blob: d4266bf0b6eb61c1549ecf65b4ef134e4e9896c4 [file] [log] [blame]
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Guo-wei Shiehbe508a12015-04-06 12:48:47 -070011/*
12 * This is a diagram of how TCP reconnect works for the active side. The
13 * passive side just waits for an incoming connection.
14 *
15 * - Connected: Indicate whether the TCP socket is connected.
16 *
17 * - Writable: Whether the stun binding is completed. Sending a data packet
18 * before stun binding completed will trigger IPC socket layer to shutdown
19 * the connection.
20 *
21 * - PendingTCP: |connection_pending_| indicates whether there is an
22 * outstanding TCP connection in progress.
23 *
24 * - PretendWri: Tracked by |pretending_to_be_writable_|. Marking connection as
25 * WRITE_TIMEOUT will cause the connection be deleted. Instead, we're
26 * "pretending" we're still writable for a period of time such that reconnect
27 * could work.
28 *
29 * Data could only be sent in state 3. Sening data during state 2 & 6 will get
30 * EWOULDBLOCK, 4 & 5 EPIPE.
31 *
Guo-wei Shieh1eb87c72015-08-25 11:02:55 -070032 * OS Timeout 7 -------------+
33 * +----------------------->|Connected: N |
34 * | |Writable: N | Timeout
35 * | Timeout |Connection is |<----------------+
36 * | +------------------->|Dead | |
37 * | | +--------------+ |
38 * | | ^ |
39 * | | OnClose | |
40 * | | +-----------------------+ | |
41 * | | | | |Timeout |
42 * | | v | | |
43 * | 4 +----------+ 5 -----+--+--+ 6 -----+-----+
44 * | |Connected: N|Send() or |Connected: N| |Connected: Y|
45 * | |Writable: Y|Ping() |Writable: Y|OnConnect |Writable: Y|
46 * | |PendingTCP:N+--------> |PendingTCP:Y+---------> |PendingTCP:N|
47 * | |PretendWri:Y| |PretendWri:Y| |PretendWri:Y|
48 * | +-----+------+ +------------+ +---+--+-----+
49 * | ^ ^ | |
50 * | | | OnClose | |
51 * | | +----------------------------------------------+ |
52 * | | |
53 * | | Stun Binding Completed |
54 * | | |
55 * | | OnClose |
56 * | +------------------------------------------------+ |
57 * | | v
Guo-wei Shiehbe508a12015-04-06 12:48:47 -070058 * 1 -----------+ 2 -----------+Stun 3 -----------+
59 * |Connected: N| |Connected: Y|Binding |Connected: Y|
60 * |Writable: N|OnConnect |Writable: N|Completed |Writable: Y|
61 * |PendingTCP:Y+---------> |PendingTCP:N+--------> |PendingTCP:N|
62 * |PretendWri:N| |PretendWri:N| |PretendWri:N|
63 * +------------+ +------------+ +------------+
64 *
65 */
66
Steve Anton10542f22019-01-11 09:11:00 -080067#include "p2p/base/tcp_port.h"
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000068
Yves Gerey3e707812018-11-28 16:47:49 +010069#include <errno.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020070
Steve Anton6c38cc72017-11-29 10:25:58 -080071#include <vector>
72
Steve Antonae226f62019-01-29 12:47:38 -080073#include "absl/algorithm/container.h"
Steve Anton10542f22019-01-11 09:11:00 -080074#include "p2p/base/p2p_constants.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020075#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080076#include "rtc_base/ip_address.h"
Yves Gerey3e707812018-11-28 16:47:49 +010077#include "rtc_base/location.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020078#include "rtc_base/logging.h"
Steve Anton10542f22019-01-11 09:11:00 -080079#include "rtc_base/net_helper.h"
80#include "rtc_base/rate_tracker.h"
Yves Gerey3e707812018-11-28 16:47:49 +010081#include "rtc_base/third_party/sigslot/sigslot.h"
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000082
83namespace cricket {
84
85TCPPort::TCPPort(rtc::Thread* thread,
86 rtc::PacketSocketFactory* factory,
pkasting@chromium.org332331f2014-11-06 20:19:22 +000087 rtc::Network* network,
Peter Boström0c4e06b2015-10-07 12:23:21 +020088 uint16_t min_port,
89 uint16_t max_port,
pkasting@chromium.org332331f2014-11-06 20:19:22 +000090 const std::string& username,
91 const std::string& password,
92 bool allow_listen)
Peter Boström0c4e06b2015-10-07 12:23:21 +020093 : Port(thread,
94 LOCAL_PORT_TYPE,
95 factory,
96 network,
Peter Boström0c4e06b2015-10-07 12:23:21 +020097 min_port,
98 max_port,
99 username,
100 password),
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000101 allow_listen_(allow_listen),
102 socket_(NULL),
103 error_(0) {
104 // TODO(mallinath) - Set preference value as per RFC 6544.
