connection.c 57.9 KB
Newer Older
1
2
3
4
5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7
8
9
10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
12
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13
14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16
17
18
19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20
21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24
25
26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28
29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30
31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

Marvin Scholz's avatar
Marvin Scholz committed
36
37
38
39
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
40

41
42
#include "compat.h"
#include "connection.h"
43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44
45
#include "global.h"
#include "util.h"
46
#include "refobject.h"
Jack Moffitt's avatar
Jack Moffitt committed
47
48
#include "refbuf.h"
#include "client.h"
49
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
50
51
#include "stats.h"
#include "logging.h"
52
#include "fserve.h"
53
#include "slave.h"
54

Jack Moffitt's avatar
Jack Moffitt committed
55
#include "source.h"
56
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
57
#include "auth.h"
58
#include "matchfile.h"
59
#include "tls.h"
60
#include "acl.h"
Jack Moffitt's avatar
Jack Moffitt committed
61
62
63

#define CATMODULE "connection"

64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

79
80
81
82
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int shoutcast;
83
    char *shoutcast_mount;
84
85
    char *bodybuffer;
    size_t bodybufferlen;
86
    int tried_body;
87
88
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
89

90
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
91
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
92
93
static int _initialized = 0;

94
95
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
96
static volatile client_queue_t *_body_queue = NULL, **_body_queue_tail = &_body_queue;
97
static int tls_ok;
98
static tls_ctx_t *tls_ctx;
99

100
/* filtering client connection based on IP */
101
static matchfile_t *banned_ip, *allowed_ip;
102

103
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
104

105
static void _handle_connection(void);
106
static void get_tls_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
107
108
109

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
110
111
    if (_initialized)
        return;
112

113
    thread_spin_create (&_connection_lock);
114
    thread_mutex_create(&move_clients_mutex);
115
    thread_rwlock_create(&_source_shutdown_rwlock);
116
    thread_cond_create(&global.shutdown_cond);
117
118
119
120
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
121
122
    _body_queue = NULL;
    _body_queue_tail = &_body_queue;
Jack Moffitt's avatar
Jack Moffitt committed
123

124
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
125
126
127
128
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
129
130
    if (!_initialized)
        return;
131

132
    tls_ctx_unref(tls_ctx);
133
134
135
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
136
    thread_cond_destroy(&global.shutdown_cond);
137
    thread_rwlock_destroy(&_source_shutdown_rwlock);
138
    thread_spin_destroy (&_connection_lock);
139
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
140

141
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
142
143
}

144
void connection_reread_config(ice_config_t *config)
145
{
146
    get_tls_certificate(config);
147
148
}

Jack Moffitt's avatar
Jack Moffitt committed
149
150
static unsigned long _next_connection_id(void)
{
151
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
152

153
    thread_spin_lock(&_connection_lock);
154
    id = _current_id++;
155
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
156

157
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
158
159
}

160

161
#ifdef ICECAST_CAP_TLS
162
static void get_tls_certificate(ice_config_t *config)
163
{
164
165
    const char *keyfile;

166
    config->tls_ok = tls_ok = 0;
167

168
169
170
171
    keyfile = config->tls_context.key_file;
    if (!keyfile)
        keyfile = config->tls_context.cert_file;

172
    tls_ctx_unref(tls_ctx);
173
    tls_ctx = tls_ctx_new(config->tls_context.cert_file, keyfile, config->tls_context.cipher_list);
174
175
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
176
        return;
177
178
    }

179
    config->tls_ok = tls_ok = 1;
180
181
182
}


183
/* handlers for reading and writing a connection_t when there is TLS
184
185
 * configured on the listening port
 */
186
static int connection_read_tls(connection_t *con, void *buf, size_t len)
187
{
188
    ssize_t bytes = tls_read(con->tls, buf, len);
189

Marvin Scholz's avatar
Marvin Scholz committed
190
    if (bytes < 0) {
191
        if (tls_want_io(con->tls) > 0)
192
            return -1;
193
194
195
196
197
        con->error = 1;
    }
    return bytes;
}

198
static int connection_send_tls(connection_t *con, const void *buf, size_t len)
199
{
200
    ssize_t bytes = tls_write(con->tls, buf, len);
201

Marvin Scholz's avatar
Marvin Scholz committed
202
    if (bytes < 0) {
203
204
        if (tls_want_io(con->tls) > 0)
            return -1;
205
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
206
    } else {
207
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
208
    }
209
210
211
212
    return bytes;
}
#else

