blob: 5e795ece8631db48c942969c066bdd42d7ee2d14 [file] [log] [blame]
henrike@webrtc.org28e20752013-07-10 00:45:36 +00001/*
2 * libjingle
3 * Copyright 2004--2005, Google Inc.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions are met:
7 *
8 * 1. Redistributions of source code must retain the above copyright notice,
9 * this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 * 3. The name of the author may not be used to endorse or promote products
14 * derived from this software without specific prior written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
17 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
18 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
19 * EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
20 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
21 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
22 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
23 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
24 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
25 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 */
27
28#ifndef TALK_P2P_BASE_PORT_H_
29#define TALK_P2P_BASE_PORT_H_
30
31#include <string>
32#include <vector>
33#include <map>
34
35#include "talk/base/network.h"
36#include "talk/base/proxyinfo.h"
37#include "talk/base/ratetracker.h"
38#include "talk/base/sigslot.h"
39#include "talk/base/socketaddress.h"
40#include "talk/base/thread.h"
41#include "talk/p2p/base/candidate.h"
42#include "talk/p2p/base/packetsocketfactory.h"
43#include "talk/p2p/base/portinterface.h"
44#include "talk/p2p/base/stun.h"
45#include "talk/p2p/base/stunrequest.h"
46#include "talk/p2p/base/transport.h"
47
48namespace talk_base {
49class AsyncPacketSocket;
50}
51
52namespace cricket {
53
54class Connection;
55class ConnectionRequest;
56
57extern const char LOCAL_PORT_TYPE[];
58extern const char STUN_PORT_TYPE[];
59extern const char PRFLX_PORT_TYPE[];
60extern const char RELAY_PORT_TYPE[];
61
62extern const char UDP_PROTOCOL_NAME[];
63extern const char TCP_PROTOCOL_NAME[];
64extern const char SSLTCP_PROTOCOL_NAME[];
65
66// The length of time we wait before timing out readability on a connection.
67const uint32 CONNECTION_READ_TIMEOUT = 30 * 1000; // 30 seconds
68
69// The length of time we wait before timing out writability on a connection.
70const uint32 CONNECTION_WRITE_TIMEOUT = 15 * 1000; // 15 seconds
71
72// The length of time we wait before we become unwritable.
73const uint32 CONNECTION_WRITE_CONNECT_TIMEOUT = 5 * 1000; // 5 seconds
74
75// The number of pings that must fail to respond before we become unwritable.
76const uint32 CONNECTION_WRITE_CONNECT_FAILURES = 5;
77
78// This is the length of time that we wait for a ping response to come back.
79const int CONNECTION_RESPONSE_TIMEOUT = 5 * 1000; // 5 seconds
80
81enum RelayType {
82 RELAY_GTURN, // Legacy google relay service.
83 RELAY_TURN // Standard (TURN) relay service.
84};
85
86enum IcePriorityValue {
87 // The reason we are choosing Relay preference 2 is because, we can run
88 // Relay from client to server on UDP/TCP/TLS. To distinguish the transport
89 // protocol, we prefer UDP over TCP over TLS.
90 // For UDP ICE_TYPE_PREFERENCE_RELAY will be 2.
91 // For TCP ICE_TYPE_PREFERENCE_RELAY will be 1.
92 // For TLS ICE_TYPE_PREFERENCE_RELAY will be 0.
93 // Check turnport.cc for setting these values.
94 ICE_TYPE_PREFERENCE_RELAY = 2,
95 ICE_TYPE_PREFERENCE_HOST_TCP = 90,
96 ICE_TYPE_PREFERENCE_SRFLX = 100,
97 ICE_TYPE_PREFERENCE_PRFLX = 110,
98 ICE_TYPE_PREFERENCE_HOST = 126
99};
100
101const char* ProtoToString(ProtocolType proto);
102bool StringToProto(const char* value, ProtocolType* proto);
103
104struct ProtocolAddress {
105 talk_base::SocketAddress address;
106 ProtocolType proto;
107
108 ProtocolAddress(const talk_base::SocketAddress& a, ProtocolType p)
109 : address(a), proto(p) { }
110};
111
112// Represents a local communication mechanism that can be used to create
113// connections to similar mechanisms of the other client. Subclasses of this
114// one add support for specific mechanisms like local UDP ports.
