diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
commit | 36d22d82aa202bb199967e9512281e9a53db42c9 (patch) | |
tree | 105e8c98ddea1c1e4784a60a5a6410fa416be2de /third_party/libwebrtc/pc/dtls_transport_unittest.cc | |
parent | Initial commit. (diff) | |
download | firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip |
Adding upstream version 115.7.0esr.upstream/115.7.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'third_party/libwebrtc/pc/dtls_transport_unittest.cc')
-rw-r--r-- | third_party/libwebrtc/pc/dtls_transport_unittest.cc | 181 |
1 files changed, 181 insertions, 0 deletions
diff --git a/third_party/libwebrtc/pc/dtls_transport_unittest.cc b/third_party/libwebrtc/pc/dtls_transport_unittest.cc new file mode 100644 index 0000000000..c234176635 --- /dev/null +++ b/third_party/libwebrtc/pc/dtls_transport_unittest.cc @@ -0,0 +1,181 @@ +/* + * Copyright 2018 The WebRTC project authors. All Rights Reserved. + * + * Use of this source code is governed by a BSD-style license + * that can be found in the LICENSE file in the root of the source + * tree. An additional intellectual property rights grant can be found + * in the file PATENTS. All contributing project authors may + * be found in the AUTHORS file in the root of the source tree. + */ + +#include "pc/dtls_transport.h" + +#include <utility> +#include <vector> + +#include "absl/types/optional.h" +#include "api/make_ref_counted.h" +#include "api/rtc_error.h" +#include "p2p/base/fake_dtls_transport.h" +#include "p2p/base/p2p_constants.h" +#include "rtc_base/fake_ssl_identity.h" +#include "rtc_base/gunit.h" +#include "rtc_base/rtc_certificate.h" +#include "rtc_base/ssl_identity.h" +#include "test/gmock.h" +#include "test/gtest.h" + +constexpr int kDefaultTimeout = 1000; // milliseconds +constexpr int kNonsenseCipherSuite = 1234; + +using cricket::FakeDtlsTransport; +using ::testing::ElementsAre; + +namespace webrtc { + +class TestDtlsTransportObserver : public DtlsTransportObserverInterface { + public: + void OnStateChange(DtlsTransportInformation info) override { + state_change_called_ = true; + states_.push_back(info.state()); + info_ = info; + } + + void OnError(RTCError error) override {} + + DtlsTransportState state() { + if (states_.size() > 0) { + return states_[states_.size() - 1]; + } else { + return DtlsTransportState::kNew; + } + } + + bool state_change_called_ = false; + DtlsTransportInformation info_; + std::vector<DtlsTransportState> states_; +}; + +class DtlsTransportTest : public ::testing::Test { + public: + DtlsTransport* transport() { return transport_.get(); } + DtlsTransportObserverInterface* observer() { return &observer_; } + + void CreateTransport(rtc::FakeSSLCertificate* certificate = nullptr) { + auto cricket_transport = std::make_unique<FakeDtlsTransport>( + "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP); + if (certificate) { + cricket_transport->SetRemoteSSLCertificate(certificate); + } + cricket_transport->SetSslCipherSuite(kNonsenseCipherSuite); + transport_ = + rtc::make_ref_counted<DtlsTransport>(std::move(cricket_transport)); + } + + void CompleteDtlsHandshake() { + auto fake_dtls1 = static_cast<FakeDtlsTransport*>(transport_->internal()); + auto fake_dtls2 = std::make_unique<FakeDtlsTransport>( + "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP); + auto cert1 = rtc::RTCCertificate::Create( + rtc::SSLIdentity::Create("session1", rtc::KT_DEFAULT)); + fake_dtls1->SetLocalCertificate(cert1); + auto cert2 = rtc::RTCCertificate::Create( + rtc::SSLIdentity::Create("session1", rtc::KT_DEFAULT)); + fake_dtls2->SetLocalCertificate(cert2); + fake_dtls1->SetDestination(fake_dtls2.get()); + } + + rtc::AutoThread main_thread_; + rtc::scoped_refptr<DtlsTransport> transport_; + TestDtlsTransportObserver observer_; +}; + +TEST_F(DtlsTransportTest, CreateClearDelete) { + auto cricket_transport = std::make_unique<FakeDtlsTransport>( + "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP); + auto webrtc_transport = + rtc::make_ref_counted<DtlsTransport>(std::move(cricket_transport)); + ASSERT_TRUE(webrtc_transport->internal()); + ASSERT_EQ(DtlsTransportState::kNew, webrtc_transport->Information().state()); + webrtc_transport->Clear(); + ASSERT_FALSE(webrtc_transport->internal()); + ASSERT_EQ(DtlsTransportState::kClosed, + webrtc_transport->Information().state()); +} + +TEST_F(DtlsTransportTest, EventsObservedWhenConnecting) { + CreateTransport(); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state_change_called_, kDefaultTimeout); + EXPECT_THAT( + observer_.states_, + ElementsAre( // FakeDtlsTransport doesn't signal the "connecting" state. + // TODO(hta): fix FakeDtlsTransport or file bug on it. + // DtlsTransportState::kConnecting, + DtlsTransportState::kConnected)); +} + +TEST_F(DtlsTransportTest, CloseWhenClearing) { + CreateTransport(); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + transport()->Clear(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed, + kDefaultTimeout); +} + +TEST_F(DtlsTransportTest, RoleAppearsOnConnect) { + rtc::FakeSSLCertificate fake_certificate("fake data"); + CreateTransport(&fake_certificate); + transport()->RegisterObserver(observer()); + EXPECT_FALSE(transport()->Information().role()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + EXPECT_TRUE(observer_.info_.role()); + EXPECT_TRUE(transport()->Information().role()); + EXPECT_EQ(transport()->Information().role(), DtlsTransportTlsRole::kClient); +} + +TEST_F(DtlsTransportTest, CertificateAppearsOnConnect) { + rtc::FakeSSLCertificate fake_certificate("fake data"); + CreateTransport(&fake_certificate); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + EXPECT_TRUE(observer_.info_.remote_ssl_certificates() != nullptr); +} + +TEST_F(DtlsTransportTest, CertificateDisappearsOnClose) { + rtc::FakeSSLCertificate fake_certificate("fake data"); + CreateTransport(&fake_certificate); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + EXPECT_TRUE(observer_.info_.remote_ssl_certificates() != nullptr); + transport()->Clear(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed, + kDefaultTimeout); + EXPECT_FALSE(observer_.info_.remote_ssl_certificates()); +} + +TEST_F(DtlsTransportTest, CipherSuiteVisibleWhenConnected) { + CreateTransport(); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + ASSERT_TRUE(observer_.info_.ssl_cipher_suite()); + EXPECT_EQ(kNonsenseCipherSuite, *observer_.info_.ssl_cipher_suite()); + transport()->Clear(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed, + kDefaultTimeout); + EXPECT_FALSE(observer_.info_.ssl_cipher_suite()); +} + +} // namespace webrtc |