mirror of
https://gitlab.xiph.org/xiph/icecast-server.git
synced 2025-02-02 15:07:36 -05:00
Client authentication added.
Melanie's multilevel fallbacks added (after major changes). svn path=/trunk/icecast/; revision=5760
This commit is contained in:
parent
964ac0b9dc
commit
57dd5f71a5
@ -8,10 +8,10 @@ bin_PROGRAMS = icecast
|
|||||||
|
|
||||||
noinst_HEADERS = admin.h cfgfile.h os.h logging.h sighandler.h connection.h global.h\
|
noinst_HEADERS = admin.h cfgfile.h os.h logging.h sighandler.h connection.h global.h\
|
||||||
util.h slave.h source.h stats.h refbuf.h client.h format.h format_vorbis.h\
|
util.h slave.h source.h stats.h refbuf.h client.h format.h format_vorbis.h\
|
||||||
compat.h format_mp3.h fserve.h xslt.h geturl.h yp.h event.h
|
compat.h format_mp3.h fserve.h xslt.h geturl.h yp.h event.h auth.h md5.h
|
||||||
icecast_SOURCES = cfgfile.c main.c logging.c sighandler.c connection.c global.c\
|
icecast_SOURCES = cfgfile.c main.c logging.c sighandler.c connection.c global.c\
|
||||||
util.c slave.c source.c stats.c refbuf.c client.c format.c format_vorbis.c\
|
util.c slave.c source.c stats.c refbuf.c client.c format.c format_vorbis.c\
|
||||||
format_mp3.c xslt.c fserve.c event.c admin.c
|
format_mp3.c xslt.c fserve.c event.c admin.c auth.c md5.c
|
||||||
EXTRA_icecast_SOURCES = geturl.c yp.c
|
EXTRA_icecast_SOURCES = geturl.c yp.c
|
||||||
|
|
||||||
icecast_DEPENDENCIES = @ICECAST_OPTIONAL@ net/libicenet.la thread/libicethread.la \
|
icecast_DEPENDENCIES = @ICECAST_OPTIONAL@ net/libicenet.la thread/libicethread.la \
|
||||||
|
@ -269,7 +269,7 @@ void admin_handle_request(client_t *client, char *uri)
|
|||||||
}
|
}
|
||||||
|
|
||||||
avl_tree_rlock(global.source_tree);
|
avl_tree_rlock(global.source_tree);
|
||||||
source = source_find_mount(mount);
|
source = source_find_mount_raw(mount);
|
||||||
avl_tree_unlock(global.source_tree);
|
avl_tree_unlock(global.source_tree);
|
||||||
|
|
||||||
if(source == NULL) {
|
if(source == NULL) {
|
||||||
|
207
src/auth.c
Normal file
207
src/auth.c
Normal file
@ -0,0 +1,207 @@
|
|||||||
|
/**
|
||||||
|
* Client authentication functions
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifdef HAVE_CONFIG_H
|
||||||
|
#include <config.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
|
||||||
|
#include "auth.h"
|
||||||
|
#include "source.h"
|
||||||
|
#include "client.h"
|
||||||
|
#include "cfgfile.h"
|
||||||
|
#include "httpp/httpp.h"
|
||||||
|
#include "md5.h"
|
||||||
|
|
||||||
|
#include "logging.h"
|
||||||
|
#define CATMODULE "auth"
|
||||||
|
|
||||||
|
auth_result auth_check_client(source_t *source, client_t *client)
|
||||||
|
{
|
||||||
|
auth_t *authenticator = source->authenticator;
|
||||||
|
|
||||||
|
if(authenticator) {
|
||||||
|
/* This will look something like "Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==" */
|
||||||
|
char *header = httpp_getvar(client->parser, "authorization");
|
||||||
|
char *userpass, *tmp;
|
||||||
|
char *username, *password;
|
||||||
|
|
||||||
|
if(header == NULL)
|
||||||
|
return AUTH_FAILED;
|
||||||
|
|
||||||
|
if(strncmp(header, "Basic ", 6)) {
|
||||||
|
INFO0("Authorization not using Basic");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
userpass = util_base64_decode(header+6);
|
||||||
|
if(userpass == NULL) {
|
||||||
|
WARN1("Base64 decode of Authorization header \"%s\" failed",
|
||||||
|
header+6);
|
||||||
|
return AUTH_FAILED;
|
||||||
|
}
|
||||||
|
|
||||||
|
tmp = strchr(userpass, ':');
|
||||||
|
if(!tmp) {
|
||||||
|
free(userpass);
|
||||||
|
return AUTH_FAILED;
|
||||||
|
}
|
||||||
|
|
||||||
|
*tmp = 0;
|
||||||
|
username = userpass;
|
||||||
|
password = tmp+1;
|
||||||
|
|
||||||
|
auth_result result = authenticator->authenticate(
|
||||||
|
authenticator, username, password);
|
||||||
|
|
||||||
|
if(result == AUTH_OK)
|
||||||
|
client->username = strdup(username);
|
||||||
|
|
||||||
|
free(userpass);
|
||||||
|
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
return AUTH_FAILED;
|
||||||
|
}
|
||||||
|
|
||||||
|
static auth_t *auth_get_htpasswd_auth(config_options_t *options);
|
||||||
|
|
||||||
|
auth_t *auth_get_authenticator(char *type, config_options_t *options)
|
||||||
|
{
|
||||||
|
auth_t *auth = NULL;
|
||||||
|
if(!strcmp(type, "htpasswd")) {
|
||||||
|
auth = auth_get_htpasswd_auth(options);
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
ERROR1("Unrecognised authenticator type: \"%s\"", type);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if(!auth)
|
||||||
|
ERROR1("Couldn't configure authenticator of type \"%s\"", type);
|
||||||
|
|
||||||
|
return auth;
|
||||||
|
}
|
||||||
|
|
||||||
|
typedef struct {
|
||||||
|
char *filename;
|
||||||
|
} htpasswd_auth_state;
|
||||||
|
|
||||||
|
static void htpasswd_clear(auth_t *self) {
|
||||||
|
htpasswd_auth_state *state = self->state;
|
||||||
|
free(state->filename);
|
||||||
|
free(state);
|
||||||
|
free(self);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int get_line(FILE *file, char *buf, int len)
|
||||||
|
{
|
||||||
|
if(fgets(buf, len, file)) {
|
||||||
|
int len = strlen(buf);
|
||||||
|
if(len > 0 && buf[len-1] == '\n') {
|
||||||
|
buf[--len] = 0;
|
||||||
|
if(len > 0 && buf[len-1] == '\r')
|
||||||
|
buf[--len] = 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* md5 hash */
|
||||||
|
static char *get_hash(char *data, int len)
|
||||||
|
{
|
||||||
|
struct MD5Context context;
|
||||||
|
|
||||||
|
MD5Init(&context);
|
||||||
|
|
||||||
|
MD5Update(&context, data, len);
|
||||||
|
|
||||||
|
unsigned char digest[16];
|
||||||
|
MD5Final(digest, &context);
|
||||||
|
|
||||||
|
return util_bin_to_hex(digest, 16);
|
||||||
|
}
|
||||||
|
|
||||||
|
#define MAX_LINE_LEN 512
|
||||||
|
|
||||||
|
/* Not efficient; opens and scans the entire file for every request */
|
||||||
|
static auth_result htpasswd_auth(auth_t *auth, char *username, char *password)
|
||||||
|
{
|
||||||
|
htpasswd_auth_state *state = auth->state;
|
||||||
|
FILE *passwdfile = fopen(state->filename, "rb");
|
||||||
|
char line[MAX_LINE_LEN];
|
||||||
|
char *sep;
|
||||||
|
|
||||||
|
if(passwdfile == NULL) {
|
||||||
|
WARN2("Failed to open authentication database \"%s\": %s",
|
||||||
|
state->filename, strerror(errno));
|
||||||
|
return AUTH_FAILED;
