Hi, Mark!
The best way to proceed is to add an xlog("checking $si:$sp\n") before
check_source_address(), then some useful xlog() messages on each if
branch, so we can confirm the theory that this is an OpenSIPS issue, and
not a problem specific to your setup.
Liviu Chircu
OpenSIPS Developer
http://www.opensips-solutions.com
On 23.04.2019 14:18, Mark Farmer wrote:
Should've added I'm running OpenSIPS 2.4.4
Mark.
On Tue, 23 Apr 2019 at 12:10, Mark Farmer <farm...@gmail.com
<mailto:farm...@gmail.com>> wrote:
Hi everyone,
I'm seeing some odd behaviour in tha initial requests are allowed
but RE-INVITES are resulting in 403. From my logging I can see the
INVITE coming in so I think it must be matching. Why would it not
obey and route the request?
This is the bit of my request route that identifies the source:
if (check_source_address("1","$avp(trunk_attrs)")) {
# request comes from trunks
xlog ("MF - $rm FROM $avp(trunk_attrs)");
setflag(IS_TRUNK);
} else {
send_reply("403","Forbidden");
exit;
}
Many thanks
Mark.
--
Mark Farmer
farm...@gmail.com <mailto:farm...@gmail.com>
--
Mark Farmer
farm...@gmail.com <mailto:farm...@gmail.com>
_______________________________________________
Users mailing list
Users@lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/users
_______________________________________________
Users mailing list
Users@lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/users