connection.c 54.2 KB
Newer Older
1 2 3 4 5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7 8 9 10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
12
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13 14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16 17 18 19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20 21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24 25 26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28 29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30 31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

Marvin Scholz's avatar
Marvin Scholz committed
36 37 38 39
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
40

41 42
#include "compat.h"
#include "connection.h"
43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44 45
#include "global.h"
#include "util.h"
46
#include "refobject.h"
Jack Moffitt's avatar
Jack Moffitt committed
47 48
#include "refbuf.h"
#include "client.h"
49
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
50 51
#include "stats.h"
#include "logging.h"
52
#include "fserve.h"
53
#include "slave.h"
54

Jack Moffitt's avatar
Jack Moffitt committed
55
#include "source.h"
56
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
57
#include "auth.h"
58
#include "matchfile.h"
59
#include "tls.h"
60
#include "acl.h"
61 62
#include "refobject.h"
#include "listensocket.h"
Jack Moffitt's avatar
Jack Moffitt committed
63 64 65

#define CATMODULE "connection"

66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

81 82 83 84
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int shoutcast;
85
    char *shoutcast_mount;
86 87
    char *bodybuffer;
    size_t bodybufferlen;
88
    int tried_body;
89 90
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
91

92
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
93
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
94 95
static int _initialized = 0;

96 97
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
98
static volatile client_queue_t *_body_queue = NULL, **_body_queue_tail = &_body_queue;
99
static int tls_ok;
100
static tls_ctx_t *tls_ctx;
101

102
/* filtering client connection based on IP */
103
static matchfile_t *banned_ip, *allowed_ip;
104

105
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
106

107
static void _handle_connection(void);
108
static void get_tls_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
109 110 111

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
112 113
    if (_initialized)
        return;
114

115
    thread_spin_create (&_connection_lock);
116
    thread_mutex_create(&move_clients_mutex);
117
    thread_rwlock_create(&_source_shutdown_rwlock);
118
    thread_cond_create(&global.shutdown_cond);
119 120 121 122
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
123 124
    _body_queue = NULL;
    _body_queue_tail = &_body_queue;
Jack Moffitt's avatar
Jack Moffitt committed
125

126
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
127 128 129 130
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
131 132
    if (!_initialized)
        return;
133

134
    tls_ctx_unref(tls_ctx);
135 136 137
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
138
    thread_cond_destroy(&global.shutdown_cond);
139
    thread_rwlock_destroy(&_source_shutdown_rwlock);
140
    thread_spin_destroy (&_connection_lock);
141
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
142

143
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
144 145
}

146
void connection_reread_config(ice_config_t *config)
147
{
148
    get_tls_certificate(config);
149 150 151 152 153 154 155
    /* This does not work yet.
     * listensocket_container_configure() should keep sockets that are the same.
     * Otherwise the Kernel doesn't let us do it.
     * -- ph3-der-loewe, 2018-04-17
    listensocket_container_configure(global.listensockets, config);
    listensocket_container_setup(global.listensockets);
    */
156 157
}

Jack Moffitt's avatar
Jack Moffitt committed
158 159
static unsigned long _next_connection_id(void)
{
160
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
161

162
    thread_spin_lock(&_connection_lock);
163
    id = _current_id++;
164
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
165

166
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
167 168
}

169

170
#ifdef ICECAST_CAP_TLS
171
static void get_tls_certificate(ice_config_t *config)
172
{
173 174
    const char *keyfile;

175
    config->tls_ok = tls_ok = 0;
176

177 178 179 180
    keyfile = config->tls_context.key_file;
    if (!keyfile)
        keyfile = config->tls_context.cert_file;

181
    tls_ctx_unref(tls_ctx);
182
    tls_ctx = tls_ctx_new(config->tls_context.cert_file, keyfile, config->tls_context.cipher_list);
183 184
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
185
        return;
186 187
    }

