Files
core/rtmp/rtmp.go
2023-05-10 20:41:04 +02:00

441 lines
9.6 KiB
Go

// Package rtmp provides an RTMP server
package rtmp
import (
"crypto/tls"
"fmt"
"net"
"net/url"
"path/filepath"
"strings"
"sync"
"time"
"github.com/datarhei/core/v16/cluster/proxy"
"github.com/datarhei/core/v16/log"
"github.com/datarhei/core/v16/session"
"github.com/datarhei/joy4/av/avutil"
"github.com/datarhei/joy4/av/pktque"
"github.com/datarhei/joy4/format"
"github.com/datarhei/joy4/format/rtmp"
)
// ErrServerClosed is returned by ListenAndServe (or ListenAndServeTLS) if the server
// has been closed regularly with the Close() function.
var ErrServerClosed = rtmp.ErrServerClosed
func init() {
format.RegisterAll()
}
// Config for a new RTMP server
type Config struct {
// Logger. Optional.
Logger log.Logger
Collector session.Collector
// The address the RTMP server should listen on, e.g. ":1935"
Addr string
// The address the RTMPS server should listen on, e.g. ":1936"
TLSAddr string
// The app path for the streams, e.g. "/live". Optional. Defaults
// to "/".
App string
// A token that needs to be added to the URL as query string
// in order push or pull a stream. The key for the query
// parameter is "token". Optional. By default no token is
// required.
Token string
// TLSConfig optionally provides a TLS configuration for use
// by ListenAndServe. Note that this value is cloned by
// ListenAndServe, so it's not possible to modify the configuration
// with methods like tls.Config.SetSessionTicketKeys.
TLSConfig *tls.Config
Proxy proxy.ProxyReader
}
// Server represents a RTMP server
type Server interface {
// ListenAndServe starts the RTMP server
ListenAndServe() error
// ListenAndServe starts the RTMPS server
ListenAndServeTLS(certFile, keyFile string) error
// Close stops the RTMP server and closes all connections
Close()
// Channels return a list of currently publishing streams
Channels() []string
}
// server is an implementation of the Server interface
type server struct {
// Configuration parameter taken from the Config
app string
token string
logger log.Logger
collector session.Collector
// A joy4 RTMP server instance
server *rtmp.Server
tlsServer *rtmp.Server
// Map of publishing channels and a lock to serialize
// access to the map.
channels map[string]*channel
lock sync.RWMutex
proxy proxy.ProxyReader
}
// New creates a new RTMP server according to the given config
func New(config Config) (Server, error) {
if len(config.App) == 0 {
config.App = "/"
}
if config.Logger == nil {
config.Logger = log.New("")
}
s := &server{
app: config.App,
token: config.Token,
logger: config.Logger,
collector: config.Collector,
proxy: config.Proxy,
}
if s.collector == nil {
s.collector = session.NewNullCollector()
}
if s.proxy == nil {
s.proxy = proxy.NewNullProxyReader()
}
s.server = &rtmp.Server{
Addr: config.Addr,
HandlePlay: s.handlePlay,
HandlePublish: s.handlePublish,
}
if len(config.TLSAddr) != 0 {
s.tlsServer = &rtmp.Server{
Addr: config.TLSAddr,
TLSConfig: config.TLSConfig.Clone(),
HandlePlay: s.handlePlay,
HandlePublish: s.handlePublish,
}
}
s.channels = make(map[string]*channel)
rtmp.Debug = false
return s, nil
}
// ListenAndServe starts the RMTP server
func (s *server) ListenAndServe() error {
return s.server.ListenAndServe()
}
func (s *server) ListenAndServeTLS(certFile, keyFile string) error {
if s.tlsServer == nil {
return fmt.Errorf("RTMPS server is not configured")
}
return s.tlsServer.ListenAndServeTLS(certFile, keyFile)
}
func (s *server) Close() {
// Stop listening
s.server.Close()
if s.tlsServer != nil {
s.tlsServer.Close()
}
s.lock.Lock()
defer s.lock.Unlock()
// Close all channels
for _, ch := range s.channels {
ch.Close()
}
}
// Channels returns the list of streams that are
// publishing currently
func (s *server) Channels() []string {
channels := []string{}
s.lock.RLock()
defer s.lock.RUnlock()
for key := range s.channels {
channels = append(channels, key)
}
return channels
}
func (s *server) log(who, action, path, message string, client net.Addr) {
s.logger.Info().WithFields(log.Fields{
"who": who,
"action": action,
"path": path,
"client": client.String(),
}).Log(message)
}
// getToken returns the path and the token found in the URL. If the token
// was part of the path, the token is removed from the path. The token in
// the query string takes precedence. The token in the path is assumed to
// be the last path element.
