mirror of
https://github.com/mollyim/webrtc.git
synced 2025-05-12 21:30:45 +01:00
Change internal candidate type to enum
Bug: webrtc:15846 Change-Id: I66480cd2a239655a897af5ed2625959e8d6cc33a Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/338644 Reviewed-by: Harald Alvestrand <hta@webrtc.org> Commit-Queue: Tomas Gunnarsson <tommi@webrtc.org> Cr-Commit-Position: refs/heads/main@{#41802}
This commit is contained in:
parent
a021d99d2a
commit
c7a4b2a7eb
7 changed files with 347 additions and 193 deletions
|
@ -18,6 +18,23 @@
|
|||
#include "rtc_base/logging.h"
|
||||
#include "rtc_base/strings/string_builder.h"
|
||||
|
||||
using webrtc::IceCandidateType;
|
||||
|
||||
namespace webrtc {
|
||||
absl::string_view IceCandidateTypeToString(IceCandidateType type) {
|
||||
switch (type) {
|
||||
case IceCandidateType::kHost:
|
||||
return "host";
|
||||
case IceCandidateType::kSrflx:
|
||||
return "srflx";
|
||||
case IceCandidateType::kPrflx:
|
||||
return "prflx";
|
||||
case IceCandidateType::kRelay:
|
||||
return "relay";
|
||||
}
|
||||
}
|
||||
} // namespace webrtc
|
||||
|
||||
namespace cricket {
|
||||
|
||||
ABSL_CONST_INIT const absl::string_view LOCAL_PORT_TYPE = "local";
|
||||
|
@ -25,11 +42,25 @@ ABSL_CONST_INIT const absl::string_view STUN_PORT_TYPE = "stun";
|
|||
ABSL_CONST_INIT const absl::string_view PRFLX_PORT_TYPE = "prflx";
|
||||
ABSL_CONST_INIT const absl::string_view RELAY_PORT_TYPE = "relay";
|
||||
|
||||
namespace {
|
||||
IceCandidateType CandidateTypeFromString(absl::string_view type) {
|
||||
if (type == LOCAL_PORT_TYPE) {
|
||||
return IceCandidateType::kHost;
|
||||
} else if (type == STUN_PORT_TYPE) {
|
||||
return IceCandidateType::kSrflx;
|
||||
} else if (type == PRFLX_PORT_TYPE) {
|
||||
return IceCandidateType::kPrflx;
|
||||
} else {
|
||||
RTC_DCHECK_EQ(type, RELAY_PORT_TYPE);
|
||||
return IceCandidateType::kRelay;
|
||||
}
|
||||
}
|
||||
} // namespace
|
||||
|
||||
Candidate::Candidate()
|
||||
: id_(rtc::CreateRandomString(8)),
|
||||
component_(ICE_CANDIDATE_COMPONENT_DEFAULT),
|
||||
priority_(0),
|
||||
type_(LOCAL_PORT_TYPE),
|
||||
network_type_(rtc::ADAPTER_TYPE_UNKNOWN),
|
||||
underlying_type_for_vpn_(rtc::ADAPTER_TYPE_UNKNOWN),
|
||||
generation_(0),
|
||||
|
@ -42,11 +73,11 @@ Candidate::Candidate(int component,
|
|||
uint32_t priority,
|
||||
absl::string_view username,
|
||||
absl::string_view password,
|
||||
absl::string_view type,
|
||||
webrtc::IceCandidateType type,
|
||||
uint32_t generation,
|
||||
absl::string_view foundation,
|
||||
uint16_t network_id,
|
||||
uint16_t network_cost)
|
||||
uint16_t network_id /*= 0*/,
|
||||
uint16_t network_cost /*= 0*/)
|
||||
: id_(rtc::CreateRandomString(8)),
|
||||
component_(component),
|
||||
protocol_(protocol),
|
||||
|
@ -62,6 +93,29 @@ Candidate::Candidate(int component,
|
|||
network_id_(network_id),
|
||||
network_cost_(network_cost) {}
|
||||
|
||||
Candidate::Candidate(int component,
|
||||
absl::string_view protocol,
|
||||
const rtc::SocketAddress& address,
|
||||
uint32_t priority,
|
||||
absl::string_view username,
|
||||
absl::string_view password,
|
||||
absl::string_view type,
|
||||
uint32_t generation,
|
||||
absl::string_view foundation,
|
||||
uint16_t network_id,
|
||||
uint16_t network_cost)
|
||||
: Candidate(component,
|
||||
protocol,
|
||||
address,
|
||||
priority,
|
||||
username,
|
||||
password,
|
||||
CandidateTypeFromString(type),
|
||||
generation,
|
||||
foundation,
|
||||
network_id,
|
||||
network_cost) {}
|
||||
|
||||
Candidate::Candidate(const Candidate&) = default;
|
||||
|
||||
Candidate::~Candidate() = default;
|
||||
|
@ -70,28 +124,25 @@ void Candidate::generate_id() {
|
|||
id_ = rtc::CreateRandomString(8);
|
||||
}
|
||||
|
||||
void Candidate::set_type(absl::string_view type ABSL_ATTRIBUTE_LIFETIME_BOUND) {
|
||||
set_type(CandidateTypeFromString(type));
|
||||
}
|
||||
|
||||
bool Candidate::is_local() const {
|
||||
return type_ == LOCAL_PORT_TYPE;
|
||||
return type_ == IceCandidateType::kHost;
|
||||
}
|
||||
bool Candidate::is_stun() const {
|
||||
return type_ == STUN_PORT_TYPE;
|
||||
return type_ == IceCandidateType::kSrflx;
|
||||
}
|
||||
bool Candidate::is_prflx() const {
|
||||
return type_ == PRFLX_PORT_TYPE;
|
||||
return type_ == IceCandidateType::kPrflx;
|
||||
}
|
||||
bool Candidate::is_relay() const {
|
||||
return type_ == RELAY_PORT_TYPE;
|
||||
return type_ == IceCandidateType::kRelay;
|
||||
}
|
||||
|
||||
absl::string_view Candidate::type_name() const {
|
||||
// The LOCAL_PORT_TYPE and STUN_PORT_TYPE constants are not the standard type
|
||||
// names, so check for those specifically. For other types, `type_` will have
|
||||
// the correct name.
|
||||
if (is_local())
|
||||
return "host";
|
||||
if (is_stun())
|
||||
return "srflx";
|
||||
return type_;
|
||||
return webrtc::IceCandidateTypeToString(type_);
|
||||
}
|
||||
|
||||
bool Candidate::IsEquivalent(const Candidate& c) const {
|
||||
|
@ -229,7 +280,7 @@ void Candidate::ComputeFoundation(const rtc::SocketAddress& base_address,
|
|||
// transport protocols are different.
