connection.c 56.6 KB
Newer Older
1 2 3 4 5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7 8 9 10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
12
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13 14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16 17 18 19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20 21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24 25 26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28 29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30 31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

Marvin Scholz's avatar
Marvin Scholz committed
36 37 38 39
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
40

41 42
#include "compat.h"
#include "connection.h"
43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44 45
#include "global.h"
#include "util.h"
46
#include "refobject.h"
Jack Moffitt's avatar
Jack Moffitt committed
47 48
#include "refbuf.h"
#include "client.h"
49
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
50 51
#include "stats.h"
#include "logging.h"
52
#include "fserve.h"
53
#include "slave.h"
54

Jack Moffitt's avatar
Jack Moffitt committed
55
#include "source.h"
56
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
57
#include "auth.h"
58
#include "matchfile.h"
59
#include "tls.h"
60
#include "acl.h"
Jack Moffitt's avatar
Jack Moffitt committed
61 62 63

#define CATMODULE "connection"

64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

79 80 81 82
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int shoutcast;
83
    char *shoutcast_mount;
84 85
    char *bodybuffer;
    size_t bodybufferlen;
86
    int tried_body;
87 88
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
89

90
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
91
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
92 93
static int _initialized = 0;

94 95
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
96
static volatile client_queue_t *_body_queue = NULL, **_body_queue_tail = &_body_queue;
97
static int tls_ok;
98
static tls_ctx_t *tls_ctx;
99

100
/* filtering client connection based on IP */
101
static matchfile_t *banned_ip, *allowed_ip;
102

103
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
104

105
static void _handle_connection(void);
106
static void get_tls_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
107 108 109

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
110 111
    if (_initialized)
        return;
112

113
    thread_spin_create (&_connection_lock);
114
    thread_mutex_create(&move_clients_mutex);
115
    thread_rwlock_create(&_source_shutdown_rwlock);
116
    thread_cond_create(&global.shutdown_cond);
117 118 119 120
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
121 122
    _body_queue = NULL;
    _body_queue_tail = &_body_queue;
Jack Moffitt's avatar
Jack Moffitt committed
123

124
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
125 126 127 128
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
129 130
    if (!_initialized)
        return;
131

132
    tls_ctx_unref(tls_ctx);
133 134 135
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
136
    thread_cond_destroy(&global.shutdown_cond);
137
    thread_rwlock_destroy(&_source_shutdown_rwlock);
138
    thread_spin_destroy (&_connection_lock);
139
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
140

141
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
142 143
}

144
void connection_reread_config(ice_config_t *config)
145
{
146
    get_tls_certificate(config);
147 148
}

Jack Moffitt's avatar
Jack Moffitt committed
149 150
static unsigned long _next_connection_id(void)
{
151
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
152

153
    thread_spin_lock(&_connection_lock);
154
    id = _current_id++;
155
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
156

157
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
158 159
}

160

161
#ifdef ICECAST_CAP_TLS
162
static void get_tls_certificate(ice_config_t *config)
163
{
164 165
    const char *keyfile;

166
    config->tls_ok = tls_ok = 0;
167

168 169 170 171
    keyfile = config->tls_context.key_file;
    if (!keyfile)
        keyfile = config->tls_context.cert_file;

172
    tls_ctx_unref(tls_ctx);
173
    tls_ctx = tls_ctx_new(config->tls_context.cert_file, keyfile, config->tls_context.cipher_list);
174 175
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
176
        return;
177 178
    }

179
    config->tls_ok = tls_ok = 1;
180 181 182
}


183
/* handlers for reading and writing a connection_t when there is TLS
184 185
 * configured on the listening port
 */
186
static int connection_read_tls(connection_t *con, void *buf, size_t len)
187
{
188
    ssize_t bytes = tls_read(con->tls, buf, len);
189

Marvin Scholz's avatar
Marvin Scholz committed
190
    if (bytes < 0) {
191
        if (tls_want_io(con->tls) > 0)
192
            return -1;
193 194 195 196 197
        con->error = 1;
    }
    return bytes;
}

198
static int connection_send_tls(connection_t *con, const void *buf, size_t len)
199
{
200
    ssize_t bytes = tls_write(con->tls, buf, len);
201

