2018-02-22 15:26:27 -08:00
|
|
|
/*
|
|
|
|
|
* Copyright 2017 The WebRTC Project Authors. All rights reserved.
|
|
|
|
|
*
|
|
|
|
|
* Use of this source code is governed by a BSD-style license
|
|
|
|
|
* that can be found in the LICENSE file in the root of the source
|
|
|
|
|
* tree. An additional intellectual property rights grant can be found
|
|
|
|
|
* in the file PATENTS. All contributing project authors may
|
|
|
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
|
|
|
*/
|
|
|
|
|
|
2019-01-11 09:11:00 -08:00
|
|
|
#include "pc/jsep_transport_controller.h"
|
2018-02-22 15:26:27 -08:00
|
|
|
|
2021-01-29 14:45:08 +00:00
|
|
|
#include <stddef.h>
|
|
|
|
|
|
2021-06-10 06:03:06 +00:00
|
|
|
#include <functional>
|
2018-02-22 15:26:27 -08:00
|
|
|
#include <memory>
|
2022-02-23 13:44:59 +00:00
|
|
|
#include <string>
|
2021-06-17 10:45:33 +00:00
|
|
|
#include <type_traits>
|
2018-02-22 15:26:27 -08:00
|
|
|
#include <utility>
|
|
|
|
|
|
2019-01-28 17:25:26 -08:00
|
|
|
#include "absl/algorithm/container.h"
|
2021-05-21 20:46:09 +02:00
|
|
|
#include "api/dtls_transport_interface.h"
|
2021-01-29 14:45:08 +00:00
|
|
|
#include "api/rtp_parameters.h"
|
2021-02-10 14:31:24 +01:00
|
|
|
#include "api/sequence_checker.h"
|
2021-01-29 14:45:08 +00:00
|
|
|
#include "api/transport/enums.h"
|
|
|
|
|
#include "media/sctp/sctp_transport_internal.h"
|
|
|
|
|
#include "p2p/base/dtls_transport.h"
|
2019-01-16 08:25:21 -08:00
|
|
|
#include "p2p/base/ice_transport_internal.h"
|
2021-01-29 14:45:08 +00:00
|
|
|
#include "p2p/base/p2p_constants.h"
|
2018-02-22 15:26:27 -08:00
|
|
|
#include "p2p/base/port.h"
|
|
|
|
|
#include "rtc_base/checks.h"
|
2021-01-29 14:45:08 +00:00
|
|
|
#include "rtc_base/logging.h"
|
2018-02-22 15:26:27 -08:00
|
|
|
#include "rtc_base/thread.h"
|
2021-06-07 13:30:46 +02:00
|
|
|
#include "rtc_base/trace_event.h"
|
2018-02-22 15:26:27 -08:00
|
|
|
|
|
|
|
|
using webrtc::SdpType;
|
|
|
|
|
|
|
|
|
|
namespace webrtc {
|
|
|
|
|
|
|
|
|
|
JsepTransportController::JsepTransportController(
|
|
|
|
|
rtc::Thread* network_thread,
|
|
|
|
|
cricket::PortAllocator* port_allocator,
|
2021-04-08 07:25:04 +00:00
|
|
|
AsyncDnsResolverFactoryInterface* async_dns_resolver_factory,
|
2018-02-22 15:26:27 -08:00
|
|
|
Config config)
|
2021-02-10 17:40:08 +00:00
|
|
|
: network_thread_(network_thread),
|
2018-02-22 15:26:27 -08:00
|
|
|
port_allocator_(port_allocator),
|
2021-04-08 07:25:04 +00:00
|
|
|
async_dns_resolver_factory_(async_dns_resolver_factory),
|
2021-06-10 06:03:06 +00:00
|
|
|
transports_(
|
|
|
|
|
[this](const std::string& mid, cricket::JsepTransport* transport) {
|
|
|
|
|
return OnTransportChanged(mid, transport);
|
|
|
|
|
},
|
|
|
|
|
[this]() {
|
|
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
UpdateAggregateStates_n();
|
|
|
|
|
}),
|
2021-01-29 14:27:12 +00:00
|
|
|
config_(config),
|
2021-08-11 14:56:38 -07:00
|
|
|
active_reset_srtp_params_(config.active_reset_srtp_params),
|
|
|
|
|
bundles_(config.bundle_policy) {
|
2021-07-30 22:30:23 +02:00
|
|
|
// The `transport_observer` is assumed to be non-null.
|
2018-04-13 16:44:34 -07:00
|
|
|
RTC_DCHECK(config_.transport_observer);
|
2019-09-18 18:22:12 +02:00
|
|
|
RTC_DCHECK(config_.rtcp_handler);
|
2019-11-15 12:33:05 -08:00
|
|
|
RTC_DCHECK(config_.ice_transport_factory);
|
2021-01-27 23:32:46 -08:00
|
|
|
RTC_DCHECK(config_.on_dtls_handshake_error_);
|
2022-03-09 09:28:10 +01:00
|
|
|
RTC_DCHECK(config_.field_trials);
|
2018-04-13 16:44:34 -07:00
|
|
|
}
|
2018-02-22 15:26:27 -08:00
|
|
|
|
|
|
|
|
JsepTransportController::~JsepTransportController() {
|
|
|
|
|
// Channel destructors may try to send packets, so this needs to happen on
|
|
|
|
|
// the network thread.
|
2021-02-10 13:05:44 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
DestroyAllJsepTransports_n();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RTCError JsepTransportController::SetLocalDescription(
|
|
|
|
|
SdpType type,
|
|
|
|
|
const cricket::SessionDescription* description) {
|
2021-06-07 13:30:46 +02:00
|
|
|
TRACE_EVENT0("webrtc", "JsepTransportController::SetLocalDescription");
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!network_thread_->IsCurrent()) {
|
2022-09-08 18:38:10 +02:00
|
|
|
return network_thread_->BlockingCall(
|
|
|
|
|
[=] { return SetLocalDescription(type, description); });
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2021-01-18 14:00:36 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!initial_offerer_.has_value()) {
|
|
|
|
|
initial_offerer_.emplace(type == SdpType::kOffer);
|
|
|
|
|
if (*initial_offerer_) {
|
|
|
|
|
SetIceRole_n(cricket::ICEROLE_CONTROLLING);
|
|
|
|
|
} else {
|
|
|
|
|
SetIceRole_n(cricket::ICEROLE_CONTROLLED);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return ApplyDescription_n(/*local=*/true, type, description);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RTCError JsepTransportController::SetRemoteDescription(
|
|
|
|
|
SdpType type,
|
|
|
|
|
const cricket::SessionDescription* description) {
|
2021-06-07 13:30:46 +02:00
|
|
|
TRACE_EVENT0("webrtc", "JsepTransportController::SetRemoteDescription");
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!network_thread_->IsCurrent()) {
|
2022-09-08 18:38:10 +02:00
|
|
|
return network_thread_->BlockingCall(
|
|
|
|
|
[=] { return SetRemoteDescription(type, description); });
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2021-01-18 14:00:36 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-02-22 15:26:27 -08:00
|
|
|
return ApplyDescription_n(/*local=*/false, type, description);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RtpTransportInternal* JsepTransportController::GetRtpTransport(
|
2022-05-04 10:32:30 +00:00
|
|
|
absl::string_view mid) const {
|
2021-02-10 13:05:44 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-03-30 10:48:35 -07:00
|
|
|
auto jsep_transport = GetJsepTransportForMid(mid);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!jsep_transport) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
return jsep_transport->rtp_transport();
|
|
|
|
|
}
|
|
|
|
|
|
Changes to enable use of DatagramTransport as a data channel transport.
PeerConnection now has a new setting in RTCConfiguration to enable use of
datagram transport for data channels. There is also a corresponding field
trial, which has both a kill-switch and a way to change the default value.
PeerConnection's interaction with MediaTransport for data channels has been
refactored to work with DataChannelTransportInterface instead.
Adds a DataChannelState and OnStateChanged() to the DataChannelSink
callbacks. This allows PeerConnection to listen to the data channel's
state directly, instead of indirectly by monitoring media transport
state. This is necessary to enable use of non-media-transport (eg.
datagram transport) data channel transports.
For now, PeerConnection watches the state through MediaTransport as well.
This will persist until MediaTransport implements the new callback.
Datagram transport use is negotiated. As such, an offer that requests to use
datagram transport for data channels may be rejected by the answerer. If the
offer includes DTLS, the data channels will be negotiated as SCTP/DTLS data
channels with an extra x-opaque parameter for datagram transport. If the
opaque parameter is rejected (by an answerer without datagram support), the
offerer may fall back to SCTP.
If DTLS is not enabled, there is no viable fallback. In this case, the data
channels are negotiated as media transport data channels. If the receiver does
not understand the x-opaque line, it will reject these data channels, and the
offerer's data channels will be closed.
Bug: webrtc:9719
Change-Id: Ic1bf3664c4bcf9d754482df59897f5f72fe68fcc
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/147702
Commit-Queue: Bjorn Mellem <mellem@webrtc.org>
Reviewed-by: Steve Anton <steveanton@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#28932}
2019-08-21 10:44:59 -07:00
|
|
|
DataChannelTransportInterface* JsepTransportController::GetDataChannelTransport(
|
2019-05-23 15:50:38 -07:00
|
|
|
const std::string& mid) const {
|
2021-02-10 13:05:44 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2019-05-23 15:50:38 -07:00
|
|
|
auto jsep_transport = GetJsepTransportForMid(mid);
|
Changes to enable use of DatagramTransport as a data channel transport.
PeerConnection now has a new setting in RTCConfiguration to enable use of
datagram transport for data channels. There is also a corresponding field
trial, which has both a kill-switch and a way to change the default value.
PeerConnection's interaction with MediaTransport for data channels has been
refactored to work with DataChannelTransportInterface instead.
Adds a DataChannelState and OnStateChanged() to the DataChannelSink
callbacks. This allows PeerConnection to listen to the data channel's
state directly, instead of indirectly by monitoring media transport
state. This is necessary to enable use of non-media-transport (eg.
datagram transport) data channel transports.
For now, PeerConnection watches the state through MediaTransport as well.
This will persist until MediaTransport implements the new callback.
Datagram transport use is negotiated. As such, an offer that requests to use
datagram transport for data channels may be rejected by the answerer. If the
offer includes DTLS, the data channels will be negotiated as SCTP/DTLS data
channels with an extra x-opaque parameter for datagram transport. If the
opaque parameter is rejected (by an answerer without datagram support), the
offerer may fall back to SCTP.
If DTLS is not enabled, there is no viable fallback. In this case, the data
channels are negotiated as media transport data channels. If the receiver does
not understand the x-opaque line, it will reject these data channels, and the
offerer's data channels will be closed.
