Glad it worked!

On Thu, Apr 25, 2024 at 5:30 PM Tristan Ferreira <[email protected]>
wrote:

> Hi,
> Thank your command helped me to find the problem (typo).
> I thougt i used it and had no result but not.
> Best regards.
> Le 25/04/2024 à 17:18, Antonio a écrit :
>
> anton@intel:/etc/kamailio$ sudo kamailio -c kamailio.cfg
> Listening on
>              udp: 127.0.0.1:5060
>              udp: 192.168.0.143:5060
>              udp: 172.17.0.1:5060
>              udp: 172.18.0.1:5060
>              tcp: 127.0.0.1:5060
>              tcp: 192.168.0.143:5060
>              tcp: 172.17.0.1:5060
>              tcp: 172.18.0.1:5060
> Aliases:
>              tcp: intel:5060
>              tcp: localhost:5060
>              udp: intel:5060
>              udp: localhost:5060
>
> config file ok, exiting...
>
> Description: Debian GNU/Linux 11 (bullseye)
> Release: 11
> Codename: bullseye
>
> On Thu, Apr 25, 2024 at 4:43 PM Tristan Ferreira via sr-users <
> [email protected]> wrote:
>
>> Hi,
>>
>> I am trying to learn Kamailio to set up a SIP/RTP proxy for WebRTC with
>> FreeSWITCH, and I wanted to use this configuration file template as a
>> starting point.
>> (Source: https://github.com/havfo/WEBRTC-to-SIP)
>>
>> But i have the error : *ERROR: [core/ppcfg.c:275]:
>> pp_ifdef_level_error(): different number of preprocessor directives: 1 more
>> #!if[n]def as #!endif*
>>
>> I don't understand because I checked and everything seems okay with the
>> if/endif statements to me.
>>
>> # grep '#!ifndef' kamailio.cfg | wc -l
>> 2
>> # grep '#!ifdef' kamailio.cfg | wc -l
>> 49
>> # grep '#!endif' kamailio.cfg | wc -l
>> 51
>>
>> And it's ok for chat gpt too :
>>
>> #!ifdef : 49 occurrences
>> #!ifndef : 2 occurrences
>> Total (#!ifdef and #!ifndef) : 51 occurrences
>> #!endif : 51 occurrences
>> Is there a problem with the parser or a compatibility problem (i am on 
>> *5.6.3*) ?
>>
>> #!KAMAILIO
>> #
>>
>> #!define WITH_MYSQL
>> #!define WITH_AUTH
>> #!define WITH_USRLOCDB
>> #!define WITH_TLS
>> #!define WITH_HOMER
>> #!define WITH_WEBSOCKETS
>> #!define WITH_ANTIFLOOD
>> #!define WITH_IPV6
>> ##!define WITH_BRIDGE_ON_FAIL
>> #!define WITH_LOCALHOST_WS
>> ##!define WITH_LOCALHOST_SIP
>>
>> #!substdef "!MY_SIP_PORT!5060!g"
>> #!substdef "!MY_SIPS_PORT!5061!g"
>> #!substdef "!MY_WS_PORT!8080!g"
>> #!substdef "!MY_WSS_PORT!4443!g"
>>
>> #!substdef "!MY_IP4_ADDR!XXXXX-XXXXX!g"
>> #!substdef "!IP4_LOCALHOST!127.0.0.1!g"
>> #!substdef "!MY_WS4_ADDR!tcp:MY_IP4_ADDR:MY_WS_PORT!g"
>> #!substdef "!MY_WSS4_ADDR!tls:MY_IP4_ADDR:MY_WSS_PORT!g"
>> #!substdef "!LOCALHOST_WS4_ADDR!tcp:IP4_LOCALHOST:MY_WS_PORT!g"
>> #!substdef "!LOCALHOST_WSS4_ADDR!tls:IP4_LOCALHOST:MY_WSS_PORT!g"
>>
>> #!ifdef WITH_IPV6
>>     #!substdef "!MY_IP6_ADDR![XXXXXX-XXXXXX]!g"
>>     #!substdef "!IP6_LOCALHOST![::1]!g"
>>     #!substdef "!MY_WS6_ADDR!tcp:MY_IP6_ADDR:MY_WS_PORT!g"
>>     #!substdef "!MY_WSS6_ADDR!tls:MY_IP6_ADDR:MY_WSS_PORT!g"
>>     #!substdef "!LOCALHOST_WS6_ADDR!tcp:IP6_LOCALHOST:MY_WS_PORT!g"
>>     #!substdef "!LOCALHOST_WSS6_ADDR!tls:IP6_LOCALHOST:MY_WSS_PORT!g"
>> #!endif
>>
>> #!substdef "!MY_DOMAIN!XXXX-XXXX!g"
>>
>> # *** Value defines - IDs used later in config
>> #!ifdef WITH_MYSQL
>>     # - database URL - used to connect to database server by modules such
>>     #                 as: auth_db, acc, usrloc, a.s.o.
