anotherim/src/main/java/eu/siacs/conversations/xmpp/jingle/JingleRtpConnection.java

2755 lines
117 KiB
Java
Raw Normal View History

2020-04-02 09:30:16 +00:00
package eu.siacs.conversations.xmpp.jingle;
import android.util.Log;
import androidx.annotation.NonNull;
import androidx.annotation.Nullable;
import com.google.common.base.Joiner;
2020-04-14 17:06:39 +00:00
import com.google.common.base.Optional;
2020-04-15 08:49:38 +00:00
import com.google.common.base.Preconditions;
import com.google.common.base.Stopwatch;
2020-04-09 11:27:13 +00:00
import com.google.common.base.Strings;
import com.google.common.base.Throwables;
2020-04-15 08:49:38 +00:00
import com.google.common.collect.Collections2;
2020-04-02 19:12:38 +00:00
import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableMultimap;
import com.google.common.collect.ImmutableSet;
import com.google.common.collect.Iterables;
import com.google.common.collect.Maps;
2020-04-15 08:49:38 +00:00
import com.google.common.collect.Sets;
2020-04-09 11:27:13 +00:00
import com.google.common.primitives.Ints;
import com.google.common.util.concurrent.FutureCallback;
import com.google.common.util.concurrent.Futures;
import com.google.common.util.concurrent.ListenableFuture;
import com.google.common.util.concurrent.MoreExecutors;
2020-04-03 08:46:42 +00:00
import eu.siacs.conversations.BuildConfig;
2020-04-02 09:30:16 +00:00
import eu.siacs.conversations.Config;
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
import eu.siacs.conversations.crypto.axolotl.CryptoFailedException;
import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
import eu.siacs.conversations.entities.Conversation;
import eu.siacs.conversations.entities.Conversational;
import eu.siacs.conversations.entities.Message;
import eu.siacs.conversations.entities.RtpSessionStatus;
2020-04-13 10:02:34 +00:00
import eu.siacs.conversations.services.AppRTCAudioManager;
2020-05-08 15:52:41 +00:00
import eu.siacs.conversations.utils.IP;
2020-04-02 14:29:33 +00:00
import eu.siacs.conversations.xml.Element;
2020-04-02 19:12:38 +00:00
import eu.siacs.conversations.xml.Namespace;
import eu.siacs.conversations.xmpp.Jid;
import eu.siacs.conversations.xmpp.jingle.stanzas.Content;
2020-04-06 08:26:29 +00:00
import eu.siacs.conversations.xmpp.jingle.stanzas.Group;
2020-04-03 08:46:42 +00:00
import eu.siacs.conversations.xmpp.jingle.stanzas.IceUdpTransportInfo;
2020-04-02 09:30:16 +00:00
import eu.siacs.conversations.xmpp.jingle.stanzas.JinglePacket;
import eu.siacs.conversations.xmpp.jingle.stanzas.Proceed;
2020-04-15 08:49:38 +00:00
import eu.siacs.conversations.xmpp.jingle.stanzas.Propose;
2020-04-07 19:26:51 +00:00
import eu.siacs.conversations.xmpp.jingle.stanzas.Reason;
2020-04-15 08:49:38 +00:00
import eu.siacs.conversations.xmpp.jingle.stanzas.RtpDescription;
2020-04-08 15:52:47 +00:00
import eu.siacs.conversations.xmpp.stanzas.IqPacket;
2020-04-02 19:12:38 +00:00
import eu.siacs.conversations.xmpp.stanzas.MessagePacket;
2020-04-02 09:30:16 +00:00
2023-11-13 11:54:55 +00:00
import org.webrtc.EglBase;
import org.webrtc.IceCandidate;
import org.webrtc.PeerConnection;
import org.webrtc.VideoTrack;
import java.util.Arrays;
import java.util.Collection;
import java.util.Collections;
import java.util.LinkedList;
import java.util.List;
import java.util.Map;
import java.util.Queue;
import java.util.Set;
import java.util.concurrent.ExecutionException;
import java.util.concurrent.ScheduledFuture;
import java.util.concurrent.TimeUnit;
public class JingleRtpConnection extends AbstractJingleConnection
implements WebRTCWrapper.EventCallback {
2020-04-02 09:30:16 +00:00
public static final List<State> STATES_SHOWING_ONGOING_CALL =
Arrays.asList(
State.PROCEED, State.SESSION_INITIALIZED_PRE_APPROVED, State.SESSION_ACCEPTED);
private static final long BUSY_TIME_OUT = 30;
2020-04-02 19:12:38 +00:00
2020-04-06 11:01:17 +00:00
private final WebRTCWrapper webRTCWrapper = new WebRTCWrapper(this);
private final Queue<Map.Entry<String, DescriptionTransport<RtpDescription,IceUdpTransportInfo>>>
pendingIceCandidates = new LinkedList<>();
private final OmemoVerification omemoVerification = new OmemoVerification();
private final Message message;
2020-04-15 08:49:38 +00:00
private Set<Media> proposedMedia;
2020-04-06 11:01:17 +00:00
private RtpContentMap initiatorRtpContentMap;
private RtpContentMap responderRtpContentMap;
private RtpContentMap incomingContentAdd;
private RtpContentMap outgoingContentAdd;
private IceUdpTransportInfo.Setup peerDtlsSetup;
private final Stopwatch sessionDuration = Stopwatch.createUnstarted();
private final Queue<PeerConnection.PeerConnectionState> stateHistory = new LinkedList<>();
2020-04-22 19:59:20 +00:00
private ScheduledFuture<?> ringingTimeoutFuture;
2020-04-06 08:26:29 +00:00
JingleRtpConnection(JingleConnectionManager jingleConnectionManager, Id id, Jid initiator) {
super(jingleConnectionManager, id, initiator);
final Conversation conversation =
jingleConnectionManager
.getXmppConnectionService()
.findOrCreateConversation(id.account, id.with.asBareJid(), false, false);
this.message =
new Message(
conversation,
isInitiator() ? Message.STATUS_SEND : Message.STATUS_RECEIVED,
Message.TYPE_RTP_SESSION,
id.sessionId);
2020-04-02 09:30:16 +00:00
}
@Override
synchronized void deliverPacket(final JinglePacket jinglePacket) {
2020-04-03 08:46:42 +00:00
switch (jinglePacket.getAction()) {
2023-11-13 11:54:55 +00:00
case SESSION_INITIATE -> receiveSessionInitiate(jinglePacket);
case TRANSPORT_INFO -> receiveTransportInfo(jinglePacket);
case SESSION_ACCEPT -> receiveSessionAccept(jinglePacket);
case SESSION_TERMINATE -> receiveSessionTerminate(jinglePacket);
case CONTENT_ADD -> receiveContentAdd(jinglePacket);
case CONTENT_ACCEPT -> receiveContentAccept(jinglePacket);
case CONTENT_REJECT -> receiveContentReject(jinglePacket);
case CONTENT_REMOVE -> receiveContentRemove(jinglePacket);
case CONTENT_MODIFY -> receiveContentModify(jinglePacket);
default -> {
respondOk(jinglePacket);
Log.d(
Config.LOGTAG,
String.format(
"%s: received unhandled jingle action %s",
id.account.getJid().asBareJid(), jinglePacket.getAction()));
2023-11-13 11:54:55 +00:00
}
2020-04-03 08:46:42 +00:00
}
}
@Override
synchronized void notifyRebound() {
if (isTerminated()) {
return;
}
webRTCWrapper.close();
if (isResponder() && isInState(State.PROPOSED, State.SESSION_INITIALIZED)) {
xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
}
if (isInState(
State.SESSION_INITIALIZED,
State.SESSION_INITIALIZED_PRE_APPROVED,
State.SESSION_ACCEPTED)) {
// we might have already changed resources (full jid) at this point; so this might not
// even reach the other party
sendSessionTerminate(Reason.CONNECTIVITY_ERROR);
} else {
transitionOrThrow(State.TERMINATED_CONNECTIVITY_ERROR);
finish();
}
}
2020-04-07 19:26:51 +00:00
private void receiveSessionTerminate(final JinglePacket jinglePacket) {
respondOk(jinglePacket);
2020-04-12 07:59:32 +00:00
final JinglePacket.ReasonWrapper wrapper = jinglePacket.getReason();
2020-04-08 13:27:17 +00:00
final State previous = this.state;
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received session terminate reason="
+ wrapper.reason
+ "("
+ Strings.nullToEmpty(wrapper.text)
+ ") while in state "
+ previous);
2020-04-12 07:59:32 +00:00
if (TERMINATED.contains(previous)) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": ignoring session terminate because already in "
+ previous);
2020-04-12 07:59:32 +00:00
return;
}
2020-04-08 13:27:17 +00:00
webRTCWrapper.close();
final State target = reasonToState(wrapper.reason);
transitionOrThrow(target);
writeLogMessage(target);
2020-04-08 13:27:17 +00:00
if (previous == State.PROPOSED || previous == State.SESSION_INITIALIZED) {
xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
}
finish();
2020-04-08 13:27:17 +00:00
}
2020-04-06 08:26:29 +00:00
private void receiveTransportInfo(final JinglePacket jinglePacket) {
// Due to the asynchronicity of processing session-init we might move from NULL|PROCEED to
// INITIALIZED only after transport-info has been received
if (isInState(
State.NULL,
State.PROCEED,
State.SESSION_INITIALIZED,
State.SESSION_INITIALIZED_PRE_APPROVED,
State.SESSION_ACCEPTED)) {
2020-04-06 08:26:29 +00:00
final RtpContentMap contentMap;
try {
contentMap = RtpContentMap.of(jinglePacket);
} catch (final IllegalArgumentException | NullPointerException e) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": improperly formatted contents; ignoring",
e);
respondOk(jinglePacket);
2020-04-06 08:26:29 +00:00
return;
}
receiveTransportInfo(jinglePacket, contentMap);
} else {
if (isTerminated()) {
respondOk(jinglePacket);
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": ignoring out-of-order transport info; we where already terminated");
} else {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received transport info while in state="
+ this.state);
terminateWithOutOfOrder(jinglePacket);
}
}
}
private void receiveTransportInfo(
final JinglePacket jinglePacket, final RtpContentMap contentMap) {
final Set<Map.Entry<String, DescriptionTransport<RtpDescription,IceUdpTransportInfo>>> candidates =
contentMap.contents.entrySet();
final RtpContentMap remote = getRemoteContentMap();
2023-11-13 11:54:55 +00:00
final Set<String> remoteContentIds =
remote == null ? Collections.emptySet() : remote.contents.keySet();
if (Collections.disjoint(remoteContentIds, contentMap.contents.keySet())) {
2023-11-13 11:54:55 +00:00
Log.d(
Config.LOGTAG,
"received transport-info for unknown contents "
+ contentMap.contents.keySet()
+ " (known: "
+ remoteContentIds
+ ")");
respondOk(jinglePacket);
pendingIceCandidates.addAll(candidates);
return;
}
if (this.state != State.SESSION_ACCEPTED) {
2023-11-13 11:54:55 +00:00
Log.d(Config.LOGTAG, "received transport-info prematurely. adding to backlog");
respondOk(jinglePacket);
pendingIceCandidates.addAll(candidates);
return;
}
// zero candidates + modified credentials are an ICE restart offer
if (checkForIceRestart(jinglePacket, contentMap)) {
return;
}
respondOk(jinglePacket);
try {
processCandidates(candidates);
} catch (final WebRTCWrapper.PeerConnectionNotInitialized e) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": PeerConnection was not initialized when processing transport info. this usually indicates a race condition that can be ignored");
}
}
private void receiveContentAdd(final JinglePacket jinglePacket) {
final RtpContentMap modification;
try {
modification = RtpContentMap.of(jinglePacket);
modification.requireContentDescriptions();
} catch (final RuntimeException e) {
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid() + ": improperly formatted contents",
Throwables.getRootCause(e));
respondOk(jinglePacket);
webRTCWrapper.close();
sendSessionTerminate(Reason.of(e), e.getMessage());
return;
}
if (isInState(State.SESSION_ACCEPTED)) {
final boolean hasFullTransportInfo = modification.hasFullTransportInfo();
final ListenableFuture<RtpContentMap> future =
receiveRtpContentMap(
2023-11-13 11:54:55 +00:00
modification,
this.omemoVerification.hasFingerprint() && hasFullTransportInfo);
Futures.addCallback(
future,
new FutureCallback<>() {
@Override
public void onSuccess(final RtpContentMap rtpContentMap) {
receiveContentAdd(jinglePacket, rtpContentMap);
}
2023-11-13 11:54:55 +00:00
@Override
public void onFailure(@NonNull Throwable throwable) {
respondOk(jinglePacket);
final Throwable rootCause = Throwables.getRootCause(throwable);
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": improperly formatted contents in content-add",
throwable);
webRTCWrapper.close();
sendSessionTerminate(
Reason.ofThrowable(rootCause), rootCause.getMessage());
}
},
MoreExecutors.directExecutor());
} else {
terminateWithOutOfOrder(jinglePacket);
}
}
private void receiveContentAdd(
final JinglePacket jinglePacket, final RtpContentMap modification) {
final RtpContentMap remote = getRemoteContentMap();
if (!Collections.disjoint(modification.getNames(), remote.getNames())) {
respondOk(jinglePacket);
this.webRTCWrapper.close();
sendSessionTerminate(
Reason.FAILED_APPLICATION,
String.format(
"contents with names %s already exists",
Joiner.on(", ").join(modification.getNames())));
return;
}
final ContentAddition contentAddition =
ContentAddition.of(ContentAddition.Direction.INCOMING, modification);
final RtpContentMap outgoing = this.outgoingContentAdd;
final Set<ContentAddition.Summary> outgoingContentAddSummary =
outgoing == null ? Collections.emptySet() : ContentAddition.summary(outgoing);
if (outgoingContentAddSummary.equals(contentAddition.summary)) {
if (isInitiator()) {
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": respond with tie break to matching content-add offer");
respondWithTieBreak(jinglePacket);
} else {
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": automatically accept matching content-add offer");
acceptContentAdd(contentAddition.summary, modification);
}
return;
}
// once we can display multiple video tracks we can be more loose with this condition
// theoretically it should also be fine to automatically accept audio only contents
if (Media.audioOnly(remote.getMedia()) && Media.videoOnly(contentAddition.media())) {
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid() + ": received " + contentAddition);
this.incomingContentAdd = modification;
respondOk(jinglePacket);
updateEndUserState();
} else {
respondOk(jinglePacket);
// TODO do we want to add a reason?
