/* Icecast * * This program is distributed under the GNU General Public License, version 2. * A copy of this license is included with this source. * * Copyright 2000-2004, Jack Moffitt , * oddsock , * Karl Heyes * and others (see AUTHORS for details). * Copyright 2012-2018, Philipp "ph3-der-loewe" Schafft , */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #include "cfgfile.h" #include "connection.h" #include "refbuf.h" #include "client.h" #include "source.h" #include "global.h" #include "stats.h" #include "compat.h" #include "xslt.h" #include "fserve.h" #include "admin.h" #include "errors.h" #include "format.h" #include "logging.h" #include "auth.h" #include "acl.h" #ifdef _WIN32 #define snprintf _snprintf #endif #define CATMODULE "admin" #define ADMIN_MAX_COMMAND_TABLES 8 /* Helper macros */ #define COMMAND_REQUIRE(client,name,var) \ do { \ (var) = httpp_get_query_param((client)->parser, (name)); \ if((var) == NULL) { \ client_send_error_by_id(client, ICECAST_ERROR_ADMIN_MISSING_PARAMETER); \ return; \ } \ } while(0); #define COMMAND_OPTIONAL(client,name,var) \ (var) = httpp_get_query_param((client)->parser, (name)) /* special commands */ #define COMMAND_ERROR ADMIN_COMMAND_ERROR #define COMMAND_ANY ADMIN_COMMAND_ANY #define FALLBACK_RAW_REQUEST "fallbacks" #define FALLBACK_TRANSFORMED_REQUEST "fallbacks.xsl" #define SHOUTCAST_METADATA_REQUEST "admin.cgi" #define METADATA_RAW_REQUEST "metadata" #define METADATA_TRANSFORMED_REQUEST "metadata.xsl" #define LISTCLIENTS_RAW_REQUEST "listclients" #define LISTCLIENTS_TRANSFORMED_REQUEST "listclients.xsl" #define STATS_RAW_REQUEST "stats" #define STATS_TRANSFORMED_REQUEST "stats.xsl" #define QUEUE_RELOAD_RAW_REQUEST "reloadconfig" #define QUEUE_RELOAD_TRANSFORMED_REQUEST "reloadconfig.xsl" #define LISTMOUNTS_RAW_REQUEST "listmounts" #define LISTMOUNTS_TRANSFORMED_REQUEST "listmounts.xsl" #define STREAMLIST_RAW_REQUEST "streamlist" #define STREAMLIST_TRANSFORMED_REQUEST "streamlist.xsl" #define STREAMLIST_PLAINTEXT_REQUEST "streamlist.txt" #define MOVECLIENTS_RAW_REQUEST "moveclients" #define MOVECLIENTS_TRANSFORMED_REQUEST "moveclients.xsl" #define KILLCLIENT_RAW_REQUEST "killclient" #define KILLCLIENT_TRANSFORMED_REQUEST "killclient.xsl" #define KILLSOURCE_RAW_REQUEST "killsource" #define KILLSOURCE_TRANSFORMED_REQUEST "killsource.xsl" #define ADMIN_XSL_RESPONSE "response.xsl" #define MANAGEAUTH_RAW_REQUEST "manageauth" #define MANAGEAUTH_TRANSFORMED_REQUEST "manageauth.xsl" #define UPDATEMETADATA_RAW_REQUEST "updatemetadata" #define UPDATEMETADATA_TRANSFORMED_REQUEST "updatemetadata.xsl" #define DEFAULT_RAW_REQUEST "" #define DEFAULT_TRANSFORMED_REQUEST "" #define BUILDM3U_RAW_REQUEST "buildm3u" typedef struct { const char *prefix; size_t length; const admin_command_handler_t *handlers; } admin_command_table_t; static void command_fallback (client_t *client, source_t *source, admin_format_t response); static void command_metadata (client_t *client, source_t *source, admin_format_t response); static void command_shoutcast_metadata (client_t *client, source_t *source, admin_format_t response); static void command_show_listeners (client_t *client, source_t *source, admin_format_t response); static void command_stats (client_t *client, source_t *source, admin_format_t response); static void command_queue_reload (client_t *client, source_t *source, admin_format_t response); static void command_list_mounts (client_t *client, source_t *source, admin_format_t response); static void command_move_clients (client_t *client, source_t *source, admin_format_t response); static void command_kill_client (client_t *client, source_t *source, admin_format_t response); static void command_kill_source (client_t *client, source_t *source, admin_format_t response); static void command_manageauth (client_t *client, source_t *source, admin_format_t response); static void command_updatemetadata (client_t *client, source_t *source, admin_format_t response); static void command_buildm3u (client_t *client, source_t *source, admin_format_t response); static const admin_command_handler_t handlers[] = { { "*", ADMINTYPE_GENERAL, ADMIN_FORMAT_TRANSFORMED, NULL }, /* for ACL framework */ { FALLBACK_RAW_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_RAW, command_fallback }, { FALLBACK_TRANSFORMED_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_TRANSFORMED, command_fallback }, { METADATA_RAW_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_RAW, command_metadata }, { METADATA_TRANSFORMED_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_TRANSFORMED, command_metadata }, { SHOUTCAST_METADATA_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_TRANSFORMED, command_shoutcast_metadata }, { LISTCLIENTS_RAW_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_RAW, command_show_listeners }, { LISTCLIENTS_TRANSFORMED_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_TRANSFORMED, command_show_listeners }, { STATS_RAW_REQUEST, ADMINTYPE_HYBRID, ADMIN_FORMAT_RAW, command_stats }, { STATS_TRANSFORMED_REQUEST, ADMINTYPE_HYBRID, ADMIN_FORMAT_TRANSFORMED, command_stats }, { "stats.xml", ADMINTYPE_HYBRID, ADMIN_FORMAT_RAW, command_stats }, { QUEUE_RELOAD_RAW_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_RAW, command_queue_reload }, { QUEUE_RELOAD_TRANSFORMED_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_TRANSFORMED, command_queue_reload }, { LISTMOUNTS_RAW_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_RAW, command_list_mounts }, { LISTMOUNTS_TRANSFORMED_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_TRANSFORMED, command_list_mounts }, { STREAMLIST_RAW_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_RAW, command_list_mounts }, { STREAMLIST_PLAINTEXT_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_PLAINTEXT, command_list_mounts }, { STREAMLIST_TRANSFORMED_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_TRANSFORMED, command_list_mounts }, { MOVECLIENTS_RAW_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_RAW, command_move_clients }, { MOVECLIENTS_TRANSFORMED_REQUEST, ADMINTYPE_HYBRID, ADMIN_FORMAT_TRANSFORMED, command_move_clients }, { KILLCLIENT_RAW_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_RAW, command_kill_client }, { KILLCLIENT_TRANSFORMED_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_TRANSFORMED, command_kill_client }, { KILLSOURCE_RAW_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_RAW, command_kill_source }, { KILLSOURCE_TRANSFORMED_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_TRANSFORMED, command_kill_source }, { MANAGEAUTH_RAW_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_RAW, command_manageauth }, { MANAGEAUTH_TRANSFORMED_REQUEST, ADMINTYPE_GENERAL, ADMIN_FORMAT_TRANSFORMED, command_manageauth }, { UPDATEMETADATA_RAW_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_RAW, command_updatemetadata }, { UPDATEMETADATA_TRANSFORMED_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_TRANSFORMED, command_updatemetadata }, { BUILDM3U_RAW_REQUEST, ADMINTYPE_MOUNT, ADMIN_FORMAT_RAW, command_buildm3u }, { DEFAULT_TRANSFORMED_REQUEST, ADMINTYPE_HYBRID, ADMIN_FORMAT_TRANSFORMED, command_stats }, { DEFAULT_RAW_REQUEST, ADMINTYPE_HYBRID, ADMIN_FORMAT_TRANSFORMED, command_stats } }; static admin_command_table_t command_tables[ADMIN_MAX_COMMAND_TABLES] = { {.prefix = NULL, .length = (sizeof(handlers)/sizeof(*handlers)), .handlers = handlers}, }; static inline int __is_command_table_valid(const admin_command_table_t * table) { if (table == NULL) return 0; if (table->length == 0 || table->handlers == NULL) return 0; return 1; } static inline const admin_command_table_t * admin_get_table(admin_command_id_t command) { size_t t = (command & 0x00FF0000) >> 16; if (t >= (sizeof(command_tables)/sizeof(*command_tables))) return NULL; if (!__is_command_table_valid(&(command_tables[t]))) return NULL; return &(command_tables[t]); } static inline const admin_command_table_t * admin_get_table_by_prefix(const char *command) { const char *end; size_t i; size_t len; end = strchr(command, '/'); if (end == NULL) { for (i = 0; i < (sizeof(command_tables)/sizeof(*command_tables)); i++) if (command_tables[i].prefix == NULL && __is_command_table_valid(&(command_tables[i]))) return &(command_tables[i]); return NULL; } len = end - command; for (i = 0; i < (sizeof(command_tables)/sizeof(*command_tables)); i++) { if (!__is_command_table_valid(&(command_tables[i]))) continue; if (command_tables[i].prefix != NULL && strlen(command_tables[i].prefix) == len && strncmp(command_tables[i].prefix, command, len) == 0) { return &(command_tables[i]); } } return NULL; } static inline admin_command_id_t admin_get_command_by_table_and_index(const admin_command_table_t *table, size_t index) { size_t t = table - command_tables; if (t >= (sizeof(command_tables)/sizeof(*command_tables))) return ADMIN_COMMAND_ERROR; if (index > 0x0FFFF) return ADMIN_COMMAND_ERROR; if (!