|
||||
|
||||
rtc::StringBuilder sb;
|
||||
sb << type_ << base_address.ipaddr().ToString() << protocol_
|
||||
sb << type_name() << base_address.ipaddr().ToString() << protocol_
|
||||
<< relay_protocol_;
|
||||
|
||||
// https://www.rfc-editor.org/rfc/rfc5245#section-5.2
|
||||
|
|
|
@ -26,6 +26,7 @@
|
|||
|
||||
namespace webrtc {
|
||||
enum class IceCandidateType : int { kHost, kSrflx, kPrflx, kRelay };
|
||||
RTC_EXPORT absl::string_view IceCandidateTypeToString(IceCandidateType);
|
||||
} // namespace webrtc
|
||||
|
||||
namespace cricket {
|
||||
|
@ -42,13 +43,21 @@ RTC_EXPORT extern const absl::string_view RELAY_PORT_TYPE;
|
|||
static constexpr size_t kMaxTurnServers = 32;
|
||||
|
||||
// Candidate for ICE based connection discovery.
|
||||
// TODO(phoglund): remove things in here that are not needed in the public API.
|
||||
|
||||
class RTC_EXPORT Candidate {
|
||||
public:
|
||||
Candidate();
|
||||
// TODO(pthatcher): Match the ordering and param list as per RFC 5245
|
||||
// candidate-attribute syntax. http://tools.ietf.org/html/rfc5245#section-15.1
|
||||
Candidate(int component,
|
||||
absl::string_view protocol,
|
||||
const rtc::SocketAddress& address,
|
||||
uint32_t priority,
|
||||
absl::string_view username,
|
||||
absl::string_view password,
|
||||
webrtc::IceCandidateType type,
|
||||
uint32_t generation,
|
||||
absl::string_view foundation,
|
||||
uint16_t network_id = 0,
|
||||
uint16_t network_cost = 0);
|
||||
// TODO(tommi): Deprecate.
|
||||
Candidate(int component,
|
||||
absl::string_view protocol,
|
||||
const rtc::SocketAddress& address,
|
||||
|
@ -103,7 +112,7 @@ class RTC_EXPORT Candidate {
|
|||
const std::string& password() const { return password_; }
|
||||
void set_password(absl::string_view password) { Assign(password_, password); }
|
||||
|
||||
const std::string& type() const { return type_; }
|
||||
webrtc::IceCandidateType type() const { return type_; }
|
||||
|
||||
// Returns the name of the candidate type as specified in
|
||||
// https://datatracker.ietf.org/doc/html/rfc5245#section-15.1
|
||||
|
@ -113,13 +122,14 @@ class RTC_EXPORT Candidate {
|
|||
// cricket::LOCAL_PORT_TYPE). The type should really be an enum rather than a
|
||||
// string, but until we make that change the lifetime attribute helps us lock
|
||||
// things down. See also the `Port` class.
|
||||
void set_type(absl::string_view type ABSL_ATTRIBUTE_LIFETIME_BOUND) {
|
||||
Assign(type_, type);
|
||||
}
|
||||
void set_type(webrtc::IceCandidateType type) { type_ = type; }
|
||||
|
||||
// Provide these simple checkers to abstract away dependency on the port types
|
||||
// that are currently defined outside of Candidate. This will ease the change
|
||||
// from the string type to an enum.
|
||||
// TODO(tommi): Deprecate.
|
||||
void set_type(absl::string_view type ABSL_ATTRIBUTE_LIFETIME_BOUND);
|
||||
|
||||
// Simple checkers for checking the candidate type without dependency on the
|
||||
// IceCandidateType enum. The `is_local()` and `is_stun()` names are legacy
|
||||
// names and should now more accurately be `is_host()` and `is_srflx()`.
|
||||
bool is_local() const;
|
||||
bool is_stun() const;
|
||||
bool is_prflx() const;
|
||||
|
@ -271,7 +281,7 @@ class RTC_EXPORT Candidate {
|
|||
uint32_t priority_;
|
||||
std::string username_;
|
||||
std::string password_;
|
||||
std::string type_;
|
||||
webrtc::IceCandidateType type_ = webrtc::IceCandidateType::kHost;
|
||||
std::string network_name_;
|
||||
rtc::AdapterType network_type_;
|
||||
rtc::AdapterType underlying_type_for_vpn_;
|
||||
|
|
|
@ -15,6 +15,8 @@
|
|||
#include "p2p/base/p2p_constants.h"
|
||||
#include "rtc_base/gunit.h"
|
||||
|
||||
using webrtc::IceCandidateType;
|
||||
|
||||
namespace cricket {
|
||||
|
||||
TEST(CandidateTest, Id) {
|
||||
|
@ -38,19 +40,19 @@ TEST(CandidateTest, TypeName) {
|
|||
Candidate c;
|
||||
// The `type_name()` property defaults to "host".
