blob: 95052c2db1f829cefacfe598a94d32e554dc9c05 [file] [log] [blame]
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#ifndef P2P_BASE_PORTALLOCATOR_H_
12#define P2P_BASE_PORTALLOCATOR_H_
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000013
Taylor Brandstettera1c30352016-05-13 08:15:11 -070014#include <deque>
15#include <memory>
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000016#include <string>
17#include <vector>
18
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020019#include "p2p/base/port.h"
20#include "p2p/base/portinterface.h"
21#include "rtc_base/helpers.h"
22#include "rtc_base/proxyinfo.h"
23#include "rtc_base/sigslot.h"
24#include "rtc_base/thread.h"
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000025
Honghai Zhangd93f50c2016-10-05 11:47:22 -070026namespace webrtc {
27class MetricsObserverInterface;
Jonas Orelandbdcee282017-10-10 14:01:40 +020028class TurnCustomizer;
Honghai Zhangd93f50c2016-10-05 11:47:22 -070029}
30
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000031namespace cricket {
32
33// PortAllocator is responsible for allocating Port types for a given
34// P2PSocket. It also handles port freeing.
35//
36// Clients can override this class to control port allocation, including
37// what kinds of ports are allocated.
38
39enum {
Guo-wei Shieh13d35f62015-08-26 15:32:56 -070040 // Disable local UDP ports. This doesn't impact how we connect to relay
41 // servers.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000042 PORTALLOCATOR_DISABLE_UDP = 0x01,
43 PORTALLOCATOR_DISABLE_STUN = 0x02,
44 PORTALLOCATOR_DISABLE_RELAY = 0x04,
Guo-wei Shieh13d35f62015-08-26 15:32:56 -070045 // Disable local TCP ports. This doesn't impact how we connect to relay
46 // servers.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000047 PORTALLOCATOR_DISABLE_TCP = 0x08,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000048 PORTALLOCATOR_ENABLE_IPV6 = 0x40,
Peter Thatcher7cbd1882015-09-17 18:54:52 -070049 // TODO(pthatcher): Remove this once it's no longer used in:
50 // remoting/client/plugin/pepper_port_allocator.cc
51 // remoting/protocol/chromium_port_allocator.cc
52 // remoting/test/fake_port_allocator.cc
53 // It's a no-op and is no longer needed.
pthatcherfa301802015-08-11 04:12:56 -070054 PORTALLOCATOR_ENABLE_SHARED_UFRAG = 0x80,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000055 PORTALLOCATOR_ENABLE_SHARED_SOCKET = 0x100,
56 PORTALLOCATOR_ENABLE_STUN_RETRANSMIT_ATTRIBUTE = 0x200,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -080057 // When specified, we'll only allocate the STUN candidate for the public
58 // interface as seen by regular http traffic and the HOST candidate associated
59 // with the default local interface.
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +000060 PORTALLOCATOR_DISABLE_ADAPTER_ENUMERATION = 0x400,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -080061 // When specified along with PORTALLOCATOR_DISABLE_ADAPTER_ENUMERATION, the
62 // default local candidate mentioned above will not be allocated. Only the
63 // STUN candidate will be.
64 PORTALLOCATOR_DISABLE_DEFAULT_LOCAL_CANDIDATE = 0x800,
Guo-wei Shieh13d35f62015-08-26 15:32:56 -070065 // Disallow use of UDP when connecting to a relay server. Since proxy servers
66 // usually don't handle UDP, using UDP will leak the IP address.
67 PORTALLOCATOR_DISABLE_UDP_RELAY = 0x1000,
honghaiz60347052016-05-31 18:29:12 -070068
69 // When multiple networks exist, do not gather candidates on the ones with
70 // high cost. So if both Wi-Fi and cellular networks exist, gather only on the
71 // Wi-Fi network. If a network type is "unknown", it has a cost lower than
72 // cellular but higher than Wi-Fi/Ethernet. So if an unknown network exists,
73 // cellular networks will not be used to gather candidates and if a Wi-Fi
74 // network is present, "unknown" networks will not be usd to gather
75 // candidates. Doing so ensures that even if a cellular network type was not
76 // detected initially, it would not be used if a Wi-Fi network is present.
