blob: 92c8338eb5ff186e913f2149120e08e78efc0294 [file] [log] [blame]
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020011#include "p2p/client/basicportallocator.h"
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000012
Taylor Brandstetter0c7e9f52015-12-29 14:14:52 -080013#include <algorithm>
Qingsi Wang10a0e512018-05-16 13:37:03 -070014#include <functional>
Steve Anton6c38cc72017-11-29 10:25:58 -080015#include <set>
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000016#include <string>
17#include <vector>
18
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020019#include "p2p/base/basicpacketsocketfactory.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020020#include "p2p/base/port.h"
21#include "p2p/base/relayport.h"
22#include "p2p/base/stunport.h"
23#include "p2p/base/tcpport.h"
24#include "p2p/base/turnport.h"
25#include "p2p/base/udpport.h"
26#include "rtc_base/checks.h"
27#include "rtc_base/helpers.h"
28#include "rtc_base/logging.h"
Qingsi Wang7fc821d2018-07-12 12:54:53 -070029#include "system_wrappers/include/metrics.h"
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000030
31using rtc::CreateRandomId;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000032
33namespace {
34
35enum {
36 MSG_CONFIG_START,
37 MSG_CONFIG_READY,
38 MSG_ALLOCATE,
39 MSG_ALLOCATION_PHASE,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000040 MSG_SEQUENCEOBJECTS_CREATED,
41 MSG_CONFIG_STOP,
42};
43
44const int PHASE_UDP = 0;
45const int PHASE_RELAY = 1;
46const int PHASE_TCP = 2;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000047
deadbeef1c5e6d02017-09-15 17:46:56 -070048const int kNumPhases = 3;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000049
zhihuang696f8ca2017-06-27 15:11:24 -070050// Gets protocol priority: UDP > TCP > SSLTCP == TLS.
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -070051int GetProtocolPriority(cricket::ProtocolType protocol) {
52 switch (protocol) {
53 case cricket::PROTO_UDP:
54 return 2;
55 case cricket::PROTO_TCP:
56 return 1;
57 case cricket::PROTO_SSLTCP:
zhihuang696f8ca2017-06-27 15:11:24 -070058 case cricket::PROTO_TLS:
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -070059 return 0;
60 default:
nisseeb4ca4e2017-01-12 02:24:27 -080061 RTC_NOTREACHED();
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -070062 return 0;
63 }
64}
65// Gets address family priority: IPv6 > IPv4 > Unspecified.
66int GetAddressFamilyPriority(int ip_family) {
67 switch (ip_family) {
68 case AF_INET6:
69 return 2;
70 case AF_INET:
71 return 1;
72 default:
nisseeb4ca4e2017-01-12 02:24:27 -080073 RTC_NOTREACHED();
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -070074 return 0;
75 }
76}
77
78// Returns positive if a is better, negative if b is better, and 0 otherwise.
79int ComparePort(const cricket::Port* a, const cricket::Port* b) {
80 int a_protocol = GetProtocolPriority(a->GetProtocol());
81 int b_protocol = GetProtocolPriority(b->GetProtocol());
82 int cmp_protocol = a_protocol - b_protocol;
83 if (cmp_protocol != 0) {
84 return cmp_protocol;
85 }
86
87 int a_family = GetAddressFamilyPriority(a->Network()->GetBestIP().family());
88 int b_family = GetAddressFamilyPriority(b->Network()->GetBestIP().family());
89 return a_family - b_family;
90}
91
Qingsi Wang10a0e512018-05-16 13:37:03 -070092struct NetworkFilter {
93 using Predicate = std::function<bool(rtc::Network*)>;
94 NetworkFilter(Predicate pred, const std::string& description)
95 : pred(pred), description(description) {}
96 Predicate pred;
97 const std::string description;
98};
99
100using NetworkList = rtc::NetworkManager::NetworkList;
101void FilterNetworks(NetworkList* networks, NetworkFilter filter) {
102 auto start_to_remove =
103 std::remove_if(networks->begin(), networks->end(), filter.pred);
104 if (start_to_remove == networks->end()) {
105 return;
106 }
107 RTC_LOG(INFO) << "Filtered out " << filter.description << " networks:";
108 for (auto it = start_to_remove; it != networks->end(); ++it) {
109 RTC_LOG(INFO) << (*it)->ToString();
110 }
111 networks->erase(start_to_remove, networks->end());
112}
113
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000114} // namespace
115
116namespace cricket {
Peter Boström0c4e06b2015-10-07 12:23:21 +0200117const uint32_t DISABLE_ALL_PHASES =
honghaizf421bdc2015-07-17 16:21:55 -0700118 PORTALLOCATOR_DISABLE_UDP | PORTALLOCATOR_DISABLE_TCP |
119 PORTALLOCATOR_DISABLE_STUN | PORTALLOCATOR_DISABLE_RELAY;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000120
121// BasicPortAllocator
Jonas Orelandbdcee282017-10-10 14:01:40 +0200122BasicPortAllocator::BasicPortAllocator(
123 rtc::NetworkManager* network_manager,
124 rtc::PacketSocketFactory* socket_factory,
Jonas Oreland202994c2017-12-18 12:10:43 +0100125 webrtc::TurnCustomizer* customizer,
126 RelayPortFactoryInterface* relay_port_factory)
maxmorine9ef9072017-08-29 04:49:00 -0700127 : network_manager_(network_manager), socket_factory_(socket_factory) {
Jonas Oreland202994c2017-12-18 12:10:43 +0100128 InitRelayPortFactory(relay_port_factory);
129 RTC_DCHECK(relay_port_factory_ != nullptr);
nisseede5da42017-01-12 05:15:36 -0800130 RTC_DCHECK(network_manager_ != nullptr);
131 RTC_DCHECK(socket_factory_ != nullptr);
Yves Gerey665174f2018-06-19 15:03:05 +0200132 SetConfiguration(ServerAddresses(), std::vector<RelayServerConfig>(), 0,
133 false, customizer);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000134 Construct();
135}
136
Yves Gerey665174f2018-06-19 15:03:05 +0200137BasicPortAllocator::BasicPortAllocator(rtc::NetworkManager* network_manager)
maxmorine9ef9072017-08-29 04:49:00 -0700138 : network_manager_(network_manager), socket_factory_(nullptr) {
Jonas Oreland202994c2017-12-18 12:10:43 +0100139 InitRelayPortFactory(nullptr);
140 RTC_DCHECK(relay_port_factory_ != nullptr);
nisseede5da42017-01-12 05:15:36 -0800141 RTC_DCHECK(network_manager_ != nullptr);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000142 Construct();
143}
144
Yves Gerey665174f2018-06-19 15:03:05 +0200145BasicPortAllocator::BasicPortAllocator(rtc::NetworkManager* network_manager,
146 rtc::PacketSocketFactory* socket_factory,
147 const ServerAddresses& stun_servers)
maxmorine9ef9072017-08-29 04:49:00 -0700148 : network_manager_(network_manager), socket_factory_(socket_factory) {
Jonas Oreland202994c2017-12-18 12:10:43 +0100149 InitRelayPortFactory(nullptr);
150 RTC_DCHECK(relay_port_factory_ != nullptr);
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000151 RTC_DCHECK(socket_factory_ != NULL);
Jonas Orelandbdcee282017-10-10 14:01:40 +0200152 SetConfiguration(stun_servers, std::vector<RelayServerConfig>(), 0, false,
153 nullptr);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000154 Construct();
155}
156
157BasicPortAllocator::BasicPortAllocator(
158 rtc::NetworkManager* network_manager,
159 const ServerAddresses& stun_servers,
160 const rtc::SocketAddress& relay_address_udp,
161 const rtc::SocketAddress& relay_address_tcp,
162 const rtc::SocketAddress& relay_address_ssl)
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000163 : network_manager_(network_manager), socket_factory_(NULL) {
Jonas Oreland202994c2017-12-18 12:10:43 +0100164 InitRelayPortFactory(nullptr);
165 RTC_DCHECK(relay_port_factory_ != nullptr);
166 RTC_DCHECK(network_manager_ != nullptr);
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700167 std::vector<RelayServerConfig> turn_servers;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000168 RelayServerConfig config(RELAY_GTURN);
deadbeef653b8e02015-11-11 12:55:10 -0800169 if (!relay_address_udp.IsNil()) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000170 config.ports.push_back(ProtocolAddress(relay_address_udp, PROTO_UDP));
deadbeef653b8e02015-11-11 12:55:10 -0800171 }
172 if (!relay_address_tcp.IsNil()) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000173 config.ports.push_back(ProtocolAddress(relay_address_tcp, PROTO_TCP));
deadbeef653b8e02015-11-11 12:55:10 -0800174 }
175 if (!relay_address_ssl.IsNil()) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000176 config.ports.push_back(ProtocolAddress(relay_address_ssl, PROTO_SSLTCP));
deadbeef653b8e02015-11-11 12:55:10 -0800177 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000178
deadbeef653b8e02015-11-11 12:55:10 -0800179 if (!config.ports.empty()) {
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700180 turn_servers.push_back(config);
deadbeef653b8e02015-11-11 12:55:10 -0800181 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000182
Jonas Orelandbdcee282017-10-10 14:01:40 +0200183 SetConfiguration(stun_servers, turn_servers, 0, false, nullptr);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000184 Construct();
185}
186
187void BasicPortAllocator::Construct() {
188 allow_tcp_listen_ = true;
189}
190
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700191void BasicPortAllocator::OnIceRegathering(PortAllocatorSession* session,
192 IceRegatheringReason reason) {
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700193 // If the session has not been taken by an active channel, do not report the
194 // metric.
195 for (auto& allocator_session : pooled_sessions()) {
196 if (allocator_session.get() == session) {
197 return;
198 }
199 }
200
Qingsi Wang7fc821d2018-07-12 12:54:53 -0700201 RTC_HISTOGRAM_ENUMERATION("WebRTC.PeerConnection.IceRegatheringReason",
202 static_cast<int>(reason),
203 static_cast<int>(IceRegatheringReason::MAX_VALUE));
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700204}
205
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000206BasicPortAllocator::~BasicPortAllocator() {
Qingsi Wanga2d60672018-04-11 16:57:45 -0700207 CheckRunOnValidThreadIfInitialized();
deadbeef42a42632017-03-10 15:18:00 -0800208 // Our created port allocator sessions depend on us, so destroy our remaining
209 // pooled sessions before anything else.
210 DiscardCandidatePool();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000211}
212
Steve Anton7995d8c2017-10-30 16:23:38 -0700213void BasicPortAllocator::SetNetworkIgnoreMask(int network_ignore_mask) {
214 // TODO(phoglund): implement support for other types than loopback.