__is_command_table_valid(table)) return ADMIN_COMMAND_ERROR; return (t << 16) | index; } static inline size_t admin_get_index_by_command(admin_command_id_t command) { return command & 0x0FFFF; } admin_command_id_t admin_get_command(const char *command) { size_t i; const admin_command_table_t *table = admin_get_table_by_prefix(command); const char *suffix; if (table == NULL) return COMMAND_ERROR; suffix = strchr(command, '/'); if (suffix != NULL) { suffix++; } else { suffix = command; } for (i = 0; i < table->length; i++) if (strcmp(table->handlers[i].route, suffix) == 0) return admin_get_command_by_table_and_index(table, i); return COMMAND_ERROR; } /* Get the command handler for command or NULL */ const admin_command_handler_t* admin_get_handler(admin_command_id_t command) { const admin_command_table_t *table = admin_get_table(command); size_t index = admin_get_index_by_command(command); if (table == NULL) return NULL; if (index >= table->length) return NULL; return &(table->handlers[index]); } /* Get the command type for command * If the command is invalid, ADMINTYPE_ERROR is returned. */ int admin_get_command_type(admin_command_id_t command) { const admin_command_handler_t* handler = admin_get_handler(command); if (handler != NULL) return handler->type; return ADMINTYPE_ERROR; } int admin_command_table_register(const char *prefix, size_t handlers_length, const admin_command_handler_t *handlers) { size_t i; if (prefix == NULL || handlers_length == 0 || handlers == NULL) return -1; for (i = 0; i < (sizeof(command_tables)/sizeof(*command_tables)); i++) { if (__is_command_table_valid(&(command_tables[i]))) continue; command_tables[i].prefix = prefix; command_tables[i].length = handlers_length; command_tables[i].handlers = handlers; return 0; } return -1; } int admin_command_table_unregister(const char *prefix) { size_t i; for (i = 0; i < (sizeof(command_tables)/sizeof(*command_tables)); i++) { if (command_tables[i].prefix != NULL && strcmp(command_tables[i].prefix, prefix) == 0) { memset(&(command_tables[i]), 0, sizeof(command_tables[i])); return 0; } } return -1; } /* build an XML doc containing information about currently running sources. * If a mountpoint is passed then that source will not be added to the XML * doc even if the source is running */ xmlDocPtr admin_build_sourcelist(const char *mount) { avl_node *node; source_t *source; xmlNodePtr xmlnode, srcnode; xmlDocPtr doc; char buf[22]; time_t now = time(NULL); doc = xmlNewDoc (XMLSTR("1.0")); xmlnode = xmlNewDocNode (doc, NULL, XMLSTR("icestats"), NULL); xmlDocSetRootElement(doc, xmlnode); if (mount) { xmlNewTextChild (xmlnode, NULL, XMLSTR("current_source"), XMLSTR(mount)); } node = avl_get_first(global.source_tree); while(node) { source = (source_t *)node->key; if (mount && strcmp (mount, source->mount) == 0) { node = avl_get_next (node); continue; } if (source->running || source->on_demand) { ice_config_t *config; mount_proxy *mountinfo; acl_t *acl = NULL; srcnode = xmlNewChild(xmlnode, NULL, XMLSTR("source"), NULL); xmlSetProp(srcnode, XMLSTR("mount"), XMLSTR(source->mount)); xmlNewTextChild(srcnode, NULL, XMLSTR("fallback"), (source->fallback_mount != NULL)? XMLSTR(source->fallback_mount):XMLSTR("")); snprintf(buf, sizeof(buf), "%lu", source->listeners); xmlNewTextChild(srcnode, NULL, XMLSTR("listeners"), XMLSTR(buf)); config = config_get_config(); mountinfo = config_find_mount(config, source->mount, MOUNT_TYPE_NORMAL); if (mountinfo) acl = auth_stack_get_anonymous_acl(mountinfo->authstack, httpp_req_get); if (!acl) acl = auth_stack_get_anonymous_acl(config->authstack, httpp_req_get); if (acl && acl_test_web(acl) == ACL_POLICY_DENY) { xmlNewTextChild(srcnode, NULL, XMLSTR("authenticator"), XMLSTR("(dummy)")); } acl_release(acl); config_release_config(); if (source->running) { if (source->client) { snprintf(buf, sizeof(buf), "%lu", (unsigned long)(now - source->con->con_time)); xmlNewTextChild(srcnode, NULL, XMLSTR("Connected"), XMLSTR(buf)); } xmlNewTextChild(srcnode, NULL, XMLSTR("content-type"), XMLSTR(source->format->contenttype)); } } node = avl_get_next(node); } return(doc); } void admin_send_response(xmlDocPtr doc, client_t *client, admin_format_t response, const char *xslt_template) { if (response == ADMIN_FORMAT_RAW) { xmlChar *buff = NULL; int len = 0; size_t buf_len; ssize_t ret; xmlDocDumpMemory(doc, &buff, &len); buf_len = len + 1024; if (buf_len < 4096) buf_len = 4096; client_set_queue(client, NULL); client->refbuf = refbuf_new(buf_len); ret = util_http_build_header(client->refbuf->data, buf_len, 0, 0, 200, NULL, "text/xml", "utf-8", NULL, NULL, client); if (ret < 0) { ICECAST_LOG_ERROR("Dropping client as we can not build response headers."); client_send_error_by_id(client, ICECAST_ERROR_GEN_HEADER_GEN_FAILED); xmlFree(buff); return; } else if (buf_len < (size_t)(len + ret + 64)) { void *new_data; buf_len = ret + len + 64; new_data = realloc(client->refbuf->data, buf_len); if (new_data) { ICECAST_LOG_DEBUG("Client buffer reallocation succeeded."); client->refbuf->data = new_data; client->refbuf->len = buf_len; ret = util_http_build_header(client->refbuf->data, buf_len, 0, 0, 200, NULL, "text/xml", "utf-8", NULL, NULL, client); if (ret == -1) { ICECAST_LOG_ERROR("Dropping client as we can not build response headers."); client_send_error_by_id(client, ICECAST_ERROR_GEN_HEADER_GEN_FAILED); xmlFree(buff); return; } } else { ICECAST_LOG_ERROR("Client buffer reallocation failed. Dropping client."); client_send_error_by_id(client, ICECAST_ERROR_GEN_BUFFER_REALLOC); xmlFree(buff); return; } } /* FIXME: in this section we hope no function will ever return -1 */ ret += snprintf (client->refbuf->data + ret, buf_len - ret, "Content-Length: %d\r\n\r\n%s", xmlStrlen(buff), buff); client->refbuf->len = ret; xmlFree(buff); client->respcode = 200; fserve_add_client (client, NULL); } if (response == ADMIN_FORMAT_TRANSFORMED) { char *fullpath_xslt_template; size_t fullpath_xslt_template_len; ice_config_t *config = config_get_config(); fullpath_xslt_template_len = strlen(config->adminroot_dir) + strlen(xslt_template) + strlen(PATH_SEPARATOR) + 1; fullpath_xslt_template = malloc(fullpath_xslt_template_len); snprintf(fullpath_xslt_template, fullpath_xslt_template_len, "%s%s%s", config->adminroot_dir, PATH_SEPARATOR, xslt_template); config_release_config(); ICECAST_LOG_DEBUG("Sending XSLT (%s)", fullpath_xslt_template); xslt_transform(doc, fullpath_xslt_template, client); free(fullpath_xslt_template); } } void admin_handle_request(client_t *client, const char *uri) { const char *mount; const admin_command_handler_t* handler; source_t *source = NULL; admin_format_t format; ICECAST_LOG_DEBUG("Got admin request '%s'", uri); handler = admin_get_handler(client->admin_command); /* Check if admin command is valid */ if (handler == NULL || handler->function == NULL) { ICECAST_LOG_ERROR("Error parsing command string or unrecognised command: %H", uri); client_send_error_by_id(client, ICECAST_ERROR_ADMIN_UNRECOGNISED_COMMAND); return; } /* Check ACL */ if (acl_test_admin(client->acl, client->admin_command) != ACL_POLICY_ALLOW) { /* ACL disallows, check exceptions */ if ((handler->function == command_metadata && handler->format == ADMIN_FORMAT_RAW) && (acl_test_method(client->acl, httpp_req_source) == ACL_POLICY_ALLOW || acl_test_method(client->acl, httpp_req_put) == ACL_POLICY_ALLOW)) { ICECAST_LOG_DEBUG("Granted right to call COMMAND_RAW_METADATA_UPDATE to " "client because it is allowed to do SOURCE or PUT."); } else { client_send_error_by_id(client, ICECAST_ERROR_GEN_CLIENT_NEEDS_TO_AUTHENTICATE); return; } } mount = httpp_get_query_param(client->parser, "mount"); /* Find mountpoint source */ if(mount != NULL) { /* This is a mount request, handle it as such */ avl_tree_rlock(global.source_tree); source = source_find_mount_raw(mount); /* No Source found */ if (source == NULL) { avl_tree_unlock(global.source_tree); ICECAST_LOG_WARN("Admin command \"%H\" on non-existent source \"%H\"", uri, mount); client_send_error_by_id(client, ICECAST_ERROR_ADMIN_SOURCE_DOES_NOT_EXIST); return; } /* No Source running */ else if (source->running == 0 && source->on_demand == 0) { avl_tree_unlock(global.source_tree); ICECAST_LOG_INFO("Received admin command \"%H\" on unavailable mount \"%H\"", uri, mount); client_send_error_by_id(client, ICECAST_ERROR_ADMIN_SOURCE_IS_NOT_AVAILABLE); return; } ICECAST_LOG_INFO("Received admin command %H on mount '%s'", uri, mount); } if (handler->type == ADMINTYPE_MOUNT && !source) { client_send_error_by_id(client, ICECAST_ERROR_ADMIN_MISSING_PARAMETER); return; } if (handler->format == ADMIN_FORMAT_AUTO) { format = client_get_admin_format_by_content_negotiation(client); } else { format = handler->format; } switch (client->parser->req_type) { case httpp_req_get: handler->function(client, source, format); break; case httpp_req_options: client_send_204(client); break; default: ICECAST_LOG_ERROR("Wrong request type from client"); client_send_error_by_id(client, ICECAST_ERROR_CON_UNKNOWN_REQUEST); break; } if (source) { avl_tree_unlock(global.source_tree); } return; } static void html_success(client_t *client, char *message) { ssize_t ret; ret = util_http_build_header(client->refbuf->data, PER_CLIENT_REFBUF_SIZE, 0, 0, 200, NULL, "text/html", "utf-8", "", NULL, client); if (ret == -1 || ret >= PER_CLIENT_REFBUF_SIZE) { ICECAST_LOG_ERROR("Dropping client as we can not build response headers."); client_send_error_by_id(client, ICECAST_ERROR_GEN_HEADER_GEN_FAILED); return; } snprintf(client->refbuf->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Admin request successful" "

