R=pbos@webrtc.org Review URL: https://webrtc-codereview.appspot.com/29319004 git-svn-id: http://webrtc.googlecode.com/svn/trunk@7977 4adac7df-926f-26a2-2b94-8c16560cd09d
1151 lines
38 KiB
C++
1151 lines
38 KiB
C++
/*
|
|
* Copyright 2004 The WebRTC Project Authors. All rights reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
|
|
#include "webrtc/libjingle/session/sessionmanager.h"
|
|
|
|
#include "webrtc/base/common.h"
|
|
#include "webrtc/base/helpers.h"
|
|
#include "webrtc/base/logging.h"
|
|
#include "webrtc/base/scoped_ptr.h"
|
|
#include "webrtc/base/stringencode.h"
|
|
#include "webrtc/libjingle/session/p2ptransportparser.h"
|
|
#include "webrtc/libjingle/session/sessionmessages.h"
|
|
#include "webrtc/libjingle/xmpp/constants.h"
|
|
#include "webrtc/libjingle/xmpp/jid.h"
|
|
#include "webrtc/p2p/base/constants.h"
|
|
|
|
namespace cricket {
|
|
|
|
bool BadMessage(const buzz::QName type,
|
|
const std::string& text,
|
|
MessageError* err) {
|
|
err->SetType(type);
|
|
err->SetText(text);
|
|
return false;
|
|
}
|
|
|
|
|
|
Session::Session(SessionManager* session_manager,
|
|
const std::string& local_name,
|
|
const std::string& initiator_name,
|
|
const std::string& sid,
|
|
const std::string& content_type,
|
|
SessionClient* client)
|
|
: BaseSession(session_manager->signaling_thread(),
|
|
session_manager->worker_thread(),
|
|
session_manager->port_allocator(),
|
|
sid, content_type, initiator_name == local_name) {
|
|
ASSERT(client != NULL);
|
|
session_manager_ = session_manager;
|
|
local_name_ = local_name;
|
|
initiator_name_ = initiator_name;
|
|
transport_parser_ = new P2PTransportParser();
|
|
client_ = client;
|
|
initiate_acked_ = false;
|
|
current_protocol_ = PROTOCOL_HYBRID;
|
|
}
|
|
|
|
Session::~Session() {
|
|
delete transport_parser_;
|
|
}
|
|
|
|
bool Session::Initiate(const std::string& to,
|
|
const SessionDescription* sdesc) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
SessionError error;
|
|
|
|
// Only from STATE_INIT
|
|
if (state() != STATE_INIT)
|
|
return false;
|
|
|
|
// Setup for signaling.
|
|
set_remote_name(to);
|
|
set_local_description(sdesc);
|
|
if (!CreateTransportProxies(GetEmptyTransportInfos(sdesc->contents()),
|
|
&error)) {
|
|
LOG(LS_ERROR) << "Could not create transports: " << error.text;
|
|
return false;
|
|
}
|
|
|
|
if (!SendInitiateMessage(sdesc, &error)) {
|
|
LOG(LS_ERROR) << "Could not send initiate message: " << error.text;
|
|
return false;
|
|
}
|
|
|
|
// We need to connect transport proxy and impl here so that we can process
|
|
// the TransportDescriptions.
|
|
SpeculativelyConnectAllTransportChannels();
|
|
|
|
PushdownTransportDescription(CS_LOCAL, CA_OFFER, NULL);
|
|
SetState(Session::STATE_SENTINITIATE);
|
|
return true;
|
|
}
|
|
|
|
bool Session::Accept(const SessionDescription* sdesc) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
|
|
// Only if just received initiate
|
|
if (state() != STATE_RECEIVEDINITIATE)
|
|
return false;
|
|
|
|
// Setup for signaling.
|
|
set_local_description(sdesc);
|
|
|
|
SessionError error;
|
|
if (!SendAcceptMessage(sdesc, &error)) {
|
|
LOG(LS_ERROR) << "Could not send accept message: " << error.text;
|
|
return false;
|
|
}
|
|
// TODO(juberti): Add BUNDLE support to transport-info messages.
|
|
PushdownTransportDescription(CS_LOCAL, CA_ANSWER, NULL);
|
|
MaybeEnableMuxingSupport(); // Enable transport channel mux if supported.
|
|
SetState(Session::STATE_SENTACCEPT);
|
|
return true;
|
|
}
|
|
|
|
bool Session::Reject(const std::string& reason) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
|
|
// Reject is sent in response to an initiate or modify, to reject the
|
|
// request
|
|
if (state() != STATE_RECEIVEDINITIATE && state() != STATE_RECEIVEDMODIFY)
|
|
return false;
|
|
|
|
SessionError error;
|
|
if (!SendRejectMessage(reason, &error)) {
|
|
LOG(LS_ERROR) << "Could not send reject message: " << error.text;
|
|
return false;
|
|
}
|
|
|
|
SetState(STATE_SENTREJECT);
|
|
return true;
|
|
}
|
|
|
|
bool Session::TerminateWithReason(const std::string& reason) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
|
|
// Either side can terminate, at any time.
|
|
switch (state()) {
|
|
case STATE_SENTTERMINATE:
|
|
case STATE_RECEIVEDTERMINATE:
|
|
return false;
|
|
|
|
case STATE_SENTREJECT:
|
|
case STATE_RECEIVEDREJECT:
|
|
// We don't need to send terminate if we sent or received a reject...
|
|
// it's implicit.
