golanggohlsrtmpwebrtcmedia-serverobs-studiortcprtmp-proxyrtmp-serverrtprtsprtsp-proxyrtsp-relayrtsp-serversrtstreamingwebrtc-proxy
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
472 lines
11 KiB
472 lines
11 KiB
package core |
|
|
|
import ( |
|
"context" |
|
"crypto/hmac" |
|
"crypto/rand" |
|
"crypto/sha1" |
|
"encoding/base64" |
|
"fmt" |
|
"net" |
|
"net/http" |
|
"sort" |
|
"strconv" |
|
"sync" |
|
"time" |
|
|
|
"github.com/google/uuid" |
|
"github.com/pion/ice/v2" |
|
"github.com/pion/webrtc/v3" |
|
|
|
"github.com/bluenviron/mediamtx/internal/conf" |
|
"github.com/bluenviron/mediamtx/internal/logger" |
|
) |
|
|
|
const ( |
|
webrtcHandshakeTimeout = 10 * time.Second |
|
webrtcTrackGatherTimeout = 2 * time.Second |
|
webrtcPayloadMaxSize = 1188 // 1200 - 12 (RTP header) |
|
webrtcStreamID = "mediamtx" |
|
webrtcTurnSecretExpiration = 24 * 3600 * time.Second |
|
) |
|
|
|
func randInt63() int64 { |
|
var b [8]byte |
|
rand.Read(b[:]) |
|
return int64(uint64(b[0]&0b01111111)<<56 | uint64(b[1])<<48 | uint64(b[2])<<40 | uint64(b[3])<<32 | |
|
uint64(b[4])<<24 | uint64(b[5])<<16 | uint64(b[6])<<8 | uint64(b[7])) |
|
} |
|
|
|
// https://cs.opensource.google/go/go/+/refs/tags/go1.20.4:src/math/rand/rand.go;l=119 |
|
func randInt63n(n int64) int64 { |
|
if n&(n-1) == 0 { // n is power of two, can mask |
|
return randInt63() & (n - 1) |
|
} |
|
max := int64((1 << 63) - 1 - (1<<63)%uint64(n)) |
|
v := randInt63() |
|
for v > max { |
|
v = randInt63() |
|
} |
|
return v % n |
|
} |
|
|
|
func randomTurnUser() string { |
|
const charset = "abcdefghijklmnopqrstuvwxyz1234567890" |
|
b := make([]byte, 20) |
|
for i := range b { |
|
b[i] = charset[int(randInt63n(int64(len(charset))))] |
|
} |
|
return string(b) |
|
} |
|
|
|
type webRTCManagerAPISessionsListRes struct { |
|
data *apiWebRTCSessionsList |
|
err error |
|
} |
|
|
|
type webRTCManagerAPISessionsListReq struct { |
|
res chan webRTCManagerAPISessionsListRes |
|
} |
|
|
|
type webRTCManagerAPISessionsKickRes struct { |
|
err error |
|
} |
|
|
|
type webRTCManagerAPISessionsKickReq struct { |
|
uuid uuid.UUID |
|
res chan webRTCManagerAPISessionsKickRes |
|
} |
|
|
|
type webRTCManagerAPISessionsGetRes struct { |
|
data *apiWebRTCSession |
|
err error |
|
} |
|
|
|
type webRTCManagerAPISessionsGetReq struct { |
|
uuid uuid.UUID |
|
res chan webRTCManagerAPISessionsGetRes |
|
} |
|
|
|
type webRTCSessionNewRes struct { |
|
sx *webRTCSession |
|
answer []byte |
|
err error |
|
errStatusCode int |
|
} |
|
|
|
type webRTCSessionNewReq struct { |
|
pathName string |
|
remoteAddr string |
|
offer []byte |
|
publish bool |
|
res chan webRTCSessionNewRes |
|
} |
|
|
|
type webRTCSessionAddCandidatesRes struct { |
|
sx *webRTCSession |
|
err error |
|
} |
|
|
|
type webRTCSessionAddCandidatesReq struct { |
|
secret uuid.UUID |
|
candidates []*webrtc.ICECandidateInit |
|
res chan webRTCSessionAddCandidatesRes |
|
} |
|
|
|
type webRTCManagerParent interface { |
|
logger.Writer |
|
} |
|
|
|
type webRTCManager struct { |
|
allowOrigin string |
