Branch: refs/heads/master
  Home:   https://github.com/OpenSIPS/opensips
  Commit: d3a0aaa5ef73f0f2b03c4f6ba32b5484ca0d71f7
      
https://github.com/OpenSIPS/opensips/commit/d3a0aaa5ef73f0f2b03c4f6ba32b5484ca0d71f7
  Author: Bogdan-Andrei Iancu <bog...@opensips.org>
  Date:   2019-02-26 (Tue, 26 Feb 2019)

  Changed paths:
    M modules/tm/t_cancel.c
    M modules/tm/t_reply.c
    M modules/tm/uac.c

  Log Message:
  -----------
  Proper/additional check of tcp_no_new_conn_bflag

Check the tcp_no_new_conn_bflag (to avoid opening TCP conns) when:
* sending a cancel to an invite (which was marked)
* sending a negative ACK to an invite (which was marked)
* sending an local UAC request (marked via local route)


  Commit: 3ed54196a41823ba288b5dceac200dee33d47df7
      
https://github.com/OpenSIPS/opensips/commit/3ed54196a41823ba288b5dceac200dee33d47df7
  Author: Bogdan-Andrei Iancu <bog...@opensips.org>
  Date:   2019-02-26 (Tue, 26 Feb 2019)

  Changed paths:
    M cfg.lex
    M cfg.y
    M forward.c
    M globals.h
    M modules/tm/t_reply.c
    M net/net_tcp.c

  Log Message:
  -----------
  Added new tcp_no_new_conn_rplflag to control TCP conns

While tcp_no_new_conn_bflag controls the opening of TCP conns on the UAC 
branches side of the transaction, the new tcp_no_new_conn_rplflag does the some 
kind of controling but on the UAS side of transaction (sending back the replies)


Compare: 
https://github.com/OpenSIPS/opensips/compare/738905d2fc73...3ed54196a418

_______________________________________________
Devel mailing list
Devel@lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/devel

Reply via email to