connection.c 33.5 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org, 
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
 */

13
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
14
15
16
17
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
18
19
20
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
21
#include <time.h>
Jack Moffitt's avatar
Jack Moffitt committed
22
#include <sys/types.h>
23
#include <sys/stat.h>
24
25
26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
28
29

#ifndef _WIN32
#include <sys/time.h>
Jack Moffitt's avatar
Jack Moffitt committed
30
31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
35
#define snprintf _snprintf
#define strcasecmp stricmp
36
#define strncasecmp strnicmp
37
#endif
Jack Moffitt's avatar
Jack Moffitt committed
38
39
40

#include "os.h"

Karl Heyes's avatar
Karl Heyes committed
41
42
43
44
#include "thread/thread.h"
#include "avl/avl.h"
#include "net/sock.h"
#include "httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
45

46
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
47
48
49
50
51
52
53
#include "global.h"
#include "util.h"
#include "connection.h"
#include "refbuf.h"
#include "client.h"
#include "stats.h"
#include "logging.h"
54
#include "xslt.h"
55
#include "fserve.h"
56
#include "sighandler.h"
57
58

#include "yp.h"
Jack Moffitt's avatar
Jack Moffitt committed
59
#include "source.h"
Michael Smith's avatar
Michael Smith committed
60
#include "format.h"
61
#include "format_mp3.h"
Michael Smith's avatar
Michael Smith committed
62
#include "event.h"
63
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
64
#include "auth.h"
Jack Moffitt's avatar
Jack Moffitt committed
65
66
67

#define CATMODULE "connection"

68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/
#define SHOUTCAST_SOURCE_AUTH 1
#define ICECAST_SOURCE_AUTH 0

Jack Moffitt's avatar
Jack Moffitt committed
85
typedef struct con_queue_tag {
86
87
    connection_t *con;
    struct con_queue_tag *next;
Jack Moffitt's avatar
Jack Moffitt committed
88
89
90
} con_queue_t;

typedef struct _thread_queue_tag {
91
92
    thread_type *thread_id;
    struct _thread_queue_tag *next;
Jack Moffitt's avatar
Jack Moffitt committed
93
94
95
} thread_queue_t;

static mutex_t _connection_mutex;
96
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
97
98
static int _initialized = 0;

99
volatile static con_queue_t *_queue = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
100
101
102
103
static mutex_t _queue_mutex;

static thread_queue_t *_conhands = NULL;

104
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
105
106
107
108
109

static void *_handle_connection(void *arg);

void connection_initialize(void)
{
110
111
112
113
    if (_initialized) return;
    
    thread_mutex_create(&_connection_mutex);
    thread_mutex_create(&_queue_mutex);
114
    thread_mutex_create(&move_clients_mutex);
115
    thread_rwlock_create(&_source_shutdown_rwlock);
116
    thread_cond_create(&global.shutdown_cond);
Jack Moffitt's avatar
Jack Moffitt committed
117

118
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
119
120
121
122
}

void connection_shutdown(void)
{
123
124
    if (!_initialized) return;
    
125
    thread_cond_destroy(&global.shutdown_cond);
126
127
128
    thread_rwlock_destroy(&_source_shutdown_rwlock);
    thread_mutex_destroy(&_queue_mutex);
    thread_mutex_destroy(&_connection_mutex);
129
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
130

131
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
132
133
134
135
}

static unsigned long _next_connection_id(void)
{
136
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
137

138
139
140
    thread_mutex_lock(&_connection_mutex);
    id = _current_id++;
    thread_mutex_unlock(&_connection_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
141

142
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
143
144
}

145
connection_t *create_connection(sock_t sock, sock_t serversock, char *ip) {
146
147
148
149
    connection_t *con;
    con = (connection_t *)malloc(sizeof(connection_t));
    memset(con, 0, sizeof(connection_t));
    con->sock = sock;
150
    con->serversock = serversock;
151
152
153
    con->con_time = time(NULL);
    con->id = _next_connection_id();
    con->ip = ip;
Michael Smith's avatar
Michael Smith committed
154
155
156
157

    con->event_number = EVENT_NO_EVENT;
    con->event = NULL;

