2019-12-23 14:31:02 +08:00
|
|
|
|
/*
|
2020-04-04 20:30:09 +08:00
|
|
|
|
* Copyright (c) 2016 The ZLMediaKit project authors. All Rights Reserved.
|
2019-12-23 14:31:02 +08:00
|
|
|
|
*
|
2021-01-17 18:31:50 +08:00
|
|
|
|
* This file is part of ZLMediaKit(https://github.com/xia-chu/ZLMediaKit).
|
2019-12-23 14:31:02 +08:00
|
|
|
|
*
|
2020-04-04 20:30:09 +08:00
|
|
|
|
* Use of this source code is governed by MIT license that can be found in the
|
|
|
|
|
* LICENSE file in the root of the source tree. All contributing project authors
|
|
|
|
|
* may be found in the AUTHORS file in the root of the source tree.
|
2019-12-23 14:31:02 +08:00
|
|
|
|
*/
|
2019-12-23 14:01:00 +08:00
|
|
|
|
|
2019-12-25 09:39:24 +08:00
|
|
|
|
#include <string.h>
|
2019-12-27 10:10:31 +08:00
|
|
|
|
#include "mk_mediakit.h"
|
2019-12-24 16:02:41 +08:00
|
|
|
|
#define LOG_LEV 4
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 注册或反注册MediaSource事件广播
|
|
|
|
|
* @param regist 注册为1,注销为0
|
|
|
|
|
* @param sender 该MediaSource对象
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_media_changed(int regist,
|
|
|
|
|
const mk_media_source sender) {
|
|
|
|
|
log_printf(LOG_LEV,"%d %s/%s/%s/%s",(int)regist,
|
|
|
|
|
mk_media_source_get_schema(sender),
|
|
|
|
|
mk_media_source_get_vhost(sender),
|
|
|
|
|
mk_media_source_get_app(sender),
|
|
|
|
|
mk_media_source_get_stream(sender));
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 收到rtsp/rtmp推流事件广播,通过该事件控制推流鉴权
|
|
|
|
|
* @see mk_publish_auth_invoker_do
|
|
|
|
|
* @param url_info 推流url相关信息
|
|
|
|
|
* @param invoker 执行invoker返回鉴权结果
|
|
|
|
|
* @param sender 该tcp客户端相关信息
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_media_publish(const mk_media_info url_info,
|
|
|
|
|
const mk_publish_auth_invoker invoker,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2020-04-24 14:06:28 +08:00
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"client info, local: %s:%d, peer: %s:%d\n"
|
|
|
|
|
"%s/%s/%s/%s, url params: %s",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender,ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender,ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
mk_media_info_get_schema(url_info),
|
|
|
|
|
mk_media_info_get_vhost(url_info),
|
|
|
|
|
mk_media_info_get_app(url_info),
|
|
|
|
|
mk_media_info_get_stream(url_info),
|
|
|
|
|
mk_media_info_get_params(url_info));
|
|
|
|
|
|
2020-09-12 19:09:56 +08:00
|
|
|
|
//允许推流,并且允许转hls/mp4
|
|
|
|
|
mk_publish_auth_invoker_do(invoker, NULL, 1, 1);
|
2019-12-24 16:02:41 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 播放rtsp/rtmp/http-flv/hls事件广播,通过该事件控制播放鉴权
|
|
|
|
|
* @see mk_auth_invoker_do
|
|
|
|
|
* @param url_info 播放url相关信息
|
|
|
|
|
* @param invoker 执行invoker返回鉴权结果
|
|
|
|
|
* @param sender 播放客户端相关信息
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_media_play(const mk_media_info url_info,
|
|
|
|
|
const mk_auth_invoker invoker,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2019-12-24 16:02:41 +08:00
|
|
|
|
