OLD | NEW |
---|---|
1 /* | 1 /* |
2 * Copyright 2009 The WebRTC Project Authors. All rights reserved. | 2 * Copyright 2009 The WebRTC Project Authors. All rights reserved. |
3 * | 3 * |
4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
9 */ | 9 */ |
10 | 10 |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
47 static const int kOnlyLocalPorts = cricket::PORTALLOCATOR_DISABLE_STUN | | 47 static const int kOnlyLocalPorts = cricket::PORTALLOCATOR_DISABLE_STUN | |
48 cricket::PORTALLOCATOR_DISABLE_RELAY | | 48 cricket::PORTALLOCATOR_DISABLE_RELAY | |
49 cricket::PORTALLOCATOR_DISABLE_TCP; | 49 cricket::PORTALLOCATOR_DISABLE_TCP; |
50 static const int LOW_RTT = 20; | 50 static const int LOW_RTT = 20; |
51 // Addresses on the public internet. | 51 // Addresses on the public internet. |
52 static const SocketAddress kPublicAddrs[2] = | 52 static const SocketAddress kPublicAddrs[2] = |
53 { SocketAddress("11.11.11.11", 0), SocketAddress("22.22.22.22", 0) }; | 53 { SocketAddress("11.11.11.11", 0), SocketAddress("22.22.22.22", 0) }; |
54 // IPv6 Addresses on the public internet. | 54 // IPv6 Addresses on the public internet. |
55 static const SocketAddress kIPv6PublicAddrs[2] = { | 55 static const SocketAddress kIPv6PublicAddrs[2] = { |
56 SocketAddress("2400:4030:1:2c00:be30:abcd:efab:cdef", 0), | 56 SocketAddress("2400:4030:1:2c00:be30:abcd:efab:cdef", 0), |
57 SocketAddress("2620:0:1000:1b03:2e41:38ff:fea6:f2a4", 0) | 57 SocketAddress("2600:0:1000:1b03:2e41:38ff:fea6:f2a4", 0)}; |
58 }; | |
59 // For configuring multihomed clients. | 58 // For configuring multihomed clients. |
60 static const SocketAddress kAlternateAddrs[2] = { | 59 static const SocketAddress kAlternateAddrs[2] = { |
61 SocketAddress("101.101.101.101", 0), SocketAddress("202.202.202.202", 0)}; | 60 SocketAddress("101.101.101.101", 0), SocketAddress("202.202.202.202", 0)}; |
61 static const SocketAddress kIPv6AlternateAddrs[2] = { | |
62 SocketAddress("2401:4030:1:2c00:be30:abcd:efab:cdef", 0), | |
63 SocketAddress("2601:0:1000:1b03:2e41:38ff:fea6:f2a4", 0)}; | |
62 // Addresses for HTTP proxy servers. | 64 // Addresses for HTTP proxy servers. |
63 static const SocketAddress kHttpsProxyAddrs[2] = | 65 static const SocketAddress kHttpsProxyAddrs[2] = |
64 { SocketAddress("11.11.11.1", 443), SocketAddress("22.22.22.1", 443) }; | 66 { SocketAddress("11.11.11.1", 443), SocketAddress("22.22.22.1", 443) }; |
65 // Addresses for SOCKS proxy servers. | 67 // Addresses for SOCKS proxy servers. |
66 static const SocketAddress kSocksProxyAddrs[2] = | 68 static const SocketAddress kSocksProxyAddrs[2] = |
67 { SocketAddress("11.11.11.1", 1080), SocketAddress("22.22.22.1", 1080) }; | 69 { SocketAddress("11.11.11.1", 1080), SocketAddress("22.22.22.1", 1080) }; |
68 // Internal addresses for NAT boxes. | 70 // Internal addresses for NAT boxes. |
69 static const SocketAddress kNatAddrs[2] = | 71 static const SocketAddress kNatAddrs[2] = |
70 { SocketAddress("192.168.1.1", 0), SocketAddress("192.168.2.1", 0) }; | 72 { SocketAddress("192.168.1.1", 0), SocketAddress("192.168.2.1", 0) }; |
71 // Private addresses inside the NAT private networks. | 73 // Private addresses inside the NAT private networks. |
(...skipping 348 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
420 | 422 |
421 Endpoint* GetEndpoint(int endpoint) { | 423 Endpoint* GetEndpoint(int endpoint) { |
422 if (endpoint == 0) { | 424 if (endpoint == 0) { |
423 return &ep1_; | 425 return &ep1_; |
424 } else if (endpoint == 1) { | 426 } else if (endpoint == 1) { |
425 return &ep2_; | 427 return &ep2_; |
