2022-03-10 09:44:48 +00:00
|
|
|
package ice
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pion/logging"
|
|
|
|
"github.com/pion/stun"
|
|
|
|
)
|
|
|
|
|
|
|
|
type pairCandidateSelector interface {
|
|
|
|
Start()
|
|
|
|
ContactCandidates()
|
|
|
|
PingCandidate(local, remote Candidate)
|
|
|
|
HandleSuccessResponse(m *stun.Message, local, remote Candidate, remoteAddr net.Addr)
|
|
|
|
HandleBindingRequest(m *stun.Message, local, remote Candidate)
|
|
|
|
}
|
|
|
|
|
|
|
|
type controllingSelector struct {
|
|
|
|
startTime time.Time
|
|
|
|
agent *Agent
|
|
|
|
nominatedPair *CandidatePair
|
|
|
|
log logging.LeveledLogger
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controllingSelector) Start() {
|
|
|
|
s.startTime = time.Now()
|
|
|
|
s.nominatedPair = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controllingSelector) isNominatable(c Candidate) bool {
|
|
|
|
switch {
|
|
|
|
case c.Type() == CandidateTypeHost:
|
|
|
|
return time.Since(s.startTime).Nanoseconds() > s.agent.hostAcceptanceMinWait.Nanoseconds()
|
|
|
|
case c.Type() == CandidateTypeServerReflexive:
|
|
|
|
return time.Since(s.startTime).Nanoseconds() > s.agent.srflxAcceptanceMinWait.Nanoseconds()
|
|
|
|
case c.Type() == CandidateTypePeerReflexive:
|
|
|
|
return time.Since(s.startTime).Nanoseconds() > s.agent.prflxAcceptanceMinWait.Nanoseconds()
|
|
|
|
case c.Type() == CandidateTypeRelay:
|
|
|
|
return time.Since(s.startTime).Nanoseconds() > s.agent.relayAcceptanceMinWait.Nanoseconds()
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
s.log.Errorf("isNominatable invalid candidate type %s", c.Type().String())
|
2022-03-10 09:44:48 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controllingSelector) ContactCandidates() {
|
|
|
|
switch {
|
|
|
|
case s.agent.getSelectedPair() != nil:
|
|
|
|
if s.agent.validateSelectedPair() {
|
|
|
|
s.log.Trace("checking keepalive")
|
|
|
|
s.agent.checkKeepalive()
|
|
|
|
}
|
|
|
|
case s.nominatedPair != nil:
|
|
|
|
s.nominatePair(s.nominatedPair)
|
|
|
|
default:
|
|
|
|
p := s.agent.getBestValidCandidatePair()
|
|
|
|
if p != nil && s.isNominatable(p.Local) && s.isNominatable(p.Remote) {
|
|
|
|
s.log.Tracef("Nominatable pair found, nominating (%s, %s)", p.Local.String(), p.Remote.String())
|
|
|
|
p.nominated = true
|
|
|
|
s.nominatedPair = p
|
|
|
|
s.nominatePair(p)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
s.agent.pingAllCandidates()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controllingSelector) nominatePair(pair *CandidatePair) {
|
|
|
|
// The controlling agent MUST include the USE-CANDIDATE attribute in
|
|
|
|
// order to nominate a candidate pair (Section 8.1.1). The controlled
|
|
|
|
// agent MUST NOT include the USE-CANDIDATE attribute in a Binding
|
|
|
|
// request.
