connection.c 53 KB
Newer Older
1
2
3
4
5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7
8
9
10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
12
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13
14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16
17
18
19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20
21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24
25
26
#ifdef HAVE_POLL
#include <sys/poll.h>
#endif
27
#include <sys/types.h>
28
29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30
31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

Marvin Scholz's avatar
Marvin Scholz committed
36
37
38
39
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
40

41
42
#include "compat.h"
#include "connection.h"
43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44
45
#include "global.h"
#include "util.h"
46
#include "refobject.h"
Jack Moffitt's avatar
Jack Moffitt committed
47
48
#include "refbuf.h"
#include "client.h"
49
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
50
51
#include "stats.h"
#include "logging.h"
52
#include "fserve.h"
53
#include "slave.h"
54

Jack Moffitt's avatar
Jack Moffitt committed
55
#include "source.h"
56
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
57
#include "auth.h"
58
#include "matchfile.h"
59
#include "tls.h"
60
#include "acl.h"
Jack Moffitt's avatar
Jack Moffitt committed
61
62
63

#define CATMODULE "connection"

64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

79
80
81
82
83
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int stream_offset;
    int shoutcast;
84
    char *shoutcast_mount;
85
86
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
87

88
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
89
static volatile unsigned long _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
90
91
static int _initialized = 0;

92
93
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
94
static int tls_ok;
95
static tls_ctx_t *tls_ctx;
96

97
/* filtering client connection based on IP */
98
static matchfile_t *banned_ip, *allowed_ip;
99

100
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
101

102
static void _handle_connection(void);
103
static void get_tls_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
104
105
106

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
107
108
    if (_initialized)
        return;
109

110
    thread_spin_create (&_connection_lock);
111
    thread_mutex_create(&move_clients_mutex);
112
    thread_rwlock_create(&_source_shutdown_rwlock);
113
    thread_cond_create(&global.shutdown_cond);
114
115
116
117
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
Jack Moffitt's avatar
Jack Moffitt committed
118

119
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
120
121
122
123
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
124
125
    if (!_initialized)
        return;
126

127
    tls_ctx_unref(tls_ctx);
128
129
130
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
131
    thread_cond_destroy(&global.shutdown_cond);
132
    thread_rwlock_destroy(&_source_shutdown_rwlock);
133
    thread_spin_destroy (&_connection_lock);
134
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
135

136
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
137
138
}

139
void connection_reread_config(ice_config_t *config)
140
{
141
    get_tls_certificate(config);
142
143
}

Jack Moffitt's avatar
Jack Moffitt committed
144
145
static unsigned long _next_connection_id(void)
{
146
    unsigned long id;
Jack Moffitt's avatar
Jack Moffitt committed
147

148
    thread_spin_lock(&_connection_lock);
149
    id = _current_id++;
150
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
151

152
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
153
154
}

155

156
#ifdef ICECAST_CAP_TLS
157
static void get_tls_certificate(ice_config_t *config)
158
{
159
160
    const char *keyfile;

161
    config->tls_ok = tls_ok = 0;
162

163
164
165
166
    keyfile = config->tls_context.key_file;
    if (!keyfile)
        keyfile = config->tls_context.cert_file;

167
    tls_ctx_unref(tls_ctx);
168
    tls_ctx = tls_ctx_new(config->tls_context.cert_file, keyfile, config->tls_context.cipher_list);
169
170
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
171
        return;
172
173
    }

174
    config->tls_ok = tls_ok = 1;
175
176
177
}


178
/* handlers for reading and writing a connection_t when there is TLS
179
180
 * configured on the listening port
 */
181
static int connection_read_tls(connection_t *con, void *buf, size_t len)
182
{
183
    ssize_t bytes = tls_read(con->tls, buf, len);
184

Marvin Scholz's avatar
Marvin Scholz committed
185
    if (bytes < 0) {
186
        if (tls_want_io(con->tls) > 0)
187
            return -1;
188
189
190
191
192
        con->error = 1;
    }
    return bytes;
}

