2014-02-21 04:26:16 +04:00
|
|
|
/* jshint moz:true, browser:true */
|
2012-10-07 09:34:30 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
"use strict";
|
|
|
|
|
2018-01-30 02:20:18 +03:00
|
|
|
ChromeUtils.import("resource://gre/modules/Services.jsm");
|
|
|
|
ChromeUtils.import("resource://gre/modules/XPCOMUtils.jsm");
|
|
|
|
ChromeUtils.defineModuleGetter(this, "PeerConnectionIdp",
|
2014-02-11 02:41:46 +04:00
|
|
|
"resource://gre/modules/media/PeerConnectionIdp.jsm");
|
2018-01-30 02:20:18 +03:00
|
|
|
ChromeUtils.defineModuleGetter(this, "convertToRTCStatsReport",
|
2014-06-10 02:14:14 +04:00
|
|
|
"resource://gre/modules/media/RTCStatsReport.jsm");
|
2018-01-30 02:20:18 +03:00
|
|
|
ChromeUtils.defineModuleGetter(this, "AppConstants",
|
2015-08-07 22:22:30 +03:00
|
|
|
"resource://gre/modules/AppConstants.jsm");
|
2012-10-07 09:34:30 +04:00
|
|
|
|
|
|
|
const PC_CONTRACT = "@mozilla.org/dom/peerconnection;1";
|
2013-10-14 20:53:56 +04:00
|
|
|
const PC_OBS_CONTRACT = "@mozilla.org/dom/peerconnectionobserver;1";
|
2012-10-07 09:34:30 +04:00
|
|
|
const PC_ICE_CONTRACT = "@mozilla.org/dom/rtcicecandidate;1";
|
|
|
|
const PC_SESSION_CONTRACT = "@mozilla.org/dom/rtcsessiondescription;1";
|
2012-11-10 09:04:27 +04:00
|
|
|
const PC_MANAGER_CONTRACT = "@mozilla.org/dom/peerconnectionmanager;1";
|
2013-10-18 02:00:05 +04:00
|
|
|
const PC_STATS_CONTRACT = "@mozilla.org/dom/rtcstatsreport;1";
|
2014-05-23 01:14:56 +04:00
|
|
|
const PC_STATIC_CONTRACT = "@mozilla.org/dom/peerconnectionstatic;1";
|
2014-08-14 05:40:41 +04:00
|
|
|
const PC_SENDER_CONTRACT = "@mozilla.org/dom/rtpsender;1";
|
|
|
|
const PC_RECEIVER_CONTRACT = "@mozilla.org/dom/rtpreceiver;1";
|
2017-08-23 23:51:21 +03:00
|
|
|
const PC_TRANSCEIVER_CONTRACT = "@mozilla.org/dom/rtptransceiver;1";
|
2015-08-11 20:48:55 +03:00
|
|
|
const PC_COREQUEST_CONTRACT = "@mozilla.org/dom/createofferrequest;1";
|
2016-09-29 20:26:04 +03:00
|
|
|
const PC_DTMF_SENDER_CONTRACT = "@mozilla.org/dom/rtcdtmfsender;1";
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2014-11-20 03:16:29 +03:00
|
|
|
const PC_CID = Components.ID("{bdc2e533-b308-4708-ac8e-a8bfade6d851}");
|
2013-11-25 23:01:03 +04:00
|
|
|
const PC_OBS_CID = Components.ID("{d1748d4c-7f6a-4dc5-add6-d55b7678537e}");
|
2013-05-08 04:55:21 +04:00
|
|
|
const PC_ICE_CID = Components.ID("{02b9970c-433d-4cc2-923d-f7028ac66073}");
|
|
|
|
const PC_SESSION_CID = Components.ID("{1775081b-b62d-4954-8ffe-a067bbf508a7}");
|
2012-11-10 09:04:27 +04:00
|
|
|
const PC_MANAGER_CID = Components.ID("{7293e901-2be3-4c02-b4bd-cbef6fc24f78}");
|
2013-10-18 02:00:05 +04:00
|
|
|
const PC_STATS_CID = Components.ID("{7fe6e18b-0da3-4056-bf3b-440ef3809e06}");
|
2014-05-23 01:14:56 +04:00
|
|
|
const PC_STATIC_CID = Components.ID("{0fb47c47-a205-4583-a9fc-cbadf8c95880}");
|
2014-08-14 05:40:41 +04:00
|
|
|
const PC_SENDER_CID = Components.ID("{4fff5d46-d827-4cd4-a970-8fd53977440e}");
|
|
|
|
const PC_RECEIVER_CID = Components.ID("{d974b814-8fde-411c-8c45-b86791b81030}");
|
2017-08-23 23:51:21 +03:00
|
|
|
const PC_TRANSCEIVER_CID = Components.ID("{09475754-103a-41f5-a2d0-e1f27eb0b537}");
|
2015-08-11 20:48:55 +03:00
|
|
|
const PC_COREQUEST_CID = Components.ID("{74b2122d-65a8-4824-aa9e-3d664cb75dc2}");
|
2016-09-29 20:26:04 +03:00
|
|
|
const PC_DTMF_SENDER_CID = Components.ID("{3610C242-654E-11E6-8EC0-6D1BE389A607}");
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2016-11-09 01:50:24 +03:00
|
|
|
function logMsg(msg, file, line, flag, winID) {
|
|
|
|
let scriptErrorClass = Cc["@mozilla.org/scripterror;1"];
|
|
|
|
let scriptError = scriptErrorClass.createInstance(Ci.nsIScriptError);
|
|
|
|
scriptError.initWithWindowID(msg, file, null, line, 0, flag,
|
|
|
|
"content javascript", winID);
|
2018-01-03 18:11:03 +03:00
|
|
|
Services.console.logMessage(scriptError);
|
2017-06-28 22:41:50 +03:00
|
|
|
}
|
2016-11-09 01:50:24 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
let setupPrototype = (_class, dict) => {
|
|
|
|
_class.prototype.classDescription = _class.name;
|
|
|
|
Object.assign(_class.prototype, dict);
|
2017-10-15 21:50:30 +03:00
|
|
|
};
|
2017-01-06 06:47:25 +03:00
|
|
|
|
2012-10-07 09:34:30 +04:00
|
|
|
// Global list of PeerConnection objects, so they can be cleaned up when
|
|
|
|
// a page is torn down. (Maps inner window ID to an array of PC objects).
|
2017-01-06 06:47:25 +03:00
|
|
|
class GlobalPCList {
|
|
|
|
constructor() {
|
|
|
|
this._list = {};
|
|
|
|
this._networkdown = false; // XXX Need to query current state somehow
|
|
|
|
this._lifecycleobservers = {};
|
|
|
|
this._nextId = 1;
|
|
|
|
Services.obs.addObserver(this, "inner-window-destroyed", true);
|
|
|
|
Services.obs.addObserver(this, "profile-change-net-teardown", true);
|
|
|
|
Services.obs.addObserver(this, "network:offline-about-to-go-offline", true);
|
|
|
|
Services.obs.addObserver(this, "network:offline-status-changed", true);
|
|
|
|
Services.obs.addObserver(this, "gmp-plugin-crash", true);
|
|
|
|
Services.obs.addObserver(this, "PeerConnection:response:allow", true);
|
|
|
|
Services.obs.addObserver(this, "PeerConnection:response:deny", true);
|
2018-03-01 12:51:09 +03:00
|
|
|
if (Cc["@mozilla.org/childprocessmessagemanager;1"]) {
|
|
|
|
let mm = Cc["@mozilla.org/childprocessmessagemanager;1"].getService(Ci.nsIMessageListenerManager);
|
|
|
|
mm.addMessageListener("gmp-plugin-crash", this);
|
2012-11-10 09:04:27 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
notifyLifecycleObservers(pc, type) {
|
2014-05-23 01:14:56 +04:00
|
|
|
for (var key of Object.keys(this._lifecycleobservers)) {
|
|
|
|
this._lifecycleobservers[key](pc, pc._winID, type);
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-05-23 01:14:56 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
addPC(pc) {
|
2012-10-07 09:34:30 +04:00
|
|
|
let winID = pc._winID;
|
|
|
|
if (this._list[winID]) {
|
2013-05-08 04:55:21 +04:00
|
|
|
this._list[winID].push(Cu.getWeakReference(pc));
|
2012-10-07 09:34:30 +04:00
|
|
|
} else {
|
2013-05-08 04:55:21 +04:00
|
|
|
this._list[winID] = [Cu.getWeakReference(pc)];
|
2012-10-07 09:34:30 +04:00
|
|
|
}
|
2015-08-07 22:22:30 +03:00
|
|
|
pc._globalPCListId = this._nextId++;
|
2013-01-18 03:11:14 +04:00
|
|
|
this.removeNullRefs(winID);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-01-18 03:11:14 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
findPC(globalPCListId) {
|
2015-08-07 22:22:30 +03:00
|
|
|
for (let winId in this._list) {
|
|
|
|
if (this._list.hasOwnProperty(winId)) {
|
|
|
|
for (let pcref of this._list[winId]) {
|
|
|
|
let pc = pcref.get();
|
|
|
|
if (pc && pc._globalPCListId == globalPCListId) {
|
|
|
|
return pc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-06-27 03:25:22 +03:00
|
|
|
return null;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-08-07 22:22:30 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
removeNullRefs(winID) {
|
2013-10-31 22:50:59 +04:00
|
|
|
if (this._list[winID] === undefined) {
|
2013-01-18 03:11:14 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
this._list[winID] = this._list[winID].filter(
|
2017-06-28 22:41:50 +03:00
|
|
|
function(e, i, a) { return e.get() !== null; });
|
2013-11-25 23:01:03 +04:00
|
|
|
|
|
|
|
if (this._list[winID].length === 0) {
|
|
|
|
delete this._list[winID];
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
handleGMPCrash(data) {
|
2015-04-27 22:44:36 +03:00
|
|
|
let broadcastPluginCrash = function(list, winID, pluginID, pluginName) {
|
|
|
|
if (list.hasOwnProperty(winID)) {
|
|
|
|
list[winID].forEach(function(pcref) {
|
|
|
|
let pc = pcref.get();
|
|
|
|
if (pc) {
|
|
|
|
pc._pc.pluginCrash(pluginID, pluginName);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
// a plugin crashed; if it's associated with any of our PCs, fire an
|
|
|
|
// event to the DOM window
|
|
|
|
for (let winId in this._list) {
|
|
|
|
broadcastPluginCrash(this._list, winId, data.pluginID, data.pluginName);
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-04-27 22:44:36 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
receiveMessage({ name, data }) {
|
2016-11-20 00:47:10 +03:00
|
|
|
if (name == "gmp-plugin-crash") {
|
|
|
|
this.handleGMPCrash(data);
|
2015-04-27 22:44:36 +03:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-04-27 22:44:36 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
observe(subject, topic, data) {
|
2013-10-31 22:50:59 +04:00
|
|
|
let cleanupPcRef = function(pcref) {
|
|
|
|
let pc = pcref.get();
|
|
|
|
if (pc) {
|
2017-08-23 23:51:21 +03:00
|
|
|
pc._suppressEvents = true;
|
|
|
|
pc.close();
|
2013-10-31 22:50:59 +04:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let cleanupWinId = function(list, winID) {
|
|
|
|
if (list.hasOwnProperty(winID)) {
|
|
|
|
list[winID].forEach(cleanupPcRef);
|
|
|
|
delete list[winID];
|
2012-11-19 08:53:14 +04:00
|
|
|
}
|
2013-10-31 22:50:59 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
if (topic == "inner-window-destroyed") {
|
2014-05-23 01:14:56 +04:00
|
|
|
let winID = subject.QueryInterface(Ci.nsISupportsPRUint64).data;
|
|
|
|
cleanupWinId(this._list, winID);
|
|
|
|
|
|
|
|
if (this._lifecycleobservers.hasOwnProperty(winID)) {
|
|
|
|
delete this._lifecycleobservers[winID];
|
|
|
|
}
|
2012-11-19 08:53:14 +04:00
|
|
|
} else if (topic == "profile-change-net-teardown" ||
|
|
|
|
topic == "network:offline-about-to-go-offline") {
|
2016-11-18 10:16:33 +03:00
|
|
|
// As Necko doesn't prevent us from accessing the network we still need to
|
|
|
|
// monitor the network offline/online state here. See bug 1326483
|
2012-12-11 16:58:12 +04:00
|
|
|
this._networkdown = true;
|
2016-11-20 00:47:10 +03:00
|
|
|
} else if (topic == "network:offline-status-changed") {
|
2012-12-11 16:58:12 +04:00
|
|
|
if (data == "offline") {
|
|
|
|
this._networkdown = true;
|
|
|
|
} else if (data == "online") {
|
|
|
|
this._networkdown = false;
|
|
|
|
}
|
2014-07-21 11:50:11 +04:00
|
|
|
} else if (topic == "gmp-plugin-crash") {
|
2015-04-27 22:44:36 +03:00
|
|
|
if (subject instanceof Ci.nsIWritablePropertyBag2) {
|
|
|
|
let pluginID = subject.getPropertyAsUint32("pluginID");
|
|
|
|
let pluginName = subject.getPropertyAsAString("pluginName");
|
|
|
|
let data = { pluginID, pluginName };
|
|
|
|
this.handleGMPCrash(data);
|
2014-07-28 19:41:52 +04:00
|
|
|
}
|
2015-08-07 22:22:30 +03:00
|
|
|
} else if (topic == "PeerConnection:response:allow" ||
|
|
|
|
topic == "PeerConnection:response:deny") {
|
|
|
|
var pc = this.findPC(data);
|
|
|
|
if (pc) {
|
|
|
|
if (topic == "PeerConnection:response:allow") {
|
|
|
|
pc._settlePermission.allow();
|
|
|
|
} else {
|
2016-05-09 05:29:46 +03:00
|
|
|
let err = new pc._win.DOMException("The request is not allowed by " +
|
|
|
|
"the user agent or the platform in the current context.",
|
|
|
|
"NotAllowedError");
|
2015-08-07 22:22:30 +03:00
|
|
|
pc._settlePermission.deny(err);
|
|
|
|
}
|
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-11-25 23:01:03 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
_registerPeerConnectionLifecycleCallback(winID, cb) {
|
2014-05-23 01:14:56 +04:00
|
|
|
this._lifecycleobservers[winID] = cb;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
setupPrototype(GlobalPCList, {
|
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsIObserver,
|
|
|
|
Ci.nsIMessageListener,
|
2017-08-04 13:28:15 +03:00
|
|
|
Ci.nsISupportsWeakReference]),
|
2017-01-06 06:47:25 +03:00
|
|
|
classID: PC_MANAGER_CID,
|
|
|
|
_xpcom_factory: {
|
2017-06-28 22:41:50 +03:00
|
|
|
createInstance(outer, iid) {
|
2017-01-06 06:47:25 +03:00
|
|
|
if (outer) {
|
|
|
|
throw Cr.NS_ERROR_NO_AGGREGATION;
|
|
|
|
}
|
|
|
|
return _globalPCList.QueryInterface(iid);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
var _globalPCList = new GlobalPCList();
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
class RTCIceCandidate {
|
|
|
|
init(win) {
|
|
|
|
this._win = win;
|
|
|
|
}
|
2013-05-08 04:55:21 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
__init(dict) {
|
2016-11-09 04:22:40 +03:00
|
|
|
Object.assign(this, dict);
|
2012-10-07 09:34:30 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
|
|
|
setupPrototype(RTCIceCandidate, {
|
|
|
|
classID: PC_ICE_CID,
|
|
|
|
contractID: PC_ICE_CONTRACT,
|
2013-05-08 04:55:21 +04:00
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports,
|
2017-01-06 06:47:25 +03:00
|
|
|
Ci.nsIDOMGlobalPropertyInitializer])
|
|
|
|
});
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
class RTCSessionDescription {
|
|
|
|
init(win) {
|
2016-11-09 01:50:24 +03:00
|
|
|
this._win = win;
|
|
|
|
this._winID = this._win.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
|
|
.getInterface(Ci.nsIDOMWindowUtils).currentInnerWindowID;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
__init({ type, sdp }) {
|
2016-11-09 01:50:24 +03:00
|
|
|
Object.assign(this, { _type: type, _sdp: sdp });
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-09 01:50:24 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
get type() { return this._type; }
|
2016-11-09 01:50:24 +03:00
|
|
|
set type(type) {
|
|
|
|
this.warn();
|
|
|
|
this._type = type;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-09 01:50:24 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
get sdp() { return this._sdp; }
|
2016-11-09 01:50:24 +03:00
|
|
|
set sdp(sdp) {
|
|
|
|
this.warn();
|
|
|
|
this._sdp = sdp;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-09 01:50:24 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
warn() {
|
2016-11-09 01:50:24 +03:00
|
|
|
if (!this._warned) {
|
|
|
|
// Warn once per RTCSessionDescription about deprecated writable usage.
