deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2017 The WebRTC project authors. All Rights Reserved. |
| 3 | * |
| 4 | * Use of this source code is governed by a BSD-style license |
| 5 | * that can be found in the LICENSE file in the root of the source |
| 6 | * tree. An additional intellectual property rights grant can be found |
| 7 | * in the file PATENTS. All contributing project authors may |
| 8 | * be found in the AUTHORS file in the root of the source tree. |
| 9 | */ |
| 10 | |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 11 | #include "pc/ice_server_parsing.h" |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 12 | |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 13 | #include <stddef.h> |
Jonas Olsson | a4d8737 | 2019-07-05 19:08:33 +0200 | [diff] [blame] | 14 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 15 | #include <cctype> // For std::isdigit. |
| 16 | #include <string> |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 17 | #include <tuple> |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 18 | |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 19 | #include "p2p/base/port_interface.h" |
Mirko Bonadei | 92ea95e | 2017-09-15 06:47:31 +0200 | [diff] [blame] | 20 | #include "rtc_base/arraysize.h" |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 21 | #include "rtc_base/checks.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 22 | #include "rtc_base/ip_address.h" |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 23 | #include "rtc_base/logging.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 24 | #include "rtc_base/socket_address.h" |
Harald Alvestrand | 5761e7b | 2021-01-29 14:45:08 +0000 | [diff] [blame] | 25 | #include "rtc_base/string_encode.h" |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 26 | #include "rtc_base/string_to_number.h" |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 27 | |
| 28 | namespace webrtc { |
| 29 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 30 | namespace { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 31 | // Number of tokens must be preset when TURN uri has transport param. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 32 | const size_t kTurnTransportTokensNum = 2; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 33 | // The default stun port. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 34 | const int kDefaultStunPort = 3478; |
| 35 | const int kDefaultStunTlsPort = 5349; |
| 36 | const char kTransport[] = "transport"; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 37 | |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 38 | // Allowed characters in hostname per RFC 3986 Appendix A "reg-name" |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 39 | const char kRegNameCharacters[] = |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 40 | "abcdefghijklmnopqrstuvwxyz" |
| 41 | "ABCDEFGHIJKLMNOPQRSTUVWXYZ" |
| 42 | "0123456789" |
| 43 | "-._~" // unreserved |
| 44 | "%" // pct-encoded |
| 45 | "!$&'()*+,;="; // sub-delims |
| 46 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 47 | // NOTE: Must be in the same order as the ServiceType enum. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 48 | const char* kValidIceServiceTypes[] = {"stun", "stuns", "turn", "turns"}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 49 | |
| 50 | // NOTE: A loop below assumes that the first value of this enum is 0 and all |
| 51 | // other values are incremental. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 52 | enum class ServiceType { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 53 | STUN = 0, // Indicates a STUN server. |
| 54 | STUNS, // Indicates a STUN server used with a TLS session. |
| 55 | TURN, // Indicates a TURN server |
| 56 | TURNS, // Indicates a TURN server used with a TLS session. |
| 57 | INVALID, // Unknown. |
| 58 | }; |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 59 | static_assert(static_cast<size_t>(ServiceType::INVALID) == |
| 60 | arraysize(kValidIceServiceTypes), |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 61 | "kValidIceServiceTypes must have as many strings as ServiceType " |
| 62 | "has values."); |
| 63 | |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 64 | // `in_str` should follow of RFC 7064/7065 syntax, but with an optional |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 65 | // "?transport=" already stripped. I.e., |
| 66 | // stunURI = scheme ":" host [ ":" port ] |
| 67 | // scheme = "stun" / "stuns" / "turn" / "turns" |
| 68 | // host = IP-literal / IPv4address / reg-name |
| 69 | // port = *DIGIT |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 70 | |
| 71 | // Return tuple is service_type, host, with service_type == ServiceType::INVALID |
| 72 | // on failure. |
| 73 | std::tuple<ServiceType, absl::string_view> GetServiceTypeAndHostnameFromUri( |
| 74 | absl::string_view in_str) { |
| 75 | const auto colonpos = in_str.find(':'); |
| 76 | if (colonpos == absl::string_view::npos) { |
Mirko Bonadei | 675513b | 2017-11-09 11:09:25 +0100 | [diff] [blame] | 77 | RTC_LOG(LS_WARNING) << "Missing ':' in ICE URI: " << in_str; |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 78 | return {ServiceType::INVALID, ""}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 79 | } |
| 80 | if ((colonpos + 1) == in_str.length()) { |