193
static int connection_send_tls(connection_t *con, const void *buf, size_t len)
194
{
195
    ssize_t bytes = tls_write(con->tls, buf, len);
196

Marvin Scholz's avatar
Marvin Scholz committed
197
    if (bytes < 0) {
198
199
        if (tls_want_io(con->tls) > 0)
            return -1;
200
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
201
    } else {
202
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
203
    }
204
205
206
207
    return bytes;
}
#else

208
209
/* TLS not compiled in, so at least log it */
static void get_tls_certificate(ice_config_t *config)
210
{
211
    tls_ok = 0;
212
    ICECAST_LOG_INFO("No TLS capability. "
Philipp Schafft's avatar
Philipp Schafft committed
213
                     "Rebuild Icecast with OpenSSL support to enable this.");
214
}
215
#endif /* ICECAST_CAP_TLS */
216
217
218
219
220


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
221
static int connection_read(connection_t *con, void *buf, size_t len)
222
{
Marvin Scholz's avatar
Marvin Scholz committed
223
    int bytes = sock_read_bytes(con->sock, buf, len);
224
225
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
226
    if (bytes == -1 && !sock_recoverable(sock_error()))
227
228
229
230
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
231
static int connection_send(connection_t *con, const void *buf, size_t len)
232
{
Marvin Scholz's avatar
Marvin Scholz committed
233
234
235
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
236
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
237
    } else {
238
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
239
    }
240
241
242
    return bytes;
}

243
244
connection_t *connection_create (sock_t sock, sock_t serversock, char *ip)
{
245
    connection_t *con;
246
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
247
248
    if (con) {
        con->sock       = sock;
249
        con->serversock = serversock;
Marvin Scholz's avatar
Marvin Scholz committed
250
251
252
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
253
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
254
255
        con->read       = connection_read;
        con->send       = connection_send;
256
    }
Michael Smith's avatar
Michael Smith committed
257

258
    return con;
259
260
}

261
/* prepare connection for interacting over a TLS connection
262
 */
263
void connection_uses_tls(connection_t *con)
264
{
265
#ifdef ICECAST_CAP_TLS
266
    if (con->tls)
267
268
        return;

269
270
271
272
273
274
    if (con->readbufferlen) {
        ICECAST_LOG_ERROR("Connection is now using TLS but has data put back. BAD. Discarding putback data.");
        free(con->readbuffer);
        con->readbufferlen = 0;
    }

275
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
276
277
    con->read = connection_read_tls;
    con->send = connection_send_tls;
278
279
280
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
281
282
283
#endif
}

284
285
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
    ssize_t done = 0;
    ssize_t ret;

    if (con->readbufferlen) {
        ICECAST_LOG_DEBUG("On connection %p we read from putback buffer, filled with %zu bytes, requested are %zu bytes", con, con->readbufferlen, len);
        if (len >= con->readbufferlen) {
            memcpy(buf, con->readbuffer, con->readbufferlen);
            free(con->readbuffer);
            if (len == con->readbufferlen) {
                con->readbufferlen = 0;
                return len;
            } else {
                len -= con->readbufferlen;
                buf += con->readbufferlen;
                done = con->readbufferlen;
                con->readbufferlen = 0;
            }
        } else {
            memcpy(buf, con->readbuffer, len);
            memmove(con->readbuffer, con->readbuffer+len, con->readbufferlen-len);
            con->readbufferlen -= len;
            return len;
        }
    }

    ret = con->read(con, buf, len);

    if (ret < 0) {
        if (done == 0) {
            return ret;
        } else {
            return done;
        }
    }

    return done + ret;
}

int connection_read_put_back(connection_t *con, const void *buf, size_t len)
{
    void *n;

    if (con->readbufferlen) {
        n = realloc(con->readbuffer, con->readbufferlen + len);
        if (!n)
            return -1;

        memcpy(n + con->readbufferlen, buf, len);
        con->readbuffer = n;
        con->readbufferlen += len;

