opensips源码分析





以下只分析记录关键路径和关键函数:


一、代码分析:
main.c


1、main()函数:


注册一些关键模块:
register_builtin_modules();


解析opensips.cfg配置文件
yyparse();
注:cfg脚本文件的解析是通过lex和yacc工具完成的,通过他们可以使opensips.cfg的执行速度达到c语言级别


枚举本服务器上的所有ip和本服务端口:
fix_all_socket_lists();


2、main_loop()函数:

进入到主要的主循环函数:
main_loop();

如果支持udp,则会启动这个循环:
udp_rcv_loop();

如果支持tcp,则首先调用tcp_init_children()初始化tcp子进程和父进程。

             
              if (tcp_init_children(&chd_rank)<0) goto error;

此处很关键,opensips在此函数中,调用socketpair()来构造unix socket对,
分别分配给父进程和子进程,也就是说真正的sip服务,是由子进程来完成的,示例:

“客户端请求->TCP父进程->sendmsg/recvmsg传递socket->子进程接收客户端请求->子进程进行业务处理”

因此每个子进程都在以下这个函数中循环等待父进程转发的请求:

                     tcp_receive_loop(reader_fd[1]);
                     exit(-1);
                    
其过程参考的日志如下:
Sep 24 18:30:04 [14405] DBG:core:handle_io: >>>>>>>> come in   handle_io() in tcp_main file, fm->type=1, idx=-1
Sep 24 18:30:04 [14405] DBG:core:probe_max_sock_buff: getsockopt: snd is initially 262142
Sep 24 18:30:04 [14405] INFO:core:probe_max_sock_buff: using snd buffer of 255 kb
Sep 24 18:30:04 [14405] DBG:core:print_ip: tcpconn_new: new tcp connection to: 113.108.148.114
Sep 24 18:30:04 [14405] DBG:core:tcpconn_new: on port 13599, type 2
Sep 24 18:30:04 [14405] DBG:core:tcpconn_add: hashes: 366, 1
Sep 24 18:30:04 [14405] DBG:core:handle_new_connect: new connection: 0x2b0f383704c0 35 flags: 0002
Sep 24 18:30:04 [14405] DBG:core:send2child: to tcp child 0 0(14397), 0x2b0f383704c0
Sep 24 18:30:04 [14397] DBG:core:handle_io: received n=8 con=0x2b0f383704c0, fd=30
Sep 24 18:30:04 [14397] DBG:core:io_watch_add: io_watch_add(0x779b40, 30, 2, 0x2b0f383704c0), fd_no=1
Sep 24 18:30:04 [14397] DBG:core:tcp_read_req: >>>>>>>>> come in tcp_read_req function now !
Sep 24 18:30:04 [14397] DBG:core:tcp_read_req: content-length= 481
Sep 24 18:30:04 [14397] DBG:core:receive_msg: >>>> recv msg=                    


在初始化完父子进程后,则启动外部连接的监听循环:
tcp_main_loop()

tcp_main_loop()此函数中多次调用io_watch_add(),用于添加所需要的监听端口;
      
进入main_loop循环,在此循环中,根据支持的epoll/select/poll等方式来等待客户端连接

      
       switch(io_h.poll_method){

以io_wait_loop_poll()为例继续分析:
在此函数中,循环检查所有的socket,当发现可读或可写之后 ,调用handle_io()函数处理。

                            while((handle_io(get_fd_map(h, h->fd_array[r].fd), r) > 0)
                                           && repeat);

tcp_main.c
      
当有新连接请求时,通过handle_io()函数中的handle_new_connect()处理:

tcp_main.c文件:
              case F_SOCKINFO:
                     ret=handle_new_connect((struct socket_info*)fm->data);


在handle_new_connect()函数中,先接受客户端的请求,然后把此socket通过sendmsg方式,
发送给TCP子进程处理(请参考sendmsg/recvmsg来传递socket的方式 / SOL_SOCKET,参考上述章节部分描述):

              if(send2child(tcpconn)<0){

此时,父进程在tcp_receive_loop()函数的循环中捕获了这个请求,因此进入tcp_read.c文件中的tcp_read_req()函数,

tcp_read.c文件:
                                   nfds--;
                                   resp=tcp_read_req(con);

继续进入最重要的处理函数 receive_msg():

receive.c文件:
      
                     } else if (receive_msg(req->start, req->parsed-req->start,
                     &con->rcv)<0) {