105 // http://b/issue?id=7141794
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000106 if (allow_listen_) {
deadbeef1ee21252017-06-13 15:49:45 -0700107 TryCreateServerSocket();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000108 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000109}
110
111TCPPort::~TCPPort() {
112 delete socket_;
113 std::list<Incoming>::iterator it;
114 for (it = incoming_.begin(); it != incoming_.end(); ++it)
115 delete it->socket;
116 incoming_.clear();
117}
118
119Connection* TCPPort::CreateConnection(const Candidate& address,
120 CandidateOrigin origin) {
Honghai Zhangf9945b22015-12-15 12:20:13 -0800121 if (!SupportsProtocol(address.protocol())) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000122 return NULL;
123 }
124
Philipp Hanckee283d1c2020-03-27 09:56:51 +0100125 if ((address.tcptype() == TCPTYPE_ACTIVE_STR &&
126 address.type() != PRFLX_PORT_TYPE) ||
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000127 (address.tcptype().empty() && address.address().port() == 0)) {
128 // It's active only candidate, we should not try to create connections
129 // for these candidates.
130 return NULL;
131 }
132
133 // We can't accept TCP connections incoming on other ports
134 if (origin == ORIGIN_OTHER_PORT)
135 return NULL;
136
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000137 // We don't know how to act as an ssl server yet
138 if ((address.protocol() == SSLTCP_PROTOCOL_NAME) &&
139 (origin == ORIGIN_THIS_PORT)) {
140 return NULL;
141 }
142
143 if (!IsCompatibleAddress(address.address())) {
144 return NULL;
145 }
146
147 TCPConnection* conn = NULL;
Yves Gerey665174f2018-06-19 15:03:05 +0200148 if (rtc::AsyncPacketSocket* socket = GetIncoming(address.address(), true)) {
deadbeef06878292017-04-21 14:22:23 -0700149 // Incoming connection; we already created a socket and connected signals,
150 // so we need to hand off the "read packet" responsibility to
151 // TCPConnection.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000152 socket->SignalReadPacket.disconnect(this);
153 conn = new TCPConnection(this, address, socket);
154 } else {
deadbeef06878292017-04-21 14:22:23 -0700155 // Outgoing connection, which will create a new socket for which we still
156 // need to connect SignalReadyToSend and SignalSentPacket.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000157 conn = new TCPConnection(this, address);
deadbeef06878292017-04-21 14:22:23 -0700158 if (conn->socket()) {
159 conn->socket()->SignalReadyToSend.connect(this, &TCPPort::OnReadyToSend);
160 conn->socket()->SignalSentPacket.connect(this, &TCPPort::OnSentPacket);
161 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000162 }
honghaiz36f50e82016-06-01 15:57:03 -0700163 AddOrReplaceConnection(conn);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000164 return conn;
165}
166
167void TCPPort::PrepareAddress() {
168 if (socket_) {
169 // If socket isn't bound yet the address will be added in
170 // OnAddressReady(). Socket may be in the CLOSED state if Listen()
171 // failed, we still want to add the socket address.
