mirror of
				https://github.com/asterisk/asterisk.git
				synced 2025-10-31 02:37:10 +00:00 
			
		
		
		
	Fix support of OS's like openBSD that use an older nameser.h, this change reverts the defines to the older style which on other systems is found in nameser_compat.h Tested on openBSD 6.0, Debian 8 ASTERISK-26608 #close Change-Id: Iffb36caab8c5aa9dece0ce2d009041f7b56cc86a
		
			
				
	
	
		
			716 lines
		
	
	
		
			25 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			716 lines
		
	
	
		
			25 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Asterisk -- An open source telephony toolkit.
 | |
|  *
 | |
|  * Copyright (C) 2015, Digium, Inc.
 | |
|  *
 | |
|  * Joshua Colp <jcolp@digium.com>
 | |
|  *
 | |
|  * See http://www.asterisk.org for more information about
 | |
|  * the Asterisk project. Please do not directly contact
 | |
|  * any of the maintainers of this project for assistance;
 | |
|  * the project provides a web site, mailing lists and IRC
 | |
|  * channels for your use.
 | |
|  *
 | |
|  * This program is free software, distributed under the terms of
 | |
|  * the GNU General Public License Version 2. See the LICENSE file
 | |
|  * at the top of the source tree.
 | |
|  */
 | |
| 
 | |
| #include "asterisk.h"
 | |
| 
 | |
| #include <pjsip.h>
 | |
| #include <pjlib-util/errno.h>
 | |
| 
 | |
| #include <arpa/nameser.h>
 | |
| 
 | |
| #include "asterisk/astobj2.h"
 | |
| #include "asterisk/dns_core.h"
 | |
| #include "asterisk/dns_query_set.h"
 | |
| #include "asterisk/dns_srv.h"
 | |
| #include "asterisk/dns_naptr.h"
 | |
| #include "asterisk/res_pjsip.h"
 | |
| #include "include/res_pjsip_private.h"
 | |
| #include "asterisk/taskprocessor.h"
 | |
| #include "asterisk/threadpool.h"
 | |
| 
 | |
| #ifdef HAVE_PJSIP_EXTERNAL_RESOLVER
 | |
| 
 | |
| /*! \brief Structure which contains transport+port information for an active query */
 | |
| struct sip_target {
 | |
| 	/*! \brief The transport to be used */
 | |
| 	pjsip_transport_type_e transport;
 | |
| 	/*! \brief The port */
 | |
| 	int port;
 | |
| };
 | |
| 
 | |
| /*! \brief The vector used for current targets */
 | |
| AST_VECTOR(targets, struct sip_target);
 | |
| 
 | |
| /*! \brief Structure which keeps track of resolution */
 | |
| struct sip_resolve {
 | |
| 	/*! \brief Addresses currently being resolved, indexed based on index of queries in query set */
 | |
| 	struct targets resolving;
 | |
| 	/*! \brief Active queries */
 | |
| 	struct ast_dns_query_set *queries;
 | |
| 	/*! \brief Current viable server addresses */
 | |
| 	pjsip_server_addresses addresses;
 | |
| 	/*! \brief Serializer to run async callback into pjlib. */
 | |
| 	struct ast_taskprocessor *serializer;
 | |
| 	/*! \brief Callback to invoke upon completion */
 | |
| 	pjsip_resolver_callback *callback;
 | |
| 	/*! \brief User provided data */
 | |
| 	void *token;
 | |
| };
 | |
| 
 | |
| /*! \brief Our own defined transports, reduces the size of sip_available_transports */
 | |
| enum sip_resolver_transport {
 | |
| 	SIP_RESOLVER_TRANSPORT_UDP,
 | |
| 	SIP_RESOLVER_TRANSPORT_TCP,
 | |
| 	SIP_RESOLVER_TRANSPORT_TLS,
 | |
| 	SIP_RESOLVER_TRANSPORT_UDP6,
 | |
| 	SIP_RESOLVER_TRANSPORT_TCP6,
 | |
| 	SIP_RESOLVER_TRANSPORT_TLS6,
 | |
| };
 | |
| 
 | |
| /*! \brief Available transports on the system */
 | |
| static int sip_available_transports[] = {
 | |
| 	/* This is a list of transports with whether they are available as a valid transport
 | |
| 	 * stored. We use our own identifier as to reduce the size of sip_available_transports.
 | |
| 	 * As this array is only manipulated at startup it does not require a lock to protect
 | |
| 	 * it.