Bug: webrtc:9719
Change-Id: Ic1bf3664c4bcf9d754482df59897f5f72fe68fcc
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/147702
Commit-Queue: Bjorn Mellem <mellem@webrtc.org>
Reviewed-by: Steve Anton <steveanton@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#28932}
2019-08-21 10:44:59 -07:00
|
|
|
if (!jsep_transport) {
|
2018-10-10 10:34:49 -07:00
|
|
|
return nullptr;
|
|
|
|
|
}
|
2019-09-23 14:53:54 -07:00
|
|
|
return jsep_transport->data_channel_transport();
|
2018-10-10 10:34:49 -07:00
|
|
|
}
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
cricket::DtlsTransportInternal* JsepTransportController::GetDtlsTransport(
|
2018-11-28 16:47:46 +01:00
|
|
|
const std::string& mid) {
|
2021-02-10 13:05:44 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-03-30 10:48:35 -07:00
|
|
|
auto jsep_transport = GetJsepTransportForMid(mid);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!jsep_transport) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
return jsep_transport->rtp_dtls_transport();
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-28 16:47:46 +01:00
|
|
|
const cricket::DtlsTransportInternal*
|
|
|
|
|
JsepTransportController::GetRtcpDtlsTransport(const std::string& mid) const {
|
2021-02-10 13:05:44 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-03-30 10:48:35 -07:00
|
|
|
auto jsep_transport = GetJsepTransportForMid(mid);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!jsep_transport) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
return jsep_transport->rtcp_dtls_transport();
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-17 10:39:40 +01:00
|
|
|
rtc::scoped_refptr<webrtc::DtlsTransport>
|
2018-11-28 16:47:46 +01:00
|
|
|
JsepTransportController::LookupDtlsTransportByMid(const std::string& mid) {
|
2021-02-10 13:05:44 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-11-28 16:47:46 +01:00
|
|
|
auto jsep_transport = GetJsepTransportForMid(mid);
|
|
|
|
|
if (!jsep_transport) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
return jsep_transport->RtpDtlsTransport();
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-23 14:53:54 -07:00
|
|
|
rtc::scoped_refptr<SctpTransport> JsepTransportController::GetSctpTransport(
|
|
|
|
|
const std::string& mid) const {
|
2021-02-10 13:05:44 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2019-09-23 14:53:54 -07:00
|
|
|
auto jsep_transport = GetJsepTransportForMid(mid);
|
|
|
|
|
if (!jsep_transport) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
return jsep_transport->SctpTransport();
|
|
|
|
|
}
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
void JsepTransportController::SetIceConfig(const cricket::IceConfig& config) {
|
2021-04-08 15:15:28 +02:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-02-22 15:26:27 -08:00
|
|
|
ice_config_ = config;
|
|
|
|
|
for (auto& dtls : GetDtlsTransports()) {
|
|
|
|
|
dtls->ice_transport()->SetIceConfig(ice_config_);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::SetNeedsIceRestartFlag() {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2021-06-10 06:03:06 +00:00
|
|
|
for (auto& transport : transports_.Transports()) {
|
|
|
|
|
transport->SetNeedsIceRestartFlag();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool JsepTransportController::NeedsIceRestart(
|
|
|
|
|
const std::string& transport_name) const {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
const cricket::JsepTransport* transport =
|
2018-03-30 10:48:35 -07:00
|
|
|
GetJsepTransportByName(transport_name);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!transport) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
return transport->needs_ice_restart();
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-19 16:47:43 +02:00
|
|
|
absl::optional<rtc::SSLRole> JsepTransportController::GetDtlsRole(
|
2018-03-30 10:48:35 -07:00
|
|
|
const std::string& mid) const {
|
2021-02-10 13:05:44 +01:00
|
|
|
// TODO(tommi): Remove this hop. Currently it's called from the signaling
|
|
|
|
|
// thread during negotiations, potentially multiple times.
|
|
|
|
|
// WebRtcSessionDescriptionFactory::InternalCreateAnswer is one example.
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!network_thread_->IsCurrent()) {
|
2022-09-08 18:38:10 +02:00
|
|
|
return network_thread_->BlockingCall([&] { return GetDtlsRole(mid); });
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2021-02-10 13:05:44 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
const cricket::JsepTransport* t = GetJsepTransportForMid(mid);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!t) {
|
2018-06-19 16:47:43 +02:00
|
|
|
return absl::optional<rtc::SSLRole>();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
return t->GetDtlsRole();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool JsepTransportController::SetLocalCertificate(
|
|
|
|
|
const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
|
|
|
|
|
if (!network_thread_->IsCurrent()) {
|
2022-09-08 18:38:10 +02:00
|
|
|
return network_thread_->BlockingCall(
|
|
|
|
|
[&] { return SetLocalCertificate(certificate); });
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
// Can't change a certificate, or set a null certificate.
|
|
|
|
|
if (certificate_ || !certificate) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
certificate_ = certificate;
|
|
|
|
|
|
|
|
|
|
// Set certificate for JsepTransport, which verifies it matches the
|
|
|
|
|
// fingerprint in SDP, and DTLS transport.
|
|
|
|
|
// Fallback from DTLS to SDES is not supported.
|
2021-06-10 06:03:06 +00:00
|
|
|
for (auto& transport : transports_.Transports()) {
|
|
|
|
|
transport->SetLocalCertificate(certificate_);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
for (auto& dtls : GetDtlsTransports()) {
|
|
|
|
|
bool set_cert_success = dtls->SetLocalCertificate(certificate_);
|
|
|
|
|
RTC_DCHECK(set_cert_success);
|
|
|
|
|
}
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rtc::scoped_refptr<rtc::RTCCertificate>
|
|
|
|
|
JsepTransportController::GetLocalCertificate(
|
|
|
|
|
const std::string& transport_name) const {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
const cricket::JsepTransport* t = GetJsepTransportByName(transport_name);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!t) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
return t->GetLocalCertificate();
|
|
|
|
|
}
|
|
|
|
|
|
2018-02-23 13:04:51 -08:00
|
|
|
std::unique_ptr<rtc::SSLCertChain>
|
|
|
|
|
JsepTransportController::GetRemoteSSLCertChain(
|
2018-02-22 15:26:27 -08:00
|
|
|
const std::string& transport_name) const {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-02-22 15:26:27 -08:00
|
|
|
|
2018-03-30 10:48:35 -07:00
|
|
|
// Get the certificate from the RTP transport's DTLS handshake. Should be
|
|
|
|
|
// identical to the RTCP transport's, since they were given the same remote
|
2018-02-22 15:26:27 -08:00
|
|
|
// fingerprint.
|
2018-03-30 10:48:35 -07:00
|
|
|
auto jsep_transport = GetJsepTransportByName(transport_name);
|
|
|
|
|
if (!jsep_transport) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
auto dtls = jsep_transport->rtp_dtls_transport();
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!dtls) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
|
2018-02-23 13:04:51 -08:00
|
|
|
return dtls->GetRemoteSSLCertChain();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::MaybeStartGathering() {
|
|
|
|
|
if (!network_thread_->IsCurrent()) {
|
2022-09-08 18:38:10 +02:00
|
|
|
network_thread_->BlockingCall([&] { MaybeStartGathering(); });
|
2018-02-22 15:26:27 -08:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (auto& dtls : GetDtlsTransports()) {
|
|
|
|
|
dtls->ice_transport()->MaybeStartGathering();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RTCError JsepTransportController::AddRemoteCandidates(
|
|
|
|
|
const std::string& transport_name,
|
|
|
|
|
const cricket::Candidates& candidates) {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2021-02-08 18:57:04 +01:00
|
|
|
RTC_DCHECK(VerifyCandidates(candidates).ok());
|
2018-03-30 10:48:35 -07:00
|
|
|
auto jsep_transport = GetJsepTransportByName(transport_name);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!jsep_transport) {
|
2018-03-30 10:48:35 -07:00
|
|
|
RTC_LOG(LS_WARNING) << "Not adding candidate because the JsepTransport "
|
|
|
|
|
"doesn't exist. Ignore it.";
|
|
|
|
|
return RTCError::OK();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
return jsep_transport->AddRemoteCandidates(candidates);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RTCError JsepTransportController::RemoveRemoteCandidates(
|
|
|
|
|
const cricket::Candidates& candidates) {
|
|
|
|
|
if (!network_thread_->IsCurrent()) {
|
2022-09-08 18:38:10 +02:00
|
|
|
return network_thread_->BlockingCall(
|
|
|
|
|
[&] { return RemoveRemoteCandidates(candidates); });
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
// Verify each candidate before passing down to the transport layer.
|
|
|
|
|
RTCError error = VerifyCandidates(candidates);
|
|
|
|
|
if (!error.ok()) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::map<std::string, cricket::Candidates> candidates_by_transport_name;
|
|
|
|
|
for (const cricket::Candidate& cand : candidates) {
|
|
|
|
|
if (!cand.transport_name().empty()) {
|
|
|
|
|
candidates_by_transport_name[cand.transport_name()].push_back(cand);
|
|
|
|
|
} else {
|
|
|
|
|
RTC_LOG(LS_ERROR) << "Not removing candidate because it does not have a "
|
|
|
|
|
"transport name set: "
|
2019-09-06 12:51:17 -07:00
|
|
|
<< cand.ToSensitiveString();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (const auto& kv : candidates_by_transport_name) {
|
|
|
|
|
const std::string& transport_name = kv.first;
|
|
|
|
|
const cricket::Candidates& candidates = kv.second;
|
2018-04-13 16:44:34 -07:00
|
|
|
cricket::JsepTransport* jsep_transport =
|
2018-03-30 10:48:35 -07:00
|
|
|
GetJsepTransportByName(transport_name);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!jsep_transport) {
|
2018-03-30 10:48:35 -07:00
|
|
|
RTC_LOG(LS_WARNING)
|
|
|
|
|
<< "Not removing candidate because the JsepTransport doesn't exist.";
|
|
|
|
|
continue;
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
for (const cricket::Candidate& candidate : candidates) {
|
2018-11-28 16:47:46 +01:00
|
|
|
cricket::DtlsTransportInternal* dtls =
|
|
|
|
|
candidate.component() == cricket::ICE_CANDIDATE_COMPONENT_RTP
|
|
|
|
|
? jsep_transport->rtp_dtls_transport()
|
|
|
|
|
: jsep_transport->rtcp_dtls_transport();
|
2018-02-22 15:26:27 -08:00
|
|
|
if (dtls) {
|
|
|
|
|
dtls->ice_transport()->RemoveRemoteCandidate(candidate);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return RTCError::OK();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool JsepTransportController::GetStats(const std::string& transport_name,
|
|
|
|
|
cricket::TransportStats* stats) {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
cricket::JsepTransport* transport = GetJsepTransportByName(transport_name);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!transport) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
return transport->GetStats(stats);
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-12 11:41:11 -07:00
|
|
|
void JsepTransportController::SetActiveResetSrtpParams(
|
|
|
|
|
bool active_reset_srtp_params) {
|
|
|
|
|
if (!network_thread_->IsCurrent()) {
|
2022-09-08 18:38:10 +02:00
|
|
|
network_thread_->BlockingCall(
|
|
|
|
|
[=] { SetActiveResetSrtpParams(active_reset_srtp_params); });
|
2018-06-12 11:41:11 -07:00
|
|
|
return;
|
|
|
|
|
}
|
2021-01-29 14:27:12 +00:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2021-11-04 12:01:23 +00:00
|
|
|
RTC_LOG(LS_INFO)
|
2018-06-12 11:41:11 -07:00
|
|
|
<< "Updating the active_reset_srtp_params for JsepTransportController: "
|
|
|
|
|
<< active_reset_srtp_params;
|
2021-01-29 14:27:12 +00:00
|
|
|
active_reset_srtp_params_ = active_reset_srtp_params;
|
2021-06-10 06:03:06 +00:00
|
|
|
for (auto& transport : transports_.Transports()) {
|
|
|
|
|
transport->SetActiveResetSrtpParams(active_reset_srtp_params);
|
2018-06-12 11:41:11 -07:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-11 14:56:38 -07:00
|
|
|
RTCError JsepTransportController::RollbackTransports() {
|
2019-10-09 18:29:44 +03:00
|
|
|
if (!network_thread_->IsCurrent()) {
|
2022-09-08 18:38:10 +02:00
|
|
|
return network_thread_->BlockingCall([=] { return RollbackTransports(); });
|
2019-10-09 18:29:44 +03:00
|
|
|
}
|
2020-02-19 20:41:07 +02:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2021-08-11 14:56:38 -07:00
|
|
|
bundles_.Rollback();
|
|
|
|
|
if (!transports_.RollbackTransports()) {
|
|
|
|
|
LOG_AND_RETURN_ERROR(RTCErrorType::INTERNAL_ERROR,
|
|
|
|
|
"Failed to roll back transport state.");
|
|
|
|
|
}
|
|
|
|
|
return RTCError::OK();
|
2019-10-09 18:29:44 +03:00
|
|
|
}
|
|
|
|
|
|
2019-11-15 12:33:05 -08:00
|
|
|
rtc::scoped_refptr<webrtc::IceTransportInterface>
|
|
|
|
|
JsepTransportController::CreateIceTransport(const std::string& transport_name,
|
2019-01-16 08:25:21 -08:00
|
|
|
bool rtcp) {
|
2018-02-22 15:26:27 -08:00
|
|
|
int component = rtcp ? cricket::ICE_CANDIDATE_COMPONENT_RTCP
|
|
|
|
|
: cricket::ICE_CANDIDATE_COMPONENT_RTP;
|
|
|
|
|
|
2019-11-15 12:33:05 -08:00
|
|
|
IceTransportInit init;
|
|
|
|
|
init.set_port_allocator(port_allocator_);
|
2021-04-08 07:25:04 +00:00
|
|
|
init.set_async_dns_resolver_factory(async_dns_resolver_factory_);
|
2019-11-15 12:33:05 -08:00
|
|
|
init.set_event_log(config_.event_log);
|
2022-03-17 09:14:16 +01:00
|
|
|
init.set_field_trials(config_.field_trials);
|
2019-11-15 12:33:05 -08:00
|
|
|
return config_.ice_transport_factory->CreateIceTransport(
|
|
|
|
|
transport_name, component, std::move(init));
|
2019-01-16 08:25:21 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::unique_ptr<cricket::DtlsTransportInternal>
|
|
|
|
|
JsepTransportController::CreateDtlsTransport(
|
2019-07-10 15:44:56 -07:00
|
|
|
const cricket::ContentInfo& content_info,
|
2020-06-16 16:39:13 +02:00
|
|
|
cricket::IceTransportInternal* ice) {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2019-01-16 08:25:21 -08:00
|
|
|
|
|
|
|
|
std::unique_ptr<cricket::DtlsTransportInternal> dtls;
|
2019-05-23 15:50:38 -07:00
|
|
|
|
2020-06-16 16:39:13 +02:00
|
|
|
if (config_.dtls_transport_factory) {
|
2019-11-15 12:33:05 -08:00
|
|
|
dtls = config_.dtls_transport_factory->CreateDtlsTransport(
|
2021-04-03 17:53:54 +02:00
|
|
|
ice, config_.crypto_options, config_.ssl_max_version);
|
2019-01-16 08:25:21 -08:00
|
|
|
} else {
|
2019-09-17 17:06:18 +02:00
|
|
|
dtls = std::make_unique<cricket::DtlsTransport>(ice, config_.crypto_options,
|
2021-04-03 17:53:54 +02:00
|
|
|
config_.event_log,
|
|
|
|
|
config_.ssl_max_version);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RTC_DCHECK(dtls);
|
|
|
|
|
dtls->ice_transport()->SetIceRole(ice_role_);
|
|
|
|
|
dtls->ice_transport()->SetIceTiebreaker(ice_tiebreaker_);
|
|
|
|
|
dtls->ice_transport()->SetIceConfig(ice_config_);
|
|
|
|
|
if (certificate_) {
|
|
|
|
|
bool set_cert_success = dtls->SetLocalCertificate(certificate_);
|
|
|
|
|
RTC_DCHECK(set_cert_success);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Connect to signals offered by the DTLS and ICE transport.
