diff options
Diffstat (limited to 'third_party/libwebrtc/rtc_base/network_unittest.cc')
-rw-r--r-- | third_party/libwebrtc/rtc_base/network_unittest.cc | 1684 |
1 files changed, 1684 insertions, 0 deletions
diff --git a/third_party/libwebrtc/rtc_base/network_unittest.cc b/third_party/libwebrtc/rtc_base/network_unittest.cc new file mode 100644 index 0000000000..8b2a5cf66a --- /dev/null +++ b/third_party/libwebrtc/rtc_base/network_unittest.cc @@ -0,0 +1,1684 @@ +/* + * Copyright 2004 The WebRTC Project Authors. All rights reserved. + * + * Use of this source code is governed by a BSD-style license + * that can be found in the LICENSE file in the root of the source + * tree. An additional intellectual property rights grant can be found + * in the file PATENTS. All contributing project authors may + * be found in the AUTHORS file in the root of the source tree. + */ + +#include "rtc_base/network.h" + +#include <stdlib.h> + +#include <algorithm> +#include <memory> +#include <vector> + +#include "absl/algorithm/container.h" +#include "absl/strings/match.h" +#include "absl/strings/string_view.h" +#include "rtc_base/checks.h" +#include "rtc_base/net_helpers.h" +#include "rtc_base/network_monitor.h" +#include "rtc_base/network_monitor_factory.h" +#include "rtc_base/physical_socket_server.h" +#if defined(WEBRTC_POSIX) +#include <net/if.h> +#include <sys/types.h> + +#include "rtc_base/ifaddrs_converter.h" +#endif // defined(WEBRTC_POSIX) +#include "rtc_base/gunit.h" +#include "test/gmock.h" +#if defined(WEBRTC_WIN) +#include "rtc_base/logging.h" // For RTC_LOG_GLE +#endif +#include "test/field_trial.h" +#include "test/scoped_key_value_config.h" + +using ::testing::Contains; +using ::testing::Not; +using ::testing::UnorderedElementsAre; +using ::testing::UnorderedElementsAreArray; + +namespace rtc { + +namespace { + +IPAddress IPFromString(absl::string_view str) { + IPAddress ip; + RTC_CHECK(IPFromString(str, &ip)); + return ip; +} + +class FakeNetworkMonitor : public NetworkMonitorInterface { + public: + void Start() override { started_ = true; } + void Stop() override { started_ = false; } + bool started() { return started_; } + InterfaceInfo GetInterfaceInfo(absl::string_view if_name) override { + InterfaceInfo if_info = { + .adapter_type = ADAPTER_TYPE_UNKNOWN, + .available = absl::c_count(unavailable_adapters_, if_name) == 0, + }; + if (absl::StartsWith(if_name, "wifi")) { + if_info.adapter_type = ADAPTER_TYPE_WIFI; + } else if (absl::StartsWith(if_name, "cellular")) { + if_info.adapter_type = ADAPTER_TYPE_CELLULAR; + } + return if_info; + } + + // Used to test IsAdapterAvailable. + void set_unavailable_adapters(std::vector<std::string> unavailable_adapters) { + unavailable_adapters_ = unavailable_adapters; + } + + bool SupportsBindSocketToNetwork() const override { return true; } + + NetworkBindingResult BindSocketToNetwork(int socket_fd, + const IPAddress& address, + absl::string_view if_name) override { + if (absl::c_count(addresses_, address) > 0) { + return NetworkBindingResult::SUCCESS; + } + + for (auto const& iter : adapters_) { + if (if_name.find(iter) != absl::string_view::npos) { + return NetworkBindingResult::SUCCESS; + } + } + return NetworkBindingResult::ADDRESS_NOT_FOUND; + } + + void set_ip_addresses(std::vector<IPAddress> addresses) { + addresses_ = addresses; + } + + void set_adapters(std::vector<std::string> adapters) { adapters_ = adapters; } + + void InovkeNetworksChangedCallbackForTesting() { + InvokeNetworksChangedCallback(); + } + + private: + bool started_ = false; + std::vector<std::string> adapters_; + std::vector<std::string> unavailable_adapters_; + std::vector<IPAddress> addresses_; +}; + +class FakeNetworkMonitorFactory : public NetworkMonitorFactory { + public: + FakeNetworkMonitorFactory() {} + NetworkMonitorInterface* CreateNetworkMonitor( + const webrtc::FieldTrialsView& field_trials) override { + return new FakeNetworkMonitor(); + } +}; + +bool SameNameAndPrefix(const rtc::Network& a, const rtc::Network& b) { + if (a.name() != b.name()) { + RTC_LOG(LS_INFO) << "Different interface names."; + return false; + } + if (a.prefix_length() != b.prefix_length() || a.prefix() != b.prefix()) { + RTC_LOG(LS_INFO) << "Different IP prefixes."; + return false; + } + return true; +} + +std::vector<const Network*> CopyNetworkPointers( + const std::vector<std::unique_ptr<Network>>& owning_list) { + std::vector<const Network*> ptr_list; + ptr_list.reserve(owning_list.size()); + for (const auto& network : owning_list) { + ptr_list.push_back(network.get()); + } + return ptr_list; +} + +} // namespace + +class NetworkTest : public ::testing::Test, public sigslot::has_slots<> { + public: + NetworkTest() : callback_called_(false) {} + + void OnNetworksChanged() { callback_called_ = true; } + + NetworkManager::Stats MergeNetworkList( + BasicNetworkManager& network_manager, + std::vector<std::unique_ptr<Network>> list, + bool* changed) { + NetworkManager::Stats stats; + network_manager.MergeNetworkList(std::move(list), changed, &stats); + return stats; + } + + bool IsIgnoredNetwork(BasicNetworkManager& network_manager, + const Network& network) { + RTC_DCHECK_RUN_ON(network_manager.thread_); + return network_manager.IsIgnoredNetwork(network); + } + + IPAddress QueryDefaultLocalAddress(BasicNetworkManager& network_manager, + int family) { + RTC_DCHECK_RUN_ON(network_manager.thread_); + return network_manager.QueryDefaultLocalAddress(family); + } + + std::vector<std::unique_ptr<Network>> GetNetworks( + const BasicNetworkManager& network_manager, + bool include_ignored) { + RTC_DCHECK_RUN_ON(network_manager.thread_); + std::vector<std::unique_ptr<Network>> list; + network_manager.CreateNetworks(include_ignored, &list); + return list; + } + + FakeNetworkMonitor* GetNetworkMonitor(BasicNetworkManager& network_manager) { + RTC_DCHECK_RUN_ON(network_manager.thread_); + return static_cast<FakeNetworkMonitor*>( + network_manager.network_monitor_.get()); + } + void ClearNetworks(BasicNetworkManager& network_manager) { + network_manager.networks_.clear(); + network_manager.networks_map_.clear(); + } + + AdapterType GetAdapterType(BasicNetworkManager& network_manager) { + std::vector<const Network*> list = network_manager.GetNetworks(); + RTC_CHECK_EQ(1, list.size()); + return list[0]->type(); + } + +#if defined(WEBRTC_POSIX) + // Separated from CreateNetworks for tests. + static void CallConvertIfAddrs( + const BasicNetworkManager& network_manager, + struct ifaddrs* interfaces, + bool include_ignored, + std::vector<std::unique_ptr<Network>>* networks) { + RTC_DCHECK_RUN_ON(network_manager.thread_); + // Use the base IfAddrsConverter for test cases. + std::unique_ptr<IfAddrsConverter> ifaddrs_converter(new IfAddrsConverter()); + network_manager.ConvertIfAddrs(interfaces, ifaddrs_converter.get(), + include_ignored, networks); + } + + struct sockaddr_in6* CreateIpv6Addr(absl::string_view ip_string, + uint32_t scope_id) { + struct sockaddr_in6* ipv6_addr = + static_cast<struct sockaddr_in6*>(malloc(sizeof(struct sockaddr_in6))); + memset(ipv6_addr, 0, sizeof(struct sockaddr_in6)); + ipv6_addr->sin6_family = AF_INET6; + ipv6_addr->sin6_scope_id = scope_id; + IPAddress ip; + IPFromString(ip_string, &ip); + ipv6_addr->sin6_addr = ip.ipv6_address(); + return ipv6_addr; + } + + // Pointers created here need to be released via ReleaseIfAddrs. + struct ifaddrs* AddIpv6Address(struct ifaddrs* list, + char* if_name, + absl::string_view ipv6_address, + absl::string_view ipv6_netmask, + uint32_t scope_id) { + struct ifaddrs* if_addr = new struct ifaddrs; + memset(if_addr, 0, sizeof(struct