 | |
| 	 */
 | |
| 	[SIP_RESOLVER_TRANSPORT_UDP] = 0,
 | |
| 	[SIP_RESOLVER_TRANSPORT_TCP] = 0,
 | |
| 	[SIP_RESOLVER_TRANSPORT_TLS] = 0,
 | |
| 	[SIP_RESOLVER_TRANSPORT_UDP6] = 0,
 | |
| 	[SIP_RESOLVER_TRANSPORT_TCP6] = 0,
 | |
| 	[SIP_RESOLVER_TRANSPORT_TLS6] = 0,
 | |
| };
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Destroy resolution data
 | |
|  *
 | |
|  * \param data The resolution data to destroy
 | |
|  *
 | |
|  * \return Nothing
 | |
|  */
 | |
| static void sip_resolve_destroy(void *data)
 | |
| {
 | |
| 	struct sip_resolve *resolve = data;
 | |
| 
 | |
| 	AST_VECTOR_FREE(&resolve->resolving);
 | |
| 	ao2_cleanup(resolve->queries);
 | |
| 	ast_taskprocessor_unreference(resolve->serializer);
 | |
| }
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Check whether a transport is available or not
 | |
|  *
 | |
|  * \param transport The PJSIP transport type
 | |
|  *
 | |
|  * \return 1 success (transport is available)
 | |
|  * \return 0 failure (transport is not available)
 | |
|  */
 | |
| static int sip_transport_is_available(enum pjsip_transport_type_e transport)
 | |
| {
 | |
| 	enum sip_resolver_transport resolver_transport;
 | |
| 
 | |
| 	if (transport == PJSIP_TRANSPORT_UDP) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_UDP;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_TCP) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_TCP;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_TLS) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_TLS;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_UDP6) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_UDP6;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_TCP6) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_TCP6;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_TLS6) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_TLS6;
 | |
| 	} else {
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	return sip_available_transports[resolver_transport];
 | |
| }
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Add a query to be resolved
 | |
|  *
 | |
|  * \param resolve The ongoing resolution
 | |
|  * \param name What to resolve
 | |
|  * \param rr_type The type of record to look up
 | |
|  * \param rr_class The type of class to look up
 | |
|  * \param transport The transport to use for any resulting records
 | |
|  * \param port The port to use for any resulting records - if not specified the
 | |
|  *             default for the transport is used
 | |
|  *
 | |
|  * \retval 0 success
 | |
|  * \retval -1 failure
 | |
|  */
 | |
| static int sip_resolve_add(struct sip_resolve *resolve, const char *name, int rr_type, int rr_class, pjsip_transport_type_e transport, int port)
 | |
| {
 | |
| 	struct sip_target target = {
 | |
| 		.transport = transport,
 | |
| 		.port = port,
 | |
| 	};
 | |
| 
 | |
| 	if (!resolve->queries) {
 | |
| 		resolve->queries = ast_dns_query_set_create();
 | |
| 		if (!resolve->queries) {
 | |
| 			return -1;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if (!port) {
 | |
| 		target.port = pjsip_transport_get_default_port_for_type(transport);
 | |
| 	}
 | |
| 
 | |
| 	if (AST_VECTOR_APPEND(&resolve->resolving, target)) {
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	ast_debug(2, "[%p] Added target '%s' with record type '%d', transport '%s', and port '%d'\n",
 | |
| 		resolve, name, rr_type, pjsip_transport_get_type_name(transport), target.port);
 | |
| 
 | |
| 	return ast_dns_query_set_add(resolve->queries, name, rr_type, rr_class);
 | |
| }
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Task used to invoke the user specific callback
 | |
|  *
 | |
|  * \param data The complete resolution
 | |
|  *
 | |
|  * \return Nothing
 | |
|  */
 | |
| static int sip_resolve_invoke_user_callback(void *data)
 | |
| {
 | |
| 	struct sip_resolve *resolve = data;
 | |
| 
 | |
| 	if (DEBUG_ATLEAST(2)) {
 | |
| 		/* This includes space for the IP address, [, ], :, and the port */
 | |
| 		char addr[PJ_INET6_ADDRSTRLEN + 10];
 | |
| 		int idx;
 | |
| 
 | |
| 		for (idx = 0; idx < resolve->addresses.count; ++idx) {
 | |
| 			pj_sockaddr_print(&resolve->addresses.entry[idx].addr, addr, sizeof(addr), 3);
 | |
| 			ast_log(LOG_DEBUG, "[%p] Address '%d' is %s with transport '%s'\n",
 | |
| 				resolve, idx, addr,
 | |
| 				pjsip_transport_get_type_name(resolve->addresses.entry[idx].type));
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	ast_debug(2, "[%p] Invoking user callback with '%d' addresses\n", resolve, resolve->addresses.count);
 | |
| 	resolve->callback(resolve->addresses.count ? PJ_SUCCESS : PJLIB_UTIL_EDNSNOANSWERREC, resolve->token, &resolve->addresses);
 | |
| 
 | |
| 	ao2_ref(resolve, -1);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Handle a NAPTR record according to RFC3263
 | |
|  *
 | |
|  * \param resolve The ongoing resolution
 | |
|  * \param record The NAPTR record itself
 | |
|  * \param service The service to look for
 | |
|  * \param transport The transport to use for resulting queries
 | |
|  *
 | |
|  * \retval 0 success
 | |
|  * \retval -1 failure (record not handled / supported)
 | |
|  */
 | |
| static int sip_resolve_handle_naptr(struct sip_resolve *resolve, const struct ast_dns_record *record,
 | |
| 	const char *service, pjsip_transport_type_e transport)
 | |
| {
 | |
| 	if (strcasecmp(ast_dns_naptr_get_service(record), service)) {
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	/* It is possible for us to receive an explicit transport that is already IPv6, in that case
 | |
| 	 * we can't turn it into an IPv6 transport and check. If it's not IPv6 though we need to check
 | |
| 	 * for both IPv4 and IPv6 as PJSIP does not provide enough differentiation to know that we
 | |
| 	 * want only IPv4.
