Files
gortsplib/client_tunnel_websocket.go
Alessandro Ros 9cee396d33 expose DialTLSContext and TLSListen (#1037)
these allows to intercept unencrypted packets.
2026-03-31 20:58:41 +02:00

91 lines
1.8 KiB
Go

package gortsplib
import (
"context"
"crypto/tls"
"io"
"net"
"time"
"github.com/gorilla/websocket"
)
type clientTunnelWebSocket struct {
wconn *websocket.Conn
r io.Reader
w io.Writer
}
func (tu *clientTunnelWebSocket) Read(b []byte) (int, error) {
return tu.r.Read(b)
}
func (tu *clientTunnelWebSocket) Write(b []byte) (int, error) {
return tu.w.Write(b)
}
func (tu *clientTunnelWebSocket) Close() error {
return tu.wconn.Close()
}
func (tu *clientTunnelWebSocket) LocalAddr() net.Addr {
return tu.wconn.LocalAddr()
}
func (tu *clientTunnelWebSocket) RemoteAddr() net.Addr {
return tu.wconn.RemoteAddr()
}
func (tu *clientTunnelWebSocket) SetDeadline(_ time.Time) error {
return nil
}
func (tu *clientTunnelWebSocket) SetReadDeadline(t time.Time) error {
return tu.wconn.SetReadDeadline(t)
}
func (tu *clientTunnelWebSocket) SetWriteDeadline(t time.Time) error {
return tu.wconn.SetWriteDeadline(t)
}
func newClientTunnelWebSocket(
ctx context.Context,
addr string,
secure bool,
tlsConfig *tls.Config,
dialContext func(ctx context.Context, network, address string) (net.Conn, error),
dialTLSContext func(ctx context.Context, network string, addr string) (net.Conn, error),
) (net.Conn, error) {
c := &clientTunnelWebSocket{}
var ur string
if secure {
ur = "wss"
} else {
ur = "ws"
}
ur += "://" + addr + "/"
dialer := &websocket.Dialer{
Subprotocols: []string{"rtsp.onvif.org"},
}
if secure && dialTLSContext != nil {
dialer.NetDialTLSContext = dialTLSContext
} else {
dialer.NetDialContext = dialContext
dialer.TLSClientConfig = tlsConfig
}
var err error
c.wconn, _, err = dialer.DialContext(ctx, ur, nil) //nolint:bodyclose
if err != nil {
return nil, err
}
c.r = &wsReader{wc: c.wconn}
c.w = &wsWriter{wc: c.wconn}
return c, nil
}