blob: 63b5e08461b1cb9711fb9051732f5fdb3cbd3397 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "rtc_base/network.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000012
oprypin1ea631f2017-08-18 00:15:19 -070013#include <stdlib.h>
14
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070015#include <algorithm>
jbauch555604a2016-04-26 03:13:22 -070016#include <memory>
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017#include <vector>
oprypin1ea631f2017-08-18 00:15:19 -070018
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070019#include "absl/algorithm/container.h"
Mirko Bonadei06d35592020-04-01 13:43:08 +020020#include "absl/strings/match.h"
Ali Tofigh7fa90572022-03-17 15:47:49 +010021#include "absl/strings/string_view.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020022#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080023#include "rtc_base/net_helpers.h"
24#include "rtc_base/network_monitor.h"
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -070025#include "rtc_base/network_monitor_factory.h"
Niels Mölleraa373162021-09-28 16:09:07 +020026#include "rtc_base/physical_socket_server.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000027#if defined(WEBRTC_POSIX)
Henrik Kjellander00725112017-06-30 15:14:45 +020028#include <net/if.h>
Yves Gerey665174f2018-06-19 15:03:05 +020029#include <sys/types.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020030
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020031#include "rtc_base/ifaddrs_converter.h"
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080032#endif // defined(WEBRTC_POSIX)
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020033#include "rtc_base/gunit.h"
Steve Anton2acd1632019-03-25 13:48:30 -070034#include "test/gmock.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000035#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +010036#include "rtc_base/logging.h" // For RTC_LOG_GLE
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000037#endif
Jonas Oreland47fa08f2020-12-05 18:09:13 +010038#include "test/field_trial.h"
Jonas Orelandc06fe8b2022-03-28 14:58:26 +020039#include "test/scoped_key_value_config.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000040
Steve Anton2acd1632019-03-25 13:48:30 -070041using ::testing::Contains;
42using ::testing::Not;
43using ::testing::UnorderedElementsAre;
44using ::testing::UnorderedElementsAreArray;
45
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000046namespace rtc {
47
Guo-wei Shieh9faf1542015-12-28 14:06:55 -080048namespace {
49
Ali Tofigh7fa90572022-03-17 15:47:49 +010050IPAddress IPFromString(absl::string_view str) {
Jonas Oreland2ee0e642021-08-25 15:43:02 +020051 IPAddress ip;
52 RTC_CHECK(IPFromString(str, &ip));
53 return ip;
54}
55
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000056class FakeNetworkMonitor : public NetworkMonitorInterface {
honghaiz023f3ef2015-10-19 09:39:32 -070057 public:
honghaizcec0a082016-01-15 14:49:09 -080058 void Start() override { started_ = true; }
59 void Stop() override { started_ = false; }
60 bool started() { return started_; }
Ali Tofigh7fa90572022-03-17 15:47:49 +010061 AdapterType GetAdapterType(absl::string_view if_name) override {
Honghai Zhang351d77b2016-05-20 15:08:29 -070062 // Note that the name matching rules are different from the
63 // GetAdapterTypeFromName in NetworkManager.
Mirko Bonadei06d35592020-04-01 13:43:08 +020064 if (absl::StartsWith(if_name, "wifi")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070065 return ADAPTER_TYPE_WIFI;
66 }
Mirko Bonadei06d35592020-04-01 13:43:08 +020067 if (absl::StartsWith(if_name, "cellular")) {
Honghai Zhang351d77b2016-05-20 15:08:29 -070068 return ADAPTER_TYPE_CELLULAR;
69 }
honghaiza7ad7c32016-02-02 12:54:14 -080070 return ADAPTER_TYPE_UNKNOWN;
71 }
Ali Tofigh7fa90572022-03-17 15:47:49 +010072 AdapterType GetVpnUnderlyingAdapterType(absl::string_view if_name) override {
Taylor Brandstetter32eb03a2020-09-11 17:15:30 +000073 return ADAPTER_TYPE_UNKNOWN;
74 }
Ali Tofigh7fa90572022-03-17 15:47:49 +010075 NetworkPreference GetNetworkPreference(absl::string_view if_name) override {
Jonas Orelandf7721fb2020-08-07 11:08:34 +020076 return NetworkPreference::NEUTRAL;
77 }
honghaizcec0a082016-01-15 14:49:09 -080078
Ali Tofigh7fa90572022-03-17 15:47:49 +010079 bool IsAdapterAvailable(absl::string_view if_name) override {
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -070080 return absl::c_count(unavailable_adapters_, if_name) == 0;
81 }
82
83 // Used to test IsAdapterAvailable.
84 void set_unavailable_adapters(std::vector<std::string> unavailable_adapters) {
85 unavailable_adapters_ = unavailable_adapters;
86 }
87
Jonas Oreland6ca955a2021-03-15 08:27:43 +000088 bool SupportsBindSocketToNetwork() const override { return true; }
89
Ali Tofigh7fa90572022-03-17 15:47:49 +010090 NetworkBindingResult BindSocketToNetwork(int socket_fd,
91 const IPAddress& address,
92 absl::string_view if_name) override {
Jonas Oreland6ca955a2021-03-15 08:27:43 +000093 if (absl::c_count(addresses_, address) > 0) {
94 return NetworkBindingResult::SUCCESS;
95 }
96
97 for (auto const& iter : adapters_) {
Ali Tofigh7fa90572022-03-17 15:47:49 +010098 if (if_name.find(iter) != absl::string_view::npos) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +000099 return NetworkBindingResult::SUCCESS;
100 }
101 }
102 return NetworkBindingResult::ADDRESS_NOT_FOUND;
103 }
104
105 void set_ip_addresses(std::vector<IPAddress> addresses) {
106 addresses_ = addresses;
107 }
108
109 void set_adapters(std::vector<std::string> adapters) { adapters_ = adapters; }
110
Mirko Bonadei37077932021-07-27 17:00:58 +0200111 void InovkeNetworksChangedCallbackForTesting() {
112 InvokeNetworksChangedCallback();
113 }
114
honghaizcec0a082016-01-15 14:49:09 -0800115 private:
116 bool started_ = false;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000117 std::vector<std::string> adapters_;
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700118 std::vector<std::string> unavailable_adapters_;
Jonas Oreland6ca955a2021-03-15 08:27:43 +0000119 std::vector<IPAddress> addresses_;
honghaiz023f3ef2015-10-19 09:39:32 -0700120};
121
122class FakeNetworkMonitorFactory : public NetworkMonitorFactory {
123 public:
124 FakeNetworkMonitorFactory() {}
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200125 NetworkMonitorInterface* CreateNetworkMonitor(
Jonas Orelande62c2f22022-03-29 11:04:48 +0200126 const webrtc::FieldTrialsView& field_trials) override {
honghaiz023f3ef2015-10-19 09:39:32 -0700127 return new FakeNetworkMonitor();
128 }
129};
130
Qingsi Wang10a0e512018-05-16 13:37:03 -0700131bool SameNameAndPrefix(const rtc::Network& a, const rtc::Network& b) {
132 if (a.name() != b.name()) {
Harald Alvestrand97597c02021-11-04 12:01:23 +0000133 RTC_LOG(LS_INFO) << "Different interface names.";
Qingsi Wang10a0e512018-05-16 13:37:03 -0700134 return false;
135 }
136 if (a.prefix_length() != b.prefix_length() || a.prefix() != b.prefix()) {
Harald Alvestrand97597c02021-11-04 12:01:23 +0000137 RTC_LOG(LS_INFO) << "Different IP prefixes.";
Qingsi Wang10a0e512018-05-16 13:37:03 -0700138 return false;
139 }
140 return true;
141}
142
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800143} // namespace
144
Mirko Bonadei6a489f22019-04-09 15:11:12 +0200145class NetworkTest : public ::testing::Test, public sigslot::has_slots<> {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000146 public:
147 NetworkTest() : callback_called_(false) {}
148
Yves Gerey665174f2018-06-19 15:03:05 +0200149 void OnNetworksChanged() { callback_called_ = true; }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000150
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000151 NetworkManager::Stats MergeNetworkList(
152 BasicNetworkManager& network_manager,
153 const NetworkManager::NetworkList& list,
154 bool* changed) {
155 NetworkManager::Stats stats;
156 network_manager.MergeNetworkList(list, changed, &stats);
157 return stats;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000158 }
159
160 bool IsIgnoredNetwork(BasicNetworkManager& network_manager,
161 const Network& network) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700162 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000163 return network_manager.IsIgnoredNetwork(network);
164 }
165
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700166 IPAddress QueryDefaultLocalAddress(BasicNetworkManager& network_manager,
167 int family) {
168 RTC_DCHECK_RUN_ON(network_manager.thread_);
169 return network_manager.QueryDefaultLocalAddress(family);
170 }
171
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000172 NetworkManager::NetworkList GetNetworks(
Yves Gerey665174f2018-06-19 15:03:05 +0200173 const BasicNetworkManager& network_manager,
174 bool include_ignored) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700175 RTC_DCHECK_RUN_ON(network_manager.thread_);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000176 NetworkManager::NetworkList list;
177 network_manager.CreateNetworks(include_ignored, &list);
178 return list;
179 }
180
honghaizcec0a082016-01-15 14:49:09 -0800181 FakeNetworkMonitor* GetNetworkMonitor(BasicNetworkManager& network_manager) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700182 RTC_DCHECK_RUN_ON(network_manager.thread_);
honghaizcec0a082016-01-15 14:49:09 -0800183 return static_cast<FakeNetworkMonitor*>(
184 network_manager.network_monitor_.get());
honghaiz023f3ef2015-10-19 09:39:32 -0700185 }
186 void ClearNetworks(BasicNetworkManager& network_manager) {
187 for (const auto& kv : network_manager.networks_map_) {
188 delete kv.second;
189 }
190 network_manager.networks_.clear();
191 network_manager.networks_map_.clear();
192 }
193
Honghai Zhang351d77b2016-05-20 15:08:29 -0700194 AdapterType GetAdapterType(BasicNetworkManager& network_manager) {
Niels Möller22211442022-04-07 11:43:28 +0200195 std::vector<const Network*> list = network_manager.GetNetworks();
nissec16fa5e2017-02-07 07:18:43 -0800196 RTC_CHECK_EQ(1, list.size());
Honghai Zhang351d77b2016-05-20 15:08:29 -0700197 return list[0]->type();
198 }
199
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000200#if defined(WEBRTC_POSIX)
201 // Separated from CreateNetworks for tests.