|
||||||
|
}
|
||||||
|
|
||||||
|
while(get_line(passwdfile, line, MAX_LINE_LEN)) {
|
||||||
|
if(!line[0] || line[0] == '#')
|
||||||
|
continue;
|
||||||
|
|
||||||
|
sep = strchr(line, ':');
|
||||||
|
if(sep == NULL) {
|
||||||
|
DEBUG0("No seperator in line");
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
*sep = 0;
|
||||||
|
if(!strcmp(username, line)) {
|
||||||
|
/* Found our user, now: does the hash of password match hash? */
|
||||||
|
char *hash = sep+1;
|
||||||
|
char *hashed_password = get_hash(password, strlen(password));
|
||||||
|
if(!strcmp(hash, hashed_password)) {
|
||||||
|
fclose(passwdfile);
|
||||||
|
free(hashed_password);
|
||||||
|
return AUTH_OK;
|
||||||
|
}
|
||||||
|
free(hashed_password);
|
||||||
|
/* We don't keep searching through the file */
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fclose(passwdfile);
|
||||||
|
|
||||||
|
return AUTH_FAILED;
|
||||||
|
}
|
||||||
|
|
||||||
|
static auth_t *auth_get_htpasswd_auth(config_options_t *options)
|
||||||
|
{
|
||||||
|
auth_t *authenticator = calloc(1, sizeof(auth_t));
|
||||||
|
|
||||||
|
authenticator->authenticate = htpasswd_auth;
|
||||||
|
authenticator->free = htpasswd_clear;
|
||||||
|
|
||||||
|
htpasswd_auth_state *state = calloc(1, sizeof(htpasswd_auth_state));
|
||||||
|
|
||||||
|
while(options) {
|
||||||
|
if(!strcmp(options->name, "filename"))
|
||||||
|
state->filename = strdup(options->value);
|
||||||
|
options = options->next;
|
||||||
|
}
|
||||||
|
|
||||||
|
if(!state->filename) {
|
||||||
|
free(state);
|
||||||
|
free(authenticator);
|
||||||
|
ERROR0("No filename given in options for authenticator.");
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
authenticator->state = state;
|
||||||
|
DEBUG1("Configured htpasswd authentication using password file %s",
|
||||||
|
state->filename);
|
||||||
|
|
||||||
|
return authenticator;
|
||||||
|
}
|
||||||
|
|
30
src/auth.h
Normal file
30
src/auth.h
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
#ifndef __AUTH_H__
|
||||||
|
#define __AUTH_H__
|
||||||
|
|
||||||
|
#include "source.h"
|
||||||
|
#include "client.h"
|
||||||
|
#include "config.h"
|
||||||
|
|
||||||
|
typedef enum
|
||||||
|
{
|
||||||
|
AUTH_OK,
|
||||||
|
AUTH_FAILED,
|
||||||
|
} auth_result;
|
||||||
|
|
||||||
|
typedef struct auth_tag
|
||||||
|
{
|
||||||
|
/* Authenticate using the given username and password */
|
||||||
|
auth_result (*authenticate)(struct auth_tag *self,
|
||||||
|
char *username, char *password);
|
||||||
|
void (*free)(struct auth_tag *self);
|
||||||
|
void *state;
|
||||||
|
} auth_t;
|
||||||
|
|
||||||
|
auth_result auth_check_client(source_t *source, client_t *client);
|
||||||
|
|
||||||
|
auth_t *auth_get_authenticator(char *type, config_options_t *options);
|
||||||
|
void *auth_clear(auth_t *authenticator);
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
|
|
@ -170,6 +170,17 @@ void config_clear(ice_config_t *c)
|
|||||||
xmlFree(mount->password);
|
xmlFree(mount->password);
|
||||||
xmlFree(mount->dumpfile);
|
xmlFree(mount->dumpfile);
|
||||||
xmlFree(mount->fallback_mount);
|
xmlFree(mount->fallback_mount);
|
||||||
|
|
||||||
|
xmlFree(mount->auth_type);
|
||||||
|
config_options_t *option = mount->auth_options;
|
||||||
|
while(option) {
|
||||||
|
config_options_t *nextopt = option->next;
|
||||||
|
xmlFree(option->name);
|
||||||
|
xmlFree(option->value);
|
||||||
|
free(option);
|
||||||
|
option = nextopt;
|
||||||
|
}
|
||||||
|
|
||||||
free(mount);
|
free(mount);
|
||||||
mount = nextmount;
|
mount = nextmount;
|
||||||
}
|
}
|
||||||
@ -483,6 +494,46 @@ static void _parse_mount(xmlDocPtr doc, xmlNodePtr node,
|
|||||||
mount->max_listeners = atoi(tmp);
|
mount->max_listeners = atoi(tmp);
|
||||||
if(tmp) xmlFree(tmp);
|
if(tmp) xmlFree(tmp);
|
||||||
}
|
}
|
||||||
|
else if (strcmp(node->name, "fallback-override") == 0) {
|
||||||
|
tmp = (char *)xmlNodeListGetString(doc, node->xmlChildrenNode, 1);
|
||||||
|
mount->fallback_override = atoi(tmp);
|
||||||
|
if(tmp) xmlFree(tmp);
|
||||||
|
}
|
||||||
|
else if (strcmp(node->name, "no-mount") == 0) {
|
||||||
|
tmp = (char *)xmlNodeListGetString(doc, node->xmlChildrenNode, 1);
|
||||||
|
mount->no_mount = atoi(tmp);
|
||||||
|
if(tmp) xmlFree(tmp);
|
||||||
|
}
|
||||||
|
else if (strcmp(node->name, "authentication") == 0) {
|
||||||
|
mount->auth_type = xmlGetProp(node, "type");
|
||||||
|
xmlNodePtr option = node->xmlChildrenNode;
|
||||||
|
config_options_t *last = NULL;
|
||||||
|
while(option != NULL) {
|
||||||
|
if(strcmp(option->name, "option") == 0) {
|
||||||
|
config_options_t *opt = malloc(sizeof(config_options_t));
|
||||||
|
opt->name = xmlGetProp(option, "name");
|
||||||
|
if(!opt->name) {
|
||||||
|
free(opt);
|
||||||
|
option = option->next;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
opt->value = xmlGetProp(option, "value");
|
||||||
|
if(!opt->value) {
|
||||||
|
free(opt->name);
|
||||||
|
free(opt);
|
||||||
|
option = option->next;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
if(last)
|
||||||
|
last->next = opt;
|
||||||
|
else
|
||||||
|
mount->auth_options = opt;
|
||||||
|
last = opt;
|
||||||
|
}
|
||||||
|
option = option->next;
|
||||||
|
}
|
||||||
|
}
|
||||||
} while ((node = node->next));
|
} while ((node = node->next));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -29,6 +29,12 @@ typedef struct _relay_server {
|
|||||||
struct _relay_server *next;
|
struct _relay_server *next;
|
||||||
} relay_server;
|
} relay_server;
|
||||||
|
|
||||||
|
typedef struct _config_options {
|
||||||
|
char *name;
|
||||||
|
char *value;
|
||||||
|
struct _config_options *next;
|
||||||
|
} config_options_t;
|
||||||
|
|
||||||
typedef struct _mount_proxy {
|
typedef struct _mount_proxy {
|
||||||
char *mountname; /* The mountpoint this proxy is used for */
|
char *mountname; /* The mountpoint this proxy is used for */
|
||||||
|
|
||||||
@ -39,7 +45,15 @@ typedef struct _mount_proxy {
|
|||||||
to not dump. */
|
to not dump. */
|
||||||
int max_listeners; /* Max listeners for this mountpoint only. -1 to not
|
int max_listeners; /* Max listeners for this mountpoint only. -1 to not
|
||||||
limit here (i.e. only use the global limit) */
|
limit here (i.e. only use the global limit) */
|
||||||
