1 /*****************************************************************************
3 *****************************************************************************
4 * Copyright (C) 2004-2006 VLC authors and VideoLAN
5 * Copyright © 2004-2007 Rémi Denis-Courmont
8 * Authors: Laurent Aimar <fenrir@via.ecp.fr>
9 * Rémi Denis-Courmont <rem # videolan.org>
11 * This program is free software; you can redistribute it and/or modify it
12 * under the terms of the GNU Lesser General Public License as published by
13 * the Free Software Foundation; either version 2.1 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU Lesser General Public License for more details.
21 * You should have received a copy of the GNU Lesser General Public License
22 * along with this program; if not, write to the Free Software Foundation,
23 * Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
24 *****************************************************************************/
30 #include <vlc_common.h>
31 #include <vlc_httpd.h>
35 #include <vlc_network.h>
37 #include <vlc_strings.h>
39 #include <vlc_charset.h>
42 #include <vlc_block.h>
43 #include "../libvlc.h"
54 # include <winsock2.h>
56 # include <sys/socket.h>
60 /* We need HUGE buffer otherwise TCP throughput is very limited */
61 #define HTTPD_CL_BUFSIZE 1000000
63 #define HTTPD_CL_BUFSIZE 10000
66 static void httpd_ClientClean(httpd_client_t *cl);
67 static void httpd_AppendData(httpd_stream_t *stream, uint8_t *p_data, int i_data);
69 /* each host run in his own thread */
77 /* address/port and socket for listening at connections */
86 /* all registered url (becarefull that 2 httpd_url_t could point at the same url)
87 * This will slow down the url research but make my live easier
88 * All url will have their cb trigger, but only the first one can answer
94 httpd_client_t **client;
97 vlc_tls_creds_t *p_tls;
114 httpd_callback_sys_t *p_sys;
115 } catch[HTTPD_MSG_MAX];
121 HTTPD_CLIENT_RECEIVING,
122 HTTPD_CLIENT_RECEIVE_DONE,
124 HTTPD_CLIENT_SENDING,
125 HTTPD_CLIENT_SEND_DONE,
127 HTTPD_CLIENT_WAITING,
131 HTTPD_CLIENT_TLS_HS_IN,
132 HTTPD_CLIENT_TLS_HS_OUT
138 HTTPD_CLIENT_FILE, /* default */
139 HTTPD_CLIENT_STREAM, /* regulary get data from cb */
142 struct httpd_client_t
153 mtime_t i_activity_date;
154 mtime_t i_activity_timeout;
156 /* buffer for reading header */
162 * If waiting for a keyframe, this is the position (in bytes) of the
163 * last keyframe the stream saw before this client connected.
166 int64_t i_keyframe_wait_to_pass;
169 httpd_message_t query; /* client -> httpd */
170 httpd_message_t answer; /* httpd -> client */
177 /*****************************************************************************
179 *****************************************************************************/
180 static const char *httpd_ReasonFromCode(unsigned i_code)
185 const char psz_reason[36];
188 static const http_status_info http_reason[] =
190 /*{ 100, "Continue" },
191 { 101, "Switching Protocols" },*/
193 /*{ 201, "Created" },
195 { 203, "Non-authoritative information" },
196 { 204, "No content" },
197 { 205, "Reset content" },
198 { 206, "Partial content" },
199 { 250, "Low on storage space" },
200 { 300, "Multiple choices" },*/
201 { 301, "Moved permanently" },
202 /*{ 302, "Moved temporarily" },
203 { 303, "See other" },
204 { 304, "Not modified" },
205 { 305, "Use proxy" },
206 { 307, "Temporary redirect" },
207 { 400, "Bad request" },*/
208 { 401, "Unauthorized" },
209 /*{ 402, "Payment Required" },*/
210 { 403, "Forbidden" },
211 { 404, "Not found" },
212 { 405, "Method not allowed" },
213 /*{ 406, "Not acceptable" },
214 { 407, "Proxy authentication required" },
215 { 408, "Request time-out" },
218 { 411, "Length required" },
219 { 412, "Precondition failed" },
220 { 413, "Request entity too large" },
221 { 414, "Request-URI too large" },
222 { 415, "Unsupported media Type" },
223 { 416, "Requested range not satisfiable" },
224 { 417, "Expectation failed" },
225 { 451, "Parameter not understood" },
226 { 452, "Conference not found" },
227 { 453, "Not enough bandwidth" },*/
228 { 454, "Session not found" },
229 { 455, "Method not valid in this State" },
230 { 456, "Header field not valid for resource" },
231 { 457, "Invalid range" },
232 /*{ 458, "Read-only parameter" },*/
233 { 459, "Aggregate operation not allowed" },
234 { 460, "Non-aggregate operation not allowed" },
235 { 461, "Unsupported transport" },
236 /*{ 462, "Destination unreachable" },*/
237 { 500, "Internal server error" },
238 { 501, "Not implemented" },
239 /*{ 502, "Bad gateway" },*/
240 { 503, "Service unavailable" },
241 /*{ 504, "Gateway time-out" },*/
242 { 505, "Protocol version not supported" },
243 { 551, "Option not supported" },
247 static const char psz_fallback_reason[5][16] = {
248 "Continue", "OK", "Found", "Client error", "Server error"
251 assert((i_code >= 100) && (i_code <= 599));
253 const http_status_info *p = http_reason;
254 while (i_code < p->i_code)
257 if (p->i_code == i_code)
258 return p->psz_reason;
260 return psz_fallback_reason[(i_code / 100) - 1];
263 static size_t httpd_HtmlError (char **body, int code, const char *url)
265 const char *errname = httpd_ReasonFromCode (code);
268 char *url_Encoded = convert_xml_special_chars (url ? url : "");
270 int res = asprintf (body,
271 "<?xml version=\"1.0\" encoding=\"ascii\" ?>\n"
272 "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\""
273 " \"http://www.w3.org/TR/xhtml10/DTD/xhtml10strict.dtd\">\n"
274 "<html lang=\"en\">\n"
276 "<title>%s</title>\n"
279 "<h1>%d %s%s%s%s</h1>\n"
281 "<a href=\"http://www.videolan.org\">VideoLAN</a>\n"
283 "</html>\n", errname, code, errname,
284 (url_Encoded ? " (" : ""), (url_Encoded ? url_Encoded : ""), (url_Encoded ? ")" : ""));
297 /*****************************************************************************
298 * High Level Functions: httpd_file_t
299 *****************************************************************************/
303 httpd_file_callback_t pf_fill;
304 httpd_file_sys_t *p_sys;
309 httpd_FileCallBack(httpd_callback_sys_t *p_sys, httpd_client_t *cl,
310 httpd_message_t *answer, const httpd_message_t *query)
312 httpd_file_t *file = (httpd_file_t*)p_sys;
313 uint8_t **pp_body, *p_body; const char *psz_connection;
314 int *pi_body, i_body;
316 if (!answer || !query )
319 answer->i_proto = HTTPD_PROTO_HTTP;
320 answer->i_version= 1;
321 answer->i_type = HTTPD_MSG_ANSWER;
323 answer->i_status = 200;
325 httpd_MsgAdd(answer, "Content-type", "%s", file->mime);
326 httpd_MsgAdd(answer, "Cache-Control", "%s", "no-cache");
328 if (query->i_type != HTTPD_MSG_HEAD) {
329 pp_body = &answer->p_body;
330 pi_body = &answer->i_body;
332 /* The file still needs to be executed. */
339 if (query->i_type == HTTPD_MSG_POST) {
340 /* msg_Warn not supported */
