WebRTC group chat hello world
In the following iframe
is a chat room.
It’s hosted here,
and here’s the code on GitHub.
This post is my notes on how I built it.
The chat messages themselves are sent via WebRTC data channels.
Each client has an RTCPeerConnection
to each other client,
and each peer connection has a RTCDataChannel
.
To establish peer connections,
we need a signalling mechanism.
In principle, we can use anything as the signalling mechanism;
in this old post,
I show how to connect two peers by copy-pasting the signalling messages between them.
In this app, I will use Ably’s publish/subscribe system
to send the signaling messages.
When a page loads, generates a fresh random ID like abc
for itself.
It then subscribes to an Ably channel called global
,
and broadcasts a “hello” message with its ID on the global
channel.
From this point, we could just use the global
channel as the medium for chat messages,
and ignore WebRTC.
But instead we only use Ably to establish peer-to-peer connections.
Note, importantly, that we’re identifying clients,
not users.
A user could have many simultaneous clients.
If we want to introduce a “user” concept,
we would do this on top of the “client” concept.
Anyone can directly send a message to a client ID.
To achieve this, each client subscribes to its own Ably channel like client-abc
.
Anyone who wants to talk to client abc
can publish a message on client-abc
.
Each message can contain the recipient ID.
(Yes, this is a security hole: a client can forge the sender of a message.)
In this way, clients can talk to each other privately,
without using the global
channel.
When a client receives a “hello” message,
it responds to the sender with its own ID.
This establishes their knowledge of each other,
and establishes the “signalling channel” between them,
which consists of their two per-client Ably channels.
Once this signalling channel is established,
the clients can attempt to set up a peer connection.
Setting up a peer connection is asymmetric:
there is always a caller and a callee.
I choose the convention that a client responding to a “hello” message becomes the caller.
The caller is expected to create an offer and send it to the callee.
The callee is then expected to create an answer and send it back to the caller.
(Actually, the clients may need several rounds of negotiation.
I don’t fully understand how this works.)
This process establishes an agreed session description,
which describes the MediaStream
s and DataChannels
that will be used.
Simultaneously,
the clients exchange “ICE candidates”.
An ICE candidate is a potential way to connect to the client
(for example, via 127.0.0.1
, or via a proxy).
Confusingly,
this connectivity information is also included in the session description.
Also confusingly,
the WebRTC API suggests that ICE candidates are exchanged in parallel to session descriptions,
but this is not entirely the case:
you have to set the remote session description before you can add ICE candidates,
so you may need to buffer the ICE candidates.
When a client goes away,
its peers eventually notice:
the RTCPeerConnection
state changes to disconnected
after a few seconds.
I don’t yet know how disconnections are detected,
or whether they can be detected more cleanly and speedily.
(You might wonder: why am I using Ably,
when I used to work at Pusher on a competitor product?
The main reason is that
Ably lets me configure permissions so that
clients can publish and subscribe without an authentication step.
This is great for making “serverless” applications like this one.)
Similar posts
WebRTC - low barrier to entry, low barrier to exit?
WebRTC has many challenges - browser API inconsistencies, protocol ambiguities, infrastructure requirements, and lack of built-in “business logic”. Not as easy as it seemed at first. 2017-02-04
How does reliability work in RTCDataChannel
?
The RTCDataChannel
API lets us configure the delivery guarantees, including the ordered
, maxPacketLifeTime
, and maxRetransmits
properties. 2017-01-17
How can I capture all crashes in a web page?
Including uncaught errors, unhandled promise rejections, image load failures, Content Security Policy violations, and console.error
calls. 2024-03-14
How do errors in a web page reach the dev console?
Errors in JavaScript cause an ErrorEvent
on window
. Preventing the default action blocks console output. Resource errors follow the capture-bubble event model. 2024-03-13
A formula for responsive font-size
Try setting the root font-size to calc(1rem + 0.25vw)
instead of using media queries with fixed breakpoints. 2024-03-12
Setting font-size based on viewing distance
Estimating viewing distance from screen size to set optimal font-size, but other factors like user mobility, long-sightedness, and short-sightedness complicate the ideal font-size calculation. 2024-03-11
More by Jim
What does the dot do in JavaScript?
foo.bar
, foo.bar()
, or foo.bar = baz
- what do they mean? A deep dive into prototypical inheritance and getters/setters. 2020-11-01
Smear phishing: a new Android vulnerability
Trick Android to display an SMS as coming from any contact. Convincing phishing vuln, but still unpatched. 2020-08-06
A probabilistic pub quiz for nerds
A “true or false” quiz where you respond with your confidence level, and the optimal strategy is to report your true belief. 2020-04-26
Time is running out to catch COVID-19
Simulation shows it’s rational to deliberately infect yourself with COVID-19 early on to get treatment, but after healthcare capacity is exceeded, it’s better to avoid infection. Includes interactive parameters and visualizations. 2020-03-14
The inception bar: a new phishing method
A new phishing technique that displays a fake URL bar in Chrome for mobile. A key innovation is the “scroll jail” that traps the user in a fake browser. 2019-04-27
The hacker hype cycle
I got started with simple web development, but because enamored with increasingly esoteric programming concepts, leading to a “trough of hipster technologies” before returning to more productive work. 2019-03-23
Project C-43: the lost origins of asymmetric crypto
Bob invents asymmetric cryptography by playing loud white noise to obscure Alice’s message, which he can cancel out but an eavesdropper cannot. This idea, published in 1944 by Walter Koenig Jr., is the forgotten origin of asymmetric crypto. 2019-02-16
How Hacker News stays interesting
Hacker News buried my post on conspiracy theories in my family due to overheated discussion, not censorship. Moderation keeps the site focused on interesting technical content. 2019-01-26
My parents are Flat-Earthers
For decades, my parents have been working up to Flat-Earther beliefs. From Egyptology to Jehovah’s Witnesses to theories that human built the Moon billions of years in the future. Surprisingly, it doesn’t affect their successful lives very much. For me, it’s a fun family pastime. 2019-01-20
The dots do matter: how to scam a Gmail user
Gmail’s “dots don’t matter” feature lets scammers create an account on, say, Netflix, with your email address but different dots. Results in convincing phishing emails. 2018-04-07
The sorry state of OpenSSL usability
OpenSSL’s inadequate documentation, confusing key formats, and deprecated interfaces make it difficult to use, despite its importance. 2017-12-02
I hate telephones
I hate telephones. Some rational reasons: lack of authentication, no spam filtering, forced synchronous communication. But also just a visceral fear. 2017-11-08
The Three Ts of Time, Thought and Typing: measuring cost on the web
Businesses often tout “free” services, but the real costs come in terms of time, thought, and typing required from users. Reducing these “Three Ts” is key to improving sign-up flows and increasing conversions. 2017-10-26
Granddad died today
Granddad died. The unspoken practice of death-by-dehydration in the NHS. The Liverpool Care Pathway. Assisted dying in the UK. The importance of planning in end-of-life care. 2017-05-19
How do I call a program in C, setting up standard pipes?
A C function to create a new process, set up its standard input/output/error pipes, and return a struct containing the process ID and pipe file descriptors. 2017-02-17
Your syntax highlighter is wrong
Syntax highlighters make value judgments about code. Most highlighters judge that comments are cruft, and try to hide them. Most diff viewers judge that code deletions are bad. 2014-05-11
Want to build a fantastic product using LLMs? I work at
Granola where we're building the future IDE for knowledge work. Come and work with us!
Read more or
get in touch! This page copyright James Fisher 2020. Content is not associated with my employer. Found an error? Edit this page.