deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2017 The WebRTC project authors. All Rights Reserved. |
| 3 | * |
| 4 | * Use of this source code is governed by a BSD-style license |
| 5 | * that can be found in the LICENSE file in the root of the source |
| 6 | * tree. An additional intellectual property rights grant can be found |
| 7 | * in the file PATENTS. All contributing project authors may |
| 8 | * be found in the AUTHORS file in the root of the source tree. |
| 9 | */ |
| 10 | |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 11 | #include "pc/ice_server_parsing.h" |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 12 | |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 13 | #include <stddef.h> |
Jonas Olsson | a4d8737 | 2019-07-05 19:08:33 +0200 | [diff] [blame] | 14 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 15 | #include <cctype> // For std::isdigit. |
| 16 | #include <string> |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 17 | #include <tuple> |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 18 | |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 19 | #include "p2p/base/port_interface.h" |
Mirko Bonadei | 92ea95e | 2017-09-15 06:47:31 +0200 | [diff] [blame] | 20 | #include "rtc_base/arraysize.h" |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 21 | #include "rtc_base/checks.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 22 | #include "rtc_base/ip_address.h" |
Yves Gerey | 3e70781 | 2018-11-28 16:47:49 +0100 | [diff] [blame] | 23 | #include "rtc_base/logging.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 24 | #include "rtc_base/socket_address.h" |
Harald Alvestrand | 5761e7b | 2021-01-29 14:45:08 +0000 | [diff] [blame] | 25 | #include "rtc_base/string_encode.h" |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 26 | #include "rtc_base/string_to_number.h" |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 27 | |
| 28 | namespace webrtc { |
| 29 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 30 | namespace { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 31 | // Number of tokens must be preset when TURN uri has transport param. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 32 | const size_t kTurnTransportTokensNum = 2; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 33 | // The default stun port. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 34 | const int kDefaultStunPort = 3478; |
| 35 | const int kDefaultStunTlsPort = 5349; |
| 36 | const char kTransport[] = "transport"; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 37 | |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 38 | // Allowed characters in hostname per RFC 3986 Appendix A "reg-name" |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 39 | const char kRegNameCharacters[] = |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 40 | "abcdefghijklmnopqrstuvwxyz" |
| 41 | "ABCDEFGHIJKLMNOPQRSTUVWXYZ" |
| 42 | "0123456789" |
| 43 | "-._~" // unreserved |
| 44 | "%" // pct-encoded |
| 45 | "!$&'()*+,;="; // sub-delims |
| 46 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 47 | // NOTE: Must be in the same order as the ServiceType enum. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 48 | const char* kValidIceServiceTypes[] = {"stun", "stuns", "turn", "turns"}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 49 | |
| 50 | // NOTE: A loop below assumes that the first value of this enum is 0 and all |
| 51 | // other values are incremental. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 52 | enum class ServiceType { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 53 | STUN = 0, // Indicates a STUN server. |
| 54 | STUNS, // Indicates a STUN server used with a TLS session. |
| 55 | TURN, // Indicates a TURN server |
| 56 | TURNS, // Indicates a TURN server used with a TLS session. |
| 57 | INVALID, // Unknown. |
| 58 | }; |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 59 | static_assert(static_cast<size_t>(ServiceType::INVALID) == |
| 60 | arraysize(kValidIceServiceTypes), |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 61 | "kValidIceServiceTypes must have as many strings as ServiceType " |
| 62 | "has values."); |
| 63 | |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 64 | // `in_str` should follow of RFC 7064/7065 syntax, but with an optional |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 65 | // "?transport=" already stripped. I.e., |
| 66 | // stunURI = scheme ":" host [ ":" port ] |
