|
|
@ -3,6 +3,7 @@ |
|
|
#!trydef SANITY_DROPS_REQUEST 1 |
|
|
#!trydef SANITY_DROPS_REQUEST 1 |
|
|
#!trydef SANITY_DEFAULT_CHECK 17895 |
|
|
#!trydef SANITY_DEFAULT_CHECK 17895 |
|
|
#!trydef SANITY_URI_CHECKS 7 |
|
|
#!trydef SANITY_URI_CHECKS 7 |
|
|
|
|
|
#!trydef SANITY_TRACE_REQUEST 1 |
|
|
|
|
|
|
|
|
#!substdef "!SANITY_SUBST_CACHE_PERIOD!$def(SANITY_CACHE_PERIOD)!g" |
|
|
#!substdef "!SANITY_SUBST_CACHE_PERIOD!$def(SANITY_CACHE_PERIOD)!g" |
|
|
|
|
|
|
|
|
@ -17,6 +18,7 @@ modparam("debugger", "mod_level", "sanity=-3") |
|
|
|
|
|
|
|
|
kazoo.sanity_check_use_port = SANITY_CHECK_USE_PORT descr "should we keep track of ip and port for sanity failures" |
|
|
kazoo.sanity_check_use_port = SANITY_CHECK_USE_PORT descr "should we keep track of ip and port for sanity failures" |
|
|
kazoo.sanity_drops_request = SANITY_DROPS_REQUEST descr "should we drop the request or send error on sanity failure" |
|
|
kazoo.sanity_drops_request = SANITY_DROPS_REQUEST descr "should we drop the request or send error on sanity failure" |
|
|
|
|
|
kazoo.sanity_trace_request = SANITY_TRACE_REQUEST descr "should we trace the request if sip trace role is enabled" |
|
|
|
|
|
|
|
|
route[SANITY_CHECK] |
|
|
route[SANITY_CHECK] |
|
|
{ |
|
|
{ |
|
|
@ -34,6 +36,9 @@ route[SANITY_CHECK] |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
if (!sanity_check()) { |
|
|
if (!sanity_check()) { |
|
|
|
|
|
#!ifdef SIP_TRACE_ROLE |
|
|
|
|
|
sip_trace(); |
|
|
|
|
|
#!endif |
|
|
if($sel(cfg_get.kazoo.sanity_drops_request) == 1) { |
|
|
if($sel(cfg_get.kazoo.sanity_drops_request) == 1) { |
|
|
xlog("L_WARN", "$ci|end|dropping insane message from $si:$sp\n"); |
|
|
xlog("L_WARN", "$ci|end|dropping insane message from $si:$sp\n"); |
|
|
drop; |
|
|
drop; |
|
|
|