status-go/vendor/github.com/pion/ice/v2/gather.go

721 lines
22 KiB
Go
Raw Normal View History

2024-05-15 23:15:00 +00:00
// SPDX-FileCopyrightText: 2023 The Pion community <https://pion.ly>
// SPDX-License-Identifier: MIT
2022-03-10 09:44:48 +00:00
package ice
import (
"context"
"crypto/tls"
"fmt"
2024-05-15 23:15:00 +00:00
"io"
2022-03-10 09:44:48 +00:00
"net"
"reflect"
"sync"
"time"
"github.com/pion/dtls/v2"
2024-05-15 23:15:00 +00:00
"github.com/pion/ice/v2/internal/fakenet"
stunx "github.com/pion/ice/v2/internal/stun"
2022-03-10 09:44:48 +00:00
"github.com/pion/logging"
2024-05-15 23:15:00 +00:00
"github.com/pion/stun"
2022-03-10 09:44:48 +00:00
"github.com/pion/turn/v2"
)
const (
stunGatherTimeout = time.Second * 5
)
// Close a net.Conn and log if we have a failure
2024-05-15 23:15:00 +00:00
func closeConnAndLog(c io.Closer, log logging.LeveledLogger, msg string, args ...interface{}) {
2022-03-10 09:44:48 +00:00
if c == nil || (reflect.ValueOf(c).Kind() == reflect.Ptr && reflect.ValueOf(c).IsNil()) {
2024-05-15 23:15:00 +00:00
log.Warnf("Connection is not allocated: "+msg, args...)
2022-03-10 09:44:48 +00:00
return
}
2024-06-05 20:10:03 +00:00
log.Warnf(msg, args...)
2022-03-10 09:44:48 +00:00
if err := c.Close(); err != nil {
2024-05-15 23:15:00 +00:00
log.Warnf("Failed to close connection: %v", err)
2022-03-10 09:44:48 +00:00
}
}
// GatherCandidates initiates the trickle based gathering process.
func (a *Agent) GatherCandidates() error {
var gatherErr error
if runErr := a.run(a.context(), func(ctx context.Context, agent *Agent) {
if a.gatheringState != GatheringStateNew {
gatherErr = ErrMultipleGatherAttempted
return
} else if a.onCandidateHdlr.Load() == nil {
gatherErr = ErrNoOnCandidateHandler
return
}
a.gatherCandidateCancel() // Cancel previous gathering routine
ctx, cancel := context.WithCancel(ctx)
a.gatherCandidateCancel = cancel
2024-05-15 23:15:00 +00:00
done := make(chan struct{})
a.gatherCandidateDone = done
2022-03-10 09:44:48 +00:00
2024-05-15 23:15:00 +00:00
go a.gatherCandidates(ctx, done)
2022-03-10 09:44:48 +00:00
}); runErr != nil {
return runErr
}
return gatherErr
}
2024-05-15 23:15:00 +00:00
func (a *Agent) gatherCandidates(ctx context.Context, done chan struct{}) {
defer close(done)
if err := a.setGatheringState(GatheringStateGathering); err != nil { //nolint:contextcheck
a.log.Warnf("Failed to set gatheringState to GatheringStateGathering: %v", err)
2022-03-10 09:44:48 +00:00
return
}
var wg sync.WaitGroup
for _, t := range a.candidateTypes {
switch t {
case CandidateTypeHost:
wg.Add(1)
go func() {
a.gatherCandidatesLocal(ctx, a.networkTypes)
wg.Done()
}()
case CandidateTypeServerReflexive:
wg.Add(1)
go func() {
2024-05-15 23:15:00 +00:00
if a.udpMuxSrflx != nil {
a.gatherCandidatesSrflxUDPMux(ctx, a.urls, a.networkTypes)
} else {
a.gatherCandidatesSrflx(ctx, a.urls, a.networkTypes)
}
2022-03-10 09:44:48 +00:00
wg.Done()
}()
if a.extIPMapper != nil && a.extIPMapper.candidateType == CandidateTypeServerReflexive {
wg.Add(1)
go func() {
a.gatherCandidatesSrflxMapped(ctx, a.networkTypes)
wg.Done()
}()
}