|
|
|
|
msg, err := stun.Build(stun.BindingRequest, stun.TransactionID,
|
|
|
|
stun.NewUsername(s.agent.remoteUfrag+":"+s.agent.localUfrag),
|
|
|
|
UseCandidate(),
|
|
|
|
AttrControlling(s.agent.tieBreaker),
|
|
|
|
PriorityAttr(pair.Local.Priority()),
|
|
|
|
stun.NewShortTermIntegrity(s.agent.remotePwd),
|
|
|
|
stun.Fingerprint,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
s.log.Error(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-18 18:54:54 +00:00
|
|
|
s.log.Tracef("ping STUN (nominate candidate pair) from %s to %s\n", pair.Local.String(), pair.Remote.String())
|
2022-03-10 09:44:48 +00:00
|
|
|
s.agent.sendBindingRequest(msg, pair.Local, pair.Remote)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controllingSelector) HandleBindingRequest(m *stun.Message, local, remote Candidate) {
|
|
|
|
s.agent.sendBindingSuccess(m, local, remote)
|
|
|
|
|
|
|
|
p := s.agent.findPair(local, remote)
|
|
|
|
|
|
|
|
if p == nil {
|
|
|
|
s.agent.addPair(local, remote)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.state == CandidatePairStateSucceeded && s.nominatedPair == nil && s.agent.getSelectedPair() == nil {
|
|
|
|
bestPair := s.agent.getBestAvailableCandidatePair()
|
|
|
|
if bestPair == nil {
|
2024-01-18 18:54:54 +00:00
|
|
|
s.log.Tracef("No best pair available\n")
|
2022-03-10 09:44:48 +00:00
|
|
|
} else if bestPair.equal(p) && s.isNominatable(p.Local) && s.isNominatable(p.Remote) {
|
2024-01-18 18:54:54 +00:00
|
|
|
s.log.Tracef("The candidate (%s, %s) is the best candidate available, marking it as nominated\n",
|
2022-03-10 09:44:48 +00:00
|
|
|
p.Local.String(), p.Remote.String())
|
|
|
|
s.nominatedPair = p
|
|
|
|
s.nominatePair(p)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controllingSelector) HandleSuccessResponse(m *stun.Message, local, remote Candidate, remoteAddr net.Addr) {
|
|
|
|
ok, pendingRequest := s.agent.handleInboundBindingSuccess(m.TransactionID)
|
|
|
|
if !ok {
|
2024-01-18 18:54:54 +00:00
|
|
|
s.log.Warnf("discard message from (%s), unknown TransactionID 0x%x", remote, m.TransactionID)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
transactionAddr := pendingRequest.destination
|
|
|
|
|
|
|
|
// Assert that NAT is not symmetric
|
|
|
|
// https://tools.ietf.org/html/rfc8445#section-7.2.5.2.1
|
|
|
|
if !addrEqual(transactionAddr, remoteAddr) {
|
2024-01-18 18:54:54 +00:00
|
|
|
s.log.Debugf("discard message: transaction source and destination does not match expected(%s), actual(%s)", transactionAddr, remote)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
s.log.Tracef("inbound STUN (SuccessResponse) from %s to %s", remote.String(), local.String())
|
|
|
|
p := s.agent.findPair(local, remote)
|
|
|
|
|
|
|
|
if p == nil {
|
|
|
|
// This shouldn't happen
|
|
|
|
s.log.Error("Success response from invalid candidate pair")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
p.state = CandidatePairStateSucceeded
|
|
|
|
s.log.Tracef("Found valid candidate pair: %s", p)
|
|
|
|
if pendingRequest.isUseCandidate && s.agent.getSelectedPair() == nil {
|
|
|
|
s.agent.setSelectedPair(p)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controllingSelector) PingCandidate(local, remote Candidate) {
|
|
|
|
msg, err := stun.Build(stun.BindingRequest, stun.TransactionID,
|
|
|
|
stun.NewUsername(s.agent.remoteUfrag+":"+s.agent.localUfrag),
|
|
|
|
AttrControlling(s.agent.tieBreaker),
|
|
|
|
PriorityAttr(local.Priority()),
|
|
|
|
stun.NewShortTermIntegrity(s.agent.remotePwd),
|
|
|
|
stun.Fingerprint,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
s.log.Error(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
s.agent.sendBindingRequest(msg, local, remote)
|
|
|
|
}
|
|
|
|
|
|
|
|
type controlledSelector struct {
|
|
|
|
agent *Agent
|
|
|
|
log logging.LeveledLogger
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controlledSelector) Start() {
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controlledSelector) ContactCandidates() {
|
|
|
|
if s.agent.getSelectedPair() != nil {
|
|
|
|
if s.agent.validateSelectedPair() {
|
|
|
|
s.log.Trace("checking keepalive")
|
|
|
|
s.agent.checkKeepalive()
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
s.agent.pingAllCandidates()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controlledSelector) PingCandidate(local, remote Candidate) {
|
|
|
|
msg, err := stun.Build(stun.BindingRequest, stun.TransactionID,
|
|
|
|
stun.NewUsername(s.agent.remoteUfrag+":"+s.agent.localUfrag),
|
|
|
|
AttrControlled(s.agent.tieBreaker),
|
|
|
|
PriorityAttr(local.Priority()),
|
|
|
|
stun.NewShortTermIntegrity(s.agent.remotePwd),
|
|
|
|
stun.Fingerprint,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
s.log.Error(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
s.agent.sendBindingRequest(msg, local, remote)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controlledSelector) HandleSuccessResponse(m *stun.Message, local, remote Candidate, remoteAddr net.Addr) {
|
2024-01-18 18:54:54 +00:00
|
|
|
// nolint:godox
|
2022-03-10 09:44:48 +00:00
|
|
|
// TODO according to the standard we should specifically answer a failed nomination:
|
|
|
|
// https://tools.ietf.org/html/rfc8445#section-7.3.1.5
|
|
|
|
// If the controlled agent does not accept the request from the
|
|
|
|
// controlling agent, the controlled agent MUST reject the nomination
|
|
|
|
// request with an appropriate error code response (e.g., 400)
|
|
|
|
// [RFC5389].