|
|
|
|
this.logWarning("RTCSessionDescription's members are readonly! " +
|
|
|
|
"Writing to them is deprecated and will break soon!");
|
|
|
|
this._warned = true;
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-09 01:50:24 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
logWarning(msg) {
|
2016-11-09 01:50:24 +03:00
|
|
|
let err = this._win.Error();
|
|
|
|
logMsg(msg, err.fileName, err.lineNumber, Ci.nsIScriptError.warningFlag,
|
|
|
|
this._winID);
|
2012-10-07 09:34:30 +04:00
|
|
|
}
|
2013-10-18 02:00:05 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
setupPrototype(RTCSessionDescription, {
|
|
|
|
classID: PC_SESSION_CID,
|
|
|
|
contractID: PC_SESSION_CONTRACT,
|
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports,
|
|
|
|
Ci.nsIDOMGlobalPropertyInitializer])
|
|
|
|
});
|
2013-12-19 19:34:39 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
class RTCStatsReport {
|
|
|
|
constructor(win, dict) {
|
|
|
|
this._win = win;
|
|
|
|
this._pcid = dict.pcid;
|
|
|
|
this._report = convertToRTCStatsReport(dict);
|
|
|
|
}
|
|
|
|
|
|
|
|
setInternal(aKey, aObj) {
|
2016-04-07 17:40:37 +03:00
|
|
|
return this.__DOM_IMPL__.__set(aKey, aObj);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-04-07 17:40:37 +03:00
|
|
|
|
|
|
|
// TODO: Remove legacy API eventually
|
2017-01-04 01:57:07 +03:00
|
|
|
// see Bug 1328194
|
2013-12-19 19:34:39 +04:00
|
|
|
//
|
2016-04-07 17:40:37 +03:00
|
|
|
// Since maplike is recent, we still also make the stats available as legacy
|
2013-12-19 19:34:39 +04:00
|
|
|
// enumerable read-only properties directly on our content-facing object.
|
|
|
|
// Must be called after our webidl sandwich is made.
|
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
makeStatsPublic(warnNullable, isLegacy) {
|
2016-04-07 17:40:37 +03:00
|
|
|
let legacyProps = {};
|
|
|
|
for (let key in this._report) {
|
2017-01-04 01:57:07 +03:00
|
|
|
let internal = Cu.cloneInto(this._report[key], this._win);
|
|
|
|
if (isLegacy) {
|
|
|
|
internal.type = this._specToLegacyFieldMapping[internal.type] || internal.type;
|
|
|
|
}
|
|
|
|
this.setInternal(key, internal);
|
2016-04-07 17:40:37 +03:00
|
|
|
let value = Cu.cloneInto(this._report[key], this._win);
|
2016-12-16 12:27:40 +03:00
|
|
|
value.type = this._specToLegacyFieldMapping[value.type] || value.type;
|
2016-04-07 17:40:37 +03:00
|
|
|
legacyProps[key] = {
|
|
|
|
enumerable: true, configurable: false,
|
|
|
|
get: Cu.exportFunction(function() {
|
|
|
|
if (warnNullable.warn) {
|
|
|
|
warnNullable.warn();
|
|
|
|
warnNullable.warn = null;
|
|
|
|
}
|
|
|
|
return value;
|
|
|
|
}, this.__DOM_IMPL__.wrappedJSObject)
|
|
|
|
};
|
2013-10-18 02:00:05 +04:00
|
|
|
}
|
2016-04-07 17:40:37 +03:00
|
|
|
Object.defineProperties(this.__DOM_IMPL__.wrappedJSObject, legacyProps);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-12-19 19:34:39 +04:00
|
|
|
|
|
|
|
get mozPcid() { return this._pcid; }
|
2017-09-01 05:45:53 +03:00
|
|
|
|
|
|
|
__onget(key, value) {
|
|
|
|
/* Do whatever here */
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
|
|
|
setupPrototype(RTCStatsReport, {
|
|
|
|
classID: PC_STATS_CID,
|
|
|
|
contractID: PC_STATS_CONTRACT,
|
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports]),
|
|
|
|
_specToLegacyFieldMapping: {
|
2017-06-28 22:41:50 +03:00
|
|
|
"inbound-rtp": "inboundrtp",
|
|
|
|
"outbound-rtp": "outboundrtp",
|
|
|
|
"candidate-pair": "candidatepair",
|
|
|
|
"local-candidate": "localcandidate",
|
|
|
|
"remote-candidate": "remotecandidate"
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2017-11-14 21:32:07 +03:00
|
|
|
// Cache for RTPSourceEntries
|
|
|
|
// Note: each cache is only valid for one JS event loop execution
|
|
|
|
class RTCRtpSourceCache {
|
|
|
|
constructor() {
|
|
|
|
// The time in RTP source time (ms)
|
|
|
|
this.tsNowInRtpSourceTime = null;
|
|
|
|
// The time in JS
|
|
|
|
this.jsTimestamp = null;
|
|
|
|
// Time difference between JS time and RTP source time
|
|
|
|
this.timestampOffset = null;
|
|
|
|
// RTPSourceEntries cached by track id
|
|
|
|
this.rtpSourcesByTrackId = new Map();
|
|
|
|
// Has a cache wipe already been scheduled
|
|
|
|
this.scheduledClear = null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
class RTCPeerConnection {
|
|
|
|
constructor() {
|
2017-08-23 23:51:21 +03:00
|
|
|
this._receiveStreams = new Map();
|
2017-12-18 22:41:18 +03:00
|
|
|
// Used to fire onaddstream, remove when we don't do that anymore.
|
|
|
|
this._newStreams = [];
|
2017-08-23 23:51:21 +03:00
|
|
|
this._transceivers = [];
|
2017-01-06 06:47:25 +03:00
|
|
|
|
|
|
|
this._pc = null;
|
|
|
|
this._closed = false;
|
|
|
|
|
|
|
|
this._localType = null;
|
|
|
|
this._remoteType = null;
|
|
|
|
// http://rtcweb-wg.github.io/jsep/#rfc.section.4.1.9
|
|
|
|
// canTrickle == null means unknown; when a remote description is received it
|
|
|
|
// is set to true or false based on the presence of the "trickle" ice-option
|
|
|
|
this._canTrickle = null;
|
|
|
|
|
|
|
|
// States
|
|
|
|
this._iceGatheringState = this._iceConnectionState = "new";
|
2013-10-18 02:00:05 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
this._hasStunServer = this._hasTurnServer = false;
|
|
|
|
this._iceGatheredRelayCandidates = false;
|
2017-11-14 21:32:07 +03:00
|
|
|
// Stored webrtc timing information
|
|
|
|
this._storedRtpSourceReferenceTime = null;
|
|
|
|
// TODO: Remove legacy API eventually
|
|
|
|
// see Bug 1328194
|
|
|
|
this._onGetStatsIsLegacy = false;
|
|
|
|
// Stores cached RTP sources state
|
|
|
|
this._rtpSourceCache = new RTCRtpSourceCache();
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
init(win) {
|
|
|
|
this._win = win;
|
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
__init(rtcConfig) {
|
2015-01-20 18:08:00 +03:00
|
|
|
this._winID = this._win.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
|
|
.getInterface(Ci.nsIDOMWindowUtils).currentInnerWindowID;
|
2015-07-30 17:48:27 +03:00
|
|
|
// TODO: Update this code once we support pc.setConfiguration, to track
|
|
|
|
// setting from content independently from pref (Bug 1181768).
|
|
|
|
if (rtcConfig.iceTransportPolicy == "all" &&
|
|
|
|
Services.prefs.getBoolPref("media.peerconnection.ice.relay_only")) {
|
|
|
|
rtcConfig.iceTransportPolicy = "relay";
|
|
|
|
}
|
2016-03-04 23:05:20 +03:00
|
|
|
this._config = Object.assign({}, rtcConfig);
|
|
|
|
|
2013-05-08 04:55:21 +04:00
|
|
|
if (!rtcConfig.iceServers ||
|
2013-02-18 17:49:14 +04:00
|
|
|
!Services.prefs.getBoolPref("media.peerconnection.use_document_iceservers")) {
|
2015-06-24 02:52:50 +03:00
|
|
|
try {
|
|
|
|
rtcConfig.iceServers =
|
|
|
|
JSON.parse(Services.prefs.getCharPref("media.peerconnection.default_iceservers") || "[]");
|
|
|
|
} catch (e) {
|
|
|
|
this.logWarning(
|
2016-03-09 06:44:06 +03:00
|
|
|
"Ignoring invalid media.peerconnection.default_iceservers in about:config");
|
2015-06-24 02:52:50 +03:00
|
|
|
rtcConfig.iceServers = [];
|
2015-01-20 18:08:00 +03:00
|
|
|
}
|
2015-06-24 02:52:50 +03:00
|
|
|
try {
|
|
|
|
this._mustValidateRTCConfiguration(rtcConfig,
|
|
|
|
"Ignoring invalid media.peerconnection.default_iceservers in about:config");
|
|
|
|
} catch (e) {
|
2016-03-09 06:44:06 +03:00
|
|
|
this.logWarning(e.message);
|
2015-06-24 02:52:50 +03:00
|
|
|
rtcConfig.iceServers = [];
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// This gets executed in the typical case when iceServers
|
|
|
|
// are passed in through the web page.
|
|
|
|
this._mustValidateRTCConfiguration(rtcConfig,
|
2013-01-23 23:21:25 +04:00
|
|
|
"RTCPeerConnection constructor passed invalid RTCConfiguration");
|
2015-06-24 02:52:50 +03:00
|
|
|
}
|
2015-10-01 22:49:01 +03:00
|
|
|
var principal = Cu.getWebIDLCallerPrincipal();
|
|
|
|
this._isChrome = Services.scriptSecurityManager.isSystemPrincipal(principal);
|
2015-04-28 18:29:57 +03:00
|
|
|
|
2016-10-17 04:59:02 +03:00
|
|
|
if (_globalPCList._networkdown) {
|
2015-01-16 23:00:09 +03:00
|
|
|
throw new this._win.DOMException(
|
|
|
|
"Can't create RTCPeerConnections when the network is down",
|
|
|
|
"InvalidStateError");
|
2012-12-11 16:58:12 +04:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2016-01-12 23:09:01 +03:00
|
|
|
this.makeGetterSetterEH("ontrack");
|
|
|
|
this.makeLegacyGetterSetterEH("onaddstream", "Use peerConnection.ontrack instead.");
|
|
|
|
this.makeLegacyGetterSetterEH("onaddtrack", "Use peerConnection.ontrack instead.");
|
2013-05-17 03:40:23 +04:00
|
|
|
this.makeGetterSetterEH("onicecandidate");
|
|
|
|
this.makeGetterSetterEH("onnegotiationneeded");
|
|
|
|
this.makeGetterSetterEH("onsignalingstatechange");
|
|
|
|
this.makeGetterSetterEH("ondatachannel");
|
|
|
|
this.makeGetterSetterEH("oniceconnectionstatechange");
|
2016-11-21 23:06:27 +03:00
|
|
|
this.makeGetterSetterEH("onicegatheringstatechange");
|
2014-02-11 02:41:46 +04:00
|
|
|
this.makeGetterSetterEH("onidentityresult");
|
|
|
|
this.makeGetterSetterEH("onpeeridentity");
|
2014-04-08 16:26:00 +04:00
|
|
|
this.makeGetterSetterEH("onidpassertionerror");
|
|
|
|
this.makeGetterSetterEH("onidpvalidationerror");
|
2013-05-17 03:40:23 +04:00
|
|
|
|
2013-10-14 20:53:56 +04:00
|
|
|
this._pc = new this._win.PeerConnectionImpl();
|
2015-01-20 17:41:55 +03:00
|
|
|
this._operationsChain = this._win.Promise.resolve();
|
2013-11-02 04:49:48 +04:00
|
|
|
|
|
|
|
this.__DOM_IMPL__._innerObject = this;
|
|
|
|
this._observer = new this._win.PeerConnectionObserver(this.__DOM_IMPL__);
|
2013-05-22 21:05:20 +04:00
|
|
|
|
2016-04-07 17:40:37 +03:00
|
|
|
// Warn just once per PeerConnection about deprecated getStats usage.
|
|
|
|
this._warnDeprecatedStatsAccessNullable = { warn: () =>
|
2017-01-09 23:44:22 +03:00
|
|
|
this.logWarning("non-maplike pc.getStats access is deprecated, and will be removed in the near future! " +
|
2016-12-13 03:17:38 +03:00
|
|
|
"See http://w3c.github.io/webrtc-pc/#getstats-example for usage.") };
|
|
|
|
|
|
|
|
this._warnDeprecatedStatsCallbacksNullable = { warn: () =>
|
2017-01-09 23:44:22 +03:00
|
|
|
this.logWarning("Callback-based pc.getStats is deprecated, and will be removed in the near future! Use promise-version! " +
|
2016-12-13 03:17:38 +03:00
|
|
|
"See http://w3c.github.io/webrtc-pc/#getstats-example for usage.") };
|
2016-04-07 17:40:37 +03:00
|
|
|
|
2013-05-22 21:05:20 +04:00
|
|
|
// Add a reference to the PeerConnection to global list (before init).
|
|
|
|
_globalPCList.addPC(this);
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2014-02-11 02:41:46 +04:00
|
|
|
this._impl.initialize(this._observer, this._win, rtcConfig,
|
|
|
|
Services.tm.currentThread);
|
2016-11-21 23:27:23 +03:00
|
|
|
|
|
|
|
this._certificateReady = this._initCertificate(rtcConfig.certificates);
|
2014-02-11 02:41:46 +04:00
|
|
|
this._initIdp();
|
2014-05-23 01:14:56 +04:00
|
|
|
_globalPCList.notifyLifecycleObservers(this, "initialized");
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-10-14 20:53:56 +04:00
|
|
|
|
2014-02-11 02:41:46 +04:00
|
|
|
get _impl() {
|
2013-04-17 09:16:02 +04:00
|
|
|
if (!this._pc) {
|
2015-01-16 23:00:09 +03:00
|
|
|
throw new this._win.DOMException(
|
|
|
|
"RTCPeerConnection is gone (did you enter Offline mode?)",
|
|
|
|
"InvalidStateError");
|
2013-04-17 09:16:02 +04:00
|
|
|
}
|
|
|
|
return this._pc;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-04-17 09:16:02 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getConfiguration() {
|
2016-03-04 23:05:20 +03:00
|
|
|
return this._config;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-03-04 23:05:20 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _initCertificate(certificates = []) {
|
2016-11-21 23:27:23 +03:00
|
|
|
let certificate;
|
|
|
|
if (certificates.length > 1) {
|
|
|
|
throw new this._win.DOMException(
|
|
|
|
"RTCPeerConnection does not currently support multiple certificates",
|
|
|
|
"NotSupportedError");
|
|
|
|
}
|
|
|
|
if (certificates.length) {
|
|
|
|
certificate = certificates.find(c => c.expires > Date.now());
|
|
|
|
if (!certificate) {
|
2015-07-06 20:40:04 +03:00
|
|
|
throw new this._win.DOMException(
|
|
|
|
"Unable to create RTCPeerConnection with an expired certificate",
|
|
|
|
"InvalidParameterError");
|
|
|
|
}
|
2016-11-21 23:27:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!certificate) {
|
|
|
|
certificate = await this._win.RTCPeerConnection.generateCertificate({
|
2015-07-06 20:40:04 +03:00
|
|
|
name: "ECDSA", namedCurve: "P-256"
|
|
|
|
});
|
|
|
|
}
|
2016-11-21 23:27:23 +03:00
|
|
|
this._impl.certificate = certificate;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-07-06 20:40:04 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
_resetPeerIdentityPromise() {
|
2015-02-22 00:57:21 +03:00
|
|
|
this._peerIdentity = new this._win.Promise((resolve, reject) => {
|
|
|
|
this._resolvePeerIdentity = resolve;
|
|
|
|
this._rejectPeerIdentity = reject;
|
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-21 23:27:23 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
_initIdp() {
|
2016-11-21 23:27:23 +03:00
|
|
|
this._resetPeerIdentityPromise();
|
2015-02-22 00:57:21 +03:00
|
|
|
this._lastIdentityValidation = this._win.Promise.resolve();
|
|
|
|
|
2014-02-11 02:41:46 +04:00
|
|
|
let prefName = "media.peerconnection.identity.timeout";
|
|
|
|
let idpTimeout = Services.prefs.getIntPref(prefName);
|
2015-02-22 00:57:21 +03:00
|
|
|
this._localIdp = new PeerConnectionIdp(this._win, idpTimeout);
|
|
|
|
this._remoteIdp = new PeerConnectionIdp(this._win, idpTimeout);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-02-11 02:41:46 +04:00
|
|
|
|
2015-01-20 17:41:55 +03:00
|
|
|
// Add a function to the internal operations chain.