115class Port : public PortInterface, public talk_base::MessageHandler,
116 public sigslot::has_slots<> {
117 public:
118 Port(talk_base::Thread* thread, talk_base::Network* network,
119 const talk_base::IPAddress& ip,
120 const std::string& username_fragment, const std::string& password);
121 Port(talk_base::Thread* thread, const std::string& type,
122 talk_base::PacketSocketFactory* factory,
123 talk_base::Network* network, const talk_base::IPAddress& ip,
124 int min_port, int max_port, const std::string& username_fragment,
125 const std::string& password);
126 virtual ~Port();
127
128 virtual const std::string& Type() const { return type_; }
129 virtual talk_base::Network* Network() const { return network_; }
130
131 // This method will set the flag which enables standard ICE/STUN procedures
132 // in STUN connectivity checks. Currently this method does
133 // 1. Add / Verify MI attribute in STUN binding requests.
134 // 2. Username attribute in STUN binding request will be RFRAF:LFRAG,
135 // as opposed to RFRAGLFRAG.
136 virtual void SetIceProtocolType(IceProtocolType protocol) {
137 ice_protocol_ = protocol;
138 }
139 virtual IceProtocolType IceProtocol() const { return ice_protocol_; }
140
141 // Methods to set/get ICE role and tiebreaker values.
142 void SetRole(TransportRole role) { role_ = role; }
143 TransportRole Role() const { return role_; }
144
145 void SetTiebreaker(uint64 tiebreaker) { tiebreaker_ = tiebreaker; }
146 uint64 Tiebreaker() const { return tiebreaker_; }
147
148 virtual bool SharedSocket() const { return shared_socket_; }
149
150 // The thread on which this port performs its I/O.
151 talk_base::Thread* thread() { return thread_; }
152
153 // The factory used to create the sockets of this port.
154 talk_base::PacketSocketFactory* socket_factory() const { return factory_; }
155 void set_socket_factory(talk_base::PacketSocketFactory* factory) {
156 factory_ = factory;
157 }
158
159 // For debugging purposes.
160 const std::string& content_name() const { return content_name_; }
161 void set_content_name(const std::string& content_name) {
162 content_name_ = content_name;
163 }
164
165 int component() const { return component_; }
166 void set_component(int component) { component_ = component; }
167
168 bool send_retransmit_count_attribute() const {
169 return send_retransmit_count_attribute_;
170 }
171 void set_send_retransmit_count_attribute(bool enable) {
172 send_retransmit_count_attribute_ = enable;
173 }
174
175 const talk_base::SocketAddress& related_address() const {
176 return related_address_;
177 }
178 void set_related_address(const talk_base::SocketAddress& address) {
179 related_address_ = address;
180 }
181
182 // Identifies the generation that this port was created in.
183 uint32 generation() { return generation_; }
184 void set_generation(uint32 generation) { generation_ = generation; }
185
186 // ICE requires a single username/password per content/media line. So the
187 // |ice_username_fragment_| of the ports that belongs to the same content will
188 // be the same. However this causes a small complication with our relay
189 // server, which expects different username for RTP and RTCP.
190 //
191 // To resolve this problem, we implemented the username_fragment(),
192 // which returns a different username (calculated from
193 // |ice_username_fragment_|) for RTCP in the case of ICEPROTO_GOOGLE. And the
194 // username_fragment() simply returns |ice_username_fragment_| when running
195 // in ICEPROTO_RFC5245.
196 //
197 // As a result the ICEPROTO_GOOGLE will use different usernames for RTP and
198 // RTCP. And the ICEPROTO_RFC5245 will use same username for both RTP and
199 // RTCP.
200 const std::string username_fragment() const;
201 const std::string& password() const { return password_; }
202
203 // Fired when candidates are discovered by the port. When all candidates
204 // are discovered that belong to port SignalAddressReady is fired.
205 sigslot::signal2<Port*, const Candidate&> SignalCandidateReady;
206
207 // Provides all of the above information in one handy object.
208 virtual const std::vector<Candidate>& Candidates() const {
209 return candidates_;
210 }
211
212 // SignalPortComplete is sent when port completes the task of candidates
213 // allocation.
214 sigslot::signal1<Port*> SignalPortComplete;
215 // This signal sent when port fails to allocate candidates and this port
216 // can't be used in establishing the connections. When port is in shared mode
217 // and port fails to allocate one of the candidates, port shouldn't send
218 // this signal as other candidates might be usefull in establishing the
219 // connection.
220 sigslot::signal1<Port*> SignalPortError;
221
222 // Returns a map containing all of the connections of this port, keyed by the
223 // remote address.
224 typedef std::map<talk_base::SocketAddress, Connection*> AddressMap;
225 const AddressMap& connections() { return connections_; }
226
227 // Returns the connection to the given address or NULL if none exists.