Marvin Scholz's avatar
Marvin Scholz committed
202
    if (bytes < 0) {
203 204
        if (tls_want_io(con->tls) > 0)
            return -1;
205
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
206
    } else {
207
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
208
    }
209 210 211 212
    return bytes;
}
#else

213 214
/* TLS not compiled in, so at least log it */
static void get_tls_certificate(ice_config_t *config)
215
{
216
    tls_ok = 0;
217
    ICECAST_LOG_INFO("No TLS capability. "
Philipp Schafft's avatar
Philipp Schafft committed
218
                     "Rebuild Icecast with OpenSSL support to enable this.");
219
}
220
#endif /* ICECAST_CAP_TLS */
221 222 223 224 225


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
226
static int connection_read(connection_t *con, void *buf, size_t len)
227
{
Marvin Scholz's avatar
Marvin Scholz committed
228
    int bytes = sock_read_bytes(con->sock, buf, len);
229 230
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
231
    if (bytes == -1 && !sock_recoverable(sock_error()))
232 233 234 235
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
236
static int connection_send(connection_t *con, const void *buf, size_t len)
237
{
Marvin Scholz's avatar
Marvin Scholz committed
238 239 240
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
241
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
242
    } else {
243
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
244
    }
245 246 247
    return bytes;
}

248 249
connection_t *connection_create (sock_t sock, sock_t serversock, char *ip)
{
250
    connection_t *con;
251
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
252 253
    if (con) {
        con->sock       = sock;
254
        con->serversock = serversock;
Marvin Scholz's avatar
Marvin Scholz committed
255 256 257
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
258
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
259 260
        con->read       = connection_read;
        con->send       = connection_send;
261
    }
Michael Smith's avatar
Michael Smith committed
262

263
    return con;
264 265
}

266
/* prepare connection for interacting over a TLS connection
267
 */
268
void connection_uses_tls(connection_t *con)
269
{
270
#ifdef ICECAST_CAP_TLS
271
    if (con->tls)
272 273
        return;

274 275 276 277 278 279
    if (con->readbufferlen) {
        ICECAST_LOG_ERROR("Connection is now using TLS but has data put back. BAD. Discarding putback data.");
        free(con->readbuffer);
        con->readbufferlen = 0;
    }

280
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
281 282
    con->read = connection_read_tls;
    con->send = connection_send_tls;
283 284 285
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
286 287 288
#endif
}

289 290
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
291 292 293 294 295 296 297 298
    ssize_t done = 0;
    ssize_t ret;

    if (con->readbufferlen) {
        ICECAST_LOG_DEBUG("On connection %p we read from putback buffer, filled with %zu bytes, requested are %zu bytes", con, con->readbufferlen, len);
        if (len >= con->readbufferlen) {
            memcpy(buf, con->readbuffer, con->readbufferlen);
            free(con->readbuffer);
299
            ICECAST_LOG_DEBUG("New fill in buffer=<empty>");
300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355
            if (len == con->readbufferlen) {
                con->readbufferlen = 0;
                return len;
            } else {
                len -= con->readbufferlen;
                buf += con->readbufferlen;
                done = con->readbufferlen;
                con->readbufferlen = 0;
            }
        } else {
            memcpy(buf, con->readbuffer, len);
            memmove(con->readbuffer, con->readbuffer+len, con->readbufferlen-len);
            con->readbufferlen -= len;
            return len;
        }
    }

    ret = con->read(con, buf, len);

    if (ret < 0) {
        if (done == 0) {
            return ret;
        } else {
            return done;
        }
    }

    return done + ret;
}

int connection_read_put_back(connection_t *con, const void *buf, size_t len)
{
    void *n;

    if (con->readbufferlen) {
        n = realloc(con->readbuffer, con->readbufferlen + len);
        if (!n)
            return -1;

        memcpy(n + con->readbufferlen, buf, len);
        con->readbuffer = n;
        con->readbufferlen += len;

        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    } else {
        n = malloc(len);
        if (!n)
            return -1;

        memcpy(n, buf, len);
        con->readbuffer = n;
        con->readbufferlen = len;
        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    }
356 357
}

