package main import ( "bufio" "encoding/json" "errors" "fmt" "html" "io" "log" "net/http" "net/url" "os" "path" "path/filepath" "strings" "time" "github.com/gorilla/websocket" ) func webserver() { http.Handle("/", mungeHandler{http.FileServer(http.Dir(staticRoot))}) http.HandleFunc("/group/", func(w http.ResponseWriter, r *http.Request) { mungeHeader(w) http.ServeFile(w, r, staticRoot+"/sfu.html") }) http.HandleFunc("/recordings", func(w http.ResponseWriter, r *http.Request) { http.Redirect(w, r, "/recordings/", http.StatusPermanentRedirect) }) http.HandleFunc("/recordings/", recordingsHandler) http.HandleFunc("/ws", wsHandler) http.HandleFunc("/public-groups.json", publicHandler) http.HandleFunc("/stats", statsHandler) go func() { server := &http.Server{ Addr: httpAddr, ReadHeaderTimeout: 60 * time.Second, IdleTimeout: 120 * time.Second, } var err error err = server.ListenAndServeTLS( filepath.Join(dataDir, "cert.pem"), filepath.Join(dataDir, "key.pem"), ) if err != nil { log.Printf("ListenAndServeTLS: %v", err) } }() } func mungeHeader(w http.ResponseWriter) { w.Header().Add("Content-Security-Policy", "connect-src ws: wss: 'self'; img-src data: 'self'; default-src 'self'") } type mungeHandler struct { h http.Handler } func (h mungeHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) { mungeHeader(w) h.h.ServeHTTP(w, r) } func publicHandler(w http.ResponseWriter, r *http.Request) { w.Header().Set("content-type", "application/json") w.Header().Set("cache-control", "no-cache") if r.Method == "HEAD" { return } g := getPublicGroups() e := json.NewEncoder(w) e.Encode(g) return } func getPassword() (string, string, error) { f, err := os.Open(filepath.Join(dataDir, "passwd")) if err != nil { return "", "", err } defer f.Close() r := bufio.NewReader(f) s, err := r.ReadString('\n') if err != nil { return "", "", err } l := strings.SplitN(strings.TrimSpace(s), ":", 2) if len(l) != 2 { return "", "", errors.New("couldn't parse passwords") } return l[0], l[1], nil } func failAuthentication(w http.ResponseWriter, realm string) { w.Header().Set("www-authenticate", fmt.Sprintf("basic realm=\"%v\"", realm)) http.Error(w, "Haha!", http.StatusUnauthorized) } func statsHandler(w http.ResponseWriter, r *http.Request) { u, p, err := getPassword() if err != nil { log.Printf("Passwd: %v", err) failAuthentication(w, "stats") return } username, password, ok := r.BasicAuth() if !ok || username != u || password != p { failAuthentication(w, "stats") return } w.Header().Set("content-type", "text/html; charset=utf-8") w.Header().Set("cache-control", "no-cache") if r.Method == "HEAD" { return } stats := getGroupStats() fmt.Fprintf(w, "\n\n") fmt.Fprintf(w, "Stats\n") fmt.Fprintf(w, "") fmt.Fprintf(w, "\n") printBitrate := func(w io.Writer, rate, maxRate uint64) error { var err error if maxRate != 0 && maxRate != ^uint64(0) { _, err = fmt.Fprintf(w, "%v/%v", rate, maxRate) } else { _, err = fmt.Fprintf(w, "%v", rate) } return err } printTrack := func(w io.Writer, t trackStats) { fmt.Fprintf(w, "") fmt.Fprintf(w, "") printBitrate(w, t.bitrate, t.maxBitrate) fmt.Fprintf(w, "") fmt.Fprintf(w, "%d%%", t.loss, ) fmt.Fprintf(w, "") if t.rtt > 0 { fmt.Fprintf(w, "%v", t.rtt) } if t.jitter > 0 { fmt.Fprintf(w, "±%v", t.jitter) } fmt.Fprintf(w, "") fmt.Fprintf(w, "") } for _, gs := range stats { fmt.Fprintf(w, "

%v

\n", html.EscapeString(gs.name)) fmt.Fprintf(w, "") for _, cs := range gs.clients { fmt.Fprintf(w, "\n", cs.id) for _, up := range cs.up { fmt.Fprintf(w, "", up.id) if up.maxBitrate > 0 { fmt.Fprintf(w, "", up.maxBitrate) } fmt.Fprintf(w, "\n") for _, t := range up.tracks { printTrack(w, t) } } for _, down := range cs.down { fmt.Fprintf(w, "", down.id) if down.maxBitrate > 0 { fmt.Fprintf(w, "", down.maxBitrate) } fmt.Fprintf(w, "\n") for _, t := range down.tracks { printTrack(w, t) } } } fmt.Fprintf(w, "
