Index: webrtc/p2p/base/p2ptransportchannel_unittest.cc |
diff --git a/webrtc/p2p/base/p2ptransportchannel_unittest.cc b/webrtc/p2p/base/p2ptransportchannel_unittest.cc |
index d1548a2224ef17ec4de4e64f329ee4d03efd0497..da0bfb041402acf87c178b8c2a1ee108d97e3f0b 100644 |
--- a/webrtc/p2p/base/p2ptransportchannel_unittest.cc |
+++ b/webrtc/p2p/base/p2ptransportchannel_unittest.cc |
@@ -23,7 +23,6 @@ |
#include "webrtc/base/natserver.h" |
#include "webrtc/base/natsocketfactory.h" |
#include "webrtc/base/physicalsocketserver.h" |
-#include "webrtc/base/proxyserver.h" |
#include "webrtc/base/socketaddress.h" |
#include "webrtc/base/ssladapter.h" |
#include "webrtc/base/thread.h" |
@@ -64,12 +63,6 @@ static const SocketAddress kAlternateAddrs[2] = { |
static const SocketAddress kIPv6AlternateAddrs[2] = { |
SocketAddress("2401:4030:1:2c00:be30:abcd:efab:cdef", 0), |
SocketAddress("2601:0:1000:1b03:2e41:38ff:fea6:f2a4", 0)}; |
-// Addresses for HTTP proxy servers. |
-static const SocketAddress kHttpsProxyAddrs[2] = |
- { SocketAddress("11.11.11.1", 443), SocketAddress("22.22.22.1", 443) }; |
-// Addresses for SOCKS proxy servers. |
-static const SocketAddress kSocksProxyAddrs[2] = |
- { SocketAddress("11.11.11.1", 1080), SocketAddress("22.22.22.1", 1080) }; |
// Internal addresses for NAT boxes. |
static const SocketAddress kNatAddrs[2] = |
{ SocketAddress("192.168.1.1", 0), SocketAddress("192.168.2.1", 0) }; |
@@ -189,14 +182,6 @@ class P2PTransportChannelTestBase : public testing::Test, |
ss_scope_(ss_.get()), |
stun_server_(TestStunServer::Create(main_, kStunAddr)), |
turn_server_(main_, kTurnUdpIntAddr, kTurnUdpExtAddr), |
- socks_server1_(ss_.get(), |
- kSocksProxyAddrs[0], |
- ss_.get(), |
- kSocksProxyAddrs[0]), |
- socks_server2_(ss_.get(), |
- kSocksProxyAddrs[1], |
- ss_.get(), |
- kSocksProxyAddrs[1]), |
force_relay_(false) { |
ep1_.role_ = ICEROLE_CONTROLLING; |
ep2_.role_ = ICEROLE_CONTROLLED; |
@@ -228,9 +213,6 @@ class P2PTransportChannelTestBase : public testing::Test, |
NAT_SYMMETRIC_THEN_CONE, // Double NAT, symmetric outer, cone inner |
BLOCK_UDP, // Firewall, UDP in/out blocked |
BLOCK_UDP_AND_INCOMING_TCP, // Firewall, UDP in/out and TCP in blocked |
- BLOCK_ALL_BUT_OUTGOING_HTTP, // Firewall, only TCP out on 80/443 |
- PROXY_HTTPS, // All traffic through HTTPS proxy |
- PROXY_SOCKS, // All traffic through SOCKS proxy |
NUM_CONFIGS |
}; |
@@ -453,13 +435,6 @@ class P2PTransportChannelTestBase : public testing::Test, |
GetEndpoint(endpoint)->network_manager_.RemoveInterface(addr); |
fw()->AddRule(false, rtc::FP_ANY, rtc::FD_ANY, addr); |
} |
- void SetProxy(int endpoint, rtc::ProxyType type) { |
- rtc::ProxyInfo info; |
- info.type = type; |
- info.address = (type == rtc::PROXY_HTTPS) ? |
- kHttpsProxyAddrs[endpoint] : kSocksProxyAddrs[endpoint]; |
- GetAllocator(endpoint)->set_proxy("unittest/1.0", info); |
- } |
