworks) {
395 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200396 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
397 &NetworkTest::OnNetworksChanged);
guoweisea1012b2015-08-21 09:06:28 -0700398 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
399 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000400 manager.StartUpdating();
401 Thread::Current()->ProcessMessages(0);
402 EXPECT_TRUE(callback_called_);
403 callback_called_ = false;
404 // Callback should be triggered immediately when StartUpdating
405 // is called, after network update signal is already sent.
406 manager.StartUpdating();
407 EXPECT_TRUE(manager.started());
408 Thread::Current()->ProcessMessages(0);
409 EXPECT_TRUE(callback_called_);
410 manager.StopUpdating();
411 EXPECT_TRUE(manager.started());
412 manager.StopUpdating();
guoweisea1012b2015-08-21 09:06:28 -0700413 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
414 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000415 EXPECT_FALSE(manager.started());
416 manager.StopUpdating();
417 EXPECT_FALSE(manager.started());
418 callback_called_ = false;
419 // Callback should be triggered immediately after StartUpdating is called
420 // when start_count_ is reset to 0.
421 manager.StartUpdating();
422 Thread::Current()->ProcessMessages(0);
423 EXPECT_TRUE(callback_called_);
424}
425
426// Verify that MergeNetworkList() merges network lists properly.
427TEST_F(NetworkTest, TestBasicMergeNetworkList) {
428 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
429 IPAddress(0x12345600U), 24);
430 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
431 IPAddress(0x00010000U), 16);
432 ipv4_network1.AddIP(IPAddress(0x12345678));
433 ipv4_network2.AddIP(IPAddress(0x00010004));
434 BasicNetworkManager manager;
435
436 // Add ipv4_network1 to the list of networks.
437 NetworkManager::NetworkList list;
438 list.push_back(new Network(ipv4_network1));
439 bool changed;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000440 NetworkManager::Stats stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000441 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000442 EXPECT_EQ(stats.ipv6_network_count, 0);
443 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000444 list.clear();
445
446 manager.GetNetworks(&list);
447 EXPECT_EQ(1U, list.size());
Qingsi Wang10a0e512018-05-16 13:37:03 -0700448 EXPECT_TRUE(SameNameAndPrefix(ipv4_network1, *list[0]));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000449 Network* net1 = list[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700450 uint16_t net_id1 = net1->id();
451 EXPECT_EQ(1, net_id1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000452 list.clear();
453
454 // Replace ipv4_network1 with ipv4_network2.
455 list.push_back(new Network(ipv4_network2));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000456 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000457 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000458 EXPECT_EQ(stats.ipv6_network_count, 0);
459 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000460 list.clear();
461
462 manager.GetNetworks(&list);
463 EXPECT_EQ(1U, list.size());
Qingsi Wang10a0e512018-05-16 13:37:03 -0700464 EXPECT_TRUE(SameNameAndPrefix(ipv4_network2, *list[0]));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000465 Network* net2 = list[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700466 uint16_t net_id2 = net2->id();
467 // Network id will increase.
468 EXPECT_LT(net_id1, net_id2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000469 list.clear();
470
471 // Add Network2 back.
472 list.push_back(new Network(ipv4_network1));
473 list.push_back(new Network(ipv4_network2));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000474 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000475 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000476 EXPECT_EQ(stats.ipv6_network_count, 0);
477 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000478 list.clear();
479
480 // Verify that we get previous instances of Network objects.
481 manager.GetNetworks(&list);
482 EXPECT_EQ(2U, list.size());
483 EXPECT_TRUE((net1 == list[0] && net2 == list[1]) ||
484 (net1 == list[1] && net2 == list[0]));
honghaiza0c44ea2016-03-23 16:07:48 -0700485 EXPECT_TRUE((net_id1 == list[0]->id() && net_id2 == list[1]->id()) ||
486 (net_id1 == list[1]->id() && net_id2 == list[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000487 list.clear();
488
489 // Call MergeNetworkList() again and verify that we don't get update
490 // notification.
491 list.push_back(new Network(ipv4_network2));
492 list.push_back(new Network(ipv4_network1));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000493 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000494 EXPECT_FALSE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000495 EXPECT_EQ(stats.ipv6_network_count, 0);
496 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000497 list.clear();
498
499 // Verify that we get previous instances of Network objects.
500 manager.GetNetworks(&list);
501 EXPECT_EQ(2U, list.size());
502 EXPECT_TRUE((net1 == list[0] && net2 == list[1]) ||
503 (net1 == list[1] && net2 == list[0]));
Olga Sharonovaf74d2ce2020-03-30 08:20:05 +0000504 EXPECT_TRUE((net_id1 == list[0]->id() && net_id2 == list[1]->id()) ||
505 (net_id1 == list[1]->id() && net_id2 == list[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000506 list.clear();
507}
508
509// Sets up some test IPv6 networks and appends them to list.
510// Four networks are added - public and link local, for two interfaces.
