connection.c 56 KB
Newer Older
1
2
3
4
5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7
8
9
10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
12
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13
14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16
17
18
19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20
21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24
25
26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28
29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30
31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

Marvin Scholz's avatar
Marvin Scholz committed
36
37
38
39
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
40

41
42
#include "compat.h"
#include "connection.h"
43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44
45
#include "global.h"
#include "util.h"
46
#include "refobject.h"
Jack Moffitt's avatar
Jack Moffitt committed
47
48
#include "refbuf.h"
#include "client.h"
49
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
50
51
#include "stats.h"
#include "logging.h"
52
#include "fserve.h"
53
#include "slave.h"
54

Jack Moffitt's avatar
Jack Moffitt committed
55
#include "source.h"
56
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
57
#include "auth.h"
58
#include "matchfile.h"
59
#include "tls.h"
60
#include "acl.h"
Jack Moffitt's avatar
Jack Moffitt committed
61
62
63

#define CATMODULE "connection"

64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

79
80
81
82
83
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int stream_offset;
    int shoutcast;
84
    char *shoutcast_mount;
85
    int tried_body;
86
87
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
88

89
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
90
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
91
92
static int _initialized = 0;

93
94
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
95
static volatile client_queue_t *_body_queue = NULL, **_body_queue_tail = &_body_queue;
96
static int tls_ok;
97
static tls_ctx_t *tls_ctx;
98

99
/* filtering client connection based on IP */
100
static matchfile_t *banned_ip, *allowed_ip;
101

102
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
103

104
static void _handle_connection(void);
105
static void get_tls_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
106
107
108

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
109
110
    if (_initialized)
        return;
111

112
    thread_spin_create (&_connection_lock);
113
    thread_mutex_create(&move_clients_mutex);
114
    thread_rwlock_create(&_source_shutdown_rwlock);
115
    thread_cond_create(&global.shutdown_cond);
116
117
118
119
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
120
121
    _body_queue = NULL;
    _body_queue_tail = &_body_queue;
Jack Moffitt's avatar
Jack Moffitt committed
122

123
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
124
125
126
127
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
128
129
    if (!_initialized)
        return;
130

131
    tls_ctx_unref(tls_ctx);
132
133
134
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
135
    thread_cond_destroy(&global.shutdown_cond);
136
    thread_rwlock_destroy(&_source_shutdown_rwlock);
137
    thread_spin_destroy (&_connection_lock);
138
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
139

140
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
141
142
}

143
void connection_reread_config(ice_config_t *config)
144
{
145
    get_tls_certificate(config);
146
147
}

Jack Moffitt's avatar
Jack Moffitt committed
148
149
static unsigned long _next_connection_id(void)
{
150
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
151

152
    thread_spin_lock(&_connection_lock);
153
    id = _current_id++;
154
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
155

156
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
157
158
}

159

160
#ifdef ICECAST_CAP_TLS
161
static void get_tls_certificate(ice_config_t *config)
162
{
163
164
    const char *keyfile;

165
    config->tls_ok = tls_ok = 0;
166

167
168
169
170
    keyfile = config->tls_context.key_file;
    if (!keyfile)
        keyfile = config->tls_context.cert_file;

171
    tls_ctx_unref(tls_ctx);
172
    tls_ctx = tls_ctx_new(config->tls_context.cert_file, keyfile, config->tls_context.cipher_list);
173
174
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
175
        return;
176
177
    }

178
    config->tls_ok = tls_ok = 1;
179
180
181
}


182
/* handlers for reading and writing a connection_t when there is TLS
183
184
 * configured on the listening port
 */
185
static int connection_read_tls(connection_t *con, void *buf, size_t len)
186
{
187
    ssize_t bytes = tls_read(con->tls, buf, len);
188

Marvin Scholz's avatar
Marvin Scholz committed
189
    if (bytes < 0) {
190
        if (tls_want_io(con->tls) > 0)
191
            return -1;
192
193
194
195
196
        con->error = 1;
    }
    return bytes;
}

197
static int connection_send_tls(connection_t *con, const void *buf, size_t len)
198
{
199
    ssize_t bytes = tls_write(con->tls, buf, len);
200