343 uint8_t *psz_args = query->psz_args;
344 file->pf_fill(file->p_sys, file, psz_args, pp_body, pi_body);
346 if (query->i_type == HTTPD_MSG_HEAD)
349 /* We respect client request */
350 psz_connection = httpd_MsgGet(&cl->query, "Connection");
352 httpd_MsgAdd(answer, "Connection", "%s", psz_connection);
354 httpd_MsgAdd(answer, "Content-Length", "%d", answer->i_body);
359 httpd_file_t *httpd_FileNew(httpd_host_t *host,
360 const char *psz_url, const char *psz_mime,
361 const char *psz_user, const char *psz_password,
362 httpd_file_callback_t pf_fill,
363 httpd_file_sys_t *p_sys)
365 const char *mime = psz_mime;
366 if (mime == NULL || mime[0] == '\0')
367 mime = vlc_mime_Ext2Mime(psz_url);
369 size_t mimelen = strlen(mime);
370 httpd_file_t *file = malloc(sizeof(*file) + mimelen);
371 if (unlikely(file == NULL))
374 file->url = httpd_UrlNew(host, psz_url, psz_user, psz_password);
380 file->pf_fill = pf_fill;
382 memcpy(file->mime, mime, mimelen + 1);
384 httpd_UrlCatch(file->url, HTTPD_MSG_HEAD, httpd_FileCallBack,
385 (httpd_callback_sys_t*)file);
386 httpd_UrlCatch(file->url, HTTPD_MSG_GET, httpd_FileCallBack,
387 (httpd_callback_sys_t*)file);
388 httpd_UrlCatch(file->url, HTTPD_MSG_POST, httpd_FileCallBack,
389 (httpd_callback_sys_t*)file);
394 httpd_file_sys_t *httpd_FileDelete(httpd_file_t *file)
396 httpd_file_sys_t *p_sys = file->p_sys;
398 httpd_UrlDelete(file->url);
403 /*****************************************************************************
404 * High Level Functions: httpd_handler_t (for CGIs)
405 *****************************************************************************/
406 struct httpd_handler_t
410 httpd_handler_callback_t pf_fill;
411 httpd_handler_sys_t *p_sys;
416 httpd_HandlerCallBack(httpd_callback_sys_t *p_sys, httpd_client_t *cl,
417 httpd_message_t *answer, const httpd_message_t *query)
419 httpd_handler_t *handler = (httpd_handler_t*)p_sys;
420 char psz_remote_addr[NI_MAXNUMERICHOST];
422 if (!answer || !query)
425 answer->i_proto = HTTPD_PROTO_NONE;
426 answer->i_type = HTTPD_MSG_ANSWER;
428 /* We do it ourselves, thanks */
429 answer->i_status = 0;
431 if (!httpd_ClientIP(cl, psz_remote_addr, NULL))
432 *psz_remote_addr = '\0';
434 uint8_t *psz_args = query->psz_args;
435 handler->pf_fill(handler->p_sys, handler, query->psz_url, psz_args,
436 query->i_type, query->p_body, query->i_body,
437 psz_remote_addr, NULL,
438 &answer->p_body, &answer->i_body);
440 if (query->i_type == HTTPD_MSG_HEAD) {
441 char *p = (char *)answer->p_body;
443 /* Looks for end of header (i.e. one empty line) */
444 while ((p = strchr(p, '\r')))
445 if (p[1] == '\n' && p[2] == '\r' && p[3] == '\n')
450 answer->i_body = strlen((char*)answer->p_body) + 1;
451 answer->p_body = xrealloc(answer->p_body, answer->i_body);
455 if (strncmp((char *)answer->p_body, "HTTP/1.", 7)) {
456 int i_status, i_headers;
457 char *psz_headers, *psz_new;
458 const char *psz_status;
460 if (!strncmp((char *)answer->p_body, "Status: ", 8)) {
462 i_status = strtol((char *)&answer->p_body[8], &psz_headers, 0);
463 if (*psz_headers == '\r' || *psz_headers == '\n') psz_headers++;
464 if (*psz_headers == '\n') psz_headers++;
465 i_headers = answer->i_body - (psz_headers - (char *)answer->p_body);
468 psz_headers = (char *)answer->p_body;
469 i_headers = answer->i_body;
472 psz_status = httpd_ReasonFromCode(i_status);
473 answer->i_body = sizeof("HTTP/1.0 xxx \r\n")
474 + strlen(psz_status) + i_headers - 1;
475 psz_new = (char *)xmalloc(answer->i_body + 1);
476 sprintf(psz_new, "HTTP/1.0 %03d %s\r\n", i_status, psz_status);
477 memcpy(&psz_new[strlen(psz_new)], psz_headers, i_headers);
478 free(answer->p_body);
479 answer->p_body = (uint8_t *)psz_new;
485 httpd_handler_t *httpd_HandlerNew(httpd_host_t *host, const char *psz_url,
486 const char *psz_user,
487 const char *psz_password,
488 httpd_handler_callback_t pf_fill,
489 httpd_handler_sys_t *p_sys)
491 httpd_handler_t *handler = malloc(sizeof(*handler));
495 handler->url = httpd_UrlNew(host, psz_url, psz_user, psz_password);
501 handler->pf_fill = pf_fill;
502 handler->p_sys = p_sys;
504 httpd_UrlCatch(handler->url, HTTPD_MSG_HEAD, httpd_HandlerCallBack,
505 (httpd_callback_sys_t*)handler);
506 httpd_UrlCatch(handler->url, HTTPD_MSG_GET, httpd_HandlerCallBack,
507 (httpd_callback_sys_t*)handler);
508 httpd_UrlCatch(handler->url, HTTPD_MSG_POST, httpd_HandlerCallBack,
509 (httpd_callback_sys_t*)handler);
514 httpd_handler_sys_t *httpd_HandlerDelete(httpd_handler_t *handler)
516 httpd_handler_sys_t *p_sys = handler->p_sys;
517 httpd_UrlDelete(handler->url);
522 /*****************************************************************************
523 * High Level Functions: httpd_redirect_t
524 *****************************************************************************/
525 struct httpd_redirect_t
531 static int httpd_RedirectCallBack(httpd_callback_sys_t *p_sys,
532 httpd_client_t *cl, httpd_message_t *answer,
533 const httpd_message_t *query)
535 httpd_redirect_t *rdir = (httpd_redirect_t*)p_sys;
539 if (!answer || !query)
542 answer->i_proto = HTTPD_PROTO_HTTP;
543 answer->i_version= 1;
544 answer->i_type = HTTPD_MSG_ANSWER;
545 answer->i_status = 301;
547 answer->i_body = httpd_HtmlError (&p_body, 301, rdir->dst);
548 answer->p_body = (unsigned char *)p_body;
550 /* XXX check if it's ok or we need to set an absolute url */
551 httpd_MsgAdd(answer, "Location", "%s", rdir->dst);
553 httpd_MsgAdd(answer, "Content-Length", "%d", answer->i_body);
558 httpd_redirect_t *httpd_RedirectNew(httpd_host_t *host, const char *psz_url_dst,
559 const char *psz_url_src)
561 size_t dstlen = strlen(psz_url_dst);
563 httpd_redirect_t *rdir = malloc(sizeof(*rdir) + dstlen);
564 if (unlikely(rdir == NULL))
567 rdir->url = httpd_UrlNew(host, psz_url_src, NULL, NULL);
572 memcpy(rdir->dst, psz_url_dst, dstlen + 1);
574 /* Redirect apply for all HTTP request and RTSP DESCRIBE resquest */
575 httpd_UrlCatch(rdir->url, HTTPD_MSG_HEAD, httpd_RedirectCallBack,
576 (httpd_callback_sys_t*)rdir);
577 httpd_UrlCatch(rdir->url, HTTPD_MSG_GET, httpd_RedirectCallBack,
578 (httpd_callback_sys_t*)rdir);
579 httpd_UrlCatch(rdir->url, HTTPD_MSG_POST, httpd_RedirectCallBack,
580 (httpd_callback_sys_t*)rdir);
581 httpd_UrlCatch(rdir->url, HTTPD_MSG_DESCRIBE, httpd_RedirectCallBack,
582 (httpd_callback_sys_t*)rdir);
586 void httpd_RedirectDelete(httpd_redirect_t *rdir)
588 httpd_UrlDelete(rdir->url);
592 /*****************************************************************************
593 * High Level Funtions: httpd_stream_t
594 *****************************************************************************/
595 struct httpd_stream_t
602 /* Header to send as first packet */
606 /* Some muxes, in particular the avformat mux, can mark given blocks
607 * as keyframes, to ensure that the stream starts with one.
