2022-10-24 06:48:31 +00:00
|
|
|
// Copyright (C) 2022, Asymptotic Inc.
|
|
|
|
// Author: Sanchayan Maity <sanchayan@asymptotic.io>
|
|
|
|
//
|
|
|
|
// This Source Code Form is subject to the terms of the Mozilla Public License, v2.0.
|
|
|
|
// If a copy of the MPL was not distributed with this file, You can obtain one at
|
|
|
|
// <https://mozilla.org/MPL/2.0/>.
|
|
|
|
//
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2022-11-22 10:43:35 +00:00
|
|
|
use crate::utils::{
|
2022-12-01 05:59:40 +00:00
|
|
|
build_reqwest_client, parse_redirect_location, set_ice_servers, wait, wait_async, WaitError,
|
|
|
|
RUNTIME,
|
2022-11-22 10:43:35 +00:00
|
|
|
};
|
2022-11-29 05:21:30 +00:00
|
|
|
use crate::IceTransportPolicy;
|
2022-12-01 05:59:40 +00:00
|
|
|
use async_recursion::async_recursion;
|
2022-10-27 12:21:09 +00:00
|
|
|
use bytes::Bytes;
|
2022-10-24 06:48:31 +00:00
|
|
|
use futures::future;
|
2022-12-01 05:59:40 +00:00
|
|
|
use gst::{glib, prelude::*, subclass::prelude::*};
|
2022-10-24 06:48:31 +00:00
|
|
|
use gst_sdp::*;
|
|
|
|
use gst_webrtc::*;
|
|
|
|
use once_cell::sync::Lazy;
|
|
|
|
use reqwest::header::{HeaderMap, HeaderValue};
|
|
|
|
use reqwest::StatusCode;
|
|
|
|
use std::sync::Mutex;
|
|
|
|
|
|
|
|
static CAT: Lazy<gst::DebugCategory> = Lazy::new(|| {
|
|
|
|
gst::DebugCategory::new(
|
|
|
|
"whepsrc",
|
|
|
|
gst::DebugColorFlags::empty(),
|
|
|
|
Some("WHEP Source"),
|
|
|
|
)
|
|
|
|
});
|
|
|
|
|
2022-11-29 05:21:30 +00:00
|
|
|
const DEFAULT_ICE_TRANSPORT_POLICY: IceTransportPolicy = IceTransportPolicy::All;
|
2022-10-24 06:48:31 +00:00
|
|
|
const MAX_REDIRECTS: u8 = 10;
|
2022-10-28 08:32:23 +00:00
|
|
|
const DEFAULT_TIMEOUT: u32 = 15;
|
2022-10-24 06:48:31 +00:00
|
|
|
|
|
|
|
#[derive(Debug, Clone)]
|
|
|
|
struct Settings {
|
|
|
|
video_caps: gst::Caps,
|
|
|
|
audio_caps: gst::Caps,
|
|
|
|
turn_server: Option<String>,
|
|
|
|
stun_server: Option<String>,
|
|
|
|
whep_endpoint: Option<String>,
|
|
|
|
auth_token: Option<String>,
|
|
|
|
use_link_headers: bool,
|
2022-11-29 05:21:30 +00:00
|
|
|
ice_transport_policy: IceTransportPolicy,
|
2022-10-28 08:32:23 +00:00
|
|
|
timeout: u32,
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[allow(clippy::derivable_impls)]
|
|
|
|
impl Default for Settings {
|
|
|
|
fn default() -> Self {
|
|
|
|
Self {
|
|
|
|
video_caps: [
|
|
|
|
"video/x-vp8",
|
|
|
|
"video/x-h264",
|
|
|
|
"video/x-vp9",
|
|
|
|
"video/x-h265",
|
|
|
|
"video/x-av1",
|
|
|
|
]
|
|
|
|
.iter()
|
|
|
|
.map(|s| gst::Structure::new_empty(s))
|
|
|
|
.collect::<gst::Caps>(),
|
|
|
|
audio_caps: ["audio/x-opus"]
|
|
|
|
.iter()
|
|
|
|
.map(|s| gst::Structure::new_empty(s))
|
|
|
|
.collect::<gst::Caps>(),
|
|
|
|
stun_server: None,
|
|
|
|
turn_server: None,
|
|
|
|
whep_endpoint: None,
|
|
|
|
auth_token: None,
|
|
|
|
use_link_headers: false,
|
|
|
|
ice_transport_policy: DEFAULT_ICE_TRANSPORT_POLICY,
|
2022-10-28 08:32:23 +00:00
|
|
|
timeout: DEFAULT_TIMEOUT,
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-22 10:43:35 +00:00
|
|
|
#[derive(Debug)]
|
2022-10-24 06:48:31 +00:00
|
|
|
enum State {
|
|
|
|
Stopped,
|
2022-12-01 05:59:40 +00:00
|
|
|
Post { redirects: u8 },
|
|
|
|
Running { whep_resource: String },
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for State {
|
|
|
|
fn default() -> Self {
|
|
|
|
Self::Stopped
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub struct WhepSrc {
|
|
|
|
settings: Mutex<Settings>,
|
|
|
|
state: Mutex<State>,
|
|
|
|
webrtcbin: gst::Element,
|
|
|
|
canceller: Mutex<Option<future::AbortHandle>>,
|
|
|
|
client: reqwest::Client,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for WhepSrc {
|
|
|
|
fn default() -> Self {
|
|
|
|
let webrtcbin = gst::ElementFactory::make("webrtcbin")
|
|
|
|
.build()
|
|
|
|
.expect("Failed to create webrtcbin");
|
|
|
|
|
|
|
|
// We'll handle redirects manually since the default redirect handler does not
|
|
|
|
// reuse the authentication token on the redirected server
|
|
|
|
let pol = reqwest::redirect::Policy::none();
|
|
|
|
let client = build_reqwest_client(pol);
|
|
|
|
|
|
|
|
Self {
|
|
|
|
settings: Mutex::new(Settings::default()),
|
|
|
|
state: Mutex::new(State::default()),
|
|
|
|
webrtcbin,
|
|
|
|
canceller: Mutex::new(None),
|
|
|
|
client,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl GstObjectImpl for WhepSrc {}