| 67 | // scheme = "stun" / "stuns" / "turn" / "turns" |
| 68 | // host = IP-literal / IPv4address / reg-name |
| 69 | // port = *DIGIT |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 70 | |
| 71 | // Return tuple is service_type, host, with service_type == ServiceType::INVALID |
| 72 | // on failure. |
| 73 | std::tuple<ServiceType, absl::string_view> GetServiceTypeAndHostnameFromUri( |
| 74 | absl::string_view in_str) { |
| 75 | const auto colonpos = in_str.find(':'); |
| 76 | if (colonpos == absl::string_view::npos) { |
Mirko Bonadei | 675513b | 2017-11-09 11:09:25 +0100 | [diff] [blame] | 77 | RTC_LOG(LS_WARNING) << "Missing ':' in ICE URI: " << in_str; |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 78 | return {ServiceType::INVALID, ""}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 79 | } |
| 80 | if ((colonpos + 1) == in_str.length()) { |
Mirko Bonadei | 675513b | 2017-11-09 11:09:25 +0100 | [diff] [blame] | 81 | RTC_LOG(LS_WARNING) << "Empty hostname in ICE URI: " << in_str; |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 82 | return {ServiceType::INVALID, ""}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 83 | } |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 84 | for (size_t i = 0; i < arraysize(kValidIceServiceTypes); ++i) { |
| 85 | if (in_str.compare(0, colonpos, kValidIceServiceTypes[i]) == 0) { |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 86 | return {static_cast<ServiceType>(i), in_str.substr(colonpos + 1)}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 87 | } |
| 88 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 89 | return {ServiceType::INVALID, ""}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 90 | } |
| 91 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 92 | absl::optional<int> ParsePort(absl::string_view in_str) { |
| 93 | // Make sure port only contains digits. StringToNumber doesn't check this. |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 94 | for (const char& c : in_str) { |
Niels Möller | e66b83f | 2022-05-30 12:57:41 +0200 | [diff] [blame] | 95 | if (!std::isdigit(static_cast<unsigned char>(c))) { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 96 | return false; |
| 97 | } |
| 98 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 99 | return rtc::StringToNumber<int>(in_str); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 100 | } |
| 101 | |
| 102 | // This method parses IPv6 and IPv4 literal strings, along with hostnames in |
| 103 | // standard hostname:port format. |
| 104 | // Consider following formats as correct. |
Artem Titov | cfea218 | 2021-08-10 01:22:31 +0200 | [diff] [blame] | 105 | // `hostname:port`, |[IPV6 address]:port|, |IPv4 address|:port, |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 106 | // `hostname`, |[IPv6 address]|, |IPv4 address|. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 107 | |
| 108 | // Return tuple is success, host, port. |
| 109 | std::tuple<bool, absl::string_view, int> ParseHostnameAndPortFromString( |
| 110 | absl::string_view in_str, |
| 111 | int default_port) { |
| 112 | if (in_str.empty()) { |
| 113 | return {false, "", 0}; |
| 114 | } |
| 115 | absl::string_view host; |
| 116 | int port = default_port; |
| 117 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 118 | if (in_str.at(0) == '[') { |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 119 | // IP_literal syntax |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 120 | auto closebracket = in_str.rfind(']'); |
| 121 | if (closebracket == absl::string_view::npos) { |
| 122 | return {false, "", 0}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 123 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 124 | auto colonpos = in_str.find(':', closebracket); |
| 125 | if (absl::string_view::npos != colonpos) { |
| 126 | if (absl::optional<int> opt_port = |
| 127 | ParsePort(in_str.substr(closebracket + 2))) { |
| 128 | port = *opt_port; |
| 129 | } else { |
| 130 | return {false, "", 0}; |
| 131 | } |
| 132 | } |
| 133 | host = in_str.substr(1, closebracket - 1); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 134 | } else { |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 135 | // IPv4address or reg-name syntax |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 136 | auto colonpos = in_str.find(':'); |
| 137 | if (absl::string_view::npos != colonpos) { |
| 138 | if (absl::optional<int> opt_port = |
| 139 | ParsePort(in_str.substr(colonpos + 1))) { |
| 140 | port = *opt_port; |