case CandidateTypeRelay:
wg.Add(1)
go func() {
a.gatherCandidatesRelay(ctx, a.urls)
wg.Done()
}()
case CandidateTypePeerReflexive, CandidateTypeUnspecified:
}
}
2024-05-15 23:15:00 +00:00
2022-03-10 09:44:48 +00:00
// Block until all STUN and TURN URLs have been gathered (or timed out)
wg.Wait()
2024-05-15 23:15:00 +00:00
if err := a.setGatheringState(GatheringStateComplete); err != nil { //nolint:contextcheck
a.log.Warnf("Failed to set gatheringState to GatheringStateComplete: %v", err)
2022-03-10 09:44:48 +00:00
}
}
func (a *Agent) gatherCandidatesLocal(ctx context.Context, networkTypes []NetworkType) { //nolint:gocognit
networks := map[string]struct{}{}
for _, networkType := range networkTypes {
if networkType.IsTCP() {
networks[tcp] = struct{}{}
} else {
networks[udp] = struct{}{}
}
}
2024-05-15 23:15:00 +00:00
// When UDPMux is enabled, skip other UDP candidates
2022-03-10 09:44:48 +00:00
if a.udpMux != nil {
if err := a.gatherCandidatesLocalUDPMux(ctx); err != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to create host candidate for UDPMux: %s", err)
2022-03-10 09:44:48 +00:00
}
delete(networks, udp)
}
2024-05-15 23:15:00 +00:00
localIPs, err := localInterfaces(a.net, a.interfaceFilter, a.ipFilter, networkTypes, a.includeLoopback)
2022-03-10 09:44:48 +00:00
if err != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to iterate local interfaces, host candidates will not be gathered %s", err)
2022-03-10 09:44:48 +00:00
return
}
for _, ip := range localIPs {
mappedIP := ip
if a.mDNSMode != MulticastDNSModeQueryAndGather && a.extIPMapper != nil && a.extIPMapper.candidateType == CandidateTypeHost {
2024-05-15 23:15:00 +00:00
if _mappedIP, innerErr := a.extIPMapper.findExternalIP(ip.String()); innerErr == nil {
2022-03-10 09:44:48 +00:00
mappedIP = _mappedIP
} else {
2024-05-15 23:15:00 +00:00
a.log.Warnf("1:1 NAT mapping is enabled but no external IP is found for %s", ip.String())
2022-03-10 09:44:48 +00:00
}
}
address := mappedIP.String()
if a.mDNSMode == MulticastDNSModeQueryAndGather {
address = a.mDNSName
}
for network := range networks {
2024-05-15 23:15:00 +00:00
type connAndPort struct {
conn net.PacketConn
port int
}
var (
conns []connAndPort
tcpType TCPType
)
2022-03-10 09:44:48 +00:00
switch network {
case tcp:
2024-05-15 23:15:00 +00:00
if a.tcpMux == nil {
continue
}
2022-03-10 09:44:48 +00:00
// Handle ICE TCP passive mode
2024-05-15 23:15:00 +00:00
var muxConns []net.PacketConn
if multi, ok := a.tcpMux.(AllConnsGetter); ok {
a.log.Debugf("GetAllConns by ufrag: %s", a.localUfrag)
muxConns, err = multi.GetAllConns(a.localUfrag, mappedIP.To4() == nil, ip)
if err != nil {
a.log.Warnf("Failed to get all TCP connections by ufrag: %s %s %s", network, ip, a.localUfrag)
continue
}
} else {
a.log.Debugf("GetConn by ufrag: %s", a.localUfrag)
conn, err := a.tcpMux.GetConnByUfrag(a.localUfrag, mappedIP.To4() == nil, ip)
if err != nil {
a.log.Warnf("Failed to get TCP connections by ufrag: %s %s %s", network, ip, a.localUfrag)
continue
}
muxConns = []net.PacketConn{conn}
}
// Extract the port for each PacketConn we got.