|
|
|
|
|
|
|
|
impl ElementImpl for WhepSrc {
|
|
|
|
fn metadata() -> Option<&'static gst::subclass::ElementMetadata> {
|
|
|
|
static ELEMENT_METADATA: Lazy<gst::subclass::ElementMetadata> = Lazy::new(|| {
|
|
|
|
gst::subclass::ElementMetadata::new(
|
|
|
|
"WHEP Source Bin",
|
|
|
|
"Source/Network/WebRTC",
|
|
|
|
"A bin to stream media using the WebRTC HTTP Egress Protocol (WHEP)",
|
|
|
|
"Sanchayan Maity <sanchayan@asymptotic.io>",
|
|
|
|
)
|
|
|
|
});
|
|
|
|
Some(&*ELEMENT_METADATA)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn pad_templates() -> &'static [gst::PadTemplate] {
|
|
|
|
static PAD_TEMPLATES: Lazy<Vec<gst::PadTemplate>> = Lazy::new(|| {
|
|
|
|
let src_pad_template = gst::PadTemplate::new(
|
|
|
|
"src_%u",
|
|
|
|
gst::PadDirection::Src,
|
|
|
|
gst::PadPresence::Sometimes,
|
|
|
|
&gst::Caps::new_empty_simple("application/x-rtp"),
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
vec![src_pad_template]
|
|
|
|
});
|
|
|
|
|
|
|
|
PAD_TEMPLATES.as_ref()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn change_state(
|
|
|
|
&self,
|
|
|
|
transition: gst::StateChange,
|
|
|
|
) -> Result<gst::StateChangeSuccess, gst::StateChangeError> {
|
|
|
|
if transition == gst::StateChange::NullToReady {
|
|
|
|
/*
|
|
|
|
* Fail the state change if WHEP endpoint has not been set by the
|
|
|
|
* time ReadyToPaused transition happens. This prevents us from
|
|
|
|
* having to check this everywhere else.
|
|
|
|
*/
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
|
|
|
|
if settings.whep_endpoint.is_none() {
|
|
|
|
gst::error!(CAT, imp: self, "WHEP endpoint URL must be set");
|
|
|
|
return Err(gst::StateChangeError);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if we have a valid URL. We can be assured any further URL
|
|
|
|
* handling won't fail due to invalid URLs.
|
|
|
|
*/
|
|
|
|
if let Err(e) = reqwest::Url::parse(settings.whep_endpoint.as_ref().unwrap().as_str()) {
|
|
|
|
gst::error!(
|
|
|
|
CAT,
|
|
|
|
imp: self,
|
|
|
|
"WHEP endpoint URL could not be parsed: {}",
|
|
|
|
e
|
|
|
|
);
|
|
|
|
return Err(gst::StateChangeError);
|
|
|
|
}
|
|
|
|
|
|
|
|
drop(settings);
|
|
|
|
}
|
|
|
|
|
|
|
|
if transition == gst::StateChange::PausedToReady {
|
|
|
|
if let Some(canceller) = &*self.canceller.lock().unwrap() {
|
|
|
|
canceller.abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
let state = self.state.lock().unwrap();
|
|
|
|
if let State::Running { .. } = *state {
|
|
|
|
drop(state);
|
|
|
|
self.terminate_session();
|
|
|
|
}
|
|
|
|
|
|
|
|
for pad in self.obj().src_pads() {
|
|
|
|
gst::debug!(CAT, imp: self, "Removing pad: {}", pad.name());
|
|
|
|
|
|
|
|
// No need to deactivate pad here. Parent GstBin will deactivate
|
|
|
|
// the pad. Only remove the pad.
|
|
|
|
if let Err(e) = self.obj().remove_pad(&pad) {
|
|
|
|
gst::error!(CAT, imp: self, "Failed to remove pad {}: {}", pad.name(), e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-22 10:43:35 +00:00
|
|
|
self.parent_change_state(transition)
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ObjectImpl for WhepSrc {
|
|
|
|
fn properties() -> &'static [glib::ParamSpec] {
|
|
|
|
static PROPERTIES: Lazy<Vec<glib::ParamSpec>> = Lazy::new(|| {
|
|
|
|
vec![
|
|
|
|
glib::ParamSpecBoxed::builder::<gst::Caps>("video-caps")
|
|
|
|
.nick("Video caps")
|
|
|
|
.blurb("Governs what video codecs will be proposed")
|
|
|
|
.build(),
|
|
|
|
glib::ParamSpecBoxed::builder::<gst::Caps>("audio-caps")
|
|
|
|
.nick("Audio caps")
|
|
|
|
.blurb("Governs what audio codecs will be proposed")
|
|
|
|
.build(),
|
|
|
|
glib::ParamSpecString::builder("stun-server")
|
|
|
|
.nick("STUN Server")
|
|
|
|
.blurb("The STUN server of the form stun://hostname:port")
|
|
|
|
.build(),
|
|
|
|
glib::ParamSpecString::builder("turn-server")
|
|
|
|
.nick("TURN Server")
|
|
|
|
.blurb("The TURN server of the form turn(s)://username:password@host:port.")
|
|
|
|
.build(),
|
|
|
|
glib::ParamSpecString::builder("whep-endpoint")
|
|
|
|
.nick("WHEP Endpoint")
|
|
|
|
.blurb("The WHEP server endpoint to POST SDP offer to.")
|
|
|
|
.build(),
|
|
|
|
glib::ParamSpecBoolean::builder("use-link-headers")
|
|
|
|
.nick("Use Link Headers")
|
|
|
|
.blurb("Use link headers to configure STUN/TURN servers if present in WHEP endpoint response.")
