Files
monibuca/plugin.go
2025-01-08 10:45:17 +08:00

862 lines
23 KiB
Go

package m7s
import (
"bytes"
"context"
"crypto/md5"
"encoding/hex"
"encoding/json"
"fmt"
"net"
"net/http"
"net/url"
"os"
"path/filepath"
"reflect"
"runtime"
"strconv"
"strings"
"time"
"m7s.live/v5/pkg/task"
"github.com/quic-go/quic-go"
gatewayRuntime "github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
myip "github.com/husanpao/ip"
"google.golang.org/grpc"
"gopkg.in/yaml.v3"
"gorm.io/gorm"
. "m7s.live/v5/pkg"
"m7s.live/v5/pkg/config"
"m7s.live/v5/pkg/db"
"m7s.live/v5/pkg/util"
)
type (
DefaultYaml string
OnExitHandler func()
AuthPublisher = func(*Publisher) *util.Promise
AuthSubscriber = func(*Subscriber) *util.Promise
PluginMeta struct {
Name string
Version string //插件版本
Type reflect.Type
defaultYaml DefaultYaml //默认配置
ServiceDesc *grpc.ServiceDesc
RegisterGRPCHandler func(context.Context, *gatewayRuntime.ServeMux, *grpc.ClientConn) error
Puller Puller
Pusher Pusher
Recorder Recorder
Transformer Transformer
OnExit OnExitHandler
OnAuthPub AuthPublisher
OnAuthSub AuthSubscriber
}
iPlugin interface {
nothing()
}
IPlugin interface {
task.IJob
OnInit() error
OnStop()
Pull(string, config.Pull, *config.Publish)
Push(string, config.Push, *config.Subscribe)
Transform(*Publisher, config.Transform)
OnPublish(*Publisher)
}
IRegisterHandler interface {
RegisterHandler() map[string]http.HandlerFunc
}
IPullerPlugin interface {
GetPullableList() []string
}
ITCPPlugin interface {
OnTCPConnect(conn *net.TCPConn) task.ITask
}
IUDPPlugin interface {
OnUDPConnect(conn *net.UDPConn) task.ITask
}
IQUICPlugin interface {
OnQUICConnect(quic.Connection) task.ITask
}
IPullProxyPlugin interface {
OnPullProxyAdd(pullProxy *PullProxy) any
}
IPushProxyPlugin interface {
OnPushProxyAdd(pushProxy *PushProxy) any
}
)
var plugins []PluginMeta
func (plugin *PluginMeta) Init(s *Server, userConfig map[string]any) (p *Plugin) {
instance, ok := reflect.New(plugin.Type).Interface().(IPlugin)
if !ok {
panic("plugin must implement IPlugin")
}
p = reflect.ValueOf(instance).Elem().FieldByName("Plugin").Addr().Interface().(*Plugin)
p.handler = instance
p.Meta = plugin
p.Server = s
p.Logger = s.Logger.With("plugin", plugin.Name)
upperName := strings.ToUpper(plugin.Name)
if os.Getenv(upperName+"_ENABLE") == "false" {
p.disable("env")
p.Warn("disabled by env")
return
}
p.Config.Parse(p.GetCommonConf(), upperName)
p.Config.Parse(instance, upperName)
for _, fname := range MergeConfigs {
if name := strings.ToLower(fname); p.Config.Has(name) {
p.Config.Get(name).ParseGlobal(s.Config.Get(name))
}
}
if plugin.defaultYaml != "" {
var defaultConf map[string]any
if err := yaml.Unmarshal([]byte(plugin.defaultYaml), &defaultConf); err != nil {
p.Error("parsing default config", "error", err)
} else {
p.Config.ParseDefaultYaml(defaultConf)
}
}
p.Config.ParseUserFile(userConfig)
p.SetDescription("version", plugin.Version)
if userConfig != nil {
p.SetDescription("userConfig", userConfig)
}
finalConfig, _ := yaml.Marshal(p.Config.GetMap())
p.Logger.Handler().(*MultiLogHandler).SetLevel(ParseLevel(p.config.LogLevel))
