You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
kamailio/modules/tm/tm.c

2209 lines
65 KiB

/*
* $Id$
*
* TM module
*
*
* ***************************************************
* * Jiri's Source Memorial *
* * *
* * Welcome, pilgrim ! This is the greatest place *
* * where dramatic changes happend. There are not *
* * many places with a history like this, as there *
* * are not so many people like Jiri, one of the *
* * ser's fathers, who brought everywhere the wind *
* * of change, the flood of clean-up. We all felt *
* * his fatherly eye watching over us day and night.*
* * *
* * Please, preserve this codework heritage, as *
* * it's unlikely for fresh, juicy pieces of code to *
* * arise to give him the again the chance to *
* * demonstrate his clean-up and improvement skills.*
* * *
* * Hereby, we solicit you to adopt this historical *
* * piece of code. For $100, your name will be *
* * be printed in this banner and we will use *
* * collected funds to create and display an ASCII *
* * statue of Jiri . *
* ***************************************************
*
*
* Copyright (C) 2001-2003 FhG Fokus
*
* This file is part of SIP-router, a free SIP server.
*
* SIP-router is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version
*
* SIP-router is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
/*
* History:
* --------
* 2003-02-18 added t_forward_nonack_{udp, tcp}, t_relay_to_{udp,tcp},
* t_replicate_{udp, tcp} (andrei)
* 2003-02-19 added t_rely_{udp, tcp} (andrei)
* 2003-03-06 voicemail changes accepted (jiri)
* 2003-03-10 module export interface updated to the new format (andrei)
* 2003-03-16 flags export parameter added (janakj)
* 2003-03-19 replaced all mallocs/frees w/ pkg_malloc/pkg_free (andrei)
* 2003-03-30 set_kr for requests only (jiri)
* 2003-04-05 s/reply_route/failure_route, onreply_route introduced (jiri)
* 2003-04-14 use protocol from uri (jiri)
* 2003-07-07 added t_relay_to_tls, t_replicate_tls, t_forward_nonack_tls
* added #ifdef USE_TCP, USE_TLS
* removed t_relay_{udp,tcp,tls} (andrei)
* 2003-09-26 added t_forward_nonack_uri() - same as t_forward_nonack() but
* takes no parameters -> forwards to uri (bogdan)
* 2004-02-11 FIFO/CANCEL + alignments (hash=f(callid,cseq)) (uli+jiri)
* 2004-02-18 t_reply exported via FIFO - imported from VM (bogdan)
* 2004-10-01 added a new param.: restart_fr_on_each_reply (andrei)
* 2005-11-14 new timer support, changed timer related module params (andrei)
* 2005-12-09 fixup_hostport2proxy uses route_struct to access param #1
* when fixing param #2
* 2005-12-09 added t_set_fr() (andrei)
* 2006-02-07 named routes support (andrei)
* 2006-09-28 added t_branch_replied, t_branch_timeout, t_any_replied,
* t_any_timeout, t_is_canceled (andrei)
* 2006-10-16 added a new param.: aggregate challenges (andrei)
* 2007-05-28 two new params: reparse_invite, ac_extra_hdrs
* added w_t_relay_cancel() (Miklos)
* 2007-06-05 added t_set_auto_inv_100() and auto_inv_100 (param);
* t_set_max_lifetime(), max_{non}inv_lifetime (andrei)
* 2008-02-05 module config parameters use the configuration framework (Miklos)
* 2008-02-29 added t_grep_status(code) (andrei)
* 2008-05-15 added t_relay(host, port) (similar to forward(host, port)) &
* t_relay_to_{udp,tcp,tls}(<no param>) (force protocol, but
* forward to uri) (andrei)
* 2008-08-11 sctp support: t_relay_to_sctp, t_replicate_sctp,
* t_forward_nonack_sctp (andrei)
* 2009-03-18 added a new param: auto_inv_100_reason (aheise)
* 2010-03-03 added new params: local_cancel_reason and e2e_cancel_reason
* (andrei)
*/
/** TM :: Module API (core).
* @file
* @ingroup tm
*/
/**
* @defgroup tm TM :: Transaction stateful proxy support
*
The TM module enables stateful processing of SIP transactions. The main use
of stateful logic, which is costly in terms of memory and CPU, is some
services that inherently need state.
For example, transaction-based accounting (module acc) needs to process
transaction state as opposed to individual messages, and any kinds of
forking must be implemented statefully. Other use of stateful processing
is it trading CPU caused by retransmission processing for memory.
That however only makes sense if CPU consumption per request is huge.
For example, if you want to avoid costly DNS resolution for every
retransmission of a request to an unresolvable destination, use stateful
mode. Then, only the initial message burdens server by DNS queries,
subsequent retransmissions will be dropped and will not result in more
processes blocked by DNS resolution. The price is more memory consumption
and higher processing latency.
*
\code
* ***************************************************
* * Jiri's Source Memorial *
* * *
* * Welcome, pilgrim ! This is the greatest place *
* * where dramatic changes happend. There are not *
* * many places with a history like this, as there *
* * are not so many people like Jiri, one of the *
* * ser's fathers, who brought everywhere the wind *
* * of change, the flood of clean-up. We all felt *
* * his fatherly eye watching over us day and night.*
* * *
* * Please, preserve this codework heritage, as *
* * it's unlikely for fresh, juicy pieces of code to *
* * arise to give him the again the chance to *
* * demonstrate his clean-up and improvement skills.*
* * *
* * Hereby, we solicit you to adopt this historical *
* * piece of code. For $100, your name will be *
* * be printed in this banner and we will use *
* * collected funds to create and display an ASCII *
* * statue of Jiri . *
* ***************************************************
\endcode
*/
#include "defs.h"
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include "../../sr_module.h"
#include "../../dprint.h"
#include "../../error.h"
#include "../../ut.h"
#include "../../script_cb.h"
#include "../../usr_avp.h"
#include "../../mem/mem.h"
#include "../../route_struct.h"
#include "../../route.h"
#include "../../cfg/cfg.h"
#include "../../globals.h"
#include "../../timer_ticks.h"
#include "../../mod_fix.h"
#include "config.h"
#include "sip_msg.h"
#include "h_table.h"
#include "t_hooks.h"
#include "tm_load.h"
#include "ut.h"
#include "t_reply.h"
#include "uac.h"
#include "t_fwd.h"
#include "t_lookup.h"
#include "t_stats.h"
#include "callid.h"
#include "t_cancel.h"
#include "t_fifo.h"
#include "timer.h"
#include "t_msgbuilder.h"
#include "select.h"
#include "t_serial.h"
#include "rpc_uac.h"
MODULE_VERSION
/* fixup functions */
static int fixup_hostport2proxy(void** param, int param_no);
static int fixup_proto_hostport2proxy(void** param, int param_no);
static int fixup_on_failure(void** param, int param_no);
static int fixup_on_reply(void** param, int param_no);
static int fixup_on_branch(void** param, int param_no);
static int fixup_t_reply(void** param, int param_no);
static int fixup_on_sl_reply(modparam_t type, void* val);
static int fixup_t_relay_to(void** param, int param_no);
/* init functions */
static int mod_init(void);
static int child_init(int rank);
/* exported functions */
inline static int w_t_check(struct sip_msg* msg, char* str, char* str2);
inline static int w_t_lookup_cancel(struct sip_msg* msg, char* str, char* str2);
inline static int w_t_reply(struct sip_msg* msg, char* str, char* str2);
inline static int w_t_release(struct sip_msg* msg, char* str, char* str2);
inline static int w_t_retransmit_reply(struct sip_msg* p_msg, char* foo,
char* bar );
inline static int w_t_newtran(struct sip_msg* p_msg, char* foo, char* bar );
inline static int w_t_relay( struct sip_msg *p_msg , char *_foo, char *_bar);
inline static int w_t_relay2( struct sip_msg *p_msg , char *proxy, char*);
inline static int w_t_relay_to_udp( struct sip_msg *p_msg , char *proxy,
char *);
inline static int w_t_relay_to_udp_uri( struct sip_msg *p_msg , char*, char*);
#ifdef USE_TCP
inline static int w_t_relay_to_tcp( struct sip_msg *p_msg , char *proxy,
char *);
inline static int w_t_relay_to_tcp_uri( struct sip_msg *p_msg , char*, char*);
#endif
#ifdef USE_TLS
inline static int w_t_relay_to_tls( struct sip_msg *p_msg , char *proxy,
char *);
inline static int w_t_relay_to_tls_uri( struct sip_msg *p_msg , char*, char*);
#endif
#ifdef USE_SCTP
inline static int w_t_relay_to_sctp( struct sip_msg *p_msg , char *proxy,
char *);