|
|
|
|
.build(),
|
|
|
|
glib::ParamSpecString::builder("auth-token")
|
|
|
|
.nick("Authorization Token")
|
|
|
|
.blurb("Authentication token to use, will be sent in the HTTP Header as 'Bearer <auth-token>'")
|
|
|
|
.build(),
|
2022-11-29 05:21:30 +00:00
|
|
|
glib::ParamSpecEnum::builder::<IceTransportPolicy>("ice-transport-policy", DEFAULT_ICE_TRANSPORT_POLICY)
|
2022-10-24 06:48:31 +00:00
|
|
|
.nick("ICE transport policy")
|
|
|
|
.blurb("The policy to apply for ICE transport")
|
|
|
|
.build(),
|
2022-10-28 08:32:23 +00:00
|
|
|
glib::ParamSpecUInt::builder("timeout")
|
|
|
|
.nick("Timeout")
|
|
|
|
.blurb("Value in seconds to timeout WHEP endpoint requests (0 = No timeout).")
|
|
|
|
.maximum(3600)
|
|
|
|
.default_value(DEFAULT_TIMEOUT)
|
|
|
|
.readwrite()
|
|
|
|
.build(),
|
2022-10-24 06:48:31 +00:00
|
|
|
]
|
|
|
|
});
|
|
|
|
PROPERTIES.as_ref()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn set_property(&self, _id: usize, value: &glib::Value, pspec: &glib::ParamSpec) {
|
|
|
|
match pspec.name() {
|
|
|
|
"video-caps" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.video_caps = value
|
|
|
|
.get::<Option<gst::Caps>>()
|
|
|
|
.expect("type checked upstream")
|
|
|
|
.unwrap_or_else(gst::Caps::new_empty);
|
|
|
|
}
|
|
|
|
"audio-caps" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.audio_caps = value
|
|
|
|
.get::<Option<gst::Caps>>()
|
|
|
|
.expect("type checked upstream")
|
|
|
|
.unwrap_or_else(gst::Caps::new_empty);
|
|
|
|
}
|
|
|
|
"stun-server" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.stun_server = value
|
|
|
|
.get::<Option<String>>()
|
|
|
|
.expect("type checked upstream");
|
|
|
|
self.webrtcbin
|
|
|
|
.set_property("stun-server", settings.stun_server.as_ref());
|
|
|
|
}
|
|
|
|
"turn-server" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.turn_server = value
|
|
|
|
.get::<Option<String>>()
|
|
|
|
.expect("type checked upstream");
|
|
|
|
self.webrtcbin
|
|
|
|
.set_property("turn-server", settings.turn_server.as_ref());
|
|
|
|
}
|
|
|
|
"whep-endpoint" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.whep_endpoint = value.get().expect("WHEP endpoint should be a string");
|
|
|
|
}
|
|
|
|
"use-link-headers" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.use_link_headers = value
|
|
|
|
.get()
|
|
|
|
.expect("use-link-headers should be a boolean value");
|
|
|
|
}
|
|
|
|
"auth-token" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.auth_token = value.get().expect("Auth token should be a string");
|
|
|
|
}
|
|
|
|
"ice-transport-policy" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.ice_transport_policy = value
|
2022-11-29 05:21:30 +00:00
|
|
|
.get::<IceTransportPolicy>()
|
2022-10-24 06:48:31 +00:00
|
|
|
.expect("ice-transport-policy should be an enum value");
|
|
|
|
|
2022-11-29 05:21:30 +00:00
|
|
|
if settings.ice_transport_policy == IceTransportPolicy::Relay {
|
2022-10-24 06:48:31 +00:00
|
|
|
self.webrtcbin
|
|
|
|
.set_property_from_str("ice-transport-policy", "relay");
|
|
|
|
} else {
|
|
|
|
self.webrtcbin
|
|
|
|
.set_property_from_str("ice-transport-policy", "all");
|
|
|
|
}
|
|
|
|
}
|
2022-10-28 08:32:23 +00:00
|
|
|
"timeout" => {
|
|
|
|
let mut settings = self.settings.lock().unwrap();
|
|
|
|
settings.timeout = value.get().expect("type checked upstream");
|
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
_ => unimplemented!(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn property(&self, _id: usize, pspec: &glib::ParamSpec) -> glib::Value {
|
|
|
|
match pspec.name() {
|
|
|
|
"video-caps" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.video_caps.to_value()
|
|
|
|
}
|
|
|
|
"audio-caps" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.audio_caps.to_value()
|
|
|
|
}
|
|
|
|
"stun-server" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.stun_server.to_value()
|
|
|
|
}
|
|
|
|
"turn-server" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.turn_server.to_value()
|
|
|
|
}
|
|
|
|
"whep-endpoint" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.whep_endpoint.to_value()
|
|
|
|
}
|
|
|
|
"use-link-headers" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.use_link_headers.to_value()
|
|
|
|
}
|
|
|
|
"auth-token" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.auth_token.to_value()
|
|
|
|
}
|
|
|
|
"ice-transport-policy" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.ice_transport_policy.to_value()
|
|
|
|
}
|
2022-10-28 08:32:23 +00:00
|
|
|
"timeout" => {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
settings.timeout.to_value()
|
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
_ => unimplemented!(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn constructed(&self) {
|
|
|
|
self.parent_constructed();
|
|
|
|
|
|
|
|
self.obj()
|
|
|
|
