#include "rtc/rtc.hpp"
#include "test.hpp"
#include <atomic>
#include <chrono>
#include <iostream>
#include <memory>
#include <thread>
#define CUSTOM_MAX_MESSAGE_SIZE 1048576
using namespace rtc;
using namespace std;
template <class T> weak_ptr<T> make_weak_ptr(shared_ptr<T> ptr) { return ptr; }
TestResult test_connectivity(bool);
TestResult test_connectivity() { return test_connectivity(false); }
TestResult test_connectivity_fail_on_wrong_fingerprint() { return test_connectivity(true); }
TestResult test_connectivity(bool signal_wrong_fingerprint) {
InitLogger(LogLevel::Debug);
Configuration config1;
config1.iceServers.emplace_back("stun:stun.l.google.com:19302");
config1.mtu = 1500;
config1.maxMessageSize = CUSTOM_MAX_MESSAGE_SIZE;
PeerConnection pc1(config1);
Configuration config2;
config2.iceServers.emplace_back("stun:stun.l.google.com:19302");
config2.mtu = 1500;
config2.maxMessageSize = CUSTOM_MAX_MESSAGE_SIZE;
config2.portRangeBegin = 5000;
config2.portRangeEnd = 6000;
PeerConnection pc2(config2);
pc1.onLocalDescription([&pc2, signal_wrong_fingerprint](Description sdp) {
cout << "Description 1: " << sdp << endl;
if (signal_wrong_fingerprint) {
auto f = sdp.fingerprint();
if (f.has_value()) {
auto& c = f.value().value[0];
if (c == 'F' || c == 'f') c = '0'; else c++;
sdp.setFingerprint(f.value());
}
}
pc2.setRemoteDescription(string(sdp));
});
pc1.onLocalCandidate([&pc2](Candidate candidate) {
cout << "Candidate 1: " << candidate << endl;
pc2.addRemoteCandidate(string(candidate));
});
pc1.onStateChange([](PeerConnection::State state) { cout << "State 1: " << state << endl; });
pc1.onIceStateChange([](PeerConnection::IceState state) {
cout << "ICE state 1: " << state << endl;
});
pc1.onGatheringStateChange([](PeerConnection::GatheringState state) {
cout << "Gathering state 1: " << state << endl;
});
pc1.onSignalingStateChange([](PeerConnection::SignalingState state) {
cout << "Signaling state 1: " << state << endl;
});
pc2.onLocalDescription([&pc1](Description sdp) {
cout << "Description 2: " << sdp << endl;
pc1.setRemoteDescription(string(sdp));
});
pc2.onLocalCandidate([&pc1](Candidate candidate) {
cout << "Candidate 2: " << candidate << endl;
pc1.addRemoteCandidate(string(candidate));
});
pc2.onStateChange([](PeerConnection::State state) { cout << "State 2: " << state << endl; });
pc2.onIceStateChange([](PeerConnection::IceState state) {
cout << "ICE state 2: " << state << endl;
});
pc2.onGatheringStateChange([](PeerConnection::GatheringState state) {
cout << "Gathering state 2: " << state << endl;
});
pc2.onSignalingStateChange([](PeerConnection::SignalingState state) {
cout << "Signaling state 2: " << state << endl;
});
shared_ptr<DataChannel> dc2;
pc2.onDataChannel([&dc2](shared_ptr<DataChannel> dc) {
cout << "DataChannel 2: Received with label \"" << dc->label() << "\"" << endl;
dc->onOpen([wdc = make_weak_ptr(dc)]() {
if (auto dc = wdc.lock()) {
cout << "DataChannel 2: Open" << endl;
dc->send("Hello from 2");
}
});
dc->onClosed([]() { cout << "DataChannel 2: Closed" << endl; });