Marvin Scholz's avatar
Marvin Scholz committed
201
    if (bytes < 0) {
202
203
        if (tls_want_io(con->tls) > 0)
            return -1;
204
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
205
    } else {
206
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
207
    }
208
209
210
211
    return bytes;
}
#else

212
213
/* TLS not compiled in, so at least log it */
static void get_tls_certificate(ice_config_t *config)
214
{
215
    tls_ok = 0;
216
    ICECAST_LOG_INFO("No TLS capability. "
Philipp Schafft's avatar
Philipp Schafft committed
217
                     "Rebuild Icecast with OpenSSL support to enable this.");
218
}
219
#endif /* ICECAST_CAP_TLS */
220
221
222
223
224


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
225
static int connection_read(connection_t *con, void *buf, size_t len)
226
{
Marvin Scholz's avatar
Marvin Scholz committed
227
    int bytes = sock_read_bytes(con->sock, buf, len);
228
229
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
230
    if (bytes == -1 && !sock_recoverable(sock_error()))
231
232
233
234
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
235
static int connection_send(connection_t *con, const void *buf, size_t len)
236
{
Marvin Scholz's avatar
Marvin Scholz committed
237
238
239
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
240
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
241
    } else {
242
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
243
    }
244
245
246
    return bytes;
}

247
248
connection_t *connection_create (sock_t sock, sock_t serversock, char *ip)
{
249
    connection_t *con;
250
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
251
252
    if (con) {
        con->sock       = sock;
253
        con->serversock = serversock;
Marvin Scholz's avatar
Marvin Scholz committed
254
255
256
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
257
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
258
259
        con->read       = connection_read;
        con->send       = connection_send;
260
    }
Michael Smith's avatar
Michael Smith committed
261

262
    return con;
263
264
}

265
/* prepare connection for interacting over a TLS connection
266
 */
267
void connection_uses_tls(connection_t *con)
268
{
269
#ifdef ICECAST_CAP_TLS
270
    if (con->tls)
271
272
        return;

273
274
275
276
277
278
    if (con->readbufferlen) {
        ICECAST_LOG_ERROR("Connection is now using TLS but has data put back. BAD. Discarding putback data.");
        free(con->readbuffer);
        con->readbufferlen = 0;
    }

279
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
280
281
    con->read = connection_read_tls;
    con->send = connection_send_tls;
282
283
284
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
285
286
287
#endif
}

288
289
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
290
291
292
293
294
295
296
297
    ssize_t done = 0;
    ssize_t ret;

    if (con->readbufferlen) {
        ICECAST_LOG_DEBUG("On connection %p we read from putback buffer, filled with %zu bytes, requested are %zu bytes", con, con->readbufferlen, len);
        if (len >= con->readbufferlen) {
            memcpy(buf, con->readbuffer, con->readbufferlen);
            free(con->readbuffer);
298
            ICECAST_LOG_DEBUG("New fill in buffer=<empty>");
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
            if (len == con->readbufferlen) {
                con->readbufferlen = 0;
                return len;
            } else {
                len -= con->readbufferlen;
                buf += con->readbufferlen;
                done = con->readbufferlen;
                con->readbufferlen = 0;
            }
        } else {
            memcpy(buf, con->readbuffer, len);
            memmove(con->readbuffer, con->readbuffer+len, con->readbufferlen-len);
            con->readbufferlen -= len;
            return len;
        }
    }

    ret = con->read(con, buf, len);

    if (ret < 0) {
        if (done == 0) {
            return ret;
        } else {
            return done;
        }
    }

    return done + ret;
}

int connection_read_put_back(connection_t *con, const void *buf, size_t len)
{
    void *n;

    if (con->readbufferlen) {
        n = realloc(con->readbuffer, con->readbufferlen + len);
        if (!n)
            return -1;

        memcpy(n + con->readbufferlen, buf, len);
        con->readbuffer = n;
        con->readbufferlen += len;

        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    } else {
        n = malloc(len);
        if (!n)
            return -1;

        memcpy(n, buf, len);
        con->readbuffer = n;
        con->readbufferlen = len;
        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    }
355
356
}