rejectContentAdd(modification);
}
}
private void receiveContentAccept(final JinglePacket jinglePacket) {
final RtpContentMap receivedContentAccept;
try {
receivedContentAccept = RtpContentMap.of(jinglePacket);
receivedContentAccept.requireContentDescriptions();
} catch (final RuntimeException e) {
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid() + ": improperly formatted contents",
Throwables.getRootCause(e));
respondOk(jinglePacket);
webRTCWrapper.close();
sendSessionTerminate(Reason.of(e), e.getMessage());
return;
}
final RtpContentMap outgoingContentAdd = this.outgoingContentAdd;
if (outgoingContentAdd == null) {
Log.d(Config.LOGTAG, "received content-accept when we had no outgoing content add");
terminateWithOutOfOrder(jinglePacket);
return;
}
final Set<ContentAddition.Summary> ourSummary = ContentAddition.summary(outgoingContentAdd);
if (ourSummary.equals(ContentAddition.summary(receivedContentAccept))) {
this.outgoingContentAdd = null;
respondOk(jinglePacket);
final boolean hasFullTransportInfo = receivedContentAccept.hasFullTransportInfo();
final ListenableFuture<RtpContentMap> future =
receiveRtpContentMap(
2023-11-13 11:54:55 +00:00
receivedContentAccept,
this.omemoVerification.hasFingerprint() && hasFullTransportInfo);
Futures.addCallback(
future,
new FutureCallback<>() {
@Override
public void onSuccess(final RtpContentMap result) {
receiveContentAccept(result);
}
2023-11-13 11:54:55 +00:00
@Override
public void onFailure(@NonNull final Throwable throwable) {
webRTCWrapper.close();
sendSessionTerminate(
Reason.ofThrowable(throwable), throwable.getMessage());
}
},
MoreExecutors.directExecutor());
} else {
Log.d(Config.LOGTAG, "received content-accept did not match our outgoing content-add");
terminateWithOutOfOrder(jinglePacket);
}
}
private void receiveContentAccept(final RtpContentMap receivedContentAccept) {
final IceUdpTransportInfo.Setup peerDtlsSetup = getPeerDtlsSetup();
final RtpContentMap modifiedContentMap =
getRemoteContentMap().addContent(receivedContentAccept, peerDtlsSetup);
setRemoteContentMap(modifiedContentMap);
final SessionDescription answer = SessionDescription.of(modifiedContentMap, isResponder());
final org.webrtc.SessionDescription sdp =
new org.webrtc.SessionDescription(
org.webrtc.SessionDescription.Type.ANSWER, answer.toString());
try {
this.webRTCWrapper.setRemoteDescription(sdp).get();
} catch (final Exception e) {
final Throwable cause = Throwables.getRootCause(e);
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": unable to set remote description after receiving content-accept",
cause);
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, cause.getMessage());
return;
}
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": remote has accepted content-add "
+ ContentAddition.summary(receivedContentAccept));
2023-10-13 06:29:23 +00:00
processCandidates(receivedContentAccept.contents.entrySet());
updateEndUserState();
}
private void receiveContentModify(final JinglePacket jinglePacket) {
if (this.state != State.SESSION_ACCEPTED) {
terminateWithOutOfOrder(jinglePacket);
return;
}
final Map<String, Content.Senders> modification =
Maps.transformEntries(
jinglePacket.getJingleContents(), (key, value) -> value.getSenders());
final boolean isInitiator = isInitiator();
final RtpContentMap currentOutgoing = this.outgoingContentAdd;
final RtpContentMap remoteContentMap = this.getRemoteContentMap();
2023-11-13 11:54:55 +00:00
final Set<String> currentOutgoingMediaIds =
currentOutgoing == null
? Collections.emptySet()
: currentOutgoing.contents.keySet();
Log.d(Config.LOGTAG, "receiveContentModification(" + modification + ")");
if (currentOutgoing != null && currentOutgoingMediaIds.containsAll(modification.keySet())) {
respondOk(jinglePacket);
final RtpContentMap modifiedContentMap;
try {
2023-11-13 11:54:55 +00:00
modifiedContentMap =
currentOutgoing.modifiedSendersChecked(isInitiator, modification);
} catch (final IllegalArgumentException e) {
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, e.getMessage());
return;
}
this.outgoingContentAdd = modifiedContentMap;
2023-11-13 11:54:55 +00:00
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": processed content-modification for pending content-add");
} else if (remoteContentMap != null
&& remoteContentMap.contents.keySet().containsAll(modification.keySet())) {
respondOk(jinglePacket);
final RtpContentMap modifiedRemoteContentMap;
try {
2023-11-13 11:54:55 +00:00
modifiedRemoteContentMap =
remoteContentMap.modifiedSendersChecked(isInitiator, modification);
} catch (final IllegalArgumentException e) {
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, e.getMessage());
return;
}
final SessionDescription offer;
try {
offer = SessionDescription.of(modifiedRemoteContentMap, isResponder());
} catch (final IllegalArgumentException | NullPointerException e) {
2023-11-13 11:54:55 +00:00
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": unable convert offer from content-modify to SDP",
e);
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, e.getMessage());
return;
}
2023-11-13 11:54:55 +00:00
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": auto accepting content-modification");
this.autoAcceptContentModify(modifiedRemoteContentMap, offer);
} else {
2023-11-13 11:54:55 +00:00
Log.d(Config.LOGTAG, "received unsupported content modification " + modification);
respondWithItemNotFound(jinglePacket);
}
}
2023-11-13 11:54:55 +00:00
private void autoAcceptContentModify(
final RtpContentMap modifiedRemoteContentMap, final SessionDescription offer) {
this.setRemoteContentMap(modifiedRemoteContentMap);
final org.webrtc.SessionDescription sdp =
new org.webrtc.SessionDescription(
org.webrtc.SessionDescription.Type.OFFER, offer.toString());
try {
this.webRTCWrapper.setRemoteDescription(sdp).get();
// auto accept is only done when we already have tracks
final SessionDescription answer = setLocalSessionDescription();
final RtpContentMap rtpContentMap = RtpContentMap.of(answer, isInitiator());
modifyLocalContentMap(rtpContentMap);
2023-11-13 11:54:55 +00:00
// we do not need to send an answer but do we have to resend the candidates currently in
// SDP?
// resendCandidatesFromSdp(answer);
webRTCWrapper.setIsReadyToReceiveIceCandidates(true);
} catch (final Exception e) {
Log.d(Config.LOGTAG, "unable to accept content add", Throwables.getRootCause(e));
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION);
}
}
2023-11-13 11:54:55 +00:00
private static ImmutableMultimap<String, IceUdpTransportInfo.Candidate> parseCandidates(
final SessionDescription answer) {
final ImmutableMultimap.Builder<String, IceUdpTransportInfo.Candidate> candidateBuilder =
new ImmutableMultimap.Builder<>();
for (final SessionDescription.Media media : answer.media) {
final String mid = Iterables.getFirst(media.attributes.get("mid"), null);
if (Strings.isNullOrEmpty(mid)) {
continue;
}
2023-11-13 11:54:55 +00:00
for (final String sdpCandidate : media.attributes.get("candidate")) {
final IceUdpTransportInfo.Candidate candidate =
IceUdpTransportInfo.Candidate.fromSdpAttributeValue(sdpCandidate, null);
if (candidate != null) {
2023-11-13 11:54:55 +00:00
candidateBuilder.put(mid, candidate);
}
}
}
2023-11-13 11:36:20 +00:00
return candidateBuilder.build();
}
private void receiveContentReject(final JinglePacket jinglePacket) {
final RtpContentMap receivedContentReject;
try {
receivedContentReject = RtpContentMap.of(jinglePacket);
} catch (final RuntimeException e) {
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid() + ": improperly formatted contents",
Throwables.getRootCause(e));
respondOk(jinglePacket);
this.webRTCWrapper.close();
sendSessionTerminate(Reason.of(e), e.getMessage());
return;
}
final RtpContentMap outgoingContentAdd = this.outgoingContentAdd;
if (outgoingContentAdd == null) {
Log.d(Config.LOGTAG, "received content-reject when we had no outgoing content add");
terminateWithOutOfOrder(jinglePacket);
return;
}
final Set<ContentAddition.Summary> ourSummary = ContentAddition.summary(outgoingContentAdd);
if (ourSummary.equals(ContentAddition.summary(receivedContentReject))) {
this.outgoingContentAdd = null;
respondOk(jinglePacket);
2023-11-13 11:54:55 +00:00
Log.d(Config.LOGTAG, jinglePacket.toString());
receiveContentReject(ourSummary);
} else {
Log.d(Config.LOGTAG, "received content-reject did not match our outgoing content-add");
terminateWithOutOfOrder(jinglePacket);
}
}
private void receiveContentReject(final Set<ContentAddition.Summary> summary) {
try {
this.webRTCWrapper.removeTrack(Media.VIDEO);
final RtpContentMap localContentMap = customRollback();
modifyLocalContentMap(localContentMap);
} catch (final Exception e) {
final Throwable cause = Throwables.getRootCause(e);
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": unable to rollback local description after receiving content-reject",
cause);
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, cause.getMessage());
return;
}
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": remote has rejected our content-add "
+ summary);
}
private void receiveContentRemove(final JinglePacket jinglePacket) {
final RtpContentMap receivedContentRemove;
try {
receivedContentRemove = RtpContentMap.of(jinglePacket);
receivedContentRemove.requireContentDescriptions();
} catch (final RuntimeException e) {
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid() + ": improperly formatted contents",
Throwables.getRootCause(e));
respondOk(jinglePacket);
this.webRTCWrapper.close();
sendSessionTerminate(Reason.of(e), e.getMessage());
return;
}
respondOk(jinglePacket);
receiveContentRemove(receivedContentRemove);
}
private void receiveContentRemove(final RtpContentMap receivedContentRemove) {
final RtpContentMap incomingContentAdd = this.incomingContentAdd;
final Set<ContentAddition.Summary> contentAddSummary =
incomingContentAdd == null
? Collections.emptySet()
: ContentAddition.summary(incomingContentAdd);
final Set<ContentAddition.Summary> removeSummary =
ContentAddition.summary(receivedContentRemove);
if (contentAddSummary.equals(removeSummary)) {
this.incomingContentAdd = null;
updateEndUserState();
} else {
webRTCWrapper.close();
sendSessionTerminate(
Reason.FAILED_APPLICATION,
String.format(
"%s only supports %s as a means to retract a not yet accepted %s",
BuildConfig.APP_NAME,
JinglePacket.Action.CONTENT_REMOVE,
JinglePacket.Action.CONTENT_ADD));
}
}
public synchronized void retractContentAdd() {
final RtpContentMap outgoingContentAdd = this.outgoingContentAdd;
if (outgoingContentAdd == null) {
throw new IllegalStateException("Not outgoing content add");
}
try {
webRTCWrapper.removeTrack(Media.VIDEO);
final RtpContentMap localContentMap = customRollback();
modifyLocalContentMap(localContentMap);
} catch (final Exception e) {
final Throwable cause = Throwables.getRootCause(e);
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": unable to rollback local description after trying to retract content-add",
cause);
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, cause.getMessage());
return;
}
this.outgoingContentAdd = null;
final JinglePacket retract =
outgoingContentAdd
.toStub()
.toJinglePacket(JinglePacket.Action.CONTENT_REMOVE, id.sessionId);
this.send(retract);
Log.d(
Config.LOGTAG,
id.getAccount().getJid()
+ ": retract content-add "
+ ContentAddition.summary(outgoingContentAdd));
