Update of /cvsroot/leaf/src/bering-uclibc4/source/siproxd
In directory
sfp-cvsdas-2.v30.ch3.sourceforge.com:/tmp/cvs-serv11633/source/siproxd
Added Files:
buildtool.cfg buildtool.mk siproxd-0.5.13.patch.gz
siproxd-0.5.13.tar.gz siproxd.conf siproxd.init
siproxd_passwd.cfg
Log Message:
Fixed siproxd, updated samba to 3.5.5
--- NEW FILE: siproxd.conf ---
#
# /etc/siproxd.conf - siproxd configuration file
#
# !! This is a sample file, adapt it to your needs before using it !!
#
# !! Strings MUST NOT contain spaces !!
#
######################################################################
# The interface names of INBOUND and OUTBOUND interface.
#
# If siproxd is not running on the host doing the masquerading
# but on a host within the private network segment, "in front" of
# the masquerading router: define if_inbound and if_outbound to
# point to the same interface (the inbound interface). In *addition*
# define 'host_outbound' to hold your external (public) IP address
# or a hostname that resolves to that address (use a dyndns address for
# example).
#
if_inbound = eth0
if_outbound = ppp0
# uncomment the following line ONLY IF YOU KNOW WHAT YOU ARE DOING!
# READ THE FAQ FIRST!
#host_outbound = 1.2.3.4
######################################################################
# Access control.
# Access lists in the form: IP/mask (ex. 10.0.0.1/24)
# Multiple entries may be separated by commas NO SPACES ARE ALLOWED!!
# Empty list means 'does not apply' - no filtering is done then.
# For *allow* lists this means: always allow, for *deny* lists that
# this means never deny.
#
# hosts_allow_reg: defines nets from which we accept registrations
# Registrations are *ONLY* allowed from INBOUND!
# hosts_allow_sip: defines nets from which we accept SIP traffic
# hosts_deny_sip: defines nets from which we deny SIP traffic
#
# - The deny list takes precedence over the allow lists.
# - The allow_reg list also implies allowance for sip.
#
# Example for usage:
# local private net -> allow_reg list
# external nets (from which we accept incoming calls) -> allow_sip
#
#hosts_allow_reg = 192.168.1.8/24
#hosts_allow_sip = 123.45.0.0/16,123.46.0.0/16
#hosts_deny_sip = 10.0.0.0/8,11.0.0.0/8
######################################################################
# Port to listen for incoming SIP messages.
# 5060 is usually the correct choice - don't change this unless you
# know what you're doing
#
sip_listen_port = 5060
######################################################################
# Shall we daemonize?
#
# Disabling this will break the debian init script
daemonize = 1
######################################################################
# What shall I log to syslog?
# 0 - DEBUGs, INFOs, WARNINGs and ERRORs
# 1 - INFOs, WARNINGs and ERRORs (this is the default)
# 2 - WARNINGs and ERRORs
# 3 - only ERRORs
# 4 - absolutely nothing (be careful - you will have no way to
# see what siproxd is doing - or NOT doing)
silence_log = 1
######################################################################
# Shall I log call establishment to syslog?
#
log_calls = 1
######################################################################
# Secure Enviroment settings:
# user: uid/gid to switch to after startup
# chrootjail: path to chroot to (chroot jail)
#user = nobody
#chrootjail = /var/lib/siproxd/
######################################################################
# Registration file:
# Where to store the current registrations.
# An empty value means we do not save registrations. Make sure that
# the specified directory path does exist!
registration_file = /var/lib/siproxd/siproxd_registrations
######################################################################
