vdo.ninja/misc/iframe.js
Steve Seguin 43ee28b9d4 Syncing codebase /w Production's v4 Release
Some of the notable changes revolve around fixing issues with the Group Chat, refining the UX/UI, adding stream iso-recording, enabling camera zooming on Android, and allowing users to select multiple audio sources, disable audio, or disable the video.

Change list

    Audio can be disabled and/or mixed with more than one audio input device

    video can be disabled, allowing for audio-only publishing

    avatar silhouette takes the place of a stream without a video

    Some Android cameras can now zoom-in with a swipe up action.

    The Create Invite Link option lets you select some advanced parameters, like bitrate and stereo, in a very easy way.

    reduced the size of the preview window ; for camera and screens hare

    made all OBS/invite links easier to copy, dragged into OBS v25, and seleced.

    Most OBS/invite links can be right clicked to access custom menu

    copy to clipboard links that are clicked

    Viewers in Group Chat can magnify and increase the bitrate of one video at a time.

    Pseudo-Fullscreen works in group chat now

    Room names can be accessed via https://obs.ninja/myroomnamehere

    You can record videos via the group control room; selectable bitrates. webm Format

    filename of recorded files is the timestamp of the ended recording time; milliseconds

    new iOS error messages

    firefox shows camera labels now

    Add a "secure" mode that increases verbosity and prevents a stream being accessed more than once

    electron app interface works with the production code

    It is harder to hit 'ready to go', before the camera is actually ready

    expanded help information in a less annoying way

    if you deny Screen-share permissions, it will let you try again without a page refresh

    Custom generated invite links, if dragged into OBS v25, will be named according to the given label

    Got rid of the cartoon cat; too much visual complexity

    Numerous UX changes to the Control Room page

    Codec remains set at VP8, but progress in OBS has made on its issues.

    Added a new TURN video relay server to US West (LA). I've also increased the capacity of the existing US-Central server. 16x more capacity over all.

    Video Control bar hidden in more cases; or delayed in showing

    Increased readability of some fonts

    Improved mobile layout and accessibility

    Mute/Unmute button has been made more secure

    No need to toggle mute in group chat to get the audio to work

    pressing enter on input fields auto submits; no clicking needed

    Dynamic bitrates improved

    Group automixer improved a bit

    no-cursor option works with Electron app now

    cleaned up the Error page in OBS if it fails to load a video; no more 'leaked' streamIDs

    renamed streamid, permaid, and roomid. They are now room, push, and view. backwards compatible tho still.

    Invite to Room page is more mobile friendly and clean; less noise

    iPad Pro treated like an iOS device; limits resolution to 720p

    rounded corners of the big buttons because "looks more modern". ;/

    Updated Licence and added a CLA

    Added translations / languages via a template system

    electron-app improvements, such as the ability to select OUTPUT AUDIO Destination

