2022-03-10 09:44:48 +00:00
|
|
|
package ice
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
2024-01-18 18:54:54 +00:00
|
|
|
"errors"
|
2022-03-10 09:44:48 +00:00
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"reflect"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pion/dtls/v2"
|
|
|
|
"github.com/pion/logging"
|
|
|
|
"github.com/pion/turn/v2"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
stunGatherTimeout = time.Second * 5
|
|
|
|
)
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
type closeable interface {
|
|
|
|
Close() error
|
|
|
|
}
|
|
|
|
|
2022-03-10 09:44:48 +00:00
|
|
|
// Close a net.Conn and log if we have a failure
|
2024-01-18 18:54:54 +00:00
|
|
|
func closeConnAndLog(c closeable, log logging.LeveledLogger, msg string) {
|
2022-03-10 09:44:48 +00:00
|
|
|
if c == nil || (reflect.ValueOf(c).Kind() == reflect.Ptr && reflect.ValueOf(c).IsNil()) {
|
2024-01-18 18:54:54 +00:00
|
|
|
log.Warnf("Conn is not allocated (%s)", msg)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Warnf(msg)
|
|
|
|
if err := c.Close(); err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
log.Warnf("Failed to close conn: %v", err)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
// fakePacketConn wraps a net.Conn and emulates net.PacketConn
|
|
|
|
type fakePacketConn struct {
|
|
|
|
nextConn net.Conn
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f *fakePacketConn) ReadFrom(p []byte) (n int, addr net.Addr, err error) {
|
|
|
|
n, err = f.nextConn.Read(p)
|
|
|
|
addr = f.nextConn.RemoteAddr()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
func (f *fakePacketConn) Close() error { return f.nextConn.Close() }
|
|
|
|
func (f *fakePacketConn) LocalAddr() net.Addr { return f.nextConn.LocalAddr() }
|
|
|
|
func (f *fakePacketConn) SetDeadline(t time.Time) error { return f.nextConn.SetDeadline(t) }
|
|
|
|
func (f *fakePacketConn) SetReadDeadline(t time.Time) error { return f.nextConn.SetReadDeadline(t) }
|
|
|
|
func (f *fakePacketConn) SetWriteDeadline(t time.Time) error { return f.nextConn.SetWriteDeadline(t) }
|
|
|
|
func (f *fakePacketConn) WriteTo(p []byte, addr net.Addr) (n int, err error) {
|
|
|
|
return f.nextConn.Write(p)
|
|
|
|
}
|
|
|
|
|
2022-03-10 09:44:48 +00:00
|
|
|
// GatherCandidates initiates the trickle based gathering process.
|
|
|
|
func (a *Agent) GatherCandidates() error {
|
|
|
|
var gatherErr error
|
|
|
|
|
|
|
|
if runErr := a.run(a.context(), func(ctx context.Context, agent *Agent) {
|
|
|
|
if a.gatheringState != GatheringStateNew {
|
|
|
|
gatherErr = ErrMultipleGatherAttempted
|
|
|
|
return
|
|
|
|
} else if a.onCandidateHdlr.Load() == nil {
|
|
|
|
gatherErr = ErrNoOnCandidateHandler
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
a.gatherCandidateCancel() // Cancel previous gathering routine
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
a.gatherCandidateCancel = cancel
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
go a.gatherCandidates(ctx)
|
2022-03-10 09:44:48 +00:00
|
|
|
}); runErr != nil {
|
|
|
|
return runErr
|
|
|
|
}
|
|
|
|
return gatherErr
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
func (a *Agent) gatherCandidates(ctx context.Context) {
|
|
|
|
if err := a.setGatheringState(GatheringStateGathering); err != nil {
|
|
|
|
a.log.Warnf("failed to set gatheringState to GatheringStateGathering: %v", err)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
for _, t := range a.candidateTypes {
|
|
|
|
switch t {
|
|
|
|
case CandidateTypeHost:
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
a.gatherCandidatesLocal(ctx, a.networkTypes)
|
|
|
|
wg.Done()
|
|
|
|
}()
|
|
|
|
case CandidateTypeServerReflexive:
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.gatherCandidatesSrflx(ctx, a.urls, a.networkTypes)
|
2022-03-10 09:44:48 +00:00
|
|
|
wg.Done()
|
|
|
|
}()
|
|
|
|
if a.extIPMapper != nil && a.extIPMapper.candidateType == CandidateTypeServerReflexive {
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
a.gatherCandidatesSrflxMapped(ctx, a.networkTypes)
|
|
|
|
wg.Done()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
case CandidateTypeRelay:
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
a.gatherCandidatesRelay(ctx, a.urls)
|
|
|
|
wg.Done()
|
|
|
|
}()
|
|
|
|
case CandidateTypePeerReflexive, CandidateTypeUnspecified:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Block until all STUN and TURN URLs have been gathered (or timed out)
|
|
|
|
wg.Wait()
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
if err := a.setGatheringState(GatheringStateComplete); err != nil {
|
|
|
|
a.log.Warnf("failed to set gatheringState to GatheringStateComplete: %v", err)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *Agent) gatherCandidatesLocal(ctx context.Context, networkTypes []NetworkType) { //nolint:gocognit
|
|
|
|
networks := map[string]struct{}{}
|
|
|
|
for _, networkType := range networkTypes {
|
|
|
|
if networkType.IsTCP() {
|
|
|
|
networks[tcp] = struct{}{}
|
|
|
|
} else {
|
|
|
|
networks[udp] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
// when UDPMux is enabled, skip other UDP candidates
|
2022-03-10 09:44:48 +00:00
|
|
|
if a.udpMux != nil {
|
|
|
|
if err := a.gatherCandidatesLocalUDPMux(ctx); err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("could not create host candidate for UDPMux")
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
delete(networks, udp)
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
localIPs, err := localInterfaces(a.net, a.interfaceFilter, networkTypes)
|
2022-03-10 09:44:48 +00:00
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("failed to iterate local interfaces, host candidates will not be gathered %s", err)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ip := range localIPs {
|
|
|
|
mappedIP := ip
|
|
|
|
if a.mDNSMode != MulticastDNSModeQueryAndGather && a.extIPMapper != nil && a.extIPMapper.candidateType == CandidateTypeHost {
|
2024-01-18 18:54:54 +00:00
|
|
|
if _mappedIP, err := a.extIPMapper.findExternalIP(ip.String()); err == nil {
|
2022-03-10 09:44:48 +00:00
|
|
|
mappedIP = _mappedIP
|
|
|
|
} else {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("1:1 NAT mapping is enabled but no external IP is found for %s\n", ip.String())
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
address := mappedIP.String()
|
|
|
|
if a.mDNSMode == MulticastDNSModeQueryAndGather {
|
|
|
|
address = a.mDNSName
|
|
|
|
}
|
|
|
|
|
|
|
|
for network := range networks {
|
2024-01-18 18:54:54 +00:00
|
|
|
var port int
|
|
|
|
var conn net.PacketConn
|
|
|
|
var err error
|
|
|
|
var tcpType TCPType
|
2022-03-10 09:44:48 +00:00
|
|
|
|
|
|
|
switch network {
|
|
|
|
case tcp:
|
|
|
|
// Handle ICE TCP passive mode
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Debugf("GetConn by ufrag: %s\n", a.localUfrag)
|
|
|
|
conn, err = a.tcpMux.GetConnByUfrag(a.localUfrag)
|
|
|
|
if err != nil {
|
|
|
|
if !errors.Is(err, ErrTCPMuxNotInitialized) {
|
|
|
|
a.log.Warnf("error getting tcp conn by ufrag: %s %s %s\n", network, ip, a.localUfrag)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
port = conn.LocalAddr().(*net.TCPAddr).Port
|
2022-03-10 09:44:48 +00:00
|
|
|
tcpType = TCPTypePassive
|
2024-01-18 18:54:54 +00:00
|
|
|
// is there a way to verify that the listen address is even
|
2022-03-10 09:44:48 +00:00
|
|
|
// accessible from the current interface.
