1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204
|
<!doctype html>
<title>RTCConfiguration rtcpMuxPolicy</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="RTCConfiguration-helper.js"></script>
<script src="RTCPeerConnection-helper.js"></script>
<script>
'use strict';
// Test is based on the following editor draft:
// https://w3c.github.io/webrtc-pc/archives/20170605/webrtc.html
// The following helper function is called from RTCConfiguration-helper.js:
// config_test
/*
[Constructor(optional RTCConfiguration configuration)]
interface RTCPeerConnection : EventTarget {
RTCConfiguration getConfiguration();
void setConfiguration(RTCConfiguration configuration);
...
};
dictionary RTCConfiguration {
RTCRtcpMuxPolicy rtcpMuxPolicy = "require";
...
};
enum RTCRtcpMuxPolicy {
"negotiate",
"require"
};
*/
test(() => {
const pc = new RTCPeerConnection();
assert_equals(pc.getConfiguration().rtcpMuxPolicy, 'require');
}, `new RTCPeerConnection() should have default rtcpMuxPolicy require`);
test(() => {
const pc = new RTCPeerConnection({ rtcpMuxPolicy: undefined });
assert_equals(pc.getConfiguration().rtcpMuxPolicy, 'require');
}, `new RTCPeerConnection({ rtcpMuxPolicy: undefined }) should have default rtcpMuxPolicy require`);
test(() => {
const pc = new RTCPeerConnection({ rtcpMuxPolicy: 'require' });
assert_equals(pc.getConfiguration().rtcpMuxPolicy, 'require');
}, `new RTCPeerConnection({ rtcpMuxPolicy: 'require' }) should succeed`);
/*
4.3.1.1. Constructor
3. If configuration.rtcpMuxPolicy is negotiate, and the user agent does not
implement non-muxed RTCP, throw a NotSupportedError.
*/
test(() => {
let pc;
try {
pc = new RTCPeerConnection({ rtcpMuxPolicy: 'negotiate' });
} catch(err) {
// NotSupportedError is a DOMException with code 9
if(err.code === 9 && err.name === 'NotSupportedError') {
// ignore error and pass test if negotiate is not supported
return;
} else {
throw err;
}
}
assert_equals(pc.getConfiguration().rtcpMuxPolicy, 'negotiate');
}, `new RTCPeerConnection({ rtcpMuxPolicy: 'negotiate' }) may succeed or throw NotSupportedError`);
config_test(makePc => {
assert_throws_js(TypeError, () =>
makePc({ rtcpMuxPolicy: null }));
}, `with { rtcpMuxPolicy: null } should throw TypeError`);
config_test(makePc => {
assert_throws_js(TypeError, () =>
makePc({ rtcpMuxPolicy: 'invalid' }));
}, `with { rtcpMuxPolicy: 'invalid' } should throw TypeError`);
/*
4.3.2. Set a configuration
6. If configuration.rtcpMuxPolicy is set and its value differs from the
connection's rtcpMux policy, throw an InvalidModificationError.