158
    return con;
159
160
}

161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
static int wait_for_serversock(int timeout)
{
#ifdef HAVE_POLL
    struct pollfd ufds[MAX_LISTEN_SOCKETS];
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
        return -2;
    }
    else if(ret == 0) {
        return -1;
    }
    else {
181
        int dst;
182
        for(i=0; i < global.server_sockets; i++) {
183
            if(ufds[i].revents & POLLIN)
184
                return ufds[i].fd;
185
186
187
188
189
190
191
192
193
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL))
            {
                if (ufds[i].revents & (POLLHUP|POLLERR))
                {
                    close (global.serversock[i]);
                    WARN0("Had to close a listening socket");
                }
                global.serversock[i] = -1;
            }
194
        }
195
196
197
198
199
200
201
202
203
204
205
        /* remove any closed sockets */
        for(i=0, dst=0; i < global.server_sockets; i++)
        {
            if (global.serversock[i] == -1)
                continue;
            if (i!=dst)
                global.serversock[dst] = global.serversock[i];
            dst++;
        }
        global.server_sockets = dst;
        return -1;
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
    int max = -1;

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
        if(global.serversock[i] > max)
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
223
        tv.tv_usec = (timeout % 1000) * 1000;
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
        return -2;
    }
    else if(ret == 0) {
        return -1;
    }
    else {
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
        return -1; /* Should be impossible, stop compiler warnings */
    }
#endif
}

Jack Moffitt's avatar
Jack Moffitt committed
244
245
static connection_t *_accept_connection(void)
{
246
247
248
    int sock;
    connection_t *con;
    char *ip;
249
    int serversock; 
Jack Moffitt's avatar
Jack Moffitt committed
250

251
252
253
    serversock = wait_for_serversock(100);
    if(serversock < 0)
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
254

255
256
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
257

258
259
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
    if (sock >= 0) {
260
        con = create_connection(sock, serversock, ip);
Jack Moffitt's avatar
Jack Moffitt committed
261

262
263
        return con;
    }
Jack Moffitt's avatar
Jack Moffitt committed
264

265
266
267
268
    if (!sock_recoverable(sock_error()))
        WARN2("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
    
    free(ip);
Jack Moffitt's avatar
Jack Moffitt committed
269

270
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
271
272
273
274
}

static void _add_connection(connection_t *con)
{
275
    con_queue_t *node;
Jack Moffitt's avatar
Jack Moffitt committed
276

277
278
279
280
    node = (con_queue_t *)malloc(sizeof(con_queue_t));
    
    thread_mutex_lock(&_queue_mutex);
    node->con = con;
281
    node->next = (con_queue_t *)_queue;
282
283
    _queue = node;
    thread_mutex_unlock(&_queue_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
284
285
}

286
static void _push_thread(thread_queue_t **queue, thread_type *thread_id)
Jack Moffitt's avatar
Jack Moffitt committed
287
{
288
289
290
291
292
293
294
295
296
297
298
299
300
301
    /* create item */
    thread_queue_t *item = (thread_queue_t *)malloc(sizeof(thread_queue_t));
    item->thread_id = thread_id;
    item->next = NULL;


    thread_mutex_lock(&_queue_mutex);
    if (*queue == NULL) {
        *queue = item;
    } else {
        item->next = *queue;
        *queue = item;
    }
    thread_mutex_unlock(&_queue_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
302
303
}

304
static thread_type *_pop_thread(thread_queue_t **queue)
Jack Moffitt's avatar
Jack Moffitt committed
305
{
306
307
    thread_type *id;
    thread_queue_t *item;
Jack Moffitt's avatar
Jack Moffitt committed
308

309
    thread_mutex_lock(&_queue_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
310

311
312
313
314
315
    item = *queue;
    if (item == NULL) {
        thread_mutex_unlock(&_queue_mutex);
        return NULL;
    }
Jack Moffitt's avatar
Jack Moffitt committed
316

317
318
319
320
    *queue = item->next;
    item->next = NULL;
    id = item->thread_id;
    free(item);
Jack Moffitt's avatar
Jack Moffitt committed
321

322
    thread_mutex_unlock(&_queue_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
323

324
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
325
326
327
328
}

static void _build_pool(void)
{
329
330
    ice_config_t *config;
    int i;
331
    thread_type *tid;
332
    char buff[64];
Michael Smith's avatar
Michael Smith committed
333
    int threadpool_size;
Jack Moffitt's avatar
Jack Moffitt committed
334

335
    config = config_get_config();
Michael Smith's avatar
Michael Smith committed
336
337
    threadpool_size = config->threadpool_size;
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
338