|
|
break;
|
|
|
|
default:
|
|
SessionError error;
|
|
if (!SendTerminateMessage(reason, &error)) {
|
|
LOG(LS_ERROR) << "Could not send terminate message: " << error.text;
|
|
return false;
|
|
}
|
|
break;
|
|
}
|
|
|
|
SetState(STATE_SENTTERMINATE);
|
|
return true;
|
|
}
|
|
|
|
bool Session::SendInfoMessage(const XmlElements& elems,
|
|
const std::string& remote_name) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
SessionError error;
|
|
if (!SendMessage(ACTION_SESSION_INFO, elems, remote_name, &error)) {
|
|
LOG(LS_ERROR) << "Could not send info message " << error.text;
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool Session::SendDescriptionInfoMessage(const ContentInfos& contents) {
|
|
XmlElements elems;
|
|
WriteError write_error;
|
|
if (!WriteDescriptionInfo(current_protocol_,
|
|
contents,
|
|
GetContentParsers(),
|
|
&elems, &write_error)) {
|
|
LOG(LS_ERROR) << "Could not write description info message: "
|
|
<< write_error.text;
|
|
return false;
|
|
}
|
|
SessionError error;
|
|
if (!SendMessage(ACTION_DESCRIPTION_INFO, elems, &error)) {
|
|
LOG(LS_ERROR) << "Could not send description info message: "
|
|
<< error.text;
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
TransportInfos Session::GetEmptyTransportInfos(
|
|
const ContentInfos& contents) const {
|
|
TransportInfos tinfos;
|
|
for (ContentInfos::const_iterator content = contents.begin();
|
|
content != contents.end(); ++content) {
|
|
tinfos.push_back(TransportInfo(content->name,
|
|
TransportDescription(transport_type(),
|
|
std::string(),
|
|
std::string())));
|
|
}
|
|
return tinfos;
|
|
}
|
|
|
|
bool Session::OnRemoteCandidates(
|
|
const TransportInfos& tinfos, ParseError* error) {
|
|
for (TransportInfos::const_iterator tinfo = tinfos.begin();
|
|
tinfo != tinfos.end(); ++tinfo) {
|
|
std::string str_error;
|
|
if (!BaseSession::OnRemoteCandidates(
|
|
tinfo->content_name, tinfo->description.candidates, &str_error)) {
|
|
return BadParse(str_error, error);
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool Session::CreateTransportProxies(const TransportInfos& tinfos,
|
|
SessionError* error) {
|
|
for (TransportInfos::const_iterator tinfo = tinfos.begin();
|
|
tinfo != tinfos.end(); ++tinfo) {
|
|
if (tinfo->description.transport_type != transport_type()) {
|
|
error->SetText("No supported transport in offer.");
|
|
return false;
|
|
}
|
|
|
|
GetOrCreateTransportProxy(tinfo->content_name);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
TransportParserMap Session::GetTransportParsers() {
|
|
TransportParserMap parsers;
|
|
parsers[transport_type()] = transport_parser_;
|
|
return parsers;
|
|
}
|
|
|
|
CandidateTranslatorMap Session::GetCandidateTranslators() {
|
|
CandidateTranslatorMap translators;
|
|
// NOTE: This technique makes it impossible to parse G-ICE
|
|
// candidates in session-initiate messages because the channels
|
|
// aren't yet created at that point. Since we don't use candidates
|
|
// in session-initiate messages, we should be OK. Once we switch to
|
|
// ICE, this translation shouldn't be necessary.
|
|
for (TransportMap::const_iterator iter = transport_proxies().begin();
|
|
iter != transport_proxies().end(); ++iter) {
|
|
translators[iter->first] = iter->second;
|
|
}
|
|
return translators;
|
|
}
|
|
|
|
ContentParserMap Session::GetContentParsers() {
|
|
ContentParserMap parsers;
|
|
parsers[content_type()] = client_;
|
|
// We need to be able parse both RTP-based and SCTP-based Jingle
|
|
// with the same client.
|
|
if (content_type() == NS_JINGLE_RTP) {
|
|
parsers[NS_JINGLE_DRAFT_SCTP] = client_;
|
|
}
|
|
return parsers;
|
|
}
|
|
|
|
void Session::OnTransportRequestSignaling(Transport* transport) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
TransportProxy* transproxy = GetTransportProxy(transport);
|
|
ASSERT(transproxy != NULL);
|
|
if (transproxy) {
|
|
// Reset candidate allocation status for the transport proxy.
|
|
transproxy->set_candidates_allocated(false);
|
|
}
|
|
SignalRequestSignaling(this);
|
|
}
|
|
|
|
void Session::OnTransportConnecting(Transport* transport) {
|
|
// This is an indication that we should begin watching the writability
|
|
// state of the transport.
|
|
OnTransportWritable(transport);
|
|
}
|
|
|
|
void Session::OnTransportWritable(Transport* transport) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
|
|
// If the transport is not writable, start a timer to make sure that it
|
|
// becomes writable within a reasonable amount of time. If it does not, we
|
|
// terminate since we can't actually send data. If the transport is writable,
|
|
// cancel the timer. Note that writability transitions may occur repeatedly
|
|
// during the lifetime of the session.
|
|
signaling_thread()->Clear(this, MSG_TIMEOUT);
|
|
if (transport->HasChannels() && !transport->writable()) {
|
|
signaling_thread()->PostDelayed(
|
|
session_manager_->session_timeout() * 1000, this, MSG_TIMEOUT);
|
|
}
|
|
}
|
|
|
|
void Session::OnTransportProxyCandidatesReady(TransportProxy* transproxy,
|
|
const Candidates& candidates) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
if (transproxy != NULL) {
|
|
if (initiator() && !initiate_acked_) {
|
|
// TODO: This is to work around server re-ordering
|
|
// messages. We send the candidates once the session-initiate
|
|
// is acked. Once we have fixed the server to guarantee message
|
|
// order, we can remove this case.
