20665 Commits

Author SHA1 Message Date
joshebosh
e972499e4f FS-11775 [core] wait_for_silence debug messages showing as ERR 2019-06-06 11:57:41 -04:00
Mike Jerris
c786efa9aa FS-11774: [mod_conference] Quiet down logs from conference moderator command over verto 2019-06-06 11:54:27 -04:00
Chris Rienzo
e47879604c FS-11824 [mod_sofia] map SIP 607 to SWITCH_CAUSE_CALL_REJECTED 2019-06-06 11:52:07 -04:00
Chris Rienzo
641300893f FS-11824 [core] add NOT_ACCEPTABLE string to cause mapping 2019-06-06 11:52:01 -04:00
Chris Rienzo
0a6d87edfe FS-11824 [sofia-sip,mod_sofia,core] Added cause codes that map to SIP 600,603,604,606,607 2019-06-06 11:51:51 -04:00
joshebosh
552d3d8b02 FS-11694 [mod_conference] conference vid-res showing -ERR no reply 2019-06-06 11:50:05 -04:00
joshebosh
372cfc3221 FS-11719 [mod_commands] uuid_broadcast yields OK on bogus uuid 2019-06-06 11:49:22 -04:00
joshebosh
0ba26f0351 FS-11718 [mod_commands] uuid_break yields -ERR no reply 2019-06-06 11:48:16 -04:00
Dragos Oancea
c82f093419 FS-11711: fix overflow on reading ICE candidates (found with ASAN) 2019-06-06 11:47:13 -04:00
Mike Jerris
90ea0b7a1f FS-11624: [Build] Fix paralell build of rayo, ssml, digaling can cause iksemel lib build error. 2019-06-06 11:45:21 -04:00
Seven Du
cf7a1d47bf FS-11640 fix const char * prototype 2019-06-06 11:39:58 -04:00
Mariah Yang
463eb7294e FS-11671 fix potential devided by zero error 2019-06-06 11:39:05 -04:00
Brian West
60be42008c FS-11660 [mod_sofia] Not parsing sdp after first video reject. 2019-06-06 11:36:26 -04:00
Andrey Volk
2192d5de3b FS-11644: [core] Fix send_dtmf containing w or W 2019-06-06 11:29:21 -04:00
Brian West
96c8cb0473 FS-11625: [core]: Do not hangup sessions that have transfer or park after bridge set. 2019-06-06 11:22:37 -04:00
Liyang
0c73aa82da FS-11822 [core] reset the codec_string when stream changed 2019-06-06 11:21:19 -04:00
Chris Rienzo
2d231cdff3 FS-11823 [core] clear out event queue when destroying session 2019-06-06 11:20:16 -04:00
Seven Du
20e370aa2a FS-11573 fix seg when missing conference layout config 2019-06-06 11:18:56 -04:00
Mike Jerris
a255bd3d62 FS-11668: [verto] Fix polling of secure verto sockets 2019-06-06 11:17:22 -04:00
Sergey Khripchenko
8dd5373db4 FS-11467: [mod_verto] Properly handle poll() EINTR and separate poll()==0 / timeout case 2019-06-06 11:17:00 -04:00
Sergey Khripchenko
1000d1d8c8 FS-11467: [mod_verto] decreased logging level for log lines that are not errors/warnings 2019-06-06 11:16:52 -04:00
Brian West
6569a44d85 FS-11496: [core] fix crash with four channel sound file 2019-06-06 11:13:06 -04:00
Piotr Gregor
118dd796f3 FS-11421: [core,mod_sofia] Fix rtp_pass_codecs_on_stream_change to process all sdp settings in the re-invite -- add new filter_codecs app and fix some races and negotiation bugs #resolve 2019-06-06 11:08:52 -04:00
Anthony Minessale
c47752c940 FS-11438: [freeswitch-core] recvonly channels left that way on blind transfer in some cases #resolve 2019-06-06 11:05:20 -04:00
Anthony Minessale
143323e6ef FS-11417: [mod_conference] Unbounded memory growth during screen share #resolve 2019-06-06 10:57:45 -04:00
Mike Jerris
d61126ca82 FS-11814: [mod_sofia] fix regression in fs_path handling on BYE 2019-06-04 15:46:36 -04:00
Andrey Volk
cea52ac255 Merge pull request #1735 in FS/freeswitch from ~MITCH.CAPPER/freeswitch:FS-11865-fix_mod_com_729_bin_url_change_pr to master
* commit '1f0dea990b47bc154027d75d563d2af92079e1d7':
  FS-11865 [mod_com_729] change to use latest version for mod_com_g729 bins so url does not go stale and update new binary paths
2019-05-29 16:56:13 -05:00
Mitch Capper
1f0dea990b FS-11865 [mod_com_729] change to use latest version for mod_com_g729 bins so url does not go stale and update new binary paths 2019-05-29 13:01:27 -07:00
Andrey Volk
bb470b2507 FS-11866: [Core] FreeSWITCH Core no longer loads if database fails to connect. 2019-05-29 23:07:14 +04:00
Andrey Volk
08a6a8a2fa FS-11864: [mod_kazoo] Fix uint64_t type overflow on 32 bit platforms 2019-05-29 00:34:07 +04:00
Andrey Volk
a1f3b4862e FS-11849: [Build-System] Add mod_av based on ffmpeg and openh264 to MSI package on Windows. 2019-05-17 16:46:58 +04:00
Luis Azedo
23fbd60991 FS-11847 [mod_loopback] unregister from reloadxml 2019-05-16 13:52:33 +01:00
Luis Azedo
90438ffe78 FS-11846 [mod_kazoo] fix queue cleanup 2019-05-15 13:24:12 +01:00
Christopher Rienzo
9c131f2755 Merge pull request #1725 in FS/freeswitch from ~NOAHMEHL_REPER.IO/freeswitch:master to master
* commit '15c4647c8cf193f2188d1e3548a13a0ad720e710':
  FS-11796: [mod_http_cache] Fixed file seek in mod_http_cache.c
2019-05-14 10:50:10 -05:00
Mike Jerris
5b9b233475 Merge pull request #1718 in FS/freeswitch from ~INFOMIND/freeswitch:bugfix/FS-11826-mod_conference-channel-variables_join to master
* commit 'b7bce76da5b496400bbd9cce1f53b0be5b4b0ae1':
  FS-11826 [mod_conference] conference_member.c: channel variables (conference_join_) Fixes variables being seen as empty and proper range on conference_join_energy_level
2019-05-14 10:11:01 -05:00
David Grant
b7bce76da5 FS-11826 [mod_conference] conference_member.c: channel variables (conference_join_) Fixes variables being seen as empty and proper range on conference_join_energy_level 2019-05-13 16:29:07 -05:00
Noah Mehl
15c4647c8c FS-11796: [mod_http_cache] Fixed file seek in mod_http_cache.c
Added missing http_cache_file_seek() and http_cache_file_seek file interface references.
2019-05-13 13:56:17 -04:00
Luis Azedo
9bfa2fc5e4 FS-11838 [mod_kazoo] handle intercept 2019-05-10 18:41:23 +01:00
Mike Jerris
84ee84930c Merge pull request #1717 in FS/freeswitch from ~LAZEDO/freeswitch:bug/FS-11825 to master
* commit '669ea988340056ea313bdb718a5c93e2bcf3cf4c':
  FS-11825 [mod_sofia] use proper flag in blind auth 403 reply
2019-05-09 16:13:21 -05:00
Mike Jerris
b007a0d29c Merge pull request #1719 in FS/freeswitch from ~SILIK0N/freeswitch:master to master
* commit '7b0d25daa33f39d49cecb7e4f26b16f89e23594e':
  FS-11830 memory leak in SWITCH_STANDARD_API(enum_function)
2019-05-09 16:06:51 -05:00
Aron Podrigal
acaf903a91 FS-11159: [mod_sofia] Set transport based on our next hop, so if route_uri is present, use it. 2019-05-09 14:44:34 -06:00
Ken Rice
7b0d25daa3 FS-11830 memory leak in SWITCH_STANDARD_API(enum_function) 2019-05-06 11:19:58 -05:00
Luis Azedo
669ea98834 FS-11825 [mod_sofia] use proper flag in blind auth 403 reply 2019-05-02 01:56:12 +01:00
Andrey Volk
c86f66436e FS-11792: [core] Fix memory leak in switch_ivr_originate.c 2019-04-23 17:54:49 +04:00
Mike Jerris
743cddc947 Merge pull request #1714 in FS/freeswitch from ~LAZEDO/freeswitch:feature/FS-11791 to master
* commit 'fdd2acfbfef83ab5311a5b95a5a7676b62b40297':
  FS-11791 [mod_kazoo] fixes & improvements
2019-04-18 11:45:16 -05:00
lazedo
fdd2acfbfe FS-11791 [mod_kazoo] fixes & improvements
* tweak configuration
* customized att_xfer
* json_api with uuid support
2019-04-18 04:05:31 +01:00
lazedo
2b2f11d699 FS-11790 [mod_loopback] set correct values for Connecting-Legs 2019-04-18 03:39:06 +01:00
António Silva
1a4e4e2f78 FS-9894 [mod_callcenger] fix call timeout if agent contact as leg_timeout to higger value than 60 2019-04-15 16:15:43 +02:00
Sebastian Kemper
3ca75eb8ef FS-11783: [mod_say_ja] quiet overflow warning
With -Wformat-overflow gcc warns about calls to formatted input/output
function "sprintf" that might overflow the destination buffer.

