connection.c 49 KB
Newer Older
1 2 3 4 5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7 8 9 10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
12
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13 14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16 17 18 19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20 21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24 25 26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28 29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30 31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

36
#include "compat.h"
Jack Moffitt's avatar
Jack Moffitt committed
37

Marvin Scholz's avatar
Marvin Scholz committed
38 39 40 41
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
42

43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44 45 46 47 48
#include "global.h"
#include "util.h"
#include "connection.h"
#include "refbuf.h"
#include "client.h"
49
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
50 51
#include "stats.h"
#include "logging.h"
52
#include "xslt.h"
53
#include "fserve.h"
54
#include "sighandler.h"
55 56

#include "yp.h"
Jack Moffitt's avatar
Jack Moffitt committed
57
#include "source.h"
Michael Smith's avatar
Michael Smith committed
58
#include "format.h"
59
#include "format_mp3.h"
60
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
61
#include "auth.h"
62
#include "matchfile.h"
63
#include "tls.h"
Jack Moffitt's avatar
Jack Moffitt committed
64 65 66

#define CATMODULE "connection"

67 68 69 70 71 72 73 74 75 76 77 78 79 80 81
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

82 83 84 85 86
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int stream_offset;
    int shoutcast;
87
    char *shoutcast_mount;
88 89
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
90 91

typedef struct _thread_queue_tag {
92 93
    thread_type *thread_id;
    struct _thread_queue_tag *next;
Jack Moffitt's avatar
Jack Moffitt committed
94 95
} thread_queue_t;

96
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
97
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
98 99
static int _initialized = 0;

100 101
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
102
static int tls_ok;
103
static tls_ctx_t *tls_ctx;
104

105
/* filtering client connection based on IP */
106
static matchfile_t *banned_ip, *allowed_ip;
107

108
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
109

110
static void _handle_connection(void);
111
static void get_tls_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
112 113 114

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
115 116
    if (_initialized)
        return;
117

118
    thread_spin_create (&_connection_lock);
119
    thread_mutex_create(&move_clients_mutex);
120
    thread_rwlock_create(&_source_shutdown_rwlock);
121
    thread_cond_create(&global.shutdown_cond);
122 123 124 125
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
Jack Moffitt's avatar
Jack Moffitt committed
126

127
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
128 129 130 131
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
132 133
    if (!_initialized)
        return;
134

135
    tls_ctx_unref(tls_ctx);
136 137 138
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
139
    thread_cond_destroy(&global.shutdown_cond);
140
    thread_rwlock_destroy(&_source_shutdown_rwlock);
141
    thread_spin_destroy (&_connection_lock);
142
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
143

144
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
145 146
}

147 148
void connection_reread_config(struct ice_config_tag *config)
{
149
    get_tls_certificate(config);
150 151
}

Jack Moffitt's avatar
Jack Moffitt committed
152 153
static unsigned long _next_connection_id(void)
{
154
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
155

156
    thread_spin_lock(&_connection_lock);
157
    id = _current_id++;
158
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
159

160
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
161 162
}

163

164
#ifdef ICECAST_CAP_TLS
165
static void get_tls_certificate(ice_config_t *config)
166
{
167 168
    const char *keyfile;

169
    config->tls_ok = tls_ok = 0;
170

171 172 173 174
    keyfile = config->tls_context.key_file;
    if (!keyfile)
        keyfile = config->tls_context.cert_file;

175
    tls_ctx_unref(tls_ctx);
176
    tls_ctx = tls_ctx_new(config->tls_context.cert_file, keyfile, config->tls_context.cipher_list);
177 178
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
179
        return;
180 181
    }

182
    config->tls_ok = tls_ok = 1;
183 184 185
}


186
/* handlers for reading and writing a connection_t when there is TLS
187 188
 * configured on the listening port
 */
189
static int connection_read_tls(connection_t *con, void *buf, size_t len)
190
{
191
    ssize_t bytes = tls_read(con->tls, buf, len);
192