inline static int w_t_relay_to_sctp_uri( struct sip_msg*, char*, char*);
#endif
inline static int w_t_relay_to_avp(struct sip_msg* msg, char* str,char*);
inline static int w_t_relay_to(struct sip_msg* msg, char* str,char*);
inline static int w_t_replicate_uri( struct sip_msg *p_msg ,
char *uri, /* sip uri as string or variable */
char *_foo /* nothing expected */ );
inline static int w_t_replicate( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ );
inline static int w_t_replicate_udp( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ );
#ifdef USE_TCP
inline static int w_t_replicate_tcp( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ );
#endif
#ifdef USE_TLS
inline static int w_t_replicate_tls( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ );
#endif
#ifdef USE_SCTP
inline static int w_t_replicate_sctp( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ );
#endif
inline static int w_t_replicate_to(struct sip_msg* msg, char* str,char*);
inline static int w_t_forward_nonack(struct sip_msg* msg, char* str, char* );
inline static int w_t_forward_nonack_uri(struct sip_msg* msg, char* str,char*);
inline static int w_t_forward_nonack_udp(struct sip_msg* msg, char* str,char*);
#ifdef USE_TCP
inline static int w_t_forward_nonack_tcp(struct sip_msg*, char* str,char*);
#endif
#ifdef USE_TLS
inline static int w_t_forward_nonack_tls(struct sip_msg*, char* str,char*);
#endif
#ifdef USE_SCTP
inline static int w_t_forward_nonack_sctp(struct sip_msg*, char* str,char*);
#endif
inline static int w_t_forward_nonack_to(struct sip_msg* msg, char* str,char*);
inline static int w_t_relay_cancel(struct sip_msg *p_msg, char *_foo, char *_bar);
inline static int w_t_on_negative(struct sip_msg* msg, char *go_to, char *foo);
inline static int w_t_on_branch(struct sip_msg* msg, char *go_to, char *foo);
inline static int w_t_on_reply(struct sip_msg* msg, char *go_to, char *foo );
inline static int t_check_status(struct sip_msg* msg, char *match, char *foo);
static int t_set_fr_inv(struct sip_msg* msg, char* fr_inv, char* foo);
static int t_set_fr_all(struct sip_msg* msg, char* fr_inv, char* fr);
static int w_t_reset_fr(struct sip_msg* msg, char* foo, char* bar);
static int w_t_set_retr(struct sip_msg* msg, char* retr_t1, char* retr_t2);
static int w_t_reset_retr(struct sip_msg* msg, char* foo, char* bar);
static int w_t_set_max_lifetime(struct sip_msg* msg, char* inv, char* noninv);
static int w_t_reset_max_lifetime(struct sip_msg* msg, char* foo, char* bar);
static int t_set_auto_inv_100(struct sip_msg* msg, char* on_off, char* foo);
static int t_set_disable_6xx(struct sip_msg* msg, char* on_off, char* foo);
static int t_set_disable_failover(struct sip_msg* msg, char* on_off, char* f);
#ifdef CANCEL_REASON_SUPPORT
static int t_set_no_e2e_cancel_reason(struct sip_msg* msg, char* on_off,
char* f);
#endif /* CANCEL_REASON_SUPPORT */
static int t_branch_timeout(struct sip_msg* msg, char*, char*);
static int t_branch_replied(struct sip_msg* msg, char*, char*);
static int t_any_timeout(struct sip_msg* msg, char*, char*);
static int t_any_replied(struct sip_msg* msg, char*, char*);
static int w_t_is_canceled(struct sip_msg* msg, char*, char*);
static int t_is_expired(struct sip_msg* msg, char*, char*);
static int t_grep_status(struct sip_msg* msg, char*, char*);
static int w_t_drop_replies(struct sip_msg* msg, char* foo, char* bar);
static int w_t_save_lumps(struct sip_msg* msg, char* foo, char* bar);
static int w_t_check_trans(struct sip_msg* msg, char* foo, char* bar);
/* by default the fr timers avps are not set, so that the avps won't be
* searched for nothing each time a new transaction is created */
static char *fr_timer_param = 0 /*FR_TIMER_AVP*/;
static char *fr_inv_timer_param = 0 /*FR_INV_TIMER_AVP*/;
static char *contacts_avp_param = 0;
static rpc_export_t tm_rpc[];
static int fixup_t_check_status(void** param, int param_no);
static cmd_export_t cmds[]={
{"t_newtran", w_t_newtran, 0, 0,
REQUEST_ROUTE},
{"t_lookup_request", w_t_check, 0, 0,
REQUEST_ROUTE},
{"t_lookup_cancel", w_t_lookup_cancel, 0, 0,
REQUEST_ROUTE},
{"t_lookup_cancel", w_t_lookup_cancel, 1, fixup_int_1,
REQUEST_ROUTE},
{"t_reply", w_t_reply, 2, fixup_t_reply,
REQUEST_ROUTE | ONREPLY_ROUTE | FAILURE_ROUTE },
{"t_retransmit_reply", w_t_retransmit_reply, 0, 0,
REQUEST_ROUTE},
{"t_release", w_t_release, 0, 0,
REQUEST_ROUTE},
{"t_relay_to_udp", w_t_relay_to_udp, 2, fixup_hostport2proxy,
REQUEST_ROUTE|FAILURE_ROUTE},
{"t_relay_to_udp", w_t_relay_to_udp_uri, 0, 0,
REQUEST_ROUTE|FAILURE_ROUTE},
#ifdef USE_TCP
{"t_relay_to_tcp", w_t_relay_to_tcp, 2, fixup_hostport2proxy,
REQUEST_ROUTE|FAILURE_ROUTE},
{"t_relay_to_tcp", w_t_relay_to_tcp_uri, 0, 0,
REQUEST_ROUTE|FAILURE_ROUTE},
#endif
#ifdef USE_TLS
{"t_relay_to_tls", w_t_relay_to_tls, 2, fixup_hostport2proxy,
REQUEST_ROUTE|FAILURE_ROUTE},
{"t_relay_to_tls", w_t_relay_to_tls_uri, 0, 0,
REQUEST_ROUTE|FAILURE_ROUTE},
#endif
#ifdef USE_SCTP
{"t_relay_to_sctp", w_t_relay_to_sctp, 2, fixup_hostport2proxy,
REQUEST_ROUTE|FAILURE_ROUTE},
{"t_relay_to_sctp", w_t_relay_to_sctp_uri, 0, 0,
REQUEST_ROUTE|FAILURE_ROUTE},
#endif
{"t_replicate", w_t_replicate_uri, 1, fixup_var_str_1,
REQUEST_ROUTE},
{"t_replicate", w_t_replicate, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
{"t_replicate_udp", w_t_replicate_udp, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
#ifdef USE_TCP
{"t_replicate_tcp", w_t_replicate_tcp, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
#endif
#ifdef USE_TLS
{"t_replicate_tls", w_t_replicate_tls, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
#endif
#ifdef USE_SCTP
{"t_replicate_sctp", w_t_replicate_sctp, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
#endif
{"t_replicate_to", w_t_replicate_to, 2, fixup_proto_hostport2proxy,
REQUEST_ROUTE},
{"t_relay", w_t_relay, 0, 0,
REQUEST_ROUTE | FAILURE_ROUTE },
{"t_relay", w_t_relay2, 2, fixup_hostport2proxy,
REQUEST_ROUTE | FAILURE_ROUTE },
{"t_relay_to_avp", w_t_relay_to_avp, 2, fixup_proto_hostport2proxy,
REQUEST_ROUTE},
{"t_relay_to", w_t_relay_to, 0, 0,
REQUEST_ROUTE | FAILURE_ROUTE },
{"t_relay_to", w_t_relay_to, 1, fixup_t_relay_to,
REQUEST_ROUTE | FAILURE_ROUTE },
{"t_relay_to", w_t_relay_to, 2, fixup_t_relay_to,
REQUEST_ROUTE | FAILURE_ROUTE },
{"t_forward_nonack", w_t_forward_nonack, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
{"t_forward_nonack_uri", w_t_forward_nonack_uri, 0, 0,
REQUEST_ROUTE},
{"t_forward_nonack_udp", w_t_forward_nonack_udp, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
#ifdef USE_TCP
{"t_forward_nonack_tcp", w_t_forward_nonack_tcp, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
#endif
#ifdef USE_TLS
{"t_forward_nonack_tls", w_t_forward_nonack_tls, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
#endif
#ifdef USE_SCTP
{"t_forward_nonack_sctp", w_t_forward_nonack_sctp, 2, fixup_hostport2proxy,
REQUEST_ROUTE},
#endif
{"t_forward_nonack_to", w_t_forward_nonack_to, 2, fixup_proto_hostport2proxy,
REQUEST_ROUTE},
{"t_relay_cancel", w_t_relay_cancel, 0, 0,
REQUEST_ROUTE},
{"t_on_failure", w_t_on_negative, 1, fixup_on_failure,
REQUEST_ROUTE | FAILURE_ROUTE | TM_ONREPLY_ROUTE | BRANCH_ROUTE },
{"t_on_reply", w_t_on_reply, 1, fixup_on_reply,
REQUEST_ROUTE | FAILURE_ROUTE | TM_ONREPLY_ROUTE | BRANCH_ROUTE },
{"t_on_branch", w_t_on_branch, 1, fixup_on_branch,
REQUEST_ROUTE | FAILURE_ROUTE },
{"t_check_status", t_check_status, 1, fixup_t_check_status,
REQUEST_ROUTE | FAILURE_ROUTE | ONREPLY_ROUTE },
{"t_write_req", t_write_req, 2, fixup_t_write,
REQUEST_ROUTE | FAILURE_ROUTE },
{"t_write_unix", t_write_unix, 2, fixup_t_write,
REQUEST_ROUTE | FAILURE_ROUTE },
{"t_set_fr", t_set_fr_inv, 1, fixup_var_int_1,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_set_fr", t_set_fr_all, 2, fixup_var_int_12,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_reset_fr", w_t_reset_fr, 0, 0,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_set_retr", w_t_set_retr, 2, fixup_var_int_12,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_reset_retr", w_t_reset_retr, 0, 0,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_set_max_lifetime", w_t_set_max_lifetime, 2, fixup_var_int_12,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_reset_max_lifetime", w_t_reset_max_lifetime, 0, 0,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_set_auto_inv_100", t_set_auto_inv_100, 1, fixup_var_int_1,
