connection.c 55.9 KB
Newer Older
1 2 3 4 5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7 8 9 10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
12
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13 14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16 17 18 19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20 21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24 25 26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28 29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30 31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

Marvin Scholz's avatar
Marvin Scholz committed
36 37 38 39
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
40

41 42
#include "compat.h"
#include "connection.h"
43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44 45
#include "global.h"
#include "util.h"
46
#include "refobject.h"
Jack Moffitt's avatar
Jack Moffitt committed
47 48
#include "refbuf.h"
#include "client.h"
49
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
50 51
#include "stats.h"
#include "logging.h"
52
#include "fserve.h"
53
#include "slave.h"
54

Jack Moffitt's avatar
Jack Moffitt committed
55
#include "source.h"
56
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
57
#include "auth.h"
58
#include "matchfile.h"
59
#include "tls.h"
60
#include "acl.h"
Jack Moffitt's avatar
Jack Moffitt committed
61 62 63

#define CATMODULE "connection"

64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

79 80 81 82 83
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int stream_offset;
    int shoutcast;
84
    char *shoutcast_mount;
85 86
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
87

88
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
89
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
90 91
static int _initialized = 0;

92 93
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
94
static volatile client_queue_t *_body_queue = NULL, **_body_queue_tail = &_body_queue;
95
static int tls_ok;
96
static tls_ctx_t *tls_ctx;
97

98
/* filtering client connection based on IP */
99
static matchfile_t *banned_ip, *allowed_ip;
100

101
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
102

103
static void _handle_connection(void);
104
static void get_tls_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
105 106 107

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
108 109
    if (_initialized)
        return;
110

111
    thread_spin_create (&_connection_lock);
112
    thread_mutex_create(&move_clients_mutex);
113
    thread_rwlock_create(&_source_shutdown_rwlock);
114
    thread_cond_create(&global.shutdown_cond);
115 116 117 118
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
119 120
    _body_queue = NULL;
    _body_queue_tail = &_body_queue;
Jack Moffitt's avatar
Jack Moffitt committed
121

122
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
123 124 125 126
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
127 128
    if (!_initialized)
        return;
129

130
    tls_ctx_unref(tls_ctx);
131 132 133
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
134
    thread_cond_destroy(&global.shutdown_cond);
135
    thread_rwlock_destroy(&_source_shutdown_rwlock);
136
    thread_spin_destroy (&_connection_lock);
137
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
138

139
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
140 141
}

142
void connection_reread_config(ice_config_t *config)
143
{
144
    get_tls_certificate(config);
145 146
}

Jack Moffitt's avatar
Jack Moffitt committed
147 148
static unsigned long _next_connection_id(void)
{
149
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
150

151
    thread_spin_lock(&_connection_lock);
152
    id = _current_id++;
153
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
154

155
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
156 157
}

158

159
#ifdef ICECAST_CAP_TLS
160
static void get_tls_certificate(ice_config_t *config)
161
{
162 163
    const char *keyfile;

164
    config->tls_ok = tls_ok = 0;
165

166 167 168 169
    keyfile = config->tls_context.key_file;
    if (!keyfile)
        keyfile = config->tls_context.cert_file;

170
    tls_ctx_unref(tls_ctx);
171
    tls_ctx = tls_ctx_new(config->tls_context.cert_file, keyfile, config->tls_context.cipher_list);
172 173
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
174
        return;
175 176
    }

177
    config->tls_ok = tls_ok = 1;
178 179 180
}


181
/* handlers for reading and writing a connection_t when there is TLS
182 183
 * configured on the listening port
 */
184
static int connection_read_tls(connection_t *con, void *buf, size_t len)
185
{
186
    ssize_t bytes = tls_read(con->tls, buf, len);
187

Marvin Scholz's avatar
Marvin Scholz committed
188
    if (bytes < 0) {
189
        if (tls_want_io(con->tls) > 0)
190
            return -1;
191 192 193 194 195
        con->error = 1;
    }
    return bytes;
}

196
static int connection_send_tls(connection_t *con, const void *buf, size_t len)
197
{
198
    ssize_t bytes = tls_write(con->tls, buf, len);
199