*/
test(() => {
const pc = new RTCPeerConnection({ rtcpMuxPolicy: 'require' });
assert_idl_attribute(pc, 'setConfiguration');
assert_throws_dom('InvalidModificationError', () =>
pc.setConfiguration({ rtcpMuxPolicy: 'negotiate' }));
}, `setConfiguration({ rtcpMuxPolicy: 'negotiate' }) with initial rtcpMuxPolicy require should throw InvalidModificationError`);
test(() => {
let pc;
try {
pc = new RTCPeerConnection({ rtcpMuxPolicy: 'negotiate' });
} catch(err) {
// NotSupportedError is a DOMException with code 9
if(err.code === 9 && err.name === 'NotSupportedError') {
// ignore error and pass test if negotiate is not supported
return;
} else {
throw err;
}
}
assert_idl_attribute(pc, 'setConfiguration');
assert_throws_dom('InvalidModificationError', () =>
pc.setConfiguration({ rtcpMuxPolicy: 'require' }));
}, `setConfiguration({ rtcpMuxPolicy: 'require' }) with initial rtcpMuxPolicy negotiate should throw InvalidModificationError`);
test(() => {
let pc;
pc = new RTCPeerConnection({ rtcpMuxPolicy: 'require' });
// default rtcpMuxPolicy is 'require', so this is allowed
pc.setConfiguration({});
assert_equals(pc.getConfiguration().rtcpMuxPolicy, 'require');
}, `setConfiguration({}) with initial rtcpMuxPolicy require should leave rtcpMuxPolicy to require`);
test(() => {
let pc;
try {
pc = new RTCPeerConnection({ rtcpMuxPolicy: 'negotiate' });
} catch(err) {
// NotSupportedError is a DOMException with code 9
if(err.code === 9 && err.name === 'NotSupportedError') {
// ignore error and pass test if negotiate is not supported
return;
} else {
throw err;
}
}
assert_idl_attribute(pc, 'setConfiguration');
// default value for rtcpMuxPolicy is require
assert_throws_dom('InvalidModificationError', () =>
pc.setConfiguration({}));
}, `setConfiguration({}) with initial rtcpMuxPolicy negotiate should throw InvalidModificationError`);
/*
Coverage Report
Tested 2
Total 2
*/
const FINGERPRINT_SHA256 = '00:00:00:00:00:00:00:00:00:00:00:00:00' +
':00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00';
const ICEUFRAG = 'someufrag';
const ICEPWD = 'somelongpwdwithenoughrandomness';
promise_test(async t => {
// audio-only SDP offer without BUNDLE and rtcp-mux.
const sdp = 'v=0\r\n' +
'o=- 166855176514521964 2 IN IP4 127.0.0.1\r\n' +
's=-\r\n' +
't=0 0\r\n' +
'm=audio 9 UDP/TLS/RTP/SAVPF 111\r\n' +
'c=IN IP4 0.0.0.0\r\n' +
'a=rtcp:9 IN IP4 0.0.0.0\r\n' +
'a=ice-ufrag:' + ICEUFRAG + '\r\n' +
'a=ice-pwd:' + ICEPWD + '\r\n' +
'a=fingerprint:sha-256 ' + FINGERPRINT_SHA256 + '\r\n' +
'a=setup:actpass\r\n' +
'a=mid:audio1\r\n' +
'a=sendonly\r\n' +
'a=rtcp-rsize\r\n' +
'a=rtpmap:111 opus/48000/2\r\n';
const pc = new RTCPeerConnection({rtcpMuxPolicy: 'require'});
t.add_cleanup(() => pc.close());
return promise_rejects_dom(t, 'InvalidAccessError', pc.setRemoteDescription({type: 'offer', sdp}));
}, 'setRemoteDescription throws InvalidAccessError when called with an offer without rtcp-mux and rtcpMuxPolicy is set to require');
promise_test(async t => {
// audio-only SDP answer without BUNDLE and rtcp-mux.
// Also omitting a=mid in order to avoid parsing it from the offer as this needs to match.
const sdp = 'v=0\r\n' +
'o=- 166855176514521964 2 IN IP4 127.0.0.1\r\n' +
's=-\r\n' +
't=0 0\r\n' +
'm=audio 9 UDP/TLS/RTP/SAVPF 111\r\n' +
'c=IN IP4 0.0.0.0\r\n' +
'a=rtcp:9 IN IP4 0.0.0.0\r\n' +
'a=ice-ufrag:' + ICEUFRAG + '\r\n' +
'a=ice-pwd:' + ICEPWD + '\r\n' +
'a=fingerprint:sha-256 ' + FINGERPRINT_SHA256 + '\r\n' +
'a=setup:active\r\n' +
'a=sendonly\r\n' +
'a=rtcp-rsize\r\n' +
'a=rtpmap:111 opus/48000/2\r\n';
const pc = new RTCPeerConnection({rtcpMuxPolicy: 'require'});
t.add_cleanup(() => pc.close());
const offer = await generateAudioReceiveOnlyOffer(pc);
await pc.setLocalDescription(offer);
return promise_rejects_dom(t, 'InvalidAccessError', pc.setRemoteDescription({type: 'answer', sdp}));
}, 'setRemoteDescription throws InvalidAccessError when called with an answer without rtcp-mux and rtcpMuxPolicy is set to require');
</script>
|