2019-12-05 19:20:12 +08:00
|
|
|
|
/*
|
2023-12-09 16:23:51 +08:00
|
|
|
|
* Copyright (c) 2016-present The ZLMediaKit project authors. All Rights Reserved.
|
2019-12-06 11:54:10 +08:00
|
|
|
|
*
|
2023-12-09 16:23:51 +08:00
|
|
|
|
* This file is part of ZLMediaKit(https://github.com/ZLMediaKit/ZLMediaKit).
|
2019-12-06 11:54:10 +08:00
|
|
|
|
*
|
2023-12-09 16:23:51 +08:00
|
|
|
|
* Use of this source code is governed by MIT-like license that can be found in the
|
2020-04-04 20:30:09 +08:00
|
|
|
|
* LICENSE file in the root of the source tree. All contributing project authors
|
|
|
|
|
|
* may be found in the AUTHORS file in the root of the source tree.
|
2019-12-06 11:54:10 +08:00
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(ENABLE_RTPPROXY)
|
2019-12-05 19:20:12 +08:00
|
|
|
|
#include "RtpSession.h"
|
|
|
|
|
|
#include "RtpSelector.h"
|
2020-07-07 10:01:12 +08:00
|
|
|
|
#include "Network/TcpServer.h"
|
2023-02-28 22:23:30 +08:00
|
|
|
|
#include "Rtsp/Rtsp.h"
|
2021-04-22 22:02:21 +08:00
|
|
|
|
#include "Rtsp/RtpReceiver.h"
|
2022-11-29 11:07:13 +08:00
|
|
|
|
#include "Common/config.h"
|
2022-02-02 20:34:50 +08:00
|
|
|
|
|
|
|
|
|
|
using namespace std;
|
|
|
|
|
|
using namespace toolkit;
|
|
|
|
|
|
|
2019-12-06 11:54:10 +08:00
|
|
|
|
namespace mediakit{
|
2019-12-05 19:20:12 +08:00
|
|
|
|
|
2020-07-07 10:01:12 +08:00
|
|
|
|
const string RtpSession::kStreamID = "stream_id";
|
2022-04-16 15:12:49 +08:00
|
|
|
|
const string RtpSession::kSSRC = "ssrc";
|
2024-03-05 17:06:31 +08:00
|
|
|
|
const string RtpSession::kOnlyTrack = "only_track";
|
2024-03-05 10:42:22 +08:00
|
|
|
|
const string RtpSession::kUdpRecvBuffer = "udp_recv_socket_buffer";
|
2020-07-07 10:01:12 +08:00
|
|
|
|
|
2021-06-08 11:29:32 +08:00
|
|
|
|
void RtpSession::attachServer(const Server &server) {
|
2023-01-07 22:36:30 +08:00
|
|
|
|
setParams(const_cast<Server &>(server));
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void RtpSession::setParams(mINI &ini) {
|
|
|
|
|
|
_stream_id = ini[kStreamID];
|
|
|
|
|
|
_ssrc = ini[kSSRC];
|
2024-03-05 17:06:31 +08:00
|
|
|
|
_only_track = ini[kOnlyTrack];
|
2024-03-05 10:42:22 +08:00
|
|
|
|
int udp_socket_buffer = ini[kUdpRecvBuffer];
|
|
|
|
|
|
if (_is_udp) {
|
|
|
|
|
|
// 设置udp socket读缓存
|
|
|
|
|
|
SockUtil::setRecvBuf(getSock()->rawFD(),
|
|
|
|
|
|
(udp_socket_buffer > 0) ? udp_socket_buffer : (4 * 1024 * 1024));
|
|
|
|
|
|
}
|
2020-07-07 10:01:12 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
2023-12-09 16:23:51 +08:00
|
|
|
|
RtpSession::RtpSession(const Socket::Ptr &sock)
|
|
|
|
|
|
: Session(sock) {
|
2021-06-08 14:03:25 +08:00
|
|
|
|
socklen_t addr_len = sizeof(_addr);
|
2022-05-08 00:26:01 +08:00
|
|
|
|
getpeername(sock->rawFD(), (struct sockaddr *)&_addr, &addr_len);
|
2022-11-18 16:42:40 +08:00
|
|
|
|
_is_udp = sock->sockType() == SockNum::Sock_UDP;
|
2019-12-05 19:20:12 +08:00
|
|
|
|
}
|