|
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _chain(func) {
|
2016-11-21 23:27:23 +03:00
|
|
|
let p = (async () => {
|
|
|
|
await this._operationsChain;
|
2015-01-16 23:00:09 +03:00
|
|
|
// Don't _checkClosed() inside the chain, because it throws, and spec
|
2016-11-21 23:27:23 +03:00
|
|
|
// behavior is to NOT reject outstanding promises on close. This is what
|
|
|
|
// happens most of the time anyways, as the c++ code stops calling us once
|
|
|
|
// closed, hanging the chain. However, c++ may already have queued tasks
|
|
|
|
// on us, so if we're one of those then sit back.
|
|
|
|
if (this._closed) {
|
2017-06-27 03:25:22 +03:00
|
|
|
return null;
|
2015-01-16 23:00:09 +03:00
|
|
|
}
|
2017-07-12 00:49:55 +03:00
|
|
|
return func();
|
2016-11-21 23:27:23 +03:00
|
|
|
})();
|
2015-01-20 17:41:55 +03:00
|
|
|
// don't propagate errors in the operations chain (this is a fork of p).
|
|
|
|
this._operationsChain = p.catch(() => {});
|
2017-07-12 00:49:55 +03:00
|
|
|
return p;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-01-20 17:41:55 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
// It's basically impossible to use async directly in JSImplemented code,
|
|
|
|
// because the implicit promise must be wrapped to the right type for content.
|
|
|
|
//
|
|
|
|
// The _async wrapper takes care of this. The _legacy wrapper implements
|
|
|
|
// legacy callbacks in a manner that produces correct line-numbers in errors,
|
|
|
|
// provided that methods validate their inputs before putting themselves on
|
|
|
|
// the pc's operations chain.
|
2016-06-07 22:50:43 +03:00
|
|
|
//
|
2017-01-06 06:47:25 +03:00
|
|
|
// These wrappers also serve as guards against settling promises past close().
|
2015-01-20 17:41:55 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
_async(func) {
|
2016-11-27 18:34:46 +03:00
|
|
|
return this._win.Promise.resolve(this._closeWrapper(func));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-17 09:56:26 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
_legacy(...args) {
|
2016-11-27 18:34:46 +03:00
|
|
|
return this._win.Promise.resolve(this._legacyCloseWrapper(...args));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-27 18:34:46 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
_auto(onSucc, onErr, func) {
|
2016-11-27 18:34:46 +03:00
|
|
|
return (typeof onSucc == "function") ? this._legacy(onSucc, onErr, func)
|
|
|
|
: this._async(func);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-27 18:34:46 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _closeWrapper(func) {
|
2016-11-27 18:34:46 +03:00
|
|
|
let closed = this._closed;
|
2015-01-20 17:41:55 +03:00
|
|
|
try {
|
2016-11-27 18:34:46 +03:00
|
|
|
let result = await func();
|
|
|
|
if (!closed && this._closed) {
|
|
|
|
await new Promise(() => {});
|
|
|
|
}
|
|
|
|
return result;
|
2015-01-20 17:41:55 +03:00
|
|
|
} catch (e) {
|
2016-11-27 18:34:46 +03:00
|
|
|
if (!closed && this._closed) {
|
|
|
|
await new Promise(() => {});
|
|
|
|
}
|
|
|
|
throw e;
|
2015-01-20 17:41:55 +03:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _legacyCloseWrapper(onSucc, onErr, func) {
|
2016-11-27 18:34:46 +03:00
|
|
|
|
|
|
|
let wrapCallback = cb => result => {
|
2014-12-04 22:12:19 +03:00
|
|
|
try {
|
2016-11-27 18:34:46 +03:00
|
|
|
cb && cb(result);
|
2014-12-04 22:12:19 +03:00
|
|
|
} catch (e) {
|
|
|
|
this.logErrorAndCallOnError(e);
|
|
|
|
}
|
|
|
|
};
|
2016-11-27 18:34:46 +03:00
|
|
|
|
|
|
|
try {
|
|
|
|
wrapCallback(onSucc)(await func());
|
|
|
|
} catch (e) {
|
|
|
|
wrapCallback(onErr)(e);
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
// This implements the fairly common "Queue a task" logic
|
|
|
|
async _queueTaskWithClosedCheck(func) {
|
|
|
|
return new this._win.Promise(resolve => {
|
|
|
|
Services.tm.dispatchToMainThread({ run() {
|
|
|
|
if (!this._closed) {
|
|
|
|
func();
|
|
|
|
resolve();
|
|
|
|
}
|
|
|
|
}});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2013-01-23 23:21:25 +04:00
|
|
|
/**
|
2015-01-20 18:08:00 +03:00
|
|
|
* An RTCConfiguration may look like this:
|
2013-01-23 23:21:25 +04:00
|
|
|
*
|
2015-01-20 18:08:00 +03:00
|
|
|
* { "iceServers": [ { urls: "stun:stun.example.org", },
|
|
|
|
* { url: "stun:stun.example.org", }, // deprecated version
|
|
|
|
* { urls: ["turn:turn1.x.org", "turn:turn2.x.org"],
|
2013-05-08 04:55:21 +04:00
|
|
|
* username:"jib", credential:"mypass"} ] }
|
2013-01-23 23:21:25 +04:00
|
|
|
*
|
2015-06-24 02:52:50 +03:00
|
|
|
* This function normalizes the structure of the input for rtcConfig.iceServers for us,
|
|
|
|
* so we test well-formed stun/turn urls before passing along to C++.
|
2015-01-16 23:00:09 +03:00
|
|
|
* msg - Error message to detail which array-entry failed, if any.
|
2013-01-23 23:21:25 +04:00
|
|
|
*/
|
2017-01-06 06:47:25 +03:00
|
|
|
_mustValidateRTCConfiguration({ iceServers }, msg) {
|
2015-06-24 02:52:50 +03:00
|
|
|
|
|
|
|
// Normalize iceServers input
|
2016-11-20 00:47:10 +03:00
|
|
|
iceServers.forEach(server => {
|
2015-06-24 02:52:50 +03:00
|
|
|
if (typeof server.urls === "string") {
|
|
|
|
server.urls = [server.urls];
|
|
|
|
} else if (!server.urls && server.url) {
|
|
|
|
// TODO: Remove support for legacy iceServer.url eventually (Bug 1116766)
|
|
|
|
server.urls = [server.url];
|
2016-03-09 06:44:06 +03:00
|
|
|
this.logWarning("RTCIceServer.url is deprecated! Use urls instead.");
|
2015-06-24 02:52:50 +03:00
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2015-01-16 23:00:09 +03:00
|
|
|
let nicerNewURI = uriStr => {
|
2013-01-23 23:21:25 +04:00
|
|
|
try {
|
2018-01-03 18:11:03 +03:00
|
|
|
return Services.io.newURI(uriStr);
|
2017-06-27 02:55:26 +03:00
|
|
|
} catch (e) {
|
|
|
|
if (e.result == Cr.NS_ERROR_MALFORMED_URI) {
|
|
|
|
throw new this._win.DOMException(msg + " - malformed URI: " + uriStr,
|
|
|
|
"SyntaxError");
|
|
|
|
}
|
|
|
|
throw e;
|
2013-01-23 23:21:25 +04:00
|
|
|
}
|
2015-01-16 23:00:09 +03:00
|
|
|
};
|
|
|
|
|
2016-12-09 11:38:17 +03:00
|
|
|
var stunServers = 0;
|
|
|
|
|
2016-11-20 00:47:10 +03:00
|
|
|
iceServers.forEach(({ urls, username, credential, credentialType }) => {
|
|
|
|
if (!urls) {
|
2015-01-20 18:08:00 +03:00
|
|
|
throw new this._win.DOMException(msg + " - missing urls", "InvalidAccessError");
|
2013-10-14 20:53:56 +04:00
|
|
|
}
|
2016-11-20 00:47:10 +03:00
|
|
|
urls.map(url => nicerNewURI(url)).forEach(({ scheme, spec }) => {
|
2017-06-28 22:41:50 +03:00
|
|
|
if (scheme in { turn: 1, turns: 1 }) {
|
2016-11-20 00:47:10 +03:00
|
|
|
if (username == undefined) {
|
|
|
|
throw new this._win.DOMException(msg + " - missing username: " + spec,
|
2015-01-20 18:08:00 +03:00
|
|
|
"InvalidAccessError");
|
|
|
|
}
|
2017-07-26 01:47:27 +03:00
|
|
|
if (username.length > 512) {
|
|
|
|
throw new this._win.DOMException(msg +
|
|
|
|
" - username longer then 512 bytes: "
|
|
|
|
+ username, "InvalidAccessError");
|
|
|
|
}
|
2016-11-20 00:47:10 +03:00
|
|
|
if (credential == undefined) {
|
|
|
|
throw new this._win.DOMException(msg + " - missing credential: " + spec,
|
2015-01-20 18:08:00 +03:00
|
|
|
"InvalidAccessError");
|
|
|
|
}
|
2016-11-20 00:47:10 +03:00
|
|
|
if (credentialType != "password") {
|
2017-06-28 22:41:50 +03:00
|
|
|
this.logWarning("RTCConfiguration TURN credentialType \"" +
|
2016-11-20 00:47:10 +03:00
|
|
|
credentialType +
|
2017-06-28 22:41:50 +03:00
|
|
|
"\" is not yet implemented. Treating as password." +
|
2016-03-09 06:44:06 +03:00
|
|
|
" https://bugzil.la/1247616");
|
2016-02-25 08:24:16 +03:00
|
|
|
}
|
2016-12-07 12:49:50 +03:00
|
|
|
this._hasTurnServer = true;
|
2016-12-09 11:38:17 +03:00
|
|
|
stunServers += 1;
|
2017-06-28 22:41:50 +03:00
|
|
|
} else if (scheme in { stun: 1, stuns: 1 }) {
|
2016-12-07 12:49:50 +03:00
|
|
|
this._hasStunServer = true;
|
2016-12-09 11:38:17 +03:00
|
|
|
stunServers += 1;
|
2016-11-20 00:47:10 +03:00
|
|
|
} else {
|
|
|
|
throw new this._win.DOMException(msg + " - improper scheme: " + scheme,
|
2015-01-20 18:08:00 +03:00
|
|
|
"SyntaxError");
|
2013-08-10 12:19:35 +04:00
|
|
|
}
|
2017-07-24 01:24:29 +03:00
|
|
|
if (scheme in { stuns: 1 }) {
|
2016-11-20 00:47:10 +03:00
|
|
|
this.logWarning(scheme.toUpperCase() + " is not yet supported.");
|
2015-01-20 18:08:00 +03:00
|
|
|
}
|
2016-12-09 11:38:17 +03:00
|
|
|
if (stunServers >= 5) {
|
|
|
|
this.logError("Using five or more STUN/TURN servers causes problems");
|
|
|
|
} else if (stunServers > 2) {
|
|
|
|
this.logWarning("Using more than two STUN/TURN servers slows down discovery");
|
|
|
|
}
|
2015-01-20 18:08:00 +03:00
|
|
|
});
|
2015-01-16 23:00:09 +03:00
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-01-23 23:21:25 +04:00
|
|
|
|
2013-01-18 00:25:17 +04:00
|
|
|
// Ideally, this should be of the form _checkState(state),
|
|
|
|
// where the state is taken from an enumeration containing
|
|
|
|
// the valid peer connection states defined in the WebRTC
|
|
|
|
// spec. See Bug 831756.
|
2017-01-06 06:47:25 +03:00
|
|
|
_checkClosed() {
|
2013-01-18 00:25:17 +04:00
|
|
|
if (this._closed) {
|
2015-01-16 23:00:09 +03:00
|
|
|
throw new this._win.DOMException("Peer connection is closed",
|
|
|
|
"InvalidStateError");
|
2013-01-18 00:25:17 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-01-18 00:25:17 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
dispatchEvent(event) {
|
2014-09-27 03:02:46 +04:00
|
|
|
// PC can close while events are firing if there is an async dispatch
|
2016-03-29 23:27:03 +03:00
|
|
|
// in c++ land. But let through "closed" signaling and ice connection events.
|
2017-08-23 23:51:21 +03:00
|
|
|
if (!this._suppressEvents) {
|
2014-09-27 03:02:46 +04:00
|
|
|
this.__DOM_IMPL__.dispatchEvent(event);
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-08 04:55:21 +04:00
|
|
|
|
2013-05-12 04:48:29 +04:00
|
|
|
// Log error message to web console and window.onerror, if present.
|
2017-01-06 06:47:25 +03:00
|
|
|
logErrorAndCallOnError(e) {
|
2014-12-08 18:37:14 +03:00
|
|
|
this.logMsg(e.message, e.fileName, e.lineNumber, Ci.nsIScriptError.exceptionFlag);
|
2014-04-10 21:33:08 +04:00
|
|
|
|
|
|
|
// Safely call onerror directly if present (necessary for testing)
|
|
|
|
try {
|
|
|
|
if (typeof this._win.onerror === "function") {
|
2014-12-08 18:37:14 +03:00
|
|
|
this._win.onerror(e.message, e.fileName, e.lineNumber);
|
2014-04-10 21:33:08 +04:00
|
|
|
}
|
2017-06-28 22:41:50 +03:00
|
|
|
} catch (e) {
|
2014-04-10 21:33:08 +04:00
|
|
|
// If onerror itself throws, service it.
|
|
|
|
try {
|
2016-03-09 06:44:06 +03:00
|
|
|
this.logMsg(e.message, e.fileName, e.lineNumber, Ci.nsIScriptError.errorFlag);
|
2017-06-28 22:41:50 +03:00
|
|
|
} catch (e) {}
|
2014-04-10 21:33:08 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-04-10 21:33:08 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
logError(msg) {
|
2016-03-09 06:44:06 +03:00
|
|
|
this.logStackMsg(msg, Ci.nsIScriptError.errorFlag);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-03-09 06:44:06 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
logWarning(msg) {
|
2016-03-09 06:44:06 +03:00
|
|
|
this.logStackMsg(msg, Ci.nsIScriptError.warningFlag);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-12 04:48:29 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
logStackMsg(msg, flag) {
|
2016-03-09 06:44:06 +03:00
|
|
|
let err = this._win.Error();
|
|
|
|
this.logMsg(msg, err.fileName, err.lineNumber, flag);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-12 04:48:29 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
logMsg(msg, file, line, flag) {
|
2016-11-09 01:50:24 +03:00
|
|
|
return logMsg(msg, file, line, flag, this._winID);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-12 04:48:29 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getEH(type) {
|
2013-05-08 04:55:21 +04:00
|
|
|
return this.__DOM_IMPL__.getEventHandler(type);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-08 04:55:21 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
setEH(type, handler) {
|
2013-05-08 04:55:21 +04:00
|
|
|
this.__DOM_IMPL__.setEventHandler(type, handler);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-08 04:55:21 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
makeGetterSetterEH(name) {
|
2013-05-17 03:40:23 +04:00
|
|
|
Object.defineProperty(this, name,
|
|
|
|
{
|
2017-06-28 22:41:50 +03:00
|
|
|
get() { return this.getEH(name); },
|
|
|
|
set(h) { return this.setEH(name, h); }
|
2013-05-17 03:40:23 +04:00
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-08 04:55:21 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
makeLegacyGetterSetterEH(name, msg) {
|
2016-01-12 23:09:01 +03:00
|
|
|
Object.defineProperty(this, name,
|
|
|
|
{
|
2017-06-28 22:41:50 +03:00
|
|
|
get() { return this.getEH(name); },
|
|
|
|
set(h) {
|
2016-03-09 06:44:06 +03:00
|
|
|
this.logWarning(name + " is deprecated! " + msg);
|
2016-01-12 23:09:01 +03:00
|
|
|
return this.setEH(name, h);
|
|
|
|
}
|
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-01-12 23:09:01 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
createOffer(optionsOrOnSucc, onErr, options) {
|
2017-08-23 23:51:21 +03:00
|
|
|
let onSuccess = null;
|
2017-11-14 22:02:11 +03:00
|
|
|
if (typeof optionsOrOnSucc == "function") {
|
2017-08-23 23:51:21 +03:00
|
|
|
onSuccess = optionsOrOnSucc;
|
|
|
|
} else {
|
|
|
|
options = optionsOrOnSucc;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Spec language implies that this needs to happen as if it were called
|
|
|
|
// before createOffer, so we do this as early as possible.
|
|
|
|
this._ensureTransceiversForOfferToReceive(options);
|
|
|
|
|
|
|
|
// This entry-point handles both new and legacy call sig. Decipher which one
|
|
|
|
if (onSuccess) {
|
|
|
|
return this._legacy(onSuccess, onErr, () => this._createOffer(options));
|
|
|
|
}
|
|
|
|
|
|
|
|
return this._async(() => this._createOffer(options));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensures that we have at least one transceiver of |kind| that is
|
|
|
|
// configured to receive. It will create one if necessary.