}
private RtpContentMap customRollback() throws ExecutionException, InterruptedException {
final SessionDescription sdp = setLocalSessionDescription();
final RtpContentMap localRtpContentMap = RtpContentMap.of(sdp, isInitiator());
final SessionDescription answer = generateFakeResponse(localRtpContentMap);
this.webRTCWrapper
.setRemoteDescription(
new org.webrtc.SessionDescription(
org.webrtc.SessionDescription.Type.ANSWER, answer.toString()))
.get();
return localRtpContentMap;
}
private SessionDescription generateFakeResponse(final RtpContentMap localContentMap) {
final RtpContentMap currentRemote = getRemoteContentMap();
final RtpContentMap.Diff diff = currentRemote.diff(localContentMap);
if (diff.isEmpty()) {
throw new IllegalStateException(
"Unexpected rollback condition. No difference between local and remote");
}
final RtpContentMap patch = localContentMap.toContentModification(diff.added);
if (ImmutableSet.of(Content.Senders.NONE).equals(patch.getSenders())) {
final RtpContentMap nextRemote =
currentRemote.addContent(
patch.modifiedSenders(Content.Senders.NONE), getPeerDtlsSetup());
return SessionDescription.of(nextRemote, isResponder());
}
throw new IllegalStateException(
"Unexpected rollback condition. Senders were not uniformly none");
}
2023-11-13 11:54:55 +00:00
public synchronized void acceptContentAdd(
@NonNull final Set<ContentAddition.Summary> contentAddition) {
final RtpContentMap incomingContentAdd = this.incomingContentAdd;
if (incomingContentAdd == null) {
throw new IllegalStateException("No incoming content add");
}
if (contentAddition.equals(ContentAddition.summary(incomingContentAdd))) {
this.incomingContentAdd = null;
final Set<Content.Senders> senders = incomingContentAdd.getSenders();
2023-11-13 11:54:55 +00:00
Log.d(Config.LOGTAG, "senders of incoming content-add: " + senders);
if (senders.equals(Content.Senders.receiveOnly(isInitiator()))) {
2023-11-13 11:54:55 +00:00
Log.d(
Config.LOGTAG,
"content addition is receive only. we want to upgrade to 'both'");
final RtpContentMap modifiedSenders =
incomingContentAdd.modifiedSenders(Content.Senders.BOTH);
final JinglePacket proposedContentModification =
modifiedSenders
.toStub()
.toJinglePacket(JinglePacket.Action.CONTENT_MODIFY, id.sessionId);
proposedContentModification.setTo(id.with);
2023-11-13 11:54:55 +00:00
xmppConnectionService.sendIqPacket(
id.account,
proposedContentModification,
(account, response) -> {
if (response.getType() == IqPacket.TYPE.RESULT) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": remote has accepted our upgrade to senders=both");
acceptContentAdd(
ContentAddition.summary(modifiedSenders), modifiedSenders);
} else {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": remote has rejected our upgrade to senders=both");
acceptContentAdd(contentAddition, incomingContentAdd);
}
});
} else {
acceptContentAdd(contentAddition, incomingContentAdd);
}
} else {
2023-11-13 11:54:55 +00:00
throw new IllegalStateException(
"Accepted content add does not match pending content-add");
}
}
2023-11-13 11:54:55 +00:00
private void acceptContentAdd(
@NonNull final Set<ContentAddition.Summary> contentAddition,
final RtpContentMap incomingContentAdd) {
final IceUdpTransportInfo.Setup setup = getPeerDtlsSetup();
2023-11-13 11:54:55 +00:00
final RtpContentMap modifiedContentMap =
getRemoteContentMap().addContent(incomingContentAdd, setup);
this.setRemoteContentMap(modifiedContentMap);
final SessionDescription offer;
try {
offer = SessionDescription.of(modifiedContentMap, isResponder());
} catch (final IllegalArgumentException | NullPointerException e) {
2023-11-13 11:54:55 +00:00
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": unable convert offer from content-add to SDP",
e);
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, e.getMessage());
return;
}
this.incomingContentAdd = null;
acceptContentAdd(contentAddition, offer);
}
private void acceptContentAdd(
final Set<ContentAddition.Summary> contentAddition, final SessionDescription offer) {
final org.webrtc.SessionDescription sdp =
new org.webrtc.SessionDescription(
org.webrtc.SessionDescription.Type.OFFER, offer.toString());
try {
this.webRTCWrapper.setRemoteDescription(sdp).get();
// TODO add tracks for 'media' where contentAddition.senders matches
// TODO if senders.sending(isInitiator())
this.webRTCWrapper.addTrack(Media.VIDEO);
// TODO add additional transceivers for recv only cases
final SessionDescription answer = setLocalSessionDescription();
final RtpContentMap rtpContentMap = RtpContentMap.of(answer, isInitiator());
final RtpContentMap contentAcceptMap =
rtpContentMap.toContentModification(
Collections2.transform(contentAddition, ca -> ca.name));
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": sending content-accept "
+ ContentAddition.summary(contentAcceptMap));
addIceCandidatesFromBlackLog();
modifyLocalContentMap(rtpContentMap);
2023-11-13 11:54:55 +00:00
final ListenableFuture<RtpContentMap> future =
prepareOutgoingContentMap(contentAcceptMap);
Futures.addCallback(
future,
2023-11-13 11:54:55 +00:00
new FutureCallback<>() {
@Override
public void onSuccess(final RtpContentMap rtpContentMap) {
sendContentAccept(rtpContentMap);
webRTCWrapper.setIsReadyToReceiveIceCandidates(true);
}
@Override
public void onFailure(@NonNull final Throwable throwable) {
failureToPerformAction(JinglePacket.Action.CONTENT_ACCEPT, throwable);
}
},
MoreExecutors.directExecutor());
} catch (final Exception e) {
Log.d(Config.LOGTAG, "unable to accept content add", Throwables.getRootCause(e));
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION);
}
}
private void sendContentAccept(final RtpContentMap contentAcceptMap) {
2023-11-13 11:54:55 +00:00
final JinglePacket jinglePacket =
contentAcceptMap.toJinglePacket(JinglePacket.Action.CONTENT_ACCEPT, id.sessionId);
send(jinglePacket);
}
public synchronized void rejectContentAdd() {
final RtpContentMap incomingContentAdd = this.incomingContentAdd;
if (incomingContentAdd == null) {
throw new IllegalStateException("No incoming content add");
}
this.incomingContentAdd = null;
updateEndUserState();
rejectContentAdd(incomingContentAdd);
}
private void rejectContentAdd(final RtpContentMap contentMap) {
final JinglePacket jinglePacket =
contentMap
.toStub()
.toJinglePacket(JinglePacket.Action.CONTENT_REJECT, id.sessionId);
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": rejecting content "
+ ContentAddition.summary(contentMap));
send(jinglePacket);
}
private boolean checkForIceRestart(
final JinglePacket jinglePacket, final RtpContentMap rtpContentMap) {
final RtpContentMap existing = getRemoteContentMap();
final Set<IceUdpTransportInfo.Credentials> existingCredentials;
final IceUdpTransportInfo.Credentials newCredentials;
try {
existingCredentials = existing.getCredentials();
newCredentials = rtpContentMap.getDistinctCredentials();
} catch (final IllegalStateException e) {
Log.d(Config.LOGTAG, "unable to gather credentials for comparison", e);
return false;
}
if (existingCredentials.contains(newCredentials)) {
return false;
}
// TODO an alternative approach is to check if we already got an iq result to our
// ICE-restart
// and if that's the case we are seeing an answer.
// This might be more spec compliant but also more error prone potentially
2023-11-13 11:54:55 +00:00
final boolean isSignalStateStable =
this.webRTCWrapper.getSignalingState() == PeerConnection.SignalingState.STABLE;
// TODO a stable signal state can be another indicator that we have an offer to restart ICE
final boolean isOffer = rtpContentMap.emptyCandidates();
final RtpContentMap restartContentMap;
try {
if (isOffer) {
Log.d(Config.LOGTAG, "received offer to restart ICE " + newCredentials);
restartContentMap =
existing.modifiedCredentials(
newCredentials, IceUdpTransportInfo.Setup.ACTPASS);
} else {
final IceUdpTransportInfo.Setup setup = getPeerDtlsSetup();
Log.d(
Config.LOGTAG,
"received confirmation of ICE restart"
+ newCredentials
+ " peer_setup="
+ setup);
// DTLS setup attribute needs to be rewritten to reflect current peer state
// https://groups.google.com/g/discuss-webrtc/c/DfpIMwvUfeM
restartContentMap = existing.modifiedCredentials(newCredentials, setup);
}
if (applyIceRestart(jinglePacket, restartContentMap, isOffer)) {
return isOffer;
} else {
Log.d(Config.LOGTAG, "ignoring ICE restart. sending tie-break");
respondWithTieBreak(jinglePacket);
return true;
}
} catch (final Exception exception) {
respondOk(jinglePacket);
final Throwable rootCause = Throwables.getRootCause(exception);
2021-11-16 14:17:12 +00:00
if (rootCause instanceof WebRTCWrapper.PeerConnectionNotInitialized) {
// If this happens a termination is already in progress
Log.d(Config.LOGTAG, "ignoring PeerConnectionNotInitialized on ICE restart");
2021-11-16 14:17:12 +00:00
return true;
}
Log.d(Config.LOGTAG, "failure to apply ICE restart", rootCause);
webRTCWrapper.close();
sendSessionTerminate(Reason.ofThrowable(rootCause), rootCause.getMessage());
return true;
}
}
private IceUdpTransportInfo.Setup getPeerDtlsSetup() {
final IceUdpTransportInfo.Setup peerSetup = this.peerDtlsSetup;
if (peerSetup == null || peerSetup == IceUdpTransportInfo.Setup.ACTPASS) {
throw new IllegalStateException("Invalid peer setup");
}
return peerSetup;
}
private void storePeerDtlsSetup(final IceUdpTransportInfo.Setup setup) {
if (setup == null || setup == IceUdpTransportInfo.Setup.ACTPASS) {
throw new IllegalArgumentException("Trying to store invalid peer dtls setup");
}
this.peerDtlsSetup = setup;
}
private boolean applyIceRestart(
final JinglePacket jinglePacket,
final RtpContentMap restartContentMap,
final boolean isOffer)
throws ExecutionException, InterruptedException {
2023-11-13 11:54:55 +00:00
final SessionDescription sessionDescription =
SessionDescription.of(restartContentMap, isResponder());
final org.webrtc.SessionDescription.Type type =
isOffer
? org.webrtc.SessionDescription.Type.OFFER
: org.webrtc.SessionDescription.Type.ANSWER;
org.webrtc.SessionDescription sdp =
new org.webrtc.SessionDescription(type, sessionDescription.toString());
if (isOffer && webRTCWrapper.getSignalingState() != PeerConnection.SignalingState.STABLE) {
if (isInitiator()) {
// We ignore the offer and respond with tie-break. This will clause the responder
// not to apply the content map
return false;
}
}
webRTCWrapper.setRemoteDescription(sdp).get();
setRemoteContentMap(restartContentMap);
if (isOffer) {
final SessionDescription localSessionDescription = setLocalSessionDescription();
setLocalContentMap(RtpContentMap.of(localSessionDescription, isInitiator()));
// We need to respond OK before sending any candidates
respondOk(jinglePacket);
webRTCWrapper.setIsReadyToReceiveIceCandidates(true);
} else {
storePeerDtlsSetup(restartContentMap.getDtlsSetup());
}
return true;
}
private void processCandidates(
final Set<Map.Entry<String, DescriptionTransport<RtpDescription,IceUdpTransportInfo>>> contents) {
for (final Map.Entry<String, DescriptionTransport<RtpDescription,IceUdpTransportInfo>> content : contents) {
processCandidate(content);
}
}
private void processCandidate(
final Map.Entry<String, DescriptionTransport<RtpDescription,IceUdpTransportInfo>> content) {
final RtpContentMap rtpContentMap = getRemoteContentMap();
final List<String> indices = toIdentificationTags(rtpContentMap);