p.Debug("config", "detail", string(finalConfig))
if s.DisableAll {
p.Disabled = true
}
if userConfig["enable"] == false {
p.Disabled = true
} else if userConfig["enable"] == true {
p.Disabled = false
}
if p.Disabled {
p.disable("config")
p.Warn("plugin disabled")
return
} else {
p.assign()
}
p.Info("init", "version", plugin.Version)
var err error
if p.config.DSN == s.GetCommonConf().DSN {
p.DB = s.DB
} else if p.config.DSN != "" {
if factory, ok := db.Factory[p.config.DBType]; ok {
s.DB, err = gorm.Open(factory(p.config.DSN), &gorm.Config{})
if err != nil {
s.Error("failed to connect database", "error", err, "dsn", s.config.DSN, "type", s.config.DBType)
p.disable(fmt.Sprintf("database %v", err))
return
}
}
}
if p.DB != nil && p.Meta.Recorder != nil {
if err = p.DB.AutoMigrate(&RecordStream{}); err != nil {
p.disable(fmt.Sprintf("auto migrate record stream failed %v", err))
return
}
}
s.AddTask(instance)
return
}
// InstallPlugin 安装插件
func InstallPlugin[C iPlugin](options ...any) error {
var c *C
t := reflect.TypeOf(c).Elem()
meta := PluginMeta{
Name: strings.TrimSuffix(t.Name(), "Plugin"),
Type: t,
}
_, pluginFilePath, _, _ := runtime.Caller(1)
configDir := filepath.Dir(pluginFilePath)
if _, after, found := strings.Cut(configDir, "@"); found {
meta.Version = after
} else {
meta.Version = "dev"
}
for _, option := range options {
switch v := option.(type) {
case OnExitHandler:
meta.OnExit = v
case DefaultYaml:
meta.defaultYaml = v
case Puller:
meta.Puller = v
case Pusher:
meta.Pusher = v
case Recorder:
meta.Recorder = v
case Transformer:
meta.Transformer = v
case AuthPublisher:
meta.OnAuthPub = v
case AuthSubscriber:
meta.OnAuthSub = v
case *grpc.ServiceDesc:
meta.ServiceDesc = v
case func(context.Context, *gatewayRuntime.ServeMux, *grpc.ClientConn) error:
meta.RegisterGRPCHandler = v
}
}
plugins = append(plugins, meta)
return nil
}
var _ IPlugin = (*Plugin)(nil)
type Plugin struct {
task.Work
config.Config
Disabled bool
Meta *PluginMeta
PushAddr, PlayAddr []string
config config.Common
handler IPlugin
Server *Server
DB *gorm.DB
}
func (Plugin) nothing() {
}
func (p *Plugin) GetKey() string {
return p.Meta.Name
}
func (p *Plugin) GetGlobalCommonConf() *config.Common {
return p.Server.GetCommonConf()
}
func (p *Plugin) GetCommonConf() *config.Common {
return &p.config
}
func (p *Plugin) GetHandler() IPlugin {
return p.handler
}
func (p *Plugin) GetPublicIP(netcardIP string) string {
if p.config.PublicIP != "" {
return p.config.PublicIP
}
if publicIP := util.GetPublicIP(netcardIP); publicIP != netcardIP {
return publicIP
}
localIp := myip.InternalIPv4()
if publicIP := util.GetPublicIP(localIp); publicIP != localIp {
return publicIP
}
return localIp
}
func (p *Plugin) settingPath() string {
return filepath.Join(p.Server.SettingDir, strings.ToLower(p.Meta.Name)+".yaml")
}
func (p *Plugin) disable(reason string) {
p.Disabled = true
p.SetDescription("disableReason", reason)
p.Server.disabledPlugins = append(p.Server.disabledPlugins, p)
}
func (p *Plugin) assign() {
f, err := os.Open(p.settingPath())
defer f.Close()
if err == nil {
