henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2012 The WebRTC Project Authors. All rights reserved. |
| 3 | * |
| 4 | * Use of this source code is governed by a BSD-style license |
| 5 | * that can be found in the LICENSE file in the root of the source |
| 6 | * tree. An additional intellectual property rights grant can be found |
| 7 | * in the file PATENTS. All contributing project authors may |
| 8 | * be found in the AUTHORS file in the root of the source tree. |
| 9 | */ |
| 10 | |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 11 | #ifndef P2P_BASE_TEST_TURN_SERVER_H_ |
| 12 | #define P2P_BASE_TEST_TURN_SERVER_H_ |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 13 | |
Niels Möller | ac9a288 | 2021-10-20 15:25:09 +0200 | [diff] [blame] | 14 | #include <memory> |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 15 | #include <string> |
Niels Möller | ac9a288 | 2021-10-20 15:25:09 +0200 | [diff] [blame] | 16 | #include <utility> |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 17 | #include <vector> |
| 18 | |
Ali Tofigh | de2ac5a | 2022-06-30 11:58:26 +0200 | [diff] [blame] | 19 | #include "absl/strings/string_view.h" |
Artem Titov | d15a575 | 2021-02-10 14:31:24 +0100 | [diff] [blame] | 20 | #include "api/sequence_checker.h" |
Patrik Höglund | 56d9452 | 2019-11-18 15:53:32 +0100 | [diff] [blame] | 21 | #include "api/transport/stun.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 22 | #include "p2p/base/basic_packet_socket_factory.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 23 | #include "p2p/base/turn_server.h" |
| 24 | #include "rtc_base/async_udp_socket.h" |
| 25 | #include "rtc_base/ssl_adapter.h" |
| 26 | #include "rtc_base/ssl_identity.h" |
Mirko Bonadei | 92ea95e | 2017-09-15 06:47:31 +0200 | [diff] [blame] | 27 | #include "rtc_base/thread.h" |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 28 | |
| 29 | namespace cricket { |
| 30 | |
| 31 | static const char kTestRealm[] = "example.org"; |
| 32 | static const char kTestSoftware[] = "TestTurnServer"; |
| 33 | |
| 34 | class TestTurnRedirector : public TurnRedirectInterface { |
| 35 | public: |
| 36 | explicit TestTurnRedirector(const std::vector<rtc::SocketAddress>& addresses) |
| 37 | : alternate_server_addresses_(addresses), |
Yves Gerey | 665174f | 2018-06-19 15:03:05 +0200 | [diff] [blame] | 38 | iter_(alternate_server_addresses_.begin()) {} |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 39 | |
| 40 | virtual bool ShouldRedirect(const rtc::SocketAddress&, |
| 41 | rtc::SocketAddress* out) { |
| 42 | if (!out || iter_ == alternate_server_addresses_.end()) { |
| 43 | return false; |
| 44 | } |
| 45 | *out = *iter_++; |
| 46 | return true; |
| 47 | } |
| 48 | |
| 49 | private: |
| 50 | const std::vector<rtc::SocketAddress>& alternate_server_addresses_; |
| 51 | std::vector<rtc::SocketAddress>::const_iterator iter_; |
| 52 | }; |
| 53 | |
| 54 | class TestTurnServer : public TurnAuthInterface { |
| 55 | public: |
| 56 | TestTurnServer(rtc::Thread* thread, |
Niels Möller | 6dd4997 | 2021-11-24 14:05:55 +0100 | [diff] [blame] | 57 | rtc::SocketFactory* socket_factory, |
Honghai Zhang | 80f1db9 | 2016-01-27 11:54:45 -0800 | [diff] [blame] | 58 | const rtc::SocketAddress& int_addr, |
| 59 | const rtc::SocketAddress& udp_ext_addr, |
Benjamin Wright | d6f86e8 | 2018-05-08 13:12:25 -0700 | [diff] [blame] | 60 | ProtocolType int_protocol = PROTO_UDP, |
| 61 | bool ignore_bad_cert = true, |
Ali Tofigh | de2ac5a | 2022-06-30 11:58:26 +0200 | [diff] [blame] | 62 | absl::string_view common_name = "test turn server") |
Niels Möller | 6dd4997 | 2021-11-24 14:05:55 +0100 | [diff] [blame] | 63 | : server_(thread), socket_factory_(socket_factory) { |
Benjamin Wright | d6f86e8 | 2018-05-08 13:12:25 -0700 | [diff] [blame] | 64 | AddInternalSocket(int_addr, int_protocol, ignore_bad_cert, common_name); |