202 static void CallConvertIfAddrs(const BasicNetworkManager& network_manager,
203 struct ifaddrs* interfaces,
204 bool include_ignored,
205 NetworkManager::NetworkList* networks) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700206 RTC_DCHECK_RUN_ON(network_manager.thread_);
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800207 // Use the base IfAddrsConverter for test cases.
jbauch555604a2016-04-26 03:13:22 -0700208 std::unique_ptr<IfAddrsConverter> ifaddrs_converter(new IfAddrsConverter());
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800209 network_manager.ConvertIfAddrs(interfaces, ifaddrs_converter.get(),
210 include_ignored, networks);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000211 }
honghaizdb8cf502015-12-21 13:08:46 -0800212
Ali Tofigh7fa90572022-03-17 15:47:49 +0100213 struct sockaddr_in6* CreateIpv6Addr(absl::string_view ip_string,
honghaizdb8cf502015-12-21 13:08:46 -0800214 uint32_t scope_id) {
Yves Gerey665174f2018-06-19 15:03:05 +0200215 struct sockaddr_in6* ipv6_addr =
216 static_cast<struct sockaddr_in6*>(malloc(sizeof(struct sockaddr_in6)));
honghaizdb8cf502015-12-21 13:08:46 -0800217 memset(ipv6_addr, 0, sizeof(struct sockaddr_in6));
218 ipv6_addr->sin6_family = AF_INET6;
219 ipv6_addr->sin6_scope_id = scope_id;
220 IPAddress ip;
221 IPFromString(ip_string, &ip);
222 ipv6_addr->sin6_addr = ip.ipv6_address();
223 return ipv6_addr;
224 }
225
226 // Pointers created here need to be released via ReleaseIfAddrs.
227 struct ifaddrs* AddIpv6Address(struct ifaddrs* list,
228 char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100229 absl::string_view ipv6_address,
230 absl::string_view ipv6_netmask,
honghaizdb8cf502015-12-21 13:08:46 -0800231 uint32_t scope_id) {
232 struct ifaddrs* if_addr = new struct ifaddrs;
233 memset(if_addr, 0, sizeof(struct ifaddrs));
234 if_addr->ifa_name = if_name;
235 if_addr->ifa_addr = reinterpret_cast<struct sockaddr*>(
236 CreateIpv6Addr(ipv6_address, scope_id));
237 if_addr->ifa_netmask =
238 reinterpret_cast<struct sockaddr*>(CreateIpv6Addr(ipv6_netmask, 0));
239 if_addr->ifa_next = list;
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800240 if_addr->ifa_flags = IFF_RUNNING;
honghaizdb8cf502015-12-21 13:08:46 -0800241 return if_addr;
242 }
243
Honghai Zhang351d77b2016-05-20 15:08:29 -0700244 struct ifaddrs* InstallIpv6Network(char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100245 absl::string_view ipv6_address,
246 absl::string_view ipv6_mask,
Honghai Zhang351d77b2016-05-20 15:08:29 -0700247 BasicNetworkManager& network_manager) {
248 ifaddrs* addr_list = nullptr;
249 addr_list = AddIpv6Address(addr_list, if_name, ipv6_address, ipv6_mask, 0);
250 NetworkManager::NetworkList result;
251 bool changed;
252 NetworkManager::Stats stats;
253 CallConvertIfAddrs(network_manager, addr_list, true, &result);
254 network_manager.MergeNetworkList(result, &changed, &stats);
255 return addr_list;
256 }
257
Ali Tofigh7fa90572022-03-17 15:47:49 +0100258 struct sockaddr_in* CreateIpv4Addr(absl::string_view ip_string) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800259 struct sockaddr_in* ipv4_addr =
260 static_cast<struct sockaddr_in*>(malloc(sizeof(struct sockaddr_in)));
261 memset(ipv4_addr, 0, sizeof(struct sockaddr_in));
262 ipv4_addr->sin_family = AF_INET;
263 IPAddress ip;
264 IPFromString(ip_string, &ip);
265 ipv4_addr->sin_addr = ip.ipv4_address();
266 return ipv4_addr;
267 }
268
269 // Pointers created here need to be released via ReleaseIfAddrs.
270 struct ifaddrs* AddIpv4Address(struct ifaddrs* list,
271 char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100272 absl::string_view ipv4_address,
273 absl::string_view ipv4_netmask) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800274 struct ifaddrs* if_addr = new struct ifaddrs;
275 memset(if_addr, 0, sizeof(struct ifaddrs));
276 if_addr->ifa_name = if_name;
277 if_addr->ifa_addr =
278 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_address));
279 if_addr->ifa_netmask =
280 reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_netmask));
281 if_addr->ifa_next = list;
282 if_addr->ifa_flags = IFF_RUNNING;
283 return if_addr;
284 }
285
286 struct ifaddrs* InstallIpv4Network(char* if_name,
Ali Tofigh7fa90572022-03-17 15:47:49 +0100287 absl::string_view ipv4_address,
288 absl::string_view ipv4_mask,
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800289 BasicNetworkManager& network_manager) {
290 ifaddrs* addr_list = nullptr;
291 addr_list = AddIpv4Address(addr_list, if_name, ipv4_address, ipv4_mask);
292 NetworkManager::NetworkList result;
293 bool changed;
294 NetworkManager::Stats stats;
295 CallConvertIfAddrs(network_manager, addr_list, true, &result);
296 network_manager.MergeNetworkList(result, &changed, &stats);
297 return addr_list;
298 }
299
honghaizdb8cf502015-12-21 13:08:46 -0800300 void ReleaseIfAddrs(struct ifaddrs* list) {
301 struct ifaddrs* if_addr = list;
302 while (if_addr != nullptr) {
303 struct ifaddrs* next_addr = if_addr->ifa_next;
oprypin1ea631f2017-08-18 00:15:19 -0700304 free(if_addr->ifa_addr);
305 free(if_addr->ifa_netmask);
honghaizdb8cf502015-12-21 13:08:46 -0800306 delete if_addr;
307 if_addr = next_addr;
308 }
309 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000310#endif // defined(WEBRTC_POSIX)
311
312 protected:
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200313 webrtc::test::ScopedKeyValueConfig field_trials_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000314 bool callback_called_;
315};
316
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800317class TestBasicNetworkManager : public BasicNetworkManager {
318 public:
Niels Mölleraa373162021-09-28 16:09:07 +0200319 TestBasicNetworkManager(NetworkMonitorFactory* network_monitor_factory,
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200320 SocketFactory* socket_factory,
Jonas Orelande62c2f22022-03-29 11:04:48 +0200321 const webrtc::FieldTrialsView& field_trials)
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200322 : BasicNetworkManager(network_monitor_factory,
323 socket_factory,
324 &field_trials) {}
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800325 using BasicNetworkManager::QueryDefaultLocalAddress;
Guo-wei Shieha34c39e2015-11-25 13:12:26 -0800326 using BasicNetworkManager::set_default_local_addresses;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800327};
328
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000329// Test that the Network ctor works properly.