char *fallback_mount;
|
char *fallback_mount; /* Fallback mountname */
|
||||||
|
|
||||||
|
int fallback_override; /* When this source arrives, do we steal back
|
||||||
|
clients from the fallback? */
|
||||||
|
int no_mount; /* Do we permit direct requests of this mountpoint? (or only
|
||||||
|
indirect, through fallbacks) */
|
||||||
|
|
||||||
|
char *auth_type; /* Authentication type */
|
||||||
|
config_options_t *auth_options; /* Options for this type */
|
||||||
struct _mount_proxy *next;
|
struct _mount_proxy *next;
|
||||||
} mount_proxy;
|
} mount_proxy;
|
||||||
|
|
||||||
|
@ -49,6 +49,8 @@ void client_destroy(client_t *client)
|
|||||||
while ((refbuf = refbuf_queue_remove(&client->queue)))
|
while ((refbuf = refbuf_queue_remove(&client->queue)))
|
||||||
refbuf_release(refbuf);
|
refbuf_release(refbuf);
|
||||||
|
|
||||||
|
free(client->username);
|
||||||
|
|
||||||
free(client);
|
free(client);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -7,12 +7,14 @@
|
|||||||
#define __CLIENT_H__
|
#define __CLIENT_H__
|
||||||
|
|
||||||
#include "connection.h"
|
#include "connection.h"
|
||||||
|
#include "refbuf.h"
|
||||||
|
#include "httpp/httpp.h"
|
||||||
|
|
||||||
typedef struct _client_tag
|
typedef struct _client_tag
|
||||||
{
|
{
|
||||||
/* the clients connection */
|
/* the client's connection */
|
||||||
connection_t *con;
|
connection_t *con;
|
||||||
/* the clients http headers */
|
/* the client's http headers */
|
||||||
http_parser_t *parser;
|
http_parser_t *parser;
|
||||||
|
|
||||||
/* http response code for this client */
|
/* http response code for this client */
|
||||||
@ -23,6 +25,9 @@ typedef struct _client_tag
|
|||||||
/* position in first buffer */
|
/* position in first buffer */
|
||||||
unsigned long pos;
|
unsigned long pos;
|
||||||
|
|
||||||
|
/* Client username, if authenticated */
|
||||||
|
char *username;
|
||||||
|
|
||||||
/* Format-handler-specific data for this client */
|
/* Format-handler-specific data for this client */
|
||||||
void *format_data;
|
void *format_data;
|
||||||
} client_t;
|
} client_t;
|
||||||
|
@ -9,6 +9,7 @@
|
|||||||
#ifdef _WIN32
|
#ifdef _WIN32
|
||||||
# define int64_t __int64
|
# define int64_t __int64
|
||||||
# define uint64_t unsigned __int64
|
# define uint64_t unsigned __int64
|
||||||
|
# define uint32_t unsigned int
|
||||||
#else
|
#else
|
||||||
# ifdef HAVE_STDINT_H
|
# ifdef HAVE_STDINT_H
|
||||||
# include <stdint.h>
|
# include <stdint.h>
|
||||||
|
@ -49,6 +49,7 @@
|
|||||||
#include "format_mp3.h"
|
#include "format_mp3.h"
|
||||||
#include "event.h"
|
#include "event.h"
|
||||||
#include "admin.h"
|
#include "admin.h"
|
||||||
|
#include "auth.h"
|
||||||
|
|
||||||
#define CATMODULE "connection"
|
#define CATMODULE "connection"
|
||||||
|
|
||||||
@ -571,6 +572,7 @@ int connection_check_admin_pass(http_parser_t *parser)
|
|||||||
config_release_config();
|
config_release_config();
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
int connection_check_relay_pass(http_parser_t *parser)
|
int connection_check_relay_pass(http_parser_t *parser)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
@ -647,6 +649,10 @@ static void _handle_source_request(connection_t *con,
|
|||||||
stats_event_inc(NULL, "source_connections");
|
stats_event_inc(NULL, "source_connections");
|
||||||
|
|
||||||
if (!connection_check_source_pass(parser, uri)) {
|
if (!connection_check_source_pass(parser, uri)) {
|
||||||
|
/* We commonly get this if the source client is using the wrong
|
||||||
|
* protocol: attempt to diagnose this and return an error
|
||||||
|
*/
|
||||||
|
/* TODO: Do what the above comment says */
|
||||||
INFO1("Source (%s) attempted to login with invalid or missing password", uri);
|
INFO1("Source (%s) attempted to login with invalid or missing password", uri);
|
||||||
client_send_401(client);
|
client_send_401(client);
|
||||||
return;
|
return;
|
||||||
@ -657,7 +663,7 @@ static void _handle_source_request(connection_t *con,
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
avl_tree_rlock(global.source_tree);
|
avl_tree_rlock(global.source_tree);
|
||||||
if (source_find_mount(uri) != NULL) {
|
if (source_find_mount_raw(uri) != NULL) {
|
||||||
avl_tree_unlock(global.source_tree);
|
avl_tree_unlock(global.source_tree);
|
||||||
INFO1("Source tried to log in as %s, but mountpoint is already used", uri);
|
INFO1("Source tried to log in as %s, but mountpoint is already used", uri);
|
||||||
client_send_404(client, "Mountpoint in use");
|
client_send_404(client, "Mountpoint in use");
|
||||||
@ -855,6 +861,28 @@ static void _handle_get_request(connection_t *con,
|
|||||||
if (source) {
|
if (source) {
|
||||||
DEBUG0("Source found for client");
|
DEBUG0("Source found for client");
|
||||||
|
|
||||||
|
/* The source may not be the requested source - it might have gone
|
||||||
|
* via one or more fallbacks. We only reject it for no-mount if it's
|
||||||
|
* the originally requested source
|
||||||
|
*/
|
||||||
|
if(strcmp(uri, source->mount) == 0 && source->no_mount) {
|
||||||
|
client_send_404(client, "This mount is unavailable.");
|
||||||
|
avl_tree_unlock(global.source_tree);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Check for any required authentication first */
|
||||||
|
if(source->authenticator != NULL) {
|
||||||
|
if(auth_check_client(source, client) != AUTH_OK) {
|
||||||
|
INFO1("Client attempted to log in to source (\"%s\")with "
|
||||||
|
"incorrect or missing password", uri);
|
||||||
|
client_send_401(client);
|
||||||
|
avl_tree_unlock(global.source_tree);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/* And then check that there's actually room in the server... */
|
||||||
global_lock();
|
global_lock();
|
||||||
if (global.clients >= client_limit) {
|
if (global.clients >= client_limit) {
|
||||||
client_send_504(client,
|
client_send_504(client,
|
||||||
@ -863,6 +891,10 @@ static void _handle_get_request(connection_t *con,
|
|||||||
avl_tree_unlock(global.source_tree);
|
avl_tree_unlock(global.source_tree);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
/* Early-out for per-source max listeners. This gets checked again
|
||||||
|
* by the source itself, later. This route gives a useful message to
|
||||||
|
* the client, also.