77 PORTALLOCATOR_DISABLE_COSTLY_NETWORKS = 0x2000,
zhihuangb09b3f92017-03-07 14:40:51 -080078
79 // When specified, do not collect IPv6 ICE candidates on Wi-Fi.
80 PORTALLOCATOR_ENABLE_IPV6_ON_WIFI = 0x4000,
deadbeef1ee21252017-06-13 15:49:45 -070081
82 // When this flag is set, ports not bound to any specific network interface
83 // will be used, in addition to normal ports bound to the enumerated
84 // interfaces. Without this flag, these "any address" ports would only be
85 // used when network enumeration fails or is disabled. But under certain
86 // conditions, these ports may succeed where others fail, so they may allow
87 // the application to work in a wider variety of environments, at the expense
88 // of having to allocate additional candidates.
89 PORTALLOCATOR_ENABLE_ANY_ADDRESS_PORTS = 0x8000,
Daniel Lazarenko2870b0a2018-01-25 10:30:22 +010090
91 // Exclude link-local network interfaces
92 // from considertaion after adapter enumeration.
93 PORTALLOCATOR_DISABLE_LINK_LOCAL_NETWORKS = 0x10000,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000094};
95
Honghai Zhangd93f50c2016-10-05 11:47:22 -070096// Defines various reasons that have caused ICE regathering.
Steve Anton300bf8e2017-07-14 10:13:10 -070097enum class IceRegatheringReason {
98 NETWORK_CHANGE, // Network interfaces on the device changed
99 NETWORK_FAILURE, // Regather only on networks that have failed
100 OCCASIONAL_REFRESH, // Periodic regather on all networks
101 MAX_VALUE
102};
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700103
Peter Boström0c4e06b2015-10-07 12:23:21 +0200104const uint32_t kDefaultPortAllocatorFlags = 0;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000105
Peter Boström0c4e06b2015-10-07 12:23:21 +0200106const uint32_t kDefaultStepDelay = 1000; // 1 sec step delay.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000107// As per RFC 5245 Appendix B.1, STUN transactions need to be paced at certain
108// internal. Less than 20ms is not acceptable. We choose 50ms as our default.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200109const uint32_t kMinimumStepDelay = 50;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000110
deadbeef3427f532017-07-26 16:09:33 -0700111// Turning on IPv6 could make many IPv6 interfaces available for connectivity
112// check and delay the call setup time. kDefaultMaxIPv6Networks is the default
113// upper limit of IPv6 networks but could be changed by
114// set_max_ipv6_networks().
115constexpr int kDefaultMaxIPv6Networks = 5;
116
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000117// CF = CANDIDATE FILTER
Oleh Prypinfd7df982017-12-21 16:25:19 +0100118enum : uint32_t {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000119 CF_NONE = 0x0,
120 CF_HOST = 0x1,
121 CF_REFLEXIVE = 0x2,
122 CF_RELAY = 0x4,
123 CF_ALL = 0x7,
124};
125
hnsl04833622017-01-09 08:35:45 -0800126// TLS certificate policy.
127enum class TlsCertPolicy {
128 // For TLS based protocols, ensure the connection is secure by not
129 // circumventing certificate validation.
130 TLS_CERT_POLICY_SECURE,
131 // For TLS based protocols, disregard security completely by skipping
132 // certificate validation. This is insecure and should never be used unless
133 // security is irrelevant in that particular context.
134 TLS_CERT_POLICY_INSECURE_NO_CHECK,
135};
136
deadbeef653b8e02015-11-11 12:55:10 -0800137// TODO(deadbeef): Rename to TurnCredentials (and username to ufrag).
138struct RelayCredentials {
139 RelayCredentials() {}
140 RelayCredentials(const std::string& username, const std::string& password)
141 : username(username), password(password) {}
142
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700143 bool operator==(const RelayCredentials& o) const {
144 return username == o.username && password == o.password;
145 }
146 bool operator!=(const RelayCredentials& o) const { return !(*this == o); }
147
deadbeef653b8e02015-11-11 12:55:10 -0800148 std::string username;
149 std::string password;
150};
151
152typedef std::vector<ProtocolAddress> PortList;
153// TODO(deadbeef): Rename to TurnServerConfig.
