mirror of
https://github.com/aler9/gortsplib
synced 2025-10-05 15:16:51 +08:00
implement server TLS support (RTSPS)
This commit is contained in:
13
README.md
13
README.md
@@ -10,13 +10,15 @@ RTSP 1.0 client and server library for the Go programming language, written for
|
|||||||
Features:
|
Features:
|
||||||
|
|
||||||
* Client
|
* Client
|
||||||
* Query servers about published tracks
|
* Read streams from servers with UDP or TCP
|
||||||
* Read tracks from servers with UDP or TCP
|
* Publish streams to servers with UDP or TCP
|
||||||
* Read only selected tracks
|
* Query servers about published streams
|
||||||
* Publish tracks to servers with UDP or TCP
|
* Read only selected tracks of a stream
|
||||||
* Pause reading or publishing without disconnecting from the server
|
* Pause reading or publishing without disconnecting from the server
|
||||||
* Server
|
* Server
|
||||||
* Build servers and handle publishers and readers
|
* Handle requests from clients
|
||||||
|
* Read and write streams with TCP
|
||||||
|
* Encrypt streams with TLS (RTSPS)
|
||||||
|
|
||||||
## Table of contents
|
## Table of contents
|
||||||
|
|
||||||
@@ -35,6 +37,7 @@ Features:
|
|||||||
* [client-publish-options](examples/client-publish-options.go)
|
* [client-publish-options](examples/client-publish-options.go)
|
||||||
* [client-publish-pause](examples/client-publish-pause.go)
|
* [client-publish-pause](examples/client-publish-pause.go)
|
||||||
* [server](examples/server.go)
|
* [server](examples/server.go)
|
||||||
|
* [server-tls](examples/server-tls.go)
|
||||||
|
|
||||||
## API Documentation
|
## API Documentation
|
||||||
|
|
||||||
|
194
examples/server-tls.go
Normal file
194
examples/server-tls.go
Normal file
@@ -0,0 +1,194 @@
|
|||||||
|
// +build ignore
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"github.com/aler9/gortsplib"
|
||||||
|
"github.com/aler9/gortsplib/pkg/base"
|
||||||
|
"github.com/aler9/gortsplib/pkg/headers"
|
||||||
|
)
|
||||||
|
|
||||||
|
// This example shows how to
|
||||||
|
// 1. create a RTSP server which accept only connections encrypted with TLS (RTSPS)
|
||||||
|
// 2. allow a single client to publish a stream with TCP
|
||||||
|
// 3. allow multiple clients to read that stream with TCP
|
||||||
|
|
||||||
|
var mutex sync.Mutex
|
||||||
|
var publisher *gortsplib.ServerConn
|
||||||
|
var sdp []byte
|
||||||
|
var readers = make(map[*gortsplib.ServerConn]struct{})
|
||||||
|
|
||||||
|
// this is called for each incoming connection
|
||||||
|
func handleConn(conn *gortsplib.ServerConn) {
|
||||||
|
defer conn.Close()
|
||||||
|
|
||||||
|
log.Printf("client connected")
|
||||||
|
|
||||||
|
// called after receiving a DESCRIBE request.
|
||||||
|
onDescribe := func(req *base.Request) (*base.Response, error) {
|
||||||
|
mutex.Lock()
|
||||||
|
defer mutex.Unlock()
|
||||||
|
|
||||||
|
// no one is publishing yet
|
||||||
|
if publisher == nil {
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusNotFound,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusOK,
|
||||||
|
Header: base.Header{
|
||||||
|
"Content-Base": base.HeaderValue{req.URL.String() + "/"},
|
||||||
|
"Content-Type": base.HeaderValue{"application/sdp"},
|
||||||
|
},
|
||||||
|
Content: sdp,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// called after receiving an ANNOUNCE request.
