connection.c 57.6 KB
Newer Older
1 2 3 4 5
/* Icecast
 *
 * This program is distributed under the GNU General Public License, version 2.
 * A copy of this license is included with this source.
 *
6
 * Copyright 2000-2004, Jack Moffitt <jack@xiph.org,
7 8 9 10
 *                      Michael Smith <msmith@xiph.org>,
 *                      oddsock <oddsock@xiph.org>,
 *                      Karl Heyes <karl@xiph.org>
 *                      and others (see AUTHORS for details).
Philipp Schafft's avatar
Philipp Schafft committed
11
 * Copyright 2011,      Dave 'justdave' Miller <justdave@mozilla.com>,
12
 * Copyright 2011-2018, Philipp "ph3-der-loewe" Schafft <lion@lion.leolix.org>,
13 14
 */

15
/* -*- c-basic-offset: 4; indent-tabs-mode: nil; -*- */
16 17 18 19
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

Jack Moffitt's avatar
Jack Moffitt committed
20 21
#include <stdio.h>
#include <stdlib.h>
22
#include <errno.h>
Jack Moffitt's avatar
Jack Moffitt committed
23
#include <string.h>
24
#ifdef HAVE_POLL
25
#include <poll.h>
26
#endif
27
#include <sys/types.h>
28 29

#ifndef _WIN32
Jack Moffitt's avatar
Jack Moffitt committed
30 31
#include <sys/socket.h>
#include <netinet/in.h>
32
#else
33
#include <winsock2.h>
34
#endif
Jack Moffitt's avatar
Jack Moffitt committed
35

Marvin Scholz's avatar
Marvin Scholz committed
36 37 38 39
#include "common/thread/thread.h"
#include "common/avl/avl.h"
#include "common/net/sock.h"
#include "common/httpp/httpp.h"
Jack Moffitt's avatar
Jack Moffitt committed
40

41 42
#include "compat.h"
#include "connection.h"
43
#include "cfgfile.h"
Jack Moffitt's avatar
Jack Moffitt committed
44 45
#include "global.h"
#include "util.h"
46
#include "refobject.h"
Jack Moffitt's avatar
Jack Moffitt committed
47 48
#include "refbuf.h"
#include "client.h"
49
#include "errors.h"
Jack Moffitt's avatar
Jack Moffitt committed
50 51
#include "stats.h"
#include "logging.h"
52
#include "fserve.h"
53
#include "slave.h"
54

Jack Moffitt's avatar
Jack Moffitt committed
55
#include "source.h"
56
#include "admin.h"
Michael Smith's avatar
Michael Smith committed
57
#include "auth.h"
58
#include "matchfile.h"
59
#include "tls.h"
60
#include "acl.h"
61 62
#include "refobject.h"
#include "listensocket.h"
63
#include "fastevent.h"
Jack Moffitt's avatar
Jack Moffitt committed
64 65 66

#define CATMODULE "connection"

67 68 69 70 71 72 73 74 75 76 77 78 79 80 81
/* Two different major types of source authentication.
   Shoutcast style is used only by the Shoutcast DSP
   and is a crazy version of HTTP.  It looks like :
     Source Client -> Connects to port + 1
     Source Client -> sends encoder password (plaintext)\r\n
     Icecast -> reads encoder password, if ok, sends OK2\r\n, else disconnects
     Source Client -> reads OK2\r\n, then sends http-type request headers
                      that contain the stream details (icy-name, etc..)
     Icecast -> reads headers, stores them
     Source Client -> starts sending MP3 data
     Source Client -> periodically updates metadata via admin.cgi call

   Icecast auth style uses HTTP and Basic Authorization.
*/

82 83 84 85
typedef struct client_queue_tag {
    client_t *client;
    int offset;
    int shoutcast;
86
    char *shoutcast_mount;
87 88
    char *bodybuffer;
    size_t bodybufferlen;
89
    int tried_body;
90 91
    struct client_queue_tag *next;
} client_queue_t;
Jack Moffitt's avatar
Jack Moffitt committed
92

93
static spin_t _connection_lock; // protects _current_id, _con_queue, _con_queue_tail
94
static volatile connection_id_t _current_id = 0;
Jack Moffitt's avatar
Jack Moffitt committed
95 96
static int _initialized = 0;

97 98
static volatile client_queue_t *_req_queue = NULL, **_req_queue_tail = &_req_queue;
static volatile client_queue_t *_con_queue = NULL, **_con_queue_tail = &_con_queue;
99
static volatile client_queue_t *_body_queue = NULL, **_body_queue_tail = &_body_queue;
100
static int tls_ok;
101
static tls_ctx_t *tls_ctx;
102

103
/* filtering client connection based on IP */
104
static matchfile_t *banned_ip, *allowed_ip;
105

106
rwlock_t _source_shutdown_rwlock;
Jack Moffitt's avatar
Jack Moffitt committed
107

108
static int  _update_admin_command(client_t *client);
109
static void _handle_connection(void);
110
static void get_tls_certificate(ice_config_t *config);
Jack Moffitt's avatar
Jack Moffitt committed
111 112 113

void connection_initialize(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
114 115
    if (_initialized)
        return;
116