Marvin Scholz's avatar
Marvin Scholz committed
193
    if (bytes < 0) {
194
        if (tls_want_io(con->tls) > 0)
195
            return -1;
196 197 198 199 200
        con->error = 1;
    }
    return bytes;
}

201
static int connection_send_tls(connection_t *con, const void *buf, size_t len)
202
{
203
    ssize_t bytes = tls_write(con->tls, buf, len);
204

Marvin Scholz's avatar
Marvin Scholz committed
205
    if (bytes < 0) {
206 207
        if (tls_want_io(con->tls) > 0)
            return -1;
208
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
209
    } else {
210
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
211
    }
212 213 214 215
    return bytes;
}
#else

216 217
/* TLS not compiled in, so at least log it */
static void get_tls_certificate(ice_config_t *config)
218
{
219
    tls_ok = 0;
220
    ICECAST_LOG_INFO("No TLS capability. "
Philipp Schafft's avatar
Philipp Schafft committed
221
                     "Rebuild Icecast with OpenSSL support to enable this.");
222
}
223
#endif /* ICECAST_CAP_TLS */
224 225 226 227 228


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
229
static int connection_read(connection_t *con, void *buf, size_t len)
230
{
Marvin Scholz's avatar
Marvin Scholz committed
231
    int bytes = sock_read_bytes(con->sock, buf, len);
232 233
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
234
    if (bytes == -1 && !sock_recoverable(sock_error()))
235 236 237 238
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
239
static int connection_send(connection_t *con, const void *buf, size_t len)
240
{
Marvin Scholz's avatar
Marvin Scholz committed
241 242 243
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
244
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
245
    } else {
246
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
247
    }
248 249 250
    return bytes;
}

251 252
connection_t *connection_create (sock_t sock, sock_t serversock, char *ip)
{
253
    connection_t *con;
254
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
255 256
    if (con) {
        con->sock       = sock;
257
        con->serversock = serversock;
Marvin Scholz's avatar
Marvin Scholz committed
258 259 260
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
261
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
262 263
        con->read       = connection_read;
        con->send       = connection_send;
264
    }
Michael Smith's avatar
Michael Smith committed
265

266
    return con;
267 268
}

269
/* prepare connection for interacting over a TLS connection
270
 */
271
void connection_uses_tls(connection_t *con)
272
{
273
#ifdef ICECAST_CAP_TLS
274
    if (con->tls)
275 276
        return;

277
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
278 279
    con->read = connection_read_tls;
    con->send = connection_send_tls;
280 281 282
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
283 284 285
#endif
}

286 287 288 289 290
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
    return con->read(con, buf, len);
}

291
static sock_t wait_for_serversock(int timeout)
292 293
{
#ifdef HAVE_POLL
294
    struct pollfd ufds [global.server_sockets];
295 296 297 298 299 300 301 302 303 304
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
305
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
306
    } else if(ret == 0) {
307
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
308
    } else {
309
        int dst;
310
        for(i=0; i < global.server_sockets; i++) {
311
            if(ufds[i].revents & POLLIN)
312
                return ufds[i].fd;
Marvin Scholz's avatar
Marvin Scholz committed
313 314
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL)) {
                if (ufds[i].revents & (POLLHUP|POLLERR)) {
315
                    sock_close (global.serversock[i]);
316
                    ICECAST_LOG_WARN("Had to close a listening socket");
317
                }
318
                global.serversock[i] = SOCK_ERROR;
319
            }
320
        }
321
        /* remove any closed sockets */
Marvin Scholz's avatar
Marvin Scholz committed
322
        for(i=0, dst=0; i < global.server_sockets; i++) {
323
            if (global.serversock[i] == SOCK_ERROR)
324
            continue;
325
            if (i!=dst)
326
            global.serversock[dst] = global.serversock[i];
327 328 329
            dst++;
        }
        global.server_sockets = dst;
330
        return SOCK_ERROR;
331 332 333 334 335
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
336
    sock_t max = SOCK_ERROR;
337 338 339 340 341