>>     #!ifndef DBURL
>>         #!define DBURL "mysql://kamailio:kamailiorw@localhost/kamailio"
>>     #!endif
>> #!endif
>>
>> # - flags
>> #     FLT_ - per transaction (message) flags
>> #    FLB_ - per branch flags
>> #!define FLT_NATS 5
>>
>> #!define FLB_NATB 6
>> #!define FLB_NATSIPPING 7
>> #!define FLB_RTPWS 8
>> #!define FLB_IPV6 9
>> #!define FLB_V4V6 10
>> #!define FLB_BRIDGE 11
>>
>> ####### Global Parameters #########
>>
>> ### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR
>> #!ifdef WITH_DEBUG
>>     debug=4
>>     log_stderror=no
>> #!else
>>     debug=2
>>     log_stderror=no
>> #!endif
>>
>> memdbg=5
>> memlog=5
>>
>> log_facility=LOG_LOCAL0
>>
>> fork=yes
>> children=4
>>
>> port=MY_SIP_PORT
>> tls_port_no=MY_SIPS_PORT
>>
>> #!ifdef WITH_TLS
>>     enable_tls=yes
>> #!endif
>>
>>
>> listen=MY_IP4_ADDR
>> #!ifdef WITH_LOCALHOST_SIP
>>     listen=IP4_LOCALHOST
>> #!endif
>> #!ifdef WITH_IPV6
>>     listen=MY_IP6_ADDR
>>     #!ifdef WITH_LOCALHOST_SIP
>>         listen=IP6_LOCALHOST
>>     #!endif
>> #!endif
>>
>> #!ifdef WITH_WEBSOCKETS
>>     listen=MY_WS4_ADDR
>>     #!ifdef WITH_LOCALHOST_WS
>>         listen=LOCALHOST_WS4_ADDR
>>     #!endif
>>     #!ifdef WITH_IPV6
>>         listen=MY_WS6_ADDR
>>         #!ifdef WITH_LOCALHOST_WS
>>             listen=LOCALHOST_WS6_ADDR
>>         #!endif
>>     #!endif
>>     #!ifdef WITH_TLS
>>         listen=MY_WSS4_ADDR
>>         #!ifdef WITH_LOCALHOST_WS
>>             listen=LOCALHOST_WSS4_ADDR
>>         #!endif
>>         #!ifdef WITH_IPV6
>>             listen=MY_WSS6_ADDR
>>             #!ifdef WITH_LOCALHOST_WS
>>                 listen=LOCALHOST_WSS6_ADDR
>>             #!endif
>>         #!endif
>>     #!endif
>> #!endif
>>
>> use_dns_cache = on                   # Use KAMAILIO internal DNS cache
>> use_dns_failover = on                # Depends on KAMAILIO internal DNS cache
>> dns_srv_loadbalancing = on           #
>> dns_try_naptr = on                   #
>> dns_retr_time=1                      # Time in seconds before retrying a DNS 
>> request
>> dns_retr_no=3                                # Number of DNS retransmissions 
>> before giving up
>>
>> # Set protocol preference order - ignore target priority
>> dns_naptr_ignore_rfc= yes             # Ignore target NAPTR priority
>> dns_tls_pref=50                      # First priority: TLS
>> dns_tcp_pref=30                      # Second priority: TCP
>> dns_udp_pref=10                      # Third priority: UDP
>>
>> tcp_connection_lifetime=3604
>> tcp_accept_no_cl=yes
>> tcp_rd_buf_size=16384
>>
>>
>> # set paths to location of modules (to sources or installation folders)
>> #!ifdef WITH_SRCPATH
>>     mpath="modules/"
>> #!else
>>     mpath="/usr/lib/x86_64-linux-gnu/kamailio/modules/"
>> #!endif
>>
>> #!ifdef WITH_MYSQL
>>     loadmodule "db_mysql.so"
>> #!endif
>>
>> loadmodule "kex.so"
>> loadmodule "corex.so"
>> loadmodule "tm.so"
>> loadmodule "tmx.so"
>> loadmodule "sl.so"
>> loadmodule "rr.so"
>> loadmodule "pv.so"
>> loadmodule "maxfwd.so"
>> loadmodule "usrloc.so"
>> loadmodule "registrar.so"
>> loadmodule "textops.so"
>> loadmodule "siputils.so"
>> loadmodule "xlog.so"