426 } else { | 428 } else { |
427 return NULL; | 429 return NULL; |
428 } | 430 } |
429 } | 431 } |
430 PortAllocator* GetAllocator(int endpoint) { | 432 BasicPortAllocator* GetAllocator(int endpoint) { |
431 return GetEndpoint(endpoint)->allocator_.get(); | 433 return GetEndpoint(endpoint)->allocator_.get(); |
432 } | 434 } |
433 webrtc::FakeMetricsObserver* GetMetricsObserver(int endpoint) { | 435 webrtc::FakeMetricsObserver* GetMetricsObserver(int endpoint) { |
434 return GetEndpoint(endpoint)->metrics_observer_; | 436 return GetEndpoint(endpoint)->metrics_observer_; |
435 } | 437 } |
436 void AddAddress(int endpoint, const SocketAddress& addr) { | 438 void AddAddress(int endpoint, const SocketAddress& addr) { |
437 GetEndpoint(endpoint)->network_manager_.AddInterface(addr); | 439 GetEndpoint(endpoint)->network_manager_.AddInterface(addr); |
438 } | 440 } |
439 void AddAddress(int endpoint, | 441 void AddAddress(int endpoint, |
440 const SocketAddress& addr, | 442 const SocketAddress& addr, |
(...skipping 1614 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
2055 ConfigureEndpoints(NAT_FULL_CONE, NAT_FULL_CONE, NAT_FULL_CONE); | 2057 ConfigureEndpoints(NAT_FULL_CONE, NAT_FULL_CONE, NAT_FULL_CONE); |
2056 Test( | 2058 Test( |
2057 P2PTransportChannelTestBase::Result("prflx", "udp", "stun", "udp", 1000)); | 2059 P2PTransportChannelTestBase::Result("prflx", "udp", "stun", "udp", 1000)); |
2058 } | 2060 } |
2059 | 2061 |
2060 // Test what happens when we have multiple available pathways. | 2062 // Test what happens when we have multiple available pathways. |
2061 // In the future we will try different RTTs and configs for the different | 2063 // In the future we will try different RTTs and configs for the different |
2062 // interfaces, so that we can simulate a user with Ethernet and VPN networks. | 2064 // interfaces, so that we can simulate a user with Ethernet and VPN networks. |
2063 class P2PTransportChannelMultihomedTest : public P2PTransportChannelTestBase { | 2065 class P2PTransportChannelMultihomedTest : public P2PTransportChannelTestBase { |
2064 public: | 2066 public: |
2065 const cricket::Connection* GetConnectionWithRemoteAddress( | 2067 const Connection* GetConnectionWithRemoteAddress( |
2066 cricket::P2PTransportChannel* channel, | 2068 P2PTransportChannel* channel, |
2067 const SocketAddress& address) { | 2069 const SocketAddress& address) { |
2068 for (cricket::Connection* conn : channel->connections()) { | 2070 for (Connection* conn : channel->connections()) { |
2069 if (conn->remote_candidate().address().EqualIPs(address)) { | 2071 if (conn->remote_candidate().address().EqualIPs(address)) { |
2070 return conn; | 2072 return conn; |
2071 } | 2073 } |
2072 } | 2074 } |
2073 return nullptr; | 2075 return nullptr; |
2074 } | 2076 } |
2075 | 2077 |
2076 cricket::Connection* GetConnectionWithLocalAddress( | 2078 Connection* GetConnectionWithLocalAddress(P2PTransportChannel* channel, |
2077 cricket::P2PTransportChannel* channel, | 2079 const SocketAddress& address) { |
2078 const SocketAddress& address) { | 2080 for (Connection* conn : channel->connections()) { |
2079 for (cricket::Connection* conn : channel->connections()) { | |
2080 if (conn->local_candidate().address().EqualIPs(address)) { | 2081 if (conn->local_candidate().address().EqualIPs(address)) { |
2081 return conn; | 2082 return conn; |
2082 } | 2083 } |
2083 } | 2084 } |
2084 return nullptr; | 2085 return nullptr; |
2085 } | 2086 } |
2086 | 2087 |