117
    thread_spin_create (&_connection_lock);
118
    thread_mutex_create(&move_clients_mutex);
119
    thread_rwlock_create(&_source_shutdown_rwlock);
120
    thread_cond_create(&global.shutdown_cond);
121 122 123 124
    _req_queue = NULL;
    _req_queue_tail = &_req_queue;
    _con_queue = NULL;
    _con_queue_tail = &_con_queue;
125 126
    _body_queue = NULL;
    _body_queue_tail = &_body_queue;
Jack Moffitt's avatar
Jack Moffitt committed
127

128
    _initialized = 1;
Jack Moffitt's avatar
Jack Moffitt committed
129 130 131 132
}

void connection_shutdown(void)
{
Marvin Scholz's avatar
Marvin Scholz committed
133 134
    if (!_initialized)
        return;
135

136
    tls_ctx_unref(tls_ctx);
137 138 139
    matchfile_release(banned_ip);
    matchfile_release(allowed_ip);
 
140
    thread_cond_destroy(&global.shutdown_cond);
141
    thread_rwlock_destroy(&_source_shutdown_rwlock);
142
    thread_spin_destroy (&_connection_lock);
143
    thread_mutex_destroy(&move_clients_mutex);
Jack Moffitt's avatar
Jack Moffitt committed
144

145
    _initialized = 0;
Jack Moffitt's avatar
Jack Moffitt committed
146 147
}

148
void connection_reread_config(ice_config_t *config)
149
{
150
    get_tls_certificate(config);
151
    listensocket_container_configure_and_setup(global.listensockets, config);
152 153
}

154
static connection_id_t _next_connection_id(void)
Jack Moffitt's avatar
Jack Moffitt committed
155
{
156
    connection_id_t id;
Jack Moffitt's avatar
Jack Moffitt committed
157

158
    thread_spin_lock(&_connection_lock);
159
    id = _current_id++;
160
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
161

162
    return id;
Jack Moffitt's avatar
Jack Moffitt committed
163 164
}

165

166
#ifdef ICECAST_CAP_TLS
167
static void get_tls_certificate(ice_config_t *config)
168
{
169 170
    const char *keyfile;

171
    config->tls_ok = tls_ok = 0;
172

173 174 175 176
    keyfile = config->tls_context.key_file;
    if (!keyfile)
        keyfile = config->tls_context.cert_file;

177
    tls_ctx_unref(tls_ctx);
178
    tls_ctx = tls_ctx_new(config->tls_context.cert_file, keyfile, config->tls_context.cipher_list);
179 180
    if (!tls_ctx) {
        ICECAST_LOG_INFO("No TLS capability on any configured ports");
181
        return;
182 183
    }

184
    config->tls_ok = tls_ok = 1;
185 186 187
}


188
/* handlers for reading and writing a connection_t when there is TLS
189 190
 * configured on the listening port
 */
191
static int connection_read_tls(connection_t *con, void *buf, size_t len)
192
{
193
    ssize_t bytes = tls_read(con->tls, buf, len);
194

195
    if (bytes <= 0) {
196
        if (tls_want_io(con->tls) > 0)
197
            return -1;
198 199 200 201 202
        con->error = 1;
    }
    return bytes;
}

203
static int connection_send_tls(connection_t *con, const void *buf, size_t len)
204
{
205
    ssize_t bytes = tls_write(con->tls, buf, len);
206

Marvin Scholz's avatar
Marvin Scholz committed
207
    if (bytes < 0) {
208 209
        if (tls_want_io(con->tls) > 0)
            return -1;
210
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
211
    } else {
212
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
213
    }
214

215 216 217 218
    return bytes;
}
#else

219 220
/* TLS not compiled in, so at least log it */
static void get_tls_certificate(ice_config_t *config)
221
{
222
    tls_ok = 0;
223
    ICECAST_LOG_INFO("No TLS capability. "
Philipp Schafft's avatar
Philipp Schafft committed
224
                     "Rebuild Icecast with OpenSSL support to enable this.");
225
}
226
#endif /* ICECAST_CAP_TLS */
227 228 229 230 231


/* handlers (default) for reading and writing a connection_t, no encrpytion
 * used just straight access to the socket
 */
Marvin Scholz's avatar
Marvin Scholz committed
232
static int connection_read(connection_t *con, void *buf, size_t len)
233
{
Marvin Scholz's avatar
Marvin Scholz committed
234
    int bytes = sock_read_bytes(con->sock, buf, len);
235 236
    if (bytes == 0)
        con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
237
    if (bytes == -1 && !sock_recoverable(sock_error()))
238 239 240 241
        con->error = 1;
    return bytes;
}

Marvin Scholz's avatar
Marvin Scholz committed
242
static int connection_send(connection_t *con, const void *buf, size_t len)
243
{
Marvin Scholz's avatar
Marvin Scholz committed
244 245 246
    int bytes = sock_write_bytes(con->sock, buf, len);
    if (bytes < 0) {
        if (!sock_recoverable(sock_error()))
247
            con->error = 1;
Marvin Scholz's avatar
Marvin Scholz committed
248
    } else {
249
        con->sent_bytes += bytes;
Marvin Scholz's avatar
Marvin Scholz committed
250
    }
251

252 253 254
    return bytes;
}

255
connection_t *connection_create(sock_t sock, listensocket_t *listensocket_real, listensocket_t* listensocket_effective, char *ip)
256
{
257
    connection_t *con;
258 259 260 261

    if (!matchfile_match_allow_deny(allowed_ip, banned_ip, ip))
        return NULL;