ifaddrs)); + if_addr->ifa_name = if_name; + if_addr->ifa_addr = reinterpret_cast<struct sockaddr*>( + CreateIpv6Addr(ipv6_address, scope_id)); + if_addr->ifa_netmask = + reinterpret_cast<struct sockaddr*>(CreateIpv6Addr(ipv6_netmask, 0)); + if_addr->ifa_next = list; + if_addr->ifa_flags = IFF_RUNNING; + return if_addr; + } + + struct ifaddrs* InstallIpv6Network(char* if_name, + absl::string_view ipv6_address, + absl::string_view ipv6_mask, + BasicNetworkManager& network_manager) { + ifaddrs* addr_list = nullptr; + addr_list = AddIpv6Address(addr_list, if_name, ipv6_address, ipv6_mask, 0); + std::vector<std::unique_ptr<Network>> result; + bool changed; + NetworkManager::Stats stats; + CallConvertIfAddrs(network_manager, addr_list, true, &result); + network_manager.MergeNetworkList(std::move(result), &changed, &stats); + return addr_list; + } + + struct sockaddr_in* CreateIpv4Addr(absl::string_view ip_string) { + struct sockaddr_in* ipv4_addr = + static_cast<struct sockaddr_in*>(malloc(sizeof(struct sockaddr_in))); + memset(ipv4_addr, 0, sizeof(struct sockaddr_in)); + ipv4_addr->sin_family = AF_INET; + IPAddress ip; + IPFromString(ip_string, &ip); + ipv4_addr->sin_addr = ip.ipv4_address(); + return ipv4_addr; + } + + // Pointers created here need to be released via ReleaseIfAddrs. + struct ifaddrs* AddIpv4Address(struct ifaddrs* list, + char* if_name, + absl::string_view ipv4_address, + absl::string_view ipv4_netmask) { + struct ifaddrs* if_addr = new struct ifaddrs; + memset(if_addr, 0, sizeof(struct ifaddrs)); + if_addr->ifa_name = if_name; + if_addr->ifa_addr = + reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_address)); + if_addr->ifa_netmask = + reinterpret_cast<struct sockaddr*>(CreateIpv4Addr(ipv4_netmask)); + if_addr->ifa_next = list; + if_addr->ifa_flags = IFF_RUNNING; + return if_addr; + } + + struct ifaddrs* InstallIpv4Network(char* if_name, + absl::string_view ipv4_address, + absl::string_view ipv4_mask, + BasicNetworkManager& network_manager) { + ifaddrs* addr_list = nullptr; + addr_list = AddIpv4Address(addr_list, if_name, ipv4_address, ipv4_mask); + std::vector<std::unique_ptr<Network>> result; + bool changed; + NetworkManager::Stats stats; + CallConvertIfAddrs(network_manager, addr_list, true, &result); + network_manager.MergeNetworkList(std::move(result), &changed, &stats); + return addr_list; + } + + void ReleaseIfAddrs(struct ifaddrs* list) { + struct ifaddrs* if_addr = list; + while (if_addr != nullptr) { + struct ifaddrs* next_addr = if_addr->ifa_next; + free(if_addr->ifa_addr); + free(if_addr->ifa_netmask); + delete if_addr; + if_addr = next_addr; + } + } +#endif // defined(WEBRTC_POSIX) + + protected: + webrtc::test::ScopedKeyValueConfig field_trials_; + rtc::AutoThread main_thread_; + bool callback_called_; +}; + +class TestBasicNetworkManager : public BasicNetworkManager { + public: + TestBasicNetworkManager(NetworkMonitorFactory* network_monitor_factory, + SocketFactory* socket_factory, + const webrtc::FieldTrialsView& field_trials) + : BasicNetworkManager(network_monitor_factory, + socket_factory, + &field_trials) {} + using BasicNetworkManager::QueryDefaultLocalAddress; + using BasicNetworkManager::set_default_local_addresses; +}; + +// Test that the Network ctor works properly. +TEST_F(NetworkTest, TestNetworkConstruct) { + Network ipv4_network1("test_eth0", "Test Network Adapter 1", + IPAddress(0x12345600U), 24); + EXPECT_EQ("test_eth0", ipv4_network1.name()); + EXPECT_EQ("Test Network Adapter 1", ipv4_network1.description()); + EXPECT_EQ(IPAddress(0x12345600U), ipv4_network1.prefix()); + EXPECT_EQ(24, ipv4_network1.prefix_length()); + EXPECT_EQ(AF_INET, ipv4_network1.family()); + EXPECT_FALSE(ipv4_network1.ignored()); +} + +TEST_F(NetworkTest, TestIsIgnoredNetworkIgnoresIPsStartingWith0) { + Network ipv4_network1("test_eth0", "Test Network Adapter 1", + IPAddress(0x12345600U), 24, ADAPTER_TYPE_ETHERNET, + &field_trials_); + Network ipv4_network2("test_eth1", "Test Network Adapter 2", + IPAddress(0x010000U), 24, ADAPTER_TYPE_ETHERNET, + &field_trials_); + PhysicalSocketServer socket_server; + BasicNetworkManager network_manager(&socket_server); + network_manager.StartUpdating(); + EXPECT_FALSE(IsIgnoredNetwork(network_manager, ipv4_network1)); + EXPECT_TRUE(IsIgnoredNetwork(network_manager, ipv4_network2)); +} + +// TODO(phoglund): Remove when ignore list goes away. +TEST_F(NetworkTest, TestIgnoreList) { + Network ignore_me("ignore_me", "Ignore me please!", IPAddress(0x12345600U), + 24); + Network include_me("include_me", "Include me please!", IPAddress(0x12345600U), + 24); + PhysicalSocketServer socket_server; + BasicNetworkManager default_network_manager(&socket_server); + default_network_manager.StartUpdating(); + EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, ignore_me)); + EXPECT_FALSE(IsIgnoredNetwork(default_network_manager, include_me)); + + BasicNetworkManager ignoring_network_manager(&socket_server); + std::vector<std::string> ignore_list; + ignore_list.push_back("ignore_me"); + ignoring_network_manager.set_network_ignore_list(ignore_list); + ignoring_network_manager.StartUpdating(); + EXPECT_TRUE(IsIgnoredNetwork(ignoring_network_manager, ignore_me)); + EXPECT_FALSE(IsIgnoredNetwork(ignoring_network_manager, include_me)); +} + +// Test is failing on Windows opt: b/11288214 +TEST_F(NetworkTest, DISABLED_TestCreateNetworks) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + std::vector<std::unique_ptr<Network>> result = GetNetworks(manager, true); + // We should be able to bind to any addresses we find. + for (auto it = result.begin(); it != result.end(); ++it) { + sockaddr_storage storage; + memset(&storage, 0, sizeof(storage)); + IPAddress ip = (*it)->GetBestIP(); + SocketAddress bindaddress(ip, 0); + bindaddress.SetScopeID((*it)->scope_id()); + // TODO(thaloun): Use rtc::Socket once it supports IPv6. + int fd = static_cast<int>(socket(ip.family(), SOCK_STREAM, IPPROTO_TCP)); + if (fd > 0) { + size_t ipsize = bindaddress.ToSockAddrStorage(&storage); + EXPECT_GE(ipsize, 0U); + int success = ::bind(fd, reinterpret_cast<sockaddr*>(&storage), + static_cast<int>(ipsize)); +#if defined(WEBRTC_WIN) + if (success) + RTC_LOG_GLE(LS_ERROR) << "Socket bind failed."; +#endif + EXPECT_EQ(0, success); +#if defined(WEBRTC_WIN) + closesocket(fd); +#else + close(fd); +#endif + } + } +} + +// Test StartUpdating() and StopUpdating(). network_permission_state starts with +// ALLOWED. +TEST_F(NetworkTest, TestUpdateNetworks) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(nullptr, &socket_server, &field_trials_); + manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this), + &NetworkTest::OnNetworksChanged); + EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED, + manager.enumeration_permission()); + manager.StartUpdating(); + Thread::Current()->ProcessMessages(0); + EXPECT_TRUE(callback_called_); + callback_called_ = false; + // Callback should be triggered immediately when StartUpdating + // is called, after network update signal is already sent. + manager.StartUpdating(); + EXPECT_TRUE(manager.started()); + Thread::Current()->ProcessMessages(0); + EXPECT_TRUE(callback_called_); + manager.StopUpdating(); + EXPECT_TRUE(manager.started()); + manager.StopUpdating(); + EXPECT_EQ(NetworkManager::ENUMERATION_ALLOWED, + manager.enumeration_permission()); + EXPECT_FALSE(manager.started()); + manager.StopUpdating(); + EXPECT_FALSE(manager.started()); + callback_called_ = false; + // Callback should be triggered immediately after StartUpdating is called + // when start_count_ is reset to 