在receive_msg()函数中,首先解析客户端的请求消息:

       if (parse_msg(buf,len, msg)!=0){
              LM_ERR("parse_msg failed\n");
              goto parse_error;
       }
       LM_DBG("After parse_msg...\n");

解析消息完成后,进入cfg配置文件的脚步处理过程,非常关键:

             
              run_top_route(rlist[DEFAULT_RT].a, msg);

此函数接连调用action.c文件中的函数:run_actions(), run_action_list(), do_action(),
最后的do_action()函数,负责对脚本的逐步解析和处理,由下一章节专门处理。

在receive_msg()函数处理完成后,总会看到这行日志:

       LM_DBG("cleaning up\n");

二、opensips.cfg的配置文件解析过程示例:
sip业务的处理逻辑,是由opensips.cfg配置文件后半部分的脚本来处理的,其中的
处理函数就是action.c文件中的do_action(),我在此函数开始部分增加了一行调试日志:


LM_DBG(">>>>>  do action !!, type = %d\n", (unsigned char)a->type);


有助于分析每一步脚本的执行,其中if代表type=14, 执行module函数代表type=15,xlog代表type=73等等,
可以参考以下日志来理解这个脚本的控制:


Sep 23 19:41:51 [4580] DBG:core:receive_msg: After parse_msg...
Sep 23 19:41:51 [4580] DBG:core:receive_msg: preparing to run routing scripts...
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (!mf_process_maxfwd_header("10")) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (!mf_process_maxfwd_header("10")) {
Sep 23 19:41:51 [4580] DBG:core:parse_headers: flags=100
Sep 23 19:41:51 [4580] DBG:core:parse_to: end of header reached, state=10
Sep 23 19:41:51 [4580] DBG:core:parse_to: display={}, ruri={sip:[email protected]}
Sep 23 19:41:51 [4580] DBG:core:get_hdr_field: [26]; uri=[sip:[email protected]]
Sep 23 19:41:51 [4580] DBG:core:get_hdr_field: to body [
]
Sep 23 19:41:51 [4580] DBG:core:get_hdr_field: cseq : <21>
Sep 23 19:41:51 [4580] DBG:maxfwd:is_maxfwd_present: value = 70
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (has_totag()) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (has_totag()) {
Sep 23 19:41:51 [4580] DBG:uri:has_totag: no totag
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (is_method("CANCEL"))
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (is_method("CANCEL"))
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //t_check_trans();
Sep 23 19:41:51 [4580] DBG:core:parse_headers: flags=78
Sep 23 19:41:51 [4580] DBG:tm:t_lookup_request: start searching: hash=43376, isACK=0
Sep 23 19:41:51 [4580] DBG:tm:matching_3261: RFC3261 transaction matching failed
Sep 23 19:41:51 [4580] DBG:tm:t_lookup_request: no transaction found
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (!(method=="REGISTER") && from_uri==myself)
Sep 23 19:41:51 [4580] DBG:core:parse_to_param: tag=1829577472
Sep 23 19:41:51 [4580] DBG:core:parse_to: end of header reached, state=29
Sep 23 19:41:51 [4580] DBG:core:parse_to: display={}, ruri={sip:[email protected]}
Sep 23 19:41:51 [4580] DBG:core:grep_sock_info: checking if host==us: 14==9 &&  [121.14.161.187] == [127.0.0.1]
Sep 23 19:41:51 [4580] DBG:core:grep_sock_info: checking if port 5060 matches port 5060
Sep 23 19:41:51 [4580] DBG:core:grep_sock_info: checking if host==us: 14==14 &&  [121.14.161.187] == [121.14.161.187]
Sep 23 19:41:51 [4580] DBG:core:grep_sock_info: checking if port 5060 matches port 5060
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    // if (!proxy_authorize("", "subscriber")) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    // if (!proxy_authorize("", "subscriber")) {
Sep 23 19:41:51 [4580] DBG:auth:check_nonce: comparing [4e7c709d000000115b6b5404037523279ba28306b57e2ac9] and [4e7c709d000000115b6b5404037523279ba28306b57e2ac9]
Sep 23 19:41:51 [4580] DBG:db_mysql:has_stmt_ctx: ctx found for subscriber
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_do_prepared_query: conn=0x7c8610 (tail=8146720) MC=0x7c6028
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_do_prepared_query: set values for the statement run
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_val2bind: added val (0): len=4; type=254; is_null=0
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_do_prepared_query: doing BIND_PARAM in...
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_do_prepared_query: prepared statement has 1 columns in result
Sep 23 19:41:51 [4580] DBG:core:db_new_result: allocate 48 bytes for result set at 0x7d7cc0
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_get_columns: 1 columns returned from the query
Sep 23 19:41:51 [4580] DBG:core:db_allocate_columns: allocate 28 bytes for result columns at 0x7d7728
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_get_columns: RES_NAMES(0x7d7730)[0]=[password]
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_get_columns: use DB_STRING result type
Sep 23 19:41:51 [4580] DBG:core:db_allocate_rows: allocate 48 bytes for result rows and values at 0x7d79a0
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_str2val: converting STRING [max]
Sep 23 19:41:51 [4580] DBG:auth_db:get_ha1: HA1 string calculated: f213458fbed991c73058baa72389d249
Sep 23 19:41:51 [4580] DBG:auth:check_response: our result = 'e9dc8829d555d4f028ee2b3075ce9b3f'
Sep 23 19:41:51 [4580] DBG:auth:check_response: authorization is OK
Sep 23 19:41:51 [4580] DBG:auth:post_auth: nonce index= 17
Sep 23 19:41:51 [4580] DBG:core:db_free_columns: freeing result columns at 0x7d7728
Sep 23 19:41:51 [4580] DBG:core:db_free_rows: freeing 1 rows
Sep 23 19:41:51 [4580] DBG:core:db_free_row: freeing row values at 0x7d79b0
Sep 23 19:41:51 [4580] DBG:core:db_free_rows: freeing rows at 0x7d79a0
Sep 23 19:41:51 [4580] DBG:core:db_free_result: freeing result set at 0x7d7cc0
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (!db_check_from()) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (!db_check_from()) {
Sep 23 19:41:51 [4580] DBG:uri:check_username: Digest username and URI username match
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //consume_credentials();
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (loose_route()) {  
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (loose_route()) {  
Sep 23 19:41:51 [4580] DBG:core:parse_headers: flags=200
Sep 23 19:41:51 [4580] DBG:core:get_hdr_field: content_length=388