608 * (This is particularly important for WebM streaming to certain
609 * browsers.) Store if we've ever seen any such keyframe blocks,
610 * and if so, the byte position of the start of the last one. */
611 bool b_has_keyframes;
612 int64_t i_last_keyframe_seen_pos;
614 /* circular buffer */
615 int i_buffer_size; /* buffer size, can't be reallocated smaller */
616 uint8_t *p_buffer; /* buffer */
617 int64_t i_buffer_pos; /* absolute position from begining */
618 int64_t i_buffer_last_pos; /* a new connection will start with that */
621 size_t i_http_headers;
622 httpd_header * p_http_headers;
625 static int httpd_StreamCallBack(httpd_callback_sys_t *p_sys,
626 httpd_client_t *cl, httpd_message_t *answer,
627 const httpd_message_t *query)
629 httpd_stream_t *stream = (httpd_stream_t*)p_sys;
631 if (!answer || !query || !cl)
634 if (answer->i_body_offset > 0) {
637 if (answer->i_body_offset >= stream->i_buffer_pos)
638 return VLC_EGENERIC; /* wait, no data available */
640 if (cl->i_keyframe_wait_to_pass >= 0) {
641 if (stream->i_last_keyframe_seen_pos <= cl->i_keyframe_wait_to_pass)
642 /* still waiting for the next keyframe */
645 /* seek to the new keyframe */
646 answer->i_body_offset = stream->i_last_keyframe_seen_pos;
647 cl->i_keyframe_wait_to_pass = -1;
650 if (answer->i_body_offset + stream->i_buffer_size < stream->i_buffer_pos)
651 answer->i_body_offset = stream->i_buffer_last_pos; /* this client isn't fast enough */
653 i_pos = answer->i_body_offset % stream->i_buffer_size;
654 int64_t i_write = stream->i_buffer_pos - answer->i_body_offset;
656 if (i_write > HTTPD_CL_BUFSIZE)
657 i_write = HTTPD_CL_BUFSIZE;
658 else if (i_write <= 0)
659 return VLC_EGENERIC; /* wait, no data available */
661 /* Don't go past the end of the circular buffer */
662 i_write = __MIN(i_write, stream->i_buffer_size - i_pos);
664 /* using HTTPD_MSG_ANSWER -> data available */
665 answer->i_proto = HTTPD_PROTO_HTTP;
666 answer->i_version= 0;
667 answer->i_type = HTTPD_MSG_ANSWER;
669 answer->i_body = i_write;
670 answer->p_body = xmalloc(i_write);
671 memcpy(answer->p_body, &stream->p_buffer[i_pos], i_write);
673 answer->i_body_offset += i_write;
677 answer->i_proto = HTTPD_PROTO_HTTP;
678 answer->i_version= 0;
679 answer->i_type = HTTPD_MSG_ANSWER;
681 answer->i_status = 200;
683 bool b_has_content_type = false;
684 bool b_has_cache_control = false;
686 vlc_mutex_lock(&stream->lock);
687 for (size_t i = 0; i < stream->i_http_headers; i++)
688 if (strncasecmp(stream->p_http_headers[i].name, "Content-Length", 14)) {
689 httpd_MsgAdd(answer, stream->p_http_headers[i].name, "%s",
690 stream->p_http_headers[i].value);
692 if (!strncasecmp(stream->p_http_headers[i].name, "Content-Type", 12))
693 b_has_content_type = true;
694 else if (!strncasecmp(stream->p_http_headers[i].name, "Cache-Control", 13))
695 b_has_cache_control = true;
697 vlc_mutex_unlock(&stream->lock);
699 if (query->i_type != HTTPD_MSG_HEAD) {
700 cl->b_stream_mode = true;
701 vlc_mutex_lock(&stream->lock);
702 /* Send the header */
703 if (stream->i_header > 0) {
704 answer->i_body = stream->i_header;
705 answer->p_body = xmalloc(stream->i_header);
706 memcpy(answer->p_body, stream->p_header, stream->i_header);
708 answer->i_body_offset = stream->i_buffer_last_pos;
709 if (stream->b_has_keyframes)
710 cl->i_keyframe_wait_to_pass = stream->i_last_keyframe_seen_pos;
712 cl->i_keyframe_wait_to_pass = -1;
713 vlc_mutex_unlock(&stream->lock);
715 httpd_MsgAdd(answer, "Content-Length", "0");
716 answer->i_body_offset = 0;
719 /* FIXME: move to http access_output */
720 if (!strcmp(stream->psz_mime, "video/x-ms-asf-stream")) {
721 bool b_xplaystream = false;
723 httpd_MsgAdd(answer, "Content-type", "application/octet-stream");
724 httpd_MsgAdd(answer, "Server", "Cougar 4.1.0.3921");
725 httpd_MsgAdd(answer, "Pragma", "no-cache");
726 httpd_MsgAdd(answer, "Pragma", "client-id=%lu",
727 vlc_mrand48()&0x7fff);
728 httpd_MsgAdd(answer, "Pragma", "features=\"broadcast\"");
730 /* Check if there is a xPlayStrm=1 */
731 for (size_t i = 0; i < query->i_headers; i++)
732 if (!strcasecmp(query->p_headers[i].name, "Pragma") &&
733 strstr(query->p_headers[i].value, "xPlayStrm=1"))
734 b_xplaystream = true;
737 answer->i_body_offset = 0;
738 } else if (!b_has_content_type)
739 httpd_MsgAdd(answer, "Content-type", "%s", stream->psz_mime);
741 if (!b_has_cache_control)
742 httpd_MsgAdd(answer, "Cache-Control", "no-cache");
747 httpd_stream_t *httpd_StreamNew(httpd_host_t *host,
748 const char *psz_url, const char *psz_mime,
749 const char *psz_user, const char *psz_password)
751 httpd_stream_t *stream = malloc(sizeof(*stream));
755 stream->url = httpd_UrlNew(host, psz_url, psz_user, psz_password);
761 vlc_mutex_init(&stream->lock);
762 if (psz_mime == NULL || psz_mime[0] == '\0')
763 psz_mime = vlc_mime_Ext2Mime(psz_url);
764 stream->psz_mime = xstrdup(psz_mime);
766 stream->i_header = 0;
767 stream->p_header = NULL;
768 stream->i_buffer_size = 5000000; /* 5 Mo per stream */
769 stream->p_buffer = xmalloc(stream->i_buffer_size);
770 /* We set to 1 to make life simpler
771 * (this way i_body_offset can never be 0) */
772 stream->i_buffer_pos = 1;
773 stream->i_buffer_last_pos = 1;
774 stream->b_has_keyframes = false;
775 stream->i_last_keyframe_seen_pos = 0;
776 stream->i_http_headers = 0;
777 stream->p_http_headers = NULL;
779 httpd_UrlCatch(stream->url, HTTPD_MSG_HEAD, httpd_StreamCallBack,
780 (httpd_callback_sys_t*)stream);
781 httpd_UrlCatch(stream->url, HTTPD_MSG_GET, httpd_StreamCallBack,
782 (httpd_callback_sys_t*)stream);
783 httpd_UrlCatch(stream->url, HTTPD_MSG_POST, httpd_StreamCallBack,
784 (httpd_callback_sys_t*)stream);
789 int httpd_StreamHeader(httpd_stream_t *stream, uint8_t *p_data, int i_data)
791 vlc_mutex_lock(&stream->lock);
792 free(stream->p_header);
793 stream->p_header = NULL;
795 stream->i_header = i_data;
797 stream->p_header = xmalloc(i_data);
798 memcpy(stream->p_header, p_data, i_data);
800 vlc_mutex_unlock(&stream->lock);
805 static void httpd_AppendData(httpd_stream_t *stream, uint8_t *p_data, int i_data)
807 int i_pos = stream->i_buffer_pos % stream->i_buffer_size;
808 int i_count = i_data;
809 while (i_count > 0) {
810 int i_copy = __MIN(i_count, stream->i_buffer_size - i_pos);
812 /* Ok, we can't go past the end of our buffer */
813 memcpy(&stream->p_buffer[i_pos], p_data, i_copy);
815 i_pos = (i_pos + i_copy) % stream->i_buffer_size;
820 stream->i_buffer_pos += i_data;
823 int httpd_StreamSend(httpd_stream_t *stream, const block_t *p_block)
825 if (!p_block || !p_block->p_buffer)
828 vlc_mutex_lock(&stream->lock);
830 /* save this pointer (to be used by new connection) */
831 stream->i_buffer_last_pos = stream->i_buffer_pos;
833 if (p_block->i_flags & BLOCK_FLAG_TYPE_I) {
834 stream->b_has_keyframes = true;
835 stream->i_last_keyframe_seen_pos = stream->i_buffer_pos;
838 httpd_AppendData(stream, p_block->p_buffer, p_block->i_buffer);
840 vlc_mutex_unlock(&stream->lock);
844 void httpd_StreamDelete(httpd_stream_t *stream)