|
2020-04-24 14:06:28 +08:00
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"client info, local: %s:%d, peer: %s:%d\n"
|
|
|
|
|
"%s/%s/%s/%s, url params: %s",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender,ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender,ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
mk_media_info_get_schema(url_info),
|
|
|
|
|
mk_media_info_get_vhost(url_info),
|
|
|
|
|
mk_media_info_get_app(url_info),
|
|
|
|
|
mk_media_info_get_stream(url_info),
|
|
|
|
|
mk_media_info_get_params(url_info));
|
|
|
|
|
|
|
|
|
|
//允许播放
|
2019-12-25 09:39:24 +08:00
|
|
|
|
mk_auth_invoker_do(invoker, NULL);
|
2019-12-24 16:02:41 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 未找到流后会广播该事件,请在监听该事件后去拉流或其他方式产生流,这样就能按需拉流了
|
|
|
|
|
* @param url_info 播放url相关信息
|
|
|
|
|
* @param sender 播放客户端相关信息
|
2022-09-09 10:55:35 +08:00
|
|
|
|
* @return 1 直接关闭
|
|
|
|
|
* 0 等待流注册
|
2019-12-24 16:02:41 +08:00
|
|
|
|
*/
|
2022-09-09 10:55:35 +08:00
|
|
|
|
int API_CALL on_mk_media_not_found(const mk_media_info url_info,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2020-04-24 14:06:28 +08:00
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"client info, local: %s:%d, peer: %s:%d\n"
|
|
|
|
|
"%s/%s/%s/%s, url params: %s",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender,ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender,ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
mk_media_info_get_schema(url_info),
|
|
|
|
|
mk_media_info_get_vhost(url_info),
|
|
|
|
|
mk_media_info_get_app(url_info),
|
|
|
|
|
mk_media_info_get_stream(url_info),
|
|
|
|
|
mk_media_info_get_params(url_info));
|
2022-09-09 10:55:35 +08:00
|
|
|
|
return 0;
|
2019-12-24 16:02:41 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 某个流无人消费时触发,目的为了实现无人观看时主动断开拉流等业务逻辑
|
|
|
|
|
* @param sender 该MediaSource对象
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_media_no_reader(const mk_media_source sender) {
|
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"%s/%s/%s/%s",
|
|
|
|
|
mk_media_source_get_schema(sender),
|
|
|
|
|
mk_media_source_get_vhost(sender),
|
|
|
|
|
mk_media_source_get_app(sender),
|
|
|
|
|
mk_media_source_get_stream(sender));
|
|
|
|
|
}
|
|
|
|
|
|
2022-10-06 12:33:48 +08:00
|
|
|
|
//按照json转义规则转义webrtc answer sdp
|
|
|
|
|
static char *escape_string(const char *ptr){
|
|
|
|
|
char *escaped = malloc(2 * strlen(ptr));
|
|
|
|
|
char *ptr_escaped = escaped;
|
|
|
|
|
while (1) {
|
|
|
|
|
switch (*ptr) {
|
|
|
|
|
case '\r': {
|
|
|
|
|
*(ptr_escaped++) = '\\';
|
|
|
|
|
*(ptr_escaped++) = 'r';
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
case '\n': {
|
|
|
|
|
*(ptr_escaped++) = '\\';
|
|
|
|
|
*(ptr_escaped++) = 'n';
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
case '\t': {
|
|
|
|
|
*(ptr_escaped++) = '\\';
|
|
|
|
|
*(ptr_escaped++) = 't';
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
default: {
|
|
|
|
|
*(ptr_escaped++) = *ptr;
|
|
|
|
|
if (!*ptr) {
|
|
|
|
|