var modifyConfig map[string]any
err = yaml.NewDecoder(f).Decode(&modifyConfig)
if err != nil {
panic(err)
}
p.Config.ParseModifyFile(modifyConfig)
}
var handlerMap map[string]http.HandlerFunc
if v, ok := p.handler.(IRegisterHandler); ok {
handlerMap = v.RegisterHandler()
}
p.registerHandler(handlerMap)
}
func (p *Plugin) Start() (err error) {
s := p.Server
if p.Meta.ServiceDesc != nil && s.grpcServer != nil {
s.grpcServer.RegisterService(p.Meta.ServiceDesc, p.handler)
if p.Meta.RegisterGRPCHandler != nil {
if err = p.Meta.RegisterGRPCHandler(p.Context, s.config.HTTP.GetGRPCMux(), s.grpcClientConn); err != nil {
p.disable(fmt.Sprintf("grpc %v", err))
return
} else {
p.Info("grpc handler registered")
}
}
}
s.Plugins.Add(p)
if err = p.listen(); err != nil {
p.disable(fmt.Sprintf("listen %v", err))
return
}
if err = p.handler.OnInit(); err != nil {
p.disable(fmt.Sprintf("init %v", err))
return
}
if p.config.Hook != nil {
if hook, ok := p.config.Hook[config.HookOnServerKeepAlive]; ok && hook.Interval > 0 {
p.AddTask(&ServerKeepAliveTask{plugin: p})
}
}
return
}
func (p *Plugin) Dispose() {
p.handler.OnStop()
p.Server.Plugins.Remove(p)
}
func (p *Plugin) listen() (err error) {
httpConf := &p.config.HTTP
if httpConf.ListenAddrTLS != "" && (httpConf.ListenAddrTLS != p.Server.config.HTTP.ListenAddrTLS) {
p.SetDescription("httpTLS", strings.TrimPrefix(httpConf.ListenAddrTLS, ":"))
p.AddDependTask(httpConf.CreateHTTPSWork(p.Logger))
}
if httpConf.ListenAddr != "" && (httpConf.ListenAddr != p.Server.config.HTTP.ListenAddr) {
p.SetDescription("http", strings.TrimPrefix(httpConf.ListenAddr, ":"))
p.AddDependTask(httpConf.CreateHTTPWork(p.Logger))
}
if tcphandler, ok := p.handler.(ITCPPlugin); ok {
tcpConf := &p.config.TCP
if tcpConf.ListenAddr != "" {
if tcpConf.AutoListen {
if err = p.AddTask(tcpConf.CreateTCPWork(p.Logger, tcphandler.OnTCPConnect)).WaitStarted(); err != nil {
return
}
}
p.SetDescription("tcp", strings.TrimPrefix(tcpConf.ListenAddr, ":"))
}
if tcpConf.ListenAddrTLS != "" {
if tcpConf.AutoListen {
if err = p.AddTask(tcpConf.CreateTCPTLSWork(p.Logger, tcphandler.OnTCPConnect)).WaitStarted(); err != nil {
return
}
}
p.SetDescription("tcpTLS", strings.TrimPrefix(tcpConf.ListenAddrTLS, ":"))
}
}
if udpHandler, ok := p.handler.(IUDPPlugin); ok {
udpConf := &p.config.UDP
if udpConf.ListenAddr != "" {
if udpConf.AutoListen {
if err = p.AddTask(udpConf.CreateUDPWork(p.Logger, udpHandler.OnUDPConnect)).WaitStarted(); err != nil {
return
}
}
p.SetDescription("udp", strings.TrimPrefix(udpConf.ListenAddr, ":"))
}
}
if quicHandler, ok := p.handler.(IQUICPlugin); ok {
quicConf := &p.config.Quic
if quicConf.ListenAddr != "" {
if quicConf.AutoListen {
if err = p.AddTask(quicConf.CreateQUICWork(p.Logger, quicHandler.OnQUICConnect)).WaitStarted(); err != nil {
return
}
}
p.SetDescription("quic", strings.TrimPrefix(quicConf.ListenAddr, ":"))
}
}
return
}
func (p *Plugin) OnInit() error {
return nil
}
func (p *Plugin) OnStop() {
}
type WebHookTask struct {
task.Task
plugin *Plugin
hookType config.HookType
conf *config.Webhook
data any