REQUEST_ROUTE},
{"t_set_disable_6xx", t_set_disable_6xx, 1, fixup_var_int_1,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_set_disable_failover", t_set_disable_failover, 1, fixup_var_int_1,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
#ifdef CANCEL_REASON_SUPPORT
{"t_set_no_e2e_cancel_reason", t_set_no_e2e_cancel_reason, 1,
fixup_var_int_1,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
/* alias for t_set_no_e2e_cancel_reason */
{"t_disable_e2e_cancel_reason", t_set_no_e2e_cancel_reason, 1,
fixup_var_int_1,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
#endif /* CANCEL_REASON_SUPPORT */
{"t_branch_timeout", t_branch_timeout, 0, 0, FAILURE_ROUTE},
{"t_branch_replied", t_branch_replied, 0, 0, FAILURE_ROUTE},
{"t_any_timeout", t_any_timeout, 0, 0,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_any_replied", t_any_replied, 0, 0,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_is_canceled", w_t_is_canceled, 0, 0,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_is_expired", t_is_expired, 0, 0,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_grep_status", t_grep_status, 1, fixup_var_int_1,
REQUEST_ROUTE|TM_ONREPLY_ROUTE|FAILURE_ROUTE|BRANCH_ROUTE },
{"t_drop_replies", w_t_drop_replies, 0, 0,
FAILURE_ROUTE},
{"t_drop_replies", w_t_drop_replies, 1, 0,
FAILURE_ROUTE},
{"t_save_lumps", w_t_save_lumps, 0, 0,
REQUEST_ROUTE},
{"t_check_trans", w_t_check_trans, 0, 0,
REQUEST_ROUTE|ONREPLY_ROUTE|BRANCH_ROUTE },
{"t_load_contacts", t_load_contacts, 0, 0,
REQUEST_ROUTE | FAILURE_ROUTE},
{"t_next_contacts", t_next_contacts, 0, 0,
REQUEST_ROUTE | FAILURE_ROUTE},
/* not applicable from the script */
{"load_tm", (cmd_function)load_tm, NO_SCRIPT, 0, 0},
{"load_xtm", (cmd_function)load_xtm, NO_SCRIPT, 0, 0},
{0,0,0,0,0}
};
static param_export_t params[]={
{"ruri_matching", PARAM_INT, &default_tm_cfg.ruri_matching },
{"via1_matching", PARAM_INT, &default_tm_cfg.via1_matching },
{"fr_timer", PARAM_INT, &default_tm_cfg.fr_timeout },
{"fr_inv_timer", PARAM_INT, &default_tm_cfg.fr_inv_timeout },
{"wt_timer", PARAM_INT, &default_tm_cfg.wait_timeout },
{"delete_timer", PARAM_INT, &default_tm_cfg.delete_timeout },
{"retr_timer1", PARAM_INT, &default_tm_cfg.rt_t1_timeout_ms },
{"retr_timer2" , PARAM_INT, &default_tm_cfg.rt_t2_timeout_ms },
{"max_inv_lifetime", PARAM_INT, &default_tm_cfg.tm_max_inv_lifetime },
{"max_noninv_lifetime", PARAM_INT, &default_tm_cfg.tm_max_noninv_lifetime},
{"noisy_ctimer", PARAM_INT, &default_tm_cfg.noisy_ctimer },
{"auto_inv_100", PARAM_INT, &default_tm_cfg.tm_auto_inv_100 },
{"auto_inv_100_reason", PARAM_STRING, &default_tm_cfg.tm_auto_inv_100_r },
{"unix_tx_timeout", PARAM_INT, &default_tm_cfg.tm_unix_tx_timeout },
{"restart_fr_on_each_reply", PARAM_INT,
&default_tm_cfg.restart_fr_on_each_reply},
{"fr_timer_avp", PARAM_STRING, &fr_timer_param },
{"fr_inv_timer_avp", PARAM_STRING, &fr_inv_timer_param },
{"tw_append", PARAM_STRING|PARAM_USE_FUNC,
(void*)parse_tw_append },
{"pass_provisional_replies", PARAM_INT,
&default_tm_cfg.pass_provisional_replies },
{"aggregate_challenges", PARAM_INT, &default_tm_cfg.tm_aggregate_auth },
{"unmatched_cancel", PARAM_INT, &default_tm_cfg.unmatched_cancel },
{"default_code", PARAM_INT, &default_tm_cfg.default_code },
{"default_reason", PARAM_STRING, &default_tm_cfg.default_reason },
{"reparse_invite", PARAM_INT, &default_tm_cfg.reparse_invite },
{"ac_extra_hdrs", PARAM_STR, &default_tm_cfg.ac_extra_hdrs },
{"blst_503", PARAM_INT, &default_tm_cfg.tm_blst_503 },
{"blst_503_def_timeout",PARAM_INT, &default_tm_cfg.tm_blst_503_default },
{"blst_503_min_timeout",PARAM_INT, &default_tm_cfg.tm_blst_503_min },
{"blst_503_max_timeout",PARAM_INT, &default_tm_cfg.tm_blst_503_max },
{"blst_methods_add", PARAM_INT, &default_tm_cfg.tm_blst_methods_add },
{"blst_methods_lookup", PARAM_INT, &default_tm_cfg.tm_blst_methods_lookup},
{"cancel_b_method", PARAM_INT, &default_tm_cfg.cancel_b_flags},
{"reparse_on_dns_failover", PARAM_INT, &default_tm_cfg.reparse_on_dns_failover},
{"on_sl_reply", PARAM_STRING|PARAM_USE_FUNC, fixup_on_sl_reply },
{"contacts_avp", PARAM_STRING, &contacts_avp_param },
{"disable_6xx_block", PARAM_INT, &default_tm_cfg.disable_6xx },
{"local_ack_mode", PARAM_INT, &default_tm_cfg.local_ack_mode },
{"failure_reply_mode", PARAM_INT, &failure_reply_mode },
{"faked_reply_prio", PARAM_INT, &faked_reply_prio },
#ifdef CANCEL_REASON_SUPPORT
{"local_cancel_reason", PARAM_INT, &default_tm_cfg.local_cancel_reason },
{"e2e_cancel_reason", PARAM_INT, &default_tm_cfg.e2e_cancel_reason },
#endif /* CANCEL_REASON_SUPPORT */
{0,0,0}
};
#ifdef STATIC_TM
struct module_exports tm_exports = {
#else
struct module_exports exports= {
#endif
"tm",
/* -------- exported functions ----------- */
cmds,
tm_rpc, /* RPC methods */
/* ------------ exported variables ---------- */
params,
mod_init, /* module initialization function */
(response_function) reply_received,
(destroy_function) tm_shutdown,
0, /* w_onbreak, */
child_init /* per-child init function */
};
/* helper for fixup_on_* */
static int fixup_routes(char* r_type, struct route_list* rt, void** param)
{
int i;
i=route_get(rt, (char*)*param);
if (i==-1){
LOG(L_ERR, "ERROR: tm: fixup_routes: route_get failed\n");
return E_UNSPEC;
}
if (r_type && rt->rlist[i]==0){
LOG(L_WARN, "WARNING: %s(\"%s\"): empty/non existing route\n",
r_type, (char*)*param);
}
*param=(void*)(long)i;
return 0;
}
static int fixup_t_reply(void** param, int param_no)
{
if (param_no == 1) {
if (fixup_var_int_12(param, 1) != 0) return -1;
} else if (param_no == 2) {
return fixup_var_str_12(param, 2);
}
return 0;
}
static int fixup_on_failure(void** param, int param_no)
{
if (param_no==1){
if(strlen((char*)*param)<=1
&& (*(char*)(*param)==0 || *(char*)(*param)=='0')) {
*param = (void*)0;
return 0;
}
return fixup_routes("t_on_failure", &failure_rt, param);
}
return 0;
}
static int fixup_on_reply(void** param, int param_no)
{
if (param_no==1){
if(strlen((char*)*param)<=1
&& (*(char*)(*param)==0 || *(char*)(*param)=='0')) {
*param = (void*)0;
return 0;
}
return fixup_routes("t_on_reply", &onreply_rt, param);
}
return 0;
}
static int fixup_on_branch(void** param, int param_no)
{
if (param_no==1){
if(strlen((char*)*param)<=1
&& (*(char*)(*param)==0 || *(char*)(*param)=='0')) {
*param = (void*)0;
return 0;
}
return fixup_routes("t_on_branch", &branch_rt, param);
}
return 0;
}
static int fixup_on_sl_reply(modparam_t type, void* val)
{
if ((type & PARAM_STRING) == 0) {
LOG(L_ERR, "ERROR: tm: fixup_on_sl_reply: not a string parameter\n");
return -1;
}
if (fixup_routes(0, &onreply_rt, &val))
return -1;
goto_on_sl_reply = (int)(long)val;
return 0;
}
/* (char *hostname, char *port_nr) ==> (struct proxy_l *, -) */
static int fixup_hostport2proxy(void** param, int param_no)
{
unsigned int port;
char *host;
int err;
struct proxy_l *proxy;
action_u_t *a;
str s;
DBG("TM module: fixup_hostport2proxy(%s, %d)\n", (char*)*param, param_no);
if (param_no==1){
return 0;
} else if (param_no==2) {
a = fixup_get_param(param, param_no, 1);
host= a->u.string;
port=str2s(*param, strlen(*param), &err);
if (err!=0) {
LOG(L_ERR, "TM module:fixup_hostport2proxy: bad port number <%s>\n",
(char*)(*param));
return E_UNSPEC;
}
s.s = host;
s.len = strlen(host);
proxy=mk_proxy(&s, port, 0); /* FIXME: udp or tcp? */
if (proxy==0) {
LOG(L_ERR, "ERROR: fixup_hostport2proxy: bad host name in URI <%s>\n",
host );
return E_BAD_ADDRESS;
}
/* success -- fix the first parameter to proxy now ! */
a->u.data=proxy;
return 0;
} else {
LOG(L_ERR,"ERROR: fixup_hostport2proxy called with parameter #<>{1,2}\n");
return E_BUG;
}
}
/* (char *$proto, char *$host:port) ==> (fparam, fparam) */
static int fixup_proto_hostport2proxy(void** param, int param_no) {
int ret;
ret = fix_param(FPARAM_AVP, param);
if (ret <= 0) return ret;
/* if (param_no = 1) { FIXME: param_str currently does not offer INT/STR overloading
ret = fix_param(FPARAM_INT, param);
if (ret <= 0) return ret;
} */
if (fix_param(FPARAM_STRING, param) != 0) return -1;
return 0;
}
static int fixup_t_check_status(void** param, int param_no)
{
int ret;
ret = fix_param(FPARAM_AVP, param);
if (ret <= 0) return ret;
ret = fix_param(FPARAM_SELECT, param);