339
340
341
342
343
    for (i = 0; i < threadpool_size; i++) {
        snprintf(buff, 64, "Connection Thread #%d", i);
        tid = thread_create(buff, _handle_connection, NULL, THREAD_ATTACHED);
        _push_thread(&_conhands, tid);
    }
Jack Moffitt's avatar
Jack Moffitt committed
344
345
346
347
}

static void _destroy_pool(void)
{
348
349
350
351
352
353
354
355
356
357
    thread_type *id;
    int i;

    i = 0;

    id = _pop_thread(&_conhands);
    while (id != NULL) {
        thread_join(id);
        id = _pop_thread(&_conhands);
    }
358
    INFO0("All connection threads down");
Jack Moffitt's avatar
Jack Moffitt committed
359
360
361
362
}

void connection_accept_loop(void)
{
363
    connection_t *con;
Jack Moffitt's avatar
Jack Moffitt committed
364

365
    _build_pool();
Jack Moffitt's avatar
Jack Moffitt committed
366

367
368
    while (global.running == ICE_RUNNING)
    {
369
        if (global . schedule_config_reread)
370
371
372
373
374
        {
            /* reread config file */
            INFO0("Scheduling config reread ...");

            connection_inject_event(EVENT_CONFIG_READ, NULL);
375
            global . schedule_config_reread = 0;
376
377
        }

378
        con = _accept_connection();
Jack Moffitt's avatar
Jack Moffitt committed
379

380
381
382
383
        if (con) {
            _add_connection(con);
        }
    }
Jack Moffitt's avatar
Jack Moffitt committed
384

385
386
387
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

388
    _destroy_pool();
Jack Moffitt's avatar
Jack Moffitt committed
389

390
391
392
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
393
394
395
396
}

static connection_t *_get_connection(void)
{
397
398
399
400
    con_queue_t *node = NULL;
    con_queue_t *oldnode = NULL;
    connection_t *con = NULL;

401
402
403
404
    /* common case, no new connections so don't bother taking locks */
    if (_queue == NULL)
        return NULL;

405
406
    thread_mutex_lock(&_queue_mutex);
    if (_queue) {
407
        node = (con_queue_t *)_queue;
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
        while (node->next) {
            oldnode = node;
            node = node->next;
        }
        
        /* node is now the last node
        ** and oldnode is the previous one, or NULL
        */
        if (oldnode) oldnode->next = NULL;
        else (_queue) = NULL;
    }
    thread_mutex_unlock(&_queue_mutex);

    if (node) {
        con = node->con;
        free(node);
    }

    return con;
Jack Moffitt's avatar
Jack Moffitt committed
427
428
}

Michael Smith's avatar
Michael Smith committed
429
430
431
432
433
434
435
436
437
void connection_inject_event(int eventnum, void *event_data) {
    connection_t *con = calloc(1, sizeof(connection_t));

    con->event_number = eventnum;
    con->event = event_data;

    _add_connection(con);
}

438
439
440

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
441
 */
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
int connection_complete_source (source_t *source)
{
    ice_config_t *config = config_get_config();

    global_lock ();
    DEBUG1 ("sources count is %d", global.sources);

    if (global.sources < config->source_limit)
    {
        char *contenttype;
        mount_proxy *mountproxy = config->mounts;
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
        if (contenttype != NULL)
        {
            format_type = format_get_type (contenttype);

            if (format_type == FORMAT_ERROR)
            {
                global_unlock();
                config_release_config();
                if (source->client)
                    client_send_404 (source->client, "Content-type not supported");
                WARN1("Content-type \"%s\" not supported, dropping source", contenttype);
                return -1;
            }
        }
        else
        {
473
            WARN0("No content-type header, falling back to backwards compatibility mode "
474
                    "for icecast 1.x relays. Assuming content is mp3.");
475
            format_type = FORMAT_TYPE_GENERIC;
476
477
        }

Karl Heyes's avatar
Karl Heyes committed
478
        if (format_get_plugin (format_type, source) < 0)
479
480
481
482
483
484
485
486
487
488
489
490
        {
            global_unlock();
            config_release_config();
            if (source->client)
                client_send_404 (source->client, "internal format allocation problem");
            WARN1 ("plugin format failed for \"%s\"", source->mount);
            return -1;
        }

        global.sources++;
        global_unlock();

491
492
493
        /* set global settings first */
        source->queue_size_limit = config->queue_size_limit;
        source->timeout = config->source_timeout;
Karl Heyes's avatar
Karl Heyes committed
494
        source->burst_size = config->burst_size;
495

