golanggohlsrtmpwebrtcmedia-serverobs-studiortcprtmp-proxyrtmp-serverrtprtsprtsp-proxyrtsp-relayrtsp-serversrtstreamingwebrtc-proxy
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
560 lines
12 KiB
560 lines
12 KiB
package core |
|
|
|
import ( |
|
"bytes" |
|
"context" |
|
"errors" |
|
"fmt" |
|
"io" |
|
"net" |
|
"net/http" |
|
"strings" |
|
"sync" |
|
"sync/atomic" |
|
"time" |
|
|
|
"github.com/aler9/gortsplib" |
|
"github.com/aler9/gortsplib/pkg/ringbuffer" |
|
"github.com/aler9/gortsplib/pkg/rtpaac" |
|
"github.com/aler9/gortsplib/pkg/rtph264" |
|
"github.com/pion/rtp" |
|
|
|
"github.com/aler9/rtsp-simple-server/internal/conf" |
|
"github.com/aler9/rtsp-simple-server/internal/hls" |
|
"github.com/aler9/rtsp-simple-server/internal/logger" |
|
) |
|
|
|
const ( |
|
closeCheckPeriod = 1 * time.Second |
|
closeAfterInactivity = 60 * time.Second |
|
) |
|
|
|
const index = `<!DOCTYPE html> |
|
<html> |
|
<head> |
|
<meta charset="utf-8"> |
|
<style> |
|
html, body { |
|
margin: 0; |
|
padding: 0; |
|
height: 100%; |
|
} |
|
#video { |
|
width: 100%; |
|
height: 100%; |
|
background: black; |
|
} |
|
</style> |
|
</head> |
|
<body> |
|
|
|
<video id="video" muted controls autoplay></video> |
|
|
|
<script src="https://cdn.jsdelivr.net/npm/hls.js@1.1.1"></script> |
|
|
|
<script> |
|
|
|
const create = () => { |
|
const video = document.getElementById('video'); |
|
|
|
if (video.canPlayType('application/vnd.apple.mpegurl')) { |
|
// since it's not possible to detect timeout errors in iOS, |
|
// wait for the playlist to be available before starting the stream |
|
fetch('stream.m3u8') |
|
.then(() => { |
|
video.src = 'index.m3u8'; |
|
video.play(); |
|
}); |
|
|
|
} else { |
|
const hls = new Hls({ |
|
progressive: true, |
|
}); |
|
|
|
hls.on(Hls.Events.ERROR, (evt, data) => { |
|
if (data.fatal) { |
|
hls.destroy(); |
|
|
|
setTimeout(create, 2000); |
|
} |
|
}); |
|
|
|
hls.loadSource('index.m3u8'); |
|
hls.attachMedia(video); |
|
|
|
video.play(); |
|
} |
|
}; |
|
|
|
window.addEventListener('DOMContentLoaded', create); |
|
|
|
</script> |
|
|
|
</body> |
|
</html> |
|
` |
|
|
|
type hlsMuxerResponse struct { |
|
status int |
|
header map[string]string |
|
body io.Reader |
|
} |
|
|
|
type hlsMuxerRequest struct { |
|
dir string |
|
file string |
|
req *http.Request |
|
res chan hlsMuxerResponse |
|
} |
|
|
|
type hlsMuxerTrackIDPayloadPair struct { |
|
trackID int |
|
packet *rtp.Packet |
|
} |
|
|
|
type hlsMuxerPathManager interface { |
|
onReaderSetupPlay(req pathReaderSetupPlayReq) pathReaderSetupPlayRes |
|
} |
|
|
|
type hlsMuxerParent interface { |
|
log(logger.Level, string, ...interface{}) |
|
onMuxerClose(*hlsMuxer) |
|
} |
|
|
|
type hlsMuxer struct { |
|
name string |
|
externalAuthenticationURL string |
|
hlsAlwaysRemux bool |
|
hlsSegmentCount int |
|
hlsSegmentDuration conf.StringDuration |
|
hlsSegmentMaxSize conf.StringSize |
|
readBufferCount int |
|
wg *sync.WaitGroup |
|
pathName string |
|
pathManager hlsMuxerPathManager |
|
parent hlsMuxerParent |
|
|
|
ctx context.Context |
|
ctxCancel func() |
|
path *path |
|
ringBuffer *ringbuffer.RingBuffer |
|
lastRequestTime *int64 |
|
muxer *hls.Muxer |
|
requests []hlsMuxerRequest |
|
|
|
// in |
|
request chan hlsMuxerRequest |
|
hlsServerAPIMuxersList chan hlsServerAPIMuxersListSubReq |
|
} |
|
|
|
func newHLSMuxer( |
|
parentCtx context.Context, |