154struct RelayServerConfig {
Steve Anton6c38cc72017-11-29 10:25:58 -0800155 explicit RelayServerConfig(RelayType type);
Emad Omaradab1d2d2017-06-16 15:43:11 -0700156 RelayServerConfig(const rtc::SocketAddress& address,
157 const std::string& username,
158 const std::string& password,
Steve Anton7995d8c2017-10-30 16:23:38 -0700159 ProtocolType proto);
Taylor Brandstetter0c7e9f52015-12-29 14:14:52 -0800160 RelayServerConfig(const std::string& address,
161 int port,
162 const std::string& username,
163 const std::string& password,
Steve Anton7995d8c2017-10-30 16:23:38 -0700164 ProtocolType proto);
hnsl277b2502016-12-13 05:17:23 -0800165 // Legacy constructor where "secure" and PROTO_TCP implies PROTO_TLS.
166 RelayServerConfig(const std::string& address,
167 int port,
168 const std::string& username,
169 const std::string& password,
Taylor Brandstetter0c7e9f52015-12-29 14:14:52 -0800170 ProtocolType proto,
Steve Anton7995d8c2017-10-30 16:23:38 -0700171 bool secure);
172 RelayServerConfig(const RelayServerConfig&);
173 ~RelayServerConfig();
Taylor Brandstetter0c7e9f52015-12-29 14:14:52 -0800174
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700175 bool operator==(const RelayServerConfig& o) const {
176 return type == o.type && ports == o.ports && credentials == o.credentials &&
177 priority == o.priority;
178 }
179 bool operator!=(const RelayServerConfig& o) const { return !(*this == o); }
180
deadbeef653b8e02015-11-11 12:55:10 -0800181 RelayType type;
182 PortList ports;
183 RelayCredentials credentials;
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700184 int priority = 0;
hnsl04833622017-01-09 08:35:45 -0800185 TlsCertPolicy tls_cert_policy = TlsCertPolicy::TLS_CERT_POLICY_SECURE;
Diogo Real1dca9d52017-08-29 12:18:32 -0700186 std::vector<std::string> tls_alpn_protocols;
Diogo Real7bd1f1b2017-09-08 12:50:41 -0700187 std::vector<std::string> tls_elliptic_curves;
deadbeef653b8e02015-11-11 12:55:10 -0800188};
189
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000190class PortAllocatorSession : public sigslot::has_slots<> {
191 public:
192 // Content name passed in mostly for logging and debugging.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000193 PortAllocatorSession(const std::string& content_name,
194 int component,
deadbeefcbecd352015-09-23 11:50:27 -0700195 const std::string& ice_ufrag,
196 const std::string& ice_pwd,
Peter Boström0c4e06b2015-10-07 12:23:21 +0200197 uint32_t flags);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000198
199 // Subclasses should clean up any ports created.
Steve Anton7995d8c2017-10-30 16:23:38 -0700200 ~PortAllocatorSession() override;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000201
Peter Boström0c4e06b2015-10-07 12:23:21 +0200202 uint32_t flags() const { return flags_; }
203 void set_flags(uint32_t flags) { flags_ = flags; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000204 std::string content_name() const { return content_name_; }
205 int component() const { return component_; }
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700206 const std::string& ice_ufrag() const { return ice_ufrag_; }
207 const std::string& ice_pwd() const { return ice_pwd_; }
208 bool pooled() const { return ice_ufrag_.empty(); }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000209
Taylor Brandstetter417eebe2016-05-23 16:02:19 -0700210 // Setting this filter should affect not only candidates gathered in the
211 // future, but candidates already gathered and ports already "ready",
212 // which would be returned by ReadyCandidates() and ReadyPorts().
213 //
214 // Default filter should be CF_ALL.
215 virtual void SetCandidateFilter(uint32_t filter) = 0;
216
deadbeefb60a8192016-08-24 15:15:00 -0700217 // Starts gathering ports and ICE candidates.
Honghai Zhangd8f6fc42016-07-01 17:31:12 -0700218 virtual void StartGettingPorts() = 0;
deadbeefb60a8192016-08-24 15:15:00 -0700219 // Completely stops gathering. Will not gather again unless StartGettingPorts
220 // is called again.
