ZLMediaKit/api/tests/server.c

434 lines
16 KiB
C++
Raw Normal View History

2019-12-23 14:31:02 +08:00
/*
2020-04-04 20:30:09 +08:00
* Copyright (c) 2016 The ZLMediaKit project authors. All Rights Reserved.
2019-12-23 14:31:02 +08:00
*
* This file is part of ZLMediaKit(https://github.com/xiongziliang/ZLMediaKit).
*
2020-04-04 20:30:09 +08:00
* Use of this source code is governed by MIT license that can be found in the
* LICENSE file in the root of the source tree. All contributing project authors
* may be found in the AUTHORS file in the root of the source tree.
2019-12-23 14:31:02 +08:00
*/
2019-12-23 14:01:00 +08:00
2019-12-25 09:39:24 +08:00
#include <signal.h>
#include <string.h>
#include "mk_mediakit.h"
2019-12-24 16:02:41 +08:00
2019-12-23 14:31:02 +08:00
#ifdef _WIN32
#include "windows.h"
#else
2019-12-24 16:02:41 +08:00
2019-12-23 14:01:00 +08:00
#include "unistd.h"
2019-12-24 16:02:41 +08:00
2019-12-23 14:31:02 +08:00
#endif
2019-12-23 15:31:35 +08:00
2019-12-24 16:02:41 +08:00
#define LOG_LEV 4
/**
* MediaSource事件广播
* @param regist 10
* @param sender MediaSource对象
*/
void API_CALL on_mk_media_changed(int regist,
const mk_media_source sender) {
log_printf(LOG_LEV,"%d %s/%s/%s/%s",(int)regist,
mk_media_source_get_schema(sender),
mk_media_source_get_vhost(sender),
mk_media_source_get_app(sender),
mk_media_source_get_stream(sender));
}
/**
* rtsp/rtmp推流事件广播
* @see mk_publish_auth_invoker_do
* @param url_info url相关信息
* @param invoker invoker返回鉴权结果
* @param sender tcp客户端相关信息
*/
void API_CALL on_mk_media_publish(const mk_media_info url_info,
const mk_publish_auth_invoker invoker,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,
"client info, local: %s:%d, peer: %s:%d\n"
"%s/%s/%s/%s, url params: %s",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
mk_media_info_get_schema(url_info),
mk_media_info_get_vhost(url_info),
mk_media_info_get_app(url_info),
mk_media_info_get_stream(url_info),
mk_media_info_get_params(url_info));
//允许推流并且允许转rtxp/hls/mp4
2019-12-25 09:39:24 +08:00
mk_publish_auth_invoker_do(invoker, NULL, 1, 1, 1);
2019-12-24 16:02:41 +08:00
}
/**
* rtsp/rtmp/http-flv/hls事件广播
* @see mk_auth_invoker_do
* @param url_info url相关信息
* @param invoker invoker返回鉴权结果
* @param sender
*/
void API_CALL on_mk_media_play(const mk_media_info url_info,
const mk_auth_invoker invoker,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,
"client info, local: %s:%d, peer: %s:%d\n"
"%s/%s/%s/%s, url params: %s",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
mk_media_info_get_schema(url_info),
mk_media_info_get_vhost(url_info),
mk_media_info_get_app(url_info),
mk_media_info_get_stream(url_info),
mk_media_info_get_params(url_info));
//允许播放
2019-12-25 09:39:24 +08:00
mk_auth_invoker_do(invoker, NULL);
2019-12-24 16:02:41 +08:00
}
/**
* 广
* @param url_info url相关信息
* @param sender
*/
void API_CALL on_mk_media_not_found(const mk_media_info url_info,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,
"client info, local: %s:%d, peer: %s:%d\n"
"%s/%s/%s/%s, url params: %s",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