.set_suppressed_flags(gst::ElementFlags::SINK | gst::ElementFlags::SOURCE);
|
|
|
|
self.obj().set_element_flags(gst::ElementFlags::SOURCE);
|
|
|
|
|
|
|
|
self.setup_webrtcbin();
|
|
|
|
|
|
|
|
self.obj().add(&self.webrtcbin).unwrap();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[glib::object_subclass]
|
|
|
|
impl ObjectSubclass for WhepSrc {
|
|
|
|
const NAME: &'static str = "GstWhepSrc";
|
|
|
|
type Type = super::WhepSrc;
|
|
|
|
type ParentType = gst::Bin;
|
|
|
|
}
|
|
|
|
|
|
|
|
impl BinImpl for WhepSrc {
|
|
|
|
fn handle_message(&self, message: gst::Message) {
|
|
|
|
use gst::MessageView;
|
|
|
|
match message.view() {
|
|
|
|
MessageView::Eos(_) | MessageView::Error(_) => {
|
|
|
|
self.terminate_session();
|
|
|
|
self.parent_handle_message(message)
|
|
|
|
}
|
|
|
|
_ => self.parent_handle_message(message),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl WhepSrc {
|
2022-12-01 05:59:40 +00:00
|
|
|
fn raise_error(&self, resource_error: gst::ResourceError, msg: String) {
|
|
|
|
gst::error_msg!(resource_error, [msg.as_str()]);
|
|
|
|
gst::element_imp_error!(self, resource_error, [msg.as_str()]);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn handle_future_error(&self, err: WaitError) {
|
|
|
|
match err {
|
|
|
|
WaitError::FutureAborted => {
|
|
|
|
gst::warning!(CAT, imp: self, "Future aborted")
|
|
|
|
}
|
|
|
|
WaitError::FutureError(err) => {
|
|
|
|
self.raise_error(gst::ResourceError::Failed, err.to_string())
|
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2022-10-24 06:48:31 +00:00
|
|
|
fn setup_webrtcbin(&self) {
|
|
|
|
// The specification requires all m= lines to be bundled (section 4.5)
|
|
|
|
self.webrtcbin
|
|
|
|
.set_property("bundle-policy", WebRTCBundlePolicy::MaxBundle);
|
|
|
|
|
|
|
|
let self_weak = self.downgrade();
|
|
|
|
self.webrtcbin
|
|
|
|
.connect_notify(Some("ice-gathering-state"), move |webrtcbin, _pspec| {
|
|
|
|
let self_ = match self_weak.upgrade() {
|
|
|
|
Some(self_) => self_,
|
|
|
|
None => return,
|
|
|
|
};
|
|
|
|
|
|
|
|
let state = webrtcbin.property::<WebRTCICEGatheringState>("ice-gathering-state");
|
|
|
|
|
|
|
|
match state {
|
|
|
|
WebRTCICEGatheringState::Gathering => {
|
|
|
|
gst::info!(CAT, imp: self_, "ICE gathering started")
|
|
|
|
}
|
|
|
|
WebRTCICEGatheringState::Complete => {
|
|
|
|
gst::info!(CAT, imp: self_, "ICE gathering completed");
|
|
|
|
|
2022-11-22 10:43:35 +00:00
|
|
|
let self_ref = self_.ref_counted();
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
// With tokio's spawn one does not have to .await the
|
|
|
|
// returned JoinHandle to make the provided future start
|
|
|
|
// execution. It will start running in the background
|
|
|
|
// immediately when spawn is called. So silence the clippy
|
|
|
|
// warning.
|
|
|
|
#[allow(clippy::let_underscore_future)]
|
|
|
|
let _ = RUNTIME.spawn(async move {
|
|
|
|
/* Note that we check for a valid WHEP endpoint in change_state */
|
|
|
|
self_ref.whep_offer().await
|
|
|
|
});
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
_ => (),
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
let self_weak = self.downgrade();
|
|
|
|
self.webrtcbin
|
|
|
|
.connect_notify(Some("ice-connection-state"), move |webrtcbin, _pspec| {
|
|
|
|
let self_ = match self_weak.upgrade() {
|
|
|
|
Some(self_) => self_,
|
|
|
|
None => return,
|
|
|
|
};
|
|
|
|
|
|
|
|
let state = webrtcbin.property::<WebRTCICEConnectionState>("ice-connection-state");
|
|
|
|
|
|
|
|
match state {
|
|
|
|
WebRTCICEConnectionState::New => (),
|
|
|
|
WebRTCICEConnectionState::Checking => {
|
|
|
|
gst::info!(CAT, imp: self_, "ICE connecting...")
|
|
|
|
}
|
|
|
|
WebRTCICEConnectionState::Connected => {
|
|
|
|
gst::info!(CAT, imp: self_, "ICE connected")
|
|
|
|
}
|
|
|
|
WebRTCICEConnectionState::Completed => {
|
|
|
|
gst::info!(CAT, imp: self_, "ICE completed")
|
|
|
|
}
|
|
|
|
WebRTCICEConnectionState::Failed => {
|
|
|
|
self_.terminate_session();
|
2022-11-29 05:10:01 +00:00
|
|
|
gst::element_imp_error!(self_, gst::ResourceError::Failed, ["ICE failed"]);
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
WebRTCICEConnectionState::Disconnected => (),
|
|
|
|
WebRTCICEConnectionState::Closed => (),
|
|
|
|
_ => (),
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
let self_weak = self.downgrade();
|
|
|
|
self.webrtcbin
|
|
|
|
.connect_notify(Some("connection-state"), move |webrtcbin, _pspec| {
|
|
|
|
let self_ = match self_weak.upgrade() {
|
|
|
|
Some(self_) => self_,
|
|
|
|
None => return,
|
|
|
|
};
|
|
|
|
|
|
|
|
let state = webrtcbin.property::<WebRTCPeerConnectionState>("connection-state");
|
|
|
|
|
|
|
|
match state {
|
|
|
|
WebRTCPeerConnectionState::New => (),
|
|
|
|
WebRTCPeerConnectionState::Connecting => {
|
|
|
|
gst::info!(CAT, imp: self_, "PeerConnection connecting...")
