mirror of https://github.com/EasyDarwin/EasyDarwin
726 lines
20 KiB
Go
726 lines
20 KiB
Go
package rtsp
|
||
|
||
import (
|
||
"bufio"
|
||
"bytes"
|
||
"crypto/md5"
|
||
"encoding/binary"
|
||
"fmt"
|
||
"io"
|
||
"log"
|
||
"net"
|
||
"net/url"
|
||
"os"
|
||
"regexp"
|
||
"strconv"
|
||
"strings"
|
||
"sync"
|
||
"time"
|
||
|
||
"github.com/EasyDarwin/EasyDarwin/models"
|
||
"github.com/penggy/EasyGoLib/db"
|
||
"github.com/penggy/EasyGoLib/utils"
|
||
|
||
"github.com/teris-io/shortid"
|
||
)
|
||
|
||
type RTPPack struct {
|
||
Type RTPType
|
||
Buffer *bytes.Buffer
|
||
}
|
||
|
||
type SessionType int
|
||
|
||
const (
|
||
SESSION_TYPE_PUSHER SessionType = iota
|
||
SESSEION_TYPE_PLAYER
|
||
)
|
||
|
||
func (st SessionType) String() string {
|
||
switch st {
|
||
case SESSION_TYPE_PUSHER:
|
||
return "pusher"
|
||
case SESSEION_TYPE_PLAYER:
|
||
return "player"
|
||
}
|
||
return "unknow"
|
||
}
|
||
|
||
type RTPType int
|
||
|
||
const (
|
||
RTP_TYPE_AUDIO RTPType = iota
|
||
RTP_TYPE_VIDEO
|
||
RTP_TYPE_AUDIOCONTROL
|
||
RTP_TYPE_VIDEOCONTROL
|
||
)
|
||
|
||
func (rt RTPType) String() string {
|
||
switch rt {
|
||
case RTP_TYPE_AUDIO:
|
||
return "audio"
|
||
case RTP_TYPE_VIDEO:
|
||
return "video"
|
||
case RTP_TYPE_AUDIOCONTROL:
|
||
return "audio control"
|
||
case RTP_TYPE_VIDEOCONTROL:
|
||
return "video control"
|
||
}
|
||
return "unknow"
|
||
}
|
||
|
||
type TransType int
|
||
|
||
const (
|
||
TRANS_TYPE_TCP TransType = iota
|
||
TRANS_TYPE_UDP
|
||
)
|
||
|
||
func (tt TransType) String() string {
|
||
switch tt {
|
||
case TRANS_TYPE_TCP:
|
||
return "TCP"
|
||
case TRANS_TYPE_UDP:
|
||
return "UDP"
|
||
}
|
||
return "unknow"
|
||
}
|
||
|
||
const UDP_BUF_SIZE = 1048576
|
||
|
||
type Session struct {
|
||
SessionLogger
|
||
ID string
|
||
Server *Server
|
||
Conn *RichConn
|
||
connRW *bufio.ReadWriter
|
||
connWLock sync.RWMutex
|
||
Type SessionType
|
||
TransType TransType
|
||
Path string
|
||
URL string
|
||
SDPRaw string
|
||
SDPMap map[string]*SDPInfo
|
||
|
||
authorizationEnable bool
|
||
nonce string
|
||
closeOld bool
|
||
|
||
AControl string
|
||
VControl string
|
||
ACodec string
|
||
VCodec string
|
||
|
||
// stats info
|
||
InBytes int
|
||
OutBytes int
|
||
StartAt time.Time
|
||
Timeout int
|
||
|
||
Stoped bool
|
||
|
||
//tcp channels
|
||
aRTPChannel int
|
||
aRTPControlChannel int
|
||
vRTPChannel int
|
||
vRTPControlChannel int
|
||
|
||
Pusher *Pusher
|
||
Player *Player
|
||
UDPClient *UDPClient
|
||
RTPHandles []func(*RTPPack)
|
||
StopHandles []func()
|
||
}
|
||
|
||
func (session *Session) String() string {
|
||
return fmt.Sprintf("session[%v][%v][%s][%s]", session.Type, session.TransType, session.Path, session.ID)
|
||
}
|
||
|
||
func NewSession(server *Server, conn net.Conn) *Session {
|
||
networkBuffer := utils.Conf().Section("rtsp").Key("network_buffer").MustInt(204800)
|
||
timeoutMillis := utils.Conf().Section("rtsp").Key("timeout").MustInt(0)
|
||
timeoutTCPConn := &RichConn{conn, time.Duration(timeoutMillis) * time.Millisecond}
|
||
authorizationEnable := utils.Conf().Section("rtsp").Key("authorization_enable").MustInt(0)