188
    config->tls_ok = tls_ok = 1;
189 190 191
}


192
/* handlers for reading and writing a connection_t when there is TLS
193 194
 * configured on the listening port
 */
195
static int connection_read_tls(connection_t *con, void *buf, size_t len)
196
{
197
    ssize_t bytes = tls_read(con->tls, buf, len);
198

Marvin Scholz's avatar
Marvin Scholz committed
199
    if (bytes < 0) {
200
        if (tls_want_io(con->tls) > 0)
201
            return -1;
202 203 204 205 206
        con->error = 1;
    }
    return bytes;
}

207
static int connection_send_tls(connection_t *con, const void *buf, size_t len)
208
{
209
    ssize_t bytes = tls_write(con->tls, buf, len);
210

Marvin Scholz's avatar
Marvin Scholz committed
211
    if (bytes < 0) {
212 213
        if (tls_want_io(con->tls) > 0)
            return -1;
214
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
215
    } else {
216
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
217
    }
218 219 220 221
    return bytes;
}
#else

222 223
/* TLS not compiled in, so at least log it */
static void get_tls_certificate(ice_config_t *config)
224
{
225
    tls_ok = 0;
226
    ICECAST_LOG_INFO("No TLS capability. "
Philipp Schafft's avatar
Philipp Schafft committed
227
                     "Rebuild Icecast with OpenSSL support to enable this.");
228
}
229
#endif /* ICECAST_CAP_TLS */
230 231 232 233 234


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
235
static int connection_read(connection_t *con, void *buf, size_t len)
236
{
Marvin Scholz's avatar
Marvin Scholz committed
237
    int bytes = sock_read_bytes(con->sock, buf, len);
238 239
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
240
    if (bytes == -1 && !sock_recoverable(sock_error()))
241 242 243 244
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
245
static int connection_send(connection_t *con, const void *buf, size_t len)
246
{
Marvin Scholz's avatar
Marvin Scholz committed
247 248 249
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
250
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
251
    } else {
252
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
253
    }
254 255 256
    return bytes;
}

257
connection_t *connection_create(sock_t sock, listensocket_t *listensocket_real, listensocket_t* listensocket_effective, char *ip)
258
{
259
    connection_t *con;
260 261 262 263

    if (!matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
        return NULL;

264
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
265
    if (con) {
266 267 268
        refobject_ref(listensocket_real);
        refobject_ref(listensocket_effective);

Marvin Scholz's avatar
Marvin Scholz committed
269
        con->sock       = sock;
270 271
        con->listensocket_real = listensocket_real;
        con->listensocket_effective = listensocket_effective;
Marvin Scholz's avatar
Marvin Scholz committed
272 273 274
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
275
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
276 277
        con->read       = connection_read;
        con->send       = connection_send;
278
    }
Michael Smith's avatar
Michael Smith committed
279

280
    return con;
281 282
}

283
/* prepare connection for interacting over a TLS connection
284
 */
285
void connection_uses_tls(connection_t *con)
286
{
287
#ifdef ICECAST_CAP_TLS
288
    if (con->tls)
289 290
        return;

291 292 293 294 295 296
    if (con->readbufferlen) {
        ICECAST_LOG_ERROR("Connection is now using TLS but has data put back. BAD. Discarding putback data.");
        free(con->readbuffer);
        con->readbufferlen = 0;
    }

297
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
298 299
    con->read = connection_read_tls;
    con->send = connection_send_tls;
300 301 302
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
303 304 305
#endif
}