2087 void DestroyAllButBestConnection(cricket::P2PTransportChannel* channel) { | 2088 Connection* GetConnection(P2PTransportChannel* channel, |
2088 const cricket::Connection* selected_connection = | 2089 const SocketAddress& local, |
2089 channel->selected_connection(); | 2090 const SocketAddress& remote) { |
2090 for (cricket::Connection* conn : channel->connections()) { | 2091 for (Connection* conn : channel->connections()) { |
2092 if (conn->local_candidate().address().EqualIPs(local) && | |
2093 conn->remote_candidate().address().EqualIPs(remote)) { | |
2094 return conn; | |
2095 } | |
2096 } | |
2097 return nullptr; | |
2098 } | |
2099 | |
2100 void DestroyAllButBestConnection(P2PTransportChannel* channel) { | |
2101 const Connection* selected_connection = channel->selected_connection(); | |
2102 for (Connection* conn : channel->connections()) { | |
2091 if (conn != selected_connection) { | 2103 if (conn != selected_connection) { |
2092 conn->Destroy(); | 2104 conn->Destroy(); |
2093 } | 2105 } |
2094 } | 2106 } |
2095 } | 2107 } |
2096 }; | 2108 }; |
2097 | 2109 |
2098 // Test that we can establish connectivity when both peers are multihomed. | 2110 // Test that we can establish connectivity when both peers are multihomed. |
2099 TEST_F(P2PTransportChannelMultihomedTest, DISABLED_TestBasic) { | 2111 TEST_F(P2PTransportChannelMultihomedTest, DISABLED_TestBasic) { |
2100 AddAddress(0, kPublicAddrs[0]); | 2112 AddAddress(0, kPublicAddrs[0]); |
(...skipping 101 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
2202 kMediumTimeout, clock); | 2214 kMediumTimeout, clock); |
2203 EXPECT_TRUE( | 2215 EXPECT_TRUE( |
2204 LocalCandidate(ep1_ch1())->address().EqualIPs(kAlternateAddrs[0])); | 2216 LocalCandidate(ep1_ch1())->address().EqualIPs(kAlternateAddrs[0])); |
2205 EXPECT_TRUE(RemoteCandidate(ep1_ch1())->address().EqualIPs(kPublicAddrs[1])); | 2217 EXPECT_TRUE(RemoteCandidate(ep1_ch1())->address().EqualIPs(kPublicAddrs[1])); |
2206 EXPECT_TRUE( | 2218 EXPECT_TRUE( |
2207 RemoteCandidate(ep2_ch1())->address().EqualIPs(kAlternateAddrs[0])); | 2219 RemoteCandidate(ep2_ch1())->address().EqualIPs(kAlternateAddrs[0])); |
2208 | 2220 |
2209 DestroyChannels(); | 2221 DestroyChannels(); |
2210 } | 2222 } |
2211 | 2223 |
2224 // Tests that we can quickly switch links if an interface goes down when | |
2225 // there are many connections. | |
2226 TEST_F(P2PTransportChannelMultihomedTest, TestFailoverWithManyConnections) { | |
2227 rtc::ScopedFakeClock clock; | |
2228 test_turn_server()->AddInternalSocket(kTurnTcpIntAddr, PROTO_TCP); | |
2229 RelayServerConfig turn_server(RELAY_TURN); | |
2230 turn_server.credentials = kRelayCredentials; | |
2231 turn_server.ports.push_back( | |
2232 ProtocolAddress(kTurnTcpIntAddr, PROTO_TCP, false)); | |
2233 GetAllocator(0)->AddTurnServer(turn_server); | |
2234 GetAllocator(1)->AddTurnServer(turn_server); | |
2235 // Enable IPv6 | |
2236 SetAllocatorFlags(0, PORTALLOCATOR_ENABLE_IPV6); | |
2237 SetAllocatorFlags(1, PORTALLOCATOR_ENABLE_IPV6); | |
2238 SetAllocationStepDelay(0, kMinimumStepDelay); | |
2239 SetAllocationStepDelay(1, kMinimumStepDelay); | |
2240 | |
2241 auto& wifi = kPublicAddrs; | |
2242 auto& cellular = kAlternateAddrs; | |
2243 auto& wifiIpv6 = kIPv6PublicAddrs; | |
2244 auto& cellularIpv6 = kIPv6AlternateAddrs; | |
2245 AddAddress(0, wifi[0], "wifi0", rtc::ADAPTER_TYPE_WIFI); | |
2246 AddAddress(0, wifiIpv6[0], "wifi0", rtc::ADAPTER_TYPE_WIFI); | |
2247 AddAddress(0, cellular[0], "cellular0", rtc::ADAPTER_TYPE_CELLULAR); | |
2248 AddAddress(0, cellularIpv6[0], "cellular0", rtc::ADAPTER_TYPE_CELLULAR); | |