330TEST_F(NetworkTest, TestNetworkConstruct) {
331 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
332 IPAddress(0x12345600U), 24);
333 EXPECT_EQ("test_eth0", ipv4_network1.name());
334 EXPECT_EQ("Test Network Adapter 1", ipv4_network1.description());
335 EXPECT_EQ(IPAddress(0x12345600U), ipv4_network1.prefix());
336 EXPECT_EQ(24, ipv4_network1.prefix_length());
337 EXPECT_FALSE(ipv4_network1.ignored());
338}
339
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000340TEST_F(NetworkTest, TestIsIgnoredNetworkIgnoresIPsStartingWith0) {
341 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
342 IPAddress(0x12345600U), 24, ADAPTER_TYPE_ETHERNET);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000343 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000344 IPAddress(0x010000U), 24, ADAPTER_TYPE_ETHERNET);
Niels Möller539f3e12021-11-26 16:33:19 +0100345 PhysicalSocketServer socket_server;
346 BasicNetworkManager network_manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700347 network_manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000348 EXPECT_FALSE(IsIgnoredNetwork(network_manager, ipv4_network1));
349 EXPECT_TRUE(IsIgnoredNetwork(network_manager, ipv4_network2));
350}
351
phoglund@webrtc.org006521d2015-02-12 09:23:59 +0000352// TODO(phoglund): Remove when ignore list goes away.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000353TEST_F(NetworkTest, TestIgnoreList) {
Yves Gerey665174f2018-06-19 15:03:05 +0200354 Network ignore_me("ignore_me", "Ignore me please!", IPAddress(0x12345600U),
355 24);
356 Network include_me("include_me", "Include me please!", IPAddress(0x12345600U),
357 24);
Niels Möller539f3e12021-11-26 16:33:19 +0100358 PhysicalSocketServer socket_server;
359 BasicNetworkManager default_network_manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700360 default_network_manager.StartUpdating();
361 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, ignore_me));
362 EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, include_me));
363
Niels Möller539f3e12021-11-26 16:33:19 +0100364 BasicNetworkManager ignoring_network_manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000365 std::vector<std::string> ignore_list;
366 ignore_list.push_back("ignore_me");
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700367 ignoring_network_manager.set_network_ignore_list(ignore_list);
368 ignoring_network_manager.StartUpdating();
369 EXPECT_TRUE(IsIgnoredNetwork(ignoring_network_manager, ignore_me));
370 EXPECT_FALSE(IsIgnoredNetwork(ignoring_network_manager, include_me));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000371}
372
373// Test is failing on Windows opt: b/11288214
374TEST_F(NetworkTest, DISABLED_TestCreateNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +0100375 PhysicalSocketServer socket_server;
376 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000377 NetworkManager::NetworkList result = GetNetworks(manager, true);
378 // We should be able to bind to any addresses we find.
379 NetworkManager::NetworkList::iterator it;
Yves Gerey665174f2018-06-19 15:03:05 +0200380 for (it = result.begin(); it != result.end(); ++it) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000381 sockaddr_storage storage;
382 memset(&storage, 0, sizeof(storage));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +0000383 IPAddress ip = (*it)->GetBestIP();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000384 SocketAddress bindaddress(ip, 0);
385 bindaddress.SetScopeID((*it)->scope_id());
Niels Möllerd0b88792021-08-12 10:32:30 +0200386 // TODO(thaloun): Use rtc::Socket once it supports IPv6.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000387 int fd = static_cast<int>(socket(ip.family(), SOCK_STREAM, IPPROTO_TCP));
388 if (fd > 0) {
389 size_t ipsize = bindaddress.ToSockAddrStorage(&storage);
390 EXPECT_GE(ipsize, 0U);
Yves Gerey665174f2018-06-19 15:03:05 +0200391 int success = ::bind(fd, reinterpret_cast<sockaddr*>(&storage),
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000392 static_cast<int>(ipsize));
393#if defined(WEBRTC_WIN)
Mirko Bonadei675513b2017-11-09 11:09:25 +0100394 if (success)
395 RTC_LOG_GLE(LS_ERROR) << "Socket bind failed.";
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000396#endif
397 EXPECT_EQ(0, success);
398#if defined(WEBRTC_WIN)
399 closesocket(fd);
400#else
401 close(fd);
402#endif
403 }
404 delete (*it);
405 }
406}
407
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700408// Test StartUpdating() and StopUpdating(). network_permission_state starts with
409// ALLOWED.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000410TEST_F(NetworkTest, TestUpdateNetworks) {
Niels Mölleraa373162021-09-28 16:09:07 +0200411 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200412 BasicNetworkManager manager(nullptr, &socket_server, &field_trials_);
Yves Gerey665174f2018-06-19 15:03:05 +0200413 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
414 &NetworkTest::OnNetworksChanged);
guoweisea1012b2015-08-21 09:06:28 -0700415 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
416 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000417 manager.StartUpdating();
418 Thread::Current()->ProcessMessages(0);
419 EXPECT_TRUE(callback_called_);
420 callback_called_ = false;
421 // Callback should be triggered immediately when StartUpdating
422 // is called, after network update signal is already sent.
423 manager.StartUpdating();
424 EXPECT_TRUE(manager.started());
425 Thread::Current()->ProcessMessages(0);
426 EXPECT_TRUE(callback_called_);
427 manager.StopUpdating();
428 EXPECT_TRUE(manager.started());
429 manager.StopUpdating();
guoweisea1012b2015-08-21 09:06:28 -0700430 EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED,
431 manager.enumeration_permission());
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000432 EXPECT_FALSE(manager.started());
433 manager.StopUpdating();
434 EXPECT_FALSE(manager.started());
435 callback_called_ = false;
436 // Callback should be triggered immediately after StartUpdating is called
437 // when start_count_ is reset to 0.
438 manager.StartUpdating();
439 Thread::Current()->ProcessMessages(0);
440 EXPECT_TRUE(callback_called_);
441}
442
443// Verify that MergeNetworkList() merges network lists properly.
444TEST_F(NetworkTest, TestBasicMergeNetworkList) {
445 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
446 IPAddress(0x12345600U), 24);
447 Network ipv4_network2("test_eth1", "Test Network Adapter 2",
448 IPAddress(0x00010000U), 16);
449 ipv4_network1.AddIP(IPAddress(0x12345678));
450 ipv4_network2.AddIP(IPAddress(0x00010004));
Niels Möller539f3e12021-11-26 16:33:19 +0100451 PhysicalSocketServer socket_server;
452 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000453
454 // Add ipv4_network1 to the list of networks.
455 NetworkManager::NetworkList list;
456 list.push_back(new Network(ipv4_network1));
457 bool changed;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000458 NetworkManager::Stats stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000459 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000460 EXPECT_EQ(stats.ipv6_network_count, 0);
461 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000462 list.clear();
463
Niels Möller22211442022-04-07 11:43:28 +0200464 std::vector<const rtc::Network*> current = manager.GetNetworks();
465 EXPECT_EQ(1U, current.size());
466 EXPECT_TRUE(SameNameAndPrefix(ipv4_network1, *current[0]));
467 const Network* net1 = current[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700468 uint16_t net_id1 = net1->id();
469 EXPECT_EQ(1, net_id1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000470
471 // Replace ipv4_network1 with ipv4_network2.
472 list.push_back(new Network(ipv4_network2));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000473 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000474 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000475 EXPECT_EQ(stats.ipv6_network_count, 0);
476 EXPECT_EQ(stats.ipv4_network_count, 1);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000477 list.clear();
478
Niels Möller22211442022-04-07 11:43:28 +0200479 current = manager.GetNetworks();
480 EXPECT_EQ(1U, current.size());
481 EXPECT_TRUE(SameNameAndPrefix(ipv4_network2, *current[0]));
482 const Network* net2 = current[0];
honghaiza0c44ea2016-03-23 16:07:48 -0700483 uint16_t net_id2 = net2->id();
484 // Network id will increase.
485 EXPECT_LT(net_id1, net_id2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000486
487 // Add Network2 back.
488 list.push_back(new Network(ipv4_network1));
489 list.push_back(new Network(ipv4_network2));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000490 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000491 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000492 EXPECT_EQ(stats.ipv6_network_count, 0);
493 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000494 list.clear();
495
496 // Verify that we get previous instances of Network objects.
Niels Möller22211442022-04-07 11:43:28 +0200497 current = manager.GetNetworks();
498 EXPECT_EQ(2U, current.size());
499 EXPECT_TRUE((net1 == current[0] && net2 == current[1]) ||
500 (net1 == current[1] && net2 == current[0]));
501 EXPECT_TRUE((net_id1 == current[0]->id() && net_id2 == current[1]->id()) ||
502 (net_id1 == current[1]->id() && net_id2 == current[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000503
504 // Call MergeNetworkList() again and verify that we don't get update
505 // notification.
506 list.push_back(new Network(ipv4_network2));
507 list.push_back(new Network(ipv4_network1));
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000508 stats = MergeNetworkList(manager, list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000509 EXPECT_FALSE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000510 EXPECT_EQ(stats.ipv6_network_count, 0);
511 EXPECT_EQ(stats.ipv4_network_count, 2);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000512 list.clear();
513
514 // Verify that we get previous instances of Network objects.
Niels Möller22211442022-04-07 11:43:28 +0200515 current = manager.GetNetworks();
516 EXPECT_EQ(2U, current.size());
517 EXPECT_TRUE((net1 == current[0] && net2 == current[1]) ||
518 (net1 == current[1] && net2 == current[0]));
519 EXPECT_TRUE((net_id1 == current[0]->id() && net_id2 == current[1]->id()) ||
520 (net_id1 == current[1]->id() && net_id2 == current[0]->id()));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000521}
522
523// Sets up some test IPv6 networks and appends them to list.