# Automatically save current registrations every 'n' seconds
#
autosave_registrations = 300
######################################################################
# PID file:
# Where to create the PID file.
# This file holds the PID of the main thread of siproxd.
# Let Debian init handle this
# pid_file = /var/run/siproxd/siproxd.pid
######################################################################
# global switch to control the RTP proxy behaviour
# 0 - RTP proxy disabled
# 1 - RTP proxy (UDP relay of siproxd)
#
# Note: IPCHAINS and IPTABLES(netfilter) support is no longer present!
#
# RECOMMENDED for users who are behind nats
rtp_proxy_enable = 1
######################################################################
# Port range to allocate listen ports from for incoming RTP traffic
# This should be a range that is not blocked by the firewall
#
rtp_port_low = 7070
rtp_port_high = 7079
######################################################################
# Timeout for RTP streams
# after this number of seconds, an RTP stream is considered dead
# and proxying for it will be stopped.
# Be aware that this timeout also applies to streams that are
# in HOLD.
#
rtp_timeout = 300
######################################################################
# DSCP value for sent RTP packets
# The Differentiated Service Code Point is a selector for
# router's per-hop behaviours.
# RFC2598 defined a "expedited forwarding" service. This service
# is designed to allow ISPs to offer a service with attributes
# similar to a "leased line". This service offers the ULTIMATE IN LOW
# LOSS, LOW LATENCY AND LOW JITTER by ensuring that there is always
# sufficent room in output queues for the contracted expedited forwarding
# traffic.
# The Expedited Forwarding service has a DSCP of 46.
# Putting a 0 here means that siproxd does NOT set the DSCP field.
# Siproxd must be started as root for this to work.
#
rtp_dscp = 46
######################################################################
# Default Expiration timeout for Registrations
# If a REGISTER request does not contain an Expires header
# or expires= parameter in the Contact header, this number of
# seconds will be used - and reported back to the UA in the answer.
#
default_expires = 600
######################################################################
# Proxy authentication
# If proxy_auth_realm is defined (a string), clients will be forced
# to authenticate themselfes at the proxy (for registration only).
# To disable Authentication, simply comment out this line.
#
#proxy_auth_realm = Authentication_Realm
#
# the (global) password to use (will be the same for all local clients)
#
#proxy_auth_passwd = password
#
# OR use individual per user passwords stored in a file
#
#proxy_auth_pwfile = /etc/siproxd_passwd.cfg
#
# 'proxy_auth_pwfile' has precedence over 'proxy_auth_passwd'
######################################################################
# Debug level... (setting to -1 will enable everything)
#
# DBCLASS_BABBLE 0x00000001 // babble (like entering/leaving func)
# DBCLASS_NET 0x00000002 // network
# DBCLASS_SIP 0x00000004 // SIP manipulations
# DBCLASS_REG 0x00000008 // Client registration
# DBCLASS_NOSPEC 0x00000010 // non specified class
# DBCLASS_PROXY 0x00000020 // proxy
# DBCLASS_DNS 0x00000040 // DNS stuff
# DBCLASS_NETTRAF 0x00000080 // network traffic
# DBCLASS_CONFIG 0x00000100 // configuration
# DBCLASS_RTP 0x00000200 // RTP proxy
# DBCLASS_ACCESS 0x00000400 // Access list evaluation
# DBCLASS_AUTH 0x00000800 // Authentication
#
debug_level = 0x00000000
######################################################################
