Xiph.Org issueshttps://gitlab.xiph.org/groups/xiph/-/issues2017-08-26T22:33:52Zhttps://gitlab.xiph.org/xiph/icecast-website/-/issues/695update the 3rd party application of icecast.2017-08-26T22:33:52Zkysucixupdate the 3rd party application of icecast.Freej http://freej.org is able to stream video and audio using an icecast server. The documentation is here: http://lab.dyne.org/FreejStreaming
| application | platform | dowload link |
|-------------|----------|--------------|
| freej |...Freej http://freej.org is able to stream video and audio using an icecast server. The documentation is here: http://lab.dyne.org/FreejStreaming
| application | platform | dowload link |
|-------------|----------|--------------|
| freej | unix | http://freej.org |
Could it be added to the 3rd party source client of icecast?
Also the Media Players That Support Icecast Streaming should be updated with:
| application | platform | dowload link |
|-------------|----------|--------------|
| mplayer | Windows 98/NT/2000/XP Unix Mac OSX | http://mplayerhq.hu |
| xine | Unix | http://xinehq.de |
| videlan | Windows 98/NT/2000/XP Unix Mac OSX | http://videolan.org |Gitlab BotGitlab Bothttps://gitlab.xiph.org/xiph/Infrastructure/-/issues/2231Update xiph.org/vorbis for gitlab2021-02-19T23:48:43ZRalph GilesUpdate xiph.org/vorbis for gitlabThe repo links still point to obsolete git.xiph.org, which has been down since the server crash.The repo links still point to obsolete git.xiph.org, which has been down since the server crash.https://gitlab.xiph.org/xiph/vorbis-tools/-/issues/588Updated fr.po file2005-07-11T10:42:54ZGitlab BotUpdated fr.po fileUpdated fr.po file for vorbis-tools-1.0.1 (never used trac before, how can I
attach my patch ?)Updated fr.po file for vorbis-tools-1.0.1 (never used trac before, how can I
attach my patch ?)Manuel LoraManuel Lorahttps://gitlab.xiph.org/xiph/icecast-website/-/issues/1797Updates for icecast '3rd Party Applications' list2017-08-26T22:33:52ZPhilipp SchafftUpdates for icecast '3rd Party Applications' listflum,
As I have not gotten any response I forward the mail to this bug tracker:
> [...]
> I'm asking you to update the list by adding two links for me, and by
> re-conssidering the names of the links in 'Download Link' column. There
> ...flum,
As I have not gotten any response I forward the mail to this bug tracker:
> [...]
> I'm asking you to update the list by adding two links for me, and by
> re-conssidering the names of the links in 'Download Link' column. There
> is one link which has a name while all others only show the URL.
>
> The two links I'm asking you to add are as follows:
> RoarAudio, Any OS, http://roaraudio.keep-cool.org/roaraudio.html
> RoarAudio PlayList Daemon, Any OS,
> http://roaraudio.keep-cool.org/rpld.html
> Those are independed products ans should have seperate links.
>
> rpld should go into 'Other Applications' (It can be source of data or
> player listening but does not do the streaming to icecast itself
> directly, so not a source client itself).
>
> RoarAudio itself should go into 'Source Clients' (It can in theory be in
> any of those sectios but I guess the first one is the one it fits best
> by number of use cases).
>
> If you need more infos or something don't hesitate to ask,
>
> Thank you very much for your help. :)Gitlab BotGitlab Bothttps://gitlab.xiph.org/xiph/icecast-server/-/issues/2179URL Auth with iOS not working correctly2017-10-05T10:40:40ZSebastianURL Auth with iOS not working correctlyHi guys,
when using an IOS device like iPad or iPhone the function "url_add_client" in the file "auth_url.c" seems not to forward all parameters correctly to the authentication system (in my case verify.php).
The username is missing as...Hi guys,
when using an IOS device like iPad or iPhone the function "url_add_client" in the file "auth_url.c" seems not to forward all parameters correctly to the authentication system (in my case verify.php).
The username is missing as you can see in the example below (PHP_AUTH_USER is empty).
After the initial "HTTP/1.0 401 Authentication Required" three GET requests are sent by mobile clients (Android, as well as iPhones or iPads). I checked that with Wireshark. On Android phones the username is never empty, that's why it is always working there.
On iPhones and iPads we have the result below.
The following data is captured from the requests of Icecast to the authentication system (verify.php).
Have a look at the cut off "HTTP_AUTHORIZATION" and the missing username in "PHP_AUTH_USER"
Do you have any idea what is going on there?