|
trustedProxies conf.IPsOrCIDRs |
|
iceServers []conf.WebRTCICEServer |
|
readBufferCount int |
|
pathManager *pathManager |
|
metrics *metrics |
|
parent webRTCManagerParent |
|
|
|
ctx context.Context |
|
ctxCancel func() |
|
httpServer *webRTCHTTPServer |
|
udpMuxLn net.PacketConn |
|
tcpMuxLn net.Listener |
|
sessions map[*webRTCSession]struct{} |
|
sessionsBySecret map[uuid.UUID]*webRTCSession |
|
iceHostNAT1To1IPs []string |
|
iceUDPMux ice.UDPMux |
|
iceTCPMux ice.TCPMux |
|
|
|
// in |
|
chSessionNew chan webRTCSessionNewReq |
|
chSessionClose chan *webRTCSession |
|
chSessionAddCandidates chan webRTCSessionAddCandidatesReq |
|
chAPISessionsList chan webRTCManagerAPISessionsListReq |
|
chAPISessionsGet chan webRTCManagerAPISessionsGetReq |
|
chAPIConnsKick chan webRTCManagerAPISessionsKickReq |
|
|
|
// out |
|
done chan struct{} |
|
} |
|
|
|
func newWebRTCManager( |
|
address string, |
|
encryption bool, |
|
serverKey string, |
|
serverCert string, |
|
allowOrigin string, |
|
trustedProxies conf.IPsOrCIDRs, |
|
iceServers []conf.WebRTCICEServer, |
|
readTimeout conf.StringDuration, |
|
readBufferCount int, |
|
pathManager *pathManager, |
|
metrics *metrics, |
|
parent webRTCManagerParent, |
|
iceHostNAT1To1IPs []string, |
|
iceUDPMuxAddress string, |
|
iceTCPMuxAddress string, |
|
) (*webRTCManager, error) { |
|
ctx, ctxCancel := context.WithCancel(context.Background()) |
|
|
|
m := &webRTCManager{ |
|
allowOrigin: allowOrigin, |
|
trustedProxies: trustedProxies, |
|
iceServers: iceServers, |
|
readBufferCount: readBufferCount, |
|
pathManager: pathManager, |
|
metrics: metrics, |
|
parent: parent, |
|
ctx: ctx, |
|
ctxCancel: ctxCancel, |
|
iceHostNAT1To1IPs: iceHostNAT1To1IPs, |
|
sessions: make(map[*webRTCSession]struct{}), |
|
sessionsBySecret: make(map[uuid.UUID]*webRTCSession), |
|
chSessionNew: make(chan webRTCSessionNewReq), |
|
chSessionClose: make(chan *webRTCSession), |
|
chSessionAddCandidates: make(chan webRTCSessionAddCandidatesReq), |
|
chAPISessionsList: make(chan webRTCManagerAPISessionsListReq), |
|
chAPISessionsGet: make(chan webRTCManagerAPISessionsGetReq), |
|
chAPIConnsKick: make(chan webRTCManagerAPISessionsKickReq), |
|
done: make(chan struct{}), |
|
} |
|
|
|
var err error |
|
m.httpServer, err = newWebRTCHTTPServer( |
|
address, |
|
encryption, |
|
serverKey, |
|
serverCert, |
|
allowOrigin, |
|
trustedProxies, |
|
readTimeout, |
|
pathManager, |
|
m, |
|
) |
|
if err != nil { |
|
ctxCancel() |
|
return nil, err |
|
} |
|
|
|
if iceUDPMuxAddress != "" { |
|
m.udpMuxLn, err = net.ListenPacket(restrictNetwork("udp", iceUDPMuxAddress)) |
|
if err != nil { |
|
m.httpServer.close() |
|
ctxCancel() |
|
return nil, err |
|
} |
|
m.iceUDPMux = webrtc.NewICEUDPMux(nil, m.udpMuxLn) |
|
} |
|
|
|
if iceTCPMuxAddress != "" { |
|
m.tcpMuxLn, err = net.Listen(restrictNetwork("tcp", iceTCPMuxAddress)) |
|
if err != nil { |
|
m.udpMuxLn.Close() |
|
m.httpServer.close() |
|
ctxCancel() |
|
return nil, err |
|
} |
|
m.iceTCPMux = webrtc.NewICETCPMux(nil, m.tcpMuxLn, 8) |
