connection.c 46.1 KB
Newer Older
1
2
3
4
5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7
8
9
10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
12
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
 * Copyright 2011-2014, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13
14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16
17
18
19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20
21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24
25
26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28
29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30
31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

36
#include "compat.h"
Jack Moffitt's avatar
Jack Moffitt committed
37

Marvin Scholz's avatar
Marvin Scholz committed
38
39
40
41
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
42

43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44
45
46
47
48
49
50
#include "global.h"
#include "util.h"
#include "connection.h"
#include "refbuf.h"
#include "client.h"
#include "stats.h"
#include "logging.h"
51
#include "xslt.h"
52
#include "fserve.h"
53
#include "sighandler.h"
54
55

#include "yp.h"
Jack Moffitt's avatar
Jack Moffitt committed
56
#include "source.h"
Michael Smith's avatar
Michael Smith committed
57
#include "format.h"
58
#include "format_mp3.h"
59
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
60
#include "auth.h"
61
#include "matchfile.h"
62
#include "tls.h"
Jack Moffitt's avatar
Jack Moffitt committed
63
64
65

#define CATMODULE "connection"

66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

81
82
83
84
85
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int stream_offset;
    int shoutcast;
86
    char *shoutcast_mount;
87
88
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
89
90

typedef struct _thread_queue_tag {
91
92
    thread_type *thread_id;
    struct _thread_queue_tag *next;
Jack Moffitt's avatar
Jack Moffitt committed
93
94
} thread_queue_t;

95
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
96
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
97
98
static int _initialized = 0;

99
100
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
101
static int ssl_ok;
102
static tls_ctx_t *tls_ctx;
103

104
/* filtering client connection based on IP */
105
static matchfile_t *banned_ip, *allowed_ip;
106

107
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
108

109
static void _handle_connection(void);
110
static void get_ssl_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
111
112
113

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
114
115
    if (_initialized)
        return;
116

117
    thread_spin_create (&_connection_lock);
118
    thread_mutex_create(&move_clients_mutex);
119
    thread_rwlock_create(&_source_shutdown_rwlock);
120
    thread_cond_create(&global.shutdown_cond);
121
122
123
124
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
Jack Moffitt's avatar
Jack Moffitt committed
125

126
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
127
128
129
130
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
131
132
    if (!_initialized)
        return;
133

134
    tls_ctx_unref(tls_ctx);
135
136
137
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
138
    thread_cond_destroy(&global.shutdown_cond);
139
    thread_rwlock_destroy(&_source_shutdown_rwlock);
140
    thread_spin_destroy (&_connection_lock);
141
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
142

143
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
144
145
}

146
147
148
149
150
void connection_reread_config(struct ice_config_tag *config)
{
    get_ssl_certificate(config);
}

Jack Moffitt's avatar
Jack Moffitt committed
151
152
static unsigned long _next_connection_id(void)
{
153
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
154

155
    thread_spin_lock(&_connection_lock);
156
    id = _current_id++;
157
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
158

159
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
160
161
}

162

163
#ifdef ICECAST_CAP_TLS
Marvin Scholz's avatar
Marvin Scholz committed
164
static void get_ssl_certificate(ice_config_t *config)
165
{
166
    config->tls_ok = ssl_ok = 0;
167

168
169
170
171
    tls_ctx_unref(tls_ctx);
    tls_ctx = tls_ctx_new(config->cert_file, config->cert_file, config->cipher_list);
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
172
        return;
173
174
175
    }

    config->tls_ok = ssl_ok = 1;
176
177
178
179
180
181
}


/* handlers for reading and writing a connection_t when there is ssl
 * configured on the listening port
 */
Marvin Scholz's avatar
Marvin Scholz committed
182
static int connection_read_ssl(connection_t *con, void *buf, size_t len)
183
{
184
    ssize_t bytes = tls_read(con->tls, buf, len);
185

Marvin Scholz's avatar
Marvin Scholz committed
186
    if (bytes < 0) {
187
        if (tls_want_io(con->tls) > 0)
188
            return -1;
189
190
191
192
193
        con->error = 1;
    }
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
194
static int connection_send_ssl(connection_t *con, const void *buf, size_t len)
195
{
196
    ssize_t bytes = tls_write(con->tls, buf, len);
197