Sep 23 19:41:51 [4580] DBG:core:get_hdr_field: found end of header
Sep 23 19:41:51 [4580] DBG:rr:find_first_route: No Route headers found
Sep 23 19:41:51 [4580] DBG:rr:loose_route: There is no Route HF
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (!is_method("REGISTER|MESSAGE"))
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (is_method("INVITE")) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //record_route();
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (is_method("INVITE")) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (is_method("INVITE")) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 17      //setflag(1); # do accounting
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14      //if (!uri==myself)
Sep 23 19:41:51 [4580] DBG:core:grep_sock_info: checking if host==us: 14==9 &&  [121.14.161.187] == [127.0.0.1]
Sep 23 19:41:51 [4580] DBG:core:grep_sock_info: checking if port 5060 matches port 5060
Sep 23 19:41:51 [4580] DBG:core:grep_sock_info: checking if host==us: 14==14 &&  [121.14.161.187] == [121.14.161.187]
Sep 23 19:41:51 [4580] DBG:core:grep_sock_info: checking if port 5060 matches port 5060
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (is_method("PUBLISH"))
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (is_method("PUBLISH"))
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (is_method("REGISTER"))
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15      //if (is_method("REGISTER"))
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14      // if ($rU==NULL) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15      // alias_db_lookup("dbaliases");
Sep 23 19:41:51 [4580] DBG:core:db_new_result: allocate 48 bytes for result set at 0x7d92a0
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_get_columns: 2 columns returned from the query
Sep 23 19:41:51 [4580] DBG:core:db_allocate_columns: allocate 56 bytes for result columns at 0x7d9308
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_get_columns: RES_NAMES(0x7d9318)[0]=[username]
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_get_columns: use DB_STRING result type
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_get_columns: RES_NAMES(0x7d9328)[1]=[domain]
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_get_columns: use DB_STRING result type
Sep 23 19:41:51 [4580] DBG:db_mysql:db_mysql_convert_rows: no rows returned from the query
Sep 23 19:41:51 [4580] DBG:alias_db:alias_db_query: no alias found for R-URI
Sep 23 19:41:51 [4580] DBG:core:db_free_columns: freeing result columns at 0x7d9308
Sep 23 19:41:51 [4580] DBG:core:db_free_rows: freeing 0 rows
Sep 23 19:41:51 [4580] DBG:core:db_free_result: freeing result set at 0x7d92a0
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 73 // xlog("----------- come here before lookup -------------\n");
Sep 23 19:41:51 [4580] INFO:core:buf_init: initializing...
----------- come here before lookup -------------
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15   //if (!lookup("location","m")) {
Sep 23 19:41:51 [4580] DBG:registrar:lookup: setting as ruri
Sep 23 19:41:51 [4580] DBG:registrar:lookup: looking for branches
Sep 23 19:41:51 [4580] DBG:registrar:lookup: setting branch
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 73    // xlog("----------- come here before setflag -----------");
----------- come here before setflag -------------
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 17     //setflag(2);
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 6    // route(1);   local function
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 73    //xlog("----------- come here in route 1 -------------\n");
----------- come here in route 1 -------------
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (is_method("INVITE")) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (is_method("INVITE")) {    
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //t_on_branch("2");
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //t_on_reply("2");
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //t_on_failure("1");
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 14    //if (!t_relay()) {
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 15    //if (!t_relay()) {
Sep 23 19:41:51 [4580] DBG:tm:t_newtran: transaction on entrance=(nil)
Sep 23 19:41:51 [4580] DBG:core:parse_headers: flags=ffffffffffffffff
Sep 23 19:41:51 [4580] DBG:core:parse_headers: flags=78
Sep 23 19:41:51 [4580] DBG:tm:t_lookup_request: start searching: hash=43376, isACK=0
Sep 23 19:41:51 [4580] DBG:tm:matching_3261: RFC3261 transaction matching failed
Sep 23 19:41:51 [4580] DBG:tm:t_lookup_request: no transaction found
Sep 23 19:41:51 [4580] DBG:tm:run_reqin_callbacks: trans=0x2b3767cd3a20, callback type 1, id 0 entered
Sep 23 19:41:51 [4580] DBG:core:parse_headers: flags=78
Sep 23 19:41:51 [4580] DBG:core:parse_headers: flags=ffffffffffffffff
Sep 23 19:41:51 [4580] DBG:core:check_ip_address: params 113.108.148.114, 192.168.172.142, 0
Sep 23 19:41:51 [4580] DBG:core:_shm_resize: resize(0) called
Sep 23 19:41:51 [4580] DBG:core:tcp_send: tcp connection found (0x2b3767cc3880), acquiring fd
Sep 23 19:41:51 [4580] DBG:core:tcp_send: c= 0x2b3767cc3880, n=16
Sep 23 19:41:51 [4589] DBG:core:handle_ser_child: read response= 2b3767cc3880, 1, fd -1 from 16 (4580)
Sep 23 19:41:51 [4580] DBG:core:tcp_send: after receive_fd: c= 0x2b3767cc3880 n=8 fd=31
Sep 23 19:41:51 [4580] DBG:core:tcp_send: sending...
Sep 23 19:41:51 [4580] DBG:core:tcp_send: after write: c= 0x2b3767cc3880 n=308 fd=31
Sep 23 19:41:51 [4580] DBG:core:tcp_send: buf=
SIP/2.0 100 Giving a try
Via: SIP/2.0/TCP 192.168.172.142:1168;rport=6767;branch=z9hG4bK2121284540;received=113.108.148.114
From: ;tag=1829577472
To:
Call-ID: 94874130
CSeq: 21 INVITE
Server: OpenSIPS (1.7.0-notls (x86_64/linux))
Content-Length: 0