Mirko Bonadei | 675513b | 2017-11-09 11:09:25 +0100 | [diff] [blame] | 81 | RTC_LOG(LS_WARNING) << "Empty hostname in ICE URI: " << in_str; |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 82 | return {ServiceType::INVALID, ""}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 83 | } |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 84 | for (size_t i = 0; i < arraysize(kValidIceServiceTypes); ++i) { |
| 85 | if (in_str.compare(0, colonpos, kValidIceServiceTypes[i]) == 0) { |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 86 | return {static_cast<ServiceType>(i), in_str.substr(colonpos + 1)}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 87 | } |
| 88 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 89 | return {ServiceType::INVALID, ""}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 90 | } |
| 91 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 92 | absl::optional<int> ParsePort(absl::string_view in_str) { |
| 93 | // Make sure port only contains digits. StringToNumber doesn't check this. |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 94 | for (const char& c : in_str) { |
Niels Möller | e66b83f | 2022-05-30 12:57:41 +0200 | [diff] [blame] | 95 | if (!std::isdigit(static_cast<unsigned char>(c))) { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 96 | return false; |
| 97 | } |
| 98 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 99 | return rtc::StringToNumber<int>(in_str); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 100 | } |
| 101 | |
| 102 | // This method parses IPv6 and IPv4 literal strings, along with hostnames in |
| 103 | // standard hostname:port format. |
| 104 | // Consider following formats as correct. |
Artem Titov | cfea218 | 2021-08-10 01:22:31 +0200 | [diff] [blame] | 105 | // `hostname:port`, |[IPV6 address]:port|, |IPv4 address|:port, |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 106 | // `hostname`, |[IPv6 address]|, |IPv4 address|. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 107 | |
| 108 | // Return tuple is success, host, port. |
| 109 | std::tuple<bool, absl::string_view, int> ParseHostnameAndPortFromString( |
| 110 | absl::string_view in_str, |
| 111 | int default_port) { |
| 112 | if (in_str.empty()) { |
| 113 | return {false, "", 0}; |
| 114 | } |
| 115 | absl::string_view host; |
| 116 | int port = default_port; |
| 117 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 118 | if (in_str.at(0) == '[') { |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 119 | // IP_literal syntax |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 120 | auto closebracket = in_str.rfind(']'); |
| 121 | if (closebracket == absl::string_view::npos) { |
| 122 | return {false, "", 0}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 123 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 124 | auto colonpos = in_str.find(':', closebracket); |
| 125 | if (absl::string_view::npos != colonpos) { |
| 126 | if (absl::optional<int> opt_port = |
| 127 | ParsePort(in_str.substr(closebracket + 2))) { |
| 128 | port = *opt_port; |
| 129 | } else { |
| 130 | return {false, "", 0}; |
| 131 | } |
| 132 | } |
| 133 | host = in_str.substr(1, closebracket - 1); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 134 | } else { |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 135 | // IPv4address or reg-name syntax |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 136 | auto colonpos = in_str.find(':'); |
| 137 | if (absl::string_view::npos != colonpos) { |
| 138 | if (absl::optional<int> opt_port = |
| 139 | ParsePort(in_str.substr(colonpos + 1))) { |
| 140 | port = *opt_port; |
| 141 | } else { |
| 142 | return {false, "", 0}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 143 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 144 | host = in_str.substr(0, colonpos); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 145 | } else { |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 146 | host = in_str; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 147 | } |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 148 | // RFC 3986 section 3.2.2 and Appendix A - "reg-name" syntax |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 149 | if (host.find_first_not_of(kRegNameCharacters) != absl::string_view::npos) { |
| 150 | return {false, "", 0}; |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 151 | } |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 152 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 153 | return {!host.empty(), host, port}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 154 | } |
| 155 | |
| 156 | // Adds a STUN or TURN server to the appropriate list, |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 157 | // by parsing `url` and using the username/password in `server`. |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 158 | RTCErrorType ParseIceServerUrl( |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 159 | const PeerConnectionInterface::IceServer& server, |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 160 | absl::string_view url, |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 161 | cricket::ServerAddresses* stun_servers, |
| 162 | std::vector<cricket::RelayServerConfig>* turn_servers) { |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 163 | // RFC 7064 |
| 164 | // stunURI = scheme ":" host [ ":" port ] |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 165 | // scheme = "stun" / "stuns" |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 166 | |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 167 | // RFC 7065 |
