blob: 1a30d2def591cdf21a8526aa82498b8971bdc7f5 [file] [log] [blame]
deadbeef1dcb1642017-03-29 21:08:16 -07001/*
2 * Copyright 2017 The WebRTC project authors. All Rights Reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
Steve Anton10542f22019-01-11 09:11:00 -080011#include "pc/ice_server_parsing.h"
deadbeef1dcb1642017-03-29 21:08:16 -070012
Yves Gerey3e707812018-11-28 16:47:49 +010013#include <stddef.h>
Jonas Olssona4d87372019-07-05 19:08:33 +020014
deadbeef1dcb1642017-03-29 21:08:16 -070015#include <cctype> // For std::isdigit.
16#include <string>
Niels Möller6d122622022-06-03 13:51:21 +020017#include <tuple>
deadbeef1dcb1642017-03-29 21:08:16 -070018
Steve Anton10542f22019-01-11 09:11:00 -080019#include "p2p/base/port_interface.h"
Mirko Bonadei92ea95e2017-09-15 06:47:31 +020020#include "rtc_base/arraysize.h"
Yves Gerey3e707812018-11-28 16:47:49 +010021#include "rtc_base/checks.h"
Steve Anton10542f22019-01-11 09:11:00 -080022#include "rtc_base/ip_address.h"
Yves Gerey3e707812018-11-28 16:47:49 +010023#include "rtc_base/logging.h"
Steve Anton10542f22019-01-11 09:11:00 -080024#include "rtc_base/socket_address.h"
Harald Alvestrand5761e7b2021-01-29 14:45:08 +000025#include "rtc_base/string_encode.h"
Niels Möller6d122622022-06-03 13:51:21 +020026#include "rtc_base/string_to_number.h"
deadbeef1dcb1642017-03-29 21:08:16 -070027
28namespace webrtc {
29
Niels Möller6d122622022-06-03 13:51:21 +020030namespace {
deadbeef1dcb1642017-03-29 21:08:16 -070031// Number of tokens must be preset when TURN uri has transport param.
Niels Möller6d122622022-06-03 13:51:21 +020032const size_t kTurnTransportTokensNum = 2;
deadbeef1dcb1642017-03-29 21:08:16 -070033// The default stun port.
Niels Möller6d122622022-06-03 13:51:21 +020034const int kDefaultStunPort = 3478;
35const int kDefaultStunTlsPort = 5349;
36const char kTransport[] = "transport";
deadbeef1dcb1642017-03-29 21:08:16 -070037
Harald Alvestranda3dd7722020-11-27 08:05:42 +000038// Allowed characters in hostname per RFC 3986 Appendix A "reg-name"
Niels Möller6d122622022-06-03 13:51:21 +020039const char kRegNameCharacters[] =
Harald Alvestranda3dd7722020-11-27 08:05:42 +000040 "abcdefghijklmnopqrstuvwxyz"
41 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
42 "0123456789"
43 "-._~" // unreserved
44 "%" // pct-encoded
45 "!$&'()*+,;="; // sub-delims
46
deadbeef1dcb1642017-03-29 21:08:16 -070047// NOTE: Must be in the same order as the ServiceType enum.
Niels Möller6d122622022-06-03 13:51:21 +020048const char* kValidIceServiceTypes[] = {"stun", "stuns", "turn", "turns"};
deadbeef1dcb1642017-03-29 21:08:16 -070049
50// NOTE: A loop below assumes that the first value of this enum is 0 and all
51// other values are incremental.
Niels Möller6d122622022-06-03 13:51:21 +020052enum class ServiceType {
deadbeef1dcb1642017-03-29 21:08:16 -070053 STUN = 0, // Indicates a STUN server.
54 STUNS, // Indicates a STUN server used with a TLS session.
55 TURN, // Indicates a TURN server
56 TURNS, // Indicates a TURN server used with a TLS session.
57 INVALID, // Unknown.
58};
Niels Möller6d122622022-06-03 13:51:21 +020059static_assert(static_cast<size_t>(ServiceType::INVALID) ==
60 arraysize(kValidIceServiceTypes),
deadbeef1dcb1642017-03-29 21:08:16 -070061 "kValidIceServiceTypes must have as many strings as ServiceType "
62 "has values.");
63
Artem Titov880fa812021-07-30 22:30:23 +020064// `in_str` should follow of RFC 7064/7065 syntax, but with an optional
Niels Möllerdb4def92019-03-18 16:53:59 +010065// "?transport=" already stripped. I.e.,
66// stunURI = scheme ":" host [ ":" port ]
67// scheme = "stun" / "stuns" / "turn" / "turns"
68// host = IP-literal / IPv4address / reg-name
69// port = *DIGIT
Niels Möller6d122622022-06-03 13:51:21 +020070
71// Return tuple is service_type, host, with service_type == ServiceType::INVALID
72// on failure.