0. + manager.StartUpdating(); + Thread::Current()->ProcessMessages(0); + EXPECT_TRUE(callback_called_); +} + +// Verify that MergeNetworkList() merges network lists properly. +TEST_F(NetworkTest, TestBasicMergeNetworkList) { + Network ipv4_network1("test_eth0", "Test Network Adapter 1", + IPAddress(0x12345600U), 24); + Network ipv4_network2("test_eth1", "Test Network Adapter 2", + IPAddress(0x00010000U), 16); + ipv4_network1.AddIP(IPAddress(0x12345678)); + ipv4_network2.AddIP(IPAddress(0x00010004)); + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + + // Add ipv4_network1 to the list of networks. + std::vector<std::unique_ptr<Network>> list; + list.push_back(std::make_unique<Network>(ipv4_network1)); + bool changed; + NetworkManager::Stats stats = + MergeNetworkList(manager, std::move(list), &changed); + EXPECT_TRUE(changed); + EXPECT_EQ(stats.ipv6_network_count, 0); + EXPECT_EQ(stats.ipv4_network_count, 1); + list.clear(); // It is fine to call .clear() on a moved-from vector. + + std::vector<const rtc::Network*> current = manager.GetNetworks(); + EXPECT_EQ(1U, current.size()); + EXPECT_TRUE(SameNameAndPrefix(ipv4_network1, *current[0])); + const Network* net1 = current[0]; + uint16_t net_id1 = net1->id(); + EXPECT_EQ(1, net_id1); + + // Replace ipv4_network1 with ipv4_network2. + list.push_back(std::make_unique<Network>(ipv4_network2)); + stats = MergeNetworkList(manager, std::move(list), &changed); + EXPECT_TRUE(changed); + EXPECT_EQ(stats.ipv6_network_count, 0); + EXPECT_EQ(stats.ipv4_network_count, 1); + list.clear(); + + current = manager.GetNetworks(); + EXPECT_EQ(1U, current.size()); + EXPECT_TRUE(SameNameAndPrefix(ipv4_network2, *current[0])); + const Network* net2 = current[0]; + uint16_t net_id2 = net2->id(); + // Network id will increase. + EXPECT_LT(net_id1, net_id2); + + // Add Network2 back. + list.push_back(std::make_unique<Network>(ipv4_network1)); + list.push_back(std::make_unique<Network>(ipv4_network2)); + stats = MergeNetworkList(manager, std::move(list), &changed); + EXPECT_TRUE(changed); + EXPECT_EQ(stats.ipv6_network_count, 0); + EXPECT_EQ(stats.ipv4_network_count, 2); + list.clear(); + + // Verify that we get previous instances of Network objects. + current = manager.GetNetworks(); + EXPECT_EQ(2U, current.size()); + EXPECT_TRUE((net1 == current[0] && net2 == current[1]) || + (net1 == current[1] && net2 == current[0])); + EXPECT_TRUE((net_id1 == current[0]->id() && net_id2 == current[1]->id()) || + (net_id1 == current[1]->id() && net_id2 == current[0]->id())); + + // Call MergeNetworkList() again and verify that we don't get update + // notification. + list.push_back(std::make_unique<Network>(ipv4_network2)); + list.push_back(std::make_unique<Network>(ipv4_network1)); + stats = MergeNetworkList(manager, std::move(list), &changed); + EXPECT_FALSE(changed); + EXPECT_EQ(stats.ipv6_network_count, 0); + EXPECT_EQ(stats.ipv4_network_count, 2); + list.clear(); + + // Verify that we get previous instances of Network objects. + current = manager.GetNetworks(); + EXPECT_EQ(2U, current.size()); + EXPECT_TRUE((net1 == current[0] && net2 == current[1]) || + (net1 == current[1] && net2 == current[0])); + EXPECT_TRUE((net_id1 == current[0]->id() && net_id2 == current[1]->id()) || + (net_id1 == current[1]->id() && net_id2 == current[0]->id())); +} + +// Sets up some test IPv6 networks and appends them to list. +// Four networks are added - public and link local, for two interfaces. +void SetupNetworks(std::vector<std::unique_ptr<Network>>* list) { + IPAddress ip; + IPAddress prefix; + EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:ef12", &ip)); + EXPECT_TRUE(IPFromString("abcd::", &prefix)); + // First, fake link-locals. + Network ipv6_eth0_linklocalnetwork("test_eth0", "Test NetworkAdapter 1", + prefix, 64); + ipv6_eth0_linklocalnetwork.AddIP(ip); + EXPECT_TRUE(IPFromString("abcd::5678:abcd:ef12:3456", &ip)); + Network ipv6_eth1_linklocalnetwork("test_eth1", "Test NetworkAdapter 2", + prefix, 64); + ipv6_eth1_linklocalnetwork.AddIP(ip); + // Public networks: + EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip)); + prefix = TruncateIP(ip, 64); + Network ipv6_eth0_publicnetwork1_ip1("test_eth0", "Test NetworkAdapter 1", + prefix, 64); + ipv6_eth0_publicnetwork1_ip1.AddIP(ip); + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip)); + prefix = TruncateIP(ip, 64); + Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 1", + prefix, 64); + ipv6_eth1_publicnetwork1_ip1.AddIP(ip); + list->push_back(std::make_unique<Network>(ipv6_eth0_linklocalnetwork)); + list->push_back(std::make_unique<Network>(ipv6_eth1_linklocalnetwork)); + list->push_back(std::make_unique<Network>(ipv6_eth0_publicnetwork1_ip1)); + list->push_back(std::make_unique<Network>(ipv6_eth1_publicnetwork1_ip1)); +} + +// Test that the basic network merging case works. +TEST_F(NetworkTest, TestIPv6MergeNetworkList) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this), + &NetworkTest::OnNetworksChanged); + std::vector<std::unique_ptr<Network>> networks; + SetupNetworks(&networks); + std::vector<const Network*> original_list = CopyNetworkPointers(networks); + bool changed = false; + NetworkManager::Stats stats = + MergeNetworkList(manager, std::move(networks), &changed); + EXPECT_TRUE(changed); + EXPECT_EQ(stats.ipv6_network_count, 4); + EXPECT_EQ(stats.ipv4_network_count, 0); + std::vector<const Network*> list = manager.GetNetworks(); + // Verify that the original members are in the merged list. + EXPECT_THAT(list, UnorderedElementsAreArray(original_list)); +} + +// Tests that when two network lists that describe the same set of networks are +// merged, that the changed callback is not called, and that the original +// objects remain in the result list. +TEST_F(NetworkTest, TestNoChangeMerge) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this), + &NetworkTest::OnNetworksChanged); + std::vector<std::unique_ptr<Network>> networks; + SetupNetworks(&networks); + std::vector<const Network*> original_list = CopyNetworkPointers(networks); + bool changed = false; + MergeNetworkList(manager, std::move(networks), &changed); + EXPECT_TRUE(changed); + // Second list that describes the same networks but with new objects. + std::vector<std::unique_ptr<Network>> second_networks; + SetupNetworks(&second_networks); + std::vector<const Network*> second_list = + CopyNetworkPointers(second_networks); + changed = false; + MergeNetworkList(manager, std::move(second_networks), &changed); + EXPECT_FALSE(changed); + std::vector<const Network*> resulting_list = manager.GetNetworks(); + // Verify that the original members are in the merged list. + EXPECT_THAT(resulting_list, UnorderedElementsAreArray(original_list)); + // Doublecheck that the new networks aren't in the list. + for (const Network* network : second_list) { + EXPECT_THAT(resulting_list, Not(Contains(network))); + } +} + +// Test that we can merge a network that is the same as another network but with +// a different IP. The original network should remain in the list, but have its +// IP changed. +TEST_F(NetworkTest, MergeWithChangedIP) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this), + &NetworkTest::OnNetworksChanged); + std::vector<std::unique_ptr<Network>> original_list; + SetupNetworks(&original_list); + // Make a network that we're going to change. + IPAddress ip; + EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip)); + IPAddress prefix = TruncateIP(ip, 64); + std::unique_ptr<Network> network_to_change = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", prefix, 64); + std::unique_ptr<Network> changed_network = + std::make_unique<Network>(*network_to_change); + network_to_change->AddIP(ip); + IPAddress changed_ip; + EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip)); + changed_network->AddIP(changed_ip); + const Network* const network_to_change_ptr = network_to_change.get(); + original_list.push_back(std::move(network_to_change)); + const size_t original_size = original_list.size(); + bool changed = false; + MergeNetworkList(manager, std::move(original_list), &changed); + std::vector<std::unique_ptr<Network>> second_list; + SetupNetworks(&second_list); + second_list.push_back(std::move(changed_network)); + changed = false; + MergeNetworkList(manager, std::move(second_list), &changed); + EXPECT_TRUE(changed); + std::vector<const Network*> list = manager.GetNetworks(); + EXPECT_EQ(original_size, list.size()); + // Make sure the original network is still in the merged list. + EXPECT_THAT(list, Contains(network_to_change_ptr)); + EXPECT_EQ(changed_ip, network_to_change_ptr->GetIPs().at(0)); +} + +TEST_F(NetworkTest, TestMultipleIPMergeNetworkList) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this), + &NetworkTest::OnNetworksChanged); + std::vector<std::unique_ptr<Network>> original_list; + SetupNetworks(&original_list); + const Network* const network_ptr = original_list[2].get(); + bool changed = false; + MergeNetworkList(manager, std::move(original_list), &changed); + EXPECT_TRUE(changed); + IPAddress ip; + IPAddress check_ip; + IPAddress prefix; + // Add a second IP to the public network on eth0 (2401:fa00:4:1000/64). + EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip)); + prefix = TruncateIP(ip, 64); + Network ipv6_eth0_publicnetwork1_ip2("test_eth0", "Test NetworkAdapter 1", + prefix, 64); + // This is the IP that already existed in the public network on eth0. + EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip)); + ipv6_eth0_publicnetwork1_ip2.AddIP(ip); + + std::vector<std::unique_ptr<Network>> second_list; + SetupNetworks(&second_list); + second_list.push_back( + std::make_unique<Network>(ipv6_eth0_publicnetwork1_ip2)); + changed = false; + const auto network_copy = std::make_unique<Network>(*second_list[2]); + MergeNetworkList(manager, std::move(second_list), &changed); + EXPECT_TRUE(changed); + // There should still be four networks. + std::vector<const Network*> list = manager.GetNetworks(); + EXPECT_EQ(4U, list.size()); + // Check the gathered IPs. + int matchcount = 0; + for (const Network* network : list) { + if (SameNameAndPrefix(*network, *network_copy)) { + ++matchcount; + EXPECT_EQ(1, matchcount); + // This should be the same network object as before. + EXPECT_EQ(network, network_ptr); + // But with two addresses now. + EXPECT_THAT(network->GetIPs(), + UnorderedElementsAre(InterfaceAddress(check_ip), + InterfaceAddress(ip))); + } else { + // Check the IP didn't get added anywhere it wasn't supposed to. + EXPECT_THAT(network->GetIPs(), Not(Contains(InterfaceAddress(ip)))); + } + } +} + +// Test that merge correctly distinguishes multiple networks on an interface. +TEST_F(NetworkTest, TestMultiplePublicNetworksOnOneInterfaceMerge) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this), + &NetworkTest::OnNetworksChanged); + std::vector<std::unique_ptr<Network>> original_list; + SetupNetworks(&original_list); + bool changed = false; + MergeNetworkList(manager, std::move(original_list), &changed); + EXPECT_TRUE(changed); + IPAddress ip; + IPAddress prefix; + // A second network for eth0. + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip)); + prefix = TruncateIP(ip, 64); + Network ipv6_eth0_publicnetwork2_ip1("test_eth0", "Test NetworkAdapter 1", + prefix, 64); + ipv6_eth0_publicnetwork2_ip1.AddIP(ip); + std::vector<std::unique_ptr<Network>> second_list; + SetupNetworks(&second_list); + second_list.push_back( + std::make_unique<Network>(ipv6_eth0_publicnetwork2_ip1)); + changed = false; + MergeNetworkList(manager, std::move(second_list), &changed); + EXPECT_TRUE(changed); + // There should be five networks now. + std::vector<const Network*> list = manager.GetNetworks(); + EXPECT_EQ(5U, list.size()); + // Check the resulting addresses. + for (const Network* network : list) { + if (network->prefix() == ipv6_eth0_publicnetwork2_ip1.prefix() && + network->name() == ipv6_eth0_publicnetwork2_ip1.name()) { + // Check the new network has 1 IP and that it's the correct one. + EXPECT_EQ(1U, network->GetIPs().size()); + EXPECT_EQ(ip, network->GetIPs().at(0)); + } else { + // Check the IP didn't get added anywhere it wasn't supposed to. + EXPECT_THAT(network->GetIPs(), Not(Contains(InterfaceAddress(ip)))); + } + } +} + +// Test that DumpNetworks does not crash. +TEST_F(NetworkTest, TestCreateAndDumpNetworks) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.StartUpdating(); + std::vector<std::unique_ptr<Network>> list = GetNetworks(manager, true); + bool changed; + MergeNetworkList(manager, std::move(list), &changed); + manager.DumpNetworks(); +} + +TEST_F(NetworkTest, TestIPv6Toggle) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.StartUpdating(); + bool ipv6_found = false; + for (const auto& network : GetNetworks(manager, true)) { + if (network->prefix().family() == AF_INET6) { + ipv6_found = true; + break; + } + } + EXPECT_TRUE(ipv6_found); +} + +// Test that when network interfaces are sorted and given preference values, +// IPv6 comes first. +TEST_F(NetworkTest, IPv6NetworksPreferredOverIPv4) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + Network ipv4_network1("test_eth0", "Test Network Adapter 1", + IPAddress(0x12345600U), 24); + ipv4_network1.AddIP(IPAddress(0x12345600U)); + + IPAddress ip; + IPAddress prefix; + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip)); + prefix = TruncateIP(ip, 64); + Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 2", + prefix, 64); + ipv6_eth1_publicnetwork1_ip1.AddIP(ip); + + std::vector<std::unique_ptr<Network>> list; + list.push_back(std::make_unique<Network>(ipv4_network1)); + list.push_back(std::make_unique<Network>(ipv6_eth1_publicnetwork1_ip1)); + const Network* net1 = list[0].get(); + const Network* net2 = list[1].get(); + + bool changed = false; + MergeNetworkList(manager, std::move(list), &changed); + ASSERT_TRUE(changed); + // After sorting IPv6 network should be higher order than IPv4 networks. + EXPECT_TRUE(net1->preference() < net2->preference()); +} + +// When two interfaces are equivalent in everything but name, they're expected +// to be preference-ordered by name. For example, "eth0" before "eth1". +TEST_F(NetworkTest, NetworksSortedByInterfaceName) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server, &field_trials_); + auto eth0 = std::make_unique<Network>("test_eth0", "Test Network Adapter 1", + IPAddress(0x65432100U), 24); + eth0->AddIP(IPAddress(0x65432100U)); + auto eth1 = std::make_unique<Network>("test_eth1", "Test Network Adapter 2", + IPAddress(0x12345600U), 24); + eth1->AddIP(IPAddress(0x12345600U)); + std::vector<std::unique_ptr<Network>> list; + const Network* eth0_ptr = eth0.get(); + const Network* eth1_ptr = eth1.get(); + // Add them to the list in the opposite of the expected sorted order, to + // ensure sorting actually occurs. + list.push_back(std::move(eth1)); + list.push_back(std::move(eth0)); + + bool changed = false; + MergeNetworkList(manager, std::move(list), &changed); + ASSERT_TRUE(changed); + // "test_eth0" should be preferred over "test_eth1". + EXPECT_TRUE(eth0_ptr->preference() > eth1_ptr->preference()); +} + +TEST_F(NetworkTest, TestNetworkAdapterTypes) { + Network wifi("wlan0", "Wireless Adapter", IPAddress(0x12345600U), 