/* * Copyright 2004 The WebRTC Project Authors. All rights reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ #include #include #include "webrtc/p2p/base/stunserver.h" #include "webrtc/base/gunit.h" #include "webrtc/base/logging.h" #include "webrtc/base/physicalsocketserver.h" #include "webrtc/base/testclient.h" #include "webrtc/base/thread.h" #include "webrtc/base/virtualsocketserver.h" using namespace cricket; static const rtc::SocketAddress server_addr("99.99.99.1", 3478); static const rtc::SocketAddress client_addr("1.2.3.4", 1234); class StunServerTest : public testing::Test { public: StunServerTest() : pss_(new rtc::PhysicalSocketServer), ss_(new rtc::VirtualSocketServer(pss_.get())), worker_(ss_.get()) { } virtual void SetUp() { server_.reset(new StunServer( rtc::AsyncUDPSocket::Create(ss_.get(), server_addr))); client_.reset(new rtc::TestClient( rtc::AsyncUDPSocket::Create(ss_.get(), client_addr))); worker_.Start(); } void Send(const StunMessage& msg) { rtc::ByteBufferWriter buf; msg.Write(&buf); Send(buf.Data(), static_cast(buf.Length())); } void Send(const char* buf, int len) { client_->SendTo(buf, len, server_addr); } bool ReceiveFails() { return(client_->CheckNoPacket()); } StunMessage* Receive() { StunMessage* msg = NULL; rtc::TestClient::Packet* packet = client_->NextPacket(rtc::TestClient::kTimeoutMs); if (packet) { rtc::ByteBufferReader buf(packet->buf, packet->size); msg = new StunMessage(); msg->Read(&buf); delete packet; } return msg; } private: std::unique_ptr pss_; std::unique_ptr ss_; rtc::Thread worker_; std::unique_ptr server_; std::unique_ptr client_; }; // Disable for TSan v2, see // https://code.google.com/p/webrtc/issues/detail?id=2517 for details. #if !defined(THREAD_SANITIZER) TEST_F(StunServerTest, TestGood) { StunMessage req; std::string transaction_id = "0123456789ab"; req.SetType(STUN_BINDING_REQUEST); req.SetTransactionID(transaction_id); Send(req); StunMessage* msg = Receive(); ASSERT_TRUE(msg != NULL); EXPECT_EQ(STUN_BINDING_RESPONSE, msg->type()); EXPECT_EQ(req.transaction_id(), msg->transaction_id()); const StunAddressAttribute* mapped_addr = msg->GetAddress(STUN_ATTR_MAPPED_ADDRESS); EXPECT_TRUE(mapped_addr != NULL); EXPECT_EQ(1, mapped_addr->family()); EXPECT_EQ(client_addr.port(), mapped_addr->port()); if (mapped_addr->ipaddr() != client_addr.ipaddr()) { LOG(LS_WARNING) << "Warning: mapped IP (" << mapped_addr->ipaddr() << ") != local IP (" << client_addr.ipaddr() << ")"; } delete msg; } #endif // if !defined(THREAD_SANITIZER) TEST_F(StunServerTest, TestBad) { const char* bad = "this is a completely nonsensical message whose only " "purpose is to make the parser go 'ack'. it doesn't " "look anything like a normal stun message"; Send(bad, static_cast(strlen(bad))); ASSERT_TRUE(ReceiveFails()); }