1
0
mirror of https://gitlab.xiph.org/xiph/icecast-server.git synced 2024-12-04 14:46:30 -05:00
Commit Graph

2497 Commits

Author SHA1 Message Date
Philipp Schafft
5a5a1ceb9a Fix: Fixed clients in body queue running in undetected EOFs
Thanks to Jordan Erickson
2023-07-26 03:47:55 +00:00
Philipp Schafft
43a8c04134 Feature: Added UUID interpolation for dump files 2023-06-30 17:24:08 +00:00
Philipp Schafft
5cf8cb9a99 Fix: Fixed memory leak on legacy config style
Closes: #2473
2023-06-22 10:38:18 +00:00
Philipp Schafft
5cad25a180 Update: Avoid logging in signal handler
See also: #2472
2023-06-22 10:13:37 +00:00
Philipp Schafft
86635ee700 Fix: Avoid breaking windows port
Windows understands FD_SETSIZE as POSIX does but unlike Linux (and likely
*BSD) does. While Linux uses the value to mark the highest value of a
filehandle, Windows understands it as the number of handles.
2023-06-11 20:10:04 +00:00
Philipp Schafft
2357cca098 Feature: Report sizeof(fd_set) in version display 2023-06-11 20:09:31 +00:00
Philipp Schafft
6baae8267e Fix: Handle exec() in a better way avoiding dead locks 2023-06-04 10:41:33 +00:00
Philipp Schafft
c4ea726db5 Feature: Added checks for more functions which may become useful in the future versions 2023-06-04 09:12:13 +00:00
Philipp Schafft
9a2e911bee Cleanup: Corrected formatting 2023-06-04 08:57:57 +00:00
Philipp Schafft
d42646541c Fix: Remove locking from signal handler
See also: #2472
2023-06-03 19:30:59 +00:00
Philipp Schafft
00f8e94257 Feature: Added -V verbose version output 2023-06-03 18:43:01 +00:00
Philipp Schafft
25651556f0 Cleanup: Removed legacy digest.[ch] 2023-06-01 12:32:17 +00:00
Philipp Schafft
1ef2e7ad9a Cleanup: Corrected comment on what is implemented 2023-04-18 13:32:58 +00:00
Philipp Schafft
0a7ae5073d Feature: Report source's instance UUID when known 2023-04-18 13:28:26 +00:00
Philipp Schafft
f188c5b1df Feature: Added event source-listener-attach 2023-04-18 12:15:58 +00:00
Philipp Schafft
6331270e70 Feature: Added events source-listeners-is-zero, and more generic source-listeners-changed 2023-04-18 12:00:42 +00:00
Philipp Schafft
64d380b6b6 Update: Converted url auth client remove to ping request 2023-03-20 09:41:54 +00:00
Philipp Schafft
cd25ca90e2 Update: Converted ping_simple() to take a string_renderer_t* as data 2023-03-20 09:12:09 +00:00
Philipp Schafft
cecc3e1ace Cleanup: Migrated url auth to use string renderer 2023-03-18 13:58:00 +00:00
Philipp Schafft
2e1629503c Feature: Added per-source instance UUID 2023-03-11 16:23:29 +00:00
Philipp Schafft
ee72096d99 Update: Migrated event_t, and event_registration_t to be a igloo ro object 2023-03-11 16:23:29 +00:00
Philipp Schafft
2728261b99 Fix: Corrected copy & paste error 2023-03-11 16:23:23 +00:00
Philipp Schafft
28b4ff2d55 Merge branch 'feature-ping' into devel 2023-03-04 11:54:39 +00:00
Philipp Schafft
a27a97012f Update: Replaced sleep with a condition wait in ping thread 2023-03-04 11:49:54 +00:00
Philipp Schafft
8a308f2e12 Feature: Use ping requests for URL events 2023-03-04 11:49:51 +00:00
Philipp Schafft
4cea6372ac Cleanup: Simplified URL event credential code 2023-03-04 11:49:48 +00:00
Philipp Schafft
3c352746ab Feature: Added basic ping request support 2023-03-04 11:49:46 +00:00
Philipp Schafft
91ea5d0f79 Feature: Added most basic ping infrastructure 2023-03-04 11:49:44 +00:00
Philipp Schafft
53055aafd7 Update: Made ping depend on CURL support 2023-03-04 11:49:39 +00:00
Philipp Schafft
e3f9f5b078 Feature: Added stub for ping requests 2023-03-04 11:49:31 +00:00
Philipp Schafft
be51075975 Fix: Typo 2023-03-04 11:45:35 +00:00
Philipp Schafft
44566499ef Feature: Announce server-instance in URL events and auth 2023-02-27 11:52:54 +00:00
Philipp Schafft
d7f401e36c Merge branch 'update-password-hash' into devel
Closes: #2010
2023-02-21 23:39:50 +00:00
Philipp Schafft
4d9094096a Feature: Report on dashboard if no secure password hashing is supported
See also: #2010
2023-02-21 23:38:57 +00:00
Philipp Schafft
0ef660bcde Feature: Use more modern algo for password store
Closes: #2010
2023-02-21 23:38:53 +00:00
Philipp Schafft
f2b3814b57 Update: Added test vectors for crypt types 3, 7, md5, sha1, y, and gy 2023-02-21 17:03:17 +00:00
Philipp Schafft
4105bded13 Feature: Report what crypt types are supported on the admin version page 2023-02-21 14:31:25 +00:00
Philipp Schafft
468bd425d5 Feature: Added support for hashed passwords to auth_static 2023-02-21 14:31:25 +00:00
Philipp Schafft
49fa3dafed Feature: Support calls to the system crypt()/crypt_r() for hased passwords 2023-02-21 14:31:25 +00:00
Philipp Schafft
f5a807a456 Update: Improved check for crypt(), crypt_r() 2023-02-21 14:31:25 +00:00
Philipp Schafft
c1748ac7fa Update: Check for crypt_r()/crypt() 2023-02-21 14:31:25 +00:00
Philipp Schafft
898d38768c Cleanup: Replaced final bit of MD5 code with something nice
This replaces the MD5 related code with something that is much nicer:
The new code consists of util_crypt_hash() that can be used to hash
a password and util_crypt_check() which is used to check the password
taking into account options and salts.
2023-02-21 14:31:25 +00:00
Philipp Schafft
f1c32d7bf4 Cleanup: Replaced the MD5 code with librhash
This cleanup removes our own implementation of MD5.
librhash is a hard dependency of libigloo which we also hard
depend on. So it is safe to assume it is always there.