|
|
|
|
|
dtls->SignalWritableState.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportWritableState_n);
|
|
|
|
|
dtls->SignalReceivingState.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportReceivingState_n);
|
|
|
|
|
dtls->ice_transport()->SignalGatheringState.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportGatheringState_n);
|
|
|
|
|
dtls->ice_transport()->SignalCandidateGathered.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportCandidateGathered_n);
|
2019-06-01 12:23:43 +03:00
|
|
|
dtls->ice_transport()->SignalCandidateError.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportCandidateError_n);
|
2018-02-22 15:26:27 -08:00
|
|
|
dtls->ice_transport()->SignalCandidatesRemoved.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportCandidatesRemoved_n);
|
|
|
|
|
dtls->ice_transport()->SignalRoleConflict.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportRoleConflict_n);
|
|
|
|
|
dtls->ice_transport()->SignalStateChanged.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportStateChanged_n);
|
2019-01-15 16:31:55 +01:00
|
|
|
dtls->ice_transport()->SignalIceTransportStateChanged.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportStateChanged_n);
|
2019-08-06 10:54:47 -07:00
|
|
|
dtls->ice_transport()->SignalCandidatePairChanged.connect(
|
|
|
|
|
this, &JsepTransportController::OnTransportCandidatePairChanged_n);
|
2021-02-02 07:27:09 -08:00
|
|
|
|
|
|
|
|
dtls->SubscribeDtlsHandshakeError(
|
|
|
|
|
[this](rtc::SSLHandshakeError error) { OnDtlsHandshakeError(error); });
|
2018-02-22 15:26:27 -08:00
|
|
|
return dtls;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::unique_ptr<webrtc::RtpTransport>
|
|
|
|
|
JsepTransportController::CreateUnencryptedRtpTransport(
|
|
|
|
|
const std::string& transport_name,
|
|
|
|
|
rtc::PacketTransportInternal* rtp_packet_transport,
|
|
|
|
|
rtc::PacketTransportInternal* rtcp_packet_transport) {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-03-30 10:48:35 -07:00
|
|
|
auto unencrypted_rtp_transport =
|
2019-09-17 17:06:18 +02:00
|
|
|
std::make_unique<RtpTransport>(rtcp_packet_transport == nullptr);
|
2018-03-30 10:48:35 -07:00
|
|
|
unencrypted_rtp_transport->SetRtpPacketTransport(rtp_packet_transport);
|
|
|
|
|
if (rtcp_packet_transport) {
|
|
|
|
|
unencrypted_rtp_transport->SetRtcpPacketTransport(rtcp_packet_transport);
|
|
|
|
|
}
|
|
|
|
|
return unencrypted_rtp_transport;
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::unique_ptr<webrtc::SrtpTransport>
|
|
|
|
|
JsepTransportController::CreateSdesTransport(
|
|
|
|
|
const std::string& transport_name,
|
2018-03-30 10:48:35 -07:00
|
|
|
cricket::DtlsTransportInternal* rtp_dtls_transport,
|
|
|
|
|
cricket::DtlsTransportInternal* rtcp_dtls_transport) {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2022-03-09 09:28:10 +01:00
|
|
|
auto srtp_transport = std::make_unique<webrtc::SrtpTransport>(
|
|
|
|
|
rtcp_dtls_transport == nullptr, *config_.field_trials);
|
2018-03-30 10:48:35 -07:00
|
|
|
RTC_DCHECK(rtp_dtls_transport);
|
|
|
|
|
srtp_transport->SetRtpPacketTransport(rtp_dtls_transport);
|
|
|
|
|
if (rtcp_dtls_transport) {
|
|
|
|
|
srtp_transport->SetRtcpPacketTransport(rtcp_dtls_transport);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
if (config_.enable_external_auth) {
|
|
|
|
|
srtp_transport->EnableExternalAuth();
|
|
|
|
|
}
|
|
|
|
|
return srtp_transport;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::unique_ptr<webrtc::DtlsSrtpTransport>
|
|
|
|
|
JsepTransportController::CreateDtlsSrtpTransport(
|
|
|
|
|
const std::string& transport_name,
|
|
|
|
|
cricket::DtlsTransportInternal* rtp_dtls_transport,
|
|
|
|
|
cricket::DtlsTransportInternal* rtcp_dtls_transport) {
|
2021-01-29 14:27:12 +00:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2019-09-17 17:06:18 +02:00
|
|
|
auto dtls_srtp_transport = std::make_unique<webrtc::DtlsSrtpTransport>(
|
2022-03-09 09:28:10 +01:00
|
|
|
rtcp_dtls_transport == nullptr, *config_.field_trials);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (config_.enable_external_auth) {
|
2018-04-13 16:44:34 -07:00
|
|
|
dtls_srtp_transport->EnableExternalAuth();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dtls_srtp_transport->SetDtlsTransports(rtp_dtls_transport,
|
|
|
|
|
rtcp_dtls_transport);
|
2021-01-29 14:27:12 +00:00
|
|
|
dtls_srtp_transport->SetActiveResetSrtpParams(active_reset_srtp_params_);
|
2021-02-17 00:43:21 -08:00
|
|
|
// Capturing this in the callback because JsepTransportController will always
|
|
|
|
|
// outlive the DtlsSrtpTransport.
|
|
|
|
|
dtls_srtp_transport->SetOnDtlsStateChange([this]() {
|
|
|
|
|
RTC_DCHECK_RUN_ON(this->network_thread_);
|
|
|
|
|
this->UpdateAggregateStates_n();
|
|
|
|
|
});
|
2018-02-22 15:26:27 -08:00
|
|
|
return dtls_srtp_transport;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::vector<cricket::DtlsTransportInternal*>
|
|
|
|
|
JsepTransportController::GetDtlsTransports() {
|
2021-02-04 10:22:50 +01:00
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
2018-02-22 15:26:27 -08:00
|
|
|
std::vector<cricket::DtlsTransportInternal*> dtls_transports;
|
2021-06-10 06:03:06 +00:00
|
|
|
for (auto jsep_transport : transports_.Transports()) {
|
2018-02-22 15:26:27 -08:00
|
|
|
RTC_DCHECK(jsep_transport);
|
|
|
|
|
if (jsep_transport->rtp_dtls_transport()) {
|
|
|
|
|
dtls_transports.push_back(jsep_transport->rtp_dtls_transport());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (jsep_transport->rtcp_dtls_transport()) {
|
|
|
|
|
dtls_transports.push_back(jsep_transport->rtcp_dtls_transport());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return dtls_transports;
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-11 14:56:38 -07:00
|
|
|
std::vector<cricket::DtlsTransportInternal*>
|
|
|
|
|
JsepTransportController::GetActiveDtlsTransports() {
|
|
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
std::vector<cricket::DtlsTransportInternal*> dtls_transports;
|
|
|
|
|
for (auto jsep_transport : transports_.ActiveTransports()) {
|
|
|
|
|
RTC_DCHECK(jsep_transport);
|
|
|
|
|
if (jsep_transport->rtp_dtls_transport()) {
|
|
|
|
|
dtls_transports.push_back(jsep_transport->rtp_dtls_transport());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (jsep_transport->rtcp_dtls_transport()) {
|
|
|
|
|
dtls_transports.push_back(jsep_transport->rtcp_dtls_transport());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return dtls_transports;
|
|
|
|
|
}
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
RTCError JsepTransportController::ApplyDescription_n(
|
|
|
|
|
bool local,
|
|
|
|
|
SdpType type,
|
|
|
|
|
const cricket::SessionDescription* description) {
|
2021-06-07 13:30:46 +02:00
|
|
|
TRACE_EVENT0("webrtc", "JsepTransportController::ApplyDescription_n");
|
2018-02-22 15:26:27 -08:00
|
|
|
RTC_DCHECK(description);
|
|
|
|
|
|
|
|
|
|
if (local) {
|
|
|
|
|
local_desc_ = description;
|
|
|
|
|
} else {
|
|
|
|
|
remote_desc_ = description;
|
|
|
|
|
}
|
|
|
|
|
|
2018-03-30 10:48:35 -07:00
|
|
|
RTCError error;
|
2021-04-26 21:04:26 +02:00
|
|
|
error = ValidateAndMaybeUpdateBundleGroups(local, type, description);
|
2018-03-30 10:48:35 -07:00
|
|
|
if (!error.ok()) {
|
|
|
|
|
return error;
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2021-04-26 21:04:26 +02:00
|
|
|
std::map<const cricket::ContentGroup*, std::vector<int>>
|
|
|
|
|
merged_encrypted_extension_ids_by_bundle;
|
2021-06-08 04:12:37 +00:00
|
|
|
if (!bundles_.bundle_groups().empty()) {
|
2021-04-26 21:04:26 +02:00
|
|
|
merged_encrypted_extension_ids_by_bundle =
|
2021-06-17 14:03:09 +00:00
|
|
|
MergeEncryptedHeaderExtensionIdsForBundles(description);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (const cricket::ContentInfo& content_info : description->contents()) {
|
2021-04-26 21:04:26 +02:00
|
|
|
// Don't create transports for rejected m-lines and bundled m-lines.