 | |
| 	 */
 | |
| 	if (!sip_transport_is_available(transport) &&
 | |
| 		(!(transport & PJSIP_TRANSPORT_IPV6) && !sip_transport_is_available(transport + PJSIP_TRANSPORT_IPV6))) {
 | |
| 		ast_debug(2, "[%p] NAPTR service %s skipped as transport is unavailable\n",
 | |
| 			resolve, service);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (strcasecmp(ast_dns_naptr_get_flags(record), "s")) {
 | |
| 		ast_debug(2, "[%p] NAPTR service %s received with unsupported flags '%s'\n",
 | |
| 			resolve, service, ast_dns_naptr_get_flags(record));
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (ast_strlen_zero(ast_dns_naptr_get_replacement(record))) {
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	return sip_resolve_add(resolve, ast_dns_naptr_get_replacement(record), T_SRV, C_IN,
 | |
| 		transport, 0);
 | |
| }
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Query set callback function, invoked when all queries have completed
 | |
|  *
 | |
|  * \param query_set The completed query set
 | |
|  *
 | |
|  * \return Nothing
 | |
|  */
 | |
| static void sip_resolve_callback(const struct ast_dns_query_set *query_set)
 | |
| {
 | |
| 	struct sip_resolve *resolve = ast_dns_query_set_get_data(query_set);
 | |
| 	struct ast_dns_query_set *queries = resolve->queries;
 | |
| 	struct targets resolving;
 | |
| 	int idx, address_count = 0, have_naptr = 0, have_srv = 0;
 | |
| 	unsigned short order = 0;
 | |
| 	int strict_order = 0;
 | |
| 
 | |
| 	ast_debug(2, "[%p] All parallel queries completed\n", resolve);
 | |
| 
 | |
| 	resolve->queries = NULL;
 | |
| 
 | |
| 	/* This purposely steals the resolving list so we can add entries to the new one in
 | |
| 	 * the same loop and also have access to the old.
 | |
| 	 */
 | |
| 	resolving = resolve->resolving;
 | |
| 	AST_VECTOR_INIT(&resolve->resolving, 0);
 | |
| 
 | |
| 	/* The order of queries is what defines the preference order for the records within
 | |
| 	 * this specific query set. The preference order overall is defined as a result of
 | |
| 	 * drilling down from other records. Each completed query set replaces the results
 | |
| 	 * of the last.