511void SetupNetworks(NetworkManager::NetworkList* list) {
512 IPAddress ip;
513 IPAddress prefix;
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000514 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:ef12", &ip));
515 EXPECT_TRUE(IPFromString("abcd::", &prefix));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000516 // First, fake link-locals.
517 Network ipv6_eth0_linklocalnetwork("test_eth0", "Test NetworkAdapter 1",
518 prefix, 64);
519 ipv6_eth0_linklocalnetwork.AddIP(ip);
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000520 EXPECT_TRUE(IPFromString("abcd::5678:abcd:ef12:3456", &ip));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000521 Network ipv6_eth1_linklocalnetwork("test_eth1", "Test NetworkAdapter 2",
522 prefix, 64);
523 ipv6_eth1_linklocalnetwork.AddIP(ip);
524 // Public networks:
525 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip));
526 prefix = TruncateIP(ip, 64);
527 Network ipv6_eth0_publicnetwork1_ip1("test_eth0", "Test NetworkAdapter 1",
528 prefix, 64);
529 ipv6_eth0_publicnetwork1_ip1.AddIP(ip);
530 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
531 prefix = TruncateIP(ip, 64);
532 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 1",
533 prefix, 64);
534 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
535 list->push_back(new Network(ipv6_eth0_linklocalnetwork));
536 list->push_back(new Network(ipv6_eth1_linklocalnetwork));
537 list->push_back(new Network(ipv6_eth0_publicnetwork1_ip1));
538 list->push_back(new Network(ipv6_eth1_publicnetwork1_ip1));
539}
540
541// Test that the basic network merging case works.
542TEST_F(NetworkTest, TestIPv6MergeNetworkList) {
543 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200544 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
545 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000546 NetworkManager::NetworkList original_list;
547 SetupNetworks(&original_list);
548 bool changed = false;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000549 NetworkManager::Stats stats =
550 MergeNetworkList(manager, original_list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000551 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000552 EXPECT_EQ(stats.ipv6_network_count, 4);
553 EXPECT_EQ(stats.ipv4_network_count, 0);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000554 NetworkManager::NetworkList list;
555 manager.GetNetworks(&list);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000556 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700557 EXPECT_THAT(list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000558}
559
560// Tests that when two network lists that describe the same set of networks are
561// merged, that the changed callback is not called, and that the original
562// objects remain in the result list.
563TEST_F(NetworkTest, TestNoChangeMerge) {
564 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200565 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
566 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000567 NetworkManager::NetworkList original_list;
568 SetupNetworks(&original_list);
569 bool changed = false;
570 MergeNetworkList(manager, original_list, &changed);
571 EXPECT_TRUE(changed);
572 // Second list that describes the same networks but with new objects.
573 NetworkManager::NetworkList second_list;
574 SetupNetworks(&second_list);
575 changed = false;
576 MergeNetworkList(manager, second_list, &changed);
577 EXPECT_FALSE(changed);
578 NetworkManager::NetworkList resulting_list;
579 manager.GetNetworks(&resulting_list);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000580 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700581 EXPECT_THAT(resulting_list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000582 // Doublecheck that the new networks aren't in the list.
Steve Anton2acd1632019-03-25 13:48:30 -0700583 for (const Network* network : second_list) {
584 EXPECT_THAT(resulting_list, Not(Contains(network)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000585 }
586}
587
588// Test that we can merge a network that is the same as another network but with
589// a different IP. The original network should remain in the list, but have its
590// IP changed.
591TEST_F(NetworkTest, MergeWithChangedIP) {
592 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200593 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
594 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000595 NetworkManager::NetworkList original_list;
596 SetupNetworks(&original_list);
597 // Make a network that we're going to change.
598 IPAddress ip;
599 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip));
600 IPAddress prefix = TruncateIP(ip, 64);
Yves Gerey665174f2018-06-19 15:03:05 +0200601 Network* network_to_change =
602 new Network("test_eth0", "Test Network Adapter 1", prefix, 64);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000603 Network* changed_network = new Network(*network_to_change);
604 network_to_change->AddIP(ip);
605 IPAddress changed_ip;
606 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip));
607 changed_network->AddIP(changed_ip);
608 original_list.push_back(network_to_change);
609 bool changed = false;
610 MergeNetworkList(manager, original_list, &changed);
611 NetworkManager::NetworkList second_list;
612 SetupNetworks(&second_list);
613 second_list.push_back(changed_network);
614 changed = false;
615 MergeNetworkList(manager, second_list, &changed);
616 EXPECT_TRUE(changed);
617 NetworkManager::NetworkList list;
618 manager.GetNetworks(&list);
619 EXPECT_EQ(original_list.size(), list.size());
620 // Make sure the original network is still in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700621 EXPECT_THAT(list, Contains(network_to_change));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000622 EXPECT_EQ(changed_ip, network_to_change->GetIPs().at(0));
623}
624
625// Testing a similar case to above, but checking that a network can be updated
626// with additional IPs (not just a replacement).