262
    con = (connection_t *)calloc(1, sizeof(connection_t));
Marvin Scholz's avatar
Marvin Scholz committed
263
    if (con) {
264 265 266
        refobject_ref(listensocket_real);
        refobject_ref(listensocket_effective);

Marvin Scholz's avatar
Marvin Scholz committed
267
        con->sock       = sock;
268 269
        con->listensocket_real = listensocket_real;
        con->listensocket_effective = listensocket_effective;
Marvin Scholz's avatar
Marvin Scholz committed
270 271 272
        con->con_time   = time(NULL);
        con->id         = _next_connection_id();
        con->ip         = ip;
273
        con->tlsmode    = ICECAST_TLSMODE_AUTO;
Marvin Scholz's avatar
Marvin Scholz committed
274 275
        con->read       = connection_read;
        con->send       = connection_send;
276
    }
Michael Smith's avatar
Michael Smith committed
277

278 279
    fastevent_emit(FASTEVENT_TYPE_CONNECTION_CREATE, FASTEVENT_FLAG_MODIFICATION_ALLOWED, FASTEVENT_DATATYPE_CONNECTION, con);

280
    return con;
281 282
}

283
/* prepare connection for interacting over a TLS connection
284
 */
285
void connection_uses_tls(connection_t *con)
286
{
287
#ifdef ICECAST_CAP_TLS
288
    if (con->tls)
289 290
        return;

291 292 293 294 295 296
    if (con->readbufferlen) {
        ICECAST_LOG_ERROR("Connection is now using TLS but has data put back. BAD. Discarding putback data.");
        free(con->readbuffer);
        con->readbufferlen = 0;
    }

297
    con->tlsmode = ICECAST_TLSMODE_RFC2818;
298 299
    con->read = connection_read_tls;
    con->send = connection_send_tls;
300 301 302
    con->tls = tls_new(tls_ctx);
    tls_set_incoming(con->tls);
    tls_set_socket(con->tls, con->sock);
303 304 305
#endif
}

306 307
ssize_t connection_send_bytes(connection_t *con, const void *buf, size_t len)
{
308 309 310 311 312
    ssize_t ret = con->send(con, buf, len);

    fastevent_emit(FASTEVENT_TYPE_CONNECTION_WRITE, FASTEVENT_FLAG_MODIFICATION_ALLOWED, FASTEVENT_DATATYPE_OBRD, con, buf, len, ret);

    return ret;
313 314
}

315
static inline ssize_t connection_read_bytes_real(connection_t *con, void *buf, size_t len)
316
{
317 318 319 320 321 322 323 324
    ssize_t done = 0;
    ssize_t ret;

    if (con->readbufferlen) {
        ICECAST_LOG_DEBUG("On connection %p we read from putback buffer, filled with %zu bytes, requested are %zu bytes", con, con->readbufferlen, len);
        if (len >= con->readbufferlen) {
            memcpy(buf, con->readbuffer, con->readbufferlen);
            free(con->readbuffer);
325
            con->readbuffer = NULL;
326
            ICECAST_LOG_DEBUG("New fill in buffer=<empty>");
327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356
            if (len == con->readbufferlen) {
                con->readbufferlen = 0;
                return len;
            } else {
                len -= con->readbufferlen;
                buf += con->readbufferlen;
                done = con->readbufferlen;
                con->readbufferlen = 0;
            }
        } else {
            memcpy(buf, con->readbuffer, len);
            memmove(con->readbuffer, con->readbuffer+len, con->readbufferlen-len);
            con->readbufferlen -= len;
            return len;
        }
    }

    ret = con->read(con, buf, len);

    if (ret < 0) {
        if (done == 0) {
            return ret;
        } else {
            return done;
        }
    }

    return done + ret;
}

357 358 359 360 361 362 363 364 365
ssize_t connection_read_bytes(connection_t *con, void *buf, size_t len)
{
    ssize_t ret = connection_read_bytes_real(con, buf, len);

    fastevent_emit(FASTEVENT_TYPE_CONNECTION_READ, FASTEVENT_FLAG_MODIFICATION_ALLOWED, FASTEVENT_DATATYPE_OBRD, con, buf, len, ret);

    return ret;
}

366 367 368 369
int connection_read_put_back(connection_t *con, const void *buf, size_t len)
{
    void *n;

370 371
    fastevent_emit(FASTEVENT_TYPE_CONNECTION_PUTBACK, FASTEVENT_FLAG_MODIFICATION_ALLOWED, FASTEVENT_DATATYPE_OBR, con, buf, len);

372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393
    if (con->readbufferlen) {
        n = realloc(con->readbuffer, con->readbufferlen + len);
        if (!n)
            return -1;

        memcpy(n + con->readbufferlen, buf, len);
        con->readbuffer = n;
        con->readbufferlen += len;

        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    } else {
        n = malloc(len);
        if (!n)
            return -1;

        memcpy(n, buf, len);
        con->readbuffer = n;
        con->readbufferlen = len;
        ICECAST_LOG_DEBUG("On connection %p %zu bytes have been put back.", con, len);
        return 0;
    }
394 395
}

