| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317 | /** * Copyright (c) 2019 Paul-Louis Ageneau * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at https://mozilla.org/MPL/2.0/. */#include "rtc/rtc.hpp"#include <atomic>#include <chrono>#include <iostream>#include <memory>#include <thread>#define CUSTOM_MAX_MESSAGE_SIZE 1048576using namespace rtc;using namespace std;template <class T> weak_ptr<T> make_weak_ptr(shared_ptr<T> ptr) { return ptr; }void test_connectivity(bool signal_wrong_fingerprint) {	InitLogger(LogLevel::Debug);	Configuration config1;	// STUN server example (not necessary to connect locally)	config1.iceServers.emplace_back("stun:stun.l.google.com:19302");	// Custom MTU example	config1.mtu = 1500;	// Custom max message size	config1.maxMessageSize = CUSTOM_MAX_MESSAGE_SIZE;	PeerConnection pc1(config1);	Configuration config2;	// STUN server example (not necessary to connect locally)	config2.iceServers.emplace_back("stun:stun.l.google.com:19302");	// Custom MTU example	config2.mtu = 1500;	// Custom max message size	config2.maxMessageSize = CUSTOM_MAX_MESSAGE_SIZE;	// Port range example	config2.portRangeBegin = 5000;	config2.portRangeEnd = 6000;	PeerConnection pc2(config2);	pc1.onLocalDescription([&pc2, signal_wrong_fingerprint](Description sdp) {		cout << "Description 1: " << sdp << endl;		if (signal_wrong_fingerprint) {			auto f = sdp.fingerprint();			if (f.has_value()) {				auto& c = f.value().value[0];				if (c == 'F' || c == 'f') c = '0'; else c++;				sdp.setFingerprint(f.value());			}		}		pc2.setRemoteDescription(string(sdp));	});	pc1.onLocalCandidate([&pc2](Candidate candidate) {		cout << "Candidate 1: " << candidate << endl;		pc2.addRemoteCandidate(string(candidate));	});	pc1.onStateChange([](PeerConnection::State state) { cout << "State 1: " << state << endl; });	pc1.onIceStateChange([](PeerConnection::IceState state) {		cout << "ICE state 1: " << state << endl;	});	pc1.onGatheringStateChange([](PeerConnection::GatheringState state) {		cout << "Gathering state 1: " << state << endl;	});	pc1.onSignalingStateChange([](PeerConnection::SignalingState state) {		cout << "Signaling state 1: " << state << endl;	});	pc2.onLocalDescription([&pc1](Description sdp) {		cout << "Description 2: " << sdp << endl;		pc1.setRemoteDescription(string(sdp));	});	pc2.onLocalCandidate([&pc1](Candidate candidate) {		cout << "Candidate 2: " << candidate << endl;		pc1.addRemoteCandidate(string(candidate));	});	pc2.onStateChange([](PeerConnection::State state) { cout << "State 2: " << state << endl; });	pc2.onIceStateChange([](PeerConnection::IceState state) {		cout << "ICE state 2: " << state << endl;	});	pc2.onGatheringStateChange([](PeerConnection::GatheringState state) {		cout << "Gathering state 2: " << state << endl;	});	pc2.onSignalingStateChange([](PeerConnection::SignalingState state) {		cout << "Signaling state 2: " << state << endl;	});	shared_ptr<DataChannel> dc2;	pc2.onDataChannel([&dc2](shared_ptr<DataChannel> dc) {		cout << "DataChannel 2: Received with label \"" << dc->label() << "\"" << endl;		dc->onOpen([wdc = make_weak_ptr(dc)]() {			if (auto dc = wdc.lock()) {				cout << "DataChannel 2: Open" << endl;				dc->send("Hello from 2");			}		});		dc->onClosed([]() { cout << "DataChannel 2: Closed" << endl; });		dc->onMessage([](variant<binary, string> message) {			if (holds_alternative<string>(message)) {				cout << "Message 2: " << get<string>(message) << endl;			}		});		std::atomic_store(&dc2, dc);	});	auto dc1 = pc1.createDataChannel("test");	if (dc1->id().has_value())		throw std::runtime_error("DataChannel stream id assigned before connection");	dc1->onOpen([wdc1 = make_weak_ptr(dc1)]() {		if (auto dc1 = wdc1.lock()) {			cout << "DataChannel 1: Open" << endl;			dc1->send("Hello from 1");		}	});	dc1->onClosed([]() { cout << "DataChannel 1: Closed" << endl; });	dc1->onMessage([](const variant<binary, string> &message) {		if (holds_alternative<string>(message)) {			cout << "Message 1: " << get<string>(message) << endl;		}	});	// Wait a bit	int attempts = 10;	shared_ptr<DataChannel> adc2;	while ((!(adc2 = std::atomic_load(&dc2)) || !adc2->isOpen() || !dc1->isOpen()) && attempts--)		this_thread::sleep_for(1s);	if (pc1.state() != PeerConnection::State::Connected ||	    pc2.state() != PeerConnection::State::Connected)		throw runtime_error("PeerConnection is not connected");	if ((pc1.iceState() != PeerConnection::IceState::Connected &&	     pc1.iceState() != PeerConnection::IceState::Completed) ||	    (pc2.iceState() != PeerConnection::IceState::Connected &&	     pc2.iceState() != PeerConnection::IceState::Completed))		throw runtime_error("ICE is not connected");	if (!adc2 || !adc2->isOpen() || !dc1->isOpen())		throw runtime_error("DataChannel is not open");	if (adc2->label() != "test")		throw runtime_error("Wrong DataChannel label");	if (dc1->maxMessageSize() != CUSTOM_MAX_MESSAGE_SIZE ||	    dc2->maxMessageSize() != CUSTOM_MAX_MESSAGE_SIZE)		throw runtime_error("DataChannel max message size is incorrect");	if (!dc1->id().has_value())		throw runtime_error("DataChannel stream id is not assigned");	if (dc1->id().value() != adc2->id().value())		throw runtime_error("DataChannel stream ids do not match");	if (auto addr = pc1.localAddress())		cout << "Local address 1:  " << *addr << endl;	if (auto addr = pc1.remoteAddress())		cout << "Remote address 1: " << *addr << endl;	if (auto addr = pc2.localAddress())		cout << "Local address 2:  " << *addr << endl;	if (auto addr = pc2.remoteAddress())		cout << "Remote address 2: " << *addr << endl;	Candidate local, remote;	if (pc1.getSelectedCandidatePair(&local, &remote)) {		cout << "Local candidate 1:  " << local << endl;		cout << "Remote candidate 1: " << remote << endl;	}	if (pc2.getSelectedCandidatePair(&local, &remote)) {		cout << "Local candidate 2:  " << local << endl;		cout << "Remote candidate 2: " << remote << endl;	}	// Try to open a second data channel with another label	shared_ptr<DataChannel> second2;	pc2.onDataChannel([&second2](shared_ptr<DataChannel> dc) {		cout << "Second DataChannel 2: Received with label \"" << dc->label() << "\"" << endl;		dc->onOpen([wdc = make_weak_ptr(dc)]() {			if (auto dc = wdc.lock())				dc->send("Second hello from 2");		});		dc->onMessage([](variant<binary, string> message) {			if (holds_alternative<string>(message)) {				cout << "Second