connection.c 46.1 KB
Newer Older
1 2 3 4 5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7 8 9 10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11 12
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
 * Copyright 2011-2014, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13 14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16 17 18 19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20 21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24 25 26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28 29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30 31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

36
#include "compat.h"
Jack Moffitt's avatar
Jack Moffitt committed
37

Marvin Scholz's avatar
Marvin Scholz committed
38 39 40 41
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
42

43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44 45 46 47 48 49 50
#include "global.h"
#include "util.h"
#include "connection.h"
#include "refbuf.h"
#include "client.h"
#include "stats.h"
#include "logging.h"
51
#include "xslt.h"
52
#include "fserve.h"
53
#include "sighandler.h"
54 55

#include "yp.h"
Jack Moffitt's avatar
Jack Moffitt committed
56
#include "source.h"
57
#include "format.h"
58
#include "format_mp3.h"
59
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
60
#include "auth.h"
61
#include "matchfile.h"
62
#include "tls.h"
Jack Moffitt's avatar
Jack Moffitt committed
63 64 65

#define CATMODULE "connection"

66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

81 82 83 84 85
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int stream_offset;
    int shoutcast;
86
    char *shoutcast_mount;
87 88
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
89 90

typedef struct _thread_queue_tag {
91 92
    thread_type *thread_id;
    struct _thread_queue_tag *next;
Jack Moffitt's avatar
Jack Moffitt committed
93 94
} thread_queue_t;

95
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
96
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
97 98
static int _initialized = 0;

99 100
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
101
static int ssl_ok;
102
static tls_ctx_t *tls_ctx;
103

104
/* filtering client connection based on IP */
105
static matchfile_t *banned_ip, *allowed_ip;
106

107
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
108

109
static void _handle_connection(void);
110
static void get_ssl_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
111 112 113

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
114 115
    if (_initialized)
        return;
116

117
    thread_spin_create (&_connection_lock);
118
    thread_mutex_create(&move_clients_mutex);
119
    thread_rwlock_create(&_source_shutdown_rwlock);
120
    thread_cond_create(&global.shutdown_cond);
121 122 123 124
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
Jack Moffitt's avatar
Jack Moffitt committed
125

126
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
127 128 129 130
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
131 132
    if (!_initialized)
        return;
133

134
    tls_ctx_unref(tls_ctx);
135 136 137
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
138
    thread_cond_destroy(&global.shutdown_cond);
139
    thread_rwlock_destroy(&_source_shutdown_rwlock);
140
    thread_spin_destroy (&_connection_lock);
141
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
142

143
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
144 145
}

146 147 148 149 150
void connection_reread_config(struct ice_config_tag *config)
{
    get_ssl_certificate(config);
}

Jack Moffitt's avatar
Jack Moffitt committed
151 152
static unsigned long _next_connection_id(void)
{
153
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
154

155
    thread_spin_lock(&_connection_lock);
156
    id = _current_id++;
157
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
158

159
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
160 161
}

162

163
#ifdef ICECAST_CAP_TLS
Marvin Scholz's avatar
Marvin Scholz committed
164
static void get_ssl_certificate(ice_config_t *config)
165
{
166
    config->tls_ok = ssl_ok = 0;
167

168 169 170 171
    tls_ctx_unref(tls_ctx);
    tls_ctx = tls_ctx_new(config->cert_file, config->cert_file, config->cipher_list);
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
172
        return;
173 174 175
    }

    config->tls_ok = ssl_ok = 1;
176 177 178 179 180 181
}


/* handlers for reading and writing a connection_t when there is ssl
 * configured on the listening port
 */
Marvin Scholz's avatar
Marvin Scholz committed
182
static int connection_read_ssl(connection_t *con, void *buf, size_t len)
183
{
184
    ssize_t bytes = tls_read(con->tls, buf, len);
185