Niels Möller | 9def994 | 2021-09-07 09:16:49 +0200 | [diff] [blame] | 65 | server_.SetExternalSocketFactory( |
Niels Möller | 6dd4997 | 2021-11-24 14:05:55 +0100 | [diff] [blame] | 66 | new rtc::BasicPacketSocketFactory(socket_factory), udp_ext_addr); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 67 | server_.set_realm(kTestRealm); |
| 68 | server_.set_software(kTestSoftware); |
| 69 | server_.set_auth_hook(this); |
| 70 | } |
| 71 | |
Sebastian Jansson | c01367d | 2019-04-08 15:20:44 +0200 | [diff] [blame] | 72 | ~TestTurnServer() { RTC_DCHECK(thread_checker_.IsCurrent()); } |
Seth Hampson | aed7164 | 2018-06-11 07:41:32 -0700 | [diff] [blame] | 73 | |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 74 | void set_enable_otu_nonce(bool enable) { |
Sebastian Jansson | c01367d | 2019-04-08 15:20:44 +0200 | [diff] [blame] | 75 | RTC_DCHECK(thread_checker_.IsCurrent()); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 76 | server_.set_enable_otu_nonce(enable); |
| 77 | } |
| 78 | |
Seth Hampson | aed7164 | 2018-06-11 07:41:32 -0700 | [diff] [blame] | 79 | TurnServer* server() { |
Sebastian Jansson | c01367d | 2019-04-08 15:20:44 +0200 | [diff] [blame] | 80 | RTC_DCHECK(thread_checker_.IsCurrent()); |
Seth Hampson | aed7164 | 2018-06-11 07:41:32 -0700 | [diff] [blame] | 81 | return &server_; |
| 82 | } |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 83 | |
| 84 | void set_redirect_hook(TurnRedirectInterface* redirect_hook) { |
Sebastian Jansson | c01367d | 2019-04-08 15:20:44 +0200 | [diff] [blame] | 85 | RTC_DCHECK(thread_checker_.IsCurrent()); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 86 | server_.set_redirect_hook(redirect_hook); |
| 87 | } |
| 88 | |
Taylor Brandstetter | ef18470 | 2016-06-23 17:35:47 -0700 | [diff] [blame] | 89 | void set_enable_permission_checks(bool enable) { |
Sebastian Jansson | c01367d | 2019-04-08 15:20:44 +0200 | [diff] [blame] | 90 | RTC_DCHECK(thread_checker_.IsCurrent()); |
Taylor Brandstetter | ef18470 | 2016-06-23 17:35:47 -0700 | [diff] [blame] | 91 | server_.set_enable_permission_checks(enable); |
| 92 | } |
| 93 | |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 94 | void AddInternalSocket(const rtc::SocketAddress& int_addr, |
Benjamin Wright | d6f86e8 | 2018-05-08 13:12:25 -0700 | [diff] [blame] | 95 | ProtocolType proto, |
| 96 | bool ignore_bad_cert = true, |
Ali Tofigh | de2ac5a | 2022-06-30 11:58:26 +0200 | [diff] [blame] | 97 | absl::string_view common_name = "test turn server") { |
Sebastian Jansson | c01367d | 2019-04-08 15:20:44 +0200 | [diff] [blame] | 98 | RTC_DCHECK(thread_checker_.IsCurrent()); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 99 | if (proto == cricket::PROTO_UDP) { |
Taylor Brandstetter | e5835f5 | 2016-09-16 15:07:50 -0700 | [diff] [blame] | 100 | server_.AddInternalSocket( |
Niels Möller | 6dd4997 | 2021-11-24 14:05:55 +0100 | [diff] [blame] | 101 | rtc::AsyncUDPSocket::Create(socket_factory_, int_addr), proto); |
Steve Anton | 786de70 | 2017-08-17 15:15:46 -0700 | [diff] [blame] | 102 | } else if (proto == cricket::PROTO_TCP || proto == cricket::PROTO_TLS) { |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 103 | // For TCP we need to create a server socket which can listen for incoming |
| 104 | // new connections. |
Niels Möller | 6dd4997 | 2021-11-24 14:05:55 +0100 | [diff] [blame] | 105 | rtc::Socket* socket = socket_factory_->CreateSocket(AF_INET, SOCK_STREAM); |
Niels Möller | ac9a288 | 2021-10-20 15:25:09 +0200 | [diff] [blame] | 106 | socket->Bind(int_addr); |
| 107 | socket->Listen(5); |
Steve Anton | 786de70 | 2017-08-17 15:15:46 -0700 | [diff] [blame] | 108 | if (proto == cricket::PROTO_TLS) { |
| 109 | // For TLS, wrap the TCP socket with an SSL adapter. The adapter must |