>> loadmodule "sanity.so"
>> loadmodule "ctl.so"
>> loadmodule "cfg_rpc.so"
>> loadmodule "sdpops.so"
>> loadmodule "textopsx.so"
>>
>> #!ifdef WITH_AUTH
>>     loadmodule "auth.so"
>>     loadmodule "auth_db.so"
>>     #!ifdef WITH_IPAUTH
>>         loadmodule "permissions.so"
>>     #!endif
>> #!endif
>>
>> #!ifdef WITH_PRESENCE
>>     loadmodule "presence.so"
>>     loadmodule "presence_xml.so"
>> #!endif
>>
>> #!ifdef WITH_TLS
>>     loadmodule "tls.so"
>> #!endif
>>
>> #!ifdef WITH_HOMER
>>     loadmodule "siptrace.so"
>> #!endif
>>
>> #!ifdef WITH_WEBSOCKETS
>>     loadmodule "xhttp.so"
>>     loadmodule "websocket.so"
>>     loadmodule "nathelper.so"
>>     loadmodule "rtpengine.so"
>> #!endif
>>
>> #!ifdef WITH_ANTIFLOOD
>>     loadmodule "htable.so"
>>     loadmodule "pike.so"
>> #!endif
>>
>> #!ifdef WITH_DEBUG
>>     loadmodule "debugger.so"
>> #!endif
>>
>> # ----------------- setting module-specific parameters ---------------
>>
>>
>> # ----- rr params -----
>> # add value to ;lr param to cope with most of the UAs
>> modparam("rr", "enable_full_lr", 1)
>> # do not append from tag to the RR (no need for this script)
>> modparam("rr", "append_fromtag", 0)
>>
>>
>> # ----- registrar params -----
>> modparam("registrar", "method_filtering", 1)
>> # max value for expires of registrations
>> modparam("registrar", "max_expires", 3600)
>>
>>
>> # ----- usrloc params -----
>> /* enable DB persistency for location entries */
>> #!ifdef WITH_USRLOCDB
>>     modparam("usrloc", "db_url", DBURL)
>>     modparam("usrloc", "db_mode", 2)
>> #!endif
>>
>>
>> # ----- auth_db params -----
>> #!ifdef WITH_AUTH
>>     modparam("auth_db", "db_url", DBURL)
>>     modparam("auth_db", "calculate_ha1", 1)
>>     modparam("auth_db", "password_column", "password")
>>     modparam("auth_db", "load_credentials", "")
>> #!endif
>>
>> #!ifdef WITH_PRESENCE
>>     # ----- presence params -----
>>     modparam("presence", "db_url", DBURL)
>>
>>     # ----- presence_xml params -----
>>     modparam("presence_xml", "db_url", DBURL)
>>     modparam("presence_xml", "force_active", 1)
>> #!endif
>>
>>
>> ##!ifdef WITH_NAT
>>     # ----- rtpproxy params -----
>>     modparam("rtpengine", "rtpengine_sock", "udp:127.0.0.1:22222")
>>     modparam("rtpengine", "extra_id_pv", "$avp(extra_id)")
>>
>>     # ----- nathelper params -----
>>     modparam("nathelper", "natping_interval", 30)
>>     modparam("nathelper", "ping_nated_only", 1)
>>     modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
>>     modparam("nathelper", "sipping_from", "sip:pinger@XXXX-XXXX")
>>     modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)")
>>     modparam("usrloc", "nat_bflag", FLB_NATB)
>> ##!endif
>>
>> # ----- corex params -----
>> modparam("corex", "alias_subdomains", "MY_DOMAIN")
>>
>> #!ifdef WITH_TLS
>>     # ----- tls params -----
>>     modparam("tls", "config", "/etc/kamailio/tls.cfg")
>>     modparam("tls", "tls_force_run", 1)
>> #!endif
>>
>> #!ifdef WITH_WEBSOCKETS
>>     modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)")
>> #!endif
>>
>> #!ifdef WITH_HOMER
>>     #Siptrace
>>     modparam("siptrace", "duplicate_uri", "sip:127.0.0.1:9060")