496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
        /* for relays, we don't yet have a client, however we do require one
         * to retrieve the stream from.  This is created here, quite late,
         * because we can't use this client to return an error code/message,
         * so we only do this once we know we're going to accept the source.
         */
        if (source->client == NULL)
            source->client = client_create (source->con, source->parser);

        while (mountproxy)
        {
            if (strcmp (mountproxy->mountname, source->mount) == 0)
            {
                source_apply_mount (source, mountproxy);
                break;
            }
            mountproxy = mountproxy->next;
        }
        config_release_config();

        source->shutdown_rwlock = &_source_shutdown_rwlock;
        DEBUG0 ("source is ready to start");

        return 0;
    }
520
    WARN1("Request to add source when maximum source limit "
521
522
523
524
525
526
527
528
529
530
531
532
            "reached %d", global.sources);

    global_unlock();
    config_release_config();

    if (source->client)
        client_send_404 (source->client, "too many sources connected");

    return -1;
}


533
534
static int _check_pass_http(http_parser_t *parser, 
        char *correctuser, char *correctpass)
535
536
537
538
539
540
541
542
543
544
545
546
547
{
    /* This will look something like "Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==" */
    char *header = httpp_getvar(parser, "authorization");
    char *userpass, *tmp;
    char *username, *password;

    if(header == NULL)
        return 0;

    if(strncmp(header, "Basic ", 6))
        return 0;

    userpass = util_base64_decode(header+6);
548
549
550
    if(userpass == NULL) {
        WARN1("Base64 decode of Authorization header \"%s\" failed",
                header+6);
551
        return 0;
552
    }
553
554
555
556
557
558
559
560
561
562

    tmp = strchr(userpass, ':');
    if(!tmp) {
        free(userpass);
        return 0;
    }
    *tmp = 0;
    username = userpass;
    password = tmp+1;

563
    if(strcmp(username, correctuser) || strcmp(password, correctpass)) {
564
565
566
        free(userpass);
        return 0;
    }
567
    free(userpass);
568
569
570
571

    return 1;
}

572
573
574
575
576
577
578
579
static int _check_pass_icy(http_parser_t *parser, char *correctpass)
{
    char *password;

    password = httpp_getvar(parser, HTTPP_VAR_ICYPASSWORD);
    if(!password)
        return 0;

580
    if (strcmp(password, correctpass))
581
582
583
584
585
        return 0;
    else
        return 1;
}

586
static int _check_pass_ice(http_parser_t *parser, char *correctpass)
587
{
588
    char *password;
589
590
591
592
593

    password = httpp_getvar(parser, "ice-password");
    if(!password)
        password = "";

594
    if (strcmp(password, correctpass))
595
596
597
598
599
        return 0;
    else
        return 1;
}

600
int connection_check_admin_pass(http_parser_t *parser)
601
{
602
    int ret;
Michael Smith's avatar
Michael Smith committed
603
604
605
    ice_config_t *config = config_get_config();
    char *pass = config->admin_password;
    char *user = config->admin_username;
606
607
608
609
610
611
612

    if(!pass || !user) {
        config_release_config();
        return 0;
    }

    ret = _check_pass_http(parser, user, pass);
Michael Smith's avatar
Michael Smith committed
613
    config_release_config();
614
615
    return ret;
}
Michael Smith's avatar
Michael Smith committed
616

617
618
619
620
621
622
int connection_check_relay_pass(http_parser_t *parser)
{
    int ret;
    ice_config_t *config = config_get_config();
    char *pass = config->relay_password;
    char *user = "relay";
Michael Smith's avatar
Michael Smith committed
623

624
625
    if(!pass || !user) {
        config_release_config();
626
        return 0;
627
    }
628

629
630
631
    ret = _check_pass_http(parser, user, pass);
    config_release_config();
    return ret;
632
633
}

634
int connection_check_source_pass(http_parser_t *parser, char *mount)
635
{
Michael Smith's avatar
Michael Smith committed
636
637
    ice_config_t *config = config_get_config();
    char *pass = config->source_password;
638
    char *user = "source";
639
    int ret;
Michael Smith's avatar
Michael Smith committed
640
    int ice_login = config->ice_login;
641
    char *protocol;
Michael Smith's avatar
Michael Smith committed
642
643
644

    mount_proxy *mountinfo = config->mounts;
    thread_mutex_lock(&(config_locks()->mounts_lock));
645

646
647
    while(mountinfo) {
        if(!strcmp(mountinfo->mountname, mount)) {
648
649
650
651
            if(mountinfo->password)
                pass = mountinfo->password;
            if(mountinfo->username)
                user = mountinfo->username;
652
653
            break;
        }
654
        mountinfo = mountinfo->next;
655
656
    }

Michael Smith's avatar
Michael Smith committed
657
658
    thread_mutex_unlock(&(config_locks()->mounts_lock));

659
660
    if(!pass) {
        WARN0("No source password set, rejecting source");
661
        config_release_config();
662
663
664
        return 0;
    }