|
||||
EXPECT_EQ(c.type_name(), "host");
|
||||
EXPECT_EQ(c.type(), LOCAL_PORT_TYPE);
|
||||
EXPECT_EQ(c.type(), IceCandidateType::kHost);
|
||||
|
||||
c.set_type(STUN_PORT_TYPE);
|
||||
c.set_type(IceCandidateType::kSrflx);
|
||||
EXPECT_EQ(c.type_name(), "srflx");
|
||||
EXPECT_EQ(c.type(), STUN_PORT_TYPE);
|
||||
EXPECT_EQ(c.type(), IceCandidateType::kSrflx);
|
||||
|
||||
c.set_type(PRFLX_PORT_TYPE);
|
||||
c.set_type(IceCandidateType::kPrflx);
|
||||
EXPECT_EQ(c.type_name(), "prflx");
|
||||
EXPECT_EQ(c.type(), PRFLX_PORT_TYPE);
|
||||
EXPECT_EQ(c.type(), IceCandidateType::kPrflx);
|
||||
|
||||
c.set_type(RELAY_PORT_TYPE);
|
||||
c.set_type(IceCandidateType::kRelay);
|
||||
EXPECT_EQ(c.type_name(), "relay");
|
||||
EXPECT_EQ(c.type(), RELAY_PORT_TYPE);
|
||||
EXPECT_EQ(c.type(), IceCandidateType::kRelay);
|
||||
}
|
||||
|
||||
TEST(CandidateTest, Foundation) {
|
||||
|
|
|
@ -45,7 +45,25 @@
|
|||
#include "rtc_base/trace_event.h"
|
||||
#include "system_wrappers/include/metrics.h"
|
||||
|
||||
namespace cricket {
|
||||
namespace {
|
||||
using ::webrtc::IceCandidateType;
|
||||
using ::webrtc::RTCError;
|
||||
using ::webrtc::RTCErrorType;
|
||||
using ::webrtc::SafeTask;
|
||||
using ::webrtc::TimeDelta;
|
||||
|
||||
IceCandidateType PortTypeToIceCandidateType(PortInterface* port) {
|
||||
auto type = port->Type();
|
||||
if (type == LOCAL_PORT_TYPE)
|
||||
return IceCandidateType::kHost;
|
||||
if (type == STUN_PORT_TYPE)
|
||||
return IceCandidateType::kSrflx;
|
||||
if (type == PRFLX_PORT_TYPE)
|
||||
return IceCandidateType::kPrflx;
|
||||
RTC_DCHECK_EQ(type, RELAY_PORT_TYPE);
|
||||
return IceCandidateType::kRelay;
|
||||
}
|
||||
|
||||
cricket::PortInterface::CandidateOrigin GetOrigin(
|
||||
cricket::PortInterface* port,
|
||||
|
@ -91,15 +109,8 @@ rtc::RouteEndpoint CreateRouteEndpointFromCandidate(
|
|||
uses_turn);
|
||||
}
|
||||
|
||||
using ::webrtc::RTCError;
|
||||
using ::webrtc::RTCErrorType;
|
||||
using ::webrtc::SafeTask;
|
||||
using ::webrtc::TimeDelta;
|
||||
|
||||
} // unnamed namespace
|
||||
|
||||
namespace cricket {
|
||||
|
||||
bool IceCredentialsChanged(absl::string_view old_ufrag,
|
||||
absl::string_view old_pwd,
|
||||
absl::string_view new_ufrag,
|
||||
|
@ -1411,8 +1422,10 @@ bool P2PTransportChannel::CreateConnection(PortInterface* port,
|
|||
}
|
||||
|
||||
if (ice_field_trials_.skip_relay_to_non_relay_connections) {
|
||||
if ((port->Type() != remote_candidate.type()) &&
|
||||
(port->Type() == RELAY_PORT_TYPE || remote_candidate.is_relay())) {
|
||||
IceCandidateType port_type = PortTypeToIceCandidateType(port);
|
||||
if ((port_type != remote_candidate.type()) &&
|
||||
(port_type == IceCandidateType::kRelay ||
|
||||
remote_candidate.is_relay())) {
|
||||
RTC_LOG(LS_INFO) << ToString() << ": skip creating connection "
|
||||
<< port->Type() << " to "
|
||||
<< remote_candidate.type_name();
|
||||
|
|
|
@ -73,6 +73,7 @@ using ::testing::SetArgPointee;
|
|||
using ::testing::SizeIs;
|
||||
using ::testing::Values;
|
||||
using ::testing::WithParamInterface;
|
||||
using ::webrtc::IceCandidateType;
|
||||
using ::webrtc::PendingTaskSafetyFlag;
|
||||
using ::webrtc::SafeTask;
|
||||
|
||||
|
@ -321,9 +322,9 @@ class P2PTransportChannelTestBase : public ::testing::Test,
|
|||
};
|
||||
|
||||
struct Result {
|
||||
Result(absl::string_view controlling_type,
|
||||
Result(IceCandidateType controlling_type,
|
||||
absl::string_view controlling_protocol,
|
||||
absl::string_view controlled_type,
|
||||
IceCandidateType controlled_type,
|
||||
absl::string_view controlled_protocol,
|
||||
int wait)
|
||||
: controlling_type(controlling_type),
|
||||
|
@ -333,10 +334,10 @@ class P2PTransportChannelTestBase : public ::testing::Test,
|
|||
connect_wait(wait) {}
|
||||
|
||||
// The expected candidate type and protocol of the controlling ICE agent.
|
||||
std::string controlling_type;
|
||||
IceCandidateType controlling_type;
|
||||
std::string controlling_protocol;
|
||||
// The expected candidate type and protocol of the controlled ICE agent.
|
||||
std::string controlled_type;
|
||||
IceCandidateType controlled_type;
|
||||
std::string controlled_protocol;
|
||||
// How long to wait before the correct candidate pair is selected.
|
||||
int connect_wait;
|
||||
|
@ -1025,87 +1026,87 @@ class P2PTransportChannelTestBase : public ::testing::Test,
|
|||
|
||||
// The tests have only a few outcomes, which we predefine.
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kLocalUdpToLocalUdp("local",
|
||||
P2PTransportChannelTestBase::kLocalUdpToLocalUdp(IceCandidateType::kHost,
|
||||
"udp",
|
||||
"local",
|
||||
IceCandidateType::kHost,
|
||||
"udp",
|
||||
1000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kLocalUdpToStunUdp("local",
|
||||
P2PTransportChannelTestBase::kLocalUdpToStunUdp(IceCandidateType::kHost,
|
||||
"udp",
|
||||
"stun",
|
||||
IceCandidateType::kSrflx,
|
||||
"udp",
|
||||
1000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kLocalUdpToPrflxUdp("local",
|
||||
P2PTransportChannelTestBase::kLocalUdpToPrflxUdp(IceCandidateType::kHost,
|
||||
"udp",
|
||||
"prflx",
|
||||
IceCandidateType::kPrflx,
|
||||
"udp",
|
||||
1000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kPrflxUdpToLocalUdp("prflx",
|
||||
P2PTransportChannelTestBase::kPrflxUdpToLocalUdp(IceCandidateType::kPrflx,
|
||||
"udp",
|
||||
"local",
|
||||
IceCandidateType::kHost,
|
||||
"udp",
|
||||
1000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kStunUdpToLocalUdp("stun",
|
||||
P2PTransportChannelTestBase::kStunUdpToLocalUdp(IceCandidateType::kSrflx,
|
||||
"udp",
|
||||
"local",
|
||||
IceCandidateType::kHost,
|
||||
"udp",
|
||||
1000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kStunUdpToStunUdp("stun",
|
||||
P2PTransportChannelTestBase::kStunUdpToStunUdp(IceCandidateType::kSrflx,
|
||||
"udp",
|
||||
"stun",
|
||||
IceCandidateType::kSrflx,
|
||||
"udp",
|
||||
