Module: kamailio Branch: master Commit: 581f80a09af73fd917834b5bcbca6143016b419d URL: https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca6143...
Author: Kamailio Dev kamailio.dev@kamailio.org Committer: Kamailio Dev kamailio.dev@kamailio.org Date: 2018-07-11T10:47:04+02:00
modules: readme files regenerated - permissions ... [skip ci]
---
Modified: src/modules/permissions/README
---
Diff: https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca6143... Patch: https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca6143...
---
diff --git a/src/modules/permissions/README b/src/modules/permissions/README index 631fdeae79..6e2e3b972d 100644 --- a/src/modules/permissions/README +++ b/src/modules/permissions/README @@ -78,7 +78,7 @@ Emmanuel Schmidbauer 4.8. allow_source_address([group_id]) 4.9. allow_source_address_group() 4.10. allow_address_group(addr, port) - 4.11. allow_trusted([src_ip_pvar, proto_pvar]) + 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar])
5. RPC Commands
@@ -183,7 +183,7 @@ Chapter 1. Admin Guide 4.8. allow_source_address([group_id]) 4.9. allow_source_address_group() 4.10. allow_address_group(addr, port) - 4.11. allow_trusted([src_ip_pvar, proto_pvar]) + 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar])
5. RPC Commands
@@ -342,7 +342,7 @@ Chapter 1. Admin Guide * transport protocol is either "ANY" or equal to the transport protocol of request or the transport protocol given in pvar, and * regular expression is either empty (NULL in database) or matches - the From URI of request. + the request's From (or optionally provided) URI.
Otherwise the request is rejected.
@@ -715,7 +715,7 @@ modparam("permissions", "load_backends", 1) 4.8. allow_source_address([group_id]) 4.9. allow_source_address_group() 4.10. allow_address_group(addr, port) - 4.11. allow_trusted([src_ip_pvar, proto_pvar]) + 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar])
4.1. allow_routing()
@@ -948,19 +948,19 @@ if ($var(group) != -1) { }; ...
-4.11. allow_trusted([src_ip_pvar, proto_pvar]) +4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar])
Checks based either on request's source address and transport protocol or source address and transport protocol given in pvar arguments, and - From URI of request if request can be trusted without authentication. - Returns “1” if a match is found as described in Section 1.5, “Trusted - Requests” and “-1” otherwise. If a match is found and peer_tag_avp has - been defined, adds a non-NULL tag column value of the matching peer to - AVP peer_tag_avp. - - Source address and transport protocol given in pvar arguments must be - in string format. Valid transport protocol values are (ignoring case) - "any", "udp, "tcp", "tls", "ws", "wss" and "sctp". + From URI of request (or uri_pvar if provided) if request can be trusted + without authentication. Returns “1” if a match is found as described in + Section 1.5, “Trusted Requests” and “-1” otherwise. If a match is found + and peer_tag_avp has been defined, adds a non-NULL tag column value of + the matching peer to AVP peer_tag_avp. + + Source address, transport protocol and uri given in pvar arguments must + be in string format. Valid transport protocol values are (ignoring + case) "any", "udp, "tcp", "tls", "ws", "wss" and "sctp".
This function can be used from REQUEST_ROUTE, FAILURE_ROUTE.