888ca09d |
/*
* $Id$
|
7dd0b342 |
*
|
53c7e0f1 |
* Copyright (C) 2001-2003 FhG Fokus
|
7dd0b342 |
*
* This file is part of ser, a free SIP server.
*
* ser is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version
*
* For a license to use the ser software under conditions
* other than those described here, or to purchase support for this
* software, please contact iptel.org by e-mail at the following addresses:
* info@iptel.org
*
* ser is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
|
9e1ff448 |
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
888ca09d |
*/
|
c030910c |
/*
* History:
* -------
|
3e8c3475 |
* 2001-??-?? created by andrei
* ????-??-?? lots of changes by a lot of people
* 2003-02-11 added inline msg_send (andrei)
* 2003-04-07 changed all ports to host byte order (andrei)
* 2003-04-12 FORCE_RPORT_T added (andrei)
|
5dcfb23d |
* 2003-04-15 added tcp_disable support (andrei)
|
e6a2b12e |
* 2006-04-12 reduced msg_send() parameter list: it uses now a struct
* dest_info param. (andrei)
|
f479903f |
* 2007-10-08 msg_send() will ignore a mcast send_sock and choose another
* one by itself (andrei)
|
c030910c |
*/
|
888ca09d |
|
7dd0b342 |
|
888ca09d |
#ifndef forward_h
#define forward_h
|
5dcfb23d |
#include "globals.h"
|
3881f12c |
#include "parser/msg_parser.h"
|
888ca09d |
#include "route.h"
|
4ac74c03 |
#include "proxy.h"
|
36ef0329 |
#include "ip_addr.h"
|
888ca09d |
|
c030910c |
#include "stats.h"
#include "udp_server.h"
#ifdef USE_TCP
#include "tcp_server.h"
|
1f139814 |
#include "tcp_conn.h"
|
c030910c |
#endif
|
ed990c31 |
#ifdef USE_SCTP
|
7f8e7a85 |
#include "sctp_core.h"
|
ed990c31 |
#endif
|
c030910c |
|
f479903f |
#include "compiler_opt.h"
|
88b792e4 |
#include "events.h"
|
f479903f |
|
1b1b19d8 |
|
9981e48a |
enum ss_mismatch {
SS_MISMATCH_OK=0,
SS_MISMATCH_PROTO, /* proto mismatch, but found same addr:port */
SS_MISMATCH_ADDR, /* proto and addr:port mismatch */
SS_MISMATCH_AF, /* af mismatch */
SS_MISMATCH_MCAST /* mcast forced send socket */
};
struct socket_info* get_send_socket2(struct socket_info* force_send_socket,
union sockaddr_union* su, int proto,
enum ss_mismatch* mismatch);
inline static struct socket_info* get_send_socket(struct sip_msg* msg,
union sockaddr_union* su, int proto)
{
return get_send_socket2(msg?msg->force_send_socket:0, su, proto, 0);
}
|
a35ad52c |
|
2e55d7bd |
#define GET_URI_PORT(uri) ((uri)->port_no?(uri)->port_no:(((uri)->proto==PROTO_TLS)?SIPS_PORT:SIP_PORT))
|
2d4b798e |
struct socket_info* get_out_socket(union sockaddr_union* to, int proto);
|
1dfc197d |
typedef int (*check_self_f)(str* host, unsigned short port,
unsigned short proto);
int register_check_self_func(check_self_f f);
|
50d5fa87 |
int check_self(str* host, unsigned short port, unsigned short proto);
|
2bf9371d |
int check_self_port(unsigned short port, unsigned short proto);
|
dcb59e67 |
int forward_request( struct sip_msg* msg, str* dst, unsigned short port,
struct dest_info* send_info);
|
4e2fdd79 |
