mirror of https://github.com/sipwise/kamailio.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
295 lines
8.2 KiB
295 lines
8.2 KiB
/*
|
|
* $Id$
|
|
*
|
|
* Copyright (C) 2001-2003 FhG Fokus
|
|
*
|
|
* This file is part of ser, a free SIP server.
|
|
*
|
|
* ser is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version
|
|
*
|
|
* For a license to use the ser software under conditions
|
|
* other than those described here, or to purchase support for this
|
|
* software, please contact iptel.org by e-mail at the following addresses:
|
|
* info@iptel.org
|
|
*
|
|
* ser is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
/*
|
|
* History:
|
|
* -------
|
|
* 2001-??-?? created by andrei
|
|
* ????-??-?? lots of changes by a lot of people
|
|
* 2003-02-11 added inline msg_send (andrei)
|
|
* 2003-04-07 changed all ports to host byte order (andrei)
|
|
* 2003-04-12 FORCE_RPORT_T added (andrei)
|
|
* 2003-04-15 added tcp_disable support (andrei)
|
|
* 2006-04-12 reduced msg_send() parameter list: it uses now a struct
|
|
* dest_info param. (andrei)
|
|
* 2007-10-08 msg_send() will ignore a mcast send_sock and choose another
|
|
* one by itself (andrei)
|
|
*/
|
|
|
|
|
|
|
|
#ifndef forward_h
|
|
#define forward_h
|
|
|
|
#include "globals.h"
|
|
#include "parser/msg_parser.h"
|
|
#include "route.h"
|
|
#include "proxy.h"
|
|
#include "ip_addr.h"
|
|
|
|
#include "stats.h"
|
|
#include "udp_server.h"
|
|
#ifdef USE_TCP
|
|
#include "tcp_server.h"
|
|
#include "tcp_conn.h"
|
|
#endif
|
|
#ifdef USE_SCTP
|
|
#include "sctp_core.h"
|
|
#endif
|
|
|
|
#include "compiler_opt.h"
|
|
#include "events.h"
|
|
|
|
|
|
enum ss_mismatch {
|
|
SS_MISMATCH_OK=0,
|
|
SS_MISMATCH_PROTO, /* proto mismatch, but found same addr:port */
|
|
SS_MISMATCH_ADDR, /* proto and addr:port mismatch */
|
|
SS_MISMATCH_AF, /* af mismatch */
|
|
SS_MISMATCH_MCAST /* mcast forced send socket */
|
|
};
|
|
|
|
struct socket_info* get_send_socket2(struct socket_info* force_send_socket,
|
|
union sockaddr_union* su, int proto,
|
|
enum ss_mismatch* mismatch);
|
|
|
|
|
|
inline static struct socket_info* get_send_socket(struct sip_msg* msg,
|
|
union sockaddr_union* su, int proto)
|
|
{
|
|
return get_send_socket2(msg?msg->force_send_socket:0, su, proto, 0);
|
|
}
|
|
|
|
|
|
#define GET_URI_PORT(uri) ((uri)->port_no?(uri)->port_no:(((uri)->proto==PROTO_TLS)?SIPS_PORT:SIP_PORT))
|
|
|
|
struct socket_info* get_out_socket(union sockaddr_union* to, int proto);
|
|
typedef int (*check_self_f)(str* host, unsigned short port,
|
|
unsigned short proto);
|
|
int register_check_self_func(check_self_f f);
|
|
int check_self(str* host, unsigned short port, unsigned short proto);
|
|
int check_self_port(unsigned short port, unsigned short proto);
|
|
int forward_request( struct sip_msg* msg, str* dst, unsigned short port,