Marvin Scholz's avatar
Marvin Scholz committed
186
    if (bytes < 0) {
187
        if (tls_want_io(con->tls) > 0)
188
            return -1;
189 190 191 192 193
        con->error = 1;
    }
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
194
static int connection_send_ssl(connection_t *con, const void *buf, size_t len)
195
{
196
    ssize_t bytes = tls_write(con->tls, buf, len);
197

Marvin Scholz's avatar
Marvin Scholz committed
198
    if (bytes < 0) {
199 200
        if (tls_want_io(con->tls) > 0)
            return -1;
201
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
202
    } else {
203
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
204
    }
205 206 207 208 209
    return bytes;
}
#else

/* SSL not compiled in, so at least log it */
210
static void get_ssl_certificate(ice_config_t *config)
211 212
{
    ssl_ok = 0;
213 214
    ICECAST_LOG_INFO("No TLS capability. "
                     "Rebuild Icecast with openSSL support to enable this.");
215
}
216
#endif /* ICECAST_CAP_TLS */
217 218 219 220 221


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
222
static int connection_read(connection_t *con, void *buf, size_t len)
223
{
Marvin Scholz's avatar
Marvin Scholz committed
224
    int bytes = sock_read_bytes(con->sock, buf, len);
225 226
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
227
    if (bytes == -1 && !sock_recoverable(sock_error()))
228 229 230 231
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
232
static int connection_send(connection_t *con, const void *buf, size_t len)
233
{
Marvin Scholz's avatar
Marvin Scholz committed
234 235 236
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
237
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
238
    } else {
239
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
240
    }
241 242 243
    return bytes;
}

244 245
connection_t *connection_create (sock_t sock, sock_t serversock, char *ip)
{
246
    connection_t *con;
247
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
248 249
    if (con) {
        con->sock       = sock;
250
        con->serversock = serversock;
Marvin Scholz's avatar
Marvin Scholz committed
251 252 253
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
254
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
255 256
        con->read       = connection_read;
        con->send       = connection_send;
257
    }
258

259
    return con;
260 261
}

262 263
/* prepare connection for interacting over a SSL connection
 */
264
void connection_uses_ssl(connection_t *con)
265
{
266
#ifdef ICECAST_CAP_TLS
267
    if (con->tls)
268 269
        return;

270
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
271 272
    con->read = connection_read_ssl;
    con->send = connection_send_ssl;
273 274 275
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
276 277 278
#endif
}

279 280 281 282 283
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
    return con->read(con, buf, len);
}

284
static sock_t wait_for_serversock(int timeout)
285 286
{
#ifdef HAVE_POLL
287
    struct pollfd ufds [global.server_sockets];
288 289 290 291 292 293 294 295 296 297
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
298
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
299
    } else if(ret == 0) {
300
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
301
    } else {
302
        int dst;
303
        for(i=0; i < global.server_sockets; i++) {
304
            if(ufds[i].revents & POLLIN)
305
                return ufds[i].fd;
Marvin Scholz's avatar
Marvin Scholz committed
306 307
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL)) {
                if (ufds[i].revents & (POLLHUP|POLLERR)) {
308
                    sock_close (global.serversock[i]);
309
                    ICECAST_LOG_WARN("Had to close a listening socket");
310
                }
311
                global.serversock[i] = SOCK_ERROR;
312
            }
313
        }
314
        /* remove any closed sockets */
Marvin Scholz's avatar
Marvin Scholz committed
315
        for(i=0, dst=0; i < global.server_sockets; i++) {
316
            if (global.serversock[i] == SOCK_ERROR)
317
            continue;
318
            if (i!=dst)
319
            global.serversock[dst] = global.serversock[i];
320 321 322
            dst++;
        }
        global.server_sockets = dst;
323
        return SOCK_ERROR;
324 325 326 327 328
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
329
    sock_t max = SOCK_ERROR;
330 331 332 333 334

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
335
        if (max == SOCK_ERROR || global.serversock[i] > max)
336 337 338 339 340
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
341
        tv.tv_usec = (timeout % 1000) * 1000;
342 343 344 345 346
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
347
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
348
    } else if(ret == 0) {
349
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
350
    } else {
351 352 353 354
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
355
        return SOCK_ERROR; /* Should be impossible, stop compiler warnings */
356 357 358 359
    }
#endif
}