for _, conn := range muxConns {
if tcpConn, ok := conn.LocalAddr().(*net.TCPAddr); ok {
conns = append(conns, connAndPort{conn, tcpConn.Port})
} else {
a.log.Warnf("Failed to get port of connection from TCPMux: %s %s %s", network, ip, a.localUfrag)
2022-03-10 09:44:48 +00:00
}
2024-05-15 23:15:00 +00:00
}
if len(conns) == 0 {
// Didn't succeed with any, try the next network.
2022-03-10 09:44:48 +00:00
continue
}
tcpType = TCPTypePassive
2024-05-15 23:15:00 +00:00
// Is there a way to verify that the listen address is even
2022-03-10 09:44:48 +00:00
// accessible from the current interface.
case udp:
2024-05-15 23:15:00 +00:00
conn, err := listenUDPInPortRange(a.net, a.log, int(a.portMax), int(a.portMin), network, &net.UDPAddr{IP: ip, Port: 0})
2022-03-10 09:44:48 +00:00
if err != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to listen %s %s", network, ip)
2022-03-10 09:44:48 +00:00
continue
}
2024-05-15 23:15:00 +00:00
if udpConn, ok := conn.LocalAddr().(*net.UDPAddr); ok {
conns = append(conns, connAndPort{conn, udpConn.Port})
} else {
a.log.Warnf("Failed to get port of UDPAddr from ListenUDPInPortRange: %s %s %s", network, ip, a.localUfrag)
continue
}
2022-03-10 09:44:48 +00:00
}
2024-05-15 23:15:00 +00:00
for _, connAndPort := range conns {
hostConfig := CandidateHostConfig{
Network: network,
Address: address,
Port: connAndPort.port,
Component: ComponentRTP,
TCPType: tcpType,
}
2022-03-10 09:44:48 +00:00
2024-05-15 23:15:00 +00:00
c, err := NewCandidateHost(&hostConfig)
if err != nil {
closeConnAndLog(connAndPort.conn, a.log, "failed to create host candidate: %s %s %d: %v", network, mappedIP, connAndPort.port, err)
2022-03-10 09:44:48 +00:00
continue
}
2024-05-15 23:15:00 +00:00
if a.mDNSMode == MulticastDNSModeQueryAndGather {
if err = c.setIP(ip); err != nil {
closeConnAndLog(connAndPort.conn, a.log, "failed to create host candidate: %s %s %d: %v", network, mappedIP, connAndPort.port, err)
continue
}
}
if err := a.addCandidate(ctx, c, connAndPort.conn); err != nil {
if closeErr := c.close(); closeErr != nil {
a.log.Warnf("Failed to close candidate: %v", closeErr)
}
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v", err)
2022-03-10 09:44:48 +00:00
}
}
}
}
}
2024-05-15 23:15:00 +00:00
func (a *Agent) gatherCandidatesLocalUDPMux(ctx context.Context) error { //nolint:gocognit
2022-03-10 09:44:48 +00:00
if a.udpMux == nil {
return errUDPMuxDisabled
}
2024-05-15 23:15:00 +00:00
localAddresses := a.udpMux.GetListenAddresses()
existingConfigs := make(map[CandidateHostConfig]struct{})
2022-03-10 09:44:48 +00:00
2024-05-15 23:15:00 +00:00
for _, addr := range localAddresses {
udpAddr, ok := addr.(*net.UDPAddr)
if !ok {
return errInvalidAddress
}
candidateIP := udpAddr.IP
2022-03-10 09:44:48 +00:00
if a.extIPMapper != nil && a.extIPMapper.candidateType == CandidateTypeHost {
2024-05-15 23:15:00 +00:00
mappedIP, err := a.extIPMapper.findExternalIP(candidateIP.String())
if err != nil {
2022-03-10 09:44:48 +00:00
a.log.Warnf("1:1 NAT mapping is enabled but no external IP is found for %s", candidateIP.String())
continue
}
2024-05-15 23:15:00 +00:00
candidateIP = mappedIP
2022-03-10 09:44:48 +00:00
}
hostConfig := CandidateHostConfig{
Network: udp,
Address: candidateIP.String(),
2024-05-15 23:15:00 +00:00
Port: udpAddr.Port,
2022-03-10 09:44:48 +00:00
Component: ComponentRTP,
}
2024-05-15 23:15:00 +00:00
// Detect a duplicate candidate before calling addCandidate().