|
|
|
|
}
|
|
|
|
WebRTCPeerConnectionState::Connected => {
|
|
|
|
gst::info!(CAT, imp: self_, "PeerConnection connected")
|
|
|
|
}
|
|
|
|
WebRTCPeerConnectionState::Disconnected => (),
|
|
|
|
WebRTCPeerConnectionState::Failed => {
|
|
|
|
self_.terminate_session();
|
2022-11-29 05:10:01 +00:00
|
|
|
gst::element_imp_error!(
|
2022-10-24 06:48:31 +00:00
|
|
|
self_,
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
["PeerConnection failed"]
|
|
|
|
);
|
|
|
|
}
|
|
|
|
WebRTCPeerConnectionState::Closed => (),
|
|
|
|
_ => (),
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
let self_weak = self.downgrade();
|
|
|
|
self.webrtcbin.connect_pad_added(move |_, pad| {
|
|
|
|
let self_ = match self_weak.upgrade() {
|
|
|
|
Some(self_) => self_,
|
|
|
|
None => return,
|
|
|
|
};
|
|
|
|
|
|
|
|
gst::debug!(
|
|
|
|
CAT,
|
|
|
|
imp: self_,
|
|
|
|
"Pad added with name: {} and caps: {:?}",
|
|
|
|
pad.name(),
|
|
|
|
pad.current_caps()
|
|
|
|
);
|
|
|
|
|
|
|
|
let templ = self_.obj().pad_template("src_%u").unwrap();
|
|
|
|
let src_pad = gst::GhostPad::builder_with_template(&templ, Some(&pad.name()))
|
|
|
|
.build_with_target(pad)
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
src_pad.set_target(Some(pad)).unwrap();
|
|
|
|
src_pad
|
|
|
|
.set_active(true)
|
|
|
|
.expect("Pad activation should succeed");
|
|
|
|
|
|
|
|
self_.obj().add_pad(&src_pad).expect("Failed to add pad");
|
|
|
|
});
|
|
|
|
|
|
|
|
let self_weak = self.downgrade();
|
|
|
|
self.webrtcbin.connect("on-negotiation-needed", false, {
|
|
|
|
move |_| {
|
|
|
|
let self_ = match self_weak.upgrade() {
|
|
|
|
Some(self_) => self_,
|
|
|
|
None => return None,
|
|
|
|
};
|
|
|
|
|
|
|
|
let settings = self_.settings.lock().unwrap();
|
|
|
|
|
|
|
|
let endpoint =
|
|
|
|
reqwest::Url::parse(settings.whep_endpoint.as_ref().unwrap().as_str());
|
|
|
|
if let Err(e) = endpoint {
|
2022-11-29 05:10:01 +00:00
|
|
|
gst::element_imp_error!(
|
2022-10-24 06:48:31 +00:00
|
|
|
self_,
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
["Could not parse WHEP endpoint URL :{}", e]
|
|
|
|
);
|
|
|
|
return None;
|
|
|
|
}
|
|
|
|
|
|
|
|
drop(settings);
|
|
|
|
|
|
|
|
let mut state = self_.state.lock().unwrap();
|
2022-12-01 05:59:40 +00:00
|
|
|
*state = State::Post { redirects: 0 };
|
2022-10-24 06:48:31 +00:00
|
|
|
drop(state);
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
self_.initial_post_request(endpoint.unwrap());
|
2022-10-24 06:48:31 +00:00
|
|
|
|
|
|
|
None
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
fn sdp_message_parse(&self, sdp_bytes: Bytes) {
|
|
|
|
let sdp = match sdp_message::SDPMessage::parse_buffer(&sdp_bytes) {
|
|
|
|
Ok(sdp) => sdp,
|
|
|
|
Err(_) => {
|
|
|
|
self.raise_error(
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
"Could not parse answer SDP".to_string(),
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
};
|
2022-10-24 06:48:31 +00:00
|
|
|
|
|
|
|
let remote_sdp = WebRTCSessionDescription::new(WebRTCSDPType::Answer, sdp);
|
|
|
|
|
|
|
|
gst::debug!(
|
|
|
|
CAT,
|
|
|
|
imp: self,
|
|
|
|
"Setting remote description: {:?}",
|
|
|
|
remote_sdp.sdp().as_text()
|
|
|
|
);
|
|
|
|
|
|
|
|
self.webrtcbin.emit_by_name::<()>(
|
|
|
|
"set-remote-description",
|
|
|
|
&[&remote_sdp, &None::<gst::Promise>],
|
|
|
|
);
|
|
|
|
|
|
|
|
for media in remote_sdp.sdp().medias() {
|
|
|
|
let c = media.attribute_val("candidate");
|
|
|
|
|
|
|
|
if let Some(candidate) = c {
|
|
|
|
let m_line_index = 0u32;
|
|
|
|
let c = format!("candidate:{candidate}");
|
|
|
|
|
|
|
|
gst::debug!(CAT, imp: self, "Adding ICE candidate from offer: {:?}", c);
|
|
|
|
|
|
|
|
self.webrtcbin
|
|
|
|
.emit_by_name::<()>("add-ice-candidate", &[&m_line_index, &c]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
async fn parse_endpoint_response(
|
2022-10-24 06:48:31 +00:00
|
|
|
&self,
|
2022-12-01 05:59:40 +00:00
|
|
|
sess_desc: WebRTCSessionDescription,
|
2022-10-24 06:48:31 +00:00
|
|
|
resp: reqwest::Response,
|
2022-12-01 05:59:40 +00:00
|
|
|
redirects: u8,
|
|
|
|
) {
|
|
|
|
let endpoint;
|
|
|
|
let timeout;
|
|
|
|
let use_link_headers;
|
|
|
|
|
|
|
|
{
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
endpoint =
|
|
|
|
reqwest::Url::parse(settings.whep_endpoint.as_ref().unwrap().as_str()).unwrap();
|
|
|
|
use_link_headers = settings.use_link_headers;
|
|
|
|
timeout = settings.timeout;
|
|
|
|
drop(settings);
|
|
|
|
}
|
|
|
|
|
2022-10-24 06:48:31 +00:00
|
|
|
match resp.status() {
|
|
|
|
StatusCode::OK | StatusCode::NO_CONTENT => {
|
|
|
|
gst::info!(CAT, imp: self, "SDP offer successfully send");
|
|
|
|
}
|
|
|
|
|
|
|
|
StatusCode::CREATED => {
|
|
|
|
gst::debug!(CAT, imp: self, "Response headers: {:?}", resp.headers());
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
if use_link_headers {
|
|
|
|
if let Err(e) = set_ice_servers(&self.webrtcbin, resp.headers()) {
|
|
|
|
self.raise_error(gst::ResourceError::Failed, e.to_string());
|
|
|
|
return;
|
|
|
|
};
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