>>     modparam("siptrace", "hep_mode_on", 1)
>>     modparam("siptrace", "trace_to_database", 0)
>>     modparam("siptrace", "trace_flag", 22)
>>     modparam("siptrace", "trace_on", 1)
>> #!endif
>>
>> #!ifdef WITH_ANTIFLOOD
>>     # ----- pike params -----
>>     modparam("pike", "sampling_time_unit", 2)
>>     modparam("pike", "reqs_density_per_unit", 16)
>>     modparam("pike", "remove_latency", 4)
>>
>>     # ----- htable params -----
>>     # ip ban htable with autoexpire after 5 minutes
>>     modparam("htable", "htable", "ipban=>size=8;autoexpire=300;")
>> #!endif
>>
>> #!ifdef WITH_DEBUG
>>     # ----- debugger params -----
>>     modparam("debugger", "cfgtrace", 1)
>> #!endif
>>
>> ####### Routing Logic ########
>> request_route {
>>     #!ifdef WITH_HOMER
>>          # start duplicate the SIP message here
>>          sip_trace();
>>          setflag(22);
>>     #!endif
>>
>>      # per request initial checks
>>      route(REQINIT);
>>
>>      xlog("L_INFO", "START: $rm from $fu (IP:$si:$sp)\n");
>>
>>     #!ifdef WITH_WEBSOCKETS
>>          if (nat_uac_test(64)) {
>>                  # Do NAT traversal stuff for requests from a WebSocket
>>                  # connection - even if it is not behind a NAT!
>>                  # This won't be needed in the future if Kamailio and the
>>                  # WebSocket client support Outbound and Path.
>>                  force_rport();
>>                  if (is_method("REGISTER")) {
>>                          fix_nated_register();
>>                  } else if (!add_contact_alias()) {
>>                          xlog("L_ERR", "Error aliasing contact <$ct>\n");
>>                          sl_send_reply("400", "Bad Request");
>>                          exit;
>>                  }
>>          }
>>     #!endif
>>
>>      # NAT detection
>>      route(NATDETECT);
>>
>>      # CANCEL processing
>>      if (is_method("CANCEL")) {
>>              if (t_check_trans()) {
>>                      route(RELAY);
>>              }
>>              exit;
>>      }
>>
>>      # handle requests within SIP dialogs
>>      route(WITHINDLG);
>>
>>      ### only initial requests (no To tag)
>>
>>      t_check_trans();
>>
>>      # authentication
>>      route(AUTH);
>>
>>      # record routing for dialog forming requests (in case they are routed)
>>      # - remove preloaded route headers
>>      remove_hf("Route");
>>      if (is_method("INVITE|SUBSCRIBE")) {
>>              record_route();
>>      }
>>
>>      # dispatch requests to foreign domains
>>      route(SIPOUT);
>>
>>      ### requests for my local domains
>>
>>      # handle presence related requests
>>      route(PRESENCE);
>>
>>      # handle registrations
>>      route(REGISTRAR);
>>
>>      if ($rU == $null) {
>>              # request with no Username in RURI
>>              sl_send_reply("484","Address Incomplete");
>>              exit;
>>      }
>>
>>      # user location service
>>      route(LOCATION);
>> }
>>
>> # Wrapper for relaying requests
>> route[RELAY] {
>>      # enable additional event routes for forwarded requests
>>      # - serial forking, RTP relaying handling, a.s.o.