%v
Up%v%v
Down %v%v
\n") } fmt.Fprintf(w, "\n") } var upgrader websocket.Upgrader func wsHandler(w http.ResponseWriter, r *http.Request) { conn, err := upgrader.Upgrade(w, r, nil) if err != nil { log.Printf("Websocket upgrade: %v", err) return } go func() { err := startClient(conn) if err != nil { log.Printf("client: %v", err) } }() } func recordingsHandler(w http.ResponseWriter, r *http.Request) { if len(r.URL.Path) < 12 || r.URL.Path[:12] != "/recordings/" { http.Error(w, "server error", http.StatusInternalServerError) return } pth := r.URL.Path[12:] if pth == "" { http.Error(w, "nothing to see", http.StatusNotImplemented) return } f, err := os.Open(filepath.Join(recordingsDir, pth)) if err != nil { if os.IsNotExist(err) { http.NotFound(w, r) } else { http.Error(w, "server error", http.StatusInternalServerError) } return } defer f.Close() fi, err := f.Stat() if err != nil { http.Error(w, "server error", http.StatusInternalServerError) return } if fi.IsDir() { if pth[len(pth)-1] != '/' { http.Redirect(w, r, r.URL.Path+"/", http.StatusPermanentRedirect) return } ok := checkGroupPermissions(w, r, path.Dir(pth)) if !ok { failAuthentication(w, "recordings/"+path.Dir(pth)) return } if r.Method == "POST" { handleGroupAction(w, r, path.Dir(pth)) } else { serveGroupRecordings(w, r, f, path.Dir(pth)) } } else { ok := checkGroupPermissions(w, r, path.Dir(pth)) if !ok { failAuthentication(w, "recordings/"+path.Dir(pth)) return } http.ServeContent(w, r, r.URL.Path, fi.ModTime(), f) } } func handleGroupAction(w http.ResponseWriter, r *http.Request, group string) { if r.Method != "POST" { http.Error(w, "method not allowed", http.StatusMethodNotAllowed) return } err := r.ParseForm() if err != nil { http.Error(w, "couldn't parse request", http.StatusBadRequest) return } q := r.Form.Get("q") switch q { case "delete": filename := r.Form.Get("filename") if group == "" || filename == "" { http.Error(w, "no filename provided", http.StatusBadRequest) return } err := os.Remove( filepath.Join(recordingsDir, group+"/"+filename), ) if err != nil { if os.IsPermission(err) { http.Error(w, "unauthorized", http.StatusForbidden) } else { http.Error(w, "server error", http.StatusInternalServerError) } return } http.Redirect(w, r, "/recordings/"+group+"/", http.StatusSeeOther) return default: http.Error(w, "unknown query", http.StatusBadRequest) } } func checkGroupPermissions(w http.ResponseWriter, r *http.Request, group string) bool { desc, err := getDescription(group) if err != nil { return false } user, pass, ok := r.BasicAuth() if !ok { return false } p, err := getPermission(desc, user, pass) if err != nil || !p.Record { return false } return true } func serveGroupRecordings(w http.ResponseWriter, r *http.Request, f *os.File, group string) { fis, err := f.Readdir(-1) if err != nil { http.Error(w, "server error", http.StatusInternalServerError) return } w.Header().Set("content-type", "text/html; charset=utf-8") w.Header().Set("cache-control", "no-cache") if r.Method == "HEAD" { return } fmt.Fprintf(w, "\n\n") fmt.Fprintf(w, "Recordings for group %v\n", group) fmt.Fprintf(w, "") fmt.Fprintf(w, "\n") fmt.Fprintf(w, "\n") for _, fi := range fis { if fi.IsDir() { continue } fmt.Fprintf(w, "", html.EscapeString(fi.Name()), html.EscapeString(fi.Name()), fi.Size(), ) fmt.Fprintf(w, "\n", url.PathEscape(group), fi.Name()) } fmt.Fprintf(w, "
%v%d
"+ ""+ "
\n") fmt.Fprintf(w, "\n") }