665
    protocol = httpp_getvar(parser, HTTPP_VAR_PROTOCOL);
666
667
668
669
670
671
672
673
674
675
676
    if(protocol != NULL && !strcmp(protocol, "ICY")) {
        ret = _check_pass_icy(parser, pass);
    }
    else {
        ret = _check_pass_http(parser, user, pass);
        if(!ret && ice_login)
        {
            ret = _check_pass_ice(parser, pass);
            if(ret)
                WARN0("Source is using deprecated icecast login");
        }
677
    }
678
    config_release_config();
679
    return ret;
680
681
}

682

683
static void _handle_source_request(connection_t *con, 
684
        http_parser_t *parser, char *uri, int auth_style)
685
{
686
    client_t *client;
687
    source_t *source;
688

689
    client = client_create(con, parser);
690

691
    INFO1("Source logging in at mountpoint \"%s\"", uri);
692
                
693
694
695
696
697
698
699
    if (uri[0] != '/')
    {
        WARN0 ("source mountpoint not starting with /");
        client_send_401 (client);
        return;
    }

700
701
702
703
704
705
706
707
708
709
    if (auth_style == ICECAST_SOURCE_AUTH) {
        if (!connection_check_source_pass(parser, uri)) {
            /* We commonly get this if the source client is using the wrong
             * protocol: attempt to diagnose this and return an error
             */
            /* TODO: Do what the above comment says */
            INFO1("Source (%s) attempted to login with invalid or missing password", uri);
            client_send_401(client);
            return;
        }
710
    }
711
712
713
    source = source_reserve (uri);
    if (source)
    {
714
715
716
        if (auth_style == SHOUTCAST_SOURCE_AUTH) {
            source->shoutcast_compat = 1;
        }
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
        source->client = client;
        source->parser = parser;
        source->con = con;
        if (connection_complete_source (source) < 0)
        {
            source->client = NULL;
            source_free_source (source);
        }
        else
            thread_create ("Source Thread", source_client_thread,
                    source, THREAD_DETACHED);
    }
    else
    {
        client_send_404 (client, "Mountpoint in use");
732
        WARN1 ("Mountpoint %s in use", uri);
733
    }
734
735
}

736

737
738
static void _handle_stats_request(connection_t *con, 
        http_parser_t *parser, char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
739
{
740
    stats_connection_t *stats;
741

742
743
744
    stats_event_inc(NULL, "stats_connections");
                
    if (!connection_check_admin_pass(parser)) {
745
        ERROR0("Bad password for stats connection");
746
747
        connection_close(con);
        httpp_destroy(parser);
748
        return;
749
750
751
752
753
754
755
756
757
758
    }
                    
    stats_event_inc(NULL, "stats");
                    
    /* create stats connection and create stats handler thread */
    stats = (stats_connection_t *)malloc(sizeof(stats_connection_t));
    stats->parser = parser;
    stats->con = con;
                    
    thread_create("Stats Connection", stats_connection, (void *)stats, THREAD_DETACHED);
759
760
761
}

static void _handle_get_request(connection_t *con,
762
        http_parser_t *parser, char *passed_uri)
763
764
{
    char *fullpath;
765
    client_t *client;
766
    int bytes;
767
768
    struct stat statbuf;
    source_t *source;
Michael Smith's avatar
Michael Smith committed
769
770
771
    int fileserve;
    char *host;
    int port;
772
    int i;
Karl Heyes's avatar
Karl Heyes committed
773
774
    char *serverhost = NULL;
    int serverport = 0;
775
    aliases *alias;
Michael Smith's avatar
Michael Smith committed
776
777
    ice_config_t *config;
    int client_limit;
778
    int ret;
779
    char *uri = passed_uri;
Michael Smith's avatar
Michael Smith committed
780
781
782
783
784

    config = config_get_config();
    fileserve = config->fileserve;
    host = config->hostname;
    port = config->port;
785
786
787
788
789
790
791
792
    for(i = 0; i < MAX_LISTEN_SOCKETS; i++) {
        if(global.serversock[i] == con->serversock) {
            serverhost = config->listeners[i].bind_address;
            serverport = config->listeners[i].port;
            break;
        }
    }
    alias = config->aliases;
Michael Smith's avatar
Michael Smith committed
793
    client_limit = config->client_limit;
794

795
796
797
    /* there are several types of HTTP GET clients
    ** media clients, which are looking for a source (eg, URI = /stream.ogg)
    ** stats clients, which are looking for /admin/stats.xml
798
    ** and directory server authorizers, which are looking for /GUID-xxxxxxxx 
799
    ** (where xxxxxx is the GUID in question) - this isn't implemented yet.
800
801
802
803
    ** we need to handle the latter two before the former, as the latter two
    ** aren't subject to the limits.
    */
    /* TODO: add GUID-xxxxxx */
804