|
|
struct dest_info* send_info);
|
|
int update_sock_struct_from_via( union sockaddr_union* to,
|
|
struct sip_msg* msg,
|
|
struct via_body* via );
|
|
|
|
/* use src_ip, port=src_port if rport, via port if via port, 5060 otherwise */
|
|
#define update_sock_struct_from_ip( to, msg ) \
|
|
init_su((to), &(msg)->rcv.src_ip, \
|
|
(((msg)->via1->rport)|| \
|
|
(((msg)->msg_flags|global_req_flags)&FL_FORCE_RPORT))? \
|
|
(msg)->rcv.src_port: \
|
|
((msg)->via1->port)?(msg)->via1->port: SIP_PORT )
|
|
|
|
int forward_reply( struct sip_msg* msg);
|
|
int forward_reply_nocb( struct sip_msg* msg);
|
|
|
|
int is_check_self_func_list_set(void);
|
|
|
|
|
|
/* params:
|
|
* dst = struct dest_info containing:
|
|
* send_sock = 0 if not known (e.g. for udp in some cases), non-0 otherwise;
|
|
* if 0 or mcast a new send_sock will be automatically choosen
|
|
* proto = TCP|UDP
|
|
* to = destination (sockaddr_union)
|
|
* id = only used on tcp, it will force sending on connection "id" if id!=0
|
|
* and the connection exists, else it will send to "to"
|
|
* (useful for sending replies on the same connection as the request
|
|
* that generated them; use 0 if you don't want this)
|
|
* buf, len = buffer
|
|
* returns: 0 if ok, -1 on error*/
|
|
|
|
static inline int msg_send(struct dest_info* dst, char* buf, int len)
|
|
{
|
|
struct dest_info new_dst;
|
|
str outb;
|
|
#ifdef USE_TCP
|
|
int port;
|
|
struct ip_addr ip;
|
|
union sockaddr_union* from = NULL;
|
|
union sockaddr_union local_addr;
|
|
struct tcp_connection *con = NULL;
|
|
struct ws_event_info wsev;
|
|
int ret;
|
|
#endif
|
|
|
|
outb.s = buf;
|
|
outb.len = len;
|
|
sr_event_exec(SREV_NET_DATA_OUT, (void*)&outb);
|
|
|
|
if(outb.s==NULL) {
|
|
LM_ERR("failed to update outgoing buffer\n");
|
|
return -1;
|
|
}
|
|
|
|
#ifdef USE_TCP
|
|
if (unlikely((dst->proto == PROTO_WS
|
|
#ifdef USE_TLS
|
|
|| dst->proto == PROTO_WSS
|
|
#endif
|
|
) && sr_event_enabled(SREV_TCP_WS_FRAME_OUT))) {
|
|
if (unlikely(dst->send_flags.f & SND_F_FORCE_SOCKET
|
|
&& dst->send_sock)) {
|
|
local_addr = dst->send_sock->su;
|
|
su_setport(&local_addr, 0); /* any local port will do */
|
|
from = &local_addr;
|
|
}
|
|
|
|
port = su_getport(&dst->to);
|
|
if (likely(port)) {
|
|
su2ip_addr(&ip, &dst->to);
|
|
con = tcpconn_get(dst->id, &ip, port, from, 0);
|
|
}
|
|
else if (likely(dst->id))
|
|
con = tcpconn_get(dst->id, 0, 0, 0, 0);
|
|
else {
|
|
LM_CRIT("BUG: msg_send called with null_id & to\n");
|
|
goto error;
|
|
}
|
|
|
|
if (con == NULL)
|
|
{
|
|
LM_WARN("TCP/TLS connection for WebSocket could not be found\n");
|
|
goto error;
|
|
}
|
|
|
|
memset(&wsev, 0, sizeof(ws_event_info_t));
|
|
wsev.type = SREV_TCP_WS_FRAME_OUT;
|
|
wsev.buf = outb.s;
|
|
wsev.len = outb.len;
|
|
wsev.id = con->id;
|
|
ret = sr_event_exec(SREV_TCP_WS_FRAME_OUT, (void *) &wsev);
