OLD | NEW |
(Empty) | |
| 1 /* |
| 2 * Copyright 2012 The WebRTC project authors. All Rights Reserved. |
| 3 * |
| 4 * Use of this source code is governed by a BSD-style license |
| 5 * that can be found in the LICENSE file in the root of the source |
| 6 * tree. An additional intellectual property rights grant can be found |
| 7 * in the file PATENTS. All contributing project authors may |
| 8 * be found in the AUTHORS file in the root of the source tree. |
| 9 */ |
| 10 |
| 11 #include <string> |
| 12 #include <vector> |
| 13 |
| 14 #include "webrtc/base/gunit.h" |
| 15 #include "webrtc/pc/iceserverparsing.h" |
| 16 |
| 17 namespace webrtc { |
| 18 |
| 19 class IceServerParsingTest : public testing::Test { |
| 20 public: |
| 21 // Convenience functions for parsing a single URL. Result is stored in |
| 22 // |stun_servers_| and |turn_servers_|. |
| 23 bool ParseUrl(const std::string& url) { |
| 24 return ParseUrl(url, std::string(), std::string()); |
| 25 } |
| 26 |
| 27 bool ParseTurnUrl(const std::string& url) { |
| 28 return ParseUrl(url, "username", "password"); |
| 29 } |
| 30 |
| 31 bool ParseUrl(const std::string& url, |
| 32 const std::string& username, |
| 33 const std::string& password) { |
| 34 return ParseUrl( |
| 35 url, username, password, |
| 36 PeerConnectionInterface::TlsCertPolicy::kTlsCertPolicySecure); |
| 37 } |
| 38 |
| 39 bool ParseUrl(const std::string& url, |
| 40 const std::string& username, |
| 41 const std::string& password, |
| 42 PeerConnectionInterface::TlsCertPolicy tls_certificate_policy) { |
| 43 stun_servers_.clear(); |
| 44 turn_servers_.clear(); |
| 45 PeerConnectionInterface::IceServers servers; |
| 46 PeerConnectionInterface::IceServer server; |
| 47 server.urls.push_back(url); |
| 48 server.username = username; |
| 49 server.password = password; |
| 50 server.tls_cert_policy = tls_certificate_policy; |
| 51 servers.push_back(server); |
| 52 return webrtc::ParseIceServers(servers, &stun_servers_, &turn_servers_) == |
| 53 webrtc::RTCErrorType::NONE; |
| 54 } |
| 55 |
| 56 protected: |
| 57 cricket::ServerAddresses stun_servers_; |
| 58 std::vector<cricket::RelayServerConfig> turn_servers_; |
| 59 }; |
| 60 |
| 61 // Make sure all STUN/TURN prefixes are parsed correctly. |
| 62 TEST_F(IceServerParsingTest, ParseStunPrefixes) { |
| 63 EXPECT_TRUE(ParseUrl("stun:hostname")); |
| 64 EXPECT_EQ(1U, stun_servers_.size()); |
| 65 EXPECT_EQ(0U, turn_servers_.size()); |
| 66 |
| 67 EXPECT_TRUE(ParseUrl("stuns:hostname")); |
| 68 EXPECT_EQ(1U, stun_servers_.size()); |
| 69 EXPECT_EQ(0U, turn_servers_.size()); |
| 70 |
| 71 EXPECT_TRUE(ParseTurnUrl("turn:hostname")); |
| 72 EXPECT_EQ(0U, stun_servers_.size()); |
| 73 EXPECT_EQ(1U, turn_servers_.size()); |
| 74 EXPECT_EQ(cricket::PROTO_UDP, turn_servers_[0].ports[0].proto); |
| 75 |
| 76 EXPECT_TRUE(ParseTurnUrl("turns:hostname")); |
| 77 EXPECT_EQ(0U, stun_servers_.size()); |
| 78 EXPECT_EQ(1U, turn_servers_.size()); |
| 79 EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto); |
| 80 EXPECT_TRUE(turn_servers_[0].tls_cert_policy == |
| 81 cricket::TlsCertPolicy::TLS_CERT_POLICY_SECURE); |
| 82 |
| 83 EXPECT_TRUE(ParseUrl( |
| 84 "turns:hostname", "username", "password", |
| 85 PeerConnectionInterface::TlsCertPolicy::kTlsCertPolicyInsecureNoCheck)); |
