/* * Asterisk -- An open source telephony toolkit. * * Copyright (C) 2013, Digium, Inc. * * Mark Michelson * * See http://www.asterisk.org for more information about * the Asterisk project. Please do not directly contact * any of the maintainers of this project for assistance; * the project provides a web site, mailing lists and IRC * channels for your use. * * This program is free software, distributed under the terms of * the GNU General Public License Version 2. See the LICENSE file * at the top of the source tree. */ #include "asterisk.h" #include /* Needed for SUBSCRIBE, NOTIFY, and PUBLISH method definitions */ #include #include #include #include #include #include "asterisk/res_pjsip.h" #include "asterisk/strings.h" #include "pjsip/sip_parser.h" #include "res_pjsip/include/res_pjsip_private.h" #include "asterisk/linkedlists.h" #include "asterisk/logger.h" #include "asterisk/lock.h" #include "asterisk/utils.h" #include "asterisk/astobj2.h" #include "asterisk/module.h" #include "asterisk/serializer.h" #include "asterisk/threadpool.h" #include "asterisk/taskprocessor.h" #include "asterisk/uuid.h" #include "asterisk/sorcery.h" #include "asterisk/file.h" #include "asterisk/causes.h" #include "asterisk/cli.h" #include "asterisk/callerid.h" #include "asterisk/res_pjsip_cli.h" #include "asterisk/test.h" #include "asterisk/res_pjsip_presence_xml.h" #include "asterisk/res_pjproject.h" #include "asterisk/utf8.h" #include "asterisk/acl.h" /*** MODULEINFO pjproject res_pjproject res_sorcery_config res_sorcery_memory res_sorcery_astdb res_statsd res_geolocation core ***/ #define MOD_DATA_CONTACT "contact" /*! Number of serializers in pool if one not supplied. */ #define SERIALIZER_POOL_SIZE 8 /*! Pool of serializers to use if not supplied. */ static struct ast_serializer_pool *sip_serializer_pool; static pjsip_endpoint *ast_pjsip_endpoint; static struct ast_threadpool *sip_threadpool; /*! Local host address for IPv4 */ static pj_sockaddr host_ip_ipv4; /*! Local host address for IPv4 (string form) */ static char host_ip_ipv4_string[PJ_INET6_ADDRSTRLEN]; /*! Local host address for IPv6 */ static pj_sockaddr host_ip_ipv6; /*! Local host address for IPv6 (string form) */ static char host_ip_ipv6_string[PJ_INET6_ADDRSTRLEN]; void ast_sip_add_date_header(pjsip_tx_data *tdata) { char date[256]; struct tm tm; time_t t = time(NULL); gmtime_r(&t, &tm); strftime(date, sizeof(date), "%a, %d %b %Y %T GMT", &tm); ast_sip_add_header(tdata, "Date", date); } static int register_service(void *data) { pjsip_module **module = data; if (!ast_pjsip_endpoint) { ast_log(LOG_ERROR, "There is no PJSIP endpoint. Unable to register services\n"); return -1; } if (pjsip_endpt_register_module(ast_pjsip_endpoint, *module) != PJ_SUCCESS) { ast_log(LOG_ERROR, "Unable to register module %.*s\n", (int) pj_strlen(&(*module)->name), pj_strbuf(&(*module)->name)); return -1; } ast_debug(1, "Registered SIP service %.*s (%p)\n", (int) pj_strlen(&(*module)->name), pj_strbuf(&(*module)->name), *module); return 0; } int ast_sip_register_service(pjsip_module *module) { return ast_sip_push_task_wait_servant(NULL, register_service, &module); } static int unregister_service(void *data) { pjsip_module **module = data; if (!ast_pjsip_endpoint) { return -1; } pjsip_endpt_unregister_module(ast_pjsip_endpoint, *module); ast_debug(1, "Unregistered SIP service %.*s\n", (int) pj_strlen(&(*module)->name), pj_strbuf(&(*module)->name)); return 0; } void ast_sip_unregister_service(pjsip_module *module) { ast_sip_push_task_wait_servant(NULL, unregister_service, &module); } static struct ast_sip_authenticator *registered_authenticator; int ast_sip_register_authenticator(struct ast_sip_authenticator *auth) { if (registered_authenticator) { ast_log(LOG_WARNING, "Authenticator %p is already registered. Cannot register a new one\n", registered_authenticator); return -1; } registered_authenticator = auth; ast_debug(1, "Registered SIP authenticator module %p\n", auth); return 0; } void ast_sip_unregister_authenticator(struct ast_sip_authenticator *auth) { if (registered_authenticator != auth) { ast_log(LOG_WARNING, "Trying to unregister authenticator %p but authenticator %p registered\n", auth, registered_authenticator); return; } registered_authenticator = NULL; ast_debug(1, "Unregistered SIP authenticator %p\n", auth); } int ast_sip_requires_authentication(struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata) { if (endpoint->allow_unauthenticated_options && !pjsip_method_cmp(&rdata->msg_info.msg->line.req.method, &pjsip_options_method)) { ast_debug(3, "Skipping OPTIONS authentication due to endpoint configuration\n"); return 0; } if (!registered_authenticator) { ast_log(LOG_WARNING, "No SIP authenticator registered. Assuming authentication is not required\n"); return 0; } return registered_authenticator->requires_authentication(endpoint, rdata); } enum ast_sip_check_auth_result ast_sip_check_authentication(struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata, pjsip_tx_data *tdata) { if (!registered_authenticator) { ast_log(LOG_WARNING, "No SIP authenticator registered. Assuming authentication is successful\n"); return AST_SIP_AUTHENTICATION_SUCCESS; } return registered_authenticator->check_authentication(endpoint, rdata, tdata); } static struct ast_sip_outbound_authenticator *registered_outbound_authenticator; int ast_sip_register_outbound_authenticator(struct ast_sip_outbound_authenticator *auth) { if (registered_outbound_authenticator) { ast_log(LOG_WARNING, "Outbound authenticator %p is already registered. Cannot register a new one\n", registered_outbound_authenticator); return -1; } registered_outbound_authenticator = auth; ast_debug(1, "Registered SIP outbound authenticator module %p\n", auth); return 0; } void ast_sip_unregister_outbound_authenticator(struct ast_sip_outbound_authenticator *auth) { if (registered_outbound_authenticator != auth) { ast_log(LOG_WARNING, "Trying to unregister outbound authenticator %p but outbound authenticator %p registered\n", auth, registered_outbound_authenticator); return; } registered_outbound_authenticator = NULL; ast_debug(1, "Unregistered SIP outbound authenticator %p\n", auth); } int ast_sip_create_request_with_auth(const struct ast_sip_auth_vector *auths, pjsip_rx_data *challenge, pjsip_tx_data *old_request, pjsip_tx_data **new_request) { if (!registered_outbound_authenticator) { ast_log(LOG_WARNING, "No SIP outbound authenticator registered. Cannot respond to authentication challenge\n"); return -1; } return registered_outbound_authenticator->create_request_with_auth(auths, challenge, old_request, new_request); } struct endpoint_identifier_list { const char *name; unsigned int priority; struct ast_sip_endpoint_identifier *identifier; AST_RWLIST_ENTRY(endpoint_identifier_list) list; }; static AST_RWLIST_HEAD_STATIC(endpoint_identifiers, endpoint_identifier_list); int ast_sip_register_endpoint_identifier_with_name(struct ast_sip_endpoint_identifier *identifier, const char *name) { char *prev, *current, *identifier_order; struct endpoint_identifier_list *iter, *id_list_item; SCOPED_LOCK(lock, &endpoint_identifiers, AST_RWLIST_WRLOCK, AST_RWLIST_UNLOCK); id_list_item = ast_calloc(1, sizeof(*id_list_item)); if (!id_list_item) { ast_log(LOG_ERROR, "Unable to add endpoint identifier. Out of memory.\n"); return -1; } id_list_item->identifier = identifier; id_list_item->name = name; ast_debug(1, "Register endpoint identifier %s(%p)\n", name ?: "", identifier); if (ast_strlen_zero(name)) { /* if an identifier has no name then place in front */ AST_RWLIST_INSERT_HEAD(&endpoint_identifiers, id_list_item, list); return 0; } /* see if the name of the identifier is in the global endpoint_identifier_order list */ identifier_order = prev = current = ast_sip_get_endpoint_identifier_order(); if (ast_strlen_zero(identifier_order)) { id_list_item->priority = UINT_MAX; AST_RWLIST_INSERT_TAIL(&endpoint_identifiers, id_list_item, list); ast_free(identifier_order); return 0; } id_list_item->priority = 0; while ((current = strchr(current, ','))) { ++id_list_item->priority; if (!strncmp(prev, name, current - prev) && strlen(name) == current - prev) { break; } prev = ++current; } if (!current) { /* check to see if it is the only or last item */ if (!strcmp(prev, name)) { ++id_list_item->priority; } else { id_list_item->priority = UINT_MAX; } } if (id_list_item->priority == UINT_MAX || AST_RWLIST_EMPTY(&endpoint_identifiers)) { /* if not in the endpoint_identifier_order list then consider it less in priority and add it to the end */ AST_RWLIST_INSERT_TAIL(&endpoint_identifiers, id_list_item, list); ast_free(identifier_order); return 0; } AST_RWLIST_TRAVERSE_SAFE_BEGIN(&endpoint_identifiers, iter, list) { if (id_list_item->priority < iter->priority) { AST_RWLIST_INSERT_BEFORE_CURRENT(id_list_item, list); break; } if (!AST_RWLIST_NEXT(iter, list)) { AST_RWLIST_INSERT_AFTER(&endpoint_identifiers, iter, id_list_item, list); break; } } AST_RWLIST_TRAVERSE_SAFE_END; ast_free(identifier_order); return 0; } int ast_sip_register_endpoint_identifier(struct ast_sip_endpoint_identifier *identifier) { return ast_sip_register_endpoint_identifier_with_name(identifier, NULL); } void ast_sip_unregister_endpoint_identifier(struct ast_sip_endpoint_identifier *identifier) { struct endpoint_identifier_list *iter; SCOPED_LOCK(lock, &endpoint_identifiers, AST_RWLIST_WRLOCK, AST_RWLIST_UNLOCK); AST_RWLIST_TRAVERSE_SAFE_BEGIN(&endpoint_identifiers, iter, list) { if (iter->identifier == identifier) { AST_RWLIST_REMOVE_CURRENT(list); ast_free(iter); ast_debug(1, "Unregistered endpoint identifier %p\n", identifier); break; } } AST_RWLIST_TRAVERSE_SAFE_END; } struct ast_sip_endpoint *ast_sip_identify_endpoint(pjsip_rx_data *rdata) { struct endpoint_identifier_list *iter; struct ast_sip_endpoint *endpoint = NULL; SCOPED_LOCK(lock, &endpoint_identifiers, AST_RWLIST_RDLOCK, AST_RWLIST_UNLOCK); AST_RWLIST_TRAVERSE(&endpoint_identifiers, iter, list) { ast_assert(iter->identifier->identify_endpoint != NULL); endpoint = iter->identifier->identify_endpoint(rdata); if (endpoint) { break; } } return endpoint; } char *ast_sip_rdata_get_header_value(pjsip_rx_data *rdata, const pj_str_t str) { pjsip_generic_string_hdr *hdr; pj_str_t hdr_val; hdr = pjsip_msg_find_hdr_by_name(rdata->msg_info.msg, &str, NULL); if (!hdr) { return NULL; } pj_strdup_with_null(rdata->tp_info.pool, &hdr_val, &hdr->hvalue); return hdr_val.ptr; } static int do_cli_dump_endpt(void *v_a) { struct ast_cli_args *a = v_a; ast_pjproject_log_intercept_begin(a->fd); pjsip_endpt_dump(ast_sip_get_pjsip_endpoint(), a->argc == 4 ? PJ_TRUE : PJ_FALSE); ast_pjproject_log_intercept_end(); return 0; } static char *cli_dump_endpt(struct ast_cli_entry *e, int cmd, struct ast_cli_args *a) { switch (cmd) { case CLI_INIT: #ifdef AST_DEVMODE e->command = "pjsip dump endpt [details]"; e->usage = "Usage: pjsip dump endpt [details]\n" " Dump the res_pjsip endpt internals.\n" "\n" "Warning: PJPROJECT documents that the function used by this\n" "CLI command may cause a crash when asking for details because\n" "it tries to access all active memory pools.\n"; #else /* * In non-developer mode we will not document or make easily accessible * the details option even though it is still available. The user has * to know it exists to use it. Presumably they would also be aware of * the potential crash warning. */ e->command = "pjsip dump endpt"; e->usage = "Usage: pjsip dump endpt\n" " Dump the res_pjsip endpt internals.\n"; #endif /* AST_DEVMODE */ return NULL; case CLI_GENERATE: return NULL; } if (4 < a->argc || (a->argc == 4 && strcasecmp(a->argv[3], "details"))) { return CLI_SHOWUSAGE; } ast_sip_push_task_wait_servant(NULL, do_cli_dump_endpt, a); return CLI_SUCCESS; } static char *cli_show_endpoint_identifiers(struct ast_cli_entry *e, int cmd, struct ast_cli_args *a) { #define ENDPOINT_IDENTIFIER_FORMAT "%-20.20s\n" struct endpoint_identifier_list *iter; switch (cmd) { case CLI_INIT: e->command = "pjsip show identifiers"; e->usage = "Usage: pjsip show identifiers\n" " List all registered endpoint identifiers\n"; return NULL; case CLI_GENERATE: return NULL; } if (a->argc != 3) { return CLI_SHOWUSAGE; } ast_cli(a->fd, ENDPOINT_IDENTIFIER_FORMAT, "Identifier Names:"); { SCOPED_LOCK(lock, &endpoint_identifiers, AST_RWLIST_RDLOCK, AST_RWLIST_UNLOCK); AST_RWLIST_TRAVERSE(&endpoint_identifiers, iter, list) { ast_cli(a->fd, ENDPOINT_IDENTIFIER_FORMAT, iter->name ? iter->name : "name not specified"); } } return CLI_SUCCESS; #undef ENDPOINT_IDENTIFIER_FORMAT } static char *cli_show_settings(struct ast_cli_entry *e, int cmd, struct ast_cli_args *a) { struct ast_sip_cli_context context; switch (cmd) { case CLI_INIT: e->command = "pjsip show settings"; e->usage = "Usage: pjsip show settings\n" " Show global and system configuration options\n"; return NULL; case CLI_GENERATE: return NULL; } context.output_buffer = ast_str_create(256); if (!context.output_buffer) { ast_cli(a->fd, "Could not allocate output buffer.\n"); return CLI_FAILURE; } if (sip_cli_print_global(&context) || sip_cli_print_system(&context)) { ast_free(context.output_buffer); ast_cli(a->fd, "Error retrieving settings.\n"); return CLI_FAILURE; } ast_cli(a->fd, "%s", ast_str_buffer(context.output_buffer)); ast_free(context.output_buffer); return CLI_SUCCESS; } static struct ast_cli_entry cli_commands[] = { AST_CLI_DEFINE(cli_dump_endpt, "Dump the res_pjsip endpt internals"), AST_CLI_DEFINE(cli_show_settings, "Show global and system configuration options"), AST_CLI_DEFINE(cli_show_endpoint_identifiers, "List registered endpoint identifiers") }; AST_RWLIST_HEAD_STATIC(endpoint_formatters, ast_sip_endpoint_formatter); void ast_sip_register_endpoint_formatter(struct ast_sip_endpoint_formatter *obj) { SCOPED_LOCK(lock, &endpoint_formatters, AST_RWLIST_WRLOCK, AST_RWLIST_UNLOCK); AST_RWLIST_INSERT_TAIL(&endpoint_formatters, obj, next); } void ast_sip_unregister_endpoint_formatter(struct ast_sip_endpoint_formatter *obj) { struct ast_sip_endpoint_formatter *i; SCOPED_LOCK(lock, &endpoint_formatters, AST_RWLIST_WRLOCK, AST_RWLIST_UNLOCK); AST_RWLIST_TRAVERSE_SAFE_BEGIN(&endpoint_formatters, i, next) { if (i == obj) { AST_RWLIST_REMOVE_CURRENT(next); break; } } AST_RWLIST_TRAVERSE_SAFE_END; } int ast_sip_format_endpoint_ami(struct ast_sip_endpoint *endpoint, struct ast_sip_ami *ami, int *count) { int res = 0; struct ast_sip_endpoint_formatter *i; SCOPED_LOCK(lock, &endpoint_formatters, AST_RWLIST_RDLOCK, AST_RWLIST_UNLOCK); *count = 0; AST_RWLIST_TRAVERSE(&endpoint_formatters, i, next) { if (i->format_ami && ((res = i->format_ami(endpoint, ami)) < 0)) { return res; } if (!res) { (*count)++; } } return 0; } pjsip_endpoint *ast_sip_get_pjsip_endpoint(void) { return ast_pjsip_endpoint; } int ast_sip_will_uri_survive_restart(pjsip_sip_uri *uri, struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata) { pj_str_t host_name; int result = 1; /* Determine if the contact cannot survive a restart/boot. */ if (uri->port == rdata->pkt_info.src_port && !pj_strcmp(&uri->host, pj_cstr(&host_name, rdata->pkt_info.src_name)) /* We have already checked if the URI scheme is sip: or sips: */ && PJSIP_TRANSPORT_IS_RELIABLE(rdata->tp_info.transport)) { pj_str_t type_name; /* Determine the transport parameter value */ if (!strcasecmp("WSS", rdata->tp_info.transport->type_name)) { /* WSS is special, as it needs to be ws. */ pj_cstr(&type_name, "ws"); } else { pj_cstr(&type_name, rdata->tp_info.transport->type_name); } if (!pj_stricmp(&uri->transport_param, &type_name) && (endpoint->nat.rewrite_contact /* Websockets are always rewritten */ || !pj_stricmp(&uri->transport_param, pj_cstr(&type_name, "ws")))) { /* * The contact was rewritten to the reliable transport's * source address. Disconnecting the transport for any * reason invalidates the contact. */ result = 0; } } return result; } pjsip_sip_uri *ast_sip_get_contact_sip_uri(pjsip_tx_data *tdata) { pjsip_contact_hdr *contact = pjsip_msg_find_hdr(tdata->msg, PJSIP_H_CONTACT, NULL); if (!contact || (!PJSIP_URI_SCHEME_IS_SIP(contact->uri) && !PJSIP_URI_SCHEME_IS_SIPS(contact->uri))) { return NULL; } return pjsip_uri_get_uri(contact->uri); } /*! \brief Callback function for finding the transport the request is going out on */ static int find_transport_state_in_use(void *obj, void *arg, int flags) { struct ast_sip_transport_state *transport_state = obj; struct ast_sip_request_transport_details *details = arg; /* If an explicit transport or factory matches then this is what is in use, if we are unavailable * to compare based on that we make sure that the type is the same and the source IP address/port are the same */ if (transport_state && ((details->transport && details->transport == transport_state->transport) || (details->factory && details->factory == transport_state->factory) || ((details->type == transport_state->type) && (transport_state->factory) && !pj_strcmp(&transport_state->factory->addr_name.host, &details->local_address) && transport_state->factory->addr_name.port == details->local_port))) { return CMP_MATCH | CMP_STOP; } return 0; } struct ast_sip_transport_state *ast_sip_find_transport_state_in_use(struct ast_sip_request_transport_details *details) { RAII_VAR(struct ao2_container *, transport_states, NULL, ao2_cleanup); if (!