package gortsplib import ( "bufio" "crypto/tls" "fmt" "io" "net" "sync" "testing" "time" "github.com/stretchr/testify/require" "github.com/aler9/gortsplib/pkg/base" "github.com/aler9/gortsplib/pkg/liberrors" ) type testServ struct { s *Server wg sync.WaitGroup mutex sync.Mutex publisher *ServerConn sdp []byte readers map[*ServerConn]struct{} } func newTestServ(tlsConf *tls.Config) (*testServ, error) { var conf ServerConf if tlsConf != nil { conf = ServerConf{ TLSConfig: tlsConf, } } else { conf = ServerConf{ UDPRTPAddress: "127.0.0.1:8000", UDPRTCPAddress: "127.0.0.1:8001", } } s, err := conf.Serve("127.0.0.1:8554") if err != nil { return nil, err } ts := &testServ{ s: s, readers: make(map[*ServerConn]struct{}), } ts.wg.Add(1) go ts.run() return ts, nil } func (ts *testServ) close() { ts.s.Close() ts.wg.Wait() } func (ts *testServ) run() { defer ts.wg.Done() for { conn, err := ts.s.Accept() if err != nil { return } ts.wg.Add(1) go ts.handleConn(conn) } } func (ts *testServ) handleConn(conn *ServerConn) { defer ts.wg.Done() defer conn.Close() onDescribe := func(ctx *ServerConnDescribeCtx) (*base.Response, []byte, error) { if ctx.Path != "teststream" { return &base.Response{ StatusCode: base.StatusBadRequest, }, nil, fmt.Errorf("invalid path (%s)", ctx.Req.URL) } ts.mutex.Lock() defer ts.mutex.Unlock() if ts.publisher == nil { return &base.Response{ StatusCode: base.StatusNotFound, }, nil, nil } return &base.Response{ StatusCode: base.StatusOK, }, ts.sdp, nil } onAnnounce := func(ctx *ServerConnAnnounceCtx) (*base.Response, error) { if ctx.Path != "teststream" { return &base.Response{ StatusCode: base.StatusBadRequest, }, fmt.Errorf("invalid path (%s)", ctx.Req.URL) } ts.mutex.Lock() defer ts.mutex.Unlock() if ts.publisher != nil { return &base.Response{ StatusCode: base.StatusBadRequest, }, fmt.Errorf("someone is already publishing") } ts.publisher = conn ts.sdp = ctx.Tracks.Write() return &base.Response{ StatusCode: base.StatusOK, Header: base.Header{ "Session": base.HeaderValue{"12345678"}, }, }, nil } onSetup := func(ctx *ServerConnSetupCtx) (*base.Response, error) { if ctx.Path != "teststream" { return &base.Response{ StatusCode: base.StatusBadRequest, }, fmt.Errorf("invalid path (%s)", ctx.Req.URL) } return &base.Response{ StatusCode: base.StatusOK, Header: base.Header{ "Session": base.HeaderValue{"12345678"}, }, }, nil } onPlay := func(ctx *ServerConnPlayCtx) (*base.Response, error) { if ctx.Path != "teststream" { return &base.Response{ StatusCode: base.StatusBadRequest, }, fmt.Errorf("invalid path (%s)", ctx.Req.URL) } ts.mutex.Lock() defer ts.mutex.Unlock() ts.readers[conn] = struct{}{} return &base.Response{ StatusCode: base.StatusOK, Header: base.Header{ "Session": base.HeaderValue{"12345678"}, }, }, nil } onRecord := func(ctx *ServerConnRecordCtx) (*base.Response, error) { if ctx.Path != "teststream" { return &base.Response{ StatusCode: base.StatusBadRequest, }, fmt.Errorf("invalid path (%s)", ctx.Req.URL) } ts.mutex.Lock() defer ts.mutex.Unlock() if conn != ts.publisher { return &base.Response{ StatusCode: base.StatusBadRequest, }, fmt.Errorf("someone is already publishing") } return &base.Response{ StatusCode: base.StatusOK, Header: base.Header{ "Session": base.HeaderValue{"12345678"}, }, }, nil } onFrame := func(trackID int, typ StreamType, buf []byte) { ts.mutex.Lock() defer ts.mutex.Unlock() if conn == ts.publisher { for r := range ts.readers { r.WriteFrame(trackID, typ, buf) } } } <-conn.Read(ServerConnReadHandlers{ OnDescribe: onDescribe, OnAnnounce: onAnnounce, OnSetup: onSetup, OnPlay: onPlay, OnRecord: onRecord, OnFrame: onFrame, }) ts.mutex.Lock() defer ts.mutex.Unlock() if conn == ts.publisher { ts.publisher = nil ts.sdp = nil } else { delete(ts.readers, conn) } } var serverCert = []byte(`-----BEGIN CERTIFICATE----- MIIDazCCAlOgAwIBAgIUXw1hEC3LFpTsllv7D3ARJyEq7sIwDQYJKoZIhvcNAQEL BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0yMDEyMTMxNzQ0NThaFw0zMDEy MTExNzQ0NThaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEw HwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggEiMA0GCSqGSIb3DQEB AQUAA4IBDwAwggEKAoIBAQDG8DyyS51810GsGwgWr5rjJK7OE1kTTLSNEEKax8Bj zOyiaz8rA2JGl2VUEpi2UjDr9Cm7nd+YIEVs91IIBOb7LGqObBh1kGF3u5aZxLkv NJE+HrLVvUhaDobK2NU+Wibqc/EI3DfUkt1rSINvv9flwTFu1qHeuLWhoySzDKEp OzYxpFhwjVSokZIjT4Red3OtFz7gl2E6OAWe2qoh5CwLYVdMWtKR0Xuw3BkDPk9I qkQKx3fqv97LPEzhyZYjDT5WvGrgZ1WDAN3booxXF3oA1H3GHQc4m/vcLatOtb8e nI59gMQLEbnp08cl873bAuNuM95EZieXTHNbwUnq5iybAgMBAAGjUzBRMB0GA1Ud DgQWBBQBKhJh8eWu0a4au9X/2fKhkFX2vjAfBgNVHSMEGDAWgBQBKhJh8eWu0a4a u9X/2fKhkFX2vjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBj 3aCW0YPKukYgVK9cwN0IbVy/D0C1UPT4nupJcy/E0iC7MXPZ9D/SZxYQoAkdptdO xfI+RXkpQZLdODNx9uvV+cHyZHZyjtE5ENu/i5Rer2cWI/mSLZm5lUQyx+0KZ2Yu tEI1bsebDK30msa8QSTn0WidW9XhFnl3gRi4wRdimcQapOWYVs7ih+nAlSvng7NI XpAyRs8PIEbpDDBMWnldrX4TP6EWYUi49gCp8OUDRREKX3l6Ls1vZ02F34yHIt/7 7IV/XSKG096bhW+icKBWV0IpcEsgTzPK1J1hMxgjhzIMxGboAeUU+kidthOob6Sd XQxaORfgM//NzX9LhUPk -----END CERTIFICATE----- `) var serverKey = []byte(`-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEAxvA8skudfNdBrBsIFq+a4ySuzhNZE0y0jRBCmsfAY8zsoms/ KwNiRpdlVBKYtlIw6/Qpu53fmCBFbPdSCATm+yxqjmwYdZBhd7uWmcS5LzSRPh6y 1b1IWg6GytjVPlom6nPxCNw31JLda0iDb7/X5cExbtah3ri1oaMkswyhKTs2MaRY cI1UqJGSI0+EXndzrRc+4JdhOjgFntqqIeQsC2FXTFrSkdF7sNwZAz5PSKpECsd3 6r/eyzxM4cmWIw0+Vrxq4GdVgwDd26KMVxd6ANR9xh0HOJv73C2rTrW/HpyOfYDE CxG56dPHJfO92wLjbjPeRGYnl0xzW8FJ6uYsmwIDAQABAoIBACi0BKcyQ3HElSJC kaAao+Uvnzh4yvPg8Nwf5JDIp/uDdTMyIEWLtrLczRWrjGVZYbsVROinP5VfnPTT kYwkfKINj2u+gC6lsNuPnRuvHXikF8eO/mYvCTur1zZvsQnF5kp4GGwIqr+qoPUP bB0UMndG1PdpoMryHe+JcrvTrLHDmCeH10TqOwMsQMLHYLkowvxwJWsmTY7/Qr5S Wm3PPpOcW2i0uyPVuyuv4yD1368fqnqJ8QFsQp1K6QtYsNnJ71Hut1/IoxK/e6hj 5Z+byKtHVtmcLnABuoOT7BhleJNFBksX9sh83jid4tMBgci+zXNeGmgqo2EmaWAb agQslkECgYEA8B1rzjOHVQx/vwSzDa4XOrpoHQRfyElrGNz9JVBvnoC7AorezBXQ M9WTHQIFTGMjzD8pb+YJGi3gj93VN51r0SmJRxBaBRh1ZZI9kFiFzngYev8POgD3 ygmlS3kTHCNxCK/CJkB+/jMBgtPj5ygDpCWVcTSuWlQFphePkW7jaaECgYEA1Blz ulqgAyJHZaqgcbcCsI2q6m527hVr9pjzNjIVmkwu38yS9RTCgdlbEVVDnS0hoifl +jVMEGXjF3xjyMvL50BKbQUH+KAa+V4n1WGlnZOxX9TMny8MBjEuSX2+362vQ3BX 4vOlX00gvoc+sY+lrzvfx/OdPCHQGVYzoKCxhLsCgYA07HcviuIAV/HsO2/vyvhp xF5gTu+BqNUHNOZDDDid+ge+Jre2yfQLCL8VPLXIQW3Jff53IH/PGl+NtjphuLvj 7UDJvgvpZZuymIojP6+2c3gJ3CASC9aR3JBnUzdoE1O9s2eaoMqc4scpe+SWtZYf 3vzSZ+cqF6zrD/Rf/M35IQKBgHTU4E6ShPm09CcoaeC5sp2WK8OevZw/6IyZi78a r5Oiy18zzO97U/k6xVMy6F+38ILl/2Rn31JZDVJujniY6eSkIVsUHmPxrWoXV1HO y++U32uuSFiXDcSLarfIsE992MEJLSAynbF1Rsgsr3gXbGiuToJRyxbIeVy7gwzD 94TpAoGAY4/PejWQj9psZfAhyk5dRGra++gYRQ/gK1IIc1g+Dd2/BxbT/RHr05GK 6vwrfjsoRyMWteC1SsNs/CurjfQ/jqCfHNP5XPvxgd5Ec8sRJIiV7V5RTuWJsPu1 +3K6cnKEyg+0ekYmLertRFIY6SwWmY1fyKgTvxudMcsBY7dC4xs= -----END RSA PRIVATE KEY----- `) func TestServerHighLevelPublishRead(t *testing.T) { for _, ca := range []struct { encrypted bool publisherSoft string publisherProto string readerSoft string readerProto string }{ {false, "ffmpeg", "udp", "ffmpeg", "udp"}, {false, "ffmpeg", "udp", "gstreamer", "udp"}, {false, "gstreamer", "udp", "ffmpeg", "udp"}, {false, "gstreamer", "udp", "gstreamer", "udp"}, {false, "ffmpeg", "tcp", "ffmpeg", "tcp"}, {false, "ffmpeg", "tcp", "gstreamer", "tcp"}, {false, "gstreamer", "tcp", "ffmpeg", "tcp"}, {false, "gstreamer", "tcp", "gstreamer", "tcp"}, {false, "ffmpeg", "tcp", "ffmpeg", "udp"}, {false, "ffmpeg", "udp", "ffmpeg", "tcp"}, {true, "ffmpeg", "tcp", "ffmpeg", "tcp"}, {true, "ffmpeg", "tcp", "gstreamer", "tcp"}, {true, "gstreamer", "tcp", "ffmpeg", "tcp"}, {true, "gstreamer", "tcp", "gstreamer", "tcp"}, } { encryptedStr := func() string { if ca.encrypted { return "encrypted" } return "plain" }() t.Run(encryptedStr+"_"+ca.publisherSoft+"_"+ca.publisherProto+"_"+ ca.readerSoft+"_"+ca.readerProto, func(t *testing.T) { var proto string var tlsConf *tls.Config if !ca.encrypted { proto = "rtsp" tlsConf = nil } else { proto = "rtsps" cert, err := tls.X509KeyPair(serverCert, serverKey) require.NoError(t, err) tlsConf = &tls.Config{Certificates: []tls.Certificate{cert}} } ts, err := newTestServ(tlsConf) require.NoError(t, err) defer ts.close() switch ca.publisherSoft { case "ffmpeg": cnt1, err := newContainer("ffmpeg", "publish", []string{ "-re", "-stream_loop", "-1", "-i", "emptyvideo.mkv", "-c", "copy", "-f", "rtsp", "-rtsp_transport", ca.publisherProto, proto + "://localhost:8554/teststream", }) require.NoError(t, err) defer cnt1.close() case "gstreamer": cnt1, err := newContainer("gstreamer", "publish", []string{ "filesrc location=emptyvideo.mkv ! matroskademux ! video/x-h264 ! rtspclientsink " + "location=" + proto + "://127.0.0.1:8554/teststream protocols=" + ca.publisherProto + " tls-validation-flags=0 latency=0 timeout=0 rtx-time=0", }) require.NoError(t, err) defer cnt1.close() time.Sleep(1 * time.Second) } time.Sleep(1 * time.Second) switch ca.readerSoft { case "ffmpeg": cnt2, err := newContainer("ffmpeg", "read", []string{ "-rtsp_transport", ca.readerProto, "-i", proto + "://localhost:8554/teststream", "-vframes", "1", "-f", "image2", "-y", "/dev/null", }) require.NoError(t, err) defer cnt2.close() require.Equal(t, 0, cnt2.wait()) case "gstreamer": cnt2, err := newContainer("gstreamer", "read", []string{ "rtspsrc location=" + proto + "://127.0.0.1:8554/teststream protocols=" + ca.readerProto + " tls-validation-flags=0 latency=0 " + "! application/x-rtp,media=video ! decodebin ! exitafterframe ! fakesink", }) require.NoError(t, err) defer cnt2.close() require.Equal(t, 0, cnt2.wait()) } }) } } func TestServerCSeq(t *testing.T) { s, err := Serve("127.0.0.1:8554") require.NoError(t, err) defer s.Close() serverDone := make(chan struct{}) defer func() { <-serverDone }() go func() { defer close(serverDone) conn, err := s.Accept() require.NoError(t, err) defer conn.Close() <-conn.Read(ServerConnReadHandlers{}) }() conn, err := net.Dial("tcp", "localhost:8554") require.NoError(t, err) defer conn.Close() bconn := bufio.NewReadWriter(bufio.NewReader(conn), bufio.NewWriter(conn)) err = base.Request{ Method: base.Options, URL: base.MustParseURL("rtsp://localhost:8554/"), Header: base.Header{ "CSeq": base.HeaderValue{"5"}, }, }.Write(bconn.Writer) require.NoError(t, err) var res base.Response err = res.Read(bconn.Reader) require.NoError(t, err) require.Equal(t, base.StatusOK, res.StatusCode) require.Equal(t, base.HeaderValue{"5"}, res.Header["CSeq"]) } func TestServerErrorCSeqMissing(t *testing.T) { s, err := Serve("127.0.0.1:8554") require.NoError(t, err) defer s.Close() serverDone := make(chan struct{}) defer func() { <-serverDone }() go func() { defer close(serverDone) conn, err := s.Accept() require.NoError(t, err) defer conn.Close() err = <-conn.Read(ServerConnReadHandlers{}) require.Equal(t, "CSeq is missing", err.Error()) }() conn, err := net.Dial("tcp", "localhost:8554") require.NoError(t, err) defer conn.Close() bconn := bufio.NewReadWriter(bufio.NewReader(conn), bufio.NewWriter(conn)) err = base.Request{ Method: base.Options, URL: base.MustParseURL("rtsp://localhost:8554/"), Header: base.Header{}, }.Write(bconn.Writer) require.NoError(t, err) var res base.Response err = res.Read(bconn.Reader) require.NoError(t, err) require.Equal(t, base.StatusBadRequest, res.StatusCode) } func TestServerTeardownResponse(t *testing.T) { s, err := Serve("127.0.0.1:8554") require.NoError(t, err) defer s.Close() serverDone := make(chan struct{}) defer func() { <-serverDone }() go func() { defer close(serverDone) conn, err := s.Accept() require.NoError(t, err) defer conn.Close() err = <-conn.Read(ServerConnReadHandlers{}) _, ok := err.(liberrors.ErrServerTeardown) require.Equal(t, true, ok) }() conn, err := net.Dial("tcp", "localhost:8554") require.NoError(t, err) defer conn.Close() bconn := bufio.NewReadWriter(bufio.NewReader(conn), bufio.NewWriter(conn)) err = base.Request{ Method: base.Teardown, URL: base.MustParseURL("rtsp://localhost:8554/"), Header: base.Header{ "CSeq": base.HeaderValue{"1"}, }, }.Write(bconn.Writer) require.NoError(t, err) var res base.Response err = res.Read(bconn.Reader) require.NoError(t, err) require.Equal(t, base.StatusOK, res.StatusCode) buf := make([]byte, 2048) _, err = bconn.Read(buf) require.Equal(t, io.EOF, err) }