if (ret <= 0) return ret;
if (fix_param(FPARAM_REGEX, param) != 0) return -1;
return 0;
}
/***************************** init functions *****************************/
static int w_t_unref( struct sip_msg *foo, unsigned int flags, void *bar)
{
return t_unref(foo);
}
static int script_init( struct sip_msg *foo, unsigned int flags, void *bar)
{
/* we primarily reset all private memory here to make sure
* private values left over from previous message will
* not be used again */
/* make sure the new message will not inherit previous
message's t_on_negative value
*/
t_on_negative( 0 );
t_on_reply(0);
t_on_branch(0);
/* reset the kr status */
reset_kr();
/* set request mode so that multiple-mode actions know
* how to behave */
set_route_type(REQUEST_ROUTE);
lumps_are_cloned = 0;
return 1;
}
static int mod_init(void)
{
DBG( "TM - (sizeof cell=%ld, sip_msg=%ld) initializing...\n",
(long)sizeof(struct cell), (long)sizeof(struct sip_msg));
/* checking if we have sufficient bitmap capacity for given
maximum number of branches */
if (MAX_BRANCHES+1>31) {
LOG(L_CRIT, "Too many max UACs for UAC branch_bm_t bitmap: %d\n",
MAX_BRANCHES );
return -1;
}
if (init_callid() < 0) {
LOG(L_CRIT, "Error while initializing Call-ID generator\n");
return -1;
}
/* building the hash table*/
if (!init_hash_table()) {
LOG(L_ERR, "ERROR: mod_init: initializing hash_table failed\n");
return -1;
}
/* init static hidden values */
init_t();
if (tm_init_selects()==-1) {
LOG(L_ERR, "ERROR: mod_init: select init failed\n");
return -1;
}
/* the default timer values must be fixed-up before
* declaring the configuration (Miklos) */
if (tm_init_timers()==-1) {
LOG(L_ERR, "ERROR: mod_init: timer init failed\n");
return -1;
}
/* the cancel branch flags must be fixed before declaring the
* configuration */
if (cancel_b_flags_get(&default_tm_cfg.cancel_b_flags,
default_tm_cfg.cancel_b_flags)<0){
LOG(L_ERR, "ERROR: mod_init: bad cancel branch method\n");
return -1;
}
#ifdef USE_DNS_FAILOVER
if (default_tm_cfg.reparse_on_dns_failover && mhomed) {
LOG(L_WARN, "WARNING: mod_init: "
"reparse_on_dns_failover is enabled on a "
"multihomed host -- check the readme of tm module!\n");
}
#endif
/* declare the configuration */
if (cfg_declare("tm", tm_cfg_def, &default_tm_cfg, cfg_sizeof(tm),
&tm_cfg)) {
LOG(L_ERR, "ERROR: mod_init: failed to declare the configuration\n");
return -1;
}
/* First tm_stat initialization function only allocates the top level stat
* structure in shared memory, the initialization will complete in child
* init with init_tm_stats_child when the final value of estimated_process_count is
* known
*/
if (init_tm_stats() < 0) {
LOG(L_CRIT, "ERROR: mod_init: failed to init stats\n");
return -1;
}
if (uac_init()==-1) {
LOG(L_ERR, "ERROR: mod_init: uac_init failed\n");
return -1;
}
if (init_tmcb_lists()!=1) {
LOG(L_CRIT, "ERROR:tm:mod_init: failed to init tmcb lists\n");
return -1;
}
tm_init_tags();
init_twrite_lines();
if (init_twrite_sock() < 0) {
LOG(L_ERR, "ERROR:tm:mod_init: Unable to create socket\n");
return -1;
}
/* register post-script clean-up function */
if (register_script_cb( w_t_unref, POST_SCRIPT_CB|REQUEST_CB, 0)<0 ) {
LOG(L_ERR,"ERROR:tm:mod_init: failed to register POST request "
"callback\n");
return -1;
}
if (register_script_cb( script_init, PRE_SCRIPT_CB|REQUEST_CB , 0)<0 ) {
LOG(L_ERR,"ERROR:tm:mod_init: failed to register PRE request "
"callback\n");
return -1;
}
if (init_avp_params( fr_timer_param, fr_inv_timer_param,
contacts_avp_param)<0 ){
LOG(L_ERR,"ERROR:tm:mod_init: failed to process AVP params\n");
return -1;
}
#ifdef WITH_EVENT_LOCAL_REQUEST
goto_on_local_req=route_lookup(&event_rt, "tm:local-request");
if (goto_on_local_req>=0 && event_rt.rlist[goto_on_local_req]==0)
goto_on_local_req=-1; /* disable */
if (goto_on_local_req>=0)
set_child_rpc_sip_mode();
#endif /* WITH_EVENT_LOCAL_REQUEST */
if (goto_on_sl_reply && onreply_rt.rlist[goto_on_sl_reply]==0)
WARN("empty/non existing on_sl_reply route\n");
tm_init = 1;
return 0;
}
static int child_init(int rank)
{
if (rank == PROC_INIT) {
/* we must init stats when rank==PROC_INIT: after mod_init we know
* the exact number of processes and we must init the shared structure
* before any other process is starting (or else some new process
* might try to use the stats before the stats array is allocated) */
if (init_tm_stats_child() < 0) {
ERR("Error while initializing tm statistics structures\n");
return -1;
}
}else if (child_init_callid(rank) < 0) {
/* don't init callid for PROC_INIT*/
LOG(L_ERR, "ERROR: child_init: Error while initializing Call-ID"
" generator\n");
return -2;
}
return 0;
}
/**************************** wrapper functions ***************************/
static int t_check_status(struct sip_msg* msg, char *p1, char *foo)
{
regmatch_t pmatch;
struct cell *t;
char *status, *s = NULL;
char backup;
int lowest_status, n, ret;
fparam_t* fp;
regex_t* re = NULL;
str tmp;
fp = (fparam_t*)p1;
t = 0;
/* first get the transaction */
if (t_check(msg, 0 ) == -1) return -1;
if ((t = get_t()) == 0) {
LOG(L_ERR, "ERROR: t_check_status: cannot check status for a reply "
"which has no T-state established\n");
goto error;
}
backup = 0;
switch(fp->type) {
case FPARAM_REGEX:
re = fp->v.regex;
break;
default:
/* AVP or select, get the value and compile the regex */
if (get_str_fparam(&tmp, msg, fp) < 0) goto error;
s = pkg_malloc(tmp.len + 1);
if (s == NULL) {
ERR("Out of memory\n");
goto error;
}
memcpy(s, tmp.s, tmp.len);
s[tmp.len] = '\0';
if ((re = pkg_malloc(sizeof(regex_t))) == 0) {
ERR("No memory left\n");
goto error;
}
if (regcomp(re, s, REG_EXTENDED|REG_ICASE|REG_NEWLINE)) {
ERR("Bad regular expression '%s'\n", s);
goto error;
}
break;
}
switch(get_route_type()) {
case REQUEST_ROUTE:
/* use the status of the last sent reply */
status = int2str( t->uas.status, 0);
break;
case TM_ONREPLY_ROUTE:
case CORE_ONREPLY_ROUTE:
/* use the status of the current reply */
status = msg->first_line.u.reply.status.s;
backup = status[msg->first_line.u.reply.status.len];
status[msg->first_line.u.reply.status.len] = 0;
break;
case FAILURE_ROUTE:
/* use the status of the winning reply */
ret = t_pick_branch( -1, 0, t, &lowest_status);
if (ret == -1) {
/* t_pick_branch() retuns error also when there are only
* blind UACs. Let us give it another chance including the
* blind branches. */
LOG(L_DBG, "DEBUG: t_check_status: t_pick_branch returned error, "
"trying t_pick_branch_blind\n");
ret = t_pick_branch_blind(t, &lowest_status);
}
if (ret < 0) {
LOG(L_CRIT,"BUG:t_check_status: t_pick_branch failed to get "
" a final response in FAILURE_ROUTE\n");
goto error;
}
status = int2str( lowest_status , 0);
break;
default:
LOG(L_ERR,"ERROR:t_check_status: unsupported route type %d\n",
get_route_type());
goto error;
}
DBG("DEBUG:t_check_status: checked status is <%s>\n",status);
/* do the checking */
n = regexec(re, status, 1, &pmatch, 0);
if (backup) status[msg->first_line.u.reply.status.len] = backup;
if (s) pkg_free(s);
if ((fp->type != FPARAM_REGEX) && re) {
regfree(re);
pkg_free(re);
}
if (unlikely(t && is_route_type(CORE_ONREPLY_ROUTE))){
/* t_check() above has the side effect of setting T and
REFerencing T => we must unref and unset it. */
UNREF( t );
set_t(T_UNDEFINED, T_BR_UNDEFINED);
}
if (n!=0) return -1;
return 1;
error:
if (unlikely(t && is_route_type(CORE_ONREPLY_ROUTE))){
/* t_check() above has the side effect of setting T and
REFerencing T => we must unref and unset it. */
UNREF( t );
set_t(T_UNDEFINED, T_BR_UNDEFINED);
}
if (s) pkg_free(s);
if ((fp->type != FPARAM_REGEX) && re) {
regfree(re);
pkg_free(re);
}
return -1;
}
inline static int w_t_check(struct sip_msg* msg, char* str, char* str2)
{
return (t_check_msg( msg , 0 )==1) ? 1 : -1;
}
inline static int w_t_lookup_cancel(struct sip_msg* msg, char* str, char* str2)
{
struct cell *ret;
int i=0;
if (msg->REQ_METHOD==METHOD_CANCEL) {
ret = t_lookupOriginalT( msg );
DBG("lookup_original: t_lookupOriginalT returned: %p\n", ret);
if (ret != T_NULL_CELL) {
/* If the parameter is set to 1, overwrite the message flags of
* the CANCEL with the flags of the INVITE */
if (str && (get_int_fparam(&i, msg, (fparam_t*)str)==0) && i)
msg->flags = ret->uas.request->flags;
/* The cell is reffed by t_lookupOriginalT, but T is not set.
