forward.h
888ca09d
 /*
53c7e0f1
  * Copyright (C) 2001-2003 FhG Fokus
7dd0b342
  *
02ca141b
  * This file is part of Kamailio, a free SIP server.
7dd0b342
  *
02ca141b
  * Kamailio is free software; you can redistribute it and/or modify
7dd0b342
  * it under the terms of the GNU General Public License as published by
  * the Free Software Foundation; either version 2 of the License, or
  * (at your option) any later version
  *
02ca141b
  * Kamailio is distributed in the hope that it will be useful,
7dd0b342
  * but WITHOUT ANY WARRANTY; without even the implied warranty of
  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  * GNU General Public License for more details.
  *
  * You should have received a copy of the GNU General Public License 
  * along with this program; if not, write to the Free Software 
9e1ff448
  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
888ca09d
  */
02ca141b
 /*!
 * \file
 * \brief Kamailio core :: Message forwarding
 * \author andrei
 * \ingroup core
 * Module: \ref core
 */
7dd0b342
 
888ca09d
 #ifndef forward_h
 #define forward_h
 
5dcfb23d
 #include "globals.h"
3881f12c
 #include "parser/msg_parser.h"
888ca09d
 #include "route.h"
4ac74c03
 #include "proxy.h"
36ef0329
 #include "ip_addr.h"
888ca09d
 
c030910c
 #include "stats.h"
 #include "udp_server.h"
 #ifdef USE_TCP
 #include "tcp_server.h"
1f139814
 #include "tcp_conn.h"
c030910c
 #endif
ed990c31
 #ifdef USE_SCTP
7f8e7a85
 #include "sctp_core.h"
ed990c31
 #endif
c030910c
 
f479903f
 #include "compiler_opt.h"
88b792e4
 #include "events.h"
f479903f
 
1b1b19d8
 
9981e48a
 enum ss_mismatch {
 	SS_MISMATCH_OK=0,
 	SS_MISMATCH_PROTO, /* proto mismatch, but found same addr:port */
 	SS_MISMATCH_ADDR,  /* proto and addr:port mismatch */
 	SS_MISMATCH_AF,    /* af mismatch */
 	SS_MISMATCH_MCAST  /* mcast forced send socket */
 };
 
 struct socket_info* get_send_socket2(struct socket_info* force_send_socket,
 									union sockaddr_union* su, int proto,
 									enum ss_mismatch* mismatch);
 
 
 inline static struct socket_info* get_send_socket(struct sip_msg* msg,
 									union sockaddr_union* su, int proto)
 {
 	return get_send_socket2(msg?msg->force_send_socket:0, su, proto, 0);
 }
 
a35ad52c
 
2e55d7bd
 #define GET_URI_PORT(uri) ((uri)->port_no?(uri)->port_no:(((uri)->proto==PROTO_TLS)?SIPS_PORT:SIP_PORT))
 
2d4b798e
 struct socket_info* get_out_socket(union sockaddr_union* to, int proto);
1dfc197d
 typedef int (*check_self_f)(str* host, unsigned short port,
 		unsigned short proto);
 int register_check_self_func(check_self_f f);
50d5fa87
 int check_self(str* host, unsigned short port, unsigned short proto);
2bf9371d
 int check_self_port(unsigned short port, unsigned short proto);
dcb59e67
 int forward_request( struct sip_msg* msg, str* dst,  unsigned short port,
 						struct dest_info* send_info);
4e2fdd79
 int update_sock_struct_from_via( union sockaddr_union* to,
181e7cc0
 								 struct sip_msg* msg,
 								 struct via_body* via );
20581c5a
 
 /* use src_ip, port=src_port if rport, via port if via port, 5060 otherwise */
f2f969dd
 #define update_sock_struct_from_ip(  to, msg ) \
 	init_su((to), &(msg)->rcv.src_ip, \
70b2fe02
 			(((msg)->via1->rport)|| \
 			 (((msg)->msg_flags|global_req_flags)&FL_FORCE_RPORT))? \
3e8c3475
 							(msg)->rcv.src_port: \
 							((msg)->via1->port)?(msg)->via1->port: SIP_PORT )
f2f969dd
 