New request:
```
CONTENT_TYPE: application/x-www-form-urlencoded
CONTENT_LENGTH: 349
HTTP_USER_AGENT: Icecast 2.4.99.1
HTTP_HOST: www.domain.com
HTTP_AUTHORIZATION: Basic dm9sbDpob3JzdA==
HTTP_ACCEPT: */*
HTTP_CONTENT_TYPE: application/x-www-form-urlencoded
HTTP_CONTENT_LENGTH: 349
PHP_AUTH_USER: peter
PHP_AUTH_PW: pan
```
New request:
```
CONTENT_TYPE: application/x-www-form-urlencoded
CONTENT_LENGTH: 340
HTTP_USER_AGENT: Icecast 2.4.99.1
HTTP_HOST: www.domain.com
HTTP_AUTHORIZATION: Basic OmhvcnN0
HTTP_ACCEPT: */*
HTTP_CONTENT_TYPE: application/x-www-form-urlencoded
HTTP_CONTENT_LENGTH: 340
PHP_AUTH_USER:
PHP_AUTH_PW: pan
```
New request:
```
CONTENT_TYPE: application/x-www-form-urlencoded
CONTENT_LENGTH: 340
HTTP_USER_AGENT: Icecast 2.4.99.1
HTTP_HOST: www.domain.com
HTTP_AUTHORIZATION: Basic OmhvcnN0
HTTP_ACCEPT: */*
HTTP_CONTENT_TYPE: application/x-www-form-urlencoded
HTTP_CONTENT_LENGTH: 340
PHP_AUTH_USER:
PHP_AUTH_PW: pan
```
Marvin ScholzMarvin Scholzhttps://gitlab.xiph.org/xiph/icecast-server/-/issues/2192URL auth: override status code and send custom headers2018-09-28T15:04:52ZThomas B. RückerURL auth: override status code and send custom headersCurrently we're hardcoded to 401, if the backend refuses authentication. 403 might also be desireable or 30x with a _location_ header.
This needs two things:
* capability to set a custom status (including message)
* capability to send...Currently we're hardcoded to 401, if the backend refuses authentication. 403 might also be desireable or 30x with a _location_ header.
This needs two things:
* capability to set a custom status (including message)
* capability to send headers that will be forwarded to the client
The latter can also be used to set cookies, so is useful by itself.Icecast 2.5.0Thomas B. RückerThomas B. Rückerhttps://gitlab.xiph.org/xiph/icecast-server/-/issues/2370Url events don't work when an "action" option is configured2019-02-02T04:30:49Zspr0cketeerUrl events don't work when an "action" option is configured```
<event-bindings>
<event type="url" trigger="source-connect">
...
...
<option name="action" value="mount_add" />
```
Bug is in event_url.c:event_get_url()
https://gitlab.xiph.org/xiph/icecast-server/blob/master/s...```
<event-bindings>
<event type="url" trigger="source-connect">
...
...
<option name="action" value="mount_add" />
```
Bug is in event_url.c:event_get_url()
https://gitlab.xiph.org/xiph/icecast-server/blob/master/src/event_url.c#L134
Should be `free(self->action)` not `free(self->url)`https://gitlab.xiph.org/xiph/opus/-/issues/1968URL incorrect in celt/entdec.c2018-11-26T18:44:40ZTony WilsonURL incorrect in celt/entdec.cThe MMW98 pdf is in .../ee398a/... The MMW98 pdf is in .../ee398a/... Jean-Marc ValinJean-Marc Valinhttps://gitlab.xiph.org/xiph/icecast-server/-/issues/800URL listener authenticator2018-03-06T12:49:49ZDavidURL listener authenticatorYour URL auth is not working properly I used the examples in the domumentation altering my url and it does not auth. it just connects to the stream...In addtion with the basic orginal file admin control panel does not show the red key...
Your URL auth is not working properly I used the examples in the domumentation altering my url and it does not auth. it just connects to the stream...In addtion with the basic orginal file admin control panel does not show the red key...
Icecast 2.3Michael SmithMichael Smithhttps://gitlab.xiph.org/xiph/ezstream/-/issues/1223URL support for ezstream2017-08-03T06:12:53Zbrandon.casciURL support for ezstreamIt would be wonderful if ezstream could work with audio files from a url, remote or local, in addition to local files. This way you could stream files from anyplace, like a remote file store with http access.
It would be wonderful if ezstream could work with audio files from a url, remote or local, in addition to local files. This way you could stream files from anyplace, like a remote file store with http access.
Moritz GrimmMoritz Grimmhttps://gitlab.xiph.org/xiph/icecast-libshout/-/issues/2330URL-escaping ?=& in the mountpoint prevents mountpoints with query strings2022-04-09T19:27:00ZNiko DittmannURL-escaping ?=& in the mountpoint prevents mountpoints with query strings#11b83da8 breaks connecting to mountpoints with a query string.