|
|
tcpconn_put(con);
|
|
goto done;
|
|
}
|
|
#endif
|
|
|
|
if (likely(dst->proto==PROTO_UDP)){
|
|
if (unlikely((dst->send_sock==0) ||
|
|
(dst->send_sock->flags & SI_IS_MCAST))){
|
|
new_dst=*dst;
|
|
new_dst.send_sock=get_send_socket(0, &dst->to, dst->proto);
|
|
if (unlikely(new_dst.send_sock==0)){
|
|
LOG(L_ERR, "msg_send: ERROR: no sending socket found\n");
|
|
goto error;
|
|
}
|
|
dst=&new_dst;
|
|
}
|
|
if (unlikely(udp_send(dst, outb.s, outb.len)==-1)){
|
|
STATS_TX_DROPS;
|
|
LOG(L_ERR, "msg_send: ERROR: udp_send failed\n");
|
|
goto error;
|
|
}
|
|
}
|
|
#ifdef USE_TCP
|
|
else if (dst->proto==PROTO_TCP){
|
|
if (unlikely(tcp_disable)){
|
|
STATS_TX_DROPS;
|
|
LOG(L_WARN, "msg_send: WARNING: attempt to send on tcp and tcp"
|
|
" support is disabled\n");
|
|
goto error;
|
|
}else{
|
|
if (unlikely((dst->send_flags.f & SND_F_FORCE_SOCKET) &&
|
|
dst->send_sock)) {
|
|
local_addr=dst->send_sock->su;
|
|
su_setport(&local_addr, 0); /* any local port will do */
|
|
from=&local_addr;
|
|
}
|
|
if (unlikely(tcp_send(dst, from, outb.s, outb.len)<0)){
|
|
STATS_TX_DROPS;
|
|
LOG(L_ERR, "msg_send: ERROR: tcp_send failed\n");
|
|
goto error;
|
|
}
|
|
}
|
|
}
|
|
#ifdef USE_TLS
|
|
else if (dst->proto==PROTO_TLS){
|
|
if (unlikely(tls_disable)){
|
|
STATS_TX_DROPS;
|
|
LOG(L_WARN, "msg_send: WARNING: attempt to send on tls and tls"
|
|
" support is disabled\n");
|
|
goto error;
|
|
}else{
|
|
if (unlikely((dst->send_flags.f & SND_F_FORCE_SOCKET) &&
|
|
dst->send_sock)) {
|
|
local_addr=dst->send_sock->su;
|
|
su_setport(&local_addr, 0); /* any local port will do */
|
|
from=&local_addr;
|
|
}
|
|
if (unlikely(tcp_send(dst, from, outb.s, outb.len)<0)){
|
|
STATS_TX_DROPS;
|
|
LOG(L_ERR, "msg_send: ERROR: tcp_send failed\n");
|
|
goto error;
|
|
}
|
|
}
|
|
}
|
|
#endif /* USE_TLS */
|
|
#endif /* USE_TCP */
|
|
#ifdef USE_SCTP
|
|
else if (dst->proto==PROTO_SCTP){
|
|
if (unlikely(sctp_disable)){
|
|
STATS_TX_DROPS;
|
|
LOG(L_WARN, "msg_send: WARNING: attempt to send on sctp and sctp"
|
|
" support is disabled\n");
|
|
goto error;
|
|
}else{
|
|
if (unlikely(dst->send_sock==0)){
|
|
new_dst=*dst;
|
|
new_dst.send_sock=get_send_socket(0, &dst->to, dst->proto);
|
|
if (unlikely(new_dst.send_sock==0)){
|
|
LOG(L_ERR, "msg_send: ERROR: no sending SCTP socket found\n");
|
|
goto error;
|
|
}
|
|
dst=&new_dst;
|
|
}
|
|
if (unlikely(sctp_core_msg_send(dst, outb.s, outb.len)<0)){
|
|
STATS_TX_DROPS;
|
|
LOG(L_ERR, "msg_send: ERROR: sctp_msg_send failed\n");
|
|
goto error;
|
|
}
|
|
}
|
|
}
|
|
#endif /* USE_SCTP */
|
|
else{
|
|
LOG(L_CRIT, "BUG: msg_send: unknown proto %d\n", dst->proto);
|
|
goto error;
|
|
}
|
|
ret = 0;
|
|
done:
|
|
if(outb.s != buf)
|
|
pkg_free(outb.s);
|
|
return ret;
|
|
error:
|
|
if(outb.s != buf)
|
|
pkg_free(outb.s);
|
|
return -1;
|
|
}
|
|
|
|
#endif
|