Mirko Bonadei675513b2017-11-09 11:09:25 +0100172 RTC_LOG(LS_VERBOSE) << "Preparing TCP address, current state: "
173 << socket_->GetState();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000174 if (socket_->GetState() == rtc::AsyncPacketSocket::STATE_BOUND ||
175 socket_->GetState() == rtc::AsyncPacketSocket::STATE_CLOSED)
176 AddAddress(socket_->GetLocalAddress(), socket_->GetLocalAddress(),
Guo-wei Shieh3d564c12015-08-19 16:51:15 -0700177 rtc::SocketAddress(), TCP_PROTOCOL_NAME, "",
178 TCPTYPE_PASSIVE_STR, LOCAL_PORT_TYPE,
zhihuang26d99c22017-02-13 12:47:27 -0800179 ICE_TYPE_PREFERENCE_HOST_TCP, 0, "", true);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000180 } else {
Jonas Olssond7d762d2018-03-28 09:47:51 +0200181 RTC_LOG(LS_INFO) << ToString()
182 << ": Not listening due to firewall restrictions.";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000183 // Note: We still add the address, since otherwise the remote side won't
Guo-wei Shieh310b0932015-11-17 19:15:50 -0800184 // recognize our incoming TCP connections. According to
185 // https://tools.ietf.org/html/rfc6544#section-4.5, for active candidate,
deadbeef5c3c1042017-08-04 15:01:57 -0700186 // the port must be set to the discard port, i.e. 9. We can't be 100% sure
187 // which IP address will actually be used, so GetBestIP is as good as we
188 // can do.
189 // TODO(deadbeef): We could do something like create a dummy socket just to
190 // see what IP we get. But that may be overkill.
191 AddAddress(rtc::SocketAddress(Network()->GetBestIP(), DISCARD_PORT),
192 rtc::SocketAddress(Network()->GetBestIP(), 0),
193 rtc::SocketAddress(), TCP_PROTOCOL_NAME, "", TCPTYPE_ACTIVE_STR,
194 LOCAL_PORT_TYPE, ICE_TYPE_PREFERENCE_HOST_TCP, 0, "", true);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000195 }
196}
197
Yves Gerey665174f2018-06-19 15:03:05 +0200198int TCPPort::SendTo(const void* data,
199 size_t size,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000200 const rtc::SocketAddress& addr,
201 const rtc::PacketOptions& options,
202 bool payload) {
Yves Gerey665174f2018-06-19 15:03:05 +0200203 rtc::AsyncPacketSocket* socket = NULL;
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700204 TCPConnection* conn = static_cast<TCPConnection*>(GetConnection(addr));
205
206 // For Connection, this is the code path used by Ping() to establish
207 // WRITABLE. It has to send through the socket directly as TCPConnection::Send
208 // checks writability.
209 if (conn) {
210 if (!conn->connected()) {
211 conn->MaybeReconnect();
212 return SOCKET_ERROR;
213 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000214 socket = conn->socket();
Harald Alvestranddc800172020-01-06 20:01:36 +0100215 if (!socket) {
216 // The failure to initialize should have been logged elsewhere,
217 // so this log is not important.
218 RTC_LOG(LS_INFO) << ToString()
219 << ": Attempted to send to an uninitialized socket: "
220 << addr.ToSensitiveString();
221 error_ = EHOSTUNREACH;
222 return SOCKET_ERROR;
223 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000224 } else {
225 socket = GetIncoming(addr);
Harald Alvestranddc800172020-01-06 20:01:36 +0100226 if (!socket) {
227 RTC_LOG(LS_ERROR) << ToString()
228 << ": Attempted to send to an unknown destination: "
229 << addr.ToSensitiveString();
230 error_ = EHOSTUNREACH;
231 return SOCKET_ERROR;
232 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000233 }
Qingsi Wang6e641e62018-04-11 20:14:17 -0700234 rtc::PacketOptions modified_options(options);
235 CopyPortInformationToPacketInfo(&modified_options.info_signaled_after_sent);
236 int sent = socket->Send(data, size, modified_options);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000237 if (sent < 0) {
238 error_ = socket->GetError();
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700239 // Error from this code path for a Connection (instead of from a bare
240 // socket) will not trigger reconnecting. In theory, this shouldn't matter
241 // as OnClose should always be called and set connected to false.