        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    } else {
        n = malloc(len);
        if (!n)
            return -1;

        memcpy(n, buf, len);
        con->readbuffer = n;
        con->readbufferlen = len;
        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    }
350
351
}

352
static sock_t wait_for_serversock(int timeout)
353
354
{
#ifdef HAVE_POLL
355
    struct pollfd ufds [global.server_sockets];
356
357
358
359
360
361
362
363
364
365
    int i, ret;

    for(i=0; i < global.server_sockets; i++) {
        ufds[i].fd = global.serversock[i];
        ufds[i].events = POLLIN;
        ufds[i].revents = 0;
    }

    ret = poll(ufds, global.server_sockets, timeout);
    if(ret < 0) {
366
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
367
    } else if(ret == 0) {
368
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
369
    } else {
370
        int dst;
371
        for(i=0; i < global.server_sockets; i++) {
372
            if(ufds[i].revents & POLLIN)
373
                return ufds[i].fd;
Marvin Scholz's avatar
Marvin Scholz committed
374
375
            if(ufds[i].revents & (POLLHUP|POLLERR|POLLNVAL)) {
                if (ufds[i].revents & (POLLHUP|POLLERR)) {
376
                    sock_close (global.serversock[i]);
377
                    ICECAST_LOG_WARN("Had to close a listening socket");
378
                }
379
                global.serversock[i] = SOCK_ERROR;
380
            }
381
        }
382
        /* remove any closed sockets */
Marvin Scholz's avatar
Marvin Scholz committed
383
        for(i=0, dst=0; i < global.server_sockets; i++) {
384
            if (global.serversock[i] == SOCK_ERROR)
385
            continue;
386
            if (i!=dst)
387
            global.serversock[dst] = global.serversock[i];
388
389
390
            dst++;
        }
        global.server_sockets = dst;
391
        return SOCK_ERROR;
392
393
394
395
396
    }
#else
    fd_set rfds;
    struct timeval tv, *p=NULL;
    int i, ret;
397
    sock_t max = SOCK_ERROR;
398
399
400
401
402

    FD_ZERO(&rfds);

    for(i=0; i < global.server_sockets; i++) {
        FD_SET(global.serversock[i], &rfds);
403
        if (max == SOCK_ERROR || global.serversock[i] > max)
404
405
406
407
408
            max = global.serversock[i];
    }

    if(timeout >= 0) {
        tv.tv_sec = timeout/1000;
409
        tv.tv_usec = (timeout % 1000) * 1000;
410
411
412
413
414
        p = &tv;
    }

    ret = select(max+1, &rfds, NULL, NULL, p);
    if(ret < 0) {
415
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
416
    } else if(ret == 0) {
417
        return SOCK_ERROR;
Marvin Scholz's avatar
Marvin Scholz committed
418
    } else {
419
420
421
422
        for(i=0; i < global.server_sockets; i++) {
            if(FD_ISSET(global.serversock[i], &rfds))
                return global.serversock[i];
        }
423
        return SOCK_ERROR; /* Should be impossible, stop compiler warnings */
424
425
426
427
    }
#endif
}

428
static connection_t *_accept_connection(int duration)
Jack Moffitt's avatar
Jack Moffitt committed
429
{
430
    sock_t sock, serversock;
431
    char *ip;
Jack Moffitt's avatar
Jack Moffitt committed
432

433
    serversock = wait_for_serversock (duration);
434
    if (serversock == SOCK_ERROR)
435
        return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
436

437
438
    /* malloc enough room for a full IP address (including ipv6) */
    ip = (char *)malloc(MAX_ADDR_LEN);
Jack Moffitt's avatar
Jack Moffitt committed
439