int update_sock_struct_from_via( union sockaddr_union* to,
|
181e7cc0 |
struct sip_msg* msg,
struct via_body* via );
|
20581c5a |
/* use src_ip, port=src_port if rport, via port if via port, 5060 otherwise */
|
f2f969dd |
#define update_sock_struct_from_ip( to, msg ) \
init_su((to), &(msg)->rcv.src_ip, \
|
70b2fe02 |
(((msg)->via1->rport)|| \
(((msg)->msg_flags|global_req_flags)&FL_FORCE_RPORT))? \
|
3e8c3475 |
(msg)->rcv.src_port: \
((msg)->via1->port)?(msg)->via1->port: SIP_PORT )
|
f2f969dd |
|
4ac74c03 |
int forward_reply( struct sip_msg* msg);
|
9cb17369 |
int forward_reply_nocb( struct sip_msg* msg);
|
888ca09d |
|
9d9e7399 |
void forward_set_send_info(int v);
|
a077f5e1 |
int is_check_self_func_list_set(void);
|
c030910c |
/* params:
|
e6a2b12e |
* dst = struct dest_info containing:
|
f479903f |
* send_sock = 0 if not known (e.g. for udp in some cases), non-0 otherwise;
* if 0 or mcast a new send_sock will be automatically choosen
|
e6a2b12e |
* proto = TCP|UDP
* to = destination (sockaddr_union)
* id = only used on tcp, it will force sending on connection "id" if id!=0
* and the connection exists, else it will send to "to"
* (useful for sending replies on the same connection as the request
* that generated them; use 0 if you don't want this)
* buf, len = buffer
|
c030910c |
* returns: 0 if ok, -1 on error*/
|
88b792e4 |
|
e6a2b12e |
static inline int msg_send(struct dest_info* dst, char* buf, int len)
|
c030910c |
{
|
f479903f |
struct dest_info new_dst;
|
88b792e4 |
str outb;
|
6fcba958 |
#ifdef USE_TCP
|
32691163 |
int port;
struct ip_addr ip;
union sockaddr_union* from = NULL;
|
6fcba958 |
union sockaddr_union local_addr;
|
1f139814 |
struct tcp_connection *con = NULL;
struct ws_event_info wsev;
|
ffdae598 |
int ret;
|
6fcba958 |
#endif
|
88b792e4 |
outb.s = buf;
outb.len = len;
sr_event_exec(SREV_NET_DATA_OUT, (void*)&outb);
|
1f139814 |
|
c2b0be97 |
if(outb.s==NULL) {
LM_ERR("failed to update outgoing buffer\n");
return -1;
}
|
1f139814 |
#ifdef USE_TCP
|
8393efff |
if (unlikely((dst->proto == PROTO_WS
|
1f139814 |
#ifdef USE_TLS
|
8393efff |
|| dst->proto == PROTO_WSS
|
1f139814 |
#endif
|
8393efff |
) && sr_event_enabled(SREV_TCP_WS_FRAME_OUT))) {
|
32691163 |
if (unlikely(dst->send_flags.f & SND_F_FORCE_SOCKET
&& dst->send_sock)) {
local_addr = dst->send_sock->su;
su_setport(&local_addr, 0); /* any local port will do */
from = &local_addr;
}
|
8393efff |
port = su_getport(&dst->to);
if (likely(port)) {
su2ip_addr(&ip, &dst->to);
con = tcpconn_get(dst->id, &ip, port, from, 0);
|
1f139814 |
}
|
8393efff |
else if (likely(dst->id))
con = tcpconn_get(dst->id, 0, 0, 0, 0);
else {
LM_CRIT("BUG: msg_send called with null_id & to\n");
|
ffdae598 |
goto error;
|
8393efff |
}
|
6fe3e10b |
if (con == NULL)
{
LM_WARN("TCP/TLS connection for WebSocket could not be found\n");
|
ffdae598 |
goto error;
|
6fe3e10b |
}
|
8393efff |
memset(&wsev, 0, sizeof(ws_event_info_t));
wsev.type = SREV_TCP_WS_FRAME_OUT;
wsev.buf = outb.s;
