mirror of
https://github.com/livekit/livekit.git
synced 2026-04-07 20:45:42 +00:00
* Add interface and ipfilter to udpmux option * validate external ip is accessable by client * add context * use external ip only for firefox * fix mapping error * Update pion/ice and use external ip only for firefox * Use single external ip for NAT1To1Ips if validate failed * update pion/ice
201 lines
4.4 KiB
Go
201 lines
4.4 KiB
Go
package config
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net"
|
|
"time"
|
|
|
|
"github.com/pion/stun"
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/livekit/protocol/logger"
|
|
)
|
|
|
|
func (conf *Config) determineIP() (string, error) {
|
|
if conf.RTC.UseExternalIP {
|
|
stunServers := conf.RTC.STUNServers
|
|
if len(stunServers) == 0 {
|
|
stunServers = DefaultStunServers
|
|
}
|
|
var err error
|
|
for i := 0; i < 3; i++ {
|
|
var ip string
|
|
ip, err = GetExternalIP(context.Background(), stunServers, nil)
|
|
if err == nil {
|
|
return ip, nil
|
|
} else {
|
|
time.Sleep(500 * time.Millisecond)
|
|
}
|
|
}
|
|
return "", errors.Errorf("could not resolve external IP: %v", err)
|
|
}
|
|
|
|
// use local ip instead
|
|
addresses, err := GetLocalIPAddresses(false)
|
|
if len(addresses) > 0 {
|
|
return addresses[0], err
|
|
}
|
|
return "", err
|
|
}
|
|
|
|
func GetLocalIPAddresses(includeLoopback bool) ([]string, error) {
|
|
ifaces, err := net.Interfaces()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
loopBacks := make([]string, 0)
|
|
addresses := make([]string, 0)
|
|
for _, iface := range ifaces {
|
|
addrs, err := iface.Addrs()
|
|
if err != nil {
|
|
continue
|
|
}
|
|
for _, addr := range addrs {
|
|
var ip net.IP
|
|
switch typedAddr := addr.(type) {
|
|
case *net.IPNet:
|
|
ip = typedAddr.IP.To4()
|
|
case *net.IPAddr:
|
|
ip = typedAddr.IP.To4()
|
|
default:
|
|
continue
|
|
}
|
|
if ip == nil {
|
|
continue
|
|
}
|
|
if ip.IsLoopback() {
|
|
loopBacks = append(loopBacks, ip.String())
|
|
} else {
|
|
addresses = append(addresses, ip.String())
|
|
}
|
|
}
|
|
}
|
|
|
|
if includeLoopback {
|
|
addresses = append(addresses, loopBacks...)
|
|
}
|
|
|
|
if len(addresses) > 0 {
|
|
return addresses, nil
|
|
}
|
|
if len(loopBacks) > 0 {
|
|
return loopBacks, nil
|
|
}
|
|
return nil, fmt.Errorf("could not find local IP address")
|
|
}
|
|
|
|
// GetExternalIP return external IP for localAddr from stun server. If localAddr is nil, a local address is chosen automatically,
|
|
// else the address will be used to validate the external IP is accessible from the outside.
|
|
func GetExternalIP(ctx context.Context, stunServers []string, localAddr net.Addr) (string, error) {
|
|
if len(stunServers) == 0 {
|
|
return "", errors.New("STUN servers are required but not defined")
|
|
}
|
|
dialer := &net.Dialer{
|
|
LocalAddr: localAddr,
|
|
}
|
|
conn, err := dialer.Dial("udp4", stunServers[0])
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
c, err := stun.NewClient(conn)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer c.Close()
|
|
|
|
message, err := stun.Build(stun.TransactionID, stun.BindingRequest)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
var stunErr error
|
|
// sufficiently large buffer to not block it
|
|
ipChan := make(chan string, 20)
|
|
err = c.Start(message, func(res stun.Event) {
|
|
if res.Error != nil {
|
|
stunErr = res.Error
|
|
return
|
|
}
|
|
|
|
var xorAddr stun.XORMappedAddress
|
|
if err := xorAddr.GetFrom(res.Message); err != nil {
|
|
stunErr = err
|
|
return
|
|
}
|
|
ip := xorAddr.IP.To4()
|
|
if ip != nil {
|
|
ipChan <- ip.String()
|
|
}
|
|
})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
ctx1, cancel := context.WithTimeout(ctx, 5*time.Second)
|
|
defer cancel()
|
|
select {
|
|
case nodeIP := <-ipChan:
|
|
if localAddr == nil {
|
|
return nodeIP, nil
|
|
}
|
|
_ = c.Close()
|
|
return nodeIP, validateExternalIP(ctx1, nodeIP, localAddr.(*net.UDPAddr))
|
|
case <-ctx1.Done():
|
|
msg := "could not determine public IP"
|
|
if stunErr != nil {
|
|
return "", errors.Wrap(stunErr, msg)
|
|
} else {
|
|
return "", fmt.Errorf(msg)
|
|
}
|
|
}
|
|
}
|
|
|
|
// validateExternalIP validates that the external IP is accessible from the outside by listen the local address,
|
|
// it will send a magic string to the external IP and check the string is received by the local address.
|
|
func validateExternalIP(ctx context.Context, nodeIP string, addr *net.UDPAddr) error {
|
|
srv, err := net.ListenUDP("udp", addr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer srv.Close()
|
|
|
|
magicString := "9#B8D2Nvg2xg5P$ZRwJ+f)*^Nne6*W3WamGY"
|
|
|
|
validCh := make(chan struct{})
|
|
go func() {
|
|
buf := make([]byte, 1024)
|
|
for {
|
|
n, err := srv.Read(buf)
|
|
if err != nil {
|
|
logger.Debugw("error reading from UDP socket", "err", err)
|
|
return
|
|
}
|
|
if string(buf[:n]) == magicString {
|
|
close(validCh)
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
cli, err := net.DialUDP("udp", nil, &net.UDPAddr{IP: net.ParseIP(nodeIP), Port: srv.LocalAddr().(*net.UDPAddr).Port})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer cli.Close()
|
|
|
|
if _, err = cli.Write([]byte(magicString)); err != nil {
|
|
return err
|
|
}
|
|
|
|
ctx1, cancel := context.WithTimeout(ctx, 1*time.Second)
|
|
defer cancel()
|
|
select {
|
|
case <-validCh:
|
|
return nil
|
|
case <-ctx1.Done():
|
|
break
|
|
}
|
|
return fmt.Errorf("could not validate external IP")
|
|
}
|