|
name string, |
|
externalAuthenticationURL string, |
|
hlsAlwaysRemux bool, |
|
hlsSegmentCount int, |
|
hlsSegmentDuration conf.StringDuration, |
|
hlsSegmentMaxSize conf.StringSize, |
|
readBufferCount int, |
|
wg *sync.WaitGroup, |
|
pathName string, |
|
pathManager hlsMuxerPathManager, |
|
parent hlsMuxerParent, |
|
) *hlsMuxer { |
|
ctx, ctxCancel := context.WithCancel(parentCtx) |
|
|
|
m := &hlsMuxer{ |
|
name: name, |
|
externalAuthenticationURL: externalAuthenticationURL, |
|
hlsAlwaysRemux: hlsAlwaysRemux, |
|
hlsSegmentCount: hlsSegmentCount, |
|
hlsSegmentDuration: hlsSegmentDuration, |
|
hlsSegmentMaxSize: hlsSegmentMaxSize, |
|
readBufferCount: readBufferCount, |
|
wg: wg, |
|
pathName: pathName, |
|
pathManager: pathManager, |
|
parent: parent, |
|
ctx: ctx, |
|
ctxCancel: ctxCancel, |
|
lastRequestTime: func() *int64 { |
|
v := time.Now().Unix() |
|
return &v |
|
}(), |
|
request: make(chan hlsMuxerRequest), |
|
hlsServerAPIMuxersList: make(chan hlsServerAPIMuxersListSubReq), |
|
} |
|
|
|
m.log(logger.Info, "created") |
|
|
|
m.wg.Add(1) |
|
go m.run() |
|
|
|
return m |
|
} |
|
|
|
func (m *hlsMuxer) close() { |
|
m.ctxCancel() |
|
} |
|
|
|
func (m *hlsMuxer) log(level logger.Level, format string, args ...interface{}) { |
|
m.parent.log(level, "[muxer %s] "+format, append([]interface{}{m.pathName}, args...)...) |
|
} |
|
|
|
// PathName returns the path name. |
|
func (m *hlsMuxer) PathName() string { |
|
return m.pathName |
|
} |
|
|
|
func (m *hlsMuxer) run() { |
|
defer m.wg.Done() |
|
|
|
innerCtx, innerCtxCancel := context.WithCancel(context.Background()) |
|
innerReady := make(chan struct{}) |
|
innerErr := make(chan error) |
|
go func() { |
|
innerErr <- m.runInner(innerCtx, innerReady) |
|
}() |
|
|
|
isReady := false |
|
|
|
err := func() error { |
|
for { |
|
select { |
|
case <-m.ctx.Done(): |
|
innerCtxCancel() |
|
<-innerErr |
|
return errors.New("terminated") |
|
|
|
case req := <-m.request: |
|
if isReady { |
|
req.res <- m.handleRequest(req) |
|
} else { |
|
m.requests = append(m.requests, req) |
|
} |
|
|
|
case req := <-m.hlsServerAPIMuxersList: |
|
req.data.Items[m.name] = hlsServerAPIMuxersListItem{ |
|
LastRequest: time.Unix(atomic.LoadInt64(m.lastRequestTime), 0).String(), |
|
} |
|
close(req.res) |
|
|
|
case <-innerReady: |
|
isReady = true |
|
for _, req := range m.requests { |
|
req.res <- m.handleRequest(req) |
|
} |
|
m.requests = nil |
|
|
|
case err := <-innerErr: |
|
innerCtxCancel() |
|
return err |
|
} |
|
} |
|
}() |
|
|
|
m.ctxCancel() |
|
|
|
for _, req := range m.requests { |
|
req.res <- hlsMuxerResponse{status: http.StatusNotFound} |
|
} |
|
|
|
m.parent.onMuxerClose(m) |
|
|
|
m.log(logger.Info, "destroyed (%v)", err) |
|
} |
|
|
|
func (m *hlsMuxer) runInner(innerCtx context.Context, innerReady chan struct{}) error { |
|
res := m.pathManager.onReaderSetupPlay(pathReaderSetupPlayReq{ |
|
author: m, |
|
pathName: m.pathName, |
|
authenticate: nil, |
|
}) |
|
if res.err != nil { |
|
return res.err |
|
} |
|
|
|
m.path = res.path |
|
|
|
defer func() { |
|
m.path.onReaderRemove(pathReaderRemoveReq{author: m}) |
|
}() |
|
|
|
var videoTrack *gortsplib.TrackH264 |
|
videoTrackID := -1 |
|
var h264Decoder *rtph264.Decoder |
|
var audioTrack *gortsplib.TrackAAC |
|
audioTrackID := -1 |
|
var aacDecoder *rtpaac.Decoder |
|
|
|