mk_media_info_get_schema(url_info),
mk_media_info_get_vhost(url_info),
mk_media_info_get_app(url_info),
mk_media_info_get_stream(url_info),
mk_media_info_get_params(url_info));
}
/**
*
* @param sender MediaSource对象
*/
void API_CALL on_mk_media_no_reader(const mk_media_source sender) {
log_printf(LOG_LEV,
"%s/%s/%s/%s",
mk_media_source_get_schema(sender),
mk_media_source_get_vhost(sender),
mk_media_source_get_app(sender),
mk_media_source_get_stream(sender));
}
/**
* http api请求广播(GET/POST)
* @param parser http请求内容对象
* @param invoker invoker返回http回复
* @param consumed 1
* @param sender http客户端相关信息
*/
//测试url : http://127.0.0.1/api/test
void API_CALL on_mk_http_request(const mk_parser parser,
const mk_http_response_invoker invoker,
int *consumed,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,
"client info, local: %s:%d, peer: %s:%d\n"
"%s %s?%s %s\n"
"User-Agent: %s\n"
"%s",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
mk_parser_get_method(parser),
mk_parser_get_url(parser),
mk_parser_get_url_params(parser),
mk_parser_get_tail(parser),
mk_parser_get_header(parser, "User-Agent"),
2019-12-25 14:25:26 +08:00
mk_parser_get_content(parser,NULL));
2019-12-24 16:02:41 +08:00
const char *url = mk_parser_get_url(parser);
2019-12-24 16:47:24 +08:00
if(strcmp(url,"/api/test") != 0){
2019-12-25 09:39:24 +08:00
*consumed = 0;
2019-12-24 16:02:41 +08:00
return;
}
//只拦截api: /api/test
2019-12-25 09:39:24 +08:00
*consumed = 1;
2019-12-24 16:02:41 +08:00
const char *response_header[] = {"Content-Type","text/html",NULL};
const char *content =
"<html>"
"<head>"
"<title>hello world</title>"
"</head>"
"<body bgcolor=\"white\">"
"<center><h1>hello world</h1></center><hr>"
"<center>""ZLMediaKit-4.0</center>"
"</body>"
"</html>";
2019-12-25 14:25:26 +08:00
mk_http_body body = mk_http_body_from_string(content,0);
mk_http_response_invoker_do(invoker, "200 OK", response_header, body);
mk_http_body_release(body);
2019-12-24 16:02:41 +08:00
}
/**
* http文件服务器中,http访问文件或目录的广播,访http目录的权限
* @param parser http请求内容对象
* @param path
* @param is_dir path是否为文件夹
* @param invoker invoker返回本次访问文件的结果
* @param sender http客户端相关信息
*/
void API_CALL on_mk_http_access(const mk_parser parser,
const char *path,
int is_dir,
const mk_http_access_path_invoker invoker,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,
"client info, local: %s:%d, peer: %s:%d, path: %s ,is_dir: %d\n"
"%s %s?%s %s\n"
"User-Agent: %s\n"
"%s",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
path,(int)is_dir,
mk_parser_get_method(parser),
mk_parser_get_url(parser),
mk_parser_get_url_params(parser),
mk_parser_get_tail(parser),
mk_parser_get_header(parser,"User-Agent"),
2019-12-25 14:25:26 +08:00
mk_parser_get_content(parser,NULL));
2019-12-24 16:02:41 +08:00
//有访问权限,每次访问文件都需要鉴权
2019-12-25 09:39:24 +08:00
mk_http_access_path_invoker_do(invoker, NULL, NULL, 0);
2019-12-24 16:02:41 +08:00
}
/**
* http文件服务器中,http访问文件或目录前的广播,http url到文件路径的映射
* path参数app选择不同http根目录的目的
* @param parser http请求内容对象
* @param path ,
* @param sender http客户端相关信息
*/
void API_CALL on_mk_http_before_access(const mk_parser parser,