228 virtual Connection* GetConnection(
229 const talk_base::SocketAddress& remote_addr);
230
231 // Called each time a connection is created.
232 sigslot::signal2<Port*, Connection*> SignalConnectionCreated;
233
234 // In a shared socket mode each port which shares the socket will decide
235 // to accept the packet based on the |remote_addr|. Currently only UDP
236 // port implemented this method.
237 // TODO(mallinath) - Make it pure virtual.
238 virtual bool HandleIncomingPacket(
239 talk_base::AsyncPacketSocket* socket, const char* data, size_t size,
240 const talk_base::SocketAddress& remote_addr) {
241 ASSERT(false);
242 return false;
243 }
244
245 // Sends a response message (normal or error) to the given request. One of
246 // these methods should be called as a response to SignalUnknownAddress.
247 // NOTE: You MUST call CreateConnection BEFORE SendBindingResponse.
248 virtual void SendBindingResponse(StunMessage* request,
249 const talk_base::SocketAddress& addr);
250 virtual void SendBindingErrorResponse(
251 StunMessage* request, const talk_base::SocketAddress& addr,
252 int error_code, const std::string& reason);
253
254 void set_proxy(const std::string& user_agent,
255 const talk_base::ProxyInfo& proxy) {
256 user_agent_ = user_agent;
257 proxy_ = proxy;
258 }
259 const std::string& user_agent() { return user_agent_; }
260 const talk_base::ProxyInfo& proxy() { return proxy_; }
261
262 virtual void EnablePortPackets();
263
264 // Indicates to the port that its official use has now begun. This will
265 // start the timer that checks to see if the port is being used.
266 void Start();
267
268 // Called if the port has no connections and is no longer useful.
269 void Destroy();
270
271 virtual void OnMessage(talk_base::Message *pmsg);
272
273 // Debugging description of this port
274 virtual std::string ToString() const;
275 talk_base::IPAddress& ip() { return ip_; }
276 int min_port() { return min_port_; }
277 int max_port() { return max_port_; }
278
279 // This method will return local and remote username fragements from the
280 // stun username attribute if present.
281 bool ParseStunUsername(const StunMessage* stun_msg,
282 std::string* local_username,
283 std::string* remote_username) const;
284 void CreateStunUsername(const std::string& remote_username,
285 std::string* stun_username_attr_str) const;
286
287 bool MaybeIceRoleConflict(const talk_base::SocketAddress& addr,
288 IceMessage* stun_msg,
289 const std::string& remote_ufrag);
290
291 // Called when the socket is currently able to send.
292 void OnReadyToSend();
293
294 // Called when the Connection discovers a local peer reflexive candidate.
295 // Returns the index of the new local candidate.
296 size_t AddPrflxCandidate(const Candidate& local);
297
298 // Returns if RFC 5245 ICE protocol is used.
299 bool IsStandardIce() const;
300
301 // Returns if Google ICE protocol is used.
302 bool IsGoogleIce() const;
303
304 protected:
305 void set_type(const std::string& type) { type_ = type; }
306 // Fills in the local address of the port.
307 void AddAddress(const talk_base::SocketAddress& address,
308 const talk_base::SocketAddress& base_address,
309 const std::string& protocol, const std::string& type,
310 uint32 type_preference, bool final);
311
312 // Adds the given connection to the list. (Deleting removes them.)
313 void AddConnection(Connection* conn);
314
315 // Called when a packet is received from an unknown address that is not
316 // currently a connection. If this is an authenticated STUN binding request,
317 // then we will signal the client.
318 void OnReadPacket(const char* data, size_t size,
319 const talk_base::SocketAddress& addr,
320 ProtocolType proto);
321
322 // If the given data comprises a complete and correct STUN message then the
323 // return value is true, otherwise false. If the message username corresponds
324 // with this port's username fragment, msg will contain the parsed STUN
325 // message. Otherwise, the function may send a STUN response internally.
326 // remote_username contains the remote fragment of the STUN username.
327 bool GetStunMessage(const char* data, size_t size,
328 const talk_base::SocketAddress& addr,
329 IceMessage** out_msg, std::string* out_username);
330
331 // Checks if the address in addr is compatible with the port's ip.
332 bool IsCompatibleAddress(const talk_base::SocketAddress& addr);
333
334 private:
335 void Construct();
336 // Called when one of our connections deletes itself.
337 void OnConnectionDestroyed(Connection* conn);
338
339 // Checks if this port is useless, and hence, should be destroyed.