|
} |
|
|
|
str := "listener opened on " + address + " (HTTP)" |
|
if m.udpMuxLn != nil { |
|
str += ", " + iceUDPMuxAddress + " (ICE/UDP)" |
|
} |
|
if m.tcpMuxLn != nil { |
|
str += ", " + iceTCPMuxAddress + " (ICE/TCP)" |
|
} |
|
m.Log(logger.Info, str) |
|
|
|
if m.metrics != nil { |
|
m.metrics.webRTCManagerSet(m) |
|
} |
|
|
|
go m.run() |
|
|
|
return m, nil |
|
} |
|
|
|
// Log is the main logging function. |
|
func (m *webRTCManager) Log(level logger.Level, format string, args ...interface{}) { |
|
m.parent.Log(level, "[WebRTC] "+format, append([]interface{}{}, args...)...) |
|
} |
|
|
|
func (m *webRTCManager) close() { |
|
m.Log(logger.Info, "listener is closing") |
|
m.ctxCancel() |
|
<-m.done |
|
} |
|
|
|
func (m *webRTCManager) run() { |
|
defer close(m.done) |
|
|
|
var wg sync.WaitGroup |
|
|
|
outer: |
|
for { |
|
select { |
|
case req := <-m.chSessionNew: |
|
sx := newWebRTCSession( |
|
m.ctx, |
|
m.readBufferCount, |
|
req.remoteAddr, |
|
&wg, |
|
m.iceHostNAT1To1IPs, |
|
m.iceUDPMux, |
|
m.iceTCPMux, |
|
m.pathManager, |
|
m, |
|
) |
|
m.sessions[sx] = struct{}{} |
|
m.sessionsBySecret[sx.secret] = sx |
|
req.res <- webRTCSessionNewRes{sx: sx} |
|
|
|
case sx := <-m.chSessionClose: |
|
delete(m.sessions, sx) |
|
delete(m.sessionsBySecret, sx.secret) |
|
|
|
case req := <-m.chSessionAddCandidates: |
|
sx, ok := m.sessionsBySecret[req.secret] |
|
if !ok { |
|
req.res <- webRTCSessionAddCandidatesRes{err: fmt.Errorf("session not found")} |
|
continue |
|
} |
|
|
|
req.res <- webRTCSessionAddCandidatesRes{sx: sx} |
|
|
|
case req := <-m.chAPISessionsList: |
|
data := &apiWebRTCSessionsList{ |
|
Items: []*apiWebRTCSession{}, |
|
} |
|
|
|
for sx := range m.sessions { |
|
data.Items = append(data.Items, sx.apiItem()) |
|
} |
|
|
|
sort.Slice(data.Items, func(i, j int) bool { |
|
return data.Items[i].Created.Before(data.Items[j].Created) |
|
}) |
|
|
|
req.res <- webRTCManagerAPISessionsListRes{data: data} |
|
|
|
case req := <-m.chAPISessionsGet: |
|
sx := m.findSessionByUUID(req.uuid) |
|
if sx == nil { |
|
req.res <- webRTCManagerAPISessionsGetRes{err: errAPINotFound} |
|
continue |
|
} |
|
|
|
req.res <- webRTCManagerAPISessionsGetRes{data: sx.apiItem()} |
|
|
|
case req := <-m.chAPIConnsKick: |
|
sx := m.findSessionByUUID(req.uuid) |
|
if sx == nil { |
|
req.res <- webRTCManagerAPISessionsKickRes{err: errAPINotFound} |
|
continue |
|
} |
|
|
|
delete(m.sessions, sx) |
|
delete(m.sessionsBySecret, sx.secret) |
|
sx.close() |
|
req.res <- webRTCManagerAPISessionsKickRes{} |
|
|
|
case <-m.ctx.Done(): |
|
break outer |
|
} |
|
} |
|
|
|
m.ctxCancel() |
|
|
|
wg.Wait() |
|
|
|
m.httpServer.close() |
|
|
|
if m.udpMuxLn != nil { |
|
m.udpMuxLn.Close() |
|
} |
|
|
|
if m.tcpMuxLn != nil { |
|
m.tcpMuxLn.Close() |
|
} |
|
} |
|
|
|
func (m *webRTCManager) findSessionByUUID(uuid uuid.UUID) *webRTCSession { |
|
for sx := range m.sessions { |
|
if sx.uuid == uuid { |
|
return sx |
|
} |
|
} |
|
return nil |
|
} |
|
|
|
func (m *webRTCManager) generateICEServers() []webrtc.ICEServer { |
