这几天翻旧电脑,找到了一个文件,哈哈!
# opensips3.2.8, webrtc
# 参考文档:
# https://opensips.org/pub/docs/tutorials/websockets/opensips-late.cfg
####### Global Parameters #########
/* uncomment the following lines to enable debugging */
debug_mode=no
log_level=2
xlog_level=3
log_stderror=yes
#log_facility=LOG_LOCAL0
udp_workers=4
tcp_workers=4
mhomed=1
/* uncomment the next line to enable the auto temporary blacklisting of
not available destinations (default disabled) */
# disable_dns_blacklist=no
/* uncomment the next line to enable IPv6 lookup after IPv4 dns
lookup failures (default disabled) */
# dns_try_ipv6=yes
# CUSTOMIZE ME
# wan
socket=udp:192.168.31.173:5060 as 192.168.31.173:5060
socket=tcp:192.168.31.173:5060 as 192.168.31.173:5060
socket=ws:192.168.31.173:8080 as 192.168.31.173:5060
socket=wss:192.168.31.173:7443 as 192.168.31.173:5060
socket=tls:192.168.31.173:5061 as 192.168.31.173:5060
# lan
socket=udp:192.168.31.173:5062
socket=tcp:192.168.31.173:5062
####### Modules Section ########
#set module path
mpath="/usr/lib/x86_64-linux-gnu/opensips/modules/"
loadmodule "proto_udp.so"
loadmodule "proto_tcp.so"
loadmodule "proto_tls.so"
loadmodule "proto_wss.so"
loadmodule "proto_ws.so"
loadmodule "tls_openssl.so"
loadmodule "tls_mgm.so"
modparam("tls_mgm", "server_domain", "dom1")
modparam("tls_mgm", "client_tls_domain_avp", "tls_match_dom")
modparam("tls_mgm", "client_sip_domain_avp", "sip_match_dom")
#modparam("tls_mgm", "match_sip_domain", "[dom1]192.168.31.173")
modparam("tls_mgm", "match_sip_domain", "[dom1]*")
modparam("tls_mgm", "tls_method", "[dom1]tlsv1_2")
modparam("tls_mgm", "verify_cert", "[dom1]0")
modparam("tls_mgm", "require_cert", "[dom1]0")
modparam("tls_mgm", "certificate", "[dom1]/etc/opensips/cert.pem")
modparam("tls_mgm", "private_key", "[dom1]/etc/opensips/privkey.pem")
modparam("proto_wss", "wss_max_msg_chunks", 8)
modparam("proto_wss", "wss_resource", "/")
modparam("proto_wss", "wss_handshake_timeout", 300)
#### SIGNALING module
loadmodule "signaling.so"
#### StateLess module
loadmodule "sl.so"
#### Transaction Module
loadmodule "tm.so"
modparam("tm", "fr_timeout", 5)
modparam("tm", "fr_inv_timeout", 30)
modparam("tm", "restart_fr_on_each_reply", 0)
modparam("tm", "onreply_avp_mode", 1)
#### Record Route Module
loadmodule "rr.so"
/* do not append from tag to the RR (no need for this script) */
modparam("rr", "append_fromtag", 0)
#### MAX ForWarD module
loadmodule "maxfwd.so"
#### SIP MSG OPerationS module
loadmodule "sipmsgops.so"
#### FIFO Management Interface
loadmodule "mi_fifo.so"
modparam("mi_fifo", "fifo_name", "/tmp/opensips_fifo")
modparam("mi_fifo", "fifo_mode", 0666)
#modparam("mi_fifo", "pretty_printing", 1)
#### MYSQL module
loadmodule "db_mysql.so"
#### HTTPD module
loadmodule "httpd.so"
modparam("httpd", "port", 8888)
#### USeR LOCation module
loadmodule "usrloc.so"
modparam("usrloc", "nat_bflag", "NAT")
modparam("usrloc", "working_mode_preset", "single-instance-sql-write-back")
modparam("usrloc", "db_url", "mysql://opensips:opensipsrw@127.0.0.1/opensips") # CUSTOMIZE ME
#### REGISTRAR module
loadmodule "registrar.so"
modparam("registrar", "tcp_persistent_flag", "TCP_PERSISTENT")
modparam("registrar", "received_avp", "$avp(received_nh)")/* uncomment the next line not to allow more than 10 contacts per AOR */
#modparam("registrar", "max_contacts", 10)
#### ACCounting module
loadmodule "acc.so"
/* what special events should be accounted ? */
modparam("acc", "early_media", 0)
modparam("acc", "report_cancels", 0)
/* by default we do not adjust the direct of the sequential requests.