(transport_states = ast_sip_get_transport_states())) { return NULL; } return ao2_callback(transport_states, 0, find_transport_state_in_use, details); } int ast_sip_rewrite_uri_to_local(pjsip_sip_uri *uri, pjsip_tx_data *tdata) { RAII_VAR(struct ast_sip_transport *, transport, NULL, ao2_cleanup); RAII_VAR(struct ast_sip_transport_state *, transport_state, NULL, ao2_cleanup); struct ast_sip_request_transport_details details = { 0, }; pjsip_sip_uri *tmp_uri; pjsip_dialog *dlg; struct ast_sockaddr addr = { { 0, } }; if ((tmp_uri = ast_sip_get_contact_sip_uri(tdata))) { pj_strdup(tdata->pool, &uri->host, &tmp_uri->host); uri->port = tmp_uri->port; } else if ((dlg = pjsip_tdata_get_dlg(tdata)) && (tmp_uri = pjsip_uri_get_uri(dlg->local.info->uri)) && (PJSIP_URI_SCHEME_IS_SIP(tmp_uri) || PJSIP_URI_SCHEME_IS_SIPS(tmp_uri))) { pj_strdup(tdata->pool, &uri->host, &tmp_uri->host); uri->port = tmp_uri->port; } if (ast_sip_set_request_transport_details(&details, tdata, 1) || !(transport_state = ast_sip_find_transport_state_in_use(&details)) || !(transport = ast_sorcery_retrieve_by_id(ast_sip_get_sorcery(), "transport", transport_state->id))) { return 0; } if (transport_state->localnet) { ast_sockaddr_parse(&addr, tdata->tp_info.dst_name, PARSE_PORT_FORBID); ast_sockaddr_set_port(&addr, tdata->tp_info.dst_port); if (ast_sip_transport_is_local(transport_state, &addr)) { return 0; } } if (!ast_sockaddr_isnull(&transport_state->external_signaling_address)) { pj_strdup2(tdata->pool, &uri->host, ast_sockaddr_stringify_host(&transport_state->external_signaling_address)); } if (transport->external_signaling_port) { uri->port = transport->external_signaling_port; } return 0; } int ast_sip_set_request_transport_details(struct ast_sip_request_transport_details *details, pjsip_tx_data *tdata, int use_ipv6) { pjsip_sip_uri *uri; pjsip_via_hdr *via; long transport_type; if (!details || !tdata) { return -1; } /* If IPv6 should be considered, un-set Bit 7 to make TCP6 equal to TCP and TLS6 equal to TLS */ transport_type = use_ipv6 ? tdata->tp_info.transport->key.type & ~(PJSIP_TRANSPORT_IPV6) : tdata->tp_info.transport->key.type; if (tdata->tp_sel.type == PJSIP_TPSELECTOR_TRANSPORT) { details->transport = tdata->tp_sel.u.transport; } else if (tdata->tp_sel.type == PJSIP_TPSELECTOR_LISTENER) { details->factory = tdata->tp_sel.u.listener; } else if (transport_type == PJSIP_TRANSPORT_UDP || transport_type == PJSIP_TRANSPORT_UDP6) { /* Connectionless uses the same transport for all requests */ details->type = AST_TRANSPORT_UDP; details->transport = tdata->tp_info.transport; } else { if (transport_type == PJSIP_TRANSPORT_TCP) { details->type = AST_TRANSPORT_TCP; } else if (transport_type == PJSIP_TRANSPORT_TLS) { details->type = AST_TRANSPORT_TLS; } else { /* Unknown transport type, we can't map. */ return -1; } if ((uri = ast_sip_get_contact_sip_uri(tdata))) { details->local_address = uri->host; details->local_port = uri->port; } else if ((tdata->msg->type == PJSIP_REQUEST_MSG) && (via = pjsip_msg_find_hdr(tdata->msg, PJSIP_H_VIA, NULL))) { details->local_address = via->sent_by.host; details->local_port = via->sent_by.port; } else { return -1; } if (!details->local_port) { details->local_port = (details->type == AST_TRANSPORT_TLS) ? 5061 : 5060; } } return 0; } int ast_sip_get_transport_name(const struct ast_sip_endpoint *endpoint, pjsip_sip_uri *sip_uri, char *buf, size_t buf_len) { char *host = NULL; static const pj_str_t x_name = { AST_SIP_X_AST_TXP, AST_SIP_X_AST_TXP_LEN }; pjsip_param *x_transport; if (!ast_strlen_zero(endpoint->transport)) { ast_copy_string(buf, endpoint->transport, buf_len); return 0; } x_transport = pjsip_param_find(&sip_uri->other_param, &x_name); if (!x_transport) { return -1; } /* Only use x_transport if the uri host is an ip (4 or 6) address */ host = ast_alloca(sip_uri->host.slen + 1); ast_copy_pj_str(host, &sip_uri->host, sip_uri->host.slen + 1); if (!ast_sockaddr_parse(NULL, host, PARSE_PORT_FORBID)) { return -1; } ast_copy_pj_str(buf, &x_transport->value, buf_len); return 0; } int ast_sip_dlg_set_transport(const struct ast_sip_endpoint *endpoint, pjsip_dialog *dlg, pjsip_tpselector *selector) { pjsip_sip_uri *uri; pjsip_tpselector sel = { .type = PJSIP_TPSELECTOR_NONE, }; uri = pjsip_uri_get_uri(dlg->target); if (!selector) { selector = &sel; } ast_sip_set_tpselector_from_ep_or_uri(endpoint, uri, selector); pjsip_dlg_set_transport(dlg, selector); if (selector == &sel) { ast_sip_tpselector_unref(&sel); } return 0; } static int sip_dialog_create_from(pj_pool_t *pool, pj_str_t *from, const char *user, const char *domain, const pj_str_t *target, pjsip_tpselector *selector) { pj_str_t tmp, local_addr; pjsip_uri *uri; pjsip_sip_uri *sip_uri; pjsip_transport_type_e type; int local_port; char default_user[PJSIP_MAX_URL_SIZE]; if (ast_strlen_zero(user)) { ast_sip_get_default_from_user(default_user, sizeof(default_user)); user = default_user; } /* Parse the provided target URI so we can determine what transport it will end up using */ pj_strdup_with_null(pool, &tmp, target); if (!(uri = pjsip_parse_uri(pool, tmp.ptr, tmp.slen, 0)) || (!PJSIP_URI_SCHEME_IS_SIP(uri) && !PJSIP_URI_SCHEME_IS_SIPS(uri))) { return -1; } sip_uri = pjsip_uri_get_uri(uri); /* Determine the transport type to use */ type = pjsip_transport_get_type_from_name(&sip_uri->transport_param); if (PJSIP_URI_SCHEME_IS_SIPS(sip_uri)) { if (type == PJSIP_TRANSPORT_UNSPECIFIED || !(pjsip_transport_get_flag_from_type(type) & PJSIP_TRANSPORT_SECURE)) { type = PJSIP_TRANSPORT_TLS; } } else if (!sip_uri->transport_param.slen) { type = PJSIP_TRANSPORT_UDP; } else if (type == PJSIP_TRANSPORT_UNSPECIFIED) { return -1; } /* If the host is IPv6 turn the transport into an IPv6 version */ if (pj_strchr(&sip_uri->host, ':')) { type |= PJSIP_TRANSPORT_IPV6; } /* In multidomain scenario, username may contain @ with domain info */ if (!ast_sip_get_disable_multi_domain() && strchr(user, '@')) { from->ptr = pj_pool_alloc(pool, PJSIP_MAX_URL_SIZE); from->slen = pj_ansi_snprintf(from->ptr, PJSIP_MAX_URL_SIZE, "", user, (type != PJSIP_TRANSPORT_UDP && type != PJSIP_TRANSPORT_UDP6) ? ";transport=" : "", (type != PJSIP_TRANSPORT_UDP && type != PJSIP_TRANSPORT_UDP6) ? pjsip_transport_get_type_name(type) : ""); return 0; } if (!ast_strlen_zero(domain)) { from->ptr = pj_pool_alloc(pool, PJSIP_MAX_URL_SIZE); from->slen = pj_ansi_snprintf(from->ptr, PJSIP_MAX_URL_SIZE, "", user, domain, (type != PJSIP_TRANSPORT_UDP && type != PJSIP_TRANSPORT_UDP6) ? ";transport=" : "", (type != PJSIP_TRANSPORT_UDP && type != PJSIP_TRANSPORT_UDP6) ? pjsip_transport_get_type_name(type) : ""); return 0; } /* Get the local bound address for the transport that will be used when communicating with the provided URI */ if (pjsip_tpmgr_find_local_addr(pjsip_endpt_get_tpmgr(ast_sip_get_pjsip_endpoint()), pool, type, selector, &local_addr, &local_port) != PJ_SUCCESS) { /* If no local address can be retrieved using the transport manager use the host one */ pj_strdup(pool, &local_addr, pj_gethostname()); local_port = pjsip_transport_get_default_port_for_type(PJSIP_TRANSPORT_UDP); } /* If IPv6 was specified in the transport, set the proper type */ if (pj_strchr(&local_addr, ':')) { type |= PJSIP_TRANSPORT_IPV6; } from->ptr = pj_pool_alloc(pool, PJSIP_MAX_URL_SIZE); from->slen = pj_ansi_snprintf(from->ptr, PJSIP_MAX_URL_SIZE, "", user, (type & PJSIP_TRANSPORT_IPV6) ? "[" : "", (int)local_addr.slen, local_addr.ptr, (type & PJSIP_TRANSPORT_IPV6) ? "]" : "", local_port, (type != PJSIP_TRANSPORT_UDP && type != PJSIP_TRANSPORT_UDP6) ? ";transport=" : "", (type != PJSIP_TRANSPORT_UDP && type != PJSIP_TRANSPORT_UDP6) ? pjsip_transport_get_type_name(type) : ""); return 0; } int ast_sip_set_tpselector_from_transport(const struct ast_sip_transport *transport, pjsip_tpselector *selector) { int res = 0; struct ast_sip_transport_state *transport_state; transport_state = ast_sip_get_transport_state(ast_sorcery_object_get_id(transport)); if (!transport_state) { ast_log(LOG_ERROR, "Unable to retrieve PJSIP transport state for '%s'\n", ast_sorcery_object_get_id(transport)); return -1; } /* Only flows maintain dynamic state which needs protection */ if (transport_state->flow) { ao2_lock(transport_state); } if (transport_state->transport) { selector->type = PJSIP_TPSELECTOR_TRANSPORT; selector->u.transport = transport_state->transport; pjsip_transport_add_ref(selector->u.transport); } else if (transport_state->factory) { selector->type = PJSIP_TPSELECTOR_LISTENER; selector->u.listener = transport_state->factory; } else if (transport->type == AST_TRANSPORT_WS || transport->type == AST_TRANSPORT_WSS) { /* The WebSocket transport has no factory as it can not create outgoing connections, so * even if an endpoint is locked to a WebSocket transport we let the PJSIP logic * find the existing connection if available and use it. */ } else if (transport->flow) { /* This is a child of another transport, so we need to establish a new connection */ #ifdef HAVE_PJSIP_TRANSPORT_DISABLE_CONNECTION_REUSE selector->disable_connection_reuse = PJ_TRUE; #else ast_log(LOG_WARNING, "Connection reuse could not be disabled on transport '%s' as support is not available\n", ast_sorcery_object_get_id(transport)); #endif } else { res = -1; } if (transport_state->flow) { ao2_unlock(transport_state); } ao2_ref(transport_state, -1); return res; } int ast_sip_set_tpselector_from_transport_name(const char *transport_name, pjsip_tpselector *selector) { RAII_VAR(struct ast_sip_transport *, transport, NULL, ao2_cleanup); if (ast_strlen_zero(transport_name)) { return 0; } transport = ast_sorcery_retrieve_by_id(ast_sip_get_sorcery(), "transport", transport_name); if (!transport) { ast_log(LOG_ERROR, "Unable to retrieve PJSIP transport '%s'\n", transport_name); return -1; } return ast_sip_set_tpselector_from_transport(transport, selector); } int ast_sip_set_tpselector_from_ep_or_uri(const struct ast_sip_endpoint *endpoint, pjsip_sip_uri *sip_uri, pjsip_tpselector *selector) { char transport_name[128]; if (ast_sip_get_transport_name(endpoint, sip_uri, transport_name, sizeof(transport_name))) { return 0; } return ast_sip_set_tpselector_from_transport_name(transport_name, selector); } void ast_sip_tpselector_unref(pjsip_tpselector *selector) { if (selector->type == PJSIP_TPSELECTOR_TRANSPORT && selector->u.transport) { pjsip_transport_dec_ref(selector->u.transport); } } void ast_sip_add_usereqphone(const struct ast_sip_endpoint *endpoint, pj_pool_t *pool, pjsip_uri *uri) { pjsip_sip_uri *sip_uri; int i = 0; static const pj_str_t STR_PHONE = { "phone", 5 }; if (!endpoint || !endpoint->usereqphone || (!PJSIP_URI_SCHEME_IS_SIP(uri) && !PJSIP_URI_SCHEME_IS_SIPS(uri))) { return; } sip_uri = pjsip_uri_get_uri(uri); if (!pj_strlen(&sip_uri->user)) { return; } if (pj_strbuf(&sip_uri->user)[0] == '+') { i = 1; } /* Test URI user against allowed characters in AST_DIGIT_ANY */ for (; i < pj_strlen(&sip_uri->user); i++) { if (!strchr(AST_DIGIT_ANY, pj_strbuf(&sip_uri->user)[i])) { break; } } if (i < pj_strlen(&sip_uri->user)) { return; } sip_uri->user_param = STR_PHONE; } pjsip_dialog *ast_sip_create_dialog_uac(const struct ast_sip_endpoint *endpoint, const char *uri, const char *request_user) { char enclosed_uri[PJSIP_MAX_URL_SIZE]; pj_str_t local_uri = { "sip:temp@temp", 13 }, remote_uri, target_uri; pj_status_t res; pjsip_dialog *dlg = NULL; const char *outbound_proxy = endpoint->outbound_proxy; pjsip_tpselector selector = { .type = PJSIP_TPSELECTOR_NONE, }; static const pj_str_t HCONTACT = { "Contact", 7 }; if (!ast_begins_with(uri, "<")) { snprintf(enclosed_uri, sizeof(enclosed_uri), "<%s>", uri); } else { snprintf(enclosed_uri, sizeof(enclosed_uri), "%s", uri); } pj_cstr(&remote_uri, enclosed_uri); pj_cstr(&target_uri, uri); res = pjsip_dlg_create_uac(pjsip_ua_instance(), &local_uri, NULL, &remote_uri, &target_uri, &dlg); if (res == PJ_SUCCESS && !(PJSIP_URI_SCHEME_IS_SIP(dlg->target) || PJSIP_URI_SCHEME_IS_SIPS(dlg->target))) { /* dlg->target is a pjsip_other_uri, but it's assumed to be a * pjsip_sip_uri below. Fail fast. */ res = PJSIP_EINVALIDURI; pjsip_dlg_terminate(dlg); } if (res != PJ_SUCCESS) { if (res == PJSIP_EINVALIDURI) { ast_log(LOG_ERROR, "Endpoint '%s': Could not create dialog to invalid URI '%s'. Is endpoint registered and reachable?