Yves Gerey665174f2018-06-19 15:03:05 +0200242 RTC_LOG(LS_ERROR) << ToString() << ": TCP send of " << size
243 << " bytes failed with error " << error_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000244 }
245 return sent;
246}
247
248int TCPPort::GetOption(rtc::Socket::Option opt, int* value) {
249 if (socket_) {
250 return socket_->GetOption(opt, value);
251 } else {
252 return SOCKET_ERROR;
253 }
254}
255
256int TCPPort::SetOption(rtc::Socket::Option opt, int value) {
257 if (socket_) {
258 return socket_->SetOption(opt, value);
259 } else {
260 return SOCKET_ERROR;
261 }
262}
263
264int TCPPort::GetError() {
265 return error_;
266}
267
Steve Anton1cf1b7d2017-10-30 10:00:15 -0700268bool TCPPort::SupportsProtocol(const std::string& protocol) const {
269 return protocol == TCP_PROTOCOL_NAME || protocol == SSLTCP_PROTOCOL_NAME;
270}
271
272ProtocolType TCPPort::GetProtocol() const {
273 return PROTO_TCP;
274}
275
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000276void TCPPort::OnNewConnection(rtc::AsyncPacketSocket* socket,
277 rtc::AsyncPacketSocket* new_socket) {
nisseede5da42017-01-12 05:15:36 -0800278 RTC_DCHECK(socket == socket_);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000279
280 Incoming incoming;
281 incoming.addr = new_socket->GetRemoteAddress();
282 incoming.socket = new_socket;
283 incoming.socket->SignalReadPacket.connect(this, &TCPPort::OnReadPacket);
284 incoming.socket->SignalReadyToSend.connect(this, &TCPPort::OnReadyToSend);
Stefan Holmer55674ff2016-01-14 15:49:16 +0100285 incoming.socket->SignalSentPacket.connect(this, &TCPPort::OnSentPacket);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000286
Yves Gerey665174f2018-06-19 15:03:05 +0200287 RTC_LOG(LS_VERBOSE) << ToString() << ": Accepted connection from "
Jonas Olssond7d762d2018-03-28 09:47:51 +0200288 << incoming.addr.ToSensitiveString();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000289 incoming_.push_back(incoming);
290}
291
deadbeef1ee21252017-06-13 15:49:45 -0700292void TCPPort::TryCreateServerSocket() {
293 socket_ = socket_factory()->CreateServerTcpSocket(
deadbeef5c3c1042017-08-04 15:01:57 -0700294 rtc::SocketAddress(Network()->GetBestIP(), 0), min_port(), max_port(),
295 false /* ssl */);
deadbeef1ee21252017-06-13 15:49:45 -0700296 if (!socket_) {
Jonas Olssond7d762d2018-03-28 09:47:51 +0200297 RTC_LOG(LS_WARNING)
298 << ToString()
299 << ": TCP server socket creation failed; continuing anyway.";
deadbeef1ee21252017-06-13 15:49:45 -0700300 return;
301 }
302 socket_->SignalNewConnection.connect(this, &TCPPort::OnNewConnection);
303 socket_->SignalAddressReady.connect(this, &TCPPort::OnAddressReady);
304}
305
Yves Gerey665174f2018-06-19 15:03:05 +0200306rtc::AsyncPacketSocket* TCPPort::GetIncoming(const rtc::SocketAddress& addr,
307 bool remove) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000308 rtc::AsyncPacketSocket* socket = NULL;
309 for (std::list<Incoming>::iterator it = incoming_.begin();
310 it != incoming_.end(); ++it) {
311 if (it->addr == addr) {
312 socket = it->socket;
313 if (remove)
314 incoming_.erase(it);
315 break;
316 }
317 }
318 return socket;
319}
320
321void TCPPort::OnReadPacket(rtc::AsyncPacketSocket* socket,
Yves Gerey665174f2018-06-19 15:03:05 +0200322 const char* data,
323 size_t size,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000324 const rtc::SocketAddress& remote_addr,
Niels Möllere6933812018-11-05 13:01:41 +0100325 const int64_t& packet_time_us) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000326 Port::OnReadPacket(data, size, remote_addr, PROTO_TCP);
327}
328
Stefan Holmer55674ff2016-01-14 15:49:16 +0100329void TCPPort::OnSentPacket(rtc::AsyncPacketSocket* socket,
330 const rtc::SentPacket& sent_packet) {
Stefan Holmer55674ff2016-01-14 15:49:16 +0100331 PortInterface::SignalSentPacket(sent_packet);
332}
333
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000334void TCPPort::OnReadyToSend(rtc::AsyncPacketSocket* socket) {
335 Port::OnReadyToSend();
336}
337
338void TCPPort::OnAddressReady(rtc::AsyncPacketSocket* socket,
339 const rtc::SocketAddress& address) {
Guo-wei Shieh3d564c12015-08-19 16:51:15 -0700340 AddAddress(address, address, rtc::SocketAddress(), TCP_PROTOCOL_NAME, "",
341 TCPTYPE_PASSIVE_STR, LOCAL_PORT_TYPE, ICE_TYPE_PREFERENCE_HOST_TCP,
zhihuang26d99c22017-02-13 12:47:27 -0800342 0, "", true);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000343}
344
Qingsi Wang22e623a2018-03-13 10:53:57 -0700345// TODO(qingsi): |CONNECTION_WRITE_CONNECT_TIMEOUT| is overriden by
346// |ice_unwritable_timeout| in IceConfig when determining the writability state.