| 141 | } else { |
| 142 | return {false, "", 0}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 143 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 144 | host = in_str.substr(0, colonpos); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 145 | } else { |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 146 | host = in_str; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 147 | } |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 148 | // RFC 3986 section 3.2.2 and Appendix A - "reg-name" syntax |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 149 | if (host.find_first_not_of(kRegNameCharacters) != absl::string_view::npos) { |
| 150 | return {false, "", 0}; |
Harald Alvestrand | a3dd772 | 2020-11-27 08:05:42 +0000 | [diff] [blame] | 151 | } |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 152 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 153 | return {!host.empty(), host, port}; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 154 | } |
| 155 | |
| 156 | // Adds a STUN or TURN server to the appropriate list, |
Artem Titov | 880fa81 | 2021-07-30 22:30:23 +0200 | [diff] [blame] | 157 | // by parsing `url` and using the username/password in `server`. |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 158 | RTCError ParseIceServerUrl( |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 159 | const PeerConnectionInterface::IceServer& server, |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 160 | absl::string_view url, |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 161 | cricket::ServerAddresses* stun_servers, |
| 162 | std::vector<cricket::RelayServerConfig>* turn_servers) { |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 163 | // RFC 7064 |
| 164 | // stunURI = scheme ":" host [ ":" port ] |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 165 | // scheme = "stun" / "stuns" |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 166 | |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 167 | // RFC 7065 |
| 168 | // turnURI = scheme ":" host [ ":" port ] |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 169 | // [ "?transport=" transport ] |
| 170 | // scheme = "turn" / "turns" |
| 171 | // transport = "udp" / "tcp" / transport-ext |
| 172 | // transport-ext = 1*unreserved |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 173 | |
| 174 | // RFC 3986 |
| 175 | // host = IP-literal / IPv4address / reg-name |
| 176 | // port = *DIGIT |
| 177 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 178 | RTC_DCHECK(stun_servers != nullptr); |
| 179 | RTC_DCHECK(turn_servers != nullptr); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 180 | cricket::ProtocolType turn_transport_type = cricket::PROTO_UDP; |
| 181 | RTC_DCHECK(!url.empty()); |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 182 | std::vector<absl::string_view> tokens = rtc::split(url, '?'); |
| 183 | absl::string_view uri_without_transport = tokens[0]; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 184 | // Let's look into transport= param, if it exists. |
| 185 | if (tokens.size() == kTurnTransportTokensNum) { // ?transport= is present. |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 186 | std::vector<absl::string_view> transport_tokens = |
| 187 | rtc::split(tokens[1], '='); |
| 188 | if (transport_tokens[0] != kTransport) { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 189 | LOG_AND_RETURN_ERROR( |
| 190 | RTCErrorType::SYNTAX_ERROR, |
| 191 | "ICE server parsing failed: Invalid transport parameter key."); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 192 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 193 | if (transport_tokens.size() < 2) { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 194 | LOG_AND_RETURN_ERROR( |
| 195 | RTCErrorType::SYNTAX_ERROR, |
| 196 | "ICE server parsing failed: Transport parameter missing value."); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 197 | } |
Niels Möller | 4662f53 | 2022-05-20 15:44:37 +0200 | [diff] [blame] | 198 | |
| 199 | absl::optional<cricket::ProtocolType> proto = |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 200 | cricket::StringToProto(transport_tokens[1]); |
Niels Möller | 4662f53 | 2022-05-20 15:44:37 +0200 | [diff] [blame] | 201 | if (!proto || |
| 202 | (*proto != cricket::PROTO_UDP && *proto != cricket::PROTO_TCP)) { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 203 | LOG_AND_RETURN_ERROR( |
| 204 | RTCErrorType::SYNTAX_ERROR, |