846 httpd_UrlDelete(stream->url);
847 for (size_t i = 0; i < stream->i_http_headers; i++) {
848 free(stream->p_http_headers[i].name);
849 free(stream->p_http_headers[i].value);
851 free(stream->p_http_headers);
852 vlc_mutex_destroy(&stream->lock);
853 free(stream->psz_mime);
854 free(stream->p_header);
855 free(stream->p_buffer);
859 /*****************************************************************************
861 *****************************************************************************/
862 static void* httpd_HostThread(void *);
863 static httpd_host_t *httpd_HostCreate(vlc_object_t *, const char *,
864 const char *, vlc_tls_creds_t *);
866 /* create a new host */
867 httpd_host_t *vlc_http_HostNew(vlc_object_t *p_this)
869 return httpd_HostCreate(p_this, "http-host", "http-port", NULL);
872 httpd_host_t *vlc_https_HostNew(vlc_object_t *obj)
874 char *cert = var_InheritString(obj, "http-cert");
876 msg_Err(obj, "HTTP/TLS certificate not specified!");
880 char *key = var_InheritString(obj, "http-key");
881 vlc_tls_creds_t *tls = vlc_tls_ServerCreate(obj, cert, key);
884 msg_Err(obj, "HTTP/TLS certificate error (%s and %s)",
885 cert, key ? key : cert);
893 return httpd_HostCreate(obj, "http-host", "https-port", tls);
896 httpd_host_t *vlc_rtsp_HostNew(vlc_object_t *p_this)
898 return httpd_HostCreate(p_this, "rtsp-host", "rtsp-port", NULL);
907 } httpd = { VLC_STATIC_MUTEX, NULL, 0 };
909 static httpd_host_t *httpd_HostCreate(vlc_object_t *p_this,
912 vlc_tls_creds_t *p_tls)
915 char *hostname = var_InheritString(p_this, hostvar);
916 unsigned port = var_InheritInteger(p_this, portvar);
919 vlc_UrlParse(&url, hostname, 0);
921 if (url.i_port != 0) {
922 msg_Err(p_this, "Ignoring port %d (using %d)", url.i_port, port);
923 msg_Info(p_this, "Specify port %d separately with the "
924 "%s option instead.", url.i_port, portvar);
927 /* to be sure to avoid multiple creation */
928 vlc_mutex_lock(&httpd.mutex);
930 /* verify if it already exist */
931 for (int i = 0; i < httpd.i_host; i++) {
932 host = httpd.host[i];
934 /* cannot mix TLS and non-TLS hosts */
935 if (host->port != port
936 || (host->p_tls != NULL) != (p_tls != NULL))
939 /* Increase existing matching host reference count.
940 * The reference count is written under both the global httpd and the
941 * host lock. It is read with either or both locks held. The global
942 * lock is always acquired first. */
943 vlc_mutex_lock(&host->lock);
945 vlc_mutex_unlock(&host->lock);
947 vlc_mutex_unlock(&httpd.mutex);
949 vlc_tls_Delete(p_tls);
953 /* create the new host */
954 host = (httpd_host_t *)vlc_custom_create(p_this, sizeof (*host),
959 vlc_mutex_init(&host->lock);
960 vlc_cond_init(&host->wait);
963 host->fds = net_ListenTCP(p_this, url.psz_host, port);
965 msg_Err(p_this, "cannot create socket(s) for HTTP host");
968 for (host->nfd = 0; host->fds[host->nfd] != -1; host->nfd++);
970 if (vlc_object_waitpipe(VLC_OBJECT(host)) == -1) {
971 msg_Err(host, "signaling pipe error: %s", vlc_strerror_c(errno));
982 /* create the thread */
983 if (vlc_clone(&host->thread, httpd_HostThread, host,
984 VLC_THREAD_PRIORITY_LOW)) {
985 msg_Err(p_this, "cannot spawn http host thread");
989 /* now add it to httpd */
990 TAB_APPEND(httpd.i_host, httpd.host, host);
991 vlc_mutex_unlock(&httpd.mutex);
998 vlc_mutex_unlock(&httpd.mutex);
1001 net_ListenClose(host->fds);
1002 vlc_cond_destroy(&host->wait);
1003 vlc_mutex_destroy(&host->lock);
1004 vlc_object_release(host);
1008 vlc_tls_Delete(p_tls);
1013 void httpd_HostDelete(httpd_host_t *host)
1015 bool delete = false;
1017 vlc_mutex_lock(&httpd.mutex);
1019 vlc_mutex_lock(&host->lock);
1021 if (host->i_ref == 0)
1023 vlc_mutex_unlock(&host->lock);
1026 vlc_mutex_unlock(&httpd.mutex);
1027 msg_Dbg(host, "httpd_HostDelete: host still in use");
1030 TAB_REMOVE(httpd.i_host, httpd.host, host);
1032 vlc_cancel(host->thread);
1033 vlc_join(host->thread, NULL);
1035 msg_Dbg(host, "HTTP host removed");
1037 for (int i = 0; i < host->i_url; i++)
1038 msg_Err(host, "url still registered: %s", host->url[i]->psz_url);
1040 for (int i = 0; i < host->i_client; i++) {
1041 httpd_client_t *cl = host->client[i];
1042 msg_Warn(host, "client still connected");
1043 httpd_ClientClean(cl);
1044 TAB_REMOVE(host->i_client, host->client, cl);
1050 vlc_tls_Delete(host->p_tls);
1051 net_ListenClose(host->fds);
1052 vlc_cond_destroy(&host->wait);
1053 vlc_mutex_destroy(&host->lock);
1054 vlc_object_release(host);
1055 vlc_mutex_unlock(&httpd.mutex);
1058 /* register a new url */
1059 httpd_url_t *httpd_UrlNew(httpd_host_t *host, const char *psz_url,
1060 const char *psz_user, const char *psz_password)
1066 vlc_mutex_lock(&host->lock);
1067 for (int i = 0; i < host->i_url; i++)
1068 if (!strcmp(psz_url, host->url[i]->psz_url)) {
1069 msg_Warn(host, "cannot add '%s' (url already defined)", psz_url);
1070 vlc_mutex_unlock(&host->lock);
1074 url = xmalloc(sizeof(httpd_url_t));
1077 vlc_mutex_init(&url->lock);
1078 url->psz_url = xstrdup(psz_url);
1079 url->psz_user = xstrdup(psz_user ? psz_user : "");
1080 url->psz_password = xstrdup(psz_password ? psz_password : "");
1081 for (int i = 0; i < HTTPD_MSG_MAX; i++) {
1082 url->catch[i].cb = NULL;
1083 url->catch[i].p_sys = NULL;
1086 TAB_APPEND(host->i_url, host->url, url);
1087 vlc_cond_signal(&host->wait);
1088 vlc_mutex_unlock(&host->lock);
1093 /* register callback on a url */
1094 int httpd_UrlCatch(httpd_url_t *url, int i_msg, httpd_callback_t cb,
1095 httpd_callback_sys_t *p_sys)
1097 vlc_mutex_lock(&url->lock);
1098 url->catch[i_msg].cb = cb;
1099 url->catch[i_msg].p_sys= p_sys;
1100 vlc_mutex_unlock(&url->lock);
1106 void httpd_UrlDelete(httpd_url_t *url)
1108 httpd_host_t *host = url->host;
1110 vlc_mutex_lock(&host->lock);
1111 TAB_REMOVE(host->i_url, host->url, url);
1113 vlc_mutex_destroy(&url->lock);
1115 free(url->psz_user);
1116 free(url->psz_password);
1118 for (int i = 0; i < host->i_client; i++) {
1119 httpd_client_t *client = host->client[i];
1121 if (client->url != url)
1124 /* TODO complete it */
1125 msg_Warn(host, "force closing connections");
1126 httpd_ClientClean(client);
1127 TAB_REMOVE(host->i_client, host->client, client);
1132 vlc_mutex_unlock(&host->lock);
1135 static void httpd_MsgInit(httpd_message_t *msg)
1138 msg->i_type = HTTPD_MSG_NONE;
1139 msg->i_proto = HTTPD_PROTO_NONE;
1140 msg->i_version = -1; /* FIXME */
1144 msg->psz_url = NULL;
1145 msg->psz_args = NULL;
1148 msg->p_headers = NULL;
1150 msg->i_body_offset = 0;
1155 static void httpd_MsgClean(httpd_message_t *msg)
1158 free(msg->psz_args);
1159 for (size_t i = 0; i < msg->i_headers; i++) {
1160 free(msg->p_headers[i].name);
1161 free(msg->p_headers[i].value);
1163 free(msg->p_headers);
1168 const char *httpd_MsgGet(const httpd_message_t *msg, const char *name)
1170 for (size_t i = 0; i < msg->i_headers; i++)
1171 if (!strcasecmp(msg->p_headers[i].name, name))
1172 return msg->p_headers[i].value;
1176 void httpd_MsgAdd(httpd_message_t *msg, const char *name, const char *psz_value, ...)
