blob: 33a23484f20da651fd497cf478d9189c773854fa [file] [log] [blame]
henrike@webrtc.org269fb4b2014-10-28 22:20:111/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 17:11:0011#ifndef P2P_BASE_PORT_ALLOCATOR_H_
12#define P2P_BASE_PORT_ALLOCATOR_H_
henrike@webrtc.org269fb4b2014-10-28 22:20:1113
Taylor Brandstettera1c30352016-05-13 15:15:1114#include <deque>
15#include <memory>
henrike@webrtc.org269fb4b2014-10-28 22:20:1116#include <string>
17#include <vector>
18
Artem Titov06159aa2021-02-09 22:38:1319#include "api/sequence_checker.h"
Honghai Zhangf8998cf2019-10-14 18:27:5020#include "api/transport/enums.h"
Mirko Bonadei92ea95e2017-09-15 04:47:3121#include "p2p/base/port.h"
Steve Anton10542f22019-01-11 17:11:0022#include "p2p/base/port_interface.h"
Mirko Bonadei92ea95e2017-09-15 04:47:3123#include "rtc_base/helpers.h"
Steve Anton10542f22019-01-11 17:11:0024#include "rtc_base/proxy_info.h"
25#include "rtc_base/ssl_certificate.h"
Mirko Bonadei3b56ee72018-10-15 15:15:1226#include "rtc_base/system/rtc_export.h"
Artem Titove41c4332018-07-25 13:04:2827#include "rtc_base/third_party/sigslot/sigslot.h"
Mirko Bonadei92ea95e2017-09-15 04:47:3128#include "rtc_base/thread.h"
henrike@webrtc.org269fb4b2014-10-28 22:20:1129
Honghai Zhangd93f50c2016-10-05 18:47:2230namespace webrtc {
Jonas Orelandbdcee282017-10-10 12:01:4031class TurnCustomizer;
Yves Gerey665174f2018-06-19 13:03:0532} // namespace webrtc
Honghai Zhangd93f50c2016-10-05 18:47:2233
henrike@webrtc.org269fb4b2014-10-28 22:20:1134namespace cricket {
35
36// PortAllocator is responsible for allocating Port types for a given
37// P2PSocket. It also handles port freeing.
38//
39// Clients can override this class to control port allocation, including
40// what kinds of ports are allocated.
41
42enum {
Guo-wei Shieh13d35f62015-08-26 22:32:5643 // Disable local UDP ports. This doesn't impact how we connect to relay
44 // servers.
henrike@webrtc.org269fb4b2014-10-28 22:20:1145 PORTALLOCATOR_DISABLE_UDP = 0x01,
46 PORTALLOCATOR_DISABLE_STUN = 0x02,
47 PORTALLOCATOR_DISABLE_RELAY = 0x04,
Guo-wei Shieh13d35f62015-08-26 22:32:5648 // Disable local TCP ports. This doesn't impact how we connect to relay
49 // servers.
henrike@webrtc.org269fb4b2014-10-28 22:20:1150 PORTALLOCATOR_DISABLE_TCP = 0x08,
henrike@webrtc.org269fb4b2014-10-28 22:20:1151 PORTALLOCATOR_ENABLE_IPV6 = 0x40,
henrike@webrtc.org269fb4b2014-10-28 22:20:1152 PORTALLOCATOR_ENABLE_SHARED_SOCKET = 0x100,
53 PORTALLOCATOR_ENABLE_STUN_RETRANSMIT_ATTRIBUTE = 0x200,
Guo-wei Shieh9af97f82015-11-10 22:47:3954 // When specified, we'll only allocate the STUN candidate for the public
55 // interface as seen by regular http traffic and the HOST candidate associated
56 // with the default local interface.
guoweis@webrtc.orgf358aea2015-02-18 18:44:0157 PORTALLOCATOR_DISABLE_ADAPTER_ENUMERATION = 0x400,
Guo-wei Shieh9af97f82015-11-10 22:47:3958 // When specified along with PORTALLOCATOR_DISABLE_ADAPTER_ENUMERATION, the
59 // default local candidate mentioned above will not be allocated. Only the
60 // STUN candidate will be.
61 PORTALLOCATOR_DISABLE_DEFAULT_LOCAL_CANDIDATE = 0x800,
Guo-wei Shieh13d35f62015-08-26 22:32:5662 // Disallow use of UDP when connecting to a relay server. Since proxy servers
63 // usually don't handle UDP, using UDP will leak the IP address.
64 PORTALLOCATOR_DISABLE_UDP_RELAY = 0x1000,
honghaiz60347052016-06-01 01:29:1265
66 // When multiple networks exist, do not gather candidates on the ones with
67 // high cost. So if both Wi-Fi and cellular networks exist, gather only on the
68 // Wi-Fi network. If a network type is "unknown", it has a cost lower than
69 // cellular but higher than Wi-Fi/Ethernet. So if an unknown network exists,
70 // cellular networks will not be used to gather candidates and if a Wi-Fi
71 // network is present, "unknown" networks will not be usd to gather
72 // candidates. Doing so ensures that even if a cellular network type was not
73 // detected initially, it would not be used if a Wi-Fi network is present.
74 PORTALLOCATOR_DISABLE_COSTLY_NETWORKS = 0x2000,
zhihuangb09b3f92017-03-07 22:40:5175
76 // When specified, do not collect IPv6 ICE candidates on Wi-Fi.