>>      if (is_method("INVITE|BYE|SUBSCRIBE|UPDATE")) {
>>              if (!t_is_set("branch_route")) {
>>                      t_on_branch("MANAGE_BRANCH");
>>              }
>>      }
>>
>>      if (is_method("INVITE|SUBSCRIBE|UPDATE")) {
>>              if (!t_is_set("onreply_route")) {
>>                      t_on_reply("MANAGE_REPLY");
>>              }
>>      }
>>
>>      if (is_method("INVITE")) {
>>              if (!t_is_set("failure_route")) {
>>                      t_on_failure("MANAGE_FAILURE");
>>              }
>>      }
>>
>>      if (!t_relay()) {
>>              sl_reply_error();
>>      }
>>      exit;
>> }
>>
>> # Per SIP request initial checks
>> route[REQINIT] {
>>     #!ifdef WITH_ANTIFLOOD
>>          # flood dection from same IP and traffic ban for a while
>>          # be sure you exclude checking trusted peers, such as pstn gateways
>>          # - local host excluded (e.g., loop to self)
>>          if (src_ip != myself) {
>>                  if ($sht(ipban=>$si) != $null) {
>>                          # ip is already blocked
>>                          xdbg("request from blocked IP - $rm from $fu 
>> (IP:$si:$sp)\n");
>>                          exit;
>>                  }
>>
>>                  if (!pike_check_req()) {
>>                          xlog("L_ALERT","ALERT: pike blocking $rm from $fu 
>> (IP:$si:$sp)\n");
>>                          $sht(ipban=>$si) = 1;
>>                          exit;
>>                  }
>>          }
>>     #!endif
>>
>>      if (!mf_process_maxfwd_header("10")) {
>>              sl_send_reply("483","Too Many Hops");
>>              exit;
>>      }
>>
>>      if (!sanity_check("1511", "7")) {
>>              xlog("Malformed SIP message from $si:$sp\n");
>>              exit;
>>      }
>> }
>>
>> # Handle requests within SIP dialogs
>> route[WITHINDLG] {
>>      if (has_totag()) {
>>              # sequential request withing a dialog should
>>              # take the path determined by record-routing
>>              if (loose_route()) {
>>             #!ifdef WITH_WEBSOCKETS
>>                          if ($du == "") {
>>                                  if (!handle_ruri_alias()) {
>>                                          xlog("L_ERR", "Bad alias <$ru>\n");
>>                                          sl_send_reply("400", "Bad Request");
>>                                          exit;
>>                                  }
>>                          }
>>             #!endif
>>                      route(DLGURI);
>>                      if (is_method("ACK")) {
>>                              # ACK is forwarded statelessy
>>                              route(NATMANAGE);
>>                      } else if (is_method("NOTIFY")) {
>>                              # Add Record-Route for in-dialog NOTIFY as per 
>> RFC 6665.
>>                              record_route();
>>                      }
>>                      route(RELAY);
>>              } else {
>>                      if (is_method("SUBSCRIBE") && uri == myself) {
>>                              # in-dialog subscribe requests
>>                              route(PRESENCE);
>>                              exit;
>>                      }
>>                      if (is_method("ACK")) {
>>                              if (t_check_trans()) {
>>                                      # no loose-route, but stateful ACK;
>>                                      # must be an ACK after a 487
>>                                      # or e.g. 404 from upstream server
>>                                      route(RELAY);
>>                                      exit;
>>                              } else {
>>                                      # ACK without matching transaction ... 
>> ignore and discard
>>                                      exit;
>>                              }
>>                      }
>>                      sl_send_reply("404","Not here");
>>              }
>>              exit;
>>      }
>> }
>>
>> # Handle SIP registrations
>> route[REGISTRAR] {
>>      if (is_method("REGISTER")) {
>>              if (isflagset(FLT_NATS)) {
>>                      setbflag(FLB_NATB);
>>                      # uncomment next line to do SIP NAT pinging
>>                      ## setbflag(FLB_NATSIPPING);
>>              }
>>
>>         #!ifdef WITH_IPV6
>>                  if (af == INET6) {
>>                          setbflag(FLB_IPV6);
>>                  }
>>         #!endif
>>
>>              if (!save("location")) {
>>                      sl_reply_error();
>>              }
>>
>>              exit;
>>      }
>> }
>>
>> # USER location service
>> route[LOCATION] {
>>      if (!lookup("location")) {
>>              $var(rc) = $rc;
>>              t_newtran();
