Hi Matteo,

you do not need the append_branch in failure_route; next_contact() automatically adds the contacts as branches.

regards,
bogdan

Matteo Piazza wrote:

Hi Bogdan,
Thank's for the help,

Now I have insert a next_contacts() in the principal route and the serial forking now works.
But i have this error:
ERROR:tm:t_should_relay_response: status rewrite by UAS: stored: 408, received: 100

route{
..........
.........
    if(load_contacts()){
        xlog("L_ERR","LOAD CONTACTS!\n");
        }

        if(next_contacts()){
        xlog("L_ERR","CONTACT <$ru> !\n");
        }
        t_on_failure("1");
        t_relay();
        exit;
}


failure_route[1] {
 if (next_contacts())
        {
        xlog("L_ERR","NEXT CONTACT <$ru> !\n");
        append_branch();
        t_relay();
        }
exit;
}

===============================
Debug output:
===============================

LOAD CONTACTS!
 6(14458) CONTACT <sip:[EMAIL PROTECTED];transport=udp> !
14(14474) NEXT CONTACT <sip:[EMAIL PROTECTED];transport=udp> !
 9(14464) LOAD CONTACTS!
 9(14464) CONTACT <sip:[EMAIL PROTECTED]> !
7(14460) ERROR:tm:t_should_relay_response: status rewrite by UAS: stored: 408, received: 100 7(14460) WARNING: set_timer called on a "detached" timer -- ignoring: 0xb5dbd72c


Bogdan-Andrei Iancu wrote:

Hi Matteo,

you are missing a next_contacts() after load_contacts().

regards,
bogdan


Matteo Piazza wrote:

I become crazy to realize a serial forking.
I try to use load_contacts() and next_contscts().

This is my openser.cfg nd my location table:
In teory when I call [EMAIL PROTECTED] the location with the q value equal to 0.80 it is the first but it is processed only the location
[EMAIL PROTECTED]

Help!!!

#
# $Id: openser.cfg,v 1.5 2005/10/28 19:45:33 bogdan_iancu Exp $
#
# simple quick-start config script
#

# ----------- global configuration parameters ------------------------


debug=3          # debug level (cmd line: -dddddddddd)
fork=yes
log_stderror=yes   # (cmd line: -E)

/* Uncomment these lines to enter debugging mode
fork=no
log_stderror=yes
*/

check_via=no    # (cmd. line: -v)
dns=no          # (cmd. line: -r)
rev_dns=no      # (cmd. line: -R)
port=5060
children=4
fifo="/tmp/openser_fifo"

#
# uncomment the following lines for TLS support
#disable_tls = 0
#listen = tls:your_IP:5061
#tls_verify = 1
#tls_require_certificate = 0
#tls_method = TLSv1
#tls_certificate = "/usr/local/etc/openser/tls/user/user-cert.pem"
#tls_private_key = "/usr/local/etc/openser/tls/user/user-privkey.pem"
#tls_ca_list = "/usr/local/etc/openser/tls/user/user-calist.pem"

# ------------------ module loading ----------------------------------

# Uncomment this if you want to use SQL database
loadmodule "/usr/local/lib/openser/modules/mysql.so"

loadmodule "/usr/local/lib/openser/modules/sl.so"
loadmodule "/usr/local/lib/openser/modules/tm.so"
loadmodule "/usr/local/lib/openser/modules/rr.so"
loadmodule "/usr/local/lib/openser/modules/maxfwd.so"
loadmodule "/usr/local/lib/openser/modules/usrloc.so"
loadmodule "/usr/local/lib/openser/modules/registrar.so"
loadmodule "/usr/local/lib/openser/modules/textops.so"
loadmodule "/usr/local/lib/openser/modules/avpops.so"
loadmodule "/usr/local/lib/openser/modules/xlog.so"
loadmodule "/usr/local/lib/openser/modules/lcr.so"


# Uncomment this if you want digest authentication
# mysql.so must be loaded !
loadmodule "/usr/local/lib/openser/modules/auth.so"
loadmodule "/usr/local/lib/openser/modules/auth_db.so"

# ----------------- setting module-specific parameters ---------------

# -- usrloc params --
modparam("registrar", "append_branches", 1)
#modparam("usrloc", "db_mode",   0)

# Uncomment this if you want to use SQL database
# for persistent storage and comment the previous line
modparam("usrloc", "db_mode", 2)