|
|
|
|
_ensureOfferToReceive(kind) {
|
|
|
|
let hasRecv = this._transceivers.some(
|
|
|
|
transceiver =>
|
|
|
|
transceiver.getKind() == kind &&
|
|
|
|
(transceiver.direction == "sendrecv" || transceiver.direction == "recvonly") &&
|
|
|
|
!transceiver.stopped);
|
|
|
|
|
|
|
|
if (!hasRecv) {
|
|
|
|
this._addTransceiverNoEvents(kind, {direction: "recvonly"});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Handles offerToReceiveAudio/Video
|
|
|
|
_ensureTransceiversForOfferToReceive(options) {
|
|
|
|
if (options.offerToReceiveVideo) {
|
|
|
|
this._ensureOfferToReceive("video");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (options.offerToReceiveAudio) {
|
|
|
|
this._ensureOfferToReceive("audio");
|
|
|
|
}
|
|
|
|
|
2017-12-19 20:52:39 +03:00
|
|
|
this._transceivers
|
|
|
|
.filter(transceiver => {
|
|
|
|
return (options.offerToReceiveVideo === false &&
|
|
|
|
transceiver.receiver.track.kind == "video") ||
|
|
|
|
(options.offerToReceiveAudio === false &&
|
|
|
|
transceiver.receiver.track.kind == "audio");
|
|
|
|
})
|
|
|
|
.forEach(transceiver => {
|
|
|
|
if (transceiver.direction == "sendrecv") {
|
|
|
|
transceiver.setDirectionInternal("sendonly");
|
|
|
|
} else if (transceiver.direction == "recvonly") {
|
|
|
|
transceiver.setDirectionInternal("inactive");
|
|
|
|
}
|
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-27 18:34:46 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _createOffer(options) {
|
2016-11-27 18:34:46 +03:00
|
|
|
this._checkClosed();
|
2018-02-01 21:07:02 +03:00
|
|
|
this._syncTransceivers();
|
2016-11-27 18:34:46 +03:00
|
|
|
let origin = Cu.getWebIDLCallerPrincipal().origin;
|
2017-07-12 00:49:55 +03:00
|
|
|
return this._chain(async () => {
|
2016-11-27 18:34:46 +03:00
|
|
|
let haveAssertion;
|
|
|
|
if (this._localIdp.enabled) {
|
|
|
|
haveAssertion = this._getIdentityAssertion(origin);
|
|
|
|
}
|
|
|
|
await this._getPermission();
|
|
|
|
await this._certificateReady;
|
|
|
|
let sdp = await new Promise((resolve, reject) => {
|
|
|
|
this._onCreateOfferSuccess = resolve;
|
|
|
|
this._onCreateOfferFailure = reject;
|
|
|
|
this._impl.createOffer(options);
|
2015-02-22 00:57:21 +03:00
|
|
|
});
|
2016-11-27 18:34:46 +03:00
|
|
|
if (haveAssertion) {
|
|
|
|
await haveAssertion;
|
|
|
|
sdp = this._localIdp.addIdentityAttribute(sdp);
|
|
|
|
}
|
|
|
|
return Cu.cloneInto({ type: "offer", sdp }, this._win);
|
2014-12-04 22:12:19 +03:00
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-01-25 07:44:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
createAnswer(optionsOrOnSucc, onErr) {
|
2015-07-16 22:36:34 +03:00
|
|
|
// This entry-point handles both new and legacy call sig. Decipher which one
|
2016-11-27 18:34:46 +03:00
|
|
|
if (typeof optionsOrOnSucc == "function") {
|
|
|
|
return this._legacy(optionsOrOnSucc, onErr, () => this._createAnswer({}));
|
2015-07-16 22:36:34 +03:00
|
|
|
}
|
2016-11-27 18:34:46 +03:00
|
|
|
return this._async(() => this._createAnswer(optionsOrOnSucc));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-27 18:34:46 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _createAnswer(options) {
|
2016-11-27 18:34:46 +03:00
|
|
|
this._checkClosed();
|
2018-02-01 21:07:02 +03:00
|
|
|
this._syncTransceivers();
|
2016-11-27 18:34:46 +03:00
|
|
|
let origin = Cu.getWebIDLCallerPrincipal().origin;
|
2017-07-12 00:49:55 +03:00
|
|
|
return this._chain(async () => {
|
2016-11-27 18:34:46 +03:00
|
|
|
// We give up line-numbers in errors by doing this here, but do all
|
|
|
|
// state-checks inside the chain, to support the legacy feature that
|
|
|
|
// callers don't have to wait for setRemoteDescription to finish.
|
|
|
|
if (!this.remoteDescription) {
|
|
|
|
throw new this._win.DOMException("setRemoteDescription not called",
|
|
|
|
"InvalidStateError");
|
|
|
|
}
|
|
|
|
if (this.remoteDescription.type != "offer") {
|
|
|
|
throw new this._win.DOMException("No outstanding offer",
|
|
|
|
"InvalidStateError");
|
|
|
|
}
|
|
|
|
let haveAssertion;
|
|
|
|
if (this._localIdp.enabled) {
|
|
|
|
haveAssertion = this._getIdentityAssertion(origin);
|
|
|
|
}
|
|
|
|
await this._getPermission();
|
|
|
|
await this._certificateReady;
|
|
|
|
let sdp = await new Promise((resolve, reject) => {
|
|
|
|
this._onCreateAnswerSuccess = resolve;
|
|
|
|
this._onCreateAnswerFailure = reject;
|
|
|
|
this._impl.createAnswer();
|
2015-02-22 00:57:21 +03:00
|
|
|
});
|
2016-11-27 18:34:46 +03:00
|
|
|
if (haveAssertion) {
|
|
|
|
await haveAssertion;
|
|
|
|
sdp = this._localIdp.addIdentityAttribute(sdp);
|
|
|
|
}
|
|
|
|
return Cu.cloneInto({ type: "answer", sdp }, this._win);
|
2015-01-20 17:41:55 +03:00
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _getPermission() {
|
2016-11-21 23:27:23 +03:00
|
|
|
if (!this._havePermission) {
|
2017-08-09 00:41:05 +03:00
|
|
|
let privileged = this._isChrome ||
|
2016-11-21 23:27:23 +03:00
|
|
|
Services.prefs.getBoolPref("media.navigator.permission.disabled");
|
|
|
|
|
|
|
|
if (privileged) {
|
|
|
|
this._havePermission = Promise.resolve();
|
|
|
|
} else {
|
|
|
|
this._havePermission = new Promise((resolve, reject) => {
|
|
|
|
this._settlePermission = { allow: resolve, deny: reject };
|
|
|
|
let outerId = this._win.QueryInterface(Ci.nsIInterfaceRequestor).
|
|
|
|
getInterface(Ci.nsIDOMWindowUtils).outerWindowID;
|
|
|
|
|
|
|
|
let chrome = new CreateOfferRequest(outerId, this._winID,
|
|
|
|
this._globalPCListId, false);
|
|
|
|
let request = this._win.CreateOfferRequest._create(this._win, chrome);
|
2017-04-14 22:51:39 +03:00
|
|
|
Services.obs.notifyObservers(request, "PeerConnection:request");
|
2016-11-21 23:27:23 +03:00
|
|
|
});
|
|
|
|
}
|
2015-08-07 22:22:30 +03:00
|
|
|
}
|
2017-07-12 00:49:55 +03:00
|
|
|
return this._havePermission;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-20 00:47:10 +03:00
|
|
|
|
2017-08-26 08:58:25 +03:00
|
|
|
_sanityCheckSdp(action, type, sdp) {
|
2016-11-27 18:34:46 +03:00
|
|
|
if (action === undefined) {
|
|
|
|
throw new this._win.DOMException(
|
|
|
|
"Invalid type " + type + " provided to setLocalDescription",
|
|
|
|
"InvalidParameterError");
|
|
|
|
}
|
|
|
|
if (action == Ci.IPeerConnection.kActionPRAnswer) {
|
|
|
|
throw new this._win.DOMException("pranswer not yet implemented",
|
|
|
|
"NotSupportedError");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!sdp && action != Ci.IPeerConnection.kActionRollback) {
|
|
|
|
throw new this._win.DOMException(
|
|
|
|
"Empty or null SDP provided to setLocalDescription",
|
|
|
|
"InvalidParameterError");
|
|
|
|
}
|
|
|
|
|
2017-08-26 08:58:25 +03:00
|
|
|
// The fippo butter finger filter AKA non-ASCII chars
|
|
|
|
// Note: SDP allows non-ASCII character in the subject (who cares?)
|
|
|
|
let pos = sdp.search(/[^\u0000-\u007f]/);
|
|
|
|
if (pos != -1) {
|
|
|
|
throw new this._win.DOMException(
|
|
|
|
"SDP contains non ASCII characters at position " + pos,
|
|
|
|
"InvalidParameterError");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
setLocalDescription(desc, onSucc, onErr) {
|
|
|
|
return this._auto(onSucc, onErr, () => this._setLocalDescription(desc));
|
|
|
|
}
|
|
|
|
|
|
|
|
async _setLocalDescription({ type, sdp }) {
|
|
|
|
this._checkClosed();
|
|
|
|
|
|
|
|
this._localType = type;
|
|
|
|
|
|
|
|
let action = this._actions[type];
|
|
|
|
|
|
|
|
this._sanityCheckSdp(action, type, sdp);
|
|
|
|
|
2017-07-12 00:49:55 +03:00
|
|
|
return this._chain(async () => {
|
2016-11-27 18:34:46 +03:00
|
|
|
await this._getPermission();
|
|
|
|
await new Promise((resolve, reject) => {
|
|
|
|
this._onSetLocalDescriptionSuccess = resolve;
|
|
|
|
this._onSetLocalDescriptionFailure = reject;
|
|
|
|
this._impl.setLocalDescription(action, sdp);
|
2016-11-21 23:27:23 +03:00
|
|
|
});
|
2017-12-07 21:31:33 +03:00
|
|
|
this._negotiationNeeded = false;
|
|
|
|
this.updateNegotiationNeeded();
|
2014-12-04 22:12:19 +03:00
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-10-14 20:53:56 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _validateIdentity(sdp, origin) {
|
2015-02-22 00:57:21 +03:00
|
|
|
let expectedIdentity;
|
|
|
|
|
|
|
|
// Only run a single identity verification at a time. We have to do this to
|
|
|
|
// avoid problems with the fact that identity validation doesn't block the
|
|
|
|
// resolution of setRemoteDescription().
|
2016-11-21 23:27:23 +03:00
|
|
|
let p = (async () => {
|
|
|
|
try {
|
|
|
|
await this._lastIdentityValidation;
|
|
|
|
let msg = await this._remoteIdp.verifyIdentityFromSDP(sdp, origin);
|
2015-02-22 00:57:21 +03:00
|
|
|
expectedIdentity = this._impl.peerIdentity;
|
|
|
|
// If this pc has an identity already, then the identity in sdp must match
|
|
|
|
if (expectedIdentity && (!msg || msg.identity !== expectedIdentity)) {
|
|
|
|
this.close();
|
|
|
|
throw new this._win.DOMException(
|
|
|
|
"Peer Identity mismatch, expected: " + expectedIdentity,
|
|
|
|
"IncompatibleSessionDescriptionError");
|
|
|
|
}
|
|
|
|
if (msg) {
|
|
|
|
// Set new identity and generate an event.
|
|
|
|
this._impl.peerIdentity = msg.identity;
|
2015-04-16 19:52:36 +03:00
|
|
|
this._resolvePeerIdentity(Cu.cloneInto({
|
|
|
|
idp: this._remoteIdp.provider,
|
|
|
|
name: msg.identity
|
|
|
|
}, this._win));
|
2015-02-22 00:57:21 +03:00
|
|
|
}
|
2017-06-28 22:41:50 +03:00
|
|
|
} catch (e) {
|
2015-02-22 00:57:21 +03:00
|
|
|
this._rejectPeerIdentity(e);
|
|
|
|
// If we don't expect a specific peer identity, failure to get a valid
|
|
|
|
// peer identity is not a terminal state, so replace the promise to
|
|
|
|
// allow another attempt.
|
|
|
|
if (!this._impl.peerIdentity) {
|
2016-11-21 23:27:23 +03:00
|
|
|
this._resetPeerIdentityPromise();
|
2015-02-22 00:57:21 +03:00
|
|
|
}
|
|
|
|
throw e;
|
2016-11-21 23:27:23 +03:00
|
|
|
}
|
|
|
|
})();
|
|
|
|
this._lastIdentityValidation = p.catch(() => {});
|
2015-02-22 00:57:21 +03:00
|
|
|
|
|
|
|
// Only wait for IdP validation if we need identity matching
|
2016-11-21 23:27:23 +03:00
|
|
|
if (expectedIdentity) {
|
|
|
|
await p;
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-02-22 00:57:21 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
setRemoteDescription(desc, onSucc, onErr) {
|
2016-11-27 18:34:46 +03:00
|
|
|
return this._auto(onSucc, onErr, () => this._setRemoteDescription(desc));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-20 00:47:10 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _setRemoteDescription({ type, sdp }) {
|
2016-11-27 18:34:46 +03:00
|
|
|
this._checkClosed();
|
|
|
|
this._remoteType = type;
|
2015-08-08 02:18:58 +03:00
|
|
|
|
2016-11-27 18:34:46 +03:00
|
|
|
let action = this._actions[type];
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-08-26 08:58:25 +03:00
|
|
|
this._sanityCheckSdp(action, type, sdp);
|
2016-11-27 18:34:46 +03:00
|
|
|
|
|
|
|
// Get caller's origin before hitting the promise chain
|
|
|
|
let origin = Cu.getWebIDLCallerPrincipal().origin;
|
|
|
|
|
2017-07-12 00:49:55 +03:00
|
|
|
return this._chain(async () => {
|
2016-11-27 18:34:46 +03:00
|
|
|
let haveSetRemote = (async () => {
|
|
|
|
await this._getPermission();
|
|
|
|
await new Promise((resolve, reject) => {
|
|
|
|
this._onSetRemoteDescriptionSuccess = resolve;
|
|
|
|
this._onSetRemoteDescriptionFailure = reject;
|
|
|
|
this._impl.setRemoteDescription(action, sdp);
|
|
|
|
});
|
|
|
|
this._updateCanTrickle();
|
|
|
|
})();
|
|
|
|
|
|
|
|
if (action != Ci.IPeerConnection.kActionRollback) {
|
|
|
|
// Do setRemoteDescription and identity validation in parallel
|
|
|
|
await this._validateIdentity(sdp, origin);
|
|
|
|
}
|
|
|
|
await haveSetRemote;
|
2017-12-07 21:31:33 +03:00
|
|
|
this._negotiationNeeded = false;
|
|
|
|
this.updateNegotiationNeeded();
|
2015-01-20 09:09:45 +03:00
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-02-11 02:41:46 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
setIdentityProvider(provider, protocol, username) {
|
2014-02-11 02:41:46 +04:00
|
|
|
this._checkClosed();
|
|
|
|
this._localIdp.setIdentityProvider(provider, protocol, username);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-02-11 02:41:46 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _getIdentityAssertion(origin) {
|
2016-11-21 23:27:23 +03:00
|
|
|
await this._certificateReady;
|
2017-07-12 00:49:55 +03:00
|
|
|
return this._localIdp.getIdentityAssertion(this._impl.fingerprint, origin);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-21 23:27:23 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getIdentityAssertion() {
|
2016-11-17 09:56:26 +03:00
|
|
|
this._checkClosed();
|
2015-02-22 00:57:21 +03:00
|
|
|
let origin = Cu.getWebIDLCallerPrincipal().origin;
|
2016-11-21 23:27:23 +03:00
|
|
|
return this._win.Promise.resolve(this._chain(() =>
|
|
|
|
this._getIdentityAssertion(origin)));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-10-14 20:53:56 +04:00
|
|
|
|
2016-02-21 03:48:20 +03:00
|
|
|
get canTrickleIceCandidates() {
|
|
|
|
return this._canTrickle;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
_updateCanTrickle() {
|
2016-02-21 03:48:20 +03:00
|
|
|
let containsTrickle = section => {
|
|
|
|
let lines = section.toLowerCase().split(/(?:\r\n?|\n)/);
|
|
|
|
return lines.some(line => {
|
|
|
|
let prefix = "a=ice-options:";
|
|
|
|
if (line.substring(0, prefix.length) !== prefix) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
let tokens = line.substring(prefix.length).split(" ");
|
|
|
|
return tokens.some(x => x === "trickle");
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
let desc = null;
|
|
|
|
try {
|
|
|
|
// The getter for remoteDescription can throw if the pc is closed.