Marvin Scholz's avatar
Marvin Scholz committed
200
    if (bytes < 0) {
201 202
        if (tls_want_io(con->tls) > 0)
            return -1;
203
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
204
    } else {
205
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
206
    }
207 208 209 210
    return bytes;
}
#else

211 212
/* TLS not compiled in, so at least log it */
static void get_tls_certificate(ice_config_t *config)
213
{
214
    tls_ok = 0;
215
    ICECAST_LOG_INFO("No TLS capability. "
Philipp Schafft's avatar
Philipp Schafft committed
216
                     "Rebuild Icecast with OpenSSL support to enable this.");
217
}
218
#endif /* ICECAST_CAP_TLS */
219 220 221 222 223


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
224
static int connection_read(connection_t *con, void *buf, size_t len)
225
{
Marvin Scholz's avatar
Marvin Scholz committed
226
    int bytes = sock_read_bytes(con->sock, buf, len);
227 228
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
229
    if (bytes == -1 && !sock_recoverable(sock_error()))
230 231 232 233
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
234
static int connection_send(connection_t *con, const void *buf, size_t len)
235
{
Marvin Scholz's avatar
Marvin Scholz committed
236 237 238
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
239
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
240
    } else {
241
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
242
    }
243 244 245
    return bytes;
}

246 247
connection_t *connection_create (sock_t sock, sock_t serversock, char *ip)
{
248
    connection_t *con;
249
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
250 251
    if (con) {
        con->sock       = sock;
252
        con->serversock = serversock;
Marvin Scholz's avatar
Marvin Scholz committed
253 254 255
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
256
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
257 258
        con->read       = connection_read;
        con->send       = connection_send;
259
    }
Michael Smith's avatar
Michael Smith committed
260

261
    return con;
262 263
}

264
/* prepare connection for interacting over a TLS connection
265
 */
266
void connection_uses_tls(connection_t *con)
267
{
268
#ifdef ICECAST_CAP_TLS
269
    if (con->tls)
270 271
        return;

272 273 274 275 276 277
    if (con->readbufferlen) {
        ICECAST_LOG_ERROR("Connection is now using TLS but has data put back. BAD. Discarding putback data.");
        free(con->readbuffer);
        con->readbufferlen = 0;
    }

278
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
279 280
    con->read = connection_read_tls;
    con->send = connection_send_tls;
281 282 283
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
284 285 286
#endif
}

287 288
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
289 290 291 292 293 294 295 296
    ssize_t done = 0;
    ssize_t ret;

    if (con->readbufferlen) {
        ICECAST_LOG_DEBUG("On connection %p we read from putback buffer, filled with %zu bytes, requested are %zu bytes", con, con->readbufferlen, len);
        if (len >= con->readbufferlen) {
            memcpy(buf, con->readbuffer, con->readbufferlen);
            free(con->readbuffer);
297
            ICECAST_LOG_DEBUG("New fill in buffer=<empty>");
298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353
            if (len == con->readbufferlen) {
                con->readbufferlen = 0;
                return len;
            } else {
                len -= con->readbufferlen;
                buf += con->readbufferlen;
                done = con->readbufferlen;
                con->readbufferlen = 0;
            }
        } else {
            memcpy(buf, con->readbuffer, len);
            memmove(con->readbuffer, con->readbuffer+len, con->readbufferlen-len);
            con->readbufferlen -= len;
            return len;
        }
    }

    ret = con->read(con, buf, len);

    if (ret < 0) {
        if (done == 0) {
            return ret;
        } else {
            return done;
        }
    }

    return done + ret;
}

int connection_read_put_back(connection_t *con, const void *buf, size_t len)
{
    void *n;

    if (con->readbufferlen) {
        n = realloc(con->readbuffer, con->readbufferlen + len);
        if (!n)
            return -1;

        memcpy(n + con->readbufferlen, buf, len);
        con->readbuffer = n;
        con->readbufferlen += len;

        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    } else {
        n = malloc(len);
        if (!n)
            return -1;

        memcpy(n, buf, len);
        con->readbuffer = n;
        con->readbufferlen = len;
        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    }
354 355
}