306 307
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
308 309 310 311 312 313 314 315
    ssize_t done = 0;
    ssize_t ret;

    if (con->readbufferlen) {
        ICECAST_LOG_DEBUG("On connection %p we read from putback buffer, filled with %zu bytes, requested are %zu bytes", con, con->readbufferlen, len);
        if (len >= con->readbufferlen) {
            memcpy(buf, con->readbuffer, con->readbufferlen);
            free(con->readbuffer);
316
            ICECAST_LOG_DEBUG("New fill in buffer=<empty>");
317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372
            if (len == con->readbufferlen) {
                con->readbufferlen = 0;
                return len;
            } else {
                len -= con->readbufferlen;
                buf += con->readbufferlen;
                done = con->readbufferlen;
                con->readbufferlen = 0;
            }
        } else {
            memcpy(buf, con->readbuffer, len);
            memmove(con->readbuffer, con->readbuffer+len, con->readbufferlen-len);
            con->readbufferlen -= len;
            return len;
        }
    }

    ret = con->read(con, buf, len);

    if (ret < 0) {
        if (done == 0) {
            return ret;
        } else {
            return done;
        }
    }

    return done + ret;
}

int connection_read_put_back(connection_t *con, const void *buf, size_t len)
{
    void *n;

    if (con->readbufferlen) {
        n = realloc(con->readbuffer, con->readbufferlen + len);
        if (!n)
            return -1;

        memcpy(n + con->readbufferlen, buf, len);
        con->readbuffer = n;
        con->readbufferlen += len;

        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    } else {
        n = malloc(len);
        if (!n)
            return -1;

        memcpy(n, buf, len);
        con->readbuffer = n;
        con->readbufferlen = len;
        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    }
373 374
}

375 376 377 378
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
379
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
380
{
381
    thread_spin_lock(&_connection_lock);
382
    *_con_queue_tail = node;
383 384
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
385 386 387
}


388 389 390 391 392 393
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
394

Marvin Scholz's avatar
Marvin Scholz committed
395
    thread_spin_lock(&_connection_lock);
396

Marvin Scholz's avatar
Marvin Scholz committed
397
    if (_con_queue){
398 399 400 401
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
402
        node->next = NULL;
403
    }
404

Marvin Scholz's avatar
Marvin Scholz committed
405
    thread_spin_unlock(&_connection_lock);
406 407
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
408 409


410
/* run along queue checking for any data that has come in or a timeout */
411
static void process_request_queue (void)
412 413
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
414 415 416 417 418 419
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
420
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
421

Marvin Scholz's avatar
Marvin Scholz committed
422
    while (*node_ref) {
423 424 425 426
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
427

428
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO || client->con->tlsmode == ICECAST_TLSMODE_AUTO_NO_PLAIN) {
429 430
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
431
                    connection_uses_tls(client->con);
432 433 434 435
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
436 437
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
438
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
439 440 441
            } else {
                len = client_read_bytes(client, buf, len);
            }
442
        }
Jack Moffitt's avatar
Jack Moffitt committed
443

Marvin Scholz's avatar
Marvin Scholz committed
444
        if (len > 0) {
445
            ssize_t stream_offset = -1;
446 447 448
            int pass_it = 1;
            char *ptr;

449 450
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
451
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
452 453 454
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
455
                    /* password line */
456 457
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
458 459 460 461 462 463 464
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
465 466
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
467
                    stream_offset = (ptr+6) - client->refbuf->data;
468 469
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
470 471
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
472
                    stream_offset = (ptr+4) - client->refbuf->data;
473 474
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
475 476
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
477
                    stream_offset = (ptr+2) - client->refbuf->data;
478 479 480 481
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
482

Marvin Scholz's avatar
Marvin Scholz committed
483
            if (pass_it) {
484 485 486 487
                if (stream_offset != -1) {
                    connection_read_put_back(client->con, client->refbuf->data + stream_offset, node->offset - stream_offset);
                    node->offset = stream_offset;
                }
488 489 490 491
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
492
                _add_connection(node);
493
                continue;
494
            }
Marvin Scholz's avatar
Marvin Scholz committed
495 496
        } else {
            if (len == 0 || client->con->error) {
497 498 499
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
500 501
                client_destroy(client);
                free(node);
502 503 504 505
                continue;
            }
        }
        node_ref = &node->next;
506
    }
507
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
508 509
}