| 168 | // turnURI = scheme ":" host [ ":" port ] |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 169 | // [ "?transport=" transport ] |
| 170 | // scheme = "turn" / "turns" |
| 171 | // transport = "udp" / "tcp" / transport-ext |
| 172 | // transport-ext = 1*unreserved |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 173 | |
| 174 | // RFC 3986 |
| 175 | // host = IP-literal / IPv4address / reg-name |
| 176 | // port = *DIGIT |
| 177 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 178 | RTC_DCHECK(stun_servers != nullptr); |
| 179 | RTC_DCHECK(turn_servers != nullptr); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 180 | cricket::ProtocolType turn_transport_type = cricket::PROTO_UDP; |
| 181 | RTC_DCHECK(!url.empty()); |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 182 | std::vector<absl::string_view> tokens = rtc::split(url, '?'); |
| 183 | absl::string_view uri_without_transport = tokens[0]; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 184 | // Let's look into transport= param, if it exists. |
| 185 | if (tokens.size() == kTurnTransportTokensNum) { // ?transport= is present. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 186 | std::vector<absl::string_view> transport_tokens = |
| 187 | rtc::split(tokens[1], '='); |
| 188 | if (transport_tokens[0] != kTransport) { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 189 | RTC_LOG(LS_WARNING) << "Invalid transport parameter key."; |
| 190 | return RTCErrorType::SYNTAX_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 191 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 192 | if (transport_tokens.size() < 2) { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 193 | RTC_LOG(LS_WARNING) << "Transport parameter missing value."; |
| 194 | return RTCErrorType::SYNTAX_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 195 | } |
Niels Möller | 4662f53 | 2022-05-20 15:44:37 +0200 | [diff] [blame] | 196 | |
| 197 | absl::optional<cricket::ProtocolType> proto = |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 198 | cricket::StringToProto(transport_tokens[1]); |
Niels Möller | 4662f53 | 2022-05-20 15:44:37 +0200 | [diff] [blame] | 199 | if (!proto || |
| 200 | (*proto != cricket::PROTO_UDP && *proto != cricket::PROTO_TCP)) { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 201 | RTC_LOG(LS_WARNING) << "Transport parameter should always be udp or tcp."; |
| 202 | return RTCErrorType::SYNTAX_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 203 | } |
Niels Möller | 4662f53 | 2022-05-20 15:44:37 +0200 | [diff] [blame] | 204 | turn_transport_type = *proto; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 205 | } |
| 206 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 207 | auto [service_type, hoststring] = |
| 208 | GetServiceTypeAndHostnameFromUri(uri_without_transport); |
| 209 | if (service_type == ServiceType::INVALID) { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 210 | RTC_LOG(LS_WARNING) << "Invalid transport parameter in ICE URI: " << url; |
| 211 | return RTCErrorType::SYNTAX_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 212 | } |
| 213 | |
| 214 | // GetServiceTypeAndHostnameFromUri should never give an empty hoststring |
| 215 | RTC_DCHECK(!hoststring.empty()); |
| 216 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 217 | int default_port = kDefaultStunPort; |
| 218 | if (service_type == ServiceType::TURNS) { |
| 219 | default_port = kDefaultStunTlsPort; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 220 | turn_transport_type = cricket::PROTO_TLS; |
| 221 | } |
| 222 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 223 | if (hoststring.find('@') != absl::string_view::npos) { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 224 | RTC_LOG(LS_WARNING) << "Invalid url: " << uri_without_transport; |
| 225 | RTC_LOG(LS_WARNING) |
| 226 | << "Note that user-info@ in turn:-urls is long-deprecated."; |
| 227 | return RTCErrorType::SYNTAX_ERROR; |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 228 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 229 | |
| 230 | auto [success, address, port] = |
| 231 | ParseHostnameAndPortFromString(hoststring, default_port); |
| 232 | if (!success) { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 233 | RTC_LOG(LS_WARNING) << "Invalid hostname format: " << uri_without_transport; |
| 234 | return RTCErrorType::SYNTAX_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 235 | } |
| 236 | |
| 237 | if (port <= 0 || port > 0xffff) { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 238 | RTC_LOG(LS_WARNING) << "Invalid port: " << port; |
| 239 | return RTCErrorType::SYNTAX_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 240 | } |
| 241 | |
| 242 | switch (service_type) { |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 243 | case ServiceType::STUN: |
| 244 | case ServiceType::STUNS: |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 245 | stun_servers->insert(rtc::SocketAddress(address, port)); |
| 246 | break; |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 247 | case ServiceType::TURN: |
| 248 | case ServiceType::TURNS: { |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 249 | if (server.username.empty() || server.password.empty()) { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 250 | // The WebRTC spec requires throwing an InvalidAccessError when username |