|
||||||
|
onAnnounce := func(req *base.Request, tracks gortsplib.Tracks) (*base.Response, error) {
|
||||||
|
mutex.Lock()
|
||||||
|
defer mutex.Unlock()
|
||||||
|
|
||||||
|
if publisher != nil {
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusBadRequest,
|
||||||
|
}, fmt.Errorf("someone is already publishing")
|
||||||
|
}
|
||||||
|
|
||||||
|
publisher = conn
|
||||||
|
sdp = tracks.Write()
|
||||||
|
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusOK,
|
||||||
|
Header: base.Header{
|
||||||
|
"Session": base.HeaderValue{"12345678"},
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// called after receiving a SETUP request.
|
||||||
|
onSetup := func(req *base.Request, th *headers.Transport) (*base.Response, error) {
|
||||||
|
// support TCP only
|
||||||
|
if th.Protocol == gortsplib.StreamProtocolUDP {
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusUnsupportedTransport,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusOK,
|
||||||
|
Header: base.Header{
|
||||||
|
"Transport": req.Header["Transport"],
|
||||||
|
"Session": base.HeaderValue{"12345678"},
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// called after receiving a PLAY request.
|
||||||
|
onPlay := func(req *base.Request) (*base.Response, error) {
|
||||||
|
mutex.Lock()
|
||||||
|
defer mutex.Unlock()
|
||||||
|
|
||||||
|
readers[conn] = struct{}{}
|
||||||
|
|
||||||
|
conn.EnableReadFrames(true)
|
||||||
|
conn.EnableReadTimeout(false)
|
||||||
|
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusOK,
|
||||||
|
Header: base.Header{
|
||||||
|
"Session": base.HeaderValue{"12345678"},
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// called after receiving a RECORD request.
|
||||||
|
onRecord := func(req *base.Request) (*base.Response, error) {
|
||||||
|
mutex.Lock()
|
||||||
|
defer mutex.Unlock()
|
||||||
|
|
||||||
|
if conn != publisher {
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusBadRequest,
|
||||||
|
}, fmt.Errorf("someone is already publishing")
|
||||||
|
}
|
||||||
|
|
||||||
|
conn.EnableReadFrames(true)
|
||||||
|
conn.EnableReadTimeout(true)
|
||||||
|
|
||||||
|
return &base.Response{
|
||||||
|
StatusCode: base.StatusOK,
|
||||||
|
Header: base.Header{
|
||||||
|
"Session": base.HeaderValue{"12345678"},
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// called after receiving a Frame.
|
||||||
|
onFrame := func(trackID int, typ gortsplib.StreamType, buf []byte) {
|
||||||
|
mutex.Lock()
|
||||||
|
defer mutex.Unlock()
|
||||||
|
|
||||||
|
// if we are the publisher, route frames to readers
|
||||||
|
if conn == publisher {
|
||||||
|
for r := range readers {
|
||||||
|
r.WriteFrame(trackID, typ, buf)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
err := <-conn.Read(gortsplib.ServerConnReadHandlers{
|
||||||
|
OnDescribe: onDescribe,
|
||||||
|
OnAnnounce: onAnnounce,
|
||||||
|