4ac74c03
 int forward_reply( struct sip_msg* msg);
9cb17369
 int forward_reply_nocb( struct sip_msg* msg);
888ca09d
 
9d9e7399
 void forward_set_send_info(int v);
 
a077f5e1
 int is_check_self_func_list_set(void);
c030910c
 
 
 /* params:
e6a2b12e
  * dst = struct dest_info containing:
f479903f
  *    send_sock = 0 if not known (e.g. for udp in some cases), non-0 otherwise;
  *                if 0 or mcast a new send_sock will be automatically choosen
e6a2b12e
  *    proto = TCP|UDP
  *    to = destination (sockaddr_union)
  *    id = only used on tcp, it will force sending on connection "id" if id!=0 
  *         and the connection exists, else it will send to "to" 
  *        (useful for sending replies on  the same connection as the request
  *         that generated them; use 0 if you don't want this)
  * buf, len = buffer
c030910c
  * returns: 0 if ok, -1 on error*/
88b792e4
 
e6a2b12e
 static inline int msg_send(struct dest_info* dst, char* buf, int len)
c030910c
 {
f479903f
 	struct dest_info new_dst;
88b792e4
 	str outb;
6fcba958
 #ifdef USE_TCP 
32691163
 	int port;
 	struct ip_addr ip;
 	union sockaddr_union* from = NULL;
6fcba958
 	union sockaddr_union local_addr;
1f139814
 	struct tcp_connection *con = NULL;
 	struct ws_event_info wsev;
ffdae598
 	int ret;
6fcba958
 #endif
 	
88b792e4
 	outb.s = buf;
 	outb.len = len;
 	sr_event_exec(SREV_NET_DATA_OUT, (void*)&outb);
1f139814
 
c2b0be97
 	if(outb.s==NULL) {
 		LM_ERR("failed to update outgoing buffer\n");
 		return -1;
 	}
 
1f139814
 #ifdef USE_TCP
8393efff
 	if (unlikely((dst->proto == PROTO_WS
1f139814
 #ifdef USE_TLS
8393efff
 		|| dst->proto == PROTO_WSS
1f139814
 #endif
8393efff
 	) && sr_event_enabled(SREV_TCP_WS_FRAME_OUT))) {
32691163
 		if (unlikely(dst->send_flags.f & SND_F_FORCE_SOCKET
 				&& dst->send_sock)) {
 			local_addr = dst->send_sock->su;
 			su_setport(&local_addr, 0); /* any local port will do */
 			from = &local_addr;
 		}
 
8393efff
 		port = su_getport(&dst->to);
 		if (likely(port)) {
 			su2ip_addr(&ip, &dst->to);
 			con = tcpconn_get(dst->id, &ip, port, from, 0);
1f139814
 		}
8393efff
 		else if (likely(dst->id))
 			con = tcpconn_get(dst->id, 0, 0, 0, 0);
 		else {
e23c76c9
 			LM_CRIT("null_id & to\n");
ffdae598
 			goto error;
8393efff
 		}
 
6fe3e10b
 		if (con == NULL)
 		{
 			LM_WARN("TCP/TLS connection for WebSocket could not be found\n");
ffdae598
 			goto error;
6fe3e10b
 		}
 
8393efff
 		memset(&wsev, 0, sizeof(ws_event_info_t));
 		wsev.type = SREV_TCP_WS_FRAME_OUT;
 		wsev.buf = outb.s;
 		wsev.len = outb.len;
 		wsev.id = con->id;
ffdae598
 		ret = sr_event_exec(SREV_TCP_WS_FRAME_OUT, (void *) &wsev);
 		tcpconn_put(con);
ec8fe1e7
 		goto done;
1f139814
 	}
 #endif
 