627TEST_F(NetworkTest, TestMultipleIPMergeNetworkList) {
628 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200629 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
630 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000631 NetworkManager::NetworkList original_list;
632 SetupNetworks(&original_list);
633 bool changed = false;
634 MergeNetworkList(manager, original_list, &changed);
635 EXPECT_TRUE(changed);
636 IPAddress ip;
637 IPAddress check_ip;
638 IPAddress prefix;
639 // Add a second IP to the public network on eth0 (2401:fa00:4:1000/64).
640 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip));
641 prefix = TruncateIP(ip, 64);
642 Network ipv6_eth0_publicnetwork1_ip2("test_eth0", "Test NetworkAdapter 1",
643 prefix, 64);
644 // This is the IP that already existed in the public network on eth0.
645 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip));
646 ipv6_eth0_publicnetwork1_ip2.AddIP(ip);
647 original_list.push_back(new Network(ipv6_eth0_publicnetwork1_ip2));
648 changed = false;
649 MergeNetworkList(manager, original_list, &changed);
650 EXPECT_TRUE(changed);
651 // There should still be four networks.
652 NetworkManager::NetworkList list;
653 manager.GetNetworks(&list);
654 EXPECT_EQ(4U, list.size());
655 // Check the gathered IPs.
656 int matchcount = 0;
657 for (NetworkManager::NetworkList::iterator it = list.begin();
658 it != list.end(); ++it) {
Qingsi Wang10a0e512018-05-16 13:37:03 -0700659 if (SameNameAndPrefix(**it, *original_list[2])) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000660 ++matchcount;
661 EXPECT_EQ(1, matchcount);
662 // This should be the same network object as before.
663 EXPECT_EQ((*it), original_list[2]);
664 // But with two addresses now.
Steve Anton2acd1632019-03-25 13:48:30 -0700665 EXPECT_THAT((*it)->GetIPs(),
666 UnorderedElementsAre(InterfaceAddress(check_ip),
667 InterfaceAddress(ip)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000668 } else {
669 // Check the IP didn't get added anywhere it wasn't supposed to.
Steve Anton2acd1632019-03-25 13:48:30 -0700670 EXPECT_THAT((*it)->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000671 }
672 }
673}
674
675// Test that merge correctly distinguishes multiple networks on an interface.
676TEST_F(NetworkTest, TestMultiplePublicNetworksOnOneInterfaceMerge) {
677 BasicNetworkManager manager;
Yves Gerey665174f2018-06-19 15:03:05 +0200678 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
679 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000680 NetworkManager::NetworkList original_list;
681 SetupNetworks(&original_list);
682 bool changed = false;
683 MergeNetworkList(manager, original_list, &changed);
684 EXPECT_TRUE(changed);
685 IPAddress ip;
686 IPAddress prefix;
687 // A second network for eth0.
688 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip));
689 prefix = TruncateIP(ip, 64);
690 Network ipv6_eth0_publicnetwork2_ip1("test_eth0", "Test NetworkAdapter 1",
691 prefix, 64);
692 ipv6_eth0_publicnetwork2_ip1.AddIP(ip);
693 original_list.push_back(new Network(ipv6_eth0_publicnetwork2_ip1));
694 changed = false;
695 MergeNetworkList(manager, original_list, &changed);
696 EXPECT_TRUE(changed);
697 // There should be five networks now.
698 NetworkManager::NetworkList list;
699 manager.GetNetworks(&list);
700 EXPECT_EQ(5U, list.size());
701 // Check the resulting addresses.
702 for (NetworkManager::NetworkList::iterator it = list.begin();
703 it != list.end(); ++it) {
704 if ((*it)->prefix() == ipv6_eth0_publicnetwork2_ip1.prefix() &&
705 (*it)->name() == ipv6_eth0_publicnetwork2_ip1.name()) {
706 // Check the new network has 1 IP and that it's the correct one.
707 EXPECT_EQ(1U, (*it)->GetIPs().size());
708 EXPECT_EQ(ip, (*it)->GetIPs().at(0));
709 } else {
710 // Check the IP didn't get added anywhere it wasn't supposed to.
Steve Anton2acd1632019-03-25 13:48:30 -0700711 EXPECT_THAT((*it)->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000712 }
713 }
714}
715
honghaizdb8cf502015-12-21 13:08:46 -0800716// Test that DumpNetworks does not crash.
717TEST_F(NetworkTest, TestCreateAndDumpNetworks) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000718 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700719 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800720 NetworkManager::NetworkList list = GetNetworks(manager, true);
721 bool changed;
722 MergeNetworkList(manager, list, &changed);
723 manager.DumpNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000724}
725
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100726TEST_F(NetworkTest, TestIPv6Toggle) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000727 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700728 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000729 bool ipv6_found = false;
730 NetworkManager::NetworkList list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000731 list = GetNetworks(manager, true);
732 for (NetworkManager::NetworkList::iterator it = list.begin();
733 it != list.end(); ++it) {
734 if ((*it)->prefix().family() == AF_INET6) {
735 ipv6_found = true;
736 break;
737 }
738 }
739 EXPECT_TRUE(ipv6_found);
740 for (NetworkManager::NetworkList::iterator it = list.begin();
741 it != list.end(); ++it) {
742 delete (*it);
743 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000744}
745
deadbeef3427f532017-07-26 16:09:33 -0700746// Test that when network interfaces are sorted and given preference values,
747// IPv6 comes first.