360
static connection_t *_accept_connection(int duration)
Jack Moffitt's avatar
Jack Moffitt committed
361
{
362
    sock_t sock, serversock;
363
    char *ip;
Jack Moffitt's avatar
Jack Moffitt committed
364

365
    serversock = wait_for_serversock (duration);
366
    if (serversock == SOCK_ERROR)
367
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
368

369 370
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
371

372
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
Marvin Scholz's avatar
Marvin Scholz committed
373
    if (sock != SOCK_ERROR) {
374
        connection_t *con = NULL;
375
        /* Make any IPv4 mapped IPv6 address look like a normal IPv4 address */
Marvin Scholz's avatar
Marvin Scholz committed
376 377
        if (strncmp(ip, "::ffff:", 7) == 0)
            memmove(ip, ip+7, strlen (ip+7)+1);
Jack Moffitt's avatar
Jack Moffitt committed
378

379 380
        if (matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
            con = connection_create (sock, serversock, ip);
381 382
        if (con)
            return con;
Marvin Scholz's avatar
Marvin Scholz committed
383 384 385
        sock_close(sock);
    } else {
        if (!sock_recoverable(sock_error())) {
386
            ICECAST_LOG_WARN("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
Marvin Scholz's avatar
Marvin Scholz committed
387
            thread_sleep(500000);
388
        }
389 390 391
    }
    free(ip);
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
392 393 394
}


395 396 397 398
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
399
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
400
{
401
    thread_spin_lock(&_connection_lock);
402
    *_con_queue_tail = node;
403 404
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
405 406 407
}


408 409 410 411 412 413
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
414

Marvin Scholz's avatar
Marvin Scholz committed
415
    thread_spin_lock(&_connection_lock);
416

Marvin Scholz's avatar
Marvin Scholz committed
417
    if (_con_queue){
418 419 420 421
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
422
        node->next = NULL;
423
    }
424

Marvin Scholz's avatar
Marvin Scholz committed
425
    thread_spin_unlock(&_connection_lock);
426 427
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
428 429


430
/* run along queue checking for any data that has come in or a timeout */
431
static void process_request_queue (void)
432 433
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
434 435 436 437 438 439
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
440
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
441

Marvin Scholz's avatar
Marvin Scholz committed
442
    while (*node_ref) {
443 444 445 446
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
447

448 449 450 451 452 453 454 455
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO) {
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
                    connection_uses_ssl(client->con);
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
456 457
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
458
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
459 460 461
            } else {
                len = client_read_bytes(client, buf, len);
            }
462
        }
Jack Moffitt's avatar
Jack Moffitt committed
463

Marvin Scholz's avatar
Marvin Scholz committed
464
        if (len > 0) {
465 466 467
            int pass_it = 1;
            char *ptr;

468 469
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
470
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
471 472 473
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
474
                    /* password line */
475 476
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
477 478 479 480 481 482 483
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
484 485
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
486 487 488
                    node->stream_offset = (ptr+6) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
489 490
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
491 492 493
                    node->stream_offset = (ptr+4) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
494 495
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
496 497 498 499 500
                    node->stream_offset = (ptr+2) - client->refbuf->data;
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
501

Marvin Scholz's avatar
Marvin Scholz committed
502
            if (pass_it) {
503 504 505 506
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
507
                _add_connection(node);
508
                continue;
509
            }
Marvin Scholz's avatar
Marvin Scholz committed
510 511
        } else {
            if (len == 0 || client->con->error) {
512 513 514
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
515 516
                client_destroy(client);
                free(node);
517 518 519 520
                continue;
            }
        }
        node_ref = &node->next;
521
    }
522
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
523 524
}

525

526 527 528
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
529
static void _add_request_queue(client_queue_t *node)
530 531 532
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
533 534
}