213
214
/* TLS not compiled in, so at least log it */
static void get_tls_certificate(ice_config_t *config)
215
{
216
    tls_ok = 0;
217
    ICECAST_LOG_INFO("No TLS capability. "
Philipp Schafft's avatar
Philipp Schafft committed
218
                     "Rebuild Icecast with OpenSSL support to enable this.");
219
}
220
#endif /* ICECAST_CAP_TLS */
221
222
223
224
225


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
226
static int connection_read(connection_t *con, void *buf, size_t len)
227
{
Marvin Scholz's avatar
Marvin Scholz committed
228
    int bytes = sock_read_bytes(con->sock, buf, len);
229
230
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
231
    if (bytes == -1 && !sock_recoverable(sock_error()))
232
233
234
235
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
236
static int connection_send(connection_t *con, const void *buf, size_t len)
237
{
Marvin Scholz's avatar
Marvin Scholz committed
238
239
240
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
241
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
242
    } else {
243
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
244
    }
245
246
247
    return bytes;
}

248
249
connection_t *connection_create (sock_t sock, sock_t serversock, char *ip)
{
250
    connection_t *con;
251
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
252
253
    if (con) {
        con->sock       = sock;
254
        con->serversock = serversock;
Marvin Scholz's avatar
Marvin Scholz committed
255
256
257
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
258
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
259
260
        con->read       = connection_read;
        con->send       = connection_send;
261
    }
Michael Smith's avatar
Michael Smith committed
262

263
    return con;
264
265
}

266
/* prepare connection for interacting over a TLS connection
267
 */
268
void connection_uses_tls(connection_t *con)
269
{
270
#ifdef ICECAST_CAP_TLS
271
    if (con->tls)
272
273
        return;

274
275
276
277
278
279
    if (con->readbufferlen) {
        ICECAST_LOG_ERROR("Connection is now using TLS but has data put back. BAD. Discarding putback data.");
        free(con->readbuffer);
        con->readbufferlen = 0;
    }

280
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
281
282
    con->read = connection_read_tls;
    con->send = connection_send_tls;
283
284
285
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
286
287
288
#endif
}

289
290
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
291
292
293
294
295
296
297
298
    ssize_t done = 0;
    ssize_t ret;

    if (con->readbufferlen) {
        ICECAST_LOG_DEBUG("On connection %p we read from putback buffer, filled with %zu bytes, requested are %zu bytes", con, con->readbufferlen, len);
        if (len >= con->readbufferlen) {
            memcpy(buf, con->readbuffer, con->readbufferlen);
            free(con->readbuffer);
299
            ICECAST_LOG_DEBUG("New fill in buffer=<empty>");
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
            if (len == con->readbufferlen) {
                con->readbufferlen = 0;
                return len;
            } else {
                len -= con->readbufferlen;
                buf += con->readbufferlen;
                done = con->readbufferlen;
                con->readbufferlen = 0;
            }
        } else {
            memcpy(buf, con->readbuffer, len);
            memmove(con->readbuffer, con->readbuffer+len, con->readbufferlen-len);
            con->readbufferlen -= len;
            return len;
        }
    }

    ret = con->read(con, buf, len);

    if (ret < 0) {
        if (done == 0) {
            return ret;
        } else {
            return done;
        }
    }

    return done + ret;
}

int connection_read_put_back(connection_t *con, const void *buf, size_t len)
{
    void *n;

    if (con->readbufferlen) {
        n = realloc(con->readbuffer, con->readbufferlen + len);
        if (!n)
            return -1;

        memcpy(n + con->readbufferlen, buf, len);
        con->readbuffer = n;
        con->readbufferlen += len;

        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    } else {
        n = malloc(len);
        if (!n)
            return -1;

        memcpy(n, buf, len);
        con->readbuffer = n;
        con->readbufferlen = len;
        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    }
356
357
}

358
static sock_t wait_for_serversock(int timeout)
359
360
{
#ifdef HAVE_POLL
361
    struct pollfd ufds [global.server_sockets];
362
363
364
365
366
367
368
369
370
371
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
372
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
373
    } else if(ret == 0) {
374
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
375
    } else {
376
        int dst;
377
        for(i=0; i < global.server_sockets; i++) {
378
            if(ufds[i].revents & POLLIN)
379
                return ufds[i].fd;
Marvin Scholz's avatar
Marvin Scholz committed
380
381
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL)) {
                if (ufds[i].revents & (POLLHUP|POLLERR)) {
382
                    sock_close (global.serversock[i]);
383
                    ICECAST_LOG_WARN("Had to close a listening socket");
384
                }
385
                global.serversock[i] = SOCK_ERROR;
386
            }
387
        }
388
        /* remove any closed sockets */
Marvin Scholz's avatar
Marvin Scholz committed
389
        for(i=0, dst=0; i < global.server_sockets; i++) {
390
            if (global.serversock[i] == SOCK_ERROR)
391
            continue;
392
            if (i!=dst)
393
            global.serversock[dst] = global.serversock[i];
394
395
396
            dst++;
        }
        global.server_sockets = dst;
397
        return SOCK_ERROR;
398
399
400
401
402
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
403
    sock_t max = SOCK_ERROR;
404
405
406
407
408