24, + ADAPTER_TYPE_WIFI, &field_trials_); + EXPECT_EQ(ADAPTER_TYPE_WIFI, wifi.type()); + Network ethernet("eth0", "Ethernet", IPAddress(0x12345600U), 24, + ADAPTER_TYPE_ETHERNET, &field_trials_); + EXPECT_EQ(ADAPTER_TYPE_ETHERNET, ethernet.type()); + Network cellular("test_cell", "Cellular Adapter", IPAddress(0x12345600U), 24, + ADAPTER_TYPE_CELLULAR, &field_trials_); + EXPECT_EQ(ADAPTER_TYPE_CELLULAR, cellular.type()); + Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24, + ADAPTER_TYPE_VPN, &field_trials_); + EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type()); + Network unknown("test", "Test Adapter", IPAddress(0x12345600U), 24, + ADAPTER_TYPE_UNKNOWN, &field_trials_); + EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, unknown.type()); +} + +#if defined(WEBRTC_POSIX) +// Verify that we correctly handle interfaces with no address. +TEST_F(NetworkTest, TestConvertIfAddrsNoAddress) { + ifaddrs list; + memset(&list, 0, sizeof(list)); + list.ifa_name = const_cast<char*>("test_iface"); + + std::vector<std::unique_ptr<Network>> result; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.StartUpdating(); + CallConvertIfAddrs(manager, &list, true, &result); + EXPECT_TRUE(result.empty()); +} + +// Verify that if there are two addresses on one interface, only one network +// is generated. +TEST_F(NetworkTest, TestConvertIfAddrsMultiAddressesOnOneInterface) { + char if_name[20] = "rmnet0"; + ifaddrs* list = nullptr; + list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:1", + "FFFF:FFFF:FFFF:FFFF::", 0); + list = AddIpv6Address(list, if_name, "1000:2000:3000:4000:0:0:0:2", + "FFFF:FFFF:FFFF:FFFF::", 0); + std::vector<std::unique_ptr<Network>> result; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.StartUpdating(); + CallConvertIfAddrs(manager, list, true, &result); + EXPECT_EQ(1U, result.size()); + bool changed; + // This ensures we release the objects created in CallConvertIfAddrs. + MergeNetworkList(manager, std::move(result), &changed); + ReleaseIfAddrs(list); +} + +TEST_F(NetworkTest, TestConvertIfAddrsNotRunning) { + ifaddrs list; + memset(&list, 0, sizeof(list)); + list.ifa_name = const_cast<char*>("test_iface"); + sockaddr ifa_addr; + sockaddr ifa_netmask; + list.ifa_addr = &ifa_addr; + list.ifa_netmask = &ifa_netmask; + + std::vector<std::unique_ptr<Network>> result; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.StartUpdating(); + CallConvertIfAddrs(manager, &list, true, &result); + EXPECT_TRUE(result.empty()); +} + +// Tests that the network type can be determined from the network monitor when +// it would otherwise be unknown. +TEST_F(NetworkTest, TestGetAdapterTypeFromNetworkMonitor) { + char if_name[20] = "wifi0"; + std::string ipv6_address = "1000:2000:3000:4000:0:0:0:1"; + std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::"; + PhysicalSocketServer socket_server; + BasicNetworkManager manager_without_monitor(nullptr, &socket_server, + &field_trials_); + manager_without_monitor.StartUpdating(); + // A network created without a network monitor will get UNKNOWN type. + ifaddrs* addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask, + manager_without_monitor); + EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, GetAdapterType(manager_without_monitor)); + ReleaseIfAddrs(addr_list); + + // With the fake network monitor the type should be correctly determined. + FakeNetworkMonitorFactory factory; + BasicNetworkManager manager_with_monitor(&factory, &socket_server, + &field_trials_); + manager_with_monitor.StartUpdating(); + // Add the same ipv6 address as before but it has the right network type + // detected by the network monitor now. + addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask, + manager_with_monitor); + EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor)); + ReleaseIfAddrs(addr_list); +} + +// Test that the network type can be determined based on name matching in +// a few cases. Note that UNKNOWN type for non-matching strings has been tested +// in the above test. +TEST_F(NetworkTest, TestGetAdapterTypeFromNameMatching) { + std::string ipv4_address1 = "192.0.0.121"; + std::string ipv4_mask = "255.255.255.0"; + std::string ipv6_address1 = "1000:2000:3000:4000:0:0:0:1"; + std::string ipv6_address2 = "1000:2000:3000:8000:0:0:0:1"; + std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF::"; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.StartUpdating(); + + // IPSec interface; name is in form "ipsec<index>". + char if_name[20] = "ipsec11"; + ifaddrs* addr_list = + InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_VPN, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); + + strcpy(if_name, "lo0"); + addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); + + strcpy(if_name, "eth0"); + addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_ETHERNET, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); + + strcpy(if_name, "wlan0"); + addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); + +#if defined(WEBRTC_IOS) + strcpy(if_name, "pdp_ip0"); + addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); + + strcpy(if_name, "en0"); + addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); + +#elif defined(WEBRTC_ANDROID) + strcpy(if_name, "rmnet0"); + addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); + + strcpy(if_name, "v4-rmnet_data0"); + addr_list = InstallIpv6Network(if_name, ipv6_address2, ipv6_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); + + strcpy(if_name, "clat4"); + addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager); + EXPECT_EQ(ADAPTER_TYPE_CELLULAR, GetAdapterType(manager)); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); +#endif +} + +// Test that an adapter won't be included in the network list if there's a +// network monitor that says it's unavailable. +TEST_F(NetworkTest, TestNetworkMonitorIsAdapterAvailable) { + char if_name1[20] = "pdp_ip0"; + char if_name2[20] = "pdp_ip1"; + ifaddrs* list = nullptr; + list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1", + "FFFF:FFFF:FFFF:FFFF::", 0); + list = AddIpv6Address(list, if_name2, "1000:2000:3000:4000:0:0:0:2", + "FFFF:FFFF:FFFF:FFFF::", 0); + std::vector<std::unique_ptr<Network>> result; + + // Sanity check that both interfaces are included by default. + FakeNetworkMonitorFactory factory; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&factory, &socket_server, &field_trials_); + manager.StartUpdating(); + CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result); + EXPECT_EQ(2u, result.size()); + bool changed; + // This ensures we release the objects created in CallConvertIfAddrs. + MergeNetworkList(manager, std::move(result), &changed); + result.clear(); + + // Now simulate one interface being unavailable. + FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager); + network_monitor->set_unavailable_adapters({if_name1}); + CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result); + EXPECT_EQ(1u, result.size()); + EXPECT_EQ(if_name2, result[0]->name()); + + MergeNetworkList(manager, std::move(result), &changed); + ReleaseIfAddrs(list); +} + +#endif // defined(WEBRTC_POSIX) + +// Test MergeNetworkList successfully combines all IPs for the same +// prefix/length into a single Network. +TEST_F(NetworkTest, TestMergeNetworkList) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + std::vector<std::unique_ptr<Network>> list; + + // Create 2 IPAddress classes with only last digit different. + IPAddress ip1, ip2; + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1)); + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2)); + + // Create 2 networks with the same prefix and