func getToken(u *url.URL) (string, string) {
q := u.Query()
token := q.Get("token")
if len(token) != 0 {
// The token was in the query. Return the unmomdified path and the token
return u.Path, token
}
pathElements := strings.Split(u.EscapedPath(), "/")
nPathElements := len(pathElements)
if nPathElements == 0 {
return u.Path, ""
}
// Return the path without the token
return strings.Join(pathElements[:nPathElements-1], "/"), pathElements[nPathElements-1]
}
// handlePlay is called when a RTMP client wants to play a stream
func (s *server) handlePlay(conn *rtmp.Conn) {
client := conn.NetConn().RemoteAddr()
defer conn.Close()
playPath := conn.URL.Path
// Check the token in the URL if one is required
if len(s.token) != 0 {
path, token := getToken(conn.URL)
if len(token) == 0 {
s.log("PLAY", "FORBIDDEN", path, "no streamkey provided", client)
return
}
if s.token != token {
s.log("PLAY", "FORBIDDEN", path, "invalid streamkey ("+token+")", client)
return
}
playPath = path
}
// Look for the stream
s.lock.RLock()
ch := s.channels[playPath]
s.lock.RUnlock()
if ch == nil {
// Check in the cluster for that stream
url, err := s.proxy.GetURL("rtmp:" + conn.URL.Path)
if err != nil {
s.log("PLAY", "NOTFOUND", conn.URL.Path, "", client)
return
}
src, err := avutil.Open(url)
if err != nil {
s.logger.Error().WithField("address", url).WithError(err).Log("Proxying address failed")
s.log("PLAY", "NOTFOUND", conn.URL.Path, "", client)
return
}
c := newConnectionFromDemuxer(src)
wg := sync.WaitGroup{}
wg.Add(1)
go func() {
s.log("PLAY", "PROXYSTART", url, "", client)
wg.Done()
err := s.publish(c, playPath, client, true)
if err != nil {
s.logger.Error().WithField("address", url).WithError(err).Log("Proxying address failed")
}
s.log("PLAY", "PROXYSTOP", url, "", client)
}()
// Wait for the goroutine to start
wg.Wait()
// Wait for channel to become available
ticker := time.NewTicker(200 * time.Millisecond)
tickerStart := time.Now()
for range ticker.C {
s.lock.RLock()
ch = s.channels[conn.URL.Path]
s.lock.RUnlock()
if ch != nil {
break
}
if time.Since(tickerStart) > 2*time.Second {
break
}
}
ticker.Stop()
}
if ch != nil {
// Send the metadata to the client
conn.WriteHeader(ch.streams)
s.log("PLAY", "START", playPath, "", client)
// Get a cursor and apply filters
cursor := ch.queue.Oldest()
filters := pktque.Filters{}
if ch.hasVideo {
// The first packet has to be a key frame
filters = append(filters, &pktque.WaitKeyFrame{})
}
// Adjust the timestamp such that the stream starts from 0
filters = append(filters, &pktque.FixTime{StartFromZero: true, MakeIncrement: false})
demuxer := &pktque.FilterDemuxer{
Filter: filters,
Demuxer: cursor,
}
id := ch.AddSubscriber(conn)
// Transfer the data, blocks until done
avutil.CopyFile(conn, demuxer)
ch.RemoveSubscriber(id)
s.log("PLAY", "STOP", playPath, "", client)
} else {
s.log("PLAY", "NOTFOUND", playPath, "", client)
}
}
// handlePublish is called when a RTMP client wants to publish a stream
func (s *server) handlePublish(conn *rtmp.Conn) {
client := conn.NetConn().RemoteAddr()
defer conn.Close()
playPath := conn.URL.Path
if len(s.token) != 0 {
path, token := getToken(conn.URL)
if len(token) == 0 {
s.log("PLAY", "FORBIDDEN", path, "no streamkey provided", client)
return
}
if s.token != token {
s.log("PLAY", "FORBIDDEN", path, "invalid streamkey ("+token+")", client)
return
}
playPath = path
}
// Check the app patch
if !strings.HasPrefix(playPath, s.app) {
s.log("PUBLISH", "FORBIDDEN", playPath, "invalid app", client)
return
}
err := s.publish(conn, playPath, client, false)
if err != nil {
s.logger.WithField("path", playPath).WithError(err).Log("")
}
}
func (s *server) publish(src connection, playPath string, client net.Addr, isProxy bool) error {
// Check the streams if it contains any valid/known streams
streams, _ := src.Streams()
if len(streams) == 0 {
s.log("PUBLISH", "INVALID", playPath, "no streams available", client)
}
s.lock.Lock()
ch := s.channels[playPath]
if ch == nil {
reference := strings.TrimPrefix(strings.TrimSuffix(playPath, filepath.Ext(playPath)), s.app+"/")
// Create a new channel
ch = newChannel(src, playPath, reference, client, streams, isProxy, s.collector)
for _, stream := range streams {
typ := stream.Type()
switch {
case typ.IsAudio():
ch.hasAudio = true
case typ.IsVideo():
ch.hasVideo = true
}
}
s.channels[playPath] = ch
} else {
ch = nil
}
s.lock.Unlock()
if ch == nil {
s.log("PUBLISH", "CONFLICT", playPath, "already publishing", client)
return fmt.Errorf("already publishing")
}
s.log("PUBLISH", "START", playPath, "", client)
for _, stream := range streams {
s.log("PUBLISH", "STREAM", playPath, stream.Type().String(), client)
}
// Ingest the data, blocks until done
avutil.CopyPackets(ch.queue, src)
s.lock.Lock()
delete(s.channels, playPath)
s.lock.Unlock()
ch.Close()
s.log("PUBLISH", "STOP", playPath, "", client)
return nil
}