10986 Commits

Author SHA1 Message Date
Chris Rienzo
8be02b57ce mod_http_cache: fix unit test now that switch_b64_encode is fixed 2013-05-22 08:19:36 -04:00
Anthony Minessale
363b58dc54 FS-5453 --resolve 2013-05-21 12:01:57 -05:00
Anthony Minessale
104febbc1a FS-5376 --resolve 2013-05-21 10:04:35 -05:00
Anthony Minessale
8ac3178e45 FS-5242 2013-05-21 10:03:22 -05:00
Anthony Minessale
0cee5ac9df FS-5211 --resolve 2013-05-21 09:29:50 -05:00
Chris Rienzo
83d7b60d74 mod_http_cache: forgot to add write to http_cache:// format 2013-05-21 09:27:39 -04:00
Travis Cross
d2f3a3114e Spelling fix 2013-05-21 02:00:43 +00:00
Anthony Minessale
9cdd2be095 FS-5444 --resolve 2013-05-20 08:20:38 -05:00
Chris Rienzo
a0170bbdb2 mod_http_cache: added write file format 2013-05-20 11:18:40 -04:00
Chris Rienzo
8c8b2176d2 mod_http_cache: added native Amazon S3 support 2013-05-20 09:31:28 -04:00
Steve Underwood
fe000f18fd Fixed a weakness in error UDPTL lost packet recovery. Hopefully this addresses
FS5202.
2013-05-20 11:30:11 +08:00
William King
9ace496fe3 full_contact must be freed by sofia. There isn't a chance of this having blown anything up, but Coverity is right that this should be initialized with NULL to be safe against future refactors. 2013-05-18 19:13:18 -07:00
William King
ef1bf8e34a Was causing a very small leak on naptr lookups. Upon review just happened to be a typo missing a bang. 2013-05-18 17:50:50 -07:00
William King
508fb78e94 My bad. some how a make didn't catch this issue after a cleanup refactor. In this instance buf is being treated as an 8 byte number, not a pointer. 2013-05-18 17:46:13 -07:00
William King
291244c099 Coverity reported an Uninitialized pointer read. Upon further digging it appears that there is a code path where incoming packets can come in out of order, so this section of code tries to see if it can find the missed packets. As per FS-5202 there is a case where under heavy load the packet exists, and has most of the packet parsed, but still has a NULL pointer for the packet buffer. These two lines would at least help detect the edge case. 2013-05-18 17:34:16 -07:00
William King
45803e38e7 Edge case for when you are subscribing to presence on a valet parking lot. In which case there would be a small leak. 2013-05-18 17:06:54 -07:00
William King
d27a95a50e Possible leak if someone were to try and add extra headers to a channel that had either an inbound info on that session or the session were to be deflected. I don't see a way that these extra headers could be added outside of a C module subscribing to the session states, but just to make sure I'm adding these so that just like other extra header locations it's cleaned up. 2013-05-18 17:00:41 -07:00
William King
f718a0572f Alice meet rabit hole. There is a leak here on every invite that comes back from a status 180 when the other side is not FS, but you have presence enabled. Thanks to Coverity scan for location this condition. This 'might' not have been leaking if sofia was automatically freeing this when the sofia object was destroyed, but all other locations where sip_header_as_string where called they were all followed by a su_free, so I assume not. 2013-05-18 16:35:03 -07:00
William King
f519ad195a If the mod_sofia global presense hash is null, then make sure to free the matches variable before going to done. 2013-05-18 16:05:40 -07:00
William King
09553f424a FS-5443: --resolve leaked because the JS api's copy and return new malloc'd pointers. 2013-05-18 15:47:01 -07:00
Jeff Lenk
de0fea316e FS-5434 --resolve 2013-05-17 21:38:32 -05:00