748TEST_F(NetworkTest, IPv6NetworksPreferredOverIPv4) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000749 BasicNetworkManager manager;
750 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
751 IPAddress(0x12345600U), 24);
752 ipv4_network1.AddIP(IPAddress(0x12345600U));
753
754 IPAddress ip;
755 IPAddress prefix;
756 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
757 prefix = TruncateIP(ip, 64);
758 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 2",
759 prefix, 64);
760 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
761
762 NetworkManager::NetworkList list;
763 list.push_back(new Network(ipv4_network1));
764 list.push_back(new Network(ipv6_eth1_publicnetwork1_ip1));
765 Network* net1 = list[0];
766 Network* net2 = list[1];
767
768 bool changed = false;
769 MergeNetworkList(manager, list, &changed);
770 ASSERT_TRUE(changed);
771 // After sorting IPv6 network should be higher order than IPv4 networks.
772 EXPECT_TRUE(net1->preference() < net2->preference());
773}
774
deadbeef3427f532017-07-26 16:09:33 -0700775// When two interfaces are equivalent in everything but name, they're expected
776// to be preference-ordered by name. For example, "eth0" before "eth1".
777TEST_F(NetworkTest, NetworksSortedByInterfaceName) {
778 BasicNetworkManager manager;
779 Network* eth0 = new Network("test_eth0", "Test Network Adapter 1",
780 IPAddress(0x65432100U), 24);
781 eth0->AddIP(IPAddress(0x65432100U));
782 Network* eth1 = new Network("test_eth1", "Test Network Adapter 2",
783 IPAddress(0x12345600U), 24);
784 eth1->AddIP(IPAddress(0x12345600U));
785 NetworkManager::NetworkList list;
786 // Add them to the list in the opposite of the expected sorted order, to
787 // ensure sorting actually occurs.
788 list.push_back(eth1);
789 list.push_back(eth0);
790
791 bool changed = false;
792 MergeNetworkList(manager, list, &changed);
793 ASSERT_TRUE(changed);
794 // "test_eth0" should be preferred over "test_eth1".
795 EXPECT_TRUE(eth0->preference() > eth1->preference());
796}
797
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000798TEST_F(NetworkTest, TestNetworkAdapterTypes) {
799 Network wifi("wlan0", "Wireless Adapter", IPAddress(0x12345600U), 24,
800 ADAPTER_TYPE_WIFI);
801 EXPECT_EQ(ADAPTER_TYPE_WIFI, wifi.type());
802 Network ethernet("eth0", "Ethernet", IPAddress(0x12345600U), 24,
803 ADAPTER_TYPE_ETHERNET);
804 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, ethernet.type());
805 Network cellular("test_cell", "Cellular Adapter", IPAddress(0x12345600U), 24,
806 ADAPTER_TYPE_CELLULAR);
807 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, cellular.type());
808 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24,
809 ADAPTER_TYPE_VPN);
810 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
811 Network unknown("test", "Test Adapter", IPAddress(0x12345600U), 24,
812 ADAPTER_TYPE_UNKNOWN);
813 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, unknown.type());
814}
815
816#if defined(WEBRTC_POSIX)
817// Verify that we correctly handle interfaces with no address.
818TEST_F(NetworkTest, TestConvertIfAddrsNoAddress) {
819 ifaddrs list;
820 memset(&list, 0, sizeof(list));
821 list.ifa_name = const_cast<char*>("test_iface");
822
823 NetworkManager::NetworkList result;
824 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700825 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000826 CallConvertIfAddrs(manager, &list, true, &result);
827 EXPECT_TRUE(result.empty());
828}
honghaizdb8cf502015-12-21 13:08:46 -0800829
830// Verify that if there are two addresses on one interface, only one network
831// is generated.
832TEST_F(NetworkTest, TestConvertIfAddrsMultiAddressesOnOneInterface) {
833 char if_name[20] = "rmnet0";
834 ifaddrs* list = nullptr;
835 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:1",
836 "FFFF:FFFF:FFFF:FFFF::", 0);
837 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:2",
838 "FFFF:FFFF:FFFF:FFFF::", 0);
839 NetworkManager::NetworkList result;
840 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700841 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800842 CallConvertIfAddrs(manager, list, true, &result);
843 EXPECT_EQ(1U, result.size());
844 bool changed;
845 // This ensures we release the objects created in CallConvertIfAddrs.
846 MergeNetworkList(manager, result, &changed);
847 ReleaseIfAddrs(list);
848}
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800849
850TEST_F(NetworkTest, TestConvertIfAddrsNotRunning) {
851 ifaddrs list;
852 memset(&list, 0, sizeof(list));
853 list.ifa_name = const_cast<char*>("test_iface");
854 sockaddr ifa_addr;
855 sockaddr ifa_netmask;
856 list.ifa_addr = &ifa_addr;
857 list.ifa_netmask = &ifa_netmask;
858
859 NetworkManager::NetworkList result;
860 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700861 manager.StartUpdating();
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800862 CallConvertIfAddrs(manager, &list, true, &result);
863 EXPECT_TRUE(result.empty());
864}
Honghai Zhang351d77b2016-05-20 15:08:29 -0700865
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700866// Tests that the network type can be determined from the network monitor when
867// it would otherwise be unknown.