\n", ast_sorcery_object_get_id(endpoint), uri); } return NULL; } /* We have to temporarily bump up the sess_count here so the dialog is not prematurely destroyed */ dlg->sess_count++; ast_sip_dlg_set_transport(endpoint, dlg, &selector); if (sip_dialog_create_from(dlg->pool, &local_uri, endpoint->fromuser, endpoint->fromdomain, &remote_uri, &selector)) { dlg->sess_count--; pjsip_dlg_terminate(dlg); ast_sip_tpselector_unref(&selector); return NULL; } ast_sip_tpselector_unref(&selector); /* Update the dialog with the new local URI, we do it afterwards so we can use the dialog pool for construction */ pj_strdup_with_null(dlg->pool, &dlg->local.info_str, &local_uri); dlg->local.info->uri = pjsip_parse_uri(dlg->pool, dlg->local.info_str.ptr, dlg->local.info_str.slen, 0); if (!dlg->local.info->uri) { ast_log(LOG_ERROR, "Could not parse URI '%s' for endpoint '%s'\n", dlg->local.info_str.ptr, ast_sorcery_object_get_id(endpoint)); dlg->sess_count--; pjsip_dlg_terminate(dlg); return NULL; } dlg->local.contact = pjsip_parse_hdr(dlg->pool, &HCONTACT, local_uri.ptr, local_uri.slen, NULL); if (!ast_strlen_zero(endpoint->contact_user)) { pjsip_sip_uri *sip_uri; sip_uri = pjsip_uri_get_uri(dlg->local.contact->uri); pj_strdup2(dlg->pool, &sip_uri->user, endpoint->contact_user); } /* If a request user has been specified and we are permitted to change it, do so */ if (!ast_strlen_zero(request_user)) { pjsip_sip_uri *sip_uri; if (PJSIP_URI_SCHEME_IS_SIP(dlg->target) || PJSIP_URI_SCHEME_IS_SIPS(dlg->target)) { sip_uri = pjsip_uri_get_uri(dlg->target); pj_strdup2(dlg->pool, &sip_uri->user, request_user); } if (PJSIP_URI_SCHEME_IS_SIP(dlg->remote.info->uri) || PJSIP_URI_SCHEME_IS_SIPS(dlg->remote.info->uri)) { sip_uri = pjsip_uri_get_uri(dlg->remote.info->uri); pj_strdup2(dlg->pool, &sip_uri->user, request_user); } } /* Add the user=phone parameter if applicable */ ast_sip_add_usereqphone(endpoint, dlg->pool, dlg->target); ast_sip_add_usereqphone(endpoint, dlg->pool, dlg->remote.info->uri); ast_sip_add_usereqphone(endpoint, dlg->pool, dlg->local.info->uri); if (!ast_strlen_zero(outbound_proxy)) { pjsip_route_hdr route_set, *route; static const pj_str_t ROUTE_HNAME = { "Route", 5 }; pj_str_t tmp; pj_list_init(&route_set); pj_strdup2_with_null(dlg->pool, &tmp, outbound_proxy); if (!(route = pjsip_parse_hdr(dlg->pool, &ROUTE_HNAME, tmp.ptr, tmp.slen, NULL))) { ast_log(LOG_ERROR, "Could not create dialog to endpoint '%s' as outbound proxy URI '%s' is not valid\n", ast_sorcery_object_get_id(endpoint), outbound_proxy); dlg->sess_count--; pjsip_dlg_terminate(dlg); return NULL; } pj_list_insert_nodes_before(&route_set, route); pjsip_dlg_set_route_set(dlg, &route_set); } dlg->sess_count--; return dlg; } /*! * \brief Determine if a SIPS Contact header is required. * * This uses the guideline provided in RFC 3261 Section 12.1.1 to * determine if the Contact header must be a sips: URI. * * \param rdata The incoming dialog-starting request * \retval 0 SIPS not required * \retval 1 SIPS required */ static int uas_use_sips_contact(pjsip_rx_data *rdata) { pjsip_rr_hdr *record_route; if (PJSIP_URI_SCHEME_IS_SIPS(rdata->msg_info.msg->line.req.uri)) { return 1; } record_route = pjsip_msg_find_hdr(rdata->msg_info.msg, PJSIP_H_RECORD_ROUTE, NULL); if (record_route) { if (PJSIP_URI_SCHEME_IS_SIPS(&record_route->name_addr)) { return 1; } } else { pjsip_contact_hdr *contact; contact = pjsip_msg_find_hdr(rdata->msg_info.msg, PJSIP_H_CONTACT, NULL); ast_assert(contact != NULL); if (PJSIP_URI_SCHEME_IS_SIPS(contact->uri)) { return 1; } } return 0; } typedef pj_status_t (*create_dlg_uac)(pjsip_user_agent *ua, pjsip_rx_data *rdata, const pj_str_t *contact, pjsip_dialog **p_dlg); static pjsip_dialog *create_dialog_uas(const struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata, pj_status_t *status, create_dlg_uac create_fun) { pjsip_dialog *dlg; pj_str_t contact; pjsip_transport_type_e type = rdata->tp_info.transport->key.type; pjsip_tpselector selector = { .type = PJSIP_TPSELECTOR_NONE, }; pjsip_transport *transport; pjsip_contact_hdr *contact_hdr; ast_assert(status != NULL); contact_hdr = pjsip_msg_find_hdr(rdata->msg_info.msg, PJSIP_H_CONTACT, NULL); if (!contact_hdr || ast_sip_set_tpselector_from_ep_or_uri(endpoint, pjsip_uri_get_uri(contact_hdr->uri), &selector)) { return NULL; } transport = rdata->tp_info.transport; if (selector.type == PJSIP_TPSELECTOR_TRANSPORT) { transport = selector.u.transport; } type = transport->key.type; contact.ptr = pj_pool_alloc(rdata->tp_info.pool, PJSIP_MAX_URL_SIZE); contact.slen = pj_ansi_snprintf(contact.ptr, PJSIP_MAX_URL_SIZE, "<%s:%s%s%s%.*s%s:%d%s%s>", uas_use_sips_contact(rdata) ? "sips" : "sip", (type & PJSIP_TRANSPORT_IPV6) ? "[" : "", S_OR(endpoint->contact_user, ""), (!ast_strlen_zero(endpoint->contact_user)) ? "@" : "", (int)transport->local_name.host.slen, transport->local_name.host.ptr, (type & PJSIP_TRANSPORT_IPV6) ? "]" : "", transport->local_name.port, (type != PJSIP_TRANSPORT_UDP && type != PJSIP_TRANSPORT_UDP6) ? ";transport=" : "", (type != PJSIP_TRANSPORT_UDP && type != PJSIP_TRANSPORT_UDP6) ? pjsip_transport_get_type_name(type) : ""); *status = create_fun(pjsip_ua_instance(), rdata, &contact, &dlg); if (*status != PJ_SUCCESS) { char err[PJ_ERR_MSG_SIZE]; pj_strerror(*status, err, sizeof(err)); ast_log(LOG_ERROR, "Could not create dialog with endpoint %s. %s\n", ast_sorcery_object_get_id(endpoint), err); ast_sip_tpselector_unref(&selector); return NULL; } dlg->sess_count++; pjsip_dlg_set_transport(dlg, &selector); dlg->sess_count--; ast_sip_tpselector_unref(&selector); return dlg; } pjsip_dialog *ast_sip_create_dialog_uas(const struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata, pj_status_t *status) { #ifdef HAVE_PJSIP_DLG_CREATE_UAS_AND_INC_LOCK pjsip_dialog *dlg; dlg = create_dialog_uas(endpoint, rdata, status, pjsip_dlg_create_uas_and_inc_lock); if (dlg) { pjsip_dlg_dec_lock(dlg); } return dlg; #else return create_dialog_uas(endpoint, rdata, status, pjsip_dlg_create_uas); #endif } pjsip_dialog *ast_sip_create_dialog_uas_locked(const struct ast_sip_endpoint *endpoint, pjsip_rx_data *rdata, pj_status_t *status) { #ifdef HAVE_PJSIP_DLG_CREATE_UAS_AND_INC_LOCK return create_dialog_uas(endpoint, rdata, status, pjsip_dlg_create_uas_and_inc_lock); #else /* * This is put here in order to be compatible with older versions of pjproject. * Best we can do in this case is immediately lock after getting the dialog. * However, that does leave a "gap" between creating and locking. */ pjsip_dialog *dlg; dlg = create_dialog_uas(endpoint, rdata, status, pjsip_dlg_create_uas); if (dlg) { pjsip_dlg_inc_lock(dlg); } return dlg; #endif } int ast_sip_create_rdata_with_contact(pjsip_rx_data *rdata, char *packet, const char *src_name, int src_port, char *transport_type, const char *local_name, int local_port, const char *contact) { pj_str_t tmp; /* * Initialize the error list in case there is a parse error * in the given packet. */ pj_list_init(&rdata->msg_info.parse_err); rdata->tp_info.transport = PJ_POOL_ZALLOC_T(rdata->tp_info.pool, pjsip_transport); if (!rdata->tp_info.transport) { return -1; } ast_copy_string(rdata->pkt_info.packet, packet, sizeof(rdata->pkt_info.packet)); ast_copy_string(rdata->pkt_info.src_name, src_name, sizeof(rdata->pkt_info.src_name)); rdata->pkt_info.src_port = src_port; pj_sockaddr_parse(pj_AF_UNSPEC(), 0, pj_cstr(&tmp, src_name), &rdata->pkt_info.src_addr); pj_sockaddr_set_port(&rdata->pkt_info.src_addr, src_port); pjsip_parse_rdata(packet, strlen(packet), rdata); if (!rdata->msg_info.msg || !pj_list_empty(&rdata->msg_info.parse_err)) { return -1; } if (!ast_strlen_zero(contact)) { pjsip_contact_hdr *contact_hdr; contact_hdr = pjsip_msg_find_hdr(rdata->msg_info.msg, PJSIP_H_CONTACT, NULL); if (contact_hdr) { contact_hdr->uri = pjsip_parse_uri(rdata->tp_info.pool, (char *)contact, strlen(contact), PJSIP_PARSE_URI_AS_NAMEADDR); if (!contact_hdr->uri) { ast_log(LOG_WARNING, "Unable to parse contact URI from '%s'.\n", contact); return -1; } } } pj_strdup2(rdata->tp_info.pool, &rdata->msg_info.via->recvd_param, rdata->pkt_info.src_name); rdata->msg_info.via->rport_param = -1; rdata->tp_info.transport->key.type = pjsip_transport_get_type_from_name(pj_cstr(&tmp, transport_type)); rdata->tp_info.transport->type_name = transport_type; pj_strdup2(rdata->tp_info.pool, &rdata->tp_info.transport->local_name.host, local_name); rdata->tp_info.transport->local_name.port = local_port; return 0; } int ast_sip_create_rdata(pjsip_rx_data *rdata, char *packet, const char *src_name, int src_port, char *transport_type, const char *local_name, int local_port) { return ast_sip_create_rdata_with_contact(rdata, packet, src_name, src_port, transport_type, local_name, local_port, NULL); } /* PJSIP doesn't know about the INFO method, so we have to define it ourselves */ static const pjsip_method info_method = {PJSIP_OTHER_METHOD, {"INFO", 4} }; static const pjsip_method message_method = {PJSIP_OTHER_METHOD, {"MESSAGE", 7} }; static const pjsip_method refer_method = {PJSIP_OTHER_METHOD, {"REFER", 5} }; static struct { const char *method; const pjsip_method *pmethod; } methods [] = { { "INVITE", &pjsip_invite_method }, { "CANCEL", &pjsip_cancel_method }, { "ACK", &pjsip_ack_method }, { "BYE", &pjsip_bye_method }, { "REGISTER", &pjsip_register_method }, { "OPTIONS", &pjsip_options_method }, { "SUBSCRIBE", &pjsip_subscribe_method }, { "NOTIFY", &pjsip_notify_method }, { "PUBLISH", &pjsip_publish_method }, { "INFO", &info_method }, { "MESSAGE", &message_method }, { "REFER", &refer_method }, }; static const pjsip_method *get_pjsip_method(const char *method) { int i; for (i = 0; i < ARRAY_LEN(methods); ++i) { if (!strcmp(method, methods[i].method)) { return methods[i].pmethod; } } return NULL; } static int create_in_dialog_request(const pjsip_method *method, struct pjsip_dialog *dlg, pjsip_tx_data **tdata) { if (pjsip_dlg_create_request(dlg, method, -1, tdata) != PJ_SUCCESS) { ast_log(LOG_WARNING, "Unable to create in-dialog request.\n"); return -1; } return 0; } static pj_bool_t supplement_on_rx_request(pjsip_rx_data *rdata); static pjsip_module supplement_module = { .name = { "Out of dialog supplement hook", 29 }, .id = -1, .priority = PJSIP_MOD_PRIORITY_APPLICATION - 1, .on_rx_request = supplement_on_rx_request, }; static int create_out_of_dialog_request(const pjsip_method *method, struct ast_sip_endpoint *endpoint, const char *uri, struct ast_sip_contact *provided_contact, pjsip_tx_data **tdata) { RAII_VAR(struct ast_sip_contact *, contact, ao2_bump(provided_contact), ao2_cleanup); pj_str_t remote_uri; pj_str_t from; pj_pool_t *pool; pjsip_tpselector selector = { .type = PJSIP_TPSELECTOR_NONE, }; pjsip_uri *sip_uri; const char *fromuser; if (ast_strlen_zero(uri)) { if (!endpoint && (!contact || ast_strlen_zero(contact->uri))) { ast_log(LOG_ERROR, "An endpoint and/or uri must be specified\n"); return -1; } if (!contact) { contact = ast_sip_location_retrieve_contact_from_aor_list(endpoint->aors); } if (!contact || ast_strlen_zero(contact->uri)) { ast_log(LOG_WARNING, "Unable to retrieve contact for endpoint %s\n", ast_sorcery_object_get_id(endpoint)); return -1; } pj_cstr(&remote_uri, contact->uri); } else { pj_cstr(&remote_uri, uri); } pool = pjsip_endpt_create_pool(ast_sip_get_pjsip_endpoint(), "Outbound request", 256, 256); if (!pool) { ast_log(LOG_ERROR, "Unable to create PJLIB memory pool\n"); return -1; } sip_uri = pjsip_parse_uri(pool, remote_uri.ptr, remote_uri.slen, 0); if (!sip_uri || (!PJSIP_URI_SCHEME_IS_SIP(sip_uri) && !PJSIP_URI_SCHEME_IS_SIPS(sip_uri))) { ast_log(LOG_ERROR, "Unable to create outbound %.*s request to endpoint %s as URI '%s' is not valid\n", (int) pj_strlen(&method->name), pj_strbuf(&method->name), endpoint ? ast_sorcery_object_get_id(endpoint) : "", pj_strbuf(&remote_uri)); pjsip_endpt_release_pool(ast_sip_get_pjsip_endpoint(), pool); return -1; } ast_sip_set_tpselector_from_ep_or_uri(endpoint, pjsip_uri_get_uri(sip_uri), &selector); fromuser = endpoint ? (!ast_strlen_zero(endpoint->fromuser) ? endpoint->fromuser : ast_sorcery_object_get_id(endpoint)) : NULL; if (sip_dialog_create_from(pool, &from, fromuser, endpoint ? endpoint->fromdomain : NULL, &remote_uri, &selector)) { ast_log(LOG_ERROR, "Unable to create From header for %.*s request to endpoint %s\n", (int) pj_strlen(&method->name), pj_strbuf(&method->name), endpoint ? ast_sorcery_object_get_id(endpoint) : ""); pjsip_endpt_release_pool(ast_sip_get_pjsip_endpoint(), pool); ast_sip_tpselector_unref(&selector); return -1; } if (pjsip_endpt_create_request(ast_sip_get_pjsip_endpoint(), method, &remote_uri, &from, &remote_uri, &from, NULL, -1, NULL, tdata) != PJ_SUCCESS) { ast_log(LOG_ERROR, "Unable to create outbound %.*s request to endpoint %s\n", (int) pj_strlen(&method->name), pj_strbuf(&method->name), endpoint ? ast_sorcery_object_get_id(endpoint) : ""); pjsip_endpt_release_pool(ast_sip_get_pjsip_endpoint(), pool); ast_sip_tpselector_unref(&selector); return -1; } pjsip_tx_data_set_transport(*tdata, &selector); ast_sip_tpselector_unref(&selector); if (endpoint && !ast_strlen_zero(endpoint->contact_user)){ pjsip_contact_hdr *contact_hdr; pjsip_sip_uri *contact_uri; static const pj_str_t HCONTACT = { "Contact", 7 }; static const pj_str_t HCONTACTSHORT = { "m", 1 }; contact_hdr = pjsip_msg_find_hdr_by_names((*tdata)->msg, &HCONTACT, &HCONTACTSHORT, NULL); if (contact_hdr) { contact_uri = pjsip_uri_get_uri(contact_hdr->uri); pj_strdup2((*tdata)->pool, &contact_uri->user, endpoint->contact_user); } } /* Add the user=phone parameter if applicable */ ast_sip_add_usereqphone(endpoint, (*tdata)->pool, (*tdata)->msg->line.req.uri); /* If an outbound proxy is specified on the endpoint apply it to this request */ if (endpoint && !ast_strlen_zero(endpoint->outbound_proxy) && ast_sip_set_outbound_proxy((*tdata), endpoint->outbound_proxy)) { ast_log(LOG_ERROR, "Unable to apply outbound proxy on request %.*s to endpoint %s as outbound proxy URI '%s' is not valid\n", (int) pj_strlen(&method->name), pj_strbuf(&method->name), ast_sorcery_object_get_id(endpoint), endpoint->outbound_proxy); pjsip_endpt_release_pool(ast_sip_get_pjsip_endpoint(), pool); return -1; } ast_sip_mod_data_set((*tdata)->pool, (*tdata)->mod_data, supplement_module.id, MOD_DATA_CONTACT, ao2_bump(contact)); /* We can release this pool since request creation copied all the necessary * data into the outbound request's pool */ pjsip_endpt_release_pool(ast_sip_get_pjsip_endpoint(), pool); return 0; } int ast_sip_create_request(const char *method, struct pjsip_dialog *dlg, struct ast_sip_endpoint *endpoint, const char *uri, struct ast_sip_contact *contact, pjsip_tx_data **tdata) { const pjsip_method *pmethod = get_pjsip_method(method); if (!pmethod) { ast_log(LOG_WARNING, "Unknown method '%s'. Cannot send request\n", method); return -1; } if (dlg) { return create_in_dialog_request(pmethod, dlg, tdata); } else { ast_assert(endpoint != NULL); return create_out_of_dialog_request(pmethod, endpoint, uri, contact, tdata); } } AST_RWLIST_HEAD_STATIC(supplements, ast_sip_supplement); void ast_sip_register_supplement(struct ast_sip_supplement *supplement) { struct ast_sip_supplement *iter; int inserted = 0; SCOPED_LOCK(lock, &supplements, AST_RWLIST_WRLOCK, AST_RWLIST_UNLOCK); AST_RWLIST_TRAVERSE_SAFE_BEGIN(&supplements, iter, next) { if (iter->priority > supplement->priority) { AST_RWLIST_INSERT_BEFORE_CURRENT(supplement, next); inserted = 1; break; } } AST_RWLIST_TRAVERSE_SAFE_END; if (!inserted) { AST_RWLIST_INSERT_TAIL(&supplements, supplement, next); } } void ast_sip_unregister_supplement(struct ast_sip_supplement *supplement) { struct ast_sip_supplement *iter; SCOPED_LOCK(lock, &supplements, AST_RWLIST_WRLOCK, AST_RWLIST_UNLOCK); AST_RWLIST_TRAVERSE_SAFE_BEGIN(&supplements, iter, next) { if (supplement == iter) { AST_RWLIST_REMOVE_CURRENT(next); break; } } AST_RWLIST_TRAVERSE_SAFE_END; } static int send_in_dialog_request(pjsip_tx_data *tdata, struct pjsip_dialog *dlg) { if (pjsip_dlg_send_request(dlg, tdata, -1, NULL) != PJ_SUCCESS) { ast_log(LOG_WARNING, "Unable to send in-dialog request.