return escaped;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
++ptr;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void on_mk_webrtc_get_answer_sdp_func(void *user_data, const char *answer, const char *err) {
|
|
|
|
|
const char *response_header[] = { "Content-Type", "application/json", "Access-Control-Allow-Origin", "*" , NULL};
|
|
|
|
|
if (answer) {
|
|
|
|
|
answer = escape_string(answer);
|
|
|
|
|
}
|
|
|
|
|
size_t len = answer ? 2 * strlen(answer) : 1024;
|
|
|
|
|
char *response_content = (char *)malloc(len);
|
|
|
|
|
|
|
|
|
|
if (answer) {
|
|
|
|
|
snprintf(response_content, len,
|
|
|
|
|
"{"
|
|
|
|
|
"\"sdp\":\"%s\","
|
|
|
|
|
"\"type\":\"answer\","
|
|
|
|
|
"\"code\":0"
|
|
|
|
|
"}",
|
|
|
|
|
answer);
|
|
|
|
|
} else {
|
|
|
|
|
snprintf(response_content, len,
|
|
|
|
|
"{"
|
|
|
|
|
"\"msg\":\"%s\","
|
|
|
|
|
"\"code\":-1"
|
|
|
|
|
"}",
|
|
|
|
|
err);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
mk_http_response_invoker_do_string(user_data, 200, response_header, response_content);
|
|
|
|
|
mk_http_response_invoker_clone_release(user_data);
|
|
|
|
|
free(response_content);
|
|
|
|
|
if (answer) {
|
|
|
|
|
free(answer);
|
|
|
|
|
}
|
|
|
|
|
}
|
2019-12-24 16:02:41 +08:00
|
|
|
|
/**
|
|
|
|
|
* 收到http api请求广播(包括GET/POST)
|
|
|
|
|
* @param parser http请求内容对象
|
|
|
|
|
* @param invoker 执行该invoker返回http回复
|
|
|
|
|
* @param consumed 置1则说明我们要处理该事件
|
|
|
|
|
* @param sender http客户端相关信息
|
|
|
|
|
*/
|
|
|
|
|
//测试url : http://127.0.0.1/api/test
|
|
|
|
|
void API_CALL on_mk_http_request(const mk_parser parser,
|
|
|
|
|
const mk_http_response_invoker invoker,
|
|
|
|
|
int *consumed,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2019-12-24 16:02:41 +08:00
|
|
|
|
|
2020-04-24 14:06:28 +08:00
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"client info, local: %s:%d, peer: %s:%d\n"
|
|
|
|
|
"%s %s?%s %s\n"
|
|
|
|
|
"User-Agent: %s\n"
|
|
|
|
|
"%s",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender,ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender,ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
mk_parser_get_method(parser),
|
|
|
|
|
mk_parser_get_url(parser),
|
|
|
|
|
mk_parser_get_url_params(parser),
|
|
|
|
|
mk_parser_get_tail(parser),
|
|
|
|
|
mk_parser_get_header(parser, "User-Agent"),
|
2019-12-25 14:25:26 +08:00
|
|
|
|
mk_parser_get_content(parser,NULL));
|
2019-12-24 16:02:41 +08:00
|
|
|
|
|
|
|
|
|
const char *url = mk_parser_get_url(parser);
|
2022-04-16 15:57:02 +08:00
|
|
|
|
*consumed = 1;
|
|
|
|
|
|
|
|
|
|
//拦截api: /api/test
|
2022-10-06 12:33:48 +08:00
|
|
|
|
if (strcmp(url, "/api/test") == 0) {
|
2022-04-16 15:57:02 +08:00
|
|
|
|
const char *response_header[] = { "Content-Type", "text/html", NULL };
|
|
|
|
|
const char *content = "<html>"
|
|
|
|
|
"<head>"
|
|
|
|
|
"<title>hello world</title>"
|
|
|
|
|
"</head>"
|
|
|
|
|
"<body bgcolor=\"white\">"
|
|
|
|
|
"<center><h1>hello world</h1></center><hr>"
|
|
|
|
|
"<center>"
|
|
|
|
|
"ZLMediaKit-4.0</center>"