356
static sock_t wait_for_serversock(int timeout)
357 358
{
#ifdef HAVE_POLL
359
    struct pollfd ufds [global.server_sockets];
360 361 362 363 364 365 366 367 368 369
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
370
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
371
    } else if(ret == 0) {
372
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
373
    } else {
374
        int dst;
375
        for(i=0; i < global.server_sockets; i++) {
376
            if(ufds[i].revents & POLLIN)
377
                return ufds[i].fd;
Marvin Scholz's avatar
Marvin Scholz committed
378 379
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL)) {
                if (ufds[i].revents & (POLLHUP|POLLERR)) {
380
                    sock_close (global.serversock[i]);
381
                    ICECAST_LOG_WARN("Had to close a listening socket");
382
                }
383
                global.serversock[i] = SOCK_ERROR;
384
            }
385
        }
386
        /* remove any closed sockets */
Marvin Scholz's avatar
Marvin Scholz committed
387
        for(i=0, dst=0; i < global.server_sockets; i++) {
388
            if (global.serversock[i] == SOCK_ERROR)
389
            continue;
390
            if (i!=dst)
391
            global.serversock[dst] = global.serversock[i];
392 393 394
            dst++;
        }
        global.server_sockets = dst;
395
        return SOCK_ERROR;
396 397 398 399 400
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
401
    sock_t max = SOCK_ERROR;
402 403 404 405 406

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
407
        if (max == SOCK_ERROR || global.serversock[i] > max)
408 409 410 411 412
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
413
        tv.tv_usec = (timeout % 1000) * 1000;
414 415 416 417 418
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
419
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
420
    } else if(ret == 0) {
421
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
422
    } else {
423 424 425 426
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
427
        return SOCK_ERROR; /* Should be impossible, stop compiler warnings */
428 429 430 431
    }
#endif
}

432
static connection_t *_accept_connection(int duration)
Jack Moffitt's avatar
Jack Moffitt committed
433
{
434
    sock_t sock, serversock;
435
    char *ip;
Jack Moffitt's avatar
Jack Moffitt committed
436

437
    serversock = wait_for_serversock (duration);
438
    if (serversock == SOCK_ERROR)
439
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
440

441 442
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
443

444
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
Marvin Scholz's avatar
Marvin Scholz committed
445
    if (sock != SOCK_ERROR) {
446
        connection_t *con = NULL;
447
        /* Make any IPv4 mapped IPv6 address look like a normal IPv4 address */
Marvin Scholz's avatar
Marvin Scholz committed
448 449
        if (strncmp(ip, "::ffff:", 7) == 0)
            memmove(ip, ip+7, strlen (ip+7)+1);
Jack Moffitt's avatar
Jack Moffitt committed
450

451 452
        if (matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
            con = connection_create (sock, serversock, ip);
453 454
        if (con)
            return con;
Marvin Scholz's avatar
Marvin Scholz committed
455 456 457
        sock_close(sock);
    } else {
        if (!sock_recoverable(sock_error())) {
458
            ICECAST_LOG_WARN("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
Marvin Scholz's avatar
Marvin Scholz committed
459
            thread_sleep(500000);
460
        }
461 462 463
    }
    free(ip);
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
464 465 466
}


467 468 469 470
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
471
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
472
{
473
    thread_spin_lock(&_connection_lock);
474
    *_con_queue_tail = node;
475 476
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
477 478 479
}


480 481 482 483 484 485
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
486

Marvin Scholz's avatar
Marvin Scholz committed
487
    thread_spin_lock(&_connection_lock);
488

Marvin Scholz's avatar
Marvin Scholz committed
489
    if (_con_queue){
490 491 492 493
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
494
        node->next = NULL;
495
    }
496

Marvin Scholz's avatar
Marvin Scholz committed
497
    thread_spin_unlock(&_connection_lock);
498 499
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
500 501


502
/* run along queue checking for any data that has come in or a timeout */
503
static void process_request_queue (void)
504 505
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
506 507 508 509 510 511
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
512
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
513

Marvin Scholz's avatar
Marvin Scholz committed
514
    while (*node_ref) {
515 516 517 518
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
519