| 251 | // or credential are ommitted; this is the native equivalent. |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 252 | RTC_LOG(LS_WARNING) << "TURN server with empty username or password"; |
| 253 | return RTCErrorType::INVALID_PARAMETER; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 254 | } |
Emad Omara | dab1d2d | 2017-06-16 15:43:11 -0700 | [diff] [blame] | 255 | // If the hostname field is not empty, then the server address must be |
| 256 | // the resolved IP for that host, the hostname is needed later for TLS |
| 257 | // handshake (SNI and Certificate verification). |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 258 | absl::string_view hostname = |
Emad Omara | dab1d2d | 2017-06-16 15:43:11 -0700 | [diff] [blame] | 259 | server.hostname.empty() ? address : server.hostname; |
| 260 | rtc::SocketAddress socket_address(hostname, port); |
| 261 | if (!server.hostname.empty()) { |
| 262 | rtc::IPAddress ip; |
| 263 | if (!IPFromString(address, &ip)) { |
| 264 | // When hostname is set, the server address must be a |
| 265 | // resolved ip address. |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 266 | RTC_LOG(LS_WARNING) |
| 267 | << "IceServer has hostname field set, but URI does not " |
| 268 | "contain an IP address."; |
| 269 | return RTCErrorType::INVALID_PARAMETER; |
Emad Omara | dab1d2d | 2017-06-16 15:43:11 -0700 | [diff] [blame] | 270 | } |
| 271 | socket_address.SetResolvedIP(ip); |
| 272 | } |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 273 | cricket::RelayServerConfig config = |
| 274 | cricket::RelayServerConfig(socket_address, server.username, |
| 275 | server.password, turn_transport_type); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 276 | if (server.tls_cert_policy == |
| 277 | PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck) { |
Sergey Silkin | 9c147dd | 2018-09-12 10:45:38 +0000 | [diff] [blame] | 278 | config.tls_cert_policy = |
| 279 | cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 280 | } |
Sergey Silkin | 9c147dd | 2018-09-12 10:45:38 +0000 | [diff] [blame] | 281 | config.tls_alpn_protocols = server.tls_alpn_protocols; |
| 282 | config.tls_elliptic_curves = server.tls_elliptic_curves; |
Diogo Real | 1dca9d5 | 2017-08-29 12:18:32 -0700 | [diff] [blame] | 283 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 284 | turn_servers->push_back(config); |
| 285 | break; |
| 286 | } |
| 287 | default: |
| 288 | // We shouldn't get to this point with an invalid service_type, we should |
| 289 | // have returned an error already. |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 290 | RTC_DCHECK_NOTREACHED() << "Unexpected service type"; |
| 291 | return RTCErrorType::INTERNAL_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 292 | } |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 293 | return RTCErrorType::NONE; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 294 | } |
| 295 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 296 | } // namespace |
| 297 | |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 298 | RTCErrorType ParseIceServers( |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 299 | const PeerConnectionInterface::IceServers& servers, |
| 300 | cricket::ServerAddresses* stun_servers, |
| 301 | std::vector<cricket::RelayServerConfig>* turn_servers) { |
| 302 | for (const PeerConnectionInterface::IceServer& server : servers) { |
| 303 | if (!server.urls.empty()) { |
| 304 | for (const std::string& url : server.urls) { |
| 305 | if (url.empty()) { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 306 | RTC_LOG(LS_WARNING) << "Empty uri."; |
| 307 | return RTCErrorType::SYNTAX_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 308 | } |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 309 | RTCErrorType err = |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 310 | ParseIceServerUrl(server, url, stun_servers, turn_servers); |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 311 | if (err != RTCErrorType::NONE) { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 312 | return err; |
| 313 | } |
| 314 | } |
| 315 | } else if (!server.uri.empty()) { |
| 316 | // Fallback to old .uri if new .urls isn't present. |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 317 | RTCErrorType err = |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 318 | ParseIceServerUrl(server, server.uri, stun_servers, turn_servers); |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 319 | if (err != RTCErrorType::NONE) { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 320 | return err; |
| 321 | } |
| 322 | } else { |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 323 | RTC_LOG(LS_WARNING) << "Empty uri."; |
| 324 | return RTCErrorType::SYNTAX_ERROR; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 325 | } |
| 326 | } |
| 327 | // Candidates must have unique priorities, so that connectivity checks |
| 328 | // are performed in a well-defined order. |
| 329 | int priority = static_cast<int>(turn_servers->size() - 1); |
| 330 | for (cricket::RelayServerConfig& turn_server : *turn_servers) { |
| 331 | // First in the list gets highest priority. |
| 332 | turn_server.priority = priority--; |
| 333 | } |
Mirko Bonadei | 4d47e0b | 2022-10-12 06:51:54 +0000 | [diff] [blame] | 334 | return RTCErrorType::NONE; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 335 | } |
| 336 | |
| 337 | } // namespace webrtc |