396 397 398 399
/* add client to connection queue. At this point some header information
 * has been collected, so we now pass it onto the connection thread for
 * further processing
 */
400
static void _add_connection(client_queue_t *node)
Jack Moffitt's avatar
Jack Moffitt committed
401
{
402
    thread_spin_lock(&_connection_lock);
403
    *_con_queue_tail = node;
404 405
    _con_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
Jack Moffitt's avatar
Jack Moffitt committed
406 407 408
}


409 410 411 412 413 414
/* this returns queued clients for the connection thread. headers are
 * already provided, but need to be parsed.
 */
static client_queue_t *_get_connection(void)
{
    client_queue_t *node = NULL;
Jack Moffitt's avatar
Jack Moffitt committed
415

Marvin Scholz's avatar
Marvin Scholz committed
416
    thread_spin_lock(&_connection_lock);
417

Marvin Scholz's avatar
Marvin Scholz committed
418
    if (_con_queue){
419 420 421 422
        node = (client_queue_t *)_con_queue;
        _con_queue = node->next;
        if (_con_queue == NULL)
            _con_queue_tail = &_con_queue;
423
        node->next = NULL;
424
    }
425

Marvin Scholz's avatar
Marvin Scholz committed
426
    thread_spin_unlock(&_connection_lock);
427 428
    return node;
}
Jack Moffitt's avatar
Jack Moffitt committed
429 430


431
/* run along queue checking for any data that has come in or a timeout */
432
static void process_request_queue (void)
433 434
{
    client_queue_t **node_ref = (client_queue_t **)&_req_queue;
435 436 437 438 439 440
    ice_config_t *config;
    int timeout;
    char peak;

    config = config_get_config();
    timeout = config->header_timeout;
441
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
442

Marvin Scholz's avatar
Marvin Scholz committed
443
    while (*node_ref) {
444 445 446 447
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        int len = PER_CLIENT_REFBUF_SIZE - 1 - node->offset;
        char *buf = client->refbuf->data + node->offset;
Jack Moffitt's avatar
Jack Moffitt committed
448

449 450
        ICECAST_LOG_DDEBUG("Checking on client %p", client);

451
        if (client->con->tlsmode == ICECAST_TLSMODE_AUTO || client->con->tlsmode == ICECAST_TLSMODE_AUTO_NO_PLAIN) {
452 453
            if (recv(client->con->sock, &peak, 1, MSG_PEEK) == 1) {
                if (peak == 0x16) { /* TLS Record Protocol Content type 0x16 == Handshake */
454
                    connection_uses_tls(client->con);
455 456 457 458
                }
            }
        }

Marvin Scholz's avatar
Marvin Scholz committed
459 460
        if (len > 0) {
            if (client->con->con_time + timeout <= time(NULL)) {
461
                len = 0;
Marvin Scholz's avatar
Marvin Scholz committed
462 463 464
            } else {
                len = client_read_bytes(client, buf, len);
            }
465
        }
Jack Moffitt's avatar
Jack Moffitt committed
466

Marvin Scholz's avatar
Marvin Scholz committed
467
        if (len > 0) {
468
            ssize_t stream_offset = -1;
469 470 471
            int pass_it = 1;
            char *ptr;

472 473
            /* handle \n, \r\n and nsvcap which for some strange reason has
             * EOL as \r\r\n */
474
            node->offset += len;
Marvin Scholz's avatar
Marvin Scholz committed
475 476 477
            client->refbuf->data[node->offset] = '\000';
            do {
                if (node->shoutcast == 1) {
478
                    /* password line */
479 480
                    if (strstr (client->refbuf->data, "\r\r\n") != NULL)
                        break;
481 482 483 484 485 486 487
                    if (strstr (client->refbuf->data, "\r\n") != NULL)
                        break;
                    if (strstr (client->refbuf->data, "\n") != NULL)
                        break;
                }
                /* stream_offset refers to the start of any data sent after the
                 * http style headers, we don't want to lose those */
Marvin Scholz's avatar
Marvin Scholz committed
488 489
                ptr = strstr(client->refbuf->data, "\r\r\n\r\r\n");
                if (ptr) {
490
                    stream_offset = (ptr+6) - client->refbuf->data;
491 492
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
493 494
                ptr = strstr(client->refbuf->data, "\r\n\r\n");
                if (ptr) {
495
                    stream_offset = (ptr+4) - client->refbuf->data;
496 497
                    break;
                }
Marvin Scholz's avatar
Marvin Scholz committed
498 499
                ptr = strstr(client->refbuf->data, "\n\n");
                if (ptr) {
500
                    stream_offset = (ptr+2) - client->refbuf->data;
501 502 503 504
                    break;
                }
                pass_it = 0;
            } while (0);
Jack Moffitt's avatar
Jack Moffitt committed
505

506 507 508
            ICECAST_LOG_DDEBUG("pass_it=%i, len=%i", pass_it, (int)len);
            ICECAST_LOG_DDEBUG("Client %p has buffer: %H", client, client->refbuf->data);