Honghai Zhangd8f6fc42016-07-01 17:31:12 -0700221 virtual void StopGettingPorts() = 0;
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700222 // Whether the session is actively getting ports.
Honghai Zhangd8f6fc42016-07-01 17:31:12 -0700223 virtual bool IsGettingPorts() = 0;
deadbeefb60a8192016-08-24 15:15:00 -0700224
225 //
226 // NOTE: The group of methods below is only used for continual gathering.
227 //
228
229 // ClearGettingPorts should have the same immediate effect as
230 // StopGettingPorts, but if the implementation supports continual gathering,
231 // ClearGettingPorts allows additional ports/candidates to be gathered if the
232 // network conditions change.
Honghai Zhangd8f6fc42016-07-01 17:31:12 -0700233 virtual void ClearGettingPorts() = 0;
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700234 // Whether it is in the state where the existing gathering process is stopped,
235 // but new ones may be started (basically after calling ClearGettingPorts).
Steve Anton7995d8c2017-10-30 16:23:38 -0700236 virtual bool IsCleared() const;
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700237 // Whether the session has completely stopped.
Steve Anton7995d8c2017-10-30 16:23:38 -0700238 virtual bool IsStopped() const;
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700239 // Re-gathers candidates on networks that do not have any connections. More
240 // precisely, a network interface may have more than one IP addresses (e.g.,
241 // IPv4 and IPv6 addresses). Each address subnet will be used to create a
242 // network. Only if all networks of an interface have no connection, the
243 // implementation should start re-gathering on all networks of that interface.
244 virtual void RegatherOnFailedNetworks() {}
245 // Re-gathers candidates on all networks.
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700246 virtual void RegatherOnAllNetworks() {}
Qingsi Wang72a43a12018-02-20 16:03:18 -0800247 // Get candidate-level stats from all candidates on the ready ports and return
248 // the stats to the given list.
249 virtual void GetCandidateStatsFromReadyPorts(
250 CandidateStatsList* candidate_stats_list) const;
Qingsi Wangdb53f8e2018-02-20 14:45:49 -0800251 // Set the interval at which STUN candidates will resend STUN binding requests
252 // on the underlying ports to keep NAT bindings open.
253 // The default value of the interval in implementation is restored if a null
254 // optional value is passed.
255 virtual void SetStunKeepaliveIntervalForReadyPorts(
256 const rtc::Optional<int>& stun_keepalive_interval) {}
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700257 // Another way of getting the information provided by the signals below.
258 //
259 // Ports and candidates are not guaranteed to be in the same order as the
260 // signals were emitted in.
261 virtual std::vector<PortInterface*> ReadyPorts() const = 0;
262 virtual std::vector<Candidate> ReadyCandidates() const = 0;
263 virtual bool CandidatesAllocationDone() const = 0;
Honghai Zhanga74363c2016-07-28 18:06:15 -0700264 // Marks all ports in the current session as "pruned" so that they may be
265 // destroyed if no connection is using them.
266 virtual void PruneAllPorts() {}
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700267
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000268 sigslot::signal2<PortAllocatorSession*, PortInterface*> SignalPortReady;
Honghai Zhang8eeecab2016-07-28 13:20:15 -0700269 // Fires this signal when the network of the ports failed (either because the
270 // interface is down, or because there is no connection on the interface),
271 // or when TURN ports are pruned because a higher-priority TURN port becomes
272 // ready(pairable).
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700273 sigslot::signal2<PortAllocatorSession*, const std::vector<PortInterface*>&>
Honghai Zhang8eeecab2016-07-28 13:20:15 -0700274 SignalPortsPruned;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000275 sigslot::signal2<PortAllocatorSession*,
276 const std::vector<Candidate>&> SignalCandidatesReady;
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700277 // Candidates should be signaled to be removed when the port that generated
278 // the candidates is removed.