347// Replace this constant with the config parameter assuming the default value if
348// we decide it is also applicable here.
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700349TCPConnection::TCPConnection(TCPPort* port,
350 const Candidate& candidate,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000351 rtc::AsyncPacketSocket* socket)
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700352 : Connection(port, 0, candidate),
353 socket_(socket),
354 error_(0),
355 outgoing_(socket == NULL),
356 connection_pending_(false),
357 pretending_to_be_writable_(false),
358 reconnection_timeout_(cricket::CONNECTION_WRITE_CONNECT_TIMEOUT) {
359 if (outgoing_) {
360 CreateOutgoingTcpSocket();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000361 } else {
deadbeef5c3c1042017-08-04 15:01:57 -0700362 // Incoming connections should match one of the network addresses. Same as
363 // what's being checked in OnConnect, but just DCHECKing here.
Jonas Olssond7d762d2018-03-28 09:47:51 +0200364 RTC_LOG(LS_VERBOSE) << ToString() << ": socket ipaddr: "
Qingsi Wang20232a92019-09-06 12:51:17 -0700365 << socket_->GetLocalAddress().ToSensitiveString()
Jonas Olssond7d762d2018-03-28 09:47:51 +0200366 << ", port() Network:" << port->Network()->ToString();
Steve Antonae226f62019-01-29 12:47:38 -0800367 RTC_DCHECK(absl::c_any_of(
368 port_->Network()->GetIPs(), [this](const rtc::InterfaceAddress& addr) {
369 return socket_->GetLocalAddress().ipaddr() == addr;
370 }));
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700371 ConnectSocketSignals(socket);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000372 }
373}
374
Yves Gerey665174f2018-06-19 15:03:05 +0200375TCPConnection::~TCPConnection() {}
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000376
Yves Gerey665174f2018-06-19 15:03:05 +0200377int TCPConnection::Send(const void* data,
378 size_t size,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000379 const rtc::PacketOptions& options) {
380 if (!socket_) {
381 error_ = ENOTCONN;
382 return SOCKET_ERROR;
383 }
384
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700385 // Sending after OnClose on active side will trigger a reconnect for a
386 // outgoing connection. Note that the write state is still WRITABLE as we want
387 // to spend a few seconds attempting a reconnect before saying we're
388 // unwritable.
389 if (!connected()) {
390 MaybeReconnect();
391 return SOCKET_ERROR;
392 }
393
394 // Note that this is important to put this after the previous check to give
395 // the connection a chance to reconnect.