 | |
| 	 */
 | |
| 	for (idx = 0; idx < ast_dns_query_set_num_queries(queries); ++idx) {
 | |
| 		struct ast_dns_query *query = ast_dns_query_set_get(queries, idx);
 | |
| 		struct ast_dns_result *result = ast_dns_query_get_result(query);
 | |
| 		struct sip_target *target;
 | |
| 		const struct ast_dns_record *record;
 | |
| 
 | |
| 		if (!result) {
 | |
| 			ast_debug(2, "[%p] No result information for target '%s' of type '%d'\n", resolve,
 | |
| 				ast_dns_query_get_name(query), ast_dns_query_get_rr_type(query));
 | |
| 			continue;
 | |
| 		}
 | |
| 
 | |
| 		target = AST_VECTOR_GET_ADDR(&resolving, idx);
 | |
| 		for (record = ast_dns_result_get_records(result); record; record = ast_dns_record_get_next(record)) {
 | |
| 
 | |
| 			if (ast_dns_record_get_rr_type(record) == T_A ||
 | |
| 				ast_dns_record_get_rr_type(record) == T_AAAA) {
 | |
| 				/* If NAPTR or SRV records exist the subsequent results from them take preference */
 | |
| 				if (have_naptr || have_srv) {
 | |
| 					ast_debug(2, "[%p] %s record being skipped on target '%s' because NAPTR or SRV record exists\n",
 | |
| 						resolve, ast_dns_record_get_rr_type(record) == T_A ? "A" : "AAAA",
 | |
| 						ast_dns_query_get_name(query));
 | |
| 					continue;
 | |
| 				}
 | |
| 
 | |
| 				/* PJSIP has a fixed maximum number of addresses that can exist, so limit ourselves to that */
 | |
| 				if (address_count == PJSIP_MAX_RESOLVED_ADDRESSES) {
 | |
| 					break;
 | |
| 				}
 | |
| 
 | |
| 				resolve->addresses.entry[address_count].type = target->transport;
 | |
| 
 | |
| 				/* Populate address information for the new address entry */
 | |
| 				if (ast_dns_record_get_rr_type(record) == T_A) {
 | |
| 					ast_debug(2, "[%p] A record received on target '%s'\n", resolve, ast_dns_query_get_name(query));
 | |
| 					resolve->addresses.entry[address_count].addr_len = sizeof(pj_sockaddr_in);
 | |
| 					pj_sockaddr_init(pj_AF_INET(), &resolve->addresses.entry[address_count].addr, NULL,
 | |
| 						target->port);
 | |
| 					resolve->addresses.entry[address_count].addr.ipv4.sin_addr = *(struct pj_in_addr*)ast_dns_record_get_data(record);
 | |
| 				} else {
 | |
| 					ast_debug(2, "[%p] AAAA record received on target '%s'\n", resolve, ast_dns_query_get_name(query));
 | |
| 					resolve->addresses.entry[address_count].addr_len = sizeof(pj_sockaddr_in6);
 | |
| 					pj_sockaddr_init(pj_AF_INET6(), &resolve->addresses.entry[address_count].addr, NULL,
 | |
| 						target->port);
 | |
| 					pj_memcpy(&resolve->addresses.entry[address_count].addr.ipv6.sin6_addr, ast_dns_record_get_data(record),
 | |
| 						ast_dns_record_get_data_size(record));
 | |
| 				}
 | |
| 
 | |
| 				address_count++;
 | |
| 			} else if (ast_dns_record_get_rr_type(record) == T_SRV) {
 | |
| 				if (have_naptr) {
 | |
| 					ast_debug(2, "[%p] SRV record being skipped on target '%s' because NAPTR record exists\n",
 | |
| 						resolve, ast_dns_query_get_name(query));
 | |
| 					continue;
 | |
| 				}
 | |
| 
 | |
| 				/* SRV records just create new queries for AAAA+A, nothing fancy */
 | |
| 				ast_debug(2, "[%p] SRV record received on target '%s'\n", resolve, ast_dns_query_get_name(query));
 | |
| 
 | |
| 				/* If an explicit IPv6 target transport has been requested look for only AAAA records */
 | |
| 				if (target->transport & PJSIP_TRANSPORT_IPV6) {
 | |
| 					sip_resolve_add(resolve, ast_dns_srv_get_host(record), T_AAAA, C_IN, target->transport,
 | |
| 						ast_dns_srv_get_port(record));
 | |
| 					have_srv = 1;
 | |
| 				} else if (sip_transport_is_available(target->transport + PJSIP_TRANSPORT_IPV6)) {
 | |
| 					sip_resolve_add(resolve, ast_dns_srv_get_host(record), T_AAAA, C_IN, target->transport + PJSIP_TRANSPORT_IPV6,
 | |
| 						ast_dns_srv_get_port(record));
 | |
| 					have_srv = 1;
 | |
| 				}
 | |
| 
 | |
| 				if (!(target->transport & PJSIP_TRANSPORT_IPV6) &&
 | |
| 					sip_transport_is_available(target->transport)) {
 | |