We are running a libshout compatible streaming server (at least we try ;) ) which uses a query string parameter to set a priority for a source client. This way a newly conn...#11b83da8 breaks connecting to mountpoints with a query string.
We are running a libshout compatible streaming server (at least we try ;) ) which uses a query string parameter to set a priority for a source client. This way a newly connecting source client can auto-kick an existing source client by providing a higher priority. I only now realized that by updating from my old libshout 2.3.1 on debian to 2.4.3 on ubuntu query string get now escaped:
```
SOURCE /m1?prio=3 HTTP/1.0 "ices/0.4 libshout/2.3.1"
SOURCE /m1%3fprio%3d3 HTTP/1.0 "ices/0.4 libshout/2.4.3"
```
I realize that the exact semantics of "mountpoints" aren't formaly specified (or are they?) but this completely broke my expectation of a mount point basically just being the path of a URL.
I opened an [issue on github](https://github.com/xiph/Icecast-libshout/issues/22) before I found the repo here. I'm gonna close over there and refer to this issue here.https://gitlab.xiph.org/xiph/vorbis/-/issues/1800Use AC_CANONICAL_HOST for detecting cross-compilation environment2020-06-23T16:29:49ZMaarten BosmansUse AC_CANONICAL_HOST for detecting cross-compilation environmentAC_CANONICAL_HOST should be used instead of AC_CANONICAL_TARGET in configure.ac.
This is an issue in vorbis, theora and vorbis-tools.
The last two need a patch similar to https://trac.xiph.org/changeset/13007 and for vorbis/configure.ac...AC_CANONICAL_HOST should be used instead of AC_CANONICAL_TARGET in configure.ac.
This is an issue in vorbis, theora and vorbis-tools.
The last two need a patch similar to https://trac.xiph.org/changeset/13007 and for vorbis/configure.ac AC_CANONICAL_TARGET needs to be replaced by AC_CANONICAL_HOST
Monty MontgomeryMonty Montgomeryhttps://gitlab.xiph.org/xiph/icecast-server/-/issues/2363Use of `<shoutcast-compat>` results in unexpected behaviour2020-10-11T09:01:32ZPhilipp SchafftUse of `<shoutcast-compat>` results in unexpected behaviourWhen setting `<shoutcast-mount>` within `<listen-socket>` two sockets will be created:
* A normal one with the shoutcast mount set
* A second one at (`port` + 1) with shoutcast mount set as ICY source port (`<shoutcast-compat>` set).
Ho...When setting `<shoutcast-mount>` within `<listen-socket>` two sockets will be created:
* A normal one with the shoutcast mount set
* A second one at (`port` + 1) with shoutcast mount set as ICY source port (`<shoutcast-compat>` set).
However you can set `<shoutcast-compat>` manually. In this case also two ports are opened at `port` and `port` + 1 with both being identical in configuration.
The code uses the following condition to check if the extra socket must be created:
```c
if (listener->shoutcast_mount) {
```
However I think it should be:
```c
if (listener->shoutcast_mount && !listener->shoutcast_compat) {
```
This will prevent the listen socket on `port` + 1 to be created.Philipp SchafftPhilipp Schaffthttps://gitlab.xiph.org/xiph/icecast-server/-/issues/788Use proper function prototypes and declarations (1/2)2018-03-06T12:49:49ZgtgbrUse proper function prototypes and declarations (1/2)void foobar();
is not the same as
void foobar(void);
Fix those, and while around in auth.h, de-lint the enum.void foobar();
is not the same as
void foobar(void);
Fix those, and while around in auth.h, de-lint the enum.Michael SmithMichael Smithhttps://gitlab.xiph.org/xiph/icecast-server/-/issues/789Use proper function prototypes and declarations (2/2)2018-03-06T12:49:49ZgtgbrUse proper function prototypes and declarations (2/2)ANSI C requires function prototype and declaration to be of the same static'ness.ANSI C requires function prototype and declaration to be of the same static'ness.Michael SmithMichael Smithhttps://gitlab.xiph.org/xiph/icecast-server/-/issues/2096use setresuid()/setresgid() instead of setuid()/setgid()2018-03-06T12:49:47Zd26264b9use setresuid()/setresgid() instead of setuid()/setgid()We should be dropping privileges with setresuid()/setresgid() when requested as recommended by "Setuid Demystified" (http://www.cs.berkeley.edu/~daw/papers/setuid-usenix02.pdf).
Also, chdir("/") after chroot() and actually check for pro...We should be dropping privileges with setresuid()/setresgid() when requested as recommended by "Setuid Demystified" (http://www.cs.berkeley.edu/~daw/papers/setuid-usenix02.pdf).
Also, chdir("/") after chroot() and actually check for proper return values on both. This was modelled after OpenSSH's chroot() logic.