In this case gcc does not know the upper bound of tm_min and assumes
that up to 11 bytes might be written to buffer (3 bytes). But we know
that tm_min can only be within the range 0 to 59.

mod_say_ja.c: In function 'ja_say_time':
mod_say_ja.c:376:35: error: '%d' directive writing between 2 and 10 bytes into a region of size 3 [-Werror=format-overflow=]
                  sprintf(buffer, "%d", tm.tm_min);
                                   ^~
mod_say_ja.c:376:34: note: directive argument in the range [11, 2147483647]
                  sprintf(buffer, "%d", tm.tm_min);
                                  ^~~~
mod_say_ja.c:376:18: note: 'sprintf' output between 3 and 11 bytes into a destination of size 3
                  sprintf(buffer, "%d", tm.tm_min);
                  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This commits adds a hint for gcc, which silences the warning.

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2019-04-14 19:23:52 +02:00
Sebastian Kemper
e114c6382e FS-11783: [core] quiet gcc truncation warning
With -Wstringop-truncation gcc warns about calls to bounded string
manipulation function "strncpy" that may either truncate the copied
string or leave the destination unchanged. To avoid the warning when the
result is not expected to be NUL-terminated, it is suggested to call
"memcpy" instead.

src/switch_core_media.c: In function 'switch_core_media_patch_sdp':
src/switch_core_media.c:11854:4: error: 'strncpy' output truncated before terminating nul copying 2 bytes from a string of the same length [-Werror=stringop-truncation]
    strncpy(q, strchr(a_engine->adv_sdp_ip, ':') ? "6 " : "4 ", 2);
    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This commit follows gcc's recommendation.

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2019-04-14 19:12:03 +02:00