520
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO || client->con->tlsmode == ICECAST_TLSMODE_AUTO_NO_PLAIN) {
521 522
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
523
                    connection_uses_tls(client->con);
524 525 526 527
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
528 529
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
530
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
531 532 533
            } else {
                len = client_read_bytes(client, buf, len);
            }
534
        }
Jack Moffitt's avatar
Jack Moffitt committed
535

Marvin Scholz's avatar
Marvin Scholz committed
536
        if (len > 0) {
537 538 539
            int pass_it = 1;
            char *ptr;

540 541
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
542
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
543 544 545
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
546
                    /* password line */
547 548
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
549 550 551 552 553 554 555
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
556 557
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
558 559 560
                    node->stream_offset = (ptr+6) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
561 562
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
563 564 565
                    node->stream_offset = (ptr+4) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
566 567
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
568 569 570 571 572
                    node->stream_offset = (ptr+2) - client->refbuf->data;
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
573

Marvin Scholz's avatar
Marvin Scholz committed
574
            if (pass_it) {
575 576 577 578
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
579
                _add_connection(node);
580
                continue;
581
            }
Marvin Scholz's avatar
Marvin Scholz committed
582 583
        } else {
            if (len == 0 || client->con->error) {
584 585 586
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
587 588
                client_destroy(client);
                free(node);
589 590 591 592
                continue;
            }
        }
        node_ref = &node->next;
593
    }
594
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
595 596
}

597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613
/* add client to body queue.
 */
static void _add_body_client(client_queue_t *node)
{
    ICECAST_LOG_DEBUG("Putting client %p in body queue.", node->client);

    thread_spin_lock(&_connection_lock);
    *_body_queue_tail = node;
    _body_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
}


/* This queue reads data from the body of clients. */
static void process_request_body_queue (void)
{
    client_queue_t **node_ref = (client_queue_t **)&_body_queue;
614 615 616
    ice_config_t *config;
    time_t timeout;
    size_t body_size_limit;
617 618 619 620 621

    ICECAST_LOG_DEBUG("Processing body queue.");

    ICECAST_LOG_DEBUG("_body_queue=%p, &_body_queue=%p, _body_queue_tail=%p", _body_queue, &_body_queue, _body_queue_tail);

622 623 624 625 626
    config = config_get_config();
    timeout = time(NULL) - config->body_timeout;
    body_size_limit = config->body_size_limit;
    config_release_config();

627 628 629 630 631 632 633 634 635
    while (*node_ref) {
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        client_slurp_result_t res;

        ICECAST_LOG_DEBUG("Got client %p in body queue.", client);

        res = client_body_skip(client);

636
        if (res != CLIENT_SLURP_NEEDS_MORE_DATA || client->con->con_time <= timeout || client->request_body_read >= body_size_limit) {
637 638 639 640 641 642 643 644 645 646 647 648
            ICECAST_LOG_DEBUG("Putting client %p back in connection queue.", client);

            if ((client_queue_t **)_body_queue_tail == &(node->next))
                _body_queue_tail = (volatile client_queue_t **)node_ref;
            *node_ref = node->next;
            node->next = NULL;
            _add_connection(node);
            continue;
        }
        node_ref = &node->next;
    }
}
649

650 651 652
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
653
static void _add_request_queue(client_queue_t *node)
654 655 656
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
657 658
}

659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
    ice_config_t *config;
    listener_t *listener;

    if (!node)
        return NULL;

    node->client = client;

    config = config_get_config();
    listener = config_get_listen_sock(config, client->con);

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
676 677
        client->con->tlsmode = listener->tls;
        if (listener->tls == ICECAST_TLSMODE_RFC2818 && tls_ok)
678
            connection_uses_tls(client->con);
679 680 681 682 683 684 685 686
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    config_release_config();

    return node;
}
687

688 689 690 691 692 693 694 695
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
696
        client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_LIMIT);
697 698 699 700 701 702 703 704 705 706
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
707
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
708 709 710 711 712 713 714 715 716 717 718 719 720 721 722
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
723
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
724
{
725
    connection_t *con;
726
    ice_config_t *config;
727
    int duration = 300;
728