    Fixed a few bugs reported over the last few days, since production release

    and many others that I likely forgot about
2020-05-10 03:43:55 -04:00

466 lines
19 KiB
JavaScript

var Ooblex = {}; // Based the WebRTC and Signaling code off some of my open-source project, ooblex.com, hence the name.
Ooblex.Media = new (function(){
var session = {};
session.viewonly = false;;
function onSuccess(){};
function onError(err){alert(err);};
function defer(){
var res, rej;
var promise = new Promise((resolve, reject) => {
res = resolve;
rej = reject;
});
promise.resolve = res;
promise.reject = rej;
return promise;
}
[{urls:["stun:turnserver.appearin.net:443"]}]
var configuration = {
iceServers: [{urls:["stun:turnserver.appearin.net:443"]},{ urls: ["stun:stun1.l.google.com:19302", "stun:stun2.l.google.com:19305" ] }]
};
session.generateStreamID = function(){
var text = "";
var possible = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
for (var i = 0; i < 12; i++){
text += possible.charAt(Math.floor(Math.random() * possible.length));
}
return text;
};
session.connect = function(){
// navigator.mediaDevices.getUserMedia({audio: true});
session.streamID = session.generateStreamID();
session.pcs = {};
session.streamSrc = null;
session.msg = null;
session.keys = {};
session.counter=0;
session.keys.enc = new TextEncoder("utf-8");
session.ws = new WebSocket("wss://api.steves.app:8443");
session.ws.onopen = function(){
console.log("connected to video server");
if (session.msg!==null){
session.ws.send(JSON.stringify(session.msg));
session.msg = null;
}
}
session.generateCrypto = function(){
window.crypto.subtle.generateKey({
name: "RSASSA-PKCS1-v1_5",
modulusLength: 512, //can be 1024, 2048, or 4096 -- also apparently 512!
publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
hash: {name: "SHA-1"}, //can be "SHA-1", "SHA-256", "SHA-384", or "SHA-512"
},
true, //whether the key is extractable (i.e. can be used in exportKey)
["sign", "verify"] //can be any combination of "sign" and "verify"
).then(function(key){
console.log(key.publicKey);
console.log(key.privateKey);
key.enc = new TextEncoder("utf-8"); // needed for string to array buffer encoding
session.keys = key;
window.crypto.subtle.exportKey(
"jwk", //can be "jwk" (public or private), "spki" (public only), or "pkcs8" (private only)
key.publicKey //can be a publicKey or privateKey, as long as extractable was true
).then(function(keydata){
//returns the exported key data
console.log(keydata);
var data = {};
data.request = "storekey";
data.key = keydata.n;
session.sendMsg(data);
//console.log(JSON.stringify(data));
//session.signData("asdfasdfasdf");
}).catch(function(err){
console.error(err);
});
})
.catch(function(err){
console.error(err);
});
}
session.importCrypto = function(n){
window.crypto.subtle.importKey(
"jwk", //can be "jwk" (public or private), "spki" (public only), or "pkcs8" (private only)
{ //this is an example jwk key, other key types are Uint8Array objects
kty: "RSA",
e: "AQAB",
n: n,
alg: "RS1",
ext: true,
},
{ //these are the algorithm options
name: "RSASSA-PKCS1-v1_5",
hash: {name: "SHA-1"}, //can be "SHA-1", "SHA-256", "SHA-384", or "SHA-512"
},
true, //whether the key is extractable (i.e. can be used in exportKey)
["verify"] //"verify" for public key import, "sign" for private key imports
).then(function(publicKey){
//returns a publicKey (or privateKey if you are importing a private key)
console.log(publicKey);
session.keys.publicKey = publicKey;
session.keys.privateKey = null;
}).catch(function(err){
console.error(err);
});
}
session.signData = function(data,callback){ // data as string
if (session.keys === {}){
console.log("Generate Some Crypto keys first");
}
window.crypto.subtle.sign(
{
name: "RSASSA-PKCS1-v1_5",
},
session.keys.privateKey, //from generateKey or importKey above
session.keys.enc.encode(data) //ArrayBuffer of data you want to sign
).then(function(signature){
//returns an ArrayBuffer containing the signature
signature = new Uint8Array(signature);
signature = signature.reduce((str, byte) => str + byte.toString(16).padStart(2, '0'), '');
//signature = new Uint8Array(signature.match(/.{1,2}/g).map(byte => parseInt(byte, 16)));
//console.log(signature);
callback(data,signature);
console.log(JSON.stringify(signature));
}).catch(function(err){
console.error(err);
});
};
session.verifyData = function(data){
data.signature = new Uint8Array(data.signature.match(/.{1,2}/g).map(byte => parseInt(byte, 16)));
if (session.keys.publicKey){
window.crypto.subtle.verify({
name: "RSASSA-PKCS1-v1_5",
},
session.keys.publicKey, //from generateKey or importKey above
data.signature, //ArrayBuffer of the signature
session.keys.enc.encode(data.data) //ArrayBuffer of the data
).then(function(isvalid){
//returns a boolean on whether the signature is true or not
console.log(isvalid);
}).catch(function(err){
console.error(err);
alert("Could not validate inbound connection");
});
}
}
session.sendMsg = function(msg){
if (session.ws.readyState !== 1){session.msg = msg;}
else {session.ws.send(JSON.stringify(msg));}