2021-06-08 14:03:25 +08:00
|
|
|
|
|
2023-12-15 16:46:43 +08:00
|
|
|
|
RtpSession::~RtpSession() = default;
|
2019-12-05 19:20:12 +08:00
|
|
|
|
|
|
|
|
|
|
void RtpSession::onRecv(const Buffer::Ptr &data) {
|
2021-11-19 15:26:33 +08:00
|
|
|
|
if (_is_udp) {
|
|
|
|
|
|
onRtpPacket(data->data(), data->size());
|
|
|
|
|
|
return;
|
2019-12-05 19:20:12 +08:00
|
|
|
|
}
|
2021-11-19 15:26:33 +08:00
|
|
|
|
RtpSplitter::input(data->data(), data->size());
|
2019-12-05 19:20:12 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void RtpSession::onError(const SockException &err) {
|
2023-04-23 00:10:18 +08:00
|
|
|
|
WarnP(this) << _stream_id << " " << err;
|
2023-12-15 16:46:43 +08:00
|
|
|
|
if (_process) {
|
|
|
|
|
|
RtpSelector::Instance().delProcess(_stream_id, _process.get());
|
2024-01-17 18:11:56 +08:00
|
|
|
|
_process = nullptr;
|
2023-12-15 16:46:43 +08:00
|
|
|
|
}
|
2019-12-05 19:20:12 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void RtpSession::onManager() {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
if (_process && !_process->alive()) {
|
2019-12-05 19:20:12 +08:00
|
|
|
|
shutdown(SockException(Err_timeout, "receive rtp timeout"));
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2023-12-09 16:23:51 +08:00
|
|
|
|
if (!_process && _ticker.createdTime() > 10 * 1000) {
|
2019-12-05 19:20:12 +08:00
|
|
|
|
shutdown(SockException(Err_timeout, "illegal connection"));
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-01-17 18:31:50 +08:00
|
|
|
|
void RtpSession::onRtpPacket(const char *data, size_t len) {
|
2023-02-28 22:43:57 +08:00
|
|
|
|
if (_delay_close) {
|
|
|
|
|
|
// 正在延时关闭中,忽略所有数据
|
|
|
|
|
|
return;
|
|
|
|
|
|
}
|
|
|
|
|
|
if (!isRtp(data, len)) {
|
|
|
|
|
|
// 忽略非rtp数据
|
|
|
|
|
|
WarnP(this) << "Not rtp packet";
|
|
|
|
|
|
return;
|
|
|
|
|
|
}
|
2021-06-08 14:03:25 +08:00
|
|
|
|
if (!_is_udp) {
|
|
|
|
|
|
if (_search_rtp) {
|
|
|
|
|
|
//搜索上下文期间,数据丢弃
|
|
|
|
|
|
if (_search_rtp_finished) {
|
|
|
|
|
|
//下个包开始就是正确的rtp包了
|
|
|
|
|
|
_search_rtp_finished = false;
|
|
|
|
|
|
_search_rtp = false;
|
|
|
|
|
|
}
|
|
|
|
|
|
return;
|
|
|
|
|
|
}
|
2021-08-11 15:48:15 +08:00
|
|
|
|
GET_CONFIG(uint32_t, rtpMaxSize, Rtp::kRtpMaxSize);
|
|
|
|
|
|
if (len > 1024 * rtpMaxSize) {
|
2021-06-08 14:03:25 +08:00
|
|
|
|
_search_rtp = true;
|
|
|
|
|
|
WarnL << "rtp包长度异常(" << len << "),发送端可能缓存溢出并覆盖,开始搜索ssrc以便恢复上下文";
|
|
|
|
|
|
return;
|
2021-04-22 22:02:21 +08:00
|
|
|
|
}
|
2020-10-18 23:05:24 +08:00
|
|
|
|
}
|
2020-02-23 12:16:20 +08:00
|
|
|
|
if (!_process) {
|
2022-04-16 15:12:49 +08:00
|
|
|
|
//未设置ssrc时,尝试获取ssrc
|
|
|
|
|
|
if (!_ssrc && !RtpSelector::getSSRC(data, len, _ssrc)) {
|
2020-02-23 12:16:20 +08:00
|
|
|
|
return;
|
|
|
|
|
|
}
|
2020-07-07 10:01:12 +08:00
|
|
|
|
if (_stream_id.empty()) {
|
|
|
|
|
|
//未指定流id就使用ssrc为流id
|
2021-04-22 22:02:21 +08:00
|
|
|
|
_stream_id = printSSRC(_ssrc);
|