jsonData []byte
}
func (t *WebHookTask) Start() error {
if t.conf == nil || t.conf.URL == "" {
return task.ErrTaskComplete
}
var err error
t.jsonData, err = json.Marshal(t.data)
if err != nil {
return fmt.Errorf("marshal webhook data: %w", err)
}
t.SetRetry(t.conf.RetryTimes, t.conf.RetryInterval)
return nil
}
func (t *WebHookTask) Run() error {
req, err := http.NewRequest(t.conf.Method, t.conf.URL, bytes.NewBuffer(t.jsonData))
if err != nil {
return err
}
req.Header.Set("Content-Type", "application/json")
for k, v := range t.conf.Headers {
req.Header.Set(k, v)
}
client := &http.Client{
Timeout: time.Duration(t.conf.TimeoutSeconds) * time.Second,
}
resp, err := client.Do(req)
if err != nil {
t.plugin.Error("webhook request failed", "error", err)
return err
}
defer resp.Body.Close()
if resp.StatusCode >= 200 && resp.StatusCode < 300 {
return task.ErrTaskComplete
}
err = fmt.Errorf("webhook request failed with status: %d", resp.StatusCode)
t.plugin.Error("webhook response error", "status", resp.StatusCode)
return err
}
func (p *Plugin) SendWebhook(hookType config.HookType, conf config.Webhook, data any) *task.Task {
webhookTask := &WebHookTask{
plugin: p,
hookType: hookType,
conf: &conf,
data: data,
}
return p.AddTask(webhookTask)
}
// TODO: use alias stream
func (p *Plugin) OnPublish(pub *Publisher) {
onPublish := p.config.OnPub
if p.Meta.Pusher != nil {
for r, pushConf := range onPublish.Push {
if pushConf.URL = r.Replace(pub.StreamPath, pushConf.URL); pushConf.URL != "" {
p.Push(pub.StreamPath, pushConf, nil)
}
}
}
if p.Meta.Recorder != nil {
for r, recConf := range onPublish.Record {
if recConf.FilePath = r.Replace(pub.StreamPath, recConf.FilePath); recConf.FilePath != "" {
p.Record(pub, recConf, nil)
}
}
}
var owner = pub.Value(Owner)
var isTransformer bool
if owner != nil {
_, isTransformer = owner.(ITransformer)
}
if p.Meta.Transformer != nil && !isTransformer {
for r, tranConf := range onPublish.Transform {
if group := r.FindStringSubmatch(pub.StreamPath); group != nil {
for j, to := range tranConf.Output {
for i, g := range group {
to.Target = strings.ReplaceAll(to.Target, fmt.Sprintf("$%d", i), g)
}
targetUrl, err := url.Parse(to.Target)
if err == nil {
to.StreamPath = strings.TrimPrefix(targetUrl.Path, "/")
}
tranConf.Output[j] = to
}
p.Transform(pub, tranConf)
}
}
}
}
func (p *Plugin) auth(streamPath string, key string, secret string, expire string) (err error) {
if unixTime, err := strconv.ParseInt(expire, 16, 64); err != nil || time.Now().Unix() > unixTime {
return fmt.Errorf("auth failed expired")
}
if len(secret) != 32 {
return fmt.Errorf("auth failed secret length must be 32")
}
trueSecret := md5.Sum([]byte(key + streamPath + expire))
if secret == hex.EncodeToString(trueSecret[:]) {
return nil
}
return fmt.Errorf("auth failed invalid secret")
}
func (p *Plugin) OnSubscribe(streamPath string, args url.Values) {
// var avoidTrans bool
//AVOID:
// for trans := range server.Transforms.Range {
// for _, output := range trans.Config.Output {
// if output.StreamPath == s.StreamPath {
// avoidTrans = true
// break AVOID
