+ if (line.parameters.size() > 0 ||
+ line.arguments.size() != 1) {
+ log(ERROR, "'%s' takes one argument and no parameters", keyword.c_str());
+ return false;
+ }
+ *value = stoi(line.arguments[0]); // TODO: verify int validity.
+ return true;
+ }
+ return false;
+}
+
+bool load_file_to_string(const string &filename, size_t max_size, string *contents)
+{
+ contents->clear();
+
+ FILE *fp = fopen(filename.c_str(), "r");
+ if (fp == nullptr) {
+ log_perror(filename.c_str());
+ return false;
+ }
+
+ char buf[4096];
+ while (!feof(fp)) {
+ size_t ret = fread(buf, 1, sizeof(buf), fp);
+ if (ret > 0) {
+ contents->append(buf, buf + ret);
+ } else {
+ if (ferror(fp)) {
+ log_perror(filename.c_str());
+ fclose(fp);
+ return false;
+ }
+ assert(feof(fp));
+ break;
+ }
+
+ if (contents->size() > max_size) {
+ log(ERROR, "%s was longer than the maximum allowed %zu bytes", filename.c_str(), max_size);
+ fclose(fp);
+ return false;
+ }
+ }
+ fclose(fp);
+ return true;
+}
+
+bool parse_tls_parameters(const unordered_map<string, string> ¶meters, AcceptorConfig *acceptor)
+{
+ bool has_cert = false, has_key = false;
+
+ auto tls_cert_it = parameters.find("tls_cert");
+ if (tls_cert_it != parameters.end()) {
+ if (!load_file_to_string(tls_cert_it->second, 1048576, &acceptor->certificate_chain)) {
+ return false;
+ }
+
+ // Verify that the certificate is valid.
+ bool is_server = true;
+ TLSContext *server_context = tls_create_context(is_server, TLS_V12);
+ int num_cert = tls_load_certificates(
+ server_context,
+ reinterpret_cast<const unsigned char *>(acceptor->certificate_chain.data()),
+ acceptor->certificate_chain.size());
+ if (num_cert < 0) {
+ log_tls_error(tls_cert_it->second.c_str(), num_cert);
+ tls_destroy_context(server_context);
+ return false;
+ } else if (num_cert == 0) {
+ log(ERROR, "%s did not contain any certificates", tls_cert_it->second.c_str());
+ return false;
+ }
+ tls_destroy_context(server_context);
+ has_cert = true;
+ }
+
+ auto tls_key_it = parameters.find("tls_key");
+ if (tls_key_it != parameters.end()) {
+ if (!load_file_to_string(tls_key_it->second, 1048576, &acceptor->private_key)) {
+ return false;
+ }
+
+ // Verify that the key is valid.
+ bool is_server = true;
+ TLSContext *server_context = tls_create_context(is_server, TLS_V12);
+ int num_keys = tls_load_private_key(
+ server_context,
+ reinterpret_cast<const unsigned char *>(acceptor->private_key.data()),
+ acceptor->private_key.size());
+ if (num_keys < 0) {
+ log_tls_error(tls_key_it->second.c_str(), num_keys);
+ tls_destroy_context(server_context);
+ return false;
+ } else if (num_keys == 0) {
+ log(ERROR, "%s did not contain any private keys", tls_key_it->second.c_str());
+ return false;
+ }
+ tls_destroy_context(server_context);
+ has_key = true;
+ }
+
+ if (has_cert != has_key) {
+ log(ERROR, "Only one of tls_cert= and tls_key= was given, needs zero or both");
+ return false;
+ }
+
+ return true;
+}
+
+
+bool parse_port(const ConfigLine &line, Config *config)
+{
+ if (line.arguments.size() != 1) {
+ log(ERROR, "'port' takes exactly one argument");
+ return false;
+ }
+
+ int port = stoi(line.arguments[0]);
+ if (port < 1 || port >= 65536) {
+ log(ERROR, "port %d is out of range (must be [1,65536>).", port);
+ return false;
+ }
+
+ AcceptorConfig acceptor;
+ acceptor.addr = create_any_address(port);