Tested on OpenBSD. Someone should try compiling/testing on Linux to verify. As far as I can tell, the proper syscalls are implemented on Linux as well.
```
--- src/main.c Mon May 5 18:29:06 2014
+++ src/main.c Thu Nov 27 18:55:34 2014
@@ -377,7 +377,7 @@
fprintf(stderr, "WARNING: Cannot change server root unless running as root.\n");
return;
}
- if(chroot(conf->base_dir))
+ if(chroot(conf->base_dir) == -1 || chdir("/") == -1)
{
fprintf(stderr,"WARNING: Couldn't change server root: %s\n", strerror(errno));
return;
@@ -398,7 +398,7 @@
}
if(uid != (uid_t)-1 && gid != (gid_t)-1) {
- if(!setgid(gid))
+ if(!setresgid(gid, gid, gid))
fprintf(stdout, "Changed groupid to %i.\n", (int)gid);
else
fprintf(stdout, "Error changing groupid: %s.\n", strerror(errno));
@@ -406,7 +406,7 @@
fprintf(stdout, "Changed supplementary groups based on user: %s.\n", conf->user);
else
fprintf(stdout, "Error changing supplementary groups: %s.\n", strerror(errno));
- if(!setuid(uid))
+ if(!setresuid(uid, uid, uid))
fprintf(stdout, "Changed userid to %i.\n", (int)uid);
else
fprintf(stdout, "Error changing userid: %s.\n", strerror(errno));
```
Philipp SchafftPhilipp Schaffthttps://gitlab.xiph.org/xiph/icecast-libshout/-/issues/2312Use-after-free bug after reopening connection2020-10-21T08:50:27ZAlexander MilosUse-after-free bug after reopening connectionHello,
There have recently been some issues when using libshout in combination with MPD (the Music Player Daemon) which, after some investigation in collaboration with the author of MPD, have apparently been tracked to a bug in libshout...Hello,
There have recently been some issues when using libshout in combination with MPD (the Music Player Daemon) which, after some investigation in collaboration with the author of MPD, have apparently been tracked to a bug in libshout. MPD's author reported the issue but did so on your GitHub mirror, so in case you may have missed it I saw fit to report it here as well.
The gist of that bug report is as follows:
"Since libshout 2.4.2, the library crashes due to a use-after-free and double-free bug if an application reopens the connection using shout_open() after a previous connection with the same shout_t had been closed by shout_close().
See [MusicPlayerDaemon/MPD#622](https://github.com/MusicPlayerDaemon/MPD/issues/622) for details and valgrind logs.
The crash bug was introduced by commit 3110fe32"
The original bug report is here: [xiph/Icecast-libshout#17](https://github.com/xiph/Icecast-libshout/issues/17)Philipp SchafftPhilipp Schaffthttps://gitlab.xiph.org/xiph/Infrastructure/-/issues/38user directories incompatible with the mirrors2018-05-14T02:24:00ZGhost Useruser directories incompatible with the mirrors```
We've traditionally had unofficial stuff at http://(www.)xiph.org/~user/ but
this has broken since we went to a mirror system.
It doesn't make sense to mirror these directories, so the proposal is that we
create http://people.xiph.o...```
We've traditionally had unofficial stuff at http://(www.)xiph.org/~user/ but
this has broken since we went to a mirror system.
It doesn't make sense to mirror these directories, so the proposal is that we
create http://people.xiph.org/~user/ which is a cname for wherever the main user
account machine is.
To support the many existing links to home directories; we should ask the
mirrors to redirect UserDir requests.
Monty also had a significant amount of personal stuff under
http://xiph.org/xiphmont/ that needs to be similarly redirected.
```Gitlab BotGitlab Bothttps://gitlab.xiph.org/xiph/icecast-ices/-/issues/2207Username option missing in the docs2017-11-05T22:14:58ZMarvin ScholzUsername option missing in the docsThe docs do not mention the `<username>` parameter at all but should.The docs do not mention the `<username>` parameter at all but should.Thomas B. RückerThomas B. Rückerhttps://gitlab.xiph.org/xiph/vorbis-tools/-/issues/99UTF-8 encoding fails to act usefully for any non-US-ASCII characters2006-06-12T11:41:20ZgumbootUTF-8 encoding fails to act usefully for any non-US-ASCII characters```
By default it replaces everything odd with '#'. If I hack up oggenc.c to call convert_set_charset("ISO-8859-1") then it replaces everything with '?' instead; in that case iconvert() returns 0 (success) rather than indicating that it...```
By default it replaces everything odd with '#'. If I hack up oggenc.c to call convert_set_charset("ISO-8859-1") then it replaces everything with '?' instead; in that case iconvert() returns 0 (success) rather than indicating that it has failed, replacing characters inappropriately.
```Michael SmithMichael Smith