void SetAllocatorFlags(int endpoint, int flags) { |
GetAllocator(endpoint)->set_flags(flags); |
} |
@@ -882,8 +857,6 @@ class P2PTransportChannelTestBase : public testing::Test, |
rtc::SocketServerScope ss_scope_; |
std::unique_ptr<TestStunServer> stun_server_; |
TestTurnServer turn_server_; |
- rtc::SocksProxyServer socks_server1_; |
- rtc::SocksProxyServer socks_server2_; |
Endpoint ep1_; |
Endpoint ep2_; |
RemoteIceParameterSource remote_ice_parameter_source_ = FROM_CANDIDATE; |
@@ -1025,9 +998,6 @@ class P2PTransportChannelTest : public P2PTransportChannelTestBase { |
break; |
case BLOCK_UDP: |
case BLOCK_UDP_AND_INCOMING_TCP: |
- case BLOCK_ALL_BUT_OUTGOING_HTTP: |
- case PROXY_HTTPS: |
- case PROXY_SOCKS: |
AddAddress(endpoint, kPublicAddrs[endpoint]); |
// Block all UDP |
fw()->AddRule(false, rtc::FP_UDP, rtc::FD_ANY, |
@@ -1036,28 +1006,6 @@ class P2PTransportChannelTest : public P2PTransportChannelTestBase { |
// Block TCP inbound to the endpoint |
fw()->AddRule(false, rtc::FP_TCP, SocketAddress(), |
kPublicAddrs[endpoint]); |
- } else if (config == BLOCK_ALL_BUT_OUTGOING_HTTP) { |
- // Block all TCP to/from the endpoint except 80/443 out |
- fw()->AddRule(true, rtc::FP_TCP, kPublicAddrs[endpoint], |
- SocketAddress(rtc::IPAddress(INADDR_ANY), 80)); |
- fw()->AddRule(true, rtc::FP_TCP, kPublicAddrs[endpoint], |
- SocketAddress(rtc::IPAddress(INADDR_ANY), 443)); |
- fw()->AddRule(false, rtc::FP_TCP, rtc::FD_ANY, |
- kPublicAddrs[endpoint]); |
- } else if (config == PROXY_HTTPS) { |
- // Block all TCP to/from the endpoint except to the proxy server |
- fw()->AddRule(true, rtc::FP_TCP, kPublicAddrs[endpoint], |
- kHttpsProxyAddrs[endpoint]); |
- fw()->AddRule(false, rtc::FP_TCP, rtc::FD_ANY, |
- kPublicAddrs[endpoint]); |
- SetProxy(endpoint, rtc::PROXY_HTTPS); |
- } else if (config == PROXY_SOCKS) { |
- // Block all TCP to/from the endpoint except to the proxy server |
- fw()->AddRule(true, rtc::FP_TCP, kPublicAddrs[endpoint], |
- kSocksProxyAddrs[endpoint]); |
- fw()->AddRule(false, rtc::FP_TCP, rtc::FD_ANY, |
- kPublicAddrs[endpoint]); |
- SetProxy(endpoint, rtc::PROXY_SOCKS5); |
} |
break; |
default: |
@@ -1088,23 +1036,19 @@ class P2PTransportChannelTest : public P2PTransportChannelTestBase { |
// Test matrix. Originator behavior defined by rows, receiever by columns. |
// TODO: Fix NULLs caused by lack of TCP support in NATSocket. |
-// TODO: Fix NULLs caused by no HTTP proxy support. |
// TODO: Rearrange rows/columns from best to worst. |
const P2PTransportChannelTest::Result* |
P2PTransportChannelTest::kMatrix[NUM_CONFIGS][NUM_CONFIGS] = { |
-// OPEN CONE ADDR PORT SYMM 2CON SCON !UDP !TCP HTTP PRXH PRXS |
-/*OP*/ {LULU, LUSU, LUSU, LUSU, LUPU, LUSU, LUPU, LTPT, LTPT, LSRS, NULL, LTPT}, |
-/*CO*/ {SULU, SUSU, SUSU, SUSU, SUPU, SUSU, SUPU, NULL, NULL, LSRS, NULL, LTRT}, |