524// Four networks are added - public and link local, for two interfaces.
525void SetupNetworks(NetworkManager::NetworkList* list) {
526 IPAddress ip;
527 IPAddress prefix;
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000528 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:ef12", &ip));
529 EXPECT_TRUE(IPFromString("abcd::", &prefix));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000530 // First, fake link-locals.
531 Network ipv6_eth0_linklocalnetwork("test_eth0", "Test NetworkAdapter 1",
532 prefix, 64);
533 ipv6_eth0_linklocalnetwork.AddIP(ip);
guoweis@webrtc.orgbbce5ef2015-03-05 04:38:29 +0000534 EXPECT_TRUE(IPFromString("abcd::5678:abcd:ef12:3456", &ip));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000535 Network ipv6_eth1_linklocalnetwork("test_eth1", "Test NetworkAdapter 2",
536 prefix, 64);
537 ipv6_eth1_linklocalnetwork.AddIP(ip);
538 // Public networks:
539 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip));
540 prefix = TruncateIP(ip, 64);
541 Network ipv6_eth0_publicnetwork1_ip1("test_eth0", "Test NetworkAdapter 1",
542 prefix, 64);
543 ipv6_eth0_publicnetwork1_ip1.AddIP(ip);
544 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
545 prefix = TruncateIP(ip, 64);
546 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 1",
547 prefix, 64);
548 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
549 list->push_back(new Network(ipv6_eth0_linklocalnetwork));
550 list->push_back(new Network(ipv6_eth1_linklocalnetwork));
551 list->push_back(new Network(ipv6_eth0_publicnetwork1_ip1));
552 list->push_back(new Network(ipv6_eth1_publicnetwork1_ip1));
553}
554
555// Test that the basic network merging case works.
556TEST_F(NetworkTest, TestIPv6MergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +0100557 PhysicalSocketServer socket_server;
558 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200559 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
560 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000561 NetworkManager::NetworkList original_list;
562 SetupNetworks(&original_list);
563 bool changed = false;
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000564 NetworkManager::Stats stats =
565 MergeNetworkList(manager, original_list, &changed);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000566 EXPECT_TRUE(changed);
guoweis@webrtc.orga094cac2015-01-28 19:34:05 +0000567 EXPECT_EQ(stats.ipv6_network_count, 4);
568 EXPECT_EQ(stats.ipv4_network_count, 0);
Niels Möller22211442022-04-07 11:43:28 +0200569 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000570 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700571 EXPECT_THAT(list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000572}
573
574// Tests that when two network lists that describe the same set of networks are
575// merged, that the changed callback is not called, and that the original
576// objects remain in the result list.
577TEST_F(NetworkTest, TestNoChangeMerge) {
Niels Möller539f3e12021-11-26 16:33:19 +0100578 PhysicalSocketServer socket_server;
579 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200580 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
581 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000582 NetworkManager::NetworkList original_list;
583 SetupNetworks(&original_list);
584 bool changed = false;
585 MergeNetworkList(manager, original_list, &changed);
586 EXPECT_TRUE(changed);
587 // Second list that describes the same networks but with new objects.
588 NetworkManager::NetworkList second_list;
589 SetupNetworks(&second_list);
590 changed = false;
591 MergeNetworkList(manager, second_list, &changed);
592 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +0200593 std::vector<const Network*> resulting_list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000594 // Verify that the original members are in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700595 EXPECT_THAT(resulting_list, UnorderedElementsAreArray(original_list));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000596 // Doublecheck that the new networks aren't in the list.
Steve Anton2acd1632019-03-25 13:48:30 -0700597 for (const Network* network : second_list) {
598 EXPECT_THAT(resulting_list, Not(Contains(network)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000599 }
600}
601
602// Test that we can merge a network that is the same as another network but with
603// a different IP. The original network should remain in the list, but have its
604// IP changed.
605TEST_F(NetworkTest, MergeWithChangedIP) {
Niels Möller539f3e12021-11-26 16:33:19 +0100606 PhysicalSocketServer socket_server;
607 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200608 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
609 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000610 NetworkManager::NetworkList original_list;
611 SetupNetworks(&original_list);
612 // Make a network that we're going to change.
613 IPAddress ip;
614 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip));
615 IPAddress prefix = TruncateIP(ip, 64);
Yves Gerey665174f2018-06-19 15:03:05 +0200616 Network* network_to_change =
617 new Network("test_eth0", "Test Network Adapter 1", prefix, 64);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000618 Network* changed_network = new Network(*network_to_change);
619 network_to_change->AddIP(ip);
620 IPAddress changed_ip;
621 EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip));
622 changed_network->AddIP(changed_ip);
623 original_list.push_back(network_to_change);
624 bool changed = false;
625 MergeNetworkList(manager, original_list, &changed);
626 NetworkManager::NetworkList second_list;
627 SetupNetworks(&second_list);
628 second_list.push_back(changed_network);
629 changed = false;
630 MergeNetworkList(manager, second_list, &changed);
631 EXPECT_TRUE(changed);
Niels Möller22211442022-04-07 11:43:28 +0200632 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000633 EXPECT_EQ(original_list.size(), list.size());
634 // Make sure the original network is still in the merged list.
Steve Anton2acd1632019-03-25 13:48:30 -0700635 EXPECT_THAT(list, Contains(network_to_change));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000636 EXPECT_EQ(changed_ip, network_to_change->GetIPs().at(0));
637}
638
Mirko Bonadei9b88e292022-03-18 13:35:27 +0100639// TODO(bugs.webrtc.org/13846): Re-enable when the ASan issue is fixed.
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000640// Testing a similar case to above, but checking that a network can be updated
641// with additional IPs (not just a replacement).
Mirko Bonadei9b88e292022-03-18 13:35:27 +0100642TEST_F(NetworkTest, DISABLED_TestMultipleIPMergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +0100643 PhysicalSocketServer socket_server;
644 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200645 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
646 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000647 NetworkManager::NetworkList original_list;
648 SetupNetworks(&original_list);
649 bool changed = false;
650 MergeNetworkList(manager, original_list, &changed);
651 EXPECT_TRUE(changed);
652 IPAddress ip;
653 IPAddress check_ip;
654 IPAddress prefix;
655 // Add a second IP to the public network on eth0 (2401:fa00:4:1000/64).
656 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip));
657 prefix = TruncateIP(ip, 64);
658 Network ipv6_eth0_publicnetwork1_ip2("test_eth0", "Test NetworkAdapter 1",
659 prefix, 64);
660 // This is the IP that already existed in the public network on eth0.
661 EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip));
662 ipv6_eth0_publicnetwork1_ip2.AddIP(ip);
663 original_list.push_back(new Network(ipv6_eth0_publicnetwork1_ip2));
664 changed = false;
665 MergeNetworkList(manager, original_list, &changed);
666 EXPECT_TRUE(changed);
667 // There should still be four networks.
Niels Möller22211442022-04-07 11:43:28 +0200668 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000669 EXPECT_EQ(4U, list.size());
670 // Check the gathered IPs.
671 int matchcount = 0;
Niels Möller22211442022-04-07 11:43:28 +0200672 for (const Network* network : list) {
673 if (SameNameAndPrefix(*network, *original_list[2])) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000674 ++matchcount;
675 EXPECT_EQ(1, matchcount);
676 // This should be the same network object as before.
Niels Möller22211442022-04-07 11:43:28 +0200677 EXPECT_EQ(network, original_list[2]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000678 // But with two addresses now.
Niels Möller22211442022-04-07 11:43:28 +0200679 EXPECT_THAT(network->GetIPs(),
Steve Anton2acd1632019-03-25 13:48:30 -0700680 UnorderedElementsAre(InterfaceAddress(check_ip),
681 InterfaceAddress(ip)));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000682 } else {
683 // Check the IP didn't get added anywhere it wasn't supposed to.
Niels Möller22211442022-04-07 11:43:28 +0200684 EXPECT_THAT(network->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000685 }
686 }
687}
688
689// Test that merge correctly distinguishes multiple networks on an interface.
690TEST_F(NetworkTest, TestMultiplePublicNetworksOnOneInterfaceMerge) {
Niels Möller539f3e12021-11-26 16:33:19 +0100691 PhysicalSocketServer socket_server;
692 BasicNetworkManager manager(&socket_server);
Yves Gerey665174f2018-06-19 15:03:05 +0200693 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
694 &NetworkTest::OnNetworksChanged);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000695 NetworkManager::NetworkList original_list;
696 SetupNetworks(&original_list);
697 bool changed = false;
698 MergeNetworkList(manager, original_list, &changed);
699 EXPECT_TRUE(changed);
700 IPAddress ip;
701 IPAddress prefix;
702 // A second network for eth0.
703 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip));
704 prefix = TruncateIP(ip, 64);
705 Network ipv6_eth0_publicnetwork2_ip1("test_eth0", "Test NetworkAdapter 1",
706 prefix, 64);
707 ipv6_eth0_publicnetwork2_ip1.AddIP(ip);
708 original_list.push_back(new Network(ipv6_eth0_publicnetwork2_ip1));
709 changed = false;
710 MergeNetworkList(manager, original_list, &changed);
711 EXPECT_TRUE(changed);
712 // There should be five networks now.