|
|
transproxy->AddUnsentCandidates(candidates);
|
|
} else {
|
|
if (!transproxy->negotiated()) {
|
|
transproxy->AddSentCandidates(candidates);
|
|
}
|
|
SessionError error;
|
|
if (!SendTransportInfoMessage(transproxy, candidates, &error)) {
|
|
LOG(LS_ERROR) << "Could not send transport info message: "
|
|
<< error.text;
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void Session::OnIncomingMessage(const SessionMessage& msg) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
ASSERT(state() == STATE_INIT || msg.from == remote_name());
|
|
|
|
if (current_protocol_== PROTOCOL_HYBRID) {
|
|
if (msg.protocol == PROTOCOL_GINGLE) {
|
|
current_protocol_ = PROTOCOL_GINGLE;
|
|
} else {
|
|
current_protocol_ = PROTOCOL_JINGLE;
|
|
}
|
|
}
|
|
|
|
bool valid = false;
|
|
MessageError error;
|
|
switch (msg.type) {
|
|
case ACTION_SESSION_INITIATE:
|
|
valid = OnInitiateMessage(msg, &error);
|
|
break;
|
|
case ACTION_SESSION_INFO:
|
|
valid = OnInfoMessage(msg);
|
|
break;
|
|
case ACTION_SESSION_ACCEPT:
|
|
valid = OnAcceptMessage(msg, &error);
|
|
break;
|
|
case ACTION_SESSION_REJECT:
|
|
valid = OnRejectMessage(msg, &error);
|
|
break;
|
|
case ACTION_SESSION_TERMINATE:
|
|
valid = OnTerminateMessage(msg, &error);
|
|
break;
|
|
case ACTION_TRANSPORT_INFO:
|
|
valid = OnTransportInfoMessage(msg, &error);
|
|
break;
|
|
case ACTION_TRANSPORT_ACCEPT:
|
|
valid = OnTransportAcceptMessage(msg, &error);
|
|
break;
|
|
case ACTION_DESCRIPTION_INFO:
|
|
valid = OnDescriptionInfoMessage(msg, &error);
|
|
break;
|
|
default:
|
|
valid = BadMessage(buzz::QN_STANZA_BAD_REQUEST,
|
|
"unknown session message type",
|
|
&error);
|
|
}
|
|
|
|
if (valid) {
|
|
SendAcknowledgementMessage(msg.stanza);
|
|
} else {
|
|
SignalErrorMessage(this, msg.stanza, error.type,
|
|
"modify", error.text, NULL);
|
|
}
|
|
}
|
|
|
|
void Session::OnIncomingResponse(const buzz::XmlElement* orig_stanza,
|
|
const buzz::XmlElement* response_stanza,
|
|
const SessionMessage& msg) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
|
|
if (msg.type == ACTION_SESSION_INITIATE) {
|
|
OnInitiateAcked();
|
|
}
|
|
}
|
|
|
|
void Session::OnInitiateAcked() {
|
|
// TODO: This is to work around server re-ordering
|
|
// messages. We send the candidates once the session-initiate
|
|
// is acked. Once we have fixed the server to guarantee message
|
|
// order, we can remove this case.
|
|
if (!initiate_acked_) {
|
|
initiate_acked_ = true;
|
|
SessionError error;
|
|
SendAllUnsentTransportInfoMessages(&error);
|
|
}
|
|
}
|
|
|
|
void Session::OnFailedSend(const buzz::XmlElement* orig_stanza,
|
|
const buzz::XmlElement* error_stanza) {
|
|
ASSERT(signaling_thread()->IsCurrent());
|
|
|
|
SessionMessage msg;
|
|
ParseError parse_error;
|
|
if (!ParseSessionMessage(orig_stanza, &msg, &parse_error)) {
|
|
LOG(LS_ERROR) << "Error parsing failed send: " << parse_error.text
|
|
<< ":" << orig_stanza;
|
|
return;
|
|
}
|
|
|
|
// If the error is a session redirect, call OnRedirectError, which will
|
|
// continue the session with a new remote JID.
|
|
SessionRedirect redirect;
|
|
if (FindSessionRedirect(error_stanza, &redirect)) {
|
|
SessionError error;
|
|
if (!OnRedirectError(redirect, &error)) {
|
|
// TODO: Should we send a message back? The standard
|
|
// says nothing about it.
|
|
std::ostringstream desc;
|
|
desc << "Failed to redirect: " << error.text;
|
|
LOG(LS_ERROR) << desc.str();
|
|
SetError(ERROR_RESPONSE, desc.str());
|
|
}
|
|
return;
|
|
}
|
|
|
|
std::string error_type = "cancel";
|
|
|
|
const buzz::XmlElement* error = error_stanza->FirstNamed(buzz::QN_ERROR);
|
|
if (error) {
|
|
error_type = error->Attr(buzz::QN_TYPE);
|
|
|
|
LOG(LS_ERROR) << "Session error:\n" << error->Str() << "\n"
|
|
<< "in response to:\n" << orig_stanza->Str();
|
|
} else {
|
|
// don't crash if <error> is missing
|
|
LOG(LS_ERROR) << "Session error without <error/> element, ignoring";
|
|
return;
|
|
}
|
|
|
|
if (msg.type == ACTION_TRANSPORT_INFO) {
|
|
// Transport messages frequently generate errors because they are sent right
|
|
// when we detect a network failure. For that reason, we ignore such
|
|
// errors, because if we do not establish writability again, we will
|
|
// terminate anyway. The exceptions are transport-specific error tags,
|
|
// which we pass on to the respective transport.
|
|
} else if ((error_type != "continue") && (error_type != "wait")) {
|
|
// We do not set an error if the other side said it is okay to continue
|
|
// (possibly after waiting). These errors can be ignored.