# -- auth params --
# Uncomment if you are using auth module
#
modparam("auth_db", "calculate_ha1", yes)
#
# If you set "calculate_ha1" parameter to yes (which true in this config),
# uncomment also the following parameter)
#
modparam("auth_db", "password_column", "password")

# -- rr params --
# add value to ;lr param to make some broken UAs happy
modparam("rr", "enable_full_lr", 1)



modparam("usrloc","db_url","mysql://openser:[EMAIL PROTECTED]/openser")
modparam("auth_db","db_url","mysql://openser:[EMAIL PROTECTED]/openser")
modparam("lcr","db_url","mysql://openser:[EMAIL PROTECTED]/openser")
modparam("avpops","avp_url","mysql://openser:[EMAIL PROTECTED]/openser")
modparam("avpops","avp_table","usr_preferences")



modparam("tm", "fr_timer", 8)
modparam("tm", "fr_inv_timer", 10)
modparam("tm", "wt_timer", 5)

#modparam("avpops","avp_aliases","fwdbusy=i:665")





# -------------------------  request routing logic -------------------

# main routing logic

route{

    # initial sanity checks -- messages with
    # max_forwards==0, or excessively long requests
    if (!mf_process_maxfwd_header("10")) {
        sl_send_reply("483","Too Many Hops");
        exit;
    };

    if (msg:len >=  2048 ) {
        sl_send_reply("513", "Message too big");
        exit;
    };

    if (method =="INVITE" && uri =~"^sip:[EMAIL PROTECTED]"){
     log(1, "Check 1 Start PSTN Call\n");
     rewritehostport("192.168.9.97:5061");
         t_relay();
     exit;
        }

    if (method == "CANCEL"){
           t_relay();
     }

        if (method =="BYE"){
    t_relay();
        }
        # we record-route all messages -- to make sure that
    # subsequent messages will go through our proxy; that's
    # particularly good if upstream and downstream entities
    # use different transport protocol
    if (!method=="REGISTER")
        record_route();

    # subsequent messages withing a dialog should take the
    # path determined by record-routing
    if (loose_route()) {
        # mark routing logic in request
        append_hf("P-hint: rr-enforced\r\n");
        route(1);
    };

    if (!uri==myself) {
        # mark routing logic in request
        append_hf("P-hint: outbound\r\n");
        # if you have some interdomain connections via TLS
        #if(uri=~"@tls_domain1.net") {
        #    t_relay_to_tls("IP_domain1","port_domain1");
        #    exit;
        #} else if(uri=~"@tls_domain2.net") {
        #    t_relay_to_tls("IP_domain2","port_domain2");
        #    exit;
        #}
        route(1);
    };

    # if the request is for other domain use UsrLoc
    # (in case, it does not work, use the following command
    # with proper names and addresses in it)
    if (uri==myself) {

        if (method=="REGISTER") {

            # Uncomment this if you want to use digest authentication
            if (!www_authorize("create-net.it", "subscriber")) {
                www_challenge("create-net.it", "0");
                exit;
            };

            save("location");
            exit;
        };

        lookup("aliases");
        if (!uri==myself) {
            append_hf("P-hint: outbound alias\r\n");
            route(1);
        };

        # native SIP destinations are handled using our USRLOC DB
        if (!lookup("location")) {
            sl_send_reply("404", "Not Found");
            exit;
        };
        append_hf("P-hint: usrloc applied\r\n");
    };

        if(load_contacts()){
    xlog("L_ERR","LOAD CONTACTS!\n");
    }
        xlog("L_ERR","CONTACT <$ru> !\n");
    t_on_failure("1");
    t_relay();
    #route(1);
    }


route[1] {
    # send it out now; use stateful forwarding as it works reliably
    # even for UDP2TCP
    if (!t_relay()) {
        sl_reply_error();
    };
    exit;
}

failure_route[1] {

 if (next_contacts()) {
     xlog("L_ERR","NEXT CONTACT <$ru> !\n");
    append_branch();
    t_relay();
 }

 else {
  xlog("L_ERR","ERROR!\n");
  }
}

This is my location table
============================================================

username | domain | contact | q 400 | | sip:[EMAIL PROTECTED] | 1.00 308 | | sip:[EMAIL PROTECTED]:5060 | 1.00 309 | | sip:[EMAIL PROTECTED];transport=udp | 1.00 309 | | sip:[EMAIL PROTECTED] | 0.80








_______________________________________________
Users mailing list
[email protected]
http://openser.org/cgi-bin/mailman/listinfo/users

Reply via email to