|
||||||
|
*/
|
||||||
else if(source->max_listeners != -1 &&
|
else if(source->max_listeners != -1 &&
|
||||||
source->listeners >= source->max_listeners)
|
source->listeners >= source->max_listeners)
|
||||||
{
|
{
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
#define __CONNECTION_H__
|
#define __CONNECTION_H__
|
||||||
|
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
|
#include <time.h>
|
||||||
#include "compat.h"
|
#include "compat.h"
|
||||||
#include "httpp/httpp.h"
|
#include "httpp/httpp.h"
|
||||||
#include "thread/thread.h"
|
#include "thread/thread.h"
|
||||||
@ -16,6 +17,7 @@ typedef struct connection_tag
|
|||||||
time_t con_time;
|
time_t con_time;
|
||||||
uint64_t sent_bytes;
|
uint64_t sent_bytes;
|
||||||
|
|
||||||
|
|
||||||
int sock;
|
int sock;
|
||||||
int serversock;
|
int serversock;
|
||||||
int error;
|
int error;
|
||||||
|
@ -177,7 +177,7 @@ int format_vorbis_get_buffer(format_plugin_t *self, char *data, unsigned long le
|
|||||||
/* If we get an update on the mountpoint, force a
|
/* If we get an update on the mountpoint, force a
|
||||||
yp touch */
|
yp touch */
|
||||||
avl_tree_rlock(global.source_tree);
|
avl_tree_rlock(global.source_tree);
|
||||||
source = source_find_mount(self->mount);
|
source = source_find_mount_raw(self->mount);
|
||||||
avl_tree_unlock(global.source_tree);
|
avl_tree_unlock(global.source_tree);
|
||||||
|
|
||||||
if (source) {
|
if (source) {
|
||||||
|
265
src/md5.c
Normal file
265
src/md5.c
Normal file
@ -0,0 +1,265 @@
|
|||||||
|
/*
|
||||||
|
* md5.c
|
||||||
|
*
|
||||||
|
* This code implements the MD5 message-digest algorithm.
|
||||||
|
* The algorithm is due to Ron Rivest. This code was
|
||||||
|
* written by Colin Plumb in 1993, no copyright is claimed.
|
||||||
|
* This code is in the public domain; do with it what you wish.
|
||||||
|
*
|
||||||
|
* Equivalent code is available from RSA Data Security, Inc.
|
||||||
|
* This code has been tested against that, and is equivalent,
|
||||||
|
* except that you don't need to include two pages of legalese
|
||||||
|
* with every copy.
|
||||||
|
*
|
||||||
|
* To compute the message digest of a chunk of bytes, declare an
|
||||||
|
* MD5Context structure, pass it to MD5Init, call MD5Update as
|
||||||
|
* needed on buffers full of bytes, and then call MD5Final, which
|
||||||
|
* will fill a supplied 16-byte array with the digest.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* Modified for icecast by Mike Smith <msmith@xiph.org>, mostly changing header
|
||||||
|
* and type definitions
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "config.h"
|
||||||
|
#include "compat.h"
|
||||||
|
#include "md5.h"
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <ctype.h>
|
||||||
|
|
||||||
|
static void MD5Transform(uint32_t buf[4], uint32_t const in[HASH_LEN]);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Note: this code is harmless on little-endian machines.
|
||||||
|
*/
|
||||||
|
static void byteReverse(unsigned char *buf, unsigned longs)
|
||||||
|
{
|
||||||
|
uint32_t t;
|
||||||
|
do
|
||||||
|
{
|
||||||
|
t = (uint32_t) ((unsigned) buf[3] << 8 | buf[2]) << 16 |
|
||||||
|
((unsigned) buf[1] << 8 | buf[0]);
|
||||||
|
*(uint32_t *) buf = t;
|
||||||
|
buf += 4;
|
||||||
|
}
|
||||||
|
while (--longs);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Start MD5 accumulation. Set bit count to 0 and buffer to mysterious
|
||||||
|
* initialization constants.
|
||||||
|
*/
|
||||||
|
void MD5Init(struct MD5Context *ctx)
|
||||||
|
{
|
||||||
|
ctx->buf[0] = 0x67452301;
|
||||||
|
ctx->buf[1] = 0xefcdab89;
|
||||||
|
ctx->buf[2] = 0x98badcfe;
|
||||||
|
ctx->buf[3] = 0x10325476;
|
||||||
|
|
||||||
|
ctx->bits[0] = 0;
|
||||||
|
ctx->bits[1] = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Update context to reflect the concatenation of another buffer full
|
||||||
|
* of bytes.