|
|
|
|
|
|
|
|
ok, pendingRequest := s.agent.handleInboundBindingSuccess(m.TransactionID)
|
|
|
|
if !ok {
|
2024-01-18 18:54:54 +00:00
|
|
|
s.log.Warnf("discard message from (%s), unknown TransactionID 0x%x", remote, m.TransactionID)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
transactionAddr := pendingRequest.destination
|
|
|
|
|
|
|
|
// Assert that NAT is not symmetric
|
|
|
|
// https://tools.ietf.org/html/rfc8445#section-7.2.5.2.1
|
|
|
|
if !addrEqual(transactionAddr, remoteAddr) {
|
2024-01-18 18:54:54 +00:00
|
|
|
s.log.Debugf("discard message: transaction source and destination does not match expected(%s), actual(%s)", transactionAddr, remote)
|
2022-03-10 09:44:48 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
s.log.Tracef("inbound STUN (SuccessResponse) from %s to %s", remote.String(), local.String())
|
|
|
|
|
|
|
|
p := s.agent.findPair(local, remote)
|
|
|
|
if p == nil {
|
|
|
|
// This shouldn't happen
|
|
|
|
s.log.Error("Success response from invalid candidate pair")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
p.state = CandidatePairStateSucceeded
|
|
|
|
s.log.Tracef("Found valid candidate pair: %s", p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *controlledSelector) HandleBindingRequest(m *stun.Message, local, remote Candidate) {
|
|
|
|
useCandidate := m.Contains(stun.AttrUseCandidate)
|
|
|
|
|
|
|
|
p := s.agent.findPair(local, remote)
|
2024-01-18 18:54:54 +00:00
|
|
|
|
2022-03-10 09:44:48 +00:00
|
|
|
if p == nil {
|
|
|
|
p = s.agent.addPair(local, remote)
|
|
|
|
}
|
|
|
|
|
|
|
|
if useCandidate {
|
|
|
|
// https://tools.ietf.org/html/rfc8445#section-7.3.1.5
|
|
|
|
|
|
|
|
if p.state == CandidatePairStateSucceeded {
|
|
|
|
// If the state of this pair is Succeeded, it means that the check
|
|
|
|
// previously sent by this pair produced a successful response and
|
|
|
|
// generated a valid pair (Section 7.2.5.3.2). The agent sets the
|
|
|
|
// nominated flag value of the valid pair to true.
|
2024-01-18 18:54:54 +00:00
|
|
|
if selectedPair := s.agent.getSelectedPair(); selectedPair == nil {
|
2022-03-10 09:44:48 +00:00
|
|
|
s.agent.setSelectedPair(p)
|
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
s.agent.sendBindingSuccess(m, local, remote)
|
2022-03-10 09:44:48 +00:00
|
|
|
} else {
|
|
|
|
// If the received Binding request triggered a new check to be
|
|
|
|
// enqueued in the triggered-check queue (Section 7.3.1.4), once the
|
|
|
|
// check is sent and if it generates a successful response, and
|
|
|
|
// generates a valid pair, the agent sets the nominated flag of the
|
|
|
|
// pair to true. If the request fails (Section 7.2.5.2), the agent
|
|
|
|
// MUST remove the candidate pair from the valid list, set the
|
|
|
|
// candidate pair state to Failed, and set the checklist state to
|
|
|
|
// Failed.
|
2024-01-18 18:54:54 +00:00
|
|
|
s.PingCandidate(local, remote)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
2024-01-18 18:54:54 +00:00
|
|
|
} else {
|
|
|
|
s.agent.sendBindingSuccess(m, local, remote)
|
|
|
|
s.PingCandidate(local, remote)
|
2022-03-10 09:44:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type liteSelector struct {
|
|
|
|
pairCandidateSelector
|
|
|
|
}
|
|
|
|
|
|
|
|
// A lite selector should not contact candidates
|
|
|
|
func (s *liteSelector) ContactCandidates() {
|
|
|
|
if _, ok := s.pairCandidateSelector.(*controllingSelector); ok {
|
2024-01-18 18:54:54 +00:00
|
|
|
// nolint:godox
|
|
|
|
// pion/ice#96
|
2022-03-10 09:44:48 +00:00
|
|
|
// TODO: implement lite controlling agent. For now falling back to full agent.
|
|
|
|
// This only happens if both peers are lite. See RFC 8445 S6.1.1 and S6.2
|
|
|
|
s.pairCandidateSelector.ContactCandidates()
|
|
|
|
} else if v, ok := s.pairCandidateSelector.(*controlledSelector); ok {
|
|
|
|
v.agent.validateSelectedPair()
|
|
|
|
}
|
|
|
|
}
|