|
@@ -14,9 +14,9 @@ Edited by
|
|
|
|
|
|
Juha Heinanen
|
|
Juha Heinanen
|
|
|
|
|
|
- Copyright © 2003 Miklos Tirpak
|
|
|
|
|
|
+ Copyright © 2003 Miklos Tirpak
|
|
|
|
|
|
- Copyright © 2006-2008 Juha Heinanen
|
|
|
|
|
|
+ Copyright © 2006-2008 Juha Heinanen
|
|
__________________________________________________________________
|
|
__________________________________________________________________
|
|
|
|
|
|
Table of Contents
|
|
Table of Contents
|
|
@@ -250,7 +250,7 @@ Chapter 1. Admin Guide
|
|
|
|
|
|
Function for registration checking is called allow_register and the
|
|
Function for registration checking is called allow_register and the
|
|
algorithm is very similar to the algorithm described in Section 1.1,
|
|
algorithm is very similar to the algorithm described in Section 1.1,
|
|
- “Call Routing�. The only difference is in the way how pairs are
|
|
|
|
|
|
+ "Call Routing". The only difference is in the way how pairs are
|
|
created.
|
|
created.
|
|
|
|
|
|
Instead of From header field the function uses To header field because
|
|
Instead of From header field the function uses To header field because
|
|
@@ -261,8 +261,8 @@ Chapter 1. Admin Guide
|
|
Thus, pairs used in matching will look like this: (To, Contact 1), (To,
|
|
Thus, pairs used in matching will look like this: (To, Contact 1), (To,
|
|
Contact 2), (To, Contact 3), and so on..
|
|
Contact 2), (To, Contact 3), and so on..
|
|
|
|
|
|
- The algorithm of matching is same as described in Section 1.1, “Call
|
|
|
|
- Routing�.
|
|
|
|
|
|
+ The algorithm of matching is same as described in Section 1.1, "Call
|
|
|
|
+ Routing".
|
|
|
|
|
|
1.3. URI Permissions
|
|
1.3. URI Permissions
|
|
|
|
|
|
@@ -387,7 +387,7 @@ Chapter 1. Admin Guide
|
|
specify full pathname then the directory in which is the main config
|
|
specify full pathname then the directory in which is the main config
|
|
file is located will be used.
|
|
file is located will be used.
|
|
|
|
|
|
- Default value is “permissions.allow�.
|
|
|
|
|
|
+ Default value is "permissions.allow".
|
|
|
|
|
|
Example 1.1. Set default_allow_file parameter
|
|
Example 1.1. Set default_allow_file parameter
|
|
...
|
|
...
|
|
@@ -400,7 +400,7 @@ modparam("permissions", "default_allow_file", "/etc/permissions.allow")
|
|
without parameters. If you don't specify full pathname then the
|
|
without parameters. If you don't specify full pathname then the
|
|
directory in which the main config file is located will be used.
|
|
directory in which the main config file is located will be used.
|
|
|
|
|
|
- Default value is “permissions.deny�.
|
|
|
|
|
|
+ Default value is "permissions.deny".
|
|
|
|
|
|
Example 1.2. Set default_deny_file parameter
|
|
Example 1.2. Set default_deny_file parameter
|
|
...
|
|
...
|
|
@@ -435,7 +435,7 @@ Note
|
|
|
|
|
|
Including leading dot.
|
|
Including leading dot.
|
|
|
|
|
|
- Default value is “.allow�.
|
|
|
|
|
|
+ Default value is ".allow".
|
|
|
|
|
|
Example 1.4. Set allow_suffix parameter
|
|
Example 1.4. Set allow_suffix parameter
|
|
...
|
|
...
|
|
@@ -452,7 +452,7 @@ Note
|
|
|
|
|
|
Including leading dot.
|
|
Including leading dot.
|
|
|
|
|
|
- Default value is “.deny�.
|
|
|
|
|
|
+ Default value is ".deny".
|
|
|
|
|
|
Example 1.5. Set deny_suffix parameter
|
|
Example 1.5. Set deny_suffix parameter
|
|
...
|
|
...
|
|
@@ -464,7 +464,7 @@ modparam("permissions", "deny_suffix", ".deny")
|
|
This is URL of the database to be used to store rules used by
|
|
This is URL of the database to be used to store rules used by
|
|
allow_trusted function.
|
|
allow_trusted function.
