Michael S Collins
5556731b64
More phrases
2013-05-22 17:39:20 -07:00
Stefan Knoblich
cb9090dc93
esl: Don't abort the esl_listen() loop(s) if accept() returns with errno == EINTR
...
ivrd doesn't use sigaction + SA_RESTART for SIGCHILD. An exiting
child process will interrupt accept() in the parent to handle
the signal, which makes accept() return -1 (errno = EINTR) after
the sighandler function returns.
Signed-off-by: Stefan Knoblich <stkn@openisdn.net>
2013-05-23 02:07:55 +02:00
Stefan Knoblich
ca1d407921
ivrd: fflush() stdout before entering esl_listen()
...
Fixes repeatedly printing the 'Starting forking listener' message,
if stdout has been redirected into a logfile (for example).
Signed-off-by: Stefan Knoblich <stkn@openisdn.net>
2013-05-23 02:05:25 +02:00
Michael S Collins
35410600dc
Add new to-be-recorded phrases highlighting weekly conf call (to add to new demo IVR)
2013-05-22 13:17:14 -07:00
William King
15f43bac09
FS-5440: don't assert on bad input rtmp data
2013-05-22 12:38:23 -07:00
Anthony Minessale
6cdb46889c
FS-5402 --resolve the problem is ent originate has many channels and many causes to parse so we need to check it against all the causes
2013-05-22 11:01:39 -05:00
Anthony Minessale
790e9b4d33
FS-5360 change defaults
2013-05-22 10:20:41 -05:00
Chris Rienzo
02cf105840
Merge branch 'master' of ssh://git.freeswitch.org:222/freeswitch
2013-05-22 13:22:19 -04:00
Chris Rienzo
2c82e6afc6
mod_http_cache: fix example config
2013-05-22 13:22:03 -04:00
Anthony Minessale
699bd795f6
FS-5455 try this
2013-05-22 08:11:29 -05:00
Jeff Lenk
66a94a2c45
windows fix trivial compiler warning
2013-05-22 10:38:04 -05:00
Nathan Neulinger
23bd06881d
FS-5429: --resolve add minimal idivert support for skinny
2013-05-22 09:58:28 -05:00
Nathan Neulinger
8afaf28a09
FS-5379: --resolve fix skinny phone codec agreement issues due to incorrect hardwired ptime, update field names for future coding to be more descriptive
2013-05-22 09:27:09 -05:00
Nathan Neulinger
337976e469
FS-5225: --resolve add ability to dial by pressing line button
2013-05-22 09:17:41 -05:00
Nathan Neulinger
0b05cf6843
FS-5267: --resolve avoid null deref if sessions missing
2013-05-22 09:12:46 -05:00
Chris Rienzo
f7e725f4bf
mod_http_cache: a couple more unit test cases
2013-05-22 08:47:49 -04:00
Chris Rienzo
f5f65b65a9
mod_http_cache: remove unnecessary memset() now that switch_b64_encode() is fixed
2013-05-22 08:22:04 -04:00
Chris Rienzo
8be02b57ce
mod_http_cache: fix unit test now that switch_b64_encode is fixed
2013-05-22 08:19:36 -04:00
Anthony Minessale
1a3b69a4a6
FS-5436 --resolve
2013-05-21 19:39:02 -05:00
Anthony Minessale
78c31eaa87
FS-5402 revert wait till tomorrow
2013-05-21 13:29:24 -05:00
Anthony Minessale
1239e32de2
FS-5402
2013-05-21 13:22:17 -05:00
Anthony Minessale
363b58dc54
FS-5453 --resolve
2013-05-21 12:01:57 -05:00
Anthony Minessale
7ec78e90e1
FS-5457
2013-05-21 10:21:45 -05:00
Anthony Minessale
104febbc1a
FS-5376 --resolve
2013-05-21 10:04:35 -05:00
Anthony Minessale
8ac3178e45
FS-5242
2013-05-21 10:03:22 -05:00
Anthony Minessale
0cee5ac9df
FS-5211 --resolve
2013-05-21 09:29:50 -05:00
Stefan Knoblich
8019af49a4
ftmod_libpri: Fix possible NULL-ptr dereference crash in on_restart(_ack)()
...
Catch single channel RESTART/RESTART ACK events for non-B-channels,
that would lead to a NULL pointer dereference, because those do not have
per-channel private data (chan->call_data = chan_priv == NULL).
