This CL has been generated with the following script: for m in PLOG \ LOG_TAG \ LOG_GLEM \ LOG_GLE_EX \ LOG_GLE \ LAST_SYSTEM_ERROR \ LOG_ERRNO_EX \ LOG_ERRNO \ LOG_ERR_EX \ LOG_ERR \ LOG_V \ LOG_F \ LOG_T_F \ LOG_E \ LOG_T \ LOG_CHECK_LEVEL_V \ LOG_CHECK_LEVEL \ LOG do git grep -l $m | xargs sed -i "s,\b$m\b,RTC_$m,g" done git checkout rtc_base/logging.h git cl format Bug: webrtc:8452 Change-Id: I1a53ef3e0a5ef6e244e62b2e012b864914784600 Reviewed-on: https://webrtc-review.googlesource.com/21325 Reviewed-by: Niels Moller <nisse@webrtc.org> Reviewed-by: Karl Wiberg <kwiberg@webrtc.org> Commit-Queue: Mirko Bonadei <mbonadei@webrtc.org> Cr-Commit-Position: refs/heads/master@{#20617}
106 lines
3.3 KiB
C++
106 lines
3.3 KiB
C++
/*
|
|
* Copyright 2004 The WebRTC Project Authors. All rights reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include <memory>
|
|
#include <string>
|
|
|
|
#include "p2p/base/stunserver.h"
|
|
#include "rtc_base/gunit.h"
|
|
#include "rtc_base/logging.h"
|
|
#include "rtc_base/ptr_util.h"
|
|
#include "rtc_base/testclient.h"
|
|
#include "rtc_base/thread.h"
|
|
#include "rtc_base/virtualsocketserver.h"
|
|
|
|
using namespace cricket;
|
|
|
|
static const rtc::SocketAddress server_addr("99.99.99.1", 3478);
|
|
static const rtc::SocketAddress client_addr("1.2.3.4", 1234);
|
|
|
|
class StunServerTest : public testing::Test {
|
|
public:
|
|
StunServerTest() : ss_(new rtc::VirtualSocketServer()), network_(ss_.get()) {}
|
|
virtual void SetUp() {
|
|
server_.reset(new StunServer(
|
|
rtc::AsyncUDPSocket::Create(ss_.get(), server_addr)));
|
|
client_.reset(new rtc::TestClient(
|
|
WrapUnique(rtc::AsyncUDPSocket::Create(ss_.get(), client_addr))));
|
|
|
|
network_.Start();
|
|
}
|
|
void Send(const StunMessage& msg) {
|
|
rtc::ByteBufferWriter buf;
|
|
msg.Write(&buf);
|
|
Send(buf.Data(), static_cast<int>(buf.Length()));
|
|
}
|
|
void Send(const char* buf, int len) {
|
|
client_->SendTo(buf, len, server_addr);
|
|
}
|
|
bool ReceiveFails() {
|
|
return(client_->CheckNoPacket());
|
|
}
|
|
StunMessage* Receive() {
|
|
StunMessage* msg = NULL;
|
|
std::unique_ptr<rtc::TestClient::Packet> packet =
|
|
client_->NextPacket(rtc::TestClient::kTimeoutMs);
|
|
if (packet) {
|
|
rtc::ByteBufferReader buf(packet->buf, packet->size);
|
|
msg = new StunMessage();
|
|
msg->Read(&buf);
|
|
}
|
|
return msg;
|
|
}
|
|
private:
|
|
std::unique_ptr<rtc::VirtualSocketServer> ss_;
|
|
rtc::Thread network_;
|
|
std::unique_ptr<StunServer> server_;
|
|
std::unique_ptr<rtc::TestClient> client_;
|
|
};
|
|
|
|
// Disable for TSan v2, see
|
|
// https://code.google.com/p/webrtc/issues/detail?id=2517 for details.
|
|
#if !defined(THREAD_SANITIZER)
|
|
|
|
TEST_F(StunServerTest, TestGood) {
|
|
StunMessage req;
|
|
std::string transaction_id = "0123456789ab";
|
|
req.SetType(STUN_BINDING_REQUEST);
|
|
req.SetTransactionID(transaction_id);
|
|
Send(req);
|
|
|
|
StunMessage* msg = Receive();
|
|
ASSERT_TRUE(msg != NULL);
|
|
EXPECT_EQ(STUN_BINDING_RESPONSE, msg->type());
|
|
EXPECT_EQ(req.transaction_id(), msg->transaction_id());
|
|
|
|
const StunAddressAttribute* mapped_addr =
|
|
msg->GetAddress(STUN_ATTR_MAPPED_ADDRESS);
|
|
EXPECT_TRUE(mapped_addr != NULL);
|
|
EXPECT_EQ(1, mapped_addr->family());
|
|
EXPECT_EQ(client_addr.port(), mapped_addr->port());
|
|
if (mapped_addr->ipaddr() != client_addr.ipaddr()) {
|
|
RTC_LOG(LS_WARNING) << "Warning: mapped IP (" << mapped_addr->ipaddr()
|
|
<< ") != local IP (" << client_addr.ipaddr() << ")";
|
|
}
|
|
|
|
delete msg;
|
|
}
|
|
|
|
#endif // if !defined(THREAD_SANITIZER)
|
|
|
|
TEST_F(StunServerTest, TestBad) {
|
|
const char* bad = "this is a completely nonsensical message whose only "
|
|
"purpose is to make the parser go 'ack'. it doesn't "
|
|
"look anything like a normal stun message";
|
|
Send(bad, static_cast<int>(strlen(bad)));
|
|
|
|
ASSERT_TRUE(ReceiveFails());
|
|
}
|