}
session.watchStream = function(streamID){
session.streamID = streamID;
var data = {};
data.request = "play";
data.streamID = session.streamID;
session.sendMsg(data);
}
session.listStreams = function(){
console.log("send this shit");
var data = {};
data.request = "list";
session.sendMsg(data);
session.listPromise = defer();
return session.listPromise;
}
session.graphStreams = function(){
console.log("graph this shit");
var data = {};
data.request = "graph";
session.sendMsg(data);
session.graphPromise = defer();
return session.graphPromise;
}
session.ws.onmessage = function (evt) {
var msg = JSON.parse(evt.data);
if (msg.request){ // ACTIONS THAT ARE OUTSIDE THE SCOPE OF BASIC WEBRTC
if (msg.request=="offerSDP"){ // newly connected client is asking for your SDP offer
session.offerSDP(session.streamSrc, msg.UUID);
} else if (msg.request=="listing"){
console.log(msg.list);
session.listPromise.resolve(msg.list);
} else if (msg.request=="graph"){
console.log(msg.graph);
session.graphPromise.resolve(msg.graph);
} else if (msg.request=="genkey"){
session.generateCrypto();
} else if (msg.request=="publickey"){
session.importCrypto(msg.key);
}
} else if (msg.description){
console.log(msg.description);
// var ttt=true;
//if (msg.UUID in session.pcs)(ttt=false);
session.setupPeer(msg.UUID); // could end up setting up the peer the wrong way.
session.pcs[msg.UUID].setRemoteDescription(msg.description).then(function(){ // description, onSuccess, onError
if (session.pcs[msg.UUID].remoteDescription.type === 'offer'){ // When receiving an offer/video lets answer it
session.pcs[msg.UUID].createAnswer().then(function(description){ // creating answer
return session.pcs[msg.UUID].setLocalDescription(description);
}).then(function(){
console.log("providing answer");
var data = {};
data.UUID = msg.UUID;
data.description = session.pcs[msg.UUID].localDescription; // send our updated self identify
session.sendMsg(data);
var data = {};
data.request = "getkey"
session.sendMsg(data);
}).catch(onError);
} else if (session.pcs[msg.UUID].remoteDescription.type === 'answer'){ // someone responded to one of our answers; they presumably requested an offerSDP
//if (ttt){
//session.pcs[msg.UUID].createOffer().then(function(description){
// session.pcs[msg.UUID].setLocalDescription(description).then(function(){
// console.log("publishing SDP Offer");
// var data = {};
// data.description = session.pcs[msg.UUID].localDescription;
// data.UUID = msg.UUID;
// session.ws.send(JSON.stringify(data));
// }).catch(onError);
// }).catch(onError);
// }
// I AM A SEEDER OR PUBLISHER -- PUSHING DATA.
//
// I DONT WNAT EVERYONE DOING THIS. JUST THE ORIGINAL PUBLISHER. I WANT THEM INSTEAD TO JUST FORWARD AND DECODE.
// VALIDATE MESSAGES , FORWARD, thats it. maybe some data about connection and parents.
// Hold conenction open, not send data -- just check out how the latency is.
// CHECK FOR CHAT EMSSAGES; surface them if any
// SHOUDL CHAT BE TWO DIRECTIONAL? SEEMS LIKE WAY TOO MUCH STRESS. SO NO.
if (!session.timer){
console.log("sending data string every 5 seconds");
session.timer = setInterval(function(){
session.signData(Date.now().toString()+":"+session.counter,function(data,signature){
session.counter += 1;
for (i in session.pcs){
console.log(i);
try{
session.pcs[i].sendChannel.send(JSON.stringify({data,signature}));
} catch(e){
console.log("RTC Connection seems to be dead? is it? If it is, or can't be validated, close this shit");
session.pcs[i].close();
delete(session.pcs[i]);
}
}
})
// SIGN DATA HERE -- session.signData
// // unsign data on recieve; mark as unverified if no key to match with.
},5000);
} /// testing p2p data channels -- perhaps for sending SYNC, quality, blockchina, or EVENT data.
//console.log("Already set description for answer");
//session.pcs[msg.UUID].setRemoteDescription(msg.description, function(){ // register their response and I assume start pubilshing (publishing)
//console.log("THIS IS GOOD! If it fails now, maybe an localhost/SSL issue?");
//session.pcs[UUID].createAnswer().then(function(description){
// console.log("SDP ANSWSER MADE!!");
// session.pcs[UUID].setLocalDescription(description, function (){
// console.log("providing answer");session.pcs[msg.UUID].remoteDescription.type === 'offer'
// var data = {};
// data.request = "publish";
// data.UUID = UUID;
// data.description = session.pcs[UUID].localDescription;
// session.sendMsg(data);
// }).catch(onError);
//}, onError);
}
}).catch(onError);
} else if (msg.candidate){
console.log("add ice candidate");
session.pcs[msg.UUID].addIceCandidate(msg.candidate).then(function(){console.log("added ICE from viewer");}).catch(onError);
} else if (msg.request == "cleanup"){
console.log("Clean up");
if (msg.UUID in session.pcs){
console.log("problem");
session.pcs[msg.UUID].close();
delete(session.pcs[msg.UUID]);
// I'll have to figure out where to reconnect somewhere else
//var data = {};
//data.request = "play";
//data.streamID = session.streamID;
//session.sendMsg(data);
}
} else { console.log("what is this?",msg); }
}
