mirror of
https://github.com/livekit/livekit.git
synced 2026-05-19 11:05:22 +00:00
89faaeba82
* Apply ttl check only when authenticate allocation creating TTL check could reject allocation/persmission refresh in security enhancement #4505, cause long-live session disconnect when turn credential is expired. Only check ttl on allocation creating to prevent abusing leaked credential but keep long-live session work.
129 lines
4.1 KiB
Go
129 lines
4.1 KiB
Go
// Copyright 2026 LiveKit, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package service
|
|
|
|
import (
|
|
"net"
|
|
"testing"
|
|
|
|
"github.com/pion/stun/v3"
|
|
"github.com/pion/turn/v5"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/livekit/protocol/auth"
|
|
"github.com/livekit/protocol/livekit"
|
|
)
|
|
|
|
const (
|
|
turnTestAPIKey = "APITestKey"
|
|
turnTestAPISecret = "TestSecret"
|
|
)
|
|
|
|
func newTestTurnAuthHandler() *TURNAuthHandler {
|
|
return NewTURNAuthHandler(auth.NewSimpleKeyProvider(turnTestAPIKey, turnTestAPISecret))
|
|
}
|
|
|
|
func mustAuthCreds(t *testing.T, h *TURNAuthHandler, pID livekit.ParticipantID, ttlSeconds int) (username string, key []byte) {
|
|
t.Helper()
|
|
username, expiry := h.CreateUsername(turnTestAPIKey, pID, ttlSeconds)
|
|
password, err := h.CreatePassword(turnTestAPIKey, pID, expiry)
|
|
require.NoError(t, err)
|
|
return username, turn.GenerateAuthKey(username, LivekitRealm, password)
|
|
}
|
|
|
|
func TestTURNAuthHandler_HandleAuth_ValidCredentials(t *testing.T) {
|
|
h := newTestTurnAuthHandler()
|
|
pID := livekit.ParticipantID("PA_valid")
|
|
username, expectedKey := mustAuthCreds(t, h, pID, 300)
|
|
|
|
for _, method := range []stun.Method{
|
|
stun.MethodAllocate,
|
|
stun.MethodRefresh,
|
|
stun.MethodCreatePermission,
|
|
stun.MethodChannelBind,
|
|
stun.MethodSend,
|
|
} {
|
|
t.Run(method.String(), func(t *testing.T) {
|
|
userID, key, ok := h.HandleAuth(&turn.RequestAttributes{
|
|
Username: username,
|
|
Realm: LivekitRealm,
|
|
SrcAddr: &net.UDPAddr{IP: net.ParseIP("127.0.0.1"), Port: 1234},
|
|
Method: method,
|
|
})
|
|
require.True(t, ok)
|
|
require.Equal(t, string(pID), userID)
|
|
require.Equal(t, expectedKey, key)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestTURNAuthHandler_HandleAuth_ExpiredAllocateRejected(t *testing.T) {
|
|
h := newTestTurnAuthHandler()
|
|
pID := livekit.ParticipantID("PA_expired_alloc")
|
|
|
|
username, _ := h.CreateUsername(turnTestAPIKey, pID, -60)
|
|
_, _, ok := h.HandleAuth(&turn.RequestAttributes{
|
|
Username: username,
|
|
Realm: LivekitRealm,
|
|
SrcAddr: &net.UDPAddr{IP: net.ParseIP("127.0.0.1"), Port: 1234},
|
|
Method: stun.MethodAllocate,
|
|
})
|
|
require.False(t, ok, "Allocate request with expired credentials must be rejected")
|
|
}
|
|
|
|
func TestTURNAuthHandler_HandleAuth_ExpiredNonAllocateAllowed(t *testing.T) {
|
|
h := newTestTurnAuthHandler()
|
|
pID := livekit.ParticipantID("PA_expired_refresh")
|
|
|
|
username, expiry := h.CreateUsername(turnTestAPIKey, pID, -60)
|
|
|
|
// CreatePassword still enforces ErrExpired on its own, but the server hands
|
|
// the same key it generated at allocation time — reproduce that by directly
|
|
// hashing without going through CreatePassword's expiry guard.
|
|
password, err := h.computePassword(turnTestAPIKey, pID, expiry)
|
|
require.NoError(t, err)
|
|
expectedKey := turn.GenerateAuthKey(username, LivekitRealm, password)
|
|
|
|
for _, method := range []stun.Method{
|
|
stun.MethodRefresh,
|
|
stun.MethodCreatePermission,
|
|
stun.MethodChannelBind,
|
|
stun.MethodSend,
|
|
} {
|
|
t.Run(method.String(), func(t *testing.T) {
|
|
userID, key, ok := h.HandleAuth(&turn.RequestAttributes{
|
|
Username: username,
|
|
Realm: LivekitRealm,
|
|
SrcAddr: &net.UDPAddr{IP: net.ParseIP("127.0.0.1"), Port: 1234},
|
|
Method: method,
|
|
})
|
|
require.True(t, ok, "Non-allocate request with expired credentials must succeed")
|
|
require.Equal(t, string(pID), userID)
|
|
require.Equal(t, expectedKey, key)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestTURNAuthHandler_HandleAuth_WrongUsernameRejected(t *testing.T) {
|
|
h := newTestTurnAuthHandler()
|
|
_, _, ok := h.HandleAuth(&turn.RequestAttributes{
|
|
Username: "not-base62!!!",
|
|
Realm: LivekitRealm,
|
|
SrcAddr: &net.UDPAddr{IP: net.ParseIP("127.0.0.1"), Port: 1234},
|
|
Method: stun.MethodRefresh,
|
|
})
|
|
require.False(t, ok)
|
|
}
|