\n"); return -1; } return 0; } static pj_bool_t does_method_match(const pj_str_t *message_method, const char *supplement_method) { pj_str_t method; if (ast_strlen_zero(supplement_method)) { return PJ_TRUE; } pj_cstr(&method, supplement_method); return pj_stristr(&method, message_method) ? PJ_TRUE : PJ_FALSE; } #define TIMER_INACTIVE 0 #define TIMEOUT_TIMER2 5 /*! \brief Structure to hold information about an outbound request */ struct send_request_data { /*! The endpoint associated with this request */ struct ast_sip_endpoint *endpoint; /*! Information to be provided to the callback upon receipt of a response */ void *token; /*! The callback to be called upon receipt of a response */ void (*callback)(void *token, pjsip_event *e); /*! Number of challenges received. */ unsigned int challenge_count; }; static void send_request_data_destroy(void *obj) { struct send_request_data *req_data = obj; ao2_cleanup(req_data->endpoint); } static struct send_request_data *send_request_data_alloc(struct ast_sip_endpoint *endpoint, void *token, void (*callback)(void *token, pjsip_event *e)) { struct send_request_data *req_data; req_data = ao2_alloc_options(sizeof(*req_data), send_request_data_destroy, AO2_ALLOC_OPT_LOCK_NOLOCK); if (!req_data) { return NULL; } req_data->endpoint = ao2_bump(endpoint); req_data->token = token; req_data->callback = callback; return req_data; } struct send_request_wrapper { /*! Information to be provided to the callback upon receipt of a response */ void *token; /*! The callback to be called upon receipt of a response */ void (*callback)(void *token, pjsip_event *e); /*! Non-zero when the callback is called. */ unsigned int cb_called; /*! Non-zero if endpt_send_request_cb() was called. */ unsigned int send_cb_called; /*! Timeout timer. */ pj_timer_entry *timeout_timer; /*! Original timeout. */ pj_int32_t timeout; /*! The transmit data. */ pjsip_tx_data *tdata; }; /*! \internal This function gets called by pjsip when the transaction ends, * even if it timed out. The lock prevents a race condition if both the pjsip * transaction timer and our own timer expire simultaneously. */ static void endpt_send_request_cb(void *token, pjsip_event *e) { struct send_request_wrapper *req_wrapper = token; unsigned int cb_called; /* * Needed because we cannot otherwise tell if this callback was * called when pjsip_endpt_send_request() returns error. */ req_wrapper->send_cb_called = 1; if (e->body.tsx_state.type == PJSIP_EVENT_TIMER) { ast_debug(2, "%p: PJSIP tsx timer expired\n", req_wrapper); if (req_wrapper->timeout_timer && req_wrapper->timeout_timer->id != TIMEOUT_TIMER2) { ast_debug(3, "%p: Timeout already handled\n", req_wrapper); ao2_ref(req_wrapper, -1); return; } } else { ast_debug(2, "%p: PJSIP tsx response received\n", req_wrapper); } ao2_lock(req_wrapper); /* It's possible that our own timer was already processing while * we were waiting on the lock so check the timer id. If it's * still TIMER2 then we still need to process. */ if (req_wrapper->timeout_timer && req_wrapper->timeout_timer->id == TIMEOUT_TIMER2) { int timers_cancelled = 0; ast_debug(3, "%p: Cancelling timer\n", req_wrapper); timers_cancelled = pj_timer_heap_cancel_if_active( pjsip_endpt_get_timer_heap(ast_sip_get_pjsip_endpoint()), req_wrapper->timeout_timer, TIMER_INACTIVE); if (timers_cancelled > 0) { /* If the timer was cancelled the callback will never run so * clean up its reference to the wrapper. */ ast_debug(3, "%p: Timer cancelled\n", req_wrapper); ao2_ref(req_wrapper, -1); } else { /* * If it wasn't cancelled, it MAY be in the callback already * waiting on the lock. When we release the lock, it will * now know not to proceed. */ ast_debug(3, "%p: Timer already expired\n", req_wrapper); } } cb_called = req_wrapper->cb_called; req_wrapper->cb_called = 1; ao2_unlock(req_wrapper); /* It's possible that our own timer expired and called the callbacks * so no need to call them again. */ if (!cb_called && req_wrapper->callback) { req_wrapper->callback(req_wrapper->token, e); ast_debug(2, "%p: Callbacks executed\n", req_wrapper); } ao2_ref(req_wrapper, -1); } /*! \internal This function gets called by our own timer when it expires. * If the timer is cancelled however, the function does NOT get called. * The lock prevents a race condition if both the pjsip transaction timer * and our own timer expire simultaneously. */ static void send_request_timer_callback(pj_timer_heap_t *theap, pj_timer_entry *entry) { struct send_request_wrapper *req_wrapper = entry->user_data; unsigned int cb_called; ast_debug(2, "%p: Internal tsx timer expired after %d msec\n", req_wrapper, req_wrapper->timeout); ao2_lock(req_wrapper); /* * If the id is not TIMEOUT_TIMER2 then the timer was cancelled * before we got the lock or it was already handled so just clean up. */ if (entry->id != TIMEOUT_TIMER2) { ao2_unlock(req_wrapper); ast_debug(3, "%p: Timeout already handled\n", req_wrapper); ao2_ref(req_wrapper, -1); return; } entry->id = TIMER_INACTIVE; ast_debug(3, "%p: Timer handled here\n", req_wrapper); cb_called = req_wrapper->cb_called; req_wrapper->cb_called = 1; ao2_unlock(req_wrapper); if (!cb_called && req_wrapper->callback) { pjsip_event event; PJSIP_EVENT_INIT_TX_MSG(event, req_wrapper->tdata); event.body.tsx_state.type = PJSIP_EVENT_TIMER; req_wrapper->callback(req_wrapper->token, &event); ast_debug(2, "%p: Callbacks executed\n", req_wrapper); } ao2_ref(req_wrapper, -1); } static void send_request_wrapper_destructor(void *obj) { struct send_request_wrapper *req_wrapper = obj; pjsip_tx_data_dec_ref(req_wrapper->tdata); ast_debug(2, "%p: wrapper destroyed\n", req_wrapper); } static pj_status_t endpt_send_request(struct ast_sip_endpoint *endpoint, pjsip_tx_data *tdata, pj_int32_t timeout, void *token, pjsip_endpt_send_callback cb) { struct send_request_wrapper *req_wrapper; pj_status_t ret_val; pjsip_endpoint *endpt = ast_sip_get_pjsip_endpoint(); if (!cb && token) { /* Silly. Without a callback we cannot do anything with token. */ pjsip_tx_data_dec_ref(tdata); return PJ_EINVAL; } /* Create wrapper to detect if the callback was actually called on an error. */ req_wrapper = ao2_alloc(sizeof(*req_wrapper), send_request_wrapper_destructor); if (!req_wrapper) { pjsip_tx_data_dec_ref(tdata); return PJ_ENOMEM; } ast_debug(2, "%p: Wrapper created\n", req_wrapper); req_wrapper->token = token; req_wrapper->callback = cb; req_wrapper->timeout = timeout; req_wrapper->timeout_timer = NULL; req_wrapper->tdata = tdata; /* Add a reference to tdata. The wrapper destructor cleans it up. */ pjsip_tx_data_add_ref(tdata); if (timeout > 0) { pj_time_val timeout_timer_val = { timeout / 1000, timeout % 1000 }; req_wrapper->timeout_timer = PJ_POOL_ALLOC_T(tdata->pool, pj_timer_entry); ast_debug(2, "%p: Set timer to %d msec\n", req_wrapper, timeout); pj_timer_entry_init(req_wrapper->timeout_timer, TIMEOUT_TIMER2, req_wrapper, send_request_timer_callback); /* We need to insure that the wrapper and tdata are available if/when the * timer callback is executed. */ ao2_ref(req_wrapper, +1); ret_val = pj_timer_heap_schedule(pjsip_endpt_get_timer_heap(endpt), req_wrapper->timeout_timer, &timeout_timer_val); if (ret_val != PJ_SUCCESS) { ast_log(LOG_ERROR, "Failed to set timer. Not sending %.*s request to endpoint %s.\n", (int) pj_strlen(&tdata->msg->line.req.method.name), pj_strbuf(&tdata->msg->line.req.method.name), endpoint ? ast_sorcery_object_get_id(endpoint) : ""); ao2_t_ref(req_wrapper, -2, "Drop timer and routine ref"); pjsip_tx_data_dec_ref(tdata); return ret_val; } } /* We need to insure that the wrapper and tdata are available when the * transaction callback is executed. */ ao2_ref(req_wrapper, +1); ret_val = pjsip_endpt_send_request(endpt, tdata, -1, req_wrapper, endpt_send_request_cb); if (ret_val != PJ_SUCCESS) { char errmsg[PJ_ERR_MSG_SIZE]; if (!req_wrapper->send_cb_called) { /* endpt_send_request_cb is not expected to ever be called now. */ ao2_ref(req_wrapper, -1); } /* Complain of failure to send the request. */ pj_strerror(ret_val, errmsg, sizeof(errmsg)); ast_log(LOG_ERROR, "Error %d '%s' sending %.*s request to endpoint %s\n", (int) ret_val, errmsg, (int) pj_strlen(&tdata->msg->line.req.method.name), pj_strbuf(&tdata->msg->line.req.method.name), endpoint ? ast_sorcery_object_get_id(endpoint) : ""); if (timeout > 0) { int timers_cancelled; ao2_lock(req_wrapper); timers_cancelled = pj_timer_heap_cancel_if_active( pjsip_endpt_get_timer_heap(endpt), req_wrapper->timeout_timer, TIMER_INACTIVE); if (timers_cancelled > 0) { ao2_ref(req_wrapper, -1); } /* Was the callback called? */ if (req_wrapper->cb_called) { /* * Yes so we cannot report any error. The callback * has already freed any resources associated with * token. */ ret_val = PJ_SUCCESS; } else { /* * No so we claim it is called so our caller can free * any resources associated with token because of * failure. */ req_wrapper->cb_called = 1; } ao2_unlock(req_wrapper); } else if (req_wrapper->cb_called) { /* * We cannot report any error. The callback has * already freed any resources associated with * token. */ ret_val = PJ_SUCCESS; } } ao2_ref(req_wrapper, -1); return ret_val; } int ast_sip_failover_request(pjsip_tx_data *tdata) { pjsip_via_hdr *via; if (!tdata || !tdata->dest_info.addr.count || (tdata->dest_info.cur_addr == tdata->dest_info.addr.count - 1)) { /* No more addresses to try */ return 0; } /* Try next address */ ++tdata->dest_info.cur_addr; via = (pjsip_via_hdr*)pjsip_msg_find_hdr(tdata->msg, PJSIP_H_VIA, NULL); via->branch_param.slen = 0; pjsip_tx_data_invalidate_msg(tdata); return 1; } static void send_request_cb(void *token, pjsip_event *e); static int check_request_status(struct send_request_data *req_data, pjsip_event *e) { struct ast_sip_endpoint *endpoint; pjsip_transaction *tsx; pjsip_tx_data *tdata; int res = 0; if (!(endpoint = ao2_bump(req_data->endpoint))) { return 0; } tsx = e->body.tsx_state.tsx; switch (tsx->status_code) { case 401: case 407: /* Resend the request with a challenge response if we are challenged. */ res = ++req_data->challenge_count < MAX_RX_CHALLENGES /* Not in a challenge loop */ && !ast_sip_create_request_with_auth(&endpoint->outbound_auths, e->body.tsx_state.src.rdata, tsx->last_tx, &tdata); break; case 408: case 503: if ((res = ast_sip_failover_request(tsx->last_tx))) { tdata = tsx->last_tx; /* * Bump the ref since it will be on a new transaction and * we don't want it to go away along with the old transaction. */ pjsip_tx_data_add_ref(tdata); } break; } if (res) { res = endpt_send_request(endpoint, tdata, -1, req_data, send_request_cb) == PJ_SUCCESS; } ao2_ref(endpoint, -1); return res; } static void send_request_cb(void *token, pjsip_event *e) { struct send_request_data *req_data = token; pjsip_rx_data *challenge; struct ast_sip_supplement *supplement; if (e->type == PJSIP_EVENT_TSX_STATE) { switch(e->body.tsx_state.type) { case PJSIP_EVENT_TRANSPORT_ERROR: case PJSIP_EVENT_TIMER: /* * Check the request status on transport error or timeout. A transport * error can occur when a TCP socket closes and that can be the result * of a 503. Also we may need to failover on a timeout (408). */ if (check_request_status(req_data, e)) { return; } break; case PJSIP_EVENT_RX_MSG: challenge = e->body.tsx_state.src.rdata; /* * Call any supplements that want to know about a response * with any received data. */ AST_RWLIST_RDLOCK(&supplements); AST_LIST_TRAVERSE(&supplements, supplement, next) { if (supplement->incoming_response && does_method_match(&challenge->msg_info.cseq->method.name, supplement->method)) { supplement->incoming_response(req_data->endpoint, challenge); } } AST_RWLIST_UNLOCK(&supplements); if (check_request_status(req_data, e)) { /* * Request with challenge response or failover sent. * Passed our req_data ref to the new request. */ return; } break; default: ast_log(LOG_ERROR, "Unexpected PJSIP event %u\n", e->body.tsx_state.type); break; } } if (req_data->callback) { req_data->callback(req_data->token, e); } ao2_ref(req_data, -1); } int ast_sip_send_out_of_dialog_request(pjsip_tx_data *tdata, struct ast_sip_endpoint *endpoint, int timeout, void *token, void (*callback)(void *token, pjsip_event *e)) { struct ast_sip_supplement *supplement; struct send_request_data *req_data; struct ast_sip_contact *contact; req_data = send_request_data_alloc(endpoint, token, callback); if (!req_data) { pjsip_tx_data_dec_ref(tdata); return -1; } if (endpoint) { ast_sip_message_apply_transport(endpoint->transport, tdata); } contact = ast_sip_mod_data_get(tdata->mod_data, supplement_module.id, MOD_DATA_CONTACT); AST_RWLIST_RDLOCK(&supplements); AST_LIST_TRAVERSE(&supplements, supplement, next) { if (supplement->outgoing_request && does_method_match(&tdata->msg->line.req.method.name, supplement->method)) { supplement->outgoing_request(endpoint, contact, tdata); } } AST_RWLIST_UNLOCK(&supplements); ast_sip_mod_data_set(tdata->pool, tdata->mod_data, supplement_module.id, MOD_DATA_CONTACT, NULL); ao2_cleanup(contact); if (endpt_send_request(endpoint, tdata, timeout, req_data, send_request_cb) != PJ_SUCCESS) { ao2_cleanup(req_data); return -1; } return 0; } int ast_sip_send_request(pjsip_tx_data *tdata, struct pjsip_dialog *dlg, struct ast_sip_endpoint *endpoint, void *token, void (*callback)(void *token, pjsip_event *e)) { ast_assert(tdata->msg->type == PJSIP_REQUEST_MSG); if (dlg) { return send_in_dialog_request(tdata, dlg); } else { return ast_sip_send_out_of_dialog_request(tdata, endpoint, -1, token, callback); } } int ast_sip_set_outbound_proxy(pjsip_tx_data *tdata, const char *proxy) { pjsip_route_hdr *route; static const pj_str_t ROUTE_HNAME = { "Route", 5 }; pj_str_t tmp; pj_strdup2_with_null(tdata->pool, &tmp, proxy); if (!(route = pjsip_parse_hdr(tdata->pool, &ROUTE_HNAME, tmp.ptr, tmp.slen, NULL))) { return -1; } pj_list_insert_nodes_before(&tdata->msg->hdr, (pjsip_hdr*)route); return 0; } int ast_sip_add_header(pjsip_tx_data *tdata, const char *name, const char *value) { pj_str_t hdr_name; pj_str_t hdr_value; pjsip_generic_string_hdr *hdr; pj_cstr(&hdr_name, name); pj_cstr(&hdr_value, value); hdr = pjsip_generic_string_hdr_create(tdata->pool, &hdr_name, &hdr_value); pjsip_msg_add_hdr(tdata->msg, (pjsip_hdr *) hdr); return 0; } pjsip_generic_string_hdr *ast_sip_add_header2(pjsip_tx_data *tdata, const char *name, const char *value) { pj_str_t hdr_name; pj_str_t hdr_value; pjsip_generic_string_hdr *hdr; pj_cstr(&hdr_name, name); pj_cstr(&hdr_value, value); hdr = pjsip_generic_string_hdr_create(tdata->pool, &hdr_name, &hdr_value); pjsip_msg_add_hdr(tdata->msg, (pjsip_hdr *) hdr); return hdr; } static pjsip_msg_body *ast_body_to_pjsip_body(pj_pool_t *pool, const struct ast_sip_body *body) { pj_str_t type; pj_str_t subtype; pj_str_t body_text; pj_cstr(&type, body->type); pj_cstr(&subtype, body->subtype); pj_cstr(&body_text, body->body_text); return pjsip_msg_body_create(pool, &type, &subtype, &body_text); } int ast_sip_add_body(pjsip_tx_data *tdata, const struct ast_sip_body *body) { pjsip_msg_body *pjsip_body = ast_body_to_pjsip_body(tdata->pool, body); tdata->msg->body = pjsip_body; return 0; } int ast_sip_add_body_multipart(pjsip_tx_data *tdata, const struct ast_sip_body *bodies[], int num_bodies) { int i; /* NULL for type and subtype automatically creates "multipart/mixed" */ pjsip_msg_body *body = pjsip_multipart_create(tdata->pool, NULL, NULL); for (i = 0; i < num_bodies; ++i) { pjsip_multipart_part *part = pjsip_multipart_create_part(tdata->pool); part->body = ast_body_to_pjsip_body(tdata->pool, bodies[i]); pjsip_multipart_add_part(tdata->pool, body, part); } tdata->msg->body = body; return 0; } int ast_sip_append_body(pjsip_tx_data *tdata, const char *body_text) { size_t combined_size = strlen(body_text) + tdata->msg->body->len; struct ast_str *body_buffer = ast_str_alloca(combined_size); ast_str_set(&body_buffer, 0, "%.