805
806
807
    /* Handle aliases */
    while(alias) {
        if(strcmp(uri, alias->source) == 0 && (alias->port == -1 || alias->port == serverport) && (alias->bind_address == NULL || (serverhost != NULL && strcmp(alias->bind_address, serverhost) == 0))) {
808
809
            uri = strdup (alias->destination);
            DEBUG2 ("alias has made %s into %s", passed_uri, uri);
810
811
812
813
            break;
        }
        alias = alias->next;
    }
814
815
816
817
818
    config_release_config();

    /* make a client */
    client = client_create(con, parser);
    stats_event_inc(NULL, "client_connections");
819

820
    /* Dispatch all admin requests */
821
822
    if ((strcmp(uri, "/admin.cgi") == 0) ||
        (strncmp(uri, "/admin/", 7) == 0)) {
823
        admin_handle_request(client, uri);
824
        if (uri != passed_uri) free (uri);
Michael Smith's avatar
Michael Smith committed
825
826
827
        return;
    }

828
829
830
831
    /* Here we are parsing the URI request to see
    ** if the extension is .xsl, if so, then process
    ** this request as an XSLT request
    */
832
833
    fullpath = util_get_path_from_normalised_uri(uri);
    if (util_check_valid_extension(fullpath) == XSLT_CONTENT) {
834
835
        /* If the file exists, then transform it, otherwise, write a 404 */
        if (stat(fullpath, &statbuf) == 0) {
836
            DEBUG0("Stats request, sending XSL transformed stats");
837
            client->respcode = 200;
838
            bytes = sock_write(client->con->sock, 
839
840
841
                    "HTTP/1.0 200 OK\r\nContent-Type: text/html\r\n\r\n");
            if(bytes > 0) client->con->sent_bytes = bytes;
            stats_transform_xslt(client, fullpath);
842
843
844
            client_destroy(client);
        }
        else {
845
            client_send_404(client, "The file you requested could not be found");
846
        }
847
        free(fullpath);
848
        if (uri != passed_uri) free (uri);
849
        return;
850
    }
851
    else if(fileserve && stat(fullpath, &statbuf) == 0 && 
Ed "oddsock" Zaleski's avatar
Ed "oddsock" Zaleski committed
852
#ifdef _WIN32
853
            ((statbuf.st_mode) & _S_IFREG))
Ed "oddsock" Zaleski's avatar
Ed "oddsock" Zaleski committed
854
#else
855
            S_ISREG(statbuf.st_mode)) 
Ed "oddsock" Zaleski's avatar
Ed "oddsock" Zaleski committed
856
#endif
Michael Smith's avatar
Michael Smith committed
857
    {
858
        fserve_client_create(client, fullpath);
859
        free(fullpath);
860
        if (uri != passed_uri) free (uri);
861
862
        return;
    }
863
864
865
866
867
868
    free(fullpath);

    if(strcmp(util_get_extension(uri), "m3u") == 0) {
        char *sourceuri = strdup(uri);
        char *dot = strrchr(sourceuri, '.');
        *dot = 0;
869
870
        client->respcode = 200;
        bytes = sock_write(client->con->sock,
871
872
                    "HTTP/1.0 200 OK\r\n"
                    "Content-Type: audio/x-mpegurl\r\n\r\n"
873
                    "http://%s:%d%s\r\n", 
Michael Smith's avatar
Michael Smith committed
874
875
                    host, 
                    port,
876
877
                    sourceuri
                    );
878
879
        if(bytes > 0) client->con->sent_bytes = bytes;
        client_destroy(client);
880
        free(sourceuri);
881
        if (uri != passed_uri) free (uri);
882
883
884
        return;
    }

885
886
887
    global_lock();
    if (global.clients >= client_limit) {
        global_unlock();
888
889
        client_send_404(client,
                "The server is already full. Try again later.");
890
        if (uri != passed_uri) free (uri);
891
        return;
892
893
894
895
896
897
    }
    global_unlock();
                    
    avl_tree_rlock(global.source_tree);
    source = source_find_mount(uri);
    if (source) {
898
        DEBUG0("Source found for client");
Michael Smith's avatar
Michael Smith committed
899
900
901
902
903
904
905