wsev.len = outb.len;
wsev.id = con->id;
|
ffdae598 |
ret = sr_event_exec(SREV_TCP_WS_FRAME_OUT, (void *) &wsev);
tcpconn_put(con);
|
ec8fe1e7 |
goto done;
|
1f139814 |
}
#endif
|
f479903f |
if (likely(dst->proto==PROTO_UDP)){
if (unlikely((dst->send_sock==0) ||
(dst->send_sock->flags & SI_IS_MCAST))){
new_dst=*dst;
new_dst.send_sock=get_send_socket(0, &dst->to, dst->proto);
if (unlikely(new_dst.send_sock==0)){
LOG(L_ERR, "msg_send: ERROR: no sending socket found\n");
goto error;
}
dst=&new_dst;
|
c030910c |
}
|
88b792e4 |
if (unlikely(udp_send(dst, outb.s, outb.len)==-1)){
|
c030910c |
STATS_TX_DROPS;
LOG(L_ERR, "msg_send: ERROR: udp_send failed\n");
goto error;
}
}
#ifdef USE_TCP
|
e6a2b12e |
else if (dst->proto==PROTO_TCP){
|
f479903f |
if (unlikely(tcp_disable)){
|
c030910c |
STATS_TX_DROPS;
|
5dcfb23d |
LOG(L_WARN, "msg_send: WARNING: attempt to send on tcp and tcp"
" support is disabled\n");
|
c030910c |
goto error;
|
5dcfb23d |
}else{
|
8393efff |
if (unlikely((dst->send_flags.f & SND_F_FORCE_SOCKET) &&
dst->send_sock)) {
local_addr=dst->send_sock->su;
su_setport(&local_addr, 0); /* any local port will do */
from=&local_addr;
}
|
6fcba958 |
if (unlikely(tcp_send(dst, from, outb.s, outb.len)<0)){
|
5dcfb23d |
STATS_TX_DROPS;
LOG(L_ERR, "msg_send: ERROR: tcp_send failed\n");
goto error;
}
|
c030910c |
}
}
|
e9b02e8e |
#ifdef USE_TLS
|
e6a2b12e |
else if (dst->proto==PROTO_TLS){
|
f479903f |
if (unlikely(tls_disable)){
|
e9b02e8e |
STATS_TX_DROPS;
LOG(L_WARN, "msg_send: WARNING: attempt to send on tls and tls"
" support is disabled\n");
goto error;
}else{
|
8393efff |
if (unlikely((dst->send_flags.f & SND_F_FORCE_SOCKET) &&
dst->send_sock)) {
local_addr=dst->send_sock->su;
su_setport(&local_addr, 0); /* any local port will do */
from=&local_addr;
}
|
6fcba958 |
if (unlikely(tcp_send(dst, from, outb.s, outb.len)<0)){
|
e9b02e8e |
STATS_TX_DROPS;
LOG(L_ERR, "msg_send: ERROR: tcp_send failed\n");
goto error;
}
}
}
#endif /* USE_TLS */
#endif /* USE_TCP */
|
ed990c31 |
#ifdef USE_SCTP
else if (dst->proto==PROTO_SCTP){
if (unlikely(sctp_disable)){
STATS_TX_DROPS;
LOG(L_WARN, "msg_send: WARNING: attempt to send on sctp and sctp"
" support is disabled\n");
goto error;
}else{
|
d6a58b53 |
if (unlikely(dst->send_sock==0)){
new_dst=*dst;
new_dst.send_sock=get_send_socket(0, &dst->to, dst->proto);
if (unlikely(new_dst.send_sock==0)){
LOG(L_ERR, "msg_send: ERROR: no sending SCTP socket found\n");
goto error;
}
dst=&new_dst;
}
|
7f8e7a85 |
if (unlikely(sctp_core_msg_send(dst, outb.s, outb.len)<0)){
|
ed990c31 |
STATS_TX_DROPS;
LOG(L_ERR, "msg_send: ERROR: sctp_msg_send failed\n");
goto error;
}
}
}
#endif /* USE_SCTP */
|
c030910c |
else{
|
e6a2b12e |
LOG(L_CRIT, "BUG: msg_send: unknown proto %d\n", dst->proto);
|
c030910c |
goto error;
}
|
ec8fe1e7 |
ret = 0;
done:
|
88b792e4 |
if(outb.s != buf)
pkg_free(outb.s);
|
ec8fe1e7 |
return ret;
|
c030910c |
error:
|
88b792e4 |
if(outb.s != buf)
pkg_free(outb.s);
|
c030910c |
return -1;
}
|
888ca09d |
#endif
|