440
    sock = sock_accept(serversock, ip, MAX_ADDR_LEN);
Marvin Scholz's avatar
Marvin Scholz committed
441
    if (sock != SOCK_ERROR) {
442
        connection_t *con = NULL;
443
        /* Make any IPv4 mapped IPv6 address look like a normal IPv4 address */
Marvin Scholz's avatar
Marvin Scholz committed
444
445
        if (strncmp(ip, "::ffff:", 7) == 0)
            memmove(ip, ip+7, strlen (ip+7)+1);
Jack Moffitt's avatar
Jack Moffitt committed
446

447
448
        if (matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
            con = connection_create (sock, serversock, ip);
449
450
        if (con)
            return con;
Marvin Scholz's avatar
Marvin Scholz committed
451
452
453
        sock_close(sock);
    } else {
        if (!sock_recoverable(sock_error())) {
454
            ICECAST_LOG_WARN("accept() failed with error %d: %s", sock_error(), strerror(sock_error()));
Marvin Scholz's avatar
Marvin Scholz committed
455
            thread_sleep(500000);
456
        }
457
458
459
    }
    free(ip);
    return NULL;
Jack Moffitt's avatar
Jack Moffitt committed
460
461
462
}


463
464
465
466
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
467
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
468
{
469
    thread_spin_lock(&_connection_lock);
470
    *_con_queue_tail = node;
471
472
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
473
474
475
}


476
477
478
479
480
481
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
482

Marvin Scholz's avatar
Marvin Scholz committed
483
    thread_spin_lock(&_connection_lock);
484

Marvin Scholz's avatar
Marvin Scholz committed
485
    if (_con_queue){
486
487
488
489
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
490
        node->next = NULL;
491
    }
492

Marvin Scholz's avatar
Marvin Scholz committed
493
    thread_spin_unlock(&_connection_lock);
494
495
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
496
497


498
/* run along queue checking for any data that has come in or a timeout */
499
static void process_request_queue (void)
500
501
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
502
503
504
505
506
507
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
508
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
509

Marvin Scholz's avatar
Marvin Scholz committed
510
    while (*node_ref) {
511
512
513
514
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
515

516
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO || client->con->tlsmode == ICECAST_TLSMODE_AUTO_NO_PLAIN) {
517
518
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
519
                    connection_uses_tls(client->con);
520
521
522
523
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
524
525
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
526
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
527
528
529
            } else {
                len = client_read_bytes(client, buf, len);
            }
530
        }
Jack Moffitt's avatar
Jack Moffitt committed
531

Marvin Scholz's avatar
Marvin Scholz committed
532
        if (len > 0) {
533
534
535
            int pass_it = 1;
            char *ptr;

536
537
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
538
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
539
540
541
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
542
                    /* password line */
543
544
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
545
546
547
548
549
550
551
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
552
553
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
554
555
556
                    node->stream_offset = (ptr+6) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
557
558
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
559
560
561
                    node->stream_offset = (ptr+4) - client->refbuf->data;
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
562
563
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
564
565
566
567
568
                    node->stream_offset = (ptr+2) - client->refbuf->data;
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
569

Marvin Scholz's avatar
Marvin Scholz committed
570
            if (pass_it) {
571
572
573
574
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
575
                _add_connection(node);
576
                continue;
577
            }
Marvin Scholz's avatar
Marvin Scholz committed
578
579
        } else {
            if (len == 0 || client->con->error) {
580
581
582
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
583
584
                client_destroy(client);
                free(node);
585
586
587
588
                continue;
            }
        }
        node_ref = &node->next;
589
    }
590
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
591
592
}

593

594
595
596
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
597
static void _add_request_queue(client_queue_t *node)
598
599
600
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
601
602
}

603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
    ice_config_t *config;
    listener_t *listener;

    if (!node)
        return NULL;

    node->client = client;

    config = config_get_config();
    listener = config_get_listen_sock(config, client->con);