Honghai Zhang351d77b2016-05-20 15:08:29 -0700868TEST_F(NetworkTest, TestGetAdapterTypeFromNetworkMonitor) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700869 char if_name[20] = "wifi0";
870 std::string ipv6_address = "1000:2000:3000:4000:0:0:0:1";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700871 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700872 BasicNetworkManager manager_without_monitor;
873 manager_without_monitor.StartUpdating();
874 // A network created without a network monitor will get UNKNOWN type.
875 ifaddrs* addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
876 manager_without_monitor);
877 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, GetAdapterType(manager_without_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700878 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700879
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700880 // With the fake network monitor the type should be correctly determined.
881 FakeNetworkMonitorFactory factory;
882 BasicNetworkManager manager_with_monitor(&factory);
883 manager_with_monitor.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700884 // Add the same ipv6 address as before but it has the right network type
885 // detected by the network monitor now.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700886 addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
887 manager_with_monitor);
888 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700889 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700890}
891
892// Test that the network type can be determined based on name matching in
893// a few cases. Note that UNKNOWN type for non-matching strings has been tested
894// in the above test.
895TEST_F(NetworkTest, TestGetAdapterTypeFromNameMatching) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800896 std::string ipv4_address1 = "192.0.0.121";
897 std::string ipv4_mask = "255.255.255.0";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700898 std::string ipv6_address1 = "1000:2000:3000:4000:0:0:0:1";
899 std::string ipv6_address2 = "1000:2000:3000:8000:0:0:0:1";
900 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
901 BasicNetworkManager manager;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700902 manager.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700903
deadbeef4cd599f2017-07-27 15:05:29 -0700904 // IPSec interface; name is in form "ipsec<index>".
905 char if_name[20] = "ipsec11";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700906 ifaddrs* addr_list =
907 InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
deadbeef4cd599f2017-07-27 15:05:29 -0700908 EXPECT_EQ(ADAPTER_TYPE_VPN, GetAdapterType(manager));
909 ClearNetworks(manager);
910 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700911
Qingsi Wange53ac042018-05-08 11:55:07 -0700912 strcpy(if_name, "lo0");
913 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
914 EXPECT_EQ(ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager));
915 ClearNetworks(manager);
916 ReleaseIfAddrs(addr_list);
917
918 strcpy(if_name, "eth0");
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800919 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
Qingsi Wange53ac042018-05-08 11:55:07 -0700920 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, GetAdapterType(manager));
921 ClearNetworks(manager);
922 ReleaseIfAddrs(addr_list);
923
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700924 strcpy(if_name, "wlan0");
925 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
926 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
927 ClearNetworks(manager);
928 ReleaseIfAddrs(addr_list);
929
deadbeef4cd599f2017-07-27 15:05:29 -0700930#if defined(WEBRTC_IOS)
931 strcpy(if_name, "pdp_ip0");
932 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700933 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
934 ClearNetworks(manager);
935 ReleaseIfAddrs(addr_list);
936
Honghai Zhang63ab8102016-05-26 20:30:15 -0700937 strcpy(if_name, "en0");
938 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
939 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
940 ClearNetworks(manager);
941 ReleaseIfAddrs(addr_list);
942
Honghai Zhang351d77b2016-05-20 15:08:29 -0700943#elif defined(WEBRTC_ANDROID)
deadbeef4cd599f2017-07-27 15:05:29 -0700944 strcpy(if_name, "rmnet0");
945 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700946 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
947 ClearNetworks(manager);
948 ReleaseIfAddrs(addr_list);
949
Honghai Zhang351d77b2016-05-20 15:08:29 -0700950 strcpy(if_name, "v4-rmnet_data0");
951 addr_list = InstallIpv6Network(if_name, ipv6_address2, ipv6_mask, manager);
952 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
953 ClearNetworks(manager);
954 ReleaseIfAddrs(addr_list);
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800955
956 strcpy(if_name, "clat4");
957 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
958 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
959 ClearNetworks(manager);
960 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700961#endif
962}
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700963
964// Test that an adapter won't be included in the network list if there's a
965// network monitor that says it's unavailable.
966TEST_F(NetworkTest, TestNetworkMonitorIsAdapterAvailable) {
967 char if_name1[20] = "pdp_ip0";
968 char if_name2[20] = "pdp_ip1";
969 ifaddrs* list = nullptr;
970 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
971 "FFFF:FFFF:FFFF:FFFF::", 0);
972 list = AddIpv6Address(list, if_name2, "1000:2000:3000:4000:0:0:0:2",
973 "FFFF:FFFF:FFFF:FFFF::", 0);
974 NetworkManager::NetworkList result;
975
976 // Sanity check that both interfaces are included by default.