215 // See https://code.google.com/p/webrtc/issues/detail?id=4288.
216 // Then remove set_network_ignore_list from NetworkManager.
Qingsi Wanga2d60672018-04-11 16:57:45 -0700217 CheckRunOnValidThreadIfInitialized();
Steve Anton7995d8c2017-10-30 16:23:38 -0700218 network_ignore_mask_ = network_ignore_mask;
219}
220
deadbeefc5d0d952015-07-16 10:22:21 -0700221PortAllocatorSession* BasicPortAllocator::CreateSessionInternal(
Yves Gerey665174f2018-06-19 15:03:05 +0200222 const std::string& content_name,
223 int component,
224 const std::string& ice_ufrag,
225 const std::string& ice_pwd) {
Qingsi Wanga2d60672018-04-11 16:57:45 -0700226 CheckRunOnValidThreadAndInitialized();
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700227 PortAllocatorSession* session = new BasicPortAllocatorSession(
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000228 this, content_name, component, ice_ufrag, ice_pwd);
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700229 session->SignalIceRegathering.connect(this,
230 &BasicPortAllocator::OnIceRegathering);
231 return session;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000232}
233
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700234void BasicPortAllocator::AddTurnServer(const RelayServerConfig& turn_server) {
Qingsi Wanga2d60672018-04-11 16:57:45 -0700235 CheckRunOnValidThreadAndInitialized();
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700236 std::vector<RelayServerConfig> new_turn_servers = turn_servers();
237 new_turn_servers.push_back(turn_server);
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700238 SetConfiguration(stun_servers(), new_turn_servers, candidate_pool_size(),
Jonas Orelandbdcee282017-10-10 14:01:40 +0200239 prune_turn_ports(), turn_customizer());
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700240}
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000241
Jonas Oreland202994c2017-12-18 12:10:43 +0100242void BasicPortAllocator::InitRelayPortFactory(
243 RelayPortFactoryInterface* relay_port_factory) {
244 if (relay_port_factory != nullptr) {
245 relay_port_factory_ = relay_port_factory;
246 } else {
247 default_relay_port_factory_.reset(new TurnPortFactory());
248 relay_port_factory_ = default_relay_port_factory_.get();
249 }
250}
251
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000252// BasicPortAllocatorSession
253BasicPortAllocatorSession::BasicPortAllocatorSession(
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700254 BasicPortAllocator* allocator,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000255 const std::string& content_name,
256 int component,
257 const std::string& ice_ufrag,
258 const std::string& ice_pwd)
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700259 : PortAllocatorSession(content_name,
260 component,
261 ice_ufrag,
262 ice_pwd,
263 allocator->flags()),
264 allocator_(allocator),
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000265 network_thread_(NULL),
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000266 socket_factory_(allocator->socket_factory()),
267 allocation_started_(false),
268 network_manager_started_(false),
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700269 allocation_sequences_created_(false),
270 prune_turn_ports_(allocator->prune_turn_ports()) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000271 allocator_->network_manager()->SignalNetworksChanged.connect(
272 this, &BasicPortAllocatorSession::OnNetworksChanged);
273 allocator_->network_manager()->StartUpdating();
274}
275
276BasicPortAllocatorSession::~BasicPortAllocatorSession() {
277 allocator_->network_manager()->StopUpdating();
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000278 if (network_thread_ != NULL)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000279 network_thread_->Clear(this);
280
Peter Boström0c4e06b2015-10-07 12:23:21 +0200281 for (uint32_t i = 0; i < sequences_.size(); ++i) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000282 // AllocationSequence should clear it's map entry for turn ports before
283 // ports are destroyed.
284 sequences_[i]->Clear();
285 }
286
287 std::vector<PortData>::iterator it;
288 for (it = ports_.begin(); it != ports_.end(); it++)
289 delete it->port();
290
Peter Boström0c4e06b2015-10-07 12:23:21 +0200291 for (uint32_t i = 0; i < configs_.size(); ++i)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000292 delete configs_[i];
293
Peter Boström0c4e06b2015-10-07 12:23:21 +0200294 for (uint32_t i = 0; i < sequences_.size(); ++i)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000295 delete sequences_[i];
296}
297
Steve Anton7995d8c2017-10-30 16:23:38 -0700298BasicPortAllocator* BasicPortAllocatorSession::allocator() {
299 return allocator_;
300}
301
Taylor Brandstetter417eebe2016-05-23 16:02:19 -0700302void BasicPortAllocatorSession::SetCandidateFilter(uint32_t filter) {
303 if (filter == candidate_filter_) {
304 return;
305 }
306 // We assume the filter will only change from "ALL" to something else.
307 RTC_DCHECK(candidate_filter_ == CF_ALL);
308 candidate_filter_ = filter;
309 for (PortData& port : ports_) {
310 if (!port.has_pairable_candidate()) {
311 continue;
312 }
313 const auto& candidates = port.port()->Candidates();
314 // Setting a filter may cause a ready port to become non-ready
315 // if it no longer has any pairable candidates.
316 if (!std::any_of(candidates.begin(), candidates.end(),
317 [this, &port](const Candidate& candidate) {
318 return CandidatePairable(candidate, port.port());
319 })) {
320 port.set_has_pairable_candidate(false);
321 }
322 }
323}
324
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000325void BasicPortAllocatorSession::StartGettingPorts() {
326 network_thread_ = rtc::Thread::Current();
Honghai Zhangd8f6fc42016-07-01 17:31:12 -0700327 state_ = SessionState::GATHERING;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000328 if (!socket_factory_) {
329 owned_socket_factory_.reset(
330 new rtc::BasicPacketSocketFactory(network_thread_));
331 socket_factory_ = owned_socket_factory_.get();
332 }
333
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -0700334 network_thread_->Post(RTC_FROM_HERE, this, MSG_CONFIG_START);
Honghai Zhangd78ecf72016-07-01 14:40:40 -0700335
Mirko Bonadei675513b2017-11-09 11:09:25 +0100336 RTC_LOG(LS_INFO) << "Start getting ports with prune_turn_ports "
337 << (prune_turn_ports_ ? "enabled" : "disabled");
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000338}
339
340void BasicPortAllocatorSession::StopGettingPorts() {
nisseede5da42017-01-12 05:15:36 -0800341 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
honghaiz98db68f2015-09-29 07:58:17 -0700342 ClearGettingPorts();
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700343 // Note: this must be called after ClearGettingPorts because both may set the
344 // session state and we should set the state to STOPPED.
Honghai Zhangd8f6fc42016-07-01 17:31:12 -0700345 state_ = SessionState::STOPPED;
honghaiz98db68f2015-09-29 07:58:17 -0700346}
347
348void BasicPortAllocatorSession::ClearGettingPorts() {
nisseede5da42017-01-12 05:15:36 -0800349 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000350 network_thread_->Clear(this, MSG_ALLOCATE);
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700351 for (uint32_t i = 0; i < sequences_.size(); ++i) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000352 sequences_[i]->Stop();
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700353 }
deadbeefb60a8192016-08-24 15:15:00 -0700354 network_thread_->Post(RTC_FROM_HERE, this, MSG_CONFIG_STOP);
Honghai Zhangd8f6fc42016-07-01 17:31:12 -0700355 state_ = SessionState::CLEARED;
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700356}
357
Steve Anton7995d8c2017-10-30 16:23:38 -0700358bool BasicPortAllocatorSession::IsGettingPorts() {
359 return state_ == SessionState::GATHERING;
360}
361
362bool BasicPortAllocatorSession::IsCleared() const {
363 return state_ == SessionState::CLEARED;
364}
365
366bool BasicPortAllocatorSession::IsStopped() const {
367 return state_ == SessionState::STOPPED;
368}
369
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700370std::vector<rtc::Network*> BasicPortAllocatorSession::GetFailedNetworks() {
371 std::vector<rtc::Network*> networks = GetNetworks();
372
373 // A network interface may have both IPv4 and IPv6 networks. Only if
374 // neither of the networks has any connections, the network interface
375 // is considered failed and need to be regathered on.
376 std::set<std::string> networks_with_connection;
377 for (const PortData& data : ports_) {
378 Port* port = data.port();
379 if (!port->connections().empty()) {
380 networks_with_connection.insert(port->Network()->name());
381 }
382 }
383
384 networks.erase(
385 std::remove_if(networks.begin(), networks.end(),
386 [networks_with_connection](rtc::Network* network) {
387 // If a network does not have any connection, it is
388 // considered failed.
389 return networks_with_connection.find(network->name()) !=
390 networks_with_connection.end();
391 }),
392 networks.end());
393 return networks;
394}
395
396void BasicPortAllocatorSession::RegatherOnFailedNetworks() {
397 // Find the list of networks that have no connection.
398 std::vector<rtc::Network*> failed_networks = GetFailedNetworks();
399 if (failed_networks.empty()) {
400 return;
401 }
402
Mirko Bonadei675513b2017-11-09 11:09:25 +0100403 RTC_LOG(LS_INFO) << "Regather candidates on failed networks";
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700404
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700405 // Mark a sequence as "network failed" if its network is in the list of failed
406 // networks, so that it won't be considered as equivalent when the session
407 // regathers ports and candidates.
408 for (AllocationSequence* sequence : sequences_) {
409 if (!sequence->network_failed() &&
410 std::find(failed_networks.begin(), failed_networks.end(),
411 sequence->network()) != failed_networks.end()) {
412 sequence->set_network_failed();
413 }
414 }
Steve Anton300bf8e2017-07-14 10:13:10 -0700415
416 bool disable_equivalent_phases = true;
417 Regather(failed_networks, disable_equivalent_phases,
418 IceRegatheringReason::NETWORK_FAILURE);
419}
420
421void BasicPortAllocatorSession::RegatherOnAllNetworks() {
422 std::vector<rtc::Network*> networks = GetNetworks();
423 if (networks.empty()) {
424 return;
425 }
426
Mirko Bonadei675513b2017-11-09 11:09:25 +0100427 RTC_LOG(LS_INFO) << "Regather candidates on all networks";
Steve Anton300bf8e2017-07-14 10:13:10 -0700428
429 // We expect to generate candidates that are equivalent to what we have now.
430 // Force DoAllocate to generate them instead of skipping.
431 bool disable_equivalent_phases = false;
432 Regather(networks, disable_equivalent_phases,
433 IceRegatheringReason::OCCASIONAL_REFRESH);
434}
435
436void BasicPortAllocatorSession::Regather(
437 const std::vector<rtc::Network*>& networks,
438 bool disable_equivalent_phases,
439 IceRegatheringReason reason) {
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700440 // Remove ports from being used locally and send signaling to remove
441 // the candidates on the remote side.