2249 AddAddress(1, wifi[1], "wifi1", rtc::ADAPTER_TYPE_WIFI); | |
2250 AddAddress(1, wifiIpv6[1], "wifi1", rtc::ADAPTER_TYPE_WIFI); | |
2251 AddAddress(1, cellular[1], "cellular1", rtc::ADAPTER_TYPE_CELLULAR); | |
2252 AddAddress(1, cellularIpv6[1], "cellular1", rtc::ADAPTER_TYPE_CELLULAR); | |
2253 | |
2254 // Set smaller delay on the TCP TURN server so that TCP TURN candidates | |
2255 // will be created in time. | |
2256 virtual_socket_server()->SetDelayOnAddress(kTurnTcpIntAddr, 1); | |
2257 virtual_socket_server()->SetDelayOnAddress(kTurnUdpExtAddr, 1); | |
2258 virtual_socket_server()->set_delay_mean(500); | |
2259 virtual_socket_server()->UpdateDelayDistribution(); | |
2260 | |
2261 // Make the receiving timeout shorter for testing. | |
2262 IceConfig config = CreateIceConfig(1000, GATHER_CONTINUALLY); | |
2263 // Create channels and let them go writable, as usual. | |
2264 CreateChannels(config, config, true /* ice_renomination */); | |
2265 EXPECT_TRUE_SIMULATED_WAIT(ep1_ch1()->receiving() && ep1_ch1()->writable() && | |
2266 ep2_ch1()->receiving() && | |
2267 ep2_ch1()->writable(), | |
2268 kMediumTimeout, clock); | |
2269 EXPECT_TRUE_SIMULATED_WAIT( | |
2270 ep1_ch1()->selected_connection() && ep2_ch1()->selected_connection() && | |
2271 LocalCandidate(ep1_ch1())->address().EqualIPs(wifiIpv6[0]) && | |
2272 RemoteCandidate(ep1_ch1())->address().EqualIPs(wifiIpv6[1]), | |
2273 kMediumTimeout, clock); | |
2274 | |
2275 // Blackhole any traffic to or from the wifi on endpoint 1. | |
2276 LOG(LS_INFO) << "Failing over..."; | |
2277 fw()->AddRule(false, rtc::FP_ANY, rtc::FD_ANY, wifi[0]); | |
2278 fw()->AddRule(false, rtc::FP_ANY, rtc::FD_ANY, wifiIpv6[0]); | |
2279 | |
2280 // The selected connections may switch, so keep references to them. | |
2281 const Connection* selected_connection1 = ep1_ch1()->selected_connection(); | |
2282 const Connection* selected_connection2 = ep2_ch1()->selected_connection(); | |
2283 EXPECT_TRUE_SIMULATED_WAIT( | |
2284 !selected_connection1->receiving() && !selected_connection2->receiving(), | |
2285 kMediumTimeout, clock); | |
2286 | |
2287 // Premier connections will be pinged at relatively higher rate when the | |
2288 // selected connection becomes not receiving. | |
2289 Connection* premier_connection1 = | |
2290 GetConnection(ep1_ch1(), cellularIpv6[0], wifiIpv6[1]); | |
2291 ASSERT_NE(nullptr, premier_connection1); | |
2292 int64_t last_ping_sent1 = premier_connection1->last_ping_sent(); | |
2293 int num_pings_sent1 = premier_connection1->num_pings_sent(); | |
2294 EXPECT_TRUE_SIMULATED_WAIT( | |
2295 num_pings_sent1 < premier_connection1->num_pings_sent(), kMediumTimeout, | |
2296 clock); | |
2297 int64_t ping_interval1 = | |
2298 (premier_connection1->last_ping_sent() - last_ping_sent1) / | |
2299 (premier_connection1->num_pings_sent() - num_pings_sent1); | |
2300 constexpr int SCHEDULING_DELAY = 200; | |
2301 EXPECT_LT( | |
2302 ping_interval1, | |
2303 WEAK_OR_STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL + SCHEDULING_DELAY); | |
Taylor Brandstetter
2016/10/21 20:18:49
This condition seems a little too specific for thi
honghaiz3
2016/10/21 21:27:26
That would require very similar setup (including m
| |
2304 | |
2305 // It should switch over to use the cellular IPv6 addr on endpoint 1 before | |
2306 // it timed out on writing. | |
2307 EXPECT_TRUE_SIMULATED_WAIT( | |
2308 ep1_ch1()->selected_connection()->receiving() && | |
2309 ep2_ch1()->selected_connection()->receiving() && | |
2310 RemoteCandidate(ep2_ch1())->address().EqualIPs(cellularIpv6[0]) && | |