|
2018-02-22 15:26:27 -08:00
|
|
|
if (content_info.rejected ||
|
2021-06-17 14:03:09 +00:00
|
|
|
!bundles_.IsFirstMidInGroup(content_info.name)) {
|
2018-02-22 15:26:27 -08:00
|
|
|
continue;
|
|
|
|
|
}
|
2019-02-27 14:26:15 -08:00
|
|
|
error = MaybeCreateJsepTransport(local, content_info, *description);
|
2018-03-30 10:48:35 -07:00
|
|
|
if (!error.ok()) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RTC_DCHECK(description->contents().size() ==
|
|
|
|
|
description->transport_infos().size());
|
|
|
|
|
for (size_t i = 0; i < description->contents().size(); ++i) {
|
|
|
|
|
const cricket::ContentInfo& content_info = description->contents()[i];
|
|
|
|
|
const cricket::TransportInfo& transport_info =
|
|
|
|
|
description->transport_infos()[i];
|
2021-08-11 12:38:35 -07:00
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
if (content_info.rejected) {
|
2021-08-11 14:56:38 -07:00
|
|
|
// This may cause groups to be removed from |bundles_.bundle_groups()|.
|
|
|
|
|
HandleRejectedContent(content_info);
|
2018-02-22 15:26:27 -08:00
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-26 21:04:26 +02:00
|
|
|
const cricket::ContentGroup* established_bundle_group =
|
2021-06-17 14:03:09 +00:00
|
|
|
bundles_.LookupGroupByMid(content_info.name);
|
2021-04-26 21:04:26 +02:00
|
|
|
|
|
|
|
|
// For bundle members that are not BUNDLE-tagged (not first in the group),
|
|
|
|
|
// configure their transport to be the same as the BUNDLE-tagged transport.
|
|
|
|
|
if (established_bundle_group &&
|
|
|
|
|
content_info.name != *established_bundle_group->FirstContentName()) {
|
|
|
|
|
if (!HandleBundledContent(content_info, *established_bundle_group)) {
|
2018-04-13 16:44:34 -07:00
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
2021-04-26 21:04:26 +02:00
|
|
|
"Failed to process the bundled m= section with "
|
|
|
|
|
"mid='" +
|
2020-06-03 21:15:22 +00:00
|
|
|
content_info.name + "'.");
|
2018-04-13 16:44:34 -07:00
|
|
|
}
|
2018-02-22 15:26:27 -08:00
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2018-03-30 10:48:35 -07:00
|
|
|
error = ValidateContent(content_info);
|
|
|
|
|
if (!error.ok()) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
std::vector<int> extension_ids;
|
2021-04-26 21:04:26 +02:00
|
|
|
// Is BUNDLE-tagged (first in the group)?
|
|
|
|
|
if (established_bundle_group &&
|
|
|
|
|
content_info.name == *established_bundle_group->FirstContentName()) {
|
|
|
|
|
auto it = merged_encrypted_extension_ids_by_bundle.find(
|
|
|
|
|
established_bundle_group);
|
|
|
|
|
RTC_DCHECK(it != merged_encrypted_extension_ids_by_bundle.end());
|
|
|
|
|
extension_ids = it->second;
|
2018-02-22 15:26:27 -08:00
|
|
|
} else {
|
|
|
|
|
extension_ids = GetEncryptedHeaderExtensionIds(content_info);
|
|
|
|
|
}
|
|
|
|
|
|
2018-03-30 10:48:35 -07:00
|
|
|
int rtp_abs_sendtime_extn_id =
|
|
|
|
|
GetRtpAbsSendTimeHeaderExtensionId(content_info);
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
cricket::JsepTransport* transport =
|
2018-03-30 10:48:35 -07:00
|
|
|
GetJsepTransportForMid(content_info.name);
|
2018-02-22 15:26:27 -08:00
|
|
|
RTC_DCHECK(transport);
|
|
|
|
|
|
|
|
|
|
SetIceRole_n(DetermineIceRole(transport, transport_info, type, local));
|
|
|
|
|
|
|
|
|
|
cricket::JsepTransportDescription jsep_description =
|
|
|
|
|
CreateJsepTransportDescription(content_info, transport_info,
|
2020-06-18 10:10:17 +02:00
|
|
|
extension_ids, rtp_abs_sendtime_extn_id);
|
2018-02-22 15:26:27 -08:00
|
|
|
if (local) {
|
|
|
|
|
error =
|
|
|
|
|
transport->SetLocalJsepTransportDescription(jsep_description, type);
|
|
|
|
|
} else {
|
|
|
|
|
error =
|
|
|
|
|
transport->SetRemoteJsepTransportDescription(jsep_description, type);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!error.ok()) {
|
2020-06-03 21:15:22 +00:00
|
|
|
LOG_AND_RETURN_ERROR(
|
|
|
|
|
RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"Failed to apply the description for m= section with mid='" +
|
|
|
|
|
content_info.name + "': " + error.message());
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
}
|
2020-02-19 20:41:07 +02:00
|
|
|
if (type == SdpType::kAnswer) {
|
2021-06-10 06:03:06 +00:00
|
|
|
transports_.CommitTransports();
|
2021-08-11 14:56:38 -07:00
|
|
|
bundles_.Commit();
|
2020-02-19 20:41:07 +02:00
|
|
|
}
|
2018-02-22 15:26:27 -08:00
|
|
|
return RTCError::OK();
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-26 21:04:26 +02:00
|
|
|
RTCError JsepTransportController::ValidateAndMaybeUpdateBundleGroups(
|
2018-04-10 14:41:03 -07:00
|
|
|
bool local,
|
|
|
|
|
SdpType type,
|
2018-03-30 10:48:35 -07:00
|
|
|
const cricket::SessionDescription* description) {
|
|
|
|
|
RTC_DCHECK(description);
|
2018-04-10 14:41:03 -07:00
|
|
|
|
2021-04-26 21:04:26 +02:00
|
|
|
std::vector<const cricket::ContentGroup*> new_bundle_groups =
|
|
|
|
|
description->GetGroupsByName(cricket::GROUP_TYPE_BUNDLE);
|
2021-07-30 22:30:23 +02:00
|
|
|
// Verify `new_bundle_groups`.
|
2021-04-26 21:04:26 +02:00
|
|
|
std::map<std::string, const cricket::ContentGroup*> new_bundle_groups_by_mid;
|
|
|
|
|
for (const cricket::ContentGroup* new_bundle_group : new_bundle_groups) {
|
2020-06-03 21:15:22 +00:00
|
|
|
for (const std::string& content_name : new_bundle_group->content_names()) {
|
2021-04-26 21:04:26 +02:00
|
|
|
// The BUNDLE group must not contain a MID that is a member of a different
|
|
|
|
|
// BUNDLE group, or that contains the same MID multiple times.
|
|
|
|
|
if (new_bundle_groups_by_mid.find(content_name) !=
|
|
|
|
|
new_bundle_groups_by_mid.end()) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"A BUNDLE group contains a MID='" + content_name +
|
|
|
|
|
"' that is already in a BUNDLE group.");
|
|
|
|
|
}
|
|
|
|
|
new_bundle_groups_by_mid.insert(
|
|
|
|
|
std::make_pair(content_name, new_bundle_group));
|
|
|
|
|
// The BUNDLE group must not contain a MID that no m= section has.
|
2018-04-10 14:41:03 -07:00
|
|
|
if (!description->GetContentByName(content_name)) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
2021-04-26 21:04:26 +02:00
|
|
|
"A BUNDLE group contains a MID='" + content_name +
|
2020-06-03 21:15:22 +00:00
|
|
|
"' matching no m= section.");
|
2018-04-10 14:41:03 -07:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-11 14:56:38 -07:00
|
|
|
if (type == SdpType::kOffer) {
|
|
|
|
|
// For an offer, we need to verify that there is not a conflicting mapping
|
|
|
|
|
// between existing and new bundle groups. For example, if the existing
|
|
|
|
|
// groups are [[1,2],[3,4]] and new are [[1,3],[2,4]] or [[1,2,3,4]], or
|
|
|
|
|
// vice versa. Switching things around like this requires a separate offer
|
|
|
|
|
// that removes the relevant sections from their group, as per RFC 8843,
|
|
|
|
|
// section 7.5.2.
|
|
|
|
|
std::map<const cricket::ContentGroup*, const cricket::ContentGroup*>
|
|
|
|
|
new_bundle_groups_by_existing_bundle_groups;
|
|
|
|
|
std::map<const cricket::ContentGroup*, const cricket::ContentGroup*>
|
|
|
|
|
existing_bundle_groups_by_new_bundle_groups;
|
|
|
|
|
for (const cricket::ContentGroup* new_bundle_group : new_bundle_groups) {
|
|
|
|
|
for (const std::string& mid : new_bundle_group->content_names()) {
|
|
|
|
|
cricket::ContentGroup* existing_bundle_group =
|
|
|
|
|
bundles_.LookupGroupByMid(mid);
|
|
|
|
|
if (!existing_bundle_group) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
auto it = new_bundle_groups_by_existing_bundle_groups.find(
|
|
|
|
|
existing_bundle_group);
|
|
|
|
|
if (it != new_bundle_groups_by_existing_bundle_groups.end() &&
|
|
|
|
|
it->second != new_bundle_group) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"MID " + mid + " in the offer has changed group.");
|
|
|
|
|
}
|
|
|
|
|
new_bundle_groups_by_existing_bundle_groups.insert(
|
|
|
|
|
std::make_pair(existing_bundle_group, new_bundle_group));
|
|
|
|
|
it = existing_bundle_groups_by_new_bundle_groups.find(new_bundle_group);
|
|
|
|
|
if (it != existing_bundle_groups_by_new_bundle_groups.end() &&
|
|
|
|
|
it->second != existing_bundle_group) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"MID " + mid + " in the offer has changed group.");
|
|
|
|
|
}
|
|
|
|
|
existing_bundle_groups_by_new_bundle_groups.insert(
|
|
|
|
|
std::make_pair(new_bundle_group, existing_bundle_group));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
} else if (type == SdpType::kAnswer) {
|
2021-04-26 21:04:26 +02:00
|
|
|
std::vector<const cricket::ContentGroup*> offered_bundle_groups =
|
|
|
|
|
local ? remote_desc_->GetGroupsByName(cricket::GROUP_TYPE_BUNDLE)
|
|
|
|
|
: local_desc_->GetGroupsByName(cricket::GROUP_TYPE_BUNDLE);
|
|
|
|
|
|
|
|
|
|
std::map<std::string, const cricket::ContentGroup*>
|
|
|
|
|
offered_bundle_groups_by_mid;
|
|
|
|
|
for (const cricket::ContentGroup* offered_bundle_group :
|
|
|
|
|
offered_bundle_groups) {
|
|
|
|
|
for (const std::string& content_name :
|
|
|
|
|
offered_bundle_group->content_names()) {
|
|
|
|
|
offered_bundle_groups_by_mid[content_name] = offered_bundle_group;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-04-10 14:41:03 -07:00
|
|
|
|
2021-04-26 21:04:26 +02:00
|
|
|
std::map<const cricket::ContentGroup*, const cricket::ContentGroup*>
|
|
|
|
|
new_bundle_groups_by_offered_bundle_groups;
|
|
|
|
|
for (const cricket::ContentGroup* new_bundle_group : new_bundle_groups) {
|
|
|
|
|
if (!new_bundle_group->FirstContentName()) {
|
|
|
|
|
// Empty groups could be a subset of any group.