+
+ if (!parse_tls_parameters(line.parameters, &acceptor)) {
+ return false;
+ }
+ config->acceptors.push_back(acceptor);
+ return true;
+}
+
+bool parse_listen(const ConfigLine &line, Config *config)
+{
+ if (line.arguments.size() != 1) {
+ log(ERROR, "'listen' takes exactly one argument");
+ return false;
+ }
+
+ AcceptorConfig acceptor;
+ if (!parse_hostport(line.arguments[0], &acceptor.addr)) {
+ return false;
+ }
+ if (!parse_tls_parameters(line.parameters, &acceptor)) {
+ return false;
+ }
+ config->acceptors.push_back(acceptor);
+ return true;
+}
+
+bool parse_stream(const ConfigLine &line, Config *config)
+{
+ if (line.arguments.size() != 1) {
+ log(ERROR, "'stream' takes exactly one argument");
+ return false;
+ }
+
+ StreamConfig stream;
+ stream.url = line.arguments[0];
+
+ const auto src_it = line.parameters.find("src");
+ bool input_is_udp = false;
+ if (src_it == line.parameters.end()) {
+ log(WARNING, "stream '%s' has no src= attribute, clients will not get any data.",
+ stream.url.c_str());
+ } else {
+ stream.src = src_it->second;
+
+ string protocol, user, host, port, path;
+ if (!parse_url(stream.src, &protocol, &user, &host, &port, &path)) {
+ log(ERROR, "could not parse URL '%s'", stream.src.c_str());
+ return false;
+ }
+ if (protocol == "udp") {
+ input_is_udp = true;
+ }
+ }
+
+ const auto backlog_it = line.parameters.find("backlog_size");
+ if (backlog_it == line.parameters.end()) {
+ stream.backlog_size = DEFAULT_BACKLOG_SIZE;
+ } else {
+ stream.backlog_size = stoll(backlog_it->second);
+ }
+
+ const auto prebuffer_it = line.parameters.find("force_prebuffer");
+ if (prebuffer_it == line.parameters.end()) {
+ stream.prebuffering_bytes = 0;
+ } else {
+ stream.prebuffering_bytes = stoll(prebuffer_it->second);
+ }
+
+ // Parse output encoding.
+ const auto encoding_parm_it = line.parameters.find("encoding");
+ if (encoding_parm_it == line.parameters.end() ||
+ encoding_parm_it->second == "raw") {
+ stream.encoding = StreamConfig::STREAM_ENCODING_RAW;
+ } else if (encoding_parm_it->second == "metacube") {
+ stream.encoding = StreamConfig::STREAM_ENCODING_METACUBE;
+ } else {
+ log(ERROR, "Parameter 'encoding' must be either 'raw' (default) or 'metacube'");
+ return false;
+ }
+
+ // Parse input encoding.
+ const auto src_encoding_parm_it = line.parameters.find("src_encoding");
+ if (src_encoding_parm_it == line.parameters.end()) {
+ stream.src_encoding = input_is_udp ? StreamConfig::STREAM_ENCODING_RAW : StreamConfig::STREAM_ENCODING_METACUBE;
+ } else if (src_encoding_parm_it->second == "metacube") {
+ if (input_is_udp) {
+ log(ERROR, "UDP streams cannot have Metacube input");
+ return false;
+ }
+ stream.src_encoding = StreamConfig::STREAM_ENCODING_METACUBE;
+ } else if (src_encoding_parm_it->second == "raw") {
+ stream.src_encoding = StreamConfig::STREAM_ENCODING_RAW;
+ } else {
+ log(ERROR, "Parameter 'src_encoding' must be either 'raw' (default for UDP) or 'metacube' (default for HTTP)");
+ return false;
+ }
+
+ // Parse the pacing rate, converting from kilobits to bytes as needed.
+ const auto pacing_rate_it = line.parameters.find("pacing_rate_kbit");
+ if (pacing_rate_it == line.parameters.end()) {
+ stream.pacing_rate = ~0U;
+ } else {
+ stream.pacing_rate = stoll(pacing_rate_it->second.c_str()) * 1024 / 8;
+ }
+
+ // Parse the HLS URL, if any.