        /* The source may not be the requested source - it might have gone
         * via one or more fallbacks. We only reject it for no-mount if it's
         * the originally requested source
         */
        if(strcmp(uri, source->mount) == 0 && source->no_mount) {
            avl_tree_unlock(global.source_tree);
906
            client_send_404(client, "This mount is unavailable.");
907
            if (uri != passed_uri) free (uri);
Michael Smith's avatar
Michael Smith committed
908
            return;
909
910
911
912
913
914
        }
        if (source->running == 0)
        {
            avl_tree_unlock(global.source_tree);
            DEBUG0("inactive source, client dropped");
            client_send_404(client, "This mount is unavailable.");
915
            if (uri != passed_uri) free (uri);
916
            return;
Michael Smith's avatar
Michael Smith committed
917
918
919
920
        }

        /* Check for any required authentication first */
        if(source->authenticator != NULL) {
921
922
            ret = auth_check_client(source, client);
            if(ret != AUTH_OK) {
923
                avl_tree_unlock(global.source_tree);
924
925
926
927
928
929
930
931
                if (ret == AUTH_FORBIDDEN) {
                    INFO1("Client attempted to log multiple times to source "
                        "(\"%s\")", uri);
                    client_send_403(client);
                }
                else {
                /* If not FORBIDDEN, default to 401 */
                    INFO1("Client attempted to log in to source (\"%s\")with "
Michael Smith's avatar
Michael Smith committed
932
                        "incorrect or missing password", uri);
933
934
                    client_send_401(client);
                }
935
                if (uri != passed_uri) free (uri);
Michael Smith's avatar
Michael Smith committed
936
937
938
939
940
                return;
            }
        }

        /* And then check that there's actually room in the server... */
941
942
943
        global_lock();
        if (global.clients >= client_limit) {
            global_unlock();
944
            avl_tree_unlock(global.source_tree);
945
946
            client_send_404(client, 
                    "The server is already full. Try again later.");
947
            if (uri != passed_uri) free (uri);
948
            return;
949
        }
Michael Smith's avatar
Michael Smith committed
950
951
952
953
        /* Early-out for per-source max listeners. This gets checked again
         * by the source itself, later. This route gives a useful message to
         * the client, also.
         */
Michael Smith's avatar
Michael Smith committed
954
955
956
        else if(source->max_listeners != -1 && 
                source->listeners >= source->max_listeners) 
        {
957
            global_unlock();
Michael Smith's avatar
Michael Smith committed
958
            avl_tree_unlock(global.source_tree);
959
960
            client_send_404(client, 
                    "Too many clients on this mountpoint. Try again later.");
961
            if (uri != passed_uri) free (uri);
Michael Smith's avatar
Michael Smith committed
962
963
            return;
        }
964
965
966
        global.clients++;
        global_unlock();
                        
Karl Heyes's avatar
Karl Heyes committed
967
        source->format->create_client_data (source, client);
Michael Smith's avatar
Michael Smith committed
968
969

        source->format->client_send_headers(source->format, source, client);
970
971
                        
        bytes = sock_write(client->con->sock, "\r\n");
972
        if(bytes > 0) client->con->sent_bytes += bytes;
973
974
                            
        sock_set_blocking(client->con->sock, SOCK_NONBLOCK);
975
        sock_set_nodelay(client->con->sock);
976
977
978
979
980
981
982
983
984
                        
        avl_tree_wlock(source->pending_tree);
        avl_insert(source->pending_tree, (void *)client);
        avl_tree_unlock(source->pending_tree);
    }
                    
    avl_tree_unlock(global.source_tree);
                    
    if (!source) {
985
986
        DEBUG0("Source not found for client");
        client_send_404(client, "The source you requested could not be found.");
987
    }
988
    if (uri != passed_uri) free (uri);
989
990
}

991
void _handle_shoutcast_compatible(connection_t *con, char *mount, char *source_password) {
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
    char shoutcast_password[256];
    char *http_compliant;
    int http_compliant_len = 0;
    char header[4096];
    http_parser_t *parser;

    memset(shoutcast_password, 0, sizeof (shoutcast_password));
    /* Step one of shoutcast auth protocol, read encoder password (1 line) */
    if (util_read_header(con->sock, shoutcast_password, 
            sizeof (shoutcast_password), 
            READ_LINE) == 0) {
        /* either we didn't get a complete line, or we timed out */
        connection_close(con);
        return;
    }
    /* Get rid of trailing \n */
    shoutcast_password[strlen(shoutcast_password)-1] = '\000';
    if (strcmp(shoutcast_password, source_password)) {
        ERROR0("Invalid source password");
        connection_close(con);
        return;
    }
    /* Step two of shoutcast auth protocol, send OK2.  For those
       interested, OK2 means it supports metadata updates via admin.cgi,
       and the string "OK" can also be sent, but will indicate to the
       shoutcast source client to not send metadata updates.
       I believe icecast 1.x used to send OK. */
    sock_write(con->sock, "%s\r\n", "OK2");

