dear list,
i'm still working on the billing system... there'r
a few things left like active calls and active registers...
from openser database, in "location" table i can
read current registered users, and it's easy to make a PHP from there to show
"active registers" from a web page. but in addition to it, i wan to see
active calls, is there a specific way to do it from ser.cfg or database
?
debug=3
fork=yes
log_stderror=no
listen=212.XXX.104.XXX
port=5060
children=4
alias=212.XXX.104.XXX
dns=no
rev_dns=no
fifo="/tmp/openser_fifo"
fifo_db_url="mysql://openser:openserrw@localhost/openser"
loadmodule
"/usr/local/lib/openser/modules/mysql.so"
loadmodule
"/usr/local/lib/openser/modules/sl.so"
loadmodule
"/usr/local/lib/openser/modules/tm.so"
loadmodule
"/usr/local/lib/openser/modules/rr.so"
loadmodule
"/usr/local/lib/openser/modules/maxfwd.so"
loadmodule
"/usr/local/lib/openser/modules/usrloc.so"
loadmodule
"/usr/local/lib/openser/modules/registrar.so"
loadmodule
"/usr/local/lib/openser/modules/auth.so"
loadmodule
"/usr/local/lib/openser/modules/auth_db.so"
loadmodule
"/usr/local/lib/openser/modules/uri.so"
loadmodule
"/usr/local/lib/openser/modules/uri_db.so"
loadmodule
"/usr/local/lib/openser/modules/mediaproxy.so"
loadmodule
"/usr/local/lib/openser/modules/nathelper.so"
loadmodule
"/usr/local/lib/openser/modules/textops.so"
loadmodule
"/usr/local/lib/openser/modules/domain.so"
loadmodule
"/usr/local/lib/openser/modules/acc.so"
modparam("auth_db", "calculate_ha1",
1)
modparam("auth_db", "password_column", "password")
modparam("auth_db",
"use_domain", 1)
modparam("domain", "db_mode", 1)
modparam("nathelper", "rtpproxy_disable",
1)
modparam("nathelper", "natping_interval", 180)
modparam("mediaproxy","natping_interval",
30)
modparam("mediaproxy","mediaproxy_socket",
"/var/run/mediaproxy.sock")
modparam("mediaproxy","sip_asymmetrics","/usr/local/etc/openser/sip-asymmetric-clients")
modparam("mediaproxy","rtp_asymmetrics","/usr/local/etc/openser/rtp-asymmetric-clients")
modparam("usrloc", "db_mode",
2)
modparam("usrloc", "use_domain", 1)
modparam("registrar", "default_expires",
60)
modparam("registrar", "min_expires", 30)
modparam("registrar",
"nat_flag", 6)
modparam("registrar", "use_domain", 1)
modparam("rr", "enable_full_lr", 1)
modparam("acc", "db_url",
"mysql://openser:openserrw@localhost/openser")
modparam("acc",
"failed_transactions", 1)
modparam("acc", "log_level", 1)
modparam("acc",
"log_flag", 1)
modparam("acc", "db_flag", 1)
route {
#
-----------------------------------------------------------------
# Sanity Check Section
#
-----------------------------------------------------------------
if (!mf_process_maxfwd_header("10"))
{
sl_send_reply("483", "Too Many
Hops");
break;
};
if
(msg:len > max_len)
{
sl_send_reply("513", "Message
Overflow");
break;
};
#
-----------------------------------------------------------------
# Record Route Section and Acc
section
#
-----------------------------------------------------------------
if (method=="INVITE" && client_nat_test("3"))
{
record_route_preset("212.XXX.104.XXX:5060;nat=yes");
} else if (method!="REGISTER") {
if!(uri=~"^sip:833[0-9]*@")
{
record_route();
setflag(1);
}
};
#
-----------------------------------------------------------------
# Call Tear Down Section
#
-----------------------------------------------------------------
if (method=="BYE" || method=="CANCEL")
{
end_media_session();
};
#
-----------------------------------------------------------------
# Loose Route Section
#
-----------------------------------------------------------------
if (loose_route()) {
if (has_totag() && (method=="INVITE" || method=="ACK")) {
if (client_nat_test("3") || search("^Route:.*;nat=yes"))
{
setflag(6);
use_media_proxy();
};
};
route(1);
break;
};
#
-----------------------------------------------------------------
# Call Type Processing Section
#
-----------------------------------------------------------------
if
(uri!=myself)
{
route(1);
break;
};
if
(uri==myself) {
if (method=="CANCEL")
{
route(3);
break;
} else if (method=="INVITE")
{
route(3);
break;
} else if (method=="REGISTER")
{
route(2);
break;
};
lookup("aliases");
if (uri!=myself)
{
route(1);
break;
};
if (!lookup("location"))
{
sl_send_reply("404", "User Not
Found");
break;
};
};
route(1);
}
route[1] {
#
-----------------------------------------------------------------
# Default Message Handler
#
-----------------------------------------------------------------
t_on_reply("1");
if
(!t_relay()) {
if (method=="INVITE" || method=="ACK")
{
end_media_session();
};
sl_reply_error();
};
}
route[2] {
#
-----------------------------------------------------------------
# REGISTER Message Handler
#
----------------------------------------------------------------
if
(!search("^Contact:\ +\*") && client_nat_test("7"))
{
setflag(6);
fix_nated_register();
force_rport();
};
sl_send_reply("100", "Trying");
if
(!www_authorize("","subscriber"))
{
www_challenge("","0");
break;
};
if
(!check_to())
{
sl_send_reply("401",
"Unauthorized");
break;
};
consume_credentials();
if
(!save("location"))
{
sl_reply_error();
};
}
route[3] {
#
-----------------------------------------------------------------
# CANCEL and INVITE Message
Handler
#
-----------------------------------------------------------------
if
(client_nat_test("3"))
{
setflag(7);
force_rport();
fix_nated_contact();
};
lookup("aliases");
if
(uri!=myself)
{
route(1);
break;
};
if
(uri=~"^sip:0[0-9]*@*")
{
rewritehost("195.XXX.122.XXX"); # this is our PSTN
gateway
route(1);
break;
};
if
(!lookup("location"))
{
sl_send_reply("404", "User Not
Found");
break;
};
if
(method=="CANCEL")
{
route(1);
break;
};
if
(!proxy_authorize("","subscriber"))
{
proxy_challenge("","0");
break;
} else if (!check_from())
{
sl_send_reply("403", "Use
From=ID");
break;
};
consume_credentials();
if
(isflagset(6) || isflagset(7))
{
use_media_proxy();
};
route(1);
}
onreply_route[1] {
if
((isflagset(6) || isflagset(7)) && (status=~"(180)|(183)|2[0-9][0-9]"))
{
if (!search("^Content-Length:\ +0"))
{
use_media_proxy();
};
};
if
(client_nat_test("1"))
{
fix_nated_contact();
};
}