// otherwise, addCandidate() detects the duplicate candidate
// and close its connection, invalidating all candidates
// that share the same connection.
if _, ok := existingConfigs[hostConfig]; ok {
continue
}
conn, err := a.udpMux.GetConn(a.localUfrag, udpAddr)
if err != nil {
return err
}
2022-03-10 09:44:48 +00:00
c, err := NewCandidateHost(&hostConfig)
if err != nil {
2024-05-15 23:15:00 +00:00
closeConnAndLog(conn, a.log, "failed to create host mux candidate: %s %d: %v", candidateIP, udpAddr.Port, err)
continue
2022-03-10 09:44:48 +00:00
}
if err := a.addCandidate(ctx, c, conn); err != nil {
if closeErr := c.close(); closeErr != nil {
a.log.Warnf("Failed to close candidate: %v", closeErr)
}
2024-05-15 23:15:00 +00:00
closeConnAndLog(conn, a.log, "failed to add candidate: %s %d: %v", candidateIP, udpAddr.Port, err)
continue
2022-03-10 09:44:48 +00:00
}
2024-05-15 23:15:00 +00:00
existingConfigs[hostConfig] = struct{}{}
2022-03-10 09:44:48 +00:00
}
return nil
}
func (a *Agent) gatherCandidatesSrflxMapped(ctx context.Context, networkTypes []NetworkType) {
var wg sync.WaitGroup
defer wg.Wait()
for _, networkType := range networkTypes {
if networkType.IsTCP() {
continue
}
network := networkType.String()
wg.Add(1)
go func() {
defer wg.Done()
2024-05-15 23:15:00 +00:00
conn, err := listenUDPInPortRange(a.net, a.log, int(a.portMax), int(a.portMin), network, &net.UDPAddr{IP: nil, Port: 0})
2022-03-10 09:44:48 +00:00
if err != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to listen %s: %v", network, err)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
lAddr, ok := conn.LocalAddr().(*net.UDPAddr)
if !ok {
closeConnAndLog(conn, a.log, "1:1 NAT mapping is enabled but LocalAddr is not a UDPAddr")
return
}
mappedIP, err := a.extIPMapper.findExternalIP(lAddr.IP.String())
2022-03-10 09:44:48 +00:00
if err != nil {
2024-05-15 23:15:00 +00:00
closeConnAndLog(conn, a.log, "1:1 NAT mapping is enabled but no external IP is found for %s", lAddr.IP.String())
2022-03-10 09:44:48 +00:00
return
}
srflxConfig := CandidateServerReflexiveConfig{
Network: network,
Address: mappedIP.String(),
2024-05-15 23:15:00 +00:00
Port: lAddr.Port,
2022-03-10 09:44:48 +00:00
Component: ComponentRTP,
2024-05-15 23:15:00 +00:00
RelAddr: lAddr.IP.String(),
RelPort: lAddr.Port,
2022-03-10 09:44:48 +00:00
}
c, err := NewCandidateServerReflexive(&srflxConfig)
if err != nil {
2024-05-15 23:15:00 +00:00
closeConnAndLog(conn, a.log, "failed to create server reflexive candidate: %s %s %d: %v",
2022-03-10 09:44:48 +00:00
network,
mappedIP.String(),
2024-05-15 23:15:00 +00:00
lAddr.Port,
err)
2022-03-10 09:44:48 +00:00
return
}
if err := a.addCandidate(ctx, c, conn); err != nil {
if closeErr := c.close(); closeErr != nil {
a.log.Warnf("Failed to close candidate: %v", closeErr)
}
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v", err)
2022-03-10 09:44:48 +00:00
}
}()
}
}
2024-05-15 23:15:00 +00:00