2311 LocalCandidate(ep1_ch1())->address().EqualIPs(cellularIpv6[0]), | |
2312 kMediumTimeout, clock); | |
2313 | |
2314 DestroyChannels(); | |
2315 } | |
2316 | |
2212 // Test that when the controlling side switches the selected connection, | 2317 // Test that when the controlling side switches the selected connection, |
2213 // the nomination of the selected connection on the controlled side will | 2318 // the nomination of the selected connection on the controlled side will |
2214 // increase. | 2319 // increase. |
2215 TEST_F(P2PTransportChannelMultihomedTest, TestIceRenomination) { | 2320 TEST_F(P2PTransportChannelMultihomedTest, TestIceRenomination) { |
2216 rtc::ScopedFakeClock clock; | 2321 rtc::ScopedFakeClock clock; |
2217 // Adding alternate address will make sure |kPublicAddrs| has the higher | 2322 // Adding alternate address will make sure |kPublicAddrs| has the higher |
2218 // priority than others. This is due to FakeNetwork::AddInterface method. | 2323 // priority than others. This is due to FakeNetwork::AddInterface method. |
2219 AddAddress(0, kAlternateAddrs[0]); | 2324 AddAddress(0, kAlternateAddrs[0]); |
2220 AddAddress(0, kPublicAddrs[0]); | 2325 AddAddress(0, kPublicAddrs[0]); |
2221 AddAddress(1, kPublicAddrs[1]); | 2326 AddAddress(1, kPublicAddrs[1]); |
(...skipping 396 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
2618 CreateChannels(continual_gathering_config, continual_gathering_config); | 2723 CreateChannels(continual_gathering_config, continual_gathering_config); |
2619 SetAllocatorFlags(0, kOnlyLocalPorts); | 2724 SetAllocatorFlags(0, kOnlyLocalPorts); |
2620 SetAllocatorFlags(1, kOnlyLocalPorts); | 2725 SetAllocatorFlags(1, kOnlyLocalPorts); |
2621 EXPECT_TRUE_WAIT_MARGIN(ep1_ch1()->receiving() && ep1_ch1()->writable() && | 2726 EXPECT_TRUE_WAIT_MARGIN(ep1_ch1()->receiving() && ep1_ch1()->writable() && |
2622 ep2_ch1()->receiving() && ep2_ch1()->writable(), | 2727 ep2_ch1()->receiving() && ep2_ch1()->writable(), |
2623 kDefaultTimeout, kDefaultTimeout); | 2728 kDefaultTimeout, kDefaultTimeout); |
2624 | 2729 |
2625 // Add a new wifi interface on end point 2. We should expect a new connection | 2730 // Add a new wifi interface on end point 2. We should expect a new connection |
2626 // to be created and the new one will be the best connection. | 2731 // to be created and the new one will be the best connection. |
2627 AddAddress(1, wifi[1], "test_wifi1", rtc::ADAPTER_TYPE_WIFI); | 2732 AddAddress(1, wifi[1], "test_wifi1", rtc::ADAPTER_TYPE_WIFI); |
2628 const cricket::Connection* conn; | 2733 const Connection* conn; |
2629 EXPECT_TRUE_WAIT((conn = ep1_ch1()->selected_connection()) != nullptr && | 2734 EXPECT_TRUE_WAIT((conn = ep1_ch1()->selected_connection()) != nullptr && |
2630 conn->remote_candidate().address().EqualIPs(wifi[1]), | 2735 conn->remote_candidate().address().EqualIPs(wifi[1]), |
2631 kDefaultTimeout); | 2736 kDefaultTimeout); |
2632 EXPECT_TRUE_WAIT((conn = ep2_ch1()->selected_connection()) != nullptr && | 2737 EXPECT_TRUE_WAIT((conn = ep2_ch1()->selected_connection()) != nullptr && |
2633 conn->local_candidate().address().EqualIPs(wifi[1]), | 2738 conn->local_candidate().address().EqualIPs(wifi[1]), |
2634 kDefaultTimeout); | 2739 kDefaultTimeout); |
2635 | 2740 |
2636 // Add a new cellular interface on end point 1, we should expect a new | 2741 // Add a new cellular interface on end point 1, we should expect a new |
2637 // backup connection created using this new interface. | 2742 // backup connection created using this new interface. |