2020-07-07 10:01:12 +08:00
|
|
|
|
}
|
2023-02-28 22:43:57 +08:00
|
|
|
|
try {
|
|
|
|
|
|
_process = RtpSelector::Instance().getProcess(_stream_id, true);
|
|
|
|
|
|
} catch (RtpSelector::ProcessExisted &ex) {
|
|
|
|
|
|
if (!_is_udp) {
|
|
|
|
|
|
// tcp情况下立即断开连接
|
|
|
|
|
|
throw;
|
|
|
|
|
|
}
|
|
|
|
|
|
// udp情况下延时断开连接(等待超时自动关闭),防止频繁创建销毁RtpSession对象
|
|
|
|
|
|
WarnP(this) << ex.what();
|
|
|
|
|
|
_delay_close = true;
|
|
|
|
|
|
return;
|
|
|
|
|
|
}
|
2024-03-05 17:06:31 +08:00
|
|
|
|
_process->setOnlyTrack((RtpProcess::OnlyTrack)_only_track);
|
2023-04-28 22:04:38 +08:00
|
|
|
|
_process->setDelegate(static_pointer_cast<RtpSession>(shared_from_this()));
|
2019-12-05 19:20:12 +08:00
|
|
|
|
}
|
2021-04-22 22:02:21 +08:00
|
|
|
|
try {
|
2022-04-16 15:12:49 +08:00
|
|
|
|
uint32_t rtp_ssrc = 0;
|
|
|
|
|
|
RtpSelector::getSSRC(data, len, rtp_ssrc);
|
|
|
|
|
|
if (rtp_ssrc != _ssrc) {
|
2023-04-21 23:08:48 +08:00
|
|
|
|
WarnP(this) << "ssrc mismatched, rtp dropped: " << rtp_ssrc << " != " << _ssrc;
|
2022-04-16 15:12:49 +08:00
|
|
|
|
return;
|
|
|
|
|
|
}
|
2022-05-08 00:26:01 +08:00
|
|
|
|
_process->inputRtp(false, getSock(), data, len, (struct sockaddr *)&_addr);
|
2021-06-25 16:24:44 +08:00
|
|
|
|
} catch (RtpTrack::BadRtpException &ex) {
|
2021-06-08 14:03:25 +08:00
|
|
|
|
if (!_is_udp) {
|
|
|
|
|
|
WarnL << ex.what() << ",开始搜索ssrc以便恢复上下文";
|
|
|
|
|
|
_search_rtp = true;
|
|
|
|
|
|
} else {
|
|
|
|
|
|
throw;
|
|
|
|
|
|
}
|
2023-11-15 11:02:12 +08:00
|
|
|
|
} catch (std::exception &ex) {
|
|
|
|
|
|
if (!_is_udp) {
|
|
|
|
|
|
// tcp情况下立即断开连接
|
|
|
|
|
|
throw;
|
|
|
|
|
|
}
|
|
|
|
|
|
// udp情况下延时断开连接(等待超时自动关闭),防止频繁创建销毁RtpSession对象
|
|
|
|
|
|
WarnP(this) << ex.what();
|
|
|
|
|
|
_delay_close = true;
|
|
|
|
|
|
return;
|
2021-04-22 22:02:21 +08:00
|
|
|
|
}
|
2019-12-05 19:20:12 +08:00
|
|
|
|
_ticker.resetTime();
|
|
|
|
|
|
}
|
2019-12-06 11:54:10 +08:00
|
|
|
|
|
2022-09-18 20:36:47 +08:00
|
|
|
|
bool RtpSession::close(MediaSource &sender) {
|
2020-02-28 16:25:14 +08:00
|
|
|
|
//此回调在其他线程触发
|
2022-09-18 20:36:47 +08:00
|
|
|
|
string err = StrPrinter << "close media: " << sender.getUrl();
|
|
|
|
|
|
safeShutdown(SockException(Err_shutdown, err));
|
2020-02-28 16:25:14 +08:00
|
|
|
|
return true;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-04-22 22:02:21 +08:00
|
|
|
|
static const char *findSSRC(const char *data, ssize_t len, uint32_t ssrc) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// rtp前面必须预留两个字节的长度字段
|
2021-04-22 22:02:21 +08:00
|
|
|
|
for (ssize_t i = 2; i <= len - 4; ++i) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
auto ptr = (const uint8_t *)data + i;
|
|
|
|
|
|
if (ptr[0] == (ssrc >> 24) && ptr[1] == ((ssrc >> 16) & 0xFF) && ptr[2] == ((ssrc >> 8) & 0xFF)
|
|
|
|
|
|
&& ptr[3] == (ssrc & 0xFF)) {
|
|
|
|
|
|
return (const char *)ptr;
|
2021-04-22 22:02:21 +08:00
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