// }
// }
// }
for reg, conf := range p.config.OnSub.Pull {
if p.Meta.Puller != nil {
conf.Args = config.HTTPValus(args)
conf.URL = reg.Replace(streamPath, conf.URL)
p.handler.Pull(streamPath, conf, nil)
}
}
//if !avoidTrans {
// for reg, conf := range plugin.GetCommonConf().OnSub.Transform {
// if plugin.Meta.Transformer != nil {
// if reg.MatchString(s.StreamPath) {
// if group := reg.FindStringSubmatch(s.StreamPath); group != nil {
// for j, c := range conf.Output {
// for i, value := range group {
// c.Target = strings.Replace(c.Target, fmt.Sprintf("$%d", i), value, -1)
// }
// conf.Output[j] = c
// }
// }
// plugin.handler.Transform(s.StreamPath, conf)
// }
// }
// }
//}
}
func (p *Plugin) PublishWithConfig(ctx context.Context, streamPath string, conf config.Publish) (publisher *Publisher, err error) {
publisher = createPublisher(p, streamPath, conf)
if p.config.EnableAuth && publisher.Type == PublishTypeServer {
onAuthPub := p.Meta.OnAuthPub
if onAuthPub == nil {
onAuthPub = p.Server.Meta.OnAuthPub
}
if onAuthPub != nil {
if err = onAuthPub(publisher).Await(); err != nil {
p.Warn("auth failed", "error", err)
return
}
} else if conf.Key != "" {
if err = p.auth(publisher.StreamPath, conf.Key, publisher.Args.Get("secret"), publisher.Args.Get("expire")); err != nil {
p.Warn("auth failed", "error", err)
return
}
}
}
err = p.Server.Streams.AddTask(publisher, ctx).WaitStarted()
if err == nil {
publisher.OnDispose(func() {
p.sendPublishEndWebhook(publisher)
})
p.sendPublishWebhook(publisher)
}
return
}
func (p *Plugin) Publish(ctx context.Context, streamPath string) (publisher *Publisher, err error) {
return p.PublishWithConfig(ctx, streamPath, p.config.Publish)
}
func (p *Plugin) SubscribeWithConfig(ctx context.Context, streamPath string, conf config.Subscribe) (subscriber *Subscriber, err error) {
subscriber = createSubscriber(p, streamPath, conf)
if p.config.EnableAuth && subscriber.Type == SubscribeTypeServer {
onAuthSub := p.Meta.OnAuthSub
if onAuthSub == nil {
onAuthSub = p.Server.Meta.OnAuthSub
}
if onAuthSub != nil {
if err = onAuthSub(subscriber).Await(); err != nil {
p.Warn("auth failed", "error", err)
return
}
} else if conf.Key != "" {
if err = p.auth(subscriber.StreamPath, conf.Key, subscriber.Args.Get("secret"), subscriber.Args.Get("expire")); err != nil {
p.Warn("auth failed", "error", err)
return
}
}
}
err = p.Server.Streams.AddTask(subscriber, ctx).WaitStarted()
if err == nil {
select {
case <-subscriber.waitPublishDone:
err = subscriber.Publisher.WaitTrack()
case <-subscriber.Done():
err = subscriber.StopReason()
}
}
if err == nil {
subscriber.OnDispose(func() {
p.sendSubscribeEndWebhook(subscriber)
})
p.sendSubscribeWebhook(subscriber)
}
return
}
func (p *Plugin) Subscribe(ctx context.Context, streamPath string) (subscriber *Subscriber, err error) {
return p.SubscribeWithConfig(ctx, streamPath, p.config.Subscribe)
}
func (p *Plugin) Pull(streamPath string, conf config.Pull, pubConf *config.Publish) {
puller := p.Meta.Puller(conf)
if puller == nil {
return
}
puller.GetPullJob().Init(puller, p, streamPath, conf, pubConf)