77 PORTALLOCATOR_ENABLE_IPV6_ON_WIFI = 0x4000,
deadbeef1ee21252017-06-13 22:49:4578
Mirko Bonadei5f4d47b2018-08-22 17:41:2279 // When this flag is set, ports not bound to any specific network interface
80 // will be used, in addition to normal ports bound to the enumerated
81 // interfaces. Without this flag, these "any address" ports would only be
82 // used when network enumeration fails or is disabled. But under certain
83 // conditions, these ports may succeed where others fail, so they may allow
84 // the application to work in a wider variety of environments, at the expense
85 // of having to allocate additional candidates.
Qingsi Wangefbcb312018-08-21 23:23:2686 PORTALLOCATOR_ENABLE_ANY_ADDRESS_PORTS = 0x8000,
87
Daniel Lazarenko2870b0a2018-01-25 09:30:2288 // Exclude link-local network interfaces
89 // from considertaion after adapter enumeration.
Qingsi Wangefbcb312018-08-21 23:23:2690 PORTALLOCATOR_DISABLE_LINK_LOCAL_NETWORKS = 0x10000,
henrike@webrtc.org269fb4b2014-10-28 22:20:1191};
92
Honghai Zhangd93f50c2016-10-05 18:47:2293// Defines various reasons that have caused ICE regathering.
Steve Anton300bf8e2017-07-14 17:13:1094enum class IceRegatheringReason {
95 NETWORK_CHANGE, // Network interfaces on the device changed
96 NETWORK_FAILURE, // Regather only on networks that have failed
97 OCCASIONAL_REFRESH, // Periodic regather on all networks
98 MAX_VALUE
99};
Honghai Zhangd93f50c2016-10-05 18:47:22100
Peter Boström0c4e06b2015-10-07 10:23:21101const uint32_t kDefaultPortAllocatorFlags = 0;
henrike@webrtc.org269fb4b2014-10-28 22:20:11102
Peter Boström0c4e06b2015-10-07 10:23:21103const uint32_t kDefaultStepDelay = 1000; // 1 sec step delay.
henrike@webrtc.org269fb4b2014-10-28 22:20:11104// As per RFC 5245 Appendix B.1, STUN transactions need to be paced at certain
105// internal. Less than 20ms is not acceptable. We choose 50ms as our default.
Peter Boström0c4e06b2015-10-07 10:23:21106const uint32_t kMinimumStepDelay = 50;
henrike@webrtc.org269fb4b2014-10-28 22:20:11107
deadbeef3427f532017-07-26 23:09:33108// Turning on IPv6 could make many IPv6 interfaces available for connectivity
109// check and delay the call setup time. kDefaultMaxIPv6Networks is the default
110// upper limit of IPv6 networks but could be changed by
111// set_max_ipv6_networks().
112constexpr int kDefaultMaxIPv6Networks = 5;
113
henrike@webrtc.org269fb4b2014-10-28 22:20:11114// CF = CANDIDATE FILTER
Oleh Prypinfd7df982017-12-21 15:25:19115enum : uint32_t {
henrike@webrtc.org269fb4b2014-10-28 22:20:11116 CF_NONE = 0x0,
117 CF_HOST = 0x1,
118 CF_REFLEXIVE = 0x2,
119 CF_RELAY = 0x4,
120 CF_ALL = 0x7,
121};
122
Sergey Silkin9c147dd2018-09-12 10:45:38123// TLS certificate policy.
124enum class TlsCertPolicy {
125 // For TLS based protocols, ensure the connection is secure by not
126 // circumventing certificate validation.
127 TLS_CERT_POLICY_SECURE,
128 // For TLS based protocols, disregard security completely by skipping
129 // certificate validation. This is insecure and should never be used unless
130 // security is irrelevant in that particular context.
131 TLS_CERT_POLICY_INSECURE_NO_CHECK,
132};
133
deadbeef653b8e02015-11-11 20:55:10134// TODO(deadbeef): Rename to TurnCredentials (and username to ufrag).
135struct RelayCredentials {
136 RelayCredentials() {}
137 RelayCredentials(const std::string& username, const std::string& password)
138 : username(username), password(password) {}
139
Taylor Brandstettera1c30352016-05-13 15:15:11140 bool operator==(const RelayCredentials& o) const {
141 return username == o.username && password == o.password;
142 }
143 bool operator!=(const RelayCredentials& o) const { return !(*this == o); }
144
deadbeef653b8e02015-11-11 20:55:10145 std::string username;
146 std::string password;
147};
148
149typedef std::vector<ProtocolAddress> PortList;
150// TODO(deadbeef): Rename to TurnServerConfig.
Mirko Bonadei3b56ee72018-10-15 15:15:12151struct RTC_EXPORT RelayServerConfig {
Niels Möller191e38f2019-11-04 07:49:12152 RelayServerConfig();
Emad Omaradab1d2d2017-06-16 22:43:11153 RelayServerConfig(const rtc::SocketAddress& address,
154 const std::string& username,
155 const std::string& password,
Steve Anton7995d8c2017-10-30 23:23:38156 ProtocolType proto);
Taylor Brandstetter0c7e9f52015-12-29 22:14:52157 RelayServerConfig(const std::string& address,
158 int port,
159 const std::string& username,
160 const std::string& password,
Steve Anton7995d8c2017-10-30 23:23:38161 ProtocolType proto);
hnsl277b2502016-12-13 13:17:23162 // Legacy constructor where "secure" and PROTO_TCP implies PROTO_TLS.