1000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kStunUdpToPrflxUdp("stun",
|
||||
P2PTransportChannelTestBase::kStunUdpToPrflxUdp(IceCandidateType::kSrflx,
|
||||
"udp",
|
||||
"prflx",
|
||||
IceCandidateType::kPrflx,
|
||||
"udp",
|
||||
1000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kPrflxUdpToStunUdp("prflx",
|
||||
P2PTransportChannelTestBase::kPrflxUdpToStunUdp(IceCandidateType::kPrflx,
|
||||
"udp",
|
||||
"stun",
|
||||
IceCandidateType::kSrflx,
|
||||
"udp",
|
||||
1000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kLocalUdpToRelayUdp("local",
|
||||
P2PTransportChannelTestBase::kLocalUdpToRelayUdp(IceCandidateType::kHost,
|
||||
"udp",
|
||||
"relay",
|
||||
IceCandidateType::kRelay,
|
||||
"udp",
|
||||
2000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kPrflxUdpToRelayUdp("prflx",
|
||||
P2PTransportChannelTestBase::kPrflxUdpToRelayUdp(IceCandidateType::kPrflx,
|
||||
"udp",
|
||||
"relay",
|
||||
IceCandidateType::kRelay,
|
||||
"udp",
|
||||
2000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kRelayUdpToPrflxUdp("relay",
|
||||
P2PTransportChannelTestBase::kRelayUdpToPrflxUdp(IceCandidateType::kRelay,
|
||||
"udp",
|
||||
"prflx",
|
||||
IceCandidateType::kPrflx,
|
||||
"udp",
|
||||
2000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kLocalTcpToLocalTcp("local",
|
||||
P2PTransportChannelTestBase::kLocalTcpToLocalTcp(IceCandidateType::kHost,
|
||||
"tcp",
|
||||
"local",
|
||||
IceCandidateType::kHost,
|
||||
"tcp",
|
||||
3000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kLocalTcpToPrflxTcp("local",
|
||||
P2PTransportChannelTestBase::kLocalTcpToPrflxTcp(IceCandidateType::kHost,
|
||||
"tcp",
|
||||
"prflx",
|
||||
IceCandidateType::kPrflx,
|
||||
"tcp",
|
||||
3000);
|
||||
const P2PTransportChannelTestBase::Result
|
||||
P2PTransportChannelTestBase::kPrflxTcpToLocalTcp("prflx",
|
||||
P2PTransportChannelTestBase::kPrflxTcpToLocalTcp(IceCandidateType::kPrflx,
|
||||
"tcp",
|
||||
"local",
|
||||
IceCandidateType::kHost,
|
||||
"tcp",
|
||||
3000);
|
||||
|
||||
|
@ -1788,8 +1789,8 @@ TEST_F(P2PTransportChannelTest, CanOnlyMakeOutgoingTcpConnections) {
|
|||
fw()->SetUnbindableIps({rtc::GetAnyIP(AF_INET), rtc::GetAnyIP(AF_INET6),
|
||||
kPublicAddrs[0].ipaddr()});
|
||||
CreateChannels();
|
||||
// Expect a "prflx" candidate on the side that can only make outgoing
|
||||
// connections, endpoint 0.
|
||||
// Expect a IceCandidateType::kPrflx candidate on the side that can only make
|
||||
// outgoing connections, endpoint 0.
|
||||
Test(kPrflxTcpToLocalTcp);
|
||||
DestroyChannels();
|
||||
}
|
||||
|
@ -2393,8 +2394,8 @@ class P2PTransportChannelSameNatTest : public P2PTransportChannelTestBase {
|
|||
|
||||
TEST_F(P2PTransportChannelSameNatTest, TestConesBehindSameCone) {
|
||||
ConfigureEndpoints(NAT_FULL_CONE, NAT_FULL_CONE, NAT_FULL_CONE);
|
||||
Test(
|
||||
P2PTransportChannelTestBase::Result("prflx", "udp", "stun", "udp", 1000));
|
||||
Test(P2PTransportChannelTestBase::Result(
|
||||
IceCandidateType::kPrflx, "udp", IceCandidateType::kSrflx, "udp", 1000));
|
||||
}
|
||||
|
||||
// Test what happens when we have multiple available pathways.
|
||||
|
@ -4959,8 +4960,8 @@ class P2PTransportChannelMostLikelyToWorkFirstTest
|
|||
// types and, for relay local candidate, the expected relay protocol and ping
|
||||
// it.
|
||||
void VerifyNextPingableConnection(
|
||||
absl::string_view local_candidate_type,
|
||||
absl::string_view remote_candidate_type,
|
||||
IceCandidateType local_candidate_type,
|
||||
IceCandidateType remote_candidate_type,
|
||||
absl::string_view relay_protocol_type = UDP_PROTOCOL_NAME) {
|
||||
Connection* conn = FindNextPingableConnectionAndPingIt(channel_.get());
|
||||
ASSERT_TRUE(conn != nullptr);
|
||||
|
@ -5053,22 +5054,27 @@ TEST_F(P2PTransportChannelMostLikelyToWorkFirstTest,
|
|||
EXPECT_TRUE_WAIT(ch.connections().size() == 2, kDefaultTimeout);
|
||||
|
||||
// Initially, only have Local/Local and Local/Relay.
|
||||
VerifyNextPingableConnection(LOCAL_PORT_TYPE, LOCAL_PORT_TYPE);
|
||||
VerifyNextPingableConnection(RELAY_PORT_TYPE, LOCAL_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kHost,
|
||||
IceCandidateType::kHost);
|
||||
VerifyNextPingableConnection(IceCandidateType::kRelay,
|
||||
IceCandidateType::kHost);
|
||||
|
||||
// Remote Relay candidate arrives.
|
||||
ch.AddRemoteCandidate(CreateUdpCandidate(RELAY_PORT_TYPE, "2.2.2.2", 2, 2));
|
||||
EXPECT_TRUE_WAIT(ch.connections().size() == 4, kDefaultTimeout);
|
||||
|
||||
// Relay/Relay should be the first since it hasn't been pinged before.
|
||||
VerifyNextPingableConnection(RELAY_PORT_TYPE, RELAY_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kRelay,
|
||||
IceCandidateType::kRelay);
|
||||
|
||||
// Local/Relay is the final one.
|
||||
VerifyNextPingableConnection(LOCAL_PORT_TYPE, RELAY_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kHost,
|
||||
IceCandidateType::kRelay);
|
||||
|
||||
// Now, every connection has been pinged once. The next one should be
|
||||
// Relay/Relay.
|
||||
VerifyNextPingableConnection(RELAY_PORT_TYPE, RELAY_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kRelay,
|
||||
IceCandidateType::kRelay);
|
||||
}
|
||||
|
||||
// Test that when we receive a new remote candidate, they will be tried first
|
||||
|
@ -5084,24 +5090,29 @@ TEST_F(P2PTransportChannelMostLikelyToWorkFirstTest,
|
|||
EXPECT_TRUE_WAIT(ch.connections().size() == 2, kDefaultTimeout);
|
||||
|
||||
// Initially, only have Relay/Relay and Local/Relay. Ping Relay/Relay first.
|
||||
VerifyNextPingableConnection(RELAY_PORT_TYPE, RELAY_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kRelay,
|
||||
IceCandidateType::kRelay);
|
||||
|
||||
// Next, ping Local/Relay.
|
||||
VerifyNextPingableConnection(LOCAL_PORT_TYPE, RELAY_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kHost,
|
||||
IceCandidateType::kRelay);
|
||||
|
||||
// Remote Local candidate arrives.