510 511 512 513 514 515 516 517 518 519 520 521
/* add client to body queue.
 */
static void _add_body_client(client_queue_t *node)
{
    ICECAST_LOG_DEBUG("Putting client %p in body queue.", node->client);

    thread_spin_lock(&_connection_lock);
    *_body_queue_tail = node;
    _body_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
}

522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557
static client_slurp_result_t process_request_body_queue_one(client_queue_t *node, time_t timeout, size_t body_size_limit)
{
        client_t *client = node->client;
        client_slurp_result_t res;

        if (client->parser->req_type == httpp_req_post) {
            if (node->bodybuffer == NULL && client->request_body_read == 0) {
                if (client->request_body_length < 0) {
                    node->bodybufferlen = body_size_limit;
                    node->bodybuffer = malloc(node->bodybufferlen);
                } else if (client->request_body_length <= (ssize_t)body_size_limit) {
                    node->bodybufferlen = client->request_body_length;
                    node->bodybuffer = malloc(node->bodybufferlen);
                }
            }
        }

        if (node->bodybuffer) {
            res = client_body_slurp(client, node->bodybuffer, &(node->bodybufferlen));
            if (res == CLIENT_SLURP_SUCCESS) {
                httpp_parse_postdata(client->parser, node->bodybuffer, node->bodybufferlen);
                free(node->bodybuffer);
                node->bodybuffer = NULL;
            }
        } else {
            res = client_body_skip(client);
        }

        if (res != CLIENT_SLURP_SUCCESS) {
            if (client->con->con_time <= timeout || client->request_body_read >= body_size_limit) {
                return CLIENT_SLURP_ERROR;
            }
        }

        return res;
}
558 559 560 561 562

/* This queue reads data from the body of clients. */
static void process_request_body_queue (void)
{
    client_queue_t **node_ref = (client_queue_t **)&_body_queue;
563 564 565
    ice_config_t *config;
    time_t timeout;
    size_t body_size_limit;
566 567 568 569 570

    ICECAST_LOG_DEBUG("Processing body queue.");

    ICECAST_LOG_DEBUG("_body_queue=%p, &_body_queue=%p, _body_queue_tail=%p", _body_queue, &_body_queue, _body_queue_tail);

571 572 573 574 575
    config = config_get_config();
    timeout = time(NULL) - config->body_timeout;
    body_size_limit = config->body_size_limit;
    config_release_config();

576 577 578 579 580
    while (*node_ref) {
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        client_slurp_result_t res;

581 582
        node->tried_body = 1;

583 584
        ICECAST_LOG_DEBUG("Got client %p in body queue.", client);

585
        res = process_request_body_queue_one(node, timeout, body_size_limit);
586

587
        if (res != CLIENT_SLURP_NEEDS_MORE_DATA) {
588 589 590 591 592 593 594 595 596 597 598 599
            ICECAST_LOG_DEBUG("Putting client %p back in connection queue.", client);

            if ((client_queue_t **)_body_queue_tail == &(node->next))
                _body_queue_tail = (volatile client_queue_t **)node_ref;
            *node_ref = node->next;
            node->next = NULL;
            _add_connection(node);
            continue;
        }
        node_ref = &node->next;
    }
}
600

601 602 603
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
604
static void _add_request_queue(client_queue_t *node)
605 606 607
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
608 609
}

610 611 612
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
613
    const listener_t *listener;
614 615 616 617 618 619

    if (!node)
        return NULL;

    node->client = client;

620
    listener = listensocket_get_listener(client->con->listensocket_effective);
621 622 623 624

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
625 626
        client->con->tlsmode = listener->tls;
        if (listener->tls == ICECAST_TLSMODE_RFC2818 && tls_ok)
627
            connection_uses_tls(client->con);
628 629 630 631 632 633
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    return node;
}
634