Marvin Scholz's avatar
Marvin Scholz committed
198
    if (bytes < 0) {
199
200
        if (tls_want_io(con->tls) > 0)
            return -1;
201
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
202
    } else {
203
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
204
    }
205
206
207
208
209
    return bytes;
}
#else

/* SSL not compiled in, so at least log it */
210
static void get_ssl_certificate(ice_config_t *config)
211
212
{
    ssl_ok = 0;
213
214
    ICECAST_LOG_INFO("No TLS capability. "
                     "Rebuild Icecast with openSSL support to enable this.");
215
}
216
#endif /* ICECAST_CAP_TLS */
217
218
219
220
221


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
222
static int connection_read(connection_t *con, void *buf, size_t len)
223
{
Marvin Scholz's avatar
Marvin Scholz committed
224
    int bytes = sock_read_bytes(con->sock, buf, len);
225
226
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
227
    if (bytes == -1 && !sock_recoverable(sock_error()))
228
229
230
231
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
232
static int connection_send(connection_t *con, const void *buf, size_t len)
233
{
Marvin Scholz's avatar
Marvin Scholz committed
234
235
236
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
237
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
238
    } else {
239
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
240
    }
241
242
243
    return bytes;
}

244
245
connection_t *connection_create (sock_t sock, sock_t serversock, char *ip)
{
246
    connection_t *con;
247
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
248
249
    if (con) {
        con->sock       = sock;
250
        con->serversock = serversock;
Marvin Scholz's avatar
Marvin Scholz committed
251
252
253
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
254
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
255
256
        con->read       = connection_read;
        con->send       = connection_send;
257
    }
Michael Smith's avatar
Michael Smith committed
258

259
    return con;
260
261
}

262
263
/* prepare connection for interacting over a SSL connection
 */
264
void connection_uses_ssl(connection_t *con)
265
{
266
#ifdef ICECAST_CAP_TLS
267
    if (con->tls)
268
269
        return;

270
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
271
272
    con->read = connection_read_ssl;
    con->send = connection_send_ssl;
273
274
275
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
276
277
278
#endif
}

279
280
281
282
283
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
    return con->read(con, buf, len);
}

284
static sock_t wait_for_serversock(int timeout)
285
286
{
#ifdef HAVE_POLL
287
    struct pollfd ufds [global.server_sockets];
288
289
290
291
292
293
294
295
296
297
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
298
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
299
    } else if(ret == 0) {
300
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
301
    } else {
302
        int dst;
303
        for(i=0; i < global.server_sockets; i++) {
304
            if(ufds[i].revents & POLLIN)
305
                return ufds[i].fd;
Marvin Scholz's avatar
Marvin Scholz committed
306
307
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL)) {
                if (ufds[i].revents & (POLLHUP|POLLERR)) {
308
                    sock_close (global.serversock[i]);
309
                    ICECAST_LOG_WARN("Had to close a listening socket");
310
                }
311
                global.serversock[i] = SOCK_ERROR;
312
            }
313
        }
314
        /* remove any closed sockets */
Marvin Scholz's avatar
Marvin Scholz committed
315
        for(i=0, dst=0; i < global.server_sockets; i++) {
316
            if (global.serversock[i] == SOCK_ERROR)
317
            continue;
318
            if (i!=dst)
319
            global.serversock[dst] = global.serversock[i];
320
321
322
            dst++;
        }
        global.server_sockets = dst;
323
        return SOCK_ERROR;
324
325
326
327
328
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
329
    sock_t max = SOCK_ERROR;
330
331
332
333
334

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
335
        if (max == SOCK_ERROR || global.serversock[i] > max)
336
337
338
339
340
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
341
        tv.tv_usec = (timeout % 1000) * 1000;
342
343
344
345
346
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
347
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
348
    } else if(ret == 0) {
349
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
350
    } else {
351
352
353
354
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
355
        return SOCK_ERROR; /* Should be impossible, stop compiler warnings */
356
357
358
359
    }
#endif
}

360
static connection_t *_accept_connection(int duration)
Jack Moffitt's avatar
Jack Moffitt committed
361
{
362
    sock_t sock, serversock;
363
    char *ip;
Jack Moffitt's avatar
Jack Moffitt committed
364

365
    serversock = wait_for_serversock (duration);
366
    if (serversock == SOCK_ERROR)
367
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
368