return nullptr;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2023-11-10 21:53:43 +08:00
|
|
|
|
static const char *findPsHeaderFlag(const char *data, ssize_t len) {
|
|
|
|
|
|
for (ssize_t i = 2; i <= len - 4; ++i) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
auto ptr = (const uint8_t *)data + i;
|
|
|
|
|
|
// PsHeader 0x000001ba、PsSystemHeader0x000001bb(关键帧标识)
|
2023-11-10 21:53:43 +08:00
|
|
|
|
if (ptr[0] == (0x00) && ptr[1] == (0x00) && ptr[2] == (0x01) && ptr[3] == (0xbb)) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
return (const char *)ptr;
|
2023-11-10 21:53:43 +08:00
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return nullptr;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// rtp长度到ssrc间的长度固定为10
|
2021-04-22 22:02:21 +08:00
|
|
|
|
static size_t constexpr kSSRCOffset = 2 + 4 + 4;
|
2023-11-10 21:53:43 +08:00
|
|
|
|
// rtp长度到ps header间的长度固定为14 (暂时不采用找ps header,采用找system header代替)
|
|
|
|
|
|
// rtp长度到ps system header间的长度固定为20 (关键帧标识)
|
|
|
|
|
|
static size_t constexpr kPSHeaderOffset = 2 + 4 + 4 + 4 + 20;
|
2021-04-22 22:02:21 +08:00
|
|
|
|
|
|
|
|
|
|
const char *RtpSession::onSearchPacketTail(const char *data, size_t len) {
|
|
|
|
|
|
if (!_search_rtp) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// tcp上下文正常,不用搜索ssrc
|
2021-04-22 22:02:21 +08:00
|
|
|
|
return RtpSplitter::onSearchPacketTail(data, len);
|
|
|
|
|
|
}
|
|
|
|
|
|
if (!_process) {
|
2023-11-10 21:53:43 +08:00
|
|
|
|
InfoL << "ssrc未获取到,无法通过ssrc恢复tcp上下文;尝试搜索PsSystemHeader恢复tcp上下文。";
|
2023-12-09 16:23:51 +08:00
|
|
|
|
auto rtp_ptr1 = searchByPsHeaderFlag(data, len);
|
2023-11-10 21:53:43 +08:00
|
|
|
|
return rtp_ptr1;
|
|
|
|
|
|
}
|
2023-12-09 16:23:51 +08:00
|
|
|
|
auto rtp_ptr0 = searchBySSRC(data, len);
|
|
|
|
|
|
if (rtp_ptr0) {
|
2023-11-10 21:53:43 +08:00
|
|
|
|
return rtp_ptr0;
|
2021-04-22 22:02:21 +08:00
|
|
|
|
}
|
2023-11-10 21:53:43 +08:00
|
|
|
|
// ssrc搜索失败继续尝试搜索ps header flag
|
2023-12-09 16:23:51 +08:00
|
|
|
|
auto rtp_ptr2 = searchByPsHeaderFlag(data, len);
|
2023-11-10 21:53:43 +08:00
|
|
|
|
return rtp_ptr2;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
const char *RtpSession::searchBySSRC(const char *data, size_t len) {
|
|
|
|
|
|
InfoL << "尝试rtp搜索ssrc..._ssrc=" << _ssrc;
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 搜索第一个rtp的ssrc
|
2021-04-22 22:02:21 +08:00
|
|
|
|
auto ssrc_ptr0 = findSSRC(data, len, _ssrc);
|
|
|
|
|
|
if (!ssrc_ptr0) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 未搜索到任意rtp,返回数据不够
|
2023-11-10 21:53:43 +08:00
|
|
|
|
InfoL << "rtp搜索ssrc失败(第一个数据不够),丢弃rtp数据为:" << len;
|
2021-04-22 22:02:21 +08:00
|
|
|
|
return nullptr;
|
|
|
|
|
|
}
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 这两个字节是第一个rtp的长度字段
|
2021-04-22 22:02:21 +08:00
|
|
|
|
auto rtp_len_ptr = (ssrc_ptr0 - kSSRCOffset);
|
|
|
|
|
|
auto rtp_len = ((uint8_t *)rtp_len_ptr)[0] << 8 | ((uint8_t *)rtp_len_ptr)[1];