163 RelayServerConfig(const std::string& address,
164 int port,
165 const std::string& username,
166 const std::string& password,
Taylor Brandstetter0c7e9f52015-12-29 22:14:52167 ProtocolType proto,
Steve Anton7995d8c2017-10-30 23:23:38168 bool secure);
169 RelayServerConfig(const RelayServerConfig&);
170 ~RelayServerConfig();
Taylor Brandstetter0c7e9f52015-12-29 22:14:52171
Taylor Brandstettera1c30352016-05-13 15:15:11172 bool operator==(const RelayServerConfig& o) const {
Niels Möller191e38f2019-11-04 07:49:12173 return ports == o.ports && credentials == o.credentials &&
Taylor Brandstettera1c30352016-05-13 15:15:11174 priority == o.priority;
175 }
176 bool operator!=(const RelayServerConfig& o) const { return !(*this == o); }
177
deadbeef653b8e02015-11-11 20:55:10178 PortList ports;
179 RelayCredentials credentials;
Taylor Brandstettera1c30352016-05-13 15:15:11180 int priority = 0;
hnsl04833622017-01-09 16:35:45181 TlsCertPolicy tls_cert_policy = TlsCertPolicy::TLS_CERT_POLICY_SECURE;
Diogo Real1dca9d52017-08-29 19:18:32182 std::vector<std::string> tls_alpn_protocols;
Diogo Real7bd1f1b2017-09-08 19:50:41183 std::vector<std::string> tls_elliptic_curves;
Benjamin Wrightd6f86e82018-05-08 20:12:25184 rtc::SSLCertificateVerifier* tls_cert_verifier = nullptr;
Jonas Oreland3c028422019-08-22 14:16:35185 std::string turn_logging_id;
deadbeef653b8e02015-11-11 20:55:10186};
187
Mirko Bonadei3b56ee72018-10-15 15:15:12188class RTC_EXPORT PortAllocatorSession : public sigslot::has_slots<> {
henrike@webrtc.org269fb4b2014-10-28 22:20:11189 public:
190 // Content name passed in mostly for logging and debugging.
henrike@webrtc.org269fb4b2014-10-28 22:20:11191 PortAllocatorSession(const std::string& content_name,
192 int component,
deadbeefcbecd352015-09-23 18:50:27193 const std::string& ice_ufrag,
194 const std::string& ice_pwd,
Peter Boström0c4e06b2015-10-07 10:23:21195 uint32_t flags);
henrike@webrtc.org269fb4b2014-10-28 22:20:11196
197 // Subclasses should clean up any ports created.
Steve Anton7995d8c2017-10-30 23:23:38198 ~PortAllocatorSession() override;
henrike@webrtc.org269fb4b2014-10-28 22:20:11199
Peter Boström0c4e06b2015-10-07 10:23:21200 uint32_t flags() const { return flags_; }
201 void set_flags(uint32_t flags) { flags_ = flags; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11202 std::string content_name() const { return content_name_; }
203 int component() const { return component_; }
Taylor Brandstettera1c30352016-05-13 15:15:11204 const std::string& ice_ufrag() const { return ice_ufrag_; }
205 const std::string& ice_pwd() const { return ice_pwd_; }
Jonas Oreland1cd39fa2018-10-11 05:47:12206 bool pooled() const { return pooled_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11207
Taylor Brandstetter417eebe2016-05-23 23:02:19208 // Setting this filter should affect not only candidates gathered in the
209 // future, but candidates already gathered and ports already "ready",
210 // which would be returned by ReadyCandidates() and ReadyPorts().
211 //
212 // Default filter should be CF_ALL.
213 virtual void SetCandidateFilter(uint32_t filter) = 0;
214
deadbeefb60a8192016-08-24 22:15:00215 // Starts gathering ports and ICE candidates.
Honghai Zhangd8f6fc42016-07-02 00:31:12216 virtual void StartGettingPorts() = 0;
deadbeefb60a8192016-08-24 22:15:00217 // Completely stops gathering. Will not gather again unless StartGettingPorts
218 // is called again.
Honghai Zhangd8f6fc42016-07-02 00:31:12219 virtual void StopGettingPorts() = 0;
Honghai Zhang5622c5e2016-07-01 20:59:29220 // Whether the session is actively getting ports.
Honghai Zhangd8f6fc42016-07-02 00:31:12221 virtual bool IsGettingPorts() = 0;
deadbeefb60a8192016-08-24 22:15:00222
223 //
224 // NOTE: The group of methods below is only used for continual gathering.
225 //
226
227 // ClearGettingPorts should have the same immediate effect as
228 // StopGettingPorts, but if the implementation supports continual gathering,
229 // ClearGettingPorts allows additional ports/candidates to be gathered if the
230 // network conditions change.
Honghai Zhangd8f6fc42016-07-02 00:31:12231 virtual void ClearGettingPorts() = 0;
Honghai Zhang5622c5e2016-07-01 20:59:29232 // Whether it is in the state where the existing gathering process is stopped,
233 // but new ones may be started (basically after calling ClearGettingPorts).