535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
    ice_config_t *config;
    listener_t *listener;

    if (!node)
        return NULL;

    node->client = client;

    config = config_get_config();
    listener = config_get_listen_sock(config, client->con);

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
        if (listener->ssl && ssl_ok)
            connection_uses_ssl(client->con);
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    config_release_config();

    return node;
}
562

563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
        client_send_error(client, 403, 1, "Icecast connection limit reached");
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
582
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
583 584 585 586 587 588 589 590 591 592 593 594 595 596 597
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
598
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
599
{
600
    connection_t *con;
601
    ice_config_t *config;
602
    int duration = 300;
603

Marvin Scholz's avatar
Marvin Scholz committed
604 605 606
    config = config_get_config();
    get_ssl_certificate(config);
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
607

Marvin Scholz's avatar
Marvin Scholz committed
608
    while (global.running == ICECAST_RUNNING) {
609
        con = _accept_connection (duration);
610

Marvin Scholz's avatar
Marvin Scholz committed
611
        if (con) {
612
            connection_queue(con);
613
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
614
        } else {
615 616
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
617
        }
Marvin Scholz's avatar
Marvin Scholz committed
618
        process_request_queue();
619
    }
Jack Moffitt's avatar
Jack Moffitt committed
620

621 622 623
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

624 625 626
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
627 628
}

629 630 631

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
632
 */
Marvin Scholz's avatar
Marvin Scholz committed
633
int connection_complete_source(source_t *source, int response)
634
{
635
    ice_config_t *config;
636

Marvin Scholz's avatar
Marvin Scholz committed
637
    global_lock();
638
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
639

640
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
641
    if (global.sources < config->source_limit) {
642
        const char *contenttype;
643
        mount_proxy *mountinfo;
644 645 646 647
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
648 649
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
650

Marvin Scholz's avatar
Marvin Scholz committed
651
            if (format_type == FORMAT_ERROR) {
652
                config_release_config();
653
                global_unlock();
654
                if (response) {
655
                    client_send_error(source->client, 403, 1, "Content-type not supported");
656 657
                    source->client = NULL;
                }
658
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
659 660
                return -1;
            }
661 662 663 664
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
665
                client_send_error(source->client, 403, 1, "No Content-type given");
666 667 668 669 670 671 672 673
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
674
            format_type = FORMAT_TYPE_GENERIC;
675 676
        }

Marvin Scholz's avatar
Marvin Scholz committed
677
        if (format_get_plugin (format_type, source) < 0) {
678 679
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
680
            if (response) {
681
                client_send_error(source->client, 403, 1, "internal format allocation problem");
682 683
                source->client = NULL;
            }
684
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
685 686 687
            return -1;
        }

688
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
689
        stats_event_args(NULL, "sources", "%d", global.sources);
690
        global_unlock();
691

692
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
693 694
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
695
        config_release_config();
696
        slave_rebuild_mounts();
697 698

        source->shutdown_rwlock = &_source_shutdown_rwlock;
699
        ICECAST_LOG_DEBUG("source is ready to start");
700 701 702

        return 0;
    }
703
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
704
        "reached %d", global.sources);
705 706 707 708

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
709
    if (response) {
710
        client_send_error(source->client, 403, 1, "too many sources connected");
711 712
        source->client = NULL;
    }
713 714 715 716

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
717
static inline void source_startup(client_t *client, const char *uri)
718 719
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
720
    source = source_reserve(uri);
721

Marvin Scholz's avatar
Marvin Scholz committed
722
    if (source) {
723
        source->client = client;
724 725
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
726 727 728
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
729 730 731
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
732 733 734 735 736
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
            sock_write (client->con->sock, "OK2\r\nicy-caps:11\r\n\r\n");
737
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
738
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
739
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
740
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
741
            const char *expectcontinue;
742
            const char *transfer_encoding;
743 744
            int status_to_send = 200;

745 746 747 748 749 750 751 752 753
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
                    client_send_error(client, 501, 1, "Unimplemented");
                    return;
                }
            }