|
|
|
|
|
|
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 搜索第二个rtp的ssrc
|
|
|
|
|
|
auto ssrc_ptr1 = findSSRC(ssrc_ptr0 + rtp_len, data + (ssize_t)len - ssrc_ptr0 - rtp_len, _ssrc);
|
2021-04-22 22:02:21 +08:00
|
|
|
|
if (!ssrc_ptr1) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 未搜索到第二个rtp,返回数据不够
|
2023-11-10 21:53:43 +08:00
|
|
|
|
InfoL << "rtp搜索ssrc失败(第二个数据不够),丢弃rtp数据为:" << len;
|
2021-04-22 22:02:21 +08:00
|
|
|
|
return nullptr;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 两个ssrc的间隔正好等于rtp的长度(外加rtp长度字段),那么说明找到rtp
|
2021-04-22 22:02:21 +08:00
|
|
|
|
auto ssrc_offset = ssrc_ptr1 - ssrc_ptr0;
|
|
|
|
|
|
if (ssrc_offset == rtp_len + 2 || ssrc_offset == rtp_len + 4) {
|
2023-11-10 21:53:43 +08:00
|
|
|
|
InfoL << "rtp搜索ssrc成功,tcp上下文恢复成功,丢弃的rtp残余数据为:" << rtp_len_ptr - data;
|
2021-04-22 22:02:21 +08:00
|
|
|
|
_search_rtp_finished = true;
|
2021-11-19 11:09:55 +08:00
|
|
|
|
if (rtp_len_ptr == data) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 停止搜索rtp,否则会进入死循环
|
2021-11-19 11:09:55 +08:00
|
|
|
|
_search_rtp = false;
|
|
|
|
|
|
}
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 前面的数据都需要丢弃,这个是rtp的起始
|
2021-04-22 22:02:21 +08:00
|
|
|
|
return rtp_len_ptr;
|
|
|
|
|
|
}
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 第一个rtp长度不匹配,说明第一个找到的ssrc不是rtp,丢弃之,我们从第二个ssrc所在rtp开始搜索
|
2021-04-22 22:02:21 +08:00
|
|
|
|
return ssrc_ptr1 - kSSRCOffset;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2023-11-10 21:53:43 +08:00
|
|
|
|
const char *RtpSession::searchByPsHeaderFlag(const char *data, size_t len) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
InfoL << "尝试rtp搜索PsSystemHeaderFlag..._ssrc=" << _ssrc;
|
2023-11-10 21:53:43 +08:00
|
|
|
|
// 搜索rtp中的第一个PsHeaderFlag
|
2023-12-09 16:23:51 +08:00
|
|
|
|
auto ps_header_flag_ptr = findPsHeaderFlag(data, len);
|
2023-11-10 21:53:43 +08:00
|
|
|
|
if (!ps_header_flag_ptr) {
|
|
|
|
|
|
InfoL << "rtp搜索flag失败,丢弃rtp数据为:" << len;
|
|
|
|
|
|
return nullptr;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
auto rtp_ptr = ps_header_flag_ptr - kPSHeaderOffset;
|
|
|
|
|
|
_search_rtp_finished = true;
|
|
|
|
|
|
if (rtp_ptr == data) {
|
2023-12-09 16:23:51 +08:00
|
|
|
|
// 停止搜索rtp,否则会进入死循环
|
2023-11-10 21:53:43 +08:00
|
|
|
|
_search_rtp = false;
|
|
|
|
|
|
}
|
|
|
|
|
|
InfoL << "rtp搜索flag成功,tcp上下文恢复成功,丢弃的rtp残余数据为:" << rtp_ptr - data;
|
|
|
|
|
|
|
|
|
|
|
|
// TODO or Not ? 更新设置ssrc
|
|
|
|
|
|
uint32_t rtp_ssrc = 0;
|
2023-12-09 16:23:51 +08:00
|
|
|
|
RtpSelector::getSSRC(rtp_ptr + 2, len, rtp_ssrc);
|
2023-11-10 21:53:43 +08:00
|
|
|
|
_ssrc = rtp_ssrc;
|
|
|
|
|
|
InfoL << "设置_ssrc为:" << _ssrc;
|
|
|
|
|
|
// RtpServer::updateSSRC(uint32_t ssrc)
|
|
|
|
|
|
return rtp_ptr;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2019-12-06 11:54:10 +08:00
|
|
|
|
}//namespace mediakit
|
2024-01-17 18:11:56 +08:00
|
|
|
|
#endif//defined(ENABLE_RTPPROXY)
|