if you enable this parameter, be sure to enable "append_fromtag"
in "rr" module */
modparam("acc", "detect_direction", 0)
modparam("acc", "db_url", "mysql://opensips:opensipsrw@127.0.0.1/opensips") # CUSTOMIZE ME
#### AUTHentication modules
loadmodule "auth.so"
loadmodule "auth_db.so"
modparam("auth_db", "calculate_ha1", yes)
modparam("auth_db", "password_column", "password")
modparam("auth_db", "db_url", "mysql://opensips:opensipsrw@127.0.0.1/opensips") # CUSTOMIZE ME
modparam("auth_db", "load_credentials", "")
#### DIALOG module
loadmodule "dialog.so"
modparam("dialog", "dlg_match_mode", 1)
modparam("dialog", "default_timeout", 21600) # 6 hours timeout
modparam("dialog", "db_mode", 2)
modparam("dialog", "db_url", "mysql://opensips:opensipsrw@127.0.0.1/opensips") # CUSTOMIZE ME
#### NAT modules
loadmodule "nathelper.so"
modparam("nathelper", "natping_interval", 10)
modparam("nathelper", "ping_nated_only", 1)
modparam("nathelper", "sipping_bflag", "SIP_PING_FLAG")
modparam("nathelper", "sipping_from", "sip:pinger@127.0.0.1") # CUSTOMIZE ME
modparam("nathelper", "received_avp", "$avp(received_nh)")
#### MI_HTTP module
loadmodule "mi_http.so"
loadmodule "rtpengine.so"
modparam("rtpengine", "rtpengine_sock", "udp:127.0.0.1:2223") # CUSTOMIZE ME
loadmodule "topology_hiding.so"
loadmodule "mi_script.so"
loadmodule "cfgutils.so"
loadmodule "json.so"
####### Routing Logic ########
# main request routing logic
route{
xlog("start $rm|$ci|$fU|$tU|$socket_in(port)|$socket_in(proto) from $si:$sp\n");
if ($socket_in(proto) == "WS" || $socket_in(proto) == "WSS") {
xlog("$rm|SRC_WS\n");
setflag("SRC_WS");
route(dump_tls);
}
# initial NAT handling; detect if the request comes from behind a NAT
# and apply contact fixing
force_rport();
# if (nat_uac_test(23)) {
if ($socket_in(port)==5060 || $socket_in(proto) == "WSS"){
xlog("step1\n");
if (is_method("REGISTER")) {
fix_nated_register();
setbflag("NAT");
} else {
fix_nated_contact();
setflag("NAT");
}
}
if (!mf_process_maxfwd_header(10)) {
send_reply(483, "Too Many Hops");
exit;
}
if (has_totag()) {
# handle hop-by-hop ACK (no routing required)
if ( is_method("ACK") && t_check_trans() ) {
t_relay();
exit;