| 					sip_resolve_add(resolve, ast_dns_srv_get_host(record), T_A, C_IN, target->transport,
 | |
| 						ast_dns_srv_get_port(record));
 | |
| 					have_srv = 1;
 | |
| 				}
 | |
| 			} else if (ast_dns_record_get_rr_type(record) == T_NAPTR) {
 | |
| 				int added = -1;
 | |
| 
 | |
| 				ast_debug(2, "[%p] NAPTR record received on target '%s'\n", resolve, ast_dns_query_get_name(query));
 | |
| 
 | |
| 				if (strict_order && (ast_dns_naptr_get_order(record) != order)) {
 | |
| 					ast_debug(2, "[%p] NAPTR record skipped because order '%hu' does not match strict order '%hu'\n",
 | |
| 						resolve, ast_dns_naptr_get_order(record), order);
 | |
| 					continue;
 | |
| 				}
 | |
| 
 | |
| 				if (target->transport == PJSIP_TRANSPORT_UNSPECIFIED || target->transport == PJSIP_TRANSPORT_UDP ||
 | |
| 					target->transport == PJSIP_TRANSPORT_UDP6) {
 | |
| 					added = sip_resolve_handle_naptr(resolve, record, "sip+d2u",
 | |
| 						target->transport == PJSIP_TRANSPORT_UNSPECIFIED ? PJSIP_TRANSPORT_UDP : target->transport);
 | |
| 				}
 | |
| 				if (target->transport == PJSIP_TRANSPORT_UNSPECIFIED || target->transport == PJSIP_TRANSPORT_TCP ||
 | |
| 					target->transport == PJSIP_TRANSPORT_TCP6) {
 | |
| 					added = sip_resolve_handle_naptr(resolve, record, "sip+d2t",
 | |
| 						target->transport == PJSIP_TRANSPORT_UNSPECIFIED ? PJSIP_TRANSPORT_TCP : target->transport);
 | |
| 				}
 | |
| 				if (target->transport == PJSIP_TRANSPORT_UNSPECIFIED || target->transport == PJSIP_TRANSPORT_TLS ||
 | |
| 					target->transport == PJSIP_TRANSPORT_TLS6) {
 | |
| 					added = sip_resolve_handle_naptr(resolve, record, "sips+d2t",
 | |
| 						target->transport == PJSIP_TRANSPORT_UNSPECIFIED ? PJSIP_TRANSPORT_TLS : target->transport);
 | |
| 				}
 | |
| 
 | |
| 				/* If this record was successfully handled then we need to limit ourselves to this order */
 | |
| 				if (!added) {
 | |
| 					have_naptr = 1;
 | |
| 					strict_order = 1;
 | |
| 					order = ast_dns_naptr_get_order(record);
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	/* Update the server addresses count, this is not limited as it can never exceed the max allowed */
 | |
| 	resolve->addresses.count = address_count;
 | |
| 
 | |
| 	/* Free the vector we stole as we are responsible for it */
 | |
| 	AST_VECTOR_FREE(&resolving);
 | |
| 
 | |
| 	/* If additional queries were added start the resolution process again */
 | |
| 	if (resolve->queries) {
 | |
| 		ast_debug(2, "[%p] New queries added, performing parallel resolution again\n", resolve);
 | |
| 		ast_dns_query_set_resolve_async(resolve->queries, sip_resolve_callback, resolve);
 | |
| 		ao2_ref(queries, -1);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	ast_debug(2, "[%p] Resolution completed - %d viable targets\n", resolve, resolve->addresses.count);
 | |
| 
 | |
| 	/* Push a task to invoke the callback, we do this so it is guaranteed to run in a PJSIP thread */
 | |
| 	ao2_ref(resolve, +1);
 | |
| 	if (ast_sip_push_task(resolve->serializer, sip_resolve_invoke_user_callback, resolve)) {
 | |
| 		ao2_ref(resolve, -1);
 | |
| 	}
 | |
| 
 | |
| 	ao2_ref(queries, -1);
 | |
| }
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Determine what address family a host may be if it is already an IP address
 | |
|  *
 | |
|  * \param host The host (which may be an IP address)
 | |
|  *
 | |
|  * \retval 6 The host is an IPv6 address
 | |
|  * \retval 4 The host is an IPv4 address
 | |
|  * \retval 0 The host is not an IP address
 | |
|  */
 | |
| static int sip_resolve_get_ip_addr_ver(const pj_str_t *host)
 | |
| {
 | |
| 	pj_in_addr dummy;
 | |
| 	pj_in6_addr dummy6;
 | |
| 
 | |
| 	if (pj_inet_aton(host, &dummy) > 0) {
 | |
| 		return 4;
 | |
| 	}
 | |
| 
 | |
| 	if (pj_inet_pton(pj_AF_INET6(), host, &dummy6) == PJ_SUCCESS) {
 | |
| 		return 6;
 | |
| 	}
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Perform SIP resolution of a host
 | |
|  *
 | |
|  * \param resolver Configured resolver instance
 | |