|
|
|
|
desc = this.remoteDescription;
|
|
|
|
} catch (e) {}
|
|
|
|
if (!desc) {
|
|
|
|
this._canTrickle = null;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
let sections = desc.sdp.split(/(?:\r\n?|\n)m=/);
|
|
|
|
let topSection = sections.shift();
|
|
|
|
this._canTrickle =
|
|
|
|
containsTrickle(topSection) || sections.every(containsTrickle);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-02-21 03:48:20 +03:00
|
|
|
|
2016-11-20 00:47:10 +03:00
|
|
|
// TODO: Implement processing for end-of-candidates (bug 1318167)
|
2017-01-06 06:47:25 +03:00
|
|
|
addIceCandidate(cand, onSucc, onErr) {
|
2016-11-27 18:34:46 +03:00
|
|
|
return this._auto(onSucc, onErr, () => cand && this._addIceCandidate(cand));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-27 18:34:46 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _addIceCandidate({ candidate, sdpMid, sdpMLineIndex }) {
|
2016-11-27 18:34:46 +03:00
|
|
|
this._checkClosed();
|
|
|
|
if (sdpMid === null && sdpMLineIndex === null) {
|
|
|
|
throw new this._win.DOMException(
|
|
|
|
"Invalid candidate (both sdpMid and sdpMLineIndex are null).",
|
|
|
|
"TypeError");
|
|
|
|
}
|
2017-07-12 00:49:55 +03:00
|
|
|
return this._chain(() => {
|
2017-01-21 12:12:46 +03:00
|
|
|
if (!this.remoteDescription) {
|
|
|
|
throw new this._win.DOMException(
|
|
|
|
"setRemoteDescription needs to called before addIceCandidate",
|
|
|
|
"InvalidStateError");
|
|
|
|
}
|
|
|
|
return new Promise((resolve, reject) => {
|
|
|
|
this._onAddIceCandidateSuccess = resolve;
|
|
|
|
this._onAddIceCandidateError = reject;
|
|
|
|
this._impl.addIceCandidate(candidate, sdpMid || "", sdpMLineIndex);
|
|
|
|
});
|
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
addStream(stream) {
|
2014-08-15 22:53:14 +04:00
|
|
|
stream.getTracks().forEach(track => this.addTrack(track, stream));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
addTrack(track, stream) {
|
2014-08-14 05:40:54 +04:00
|
|
|
if (stream.currentTime === undefined) {
|
2015-01-16 23:00:09 +03:00
|
|
|
throw new this._win.DOMException("invalid stream.", "InvalidParameterError");
|
2014-08-14 05:40:54 +04:00
|
|
|
}
|
|
|
|
this._checkClosed();
|
2017-08-23 23:51:21 +03:00
|
|
|
|
|
|
|
if (this._transceivers.some(
|
|
|
|
transceiver => transceiver.sender.track == track)) {
|
|
|
|
throw new this._win.DOMException("This track is already set on a sender.",
|
|
|
|
"InvalidAccessError");
|
|
|
|
}
|
|
|
|
|
|
|
|
let transceiver = this._transceivers.find(transceiver => {
|
|
|
|
return transceiver.sender.track == null &&
|
|
|
|
transceiver.getKind() == track.kind &&
|
|
|
|
!transceiver.stopped &&
|
|
|
|
!transceiver.hasBeenUsedToSend();
|
2017-11-14 22:02:11 +03:00
|
|
|
});
|
2017-08-23 23:51:21 +03:00
|
|
|
|
|
|
|
if (transceiver) {
|
|
|
|
transceiver.sender.setTrack(track);
|
|
|
|
transceiver.sender.setStreams([stream]);
|
|
|
|
if (transceiver.direction == "recvonly") {
|
|
|
|
transceiver.setDirectionInternal("sendrecv");
|
|
|
|
} else if (transceiver.direction == "inactive") {
|
|
|
|
transceiver.setDirectionInternal("sendonly");
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
transceiver = this._addTransceiverNoEvents(track, {
|
|
|
|
streams: [stream],
|
|
|
|
direction: "sendrecv"
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
transceiver.setAddTrackMagic();
|
|
|
|
transceiver.sync();
|
|
|
|
this.updateNegotiationNeeded();
|
|
|
|
return transceiver.sender;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-08-14 05:40:54 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
removeTrack(sender) {
|
2014-12-11 02:53:54 +03:00
|
|
|
this._checkClosed();
|
2017-08-23 23:51:21 +03:00
|
|
|
|
|
|
|
sender.checkWasCreatedByPc(this.__DOM_IMPL__);
|
|
|
|
|
|
|
|
let transceiver =
|
|
|
|
this._transceivers.find(transceiver => transceiver.sender == sender);
|
|
|
|
|
|
|
|
// If the transceiver was removed due to rollback, let it slide.
|
|
|
|
if (!transceiver || !sender.track) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
sender.setTrack(null);
|
|
|
|
if (transceiver.direction == "sendrecv") {
|
|
|
|
transceiver.setDirectionInternal("recvonly");
|
|
|
|
} else if (transceiver.direction == "sendonly") {
|
|
|
|
transceiver.setDirectionInternal("inactive");
|
|
|
|
}
|
|
|
|
|
|
|
|
transceiver.sync();
|
|
|
|
this.updateNegotiationNeeded();
|
|
|
|
}
|
|
|
|
|
|
|
|
_addTransceiverNoEvents(sendTrackOrKind, init) {
|
|
|
|
let sendTrack = null;
|
|
|
|
let kind;
|
|
|
|
if (typeof(sendTrackOrKind) == "string") {
|
|
|
|
kind = sendTrackOrKind;
|
|
|
|
switch (kind) {
|
|
|
|
case "audio":
|
|
|
|
case "video":
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
throw new this._win.TypeError("Invalid media kind");
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
sendTrack = sendTrackOrKind;
|
|
|
|
kind = sendTrack.kind;
|
2015-03-11 19:24:38 +03:00
|
|
|
}
|
2017-08-23 23:51:21 +03:00
|
|
|
|
|
|
|
let transceiverImpl = this._impl.createTransceiverImpl(kind, sendTrack);
|
|
|
|
let transceiver = this._win.RTCRtpTransceiver._create(
|
|
|
|
this._win,
|
|
|
|
new RTCRtpTransceiver(this, transceiverImpl, init, kind, sendTrack));
|
|
|
|
transceiver.sync();
|
|
|
|
this._transceivers.push(transceiver);
|
|
|
|
return transceiver;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-08-14 05:40:54 +04:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
_onTransceiverNeeded(kind, transceiverImpl) {
|
|
|
|
let init = {direction: "recvonly"};
|
|
|
|
let transceiver = this._win.RTCRtpTransceiver._create(
|
|
|
|
this._win,
|
|
|
|
new RTCRtpTransceiver(this, transceiverImpl, init, kind, null));
|
|
|
|
transceiver.sync();
|
|
|
|
this._transceivers.push(transceiver);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-09-29 20:26:04 +03:00
|
|
|
|
2017-11-14 21:32:07 +03:00
|
|
|
/* Returns a dictionary with three keys:
|
|
|
|
* sources: a list of contributing and synchronization sources
|
|
|
|
* sourceClockOffset: an offset to apply to the source timestamp to get a
|
|
|
|
* very close approximation of the sample time with respect to the local
|
|
|
|
* clock.
|
|
|
|
* jsTimestamp: the current JS time
|
|
|
|
* Note: because the two clocks can drift with respect to each other, once
|
|
|
|
* a timestamp offset has been calculated it should not be recalculated
|
|
|
|
* until the timestamp changes, this way it will not appear as if a new
|
|
|
|
* audio level sample has arrived.
|
|
|
|
*/
|
|
|
|
_getRtpSources(receiver) {
|
|
|
|
let cache = this._rtpSourceCache;
|
|
|
|
// Schedule cache invalidation
|
|
|
|
if (!cache.scheduledClear) {
|
|
|
|
cache.scheduledClear = true;
|
|
|
|
Promise.resolve().then(() => {
|
|
|
|
this._rtpSourceCache = new RTCRtpSourceCache();
|
|
|
|
});
|
|
|
|
}
|
|
|
|
// Fetch the RTP source local time, store it for reuse, calculate
|
|
|
|
// the local offset, likewise store it for reuse.
|
|
|
|
if (cache.tsNowInRtpSourceTime !== undefined) {
|
|
|
|
cache.tsNowInRtpSourceTime = this._impl.getNowInRtpSourceReferenceTime();
|
2018-01-27 00:40:30 +03:00
|
|
|
cache.jsTimestamp = this._win.performance.now() + this._win.performance.timeOrigin;
|
2017-11-14 21:32:07 +03:00
|
|
|
cache.timestampOffset = cache.jsTimestamp - cache.tsNowInRtpSourceTime;
|
|
|
|
}
|
|
|
|
let id = receiver.track.id;
|
|
|
|
if (cache.rtpSourcesByTrackId[id] === undefined) {
|
|
|
|
cache.rtpSourcesByTrackId[id] =
|
|
|
|
this._impl.getRtpSources(receiver.track, cache.tsNowInRtpSourceTime);
|
|
|
|
}
|
|
|
|
return {
|
|
|
|
sources: cache.rtpSourcesByTrackId[id],
|
|
|
|
sourceClockOffset: cache.timestampOffset,
|
|
|
|
jsTimestamp: cache.jsTimestamp,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
addTransceiver(sendTrackOrKind, init) {
|
|
|
|
let transceiver = this._addTransceiverNoEvents(sendTrackOrKind, init);
|
|
|
|
this.updateNegotiationNeeded();
|
|
|
|
return transceiver;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-09-29 20:26:04 +03:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
_syncTransceivers() {
|
|
|
|
this._transceivers.forEach(transceiver => transceiver.sync());
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-08-15 09:33:09 +04:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
updateNegotiationNeeded() {
|
|
|
|
if (this._closed || this.signalingState != "stable") {
|
2017-08-23 23:51:21 +03:00
|
|
|
return;
|
|
|
|
}
|
2015-12-31 19:32:25 +03:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
let negotiationNeeded = this._impl.checkNegotiationNeeded();
|
|
|
|
if (!negotiationNeeded) {
|
|
|
|
this._negotiationNeeded = false;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (this._negotiationNeeded) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
this._negotiationNeeded = true;
|
2017-08-23 23:51:21 +03:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
this._queueTaskWithClosedCheck(() => {
|
|
|
|
if (this._negotiationNeeded) {
|
|
|
|
this.dispatchEvent(new this._win.Event("negotiationneeded"));
|
|
|
|
}
|
|
|
|
});
|
2017-08-23 23:51:21 +03:00
|
|
|
}
|
|
|
|
|
2017-12-21 02:00:40 +03:00
|
|
|
_processTrackAdditionsAndRemovals() {
|
|
|
|
let postProcessing = {
|
|
|
|
updateStreamFunctions: [],
|
|
|
|
muteTracks: [],
|
|
|
|
trackEvents: []
|
|
|
|
};
|
|
|
|
|
|
|
|
for (let transceiver of this._transceivers) {
|
|
|
|
transceiver.receiver.processTrackAdditionsAndRemovals(transceiver,
|
|
|
|
postProcessing);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (let f of postProcessing.updateStreamFunctions) {
|
|
|
|
f();
|
|
|
|
}
|
|
|
|
|
|
|
|
for (let t of postProcessing.muteTracks) {
|
|
|
|
t.mutedChanged(true);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (let ev of postProcessing.trackEvents) {
|
|
|
|
this.dispatchEvent(ev);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-18 22:41:18 +03:00
|
|
|
// TODO(Bug 1241291): Legacy event, remove eventually
|
|
|
|
_fireLegacyAddStreamEvents() {
|
|
|
|
for (let stream of this._newStreams) {
|
|
|
|
let ev = new this._win.MediaStreamEvent("addstream", { stream });
|
|
|
|
this.dispatchEvent(ev);
|
|
|
|
}
|
|
|
|
this._newStreams = [];
|
|
|
|
}
|
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
_getOrCreateStream(id) {
|
|
|
|
if (!this._receiveStreams.has(id)) {
|
|
|
|
let stream = new this._win.MediaStream();
|
|
|
|
stream.assignId(id);
|
2017-12-18 22:41:18 +03:00
|
|
|
this._newStreams.push(stream);
|
2017-08-23 23:51:21 +03:00
|
|
|
this._receiveStreams.set(id, stream);
|
2017-11-14 22:02:11 +03:00
|
|
|
}
|
2017-08-23 23:51:21 +03:00
|
|
|
|
|
|
|
return this._receiveStreams.get(id);
|
|
|
|
}
|
|
|
|
|
|
|
|
_insertDTMF(transceiverImpl, tones, duration, interToneGap) {
|
|
|
|
return this._impl.insertDTMF(transceiverImpl, tones, duration, interToneGap);
|
|
|
|
}
|
|
|
|
|
|
|
|
_getDTMFToneBuffer(sender) {
|
|
|
|
return this._impl.getDTMFToneBuffer(sender.__DOM_IMPL__);
|
|
|
|
}
|
|
|
|
|
2018-02-13 22:25:19 +03:00
|
|
|
_replaceTrackNoRenegotiation(transceiverImpl, withTrack) {
|
2017-08-23 23:51:21 +03:00
|
|
|
this._impl.replaceTrackNoRenegotiation(transceiverImpl, withTrack);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-12-31 19:32:24 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
close() {
|
2014-04-04 16:34:25 +04:00
|
|
|
if (this._closed) {
|
|
|
|
return;
|
|
|
|
}
|
2016-03-29 23:27:03 +03:00
|
|
|
this._closed = true;
|
2014-05-15 17:38:00 +04:00
|
|
|
this.changeIceConnectionState("closed");
|
2014-02-11 02:41:46 +04:00
|
|
|
this._localIdp.close();
|
|
|
|
this._remoteIdp.close();
|
|
|
|
this._impl.close();
|
2017-08-23 23:51:21 +03:00
|
|
|
this._suppressEvents = true;
|
|
|
|
delete this._pc;
|
|
|
|
delete this._observer;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-10-14 20:53:56 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getLocalStreams() {
|
2013-01-18 00:25:17 +04:00
|
|
|
this._checkClosed();
|
2017-08-23 23:51:21 +03:00
|
|
|
let localStreams = new Set();
|
|
|
|
this._transceivers.forEach(transceiver => {
|
|
|
|
transceiver.sender.getStreams().forEach(stream => {
|
|
|
|
localStreams.add(stream);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
return [...localStreams.values()];
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-01-15 02:25:54 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getRemoteStreams() {
|
2013-01-18 00:25:17 +04:00
|
|
|
this._checkClosed();
|
2017-08-23 23:51:21 +03:00
|
|
|
return [...this._receiveStreams.values()];
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-09-13 20:04:31 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getSenders() {
|
2017-08-23 23:51:21 +03:00
|
|
|
return this.getTransceivers().map(transceiver => transceiver.sender);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-08-14 05:40:54 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getReceivers() {
|
2017-08-23 23:51:21 +03:00
|
|
|
return this.getTransceivers().map(transceiver => transceiver.receiver);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-08-14 05:40:54 +04:00
|
|
|
|
2017-11-14 21:32:07 +03:00
|
|
|
// test-only: get the current time using the webrtc clock
|
|
|
|
mozGetNowInRtpSourceReferenceTime() {
|
|
|
|
return this._impl.getNowInRtpSourceReferenceTime();
|
|
|
|
}
|
|
|
|
|
|
|
|
// test-only: insert a contributing source entry for a track
|
|
|
|
mozInsertAudioLevelForContributingSource(receiver,
|
|
|
|
source,
|
|
|
|
timestamp,
|
|
|
|
hasLevel,
|
|
|
|
level) {
|
|
|
|
this._impl.insertAudioLevelForContributingSource(receiver.track,
|
|
|
|
source,
|
|
|
|
timestamp,
|
|
|
|
hasLevel,
|
|
|
|
level);
|
|
|
|
}
|
|
|
|
|
2017-04-26 18:01:07 +03:00
|
|
|
mozAddRIDExtension(receiver, extensionId) {
|
|
|
|
this._impl.addRIDExtension(receiver.track, extensionId);
|
|
|
|
}
|
|
|
|
|
|
|
|
mozAddRIDFilter(receiver, rid) {
|
|
|
|
this._impl.addRIDFilter(receiver.track, rid);
|
|
|
|
}
|
|
|
|
|
2017-06-30 03:14:06 +03:00
|
|
|
mozSetPacketCallback(callback) {
|
|
|
|
this._onPacket = callback;
|
|
|
|
}
|
|
|
|
|
|
|
|
mozEnablePacketDump(level, type, sending) {
|
|
|
|
this._impl.enablePacketDump(level, type, sending);
|
|
|
|
}
|
|
|
|
|
|
|
|
mozDisablePacketDump(level, type, sending) {
|
|
|
|
this._impl.disablePacketDump(level, type, sending);
|
|
|
|
}
|
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
getTransceivers() {
|
|
|
|
return this._transceivers;
|
|
|
|
}
|
|
|
|
|
2013-01-15 02:25:54 +04:00
|
|
|
get localDescription() {
|
2013-01-18 00:25:17 +04:00
|
|
|
this._checkClosed();
|
2014-02-11 02:41:46 +04:00
|
|
|
let sdp = this._impl.localDescription;
|
2013-01-15 02:25:54 +04:00
|
|
|
if (sdp.length == 0) {
|
|
|
|
return null;
|
|
|
|
}
|
2016-11-09 18:32:11 +03:00
|
|
|
return new this._win.RTCSessionDescription({ type: this._localType, sdp });
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-01-15 02:25:54 +04:00
|
|
|
|
2017-06-30 11:19:19 +03:00
|
|
|
get currentLocalDescription() {
|
|
|
|
this._checkClosed();
|
|
|
|
let sdp = this._impl.currentLocalDescription;
|
|
|
|
if (sdp.length == 0) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return new this._win.RTCSessionDescription({ type: this._localType, sdp });
|
|
|
|
}
|
|
|
|
|
|
|
|
get pendingLocalDescription() {
|
|
|
|
this._checkClosed();
|
|
|
|
let sdp = this._impl.pendingLocalDescription;
|
|
|
|
if (sdp.length == 0) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return new this._win.RTCSessionDescription({ type: this._localType, sdp });
|
|
|
|
}
|
|
|
|
|
2013-01-15 02:25:54 +04:00
|
|
|
get remoteDescription() {
|
2013-01-18 00:25:17 +04:00
|
|
|
this._checkClosed();
|
2014-02-11 02:41:46 +04:00
|
|
|
let sdp = this._impl.remoteDescription;
|
2013-01-15 02:25:54 +04:00
|
|
|
if (sdp.length == 0) {
|
|
|
|
return null;
|
|
|
|
}
|
2016-11-09 18:32:11 +03:00
|
|
|
return new this._win.RTCSessionDescription({ type: this._remoteType, sdp });
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-01-15 02:25:54 +04:00
|
|
|
|
2017-06-30 11:19:19 +03:00
|
|
|
get currentRemoteDescription() {
|
|
|
|
this._checkClosed();
|
|
|
|
let sdp = this._impl.currentRemoteDescription;
|
|
|
|
if (sdp.length == 0) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return new this._win.RTCSessionDescription({ type: this._remoteType, sdp });
|
|
|
|
}
|
|
|
|
|
|
|
|
get pendingRemoteDescription() {
|
|
|
|
this._checkClosed();
|
|
|
|
let sdp = this._impl.pendingRemoteDescription;
|
|
|
|
if (sdp.length == 0) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
return new this._win.RTCSessionDescription({ type: this._remoteType, sdp });
|
|
|
|
}
|
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
get peerIdentity() { return this._peerIdentity; }
|
|
|
|
get idpLoginUrl() { return this._localIdp.idpLoginUrl; }
|
|
|
|
get id() { return this._impl.id; }
|
|
|
|
set id(s) { this._impl.id = s; }
|
2017-06-28 22:41:50 +03:00
|
|
|
get iceGatheringState() { return this._iceGatheringState; }
|
2017-01-06 06:47:25 +03:00
|
|
|
get iceConnectionState() { return this._iceConnectionState; }
|
2013-05-17 03:40:23 +04:00
|
|
|
|
2013-05-17 03:41:46 +04:00
|
|
|
get signalingState() {
|
|
|
|
// checking for our local pc closed indication
|
|
|
|
// before invoking the pc methods.