*s%s", (int) tdata->msg->body->len, (char *) tdata->msg->body->data, body_text); tdata->msg->body->data = pj_pool_alloc(tdata->pool, combined_size); pj_memcpy(tdata->msg->body->data, ast_str_buffer(body_buffer), combined_size); tdata->msg->body->len = combined_size; return 0; } struct ast_taskprocessor *ast_sip_create_serializer_group(const char *name, struct ast_serializer_shutdown_group *shutdown_group) { return ast_threadpool_serializer_group(name, sip_threadpool, shutdown_group); } struct ast_taskprocessor *ast_sip_create_serializer(const char *name) { return ast_sip_create_serializer_group(name, NULL); } int ast_sip_push_task(struct ast_taskprocessor *serializer, int (*sip_task)(void *), void *task_data) { if (!serializer) { serializer = ast_serializer_pool_get(sip_serializer_pool); } return ast_taskprocessor_push(serializer, sip_task, task_data); } struct sync_task_data { ast_mutex_t lock; ast_cond_t cond; int complete; int fail; int (*task)(void *); void *task_data; }; static int sync_task(void *data) { struct sync_task_data *std = data; int ret; std->fail = std->task(std->task_data); /* * Once we unlock std->lock after signaling, we cannot access * std again. The thread waiting within ast_sip_push_task_wait() * is free to continue and release its local variable (std). */ ast_mutex_lock(&std->lock); std->complete = 1; ast_cond_signal(&std->cond); ret = std->fail; ast_mutex_unlock(&std->lock); return ret; } static int ast_sip_push_task_wait(struct ast_taskprocessor *serializer, int (*sip_task)(void *), void *task_data) { /* This method is an onion */ struct sync_task_data std; memset(&std, 0, sizeof(std)); ast_mutex_init(&std.lock); ast_cond_init(&std.cond, NULL); std.task = sip_task; std.task_data = task_data; if (ast_sip_push_task(serializer, sync_task, &std)) { ast_mutex_destroy(&std.lock); ast_cond_destroy(&std.cond); return -1; } ast_mutex_lock(&std.lock); while (!std.complete) { ast_cond_wait(&std.cond, &std.lock); } ast_mutex_unlock(&std.lock); ast_mutex_destroy(&std.lock); ast_cond_destroy(&std.cond); return std.fail; } int ast_sip_push_task_wait_servant(struct ast_taskprocessor *serializer, int (*sip_task)(void *), void *task_data) { if (ast_sip_thread_is_servant()) { return sip_task(task_data); } return ast_sip_push_task_wait(serializer, sip_task, task_data); } int ast_sip_push_task_synchronous(struct ast_taskprocessor *serializer, int (*sip_task)(void *), void *task_data) { return ast_sip_push_task_wait_servant(serializer, sip_task, task_data); } int ast_sip_push_task_wait_serializer(struct ast_taskprocessor *serializer, int (*sip_task)(void *), void *task_data) { if (!serializer) { /* Caller doesn't care which PJSIP serializer the task executes under. */ serializer = ast_serializer_pool_get(sip_serializer_pool); if (!serializer) { /* No serializer picked to execute the task */ return -1; } } if (ast_taskprocessor_is_task(serializer)) { /* * We are the requested serializer so we must execute * the task now or deadlock waiting on ourself to * execute it. */ return sip_task(task_data); } return ast_sip_push_task_wait(serializer, sip_task, task_data); } void ast_copy_pj_str(char *dest, const pj_str_t *src, size_t size) { size_t chars_to_copy = MIN(size - 1, pj_strlen(src)); memcpy(dest, pj_strbuf(src), chars_to_copy); dest[chars_to_copy] = '\0'; } int ast_copy_pj_str2(char **dest, const pj_str_t *src) { int res = ast_asprintf(dest, "%.*s", (int)pj_strlen(src), pj_strbuf(src)); if (res < 0) { *dest = NULL; } return res; } int ast_sip_are_media_types_equal(pjsip_media_type *a, pjsip_media_type *b) { int rc = 0; if (a != NULL && b != NULL) { rc = pjsip_media_type_cmp(a, b, 0) ? 0 : 1; } return rc; } int ast_sip_is_media_type_in(pjsip_media_type *a, ...) { int rc = 0; pjsip_media_type *b = NULL; va_list ap; ast_assert(a != NULL); va_start(ap, a); while ((b = va_arg(ap, pjsip_media_type *)) != (pjsip_media_type *)SENTINEL) { if (pjsip_media_type_cmp(a, b, 0) == 0) { rc = 1; break; } } va_end(ap); return rc; } int ast_sip_is_content_type(pjsip_media_type *content_type, char *type, char *subtype) { pjsip_media_type compare; if (!content_type) { return 0; } pjsip_media_type_init2(&compare, type, subtype); return pjsip_media_type_cmp(content_type, &compare, 0) ? 0 : -1; } pj_caching_pool caching_pool; pj_pool_t *memory_pool; pj_thread_t *monitor_thread; static int monitor_continue; static void *monitor_thread_exec(void *endpt) { while (monitor_continue) { const pj_time_val delay = {0, 10}; pjsip_endpt_handle_events(ast_pjsip_endpoint, &delay); } return NULL; } static void stop_monitor_thread(void) { monitor_continue = 0; pj_thread_join(monitor_thread); } AST_THREADSTORAGE(pj_thread_storage); AST_THREADSTORAGE(servant_id_storage); #define SIP_SERVANT_ID 0x5E2F1D static void sip_thread_start(void) { pj_thread_desc *desc; pj_thread_t *thread; uint32_t *servant_id; servant_id = ast_threadstorage_get(&servant_id_storage, sizeof(*servant_id)); if (!servant_id) { ast_log(LOG_ERROR, "Could not set SIP servant ID in thread-local storage.\n"); return; } *servant_id = SIP_SERVANT_ID; desc = ast_threadstorage_get(&pj_thread_storage, sizeof(pj_thread_desc)); if (!desc) { ast_log(LOG_ERROR, "Could not get thread desc from thread-local storage. Expect awful things to occur\n"); return; } pj_bzero(*desc, sizeof(*desc)); if (pj_thread_register("Asterisk Thread", *desc, &thread) != PJ_SUCCESS) { ast_log(LOG_ERROR, "Couldn't register thread with PJLIB.\n"); } } int ast_sip_thread_is_servant(void) { uint32_t *servant_id; if (monitor_thread && pthread_self() == *(pthread_t *)pj_thread_get_os_handle(monitor_thread)) { return 1; } servant_id = ast_threadstorage_get(&servant_id_storage, sizeof(*servant_id)); if (!servant_id) { return 0; } return *servant_id == SIP_SERVANT_ID; } void *ast_sip_dict_get(void *ht, const char *key) { unsigned int hval = 0; if (!ht) { return NULL; } return pj_hash_get(ht, key, PJ_HASH_KEY_STRING, &hval); } void *ast_sip_dict_set(pj_pool_t* pool, void *ht, const char *key, void *val) { if (!ht) { ht = pj_hash_create(pool, 11); } pj_hash_set(pool, ht, key, PJ_HASH_KEY_STRING, 0, val); return ht; } static pj_bool_t supplement_on_rx_request(pjsip_rx_data *rdata) { struct ast_sip_supplement *supplement; if (pjsip_rdata_get_dlg(rdata)) { return PJ_FALSE; } AST_RWLIST_RDLOCK(&supplements); AST_LIST_TRAVERSE(&supplements, supplement, next) { if (supplement->incoming_request && does_method_match(&rdata->msg_info.msg->line.req.method.name, supplement->method)) { struct ast_sip_endpoint *endpoint; endpoint = ast_pjsip_rdata_get_endpoint(rdata); supplement->incoming_request(endpoint, rdata); ao2_cleanup(endpoint); } } AST_RWLIST_UNLOCK(&supplements); return PJ_FALSE; } static void supplement_outgoing_response(pjsip_tx_data *tdata, struct ast_sip_endpoint *sip_endpoint) { struct ast_sip_supplement *supplement; pjsip_cseq_hdr *cseq = pjsip_msg_find_hdr(tdata->msg, PJSIP_H_CSEQ, NULL); struct ast_sip_contact *contact = ast_sip_mod_data_get(tdata->mod_data, supplement_module.id, MOD_DATA_CONTACT); if (sip_endpoint) { ast_sip_message_apply_transport(sip_endpoint->transport, tdata); } AST_RWLIST_RDLOCK(&supplements); AST_LIST_TRAVERSE(&supplements, supplement, next) { if (supplement->outgoing_response && does_method_match(&cseq->method.name, supplement->method)) { supplement->outgoing_response(sip_endpoint, contact, tdata); } } AST_RWLIST_UNLOCK(&supplements); ast_sip_mod_data_set(tdata->pool, tdata->mod_data, supplement_module.id, MOD_DATA_CONTACT, NULL); ao2_cleanup(contact); } int ast_sip_send_response(pjsip_response_addr *res_addr, pjsip_tx_data *tdata, struct ast_sip_endpoint *sip_endpoint) { pj_status_t status; supplement_outgoing_response(tdata, sip_endpoint); status = pjsip_endpt_send_response(ast_sip_get_pjsip_endpoint(), res_addr, tdata, NULL, NULL); if (status != PJ_SUCCESS) { pjsip_tx_data_dec_ref(tdata); } return status == PJ_SUCCESS ? 0 : -1; } static void pool_destroy_callback(void *arg) { pj_pool_t *pool = (pj_pool_t *)arg; pjsip_endpt_release_pool(ast_sip_get_pjsip_endpoint(), pool); } static void clean_contact_from_tdata(pjsip_tx_data *tdata) { struct ast_sip_contact *contact; contact = ast_sip_mod_data_get(tdata->mod_data, supplement_module.id, MOD_DATA_CONTACT); ao2_cleanup(contact); ast_sip_mod_data_set(tdata->pool, tdata->mod_data, supplement_module.id, MOD_DATA_CONTACT, NULL); pjsip_tx_data_dec_ref(tdata); } int ast_sip_send_stateful_response(pjsip_rx_data *rdata, pjsip_tx_data *tdata, struct ast_sip_endpoint *sip_endpoint) { pjsip_transaction *tsx; pj_grp_lock_t *tsx_glock; pj_pool_t *pool; /* Create and initialize global lock pool */ pool = pjsip_endpt_create_pool(ast_sip_get_pjsip_endpoint(), "stateful response", PJSIP_POOL_TSX_LEN, PJSIP_POOL_TSX_INC); if (!pool){ /* ast_sip_create_response bumps the refcount of the contact and adds it to the tdata. * We'll leak that reference if we don't get rid of it here. */ clean_contact_from_tdata(tdata); return -1; } /* Create with handler so that we can release the pool once the glock derefs out */ if(pj_grp_lock_create_w_handler(pool, NULL, pool, &pool_destroy_callback, &tsx_glock) != PJ_SUCCESS) { clean_contact_from_tdata(tdata); pool_destroy_callback((void *) pool); return -1; } /* We need an additional reference as the qualify thread may destroy this out * from under us. Add it now before it gets added to the tsx. */ pj_grp_lock_add_ref(tsx_glock); if (pjsip_tsx_create_uas2(NULL, rdata, tsx_glock, &tsx) != PJ_SUCCESS) { clean_contact_from_tdata(tdata); pj_grp_lock_dec_ref(tsx_glock); return -1; } pjsip_tsx_recv_msg(tsx, rdata); supplement_outgoing_response(tdata, sip_endpoint); if (pjsip_tsx_send_msg(tsx, tdata) != PJ_SUCCESS) { pj_grp_lock_dec_ref(tsx_glock); pjsip_tx_data_dec_ref(tdata); return -1; } pj_grp_lock_dec_ref(tsx_glock); return 0; } int ast_sip_create_response(const pjsip_rx_data *rdata, int st_code, struct ast_sip_contact *contact, pjsip_tx_data **tdata) { int res = pjsip_endpt_create_response(ast_sip_get_pjsip_endpoint(), rdata, st_code, NULL, tdata); if (!res) { ast_sip_mod_data_set((*tdata)->pool, (*tdata)->mod_data, supplement_module.id, MOD_DATA_CONTACT, ao2_bump(contact)); } return res; } int ast_sip_get_host_ip(int af, pj_sockaddr *addr) { if (af == pj_AF_INET() && !ast_strlen_zero(host_ip_ipv4_string)) { pj_sockaddr_copy_addr(addr, &host_ip_ipv4); return 0; } else if (af == pj_AF_INET6() && !ast_strlen_zero(host_ip_ipv6_string)) { pj_sockaddr_copy_addr(addr, &host_ip_ipv6); return 0; } return -1; } const char *ast_sip_get_host_ip_string(int af) { if (af == pj_AF_INET()) { return host_ip_ipv4_string; } else if (af == pj_AF_INET6()) { return host_ip_ipv6_string; } return NULL; } int ast_sip_dtmf_to_str(const enum ast_sip_dtmf_mode dtmf, char *buf, size_t buf_len) { switch (dtmf) { case AST_SIP_DTMF_NONE: ast_copy_string(buf, "none", buf_len); break; case AST_SIP_DTMF_RFC_4733: ast_copy_string(buf, "rfc4733", buf_len); break; case AST_SIP_DTMF_INBAND: ast_copy_string(buf, "inband", buf_len); break; case AST_SIP_DTMF_INFO: ast_copy_string(buf, "info", buf_len); break; case AST_SIP_DTMF_AUTO: ast_copy_string(buf, "auto", buf_len); break; case AST_SIP_DTMF_AUTO_INFO: ast_copy_string(buf, "auto_info", buf_len); break; default: buf[0] = '\0'; return -1; } return 0; } int ast_sip_str_to_dtmf(const char * dtmf_mode) { int result = -1; if (!strcasecmp(dtmf_mode, "info")) { result = AST_SIP_DTMF_INFO; } else if (!strcasecmp(dtmf_mode, "rfc4733")) { result = AST_SIP_DTMF_RFC_4733; } else if (!strcasecmp(dtmf_mode, "inband")) { result = AST_SIP_DTMF_INBAND; } else if (!strcasecmp(dtmf_mode, "none")) { result = AST_SIP_DTMF_NONE; } else if (!strcasecmp(dtmf_mode, "auto")) { result = AST_SIP_DTMF_AUTO; } else if (!strcasecmp(dtmf_mode, "auto_info")) { result = AST_SIP_DTMF_AUTO_INFO; } return result; } const char *ast_sip_call_codec_pref_to_str(struct ast_flags pref) { const char *value; if (ast_sip_call_codec_pref_test(pref, LOCAL) && ast_sip_call_codec_pref_test(pref, INTERSECT) && ast_sip_call_codec_pref_test(pref, ALL)) { value = "local"; } else if (ast_sip_call_codec_pref_test(pref, LOCAL) && ast_sip_call_codec_pref_test(pref, UNION) && ast_sip_call_codec_pref_test(pref, ALL)) { value = "local_merge"; } else if (ast_sip_call_codec_pref_test(pref, LOCAL) && ast_sip_call_codec_pref_test(pref, INTERSECT) && ast_sip_call_codec_pref_test(pref, FIRST)) { value = "local_first"; } else if (ast_sip_call_codec_pref_test(pref, REMOTE) && ast_sip_call_codec_pref_test(pref, INTERSECT) && ast_sip_call_codec_pref_test(pref, ALL)) { value = "remote"; } else if (ast_sip_call_codec_pref_test(pref, REMOTE) && ast_sip_call_codec_pref_test(pref, UNION) && ast_sip_call_codec_pref_test(pref, ALL)) { value = "remote_merge"; } else if (ast_sip_call_codec_pref_test(pref, REMOTE) && ast_sip_call_codec_pref_test(pref, UNION) && ast_sip_call_codec_pref_test(pref, FIRST)) { value = "remote_first"; } else { value = "unknown"; } return value; } int ast_sip_call_codec_str_to_pref(struct ast_flags *pref, const char *pref_str, int is_outgoing) { pref->flags = 0; if (strcmp(pref_str, "local") == 0) { ast_set_flag(pref, AST_SIP_CALL_CODEC_PREF_LOCAL | AST_SIP_CALL_CODEC_PREF_INTERSECT | AST_SIP_CALL_CODEC_PREF_ALL); } else if (is_outgoing && strcmp(pref_str, "local_merge") == 0) { ast_set_flag(pref, AST_SIP_CALL_CODEC_PREF_LOCAL | AST_SIP_CALL_CODEC_PREF_UNION | AST_SIP_CALL_CODEC_PREF_ALL); } else if (strcmp(pref_str, "local_first") == 0) { ast_set_flag(pref, AST_SIP_CALL_CODEC_PREF_LOCAL | AST_SIP_CALL_CODEC_PREF_INTERSECT | AST_SIP_CALL_CODEC_PREF_FIRST); } else if (strcmp(pref_str, "remote") == 0) { ast_set_flag(pref, AST_SIP_CALL_CODEC_PREF_REMOTE | AST_SIP_CALL_CODEC_PREF_INTERSECT | AST_SIP_CALL_CODEC_PREF_ALL); } else if (is_outgoing && strcmp(pref_str, "remote_merge") == 0) { ast_set_flag(pref, AST_SIP_CALL_CODEC_PREF_REMOTE | AST_SIP_CALL_CODEC_PREF_UNION | AST_SIP_CALL_CODEC_PREF_ALL); } else if (strcmp(pref_str, "remote_first") == 0) { ast_set_flag(pref, AST_SIP_CALL_CODEC_PREF_REMOTE | AST_SIP_CALL_CODEC_PREF_UNION | AST_SIP_CALL_CODEC_PREF_FIRST); } else { return -1; } return 0; } /*! * \internal * \brief Set an ast_party_id name and number based on an identity header. * \param hdr From, P-Asserted-Identity, or Remote-Party-ID header on incoming message * \param[out] id The ID to set data on */ static void set_id_from_hdr(pjsip_fromto_hdr *hdr, struct ast_party_id *id) { char cid_name[AST_CHANNEL_NAME]; char cid_num[AST_CHANNEL_NAME]; size_t cid_name_size = AST_CHANNEL_NAME; pjsip_name_addr *id_name_addr = (pjsip_name_addr *) hdr->uri; char *semi; enum ast_utf8_replace_result result; ast_copy_pj_str(cid_num, ast_sip_pjsip_uri_get_username(hdr->uri), sizeof(cid_num)); /* Always truncate caller-id number at a semicolon. */ semi = strchr(cid_num, ';'); if (semi) { /* * We need to be able to handle URI's