|  * \param pool Memory pool to allocate things from
 | |
|  * \param target The target we are resolving
 | |
|  * \param token User data to pass to the resolver callback
 | |
|  * \param cb User resolver callback to invoke upon resolution completion
 | |
|  */
 | |
| static void sip_resolve(pjsip_resolver_t *resolver, pj_pool_t *pool, const pjsip_host_info *target,
 | |
| 	void *token, pjsip_resolver_callback *cb)
 | |
| {
 | |
| 	int ip_addr_ver;
 | |
| 	pjsip_transport_type_e type = target->type;
 | |
| 	struct sip_resolve *resolve;
 | |
| 	char host[NI_MAXHOST];
 | |
| 	int res = 0;
 | |
| 
 | |
| 	ast_copy_pj_str(host, &target->addr.host, sizeof(host));
 | |
| 
 | |
| 	ast_debug(2, "Performing SIP DNS resolution of target '%s'\n", host);
 | |
| 
 | |
| 	/* If the provided target is already an address don't bother resolving */
 | |
| 	ip_addr_ver = sip_resolve_get_ip_addr_ver(&target->addr.host);
 | |
| 
 | |
| 	/* Determine the transport to use if none has been explicitly specified */
 | |
| 	if (type == PJSIP_TRANSPORT_UNSPECIFIED) {
 | |
| 		/* If we've been told to use a secure or reliable transport restrict ourselves to that */
 | |
| #if PJ_HAS_TCP
 | |
| 		if (target->flag & PJSIP_TRANSPORT_SECURE) {
 | |
| 			type = PJSIP_TRANSPORT_TLS;
 | |
| 		} else if (target->flag & PJSIP_TRANSPORT_RELIABLE) {
 | |
| 			type = PJSIP_TRANSPORT_TCP;
 | |
| 		} else
 | |
| #endif
 | |
| 		/* According to the RFC otherwise if an explicit IP address OR an explicit port is specified
 | |
| 		 * we use UDP
 | |
| 		 */
 | |
| 		if (ip_addr_ver || target->addr.port) {
 | |
| 			type = PJSIP_TRANSPORT_UDP;
 | |
| 		}
 | |
| 
 | |
| 		if (ip_addr_ver == 6) {
 | |
| 			type = (pjsip_transport_type_e)((int) type + PJSIP_TRANSPORT_IPV6);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	ast_debug(2, "Transport type for target '%s' is '%s'\n", host, pjsip_transport_get_type_name(type));
 | |
| 
 | |
| 	/* If it's already an address call the callback immediately */
 | |
| 	if (ip_addr_ver) {
 | |
| 		pjsip_server_addresses addresses = {
 | |
| 			.entry[0].type = type,
 | |
| 			.count = 1,
 | |
| 		};
 | |
| 
 | |
| 		if (ip_addr_ver == 4) {
 | |
| 			addresses.entry[0].addr_len = sizeof(pj_sockaddr_in);
 | |
| 			pj_sockaddr_init(pj_AF_INET(), &addresses.entry[0].addr, NULL, 0);
 | |
| 			pj_inet_aton(&target->addr.host, &addresses.entry[0].addr.ipv4.sin_addr);
 | |
| 		} else {
 | |
| 			addresses.entry[0].addr_len = sizeof(pj_sockaddr_in6);
 | |
| 			pj_sockaddr_init(pj_AF_INET6(), &addresses.entry[0].addr, NULL, 0);
 | |
| 			pj_inet_pton(pj_AF_INET6(), &target->addr.host, &addresses.entry[0].addr.ipv6.sin6_addr);
 | |
| 		}
 | |
| 
 | |
| 		pj_sockaddr_set_port(&addresses.entry[0].addr, !target->addr.port ? pjsip_transport_get_default_port_for_type(type) : target->addr.port);
 | |
| 
 | |
| 		ast_debug(2, "Target '%s' is an IP address, skipping resolution\n", host);
 | |
| 
 | |
| 		cb(PJ_SUCCESS, token, &addresses);
 | |
| 
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	resolve = ao2_alloc_options(sizeof(*resolve), sip_resolve_destroy, AO2_ALLOC_OPT_LOCK_NOLOCK);
 | |
| 	if (!resolve) {
 | |
| 		cb(PJ_ENOMEM, token, NULL);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	resolve->callback = cb;
 | |
| 	resolve->token = token;
 | |
| 
 | |
| 	if (AST_VECTOR_INIT(&resolve->resolving, 4)) {
 | |
| 		ao2_ref(resolve, -1);
 | |
| 		cb(PJ_ENOMEM, token, NULL);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	ast_debug(2, "[%p] Created resolution tracking for target '%s'\n", resolve, host);
 | |
| 
 | |
| 	/* If no port has been specified we can do NAPTR + SRV */
 | |
| 	if (!target->addr.port) {
 | |
| 		char srv[NI_MAXHOST];
 | |
| 
 | |
| 		/* When resolving addresses PJSIP can request an explicit transport type. It will explicitly
 | |
| 		 * request an IPv6 transport if a message has been tagged to use an explicitly IPv6 transport.
 | |
| 		 * For other cases it can be left unspecified OR an explicit non-IPv6 transport can be requested.