|
||
close_old := utils.Conf().Section("rtsp").Key("close_old").MustInt(0)
|
||
session := &Session{
|
||
ID: shortid.MustGenerate(),
|
||
Server: server,
|
||
Conn: timeoutTCPConn,
|
||
connRW: bufio.NewReadWriter(bufio.NewReaderSize(timeoutTCPConn, networkBuffer), bufio.NewWriterSize(timeoutTCPConn, networkBuffer)),
|
||
StartAt: time.Now(),
|
||
Timeout: utils.Conf().Section("rtsp").Key("timeout").MustInt(0),
|
||
authorizationEnable: authorizationEnable != 0,
|
||
RTPHandles: make([]func(*RTPPack), 0),
|
||
StopHandles: make([]func(), 0),
|
||
vRTPChannel: -1,
|
||
vRTPControlChannel: -1,
|
||
aRTPChannel: -1,
|
||
aRTPControlChannel: -1,
|
||
closeOld: close_old != 0,
|
||
}
|
||
|
||
session.logger = log.New(os.Stdout, fmt.Sprintf("[%s]", session.ID), log.LstdFlags|log.Lshortfile)
|
||
if !utils.Debug {
|
||
session.logger.SetOutput(utils.GetLogWriter())
|
||
}
|
||
return session
|
||
}
|
||
|
||
func (session *Session) Stop() {
|
||
if session.Stoped {
|
||
return
|
||
}
|
||
session.Stoped = true
|
||
for _, h := range session.StopHandles {
|
||
h()
|
||
}
|
||
if session.Conn != nil {
|
||
session.connRW.Flush()
|
||
session.Conn.Close()
|
||
session.Conn = nil
|
||
}
|
||
if session.UDPClient != nil {
|
||
session.UDPClient.Stop()
|
||
session.UDPClient = nil
|
||
}
|
||
}
|
||
|
||
func (session *Session) Start() {
|
||
defer session.Stop()
|
||
buf1 := make([]byte, 1)
|
||
buf2 := make([]byte, 2)
|
||
logger := session.logger
|
||
timer := time.Unix(0, 0)
|
||
for !session.Stoped {
|
||
if _, err := io.ReadFull(session.connRW, buf1); err != nil {
|
||
logger.Println(session, err)
|
||
return
|
||
}
|
||
if buf1[0] == 0x24 { //rtp data
|
||
if _, err := io.ReadFull(session.connRW, buf1); err != nil {
|
||
logger.Println(err)
|
||
return
|
||
}
|
||
if _, err := io.ReadFull(session.connRW, buf2); err != nil {
|
||
logger.Println(err)
|
||
return
|
||
}
|
||
channel := int(buf1[0])
|
||
rtpLen := int(binary.BigEndian.Uint16(buf2))
|
||
rtpBytes := make([]byte, rtpLen)
|
||
if _, err := io.ReadFull(session.connRW, rtpBytes); err != nil {
|
||
logger.Println(err)
|
||
return
|
||
}
|
||
rtpBuf := bytes.NewBuffer(rtpBytes)
|
||
var pack *RTPPack
|
||
switch channel {
|
||
case session.aRTPChannel:
|
||
pack = &RTPPack{
|
||
Type: RTP_TYPE_AUDIO,
|
||
Buffer: rtpBuf,
|
||
}
|
||
elapsed := time.Now().Sub(timer)
|
||
if elapsed >= 30*time.Second {
|
||
logger.Println("Recv an audio RTP package")
|
||
timer = time.Now()
|
||
}
|
||
case session.aRTPControlChannel:
|
||
pack = &RTPPack{
|
||
Type: RTP_TYPE_AUDIOCONTROL,
|
||
Buffer: rtpBuf,
|
||
}
|
||
case session.vRTPChannel:
|
||
pack = &RTPPack{
|
||
Type: RTP_TYPE_VIDEO,
|
||
Buffer: rtpBuf,
|
||
}
|
||
elapsed := time.Now().Sub(timer)
|
||
if elapsed >= 30*time.Second {
|
||
logger.Println("Recv an video RTP package")
|
||
timer = time.Now()
|
||
}
|
||
case session.vRTPControlChannel:
|
||
pack = &RTPPack{
|
||
Type: RTP_TYPE_VIDEOCONTROL,
|
||
Buffer: rtpBuf,
|
||
}
|
||
default:
|
||
logger.Printf("unknow rtp pack type, %v", pack.Type)
|
||
continue
|
||
}
|
||
if pack == nil {