|
|
SetError(ERROR_RESPONSE, "");
|
|
}
|
|
}
|
|
|
|
bool Session::OnInitiateMessage(const SessionMessage& msg,
|
|
MessageError* error) {
|
|
if (!CheckState(STATE_INIT, error))
|
|
return false;
|
|
|
|
SessionInitiate init;
|
|
if (!ParseSessionInitiate(msg.protocol, msg.action_elem,
|
|
GetContentParsers(), GetTransportParsers(),
|
|
GetCandidateTranslators(),
|
|
&init, error))
|
|
return false;
|
|
|
|
SessionError session_error;
|
|
if (!CreateTransportProxies(init.transports, &session_error)) {
|
|
return BadMessage(buzz::QN_STANZA_NOT_ACCEPTABLE,
|
|
session_error.text, error);
|
|
}
|
|
|
|
set_remote_name(msg.from);
|
|
set_initiator_name(msg.initiator);
|
|
set_remote_description(new SessionDescription(init.ClearContents(),
|
|
init.transports,
|
|
init.groups));
|
|
// Updating transport with TransportDescription.
|
|
PushdownTransportDescription(CS_REMOTE, CA_OFFER, NULL);
|
|
SetState(STATE_RECEIVEDINITIATE);
|
|
|
|
// Users of Session may listen to state change and call Reject().
|
|
if (state() != STATE_SENTREJECT) {
|
|
if (!OnRemoteCandidates(init.transports, error))
|
|
return false;
|
|
|
|
// TODO(juberti): Auto-generate and push down the local transport answer.
|
|
// This is necessary for trickling to work with RFC 5245 ICE.
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool Session::OnAcceptMessage(const SessionMessage& msg, MessageError* error) {
|
|
if (!CheckState(STATE_SENTINITIATE, error))
|
|
return false;
|
|
|
|
SessionAccept accept;
|
|
if (!ParseSessionAccept(msg.protocol, msg.action_elem,
|
|
GetContentParsers(), GetTransportParsers(),
|
|
GetCandidateTranslators(),
|
|
&accept, error)) {
|
|
return false;
|
|
}
|
|
|
|
// If we get an accept, we can assume the initiate has been
|
|
// received, even if we haven't gotten an IQ response.
|
|
OnInitiateAcked();
|
|
|
|
set_remote_description(new SessionDescription(accept.ClearContents(),
|
|
accept.transports,
|
|
accept.groups));
|
|
// Updating transport with TransportDescription.
|
|
PushdownTransportDescription(CS_REMOTE, CA_ANSWER, NULL);
|
|
MaybeEnableMuxingSupport(); // Enable transport channel mux if supported.
|
|
SetState(STATE_RECEIVEDACCEPT);
|
|
|
|
if (!OnRemoteCandidates(accept.transports, error))
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool Session::OnRejectMessage(const SessionMessage& msg, MessageError* error) {
|
|
if (!CheckState(STATE_SENTINITIATE, error))
|
|
return false;
|
|
|
|
SetState(STATE_RECEIVEDREJECT);
|
|
return true;
|
|
}
|
|
|
|
bool Session::OnInfoMessage(const SessionMessage& msg) {
|
|
SignalInfoMessage(this, msg.action_elem);
|
|
return true;
|
|
}
|
|
|
|
bool Session::OnTerminateMessage(const SessionMessage& msg,
|
|
MessageError* error) {
|
|
SessionTerminate term;
|
|
if (!ParseSessionTerminate(msg.protocol, msg.action_elem, &term, error))
|
|
return false;
|
|
|
|
SignalReceivedTerminateReason(this, term.reason);
|
|
if (term.debug_reason != buzz::STR_EMPTY) {
|
|
LOG(LS_VERBOSE) << "Received error on call: " << term.debug_reason;
|
|
}
|
|
|
|
SetState(STATE_RECEIVEDTERMINATE);
|
|
return true;
|
|
}
|
|
|
|
bool Session::OnTransportInfoMessage(const SessionMessage& msg,
|
|
MessageError* error) {
|
|
TransportInfos tinfos;
|
|
if (!ParseTransportInfos(msg.protocol, msg.action_elem,
|
|
initiator_description()->contents(),
|
|
GetTransportParsers(), GetCandidateTranslators(),
|
|
&tinfos, error))
|
|
return false;
|
|
|
|
if (!OnRemoteCandidates(tinfos, error))
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool Session::OnTransportAcceptMessage(const SessionMessage& msg,
|
|
MessageError* error) {
|
|
// TODO: Currently here only for compatibility with
|
|
// Gingle 1.1 clients (notably, Google Voice).
|
|
return true;
|
|
}
|
|
|
|
bool Session::OnDescriptionInfoMessage(const SessionMessage& msg,
|
|
MessageError* error) {
|
|
if (!CheckState(STATE_INPROGRESS, error))
|
|
return false;
|
|
|
|
DescriptionInfo description_info;
|
|
if (!ParseDescriptionInfo(msg.protocol, msg.action_elem,
|
|
GetContentParsers(), GetTransportParsers(),
|
|
GetCandidateTranslators(),
|
|
&description_info, error)) {
|
|
return false;
|
|
}
|
|
|
|
ContentInfos& updated_contents = description_info.contents;
|
|
|
|
// TODO: Currently, reflector sends back
|
|
// video stream updates even for an audio-only call, which causes
|
|
// this to fail. Put this back once reflector is fixed.
|
|
//
|
|
// ContentInfos::iterator it;
|
|
// First, ensure all updates are valid before modifying remote_description_.
|
|
// for (it = updated_contents.begin(); it != updated_contents.end(); ++it) {
|
|
// if (remote_description()->GetContentByName(it->name) == NULL) {
|
|
// return false;
|
|
// }
|
|
// }
|
|
|
|
// TODO: We used to replace contents from an update, but
|
|
// that no longer works with partial updates. We need to figure out
|
|
// a way to merge patial updates into contents. For now, users of
|
|
// Session should listen to SignalRemoteDescriptionUpdate and handle
|
|
// updates. They should not expect remote_description to be the
|
|
// latest value.