>>              switch ($var(rc)) {
>>                      case -1:
>>                      case -3:
>>                              send_reply("404", "Not Found");
>>                              exit;
>>                      case -2:
>>                              send_reply("405", "Method Not Allowed");
>>                              exit;
>>              }
>>      }
>>
>>      route(RELAY);
>>      exit;
>> }
>>
>> # Presence server route
>> route[PRESENCE] {
>>      if (!is_method("PUBLISH|SUBSCRIBE")) {
>>              return;
>>      }
>>
>>      if (is_method("SUBSCRIBE") && $hdr(Event) == "message-summary") {
>>              # returns here if no voicemail server is configured
>>              sl_send_reply("404", "No voicemail service");
>>              exit;
>>      }
>>
>>     #!ifdef WITH_PRESENCE
>>          if (!t_newtran()) {
>>                  sl_reply_error();
>>                  exit;
>>          }
>>
>>          if (is_method("PUBLISH")) {
>>                  handle_publish();
>>                  t_release();
>>          } else if (is_method("SUBSCRIBE")) {
>>                  handle_subscribe();
>>                  t_release();
>>          }
>>          exit;
>>     #!endif
>>
>>      # if presence enabled, this part will not be executed
>>      if (is_method("PUBLISH") || $rU == $null) {
>>              sl_send_reply("404", "Not here");
>>              exit;
>>      }
>>      return;
>> }
>>
>> # Authentication route
>> route[AUTH] {
>>     #!ifdef WITH_AUTH
>>          if (is_method("REGISTER") || from_uri == myself) {
>>                  # authenticate requests
>>                  if (!auth_check("$fd", "subscriber", "1")) {
>>                          auth_challenge("$fd", "0");
>>                          exit;
>>                  }
>>                  # user authenticated - remove auth header
>>                  if (!is_method("REGISTER|PUBLISH")) {
>>                          consume_credentials();
>>                  }
>>          }
>>          # if caller is not local subscriber, then check if it calls
>>          # a local destination, otherwise deny, not an open relay here
>>          if (from_uri != myself && uri != myself) {
>>                  sl_send_reply("403","Not relaying");
>>                  exit;
>>          }
>>     #!endif
>>      return;
>> }
>>
>> # Caller NAT detection route
>> route[NATDETECT] {
>>     #!ifdef WITH_IPV6
>>          if(af==INET6) {
>>                  return;
>>          }
>>     #!endif
>>
>>      force_rport();
>>      if (nat_uac_test("19")) {
>>              if (is_method("REGISTER")) {
>>                      fix_nated_register();
>>              } else if (is_first_hop()) {
>>                      set_contact_alias();
>>              }
>>              setflag(FLT_NATS);
>>      }
>>      return;
>> }
>>
>> # NAT handling
>> route[NATMANAGE] {
>>      if (is_request()) {
>>              if (has_totag()) {
>>                      if (check_route_param("nat=yes")) {
>>                              setbflag(FLB_NATB);
>>                      }
>>
>>                      if (check_route_param("rtp=bridge")) {
>>                              setbflag(FLB_BRIDGE);
>>                      }
>>
>>                      if (check_route_param("rtp=ws")) {
>>                              setbflag(FLB_RTPWS);
>>                      }
>>
>>             #!ifdef WITH_IPV6
>>                          if (check_route_param("rtp=v46")) {
>>                                  setbflag(FLB_V4V6);
>>                          }
>>             #!endif
>>              }
>>      }
>>
>>      if (!isbflagset(FLB_BRIDGE)) {
>>              return;
>>      }
>>
>>      if (
>>              !(isflagset(FLT_NATS)
>>              || isbflagset(FLB_NATB)
>>              || isbflagset(FLB_RTPWS)
>>         #!ifdef WITH_IPV6
>>                  || isbflagset(FLB_V4V6)
>>         #!endif
>>          )
>>     ) {
>>              return;
>>      }
>>
>>      $xavp(r=>$T_branch_idx) = "replace-origin replace-session-connection";
>>
>>      if (!nat_uac_test("8")) {
>>              $xavp(r=>$T_branch_idx) = $xavp(r=>$T_branch_idx) + " 
>> trust-address";
>>      }
>>
>>
>>      if (is_request()) {
>>              if (!has_totag()) {
>>                      if (!t_is_failure_route()) {
>>                              $avp(extra_id) = @via[1].branch + $T_branch_idx;
>>                              $xavp(r=>$T_branch_idx) = 
>> $xavp(r=>$T_branch_idx) + " via-branch=extra";
>>                      }
>>              }
>>      }
>>
>>      if (is_reply()) {
>>              $avp(extra_id) = @via[2].branch + $T_branch_idx;
>>              $xavp(r=>$T_branch_idx) = $xavp(r=>$T_branch_idx) + " 
>> via-branch=extra";
>>      }
>>
>>     #!ifdef WITH_IPV6