754 755 756 757 758 759 760
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
761
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
762 763 764 765 766 767 768
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

769
            client->respcode = 200;
770
            util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, "", NULL, client);
Marvin Scholz's avatar
Marvin Scholz committed
771
            ok->len = strlen(ok->data);
772 773 774
            /* we may have unprocessed data read in, so don't overwrite it */
            ok->associated = client->refbuf;
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
775
            fserve_add_client_callback(client, source_client_callback, source);
776
        }
Marvin Scholz's avatar
Marvin Scholz committed
777
    } else {
778
        client_send_error(client, 403, 1, "Mountpoint in use");
779
        ICECAST_LOG_WARN("Mountpoint %s in use", uri);
780
    }
781 782
}

Philipp Schafft's avatar
Philipp Schafft committed
783
/* only called for native icecast source clients */
Marvin Scholz's avatar
Marvin Scholz committed
784
static void _handle_source_request(client_t *client, const char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
785
{
786 787
    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" from %s as role %s",
        uri, client->con->ip, client->role);
788

Marvin Scholz's avatar
Marvin Scholz committed
789
    if (uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
790 791
        ICECAST_LOG_WARN("source mountpoint not starting with /");
        client_send_error(client, 400, 1, "source mountpoint not starting with /");
792
        return;
793
    }
794

Philipp Schafft's avatar
Philipp Schafft committed
795 796 797 798
    source_startup(client, uri);
}


Marvin Scholz's avatar
Marvin Scholz committed
799
static void _handle_stats_request(client_t *client, char *uri)
Philipp Schafft's avatar
Philipp Schafft committed
800 801 802
{
    stats_event_inc(NULL, "stats_connections");

803
    client->respcode = 200;
804
    snprintf (client->refbuf->data, PER_CLIENT_REFBUF_SIZE,
Marvin Scholz's avatar
Marvin Scholz committed
805 806 807
        "HTTP/1.0 200 OK\r\n\r\n");
    client->refbuf->len = strlen(client->refbuf->data);
    fserve_add_client_callback(client, stats_callback, NULL);
808 809
}

Philipp Schafft's avatar
Philipp Schafft committed
810 811 812
/* if 0 is returned then the client should not be touched, however if -1
 * is returned then the caller is responsible for handling the client
 */
Marvin Scholz's avatar
Marvin Scholz committed
813
static int __add_listener_to_source(source_t *source, client_t *client)
814
{
Philipp Schafft's avatar
Philipp Schafft committed
815
    size_t loop = 10;
816

Marvin Scholz's avatar
Marvin Scholz committed
817
    do {
Philipp Schafft's avatar
Philipp Schafft committed
818
        ICECAST_LOG_DEBUG("max on %s is %ld (cur %lu)", source->mount,
Marvin Scholz's avatar
Marvin Scholz committed
819
            source->max_listeners, source->listeners);
Philipp Schafft's avatar
Philipp Schafft committed
820 821 822 823
        if (source->max_listeners == -1)
            break;
        if (source->listeners < (unsigned long)source->max_listeners)
            break;
824

Marvin Scholz's avatar
Marvin Scholz committed
825
        if (loop && source->fallback_when_full && source->fallback_mount) {
Philipp Schafft's avatar
Philipp Schafft committed
826 827 828
            source_t *next = source_find_mount (source->fallback_mount);
            if (!next) {
                ICECAST_LOG_ERROR("Fallback '%s' for full source '%s' not found",
Marvin Scholz's avatar
Marvin Scholz committed
829
                    source->mount, source->fallback_mount);
Philipp Schafft's avatar
Philipp Schafft committed
830 831
                return -1;
            }
832
            ICECAST_LOG_INFO("stream full, trying %s", next->mount);
Philipp Schafft's avatar
Philipp Schafft committed
833 834 835 836 837 838 839 840 841 842 843
            source = next;
            loop--;
            continue;
        }
        /* now we fail the client */
        return -1;
    } while (1);

    client->write_to_client = format_generic_write_to_client;
    client->check_buffer = format_check_http_buffer;
    client->refbuf->len = PER_CLIENT_REFBUF_SIZE;
Marvin Scholz's avatar
Marvin Scholz committed
844
    memset(client->refbuf->data, 0, PER_CLIENT_REFBUF_SIZE);
Philipp Schafft's avatar
Philipp Schafft committed
845 846