|
|
//
|
|
// for (it = updated_contents.begin(); it != updated_contents.end(); ++it) {
|
|
// remote_description()->RemoveContentByName(it->name);
|
|
// remote_description()->AddContent(it->name, it->type, it->description);
|
|
// }
|
|
// }
|
|
|
|
SignalRemoteDescriptionUpdate(this, updated_contents);
|
|
return true;
|
|
}
|
|
|
|
bool BareJidsEqual(const std::string& name1,
|
|
const std::string& name2) {
|
|
buzz::Jid jid1(name1);
|
|
buzz::Jid jid2(name2);
|
|
|
|
return jid1.IsValid() && jid2.IsValid() && jid1.BareEquals(jid2);
|
|
}
|
|
|
|
bool Session::OnRedirectError(const SessionRedirect& redirect,
|
|
SessionError* error) {
|
|
MessageError message_error;
|
|
if (!CheckState(STATE_SENTINITIATE, &message_error)) {
|
|
return BadWrite(message_error.text, error);
|
|
}
|
|
|
|
if (!BareJidsEqual(remote_name(), redirect.target))
|
|
return BadWrite("Redirection not allowed: must be the same bare jid.",
|
|
error);
|
|
|
|
// When we receive a redirect, we point the session at the new JID
|
|
// and resend the candidates.
|
|
set_remote_name(redirect.target);
|
|
return (SendInitiateMessage(local_description(), error) &&
|
|
ResendAllTransportInfoMessages(error));
|
|
}
|
|
|
|
bool Session::CheckState(State expected, MessageError* error) {
|
|
if (state() != expected) {
|
|
// The server can deliver messages out of order/repeated for various
|
|
// reasons. For example, if the server does not recive our iq response,
|
|
// it could assume that the iq it sent was lost, and will then send
|
|
// it again. Ideally, we should implement reliable messaging with
|
|
// duplicate elimination.
|
|
return BadMessage(buzz::QN_STANZA_NOT_ALLOWED,
|
|
"message not allowed in current state",
|
|
error);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void Session::SetError(Error error, const std::string& error_desc) {
|
|
BaseSession::SetError(error, error_desc);
|
|
if (error != ERROR_NONE)
|
|
signaling_thread()->Post(this, MSG_ERROR);
|
|
}
|
|
|
|
void Session::OnMessage(rtc::Message* pmsg) {
|
|
// preserve this because BaseSession::OnMessage may modify it
|
|
State orig_state = state();
|
|
|
|
BaseSession::OnMessage(pmsg);
|
|
|
|
switch (pmsg->message_id) {
|
|
case MSG_ERROR:
|
|
TerminateWithReason(STR_TERMINATE_ERROR);
|
|
break;
|
|
|
|
case MSG_STATE:
|
|
switch (orig_state) {
|
|
case STATE_SENTREJECT:
|
|
case STATE_RECEIVEDREJECT:
|
|
// Assume clean termination.
|
|
Terminate();
|
|
break;
|
|
|
|
case STATE_SENTTERMINATE:
|
|
case STATE_RECEIVEDTERMINATE:
|
|
session_manager_->DestroySession(this);
|
|
break;
|
|
|
|
default:
|
|
// Explicitly ignoring some states here.
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
bool Session::SendInitiateMessage(const SessionDescription* sdesc,
|
|
SessionError* error) {
|
|
SessionInitiate init;
|
|
init.contents = sdesc->contents();
|
|
init.transports = GetEmptyTransportInfos(init.contents);
|
|
init.groups = sdesc->groups();
|
|
return SendMessage(ACTION_SESSION_INITIATE, init, error);
|
|
}
|
|
|
|
bool Session::WriteSessionAction(
|
|
SignalingProtocol protocol, const SessionInitiate& init,
|
|
XmlElements* elems, WriteError* error) {
|
|
return WriteSessionInitiate(protocol, init.contents, init.transports,
|
|
GetContentParsers(), GetTransportParsers(),
|
|
GetCandidateTranslators(), init.groups,
|
|
elems, error);
|
|
}
|
|
|
|
bool Session::SendAcceptMessage(const SessionDescription* sdesc,
|
|
SessionError* error) {
|
|
XmlElements elems;
|
|
if (!WriteSessionAccept(current_protocol_,
|
|
sdesc->contents(),
|
|
GetEmptyTransportInfos(sdesc->contents()),
|
|
GetContentParsers(), GetTransportParsers(),
|
|
GetCandidateTranslators(), sdesc->groups(),
|
|
&elems, error)) {
|
|
return false;
|
|
}
|
|
return SendMessage(ACTION_SESSION_ACCEPT, elems, error);
|
|
}
|
|
|
|
bool Session::SendRejectMessage(const std::string& reason,
|
|
SessionError* error) {
|
|
SessionTerminate term(reason);
|
|
return SendMessage(ACTION_SESSION_REJECT, term, error);
|
|
}
|
|
|
|
bool Session::SendTerminateMessage(const std::string& reason,
|
|
SessionError* error) {
|
|
SessionTerminate term(reason);
|
|
return SendMessage(ACTION_SESSION_TERMINATE, term, error);
|
|
}
|
|
|
|
bool Session::WriteSessionAction(SignalingProtocol protocol,
|
|
const SessionTerminate& term,
|
|
XmlElements* elems, WriteError* error) {
|
|
WriteSessionTerminate(protocol, term, elems);
|
|
return true;
|
|
}
|
|
|
|
bool Session::SendTransportInfoMessage(const TransportInfo& tinfo,
|
|
SessionError* error) {
|
|
return SendMessage(ACTION_TRANSPORT_INFO, tinfo, error);
|
|
}
|
|
|
|
bool Session::SendTransportInfoMessage(const TransportProxy* transproxy,
|
|
const Candidates& candidates,