So we must unref it before returning. */
UNREF(ret);
return 1;
}
} else {
LOG(L_WARN, "WARNING: script error t_lookup_cancel() called for non-CANCEL request\n");
}
return -1;
}
inline static int str2proto(char *s, int len) {
if (len == 3 && !strncasecmp(s, "udp", 3))
return PROTO_UDP;
else if (len == 3 && !strncasecmp(s, "tcp", 3)) /* tcp&tls checks will be passed in getproto() */
return PROTO_TCP;
else if (len == 3 && !strncasecmp(s, "tls", 3))
return PROTO_TLS;
else if (len == 4 && !strncasecmp(s, "sctp", 4))
return PROTO_SCTP;
else
return PROTO_NONE;
}
inline static struct proxy_l* t_protoaddr2proxy(char *proto_par, char *addr_par) {
struct proxy_l *proxy = 0;
avp_t* avp;
avp_value_t val;
int proto, port, err;
str s;
char *c;
switch(((fparam_t *)proto_par)->type) {
case FPARAM_AVP:
if (!(avp = search_first_avp(((fparam_t *)proto_par)->v.avp.flags, ((fparam_t *)proto_par)->v.avp.name, &val, 0))) {
proto = PROTO_NONE;
} else {
if (avp->flags & AVP_VAL_STR) {
proto = str2proto(val.s.s, val.s.len);
}
else {
proto = val.n;
}
}
break;
case FPARAM_INT:
proto = ((fparam_t *)proto_par)->v.i;
break;
case FPARAM_STRING:
proto = str2proto( ((fparam_t *)proto_par)->v.asciiz, strlen(((fparam_t *)proto_par)->v.asciiz));
break;
default:
ERR("BUG: Invalid proto parameter value in t_protoaddr2proxy\n");
return 0;
}
switch(((fparam_t *)addr_par)->type) {
case FPARAM_AVP:
if (!(avp = search_first_avp(((fparam_t *)addr_par)->v.avp.flags, ((fparam_t *)addr_par)->v.avp.name, &val, 0))) {
s.len = 0;
} else {
if ((avp->flags & AVP_VAL_STR) == 0) {
LOG(L_ERR, "tm:t_protoaddr2proxy: avp <%.*s> value is not string\n",
((fparam_t *)addr_par)->v.avp.name.s.len, ((fparam_t *)addr_par)->v.avp.name.s.s);
return 0;
}
s = val.s;
}
break;
case FPARAM_STRING:
s.s = ((fparam_t *) addr_par)->v.asciiz;
s.len = strlen(s.s);
break;
default:
ERR("BUG: Invalid addr parameter value in t_protoaddr2proxy\n");
return 0;
}
port = 5060;
if (s.len) {
c = memchr(s.s, ':', s.len);
if (c) {
port = str2s(c+1, s.len-(c-s.s+1), &err);
if (err!=0) {
LOG(L_ERR, "tm:t_protoaddr2proxy: bad port number <%.*s>\n",
s.len, s.s);
return 0;
}
s.len = c-s.s;
}
}
if (!s.len) {
LOG(L_ERR, "tm: protoaddr2proxy: host name is empty\n");
return 0;
}
proxy=mk_proxy(&s, port, proto);
if (proxy==0) {
LOG(L_ERR, "tm: protoaddr2proxy: bad host name in URI <%.*s>\n",
s.len, s.s );
return 0;
}
return proxy;
}
inline static int _w_t_forward_nonack(struct sip_msg* msg, struct proxy_l* proxy,
int proto)
{
struct cell *t;
if (t_check( msg , 0 )==-1) {
LOG(L_ERR, "ERROR: forward_nonack: "
"can't forward when no transaction was set up\n");
return -1;
}
t=get_t();
if ( t && t!=T_UNDEFINED ) {
if (msg->REQ_METHOD==METHOD_ACK) {
LOG(L_WARN,"WARNING: you don't really want to fwd hbh ACK\n");
return -1;
}
return t_forward_nonack(t, msg, proxy, proto );
} else {
DBG("DEBUG: forward_nonack: no transaction found\n");
return -1;
}
}
inline static int w_t_forward_nonack( struct sip_msg* msg, char* proxy,
char* foo)
{
return _w_t_forward_nonack(msg, ( struct proxy_l *) proxy, PROTO_NONE);
}
inline static int w_t_forward_nonack_uri(struct sip_msg* msg, char *foo,
char *bar)
{
return _w_t_forward_nonack(msg, 0, PROTO_NONE);
}
inline static int w_t_forward_nonack_udp( struct sip_msg* msg, char* proxy,
char* foo)
{
return _w_t_forward_nonack(msg, ( struct proxy_l *) proxy, PROTO_UDP);
}
#ifdef USE_TCP
inline static int w_t_forward_nonack_tcp( struct sip_msg* msg, char* proxy,
char* foo)
{
return _w_t_forward_nonack(msg, ( struct proxy_l *) proxy, PROTO_TCP);
}
#endif
#ifdef USE_TLS
inline static int w_t_forward_nonack_tls( struct sip_msg* msg, char* proxy,
char* foo)
{
return _w_t_forward_nonack(msg, ( struct proxy_l *) proxy, PROTO_TLS);
}
#endif
#ifdef USE_SCTP
inline static int w_t_forward_nonack_sctp( struct sip_msg* msg, char* proxy,
char* foo)
{
return _w_t_forward_nonack(msg, ( struct proxy_l *) proxy, PROTO_SCTP);
}
#endif
inline static int w_t_forward_nonack_to( struct sip_msg *p_msg ,
char *proto_par,
char *addr_par )
{
struct proxy_l *proxy;
int r = -1;
proxy = t_protoaddr2proxy(proto_par, addr_par);
if (proxy) {
r = _w_t_forward_nonack(p_msg, proxy, proxy->proto);
free_proxy(proxy);
pkg_free(proxy);
}
return r;
}
inline static int w_t_reply(struct sip_msg* msg, char* p1, char* p2)
{
struct cell *t;
int code, ret = -1;
str reason;
char* r;
if (msg->REQ_METHOD==METHOD_ACK) {
LOG(L_WARN, "WARNING: t_reply: ACKs are not replied\n");
return -1;
}
if (t_check( msg , 0 )==-1) return -1;
t=get_t();
if (!t) {
LOG(L_ERR, "ERROR: t_reply: cannot send a t_reply to a message "
"for which no T-state has been established\n");
return -1;
}
if (get_int_fparam(&code, msg, (fparam_t*)p1) < 0) {
code = cfg_get(tm, tm_cfg, default_code);
}
if (get_str_fparam(&reason, msg, (fparam_t*)p2) < 0) {
r = cfg_get(tm, tm_cfg, default_reason);
} else {
r = as_asciiz(&reason);
if (r == NULL) r = cfg_get(tm, tm_cfg, default_reason);
}
/* if called from reply_route, make sure that unsafe version
* is called; we are already in a mutex and another mutex in
* the safe version would lead to a deadlock
*/
if (is_route_type(FAILURE_ROUTE)) {
DBG("DEBUG: t_reply_unsafe called from w_t_reply\n");
ret = t_reply_unsafe(t, msg, code, r);
} else if (is_route_type(REQUEST_ROUTE)) {
ret = t_reply( t, msg, code, r);
} else if (is_route_type(ONREPLY_ROUTE)) {
if (likely(t->uas.request)){
if (is_route_type(CORE_ONREPLY_ROUTE))
ret=t_reply(t, t->uas.request, code, r);
else
ret=t_reply_unsafe(t, t->uas.request, code, r);
}else
ret=-1;
/* t_check() above has the side effect of setting T and
REFerencing T => we must unref and unset it.