Steve Anton7995d8c2017-10-30 23:23:38234 virtual bool IsCleared() const;
Honghai Zhang5622c5e2016-07-01 20:59:29235 // Whether the session has completely stopped.
Steve Anton7995d8c2017-10-30 23:23:38236 virtual bool IsStopped() const;
Honghai Zhang5622c5e2016-07-01 20:59:29237 // Re-gathers candidates on networks that do not have any connections. More
238 // precisely, a network interface may have more than one IP addresses (e.g.,
239 // IPv4 and IPv6 addresses). Each address subnet will be used to create a
240 // network. Only if all networks of an interface have no connection, the
241 // implementation should start re-gathering on all networks of that interface.
242 virtual void RegatherOnFailedNetworks() {}
Qingsi Wang72a43a12018-02-21 00:03:18243 // Get candidate-level stats from all candidates on the ready ports and return
244 // the stats to the given list.
245 virtual void GetCandidateStatsFromReadyPorts(
Qingsi Wang7627fdd2019-08-19 23:07:40246 CandidateStatsList* candidate_stats_list) const {}
Qingsi Wangdb53f8e2018-02-20 22:45:49247 // Set the interval at which STUN candidates will resend STUN binding requests
248 // on the underlying ports to keep NAT bindings open.
249 // The default value of the interval in implementation is restored if a null
250 // optional value is passed.
251 virtual void SetStunKeepaliveIntervalForReadyPorts(
Danil Chapovalov00c718362018-06-15 13:58:38252 const absl::optional<int>& stun_keepalive_interval) {}
Taylor Brandstettera1c30352016-05-13 15:15:11253 // Another way of getting the information provided by the signals below.
254 //
255 // Ports and candidates are not guaranteed to be in the same order as the
256 // signals were emitted in.
257 virtual std::vector<PortInterface*> ReadyPorts() const = 0;
258 virtual std::vector<Candidate> ReadyCandidates() const = 0;
259 virtual bool CandidatesAllocationDone() const = 0;
Honghai Zhanga74363c2016-07-29 01:06:15260 // Marks all ports in the current session as "pruned" so that they may be
261 // destroyed if no connection is using them.
262 virtual void PruneAllPorts() {}
Taylor Brandstettera1c30352016-05-13 15:15:11263
henrike@webrtc.org269fb4b2014-10-28 22:20:11264 sigslot::signal2<PortAllocatorSession*, PortInterface*> SignalPortReady;
Honghai Zhang8eeecab2016-07-28 20:20:15265 // Fires this signal when the network of the ports failed (either because the
266 // interface is down, or because there is no connection on the interface),
267 // or when TURN ports are pruned because a higher-priority TURN port becomes
268 // ready(pairable).
Honghai Zhang5622c5e2016-07-01 20:59:29269 sigslot::signal2<PortAllocatorSession*, const std::vector<PortInterface*>&>
Honghai Zhang8eeecab2016-07-28 20:20:15270 SignalPortsPruned;
Yves Gerey665174f2018-06-19 13:03:05271 sigslot::signal2<PortAllocatorSession*, const std::vector<Candidate>&>
272 SignalCandidatesReady;
Eldar Relloda13ea22019-06-01 09:23:43273 sigslot::signal2<PortAllocatorSession*, const IceCandidateErrorEvent&>
274 SignalCandidateError;
Honghai Zhang5622c5e2016-07-01 20:59:29275 // Candidates should be signaled to be removed when the port that generated
276 // the candidates is removed.
277 sigslot::signal2<PortAllocatorSession*, const std::vector<Candidate>&>
278 SignalCandidatesRemoved;
henrike@webrtc.org269fb4b2014-10-28 22:20:11279 sigslot::signal1<PortAllocatorSession*> SignalCandidatesAllocationDone;
280
Honghai Zhangd93f50c2016-10-05 18:47:22281 sigslot::signal2<PortAllocatorSession*, IceRegatheringReason>
282 SignalIceRegathering;
283
Steve Anton7995d8c2017-10-30 23:23:38284 virtual uint32_t generation();
285 virtual void set_generation(uint32_t generation);
henrike@webrtc.org269fb4b2014-10-28 22:20:11286 sigslot::signal1<PortAllocatorSession*> SignalDestroyed;
287
deadbeefc55fb302016-05-12 19:51:38288 protected:
Taylor Brandstettera1c30352016-05-13 15:15:11289 // This method is called when a pooled session (which doesn't have these
290 // properties initially) is returned by PortAllocator::TakePooledSession,
291 // and the content name, component, and ICE ufrag/pwd are updated.
292 //
293 // A subclass may need to override this method to perform additional actions,
294 // such as applying the updated information to ports and candidates.
295 virtual void UpdateIceParametersInternal() {}
296
deadbeefcbecd352015-09-23 18:50:27297 // TODO(deadbeef): Get rid of these when everyone switches to ice_ufrag and
298 // ice_pwd.
