summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* version 0.1.21.1Olivier Crête2023-01-071-1/+1
|
* version 0.1.210.1.21latest-releaseOlivier Crête2023-01-072-3/+7
|
* interfaces: Only use `ifr_ifindex` if OS supports itOle André Vadla Ravnås2023-01-062-0/+10
| | | | This fixes compilation on e.g. macOS and FreeBSD, where it is missing.
* version 0.1.20.1Olivier Crête2023-01-061-1/+1
|
* version 0.1.200.1.20Olivier Crête2023-01-062-2/+16
|
* version: When set nano 0 to be a stringOlivier Crête2023-01-061-1/+1
| | | | Setting it as a int makes meson abort.
* gst: Use gst-full compatible registration functionsOlivier Crête2023-01-065-4/+20
|
* gst: Remove GStreamer 0.10 supportPhilippe Normand2023-01-064-78/+1
| | | | The meson build already required 1.x so this has been dead code for a while now.
* test-consent: Don't try to set the consent prop after creationOlivier Crête2023-01-061-4/+2
| | | | It was already set at creation time, so all we got was a warning.
* address: Add introspection-friendly to_string_dupJames Westman2023-01-064-1/+26
| | | | | | nice_address_to_string expects an already-allocated string, which is not great for introspection. Adds nice_address_to_string_dup, which does the same thing, but returns a newly allocated string.
* test-turn: Make it work against coturnOlivier Crête2023-01-041-6/+5
|
* agent: Allow getting UDP candidates from a TURN server over TCPOlivier Crête2023-01-041-7/+2
| | | | Even if the TCP candidates are disabled.
* agent: Resolve TURN server IP addressesOlivier Crête2023-01-045-28/+277
| | | | | This should enable having servers that do both IPv4 and IPv6. And ideally should make life easier for app developers.
* agent: Resolve STUN server IP addressOlivier Crête2023-01-043-21/+168
| | | | | This should enable having servers that do both IPv4 and IPv6. And ideally should make life easier for app developers.
* candidate: fix assertions caused by API guards in new address APIMathieu Duponchelle2022-11-191-2/+2
| | | | | The checks were reversed, requiring for instance a non-relay candidate for calling nice_candidate_relay_address()
* gitlab-ci: Fix typoOlivier Crête2022-11-061-1/+1
|
* ci: Expose full code coverage report to GitLabOlivier Crête2022-10-173-3/+6
|
* ci: Add code coverage to MRsOlivier Crête2022-10-171-1/+3
|
* Add configuration file for lcovPatrick Griffis2022-10-171-0/+14
| | | | | | | | This is useful for accurately testing code coverage. You can use this with: meson configure -Db_coverage=true meson test ninja coverage
* ci: Export JUnit reportOlivier Crête2022-10-171-0/+8
|
* ci: Use fdo templatesOlivier Crête2022-10-173-16/+50
|
* conncheck: Limit ichecks based on propertyOlivier Crête2022-10-172-10/+18
| | | | | | Limit the number of stored incoming checks based on the property limiting the number of total connectivity checks instead of using the fixed limit on the number of remote candidates.
* udp-bsd: Explicitly bind to the interface when creating a socketOlivier Crête2022-07-291-0/+28
|
* interfaces: Add API to find the interface index from a local addressOlivier Crête2022-07-254-0/+168
| | | | | | | This will find some interface that has the address and will not work correctly if multiple interfaces have the same address. But in any case, nothing in libnice expects that and we would need to break the API to make that work.
* candidate: Copy stun_server with candidateOlivier Crête2022-06-011-0/+2
| | | | | | Bug reported and fix suggested by Masato Takahashi Fixes #164
* version: Add NICE_CHECK_VERSION to the documentationOlivier Crête2022-05-263-1/+14
|
* address: Add Boxed TypeOlivier Crête2022-05-264-0/+11
| | | | This should make the library more easily usable for bindings
* agent: Support adding optional headers to HTTP proxy clientJohan Sternerup2022-05-264-17/+76
| | | | | | One use case for this is adding an ALPN header which is a MUST requirement when a HTTP proxy is used in WebRTC (see RFC8835, section 3.4).