func (a *Agent) gatherCandidatesSrflxUDPMux(ctx context.Context, urls []*stun.URI, networkTypes []NetworkType) { //nolint:gocognit
var wg sync.WaitGroup
defer wg.Wait()
for _, networkType := range networkTypes {
if networkType.IsTCP() {
continue
}
for i := range urls {
for _, listenAddr := range a.udpMuxSrflx.GetListenAddresses() {
udpAddr, ok := listenAddr.(*net.UDPAddr)
if !ok {
a.log.Warn("Failed to cast udpMuxSrflx listen address to UDPAddr")
continue
}
wg.Add(1)
go func(url stun.URI, network string, localAddr *net.UDPAddr) {
defer wg.Done()
hostPort := fmt.Sprintf("%s:%d", url.Host, url.Port)
serverAddr, err := a.net.ResolveUDPAddr(network, hostPort)
if err != nil {
2024-06-05 20:10:03 +00:00
a.log.Debugf("Failed to resolve STUN host: %s: %v", hostPort, err)
2024-05-15 23:15:00 +00:00
return
}
xorAddr, err := a.udpMuxSrflx.GetXORMappedAddr(serverAddr, stunGatherTimeout)
if err != nil {
a.log.Warnf("Failed get server reflexive address %s %s: %v", network, url, err)
return
}
conn, err := a.udpMuxSrflx.GetConnForURL(a.localUfrag, url.String(), localAddr)
if err != nil {
a.log.Warnf("Failed to find connection in UDPMuxSrflx %s %s: %v", network, url, err)
return
}
ip := xorAddr.IP
port := xorAddr.Port
srflxConfig := CandidateServerReflexiveConfig{
Network: network,
Address: ip.String(),
Port: port,
Component: ComponentRTP,
RelAddr: localAddr.IP.String(),
RelPort: localAddr.Port,
}
c, err := NewCandidateServerReflexive(&srflxConfig)
if err != nil {
closeConnAndLog(conn, a.log, "failed to create server reflexive candidate: %s %s %d: %v", network, ip, port, err)
return
}
if err := a.addCandidate(ctx, c, conn); err != nil {
if closeErr := c.close(); closeErr != nil {
a.log.Warnf("Failed to close candidate: %v", closeErr)
}
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v", err)
}
}(*urls[i], networkType.String(), udpAddr)
}
}
}
}
func (a *Agent) gatherCandidatesSrflx(ctx context.Context, urls []*stun.URI, networkTypes []NetworkType) { //nolint:gocognit
2022-03-10 09:44:48 +00:00
var wg sync.WaitGroup
defer wg.Wait()
for _, networkType := range networkTypes {
if networkType.IsTCP() {
continue
}
for i := range urls {
wg.Add(1)
2024-05-15 23:15:00 +00:00
go func(url stun.URI, network string) {
2022-03-10 09:44:48 +00:00
defer wg.Done()
hostPort := fmt.Sprintf("%s:%d", url.Host, url.Port)
serverAddr, err := a.net.ResolveUDPAddr(network, hostPort)
if err != nil {
2024-06-05 20:10:03 +00:00
a.log.Debugf("Failed to resolve STUN host: %s: %v", hostPort, err)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
conn, err := listenUDPInPortRange(a.net, a.log, int(a.portMax), int(a.portMin), network, &net.UDPAddr{IP: nil, Port: 0})
2022-03-10 09:44:48 +00:00
if err != nil {
2024-05-15 23:15:00 +00:00
closeConnAndLog(conn, a.log, "failed to listen for %s: %v", serverAddr.String(), err)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
// If the agent closes midway through the connection
// we end it early to prevent close delay.