OnSetup: onSetup,
|
||||||
|
OnPlay: onPlay,
|
||||||
|
OnRecord: onRecord,
|
||||||
|
OnFrame: onFrame,
|
||||||
|
})
|
||||||
|
log.Printf("client disconnected (%s)", err)
|
||||||
|
|
||||||
|
mutex.Lock()
|
||||||
|
defer mutex.Unlock()
|
||||||
|
|
||||||
|
if conn == publisher {
|
||||||
|
publisher = nil
|
||||||
|
sdp = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
// setup certificates - they can be generated with
|
||||||
|
// openssl genrsa -out server.key 2048
|
||||||
|
// openssl req -new -x509 -sha256 -key server.key -out server.crt -days 3650
|
||||||
|
cert, err := tls.LoadX509KeyPair("server.crt", "server.key")
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
conf := gortsplib.ServerConf{
|
||||||
|
TLSConfig: &tls.Config{Certificates: []tls.Certificate{cert}},
|
||||||
|
}
|
||||||
|
|
||||||
|
// create server
|
||||||
|
s, err := conf.Serve(":8554")
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
log.Printf("server is ready")
|
||||||
|
|
||||||
|
// accept connections
|
||||||
|
for {
|
||||||
|
conn, err := s.Accept()
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
go handleConn(conn)
|
||||||
|
}
|
||||||
|
}
|
@@ -27,8 +27,8 @@ func ParseURL(s string) (*URL, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if u.Scheme != "rtsp" {
|
if u.Scheme != "rtsp" && u.Scheme != "rtsps" {
|
||||||
return nil, fmt.Errorf("wrong scheme")
|
return nil, fmt.Errorf("unsupported scheme '%s'", u.Scheme)
|
||||||
}
|
}
|
||||||
|
|
||||||
return (*URL)(u), nil
|
return (*URL)(u), nil
|
||||||
|
10
server.go
10
server.go
@@ -2,6 +2,7 @@ package gortsplib
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
|
"crypto/tls"
|
||||||
"net"
|
"net"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -23,10 +24,15 @@ func (s *Server) Accept() (*ServerConn, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
conn := nconn
|
||||||
|
if s.conf.TLSConfig != nil {
|
||||||
|
conn = tls.Server(conn, s.conf.TLSConfig)
|
||||||
|
}
|
||||||
|
|
||||||
return &ServerConn{
|
return &ServerConn{
|
||||||
s: s,
|
s: s,
|
||||||
nconn: nconn,
|
nconn: nconn,
|
||||||
br: bufio.NewReaderSize(nconn, serverReadBufferSize),
|
br: bufio.NewReaderSize(conn, serverReadBufferSize),
|
||||||
bw: bufio.NewWriterSize(nconn, serverWriteBufferSize),
|
bw: bufio.NewWriterSize(conn, serverWriteBufferSize),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
@@ -1,6 +1,7 @@
|
|||||||
package gortsplib
|
package gortsplib
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/tls"
|
||||||
"net"
|
"net"
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
@@ -16,6 +17,9 @@ func Serve(address string) (*Server, error) {
|
|||||||
// ServerConf allows to configure a Server.
|
// ServerConf allows to configure a Server.
|
||||||
// All fields are optional.
|
// All fields are optional.
|
||||||
type ServerConf struct {
|
type ServerConf struct {
|
||||||
|