|
||
logger.Printf("session tcp got nil rtp pack")
|
||
continue
|
||
}
|
||
session.InBytes += rtpLen + 4
|
||
for _, h := range session.RTPHandles {
|
||
h(pack)
|
||
}
|
||
} else { // rtsp cmd
|
||
reqBuf := bytes.NewBuffer(nil)
|
||
reqBuf.Write(buf1)
|
||
for !session.Stoped {
|
||
if line, isPrefix, err := session.connRW.ReadLine(); err != nil {
|
||
logger.Println(err)
|
||
return
|
||
} else {
|
||
reqBuf.Write(line)
|
||
if !isPrefix {
|
||
reqBuf.WriteString("\r\n")
|
||
}
|
||
if len(line) == 0 {
|
||
req := NewRequest(reqBuf.String())
|
||
if req == nil {
|
||
break
|
||
}
|
||
session.InBytes += reqBuf.Len()
|
||
contentLen := req.GetContentLength()
|
||
session.InBytes += contentLen
|
||
if contentLen > 0 {
|
||
bodyBuf := make([]byte, contentLen)
|
||
if n, err := io.ReadFull(session.connRW, bodyBuf); err != nil {
|
||
logger.Println(err)
|
||
return
|
||
} else if n != contentLen {
|
||
logger.Printf("read rtsp request body failed, expect size[%d], got size[%d]", contentLen, n)
|
||
return
|
||
}
|
||
req.Body = string(bodyBuf)
|
||
}
|
||
session.handleRequest(req)
|
||
break
|
||
}
|
||
}
|
||
}
|
||
}
|
||
}
|
||
}
|
||
|
||
func CheckAuth(authLine string, method string, sessionNonce string) error {
|
||
realmRex := regexp.MustCompile(`realm="(.*?)"`)
|
||
nonceRex := regexp.MustCompile(`nonce="(.*?)"`)
|
||
usernameRex := regexp.MustCompile(`username="(.*?)"`)
|
||
responseRex := regexp.MustCompile(`response="(.*?)"`)
|
||
uriRex := regexp.MustCompile(`uri="(.*?)"`)
|
||
|
||
realm := ""
|
||
nonce := ""
|
||
username := ""
|
||
response := ""
|
||
uri := ""
|
||
result1 := realmRex.FindStringSubmatch(authLine)
|
||
if len(result1) == 2 {
|
||
realm = result1[1]
|
||
} else {
|
||
return fmt.Errorf("CheckAuth error : no realm found")
|
||
}
|
||
result1 = nonceRex.FindStringSubmatch(authLine)
|
||
if len(result1) == 2 {
|
||
nonce = result1[1]
|
||
} else {
|
||
return fmt.Errorf("CheckAuth error : no nonce found")
|
||
}
|
||
if sessionNonce != nonce {
|
||
return fmt.Errorf("CheckAuth error : sessionNonce not same as nonce")
|
||
}
|
||
|
||
result1 = usernameRex.FindStringSubmatch(authLine)
|
||
if len(result1) == 2 {
|
||
username = result1[1]
|
||
} else {
|
||
return fmt.Errorf("CheckAuth error : username not found")
|
||
}
|
||
|
||
result1 = responseRex.FindStringSubmatch(authLine)
|
||
if len(result1) == 2 {
|
||
response = result1[1]
|
||
} else {
|
||
return fmt.Errorf("CheckAuth error : response not found")
|
||
}
|
||
|
||
result1 = uriRex.FindStringSubmatch(authLine)
|
||
if len(result1) == 2 {
|
||
uri = result1[1]
|
||
} else {
|
||
return fmt.Errorf("CheckAuth error : uri not found")
|
||
}
|
||
var user models.User
|
||
err := db.SQLite.Where("Username = ?", username).First(&user).Error
|
||
if err != nil {
|
||
return fmt.Errorf("CheckAuth error : user not exists")
|
||
}
|
||
md5UserRealmPwd := fmt.Sprintf("%x", md5.Sum([]byte(fmt.Sprintf("%s:%s:%s", username, realm, user.Password))))
|
||
md5MethodURL := fmt.Sprintf("%x", md5.Sum([]byte(fmt.Sprintf("%s:%s", method, uri))))
|
||