299 const std::string& username() const { return ice_ufrag_; }
300 const std::string& password() const { return ice_pwd_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11301
deadbeefc55fb302016-05-12 19:51:38302 private:
Taylor Brandstettera1c30352016-05-13 15:15:11303 void SetIceParameters(const std::string& content_name,
304 int component,
305 const std::string& ice_ufrag,
306 const std::string& ice_pwd) {
307 content_name_ = content_name;
308 component_ = component;
309 ice_ufrag_ = ice_ufrag;
310 ice_pwd_ = ice_pwd;
311 UpdateIceParametersInternal();
312 }
313
Jonas Oreland1cd39fa2018-10-11 05:47:12314 void set_pooled(bool value) { pooled_ = value; }
315
deadbeefc55fb302016-05-12 19:51:38316 uint32_t flags_;
317 uint32_t generation_;
Taylor Brandstettera1c30352016-05-13 15:15:11318 std::string content_name_;
319 int component_;
deadbeefcbecd352015-09-23 18:50:27320 std::string ice_ufrag_;
321 std::string ice_pwd_;
Taylor Brandstettera1c30352016-05-13 15:15:11322
Jonas Oreland1cd39fa2018-10-11 05:47:12323 bool pooled_ = false;
324
Taylor Brandstettera1c30352016-05-13 15:15:11325 // SetIceParameters is an implementation detail which only PortAllocator
326 // should be able to call.
327 friend class PortAllocator;
henrike@webrtc.org269fb4b2014-10-28 22:20:11328};
329
Taylor Brandstetterf8e65772016-06-28 00:20:15330// Every method of PortAllocator (including the destructor) must be called on
Qingsi Wanga2d60672018-04-11 23:57:45331// the same thread after Initialize is called.
Taylor Brandstetterf8e65772016-06-28 00:20:15332//
Qingsi Wanga2d60672018-04-11 23:57:45333// This allows a PortAllocator subclass to be constructed and configured on one
334// thread, and passed into an object that uses it on a different thread.
Mirko Bonadei3b56ee72018-10-15 15:15:12335class RTC_EXPORT PortAllocator : public sigslot::has_slots<> {
henrike@webrtc.org269fb4b2014-10-28 22:20:11336 public:
Steve Anton7995d8c2017-10-30 23:23:38337 PortAllocator();
338 ~PortAllocator() override;
henrike@webrtc.org269fb4b2014-10-28 22:20:11339
Qingsi Wanga2d60672018-04-11 23:57:45340 // This MUST be called on the PortAllocator's thread after finishing
341 // constructing and configuring the PortAllocator subclasses.
342 virtual void Initialize();
Taylor Brandstetterf8e65772016-06-28 00:20:15343
Jonas Oreland1cd39fa2018-10-11 05:47:12344 // Set to true if some Ports need to know the ICE credentials when they are
345 // created. This will ensure that the PortAllocator will only match pooled
346 // allocator sessions to the ICE transport with the same credentials.
347 virtual void set_restrict_ice_credentials_change(bool value);
348
Taylor Brandstettera1c30352016-05-13 15:15:11349 // Set STUN and TURN servers to be used in future sessions, and set
350 // candidate pool size, as described in JSEP.
351 //
deadbeef42a42632017-03-10 23:18:00352 // If the servers are changing, and the candidate pool size is nonzero, and
353 // FreezeCandidatePool hasn't been called, existing pooled sessions will be
354 // destroyed and new ones created.
Taylor Brandstettera1c30352016-05-13 15:15:11355 //
deadbeef42a42632017-03-10 23:18:00356 // If the servers are not changing but the candidate pool size is, and
357 // FreezeCandidatePool hasn't been called, pooled sessions will be either
358 // created or destroyed as necessary.
deadbeef6de92f92016-12-13 02:49:32359 //
360 // Returns true if the configuration could successfully be changed.
Honghai Zhangf8998cf2019-10-14 18:27:50361 // Deprecated
deadbeef6de92f92016-12-13 02:49:32362 bool SetConfiguration(const ServerAddresses& stun_servers,
Taylor Brandstettera1c30352016-05-13 15:15:11363 const std::vector<RelayServerConfig>& turn_servers,
Honghai Zhangb9e7b4a2016-07-01 03:52:02364 int candidate_pool_size,
Jonas Orelandbdcee282017-10-10 12:01:40365 bool prune_turn_ports,
Qingsi Wangdb53f8e2018-02-20 22:45:49366 webrtc::TurnCustomizer* turn_customizer = nullptr,
Danil Chapovalov00c718362018-06-15 13:58:38367 const absl::optional<int>&
368 stun_candidate_keepalive_interval = absl::nullopt);
Honghai Zhangf8998cf2019-10-14 18:27:50369 bool SetConfiguration(const ServerAddresses& stun_servers,
370 const std::vector<RelayServerConfig>& turn_servers,
371 int candidate_pool_size,
372 webrtc::PortPrunePolicy turn_port_prune_policy,
373 webrtc::TurnCustomizer* turn_customizer = nullptr,
374 const absl::optional<int>&
375 stun_candidate_keepalive_interval = absl::nullopt);
Taylor Brandstettera1c30352016-05-13 15:15:11376
Qingsi Wanga2d60672018-04-11 23:57:45377 const ServerAddresses& stun_servers() const {
378 CheckRunOnValidThreadIfInitialized();
379 return stun_servers_;
380 }
Taylor Brandstettera1c30352016-05-13 15:15:11381
382 const std::vector<RelayServerConfig>& turn_servers() const {
Qingsi Wanga2d60672018-04-11 23:57:45383 CheckRunOnValidThreadIfInitialized();
Taylor Brandstettera1c30352016-05-13 15:15:11384 return turn_servers_;
385 }
386
Qingsi Wanga2d60672018-04-11 23:57:45387 int candidate_pool_size() const {
388 CheckRunOnValidThreadIfInitialized();
389 return candidate_pool_size_;
390 }
391
Danil Chapovalov00c718362018-06-15 13:58:38392 const absl::optional<int>& stun_candidate_keepalive_interval() const {
Qingsi Wanga2d60672018-04-11 23:57:45393 CheckRunOnValidThreadIfInitialized();
Qingsi Wangdb53f8e2018-02-20 22:45:49394 return stun_candidate_keepalive_interval_;
395 }
deadbeef653b8e02015-11-11 20:55:10396
Taylor Brandstetter0c7e9f52015-12-29 22:14:52397 // Sets the network types to ignore.