char *path,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,
"client info, local: %s:%d, peer: %s:%d, path: %s\n"
"%s %s?%s %s\n"
"User-Agent: %s\n"
"%s",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
path,
mk_parser_get_method(parser),
mk_parser_get_url(parser),
mk_parser_get_url_params(parser),
mk_parser_get_tail(parser),
mk_parser_get_header(parser, "User-Agent"),
2019-12-25 14:25:26 +08:00
mk_parser_get_content(parser,NULL));
2019-12-24 16:02:41 +08:00
//覆盖path的值可以重定向文件
}
/**
* rtsp流是否需要认证invoker并传入realm,realm
* @param url_info rtsp url相关信息
* @param invoker invoker返回是否需要rtsp专属认证
* @param sender rtsp客户端相关信息
*/
void API_CALL on_mk_rtsp_get_realm(const mk_media_info url_info,
const mk_rtsp_get_realm_invoker invoker,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,
"client info, local: %s:%d, peer: %s:%d\n"
"%s/%s/%s/%s, url params: %s",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
mk_media_info_get_schema(url_info),
mk_media_info_get_vhost(url_info),
mk_media_info_get_app(url_info),
mk_media_info_get_stream(url_info),
mk_media_info_get_params(url_info));
//rtsp播放默认鉴权
mk_rtsp_get_realm_invoker_do(invoker, "zlmediakit");
}
/**
2019-12-25 09:39:24 +08:00
* user_name为用户名must_no_encrypt如果为1(base64认证方式),
2019-12-24 16:02:41 +08:00
* invoker并输入对应类型的密码和密码类型invoker执行时会匹配密码
* @param url_info rtsp url相关信息
* @param realm rtsp认证realm
* @param user_name rtsp认证用户名
2019-12-25 09:39:24 +08:00
* @param must_no_encrypt 1(base64认证方式),
2019-12-24 16:02:41 +08:00
* @param invoker invoker返回rtsp专属认证的密码
* @param sender rtsp客户端信息
*/
void API_CALL on_mk_rtsp_auth(const mk_media_info url_info,
const char *realm,
const char *user_name,
int must_no_encrypt,
const mk_rtsp_auth_invoker invoker,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,
"client info, local: %s:%d, peer: %s:%d\n"
"%s/%s/%s/%s, url params: %s\n"
"realm: %s, user_name: %s, must_no_encrypt: %d",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
mk_media_info_get_schema(url_info),
mk_media_info_get_vhost(url_info),
mk_media_info_get_app(url_info),
mk_media_info_get_stream(url_info),
mk_media_info_get_params(url_info),
realm,user_name,(int)must_no_encrypt);
//rtsp播放用户名跟密码一致
2019-12-25 09:39:24 +08:00
mk_rtsp_auth_invoker_do(invoker,0,user_name);
2019-12-24 16:02:41 +08:00
}
/**
* mp4分片文件成功后广播
*/
void API_CALL on_mk_record_mp4(const mk_mp4_info mp4) {
log_printf(LOG_LEV,
"\nstart_time: %d\n"
"time_len: %d\n"
"file_size: %d\n"
"file_path: %s\n"
"file_name: %s\n"
"folder: %s\n"
"url: %s\n"
"vhost: %s\n"
"app: %s\n"
"stream: %s\n",
mk_mp4_info_get_start_time(mp4),
mk_mp4_info_get_time_len(mp4),
mk_mp4_info_get_file_size(mp4),
mk_mp4_info_get_file_path(mp4),
mk_mp4_info_get_file_name(mp4),
mk_mp4_info_get_folder(mp4),
mk_mp4_info_get_url(mp4),
mk_mp4_info_get_vhost(mp4),
mk_mp4_info_get_app(mp4),
mk_mp4_info_get_stream(mp4));
}
/**
* shell登录鉴权
*/
void API_CALL on_mk_shell_login(const char *user_name,
const char *passwd,
const mk_auth_invoker invoker,
const mk_sock_info sender) {
2019-12-24 16:02:41 +08:00
log_printf(LOG_LEV,"client info, local: %s:%d, peer: %s:%d\n"