Steve Anton300bf8e2017-07-14 10:13:10 -0700442 std::vector<PortData*> ports_to_prune = GetUnprunedPorts(networks);
Honghai Zhangc67e0f52016-09-19 16:57:37 -0700443 if (!ports_to_prune.empty()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100444 RTC_LOG(LS_INFO) << "Prune " << ports_to_prune.size() << " ports";
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000445 PrunePortsAndRemoveCandidates(ports_to_prune);
Honghai Zhangc67e0f52016-09-19 16:57:37 -0700446 }
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700447
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700448 if (allocation_started_ && network_manager_started_ && !IsStopped()) {
Steve Anton300bf8e2017-07-14 10:13:10 -0700449 SignalIceRegathering(this, reason);
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700450
Steve Anton300bf8e2017-07-14 10:13:10 -0700451 DoAllocate(disable_equivalent_phases);
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700452 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000453}
454
Qingsi Wangdb53f8e2018-02-20 14:45:49 -0800455void BasicPortAllocatorSession::SetStunKeepaliveIntervalForReadyPorts(
Danil Chapovalov00c71832018-06-15 15:58:38 +0200456 const absl::optional<int>& stun_keepalive_interval) {
Qingsi Wangdb53f8e2018-02-20 14:45:49 -0800457 auto ports = ReadyPorts();
458 for (PortInterface* port : ports) {
Qingsi Wang4ff54432018-03-01 18:25:20 -0800459 // The port type and protocol can be used to identify different subclasses
460 // of Port in the current implementation. Note that a TCPPort has the type
461 // LOCAL_PORT_TYPE but uses the protocol PROTO_TCP.
462 if (port->Type() == STUN_PORT_TYPE ||
463 (port->Type() == LOCAL_PORT_TYPE && port->GetProtocol() == PROTO_UDP)) {
Qingsi Wangdb53f8e2018-02-20 14:45:49 -0800464 static_cast<UDPPort*>(port)->set_stun_keepalive_delay(
465 stun_keepalive_interval);
466 }
467 }
468}
469
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700470std::vector<PortInterface*> BasicPortAllocatorSession::ReadyPorts() const {
471 std::vector<PortInterface*> ret;
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700472 for (const PortData& data : ports_) {
473 if (data.ready()) {
474 ret.push_back(data.port());
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700475 }
476 }
477 return ret;
478}
479
480std::vector<Candidate> BasicPortAllocatorSession::ReadyCandidates() const {
481 std::vector<Candidate> candidates;
482 for (const PortData& data : ports_) {
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700483 if (!data.ready()) {
484 continue;
485 }
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700486 GetCandidatesFromPort(data, &candidates);
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700487 }
488 return candidates;
489}
490
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700491void BasicPortAllocatorSession::GetCandidatesFromPort(
492 const PortData& data,
493 std::vector<Candidate>* candidates) const {
494 RTC_CHECK(candidates != nullptr);
495 for (const Candidate& candidate : data.port()->Candidates()) {
496 if (!CheckCandidateFilter(candidate)) {
497 continue;
498 }
Qingsi Wangb49b8f12018-09-16 17:48:10 -0700499 auto sanitized_candidate = SanitizeCandidate(candidate);
500 candidates->push_back(sanitized_candidate);
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700501 }
502}
503
Qingsi Wangb49b8f12018-09-16 17:48:10 -0700504Candidate BasicPortAllocatorSession::SanitizeCandidate(
Taylor Brandstetter417eebe2016-05-23 16:02:19 -0700505 const Candidate& c) const {
506 Candidate copy = c;
Qingsi Wangb49b8f12018-09-16 17:48:10 -0700507 // If the candidate has a generated hostname, we need to obfuscate its IP
508 // address when signaling this candidate.
509 if (!c.address().hostname().empty() && !c.address().IsUnresolvedIP()) {
510 rtc::SocketAddress hostname_only_addr(c.address().hostname(),
511 c.address().port());
512 copy.set_address(hostname_only_addr);
513 }
Taylor Brandstetter417eebe2016-05-23 16:02:19 -0700514 // If adapter enumeration is disabled or host candidates are disabled,
515 // clear the raddr of STUN candidates to avoid local address leakage.
516 bool filter_stun_related_address =
517 ((flags() & PORTALLOCATOR_DISABLE_ADAPTER_ENUMERATION) &&
518 (flags() & PORTALLOCATOR_DISABLE_DEFAULT_LOCAL_CANDIDATE)) ||
519 !(candidate_filter_ & CF_HOST);
520 // If the candidate filter doesn't allow reflexive addresses, empty TURN raddr
521 // to avoid reflexive address leakage.
522 bool filter_turn_related_address = !(candidate_filter_ & CF_REFLEXIVE);
523 if ((c.type() == STUN_PORT_TYPE && filter_stun_related_address) ||
524 (c.type() == RELAY_PORT_TYPE && filter_turn_related_address)) {
525 copy.set_related_address(
526 rtc::EmptySocketAddressWithFamily(copy.address().family()));
527 }
528 return copy;
529}
530
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700531bool BasicPortAllocatorSession::CandidatesAllocationDone() const {
532 // Done only if all required AllocationSequence objects
533 // are created.
534 if (!allocation_sequences_created_) {
535 return false;
536 }
537
538 // Check that all port allocation sequences are complete (not running).
539 if (std::any_of(sequences_.begin(), sequences_.end(),
540 [](const AllocationSequence* sequence) {
541 return sequence->state() == AllocationSequence::kRunning;
542 })) {
543 return false;
544 }
545
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700546 // If all allocated ports are no longer gathering, session must have got all
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700547 // expected candidates. Session will trigger candidates allocation complete
548 // signal.
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700549 return std::none_of(ports_.begin(), ports_.end(),
550 [](const PortData& port) { return port.inprogress(); });
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700551}
552
Yves Gerey665174f2018-06-19 15:03:05 +0200553void BasicPortAllocatorSession::OnMessage(rtc::Message* message) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000554 switch (message->message_id) {
Yves Gerey665174f2018-06-19 15:03:05 +0200555 case MSG_CONFIG_START:
556 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
557 GetPortConfigurations();
558 break;
559 case MSG_CONFIG_READY:
560 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
561 OnConfigReady(static_cast<PortConfiguration*>(message->pdata));
562 break;
563 case MSG_ALLOCATE:
564 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
565 OnAllocate();
566 break;
567 case MSG_SEQUENCEOBJECTS_CREATED:
568 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
569 OnAllocationSequenceObjectsCreated();
570 break;
571 case MSG_CONFIG_STOP:
572 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
573 OnConfigStop();
574 break;
575 default:
576 RTC_NOTREACHED();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000577 }
578}
579
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700580void BasicPortAllocatorSession::UpdateIceParametersInternal() {
581 for (PortData& port : ports_) {
582 port.port()->set_content_name(content_name());
583 port.port()->SetIceParameters(component(), ice_ufrag(), ice_pwd());
584 }
585}
586
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000587void BasicPortAllocatorSession::GetPortConfigurations() {
Yves Gerey665174f2018-06-19 15:03:05 +0200588 PortConfiguration* config =
589 new PortConfiguration(allocator_->stun_servers(), username(), password());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000590
deadbeef653b8e02015-11-11 12:55:10 -0800591 for (const RelayServerConfig& turn_server : allocator_->turn_servers()) {
592 config->AddRelay(turn_server);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000593 }
594 ConfigReady(config);
595}
596
597void BasicPortAllocatorSession::ConfigReady(PortConfiguration* config) {
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -0700598 network_thread_->Post(RTC_FROM_HERE, this, MSG_CONFIG_READY, config);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000599}
600
601// Adds a configuration to the list.
602void BasicPortAllocatorSession::OnConfigReady(PortConfiguration* config) {
deadbeef653b8e02015-11-11 12:55:10 -0800603 if (config) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000604 configs_.push_back(config);
deadbeef653b8e02015-11-11 12:55:10 -0800605 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000606
607 AllocatePorts();
608}
609
610void BasicPortAllocatorSession::OnConfigStop() {
nisseede5da42017-01-12 05:15:36 -0800611 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000612
613 // If any of the allocated ports have not completed the candidates allocation,
614 // mark those as error. Since session doesn't need any new candidates
615 // at this stage of the allocation, it's safe to discard any new candidates.
616 bool send_signal = false;
Yves Gerey665174f2018-06-19 15:03:05 +0200617 for (std::vector<PortData>::iterator it = ports_.begin(); it != ports_.end();
618 ++it) {
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700619 if (it->inprogress()) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000620 // Updating port state to error, which didn't finish allocating candidates
621 // yet.
622 it->set_error();
623 send_signal = true;
624 }
625 }
626
627 // Did we stop any running sequences?
628 for (std::vector<AllocationSequence*>::iterator it = sequences_.begin();
629 it != sequences_.end() && !send_signal; ++it) {
630 if ((*it)->state() == AllocationSequence::kStopped) {
631 send_signal = true;
632 }
633 }
634
635 // If we stopped anything that was running, send a done signal now.
636 if (send_signal) {
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000637 MaybeSignalCandidatesAllocationDone();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000638 }
639}
640
641void BasicPortAllocatorSession::AllocatePorts() {
nisseede5da42017-01-12 05:15:36 -0800642 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -0700643 network_thread_->Post(RTC_FROM_HERE, this, MSG_ALLOCATE);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000644}
645
646void BasicPortAllocatorSession::OnAllocate() {
Steve Anton300bf8e2017-07-14 10:13:10 -0700647 if (network_manager_started_ && !IsStopped()) {
648 bool disable_equivalent_phases = true;
649 DoAllocate(disable_equivalent_phases);
650 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000651
652 allocation_started_ = true;
653}
654
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700655std::vector<rtc::Network*> BasicPortAllocatorSession::GetNetworks() {
656 std::vector<rtc::Network*> networks;
honghaiz8c404fa2015-09-28 07:59:43 -0700657 rtc::NetworkManager* network_manager = allocator_->network_manager();
nisseede5da42017-01-12 05:15:36 -0800658 RTC_DCHECK(network_manager != nullptr);
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700659 // If the network permission state is BLOCKED, we just act as if the flag has
660 // been passed in.
honghaiz8c404fa2015-09-28 07:59:43 -0700661 if (network_manager->enumeration_permission() ==
guoweisea1012b2015-08-21 09:06:28 -0700662 rtc::NetworkManager::ENUMERATION_BLOCKED) {
Guo-wei Shieh47872ec2015-08-19 10:32:46 -0700663 set_flags(flags() | PORTALLOCATOR_DISABLE_ADAPTER_ENUMERATION);
664 }
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000665 // If the adapter enumeration is disabled, we'll just bind to any address
666 // instead of specific NIC. This is to ensure the same routing for http
667 // traffic by OS is also used here to avoid any local or public IP leakage
668 // during stun process.
