client.c 10.8 KB
Newer Older
1 2 3 4 5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7 8 9 10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
11
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
12 13
 */

Jack Moffitt's avatar
Jack Moffitt committed
14
/* client.c
15 16 17 18
 **
 ** client interface implementation
 **
 */
Jack Moffitt's avatar
Jack Moffitt committed
19

20 21 22 23
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
24 25 26
#include <stdlib.h>
#include <string.h>

Marvin Scholz's avatar
Marvin Scholz committed
27 28 29
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
30

31
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
32 33
#include "connection.h"
#include "refbuf.h"
Karl Heyes's avatar
Karl Heyes committed
34
#include "format.h"
35
#include "stats.h"
36
#include "fserve.h"
37
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
38 39

#include "client.h"
Philipp Schafft's avatar
Philipp Schafft committed
40
#include "auth.h"
Jack Moffitt's avatar
Jack Moffitt committed
41
#include "logging.h"
42

43 44
#include "util.h"

Philipp Schafft's avatar
Philipp Schafft committed
45 46 47
/* for ADMIN_COMMAND_ERROR */
#include "admin.h"

48 49 50
#ifdef _WIN32
#define snprintf _snprintf
#endif
Jack Moffitt's avatar
Jack Moffitt committed
51

52 53 54
#undef CATMODULE
#define CATMODULE "client"

55 56
static inline void client_send_500(client_t *client, const char *message);

57 58 59 60 61
/* create a client_t with the provided connection and parser details. Return
 * 0 on success, -1 if server limit has been reached.  In either case a
 * client_t is returned just in case a message needs to be returned. Should
 * be called with global lock held.
 */
62
int client_create(client_t **c_ptr, connection_t *con, http_parser_t *parser)
Jack Moffitt's avatar
Jack Moffitt committed
63
{
Marvin Scholz's avatar
Marvin Scholz committed
64 65 66
    ice_config_t    *config;
    client_t        *client = (client_t *) calloc(1, sizeof(client_t));
    int              ret    = -1;
67 68

    if (client == NULL)
69
        abort();
70

71
    config = config_get_config();
72 73

    global.clients++;
Marvin Scholz's avatar
Marvin Scholz committed
74
    if (config->client_limit < global.clients) {
75
        ICECAST_LOG_WARN("server client limit reached (%d/%d)", config->client_limit, global.clients);
Marvin Scholz's avatar
Marvin Scholz committed
76
    } else {
77
        ret = 0;
Marvin Scholz's avatar
Marvin Scholz committed
78
    }
Jack Moffitt's avatar
Jack Moffitt committed
79

80 81 82
    config_release_config ();

    stats_event_args (NULL, "clients", "%d", global.clients);
83 84
    client->con = con;
    client->parser = parser;
Philipp Schafft's avatar
Philipp Schafft committed
85 86
    client->protocol = ICECAST_PROTOCOL_HTTP;
    client->admin_command = ADMIN_COMMAND_ERROR;
87 88
    client->refbuf = refbuf_new (PER_CLIENT_REFBUF_SIZE);
    client->refbuf->len = 0; /* force reader code to ignore buffer contents */
89
    client->pos = 0;
90
    client->write_to_client = format_generic_write_to_client;
91
    *c_ptr = client;
Jack Moffitt's avatar
Jack Moffitt committed
92

93
    return ret;
Jack Moffitt's avatar
Jack Moffitt committed
94 95
}

96 97 98 99 100 101 102 103 104 105 106
static inline void client_reuseconnection(client_t *client) {
    connection_t *con;
    reuse_t reuse;

    if (!client)
        return;

    con = client->con;
    con = connection_create(con->sock, con->serversock, strdup(con->ip));
    reuse = client->reuse;
    client->con->sock = -1; /* TODO: do not use magic */
107 108

    /* handle to keep the TLS connection */
109
    if (client->con->tls) {
110
        /* AHhhggrr.. That pain....
111
         * stealing TLS state...
112
         */
113
        con->tls  = client->con->tls;
114 115
        con->read = client->con->read;
        con->send = client->con->send;
116
        client->con->tls  = NULL;
117 118 119 120
        client->con->read = NULL;
        client->con->send = NULL;
    }

121 122 123 124
    client->reuse = ICECAST_REUSE_CLOSE;

    client_destroy(client);

125
    if (reuse == ICECAST_REUSE_UPGRADETLS)
126
        connection_uses_tls(con);
127 128 129
    connection_queue(con);
}

Jack Moffitt's avatar
Jack Moffitt committed
130 131
void client_destroy(client_t *client)
{
Philipp Schafft's avatar
Philipp Schafft committed
132
    ICECAST_LOG_DEBUG("Called to destory client %p", client);
Karl Heyes's avatar
Karl Heyes committed
133 134
    if (client == NULL)
        return;
135