|
2014-02-11 02:41:46 +04:00
|
|
|
if (this._closed) {
|
2013-05-17 03:41:46 +04:00
|
|
|
return "closed";
|
|
|
|
}
|
2013-10-14 20:53:56 +04:00
|
|
|
return {
|
|
|
|
"SignalingInvalid": "",
|
|
|
|
"SignalingStable": "stable",
|
|
|
|
"SignalingHaveLocalOffer": "have-local-offer",
|
|
|
|
"SignalingHaveRemoteOffer": "have-remote-offer",
|
|
|
|
"SignalingHaveLocalPranswer": "have-local-pranswer",
|
|
|
|
"SignalingHaveRemotePranswer": "have-remote-pranswer",
|
|
|
|
"SignalingClosed": "closed"
|
2014-02-11 02:41:46 +04:00
|
|
|
}[this._impl.signalingState];
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-17 03:41:46 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
changeIceGatheringState(state) {
|
2013-05-17 03:40:23 +04:00
|
|
|
this._iceGatheringState = state;
|
2014-05-23 01:14:56 +04:00
|
|
|
_globalPCList.notifyLifecycleObservers(this, "icegatheringstatechange");
|
2016-11-21 23:06:27 +03:00
|
|
|
this.dispatchEvent(new this._win.Event("icegatheringstatechange"));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-17 03:40:23 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
changeIceConnectionState(state) {
|
2016-11-18 10:16:33 +03:00
|
|
|
if (state != this._iceConnectionState) {
|
|
|
|
this._iceConnectionState = state;
|
|
|
|
_globalPCList.notifyLifecycleObservers(this, "iceconnectionstatechange");
|
|
|
|
this.dispatchEvent(new this._win.Event("iceconnectionstatechange"));
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-17 03:40:23 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getStats(selector, onSucc, onErr) {
|
2017-01-04 01:57:07 +03:00
|
|
|
let isLegacy = (typeof onSucc) == "function";
|
|
|
|
if (isLegacy &&
|
2016-12-13 03:17:38 +03:00
|
|
|
this._warnDeprecatedStatsCallbacksNullable.warn) {
|
|
|
|
this._warnDeprecatedStatsCallbacksNullable.warn();
|
|
|
|
this._warnDeprecatedStatsCallbacksNullable.warn = null;
|
|
|
|
}
|
2017-01-04 01:57:07 +03:00
|
|
|
return this._auto(onSucc, onErr, () => this._getStats(selector, isLegacy));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-11-27 18:34:46 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
async _getStats(selector, isLegacy) {
|
2016-11-27 18:34:46 +03:00
|
|
|
// getStats is allowed even in closed state.
|
2017-07-12 00:49:55 +03:00
|
|
|
return this._chain(() => new Promise((resolve, reject) => {
|
2017-01-04 01:57:07 +03:00
|
|
|
this._onGetStatsIsLegacy = isLegacy;
|
2016-11-27 18:34:46 +03:00
|
|
|
this._onGetStatsSuccess = resolve;
|
|
|
|
this._onGetStatsFailure = reject;
|
|
|
|
this._impl.getStats(selector);
|
|
|
|
}));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-11-25 23:01:03 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
createDataChannel(label, {
|
|
|
|
maxRetransmits, ordered, negotiated, id = 0xFFFF,
|
|
|
|
maxRetransmitTime, maxPacketLifeTime = maxRetransmitTime,
|
|
|
|
protocol
|
|
|
|
} = {}) {
|
2013-01-18 00:25:17 +04:00
|
|
|
this._checkClosed();
|
2015-06-18 18:46:36 +03:00
|
|
|
|
2016-11-23 00:13:04 +03:00
|
|
|
if (maxRetransmitTime !== undefined) {
|
|
|
|
this.logWarning("Use maxPacketLifeTime instead of deprecated maxRetransmitTime which will stop working soon in createDataChannel!");
|
2013-06-04 01:34:42 +04:00
|
|
|
}
|
2016-11-23 00:13:04 +03:00
|
|
|
if (maxPacketLifeTime !== undefined && maxRetransmits !== undefined) {
|
2015-01-16 23:00:09 +03:00
|
|
|
throw new this._win.DOMException(
|
2016-11-23 00:13:04 +03:00
|
|
|
"Both maxPacketLifeTime and maxRetransmits cannot be provided",
|
2015-01-16 23:00:09 +03:00
|
|
|
"InvalidParameterError");
|
2012-10-07 09:34:30 +04:00
|
|
|
}
|
|
|
|
// Must determine the type where we still know if entries are undefined.
|
|
|
|
let type;
|
2016-11-23 00:13:04 +03:00
|
|
|
if (maxPacketLifeTime) {
|
2012-11-07 23:07:22 +04:00
|
|
|
type = Ci.IPeerConnection.kDataChannelPartialReliableTimed;
|
2016-11-23 00:13:04 +03:00
|
|
|
} else if (maxRetransmits) {
|
2012-11-07 23:07:22 +04:00
|
|
|
type = Ci.IPeerConnection.kDataChannelPartialReliableRexmit;
|
2012-10-07 09:34:30 +04:00
|
|
|
} else {
|
2012-11-07 23:07:22 +04:00
|
|
|
type = Ci.IPeerConnection.kDataChannelReliable;
|
2012-10-07 09:34:30 +04:00
|
|
|
}
|
|
|
|
// Synchronous since it doesn't block.
|
2017-08-23 23:51:21 +03:00
|
|
|
let dataChannel =
|
|
|
|
this._impl.createDataChannel(label, protocol, type, ordered,
|
|
|
|
maxPacketLifeTime, maxRetransmits,
|
|
|
|
negotiated, id);
|
|
|
|
|
|
|
|
// Spec says to only do this if this is the first DataChannel created,
|
|
|
|
// but the c++ code that does the "is negotiation needed" checking will
|
|
|
|
// only ever return true on the first one.
|
|
|
|
this.updateNegotiationNeeded();
|
|
|
|
|
|
|
|
return dataChannel;
|
2012-10-07 09:34:30 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
|
|
|
setupPrototype(RTCPeerConnection, {
|
|
|
|
classID: PC_CID,
|
|
|
|
contractID: PC_CONTRACT,
|
2013-10-14 20:53:56 +04:00
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports,
|
|
|
|
Ci.nsIDOMGlobalPropertyInitializer]),
|
2017-01-06 06:47:25 +03:00
|
|
|
_actions: {
|
|
|
|
offer: Ci.IPeerConnection.kActionOffer,
|
|
|
|
answer: Ci.IPeerConnection.kActionAnswer,
|
|
|
|
pranswer: Ci.IPeerConnection.kActionPRAnswer,
|
|
|
|
rollback: Ci.IPeerConnection.kActionRollback,
|
|
|
|
},
|
|
|
|
});
|
|
|
|
|
|
|
|
// This is a separate class because we don't want to expose it to DOM.
|
|
|
|
|
|
|
|
class PeerConnectionObserver {
|
|
|
|
init(win) {
|
|
|
|
this._win = win;
|
|
|
|
}
|
2013-10-14 20:53:56 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
__init(dompc) {
|
2013-11-02 04:49:48 +04:00
|
|
|
this._dompc = dompc._innerObject;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-03-30 00:30:16 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
newError(message, code) {
|
2014-11-26 23:26:37 +03:00
|
|
|
// These strings must match those defined in the WebRTC spec.
|
|
|
|
const reasonName = [
|
|
|
|
"",
|
|
|
|
"InternalError",
|
2014-11-20 03:16:29 +03:00
|
|
|
"InvalidCandidateError",
|
2015-03-11 19:24:38 +03:00
|
|
|
"InvalidParameterError",
|
2014-11-26 23:26:37 +03:00
|
|
|
"InvalidStateError",
|
|
|
|
"InvalidSessionDescriptionError",
|
|
|
|
"IncompatibleSessionDescriptionError",
|
|
|
|
"InternalError",
|
|
|
|
"IncompatibleMediaStreamTrackError",
|
|
|
|
"InternalError"
|
|
|
|
];
|
|
|
|
let name = reasonName[Math.min(code, reasonName.length - 1)];
|
2015-01-16 23:00:09 +03:00
|
|
|
return new this._dompc._win.DOMException(message, name);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-11-26 23:26:37 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
dispatchEvent(event) {
|
2013-05-08 04:55:21 +04:00
|
|
|
this._dompc.dispatchEvent(event);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-08 04:55:21 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onCreateOfferSuccess(sdp) {
|
2015-02-22 00:57:21 +03:00
|
|
|
this._dompc._onCreateOfferSuccess(sdp);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onCreateOfferError(code, message) {
|
2015-01-16 23:00:09 +03:00
|
|
|
this._dompc._onCreateOfferFailure(this.newError(message, code));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onCreateAnswerSuccess(sdp) {
|
2015-02-22 00:57:21 +03:00
|
|
|
this._dompc._onCreateAnswerSuccess(sdp);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onCreateAnswerError(code, message) {
|
2015-01-16 23:00:09 +03:00
|
|
|
this._dompc._onCreateAnswerFailure(this.newError(message, code));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onSetLocalDescriptionSuccess() {
|
2017-08-23 23:51:21 +03:00
|
|
|
this._dompc._syncTransceivers();
|
2014-11-27 06:35:54 +03:00
|
|
|
this._dompc._onSetLocalDescriptionSuccess();
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onSetRemoteDescriptionSuccess() {
|
2017-08-23 23:51:21 +03:00
|
|
|
this._dompc._syncTransceivers();
|
2017-12-21 02:00:40 +03:00
|
|
|
this._dompc._processTrackAdditionsAndRemovals();
|
2017-12-18 22:41:18 +03:00
|
|
|
this._dompc._fireLegacyAddStreamEvents();
|
2017-12-21 19:22:37 +03:00
|
|
|
this._dompc._transceivers = this._dompc._transceivers.filter(t => !t.shouldRemove);
|
2014-05-01 14:51:00 +04:00
|
|
|
this._dompc._onSetRemoteDescriptionSuccess();
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onSetLocalDescriptionError(code, message) {
|
2014-08-07 03:53:07 +04:00
|
|
|
this._localType = null;
|
2015-01-16 23:00:09 +03:00
|
|
|
this._dompc._onSetLocalDescriptionFailure(this.newError(message, code));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onSetRemoteDescriptionError(code, message) {
|
2014-08-07 03:53:07 +04:00
|
|
|
this._remoteType = null;
|
2015-01-16 23:00:09 +03:00
|
|
|
this._dompc._onSetRemoteDescriptionFailure(this.newError(message, code));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onAddIceCandidateSuccess() {
|
2014-11-27 06:35:54 +03:00
|
|
|
this._dompc._onAddIceCandidateSuccess();
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-02-01 00:43:03 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onAddIceCandidateError(code, message) {
|
2015-01-16 23:00:09 +03:00
|
|
|
this._dompc._onAddIceCandidateError(this.newError(message, code));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-02-01 00:43:03 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onIceCandidate(sdpMLineIndex, sdpMid, candidate) {
|
2016-11-20 00:47:10 +03:00
|
|
|
let win = this._dompc._win;
|
|
|
|
if (candidate) {
|
2016-12-08 03:59:32 +03:00
|
|
|
if (candidate.includes(" typ relay ")) {
|
|
|
|
this._dompc._iceGatheredRelayCandidates = true;
|
|
|
|
}
|
2016-11-20 00:47:10 +03:00
|
|
|
candidate = new win.RTCIceCandidate({ candidate, sdpMid, sdpMLineIndex });
|
|
|
|
} else {
|
|
|
|
candidate = null;
|
|
|
|
|
2014-08-07 21:20:26 +04:00
|
|
|
}
|
2016-11-20 00:47:10 +03:00
|
|
|
this.dispatchEvent(new win.RTCPeerConnectionIceEvent("icecandidate",
|
|
|
|
{ candidate }));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-09-17 04:42:39 +04:00
|
|
|
|
2013-11-14 02:53:30 +04:00
|
|
|
// This method is primarily responsible for updating iceConnectionState.
|
|
|
|
// This state is defined in the WebRTC specification as follows:
|
2013-10-02 20:32:59 +04:00
|
|
|
//
|
|
|
|
// iceConnectionState:
|
|
|
|
// -------------------
|
2016-11-18 10:16:33 +03:00
|
|
|
// new Any of the RTCIceTransports are in the new state and none
|
|
|
|
// of them are in the checking, failed or disconnected state.
|
2013-10-02 20:32:59 +04:00
|
|
|
//
|
2016-11-18 10:16:33 +03:00
|
|
|
// checking Any of the RTCIceTransports are in the checking state and
|
|
|
|
// none of them are in the failed or disconnected state.
|
2013-10-02 20:32:59 +04:00
|
|
|
//
|
2016-11-18 10:16:33 +03:00
|
|
|
// connected All RTCIceTransports are in the connected, completed or
|
|
|
|
// closed state and at least one of them is in the connected
|
2013-10-02 20:32:59 +04:00
|
|
|
// state.
|
|
|
|
//
|
2016-11-18 10:16:33 +03:00
|
|
|
// completed All RTCIceTransports are in the completed or closed state
|
|
|
|
// and at least one of them is in the completed state.
|
|
|
|
//
|
|
|
|
// failed Any of the RTCIceTransports are in the failed state.
|
2013-10-02 20:32:59 +04:00
|
|
|
//
|
2016-11-18 10:16:33 +03:00
|
|
|
// disconnected Any of the RTCIceTransports are in the disconnected state
|
|
|
|
// and none of them are in the failed state.
|
2013-10-02 20:32:59 +04:00
|
|
|
//
|
2016-11-18 10:16:33 +03:00
|
|
|
// closed All of the RTCIceTransports are in the closed state.