final String sdpMid = content.getKey(); // aka content name
final IceUdpTransportInfo transport = content.getValue().transport;
final IceUdpTransportInfo.Credentials credentials = transport.getCredentials();
// TODO check that credentials remained the same
for (final IceUdpTransportInfo.Candidate candidate : transport.getCandidates()) {
final String sdp;
try {
sdp = candidate.toSdpAttribute(credentials.ufrag);
} catch (final IllegalArgumentException e) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": ignoring invalid ICE candidate "
+ e.getMessage());
continue;
2020-04-06 08:26:29 +00:00
}
final int mLineIndex = indices.indexOf(sdpMid);
if (mLineIndex < 0) {
Log.w(
Config.LOGTAG,
"mLineIndex not found for " + sdpMid + ". available indices " + indices);
}
final IceCandidate iceCandidate = new IceCandidate(sdpMid, mLineIndex, sdp);
Log.d(Config.LOGTAG, "received candidate: " + iceCandidate);
this.webRTCWrapper.addIceCandidate(iceCandidate);
}
}
private RtpContentMap getRemoteContentMap() {
return isInitiator() ? this.responderRtpContentMap : this.initiatorRtpContentMap;
}
private RtpContentMap getLocalContentMap() {
return isInitiator() ? this.initiatorRtpContentMap : this.responderRtpContentMap;
}
private List<String> toIdentificationTags(final RtpContentMap rtpContentMap) {
final Group originalGroup = rtpContentMap.group;
final List<String> identificationTags =
originalGroup == null
? rtpContentMap.getNames()
: originalGroup.getIdentificationTags();
if (identificationTags.size() == 0) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": no identification tags found in initial offer. we won't be able to calculate mLineIndices");
2020-04-06 08:26:29 +00:00
}
return identificationTags;
2020-04-06 08:26:29 +00:00
}
private ListenableFuture<RtpContentMap> receiveRtpContentMap(
final JinglePacket jinglePacket, final boolean expectVerification) {
try {
return receiveRtpContentMap(RtpContentMap.of(jinglePacket), expectVerification);
} catch (final Exception e) {
return Futures.immediateFailedFuture(e);
}
2023-11-13 11:54:55 +00:00
}
private ListenableFuture<RtpContentMap> receiveRtpContentMap(
final RtpContentMap receivedContentMap, final boolean expectVerification) {
Log.d(
Config.LOGTAG,
"receiveRtpContentMap("
+ receivedContentMap.getClass().getSimpleName()
+ ",expectVerification="
+ expectVerification
+ ")");
if (receivedContentMap instanceof OmemoVerifiedRtpContentMap) {
final ListenableFuture<AxolotlService.OmemoVerifiedPayload<RtpContentMap>> future =
id.account
.getAxolotlService()
.decrypt((OmemoVerifiedRtpContentMap) receivedContentMap, id.with);
return Futures.transform(
future,
omemoVerifiedPayload -> {
// TODO test if an exception here triggers a correct abort
omemoVerification.setOrEnsureEqual(omemoVerifiedPayload);
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received verifiable DTLS fingerprint via "
+ omemoVerification);
return omemoVerifiedPayload.getPayload();
},
MoreExecutors.directExecutor());
} else if (Config.REQUIRE_RTP_VERIFICATION || expectVerification) {
return Futures.immediateFailedFuture(
new SecurityException("DTLS fingerprint was unexpectedly not verifiable"));
} else {
return Futures.immediateFuture(receivedContentMap);
}
}
2020-04-03 08:46:42 +00:00
private void receiveSessionInitiate(final JinglePacket jinglePacket) {
if (isInitiator()) {
receiveOutOfOrderAction(jinglePacket, JinglePacket.Action.SESSION_INITIATE);
2020-04-03 08:46:42 +00:00
return;
}
final ListenableFuture<RtpContentMap> future = receiveRtpContentMap(jinglePacket, false);
Futures.addCallback(
future,
2023-11-13 11:54:55 +00:00
new FutureCallback<>() {
@Override
public void onSuccess(@Nullable RtpContentMap rtpContentMap) {
receiveSessionInitiate(jinglePacket, rtpContentMap);
}
@Override
public void onFailure(@NonNull final Throwable throwable) {
respondOk(jinglePacket);
sendSessionTerminate(Reason.ofThrowable(throwable), throwable.getMessage());
}
},
MoreExecutors.directExecutor());
}
private void receiveSessionInitiate(
final JinglePacket jinglePacket, final RtpContentMap contentMap) {
2020-04-03 08:46:42 +00:00
try {
2020-04-06 08:26:29 +00:00
contentMap.requireContentDescriptions();
contentMap.requireDTLSFingerprint(true);
} catch (final RuntimeException e) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": improperly formatted contents",
Throwables.getRootCause(e));
respondOk(jinglePacket);
sendSessionTerminate(Reason.of(e), e.getMessage());
2020-04-03 08:46:42 +00:00
return;
}
Log.d(
Config.LOGTAG,
"processing session-init with " + contentMap.contents.size() + " contents");
2020-04-08 13:27:17 +00:00
final State target;
if (this.state == State.PROCEED) {
Preconditions.checkState(
proposedMedia != null && proposedMedia.size() > 0,
"proposed media must be set when processing pre-approved session-initiate");
if (!this.proposedMedia.equals(contentMap.getMedia())) {
sendSessionTerminate(
Reason.SECURITY_ERROR,
String.format(
"Your session proposal (Jingle Message Initiation) included media %s but your session-initiate was %s",
this.proposedMedia, contentMap.getMedia()));
return;
}
2020-04-08 13:27:17 +00:00
target = State.SESSION_INITIALIZED_PRE_APPROVED;
} else {
target = State.SESSION_INITIALIZED;
}
if (transition(target, () -> this.initiatorRtpContentMap = contentMap)) {
respondOk(jinglePacket);
pendingIceCandidates.addAll(contentMap.contents.entrySet());
2020-04-08 13:27:17 +00:00
if (target == State.SESSION_INITIALIZED_PRE_APPROVED) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": automatically accepting session-initiate");
2020-04-03 08:46:42 +00:00
sendSessionAccept();
} else {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received not pre-approved session-initiate. start ringing");
startRinging();
2020-04-03 08:46:42 +00:00
}
} else {
Log.d(
Config.LOGTAG,
String.format(
"%s: received session-initiate while in state %s",
id.account.getJid().asBareJid(), state));
terminateWithOutOfOrder(jinglePacket);
2020-04-03 08:46:42 +00:00
}
2020-04-02 09:30:16 +00:00
}
2020-04-02 14:29:33 +00:00
2020-04-06 13:45:06 +00:00
private void receiveSessionAccept(final JinglePacket jinglePacket) {
if (isResponder()) {
receiveOutOfOrderAction(jinglePacket, JinglePacket.Action.SESSION_ACCEPT);
2020-04-06 13:45:06 +00:00
return;
}
final ListenableFuture<RtpContentMap> future =
receiveRtpContentMap(jinglePacket, this.omemoVerification.hasFingerprint());
Futures.addCallback(
future,
2023-11-13 11:54:55 +00:00
new FutureCallback<>() {
@Override
public void onSuccess(@Nullable RtpContentMap rtpContentMap) {
receiveSessionAccept(jinglePacket, rtpContentMap);
}
@Override
public void onFailure(@NonNull final Throwable throwable) {
respondOk(jinglePacket);
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": improperly formatted contents in session-accept",
throwable);
webRTCWrapper.close();
sendSessionTerminate(Reason.ofThrowable(throwable), throwable.getMessage());
}
},
MoreExecutors.directExecutor());
}
private void receiveSessionAccept(
final JinglePacket jinglePacket, final RtpContentMap contentMap) {
2020-04-06 13:45:06 +00:00
try {
contentMap.requireContentDescriptions();
contentMap.requireDTLSFingerprint();
} catch (final RuntimeException e) {
respondOk(jinglePacket);
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": improperly formatted contents in session-accept",
e);
webRTCWrapper.close();
sendSessionTerminate(Reason.of(e), e.getMessage());
return;
}
final Set<Media> initiatorMedia = this.initiatorRtpContentMap.getMedia();
if (!initiatorMedia.equals(contentMap.getMedia())) {
sendSessionTerminate(
Reason.SECURITY_ERROR,
String.format(
"Your session-included included media %s but our session-initiate was %s",
this.proposedMedia, contentMap.getMedia()));
2020-04-06 13:45:06 +00:00
return;
}
Log.d(
Config.LOGTAG,
"processing session-accept with " + contentMap.contents.size() + " contents");
2020-04-06 13:45:06 +00:00
if (transition(State.SESSION_ACCEPTED)) {
respondOk(jinglePacket);
2020-04-06 13:45:06 +00:00
receiveSessionAccept(contentMap);
} else {
Log.d(
Config.LOGTAG,
String.format(
"%s: received session-accept while in state %s",
id.account.getJid().asBareJid(), state));
respondOk(jinglePacket);
2020-04-06 13:45:06 +00:00
}
}
private void receiveSessionAccept(final RtpContentMap contentMap) {
this.responderRtpContentMap = contentMap;
this.storePeerDtlsSetup(contentMap.getDtlsSetup());
final SessionDescription sessionDescription;
try {
sessionDescription = SessionDescription.of(contentMap, false);
} catch (final IllegalArgumentException | NullPointerException e) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": unable convert offer from session-accept to SDP",
e);
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, e.getMessage());
return;
}
final org.webrtc.SessionDescription answer =
new org.webrtc.SessionDescription(
org.webrtc.SessionDescription.Type.ANSWER, sessionDescription.toString());
2020-04-06 13:45:06 +00:00
try {
this.webRTCWrapper.setRemoteDescription(answer).get();
} catch (final Exception e) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": unable to set remote description after receiving session-accept",
Throwables.getRootCause(e));
webRTCWrapper.close();
sendSessionTerminate(
Reason.FAILED_APPLICATION, Throwables.getRootCause(e).getMessage());
return;
2020-04-06 13:45:06 +00:00
}
processCandidates(contentMap.contents.entrySet());
2020-04-06 13:45:06 +00:00
}
2020-04-06 11:01:17 +00:00
private void sendSessionAccept() {
final RtpContentMap rtpContentMap = this.initiatorRtpContentMap;
if (rtpContentMap == null) {
2020-04-06 13:45:06 +00:00
throw new IllegalStateException("initiator RTP Content Map has not been set");
2020-04-06 11:01:17 +00:00
}
final SessionDescription offer;
try {
offer = SessionDescription.of(rtpContentMap, true);
} catch (final IllegalArgumentException | NullPointerException e) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": unable convert offer from session-initiate to SDP",
e);
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, e.getMessage());
return;
}
sendSessionAccept(rtpContentMap.getMedia(), offer);
}
private void sendSessionAccept(final Set<Media> media, final SessionDescription offer) {
discoverIceServers(iceServers -> sendSessionAccept(media, offer, iceServers));
}
private synchronized void sendSessionAccept(
final Set<Media> media,
final SessionDescription offer,
final List<PeerConnection.IceServer> iceServers) {
if (isTerminated()) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": ICE servers got discovered when session was already terminated. nothing to do.");
return;
}
2023-11-13 11:36:20 +00:00
final boolean includeCandidates = remoteHasSdpOfferAnswer();
try {
2023-11-13 11:36:20 +00:00
setupWebRTC(media, iceServers, !includeCandidates);
} catch (final WebRTCWrapper.InitializationException e) {
Log.d(Config.LOGTAG, id.account.getJid().asBareJid() + ": unable to initialize WebRTC");
webRTCWrapper.close();
sendSessionTerminate(Reason.FAILED_APPLICATION, e.getMessage());
return;
}
final org.webrtc.SessionDescription sdp =
new org.webrtc.SessionDescription(
org.webrtc.SessionDescription.Type.OFFER, offer.toString());
try {
this.webRTCWrapper.setRemoteDescription(sdp).get();
addIceCandidatesFromBlackLog();
org.webrtc.SessionDescription webRTCSessionDescription =
2023-11-13 11:36:20 +00:00
