Compare commits
No commits in common. "970b6366a7b621a1c472defbfef816c11493cc9a" and "9b85fdb45603dd2ea111813ea9e6042c6ea536e9" have entirely different histories.
970b6366a7
...
9b85fdb456
3 changed files with 2 additions and 10 deletions
|
@ -8,8 +8,6 @@ Uses the std lib http server implementation for the http serving side.
|
|||
|
||||
**Not intended for actual use**. The stream key use is not secure and is used to handle directories without a user db system, than to provide auth. Same goes for the SRT passphrase. Also just accepts connections so will get DDOS'd immediately.
|
||||
|
||||
**Update**: main branch has been tested over a network. RTMP should now work fine, SRT "works" with a few modifications. The RTT ping log-buffer slice must be extended depending on network latency (try ~2x latency/10ms, could adjust automatically, but eh). Also will inevitably crash on poor connections due to the lack of DROPSEQ handling, but will work perfectly fine during the initial 3-10s you get.
|
||||
|
||||
Limits to a single stream at a time, mostly for the lack of db to handle connections and user information rather than concurrency problems.
|
||||
|
||||
Currently always transcodes to vp9 + opus, segments to fragmented mp4. Creates one segment playlist, no manifest. Uses ffmpeg
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
package rtmp
|
||||
|
||||
import (
|
||||
"io"
|
||||
"net"
|
||||
"time"
|
||||
"encoding/binary"
|
||||
|
@ -226,7 +225,7 @@ func read_chunk_data(conn net.Conn, msg_ptr *Message, chnk_size uint32) (uint32,
|
|||
} else {
|
||||
buffer_end = chnk_size + msg_ptr.curr_bytes_read
|
||||
}
|
||||
n, err := io.ReadFull(conn, msg_ptr.data[msg_ptr.curr_bytes_read:buffer_end])
|
||||
n, err := conn.Read(msg_ptr.data[msg_ptr.curr_bytes_read:buffer_end])
|
||||
if err != nil {
|
||||
return 0, err
|
||||
}
|
||||
|
|
|
@ -147,12 +147,7 @@ func (agent *SRTManager) process_conclusion(packet *Packet) (*Packet) {
|
|||
resp_packet := agent.create_conclusion_resp()
|
||||
if packet.packet_type == HANDSHAKE {
|
||||
hs_cif := packet.cif.(*HandshakeCIF)
|
||||
|
||||
// allow previous shotgunned induction requests to dissipate
|
||||
if hs_cif.hs_type != 0xffffffff {
|
||||
return nil
|
||||
}
|
||||
if hs_cif.syn_cookie == agent.syn_cookie {
|
||||
if hs_cif.hs_type == 0xffffffff && hs_cif.syn_cookie == agent.syn_cookie {
|
||||
for _, v := range hs_cif.hs_extensions {
|
||||
// force client to add a stream_id for output location
|
||||
// to do: add encryption handling
|
||||
|
|
Loading…
Reference in a new issue