279 sigslot::signal2<PortAllocatorSession*, const std::vector<Candidate>&>
280 SignalCandidatesRemoved;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000281 sigslot::signal1<PortAllocatorSession*> SignalCandidatesAllocationDone;
282
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700283 sigslot::signal2<PortAllocatorSession*, IceRegatheringReason>
284 SignalIceRegathering;
285
Steve Anton7995d8c2017-10-30 16:23:38 -0700286 virtual uint32_t generation();
287 virtual void set_generation(uint32_t generation);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000288 sigslot::signal1<PortAllocatorSession*> SignalDestroyed;
289
deadbeefc55fb302016-05-12 12:51:38 -0700290 protected:
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700291 // This method is called when a pooled session (which doesn't have these
292 // properties initially) is returned by PortAllocator::TakePooledSession,
293 // and the content name, component, and ICE ufrag/pwd are updated.
294 //
295 // A subclass may need to override this method to perform additional actions,
296 // such as applying the updated information to ports and candidates.
297 virtual void UpdateIceParametersInternal() {}
298
deadbeefcbecd352015-09-23 11:50:27 -0700299 // TODO(deadbeef): Get rid of these when everyone switches to ice_ufrag and
300 // ice_pwd.
301 const std::string& username() const { return ice_ufrag_; }
302 const std::string& password() const { return ice_pwd_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000303
deadbeefc55fb302016-05-12 12:51:38 -0700304 private:
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700305 void SetIceParameters(const std::string& content_name,
306 int component,
307 const std::string& ice_ufrag,
308 const std::string& ice_pwd) {
309 content_name_ = content_name;
310 component_ = component;
311 ice_ufrag_ = ice_ufrag;
312 ice_pwd_ = ice_pwd;
313 UpdateIceParametersInternal();
314 }
315
deadbeefc55fb302016-05-12 12:51:38 -0700316 uint32_t flags_;
317 uint32_t generation_;
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700318 std::string content_name_;
319 int component_;
deadbeefcbecd352015-09-23 11:50:27 -0700320 std::string ice_ufrag_;
321 std::string ice_pwd_;
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700322
323 // SetIceParameters is an implementation detail which only PortAllocator
324 // should be able to call.
325 friend class PortAllocator;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000326};
327
Taylor Brandstetterf8e65772016-06-27 17:20:15 -0700328// Every method of PortAllocator (including the destructor) must be called on
329// the same thread, except for the constructor which may be called on any
330// thread.
331//
332// This allows constructing a PortAllocator subclass on one thread and
333// passing it into an object that uses it on a different thread.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000334class PortAllocator : public sigslot::has_slots<> {
335 public:
Steve Anton7995d8c2017-10-30 16:23:38 -0700336 PortAllocator();
337 ~PortAllocator() override;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000338
Taylor Brandstetterf8e65772016-06-27 17:20:15 -0700339 // This should be called on the PortAllocator's thread before the
340 // PortAllocator is used. Subclasses may override this if necessary.
341 virtual void Initialize() {}
342
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700343 // Set STUN and TURN servers to be used in future sessions, and set
344 // candidate pool size, as described in JSEP.
345 //
deadbeef42a42632017-03-10 15:18:00 -0800346 // If the servers are changing, and the candidate pool size is nonzero, and
347 // FreezeCandidatePool hasn't been called, existing pooled sessions will be
348 // destroyed and new ones created.
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700349 //
deadbeef42a42632017-03-10 15:18:00 -0800350 // If the servers are not changing but the candidate pool size is, and
351 // FreezeCandidatePool hasn't been called, pooled sessions will be either
352 // created or destroyed as necessary.
deadbeef6de92f92016-12-12 18:49:32 -0800353 //
354 // Returns true if the configuration could successfully be changed.
355 bool SetConfiguration(const ServerAddresses& stun_servers,
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700356 const std::vector<RelayServerConfig>& turn_servers,
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700357 int candidate_pool_size,
Jonas Orelandbdcee282017-10-10 14:01:40 +0200358 bool prune_turn_ports,
Qingsi Wangdb53f8e2018-02-20 14:45:49 -0800359 webrtc::TurnCustomizer* turn_customizer = nullptr,
360 const rtc::Optional<int>&
361 stun_candidate_keepalive_interval = rtc::nullopt);
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700362
363 const ServerAddresses& stun_servers() const { return stun_servers_; }
364
365 const std::vector<RelayServerConfig>& turn_servers() const {
366 return turn_servers_;
367 }
368
deadbeef6de92f92016-12-12 18:49:32 -0800369 int candidate_pool_size() const { return candidate_pool_size_; }
Qingsi Wangdb53f8e2018-02-20 14:45:49 -0800370 const rtc::Optional<int>& stun_candidate_keepalive_interval() const {
371 return stun_candidate_keepalive_interval_;
372 }
deadbeef653b8e02015-11-11 12:55:10 -0800373
Taylor Brandstetter0c7e9f52015-12-29 14:14:52 -0800374 // Sets the network types to ignore.