|
|
SessionError* error) {
|
|
return SendTransportInfoMessage(TransportInfo(transproxy->content_name(),
|
|
TransportDescription(transproxy->type(), std::vector<std::string>(),
|
|
std::string(), std::string(), ICEMODE_FULL,
|
|
CONNECTIONROLE_NONE, NULL, candidates)), error);
|
|
}
|
|
|
|
bool Session::WriteSessionAction(SignalingProtocol protocol,
|
|
const TransportInfo& tinfo,
|
|
XmlElements* elems, WriteError* error) {
|
|
TransportInfos tinfos;
|
|
tinfos.push_back(tinfo);
|
|
return WriteTransportInfos(protocol, tinfos,
|
|
GetTransportParsers(), GetCandidateTranslators(),
|
|
elems, error);
|
|
}
|
|
|
|
bool Session::ResendAllTransportInfoMessages(SessionError* error) {
|
|
for (TransportMap::const_iterator iter = transport_proxies().begin();
|
|
iter != transport_proxies().end(); ++iter) {
|
|
TransportProxy* transproxy = iter->second;
|
|
if (transproxy->sent_candidates().size() > 0) {
|
|
if (!SendTransportInfoMessage(
|
|
transproxy, transproxy->sent_candidates(), error)) {
|
|
LOG(LS_ERROR) << "Could not resend transport info messages: "
|
|
<< error->text;
|
|
return false;
|
|
}
|
|
transproxy->ClearSentCandidates();
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool Session::SendAllUnsentTransportInfoMessages(SessionError* error) {
|
|
for (TransportMap::const_iterator iter = transport_proxies().begin();
|
|
iter != transport_proxies().end(); ++iter) {
|
|
TransportProxy* transproxy = iter->second;
|
|
if (transproxy->unsent_candidates().size() > 0) {
|
|
if (!SendTransportInfoMessage(
|
|
transproxy, transproxy->unsent_candidates(), error)) {
|
|
LOG(LS_ERROR) << "Could not send unsent transport info messages: "
|
|
<< error->text;
|
|
return false;
|
|
}
|
|
transproxy->ClearUnsentCandidates();
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool Session::SendMessage(ActionType type, const XmlElements& action_elems,
|
|
SessionError* error) {
|
|
return SendMessage(type, action_elems, remote_name(), error);
|
|
}
|
|
|
|
bool Session::SendMessage(ActionType type, const XmlElements& action_elems,
|
|
const std::string& remote_name, SessionError* error) {
|
|
rtc::scoped_ptr<buzz::XmlElement> stanza(
|
|
new buzz::XmlElement(buzz::QN_IQ));
|
|
|
|
SessionMessage msg(current_protocol_, type, id(), initiator_name());
|
|
msg.to = remote_name;
|
|
WriteSessionMessage(msg, action_elems, stanza.get());
|
|
|
|
SignalOutgoingMessage(this, stanza.get());
|
|
return true;
|
|
}
|
|
|
|
template <typename Action>
|
|
bool Session::SendMessage(ActionType type, const Action& action,
|
|
SessionError* error) {
|
|
rtc::scoped_ptr<buzz::XmlElement> stanza(
|
|
new buzz::XmlElement(buzz::QN_IQ));
|
|
if (!WriteActionMessage(type, action, stanza.get(), error))
|
|
return false;
|
|
|
|
SignalOutgoingMessage(this, stanza.get());
|
|
return true;
|
|
}
|
|
|
|
template <typename Action>
|
|
bool Session::WriteActionMessage(ActionType type, const Action& action,
|
|
buzz::XmlElement* stanza,
|
|
WriteError* error) {
|
|
if (current_protocol_ == PROTOCOL_HYBRID) {
|
|
if (!WriteActionMessage(PROTOCOL_JINGLE, type, action, stanza, error))
|
|
return false;
|
|
if (!WriteActionMessage(PROTOCOL_GINGLE, type, action, stanza, error))
|
|
return false;
|
|
} else {
|
|
if (!WriteActionMessage(current_protocol_, type, action, stanza, error))
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
template <typename Action>
|
|
bool Session::WriteActionMessage(SignalingProtocol protocol,
|
|
ActionType type, const Action& action,
|
|
buzz::XmlElement* stanza, WriteError* error) {
|
|
XmlElements action_elems;
|
|
if (!WriteSessionAction(protocol, action, &action_elems, error))
|
|
return false;
|
|
|
|
SessionMessage msg(protocol, type, id(), initiator_name());
|
|
msg.to = remote_name();
|
|
|
|
WriteSessionMessage(msg, action_elems, stanza);
|
|
return true;
|
|
}
|
|
|
|
void Session::SendAcknowledgementMessage(const buzz::XmlElement* stanza) {
|
|
rtc::scoped_ptr<buzz::XmlElement> ack(
|
|
new buzz::XmlElement(buzz::QN_IQ));
|
|
ack->SetAttr(buzz::QN_TO, remote_name());
|
|
ack->SetAttr(buzz::QN_ID, stanza->Attr(buzz::QN_ID));
|
|
ack->SetAttr(buzz::QN_TYPE, "result");
|
|
|
|
SignalOutgoingMessage(this, ack.get());
|
|
}
|
|
|
|
SessionManager::SessionManager(PortAllocator *allocator,
|
|
rtc::Thread *worker) {
|
|
allocator_ = allocator;
|
|
signaling_thread_ = rtc::Thread::Current();
|
|
if (worker == NULL) {
|
|
worker_thread_ = rtc::Thread::Current();
|
|
} else {
|
|
worker_thread_ = worker;
|
|
}
|
|
timeout_ = 50;
|
|
}
|
|
|
|
SessionManager::~SessionManager() {
|
|
// Note: Session::Terminate occurs asynchronously, so it's too late to
|
|
// delete them now. They better be all gone.