2022-10-28 08:32:23 +00:00
|
|
|
|
2022-10-24 06:48:31 +00:00
|
|
|
/* See section 4.2 of the WHEP specification */
|
|
|
|
let location = match resp.headers().get(reqwest::header::LOCATION) {
|
|
|
|
Some(location) => location,
|
|
|
|
None => {
|
2022-12-01 05:59:40 +00:00
|
|
|
self.raise_error(
|
2022-10-24 06:48:31 +00:00
|
|
|
gst::ResourceError::Failed,
|
2022-12-01 05:59:40 +00:00
|
|
|
"Location header field should be present for WHEP resource URL"
|
|
|
|
.to_string(),
|
|
|
|
);
|
|
|
|
return;
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let location = match location.to_str() {
|
|
|
|
Ok(loc) => loc,
|
|
|
|
Err(e) => {
|
2022-12-01 05:59:40 +00:00
|
|
|
self.raise_error(
|
2022-10-24 06:48:31 +00:00
|
|
|
gst::ResourceError::Failed,
|
2022-12-01 05:59:40 +00:00
|
|
|
format!("Failed to convert location to string: {e}"),
|
|
|
|
);
|
|
|
|
return;
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let url = reqwest::Url::parse(endpoint.as_str()).unwrap();
|
|
|
|
|
|
|
|
gst::debug!(CAT, imp: self, "WHEP resource: {:?}", location);
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
let url = match url.join(location) {
|
|
|
|
Ok(joined_url) => joined_url,
|
|
|
|
Err(err) => {
|
|
|
|
self.raise_error(
|
2022-11-22 10:43:35 +00:00
|
|
|
gst::ResourceError::Failed,
|
2022-12-01 05:59:40 +00:00
|
|
|
format!("URL join operation failed: {err:?}"),
|
|
|
|
);
|
|
|
|
return;
|
2022-11-22 10:43:35 +00:00
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
};
|
2022-10-28 08:32:23 +00:00
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
match wait_async(&self.canceller, resp.bytes(), timeout).await {
|
|
|
|
Ok(res) => match res {
|
|
|
|
Ok(ans_bytes) => {
|
|
|
|
let mut state = self.state.lock().unwrap();
|
|
|
|
*state = match *state {
|
|
|
|
State::Post { redirects: _r } => State::Running {
|
|
|
|
whep_resource: url.to_string(),
|
|
|
|
},
|
|
|
|
_ => {
|
|
|
|
self.raise_error(
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
"Expected to be in POST state".to_string(),
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
drop(state);
|
|
|
|
|
|
|
|
self.sdp_message_parse(ans_bytes)
|
|
|
|
}
|
|
|
|
Err(err) => self.raise_error(gst::ResourceError::Failed, err.to_string()),
|
2022-11-22 10:43:35 +00:00
|
|
|
},
|
2022-12-01 05:59:40 +00:00
|
|
|
Err(err) => self.handle_future_error(err),
|
2022-11-22 10:43:35 +00:00
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
status if status.is_redirection() => {
|
|
|
|
if redirects < MAX_REDIRECTS {
|
|
|
|
match parse_redirect_location(resp.headers(), &endpoint) {
|
|
|
|
Ok(redirect_url) => {
|
2022-12-01 05:59:40 +00:00
|
|
|
{
|
|
|
|
let mut state = self.state.lock().unwrap();
|
|
|
|
*state = match *state {
|
|
|
|
State::Post { redirects: _r } => State::Post {
|
|
|
|
redirects: redirects + 1,
|
|
|
|
},
|
|
|
|
/*
|
|
|
|
* As per section 4.6 of the specification, redirection is
|
|
|
|
* not required to be supported for the PATCH and DELETE
|
|
|
|
* requests to the final WHEP resource URL. Only the initial
|
|
|
|
* POST request may support redirection.
|
|
|
|
*/
|
|
|
|
State::Running { .. } => {
|
|
|
|
self.raise_error(
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
"Unexpected redirection in RUNNING state".to_string(),
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
State::Stopped => unreachable!(),
|
|
|
|
};
|
|
|
|
drop(state);
|
|
|
|
}
|
|
|
|
|
2022-10-24 06:48:31 +00:00
|
|
|
gst::warning!(
|
|
|
|
CAT,
|
|
|
|
imp: self,
|
|
|
|
"Redirecting endpoint to {}",
|
|
|
|
redirect_url.as_str()
|
|
|
|
);
|
2022-12-01 05:59:40 +00:00
|
|
|
|
|
|
|
if let Err(err) =
|
|
|
|
wait_async(&self.canceller, self.do_post(sess_desc), timeout).await
|
|
|
|
{
|
|
|
|
self.handle_future_error(err);
|
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
2022-12-01 05:59:40 +00:00
|
|
|
Err(e) => self.raise_error(gst::ResourceError::Failed, e.to_string()),
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
} else {
|
2022-12-01 05:59:40 +00:00
|
|
|
self.raise_error(
|
2022-10-24 06:48:31 +00:00
|
|
|
gst::ResourceError::Failed,
|
2022-12-01 05:59:40 +00:00
|
|
|
"Too many redirects. Unable to connect.".to_string(),
|
|
|
|
);
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
s => {
|
2022-12-01 05:59:40 +00:00
|
|
|
match wait_async(&self.canceller, resp.bytes(), timeout).await {
|
|
|
|
Ok(r) => {
|
|
|
|
let res = r
|
|
|
|
.map(|x| x.escape_ascii().to_string())
|
|
|
|
.unwrap_or_else(|_| "(no further details)".to_string());
|
|
|
|
|
|
|
|
// FIXME: Check and handle 'Retry-After' header in case of server error
|
|
|
|
self.raise_error(
|
2022-10-28 08:32:23 +00:00
|
|
|
gst::ResourceError::Failed,
|
2022-12-01 05:59:40 +00:00
|
|
|
format!("Unexpected response: {} - {}", s.as_str(), res),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
Err(err) => self.handle_future_error(err),
|
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn generate_offer(&self) {
|
|
|
|
let self_weak = self.downgrade();
|
|
|
|