357
static sock_t wait_for_serversock(int timeout)
358
359
{
#ifdef HAVE_POLL
360
    struct pollfd ufds [global.server_sockets];
361
362
363
364
365
366
367
368
369
370
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
371
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
372
    } else if(ret == 0) {
373
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
374
    } else {
375
        int dst;
376
        for(i=0; i < global.server_sockets; i++) {
377
            if(ufds[i].revents & POLLIN)
378
                return ufds[i].fd;
Marvin Scholz's avatar
Marvin Scholz committed
379
380
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL)) {
                if (ufds[i].revents & (POLLHUP|POLLERR)) {
381
                    sock_close (global.serversock[i]);
382
                    ICECAST_LOG_WARN("Had to close a listening socket");
383
                }
384
                global.serversock[i] = SOCK_ERROR;
385
            }
386
        }
387
        /* remove any closed sockets */
Marvin Scholz's avatar
Marvin Scholz committed
388
        for(i=0, dst=0; i < global.server_sockets; i++) {
389
            if (global.serversock[i] == SOCK_ERROR)
390
            continue;
391
            if (i!=dst)
392
            global.serversock[dst] = global.serversock[i];
393
394
395
            dst++;
        }
        global.server_sockets = dst;
396
        return SOCK_ERROR;
397
398
399
400
401
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
402
    sock_t max = SOCK_ERROR;
403
404
405
406
407

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
408
        if (max == SOCK_ERROR || global.serversock[i] > max)
409
410
411
412
413
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
414
        tv.tv_usec = (timeout % 1000) * 1000;
415
416
417
418
419
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
420
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
421
    } else if(ret == 0) {
422
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
423
    } else {
424
425
426
427
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
428
        return SOCK_ERROR; /* Should be impossible, stop compiler warnings */
429
430
431
432
    }
#endif
}

433
static connection_t *_accept_connection(int duration)
Jack Moffitt's avatar
Jack Moffitt committed
434
{
435
    sock_t sock, serversock;
436
    char *ip;
Jack Moffitt's avatar
Jack Moffitt committed
437

438
    serversock = wait_for_serversock (duration);
439
    if (serversock == SOCK_ERROR)
440
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
441

442
443
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
444

445
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
Marvin Scholz's avatar
Marvin Scholz committed
446
    if (sock != SOCK_ERROR) {
447
        connection_t *con = NULL;
448
        /* Make any IPv4 mapped IPv6 address look like a normal IPv4 address */
Marvin Scholz's avatar
Marvin Scholz committed
449
450
        if (strncmp(ip, "::ffff:", 7) == 0)
            memmove(ip, ip+7, strlen (ip+7)+1);
Jack Moffitt's avatar
Jack Moffitt committed
451

452
453
        if (matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
            con = connection_create (sock, serversock, ip);
454
455
        if (con)
            return con;
Marvin Scholz's avatar
Marvin Scholz committed
456
457
458
        sock_close(sock);
    } else {
        if (!sock_recoverable(sock_error())) {
459
            ICECAST_LOG_WARN("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
Marvin Scholz's avatar
Marvin Scholz committed
460
            thread_sleep(500000);
461
        }
462
463
464
    }
    free(ip);
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
465
466
467
}


468
469
470
471
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
472
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
473
{
474
    thread_spin_lock(&_connection_lock);
475
    *_con_queue_tail = node;
476
477
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
478
479
480
}


481
482
483
484
485
486
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
487

Marvin Scholz's avatar
Marvin Scholz committed
488
    thread_spin_lock(&_connection_lock);
489

Marvin Scholz's avatar
Marvin Scholz committed
490
    if (_con_queue){
491
492
493
494
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
495
        node->next = NULL;
496
    }
497

Marvin Scholz's avatar
Marvin Scholz committed
498
    thread_spin_unlock(&_connection_lock);
499
500
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
501
502


503
/* run along queue checking for any data that has come in or a timeout */
504
static void process_request_queue (void)
505
506
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
507
508
509
510
511
512
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
513
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
514

Marvin Scholz's avatar
Marvin Scholz committed
515
    while (*node_ref) {
516
517
518
519
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
520

521
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO || client->con->tlsmode == ICECAST_TLSMODE_AUTO_NO_PLAIN) {
522
523
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
524
                    connection_uses_tls(client->con);
525
526
527
528
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
529
530
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
531
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
532
533
534
            } else {
                len = client_read_bytes(client, buf, len);
            }
535
        }
Jack Moffitt's avatar
Jack Moffitt committed
536