358
static sock_t wait_for_serversock(int timeout)
359 360
{
#ifdef HAVE_POLL
361
    struct pollfd ufds [global.server_sockets];
362 363 364 365 366 367 368 369 370 371
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
372
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
373
    } else if(ret == 0) {
374
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
375
    } else {
376
        int dst;
377
        for(i=0; i < global.server_sockets; i++) {
378
            if(ufds[i].revents & POLLIN)
379
                return ufds[i].fd;
Marvin Scholz's avatar
Marvin Scholz committed
380 381
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL)) {
                if (ufds[i].revents & (POLLHUP|POLLERR)) {
382
                    sock_close (global.serversock[i]);
383
                    ICECAST_LOG_WARN("Had to close a listening socket");
384
                }
385
                global.serversock[i] = SOCK_ERROR;
386
            }
387
        }
388
        /* remove any closed sockets */
Marvin Scholz's avatar
Marvin Scholz committed
389
        for(i=0, dst=0; i < global.server_sockets; i++) {
390
            if (global.serversock[i] == SOCK_ERROR)
391
            continue;
392
            if (i!=dst)
393
            global.serversock[dst] = global.serversock[i];
394 395 396
            dst++;
        }
        global.server_sockets = dst;
397
        return SOCK_ERROR;
398 399 400 401 402
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
403
    sock_t max = SOCK_ERROR;
404 405 406 407 408

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
409
        if (max == SOCK_ERROR || global.serversock[i] > max)
410 411 412 413 414
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
415
        tv.tv_usec = (timeout % 1000) * 1000;
416 417 418 419 420
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
421
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
422
    } else if(ret == 0) {
423
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
424
    } else {
425 426 427 428
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
429
        return SOCK_ERROR; /* Should be impossible, stop compiler warnings */
430 431 432 433
    }
#endif
}

434
static connection_t *_accept_connection(int duration)
Jack Moffitt's avatar
Jack Moffitt committed
435
{
436
    sock_t sock, serversock;
437
    char *ip;
Jack Moffitt's avatar
Jack Moffitt committed
438

439
    serversock = wait_for_serversock (duration);
440
    if (serversock == SOCK_ERROR)
441
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
442

443 444
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
445

446
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
Marvin Scholz's avatar
Marvin Scholz committed
447
    if (sock != SOCK_ERROR) {
448
        connection_t *con = NULL;
449
        /* Make any IPv4 mapped IPv6 address look like a normal IPv4 address */
Marvin Scholz's avatar
Marvin Scholz committed
450 451
        if (strncmp(ip, "::ffff:", 7) == 0)
            memmove(ip, ip+7, strlen (ip+7)+1);
Jack Moffitt's avatar
Jack Moffitt committed
452

453 454
        if (matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
            con = connection_create (sock, serversock, ip);
455 456
        if (con)
            return con;
Marvin Scholz's avatar
Marvin Scholz committed
457 458 459
        sock_close(sock);
    } else {
        if (!sock_recoverable(sock_error())) {
460
            ICECAST_LOG_WARN("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
Marvin Scholz's avatar
Marvin Scholz committed
461
            thread_sleep(500000);
462
        }
463 464 465
    }
    free(ip);
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
466 467 468
}


469 470 471 472
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
473
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
474
{
475
    thread_spin_lock(&_connection_lock);
476
    *_con_queue_tail = node;
477 478
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
479 480 481
}


482 483 484 485 486 487
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
488

Marvin Scholz's avatar
Marvin Scholz committed
489
    thread_spin_lock(&_connection_lock);
490

Marvin Scholz's avatar
Marvin Scholz committed
491
    if (_con_queue){
492 493 494 495
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
496
        node->next = NULL;
497
    }
498

Marvin Scholz's avatar
Marvin Scholz committed
499
    thread_spin_unlock(&_connection_lock);
500 501
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
502 503


504
/* run along queue checking for any data that has come in or a timeout */
505
static void process_request_queue (void)
506 507
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
508 509 510 511 512 513
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
514
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
515

Marvin Scholz's avatar
Marvin Scholz committed
516
    while (*node_ref) {
517 518 519 520
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
521