Note: this is needed only in the CORE_ONREPLY_ROUTE and not also in
the TM_ONREPLY_ROUTE.
*/
if (is_route_type(CORE_ONREPLY_ROUTE)) {
UNREF( t );
set_t(T_UNDEFINED, T_BR_UNDEFINED);
}
} else {
LOG(L_CRIT, "BUG: w_t_reply entered in unsupported mode\n");
ret = -1;
}
if (r && (r != cfg_get(tm, tm_cfg, default_reason))) pkg_free(r);
return ret;
}
inline static int w_t_release(struct sip_msg* msg, char* str, char* str2)
{
struct cell *t;
int ret;
if(get_route_type()!=REQUEST_ROUTE)
{
LM_INFO("invalid usage - not in request route\n");
return -1;
}
if (t_check( msg , 0 )==-1) return -1;
t=get_t();
if ( t && t!=T_UNDEFINED ) {
ret = t_release_transaction( t );
t_unref(msg);
return ret;
}
return 1;
}
inline static int w_t_retransmit_reply( struct sip_msg* p_msg, char* foo, char* bar)
{
struct cell *t;
if (t_check( p_msg , 0 )==-1)
return 1;
t=get_t();
if (t) {
if (p_msg->REQ_METHOD==METHOD_ACK) {
LOG(L_WARN, "WARNING: : ACKs transmit_replies not replied\n");
return -1;
}
return t_retransmit_reply( t );
} else
return -1;
}
inline static int w_t_newtran( struct sip_msg* p_msg, char* foo, char* bar )
{
/* t_newtran returns 0 on error (negative value means
'transaction exists' */
int ret;
ret = t_newtran( p_msg );
if (ret==E_SCRIPT) {
LOG(L_ERR, "ERROR: t_newtran: "
"transaction already in process %p\n", get_t() );
}
return ret;
}
inline static int w_t_on_negative( struct sip_msg* msg, char *go_to, char *foo)
{
t_on_negative( (unsigned int )(long) go_to );
return 1;
}
inline static int w_t_on_branch( struct sip_msg* msg, char *go_to, char *foo)
{
t_on_branch( (unsigned int )(long) go_to );
return 1;
}
inline static int w_t_on_reply( struct sip_msg* msg, char *go_to, char *foo )
{
t_on_reply( (unsigned int )(long) go_to );
return 1;
}
inline static int _w_t_relay_to(struct sip_msg *p_msg ,
struct proxy_l *proxy, int force_proto)
{
struct cell *t;
int res;
if (is_route_type(FAILURE_ROUTE)) {
t=get_t();
if (!t || t==T_UNDEFINED) {
LOG(L_CRIT, "BUG: w_t_relay_to: undefined T\n");
return -1;
}
res = t_forward_nonack(t, p_msg, proxy, force_proto);
if (res <= 0) {
if (res != E_CFG) {
LOG(L_ERR, "ERROR: w_t_relay_to: t_relay_to failed\n");
/* let us save the error code, we might need it later
when the failure_route has finished (Miklos) */
}
tm_error=ser_error;
return -1;
}
return 1;
}
if (is_route_type(REQUEST_ROUTE))
return t_relay_to( p_msg, proxy, force_proto,
0 /* no replication */ );
LOG(L_CRIT, "ERROR: w_t_relay_to: unsupported route type: %d\n",
get_route_type());
return 0;
}
inline static int w_t_relay_to_udp( struct sip_msg *p_msg ,
char *proxy,/* struct proxy_l * expected */
char *_foo /* nothing expected */ )
{
return _w_t_relay_to( p_msg, ( struct proxy_l *) proxy, PROTO_UDP);
}
/* forward to uri, but force udp as transport */
inline static int w_t_relay_to_udp_uri( struct sip_msg *p_msg ,
char *_foo, char *_bar )
{
return _w_t_relay_to(p_msg, (struct proxy_l *)0, PROTO_UDP);
}
#ifdef USE_TCP
inline static int w_t_relay_to_tcp( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l* */
char *_foo /* nothing expected */ )
{
return _w_t_relay_to( p_msg, ( struct proxy_l *) proxy, PROTO_TCP);
}
/* forward to uri, but force tcp as transport */
inline static int w_t_relay_to_tcp_uri( struct sip_msg *p_msg ,
char *_foo, char *_bar )
{
return _w_t_relay_to(p_msg, (struct proxy_l *)0, PROTO_TCP);
}
#endif
#ifdef USE_TLS
inline static int w_t_relay_to_tls( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l* expected */
char *_foo /* nothing expected */ )
{
return _w_t_relay_to( p_msg, ( struct proxy_l *) proxy, PROTO_TLS);
}
/* forward to uri, but force tls as transport */
inline static int w_t_relay_to_tls_uri( struct sip_msg *p_msg ,
char *_foo, char *_bar )
{
return _w_t_relay_to(p_msg, (struct proxy_l *)0, PROTO_TLS);
}
#endif
#ifdef USE_SCTP
inline static int w_t_relay_to_sctp( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l* */
char *_foo /* nothing expected */ )
{
return _w_t_relay_to( p_msg, ( struct proxy_l *) proxy, PROTO_SCTP);
}
/* forward to uri, but force tcp as transport */
inline static int w_t_relay_to_sctp_uri( struct sip_msg *p_msg ,
char *_foo, char *_bar )
{
return _w_t_relay_to(p_msg, (struct proxy_l *)0, PROTO_SCTP);
}
#endif
inline static int w_t_relay_to_avp( struct sip_msg *p_msg ,
char *proto_par,
char *addr_par )
{
struct proxy_l *proxy;
int r = -1;
proxy = t_protoaddr2proxy(proto_par, addr_par);
if (proxy) {
r = _w_t_relay_to(p_msg, proxy, PROTO_NONE);
free_proxy(proxy);
pkg_free(proxy);
}
return r;
}
int t_replicate_uri(struct sip_msg *msg, str *suri)
{
struct proxy_l *proxy;
struct sip_uri turi;
int r = -1;
memset(&turi, 0, sizeof(struct sip_uri));
if(parse_uri(suri->s, suri->len, &turi)!=0)
{
LM_ERR("bad replicate SIP address!\n");
return -1;
}
proxy=mk_proxy(&turi.host, turi.port_no, turi.proto);
if (proxy==0) {
LM_ERR("cannot create proxy from URI <%.*s>\n",
suri->len, suri->s );
return -1;
}
r = t_replicate(msg, proxy, proxy->proto);
free_proxy(proxy);
pkg_free(proxy);
return r;
}
inline static int w_t_replicate_uri(struct sip_msg *msg ,
char *uri, /* sip uri as string or variable */
char *_foo /* nothing expected */ )
{
str suri;
if(fixup_get_svalue(msg, (gparam_p)uri, &suri)!=0)
{
LM_ERR("invalid replicate uri parameter");
return -1;
}
return t_replicate_uri(msg, &suri);
}
inline static int w_t_replicate( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ )
{
return t_replicate(p_msg, ( struct proxy_l *) proxy, p_msg->rcv.proto );
}
inline static int w_t_replicate_udp( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ )
{
return t_replicate(p_msg, ( struct proxy_l *) proxy, PROTO_UDP );
}
#ifdef USE_TCP
inline static int w_t_replicate_tcp( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ )
{
return t_replicate(p_msg, ( struct proxy_l *) proxy, PROTO_TCP );
}
#endif
#ifdef USE_TLS
inline static int w_t_replicate_tls( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ )
{
return t_replicate(p_msg, ( struct proxy_l *) proxy, PROTO_TLS );
}
#endif
#ifdef USE_SCTP
inline static int w_t_replicate_sctp( struct sip_msg *p_msg ,
char *proxy, /* struct proxy_l *proxy expected */
char *_foo /* nothing expected */ )
{
return t_replicate(p_msg, ( struct proxy_l *) proxy, PROTO_SCTP );
}
#endif
inline static int w_t_replicate_to( struct sip_msg *p_msg ,
char *proto_par,
char *addr_par )
{
struct proxy_l *proxy;
int r = -1;
proxy = t_protoaddr2proxy(proto_par, addr_par);
if (proxy) {
r = t_replicate(p_msg, proxy, proxy->proto);
free_proxy(proxy);
pkg_free(proxy);
}
return r;
}
inline static int w_t_relay( struct sip_msg *p_msg ,
char *_foo, char *_bar)
{
return _w_t_relay_to(p_msg, (struct proxy_l *)0, PROTO_NONE);
}
/* like t_relay but use the specified destination and port and the same proto
* as the received msg */
static int w_t_relay2( struct sip_msg *p_msg , char *proxy,
char *_foo)
{
return _w_t_relay_to(p_msg, (struct proxy_l*) proxy, p_msg->rcv.proto);
}
/* relays CANCEL at the beginning of the script */
inline static int w_t_relay_cancel( struct sip_msg *p_msg ,
char *_foo, char *_bar)
{
if (p_msg->REQ_METHOD!=METHOD_CANCEL)
return 1;
/* it makes no sense to use this function without reparse_invite=1 */
if (!cfg_get(tm, tm_cfg, reparse_invite))
LOG(L_WARN, "WARNING: t_relay_cancel is probably used with "
"wrong configuration, check the readme for details\n");
return t_relay_cancel(p_msg);
}
/* set fr_inv_timeout & or fr_timeout; 0 means: use the default value */
static int t_set_fr_all(struct sip_msg* msg, char* p1, char* p2)
{
int fr, fr_inv;
if (get_int_fparam(&fr_inv, msg, (fparam_t*)p1) < 0) return -1;
if (p2) {
if (get_int_fparam(&fr, msg, (fparam_t*)p2) < 0) return -1;
} else {
fr = 0;
}
return t_set_fr(msg, fr_inv, fr);
}
static int t_set_fr_inv(struct sip_msg* msg, char* fr_inv, char* foo)
{