|
|
|
|
|
"</body>"
|
|
|
|
|
"</html>";
|
|
|
|
|
mk_http_body body = mk_http_body_from_string(content, 0);
|
|
|
|
|
mk_http_response_invoker_do(invoker, 200, response_header, body);
|
|
|
|
|
mk_http_body_release(body);
|
2022-10-06 12:33:48 +08:00
|
|
|
|
} else if (strcmp(url, "/index/api/webrtc") == 0) {
|
|
|
|
|
//拦截api: /index/api/webrtc
|
|
|
|
|
char rtc_url[1024];
|
|
|
|
|
snprintf(rtc_url, sizeof(rtc_url), "rtc://%s/%s/%s?%s", mk_parser_get_header(parser, "Host"),
|
|
|
|
|
mk_parser_get_url_param(parser, "app"), mk_parser_get_url_param(parser, "stream"),
|
|
|
|
|
mk_parser_get_url_params(parser));
|
|
|
|
|
|
|
|
|
|
mk_webrtc_get_answer_sdp(mk_http_response_invoker_clone(invoker), on_mk_webrtc_get_answer_sdp_func,
|
|
|
|
|
mk_parser_get_url_param(parser, "type"), mk_parser_get_content(parser, NULL), rtc_url);
|
|
|
|
|
} else {
|
2019-12-25 09:39:24 +08:00
|
|
|
|
*consumed = 0;
|
2019-12-24 16:02:41 +08:00
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 在http文件服务器中,收到http访问文件或目录的广播,通过该事件控制访问http目录的权限
|
|
|
|
|
* @param parser http请求内容对象
|
|
|
|
|
* @param path 文件绝对路径
|
|
|
|
|
* @param is_dir path是否为文件夹
|
|
|
|
|
* @param invoker 执行invoker返回本次访问文件的结果
|
|
|
|
|
* @param sender http客户端相关信息
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_http_access(const mk_parser parser,
|
|
|
|
|
const char *path,
|
|
|
|
|
int is_dir,
|
|
|
|
|
const mk_http_access_path_invoker invoker,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2019-12-24 16:02:41 +08:00
|
|
|
|
|
2020-04-24 14:06:28 +08:00
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"client info, local: %s:%d, peer: %s:%d, path: %s ,is_dir: %d\n"
|
|
|
|
|
"%s %s?%s %s\n"
|
|
|
|
|
"User-Agent: %s\n"
|
|
|
|
|
"%s",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender, ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender, ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
path,(int)is_dir,
|
|
|
|
|
mk_parser_get_method(parser),
|
|
|
|
|
mk_parser_get_url(parser),
|
|
|
|
|
mk_parser_get_url_params(parser),
|
|
|
|
|
mk_parser_get_tail(parser),
|
|
|
|
|
mk_parser_get_header(parser,"User-Agent"),
|
2019-12-25 14:25:26 +08:00
|
|
|
|
mk_parser_get_content(parser,NULL));
|
2019-12-24 16:02:41 +08:00
|
|
|
|
|
|
|
|
|
//有访问权限,每次访问文件都需要鉴权
|
2019-12-25 09:39:24 +08:00
|
|
|
|
mk_http_access_path_invoker_do(invoker, NULL, NULL, 0);
|
2019-12-24 16:02:41 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 在http文件服务器中,收到http访问文件或目录前的广播,通过该事件可以控制http url到文件路径的映射
|
|
|
|
|
* 在该事件中通过自行覆盖path参数,可以做到譬如根据虚拟主机或者app选择不同http根目录的目的
|
|
|
|
|
* @param parser http请求内容对象
|
|
|
|
|
* @param path 文件绝对路径,覆盖之可以重定向到其他文件
|
|
|
|
|
* @param sender http客户端相关信息
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_http_before_access(const mk_parser parser,
|
|
|
|
|
char *path,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2020-04-24 14:06:28 +08:00
|
|
|
|
|
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"client info, local: %s:%d, peer: %s:%d, path: %s\n"