looking like * "sip:1235557890;phone-context=national@x.x.x.x;user=phone" * * Where the uri->user field will result in: * "1235557890;phone-context=national" * * People don't care about anything after the semicolon * showing up on their displays even though the RFC * allows the semicolon. */ *semi = '\0'; } /* * It's safe to pass a NULL or empty string as the source. * The result will be an empty string assuming the destination * size was at least 1. */ result = ast_utf8_replace_invalid_chars(cid_name, &cid_name_size, id_name_addr->display.ptr, id_name_addr->display.slen); if (result != AST_UTF8_REPLACE_VALID) { ast_log(LOG_WARNING, "CallerID Name '" PJSTR_PRINTF_SPEC "' for number '%s' has invalid UTF-8 characters which " "were replaced", PJSTR_PRINTF_VAR(id_name_addr->display), cid_num); } ast_free(id->name.str); id->name.str = ast_strdup(cid_name); if (!ast_strlen_zero(cid_name)) { id->name.valid = 1; } ast_free(id->number.str); id->number.str = ast_strdup(cid_num); if (!ast_strlen_zero(cid_num)) { id->number.valid = 1; } } /*! * \internal * \brief Get a P-Asserted-Identity or Remote-Party-ID header from an incoming message * * This function will parse the header as if it were a From header. This allows for us * to easily manipulate the URI, as well as add, modify, or remove parameters from the * header * * \param rdata The incoming message * \param header_name The name of the ID header to find * \retval NULL No ID header present or unable to parse ID header * \retval non-NULL The parsed ID header */ static pjsip_fromto_hdr *get_id_header(pjsip_rx_data *rdata, const pj_str_t *header_name) { static const pj_str_t from = { "From", 4 }; pj_str_t header_content; pjsip_fromto_hdr *parsed_hdr; pjsip_generic_string_hdr *ident = pjsip_msg_find_hdr_by_name(rdata->msg_info.msg, header_name, NULL); int parsed_len; if (!ident) { return NULL; } pj_strdup_with_null(rdata->tp_info.pool, &header_content, &ident->hvalue); parsed_hdr = pjsip_parse_hdr(rdata->tp_info.pool, &from, header_content.ptr, pj_strlen(&header_content), &parsed_len); if (!parsed_hdr) { return NULL; } return parsed_hdr; } /*! * \internal * \brief Set an ast_party_id structure based on data in a P-Asserted-Identity header * * This makes use of \ref set_id_from_hdr for setting name and number. It uses * the contents of a Privacy header in order to set presentation information. * * \param rdata The incoming message * \param[out] id The ID to set * \retval 0 Successfully set the party ID * \retval non-zero Could not set the party ID */ static int set_id_from_pai(pjsip_rx_data *rdata, struct ast_party_id *id) { static const pj_str_t pai_str = { "P-Asserted-Identity", 19 }; static const pj_str_t privacy_str = { "Privacy", 7 }; pjsip_fromto_hdr *pai_hdr = get_id_header(rdata, &pai_str); pjsip_generic_string_hdr *privacy; if (!pai_hdr) { return -1; } set_id_from_hdr(pai_hdr, id); if (!id->number.valid) { return -1; } privacy = pjsip_msg_find_hdr_by_name(rdata->msg_info.msg, &privacy_str, NULL); if (!privacy || !pj_stricmp2(&privacy->hvalue, "none")) { id->number.presentation = AST_PRES_ALLOWED_USER_NUMBER_NOT_SCREENED; id->name.presentation = AST_PRES_ALLOWED_USER_NUMBER_NOT_SCREENED; } else { id->number.presentation = AST_PRES_PROHIB_USER_NUMBER_NOT_SCREENED; id->name.presentation = AST_PRES_PROHIB_USER_NUMBER_NOT_SCREENED; } return 0; } /*! * \internal * \brief Set an ast_party_id structure based on data in a Remote-Party-ID header * * This makes use of \ref set_id_from_hdr for setting name and number. It uses * the privacy and screen parameters in order to set presentation information. * * \param rdata The incoming message * \param[out] id The ID to set * \retval 0 Succesfully set the party ID * \retval non-zero Could not set the party ID */ static int set_id_from_rpid(pjsip_rx_data *rdata, struct ast_party_id *id) { static const pj_str_t rpid_str = { "Remote-Party-ID", 15 }; static const pj_str_t privacy_str = { "privacy", 7 }; static const pj_str_t screen_str = { "screen", 6 }; pjsip_fromto_hdr *rpid_hdr = get_id_header(rdata, &rpid_str); pjsip_param *screen; pjsip_param *privacy; if (!rpid_hdr) { return -1; } set_id_from_hdr(rpid_hdr, id); if (!id->number.valid) { return -1; } privacy = pjsip_param_find(&rpid_hdr->other_param, &privacy_str); screen = pjsip_param_find(&rpid_hdr->other_param, &screen_str); if (privacy && !pj_stricmp2(&privacy->value, "full")) { id->number.presentation = AST_PRES_RESTRICTED; id->name.presentation = AST_PRES_RESTRICTED; } else { id->number.presentation = AST_PRES_ALLOWED; id->name.presentation = AST_PRES_ALLOWED; } if (screen && !pj_stricmp2(&screen->value, "yes")) { id->number.presentation |= AST_PRES_USER_NUMBER_PASSED_SCREEN; id->name.presentation |= AST_PRES_USER_NUMBER_PASSED_SCREEN; } else { id->number.presentation |= AST_PRES_USER_NUMBER_UNSCREENED; id->name.presentation |= AST_PRES_USER_NUMBER_UNSCREENED; } return 0; } /*! * \internal * \brief Set an ast_party_id structure based on data in a From * * This makes use of \ref set_id_from_hdr for setting name and number. It uses * no information from the message in order to set privacy. It relies on endpoint * configuration for privacy information. * * \param rdata The incoming message * \param[out] id The ID to set * \retval 0 Succesfully set the party ID * \retval non-zero Could not set the party ID */ static int set_id_from_from(struct pjsip_rx_data *rdata, struct ast_party_id *id) { pjsip_fromto_hdr *from = pjsip_msg_find_hdr(rdata->msg_info.msg, PJSIP_H_FROM, rdata->msg_info.msg->hdr.next); if (!from) { /* This had better not happen */ return -1; } set_id_from_hdr(from, id); if (!id->number.valid) { return -1; } return 0; } int ast_sip_set_id_connected_line(struct pjsip_rx_data *rdata, struct ast_party_id *id) { return !set_id_from_pai(rdata, id) || !set_id_from_rpid(rdata, id) ? 0 : -1; } int ast_sip_set_id_from_invite(struct pjsip_rx_data *rdata, struct ast_party_id *id, struct ast_party_id *default_id, int trust_inbound) { if (trust_inbound && (!set_id_from_pai(rdata, id) || !set_id_from_rpid(rdata, id))) { /* Trusted: Check PAI and RPID */ ast_free(id->tag); id->tag = ast_strdup(default_id->tag); return 0; } /* Not trusted: check the endpoint config or use From. */ ast_party_id_copy(id, default_id); if (!default_id->number.valid) { set_id_from_from(rdata, id); } return 0; } /*! * \brief Set name and number information on an identity header. * * \param pool Memory pool to use for string duplication * \param id_hdr A From, P-Asserted-Identity, or Remote-Party-ID header to modify * \param id The identity information to apply to the header */ void ast_sip_modify_id_header(pj_pool_t *pool, pjsip_fromto_hdr *id_hdr, const struct ast_party_id *id) { pjsip_name_addr *id_name_addr; pjsip_sip_uri *id_uri; id_name_addr = (pjsip_name_addr *) id_hdr->uri; id_uri = pjsip_uri_get_uri(id_name_addr->uri); if (id->name.valid) { if (!ast_strlen_zero(id->name.str)) { int name_buf_len = strlen(id->name.str) * 2 + 1; char *name_buf = ast_alloca(name_buf_len); ast_escape_quoted(id->name.str, name_buf, name_buf_len); pj_strdup2(pool, &id_name_addr->display, name_buf); } else { pj_strdup2(pool, &id_name_addr->display, NULL); } } if (id->number.valid) { pj_strdup2(pool, &id_uri->user, id->number.str); } } /*! * \brief Find a contact and insert a "user@" into its URI. * * \param to Original destination (for error messages only) * \param endpoint_name Endpoint name (for error messages only) * \param aors Command separated list of AORs * \param user The user to insert in the contact URI * \param uri Pointer to buffer in which to return the URI. Must be freed by caller. * * \return 0 Success * \return -1 Fail * * \note If the contact URI found for the endpoint already has a user in * its URI, it will be replaced by the user passed as an argument to this function. */ static int insert_user_in_contact_uri(const char *to, const char *endpoint_name, const char *aors, const char *user, char **uri) { RAII_VAR(struct ast_sip_contact *, contact, NULL, ao2_cleanup); pj_pool_t *pool; pjsip_name_addr *name_addr; pjsip_sip_uri *sip_uri; int err = 0; contact = ast_sip_location_retrieve_contact_from_aor_list(aors); if (!contact) { ast_log(LOG_WARNING, "Dest: '%s'. Couldn't find contact for endpoint '%s'\n", to, endpoint_name); return -1; } pool = pjsip_endpt_create_pool(ast_sip_get_pjsip_endpoint(), "uri-user-insert", 128, 128); if (!pool) { ast_log(LOG_WARNING, "Failed to allocate ParseUri endpoint pool.\n"); return -1; } name_addr = (pjsip_name_addr *) pjsip_parse_uri(pool, (char*)contact->uri, strlen(contact->uri), PJSIP_PARSE_URI_AS_NAMEADDR); if (!name_addr || (!PJSIP_URI_SCHEME_IS_SIP(name_addr->uri) && !PJSIP_URI_SCHEME_IS_SIPS(name_addr->uri))) { ast_log(LOG_WARNING, "Failed to parse URI '%s'\n", contact->uri); err = -1; goto out; } ast_debug(3, "Dest: '%s' User: '%s' Endpoint: '%s' ContactURI: '%s'\n", to, user, endpoint_name, contact->uri); sip_uri = pjsip_uri_get_uri(name_addr->uri); pj_strset2(&sip_uri->user, (char*)user); *uri = ast_malloc(PJSIP_MAX_URL_SIZE); if (!(*uri)) { err = -1; goto out; } pjsip_uri_print(PJSIP_URI_IN_REQ_URI, name_addr, *uri, PJSIP_MAX_URL_SIZE); out: pjsip_endpt_release_pool(ast_sip_get_pjsip_endpoint(), pool); return err; } /*! * \internal * \brief Get endpoint and URI when the destination is only a single token * * "destination" could be one of the following: * \verbatim endpoint_name hostname * \endverbatim * * \param to * \param destination * \param get_default_outbound If nonzero, try to retrieve the default * outbound endpoint if no endpoint was found. * Otherwise, return NULL if no endpoint was found. * \param uri Pointer to URI variable. Must be freed by caller - even if the return value is NULL! * \return endpoint */ static struct ast_sip_endpoint *handle_single_token(const char *to, char *destination, int get_default_outbound, char **uri) { RAII_VAR(struct ast_sip_contact*, contact, NULL, ao2_cleanup); char *endpoint_name = NULL; struct ast_sip_endpoint *endpoint = NULL; /* * If "destination" is just one token, it could be an endpoint name * or a hostname without a scheme. */ endpoint = ast_sorcery_retrieve_by_id(ast_sip_get_sorcery(), "endpoint", destination); if (!endpoint) { /* * We can only assume it's a hostname. */ char *temp_uri = ast_malloc(strlen(destination) + strlen("sip:") + 1); if (!temp_uri) { goto failure; } sprintf(temp_uri, "sip:%s", destination); *uri = temp_uri; if (get_default_outbound) { endpoint = ast_sip_default_outbound_endpoint(); } ast_debug(3, "Dest: '%s' Didn't find endpoint so adding scheme and using URI '%s'%s\n", to, *uri, get_default_outbound ? " with default endpoint" : ""); return endpoint; } /* * It's an endpoint */ endpoint_name = destination; contact = ast_sip_location_retrieve_contact_from_aor_list(endpoint->aors); if (!contact) { ast_log(LOG_WARNING, "Dest: '%s'. Found endpoint '%s' but didn't find an aor/contact for it\n", to, endpoint_name); ao2_cleanup(endpoint); goto failure; } *uri = ast_strdup(contact->uri); if (!(*uri)) { ao2_cleanup(endpoint); goto failure; } ast_debug(3, "Dest: '%s' Found endpoint '%s' and found contact with URI '%s'\n", to, endpoint_name, *uri); return endpoint; failure: *uri = NULL; return NULL; } /*! * \internal * \brief Get endpoint and URI when the destination contained a '/' * * "to" could be one of the following: * \verbatim endpoint/aor endpoint/ endpoint/ endpoint/"Bob" endpoint/"Bob" endpoint/sip[s]:host endpoint/sip[s]:user@host endpoint/host endpoint/user@host * \endverbatim * * \param to Destination * \param uri Pointer to URI variable. Must be freed by caller - even if the return value is NULL! * \param destination, slash, atsign, scheme * \return endpoint */ static struct ast_sip_endpoint *handle_slash(const char *to, char *destination, char **uri, char *slash, char *atsign, char *scheme) { char *endpoint_name = NULL; struct ast_sip_endpoint *endpoint = NULL; struct ast_sip_contact *contact = NULL; char *user = NULL; char *afterslash = slash + 1; struct ast_sip_aor *aor; if (ast_begins_with(destination, "PJSIP/")) { ast_debug(3, "Dest: '%s' Dialplan format'\n", to); /* * This has to be the form PJSIP/user@endpoint */ if (!atsign || strchr(afterslash, '/')) { /* * If there's no "user@" or there's a slash somewhere after * "PJSIP/" then we go no further. */ ast_log(LOG_WARNING, "Dest: '%s'. Destinations beginning with 'PJSIP/' must be in the form of 'PJSIP/user@endpoint'\n", to); goto failure; } *atsign = '\0'; user = afterslash; endpoint_name = atsign + 1; ast_debug(3, "Dest: '%s' User: '%s' Endpoint: '%s'\n", to, user, endpoint_name); } else { /* * Either... * endpoint/aor * endpoint/uri */ *slash = '\0'; endpoint_name = destination; ast_debug(3, "Dest: '%s' Endpoint: '%s'\n", to, endpoint_name); } endpoint = ast_sorcery_retrieve_by_id(ast_sip_get_sorcery(), "endpoint", endpoint_name); if (!endpoint) { ast_log(LOG_WARNING, "Dest: '%s'. Didn't find endpoint with name '%s'\n", to, endpoint_name); goto failure; } if (scheme) { /* * If we found a scheme, then everything after the slash MUST be a URI. * We don't need to do any further modification. */ *uri = ast_strdup(afterslash); if (!(*uri)) { goto failure; } ast_debug(3, "Dest: '%s' Found endpoint '%s' and found URI '%s' after '/'\n", to, endpoint_name, *uri); return endpoint; } if (user) { /* * This has to be the form PJSIP/user@endpoint */ int rc; /* * Set the return URI to be the endpoint's contact URI with the user * portion set to the user that was specified before the endpoint name. */ rc = insert_user_in_contact_uri(to, endpoint_name, endpoint->aors, user, uri); if (rc != 0) { /* * insert_user_in_contact_uri prints the warning message. */ goto failure; } ast_debug(3, "Dest: '%s' User: '%s' Endpoint: '%s' URI: '%s'\n", to, user, endpoint_name, *uri); return endpoint; } /* * We're now left with two possibilities... * endpoint/aor * endpoint/uri-without-scheme */ aor = ast_sip_location_retrieve_aor(afterslash); if (!aor) { /* * It's probably a URI without a scheme but we don't have a way to tell * for sure. We're going to assume it is and prepend it with a scheme. */ *uri = ast_malloc(strlen(afterslash) + strlen("sip:") + 1); if (!(*uri)) { goto failure; } sprintf(*uri, "sip:%s", afterslash); ast_debug(3, "Dest: '%s' Found endpoint '%s' but didn't find aor after '/' so using URI '%s'\n", to, endpoint_name, *uri); return endpoint; } /* * Only one possibility left... There was an aor name after the slash. */ ast_debug(3, "Dest: '%s' Found endpoint '%s' and found aor '%s' after '/'\n", to, endpoint_name, ast_sorcery_object_get_id(aor)); contact = ast_sip_location_retrieve_first_aor_contact(aor); if (!contact) { ast_log(LOG_WARNING, "Dest: '%s'. Found endpoint '%s' but didn't find contact for aor '%s'\n", to, endpoint_name, ast_sorcery_object_get_id(aor)); ao2_cleanup(aor); goto failure; } *uri = ast_strdup(contact->uri); ao2_cleanup(contact); ao2_cleanup(aor); if (!