dc->onMessage([](variant<binary, string> message) {
if (holds_alternative<string>(message)) {
cout << "Message 2: " << get<string>(message) << endl;
}
});
std::atomic_store(&dc2, dc);
});
auto dc1 = pc1.createDataChannel("test");
if (dc1->id().has_value())
return TestResult(false, "DataChannel stream id assigned before connection");
dc1->onOpen([wdc1 = make_weak_ptr(dc1)]() {
if (auto dc1 = wdc1.lock()) {
cout << "DataChannel 1: Open" << endl;
dc1->send("Hello from 1");
}
});
dc1->onClosed([]() { cout << "DataChannel 1: Closed" << endl; });
dc1->onMessage([](const variant<binary, string> &message) {
if (holds_alternative<string>(message)) {
cout << "Message 1: " << get<string>(message) << endl;
}
});
int attempts = 10;
shared_ptr<DataChannel> adc2;
while ((!(adc2 = std::atomic_load(&dc2)) || !adc2->isOpen() || !dc1->isOpen()) && attempts--)
this_thread::sleep_for(1s);
if (pc1.state() != PeerConnection::State::Connected ||
pc2.state() != PeerConnection::State::Connected) {
if (signal_wrong_fingerprint) {
return TestResult(true);
} else {
return TestResult(false, "PeerConnection is not connected");
}
}
if ((pc1.iceState() != PeerConnection::IceState::Connected &&
pc1.iceState() != PeerConnection::IceState::Completed) ||
(pc2.iceState() != PeerConnection::IceState::Connected &&
pc2.iceState() != PeerConnection::IceState::Completed))
return TestResult(false, "ICE is not connected");
if (!adc2 || !adc2->isOpen() || !dc1->isOpen())
return TestResult(false, "DataChannel is not open");
if (adc2->label() != "test")
return TestResult(false, "Wrong DataChannel label");
if (dc1->maxMessageSize() != CUSTOM_MAX_MESSAGE_SIZE ||
dc2->maxMessageSize() != CUSTOM_MAX_MESSAGE_SIZE)
return TestResult(false, "DataChannel max message size is incorrect");
if (!dc1->id().has_value())
return TestResult(false, "DataChannel stream id is not assigned");
if (dc1->id().value() != adc2->id().value())
return TestResult(false, "DataChannel stream ids do not match");
if (auto addr = pc1.localAddress())
cout << "Local address 1: " << *addr << endl;
if (auto addr = pc1.remoteAddress())
cout << "Remote address 1: " << *addr << endl;
if (auto addr = pc2.localAddress())
cout << "Local address 2: " << *addr << endl;
if (auto addr = pc2.remoteAddress())
cout << "Remote address 2: " << *addr << endl;
Candidate local, remote;
if (pc1.getSelectedCandidatePair(&local, &remote)) {
cout << "Local candidate 1: " << local << endl;
cout << "Remote candidate 1: " << remote << endl;
}
if (pc2.getSelectedCandidatePair(&local, &remote)) {
cout << "Local candidate 2: " << local << endl;
cout << "Remote candidate 2: " << remote << endl;
}
shared_ptr<DataChannel> second2;
pc2.onDataChannel([&second2](shared_ptr<DataChannel> dc) {
cout << "Second DataChannel 2: Received with label \"" << dc->label() << "\"" << endl;
dc->onOpen([wdc = make_weak_ptr(dc)]() {
if (auto dc = wdc.lock())
dc->send("Second hello from 2");
});
dc->onMessage([](variant<binary, string> message) {
if (holds_alternative<string>(message)) {
cout << "Second Message 2: " << get<string>(message) << endl;