73std::tuple<ServiceType, absl::string_view> GetServiceTypeAndHostnameFromUri(
74 absl::string_view in_str) {
75 const auto colonpos = in_str.find(':');
76 if (colonpos == absl::string_view::npos) {
Mirko Bonadei675513b2017-11-09 11:09:25 +010077 RTC_LOG(LS_WARNING) << "Missing ':' in ICE URI: " << in_str;
Niels Möller6d122622022-06-03 13:51:21 +020078 return {ServiceType::INVALID, ""};
deadbeef1dcb1642017-03-29 21:08:16 -070079 }
80 if ((colonpos + 1) == in_str.length()) {
Mirko Bonadei675513b2017-11-09 11:09:25 +010081 RTC_LOG(LS_WARNING) << "Empty hostname in ICE URI: " << in_str;
Niels Möller6d122622022-06-03 13:51:21 +020082 return {ServiceType::INVALID, ""};
deadbeef1dcb1642017-03-29 21:08:16 -070083 }
deadbeef1dcb1642017-03-29 21:08:16 -070084 for (size_t i = 0; i < arraysize(kValidIceServiceTypes); ++i) {
85 if (in_str.compare(0, colonpos, kValidIceServiceTypes[i]) == 0) {
Niels Möller6d122622022-06-03 13:51:21 +020086 return {static_cast<ServiceType>(i), in_str.substr(colonpos + 1)};
deadbeef1dcb1642017-03-29 21:08:16 -070087 }
88 }
Niels Möller6d122622022-06-03 13:51:21 +020089 return {ServiceType::INVALID, ""};
deadbeef1dcb1642017-03-29 21:08:16 -070090}
91
Niels Möller6d122622022-06-03 13:51:21 +020092absl::optional<int> ParsePort(absl::string_view in_str) {
93 // Make sure port only contains digits. StringToNumber doesn't check this.
deadbeef1dcb1642017-03-29 21:08:16 -070094 for (const char& c : in_str) {
Niels Möllere66b83f2022-05-30 12:57:41 +020095 if (!std::isdigit(static_cast<unsigned char>(c))) {
deadbeef1dcb1642017-03-29 21:08:16 -070096 return false;
97 }
98 }
Niels Möller6d122622022-06-03 13:51:21 +020099 return rtc::StringToNumber<int>(in_str);
deadbeef1dcb1642017-03-29 21:08:16 -0700100}
101
102// This method parses IPv6 and IPv4 literal strings, along with hostnames in
103// standard hostname:port format.
104// Consider following formats as correct.
Artem Titovcfea2182021-08-10 01:22:31 +0200105// `hostname:port`, |[IPV6 address]:port|, |IPv4 address|:port,
Artem Titov880fa812021-07-30 22:30:23 +0200106// `hostname`, |[IPv6 address]|, |IPv4 address|.
Niels Möller6d122622022-06-03 13:51:21 +0200107
108// Return tuple is success, host, port.
109std::tuple<bool, absl::string_view, int> ParseHostnameAndPortFromString(
110 absl::string_view in_str,
111 int default_port) {
112 if (in_str.empty()) {
113 return {false, "", 0};
114 }
115 absl::string_view host;
116 int port = default_port;
117
deadbeef1dcb1642017-03-29 21:08:16 -0700118 if (in_str.at(0) == '[') {
Harald Alvestranda3dd7722020-11-27 08:05:42 +0000119 // IP_literal syntax
Niels Möller6d122622022-06-03 13:51:21 +0200120 auto closebracket = in_str.rfind(']');
121 if (closebracket == absl::string_view::npos) {
122 return {false, "", 0};
deadbeef1dcb1642017-03-29 21:08:16 -0700123 }
Niels Möller6d122622022-06-03 13:51:21 +0200124 auto colonpos = in_str.find(':', closebracket);
125 if (absl::string_view::npos != colonpos) {
126 if (absl::optional<int> opt_port =
127 ParsePort(in_str.substr(closebracket + 2))) {
128 port = *opt_port;
129 } else {
130 return {false, "", 0};