myResponse := fmt.Sprintf("%x", md5.Sum([]byte(fmt.Sprintf("%s:%s:%s", md5UserRealmPwd, nonce, md5MethodURL))))
|
||
if myResponse != response {
|
||
return fmt.Errorf("CheckAuth error : response not equal")
|
||
}
|
||
return nil
|
||
}
|
||
|
||
func (session *Session) handleRequest(req *Request) {
|
||
//if session.Timeout > 0 {
|
||
// session.Conn.SetDeadline(time.Now().Add(time.Duration(session.Timeout) * time.Second))
|
||
//}
|
||
logger := session.logger
|
||
logger.Printf("<<<\n%s", req)
|
||
res := NewResponse(200, "OK", req.Header["CSeq"], session.ID, "")
|
||
defer func() {
|
||
if p := recover(); p != nil {
|
||
res.StatusCode = 500
|
||
res.Status = fmt.Sprintf("Inner Server Error, %v", p)
|
||
}
|
||
logger.Printf(">>>\n%s", res)
|
||
outBytes := []byte(res.String())
|
||
session.connWLock.Lock()
|
||
session.connRW.Write(outBytes)
|
||
session.connRW.Flush()
|
||
session.connWLock.Unlock()
|
||
session.OutBytes += len(outBytes)
|
||
switch req.Method {
|
||
case "PLAY", "RECORD":
|
||
switch session.Type {
|
||
case SESSEION_TYPE_PLAYER:
|
||
session.Pusher.AddPlayer(session.Player)
|
||
// case SESSION_TYPE_PUSHER:
|
||
// session.Server.AddPusher(session.Pusher)
|
||
}
|
||
case "TEARDOWN":
|
||
{
|
||
session.Stop()
|
||
return
|
||
}
|
||
}
|
||
if res.StatusCode != 200 && res.StatusCode != 401 {
|
||
logger.Printf("Response request error[%d]. stop session.", res.StatusCode)
|
||
session.Stop()
|
||
}
|
||
}()
|
||
if req.Method != "OPTIONS" {
|
||
if session.authorizationEnable {
|
||
authLine := req.Header["Authorization"]
|
||
authFailed := true
|
||
if authLine != "" {
|
||
err := CheckAuth(authLine, req.Method, session.nonce)
|
||
if err == nil {
|
||
authFailed = false
|
||
} else {
|
||
logger.Printf("%v", err)
|
||
}
|
||
}
|
||
if authFailed {
|
||
res.StatusCode = 401
|
||
res.Status = "Unauthorized"
|
||
nonce := fmt.Sprintf("%x", md5.Sum([]byte(shortid.MustGenerate())))
|
||
session.nonce = nonce
|
||
res.Header["WWW-Authenticate"] = fmt.Sprintf(`Digest realm="EasyDarwin", nonce="%s", algorithm="MD5"`, nonce)
|
||
return
|
||
}
|
||
}
|
||
}
|
||
switch req.Method {
|
||
case "OPTIONS":
|
||
res.Header["Public"] = "DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, OPTIONS, ANNOUNCE, RECORD"
|
||
case "ANNOUNCE":
|
||
session.Type = SESSION_TYPE_PUSHER
|
||
session.URL = req.URL
|
||
|
||
url, err := url.Parse(req.URL)
|
||
if err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = "Invalid URL"
|
||
return
|
||
}
|
||
session.Path = url.Path
|
||
|
||
session.SDPRaw = req.Body
|
||
session.SDPMap = ParseSDP(req.Body)
|
||
sdp, ok := session.SDPMap["audio"]
|
||
if ok {
|
||
session.AControl = sdp.Control
|
||
session.ACodec = sdp.Codec
|
||
logger.Printf("audio codec[%s]\n", session.ACodec)
|
||
}
|
||
sdp, ok = session.SDPMap["video"]
|
||
if ok {
|
||
session.VControl = sdp.Control
|
||
session.VCodec = sdp.Codec
|
||
logger.Printf("video codec[%s]\n", session.VCodec)
|
||
}
|
||
session.Pusher = NewPusher(session)
|
||
|
||
addedToServer := session.Server.AddPusher(session.Pusher, session.closeOld)
|
||
if !addedToServer {
|
||
logger.Printf("reject pusher.")