Marvin Scholz's avatar
Marvin Scholz committed
509
            if (pass_it) {
510 511 512 513
                if (stream_offset != -1) {
                    connection_read_put_back(client->con, client->refbuf->data + stream_offset, node->offset - stream_offset);
                    node->offset = stream_offset;
                }
514 515 516 517
                if ((client_queue_t **)_req_queue_tail == &(node->next))
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
                node->next = NULL;
Marvin Scholz's avatar
Marvin Scholz committed
518
                _add_connection(node);
519
                continue;
520
            }
Marvin Scholz's avatar
Marvin Scholz committed
521 522
        } else {
            if (len == 0 || client->con->error) {
523 524 525
                if ((client_queue_t **)_req_queue_tail == &node->next)
                    _req_queue_tail = (volatile client_queue_t **)node_ref;
                *node_ref = node->next;
Marvin Scholz's avatar
Marvin Scholz committed
526 527
                client_destroy(client);
                free(node);
528 529 530 531
                continue;
            }
        }
        node_ref = &node->next;
532
    }
533
    _handle_connection();
Jack Moffitt's avatar
Jack Moffitt committed
534 535
}

536 537 538 539 540 541 542 543 544 545 546 547
/* add client to body queue.
 */
static void _add_body_client(client_queue_t *node)
{
    ICECAST_LOG_DEBUG("Putting client %p in body queue.", node->client);

    thread_spin_lock(&_connection_lock);
    *_body_queue_tail = node;
    _body_queue_tail = (volatile client_queue_t **) &node->next;
    thread_spin_unlock(&_connection_lock);
}

548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583
static client_slurp_result_t process_request_body_queue_one(client_queue_t *node, time_t timeout, size_t body_size_limit)
{
        client_t *client = node->client;
        client_slurp_result_t res;

        if (client->parser->req_type == httpp_req_post) {
            if (node->bodybuffer == NULL && client->request_body_read == 0) {
                if (client->request_body_length < 0) {
                    node->bodybufferlen = body_size_limit;
                    node->bodybuffer = malloc(node->bodybufferlen);
                } else if (client->request_body_length <= (ssize_t)body_size_limit) {
                    node->bodybufferlen = client->request_body_length;
                    node->bodybuffer = malloc(node->bodybufferlen);
                }
            }
        }

        if (node->bodybuffer) {
            res = client_body_slurp(client, node->bodybuffer, &(node->bodybufferlen));
            if (res == CLIENT_SLURP_SUCCESS) {
                httpp_parse_postdata(client->parser, node->bodybuffer, node->bodybufferlen);
                free(node->bodybuffer);
                node->bodybuffer = NULL;
            }
        } else {
            res = client_body_skip(client);
        }

        if (res != CLIENT_SLURP_SUCCESS) {
            if (client->con->con_time <= timeout || client->request_body_read >= body_size_limit) {
                return CLIENT_SLURP_ERROR;
            }
        }

        return res;
}
584 585 586 587 588

/* This queue reads data from the body of clients. */
static void process_request_body_queue (void)
{
    client_queue_t **node_ref = (client_queue_t **)&_body_queue;
589 590 591
    ice_config_t *config;
    time_t timeout;
    size_t body_size_limit;
592

593
    ICECAST_LOG_DDEBUG("Processing body queue.");
594

595
    ICECAST_LOG_DDEBUG("_body_queue=%p, &_body_queue=%p, _body_queue_tail=%p", _body_queue, &_body_queue, _body_queue_tail);
596

597 598 599 600 601
    config = config_get_config();
    timeout = time(NULL) - config->body_timeout;
    body_size_limit = config->body_size_limit;
    config_release_config();

602 603 604 605 606
    while (*node_ref) {
        client_queue_t *node = *node_ref;
        client_t *client = node->client;
        client_slurp_result_t res;

607 608
        node->tried_body = 1;

609 610
        ICECAST_LOG_DEBUG("Got client %p in body queue.", client);

611
        res = process_request_body_queue_one(node, timeout, body_size_limit);
612

613
        if (res != CLIENT_SLURP_NEEDS_MORE_DATA) {
614 615 616 617 618 619 620 621 622 623 624 625
            ICECAST_LOG_DEBUG("Putting client %p back in connection queue.", client);

            if ((client_queue_t **)_body_queue_tail == &(node->next))
                _body_queue_tail = (volatile client_queue_t **)node_ref;
            *node_ref = node->next;
            node->next = NULL;
            _add_connection(node);
            continue;
        }
        node_ref = &node->next;
    }
}
626

627 628 629
/* add node to the queue of requests. This is where the clients are when
 * initial http details are read.
 */
Marvin Scholz's avatar
Marvin Scholz committed
630
static void _add_request_queue(client_queue_t *node)
631 632 633
{
    *_req_queue_tail = node;
    _req_queue_tail = (volatile client_queue_t **)&node->next;
Jack Moffitt's avatar
Jack Moffitt committed
634 635
}

636 637 638
static client_queue_t *create_client_node(client_t *client)
{
    client_queue_t *node = calloc (1, sizeof (client_queue_t));
639
    const listener_t *listener;
640 641 642 643 644 645

    if (!node)
        return NULL;

    node->client = client;

646
    listener = listensocket_get_listener(client->con->listensocket_effective);
647 648 649 650

    if (listener) {
        if (listener->shoutcast_compat)
            node->shoutcast = 1;
651 652
        client->con->tlsmode = listener->tls;
        if (listener->tls == ICECAST_TLSMODE_RFC2818 && tls_ok)
653
            connection_uses_tls(client->con);
654 655 656 657
        if (listener->shoutcast_mount)
            node->shoutcast_mount = strdup(listener->shoutcast_mount);
    }

658 659
    listensocket_release_listener(client->con->listensocket_effective);