398 // Values are defined by the AdapterType enum.
399 // For instance, calling this with
400 // ADAPTER_TYPE_ETHERNET | ADAPTER_TYPE_LOOPBACK will ignore Ethernet and
401 // loopback interfaces.
402 virtual void SetNetworkIgnoreMask(int network_ignore_mask) = 0;
403
Taylor Brandstettera1c30352016-05-13 15:15:11404 std::unique_ptr<PortAllocatorSession> CreateSession(
henrike@webrtc.org269fb4b2014-10-28 22:20:11405 const std::string& content_name,
406 int component,
407 const std::string& ice_ufrag,
408 const std::string& ice_pwd);
409
Taylor Brandstettera1c30352016-05-13 15:15:11410 // Get an available pooled session and set the transport information on it.
411 //
412 // Caller takes ownership of the returned session.
413 //
Jonas Oreland1cd39fa2018-10-11 05:47:12414 // If restrict_ice_credentials_change is TRUE, then it will only
415 // return a pooled session with matching ice credentials.
Taylor Brandstettera1c30352016-05-13 15:15:11416 // If no pooled sessions are available, returns null.
417 std::unique_ptr<PortAllocatorSession> TakePooledSession(
418 const std::string& content_name,
419 int component,
420 const std::string& ice_ufrag,
421 const std::string& ice_pwd);
422
Jonas Oreland1cd39fa2018-10-11 05:47:12423 // Returns the next session that would be returned by TakePooledSession
424 // optionally restricting it to sessions with specified ice credentials.
425 const PortAllocatorSession* GetPooledSession(
426 const IceParameters* ice_credentials = nullptr) const;
Taylor Brandstettera1c30352016-05-13 15:15:11427
deadbeef42a42632017-03-10 23:18:00428 // After FreezeCandidatePool is called, changing the candidate pool size will
429 // no longer be allowed, and changing ICE servers will not cause pooled
430 // sessions to be recreated.
431 //
432 // Expected to be called when SetLocalDescription is called on a
433 // PeerConnection. Can be called safely on any thread as long as not
434 // simultaneously with SetConfiguration.
435 void FreezeCandidatePool();
436
437 // Discard any remaining pooled sessions.
438 void DiscardCandidatePool();
439
Qingsi Wang7627fdd2019-08-19 23:07:40440 // Clears the address and the related address fields of a local candidate to
441 // avoid IP leakage. This is applicable in several scenarios:
442 // 1. Sanitization is configured via the candidate filter.
443 // 2. Sanitization is configured via the port allocator flags.
444 // 3. mDNS concealment of private IPs is enabled.
445 Candidate SanitizeCandidate(const Candidate& c) const;
446
Qingsi Wanga2d60672018-04-11 23:57:45447 uint32_t flags() const {
448 CheckRunOnValidThreadIfInitialized();
449 return flags_;
450 }
451
452 void set_flags(uint32_t flags) {
453 CheckRunOnValidThreadIfInitialized();
454 flags_ = flags;
455 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11456
deadbeeff137e972017-03-23 22:45:49457 // These three methods are deprecated. If connections need to go through a
458 // proxy, the application should create a BasicPortAllocator given a custom
459 // PacketSocketFactory that creates proxy sockets.
Qingsi Wanga2d60672018-04-11 23:57:45460 const std::string& user_agent() const {
461 CheckRunOnValidThreadIfInitialized();
462 return agent_;
463 }
464
465 const rtc::ProxyInfo& proxy() const {
466 CheckRunOnValidThreadIfInitialized();
467 return proxy_;
468 }
469
deadbeeff137e972017-03-23 22:45:49470 void set_proxy(const std::string& agent, const rtc::ProxyInfo& proxy) {
Qingsi Wanga2d60672018-04-11 23:57:45471 CheckRunOnValidThreadIfInitialized();
deadbeeff137e972017-03-23 22:45:49472 agent_ = agent;
473 proxy_ = proxy;
474 }
475
henrike@webrtc.org269fb4b2014-10-28 22:20:11476 // Gets/Sets the port range to use when choosing client ports.
Qingsi Wanga2d60672018-04-11 23:57:45477 int min_port() const {
478 CheckRunOnValidThreadIfInitialized();
479 return min_port_;
480 }
481
482 int max_port() const {
483 CheckRunOnValidThreadIfInitialized();
484 return max_port_;
485 }
486
henrike@webrtc.org269fb4b2014-10-28 22:20:11487 bool SetPortRange(int min_port, int max_port) {
Qingsi Wanga2d60672018-04-11 23:57:45488 CheckRunOnValidThreadIfInitialized();
henrike@webrtc.org269fb4b2014-10-28 22:20:11489 if (min_port > max_port) {
490 return false;
491 }
492
493 min_port_ = min_port;
494 max_port_ = max_port;
495 return true;
496 }
497
deadbeef3427f532017-07-26 23:09:33498 // Can be used to change the default numer of IPv6 network interfaces used
499 // (5). Can set to INT_MAX to effectively disable the limit.
