* [mod_kazoo] add configured sleep time between each io fault
* [mod_kazoo] add configured delay before fetching initial configuration
* [mod_kazoo] add explicit handling of http_cache for kz_moh
* [mod_kazoo] add kz_eval api
* [mod_kazoo] use session if available in first-of
* [mod_kazoo] handle bridge variables
* [mod_kazoo] allow time for erlang node to initialize
* [mod_kazoo] add kz_moh
* tries to start moh from previous unhold
* [mod_kazoo] set default on expand headers
* [mod_kazoo] use simple var reference in default config
* [mod_kazoo] fix kz_expand
* [mod_kazoo] check if profile for agent is valid
* [mod_kazoo] reorder code in kazoo endpoint
* [mod_kazoo] address scan-build warnings
* [mod_kazoo] don't use switch_core_session_force_locate
* [mod_kazoo] add loglevel support per event
* [mod_kazoo] add option to serialize as array
* [mod_kazoo] handle verbose fields
* [mod_kazoo] handle _body header field
* [mod_kazoo] ensure raw json is valid
* [mod_kazoo] encode json number
encodes double as unsigned long long if possible
note: file was formatted
* [mod_kazoo] fix tweaks configuration
* [mod_kazoo] move headers to proper place
* to use Target-Node in filtering
we need to add and then remove it
since the next node uses the same event
to build the message
* [mod_kazoo] handle cleanup in new_event_stream
* [mod_kazoo] do not decode _json_ headers
* [mod_kazoo] add kz_cdr event
* fires the event in report state
* adds json serialized parts
that can be included
in event message
* moves history funcs from
kazoo_commands to kazoo_cdr
* [mod_kazoo] format default configuration
* [mod_kazoo] validate bracket creation
* [mod_kazoo] use single fd for kz_http_put
* [mod_kazoo] add uuid to kz_expand
* implements ei_queue_pop that calls
switch_queue_trypop or switch_queue_pop_timeout
depending on timeout value
* default for sender_timeout is set to 0
to bring back previous behaviour of
using switch_queue_trypop when fetching
messages to be sent to erlang node
Taken from FS-11193:
In "event_handler()" function, when encrypting data using openssl 1.1.0,
the context ctx is allocated by "EVP_CIPHER_CTX_new()", then data is
encrypted, and at the end, EVP_CIPHER_CTX_cleanup is called. This
function resets the context (the function itself is deprecated, and has
been renamed to "EVP_CIPHER_CTX_reset) so that it can be used again. The
correct call would be to "EVP_CIPHER_CTX_free()", which frees the
memory. The code for openssl 1.0 is OK, since the "ctx" struct is kept
in stack. The same thing happens during decryption. "ctx" is allocated,
but never freed.
Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>