660 661
    return node;
}
662

663 664 665 666 667 668 669 670
void connection_queue(connection_t *con)
{
    client_queue_t *node;
    client_t *client = NULL;

    global_lock();
    if (client_create(&client, con, NULL) < 0) {
        global_unlock();
671
        client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_LIMIT);
672 673 674 675 676 677 678 679 680 681
        /* don't be too eager as this is an imposed hard limit */
        thread_sleep(400000);
        return;
    }

    /* setup client for reading incoming http */
    client->refbuf->data[PER_CLIENT_REFBUF_SIZE-1] = '\000';

    if (sock_set_blocking(client->con->sock, 0) || sock_set_nodelay(client->con->sock)) {
        global_unlock();
682
        ICECAST_LOG_WARN("Failed to set tcp options on client connection, dropping");
683 684 685 686 687 688 689 690 691 692 693 694 695 696 697
        client_destroy(client);
        return;
    }
    node = create_client_node(client);
    global_unlock();

    if (node == NULL) {
        client_destroy(client);
        return;
    }

    _add_request_queue(node);
    stats_event_inc(NULL, "connections");
}

Marvin Scholz's avatar
Marvin Scholz committed
698
void connection_accept_loop(void)
Jack Moffitt's avatar
Jack Moffitt committed
699
{
700
    connection_t *con;
701
    ice_config_t *config;
702
    int duration = 300;
703

Marvin Scholz's avatar
Marvin Scholz committed
704
    config = config_get_config();
705
    get_tls_certificate(config);
Marvin Scholz's avatar
Marvin Scholz committed
706
    config_release_config();
Jack Moffitt's avatar
Jack Moffitt committed
707

Marvin Scholz's avatar
Marvin Scholz committed
708
    while (global.running == ICECAST_RUNNING) {
709
        con = listensocket_container_accept(global.listensockets, duration);
710

Marvin Scholz's avatar
Marvin Scholz committed
711
        if (con) {
712
            connection_queue(con);
713
            duration = 5;
Marvin Scholz's avatar
Marvin Scholz committed
714
        } else {
715 716
            if (_req_queue == NULL)
                duration = 300; /* use longer timeouts when nothing waiting */
717
        }
Marvin Scholz's avatar
Marvin Scholz committed
718
        process_request_queue();
719
        process_request_body_queue();
720
    }
Jack Moffitt's avatar
Jack Moffitt committed
721

722 723 724
    /* Give all the other threads notification to shut down */
    thread_cond_broadcast(&global.shutdown_cond);

725 726 727
    /* wait for all the sources to shutdown */
    thread_rwlock_wlock(&_source_shutdown_rwlock);
    thread_rwlock_unlock(&_source_shutdown_rwlock);
Jack Moffitt's avatar
Jack Moffitt committed
728 729
}

730 731 732

/* Called when activating a source. Verifies that the source count is not
 * exceeded and applies any initial parameters.
733
 */
Marvin Scholz's avatar
Marvin Scholz committed
734
int connection_complete_source(source_t *source, int response)
735
{
736
    ice_config_t *config;
737

Marvin Scholz's avatar
Marvin Scholz committed
738
    global_lock();
739
    ICECAST_LOG_DEBUG("sources count is %d", global.sources);
740

741
    config = config_get_config();
Marvin Scholz's avatar
Marvin Scholz committed
742
    if (global.sources < config->source_limit) {
743
        const char *contenttype;
744
        mount_proxy *mountinfo;
745 746 747 748
        format_type_t format_type;

        /* setup format handler */
        contenttype = httpp_getvar (source->parser, "content-type");
Marvin Scholz's avatar
Marvin Scholz committed
749 750
        if (contenttype != NULL) {
            format_type = format_get_type(contenttype);
751

Marvin Scholz's avatar
Marvin Scholz committed
752
            if (format_type == FORMAT_ERROR) {
753
                config_release_config();
754
                global_unlock();
755
                if (response) {
756
                    client_send_error_by_id(source->client, ICECAST_ERROR_CON_CONTENT_TYPE_NOSYS);
757 758
                    source->client = NULL;
                }
759
                ICECAST_LOG_WARN("Content-type \"%s\" not supported, dropping source", contenttype);
760 761
                return -1;
            }
762 763 764 765
        } else if (source->parser->req_type == httpp_req_put) {
            config_release_config();
            global_unlock();
            if (response) {
766
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_NO_CONTENT_TYPE_GIVEN);
767 768 769 770 771 772 773 774
                source->client = NULL;
            }
            ICECAST_LOG_ERROR("Content-type not given in PUT request, dropping source");
            return -1;
        } else {
            ICECAST_LOG_ERROR("No content-type header, falling back to backwards compatibility mode "
                    "for icecast 1.x relays. Assuming content is mp3. This behaviour is deprecated "
                    "and the source client will NOT work with future Icecast versions!");
775
            format_type = FORMAT_TYPE_GENERIC;
776 777
        }

Marvin Scholz's avatar
Marvin Scholz committed
778
        if (format_get_plugin (format_type, source) < 0) {
779 780
            global_unlock();
            config_release_config();
Marvin Scholz's avatar
Marvin Scholz committed
781
            if (response) {
782
                client_send_error_by_id(source->client, ICECAST_ERROR_CON_INTERNAL_FORMAT_ALLOC_ERROR);
783 784
                source->client = NULL;
            }
785
            ICECAST_LOG_WARN("plugin format failed for \"%s\"", source->mount);
786 787 788
            return -1;
        }

