Module: kamailio
Branch: master
Commit: 581f80a09af73fd917834b5bcbca6143016b419d
URL:
https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca614…
Author: Kamailio Dev <kamailio.dev(a)kamailio.org>
Committer: Kamailio Dev <kamailio.dev(a)kamailio.org>
Date: 2018-07-11T10:47:04+02:00
modules: readme files regenerated - permissions ... [skip ci]
---
Modified: src/modules/permissions/README
---
Diff:
https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca614…
Patch:
https://github.com/kamailio/kamailio/commit/581f80a09af73fd917834b5bcbca614…
---
diff --git a/src/modules/permissions/README b/src/modules/permissions/README
index 631fdeae79..6e2e3b972d 100644
--- a/src/modules/permissions/README
+++ b/src/modules/permissions/README
@@ -78,7 +78,7 @@ Emmanuel Schmidbauer
4.8. allow_source_address([group_id])
4.9. allow_source_address_group()
4.10. allow_address_group(addr, port)
- 4.11. allow_trusted([src_ip_pvar, proto_pvar])
+ 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar])
5. RPC Commands
@@ -183,7 +183,7 @@ Chapter 1. Admin Guide
4.8. allow_source_address([group_id])
4.9. allow_source_address_group()
4.10. allow_address_group(addr, port)
- 4.11. allow_trusted([src_ip_pvar, proto_pvar])
+ 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar])
5. RPC Commands
@@ -342,7 +342,7 @@ Chapter 1. Admin Guide
* transport protocol is either "ANY" or equal to the transport
protocol of request or the transport protocol given in pvar, and
* regular expression is either empty (NULL in database) or matches
- the From URI of request.
+ the request's From (or optionally provided) URI.
Otherwise the request is rejected.
@@ -715,7 +715,7 @@ modparam("permissions", "load_backends", 1)
4.8. allow_source_address([group_id])
4.9. allow_source_address_group()
4.10. allow_address_group(addr, port)
- 4.11. allow_trusted([src_ip_pvar, proto_pvar])
+ 4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar])
4.1. allow_routing()
@@ -948,19 +948,19 @@ if ($var(group) != -1) {
};
...
-4.11. allow_trusted([src_ip_pvar, proto_pvar])
+4.11. allow_trusted([src_ip_pvar, proto_pvar, uri_pvar])
Checks based either on request's source address and transport protocol
or source address and transport protocol given in pvar arguments, and
- From URI of request if request can be trusted without authentication.
- Returns “1” if a match is found as described in Section 1.5, “Trusted
- Requests” and “-1” otherwise. If a match is found and peer_tag_avp has
- been defined, adds a non-NULL tag column value of the matching peer to
- AVP peer_tag_avp.
-
- Source address and transport protocol given in pvar arguments must be
- in string format. Valid transport protocol values are (ignoring case)
- "any", "udp, "tcp", "tls", "ws",
"wss" and "sctp".
+ From URI of request (or uri_pvar if provided) if request can be trusted
+ without authentication. Returns “1” if a match is found as described in
+ Section 1.5, “Trusted Requests” and “-1” otherwise. If a match is found
+ and peer_tag_avp has been defined, adds a non-NULL tag column value of
+ the matching peer to AVP peer_tag_avp.
+
+ Source address, transport protocol and uri given in pvar arguments must
+ be in string format. Valid transport protocol values are (ignoring
+ case) "any", "udp, "tcp", "tls", "ws",
"wss" and "sctp".
This function can be used from REQUEST_ROUTE, FAILURE_ROUTE.