session.ws.onclose = function(){console.log("ws closed");alert("We lost our connection to the server. Refresh")};
};
session.offerSDP = function(stream,UUID){ // publisher/offerer
if (UUID in session.pcs){alert("PROBLEM! RESENDING SDP OFFER SHOULD NOT HAPPEN");}
else {console.log("Create a new RTC connection; offering SDP on request");}
session.pcs[UUID] = new RTCPeerConnection(configuration);
session.pcs[UUID].sendChannel = session.pcs[UUID].createDataChannel("sendChannel");
stream.getTracks().forEach(track => session.pcs[UUID].addTrack(track, stream));
session.pcs[UUID].ontrack = event => {alert("Publisher is being sent a video stream??? NOT EXPECTED!")};
session.pcs[UUID].onicecandidate = function(event){
console.log("CREATE ICE");
if (event.candidate==null){return;}
var data = {};
data.UUID = UUID;
data.candidate = event.candidate;
session.sendMsg(data);
};
session.pcs[UUID].oniceconnectionstatechange = function() {
try{
if (session.pcs[UUID].iceConnectionState == 'disconnected') {
console.log(UUID,'Disconnected');
session.pcs[UUID].close()
delete(session.pcs[UUID]);
} else if (session.pcs[UUID].iceConnectionState == 'failed') {
alert('Could not make WebRTC connection');
session.pcs[UUID].close()
delete(session.pcs[UUID]);
}
}
catch(e){}
}
//session.pcs[UUID].onnegotiationneeded = function(){ // bug: https://groups.google.com/forum/#!topic/discuss-webrtc/3-TmyjQ2SeE
session.pcs[UUID].createOffer().then(function(description){
session.pcs[UUID].setLocalDescription(description).then(function(){
console.log("publishing SDP Offer");
var data = {};
data.description = session.pcs[UUID].localDescription;
data.UUID = UUID;
session.ws.send(JSON.stringify(data));
}).catch(onError);
}).catch(onError);
//};
//session.pcs[UUID].sendChannel = session.pcs[UUID].createDataChannel("sendChannel");
session.pcs[UUID].onclose = function(){
console.log("WebRTC Connection Closed",UUID);
delete(session.pcs[UUID]);
};
session.pcs[UUID].onopen = function(){console.log("WEBRTC CONNECTION OPEN",UUID);};
};
session.setupPeer = function(UUID){ // ingesting stream as a viewer
if (UUID in session.pcs){console.log("RTC connection is ALREADY ready; we can already accept answers");return;} // already exists
else {console.log("MAKING A NEW RTC CONNECTION");}
session.pcs[UUID] = new RTCPeerConnection(configuration);
session.pcs[UUID].addTransceiver('video', { direction: 'recvonly'});
session.pcs[UUID].onclose = function(event){
console.log("rpc closed");
delete(session.pcs[UUID]);
var data = {};
data.request = "play";
data.streamID = session.streamID;
session.sendMsg(data);
session.streamSrc==null;
}
session.pcs[UUID].onicecandidate = function(event){
console.log("CREATE ICE");
if (event.candidate==null){console.log("null ice");return;}
var data = {};
data.UUID = UUID;
data.candidate = event.candidate;
session.sendMsg(data);
console.log(data);
};
session.pcs[UUID].oniceconnectionstatechange = function() {
try{
if (session.pcs[UUID].iceConnectionState == 'disconnected') {
console.log(UUID,'Disconnected');
session.pcs[UUID].close()
delete(session.pcs[UUID]);
}} catch (E){}
}
session.pcs[UUID].ondatachannel = function(event){ // recieve data from peer; event data maybe
session.pcs[UUID].receiveChannel = event.channel;
session.pcs[UUID].receiveChannel.onmessage = function(e){console.log("recieved data: "+e.data);session.verifyData(JSON.parse(e.data));};
session.pcs[UUID].receiveChannel.onopen = function(){console.log("data channel opened")};
session.pcs[UUID].receiveChannel.onclose = function(){console.log("datachannel closed");};
};
session.pcs[UUID].ontrack = event => {
console.log("streams:",event.streams);
console.log(event.streams[0].getVideoTracks());
console.log(event.streams[0].getAudioTracks());
const stream = event.streams[0];
session.streamSrc = stream;
if (document.getElementById("videosource")){
console.log("new track added to mediastream");
var v = document.getElementById("videosource");
v.autoplay = true;
v.controls = true;
v.muted = true;
v.setAttribute("playsinline","");
v.srcObject = stream;
var m = document.getElementById("mainmenu");
try {m.remove();} catch(e){}
} else {
console.log("video element is being created and media track added");
var v = document.createElement("video");
document.body.appendChild(v);
v.autoplay = true;
v.controls = true;
v.muted = true;
v.id = "videosource"; // could be set to UUID in the future
v.setAttribute("playsinline","");
v.style = "width:100vw;";
if (!v.srcObject || v.srcObject.id !== stream.id) {
v.srcObject = stream;
}
//stream.getTracks().forEach(track => {
// console.log("Remote track", track)
//});
// v.onloadedmetadata = (e) => {
// console.log("Remote video play");
// v.play().then(() => { console.log("Remote video playing") }).catch((e) => { console.log(e) });
// }
// Time to become a seeder now that it's all working
if (session.viewonly == false){
var data = {};
data.request = "seed";
data.streamID = session.streamID;
session.sendMsg(data);
console.log("OPEN TO SEEDING NOW: "+session.streamID);
}
}
}
console.log("setup peer complete");
};
return session;
})();