# TCP debug port
#
# You may connect to this port from a remote machine and
# receive the debug output. This allows bettwer creation of
# odebug output on embedded systems that do not have enough
# memory for large disk files.
# Port number 0 means this feature is disabled.
#
debug_port = 0
######################################################################
# Mask feature (experimental)
#
# Some UAs will always use the host/ip they register with as
# host part in the registration record (which will be the inbound
# ip address / hostname of the proxy) and can not be told to use a
# different host part in the registration record (like sipphone, FWD,
# iptel, ...)
# This Mask feature allows to force such a UA to be masqueraded to
# use different host.
# -> Siemens SIP Phones seem to need this feature.
#
# Unles you really KNOW that you need this, don't enable it.
#
# mask_host=<inbound_ip/hostname>
# masked_host=<hostname_to_be_masqueraded_as>
#
# mask_host=10.0.1.1 -- inbound IP address of proxy
# masked_host=my.public.host -- outbound hostname proxy
######################################################################
# Outbound proxy
#
# Siproxd itself can be told to send all traffic to another
# outbound proxy.
# You can use this feature to 'chain' multiple siproxd proxies
# if you have several masquerading firewalls to cross.
#
# outbound_proxy_host = my.outboundproxy.org
# outbound_proxy_port = 5060
######################################################################
# Outbound proxy (Provider specific)
#
# Outbound proxies can be specified on a per-domain base.
# This allows to use an outbound proxy needed for ProviderA
# and none (or another) for ProviderB.
#
#outbound_domain_name = freenet.de
#outbound_domain_host = proxy.for.domain.freende.de
#outbound_domain_port = 5060
--- NEW FILE: siproxd.init ---
#! /bin/sh
# Modified for use with Siproxd by Dan Weber <[email protected]>
# Author: Miquel van Smoorenburg <[email protected]>.
# Ian Murdock <[email protected]>.
#
# You may remove the "Author" lines above and replace them
# with your own name if you copy and modify this script.
#
# Version: @(#)skeleton 1.9.4 21-Mar-2004 [email protected]
#
RCDLINKS="2,S20 3,S20 4,S20 5,S20 6,K20 0,K20 1,K20"
set -e
PATH=/sbin:/bin:/usr/sbin:/usr/bin
DAEMON=/usr/sbin/siproxd
NAME=siproxd
DESC="SIP proxy"
PIDFILE=/var/run/$NAME/$NAME.pid
SCRIPTNAME=/etc/init.d/$NAME
# Gracefully exit if the package has been removed.
test -x $DAEMON || exit 0
start()
{
echo -n "Starting $DESC: $NAME"
start-stop-daemon --start --quiet --pidfile $PIDFILE \
--exec $DAEMON -- -p $PIDFILE
echo "."
}
stop()
{
echo -n "Stopping $DESC: $NAME"
if test -e $PIDFILE; then
start-stop-daemon --stop --quiet --pidfile $PIDFILE
fi
echo "."
rm -f $PIDFILE
}
case "$1" in
start)
start
;;
stop)
stop
;;
restart|force-reload)
stop
start
;;
*)
echo "Usage: $SCRIPTNAME {start|stop|restart|force-reload}" >&2
exit 1
;;
esac
exit 0
--- NEW FILE: siproxd_passwd.cfg ---
######################################################################
#
# Per user password file for siproxd
# This must be enabled in the config file
#
# format is:
# <username> <password>
# username and password must not contains white spaces
#
######################################################################
user password
--- NEW FILE: siproxd-0.5.13.patch.gz ---
(This appears to be a binary file; contents omitted.)
--- NEW FILE: siproxd-0.5.13.tar.gz ---
(This appears to be a binary file; contents omitted.)
--- NEW FILE: buildtool.mk ---
#############################################################
#
# siproxd
#
# $Id: buildtool.mk,v 1.1 2010/09/18 15:33:44 nitr0man Exp $
#############################################################
include $(MASTERMAKEFILE)
SIPROXD_DIR:=siproxd-0.5.13