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
620
621
        client->con->tlsmode = listener->tls;
        if (listener->tls == ICECAST_TLSMODE_RFC2818 && tls_ok)
622
            connection_uses_tls(client->con);
623
624
625
626
627
628
629
630
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

    config_release_config();

    return node;
}
631

632
633
634
635
636
637
638
639
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
640
        client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_LIMIT);
641
642
643
644
645
646
647
648
649
650
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
651
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
667
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
668
{
669
    connection_t *con;
670
    ice_config_t *config;
671
    int duration = 300;
672

Marvin Scholz's avatar
Marvin Scholz committed
673
    config = config_get_config();
674
    get_tls_certificate(config);
Marvin Scholz's avatar
Marvin Scholz committed
675
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
676

Marvin Scholz's avatar
Marvin Scholz committed
677
    while (global.running == ICECAST_RUNNING) {
678
        con = _accept_connection (duration);
679

Marvin Scholz's avatar
Marvin Scholz committed
680
        if (con) {
681
            connection_queue(con);
682
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
683
        } else {
684
685
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
686
        }
Marvin Scholz's avatar
Marvin Scholz committed
687
        process_request_queue();
688
    }
Jack Moffitt's avatar
Jack Moffitt committed
689

690
691
692
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

693
694
695
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
696
697
}

698
699
700

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
701
 */
Marvin Scholz's avatar
Marvin Scholz committed
702
int connection_complete_source(source_t *source, int response)
703
{
704
    ice_config_t *config;
705

Marvin Scholz's avatar
Marvin Scholz committed
706
    global_lock();
707
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
708

709
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
710
    if (global.sources < config->source_limit) {
711
        const char *contenttype;
712
        mount_proxy *mountinfo;
713
714
715
716
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
717
718
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
719

Marvin Scholz's avatar
Marvin Scholz committed
720
            if (format_type == FORMAT_ERROR) {
721
                config_release_config();
722
                global_unlock();
723
                if (response) {
724
                    client_send_error_by_id(source->client, ICECAST_ERROR_CON_CONTENT_TYPE_NOSYS);
725
726
                    source->client = NULL;
                }
727
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
728
729
                return -1;
            }
730
731
732
733
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
734
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_NO_CONTENT_TYPE_GIVEN);
735
736
737
738
739
740
741
742
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
743
            format_type = FORMAT_TYPE_GENERIC;
744
745
        }

Marvin Scholz's avatar
Marvin Scholz committed
746
        if (format_get_plugin (format_type, source) < 0) {
747
748
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
749
            if (response) {
750
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_INTERNAL_FORMAT_ALLOC_ERROR);
751
752
                source->client = NULL;
            }
753
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
754
755
756
            return -1;
        }

757
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
758
        stats_event_args(NULL, "sources", "%d", global.sources);
759
        global_unlock();
760

761
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
762
763
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
764
        config_release_config();
765
        slave_rebuild_mounts();
766
767

        source->shutdown_rwlock = &_source_shutdown_rwlock;
768
        ICECAST_LOG_DEBUG("source is ready to start");
769
770
771

        return 0;
    }
772
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
773
        "reached %d", global.sources);
774
775
776
777

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
778
    if (response) {
779
        client_send_error_by_id(source->client, ICECAST_ERROR_CON_SOURCE_CLIENT_LIMIT);
780
781
        source->client = NULL;
    }
782
783
784
785

    return -1;
}

Marvin Scholz's avatar
Marvin Scholz committed
786
static inline void source_startup(client_t *client, const char *uri)
787
788
{
    source_t *source;
Marvin Scholz's avatar
Marvin Scholz committed
789
    source = source_reserve(uri);
790

Marvin Scholz's avatar
Marvin Scholz committed
791
    if (source) {
792
        source->client = client;
793
794
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
795
796
797
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
798
799
800
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
801
802
803
804
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
805
            client_send_bytes(client, "OK2\r\nicy-caps:11\r\n\r\n", 20); /* TODO: Replace Magic Number! */
806
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
807
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
808
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
809
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
810
            const char *expectcontinue;
811
            const char *transfer_encoding;
812
            int status_to_send = 200;
813
            ssize_t ret;
814

