This repository was archived by the owner on Oct 10, 2023. It is now read-only.
forked from AFathi/live-webrtcsignaling
-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathpipeline.node.sanitizer.go
79 lines (72 loc) · 1.95 KB
/
pipeline.node.sanitizer.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
package main
/*
* this node will sanitize input RTP trafic.
* packets are fwd to output if :
* packet rtp timestamp is +/- 100000 ticks from prev rtp timestamp
*
* FIXME
* - rtp timestamps are in the past or future +/- 1 day. ?
* - whitefilter payloads
* - seq numbers integrity
* - header integrity
* - ...
* - improve timestamp tick
*
* we assume first timestamp is correct ....
*/
import (
"context"
plogger "github.com/heytribe/go-plogger"
"github.com/heytribe/live-webrtcsignaling/srtp"
)
type PipelineNodeSanitizer struct {
PipelineNode
// I/O
In chan *srtp.PacketRTP
Out chan *srtp.PacketRTP
}
func NewPipelineNodeSanitizer() *PipelineNodeSanitizer {
n := new(PipelineNodeSanitizer)
n.In = make(chan *srtp.PacketRTP, 128)
n.Out = make(chan *srtp.PacketRTP, 128)
return n
}
func (n *PipelineNodeSanitizer) Run(ctx context.Context) {
var firstLoop bool = true
//var lastRtpTimestamp uint32
n.Running = true
n.emitStart()
log := plogger.FromContextSafe(ctx).Prefix("Sanitizer")
for {
select {
case <-ctx.Done():
n.onStop(ctx)
return
case packetRTP := <-n.In:
//currentTimestamp := packetRTP.GetTimestamp()
// checking timestamp integrity
if firstLoop {
firstLoop = false
} else {
// compare timestamp to old one
// timestamp can loop & be disordered
/*if (int64(currentTimestamp) < int64(lastRtpTimestamp)+500000 &&
int64(currentTimestamp) > int64(lastRtpTimestamp)-500000) ||
(currentTimestamp < 500000 && lastRtpTimestamp > 4294967295-500000) ||
(lastRtpTimestamp < 500000 && currentTimestamp > 4294967295-500000) {
// OK
} else {
log.Warnf("rtp timestamp out of bounds last=%d current=%d (PT=%d)", lastRtpTimestamp, currentTimestamp, packetRTP.GetPT())
break
}*/
}
// everything seems normal, proceed
select {
case n.Out <- packetRTP:
default:
log.Warnf("Out is full, dropping packet from In")
}
//lastRtpTimestamp = currentTimestamp
}
}
}