Commit Graph

24586 Commits

Author SHA1 Message Date
Michael S Collins 5556731b64 More phrases 2013-05-22 17:39:20 -07:00
Stefan Knoblich cb9090dc93 esl: Don't abort the esl_listen() loop(s) if accept() returns with errno == EINTR
ivrd doesn't use sigaction + SA_RESTART for SIGCHILD. An exiting
child process will interrupt accept() in the parent to handle
the signal, which makes accept() return -1 (errno = EINTR) after
the sighandler function returns.

Signed-off-by: Stefan Knoblich <stkn@openisdn.net>
2013-05-23 02:07:55 +02:00
Stefan Knoblich ca1d407921 ivrd: fflush() stdout before entering esl_listen()
Fixes repeatedly printing the 'Starting forking listener' message,
if stdout has been redirected into a logfile (for example).

Signed-off-by: Stefan Knoblich <stkn@openisdn.net>
2013-05-23 02:05:25 +02:00
Michael S Collins 35410600dc Add new to-be-recorded phrases highlighting weekly conf call (to add to new demo IVR) 2013-05-22 13:17:14 -07:00
William King 15f43bac09 FS-5440: don't assert on bad input rtmp data 2013-05-22 12:38:23 -07:00
Anthony Minessale 6cdb46889c FS-5402 --resolve the problem is ent originate has many channels and many causes to parse so we need to check it against all the causes 2013-05-22 11:01:39 -05:00
Anthony Minessale 790e9b4d33 FS-5360 change defaults 2013-05-22 10:20:41 -05:00
Chris Rienzo 02cf105840 Merge branch 'master' of ssh://git.freeswitch.org:222/freeswitch 2013-05-22 13:22:19 -04:00
Chris Rienzo 2c82e6afc6 mod_http_cache: fix example config 2013-05-22 13:22:03 -04:00
Anthony Minessale 699bd795f6 FS-5455 try this 2013-05-22 08:11:29 -05:00
Jeff Lenk 66a94a2c45 windows fix trivial compiler warning 2013-05-22 10:38:04 -05:00
Nathan Neulinger 23bd06881d FS-5429: --resolve add minimal idivert support for skinny 2013-05-22 09:58:28 -05:00
Nathan Neulinger 8afaf28a09 FS-5379: --resolve fix skinny phone codec agreement issues due to incorrect hardwired ptime, update field names for future coding to be more descriptive 2013-05-22 09:27:09 -05:00
Nathan Neulinger 337976e469 FS-5225: --resolve add ability to dial by pressing line button 2013-05-22 09:17:41 -05:00
Nathan Neulinger 0b05cf6843 FS-5267: --resolve avoid null deref if sessions missing 2013-05-22 09:12:46 -05:00
Chris Rienzo f7e725f4bf mod_http_cache: a couple more unit test cases 2013-05-22 08:47:49 -04:00
Chris Rienzo f5f65b65a9 mod_http_cache: remove unnecessary memset() now that switch_b64_encode() is fixed 2013-05-22 08:22:04 -04:00
Chris Rienzo 8be02b57ce mod_http_cache: fix unit test now that switch_b64_encode is fixed 2013-05-22 08:19:36 -04:00
Anthony Minessale 1a3b69a4a6 FS-5436 --resolve 2013-05-21 19:39:02 -05:00
Anthony Minessale 78c31eaa87 FS-5402 revert wait till tomorrow 2013-05-21 13:29:24 -05:00
Anthony Minessale 1239e32de2 FS-5402 2013-05-21 13:22:17 -05:00
Anthony Minessale 363b58dc54 FS-5453 --resolve 2013-05-21 12:01:57 -05:00
Anthony Minessale 7ec78e90e1 FS-5457 2013-05-21 10:21:45 -05:00
Anthony Minessale 104febbc1a FS-5376 --resolve 2013-05-21 10:04:35 -05:00
Anthony Minessale 8ac3178e45 FS-5242 2013-05-21 10:03:22 -05:00
Anthony Minessale 0cee5ac9df FS-5211 --resolve 2013-05-21 09:29:50 -05:00
Stefan Knoblich 8019af49a4 ftmod_libpri: Fix possible NULL-ptr dereference crash in on_restart(_ack)()
Catch single channel RESTART/RESTART ACK events for non-B-channels,
that would lead to a NULL pointer dereference, because those do not have
per-channel private data (chan->call_data = chan_priv == NULL).