131 }
132 }
133 host = in_str.substr(1, closebracket - 1);
deadbeef1dcb1642017-03-29 21:08:16 -0700134 } else {
Harald Alvestranda3dd7722020-11-27 08:05:42 +0000135 // IPv4address or reg-name syntax
Niels Möller6d122622022-06-03 13:51:21 +0200136 auto colonpos = in_str.find(':');
137 if (absl::string_view::npos != colonpos) {
138 if (absl::optional<int> opt_port =
139 ParsePort(in_str.substr(colonpos + 1))) {
140 port = *opt_port;
141 } else {
142 return {false, "", 0};
deadbeef1dcb1642017-03-29 21:08:16 -0700143 }
Niels Möller6d122622022-06-03 13:51:21 +0200144 host = in_str.substr(0, colonpos);
deadbeef1dcb1642017-03-29 21:08:16 -0700145 } else {
Niels Möller6d122622022-06-03 13:51:21 +0200146 host = in_str;
deadbeef1dcb1642017-03-29 21:08:16 -0700147 }
Harald Alvestranda3dd7722020-11-27 08:05:42 +0000148 // RFC 3986 section 3.2.2 and Appendix A - "reg-name" syntax
Niels Möller6d122622022-06-03 13:51:21 +0200149 if (host.find_first_not_of(kRegNameCharacters) != absl::string_view::npos) {
150 return {false, "", 0};
Harald Alvestranda3dd7722020-11-27 08:05:42 +0000151 }
deadbeef1dcb1642017-03-29 21:08:16 -0700152 }
Niels Möller6d122622022-06-03 13:51:21 +0200153 return {!host.empty(), host, port};
deadbeef1dcb1642017-03-29 21:08:16 -0700154}
155
156// Adds a STUN or TURN server to the appropriate list,
Artem Titov880fa812021-07-30 22:30:23 +0200157// by parsing `url` and using the username/password in `server`.
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200158RTCError ParseIceServerUrl(
deadbeef1dcb1642017-03-29 21:08:16 -0700159 const PeerConnectionInterface::IceServer& server,
Niels Möller6d122622022-06-03 13:51:21 +0200160 absl::string_view url,
deadbeef1dcb1642017-03-29 21:08:16 -0700161 cricket::ServerAddresses* stun_servers,
162 std::vector<cricket::RelayServerConfig>* turn_servers) {
Niels Möllerdb4def92019-03-18 16:53:59 +0100163 // RFC 7064
164 // stunURI = scheme ":" host [ ":" port ]
deadbeef1dcb1642017-03-29 21:08:16 -0700165 // scheme = "stun" / "stuns"
deadbeef1dcb1642017-03-29 21:08:16 -0700166
Niels Möllerdb4def92019-03-18 16:53:59 +0100167 // RFC 7065
168 // turnURI = scheme ":" host [ ":" port ]
deadbeef1dcb1642017-03-29 21:08:16 -0700169 // [ "?transport=" transport ]
170 // scheme = "turn" / "turns"
171 // transport = "udp" / "tcp" / transport-ext
172 // transport-ext = 1*unreserved
Niels Möllerdb4def92019-03-18 16:53:59 +0100173
174 // RFC 3986
175 // host = IP-literal / IPv4address / reg-name
176 // port = *DIGIT
177
deadbeef1dcb1642017-03-29 21:08:16 -0700178 RTC_DCHECK(stun_servers != nullptr);
179 RTC_DCHECK(turn_servers != nullptr);
deadbeef1dcb1642017-03-29 21:08:16 -0700180 cricket::ProtocolType turn_transport_type = cricket::PROTO_UDP;
181 RTC_DCHECK(!url.empty());
Niels Möller6d122622022-06-03 13:51:21 +0200182 std::vector<absl::string_view> tokens = rtc::split(url, '?');
183 absl::string_view uri_without_transport = tokens[0];
deadbeef1dcb1642017-03-29 21:08:16 -0700184 // Let's look into transport= param, if it exists.
185 if (tokens.size() == kTurnTransportTokensNum) { // ?transport= is present.