136 137 138 139 140
    if (client->reuse != ICECAST_REUSE_CLOSE) {
        client_reuseconnection(client);
        return;
    }

141 142
    /* release the buffer now, as the buffer could be on the source queue
     * and may of disappeared after auth completes */
Marvin Scholz's avatar
Marvin Scholz committed
143
    if (client->refbuf) {
144 145 146 147
        refbuf_release (client->refbuf);
        client->refbuf = NULL;
    }

Philipp Schafft's avatar
Philipp Schafft committed
148
    if (auth_release_client(client))
149 150
        return;

151
    /* write log entry if ip is set (some things don't set it, like outgoing
152 153
     * slave requests
     */
Karl Heyes's avatar
Karl Heyes committed
154
    if (client->respcode && client->parser)
155
        logging_access(client);
156 157
    if (client->con)
        connection_close(client->con);
Karl Heyes's avatar
Karl Heyes committed
158 159
    if (client->parser)
        httpp_destroy(client->parser);
160 161
    if (client->encoding)
        httpp_encoding_release(client->encoding);
Jack Moffitt's avatar
Jack Moffitt committed
162

163
    global_lock();
164
    global.clients--;
165 166
    stats_event_args(NULL, "clients", "%d", global.clients);
    global_unlock();
167

168 169
    /* we need to free client specific format data (if any) */
    if (client->free_client_data)
170
        client->free_client_data(client);
171

Michael Smith's avatar
Michael Smith committed
172
    free(client->username);
Karl Heyes's avatar
Karl Heyes committed
173
    free(client->password);
Philipp Schafft's avatar
Philipp Schafft committed
174 175
    free(client->role);
    acl_release(client->acl);
Michael Smith's avatar
Michael Smith committed
176

177
    free(client);
Jack Moffitt's avatar
Jack Moffitt committed
178
}
179

180
/* helper function for reading data from a client */
181 182 183 184 185 186 187 188 189 190 191 192 193 194
static ssize_t __client_read_bytes_real(client_t *client, void *buf, size_t len)
{
    /* we have data to read from a refbuf first */
    if (client->refbuf->len < len)
        len = client->refbuf->len;
    memcpy (buf, client->refbuf->data, len);
    if (len < client->refbuf->len) {
        char *ptr = client->refbuf->data;
        memmove (ptr, ptr+len, client->refbuf->len - len);
    }
    client->refbuf->len -= len;
    return len;
}

195
int client_read_bytes(client_t *client, void *buf, unsigned len)
196
{
197 198
    ssize_t (*reader)(void*, void*, size_t) = (ssize_t(*)(void*,void*,size_t))__client_read_bytes_real;
    void *userdata = client;
199
    int bytes;
200

201 202 203 204 205 206 207 208 209
    if (!(client->refbuf && client->refbuf->len)) {
        reader = (ssize_t(*)(void*,void*,size_t))connection_read_bytes;
        userdata = client->con;
    }

    if (client->encoding) {
        bytes = httpp_encoding_read(client->encoding, buf, len, reader, userdata);
    } else {
        bytes = reader(userdata, buf, len);
210
    }
211

212
    if (bytes == -1 && client->con->error)
213
        ICECAST_LOG_DEBUG("reading from connection has failed");
214 215

    return bytes;
216 217
}

218
static inline void _client_send_error(client_t *client, int plain, const icecast_error_t *error)
219
{
220
    ssize_t ret;
221
    refbuf_t *data;
222

223 224
    if (error->http_status == 500) {
         client_send_500(client, error->message);
225 226 227
         return;
    }

228 229
    data = refbuf_new(PER_CLIENT_REFBUF_SIZE);
    if (!data) {
230
         client_send_500(client, error->message);
231 232 233
         return;
    }

234 235
    client->reuse = ICECAST_REUSE_KEEPALIVE;

236
    ret = util_http_build_header(client->refbuf->data, PER_CLIENT_REFBUF_SIZE, 0,
237
                                 0, error->http_status, NULL,
238
                                 plain ? "text/plain" : "text/html", "utf-8",
239
                                 NULL, NULL, client);
240

241 242 243 244 245 246
    if (ret == -1 || ret >= PER_CLIENT_REFBUF_SIZE) {
        ICECAST_LOG_ERROR("Dropping client as we can not build response headers.");
        client_send_500(client, "Header generation failed.");
        return;
    }

247
    if (plain) {
248 249 250
        snprintf(data->data, data->len, "Error %i\r\n---------\r\n\r\nMessage: %s\r\n\r\nError code: %s\r\n",
                 error->http_status, error->message, error->uuid
                );
251 252
    } else {
        snprintf(data->data, data->len,
253 254
                 "<html><head><title>Error %i</title></head><body><h1>Error %i</h1><hr><p><b>%s</b></p><p>Error code: %s</p></body></html>\r\n",
                 error->http_status, error->http_status, error->message, error->uuid);
255 256 257 258
    }
    data->len = strlen(data->data);

    snprintf(client->refbuf->data + ret, PER_CLIENT_REFBUF_SIZE - ret,
259
             "Content-Length: %llu\r\n\r\n",
260
             (long long unsigned int)data->len);
261