369
370
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
371

372
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
Marvin Scholz's avatar
Marvin Scholz committed
373
    if (sock != SOCK_ERROR) {
374
        connection_t *con = NULL;
375
        /* Make any IPv4 mapped IPv6 address look like a normal IPv4 address */
Marvin Scholz's avatar
Marvin Scholz committed
376
377
        if (strncmp(ip, "::ffff:", 7) == 0)
            memmove(ip, ip+7, strlen (ip+7)+1);
Jack Moffitt's avatar
Jack Moffitt committed
378

379
380
        if (matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
            con = connection_create (sock, serversock, ip);
381
382
        if (con)
            return con;
Marvin Scholz's avatar
Marvin Scholz committed
383
384
385
        sock_close(sock);
    } else {
        if (!sock_recoverable(sock_error())) {
386
            ICECAST_LOG_WARN("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
Marvin Scholz's avatar
Marvin Scholz committed
387
            thread_sleep(500000);
388
        }
389
390
391
    }
    free(ip);
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
392
393
394
}


395
396
397
398
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
399
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
400
{
401
    thread_spin_lock(&_connection_lock);
402
    *_con_queue_tail = node;
403
404
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
405
406
407
}


408
409
410
411
412
413
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
414

Marvin Scholz's avatar
Marvin Scholz committed
415
    thread_spin_lock(&_connection_lock);
416

Marvin Scholz's avatar
Marvin Scholz committed
417
    if (_con_queue){
418
419
420
421
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
422
        node->next = NULL;
423
    }
424

Marvin Scholz's avatar
Marvin Scholz committed
425
    thread_spin_unlock(&_connection_lock);
426
427
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
428
429


430
/* run along queue checking for any data that has come in or a timeout */
431
static void process_request_queue (void)
432
433
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
434
435
436
437
438
439
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
440
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
441

Marvin Scholz's avatar
Marvin Scholz committed
442
    while (*node_ref) {
443
444
445
446
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
447

448
449
450
451
452
453
454
455
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO) {
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
                    connection_uses_ssl(client->con);
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
456
457
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
458
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
459
460
461
            } else {
                len = client_read_bytes(client, buf, len);
            }
462
        }
Jack Moffitt's avatar
Jack Moffitt committed
463

Marvin Scholz's avatar
Marvin Scholz committed
464
        if (len > 0) {
465
466
467
            int pass_it = 1;
            char *ptr;

468
469
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
470
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
471
472
473
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
474
                    /* password line */
475
476
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
477
478
479
480
481
482
483
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
484
485
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
486
487
488
                    node->stream_offset = (ptr+6) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
489
490
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
491
492
493
                    node->stream_offset = (ptr+4) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
494
495
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
496
497
498
499
500
                    node->stream_offset = (ptr+2) - client->refbuf->data;
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
501

Marvin Scholz's avatar
Marvin Scholz committed
502
            if (pass_it) {
503
504
505
506
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
507
                _add_connection(node);
508
                continue;
509
            }
Marvin Scholz's avatar
Marvin Scholz committed
510
511
        } else {
            if (len == 0 || client->con->error) {
512
513
514
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
515
516
                client_destroy(client);
                free(node);
517
518
519
520
                continue;
            }
        }
        node_ref = &node->next;
521
    }
522
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
523
524
}

525

526
527
528
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
529
static void _add_request_queue(client_queue_t *node)
530
531
532
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
533
534
}

535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
    ice_config_t *config;
    listener_t *listener;

    if (!node)
        return NULL;

    node->client = client;

    config = config_get_config();
    listener = config_get_listen_sock(config, client->con);

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
        if (listener->ssl && ssl_ok)
            connection_uses_ssl(client->con);
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    config_release_config();

    return node;
}
562

563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
        client_send_error(client, 403, 1, "Icecast connection limit reached");
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
582
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
598
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
599
{
600
    connection_t *con;
601
    ice_config_t *config;
602
    int duration = 300;
603

Marvin Scholz's avatar
Marvin Scholz committed
604
605
606
    config = config_get_config();
    get_ssl_certificate(config);
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
607

Marvin Scholz's avatar
Marvin Scholz committed
608
    while (global.running == ICECAST_RUNNING) {
609
        con = _accept_connection (duration);
610