|
||
res.StatusCode = 406
|
||
res.Status = "Not Acceptable"
|
||
}
|
||
case "DESCRIBE":
|
||
session.Type = SESSEION_TYPE_PLAYER
|
||
session.URL = req.URL
|
||
|
||
url, err := url.Parse(req.URL)
|
||
if err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = "Invalid URL"
|
||
return
|
||
}
|
||
session.Path = url.Path
|
||
pusher := session.Server.GetPusher(session.Path)
|
||
if pusher == nil {
|
||
res.StatusCode = 404
|
||
res.Status = "NOT FOUND"
|
||
return
|
||
}
|
||
session.Player = NewPlayer(session, pusher)
|
||
session.Pusher = pusher
|
||
session.AControl = pusher.AControl()
|
||
session.VControl = pusher.VControl()
|
||
session.ACodec = pusher.ACodec()
|
||
session.VCodec = pusher.VCodec()
|
||
session.Conn.timeout = 0
|
||
res.SetBody(session.Pusher.SDPRaw())
|
||
case "SETUP":
|
||
ts := req.Header["Transport"]
|
||
// control字段可能是`stream=1`字样,也可能是rtsp://...字样。即control可能是url的path,也可能是整个url
|
||
// 例1:
|
||
// a=control:streamid=1
|
||
// 例2:
|
||
// a=control:rtsp://192.168.1.64/trackID=1
|
||
// 例3:
|
||
// a=control:?ctype=video
|
||
setupUrl, err := url.Parse(req.URL)
|
||
if err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = "Invalid URL"
|
||
return
|
||
}
|
||
if setupUrl.Port() == "" {
|
||
setupUrl.Host = fmt.Sprintf("%s:554", setupUrl.Host)
|
||
}
|
||
setupPath := setupUrl.String()
|
||
|
||
// error status. SETUP without ANNOUNCE or DESCRIBE.
|
||
if session.Pusher == nil {
|
||
res.StatusCode = 500
|
||
res.Status = "Error Status"
|
||
return
|
||
}
|
||
//setupPath = setupPath[strings.LastIndex(setupPath, "/")+1:]
|
||
vPath := ""
|
||
if strings.Index(strings.ToLower(session.VControl), "rtsp://") == 0 {
|
||
vControlUrl, err := url.Parse(session.VControl)
|
||
if err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = "Invalid VControl"
|
||
return
|
||
}
|
||
if vControlUrl.Port() == "" {
|
||
vControlUrl.Host = fmt.Sprintf("%s:554", vControlUrl.Host)
|
||
}
|
||
vPath = vControlUrl.String()
|
||
} else {
|
||
vPath = session.VControl
|
||
}
|
||
|
||
aPath := ""
|
||
if strings.Index(strings.ToLower(session.AControl), "rtsp://") == 0 {
|
||
aControlUrl, err := url.Parse(session.AControl)
|
||
if err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = "Invalid AControl"
|
||
return
|
||
}
|
||
if aControlUrl.Port() == "" {
|
||
aControlUrl.Host = fmt.Sprintf("%s:554", aControlUrl.Host)
|
||
}
|
||
aPath = aControlUrl.String()
|
||
} else {
|
||
aPath = session.AControl
|
||
}
|
||
|
||
mtcp := regexp.MustCompile("interleaved=(\\d+)(-(\\d+))?")
|
||
mudp := regexp.MustCompile("client_port=(\\d+)(-(\\d+))?")