500 //
501 // TODO(deadbeef): Applications shouldn't have to arbitrarily limit the
502 // number of available IPv6 network interfaces just because they could slow
503 // ICE down. We should work on making our ICE logic smarter (for example,
504 // prioritizing pinging connections that are most likely to work) so that
505 // every network interface can be used without impacting ICE's speed.
Qingsi Wanga2d60672018-04-11 23:57:45506 void set_max_ipv6_networks(int networks) {
507 CheckRunOnValidThreadIfInitialized();
508 max_ipv6_networks_ = networks;
509 }
510
511 int max_ipv6_networks() {
512 CheckRunOnValidThreadIfInitialized();
513 return max_ipv6_networks_;
514 }
deadbeef3427f532017-07-26 23:09:33515
deadbeef1c5e6d02017-09-16 00:46:56516 // Delay between different candidate gathering phases (UDP, TURN, TCP).
517 // Defaults to 1 second, but PeerConnection sets it to 50ms.
518 // TODO(deadbeef): Get rid of this. Its purpose is to avoid sending too many
519 // STUN transactions at once, but that's already happening if you configure
520 // multiple STUN servers or have multiple network interfaces. We should
521 // implement some global pacing logic instead if that's our goal.
Qingsi Wanga2d60672018-04-11 23:57:45522 uint32_t step_delay() const {
523 CheckRunOnValidThreadIfInitialized();
524 return step_delay_;
525 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11526
Qingsi Wanga2d60672018-04-11 23:57:45527 void set_step_delay(uint32_t delay) {
528 CheckRunOnValidThreadIfInitialized();
529 step_delay_ = delay;
530 }
531
532 bool allow_tcp_listen() const {
533 CheckRunOnValidThreadIfInitialized();
534 return allow_tcp_listen_;
535 }
536
henrike@webrtc.org269fb4b2014-10-28 22:20:11537 void set_allow_tcp_listen(bool allow_tcp_listen) {
Qingsi Wanga2d60672018-04-11 23:57:45538 CheckRunOnValidThreadIfInitialized();
henrike@webrtc.org269fb4b2014-10-28 22:20:11539 allow_tcp_listen_ = allow_tcp_listen;
540 }
541
Qingsi Wanga2d60672018-04-11 23:57:45542 uint32_t candidate_filter() {
543 CheckRunOnValidThreadIfInitialized();
544 return candidate_filter_;
545 }
546
Qingsi Wangc129c352019-04-18 17:41:58547 // The new filter value will be populated to future allocation sessions, when
548 // they are created via CreateSession, and also pooled sessions when one is
549 // taken via TakePooledSession.
550 //
551 // A change in the candidate filter also fires a signal
552 // |SignalCandidateFilterChanged|, so that objects subscribed to this signal
553 // can, for example, update the candidate filter for sessions created by this
554 // allocator and already taken by the object.
555 //
556 // Specifically for the session taken by the ICE transport, we currently do
557 // not support removing candidate pairs formed with local candidates from this
558 // session that are disabled by the new candidate filter.
559 void SetCandidateFilter(uint32_t filter);
560 // Deprecated.
561 // TODO(qingsi): Remove this after Chromium migrates to the new method.
562 void set_candidate_filter(uint32_t filter) { SetCandidateFilter(filter); }
henrike@webrtc.org269fb4b2014-10-28 22:20:11563
Honghai Zhangf8998cf2019-10-14 18:27:50564 // Deprecated (by the next method).
Qingsi Wanga2d60672018-04-11 23:57:45565 bool prune_turn_ports() const {
566 CheckRunOnValidThreadIfInitialized();
Honghai Zhangf8998cf2019-10-14 18:27:50567 return turn_port_prune_policy_ == webrtc::PRUNE_BASED_ON_PRIORITY;
568 }
569
570 webrtc::PortPrunePolicy turn_port_prune_policy() const {
571 CheckRunOnValidThreadIfInitialized();
572 return turn_port_prune_policy_;
Qingsi Wanga2d60672018-04-11 23:57:45573 }
Honghai Zhangb9e7b4a2016-07-01 03:52:02574
pthatcher@webrtc.org0ba15332015-01-10 00:47:02575 // Gets/Sets the Origin value used for WebRTC STUN requests.
Qingsi Wanga2d60672018-04-11 23:57:45576 const std::string& origin() const {
577 CheckRunOnValidThreadIfInitialized();
578 return origin_;
579 }
580
581 void set_origin(const std::string& origin) {
582 CheckRunOnValidThreadIfInitialized();
583 origin_ = origin;
584 }
pthatcher@webrtc.org0ba15332015-01-10 00:47:02585
Jonas Orelandbdcee282017-10-10 12:01:40586 webrtc::TurnCustomizer* turn_customizer() {
Qingsi Wanga2d60672018-04-11 23:57:45587 CheckRunOnValidThreadIfInitialized();
Jonas Orelandbdcee282017-10-10 12:01:40588 return turn_customizer_;
589 }
590
Qingsi Wang72a43a12018-02-21 00:03:18591 // Collect candidate stats from pooled allocator sessions. This can be used to
592 // collect candidate stats without creating an offer/answer or setting local
593 // description. After the local description is set, the ownership of the
594 // pooled session is taken by P2PTransportChannel, and the
595 // candidate stats can be collected from P2PTransportChannel::GetStats.
