Author: mjordan Date: Wed Jan 14 21:00:09 2015 New Revision: 6289 URL: http://svnview.digium.com/svn/testsuite?view=rev&rev=6289 Log: tests/hep/rtcp-{receiver|sender}: Just make sure we don't have 0.0.0.0
The only thing we really care about in the HEP tests is that we don't have a bind all address in our source/destination IP addreses. Trying to match IP addresses other than simply excluding this one just leads to test failures. After all, regex's on IP addresses really aren't a great idea... Modified: asterisk/trunk/tests/hep/rtcp-receiver/test-config.yaml asterisk/trunk/tests/hep/rtcp-sender/test-config.yaml Modified: asterisk/trunk/tests/hep/rtcp-receiver/test-config.yaml URL: http://svnview.digium.com/svn/testsuite/asterisk/trunk/tests/hep/rtcp-receiver/test-config.yaml?view=diff&rev=6289&r1=6288&r2=6289 ============================================================================== --- asterisk/trunk/tests/hep/rtcp-receiver/test-config.yaml (original) +++ asterisk/trunk/tests/hep/rtcp-receiver/test-config.yaml Wed Jan 14 21:00:09 2015 @@ -62,8 +62,8 @@ # for why this is a terrible idea. Really, all we care about is that: # (a) we have something in the src/dst addr fields # (b) that something is not 0.0.0.0 - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 1 ip_id: 17 @@ -84,50 +84,50 @@ - ip_family: 2 uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 1 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - ssrc: "\\d.*", - type: 200, - report_blocks: [], - report_count: 0 - } - - - ip_family: 2 - uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 1 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - ssrc: "\\d.*", - type: 200, - report_blocks: [], - report_count: 0 - } - - - ip_family: 2 - uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 1 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + ssrc: "\\d.*", + type: 200, + report_blocks: [], + report_count: 0 + } + - + ip_family: 2 + uuid: 'PJSIP/ast2-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 1 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + ssrc: "\\d.*", + type: 200, + report_blocks: [], + report_count: 0 + } + - + ip_family: 2 + uuid: 'PJSIP/ast2-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 1 ip_id: 17 @@ -148,29 +148,29 @@ - ip_family: 2 uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 1 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - ssrc: "\\d.*", - type: 200, - report_blocks: [], - report_count: 0 - } - - - ip_family: 2 - uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 1 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + ssrc: "\\d.*", + type: 200, + report_blocks: [], + report_count: 0 + } + - + ip_family: 2 + uuid: 'PJSIP/ast2-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 1 ip_id: 17 @@ -203,8 +203,8 @@ # for why this is a terrible idea. Really, all we care about is that: # (a) we have something in the src/dst addr fields # (b) that something is not 0.0.0.0 - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 2 ip_id: 17 @@ -226,29 +226,29 @@ - ip_family: 2 uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 2 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - ssrc: "\\d.*", - type: 200, - report_blocks: [], - report_count: 0 - } - - - ip_family: 2 - uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 2 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + ssrc: "\\d.*", + type: 200, + report_blocks: [], + report_count: 0 + } + - + ip_family: 2 + uuid: 'PJSIP/ast1-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 2 ip_id: 17 @@ -270,29 +270,29 @@ - ip_family: 2 uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 2 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - ssrc: "\\d.*", - type: 200, - report_blocks: [], - report_count: 0 - } - - - ip_family: 2 - uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 2 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + ssrc: "\\d.*", + type: 200, + report_blocks: [], + report_count: 0 + } + - + ip_family: 2 + uuid: 'PJSIP/ast1-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 2 ip_id: 17 @@ -314,8 +314,8 @@ - ip_family: 2 uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 2 ip_id: 17 Modified: asterisk/trunk/tests/hep/rtcp-sender/test-config.yaml URL: http://svnview.digium.com/svn/testsuite/asterisk/trunk/tests/hep/rtcp-sender/test-config.yaml?view=diff&rev=6289&r1=6288&r2=6289 ============================================================================== --- asterisk/trunk/tests/hep/rtcp-sender/test-config.yaml (original) +++ asterisk/trunk/tests/hep/rtcp-sender/test-config.yaml Wed Jan 14 21:00:09 2015 @@ -60,143 +60,143 @@ # for why this is a terrible idea. Really, all we care about is that: # (a) we have something in the src/dst addr fields # (b) that something is not 0.0.0.0 - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 1 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 1 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 1 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 1 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 1 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast2-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 1 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast2-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 1 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast2-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 1 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast2-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 1 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast2-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 1 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast2-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 1 ip_id: 17 @@ -233,143 +233,143 @@ # for why this is a terrible idea. Really, all we care about is that: # (a) we have something in the src/dst addr fields # (b) that something is not 0.0.0.0 - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 2 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 2 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 2 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 2 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - protocol_type: 5 - capture_agent_id: 2 - ip_id: 17 - payload: - decode: 'RTCP' - value: - { ssrc: "\\d.*", - type: 200, - sender_information: { ntp_timestamp_sec: "\\d.*", - packets: "\\d.*", - ntp_timestamp_usec: "\\d.*", - octets: "\\d.*", - rtp_timestamp: "\\d.*", }, - report_blocks:[ { source_ssrc: "\\d.*", - highest_seq_no: "\\d.*", - fraction_lost: 0, - ia_jitter: "\\d.*", - packets_lost: 0, - lsr: "\\d.*", - dlsr: "\\d.*" }, ], - report_count: 1, - } - - - ip_family: 2 - uuid: 'PJSIP/ast1-00000000' - src_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' - dst_addr: '[1-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 2 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast1-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 2 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast1-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 2 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast1-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 2 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast1-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' + protocol_type: 5 + capture_agent_id: 2 + ip_id: 17 + payload: + decode: 'RTCP' + value: + { ssrc: "\\d.*", + type: 200, + sender_information: { ntp_timestamp_sec: "\\d.*", + packets: "\\d.*", + ntp_timestamp_usec: "\\d.*", + octets: "\\d.*", + rtp_timestamp: "\\d.*", }, + report_blocks:[ { source_ssrc: "\\d.*", + highest_seq_no: "\\d.*", + fraction_lost: 0, + ia_jitter: "\\d.*", + packets_lost: 0, + lsr: "\\d.*", + dlsr: "\\d.*" }, ], + report_count: 1, + } + - + ip_family: 2 + uuid: 'PJSIP/ast1-00000000' + src_addr: '^(.(?!0.0.0.0))*' + dst_addr: '^(.(?!0.0.0.0))*' protocol_type: 5 capture_agent_id: 2 ip_id: 17 -- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- svn-commits mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/svn-commits