340 void CheckTimeout();
341
342 talk_base::Thread* thread_;
343 talk_base::PacketSocketFactory* factory_;
344 std::string type_;
345 bool send_retransmit_count_attribute_;
346 talk_base::Network* network_;
347 talk_base::IPAddress ip_;
348 int min_port_;
349 int max_port_;
350 std::string content_name_;
351 int component_;
352 uint32 generation_;
353 talk_base::SocketAddress related_address_;
354 // In order to establish a connection to this Port (so that real data can be
355 // sent through), the other side must send us a STUN binding request that is
356 // authenticated with this username_fragment and password.
357 // PortAllocatorSession will provide these username_fragment and password.
358 //
359 // Note: we should always use username_fragment() instead of using
360 // |ice_username_fragment_| directly. For the details see the comment on
361 // username_fragment().
362 std::string ice_username_fragment_;
363 std::string password_;
364 std::vector<Candidate> candidates_;
365 AddressMap connections_;
366 enum Lifetime { LT_PRESTART, LT_PRETIMEOUT, LT_POSTTIMEOUT } lifetime_;
367 bool enable_port_packets_;
368 IceProtocolType ice_protocol_;
369 TransportRole role_;
370 uint64 tiebreaker_;
371 bool shared_socket_;
372
373 // Information to use when going through a proxy.
374 std::string user_agent_;
375 talk_base::ProxyInfo proxy_;
376
377 friend class Connection;
378};
379
380// Represents a communication link between a port on the local client and a
381// port on the remote client.
382class Connection : public talk_base::MessageHandler,
383 public sigslot::has_slots<> {
384 public:
385 // States are from RFC 5245. http://tools.ietf.org/html/rfc5245#section-5.7.4
386 enum State {
387 STATE_WAITING = 0, // Check has not been performed, Waiting pair on CL.
388 STATE_INPROGRESS, // Check has been sent, transaction is in progress.
389 STATE_SUCCEEDED, // Check already done, produced a successful result.
390 STATE_FAILED // Check for this connection failed.
391 };
392
393 virtual ~Connection();
394
395 // The local port where this connection sends and receives packets.
396 Port* port() { return port_; }
397 const Port* port() const { return port_; }
398
399 // Returns the description of the local port
400 virtual const Candidate& local_candidate() const;
401
402 // Returns the description of the remote port to which we communicate.
403 const Candidate& remote_candidate() const { return remote_candidate_; }
404
405 // Returns the pair priority.
406 uint64 priority() const;
407
408 enum ReadState {
409 STATE_READ_INIT = 0, // we have yet to receive a ping
410 STATE_READABLE = 1, // we have received pings recently
411 STATE_READ_TIMEOUT = 2, // we haven't received pings in a while
412 };
413
414 ReadState read_state() const { return read_state_; }
415 bool readable() const { return read_state_ == STATE_READABLE; }
416
417 enum WriteState {
418 STATE_WRITABLE = 0, // we have received ping responses recently
419 STATE_WRITE_UNRELIABLE = 1, // we have had a few ping failures
420 STATE_WRITE_INIT = 2, // we have yet to receive a ping response
421 STATE_WRITE_TIMEOUT = 3, // we have had a large number of ping failures
422 };
423
424 WriteState write_state() const { return write_state_; }
425 bool writable() const { return write_state_ == STATE_WRITABLE; }
426
427 // Determines whether the connection has finished connecting. This can only
428 // be false for TCP connections.
429 bool connected() const { return connected_; }
430
431 // Estimate of the round-trip time over this connection.
432 uint32 rtt() const { return rtt_; }
433
434 size_t sent_total_bytes();
435 size_t sent_bytes_second();
436 size_t recv_total_bytes();
437 size_t recv_bytes_second();
438 sigslot::signal1<Connection*> SignalStateChange;
439
440 // Sent when the connection has decided that it is no longer of value. It
441 // will delete itself immediately after this call.
442 sigslot::signal1<Connection*> SignalDestroyed;
443
444 // The connection can send and receive packets asynchronously. This matches
445 // the interface of AsyncPacketSocket, which may use UDP or TCP under the
446 // covers.
447 virtual int Send(const void* data, size_t size) = 0;
448
449 // Error if Send() returns < 0
450 virtual int GetError() = 0;
451
452 sigslot::signal3<Connection*, const char*, size_t> SignalReadPacket;
453
454 sigslot::signal1<Connection*> SignalReadyToSend;
455
456 // Called when a packet is received on this connection.