669 if (flags() & PORTALLOCATOR_DISABLE_ADAPTER_ENUMERATION) {
670 network_manager->GetAnyAddressNetworks(&networks);
671 } else {
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700672 network_manager->GetNetworks(&networks);
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000673 // If network enumeration fails, use the ANY address as a fallback, so we
674 // can at least try gathering candidates using the default route chosen by
675 // the OS. Or, if the PORTALLOCATOR_ENABLE_ANY_ADDRESS_PORTS flag is
676 // set, we'll use ANY address candidates either way.
677 if (networks.empty() || flags() & PORTALLOCATOR_ENABLE_ANY_ADDRESS_PORTS) {
678 network_manager->GetAnyAddressNetworks(&networks);
679 }
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +0000680 }
Daniel Lazarenko2870b0a2018-01-25 10:30:22 +0100681 // Filter out link-local networks if needed.
682 if (flags() & PORTALLOCATOR_DISABLE_LINK_LOCAL_NETWORKS) {
Qingsi Wang10a0e512018-05-16 13:37:03 -0700683 NetworkFilter link_local_filter(
684 [](rtc::Network* network) { return IPIsLinkLocal(network->prefix()); },
685 "link-local");
686 FilterNetworks(&networks, link_local_filter);
Daniel Lazarenko2870b0a2018-01-25 10:30:22 +0100687 }
deadbeef3427f532017-07-26 16:09:33 -0700688 // Do some more filtering, depending on the network ignore mask and "disable
689 // costly networks" flag.
Qingsi Wang10a0e512018-05-16 13:37:03 -0700690 NetworkFilter ignored_filter(
691 [this](rtc::Network* network) {
692 return allocator_->network_ignore_mask() & network->type();
693 },
694 "ignored");
695 FilterNetworks(&networks, ignored_filter);
honghaiz60347052016-05-31 18:29:12 -0700696 if (flags() & PORTALLOCATOR_DISABLE_COSTLY_NETWORKS) {
697 uint16_t lowest_cost = rtc::kNetworkCostMax;
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700698 for (rtc::Network* network : networks) {
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000699 // Don't determine the lowest cost from a link-local network.
700 // On iOS, a device connected to the computer will get a link-local
701 // network for communicating with the computer, however this network can't
702 // be used to connect to a peer outside the network.
703 if (rtc::IPIsLinkLocal(network->GetBestIP())) {
Yuwei Huangb181f712018-01-22 17:01:28 -0800704 continue;
705 }
honghaiz60347052016-05-31 18:29:12 -0700706 lowest_cost = std::min<uint16_t>(lowest_cost, network->GetCost());
707 }
Qingsi Wang10a0e512018-05-16 13:37:03 -0700708 NetworkFilter costly_filter(
709 [lowest_cost](rtc::Network* network) {
710 return network->GetCost() > lowest_cost + rtc::kNetworkCostLow;
711 },
712 "costly");
713 FilterNetworks(&networks, costly_filter);
honghaiz60347052016-05-31 18:29:12 -0700714 }
deadbeef3427f532017-07-26 16:09:33 -0700715 // Lastly, if we have a limit for the number of IPv6 network interfaces (by
716 // default, it's 5), remove networks to ensure that limit is satisfied.
717 //
718 // TODO(deadbeef): Instead of just taking the first N arbitrary IPv6
719 // networks, we could try to choose a set that's "most likely to work". It's
720 // hard to define what that means though; it's not just "lowest cost".
721 // Alternatively, we could just focus on making our ICE pinging logic smarter
722 // such that this filtering isn't necessary in the first place.
723 int ipv6_networks = 0;
724 for (auto it = networks.begin(); it != networks.end();) {
725 if ((*it)->prefix().family() == AF_INET6) {
726 if (ipv6_networks >= allocator_->max_ipv6_networks()) {
727 it = networks.erase(it);
728 continue;
729 } else {
730 ++ipv6_networks;
731 }
732 }
733 ++it;
734 }
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700735 return networks;
honghaiz8c404fa2015-09-28 07:59:43 -0700736}
737
738// For each network, see if we have a sequence that covers it already. If not,
739// create a new sequence to create the appropriate ports.
Steve Anton300bf8e2017-07-14 10:13:10 -0700740void BasicPortAllocatorSession::DoAllocate(bool disable_equivalent) {
honghaiz8c404fa2015-09-28 07:59:43 -0700741 bool done_signal_needed = false;
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700742 std::vector<rtc::Network*> networks = GetNetworks();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000743 if (networks.empty()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100744 RTC_LOG(LS_WARNING)
745 << "Machine has no networks; no ports will be allocated";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000746 done_signal_needed = true;
747 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100748 RTC_LOG(LS_INFO) << "Allocate ports on " << networks.size() << " networks";
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700749 PortConfiguration* config = configs_.empty() ? nullptr : configs_.back();
Peter Boström0c4e06b2015-10-07 12:23:21 +0200750 for (uint32_t i = 0; i < networks.size(); ++i) {
Peter Boström0c4e06b2015-10-07 12:23:21 +0200751 uint32_t sequence_flags = flags();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000752 if ((sequence_flags & DISABLE_ALL_PHASES) == DISABLE_ALL_PHASES) {
753 // If all the ports are disabled we should just fire the allocation
754 // done event and return.
755 done_signal_needed = true;
756 break;
757 }
758
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000759 if (!config || config->relays.empty()) {
760 // No relay ports specified in this config.
761 sequence_flags |= PORTALLOCATOR_DISABLE_RELAY;
762 }
763
764 if (!(sequence_flags & PORTALLOCATOR_ENABLE_IPV6) &&
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000765 networks[i]->GetBestIP().family() == AF_INET6) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000766 // Skip IPv6 networks unless the flag's been set.
767 continue;
768 }
769
zhihuangb09b3f92017-03-07 14:40:51 -0800770 if (!(sequence_flags & PORTALLOCATOR_ENABLE_IPV6_ON_WIFI) &&
771 networks[i]->GetBestIP().family() == AF_INET6 &&
772 networks[i]->type() == rtc::ADAPTER_TYPE_WIFI) {
773 // Skip IPv6 Wi-Fi networks unless the flag's been set.
774 continue;
775 }
776
Steve Anton300bf8e2017-07-14 10:13:10 -0700777 if (disable_equivalent) {
778 // Disable phases that would only create ports equivalent to
779 // ones that we have already made.
780 DisableEquivalentPhases(networks[i], config, &sequence_flags);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000781
Steve Anton300bf8e2017-07-14 10:13:10 -0700782 if ((sequence_flags & DISABLE_ALL_PHASES) == DISABLE_ALL_PHASES) {
783 // New AllocationSequence would have nothing to do, so don't make it.
784 continue;
785 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000786 }
787
788 AllocationSequence* sequence =
789 new AllocationSequence(this, networks[i], config, sequence_flags);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000790 sequence->SignalPortAllocationComplete.connect(
791 this, &BasicPortAllocatorSession::OnPortAllocationComplete);
Honghai Zhang5048f572016-08-23 15:47:33 -0700792 sequence->Init();
793 sequence->Start();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000794 sequences_.push_back(sequence);
Honghai Zhang5048f572016-08-23 15:47:33 -0700795 done_signal_needed = true;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000796 }
797 }
798 if (done_signal_needed) {
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -0700799 network_thread_->Post(RTC_FROM_HERE, this, MSG_SEQUENCEOBJECTS_CREATED);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000800 }
801}
802
803void BasicPortAllocatorSession::OnNetworksChanged() {
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700804 std::vector<rtc::Network*> networks = GetNetworks();
805 std::vector<rtc::Network*> failed_networks;
honghaiz8c404fa2015-09-28 07:59:43 -0700806 for (AllocationSequence* sequence : sequences_) {
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700807 // Mark the sequence as "network failed" if its network is not in
honghaiz8c404fa2015-09-28 07:59:43 -0700808 // |networks|.
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700809 if (!sequence->network_failed() &&
honghaiz8c404fa2015-09-28 07:59:43 -0700810 std::find(networks.begin(), networks.end(), sequence->network()) ==
811 networks.end()) {
Honghai Zhang5622c5e2016-07-01 13:59:29 -0700812 sequence->OnNetworkFailed();
813 failed_networks.push_back(sequence->network());
honghaiz8c404fa2015-09-28 07:59:43 -0700814 }
815 }
Honghai Zhangc67e0f52016-09-19 16:57:37 -0700816 std::vector<PortData*> ports_to_prune = GetUnprunedPorts(failed_networks);
817 if (!ports_to_prune.empty()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100818 RTC_LOG(LS_INFO) << "Prune " << ports_to_prune.size()
819 << " ports because their networks were gone";
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000820 PrunePortsAndRemoveCandidates(ports_to_prune);
Honghai Zhangc67e0f52016-09-19 16:57:37 -0700821 }
honghaiz8c404fa2015-09-28 07:59:43 -0700822
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700823 if (allocation_started_ && !IsStopped()) {
824 if (network_manager_started_) {
825 // If the network manager has started, it must be regathering.