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
// The group in the answer (new_bundle_group) must have a corresponding
|
|
|
|
|
// group in the offer (original_group), because the answer groups may only
|
|
|
|
|
// be subsets of the offer groups.
|
|
|
|
|
auto it = offered_bundle_groups_by_mid.find(
|
|
|
|
|
*new_bundle_group->FirstContentName());
|
|
|
|
|
if (it == offered_bundle_groups_by_mid.end()) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"A BUNDLE group was added in the answer that did not "
|
|
|
|
|
"exist in the offer.");
|
|
|
|
|
}
|
|
|
|
|
const cricket::ContentGroup* offered_bundle_group = it->second;
|
|
|
|
|
if (new_bundle_groups_by_offered_bundle_groups.find(
|
|
|
|
|
offered_bundle_group) !=
|
|
|
|
|
new_bundle_groups_by_offered_bundle_groups.end()) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"A MID in the answer has changed group.");
|
|
|
|
|
}
|
|
|
|
|
new_bundle_groups_by_offered_bundle_groups.insert(
|
|
|
|
|
std::make_pair(offered_bundle_group, new_bundle_group));
|
2020-06-03 21:15:22 +00:00
|
|
|
for (const std::string& content_name :
|
|
|
|
|
new_bundle_group->content_names()) {
|
2021-04-26 21:04:26 +02:00
|
|
|
it = offered_bundle_groups_by_mid.find(content_name);
|
|
|
|
|
// The BUNDLE group in answer should be a subset of offered group.
|
|
|
|
|
if (it == offered_bundle_groups_by_mid.end() ||
|
|
|
|
|
it->second != offered_bundle_group) {
|
2018-04-10 14:41:03 -07:00
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
2021-04-26 21:04:26 +02:00
|
|
|
"A BUNDLE group in answer contains a MID='" +
|
2020-06-03 21:15:22 +00:00
|
|
|
content_name +
|
2021-04-26 21:04:26 +02:00
|
|
|
"' that was not in the offered group.");
|
2018-04-10 14:41:03 -07:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2021-06-08 04:12:37 +00:00
|
|
|
for (const auto& bundle_group : bundles_.bundle_groups()) {
|
2021-04-26 21:04:26 +02:00
|
|
|
for (const std::string& content_name : bundle_group->content_names()) {
|
2018-04-10 14:41:03 -07:00
|
|
|
// An answer that removes m= sections from pre-negotiated BUNDLE group
|
|
|
|
|
// without rejecting it, is invalid.
|
2021-04-26 21:04:26 +02:00
|
|
|
auto it = new_bundle_groups_by_mid.find(content_name);
|
|
|
|
|
if (it == new_bundle_groups_by_mid.end()) {
|
2018-04-10 14:41:03 -07:00
|
|
|
auto* content_info = description->GetContentByName(content_name);
|
|
|
|
|
if (!content_info || !content_info->rejected) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
2020-06-03 21:15:22 +00:00
|
|
|
"Answer cannot remove m= section with mid='" +
|
|
|
|
|
content_name +
|
|
|
|
|
"' from already-established BUNDLE group.");
|
2018-04-10 14:41:03 -07:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (config_.bundle_policy ==
|
|
|
|
|
PeerConnectionInterface::kBundlePolicyMaxBundle &&
|
|
|
|
|
!description->HasGroup(cricket::GROUP_TYPE_BUNDLE)) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"max-bundle is used but no bundle group found.");
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-11 14:56:38 -07:00
|
|
|
bundles_.Update(description, type);
|
2018-03-30 10:48:35 -07:00
|
|
|
|
2021-06-08 04:12:37 +00:00
|
|
|
for (const auto& bundle_group : bundles_.bundle_groups()) {
|
2021-04-26 21:04:26 +02:00
|
|
|
if (!bundle_group->FirstContentName())
|
|
|
|
|
continue;
|
2018-03-30 10:48:35 -07:00
|
|
|
|
2021-04-26 21:04:26 +02:00
|
|
|
// The first MID in a BUNDLE group is BUNDLE-tagged.
|
|
|
|
|
auto bundled_content =
|
|
|
|
|
description->GetContentByName(*bundle_group->FirstContentName());
|
|
|
|
|
if (!bundled_content) {
|
|
|
|
|
return RTCError(
|
|
|
|
|
RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"An m= section associated with the BUNDLE-tag doesn't exist.");
|
|
|
|
|
}
|
2018-03-30 10:48:35 -07:00
|
|
|
|
2021-07-30 22:30:23 +02:00
|
|
|
// If the `bundled_content` is rejected, other contents in the bundle group
|
2021-04-26 21:04:26 +02:00
|
|
|
// must also be rejected.
|
|
|
|
|
if (bundled_content->rejected) {
|
|
|
|
|
for (const auto& content_name : bundle_group->content_names()) {
|
|
|
|
|
auto other_content = description->GetContentByName(content_name);
|
|
|
|
|
if (!other_content->rejected) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"The m= section with mid='" + content_name +
|
|
|
|
|
"' should be rejected.");
|
|
|
|
|
}
|
2018-03-30 10:48:35 -07:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return RTCError::OK();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RTCError JsepTransportController::ValidateContent(
|
|
|
|
|
const cricket::ContentInfo& content_info) {
|
|
|
|
|
if (config_.rtcp_mux_policy ==
|
|
|
|
|
PeerConnectionInterface::kRtcpMuxPolicyRequire &&
|
|
|
|
|
content_info.type == cricket::MediaProtocolType::kRtp &&
|
|
|
|
|
!content_info.media_description()->rtcp_mux()) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
2020-06-03 21:15:22 +00:00
|
|
|
"The m= section with mid='" + content_info.name +
|
|
|
|
|
"' is invalid. RTCP-MUX is not "
|
2018-03-30 10:48:35 -07:00
|
|
|
"enabled when it is required.");
|
|
|
|
|
}
|
|
|
|
|
return RTCError::OK();
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-16 16:42:14 -07:00
|
|
|
void JsepTransportController::HandleRejectedContent(
|
2021-06-17 14:03:09 +00:00
|
|
|
const cricket::ContentInfo& content_info) {
|
2018-02-22 15:26:27 -08:00
|
|
|
// If the content is rejected, let the
|
|
|
|
|
// BaseChannel/SctpTransport change the RtpTransport/DtlsTransport first,
|
2018-04-13 16:44:34 -07:00
|
|
|
// then destroy the cricket::JsepTransport.
|
2021-04-26 21:04:26 +02:00
|
|
|
cricket::ContentGroup* bundle_group =
|
2021-06-17 14:03:09 +00:00
|
|
|
bundles_.LookupGroupByMid(content_info.name);
|
2021-04-26 21:04:26 +02:00
|
|
|
if (bundle_group && !bundle_group->content_names().empty() &&
|
|
|
|
|
content_info.name == *bundle_group->FirstContentName()) {
|
|
|
|
|
// Rejecting a BUNDLE group's first mid means we are rejecting the entire
|
|
|
|
|
// group.
|
|
|
|
|
for (const auto& content_name : bundle_group->content_names()) {
|
2021-06-10 06:03:06 +00:00
|
|
|
transports_.RemoveTransportForMid(content_name);
|
2018-03-30 10:48:35 -07:00
|
|
|
}
|
2021-04-26 21:04:26 +02:00
|
|
|
// Delete the BUNDLE group.
|
2021-06-08 09:51:19 +00:00
|
|
|
bundles_.DeleteGroup(bundle_group);
|
2021-04-26 21:04:26 +02:00
|
|
|
} else {
|
2021-06-10 06:03:06 +00:00
|
|
|
transports_.RemoveTransportForMid(content_info.name);
|
2021-04-26 21:04:26 +02:00
|
|
|
if (bundle_group) {
|
2021-07-30 22:30:23 +02:00
|
|
|
// Remove the rejected content from the `bundle_group`.
|
2021-06-08 09:51:19 +00:00
|
|
|
bundles_.DeleteMid(bundle_group, content_info.name);
|
2018-03-30 10:48:35 -07:00
|
|
|
}
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
bool JsepTransportController::HandleBundledContent(
|
2021-04-26 21:04:26 +02:00
|
|
|
const cricket::ContentInfo& content_info,
|
|
|
|
|
const cricket::ContentGroup& bundle_group) {
|
2021-06-07 13:30:46 +02:00
|
|
|
TRACE_EVENT0("webrtc", "JsepTransportController::HandleBundledContent");
|
2021-04-26 21:04:26 +02:00
|
|
|
RTC_DCHECK(bundle_group.FirstContentName());
|
|
|
|
|
auto jsep_transport =
|
|
|
|
|
GetJsepTransportByName(*bundle_group.FirstContentName());
|
2018-04-10 14:41:03 -07:00
|
|
|
RTC_DCHECK(jsep_transport);
|
2018-02-22 15:26:27 -08:00
|
|
|
// If the content is bundled, let the
|
|
|
|
|
// BaseChannel/SctpTransport change the RtpTransport/DtlsTransport first,
|
2018-04-13 16:44:34 -07:00
|
|
|
// then destroy the cricket::JsepTransport.
|
2021-06-11 13:04:59 +00:00
|
|
|
// TODO(bugs.webrtc.org/9719) For media transport this is far from ideal,
|
|
|
|
|
// because it means that we first create media transport and start
|
|
|
|
|
// connecting it, and then we destroy it. We will need to address it before
|
|
|
|
|
// video path is enabled.
|
|
|
|
|
return transports_.SetTransportForMid(content_info.name, jsep_transport);
|
2018-04-10 14:41:03 -07:00
|
|
|
}
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
cricket::JsepTransportDescription
|
|
|
|
|
JsepTransportController::CreateJsepTransportDescription(
|
2019-06-03 20:35:45 +02:00
|
|
|
const cricket::ContentInfo& content_info,
|
|
|
|
|
const cricket::TransportInfo& transport_info,
|
2018-03-30 10:48:35 -07:00
|
|
|
const std::vector<int>& encrypted_extension_ids,
|
2020-06-18 10:10:17 +02:00
|
|
|
int rtp_abs_sendtime_extn_id) {
|
2021-06-07 13:30:46 +02:00
|
|
|
TRACE_EVENT0("webrtc",
|
|
|
|
|
"JsepTransportController::CreateJsepTransportDescription");
|
2018-02-22 15:26:27 -08:00
|
|
|
const cricket::MediaContentDescription* content_desc =
|
2019-06-03 20:35:45 +02:00
|
|
|
content_info.media_description();
|
2018-02-22 15:26:27 -08:00
|
|
|
RTC_DCHECK(content_desc);
|
|
|
|
|
bool rtcp_mux_enabled = content_info.type == cricket::MediaProtocolType::kSctp
|
|
|
|
|
? true
|
|
|
|
|
: content_desc->rtcp_mux();
|
|
|
|
|
|
|
|
|
|
return cricket::JsepTransportDescription(
|
2021-11-04 13:52:31 +00:00
|
|
|
rtcp_mux_enabled, content_desc->cryptos(), encrypted_extension_ids,
|
|
|
|
|
rtp_abs_sendtime_extn_id, transport_info.description);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::vector<int> JsepTransportController::GetEncryptedHeaderExtensionIds(
|
|
|
|
|
const cricket::ContentInfo& content_info) {
|
|
|
|
|
const cricket::MediaContentDescription* content_desc =
|
2019-06-03 20:35:45 +02:00
|
|
|
content_info.media_description();
|
2018-02-22 15:26:27 -08:00
|
|
|
|
2018-10-11 15:33:17 -07:00
|
|
|
if (!config_.crypto_options.srtp.enable_encrypted_rtp_header_extensions) {
|
2018-02-22 15:26:27 -08:00
|
|
|
return std::vector<int>();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::vector<int> encrypted_header_extension_ids;
|
2019-01-27 17:29:42 +01:00
|
|
|
for (const auto& extension : content_desc->rtp_header_extensions()) {
|
2018-02-22 15:26:27 -08:00
|
|
|
if (!extension.encrypt) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2019-01-28 17:25:26 -08:00
|
|
|
if (!absl::c_linear_search(encrypted_header_extension_ids, extension.id)) {
|
2018-02-22 15:26:27 -08:00
|
|
|
encrypted_header_extension_ids.push_back(extension.id);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return encrypted_header_extension_ids;
|
|
|
|
|
}
|
|
|
|
|
|
2021-04-26 21:04:26 +02:00
|
|
|
std::map<const cricket::ContentGroup*, std::vector<int>>
|
|
|
|
|
JsepTransportController::MergeEncryptedHeaderExtensionIdsForBundles(
|
2018-02-22 15:26:27 -08:00
|
|
|
const cricket::SessionDescription* description) {
|
|
|
|
|
RTC_DCHECK(description);
|
2021-06-08 04:12:37 +00:00
|
|
|
RTC_DCHECK(!bundles_.bundle_groups().empty());
|
2021-04-26 21:04:26 +02:00
|
|
|
std::map<const cricket::ContentGroup*, std::vector<int>>
|
|
|
|
|
merged_encrypted_extension_ids_by_bundle;
|
2018-02-22 15:26:27 -08:00
|
|
|
// Union the encrypted header IDs in the group when bundle is enabled.