 | |
| 		 * In the case where a non-IPv6 transport is requested there is no way to differentiate between
 | |
| 		 * a transport being requested as part of a SIP URI (sip:test.com;transport=tcp) and a message
 | |
| 		 * being tagged with a specific IPv4 transport. In this case we look for both IPv4 and IPv6 addresses.
 | |
| 		 * If a message has been tagged with a specific IPv4 transport the IPv6 addresses will simply
 | |
| 		 * be discarded. The code below and elsewhere handles the case where we know they requested IPv6
 | |
| 		 * explicitly and only looks for IPv6 records.
 | |
| 		 */
 | |
| 
 | |
| 		res |= sip_resolve_add(resolve, host, T_NAPTR, C_IN, type, 0);
 | |
| 
 | |
| 		if (type == PJSIP_TRANSPORT_UNSPECIFIED ||
 | |
| 			(type == PJSIP_TRANSPORT_TLS && sip_transport_is_available(PJSIP_TRANSPORT_TLS)) ||
 | |
| 			(type == PJSIP_TRANSPORT_TLS6 && sip_transport_is_available(PJSIP_TRANSPORT_TLS6))) {
 | |
| 			snprintf(srv, sizeof(srv), "_sips._tcp.%s", host);
 | |
| 			res |= sip_resolve_add(resolve, srv, T_SRV, C_IN,
 | |
| 				type == PJSIP_TRANSPORT_UNSPECIFIED ? PJSIP_TRANSPORT_TLS : type, 0);
 | |
| 		}
 | |
| 		if (type == PJSIP_TRANSPORT_UNSPECIFIED ||
 | |
| 			(type == PJSIP_TRANSPORT_TCP && sip_transport_is_available(PJSIP_TRANSPORT_TCP)) ||
 | |
| 			(type == PJSIP_TRANSPORT_TCP6 && sip_transport_is_available(PJSIP_TRANSPORT_TCP6))) {
 | |
| 			snprintf(srv, sizeof(srv), "_sip._tcp.%s", host);
 | |
| 			res |= sip_resolve_add(resolve, srv, T_SRV, C_IN,
 | |
| 				type == PJSIP_TRANSPORT_UNSPECIFIED ? PJSIP_TRANSPORT_TCP : type, 0);
 | |
| 		}
 | |
| 		if (type == PJSIP_TRANSPORT_UNSPECIFIED ||
 | |
| 			(type == PJSIP_TRANSPORT_UDP && sip_transport_is_available(PJSIP_TRANSPORT_UDP)) ||
 | |
| 			(type == PJSIP_TRANSPORT_UDP6 && sip_transport_is_available(PJSIP_TRANSPORT_UDP6))) {
 | |
| 			snprintf(srv, sizeof(srv), "_sip._udp.%s", host);
 | |
| 			res |= sip_resolve_add(resolve, srv, T_SRV, C_IN,
 | |
| 				type == PJSIP_TRANSPORT_UNSPECIFIED ? PJSIP_TRANSPORT_UDP : type, 0);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if ((type == PJSIP_TRANSPORT_UNSPECIFIED && sip_transport_is_available(PJSIP_TRANSPORT_UDP6)) ||
 | |
| 		sip_transport_is_available(type + PJSIP_TRANSPORT_IPV6)) {
 | |
| 		res |= sip_resolve_add(resolve, host, T_AAAA, C_IN, (type == PJSIP_TRANSPORT_UNSPECIFIED ? PJSIP_TRANSPORT_UDP6 : type + PJSIP_TRANSPORT_IPV6), target->addr.port);
 | |
| 	}
 | |
| 
 | |
| 	if ((type == PJSIP_TRANSPORT_UNSPECIFIED && sip_transport_is_available(PJSIP_TRANSPORT_UDP)) ||
 | |
| 		sip_transport_is_available(type)) {
 | |
| 		res |= sip_resolve_add(resolve, host, T_A, C_IN, (type == PJSIP_TRANSPORT_UNSPECIFIED ? PJSIP_TRANSPORT_UDP : type), target->addr.port);
 | |
| 	}
 | |
| 
 | |
| 	if (res) {
 | |
| 		ao2_ref(resolve, -1);
 | |
| 		cb(PJ_ENOMEM, token, NULL);
 | |
| 		return;
 | |
| 	}
 | |
| 	if (!resolve->queries) {
 | |
| 		ast_debug(2, "[%p] No resolution queries for target '%s'\n", resolve, host);
 | |
| 		ao2_ref(resolve, -1);
 | |
| 		cb(PJLIB_UTIL_EDNSNOANSWERREC, token, NULL);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	resolve->serializer = ao2_bump(ast_threadpool_serializer_get_current());
 | |
| 
 | |
| 	ast_debug(2, "[%p] Starting initial resolution using parallel queries for target '%s'\n", resolve, host);
 | |
| 	ast_dns_query_set_resolve_async(resolve->queries, sip_resolve_callback, resolve);
 | |
| 
 | |
| 	ao2_ref(resolve, -1);
 | |
| }
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Determine if a specific transport is configured on the system
 | |
|  *
 | |
|  * \param pool A memory pool to allocate things from
 | |