|
|
ASSERT(session_map_.empty());
|
|
// TerminateAll();
|
|
SignalDestroyed();
|
|
}
|
|
|
|
void SessionManager::AddClient(const std::string& content_type,
|
|
SessionClient* client) {
|
|
ASSERT(client_map_.find(content_type) == client_map_.end());
|
|
client_map_[content_type] = client;
|
|
}
|
|
|
|
void SessionManager::RemoveClient(const std::string& content_type) {
|
|
ClientMap::iterator iter = client_map_.find(content_type);
|
|
ASSERT(iter != client_map_.end());
|
|
client_map_.erase(iter);
|
|
}
|
|
|
|
SessionClient* SessionManager::GetClient(const std::string& content_type) {
|
|
ClientMap::iterator iter = client_map_.find(content_type);
|
|
return (iter != client_map_.end()) ? iter->second : NULL;
|
|
}
|
|
|
|
Session* SessionManager::CreateSession(const std::string& local_name,
|
|
const std::string& content_type) {
|
|
std::string id;
|
|
return CreateSession(id, local_name, content_type);
|
|
}
|
|
|
|
Session* SessionManager::CreateSession(const std::string& id,
|
|
const std::string& local_name,
|
|
const std::string& content_type) {
|
|
std::string sid =
|
|
id.empty() ? rtc::ToString(rtc::CreateRandomId64()) : id;
|
|
return CreateSession(local_name, local_name, sid, content_type, false);
|
|
}
|
|
|
|
Session* SessionManager::CreateSession(
|
|
const std::string& local_name, const std::string& initiator_name,
|
|
const std::string& sid, const std::string& content_type,
|
|
bool received_initiate) {
|
|
SessionClient* client = GetClient(content_type);
|
|
ASSERT(client != NULL);
|
|
|
|
Session* session = new Session(this, local_name, initiator_name,
|
|
sid, content_type, client);
|
|
session->SetIdentity(transport_desc_factory_.identity());
|
|
session_map_[session->id()] = session;
|
|
session->SignalRequestSignaling.connect(
|
|
this, &SessionManager::OnRequestSignaling);
|
|
session->SignalOutgoingMessage.connect(
|
|
this, &SessionManager::OnOutgoingMessage);
|
|
session->SignalErrorMessage.connect(this, &SessionManager::OnErrorMessage);
|
|
SignalSessionCreate(session, received_initiate);
|
|
session->client()->OnSessionCreate(session, received_initiate);
|
|
return session;
|
|
}
|
|
|
|
void SessionManager::DestroySession(Session* session) {
|
|
if (session != NULL) {
|
|
SessionMap::iterator it = session_map_.find(session->id());
|
|
if (it != session_map_.end()) {
|
|
SignalSessionDestroy(session);
|
|
session->client()->OnSessionDestroy(session);
|
|
session_map_.erase(it);
|
|
delete session;
|
|
}
|
|
}
|
|
}
|
|
|
|
Session* SessionManager::GetSession(const std::string& sid) {
|
|
SessionMap::iterator it = session_map_.find(sid);
|
|
if (it != session_map_.end())
|
|
return it->second;
|
|
return NULL;
|
|
}
|
|
|
|
void SessionManager::TerminateAll() {
|
|
while (session_map_.begin() != session_map_.end()) {
|
|
Session* session = session_map_.begin()->second;
|
|
session->Terminate();
|
|
}
|
|
}
|
|
|
|
bool SessionManager::IsSessionMessage(const buzz::XmlElement* stanza) {
|
|
return cricket::IsSessionMessage(stanza);
|
|
}
|
|
|
|
Session* SessionManager::FindSession(const std::string& sid,
|
|
const std::string& remote_name) {
|
|
SessionMap::iterator iter = session_map_.find(sid);
|
|
if (iter == session_map_.end())
|
|
return NULL;
|
|
|
|
Session* session = iter->second;
|
|
if (buzz::Jid(remote_name) != buzz::Jid(session->remote_name()))
|
|
return NULL;
|
|
|
|
return session;
|
|
}
|
|
|
|
void SessionManager::OnIncomingMessage(const buzz::XmlElement* stanza) {
|
|
SessionMessage msg;
|
|
ParseError error;
|
|
|
|
if (!ParseSessionMessage(stanza, &msg, &error)) {
|
|
SendErrorMessage(stanza, buzz::QN_STANZA_BAD_REQUEST, "modify",
|
|
error.text, NULL);
|
|
return;
|
|
}
|
|
|
|
Session* session = FindSession(msg.sid, msg.from);
|
|
if (session) {
|
|
session->OnIncomingMessage(msg);
|
|
return;
|
|
}
|
|
if (msg.type != ACTION_SESSION_INITIATE) {
|
|
SendErrorMessage(stanza, buzz::QN_STANZA_BAD_REQUEST, "modify",
|
|
"unknown session", NULL);
|
|
return;
|
|
}
|
|
|
|
std::string content_type;
|
|
if (!ParseContentType(msg.protocol, msg.action_elem,
|
|
&content_type, &error)) {
|
|
SendErrorMessage(stanza, buzz::QN_STANZA_BAD_REQUEST, "modify",
|
|
error.text, NULL);
|
|
return;
|
|
}
|
|
|
|
if (!GetClient(content_type)) {
|
|
SendErrorMessage(stanza, buzz::QN_STANZA_BAD_REQUEST, "modify",
|
|
"unknown content type: " + content_type, NULL);
|
|
return;
|
|
}
|
|
|
|
session = CreateSession(msg.to, msg.initiator, msg.sid,
|
|
content_type, true);
|
|
session->OnIncomingMessage(msg);
|
|
}
|
|
|
|
void SessionManager::OnIncomingResponse(const buzz::XmlElement* orig_stanza,
|
|
const buzz::XmlElement* response_stanza) {
|
|
if (orig_stanza == NULL || response_stanza == NULL) {
|
|
return;
|
|
}
|
|
|
|
SessionMessage msg;
|
|
ParseError error;
|
|
if (!ParseSessionMessage(orig_stanza, &msg, &error)) {
|
|
LOG(LS_WARNING) << "Error parsing incoming response: " << error.text
|
|
<< ":" << orig_stanza;
|
|
return;
|
|
}
|
|
|
|
Session* session = FindSession(msg.sid, msg.to);
|
|
if (!session) {
|
|
// Also try the QN_FROM in the response stanza, in case we sent the request
|
|
// to a bare JID but got the response from a full JID.