826 SignalIceRegathering(this, IceRegatheringReason::NETWORK_CHANGE);
827 }
Steve Anton300bf8e2017-07-14 10:13:10 -0700828 bool disable_equivalent_phases = true;
829 DoAllocate(disable_equivalent_phases);
Honghai Zhangd93f50c2016-10-05 11:47:22 -0700830 }
831
Honghai Zhang5048f572016-08-23 15:47:33 -0700832 if (!network_manager_started_) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100833 RTC_LOG(LS_INFO) << "Network manager has started";
Honghai Zhang5048f572016-08-23 15:47:33 -0700834 network_manager_started_ = true;
835 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000836}
837
838void BasicPortAllocatorSession::DisableEquivalentPhases(
Peter Boström0c4e06b2015-10-07 12:23:21 +0200839 rtc::Network* network,
840 PortConfiguration* config,
841 uint32_t* flags) {
842 for (uint32_t i = 0; i < sequences_.size() &&
Yves Gerey665174f2018-06-19 15:03:05 +0200843 (*flags & DISABLE_ALL_PHASES) != DISABLE_ALL_PHASES;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200844 ++i) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000845 sequences_[i]->DisableEquivalentPhases(network, config, flags);
846 }
847}
848
849void BasicPortAllocatorSession::AddAllocatedPort(Port* port,
Yves Gerey665174f2018-06-19 15:03:05 +0200850 AllocationSequence* seq,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000851 bool prepare_address) {
852 if (!port)
853 return;
854
Mirko Bonadei675513b2017-11-09 11:09:25 +0100855 RTC_LOG(LS_INFO) << "Adding allocated port for " << content_name();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000856 port->set_content_name(content_name());
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700857 port->set_component(component());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000858 port->set_generation(generation());
deadbeeff137e972017-03-23 15:45:49 -0700859 if (allocator_->proxy().type != rtc::PROXY_NONE)
860 port->set_proxy(allocator_->user_agent(), allocator_->proxy());
Taylor Brandstettera1c30352016-05-13 08:15:11 -0700861 port->set_send_retransmit_count_attribute(
862 (flags() & PORTALLOCATOR_ENABLE_STUN_RETRANSMIT_ATTRIBUTE) != 0);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000863
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000864 PortData data(port, seq);
865 ports_.push_back(data);
866
867 port->SignalCandidateReady.connect(
868 this, &BasicPortAllocatorSession::OnCandidateReady);
869 port->SignalPortComplete.connect(this,
Yves Gerey665174f2018-06-19 15:03:05 +0200870 &BasicPortAllocatorSession::OnPortComplete);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000871 port->SignalDestroyed.connect(this,
Yves Gerey665174f2018-06-19 15:03:05 +0200872 &BasicPortAllocatorSession::OnPortDestroyed);
873 port->SignalPortError.connect(this, &BasicPortAllocatorSession::OnPortError);
874 RTC_LOG(LS_INFO) << port->ToString() << ": Added port to allocator";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000875
876 if (prepare_address)
877 port->PrepareAddress();
878}
879
880void BasicPortAllocatorSession::OnAllocationSequenceObjectsCreated() {
881 allocation_sequences_created_ = true;
882 // Send candidate allocation complete signal if we have no sequences.
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000883 MaybeSignalCandidatesAllocationDone();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000884}
885
Yves Gerey665174f2018-06-19 15:03:05 +0200886void BasicPortAllocatorSession::OnCandidateReady(Port* port,
887 const Candidate& c) {
nisseede5da42017-01-12 05:15:36 -0800888 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000889 PortData* data = FindPort(port);
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000890 RTC_DCHECK(data != NULL);
Jonas Olssond7d762d2018-03-28 09:47:51 +0200891 RTC_LOG(LS_INFO) << port->ToString()
892 << ": Gathered candidate: " << c.ToSensitiveString();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000893 // Discarding any candidate signal if port allocation status is
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700894 // already done with gathering.
895 if (!data->inprogress()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100896 RTC_LOG(LS_WARNING)
deadbeefa64edb82016-07-15 14:42:21 -0700897 << "Discarding candidate because port is already done gathering.";
danilchapf4e8cf02016-06-30 01:55:03 -0700898 return;
Honghai Zhang17aac052016-06-29 21:41:53 -0700899 }
Honghai Zhang17aac052016-06-29 21:41:53 -0700900
danilchapf4e8cf02016-06-30 01:55:03 -0700901 // Mark that the port has a pairable candidate, either because we have a
902 // usable candidate from the port, or simply because the port is bound to the
903 // any address and therefore has no host candidate. This will trigger the port
904 // to start creating candidate pairs (connections) and issue connectivity
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700905 // checks. If port has already been marked as having a pairable candidate,
906 // do nothing here.
907 // Note: We should check whether any candidates may become ready after this
908 // because there we will check whether the candidate is generated by the ready
909 // ports, which may include this port.
Honghai Zhang8eeecab2016-07-28 13:20:15 -0700910 bool pruned = false;
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700911 if (CandidatePairable(c, port) && !data->has_pairable_candidate()) {
danilchapf4e8cf02016-06-30 01:55:03 -0700912 data->set_has_pairable_candidate(true);
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700913
914 if (prune_turn_ports_ && port->Type() == RELAY_PORT_TYPE) {
Honghai Zhang8eeecab2016-07-28 13:20:15 -0700915 pruned = PruneTurnPorts(port);
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700916 }
917 // If the current port is not pruned yet, SignalPortReady.
918 if (!data->pruned()) {
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000919 RTC_LOG(LS_INFO) << port->ToString() << ": Port ready.";
920 SignalPortReady(this, port);
Honghai Zhanga74363c2016-07-28 18:06:15 -0700921 port->KeepAliveUntilPruned();
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700922 }
Honghai Zhang17aac052016-06-29 21:41:53 -0700923 }
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700924
deadbeef1c5e6d02017-09-15 17:46:56 -0700925 if (data->ready() && CheckCandidateFilter(c)) {
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000926 std::vector<Candidate> candidates;
Qingsi Wangb49b8f12018-09-16 17:48:10 -0700927 candidates.push_back(SanitizeCandidate(c));
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000928 SignalCandidatesReady(this, candidates);
deadbeefa64edb82016-07-15 14:42:21 -0700929 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100930 RTC_LOG(LS_INFO) << "Discarding candidate because it doesn't match filter.";
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700931 }
932
933 // If we have pruned any port, maybe need to signal port allocation done.
Honghai Zhang8eeecab2016-07-28 13:20:15 -0700934 if (pruned) {
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000935 MaybeSignalCandidatesAllocationDone();
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700936 }
937}
938
939Port* BasicPortAllocatorSession::GetBestTurnPortForNetwork(
940 const std::string& network_name) const {
941 Port* best_turn_port = nullptr;
942 for (const PortData& data : ports_) {
943 if (data.port()->Network()->name() == network_name &&
944 data.port()->Type() == RELAY_PORT_TYPE && data.ready() &&
945 (!best_turn_port || ComparePort(data.port(), best_turn_port) > 0)) {
946 best_turn_port = data.port();
947 }
948 }
949 return best_turn_port;
950}
951
952bool BasicPortAllocatorSession::PruneTurnPorts(Port* newly_pairable_turn_port) {
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700953 // Note: We determine the same network based only on their network names. So
954 // if an IPv4 address and an IPv6 address have the same network name, they
955 // are considered the same network here.
956 const std::string& network_name = newly_pairable_turn_port->Network()->name();
957 Port* best_turn_port = GetBestTurnPortForNetwork(network_name);
958 // |port| is already in the list of ports, so the best port cannot be nullptr.
959 RTC_CHECK(best_turn_port != nullptr);
960
Honghai Zhang8eeecab2016-07-28 13:20:15 -0700961 bool pruned = false;
Honghai Zhangc67e0f52016-09-19 16:57:37 -0700962 std::vector<PortData*> ports_to_prune;
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700963 for (PortData& data : ports_) {
964 if (data.port()->Network()->name() == network_name &&
965 data.port()->Type() == RELAY_PORT_TYPE && !data.pruned() &&
966 ComparePort(data.port(), best_turn_port) < 0) {
Honghai Zhang8eeecab2016-07-28 13:20:15 -0700967 pruned = true;
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700968 if (data.port() != newly_pairable_turn_port) {
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000969 // These ports will be pruned in PrunePortsAndRemoveCandidates.
Honghai Zhangc67e0f52016-09-19 16:57:37 -0700970 ports_to_prune.push_back(&data);
971 } else {
972 data.Prune();
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700973 }
974 }
975 }
Honghai Zhangc67e0f52016-09-19 16:57:37 -0700976
977 if (!ports_to_prune.empty()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +0100978 RTC_LOG(LS_INFO) << "Prune " << ports_to_prune.size()
979 << " low-priority TURN ports";
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000980 PrunePortsAndRemoveCandidates(ports_to_prune);
Honghai Zhang8eeecab2016-07-28 13:20:15 -0700981 }
982 return pruned;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000983}
984
Honghai Zhanga74363c2016-07-28 18:06:15 -0700985void BasicPortAllocatorSession::PruneAllPorts() {
986 for (PortData& data : ports_) {
Honghai Zhangc67e0f52016-09-19 16:57:37 -0700987 data.Prune();
Honghai Zhanga74363c2016-07-28 18:06:15 -0700988 }
989}
990
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000991void BasicPortAllocatorSession::OnPortComplete(Port* port) {
nisseede5da42017-01-12 05:15:36 -0800992 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
Jonas Olssond7d762d2018-03-28 09:47:51 +0200993 RTC_LOG(LS_INFO) << port->ToString()
994 << ": Port completed gathering candidates.";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000995 PortData* data = FindPort(port);
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +0000996 RTC_DCHECK(data != NULL);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000997
998 // Ignore any late signals.
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -0700999 if (!data->inprogress()) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001000 return;
Taylor Brandstettera1c30352016-05-13 08:15:11 -07001001 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001002
1003 // Moving to COMPLETE state.
1004 data->set_complete();
1005 // Send candidate allocation complete signal if this was the last port.
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001006 MaybeSignalCandidatesAllocationDone();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001007}
1008
1009void BasicPortAllocatorSession::OnPortError(Port* port) {
nisseede5da42017-01-12 05:15:36 -08001010 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
Jonas Olssond7d762d2018-03-28 09:47:51 +02001011 RTC_LOG(LS_INFO) << port->ToString()
1012 << ": Port encountered error while gathering candidates.";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001013 PortData* data = FindPort(port);
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001014 RTC_DCHECK(data != NULL);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001015 // We might have already given up on this port and stopped it.
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -07001016 if (!data->inprogress()) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001017 return;
Taylor Brandstettera1c30352016-05-13 08:15:11 -07001018 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001019
1020 // SignalAddressError is currently sent from StunPort/TurnPort.
1021 // But this signal itself is generic.
1022 data->set_error();
1023 // Send candidate allocation complete signal if this was the last port.
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001024 MaybeSignalCandidatesAllocationDone();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001025}
1026
Taylor Brandstettera1c30352016-05-13 08:15:11 -07001027bool BasicPortAllocatorSession::CheckCandidateFilter(const Candidate& c) const {
Taylor Brandstetter417eebe2016-05-23 16:02:19 -07001028 uint32_t filter = candidate_filter_;
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +00001029
1030 // When binding to any address, before sending packets out, the getsockname
1031 // returns all 0s, but after sending packets, it'll be the NIC used to
1032 // send. All 0s is not a valid ICE candidate address and should be filtered
1033 // out.
1034 if (c.address().IsAnyIP()) {
1035 return false;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001036 }
1037
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +00001038 if (c.type() == RELAY_PORT_TYPE) {
guoweis@webrtc.org931e0cf2015-02-18 19:09:42 +00001039 return ((filter & CF_RELAY) != 0);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +00001040 } else if (c.type() == STUN_PORT_TYPE) {
guoweis@webrtc.org931e0cf2015-02-18 19:09:42 +00001041 return ((filter & CF_REFLEXIVE) != 0);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +00001042 } else if (c.type() == LOCAL_PORT_TYPE) {
1043 if ((filter & CF_REFLEXIVE) && !c.address().IsPrivateIP()) {
1044 // We allow host candidates if the filter allows server-reflexive
1045 // candidates and the candidate is a public IP. Because we don't generate
1046 // server-reflexive candidates if they have the same IP as the host
1047 // candidate (i.e. when the host candidate is a public IP), filtering to
1048 // only server-reflexive candidates won't work right when the host
1049 // candidates have public IPs.