|
||||
ch.AddRemoteCandidate(CreateUdpCandidate(LOCAL_PORT_TYPE, "2.2.2.2", 2, 2));
|
||||
EXPECT_TRUE_WAIT(ch.connections().size() == 4, kDefaultTimeout);
|
||||
|
||||
// Local/Local should be the first since it hasn't been pinged before.
|
||||
VerifyNextPingableConnection(LOCAL_PORT_TYPE, LOCAL_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kHost,
|
||||
IceCandidateType::kHost);
|
||||
|
||||
// Relay/Local is the final one.
|
||||
VerifyNextPingableConnection(RELAY_PORT_TYPE, LOCAL_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kRelay,
|
||||
IceCandidateType::kHost);
|
||||
|
||||
// Now, every connection has been pinged once. The next one should be
|
||||
// Relay/Relay.
|
||||
VerifyNextPingableConnection(RELAY_PORT_TYPE, RELAY_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kRelay,
|
||||
IceCandidateType::kRelay);
|
||||
}
|
||||
|
||||
// Test skip_relay_to_non_relay_connections field-trial.
|
||||
|
@ -5146,14 +5157,16 @@ TEST_F(P2PTransportChannelMostLikelyToWorkFirstTest, TestTcpTurn) {
|
|||
EXPECT_TRUE_WAIT(ch.connections().size() == 3, kDefaultTimeout);
|
||||
|
||||
// UDP Relay/Relay should be pinged first.
|
||||
VerifyNextPingableConnection(RELAY_PORT_TYPE, RELAY_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kRelay,
|
||||
IceCandidateType::kRelay);
|
||||
|
||||
// TCP Relay/Relay is the next.
|
||||
VerifyNextPingableConnection(RELAY_PORT_TYPE, RELAY_PORT_TYPE,
|
||||
TCP_PROTOCOL_NAME);
|
||||
VerifyNextPingableConnection(IceCandidateType::kRelay,
|
||||
IceCandidateType::kRelay, TCP_PROTOCOL_NAME);
|
||||
|
||||
// Finally, Local/Relay will be pinged.
|
||||
VerifyNextPingableConnection(LOCAL_PORT_TYPE, RELAY_PORT_TYPE);
|
||||
VerifyNextPingableConnection(IceCandidateType::kHost,
|
||||
IceCandidateType::kRelay);
|
||||
}
|
||||
|
||||
// Test that a resolver is created, asked for a result, and destroyed
|
||||
|
|
|
@ -50,8 +50,9 @@
|
|||
|
||||
using rtc::IPAddress;
|
||||
using rtc::SocketAddress;
|
||||
using ::testing::Contains;
|
||||
using ::testing::Not;
|
||||
using testing::Contains;
|
||||
using testing::Not;
|
||||
using webrtc::IceCandidateType;
|
||||
|
||||
#define MAYBE_SKIP_IPV4 \
|
||||
if (!rtc::HasIPv4Enabled()) { \
|
||||
|
@ -325,7 +326,7 @@ class BasicPortAllocatorTestBase : public ::testing::Test,
|
|||
|
||||
// Find a candidate and return it.
|
||||
static bool FindCandidate(const std::vector<Candidate>& candidates,
|
||||
absl::string_view type,
|
||||
IceCandidateType type,
|
||||
absl::string_view proto,
|
||||
const SocketAddress& addr,
|
||||
Candidate* found) {
|
||||
|
@ -342,7 +343,7 @@ class BasicPortAllocatorTestBase : public ::testing::Test,
|
|||
|
||||
// Convenience method to call FindCandidate with no return.
|
||||
static bool HasCandidate(const std::vector<Candidate>& candidates,
|
||||
absl::string_view type,
|
||||
IceCandidateType type,
|
||||
absl::string_view proto,
|
||||
const SocketAddress& addr) {
|
||||
return FindCandidate(candidates, type, proto, addr, nullptr);
|
||||
|
@ -351,7 +352,7 @@ class BasicPortAllocatorTestBase : public ::testing::Test,
|
|||
// Version of HasCandidate that also takes a related address.
|
||||
static bool HasCandidateWithRelatedAddr(
|
||||
const std::vector<Candidate>& candidates,
|
||||
absl::string_view type,
|
||||
IceCandidateType type,
|
||||
absl::string_view proto,
|
||||
const SocketAddress& addr,
|
||||
const SocketAddress& related_addr) {
|
||||
|
@ -553,7 +554,7 @@ class BasicPortAllocatorTest : public FakeClockBase,
|
|||
|
||||
uint32_t total_candidates = 0;
|
||||
if (!host_candidate_addr.IsNil()) {
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp",
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
rtc::SocketAddress(kPrivateAddr.ipaddr(), 0)));
|
||||
++total_candidates;
|
||||
}
|
||||
|
@ -563,20 +564,20 @@ class BasicPortAllocatorTest : public FakeClockBase,
|
|||
related_address.SetIP(rtc::GetAnyIP(stun_candidate_addr.family()));
|
||||
}
|
||||
EXPECT_TRUE(HasCandidateWithRelatedAddr(
|
||||
candidates_, "stun", "udp",
|
||||
candidates_, IceCandidateType::kSrflx, "udp",
|
||||
rtc::SocketAddress(stun_candidate_addr, 0), related_address));
|
||||
++total_candidates;
|
||||
}
|
||||
if (!relay_candidate_udp_transport_addr.IsNil()) {
|
||||
EXPECT_TRUE(HasCandidateWithRelatedAddr(
|
||||
candidates_, "relay", "udp",
|
||||
candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(relay_candidate_udp_transport_addr, 0),
|
||||
rtc::SocketAddress(stun_candidate_addr, 0)));
|
||||
++total_candidates;
|
||||
}
|
||||
if (!relay_candidate_tcp_transport_addr.IsNil()) {
|
||||
EXPECT_TRUE(HasCandidateWithRelatedAddr(
|
||||
candidates_, "relay", "udp",
|
||||
candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(relay_candidate_tcp_transport_addr, 0),
|
||||
rtc::SocketAddress(stun_candidate_addr, 0)));
|
||||
++total_candidates;
|
||||
|
@ -623,8 +624,9 @@ class BasicPortAllocatorTest : public FakeClockBase,
|
|||
const std::vector<Candidate>& ready_candidates =
|
||||
session_->ReadyCandidates();
|
||||
EXPECT_EQ(3U, ready_candidates.size());
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "relay", "udp",
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "udp",
|
||||
kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0)));
|
||||
}
|
||||
|
||||
|
@ -670,10 +672,11 @@ class BasicPortAllocatorTest : public FakeClockBase,
|
|||
const std::vector<Candidate>& ready_candidates =
|
||||
session_->ReadyCandidates();
|
||||
EXPECT_EQ(2U, ready_candidates.size());
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "udp",
|
||||
kClientAddr));
|
||||
|
||||
// The external candidate is always udp.