    /* lets add the client to the active list */
Marvin Scholz's avatar
Marvin Scholz committed
847 848 849
    avl_tree_wlock(source->pending_tree);
    avl_insert(source->pending_tree, client);
    avl_tree_unlock(source->pending_tree);
Philipp Schafft's avatar
Philipp Schafft committed
850

Marvin Scholz's avatar
Marvin Scholz committed
851
    if (source->running == 0 && source->on_demand) {
Philipp Schafft's avatar
Philipp Schafft committed
852 853 854
        /* enable on-demand relay to start, wake up the slave thread */
        ICECAST_LOG_DEBUG("kicking off on-demand relay");
        source->on_demand_req = 1;
855
    }
Philipp Schafft's avatar
Philipp Schafft committed
856 857 858
    ICECAST_LOG_DEBUG("Added client to %s", source->mount);
    return 0;
}
859

Philipp Schafft's avatar
Philipp Schafft committed
860 861 862 863 864 865 866 867 868 869 870 871
/* count the number of clients on a mount with same username and same role as the given one */
static inline ssize_t __count_user_role_on_mount (source_t *source, client_t *client) {
    ssize_t ret = 0;
    avl_node *node;

    avl_tree_rlock(source->client_tree);
    node = avl_get_first(source->client_tree);
    while (node) {
        client_t *existing_client = (client_t *)node->key;
        if (existing_client->username && client->username &&
            strcmp(existing_client->username, client->username) == 0 &&
            existing_client->role && client->role &&
Marvin Scholz's avatar
Marvin Scholz committed
872
            strcmp(existing_client->role, client->role) == 0) {
Philipp Schafft's avatar
Philipp Schafft committed
873
            ret++;
Marvin Scholz's avatar
Marvin Scholz committed
874
        }
Philipp Schafft's avatar
Philipp Schafft committed
875
        node = avl_get_next(node);
876
    }
Philipp Schafft's avatar
Philipp Schafft committed
877 878 879 880
    avl_tree_unlock(source->client_tree);

    avl_tree_rlock(source->pending_tree);
    node = avl_get_first(source->pending_tree);
Marvin Scholz's avatar
Marvin Scholz committed
881
    while (node) {
Philipp Schafft's avatar
Philipp Schafft committed
882 883 884 885
        client_t *existing_client = (client_t *)node->key;
        if (existing_client->username && client->username &&
            strcmp(existing_client->username, client->username) == 0 &&
            existing_client->role && client->role &&
Marvin Scholz's avatar
Marvin Scholz committed
886
            strcmp(existing_client->role, client->role) == 0){
Philipp Schafft's avatar
Philipp Schafft committed
887
            ret++;
Marvin Scholz's avatar
Marvin Scholz committed
888
        }
Philipp Schafft's avatar
Philipp Schafft committed
889
        node = avl_get_next(node);
890
    }
Philipp Schafft's avatar
Philipp Schafft committed
891 892 893 894
    avl_tree_unlock(source->pending_tree);
    return ret;
}

Marvin Scholz's avatar
Marvin Scholz committed
895
static void _handle_get_request(client_t *client, char *uri) {
Philipp Schafft's avatar
Philipp Schafft committed
896 897 898 899 900 901 902 903 904
    source_t *source = NULL;

    ICECAST_LOG_DEBUG("Got client %p with URI %H", client, uri);