815
816
817
818
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
819
                    client_send_error_by_id(client, ICECAST_ERROR_CON_UNIMPLEMENTED);
820
821
822
823
                    return;
                }
            }

824
825
826
827
828
829
830
            /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
            expectcontinue = httpp_getvar (source->parser, "expect");

            if (expectcontinue != NULL) {
#ifdef HAVE_STRCASESTR
                if (strcasestr (expectcontinue, "100-continue") != NULL)
#else
831
                ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
832
833
834
835
836
837
838
                if (strstr (expectcontinue, "100-continue") != NULL)
#endif
                {
                    status_to_send = 100;
                }
            }

839
            client->respcode = 200;
840
841
            ret = util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, NULL, NULL, client);
            snprintf(ok->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Length: 0\r\n\r\n");
Marvin Scholz's avatar
Marvin Scholz committed
842
            ok->len = strlen(ok->data);
843
844
845
            /* we may have unprocessed data read in, so don't overwrite it */
            ok->associated = client->refbuf;
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
846
            fserve_add_client_callback(client, source_client_callback, source);
847
        }
Marvin Scholz's avatar
Marvin Scholz committed
848
    } else {
849
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNT_IN_USE);
850
        ICECAST_LOG_WARN("Mountpoint %s in use", uri);
851
    }
852
853
}

Philipp Schafft's avatar
Philipp Schafft committed
854
/* only called for native icecast source clients */
Marvin Scholz's avatar
Marvin Scholz committed
855
static void _handle_source_request(client_t *client, const char *uri)
Jack Moffitt's avatar
Jack Moffitt committed
856
{
857
858
    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" from %s as role %s",
        uri, client->con->ip, client->role);
859

Marvin Scholz's avatar
Marvin Scholz committed
860
    if (uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
861
        ICECAST_LOG_WARN("source mountpoint not starting with /");
862
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNTPOINT_NOT_STARTING_WITH_SLASH);
863
        return;
864
    }
865

Philipp Schafft's avatar
Philipp Schafft committed
866
867
868
869
    source_startup(client, uri);
}


Marvin Scholz's avatar
Marvin Scholz committed
870
static void _handle_stats_request(client_t *client, char *uri)
Philipp Schafft's avatar
Philipp Schafft committed
871
872
873
{
    stats_event_inc(NULL, "stats_connections");

874
    client->respcode = 200;
875
    snprintf (client->refbuf->data, PER_CLIENT_REFBUF_SIZE,
Marvin Scholz's avatar
Marvin Scholz committed
876
877
878
        "HTTP/1.0 200 OK\r\n\r\n");
    client->refbuf->len = strlen(client->refbuf->data);
    fserve_add_client_callback(client, stats_callback, NULL);
879
880
}

Philipp Schafft's avatar
Philipp Schafft committed
881
882
883
/* if 0 is returned then the client should not be touched, however if -1
 * is returned then the caller is responsible for handling the client
 */
Marvin Scholz's avatar
Marvin Scholz committed
884
static int __add_listener_to_source(source_t *source, client_t *client)
885
{
Philipp Schafft's avatar
Philipp Schafft committed
886
    size_t loop = 10;
Michael Smith's avatar
Michael Smith committed
887

Marvin Scholz's avatar
Marvin Scholz committed
888
    do {
Philipp Schafft's avatar
Philipp Schafft committed
889
        ICECAST_LOG_DEBUG("max on %s is %ld (cur %lu)", source->mount,
Marvin Scholz's avatar
Marvin Scholz committed
890
            source->max_listeners, source->listeners);
Philipp Schafft's avatar
Philipp Schafft committed
891
892
893
894
        if (source->max_listeners == -1)
            break;
        if (source->listeners < (unsigned long)source->max_listeners)
            break;
895

Marvin Scholz's avatar
Marvin Scholz committed
896
        if (loop && source->fallback_when_full && source->fallback_mount) {