977 FakeNetworkMonitorFactory factory;
978 BasicNetworkManager manager(&factory);
979 manager.StartUpdating();
980 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
981 EXPECT_EQ(2u, result.size());
982 bool changed;
983 // This ensures we release the objects created in CallConvertIfAddrs.
984 MergeNetworkList(manager, result, &changed);
985 result.clear();
986
987 // Now simulate one interface being unavailable.
988 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
989 network_monitor->set_unavailable_adapters({if_name1});
990 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
991 EXPECT_EQ(1u, result.size());
992 EXPECT_EQ(if_name2, result[0]->name());
993
994 MergeNetworkList(manager, result, &changed);
995 ReleaseIfAddrs(list);
996}
997
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000998#endif // defined(WEBRTC_POSIX)
999
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001000// Test MergeNetworkList successfully combines all IPs for the same
1001// prefix/length into a single Network.
1002TEST_F(NetworkTest, TestMergeNetworkList) {
1003 BasicNetworkManager manager;
1004 NetworkManager::NetworkList list;
1005
1006 // Create 2 IPAddress classes with only last digit different.
1007 IPAddress ip1, ip2;
1008 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1009 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2));
1010
1011 // Create 2 networks with the same prefix and length.
1012 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1013 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1014
1015 // Add different IP into each.
1016 net1->AddIP(ip1);
1017 net2->AddIP(ip2);
1018
1019 list.push_back(net1);
1020 list.push_back(net2);
1021 bool changed;
1022 MergeNetworkList(manager, list, &changed);
1023 EXPECT_TRUE(changed);
1024
1025 NetworkManager::NetworkList list2;
1026 manager.GetNetworks(&list2);
1027
1028 // Make sure the resulted networklist has only 1 element and 2
1029 // IPAddresses.
1030 EXPECT_EQ(list2.size(), 1uL);
1031 EXPECT_EQ(list2[0]->GetIPs().size(), 2uL);
Taylor Brandstetter01cb5f22018-03-07 15:49:32 -08001032 EXPECT_EQ(list2[0]->GetIPs()[0], InterfaceAddress(ip1));
1033 EXPECT_EQ(list2[0]->GetIPs()[1], InterfaceAddress(ip2));
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001034}
1035
honghaizdb8cf502015-12-21 13:08:46 -08001036// Test that MergeNetworkList successfully detects the change if
1037// a network becomes inactive and then active again.
1038TEST_F(NetworkTest, TestMergeNetworkListWithInactiveNetworks) {
1039 BasicNetworkManager manager;
1040 Network network1("test_wifi", "Test Network Adapter 1",
1041 IPAddress(0x12345600U), 24);
1042 Network network2("test_eth0", "Test Network Adapter 2",
1043 IPAddress(0x00010000U), 16);
1044 network1.AddIP(IPAddress(0x12345678));
1045 network2.AddIP(IPAddress(0x00010004));
1046 NetworkManager::NetworkList list;
1047 Network* net1 = new Network(network1);
1048 list.push_back(net1);
1049 bool changed;
1050 MergeNetworkList(manager, list, &changed);
1051 EXPECT_TRUE(changed);
1052 list.clear();
1053 manager.GetNetworks(&list);
1054 ASSERT_EQ(1U, list.size());
1055 EXPECT_EQ(net1, list[0]);
1056
1057 list.clear();
1058 Network* net2 = new Network(network2);
1059 list.push_back(net2);
1060 MergeNetworkList(manager, list, &changed);
1061 EXPECT_TRUE(changed);
1062 list.clear();
1063 manager.GetNetworks(&list);
1064 ASSERT_EQ(1U, list.size());
1065 EXPECT_EQ(net2, list[0]);
1066
1067 // Now network1 is inactive. Try to merge it again.
1068 list.clear();
1069 list.push_back(new Network(network1));
1070 MergeNetworkList(manager, list, &changed);
1071 EXPECT_TRUE(changed);
1072 list.clear();
1073 manager.GetNetworks(&list);
1074 ASSERT_EQ(1U, list.size());
1075 EXPECT_TRUE(list[0]->active());
1076 EXPECT_EQ(net1, list[0]);
1077}
1078
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001079// Test that the filtering logic follows the defined ruleset in network.h.
1080TEST_F(NetworkTest, TestIPv6Selection) {
1081 InterfaceAddress ip;
1082 std::string ipstr;
1083
1084 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
1085 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
1086
1087 // Create a network with this prefix.
Yves Gerey665174f2018-06-19 15:03:05 +02001088 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
1089 64);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001090
1091 // When there is no address added, it should return an unspecified
1092 // address.
1093 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1094 EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
1095
1096 // Deprecated one should not be returned.
1097 ipv6_network.AddIP(ip);
1098 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1099
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001100 // Add ULA one. ULA is unique local address which is starting either
1101 // with 0xfc or 0xfd.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001102 ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
1103 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1104 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001105 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001106
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001107 // Add global one.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001108 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
1109 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1110 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001111 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001112
1113 // Add global dynamic temporary one.