Sep 23 19:41:51 [4580] DBG:tm:_reply_light: reply sent out. buf=0x7da3a0: SIP/2.0 1..., shmem=0x2b3767cd6fb8: SIP/2.0 1
Sep 23 19:41:51 [4580] DBG:tm:_reply_light: finished
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 73
new branch at sip:[email protected];line=dc4c7833fc0bc50
Sep 23 19:41:51 [4580] DBG:core:mk_proxy: >>>> doing DNS lookup...name=⊕}, port=0
Sep 23 19:41:51 [4580] DBG:core:build_req_buf_from_sip_req: id added: <;i=4>, rcv proto=2
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 73
new branch at sip:[email protected]:3879;line=dc4c7833fc0bc50
Sep 23 19:41:51 [4580] DBG:core:mk_proxy: >>>> doing DNS lookup...name=甫}, port=3879
Sep 23 19:41:51 [4580] DBG:core:build_req_buf_from_sip_req: id added: <;i=4>, rcv proto=2
Sep 23 19:41:51 [4580] DBG:tm:set_timer: relative timeout is 500000
Sep 23 19:41:51 [4580] DBG:tm:insert_timer_unsafe: [4]: 0x2b3767cd3c40 (447300000)
Sep 23 19:41:51 [4580] DBG:tm:set_timer: relative timeout is 30
Sep 23 19:41:51 [4580] DBG:tm:insert_timer_unsafe: [0]: 0x2b3767cd3c70 (476)
Sep 23 19:41:51 [4580] DBG:tm:set_timer: relative timeout is 500000
Sep 23 19:41:51 [4580] DBG:tm:insert_timer_unsafe: [4]: 0x2b3767cd3e40 (447300000)
Sep 23 19:41:51 [4580] DBG:tm:set_timer: relative timeout is 30
Sep 23 19:41:51 [4580] DBG:tm:insert_timer_unsafe: [0]: 0x2b3767cd3e70 (476)
Sep 23 19:41:51 [4580] DBG:tm:t_relay_to: new transaction fwd'ed
Sep 23 19:41:51 [4580] DBG:core:do_action: >>>>>  do action !!, type = 42
Sep 23 19:41:51 [4580] DBG:tm:t_unref: UNREF_UNSAFE: [0x2b3767cd3a20] after is 0
Sep 23 19:41:51 [4580] DBG:core:destroy_avp_list: destroying list (nil)
Sep 23 19:41:51 [4580] DBG:core:receive_msg: cleaning up