Marvin Scholz's avatar
Marvin Scholz committed
537
        if (len > 0) {
538
539
540
            int pass_it = 1;
            char *ptr;

541
542
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
543
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
544
545
546
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
547
                    /* password line */
548
549
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
550
551
552
553
554
555
556
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
557
558
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
559
560
561
                    node->stream_offset = (ptr+6) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
562
563
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
564
565
566
                    node->stream_offset = (ptr+4) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
567
568
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
569
570
571
572
573
                    node->stream_offset = (ptr+2) - client->refbuf->data;
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
574

Marvin Scholz's avatar
Marvin Scholz committed
575
            if (pass_it) {
576
577
578
579
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
580
                _add_connection(node);
581
                continue;
582
            }
Marvin Scholz's avatar
Marvin Scholz committed
583
584
        } else {
            if (len == 0 || client->con->error) {
585
586
587
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
588
589
                client_destroy(client);
                free(node);
590
591
592
593
                continue;
            }
        }
        node_ref = &node->next;
594
    }
595
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
596
597
}

598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
/* add client to body queue.
 */
static void _add_body_client(client_queue_t *node)
{
    ICECAST_LOG_DEBUG("Putting client %p in body queue.", node->client);

    thread_spin_lock(&_connection_lock);
    *_body_queue_tail = node;
    _body_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
}


/* This queue reads data from the body of clients. */
static void process_request_body_queue (void)
{
    client_queue_t **node_ref = (client_queue_t **)&_body_queue;
615
616
617
    ice_config_t *config;
    time_t timeout;
    size_t body_size_limit;
618
619
620
621
622

    ICECAST_LOG_DEBUG("Processing body queue.");

    ICECAST_LOG_DEBUG("_body_queue=%p, &_body_queue=%p, _body_queue_tail=%p", _body_queue, &_body_queue, _body_queue_tail);

623
624
625
626
627
    config = config_get_config();
    timeout = time(NULL) - config->body_timeout;
    body_size_limit = config->body_size_limit;
    config_release_config();

628
629
630
631
632
    while (*node_ref) {
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        client_slurp_result_t res;

633
634
        node->tried_body = 1;

635
636
637
638
        ICECAST_LOG_DEBUG("Got client %p in body queue.", client);

        res = client_body_skip(client);

639
        if (res != CLIENT_SLURP_NEEDS_MORE_DATA || client->con->con_time <= timeout || client->request_body_read >= body_size_limit) {
640
641
642
643
644
645
646
647
648
649
650
651
            ICECAST_LOG_DEBUG("Putting client %p back in connection queue.", client);

            if ((client_queue_t **)_body_queue_tail == &(node->next))
                _body_queue_tail = (volatile client_queue_t **)node_ref;
            *node_ref = node->next;
            node->next = NULL;
            _add_connection(node);
            continue;
        }
        node_ref = &node->next;
    }
}
652

653
654
655
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
656
static void _add_request_queue(client_queue_t *node)
657
658
659
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
660
661
}

662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
    ice_config_t *config;
    listener_t *listener;

    if (!node)
        return NULL;

    node->client = client;

    config = config_get_config();
    listener = config_get_listen_sock(config, client->con);

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
679
680
        client->con->tlsmode = listener->tls;
        if (listener->tls == ICECAST_TLSMODE_RFC2818 && tls_ok)
681
            connection_uses_tls(client->con);
682
683
684
685
686
687
688
689
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    config_release_config();

    return node;
}
690

691
692
693
694
695
696
697
698
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
699
        client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_LIMIT);
700
701
702
703
704
705
706
707
708
709
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
710
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
726
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
727
{
728
    connection_t *con;
729
    ice_config_t *config;
730
    int duration = 300;
731

Marvin Scholz's avatar
Marvin Scholz committed
732
    config = config_get_config();
733
    get_tls_certificate(config);
Marvin Scholz's avatar
Marvin Scholz committed
734
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
735

Marvin Scholz's avatar
Marvin Scholz committed
736
    while (global.running == ICECAST_RUNNING) {
737
        con = _accept_connection (duration);
738

Marvin Scholz's avatar
Marvin Scholz committed
739
        if (con) {
740
            connection_queue(con);
741
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
742
        } else {
743
744
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
745
        }
Marvin Scholz's avatar
Marvin Scholz committed
746
        process_request_queue();
747
        process_request_body_queue();
748
    }
Jack Moffitt's avatar
Jack Moffitt committed
749