|
||||||
|
*/
|
||||||
|
void MD5Update(struct MD5Context *ctx, unsigned char const *buf,
|
||||||
|
unsigned len)
|
||||||
|
{
|
||||||
|
uint32_t t;
|
||||||
|
|
||||||
|
/* Update bitcount */
|
||||||
|
|
||||||
|
t = ctx->bits[0];
|
||||||
|
if ((ctx->bits[0] = t + ((uint32_t) len << 3)) < t)
|
||||||
|
ctx->bits[1]++;
|
||||||
|
|
||||||
|
/* Carry from low to high */
|
||||||
|
ctx->bits[1] += len >> 29;
|
||||||
|
|
||||||
|
t = (t >> 3) & 0x3f;
|
||||||
|
/* Bytes already in shsInfo->data */
|
||||||
|
|
||||||
|
/* Handle any leading odd-sized chunks */
|
||||||
|
if (t)
|
||||||
|
{
|
||||||
|
unsigned char *p = (unsigned char *) ctx->in + t;
|
||||||
|
t = 64 - t;
|
||||||
|
if (len < t)
|
||||||
|
{
|
||||||
|
memcpy(p, buf, len);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
memcpy(p, buf, t);
|
||||||
|
byteReverse(ctx->in, HASH_LEN);
|
||||||
|
MD5Transform(ctx->buf, (uint32_t *) ctx->in);
|
||||||
|
buf += t;
|
||||||
|
len -= t;
|
||||||
|
}
|
||||||
|
/* Process data in 64-byte chunks */
|
||||||
|
|
||||||
|
while (len >= 64)
|
||||||
|
{
|
||||||
|
memcpy(ctx->in, buf, 64);
|
||||||
|
byteReverse(ctx->in, HASH_LEN);
|
||||||
|
MD5Transform(ctx->buf, (uint32_t *) ctx->in);
|
||||||
|
buf += 64;
|
||||||
|
len -= 64;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Handle any remaining bytes of data. */
|
||||||
|
memcpy(ctx->in, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Final wrapup - pad to 64-byte boundary with the bit pattern
|
||||||
|
* 1 0* (64-bit count of bits processed, MSB-first)
|
||||||
|
*/
|
||||||
|
void MD5Final(unsigned char digest[HASH_LEN], struct MD5Context *ctx)
|
||||||
|
{
|
||||||
|
unsigned count;
|
||||||
|
unsigned char *p;
|
||||||
|
|
||||||
|
/* Compute number of bytes mod 64 */
|
||||||
|
count = (ctx->bits[0] >> 3) & 0x3F;
|
||||||
|
|
||||||
|
/* Set the first char of padding to 0x80. This is safe since there is
|
||||||
|
always at least one byte free */
|
||||||
|
p = ctx->in + count;
|
||||||
|
*p++ = 0x80;
|
||||||
|
|
||||||
|
/* Bytes of padding needed to make 64 bytes */
|
||||||
|
count = 64 - 1 - count;
|
||||||
|
|
||||||
|
/* Pad out to 56 mod 64 */
|
||||||
|
if (count < 8)
|
||||||
|
{
|
||||||
|
/* Two lots of padding: Pad the first block to 64 bytes */
|
||||||
|
memset(p, 0, count);
|
||||||
|
byteReverse(ctx->in, HASH_LEN);
|
||||||
|
MD5Transform(ctx->buf, (uint32_t *) ctx->in);
|
||||||
|
|
||||||
|
/* Now fill the next block with 56 bytes */
|
||||||
|
memset(ctx->in, 0, 56);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
/* Pad block to 56 bytes */
|
||||||
|
memset(p, 0, count - 8);
|
||||||
|
}
|
||||||
|
byteReverse(ctx->in, 14);
|
||||||
|
|
||||||
|
/* Append length in bits and transform */
|
||||||
|
((uint32_t *) ctx->in)[14] = ctx->bits[0];
|
||||||
|
((uint32_t *) ctx->in)[15] = ctx->bits[1];
|
||||||
|
|
||||||
|
MD5Transform(ctx->buf, (uint32_t *) ctx->in);
|
||||||
|
byteReverse((unsigned char *) ctx->buf, 4);
|
||||||
|
memcpy(digest, ctx->buf, HASH_LEN);
|
||||||
|
memset(ctx, 0, sizeof(ctx));
|
||||||
|
/* In case it's sensitive */
|
||||||
|
}
|
||||||
|
|
||||||
|
/* The four core functions - F1 is optimized somewhat */
|
||||||
|
|
||||||
|
/* #define F1(x, y, z) (x & y | ~x & z) */
|
||||||
|
# define F1(x, y, z) (z ^ (x & (y ^ z)))
|
||||||
|
# define F2(x, y, z) F1(z, x, y)
|
||||||
|
# define F3(x, y, z) (x ^ y ^ z)
|
||||||
|
# define F4(x, y, z) (y ^ (x | ~z))
|
||||||
|
|
||||||
|
/* This is the central step in the MD5 algorithm. */
|
||||||
|
# define MD5STEP(f, w, x, y, z, data, s) ( w += f(x, y, z) + data, w = (w<<s) | (w>>(32-s)), w += x )
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The core of the MD5 algorithm, this alters an existing MD5 hash to
|
||||||
|
* reflect the addition of 16 longwords of new data. MD5Update blocks
|
||||||
|
* the data and converts bytes into longwords for this routine.
|
||||||
|
*/
|
||||||
|
static void MD5Transform(uint32_t buf[4], uint32_t const in[HASH_LEN])
|
||||||
|
{
|
||||||
|
register uint32_t a, b, c, d;
|
||||||
|
|
||||||
|
a = buf[0];
|
||||||
|
b = buf[1];
|
||||||
|
c = buf[2];
|
||||||
|
d = buf[3];
|
||||||
|
|
||||||
|
MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
|
||||||
|
MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
|
||||||
|
MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
|
||||||
|
MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22);
|
||||||
|
MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7);
|
||||||
|
MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12);
|
||||||
|
MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17);
|
||||||
|
MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22);
|
||||||
|
MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7);
|
||||||
|
MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12);
|
||||||
|
MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
|
||||||
|
MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22);
|
||||||
|
MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7);
|
||||||
|
MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12);
|
||||||
|
MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17);
|
||||||
|
MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22);
|
||||||
|
|
||||||
|
MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
|
||||||
|
MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
|
||||||
|
MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
|
||||||
|
MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
|
||||||
|
MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
|
||||||
|
MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
|
||||||
|
MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
|
||||||
|
MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
|
||||||
|
MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
|
||||||
|
MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
|
||||||
|
MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
|
||||||
|
MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
|
||||||
|
MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
|
||||||
|
MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
|
||||||
|
MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
|
||||||
|
MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
|
||||||
|
|
||||||
|
MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4);
|
||||||
|
MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11);
|
||||||
|
MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
|
||||||
|
MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23);
|
||||||
|
MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4);
|
||||||
|
MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11);
|
||||||
|
MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16);
|
||||||
|
MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
|
||||||
|
MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
|
||||||
|
MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11);
|
||||||
|
MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16);
|
||||||
|
MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23);
|
||||||
|
MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4);
|
||||||
|
MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
|
||||||
|
MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
|
||||||
|
MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23);
|
||||||
|
|
||||||
|
MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6);
|
||||||
|
MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10);
|
||||||
|
MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15);
|
||||||
|
MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21);
|
||||||
|
MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6);
|
||||||
|
MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10);
|
||||||
|
MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15);
|
||||||
|
MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21);
|
||||||
|
MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6);
|
||||||
|
MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
|
||||||
|
MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15);
|
||||||
|
MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
|
||||||
|
MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6);
|
||||||
|
MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10);
|
||||||
|
MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15);
|
||||||
|
MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21);
|
||||||
|
|
||||||
|
buf[0] += a;
|
||||||
|
buf[1] += b;
|
||||||
|
buf[2] += c;
|
||||||
|
buf[3] += d;
|
||||||
|
}
|
||||||
|
|
24
src/md5.h
Normal file
24
src/md5.h
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
#ifndef __MD5_H__
|
||||||
|
#define __MD5_H__
|
||||||
|
|
||||||
|
#include "config.h"
|
||||||
|
#include "compat.h"
|
||||||
|
|
||||||
|
#define HASH_LEN 16
|
||||||
|
|
||||||
|
struct MD5Context
|
||||||
|
{
|
||||||
|
uint32_t buf[4];
|
||||||
|
uint32_t bits[2];
|
||||||
|
unsigned char in[64];
|
||||||
|
};
|
||||||
|
|
||||||
|
void MD5Init(struct MD5Context *context);
|
||||||
|
void MD5Update(struct MD5Context *context, unsigned char const *buf,
|
||||||
|
unsigned len);
|
||||||
|
void MD5Final(unsigned char digest[HASH_LEN], struct MD5Context *context);
|
||||||
|
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
|
|
@ -227,7 +227,7 @@ static void *_slave_thread(void *arg) {
|
|||||||
|
|
||||||
while(relay) {
|
while(relay) {
|
||||||
avl_tree_rlock(global.source_tree);
|
avl_tree_rlock(global.source_tree);
|
||||||
if(!source_find_mount(relay->localmount)) {
|
if(!source_find_mount_raw(relay->localmount)) {
|
||||||
avl_tree_unlock(global.source_tree);
|
avl_tree_unlock(global.source_tree);
|
||||||
|
|
||||||
create_relay_stream(relay->server, relay->port, relay->mount,
|
create_relay_stream(relay->server, relay->port, relay->mount,
|
||||||
|
166
src/source.c
166
src/source.c
@ -37,10 +37,13 @@
|
|||||||
#endif
|
#endif
|
||||||
#include "source.h"
|
#include "source.h"
|
||||||
#include "format.h"
|
#include "format.h"
|
||||||
|
#include "auth.h"
|
||||||
|
|
||||||
#undef CATMODULE
|
#undef CATMODULE
|
||||||
#define CATMODULE "source"
|
#define CATMODULE "source"
|
||||||
|
|
||||||
|
#define MAX_FALLBACK_DEPTH 10
|
||||||
|
|
||||||
/* avl tree helper */
|
/* avl tree helper */
|
||||||
static int _compare_clients(void *compare_arg, void *a, void *b);
|
static int _compare_clients(void *compare_arg, void *a, void *b);
|
||||||
static int _free_client(void *key);
|
static int _free_client(void *key);
|
||||||
@ -70,6 +73,8 @@ source_t *source_create(client_t *client, connection_t *con,
|
|||||||
src->dumpfile = NULL;
|
src->dumpfile = NULL;
|
||||||
src->audio_info = util_dict_new();
|
src->audio_info = util_dict_new();
|
||||||
src->yp_public = 0;
|
src->yp_public = 0;
|
||||||
|
src->fallback_override = 0;
|
||||||
|
src->no_mount = 0;
|
||||||
|
|
||||||
if(mountinfo != NULL) {
|
if(mountinfo != NULL) {
|
||||||
if (mountinfo->fallback_mount != NULL)
|
if (mountinfo->fallback_mount != NULL)
|
||||||
@ -77,6 +82,11 @@ source_t *source_create(client_t *client, connection_t *con,
|
|||||||
src->max_listeners = mountinfo->max_listeners;
|
src->max_listeners = mountinfo->max_listeners;
|
||||||
if (mountinfo->dumpfile != NULL)
|
if (mountinfo->dumpfile != NULL)
|
||||||
src->dumpfilename = strdup (mountinfo->dumpfile);
|
src->dumpfilename = strdup (mountinfo->dumpfile);
|
||||||
|
if(mountinfo->auth_type != NULL)
|
||||||
|
src->authenticator = auth_get_authenticator(
|
||||||
|
mountinfo->auth_type, mountinfo->auth_options);
|
||||||
|
src->fallback_override = mountinfo->fallback_override;
|
||||||
|
src->no_mount = mountinfo->no_mount;
|
||||||
}
|
}
|
||||||
|
|
||||||
if(src->dumpfilename != NULL) {
|
if(src->dumpfilename != NULL) {
|
||||||
@ -95,10 +105,10 @@ static int source_remove_source(void *key)
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* you must already have a read lock on the global source tree
|
/* Find a mount with this raw name - ignoring fallbacks. You should have the
|
||||||
** to call this function
|
* global source tree locked to call this.
|
||||||
*/
|
*/
|
||||||
source_t *source_find_mount(const char *mount)
|
source_t *source_find_mount_raw(const char *mount)
|
||||||
{
|
{
|
||||||
source_t *source;
|
source_t *source;
|
||||||
avl_node *node;
|
avl_node *node;
|
||||||
@ -125,6 +135,56 @@ source_t *source_find_mount(const char *mount)
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static source_t *source_find_mount_recursive(const char *mount, int depth)
|
||||||
|
{
|
||||||
|
source_t *source = source_find_mount_raw(mount);
|
||||||
|
mount_proxy *mountinfo;
|
||||||
|
ice_config_t *config;
|
||||||
|
char *fallback_mount;
|
||||||
|
|
||||||
|
if(source == NULL) {
|
||||||
|
if(depth > MAX_FALLBACK_DEPTH)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
/* Look for defined mounts to find a fallback source */
|
||||||
|
|
||||||
|
config = config_get_config();
|
||||||
|
mountinfo = config->mounts;
|
||||||
|
thread_mutex_lock(&(config_locks()->mounts_lock));
|
||||||
|
config_release_config();
|
||||||
|
|
||||||
|
while(mountinfo) {
|
||||||
|
if(!strcmp(mountinfo->mountname, mount))
|
||||||
|
break;
|
||||||
|
mountinfo = mountinfo->next;
|
||||||
|
}
|
||||||
|
|
||||||
|
if(mountinfo)
|
||||||
|
fallback_mount = mountinfo->fallback_mount;
|
||||||
|
else
|
||||||
|
fallback_mount = NULL;
|
||||||
|
|
||||||
|
thread_mutex_unlock(&(config_locks()->mounts_lock));
|
||||||
|
|
||||||
|
if(fallback_mount != NULL) {
|
||||||
|
return source_find_mount_recursive(mount, depth+1);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return source;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* you must already have a read lock on the global source tree
|
||||||
|
** to call this function
|
||||||
|
*/
|
||||||
|
source_t *source_find_mount(const char *mount)
|
||||||
|
{
|
||||||
|
if (!mount)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
return source_find_mount_recursive(mount, 0);
|
||||||
|
}
|
||||||
|
|
||||||
int source_compare_sources(void *arg, void *a, void *b)
|
int source_compare_sources(void *arg, void *a, void *b)
|
||||||
{
|
{
|
||||||
source_t *srca = (source_t *)a;
|
source_t *srca = (source_t *)a;
|
||||||
@ -192,7 +252,6 @@ void *source_main(void *arg)
|
|||||||
refbuf_t *refbuf, *abuf;
|
refbuf_t *refbuf, *abuf;
|
||||||
int data_done;
|
int data_done;
|
||||||
|
|
||||||
int listeners = 0;
|
|
||||||
#ifdef USE_YP
|
#ifdef USE_YP
|
||||||
char *s;
|
char *s;
|
||||||
long current_time;
|
long current_time;
|
||||||
@ -236,7 +295,7 @@ void *source_main(void *arg)
|
|||||||
/* Now, we must do a final check with write lock taken out that the
|
/* Now, we must do a final check with write lock taken out that the
|
||||||
* mountpoint is available..