}
func (p *Plugin) Push(streamPath string, conf config.Push, subConf *config.Subscribe) {
pusher := p.Meta.Pusher()
pusher.GetPushJob().Init(pusher, p, streamPath, conf, subConf)
}
func (p *Plugin) Record(pub *Publisher, conf config.Record, subConf *config.Subscribe) *RecordJob {
recorder := p.Meta.Recorder()
job := recorder.GetRecordJob().Init(recorder, p, pub.StreamPath, conf, subConf)
job.Depend(pub)
return job
}
func (p *Plugin) Transform(pub *Publisher, conf config.Transform) {
transformer := p.Meta.Transformer()
job := transformer.GetTransformJob().Init(transformer, p, pub.StreamPath, conf)
job.Depend(pub)
}
func (p *Plugin) registerHandler(handlers map[string]http.HandlerFunc) {
t := reflect.TypeOf(p.handler)
v := reflect.ValueOf(p.handler)
// 注册http响应
for i, j := 0, t.NumMethod(); i < j; i++ {
name := t.Method(i).Name
if name == "ServeHTTP" {
continue
}
switch handler := v.Method(i).Interface().(type) {
case func(http.ResponseWriter, *http.Request):
patten := strings.ToLower(strings.ReplaceAll(name, "_", "/"))
p.handle(patten, http.HandlerFunc(handler))
}
}
for patten, handler := range handlers {
p.handle(patten, handler)
}
if p.config.EnableAuth && p.Server.ServerConfig.EnableLogin {
p.handle("/api/secret/{type}/{streamPath...}", http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
authHeader := r.Header.Get("Authorization")
if authHeader == "" {
http.Error(rw, "missing authorization header", http.StatusUnauthorized)
return
}
tokenString := strings.TrimPrefix(authHeader, "Bearer ")
_, err := p.Server.ValidateToken(tokenString)
if err != nil {
http.Error(rw, "invalid token", http.StatusUnauthorized)
return
}
streamPath := r.PathValue("streamPath")
t := r.PathValue("type")
expire := r.URL.Query().Get("expire")
if t == "publish" {
secret := md5.Sum([]byte(p.config.Publish.Key + streamPath + expire))
rw.Write([]byte(hex.EncodeToString(secret[:])))
} else if t == "subscribe" {
secret := md5.Sum([]byte(p.config.Subscribe.Key + streamPath + expire))
rw.Write([]byte(hex.EncodeToString(secret[:])))
}
}))
}
if rootHandler, ok := p.handler.(http.Handler); ok {
p.handle("/", rootHandler)
}
}
func (p *Plugin) logHandler(handler http.Handler) http.Handler {
return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
p.Debug("visit", "path", r.URL.String(), "remote", r.RemoteAddr)
name := strings.ToLower(p.Meta.Name)
r.URL.Path = strings.TrimPrefix(r.URL.Path, "/"+name)
handler.ServeHTTP(rw, r)
})
}
func (p *Plugin) handle(pattern string, handler http.Handler) {
if p == nil {
return
}
last := pattern == "/"
if !strings.HasPrefix(pattern, "/") {
pattern = "/" + pattern
}
handler = p.logHandler(handler)
p.config.HTTP.Handle(pattern, handler, last)
if p.Server != p.handler {
pattern = "/" + strings.ToLower(p.Meta.Name) + pattern
p.Debug("http handle added to Server", "pattern", pattern)
p.Server.config.HTTP.Handle(pattern, handler, last)
}
p.Server.apiList = append(p.Server.apiList, pattern)
}
func (p *Plugin) SaveConfig() (err error) {
return Servers.AddTask(&SaveConfig{Plugin: p}).WaitStopped()
}
type SaveConfig struct {