Niels Möller22211442022-04-07 11:43:28 +0200713 std::vector<const Network*> list = manager.GetNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000714 EXPECT_EQ(5U, list.size());
715 // Check the resulting addresses.
Niels Möller22211442022-04-07 11:43:28 +0200716 for (const Network* network : list) {
717 if (network->prefix() == ipv6_eth0_publicnetwork2_ip1.prefix() &&
718 network->name() == ipv6_eth0_publicnetwork2_ip1.name()) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000719 // Check the new network has 1 IP and that it's the correct one.
Niels Möller22211442022-04-07 11:43:28 +0200720 EXPECT_EQ(1U, network->GetIPs().size());
721 EXPECT_EQ(ip, network->GetIPs().at(0));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000722 } else {
723 // Check the IP didn't get added anywhere it wasn't supposed to.
Niels Möller22211442022-04-07 11:43:28 +0200724 EXPECT_THAT(network->GetIPs(), Not(Contains(InterfaceAddress(ip))));
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000725 }
726 }
727}
728
honghaizdb8cf502015-12-21 13:08:46 -0800729// Test that DumpNetworks does not crash.
730TEST_F(NetworkTest, TestCreateAndDumpNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +0100731 PhysicalSocketServer socket_server;
732 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700733 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800734 NetworkManager::NetworkList list = GetNetworks(manager, true);
735 bool changed;
736 MergeNetworkList(manager, list, &changed);
737 manager.DumpNetworks();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000738}
739
Mirko Bonadei44f0f872019-01-20 18:16:42 +0100740TEST_F(NetworkTest, TestIPv6Toggle) {
Niels Möller539f3e12021-11-26 16:33:19 +0100741 PhysicalSocketServer socket_server;
742 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700743 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000744 bool ipv6_found = false;
745 NetworkManager::NetworkList list;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000746 list = GetNetworks(manager, true);
747 for (NetworkManager::NetworkList::iterator it = list.begin();
748 it != list.end(); ++it) {
749 if ((*it)->prefix().family() == AF_INET6) {
750 ipv6_found = true;
751 break;
752 }
753 }
754 EXPECT_TRUE(ipv6_found);
755 for (NetworkManager::NetworkList::iterator it = list.begin();
756 it != list.end(); ++it) {
757 delete (*it);
758 }
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000759}
760
deadbeef3427f532017-07-26 16:09:33 -0700761// Test that when network interfaces are sorted and given preference values,
762// IPv6 comes first.
763TEST_F(NetworkTest, IPv6NetworksPreferredOverIPv4) {
Niels Möller539f3e12021-11-26 16:33:19 +0100764 PhysicalSocketServer socket_server;
765 BasicNetworkManager manager(&socket_server);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000766 Network ipv4_network1("test_eth0", "Test Network Adapter 1",
767 IPAddress(0x12345600U), 24);
768 ipv4_network1.AddIP(IPAddress(0x12345600U));
769
770 IPAddress ip;
771 IPAddress prefix;
772 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
773 prefix = TruncateIP(ip, 64);
774 Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 2",
775 prefix, 64);
776 ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
777
778 NetworkManager::NetworkList list;
779 list.push_back(new Network(ipv4_network1));
780 list.push_back(new Network(ipv6_eth1_publicnetwork1_ip1));
781 Network* net1 = list[0];
782 Network* net2 = list[1];
783
784 bool changed = false;
785 MergeNetworkList(manager, list, &changed);
786 ASSERT_TRUE(changed);
787 // After sorting IPv6 network should be higher order than IPv4 networks.
788 EXPECT_TRUE(net1->preference() < net2->preference());
789}
790
deadbeef3427f532017-07-26 16:09:33 -0700791// When two interfaces are equivalent in everything but name, they're expected
792// to be preference-ordered by name. For example, "eth0" before "eth1".
793TEST_F(NetworkTest, NetworksSortedByInterfaceName) {
Niels Möller539f3e12021-11-26 16:33:19 +0100794 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200795 BasicNetworkManager manager(&socket_server, &field_trials_);
deadbeef3427f532017-07-26 16:09:33 -0700796 Network* eth0 = new Network("test_eth0", "Test Network Adapter 1",
797 IPAddress(0x65432100U), 24);
798 eth0->AddIP(IPAddress(0x65432100U));
799 Network* eth1 = new Network("test_eth1", "Test Network Adapter 2",
800 IPAddress(0x12345600U), 24);
801 eth1->AddIP(IPAddress(0x12345600U));
802 NetworkManager::NetworkList list;
803 // Add them to the list in the opposite of the expected sorted order, to
804 // ensure sorting actually occurs.
805 list.push_back(eth1);
806 list.push_back(eth0);
807
808 bool changed = false;
809 MergeNetworkList(manager, list, &changed);
810 ASSERT_TRUE(changed);
811 // "test_eth0" should be preferred over "test_eth1".
812 EXPECT_TRUE(eth0->preference() > eth1->preference());
813}
814
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000815TEST_F(NetworkTest, TestNetworkAdapterTypes) {
816 Network wifi("wlan0", "Wireless Adapter", IPAddress(0x12345600U), 24,
817 ADAPTER_TYPE_WIFI);
818 EXPECT_EQ(ADAPTER_TYPE_WIFI, wifi.type());
819 Network ethernet("eth0", "Ethernet", IPAddress(0x12345600U), 24,
820 ADAPTER_TYPE_ETHERNET);
821 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, ethernet.type());
822 Network cellular("test_cell", "Cellular Adapter", IPAddress(0x12345600U), 24,
823 ADAPTER_TYPE_CELLULAR);
824 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, cellular.type());
825 Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24,
826 ADAPTER_TYPE_VPN);
827 EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
828 Network unknown("test", "Test Adapter", IPAddress(0x12345600U), 24,
829 ADAPTER_TYPE_UNKNOWN);
830 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, unknown.type());
831}
832
833#if defined(WEBRTC_POSIX)
834// Verify that we correctly handle interfaces with no address.
835TEST_F(NetworkTest, TestConvertIfAddrsNoAddress) {
836 ifaddrs list;
837 memset(&list, 0, sizeof(list));
838 list.ifa_name = const_cast<char*>("test_iface");
839
840 NetworkManager::NetworkList result;
Niels Möller539f3e12021-11-26 16:33:19 +0100841 PhysicalSocketServer socket_server;
842 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700843 manager.StartUpdating();
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000844 CallConvertIfAddrs(manager, &list, true, &result);
845 EXPECT_TRUE(result.empty());
846}
honghaizdb8cf502015-12-21 13:08:46 -0800847
848// Verify that if there are two addresses on one interface, only one network
849// is generated.
850TEST_F(NetworkTest, TestConvertIfAddrsMultiAddressesOnOneInterface) {
851 char if_name[20] = "rmnet0";
852 ifaddrs* list = nullptr;
853 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:1",
854 "FFFF:FFFF:FFFF:FFFF::", 0);
855 list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:2",
856 "FFFF:FFFF:FFFF:FFFF::", 0);
857 NetworkManager::NetworkList result;
Niels Möller539f3e12021-11-26 16:33:19 +0100858 PhysicalSocketServer socket_server;
859 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700860 manager.StartUpdating();
honghaizdb8cf502015-12-21 13:08:46 -0800861 CallConvertIfAddrs(manager, list, true, &result);
862 EXPECT_EQ(1U, result.size());
863 bool changed;
864 // This ensures we release the objects created in CallConvertIfAddrs.
865 MergeNetworkList(manager, result, &changed);
866 ReleaseIfAddrs(list);
867}
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800868
869TEST_F(NetworkTest, TestConvertIfAddrsNotRunning) {
870 ifaddrs list;
871 memset(&list, 0, sizeof(list));
872 list.ifa_name = const_cast<char*>("test_iface");
873 sockaddr ifa_addr;
874 sockaddr ifa_netmask;
875 list.ifa_addr = &ifa_addr;
876 list.ifa_netmask = &ifa_netmask;
877
878 NetworkManager::NetworkList result;
Niels Möller539f3e12021-11-26 16:33:19 +0100879 PhysicalSocketServer socket_server;
880 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700881 manager.StartUpdating();
Guo-wei Shieh9faf1542015-12-28 14:06:55 -0800882 CallConvertIfAddrs(manager, &list, true, &result);
883 EXPECT_TRUE(result.empty());
884}
Honghai Zhang351d77b2016-05-20 15:08:29 -0700885
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700886// Tests that the network type can be determined from the network monitor when
887// it would otherwise be unknown.
Honghai Zhang351d77b2016-05-20 15:08:29 -0700888TEST_F(NetworkTest, TestGetAdapterTypeFromNetworkMonitor) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700889 char if_name[20] = "wifi0";
890 std::string ipv6_address = "1000:2000:3000:4000:0:0:0:1";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700891 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Niels Mölleraa373162021-09-28 16:09:07 +0200892 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200893 BasicNetworkManager manager_without_monitor(nullptr, &socket_server,
894 &field_trials_);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700895 manager_without_monitor.StartUpdating();
896 // A network created without a network monitor will get UNKNOWN type.