Marvin Scholz's avatar
Marvin Scholz committed
729
    config = config_get_config();
730
    get_tls_certificate(config);
Marvin Scholz's avatar
Marvin Scholz committed
731
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
732

Marvin Scholz's avatar
Marvin Scholz committed
733
    while (global.running == ICECAST_RUNNING) {
734
        con = _accept_connection (duration);
735

Marvin Scholz's avatar
Marvin Scholz committed
736
        if (con) {
737
            connection_queue(con);
738
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
739
        } else {
740 741
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
742
        }
Marvin Scholz's avatar
Marvin Scholz committed
743
        process_request_queue();
744
        process_request_body_queue();
745
    }
Jack Moffitt's avatar
Jack Moffitt committed
746

747 748 749
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

750 751 752
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
753 754
}

755 756 757

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
758
 */
Marvin Scholz's avatar
Marvin Scholz committed
759
int connection_complete_source(source_t *source, int response)
760
{
761
    ice_config_t *config;
762

Marvin Scholz's avatar
Marvin Scholz committed
763
    global_lock();
764
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
765

766
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
767
    if (global.sources < config->source_limit) {
768
        const char *contenttype;
769
        mount_proxy *mountinfo;
770 771 772 773
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
774 775
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
776

Marvin Scholz's avatar
Marvin Scholz committed
777
            if (format_type == FORMAT_ERROR) {
778
                config_release_config();
779
                global_unlock();
780
                if (response) {
781
                    client_send_error_by_id(source->client, ICECAST_ERROR_CON_CONTENT_TYPE_NOSYS);
782 783
                    source->client = NULL;
                }
784
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
785 786
                return -1;
            }
787 788 789 790
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
791
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_NO_CONTENT_TYPE_GIVEN);
792 793 794 795 796 797 798 799
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
800
            format_type = FORMAT_TYPE_GENERIC;
801 802
        }

Marvin Scholz's avatar
Marvin Scholz committed
803
        if (format_get_plugin (format_type, source) < 0) {
804 805
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
806
            if (response) {
807
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_INTERNAL_FORMAT_ALLOC_ERROR);
808 809
                source->client = NULL;
            }
810
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
811 812 813
            return -1;
        }

814
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
815
        stats_event_args(NULL, "sources", "%d", global.sources);
816
        global_unlock();
817

818
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
819 820
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
821
        config_release_config();
822
        slave_rebuild_mounts();
823 824

        source->shutdown_rwlock = &_source_shutdown_rwlock;
825
        ICECAST_LOG_DEBUG("source is ready to start");
826 827 828

        return 0;
    }
829
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
830
        "reached %d", global.sources);
831 832 833 834

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
835
    if (response) {
836
        client_send_error_by_id(source->client, ICECAST_ERROR_CON_SOURCE_CLIENT_LIMIT);
837 838
        source->client = NULL;
    }
839 840 841 842

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
843
static inline void source_startup(client_t *client, const char *uri)
844 845
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
846
    source = source_reserve(uri);
847

Marvin Scholz's avatar
Marvin Scholz committed
848
    if (source) {
849
        source->client = client;
850 851
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
852 853 854
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
855 856 857
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
858 859 860 861
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
862
            client_send_bytes(client, "OK2\r\nicy-caps:11\r\n\r\n", 20); /* TODO: Replace Magic Number! */
863
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
864
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
865
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
866
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
867
            const char *expectcontinue;
868
            const char *transfer_encoding;
869
            int status_to_send = 200;
870
            ssize_t ret;
871

872 873 874 875
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
876
                    client_send_error_by_id(client, ICECAST_ERROR_CON_UNIMPLEMENTED);
877 878 879 880
                    return;
                }
            }

881 882 883 884 885 886 887
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
888
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
889 890 891 892 893 894 895
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

896
            client->respcode = 200;
897 898
            ret = util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, NULL, NULL, client);
            snprintf(ok->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Length: 0\r\n\r\n");
Marvin Scholz's avatar
Marvin Scholz committed
899
            ok->len = strlen(ok->data);
Karl Heyes's avatar