522
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO || client->con->tlsmode == ICECAST_TLSMODE_AUTO_NO_PLAIN) {
523 524
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
525
                    connection_uses_tls(client->con);
526 527 528 529
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
530 531
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
532
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
533 534 535
            } else {
                len = client_read_bytes(client, buf, len);
            }
536
        }
Jack Moffitt's avatar
Jack Moffitt committed
537

Marvin Scholz's avatar
Marvin Scholz committed
538
        if (len > 0) {
539
            ssize_t stream_offset = -1;
540 541 542
            int pass_it = 1;
            char *ptr;

543 544
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
545
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
546 547 548
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
549
                    /* password line */
550 551
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
552 553 554 555 556 557 558
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
559 560
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
561
                    stream_offset = (ptr+6) - client->refbuf->data;
562 563
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
564 565
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
566
                    stream_offset = (ptr+4) - client->refbuf->data;
567 568
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
569 570
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
571
                    stream_offset = (ptr+2) - client->refbuf->data;
572 573 574 575
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
576

Marvin Scholz's avatar
Marvin Scholz committed
577
            if (pass_it) {
578 579 580 581
                if (stream_offset != -1) {
                    connection_read_put_back(client->con, client->refbuf->data + stream_offset, node->offset - stream_offset);
                    node->offset = stream_offset;
                }
582 583 584 585
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
586
                _add_connection(node);
587
                continue;
588
            }
Marvin Scholz's avatar
Marvin Scholz committed
589 590
        } else {
            if (len == 0 || client->con->error) {
591 592 593
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
594 595
                client_destroy(client);
                free(node);
596 597 598 599
                continue;
            }
        }
        node_ref = &node->next;
600
    }
601
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
602 603
}

604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620
/* add client to body queue.
 */
static void _add_body_client(client_queue_t *node)
{
    ICECAST_LOG_DEBUG("Putting client %p in body queue.", node->client);

    thread_spin_lock(&_connection_lock);
    *_body_queue_tail = node;
    _body_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
}


/* This queue reads data from the body of clients. */
static void process_request_body_queue (void)
{
    client_queue_t **node_ref = (client_queue_t **)&_body_queue;
621 622 623
    ice_config_t *config;
    time_t timeout;
    size_t body_size_limit;
624 625 626 627 628

    ICECAST_LOG_DEBUG("Processing body queue.");

    ICECAST_LOG_DEBUG("_body_queue=%p, &_body_queue=%p, _body_queue_tail=%p", _body_queue, &_body_queue, _body_queue_tail);

629 630 631 632 633
    config = config_get_config();
    timeout = time(NULL) - config->body_timeout;
    body_size_limit = config->body_size_limit;
    config_release_config();

634 635 636 637 638
    while (*node_ref) {
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        client_slurp_result_t res;

639 640
        node->tried_body = 1;

641 642
        ICECAST_LOG_DEBUG("Got client %p in body queue.", client);

643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664
        if (client->parser->req_type == httpp_req_post) {
            if (node->bodybuffer == NULL && client->request_body_read == 0) {
                if (client->request_body_length < 0) {
                    node->bodybufferlen = body_size_limit;
                    node->bodybuffer = malloc(node->bodybufferlen);
                } else if (client->request_body_length <= (ssize_t)body_size_limit) {
                    node->bodybufferlen = client->request_body_length;
                    node->bodybuffer = malloc(node->bodybufferlen);
                }
            }
        }

        if (node->bodybuffer) {
            res = client_body_slurp(client, node->bodybuffer, &(node->bodybufferlen));
            if (res == CLIENT_SLURP_SUCCESS) {
                httpp_parse_postdata(client->parser, node->bodybuffer, node->bodybufferlen);
                free(node->bodybuffer);
                node->bodybuffer = NULL;
            }
        } else {
            res = client_body_skip(client);
        }
665

666
        if (res != CLIENT_SLURP_NEEDS_MORE_DATA || client->con->con_time <= timeout || client->request_body_read >= body_size_limit) {
667 668 669 670 671 672 673 674 675 676 677 678
            ICECAST_LOG_DEBUG("Putting client %p back in connection queue.", client);

            if ((client_queue_t **)_body_queue_tail == &(node->next))
                _body_queue_tail = (volatile client_queue_t **)node_ref;
            *node_ref = node->next;
            node->next = NULL;
            _add_connection(node);
            continue;
        }
        node_ref = &node->next;
    }
}
679

