Add support RTSP over WebSocket

This commit is contained in:
Alexey Khit
2023-05-06 14:31:46 +03:00
parent 3139189975
commit 8b126c0d37
6 changed files with 258 additions and 36 deletions
+12 -13
View File
@@ -91,19 +91,19 @@ var log zerolog.Logger
var handlers []Handler
var defaultMedias []*core.Media
func rtspHandler(url string) (core.Producer, error) {
backchannel := true
func rtspHandler(rawURL string) (core.Producer, error) {
rawURL, rawQuery, _ := strings.Cut(rawURL, "#")
if i := strings.IndexByte(url, '#'); i > 0 {
if url[i+1:] == "backchannel=0" {
backchannel = false
}
url = url[:i]
}
conn := rtsp.NewClient(url)
conn := rtsp.NewClient(rawURL)
conn.Backchannel = true
conn.UserAgent = app.UserAgent
if rawQuery != "" {
query := streams.ParseQuery(rawQuery)
conn.Backchannel = query.Get("backchannel") == "1"
conn.Transport = query.Get("transport")
}
if log.Trace().Enabled() {
conn.Listen(func(msg any) {
switch msg := msg.(type) {
@@ -121,12 +121,11 @@ func rtspHandler(url string) (core.Producer, error) {
return nil, err
}
conn.Backchannel = backchannel
if err := conn.Describe(); err != nil {
if !backchannel {
if !conn.Backchannel {
return nil, err
}
log.Trace().Msgf("[rtsp] describe (backchannel=%t) err: %v", backchannel, err)
log.Trace().Msgf("[rtsp] describe (backchannel=%t) err: %v", conn.Backchannel, err)
// second try without backchannel, we need to reconnect
conn.Backchannel = false
+7 -23
View File
@@ -2,10 +2,9 @@ package rtsp
import (
"bufio"
"crypto/tls"
"errors"
"fmt"
"net"
"github.com/AlexxIT/go2rtc/pkg/tcp/websocket"
"net/http"
"net/url"
"strconv"
@@ -23,33 +22,18 @@ func NewClient(uri string) *Conn {
}
func (c *Conn) Dial() (err error) {
if c.URL, err = url.Parse(c.uri); err != nil {
return
if c.Transport == "" {
c.conn, err = Dial(c.uri)
} else {
c.conn, err = websocket.Dial(c.Transport)
}
if strings.IndexByte(c.URL.Host, ':') < 0 {
c.URL.Host += ":554"
}
c.conn, err = net.DialTimeout("tcp", c.URL.Host, time.Second*5)
if err != nil {
return
}
var tlsConf *tls.Config
switch c.URL.Scheme {
case "rtsps":
tlsConf = &tls.Config{ServerName: c.URL.Hostname()}
case "rtspx":
c.URL.Scheme = "rtsps"
tlsConf = &tls.Config{InsecureSkipVerify: true}
}
if tlsConf != nil {
tlsConn := tls.Client(c.conn, tlsConf)
if err = tlsConn.Handshake(); err != nil {
return err
}
c.conn = tlsConn
if c.URL, err = url.Parse(c.uri); err != nil {
return
}
// remove UserInfo from URL
+1
View File
@@ -24,6 +24,7 @@ type Conn struct {
Backchannel bool
PacketSize uint16
SessionName string
Transport string // custom transport support, ex. RTSP over WebSocket
Medias []*core.Media
UserAgent string
+44
View File
@@ -0,0 +1,44 @@
package rtsp
import (
"crypto/tls"
"errors"
"net"
"net/url"
"strings"
"time"
)
func Dial(uri string) (net.Conn, error) {
u, err := url.Parse(uri)
if err != nil {
return nil, err
}
switch u.Scheme {
case "rtsp":
return dialTCP(u.Host, nil)
case "rtsps":
tlsConf := &tls.Config{ServerName: u.Hostname()}
return dialTCP(u.Host, tlsConf)
case "rtspx":
tlsConf := &tls.Config{InsecureSkipVerify: true}
return dialTCP(u.Host, tlsConf)
}
return nil, errors.New("unsupported scheme: " + u.Scheme)
}
func dialTCP(address string, tlsConf *tls.Config) (net.Conn, error) {
if strings.IndexByte(address, ':') < 0 {
address += ":554"
}
conn, err := net.DialTimeout("tcp", address, time.Second*5)
if tlsConf == nil || err != nil {
return conn, err
}
tlsConn := tls.Client(conn, tlsConf)
return tlsConn, tlsConn.Handshake()
}
+130
View File
@@ -0,0 +1,130 @@
package websocket
import (
cryptorand "crypto/rand"
"encoding/binary"