2638 AddAddress(0, cellular[0], "test_cellular0", rtc::ADAPTER_TYPE_CELLULAR); | 2743 AddAddress(0, cellular[0], "test_cellular0", rtc::ADAPTER_TYPE_CELLULAR); |
2639 EXPECT_TRUE_WAIT( | 2744 EXPECT_TRUE_WAIT( |
2640 ep1_ch1()->GetState() == cricket::STATE_COMPLETED && | 2745 ep1_ch1()->GetState() == STATE_COMPLETED && |
2641 (conn = GetConnectionWithLocalAddress(ep1_ch1(), cellular[0])) != | 2746 (conn = GetConnectionWithLocalAddress(ep1_ch1(), cellular[0])) != |
2642 nullptr && | 2747 nullptr && |
2643 conn != ep1_ch1()->selected_connection() && conn->writable(), | 2748 conn != ep1_ch1()->selected_connection() && conn->writable(), |
2644 kDefaultTimeout); | 2749 kDefaultTimeout); |
2645 EXPECT_TRUE_WAIT( | 2750 EXPECT_TRUE_WAIT( |
2646 ep2_ch1()->GetState() == cricket::STATE_COMPLETED && | 2751 ep2_ch1()->GetState() == STATE_COMPLETED && |
2647 (conn = GetConnectionWithRemoteAddress(ep2_ch1(), cellular[0])) != | 2752 (conn = GetConnectionWithRemoteAddress(ep2_ch1(), cellular[0])) != |
2648 nullptr && | 2753 nullptr && |
2649 conn != ep2_ch1()->selected_connection() && conn->receiving(), | 2754 conn != ep2_ch1()->selected_connection() && conn->receiving(), |
2650 kDefaultTimeout); | 2755 kDefaultTimeout); |
2651 | 2756 |
2652 DestroyChannels(); | 2757 DestroyChannels(); |
2653 } | 2758 } |
2654 | 2759 |
2655 // Tests that we can switch links via continual gathering. | 2760 // Tests that we can switch links via continual gathering. |
2656 TEST_F(P2PTransportChannelMultihomedTest, | 2761 TEST_F(P2PTransportChannelMultihomedTest, |
(...skipping 116 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
2773 ep2_ch1()->selected_connection() && | 2878 ep2_ch1()->selected_connection() && |
2774 LocalCandidate(ep1_ch1())->address().EqualIPs(wifi[0]) && | 2879 LocalCandidate(ep1_ch1())->address().EqualIPs(wifi[0]) && |
2775 RemoteCandidate(ep1_ch1())->address().EqualIPs(wifi[1])); | 2880 RemoteCandidate(ep1_ch1())->address().EqualIPs(wifi[1])); |
2776 | 2881 |
2777 // Destroy all backup connections. | 2882 // Destroy all backup connections. |
2778 DestroyAllButBestConnection(ep1_ch1()); | 2883 DestroyAllButBestConnection(ep1_ch1()); |
2779 // Ensure the backup connection is removed first. | 2884 // Ensure the backup connection is removed first. |
2780 EXPECT_TRUE_SIMULATED_WAIT( | 2885 EXPECT_TRUE_SIMULATED_WAIT( |
2781 GetConnectionWithLocalAddress(ep1_ch1(), cellular[0]) == nullptr, | 2886 GetConnectionWithLocalAddress(ep1_ch1(), cellular[0]) == nullptr, |
2782 kDefaultTimeout, clock); | 2887 kDefaultTimeout, clock); |
2783 const cricket::Connection* conn; | 2888 const Connection* conn; |
2784 EXPECT_TRUE_SIMULATED_WAIT( | 2889 EXPECT_TRUE_SIMULATED_WAIT( |
2785 (conn = GetConnectionWithLocalAddress(ep1_ch1(), cellular[0])) != | 2890 (conn = GetConnectionWithLocalAddress(ep1_ch1(), cellular[0])) != |
2786 nullptr && | 2891 nullptr && |
2787 conn != ep1_ch1()->selected_connection() && conn->writable(), | 2892 conn != ep1_ch1()->selected_connection() && conn->writable(), |
2788 kDefaultTimeout, clock); | 2893 kDefaultTimeout, clock); |
2789 | 2894 |
2790 DestroyChannels(); | 2895 DestroyChannels(); |
2791 } | 2896 } |
2792 | 2897 |
2793 // A collection of tests which tests a single P2PTransportChannel by sending | 2898 // A collection of tests which tests a single P2PTransportChannel by sending |
(...skipping 237 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
3031 // Stabilizing. | 3136 // Stabilizing. |
3032 | 3137 |
3033 conn->ReceivedPingResponse(LOW_RTT, "id"); | 3138 conn->ReceivedPingResponse(LOW_RTT, "id"); |