897 ifaddrs* addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
898 manager_without_monitor);
899 EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, GetAdapterType(manager_without_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700900 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700901
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700902 // With the fake network monitor the type should be correctly determined.
903 FakeNetworkMonitorFactory factory;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +0200904 BasicNetworkManager manager_with_monitor(&factory, &socket_server,
905 &field_trials_);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700906 manager_with_monitor.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700907 // Add the same ipv6 address as before but it has the right network type
908 // detected by the network monitor now.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700909 addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
910 manager_with_monitor);
911 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor));
Honghai Zhang351d77b2016-05-20 15:08:29 -0700912 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700913}
914
915// Test that the network type can be determined based on name matching in
916// a few cases. Note that UNKNOWN type for non-matching strings has been tested
917// in the above test.
918TEST_F(NetworkTest, TestGetAdapterTypeFromNameMatching) {
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800919 std::string ipv4_address1 = "192.0.0.121";
920 std::string ipv4_mask = "255.255.255.0";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700921 std::string ipv6_address1 = "1000:2000:3000:4000:0:0:0:1";
922 std::string ipv6_address2 = "1000:2000:3000:8000:0:0:0:1";
923 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::";
Niels Möller539f3e12021-11-26 16:33:19 +0100924 PhysicalSocketServer socket_server;
925 BasicNetworkManager manager(&socket_server);
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -0700926 manager.StartUpdating();
Honghai Zhang351d77b2016-05-20 15:08:29 -0700927
deadbeef4cd599f2017-07-27 15:05:29 -0700928 // IPSec interface; name is in form "ipsec<index>".
929 char if_name[20] = "ipsec11";
Honghai Zhang351d77b2016-05-20 15:08:29 -0700930 ifaddrs* addr_list =
931 InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
deadbeef4cd599f2017-07-27 15:05:29 -0700932 EXPECT_EQ(ADAPTER_TYPE_VPN, GetAdapterType(manager));
933 ClearNetworks(manager);
934 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700935
Qingsi Wange53ac042018-05-08 11:55:07 -0700936 strcpy(if_name, "lo0");
937 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
938 EXPECT_EQ(ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager));
939 ClearNetworks(manager);
940 ReleaseIfAddrs(addr_list);
941
942 strcpy(if_name, "eth0");
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800943 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
Qingsi Wange53ac042018-05-08 11:55:07 -0700944 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, GetAdapterType(manager));
945 ClearNetworks(manager);
946 ReleaseIfAddrs(addr_list);
947
Qingsi Wangc5bc9d62019-09-25 15:03:19 -0700948 strcpy(if_name, "wlan0");
949 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
950 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
951 ClearNetworks(manager);
952 ReleaseIfAddrs(addr_list);
953
deadbeef4cd599f2017-07-27 15:05:29 -0700954#if defined(WEBRTC_IOS)
955 strcpy(if_name, "pdp_ip0");
956 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700957 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
958 ClearNetworks(manager);
959 ReleaseIfAddrs(addr_list);
960
Honghai Zhang63ab8102016-05-26 20:30:15 -0700961 strcpy(if_name, "en0");
962 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
963 EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
964 ClearNetworks(manager);
965 ReleaseIfAddrs(addr_list);
966
Honghai Zhang351d77b2016-05-20 15:08:29 -0700967#elif defined(WEBRTC_ANDROID)
deadbeef4cd599f2017-07-27 15:05:29 -0700968 strcpy(if_name, "rmnet0");
969 addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700970 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
971 ClearNetworks(manager);
972 ReleaseIfAddrs(addr_list);
973
Honghai Zhang351d77b2016-05-20 15:08:29 -0700974 strcpy(if_name, "v4-rmnet_data0");
975 addr_list = InstallIpv6Network(if_name, ipv6_address2, ipv6_mask, manager);
976 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
977 ClearNetworks(manager);
978 ReleaseIfAddrs(addr_list);
Jeroen de Borst8f096d02019-02-21 13:34:45 -0800979
980 strcpy(if_name, "clat4");
981 addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
982 EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager));
983 ClearNetworks(manager);
984 ReleaseIfAddrs(addr_list);
Honghai Zhang351d77b2016-05-20 15:08:29 -0700985#endif
986}
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -0700987
988// Test that an adapter won't be included in the network list if there's a
989// network monitor that says it's unavailable.
990TEST_F(NetworkTest, TestNetworkMonitorIsAdapterAvailable) {
991 char if_name1[20] = "pdp_ip0";
992 char if_name2[20] = "pdp_ip1";
993 ifaddrs* list = nullptr;
994 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
995 "FFFF:FFFF:FFFF:FFFF::", 0);
996 list = AddIpv6Address(list, if_name2, "1000:2000:3000:4000:0:0:0:2",
997 "FFFF:FFFF:FFFF:FFFF::", 0);
998 NetworkManager::NetworkList result;
999
1000 // Sanity check that both interfaces are included by default.
1001 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001002 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001003 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
Taylor Brandstetterea7fbfb2020-08-19 16:41:54 -07001004 manager.StartUpdating();
1005 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1006 EXPECT_EQ(2u, result.size());
1007 bool changed;
1008 // This ensures we release the objects created in CallConvertIfAddrs.
1009 MergeNetworkList(manager, result, &changed);
1010 result.clear();
1011
1012 // Now simulate one interface being unavailable.
1013 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1014 network_monitor->set_unavailable_adapters({if_name1});
1015 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1016 EXPECT_EQ(1u, result.size());
1017 EXPECT_EQ(if_name2, result[0]->name());
1018
1019 MergeNetworkList(manager, result, &changed);
1020 ReleaseIfAddrs(list);
1021}
1022
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001023#endif // defined(WEBRTC_POSIX)
1024
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001025// Test MergeNetworkList successfully combines all IPs for the same
1026// prefix/length into a single Network.
1027TEST_F(NetworkTest, TestMergeNetworkList) {
Niels Möller539f3e12021-11-26 16:33:19 +01001028 PhysicalSocketServer socket_server;
1029 BasicNetworkManager manager(&socket_server);
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001030 NetworkManager::NetworkList list;
1031
1032 // Create 2 IPAddress classes with only last digit different.
1033 IPAddress ip1, ip2;
1034 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1035 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2));
1036
1037 // Create 2 networks with the same prefix and length.
1038 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1039 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1040
1041 // Add different IP into each.
1042 net1->AddIP(ip1);
1043 net2->AddIP(ip2);
1044
1045 list.push_back(net1);
1046 list.push_back(net2);
1047 bool changed;
1048 MergeNetworkList(manager, list, &changed);
1049 EXPECT_TRUE(changed);
1050
Niels Möller22211442022-04-07 11:43:28 +02001051 std::vector<const Network*> list2 = manager.GetNetworks();
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001052
1053 // Make sure the resulted networklist has only 1 element and 2
1054 // IPAddresses.
1055 EXPECT_EQ(list2.size(), 1uL);
1056 EXPECT_EQ(list2[0]->GetIPs().size(), 2uL);
Mirko Bonadeib2a57852022-03-18 12:19:56 +01001057 EXPECT_THAT(list2[0]->GetIPs(), UnorderedElementsAre(InterfaceAddress(ip1),
1058 InterfaceAddress(ip2)));
guoweis@webrtc.org4bbd3c82014-09-09 13:54:45 +00001059}
1060
honghaizdb8cf502015-12-21 13:08:46 -08001061// Test that MergeNetworkList successfully detects the change if
1062// a network becomes inactive and then active again.
1063TEST_F(NetworkTest, TestMergeNetworkListWithInactiveNetworks) {
Niels Möller539f3e12021-11-26 16:33:19 +01001064 PhysicalSocketServer socket_server;
1065 BasicNetworkManager manager(&socket_server);
honghaizdb8cf502015-12-21 13:08:46 -08001066 Network network1("test_wifi", "Test Network Adapter 1",
1067 IPAddress(0x12345600U), 24);
1068 Network network2("test_eth0", "Test Network Adapter 2",
1069 IPAddress(0x00010000U), 16);
1070 network1.AddIP(IPAddress(0x12345678));
1071 network2.AddIP(IPAddress(0x00010004));
1072 NetworkManager::NetworkList list;
1073 Network* net1 = new Network(network1);
1074 list.push_back(net1);
1075 bool changed;
1076 MergeNetworkList(manager, list, &changed);
1077 EXPECT_TRUE(changed);
1078 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001079
1080 std::vector<const Network*> current = manager.GetNetworks();
1081 ASSERT_EQ(1U, current.size());
1082 EXPECT_EQ(net1, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001083
1084 list.clear();
1085 Network* net2 = new Network(network2);
1086 list.push_back(net2);
1087 MergeNetworkList(manager, list, &changed);
1088 EXPECT_TRUE(changed);
1089 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001090
1091 current = manager.GetNetworks();
1092 ASSERT_EQ(1U, current.size());
1093 EXPECT_EQ(net2, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001094
1095 // Now network1 is inactive. Try to merge it again.