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "relay", "udp",
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0)));
|
||||
}
|
||||
|
||||
|
@ -725,19 +728,23 @@ class BasicPortAllocatorTest : public FakeClockBase,
|
|||
const std::vector<Candidate>& ready_candidates =
|
||||
session_->ReadyCandidates();
|
||||
EXPECT_EQ(10U, ready_candidates.size());
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "local", "udp", kClientAddr2));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(ready_candidates, "local", "udp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(ready_candidates, "local", "udp", kClientIPv6Addr2));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "local", "tcp", kClientAddr2));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(ready_candidates, "local", "tcp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(ready_candidates, "local", "tcp", kClientIPv6Addr2));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, "relay", "udp",
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "udp",
|
||||
kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "udp",
|
||||
kClientAddr2));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr2));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "tcp",
|
||||
kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "tcp",
|
||||
kClientAddr2));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "tcp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kHost, "tcp",
|
||||
kClientIPv6Addr2));
|
||||
EXPECT_TRUE(HasCandidate(ready_candidates, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0)));
|
||||
}
|
||||
};
|
||||
|
@ -815,7 +822,7 @@ TEST_F(BasicPortAllocatorTest,
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
// Should only get one Wi-Fi candidate.
|
||||
EXPECT_EQ(1U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", wifi));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp", wifi));
|
||||
}
|
||||
|
||||
// Test that when the PORTALLOCATOR_DISABLE_COSTLY_NETWORKS flag is set and
|
||||
|
@ -841,8 +848,10 @@ TEST_F(BasicPortAllocatorTest,
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
// Should only get two candidates, none of which is cell.
|
||||
EXPECT_EQ(2U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", unknown1));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", unknown2));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", unknown1));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", unknown2));
|
||||
}
|
||||
|
||||
// Test that when the PORTALLOCATOR_DISABLE_COSTLY_NETWORKS flag is set and
|
||||
|
@ -869,7 +878,7 @@ TEST_F(BasicPortAllocatorTest,
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
// Should only get one Wi-Fi candidate.
|
||||
EXPECT_EQ(1U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", wifi));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp", wifi));
|
||||
}
|
||||
|
||||
// Test that if the PORTALLOCATOR_DISABLE_COSTLY_NETWORKS flag is set, but the
|
||||
|
@ -890,7 +899,8 @@ TEST_F(BasicPortAllocatorTest,
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
// Make sure we got the cell candidate.
|
||||
EXPECT_EQ(1U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", cellular));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", cellular));
|
||||
}
|
||||
|
||||
// Test that if both PORTALLOCATOR_DISABLE_COSTLY_NETWORKS is set, and there is
|
||||
|
@ -913,8 +923,10 @@ TEST_F(BasicPortAllocatorTest,
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
// Make sure we got both wifi and cell candidates.
|
||||
EXPECT_EQ(2U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", wifi_link_local));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", cellular));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
wifi_link_local));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", cellular));
|
||||
}
|
||||
|
||||
// Test that if both PORTALLOCATOR_DISABLE_COSTLY_NETWORKS is set, and there is
|
||||
|
@ -940,8 +952,9 @@ TEST_F(BasicPortAllocatorTest,
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
// Make sure we got only wifi candidates.
|
||||
EXPECT_EQ(2U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", wifi));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", wifi_link_local));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp", wifi));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
wifi_link_local));
|
||||
}
|
||||
|
||||
// Test that the adapter types of the Ethernet and the VPN can be correctly
|
||||
|
@ -986,8 +999,10 @@ TEST_F(BasicPortAllocatorTest, MaxIpv6NetworksLimitEnforced) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(2U, candidates_.size());
|
||||
// Ensure the expected two interfaces (eth0 and eth1) were used.
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr2));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr2));
|
||||
}
|
||||
|
||||
// Ensure that allocator.max_ipv6_networks() doesn't prevent IPv4 networks from
|
||||
|
@ -1012,9 +1027,12 @@ TEST_F(BasicPortAllocatorTest, MaxIpv6NetworksLimitDoesNotImpactIpv4Networks) {
|
|||
EXPECT_EQ(3U, candidates_.size());
|
||||
// Ensure that only one IPv6 interface was used, but both IPv4 interfaces
|
||||
// were used.
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr2));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr2));
|
||||
}
|
||||
|
||||
// Test that we could use loopback interface as host candidate.
|
||||
|
@ -1039,9 +1057,12 @@ TEST_F(BasicPortAllocatorTest, TestGetAllPortsWithMinimumStepDelay) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(3U, candidates_.size());
|
||||
EXPECT_EQ(3U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "stun", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kSrflx, "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
}
|
||||
|
||||
// Test that when the same network interface is brought down and up, the
|
||||
|
@ -1134,7 +1155,8 @@ TEST_F(BasicPortAllocatorTest, CandidatesRegatheredAfterBindingFails) {
|
|||
// a single TCP active candidate, since that doesn't require creating a
|
||||
// socket).
|
||||
ASSERT_EQ(1U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
candidate_allocation_done_ = false;
|
||||
|
||||
// Now simulate the interface coming up, with the newfound ability to bind
|
||||
|
@ -1146,11 +1168,13 @@ TEST_F(BasicPortAllocatorTest, CandidatesRegatheredAfterBindingFails) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
// Should get UDP and TCP candidate.
|
||||
ASSERT_EQ(2U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
// TODO(deadbeef): This is actually the same active TCP candidate as before.
|
||||
// We should extend this test to also verify that a server candidate is
|
||||
// gathered.
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
}
|
||||
|
||||
// Verify candidates with default step delay of 1sec.
|
||||
|
@ -1165,7 +1189,8 @@ TEST_F(BasicPortAllocatorTest, TestGetAllPortsWithOneSecondStepDelay) {
|
|||
EXPECT_EQ(3U, ports_.size());
|
||||
|
||||
ASSERT_EQ_SIMULATED_WAIT(3U, candidates_.size(), 1500, fake_clock);
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
EXPECT_EQ(3U, ports_.size());
|
||||
EXPECT_TRUE(candidate_allocation_done_);
|
||||
// If we Stop gathering now, we shouldn't get a second "done" callback.
|
||||
|
@ -1252,7 +1277,7 @@ TEST_F(BasicPortAllocatorTest, TestGetAllPortsNoAdapters) {
|
|||
// candidate for it is useless and shouldn't be signaled. So we only have
|
||||
// STUN/TURN candidates.
|
||||
EXPECT_EQ(3U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "stun", "udp",
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kSrflx, "udp",
|
||||
rtc::SocketAddress(kNatUdpAddr.ipaddr(), 0)));
|
||||
// Again, two TURN candidates, using UDP/TCP for the first hop to the TURN
|
||||
// server.