789
        global.sources++;
Marvin Scholz's avatar
Marvin Scholz committed
790
        stats_event_args(NULL, "sources", "%d", global.sources);
791
        global_unlock();
792

793
        source->running = 1;
Marvin Scholz's avatar
Marvin Scholz committed
794 795
        mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL);
        source_update_settings(config, source, mountinfo);
796
        config_release_config();
797
        slave_rebuild_mounts();
798 799

        source->shutdown_rwlock = &_source_shutdown_rwlock;
800
        ICECAST_LOG_DEBUG("source is ready to start");
801 802 803

        return 0;
    }
804
    ICECAST_LOG_WARN("Request to add source when maximum source limit "
Marvin Scholz's avatar
Marvin Scholz committed
805
        "reached %d", global.sources);
806 807 808 809

    global_unlock();
    config_release_config();

Marvin Scholz's avatar
Marvin Scholz committed
810
    if (response) {
811
        client_send_error_by_id(source->client, ICECAST_ERROR_CON_SOURCE_CLIENT_LIMIT);
812 813
        source->client = NULL;
    }
814 815 816 817

    return -1;
}

818
static inline void source_startup(client_t *client)
819 820
{
    source_t *source;
821
    source = source_reserve(client->uri);
822

Marvin Scholz's avatar
Marvin Scholz committed
823
    if (source) {
824
        source->client = client;
825 826
        source->parser = client->parser;
        source->con = client->con;
Marvin Scholz's avatar
Marvin Scholz committed
827 828 829
        if (connection_complete_source(source, 1) < 0) {
            source_clear_source(source);
            source_free_source(source);
830 831 832
            return;
        }
        client->respcode = 200;
Philipp Schafft's avatar
Philipp Schafft committed
833 834 835 836
        if (client->protocol == ICECAST_PROTOCOL_SHOUTCAST) {
            client->respcode = 200;
            /* send this non-blocking but if there is only a partial write
             * then leave to header timeout */
837
            client_send_bytes(client, "OK2\r\nicy-caps:11\r\n\r\n", 20); /* TODO: Replace Magic Number! */
838
            source->shoutcast_compat = 1;
Marvin Scholz's avatar
Marvin Scholz committed
839
            source_client_callback(client, source);
Philipp Schafft's avatar
Philipp Schafft committed
840
        } else {
Marvin Scholz's avatar
Marvin Scholz committed
841
            refbuf_t *ok = refbuf_new(PER_CLIENT_REFBUF_SIZE);
842
            const char *expectcontinue;
843
            const char *transfer_encoding;
844
            int status_to_send = 0;
845
            ssize_t ret;
846

847 848 849 850
            transfer_encoding = httpp_getvar(source->parser, "transfer-encoding");
            if (transfer_encoding && strcasecmp(transfer_encoding, HTTPP_ENCODING_IDENTITY) != 0) {
                client->encoding = httpp_encoding_new(transfer_encoding);
                if (!client->encoding) {
851
                    client_send_error_by_id(client, ICECAST_ERROR_CON_UNIMPLEMENTED);
852 853 854 855
                    return;
                }
            }

856 857 858 859 860
            if (source->parser && source->parser->req_type == httpp_req_source) {
                status_to_send = 200;
            } else {
                /* For PUT support we check for 100-continue and send back a 100 to stay in spec */
                expectcontinue = httpp_getvar (source->parser, "expect");
861

862
                if (expectcontinue != NULL) {
863
#ifdef HAVE_STRCASESTR
864
                    if (strcasestr (expectcontinue, "100-continue") != NULL)
865
#else
866 867
                    ICECAST_LOG_WARN("OS doesn't support case insensitive substring checks...");
                    if (strstr (expectcontinue, "100-continue") != NULL)
868
#endif
869 870 871
                    {
                        status_to_send = 100;
                    }
872 873 874
                }
            }

875
            client->respcode = 200;
876 877 878 879 880 881 882
            if (status_to_send) {
                ret = util_http_build_header(ok->data, PER_CLIENT_REFBUF_SIZE, 0, 0, status_to_send, NULL, NULL, NULL, NULL, NULL, client);
                snprintf(ok->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Length: 0\r\n\r\n");
                ok->len = strlen(ok->data);
            } else {
                ok->len = 0;
            }
883
            refbuf_release(client->refbuf);
884
            client->refbuf = ok;
Marvin Scholz's avatar
Marvin Scholz committed
885
            fserve_add_client_callback(client, source_client_callback, source);
886
        }
Marvin Scholz's avatar
Marvin Scholz committed
887
    } else {
888
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNT_IN_USE);
889
        ICECAST_LOG_WARN("Mountpoint %s in use", client->uri);
890
    }
891 892
}

Philipp Schafft's avatar
Philipp Schafft committed
893
/* only called for native icecast source clients */
894
static void _handle_source_request(client_t *client)
Jack Moffitt's avatar
Jack Moffitt committed
895
{
896 897 898 899
    const char *method = httpp_getvar(client->parser, HTTPP_VAR_REQ_TYPE);

    ICECAST_LOG_INFO("Source logging in at mountpoint \"%s\" using %s%H%s from %s as role %s",
        client->uri,
900
        ((method) ? "\"" : "<"), ((method) ? method : "unknown"), ((method) ? "\"" : ">"),
901
        client->con->ip, client->role);
902