cancelCtx, cancelFunc := context.WithCancel(ctx)
defer cancelFunc()
go func() {
select {
case <-cancelCtx.Done():
return
case <-a.done:
_ = conn.Close()
}
}()
2022-03-10 09:44:48 +00:00
2024-05-15 23:15:00 +00:00
xorAddr, err := stunx.GetXORMappedAddr(conn, serverAddr, stunGatherTimeout)
2022-03-10 09:44:48 +00:00
if err != nil {
2024-05-15 23:15:00 +00:00
closeConnAndLog(conn, a.log, "failed to get server reflexive address %s %s: %v", network, url, err)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
ip := xorAddr.IP
port := xorAddr.Port
2022-03-10 09:44:48 +00:00
2024-05-15 23:15:00 +00:00
lAddr := conn.LocalAddr().(*net.UDPAddr) //nolint:forcetypeassert
2022-03-10 09:44:48 +00:00
srflxConfig := CandidateServerReflexiveConfig{
Network: network,
Address: ip.String(),
Port: port,
Component: ComponentRTP,
2024-05-15 23:15:00 +00:00
RelAddr: lAddr.IP.String(),
RelPort: lAddr.Port,
2022-03-10 09:44:48 +00:00
}
c, err := NewCandidateServerReflexive(&srflxConfig)
if err != nil {
2024-05-15 23:15:00 +00:00
closeConnAndLog(conn, a.log, "failed to create server reflexive candidate: %s %s %d: %v", network, ip, port, err)
2022-03-10 09:44:48 +00:00
return
}
if err := a.addCandidate(ctx, c, conn); err != nil {
if closeErr := c.close(); closeErr != nil {
a.log.Warnf("Failed to close candidate: %v", closeErr)
}
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v", err)
2022-03-10 09:44:48 +00:00
}
}(*urls[i], networkType.String())
}
}
}
2024-05-15 23:15:00 +00:00
func (a *Agent) gatherCandidatesRelay(ctx context.Context, urls []*stun.URI) { //nolint:gocognit
2022-03-10 09:44:48 +00:00
var wg sync.WaitGroup
defer wg.Wait()
network := NetworkTypeUDP4.String()
for i := range urls {
switch {
2024-05-15 23:15:00 +00:00
case urls[i].Scheme != stun.SchemeTypeTURN && urls[i].Scheme != stun.SchemeTypeTURNS:
2022-03-10 09:44:48 +00:00
continue
case urls[i].Username == "":
a.log.Errorf("Failed to gather relay candidates: %v", ErrUsernameEmpty)
return
case urls[i].Password == "":
a.log.Errorf("Failed to gather relay candidates: %v", ErrPasswordEmpty)
return
}
wg.Add(1)
2024-05-15 23:15:00 +00:00
go func(url stun.URI) {
2022-03-10 09:44:48 +00:00
defer wg.Done()
2024-05-15 23:15:00 +00:00
turnServerAddr := fmt.Sprintf("%s:%d", url.Host, url.Port)
2022-03-10 09:44:48 +00:00
var (
locConn net.PacketConn
err error
2024-05-15 23:15:00 +00:00
relAddr string
relPort int
2022-03-10 09:44:48 +00:00
relayProtocol string
)
switch {
2024-05-15 23:15:00 +00:00
case url.Proto == stun.ProtoTypeUDP && url.Scheme == stun.SchemeTypeTURN:
2022-03-10 09:44:48 +00:00
if locConn, err = a.net.ListenPacket(network, "0.0.0.0:0"); err != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to listen %s: %v", network, err)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
relAddr = locConn.LocalAddr().(*net.UDPAddr).IP.String() //nolint:forcetypeassert
relPort = locConn.LocalAddr().(*net.UDPAddr).Port //nolint:forcetypeassert
2022-03-10 09:44:48 +00:00
relayProtocol = udp
2024-05-15 23:15:00 +00:00
case a.proxyDialer != nil && url.Proto == stun.ProtoTypeTCP &&