396 if (pretending_to_be_writable_ || write_state() != STATE_WRITABLE) {
Steve Anton6c38cc72017-11-29 10:25:58 -0800397 // TODO(?): Should STATE_WRITE_TIMEOUT return a non-blocking error?
skvladc309e0e2016-07-28 17:15:20 -0700398 error_ = ENOTCONN;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000399 return SOCKET_ERROR;
400 }
zhihuang5ecf16c2016-06-01 17:09:15 -0700401 stats_.sent_total_packets++;
Qingsi Wang6e641e62018-04-11 20:14:17 -0700402 rtc::PacketOptions modified_options(options);
403 static_cast<TCPPort*>(port_)->CopyPortInformationToPacketInfo(
404 &modified_options.info_signaled_after_sent);
405 int sent = socket_->Send(data, size, modified_options);
Jonas Oreland3c5d5822020-12-14 12:45:05 +0100406 int64_t now = rtc::TimeMillis();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000407 if (sent < 0) {
zhihuang5ecf16c2016-06-01 17:09:15 -0700408 stats_.sent_discarded_packets++;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000409 error_ = socket_->GetError();
410 } else {
Jonas Oreland3c5d5822020-12-14 12:45:05 +0100411 send_rate_tracker_.AddSamplesAtTime(now, sent);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000412 }
Jonas Oreland3c5d5822020-12-14 12:45:05 +0100413 last_send_data_ = now;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000414 return sent;
415}
416
417int TCPConnection::GetError() {
418 return error_;
419}
420
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700421void TCPConnection::OnConnectionRequestResponse(ConnectionRequest* req,
422 StunMessage* response) {
Guo-wei Shiehb5940412015-08-24 11:58:03 -0700423 // Process the STUN response before we inform upper layer ready to send.
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700424 Connection::OnConnectionRequestResponse(req, response);
Guo-wei Shiehb5940412015-08-24 11:58:03 -0700425
426 // If we're in the state of pretending to be writeable, we should inform the
427 // upper layer it's ready to send again as previous EWOULDLBLOCK from socket
428 // would have stopped the outgoing stream.
429 if (pretending_to_be_writable_) {
430 Connection::OnReadyToSend();
431 }
432 pretending_to_be_writable_ = false;
nisseede5da42017-01-12 05:15:36 -0800433 RTC_DCHECK(write_state() == STATE_WRITABLE);
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700434}
435
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000436void TCPConnection::OnConnect(rtc::AsyncPacketSocket* socket) {
nisseede5da42017-01-12 05:15:36 -0800437 RTC_DCHECK(socket == socket_.get());
deadbeef5c3c1042017-08-04 15:01:57 -0700438 // Do not use this port if the socket bound to an address not associated with
439 // the desired network interface. This is seen in Chrome, where TCP sockets
440 // cannot be given a binding address, and the platform is expected to pick
441 // the correct local address.
442 //
443 // However, there are two situations in which we allow the bound address to
444 // not be one of the addresses of the requested interface:
445 // 1. The bound address is the loopback address. This happens when a proxy
446 // forces TCP to bind to only the localhost address (see issue 3927).
447 // 2. The bound address is the "any address". This happens when
448 // multiple_routes is disabled (see issue 4780).
449 //
450 // Note that, aside from minor differences in log statements, this logic is
451 // identical to that in TurnPort.
452 const rtc::SocketAddress& socket_address = socket->GetLocalAddress();
Steve Antonae226f62019-01-29 12:47:38 -0800453 if (absl::c_any_of(port_->Network()->GetIPs(),
454 [socket_address](const rtc::InterfaceAddress& addr) {
455 return socket_address.ipaddr() == addr;
456 })) {
Yves Gerey665174f2018-06-19 15:03:05 +0200457 RTC_LOG(LS_VERBOSE) << ToString() << ": Connection established to "
Jonas Olssond7d762d2018-03-28 09:47:51 +0200458 << socket->GetRemoteAddress().ToSensitiveString();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000459 } else {
deadbeef5c3c1042017-08-04 15:01:57 -0700460 if (socket->GetLocalAddress().IsLoopbackIP()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100461 RTC_LOG(LS_WARNING) << "Socket is bound to the address:"
Qingsi Wang20232a92019-09-06 12:51:17 -0700462 << socket_address.ipaddr().ToSensitiveString()