>>          if (af == INET && isbflagset(FLB_IPV6)) { # IPv4 --> IPv6
>>                  $xavp(r=>$T_branch_idx) = $xavp(r=>$T_branch_idx) + " 
>> address-family=IP6";
>>          } else if (af == INET6 && !isbflagset(FLB_IPV6)) { # IPv6 --> IPv4
>>                  $xavp(r=>$T_branch_idx) = $xavp(r=>$T_branch_idx) + " 
>> address-family=IP4";
>>          }
>>     #!endif
>>
>>      if (isbflagset(FLB_RTPWS)) {
>>              if ($proto =~ "ws") { # web --> SIP
>>                      $xavp(r=>$T_branch_idx) = $xavp(r=>$T_branch_idx) + " 
>> rtcp-mux-demux DTLS=off SDES-off ICE=remove RTP/AVP";
>>              } else { # SIP --> web
>>                      $xavp(r=>$T_branch_idx) = $xavp(r=>$T_branch_idx) + " 
>> rtcp-mux-offer generate-mid DTLS=passive SDES-off ICE=force RTP/SAVPF";
>>              }
>>      } else {
>>              if ($proto =~ "ws") { # web --> web
>>                      $xavp(r=>$T_branch_idx) = $xavp(r=>$T_branch_idx) + " 
>> generate-mid DTLS=passive SDES-off ICE=force";
>>              }
>>              # else {
>>                      # $xavp(r=>$T_branch_idx) = $xavp(r=>$T_branch_idx) + 
>> "";
>>              # }
>>      }
>>
>>      xlog("L_INFO", "NATMANAGE branch_id:$T_branch_idx ruri: $ru, 
>> method:$rm, status:$rs, extra_id: $avp(extra_id), rtpengine_manage: 
>> $xavp(r=>$T_branch_idx)\n");
>>
>>      rtpengine_manage($xavp(r=>$T_branch_idx));
>>
>>      if (is_request()) {
>>              if (!has_totag()) {
>>                      if (t_is_branch_route()) {
>>                              if (isbflagset(FLB_NATB)) {
>>                                      add_rr_param(";nat=yes");
>>                              }
>>
>>                              if (isbflagset(FLB_BRIDGE)) {
>>                                      add_rr_param(";rtp=bridge");
>>                              }
>>
>>                              if (isbflagset(FLB_RTPWS)) {
>>                                      add_rr_param(";rtp=ws");
>>                              }
>>
>>                 #!ifdef WITH_IPV6
>>                                  if (isbflagset(FLB_V4V6)) {
>>                                          add_rr_param(";rtp=v46");
>>                                  }
>>                 #!endif
>>                      }
>>              }
>>      }
>>
>>      if (is_reply()) {
>>              if (isbflagset(FLB_NATB)) {
>>                      if (is_first_hop()) {
>>                              if (af == INET) {
>>                                      set_contact_alias();
>>                              }
>>                      }
>>              }
>>      }
>>      return;
>> }
>>
>> # URI update for dialog requests
>> route[DLGURI] {
>>      if (!isdsturiset()) {
>>              handle_ruri_alias();
>>      }
>>      return;
>> }
>>
>> # Routing to foreign domains
>> route[SIPOUT] {
>>      if (!uri == myself) {
>>              append_hf("P-hint: outbound\r\n");
>>              route(RELAY);
>>      }
>> }
>>
>> route[BRIDGING] {
>>      if (!has_totag()) {
>>              if ($proto =~ "ws" && !($ru =~ "transport=ws")) { # Coming from 
>> WS, NOT to WS
>>                      setbflag(FLB_RTPWS); # Need bridging
>>              } else if (!($proto =~ "ws") && $ru =~ "transport=ws") { # 
>> Coming from NOT WS, going to WS
>>                      setbflag(FLB_RTPWS); # Need bridging
>>              }
>>
>>         #!ifdef WITH_IPV6
>>                  if (af == INET6 && !isbflagset(FLB_IPV6)) {
>>                          setbflag(FLB_V4V6);
>>                  } else if(af == INET && isbflagset(FLB_IPV6)) {
>>                          setbflag(FLB_V4V6);
>>                  }
>>         #!endif
>>      }
>> }
>>
>> # manage outgoing branches
>> branch_route[MANAGE_BRANCH] {
>>      xlog("L_INFO", "MANAGE_BRANCH: New branch [$T_branch_idx] to $ru\n");
>>
>>      t_on_branch_failure("rtpengine");
>>
>>     #!ifndef WITH_BRIDGE_ON_FAIL
>>          setbflag(FLB_BRIDGE);
>>     #!endif
>>
>>      route(BRIDGING);
>>      route(NATMANAGE);
>> }
>>
>> # manage incoming replies
>> onreply_route[MANAGE_REPLY] {
>>      xdbg("incoming reply\n");
>>      if (status =~ "[12][0-9][0-9]") {
>>              route(NATMANAGE);
>>      }
>> }
>>
>> # manage failure routing cases
>> failure_route[MANAGE_FAILURE] {
>>      xlog("L_INFO", "Failure: $rs");
>> }
>>
>> #!ifdef WITH_WEBSOCKETS
>>     onreply_route {
>>          if ((($Rp == MY_WS_PORT || $Rp == MY_WSS_PORT) && !(proto == WS || 
>> proto == WSS))) {
>>                  xlog("L_WARN", "SIP response received on $Rp\n");
>>                  drop;
>>          }
>>
>>          if (nat_uac_test(64)) {
>>                  # Do NAT traversal stuff for replies to a WebSocket 
>> connection
>>                  # - even if it is not behind a NAT!