635 636 637 638 639 640 641 642
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
643
        client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_LIMIT);
644 645 646 647 648 649 650 651 652 653
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
654
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
655 656 657 658 659 660 661 662 663 664 665 666 667 668 669
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
670
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
671
{
672
    connection_t *con;
673
    ice_config_t *config;
674
    int duration = 300;
675

Marvin Scholz's avatar
Marvin Scholz committed
676
    config = config_get_config();
677
    get_tls_certificate(config);
Marvin Scholz's avatar
Marvin Scholz committed
678
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
679

Marvin Scholz's avatar
Marvin Scholz committed
680
    while (global.running == ICECAST_RUNNING) {
681
        con = listensocket_container_accept(global.listensockets, duration);
682

Marvin Scholz's avatar
Marvin Scholz committed
683
        if (con) {
684
            connection_queue(con);
685
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
686
        } else {
687 688
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
689
        }
Marvin Scholz's avatar
Marvin Scholz committed
690
        process_request_queue();
691
        process_request_body_queue();
692
    }
Jack Moffitt's avatar
Jack Moffitt committed
693

694 695 696
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

697 698 699
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
700 701
}

702 703 704

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
705
 */
Marvin Scholz's avatar
Marvin Scholz committed
706
int connection_complete_source(source_t *source, int response)
707
{
708
    ice_config_t *config;
709

Marvin Scholz's avatar
Marvin Scholz committed
710
    global_lock();
711
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
712

713
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
714
    if (global.sources < config->source_limit) {
715
        const char *contenttype;
716
        mount_proxy *mountinfo;
717 718 719 720
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
721 722
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
723

Marvin Scholz's avatar
Marvin Scholz committed
724
            if (format_type == FORMAT_ERROR) {
725
                config_release_config();
726
                global_unlock();
727
                if (response) {
728
                    client_send_error_by_id(source->client, ICECAST_ERROR_CON_CONTENT_TYPE_NOSYS);
729 730
                    source->client = NULL;
                }
731
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
732 733
                return -1;
            }
734 735 736 737
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
738
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_NO_CONTENT_TYPE_GIVEN);
739 740 741 742 743 744 745 746
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
747
            format_type = FORMAT_TYPE_GENERIC;
748 749
        }

Marvin Scholz's avatar
Marvin Scholz committed
750
        if (format_get_plugin (format_type, source) < 0) {
751 752
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
753
            if (response) {
754
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_INTERNAL_FORMAT_ALLOC_ERROR);
755 756
                source->client = NULL;
            }
757
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
758 759 760
            return -1;
        }

761
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
762
        stats_event_args(NULL, "sources", "%d", global.sources);
763
        global_unlock();
764

765
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
766 767
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
768
        config_release_config();
769
        slave_rebuild_mounts();
770 771

        source->shutdown_rwlock = &_source_shutdown_rwlock;
772
        ICECAST_LOG_DEBUG("source is ready to start");
773 774 775

        return 0;
    }
776
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
777
        "reached %d", global.sources);
778 779 780 781

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
782
    if (response) {
783
        client_send_error_by_id(source->client, ICECAST_ERROR_CON_SOURCE_CLIENT_LIMIT);
784 785
        source->client = NULL;
    }
786 787 788 789

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
790
static inline void source_startup(client_t *client, const char *uri)
791 792
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
793
    source = source_reserve(uri);
794

Marvin Scholz's avatar
Marvin Scholz committed
795
    if (source) {
796
        source->client = client;
797 798
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
799 800 801
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
802 803 804
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
805 806 807 808
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
809
            client_send_bytes(client, "OK2\r\nicy-caps:11\r\n\r\n", 20); /* TODO: Replace Magic Number! */
810
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
811
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
812
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
813
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
814
            const char *expectcontinue;
815
            const char *transfer_encoding;
816
            int status_to_send = 200;
817
            ssize_t ret;
818