Niels Möller6d122622022-06-03 13:51:21 +0200186 std::vector<absl::string_view> transport_tokens =
187 rtc::split(tokens[1], '=');
188 if (transport_tokens[0] != kTransport) {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200189 LOG_AND_RETURN_ERROR(
190 RTCErrorType::SYNTAX_ERROR,
191 "ICE server parsing failed: Invalid transport parameter key.");
deadbeef1dcb1642017-03-29 21:08:16 -0700192 }
Niels Möller6d122622022-06-03 13:51:21 +0200193 if (transport_tokens.size() < 2) {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200194 LOG_AND_RETURN_ERROR(
195 RTCErrorType::SYNTAX_ERROR,
196 "ICE server parsing failed: Transport parameter missing value.");
deadbeef1dcb1642017-03-29 21:08:16 -0700197 }
Niels Möller4662f532022-05-20 15:44:37 +0200198
199 absl::optional<cricket::ProtocolType> proto =
Niels Möller6d122622022-06-03 13:51:21 +0200200 cricket::StringToProto(transport_tokens[1]);
Niels Möller4662f532022-05-20 15:44:37 +0200201 if (!proto ||
202 (*proto != cricket::PROTO_UDP && *proto != cricket::PROTO_TCP)) {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200203 LOG_AND_RETURN_ERROR(
204 RTCErrorType::SYNTAX_ERROR,
205 "ICE server parsing failed: Transport parameter should "
206 "always be udp or tcp.");
deadbeef1dcb1642017-03-29 21:08:16 -0700207 }
Niels Möller4662f532022-05-20 15:44:37 +0200208 turn_transport_type = *proto;
deadbeef1dcb1642017-03-29 21:08:16 -0700209 }
210
Niels Möller6d122622022-06-03 13:51:21 +0200211 auto [service_type, hoststring] =
212 GetServiceTypeAndHostnameFromUri(uri_without_transport);
213 if (service_type == ServiceType::INVALID) {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200214 RTC_LOG(LS_ERROR) << "Invalid transport parameter in ICE URI: " << url;
215 LOG_AND_RETURN_ERROR(
216 RTCErrorType::SYNTAX_ERROR,
217 "ICE server parsing failed: Invalid transport parameter in ICE URI");
deadbeef1dcb1642017-03-29 21:08:16 -0700218 }
219
220 // GetServiceTypeAndHostnameFromUri should never give an empty hoststring
221 RTC_DCHECK(!hoststring.empty());
222
Niels Möller6d122622022-06-03 13:51:21 +0200223 int default_port = kDefaultStunPort;
224 if (service_type == ServiceType::TURNS) {
225 default_port = kDefaultStunTlsPort;
deadbeef1dcb1642017-03-29 21:08:16 -0700226 turn_transport_type = cricket::PROTO_TLS;
227 }
228
Niels Möller6d122622022-06-03 13:51:21 +0200229 if (hoststring.find('@') != absl::string_view::npos) {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200230 RTC_LOG(LS_ERROR) << "Invalid url with long deprecated user@host syntax: "
231 << uri_without_transport;
232 LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR,
233 "ICE server parsing failed: Invalid url with long "
234 "deprecated user@host syntax");
Niels Möllerdb4def92019-03-18 16:53:59 +0100235 }
Niels Möller6d122622022-06-03 13:51:21 +0200236
237 auto [success, address, port] =
238 ParseHostnameAndPortFromString(hoststring, default_port);
239 if (!success) {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200240 RTC_LOG(LS_ERROR) << "Invalid hostname format: " << uri_without_transport;
241 LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR,
242 "ICE server parsing failed: Invalid hostname format");
deadbeef1dcb1642017-03-29 21:08:16 -0700243 }
244
245 if (port <= 0 || port > 0xffff) {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200246 RTC_LOG(LS_ERROR) << "Invalid port: " << port;
247 LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR,
248 "ICE server parsing failed: Invalid port");
deadbeef1dcb1642017-03-29 21:08:16 -0700249 }
250
251 switch (service_type) {
Niels Möller6d122622022-06-03 13:51:21 +0200252 case ServiceType::STUN:
253 case ServiceType::STUNS:
deadbeef1dcb1642017-03-29 21:08:16 -0700254 stun_servers->insert(rtc::SocketAddress(address, port));
255 break;
Niels Möller6d122622022-06-03 13:51:21 +0200256 case ServiceType::TURN:
257 case ServiceType::TURNS: {
Niels Möllerdb4def92019-03-18 16:53:59 +0100258 if (server.username.empty() || server.password.empty()) {
deadbeef1dcb1642017-03-29 21:08:16 -0700259 // The WebRTC spec requires throwing an InvalidAccessError when username
260 // or credential are ommitted; this is the native equivalent.
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200261 LOG_AND_RETURN_ERROR(
262 RTCErrorType::INVALID_PARAMETER,
263 "ICE server parsing failed: TURN server with empty "
264 "username or password");
deadbeef1dcb1642017-03-29 21:08:16 -0700265 }
Emad Omaradab1d2d2017-06-16 15:43:11 -0700266 // If the hostname field is not empty, then the server address must be
267 // the resolved IP for that host, the hostname is needed later for TLS
268 // handshake (SNI and Certificate verification).