375 // Values are defined by the AdapterType enum.
376 // For instance, calling this with
377 // ADAPTER_TYPE_ETHERNET | ADAPTER_TYPE_LOOPBACK will ignore Ethernet and
378 // loopback interfaces.
379 virtual void SetNetworkIgnoreMask(int network_ignore_mask) = 0;
380
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700381 std::unique_ptr<PortAllocatorSession> CreateSession(
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000382 const std::string& content_name,
383 int component,
384 const std::string& ice_ufrag,
385 const std::string& ice_pwd);
386
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700387 // Get an available pooled session and set the transport information on it.
388 //
389 // Caller takes ownership of the returned session.
390 //
391 // If no pooled sessions are available, returns null.
392 std::unique_ptr<PortAllocatorSession> TakePooledSession(
393 const std::string& content_name,
394 int component,
395 const std::string& ice_ufrag,
396 const std::string& ice_pwd);
397
398 // Returns the next session that would be returned by TakePooledSession.
399 const PortAllocatorSession* GetPooledSession() const;
400
deadbeef42a42632017-03-10 15:18:00 -0800401 // After FreezeCandidatePool is called, changing the candidate pool size will
402 // no longer be allowed, and changing ICE servers will not cause pooled
403 // sessions to be recreated.
404 //
405 // Expected to be called when SetLocalDescription is called on a
406 // PeerConnection. Can be called safely on any thread as long as not
407 // simultaneously with SetConfiguration.
408 void FreezeCandidatePool();
409
410 // Discard any remaining pooled sessions.
411 void DiscardCandidatePool();
412
Peter Boström0c4e06b2015-10-07 12:23:21 +0200413 uint32_t flags() const { return flags_; }
414 void set_flags(uint32_t flags) { flags_ = flags; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000415
deadbeeff137e972017-03-23 15:45:49 -0700416 // These three methods are deprecated. If connections need to go through a
417 // proxy, the application should create a BasicPortAllocator given a custom
418 // PacketSocketFactory that creates proxy sockets.
419 const std::string& user_agent() const { return agent_; }
420 const rtc::ProxyInfo& proxy() const { return proxy_; }
421 void set_proxy(const std::string& agent, const rtc::ProxyInfo& proxy) {
422 agent_ = agent;
423 proxy_ = proxy;
424 }
425
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000426 // Gets/Sets the port range to use when choosing client ports.
427 int min_port() const { return min_port_; }
428 int max_port() const { return max_port_; }
429 bool SetPortRange(int min_port, int max_port) {
430 if (min_port > max_port) {
431 return false;
432 }
433
434 min_port_ = min_port;
435 max_port_ = max_port;
436 return true;
437 }
438
deadbeef3427f532017-07-26 16:09:33 -0700439 // Can be used to change the default numer of IPv6 network interfaces used
440 // (5). Can set to INT_MAX to effectively disable the limit.
441 //
442 // TODO(deadbeef): Applications shouldn't have to arbitrarily limit the
443 // number of available IPv6 network interfaces just because they could slow
444 // ICE down. We should work on making our ICE logic smarter (for example,
445 // prioritizing pinging connections that are most likely to work) so that
446 // every network interface can be used without impacting ICE's speed.
447 void set_max_ipv6_networks(int networks) { max_ipv6_networks_ = networks; }
448 int max_ipv6_networks() { return max_ipv6_networks_; }
449
deadbeef1c5e6d02017-09-15 17:46:56 -0700450 // Delay between different candidate gathering phases (UDP, TURN, TCP).
451 // Defaults to 1 second, but PeerConnection sets it to 50ms.