|
|
|
|
|
for (const cricket::ContentInfo& content_info : description->contents()) {
|
2021-06-17 14:03:09 +00:00
|
|
|
auto group = bundles_.LookupGroupByMid(content_info.name);
|
|
|
|
|
if (!group)
|
2021-04-26 21:04:26 +02:00
|
|
|
continue;
|
|
|
|
|
// Get or create list of IDs for the BUNDLE group.
|
|
|
|
|
std::vector<int>& merged_ids =
|
2021-06-17 14:03:09 +00:00
|
|
|
merged_encrypted_extension_ids_by_bundle[group];
|
2021-04-26 21:04:26 +02:00
|
|
|
// Add IDs not already in the list.
|
|
|
|
|
std::vector<int> extension_ids =
|
|
|
|
|
GetEncryptedHeaderExtensionIds(content_info);
|
|
|
|
|
for (int id : extension_ids) {
|
|
|
|
|
if (!absl::c_linear_search(merged_ids, id)) {
|
|
|
|
|
merged_ids.push_back(id);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2021-04-26 21:04:26 +02:00
|
|
|
return merged_encrypted_extension_ids_by_bundle;
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2018-03-30 10:48:35 -07:00
|
|
|
int JsepTransportController::GetRtpAbsSendTimeHeaderExtensionId(
|
|
|
|
|
const cricket::ContentInfo& content_info) {
|
|
|
|
|
if (!config_.enable_external_auth) {
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const cricket::MediaContentDescription* content_desc =
|
2019-06-03 20:35:45 +02:00
|
|
|
content_info.media_description();
|
2018-03-30 10:48:35 -07:00
|
|
|
|
|
|
|
|
const webrtc::RtpExtension* send_time_extension =
|
|
|
|
|
webrtc::RtpExtension::FindHeaderExtensionByUri(
|
|
|
|
|
content_desc->rtp_header_extensions(),
|
2021-05-17 16:06:37 +02:00
|
|
|
webrtc::RtpExtension::kAbsSendTimeUri,
|
|
|
|
|
config_.crypto_options.srtp.enable_encrypted_rtp_header_extensions
|
|
|
|
|
? webrtc::RtpExtension::kPreferEncryptedExtension
|
|
|
|
|
: webrtc::RtpExtension::kDiscardEncryptedExtension);
|
2018-03-30 10:48:35 -07:00
|
|
|
return send_time_extension ? send_time_extension->id : -1;
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
const cricket::JsepTransport* JsepTransportController::GetJsepTransportForMid(
|
2018-02-22 15:26:27 -08:00
|
|
|
const std::string& mid) const {
|
2021-06-10 06:03:06 +00:00
|
|
|
return transports_.GetTransportForMid(mid);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
cricket::JsepTransport* JsepTransportController::GetJsepTransportForMid(
|
2018-02-22 15:26:27 -08:00
|
|
|
const std::string& mid) {
|
2021-06-10 06:03:06 +00:00
|
|
|
return transports_.GetTransportForMid(mid);
|
2018-03-30 10:48:35 -07:00
|
|
|
}
|
2022-05-04 10:32:30 +00:00
|
|
|
const cricket::JsepTransport* JsepTransportController::GetJsepTransportForMid(
|
|
|
|
|
absl::string_view mid) const {
|
|
|
|
|
return transports_.GetTransportForMid(mid);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cricket::JsepTransport* JsepTransportController::GetJsepTransportForMid(
|
|
|
|
|
absl::string_view mid) {
|
|
|
|
|
return transports_.GetTransportForMid(mid);
|
|
|
|
|
}
|
2018-03-30 10:48:35 -07:00
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
const cricket::JsepTransport* JsepTransportController::GetJsepTransportByName(
|
2018-03-30 10:48:35 -07:00
|
|
|
const std::string& transport_name) const {
|
2021-06-10 06:03:06 +00:00
|
|
|
return transports_.GetTransportByName(transport_name);
|
2018-03-30 10:48:35 -07:00
|
|
|
}
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
cricket::JsepTransport* JsepTransportController::GetJsepTransportByName(
|
2018-03-30 10:48:35 -07:00
|
|
|
const std::string& transport_name) {
|
2021-06-10 06:03:06 +00:00
|
|
|
return transports_.GetTransportByName(transport_name);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2018-11-16 14:13:58 -08:00
|
|
|
RTCError JsepTransportController::MaybeCreateJsepTransport(
|
|
|
|
|
bool local,
|
2019-02-27 14:26:15 -08:00
|
|
|
const cricket::ContentInfo& content_info,
|
|
|
|
|
const cricket::SessionDescription& description) {
|
2018-11-16 14:13:58 -08:00
|
|
|
cricket::JsepTransport* transport = GetJsepTransportByName(content_info.name);
|
|
|
|
|
if (transport) {
|
|
|
|
|
return RTCError::OK();
|
|
|
|
|
}
|
2021-11-04 13:52:31 +00:00
|
|
|
const cricket::MediaContentDescription* content_desc =
|
|
|
|
|
content_info.media_description();
|
|
|
|
|
if (certificate_ && !content_desc->cryptos().empty()) {
|
|
|
|
|
return RTCError(RTCErrorType::INVALID_PARAMETER,
|
|
|
|
|
"SDES and DTLS-SRTP cannot be enabled at the same time.");
|
|
|
|
|
}
|
2018-11-16 14:13:58 -08:00
|
|
|
|
2019-11-15 12:33:05 -08:00
|
|
|
rtc::scoped_refptr<webrtc::IceTransportInterface> ice =
|
2019-01-16 08:25:21 -08:00
|
|
|
CreateIceTransport(content_info.name, /*rtcp=*/false);
|
2019-11-15 12:33:05 -08:00
|
|
|
RTC_DCHECK(ice);
|
2019-01-16 08:25:21 -08:00
|
|
|
|
2018-11-16 14:13:58 -08:00
|
|
|
std::unique_ptr<cricket::DtlsTransportInternal> rtp_dtls_transport =
|
2020-06-16 16:39:13 +02:00
|
|
|
CreateDtlsTransport(content_info, ice->internal());
|
2018-11-16 14:13:58 -08:00
|
|
|
|
|
|
|
|
std::unique_ptr<cricket::DtlsTransportInternal> rtcp_dtls_transport;
|
|
|
|
|
std::unique_ptr<RtpTransport> unencrypted_rtp_transport;
|
|
|
|
|
std::unique_ptr<SrtpTransport> sdes_transport;
|
|
|
|
|
std::unique_ptr<DtlsSrtpTransport> dtls_srtp_transport;
|
|
|
|
|
|
2019-11-15 12:33:05 -08:00
|
|
|
rtc::scoped_refptr<webrtc::IceTransportInterface> rtcp_ice;
|
2018-11-16 14:13:58 -08:00
|
|
|
if (config_.rtcp_mux_policy !=
|
|
|
|
|
PeerConnectionInterface::kRtcpMuxPolicyRequire &&
|
|
|
|
|
content_info.type == cricket::MediaProtocolType::kRtp) {
|
2019-05-29 17:34:13 -07:00
|
|
|
rtcp_ice = CreateIceTransport(content_info.name, /*rtcp=*/true);
|
2019-11-15 12:33:05 -08:00
|
|
|
rtcp_dtls_transport =
|
2020-06-16 16:39:13 +02:00
|
|
|
CreateDtlsTransport(content_info, rtcp_ice->internal());
|
Reland: Implement true negotiation for DatagramTransport with fallback to RTP.
In short, the caller places a x-opaque line in SDP for each m= section that
uses datagram transport. If the answerer supports datagram transport, it will
parse this line and create a datagram transport. It will then echo the x-opaque
line into the answer (to indicate that it accepted use of datagram transport).
If the offer and answer contain exactly the same x-opaque line, both peers will
use datagram transport. If the x-opaque line is omitted from the answer (or is
different in the answer) they will fall back to RTP.
Note that a different x-opaque line in the answer means the answerer did not
understand something in the negotiation proto. Since WebRTC cannot know what
was misunderstood, or whether it's still possible to use the datagram transport,
it must fall back to RTP. This may change in the future, possibly by passing
the answer to the datagram transport, but it's good enough for now.
Negotiation consists of four parts:
1. DatagramTransport exposes transport parameters for both client and server
perspectives. The client just echoes what it received from the server (modulo
any fields it might not have understood).
2. SDP adds a x-opaque line for opaque transport parameters. Identical to
x-mt, but this is specific to datagram transport and goes in each m= section,
and appears in the answer as well as the offer.
- This is propagated to Jsep as part of the TransportDescription.
- SDP files: transport_description.h,cc, transport_description_factory.h,cc,
media_session.cc, webrtc_sdp.cc
3. JsepTransport/Controller:
- Exposes opaque parameters for each mid (m= section). On offerer, this means
pre-allocating a datagram transport and getting its parameters. On the
answerer, this means echoing the offerer's parameters.
- Uses a composite RTP transport to receive from either default RTP or
datagram transport until both offer and answer arrive.
- If a provisional answer arrives, sets the composite to send on the
provisionally selected transport.
- Once both offer and answer are set, deletes the unneeded transports and
keeps whichever transport is selected.
4. PeerConnection pulls transport parameters out of Jsep and adds them to SDP.
Bug: webrtc:9719
Change-Id: Ifcc428c8d76fb77dcc8abaa79507c620bcfb31b9
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/140920
Reviewed-by: Steve Anton <steveanton@webrtc.org>
Commit-Queue: Bjorn Mellem <mellem@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#28198}
2019-06-07 10:28:06 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (config_.disable_encryption) {
|
2019-05-23 15:50:38 -07:00
|
|
|
RTC_LOG(LS_INFO)
|
|
|
|
|
<< "Creating UnencryptedRtpTransport, becayse encryption is disabled.";
|
2018-02-22 15:26:27 -08:00
|
|
|
unencrypted_rtp_transport = CreateUnencryptedRtpTransport(
|
2018-04-10 14:41:03 -07:00
|
|
|
content_info.name, rtp_dtls_transport.get(), rtcp_dtls_transport.get());
|
2021-11-04 13:52:31 +00:00
|
|
|
} else if (!content_desc->cryptos().empty()) {
|
|
|
|
|
sdes_transport = CreateSdesTransport(
|
|
|
|
|
content_info.name, rtp_dtls_transport.get(), rtcp_dtls_transport.get());
|
|
|
|
|
RTC_LOG(LS_INFO) << "Creating SdesTransport.";
|
2018-02-22 15:26:27 -08:00
|
|
|
} else {
|
2019-05-23 15:50:38 -07:00
|
|
|
RTC_LOG(LS_INFO) << "Creating DtlsSrtpTransport.";
|
2018-04-10 14:41:03 -07:00
|
|
|
dtls_srtp_transport = CreateDtlsSrtpTransport(
|
|
|
|
|
content_info.name, rtp_dtls_transport.get(), rtcp_dtls_transport.get());
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2019-09-23 14:53:54 -07:00
|
|
|
std::unique_ptr<cricket::SctpTransportInternal> sctp_transport;
|
|
|
|
|
if (config_.sctp_factory) {
|
|
|
|
|
sctp_transport =
|
|
|
|
|
config_.sctp_factory->CreateSctpTransport(rtp_dtls_transport.get());
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-13 16:44:34 -07:00
|
|
|
std::unique_ptr<cricket::JsepTransport> jsep_transport =
|
2019-09-17 17:06:18 +02:00
|
|
|
std::make_unique<cricket::JsepTransport>(
|
2019-05-29 17:34:13 -07:00
|
|
|
content_info.name, certificate_, std::move(ice), std::move(rtcp_ice),
|
|
|
|
|
std::move(unencrypted_rtp_transport), std::move(sdes_transport),
|
2021-02-02 16:49:02 +01:00
|
|
|
std::move(dtls_srtp_transport), std::move(rtp_dtls_transport),
|
2021-07-10 22:37:40 +02:00
|
|
|
std::move(rtcp_dtls_transport), std::move(sctp_transport), [&]() {
|
|
|
|
|
RTC_DCHECK_RUN_ON(network_thread_);
|
|
|
|
|
UpdateAggregateStates_n();
|
|
|
|
|
});
|
2019-05-23 15:50:38 -07:00
|
|
|
|
2019-09-18 18:22:12 +02:00
|
|
|
jsep_transport->rtp_transport()->SignalRtcpPacketReceived.connect(
|
|
|
|
|
this, &JsepTransportController::OnRtcpPacketReceived_n);
|
|
|
|
|
|
2021-06-10 06:03:06 +00:00
|
|
|
transports_.RegisterTransport(content_info.name, std::move(jsep_transport));
|
2018-04-10 14:41:03 -07:00
|
|
|
UpdateAggregateStates_n();
|
2018-03-30 10:48:35 -07:00
|
|
|
return RTCError::OK();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::DestroyAllJsepTransports_n() {
|
2021-06-10 06:03:06 +00:00
|
|
|
transports_.DestroyAllTransports();
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::SetIceRole_n(cricket::IceRole ice_role) {
|
|
|
|
|
ice_role_ = ice_role;
|
2021-02-04 10:22:50 +01:00
|
|
|
auto dtls_transports = GetDtlsTransports();
|
|
|
|
|
for (auto& dtls : dtls_transports) {
|
2018-02-22 15:26:27 -08:00
|
|
|
dtls->ice_transport()->SetIceRole(ice_role_);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cricket::IceRole JsepTransportController::DetermineIceRole(
|
2018-04-13 16:44:34 -07:00
|
|
|
cricket::JsepTransport* jsep_transport,
|
2018-02-22 15:26:27 -08:00
|
|
|
const cricket::TransportInfo& transport_info,
|
|
|
|
|
SdpType type,
|
|
|
|
|
bool local) {
|
|
|
|
|
cricket::IceRole ice_role = ice_role_;
|
|
|
|
|
auto tdesc = transport_info.description;
|
|
|
|
|
if (local) {
|
|
|
|
|
// The initial offer side may use ICE Lite, in which case, per RFC5245
|
|
|
|
|
// Section 5.1.1, the answer side should take the controlling role if it is
|
|
|
|
|
// in the full ICE mode.