* Conncheck: renomination: set use_candidate for pending check on early ↵Andrey Skryabin2022-05-261-15/+62
| | | | inbound STUN with NOMINATION attr
* Conncheck: always updating remote_consent.last_received for selected pair on ↵Andrey Skryabin2022-05-261-4/+5
| | | | keepalive
* NICE_CHECK_VERSION: fix unexpected "git = next version" assumptionTim-Philipp Müller2022-05-261-3/+1
| | | | | | | | 0.1.18.1 should not satisfy a check for 0.1.19, especially not for libraries that release once a year at best. If someone needs more control they should do a feature check for the symbol in the headers or lib.
* Fix NICE_CHECK_VERSION in public installTim-Philipp Müller2022-05-263-1/+12
| | | | | | | Install a nice-version.h so that the version defines are available. https://gitlab.freedesktop.org/libnice/libnice/-/merge_requests/232
* Conncheck: recheck consent timeout overflow fixAndrey Skryabin2022-05-201-1/+1
|
* candidate: Add utility function to get STUN server addressPhilippe Normand2022-05-099-13/+64
| | | | Can be useful to know which STUN server was used to discover the given candidate.
* docs: Add index for symbols added in 0.1.20Philippe Normand2022-05-051-0/+4
|
* Add NICE_CHECK_VERSION macroPhilippe Normand2022-05-052-0/+12
|
* agent: Initialize variableOlivier Crête2022-05-031-0/+1
| | | | | There is a codepath where it can be used without being filled. Found by coverity.
* version 0.1.19.1Olivier Crête2022-05-031-1/+1
|
* version 0.1.190.1.19Olivier Crête2022-05-032-2/+15
|
* candidate: Add utility function to get TURN relay addressPhilippe Normand2022-05-034-0/+26
| | | | Can be useful to know which TURN server is being used as relay server for a given candidate.
* agent: Hold ref while doing async closeOlivier Crête2022-04-201-0/+5
| | | | | | | | | | It's possible that the callback will be called synchronously during the close function, in this case, we need to be ready to the last reference to the agent to be dropped in this callback. This fix was suggested by Fabrice Bellet Fixes #153
* Don't try to use link-local addresses outside local networkJohan Sternerup2022-04-066-3/+91
| | | | | | | | | | If we have gathered a host IP-address that is link-local we should never try to use it for anything else than trying to match it with another link-local address. Some routers seem to have problems with traffic from link-local addresses destined at external IP-addresses. By definition link-local addresses should stay local so there's no reason to access STUN/TURN from it or try to form a candidate with another address that is not link-local.
* agent: Fix warning about required glib versionNirbheek Chauhan2022-03-212-2/+2
| | | | | | | | | | | | | | | ../agent/discovery.c: In function ‘on_refresh_remove_timeout’: ../agent/discovery.c:203:13: warning: Not available before 2.60 203 | G_GNUC_FALLTHROUGH; | ^~~~~~~~~~~~~ ../agent/conncheck.c: In function ‘priv_turn_allocate_refresh_retransmissions_tick_agent_locked’: ../agent/conncheck.c:1656:13: warning: Not available before 2.60 1656 | G_GNUC_FALLTHROUGH; | ^~~~~~~~~~~~~ The comment /* fall through */ is enough to cause GCC and Clang to not emit the implicit-fallthrough warning.
* agent: Convert g_print() to nice_debug()Nirbheek Chauhan2022-03-211-1/+2
| | | | This was probably added by mistake.
* meson: Fix openssl settingOlivier Crête2022-01-261-1/+1
| | | | This should fix builds on platforms openssl
* gitlab-ci: Allow manual runsOlivier Crête2021-11-261-2/+3
|
* tcp-active: Fix use-after-free in error caseOlivier Crête2021-11-261-10/+30
| | | | Fixes issue found by Coverity
* agent: Clear the original message pointer instead of a copyOlivier Crête2021-11-262-3/+3
| | | | | In one case, the message pointer gets replaced by the rfc4571_message one, so it wasn't getting cleared as expected.
* gstnicesink: disable drop out of segment on nicesinkGuillaume Desmottes2021-11-261-0/+4
| | | | | | | It's very tricky and unintuitive to have webrtcbin not sending data because of the segment. Fix https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/907
* test-io-stream-common: Avoid CPU starvation by yieldingOle André Vadla Ravnås2021-11-221-0/+2
| | | | | | | Busy-looping is not a good idea, especially not when run under Valgrind, where such a thread may result in well-behaved threads running thousands of times slower. While passing --fair-sched=yes to Valgrind avoids the issue, it's still better to make our busy-looping less aggressive.