|
2013-10-02 20:32:59 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
handleIceConnectionStateChange(iceConnectionState) {
|
2016-01-06 03:51:52 +03:00
|
|
|
let pc = this._dompc;
|
2016-11-21 23:06:27 +03:00
|
|
|
if (pc.iceConnectionState === iceConnectionState) {
|
|
|
|
return;
|
|
|
|
}
|
2017-06-28 22:41:50 +03:00
|
|
|
if (pc.iceConnectionState === "new") {
|
2015-11-17 00:01:46 +03:00
|
|
|
var checking_histogram = Services.telemetry.getHistogramById("WEBRTC_ICE_CHECKING_RATE");
|
2017-06-28 22:41:50 +03:00
|
|
|
if (iceConnectionState === "checking") {
|
2015-11-17 00:01:46 +03:00
|
|
|
checking_histogram.add(true);
|
2017-06-28 22:41:50 +03:00
|
|
|
} else if (iceConnectionState === "failed") {
|
2015-11-17 00:01:46 +03:00
|
|
|
checking_histogram.add(false);
|
|
|
|
}
|
2017-06-28 22:41:50 +03:00
|
|
|
} else if (pc.iceConnectionState === "checking") {
|
2016-09-23 18:55:48 +03:00
|
|
|
var success_histogram = Services.telemetry.getHistogramById("WEBRTC_ICE_SUCCESS_RATE");
|
2017-06-28 22:41:50 +03:00
|
|
|
if (iceConnectionState === "completed" ||
|
|
|
|
iceConnectionState === "connected") {
|
2015-11-17 00:01:46 +03:00
|
|
|
success_histogram.add(true);
|
2017-06-28 22:41:50 +03:00
|
|
|
} else if (iceConnectionState === "failed") {
|
2015-11-17 00:01:46 +03:00
|
|
|
success_histogram.add(false);
|
|
|
|
}
|
|
|
|
}
|
2013-10-02 20:32:59 +04:00
|
|
|
|
2017-06-28 22:41:50 +03:00
|
|
|
if (iceConnectionState === "failed") {
|
2016-12-07 12:49:50 +03:00
|
|
|
if (!pc._hasStunServer) {
|
|
|
|
pc.logError("ICE failed, add a STUN server and see about:webrtc for more details");
|
2017-06-28 22:41:50 +03:00
|
|
|
} else if (!pc._hasTurnServer) {
|
2016-12-07 12:49:50 +03:00
|
|
|
pc.logError("ICE failed, add a TURN server and see about:webrtc for more details");
|
2017-06-28 22:41:50 +03:00
|
|
|
} else if (pc._hasTurnServer && !pc._iceGatheredRelayCandidates) {
|
2016-12-08 03:59:32 +03:00
|
|
|
pc.logError("ICE failed, your TURN server appears to be broken, see about:webrtc for more details");
|
2017-06-28 22:41:50 +03:00
|
|
|
} else {
|
2016-12-07 12:49:50 +03:00
|
|
|
pc.logError("ICE failed, see about:webrtc for more details");
|
|
|
|
}
|
2013-10-02 20:32:59 +04:00
|
|
|
}
|
2015-11-17 00:01:46 +03:00
|
|
|
|
2016-01-06 03:51:52 +03:00
|
|
|
pc.changeIceConnectionState(iceConnectionState);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-10-02 20:32:59 +04:00
|
|
|
|
2013-11-14 02:53:30 +04:00
|
|
|
// This method is responsible for updating iceGatheringState. This
|
|
|
|
// state is defined in the WebRTC specification as follows:
|
|
|
|
//
|
|
|
|
// iceGatheringState:
|
|
|
|
// ------------------
|
|
|
|
// new The object was just created, and no networking has occurred
|
|
|
|
// yet.
|
|
|
|
//
|
2016-11-21 23:06:27 +03:00
|
|
|
// gathering The ICE agent is in the process of gathering candidates for
|
2013-11-14 02:53:30 +04:00
|
|
|
// this RTCPeerConnection.
|
|
|
|
//
|
2016-11-21 23:06:27 +03:00
|
|
|
// complete The ICE agent has completed gathering. Events such as adding
|
2013-11-14 02:53:30 +04:00
|
|
|
// a new interface or a new TURN server will cause the state to
|
|
|
|
// go back to gathering.
|
|
|
|
//
|
2017-01-06 06:47:25 +03:00
|
|
|
handleIceGatheringStateChange(gatheringState) {
|
2016-11-21 23:06:27 +03:00
|
|
|
let pc = this._dompc;
|
|
|
|
if (pc.iceGatheringState === gatheringState) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
pc.changeIceGatheringState(gatheringState);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-05-17 03:41:46 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onStateChange(state) {
|
2013-05-17 03:41:46 +04:00
|
|
|
switch (state) {
|
2013-10-14 20:53:56 +04:00
|
|
|
case "SignalingState":
|
2014-11-21 02:05:40 +03:00
|
|
|
this.dispatchEvent(new this._win.Event("signalingstatechange"));
|
2013-05-17 03:41:46 +04:00
|
|
|
break;
|
|
|
|
|
2013-11-14 02:53:30 +04:00
|
|
|
case "IceConnectionState":
|
2013-11-27 21:32:23 +04:00
|
|
|
this.handleIceConnectionStateChange(this._dompc._pc.iceConnectionState);
|
2013-11-14 02:53:30 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case "IceGatheringState":
|
|
|
|
this.handleIceGatheringStateChange(this._dompc._pc.iceGatheringState);
|
2013-05-17 03:41:46 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2016-03-09 06:44:06 +03:00
|
|
|
this._dompc.logWarning("Unhandled state type: " + state);
|
2012-10-07 09:34:30 +04:00
|
|
|
break;
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2012-10-07 09:34:30 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onGetStatsSuccess(dict) {
|
2016-01-06 03:51:52 +03:00
|
|
|
let pc = this._dompc;
|
|
|
|
let chromeobj = new RTCStatsReport(pc._win, dict);
|
|
|
|
let webidlobj = pc._win.RTCStatsReport._create(pc._win, chromeobj);
|
2016-12-13 03:17:38 +03:00
|
|
|
chromeobj.makeStatsPublic(pc._warnDeprecatedStatsCallbacksNullable &&
|
2017-01-04 01:57:07 +03:00
|
|
|
pc._warnDeprecatedStatsAccessNullable,
|
|
|
|
pc._onGetStatsIsLegacy);
|
2016-01-06 03:51:52 +03:00
|
|
|
pc._onGetStatsSuccess(webidlobj);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-10-18 02:00:05 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
onGetStatsError(code, message) {
|
2015-01-16 23:00:09 +03:00
|
|
|
this._dompc._onGetStatsFailure(this.newError(message, code));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2013-10-18 02:00:05 +04:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
_getTransceiverWithRecvTrack(webrtcTrackId) {
|
|
|
|
return this._dompc.getTransceivers().find(
|
|
|
|
transceiver => transceiver.remoteTrackIdIs(webrtcTrackId));
|
|
|
|
}
|
|
|
|
|
|
|
|
onTransceiverNeeded(kind, transceiverImpl) {
|
|
|
|
this._dompc._onTransceiverNeeded(kind, transceiverImpl);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-08-15 09:33:09 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
notifyDataChannel(channel) {
|
2013-05-17 03:40:23 +04:00
|
|
|
this.dispatchEvent(new this._dompc._win.RTCDataChannelEvent("datachannel",
|
2016-11-20 00:47:10 +03:00
|
|
|
{ channel }));
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-09-14 15:53:23 +03:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
onDTMFToneChange(track, tone) {
|
2016-09-29 20:26:04 +03:00
|
|
|
var pc = this._dompc;
|
2017-08-23 23:51:21 +03:00
|
|
|
var sender = pc.getSenders().find(sender => sender.track == track);
|
2016-09-29 20:26:04 +03:00
|
|
|
sender.dtmf.dispatchEvent(new pc._win.RTCDTMFToneChangeEvent("tonechange",
|
2016-11-20 00:47:10 +03:00
|
|
|
{ tone }));
|
2014-07-10 22:31:25 +04:00
|
|
|
}
|
2017-06-30 03:14:06 +03:00
|
|
|
|
|
|
|
onPacket(level, type, sending, packet) {
|
|
|
|
var pc = this._dompc;
|
|
|
|
if (pc._onPacket) {
|
|
|
|
pc._onPacket(level, type, sending, packet);
|
|
|
|
}
|
|
|
|
}
|
2017-08-23 23:51:21 +03:00
|
|
|
|
|
|
|
syncTransceivers() {
|
|
|
|
this._dompc._syncTransceivers();
|
|
|
|
}
|
2014-05-23 01:14:56 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
setupPrototype(PeerConnectionObserver, {
|
|
|
|
classID: PC_OBS_CID,
|
|
|
|
contractID: PC_OBS_CONTRACT,
|
2014-05-23 01:14:56 +04:00
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports,
|
2017-01-06 06:47:25 +03:00
|
|
|
Ci.nsIDOMGlobalPropertyInitializer])
|
|
|
|
});
|
2014-05-23 01:14:56 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
class RTCPeerConnectionStatic {
|
|
|
|
init(win) {
|
2014-05-23 01:14:56 +04:00
|
|
|
this._winID = win.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
|
|
.getInterface(Ci.nsIDOMWindowUtils).currentInnerWindowID;
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-05-23 01:14:56 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
registerPeerConnectionLifecycleCallback(cb) {
|
2014-05-23 01:14:56 +04:00
|
|
|
_globalPCList._registerPeerConnectionLifecycleCallback(this._winID, cb);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-09-29 20:26:04 +03:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
setupPrototype(RTCPeerConnectionStatic, {
|
|
|
|
classID: PC_STATIC_CID,
|
|
|
|
contractID: PC_STATIC_CONTRACT,
|
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports,
|
|
|
|
Ci.nsIDOMGlobalPropertyInitializer])
|
|
|
|
});
|
|
|
|
|
|
|
|
class RTCDTMFSender {
|
|
|
|
constructor(sender) {
|
|
|
|
this._sender = sender;
|
|
|
|
}
|
2016-09-29 20:26:04 +03:00
|
|
|
|
|
|
|
get toneBuffer() {
|
|
|
|
return this._sender._pc._getDTMFToneBuffer(this._sender);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-09-29 20:26:04 +03:00
|
|
|
|
|
|
|
get ontonechange() {
|
|
|
|
return this.__DOM_IMPL__.getEventHandler("ontonechange");
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-09-29 20:26:04 +03:00
|
|
|
|
|
|
|
set ontonechange(handler) {
|
|
|
|
this.__DOM_IMPL__.setEventHandler("ontonechange", handler);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2016-09-29 20:26:04 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
insertDTMF(tones, duration, interToneGap) {
|
2016-09-29 20:26:04 +03:00
|
|
|
this._sender._pc._checkClosed();
|
2017-08-23 23:51:21 +03:00
|
|
|
this._sender._transceiver.insertDTMF(tones, duration, interToneGap);
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-08-14 05:40:54 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
setupPrototype(RTCDTMFSender, {
|
|
|
|
classID: PC_DTMF_SENDER_CID,
|
|
|
|
contractID: PC_DTMF_SENDER_CONTRACT,
|
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports])
|
|
|
|
});
|
|
|
|
|
|
|
|
class RTCRtpSender {
|
2017-08-23 23:51:21 +03:00
|
|
|
constructor(pc, transceiverImpl, transceiver, track, streams) {
|
|
|
|
let dtmf = pc._win.RTCDTMFSender._create(
|
|
|
|
pc._win, new RTCDTMFSender(this));
|
|
|
|
|
|
|
|
Object.assign(this, {
|
|
|
|
_pc: pc,
|
|
|
|
_transceiverImpl: transceiverImpl,
|
|
|
|
_transceiver: transceiver,
|
|
|
|
track,
|
|
|
|
_streams: streams,
|
|
|
|
dtmf });
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2014-08-15 09:33:09 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
replaceTrack(withTrack) {
|
2017-08-23 23:51:21 +03:00
|
|
|
// async functions in here return a chrome promise, which is not something
|
|
|
|
// content can use. This wraps that promise in something content can use.
|
|
|
|
return this._pc._win.Promise.resolve(this._replaceTrack(withTrack));
|
|
|
|
}
|
|
|
|
|
|
|
|
async _replaceTrack(withTrack) {
|
|
|
|
this._pc._checkClosed();
|
|
|
|
|
|
|
|
if (this._transceiver.stopped) {
|
|
|
|
throw new this._pc._win.DOMException(
|
|
|
|
"Cannot call replaceTrack when transceiver is stopped",
|
|
|
|
"InvalidStateError");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (withTrack && (withTrack.kind != this._transceiver.getKind())) {
|
|
|
|
throw new this._pc._win.DOMException(
|
|
|
|
"Cannot replaceTrack with a different kind!",
|
|
|
|
"TypeError");
|
|
|
|
}
|
|
|
|
|
|
|
|
// Updates the track on the MediaPipeline; this is needed whether or not
|
|
|
|
// we've associated this transceiver, the spec language notwithstanding.
|
|
|
|
// Synchronous, and will throw on failure.
|
2018-02-13 22:25:19 +03:00
|
|
|
this._pc._replaceTrackNoRenegotiation(this._transceiverImpl, withTrack);
|
2017-08-23 23:51:21 +03:00
|
|
|
|
|
|
|
let setTrack = () => {
|
|
|
|
this.track = withTrack;
|
|
|
|
this._transceiver.sync();
|
|
|
|
};
|
|
|
|
|
|
|
|
// Spec is a little weird here; we only queue if the transceiver was
|
|
|
|
// associated, otherwise we update the track synchronously.
|
|
|
|
if (this._transceiver.mid == null) {
|
|
|
|
setTrack();
|
|
|
|
} else {
|
|
|
|
// We're supposed to queue a task if the transceiver is associated
|
|
|
|
await this._pc._queueTaskWithClosedCheck(setTrack);
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-12-31 19:32:24 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
setParameters(parameters) {
|
2017-08-23 23:51:21 +03:00
|
|
|
return this._pc._win.Promise.resolve(this._setParameters(parameters));
|
|
|
|
}
|
|
|
|
|
|
|
|
async _setParameters(parameters) {
|
|
|
|
this._pc._checkClosed();
|
|
|
|
|
|
|
|
if (this._transceiver.stopped) {
|
|
|
|
throw new this._pc._win.DOMException(
|
|
|
|
"This sender's transceiver is stopped", "InvalidStateError");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!Services.prefs.getBoolPref("media.peerconnection.simulcast")) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
parameters.encodings = parameters.encodings || [];
|
|
|
|
|
|
|
|
parameters.encodings.reduce((uniqueRids, { rid, scaleResolutionDownBy }) => {
|
|
|
|
if (scaleResolutionDownBy < 1.0) {
|
|
|
|
throw new this._pc._win.RangeError("scaleResolutionDownBy must be >= 1.0");
|
|
|
|
}
|
|
|
|
if (!rid && parameters.encodings.length > 1) {
|
|
|
|
throw new this._pc._win.DOMException("Missing rid", "TypeError");
|
|
|
|
}
|
|
|
|
if (uniqueRids[rid]) {
|
|
|
|
throw new this._pc._win.DOMException("Duplicate rid", "TypeError");
|
|
|
|
}
|
|
|
|
uniqueRids[rid] = true;
|
|
|
|
return uniqueRids;
|
|
|
|
}, {});
|
|
|
|
|
|
|
|
// TODO(bug 1401592): transaction ids, timing changes
|
|
|
|
|
|
|
|
await this._pc._queueTaskWithClosedCheck(() => {
|
|
|
|
this.parameters = parameters;
|
|
|
|
this._transceiver.sync();
|
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2015-12-31 19:32:24 +03:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
getParameters() {
|
2017-08-23 23:51:21 +03:00
|
|
|
// TODO(bug 1401592): transaction ids
|
|
|
|
|
|
|
|
// All the other stuff that the spec says to update is handled when
|
|
|
|
// transceivers are synced.