}
});
std::atomic_store(&second2, dc);
});
auto second1 = pc1.createDataChannel("second");
if (!second1->id().has_value())
throw std::runtime_error("Second DataChannel stream id is not assigned");
second1->onOpen([wsecond1 = make_weak_ptr(second1)]() {
if (auto second1 = wsecond1.lock()) {
cout << "Second DataChannel 1: Open" << endl;
second1->send("Second hello from 1");
}
});
second1->onClosed([]() { cout << "Second DataChannel 1: Closed" << endl; });
second1->onMessage([](const variant<binary, string> &message) {
if (holds_alternative<string>(message)) {
cout << "Second Message 1: " << get<string>(message) << endl;
}
});
attempts = 10;
shared_ptr<DataChannel> asecond2;
while (
(!(asecond2 = std::atomic_load(&second2)) || !asecond2->isOpen() || !second1->isOpen()) &&
attempts--)
this_thread::sleep_for(1s);
if (!asecond2 || !asecond2->isOpen() || !second1->isOpen())
return TestResult(false, "Second DataChannel is not open");
if (asecond2->label() != "second")
return TestResult(false, "Wrong second DataChannel label");
if (!second2->id().has_value() || !asecond2->id().has_value())
return TestResult(false, "Second DataChannel stream id is not assigned");
if (second2->id().value() != asecond2->id().value())
return TestResult(false, "Second DataChannel stream ids do not match");
pc1.close();
this_thread::sleep_for(1s);
pc2.close();
this_thread::sleep_for(1s);
return TestResult(true);
}
const char* key_pem =
"-----BEGIN PRIVATE KEY-----\n"
"MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg3bbuT2SjSlMZH/J1\n"
"vHwmF0Blb/DBc/v7f1Za9GPUXHmhRANCAATDpmYxZozjVw6xlERNjJJGgfY3bEmj\n"
"xAKFRq3nbxbDHvMEs34u9HntMZWJ0hp3GUC+Ax7JHTv3cYqSaAg2SpR4\n"
"-----END PRIVATE KEY-----\n";
const char* cert_pem =
"-----BEGIN CERTIFICATE-----\n"
"MIIBgjCCASigAwIBAgIJAPMXEoZXOaDEMAoGCCqGSM49BAMCMEoxDzANBgNVBAMM\n"
"BmNhLmNvbTELMAkGA1UEBhMCVVMxCzAJBgNVBAcMAkNBMRAwDgYDVQQKDAdleGFt\n"
"cGxlMQswCQYDVQQIDAJDQTAeFw0yNDA1MDUxNjAzMjFaFw0yNDA4MTMxNjAzMjFa\n"
"MDExCzAJBgNVBAYTAkNOMRAwDgYDVQQKDAdiYW96LmNuMRAwDgYDVQQDDAdiYW96\n"
"Lm1lMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEw6ZmMWaM41cOsZRETYySRoH2\n"
"N2xJo8QChUat528Wwx7zBLN+LvR57TGVidIadxlAvgMeyR0793GKkmgINkqUeKMQ\n"
"MA4wDAYDVR0TAQH/BAIwADAKBggqhkjOPQQDAgNIADBFAiAPNldqGJHryfjPFyX3\n"
"zfHHWlO7xSDTzdyoxzroFdwy+gIhAKmZizEVvDlBiIe+3ptCArU3dbp+bzLynTcr\n"
"Ma9ayzQy\n"
"-----END CERTIFICATE-----\n";
TestResult test_pem() {
InitLogger(LogLevel::Debug);
Configuration config1;
config1.certificatePemFile = cert_pem;
config1.keyPemFile = key_pem;
PeerConnection pc1(config1);
atomic_bool done;
string f;
pc1.onLocalDescription([&done, &f](Description sdp) {
f = sdp.fingerprint().value().value;
done = true;
});
auto dc1 = pc1.createDataChannel("test");
int attempts = 10;
while (!done && attempts--)
this_thread::sleep_for(1s);
cout << "Fingerprint: " << f << endl;
if (f != "07:E5:6F:2A:1A:0C:2C:32:0E:C1:C3:9C:34:5A:78:4E:A5:8B:32:05:D1:57:D6:F4:E7:02:41:12:"
"E6:01:C6:8F")
return TestResult(false, "The fingerprint of the specified certificate do not match");
return TestResult(true);
}