let promise = gst::Promise::with_change_func(move |reply| {
|
|
|
|
let self_ = match self_weak.upgrade() {
|
|
|
|
Some(self_) => self_,
|
|
|
|
None => return,
|
|
|
|
};
|
|
|
|
|
|
|
|
let reply = match reply {
|
|
|
|
Ok(Some(reply)) => reply,
|
|
|
|
Ok(None) => {
|
2022-11-29 05:10:01 +00:00
|
|
|
gst::element_imp_error!(
|
2022-10-24 06:48:31 +00:00
|
|
|
self_,
|
|
|
|
gst::LibraryError::Failed,
|
|
|
|
["generate offer::Promise returned with no reply"]
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
Err(e) => {
|
2022-11-29 05:10:01 +00:00
|
|
|
gst::element_imp_error!(
|
2022-10-24 06:48:31 +00:00
|
|
|
self_,
|
|
|
|
gst::LibraryError::Failed,
|
|
|
|
["generate offer::Promise returned with error {:?}", e]
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if let Ok(offer_sdp) = reply
|
|
|
|
.value("offer")
|
|
|
|
.map(|offer| offer.get::<gst_webrtc::WebRTCSessionDescription>().unwrap())
|
|
|
|
{
|
|
|
|
gst::debug!(
|
|
|
|
CAT,
|
|
|
|
imp: self_,
|
|
|
|
"Setting local description: {:?}",
|
|
|
|
offer_sdp.sdp().as_text()
|
|
|
|
);
|
|
|
|
|
|
|
|
self_.webrtcbin.emit_by_name::<()>(
|
|
|
|
"set-local-description",
|
|
|
|
&[&offer_sdp, &None::<gst::Promise>],
|
|
|
|
);
|
|
|
|
} else {
|
2022-12-01 05:59:40 +00:00
|
|
|
let error = reply
|
|
|
|
.value("error")
|
|
|
|
.expect("structure must have an error value")
|
|
|
|
.get::<glib::Error>()
|
|
|
|
.expect("value must be a GLib error");
|
|
|
|
|
2022-11-29 05:10:01 +00:00
|
|
|
gst::element_imp_error!(
|
2022-10-24 06:48:31 +00:00
|
|
|
self_,
|
|
|
|
gst::LibraryError::Failed,
|
2022-12-01 05:59:40 +00:00
|
|
|
["generate offer::Promise returned with no reply: {}", error]
|
2022-10-24 06:48:31 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
|
|
|
|
gst::debug!(
|
|
|
|
CAT,
|
|
|
|
imp: self,
|
|
|
|
"Audio caps: {:?} Video caps: {:?}",
|
|
|
|
settings.audio_caps,
|
|
|
|
settings.video_caps
|
|
|
|
);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Since we will be recvonly we need to add a transceiver without which
|
|
|
|
* WebRTC bin does not generate ICE candidates.
|
|
|
|
*/
|
|
|
|
self.webrtcbin.emit_by_name::<WebRTCRTPTransceiver>(
|
|
|
|
"add-transceiver",
|
|
|
|
&[
|
|
|
|
&WebRTCRTPTransceiverDirection::Recvonly,
|
|
|
|
&settings.audio_caps,
|
|
|
|
],
|
|
|
|
);
|
|
|
|
|
|
|
|
self.webrtcbin.emit_by_name::<WebRTCRTPTransceiver>(
|
|
|
|
"add-transceiver",
|
|
|
|
&[
|
|
|
|
&WebRTCRTPTransceiverDirection::Recvonly,
|
|
|
|
&settings.video_caps,
|
|
|
|
],
|
|
|
|
);
|
|
|
|
|
|
|
|
drop(settings);
|
|
|
|
|
|
|
|
self.webrtcbin
|
|
|
|
.emit_by_name::<()>("create-offer", &[&None::<gst::Structure>, &promise]);
|
|
|
|
}
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
fn initial_post_request(&self, endpoint: reqwest::Url) {
|
2022-10-24 06:48:31 +00:00
|
|
|
let state = self.state.lock().unwrap();
|
|
|
|
|
|
|
|
gst::info!(CAT, imp: self, "WHEP endpoint url: {}", endpoint.as_str());
|
|
|
|
|
2022-11-22 10:43:35 +00:00
|
|
|
match *state {
|
|
|
|
State::Post { .. } => (),
|
2022-10-24 06:48:31 +00:00
|
|
|
_ => {
|
2022-12-01 05:59:40 +00:00
|
|
|
self.raise_error(
|
2022-10-24 06:48:31 +00:00
|
|
|
gst::ResourceError::Failed,
|
2022-12-01 05:59:40 +00:00
|
|
|
"Trying to do POST in unexpected state".to_string(),
|
|
|
|
);
|
|
|
|
return;
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
drop(state);
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
self.generate_offer()
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
async fn whep_offer(&self) {
|
2022-10-24 06:48:31 +00:00
|
|
|
let local_desc = self
|
|
|
|
.webrtcbin
|
|
|
|
.property::<Option<WebRTCSessionDescription>>("local-description");
|
|
|
|
|
|
|
|
let offer_sdp = match local_desc {
|
|
|
|
None => {
|
2022-11-29 05:10:01 +00:00
|
|
|
gst::element_imp_error!(
|
2022-10-24 06:48:31 +00:00
|
|
|
self,
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
["Local description is not set"]
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
Some(offer) => offer,
|
|
|
|
};
|
|
|
|
|
|
|
|
gst::debug!(
|
|
|
|
CAT,
|
|
|
|
imp: self,
|
|
|
|
"Sending offer SDP: {:?}",
|
|
|
|
offer_sdp.sdp().as_text()
|
|
|
|
);
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
let sess_desc = WebRTCSessionDescription::new(WebRTCSDPType::Offer, offer_sdp.sdp());
|
2022-10-24 06:48:31 +00:00
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
let timeout;
|
|
|
|
{
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
timeout = settings.timeout;
|
|
|
|
drop(settings);
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
if let Err(e) = wait_async(&self.canceller, self.do_post(sess_desc), timeout).await {
|
|
|
|
self.handle_future_error(e);
|
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
#[async_recursion]
|
|
|
|
async fn do_post(&self, offer: WebRTCSessionDescription) {
|
|
|
|
let auth_token;
|
|
|
|
let endpoint;
|
|
|
|
let timeout;
|
|
|
|
|
|
|
|
{
|
|
|
|
let settings = self.settings.lock().unwrap();
|
|
|
|
endpoint =
|
|
|
|