750
751
752
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

753
754
755
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
756
757
}

758
759
760

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
761
 */
Marvin Scholz's avatar
Marvin Scholz committed
762
int connection_complete_source(source_t *source, int response)
763
{
764
    ice_config_t *config;
765

Marvin Scholz's avatar
Marvin Scholz committed
766
    global_lock();
767
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
768

769
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
770
    if (global.sources < config->source_limit) {
771
        const char *contenttype;
772
        mount_proxy *mountinfo;
773
774
775
776
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
777
778
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
779

Marvin Scholz's avatar
Marvin Scholz committed
780
            if (format_type == FORMAT_ERROR) {
781
                config_release_config();
782
                global_unlock();
783
                if (response) {
784
                    client_send_error_by_id(source->client, ICECAST_ERROR_CON_CONTENT_TYPE_NOSYS);
785
786
                    source->client = NULL;
                }
787
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
788
789
                return -1;
            }
790
791
792
793
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
794
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_NO_CONTENT_TYPE_GIVEN);
795
796
797
798
799
800
801
802
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
803
            format_type = FORMAT_TYPE_GENERIC;
804
805
        }

Marvin Scholz's avatar
Marvin Scholz committed
806
        if (format_get_plugin (format_type, source) < 0) {
807
808
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
809
            if (response) {
810
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_INTERNAL_FORMAT_ALLOC_ERROR);
811
812
                source->client = NULL;
            }
813
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
814
815
816
            return -1;
        }

817
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
818
        stats_event_args(NULL, "sources", "%d", global.sources);
819
        global_unlock();
820

821
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
822
823
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
824
        config_release_config();
825
        slave_rebuild_mounts();
826
827

        source->shutdown_rwlock = &_source_shutdown_rwlock;
828
        ICECAST_LOG_DEBUG("source is ready to start");
829
830
831

        return 0;
    }
832
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
833
        "reached %d", global.sources);
834
835
836
837

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
838
    if (response) {
839
        client_send_error_by_id(source->client, ICECAST_ERROR_CON_SOURCE_CLIENT_LIMIT);
840
841
        source->client = NULL;
    }
842
843
844
845

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
846
static inline void source_startup(client_t *client, const char *uri)
847
848
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
849
    source = source_reserve(uri);
850

Marvin Scholz's avatar
Marvin Scholz committed
851
    if (source) {
852
        source->client = client;
853
854
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
855
856
857
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
858
859
860
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
861
862
863
864
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
865
            client_send_bytes(client, "OK2\r\nicy-caps:11\r\n\r\n", 20); /* TODO: Replace Magic Number! */
866
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
867
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
868
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
869
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
870
            const char *expectcontinue;
871
            const char *transfer_encoding;
872
            int status_to_send = 200;
873
            ssize_t ret;
874

875
876
877
878
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
879
                    client_send_error_by_id(client, ICECAST_ERROR_CON_UNIMPLEMENTED);
880
881
882
883
                    return;
                }
            }

884
885
886
887
888
889
890
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
891
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
892
893
894
895
896
897
898
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

899
            client->respcode = 200;
900
901
            ret = util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, NULL, NULL, client);
            snprintf(ok->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Length: 0\r\n\r\n");
Marvin Scholz's avatar
Marvin Scholz committed
902
            ok->len = strlen(ok->data);
903
904
905
            /* we may have unprocessed data read in, so don't overwrite it */
            ok->associated = client->refbuf;
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
906
            fserve_add_client_callback(client, source_client_callback, source);
907
        }
Marvin Scholz's avatar
Marvin Scholz committed
908
    } else {
909
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNT_IN_USE);
910
        ICECAST_LOG_WARN("Mountpoint %s in use", uri);
911
    }
912
913
}

Philipp Schafft's avatar
Philipp Schafft committed
914
/* only called for native icecast source clients */
Marvin Scholz's avatar
Marvin Scholz committed
915
static void _handle_source_request(client_t *client, const char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
916
{
917
918
    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" from %s as role %s",
        uri, client->con->ip, client->role);
919

Marvin Scholz's avatar
Marvin Scholz committed
920
    if (uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
921
        ICECAST_LOG_WARN("source mountpoint not starting with /");