return t_set_fr_all(msg, fr_inv, (char*)0);
}
/* reset fr_timer and fr_inv_timer to the default values */
static int w_t_reset_fr(struct sip_msg* msg, char* foo, char* bar)
{
return t_reset_fr();
}
/* set retr. intervals per transaction; 0 means: use the default value */
static int w_t_set_retr(struct sip_msg* msg, char* p1, char* p2)
{
int t1, t2;
if (get_int_fparam(&t1, msg, (fparam_t*)p1) < 0) return -1;
if (p2) {
if (get_int_fparam(&t2, msg, (fparam_t*)p2) < 0) return -1;
} else {
t2 = 0;
}
#ifdef TM_DIFF_RT_TIMEOUT
return t_set_retr(msg, t1, t2);
#else
ERR("w_t_set_retr: support for changing retransmission intervals on "
"the fly not compiled in (re-compile tm with"
" -DTM_DIFF_RT_TIMEOUT)\n");
return -1;
#endif
}
/* reset retr. t1 and t2 to the default values */
int w_t_reset_retr(struct sip_msg* msg, char* foo, char* bar)
{
#ifdef TM_DIFF_RT_TIMEOUT
return t_reset_retr();
#else
ERR("w_t_reset_retr: support for changing retransmission intervals on "
"the fly not compiled in (re-compile tm with"
" -DTM_DIFF_RT_TIMEOUT)\n");
return -1;
#endif
}
/* set maximum transaction lifetime for inv & noninv */
static int w_t_set_max_lifetime(struct sip_msg* msg, char* p1, char* p2)
{
int t1, t2;
if (get_int_fparam(&t1, msg, (fparam_t*)p1) < 0) return -1;
if (p2) {
if (get_int_fparam(&t2, msg, (fparam_t*)p2) < 0) return -1;
} else {
t2 = 0;
}
return t_set_max_lifetime(msg, t1, t2);
}
/* reset maximum invite/non-invite lifetime to the default value */
int w_t_reset_max_lifetime(struct sip_msg* msg, char* foo, char* bar)
{
return t_reset_max_lifetime();
}
/* helper macro, builds a function for setting a cell flag from the script.
e.g. T_SET_FLAG_GEN_FUNC(t_set_foo, T_FOO) =>
static int t_set_foo(struct sip_msg* msg, char*, char* )
that will expect fparam as first param and will set or reset T_FOO
in the current or next to be created transaction. */
#define T_SET_FLAG_GEN_FUNC(fname, T_FLAG_NAME) \
static int fname(struct sip_msg* msg, char* p1, char* p2) \
{ \
int state; \
struct cell* t; \
unsigned int set_flags; \
unsigned int reset_flags; \
\
if (get_int_fparam(&state, msg, (fparam_t*)p1) < 0) return -1; \
t=get_t(); \
/* in REPLY_ROUTE and FAILURE_ROUTE T will be set to current transaction; \
* in REQUEST_ROUTE T will be set only if the transaction was already \
* created; if not -> use the static variables */ \
if (!t || t==T_UNDEFINED ){ \
set_flags=get_msgid_val(user_cell_set_flags, msg->id, int); \
reset_flags=get_msgid_val(user_cell_reset_flags, msg->id, int); \
if (state){ \
/* set */ \
set_flags|= T_FLAG_NAME; \
reset_flags&=~T_FLAG_NAME; \
}else{ \
/* reset */ \
set_flags&=~T_FLAG_NAME; \
reset_flags|=T_FLAG_NAME; \
} \
set_msgid_val(user_cell_set_flags, msg->id, int, set_flags); \
set_msgid_val(user_cell_reset_flags, msg->id, int, reset_flags); \
}else{ \
if (state) \
t->flags|=T_FLAG_NAME; \
else \
t->flags&=~T_FLAG_NAME; \
} \
return 1; \
}
/* set automatically sending 100 replies on/off for the current or
* next to be created transaction */
T_SET_FLAG_GEN_FUNC(t_set_auto_inv_100, T_AUTO_INV_100)
/* set 6xx handling for the current or next to be created transaction */
T_SET_FLAG_GEN_FUNC(t_set_disable_6xx, T_DISABLE_6xx)
/* disable dns failover for the current transaction */
T_SET_FLAG_GEN_FUNC(t_set_disable_failover, T_DISABLE_FAILOVER)
#ifdef CANCEL_REASON_SUPPORT
/* disable/enable e2e cancel reason copy for the current transaction */
T_SET_FLAG_GEN_FUNC(t_set_no_e2e_cancel_reason, T_NO_E2E_CANCEL_REASON)
#endif /* CANCEL_REASON_SUPPORT */
/* script function, FAILURE_ROUTE only, returns true if the
* choosed "failure" branch failed because of a timeout,
* -1 otherwise */
int t_branch_timeout(struct sip_msg* msg, char* foo, char* bar)
{
return (msg->msg_flags & FL_TIMEOUT)?1:-1;
}
/* script function, FAILURE_ROUTE only, returns true if the
* choosed "failure" branch ever received a reply, -1 otherwise */
int t_branch_replied(struct sip_msg* msg, char* foo, char* bar)
{
return (msg->msg_flags & FL_REPLIED)?1:-1;
}
/* script function, returns: 1 if the transaction was canceled, -1 if not */
int t_is_canceled(struct sip_msg* msg)
{
struct cell *t;
int ret;
if (t_check( msg , 0 )==-1) return -1;
t=get_t();
if ((t==0) || (t==T_UNDEFINED)){
LOG(L_ERR, "ERROR: t_is_canceled: cannot check a message "
"for which no T-state has been established\n");
ret=-1;
}else{
ret=(t->flags & T_CANCELED)?1:-1;
}
return ret;
}
static int w_t_is_canceled(struct sip_msg* msg, char* foo, char* bar)
{
return t_is_canceled(msg);
}
/* script function, returns: 1 if the transaction lifetime interval has already elapsed, -1 if not */
int t_is_expired(struct sip_msg* msg, char* foo, char* bar)
{
struct cell *t;
int ret;
if (t_check( msg , 0 )==-1) return -1;
t=get_t();
if ((t==0) || (t==T_UNDEFINED)){
LOG(L_ERR, "ERROR: t_is_expired: cannot check a message "
"for which no T-state has been established\n");
ret=-1;
}else{
ret=(TICKS_GT(t->end_of_life, get_ticks_raw()))?-1:1;
}
return ret;
}
/* script function, returns: 1 if any of the branches did timeout, -1 if not */
int t_any_timeout(struct sip_msg* msg, char* foo, char* bar)
{
struct cell *t;
int r;
if (t_check( msg , 0 )==-1) return -1;
t=get_t();
if ((t==0) || (t==T_UNDEFINED)){
LOG(L_ERR, "ERROR: t_any_timeout: cannot check a message "
"for which no T-state has been established\n");
return -1;
}else{
for (r=0; r<t->nr_of_outgoings; r++){
if (t->uac[r].request.flags & F_RB_TIMEOUT)
return 1;
}
}
return -1;
}
/* script function, returns: 1 if any of the branches received at leat one
* reply, -1 if not */
int t_any_replied(struct sip_msg* msg, char* foo, char* bar)
{
struct cell *t;
int r;
if (t_check( msg , 0 )==-1) return -1;
t=get_t();
if ((t==0) || (t==T_UNDEFINED)){
LOG(L_ERR, "ERROR: t_any_replied: cannot check a message "
"for which no T-state has been established\n");
return -1;
}else{
for (r=0; r<t->nr_of_outgoings; r++){
if (t->uac[r].request.flags & F_RB_REPLIED)
return 1;
}
}
return -1;
}
/* script function, returns: 1 if any of the branches received the
* reply code "status" */
int t_grep_status(struct sip_msg* msg, char* status, char* bar)
{
struct cell *t;
int r;
int code;
if (get_int_fparam(&code, msg, (fparam_t*)status) < 0) return -1;
if (t_check( msg , 0 )==-1) return -1;
t=get_t();
if ((t==0) || (t==T_UNDEFINED)){
LOG(L_ERR, "ERROR: t_any_replied: cannot check a message "
"for which no T-state has been established\n");
return -1;
}else{
for (r=0; r<t->nr_of_outgoings; r++){
if ((t->uac[r].last_received==code) &&
(t->uac[r].request.flags & F_RB_REPLIED))
return 1;
}
}
return -1;
}
/* drop all the existing replies in failure_route to make sure
* that none of them is picked up again */
static int w_t_drop_replies(struct sip_msg* msg, char* foo, char* bar)
{
if(foo==NULL)
t_drop_replies(1);
else if(*foo=='n')
t_drop_replies(0);
else if(*foo=='l')
t_drop_replies(2);
else
t_drop_replies(1);
return 1;
}
/* save the message lumps after t_newtran() but before t_relay() */
static int w_t_save_lumps(struct sip_msg* msg, char* foo, char* bar)
{
struct cell *t;
if (is_route_type(REQUEST_ROUTE)) {
t=get_t();
if (!t || t==T_UNDEFINED) {
LOG(L_ERR, "ERROR: w_t_save_lumps: transaction has not been created yet\n");
return -1;
}
if (save_msg_lumps(t->uas.request, msg)) {
LOG(L_ERR, "ERROR: w_t_save_lumps: "
"failed to save the message lumps\n");
return -1;
}
} /* else nothing to do, the lumps have already been saved */
return 1;
}
/* wrapper function needed after changes in w_t_reply */
int w_t_reply_wrp(struct sip_msg *m, unsigned int code, char *txt)
{
fparam_t c;
fparam_t r;
c.type = FPARAM_INT;
c.orig = NULL; /* ? */
c.v.i = code;
r.type = FPARAM_STRING;
r.orig = NULL; /* ? */
r.v.asciiz = txt;
return w_t_reply(m, (char *)&c, (char*)&r);
}
/** script function, check if a msg is assoc. to a transaction.