三、我的配置文件参考如下,可以对应上述的日志进行分析:


#
# $Id: opensips.cfg 8141 2011-07-08 12:17:13Z vladut-paiu $
#
# OpenSIPS basic configuration script
#     by Anca Vamanu
#
# Please refer to the Core CookBook at:
#      http://www.opensips.org/Resources/DocsCookbooks
# for a explanation of possible statements, functions and parameters.
#




####### Global Parameters #########


debug=10
log_stderror=yes
log_facility=LOG_LOCAL0


fork=yes
children=4




#debug=6
#fork=no
#log_stderror=yes




#disable_tcp=yes




#disable_dns_blacklist=no




#dns_try_ipv6=yes




#auto_aliases=no




#disable_tls = no
#listen = tls:your_IP:5061
#tls_verify_server = 1
#tls_verify_client = 1
#tls_require_client_certificate = 0
#tls_method = TLSv1
#tls_certificate = "/home/max/opensips//etc/opensips/tls/user/user-cert.pem"
#tls_private_key = "/home/max/opensips//etc/opensips/tls/user/user-privkey.pem"
#tls_ca_list = "/home/max/opensips//etc/opensips/tls/user/user-calist.pem"


# default db_url to be used by modules requiring DB connection
db_default_url="mysql://opensips:[email protected]:8306/opensips"




port=5060




#listen=udp:192.168.1.2:5060




####### Modules Section ########


#set module path
mpath="/home/max/opensips//lib64/opensips/modules/"




loadmodule "db_mysql.so"
loadmodule "signaling.so"
loadmodule "sl.so"
loadmodule "tm.so"
loadmodule "rr.so"
loadmodule "maxfwd.so"
loadmodule "usrloc.so"
loadmodule "registrar.so"
loadmodule "textops.so"
loadmodule "mi_fifo.so"
loadmodule "uri.so"
loadmodule "acc.so"


loadmodule "auth.so"
loadmodule "auth_db.so"


loadmodule "alias_db.so"


loadmodule "domain.so"


#loadmodule "presence.so"
#loadmodule "presence_xml.so"




# ----------------- setting module-specific parameters ---------------




# ----- mi_fifo params -----
modparam("mi_fifo", "fifo_name", "/tmp/opensips_fifo")




# ----- rr params -----
# do not append from tag to the RR (no need for this script)
modparam("rr", "append_fromtag", 0)




# ----- registrar params -----


#modparam("registrar", "max_contacts", 10)




# ----- usrloc params -----
#modparam("usrloc", "db_mode",   0)


#modparam("usrloc", "db_mode",   2)
#modparam("usrloc", "db_url",
#    "mysql://opensips:[email protected]:8306/opensips")