(*uri)) { goto failure; } ast_debug(3, "Dest: '%s' Found endpoint '%s' and found contact with URI '%s' for aor '%s'\n", to, endpoint_name, *uri, ast_sorcery_object_get_id(aor)); return endpoint; failure: ao2_cleanup(endpoint); *uri = NULL; return NULL; } /*! * \internal * \brief Get endpoint and URI when the destination contained a '@' but no '/' or scheme * * "to" could be one of the following: * \verbatim "Bob" sip[s]:user@host user@host * \endverbatim * * \param to Destination * \param uri Pointer to URI variable. Must be freed by caller - even if the return value is NULL! * \param destination, slash, atsign, scheme * \param get_default_outbound If nonzero, try to retrieve the default * outbound endpoint if no endpoint was found. * Otherwise, return NULL if no endpoint was found. * \return endpoint */ static struct ast_sip_endpoint *handle_atsign(const char *to, char *destination, char **uri, char *slash, char *atsign, char *scheme, int get_default_outbound) { char *endpoint_name = NULL; struct ast_sip_endpoint *endpoint = NULL; struct ast_sip_contact *contact = NULL; char *afterat = atsign + 1; *atsign = '\0'; endpoint_name = destination; /* Apparently there may be ';' after the endpoint name ??? */ AST_SIP_USER_OPTIONS_TRUNCATE_CHECK(endpoint_name); endpoint = ast_sorcery_retrieve_by_id(ast_sip_get_sorcery(), "endpoint", endpoint_name); if (!endpoint) { /* * It's probably a uri with a user but without a scheme but we don't have a way to tell. * We're going to assume it is and prepend it with a scheme. */ *uri = ast_malloc(strlen(to) + strlen("sip:") + 1); if (!(*uri)) { goto failure; } sprintf(*uri, "sip:%s", to); if (get_default_outbound) { endpoint = ast_sip_default_outbound_endpoint(); } ast_debug(3, "Dest: '%s' Didn't find endpoint before the '@' so using URI '%s'%s\n", to, *uri, get_default_outbound ? " with default endpoint" : ""); return endpoint; } /* * OK, it's an endpoint and a domain (which we ignore) */ contact = ast_sip_location_retrieve_contact_from_aor_list(endpoint->aors); if (!contact) { ast_log(LOG_WARNING, "Dest: '%s'. Found endpoint '%s' but didn't find contact\n", to, endpoint_name); goto failure; } *uri = ast_strdup(contact->uri); ao2_cleanup(contact); if (!(*uri)) { goto failure; } ast_debug(3, "Dest: '%s' Found endpoint '%s' and found contact with URI '%s' (discarding domain %s)\n", to, endpoint_name, *uri, afterat); return endpoint; failure: ao2_cleanup(endpoint); *uri = NULL; return NULL; } struct ast_sip_endpoint *ast_sip_get_endpoint(const char *to, int get_default_outbound, char **uri) { char *destination; char *slash = NULL; char *atsign = NULL; char *scheme = NULL; struct ast_sip_endpoint *endpoint = NULL; destination = ast_strdupa(to); slash = strchr(destination, '/'); atsign = strchr(destination, '@'); scheme = S_OR(strstr(destination, "sip:"), strstr(destination, "sips:")); if (!slash && !atsign && !scheme) { /* * If there's only a single token, it can be either... * endpoint * host */ return handle_single_token(to, destination, get_default_outbound, uri); } if (slash) { /* * If there's a '/', then the form must be one of the following... * PJSIP/user@endpoint * endpoint/aor * endpoint/uri */ return handle_slash(to, destination, uri, slash, atsign, scheme); } if (atsign && !scheme) { /* * If there's an '@' but no scheme then it's either following an endpoint name * and being followed by a domain name (which we discard). * OR is's a user@host uri without a scheme. It's probably the latter but because * endpoint@domain looks just like user@host, we'll test for endpoint first. */ return handle_atsign(to, destination, uri, slash, atsign, scheme, get_default_outbound); } /* * If all else fails, we assume it's a URI or just a hostname. */ if (scheme) { *uri = ast_strdup(destination); if (!(*uri)) { goto failure; } ast_debug(3, "Dest: '%s' Didn't find an endpoint but did find a scheme so using URI '%s'%s\n", to, *uri, get_default_outbound ? " with default endpoint" : ""); } else { *uri = ast_malloc(strlen(destination) + strlen("sip:") + 1); if (!(*uri)) { goto failure; } sprintf(*uri, "sip:%s", destination); ast_debug(3, "Dest: '%s' Didn't find an endpoint and didn't find scheme so adding scheme and using URI '%s'%s\n", to, *uri, get_default_outbound ? " with default endpoint" : ""); } if (get_default_outbound) { endpoint = ast_sip_default_outbound_endpoint(); } return endpoint; failure: ao2_cleanup(endpoint); *uri = NULL; return NULL; } int ast_sip_update_to_uri(pjsip_tx_data *tdata, const char *to) { pjsip_name_addr *parsed_name_addr; pjsip_sip_uri *sip_uri; pjsip_name_addr *tdata_name_addr; pjsip_sip_uri *tdata_sip_uri; pjsip_to_hdr *to_hdr; char *buf = NULL; #define DEBUG_BUF_SIZE 256 parsed_name_addr = (pjsip_name_addr *) pjsip_parse_uri(tdata->pool, (char*)to, strlen(to), PJSIP_PARSE_URI_AS_NAMEADDR); if (!parsed_name_addr || (!PJSIP_URI_SCHEME_IS_SIP(parsed_name_addr->uri) && !PJSIP_URI_SCHEME_IS_SIPS(parsed_name_addr->uri))) { ast_log(LOG_WARNING, "To address '%s' is not a valid SIP/SIPS URI\n", to); return -1; } sip_uri = pjsip_uri_get_uri(parsed_name_addr->uri); if (DEBUG_ATLEAST(3)) { buf = ast_alloca(DEBUG_BUF_SIZE); pjsip_uri_print(PJSIP_URI_IN_FROMTO_HDR, sip_uri, buf, DEBUG_BUF_SIZE); ast_debug(3, "Parsed To: %.*s %s\n", (int)parsed_name_addr->display.slen, parsed_name_addr->display.ptr, buf); } to_hdr = PJSIP_MSG_TO_HDR(tdata->msg); tdata_name_addr = to_hdr ? (pjsip_name_addr *) to_hdr->uri : NULL; if (!tdata_name_addr || (!PJSIP_URI_SCHEME_IS_SIP(tdata_name_addr->uri) && !PJSIP_URI_SCHEME_IS_SIPS(tdata_name_addr->uri))) { /* Highly unlikely but we have to check */ ast_log(LOG_WARNING, "tdata To address '%s' is not a valid SIP/SIPS URI\n", to); return -1; } tdata_sip_uri = pjsip_uri_get_uri(tdata_name_addr->uri); if (DEBUG_ATLEAST(3)) { buf[0] = '\0'; pjsip_uri_print(PJSIP_URI_IN_FROMTO_HDR, tdata_sip_uri, buf, DEBUG_BUF_SIZE); ast_debug(3, "Original tdata To: %.*s %s\n", (int)tdata_name_addr->display.slen, tdata_name_addr->display.ptr, buf); } /* Replace the uri */ pjsip_sip_uri_assign(tdata->pool, tdata_sip_uri, sip_uri); /* The display name isn't part of the URI so we need to replace it separately */ pj_strdup(tdata->pool, &tdata_name_addr->display, &parsed_name_addr->display); if (DEBUG_ATLEAST(3)) { buf[0] = '\0'; pjsip_uri_print(PJSIP_URI_IN_FROMTO_HDR, tdata_sip_uri, buf, 256); ast_debug(3, "New tdata To: %.*s %s\n", (int)tdata_name_addr->display.slen, tdata_name_addr->display.ptr, buf); } return 0; #undef DEBUG_BUF_SIZE } int ast_sip_update_from(pjsip_tx_data *tdata, char *from) { pjsip_name_addr *name_addr; pjsip_sip_uri *uri; pjsip_name_addr *parsed_name_addr; pjsip_from_hdr *from_hdr; if (ast_strlen_zero(from)) { return 0; } from_hdr = PJSIP_MSG_FROM_HDR(tdata->msg); if (!from_hdr) { return -1; } name_addr = (pjsip_name_addr *) from_hdr->uri; uri = pjsip_uri_get_uri(name_addr); parsed_name_addr = (pjsip_name_addr *) pjsip_parse_uri(tdata->pool, from, strlen(from), PJSIP_PARSE_URI_AS_NAMEADDR); if (parsed_name_addr) { pjsip_sip_uri *parsed_uri; if (!PJSIP_URI_SCHEME_IS_SIP(parsed_name_addr->uri) && !PJSIP_URI_SCHEME_IS_SIPS(parsed_name_addr->uri)) { ast_log(LOG_WARNING, "From address '%s' is not a valid SIP/SIPS URI\n", from); return -1; } parsed_uri = pjsip_uri_get_uri(parsed_name_addr->uri); if (pj_strlen(&parsed_name_addr->display)) { pj_strdup(tdata->pool, &name_addr->display, &parsed_name_addr->display); } /* Unlike the To header, we only want to replace the user, host and port */ pj_strdup(tdata->pool, &uri->user, &parsed_uri->user); pj_strdup(tdata->pool, &uri->host, &parsed_uri->host); uri->port = parsed_uri->port; return 0; } else { /* assume it is 'user[@domain]' format */ char *domain = strchr(from, '@'); if (domain) { pj_str_t pj_from; pj_strset3(&pj_from, from, domain); pj_strdup(tdata->pool, &uri->user, &pj_from); pj_strdup2(tdata->pool, &uri->host, domain + 1); } else { pj_strdup2(tdata->pool, &uri->user, from); } return 0; } return -1; } static void remove_request_headers(pjsip_endpoint *endpt) { const pjsip_hdr *request_headers = pjsip_endpt_get_request_headers(endpt); pjsip_hdr *iter = request_headers->next; while (iter != request_headers) { pjsip_hdr *to_erase = iter; iter = iter->next; pj_list_erase(to_erase); } } long ast_sip_threadpool_queue_size(void) { return ast_threadpool_queue_size(sip_threadpool); } struct ast_threadpool *ast_sip_threadpool(void) { return sip_threadpool; } int ast_sip_is_uri_sip_sips(pjsip_uri *uri) { return (PJSIP_URI_SCHEME_IS_SIP(uri) || PJSIP_URI_SCHEME_IS_SIPS(uri)); } int ast_sip_is_allowed_uri(pjsip_uri *uri) { return (ast_sip_is_uri_sip_sips(uri) || PJSIP_URI_SCHEME_IS_TEL(uri)); } const pj_str_t *ast_sip_pjsip_uri_get_username(pjsip_uri *uri) { if (ast_sip_is_uri_sip_sips(uri)) { pjsip_sip_uri *sip_uri = pjsip_uri_get_uri(uri); if (!sip_uri) { return &AST_PJ_STR_EMPTY; } return &sip_uri->user; } else if (PJSIP_URI_SCHEME_IS_TEL(uri)) { pjsip_tel_uri *tel_uri = pjsip_uri_get_uri(uri); if (!tel_uri) { return &AST_PJ_STR_EMPTY; } return &tel_uri->number; } return &AST_PJ_STR_EMPTY; } const pj_str_t *ast_sip_pjsip_uri_get_hostname(pjsip_uri *uri) { if (ast_sip_is_uri_sip_sips(uri)) { pjsip_sip_uri *sip_uri = pjsip_uri_get_uri(uri); if (!sip_uri) { return &AST_PJ_STR_EMPTY; } return &sip_uri->host; } else if (PJSIP_URI_SCHEME_IS_TEL(uri)) { return &AST_PJ_STR_EMPTY; } return &AST_PJ_STR_EMPTY; } struct pjsip_param *ast_sip_pjsip_uri_get_other_param(pjsip_uri *uri, const pj_str_t *param_str) { if (ast_sip_is_uri_sip_sips(uri)) { pjsip_sip_uri *sip_uri = pjsip_uri_get_uri(uri); if (!sip_uri) { return NULL; } return pjsip_param_find(&sip_uri->other_param, param_str); } else if (PJSIP_URI_SCHEME_IS_TEL(uri)) { pjsip_tel_uri *tel_uri = pjsip_uri_get_uri(uri); if (!tel_uri) { return NULL; } return pjsip_param_find(&tel_uri->other_param, param_str); } return NULL; } /*! \brief Convert SIP hangup causes to Asterisk hangup causes */ const int ast_sip_hangup_sip2cause(int cause) { /* Possible values taken from causes.h */ switch(cause) { case 401: /* Unauthorized */ return AST_CAUSE_CALL_REJECTED; case 403: /* Not found */ return AST_CAUSE_CALL_REJECTED; case 404: /* Not found */ return AST_CAUSE_UNALLOCATED; case 405: /* Method not allowed */ return AST_CAUSE_INTERWORKING; case 407: /* Proxy authentication required */ return AST_CAUSE_CALL_REJECTED; case 408: /* No reaction */ return AST_CAUSE_NO_USER_RESPONSE; case 409: /* Conflict */ return AST_CAUSE_NORMAL_TEMPORARY_FAILURE; case 410: /* Gone */ return AST_CAUSE_NUMBER_CHANGED; case 411: /* Length required */ return AST_CAUSE_INTERWORKING; case 413: /* Request entity too large */ return AST_CAUSE_INTERWORKING; case 414: /* Request URI too large */ return AST_CAUSE_INTERWORKING; case 415: /* Unsupported media type */ return AST_CAUSE_INTERWORKING; case 420: /* Bad extension */ return AST_CAUSE_NO_ROUTE_DESTINATION; case 480: /* No answer */ return AST_CAUSE_NO_ANSWER; case 481: /* No answer */ return AST_CAUSE_INTERWORKING; case 482: /* Loop detected */ return AST_CAUSE_INTERWORKING; case 483: /* Too many hops */ return AST_CAUSE_NO_ANSWER; case 484: /* Address incomplete */ return AST_CAUSE_INVALID_NUMBER_FORMAT; case 485: /* Ambiguous */ return AST_CAUSE_UNALLOCATED; case 486: /* Busy everywhere */ return AST_CAUSE_BUSY; case 487: /* Request terminated */ return AST_CAUSE_INTERWORKING; case 488: /* No codecs approved */ return AST_CAUSE_BEARERCAPABILITY_NOTAVAIL; case 491: /* Request pending */ return AST_CAUSE_INTERWORKING; case 493: /* Undecipherable */ return AST_CAUSE_INTERWORKING; case 500: /* Server internal failure */ return AST_CAUSE_FAILURE; case 501: /* Call rejected */ return AST_CAUSE_FACILITY_REJECTED; case 502: return AST_CAUSE_DESTINATION_OUT_OF_ORDER; case 503: /* Service unavailable */ return AST_CAUSE_CONGESTION; case 504: /* Gateway timeout */ return AST_CAUSE_RECOVERY_ON_TIMER_EXPIRE; case 505: /* SIP version not supported */ return AST_CAUSE_INTERWORKING; case 600: /* Busy everywhere */ return AST_CAUSE_USER_BUSY; case 603: /* Decline */ return AST_CAUSE_CALL_REJECTED; case 604: /* Does not exist anywhere */ return AST_CAUSE_UNALLOCATED; case 606: /* Not acceptable */ return AST_CAUSE_BEARERCAPABILITY_NOTAVAIL; default: if (cause < 500 && cause >= 400) { /* 4xx class error that is unknown - someting wrong with our request */ return AST_CAUSE_INTERWORKING; } else if (cause < 600 && cause >= 500) { /* 5xx class error - problem in the remote end */ return AST_CAUSE_CONGESTION; } else if (cause < 700 && cause >= 600) { /* 6xx - global errors in the 4xx class */ return AST_CAUSE_INTERWORKING; } return AST_CAUSE_NORMAL; } /* Never reached */ return 0; } struct response_code_map { int code; const char *long_name; const char *short_name; }; /* * This map was generated from sip_msg.h with * * sed -n -r -e 's/^\s+(PJSIP_SC_([^ =]+))\s*=\s*[0-9]+,/{ \1, "\1", "\2" },/gp' \ * third-party/pjproject/source/pjsip/include/pjsip/sip_msg.h * */ static const struct response_code_map rc_map[] = { { PJSIP_SC_NULL, "PJSIP_SC_NULL", "NULL" }, { PJSIP_SC_TRYING, "PJSIP_SC_TRYING", "TRYING" }, { PJSIP_SC_RINGING, "PJSIP_SC_RINGING", "RINGING" }, { PJSIP_SC_CALL_BEING_FORWARDED, "PJSIP_SC_CALL_BEING_FORWARDED", "CALL_BEING_FORWARDED" }, { PJSIP_SC_QUEUED, "PJSIP_SC_QUEUED", "QUEUED" }, { PJSIP_SC_PROGRESS, "PJSIP_SC_PROGRESS", "PROGRESS" }, { PJSIP_SC_EARLY_DIALOG_TERMINATED, "PJSIP_SC_EARLY_DIALOG_TERMINATED", "EARLY_DIALOG_TERMINATED" }, { PJSIP_SC_OK, "PJSIP_SC_OK", "OK" }, { PJSIP_SC_ACCEPTED, "PJSIP_SC_ACCEPTED", "ACCEPTED" }, { PJSIP_SC_NO_NOTIFICATION, "PJSIP_SC_NO_NOTIFICATION", "NO_NOTIFICATION" }, { PJSIP_SC_MULTIPLE_CHOICES, "PJSIP_SC_MULTIPLE_CHOICES", "MULTIPLE_CHOICES" }, { PJSIP_SC_MOVED_PERMANENTLY, "PJSIP_SC_MOVED_PERMANENTLY", "MOVED_PERMANENTLY" }, { PJSIP_SC_MOVED_TEMPORARILY, "PJSIP_SC_MOVED_TEMPORARILY", "MOVED_TEMPORARILY" }, { PJSIP_SC_USE_PROXY, "PJSIP_SC_USE_PROXY", "USE_PROXY" }, { PJSIP_SC_ALTERNATIVE_SERVICE, "PJSIP_SC_ALTERNATIVE_SERVICE", "ALTERNATIVE_SERVICE" }, { PJSIP_SC_BAD_REQUEST, "PJSIP_SC_BAD_REQUEST", "BAD_REQUEST" }, { PJSIP_SC_UNAUTHORIZED, "PJSIP_SC_UNAUTHORIZED", "UNAUTHORIZED" }, { PJSIP_SC_PAYMENT_REQUIRED, "PJSIP_SC_PAYMENT_REQUIRED", "PAYMENT_REQUIRED" }, { PJSIP_SC_FORBIDDEN, "PJSIP_SC_FORBIDDEN", "FORBIDDEN" }, { PJSIP_SC_NOT_FOUND, "PJSIP_SC_NOT_FOUND", "NOT_FOUND" }, { PJSIP_SC_METHOD_NOT_ALLOWED, "PJSIP_SC_METHOD_NOT_ALLOWED", "METHOD_NOT_ALLOWED" }, { PJSIP_SC_NOT_ACCEPTABLE, "PJSIP_SC_NOT_ACCEPTABLE", "NOT_ACCEPTABLE" }, { PJSIP_SC_PROXY_AUTHENTICATION_REQUIRED, "PJSIP_SC_PROXY_AUTHENTICATION_REQUIRED", "PROXY_AUTHENTICATION_REQUIRED" }, { PJSIP_SC_REQUEST_TIMEOUT, "PJSIP_SC_REQUEST_TIMEOUT", "REQUEST_TIMEOUT" }, { PJSIP_SC_CONFLICT, "PJSIP_SC_CONFLICT", "CONFLICT" }, { PJSIP_SC_GONE, "PJSIP_SC_GONE", "GONE" }, { PJSIP_SC_LENGTH_REQUIRED, "PJSIP_SC_LENGTH_REQUIRED", "LENGTH_REQUIRED" }, { PJSIP_SC_CONDITIONAL_REQUEST_FAILED, "PJSIP_SC_CONDITIONAL_REQUEST_FAILED", "CONDITIONAL_REQUEST_FAILED" }, { PJSIP_SC_REQUEST_ENTITY_TOO_LARGE, "PJSIP_SC_REQUEST_ENTITY_TOO_LARGE", "REQUEST_ENTITY_TOO_LARGE" }, { PJSIP_SC_REQUEST_URI_TOO_LONG, "PJSIP_SC_REQUEST_URI_TOO_LONG", "REQUEST_URI_TOO_LONG" }, { PJSIP_SC_UNSUPPORTED_MEDIA_TYPE, "PJSIP_SC_UNSUPPORTED_MEDIA_TYPE", "UNSUPPORTED_MEDIA_TYPE" }, { PJSIP_SC_UNSUPPORTED_URI_SCHEME, "PJSIP_SC_UNSUPPORTED_URI_SCHEME", "UNSUPPORTED_URI_SCHEME" }, { PJSIP_SC_UNKNOWN_RESOURCE_PRIORITY, "PJSIP_SC_UNKNOWN_RESOURCE_PRIORITY", "UNKNOWN_RESOURCE_PRIORITY" }, { PJSIP_SC_BAD_EXTENSION, "PJSIP_SC_BAD_EXTENSION", "BAD_EXTENSION" }, { PJSIP_SC_EXTENSION_REQUIRED, "PJSIP_SC_EXTENSION_REQUIRED", "EXTENSION_REQUIRED" }, { PJSIP_SC_SESSION_TIMER_TOO_SMALL, "PJSIP_SC_SESSION_TIMER_TOO_SMALL", "SESSION_TIMER_TOO_SMALL" }, { PJSIP_SC_INTERVAL_TOO_BRIEF, "PJSIP_SC_INTERVAL_TOO_BRIEF", "INTERVAL_TOO_BRIEF" }, { PJSIP_SC_BAD_LOCATION_INFORMATION, "PJSIP_SC_BAD_LOCATION_INFORMATION", "BAD_LOCATION_INFORMATION" }, { PJSIP_SC_USE_IDENTITY_HEADER, "PJSIP_SC_USE_IDENTITY_HEADER", "USE_IDENTITY_HEADER" }, { PJSIP_SC_PROVIDE_REFERRER_HEADER, "PJSIP_SC_PROVIDE_REFERRER_HEADER", "PROVIDE_REFERRER_HEADER" }, { PJSIP_SC_FLOW_FAILED, "PJSIP_SC_FLOW_FAILED", "FLOW_FAILED" }, { PJSIP_SC_ANONIMITY_DISALLOWED, "PJSIP_SC_ANONIMITY_DISALLOWED", "ANONIMITY_DISALLOWED" }, { PJSIP_SC_BAD_IDENTITY_INFO, "PJSIP_SC_BAD_IDENTITY_INFO", "BAD_IDENTITY_INFO" }, { PJSIP_SC_UNSUPPORTED_CERTIFICATE, "PJSIP_SC_UNSUPPORTED_CERTIFICATE", "UNSUPPORTED_CERTIFICATE" }, { PJSIP_SC_INVALID_IDENTITY_HEADER, "PJSIP_SC_INVALID_IDENTITY_HEADER", "INVALID_IDENTITY_HEADER" }, { PJSIP_SC_FIRST_HOP_LACKS_OUTBOUND_SUPPORT, "PJSIP_SC_FIRST_HOP_LACKS_OUTBOUND_SUPPORT", "FIRST_HOP_LACKS_OUTBOUND_SUPPORT" }, { PJSIP_SC_MAX_BREADTH_EXCEEDED, "PJSIP_SC_MAX_BREADTH_EXCEEDED", "MAX_BREADTH_EXCEEDED" }, { PJSIP_SC_BAD_INFO_PACKAGE, "PJSIP_SC_BAD_INFO_PACKAGE", "BAD_INFO_PACKAGE" }, { PJSIP_SC_CONSENT_NEEDED, "PJSIP_SC_CONSENT_NEEDED", "CONSENT_NEEDED" }, { PJSIP_SC_TEMPORARILY_UNAVAILABLE, "PJSIP_SC_TEMPORARILY_UNAVAILABLE", "TEMPORARILY_UNAVAILABLE" }, { PJSIP_SC_CALL_TSX_DOES_NOT_EXIST, "PJSIP_SC_CALL_TSX_DOES_NOT_EXIST", "CALL_TSX_DOES_NOT_EXIST" }, { PJSIP_SC_LOOP_DETECTED, "PJSIP_SC_LOOP_DETECTED", "LOOP_DETECTED" }, { PJSIP_SC_TOO_MANY_HOPS, "PJSIP_SC_TOO_MANY_HOPS", "TOO_MANY_HOPS" }, { PJSIP_SC_ADDRESS_INCOMPLETE, "PJSIP_SC_ADDRESS_INCOMPLETE", "ADDRESS_INCOMPLETE" }, { PJSIP_SC_BUSY_HERE, "PJSIP_SC_BUSY_HERE", "BUSY_HERE" }, { PJSIP_SC_REQUEST_TERMINATED, "PJSIP_SC_REQUEST_TERMINATED", "REQUEST_TERMINATED" }, { PJSIP_SC_NOT_ACCEPTABLE_HERE, "PJSIP_SC_NOT_ACCEPTABLE_HERE", "NOT_ACCEPTABLE_HERE" }, { PJSIP_SC_BAD_EVENT, "PJSIP_SC_BAD_EVENT", "BAD_EVENT" }, { PJSIP_SC_REQUEST_UPDATED, "PJSIP_SC_REQUEST_UPDATED", "REQUEST_UPDATED" }, { PJSIP_SC_REQUEST_PENDING, "PJSIP_SC_REQUEST_PENDING", "REQUEST_PENDING" }, { PJSIP_SC_UNDECIPHERABLE, "PJSIP_SC_UNDECIPHERABLE", "UNDECIPHERABLE" }, { PJSIP_SC_SECURITY_AGREEMENT_NEEDED, "PJSIP_SC_SECURITY_AGREEMENT_NEEDED", "SECURITY_AGREEMENT_NEEDED" }, { PJSIP_SC_INTERNAL_SERVER_ERROR, "PJSIP_SC_INTERNAL_SERVER_ERROR", "INTERNAL_SERVER_ERROR" }, { PJSIP_SC_NOT_IMPLEMENTED, "PJSIP_SC_NOT_IMPLEMENTED", "NOT_IMPLEMENTED" }, { PJSIP_SC_BAD_GATEWAY, "PJSIP_SC_BAD_GATEWAY", "BAD_GATEWAY" }, { PJSIP_SC_SERVICE_UNAVAILABLE, "PJSIP_SC_SERVICE_UNAVAILABLE", "SERVICE_UNAVAILABLE" }, { PJSIP_SC_SERVER_TIMEOUT, "PJSIP_SC_SERVER_TIMEOUT", "SERVER_TIMEOUT" }, { PJSIP_SC_VERSION_NOT_SUPPORTED, "PJSIP_SC_VERSION_NOT_SUPPORTED", "VERSION_NOT_SUPPORTED" }, { PJSIP_SC_MESSAGE_TOO_LARGE, "PJSIP_SC_MESSAGE_TOO_LARGE", "MESSAGE_TOO_LARGE" }, { PJSIP_SC_PUSH_NOTIFICATION_SERVICE_NOT_SUPPORTED, "PJSIP_SC_PUSH_NOTIFICATION_SERVICE_NOT_SUPPORTED", "PUSH_NOTIFICATION_SERVICE_NOT_SUPPORTED" }, { PJSIP_SC_PRECONDITION_FAILURE, "PJSIP_SC_PRECONDITION_FAILURE", "PRECONDITION_FAILURE" }, { PJSIP_SC_BUSY_EVERYWHERE, "PJSIP_SC_BUSY_EVERYWHERE", "BUSY_EVERYWHERE" }, { PJSIP_SC_DECLINE, "PJSIP_SC_DECLINE", "DECLINE" }, { PJSIP_SC_DOES_NOT_EXIST_ANYWHERE, "PJSIP_SC_DOES_NOT_EXIST_ANYWHERE", "DOES_NOT_EXIST_ANYWHERE" }, { PJSIP_SC_NOT_ACCEPTABLE_ANYWHERE, "PJSIP_SC_NOT_ACCEPTABLE_ANYWHERE", "NOT_ACCEPTABLE_ANYWHERE" }, { PJSIP_SC_UNWANTED, "PJSIP_SC_UNWANTED", "UNWANTED" }, { PJSIP_SC_REJECTED, "PJSIP_SC_REJECTED", "REJECTED" }, }; int ast_sip_str2rc(const char *name) { int i; if (ast_strlen_zero(name)) { return -1; } for (i = 0; i < ARRAY_LEN(rc_map); i++) { if (strcasecmp(rc_map[i].short_name, name) == 0 || strcasecmp(rc_map[i].long_name, name) == 0) { return rc_map[i].code; } } return -1; } #ifdef TEST_FRAMEWORK AST_TEST_DEFINE(xml_sanitization_end_null) { char sanitized[8]; switch (cmd) { case TEST_INIT: info->name = "xml_sanitization_end_null"; info->category = "/res/res_pjsip/"; info->summary = "Ensure XML sanitization works as expected with a long string"; info->description = "This test sanitizes a string which exceeds the output\n" "buffer size. Once done the string is confirmed to be NULL terminated."; return AST_TEST_NOT_RUN; case TEST_EXECUTE: break; } ast_sip_sanitize_xml("aaaaaaaaaaaa", sanitized, sizeof(sanitized)); if (sanitized[7] != '\0') { ast_test_status_update(test, "Sanitized XML string is not null-terminated when it should be\n"); return AST_TEST_FAIL; } return AST_TEST_PASS; } AST_TEST_DEFINE(xml_sanitization_exceeds_buffer) { char sanitized[8]; switch (cmd) { case TEST_INIT: info->name = "xml_sanitization_exceeds_buffer"; info->category = "/res/res_pjsip/"; info->summary = "Ensure XML sanitization does not exceed buffer when output won't fit"; info->description = "This test sanitizes a string which before sanitization would\n" "fit within the output buffer. After sanitization, however, the string would\n" "exceed the buffer. Once done the string is confirmed to be NULL terminated."; return AST_TEST_NOT_RUN; case TEST_EXECUTE: break; } ast_sip_sanitize_xml("<><><>&", sanitized, sizeof(sanitized)); if (sanitized[7] != '\0') { ast_test_status_update(test, "Sanitized XML string is not null-terminated when it should be\n"); return AST_TEST_FAIL; } return AST_TEST_PASS; } #endif /*! * \internal * \brief Reload configuration within a PJSIP thread */ static int reload_configuration_task(void *obj) { ast_res_pjsip_reload_configuration(); ast_res_pjsip_init_options_handling(1); ast_sip_initialize_dns(); return 0; } static int unload_pjsip(void *data) { /* * These calls need the pjsip endpoint and serializer to clean up. * If they're not set, then there's nothing to clean up anyway. */ if (ast_pjsip_endpoint && sip_serializer_pool) { ast_res_pjsip_cleanup_options_handling(); ast_res_pjsip_cleanup_message_filter(); ast_sip_destroy_distributor(); ast_sip_destroy_transport_management(); ast_res_pjsip_destroy_configuration(); ast_sip_destroy_system(); ast_sip_destroy_global_headers(); ast_sip_unregister_service(&supplement_module); ast_sip_destroy_transport_events(); } if (monitor_thread) { stop_monitor_thread(); monitor_thread = NULL; } if (memory_pool) { /* This mimics the behavior of pj_pool_safe_release * which was introduced in pjproject 2.6. */ pj_pool_t *temp_pool = memory_pool; memory_pool = NULL; pj_pool_release(temp_pool); } ast_pjsip_endpoint = NULL; if (caching_pool.lock) { ast_pjproject_caching_pool_destroy(&caching_pool); } pj_shutdown(); return 0; } static int load_pjsip(void) { const unsigned int flags = 0; /* no port, no brackets */ pj_status_t status; /* The third parameter is just copied from * example code from PJLIB. This can be adjusted * if necessary. */ ast_pjproject_caching_pool_init(&caching_pool, NULL, 1024 * 1024); if (pjsip_endpt_create(&caching_pool.factory, "SIP", &ast_pjsip_endpoint) != PJ_SUCCESS) { ast_log(LOG_ERROR, "Failed to create PJSIP endpoint structure. Aborting load\n"); goto error; } /* PJSIP will automatically try to add a Max-Forwards header. Since we want to control that, * we need to stop PJSIP from doing it automatically */ remove_request_headers(ast_pjsip_endpoint); memory_pool = pj_pool_create(&caching_pool.factory, "SIP", 1024, 1024, NULL); if (!memory_pool) { ast_log(LOG_ERROR, "Failed to create memory pool for SIP. Aborting load\n"); goto error; } if (!pj_gethostip(pj_AF_INET(), &host_ip_ipv4)) { pj_sockaddr_print(&host_ip_ipv4, host_ip_ipv4_string, sizeof(host_ip_ipv4_string), flags); ast_verb(3, "Local IPv4 address determined to be: %s\n", host_ip_ipv4_string); } if (!pj_gethostip(pj_AF_INET6(), &host_ip_ipv6)) { pj_sockaddr_print(&host_ip_ipv6, host_ip_ipv6_string, sizeof(host_ip_ipv6_string), flags); ast_verb(3, "Local IPv6 address determined to be: %s\n", host_ip_ipv6_string); } pjsip_tsx_layer_init_module(ast_pjsip_endpoint); pjsip_ua_init_module(ast_pjsip_endpoint, NULL); monitor_continue = 1; status = pj_thread_create(memory_pool, "SIP", (pj_thread_proc *) &monitor_thread_exec, NULL, PJ_THREAD_DEFAULT_STACK_SIZE * 2, 0, &monitor_thread); if (status != PJ_SUCCESS) { ast_log(LOG_ERROR, "Failed to start SIP monitor thread. Aborting load\n"); goto error; } return AST_MODULE_LOAD_SUCCESS; error: return AST_MODULE_LOAD_DECLINE; } /* * This is a place holder function to ensure that pjmedia_strerr() is at * least directly referenced by this module to ensure that the loader * linker will link to the function. If a module only indirectly * references a function from another module, such as a callback parameter * to a function, the loader linker has been known to miss the link. */ void never_called_res_pjsip(void); void never_called_res_pjsip(void) { pjmedia_strerror(0, NULL, 0); } /* Definitions of media types declared "extern" in res_pjsip.h */ pjsip_media_type pjsip_media_type_application_json; pjsip_media_type pjsip_media_type_application_media_control_xml; pjsip_media_type pjsip_media_type_application_pidf_xml; pjsip_media_type pjsip_media_type_application_xpidf_xml; pjsip_media_type pjsip_media_type_application_cpim_xpidf_xml; pjsip_media_type pjsip_media_type_application_rlmi_xml; pjsip_media_type pjsip_media_type_application_simple_message_summary; pjsip_media_type pjsip_media_type_application_sdp; pjsip_media_type pjsip_media_type_multipart_alternative; pjsip_media_type pjsip_media_type_multipart_mixed; pjsip_media_type pjsip_media_type_multipart_related; pjsip_media_type pjsip_media_type_text_plain; static int load_module(void) { struct ast_threadpool_options options; /* pjproject and config_system need to be initialized before all else */ if (pj_init() != PJ_SUCCESS) { return AST_MODULE_LOAD_DECLINE; } if (pjlib_util_init() != PJ_SUCCESS) { goto error; } /* Register PJMEDIA error codes for SDP parsing errors */ if (pj_register_strerror(PJMEDIA_ERRNO_START, PJ_ERRNO_SPACE_SIZE, pjmedia_strerror) != PJ_SUCCESS) { ast_log(LOG_WARNING, "Failed to register pjmedia error codes. Codes will not be decoded.\n"); } /* Initialize common media types */ pjsip_media_type_init2(&pjsip_media_type_application_json, "application", "json"); pjsip_media_type_init2(&pjsip_media_type_application_media_control_xml, "application", "media_control+xml"); pjsip_media_type_init2(&pjsip_media_type_application_pidf_xml, "application", "pidf+xml"); pjsip_media_type_init2(&pjsip_media_type_application_xpidf_xml, "application", "xpidf+xml"); pjsip_media_type_init2(&pjsip_media_type_application_cpim_xpidf_xml, "application", "cpim-xpidf+xml"); pjsip_media_type_init2(&pjsip_media_type_application_rlmi_xml, "application", "rlmi+xml"); pjsip_media_type_init2(&pjsip_media_type_application_sdp, "application", "sdp"); pjsip_media_type_init2(&pjsip_media_type_application_simple_message_summary, "application", "simple-message-summary"); pjsip_media_type_init2(&pjsip_media_type_multipart_alternative, "multipart", "alternative"); pjsip_media_type_init2(&pjsip_media_type_multipart_mixed, "multipart", "mixed"); pjsip_media_type_init2(&pjsip_media_type_multipart_related, "multipart", "related"); pjsip_media_type_init2(&pjsip_media_type_text_plain, "text", "plain"); if (ast_sip_initialize_system()) { ast_log(LOG_ERROR, "Failed to initialize SIP 'system' configuration section. Aborting load\n"); goto error; } /* The serializer needs threadpool and threadpool needs pjproject to be initialized so it's next */ sip_get_threadpool_options(&options); options.thread_start = sip_thread_start; sip_threadpool = ast_threadpool_create("pjsip", NULL, &options); if (!sip_threadpool) { goto error; } sip_serializer_pool = ast_serializer_pool_create( "pjsip/default", SERIALIZER_POOL_SIZE, sip_threadpool, -1); if (!sip_serializer_pool) { ast_log(LOG_ERROR, "Failed to create SIP serializer pool. Aborting load\n"); goto error; } if (ast_sip_initialize_scheduler()) { ast_log(LOG_ERROR, "Failed to start scheduler. Aborting load\n"); goto error; } /* Now load all the pjproject infrastructure. */ if (load_pjsip()) { goto error; } if (ast_sip_initialize_transport_events()) { ast_log(LOG_ERROR, "Failed to initialize SIP transport monitor. Aborting load\n"); goto error; } ast_sip_initialize_dns(); ast_sip_initialize_global_headers(); if (ast_res_pjsip_preinit_options_handling()) { ast_log(LOG_ERROR, "Failed to pre-initialize OPTIONS handling. Aborting load\n"); goto error; } if (ast_res_pjsip_initialize_configuration()) { ast_log(LOG_ERROR, "Failed to initialize SIP configuration. Aborting load\n"); goto error; } ast_sip_initialize_resolver(); ast_sip_initialize_dns(); if (ast_sip_initialize_transport_management()) { ast_log(LOG_ERROR, "Failed to initialize SIP transport management. Aborting load\n"); goto error; } if (ast_sip_initialize_distributor()) { ast_log(LOG_ERROR, "Failed to register distributor module. Aborting load\n"); goto error; } if (ast_sip_register_service(&supplement_module)) { ast_log(LOG_ERROR, "Failed to initialize supplement hooks. Aborting load\n"); goto error; } if (ast_res_pjsip_init_options_handling(0)) { ast_log(LOG_ERROR, "Failed to initialize OPTIONS handling. Aborting load\n"); goto error; } /* * It is OK to prune the contacts now that * ast_res_pjsip_init_options_handling() has added the contact observer * of res/res_pjsip/pjsip_options.c to sorcery (to ensure that any * pruned contacts are removed from this module's data structure). */ ast_sip_location_prune_boot_contacts(); if (ast_res_pjsip_init_message_filter()) { ast_log(LOG_ERROR, "Failed to initialize message IP updating. Aborting load\n"); goto error; } ast_cli_register_multiple(cli_commands, ARRAY_LEN(cli_commands)); AST_TEST_REGISTER(xml_sanitization_end_null); AST_TEST_REGISTER(xml_sanitization_exceeds_buffer); return AST_MODULE_LOAD_SUCCESS; error: unload_pjsip(NULL); /* These functions all check for NULLs and are safe to call at any time */ ast_sip_destroy_scheduler(); ast_serializer_pool_destroy(sip_serializer_pool); ast_threadpool_shutdown(sip_threadpool); return AST_MODULE_LOAD_DECLINE; } static int reload_module(void) { /* * We must wait for the reload to complete so multiple * reloads cannot happen at the same time. */ if (ast_sip_push_task_wait_servant(NULL, reload_configuration_task, NULL)) { ast_log(LOG_WARNING, "Failed to reload PJSIP\n"); return -1; } return 0; } static int unload_module(void) { AST_TEST_UNREGISTER(xml_sanitization_end_null); AST_TEST_UNREGISTER(xml_sanitization_exceeds_buffer); ast_cli_unregister_multiple(cli_commands, ARRAY_LEN(cli_commands)); /* The thread this is called from cannot call PJSIP/PJLIB functions, * so we have to push the work to the threadpool to handle */ ast_sip_push_task_wait_servant(NULL, unload_pjsip, NULL); ast_sip_destroy_scheduler(); ast_serializer_pool_destroy(sip_serializer_pool); ast_threadpool_shutdown(sip_threadpool); return 0; } AST_MODULE_INFO(ASTERISK_GPL_KEY, AST_MODFLAG_GLOBAL_SYMBOLS | AST_MODFLAG_LOAD_ORDER, "Basic SIP resource", .support_level = AST_MODULE_SUPPORT_CORE, .load = load_module, .unload = unload_module, .reload = reload_module, .load_pri = AST_MODPRI_CHANNEL_DEPEND - 5, .requires = "dnsmgr,res_pjproject,res_sorcery_config,res_sorcery_memory,res_sorcery_astdb", .optional_modules = "res_geolocation,res_statsd", );