3034 int ping_sent_before = conn->num_pings_sent(); | 3139 int ping_sent_before = conn->num_pings_sent(); |
3035 start = clock.TimeNanos(); | 3140 start = clock.TimeNanos(); |
3036 // The connection becomes strong but not stable because we haven't been able | 3141 // The connection becomes strong but not stable because we haven't been able |
3037 // to converge the RTT. | 3142 // to converge the RTT. |
3038 SIMULATED_WAIT(conn->num_pings_sent() == ping_sent_before + 1, kMediumTimeout, | 3143 SIMULATED_WAIT(conn->num_pings_sent() == ping_sent_before + 1, kMediumTimeout, |
3039 clock); | 3144 clock); |
3040 ping_interval_ms = (clock.TimeNanos() - start) / rtc::kNumNanosecsPerMillisec; | 3145 ping_interval_ms = (clock.TimeNanos() - start) / rtc::kNumNanosecsPerMillisec; |
3041 EXPECT_GE(ping_interval_ms, STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL); | 3146 EXPECT_GE(ping_interval_ms, |
3042 EXPECT_LE(ping_interval_ms, | 3147 WEAK_OR_STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL); |
3043 STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL + SCHEDULING_RANGE); | 3148 EXPECT_LE( |
3149 ping_interval_ms, | |
3150 WEAK_OR_STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL + SCHEDULING_RANGE); | |
3044 | 3151 |
3045 // Stabilized. | 3152 // Stabilized. |
3046 | 3153 |
3047 // The connection becomes stable after receiving more than RTT_RATIO rtt | 3154 // The connection becomes stable after receiving more than RTT_RATIO rtt |
3048 // samples. | 3155 // samples. |
3049 for (int i = 0; i < RTT_RATIO; i++) { | 3156 for (int i = 0; i < RTT_RATIO; i++) { |
3050 conn->ReceivedPingResponse(LOW_RTT, "id"); | 3157 conn->ReceivedPingResponse(LOW_RTT, "id"); |
3051 } | 3158 } |
3052 ping_sent_before = conn->num_pings_sent(); | 3159 ping_sent_before = conn->num_pings_sent(); |
3053 start = clock.TimeNanos(); | 3160 start = clock.TimeNanos(); |
3054 SIMULATED_WAIT(conn->num_pings_sent() == ping_sent_before + 1, kMediumTimeout, | 3161 SIMULATED_WAIT(conn->num_pings_sent() == ping_sent_before + 1, kMediumTimeout, |
3055 clock); | 3162 clock); |
3056 ping_interval_ms = (clock.TimeNanos() - start) / rtc::kNumNanosecsPerMillisec; | 3163 ping_interval_ms = (clock.TimeNanos() - start) / rtc::kNumNanosecsPerMillisec; |
3057 EXPECT_GE(ping_interval_ms, STABLE_WRITABLE_CONNECTION_PING_INTERVAL); | 3164 EXPECT_GE(ping_interval_ms, |
3058 EXPECT_LE(ping_interval_ms, | 3165 STRONG_AND_STABLE_WRITABLE_CONNECTION_PING_INTERVAL); |
3059 STABLE_WRITABLE_CONNECTION_PING_INTERVAL + SCHEDULING_RANGE); | 3166 EXPECT_LE( |
3167 ping_interval_ms, | |
3168 STRONG_AND_STABLE_WRITABLE_CONNECTION_PING_INTERVAL + SCHEDULING_RANGE); | |
3060 | 3169 |
3061 // Destabilized. | 3170 // Destabilized. |
3062 | 3171 |
3063 conn->ReceivedPingResponse(LOW_RTT, "id"); | 3172 conn->ReceivedPingResponse(LOW_RTT, "id"); |
3064 // Create a in-flight ping. | 3173 // Create a in-flight ping. |
3065 conn->Ping(clock.TimeNanos() / rtc::kNumNanosecsPerMillisec); | 3174 conn->Ping(clock.TimeNanos() / rtc::kNumNanosecsPerMillisec); |
3066 start = clock.TimeNanos(); | 3175 start = clock.TimeNanos(); |
3067 // In-flight ping timeout and the connection will be unstable. | 3176 // In-flight ping timeout and the connection will be unstable. |
3068 SIMULATED_WAIT( | 3177 SIMULATED_WAIT( |
3069 !conn->stable(clock.TimeNanos() / rtc::kNumNanosecsPerMillisec), | 3178 !conn->stable(clock.TimeNanos() / rtc::kNumNanosecsPerMillisec), |
3070 kMediumTimeout, clock); | 3179 kMediumTimeout, clock); |
3071 int64_t duration_ms = | 3180 int64_t duration_ms = |