|
|
|
|
|
|
- Default value is “NULL�.
|
|
|
|
|
|
+ Default value is "NULL".
|
|
|
|
|
|
Example 1.6. Set db_url parameter
|
|
Example 1.6. Set db_url parameter
|
|
...
|
|
...
|
|
@@ -476,7 +476,7 @@ modparam("permissions", "db_url", "dbdriver://username:password@dbhost/dbname")
|
|
Name of database table containing IP subnets and DNS domain names used
|
|
Name of database table containing IP subnets and DNS domain names used
|
|
by allow_address and allow_source_address functions.
|
|
by allow_address and allow_source_address functions.
|
|
|
|
|
|
- Default value is “address�.
|
|
|
|
|
|
+ Default value is "address".
|
|
|
|
|
|
Example 1.7. Set address_table parameter
|
|
Example 1.7. Set address_table parameter
|
|
...
|
|
...
|
|
@@ -488,7 +488,7 @@ modparam("permissions", "address_table", "addr")
|
|
Name of address table column containing group identifier of the
|
|
Name of address table column containing group identifier of the
|
|
address.
|
|
address.
|
|
|
|
|
|
- Default value is “grp�.
|
|
|
|
|
|
+ Default value is "grp".
|
|
|
|
|
|
Example 1.8. Set grp_col parameter
|
|
Example 1.8. Set grp_col parameter
|
|
...
|
|
...
|
|
@@ -499,7 +499,7 @@ modparam("permissions", "grp_col", "group_id")
|
|
|
|
|
|
Name of address table column containing IP address part of the address.
|
|
Name of address table column containing IP address part of the address.
|
|
|
|
|
|
- Default value is “ip_addr�.
|
|
|
|
|
|
+ Default value is "ip_addr".
|
|
|
|
|
|
Example 1.9. Set ip_addr_col parameter
|
|
Example 1.9. Set ip_addr_col parameter
|
|
...
|
|
...
|
|
@@ -511,7 +511,7 @@ modparam("permissions", "ip_addr_col", "ip_address")
|
|
Name of address table column containing network mask of the address.
|
|
Name of address table column containing network mask of the address.
|
|
Possible values are 0-32.
|
|
Possible values are 0-32.
|
|
|
|
|
|
- Default value is “mask�.
|
|
|
|
|
|
+ Default value is "mask".
|
|
|
|
|
|
Example 1.10. Set mask_col parameter
|
|
Example 1.10. Set mask_col parameter
|
|
...
|
|
...
|
|
@@ -522,7 +522,7 @@ modparam("permissions", "mask_col", "subnet_length")
|
|
|
|
|
|
Name of address table column containing port part of the address.
|
|
Name of address table column containing port part of the address.
|
|
|
|
|
|
- Default value is “port�.
|
|
|
|
|
|
+ Default value is "port".
|
|
|
|
|
|
Example 1.11. Set port_col parameter
|
|
Example 1.11. Set port_col parameter
|
|
...
|
|
...
|
|
@@ -546,7 +546,7 @@ modparam("permissions", "db_mode", 1)
|
|
Name of database table containing matching rules used by allow_trusted
|
|
Name of database table containing matching rules used by allow_trusted
|
|
function.
|
|
function.
|
|
|
|
|
|
- Default value is “trusted�.
|
|
|
|
|
|
+ Default value is "trusted".
|
|
|
|
|
|
Example 1.13. Set trusted_table parameter
|
|
Example 1.13. Set trusted_table parameter
|
|
...
|
|
...
|
|
@@ -558,7 +558,7 @@ modparam("permissions", "trusted_table", "pbx")
|
|
Name of trusted table column containing source IP address that is
|
|
Name of trusted table column containing source IP address that is
|
|
matched against source IP address of received request.
|
|
matched against source IP address of received request.
|
|
|
|
|
|
- Default value is “src_ip�.
|
|
|
|
|
|
+ Default value is "src_ip".
|
|
|
|
|
|
Example 1.14. Set source_col parameter
|
|
Example 1.14. Set source_col parameter
|
|
...
|
|
...
|
|
@@ -569,10 +569,10 @@ modparam("permissions", "source_col", "source_ip_address")
|
|
|
|
|
|
Name of trusted table column containing transport protocol that is
|
|
Name of trusted table column containing transport protocol that is
|
|
matched against transport protocol of received request. Possible values
|
|
matched against transport protocol of received request. Possible values
|
|
- that can be stored in proto_col are “any�, “udp�, “tcp�, “tls�, “sctp�,
|
|
|
|
- and “none�. Value “any� matches always and value “none� never.