|
||
|
||
if tcpMatchs := mtcp.FindStringSubmatch(ts); tcpMatchs != nil {
|
||
session.TransType = TRANS_TYPE_TCP
|
||
if setupPath == aPath || aPath != "" && strings.LastIndex(setupPath, aPath) == len(setupPath)-len(aPath) {
|
||
session.aRTPChannel, _ = strconv.Atoi(tcpMatchs[1])
|
||
session.aRTPControlChannel, _ = strconv.Atoi(tcpMatchs[3])
|
||
} else if setupPath == vPath || vPath != "" && strings.LastIndex(setupPath, vPath) == len(setupPath)-len(vPath) {
|
||
session.vRTPChannel, _ = strconv.Atoi(tcpMatchs[1])
|
||
session.vRTPControlChannel, _ = strconv.Atoi(tcpMatchs[3])
|
||
} else {
|
||
res.StatusCode = 500
|
||
res.Status = fmt.Sprintf("SETUP [TCP] got UnKown control:%s", setupPath)
|
||
logger.Printf("SETUP [TCP] got UnKown control:%s", setupPath)
|
||
}
|
||
logger.Printf("Parse SETUP req.TRANSPORT:TCP.Session.Type:%d,control:%s, AControl:%s,VControl:%s", session.Type, setupPath, aPath, vPath)
|
||
} else if udpMatchs := mudp.FindStringSubmatch(ts); udpMatchs != nil {
|
||
session.TransType = TRANS_TYPE_UDP
|
||
// no need for tcp timeout.
|
||
session.Conn.timeout = 0
|
||
if session.Type == SESSEION_TYPE_PLAYER && session.UDPClient == nil {
|
||
session.UDPClient = &UDPClient{
|
||
Session: session,
|
||
}
|
||
}
|
||
if session.Type == SESSION_TYPE_PUSHER && session.Pusher.UDPServer == nil {
|
||
session.Pusher.UDPServer = &UDPServer{
|
||
Session: session,
|
||
}
|
||
}
|
||
logger.Printf("Parse SETUP req.TRANSPORT:UDP.Session.Type:%d,control:%s, AControl:%s,VControl:%s", session.Type, setupPath, aPath, vPath)
|
||
if setupPath == aPath || aPath != "" && strings.LastIndex(setupPath, aPath) == len(setupPath)-len(aPath) {
|
||
if session.Type == SESSEION_TYPE_PLAYER {
|
||
session.UDPClient.APort, _ = strconv.Atoi(udpMatchs[1])
|
||
session.UDPClient.AControlPort, _ = strconv.Atoi(udpMatchs[3])
|
||
if err := session.UDPClient.SetupAudio(); err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = fmt.Sprintf("udp client setup audio error, %v", err)
|
||
return
|
||
}
|
||
}
|
||
if session.Type == SESSION_TYPE_PUSHER {
|
||
if err := session.Pusher.UDPServer.SetupAudio(); err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = fmt.Sprintf("udp server setup audio error, %v", err)
|
||
return
|
||
}
|
||
tss := strings.Split(ts, ";")
|
||
idx := -1
|
||
for i, val := range tss {
|
||
if val == udpMatchs[0] {
|
||
idx = i
|
||
}
|
||
}
|
||
tail := append([]string{}, tss[idx+1:]...)
|
||
tss = append(tss[:idx+1], fmt.Sprintf("server_port=%d-%d", session.Pusher.UDPServer.APort, session.Pusher.UDPServer.AControlPort))
|
||
tss = append(tss, tail...)
|
||
ts = strings.Join(tss, ";")
|
||
}
|
||
} else if setupPath == vPath || vPath != "" && strings.LastIndex(setupPath, vPath) == len(setupPath)-len(vPath) {
|
||
if session.Type == SESSEION_TYPE_PLAYER {
|
||
session.UDPClient.VPort, _ = strconv.Atoi(udpMatchs[1])
|
||
session.UDPClient.VControlPort, _ = strconv.Atoi(udpMatchs[3])
|
||
if err := session.UDPClient.SetupVideo(); err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = fmt.Sprintf("udp client setup video error, %v", err)
|
||
return
|
||
}
|
||
}
|
||
|
||
if session.Type == SESSION_TYPE_PUSHER {
|
||
if err := session.Pusher.UDPServer.SetupVideo(); err != nil {
|
||
res.StatusCode = 500
|
||
res.Status = fmt.Sprintf("udp server setup video error, %v", err)
|
||
return
|
||
}
|
||
tss := strings.Split(ts, ";")
|
||
idx := -1
|
||
for i, val := range tss {
|
||
if val == udpMatchs[0] {
|
||
idx = i
|
||
}
|
||
}
|
||
tail := append([]string{}, tss[idx+1:]...)
|
||
tss = append(tss[:idx+1], fmt.Sprintf("server_port=%d-%d", session.Pusher.UDPServer.VPort, session.Pusher.UDPServer.VControlPort))
|
||
tss = append(tss, tail...)