Niels Möller6d122622022-06-03 13:51:21 +0200269 absl::string_view hostname =
Emad Omaradab1d2d2017-06-16 15:43:11 -0700270 server.hostname.empty() ? address : server.hostname;
271 rtc::SocketAddress socket_address(hostname, port);
272 if (!server.hostname.empty()) {
273 rtc::IPAddress ip;
274 if (!IPFromString(address, &ip)) {
275 // When hostname is set, the server address must be a
276 // resolved ip address.
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200277 LOG_AND_RETURN_ERROR(
278 RTCErrorType::INVALID_PARAMETER,
279 "ICE server parsing failed: "
280 "IceServer has hostname field set, but URI does not "
281 "contain an IP address.");
Emad Omaradab1d2d2017-06-16 15:43:11 -0700282 }
283 socket_address.SetResolvedIP(ip);
284 }
Niels Möllerdb4def92019-03-18 16:53:59 +0100285 cricket::RelayServerConfig config =
286 cricket::RelayServerConfig(socket_address, server.username,
287 server.password, turn_transport_type);
deadbeef1dcb1642017-03-29 21:08:16 -0700288 if (server.tls_cert_policy ==
289 PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck) {
Sergey Silkin9c147dd2018-09-12 10:45:38 +0000290 config.tls_cert_policy =
291 cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK;
deadbeef1dcb1642017-03-29 21:08:16 -0700292 }
Sergey Silkin9c147dd2018-09-12 10:45:38 +0000293 config.tls_alpn_protocols = server.tls_alpn_protocols;
294 config.tls_elliptic_curves = server.tls_elliptic_curves;
Diogo Real1dca9d52017-08-29 12:18:32 -0700295
deadbeef1dcb1642017-03-29 21:08:16 -0700296 turn_servers->push_back(config);
297 break;
298 }
299 default:
300 // We shouldn't get to this point with an invalid service_type, we should
301 // have returned an error already.
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200302 LOG_AND_RETURN_ERROR(
303 RTCErrorType::INTERNAL_ERROR,
304 "ICE server parsing failed: Unexpected service type");
deadbeef1dcb1642017-03-29 21:08:16 -0700305 }
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200306 return RTCError::OK();
deadbeef1dcb1642017-03-29 21:08:16 -0700307}
308
Niels Möller6d122622022-06-03 13:51:21 +0200309} // namespace
310
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200311RTCError ParseIceServersOrError(
deadbeef1dcb1642017-03-29 21:08:16 -0700312 const PeerConnectionInterface::IceServers& servers,
313 cricket::ServerAddresses* stun_servers,
314 std::vector<cricket::RelayServerConfig>* turn_servers) {
315 for (const PeerConnectionInterface::IceServer& server : servers) {
316 if (!server.urls.empty()) {
317 for (const std::string& url : server.urls) {
318 if (url.empty()) {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200319 LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR,
320 "ICE server parsing failed: Empty uri.");
deadbeef1dcb1642017-03-29 21:08:16 -0700321 }
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200322 RTCError err =
deadbeef1dcb1642017-03-29 21:08:16 -0700323 ParseIceServerUrl(server, url, stun_servers, turn_servers);
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200324 if (!err.ok()) {
deadbeef1dcb1642017-03-29 21:08:16 -0700325 return err;
326 }
327 }
328 } else if (!server.uri.empty()) {
329 // Fallback to old .uri if new .urls isn't present.
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200330 RTCError err =
deadbeef1dcb1642017-03-29 21:08:16 -0700331 ParseIceServerUrl(server, server.uri, stun_servers, turn_servers);
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200332
333 if (!err.ok()) {
deadbeef1dcb1642017-03-29 21:08:16 -0700334 return err;
335 }
336 } else {
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200337 LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR,
338 "ICE server parsing failed: Empty uri.");
deadbeef1dcb1642017-03-29 21:08:16 -0700339 }
340 }
341 // Candidates must have unique priorities, so that connectivity checks
342 // are performed in a well-defined order.
343 int priority = static_cast<int>(turn_servers->size() - 1);
344 for (cricket::RelayServerConfig& turn_server : *turn_servers) {
345 // First in the list gets highest priority.
346 turn_server.priority = priority--;
347 }
Philipp Hancke633dc2f2022-10-12 10:16:14 +0200348 return RTCError::OK();
349}
350
351RTCErrorType ParseIceServers(
352 const PeerConnectionInterface::IceServers& servers,
353 cricket::ServerAddresses* stun_servers,
354 std::vector<cricket::RelayServerConfig>* turn_servers) {
355 return ParseIceServersOrError(servers, stun_servers, turn_servers).type();
deadbeef1dcb1642017-03-29 21:08:16 -0700356}
357
358} // namespace webrtc