}
# sequential request within a dialog should
# take the path determined by record-routing
if ( !loose_route() ) {
# we do record-routing for all our traffic, so we should not
# receive any sequential requests without Route hdr.
send_reply(404, "Not here");
exit;
}
# validate the sequential request against dialog
if ( $DLG_status!=NULL && !validate_dialog() ) {
xlog("In-Dialog $rm from $si (callid=$ci) is not valid according to dialog\n");
## exit;
}
if (is_method("ACK")) {
if (has_body("application/sdp")) {
# check if destination is WS
if ($du != NULL)
$var(proto) = $dP;
else
$var(proto) = $rP;
if ($var(proto) == "WS" || $var(proto) == "WSS")
setbflag("DST_WS");
route(rtpengine_answer);
}
}
if (is_method("BYE")) {
# do accounting even if the transaction fails
do_accounting("db", "failed");
}
if (check_route_param("nat=yes"))
setflag("NAT");
# route it out to whatever destination was set by loose_route()
# in $du (destination URI).
route(relay);
exit;
}
# CANCEL processing
if (is_method("CANCEL")) {
if (t_check_trans())
t_relay();
exit;
}
# absorb retransmissions, but do not create transaction
t_check_trans();
if (!(is_method("REGISTER"))) {
if (is_myself("$fd")) {
# authenticate if from local subscriber
# authenticate all initial non-REGISTER request that pretend to be
# generated by local subscriber (domain from FROM URI is local)
if (!proxy_authorize("", "subscriber")) {
proxy_challenge("", "auth");
exit;
}
if ($au!=$fU) {
send_reply(403, "Forbidden auth ID");
exit;
}
consume_credentials();
# caller authenticated
} else {
# if caller is not local, then called number must be local
if (!is_myself("$rd")) {
send_reply(403, "Relay Forbidden");
exit;
}
}
}
# preloaded route checking
if (loose_route()) {
xlog("L_ERR", "Attempt to route with preloaded Route's [$fu/$tu/$ru/$ci]");
if (!is_method("ACK"))
send_reply(403,"Preload Route denied");
exit;
}
# record routing
if (!is_method("REGISTER|MESSAGE"))
record_route();
# account only INVITEs
if (is_method("INVITE")) {
# create dialog with timeout
if ( !create_dialog("B") ) {
send_reply(500,"Internal Server Error");
exit;
}
do_accounting("db");
}
if (!is_myself("$rd")) {
append_hf("P-hint: outbound\r\n");
route(relay);
}
# requests for my domain
if (is_method("PUBLISH|SUBSCRIBE")) {
send_reply(503, "Service Unavailable");
exit;
}
if (is_method("REGISTER")) {
# authenticate the REGISTER requests
if (!www_authorize("", "subscriber")) {
www_challenge("", "auth");
exit;
}
if ($au != $tU) {
send_reply(403, "Forbidden auth ID");
exit;
}
if ($socket_in(proto) == "tcp")
setflag("TCP_PERSISTENT");
if (isflagset("NAT")) {
setbflag("SIP_PING_FLAG");
}
# store the registration and generate a SIP reply
if (!save("location"))
xlog("failed to register AoR $tu\n");
exit;
}
if ($rU == NULL) {
# request with no Username in RURI
send_reply(484, "Address Incomplete");
exit;
}
# do lookup with method filtering
if (!lookup("location", "m")) {
if (!db_does_uri_exist("$ru", "subscriber")) {
send_reply(420, "Bad Extension");
exit;
}
t_reply(404, "Not Found");
exit;
}
$avp(params) = $tU;
$avp(params) = "location";
mi("ul_show_contact", $var(data), $avp(params));
xlog("data = $var(data)\n");
$json(j) := $var(data);
$var(socket) = $json(j/Contacts[0]/Socket);
xlog("socket = $var(socket)\n");
if (isbflagset("NAT")) {
setflag("NAT");
}
# when routing via usrloc, log the missed calls also
do_accounting("db", "missed");
route(relay);
}
route[relay] {
# for INVITEs enable some additional helper routes
if (is_method("INVITE")) {
if (!has_body("application/sdp")) {
setflag("LATE_SDP_NEGOCIATION");
}
t_on_branch("per_branch_ops");
t_on_reply("handle_nat");
t_on_failure("missed_call");
} else if (is_method("BYE|CANCEL")) {
xlog("$ci|rtpengine_delete\n");
rtpengine_delete();
}
if (isflagset("NAT")) {
add_rr_param(";nat=yes");
}
if (!t_relay()) {
send_reply(500, "Internal Error");
}
exit;
}
branch_route[per_branch_ops] {
xlog("$ci|new branch at ru = $ru, du = $du, branch=$T_branch_idx, branch flags=$bf\n");
route(rtpengine_offer);
}
onreply_route[handle_nat] {
xlog("$ci|incoming reply|$rs\n");
fix_nated_contact();
if (!has_body("application/sdp")) {
return;
}
if (isflagset("LATE_SDP_NEGOCIATION")) {
route(rtpengine_offer);
} else {
route(rtpengine_answer);
}
}
failure_route[missed_call] {
if (t_was_cancelled()) {
exit;