|
ret := make([]webrtc.ICEServer, len(m.iceServers)) |
|
for i, server := range m.iceServers { |
|
if server.Username == "AUTH_SECRET" { |
|
expireDate := time.Now().Add(webrtcTurnSecretExpiration).Unix() |
|
server.Username = strconv.FormatInt(expireDate, 10) + ":" + randomTurnUser() |
|
h := hmac.New(sha1.New, []byte(server.Password)) |
|
h.Write([]byte(server.Username)) |
|
server.Password = base64.StdEncoding.EncodeToString(h.Sum(nil)) |
|
} |
|
|
|
ret[i] = webrtc.ICEServer{ |
|
URLs: []string{server.URL}, |
|
Username: server.Username, |
|
Credential: server.Password, |
|
} |
|
} |
|
return ret |
|
} |
|
|
|
// sessionNew is called by webRTCHTTPServer. |
|
func (m *webRTCManager) sessionNew(req webRTCSessionNewReq) webRTCSessionNewRes { |
|
req.res = make(chan webRTCSessionNewRes) |
|
|
|
select { |
|
case m.chSessionNew <- req: |
|
res := <-req.res |
|
|
|
return res.sx.new(req) |
|
|
|
case <-m.ctx.Done(): |
|
return webRTCSessionNewRes{err: fmt.Errorf("terminated"), errStatusCode: http.StatusInternalServerError} |
|
} |
|
} |
|
|
|
// sessionClose is called by webRTCSession. |
|
func (m *webRTCManager) sessionClose(sx *webRTCSession) { |
|
select { |
|
case m.chSessionClose <- sx: |
|
case <-m.ctx.Done(): |
|
} |
|
} |
|
|
|
// sessionAddCandidates is called by webRTCHTTPServer. |
|
func (m *webRTCManager) sessionAddCandidates( |
|
req webRTCSessionAddCandidatesReq, |
|
) webRTCSessionAddCandidatesRes { |
|
req.res = make(chan webRTCSessionAddCandidatesRes) |
|
select { |
|
case m.chSessionAddCandidates <- req: |
|
res1 := <-req.res |
|
if res1.err != nil { |
|
return res1 |
|
} |
|
|
|
return res1.sx.addCandidates(req) |
|
|
|
case <-m.ctx.Done(): |
|
return webRTCSessionAddCandidatesRes{err: fmt.Errorf("terminated")} |
|
} |
|
} |
|
|
|
// apiSessionsList is called by api. |
|
func (m *webRTCManager) apiSessionsList() (*apiWebRTCSessionsList, error) { |
|
req := webRTCManagerAPISessionsListReq{ |
|
res: make(chan webRTCManagerAPISessionsListRes), |
|
} |
|
|
|
select { |
|
case m.chAPISessionsList <- req: |
|
res := <-req.res |
|
return res.data, res.err |
|
|
|
case <-m.ctx.Done(): |
|
return nil, fmt.Errorf("terminated") |
|
} |
|
} |
|
|
|
// apiSessionsGet is called by api. |
|
func (m *webRTCManager) apiSessionsGet(uuid uuid.UUID) (*apiWebRTCSession, error) { |
|
req := webRTCManagerAPISessionsGetReq{ |
|
uuid: uuid, |
|
res: make(chan webRTCManagerAPISessionsGetRes), |
|
} |
|
|
|
select { |
|
case m.chAPISessionsGet <- req: |
|
res := <-req.res |
|
return res.data, res.err |
|
|
|
case <-m.ctx.Done(): |
|
return nil, fmt.Errorf("terminated") |
|
} |
|
} |
|
|
|
// apiSessionsKick is called by api. |
|
func (m *webRTCManager) apiSessionsKick(uuid uuid.UUID) error { |
|
req := webRTCManagerAPISessionsKickReq{ |
|
uuid: uuid, |
|
res: make(chan webRTCManagerAPISessionsKickRes), |
|
} |
|
|
|
select { |
|
case m.chAPIConnsKick <- req: |
|
res := <-req.res |
|
return res.err |
|
|
|
case <-m.ctx.Done(): |
|
return fmt.Errorf("terminated") |
|
} |
|
}
|
|
|