3072 (clock.TimeNanos() - start) / rtc::kNumNanosecsPerMillisec; | 3181 (clock.TimeNanos() - start) / rtc::kNumNanosecsPerMillisec; |
3073 EXPECT_GE(duration_ms, 2 * conn->rtt() - RTT_RANGE); | 3182 EXPECT_GE(duration_ms, 2 * conn->rtt() - RTT_RANGE); |
3074 EXPECT_LE(duration_ms, 2 * conn->rtt() + RTT_RANGE); | 3183 EXPECT_LE(duration_ms, 2 * conn->rtt() + RTT_RANGE); |
3075 // The connection become unstable due to not receiving ping responses. | 3184 // The connection become unstable due to not receiving ping responses. |
3076 ping_sent_before = conn->num_pings_sent(); | 3185 ping_sent_before = conn->num_pings_sent(); |
3077 SIMULATED_WAIT(conn->num_pings_sent() == ping_sent_before + 1, kMediumTimeout, | 3186 SIMULATED_WAIT(conn->num_pings_sent() == ping_sent_before + 1, kMediumTimeout, |
3078 clock); | 3187 clock); |
3079 // The interval is expected to be | 3188 // The interval is expected to be |
3080 // STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL. | 3189 // WEAK_OR_STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL. |
3081 start = clock.TimeNanos(); | 3190 start = clock.TimeNanos(); |
3082 ping_sent_before = conn->num_pings_sent(); | 3191 ping_sent_before = conn->num_pings_sent(); |
3083 SIMULATED_WAIT(conn->num_pings_sent() == ping_sent_before + 1, kMediumTimeout, | 3192 SIMULATED_WAIT(conn->num_pings_sent() == ping_sent_before + 1, kMediumTimeout, |
3084 clock); | 3193 clock); |
3085 ping_interval_ms = (clock.TimeNanos() - start) / rtc::kNumNanosecsPerMillisec; | 3194 ping_interval_ms = (clock.TimeNanos() - start) / rtc::kNumNanosecsPerMillisec; |
3086 EXPECT_GE(ping_interval_ms, STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL); | 3195 EXPECT_GE(ping_interval_ms, |
3087 EXPECT_LE(ping_interval_ms, | 3196 WEAK_OR_STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL); |
3088 STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL + SCHEDULING_RANGE); | 3197 EXPECT_LE( |
3198 ping_interval_ms, | |
3199 WEAK_OR_STABILIZING_WRITABLE_CONNECTION_PING_INTERVAL + SCHEDULING_RANGE); | |
3089 } | 3200 } |
3090 | 3201 |
3091 // Test that we start pinging as soon as we have a connection and remote ICE | 3202 // Test that we start pinging as soon as we have a connection and remote ICE |
3092 // parameters. | 3203 // parameters. |
3093 TEST_F(P2PTransportChannelPingTest, PingingStartedAsSoonAsPossible) { | 3204 TEST_F(P2PTransportChannelPingTest, PingingStartedAsSoonAsPossible) { |
3094 rtc::ScopedFakeClock clock; | 3205 rtc::ScopedFakeClock clock; |
3095 | 3206 |
3096 FakePortAllocator pa(rtc::Thread::Current(), nullptr); | 3207 FakePortAllocator pa(rtc::Thread::Current(), nullptr); |
3097 P2PTransportChannel ch("TestChannel", 1, &pa); | 3208 P2PTransportChannel ch("TestChannel", 1, &pa); |
3098 ch.SetIceRole(ICEROLE_CONTROLLING); | 3209 ch.SetIceRole(ICEROLE_CONTROLLING); |
(...skipping 1136 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
4235 | 4346 |
4236 // TCP Relay/Relay is the next. | 4347 // TCP Relay/Relay is the next. |
4237 VerifyNextPingableConnection(RELAY_PORT_TYPE, RELAY_PORT_TYPE, | 4348 VerifyNextPingableConnection(RELAY_PORT_TYPE, RELAY_PORT_TYPE, |
4238 TCP_PROTOCOL_NAME); | 4349 TCP_PROTOCOL_NAME); |
4239 | 4350 |
4240 // Finally, Local/Relay will be pinged. | 4351 // Finally, Local/Relay will be pinged. |
4241 VerifyNextPingableConnection(LOCAL_PORT_TYPE, RELAY_PORT_TYPE); | 4352 VerifyNextPingableConnection(LOCAL_PORT_TYPE, RELAY_PORT_TYPE); |
4242 } | 4353 } |
4243 | 4354 |
4244 } // namespace cricket { | 4355 } // namespace cricket { |
OLD | NEW |