|
|
|
|
case udp:
|
2024-01-18 18:54:54 +00:00
|
|
|
conn, err = listenUDPInPortRange(a.net, a.log, int(a.portmax), int(a.portmin), network, &net.UDPAddr{IP: ip, Port: 0})
|
2022-03-10 09:44:48 +00:00
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("could not listen %s %s\n", network, ip)
|
2022-03-10 09:44:48 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
port = conn.LocalAddr().(*net.UDPAddr).Port
|
|
|
|
}
|
|
|
|
hostConfig := CandidateHostConfig{
|
|
|
|
Network: network,
|
|
|
|
Address: address,
|
|
|
|
Port: port,
|
|
|
|
Component: ComponentRTP,
|
|
|
|
TCPType: tcpType,
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
c, err := NewCandidateHost(&hostConfig)
|
|
|
|
if err != nil {
|
|
|
|
closeConnAndLog(conn, a.log, fmt.Sprintf("Failed to create host candidate: %s %s %d: %v\n", network, mappedIP, port, err))
|
|
|
|
continue
|
|
|
|
}
|
2022-03-10 09:44:48 +00:00
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
if a.mDNSMode == MulticastDNSModeQueryAndGather {
|
|
|
|
if err = c.setIP(ip); err != nil {
|
|
|
|
closeConnAndLog(conn, a.log, fmt.Sprintf("Failed to create host candidate: %s %s %d: %v\n", network, mappedIP, port, err))
|
2022-03-10 09:44:48 +00:00
|
|
|
continue
|
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
}
|
2022-03-10 09:44:48 +00:00
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
if err := a.addCandidate(ctx, c, conn); err != nil {
|
|
|
|
if closeErr := c.close(); closeErr != nil {
|
|
|
|
a.log.Warnf("Failed to close candidate: %v", closeErr)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v\n", err)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
func (a *Agent) gatherCandidatesLocalUDPMux(ctx context.Context) error {
|
2022-03-10 09:44:48 +00:00
|
|
|
if a.udpMux == nil {
|
|
|
|
return errUDPMuxDisabled
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
localIPs, err := localInterfaces(a.net, a.interfaceFilter, []NetworkType{NetworkTypeUDP4})
|
|
|
|
switch {
|
|
|
|
case err != nil:
|
|
|
|
return err
|
|
|
|
case len(localIPs) == 0:
|
|
|
|
return errCandidateIPNotFound
|
|
|
|
}
|
2022-03-10 09:44:48 +00:00
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
for _, candidateIP := range localIPs {
|
2022-03-10 09:44:48 +00:00
|
|
|
if a.extIPMapper != nil && a.extIPMapper.candidateType == CandidateTypeHost {
|
2024-01-18 18:54:54 +00:00
|
|
|
if mappedIP, err := a.extIPMapper.findExternalIP(candidateIP.String()); err != nil {
|
2022-03-10 09:44:48 +00:00
|
|
|
a.log.Warnf("1:1 NAT mapping is enabled but no external IP is found for %s", candidateIP.String())
|
|
|
|
continue
|
2024-01-18 18:54:54 +00:00
|
|
|
} else {
|
|
|
|
candidateIP = mappedIP
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
}
|
2022-03-10 09:44:48 +00:00
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
conn, err := a.udpMux.GetConn(a.localUfrag)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
port := conn.LocalAddr().(*net.UDPAddr).Port
|
2022-03-10 09:44:48 +00:00
|
|
|
|
|
|
|
hostConfig := CandidateHostConfig{
|
|
|
|
Network: udp,
|
|
|
|
Address: candidateIP.String(),
|
2024-01-18 18:54:54 +00:00
|
|
|
Port: port,
|
2022-03-10 09:44:48 +00:00
|
|
|
Component: ComponentRTP,
|
|
|
|
}
|
|
|
|
|
|
|
|
c, err := NewCandidateHost(&hostConfig)