this.webRTCWrapper.setLocalDescription(includeCandidates).get();
prepareSessionAccept(webRTCSessionDescription, includeCandidates);
} catch (final Exception e) {
2021-05-08 06:45:31 +00:00
failureToAcceptSession(e);
}
2020-04-06 11:01:17 +00:00
}
2021-05-08 06:45:31 +00:00
private void failureToAcceptSession(final Throwable throwable) {
if (isTerminated()) {
return;
}
final Throwable rootCause = Throwables.getRootCause(throwable);
Log.d(Config.LOGTAG, "unable to send session accept", rootCause);
2021-05-08 06:45:31 +00:00
webRTCWrapper.close();
sendSessionTerminate(Reason.ofThrowable(rootCause), rootCause.getMessage());
2021-05-08 06:45:31 +00:00
}
2023-11-13 11:54:55 +00:00
private void failureToPerformAction(
final JinglePacket.Action action, final Throwable throwable) {
if (isTerminated()) {
return;
}
final Throwable rootCause = Throwables.getRootCause(throwable);
Log.d(Config.LOGTAG, "unable to send " + action, rootCause);
webRTCWrapper.close();
sendSessionTerminate(Reason.ofThrowable(rootCause), rootCause.getMessage());
}
private void addIceCandidatesFromBlackLog() {
Map.Entry<String, DescriptionTransport<RtpDescription,IceUdpTransportInfo>> foo;
while ((foo = this.pendingIceCandidates.poll()) != null) {
processCandidate(foo);
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": added candidate from back log");
}
}
private void prepareSessionAccept(
2023-11-13 11:54:55 +00:00
final org.webrtc.SessionDescription webRTCSessionDescription,
final boolean includeCandidates) {
final SessionDescription sessionDescription =
SessionDescription.parse(webRTCSessionDescription.description);
final RtpContentMap respondingRtpContentMap = RtpContentMap.of(sessionDescription, false);
2023-11-13 11:36:20 +00:00
final ImmutableMultimap<String, IceUdpTransportInfo.Candidate> candidates;
if (includeCandidates) {
candidates = parseCandidates(sessionDescription);
} else {
candidates = ImmutableMultimap.of();
}
2021-05-08 06:45:31 +00:00
this.responderRtpContentMap = respondingRtpContentMap;
storePeerDtlsSetup(respondingRtpContentMap.getDtlsSetup().flip());
final ListenableFuture<RtpContentMap> outgoingContentMapFuture =
prepareOutgoingContentMap(respondingRtpContentMap);
Futures.addCallback(
outgoingContentMapFuture,
2023-11-13 11:54:55 +00:00
new FutureCallback<>() {
2021-05-08 06:45:31 +00:00
@Override
public void onSuccess(final RtpContentMap outgoingContentMap) {
2023-11-13 11:36:20 +00:00
if (includeCandidates) {
Log.d(
Config.LOGTAG,
"including "
+ candidates.size()
+ " candidates in session accept");
sendSessionAccept(outgoingContentMap.withCandidates(candidates));
} else {
sendSessionAccept(outgoingContentMap);
}
2023-11-14 07:57:22 +00:00
webRTCWrapper.setIsReadyToReceiveIceCandidates(true);
2021-05-08 06:45:31 +00:00
}
@Override
public void onFailure(@NonNull Throwable throwable) {
failureToAcceptSession(throwable);
}
},
MoreExecutors.directExecutor());
2021-05-08 06:45:31 +00:00
}
private void sendSessionAccept(final RtpContentMap rtpContentMap) {
if (isTerminated()) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": preparing session accept was too slow. already terminated. nothing to do.");
return;
}
2021-05-08 06:45:31 +00:00
transitionOrThrow(State.SESSION_ACCEPTED);
final JinglePacket sessionAccept =
rtpContentMap.toJinglePacket(JinglePacket.Action.SESSION_ACCEPT, id.sessionId);
2021-05-08 06:45:31 +00:00
send(sessionAccept);
}
private ListenableFuture<RtpContentMap> prepareOutgoingContentMap(
final RtpContentMap rtpContentMap) {
if (this.omemoVerification.hasDeviceId()) {
ListenableFuture<AxolotlService.OmemoVerifiedPayload<OmemoVerifiedRtpContentMap>>
verifiedPayloadFuture =
id.account
.getAxolotlService()
.encrypt(
rtpContentMap,
id.with,
omemoVerification.getDeviceId());
return Futures.transform(
verifiedPayloadFuture,
verifiedPayload -> {
omemoVerification.setOrEnsureEqual(verifiedPayload);
return verifiedPayload.getPayload();
},
MoreExecutors.directExecutor());
} else {
2021-05-08 06:45:31 +00:00
return Futures.immediateFuture(rtpContentMap);
}
}
synchronized void deliveryMessage(
final Jid from,
final Element message,
final String serverMessageId,
final long timestamp) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": delivered message to JingleRtpConnection "
+ message);
2020-04-02 19:12:38 +00:00
switch (message.getName()) {
2023-11-13 11:54:55 +00:00
case "propose" -> receivePropose(
from, Propose.upgrade(message), serverMessageId, timestamp);
case "proceed" -> receiveProceed(
from, Proceed.upgrade(message), serverMessageId, timestamp);
case "retract" -> receiveRetract(from, serverMessageId, timestamp);
case "reject" -> receiveReject(from, serverMessageId, timestamp);
case "accept" -> receiveAccept(from, serverMessageId, timestamp);
2020-04-02 19:12:38 +00:00
}
}
void deliverFailedProceed(final String message) {
Log.d(
Config.LOGTAG,
2023-11-13 11:54:55 +00:00
id.account.getJid().asBareJid()
+ ": receive message error for proceed message ("
+ Strings.nullToEmpty(message)
+ ")");
if (transition(State.TERMINATED_CONNECTIVITY_ERROR)) {
webRTCWrapper.close();
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": transitioned into connectivity error");
this.finish();
}
}
private void receiveAccept(final Jid from, final String serverMsgId, final long timestamp) {
final boolean originatedFromMyself =
from.asBareJid().equals(id.account.getJid().asBareJid());
2020-04-08 10:17:46 +00:00
if (originatedFromMyself) {
if (transition(State.ACCEPTED)) {
acceptedOnOtherDevice(serverMsgId, timestamp);
2020-04-08 10:17:46 +00:00
} else {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": unable to transition to accept because already in state="
+ this.state);
Log.d(Config.LOGTAG, id.account.getJid() + ": received accept from " + from);
2020-04-08 10:17:46 +00:00
}
} else {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": ignoring 'accept' from " + from);
2020-04-08 10:17:46 +00:00
}
}
private void acceptedOnOtherDevice(final String serverMsgId, final long timestamp) {
if (serverMsgId != null) {
this.message.setServerMsgId(serverMsgId);
}
this.message.setTime(timestamp);
this.message.setCarbon(true); // indicate that call was accepted on other device
this.writeLogMessageSuccess(0);
2023-11-13 11:54:55 +00:00
this.xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
this.finish();
}
private void receiveReject(final Jid from, final String serverMsgId, final long timestamp) {
final boolean originatedFromMyself =
from.asBareJid().equals(id.account.getJid().asBareJid());
// reject from another one of my clients
2020-04-08 09:29:01 +00:00
if (originatedFromMyself) {
receiveRejectFromMyself(serverMsgId, timestamp);
} else if (isInitiator()) {
if (from.equals(id.with)) {
receiveRejectFromResponder();
2020-04-08 09:29:01 +00:00
} else {
Log.d(
Config.LOGTAG,
id.account.getJid()
+ ": ignoring reject from "
+ from
+ " for session with "
+ id.with);
2020-04-08 09:29:01 +00:00
}
} else {
Log.d(
Config.LOGTAG,
id.account.getJid()
+ ": ignoring reject from "
+ from
+ " for session with "
+ id.with);
2020-04-08 09:29:01 +00:00
}
}
private void receiveRejectFromMyself(String serverMsgId, long timestamp) {
if (transition(State.REJECTED)) {
this.xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
this.finish();
if (serverMsgId != null) {
this.message.setServerMsgId(serverMsgId);
}
this.message.setTime(timestamp);
this.message.setCarbon(true); // indicate that call was rejected on other device
writeLogMessageMissed();
} else {
Log.d(
Config.LOGTAG,
"not able to transition into REJECTED because already in " + this.state);
}
}
private void receiveRejectFromResponder() {
if (isInState(State.PROCEED)) {
Log.d(
Config.LOGTAG,
id.account.getJid()
+ ": received reject while still in proceed. callee reconsidered");
closeTransitionLogFinish(State.REJECTED_RACED);
return;
}
if (isInState(State.SESSION_INITIALIZED_PRE_APPROVED)) {
Log.d(
Config.LOGTAG,
id.account.getJid()
+ ": received reject while in SESSION_INITIATED_PRE_APPROVED. callee reconsidered before receiving session-init");
closeTransitionLogFinish(State.TERMINATED_DECLINED_OR_BUSY);
return;
}
Log.d(
Config.LOGTAG,
id.account.getJid()
+ ": ignoring reject from responder because already in state "
+ this.state);
}
private void receivePropose(
final Jid from, final Propose propose, final String serverMsgId, final long timestamp) {
final boolean originatedFromMyself =
from.asBareJid().equals(id.account.getJid().asBareJid());
2020-04-03 08:46:42 +00:00
if (originatedFromMyself) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": saw proposal from myself. ignoring");
} else if (transition(
State.PROPOSED,
() -> {
final Collection<RtpDescription> descriptions =
Collections2.transform(
Collections2.filter(
propose.getDescriptions(),
d -> d instanceof RtpDescription),
input -> (RtpDescription) input);
final Collection<Media> media =
Collections2.transform(descriptions, RtpDescription::getMedia);
Preconditions.checkState(
!media.contains(Media.UNKNOWN),
"RTP descriptions contain unknown media");
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received session proposal from "
+ from
+ " for "
+ media);
this.proposedMedia = Sets.newHashSet(media);
})) {
if (serverMsgId != null) {
this.message.setServerMsgId(serverMsgId);
}
this.message.setTime(timestamp);
2020-04-07 09:36:28 +00:00
startRinging();
if (xmppConnectionService.confirmMessages() && id.getContact().showInContactList()) {
sendJingleMessage("ringing");
}
2020-04-03 08:46:42 +00:00
} else {
Log.d(
Config.LOGTAG,
id.account.getJid()
+ ": ignoring session proposal because already in "
+ state);
2020-04-03 08:46:42 +00:00
}
}
2020-04-07 09:36:28 +00:00
private void startRinging() {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received call from "
+ id.with
+ ". start ringing");
ringingTimeoutFuture =
jingleConnectionManager.schedule(
this::ringingTimeout, BUSY_TIME_OUT, TimeUnit.SECONDS);
xmppConnectionService.getNotificationService().startRinging(id, getMedia());
2020-04-07 09:36:28 +00:00
}
2020-04-22 19:59:20 +00:00
private synchronized void ringingTimeout() {
Log.d(Config.LOGTAG, id.account.getJid().asBareJid() + ": timeout reached for ringing");
switch (this.state) {
2023-11-13 11:54:55 +00:00
case PROPOSED -> {
message.markUnread();
2020-04-22 19:59:20 +00:00
rejectCallFromProposed();
2023-11-13 11:54:55 +00:00
}
case SESSION_INITIALIZED -> {
message.markUnread();
2020-04-22 19:59:20 +00:00
rejectCallFromSessionInitiate();
2023-11-13 11:54:55 +00:00
}
2020-04-22 19:59:20 +00:00
}
xmppConnectionService.getNotificationService().pushMissedCallNow(message);
2020-04-22 19:59:20 +00:00
}
private void cancelRingingTimeout() {
final ScheduledFuture<?> future = this.ringingTimeoutFuture;
if (future != null && !future.isCancelled()) {
future.cancel(false);
}
}
private void receiveProceed(
final Jid from, final Proceed proceed, final String serverMsgId, final long timestamp) {
final Set<Media> media =
Preconditions.checkNotNull(
this.proposedMedia, "Proposed media has to be set before handling proceed");
Preconditions.checkState(media.size() > 0, "Proposed media should not be empty");
2020-04-03 08:46:42 +00:00
if (from.equals(id.with)) {
if (isInitiator()) {
if (transition(State.PROCEED)) {
if (serverMsgId != null) {
this.message.setServerMsgId(serverMsgId);
}
this.message.setTime(timestamp);