(url.Scheme == stun.SchemeTypeTURN || url.Scheme == stun.SchemeTypeTURNS):
conn, connectErr := a.proxyDialer.Dial(NetworkTypeTCP4.String(), turnServerAddr)
2022-03-10 09:44:48 +00:00
if connectErr != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to dial TCP address %s via proxy dialer: %v", turnServerAddr, connectErr)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
relAddr = conn.LocalAddr().(*net.TCPAddr).IP.String() //nolint:forcetypeassert
relPort = conn.LocalAddr().(*net.TCPAddr).Port //nolint:forcetypeassert
if url.Scheme == stun.SchemeTypeTURN {
2022-03-10 09:44:48 +00:00
relayProtocol = tcp
2024-05-15 23:15:00 +00:00
} else if url.Scheme == stun.SchemeTypeTURNS {
2022-03-10 09:44:48 +00:00
relayProtocol = "tls"
}
locConn = turn.NewSTUNConn(conn)
2024-05-15 23:15:00 +00:00
case url.Proto == stun.ProtoTypeTCP && url.Scheme == stun.SchemeTypeTURN:
tcpAddr, connectErr := a.net.ResolveTCPAddr(NetworkTypeTCP4.String(), turnServerAddr)
2022-03-10 09:44:48 +00:00
if connectErr != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to resolve TCP address %s: %v", turnServerAddr, connectErr)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
conn, connectErr := a.net.DialTCP(NetworkTypeTCP4.String(), nil, tcpAddr)
2022-03-10 09:44:48 +00:00
if connectErr != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to dial TCP address %s: %v", turnServerAddr, connectErr)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
relAddr = conn.LocalAddr().(*net.TCPAddr).IP.String() //nolint:forcetypeassert
relPort = conn.LocalAddr().(*net.TCPAddr).Port //nolint:forcetypeassert
2022-03-10 09:44:48 +00:00
relayProtocol = tcp
locConn = turn.NewSTUNConn(conn)
2024-05-15 23:15:00 +00:00
case url.Proto == stun.ProtoTypeUDP && url.Scheme == stun.SchemeTypeTURNS:
udpAddr, connectErr := a.net.ResolveUDPAddr(network, turnServerAddr)
2022-03-10 09:44:48 +00:00
if connectErr != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to resolve UDP address %s: %v", turnServerAddr, connectErr)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
udpConn, dialErr := a.net.DialUDP("udp", nil, udpAddr)
if dialErr != nil {
a.log.Warnf("Failed to dial DTLS address %s: %v", turnServerAddr, dialErr)
return
}
conn, connectErr := dtls.ClientWithContext(ctx, udpConn, &dtls.Config{
2022-03-10 09:44:48 +00:00
ServerName: url.Host,
InsecureSkipVerify: a.insecureSkipVerify, //nolint:gosec
})
if connectErr != nil {
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to create DTLS client: %v", turnServerAddr, connectErr)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
relAddr = conn.LocalAddr().(*net.UDPAddr).IP.String() //nolint:forcetypeassert
relPort = conn.LocalAddr().(*net.UDPAddr).Port //nolint:forcetypeassert
2022-03-10 09:44:48 +00:00
relayProtocol = "dtls"
2024-05-15 23:15:00 +00:00
locConn = &fakenet.PacketConn{Conn: conn}
case url.Proto == stun.ProtoTypeTCP && url.Scheme == stun.SchemeTypeTURNS:
tcpAddr, resolvErr := a.net.ResolveTCPAddr(NetworkTypeTCP4.String(), turnServerAddr)
if resolvErr != nil {
a.log.Warnf("Failed to resolve relay address %s: %v", turnServerAddr, resolvErr)