length. + auto net1 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64); + auto net2 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64); + + // Add different IP into each. + net1->AddIP(ip1); + net2->AddIP(ip2); + + list.push_back(std::move(net1)); + list.push_back(std::move(net2)); + bool changed; + MergeNetworkList(manager, std::move(list), &changed); + EXPECT_TRUE(changed); + + std::vector<const Network*> list2 = manager.GetNetworks(); + + // Make sure the resulted networklist has only 1 element and 2 + // IPAddresses. + EXPECT_EQ(list2.size(), 1uL); + EXPECT_EQ(list2[0]->GetIPs().size(), 2uL); + EXPECT_THAT(list2[0]->GetIPs(), UnorderedElementsAre(InterfaceAddress(ip1), + InterfaceAddress(ip2))); +} + +// Test that MergeNetworkList successfully detects the change if +// a network becomes inactive and then active again. +TEST_F(NetworkTest, TestMergeNetworkListWithInactiveNetworks) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + Network network1("test_wifi", "Test Network Adapter 1", + IPAddress(0x12345600U), 24); + Network network2("test_eth0", "Test Network Adapter 2", + IPAddress(0x00010000U), 16); + network1.AddIP(IPAddress(0x12345678)); + network2.AddIP(IPAddress(0x00010004)); + std::vector<std::unique_ptr<Network>> list; + auto net1 = std::make_unique<Network>(network1); + const Network* const net1_ptr = net1.get(); + list.push_back(std::move(net1)); + bool changed; + MergeNetworkList(manager, std::move(list), &changed); + EXPECT_TRUE(changed); + list.clear(); + + std::vector<const Network*> current = manager.GetNetworks(); + ASSERT_EQ(1U, current.size()); + EXPECT_EQ(net1_ptr, current[0]); + + list.clear(); + auto net2 = std::make_unique<Network>(network2); + const Network* const net2_ptr = net2.get(); + list.push_back(std::move(net2)); + MergeNetworkList(manager, std::move(list), &changed); + EXPECT_TRUE(changed); + list.clear(); + + current = manager.GetNetworks(); + ASSERT_EQ(1U, current.size()); + EXPECT_EQ(net2_ptr, current[0]); + // Now network1 is inactive. Try to merge it again. + list.clear(); + list.push_back(std::make_unique<Network>(network1)); + MergeNetworkList(manager, std::move(list), &changed); + EXPECT_TRUE(changed); + list.clear(); + current = manager.GetNetworks(); + ASSERT_EQ(1U, current.size()); + EXPECT_TRUE(current[0]->active()); + EXPECT_EQ(net1_ptr, current[0]); +} + +// Test that the filtering logic follows the defined ruleset in network.h. +TEST_F(NetworkTest, TestIPv6Selection) { + InterfaceAddress ip; + std::string ipstr; + + ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip)); + + // Create a network with this prefix. + Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64), + 64); + EXPECT_EQ(AF_INET6, ipv6_network.family()); + + // When there is no address added, it should return an unspecified + // address. + EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress()); + EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP())); + + // Deprecated one should not be returned. + ipv6_network.AddIP(ip); + EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress()); + + // Add ULA one. ULA is unique local address which is starting either + // with 0xfc or 0xfd. + ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip)); + ipv6_network.AddIP(ip); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip)); + + // Add global one. + ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip)); + ipv6_network.AddIP(ip); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip)); + + // Add global dynamic temporary one. + ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip)); + ipv6_network.AddIP(ip); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip)); +} + +// Test that the filtering logic follows the defined ruleset in network.h. +TEST_F(NetworkTest, TestGetBestIPWithPreferGlobalIPv6ToLinkLocalEnabled) { + webrtc::test::ScopedKeyValueConfig field_trials( + "WebRTC-IPv6NetworkResolutionFixes/Enabled/"); + InterfaceAddress ip, link_local; + std::string ipstr; + + ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip)); + + // Create a network with this prefix. + Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64), + 64, ADAPTER_TYPE_UNKNOWN, &field_trials); + + // When there is no address added, it should return an unspecified + // address. + EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress()); + EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP())); + + // Deprecated one should not be returned. + ipv6_network.AddIP(ip); + EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress()); + + // Add ULA one. ULA is unique local address which is starting either + // with 0xfc or 0xfd. + ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip)); + ipv6_network.AddIP(ip); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip)); + + // Add link local one. + ipstr = "fe80::aabb:ccff:fedd:eeff"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local)); + ipv6_network.AddIP(link_local); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(link_local)); + + // Add global one. + ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip)); + ipv6_network.AddIP(ip); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip)); + + // Add another link local address, then the compatible address is still global + // one. + ipstr = "fe80::aabb:ccff:fedd:eedd"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local)); + ipv6_network.AddIP(link_local); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip)); + + // Add global dynamic temporary one. + ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip)); + ipv6_network.AddIP(ip); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip)); + + // Add another link local address, then the compatible address is still global + // dynamic one. + ipstr = "fe80::aabb:ccff:fedd:eedd"; + ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local)); + ipv6_network.AddIP(link_local); + EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip)); +} + +TEST_F(NetworkTest, TestNetworkMonitoring) { + FakeNetworkMonitorFactory factory; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&factory, &socket_server, &field_trials_); + manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this), + &NetworkTest::OnNetworksChanged); + manager.StartUpdating(); + FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager); + EXPECT_TRUE(network_monitor && network_monitor->started()); + EXPECT_TRUE_WAIT(callback_called_, 1000); + callback_called_ = false; + + // Clear the networks so that there will be network changes below. + ClearNetworks(manager); + // Network manager is started, so the callback is called when the network + // monitor fires the network-change event. + network_monitor->InovkeNetworksChangedCallbackForTesting(); + EXPECT_TRUE_WAIT(callback_called_, 1000); + + // Network manager is stopped. + manager.StopUpdating(); + EXPECT_FALSE(GetNetworkMonitor(manager)->started()); +} + +// Fails on Android: https://bugs.chromium.org/p/webrtc/issues/detail?id=4364. +#if defined(WEBRTC_ANDROID) +#define MAYBE_DefaultLocalAddress DISABLED_DefaultLocalAddress +#else +#define MAYBE_DefaultLocalAddress DefaultLocalAddress +#endif +TEST_F(NetworkTest, MAYBE_DefaultLocalAddress) { + IPAddress ip; + FakeNetworkMonitorFactory factory; + PhysicalSocketServer socket_server; + TestBasicNetworkManager manager(&factory, &socket_server, field_trials_); + manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this), + &NetworkTest::OnNetworksChanged); + manager.StartUpdating(); + EXPECT_TRUE_WAIT(callback_called_, 1000); + + // Make sure we can query default local address when an address