    memset(header, 0, sizeof (header));
    /* Step three of shoutcast auth protocol, read HTTP-style
       request headers and process them.*/
    if (util_read_header(con->sock, header, sizeof (header), 
                         READ_ENTIRE_HEADER) == 0) {
        /* either we didn't get a complete header, or we timed out */
        connection_close(con);
        return;
    }
    /* Here we create a valid HTTP request based of the information
       that was passed in via the non-HTTP style protocol above. This
       means we can use some of our existing code to handle this case */
1033
    http_compliant_len = strlen(header) + strlen(mount) + 20;
1034
    http_compliant = (char *)calloc(1, http_compliant_len);
1035
1036
    snprintf (http_compliant, http_compliant_len,
            "SOURCE %s HTTP/1.0\r\n%s", mount, header);
1037
1038
    parser = httpp_create_parser();
    httpp_initialize(parser, NULL);
1039
1040
    if (httpp_parse(parser, http_compliant, strlen(http_compliant))) {
        _handle_source_request(con, parser, mount, SHOUTCAST_SOURCE_AUTH);
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
        free(http_compliant);
        return;
    }
    else {
        ERROR0("Invalid source request");
        connection_close(con);
        free(http_compliant);
        httpp_destroy(parser);
        return;
    }
    return;
}

1054
1055
static void *_handle_connection(void *arg)
{
1056
1057
1058
    char header[4096];
    connection_t *con;
    http_parser_t *parser;
1059
    char *rawuri, *uri;
1060
    client_t *client;
1061
1062
1063
1064
    int i = 0;
    int continue_flag = 0;
    ice_config_t *config;
    char *source_password;
Jack Moffitt's avatar
Jack Moffitt committed
1065

1066
    while (global.running == ICE_RUNNING) {
Jack Moffitt's avatar
Jack Moffitt committed
1067

1068
1069
        /* grab a connection and set the socket to blocking */
        while ((con = _get_connection())) {
Michael Smith's avatar
Michael Smith committed
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084

            /* Handle meta-connections */
            if(con->event_number > 0) {
                switch(con->event_number) {
                    case EVENT_CONFIG_READ:
                        event_config_read(con->event);
                        break;
                    default:
                        ERROR1("Unknown event number: %d", con->event_number);
                        break;
                }
                free(con);
                continue;
            }

1085
            stats_event_inc(NULL, "connections");
Jack Moffitt's avatar
Jack Moffitt committed
1086

1087
            sock_set_blocking(con->sock, SOCK_BLOCK);
Jack Moffitt's avatar
Jack Moffitt committed
1088

1089
1090
1091
1092
1093
1094
            continue_flag = 0;
            /* Check for special shoutcast compatability processing */
            for(i = 0; i < MAX_LISTEN_SOCKETS; i++) {
                if(global.serversock[i] == con->serversock) {
                    config = config_get_config();
                    if (config->listeners[i].shoutcast_compat) {
1095
                        char *shoutcast_mount = strdup (config->shoutcast_mount);
1096
1097
                        source_password = strdup(config->source_password);
                        config_release_config();
1098
                        _handle_shoutcast_compatible(con, shoutcast_mount, source_password);
1099
                        free(source_password);
1100
                        free (shoutcast_mount);
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
                        continue_flag = 1;
                        break;
                    }
                    config_release_config();
                }
            }
            if(continue_flag) {
                continue;
            }

1111
            /* fill header with the http header */
1112
            memset(header, 0, sizeof (header));
1113
1114
            if (util_read_header(con->sock, header, sizeof (header), 
                                 READ_ENTIRE_HEADER) == 0) {
1115
1116
1117
1118
                /* either we didn't get a complete header, or we timed out */
                connection_close(con);
                continue;
            }
Jack Moffitt's avatar
Jack Moffitt committed
1119

1120
1121
1122
1123
1124
1125
            parser = httpp_create_parser();
            httpp_initialize(parser, NULL);
            if (httpp_parse(parser, header, strlen(header))) {
                /* handle the connection or something */
                
                if (strcmp("ICE",  httpp_getvar(parser, HTTPP_VAR_PROTOCOL)) &&
1126
                    strcmp("HTTP", httpp_getvar(parser, HTTPP_VAR_PROTOCOL))) {
1127
                    ERROR0("Bad HTTP protocol detected");
1128
1129
1130
1131
                    connection_close(con);
                    httpp_destroy(parser);
                    continue;
                }