| 205 | "ICE server parsing failed: Transport parameter should " |
| 206 | "always be udp or tcp."); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 207 | } |
Niels Möller | 4662f53 | 2022-05-20 15:44:37 +0200 | [diff] [blame] | 208 | turn_transport_type = *proto; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 209 | } |
| 210 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 211 | auto [service_type, hoststring] = |
| 212 | GetServiceTypeAndHostnameFromUri(uri_without_transport); |
| 213 | if (service_type == ServiceType::INVALID) { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 214 | RTC_LOG(LS_ERROR) << "Invalid transport parameter in ICE URI: " << url; |
| 215 | LOG_AND_RETURN_ERROR( |
| 216 | RTCErrorType::SYNTAX_ERROR, |
| 217 | "ICE server parsing failed: Invalid transport parameter in ICE URI"); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 218 | } |
| 219 | |
| 220 | // GetServiceTypeAndHostnameFromUri should never give an empty hoststring |
| 221 | RTC_DCHECK(!hoststring.empty()); |
| 222 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 223 | int default_port = kDefaultStunPort; |
| 224 | if (service_type == ServiceType::TURNS) { |
| 225 | default_port = kDefaultStunTlsPort; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 226 | turn_transport_type = cricket::PROTO_TLS; |
| 227 | } |
| 228 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 229 | if (hoststring.find('@') != absl::string_view::npos) { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 230 | RTC_LOG(LS_ERROR) << "Invalid url with long deprecated user@host syntax: " |
| 231 | << uri_without_transport; |
| 232 | LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR, |
| 233 | "ICE server parsing failed: Invalid url with long " |
| 234 | "deprecated user@host syntax"); |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 235 | } |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 236 | |
| 237 | auto [success, address, port] = |
| 238 | ParseHostnameAndPortFromString(hoststring, default_port); |
| 239 | if (!success) { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 240 | RTC_LOG(LS_ERROR) << "Invalid hostname format: " << uri_without_transport; |
| 241 | LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR, |
| 242 | "ICE server parsing failed: Invalid hostname format"); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 243 | } |
| 244 | |
| 245 | if (port <= 0 || port > 0xffff) { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 246 | RTC_LOG(LS_ERROR) << "Invalid port: " << port; |
| 247 | LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR, |
| 248 | "ICE server parsing failed: Invalid port"); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 249 | } |
| 250 | |
| 251 | switch (service_type) { |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 252 | case ServiceType::STUN: |
| 253 | case ServiceType::STUNS: |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 254 | stun_servers->insert(rtc::SocketAddress(address, port)); |
| 255 | break; |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 256 | case ServiceType::TURN: |
| 257 | case ServiceType::TURNS: { |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 258 | if (server.username.empty() || server.password.empty()) { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 259 | // The WebRTC spec requires throwing an InvalidAccessError when username |
| 260 | // or credential are ommitted; this is the native equivalent. |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 261 | LOG_AND_RETURN_ERROR( |
| 262 | RTCErrorType::INVALID_PARAMETER, |
| 263 | "ICE server parsing failed: TURN server with empty " |
| 264 | "username or password"); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 265 | } |
Emad Omara | dab1d2d | 2017-06-16 15:43:11 -0700 | [diff] [blame] | 266 | // If the hostname field is not empty, then the server address must be |
| 267 | // the resolved IP for that host, the hostname is needed later for TLS |
| 268 | // handshake (SNI and Certificate verification). |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 269 | absl::string_view hostname = |
Emad Omara | dab1d2d | 2017-06-16 15:43:11 -0700 | [diff] [blame] | 270 | server.hostname.empty() ? address : server.hostname; |
| 271 | rtc::SocketAddress socket_address(hostname, port); |
| 272 | if (!server.hostname.empty()) { |
| 273 | rtc::IPAddress ip; |
| 274 | if (!IPFromString(address, &ip)) { |
| 275 | // When hostname is set, the server address must be a |