Marvin Scholz's avatar
Marvin Scholz committed
611
        if (con) {
612
            connection_queue(con);
613
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
614
        } else {
615
616
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
617
        }
Marvin Scholz's avatar
Marvin Scholz committed
618
        process_request_queue();
619
    }
Jack Moffitt's avatar
Jack Moffitt committed
620

621
622
623
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

624
625
626
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
627
628
}

629
630
631

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
632
 */
Marvin Scholz's avatar
Marvin Scholz committed
633
int connection_complete_source(source_t *source, int response)
634
{
635
    ice_config_t *config;
636

Marvin Scholz's avatar
Marvin Scholz committed
637
    global_lock();
638
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
639

640
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
641
    if (global.sources < config->source_limit) {
642
        const char *contenttype;
643
        mount_proxy *mountinfo;
644
645
646
647
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
648
649
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
650

Marvin Scholz's avatar
Marvin Scholz committed
651
            if (format_type == FORMAT_ERROR) {
652
                config_release_config();
653
                global_unlock();
654
                if (response) {
655
                    client_send_error(source->client, 403, 1, "Content-type not supported");
656
657
                    source->client = NULL;
                }
658
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
659
660
                return -1;
            }
661
662
663
664
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
665
                client_send_error(source->client, 403, 1, "No Content-type given");
666
667
668
669
670
671
672
673
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
674
            format_type = FORMAT_TYPE_GENERIC;
675
676
        }

Marvin Scholz's avatar
Marvin Scholz committed
677
        if (format_get_plugin (format_type, source) < 0) {
678
679
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
680
            if (response) {
681
                client_send_error(source->client, 403, 1, "internal format allocation problem");
682
683
                source->client = NULL;
            }
684
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
685
686
687
            return -1;
        }

688
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
689
        stats_event_args(NULL, "sources", "%d", global.sources);
690
        global_unlock();
691

692
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
693
694
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
695
        config_release_config();
696
        slave_rebuild_mounts();
697
698

        source->shutdown_rwlock = &_source_shutdown_rwlock;
699
        ICECAST_LOG_DEBUG("source is ready to start");
700
701
702

        return 0;
    }
703
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
704
        "reached %d", global.sources);
705
706
707
708

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
709
    if (response) {
710
        client_send_error(source->client, 403, 1, "too many sources connected");
711
712
        source->client = NULL;
    }
713
714
715
716

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
717
static inline void source_startup(client_t *client, const char *uri)
718
719
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
720
    source = source_reserve(uri);
721

Marvin Scholz's avatar
Marvin Scholz committed
722
    if (source) {
723
        source->client = client;
724
725
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
726
727
728
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
729
730
731
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
732
733
734
735
736
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
            sock_write (client->con->sock, "OK2\r\nicy-caps:11\r\n\r\n");
737
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
738
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
739
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
740
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
741
            const char *expectcontinue;
742
            const char *transfer_encoding;
743
744
            int status_to_send = 200;

745
746
747
748
749
750
751
752
753
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
                    client_send_error(client, 501, 1, "Unimplemented");
                    return;
                }
            }

754
755
756
757
758
759
760
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
761
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
762
763
764
765
766
767
768
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

769
            client->respcode = 200;
770
            util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, "", NULL, client);
Marvin Scholz's avatar
Marvin Scholz committed
771
            ok->len = strlen(ok->data);
772
773
774
            /* we may have unprocessed data read in, so don't overwrite it */
            ok->associated = client->refbuf;
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
775
            fserve_add_client_callback(client, source_client_callback, source);
776
        }
Marvin Scholz's avatar
Marvin Scholz committed
777
    } else {
778
        client_send_error(client, 403, 1, "Mountpoint in use");
779
        ICECAST_LOG_WARN("Mountpoint %s in use", uri);
780
    }
781
782
}

Philipp Schafft's avatar
Philipp Schafft committed
783
/* only called for native icecast source clients */
Marvin Scholz's avatar
Marvin Scholz committed
784
static void _handle_source_request(client_t *client, const char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
785
{
786
787
    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" from %s as role %s",
        uri, client->con->ip, client->role);
788

Marvin Scholz's avatar
Marvin Scholz committed
789
    if (uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
790
791
        ICECAST_LOG_WARN("source mountpoint not starting with /");
        client_send_error(client, 400, 1, "source mountpoint not starting with /");
792
        return;
793
    }
794

