Hello,
can you try to change the module exports for uac module and allow
uac_auth() for REQUEST_ROUTE or BRANCH_FAILURE_ROUTE (not sure right now
by heart which one is required) and see if it actually works. Then the
flags can be extended if all ok.
Cheers,
Daniel
On 29/08/16 11:22, Daniel Tryba wrote:
On Fri, Aug 26, 2016 at 01:58:57PM +0200,
Daniel-Constantin Mierla wrote:
try to see if it works to do the authentication
in the branch failure
event route. There you can do processing as soon as the 401 arrives --
it has to be tried to see if uac auth works fine there, if not probably
needs some tuning.
Good idea, but uac_auth isn't allowed in such a block:
# kamailio -c
loading modules under config path: /usr/lib/x86_64-linux-gnu/kamailio/modules/
0(46160) ERROR: <core> [cfg.y:3224]: yyparse(): misused command uac_auth
0(46160) : <core> [cfg.y:3368]: yyerror_at(): parse error in config file
/etc/kamailio/kamailio.cfg, line 617, column 12: Command cannot be used in the block
ERROR: bad config file (1 errors)
612: event_route[tm:branch-failure:authfailure] {
613: if (t_check_status("401|407") &&
$(avp(dst_au){s.len})>0 && $(avp(dst_passwd){s.len})>0)
614: {
615: $avp(auser) = $avp(dst_au);
616: $avp(apass) = $avp(dst_passwd);
617: uac_auth();
618:
619: t_relay();
620: exit;
621: }
}
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users(a)lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users