+ const auto hls_url_it = line.parameters.find("hls_playlist");
+ if (hls_url_it != line.parameters.end()) {
+ stream.hls_url = hls_url_it->second;
+ if (stream.hls_url.empty()) {
+ log(ERROR, "Parameter 'hls_playlist' was given but empty");
+ return false;
+ }
+ if (stream.encoding == StreamConfig::STREAM_ENCODING_METACUBE) {
+ log(ERROR, "HLS cannot be used with Metacube output");
+ return false;
+ }
+ }
+
+ // Parse the HLS fragment duration, if any.
+ const auto hls_frag_duration_it = line.parameters.find("hls_frag_duration");
+ if (hls_frag_duration_it != line.parameters.end()) {
+ if (stream.hls_url.empty()) {
+ log(ERROR, "Parameter 'hls_frag_duration' given, but no 'hls_playlist' given");
+ return false;
+ }
+ stream.hls_frag_duration = stoi(hls_frag_duration_it->second);
+ if (stream.hls_frag_duration <= 0) {
+ log(ERROR, "'hls_frag_duration' must be a strictly positive integer");
+ return false;
+ }
+ }
+
+ // Parse the HLS backlog margin, if any.
+ const auto hls_backlog_margin_it = line.parameters.find("hls_backlog_margin");
+ if (hls_backlog_margin_it != line.parameters.end()) {
+ if (stream.hls_url.empty()) {
+ log(ERROR, "Parameter 'hls_backlog_margin' given, but no 'hls_playlist' given");
+ return false;
+ }
+ stream.hls_backlog_margin = stoi(hls_backlog_margin_it->second);
+ if (stream.hls_backlog_margin >= stream.backlog_size) {
+ log(ERROR, "'hls_backlog_margin' must be nonnegative, but less than the backlog size");
+ return false;
+ }
+ }
+
+ // Parse the CORS origin, if it exists.
+ const auto allow_origin_it = line.parameters.find("allow_origin");
+ if (allow_origin_it != line.parameters.end()) {
+ stream.allow_origin = allow_origin_it->second;
+ }
+
+ config->streams.push_back(stream);
+ return true;
+}
+
+bool parse_udpstream(const ConfigLine &line, Config *config)
+{
+ if (line.arguments.size() != 1) {
+ log(ERROR, "'udpstream' takes exactly one argument");
+ return false;
+ }
+
+ UDPStreamConfig udpstream;
+
+ string hostport = line.arguments[0];
+ if (!parse_hostport(hostport, &udpstream.dst)) {
+ return false;
+ }
+
+ const auto src_it = line.parameters.find("src");
+ if (src_it == line.parameters.end()) {
+ // This is pretty meaningless, but OK, consistency is good.
+ log(WARNING, "udpstream to %s has no src= attribute, clients will not get any data.",
+ hostport.c_str());
+ } else {
+ udpstream.src = src_it->second;
+ // TODO: Verify that the URL is parseable?
+ }
+
+ // Parse the pacing rate, converting from kilobits to bytes as needed.
+ const auto pacing_rate_it = line.parameters.find("pacing_rate_kbit");
+ if (pacing_rate_it == line.parameters.end()) {
+ udpstream.pacing_rate = ~0U;
+ } else {
+ udpstream.pacing_rate = stoi(pacing_rate_it->second) * 1024 / 8;
+ }
+
+ // Parse the TTL. The same value is used for unicast and multicast.
+ const auto ttl_it = line.parameters.find("ttl");
+ if (ttl_it == line.parameters.end()) {
+ udpstream.ttl = -1;
+ } else {
+ udpstream.ttl = stoi(ttl_it->second);
+ }
+
+ // Parse the multicast interface index.
+ const auto multicast_iface_it = line.parameters.find("multicast_output_interface");
+ if (multicast_iface_it == line.parameters.end()) {
+ udpstream.multicast_iface_index = -1;
+ } else {
+ udpstream.multicast_iface_index = if_nametoindex(multicast_iface_it->second.c_str());
+ if (udpstream.multicast_iface_index == 0) {
+ log(ERROR, "Interface '%s' does not exist", multicast_iface_it->second.c_str());
+ return false;