| 86 EXPECT_EQ(0U, stun_servers_.size()); |
| 87 EXPECT_EQ(1U, turn_servers_.size()); |
| 88 EXPECT_TRUE(turn_servers_[0].tls_cert_policy == |
| 89 cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK); |
| 90 EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto); |
| 91 |
| 92 // invalid prefixes |
| 93 EXPECT_FALSE(ParseUrl("stunn:hostname")); |
| 94 EXPECT_FALSE(ParseUrl(":hostname")); |
| 95 EXPECT_FALSE(ParseUrl(":")); |
| 96 EXPECT_FALSE(ParseUrl("")); |
| 97 } |
| 98 |
| 99 TEST_F(IceServerParsingTest, VerifyDefaults) { |
| 100 // TURNS defaults |
| 101 EXPECT_TRUE(ParseTurnUrl("turns:hostname")); |
| 102 EXPECT_EQ(1U, turn_servers_.size()); |
| 103 EXPECT_EQ(5349, turn_servers_[0].ports[0].address.port()); |
| 104 EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto); |
| 105 |
| 106 // TURN defaults |
| 107 EXPECT_TRUE(ParseTurnUrl("turn:hostname")); |
| 108 EXPECT_EQ(1U, turn_servers_.size()); |
| 109 EXPECT_EQ(3478, turn_servers_[0].ports[0].address.port()); |
| 110 EXPECT_EQ(cricket::PROTO_UDP, turn_servers_[0].ports[0].proto); |
| 111 |
| 112 // STUN defaults |
| 113 EXPECT_TRUE(ParseUrl("stun:hostname")); |
| 114 EXPECT_EQ(1U, stun_servers_.size()); |
| 115 EXPECT_EQ(3478, stun_servers_.begin()->port()); |
| 116 } |
| 117 |
| 118 // Check that the 6 combinations of IPv4/IPv6/hostname and with/without port |
| 119 // can be parsed correctly. |
| 120 TEST_F(IceServerParsingTest, ParseHostnameAndPort) { |
| 121 EXPECT_TRUE(ParseUrl("stun:1.2.3.4:1234")); |
| 122 EXPECT_EQ(1U, stun_servers_.size()); |
| 123 EXPECT_EQ("1.2.3.4", stun_servers_.begin()->hostname()); |
| 124 EXPECT_EQ(1234, stun_servers_.begin()->port()); |
| 125 |
| 126 EXPECT_TRUE(ParseUrl("stun:[1:2:3:4:5:6:7:8]:4321")); |
| 127 EXPECT_EQ(1U, stun_servers_.size()); |
| 128 EXPECT_EQ("1:2:3:4:5:6:7:8", stun_servers_.begin()->hostname()); |
| 129 EXPECT_EQ(4321, stun_servers_.begin()->port()); |
| 130 |
| 131 EXPECT_TRUE(ParseUrl("stun:hostname:9999")); |
| 132 EXPECT_EQ(1U, stun_servers_.size()); |
| 133 EXPECT_EQ("hostname", stun_servers_.begin()->hostname()); |
| 134 EXPECT_EQ(9999, stun_servers_.begin()->port()); |
| 135 |
| 136 EXPECT_TRUE(ParseUrl("stun:1.2.3.4")); |
| 137 EXPECT_EQ(1U, stun_servers_.size()); |
| 138 EXPECT_EQ("1.2.3.4", stun_servers_.begin()->hostname()); |
| 139 EXPECT_EQ(3478, stun_servers_.begin()->port()); |
| 140 |
| 141 EXPECT_TRUE(ParseUrl("stun:[1:2:3:4:5:6:7:8]")); |
| 142 EXPECT_EQ(1U, stun_servers_.size()); |
| 143 EXPECT_EQ("1:2:3:4:5:6:7:8", stun_servers_.begin()->hostname()); |
| 144 EXPECT_EQ(3478, stun_servers_.begin()->port()); |
| 145 |
| 146 EXPECT_TRUE(ParseUrl("stun:hostname")); |
| 147 EXPECT_EQ(1U, stun_servers_.size()); |
| 148 EXPECT_EQ("hostname", stun_servers_.begin()->hostname()); |
| 149 EXPECT_EQ(3478, stun_servers_.begin()->port()); |
| 150 |
| 151 // Try some invalid hostname:port strings. |
| 152 EXPECT_FALSE(ParseUrl("stun:hostname:99a99")); |
| 153 EXPECT_FALSE(ParseUrl("stun:hostname:-1")); |
| 154 EXPECT_FALSE(ParseUrl("stun:hostname:port:more")); |
| 155 EXPECT_FALSE(ParseUrl("stun:hostname:port more")); |
| 156 EXPECT_FALSE(ParseUrl("stun:hostname:")); |
| 157 EXPECT_FALSE(ParseUrl("stun:[1:2:3:4:5:6:7:8]junk:1000")); |
| 158 EXPECT_FALSE(ParseUrl("stun::5555")); |
| 159 EXPECT_FALSE(ParseUrl("stun:")); |