// a TLS configuration to accept TLS (RTSPS) connections.
|
||||||
|
TLSConfig *tls.Config
|
||||||
|
|
||||||
// timeout of read operations.
|
// timeout of read operations.
|
||||||
// It defaults to 10 seconds
|
// It defaults to 10 seconds
|
||||||
ReadTimeout time.Duration
|
ReadTimeout time.Duration
|
||||||
|
@@ -2,6 +2,7 @@ package gortsplib
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
@@ -24,8 +25,12 @@ type testServ struct {
|
|||||||
readers map[*ServerConn]struct{}
|
readers map[*ServerConn]struct{}
|
||||||
}
|
}
|
||||||
|
|
||||||
func newTestServ() (*testServ, error) {
|
func newTestServ(tlsConf *tls.Config) (*testServ, error) {
|
||||||
s, err := Serve(":8554")
|
conf := ServerConf{
|
||||||
|
TLSConfig: tlsConf,
|
||||||
|
}
|
||||||
|
|
||||||
|
s, err := conf.Serve(":8554")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@@ -182,8 +187,38 @@ func (ts *testServ) handleConn(conn *ServerConn) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestServerTeardownResponse(t *testing.T) {
|
||||||
|
ts, err := newTestServ(nil)
|
||||||
|
require.NoError(t, err)
|
||||||
|
defer ts.close()
|
||||||
|
|
||||||
|
conn, err := net.Dial("tcp", "localhost:8554")
|
||||||
|
require.NoError(t, err)
|
||||||
|
defer conn.Close()
|
||||||
|
bconn := bufio.NewReadWriter(bufio.NewReader(conn), bufio.NewWriter(conn))
|
||||||
|
|
||||||
|
req := base.Request{
|
||||||
|
Method: base.Teardown,
|
||||||
|
URL: base.MustParseURL("rtsp://localhost:8554/"),
|
||||||
|
Header: base.Header{
|
||||||
|
"CSeq": base.HeaderValue{"1"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
err = req.Write(bconn.Writer)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
var res base.Response
|
||||||
|
err = res.Read(bconn.Reader)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, base.StatusOK, res.StatusCode)
|
||||||
|
|
||||||
|
buf := make([]byte, 2048)
|
||||||
|
_, err = bconn.Read(buf)
|
||||||
|
require.Equal(t, io.EOF, err)
|
||||||
|
}
|
||||||
|
|
||||||
func TestServerPublishReadTCP(t *testing.T) {
|
func TestServerPublishReadTCP(t *testing.T) {
|
||||||
ts, err := newTestServ()
|
ts, err := newTestServ(nil)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
defer ts.close()
|
defer ts.close()
|
||||||
|
|
||||||
@@ -214,32 +249,90 @@ func TestServerPublishReadTCP(t *testing.T) {
|
|||||||
require.Equal(t, 0, cnt2.wait())
|
require.Equal(t, 0, cnt2.wait())
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestServerTeardownResponse(t *testing.T) {
|
var serverCert = []byte(`-----BEGIN CERTIFICATE-----
|
||||||
ts, err := newTestServ()
|
MIIDazCCAlOgAwIBAgIUXw1hEC3LFpTsllv7D3ARJyEq7sIwDQYJKoZIhvcNAQEL
|
||||||
|
BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
|
||||||
|
GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0yMDEyMTMxNzQ0NThaFw0zMDEy
|
||||||
|
MTExNzQ0NThaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEw
|
||||||
|
HwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggEiMA0GCSqGSIb3DQEB
|
||||||
|
AQUAA4IBDwAwggEKAoIBAQDG8DyyS51810GsGwgWr5rjJK7OE1kTTLSNEEKax8Bj
|
||||||
|
zOyiaz8rA2JGl2VUEpi2UjDr9Cm7nd+YIEVs91IIBOb7LGqObBh1kGF3u5aZxLkv
|
||||||
|
NJE+HrLVvUhaDobK2NU+Wibqc/EI3DfUkt1rSINvv9flwTFu1qHeuLWhoySzDKEp
|
||||||
|
OzYxpFhwjVSokZIjT4Red3OtFz7gl2E6OAWe2qoh5CwLYVdMWtKR0Xuw3BkDPk9I
|
||||||
|
qkQKx3fqv97LPEzhyZYjDT5WvGrgZ1WDAN3booxXF3oA1H3GHQc4m/vcLatOtb8e
|
||||||
|
nI59gMQLEbnp08cl873bAuNuM95EZieXTHNbwUnq5iybAgMBAAGjUzBRMB0GA1Ud
|
||||||
|
DgQWBBQBKhJh8eWu0a4au9X/2fKhkFX2vjAfBgNVHSMEGDAWgBQBKhJh8eWu0a4a
|
||||||
|
u9X/2fKhkFX2vjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBj
|
||||||
|
3aCW0YPKukYgVK9cwN0IbVy/D0C1UPT4nupJcy/E0iC7MXPZ9D/SZxYQoAkdptdO
|
||||||
|
xfI+RXkpQZLdODNx9uvV+cHyZHZyjtE5ENu/i5Rer2cWI/mSLZm5lUQyx+0KZ2Yu
|
||||||
|
tEI1bsebDK30msa8QSTn0WidW9XhFnl3gRi4wRdimcQapOWYVs7ih+nAlSvng7NI
|
||||||
|
XpAyRs8PIEbpDDBMWnldrX4TP6EWYUi49gCp8OUDRREKX3l6Ls1vZ02F34yHIt/7
|
||||||
|
7IV/XSKG096bhW+icKBWV0IpcEsgTzPK1J1hMxgjhzIMxGboAeUU+kidthOob6Sd
|
||||||
|
XQxaORfgM//NzX9LhUPk
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
`)
|
||||||
|
|
||||||
|
var serverKey = []byte(`-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIIEogIBAAKCAQEAxvA8skudfNdBrBsIFq+a4ySuzhNZE0y0jRBCmsfAY8zsoms/
|
||||||
|
KwNiRpdlVBKYtlIw6/Qpu53fmCBFbPdSCATm+yxqjmwYdZBhd7uWmcS5LzSRPh6y
|
||||||
|
1b1IWg6GytjVPlom6nPxCNw31JLda0iDb7/X5cExbtah3ri1oaMkswyhKTs2MaRY
|
||||||
|
cI1UqJGSI0+EXndzrRc+4JdhOjgFntqqIeQsC2FXTFrSkdF7sNwZAz5PSKpECsd3
|
||||||
|
6r/eyzxM4cmWIw0+Vrxq4GdVgwDd26KMVxd6ANR9xh0HOJv73C2rTrW/HpyOfYDE
|
||||||
|
CxG56dPHJfO92wLjbjPeRGYnl0xzW8FJ6uYsmwIDAQABAoIBACi0BKcyQ3HElSJC
|
||||||
|
kaAao+Uvnzh4yvPg8Nwf5JDIp/uDdTMyIEWLtrLczRWrjGVZYbsVROinP5VfnPTT
|
||||||
|
kYwkfKINj2u+gC6lsNuPnRuvHXikF8eO/mYvCTur1zZvsQnF5kp4GGwIqr+qoPUP
|
||||||
|
bB0UMndG1PdpoMryHe+JcrvTrLHDmCeH10TqOwMsQMLHYLkowvxwJWsmTY7/Qr5S
|
||||||
|
Wm3PPpOcW2i0uyPVuyuv4yD1368fqnqJ8QFsQp1K6QtYsNnJ71Hut1/IoxK/e6hj
|
||||||
|
5Z+byKtHVtmcLnABuoOT7BhleJNFBksX9sh83jid4tMBgci+zXNeGmgqo2EmaWAb
|
||||||
|
agQslkECgYEA8B1rzjOHVQx/vwSzDa4XOrpoHQRfyElrGNz9JVBvnoC7AorezBXQ
|
||||||
|
M9WTHQIFTGMjzD8pb+YJGi3gj93VN51r0SmJRxBaBRh1ZZI9kFiFzngYev8POgD3
|
||||||
|
ygmlS3kTHCNxCK/CJkB+/jMBgtPj5ygDpCWVcTSuWlQFphePkW7jaaECgYEA1Blz
|
||||||
|
ulqgAyJHZaqgcbcCsI2q6m527hVr9pjzNjIVmkwu38yS9RTCgdlbEVVDnS0hoifl
|
||||||
|
+jVMEGXjF3xjyMvL50BKbQUH+KAa+V4n1WGlnZOxX9TMny8MBjEuSX2+362vQ3BX
|
||||||
|
4vOlX00gvoc+sY+lrzvfx/OdPCHQGVYzoKCxhLsCgYA07HcviuIAV/HsO2/vyvhp
|
||||||
|
xF5gTu+BqNUHNOZDDDid+ge+Jre2yfQLCL8VPLXIQW3Jff53IH/PGl+NtjphuLvj
|
||||||
|
7UDJvgvpZZuymIojP6+2c3gJ3CASC9aR3JBnUzdoE1O9s2eaoMqc4scpe+SWtZYf
|
||||||
|
3vzSZ+cqF6zrD/Rf/M35IQKBgHTU4E6ShPm09CcoaeC5sp2WK8OevZw/6IyZi78a
|
||||||
|
r5Oiy18zzO97U/k6xVMy6F+38ILl/2Rn31JZDVJujniY6eSkIVsUHmPxrWoXV1HO
|
||||||
|
y++U32uuSFiXDcSLarfIsE992MEJLSAynbF1Rsgsr3gXbGiuToJRyxbIeVy7gwzD