for such + // address family exists. + std::vector<const Network*> networks = manager.GetNetworks(); + EXPECT_TRUE(!networks.empty()); + for (const Network* network : networks) { + if (network->GetBestIP().family() == AF_INET) { + EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET) != IPAddress()); + } else if (network->GetBestIP().family() == AF_INET6 && + !IPIsLoopback(network->GetBestIP())) { + // Existence of an IPv6 loopback address doesn't mean it has IPv6 network + // enabled. + EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET6) != IPAddress()); + } + } + + // GetDefaultLocalAddress should return the valid default address after set. + manager.set_default_local_addresses(GetLoopbackIP(AF_INET), + GetLoopbackIP(AF_INET6)); + EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET, &ip)); + EXPECT_EQ(ip, GetLoopbackIP(AF_INET)); + EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip)); + EXPECT_EQ(ip, GetLoopbackIP(AF_INET6)); + + // More tests on GetDefaultLocalAddress with ipv6 addresses where the set + // default address may be different from the best IP address of any network. + InterfaceAddress ip1; + EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:1111", + IPV6_ADDRESS_FLAG_TEMPORARY, &ip1)); + // Create a network with a prefix of ip1. + Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip1, 64), + 64); + IPAddress ip2; + EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:2222", &ip2)); + ipv6_network.AddIP(ip1); + ipv6_network.AddIP(ip2); + std::vector<std::unique_ptr<Network>> list; + list.push_back(std::make_unique<Network>(ipv6_network)); + bool changed; + MergeNetworkList(manager, std::move(list), &changed); + // If the set default address is not in any network, GetDefaultLocalAddress + // should return it. + IPAddress ip3; + EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:3333", &ip3)); + manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip3); + EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip)); + EXPECT_EQ(ip3, ip); + // If the set default address is in a network, GetDefaultLocalAddress will + // return the best IP in that network. + manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip2); + EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip)); + EXPECT_EQ(static_cast<IPAddress>(ip1), ip); + + manager.StopUpdating(); +} + +// Test that MergeNetworkList does not set change = true +// when changing from cellular_X to cellular_Y. +TEST_F(NetworkTest, TestWhenNetworkListChangeReturnsChangedFlag) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + + IPAddress ip1; + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1)); + auto net1 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64); + net1->set_type(ADAPTER_TYPE_CELLULAR_3G); + net1->AddIP(ip1); + std::vector<std::unique_ptr<Network>> list; + list.push_back(std::move(net1)); + + { + bool changed; + MergeNetworkList(manager, std::move(list), &changed); + EXPECT_TRUE(changed); + std::vector<const Network*> list2 = manager.GetNetworks(); + EXPECT_EQ(list2.size(), 1uL); + EXPECT_EQ(ADAPTER_TYPE_CELLULAR_3G, list2[0]->type()); + } + + // Modify net1 from 3G to 4G + { + auto net2 = + std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64); + net2->set_type(ADAPTER_TYPE_CELLULAR_4G); + net2->AddIP(ip1); + list.clear(); + list.push_back(std::move(net2)); + bool changed; + MergeNetworkList(manager, std::move(list), &changed); + + // Change from 3G to 4G shall not trigger OnNetworksChanged, + // i.e changed = false. + EXPECT_FALSE(changed); + std::vector<const Network*> list2 = manager.GetNetworks(); + ASSERT_EQ(list2.size(), 1uL); + EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type()); + } + + // Don't modify. + { + auto net2 = + std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64); + net2->set_type(ADAPTER_TYPE_CELLULAR_4G); + net2->AddIP(ip1); + list.clear(); + list.push_back(std::move(net2)); + bool changed; + MergeNetworkList(manager, std::move(list), &changed); + + // No change. + EXPECT_FALSE(changed); + std::vector<const Network*> list2 = manager.GetNetworks(); + ASSERT_EQ(list2.size(), 1uL); + EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type()); + } +} + +#if defined(WEBRTC_POSIX) +TEST_F(NetworkTest, IgnoresMACBasedIPv6Address) { + std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345"; + std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF"; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.StartUpdating(); + + // IPSec interface; name is in form "ipsec<index>". + char if_name[20] = "ipsec11"; + ifaddrs* addr_list = + InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager); + + std::vector<const Network*> list = manager.GetNetworks(); + EXPECT_EQ(list.size(), 0u); + ReleaseIfAddrs(addr_list); +} + +TEST_F(NetworkTest, WebRTC_AllowMACBasedIPv6Address) { + webrtc::test::ScopedFieldTrials field_trials( + "WebRTC-AllowMACBasedIPv6/Enabled/"); + std::string ipv6_address = "2607:fc20:f340:1dc8:214:22ff:fe01:2345"; + std::string ipv6_mask = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF"; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.StartUpdating(); + + // IPSec interface; name is in form "ipsec<index>". + char if_name[20] = "ipsec11"; + ifaddrs* addr_list = + InstallIpv6Network(if_name, ipv6_address, ipv6_mask, manager); + + std::vector<const Network*> list = manager.GetNetworks(); + EXPECT_EQ(list.size(), 1u); + ReleaseIfAddrs(addr_list); +} +#endif + +#if defined(WEBRTC_POSIX) +TEST_F(NetworkTest, WebRTC_BindUsingInterfaceName) { + char if_name1[20] = "wlan0"; + char if_name2[20] = "v4-wlan0"; + ifaddrs* list = nullptr; + list = AddIpv6Address(list, if_name1, "1000:2000:3000:4000:0:0:0:1", + "FFFF:FFFF:FFFF:FFFF::", 0); + list = AddIpv4Address(list, if_name2, "192.168.0.2", "255.255.255.255"); + std::vector<std::unique_ptr<Network>> result; + + // Sanity check that both interfaces are included by default. + FakeNetworkMonitorFactory factory; + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&factory, &socket_server, &field_trials_); + manager.StartUpdating(); + CallConvertIfAddrs(manager, list, /*include_ignored=*/false, &result); + EXPECT_EQ(2u, result.size()); + ReleaseIfAddrs(list); + bool changed; + // This ensures we release the objects created in CallConvertIfAddrs. + MergeNetworkList(manager, std::move(result), &changed); + result.clear(); + + FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager); + + IPAddress ipv6; + EXPECT_TRUE(IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6)); + IPAddress ipv4; + EXPECT_TRUE(IPFromString("192.168.0.2", &ipv4)); + + // The network monitor only knwos about the ipv6 address, interface. + network_monitor->set_adapters({"wlan0"}); + network_monitor->set_ip_addresses({ipv6}); + EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv6), + NetworkBindingResult::SUCCESS); + + // But it will bind anyway using string matching... + EXPECT_EQ(manager.BindSocketToNetwork(/* fd */ 77, ipv4), + NetworkBindingResult::SUCCESS); +} +#endif + +TEST_F(NetworkTest, NetworkCostVpn_Default) { + IPAddress ip1; + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1)); + webrtc::test::ScopedKeyValueConfig field_trials; + + Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64); + net1->set_type(ADAPTER_TYPE_VPN); + net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET); + + Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64); + net2->set_type(ADAPTER_TYPE_ETHERNET); + + EXPECT_EQ(net1->GetCost(field_trials), net2->GetCost(field_trials)); + delete net1; + delete net2; +} + +TEST_F(NetworkTest, NetworkCostVpn_VpnMoreExpensive) { + webrtc::test::ScopedKeyValueConfig