| 160 } |
| 161 |
| 162 // Test parsing the "?transport=xxx" part of the URL. |
| 163 TEST_F(IceServerParsingTest, ParseTransport) { |
| 164 EXPECT_TRUE(ParseTurnUrl("turn:hostname:1234?transport=tcp")); |
| 165 EXPECT_EQ(1U, turn_servers_.size()); |
| 166 EXPECT_EQ(cricket::PROTO_TCP, turn_servers_[0].ports[0].proto); |
| 167 |
| 168 EXPECT_TRUE(ParseTurnUrl("turn:hostname?transport=udp")); |
| 169 EXPECT_EQ(1U, turn_servers_.size()); |
| 170 EXPECT_EQ(cricket::PROTO_UDP, turn_servers_[0].ports[0].proto); |
| 171 |
| 172 EXPECT_FALSE(ParseTurnUrl("turn:hostname?transport=invalid")); |
| 173 EXPECT_FALSE(ParseTurnUrl("turn:hostname?transport=")); |
| 174 EXPECT_FALSE(ParseTurnUrl("turn:hostname?=")); |
| 175 EXPECT_FALSE(ParseTurnUrl("turn:hostname?")); |
| 176 EXPECT_FALSE(ParseTurnUrl("?")); |
| 177 } |
| 178 |
| 179 // Test parsing ICE username contained in URL. |
| 180 TEST_F(IceServerParsingTest, ParseUsername) { |
| 181 EXPECT_TRUE(ParseTurnUrl("turn:user@hostname")); |
| 182 EXPECT_EQ(1U, turn_servers_.size()); |
| 183 EXPECT_EQ("user", turn_servers_[0].credentials.username); |
| 184 |
| 185 EXPECT_FALSE(ParseTurnUrl("turn:@hostname")); |
| 186 EXPECT_FALSE(ParseTurnUrl("turn:username@")); |
| 187 EXPECT_FALSE(ParseTurnUrl("turn:@")); |
| 188 EXPECT_FALSE(ParseTurnUrl("turn:user@name@hostname")); |
| 189 } |
| 190 |
| 191 // Test that username and password from IceServer is copied into the resulting |
| 192 // RelayServerConfig. |
| 193 TEST_F(IceServerParsingTest, CopyUsernameAndPasswordFromIceServer) { |
| 194 EXPECT_TRUE(ParseUrl("turn:hostname", "username", "password")); |
| 195 EXPECT_EQ(1U, turn_servers_.size()); |
| 196 EXPECT_EQ("username", turn_servers_[0].credentials.username); |
| 197 EXPECT_EQ("password", turn_servers_[0].credentials.password); |
| 198 } |
| 199 |
| 200 // Ensure that if a server has multiple URLs, each one is parsed. |
| 201 TEST_F(IceServerParsingTest, ParseMultipleUrls) { |
| 202 PeerConnectionInterface::IceServers servers; |
| 203 PeerConnectionInterface::IceServer server; |
| 204 server.urls.push_back("stun:hostname"); |
| 205 server.urls.push_back("turn:hostname"); |
| 206 server.username = "foo"; |
| 207 server.password = "bar"; |
| 208 servers.push_back(server); |
| 209 EXPECT_EQ(webrtc::RTCErrorType::NONE, |
| 210 webrtc::ParseIceServers(servers, &stun_servers_, &turn_servers_)); |
| 211 EXPECT_EQ(1U, stun_servers_.size()); |
| 212 EXPECT_EQ(1U, turn_servers_.size()); |
| 213 } |
| 214 |
| 215 // Ensure that TURN servers are given unique priorities, |
| 216 // so that their resulting candidates have unique priorities. |
| 217 TEST_F(IceServerParsingTest, TurnServerPrioritiesUnique) { |
| 218 PeerConnectionInterface::IceServers servers; |
| 219 PeerConnectionInterface::IceServer server; |
| 220 server.urls.push_back("turn:hostname"); |
| 221 server.urls.push_back("turn:hostname2"); |
| 222 server.username = "foo"; |
| 223 server.password = "bar"; |
| 224 servers.push_back(server); |
| 225 EXPECT_EQ(webrtc::RTCErrorType::NONE, |
| 226 webrtc::ParseIceServers(servers, &stun_servers_, &turn_servers_)); |
| 227 EXPECT_EQ(2U, turn_servers_.size()); |
| 228 EXPECT_NE(turn_servers_[0].priority, turn_servers_[1].priority); |
| 229 } |
| 230 |
| 231 } // namespace webrtc |
OLD | NEW |