1050 return true;
1051 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001052
guoweis@webrtc.org931e0cf2015-02-18 19:09:42 +00001053 return ((filter & CF_HOST) != 0);
guoweis@webrtc.orgf358aea2015-02-18 18:44:01 +00001054 }
1055 return false;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001056}
1057
Taylor Brandstetter417eebe2016-05-23 16:02:19 -07001058bool BasicPortAllocatorSession::CandidatePairable(const Candidate& c,
1059 const Port* port) const {
1060 bool candidate_signalable = CheckCandidateFilter(c);
1061
1062 // When device enumeration is disabled (to prevent non-default IP addresses
1063 // from leaking), we ping from some local candidates even though we don't
1064 // signal them. However, if host candidates are also disabled (for example, to
1065 // prevent even default IP addresses from leaking), we still don't want to
1066 // ping from them, even if device enumeration is disabled. Thus, we check for
1067 // both device enumeration and host candidates being disabled.
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001068 bool network_enumeration_disabled = c.address().IsAnyIP();
Taylor Brandstetter417eebe2016-05-23 16:02:19 -07001069 bool can_ping_from_candidate =
1070 (port->SharedSocket() || c.protocol() == TCP_PROTOCOL_NAME);
1071 bool host_candidates_disabled = !(candidate_filter_ & CF_HOST);
1072
1073 return candidate_signalable ||
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001074 (network_enumeration_disabled && can_ping_from_candidate &&
Taylor Brandstetter417eebe2016-05-23 16:02:19 -07001075 !host_candidates_disabled);
1076}
1077
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001078void BasicPortAllocatorSession::OnPortAllocationComplete(
1079 AllocationSequence* seq) {
1080 // Send candidate allocation complete signal if all ports are done.
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001081 MaybeSignalCandidatesAllocationDone();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001082}
1083
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001084void BasicPortAllocatorSession::MaybeSignalCandidatesAllocationDone() {
Taylor Brandstettera1c30352016-05-13 08:15:11 -07001085 if (CandidatesAllocationDone()) {
1086 if (pooled()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001087 RTC_LOG(LS_INFO) << "All candidates gathered for pooled session.";
Taylor Brandstettera1c30352016-05-13 08:15:11 -07001088 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001089 RTC_LOG(LS_INFO) << "All candidates gathered for " << content_name()
1090 << ":" << component() << ":" << generation();
Taylor Brandstettera1c30352016-05-13 08:15:11 -07001091 }
1092 SignalCandidatesAllocationDone(this);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001093 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001094}
1095
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001096void BasicPortAllocatorSession::OnPortDestroyed(PortInterface* port) {
nisseede5da42017-01-12 05:15:36 -08001097 RTC_DCHECK(rtc::Thread::Current() == network_thread_);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001098 for (std::vector<PortData>::iterator iter = ports_.begin();
1099 iter != ports_.end(); ++iter) {
1100 if (port == iter->port()) {
1101 ports_.erase(iter);
Yves Gerey665174f2018-06-19 15:03:05 +02001102 RTC_LOG(LS_INFO) << port->ToString() << ": Removed port from allocator ("
Jonas Olssond7d762d2018-03-28 09:47:51 +02001103 << static_cast<int>(ports_.size()) << " remaining)";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001104 return;
1105 }
1106 }
nissec80e7412017-01-11 05:56:46 -08001107 RTC_NOTREACHED();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001108}
1109
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001110BasicPortAllocatorSession::PortData* BasicPortAllocatorSession::FindPort(
1111 Port* port) {
Yves Gerey665174f2018-06-19 15:03:05 +02001112 for (std::vector<PortData>::iterator it = ports_.begin(); it != ports_.end();
1113 ++it) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001114 if (it->port() == port) {
1115 return &*it;
1116 }
1117 }
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001118 return NULL;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001119}
1120
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001121std::vector<BasicPortAllocatorSession::PortData*>
1122BasicPortAllocatorSession::GetUnprunedPorts(
Honghai Zhang5622c5e2016-07-01 13:59:29 -07001123 const std::vector<rtc::Network*>& networks) {
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001124 std::vector<PortData*> unpruned_ports;
1125 for (PortData& port : ports_) {
1126 if (!port.pruned() &&
1127 std::find(networks.begin(), networks.end(),
1128 port.sequence()->network()) != networks.end()) {
1129 unpruned_ports.push_back(&port);
Honghai Zhang5622c5e2016-07-01 13:59:29 -07001130 }
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001131 }
1132 return unpruned_ports;
1133}
1134
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001135void BasicPortAllocatorSession::PrunePortsAndRemoveCandidates(
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001136 const std::vector<PortData*>& port_data_list) {
1137 std::vector<PortInterface*> pruned_ports;
1138 std::vector<Candidate> removed_candidates;
1139 for (PortData* data : port_data_list) {
Honghai Zhanga74363c2016-07-28 18:06:15 -07001140 // Prune the port so that it may be destroyed.
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001141 data->Prune();
1142 pruned_ports.push_back(data->port());
1143 if (data->has_pairable_candidate()) {
1144 GetCandidatesFromPort(*data, &removed_candidates);
Honghai Zhang5622c5e2016-07-01 13:59:29 -07001145 // Mark the port as having no pairable candidates so that its candidates
1146 // won't be removed multiple times.
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001147 data->set_has_pairable_candidate(false);
Honghai Zhang5622c5e2016-07-01 13:59:29 -07001148 }
1149 }
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001150 if (!pruned_ports.empty()) {
1151 SignalPortsPruned(this, pruned_ports);
Honghai Zhang5622c5e2016-07-01 13:59:29 -07001152 }
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001153 if (!removed_candidates.empty()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001154 RTC_LOG(LS_INFO) << "Removed " << removed_candidates.size()
1155 << " candidates";
Honghai Zhangc67e0f52016-09-19 16:57:37 -07001156 SignalCandidatesRemoved(this, removed_candidates);
Honghai Zhang5622c5e2016-07-01 13:59:29 -07001157 }
1158}
1159
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001160// AllocationSequence
1161
1162AllocationSequence::AllocationSequence(BasicPortAllocatorSession* session,
1163 rtc::Network* network,
1164 PortConfiguration* config,
Peter Boström0c4e06b2015-10-07 12:23:21 +02001165 uint32_t flags)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001166 : session_(session),
1167 network_(network),
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001168 config_(config),
1169 state_(kInit),
1170 flags_(flags),
1171 udp_socket_(),
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001172 udp_port_(NULL),
Yves Gerey665174f2018-06-19 15:03:05 +02001173 phase_(0) {}
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001174
Honghai Zhang5048f572016-08-23 15:47:33 -07001175void AllocationSequence::Init() {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001176 if (IsFlagSet(PORTALLOCATOR_ENABLE_SHARED_SOCKET)) {
1177 udp_socket_.reset(session_->socket_factory()->CreateUdpSocket(
deadbeef5c3c1042017-08-04 15:01:57 -07001178 rtc::SocketAddress(network_->GetBestIP(), 0),
1179 session_->allocator()->min_port(), session_->allocator()->max_port()));
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001180 if (udp_socket_) {
Yves Gerey665174f2018-06-19 15:03:05 +02001181 udp_socket_->SignalReadPacket.connect(this,
1182 &AllocationSequence::OnReadPacket);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001183 }
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001184 // Continuing if |udp_socket_| is NULL, as local TCP and RelayPort using TCP
1185 // are next available options to setup a communication channel.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001186 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001187}
1188
1189void AllocationSequence::Clear() {
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001190 udp_port_ = NULL;
Jonas Oreland202994c2017-12-18 12:10:43 +01001191 relay_ports_.clear();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001192}
1193
Honghai Zhang5622c5e2016-07-01 13:59:29 -07001194void AllocationSequence::OnNetworkFailed() {
1195 RTC_DCHECK(!network_failed_);
1196 network_failed_ = true;
1197 // Stop the allocation sequence if its network failed.
honghaiz8c404fa2015-09-28 07:59:43 -07001198 Stop();
honghaiz8c404fa2015-09-28 07:59:43 -07001199}
1200
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001201AllocationSequence::~AllocationSequence() {
1202 session_->network_thread()->Clear(this);
1203}
1204
1205void AllocationSequence::DisableEquivalentPhases(rtc::Network* network,
Yves Gerey665174f2018-06-19 15:03:05 +02001206 PortConfiguration* config,
1207 uint32_t* flags) {
Honghai Zhang5622c5e2016-07-01 13:59:29 -07001208 if (network_failed_) {
1209 // If the network of this allocation sequence has ever become failed,
honghaiz8c404fa2015-09-28 07:59:43 -07001210 // it won't be equivalent to the new network.
1211 return;
1212 }
1213
deadbeef5c3c1042017-08-04 15:01:57 -07001214 if (!((network == network_) && (previous_best_ip_ == network->GetBestIP()))) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001215 // Different network setup; nothing is equivalent.
1216 return;
1217 }
1218
1219 // Else turn off the stuff that we've already got covered.
1220
deadbeef1c46a352017-09-27 11:24:05 -07001221 // Every config implicitly specifies local, so turn that off right away if we
1222 // already have a port of the corresponding type. Look for a port that
1223 // matches this AllocationSequence's network, is the right protocol, and
1224 // hasn't encountered an error.
1225 // TODO(deadbeef): This doesn't take into account that there may be another
1226 // AllocationSequence that's ABOUT to allocate a UDP port, but hasn't yet.
1227 // This can happen if, say, there's a network change event right before an
1228 // application-triggered ICE restart. Hopefully this problem will just go
1229 // away if we get rid of the gathering "phases" though, which is planned.
1230 if (std::any_of(session_->ports_.begin(), session_->ports_.end(),
1231 [this](const BasicPortAllocatorSession::PortData& p) {
1232 return p.port()->Network() == network_ &&
1233 p.port()->GetProtocol() == PROTO_UDP && !p.error();
1234 })) {
1235 *flags |= PORTALLOCATOR_DISABLE_UDP;
1236 }
1237 if (std::any_of(session_->ports_.begin(), session_->ports_.end(),
1238 [this](const BasicPortAllocatorSession::PortData& p) {
1239 return p.port()->Network() == network_ &&
1240 p.port()->GetProtocol() == PROTO_TCP && !p.error();
1241 })) {
1242 *flags |= PORTALLOCATOR_DISABLE_TCP;
1243 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001244
1245 if (config_ && config) {
1246 if (config_->StunServers() == config->StunServers()) {
1247 // Already got this STUN servers covered.