}
# uncomment the following lines if you want to block client
# redirect based on 3xx replies.
##if (t_check_status("3[0-9][0-9]")) {
##t_reply(404,"Not found");
## exit;
##}
}
local_route {
if (is_method("BYE") && $DLG_dir=="UPSTREAM") {
acc_db_request("200 Dialog Timeout", "acc");
}
}
route[rtpengine_offer] {
if (isflagset("SRC_WS") && isbflagset("DST_WS"))
$var(rtpengine_flags) = "ICE=force-relay DTLS=passive";
else if (isflagset("SRC_WS") && !isbflagset("DST_WS"))
$var(rtpengine_flags) = "RTP/AVP replace-session-connection replace-origin ICE=remove";
else if (!isflagset("SRC_WS") && isbflagset("DST_WS"))
$var(rtpengine_flags) = "UDP/TLS/RTP/SAVPF ICE=force";
else if (!isflagset("SRC_WS") && !isbflagset("DST_WS"))
$var(rtpengine_flags) = "RTP/AVP replace-origin replace-session-connection trust-address ICE=remove";
if (!has_totag()) {
$var(rtpengine_flags) = $var(rtpengine_flags) + " in-iface=pub out-iface=pub";
}
rtpengine_offer("$var(rtpengine_flags)");
xlog("$ci|rtpengine_offer|$var(rtpengine_flags)\n");
}
route[rtpengine_answer] {
if (isflagset("SRC_WS") && isbflagset("DST_WS"))
$var(rtpengine_flags) = "ICE=force-relay DTLS=passive";
else if (isflagset("SRC_WS") && !isbflagset("DST_WS"))
$var(rtpengine_flags) = "UDP/TLS/RTP/SAVPF ICE=force";
else if (!isflagset("SRC_WS") && isbflagset("DST_WS"))
$var(rtpengine_flags) = "RTP/AVP replace-session-connection replace-origin ICE=remove";
else if (!isflagset("SRC_WS") && !isbflagset("DST_WS"))
$var(rtpengine_flags) = "RTP/AVP replace-session-connection replace-origin ICE=remove";
if (!has_totag()) {
$var(rtpengine_flags) = $var(rtpengine_flags) + " in-iface=pub out-iface=pub";
}
xlog("$ci|rtpengine_answer|$var(rtpengine_flags)\n");
rtpengine_answer("$var(rtpengine_flags)");
}
route[dump_tls] {
return;
xlog("L_INFO","================= start TLS pseudo variables ===============\n");
xlog("L_INFO","$$tls_version = '$tls_version'\n");
xlog("L_INFO","$$tls_description = '$tls_description'\n");
xlog("L_INFO","$$tls_cipher_info = '$tls_cipher_info'\n");
xlog("L_INFO","$$tls_cipher_bits = '$tls_cipher_bits'\n");
#xlog("L_INFO","$$tls_peer_subject = '$tls_peer_subject'\n");
#xlog("L_INFO","$$tls_peer_issuer = '$tls_peer_issuer'\n");
xlog("L_INFO","$$tls_my_subject = '$tls_my_subject'\n");
xlog("L_INFO","$$tls_my_issuer = '$tls_my_issuer'\n");
#xlog("L_INFO","$$tls_peer_version = '$tls_peer_version'\n");
xlog("L_INFO","$$tls_my_version = '$tls_my_version'\n");
xlog("L_INFO","$$tls_peer_serial = '$tls_peer_serial'\n");
xlog("L_INFO","$$tls_my_serial = '$tls_my_serial'\n");
#xlog("L_INFO","$$tls_peer_subject_cn = '$tls_peer_subject_cn'\n");