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
409
        if (max == SOCK_ERROR || global.serversock[i] > max)
410
411
412
413
414
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
415
        tv.tv_usec = (timeout % 1000) * 1000;
416
417
418
419
420
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
421
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
422
    } else if(ret == 0) {
423
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
424
    } else {
425
426
427
428
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
429
        return SOCK_ERROR; /* Should be impossible, stop compiler warnings */
430
431
432
433
    }
#endif
}

434
static connection_t *_accept_connection(int duration)
Jack Moffitt's avatar
Jack Moffitt committed
435
{
436
    sock_t sock, serversock;
437
    char *ip;
Jack Moffitt's avatar
Jack Moffitt committed
438

439
    serversock = wait_for_serversock (duration);
440
    if (serversock == SOCK_ERROR)
441
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
442

443
444
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
445

446
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
Marvin Scholz's avatar
Marvin Scholz committed
447
    if (sock != SOCK_ERROR) {
448
        connection_t *con = NULL;
449
        /* Make any IPv4 mapped IPv6 address look like a normal IPv4 address */
Marvin Scholz's avatar
Marvin Scholz committed
450
451
        if (strncmp(ip, "::ffff:", 7) == 0)
            memmove(ip, ip+7, strlen (ip+7)+1);
Jack Moffitt's avatar
Jack Moffitt committed
452

453
454
        if (matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
            con = connection_create (sock, serversock, ip);
455
456
        if (con)
            return con;
Marvin Scholz's avatar
Marvin Scholz committed
457
458
459
        sock_close(sock);
    } else {
        if (!sock_recoverable(sock_error())) {
460
            ICECAST_LOG_WARN("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
Marvin Scholz's avatar
Marvin Scholz committed
461
            thread_sleep(500000);
462
        }
463
464
465
    }
    free(ip);
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
466
467
468
}


469
470
471
472
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
473
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
474
{
475
    thread_spin_lock(&_connection_lock);
476
    *_con_queue_tail = node;
477
478
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
479
480
481
}


482
483
484
485
486
487
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
488

Marvin Scholz's avatar
Marvin Scholz committed
489
    thread_spin_lock(&_connection_lock);
490

Marvin Scholz's avatar
Marvin Scholz committed
491
    if (_con_queue){
492
493
494
495
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
496
        node->next = NULL;
497
    }
498

Marvin Scholz's avatar
Marvin Scholz committed
499
    thread_spin_unlock(&_connection_lock);
500
501
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
502
503


504
/* run along queue checking for any data that has come in or a timeout */
505
static void process_request_queue (void)
506
507
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
508
509
510
511
512
513
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
514
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
515

Marvin Scholz's avatar
Marvin Scholz committed
516
    while (*node_ref) {
517
518
519
520
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
521

522
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO || client->con->tlsmode == ICECAST_TLSMODE_AUTO_NO_PLAIN) {
523
524
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
525
                    connection_uses_tls(client->con);
526
527
528
529
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
530
531
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
532
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
533
534
535
            } else {
                len = client_read_bytes(client, buf, len);
            }
536
        }
Jack Moffitt's avatar
Jack Moffitt committed
537

Marvin Scholz's avatar
Marvin Scholz committed
538
        if (len > 0) {
539
            ssize_t stream_offset = -1;
540
541
542
            int pass_it = 1;
            char *ptr;

543
544
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
545
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
546
547
548
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
549
                    /* password line */
550
551
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
552
553
554
555
556
557
558
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
559
560
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
561
                    stream_offset = (ptr+6) - client->refbuf->data;
562
563
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
564
565
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
566
                    stream_offset = (ptr+4) - client->refbuf->data;
567
568
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
569
570
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
571
                    stream_offset = (ptr+2) - client->refbuf->data;
572
573
574
575
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
576