|
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(conn, a.log, fmt.Sprintf("Failed to create host mux candidate: %s %d: %v\n", candidateIP, port, err))
|
|
|
|
// already logged error
|
|
|
|
return nil
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := a.addCandidate(ctx, c, conn); err != nil {
|
|
|
|
if closeErr := c.close(); closeErr != nil {
|
|
|
|
a.log.Warnf("Failed to close candidate: %v", closeErr)
|
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
return err
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *Agent) gatherCandidatesSrflxMapped(ctx context.Context, networkTypes []NetworkType) {
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
defer wg.Wait()
|
|
|
|
|
|
|
|
for _, networkType := range networkTypes {
|
|
|
|
if networkType.IsTCP() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
network := networkType.String()
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
conn, err := listenUDPInPortRange(a.net, a.log, int(a.portmax), int(a.portmin), network, &net.UDPAddr{IP: nil, Port: 0})
|
2022-03-10 09:44:48 +00:00
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to listen %s: %v\n", network, err)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
laddr := conn.LocalAddr().(*net.UDPAddr)
|
|
|
|
mappedIP, err := a.extIPMapper.findExternalIP(laddr.IP.String())
|
2022-03-10 09:44:48 +00:00
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(conn, a.log, fmt.Sprintf("1:1 NAT mapping is enabled but no external IP is found for %s\n", laddr.IP.String()))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
srflxConfig := CandidateServerReflexiveConfig{
|
|
|
|
Network: network,
|
|
|
|
Address: mappedIP.String(),
|
2024-01-18 18:54:54 +00:00
|
|
|
Port: laddr.Port,
|
2022-03-10 09:44:48 +00:00
|
|
|
Component: ComponentRTP,
|
2024-01-18 18:54:54 +00:00
|
|
|
RelAddr: laddr.IP.String(),
|
|
|
|
RelPort: laddr.Port,
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
c, err := NewCandidateServerReflexive(&srflxConfig)
|
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(conn, a.log, fmt.Sprintf("Failed to create server reflexive candidate: %s %s %d: %v\n",
|
2022-03-10 09:44:48 +00:00
|
|
|
network,
|
|
|
|
mappedIP.String(),
|
2024-01-18 18:54:54 +00:00
|
|
|
laddr.Port,
|
|
|
|
err))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := a.addCandidate(ctx, c, conn); err != nil {
|
|
|
|
if closeErr := c.close(); closeErr != nil {
|
|
|
|
a.log.Warnf("Failed to close candidate: %v", closeErr)
|
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v\n", err)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
func (a *Agent) gatherCandidatesSrflx(ctx context.Context, urls []*URL, networkTypes []NetworkType) {
|
2022-03-10 09:44:48 +00:00
|
|
|
var wg sync.WaitGroup
|
|
|
|
defer wg.Wait()
|
|
|
|
|
|
|
|
for _, networkType := range networkTypes {
|
|
|
|
if networkType.IsTCP() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := range urls {
|
|
|
|
wg.Add(1)
|
2024-01-18 18:54:54 +00:00
|
|
|
go func(url URL, network string) {
|
2022-03-10 09:44:48 +00:00
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
hostPort := fmt.Sprintf("%s:%d", url.Host, url.Port)
|
|
|
|
serverAddr, err := a.net.ResolveUDPAddr(network, hostPort)