xlog("L_INFO","$$tls_peer_issuer_cn = '$tls_peer_issuer_cn'\n");
xlog("L_INFO","$$tls_my_subject_cn = '$tls_my_subject_cn'\n");
xlog("L_INFO","$$tls_my_issuer_cn = '$tls_my_issuer_cn'\n");
xlog("L_INFO","$$tls_peer_subject_locality = '$tls_peer_subject_locality'\n");
xlog("L_INFO","$$tls_peer_issuer_locality = '$tls_peer_issuer_locality'\n");
xlog("L_INFO","$$tls_my_subject_locality = '$tls_my_subject_locality'\n");
xlog("L_INFO","$$tls_my_issuer_locality = '$tls_my_issuer_locality'\n");
xlog("L_INFO","$$tls_peer_subject_country = '$tls_peer_subject_country'\n");
xlog("L_INFO","$$tls_peer_issuer_country = '$tls_peer_issuer_country'\n");
xlog("L_INFO","$$tls_my_subject_country = '$tls_my_subject_country'\n");
xlog("L_INFO","$$tls_my_issuer_country = '$tls_my_issuer_country'\n");
xlog("L_INFO","$$tls_peer_subject_state = '$tls_peer_subject_state'\n");
xlog("L_INFO","$$tls_peer_issuer_state = '$tls_peer_issuer_state'\n");
xlog("L_INFO","$$tls_my_subject_state = '$tls_my_subject_state'\n");
xlog("L_INFO","$$tls_my_issuer_state = '$tls_my_issuer_state'\n");
#xlog("L_INFO","$$tls_peer_subject_organization = '$tls_peer_subject_organization'\n");
#xlog("L_INFO","$$tls_peer_issuer_organization = '$tls_peer_issuer_organization'\n");
xlog("L_INFO","$$tls_my_subject_organization = '$tls_my_subject_organization'\n");
xlog("L_INFO","$$tls_my_issuer_organization = '$tls_my_issuer_organization'\n");
xlog("L_INFO","$$tls_peer_subject_unit = '$tls_peer_subject_unit'\n");
xlog("L_INFO","$$tls_peer_issuer_unit = '$tls_peer_issuer_unit'\n");
xlog("L_INFO","$$tls_my_subject_unit = '$tls_my_subject_unit'\n");
xlog("L_INFO","$$tls_my_issuer_unit = '$tls_my_issuer_unit'\n");
xlog("L_INFO","$$tls_peer_san_email = '$tls_peer_san_email'\n");
#xlog("L_INFO","$$tls_my_san_email = '$tls_my_san_email'\n");
xlog("L_INFO","$$tls_peer_san_hostname = '$tls_peer_san_hostname'\n");
xlog("L_INFO","$$tls_my_san_hostname = '$tls_my_san_hostname'\n");
#xlog("L_INFO","$$tls_peer_san_uri = '$tls_peer_san_uri'\n");
xlog("L_INFO","$$tls_my_san_uri = '$tls_my_san_uri'\n");
#xlog("L_INFO","$$tls_peer_san_ip = '$tls_peer_san_ip'\n");
#xlog("L_INFO","$$tls_my_san_ip = '$tls_my_san_ip'\n");
xlog("L_INFO","$$tls_peer_verified = '$tls_peer_verified'\n");
xlog("L_INFO","$$tls_peer_revoked = '$tls_peer_revoked'\n");
xlog("L_INFO","$$tls_peer_expired = '$tls_peer_expired'\n");
xlog("L_INFO","$$tls_peer_selfsigned = '$tls_peer_selfsigned'\n");
#xlog("L_INFO","$$tls_peer_notBefore = '$tls_peer_notBefore'\n");
#xlog("L_INFO","$$tls_peer_notAfter = '$tls_peer_notAfter'\n");
xlog("L_INFO","================= end TLS pseudo variables ===============\n");
}