"fmt"
"io"
"net"
"time"
)
const BinaryMessage = 2
type Client struct {
conn net.Conn
remain int
}
func NewClient(conn net.Conn) *Client {
return &Client{conn: conn}
}
const finalBit = 0x80
const maskBit = 0x80
func (w *Client) Read(b []byte) (n int, err error) {
if w.remain == 0 {
b2 := make([]byte, 2)
if _, err = io.ReadFull(w.conn, b2); err != nil {
return 0, err
}
frameType := b2[0] & 0xF
w.remain = int(b2[1] & 0x7F)
switch frameType {
case BinaryMessage:
default:
return 0, fmt.Errorf("unsupported frame type: %d", frameType)
}
switch w.remain {
case 126:
if _, err = io.ReadFull(w.conn, b2); err != nil {
return 0, err
}
w.remain = int(binary.BigEndian.Uint16(b2))
case 127:
b8 := make([]byte, 8)
if _, err = io.ReadFull(w.conn, b8); err != nil {
return 0, err
}
w.remain = int(binary.BigEndian.Uint64(b8))
}
}
if w.remain > len(b) {
n, err = io.ReadFull(w.conn, b)
w.remain -= n
return
}
n, err = io.ReadFull(w.conn, b[:w.remain])
w.remain = 0
return
}
func (w *Client) Write(b []byte) (n int, err error) {
var data []byte
var start byte
size := len(b)
switch {
case size > 65535:
start = 10
data = make([]byte, size+14)
data[1] = maskBit | 127
binary.BigEndian.PutUint64(data[2:], uint64(size))
case size > 125:
start = 4
data = make([]byte, size+8)
data[1] = maskBit | 126
binary.BigEndian.PutUint16(data[2:], uint16(size))
default:
start = 2
data = make([]byte, size+6)
data[1] = maskBit | byte(size)
}
data[0] = BinaryMessage | finalBit
mask := data[start : start+4]
msg := data[start+4:]
if _, err = cryptorand.Read(mask); err != nil {
return 0, err
}
for i := 0; i < len(b); i++ {
msg[i] = b[i] ^ mask[i%4]
}
return w.conn.Write(data)
}
func (w *Client) Close() error {
return w.conn.Close()
}
func (w *Client) LocalAddr() net.Addr {
return w.conn.LocalAddr()
}
func (w *Client) RemoteAddr() net.Addr {
return w.conn.RemoteAddr()
}
func (w *Client) SetDeadline(t time.Time) error {
return w.conn.SetDeadline(t)
}
func (w *Client) SetReadDeadline(t time.Time) error {
return w.conn.SetReadDeadline(t)
}
func (w *Client) SetWriteDeadline(t time.Time) error {
return w.conn.SetWriteDeadline(t)
}
+64
View File
@@ -0,0 +1,64 @@
package websocket
import (
cryptorand "crypto/rand"
"crypto/sha1"
"encoding/base64"
"errors"
"github.com/AlexxIT/go2rtc/pkg/tcp"
"net"
"net/http"
"strings"
)
func Dial(address string) (net.Conn, error) {
if strings.HasPrefix(address, "ws") {
address = "http" + address[2:] // support http and https
}
// using custom client for support Digest Auth
// https://github.com/AlexxIT/go2rtc/issues/415
ctx, pconn := tcp.WithConn()
req, err := http.NewRequestWithContext(ctx, "GET", address, nil)
if err != nil {
return nil, err
}
key, accept := GetKeyAccept()
// Version, Key, Protocol important for Axis cameras
req.Header.Set("Connection", "Upgrade")
req.Header.Set("Upgrade", "websocket")
req.Header.Set("Sec-WebSocket-Version", "13")
req.Header.Set("Sec-WebSocket-Key", key)
req.Header.Set("Sec-WebSocket-Protocol", "binary")
res, err := tcp.Do(req)
if err != nil {
return nil, err
}
if res.StatusCode != http.StatusSwitchingProtocols {
return nil, errors.New("wrong status: " + res.Status)
}
if res.Header.Get("Sec-Websocket-Accept") != accept {
return nil, errors.New("wrong websocket accept")
}
return NewClient(*pconn), nil
}
func GetKeyAccept() (key, accept string) {
b := make([]byte, 16)
_, _ = cryptorand.Read(b)
key = base64.StdEncoding.EncodeToString(b)
h := sha1.New()
h.Write([]byte(key))
h.Write([]byte("258EAFA5-E914-47DA-95CA-C5AB0DC85B11"))
accept = base64.StdEncoding.EncodeToString(h.Sum(nil))
return
}