262
    client->respcode = error->http_status;
263
    client->refbuf->len = strlen (client->refbuf->data);
264 265
    client->refbuf->next = data;

266
    fserve_add_client (client, NULL);
267 268
}

269
void client_send_error_by_id(client_t *client, icecast_error_id_t id)
270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289
{
    const icecast_error_t *error = error_get_by_id(id);
    const char *pref;
    int plain;

    if (!error) {
         client_send_500(client, "Unknown error ID");
         return;
    }

    pref = util_http_select_best(httpp_getvar(client->parser, "accept"), "text/plain", "text/html", (const char*)NULL);

    if (strcmp(pref, "text/plain") == 0) {
        plain = 1;
    } else if (strcmp(pref, "text/html") == 0) {
        plain = 0;
    } else {
        plain = 1;
    }

290
    _client_send_error(client, plain, error);
291 292
}

293 294 295 296 297 298 299 300 301 302 303 304
void client_send_101(client_t *client, reuse_t reuse)
{
    ssize_t ret;

    if (!client)
        return;

    if (reuse != ICECAST_REUSE_UPGRADETLS) {
        client_send_500(client, "Bad reuse parameter");
        return;
    }

305 306
    client->reuse = reuse;

307 308 309 310 311 312
    ret = util_http_build_header(client->refbuf->data, PER_CLIENT_REFBUF_SIZE, 0,
                                 0, 101, NULL,
                                 "text/plain", "utf-8",
                                 NULL, NULL, client);

    snprintf(client->refbuf->data + ret, PER_CLIENT_REFBUF_SIZE - ret,
313
             "Content-Length: 0\r\nUpgrade: TLS/1.0, HTTP/1.0\r\n\r\n");
314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332

    client->respcode = 101;
    client->refbuf->len = strlen(client->refbuf->data);

    fserve_add_client(client, NULL);
}

void client_send_426(client_t *client, reuse_t reuse)
{
    ssize_t ret;

    if (!client)
        return;

    if (reuse != ICECAST_REUSE_UPGRADETLS) {
        client_send_500(client, "Bad reuse parameter");
        return;
    }

333 334
    client->reuse = reuse;

335 336 337 338 339 340
    ret = util_http_build_header(client->refbuf->data, PER_CLIENT_REFBUF_SIZE, 0,
                                 0, 426, NULL,
                                 "text/plain", "utf-8",
                                 NULL, NULL, client);

    snprintf(client->refbuf->data + ret, PER_CLIENT_REFBUF_SIZE - ret,
341
             "Content-Length: 0\r\nUpgrade: TLS/1.0, HTTP/1.0\r\n\r\n");
342 343 344 345 346 347 348 349 350

    client->respcode = 426;
    client->refbuf->len = strlen(client->refbuf->data);

    client->reuse = ICECAST_REUSE_KEEPALIVE;

    fserve_add_client(client, NULL);
}

351
/* this function is designed to work even if client is in bad state */
Marvin Scholz's avatar
Marvin Scholz committed
352 353
static inline void client_send_500(client_t *client, const char *message)
{
354 355
    const char header[] = "HTTP/1.0 500 Internal Server Error\r\nContent-Type: text/plain; charset=utf-8\r\n\r\n"
                          "500 - Internal Server Error\n---------------------------\n";
Philipp Schafft's avatar
Philipp Schafft committed
356 357
    const ssize_t header_len = sizeof(header) - 1;
    ssize_t ret;
358 359 360 361 362 363 364 365 366

    ret = client_send_bytes(client, header, header_len);

    /* only send message if we have one AND if header could have transmitted completly */
    if (message && ret == header_len)
        client_send_bytes(client, message, strlen(message));

    client_destroy(client);
}
367 368

/* helper function for sending the data to a client */
369
int client_send_bytes(client_t *client, const void *buf, unsigned len)
370
{
371
    int ret = client->con->send(client->con, buf, len);
372 373

    if (client->con->error)
374
        ICECAST_LOG_DEBUG("Client connection died");
375

376 377 378
    return ret;
}

379
void client_set_queue(client_t *client, refbuf_t *refbuf)
Karl Heyes's avatar
Karl Heyes committed
380 381 382 383
{
    refbuf_t *to_release = client->refbuf;

    client->refbuf = refbuf;
Karl Heyes's avatar
Karl Heyes committed
384
    if (refbuf)
385
        refbuf_addref(client->refbuf);
Karl Heyes's avatar
Karl Heyes committed
386 387
    client->pos = 0;
    if (to_release)
388
        refbuf_release(to_release);
Karl Heyes's avatar
Karl Heyes committed
389
}