for i, track := range res.stream.tracks() { |
|
switch tt := track.(type) { |
|
case *gortsplib.TrackH264: |
|
if videoTrack != nil { |
|
return fmt.Errorf("can't encode track %d with HLS: too many tracks", i+1) |
|
} |
|
|
|
videoTrack = tt |
|
videoTrackID = i |
|
h264Decoder = &rtph264.Decoder{} |
|
h264Decoder.Init() |
|
|
|
case *gortsplib.TrackAAC: |
|
if audioTrack != nil { |
|
return fmt.Errorf("can't encode track %d with HLS: too many tracks", i+1) |
|
} |
|
|
|
audioTrack = tt |
|
audioTrackID = i |
|
aacDecoder = &rtpaac.Decoder{SampleRate: track.ClockRate()} |
|
aacDecoder.Init() |
|
} |
|
} |
|
|
|
if videoTrack == nil && audioTrack == nil { |
|
return fmt.Errorf("the stream doesn't contain an H264 track or an AAC track") |
|
} |
|
|
|
var err error |
|
m.muxer, err = hls.NewMuxer( |
|
m.hlsSegmentCount, |
|
time.Duration(m.hlsSegmentDuration), |
|
uint64(m.hlsSegmentMaxSize), |
|
videoTrack, |
|
audioTrack, |
|
) |
|
if err != nil { |
|
return err |
|
} |
|
defer m.muxer.Close() |
|
|
|
innerReady <- struct{}{} |
|
|
|
m.ringBuffer = ringbuffer.New(uint64(m.readBufferCount)) |
|
|
|
m.path.onReaderPlay(pathReaderPlayReq{author: m}) |
|
|
|
writerDone := make(chan error) |
|
go func() { |
|
writerDone <- func() error { |
|
for { |
|
data, ok := m.ringBuffer.Pull() |
|
if !ok { |
|
return fmt.Errorf("terminated") |
|
} |
|
pair := data.(hlsMuxerTrackIDPayloadPair) |
|
|
|
if videoTrack != nil && pair.trackID == videoTrackID { |
|
nalus, pts, err := h264Decoder.DecodeUntilMarker(pair.packet) |
|
if err != nil { |
|
if err != rtph264.ErrMorePacketsNeeded && |
|
err != rtph264.ErrNonStartingPacketAndNoPrevious { |
|
m.log(logger.Warn, "unable to decode video track: %v", err) |
|
} |
|
continue |
|
} |
|
|
|
err = m.muxer.WriteH264(pts, nalus) |
|
if err != nil { |
|
m.log(logger.Warn, "unable to write segment: %v", err) |
|
continue |
|
} |
|
} else if audioTrack != nil && pair.trackID == audioTrackID { |
|
aus, pts, err := aacDecoder.Decode(pair.packet) |
|
if err != nil { |
|
if err != rtpaac.ErrMorePacketsNeeded { |
|
m.log(logger.Warn, "unable to decode audio track: %v", err) |
|
} |
|
continue |
|
} |
|
|
|
err = m.muxer.WriteAAC(pts, aus) |
|
if err != nil { |
|
m.log(logger.Warn, "unable to write segment: %v", err) |
|
continue |
|
} |
|
} |
|
} |
|
}() |
|
}() |
|
|
|
closeCheckTicker := time.NewTicker(closeCheckPeriod) |
|
defer closeCheckTicker.Stop() |
|
|
|
for { |
|
select { |
|
case <-closeCheckTicker.C: |
|
t := time.Unix(atomic.LoadInt64(m.lastRequestTime), 0) |
|
if !m.hlsAlwaysRemux && time.Since(t) >= closeAfterInactivity { |
|
m.ringBuffer.Close() |
|
<-writerDone |
|
return fmt.Errorf("not used anymore") |
|
} |
|
|
|
case err := <-writerDone: |
|
return err |
|
|
|
case <-innerCtx.Done(): |
|
m.ringBuffer.Close() |
|
<-writerDone |
|
return fmt.Errorf("terminated") |
|
} |
|
} |
|
} |
|
|
|
func (m *hlsMuxer) handleRequest(req hlsMuxerRequest) hlsMuxerResponse { |
|
atomic.StoreInt64(m.lastRequestTime, time.Now().Unix()) |
|
|
|
err := m.authenticate(req.req) |
|
if err != nil { |
|
if terr, ok := err.(pathErrAuthCritical); ok { |
|
m.log(logger.Info, "authentication error: %s", terr.message) |
|
return hlsMuxerResponse{ |
|
status: http.StatusUnauthorized, |
|
} |
|
} |
|
|
|
return hlsMuxerResponse{ |
|
status: http.StatusUnauthorized, |
|
header: map[string]string{ |
|
"WWW-Authenticate": `Basic realm="rtsp-simple-server"`, |