Marvin Scholz's avatar
Marvin Scholz committed
577
            if (pass_it) {
578
579
580
581
                if (stream_offset != -1) {
                    connection_read_put_back(client->con, client->refbuf->data + stream_offset, node->offset - stream_offset);
                    node->offset = stream_offset;
                }
582
583
584
585
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
586
                _add_connection(node);
587
                continue;
588
            }
Marvin Scholz's avatar
Marvin Scholz committed
589
590
        } else {
            if (len == 0 || client->con->error) {
591
592
593
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
594
595
                client_destroy(client);
                free(node);
596
597
598
599
                continue;
            }
        }
        node_ref = &node->next;
600
    }
601
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
602
603
}

604
605
606
607
608
609
610
611
612
613
614
615
/* add client to body queue.
 */
static void _add_body_client(client_queue_t *node)
{
    ICECAST_LOG_DEBUG("Putting client %p in body queue.", node->client);

    thread_spin_lock(&_connection_lock);
    *_body_queue_tail = node;
    _body_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
}

616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
static client_slurp_result_t process_request_body_queue_one(client_queue_t *node, time_t timeout, size_t body_size_limit)
{
        client_t *client = node->client;
        client_slurp_result_t res;

        if (client->parser->req_type == httpp_req_post) {
            if (node->bodybuffer == NULL && client->request_body_read == 0) {
                if (client->request_body_length < 0) {
                    node->bodybufferlen = body_size_limit;
                    node->bodybuffer = malloc(node->bodybufferlen);
                } else if (client->request_body_length <= (ssize_t)body_size_limit) {
                    node->bodybufferlen = client->request_body_length;
                    node->bodybuffer = malloc(node->bodybufferlen);
                }
            }
        }

        if (node->bodybuffer) {
            res = client_body_slurp(client, node->bodybuffer, &(node->bodybufferlen));
            if (res == CLIENT_SLURP_SUCCESS) {
                httpp_parse_postdata(client->parser, node->bodybuffer, node->bodybufferlen);
                free(node->bodybuffer);
                node->bodybuffer = NULL;
            }
        } else {
            res = client_body_skip(client);
        }

        if (res != CLIENT_SLURP_SUCCESS) {
            if (client->con->con_time <= timeout || client->request_body_read >= body_size_limit) {
                return CLIENT_SLURP_ERROR;
            }
        }

        return res;
}
652
653
654
655
656

/* This queue reads data from the body of clients. */
static void process_request_body_queue (void)
{
    client_queue_t **node_ref = (client_queue_t **)&_body_queue;
657
658
659
    ice_config_t *config;
    time_t timeout;
    size_t body_size_limit;
660
661
662
663
664

    ICECAST_LOG_DEBUG("Processing body queue.");

    ICECAST_LOG_DEBUG("_body_queue=%p, &_body_queue=%p, _body_queue_tail=%p", _body_queue, &_body_queue, _body_queue_tail);

665
666
667
668
669
    config = config_get_config();
    timeout = time(NULL) - config->body_timeout;
    body_size_limit = config->body_size_limit;
    config_release_config();

670
671
672
673
674
    while (*node_ref) {
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        client_slurp_result_t res;

675
676
        node->tried_body = 1;

677
678
        ICECAST_LOG_DEBUG("Got client %p in body queue.", client);

679
        res = process_request_body_queue_one(node, timeout, body_size_limit);
680

681
        if (res != CLIENT_SLURP_NEEDS_MORE_DATA) {
682
683
684
685
686
687
688
689
690
691
692
693
            ICECAST_LOG_DEBUG("Putting client %p back in connection queue.", client);

            if ((client_queue_t **)_body_queue_tail == &(node->next))
                _body_queue_tail = (volatile client_queue_t **)node_ref;
            *node_ref = node->next;
            node->next = NULL;
            _add_connection(node);
            continue;
        }
        node_ref = &node->next;
    }
}
694

695
696
697
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
698
static void _add_request_queue(client_queue_t *node)
699
700
701
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
702
703
}

704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
    ice_config_t *config;
    listener_t *listener;

    if (!node)
        return NULL;

    node->client = client;

    config = config_get_config();
    listener = config_get_listen_sock(config, client->con);

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
721
722
        client->con->tlsmode = listener->tls;
        if (listener->tls == ICECAST_TLSMODE_RFC2818 && tls_ok)
723
            connection_uses_tls(client->con);
724
725
726
727
728
729
730
731
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    config_release_config();

    return node;
}
732

733
734
735
736
737
738
739
740
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
741
        client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_LIMIT);
742
743
744
745
746
747
748
749
750
751
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
752
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
768
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
769
{
770
    connection_t *con;
771
    ice_config_t *config;
772
    int duration = 300;
773

Marvin Scholz's avatar
Marvin Scholz committed
774
    config = config_get_config();
775
    get_tls_certificate(config);
Marvin Scholz's avatar
Marvin Scholz committed
776
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
777