|
|
|
|
|
//
|
|
|
|
|
// When both sides use ICE Lite, the initial offer side must take the
|
|
|
|
|
// controlling role, and this is the default logic implemented in
|
|
|
|
|
// SetLocalDescription in JsepTransportController.
|
|
|
|
|
if (jsep_transport->remote_description() &&
|
|
|
|
|
jsep_transport->remote_description()->transport_desc.ice_mode ==
|
|
|
|
|
cricket::ICEMODE_LITE &&
|
|
|
|
|
ice_role_ == cricket::ICEROLE_CONTROLLED &&
|
|
|
|
|
tdesc.ice_mode == cricket::ICEMODE_FULL) {
|
|
|
|
|
ice_role = cricket::ICEROLE_CONTROLLING;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
// If our role is cricket::ICEROLE_CONTROLLED and the remote endpoint
|
|
|
|
|
// supports only ice_lite, this local endpoint should take the CONTROLLING
|
|
|
|
|
// role.
|
|
|
|
|
// TODO(deadbeef): This is a session-level attribute, so it really shouldn't
|
|
|
|
|
// be in a TransportDescription in the first place...
|
|
|
|
|
if (ice_role_ == cricket::ICEROLE_CONTROLLED &&
|
|
|
|
|
tdesc.ice_mode == cricket::ICEMODE_LITE) {
|
|
|
|
|
ice_role = cricket::ICEROLE_CONTROLLING;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If we use ICE Lite and the remote endpoint uses the full implementation
|
|
|
|
|
// of ICE, the local endpoint must take the controlled role, and the other
|
|
|
|
|
// side must be the controlling role.
|
|
|
|
|
if (jsep_transport->local_description() &&
|
|
|
|
|
jsep_transport->local_description()->transport_desc.ice_mode ==
|
|
|
|
|
cricket::ICEMODE_LITE &&
|
|
|
|
|
ice_role_ == cricket::ICEROLE_CONTROLLING &&
|
2018-03-30 10:48:35 -07:00
|
|
|
tdesc.ice_mode == cricket::ICEMODE_FULL) {
|
2018-02-22 15:26:27 -08:00
|
|
|
ice_role = cricket::ICEROLE_CONTROLLED;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return ice_role;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::OnTransportWritableState_n(
|
|
|
|
|
rtc::PacketTransportInternal* transport) {
|
|
|
|
|
RTC_LOG(LS_INFO) << " Transport " << transport->transport_name()
|
|
|
|
|
<< " writability changed to " << transport->writable()
|
|
|
|
|
<< ".";
|
|
|
|
|
UpdateAggregateStates_n();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::OnTransportReceivingState_n(
|
|
|
|
|
rtc::PacketTransportInternal* transport) {
|
|
|
|
|
UpdateAggregateStates_n();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::OnTransportGatheringState_n(
|
|
|
|
|
cricket::IceTransportInternal* transport) {
|
|
|
|
|
UpdateAggregateStates_n();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::OnTransportCandidateGathered_n(
|
|
|
|
|
cricket::IceTransportInternal* transport,
|
|
|
|
|
const cricket::Candidate& candidate) {
|
|
|
|
|
// We should never signal peer-reflexive candidates.
|
|
|
|
|
if (candidate.type() == cricket::PRFLX_PORT_TYPE) {
|
2021-11-15 16:57:07 +01:00
|
|
|
RTC_DCHECK_NOTREACHED();
|
2018-02-22 15:26:27 -08:00
|
|
|
return;
|
|
|
|
|
}
|
2021-02-10 17:40:08 +00:00
|
|
|
|
|
|
|
|
signal_ice_candidates_gathered_.Send(
|
|
|
|
|
transport->transport_name(), std::vector<cricket::Candidate>{candidate});
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2019-06-01 12:23:43 +03:00
|
|
|
void JsepTransportController::OnTransportCandidateError_n(
|
|
|
|
|
cricket::IceTransportInternal* transport,
|
|
|
|
|
const cricket::IceCandidateErrorEvent& event) {
|
2021-02-10 17:40:08 +00:00
|
|
|
signal_ice_candidate_error_.Send(event);
|
2019-06-01 12:23:43 +03:00
|
|
|
}
|
2018-02-22 15:26:27 -08:00
|
|
|
void JsepTransportController::OnTransportCandidatesRemoved_n(
|
|
|
|
|
cricket::IceTransportInternal* transport,
|
|
|
|
|
const cricket::Candidates& candidates) {
|
2021-02-10 17:40:08 +00:00
|
|
|
signal_ice_candidates_removed_.Send(candidates);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
2019-08-06 10:54:47 -07:00
|
|
|
void JsepTransportController::OnTransportCandidatePairChanged_n(
|
|
|
|
|
const cricket::CandidatePairChangeEvent& event) {
|
2021-02-10 17:40:08 +00:00
|
|
|
signal_ice_candidate_pair_changed_.Send(event);
|
2019-08-06 10:54:47 -07:00
|
|
|
}
|
2018-02-22 15:26:27 -08:00
|
|
|
|
|
|
|
|
void JsepTransportController::OnTransportRoleConflict_n(
|
|
|
|
|
cricket::IceTransportInternal* transport) {
|
|
|
|
|
// Note: since the role conflict is handled entirely on the network thread,
|
|
|
|
|
// we don't need to worry about role conflicts occurring on two ports at
|
|
|
|
|
// once. The first one encountered should immediately reverse the role.
|
|
|
|
|
cricket::IceRole reversed_role = (ice_role_ == cricket::ICEROLE_CONTROLLING)
|
|
|
|
|
? cricket::ICEROLE_CONTROLLED
|
|
|
|
|
: cricket::ICEROLE_CONTROLLING;
|
|
|
|
|
RTC_LOG(LS_INFO) << "Got role conflict; switching to "
|
|
|
|
|
<< (reversed_role == cricket::ICEROLE_CONTROLLING
|
|
|
|
|
? "controlling"
|
|
|
|
|
: "controlled")
|
|
|
|
|
<< " role.";
|
|
|
|
|
SetIceRole_n(reversed_role);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::OnTransportStateChanged_n(
|
|
|
|
|
cricket::IceTransportInternal* transport) {
|
|
|
|
|
RTC_LOG(LS_INFO) << transport->transport_name() << " Transport "
|
|
|
|
|
<< transport->component()
|
|
|
|
|
<< " state changed. Check if state is complete.";
|
|
|
|
|
UpdateAggregateStates_n();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void JsepTransportController::UpdateAggregateStates_n() {
|
2021-06-07 13:30:46 +02:00
|
|
|
TRACE_EVENT0("webrtc", "JsepTransportController::UpdateAggregateStates_n");
|
2021-08-11 14:56:38 -07:00
|
|
|
auto dtls_transports = GetActiveDtlsTransports();
|
2018-11-23 16:18:59 +00:00
|
|
|
cricket::IceConnectionState new_connection_state =
|
|
|
|
|
cricket::kIceConnectionConnecting;
|
2018-10-18 15:58:17 +02:00
|
|
|
PeerConnectionInterface::IceConnectionState new_ice_connection_state =
|
|
|
|
|
PeerConnectionInterface::IceConnectionState::kIceConnectionNew;
|
|
|
|
|
PeerConnectionInterface::PeerConnectionState new_combined_state =
|
|
|
|
|
PeerConnectionInterface::PeerConnectionState::kNew;
|
2018-02-22 15:26:27 -08:00
|
|
|
cricket::IceGatheringState new_gathering_state = cricket::kIceGatheringNew;
|
2018-11-23 16:18:59 +00:00
|
|
|
bool any_failed = false;
|
|
|
|
|
bool all_connected = !dtls_transports.empty();
|
|
|
|
|
bool all_completed = !dtls_transports.empty();
|
2018-02-22 15:26:27 -08:00
|
|
|
bool any_gathering = false;
|
|
|
|
|
bool all_done_gathering = !dtls_transports.empty();
|
2018-10-18 15:58:17 +02:00
|
|
|
|
|
|
|
|
std::map<IceTransportState, int> ice_state_counts;
|
2021-05-21 20:46:09 +02:00
|
|
|
std::map<DtlsTransportState, int> dtls_state_counts;
|
2018-10-18 15:58:17 +02:00
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
for (const auto& dtls : dtls_transports) {
|
2018-11-23 16:18:59 +00:00
|
|
|
any_failed = any_failed || dtls->ice_transport()->GetState() ==
|
|
|
|
|
cricket::IceTransportState::STATE_FAILED;
|
|
|
|
|
all_connected = all_connected && dtls->writable();
|
|
|
|
|
all_completed =
|
|
|
|
|
all_completed && dtls->writable() &&
|
|
|
|
|
dtls->ice_transport()->GetState() ==
|
|
|
|
|
cricket::IceTransportState::STATE_COMPLETED &&
|
|
|
|
|
dtls->ice_transport()->GetIceRole() == cricket::ICEROLE_CONTROLLING &&
|
|
|
|
|
dtls->ice_transport()->gathering_state() ==
|
|
|
|
|
cricket::kIceGatheringComplete;
|
2018-02-22 15:26:27 -08:00
|
|
|
any_gathering = any_gathering || dtls->ice_transport()->gathering_state() !=
|
|
|
|
|
cricket::kIceGatheringNew;
|
|
|
|
|
all_done_gathering =
|
|
|
|
|
all_done_gathering && dtls->ice_transport()->gathering_state() ==
|
|
|
|
|
cricket::kIceGatheringComplete;
|
2018-10-18 15:58:17 +02:00
|
|
|
|
|
|
|
|
dtls_state_counts[dtls->dtls_state()]++;
|
|
|
|
|
ice_state_counts[dtls->ice_transport()->GetIceTransportState()]++;
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
2018-11-01 07:26:03 -07:00
|
|
|
|
2018-11-23 16:18:59 +00:00
|
|
|
if (any_failed) {
|
|
|
|
|
new_connection_state = cricket::kIceConnectionFailed;
|
|
|
|
|
} else if (all_completed) {
|
|
|
|
|
new_connection_state = cricket::kIceConnectionCompleted;
|
|
|
|
|
} else if (all_connected) {
|
|
|
|
|
new_connection_state = cricket::kIceConnectionConnected;
|
|
|
|
|
}
|
|
|
|
|
if (ice_connection_state_ != new_connection_state) {
|
|
|
|
|
ice_connection_state_ = new_connection_state;
|
2020-09-30 14:33:45 -07:00
|
|
|
|
2021-02-10 17:40:08 +00:00
|
|
|
signal_ice_connection_state_.Send(new_connection_state);
|
2018-11-23 16:18:59 +00:00
|
|
|
}
|
|
|
|
|
|
2018-10-18 15:58:17 +02:00
|
|
|
// Compute the current RTCIceConnectionState as described in
|
|
|
|
|
// https://www.w3.org/TR/webrtc/#dom-rtciceconnectionstate.