field_trials( + "WebRTC-AddNetworkCostToVpn/Enabled/"); + + IPAddress ip1; + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1)); + + Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64); + net1->set_type(ADAPTER_TYPE_VPN); + net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET); + + Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64); + net2->set_type(ADAPTER_TYPE_ETHERNET); + + EXPECT_GT(net1->GetCost(field_trials), net2->GetCost(field_trials)); + delete net1; + delete net2; +} + +TEST_F(NetworkTest, GuessAdapterFromNetworkCost) { + webrtc::test::ScopedKeyValueConfig field_trials( + "WebRTC-AddNetworkCostToVpn/Enabled/" + "WebRTC-UseDifferentiatedCellularCosts/Enabled/"); + + IPAddress ip1; + EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1)); + + for (auto type : kAllAdapterTypes) { + if (type == rtc::ADAPTER_TYPE_VPN) + continue; + Network net1("em1", "em1", TruncateIP(ip1, 64), 64); + net1.set_type(type); + auto [guess, vpn] = + Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials)); + EXPECT_FALSE(vpn); + if (type == rtc::ADAPTER_TYPE_LOOPBACK) { + EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET); + } else { + EXPECT_EQ(type, guess); + } + } + + // VPN + for (auto type : kAllAdapterTypes) { + if (type == rtc::ADAPTER_TYPE_VPN) + continue; + Network net1("em1", "em1", TruncateIP(ip1, 64), 64); + net1.set_type(rtc::ADAPTER_TYPE_VPN); + net1.set_underlying_type_for_vpn(type); + auto [guess, vpn] = + Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials)); + EXPECT_TRUE(vpn); + if (type == rtc::ADAPTER_TYPE_LOOPBACK) { + EXPECT_EQ(guess, rtc::ADAPTER_TYPE_ETHERNET); + } else { + EXPECT_EQ(type, guess); + } + } +} + +TEST_F(NetworkTest, VpnList) { + PhysicalSocketServer socket_server; + { + BasicNetworkManager manager(&socket_server); + manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)}); + manager.StartUpdating(); + EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32)); + EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.12.1"), 24)); + EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 16)); + EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 24)); + EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.1.1"), 32)); + EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.133.0.0"), 16)); + EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.0.0"), 15)); + } + { + BasicNetworkManager manager(&socket_server); + manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 24)}); + manager.StartUpdating(); + EXPECT_FALSE(manager.IsConfiguredVpn(IPFromString("192.168.1.1"), 32)); + EXPECT_TRUE(manager.IsConfiguredVpn(IPFromString("192.168.0.1"), 32)); + } +} + +#if defined(WEBRTC_POSIX) +// TODO(webrtc:13114): Implement the InstallIpv4Network for windows. +TEST_F(NetworkTest, VpnListOverrideAdapterType) { + PhysicalSocketServer socket_server; + BasicNetworkManager manager(&socket_server); + manager.set_vpn_list({NetworkMask(IPFromString("192.168.0.0"), 16)}); + manager.StartUpdating(); + + char if_name[20] = "eth0"; + auto addr_list = + InstallIpv4Network(if_name, "192.168.1.23", "255.255.255.255", manager); + + std::vector<const Network*> list = manager.GetNetworks(); + ASSERT_EQ(1u, list.size()); + EXPECT_EQ(ADAPTER_TYPE_VPN, list[0]->type()); + EXPECT_EQ(ADAPTER_TYPE_ETHERNET, list[0]->underlying_type_for_vpn()); + ClearNetworks(manager); + ReleaseIfAddrs(addr_list); +} +#endif // defined(WEBRTC_POSIX) + +TEST_F(NetworkTest, HardcodedVpn) { + const uint8_t cisco[] = {0x0, 0x5, 0x9A, 0x3C, 0x7A, 0x0}; + const uint8_t global[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x1}; + const uint8_t unknown[] = {0x2, 0x50, 0x41, 0x0, 0x0, 0x0}; + const uint8_t five_bytes[] = {0x2, 0x50, 0x41, 0x0, 0x0}; + EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(cisco)); + EXPECT_TRUE(NetworkManagerBase::IsVpnMacAddress(global)); + + EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress( + rtc::ArrayView<const uint8_t>(cisco, 5))); + EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(five_bytes)); + EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(unknown)); + EXPECT_FALSE(NetworkManagerBase::IsVpnMacAddress(nullptr)); +} + +TEST(CompareNetworks, IrreflexivityTest) { + // x < x is false + auto network = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network, network)); +} + +TEST(CompareNetworks, AsymmetryTest) { + // x < y and y < x cannot be both true + auto network_a = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + auto network_b = std::make_unique<Network>( + "test_eth1", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b)); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_b, network_a)); + + auto network_c = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345500U), 24); + auto network_d = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_c, network_d)); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_c)); +} + +TEST(CompareNetworks, TransitivityTest) { + // x < y and y < z imply x < z + auto network_a = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + auto network_b = std::make_unique<Network>( + "test_eth1", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + auto network_c = std::make_unique<Network>( + "test_eth2", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b)); + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_b, network_c)); + + auto network_d = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + auto network_e = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345700U), 24); + auto network_f = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345800U), 24); + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_d, network_e)); + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_e, network_f)); + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_d, network_f)); + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_c)); +} + +TEST(CompareNetworks, TransitivityOfIncomparabilityTest) { + // x == y and y == z imply x == z, + // where x == y means x < y and y < x are both false + auto network_a = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 23); + auto network_b = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + auto network_c = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345700U), 24); + + // network_a < network_b + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_b)); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_b, network_a)); + + // network_b < network_c + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_b, network_c)); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_c, network_b)); + + // network_a < network_c + EXPECT_TRUE(webrtc_network_internal::CompareNetworks(network_a, network_c)); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_c, network_a)); + + auto network_d = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + auto network_e = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + auto network_f = std::make_unique<Network>( + "test_eth0", "Test Network Adapter 1", IPAddress(0x12345600U), 24); + + // network_d == network_e + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_e)); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_e, network_d)); + + // network_e == network_f + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_e, network_f)); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_f, network_e)); + + // network_d == network_f + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_d, network_f)); + EXPECT_FALSE(webrtc_network_internal::CompareNetworks(network_f, network_d)); +} + +} // namespace rtc |