1178 httpd_header *p_tmp = realloc(msg->p_headers, sizeof(httpd_header) * (msg->i_headers + 1));
1182 msg->p_headers = p_tmp;
1184 httpd_header *h = &msg->p_headers[msg->i_headers];
1185 h->name = strdup(name);
1192 va_start(args, psz_value);
1193 int ret = us_vasprintf(&h->value, psz_value, args);
1204 static void httpd_ClientInit(httpd_client_t *cl, mtime_t now)
1206 cl->i_state = HTTPD_CLIENT_RECEIVING;
1207 cl->i_activity_date = now;
1208 cl->i_activity_timeout = INT64_C(10000000);
1209 cl->i_buffer_size = HTTPD_CL_BUFSIZE;
1211 cl->p_buffer = xmalloc(cl->i_buffer_size);
1212 cl->i_keyframe_wait_to_pass = -1;
1213 cl->b_stream_mode = false;
1215 httpd_MsgInit(&cl->query);
1216 httpd_MsgInit(&cl->answer);
1219 char* httpd_ClientIP(const httpd_client_t *cl, char *ip, int *port)
1221 return net_GetPeerAddress(cl->fd, ip, port) ? NULL : ip;
1224 char* httpd_ServerIP(const httpd_client_t *cl, char *ip, int *port)
1226 return net_GetSockAddress(cl->fd, ip, port) ? NULL : ip;
1229 static void httpd_ClientClean(httpd_client_t *cl)
1233 vlc_tls_SessionDelete(cl->p_tls);
1238 httpd_MsgClean(&cl->answer);
1239 httpd_MsgClean(&cl->query);
1242 cl->p_buffer = NULL;
1245 static httpd_client_t *httpd_ClientNew(int fd, vlc_tls_t *p_tls, mtime_t now)
1247 httpd_client_t *cl = malloc(sizeof(httpd_client_t));
1249 if (!cl) return NULL;
1256 httpd_ClientInit(cl, now);
1258 cl->i_state = HTTPD_CLIENT_TLS_HS_OUT;
1264 ssize_t httpd_NetRecv (httpd_client_t *cl, uint8_t *p, size_t i_len)
1271 val = p_tls ? tls_Recv (p_tls, p, i_len)
1272 : recv (cl->fd, p, i_len, 0);
1273 while (val == -1 && errno == EINTR);
1278 ssize_t httpd_NetSend (httpd_client_t *cl, const uint8_t *p, size_t i_len)
1285 val = p_tls ? tls_Send(p_tls, p, i_len)
1286 : send (cl->fd, p, i_len, 0);
1287 while (val == -1 && errno == EINTR);
1294 const char name[16];
1300 { "OPTIONS", HTTPD_MSG_OPTIONS, HTTPD_PROTO_RTSP },
1301 { "DESCRIBE", HTTPD_MSG_DESCRIBE, HTTPD_PROTO_RTSP },
1302 { "SETUP", HTTPD_MSG_SETUP, HTTPD_PROTO_RTSP },
1303 { "PLAY", HTTPD_MSG_PLAY, HTTPD_PROTO_RTSP },
1304 { "PAUSE", HTTPD_MSG_PAUSE, HTTPD_PROTO_RTSP },
1305 { "GET_PARAMETER", HTTPD_MSG_GETPARAMETER, HTTPD_PROTO_RTSP },
1306 { "TEARDOWN", HTTPD_MSG_TEARDOWN, HTTPD_PROTO_RTSP },
1307 { "GET", HTTPD_MSG_GET, HTTPD_PROTO_HTTP },
1308 { "HEAD", HTTPD_MSG_HEAD, HTTPD_PROTO_HTTP },
1309 { "POST", HTTPD_MSG_POST, HTTPD_PROTO_HTTP },
1310 { "", HTTPD_MSG_NONE, HTTPD_PROTO_NONE }
1314 static void httpd_ClientRecv(httpd_client_t *cl)
1318 /* ignore leading whites */
1319 if (cl->query.i_proto == HTTPD_PROTO_NONE && cl->i_buffer == 0) {
1322 i_len = httpd_NetRecv(cl, &c, 1);
1324 if (i_len > 0 && !strchr("\r\n\t ", c)) {
1325 cl->p_buffer[0] = c;
1328 } else if (cl->query.i_proto == HTTPD_PROTO_NONE) {
1329 /* enough to see if it's Interleaved RTP over RTSP or RTSP/HTTP */
1330 i_len = httpd_NetRecv(cl, &cl->p_buffer[cl->i_buffer],
1333 cl->i_buffer += i_len;
1335 /* The smallest legal request is 7 bytes ("GET /\r\n"),
1336 * this is the maximum we can ask at this point. */
1337 if (cl->i_buffer >= 7) {
1338 if (!memcmp(cl->p_buffer, "HTTP/1.", 7)) {
1339 cl->query.i_proto = HTTPD_PROTO_HTTP;
1340 cl->query.i_type = HTTPD_MSG_ANSWER;
1341 } else if (!memcmp(cl->p_buffer, "RTSP/1.", 7)) {
1342 cl->query.i_proto = HTTPD_PROTO_RTSP;
1343 cl->query.i_type = HTTPD_MSG_ANSWER;
1345 /* We need the full request line to determine the protocol. */
1346 cl->query.i_proto = HTTPD_PROTO_HTTP0;
1347 cl->query.i_type = HTTPD_MSG_NONE;
1350 } else if (cl->query.i_body > 0) {
1351 /* we are reading the body of a request or a channel */
1352 assert (cl->query.p_body != NULL);
1353 i_len = httpd_NetRecv(cl, &cl->query.p_body[cl->i_buffer],
1354 cl->query.i_body - cl->i_buffer);
1356 cl->i_buffer += i_len;
1358 if (cl->i_buffer >= cl->query.i_body)
1359 cl->i_state = HTTPD_CLIENT_RECEIVE_DONE;
1360 } else for (;;) { /* we are reading a header -> char by char */
1361 if (cl->i_buffer == cl->i_buffer_size) {
1362 uint8_t *newbuf = realloc(cl->p_buffer, cl->i_buffer_size + 1024);
1368 cl->p_buffer = newbuf;
1369 cl->i_buffer_size += 1024;
1372 i_len = httpd_NetRecv (cl, &cl->p_buffer[cl->i_buffer], 1);
1378 if ((cl->query.i_proto == HTTPD_PROTO_HTTP0)
1379 && (cl->p_buffer[cl->i_buffer - 1] == '\n'))
1381 /* Request line is now complete */
1382 const char *p = memchr(cl->p_buffer, ' ', cl->i_buffer);
1385 assert(cl->query.i_type == HTTPD_MSG_NONE);
1387 if (!p) { /* no URI: evil guy */
1388 i_len = 0; /* drop connection */
1393 p++; /* skips extra spaces */
1396 p = memchr(p, ' ', ((char *)cl->p_buffer) + cl->i_buffer - p);
1397 if (!p) { /* no explicit protocol: HTTP/0.9 */
1398 i_len = 0; /* not supported currently -> drop */
1403 p++; /* skips extra spaces ever again */
1406 len = ((char *)cl->p_buffer) + cl->i_buffer - p;
1407 if (len < 7) /* foreign protocol */
1408 i_len = 0; /* I don't understand -> drop */
1409 else if (!memcmp(p, "HTTP/1.", 7)) {
1410 cl->query.i_proto = HTTPD_PROTO_HTTP;
1411 cl->query.i_version = atoi(p + 7);
1412 } else if (!memcmp(p, "RTSP/1.", 7)) {
1413 cl->query.i_proto = HTTPD_PROTO_RTSP;
1414 cl->query.i_version = atoi(p + 7);
1415 } else if (!memcmp(p, "HTTP/", 5)) {
1416 const uint8_t sorry[] =
1417 "HTTP/1.1 505 Unknown HTTP version\r\n\r\n";