* @return -1 (not), 1 (reply, e2e ack or cancel for an existing transaction),
* 0 (request retransmission, ack to negative reply or ack to local
* transaction)
* Note: the e2e ack matching works only for local e2e acks or for
* transactions with E2EACK* callbacks installed (but even in this
* case matching E2EACKs on proxied transaction is not entirely
* reliable: if the ACK is delayed the proxied transaction might
* be already deleted when it reaches the proxy (wait_timeout))
*/
int t_check_trans(struct sip_msg* msg)
{
struct cell* t;
int branch;
int ret;
if (msg->first_line.type==SIP_REPLY) {
branch = 0;
ret = (t_check_msg( msg , &branch)==1) ? 1 : -1;
tm_ctx_set_branch_index(branch);
return ret;
} else if (msg->REQ_METHOD==METHOD_CANCEL) {
return w_t_lookup_cancel(msg, 0, 0);
} else {
switch(t_check_msg(msg, 0)){
case -2: /* possible e2e ack */
return 1;
case 1: /* found */
t=get_t();
if (msg->REQ_METHOD==METHOD_ACK){
/* ack to neg. reply or ack to local trans.
=> process it and end the script */
/* FIXME: there's no way to distinguish here
between acks to local trans. and neg. acks */
if (unlikely(has_tran_tmcbs(t, TMCB_ACK_NEG_IN)))
run_trans_callbacks(TMCB_ACK_NEG_IN, t, msg,
0, msg->REQ_METHOD);
t_release_transaction(t);
} else {
/* is a retransmission */
if (unlikely(has_tran_tmcbs(t, TMCB_REQ_RETR_IN)))
run_trans_callbacks(TMCB_REQ_RETR_IN, t, msg,
0, msg->REQ_METHOD);
t_retransmit_reply(t);
}
/* no need for UNREF(t); set_t(0) - the end-of-script
t_unref callback will take care of them */
return 0; /* return from the script */
}
/* not found or error */
}
return -1;
}
static int w_t_check_trans(struct sip_msg* msg, char* foo, char* bar)
{
return t_check_trans(msg);
}
static int hexatoi(str *s, unsigned int* result)
{
int i, xv, fact;
/* more than 32bit hexa? */
if (s->len>8)
return -1;
*result = 0;
fact = 1;
for(i=s->len-1; i>=0 ;i--)
{
xv = hex2int(s->s[i]);
if(xv<0)
return -1;
*result += (xv * fact);
fact *= 16;
}
return 0;
}
static int fixup_t_relay_to(void** param, int param_no)
{
int port;
int proto;
unsigned int flags;
struct proxy_l *proxy;
action_u_t *a;
str s;
str host;
s.s = (char*)*param;
s.len = strlen(s.s);
LM_DBG("fixing (%s, %d)\n", s.s, param_no);
if (param_no==1){
a = fixup_get_param(param, param_no, 2);
if(a==NULL)
{
LM_CRIT("server error for parameter <%s>\n",s.s);
return E_UNSPEC;
}
if(a->u.string!=NULL) {
/* second parameter set, first should be proxy addr */
if (parse_phostport(s.s, &host.s, &host.len, &port, &proto)!=0){
LM_CRIT("invalid proxy addr parameter <%s>\n",s.s);
return E_UNSPEC;
}
proxy = mk_proxy(&host, port, proto);
if (proxy==0) {
LM_ERR("failed to build proxy structure for <%.*s>\n", host.len, host.s );
return E_UNSPEC;
}
*(param)=proxy;
return 0;
} else {
/* no second parameter, then is proxy addr or flags */
flags = 0;
if (s.len>2 && s.s[0]=='0' && s.s[1]=='x') {
s.s += 2;
s.len -= 2;
if(hexatoi(&s, &flags)<0)
{
LM_CRIT("invalid hexa flags <%s>\n", s.s);
return E_UNSPEC;
}
a->u.data = (void*)(unsigned long int)flags;
*(param)= 0;
return 0;
} else {
if(str2int(&s, &flags)==0)
{
a->u.data = (void*)(unsigned long int)flags;
*(param)= 0;
return 0;
} else {
/* try proxy */
if (parse_phostport(s.s, &host.s, &host.len, &port, &proto)!=0){
LM_CRIT("invalid proxy addr parameter <%s>\n",s.s);
return E_UNSPEC;
}
proxy = mk_proxy(&host, port, proto);
if (proxy==0) {
LM_ERR("failed to build proxy structure for <%.*s>\n", host.len, host.s );
return E_UNSPEC;
}
*(param)=proxy;
return 0;
}
}
}
} else if (param_no==2) {
/* flags */
flags = 0;
if (s.len>2 && s.s[0]=='0' && s.s[1]=='x') {
s.s += 2;
s.len -= 2;
if(hexatoi(&s, &flags)<0)
{
LM_CRIT("invalid hexa flags <%s>\n", s.s);
return E_UNSPEC;
}
*(param) = (void*)(unsigned long int)flags;
return 0;
} else {
if(str2int(&s, &flags)==0)
{
*(param) = (void*)(unsigned long int)flags;
return 0;
} else {
LM_CRIT("invalid flags <%s>\n", s.s);
return E_UNSPEC;
}
}
} else {
LM_ERR("invalid parameter number %d\n", param_no);
return E_BUG;
}
}
inline static int w_t_relay_to(struct sip_msg *msg, char *proxy, char *flags)
{
unsigned int fl;
struct proxy_l *px;
fparam_t param;
fl = (unsigned int)(long)(void*)flags;
px = (struct proxy_l*)proxy;
if(flags!=0)
{
memset(&param, 0, sizeof(fparam_t));
param.type = FPARAM_INT;
/* no auto 100 trying */
if(fl&1) {
param.v.i = 0;
t_set_auto_inv_100(msg, (char*)(&param), 0);
}
/* no auto negative reply - not implemented */
/*
if(fl&2) {
param.v.i = 1;
t_set_disable_internal_reply(msg, (char*)param, 0);
}
*/
/* no dns failover */
if(fl&4) {
param.v.i = 1;
t_set_disable_failover(msg, (char*)(&param), 0);
}
}
return _w_t_relay_to(msg, px, PROTO_NONE);
}
/* rpc docs */
static const char* rpc_cancel_doc[2] = {
"Cancel a pending transaction",
0
};
static const char* rpc_reply_doc[2] = {
"Reply transaction",
0
};
static const char* tm_rpc_stats_doc[2] = {
"Print transaction statistics.",
0
};
static const char* tm_rpc_hash_stats_doc[2] = {
"Prints hash table statistics (can be used only if tm is compiled"
" with -DTM_HASH_STATS).",
0
};
static const char* rpc_t_uac_start_doc[2] = {
"starts a tm uac using a list of string parameters: method, ruri, dst_uri"
", send_sock, headers (CRLF separated) and body (optional)",
0
};
static const char* rpc_t_uac_wait_doc[2] = {
"starts a tm uac and waits for the final reply, using a list of string "
"parameters: method, ruri, dst_uri send_sock, headers (CRLF separated)"
" and body (optional)",
0
};
/* rpc exports */
static rpc_export_t tm_rpc[] = {
{"tm.cancel", rpc_cancel, rpc_cancel_doc, 0},
{"tm.reply", rpc_reply, rpc_reply_doc, 0},
{"tm.stats", tm_rpc_stats, tm_rpc_stats_doc, 0},
{"tm.hash_stats", tm_rpc_hash_stats, tm_rpc_hash_stats_doc, 0},
{"tm.t_uac_start", rpc_t_uac_start, rpc_t_uac_start_doc, 0 },
{"tm.t_uac_wait", rpc_t_uac_wait, rpc_t_uac_wait_doc, RET_ARRAY},
{0, 0, 0, 0}
};