Marvin Scholz's avatar
Marvin Scholz committed
778
    while (global.running == ICECAST_RUNNING) {
779
        con = _accept_connection (duration);
780

Marvin Scholz's avatar
Marvin Scholz committed
781
        if (con) {
782
            connection_queue(con);
783
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
784
        } else {
785
786
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
787
        }
Marvin Scholz's avatar
Marvin Scholz committed
788
        process_request_queue();
789
        process_request_body_queue();
790
    }
Jack Moffitt's avatar
Jack Moffitt committed
791

792
793
794
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

795
796
797
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
798
799
}

800
801
802

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
803
 */
Marvin Scholz's avatar
Marvin Scholz committed
804
int connection_complete_source(source_t *source, int response)
805
{
806
    ice_config_t *config;
807

Marvin Scholz's avatar
Marvin Scholz committed
808
    global_lock();
809
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
810

811
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
812
    if (global.sources < config->source_limit) {
813
        const char *contenttype;
814
        mount_proxy *mountinfo;
815
816
817
818
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
819
820
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
821

Marvin Scholz's avatar
Marvin Scholz committed
822
            if (format_type == FORMAT_ERROR) {
823
                config_release_config();
824
                global_unlock();
825
                if (response) {
826
                    client_send_error_by_id(source->client, ICECAST_ERROR_CON_CONTENT_TYPE_NOSYS);
827
828
                    source->client = NULL;
                }
829
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
830
831
                return -1;
            }
832
833
834
835
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
836
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_NO_CONTENT_TYPE_GIVEN);
837
838
839
840
841
842
843
844
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
845
            format_type = FORMAT_TYPE_GENERIC;
846
847
        }

Marvin Scholz's avatar
Marvin Scholz committed
848
        if (format_get_plugin (format_type, source) < 0) {
849
850
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
851
            if (response) {
852
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_INTERNAL_FORMAT_ALLOC_ERROR);
853
854
                source->client = NULL;
            }
855
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
856
857
858
            return -1;
        }

859
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
860
        stats_event_args(NULL, "sources", "%d", global.sources);
861
        global_unlock();
862

863
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
864
865
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
866
        config_release_config();
867
        slave_rebuild_mounts();
868
869

        source->shutdown_rwlock = &_source_shutdown_rwlock;
870
        ICECAST_LOG_DEBUG("source is ready to start");
871
872
873

        return 0;
    }
874
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
875
        "reached %d", global.sources);
876
877
878
879

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
880
    if (response) {
881
        client_send_error_by_id(source->client, ICECAST_ERROR_CON_SOURCE_CLIENT_LIMIT);
882
883
        source->client = NULL;
    }
884
885
886
887

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
888
static inline void source_startup(client_t *client, const char *uri)
889
890
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
891
    source = source_reserve(uri);
892

Marvin Scholz's avatar
Marvin Scholz committed
893
    if (source) {
894
        source->client = client;
895
896
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
897
898
899
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
900
901
902
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
903
904
905
906
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
907
            client_send_bytes(client, "OK2\r\nicy-caps:11\r\n\r\n", 20); /* TODO: Replace Magic Number! */
908
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
909
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
910
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
911
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
912
            const char *expectcontinue;
913
            const char *transfer_encoding;
914
            int status_to_send = 200;
915
            ssize_t ret;
916

917
918
919
920
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
921
                    client_send_error_by_id(client, ICECAST_ERROR_CON_UNIMPLEMENTED);
922
923
924
925
                    return;
                }
            }

926
927
928
929
930
931
932
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
933
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
934
935
936
937
938
939
940
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

941
            client->respcode = 200;
942
943
            ret = util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, NULL, NULL, client);
            snprintf(ok->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Length: 0\r\n\r\n");
Marvin Scholz's avatar
Marvin Scholz committed
944
            ok->len = strlen(ok->data);
945
            refbuf_release(client->refbuf);
946
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
947
            fserve_add_client_callback(client, source_client_callback, source);
948
        }
Marvin Scholz's avatar
Marvin Scholz committed
949
    } else {
950
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNT_IN_USE);
951
        ICECAST_LOG_WARN("Mountpoint %s in use", uri);
952
    }
953
954
}

Philipp Schafft's avatar
Philipp Schafft committed
955
/* only called for native icecast source clients */
Marvin Scholz's avatar
Marvin Scholz committed
956
static void _handle_source_request(client_t *client, const char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
957
{
958
959
    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" from %s as role %s",
        uri, client->con->ip, client->role);
960

Marvin Scholz's avatar
Marvin Scholz committed
961
    if (uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
962
        ICECA