return
}
tcpConn, dialErr := a.net.DialTCP(NetworkTypeTCP4.String(), nil, tcpAddr)
if dialErr != nil {
a.log.Warnf("Failed to connect to relay: %v", dialErr)
return
}
conn := tls.Client(tcpConn, &tls.Config{
ServerName: url.Host,
2022-03-10 09:44:48 +00:00
InsecureSkipVerify: a.insecureSkipVerify, //nolint:gosec
})
2024-05-15 23:15:00 +00:00
if hsErr := conn.HandshakeContext(ctx); hsErr != nil {
if closeErr := tcpConn.Close(); closeErr != nil {
a.log.Errorf("Failed to close relay connection: %v", closeErr)
}
a.log.Warnf("Failed to connect to relay: %v", hsErr)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
relAddr = conn.LocalAddr().(*net.TCPAddr).IP.String() //nolint:forcetypeassert
relPort = conn.LocalAddr().(*net.TCPAddr).Port //nolint:forcetypeassert
2022-03-10 09:44:48 +00:00
relayProtocol = "tls"
locConn = turn.NewSTUNConn(conn)
default:
2024-05-15 23:15:00 +00:00
a.log.Warnf("Unable to handle URL in gatherCandidatesRelay %v", url)
2022-03-10 09:44:48 +00:00
return
}
client, err := turn.NewClient(&turn.ClientConfig{
2024-05-15 23:15:00 +00:00
TURNServerAddr: turnServerAddr,
2022-03-10 09:44:48 +00:00
Conn: locConn,
Username: url.Username,
Password: url.Password,
LoggerFactory: a.loggerFactory,
Net: a.net,
})
if err != nil {
2024-05-15 23:15:00 +00:00
closeConnAndLog(locConn, a.log, "failed to create new TURN client %s %s", turnServerAddr, err)
2022-03-10 09:44:48 +00:00
return
}
if err = client.Listen(); err != nil {
client.Close()
2024-05-15 23:15:00 +00:00
closeConnAndLog(locConn, a.log, "failed to listen on TURN client %s %s", turnServerAddr, err)
2022-03-10 09:44:48 +00:00
return
}
relayConn, err := client.Allocate()
if err != nil {
client.Close()
2024-05-15 23:15:00 +00:00
closeConnAndLog(locConn, a.log, "failed to allocate on TURN client %s %s", turnServerAddr, err)
2022-03-10 09:44:48 +00:00
return
}
2024-05-15 23:15:00 +00:00
rAddr := relayConn.LocalAddr().(*net.UDPAddr) //nolint:forcetypeassert
2022-03-10 09:44:48 +00:00
relayConfig := CandidateRelayConfig{
Network: network,
Component: ComponentRTP,
2024-05-15 23:15:00 +00:00
Address: rAddr.IP.String(),
Port: rAddr.Port,
RelAddr: relAddr,
RelPort: relPort,
2022-03-10 09:44:48 +00:00
RelayProtocol: relayProtocol,
OnClose: func() error {
client.Close()
return locConn.Close()
},
}
relayConnClose := func() {
if relayConErr := relayConn.Close(); relayConErr != nil {
a.log.Warnf("Failed to close relay %v", relayConErr)
}
}
candidate, err := NewCandidateRelay(&relayConfig)
if err != nil {
relayConnClose()
client.Close()
2024-05-15 23:15:00 +00:00
closeConnAndLog(locConn, a.log, "failed to create relay candidate: %s %s: %v", network, rAddr.String(), err)
2022-03-10 09:44:48 +00:00
return
}
if err := a.addCandidate(ctx, candidate, relayConn); err != nil {
relayConnClose()
if closeErr := candidate.close(); closeErr != nil {
a.log.Warnf("Failed to close candidate: %v", closeErr)
}
2024-05-15 23:15:00 +00:00
a.log.Warnf("Failed to append to localCandidates and run onCandidateHdlr: %v", err)
2022-03-10 09:44:48 +00:00
}
}(*urls[i])
}
}