|
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("failed to resolve stun host: %s: %v", hostPort, err)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
conn, err := listenUDPInPortRange(a.net, a.log, int(a.portmax), int(a.portmin), network, &net.UDPAddr{IP: nil, Port: 0})
|
2022-03-10 09:44:48 +00:00
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(conn, a.log, fmt.Sprintf("Failed to listen for %s: %v\n", serverAddr.String(), err))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
xoraddr, err := getXORMappedAddr(conn, serverAddr, stunGatherTimeout)
|
2022-03-10 09:44:48 +00:00
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(conn, a.log, fmt.Sprintf("could not get server reflexive address %s %s: %v\n", network, url, err))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
ip := xoraddr.IP
|
|
|
|
port := xoraddr.Port
|
2022-03-10 09:44:48 +00:00
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
laddr := conn.LocalAddr().(*net.UDPAddr)
|
2022-03-10 09:44:48 +00:00
|
|
|
srflxConfig := CandidateServerReflexiveConfig{
|
|
|
|
Network: network,
|
|
|
|
Address: ip.String(),
|
|
|
|
Port: port,
|
|
|
|
Component: ComponentRTP,
|
2024-01-18 18:54:54 +00:00
|
|
|
RelAddr: laddr.IP.String(),
|
|
|
|
RelPort: laddr.Port,
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
c, err := NewCandidateServerReflexive(&srflxConfig)
|
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(conn, a.log, fmt.Sprintf("Failed to create server reflexive candidate: %s %s %d: %v\n", network, ip, port, err))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := a.addCandidate(ctx, c, conn); err != nil {
|
|
|
|
if closeErr := c.close(); closeErr != nil {
|
|
|
|
a.log.Warnf("Failed to close candidate: %v", closeErr)
|
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v\n", err)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}(*urls[i], networkType.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
func (a *Agent) gatherCandidatesRelay(ctx context.Context, urls []*URL) { //nolint:gocognit
|
2022-03-10 09:44:48 +00:00
|
|
|
var wg sync.WaitGroup
|
|
|
|
defer wg.Wait()
|
|
|
|
|
|
|
|
network := NetworkTypeUDP4.String()
|
|
|
|
for i := range urls {
|
|
|
|
switch {
|
2024-01-18 18:54:54 +00:00
|
|
|
case urls[i].Scheme != SchemeTypeTURN && urls[i].Scheme != SchemeTypeTURNS:
|
2022-03-10 09:44:48 +00:00
|
|
|
continue
|
|
|
|
case urls[i].Username == "":
|
|
|
|
a.log.Errorf("Failed to gather relay candidates: %v", ErrUsernameEmpty)
|
|
|
|
return
|
|
|
|
case urls[i].Password == "":
|
|
|
|
a.log.Errorf("Failed to gather relay candidates: %v", ErrPasswordEmpty)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
wg.Add(1)
|
2024-01-18 18:54:54 +00:00
|
|
|
go func(url URL) {
|
2022-03-10 09:44:48 +00:00
|
|
|
defer wg.Done()
|
2024-01-18 18:54:54 +00:00
|
|
|
TURNServerAddr := fmt.Sprintf("%s:%d", url.Host, url.Port)
|
2022-03-10 09:44:48 +00:00
|
|
|
var (
|
|
|
|
locConn net.PacketConn
|
|
|
|
err error
|
2024-01-18 18:54:54 +00:00
|
|
|
RelAddr string
|
|
|
|
RelPort int
|
2022-03-10 09:44:48 +00:00
|
|
|
relayProtocol string
|
|
|
|
)
|
|
|
|
|
|
|
|
switch {
|
2024-01-18 18:54:54 +00:00
|
|
|
case url.Proto == ProtoTypeUDP && url.Scheme == SchemeTypeTURN:
|
2022-03-10 09:44:48 +00:00