1418 httpd_NetSend(cl, sorry, sizeof(sorry) - 1);
1419 i_len = 0; /* drop */
1420 } else if (!memcmp(p, "RTSP/", 5)) {
1421 const uint8_t sorry[] =
1422 "RTSP/1.0 505 Unknown RTSP version\r\n\r\n";
1423 httpd_NetSend(cl, sorry, sizeof(sorry) - 1);
1424 i_len = 0; /* drop */
1425 } else /* yet another foreign protocol */
1432 if ((cl->i_buffer >= 2 && !memcmp(&cl->p_buffer[cl->i_buffer-2], "\n\n", 2))||
1433 (cl->i_buffer >= 4 && !memcmp(&cl->p_buffer[cl->i_buffer-4], "\r\n\r\n", 4)))
1437 /* we have finished the header so parse it and set i_body */
1438 cl->p_buffer[cl->i_buffer] = '\0';
1440 if (cl->query.i_type == HTTPD_MSG_ANSWER) {
1442 * assume strlen("HTTP/1.x") = 8
1444 cl->query.i_status =
1445 strtol((char *)&cl->p_buffer[8],
1451 cl->query.i_type = HTTPD_MSG_NONE;
1453 for (unsigned i = 0; msg_type[i].name[0]; i++)
1454 if (!strncmp((char *)cl->p_buffer, msg_type[i].name,
1455 strlen(msg_type[i].name))) {
1456 p = (char *)&cl->p_buffer[strlen(msg_type[i].name) + 1 ];
1457 cl->query.i_type = msg_type[i].i_type;
1458 if (cl->query.i_proto != msg_type[i].i_proto) {
1460 cl->query.i_proto = HTTPD_PROTO_NONE;
1461 cl->query.i_type = HTTPD_MSG_NONE;
1467 if (strstr((char *)cl->p_buffer, "HTTP/1."))
1468 cl->query.i_proto = HTTPD_PROTO_HTTP;
1469 else if (strstr((char *)cl->p_buffer, "RTSP/1."))
1470 cl->query.i_proto = HTTPD_PROTO_RTSP;
1478 p2 = strchr(p, ' ');
1482 if (!strncasecmp(p, (cl->query.i_proto == HTTPD_PROTO_HTTP) ? "http:" : "rtsp:", 5)) {
1483 /* Skip hier-part of URL (if present) */
1485 if (!strncmp(p, "//", 2)) { /* skip authority */
1486 /* see RFC3986 §3.2 */
1488 p += strcspn(p, "/?#");
1491 else if (!strncasecmp(p, (cl->query.i_proto == HTTPD_PROTO_HTTP) ? "https:" : "rtsps:", 6)) {
1492 /* Skip hier-part of URL (if present) */
1494 if (!strncmp(p, "//", 2)) { /* skip authority */
1495 /* see RFC3986 §3.2 */
1497 p += strcspn(p, "/?#");
1501 cl->query.psz_url = strdup(p);
1502 if ((p3 = strchr(cl->query.psz_url, '?')) ) {
1504 cl->query.psz_args = (uint8_t *)strdup(p3);
1510 p = strchr(p, '\n');
1513 while (*p == '\n' || *p == '\r')
1518 char *eol = p = strchr(p, '\n');
1521 while (eol && eol >= line && (*eol == '\n' || *eol == '\r'))
1524 if ((colon = strchr(line, ':'))) {
1526 while (*colon == ' ')
1528 httpd_MsgAdd(&cl->query, line, "%s", colon);
1530 if (!strcasecmp(line, "Content-Length"))
1531 cl->query.i_body = atol(colon);
1536 while (*p == '\n' || *p == '\r')
1541 if (cl->query.i_body > 0) {
1542 /* TODO Mhh, handle the case where the client only
1543 * sends a request and closes the connection to
1544 * mark the end of the body (probably only RTSP) */
1545 if (cl->query.i_body >= 65536)
1546 cl->query.p_body = malloc(cl->query.i_body);
1548 cl->query.p_body = NULL;
1550 if (!cl->query.p_body) {
1551 switch (cl->query.i_proto) {
1552 case HTTPD_PROTO_HTTP: {
1553 const uint8_t sorry[] = "HTTP/1.1 413 Request Entity Too Large\r\n\r\n";
1554 httpd_NetSend(cl, sorry, sizeof(sorry) - 1);
1557 case HTTPD_PROTO_RTSP: {
1558 const uint8_t sorry[] = "RTSP/1.0 413 Request Entity Too Large\r\n\r\n";
1559 httpd_NetSend(cl, sorry, sizeof(sorry) - 1);
1563 vlc_assert_unreachable();
1565 i_len = 0; /* drop */
1569 cl->i_state = HTTPD_CLIENT_RECEIVE_DONE;
1573 /* check if the client is to be set to dead */
1575 if ((i_len < 0 && WSAGetLastError() != WSAEWOULDBLOCK) || (i_len == 0))
1577 if ((i_len < 0 && errno != EAGAIN) || (i_len == 0))
1580 if (cl->query.i_proto != HTTPD_PROTO_NONE && cl->query.i_type != HTTPD_MSG_NONE) {
1581 /* connection closed -> end of data */
1582 if (cl->query.i_body > 0)
1583 cl->query.i_body = cl->i_buffer;
1584 cl->i_state = HTTPD_CLIENT_RECEIVE_DONE;
1587 cl->i_state = HTTPD_CLIENT_DEAD;
1590 /* XXX: for QT I have to disable timeout. Try to find why */
1591 if (cl->query.i_proto == HTTPD_PROTO_RTSP)
1592 cl->i_activity_timeout = 0;
1595 static void httpd_ClientSend(httpd_client_t *cl)
1599 if (cl->i_buffer < 0) {
1600 /* We need to create the header */
1603 const char *psz_status = httpd_ReasonFromCode(cl->answer.i_status);
1605 i_size = strlen("HTTP/1.") + 10 + 10 + strlen(psz_status) + 5;
1606 for (size_t i = 0; i < cl->answer.i_headers; i++)
1607 i_size += strlen(cl->answer.p_headers[i].name) + 2 +
1608 strlen(cl->answer.p_headers[i].value) + 2;
1610 if (cl->i_buffer_size < i_size) {
1611 cl->i_buffer_size = i_size;
1613 cl->p_buffer = xmalloc(i_size);
1615 p = (char *)cl->p_buffer;
1617 p += sprintf(p, "%s.%u %d %s\r\n",
1618 cl->answer.i_proto == HTTPD_PROTO_HTTP ? "HTTP/1" : "RTSP/1",
1619 cl->answer.i_version,
1620 cl->answer.i_status, psz_status);
1621 for (size_t i = 0; i < cl->answer.i_headers; i++)
1622 p += sprintf(p, "%s: %s\r\n", cl->answer.p_headers[i].name,
1623 cl->answer.p_headers[i].value);
1624 p += sprintf(p, "\r\n");
1627 cl->i_buffer_size = (uint8_t*)p - cl->p_buffer;
1630 i_len = httpd_NetSend(cl, &cl->p_buffer[cl->i_buffer],
1631 cl->i_buffer_size - cl->i_buffer);
1633 cl->i_buffer += i_len;
1635 if (cl->i_buffer >= cl->i_buffer_size) {
1636 if (cl->answer.i_body == 0 && cl->answer.i_body_offset > 0) {
1637 /* catch more body data */
1638 int i_msg = cl->query.i_type;
1639 int64_t i_offset = cl->answer.i_body_offset;
1641 httpd_MsgClean(&cl->answer);
1642 cl->answer.i_body_offset = i_offset;
