summaryrefslogtreecommitdiffstats
path: root/third_party/libwebrtc/pc/dtls_transport_unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'third_party/libwebrtc/pc/dtls_transport_unittest.cc')
-rw-r--r--third_party/libwebrtc/pc/dtls_transport_unittest.cc181
1 files changed, 181 insertions, 0 deletions
diff --git a/third_party/libwebrtc/pc/dtls_transport_unittest.cc b/third_party/libwebrtc/pc/dtls_transport_unittest.cc
new file mode 100644
index 0000000000..c234176635
--- /dev/null
+++ b/third_party/libwebrtc/pc/dtls_transport_unittest.cc
@@ -0,0 +1,181 @@
+/*
+ * Copyright 2018 The WebRTC project authors. All Rights Reserved.
+ *
+ * Use of this source code is governed by a BSD-style license
+ * that can be found in the LICENSE file in the root of the source
+ * tree. An additional intellectual property rights grant can be found
+ * in the file PATENTS. All contributing project authors may
+ * be found in the AUTHORS file in the root of the source tree.
+ */
+
+#include "pc/dtls_transport.h"
+
+#include <utility>
+#include <vector>
+
+#include "absl/types/optional.h"
+#include "api/make_ref_counted.h"
+#include "api/rtc_error.h"
+#include "p2p/base/fake_dtls_transport.h"
+#include "p2p/base/p2p_constants.h"
+#include "rtc_base/fake_ssl_identity.h"
+#include "rtc_base/gunit.h"
+#include "rtc_base/rtc_certificate.h"
+#include "rtc_base/ssl_identity.h"
+#include "test/gmock.h"
+#include "test/gtest.h"
+
+constexpr int kDefaultTimeout = 1000; // milliseconds
+constexpr int kNonsenseCipherSuite = 1234;
+
+using cricket::FakeDtlsTransport;
+using ::testing::ElementsAre;
+
+namespace webrtc {
+
+class TestDtlsTransportObserver : public DtlsTransportObserverInterface {
+ public:
+ void OnStateChange(DtlsTransportInformation info) override {
+ state_change_called_ = true;
+ states_.push_back(info.state());
+ info_ = info;
+ }
+
+ void OnError(RTCError error) override {}
+
+ DtlsTransportState state() {
+ if (states_.size() > 0) {
+ return states_[states_.size() - 1];
+ } else {
+ return DtlsTransportState::kNew;
+ }
+ }
+
+ bool state_change_called_ = false;
+ DtlsTransportInformation info_;
+ std::vector<DtlsTransportState> states_;
+};
+
+class DtlsTransportTest : public ::testing::Test {
+ public:
+ DtlsTransport* transport() { return transport_.get(); }
+ DtlsTransportObserverInterface* observer() { return &observer_; }
+
+ void CreateTransport(rtc::FakeSSLCertificate* certificate = nullptr) {
+ auto cricket_transport = std::make_unique<FakeDtlsTransport>(
+ "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP);
+ if (certificate) {
+ cricket_transport->SetRemoteSSLCertificate(certificate);
+ }
+ cricket_transport->SetSslCipherSuite(kNonsenseCipherSuite);
+ transport_ =
+ rtc::make_ref_counted<DtlsTransport>(std::move(cricket_transport));
+ }
+
+ void CompleteDtlsHandshake() {
+ auto fake_dtls1 = static_cast<FakeDtlsTransport*>(transport_->internal());
+ auto fake_dtls2 = std::make_unique<FakeDtlsTransport>(
+ "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP);
+ auto cert1 = rtc::RTCCertificate::Create(
+ rtc::SSLIdentity::Create("session1", rtc::KT_DEFAULT));
+ fake_dtls1->SetLocalCertificate(cert1);
+ auto cert2 = rtc::RTCCertificate::Create(
+ rtc::SSLIdentity::Create("session1", rtc::KT_DEFAULT));
+ fake_dtls2->SetLocalCertificate(cert2);
+ fake_dtls1->SetDestination(fake_dtls2.get());
+ }
+
+ rtc::AutoThread main_thread_;