|
||
ts = strings.Join(tss, ";")
|
||
}
|
||
} else {
|
||
logger.Printf("SETUP [UDP] got UnKown control:%s", setupPath)
|
||
}
|
||
}
|
||
res.Header["Transport"] = ts
|
||
case "PLAY":
|
||
// error status. PLAY without ANNOUNCE or DESCRIBE.
|
||
if session.Pusher == nil {
|
||
res.StatusCode = 500
|
||
res.Status = "Error Status"
|
||
return
|
||
}
|
||
res.Header["Range"] = req.Header["Range"]
|
||
case "RECORD":
|
||
// error status. RECORD without ANNOUNCE or DESCRIBE.
|
||
if session.Pusher == nil {
|
||
res.StatusCode = 500
|
||
res.Status = "Error Status"
|
||
return
|
||
}
|
||
}
|
||
}
|
||
|
||
func (session *Session) SendRTP(pack *RTPPack) (err error) {
|
||
if pack == nil {
|
||
err = fmt.Errorf("player send rtp got nil pack")
|
||
return
|
||
}
|
||
if session.TransType == TRANS_TYPE_UDP {
|
||
if session.UDPClient == nil {
|
||
err = fmt.Errorf("player use udp transport but udp client not found")
|
||
return
|
||
}
|
||
err = session.UDPClient.SendRTP(pack)
|
||
return
|
||
}
|
||
switch pack.Type {
|
||
case RTP_TYPE_AUDIO:
|
||
bufChannel := make([]byte, 2)
|
||
bufChannel[0] = 0x24
|
||
bufChannel[1] = byte(session.aRTPChannel)
|
||
session.connWLock.Lock()
|
||
session.connRW.Write(bufChannel)
|
||
bufLen := make([]byte, 2)
|
||
binary.BigEndian.PutUint16(bufLen, uint16(pack.Buffer.Len()))
|
||
session.connRW.Write(bufLen)
|
||
session.connRW.Write(pack.Buffer.Bytes())
|
||
session.connRW.Flush()
|
||
session.connWLock.Unlock()
|
||
session.OutBytes += pack.Buffer.Len() + 4
|
||
case RTP_TYPE_AUDIOCONTROL:
|
||
bufChannel := make([]byte, 2)
|
||
bufChannel[0] = 0x24
|
||
bufChannel[1] = byte(session.aRTPControlChannel)
|
||
session.connWLock.Lock()
|
||
session.connRW.Write(bufChannel)
|
||
bufLen := make([]byte, 2)
|
||
binary.BigEndian.PutUint16(bufLen, uint16(pack.Buffer.Len()))
|
||
session.connRW.Write(bufLen)
|
||
session.connRW.Write(pack.Buffer.Bytes())
|
||
session.connRW.Flush()
|
||
session.connWLock.Unlock()
|
||
session.OutBytes += pack.Buffer.Len() + 4
|
||
case RTP_TYPE_VIDEO:
|
||
bufChannel := make([]byte, 2)
|
||
bufChannel[0] = 0x24
|
||
bufChannel[1] = byte(session.vRTPChannel)
|
||
session.connWLock.Lock()
|
||
session.connRW.Write(bufChannel)
|
||
bufLen := make([]byte, 2)
|
||
binary.BigEndian.PutUint16(bufLen, uint16(pack.Buffer.Len()))
|
||
session.connRW.Write(bufLen)
|
||
session.connRW.Write(pack.Buffer.Bytes())
|
||
session.connRW.Flush()
|
||
session.connWLock.Unlock()
|
||
session.OutBytes += pack.Buffer.Len() + 4
|
||
case RTP_TYPE_VIDEOCONTROL:
|
||
bufChannel := make([]byte, 2)
|
||
bufChannel[0] = 0x24
|
||
bufChannel[1] = byte(session.vRTPControlChannel)
|
||
session.connWLock.Lock()
|
||
session.connRW.Write(bufChannel)
|
||
bufLen := make([]byte, 2)
|
||
binary.BigEndian.PutUint16(bufLen, uint16(pack.Buffer.Len()))
|
||
session.connRW.Write(bufLen)
|
||
session.connRW.Write(pack.Buffer.Bytes())
|
||
session.connRW.Flush()
|
||
session.connWLock.Unlock()
|
||
session.OutBytes += pack.Buffer.Len() + 4
|
||
default:
|
||
err = fmt.Errorf("session tcp send rtp got unkown pack type[%v]", pack.Type)
|
||
}
|
||
return
|
||
}
|