    /* there are several types of HTTP GET clients
     * media clients, which are looking for a source (eg, URI = /stream.ogg),
     * stats clients, which are looking for /admin/stats.xml and
     * fserve clients, which are looking for static files.
     */
905 906

    stats_event_inc(NULL, "client_connections");
907

908
    /* Dispatch all admin requests */
909 910
    if ((strcmp(uri, "/admin.cgi") == 0) ||
        (strncmp(uri, "/admin/", 7) == 0)) {
Philipp Schafft's avatar
Philipp Schafft committed
911
        ICECAST_LOG_DEBUG("Client %p requesting admin interface.", client);
912
        admin_handle_request(client, uri);
Michael Smith's avatar
Michael Smith committed
913 914
        return;
    }
Philipp Schafft's avatar
Philipp Schafft committed
915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943

    /* this is a web/ request. let's check if we are allowed to do that. */
    if (acl_test_web(client->acl) != ACL_POLICY_ALLOW) {
        /* doesn't seem so, sad client :( */
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client_destroy(client);
        } else {
            client_send_error(client, 401, 1, "You need to authenticate\r\n");
        }
        return;
    }

    if (util_check_valid_extension(uri) == XSLT_CONTENT) {
        /* If the file exists, then transform it, otherwise, write a 404 */
        ICECAST_LOG_DEBUG("Stats request, sending XSL transformed stats");
        stats_transform_xslt(client, uri);
        return;
    }

    avl_tree_rlock(global.source_tree);
    /* let's see if this is a source or just a random fserve file */
    source = source_find_mount(uri);
    if (source) {
        /* true mount */
        int in_error = 0;
        ssize_t max_connections_per_user = acl_get_max_connections_per_user(client->acl);
        /* check for duplicate_logins */
        if (max_connections_per_user > 0) { /* -1 = not set (-> default=unlimited), 0 = unlimited */
            if (max_connections_per_user <= __count_user_role_on_mount(source, client)) {
Marvin Scholz's avatar
Marvin Scholz committed
944 945
                client_send_error(client, 403, 1, "Reached limit of concurrent "
                    "connections on those credentials");
Philipp Schafft's avatar
Philipp Schafft committed
946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973
                in_error = 1;
            }
        }


        /* Set max listening duration in case not already set. */
        if (!in_error && client->con->discon_time == 0) {
            time_t connection_duration = acl_get_max_connection_duration(client->acl);
            if (connection_duration == -1) {
                ice_config_t *config = config_get_config();
                mount_proxy *mount = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
                if (mount && mount->max_listener_duration)
                    connection_duration = mount->max_listener_duration;
                config_release_config();
            }

            if (connection_duration > 0) /* -1 = not set (-> default=unlimited), 0 = unlimited */
                client->con->discon_time = connection_duration + time(NULL);
        }
        if (!in_error && __add_listener_to_source(source, client) == -1) {
            client_send_error(client, 403, 1, "Rejecting client for whatever reason");
        }
        avl_tree_unlock(global.source_tree);
    } else {
        /* file */
        avl_tree_unlock(global.source_tree);
        fserve_client_create(client, uri);
    }
974 975
}

Marvin Scholz's avatar
Marvin Scholz committed
976
static void _handle_shoutcast_compatible(client_queue_t *node)
977
{
978 979 980
    char *http_compliant;
    int http_compliant_len = 0;
    http_parser_t *parser;
Philipp Schafft's avatar
Philipp Schafft committed
981
    const char *shoutcast_mount;
982
    client_t *client = node->client;
Philipp Schafft's avatar
Philipp Schafft committed
983
    ice_config_t *config;
984

985 986
    if (node->shoutcast == 1)
    {
Philipp Schafft's avatar
Philipp Schafft committed
987
        char *ptr, *headers;
988 989

        /* Get rid of trailing \r\n or \n after password */
Marvin Scholz's avatar
Marvin Scholz committed
990 991
        ptr = strstr(client->refbuf->data, "\r\r\n");
        if (ptr) {
992
            headers = ptr+3;
Marvin Scholz's avatar
Marvin Scholz committed
993 994 995
        } else {
            ptr = strstr(client->refbuf->data, "\r\n");
            if (ptr) {
996
                headers = ptr+2;