1114 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
1115 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
1116 ipv6_network.AddIP(ip);
1117 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1118}
1119
honghaiz023f3ef2015-10-19 09:39:32 -07001120TEST_F(NetworkTest, TestNetworkMonitoring) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001121 FakeNetworkMonitorFactory factory;
1122 BasicNetworkManager manager(&factory);
honghaiz023f3ef2015-10-19 09:39:32 -07001123 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1124 &NetworkTest::OnNetworksChanged);
honghaiz023f3ef2015-10-19 09:39:32 -07001125 manager.StartUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001126 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1127 EXPECT_TRUE(network_monitor && network_monitor->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001128 EXPECT_TRUE_WAIT(callback_called_, 1000);
1129 callback_called_ = false;
1130
1131 // Clear the networks so that there will be network changes below.
1132 ClearNetworks(manager);
1133 // Network manager is started, so the callback is called when the network
1134 // monitor fires the network-change event.
Mirko Bonadei37077932021-07-27 17:00:58 +02001135 network_monitor->InovkeNetworksChangedCallbackForTesting();
honghaiz023f3ef2015-10-19 09:39:32 -07001136 EXPECT_TRUE_WAIT(callback_called_, 1000);
1137
honghaizcec0a082016-01-15 14:49:09 -08001138 // Network manager is stopped.
honghaiz023f3ef2015-10-19 09:39:32 -07001139 manager.StopUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001140 EXPECT_FALSE(GetNetworkMonitor(manager)->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001141}
1142
Edward Lemur8dc945c2016-07-21 10:16:40 +02001143// Fails on Android: https://bugs.chromium.org/p/webrtc/issues/detail?id=4364.
1144#if defined(WEBRTC_ANDROID)
1145#define MAYBE_DefaultLocalAddress DISABLED_DefaultLocalAddress
1146#else
1147#define MAYBE_DefaultLocalAddress DefaultLocalAddress
1148#endif
1149TEST_F(NetworkTest, MAYBE_DefaultLocalAddress) {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001150 IPAddress ip;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001151 FakeNetworkMonitorFactory factory;
1152 TestBasicNetworkManager manager(&factory);
guoweis56271ed2016-01-15 14:45:06 -08001153 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1154 &NetworkTest::OnNetworksChanged);
guoweis56271ed2016-01-15 14:45:06 -08001155 manager.StartUpdating();
1156 EXPECT_TRUE_WAIT(callback_called_, 1000);
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001157
1158 // Make sure we can query default local address when an address for such
1159 // address family exists.
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001160 std::vector<Network*> networks;
1161 manager.GetNetworks(&networks);
guoweis56271ed2016-01-15 14:45:06 -08001162 EXPECT_TRUE(!networks.empty());
Steve Anton9de3aac2017-10-24 10:08:26 -07001163 for (const auto* network : networks) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001164 if (network->GetBestIP().family() == AF_INET) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001165 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET) != IPAddress());
guoweis56271ed2016-01-15 14:45:06 -08001166 } else if (network->GetBestIP().family() == AF_INET6 &&
1167 !IPIsLoopback(network->GetBestIP())) {
1168 // Existence of an IPv6 loopback address doesn't mean it has IPv6 network
1169 // enabled.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001170 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET6) != IPAddress());
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001171 }
1172 }
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001173
1174 // GetDefaultLocalAddress should return the valid default address after set.
1175 manager.set_default_local_addresses(GetLoopbackIP(AF_INET),
1176 GetLoopbackIP(AF_INET6));
1177 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET, &ip));
1178 EXPECT_EQ(ip, GetLoopbackIP(AF_INET));
1179 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1180 EXPECT_EQ(ip, GetLoopbackIP(AF_INET6));
honghaizaf83fe62016-04-18 14:50:44 -07001181
1182 // More tests on GetDefaultLocalAddress with ipv6 addresses where the set
1183 // default address may be different from the best IP address of any network.
1184 InterfaceAddress ip1;
1185 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:1111",
1186 IPV6_ADDRESS_FLAG_TEMPORARY, &ip1));
1187 // Create a network with a prefix of ip1.
1188 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip1, 64),
1189 64);
1190 IPAddress ip2;
1191 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:2222", &ip2));
1192 ipv6_network.AddIP(ip1);
1193 ipv6_network.AddIP(ip2);
1194 BasicNetworkManager::NetworkList list(1, new Network(ipv6_network));
1195 bool changed;
1196 MergeNetworkList(manager, list, &changed);
1197 // If the set default address is not in any network, GetDefaultLocalAddress
1198 // should return it.
1199 IPAddress ip3;
1200 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:3333", &ip3));
1201 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip3);
1202 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1203 EXPECT_EQ(ip3, ip);
1204 // If the set default address is in a network, GetDefaultLocalAddress will
1205 // return the best IP in that network.
1206 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip2);
1207 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1208 EXPECT_EQ(static_cast<IPAddress>(ip1), ip);
1209
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001210 manager.StopUpdating();
1211}
1212
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001213// Test that MergeNetworkList does not set change = true
1214// when changing from cellular_X to cellular_Y.