|
||||
|
@ -1387,11 +1412,12 @@ TEST_F(BasicPortAllocatorTest, TestDisableUdpTurn) {
|
|||
EXPECT_EQ(2U, ports_.size());
|
||||
EXPECT_EQ(2U, candidates_.size());
|
||||
Candidate turn_candidate;
|
||||
EXPECT_TRUE(FindCandidate(candidates_, "relay", "udp", kTurnUdpExtAddr,
|
||||
&turn_candidate));
|
||||
EXPECT_TRUE(FindCandidate(candidates_, IceCandidateType::kRelay, "udp",
|
||||
kTurnUdpExtAddr, &turn_candidate));
|
||||
// The TURN candidate should use TCP to contact the TURN server.
|
||||
EXPECT_EQ(TCP_PROTOCOL_NAME, turn_candidate.relay_protocol());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
}
|
||||
|
||||
// Test that we can get OnCandidatesAllocationDone callback when all the ports
|
||||
|
@ -1416,7 +1442,8 @@ TEST_F(BasicPortAllocatorTest, TestGetAllPortsNoUdpSockets) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(1U, candidates_.size());
|
||||
EXPECT_EQ(1U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
}
|
||||
|
||||
// Test that we don't crash or malfunction if we can't create UDP sockets or
|
||||
|
@ -1432,7 +1459,8 @@ TEST_F(BasicPortAllocatorTest, TestGetAllPortsNoUdpSocketsNoTcpListen) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(1U, candidates_.size());
|
||||
EXPECT_EQ(1U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
}
|
||||
|
||||
// Test that we don't crash or malfunction if we can't create any sockets.
|
||||
|
@ -1458,8 +1486,10 @@ TEST_F(BasicPortAllocatorTest, TestGetAllPortsNoUdpAllowed) {
|
|||
EXPECT_EQ_SIMULATED_WAIT(2U, candidates_.size(), kDefaultAllocationTimeout,
|
||||
fake_clock);
|
||||
EXPECT_EQ(2U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
// We wait at least for a full STUN timeout, which
|
||||
// cricket::STUN_TOTAL_TIMEOUT seconds.
|
||||
EXPECT_TRUE_SIMULATED_WAIT(candidate_allocation_done_,
|
||||
|
@ -1529,7 +1559,7 @@ TEST_F(BasicPortAllocatorTest, TestCandidateFilterWithRelayOnly) {
|
|||
session_->StartGettingPorts();
|
||||
EXPECT_TRUE_SIMULATED_WAIT(candidate_allocation_done_,
|
||||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "relay", "udp",
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0)));
|
||||
|
||||
EXPECT_EQ(1U, candidates_.size());
|
||||
|
@ -1601,9 +1631,12 @@ TEST_F(BasicPortAllocatorTest, TestEnableSharedUfrag) {
|
|||
ASSERT_TRUE_SIMULATED_WAIT(candidate_allocation_done_,
|
||||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(3U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "stun", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kSrflx, "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
EXPECT_EQ(3U, ports_.size());
|
||||
for (const Candidate& candidate : candidates_) {
|
||||
EXPECT_EQ(kIceUfrag0, candidate.username());
|
||||
|
@ -1624,7 +1657,8 @@ TEST_F(BasicPortAllocatorTest, TestSharedSocketWithoutNat) {
|
|||
ASSERT_EQ_SIMULATED_WAIT(2U, candidates_.size(), kDefaultAllocationTimeout,
|
||||
fake_clock);
|
||||
EXPECT_EQ(2U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE_SIMULATED_WAIT(candidate_allocation_done_,
|
||||
kDefaultAllocationTimeout, fake_clock);
|
||||
}
|
||||
|
@ -1643,8 +1677,9 @@ TEST_F(BasicPortAllocatorTest, TestSharedSocketWithNat) {
|
|||
ASSERT_EQ_SIMULATED_WAIT(3U, candidates_.size(), kDefaultAllocationTimeout,
|
||||
fake_clock);
|
||||
ASSERT_EQ(2U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "stun", "udp",
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kSrflx, "udp",
|
||||
rtc::SocketAddress(kNatUdpAddr.ipaddr(), 0)));
|
||||
EXPECT_TRUE_SIMULATED_WAIT(candidate_allocation_done_,
|
||||
kDefaultAllocationTimeout, fake_clock);
|
||||
|
@ -1672,10 +1707,11 @@ TEST_F(BasicPortAllocatorTest, TestSharedSocketWithoutNatUsingTurn) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
ASSERT_EQ(3U, candidates_.size());
|
||||
ASSERT_EQ(3U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "relay", "udp",
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0)));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "relay", "udp",
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0)));
|
||||
}
|
||||
|
||||
|
@ -1830,10 +1866,11 @@ TEST_F(BasicPortAllocatorTest, TestSharedSocketWithNatUsingTurn) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(3U, candidates_.size());
|
||||
ASSERT_EQ(2U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "stun", "udp",
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kSrflx, "udp",
|
||||
rtc::SocketAddress(kNatUdpAddr.ipaddr(), 0)));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "relay", "udp",
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0)));
|
||||
EXPECT_TRUE_SIMULATED_WAIT(candidate_allocation_done_,
|
||||
kDefaultAllocationTimeout, fake_clock);
|
||||
|
@ -1868,13 +1905,14 @@ TEST_F(BasicPortAllocatorTest, TestSharedSocketWithNatUsingTurnAsStun) {
|
|||
ASSERT_TRUE_SIMULATED_WAIT(candidate_allocation_done_,
|
||||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(3U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
Candidate stun_candidate;
|
||||
EXPECT_TRUE(FindCandidate(candidates_, "stun", "udp",
|
||||
EXPECT_TRUE(FindCandidate(candidates_, IceCandidateType::kSrflx, "udp",
|
||||
rtc::SocketAddress(kNatUdpAddr.ipaddr(), 0),
|
||||
&stun_candidate));
|
||||
EXPECT_TRUE(HasCandidateWithRelatedAddr(
|
||||
candidates_, "relay", "udp",
|
||||
candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0),
|
||||
stun_candidate.address()));
|
||||
|
||||
|
@ -1905,8 +1943,9 @@ TEST_F(BasicPortAllocatorTest, TestSharedSocketWithNatUsingTurnTcpOnly) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(2U, candidates_.size());
|
||||
ASSERT_EQ(2U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "relay", "udp",
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0)));
|
||||
EXPECT_EQ(1U, ports_[0]->Candidates().size());
|
||||
EXPECT_EQ(1U, ports_[1]->Candidates().size());
|
||||
|
@ -1932,13 +1971,14 @@ TEST_F(BasicPortAllocatorTest, TestNonSharedSocketWithNatUsingTurnAsStun) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(3U, candidates_.size());