-/*AD*/ {SULU, SUSU, SUSU, SUSU, SUPU, SUSU, SUPU, NULL, NULL, LSRS, NULL, LTRT}, |
-/*PO*/ {SULU, SUSU, SUSU, SUSU, RUPU, SUSU, RUPU, NULL, NULL, LSRS, NULL, LTRT}, |
-/*SY*/ {PULU, PUSU, PUSU, PURU, PURU, PUSU, PURU, NULL, NULL, LSRS, NULL, LTRT}, |
-/*2C*/ {SULU, SUSU, SUSU, SUSU, SUPU, SUSU, SUPU, NULL, NULL, LSRS, NULL, LTRT}, |
-/*SC*/ {PULU, PUSU, PUSU, PURU, PURU, PUSU, PURU, NULL, NULL, LSRS, NULL, LTRT}, |
-/*!U*/ {LTPT, NULL, NULL, NULL, NULL, NULL, NULL, LTPT, LTPT, LSRS, NULL, LTRT}, |
-/*!T*/ {PTLT, NULL, NULL, NULL, NULL, NULL, NULL, PTLT, LTRT, LSRS, NULL, LTRT}, |
-/*HT*/ {LSRS, LSRS, LSRS, LSRS, LSRS, LSRS, LSRS, LSRS, LSRS, LSRS, NULL, LSRS}, |
-/*PR*/ {NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL}, |
-/*PR*/ {LTRT, LTRT, LTRT, LTRT, LTRT, LTRT, LTRT, LTRT, LTRT, LSRS, NULL, LTRT}, |
+ // OPEN CONE ADDR PORT SYMM 2CON SCON !UDP !TCP |
+ /*OP*/ {LULU, LUSU, LUSU, LUSU, LUPU, LUSU, LUPU, LTPT, LTPT}, |
+ /*CO*/ {SULU, SUSU, SUSU, SUSU, SUPU, SUSU, SUPU, NULL, NULL}, |
+ /*AD*/ {SULU, SUSU, SUSU, SUSU, SUPU, SUSU, SUPU, NULL, NULL}, |
+ /*PO*/ {SULU, SUSU, SUSU, SUSU, RUPU, SUSU, RUPU, NULL, NULL}, |
+ /*SY*/ {PULU, PUSU, PUSU, PURU, PURU, PUSU, PURU, NULL, NULL}, |
+ /*2C*/ {SULU, SUSU, SUSU, SUSU, SUPU, SUSU, SUPU, NULL, NULL}, |
+ /*SC*/ {PULU, PUSU, PUSU, PURU, PURU, PUSU, PURU, NULL, NULL}, |
+ /*!U*/ {LTPT, NULL, NULL, NULL, NULL, NULL, NULL, LTPT, LTPT}, |
+ /*!T*/ {PTLT, NULL, NULL, NULL, NULL, NULL, NULL, PTLT, LTRT}, |
}; |
// The actual tests that exercise all the various configurations. |
@@ -1122,19 +1066,16 @@ const P2PTransportChannelTest::Result* |
#define P2P_TEST(x, y) \ |
P2P_TEST_DECLARATION(x, y,) |
-#define P2P_TEST_SET(x) \ |
- P2P_TEST(x, OPEN) \ |
- P2P_TEST(x, NAT_FULL_CONE) \ |
- P2P_TEST(x, NAT_ADDR_RESTRICTED) \ |
- P2P_TEST(x, NAT_PORT_RESTRICTED) \ |
- P2P_TEST(x, NAT_SYMMETRIC) \ |
- P2P_TEST(x, NAT_DOUBLE_CONE) \ |
- P2P_TEST(x, NAT_SYMMETRIC_THEN_CONE) \ |
- P2P_TEST(x, BLOCK_UDP) \ |
- P2P_TEST(x, BLOCK_UDP_AND_INCOMING_TCP) \ |
- P2P_TEST(x, BLOCK_ALL_BUT_OUTGOING_HTTP) \ |
- P2P_TEST(x, PROXY_HTTPS) \ |
- P2P_TEST(x, PROXY_SOCKS) |
+#define P2P_TEST_SET(x) \ |
+ P2P_TEST(x, OPEN) \ |
+ P2P_TEST(x, NAT_FULL_CONE) \ |
+ P2P_TEST(x, NAT_ADDR_RESTRICTED) \ |
+ P2P_TEST(x, NAT_PORT_RESTRICTED) \ |
+ P2P_TEST(x, NAT_SYMMETRIC) \ |
+ P2P_TEST(x, NAT_DOUBLE_CONE) \ |
+ P2P_TEST(x, NAT_SYMMETRIC_THEN_CONE) \ |
+ P2P_TEST(x, BLOCK_UDP) \ |
+ P2P_TEST(x, BLOCK_UDP_AND_INCOMING_TCP) |
P2P_TEST_SET(OPEN) |
P2P_TEST_SET(NAT_FULL_CONE) |
@@ -1145,9 +1086,6 @@ P2P_TEST_SET(NAT_DOUBLE_CONE) |
P2P_TEST_SET(NAT_SYMMETRIC_THEN_CONE) |
P2P_TEST_SET(BLOCK_UDP) |
P2P_TEST_SET(BLOCK_UDP_AND_INCOMING_TCP) |
-P2P_TEST_SET(BLOCK_ALL_BUT_OUTGOING_HTTP) |
-P2P_TEST_SET(PROXY_HTTPS) |
-P2P_TEST_SET(PROXY_SOCKS) |
// Test that we restart candidate allocation when local ufrag&pwd changed. |
// Standard Ice protocol is used. |