reqwest::Url::parse(settings.whep_endpoint.as_ref().unwrap().as_str()).unwrap();
|
|
|
|
auth_token = settings.auth_token.clone();
|
|
|
|
timeout = settings.timeout;
|
|
|
|
drop(settings);
|
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
|
|
|
|
let sdp = offer.sdp();
|
|
|
|
let body = sdp.as_text().unwrap();
|
|
|
|
|
|
|
|
gst::info!(CAT, imp: self, "Using endpoint {}", endpoint.as_str());
|
|
|
|
|
|
|
|
let mut headermap = HeaderMap::new();
|
|
|
|
headermap.insert(
|
|
|
|
reqwest::header::CONTENT_TYPE,
|
|
|
|
HeaderValue::from_static("application/sdp"),
|
|
|
|
);
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
if let Some(token) = auth_token.as_ref() {
|
|
|
|
let bearer_token = "Bearer ".to_owned() + token.as_str();
|
2022-10-24 06:48:31 +00:00
|
|
|
headermap.insert(
|
|
|
|
reqwest::header::AUTHORIZATION,
|
|
|
|
HeaderValue::from_str(bearer_token.as_str())
|
|
|
|
.expect("Failed to set auth token to header"),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
gst::debug!(
|
|
|
|
CAT,
|
|
|
|
imp: self,
|
|
|
|
"Url for HTTP POST request: {}",
|
|
|
|
endpoint.as_str()
|
|
|
|
);
|
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
let res = wait_async(
|
|
|
|
&self.canceller,
|
2022-10-28 08:32:23 +00:00
|
|
|
self.client
|
|
|
|
.request(reqwest::Method::POST, endpoint.clone())
|
|
|
|
.headers(headermap)
|
|
|
|
.body(body)
|
2022-12-01 05:59:40 +00:00
|
|
|
.send(),
|
|
|
|
timeout,
|
|
|
|
)
|
|
|
|
.await;
|
|
|
|
|
|
|
|
match res {
|
|
|
|
Ok(resp) => match resp {
|
|
|
|
Ok(r) => {
|
|
|
|
#[allow(unused_mut)]
|
|
|
|
let mut redirects;
|
|
|
|
|
|
|
|
{
|
|
|
|
let state = self.state.lock().unwrap();
|
|
|
|
redirects = match *state {
|
|
|
|
State::Post { redirects } => redirects,
|
|
|
|
_ => {
|
|
|
|
self.raise_error(
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
"Trying to do POST in unexpected state".to_string(),
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
drop(state);
|
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
if let Err(e) = wait_async(
|
|
|
|
&self.canceller,
|
|
|
|
self.parse_endpoint_response(offer, r, redirects),
|
|
|
|
timeout,
|
|
|
|
)
|
|
|
|
.await
|
|
|
|
{
|
|
|
|
self.handle_future_error(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Err(err) => self.raise_error(gst::ResourceError::Failed, err.to_string()),
|
2022-11-22 10:43:35 +00:00
|
|
|
},
|
2022-12-01 05:59:40 +00:00
|
|
|
Err(err) => self.handle_future_error(err),
|
2022-11-22 10:43:35 +00:00
|
|
|
}
|
2022-10-24 06:48:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn terminate_session(&self) {
|
|
|
|
let settings = self.settings.lock().unwrap();
|
2022-12-01 05:59:40 +00:00
|
|
|
let state = self.state.lock().unwrap();
|
2022-10-28 08:32:23 +00:00
|
|
|
let timeout = settings.timeout;
|
2022-10-24 06:48:31 +00:00
|
|
|
|
2022-12-01 05:59:40 +00:00
|
|
|
let resource_url = match *state {
|
2022-10-24 06:48:31 +00:00
|
|
|
State::Running {
|
|
|
|
whep_resource: ref whep_resource_url,
|
2022-12-01 05:59:40 +00:00
|
|
|
} => whep_resource_url.clone(),
|
2022-10-24 06:48:31 +00:00
|
|
|
_ => {
|
2022-11-29 05:10:01 +00:00
|
|
|
gst::element_imp_error!(
|
2022-10-24 06:48:31 +00:00
|
|
|
self,
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
["Terminated in unexpected state"]
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
drop(state);
|
|
|
|
|
|
|
|
let mut headermap = HeaderMap::new();
|
|
|
|
if let Some(token) = &settings.auth_token {
|
|
|
|
let bearer_token = "Bearer ".to_owned() + token.as_str();
|
|
|
|
headermap.insert(
|
|
|
|
reqwest::header::AUTHORIZATION,
|
|
|
|
HeaderValue::from_str(bearer_token.as_str())
|
|
|
|
.expect("Failed to set auth token to header"),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
drop(settings);
|
|
|
|
|
|
|
|
gst::debug!(CAT, imp: self, "DELETE request on {}", resource_url);
|
|
|
|
|
|
|
|
/* DELETE request goes to the WHEP resource URL. See section 3 of the specification. */
|
|
|
|
let client = build_reqwest_client(reqwest::redirect::Policy::default());
|
2022-10-28 08:32:23 +00:00
|
|
|
let future = async {
|
|
|
|
client
|
|
|
|
.delete(resource_url.clone())
|
|
|
|
.headers(headermap)
|
|
|
|
.send()
|
|
|
|
.await
|
|
|
|
.map_err(|err| {
|
|
|
|
gst::error_msg!(
|
|
|
|
gst::ResourceError::Failed,
|
|
|
|
["DELETE request failed {}: {:?}", resource_url, err]
|
|
|
|
)
|
|
|
|
})
|
|
|
|
};
|
2022-10-24 06:48:31 +00:00
|
|
|
|
2022-10-28 08:32:23 +00:00
|
|
|
let res = wait(&self.canceller, future, timeout);
|
2022-10-24 06:48:31 +00:00
|
|
|
match res {
|
|
|
|
Ok(r) => {
|
|
|
|
gst::debug!(CAT, imp: self, "Response to DELETE : {}", r.status());
|
|
|
|
}
|
2022-11-22 10:43:35 +00:00
|
|
|
Err(e) => match e {
|
|
|
|
WaitError::FutureAborted => {
|
|
|
|
gst::warning!(CAT, imp: self, "DELETE request aborted")
|
|
|
|
}
|
|
|
|
WaitError::FutureError(e) => {
|
|
|
|
gst::error!(CAT, imp: self, "Error on DELETE request : {}", e)
|
|
|
|
}
|
|
|
|
},
|
2022-10-24 06:48:31 +00:00
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|