680 681 682
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
683
static void _add_request_queue(client_queue_t *node)
684 685 686
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
687 688
}

689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
    ice_config_t *config;
    listener_t *listener;

    if (!node)
        return NULL;

    node->client = client;

    config = config_get_config();
    listener = config_get_listen_sock(config, client->con);

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
706 707
        client->con->tlsmode = listener->tls;
        if (listener->tls == ICECAST_TLSMODE_RFC2818 && tls_ok)
708
            connection_uses_tls(client->con);
709 710 711 712 713 714 715 716
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    config_release_config();

    return node;
}
717

718 719 720 721 722 723 724 725
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
726
        client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_LIMIT);
727 728 729 730 731 732 733 734 735 736
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
737
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
738 739 740 741 742 743 744 745 746 747 748 749 750 751 752
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
753
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
754
{
755
    connection_t *con;
756
    ice_config_t *config;
757
    int duration = 300;
758

Marvin Scholz's avatar
Marvin Scholz committed
759
    config = config_get_config();
760
    get_tls_certificate(config);
Marvin Scholz's avatar
Marvin Scholz committed
761
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
762

Marvin Scholz's avatar
Marvin Scholz committed
763
    while (global.running == ICECAST_RUNNING) {
764
        con = _accept_connection (duration);
765

Marvin Scholz's avatar
Marvin Scholz committed
766
        if (con) {
767
            connection_queue(con);
768
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
769
        } else {
770 771
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
772
        }
Marvin Scholz's avatar
Marvin Scholz committed
773
        process_request_queue();
774
        process_request_body_queue();
775
    }
Jack Moffitt's avatar
Jack Moffitt committed
776

777 778 779
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

780 781 782
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
783 784
}

785 786 787

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
788
 */
Marvin Scholz's avatar
Marvin Scholz committed
789
int connection_complete_source(source_t *source, int response)
790
{
791
    ice_config_t *config;
792

Marvin Scholz's avatar
Marvin Scholz committed
793
    global_lock();
794
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
795

796
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
797
    if (global.sources < config->source_limit) {
798
        const char *contenttype;
799
        mount_proxy *mountinfo;
800 801 802 803
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
804 805
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
806

Marvin Scholz's avatar
Marvin Scholz committed
807
            if (format_type == FORMAT_ERROR) {
808
                config_release_config();
809
                global_unlock();
810
                if (response) {
811
                    client_send_error_by_id(source->client, ICECAST_ERROR_CON_CONTENT_TYPE_NOSYS);
812 813
                    source->client = NULL;
                }
814
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
815 816
                return -1;
            }
817 818 819 820
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
821
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_NO_CONTENT_TYPE_GIVEN);
822 823 824 825 826 827 828 829
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
830
            format_type = FORMAT_TYPE_GENERIC;
831 832
        }

Marvin Scholz's avatar
Marvin Scholz committed
833
        if (format_get_plugin (format_type, source) < 0) {
834 835
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
836
            if (response) {
837
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_INTERNAL_FORMAT_ALLOC_ERROR);
838 839
                source->client = NULL;
            }
840
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
841 842 843
            return -1;
        }

844
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
845
        stats_event_args(NULL, "sources", "%d", global.sources);
846
        global_unlock();
847

848
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
849 850
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
851
        config_release_config();
852
        slave_rebuild_mounts();
853 854

        source->shutdown_rwlock = &_source_shutdown_rwlock;
855
        ICECAST_LOG_DEBUG("source is ready to start");
856 857 858

        return 0;
    }
859
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
860
        "reached %d", global.sources);
861 862 863 864

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
865
    if (response) {
866
        client_send_error_by_id(source->client, ICECAST_ERROR_CON_SOURCE_CLIENT_LIMIT);
867 868
        source->client = NULL;
    }
869 870 871 872

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
873
static inline void source_startup(client_t *client, const char *uri)
874 875
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
876
    source = source_reserve(uri);
877