|  * \param transport The type of transport to check
 | |
|  * \param name A friendly name to print in the verbose message
 | |
|  *
 | |
|  * \return Nothing
 | |
|  */
 | |
| static void sip_check_transport(pj_pool_t *pool, pjsip_transport_type_e transport, const char *name)
 | |
| {
 | |
| 	pjsip_tpmgr_fla2_param prm;
 | |
| 	enum sip_resolver_transport resolver_transport;
 | |
| 
 | |
| 	pjsip_tpmgr_fla2_param_default(&prm);
 | |
| 	prm.tp_type = transport;
 | |
| 
 | |
| 	if (transport == PJSIP_TRANSPORT_UDP) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_UDP;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_TCP) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_TCP;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_TLS) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_TLS;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_UDP6) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_UDP6;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_TCP6) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_TCP6;
 | |
| 	} else if (transport == PJSIP_TRANSPORT_TLS6) {
 | |
| 		resolver_transport = SIP_RESOLVER_TRANSPORT_TLS6;
 | |
| 	} else {
 | |
| 		ast_verb(2, "'%s' is an unsupported SIP transport\n", name);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	if (pjsip_tpmgr_find_local_addr2(pjsip_endpt_get_tpmgr(ast_sip_get_pjsip_endpoint()),
 | |
| 		pool, &prm) == PJ_SUCCESS) {
 | |
| 		ast_verb(2, "'%s' is an available SIP transport\n", name);
 | |
| 		sip_available_transports[resolver_transport] = 1;
 | |
| 	} else {
 | |
| 		ast_verb(2, "'%s' is not an available SIP transport, disabling resolver support for it\n",
 | |
| 			name);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| /*! \brief External resolver implementation for PJSIP */
 | |
| static pjsip_ext_resolver resolver = {
 | |
| 	.resolve = sip_resolve,
 | |
| };
 | |
| 
 | |
| /*!
 | |
|  * \internal
 | |
|  * \brief Task to determine available transports and set ourselves an external resolver
 | |
|  *
 | |
|  * \retval 0 success
 | |
|  * \retval -1 failure
 | |
|  */
 | |
| static int sip_replace_resolver(void *data)
 | |
| {
 | |
| 	pj_pool_t *pool;
 | |
| 
 | |
| 
 | |
| 	pool = pjsip_endpt_create_pool(ast_sip_get_pjsip_endpoint(), "Transport Availability", 256, 256);
 | |
| 	if (!pool) {
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	/* Determine what transports are available on the system */
 | |
| 	sip_check_transport(pool, PJSIP_TRANSPORT_UDP, "UDP+IPv4");
 | |
| 	sip_check_transport(pool, PJSIP_TRANSPORT_TCP, "TCP+IPv4");
 | |
| 	sip_check_transport(pool, PJSIP_TRANSPORT_TLS, "TLS+IPv4");
 | |
| 	sip_check_transport(pool, PJSIP_TRANSPORT_UDP6, "UDP+IPv6");
 | |
| 	sip_check_transport(pool, PJSIP_TRANSPORT_TCP6, "TCP+IPv6");
 | |
| 	sip_check_transport(pool, PJSIP_TRANSPORT_TLS6, "TLS+IPv6");
 | |
| 
 | |
| 	pjsip_endpt_release_pool(ast_sip_get_pjsip_endpoint(), pool);
 | |
| 
 | |
| 	/* Replace the PJSIP resolver with our own implementation */
 | |
| 	pjsip_endpt_set_ext_resolver(ast_sip_get_pjsip_endpoint(), &resolver);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| void ast_sip_initialize_resolver(void)
 | |
| {
 | |
| 	/* Replace the existing PJSIP resolver with our own implementation */
 | |
| 	ast_sip_push_task_synchronous(NULL, sip_replace_resolver, NULL);
 | |
| }
 | |
| 
 | |
| #else
 | |
| 
 | |
| void ast_sip_initialize_resolver(void)
 | |
| {
 | |
| 	/* External resolver support does not exist in the version of PJSIP in use */
 | |
| 	ast_log(LOG_NOTICE, "The version of PJSIP in use does not support external resolvers, using PJSIP provided resolver\n");
 | |
| }
 | |
| 
 | |
| #endif
 |