|
|
|
|
|
"%s %s?%s %s\n"
|
|
|
|
|
"User-Agent: %s\n"
|
|
|
|
|
"%s",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender,ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender,ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
path,
|
|
|
|
|
mk_parser_get_method(parser),
|
|
|
|
|
mk_parser_get_url(parser),
|
|
|
|
|
mk_parser_get_url_params(parser),
|
|
|
|
|
mk_parser_get_tail(parser),
|
|
|
|
|
mk_parser_get_header(parser, "User-Agent"),
|
2019-12-25 14:25:26 +08:00
|
|
|
|
mk_parser_get_content(parser,NULL));
|
2019-12-24 16:02:41 +08:00
|
|
|
|
//覆盖path的值可以重定向文件
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 该rtsp流是否需要认证?是的话调用invoker并传入realm,否则传入空的realm
|
|
|
|
|
* @param url_info 请求rtsp url相关信息
|
|
|
|
|
* @param invoker 执行invoker返回是否需要rtsp专属认证
|
|
|
|
|
* @param sender rtsp客户端相关信息
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_rtsp_get_realm(const mk_media_info url_info,
|
|
|
|
|
const mk_rtsp_get_realm_invoker invoker,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2020-04-24 14:06:28 +08:00
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"client info, local: %s:%d, peer: %s:%d\n"
|
|
|
|
|
"%s/%s/%s/%s, url params: %s",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender,ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender,ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
mk_media_info_get_schema(url_info),
|
|
|
|
|
mk_media_info_get_vhost(url_info),
|
|
|
|
|
mk_media_info_get_app(url_info),
|
|
|
|
|
mk_media_info_get_stream(url_info),
|
|
|
|
|
mk_media_info_get_params(url_info));
|
|
|
|
|
|
|
|
|
|
//rtsp播放默认鉴权
|
|
|
|
|
mk_rtsp_get_realm_invoker_do(invoker, "zlmediakit");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
2019-12-25 09:39:24 +08:00
|
|
|
|
* 请求认证用户密码事件,user_name为用户名,must_no_encrypt如果为1,则必须提供明文密码(因为此时是base64认证方式),否则会导致认证失败
|
2019-12-24 16:02:41 +08:00
|
|
|
|
* 获取到密码后请调用invoker并输入对应类型的密码和密码类型,invoker执行时会匹配密码
|
|
|
|
|
* @param url_info 请求rtsp url相关信息
|
|
|
|
|
* @param realm rtsp认证realm
|
|
|
|
|
* @param user_name rtsp认证用户名
|
2019-12-25 09:39:24 +08:00
|
|
|
|
* @param must_no_encrypt 如果为1,则必须提供明文密码(因为此时是base64认证方式),否则会导致认证失败
|
2019-12-24 16:02:41 +08:00
|
|
|
|
* @param invoker 执行invoker返回rtsp专属认证的密码
|
|
|
|
|
* @param sender rtsp客户端信息
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_rtsp_auth(const mk_media_info url_info,
|
|
|
|
|
const char *realm,
|
|
|
|
|
const char *user_name,
|
|
|
|
|
int must_no_encrypt,
|
|
|
|
|
const mk_rtsp_auth_invoker invoker,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2019-12-24 16:02:41 +08:00
|
|
|
|
|
2020-04-24 14:06:28 +08:00
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"client info, local: %s:%d, peer: %s:%d\n"
|
|
|
|
|
"%s/%s/%s/%s, url params: %s\n"
|
|
|
|
|
"realm: %s, user_name: %s, must_no_encrypt: %d",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender,ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender,ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
mk_media_info_get_schema(url_info),