%s

", message); client->respcode = 200; client->refbuf->len = strlen(client->refbuf->data); fserve_add_client(client, NULL); } static void command_move_clients(client_t *client, source_t *source, admin_format_t response) { const char *dest_source; source_t *dest; xmlDocPtr doc; xmlNodePtr node; char buf[255]; int parameters_passed = 0; ICECAST_LOG_DEBUG("Doing optional check"); if((COMMAND_OPTIONAL(client, "destination", dest_source))) { parameters_passed = 1; } ICECAST_LOG_DEBUG("Done optional check (%d)", parameters_passed); if (!parameters_passed) { doc = admin_build_sourcelist(source->mount); admin_send_response(doc, client, response, MOVECLIENTS_TRANSFORMED_REQUEST); xmlFreeDoc(doc); return; } dest = source_find_mount(dest_source); if (dest == NULL) { client_send_error_by_id(client, ICECAST_ERROR_ADMIN_NO_SUCH_DESTINATION); return; } if (strcmp(dest->mount, source->mount) == 0) { client_send_error_by_id(client, ICECAST_ERROR_ADMIN_SUPPLIED_MOUNTPOINTS_ARE_IDENTICAL); return; } if (dest->running == 0 && dest->on_demand == 0) { client_send_error_by_id(client, ICECAST_ERROR_ADMIN_DEST_NOT_RUNNING); return; } ICECAST_LOG_INFO("source is \"%s\", destination is \"%s\"", source->mount, dest->mount); doc = xmlNewDoc(XMLSTR("1.0")); node = xmlNewDocNode(doc, NULL, XMLSTR("iceresponse"), NULL); xmlDocSetRootElement(doc, node); source_move_clients(source, dest); snprintf(buf, sizeof(buf), "Clients moved from %s to %s", source->mount, dest_source); xmlNewTextChild(node, NULL, XMLSTR("message"), XMLSTR(buf)); xmlNewTextChild(node, NULL, XMLSTR("return"), XMLSTR("1")); admin_send_response(doc, client, response, ADMIN_XSL_RESPONSE); xmlFreeDoc(doc); } static inline xmlNodePtr __add_listener(client_t *client, xmlNodePtr parent, time_t now, operation_mode mode) { const char *tmp; xmlNodePtr node; char buf[22]; /* TODO: kh has support for a child node "lag". We should add that. * BEFORE RELEASE NEXT DOCUMENT #2097: Changed case of child nodes to lower case. * The case of , , and got changed to lower case. */ node = xmlNewChild(parent, NULL, XMLSTR("listener"), NULL); if (!node) return NULL; memset(buf, '\000', sizeof(buf)); snprintf(buf, sizeof(buf)-1, "%lu", client->con->id); xmlSetProp(node, XMLSTR("id"), XMLSTR(buf)); xmlNewTextChild(node, NULL, XMLSTR(mode == OMODE_LEGACY ? "ID" : "id"), XMLSTR(buf)); xmlNewTextChild(node, NULL, XMLSTR(mode == OMODE_LEGACY ? "IP" : "ip"), XMLSTR(client->con->ip)); tmp = httpp_getvar(client->parser, "user-agent"); if (tmp) xmlNewTextChild(node, NULL, XMLSTR(mode == OMODE_LEGACY ? "UserAgent" : "useragent"), XMLSTR(tmp)); tmp = httpp_getvar(client->parser, "referer"); if (tmp) xmlNewTextChild(node, NULL, XMLSTR("referer"), XMLSTR(tmp)); snprintf(buf, sizeof(buf), "%lu", (unsigned long)(now - client->con->con_time)); xmlNewTextChild(node, NULL, XMLSTR(mode == OMODE_LEGACY ? "Connected" : "connected"), XMLSTR(buf)); if (client->username) xmlNewTextChild(node, NULL, XMLSTR("username"), XMLSTR(client->username)); if (client->role) xmlNewTextChild(node, NULL, XMLSTR("role"), XMLSTR(client->role)); xmlNewTextChild(node, NULL, XMLSTR("tls"), XMLSTR(client->con->tls ? "true" : "false")); switch (client->protocol) { case ICECAST_PROTOCOL_HTTP: xmlNewTextChild(node, NULL, XMLSTR("protocol"), XMLSTR("http")); break; case ICECAST_PROTOCOL_SHOUTCAST: xmlNewTextChild(node, NULL, XMLSTR("protocol"), XMLSTR("icy")); break; } return node; } void admin_add_listeners_to_mount(source_t *source, xmlNodePtr parent, operation_mode mode) { time_t now = time(NULL); avl_node *client_node; avl_tree_rlock(source->client_tree); client_node = avl_get_first(source->client_tree); while(client_node) { __add_listener((client_t *)client_node->key, parent, now, mode); client_node = avl_get_next(client_node); } avl_tree_unlock(source->client_tree); } static void command_show_listeners(client_t *client, source_t *source, admin_format_t response) { xmlDocPtr doc; xmlNodePtr node, srcnode; char buf[22]; doc = xmlNewDoc(XMLSTR("1.0")); node = xmlNewDocNode(doc, NULL, XMLSTR("icestats"), NULL); srcnode = xmlNewChild(node, NULL, XMLSTR("source"), NULL); xmlSetProp(srcnode, XMLSTR("mount"), XMLSTR(source->mount)); xmlDocSetRootElement(doc, node); memset(buf, '\000', sizeof(buf)); snprintf (buf, sizeof(buf), "%lu", source->listeners); /* BEFORE RELEASE NEXT DOCUMENT #2097: Changed "Listeners" to lower case. */ xmlNewTextChild(srcnode, NULL, XMLSTR(client->mode == OMODE_LEGACY ? "Listeners" : "listeners"), XMLSTR(buf)); admin_add_listeners_to_mount(source, srcnode, client->mode); admin_send_response(doc, client, response, LISTCLIENTS_TRANSFORMED_REQUEST); xmlFreeDoc(doc); } static void command_buildm3u(client_t *client, source_t *source, admin_format_t format) { const char *mount = source->mount; const char *username = NULL; const char *password = NULL; ice_config_t *config; ssize_t ret; COMMAND_REQUIRE(client, "username", username); COMMAND_REQUIRE(client, "password", password); ret = util_http_build_header(client->refbuf->data, PER_CLIENT_REFBUF_SIZE, 0, 0, 200, NULL, "audio/x-mpegurl", NULL, NULL, NULL, client); if (ret == -1 || ret >= (PER_CLIENT_REFBUF_SIZE - 512)) { /* we want at least 512 Byte left for data */ ICECAST_LOG_ERROR("Dropping client as we can not build response headers."); client_send_error_by_id(client, ICECAST_ERROR_GEN_HEADER_GEN_FAILED); return; } config = config_get_config(); snprintf(client->refbuf->data + ret, PER_CLIENT_REFBUF_SIZE - ret, "Content-Disposition: attachment; filename=listen.m3u\r\n\r\n" "http://%s:%s@%s:%d%s\r\n", username, password, config->hostname, config->port, mount ); config_release_config(); client->respcode = 200; client->refbuf->len = strlen (client->refbuf->data); fserve_add_client (client, NULL); } xmlNodePtr admin_add_role_to_authentication(auth_t *auth, xmlNodePtr parent) { xmlNodePtr rolenode = xmlNewChild(parent, NULL, XMLSTR("role"), NULL); char idbuf[32]; snprintf(idbuf, sizeof(idbuf), "%lu", auth->id); xmlSetProp(rolenode, XMLSTR("id"), XMLSTR(idbuf)); if (auth->type) xmlSetProp(rolenode, XMLSTR("type"), XMLSTR(auth->type)); if (auth->role) xmlSetProp(rolenode, XMLSTR("name"), XMLSTR(auth->role)); if (auth->management_url) xmlSetProp(rolenode, XMLSTR("management-url"), XMLSTR(auth->management_url)); xmlSetProp(rolenode, XMLSTR("can-adduser"), XMLSTR(auth->adduser ? "true" : "false")); xmlSetProp(rolenode, XMLSTR("can-deleteuser"), XMLSTR(auth->deleteuser ? "true" : "false")); xmlSetProp(rolenode, XMLSTR("can-listuser"), XMLSTR(auth->listuser ? "true" : "false")); return rolenode; } static void command_manageauth(client_t *client, source_t *source, admin_format_t response) { xmlDocPtr doc; xmlNodePtr node, rolenode, usersnode, msgnode; const char *action = NULL; const char *username = NULL; const char *idstring = NULL; char *message = NULL; int ret = AUTH_OK; int error_id = ICECAST_ERROR_ADMIN_missing_parameter; long unsigned int id; ice_config_t *config = config_get_config(); auth_t *auth; do { /* get id */ COMMAND_REQUIRE(client, "id", idstring); id = atol(idstring); /* no find a auth_t for that id by looking up the config */ /* globals first */ auth = auth_stack_getbyid(config->authstack, id); /* now mounts */ if (!auth) { mount_proxy *mount = config->mounts; while (mount) { auth = auth_stack_getbyid(mount->authstack, id); if (auth) break; mount = mount->next; } } /* check if we found one */ if (auth == NULL) { ICECAST_LOG_WARN("Client requested mangement for unknown role %lu", id); error_id = ICECAST_ERROR_ADMIN_ROLEMGN_ROLE_NOT_FOUND; break; } COMMAND_OPTIONAL(client, "action", action); COMMAND_OPTIONAL(client, "username", username); if (action == NULL) action = "list"; if (!strcmp(action, "add")) { const char *password = NULL; COMMAND_OPTIONAL(client, "password", password); if (username == NULL || password == NULL) { ICECAST_LOG_WARN("manage auth request add for %lu but no user/pass", id); break; } if (!auth->adduser) { error_id = ICECAST_ERROR_ADMIN_ROLEMGN_ADD_NOSYS; break; } ret = auth->adduser(auth, username, password); if (ret == AUTH_FAILED) { message = strdup("User add failed - check the icecast error log"); } else if (ret == AUTH_USERADDED) { message = strdup("User added"); } else if (ret == AUTH_USEREXISTS) { message = strdup("User already exists - not added"); } } if (!strcmp(action, "delete")) { if (username == NULL) { ICECAST_LOG_WARN("manage auth request delete for %lu but no username", id); break; } if (!auth->deleteuser) { error_id = ICECAST_ERROR_ADMIN_ROLEMGN_DELETE_NOSYS; break; } ret = auth->deleteuser(auth, username); if (ret == AUTH_FAILED) { message = strdup("User delete failed - check the icecast error log"); } else if (ret == AUTH_USERDELETED) { message = strdup("User deleted"); } } doc = xmlNewDoc(XMLSTR("1.0")); node = xmlNewDocNode(doc, NULL, XMLSTR("icestats"), NULL); rolenode = admin_add_role_to_authentication(auth, node); if (message) { msgnode = xmlNewChild(node, NULL, XMLSTR("iceresponse"), NULL); xmlNewTextChild(msgnode, NULL, XMLSTR("message"), XMLSTR(message)); } xmlDocSetRootElement(doc, node); if (auth && auth->listuser) { usersnode = xmlNewChild(rolenode, NULL, XMLSTR("users"), NULL); auth->listuser(auth, usersnode); } config_release_config(); auth_release(auth); admin_send_response(doc, client, response, MANAGEAUTH_TRANSFORMED_REQUEST); free(message); xmlFreeDoc(doc); return; } while (0); config_release_config(); auth_release(auth); client_send_error_by_id(client, error_id); } static void command_kill_source(client_t *client, source_t *source, admin_format_t response) { xmlDocPtr doc; xmlNodePtr node; doc = xmlNewDoc (XMLSTR("1.0")); node = xmlNewDocNode(doc, NULL, XMLSTR("iceresponse"), NULL); xmlNewTextChild(node, NULL, XMLSTR("message"), XMLSTR("Source Removed")); xmlNewTextChild(node, NULL, XMLSTR("return"), XMLSTR("1")); xmlDocSetRootElement(doc, node); source->running = 0; admin_send_response(doc, client, response, ADMIN_XSL_RESPONSE); xmlFreeDoc(doc); } static void command_kill_client(client_t *client, source_t *source, admin_format_t response) { const char *idtext; int id; client_t *listener; xmlDocPtr doc; xmlNodePtr node; char buf[50] = ""; COMMAND_REQUIRE(client, "id", idtext); id = atoi(idtext); listener = source_find_client(source, id); doc = xmlNewDoc(XMLSTR("1.0")); node = xmlNewDocNode(doc, NULL, XMLSTR("iceresponse"), NULL); xmlDocSetRootElement(doc, node); ICECAST_LOG_DEBUG("Response is %d", response); if(listener != NULL) { ICECAST_LOG_INFO("Admin request: client %d removed", id); /* This tags it for removal on the next iteration of the main source * loop */ listener->con->error = 1; memset(buf, '\000', sizeof(buf)); snprintf(buf, sizeof(buf)-1, "Client %d removed", id); xmlNewTextChild(node, NULL, XMLSTR("message"), XMLSTR(buf)); xmlNewTextChild(node, NULL, XMLSTR("return"), XMLSTR("1")); } else { memset(buf, '\000', sizeof(buf)); snprintf(buf, sizeof(buf)-1, "Client %d not found", id); xmlNewTextChild(node, NULL, XMLSTR("message"), XMLSTR(buf)); xmlNewTextChild(node, NULL, XMLSTR("return"), XMLSTR("0")); } admin_send_response(doc, client, response, ADMIN_XSL_RESPONSE); xmlFreeDoc(doc); } static void command_fallback(client_t *client, source_t *source, admin_format_t response) { const char *fallback; char *old; ICECAST_LOG_DEBUG("Got fallback request"); COMMAND_REQUIRE(client, "fallback", fallback); old = source->fallback_mount; source->fallback_mount = strdup(fallback); free(old); html_success(client, "Fallback configured"); } static void command_metadata(client_t *client, source_t *source, admin_format_t response) { const char *action; const char *song, *title, *artist, *charset; format_plugin_t *plugin; xmlDocPtr doc; xmlNodePtr node; int same_ip = 1; doc = xmlNewDoc(XMLSTR("1.0")); node = xmlNewDocNode(doc, NULL, XMLSTR("iceresponse"), NULL); xmlDocSetRootElement(doc, node); ICECAST_LOG_DEBUG("Got metadata update request"); if (source->parser && source->parser->req_type == httpp_req_put) { ICECAST_LOG_ERROR("Got legacy SOURCE-style metadata update command on " "source connected with PUT at mountpoint %s", source->mount); } COMMAND_REQUIRE(client, "mode", action); COMMAND_OPTIONAL(client, "song", song); COMMAND_OPTIONAL(client, "title", title); COMMAND_OPTIONAL(client, "artist", artist); COMMAND_OPTIONAL(client, "charset", charset); if (strcmp (action, "updinfo") != 0) { xmlNewTextChild(node, NULL, XMLSTR("message"), XMLSTR("No such action")); xmlNewTextChild(node, NULL, XMLSTR("return"), XMLSTR("0")); admin_send_response(doc, client, response, ADMIN_XSL_RESPONSE); xmlFreeDoc(doc); return; } plugin = source->format; if (source->client && strcmp(client->con->ip, source->client->con->ip) != 0) if (response == ADMIN_FORMAT_RAW && acl_test_admin(client->acl, client->admin_command) != ACL_POLICY_ALLOW) same_ip = 0; if (same_ip && plugin && plugin->set_tag) { if (song) { plugin->set_tag (plugin, "song", song, charset); ICECAST_LOG_INFO("Metadata on mountpoint %s changed to \"%s\"", source->mount, song); } else { if (artist && title) { plugin->set_tag(plugin, "title", title, charset); plugin->set_tag(plugin, "artist", artist, charset); ICECAST_LOG_INFO("Metadata on mountpoint %s changed to \"%s - %s\"", source->mount, artist, title); } } /* updates are now done, let them be pushed into the stream */ plugin->set_tag (plugin, NULL, NULL, NULL); } else { xmlNewTextChild(node, NULL, XMLSTR("message"), XMLSTR("Mountpoint will not accept URL updates")); xmlNewTextChild(node, NULL, XMLSTR("return"), XMLSTR("1")); admin_send_response(doc, client, response, ADMIN_XSL_RESPONSE); xmlFreeDoc(doc); return; } xmlNewTextChild(node, NULL, XMLSTR("message"), XMLSTR("Metadata update successful")); xmlNewTextChild(node, NULL, XMLSTR("return"), XMLSTR("1")); admin_send_response(doc, client, response, ADMIN_XSL_RESPONSE); xmlFreeDoc(doc); } static void command_shoutcast_metadata(client_t *client, source_t *source, admin_format_t format) { const char *action; const char *value; int same_ip = 1; ICECAST_LOG_DEBUG("Got shoutcast metadata update request"); if (source->shoutcast_compat == 0) { ICECAST_LOG_ERROR("illegal change of metadata on non-shoutcast " "compatible stream"); client_send_error_by_id(client, ICECAST_ERROR_ADMIN_METADAT_BADCALL); return; } if (source->parser->req_type == httpp_req_put) { ICECAST_LOG_ERROR("Got legacy shoutcast-style metadata update command " "on source connected with PUT at mountpoint %s", source->mount); } COMMAND_REQUIRE(client, "mode", action); COMMAND_REQUIRE(client, "song", value); if (strcmp (action, "updinfo") != 0) { client_send_error_by_id(client, ICECAST_ERROR_ADMIN_METADAT_NO_SUCH_ACTION); return; } if (source->client && strcmp (client->con->ip, source->client->con->ip) != 0) if (acl_test_admin(client->acl, client->admin_command) != ACL_POLICY_ALLOW) same_ip = 0; if (same_ip && source->format && source->format->set_tag) { source->format->set_tag (source->format, "title", value, NULL); source->format->set_tag (source->format, NULL, NULL, NULL); ICECAST_LOG_DEBUG("Metadata on mountpoint %s changed to \"%s\"", source->mount, value); html_success(client, "Metadata update successful"); } else { client_send_error_by_id(client, ICECAST_ERROR_ADMIN_MOUNT_NOT_ACCEPT_URL_UPDATES); } } static void command_stats(client_t *client, source_t *source, admin_format_t response) { const char *mount = (source) ? source->mount : NULL; xmlDocPtr doc; ICECAST_LOG_DEBUG("Stats request, sending xml stats"); doc = stats_get_xml(1, mount, client->mode); admin_send_response(doc, client, response, STATS_TRANSFORMED_REQUEST); xmlFreeDoc(doc); return; } static void command_queue_reload(client_t *client, source_t *source, admin_format_t response) { xmlDocPtr doc; xmlNodePtr node; global_lock(); global.schedule_config_reread = 1; global_unlock(); doc = xmlNewDoc (XMLSTR("1.0")); node = xmlNewDocNode(doc, NULL, XMLSTR("iceresponse"), NULL); xmlNewTextChild(node, NULL, XMLSTR("message"), XMLSTR("Config reload queued")); xmlNewTextChild(node, NULL, XMLSTR("return"), XMLSTR("1")); xmlDocSetRootElement(doc, node); admin_send_response(doc, client, response, ADMIN_XSL_RESPONSE); xmlFreeDoc(doc); } static void command_list_mounts(client_t *client, source_t *source, admin_format_t response) { ICECAST_LOG_DEBUG("List mounts request"); if (response == ADMIN_FORMAT_PLAINTEXT) { ssize_t ret = util_http_build_header(client->refbuf->data, PER_CLIENT_REFBUF_SIZE, 0, 0, 200, NULL, "text/plain", "utf-8", "", NULL, client); if (ret == -1 || ret >= PER_CLIENT_REFBUF_SIZE) { ICECAST_LOG_ERROR("Dropping client as we can not build response headers."); client_send_error_by_id(client, ICECAST_ERROR_GEN_HEADER_GEN_FAILED); return; } client->refbuf->len = strlen (client->refbuf->data); client->respcode = 200; client->refbuf->next = stats_get_streams (); fserve_add_client (client, NULL); } else { xmlDocPtr doc; avl_tree_rlock(global.source_tree); doc = admin_build_sourcelist(NULL); avl_tree_unlock(global.source_tree); admin_send_response(doc, client, response, LISTMOUNTS_TRANSFORMED_REQUEST); xmlFreeDoc(doc); } } static void command_updatemetadata(client_t *client, source_t *source, admin_format_t response) { xmlDocPtr doc; xmlNodePtr node, srcnode; doc = xmlNewDoc(XMLSTR("1.0")); node = xmlNewDocNode(doc, NULL, XMLSTR("icestats"), NULL); srcnode = xmlNewChild(node, NULL, XMLSTR("source"), NULL); xmlSetProp(srcnode, XMLSTR("mount"), XMLSTR(source->mount)); xmlDocSetRootElement(doc, node); admin_send_response(doc, client, response, UPDATEMETADATA_TRANSFORMED_REQUEST); xmlFreeDoc(doc); }