903 904 905 906
    if (client->parser && client->parser->req_type == httpp_req_source) {
        ICECAST_LOG_DEBUG("Source at mountpoint \"%s\" connected using deprecated SOURCE method.", client->uri);
    }

907
    if (client->uri[0] != '/') {
Philipp Schafft's avatar
Philipp Schafft committed
908
        ICECAST_LOG_WARN("source mountpoint not starting with /");
909
        client_send_error_by_id(client, ICECAST_ERROR_CON_MOUNTPOINT_NOT_STARTING_WITH_SLASH);
910
        return;
911
    }
912

913
    source_startup(client);
Philipp Schafft's avatar
Philipp Schafft committed
914 915 916
}


917
static void _handle_stats_request(client_t *client)
Philipp Schafft's avatar
Philipp Schafft committed
918 919 920
{
    stats_event_inc(NULL, "stats_connections");

921
    client->respcode = 200;
922
    snprintf (client->refbuf->data, PER_CLIENT_REFBUF_SIZE,
Marvin Scholz's avatar
Marvin Scholz committed
923 924 925
        "HTTP/1.0 200 OK\r\n\r\n");
    client->refbuf->len = strlen(client->refbuf->data);
    fserve_add_client_callback(client, stats_callback, NULL);
926 927
}

Philipp Schafft's avatar
Philipp Schafft committed
928 929 930
/* if 0 is returned then the client should not be touched, however if -1
 * is returned then the caller is responsible for handling the client
 */
Marvin Scholz's avatar
Marvin Scholz committed
931
static int __add_listener_to_source(source_t *source, client_t *client)
932
{
Philipp Schafft's avatar
Philipp Schafft committed
933
    size_t loop = 10;
Michael Smith's avatar
Michael Smith committed
934

Marvin Scholz's avatar
Marvin Scholz committed
935
    do {
Philipp Schafft's avatar
Philipp Schafft committed
936
        ICECAST_LOG_DEBUG("max on %s is %ld (cur %lu)", source->mount,
Marvin Scholz's avatar
Marvin Scholz committed
937
            source->max_listeners, source->listeners);
Philipp Schafft's avatar
Philipp Schafft committed
938 939 940 941
        if (source->max_listeners == -1)
            break;
        if (source->listeners < (unsigned long)source->max_listeners)
            break;
942

Marvin Scholz's avatar
Marvin Scholz committed
943
        if (loop && source->fallback_when_full && source->fallback_mount) {
Philipp Schafft's avatar
Philipp Schafft committed
944 945 946
            source_t *next = source_find_mount (source->fallback_mount);
            if (!next) {
                ICECAST_LOG_ERROR("Fallback '%s' for full source '%s' not found",
Marvin Scholz's avatar
Marvin Scholz committed
947
                    source->mount, source->fallback_mount);
Philipp Schafft's avatar
Philipp Schafft committed
948 949
                return -1;
            }
950
            ICECAST_LOG_INFO("stream full, trying %s", next->mount);
Philipp Schafft's avatar
Philipp Schafft committed
951 952 953 954 955 956 957 958 959 960 961
            source = next;
            loop--;
            continue;
        }
        /* now we fail the client */
        return -1;
    } while (1);

    client->write_to_client = format_generic_write_to_client;
    client->check_buffer = format_check_http_buffer;
    client->refbuf->len = PER_CLIENT_REFBUF_SIZE;
Marvin Scholz's avatar
Marvin Scholz committed
962
    memset(client->refbuf->data, 0, PER_CLIENT_REFBUF_SIZE);
Philipp Schafft's avatar
Philipp Schafft committed
963 964

    /* lets add the client to the active list */
Marvin Scholz's avatar
Marvin Scholz committed
965 966 967
    avl_tree_wlock(source->pending_tree);
    avl_insert(source->pending_tree, client);
    avl_tree_unlock(source->pending_tree);
Philipp Schafft's avatar
Philipp Schafft committed
968

Marvin Scholz's avatar
Marvin Scholz committed
969
    if (source->running == 0 && source->on_demand) {
Philipp Schafft's avatar
Philipp Schafft committed
970 971 972
        /* enable on-demand relay to start, wake up the slave thread */
        ICECAST_LOG_DEBUG("kicking off on-demand relay");
        source->on_demand_req = 1;
973
    }
Philipp Schafft's avatar
Philipp Schafft committed
974 975 976
    ICECAST_LOG_DEBUG("Added client to %s", source->mount);
    return 0;
}
977

Philipp Schafft's avatar
Philipp Schafft committed
978 979 980 981 982 983 984 985 986 987 988 989
/* count the number of clients on a mount with same username and same role as the given one */
static inline ssize_t __count_user_role_on_mount (source_t *source, client_t *client) {
    ssize_t ret = 0;
    avl_node *node;

    avl_tree_rlock(source->client_tree);
    node = avl_get_first(source->client_tree);
    while (node) {
        client_t *existing_client = (client_t *)node->key;
        if (existing_client->username && client->username &&
            strcmp(existing_client->username, client->username) == 0 &&
            existing_client->role && client->role &&
Marvin Scholz's avatar
Marvin Scholz committed
990
            strcmp(existing_client->role, client->role) == 0) {
Philipp Schafft's avatar
Philipp Schafft committed
991
            ret++;