452 // TODO(deadbeef): Get rid of this. Its purpose is to avoid sending too many
453 // STUN transactions at once, but that's already happening if you configure
454 // multiple STUN servers or have multiple network interfaces. We should
455 // implement some global pacing logic instead if that's our goal.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200456 uint32_t step_delay() const { return step_delay_; }
457 void set_step_delay(uint32_t delay) { step_delay_ = delay; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000458
459 bool allow_tcp_listen() const { return allow_tcp_listen_; }
460 void set_allow_tcp_listen(bool allow_tcp_listen) {
461 allow_tcp_listen_ = allow_tcp_listen;
462 }
463
Peter Boström0c4e06b2015-10-07 12:23:21 +0200464 uint32_t candidate_filter() { return candidate_filter_; }
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700465 void set_candidate_filter(uint32_t filter) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000466 candidate_filter_ = filter;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000467 }
468
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700469 bool prune_turn_ports() const { return prune_turn_ports_; }
470
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000471 // Gets/Sets the Origin value used for WebRTC STUN requests.
472 const std::string& origin() const { return origin_; }
473 void set_origin(const std::string& origin) { origin_ = origin; }
474
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700475 void SetMetricsObserver(webrtc::MetricsObserverInterface* observer) {
476 metrics_observer_ = observer;
477 }
478
Jonas Orelandbdcee282017-10-10 14:01:40 +0200479 webrtc::TurnCustomizer* turn_customizer() {
480 return turn_customizer_;
481 }
482
Qingsi Wang72a43a12018-02-20 16:03:18 -0800483 // Collect candidate stats from pooled allocator sessions. This can be used to
484 // collect candidate stats without creating an offer/answer or setting local
485 // description. After the local description is set, the ownership of the
486 // pooled session is taken by P2PTransportChannel, and the
487 // candidate stats can be collected from P2PTransportChannel::GetStats.
488 virtual void GetCandidateStatsFromPooledSessions(
489 CandidateStatsList* candidate_stats_list);
490
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000491 protected:
492 virtual PortAllocatorSession* CreateSessionInternal(
493 const std::string& content_name,
494 int component,
495 const std::string& ice_ufrag,
496 const std::string& ice_pwd) = 0;
497
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700498 webrtc::MetricsObserverInterface* metrics_observer() {
499 return metrics_observer_;
500 }
501
502 const std::deque<std::unique_ptr<PortAllocatorSession>>& pooled_sessions() {
503 return pooled_sessions_;
504 }
505
Peter Boström0c4e06b2015-10-07 12:23:21 +0200506 uint32_t flags_;
deadbeeff137e972017-03-23 15:45:49 -0700507 std::string agent_;
508 rtc::ProxyInfo proxy_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000509 int min_port_;
510 int max_port_;
deadbeef3427f532017-07-26 16:09:33 -0700511 int max_ipv6_networks_;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200512 uint32_t step_delay_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000513 bool allow_tcp_listen_;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200514 uint32_t candidate_filter_;
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000515 std::string origin_;
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700516
517 private:
518 ServerAddresses stun_servers_;
519 std::vector<RelayServerConfig> turn_servers_;
deadbeef6de92f92016-12-12 18:49:32 -0800520 int candidate_pool_size_ = 0; // Last value passed into SetConfiguration.
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700521 std::deque<std::unique_ptr<PortAllocatorSession>> pooled_sessions_;
deadbeef42a42632017-03-10 15:18:00 -0800522 bool candidate_pool_frozen_ = false;
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700523 bool prune_turn_ports_ = false;
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700524
525 webrtc::MetricsObserverInterface* metrics_observer_ = nullptr;
Jonas Orelandbdcee282017-10-10 14:01:40 +0200526
527 // Customizer for TURN messages.
528 // The instance is owned by application and will be shared among
529 // all TurnPort(s) created.
530 webrtc::TurnCustomizer* turn_customizer_ = nullptr;
Qingsi Wangdb53f8e2018-02-20 14:45:49 -0800531
532 rtc::Optional<int> stun_candidate_keepalive_interval_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000533};
534
535} // namespace cricket
536
Mirko Bonadei92ea95e2017-09-15 06:47:31 +0200537#endif // P2P_BASE_PORTALLOCATOR_H_