SIPROXD_TARGET_DIR:=$(BT_BUILD_DIR)/siproxd
$(SIPROXD_DIR)/.source:
zcat $(SIPROXD_SOURCE) | tar -xvf -
zcat $(SIPROXD_PATCH1) | patch -d $(SIPROXD_DIR) -p1
touch $(SIPROXD_DIR)/.source
$(SIPROXD_DIR)/.configured: $(SIPROXD_DIR)/.source
(cd $(SIPROXD_DIR); CC=$(TARGET_CC) LD=$(TARGET_LD)
CFLAGS="$(BT_COPT_FLAGS)" \
./configure --host=$(GNU_ARCH)-linux --build=$(GNU_ARCH)-linux \
--enable-fli4l-22-uclibc --with-extra-libs=$(BT_STAGING_DIR)/usr );
touch $(SIPROXD_DIR)/.configured
$(SIPROXD_DIR)/.build: $(SIPROXD_DIR)/.configured
mkdir -p $(SIPROXD_TARGET_DIR)
mkdir -p $(SIPROXD_TARGET_DIR)/usr/sbin
mkdir -p $(SIPROXD_TARGET_DIR)/etc/init.d
$(MAKE) -C $(SIPROXD_DIR) CC=$(TARGET_CC) LD=$(TARGET_LD)
-$(BT_STRIP) $(BT_STRIP_BINOPTS) $(SIPROXD_DIR)/src/siproxd
cp -a $(SIPROXD_DIR)/src/siproxd $(SIPROXD_TARGET_DIR)/usr/sbin
cp -a siproxd.init $(SIPROXD_TARGET_DIR)/etc/init.d/siproxd
cp -a siproxd_passwd.cfg $(SIPROXD_TARGET_DIR)/etc/
cp -a siproxd.conf $(SIPROXD_TARGET_DIR)/etc/
cp -a $(SIPROXD_TARGET_DIR)/* $(BT_STAGING_DIR)
touch $(SIPROXD_DIR)/.build
source: $(SIPROXD_DIR)/.source
build: $(SIPROXD_DIR)/.build
clean:
-rm $(SIPROXD_DIR)/.build
-$(MAKE) -C $(SIPROXD_DIR) clean
-rm -rf $(SIPROXD_TARGET_DIR)
srcclean:
rm -rf $(SIPROXD_DIR)
--- NEW FILE: buildtool.cfg ---
<File buildtool.mk>
Server = cvs4-sourceforge
Revision = HEAD
Directory = siproxd
</File>
<File siproxd-0.5.13.tar.gz>
Server = cvs4-sourceforge
envname = SIPROXD_SOURCE
Revision = HEAD
Directory = siproxd
</File>
<File siproxd-0.5.13.patch.gz>
Server = cvs4-sourceforge
envname = SIPROXD_PATCH1
Revision = HEAD
Directory = siproxd
</File>
<File siproxd_passwd.cfg>
Server = cvs4-sourceforge
Revision = HEAD
Directory = siproxd
</File>
<File siproxd.init>
Server = cvs4-sourceforge
Revision = HEAD
Directory = siproxd
</File>
<File siproxd.conf>
Server = cvs4-sourceforge
Revision = HEAD
Directory = siproxd
</File>
<Package>
<siproxd>
Version = 0.5.13
Revision = 1
Help <<EOF
Siproxd is a proxy/masquerading daemon for the SIP protocol.
It handles registration of SIP client on private IP network
and performs rewriting of the SIP message bodies to make SIP
connections work via a masquerading firewall (NAT)
Homepage: http://siproxd.sourceforge.net
Requires: lpthread.lrp
LEAF Package by __PACKAGER__, __BUILDDATE__
In the firewall rules you need to open UDP port 5060 to allow
incoming SIP traffic and UDP ports 7070-7079 (default port
range) to allow incoming RTP traffic
EOF
<Permissions>
Files = 644
Directories = 755
</Permissions>
<Owner>
Files = root:root
Directories = root:root
</Owner>
<Contents>
<File>
Source = usr/sbin/siproxd
Filename = usr/sbin/siproxd
Type = binary
Permissions = 755
</File>
<File>
Source = etc/init.d/siproxd
Filename = etc/init.d/siproxd
Type = binary
Permissions = 755
</File>
<File>
Source = etc/siproxd.conf
Filename = etc/siproxd.conf
Description = siproxd configuration
Type = binary
Type = local
Type = conf
Permissions = 644
</File>
<File>
Source = etc/siproxd_passwd.cfg
Filename = etc/siproxd_passwd.cfg
Description = siproxd password file
Type = binary
Type = conf
Type = local
Permissions = 600
</File>
<File>
Filename = var/lib/siproxd
Type = directory
</File>
<File>
Filename = var/run/siproxd
Type = directory
</File>
</Contents>
</siproxd>
</Package>
------------------------------------------------------------------------------
Start uncovering the many advantages of virtual appliances
and start using them to simplify application deployment and
accelerate your shift to cloud computing.
http://p.sf.net/sfu/novell-sfdev2dev
_______________________________________________
leaf-cvs-commits mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/leaf-cvs-commits