1248 *flags |= PORTALLOCATOR_DISABLE_STUN;
1249 }
1250 if (!config_->relays.empty()) {
1251 // Already got relays covered.
1252 // NOTE: This will even skip a _different_ set of relay servers if we
1253 // were to be given one, but that never happens in our codebase. Should
1254 // probably get rid of the list in PortConfiguration and just keep a
1255 // single relay server in each one.
1256 *flags |= PORTALLOCATOR_DISABLE_RELAY;
1257 }
1258 }
1259}
1260
1261void AllocationSequence::Start() {
1262 state_ = kRunning;
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -07001263 session_->network_thread()->Post(RTC_FROM_HERE, this, MSG_ALLOCATION_PHASE);
deadbeef5c3c1042017-08-04 15:01:57 -07001264 // Take a snapshot of the best IP, so that when DisableEquivalentPhases is
1265 // called next time, we enable all phases if the best IP has since changed.
1266 previous_best_ip_ = network_->GetBestIP();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001267}
1268
1269void AllocationSequence::Stop() {
1270 // If the port is completed, don't set it to stopped.
1271 if (state_ == kRunning) {
1272 state_ = kStopped;
1273 session_->network_thread()->Clear(this, MSG_ALLOCATION_PHASE);
1274 }
1275}
1276
1277void AllocationSequence::OnMessage(rtc::Message* msg) {
nisseede5da42017-01-12 05:15:36 -08001278 RTC_DCHECK(rtc::Thread::Current() == session_->network_thread());
1279 RTC_DCHECK(msg->message_id == MSG_ALLOCATION_PHASE);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001280
deadbeef1c5e6d02017-09-15 17:46:56 -07001281 const char* const PHASE_NAMES[kNumPhases] = {"Udp", "Relay", "Tcp"};
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001282
1283 // Perform all of the phases in the current step.
Jonas Olssond7d762d2018-03-28 09:47:51 +02001284 RTC_LOG(LS_INFO) << network_->ToString()
1285 << ": Allocation Phase=" << PHASE_NAMES[phase_];
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001286
1287 switch (phase_) {
1288 case PHASE_UDP:
1289 CreateUDPPorts();
1290 CreateStunPorts();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001291 break;
1292
1293 case PHASE_RELAY:
1294 CreateRelayPorts();
1295 break;
1296
1297 case PHASE_TCP:
1298 CreateTCPPorts();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001299 state_ = kCompleted;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001300 break;
1301
1302 default:
nissec80e7412017-01-11 05:56:46 -08001303 RTC_NOTREACHED();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001304 }
1305
1306 if (state() == kRunning) {
1307 ++phase_;
Taylor Brandstetter5d97a9a2016-06-10 14:17:27 -07001308 session_->network_thread()->PostDelayed(RTC_FROM_HERE,
1309 session_->allocator()->step_delay(),
1310 this, MSG_ALLOCATION_PHASE);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001311 } else {
1312 // If all phases in AllocationSequence are completed, no allocation
1313 // steps needed further. Canceling pending signal.
1314 session_->network_thread()->Clear(this, MSG_ALLOCATION_PHASE);
1315 SignalPortAllocationComplete(this);
1316 }
1317}
1318
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001319void AllocationSequence::CreateUDPPorts() {
1320 if (IsFlagSet(PORTALLOCATOR_DISABLE_UDP)) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001321 RTC_LOG(LS_VERBOSE) << "AllocationSequence: UDP ports disabled, skipping.";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001322 return;
1323 }
1324
1325 // TODO(mallinath) - Remove UDPPort creating socket after shared socket
1326 // is enabled completely.
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001327 UDPPort* port = NULL;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -08001328 bool emit_local_candidate_for_anyaddress =
1329 !IsFlagSet(PORTALLOCATOR_DISABLE_DEFAULT_LOCAL_CANDIDATE);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001330 if (IsFlagSet(PORTALLOCATOR_ENABLE_SHARED_SOCKET) && udp_socket_) {
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -07001331 port = UDPPort::Create(
1332 session_->network_thread(), session_->socket_factory(), network_,
1333 udp_socket_.get(), session_->username(), session_->password(),
Qingsi Wang4ff54432018-03-01 18:25:20 -08001334 session_->allocator()->origin(), emit_local_candidate_for_anyaddress,
1335 session_->allocator()->stun_candidate_keepalive_interval());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001336 } else {
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -07001337 port = UDPPort::Create(
deadbeef5c3c1042017-08-04 15:01:57 -07001338 session_->network_thread(), session_->socket_factory(), network_,
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -07001339 session_->allocator()->min_port(), session_->allocator()->max_port(),
1340 session_->username(), session_->password(),
Qingsi Wang4ff54432018-03-01 18:25:20 -08001341 session_->allocator()->origin(), emit_local_candidate_for_anyaddress,
1342 session_->allocator()->stun_candidate_keepalive_interval());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001343 }
1344
1345 if (port) {
1346 // If shared socket is enabled, STUN candidate will be allocated by the
1347 // UDPPort.
1348 if (IsFlagSet(PORTALLOCATOR_ENABLE_SHARED_SOCKET)) {
1349 udp_port_ = port;
jiayl@webrtc.org7e5b3802015-01-22 21:28:39 +00001350 port->SignalDestroyed.connect(this, &AllocationSequence::OnPortDestroyed);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001351
1352 // If STUN is not disabled, setting stun server address to port.
1353 if (!IsFlagSet(PORTALLOCATOR_DISABLE_STUN)) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001354 if (config_ && !config_->StunServers().empty()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001355 RTC_LOG(LS_INFO)
1356 << "AllocationSequence: UDPPort will be handling the "
Jonas Olssond7d762d2018-03-28 09:47:51 +02001357 "STUN candidate generation.";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001358 port->set_server_addresses(config_->StunServers());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001359 }
1360 }
1361 }
1362
1363 session_->AddAllocatedPort(port, this, true);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001364 }
1365}
1366
1367void AllocationSequence::CreateTCPPorts() {
1368 if (IsFlagSet(PORTALLOCATOR_DISABLE_TCP)) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001369 RTC_LOG(LS_VERBOSE) << "AllocationSequence: TCP ports disabled, skipping.";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001370 return;
1371 }
1372
deadbeef5c3c1042017-08-04 15:01:57 -07001373 Port* port = TCPPort::Create(
1374 session_->network_thread(), session_->socket_factory(), network_,
1375 session_->allocator()->min_port(), session_->allocator()->max_port(),
1376 session_->username(), session_->password(),
1377 session_->allocator()->allow_tcp_listen());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001378 if (port) {
1379 session_->AddAllocatedPort(port, this, true);
1380 // Since TCPPort is not created using shared socket, |port| will not be
1381 // added to the dequeue.
1382 }
1383}
1384
1385void AllocationSequence::CreateStunPorts() {
1386 if (IsFlagSet(PORTALLOCATOR_DISABLE_STUN)) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001387 RTC_LOG(LS_VERBOSE) << "AllocationSequence: STUN ports disabled, skipping.";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001388 return;
1389 }
1390
1391 if (IsFlagSet(PORTALLOCATOR_ENABLE_SHARED_SOCKET)) {
1392 return;
1393 }
1394
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001395 if (!(config_ && !config_->StunServers().empty())) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001396 RTC_LOG(LS_WARNING)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001397 << "AllocationSequence: No STUN server configured, skipping.";
1398 return;
1399 }
1400
deadbeef5c3c1042017-08-04 15:01:57 -07001401 StunPort* port = StunPort::Create(
1402 session_->network_thread(), session_->socket_factory(), network_,
1403 session_->allocator()->min_port(), session_->allocator()->max_port(),
1404 session_->username(), session_->password(), config_->StunServers(),
Qingsi Wang4ff54432018-03-01 18:25:20 -08001405 session_->allocator()->origin(),
1406 session_->allocator()->stun_candidate_keepalive_interval());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001407 if (port) {
1408 session_->AddAllocatedPort(port, this, true);
1409 // Since StunPort is not created using shared socket, |port| will not be
1410 // added to the dequeue.
1411 }
1412}
1413
1414void AllocationSequence::CreateRelayPorts() {
1415 if (IsFlagSet(PORTALLOCATOR_DISABLE_RELAY)) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001416 RTC_LOG(LS_VERBOSE)
1417 << "AllocationSequence: Relay ports disabled, skipping.";
1418 return;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001419 }
1420
1421 // If BasicPortAllocatorSession::OnAllocate left relay ports enabled then we
1422 // ought to have a relay list for them here.
kwibergee89e782017-08-09 17:22:01 -07001423 RTC_DCHECK(config_);
1424 RTC_DCHECK(!config_->relays.empty());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001425 if (!(config_ && !config_->relays.empty())) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001426 RTC_LOG(LS_WARNING)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001427 << "AllocationSequence: No relay server configured, skipping.";
1428 return;
1429 }
1430
Honghai Zhangb9e7b4a2016-06-30 20:52:02 -07001431 for (RelayServerConfig& relay : config_->relays) {
1432 if (relay.type == RELAY_GTURN) {
1433 CreateGturnPort(relay);
1434 } else if (relay.type == RELAY_TURN) {
1435 CreateTurnPort(relay);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001436 } else {
nissec80e7412017-01-11 05:56:46 -08001437 RTC_NOTREACHED();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001438 }
1439 }
1440}
1441
1442void AllocationSequence::CreateGturnPort(const RelayServerConfig& config) {
1443 // TODO(mallinath) - Rename RelayPort to GTurnPort.
deadbeef5c3c1042017-08-04 15:01:57 -07001444 RelayPort* port = RelayPort::Create(
1445 session_->network_thread(), session_->socket_factory(), network_,
1446 session_->allocator()->min_port(), session_->allocator()->max_port(),
1447 config_->username, config_->password);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001448 if (port) {
1449 // Since RelayPort is not created using shared socket, |port| will not be
1450 // added to the dequeue.
1451 // Note: We must add the allocated port before we add addresses because
1452 // the latter will create candidates that need name and preference
1453 // settings. However, we also can't prepare the address (normally
1454 // done by AddAllocatedPort) until we have these addresses. So we
1455 // wait to do that until below.
1456 session_->AddAllocatedPort(port, this, false);
1457
1458 // Add the addresses of this protocol.