|
|
|
|
return this.parameters;
|
|
|
|
}
|
|
|
|
|
|
|
|
setStreams(streams) {
|
|
|
|
this._streams = streams;
|
|
|
|
}
|
|
|
|
|
|
|
|
getStreams() {
|
|
|
|
return this._streams;
|
|
|
|
}
|
|
|
|
|
|
|
|
setTrack(track) {
|
2018-02-13 22:25:19 +03:00
|
|
|
this._pc._replaceTrackNoRenegotiation(this._transceiverImpl, track);
|
2017-08-23 23:51:21 +03:00
|
|
|
this.track = track;
|
2014-08-15 09:33:09 +04:00
|
|
|
}
|
2017-04-21 03:54:20 +03:00
|
|
|
|
|
|
|
getStats() {
|
|
|
|
return this._pc._async(
|
|
|
|
async () => this._pc._getStats(this.track));
|
|
|
|
}
|
2017-08-23 23:51:21 +03:00
|
|
|
|
|
|
|
checkWasCreatedByPc(pc) {
|
|
|
|
if (pc != this._pc.__DOM_IMPL__) {
|
|
|
|
throw new this._pc._win.DOMException(
|
|
|
|
"This sender was not created by this PeerConnection",
|
|
|
|
"InvalidAccessError");
|
|
|
|
}
|
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
|
|
|
setupPrototype(RTCRtpSender, {
|
|
|
|
classID: PC_SENDER_CID,
|
|
|
|
contractID: PC_SENDER_CONTRACT,
|
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports])
|
|
|
|
});
|
2014-08-14 05:40:41 +04:00
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
class RTCRtpReceiver {
|
2017-08-23 23:51:21 +03:00
|
|
|
constructor(pc, transceiverImpl) {
|
|
|
|
// We do not set the track here; that is done when _transceiverImpl is set
|
|
|
|
Object.assign(this,
|
|
|
|
{
|
|
|
|
_pc: pc,
|
|
|
|
_transceiverImpl: transceiverImpl,
|
2017-11-14 21:32:07 +03:00
|
|
|
track: transceiverImpl.getReceiveTrack(),
|
2017-12-21 02:00:40 +03:00
|
|
|
_remoteSetSendBit: false,
|
|
|
|
_ontrackFired: false,
|
|
|
|
streamIds: [],
|
2017-11-14 21:32:07 +03:00
|
|
|
// Sync and contributing sources must be kept cached so that timestamps
|
|
|
|
// remain stable, as the timestamp offset can vary
|
|
|
|
// note key = entry.source + entry.sourceType
|
|
|
|
_rtpSources: new Map(),
|
|
|
|
_rtpSourcesJsTimestamp: null,
|
2017-08-23 23:51:21 +03:00
|
|
|
});
|
2017-01-06 06:47:25 +03:00
|
|
|
}
|
2017-04-21 03:54:20 +03:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
// TODO(bug 1401983): Create a getStats binding on TransceiverImpl, and use
|
|
|
|
// that here.
|
2017-04-21 03:54:20 +03:00
|
|
|
getStats() {
|
|
|
|
return this._pc._async(
|
|
|
|
async () => this._pc.getStats(this.track));
|
|
|
|
}
|
2017-11-14 21:32:07 +03:00
|
|
|
|
|
|
|
_getRtpSource(source, type) {
|
|
|
|
this._fetchRtpSources();
|
|
|
|
return this._rtpSources.get(type + source).entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fetch all of the RTP Contributing and Sync sources for the receiver
|
|
|
|
* and store them so they are available when asked for.
|
|
|
|
*/
|
|
|
|
_fetchRtpSources() {
|
|
|
|
if (this._rtpSourcesJsTimestamp !== null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
// Queue microtask to mark the cache as stale after this task completes
|
|
|
|
Promise.resolve().then(() => this._rtpSourcesJsTimestamp = null);
|
|
|
|
let {sources, sourceClockOffset, jsTimestamp} =
|
|
|
|
this._pc._getRtpSources(this);
|
|
|
|
this._rtpSourcesJsTimestamp = jsTimestamp;
|
|
|
|
for (let entry of sources) {
|
|
|
|
// Set the clock offset for calculating the 10-second window
|
|
|
|
entry.sourceClockOffset = sourceClockOffset;
|
|
|
|
// Store the new entries or update existing entries
|
|
|
|
let key = entry.source + entry.sourceType;
|
|
|
|
let cached = this._rtpSources.get(key);
|
|
|
|
if (cached === undefined) {
|
|
|
|
this._rtpSources.set(key, entry);
|
|
|
|
} else if (cached.timestamp != entry.timestamp) {
|
|
|
|
// Only update if the timestamp has changed
|
|
|
|
// This also prevents the sourceClockOffset from changing unecessarily
|
|
|
|
// which could cause a value to flutter at the edge of the 10 second
|
|
|
|
// window.
|
|
|
|
this._rtpSources.set(key, entry);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Clear old entries
|
|
|
|
let cutoffTime = this._rtpSourcesJsTimestamp - 10 * 1000;
|
|
|
|
let removeKeys = [];
|
|
|
|
for (let entry of this._rtpSources.values()) {
|
|
|
|
if ((entry.timestamp + entry.sourceClockOffset) < cutoffTime) {
|
|
|
|
removeKeys.push(entry.source + entry.sourceType);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for (let delKey of removeKeys) {
|
|
|
|
this._rtpSources.delete(delKey);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
_getRtpSourcesByType(type) {
|
|
|
|
this._fetchRtpSources();
|
|
|
|
// Only return the values from within the last 10 seconds as per the spec
|
|
|
|
let cutoffTime = this._rtpSourcesJsTimestamp - 10 * 1000;
|
|
|
|
let sources = [...this._rtpSources.values()].filter(
|
|
|
|
(entry) => {
|
|
|
|
return entry.sourceType == type &&
|
|
|
|
(entry.timestamp + entry.sourceClockOffset) >= cutoffTime;
|
2017-12-19 04:24:55 +03:00
|
|
|
}).map(e => {
|
|
|
|
let newEntry = {
|
|
|
|
source: e.source,
|
|
|
|
timestamp: e.timestamp + e.sourceClockOffset,
|
|
|
|
audioLevel: e.audioLevel,
|
|
|
|
};
|
|
|
|
if (e.voiceActivityFlag !== undefined) {
|
|
|
|
Object.assign(newEntry, {voiceActivityFlag: e.voiceActivityFlag});
|
|
|
|
}
|
|
|
|
return newEntry;
|
|
|
|
});
|
2017-11-14 21:32:07 +03:00
|
|
|
return sources;
|
|
|
|
}
|
|
|
|
|
|
|
|
getContributingSources() {
|
|
|
|
return this._getRtpSourcesByType("contributing");
|
|
|
|
}
|
|
|
|
|
|
|
|
getSynchronizationSources() {
|
|
|
|
return this._getRtpSourcesByType("synchronization");
|
|
|
|
}
|
|
|
|
|
2017-12-21 02:00:40 +03:00
|
|
|
setStreamIds(streamIds) {
|
|
|
|
this.streamIds = streamIds;
|
|
|
|
}
|
|
|
|
|
|
|
|
setRemoteSendBit(sendBit) {
|
|
|
|
this._remoteSetSendBit = sendBit;
|
|
|
|
}
|
|
|
|
|
|
|
|
processTrackAdditionsAndRemovals(transceiver,
|
|
|
|
{updateStreamFunctions, muteTracks, trackEvents}) {
|
|
|
|
let streamsWithTrack = this.streamIds
|
|
|
|
.map(id => this._pc._getOrCreateStream(id));
|
|
|
|
|
|
|
|
let streamsWithoutTrack = this._pc.getRemoteStreams()
|
|
|
|
.filter(s => !this.streamIds.includes(s.id));
|
|
|
|
|
|
|
|
updateStreamFunctions.push(...streamsWithTrack.map(stream => () => {
|
|
|
|
if (!stream.getTracks().includes(this.track)) {
|
|
|
|
stream.addTrack(this.track);
|
|
|
|
// Adding tracks from JS does not result in the stream getting
|
|
|
|
// onaddtrack, so we need to do that here.
|
|
|
|
stream.dispatchEvent(
|
|
|
|
new this._pc._win.MediaStreamTrackEvent(
|
|
|
|
"addtrack", { track: this.track }));
|
|
|
|
}
|
|
|
|
}));
|
|
|
|
|
|
|
|
updateStreamFunctions.push(...streamsWithoutTrack.map(stream => () => {
|
|
|
|
// Content JS might remove this track from the stream before this function fires (ugh)
|
|
|
|
if (stream.getTracks().includes(this.track)) {
|
|
|
|
stream.removeTrack(this.track);
|
|
|
|
// Removing tracks from JS does not result in the stream getting
|
|
|
|
// onremovetrack, so we need to do that here.
|
|
|
|
stream.dispatchEvent(
|
|
|
|
new this._pc._win.MediaStreamTrackEvent(
|
|
|
|
"removetrack", { track: this.track }));
|
|
|
|
}
|
|
|
|
}));
|
|
|
|
|
|
|
|
if (!this._remoteSetSendBit) {
|
|
|
|
// remote used "recvonly" or "inactive"
|
|
|
|
this._ontrackFired = false;
|
|
|
|
if (!this.track.muted) {
|
|
|
|
muteTracks.push(this.track);
|
|
|
|
}
|
|
|
|
} else if (!this._ontrackFired) {
|
|
|
|
// remote used "sendrecv" or "sendonly", and we haven't fired ontrack
|
|
|
|
let ev = new this._pc._win.RTCTrackEvent("track", {
|
|
|
|
receiver: this.__DOM_IMPL__,
|
|
|
|
track: this.track,
|
|
|
|
streams: streamsWithTrack,
|
|
|
|
transceiver });
|
|
|
|
trackEvents.push(ev);
|
|
|
|
this._ontrackFired = true;
|
|
|
|
|
|
|
|
// Fire legacy event as well for a little bit.
|
|
|
|
ev = new this._pc._win.MediaStreamTrackEvent("addtrack",
|
|
|
|
{ track: this.track });
|
|
|
|
trackEvents.push(ev);
|
|
|
|
}
|
|
|
|
}
|
2014-08-14 05:40:54 +04:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
setupPrototype(RTCRtpReceiver, {
|
2014-08-14 05:40:41 +04:00
|
|
|
classID: PC_RECEIVER_CID,
|
|
|
|
contractID: PC_RECEIVER_CONTRACT,
|
2017-01-06 06:47:25 +03:00
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports])
|
|
|
|
});
|
2014-08-14 05:40:41 +04:00
|
|
|
|
2017-08-23 23:51:21 +03:00
|
|
|
class RTCRtpTransceiver {
|
|
|
|
constructor(pc, transceiverImpl, init, kind, sendTrack) {
|
|
|
|
let receiver = pc._win.RTCRtpReceiver._create(
|
|
|
|
pc._win, new RTCRtpReceiver(pc, transceiverImpl, kind));
|
|
|
|
let streams = (init && init.streams) || [];
|
|
|
|
let sender = pc._win.RTCRtpSender._create(
|
|
|
|
pc._win, new RTCRtpSender(pc, transceiverImpl, this, sendTrack, streams));
|
|
|
|
|
|
|
|
let direction = (init && init.direction) || "sendrecv";
|
|
|
|
Object.assign(this,
|
|
|
|
{
|
|
|
|
_pc: pc,
|
|
|
|
mid: null,
|
|
|
|
sender,
|
|
|
|
receiver,
|
|
|
|
stopped: false,
|
|
|
|
_direction: direction,
|
|
|
|
currentDirection: null,
|
|
|
|
_remoteTrackId: null,
|
|
|
|
addTrackMagic: false,
|
2017-12-21 19:22:37 +03:00
|
|
|
shouldRemove: false,
|
2017-08-23 23:51:21 +03:00
|
|
|
_hasBeenUsedToSend: false,
|
|
|
|
// the receiver starts out without a track, so record this here
|
|
|
|
_kind: kind,
|
|
|
|
_transceiverImpl: transceiverImpl
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
set direction(direction) {
|
|
|
|
this._pc._checkClosed();
|
|
|
|
|
|
|
|
if (this.stopped) {
|
|
|
|
throw new this._pc._win.DOMException("Transceiver is stopped!",
|
|
|
|
"InvalidStateError");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (this._direction == direction) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
this._direction = direction;
|
|
|
|
this.sync();
|
|
|
|
this._pc.updateNegotiationNeeded();
|
|
|
|
}
|
|
|
|
|
|
|
|
get direction() {
|
|
|
|
return this._direction;
|
|
|
|
}
|
|
|
|
|
|
|
|
setDirectionInternal(direction) {
|
|
|
|
this._direction = direction;
|
|
|
|
}
|
|
|
|
|
|
|
|
stop() {
|
|
|
|
if (this.stopped) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
this._pc._checkClosed();
|
|
|
|
|
|
|
|
this.setStopped();
|
|
|
|
this.sync();
|
|
|
|
this._pc.updateNegotiationNeeded();
|
|
|
|
}
|
|
|
|
|
|
|
|
setStopped() {
|
|
|
|
this.stopped = true;
|
|
|
|
this.currentDirection = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
getKind() {
|
|
|
|
return this._kind;
|
|
|
|
}
|
|
|
|
|
|
|
|
hasBeenUsedToSend() {
|
|
|
|
return this._hasBeenUsedToSend;
|
|
|
|
}
|
|
|
|
|
|
|
|
setRemoteTrackId(webrtcTrackId) {
|
|
|
|
this._remoteTrackId = webrtcTrackId;
|
|
|
|
}
|
|
|
|
|
|
|
|
remoteTrackIdIs(webrtcTrackId) {
|
|
|
|
return this._remoteTrackId == webrtcTrackId;
|
|
|
|
}
|
|
|
|
|
|
|
|
getRemoteTrackId() {
|
|
|
|
return this._remoteTrackId;
|
|
|
|
}
|
|
|
|
|
|
|
|
setAddTrackMagic() {
|
|
|
|
this.addTrackMagic = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
sync() {
|
|
|
|
if (this._syncing) {
|
|
|
|
throw new DOMException("Reentrant sync! This is a bug!", "InternalError");
|
|
|
|
}
|
|
|
|
this._syncing = true;
|
|
|
|
this._transceiverImpl.syncWithJS(this.__DOM_IMPL__);
|
|
|
|
this._syncing = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Used by _transceiverImpl.syncWithJS, don't call sync again!
|
|
|
|
setCurrentDirection(direction) {
|
|
|
|
if (this.stopped) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (direction) {
|
|
|
|
case "sendrecv":
|
|
|
|
case "sendonly":
|
|
|
|
this._hasBeenUsedToSend = true;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
|
|
|
this.currentDirection = direction;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Used by _transceiverImpl.syncWithJS, don't call sync again!
|
|
|
|
setMid(mid) {
|
|
|
|
this.mid = mid;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Used by _transceiverImpl.syncWithJS, don't call sync again!
|
|
|
|
unsetMid() {
|
|
|
|
this.mid = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
insertDTMF(tones, duration, interToneGap) {
|
|
|
|
if (this.stopped) {
|
|
|
|
throw new this._pc._win.DOMException("Transceiver is stopped!",
|
|
|
|
"InvalidStateError");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!this.sender.track) {
|
|
|
|
throw new this._pc._win.DOMException("RTCRtpSender has no track",
|
|
|
|
"InvalidStateError");
|
|
|
|
}
|
|
|
|
|
|
|
|
duration = Math.max(40, Math.min(duration, 6000));
|
|
|
|
if (interToneGap < 30) interToneGap = 30;
|
|
|
|
|
|
|
|
tones = tones.toUpperCase();
|
|
|
|
|
|
|
|
if (tones.match(/[^0-9A-D#*,]/)) {
|
|
|
|
throw new this._pc._win.DOMException("Invalid DTMF characters",
|
|
|
|
"InvalidCharacterError");
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO (bug 1401983): Move this API to TransceiverImpl so we don't need the
|
|
|
|
// extra hops through RTCPeerConnection and PeerConnectionImpl
|
|
|
|
this._pc._insertDTMF(this._transceiverImpl, tones, duration, interToneGap);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
setupPrototype(RTCRtpTransceiver, {
|
|
|
|
classID: PC_TRANSCEIVER_CID,
|
|
|
|
contractID: PC_TRANSCEIVER_CONTRACT,
|
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports])
|
|
|
|
});
|
|
|
|
|
2017-01-06 06:47:25 +03:00
|
|
|
class CreateOfferRequest {
|
|
|
|
constructor(windowID, innerWindowID, callID, isSecure) {
|
|
|
|
Object.assign(this, { windowID, innerWindowID, callID, isSecure });
|
|
|
|
}
|
2015-08-11 20:48:55 +03:00
|
|
|
}
|
2017-01-06 06:47:25 +03:00
|
|
|
setupPrototype(CreateOfferRequest, {
|
2015-08-11 20:48:55 +03:00
|
|
|
classID: PC_COREQUEST_CID,
|
|
|
|
contractID: PC_COREQUEST_CONTRACT,
|
2017-01-06 06:47:25 +03:00
|
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsISupports])
|
|
|
|
});
|
2015-08-11 20:48:55 +03:00
|
|
|
|
2012-10-31 20:13:28 +04:00
|
|
|
this.NSGetFactory = XPCOMUtils.generateNSGetFactory(
|
2013-11-25 23:01:03 +04:00
|
|
|
[GlobalPCList,
|
2016-09-29 20:26:04 +03:00
|
|
|
RTCDTMFSender,
|
2013-11-25 23:01:03 +04:00
|
|
|
RTCIceCandidate,
|
|
|
|
RTCSessionDescription,
|
|
|
|
RTCPeerConnection,
|
2014-05-23 01:14:56 +04:00
|
|
|
RTCPeerConnectionStatic,
|
2014-08-14 05:40:41 +04:00
|
|
|
RTCRtpReceiver,
|
|
|
|
RTCRtpSender,
|
2017-08-23 23:51:21 +03:00
|
|
|
RTCRtpTransceiver,
|
2013-11-25 23:01:03 +04:00
|
|
|
RTCStatsReport,
|
2015-08-11 20:48:55 +03:00
|
|
|
PeerConnectionObserver,
|
|
|
|
CreateOfferRequest]
|
2012-10-07 09:34:30 +04:00
|
|
|
);
|