Taylor Brandstetter3ba7a572018-03-02 10:58:25 -0800463 << ", rather than an address associated with network:"
Mirko Bonadei675513b2017-11-09 11:09:25 +0100464 << port_->Network()->ToString()
465 << ". Still allowing it since it's localhost.";
deadbeef5c3c1042017-08-04 15:01:57 -0700466 } else if (IPIsAny(port_->Network()->GetBestIP())) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100467 RTC_LOG(LS_WARNING)
468 << "Socket is bound to the address:"
Qingsi Wang20232a92019-09-06 12:51:17 -0700469 << socket_address.ipaddr().ToSensitiveString()
Taylor Brandstetter3ba7a572018-03-02 10:58:25 -0800470 << ", rather than an address associated with network:"
Mirko Bonadei675513b2017-11-09 11:09:25 +0100471 << port_->Network()->ToString()
472 << ". Still allowing it since it's the 'any' address"
Jonas Olssond7d762d2018-03-28 09:47:51 +0200473 ", possibly caused by multiple_routes being disabled.";
deadbeef5c3c1042017-08-04 15:01:57 -0700474 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100475 RTC_LOG(LS_WARNING) << "Dropping connection as TCP socket bound to IP "
Qingsi Wang20232a92019-09-06 12:51:17 -0700476 << socket_address.ipaddr().ToSensitiveString()
Taylor Brandstetter3ba7a572018-03-02 10:58:25 -0800477 << ", rather than an address associated with network:"
Mirko Bonadei675513b2017-11-09 11:09:25 +0100478 << port_->Network()->ToString();
deadbeef5c3c1042017-08-04 15:01:57 -0700479 OnClose(socket, 0);
480 return;
481 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000482 }
tommi5ce1a2a2016-05-14 03:19:31 -0700483
484 // Connection is established successfully.
485 set_connected(true);
486 connection_pending_ = false;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000487}
488
489void TCPConnection::OnClose(rtc::AsyncPacketSocket* socket, int error) {
nisseede5da42017-01-12 05:15:36 -0800490 RTC_DCHECK(socket == socket_.get());
Yves Gerey665174f2018-06-19 15:03:05 +0200491 RTC_LOG(LS_INFO) << ToString() << ": Connection closed with error " << error;
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700492
493 // Guard against the condition where IPC socket will call OnClose for every
494 // packet it can't send.
495 if (connected()) {
496 set_connected(false);
Guo-wei Shieh1eb87c72015-08-25 11:02:55 -0700497
498 // Prevent the connection from being destroyed by redundant SignalClose
499 // events.
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700500 pretending_to_be_writable_ = true;
501
502 // We don't attempt reconnect right here. This is to avoid a case where the
503 // shutdown is intentional and reconnect is not necessary. We only reconnect
504 // when the connection is used to Send() or Ping().
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -0700505 port()->thread()->PostDelayed(RTC_FROM_HERE, reconnection_timeout(), this,
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700506 MSG_TCPCONNECTION_DELAYED_ONCLOSE);
Guo-wei Shieh1eb87c72015-08-25 11:02:55 -0700507 } else if (!pretending_to_be_writable_) {
508 // OnClose could be called when the underneath socket times out during the
509 // initial connect() (i.e. |pretending_to_be_writable_| is false) . We have
510 // to manually destroy here as this connection, as never connected, will not
511 // be scheduled for ping to trigger destroy.
512 Destroy();
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700513 }
514}
515
516void TCPConnection::OnMessage(rtc::Message* pmsg) {
517 switch (pmsg->message_id) {
518 case MSG_TCPCONNECTION_DELAYED_ONCLOSE:
519 // If this connection can't become connected and writable again in 5
520 // seconds, it's time to tear this down. This is the case for the original
521 // TCP connection on passive side during a reconnect.
522 if (pretending_to_be_writable_) {
Guo-wei Shieh1eb87c72015-08-25 11:02:55 -0700523 Destroy();
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700524 }
525 break;
Jonas Oreland7a284e12020-01-28 09:21:54 +0100526 case MSG_TCPCONNECTION_FAILED_CREATE_SOCKET:
527 FailAndPrune();
528 break;
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700529 default:
530 Connection::OnMessage(pmsg);
531 }
532}
533
534void TCPConnection::MaybeReconnect() {
535 // Only reconnect for an outgoing TCPConnection when OnClose was signaled and
536 // no outstanding reconnect is pending.
