forked from pion/webrtc
-
Notifications
You must be signed in to change notification settings - Fork 1
/
iceserver_js.go
63 lines (50 loc) · 1.68 KB
/
iceserver_js.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
// +build js,wasm
package webrtc
import (
"errors"
"github.com/pion/ice"
)
// ICEServer describes a single STUN and TURN server that can be used by
// the ICEAgent to establish a connection with a peer.
type ICEServer struct {
URLs []string
Username string
// Note: Credential and CredentialType are not supported.
// Credential interface{}
// CredentialType ICECredentialType
}
func (s ICEServer) parseURL(i int) (*ice.URL, error) {
return ice.ParseURL(s.URLs[i])
}
func (s ICEServer) validate() ([]*ice.URL, error) {
urls := []*ice.URL{}
for i := range s.URLs {
url, err := s.parseURL(i)
if err != nil {
return nil, err
}
if url.Scheme == ice.SchemeTypeTURN || url.Scheme == ice.SchemeTypeTURNS {
// // https://www.w3.org/TR/webrtc/#set-the-configuration (step #11.3.2)
// if s.Username == "" || s.Credential == nil {
// return nil, &rtcerr.InvalidAccessError{Err: ErrNoTurnCredentials}
// }
// switch s.CredentialType {
// case ICECredentialTypePassword:
// // https://www.w3.org/TR/webrtc/#set-the-configuration (step #11.3.3)
// if _, ok := s.Credential.(string); !ok {
// return nil, &rtcerr.InvalidAccessError{Err: ErrTurnCredentials}
// }
// case ICECredentialTypeOauth:
// // https://www.w3.org/TR/webrtc/#set-the-configuration (step #11.3.4)
// if _, ok := s.Credential.(OAuthCredential); !ok {
// return nil, &rtcerr.InvalidAccessError{Err: ErrTurnCredentials}
// }
// default:
// return nil, &rtcerr.InvalidAccessError{Err: ErrTurnCredentials}
// }
return nil, errors.New("TURN is not currently supported in the JavaScript/Wasm bindings")
}
urls = append(urls, url)
}
return urls, nil
}