final Integer remoteDeviceId = proceed.getDeviceId();
if (isOmemoEnabled()) {
this.omemoVerification.setDeviceId(remoteDeviceId);
} else {
if (remoteDeviceId != null) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": remote party signaled support for OMEMO verification but we have OMEMO disabled");
}
this.omemoVerification.setDeviceId(null);
}
this.sendSessionInitiate(media, State.SESSION_INITIALIZED_PRE_APPROVED);
2020-04-03 08:46:42 +00:00
} else {
Log.d(
Config.LOGTAG,
String.format(
"%s: ignoring proceed because already in %s",
id.account.getJid().asBareJid(), this.state));
2020-04-03 08:46:42 +00:00
}
} else {
Log.d(
Config.LOGTAG,
String.format(
"%s: ignoring proceed because we were not initializing",
id.account.getJid().asBareJid()));
2020-04-03 08:46:42 +00:00
}
2020-04-08 09:29:01 +00:00
} else if (from.asBareJid().equals(id.account.getJid().asBareJid())) {
if (transition(State.ACCEPTED)) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": moved session with "
+ id.with
+ " into state accepted after received carbon copied proceed");
acceptedOnOtherDevice(serverMsgId, timestamp);
2020-04-08 09:29:01 +00:00
}
2020-04-03 08:46:42 +00:00
} else {
Log.d(
Config.LOGTAG,
String.format(
"%s: ignoring proceed from %s. was expected from %s",
id.account.getJid().asBareJid(), from, id.with));
2020-04-03 08:46:42 +00:00
}
}
private void receiveRetract(final Jid from, final String serverMsgId, final long timestamp) {
2020-04-08 07:42:06 +00:00
if (from.equals(id.with)) {
final State target =
this.state == State.PROCEED ? State.RETRACTED_RACED : State.RETRACTED;
if (transition(target)) {
2020-04-08 07:42:06 +00:00
xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
xmppConnectionService.getNotificationService().pushMissedCallNow(message);
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": session with "
+ id.with
+ " has been retracted (serverMsgId="
+ serverMsgId
+ ")");
if (serverMsgId != null) {
this.message.setServerMsgId(serverMsgId);
}
this.message.setTime(timestamp);
if (target == State.RETRACTED) {
this.message.markUnread();
}
writeLogMessageMissed();
finish();
2020-04-08 07:42:06 +00:00
} else {
Log.d(Config.LOGTAG, "ignoring retract because already in " + this.state);
}
} else {
// TODO parse retract from self
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received retract from "
+ from
+ ". expected retract from"
+ id.with
+ ". ignoring");
2020-04-08 07:42:06 +00:00
}
}
public void sendSessionInitiate() {
sendSessionInitiate(this.proposedMedia, State.SESSION_INITIALIZED);
}
private void sendSessionInitiate(final Set<Media> media, final State targetState) {
Log.d(Config.LOGTAG, id.account.getJid().asBareJid() + ": prepare session-initiate");
discoverIceServers(iceServers -> sendSessionInitiate(media, targetState, iceServers));
}
private synchronized void sendSessionInitiate(
final Set<Media> media,
final State targetState,
final List<PeerConnection.IceServer> iceServers) {
if (isTerminated()) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": ICE servers got discovered when session was already terminated. nothing to do.");
return;
}
2023-11-13 11:36:20 +00:00
final boolean includeCandidates = remoteHasSdpOfferAnswer();
try {
2023-11-13 11:36:20 +00:00
setupWebRTC(media, iceServers, !includeCandidates);
} catch (final WebRTCWrapper.InitializationException e) {
Log.d(Config.LOGTAG, id.account.getJid().asBareJid() + ": unable to initialize WebRTC");
webRTCWrapper.close();
sendRetract(Reason.ofThrowable(e));
return;
}
try {
org.webrtc.SessionDescription webRTCSessionDescription =
2023-11-13 11:36:20 +00:00
this.webRTCWrapper.setLocalDescription(includeCandidates).get();
prepareSessionInitiate(webRTCSessionDescription, includeCandidates, targetState);
} catch (final Exception e) {
// TODO sending the error text is worthwhile as well. Especially for FailureToSet
// exceptions
2021-05-08 06:45:31 +00:00
failureToInitiateSession(e, targetState);
}
}
private void failureToInitiateSession(final Throwable throwable, final State targetState) {
if (isTerminated()) {
return;
}
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": unable to sendSessionInitiate",
Throwables.getRootCause(throwable));
2021-05-08 06:45:31 +00:00
webRTCWrapper.close();
final Reason reason = Reason.ofThrowable(throwable);
if (isInState(targetState)) {
sendSessionTerminate(reason, throwable.getMessage());
2021-05-08 06:45:31 +00:00
} else {
sendRetract(reason);
}
}
private void sendRetract(final Reason reason) {
// TODO embed reason into retract
sendJingleMessage("retract", id.with.asBareJid());
transitionOrThrow(reasonToState(reason));
this.finish();
}
private void prepareSessionInitiate(
2023-11-13 11:54:55 +00:00
final org.webrtc.SessionDescription webRTCSessionDescription,
final boolean includeCandidates,
final State targetState) {
final SessionDescription sessionDescription =
SessionDescription.parse(webRTCSessionDescription.description);
final RtpContentMap rtpContentMap = RtpContentMap.of(sessionDescription, true);
2023-11-13 11:36:20 +00:00
final ImmutableMultimap<String, IceUdpTransportInfo.Candidate> candidates;
if (includeCandidates) {
candidates = parseCandidates(sessionDescription);
} else {
candidates = ImmutableMultimap.of();
}
2020-04-06 11:01:17 +00:00
this.initiatorRtpContentMap = rtpContentMap;
final ListenableFuture<RtpContentMap> outgoingContentMapFuture =
encryptSessionInitiate(rtpContentMap);
Futures.addCallback(
outgoingContentMapFuture,
2023-11-13 11:54:55 +00:00
new FutureCallback<>() {
@Override
public void onSuccess(final RtpContentMap outgoingContentMap) {
2023-11-13 11:36:20 +00:00
if (includeCandidates) {
Log.d(
Config.LOGTAG,
"including "
+ candidates.size()
+ " candidates in session initiate");
2023-11-13 11:54:55 +00:00
sendSessionInitiate(
outgoingContentMap.withCandidates(candidates), targetState);
2023-11-13 11:36:20 +00:00
} else {
sendSessionInitiate(outgoingContentMap, targetState);
}
2023-11-14 07:57:22 +00:00
webRTCWrapper.setIsReadyToReceiveIceCandidates(true);
}
2021-05-08 06:45:31 +00:00
@Override
public void onFailure(@NonNull final Throwable throwable) {
failureToInitiateSession(throwable, targetState);
}
},
MoreExecutors.directExecutor());
2021-05-08 06:45:31 +00:00
}
private void sendSessionInitiate(final RtpContentMap rtpContentMap, final State targetState) {
if (isTerminated()) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": preparing session was too slow. already terminated. nothing to do.");
return;
}
this.transitionOrThrow(targetState);
final JinglePacket sessionInitiate =
rtpContentMap.toJinglePacket(JinglePacket.Action.SESSION_INITIATE, id.sessionId);
2020-04-05 11:58:05 +00:00
send(sessionInitiate);
2020-04-03 08:46:42 +00:00
}
private ListenableFuture<RtpContentMap> encryptSessionInitiate(
final RtpContentMap rtpContentMap) {
if (this.omemoVerification.hasDeviceId()) {
final ListenableFuture<AxolotlService.OmemoVerifiedPayload<OmemoVerifiedRtpContentMap>>
verifiedPayloadFuture =
id.account
.getAxolotlService()
.encrypt(
rtpContentMap,
id.with,
omemoVerification.getDeviceId());
final ListenableFuture<RtpContentMap> future =
Futures.transform(
verifiedPayloadFuture,
verifiedPayload -> {
omemoVerification.setSessionFingerprint(
verifiedPayload.getFingerprint());
return verifiedPayload.getPayload();
},
MoreExecutors.directExecutor());
2021-05-08 06:45:31 +00:00
if (Config.REQUIRE_RTP_VERIFICATION) {
return future;
}
2021-05-08 06:45:31 +00:00
return Futures.catching(
future,
CryptoFailedException.class,
e -> {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": unable to use OMEMO DTLS verification on outgoing session initiate. falling back",
e);
2021-05-08 06:45:31 +00:00
return rtpContentMap;
},
MoreExecutors.directExecutor());
} else {
2021-05-08 06:45:31 +00:00
return Futures.immediateFuture(rtpContentMap);
}
}
protected void sendSessionTerminate(final Reason reason) {
sendSessionTerminate(reason, null);
}
protected void sendSessionTerminate(final Reason reason, final String text) {
sendSessionTerminate(reason,text, this::writeLogMessage);
2020-04-08 13:27:17 +00:00
}
private void sendTransportInfo(
final String contentName, IceUdpTransportInfo.Candidate candidate) {
2020-04-05 11:58:05 +00:00
final RtpContentMap transportInfo;
try {
final RtpContentMap rtpContentMap =
isInitiator() ? this.initiatorRtpContentMap : this.responderRtpContentMap;
2020-04-06 13:45:06 +00:00
transportInfo = rtpContentMap.transportInfo(contentName, candidate);
} catch (final Exception e) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": unable to prepare transport-info from candidate for content="
+ contentName);
2020-04-05 11:58:05 +00:00
return;
}
final JinglePacket jinglePacket =
transportInfo.toJinglePacket(JinglePacket.Action.TRANSPORT_INFO, id.sessionId);
2020-04-05 11:58:05 +00:00
send(jinglePacket);
}
2020-04-07 11:15:24 +00:00
public RtpEndUserState getEndUserState() {
switch (this.state) {
2023-11-13 11:54:55 +00:00
case NULL, PROPOSED, SESSION_INITIALIZED -> {
2020-04-07 11:15:24 +00:00
if (isInitiator()) {
return RtpEndUserState.RINGING;
} else {
return RtpEndUserState.INCOMING_CALL;
}
2023-11-13 11:54:55 +00:00
}
case PROCEED -> {
2020-04-07 11:15:24 +00:00
if (isInitiator()) {
return RtpEndUserState.RINGING;
2020-04-07 11:15:24 +00:00
} else {
return RtpEndUserState.ACCEPTING_CALL;
}
2023-11-13 11:54:55 +00:00
}
case SESSION_INITIALIZED_PRE_APPROVED -> {
if (isInitiator()) {
return RtpEndUserState.RINGING;
} else {
return RtpEndUserState.CONNECTING;
}
2023-11-13 11:54:55 +00:00
}
case SESSION_ACCEPTED -> {
final ContentAddition ca = getPendingContentAddition();
if (ca != null && ca.direction == ContentAddition.Direction.INCOMING) {
return RtpEndUserState.INCOMING_CONTENT_ADD;
}
return getPeerConnectionStateAsEndUserState();
2023-11-13 11:54:55 +00:00
}
case REJECTED, REJECTED_RACED, TERMINATED_DECLINED_OR_BUSY -> {
2020-04-07 19:26:51 +00:00
if (isInitiator()) {
return RtpEndUserState.DECLINED_OR_BUSY;
} else {
return RtpEndUserState.ENDED;
2020-04-07 11:15:24 +00:00
}
2023-11-13 11:54:55 +00:00
}
case TERMINATED_SUCCESS, ACCEPTED, RETRACTED, TERMINATED_CANCEL_OR_TIMEOUT -> {
2020-04-07 19:26:51 +00:00
return RtpEndUserState.ENDED;
2023-11-13 11:54:55 +00:00
}
case RETRACTED_RACED -> {
if (isInitiator()) {
return RtpEndUserState.ENDED;
} else {
return RtpEndUserState.RETRACTED;
}
2023-11-13 11:54:55 +00:00
}
case TERMINATED_CONNECTIVITY_ERROR -> {
return zeroDuration()
? RtpEndUserState.CONNECTIVITY_ERROR
: RtpEndUserState.CONNECTIVITY_LOST_ERROR;
2023-11-13 11:54:55 +00:00
}
case TERMINATED_APPLICATION_FAILURE -> {
return RtpEndUserState.APPLICATION_ERROR;
2023-11-13 11:54:55 +00:00
}
case TERMINATED_SECURITY_ERROR -> {
return RtpEndUserState.SECURITY_ERROR;
2023-11-13 11:54:55 +00:00
}
2020-04-07 11:15:24 +00:00
}
throw new IllegalStateException(
String.format("%s has no equivalent EndUserState", this.state));
2020-04-07 11:15:24 +00:00
}
private RtpEndUserState getPeerConnectionStateAsEndUserState() {
final PeerConnection.PeerConnectionState state;
try {
state = webRTCWrapper.getState();
} catch (final WebRTCWrapper.PeerConnectionNotInitialized e) {
// We usually close the WebRTCWrapper *before* transitioning so we might still
// be in SESSION_ACCEPTED even though the peerConnection has been torn down
return RtpEndUserState.ENDING_CALL;
}
2023-11-13 11:54:55 +00:00