|
||||
ASSERT_EQ(3U, ports_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
Candidate stun_candidate;
|
||||
EXPECT_TRUE(FindCandidate(candidates_, "stun", "udp",
|
||||
EXPECT_TRUE(FindCandidate(candidates_, IceCandidateType::kSrflx, "udp",
|
||||
rtc::SocketAddress(kNatUdpAddr.ipaddr(), 0),
|
||||
&stun_candidate));
|
||||
Candidate turn_candidate;
|
||||
EXPECT_TRUE(FindCandidate(candidates_, "relay", "udp",
|
||||
EXPECT_TRUE(FindCandidate(candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0),
|
||||
&turn_candidate));
|
||||
// Not using shared socket, so the STUN request's server reflexive address
|
||||
|
@ -1969,13 +2009,14 @@ TEST_F(BasicPortAllocatorTest, TestSharedSocketWithNatUsingTurnAndStun) {
|
|||
|
||||
ASSERT_EQ_SIMULATED_WAIT(3U, candidates_.size(), kDefaultAllocationTimeout,
|
||||
fake_clock);
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
Candidate stun_candidate;
|
||||
EXPECT_TRUE(FindCandidate(candidates_, "stun", "udp",
|
||||
EXPECT_TRUE(FindCandidate(candidates_, IceCandidateType::kSrflx, "udp",
|
||||
rtc::SocketAddress(kNatUdpAddr.ipaddr(), 0),
|
||||
&stun_candidate));
|
||||
EXPECT_TRUE(HasCandidateWithRelatedAddr(
|
||||
candidates_, "relay", "udp",
|
||||
candidates_, IceCandidateType::kRelay, "udp",
|
||||
rtc::SocketAddress(kTurnUdpExtAddr.ipaddr(), 0),
|
||||
stun_candidate.address()));
|
||||
|
||||
|
@ -1997,7 +2038,8 @@ TEST_F(BasicPortAllocatorTest, TestSharedSocketNoUdpAllowed) {
|
|||
ASSERT_EQ_SIMULATED_WAIT(1U, ports_.size(), kDefaultAllocationTimeout,
|
||||
fake_clock);
|
||||
EXPECT_EQ(1U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
// STUN timeout is 9.5sec. We need to wait to get candidate done signal.
|
||||
EXPECT_TRUE_SIMULATED_WAIT(candidate_allocation_done_, kStunTimeoutMs,
|
||||
fake_clock);
|
||||
|
@ -2023,7 +2065,8 @@ TEST_F(BasicPortAllocatorTest, TestNetworkPermissionBlocked) {
|
|||
EXPECT_EQ_SIMULATED_WAIT(1U, ports_.size(), kDefaultAllocationTimeout,
|
||||
fake_clock);
|
||||
EXPECT_EQ(1U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kPrivateAddr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kPrivateAddr));
|
||||
EXPECT_NE(0U, session_->flags() & PORTALLOCATOR_DISABLE_ADAPTER_ENUMERATION);
|
||||
}
|
||||
|
||||
|
@ -2041,10 +2084,14 @@ TEST_F(BasicPortAllocatorTest, TestEnableIPv6Addresses) {
|
|||
kDefaultAllocationTimeout, fake_clock);
|
||||
EXPECT_EQ(4U, ports_.size());
|
||||
EXPECT_EQ(4U, candidates_.size());
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "tcp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "udp", kClientAddr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "tcp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(
|
||||
HasCandidate(candidates_, IceCandidateType::kHost, "tcp", kClientAddr));
|
||||
}
|
||||
|
||||
TEST_F(BasicPortAllocatorTest, TestStopGettingPorts) {
|
||||
|
@ -2631,8 +2678,10 @@ TEST_F(BasicPortAllocatorTest, Select2DifferentIntefaces) {
|
|||
|
||||
EXPECT_EQ(2U, candidates_.size());
|
||||
// ethe1 and wifi1 were selected.
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr3));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr3));
|
||||
}
|
||||
|
||||
TEST_F(BasicPortAllocatorTest, Select3DifferentIntefaces) {
|
||||
|
@ -2656,9 +2705,12 @@ TEST_F(BasicPortAllocatorTest, Select3DifferentIntefaces) {
|
|||
|
||||
EXPECT_EQ(3U, candidates_.size());
|
||||
// ethe1, wifi1, and cell1 were selected.
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr3));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr5));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr3));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr5));
|
||||
}
|
||||
|
||||
TEST_F(BasicPortAllocatorTest, Select4DifferentIntefaces) {
|
||||
|
@ -2682,10 +2734,14 @@ TEST_F(BasicPortAllocatorTest, Select4DifferentIntefaces) {
|
|||
|
||||
EXPECT_EQ(4U, candidates_.size());
|
||||
// ethe1, ethe2, wifi1, and cell1 were selected.
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr2));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr3));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, "local", "udp", kClientIPv6Addr5));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr2));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr3));
|
||||
EXPECT_TRUE(HasCandidate(candidates_, IceCandidateType::kHost, "udp",
|
||||
kClientIPv6Addr5));
|
||||
}
|
||||
|
||||
} // namespace cricket
|
||||
|
|
|
@ -513,6 +513,15 @@ const char* IceCandidateTypeToStatsType(const cricket::Candidate& candidate) {
|
|||
return "unknown";
|
||||
}
|
||||
|
||||
// Return std::string to make sure that the type remains kString compatible.
|
||||
std::string GetLegacyCandidateTypeName(const cricket::Candidate& c) {
|
||||
if (c.is_local())
|
||||
return "local";
|
||||
if (c.is_stun())
|
||||
return "stun";
|
||||
return std::string(c.type_name());
|
||||
}
|
||||
|
||||
const char* AdapterTypeToStatsType(rtc::AdapterType type) {
|
||||
switch (type) {
|
||||
case rtc::ADAPTER_TYPE_UNKNOWN:
|
||||
|
@ -811,11 +820,11 @@ StatsReport* LegacyStatsCollector::AddConnectionInfoReport(
|
|||
report->AddString(StatsReport::kStatsValueNameLocalAddress,
|
||||
info.local_candidate.address().ToString());
|
||||
report->AddString(StatsReport::kStatsValueNameLocalCandidateType,
|
||||
info.local_candidate.type());
|
||||
GetLegacyCandidateTypeName(info.local_candidate));
|
||||
report->AddString(StatsReport::kStatsValueNameRemoteAddress,
|
||||
info.remote_candidate.address().ToString());
|
||||
report->AddString(StatsReport::kStatsValueNameRemoteCandidateType,
|
||||
info.remote_candidate.type());
|
||||
GetLegacyCandidateTypeName(info.remote_candidate));
|
||||
report->AddString(StatsReport::kStatsValueNameTransportType,
|
||||
info.local_candidate.protocol());
|
||||
report->AddString(StatsReport::kStatsValueNameLocalCandidateRelayProtocol,
|
||||
|
|
Loading…
Reference in a new issue