Philipp Schafft's avatar
Philipp Schafft committed
795
796
797
798
    source_startup(client, uri);
}


Marvin Scholz's avatar
Marvin Scholz committed
799
static void _handle_stats_request(client_t *client, char *uri)
Philipp Schafft's avatar
Philipp Schafft committed
800
801
802
{
    stats_event_inc(NULL, "stats_connections");

803
    client->respcode = 200;
804
    snprintf (client->refbuf->data, PER_CLIENT_REFBUF_SIZE,
Marvin Scholz's avatar
Marvin Scholz committed
805
806
807
        "HTTP/1.0 200 OK\r\n\r\n");
    client->refbuf->len = strlen(client->refbuf->data);
    fserve_add_client_callback(client, stats_callback, NULL);
808
809
}

Philipp Schafft's avatar
Philipp Schafft committed
810
811
812
/* if 0 is returned then the client should not be touched, however if -1
 * is returned then the caller is responsible for handling the client
 */
Marvin Scholz's avatar
Marvin Scholz committed
813
static int __add_listener_to_source(source_t *source, client_t *client)
814
{
Philipp Schafft's avatar
Philipp Schafft committed
815
    size_t loop = 10;
Michael Smith's avatar
Michael Smith committed
816

Marvin Scholz's avatar
Marvin Scholz committed
817
    do {
Philipp Schafft's avatar
Philipp Schafft committed
818
        ICECAST_LOG_DEBUG("max on %s is %ld (cur %lu)", source->mount,
Marvin Scholz's avatar
Marvin Scholz committed
819
            source->max_listeners, source->listeners);
Philipp Schafft's avatar
Philipp Schafft committed
820
821
822
823
        if (source->max_listeners == -1)
            break;
        if (source->listeners < (unsigned long)source->max_listeners)
            break;
824

Marvin Scholz's avatar
Marvin Scholz committed
825
        if (loop && source->fallback_when_full && source->fallback_mount) {
Philipp Schafft's avatar
Philipp Schafft committed
826
827
828
            source_t *next = source_find_mount (source->fallback_mount);
            if (!next) {
                ICECAST_LOG_ERROR("Fallback '%s' for full source '%s' not found",
Marvin Scholz's avatar
Marvin Scholz committed
829
                    source->mount, source->fallback_mount);
Philipp Schafft's avatar
Philipp Schafft committed
830
831
                return -1;
            }
832
            ICECAST_LOG_INFO("stream full, trying %s", next->mount);
Philipp Schafft's avatar
Philipp Schafft committed
833
834
835
836
837
838
839
840
841
842
843
            source = next;
            loop--;
            continue;
        }
        /* now we fail the client */
        return -1;
    } while (1);

    client->write_to_client = format_generic_write_to_client;
    client->check_buffer = format_check_http_buffer;
    client->refbuf->len = PER_CLIENT_REFBUF_SIZE;
Marvin Scholz's avatar
Marvin Scholz committed
844
    memset(client->refbuf->data, 0, PER_CLIENT_REFBUF_SIZE);
Philipp Schafft's avatar
Philipp Schafft committed
845
846

    /* lets add the client to the active list */
Marvin Scholz's avatar
Marvin Scholz committed
847
848
849
    avl_tree_wlock(source->pending_tree);
    avl_insert(source->pending_tree, client);
    avl_tree_unlock(source->pending_tree);
Philipp Schafft's avatar
Philipp Schafft committed
850

Marvin Scholz's avatar
Marvin Scholz committed
851
    if (source->running == 0 && source->on_demand) {
Philipp Schafft's avatar
Philipp Schafft committed
852
853
854
        /* enable on-demand relay to start, wake up the slave thread */
        ICECAST_LOG_DEBUG("kicking off on-demand relay");
        source->on_demand_req = 1;
855
    }
Philipp Schafft's avatar
Philipp Schafft committed
856
857
858
    ICECAST_LOG_DEBUG("Added client to %s", source->mount);
    return 0;
}
859