|
||||||
|
94TpAoGAY4/PejWQj9psZfAhyk5dRGra++gYRQ/gK1IIc1g+Dd2/BxbT/RHr05GK
|
||||||
|
6vwrfjsoRyMWteC1SsNs/CurjfQ/jqCfHNP5XPvxgd5Ec8sRJIiV7V5RTuWJsPu1
|
||||||
|
+3K6cnKEyg+0ekYmLertRFIY6SwWmY1fyKgTvxudMcsBY7dC4xs=
|
||||||
|
-----END RSA PRIVATE KEY-----
|
||||||
|
`)
|
||||||
|
|
||||||
|
func TestServerPublishReadTLS(t *testing.T) {
|
||||||
|
cert, err := tls.X509KeyPair(serverCert, serverKey)
|
||||||
|
require.NoError(t, err)
|
||||||
|
tlsConf := &tls.Config{Certificates: []tls.Certificate{cert}}
|
||||||
|
|
||||||
|
ts, err := newTestServ(tlsConf)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
defer ts.close()
|
defer ts.close()
|
||||||
|
|
||||||
conn, err := net.Dial("tcp", "localhost:8554")
|
cnt1, err := newContainer("ffmpeg", "publish", []string{
|
||||||
|
"-re",
|
||||||
|
"-stream_loop", "-1",
|
||||||
|
"-i", "/emptyvideo.ts",
|
||||||
|
"-c", "copy",
|
||||||
|
"-f", "rtsp",
|
||||||
|
"-rtsp_transport", "tcp",
|
||||||
|
"rtsps://localhost:8554/teststream",
|
||||||
|
})
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
defer conn.Close()
|
defer cnt1.close()
|
||||||
bconn := bufio.NewReadWriter(bufio.NewReader(conn), bufio.NewWriter(conn))
|
|
||||||
|
|
||||||
req := base.Request{
|
time.Sleep(1 * time.Second)
|
||||||
Method: base.Teardown,
|
|
||||||
URL: base.MustParseURL("rtsp://localhost:8554/"),
|
cnt2, err := newContainer("ffmpeg", "read", []string{
|
||||||
Header: base.Header{
|
"-rtsp_transport", "tcp",
|
||||||
"CSeq": base.HeaderValue{"1"},
|
"-i", "rtsps://localhost:8554/teststream",
|
||||||
},
|
"-vframes", "1",
|
||||||
}
|
"-f", "image2",
|
||||||
err = req.Write(bconn.Writer)
|
"-y", "/dev/null",
|
||||||
|
})
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
defer cnt2.close()
|
||||||
|
|
||||||
var res base.Response
|
require.Equal(t, 0, cnt2.wait())
|
||||||
err = res.Read(bconn.Reader)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Equal(t, base.StatusOK, res.StatusCode)
|
|
||||||
|
|
||||||
buf := make([]byte, 2048)
|
|
||||||
_, err = bconn.Read(buf)
|
|
||||||
require.Equal(t, io.EOF, err)
|
|
||||||
}
|
}
|
||||||
|
@@ -349,12 +349,11 @@ func (sc *ServerConn) WriteFrame(trackID int, streamType StreamType, content []b
|
|||||||
sc.mutex.Lock()
|
sc.mutex.Lock()
|
||||||
defer sc.mutex.Unlock()
|
defer sc.mutex.Unlock()
|
||||||
|
|
||||||
|
sc.nconn.SetWriteDeadline(time.Now().Add(sc.s.conf.WriteTimeout))
|
||||||
frame := base.InterleavedFrame{
|
frame := base.InterleavedFrame{
|
||||||
TrackID: trackID,
|
TrackID: trackID,
|
||||||
StreamType: streamType,
|
StreamType: streamType,
|
||||||
Content: content,
|
Content: content,
|
||||||
}
|
}
|
||||||
|
|
||||||
sc.nconn.SetWriteDeadline(time.Now().Add(sc.s.conf.WriteTimeout))
|
|
||||||
return frame.Write(sc.bw)
|
return frame.Write(sc.bw)
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user