|
|
|
|
|
mk_media_info_get_vhost(url_info),
|
|
|
|
|
mk_media_info_get_app(url_info),
|
|
|
|
|
mk_media_info_get_stream(url_info),
|
|
|
|
|
mk_media_info_get_params(url_info),
|
|
|
|
|
realm,user_name,(int)must_no_encrypt);
|
|
|
|
|
|
|
|
|
|
//rtsp播放用户名跟密码一致
|
2019-12-25 09:39:24 +08:00
|
|
|
|
mk_rtsp_auth_invoker_do(invoker,0,user_name);
|
2019-12-24 16:02:41 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 录制mp4分片文件成功后广播
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_record_mp4(const mk_mp4_info mp4) {
|
|
|
|
|
log_printf(LOG_LEV,
|
|
|
|
|
"\nstart_time: %d\n"
|
|
|
|
|
"time_len: %d\n"
|
|
|
|
|
"file_size: %d\n"
|
|
|
|
|
"file_path: %s\n"
|
|
|
|
|
"file_name: %s\n"
|
|
|
|
|
"folder: %s\n"
|
|
|
|
|
"url: %s\n"
|
|
|
|
|
"vhost: %s\n"
|
|
|
|
|
"app: %s\n"
|
|
|
|
|
"stream: %s\n",
|
|
|
|
|
mk_mp4_info_get_start_time(mp4),
|
|
|
|
|
mk_mp4_info_get_time_len(mp4),
|
|
|
|
|
mk_mp4_info_get_file_size(mp4),
|
|
|
|
|
mk_mp4_info_get_file_path(mp4),
|
|
|
|
|
mk_mp4_info_get_file_name(mp4),
|
|
|
|
|
mk_mp4_info_get_folder(mp4),
|
|
|
|
|
mk_mp4_info_get_url(mp4),
|
|
|
|
|
mk_mp4_info_get_vhost(mp4),
|
|
|
|
|
mk_mp4_info_get_app(mp4),
|
|
|
|
|
mk_mp4_info_get_stream(mp4));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* shell登录鉴权
|
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_shell_login(const char *user_name,
|
|
|
|
|
const char *passwd,
|
|
|
|
|
const mk_auth_invoker invoker,
|
2020-04-23 21:38:44 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2020-04-24 14:06:28 +08:00
|
|
|
|
|
|
|
|
|
char ip[64];
|
2019-12-24 16:02:41 +08:00
|
|
|
|
log_printf(LOG_LEV,"client info, local: %s:%d, peer: %s:%d\n"
|
|
|
|
|
"user_name: %s, passwd: %s",
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_local_ip(sender,ip),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_local_port(sender),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
mk_sock_info_peer_ip(sender,ip + 32),
|
2020-04-23 21:38:44 +08:00
|
|
|
|
mk_sock_info_peer_port(sender),
|
2019-12-24 16:02:41 +08:00
|
|
|
|
user_name, passwd);
|
|
|
|
|
//允许登录shell
|
2019-12-25 09:39:24 +08:00
|
|
|
|
mk_auth_invoker_do(invoker, NULL);
|
2019-12-24 16:02:41 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* 停止rtsp/rtmp/http-flv会话后流量汇报事件广播
|
|
|
|
|
* @param url_info 播放url相关信息
|
|
|
|
|
* @param total_bytes 耗费上下行总流量,单位字节数
|
|
|
|
|
* @param total_seconds 本次tcp会话时长,单位秒
|
|
|
|
|
* @param is_player 客户端是否为播放器
|
2020-02-13 11:33:59 +08:00
|
|
|
|
* @param peer_ip 客户端ip
|
|
|
|
|
* @param peer_port 客户端端口号
|
2019-12-24 16:02:41 +08:00
|
|
|
|
*/
|
|
|
|
|
void API_CALL on_mk_flow_report(const mk_media_info url_info,
|
2021-01-17 20:15:08 +08:00
|
|
|
|
size_t total_bytes,
|
|
|
|
|
size_t total_seconds,
|
2020-02-13 11:33:59 +08:00
|
|
|
|
int is_player,
|
2020-04-23 22:04:59 +08:00
|
|
|
|
const mk_sock_info sender) {
|
2020-04-24 14:06:28 +08:00
|
|
|
|
char ip[64];
|
2019-12-29 15:38:29 +08:00
|
|
|
|
log_printf(LOG_LEV,"%s/%s/%s/%s, url params: %s,"