|
* mountpoint is available..
|
||||||
*/
|
*/
|
||||||
if (source_find_mount(source->mount) != NULL) {
|
if (source_find_mount_raw(source->mount) != NULL) {
|
||||||
avl_tree_unlock(global.source_tree);
|
avl_tree_unlock(global.source_tree);
|
||||||
if(source->send_return) {
|
if(source->send_return) {
|
||||||
client_send_404(source->client, "Mountpoint in use");
|
client_send_404(source->client, "Mountpoint in use");
|
||||||
@ -353,6 +412,51 @@ void *source_main(void *arg)
|
|||||||
|
|
||||||
DEBUG0("Source creation complete");
|
DEBUG0("Source creation complete");
|
||||||
|
|
||||||
|
/*
|
||||||
|
** Now, if we have a fallback source and override is on, we want
|
||||||
|
** to steal it's clients, because it means we've come back online
|
||||||
|
** after a failure and they should be gotten back from the waiting
|
||||||
|
** loop or jingle track or whatever the fallback is used for
|
||||||
|
*/
|
||||||
|
|
||||||
|
if(source->fallback_override && source->fallback_mount) {
|
||||||
|
avl_tree_rlock(global.source_tree);
|
||||||
|
fallback_source = source_find_mount(source->fallback_mount);
|
||||||
|
avl_tree_unlock(global.source_tree);
|
||||||
|
|
||||||
|
if(fallback_source) {
|
||||||
|
/* we need to move the client and pending trees */
|
||||||
|
avl_tree_wlock(fallback_source->pending_tree);
|
||||||
|
while (avl_get_first(fallback_source->pending_tree)) {
|
||||||
|
client_t *client = (client_t *)avl_get_first(
|
||||||
|
fallback_source->pending_tree)->key;
|
||||||
|
avl_delete(fallback_source->pending_tree, client,
|
||||||
|
source_remove_client);
|
||||||
|
|
||||||
|
/* TODO: reset client local format data? */
|
||||||
|
avl_tree_wlock(source->pending_tree);
|
||||||
|
avl_insert(source->pending_tree, (void *)client);
|
||||||
|
avl_tree_unlock(source->pending_tree);
|
||||||
|
}
|
||||||
|
avl_tree_unlock(fallback_source->pending_tree);
|
||||||
|
|
||||||
|
avl_tree_wlock(fallback_source->client_tree);
|
||||||
|
while (avl_get_first(fallback_source->client_tree)) {
|
||||||
|
client_t *client = (client_t *)avl_get_first(
|
||||||
|
fallback_source->client_tree)->key;
|
||||||
|
|
||||||
|
avl_delete(fallback_source->client_tree, client,
|
||||||
|
source_remove_client);
|
||||||
|
|
||||||
|
/* TODO: reset client local format data? */
|
||||||
|
avl_tree_wlock(source->pending_tree);
|
||||||
|
avl_insert(source->pending_tree, (void *)client);
|
||||||
|
avl_tree_unlock(source->pending_tree);
|
||||||
|
}
|
||||||
|
avl_tree_unlock(fallback_source->client_tree);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
while (global.running == ICE_RUNNING && source->running) {
|
while (global.running == ICE_RUNNING && source->running) {
|
||||||
ret = source->format->get_buffer(source->format, NULL, 0, &refbuf);
|
ret = source->format->get_buffer(source->format, NULL, 0, &refbuf);
|
||||||
if(ret < 0) {
|
if(ret < 0) {
|
||||||
@ -375,7 +479,9 @@ void *source_main(void *arg)
|
|||||||
}
|
}
|
||||||
|
|
||||||
bytes = sock_read_bytes(source->con->sock, buffer, 4096);
|
bytes = sock_read_bytes(source->con->sock, buffer, 4096);
|
||||||
if (bytes == 0 || (bytes < 0 && !sock_recoverable(sock_error()))) {
|
if (bytes == 0 ||
|
||||||
|
(bytes < 0 && !sock_recoverable(sock_error())))
|
||||||
|
{
|
||||||
DEBUG1("Disconnecting source due to socket read error: %s",
|
DEBUG1("Disconnecting source due to socket read error: %s",
|
||||||
strerror(sock_error()));
|
strerror(sock_error()));
|
||||||
break;
|
break;
|
||||||
@ -383,7 +489,8 @@ void *source_main(void *arg)
|
|||||||
}
|
}
|
||||||
if (bytes <= 0) break;
|
if (bytes <= 0) break;
|
||||||
source->client->con->sent_bytes += bytes;
|
source->client->con->sent_bytes += bytes;
|
||||||
ret = source->format->get_buffer(source->format, buffer, bytes, &refbuf);
|
ret = source->format->get_buffer(source->format, buffer, bytes,
|
||||||
|
&refbuf);
|
||||||
if(ret < 0) {
|
if(ret < 0) {
|
||||||
WARN0("Bad data from source");
|
WARN0("Bad data from source");
|
||||||
goto done;
|
goto done;
|
||||||
@ -453,7 +560,8 @@ void *source_main(void *arg)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
DEBUG0("Client has unrecoverable error catching up. Client has probably disconnected");
|
DEBUG0("Client has unrecoverable error catching up. "
|
||||||
|
"Client has probably disconnected");
|
||||||
client->con->error = 1;
|
client->con->error = 1;
|
||||||
data_done = 1;
|
data_done = 1;
|
||||||
refbuf_release(abuf);
|
refbuf_release(abuf);
|
||||||
@ -483,7 +591,8 @@ void *source_main(void *arg)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
DEBUG0("Client had unrecoverable error with new data, probably due to client disconnection");
|
DEBUG0("Client had unrecoverable error with new data, "
|
||||||
|
"probably due to client disconnection");
|
||||||
client->con->error = 1;
|
client->con->error = 1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -518,9 +627,9 @@ void *source_main(void *arg)
|
|||||||
if (client->con->error) {
|
if (client->con->error) {
|
||||||
client_node = avl_get_next(client_node);
|
client_node = avl_get_next(client_node);
|
||||||
avl_delete(source->client_tree, (void *)client, _free_client);
|
avl_delete(source->client_tree, (void *)client, _free_client);
|
||||||
listeners--;
|
source->listeners--;
|
||||||
stats_event_args(source->mount, "listeners", "%d", listeners);
|
stats_event_args(source->mount, "listeners", "%d",
|
||||||
source->listeners = listeners;
|
source->listeners);
|
||||||
DEBUG0("Client removed");
|
DEBUG0("Client removed");
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
@ -533,15 +642,32 @@ void *source_main(void *arg)
|
|||||||
/** add pending clients **/
|
/** add pending clients **/
|
||||||
client_node = avl_get_first(source->pending_tree);