537 if (connected() || connection_pending_ || !outgoing_) {
538 return;
539 }
540
Jonas Olssond7d762d2018-03-28 09:47:51 +0200541 RTC_LOG(LS_INFO) << ToString()
542 << ": TCP Connection with remote is closed, "
543 "trying to reconnect";
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700544
545 CreateOutgoingTcpSocket();
546 error_ = EPIPE;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000547}
548
Yves Gerey665174f2018-06-19 15:03:05 +0200549void TCPConnection::OnReadPacket(rtc::AsyncPacketSocket* socket,
550 const char* data,
551 size_t size,
552 const rtc::SocketAddress& remote_addr,
Niels Möllere6933812018-11-05 13:01:41 +0100553 const int64_t& packet_time_us) {
nisseede5da42017-01-12 05:15:36 -0800554 RTC_DCHECK(socket == socket_.get());
Niels Möllere6933812018-11-05 13:01:41 +0100555 Connection::OnReadPacket(data, size, packet_time_us);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000556}
557
558void TCPConnection::OnReadyToSend(rtc::AsyncPacketSocket* socket) {
nisseede5da42017-01-12 05:15:36 -0800559 RTC_DCHECK(socket == socket_.get());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000560 Connection::OnReadyToSend();
561}
562
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700563void TCPConnection::CreateOutgoingTcpSocket() {
nisseede5da42017-01-12 05:15:36 -0800564 RTC_DCHECK(outgoing_);
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700565 int opts = (remote_candidate().protocol() == SSLTCP_PROTOCOL_NAME)
hnsl04833622017-01-09 08:35:45 -0800566 ? rtc::PacketSocketFactory::OPT_TLS_FAKE
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700567 : 0;
Patrik Höglund662e31f2019-09-05 14:35:04 +0200568 rtc::PacketSocketTcpOptions tcp_opts;
569 tcp_opts.opts = opts;
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700570 socket_.reset(port()->socket_factory()->CreateClientTcpSocket(
deadbeef5c3c1042017-08-04 15:01:57 -0700571 rtc::SocketAddress(port()->Network()->GetBestIP(), 0),
572 remote_candidate().address(), port()->proxy(), port()->user_agent(),
Patrik Höglund662e31f2019-09-05 14:35:04 +0200573 tcp_opts));
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700574 if (socket_) {
Yves Gerey665174f2018-06-19 15:03:05 +0200575 RTC_LOG(LS_VERBOSE) << ToString() << ": Connecting from "
Jonas Olssond7d762d2018-03-28 09:47:51 +0200576 << socket_->GetLocalAddress().ToSensitiveString()
577 << " to "
578 << remote_candidate().address().ToSensitiveString();
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700579 set_connected(false);
580 connection_pending_ = true;
581 ConnectSocketSignals(socket_.get());
582 } else {
Yves Gerey665174f2018-06-19 15:03:05 +0200583 RTC_LOG(LS_WARNING) << ToString() << ": Failed to create connection to "
Jonas Olssond7d762d2018-03-28 09:47:51 +0200584 << remote_candidate().address().ToSensitiveString();
Jonas Oreland7a284e12020-01-28 09:21:54 +0100585 // We can't FailAndPrune directly here. FailAndPrune and deletes all
586 // the StunRequests from the request_map_. And if this is in the stack
587 // of Connection::Ping(), we are still using the request.
588 // Unwind the stack and defer the FailAndPrune.
589 set_state(IceCandidatePairState::FAILED);
590 port()->thread()->Post(RTC_FROM_HERE, this,
591 MSG_TCPCONNECTION_FAILED_CREATE_SOCKET);
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700592 }
593}
594
595void TCPConnection::ConnectSocketSignals(rtc::AsyncPacketSocket* socket) {
596 if (outgoing_) {
597 socket->SignalConnect.connect(this, &TCPConnection::OnConnect);
598 }
599 socket->SignalReadPacket.connect(this, &TCPConnection::OnReadPacket);
600 socket->SignalReadyToSend.connect(this, &TCPConnection::OnReadyToSend);
601 socket->SignalClose.connect(this, &TCPConnection::OnClose);
602}
603
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000604} // namespace cricket