Message 2: " << get<string>(message) << endl;			}		});		std::atomic_store(&second2, dc);	});	auto second1 = pc1.createDataChannel("second");	if (!second1->id().has_value())		throw std::runtime_error("Second DataChannel stream id is not assigned");	second1->onOpen([wsecond1 = make_weak_ptr(second1)]() {		if (auto second1 = wsecond1.lock()) {			cout << "Second DataChannel 1: Open" << endl;			second1->send("Second hello from 1");		}	});	second1->onClosed([]() { cout << "Second DataChannel 1: Closed" << endl; });	second1->onMessage([](const variant<binary, string> &message) {		if (holds_alternative<string>(message)) {			cout << "Second Message 1: " << get<string>(message) << endl;		}	});	// Wait a bit	attempts = 10;	shared_ptr<DataChannel> asecond2;	while (	    (!(asecond2 = std::atomic_load(&second2)) || !asecond2->isOpen() || !second1->isOpen()) &&	    attempts--)		this_thread::sleep_for(1s);	if (!asecond2 || !asecond2->isOpen() || !second1->isOpen())		throw runtime_error("Second DataChannel is not open");	if (asecond2->label() != "second")		throw runtime_error("Wrong second DataChannel label");	if (!second2->id().has_value() || !asecond2->id().has_value())		throw runtime_error("Second DataChannel stream id is not assigned");	if (second2->id().value() != asecond2->id().value())		throw runtime_error("Second DataChannel stream ids do not match");	// Delay close of peer 2 to check closing works properly	pc1.close();	this_thread::sleep_for(1s);	pc2.close();	this_thread::sleep_for(1s);	cout << "Success" << endl;}const char* key_pem ="-----BEGIN PRIVATE KEY-----\n""MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg3bbuT2SjSlMZH/J1\n""vHwmF0Blb/DBc/v7f1Za9GPUXHmhRANCAATDpmYxZozjVw6xlERNjJJGgfY3bEmj\n""xAKFRq3nbxbDHvMEs34u9HntMZWJ0hp3GUC+Ax7JHTv3cYqSaAg2SpR4\n""-----END PRIVATE KEY-----\n";const char* cert_pem ="-----BEGIN CERTIFICATE-----\n""MIIBgjCCASigAwIBAgIJAPMXEoZXOaDEMAoGCCqGSM49BAMCMEoxDzANBgNVBAMM\n""BmNhLmNvbTELMAkGA1UEBhMCVVMxCzAJBgNVBAcMAkNBMRAwDgYDVQQKDAdleGFt\n""cGxlMQswCQYDVQQIDAJDQTAeFw0yNDA1MDUxNjAzMjFaFw0yNDA4MTMxNjAzMjFa\n""MDExCzAJBgNVBAYTAkNOMRAwDgYDVQQKDAdiYW96LmNuMRAwDgYDVQQDDAdiYW96\n""Lm1lMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEw6ZmMWaM41cOsZRETYySRoH2\n""N2xJo8QChUat528Wwx7zBLN+LvR57TGVidIadxlAvgMeyR0793GKkmgINkqUeKMQ\n""MA4wDAYDVR0TAQH/BAIwADAKBggqhkjOPQQDAgNIADBFAiAPNldqGJHryfjPFyX3\n""zfHHWlO7xSDTzdyoxzroFdwy+gIhAKmZizEVvDlBiIe+3ptCArU3dbp+bzLynTcr\n""Ma9ayzQy\n""-----END CERTIFICATE-----\n";void test_pem() {	InitLogger(LogLevel::Debug);	Configuration config1;	config1.certificatePemFile = cert_pem;	config1.keyPemFile = key_pem;	PeerConnection pc1(config1);	atomic_bool done;	string f;	pc1.onLocalDescription([&done, &f](Description sdp) {		f = sdp.fingerprint().value().value;		done = true;	});	auto dc1 = pc1.createDataChannel("test");	// Wait a bit	int attempts = 10;	while (!done && attempts--)		this_thread::sleep_for(1s);	cout << "Fingerprint: " << f << endl;	if (f != "07:E5:6F:2A:1A:0C:2C:32:0E:C1:C3:9C:34:5A:78:4E:A5:8B:32:05:D1:57:D6:F4:E7:02:41:12:E6:01:C6:8F")		throw runtime_error("The fingerprint of the specified certificate do not match");	cout << "Success" << endl;}
 |