|
client_node = avl_get_first(source->pending_tree);
|
||||||
while (client_node) {
|
while (client_node) {
|
||||||
|
if(source->max_listeners != -1 &&
|
||||||
|
source->listeners >= source->max_listeners)
|
||||||
|
{
|
||||||
|
/* The common case is caught in the main connection handler,
|
||||||
|
* this deals with rarer cases (mostly concerning fallbacks)
|
||||||
|
* and doesn't give the listening client any information about
|
||||||
|
* why they were disconnected
|
||||||
|
*/
|
||||||
|
client = (client_t *)client_node->key;
|
||||||
|
client_node = avl_get_next(client_node);
|
||||||
|
avl_delete(source->pending_tree, (void *)client, _free_client);
|
||||||
|
|
||||||
|
INFO0("Client deleted, exceeding maximum listeners for this "
|
||||||
|
"mountpoint.");
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Otherwise, the client is accepted, add it */
|
||||||
avl_insert(source->client_tree, client_node->key);
|
avl_insert(source->client_tree, client_node->key);
|
||||||
/* listener count may have changed */
|
|
||||||
listeners = source->listeners;
|
source->listeners++;
|
||||||
listeners++;
|
|
||||||
DEBUG0("Client added");
|
DEBUG0("Client added");
|
||||||
stats_event_inc(NULL, "clients");
|
stats_event_inc(NULL, "clients");
|
||||||
stats_event_inc(source->mount, "connections");
|
stats_event_inc(source->mount, "connections");
|
||||||
stats_event_args(source->mount, "listeners", "%d", listeners);
|
stats_event_args(source->mount, "listeners", "%d",
|
||||||
source->listeners = listeners;
|
source->listeners);
|
||||||
|
|
||||||
/* we have to send cached headers for some data formats
|
/* we have to send cached headers for some data formats
|
||||||
** this is where we queue up the buffers to send
|
** this is where we queue up the buffers to send
|
||||||
@ -556,7 +682,9 @@ void *source_main(void *arg)
|
|||||||
|
|
||||||
/** clear pending tree **/
|
/** clear pending tree **/
|
||||||
while (avl_get_first(source->pending_tree)) {
|
while (avl_get_first(source->pending_tree)) {
|
||||||
avl_delete(source->pending_tree, avl_get_first(source->pending_tree)->key, source_remove_client);
|
avl_delete(source->pending_tree,
|
||||||
|
avl_get_first(source->pending_tree)->key,
|
||||||
|
source_remove_client);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* release write lock on pending_tree */
|
/* release write lock on pending_tree */
|
||||||
|
@ -8,6 +8,8 @@
|
|||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
|
|
||||||
|
struct auth_tag;
|
||||||
|
|
||||||
typedef struct source_tag
|
typedef struct source_tag
|
||||||
{
|
{
|
||||||
client_t *client;
|
client_t *client;
|
||||||
@ -40,12 +42,16 @@ typedef struct source_tag
|
|||||||
long max_listeners;
|
long max_listeners;
|
||||||
int yp_public;
|
int yp_public;
|
||||||
int send_return;
|
int send_return;
|
||||||
|
struct auth_tag *authenticator;
|
||||||
|
int fallback_override;
|
||||||
|
int no_mount;
|
||||||
} source_t;
|
} source_t;
|
||||||
|
|
||||||
source_t *source_create(client_t *client, connection_t *con,
|
source_t *source_create(client_t *client, connection_t *con,
|
||||||
http_parser_t *parser, const char *mount, format_type_t type,
|
http_parser_t *parser, const char *mount, format_type_t type,
|
||||||
mount_proxy *mountinfo);
|
mount_proxy *mountinfo);
|
||||||
source_t *source_find_mount(const char *mount);
|
source_t *source_find_mount(const char *mount);
|
||||||
|
source_t *source_find_mount_raw(const char *mount);
|
||||||
client_t *source_find_client(source_t *source, int id);
|
client_t *source_find_client(source_t *source, int id);
|
||||||
int source_compare_sources(void *arg, void *a, void *b);
|
int source_compare_sources(void *arg, void *a, void *b);
|
||||||
int source_free_source(void *key);
|
int source_free_source(void *key);
|
||||||
|
17
src/util.c
17
src/util.c
@ -220,7 +220,7 @@ char *util_get_path_from_normalised_uri(char *uri) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
static char hexchars[16] = {
|
static char hexchars[16] = {
|
||||||
'0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F'
|
'0','1','2','3','4','5','6','7','8','9','a','b','c','d','e','f'
|
||||||
};
|
};
|
||||||
|
|
||||||
static char safechars[256] = {
|
static char safechars[256] = {
|
||||||
@ -368,6 +368,21 @@ static signed char base64decode[256] = {
|
|||||||
-2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2
|
-2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2, -2
|
||||||
};
|
};
|
||||||
|
|
||||||
|
char *util_bin_to_hex(unsigned char *data, int len)
|
||||||
|
{
|
||||||
|
char *hex = malloc(len*2 + 1);
|
||||||
|
int i;
|
||||||
|
|
||||||
|
for(i = 0; i < len; i++) {
|
||||||
|
hex[i*2] = hexchars[(data[i]&0xf0) >> 4];
|
||||||
|
hex[i*2+1] = hexchars[data[i]&0x0f];
|
||||||
|
}
|
||||||
|
|
||||||
|
hex[len*2] = 0;
|
||||||
|
|
||||||
|
return hex;
|
||||||
|
}
|
||||||
|
|
||||||
/* This isn't efficient, but it doesn't need to be */
|
/* This isn't efficient, but it doesn't need to be */
|
||||||
char *util_base64_encode(char *data)
|
char *util_base64_encode(char *data)
|
||||||
{
|
{
|
||||||
|
@ -13,6 +13,7 @@ char *util_get_path_from_normalised_uri(char *uri);
|
|||||||
char *util_normalise_uri(char *uri);
|
char *util_normalise_uri(char *uri);
|
||||||
char *util_base64_encode(char *data);
|
char *util_base64_encode(char *data);
|
||||||
char *util_base64_decode(unsigned char *input);
|
char *util_base64_decode(unsigned char *input);
|
||||||
|
char *util_bin_to_hex(unsigned char *data, int len);
|
||||||
|
|
||||||
char *util_url_unescape(char *src);
|
char *util_url_unescape(char *src);
|
||||||
char *util_url_escape(char *src);
|
char *util_url_escape(char *src);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user