1644 cl->url->catch[i_msg].cb(cl->url->catch[i_msg].p_sys, cl,
1645 &cl->answer, &cl->query);
1648 if (cl->answer.i_body > 0) {
1649 /* send the body data */
1651 cl->p_buffer = cl->answer.p_body;
1652 cl->i_buffer_size = cl->answer.i_body;
1655 cl->answer.i_body = 0;
1656 cl->answer.p_body = NULL;
1657 } else /* send finished */
1658 cl->i_state = HTTPD_CLIENT_SEND_DONE;
1662 if ((i_len < 0 && WSAGetLastError() != WSAEWOULDBLOCK) || (i_len == 0))
1664 if ((i_len < 0 && errno != EAGAIN) || (i_len == 0))
1668 cl->i_state = HTTPD_CLIENT_DEAD;
1673 static void httpd_ClientTlsHandshake(httpd_client_t *cl)
1675 switch (vlc_tls_SessionHandshake(cl->p_tls, NULL, NULL, NULL))
1677 case -1: cl->i_state = HTTPD_CLIENT_DEAD; break;
1678 case 0: cl->i_state = HTTPD_CLIENT_RECEIVING; break;
1679 case 1: cl->i_state = HTTPD_CLIENT_TLS_HS_IN; break;
1680 case 2: cl->i_state = HTTPD_CLIENT_TLS_HS_OUT; break;
1684 static bool httpdAuthOk(const char *user, const char *pass, const char *b64)
1686 if (!*user && !*pass)
1692 if (strncasecmp(b64, "BASIC", 5))
1699 char *given_user = vlc_b64_decode(b64);
1703 char *given_pass = NULL;
1704 given_pass = strchr (given_user, ':');
1708 *given_pass++ = '\0';
1710 if (strcmp (given_user, user))
1713 if (strcmp (given_pass, pass))
1724 static void httpdLoop(httpd_host_t *host)
1726 struct pollfd ufd[host->nfd + host->i_client];
1728 for (nfd = 0; nfd < host->nfd; nfd++) {
1729 ufd[nfd].fd = host->fds[nfd];
1730 ufd[nfd].events = POLLIN;
1731 ufd[nfd].revents = 0;
1734 /* add all socket that should be read/write and close dead connection */
1735 while (host->i_url <= 0) {
1736 mutex_cleanup_push(&host->lock);
1737 vlc_cond_wait(&host->wait, &host->lock);
1741 mtime_t now = mdate();
1742 bool b_low_delay = false;
1744 int canc = vlc_savecancel();
1745 for (int i_client = 0; i_client < host->i_client; i_client++) {
1747 httpd_client_t *cl = host->client[i_client];
1748 if (cl->i_ref < 0 || (cl->i_ref == 0 &&
1749 (cl->i_state == HTTPD_CLIENT_DEAD ||
1750 (cl->i_activity_timeout > 0 &&
1751 cl->i_activity_date+cl->i_activity_timeout < now)))) {
1752 httpd_ClientClean(cl);
1753 TAB_REMOVE(host->i_client, host->client, cl);
1759 struct pollfd *pufd = ufd + nfd;
1760 assert (pufd < ufd + (sizeof (ufd) / sizeof (ufd[0])));
1763 pufd->events = pufd->revents = 0;
1765 switch (cl->i_state) {
1766 case HTTPD_CLIENT_RECEIVING:
1767 case HTTPD_CLIENT_TLS_HS_IN:
1768 pufd->events = POLLIN;
1771 case HTTPD_CLIENT_SENDING:
1772 case HTTPD_CLIENT_TLS_HS_OUT:
1773 pufd->events = POLLOUT;
1776 case HTTPD_CLIENT_RECEIVE_DONE: {
1777 httpd_message_t *answer = &cl->answer;
1778 httpd_message_t *query = &cl->query;
1780 httpd_MsgInit(answer);
1782 /* Handle what we received */
1783 switch (query->i_type) {
1784 case HTTPD_MSG_ANSWER:
1786 cl->i_state = HTTPD_CLIENT_DEAD;
1789 case HTTPD_MSG_OPTIONS:
1790 answer->i_type = HTTPD_MSG_ANSWER;
1791 answer->i_proto = query->i_proto;
1792 answer->i_status = 200;
1794 answer->p_body = NULL;
1796 httpd_MsgAdd(answer, "Server", "VLC/%s", VERSION);
1797 httpd_MsgAdd(answer, "Content-Length", "0");
1799 switch(query->i_proto) {
1800 case HTTPD_PROTO_HTTP:
1801 answer->i_version = 1;
1802 httpd_MsgAdd(answer, "Allow", "GET,HEAD,POST,OPTIONS");
1805 case HTTPD_PROTO_RTSP:
1806 answer->i_version = 0;
1808 const char *p = httpd_MsgGet(query, "Cseq");
1810 httpd_MsgAdd(answer, "Cseq", "%s", p);
1811 p = httpd_MsgGet(query, "Timestamp");
1813 httpd_MsgAdd(answer, "Timestamp", "%s", p);
1815 p = httpd_MsgGet(query, "Require");
1817 answer->i_status = 551;
1818 httpd_MsgAdd(query, "Unsupported", "%s", p);
1821 httpd_MsgAdd(answer, "Public", "DESCRIBE,SETUP,"
1822 "TEARDOWN,PLAY,PAUSE,GET_PARAMETER");
1826 cl->i_buffer = -1; /* Force the creation of the answer in
1827 * httpd_ClientSend */
1828 cl->i_state = HTTPD_CLIENT_SENDING;
1831 case HTTPD_MSG_NONE:
1832 if (query->i_proto == HTTPD_PROTO_NONE) {
1834 cl->i_state = HTTPD_CLIENT_DEAD;
1837 answer->i_proto = query->i_proto ;
1838 answer->i_type = HTTPD_MSG_ANSWER;
1839 answer->i_version= 0;
1840 answer->i_status = 501;
1843 answer->i_body = httpd_HtmlError (&p, 501, NULL);
1844 answer->p_body = (uint8_t *)p;
1845 httpd_MsgAdd(answer, "Content-Length", "%d", answer->i_body);
1847 cl->i_buffer = -1; /* Force the creation of the answer in httpd_ClientSend */
1848 cl->i_state = HTTPD_CLIENT_SENDING;
1853 int i_msg = query->i_type;
1854 bool b_auth_failed = false;
1856 /* Search the url and trigger callbacks */
1857 for (int i = 0; i < host->i_url; i++) {
1858 httpd_url_t *url = host->url[i];
1860 if (strcmp(url->psz_url, query->psz_url))
1862 if (!url->catch[i_msg].cb)
1866 b_auth_failed = !httpdAuthOk(url->psz_user,
1868 httpd_MsgGet(query, "Authorization")); /* BASIC id */
1873 if (url->catch[i_msg].cb(url->catch[i_msg].p_sys, cl, answer, query))
1876 if (answer->i_proto == HTTPD_PROTO_NONE)
1877 cl->i_buffer = cl->i_buffer_size; /* Raw answer from a CGI */
1881 /* only one url can answer */
1888 answer->i_proto = query->i_proto;
1889 answer->i_type = HTTPD_MSG_ANSWER;
1890 answer->i_version= 0;
1892 if (b_auth_failed) {
1893 httpd_MsgAdd(answer, "WWW-Authenticate",
1894 "Basic realm=\"VLC stream\"");
1895 answer->i_status = 401;
1897 answer->i_status = 404; /* no url registered */