1459 PortList::const_iterator relay_port;
Yves Gerey665174f2018-06-19 15:03:05 +02001460 for (relay_port = config.ports.begin(); relay_port != config.ports.end();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001461 ++relay_port) {
1462 port->AddServerAddress(*relay_port);
1463 port->AddExternalAddress(*relay_port);
1464 }
1465 // Start fetching an address for this port.
1466 port->PrepareAddress();
1467 }
1468}
1469
1470void AllocationSequence::CreateTurnPort(const RelayServerConfig& config) {
1471 PortList::const_iterator relay_port;
Yves Gerey665174f2018-06-19 15:03:05 +02001472 for (relay_port = config.ports.begin(); relay_port != config.ports.end();
1473 ++relay_port) {
Guo-wei Shieh13d35f62015-08-26 15:32:56 -07001474 // Skip UDP connections to relay servers if it's disallowed.
1475 if (IsFlagSet(PORTALLOCATOR_DISABLE_UDP_RELAY) &&
1476 relay_port->proto == PROTO_UDP) {
1477 continue;
1478 }
1479
Honghai Zhang3d31bd62016-08-10 10:33:05 -07001480 // Do not create a port if the server address family is known and does
1481 // not match the local IP address family.
1482 int server_ip_family = relay_port->address.ipaddr().family();
deadbeef5c3c1042017-08-04 15:01:57 -07001483 int local_ip_family = network_->GetBestIP().family();
Honghai Zhang3d31bd62016-08-10 10:33:05 -07001484 if (server_ip_family != AF_UNSPEC && server_ip_family != local_ip_family) {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001485 RTC_LOG(LS_INFO)
1486 << "Server and local address families are not compatible. "
Yves Gerey665174f2018-06-19 15:03:05 +02001487 "Server address: "
1488 << relay_port->address.ipaddr().ToString()
Mirko Bonadei675513b2017-11-09 11:09:25 +01001489 << " Local address: " << network_->GetBestIP().ToString();
Honghai Zhang3d31bd62016-08-10 10:33:05 -07001490 continue;
1491 }
1492
Jonas Oreland202994c2017-12-18 12:10:43 +01001493 CreateRelayPortArgs args;
1494 args.network_thread = session_->network_thread();
1495 args.socket_factory = session_->socket_factory();
1496 args.network = network_;
1497 args.username = session_->username();
1498 args.password = session_->password();
1499 args.server_address = &(*relay_port);
1500 args.config = &config;
1501 args.origin = session_->allocator()->origin();
1502 args.turn_customizer = session_->allocator()->turn_customizer();
1503
1504 std::unique_ptr<cricket::Port> port;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001505 // Shared socket mode must be enabled only for UDP based ports. Hence
1506 // don't pass shared socket for ports which will create TCP sockets.
1507 // TODO(mallinath) - Enable shared socket mode for TURN ports. Disabled
1508 // due to webrtc bug https://code.google.com/p/webrtc/issues/detail?id=3537
1509 if (IsFlagSet(PORTALLOCATOR_ENABLE_SHARED_SOCKET) &&
honghaizf421bdc2015-07-17 16:21:55 -07001510 relay_port->proto == PROTO_UDP && udp_socket_) {
Jonas Oreland202994c2017-12-18 12:10:43 +01001511 port = session_->allocator()->relay_port_factory()->Create(
1512 args, udp_socket_.get());
1513
1514 if (!port) {
Yves Gerey665174f2018-06-19 15:03:05 +02001515 RTC_LOG(LS_WARNING) << "Failed to create relay port with "
1516 << args.server_address->address.ToString();
Jonas Oreland202994c2017-12-18 12:10:43 +01001517 continue;
1518 }
1519
1520 relay_ports_.push_back(port.get());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001521 // Listen to the port destroyed signal, to allow AllocationSequence to
1522 // remove entrt from it's map.
1523 port->SignalDestroyed.connect(this, &AllocationSequence::OnPortDestroyed);
1524 } else {
Jonas Oreland202994c2017-12-18 12:10:43 +01001525 port = session_->allocator()->relay_port_factory()->Create(
Yves Gerey665174f2018-06-19 15:03:05 +02001526 args, session_->allocator()->min_port(),
Jonas Oreland202994c2017-12-18 12:10:43 +01001527 session_->allocator()->max_port());
1528
1529 if (!port) {
Yves Gerey665174f2018-06-19 15:03:05 +02001530 RTC_LOG(LS_WARNING) << "Failed to create relay port with "
1531 << args.server_address->address.ToString();
Jonas Oreland202994c2017-12-18 12:10:43 +01001532 continue;
1533 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001534 }
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001535 RTC_DCHECK(port != NULL);
Jonas Oreland202994c2017-12-18 12:10:43 +01001536 session_->AddAllocatedPort(port.release(), this, true);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001537 }
1538}
1539
Yves Gerey665174f2018-06-19 15:03:05 +02001540void AllocationSequence::OnReadPacket(rtc::AsyncPacketSocket* socket,
1541 const char* data,
1542 size_t size,
1543 const rtc::SocketAddress& remote_addr,
1544 const rtc::PacketTime& packet_time) {
nisseede5da42017-01-12 05:15:36 -08001545 RTC_DCHECK(socket == udp_socket_.get());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001546
1547 bool turn_port_found = false;
1548
1549 // Try to find the TurnPort that matches the remote address. Note that the
1550 // message could be a STUN binding response if the TURN server is also used as
1551 // a STUN server. We don't want to parse every message here to check if it is
1552 // a STUN binding response, so we pass the message to TurnPort regardless of
1553 // the message type. The TurnPort will just ignore the message since it will
1554 // not find any request by transaction ID.
Jonas Oreland202994c2017-12-18 12:10:43 +01001555 for (auto* port : relay_ports_) {
1556 if (port->CanHandleIncomingPacketsFrom(remote_addr)) {
Sergey Ulanov17fa6722016-05-10 10:20:47 -07001557 if (port->HandleIncomingPacket(socket, data, size, remote_addr,
1558 packet_time)) {
1559 return;
1560 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001561 turn_port_found = true;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001562 }
1563 }
1564
1565 if (udp_port_) {
1566 const ServerAddresses& stun_servers = udp_port_->server_addresses();
1567
1568 // Pass the packet to the UdpPort if there is no matching TurnPort, or if
1569 // the TURN server is also a STUN server.
1570 if (!turn_port_found ||
1571 stun_servers.find(remote_addr) != stun_servers.end()) {
Sergey Ulanov17fa6722016-05-10 10:20:47 -07001572 RTC_DCHECK(udp_port_->SharedSocket());
1573 udp_port_->HandleIncomingPacket(socket, data, size, remote_addr,
1574 packet_time);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001575 }
1576 }
1577}
1578
1579void AllocationSequence::OnPortDestroyed(PortInterface* port) {
1580 if (udp_port_ == port) {
Mirko Bonadei5f4d47b2018-08-22 17:41:22 +00001581 udp_port_ = NULL;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001582 return;
1583 }
1584
Jonas Oreland202994c2017-12-18 12:10:43 +01001585 auto it = std::find(relay_ports_.begin(), relay_ports_.end(), port);
1586 if (it != relay_ports_.end()) {
1587 relay_ports_.erase(it);
jiayl@webrtc.org7e5b3802015-01-22 21:28:39 +00001588 } else {
Mirko Bonadei675513b2017-11-09 11:09:25 +01001589 RTC_LOG(LS_ERROR) << "Unexpected OnPortDestroyed for nonexistent port.";
nissec80e7412017-01-11 05:56:46 -08001590 RTC_NOTREACHED();
jiayl@webrtc.org7e5b3802015-01-22 21:28:39 +00001591 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001592}
1593
1594// PortConfiguration
Yves Gerey665174f2018-06-19 15:03:05 +02001595PortConfiguration::PortConfiguration(const rtc::SocketAddress& stun_address,
1596 const std::string& username,
1597 const std::string& password)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001598 : stun_address(stun_address), username(username), password(password) {
1599 if (!stun_address.IsNil())
1600 stun_servers.insert(stun_address);
1601}
1602
1603PortConfiguration::PortConfiguration(const ServerAddresses& stun_servers,
1604 const std::string& username,
1605 const std::string& password)
Yves Gerey665174f2018-06-19 15:03:05 +02001606 : stun_servers(stun_servers), username(username), password(password) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001607 if (!stun_servers.empty())
1608 stun_address = *(stun_servers.begin());
1609}
1610
Steve Anton7995d8c2017-10-30 16:23:38 -07001611PortConfiguration::~PortConfiguration() = default;
1612
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001613ServerAddresses PortConfiguration::StunServers() {
1614 if (!stun_address.IsNil() &&
1615 stun_servers.find(stun_address) == stun_servers.end()) {
1616 stun_servers.insert(stun_address);
1617 }
deadbeefc5d0d952015-07-16 10:22:21 -07001618 // Every UDP TURN server should also be used as a STUN server.
1619 ServerAddresses turn_servers = GetRelayServerAddresses(RELAY_TURN, PROTO_UDP);
1620 for (const rtc::SocketAddress& turn_server : turn_servers) {
1621 if (stun_servers.find(turn_server) == stun_servers.end()) {
1622 stun_servers.insert(turn_server);
1623 }
1624 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001625 return stun_servers;
1626}
1627
1628void PortConfiguration::AddRelay(const RelayServerConfig& config) {
1629 relays.push_back(config);
1630}
1631
Yves Gerey665174f2018-06-19 15:03:05 +02001632bool PortConfiguration::SupportsProtocol(const RelayServerConfig& relay,
1633 ProtocolType type) const {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001634 PortList::const_iterator relay_port;
Yves Gerey665174f2018-06-19 15:03:05 +02001635 for (relay_port = relay.ports.begin(); relay_port != relay.ports.end();
1636 ++relay_port) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001637 if (relay_port->proto == type)
1638 return true;
1639 }
1640 return false;
1641}
1642
1643bool PortConfiguration::SupportsProtocol(RelayType turn_type,
1644 ProtocolType type) const {
1645 for (size_t i = 0; i < relays.size(); ++i) {
Yves Gerey665174f2018-06-19 15:03:05 +02001646 if (relays[i].type == turn_type && SupportsProtocol(relays[i], type))
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001647 return true;
1648 }
1649 return false;
1650}
1651
1652ServerAddresses PortConfiguration::GetRelayServerAddresses(
Yves Gerey665174f2018-06-19 15:03:05 +02001653 RelayType turn_type,
1654 ProtocolType type) const {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001655 ServerAddresses servers;
1656 for (size_t i = 0; i < relays.size(); ++i) {
1657 if (relays[i].type == turn_type && SupportsProtocol(relays[i], type)) {
1658 servers.insert(relays[i].ports.front().address);
1659 }
1660 }
1661 return servers;
1662}
1663
1664} // namespace cricket