|
@@ -861,10 +861,6 @@ route[STORE] {
|
|
|
sip_capture("$var(a)");
|
|
|
}
|
|
|
|
|
|
-event_route[sipcapture:request] {
|
|
|
- xlog("received sipcapture request from $si:$sp\r\n");
|
|
|
-}
|
|
|
-
|
|
|
#!ifdef WITH_HOMER_CUSTOM_STATS
|
|
|
event_route[xhttp:request] {
|
|
|
set_reply_close();
|
|
@@ -908,12 +904,14 @@ event_route[xhttp:request] {
|
|
|
|
|
|
event_route[sipcapture:request] {
|
|
|
|
|
|
- xlog("HEP Request!\n");
|
|
|
- xlog("received sipcapture request from $si:$sp\r\n");
|
|
|
- xlog("HEP VERSION $hep(version) request from $si:$sp\r\n");
|
|
|
- xlog("HEP CHUNK Source IP $hep(0x002) request from $si:$sp\r\n");
|
|
|
+ xlog("HEP Request!\n");
|
|
|
+ xlog("received sipcapture request from $si:$sp\n");
|
|
|
+ xlog("HEP VERSION $hep(version) request from $si:$sp\n");
|
|
|
+ xlog("HEP CHUNK Source IP $hep(0x002) request from $si:$sp\n");
|
|
|
+
|
|
|
#Is it SIP ?
|
|
|
- if($hep(0x00b) == 1){
|
|
|
+ if($hep(0x00b) == 1)
|
|
|
+ {
|
|
|
|
|
|
#Do parsing internal
|
|
|
return 1;
|
|
@@ -921,8 +919,8 @@ event_route[sipcapture:request] {
|
|
|
else
|
|
|
{
|
|
|
#If report lets proceed here with payload
|
|
|
- xlog("HEP CHUNK PAYLOAD $hep(0x00f) request from $si:$sp\r\n");
|
|
|
- return 0;
|
|
|
+ xlog("HEP CHUNK PAYLOAD $hep(0x00f) request from $si:$sp\n");
|
|
|
+ return 0;
|
|
|
}
|
|
|
}
|
|
|
|