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
342
        if (max == SOCK_ERROR || global.serversock[i] > max)
343 344 345 346 347
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
348
        tv.tv_usec = (timeout % 1000) * 1000;
349 350 351 352 353
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
354
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
355
    } else if(ret == 0) {
356
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
357
    } else {
358 359 360 361
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
362
        return SOCK_ERROR; /* Should be impossible, stop compiler warnings */
363 364 365 366
    }
#endif
}

367
static connection_t *_accept_connection(int duration)
Jack Moffitt's avatar
Jack Moffitt committed
368
{
369
    sock_t sock, serversock;
370
    char *ip;
Jack Moffitt's avatar
Jack Moffitt committed
371

372
    serversock = wait_for_serversock (duration);
373
    if (serversock == SOCK_ERROR)
374
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
375

376 377
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
378

379
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
Marvin Scholz's avatar
Marvin Scholz committed
380
    if (sock != SOCK_ERROR) {
381
        connection_t *con = NULL;
382
        /* Make any IPv4 mapped IPv6 address look like a normal IPv4 address */
Marvin Scholz's avatar
Marvin Scholz committed
383 384
        if (strncmp(ip, "::ffff:", 7) == 0)
            memmove(ip, ip+7, strlen (ip+7)+1);
Jack Moffitt's avatar
Jack Moffitt committed
385

386 387
        if (matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
            con = connection_create (sock, serversock, ip);
388 389
        if (con)
            return con;
Marvin Scholz's avatar
Marvin Scholz committed
390 391 392
        sock_close(sock);
    } else {
        if (!sock_recoverable(sock_error())) {
393
            ICECAST_LOG_WARN("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
Marvin Scholz's avatar
Marvin Scholz committed
394
            thread_sleep(500000);
395
        }
396 397 398
    }
    free(ip);
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
399 400 401
}


402 403 404 405
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
406
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
407
{
408
    thread_spin_lock(&_connection_lock);
409
    *_con_queue_tail = node;
410 411
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
412 413 414
}


415 416 417 418 419 420
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
421

Marvin Scholz's avatar
Marvin Scholz committed
422
    thread_spin_lock(&_connection_lock);
423

Marvin Scholz's avatar
Marvin Scholz committed
424
    if (_con_queue){
425 426 427 428
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
429
        node->next = NULL;
430
    }
431

Marvin Scholz's avatar
Marvin Scholz committed
432
    thread_spin_unlock(&_connection_lock);
433 434
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
435 436


437
/* run along queue checking for any data that has come in or a timeout */
438
static void process_request_queue (void)
439 440
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
441 442 443 444 445 446
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
447
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
448

Marvin Scholz's avatar
Marvin Scholz committed
449
    while (*node_ref) {
450 451 452 453
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
454

455
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO || client->con->tlsmode == ICECAST_TLSMODE_AUTO_NO_PLAIN) {
456 457
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
458
                    connection_uses_tls(client->con);
459 460 461 462
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
463 464
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
465
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
466 467 468
            } else {
                len = client_read_bytes(client, buf, len);
            }
469
        }
Jack Moffitt's avatar
Jack Moffitt committed
470

Marvin Scholz's avatar
Marvin Scholz committed
471
        if (len > 0) {
472 473 474
            int pass_it = 1;
            char *ptr;

475 476
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
477
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
478 479 480
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
481
                    /* password line */
482 483
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
484 485 486 487 488 489 490
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
491 492
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
493 494 495
                    node->stream_offset = (ptr+6) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
496 497
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
498 499 500
                    node->stream_offset = (ptr+4) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
501 502
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
503 504 505 506 507
                    node->stream_offset = (ptr+2) - client->refbuf->data;
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
508