|
|
|
if locConn, err = a.net.ListenPacket(network, "0.0.0.0:0"); err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to listen %s: %v\n", network, err)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
RelAddr = locConn.LocalAddr().(*net.UDPAddr).IP.String()
|
|
|
|
RelPort = locConn.LocalAddr().(*net.UDPAddr).Port
|
2022-03-10 09:44:48 +00:00
|
|
|
relayProtocol = udp
|
2024-01-18 18:54:54 +00:00
|
|
|
case a.proxyDialer != nil && url.Proto == ProtoTypeTCP &&
|
|
|
|
(url.Scheme == SchemeTypeTURN || url.Scheme == SchemeTypeTURNS):
|
|
|
|
conn, connectErr := a.proxyDialer.Dial(NetworkTypeTCP4.String(), TURNServerAddr)
|
2022-03-10 09:44:48 +00:00
|
|
|
if connectErr != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to Dial TCP Addr %s via proxy dialer: %v\n", TURNServerAddr, connectErr)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
RelAddr = conn.LocalAddr().(*net.TCPAddr).IP.String()
|
|
|
|
RelPort = conn.LocalAddr().(*net.TCPAddr).Port
|
|
|
|
if url.Scheme == SchemeTypeTURN {
|
2022-03-10 09:44:48 +00:00
|
|
|
relayProtocol = tcp
|
2024-01-18 18:54:54 +00:00
|
|
|
} else if url.Scheme == SchemeTypeTURNS {
|
2022-03-10 09:44:48 +00:00
|
|
|
relayProtocol = "tls"
|
|
|
|
}
|
|
|
|
locConn = turn.NewSTUNConn(conn)
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
case url.Proto == ProtoTypeTCP && url.Scheme == SchemeTypeTURN:
|
|
|
|
tcpAddr, connectErr := net.ResolveTCPAddr(NetworkTypeTCP4.String(), TURNServerAddr)
|
2022-03-10 09:44:48 +00:00
|
|
|
if connectErr != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to resolve TCP Addr %s: %v\n", TURNServerAddr, connectErr)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
conn, connectErr := net.DialTCP(NetworkTypeTCP4.String(), nil, tcpAddr)
|
2022-03-10 09:44:48 +00:00
|
|
|
if connectErr != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to Dial TCP Addr %s: %v\n", TURNServerAddr, connectErr)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
RelAddr = conn.LocalAddr().(*net.TCPAddr).IP.String()
|
|
|
|
RelPort = conn.LocalAddr().(*net.TCPAddr).Port
|
2022-03-10 09:44:48 +00:00
|
|
|
relayProtocol = tcp
|
|
|
|
locConn = turn.NewSTUNConn(conn)
|
2024-01-18 18:54:54 +00:00
|
|
|
case url.Proto == ProtoTypeUDP && url.Scheme == SchemeTypeTURNS:
|
|
|
|
udpAddr, connectErr := net.ResolveUDPAddr(network, TURNServerAddr)
|
2022-03-10 09:44:48 +00:00
|
|
|
if connectErr != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to resolve UDP Addr %s: %v\n", TURNServerAddr, connectErr)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
conn, connectErr := dtls.Dial(network, udpAddr, &dtls.Config{
|
2022-03-10 09:44:48 +00:00
|
|
|
ServerName: url.Host,
|
|
|
|
InsecureSkipVerify: a.insecureSkipVerify, //nolint:gosec
|
|
|
|
})
|
|
|
|
if connectErr != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to Dial DTLS Addr %s: %v\n", TURNServerAddr, connectErr)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
RelAddr = conn.LocalAddr().(*net.UDPAddr).IP.String()
|
|
|
|
RelPort = conn.LocalAddr().(*net.UDPAddr).Port
|
2022-03-10 09:44:48 +00:00
|
|
|
relayProtocol = "dtls"
|
2024-01-18 18:54:54 +00:00
|
|
|
locConn = &fakePacketConn{conn}
|
|
|
|
case url.Proto == ProtoTypeTCP && url.Scheme == SchemeTypeTURNS:
|
|
|
|
conn, connectErr := tls.Dial(NetworkTypeTCP4.String(), TURNServerAddr, &tls.Config{
|
2022-03-10 09:44:48 +00:00
|
|
|
InsecureSkipVerify: a.insecureSkipVerify, //nolint:gosec
|
|
|
|
})
|
2024-01-18 18:54:54 +00:00
|
|
|
if connectErr != nil {
|
|
|
|
a.log.Warnf("Failed to Dial TLS Addr %s: %v\n", TURNServerAddr, connectErr)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
RelAddr = conn.LocalAddr().(*net.TCPAddr).IP.String()
|
|
|
|
RelPort = conn.LocalAddr().(*net.TCPAddr).Port
|
2022-03-10 09:44:48 +00:00
|
|
|
relayProtocol = "tls"
|
|
|
|
locConn = turn.NewSTUNConn(conn)
|
|
|
|
default:
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Unable to handle URL in gatherCandidatesRelay %v\n", url)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
client, err := turn.NewClient(&turn.ClientConfig{
|
2024-01-18 18:54:54 +00:00
|
|
|
TURNServerAddr: TURNServerAddr,
|
2022-03-10 09:44:48 +00:00
|
|
|
Conn: locConn,
|
|
|
|
Username: url.Username,
|
|
|
|
Password: url.Password,
|
|
|
|
LoggerFactory: a.loggerFactory,
|
|
|
|
Net: a.net,
|
|
|
|
})
|
|
|
|
if err != nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(locConn, a.log, fmt.Sprintf("Failed to build new turn.Client %s %s\n", TURNServerAddr, err))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = client.Listen(); err != nil {
|
|
|
|
client.Close()
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(locConn, a.log, fmt.Sprintf("Failed to listen on turn.Client %s %s\n", TURNServerAddr, err))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
relayConn, err := client.Allocate()
|
|
|
|
if err != nil {
|
|
|
|
client.Close()
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(locConn, a.log, fmt.Sprintf("Failed to allocate on turn.Client %s %s\n", TURNServerAddr, err))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
raddr := relayConn.LocalAddr().(*net.UDPAddr)
|
2022-03-10 09:44:48 +00:00
|
|
|
relayConfig := CandidateRelayConfig{
|
|
|
|
Network: network,
|
|
|
|
Component: ComponentRTP,
|
2024-01-18 18:54:54 +00:00
|
|
|
Address: raddr.IP.String(),
|
|
|
|
Port: raddr.Port,
|
|
|
|
RelAddr: RelAddr,
|
|
|
|
RelPort: RelPort,
|
2022-03-10 09:44:48 +00:00
|
|
|
RelayProtocol: relayProtocol,
|
|
|
|
OnClose: func() error {
|
|
|
|
client.Close()
|
|
|
|
return locConn.Close()
|
|
|
|
},
|
|
|
|
}
|
|
|
|
relayConnClose := func() {
|
|
|
|
if relayConErr := relayConn.Close(); relayConErr != nil {
|
|
|
|
a.log.Warnf("Failed to close relay %v", relayConErr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
candidate, err := NewCandidateRelay(&relayConfig)
|
|
|
|
if err != nil {
|
|
|
|
relayConnClose()
|
|
|
|
|
|
|
|
client.Close()
|
2024-01-18 18:54:54 +00:00
|
|
|
closeConnAndLog(locConn, a.log, fmt.Sprintf("Failed to create relay candidate: %s %s: %v\n", network, raddr.String(), err))
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := a.addCandidate(ctx, candidate, relayConn); err != nil {
|
|
|
|
relayConnClose()
|
|
|
|
|
|
|
|
if closeErr := candidate.close(); closeErr != nil {
|
|
|
|
a.log.Warnf("Failed to close candidate: %v", closeErr)
|
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v\n", err)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}(*urls[i])
|
|
|
|
}
|
|
|
|
}
|