# ----- uri params -----
modparam("uri", "use_uri_table", 0)




# ----- acc params -----


modparam("acc", "early_media", 1)
modparam("acc", "report_cancels", 1)


modparam("acc", "detect_direction", 0)


modparam("acc", "failed_transaction_flag", 3)
modparam("acc", "log_flag", 1)
modparam("acc", "log_missed_flag", 2)


modparam("acc", "db_flag", 1)
modparam("acc", "db_missed_flag", 2)




# ----- auth_db params -----


modparam("auth_db", "calculate_ha1", yes)
modparam("auth_db", "password_column", "password")
modparam("auth_db", "db_url",
    "mysql://opensips:[email protected]:8306/opensips")
modparam("auth_db", "load_credentials", "")




# ----- alias_db params -----


modparam("alias_db", "db_url",
    "mysql://opensips:[email protected]:8306/opensips")




# ----- domain params -----


#modparam("domain", "db_url",
#    "mysql://opensips:[email protected]:8306/opensips")
#modparam("domain", "db_mode", 1)   # Use caching




# ----- multi-module params -----


#modparam("auth_db|usrloc|uri", "use_domain", 1)




# ----- presence params -----


#modparam("presence|presence_xml", "db_url",
#    "mysql://opensips:[email protected]:8306/opensips")
#modparam("presence_xml", "force_active", 1)
#modparam("presence", "server_address", "sip:192.168.1.2:5060")




####### Routing Logic ########




# main request routing logic


route{


    if (!mf_process_maxfwd_header("10")) {
        sl_send_reply("483","Too Many Hops");
        exit;
    }


    if (has_totag()) {
        # sequential request withing a dialog should
        # take the path determined by record-routing
        if (loose_route()) {
            if (is_method("BYE")) {
                setflag(1); # do accounting ...
                setflag(3); # ... even if the transaction fails
            } else if (is_method("INVITE")) {
                # even if in most of the cases is useless, do RR for
                # re-INVITEs alos, as some buggy clients do change route set
                # during the dialog.
                record_route();
            }
            # route it out to whatever destination was set by loose_route()
            # in $du (destination URI).
            route(1);
        } else {
            
            ##if (is_method("SUBSCRIBE") && $rd == "your.server.ip.address") {
            ##    # in-dialog subscribe requests
            ##    route(2);
            ##    exit;
            ##}
            if ( is_method("ACK") ) {
                if ( t_check_trans() ) {
                    # non loose-route, but stateful ACK; must be an ACK after
                    # a 487 or e.g. 404 from upstream server
                    t_relay();
                    exit;
                } else {
                    # ACK without matching transaction ->
                    # ignore and discard
                    exit;
                }
            }
            sl_send_reply("404","Not here");
        }
        exit;
    }


    #initial requests


    # CANCEL processing
    if (is_method("CANCEL"))
    {
        if (t_check_trans())
            t_relay();
        exit;
    }


    t_check_trans();


    # authenticate if from local subscriber (uncomment to enable auth)
    # authenticate all initial non-REGISTER request that pretend to be
    # generated by local subscriber (domain from FROM URI is local)
    if (!(method=="REGISTER") && from_uri==myself)
    ##if (!(method=="REGISTER") && is_from_local()) 
    {
        if (!proxy_authorize("", "subscriber")) {
            proxy_challenge("", "0");
            exit;
        }
        if (!db_check_from()) {
            sl_send_reply("403","Forbidden auth ID");
            exit;
        }
    
        consume_credentials();
        # caller authenticated
    }


    # preloaded route checking
    if (loose_route()) {
        xlog("L_ERR",
        "Attempt to route with preloaded Route's [$fu/$tu/$ru/$ci]");
        if (!is_method("ACK"))
            sl_send_reply("403","Preload Route denied");
        exit;
    }


    # record routing
    if (!is_method("REGISTER|MESSAGE"))
        record_route();


    # account only INVITEs
    if (is_method("INVITE")) {
        setflag(1); # do accounting
    }
    if (!uri==myself)
    ## replace with following line if multi-domain support is used
    ##if (!is_uri_host_local())
    {
        append_hf("P-hint: outbound\r\n");
        # if you have some interdomain connections via TLS
        ##if($rd=="tls_domain1.net") {
        ##    t_relay("tls:domain1.net");
        ##    exit;
        ##} else if($rd=="tls_domain2.net") {
        ##    t_relay("tls:domain2.net");
        ##    exit;
        ##}
        route(1);
    }