819 820 821 822
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
823
                    client_send_error_by_id(client, ICECAST_ERROR_CON_UNIMPLEMENTED);
824 825 826 827
                    return;
                }
            }

828 829 830 831 832 833 834
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
835
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
836 837 838 839 840 841 842
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

843
            client->respcode = 200;
844 845
            ret = util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, NULL, NULL, client);
            snprintf(ok->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Length: 0\r\n\r\n");
Marvin Scholz's avatar
Marvin Scholz committed
846
            ok->len = strlen(ok->data);
847
            refbuf_release(client->refbuf);
848
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
849
            fserve_add_client_callback(client, source_client_callback, source);
850
        }
Marvin Scholz's avatar
Marvin Scholz committed
851
    } else {
852
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNT_IN_USE);
853
        ICECAST_LOG_WARN("Mountpoint %s in use", uri);
854
    }
855 856
}

Philipp Schafft's avatar
Philipp Schafft committed
857
/* only called for native icecast source clients */
Marvin Scholz's avatar
Marvin Scholz committed
858
static void _handle_source_request(client_t *client, const char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
859
{
860 861
    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" from %s as role %s",
        uri, client->con->ip, client->role);
862

Marvin Scholz's avatar
Marvin Scholz committed
863
    if (uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
864
        ICECAST_LOG_WARN("source mountpoint not starting with /");
865
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNTPOINT_NOT_STARTING_WITH_SLASH);
866
        return;
867
    }
868

Philipp Schafft's avatar
Philipp Schafft committed
869 870 871 872
    source_startup(client, uri);
}


Marvin Scholz's avatar
Marvin Scholz committed
873
static void _handle_stats_request(client_t *client, char *uri)
Philipp Schafft's avatar
Philipp Schafft committed
874 875 876
{
    stats_event_inc(NULL, "stats_connections");

877
    client->respcode = 200;
878
    snprintf (client->refbuf->data, PER_CLIENT_REFBUF_SIZE,
Marvin Scholz's avatar
Marvin Scholz committed
879 880 881
        "HTTP/1.0 200 OK\r\n\r\n");
    client->refbuf->len = strlen(client->refbuf->data);
    fserve_add_client_callback(client, stats_callback, NULL);
882 883
}

Philipp Schafft's avatar
Philipp Schafft committed
884 885 886
/* if 0 is returned then the client should not be touched, however if -1
 * is returned then the caller is responsible for handling the client
 */
Marvin Scholz's avatar
Marvin Scholz committed
887
static int __add_listener_to_source(source_t *source, client_t *client)
888
{
Philipp Schafft's avatar
Philipp Schafft committed
889
    size_t loop = 10;
Michael Smith's avatar
Michael Smith committed
890

Marvin Scholz's avatar
Marvin Scholz committed
891
    do {
Philipp Schafft's avatar
Philipp Schafft committed
892
        ICECAST_LOG_DEBUG("max on %s is %ld (cur %lu)", source->mount,
Marvin Scholz's avatar
Marvin Scholz committed
893
            source->max_listeners, source->listeners);
Philipp Schafft's avatar
Philipp Schafft committed
894 895 896 897
        if (source->max_listeners == -1)
            break;
        if (source->listeners < (unsigned long)source->max_listeners)
            break;
898

Marvin Scholz's avatar
Marvin Scholz committed
899
        if (loop && source->fallback_when_full && source->fallback_mount) {
Philipp Schafft's avatar
Philipp Schafft committed
900 901 902
            source_t *next = source_find_mount (source->fallback_mount);
            if (!next) {
                ICECAST_LOG_ERROR("Fallback '%s' for full source '%s' not found",
Marvin Scholz's avatar
Marvin Scholz committed
903
                    source->mount, source->fallback_mount);
Philipp Schafft's avatar
Philipp Schafft committed
904 905
                return -1;
            }