Marvin Scholz's avatar
Marvin Scholz committed
878
    if (source) {
879
        source->client = client;
880 881
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
882 883 884
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
885 886 887
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
888 889 890 891
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
892
            client_send_bytes(client, "OK2\r\nicy-caps:11\r\n\r\n", 20); /* TODO: Replace Magic Number! */
893
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
894
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
895
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
896
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
897
            const char *expectcontinue;
898
            const char *transfer_encoding;
899
            int status_to_send = 200;
900
            ssize_t ret;
901

902 903 904 905
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
906
                    client_send_error_by_id(client, ICECAST_ERROR_CON_UNIMPLEMENTED);
907 908 909 910
                    return;
                }
            }

911 912 913 914 915 916 917
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
918
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
919 920 921 922 923 924 925
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

926
            client->respcode = 200;
927 928
            ret = util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, NULL, NULL, client);
            snprintf(ok->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Length: 0\r\n\r\n");
Marvin Scholz's avatar
Marvin Scholz committed
929
            ok->len = strlen(ok->data);
930
            refbuf_release(client->refbuf);
931
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
932
            fserve_add_client_callback(client, source_client_callback, source);
933
        }
Marvin Scholz's avatar
Marvin Scholz committed
934
    } else {
935
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNT_IN_USE);
936
        ICECAST_LOG_WARN("Mountpoint %s in use", uri);
937
    }
938 939
}

Philipp Schafft's avatar
Philipp Schafft committed
940
/* only called for native icecast source clients */
Marvin Scholz's avatar
Marvin Scholz committed
941
static void _handle_source_request(client_t *client, const char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
942
{
943 944
    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" from %s as role %s",
        uri, client->con->ip, client->role);
945

Marvin Scholz's avatar
Marvin Scholz committed
946
    if (uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
947
        ICECAST_LOG_WARN("source mountpoint not starting with /");
948
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNTPOINT_NOT_STARTING_WITH_SLASH);
949
        return;
950
    }
951

Philipp Schafft's avatar
Philipp Schafft committed
952 953 954 955
    source_startup(client, uri);
}


Marvin Scholz's avatar
Marvin Scholz committed
956
static void _handle_stats_request(client_t *client, char *uri)
Philipp Schafft's avatar
Philipp Schafft committed
957 958 959
{
    stats_event_inc(NULL, "stats_connections");

960
    client->respcode = 200;
961
    snprintf (client->refbuf->data, PER_CLIENT_REFBUF_SIZE,
Marvin Scholz's avatar
Marvin Scholz committed
962 963 964
        "HTTP/1.0 200 OK\r\n\r\n");
    client->refbuf->len = strlen(client->refbuf->data);
    fserve_add_client_callback(client, stats_callback, NULL);
965 966
}

Philipp Schafft's avatar
Philipp Schafft committed
967 968 969
/* if 0 is returned then the client should not be touched, however if -1
 * is returned then the caller is responsible for handling the client
 */
Marvin Scholz's avatar
Marvin Scholz committed
970
static int __add_listener_to_source(source_t *source, client_t *client)
971
{
Philipp Schafft's avatar
Philipp Schafft committed
972
    size_t loop = 10;
Michael Smith's avatar
Michael Smith committed
973

Marvin Scholz's avatar
Marvin Scholz committed
974
    do {
Philipp Schafft's avatar
Philipp Schafft committed
975
        ICECAST_LOG_DEBUG("max on %s is %ld (cur %lu)", source->mount,
Marvin Scholz's avatar
Marvin Scholz committed
976
            source->max_listeners, source->listeners);
Philipp Schafft's avatar
Philipp Schafft committed
977 978 979 980
        if (source->max_listeners == -1)
            break;
        if (source->listeners < (unsigned long)source->max_listeners)
            break;
981

Marvin Scholz's avatar
Marvin Scholz committed
982
        if (loop && source->fallback_when_full && source->fallback_mount) {
Philipp Schafft's avatar
Philipp Schafft committed
983 984 985
            source_t *next = source_find_mount (source->fallback_mount);
            if (!next) {
                ICECAST_LOG_ERROR("Fallback '%s' for full source '%s' not found",