    # requests for my domain


    ## uncomment this if you want to enable presence server
    ##   and comment the next 'if' block
    ##   NOTE: uncomment also the definition of route[2] from  below
    ##if( is_method("PUBLISH|SUBSCRIBE"))
    ##        route(2);


    if (is_method("PUBLISH"))
    {
        sl_send_reply("503", "Service Unavailable");
        exit;
    }
    


    if (is_method("REGISTER"))
    {
        # authenticate the REGISTER requests (uncomment to enable auth)
        if (!www_authorize("", "subscriber"))
        {
            www_challenge("", "0");
            exit;
        }
        
        if (!db_check_to())
        {
            sl_send_reply("403","Forbidden auth ID");
            exit;
        }


        if (!save("location"))
            sl_reply_error();


        exit;
    }


    if ($rU==NULL) {
        # request with no Username in RURI
        sl_send_reply("484","Address Incomplete");
        exit;
    }


    # apply DB based aliases (uncomment to enable)
    alias_db_lookup("dbaliases");


    xlog("----------- come here before lookup -------------\n");
    # do lookup with method filtering
    if (!lookup("location","m")) {
        switch ($retcode) {
            case -1:
            case -3:
                xlog("----------- come here before t_newtran -------------\n");
                t_newtran();
                t_reply("404", "Not Found");
                exit;
            case -2:
                sl_send_reply("405", "Method Not Allowed");
                exit;
        }
    }


    xlog("----------- come here before setflag -------------\n");


    # when routing via usrloc, log the missed calls also
    setflag(2);


    route(1);
}




route[1] {


    xlog("----------- come here in route 1 -------------\n");
    
    # for INVITEs enable some additional helper routes
    if (is_method("INVITE")) {
        t_on_branch("2");
        t_on_reply("2");
        t_on_failure("1");
    }


    if (!t_relay()) {
        sl_reply_error();
    };
    exit;
}




# Presence route


#route[2]
#{
#    if (!t_newtran())
#    {
#        sl_reply_error();
#        exit;
#    };
#
#    if(is_method("PUBLISH"))
#    {
#        handle_publish();
#    }
#    else
#    if( is_method("SUBSCRIBE"))
#    {
#        handle_subscribe();
#    }
#
#    exit;
#}




branch_route[2] {
    xlog("new branch at $ru\n");
}




onreply_route[2] {
    xlog("incoming reply\n");
}




failure_route[1] {
    if (t_was_cancelled()) {
        exit;
    }


    # uncomment the following lines if you want to block client
    # redirect based on 3xx replies.
    ##if (t_check_status("3[0-9][0-9]")) {
    ##t_reply("404","Not found");
    ##    exit;
    ##}


    # uncomment the following lines if you want to redirect the failed
    # calls to a different new destination
    ##if (t_check_status("486|408")) {
    ##    sethostport("192.168.2.100:5060");
    ##    # do not set the missed call flag again
    ##    t_relay();
    ##}

}



注册

if (!www_authorize("", "subscriber"))
  {
   www_challenge("", "0");
   exit;
  }

上面的代码是利用mysql来进行认证的。如果认证不成功,就直接退出,不进行下一步的操作。当然你也可以将这部分注释掉,这样无论是谁都可以注册成功了。

注册成功后,会调用

if (!save("location"))
   sl_reply_error();

实际上是把一些注册时候的sip信息写到location数据表中。如果你配置了

modparam("usrloc", "db_mode",   2)
modparam("usrloc", "db_url",
 "mysql://openser:openserrw@localhost/openser")

的话,会在opensips数据库中的location表中看到这些sip信息。

3.2nat配置

if (nat_uac_test("19")) {
  if (method=="REGISTER") {
   fix_nated_register();
  } else {
   fix_nated_contact();
  }
  setflag(5);
 }

上面的代码检测你是否在nat后面。那如果你不在nat后面,但你呼叫的另一方在nat后面,那你怎么知道呢?

if (is_method("REGISTER"))
 {
  if(isflagset(5))
  {
   setbflag("6");
   # uncomment next line to do SIP NAT pinging 
   ## setbflag("7");
  }
  if (!save("location"))
   sl_reply_error();

  exit;
 }

看看上面中的setbflag("6"),这非常关键,这是一个nat标识,调用save("location")后会把这个标识保存到location表中。(在内存中,不在数据库里)当你呼叫对方时,调用lookup("location")就可以判断对方是否是在nat后面了。

 


你可能感兴趣的:(opensips)