| 276 | // resolved ip address. |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 277 | LOG_AND_RETURN_ERROR( |
| 278 | RTCErrorType::INVALID_PARAMETER, |
| 279 | "ICE server parsing failed: " |
| 280 | "IceServer has hostname field set, but URI does not " |
| 281 | "contain an IP address."); |
Emad Omara | dab1d2d | 2017-06-16 15:43:11 -0700 | [diff] [blame] | 282 | } |
| 283 | socket_address.SetResolvedIP(ip); |
| 284 | } |
Niels Möller | db4def9 | 2019-03-18 16:53:59 +0100 | [diff] [blame] | 285 | cricket::RelayServerConfig config = |
| 286 | cricket::RelayServerConfig(socket_address, server.username, |
| 287 | server.password, turn_transport_type); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 288 | if (server.tls_cert_policy == |
| 289 | PeerConnectionInterface::kTlsCertPolicyInsecureNoCheck) { |
Sergey Silkin | 9c147dd | 2018-09-12 10:45:38 +0000 | [diff] [blame] | 290 | config.tls_cert_policy = |
| 291 | cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK; |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 292 | } |
Sergey Silkin | 9c147dd | 2018-09-12 10:45:38 +0000 | [diff] [blame] | 293 | config.tls_alpn_protocols = server.tls_alpn_protocols; |
| 294 | config.tls_elliptic_curves = server.tls_elliptic_curves; |
Diogo Real | 1dca9d5 | 2017-08-29 12:18:32 -0700 | [diff] [blame] | 295 | |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 296 | turn_servers->push_back(config); |
| 297 | break; |
| 298 | } |
| 299 | default: |
| 300 | // We shouldn't get to this point with an invalid service_type, we should |
| 301 | // have returned an error already. |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 302 | LOG_AND_RETURN_ERROR( |
| 303 | RTCErrorType::INTERNAL_ERROR, |
| 304 | "ICE server parsing failed: Unexpected service type"); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 305 | } |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 306 | return RTCError::OK(); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 307 | } |
| 308 | |
Niels Möller | 6d12262 | 2022-06-03 13:51:21 +0200 | [diff] [blame] | 309 | } // namespace |
| 310 | |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 311 | RTCError ParseIceServersOrError( |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 312 | const PeerConnectionInterface::IceServers& servers, |
| 313 | cricket::ServerAddresses* stun_servers, |
| 314 | std::vector<cricket::RelayServerConfig>* turn_servers) { |
| 315 | for (const PeerConnectionInterface::IceServer& server : servers) { |
| 316 | if (!server.urls.empty()) { |
| 317 | for (const std::string& url : server.urls) { |
| 318 | if (url.empty()) { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 319 | LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR, |
| 320 | "ICE server parsing failed: Empty uri."); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 321 | } |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 322 | RTCError err = |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 323 | ParseIceServerUrl(server, url, stun_servers, turn_servers); |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 324 | if (!err.ok()) { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 325 | return err; |
| 326 | } |
| 327 | } |
| 328 | } else if (!server.uri.empty()) { |
| 329 | // Fallback to old .uri if new .urls isn't present. |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 330 | RTCError err = |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 331 | ParseIceServerUrl(server, server.uri, stun_servers, turn_servers); |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 332 | |
| 333 | if (!err.ok()) { |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 334 | return err; |
| 335 | } |
| 336 | } else { |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 337 | LOG_AND_RETURN_ERROR(RTCErrorType::SYNTAX_ERROR, |
| 338 | "ICE server parsing failed: Empty uri."); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 339 | } |
| 340 | } |
Philipp Hancke | 633dc2f | 2022-10-12 10:16:14 +0200 | [diff] [blame] | 341 | return RTCError::OK(); |
| 342 | } |
| 343 | |
| 344 | RTCErrorType ParseIceServers( |
| 345 | const PeerConnectionInterface::IceServers& servers, |
| 346 | cricket::ServerAddresses* stun_servers, |
| 347 | std::vector<cricket::RelayServerConfig>* turn_servers) { |
| 348 | return ParseIceServersOrError(servers, stun_servers, turn_servers).type(); |
deadbeef | 1dcb164 | 2017-03-29 21:08:16 -0700 | [diff] [blame] | 349 | } |
| 350 | |
| 351 | } // namespace webrtc |