Signed-off-by: Stefan Knoblich <stkn@openisdn.net>
2013-05-21 17:50:54 +02:00
Chris Rienzo
83d7b60d74
mod_http_cache: forgot to add write to http_cache:// format
2013-05-21 09:27:39 -04:00
Travis Cross
b755c8347b
Add mod_say_pl to debian build
2013-05-21 02:33:56 +00:00
Travis Cross
d2f3a3114e
Spelling fix
2013-05-21 02:00:43 +00:00
Anthony Minessale
3e6cdd6b57
FS-5360
2013-05-20 12:22:58 -05:00
Anthony Minessale
6c5de69b18
getting read_impl too soon here
2013-05-20 11:22:37 -05:00
Anthony Minessale
9cdd2be095
FS-5444 --resolve
2013-05-20 08:20:38 -05:00
Chris Rienzo
a0170bbdb2
mod_http_cache: added write file format
2013-05-20 11:18:40 -04:00
Chris Rienzo
8c8b2176d2
mod_http_cache: added native Amazon S3 support
2013-05-20 09:31:28 -04:00
Steve Underwood
fe000f18fd
Fixed a weakness in error UDPTL lost packet recovery. Hopefully this addresses
...
FS5202.
2013-05-20 11:30:11 +08:00
William King
50e2098be1
Add mod_xml_radius to the modules list, though disabled by default.
2013-05-18 20:49:51 -07:00
William King
b4209ca93b
Theoretical memory leak where if attr_init failed, then check would have still been malloc'd but not used.
2013-05-18 20:42:03 -07:00
William King
e2ea6e58c8
Minor code cleanup. calling va_start without calling va_end doesn't leak does it? Either way, it's fixed now.
2013-05-18 20:15:55 -07:00
William King
9ace496fe3
full_contact must be freed by sofia. There isn't a chance of this having blown anything up, but Coverity is right that this should be initialized with NULL to be safe against future refactors.
2013-05-18 19:13:18 -07:00
William King
ef1bf8e34a
Was causing a very small leak on naptr lookups. Upon review just happened to be a typo missing a bang.
2013-05-18 17:50:50 -07:00
William King
508fb78e94
My bad. some how a make didn't catch this issue after a cleanup refactor. In this instance buf is being treated as an 8 byte number, not a pointer.
2013-05-18 17:46:13 -07:00
William King
291244c099
Coverity reported an Uninitialized pointer read. Upon further digging it appears that there is a code path where incoming packets can come in out of order, so this section of code tries to see if it can find the missed packets. As per FS-5202 there is a case where under heavy load the packet exists, and has most of the packet parsed, but still has a NULL pointer for the packet buffer. These two lines would at least help detect the edge case.
2013-05-18 17:34:16 -07:00
William King
45803e38e7
Edge case for when you are subscribing to presence on a valet parking lot. In which case there would be a small leak.
2013-05-18 17:06:54 -07:00
William King
d27a95a50e
Possible leak if someone were to try and add extra headers to a channel that had either an inbound info on that session or the session were to be deflected. I don't see a way that these extra headers could be added outside of a C module subscribing to the session states, but just to make sure I'm adding these so that just like other extra header locations it's cleaned up.
2013-05-18 17:00:41 -07:00
William King
f718a0572f
Alice meet rabit hole. There is a leak here on every invite that comes back from a status 180 when the other side is not FS, but you have presence enabled. Thanks to Coverity scan for location this condition. This 'might' not have been leaking if sofia was automatically freeing this when the sofia object was destroyed, but all other locations where sip_header_as_string where called they were all followed by a su_free, so I assume not.
2013-05-18 16:35:03 -07:00
William King
f519ad195a
If the mod_sofia global presense hash is null, then make sure to free the matches variable before going to done.
2013-05-18 16:05:40 -07:00
William King
09553f424a
FS-5443: --resolve leaked because the JS api's copy and return new malloc'd pointers.
2013-05-18 15:47:01 -07:00
William King
7f3f4855a6
When message events were added, the debug field name was overlooked. This would have only been hit when debug level was above 'DEBUG1' and at that point it would have incorrectly chosen debug display names.
2013-05-18 15:10:44 -07:00
William King
4fcefab0d0
Minor typo. User is being passed into this fuction as a long pointer, not a long.
2013-05-18 14:29:59 -07:00