|
|
|
|
|
// The PeerConnection is responsible for handling the "closed" state.
|
|
|
|
|
int total_ice_checking = ice_state_counts[IceTransportState::kChecking];
|
|
|
|
|
int total_ice_connected = ice_state_counts[IceTransportState::kConnected];
|
|
|
|
|
int total_ice_completed = ice_state_counts[IceTransportState::kCompleted];
|
|
|
|
|
int total_ice_failed = ice_state_counts[IceTransportState::kFailed];
|
|
|
|
|
int total_ice_disconnected =
|
|
|
|
|
ice_state_counts[IceTransportState::kDisconnected];
|
|
|
|
|
int total_ice_closed = ice_state_counts[IceTransportState::kClosed];
|
|
|
|
|
int total_ice_new = ice_state_counts[IceTransportState::kNew];
|
|
|
|
|
int total_ice = dtls_transports.size();
|
|
|
|
|
|
|
|
|
|
if (total_ice_failed > 0) {
|
2018-12-07 13:11:44 +01:00
|
|
|
// Any RTCIceTransports are in the "failed" state.
|
2018-10-18 15:58:17 +02:00
|
|
|
new_ice_connection_state = PeerConnectionInterface::kIceConnectionFailed;
|
2018-11-23 16:18:59 +00:00
|
|
|
} else if (total_ice_disconnected > 0) {
|
2018-12-07 13:11:44 +01:00
|
|
|
// None of the previous states apply and any RTCIceTransports are in the
|
|
|
|
|
// "disconnected" state.
|
2018-10-18 15:58:17 +02:00
|
|
|
new_ice_connection_state =
|
|
|
|
|
PeerConnectionInterface::kIceConnectionDisconnected;
|
2018-12-07 13:11:44 +01:00
|
|
|
} else if (total_ice_new + total_ice_closed == total_ice) {
|
|
|
|
|
// None of the previous states apply and all RTCIceTransports are in the
|
|
|
|
|
// "new" or "closed" state, or there are no transports.
|
|
|
|
|
new_ice_connection_state = PeerConnectionInterface::kIceConnectionNew;
|
|
|
|
|
} else if (total_ice_new + total_ice_checking > 0) {
|
|
|
|
|
// None of the previous states apply and any RTCIceTransports are in the
|
|
|
|
|
// "new" or "checking" state.
|
2018-10-18 15:58:17 +02:00
|
|
|
new_ice_connection_state = PeerConnectionInterface::kIceConnectionChecking;
|
2019-02-25 15:26:24 +01:00
|
|
|
} else if (total_ice_completed + total_ice_closed == total_ice ||
|
|
|
|
|
all_completed) {
|
2018-12-07 13:11:44 +01:00
|
|
|
// None of the previous states apply and all RTCIceTransports are in the
|
|
|
|
|
// "completed" or "closed" state.
|
2019-02-25 15:26:24 +01:00
|
|
|
//
|
|
|
|
|
// TODO(https://bugs.webrtc.org/10356): The all_completed condition is added
|
|
|
|
|
// to mimic the behavior of the old ICE connection state, and should be
|
|
|
|
|
// removed once we get end-of-candidates signaling in place.
|
2018-10-18 15:58:17 +02:00
|
|
|
new_ice_connection_state = PeerConnectionInterface::kIceConnectionCompleted;
|
|
|
|
|
} else if (total_ice_connected + total_ice_completed + total_ice_closed ==
|
2018-12-07 13:11:44 +01:00
|
|
|
total_ice) {
|
|
|
|
|
// None of the previous states apply and all RTCIceTransports are in the
|
|
|
|
|
// "connected", "completed" or "closed" state.
|
2018-10-18 15:58:17 +02:00
|
|
|
new_ice_connection_state = PeerConnectionInterface::kIceConnectionConnected;
|
|
|
|
|
} else {
|
2021-11-15 16:57:07 +01:00
|
|
|
RTC_DCHECK_NOTREACHED();
|
2018-10-18 15:58:17 +02:00
|
|
|
}
|
|
|
|
|
|
2018-11-23 16:18:59 +00:00
|
|
|
if (standardized_ice_connection_state_ != new_ice_connection_state) {
|
2019-02-25 15:26:24 +01:00
|
|
|
if (standardized_ice_connection_state_ ==
|
|
|
|
|
PeerConnectionInterface::kIceConnectionChecking &&
|
|
|
|
|
new_ice_connection_state ==
|
|
|
|
|
PeerConnectionInterface::kIceConnectionCompleted) {
|
|
|
|
|
// Ensure that we never skip over the "connected" state.
|
2021-02-10 17:40:08 +00:00
|
|
|
signal_standardized_ice_connection_state_.Send(
|
|
|
|
|
PeerConnectionInterface::kIceConnectionConnected);
|
2019-02-25 15:26:24 +01:00
|
|
|
}
|
2018-11-23 16:18:59 +00:00
|
|
|
standardized_ice_connection_state_ = new_ice_connection_state;
|
2021-02-10 17:40:08 +00:00
|
|
|
signal_standardized_ice_connection_state_.Send(new_ice_connection_state);
|
2018-10-18 15:58:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Compute the current RTCPeerConnectionState as described in
|
|
|
|
|
// https://www.w3.org/TR/webrtc/#dom-rtcpeerconnectionstate.
|
|
|
|
|
// The PeerConnection is responsible for handling the "closed" state.
|
|
|
|
|
// Note that "connecting" is only a valid state for DTLS transports while
|
|
|
|
|
// "checking", "completed" and "disconnected" are only valid for ICE
|
|
|
|
|
// transports.
|
2021-05-21 20:46:09 +02:00
|
|
|
int total_connected =
|
|
|
|
|
total_ice_connected + dtls_state_counts[DtlsTransportState::kConnected];
|
2018-10-18 15:58:17 +02:00
|
|
|
int total_dtls_connecting =
|
2021-05-21 20:46:09 +02:00
|
|
|
dtls_state_counts[DtlsTransportState::kConnecting];
|
2018-10-18 15:58:17 +02:00
|
|
|
int total_failed =
|
2021-05-21 20:46:09 +02:00
|
|
|
total_ice_failed + dtls_state_counts[DtlsTransportState::kFailed];
|
2018-10-18 15:58:17 +02:00
|
|
|
int total_closed =
|
2021-05-21 20:46:09 +02:00
|
|
|
total_ice_closed + dtls_state_counts[DtlsTransportState::kClosed];
|
|
|
|
|
int total_new = total_ice_new + dtls_state_counts[DtlsTransportState::kNew];
|
2018-10-18 15:58:17 +02:00
|
|
|
int total_transports = total_ice * 2;
|
|
|
|
|
|
|
|
|
|
if (total_failed > 0) {
|
|
|
|
|
// Any of the RTCIceTransports or RTCDtlsTransports are in a "failed" state.
|
|
|
|
|
new_combined_state = PeerConnectionInterface::PeerConnectionState::kFailed;
|
2018-12-07 13:11:44 +01:00
|
|
|
} else if (total_ice_disconnected > 0) {
|
|
|
|
|
// None of the previous states apply and any RTCIceTransports or
|
|
|
|
|
// RTCDtlsTransports are in the "disconnected" state.
|
2018-10-18 15:58:17 +02:00
|
|
|
new_combined_state =
|
|
|
|
|
PeerConnectionInterface::PeerConnectionState::kDisconnected;
|
2018-12-07 13:11:44 +01:00
|
|
|
} else if (total_new + total_closed == total_transports) {
|
|
|
|
|
// None of the previous states apply and all RTCIceTransports and
|
|
|
|
|
// RTCDtlsTransports are in the "new" or "closed" state, or there are no
|
|
|
|
|
// transports.
|
|
|
|
|
new_combined_state = PeerConnectionInterface::PeerConnectionState::kNew;
|
|
|
|
|
} else if (total_new + total_dtls_connecting + total_ice_checking > 0) {
|
|
|
|
|
// None of the previous states apply and all RTCIceTransports or
|
|
|
|
|
// RTCDtlsTransports are in the "new", "connecting" or "checking" state.
|
2018-10-18 15:58:17 +02:00
|
|
|
new_combined_state =
|
|
|
|
|
PeerConnectionInterface::PeerConnectionState::kConnecting;
|
|
|
|
|
} else if (total_connected + total_ice_completed + total_closed ==
|
2018-12-07 13:11:44 +01:00
|
|
|
total_transports) {
|
|
|
|
|
// None of the previous states apply and all RTCIceTransports and
|
|
|
|
|
// RTCDtlsTransports are in the "connected", "completed" or "closed" state.
|
2018-10-18 15:58:17 +02:00
|
|
|
new_combined_state =
|
|
|
|
|
PeerConnectionInterface::PeerConnectionState::kConnected;
|
|
|
|
|
} else {
|
2021-11-15 16:57:07 +01:00
|
|
|
RTC_DCHECK_NOTREACHED();
|
2018-10-18 15:58:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (combined_connection_state_ != new_combined_state) {
|
|
|
|
|
combined_connection_state_ = new_combined_state;
|
2021-02-10 17:40:08 +00:00
|
|
|
signal_connection_state_.Send(new_combined_state);
|
2018-10-18 15:58:17 +02:00
|
|
|
}
|
|
|
|
|
|
2020-08-20 14:50:10 +02:00
|
|
|
// Compute the gathering state.
|
|
|
|
|
if (dtls_transports.empty()) {
|
|
|
|
|
new_gathering_state = cricket::kIceGatheringNew;
|
|
|
|
|
} else if (all_done_gathering) {
|
2018-02-22 15:26:27 -08:00
|
|
|
new_gathering_state = cricket::kIceGatheringComplete;
|
|
|
|
|
} else if (any_gathering) {
|
|
|
|
|
new_gathering_state = cricket::kIceGatheringGathering;
|
|
|
|
|
}
|
|
|
|
|
if (ice_gathering_state_ != new_gathering_state) {
|
|
|
|
|
ice_gathering_state_ = new_gathering_state;
|
2021-02-10 17:40:08 +00:00
|
|
|
signal_ice_gathering_state_.Send(new_gathering_state);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-18 18:22:12 +02:00
|
|
|
void JsepTransportController::OnRtcpPacketReceived_n(
|
|
|
|
|
rtc::CopyOnWriteBuffer* packet,
|
|
|
|
|
int64_t packet_time_us) {
|
|
|
|
|
RTC_DCHECK(config_.rtcp_handler);
|
|
|
|
|
config_.rtcp_handler(*packet, packet_time_us);
|
|
|
|
|
}
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
void JsepTransportController::OnDtlsHandshakeError(
|
|
|
|
|
rtc::SSLHandshakeError error) {
|
2021-01-27 23:32:46 -08:00
|
|
|
config_.on_dtls_handshake_error_(error);
|
2018-02-22 15:26:27 -08:00
|
|
|
}
|
|
|
|
|
|
2021-06-10 06:03:06 +00:00
|
|
|
bool JsepTransportController::OnTransportChanged(
|
|
|
|
|
const std::string& mid,
|
|
|
|
|
cricket::JsepTransport* jsep_transport) {
|
|
|
|
|
if (config_.transport_observer) {
|
|
|
|
|
if (jsep_transport) {
|
|
|
|
|
return config_.transport_observer->OnTransportChanged(
|
|
|
|
|
mid, jsep_transport->rtp_transport(),
|
|
|
|
|
jsep_transport->RtpDtlsTransport(),
|
|
|
|
|
jsep_transport->data_channel_transport());
|
|
|
|
|
} else {
|
|
|
|
|
return config_.transport_observer->OnTransportChanged(mid, nullptr,
|
|
|
|
|
nullptr, nullptr);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2018-02-22 15:26:27 -08:00
|
|
|
} // namespace webrtc
|