1215TEST_F(NetworkTest, TestWhenNetworkListChangeReturnsChangedFlag) {
1216 BasicNetworkManager manager;
1217
1218 IPAddress ip1;
1219 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1220 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1221 net1->set_type(ADAPTER_TYPE_CELLULAR_3G);
1222 net1->AddIP(ip1);
1223 NetworkManager::NetworkList list;
1224 list.push_back(net1);
1225
1226 {
1227 bool changed;
1228 MergeNetworkList(manager, list, &changed);
1229 EXPECT_TRUE(changed);
1230 NetworkManager::NetworkList list2;
1231 manager.GetNetworks(&list2);
1232 EXPECT_EQ(list2.size(), 1uL);
1233 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_3G, list2[0]->type());
1234 }
1235
1236 // Modify net1 from 3G to 4G
1237 {
1238 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1239 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1240 net2->AddIP(ip1);
1241 list.clear();
1242 list.push_back(net2);
1243 bool changed;
1244 MergeNetworkList(manager, list, &changed);
1245
1246 // Change from 3G to 4G shall not trigger OnNetworksChanged,
1247 // i.e changed = false.
1248 EXPECT_FALSE(changed);
1249 NetworkManager::NetworkList list2;
1250 manager.GetNetworks(&list2);
1251 ASSERT_EQ(list2.size(), 1uL);
1252 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1253 }
1254
1255 // Don't modify.
1256 {
1257 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1258 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1259 net2->AddIP(ip1);
1260 list.clear();
1261 list.push_back(net2);
1262 bool changed;
1263 MergeNetworkList(manager, list, &changed);
1264
1265 // No change.
1266 EXPECT_FALSE(changed);
1267 NetworkManager::NetworkList list2;
1268 manager.GetNetworks(&list2);
1269 ASSERT_EQ(list2.size(), 1uL);
1270 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1271 }
1272}
1273
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001274#if defined(WEBRTC_POSIX)
1275TEST_F(NetworkTest, IgnoresMACBasedIPv6Address) {
1276 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1277 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
1278 BasicNetworkManager manager;
1279 manager.StartUpdating();
1280
1281 // IPSec interface; name is in form "ipsec<index>".
1282 char if_name[20] = "ipsec11";
1283 ifaddrs* addr_list =
1284 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1285
1286 BasicNetworkManager::NetworkList list;
1287 manager.GetNetworks(&list);
1288 EXPECT_EQ(list.size(), 0u);
1289 ReleaseIfAddrs(addr_list);
1290}
1291
1292TEST_F(NetworkTest, WebRTC_AllowMACBasedIPv6Address) {
1293 webrtc::test::ScopedFieldTrials field_trials(
1294 "WebRTC-AllowMACBasedIPv6/Enabled/");
1295 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1296 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
1297 BasicNetworkManager manager;
1298 manager.StartUpdating();
1299
1300 // IPSec interface; name is in form "ipsec<index>".
1301 char if_name[20] = "ipsec11";
1302 ifaddrs* addr_list =
1303 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1304
1305 BasicNetworkManager::NetworkList list;
1306 manager.GetNetworks(&list);
1307 EXPECT_EQ(list.size(), 1u);
1308 ReleaseIfAddrs(addr_list);
1309}
1310#endif
1311
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001312#if defined(WEBRTC_POSIX)
1313TEST_F(NetworkTest, WebRTC_BindUsingInterfaceName) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001314 char if_name1[20] = "wlan0";
1315 char if_name2[20] = "v4-wlan0";
1316 ifaddrs* list = nullptr;
1317 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
1318 "FFFF:FFFF:FFFF:FFFF::", 0);
1319 list = AddIpv4Address(list, if_name2, "192.168.0.2", "255.255.255.255");
1320 NetworkManager::NetworkList result;
1321
1322 // Sanity check that both interfaces are included by default.
1323 FakeNetworkMonitorFactory factory;
1324 BasicNetworkManager manager(&factory);
1325 manager.StartUpdating();
1326 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1327 EXPECT_EQ(2u, result.size());
1328 ReleaseIfAddrs(list);
1329 bool changed;
1330 // This ensures we release the objects created in CallConvertIfAddrs.
1331 MergeNetworkList(manager, result, &changed);
1332 result.clear();
1333
1334 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1335
1336 IPAddress ipv6;
1337 EXPECT_TRUE(IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6));
1338 IPAddress ipv4;
1339 EXPECT_TRUE(IPFromString("192.168.0.2", &ipv4));
1340
1341 // The network monitor only knwos about the ipv6 address, interface.
1342 network_monitor->set_adapters({"wlan0"});
1343 network_monitor->set_ip_addresses({ipv6});
1344 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv6),
1345 NetworkBindingResult::SUCCESS);
1346
1347 // But it will bind anyway using string matching...
1348 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv4),
1349 NetworkBindingResult::SUCCESS);
1350}
1351#endif
1352
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001353} // namespace rtc