"user_name: %s, passwd: %s",
mk_sock_info_local_ip(sender),
mk_sock_info_local_port(sender),
mk_sock_info_peer_ip(sender),
mk_sock_info_peer_port(sender),
2019-12-24 16:02:41 +08:00
user_name, passwd);
//允许登录shell
2019-12-25 09:39:24 +08:00
mk_auth_invoker_do(invoker, NULL);
2019-12-24 16:02:41 +08:00
}
/**
* rtsp/rtmp/http-flv会话后流量汇报事件广播
* @param url_info url相关信息
* @param total_bytes
* @param total_seconds tcp会话时长
* @param is_player
* @param peer_ip ip
* @param peer_port
2019-12-24 16:02:41 +08:00
*/
void API_CALL on_mk_flow_report(const mk_media_info url_info,
uint64_t total_bytes,
uint64_t total_seconds,
int is_player,
2020-04-23 22:04:59 +08:00
const mk_sock_info sender) {
2019-12-29 15:38:29 +08:00
log_printf(LOG_LEV,"%s/%s/%s/%s, url params: %s,"
"total_bytes: %d, total_seconds: %d, is_player: %d, peer_ip:%s, peer_port:%d",
2019-12-29 15:38:29 +08:00
mk_media_info_get_schema(url_info),
mk_media_info_get_vhost(url_info),
mk_media_info_get_app(url_info),
mk_media_info_get_stream(url_info),
mk_media_info_get_params(url_info),
2020-04-23 22:04:59 +08:00
(int)total_bytes, (int)total_seconds, (int)is_player,mk_sock_info_peer_ip(sender), (int)mk_sock_info_peer_port(sender));
2019-12-24 16:02:41 +08:00
}
2019-12-25 09:39:24 +08:00
static int flag = 1;
2019-12-25 20:13:49 +08:00
static void s_on_exit(int sig){
2019-12-25 09:39:24 +08:00
flag = 0;
}
2019-12-24 16:02:41 +08:00
int main(int argc, char *argv[]) {
2020-02-21 11:35:53 +08:00
char *ini_path = mk_util_get_exe_dir("c_api.ini");
char *ssl_path = mk_util_get_exe_dir("ssl.p12");
mk_config config = {
.ini = ini_path,
.ini_is_path = 1,
.log_level = 0,
2020-04-22 09:55:24 +08:00
.log_file_path = NULL,
.log_file_days = 0,
.ssl = ssl_path,
.ssl_is_path = 1,
.ssl_pwd = NULL,
.thread_num = 0
};
mk_env_init(&config);
free(ini_path);
free(ssl_path);
2019-12-25 09:39:24 +08:00
mk_http_server_start(80, 0);
mk_http_server_start(443, 1);
2019-12-25 09:39:24 +08:00
mk_rtsp_server_start(554, 0);
mk_rtmp_server_start(1935, 0);
2019-12-24 16:09:09 +08:00
mk_shell_server_start(9000);
2019-12-23 14:01:00 +08:00
mk_rtp_server_start(10000);
2019-12-24 16:02:41 +08:00
mk_events events = {
.on_mk_media_changed = on_mk_media_changed,
.on_mk_media_publish = on_mk_media_publish,
.on_mk_media_play = on_mk_media_play,
.on_mk_media_not_found = on_mk_media_not_found,
.on_mk_media_no_reader = on_mk_media_no_reader,
.on_mk_http_request = on_mk_http_request,
.on_mk_http_access = on_mk_http_access,
.on_mk_http_before_access = on_mk_http_before_access,
.on_mk_rtsp_get_realm = on_mk_rtsp_get_realm,
.on_mk_rtsp_auth = on_mk_rtsp_auth,
.on_mk_record_mp4 = on_mk_record_mp4,
.on_mk_shell_login = on_mk_shell_login,
.on_mk_flow_report = on_mk_flow_report
};
mk_events_listen(&events);
2019-12-25 20:13:49 +08:00
signal(SIGINT, s_on_exit );// 设置退出信号
2019-12-24 16:02:41 +08:00
while (flag) {
2019-12-23 14:31:02 +08:00
#ifdef _WIN32
Sleep(1000);
#else
2019-12-23 14:01:00 +08:00
sleep(1);
2019-12-23 14:31:02 +08:00
#endif
2019-12-23 14:01:00 +08:00
}
2019-12-23 14:20:49 +08:00
mk_stop_all_server();
return 0;
2019-12-23 14:01:00 +08:00
}