1096 list.clear();
1097 list.push_back(new Network(network1));
1098 MergeNetworkList(manager, list, &changed);
1099 EXPECT_TRUE(changed);
1100 list.clear();
Niels Möller22211442022-04-07 11:43:28 +02001101 current = manager.GetNetworks();
1102 ASSERT_EQ(1U, current.size());
1103 EXPECT_TRUE(current[0]->active());
1104 EXPECT_EQ(net1, current[0]);
honghaizdb8cf502015-12-21 13:08:46 -08001105}
1106
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001107// Test that the filtering logic follows the defined ruleset in network.h.
1108TEST_F(NetworkTest, TestIPv6Selection) {
1109 InterfaceAddress ip;
1110 std::string ipstr;
1111
1112 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
1113 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
1114
1115 // Create a network with this prefix.
Yves Gerey665174f2018-06-19 15:03:05 +02001116 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
1117 64);
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001118
1119 // When there is no address added, it should return an unspecified
1120 // address.
1121 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1122 EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
1123
1124 // Deprecated one should not be returned.
1125 ipv6_network.AddIP(ip);
1126 EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
1127
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001128 // Add ULA one. ULA is unique local address which is starting either
1129 // with 0xfc or 0xfd.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001130 ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
1131 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1132 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001133 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001134
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001135 // Add global one.
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001136 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
1137 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
1138 ipv6_network.AddIP(ip);
aluebs@webrtc.org07dcf602015-02-27 18:42:22 +00001139 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
guoweis@webrtc.org369a6372014-09-17 22:37:29 +00001140
1141 // Add global dynamic temporary one.
1142 ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
1143 ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
1144 ipv6_network.AddIP(ip);
1145 EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
1146}
1147
honghaiz023f3ef2015-10-19 09:39:32 -07001148TEST_F(NetworkTest, TestNetworkMonitoring) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001149 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001150 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001151 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
honghaiz023f3ef2015-10-19 09:39:32 -07001152 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1153 &NetworkTest::OnNetworksChanged);
honghaiz023f3ef2015-10-19 09:39:32 -07001154 manager.StartUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001155 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1156 EXPECT_TRUE(network_monitor && network_monitor->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001157 EXPECT_TRUE_WAIT(callback_called_, 1000);
1158 callback_called_ = false;
1159
1160 // Clear the networks so that there will be network changes below.
1161 ClearNetworks(manager);
1162 // Network manager is started, so the callback is called when the network
1163 // monitor fires the network-change event.
Mirko Bonadei37077932021-07-27 17:00:58 +02001164 network_monitor->InovkeNetworksChangedCallbackForTesting();
honghaiz023f3ef2015-10-19 09:39:32 -07001165 EXPECT_TRUE_WAIT(callback_called_, 1000);
1166
honghaizcec0a082016-01-15 14:49:09 -08001167 // Network manager is stopped.
honghaiz023f3ef2015-10-19 09:39:32 -07001168 manager.StopUpdating();
honghaizcec0a082016-01-15 14:49:09 -08001169 EXPECT_FALSE(GetNetworkMonitor(manager)->started());
honghaiz023f3ef2015-10-19 09:39:32 -07001170}
1171
Edward Lemur8dc945c2016-07-21 10:16:40 +02001172// Fails on Android: https://bugs.chromium.org/p/webrtc/issues/detail?id=4364.
1173#if defined(WEBRTC_ANDROID)
1174#define MAYBE_DefaultLocalAddress DISABLED_DefaultLocalAddress
1175#else
1176#define MAYBE_DefaultLocalAddress DefaultLocalAddress
1177#endif
1178TEST_F(NetworkTest, MAYBE_DefaultLocalAddress) {
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001179 IPAddress ip;
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001180 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001181 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001182 TestBasicNetworkManager manager(&factory, &socket_server, field_trials_);
guoweis56271ed2016-01-15 14:45:06 -08001183 manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
1184 &NetworkTest::OnNetworksChanged);
guoweis56271ed2016-01-15 14:45:06 -08001185 manager.StartUpdating();
1186 EXPECT_TRUE_WAIT(callback_called_, 1000);
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001187
1188 // Make sure we can query default local address when an address for such
1189 // address family exists.
Niels Möller22211442022-04-07 11:43:28 +02001190 std::vector<const Network*> networks = manager.GetNetworks();
guoweis56271ed2016-01-15 14:45:06 -08001191 EXPECT_TRUE(!networks.empty());
Niels Möller22211442022-04-07 11:43:28 +02001192 for (const Network* network : networks) {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001193 if (network->GetBestIP().family() == AF_INET) {
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001194 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET) != IPAddress());
guoweis56271ed2016-01-15 14:45:06 -08001195 } else if (network->GetBestIP().family() == AF_INET6 &&
1196 !IPIsLoopback(network->GetBestIP())) {
1197 // Existence of an IPv6 loopback address doesn't mean it has IPv6 network
1198 // enabled.
Taylor Brandstetter239ac8a2020-07-31 16:07:52 -07001199 EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET6) != IPAddress());
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001200 }
1201 }
Guo-wei Shieha34c39e2015-11-25 13:12:26 -08001202
1203 // GetDefaultLocalAddress should return the valid default address after set.
1204 manager.set_default_local_addresses(GetLoopbackIP(AF_INET),
1205 GetLoopbackIP(AF_INET6));
1206 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET, &ip));
1207 EXPECT_EQ(ip, GetLoopbackIP(AF_INET));
1208 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1209 EXPECT_EQ(ip, GetLoopbackIP(AF_INET6));
honghaizaf83fe62016-04-18 14:50:44 -07001210
1211 // More tests on GetDefaultLocalAddress with ipv6 addresses where the set
1212 // default address may be different from the best IP address of any network.
1213 InterfaceAddress ip1;
1214 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:1111",
1215 IPV6_ADDRESS_FLAG_TEMPORARY, &ip1));
1216 // Create a network with a prefix of ip1.
1217 Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip1, 64),
1218 64);
1219 IPAddress ip2;
1220 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:2222", &ip2));
1221 ipv6_network.AddIP(ip1);
1222 ipv6_network.AddIP(ip2);
1223 BasicNetworkManager::NetworkList list(1, new Network(ipv6_network));
1224 bool changed;
1225 MergeNetworkList(manager, list, &changed);
1226 // If the set default address is not in any network, GetDefaultLocalAddress
1227 // should return it.
1228 IPAddress ip3;
1229 EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:3333", &ip3));
1230 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip3);
1231 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1232 EXPECT_EQ(ip3, ip);
1233 // If the set default address is in a network, GetDefaultLocalAddress will
1234 // return the best IP in that network.
1235 manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip2);
1236 EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
1237 EXPECT_EQ(static_cast<IPAddress>(ip1), ip);
1238
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001239 manager.StopUpdating();
1240}
1241
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001242// Test that MergeNetworkList does not set change = true
1243// when changing from cellular_X to cellular_Y.
1244TEST_F(NetworkTest, TestWhenNetworkListChangeReturnsChangedFlag) {
Niels Möller539f3e12021-11-26 16:33:19 +01001245 PhysicalSocketServer socket_server;
1246 BasicNetworkManager manager(&socket_server);
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001247
1248 IPAddress ip1;
1249 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1250 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1251 net1->set_type(ADAPTER_TYPE_CELLULAR_3G);
1252 net1->AddIP(ip1);
1253 NetworkManager::NetworkList list;
1254 list.push_back(net1);
1255
1256 {
1257 bool changed;
1258 MergeNetworkList(manager, list, &changed);
1259 EXPECT_TRUE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001260 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001261 EXPECT_EQ(list2.size(), 1uL);
1262 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_3G, list2[0]->type());
1263 }
1264
1265 // Modify net1 from 3G to 4G
1266 {
1267 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1268 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1269 net2->AddIP(ip1);
1270 list.clear();
1271 list.push_back(net2);
1272 bool changed;
1273 MergeNetworkList(manager, list, &changed);
1274
1275 // Change from 3G to 4G shall not trigger OnNetworksChanged,
1276 // i.e changed = false.
1277 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001278 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001279 ASSERT_EQ(list2.size(), 1uL);
1280 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1281 }
1282
1283 // Don't modify.
1284 {
1285 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1286 net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
1287 net2->AddIP(ip1);
1288 list.clear();
1289 list.push_back(net2);
1290 bool changed;
1291 MergeNetworkList(manager, list, &changed);
1292
1293 // No change.
1294 EXPECT_FALSE(changed);
Niels Möller22211442022-04-07 11:43:28 +02001295 std::vector<const Network*> list2 = manager.GetNetworks();
Jonas Orelandc7ea04a2020-04-03 10:12:28 +02001296 ASSERT_EQ(list2.size(), 1uL);
1297 EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
1298 }
1299}
1300
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001301#if defined(WEBRTC_POSIX)
1302TEST_F(NetworkTest, IgnoresMACBasedIPv6Address) {
1303 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1304 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
Niels Möller539f3e12021-11-26 16:33:19 +01001305 PhysicalSocketServer socket_server;
1306 BasicNetworkManager manager(&socket_server);
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001307 manager.StartUpdating();
1308
1309 // IPSec interface; name is in form "ipsec<index>".