task.Task
Plugin *Plugin
file *os.File
}
func (s *SaveConfig) Start() (err error) {
if s.Plugin.Modify == nil {
err = os.Remove(s.Plugin.settingPath())
if err == nil {
err = task.ErrTaskComplete
}
}
s.file, err = os.OpenFile(s.Plugin.settingPath(), os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0666)
return
}
func (s *SaveConfig) Run() (err error) {
return yaml.NewEncoder(s.file).Encode(s.Plugin.Modify)
}
func (s *SaveConfig) Dispose() {
s.file.Close()
}
func (p *Plugin) sendPublishWebhook(pub *Publisher) {
if p.config.Hook == nil {
return
}
webhookData := map[string]interface{}{
"event": "publish",
"streamPath": pub.StreamPath,
"args": pub.Args,
"publishId": pub.ID,
"remoteAddr": pub.RemoteAddr,
"type": pub.Type,
"pluginName": p.Meta.Name,
"timestamp": time.Now().Unix(),
}
p.SendWebhook(config.HookOnPublish, p.config.Hook[config.HookOnPublish], webhookData)
if p.Server.config.Hook == nil {
return
}
p.Server.SendWebhook(config.HookOnPublish, p.Server.config.Hook[config.HookOnPublish], webhookData)
}
func (p *Plugin) sendPublishEndWebhook(pub *Publisher) {
if p.config.Hook == nil {
return
}
webhookData := map[string]interface{}{
"event": "publish_end",
"streamPath": pub.StreamPath,
"publishId": pub.ID,
"reason": pub.StopReason().Error(),
"timestamp": time.Now().Unix(),
}
p.SendWebhook(config.HookOnPublishEnd, p.config.Hook[config.HookOnPublishEnd], webhookData)
}
func (p *Plugin) sendSubscribeWebhook(sub *Subscriber) {
if p.config.Hook == nil {
return
}
webhookData := map[string]interface{}{
"event": "subscribe",
"streamPath": sub.StreamPath,
"publishId": sub.Publisher.ID,
"subscriberId": sub.ID,
"remoteAddr": sub.RemoteAddr,
"type": sub.Type,
"args": sub.Args,
"timestamp": time.Now().Unix(),
}
p.SendWebhook(config.HookOnSubscribe, p.config.Hook[config.HookOnSubscribe], webhookData)
}
func (p *Plugin) sendSubscribeEndWebhook(sub *Subscriber) {
if p.config.Hook == nil {
return
}
webhookData := map[string]interface{}{
"event": "subscribe_end",
"streamPath": sub.StreamPath,
"subscriberId": sub.ID,
"reason": sub.StopReason().Error(),
"timestamp": time.Now().Unix(),
}
if sub.Publisher != nil {
webhookData["publishId"] = sub.Publisher.ID
}
p.SendWebhook(config.HookOnSubscribeEnd, p.config.Hook[config.HookOnSubscribeEnd], webhookData)
}
func (p *Plugin) sendServerKeepAliveWebhook() {
if p.config.Hook == nil {
return
}
s := p.Server
webhookData := map[string]interface{}{
"event": "server_keep_alive",
"timestamp": time.Now().Unix(),
"streams": s.Streams.Length,
"subscribers": s.Subscribers.Length,
"publisherCount": s.Streams.Length,
"subscriberCount": s.Subscribers.Length,
"uptime": time.Since(s.StartTime).Seconds(),
}
p.SendWebhook(config.HookOnServerKeepAlive, p.config.Hook[config.HookOnServerKeepAlive], webhookData)
}
type ServerKeepAliveTask struct {
task.TickTask
plugin *Plugin
}
func (t *ServerKeepAliveTask) GetTickInterval() time.Duration {
return time.Duration(t.plugin.config.Hook[config.HookOnServerKeepAlive].Interval) * time.Second
}
func (t *ServerKeepAliveTask) Tick(now any) {
t.plugin.sendServerKeepAliveWebhook()
}