|
|
std::string ack_from = response_stanza->Attr(buzz::QN_FROM);
|
|
session = FindSession(msg.sid, ack_from);
|
|
}
|
|
if (session) {
|
|
session->OnIncomingResponse(orig_stanza, response_stanza, msg);
|
|
}
|
|
}
|
|
|
|
void SessionManager::OnFailedSend(const buzz::XmlElement* orig_stanza,
|
|
const buzz::XmlElement* error_stanza) {
|
|
SessionMessage msg;
|
|
ParseError error;
|
|
if (!ParseSessionMessage(orig_stanza, &msg, &error)) {
|
|
return; // TODO: log somewhere?
|
|
}
|
|
|
|
Session* session = FindSession(msg.sid, msg.to);
|
|
if (session) {
|
|
rtc::scoped_ptr<buzz::XmlElement> synthetic_error;
|
|
if (!error_stanza) {
|
|
// A failed send is semantically equivalent to an error response, so we
|
|
// can just turn the former into the latter.
|
|
synthetic_error.reset(
|
|
CreateErrorMessage(orig_stanza, buzz::QN_STANZA_ITEM_NOT_FOUND,
|
|
"cancel", "Recipient did not respond", NULL));
|
|
error_stanza = synthetic_error.get();
|
|
}
|
|
|
|
session->OnFailedSend(orig_stanza, error_stanza);
|
|
}
|
|
}
|
|
|
|
void SessionManager::SendErrorMessage(const buzz::XmlElement* stanza,
|
|
const buzz::QName& name,
|
|
const std::string& type,
|
|
const std::string& text,
|
|
const buzz::XmlElement* extra_info) {
|
|
rtc::scoped_ptr<buzz::XmlElement> msg(
|
|
CreateErrorMessage(stanza, name, type, text, extra_info));
|
|
SignalOutgoingMessage(this, msg.get());
|
|
}
|
|
|
|
buzz::XmlElement* SessionManager::CreateErrorMessage(
|
|
const buzz::XmlElement* stanza,
|
|
const buzz::QName& name,
|
|
const std::string& type,
|
|
const std::string& text,
|
|
const buzz::XmlElement* extra_info) {
|
|
buzz::XmlElement* iq = new buzz::XmlElement(buzz::QN_IQ);
|
|
iq->SetAttr(buzz::QN_TO, stanza->Attr(buzz::QN_FROM));
|
|
iq->SetAttr(buzz::QN_ID, stanza->Attr(buzz::QN_ID));
|
|
iq->SetAttr(buzz::QN_TYPE, "error");
|
|
|
|
CopyXmlChildren(stanza, iq);
|
|
|
|
buzz::XmlElement* error = new buzz::XmlElement(buzz::QN_ERROR);
|
|
error->SetAttr(buzz::QN_TYPE, type);
|
|
iq->AddElement(error);
|
|
|
|
// If the error name is not in the standard namespace, we have to first add
|
|
// some error from that namespace.
|
|
if (name.Namespace() != buzz::NS_STANZA) {
|
|
error->AddElement(
|
|
new buzz::XmlElement(buzz::QN_STANZA_UNDEFINED_CONDITION));
|
|
}
|
|
error->AddElement(new buzz::XmlElement(name));
|
|
|
|
if (extra_info)
|
|
error->AddElement(new buzz::XmlElement(*extra_info));
|
|
|
|
if (text.size() > 0) {
|
|
// It's okay to always use English here. This text is for debugging
|
|
// purposes only.
|
|
buzz::XmlElement* text_elem = new buzz::XmlElement(buzz::QN_STANZA_TEXT);
|
|
text_elem->SetAttr(buzz::QN_XML_LANG, "en");
|
|
text_elem->SetBodyText(text);
|
|
error->AddElement(text_elem);
|
|
}
|
|
|
|
// TODO: Should we include error codes as well for SIP compatibility?
|
|
|
|
return iq;
|
|
}
|
|
|
|
void SessionManager::OnOutgoingMessage(Session* session,
|
|
const buzz::XmlElement* stanza) {
|
|
SignalOutgoingMessage(this, stanza);
|
|
}
|
|
|
|
void SessionManager::OnErrorMessage(BaseSession* session,
|
|
const buzz::XmlElement* stanza,
|
|
const buzz::QName& name,
|
|
const std::string& type,
|
|
const std::string& text,
|
|
const buzz::XmlElement* extra_info) {
|
|
SendErrorMessage(stanza, name, type, text, extra_info);
|
|
}
|
|
|
|
void SessionManager::OnSignalingReady() {
|
|
for (SessionMap::iterator it = session_map_.begin();
|
|
it != session_map_.end();
|
|
++it) {
|
|
it->second->OnSignalingReady();
|
|
}
|
|
}
|
|
|
|
void SessionManager::OnRequestSignaling(Session* session) {
|
|
SignalRequestSignaling();
|
|
}
|
|
|
|
} // namespace cricket
|