Marvin Scholz's avatar
Marvin Scholz committed
509
            if (pass_it) {
510 511 512 513
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
514
                _add_connection(node);
515
                continue;
516
            }
Marvin Scholz's avatar
Marvin Scholz committed
517 518
        } else {
            if (len == 0 || client->con->error) {
519 520 521
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
522 523
                client_destroy(client);
                free(node);
524 525 526 527
                continue;
            }
        }
        node_ref = &node->next;
528
    }
529
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
530 531
}

532

533 534 535
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
536
static void _add_request_queue(client_queue_t *node)
537 538 539
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
540 541
}

542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
    ice_config_t *config;
    listener_t *listener;

    if (!node)
        return NULL;

    node->client = client;

    config = config_get_config();
    listener = config_get_listen_sock(config, client->con);

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
559 560
        client->con->tlsmode = listener->tls;
        if (listener->tls == ICECAST_TLSMODE_RFC2818 && tls_ok)
561
            connection_uses_tls(client->con);
562 563 564 565 566 567 568 569
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    config_release_config();

    return node;
}
570

571 572 573 574 575 576 577 578
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
579
        client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_LIMIT);
580 581 582 583 584 585 586 587 588 589
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
590
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
591 592 593 594 595 596 597 598 599 600 601 602 603 604 605
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
606
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
607
{
608
    connection_t *con;
609
    ice_config_t *config;
610
    int duration = 300;
611

Marvin Scholz's avatar
Marvin Scholz committed
612
    config = config_get_config();
613
    get_tls_certificate(config);
Marvin Scholz's avatar
Marvin Scholz committed
614
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
615

Marvin Scholz's avatar
Marvin Scholz committed
616
    while (global.running == ICECAST_RUNNING) {
617
        con = _accept_connection (duration);
618

Marvin Scholz's avatar
Marvin Scholz committed
619
        if (con) {
620
            connection_queue(con);
621
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
622
        } else {
623 624
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
625
        }
Marvin Scholz's avatar
Marvin Scholz committed
626
        process_request_queue();
627
    }
Jack Moffitt's avatar
Jack Moffitt committed
628

629 630 631
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

632 633 634
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
635 636
}

637 638 639

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
640
 */
Marvin Scholz's avatar
Marvin Scholz committed
641
int connection_complete_source(source_t *source, int response)
642
{
643
    ice_config_t *config;
644

Marvin Scholz's avatar
Marvin Scholz committed
645
    global_lock();
646
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
647

648
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
649
    if (global.sources < config->source_limit) {
650
        const char *contenttype;
651
        mount_proxy *mountinfo;
652 653 654 655
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
656 657
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
658

Marvin Scholz's avatar
Marvin Scholz committed
659
            if (format_type == FORMAT_ERROR) {
660
                config_release_config();
661
                global_unlock();
662
                if (response) {
663
                    client_send_error_by_id(source->client, ICECAST_ERROR_CON_CONTENT_TYPE_NOSYS);
664 665
                    source->client = NULL;
                }
666
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
667 668
                return -1;
            }
669 670 671 672
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
673
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_NO_CONTENT_TYPE_GIVEN);
674 675 676 677 678 679 680 681
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
682
            format_type = FORMAT_TYPE_GENERIC;
683 684
        }

Marvin Scholz's avatar
Marvin Scholz committed
685
        if (format_get_plugin (format_type, source) < 0) {
686 687
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
688
            if (response) {
689
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_INTERNAL_FORMAT_ALLOC_ERROR);
690 691
                source->client = NULL;
            }
692
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
693 694 695
            return -1;
        }

696
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
697
        stats_event_args(NULL, "sources", "%d", global.sources);
698
        global_unlock();
699

700
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
701 702
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
703
        config_release_config();
704
        slave_rebuild_mounts();
705 706

        source->shutdown_rwlock = &_source_shutdown_rwlock;
707
        ICECAST_LOG_DEBUG("source is ready to start");
708 709 710

        return 0;
    }
711
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
712
        "reached %d", global.sources);
713 714 715 716