1900 answer->i_body = httpd_HtmlError (&p, answer->i_status,
1902 answer->p_body = (uint8_t *)p;
1904 cl->i_buffer = -1; /* Force the creation of the answer in httpd_ClientSend */
1905 httpd_MsgAdd(answer, "Content-Length", "%d", answer->i_body);
1906 httpd_MsgAdd(answer, "Content-Type", "%s", "text/html");
1909 cl->i_state = HTTPD_CLIENT_SENDING;
1915 case HTTPD_CLIENT_SEND_DONE:
1916 if (!cl->b_stream_mode || cl->answer.i_body_offset == 0) {
1917 const char *psz_connection = httpd_MsgGet(&cl->answer, "Connection");
1918 const char *psz_query = httpd_MsgGet(&cl->query, "Connection");
1919 bool b_connection = false;
1920 bool b_keepalive = false;
1921 bool b_query = false;
1924 if (psz_connection) {
1925 b_connection = (strcasecmp(psz_connection, "Close") == 0);
1926 b_keepalive = (strcasecmp(psz_connection, "Keep-Alive") == 0);
1930 b_query = (strcasecmp(psz_query, "Close") == 0);
1932 if (((cl->query.i_proto == HTTPD_PROTO_HTTP) &&
1933 ((cl->query.i_version == 0 && b_keepalive) ||
1934 (cl->query.i_version == 1 && !b_connection))) ||
1935 ((cl->query.i_proto == HTTPD_PROTO_RTSP) &&
1936 !b_query && !b_connection)) {
1937 httpd_MsgClean(&cl->query);
1938 httpd_MsgInit(&cl->query);
1941 cl->i_buffer_size = 1000;
1943 cl->p_buffer = xmalloc(cl->i_buffer_size);
1944 cl->i_state = HTTPD_CLIENT_RECEIVING;
1946 cl->i_state = HTTPD_CLIENT_DEAD;
1947 httpd_MsgClean(&cl->answer);
1949 i_offset = cl->answer.i_body_offset;
1950 httpd_MsgClean(&cl->answer);
1952 cl->answer.i_body_offset = i_offset;
1954 cl->p_buffer = NULL;
1956 cl->i_buffer_size = 0;
1958 cl->i_state = HTTPD_CLIENT_WAITING;
1962 case HTTPD_CLIENT_WAITING:
1963 i_offset = cl->answer.i_body_offset;
1964 int i_msg = cl->query.i_type;
1966 httpd_MsgInit(&cl->answer);
1967 cl->answer.i_body_offset = i_offset;
1969 cl->url->catch[i_msg].cb(cl->url->catch[i_msg].p_sys, cl,
1970 &cl->answer, &cl->query);
1971 if (cl->answer.i_type != HTTPD_MSG_NONE) {
1972 /* we have new data, so re-enter send mode */
1974 cl->p_buffer = cl->answer.p_body;
1975 cl->i_buffer_size = cl->answer.i_body;
1976 cl->answer.p_body = NULL;
1977 cl->answer.i_body = 0;
1978 cl->i_state = HTTPD_CLIENT_SENDING;
1982 if (pufd->events != 0)
1987 vlc_mutex_unlock(&host->lock);
1988 vlc_restorecancel(canc);
1990 /* we will wait 20ms (not too big) if HTTPD_CLIENT_WAITING */
1991 int ret = poll(ufd, nfd, b_low_delay ? 20 : -1);
1993 canc = vlc_savecancel();
1994 vlc_mutex_lock(&host->lock);
1997 if (errno != EINTR) {
1998 /* Kernel on low memory or a bug: pace */
1999 msg_Err(host, "polling error: %s", vlc_strerror_c(errno));
2003 vlc_restorecancel(canc);
2007 /* Handle client sockets */
2011 for (int i_client = 0; i_client < host->i_client; i_client++) {
2012 httpd_client_t *cl = host->client[i_client];
2013 const struct pollfd *pufd = &ufd[nfd];
2015 assert(pufd < &ufd[sizeof(ufd) / sizeof(ufd[0])]);
2017 if (cl->fd != pufd->fd)
2018 continue; // we were not waiting for this client
2020 if (pufd->revents == 0)
2021 continue; // no event received
2023 cl->i_activity_date = now;
2025 switch (cl->i_state) {
2026 case HTTPD_CLIENT_RECEIVING: httpd_ClientRecv(cl); break;
2027 case HTTPD_CLIENT_SENDING: httpd_ClientSend(cl); break;
2028 case HTTPD_CLIENT_TLS_HS_IN:
2029 case HTTPD_CLIENT_TLS_HS_OUT: httpd_ClientTlsHandshake(cl); break;
2033 /* Handle server sockets (accept new connections) */
2034 for (nfd = 0; nfd < host->nfd; nfd++) {
2036 int fd = ufd[nfd].fd;
2038 assert (fd == host->fds[nfd]);
2040 if (ufd[nfd].revents == 0)
2044 fd = vlc_accept (fd, NULL, NULL, true);
2047 setsockopt (fd, SOL_SOCKET, SO_REUSEADDR,
2048 &(int){ 1 }, sizeof(int));
2052 if (host->p_tls != NULL)
2054 const char *alpn[] = { "http/1.1", NULL };
2056 p_tls = vlc_tls_SessionCreate(host->p_tls, fd, NULL, alpn);
2061 cl = httpd_ClientNew(fd, p_tls, now);
2063 TAB_APPEND(host->i_client, host->client, cl);
2066 vlc_restorecancel(canc);
2069 static void* httpd_HostThread(void *data)
2071 httpd_host_t *host = data;
2073 vlc_mutex_lock(&host->lock);
2074 while (host->i_ref > 0)
2076 vlc_mutex_unlock(&host->lock);
2080 int httpd_StreamSetHTTPHeaders(httpd_stream_t * p_stream, httpd_header * p_headers, size_t i_headers)
2083 return VLC_EGENERIC;
2085 vlc_mutex_lock(&p_stream->lock);
2086 if (p_stream->p_http_headers) {
2087 for (size_t i = 0; i < p_stream->i_http_headers; i++) {
2088 free(p_stream->p_http_headers[i].name);
2089 free(p_stream->p_http_headers[i].value);
2091 free(p_stream->p_http_headers);
2092 p_stream->p_http_headers = NULL;
2093 p_stream->i_http_headers = 0;
2096 if (!p_headers || !i_headers) {
2097 vlc_mutex_unlock(&p_stream->lock);
2101 p_stream->p_http_headers = malloc(sizeof(httpd_header) * i_headers);
2102 if (!p_stream->p_http_headers) {
2103 vlc_mutex_unlock(&p_stream->lock);
2108 for (size_t i = 0; i < i_headers; i++) {
2109 if (unlikely(!p_headers[i].name || !p_headers[i].value))
2112 p_stream->p_http_headers[j].name = strdup(p_headers[i].name);
2113 p_stream->p_http_headers[j].value = strdup(p_headers[i].value);
2115 if (unlikely(!p_stream->p_http_headers[j].name ||
2116 !p_stream->p_http_headers[j].value)) {
2117 free(p_stream->p_http_headers[j].name);
2118 free(p_stream->p_http_headers[j].value);
2123 p_stream->i_http_headers = j;
2124 vlc_mutex_unlock(&p_stream->lock);