457 void OnReadPacket(const char* data, size_t size);
458
459 // Called when the socket is currently able to send.
460 void OnReadyToSend();
461
462 // Called when a connection is determined to be no longer useful to us. We
463 // still keep it around in case the other side wants to use it. But we can
464 // safely stop pinging on it and we can allow it to time out if the other
465 // side stops using it as well.
466 bool pruned() const { return pruned_; }
467 void Prune();
468
469 bool use_candidate_attr() const { return use_candidate_attr_; }
470 void set_use_candidate_attr(bool enable);
471
472 void set_remote_ice_mode(IceMode mode) {
473 remote_ice_mode_ = mode;
474 }
475
476 // Makes the connection go away.
477 void Destroy();
478
479 // Checks that the state of this connection is up-to-date. The argument is
480 // the current time, which is compared against various timeouts.
481 void UpdateState(uint32 now);
482
483 // Called when this connection should try checking writability again.
484 uint32 last_ping_sent() const { return last_ping_sent_; }
485 void Ping(uint32 now);
486
487 // Called whenever a valid ping is received on this connection. This is
488 // public because the connection intercepts the first ping for us.
489 uint32 last_ping_received() const { return last_ping_received_; }
490 void ReceivedPing();
491
492 // Debugging description of this connection
493 std::string ToString() const;
494 std::string ToSensitiveString() const;
495
496 bool reported() const { return reported_; }
497 void set_reported(bool reported) { reported_ = reported;}
498
499 // This flag will be set if this connection is the chosen one for media
500 // transmission. This connection will send STUN ping with USE-CANDIDATE
501 // attribute.
502 sigslot::signal1<Connection*> SignalUseCandidate;
503 // Invoked when Connection receives STUN error response with 487 code.
504 void HandleRoleConflictFromPeer();
505
506 State state() const { return state_; }
507
508 IceMode remote_ice_mode() const { return remote_ice_mode_; }
509
510 protected:
511 // Constructs a new connection to the given remote port.
512 Connection(Port* port, size_t index, const Candidate& candidate);
513
514 // Called back when StunRequestManager has a stun packet to send
515 void OnSendStunPacket(const void* data, size_t size, StunRequest* req);
516
517 // Callbacks from ConnectionRequest
518 void OnConnectionRequestResponse(ConnectionRequest* req,
519 StunMessage* response);
520 void OnConnectionRequestErrorResponse(ConnectionRequest* req,
521 StunMessage* response);
522 void OnConnectionRequestTimeout(ConnectionRequest* req);
523
524 // Changes the state and signals if necessary.
525 void set_read_state(ReadState value);
526 void set_write_state(WriteState value);
527 void set_state(State state);
528 void set_connected(bool value);
529
530 // Checks if this connection is useless, and hence, should be destroyed.
531 void CheckTimeout();
532
533 void OnMessage(talk_base::Message *pmsg);
534
535 Port* port_;
536 size_t local_candidate_index_;
537 Candidate remote_candidate_;
538 ReadState read_state_;
539 WriteState write_state_;
540 bool connected_;
541 bool pruned_;
542 // By default |use_candidate_attr_| flag will be true,
543 // as we will be using agrressive nomination.
544 // But when peer is ice-lite, this flag "must" be initialized to false and
545 // turn on when connection becomes "best connection".
546 bool use_candidate_attr_;
547 IceMode remote_ice_mode_;
548 StunRequestManager requests_;
549 uint32 rtt_;
550 uint32 last_ping_sent_; // last time we sent a ping to the other side
551 uint32 last_ping_received_; // last time we received a ping from the other
552 // side
553 uint32 last_data_received_;
554 uint32 last_ping_response_received_;
555 std::vector<uint32> pings_since_last_response_;
556
557 talk_base::RateTracker recv_rate_tracker_;
558 talk_base::RateTracker send_rate_tracker_;
559
560 private:
561 void MaybeAddPrflxCandidate(ConnectionRequest* request,
562 StunMessage* response);
563
564 bool reported_;
565 State state_;
566
567 friend class Port;
568 friend class ConnectionRequest;
569};
570
571// ProxyConnection defers all the interesting work to the port
572class ProxyConnection : public Connection {
573 public:
574 ProxyConnection(Port* port, size_t index, const Candidate& candidate);
575
576 virtual int Send(const void* data, size_t size);
577 virtual int GetError() { return error_; }
578
579 private:
580 int error_;
581};
582
583} // namespace cricket
584
585#endif // TALK_P2P_BASE_PORT_H_