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
717
    if (response) {
718
        client_send_error_by_id(source->client, ICECAST_ERROR_CON_SOURCE_CLIENT_LIMIT);
719 720
        source->client = NULL;
    }
721 722 723 724

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
725
static inline void source_startup(client_t *client, const char *uri)
726 727
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
728
    source = source_reserve(uri);
729

Marvin Scholz's avatar
Marvin Scholz committed
730
    if (source) {
731
        source->client = client;
732 733
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
734 735 736
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
737 738 739
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
740 741 742 743
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
744
            client_send_bytes(client, "OK2\r\nicy-caps:11\r\n\r\n", 20); /* TODO: Replace Magic Number! */
745
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
746
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
747
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
748
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
749
            const char *expectcontinue;
750
            const char *transfer_encoding;
751
            int status_to_send = 200;
752
            ssize_t ret;
753

754 755 756 757
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
758
                    client_send_error_by_id(client, ICECAST_ERROR_CON_UNIMPLEMENTED);
759 760 761 762
                    return;
                }
            }

763 764 765 766 767 768 769
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
770
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
771 772 773 774 775 776 777
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

778
            client->respcode = 200;
779 780
            ret = util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, NULL, NULL, client);
            snprintf(ok->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Length: 0\r\n\r\n");
Marvin Scholz's avatar
Marvin Scholz committed
781
            ok->len = strlen(ok->data);
782 783 784
            /* we may have unprocessed data read in, so don't overwrite it */
            ok->associated = client->refbuf;
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
785
            fserve_add_client_callback(client, source_client_callback, source);
786
        }
Marvin Scholz's avatar
Marvin Scholz committed
787
    } else {
788
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNT_IN_USE);
789
        ICECAST_LOG_WARN("Mountpoint %s in use", uri);
790
    }
791 792
}

Philipp Schafft's avatar
Philipp Schafft committed
793
/* only called for native icecast source clients */
Marvin Scholz's avatar
Marvin Scholz committed
794
static void _handle_source_request(client_t *client, const char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
795
{
796 797
    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" from %s as role %s",
        uri, client->con->ip, client->role);
798

Marvin Scholz's avatar
Marvin Scholz committed
799
    if (uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
800
        ICECAST_LOG_WARN("source mountpoint not starting with /");
801
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNTPOINT_NOT_STARTING_WITH_SLASH);
802
        return;
803
    }
804

Philipp Schafft's avatar
Philipp Schafft committed
805 806 807 808
    source_startup(client, uri);
}


Marvin Scholz's avatar
Marvin Scholz committed
809
static void _handle_stats_request(client_t *client, char *uri)
Philipp Schafft's avatar
Philipp Schafft committed
810 811 812
{
    stats_event_inc(NULL, "stats_connections");

813
    client->respcode = 200;
814
    snprintf (client->refbuf->data, PER_CLIENT_REFBUF_SIZE,
Marvin Scholz's avatar
Marvin Scholz committed
815 816 817
        "HTTP/1.0 200 OK\r\n\r\n");
    client->refbuf->len = strlen(client->refbuf->data);
    fserve_add_client_callback(client, stats_callback, NULL);
818 819
}

Philipp Schafft's avatar
Philipp Schafft committed
820 821 822
/* if 0 is returned then the client should not be touched, however if -1
 * is returned then the caller is responsible for handling the client
 */
Marvin Scholz's avatar
Marvin Scholz committed
823
static int __add_listener_to_source(source_t *source, client_t *client)
824
{
Philipp Schafft's avatar
Philipp Schafft committed
825
    size_t loop = 10;
Michael Smith's avatar
Michael Smith committed
826

Marvin Scholz's avatar
Marvin Scholz committed
827
    do {
Philipp Schafft's avatar
Philipp Schafft committed
828
        ICECAST_LOG_DEBUG("max on %s is %ld (cur %lu)", source->mount,
Marvin Scholz's avatar
Marvin Scholz committed
829
            source->max_listeners, source->listeners);
Philipp Schafft's avatar
Philipp Schafft committed
830