return switch (state) {
case CONNECTED -> RtpEndUserState.CONNECTED;
case NEW, CONNECTING -> RtpEndUserState.CONNECTING;
case CLOSED -> RtpEndUserState.ENDING_CALL;
default -> zeroDuration()
? RtpEndUserState.CONNECTIVITY_ERROR
: RtpEndUserState.RECONNECTING;
};
}
public ContentAddition getPendingContentAddition() {
final RtpContentMap in = this.incomingContentAdd;
final RtpContentMap out = this.outgoingContentAdd;
if (out != null) {
return ContentAddition.of(ContentAddition.Direction.OUTGOING, out);
} else if (in != null) {
return ContentAddition.of(ContentAddition.Direction.INCOMING, in);
} else {
return null;
}
}
2020-04-15 16:28:04 +00:00
public Set<Media> getMedia() {
final State current = getState();
if (current == State.NULL) {
if (isInitiator()) {
return Preconditions.checkNotNull(
this.proposedMedia, "RTP connection has not been initialized properly");
}
2020-04-15 16:28:04 +00:00
throw new IllegalStateException("RTP connection has not been initialized yet");
}
if (Arrays.asList(State.PROPOSED, State.PROCEED).contains(current)) {
return Preconditions.checkNotNull(
this.proposedMedia, "RTP connection has not been initialized properly");
}
final RtpContentMap localContentMap = getLocalContentMap();
final RtpContentMap initiatorContentMap = initiatorRtpContentMap;
if (localContentMap != null) {
return localContentMap.getMedia();
} else if (initiatorContentMap != null) {
return initiatorContentMap.getMedia();
} else if (isTerminated()) {
2023-11-13 11:54:55 +00:00
return Collections.emptySet(); // we might fail before we ever got a chance to set media
} else {
2023-11-13 11:54:55 +00:00
return Preconditions.checkNotNull(
this.proposedMedia, "RTP connection has not been initialized properly");
2020-04-15 16:28:04 +00:00
}
}
public boolean isVerified() {
final String fingerprint = this.omemoVerification.getFingerprint();
if (fingerprint == null) {
return false;
}
final FingerprintStatus status =
id.account.getAxolotlService().getFingerprintTrust(fingerprint);
return status != null && status.isVerified();
}
public boolean addMedia(final Media media) {
final Set<Media> currentMedia = getMedia();
if (currentMedia.contains(media)) {
throw new IllegalStateException(String.format("%s has already been proposed", media));
}
// TODO add state protection - can only add while ACCEPTED or so
2023-11-13 11:54:55 +00:00
Log.d(Config.LOGTAG, "adding media: " + media);
return webRTCWrapper.addTrack(media);
}
public synchronized void acceptCall() {
2020-04-02 19:12:38 +00:00
switch (this.state) {
2023-11-13 11:54:55 +00:00
case PROPOSED -> {
2020-04-22 19:59:20 +00:00
cancelRingingTimeout();
2020-04-07 11:15:24 +00:00
acceptCallFromProposed();
2023-11-13 11:54:55 +00:00
}
case SESSION_INITIALIZED -> {
2020-04-22 19:59:20 +00:00
cancelRingingTimeout();
2020-04-07 11:15:24 +00:00
acceptCallFromSessionInitialized();
2023-11-13 11:54:55 +00:00
}
case ACCEPTED -> Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": the call has already been accepted with another client. UI was just lagging behind");
case PROCEED, SESSION_ACCEPTED -> Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": the call has already been accepted. user probably double tapped the UI");
default -> throw new IllegalStateException("Can not accept call from " + this.state);
2020-04-02 19:12:38 +00:00
}
}
public void notifyPhoneCall() {
Log.d(Config.LOGTAG, "a phone call has just been started. killing jingle rtp connections");
if (Arrays.asList(State.PROPOSED, State.SESSION_INITIALIZED).contains(this.state)) {
rejectCall();
} else {
endCall();
}
}
public synchronized void rejectCall() {
if (isTerminated()) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received rejectCall() when session has already been terminated. nothing to do");
return;
}
2020-04-07 19:26:51 +00:00
switch (this.state) {
2023-11-13 11:54:55 +00:00
case PROPOSED -> rejectCallFromProposed();
case SESSION_INITIALIZED -> rejectCallFromSessionInitiate();
default -> throw new IllegalStateException("Can not reject call from " + this.state);
2020-04-07 19:26:51 +00:00
}
2020-04-07 11:15:24 +00:00
}
public synchronized void endCall() {
if (isTerminated()) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": received endCall() when session has already been terminated. nothing to do");
return;
}
if (isInState(State.PROPOSED) && isResponder()) {
2020-04-10 08:35:00 +00:00
rejectCallFromProposed();
return;
}
if (isInState(State.PROCEED)) {
if (isInitiator()) {
retractFromProceed();
} else {
rejectCallFromProceed();
}
return;
}
if (isInitiator()
&& isInState(State.SESSION_INITIALIZED, State.SESSION_INITIALIZED_PRE_APPROVED)) {
this.webRTCWrapper.close();
2020-04-08 13:27:17 +00:00
sendSessionTerminate(Reason.CANCEL);
return;
}
2020-04-10 08:35:00 +00:00
if (isInState(State.SESSION_INITIALIZED)) {
rejectCallFromSessionInitiate();
return;
}
if (isInState(State.SESSION_INITIALIZED_PRE_APPROVED, State.SESSION_ACCEPTED)) {
this.webRTCWrapper.close();
2020-04-08 13:27:17 +00:00
sendSessionTerminate(Reason.SUCCESS);
return;
2020-04-07 12:22:12 +00:00
}
if (isInState(
State.TERMINATED_APPLICATION_FAILURE,
State.TERMINATED_CONNECTIVITY_ERROR,
State.TERMINATED_DECLINED_OR_BUSY)) {
Log.d(
Config.LOGTAG,
"ignoring request to end call because already in state " + this.state);
2020-04-10 11:13:20 +00:00
return;
}
throw new IllegalStateException(
"called 'endCall' while in state " + this.state + ". isInitiator=" + isInitiator());
2020-04-07 12:22:12 +00:00
}
private void retractFromProceed() {
Log.d(Config.LOGTAG, "retract from proceed");
this.sendJingleMessage("retract");
closeTransitionLogFinish(State.RETRACTED_RACED);
}
private void closeTransitionLogFinish(final State state) {
this.webRTCWrapper.close();
transitionOrThrow(state);
writeLogMessage(state);
finish();
}
2023-11-13 11:54:55 +00:00
private void setupWebRTC(
final Set<Media> media,
final List<PeerConnection.IceServer> iceServers,
final boolean trickle)
throws WebRTCWrapper.InitializationException {
this.jingleConnectionManager.ensureConnectionIsRegistered(this);
2023-11-13 11:54:55 +00:00
this.webRTCWrapper.setup(
this.xmppConnectionService, AppRTCAudioManager.SpeakerPhonePreference.of(media));
2023-11-13 11:36:20 +00:00
this.webRTCWrapper.initializePeerConnection(media, iceServers, trickle);
}
2020-04-07 11:15:24 +00:00
private void acceptCallFromProposed() {
2020-04-02 19:12:38 +00:00
transitionOrThrow(State.PROCEED);
xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
2020-04-08 10:17:46 +00:00
this.sendJingleMessage("accept", id.account.getJid().asBareJid());
2020-04-07 19:26:51 +00:00
this.sendJingleMessage("proceed");
}
private void rejectCallFromProposed() {
transitionOrThrow(State.REJECTED);
writeLogMessageMissed();
2020-04-07 19:26:51 +00:00
xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
this.sendJingleMessage("reject");
finish();
2020-04-07 19:26:51 +00:00
}
private void rejectCallFromProceed() {
this.sendJingleMessage("reject");
closeTransitionLogFinish(State.REJECTED_RACED);
}
private void rejectCallFromSessionInitiate() {
webRTCWrapper.close();
sendSessionTerminate(Reason.DECLINE);
xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
}
2020-04-07 19:26:51 +00:00
private void sendJingleMessage(final String action) {
2020-04-08 10:17:46 +00:00
sendJingleMessage(action, id.with);
}
private void sendJingleMessage(final String action, final Jid to) {
2020-04-02 19:12:38 +00:00
final MessagePacket messagePacket = new MessagePacket();
messagePacket.setType(MessagePacket.TYPE_CHAT); // we want to carbon copy those
messagePacket.setTo(to);
final Element intent =
messagePacket
.addChild(action, Namespace.JINGLE_MESSAGE)
.setAttribute("id", id.sessionId);
if ("proceed".equals(action)) {
messagePacket.setId(JINGLE_MESSAGE_PROCEED_ID_PREFIX + id.sessionId);
if (isOmemoEnabled()) {
final int deviceId = id.account.getAxolotlService().getOwnDeviceId();
final Element device =
intent.addChild("device", Namespace.OMEMO_DTLS_SRTP_VERIFICATION);
device.setAttribute("id", deviceId);
}
}
messagePacket.addChild("store", "urn:xmpp:hints");
2020-04-02 19:12:38 +00:00
xmppConnectionService.sendMessagePacket(id.account, messagePacket);
2020-04-02 14:29:33 +00:00
}
2020-04-02 19:12:38 +00:00
private boolean isOmemoEnabled() {
final Conversational conversational = message.getConversation();
if (conversational instanceof Conversation) {
return ((Conversation) conversational).getNextEncryption()
== Message.ENCRYPTION_AXOLOTL;
}
return false;
}
2020-04-07 11:15:24 +00:00
private void acceptCallFromSessionInitialized() {
xmppConnectionService.getNotificationService().cancelIncomingCallNotification();
sendSessionAccept();
2020-04-02 19:12:38 +00:00
}
@Override
protected synchronized boolean transition(final State target, final Runnable runnable) {
if (super.transition(target, runnable)) {
2020-04-07 11:15:24 +00:00
updateEndUserState();
2020-04-10 13:19:56 +00:00
updateOngoingCallNotification();
2020-04-02 19:12:38 +00:00
return true;
} else {
return false;
}
}
2020-04-06 11:01:17 +00:00
@Override
public void onIceCandidate(final IceCandidate iceCandidate) {
final RtpContentMap rtpContentMap =
isInitiator() ? this.initiatorRtpContentMap : this.responderRtpContentMap;
final IceUdpTransportInfo.Credentials credentials;
try {
credentials = rtpContentMap.getCredentials(iceCandidate.sdpMid);
} catch (final IllegalArgumentException e) {
Log.d(Config.LOGTAG, "ignoring (not sending) candidate: " + iceCandidate, e);
return;
}
final String uFrag = credentials.ufrag;
final IceUdpTransportInfo.Candidate candidate =
IceUdpTransportInfo.Candidate.fromSdpAttribute(iceCandidate.sdp, uFrag);
if (candidate == null) {
Log.d(Config.LOGTAG, "ignoring (not sending) candidate: " + iceCandidate);
return;
}
Log.d(Config.LOGTAG, "sending candidate: " + iceCandidate);
2020-04-06 11:01:17 +00:00
sendTransportInfo(iceCandidate.sdpMid, candidate);
}
2020-04-07 11:15:24 +00:00
@Override
public void onConnectionChange(final PeerConnection.PeerConnectionState newState) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": PeerConnectionState changed to " + newState);
this.stateHistory.add(newState);
if (newState == PeerConnection.PeerConnectionState.CONNECTED) {
this.sessionDuration.start();
updateOngoingCallNotification();
} else if (this.sessionDuration.isRunning()) {
this.sessionDuration.stop();
updateOngoingCallNotification();
}
final boolean neverConnected =
!this.stateHistory.contains(PeerConnection.PeerConnectionState.CONNECTED);
2021-11-16 14:17:12 +00:00
if (newState == PeerConnection.PeerConnectionState.FAILED) {
if (neverConnected) {
if (isTerminated()) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": not sending session-terminate after connectivity error because session is already in state "
+ this.state);
2021-11-16 14:17:12 +00:00
return;
}
webRTCWrapper.execute(this::closeWebRTCSessionAfterFailedConnection);
2020-04-12 07:59:32 +00:00
return;
2021-11-16 14:17:12 +00:00
} else {
this.restartIce();
2020-04-12 07:59:32 +00:00
}
2020-04-08 13:27:17 +00:00
}
updateEndUserState();
}
private void restartIce() {
this.stateHistory.clear();
this.webRTCWrapper.restartIceAsync();
}
@Override
public void onRenegotiationNeeded() {
this.webRTCWrapper.execute(this::renegotiate);
}
private void renegotiate() {
final SessionDescription sessionDescription;
try {