596 virtual void GetCandidateStatsFromPooledSessions(
597 CandidateStatsList* candidate_stats_list);
598
Jonas Oreland1cd39fa2018-10-11 05:47:12599 // Return IceParameters of the pooled sessions.
600 std::vector<IceParameters> GetPooledIceCredentials();
601
Qingsi Wangc129c352019-04-18 17:41:58602 // Fired when |candidate_filter_| changes.
603 sigslot::signal2<uint32_t /* prev_filter */, uint32_t /* cur_filter */>
604 SignalCandidateFilterChanged;
605
henrike@webrtc.org269fb4b2014-10-28 22:20:11606 protected:
607 virtual PortAllocatorSession* CreateSessionInternal(
608 const std::string& content_name,
609 int component,
610 const std::string& ice_ufrag,
611 const std::string& ice_pwd) = 0;
612
Jonas Oreland1cd39fa2018-10-11 05:47:12613 const std::vector<std::unique_ptr<PortAllocatorSession>>& pooled_sessions() {
Honghai Zhangd93f50c2016-10-05 18:47:22614 return pooled_sessions_;
615 }
616
Qingsi Wang7627fdd2019-08-19 23:07:40617 // Returns true if there is an mDNS responder attached to the network manager.
618 virtual bool MdnsObfuscationEnabled() const { return false; }
619
Qingsi Wanga2d60672018-04-11 23:57:45620 // The following thread checks are only done in DCHECK for the consistency
621 // with the exsiting thread checks.
622 void CheckRunOnValidThreadIfInitialized() const {
Sebastian Janssonc01367d2019-04-08 13:20:44623 RTC_DCHECK(!initialized_ || thread_checker_.IsCurrent());
Qingsi Wanga2d60672018-04-11 23:57:45624 }
625
626 void CheckRunOnValidThreadAndInitialized() const {
Sebastian Janssonc01367d2019-04-08 13:20:44627 RTC_DCHECK(initialized_ && thread_checker_.IsCurrent());
Qingsi Wanga2d60672018-04-11 23:57:45628 }
629
630 bool initialized_ = false;
Peter Boström0c4e06b2015-10-07 10:23:21631 uint32_t flags_;
deadbeeff137e972017-03-23 22:45:49632 std::string agent_;
633 rtc::ProxyInfo proxy_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11634 int min_port_;
635 int max_port_;
deadbeef3427f532017-07-26 23:09:33636 int max_ipv6_networks_;
Peter Boström0c4e06b2015-10-07 10:23:21637 uint32_t step_delay_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11638 bool allow_tcp_listen_;
Peter Boström0c4e06b2015-10-07 10:23:21639 uint32_t candidate_filter_;
pthatcher@webrtc.org0ba15332015-01-10 00:47:02640 std::string origin_;
Artem Titov06159aa2021-02-09 22:38:13641 webrtc::SequenceChecker thread_checker_;
Taylor Brandstettera1c30352016-05-13 15:15:11642
643 private:
644 ServerAddresses stun_servers_;
645 std::vector<RelayServerConfig> turn_servers_;
deadbeef6de92f92016-12-13 02:49:32646 int candidate_pool_size_ = 0; // Last value passed into SetConfiguration.
Jonas Oreland1cd39fa2018-10-11 05:47:12647 std::vector<std::unique_ptr<PortAllocatorSession>> pooled_sessions_;
deadbeef42a42632017-03-10 23:18:00648 bool candidate_pool_frozen_ = false;
Honghai Zhangf8998cf2019-10-14 18:27:50649 webrtc::PortPrunePolicy turn_port_prune_policy_ = webrtc::NO_PRUNE;
Honghai Zhangd93f50c2016-10-05 18:47:22650
Jonas Orelandbdcee282017-10-10 12:01:40651 // Customizer for TURN messages.
652 // The instance is owned by application and will be shared among
653 // all TurnPort(s) created.
654 webrtc::TurnCustomizer* turn_customizer_ = nullptr;
Qingsi Wangdb53f8e2018-02-20 22:45:49655
Danil Chapovalov00c718362018-06-15 13:58:38656 absl::optional<int> stun_candidate_keepalive_interval_;
Jonas Oreland1cd39fa2018-10-11 05:47:12657
658 // If true, TakePooledSession() will only return sessions that has same ice
659 // credentials as requested.
660 bool restrict_ice_credentials_change_ = false;
661
662 // Returns iterator to pooled session with specified ice_credentials or first
663 // if ice_credentials is nullptr.
664 std::vector<std::unique_ptr<PortAllocatorSession>>::const_iterator
665 FindPooledSession(const IceParameters* ice_credentials = nullptr) const;
henrike@webrtc.org269fb4b2014-10-28 22:20:11666};
667
668} // namespace cricket
669
Steve Anton10542f22019-01-11 17:11:00670#endif // P2P_BASE_PORT_ALLOCATOR_H_