More cleanup should be done once support for more algos for
htpasswd has been implemented.
2023-02-21 14:31:25 +00:00
Philipp Schafft
9b758ca65c Cleanup: Inlined strlen() into get_hash() as it is the only way get_hash() is ever called 2023-02-21 14:31:25 +00:00
Philipp Schafft
c7c4a63b66 Update: Added tests for MD5 handling code 2023-02-21 14:31:25 +00:00
Philipp Schafft
f741bd131d Update: Added librhash as dependency 2023-02-21 14:31:25 +00:00
Philipp Schafft
206c66d4b2 Update: Workaround for unsafe select(2)
When select(2) is used we only support as many file handles as
there is space in fd_set. The limit is given in FD_SETSIZE.
Once we use filehandles with an value >= FD_SETSIZE we might
end up corrupting memory. Therefore we try to avoid those calls
by rejecting handles >= FD_SETSIZE very early.

This patch should keep most problems away. However it does not
actually ensure we don't corrupt memory. That check has been skipped
for performance reasons. Keeping in mind that the use of select(2)
is already deprecated.
2023-02-21 14:31:10 +00:00
Philipp Schafft
bf6da896de Feature: Added instance UUID 2023-02-12 18:22:23 +00:00
Philipp Schafft
64df027bee Update: Require libigloo >= 0.9.2 to enforce security updates 2023-02-12 18:22:08 +00:00
Philipp Schafft
79d16e9b21 Cleanup: Corrected code style 2023-01-30 10:16:18 +00:00