Anthony Minessale
e03b6d0878 fix silence_stream size bug 2013-05-17 16:11:04 -05:00
Anthony Minessale
ea881b191f media/srtp refactoring pass 2013-05-17 15:39:30 -05:00
William King
8d7aa3ff65 FS-5441: --resolve 2013-05-17 12:39:17 -07:00
William King
58e205ccdb how...? 2013-05-17 11:36:31 -07:00
William King
cfeb6aaf54 Since there isn't neutral ground, on the rtmp state callback we actually have to force the write lock of the session, but we only need a try lock on removing the session from the rsession->session_hash. This removes a deadlock caused when we had to enforce with locks that the rsession couldn't be destroyed if the FS session was in the middle of a hangup. 2013-05-17 11:36:30 -07:00
William King
f24d1cde3d Seems the session wasn't coming to the hangup in a locked state. 2013-05-17 11:36:30 -07:00
William King
36f198e883 Seems having a read lock still prevents a write lock to be taken, even if the thread that is trying to get the write lock currently has the read lock. 2013-05-17 11:36:29 -07:00
William King
9b0212ab59 Include the write lock since we're changing the tech_pvt 2013-05-17 11:36:29 -07:00
Anthony Minessale
97faaab42c FS-5430 --resolve 2013-05-15 09:27:18 -05:00
Steve Underwood
11f8491170 Fixed a silly in the FAX image resolution settings 2013-05-15 01:49:58 +08:00
Anthony Minessale
81788f1192 FS-5416 --resolve just missing the part that registers it 2013-05-14 07:38:00 -05:00
Anthony Minessale
1eae2a1941 FS-5410 --resolve 2013-05-13 13:15:33 -05:00
Raymond Chandler
bba4540fe5 add context 2013-05-10 16:31:12 -04:00
Anthony Minessale
cb7a6bd34b FS-5085 the last change helped weed out the real bug which is this commit 2013-05-10 10:45:28 -05:00
Anthony Minessale
bb6b02f2d6 FS-5403 --resolve 2013-05-10 09:59:02 -05:00
Steve Underwood
d501c77566 Relax the image resolutions supported for FAX 2013-05-10 21:44:17 +08:00
Anthony Minessale
16690e491d FS-5399 --resolve 2013-05-09 14:05:09 -05:00
Giovanni Maruzzelli
0330520eba test 2, please ignore 2013-05-09 17:00:54 +00:00
root
0fe65187cd test, please ignore 2013-05-09 16:59:39 +00:00
William King
9fa4bed8e3 FS-5395: False alarm on a reported valgrind memory leak. The io_private is alloc'd from a memory pool which valgrind sucks at tracking. No need to free this, because it'll get cleared when the memory pool on the rsession is destroyed. 2013-05-08 18:45:24 -07:00
William King
b3117e8f88 FS-5395: --resolve Resolve another mod_rtmp crash where oh specific hangup scenarios there would be a free of variable that wasn't ever malloced 2013-05-08 16:54:05 -07:00
Anthony Minessale
0a68bee88e FS-5085 I discovered that the bowout is happening from both legs at once, we only need to check this condition on the A side of the loopback bridge 2013-05-08 13:17:07 -05:00
Brian West
7c0dc4c25d Undo previous change 2013-05-08 14:40:10 -05:00
Raymond Chandler
58a127fe65 FS-5327 --resolve 2013-05-08 13:52:48 -04:00
Raymond Chandler
e88126c95a FS-5288 --resolve 2013-05-08 12:53:31 -04:00
William King
0d5888de2f Revert "fixed stuck mod_rtmp session when the call is killed from fs side, such as using uuid_kill"
This reverts commit d8edc031faa41d4e570aad1e347a0ed6c0d6c1d8.

Conflicts:
	src/mod/endpoints/mod_rtmp/mod_rtmp.c
2013-05-07 16:04:54 -07:00
Anthony Minessale
01a748869d regression parsing rtp-timeout-sec from the profile 2013-05-07 08:50:02 -05:00
Anthony Minessale
ff05e5f2c7 FS-5383 --resolve 2013-05-07 08:31:23 -05:00
Ken Rice
7952f7c547 fix mod_spandsp on systems with libjbig 2013-05-06 18:23:54 -05:00