Philipp Schafft's avatar
Philipp Schafft committed
860
861
862
863
864
865
866
867
868
869
870
871
/* count the number of clients on a mount with same username and same role as the given one */
static inline ssize_t __count_user_role_on_mount (source_t *source, client_t *client) {
    ssize_t ret = 0;
    avl_node *node;

    avl_tree_rlock(source->client_tree);
    node = avl_get_first(source->client_tree);
    while (node) {
        client_t *existing_client = (client_t *)node->key;
        if (existing_client->username && client->username &&
            strcmp(existing_client->username, client->username) == 0 &&
            existing_client->role && client->role &&
Marvin Scholz's avatar
Marvin Scholz committed
872
            strcmp(existing_client->role, client->role) == 0) {
Philipp Schafft's avatar
Philipp Schafft committed
873
            ret++;
Marvin Scholz's avatar
Marvin Scholz committed
874
        }
Philipp Schafft's avatar
Philipp Schafft committed
875
        node = avl_get_next(node);
876
    }
Philipp Schafft's avatar
Philipp Schafft committed
877
878
879
880
    avl_tree_unlock(source->client_tree);

    avl_tree_rlock(source->pending_tree);
    node = avl_get_first(source->pending_tree);
Marvin Scholz's avatar
Marvin Scholz committed
881
    while (node) {
Philipp Schafft's avatar
Philipp Schafft committed
882
883
884
885
        client_t *existing_client = (client_t *)node->key;
        if (existing_client->username && client->username &&
            strcmp(existing_client->username, client->username) == 0 &&
            existing_client->role && client->role &&
Marvin Scholz's avatar
Marvin Scholz committed
886
            strcmp(existing_client->role, client->role) == 0){
Philipp Schafft's avatar
Philipp Schafft committed
887
            ret++;
Marvin Scholz's avatar
Marvin Scholz committed
888
        }
Philipp Schafft's avatar
Philipp Schafft committed
889
        node = avl_get_next(node);
890
    }
Philipp Schafft's avatar
Philipp Schafft committed
891
892
893
894
    avl_tree_unlock(source->pending_tree);
    return ret;
}

Marvin Scholz's avatar
Marvin Scholz committed
895
static void _handle_get_request(client_t *client, char *uri) {
Philipp Schafft's avatar
Philipp Schafft committed
896
897
898
899
900
901
902
903
904
    source_t *source = NULL;

    ICECAST_LOG_DEBUG("Got client %p with URI %H", client, uri);

    /* there are several types of HTTP GET clients
     * media clients, which are looking for a source (eg, URI = /stream.ogg),
     * stats clients, which are looking for /admin/stats.xml and
     * fserve clients, which are looking for static files.
     */
905
906

    stats_event_inc(NULL, "client_connections");
907

908
    /* Dispatch all admin requests */
909
910
    if ((strcmp(uri, "/admin.cgi") == 0) ||
        (strncmp(uri, "/admin/", 7) == 0)) {
Philipp Schafft's avatar
Philipp Schafft committed
911
        ICECAST_LOG_DEBUG("Client %p requesting admin interface.", client);
912
        admin_handle_request(client, uri);
Michael Smith's avatar
Michael Smith committed
913
914
        return;
    }
Philipp Schafft's avatar
Philipp Schafft committed
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943

    /* this is a web/ request. let's check if we are allowed to do that. */
    if (acl_test_web(client->acl) != ACL_POLICY_ALLOW) {
        /* doesn't seem so, sad client :( */
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client_destroy(client);
        } else {
            client_send_error(client, 401, 1, "You need to authenticate\r\n");
        }
        return;
    }

    if (util_check_valid_extension(uri) == XSLT_CONTENT) {
        /* If the file exists, then transform it, otherwise, write a 404 */
        ICECAST_LOG_DEBUG("Stats request, sending XSL transformed stats");
        stats_transform_xslt(client, uri);
        return;
    }

    avl_tree_rlock(global.source_tree);
    /* let's see if this is a source or just a random fserve file */
    source = source_find_mount(uri);
    if (source) {
        /* true mount */
        int in_error = 0;
        ssize_t max_connections_per_user = acl_get_max_connections_per_user(client->acl);
        /* check for duplicate_logins */
        if (max_connections_per_user > 0) { /* -1 = not set (-> default=unlimited), 0 = unlimited */
            if (max_connections_per_user <= __count_user_role_on_mount(source, client)) {
Marvin Scholz's avatar
Marvin Scholz committed
944
945
                client_send_error(client, 403, 1, "Reached limit of concurrent "
                    "connections on those credentials");
Philipp Schafft's avatar
Philipp Schafft committed
946
947
948
949
950
951
952
953
954
955