|
}, |
|
} |
|
} |
|
|
|
switch { |
|
case req.file == "index.m3u8": |
|
return hlsMuxerResponse{ |
|
status: http.StatusOK, |
|
header: map[string]string{ |
|
"Content-Type": `application/x-mpegURL`, |
|
}, |
|
body: m.muxer.PrimaryPlaylist(), |
|
} |
|
|
|
case req.file == "stream.m3u8": |
|
return hlsMuxerResponse{ |
|
status: http.StatusOK, |
|
header: map[string]string{ |
|
"Content-Type": `application/x-mpegURL`, |
|
}, |
|
body: m.muxer.StreamPlaylist(), |
|
} |
|
|
|
case strings.HasSuffix(req.file, ".ts"): |
|
r := m.muxer.Segment(req.file) |
|
if r == nil { |
|
return hlsMuxerResponse{status: http.StatusNotFound} |
|
} |
|
|
|
return hlsMuxerResponse{ |
|
status: http.StatusOK, |
|
header: map[string]string{ |
|
"Content-Type": `video/MP2T`, |
|
}, |
|
body: r, |
|
} |
|
|
|
case req.file == "": |
|
return hlsMuxerResponse{ |
|
status: http.StatusOK, |
|
header: map[string]string{ |
|
"Content-Type": `text/html`, |
|
}, |
|
body: bytes.NewReader([]byte(index)), |
|
} |
|
|
|
default: |
|
return hlsMuxerResponse{status: http.StatusNotFound} |
|
} |
|
} |
|
|
|
func (m *hlsMuxer) authenticate(req *http.Request) error { |
|
pathConf := m.path.Conf() |
|
pathIPs := pathConf.ReadIPs |
|
pathUser := pathConf.ReadUser |
|
pathPass := pathConf.ReadPass |
|
|
|
if m.externalAuthenticationURL != "" { |
|
tmp, _, _ := net.SplitHostPort(req.RemoteAddr) |
|
ip := net.ParseIP(tmp) |
|
user, pass, _ := req.BasicAuth() |
|
|
|
err := externalAuth( |
|
m.externalAuthenticationURL, |
|
ip.String(), |
|
user, |
|
pass, |
|
m.pathName, |
|
"read", |
|
req.URL.RawQuery) |
|
if err != nil { |
|
return pathErrAuthCritical{ |
|
message: fmt.Sprintf("external authentication failed: %s", err), |
|
} |
|
} |
|
} |
|
|
|
if pathIPs != nil { |
|
tmp, _, _ := net.SplitHostPort(req.RemoteAddr) |
|
ip := net.ParseIP(tmp) |
|
|
|
if !ipEqualOrInRange(ip, pathIPs) { |
|
return pathErrAuthCritical{ |
|
message: fmt.Sprintf("IP '%s' not allowed", ip), |
|
} |
|
} |
|
} |
|
|
|
if pathUser != "" { |
|
user, pass, ok := req.BasicAuth() |
|
if !ok { |
|
return pathErrAuthNotCritical{} |
|
} |
|
|
|
if user != string(pathUser) || pass != string(pathPass) { |
|
return pathErrAuthCritical{ |
|
message: "invalid credentials", |
|
} |
|
} |
|
} |
|
|
|
return nil |
|
} |
|
|
|
// onRequest is called by hlsserver.Server (forwarded from ServeHTTP). |
|
func (m *hlsMuxer) onRequest(req hlsMuxerRequest) { |
|
select { |
|
case m.request <- req: |
|
case <-m.ctx.Done(): |
|
req.res <- hlsMuxerResponse{status: http.StatusNotFound} |
|
} |
|
} |
|
|
|
// onReaderAccepted implements reader. |
|
func (m *hlsMuxer) onReaderAccepted() { |
|
m.log(logger.Info, "is converting into HLS") |
|
} |
|
|
|
// onReaderPacketRTP implements reader. |
|
func (m *hlsMuxer) onReaderPacketRTP(trackID int, pkt *rtp.Packet) { |
|
m.ringBuffer.Push(hlsMuxerTrackIDPayloadPair{trackID, pkt}) |
|
} |
|
|
|
// onReaderAPIDescribe implements reader. |
|
func (m *hlsMuxer) onReaderAPIDescribe() interface{} { |
|
return struct { |
|
Type string `json:"type"` |
|
}{"hlsMuxer"} |
|
} |
|
|
|
// onAPIHLSMuxersList is called by api. |
|
func (m *hlsMuxer) onAPIHLSMuxersList(req hlsServerAPIMuxersListSubReq) { |
|
req.res = make(chan struct{}) |
|
select { |
|
case m.hlsServerAPIMuxersList <- req: |
|
<-req.res |
|
|
|
case <-m.ctx.Done(): |
|
} |
|
}
|
|
|