|
2020-02-13 11:33:59 +08:00
|
|
|
|
"total_bytes: %d, total_seconds: %d, is_player: %d, peer_ip:%s, peer_port:%d",
|
2019-12-29 15:38:29 +08:00
|
|
|
|
mk_media_info_get_schema(url_info),
|
|
|
|
|
mk_media_info_get_vhost(url_info),
|
|
|
|
|
mk_media_info_get_app(url_info),
|
|
|
|
|
mk_media_info_get_stream(url_info),
|
|
|
|
|
mk_media_info_get_params(url_info),
|
2020-04-24 14:06:28 +08:00
|
|
|
|
(int)total_bytes,
|
|
|
|
|
(int)total_seconds,
|
|
|
|
|
(int)is_player,
|
|
|
|
|
mk_sock_info_peer_ip(sender,ip),
|
|
|
|
|
(int)mk_sock_info_peer_port(sender));
|
2019-12-24 16:02:41 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int main(int argc, char *argv[]) {
|
2020-02-21 11:35:53 +08:00
|
|
|
|
char *ini_path = mk_util_get_exe_dir("c_api.ini");
|
|
|
|
|
char *ssl_path = mk_util_get_exe_dir("ssl.p12");
|
2019-12-27 10:10:31 +08:00
|
|
|
|
|
|
|
|
|
mk_config config = {
|
|
|
|
|
.ini = ini_path,
|
|
|
|
|
.ini_is_path = 1,
|
|
|
|
|
.log_level = 0,
|
2021-08-30 20:43:03 +08:00
|
|
|
|
.log_mask = LOG_CONSOLE,
|
2020-04-22 09:55:24 +08:00
|
|
|
|
.log_file_path = NULL,
|
|
|
|
|
.log_file_days = 0,
|
2019-12-27 10:10:31 +08:00
|
|
|
|
.ssl = ssl_path,
|
|
|
|
|
.ssl_is_path = 1,
|
|
|
|
|
.ssl_pwd = NULL,
|
|
|
|
|
.thread_num = 0
|
|
|
|
|
};
|
|
|
|
|
mk_env_init(&config);
|
|
|
|
|
free(ini_path);
|
|
|
|
|
free(ssl_path);
|
2019-12-25 09:39:24 +08:00
|
|
|
|
|
|
|
|
|
mk_http_server_start(80, 0);
|
2019-12-27 10:10:31 +08:00
|
|
|
|
mk_http_server_start(443, 1);
|
2019-12-25 09:39:24 +08:00
|
|
|
|
mk_rtsp_server_start(554, 0);
|
|
|
|
|
mk_rtmp_server_start(1935, 0);
|
2019-12-24 16:09:09 +08:00
|
|
|
|
mk_shell_server_start(9000);
|
2019-12-23 14:01:00 +08:00
|
|
|
|
mk_rtp_server_start(10000);
|
2022-04-16 15:57:02 +08:00
|
|
|
|
mk_rtc_server_start(8000);
|
2022-09-22 21:18:34 +08:00
|
|
|
|
mk_srt_server_start(9000);
|
2019-12-24 16:02:41 +08:00
|
|
|
|
|
|
|
|
|
mk_events events = {
|
|
|
|
|
.on_mk_media_changed = on_mk_media_changed,
|
|
|
|
|
.on_mk_media_publish = on_mk_media_publish,
|
|
|
|
|
.on_mk_media_play = on_mk_media_play,
|
|
|
|
|
.on_mk_media_not_found = on_mk_media_not_found,
|
|
|
|
|
.on_mk_media_no_reader = on_mk_media_no_reader,
|
|
|
|
|
.on_mk_http_request = on_mk_http_request,
|
|
|
|
|
.on_mk_http_access = on_mk_http_access,
|
|
|
|
|
.on_mk_http_before_access = on_mk_http_before_access,
|
|
|
|
|
.on_mk_rtsp_get_realm = on_mk_rtsp_get_realm,
|
|
|
|
|
.on_mk_rtsp_auth = on_mk_rtsp_auth,
|
|
|
|
|
.on_mk_record_mp4 = on_mk_record_mp4,
|
|
|
|
|
.on_mk_shell_login = on_mk_shell_login,
|
|
|
|
|
.on_mk_flow_report = on_mk_flow_report
|
|
|
|
|
};
|
|
|
|
|
mk_events_listen(&events);
|
2021-10-19 10:11:23 +08:00
|
|
|
|
log_info("media server %s", "stared!");
|
|
|
|
|
|
2022-05-25 15:38:32 +08:00
|
|
|
|
log_info("enter any key to exit");
|
|
|
|
|
getchar();
|
|
|
|
|
|
2019-12-23 14:20:49 +08:00
|
|
|
|
mk_stop_all_server();
|
|
|
|
|
return 0;
|
2019-12-23 14:01:00 +08:00
|
|
|
|
}
|