f479903f
 	if (likely(dst->proto==PROTO_UDP)){
 		if (unlikely((dst->send_sock==0) || 
 					(dst->send_sock->flags & SI_IS_MCAST))){
 			new_dst=*dst;
 			new_dst.send_sock=get_send_socket(0, &dst->to, dst->proto);
 			if (unlikely(new_dst.send_sock==0)){
e23c76c9
 				LM_ERR("no sending socket found\n");
f479903f
 				goto error;
 			}
 			dst=&new_dst;
c030910c
 		}
88b792e4
 		if (unlikely(udp_send(dst, outb.s, outb.len)==-1)){
c030910c
 			STATS_TX_DROPS;
40971d1e
 			LOG(cfg_get(core, core_cfg, corelog), "udp_send failed\n");
c030910c
 			goto error;
 		}
 	}
 #ifdef USE_TCP
e6a2b12e
 	else if (dst->proto==PROTO_TCP){
f479903f
 		if (unlikely(tcp_disable)){
c030910c
 			STATS_TX_DROPS;
e23c76c9
 			LM_WARN("attempt to send on tcp and tcp support is disabled\n");
c030910c
 			goto error;
5dcfb23d
 		}else{
8393efff
 			if (unlikely((dst->send_flags.f & SND_F_FORCE_SOCKET) &&
 						dst->send_sock)) {
 				local_addr=dst->send_sock->su;
 				su_setport(&local_addr, 0); /* any local port will do */
 				from=&local_addr;
 			}
6fcba958
 			if (unlikely(tcp_send(dst, from, outb.s, outb.len)<0)){
5dcfb23d
 				STATS_TX_DROPS;
40971d1e
 				LOG(cfg_get(core, core_cfg, corelog), "tcp_send failed\n");
5dcfb23d
 				goto error;
 			}
c030910c
 		}
 	}
e9b02e8e
 #ifdef USE_TLS
e6a2b12e
 	else if (dst->proto==PROTO_TLS){
f479903f
 		if (unlikely(tls_disable)){
e9b02e8e
 			STATS_TX_DROPS;
e23c76c9
 			LM_WARN("attempt to send on tls and tls support is disabled\n");
e9b02e8e
 			goto error;
 		}else{
8393efff
 			if (unlikely((dst->send_flags.f & SND_F_FORCE_SOCKET) &&
 						dst->send_sock)) {
 				local_addr=dst->send_sock->su;
 				su_setport(&local_addr, 0); /* any local port will do */
 				from=&local_addr;
 			}
6fcba958
 			if (unlikely(tcp_send(dst, from, outb.s, outb.len)<0)){
e9b02e8e
 				STATS_TX_DROPS;
40971d1e
 				LOG(cfg_get(core, core_cfg, corelog), "tcp_send failed\n");
e9b02e8e
 				goto error;
 			}
 		}
 	}
 #endif /* USE_TLS */
 #endif /* USE_TCP */
ed990c31
 #ifdef USE_SCTP
 	else if (dst->proto==PROTO_SCTP){
 		if (unlikely(sctp_disable)){
 			STATS_TX_DROPS;
e23c76c9
 			LM_WARN("attempt to send on sctp and sctp support is disabled\n");
ed990c31
 			goto error;
 		}else{
d6a58b53
 			if (unlikely(dst->send_sock==0)){
 				new_dst=*dst;
 				new_dst.send_sock=get_send_socket(0, &dst->to, dst->proto);
 				if (unlikely(new_dst.send_sock==0)){
e23c76c9
 					LM_ERR("no sending SCTP socket found\n");
d6a58b53
 					goto error;
 				}
 				dst=&new_dst;
 			}
7f8e7a85
 			if (unlikely(sctp_core_msg_send(dst, outb.s, outb.len)<0)){
ed990c31
 				STATS_TX_DROPS;
40971d1e
 				LOG(cfg_get(core, core_cfg, corelog), "sctp_msg_send failed\n");
ed990c31
 				goto error;
 			}
 		}
 	}
 #endif /* USE_SCTP */
c030910c
 	else{
e23c76c9
 			LM_CRIT("unknown proto %d\n", dst->proto);
c030910c
 			goto error;
 	}
ec8fe1e7
 	ret = 0;
 done:
88b792e4
 	if(outb.s != buf)
 		pkg_free(outb.s);
ec8fe1e7
 	return ret;
c030910c
 error:
88b792e4
 	if(outb.s != buf)
 		pkg_free(outb.s);
c030910c
 	return -1;
 }
 
888ca09d
 #endif