sessionDescription = setLocalSessionDescription();
} catch (final Exception e) {
final Throwable cause = Throwables.getRootCause(e);
webRTCWrapper.close();
if (isTerminated()) {
2023-11-13 11:54:55 +00:00
Log.d(
Config.LOGTAG,
"failed to renegotiate. session was already terminated",
cause);
return;
}
Log.d(Config.LOGTAG, "failed to renegotiate. sending session-terminate", cause);
sendSessionTerminate(Reason.FAILED_APPLICATION, cause.getMessage());
return;
}
final RtpContentMap rtpContentMap = RtpContentMap.of(sessionDescription, isInitiator());
final RtpContentMap currentContentMap = getLocalContentMap();
final boolean iceRestart = currentContentMap.iceRestart(rtpContentMap);
final RtpContentMap.Diff diff = currentContentMap.diff(rtpContentMap);
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": renegotiate. iceRestart="
+ iceRestart
+ " content id diff="
+ diff);
if (diff.hasModifications() && iceRestart) {
webRTCWrapper.close();
sendSessionTerminate(
Reason.FAILED_APPLICATION,
"WebRTC unexpectedly tried to modify content and transport at once");
return;
}
if (iceRestart) {
initiateIceRestart(rtpContentMap);
return;
} else if (diff.isEmpty()) {
Log.d(
Config.LOGTAG,
"renegotiation. nothing to do. SignalingState="
+ this.webRTCWrapper.getSignalingState());
}
if (diff.added.size() > 0) {
modifyLocalContentMap(rtpContentMap);
sendContentAdd(rtpContentMap, diff.added);
}
}
private void initiateIceRestart(final RtpContentMap rtpContentMap) {
final RtpContentMap transportInfo = rtpContentMap.transportInfo();
final JinglePacket jinglePacket =
transportInfo.toJinglePacket(JinglePacket.Action.TRANSPORT_INFO, id.sessionId);
Log.d(Config.LOGTAG, "initiating ice restart: " + jinglePacket);
jinglePacket.setTo(id.with);
xmppConnectionService.sendIqPacket(
id.account,
jinglePacket,
(account, response) -> {
if (response.getType() == IqPacket.TYPE.RESULT) {
Log.d(Config.LOGTAG, "received success to our ice restart");
setLocalContentMap(rtpContentMap);
webRTCWrapper.setIsReadyToReceiveIceCandidates(true);
return;
}
if (response.getType() == IqPacket.TYPE.ERROR) {
if (isTieBreak(response)) {
Log.d(Config.LOGTAG, "received tie-break as result of ice restart");
return;
}
handleIqErrorResponse(response);
}
if (response.getType() == IqPacket.TYPE.TIMEOUT) {
handleIqTimeoutResponse(response);
}
});
}
private boolean isTieBreak(final IqPacket response) {
final Element error = response.findChild("error");
return error != null && error.hasChild("tie-break", Namespace.JINGLE_ERRORS);
}
private void sendContentAdd(final RtpContentMap rtpContentMap, final Collection<String> added) {
final RtpContentMap contentAdd = rtpContentMap.toContentModification(added);
this.outgoingContentAdd = contentAdd;
final ListenableFuture<RtpContentMap> outgoingContentMapFuture =
prepareOutgoingContentMap(contentAdd);
Futures.addCallback(
outgoingContentMapFuture,
2023-11-13 11:54:55 +00:00
new FutureCallback<>() {
@Override
public void onSuccess(final RtpContentMap outgoingContentMap) {
sendContentAdd(outgoingContentMap);
webRTCWrapper.setIsReadyToReceiveIceCandidates(true);
}
@Override
public void onFailure(@NonNull Throwable throwable) {
failureToPerformAction(JinglePacket.Action.CONTENT_ADD, throwable);
}
},
MoreExecutors.directExecutor());
}
private void sendContentAdd(final RtpContentMap contentAdd) {
final JinglePacket jinglePacket =
contentAdd.toJinglePacket(JinglePacket.Action.CONTENT_ADD, id.sessionId);
jinglePacket.setTo(id.with);
xmppConnectionService.sendIqPacket(
id.account,
jinglePacket,
(connection, response) -> {
if (response.getType() == IqPacket.TYPE.RESULT) {
Log.d(
Config.LOGTAG,
id.getAccount().getJid().asBareJid()
+ ": received ACK to our content-add");
return;
}
if (response.getType() == IqPacket.TYPE.ERROR) {
if (isTieBreak(response)) {
this.outgoingContentAdd = null;
Log.d(Config.LOGTAG, "received tie-break as result of our content-add");
return;
}
handleIqErrorResponse(response);
}
if (response.getType() == IqPacket.TYPE.TIMEOUT) {
handleIqTimeoutResponse(response);
}
});
}
private void setLocalContentMap(final RtpContentMap rtpContentMap) {
if (isInitiator()) {
this.initiatorRtpContentMap = rtpContentMap;
} else {
this.responderRtpContentMap = rtpContentMap;
}
}
private void setRemoteContentMap(final RtpContentMap rtpContentMap) {
if (isInitiator()) {
this.responderRtpContentMap = rtpContentMap;
} else {
this.initiatorRtpContentMap = rtpContentMap;
}
}
// this method is to be used for content map modifications that modify media
private void modifyLocalContentMap(final RtpContentMap rtpContentMap) {
final RtpContentMap activeContents = rtpContentMap.activeContents();
setLocalContentMap(activeContents);
this.webRTCWrapper.switchSpeakerPhonePreference(
AppRTCAudioManager.SpeakerPhonePreference.of(activeContents.getMedia()));
updateEndUserState();
}
private SessionDescription setLocalSessionDescription()
throws ExecutionException, InterruptedException {
final org.webrtc.SessionDescription sessionDescription =
2023-11-13 11:36:20 +00:00
this.webRTCWrapper.setLocalDescription(false).get();
return SessionDescription.parse(sessionDescription.description);
2020-04-07 11:15:24 +00:00
}
private void closeWebRTCSessionAfterFailedConnection() {
this.webRTCWrapper.close();
synchronized (this) {
if (isTerminated()) {
Log.d(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": no need to send session-terminate after failed connection. Other party already did");
return;
}
sendSessionTerminate(Reason.CONNECTIVITY_ERROR);
}
}
public boolean zeroDuration() {
return this.sessionDuration.elapsed(TimeUnit.NANOSECONDS) <= 0;
}
public long getCallDuration() {
return this.sessionDuration.elapsed(TimeUnit.MILLISECONDS);
}
2020-04-13 10:53:23 +00:00
public AppRTCAudioManager getAudioManager() {
return webRTCWrapper.getAudioManager();
}
public boolean isMicrophoneEnabled() {
return webRTCWrapper.isMicrophoneEnabled();
}
public boolean setMicrophoneEnabled(final boolean enabled) {
return webRTCWrapper.setMicrophoneEnabled(enabled);
}
public boolean isVideoEnabled() {
return webRTCWrapper.isVideoEnabled();
}
public void setVideoEnabled(final boolean enabled) {
webRTCWrapper.setVideoEnabled(enabled);
}
public boolean isCameraSwitchable() {
return webRTCWrapper.isCameraSwitchable();
}
2020-05-03 09:08:11 +00:00
public boolean isFrontCamera() {
return webRTCWrapper.isFrontCamera();
}
public ListenableFuture<Boolean> switchCamera() {
return webRTCWrapper.switchCamera();
}
2020-04-13 10:02:34 +00:00
@Override
public void onAudioDeviceChanged(
AppRTCAudioManager.AudioDevice selectedAudioDevice,
Set<AppRTCAudioManager.AudioDevice> availableAudioDevices) {
xmppConnectionService.notifyJingleRtpConnectionUpdate(
selectedAudioDevice, availableAudioDevices);
2020-04-13 10:02:34 +00:00
}
2020-04-07 11:15:24 +00:00
private void updateEndUserState() {
2020-04-27 15:51:38 +00:00
final RtpEndUserState endUserState = getEndUserState();
jingleConnectionManager.toneManager.transition(isInitiator(), endUserState, getMedia());
xmppConnectionService.notifyJingleRtpConnectionUpdate(
id.account, id.with, id.sessionId, endUserState);
2020-04-07 11:15:24 +00:00
}
2020-04-08 15:52:47 +00:00
2020-04-10 13:19:56 +00:00
private void updateOngoingCallNotification() {
final State state = this.state;
if (STATES_SHOWING_ONGOING_CALL.contains(state)) {
final boolean reconnecting;
if (state == State.SESSION_ACCEPTED) {
reconnecting =
getPeerConnectionStateAsEndUserState() == RtpEndUserState.RECONNECTING;
} else {
reconnecting = false;
}
xmppConnectionService.setOngoingCall(id, getMedia(), reconnecting);
2020-04-10 13:19:56 +00:00
} else {
xmppConnectionService.removeOngoingCall();
2020-04-10 13:19:56 +00:00
}
}
2020-04-08 15:52:47 +00:00
private void discoverIceServers(final OnIceServersDiscovered onIceServersDiscovered) {
2020-04-21 09:40:05 +00:00
if (id.account.getXmppConnection().getFeatures().externalServiceDiscovery()) {
2020-04-08 15:52:47 +00:00
final IqPacket request = new IqPacket(IqPacket.TYPE.GET);
request.setTo(id.account.getDomain());
2020-04-08 15:52:47 +00:00
request.addChild("services", Namespace.EXTERNAL_SERVICE_DISCOVERY);
xmppConnectionService.sendIqPacket(
id.account,
request,
(account, response) -> {
final var iceServers = IceServers.parse(response);
if (iceServers.size() == 0) {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid()
+ ": no ICE server found "
+ response);
}
onIceServersDiscovered.onIceServersDiscovered(iceServers);
});
2020-04-08 15:52:47 +00:00
} else {
Log.w(
Config.LOGTAG,
id.account.getJid().asBareJid() + ": has no external service discovery");
2020-04-08 15:52:47 +00:00
onIceServersDiscovered.onIceServersDiscovered(Collections.emptyList());
}
}
@Override
protected void terminateTransport() {
this.webRTCWrapper.close();
}
2020-04-08 15:52:47 +00:00
@Override
protected void finish() {
if (isTerminated()) {
this.cancelRingingTimeout();
this.webRTCWrapper.verifyClosed();
this.jingleConnectionManager.setTerminalSessionState(id, getEndUserState(), getMedia());
super.finish();
} else {
throw new IllegalStateException(
String.format("Unable to call finish from %s", this.state));
}
}
private void writeLogMessage(final State state) {
final long duration = getCallDuration();
if (state == State.TERMINATED_SUCCESS
|| (state == State.TERMINATED_CONNECTIVITY_ERROR && duration > 0)) {
writeLogMessageSuccess(duration);
} else {
writeLogMessageMissed();
}
}
private void writeLogMessageSuccess(final long duration) {
this.message.setBody(new RtpSessionStatus(true, duration).toString());
this.writeMessage();
}
private void writeLogMessageMissed() {
this.message.setBody(new RtpSessionStatus(false, 0).toString());
this.writeMessage();
}
private void writeMessage() {
final Conversational conversational = message.getConversation();
if (conversational instanceof Conversation) {
((Conversation) conversational).add(this.message);
xmppConnectionService.createMessageAsync(message);
xmppConnectionService.updateConversationUi();
} else {
throw new IllegalStateException("Somehow the conversation in a message was a stub");
}
}
public Optional<VideoTrack> getLocalVideoTrack() {
2020-04-14 17:06:39 +00:00
return webRTCWrapper.getLocalVideoTrack();
}
public Optional<VideoTrack> getRemoteVideoTrack() {
return webRTCWrapper.getRemoteVideoTrack();
}
public EglBase.Context getEglBaseContext() {
return webRTCWrapper.getEglBaseContext();
}
2020-04-24 07:16:59 +00:00
void setProposedMedia(final Set<Media> media) {
this.proposedMedia = media;
2020-04-15 08:49:38 +00:00
}
public void fireStateUpdate() {
final RtpEndUserState endUserState = getEndUserState();
xmppConnectionService.notifyJingleRtpConnectionUpdate(
id.account, id.with, id.sessionId, endUserState);
}
public boolean isSwitchToVideoAvailable() {
final boolean prerequisite =
Media.audioOnly(getMedia())
&& Arrays.asList(RtpEndUserState.CONNECTED, RtpEndUserState.RECONNECTING)
.contains(getEndUserState());
return prerequisite && remoteHasVideoFeature();
}
private boolean remoteHasVideoFeature() {
2023-11-13 11:36:20 +00:00
return remoteHasFeature(Namespace.JINGLE_FEATURE_VIDEO);
}
private boolean remoteHasSdpOfferAnswer() {
return remoteHasFeature(Namespace.SDP_OFFER_ANSWER);
}
2020-04-08 15:52:47 +00:00
private interface OnIceServersDiscovered {
void onIceServersDiscovered(List<PeerConnection.IceServer> iceServers);
}
2020-04-02 09:30:16 +00:00
}