| 110 | // be configured with a self-signed certificate for testing. |
| 111 | // Additionally, the client will not present a valid certificate, so we |
| 112 | // must not fail when checking the peer's identity. |
Niels Möller | ac9a288 | 2021-10-20 15:25:09 +0200 | [diff] [blame] | 113 | std::unique_ptr<rtc::SSLAdapterFactory> ssl_adapter_factory = |
| 114 | rtc::SSLAdapterFactory::Create(); |
| 115 | ssl_adapter_factory->SetRole(rtc::SSL_SERVER); |
| 116 | ssl_adapter_factory->SetIdentity( |
Harald Alvestrand | 8515d5a | 2020-03-20 22:51:32 +0100 | [diff] [blame] | 117 | rtc::SSLIdentity::Create(common_name, rtc::KeyParams())); |
Niels Möller | ac9a288 | 2021-10-20 15:25:09 +0200 | [diff] [blame] | 118 | ssl_adapter_factory->SetIgnoreBadCert(ignore_bad_cert); |
| 119 | server_.AddInternalServerSocket(socket, proto, |
| 120 | std::move(ssl_adapter_factory)); |
| 121 | } else { |
| 122 | server_.AddInternalServerSocket(socket, proto); |
Steve Anton | 786de70 | 2017-08-17 15:15:46 -0700 | [diff] [blame] | 123 | } |
Steve Anton | 786de70 | 2017-08-17 15:15:46 -0700 | [diff] [blame] | 124 | } else { |
Artem Titov | d325196 | 2021-11-15 16:57:07 +0100 | [diff] [blame] | 125 | RTC_DCHECK_NOTREACHED() << "Unknown protocol type: " << proto; |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 126 | } |
| 127 | } |
| 128 | |
pthatcher@webrtc.org | 0ba1533 | 2015-01-10 00:47:02 +0000 | [diff] [blame] | 129 | // Finds the first allocation in the server allocation map with a source |
| 130 | // ip and port matching the socket address provided. |
| 131 | TurnServerAllocation* FindAllocation(const rtc::SocketAddress& src) { |
Sebastian Jansson | c01367d | 2019-04-08 15:20:44 +0200 | [diff] [blame] | 132 | RTC_DCHECK(thread_checker_.IsCurrent()); |
pthatcher@webrtc.org | 0ba1533 | 2015-01-10 00:47:02 +0000 | [diff] [blame] | 133 | const TurnServer::AllocationMap& map = server_.allocations(); |
| 134 | for (TurnServer::AllocationMap::const_iterator it = map.begin(); |
Yves Gerey | 665174f | 2018-06-19 15:03:05 +0200 | [diff] [blame] | 135 | it != map.end(); ++it) { |
pthatcher@webrtc.org | 0ba1533 | 2015-01-10 00:47:02 +0000 | [diff] [blame] | 136 | if (src == it->first.src()) { |
deadbeef | 9794366 | 2016-07-12 11:04:50 -0700 | [diff] [blame] | 137 | return it->second.get(); |
pthatcher@webrtc.org | 0ba1533 | 2015-01-10 00:47:02 +0000 | [diff] [blame] | 138 | } |
| 139 | } |
| 140 | return NULL; |
| 141 | } |
| 142 | |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 143 | private: |
| 144 | // For this test server, succeed if the password is the same as the username. |
| 145 | // Obviously, do not use this in a production environment. |
Ali Tofigh | de2ac5a | 2022-06-30 11:58:26 +0200 | [diff] [blame] | 146 | virtual bool GetKey(absl::string_view username, |
| 147 | absl::string_view realm, |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 148 | std::string* key) { |
Sebastian Jansson | c01367d | 2019-04-08 15:20:44 +0200 | [diff] [blame] | 149 | RTC_DCHECK(thread_checker_.IsCurrent()); |
Ali Tofigh | de2ac5a | 2022-06-30 11:58:26 +0200 | [diff] [blame] | 150 | return ComputeStunCredentialHash(std::string(username), std::string(realm), |
| 151 | std::string(username), key); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 152 | } |
| 153 | |
| 154 | TurnServer server_; |
Niels Möller | 6dd4997 | 2021-11-24 14:05:55 +0100 | [diff] [blame] | 155 | rtc::SocketFactory* socket_factory_; |
Artem Titov | c8421c4 | 2021-02-02 10:57:19 +0100 | [diff] [blame] | 156 | webrtc::SequenceChecker thread_checker_; |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 157 | }; |
| 158 | |
| 159 | } // namespace cricket |
| 160 | |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 161 | #endif // P2P_BASE_TEST_TURN_SERVER_H_ |