Module: kamailio Branch: master Commit: 581f80a09af73fd917834b5bcbca6143016b419d URL: https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca6143016b419d
Author: Kamailio Dev <[email protected]> Committer: Kamailio Dev <[email protected]> Date: 2018-07-11T10:47:04+02:00 modules: readme files regenerated - permissions ... [skip ci] --- Modified: src/modules/permissions/README --- Diff: https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca6143016b419d.diff Patch: https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca6143016b419d.patch --- diff --git a/src/modules/permissions/README b/src/modules/permissions/README index 631fdeae79..6e2e3b972d 100644 --- a/src/modules/permissions/README +++ b/src/modules/permissions/README @@ -78,7 +78,7 @@ Emmanuel Schmidbauer 4.8. allow_source_address([group_id]) 4.9. allow_source_address_group() 4.10. allow_address_group(addr, port) - 4.11. allow_trusted([src_ip_pvar, proto_pvar]) + 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar]) 5. RPC Commands @@ -183,7 +183,7 @@ Chapter 1. Admin Guide 4.8. allow_source_address([group_id]) 4.9. allow_source_address_group() 4.10. allow_address_group(addr, port) - 4.11. allow_trusted([src_ip_pvar, proto_pvar]) + 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar]) 5. RPC Commands @@ -342,7 +342,7 @@ Chapter 1. Admin Guide * transport protocol is either "ANY" or equal to the transport protocol of request or the transport protocol given in pvar, and * regular expression is either empty (NULL in database) or matches - the From URI of request. + the request's From (or optionally provided) URI. Otherwise the request is rejected. @@ -715,7 +715,7 @@ modparam("permissions", "load_backends", 1) 4.8. allow_source_address([group_id]) 4.9. allow_source_address_group() 4.10. allow_address_group(addr, port) - 4.11. allow_trusted([src_ip_pvar, proto_pvar]) + 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar]) 4.1. allow_routing() @@ -948,19 +948,19 @@ if ($var(group) != -1) { }; ... -4.11. allow_trusted([src_ip_pvar, proto_pvar]) +4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar]) Checks based either on request's source address and transport protocol or source address and transport protocol given in pvar arguments, and - From URI of request if request can be trusted without authentication. - Returns â1â if a match is found as described in Section 1.5, âTrusted - Requestsâ and â-1â otherwise. If a match is found and peer_tag_avp has - been defined, adds a non-NULL tag column value of the matching peer to - AVP peer_tag_avp. - - Source address and transport protocol given in pvar arguments must be - in string format. Valid transport protocol values are (ignoring case) - "any", "udp, "tcp", "tls", "ws", "wss" and "sctp". + From URI of request (or uri_pvar if provided) if request can be trusted + without authentication. Returns â1â if a match is found as described in + Section 1.5, âTrusted Requestsâ and â-1â otherwise. If a match is found + and peer_tag_avp has been defined, adds a non-NULL tag column value of + the matching peer to AVP peer_tag_avp. + + Source address, transport protocol and uri given in pvar arguments must + be in string format. Valid transport protocol values are (ignoring + case) "any", "udp, "tcp", "tls", "ws", "wss" and "sctp". This function can be used from REQUEST_ROUTE, FAILURE_ROUTE.
_______________________________________________ Kamailio (SER) - Development Mailing List [email protected] https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-dev