Signed-off-by: Stefan Knoblich <stkn@openisdn.net>
2013-05-21 17:50:54 +02:00
Chris Rienzo 83d7b60d74 mod_http_cache: forgot to add write to http_cache:// format 2013-05-21 09:27:39 -04:00
Travis Cross b755c8347b Add mod_say_pl to debian build 2013-05-21 02:33:56 +00:00
Travis Cross d2f3a3114e Spelling fix 2013-05-21 02:00:43 +00:00
Anthony Minessale 3e6cdd6b57 FS-5360 2013-05-20 12:22:58 -05:00
Anthony Minessale 6c5de69b18 getting read_impl too soon here 2013-05-20 11:22:37 -05:00
Anthony Minessale 9cdd2be095 FS-5444 --resolve 2013-05-20 08:20:38 -05:00
Chris Rienzo a0170bbdb2 mod_http_cache: added write file format 2013-05-20 11:18:40 -04:00
Chris Rienzo 8c8b2176d2 mod_http_cache: added native Amazon S3 support 2013-05-20 09:31:28 -04:00
Steve Underwood fe000f18fd Fixed a weakness in error UDPTL lost packet recovery. Hopefully this addresses
FS5202.
2013-05-20 11:30:11 +08:00
William King 50e2098be1 Add mod_xml_radius to the modules list, though disabled by default. 2013-05-18 20:49:51 -07:00
William King b4209ca93b Theoretical memory leak where if attr_init failed, then check would have still been malloc'd but not used. 2013-05-18 20:42:03 -07:00
William King e2ea6e58c8 Minor code cleanup. calling va_start without calling va_end doesn't leak does it? Either way, it's fixed now. 2013-05-18 20:15:55 -07:00
William King 9ace496fe3 full_contact must be freed by sofia. There isn't a chance of this having blown anything up, but Coverity is right that this should be initialized with NULL to be safe against future refactors. 2013-05-18 19:13:18 -07:00
William King ef1bf8e34a Was causing a very small leak on naptr lookups. Upon review just happened to be a typo missing a bang. 2013-05-18 17:50:50 -07:00
William King 508fb78e94 My bad. some how a make didn't catch this issue after a cleanup refactor. In this instance buf is being treated as an 8 byte number, not a pointer. 2013-05-18 17:46:13 -07:00
William King 291244c099 Coverity reported an Uninitialized pointer read. Upon further digging it appears that there is a code path where incoming packets can come in out of order, so this section of code tries to see if it can find the missed packets. As per FS-5202 there is a case where under heavy load the packet exists, and has most of the packet parsed, but still has a NULL pointer for the packet buffer. These two lines would at least help detect the edge case. 2013-05-18 17:34:16 -07:00
William King 45803e38e7 Edge case for when you are subscribing to presence on a valet parking lot. In which case there would be a small leak. 2013-05-18 17:06:54 -07:00
William King d27a95a50e Possible leak if someone were to try and add extra headers to a channel that had either an inbound info on that session or the session were to be deflected. I don't see a way that these extra headers could be added outside of a C module subscribing to the session states, but just to make sure I'm adding these so that just like other extra header locations it's cleaned up. 2013-05-18 17:00:41 -07:00
William King f718a0572f Alice meet rabit hole. There is a leak here on every invite that comes back from a status 180 when the other side is not FS, but you have presence enabled. Thanks to Coverity scan for location this condition. This 'might' not have been leaking if sofia was automatically freeing this when the sofia object was destroyed, but all other locations where sip_header_as_string where called they were all followed by a su_free, so I assume not. 2013-05-18 16:35:03 -07:00
William King f519ad195a If the mod_sofia global presense hash is null, then make sure to free the matches variable before going to done. 2013-05-18 16:05:40 -07:00
William King 09553f424a FS-5443: --resolve leaked because the JS api's copy and return new malloc'd pointers. 2013-05-18 15:47:01 -07:00
William King 7f3f4855a6 When message events were added, the debug field name was overlooked. This would have only been hit when debug level was above 'DEBUG1' and at that point it would have incorrectly chosen debug display names. 2013-05-18 15:10:44 -07:00
William King 4fcefab0d0 Minor typo. User is being passed into this fuction as a long pointer, not a long. 2013-05-18 14:29:59 -07:00