1310 char if_name[20] = "ipsec11";
1311 ifaddrs* addr_list =
1312 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1313
Niels Möller22211442022-04-07 11:43:28 +02001314 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001315 EXPECT_EQ(list.size(), 0u);
1316 ReleaseIfAddrs(addr_list);
1317}
1318
1319TEST_F(NetworkTest, WebRTC_AllowMACBasedIPv6Address) {
1320 webrtc::test::ScopedFieldTrials field_trials(
1321 "WebRTC-AllowMACBasedIPv6/Enabled/");
1322 std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345";
1323 std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF";
Niels Möller539f3e12021-11-26 16:33:19 +01001324 PhysicalSocketServer socket_server;
1325 BasicNetworkManager manager(&socket_server);
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001326 manager.StartUpdating();
1327
1328 // IPSec interface; name is in form "ipsec<index>".
1329 char if_name[20] = "ipsec11";
1330 ifaddrs* addr_list =
1331 InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager);
1332
Niels Möller22211442022-04-07 11:43:28 +02001333 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland47fa08f2020-12-05 18:09:13 +01001334 EXPECT_EQ(list.size(), 1u);
1335 ReleaseIfAddrs(addr_list);
1336}
1337#endif
1338
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001339#if defined(WEBRTC_POSIX)
1340TEST_F(NetworkTest, WebRTC_BindUsingInterfaceName) {
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001341 char if_name1[20] = "wlan0";
1342 char if_name2[20] = "v4-wlan0";
1343 ifaddrs* list = nullptr;
1344 list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1",
1345 "FFFF:FFFF:FFFF:FFFF::", 0);
1346 list = AddIpv4Address(list, if_name2, "192.168.0.2", "255.255.255.255");
1347 NetworkManager::NetworkList result;
1348
1349 // Sanity check that both interfaces are included by default.
1350 FakeNetworkMonitorFactory factory;
Niels Mölleraa373162021-09-28 16:09:07 +02001351 PhysicalSocketServer socket_server;
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001352 BasicNetworkManager manager(&factory, &socket_server, &field_trials_);
Jonas Oreland6ca955a2021-03-15 08:27:43 +00001353 manager.StartUpdating();
1354 CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result);
1355 EXPECT_EQ(2u, result.size());
1356 ReleaseIfAddrs(list);
1357 bool changed;
1358 // This ensures we release the objects created in CallConvertIfAddrs.
1359 MergeNetworkList(manager, result, &changed);
1360 result.clear();
1361
1362 FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
1363
1364 IPAddress ipv6;
1365 EXPECT_TRUE(IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6));
1366 IPAddress ipv4;
1367 EXPECT_TRUE(IPFromString("192.168.0.2", &ipv4));
1368
1369 // The network monitor only knwos about the ipv6 address, interface.
1370 network_monitor->set_adapters({"wlan0"});
1371 network_monitor->set_ip_addresses({ipv6});
1372 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv6),
1373 NetworkBindingResult::SUCCESS);
1374
1375 // But it will bind anyway using string matching...
1376 EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv4),
1377 NetworkBindingResult::SUCCESS);
1378}
1379#endif
1380
Jonas Orelandb477fc72021-08-23 12:16:33 +02001381TEST_F(NetworkTest, NetworkCostVpn_Default) {
1382 IPAddress ip1;
1383 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001384 webrtc::test::ScopedKeyValueConfig field_trials;
Jonas Orelandb477fc72021-08-23 12:16:33 +02001385
1386 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1387 net1->set_type(ADAPTER_TYPE_VPN);
1388 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1389
1390 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1391 net2->set_type(ADAPTER_TYPE_ETHERNET);
1392
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001393 EXPECT_EQ(net1->GetCost(field_trials), net2->GetCost(field_trials));
Jonas Orelandb477fc72021-08-23 12:16:33 +02001394 delete net1;
1395 delete net2;
1396}
1397
1398TEST_F(NetworkTest, NetworkCostVpn_VpnMoreExpensive) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001399 webrtc::test::ScopedKeyValueConfig field_trials(
Jonas Orelandb477fc72021-08-23 12:16:33 +02001400 "WebRTC-AddNetworkCostToVpn/Enabled/");
1401
1402 IPAddress ip1;
1403 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1404
1405 Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1406 net1->set_type(ADAPTER_TYPE_VPN);
1407 net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
1408
1409 Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
1410 net2->set_type(ADAPTER_TYPE_ETHERNET);
1411
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001412 EXPECT_GT(net1->GetCost(field_trials), net2->GetCost(field_trials));
Jonas Orelandb477fc72021-08-23 12:16:33 +02001413 delete net1;
1414 delete net2;
1415}
1416
Jonas Oreland30019052022-01-28 14:11:44 +01001417TEST_F(NetworkTest, GuessAdapterFromNetworkCost) {
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001418 webrtc::test::ScopedKeyValueConfig field_trials(
Jonas Oreland30019052022-01-28 14:11:44 +01001419 "WebRTC-AddNetworkCostToVpn/Enabled/"
1420 "WebRTC-UseDifferentiatedCellularCosts/Enabled/");
1421
1422 IPAddress ip1;
1423 EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
1424
1425 for (auto type : kAllAdapterTypes) {
1426 if (type == rtc::ADAPTER_TYPE_VPN)
1427 continue;
1428 Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
1429 net1.set_type(type);
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001430 auto [guess, vpn] =
1431 Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials));
Jonas Oreland30019052022-01-28 14:11:44 +01001432 EXPECT_FALSE(vpn);
1433 if (type == rtc::ADAPTER_TYPE_LOOPBACK) {
1434 EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET);
1435 } else {
1436 EXPECT_EQ(type, guess);
1437 }
1438 }
1439
1440 // VPN
1441 for (auto type : kAllAdapterTypes) {
1442 if (type == rtc::ADAPTER_TYPE_VPN)
1443 continue;
1444 Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
1445 net1.set_type(rtc::ADAPTER_TYPE_VPN);
1446 net1.set_underlying_type_for_vpn(type);
Jonas Orelandc06fe8b2022-03-28 14:58:26 +02001447 auto [guess, vpn] =
1448 Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials));
Jonas Oreland30019052022-01-28 14:11:44 +01001449 EXPECT_TRUE(vpn);
1450 if (type == rtc::ADAPTER_TYPE_LOOPBACK) {
1451 EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET);
1452 } else {
1453 EXPECT_EQ(type, guess);
1454 }
1455 }
1456}
1457
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001458TEST_F(NetworkTest, VpnList) {
Niels Möller539f3e12021-11-26 16:33:19 +01001459 PhysicalSocketServer socket_server;
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001460 {
Niels Möller539f3e12021-11-26 16:33:19 +01001461 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001462 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1463 manager.StartUpdating();
1464 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1465 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.12.1"), 24));
1466 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 16));
1467 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 24));
1468 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.1.1"), 32));
1469 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.0.0"), 16));
1470 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 15));
1471 }
1472 {
Niels Möller539f3e12021-11-26 16:33:19 +01001473 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001474 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 24)});
1475 manager.StartUpdating();
1476 EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32));
1477 EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.1"), 32));
1478 }
1479}
1480
1481#if defined(WEBRTC_POSIX)
1482// TODO(webrtc:13114): Implement the InstallIpv4Network for windows.
1483TEST_F(NetworkTest, VpnListOverrideAdapterType) {
Niels Möller539f3e12021-11-26 16:33:19 +01001484 PhysicalSocketServer socket_server;
1485 BasicNetworkManager manager(&socket_server);
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001486 manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)});
1487 manager.StartUpdating();
1488
1489 char if_name[20] = "eth0";
1490 auto addr_list =
1491 InstallIpv4Network(if_name, "192.168.1.23", "255.255.255.255", manager);
1492
Niels Möller22211442022-04-07 11:43:28 +02001493 std::vector<const Network*> list = manager.GetNetworks();
Jonas Oreland2ee0e642021-08-25 15:43:02 +02001494 ASSERT_EQ(1u, list.size());
1495 EXPECT_EQ(ADAPTER_TYPE_VPN, list[0]->type());
1496 EXPECT_EQ(ADAPTER_TYPE_ETHERNET, list[0]->underlying_type_for_vpn());
1497 ClearNetworks(manager);
1498 ReleaseIfAddrs(addr_list);
1499}
1500#endif // defined(WEBRTC_POSIX)
1501
Jonas Orelandac554eb2021-08-27 09:43:38 +02001502TEST_F(NetworkTest, HardcodedVpn) {
1503 const uint8_t cisco[] = {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0};
1504 const uint8_t global[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x1};
1505 const uint8_t unknown[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x0};
1506 const uint8_t five_bytes[] = {0x2, 0x50, 0x41, 0x0, 0x0};
1507 EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(cisco));
1508 EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(global));
1509
1510 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(
1511 rtc::ArrayView<const uint8_t>(cisco, 5)));
1512 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(five_bytes));
1513 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(unknown));
1514 EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(nullptr));
1515}
1516
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001517} // namespace rtc