>>                  # This won't be needed in the future if Kamailio and the
>>                  # WebSocket client support Outbound and Path.
>>                  add_contact_alias();
>>          }
>>     }
>>
>>     event_route[tm:branch-failure:rtpengine] {
>>          xlog("L_INFO", "BRANCH FAILED: $sel(via[1].branch) + 
>> $T_branch_idx");
>>
>>         #!ifdef WITH_BRIDGE_ON_FAIL
>>              if (!isbflagset(FLB_BRIDGE) && t_check_status("415|488")) {
>>                      t_reuse_branch();
>>                      setbflag(FLB_BRIDGE);
>>                      xlog("L_INFO", "event_route[branch-failure:rtpengine]: 
>> trying again\n");
>>
>>                      route(RELAY);
>>              } else {
>>                      $avp(extra_id) = @via[1].branch + $T_branch_idx;
>>                      rtpengine_delete("via-branch=extra");
>>                      xlog("L_INFO", "event_route[branch-failure:rtpengine]: 
>> failed\n");
>>              }
>>         #!else
>>              $avp(extra_id) = @via[1].branch + $T_branch_idx;
>>              rtpengine_delete("via-branch=extra");
>>         #!endif
>>     }
>>
>>     event_route[xhttp:request] {
>>          set_reply_close();
>>          set_reply_no_connect();
>>
>>          if ($Rp != MY_WS_PORT
>>             #!ifdef WITH_TLS
>>                      && $Rp != MY_WSS_PORT
>>             #!endif
>>          ) {
>>                  xlog("L_WARN", "HTTP request received on $Rp\n");
>>                  xhttp_reply("403", "Forbidden", "", "");
>>                  exit;
>>          }
>>
>>          xlog("L_INFO", "HTTP Request Received\n");
>>
>>          if ($hdr(Upgrade) =~ "websocket"
>>                  && $hdr(Connection) =~ "Upgrade"
>>                  && $rm =~ "GET"
>>          ) {
>>
>>                  # Validate Host - make sure the client is using the correct
>>                  # alias for WebSockets
>>                  if ($hdr(Host) == $null || !is_myself("sip:" + $hdr(Host))) 
>> {
>>                          xlog("L_WARN", "Bad host $hdr(Host)\n");
>>                          xhttp_reply("403", "Forbidden", "", "");
>>                          exit;
>>                  }
>>
>>                  # Optional... validate Origin - make sure the client is 
>> from an
>>                  # authorised website.       For example,
>>                  #
>>                  # if ($hdr(Origin) != "https://example.com"; 
>> <https://example.com>
>>                  #   && $hdr(Origin) != "https://example.com"; 
>> <https://example.com>) {
>>                  #   xlog("L_WARN", "Unauthorised client $hdr(Origin)\n");
>>                  #   xhttp_reply("403", "Forbidden", "", "");
>>                  #   exit;
>>                  # }
>>
>>                  # Optional... perform HTTP authentication
>>
>>                  # ws_handle_handshake() exits (no further configuration file
>>                  # processing of the request) when complete.
>>                  if (ws_handle_handshake()) {
>>                          # Optional... cache some information about the
>>                          # successful connection
>>                          exit;
>>                  }
>>          }
>>
>>          xhttp_reply("404", "Not Found", "", "");
>>     }
>>
>>     event_route[websocket:closed] {
>>          xlog("L_INFO", "WebSocket connection from $si:$sp has closed\n");
>>     }
>> #!endif
>>
>> Thank.
>> __________________________________________________________
>> Kamailio - Users Mailing List - Non Commercial Discussions
>> To unsubscribe send an email to [email protected]
>> Important: keep the mailing list in the recipients, do not reply only to
>> the sender!
>> Edit mailing list options or unsubscribe:
>>
>
>
> --
> *Antony*
> [email protected]
> +380669197533
> +48727830247
>
>

-- 

*Antony*
[email protected]
__________________________________________________________
Kamailio - Users Mailing List - Non Commercial Discussions
To unsubscribe send an email to [email protected]
Important: keep the mailing list in the recipients, do not reply only to the 
sender!
Edit mailing list options or unsubscribe:

Reply via email to