+ rtc::scoped_refptr<DtlsTransport> transport_;
+ TestDtlsTransportObserver observer_;
+};
+
+TEST_F(DtlsTransportTest, CreateClearDelete) {
+ auto cricket_transport = std::make_unique<FakeDtlsTransport>(
+ "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP);
+ auto webrtc_transport =
+ rtc::make_ref_counted<DtlsTransport>(std::move(cricket_transport));
+ ASSERT_TRUE(webrtc_transport->internal());
+ ASSERT_EQ(DtlsTransportState::kNew, webrtc_transport->Information().state());
+ webrtc_transport->Clear();
+ ASSERT_FALSE(webrtc_transport->internal());
+ ASSERT_EQ(DtlsTransportState::kClosed,
+ webrtc_transport->Information().state());
+}
+
+TEST_F(DtlsTransportTest, EventsObservedWhenConnecting) {
+ CreateTransport();
+ transport()->RegisterObserver(observer());
+ CompleteDtlsHandshake();
+ ASSERT_TRUE_WAIT(observer_.state_change_called_, kDefaultTimeout);
+ EXPECT_THAT(
+ observer_.states_,
+ ElementsAre( // FakeDtlsTransport doesn't signal the "connecting" state.
+ // TODO(hta): fix FakeDtlsTransport or file bug on it.
+ // DtlsTransportState::kConnecting,
+ DtlsTransportState::kConnected));
+}
+
+TEST_F(DtlsTransportTest, CloseWhenClearing) {
+ CreateTransport();
+ transport()->RegisterObserver(observer());
+ CompleteDtlsHandshake();
+ ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected,
+ kDefaultTimeout);
+ transport()->Clear();
+ ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed,
+ kDefaultTimeout);
+}
+
+TEST_F(DtlsTransportTest, RoleAppearsOnConnect) {
+ rtc::FakeSSLCertificate fake_certificate("fake data");
+ CreateTransport(&fake_certificate);
+ transport()->RegisterObserver(observer());
+ EXPECT_FALSE(transport()->Information().role());
+ CompleteDtlsHandshake();
+ ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected,
+ kDefaultTimeout);
+ EXPECT_TRUE(observer_.info_.role());
+ EXPECT_TRUE(transport()->Information().role());
+ EXPECT_EQ(transport()->Information().role(), DtlsTransportTlsRole::kClient);
+}
+
+TEST_F(DtlsTransportTest, CertificateAppearsOnConnect) {
+ rtc::FakeSSLCertificate fake_certificate("fake data");
+ CreateTransport(&fake_certificate);
+ transport()->RegisterObserver(observer());
+ CompleteDtlsHandshake();
+ ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected,
+ kDefaultTimeout);
+ EXPECT_TRUE(observer_.info_.remote_ssl_certificates() != nullptr);
+}
+
+TEST_F(DtlsTransportTest, CertificateDisappearsOnClose) {
+ rtc::FakeSSLCertificate fake_certificate("fake data");
+ CreateTransport(&fake_certificate);
+ transport()->RegisterObserver(observer());
+ CompleteDtlsHandshake();
+ ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected,
+ kDefaultTimeout);
+ EXPECT_TRUE(observer_.info_.remote_ssl_certificates() != nullptr);
+ transport()->Clear();
+ ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed,
+ kDefaultTimeout);
+ EXPECT_FALSE(observer_.info_.remote_ssl_certificates());
+}
+
+TEST_F(DtlsTransportTest, CipherSuiteVisibleWhenConnected) {
+ CreateTransport();
+ transport()->RegisterObserver(observer());
+ CompleteDtlsHandshake();
+ ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected,
+ kDefaultTimeout);
+ ASSERT_TRUE(observer_.info_.ssl_cipher_suite());
+ EXPECT_EQ(kNonsenseCipherSuite, *observer_.info_.ssl_cipher_suite());
+ transport()->Clear();
+ ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed,
+ kDefaultTimeout);
+ EXPECT_FALSE(observer_.info_.ssl_cipher_suite());
+}
+
+} // namespace webrtc