|
|
|
|
|
|
+ that can be stored in proto_col are "any", "udp", "tcp", "tls", "sctp",
|
|
|
|
+ and "none". Value "any" matches always and value "none" never.
|
|
|
|
|
|
- Default value is “proto�.
|
|
|
|
|
|
+ Default value is "proto".
|
|
|
|
|
|
Example 1.15. Set proto_col parameter
|
|
Example 1.15. Set proto_col parameter
|
|
...
|
|
...
|
|
@@ -584,7 +584,7 @@ modparam("permissions", "proto_col", "transport")
|
|
Name of trusted table column containing regular expression that is
|
|
Name of trusted table column containing regular expression that is
|
|
matched against From URI.
|
|
matched against From URI.
|
|
|
|
|
|
- Default value is “from_pattern�.
|
|
|
|
|
|
+ Default value is "from_pattern".
|
|
|
|
|
|
Example 1.16. Set from_col parameter
|
|
Example 1.16. Set from_col parameter
|
|
...
|
|
...
|
|
@@ -597,7 +597,7 @@ modparam("permissions", "from_col", "regexp")
|
|
added as value to peer_tag AVP if peer_tag AVP has been defined and if
|
|
added as value to peer_tag AVP if peer_tag AVP has been defined and if
|
|
the address or peer matches.
|
|
the address or peer matches.
|
|
|
|
|
|
- Default value is “tag�.
|
|
|
|
|
|
+ Default value is "tag".
|
|
|
|
|
|
Example 1.17. Set tag_col parameter
|
|
Example 1.17. Set tag_col parameter
|
|
...
|
|
...
|
|
@@ -609,7 +609,7 @@ modparam("permissions", "tag_col", "peer_tag")
|
|
If defined, the AVP will be set as side effect of allow_trusted() call
|
|
If defined, the AVP will be set as side effect of allow_trusted() call
|
|
to not NULL tag column value of the matching peer.
|
|
to not NULL tag column value of the matching peer.
|
|
|
|
|
|
- Default value is “undefined�.
|
|
|
|
|
|
+ Default value is "undefined".
|
|
|
|
|
|
Example 1.18. Set peer_tag_avp parameter
|
|
Example 1.18. Set peer_tag_avp parameter
|
|
...
|
|
...
|
|
@@ -620,9 +620,10 @@ modparam("permissions", "peer_tag_avp", "$avp(i:707)")
|
|
|
|
|
|
Tag mode for allow_trusted(). 0 sets only the tag of the first match. 1
|
|
Tag mode for allow_trusted(). 0 sets only the tag of the first match. 1
|
|
adds the tags of all matches to the avp. In addition the return value
|
|
adds the tags of all matches to the avp. In addition the return value
|
|
- of allow_trusted() is the number of matches.
|
|
|
|
|
|
+ of allow_trusted() is the number of matches. This parameter is not used
|
|
|
|
+ for address table matching functions.
|
|
|
|
|
|
- Default value is “0�.
|
|
|
|
|
|
+ Default value is "0".
|
|
|
|
|
|
Example 1.19. Set peer_tag_mode parameter
|
|
Example 1.19. Set peer_tag_mode parameter
|
|
...
|
|
...
|
|
@@ -643,10 +644,10 @@ modparam("permissions", "peer_tag_mode", "1")
|
|
4.10. allow_address_group(addr, port)
|
|
4.10. allow_address_group(addr, port)
|
|
4.11. allow_trusted([src_ip_pvar, proto_pvar])
|
|
4.11. allow_trusted([src_ip_pvar, proto_pvar])
|
|
|
|
|
|
-4.1. allow_routing()
|
|
|
|
|
|
+4.1. allow_routing()
|
|
|
|
|
|
Returns true if all pairs constructed as described in Section 1.1,
|
|
Returns true if all pairs constructed as described in Section 1.1,
|
|
- “Call Routing� have appropriate permissions according to the
|
|
|
|
|
|
+ "Call Routing" have appropriate permissions according to the
|
|
configuration files. This function uses default configuration files
|
|
configuration files. This function uses default configuration files
|
|
specified in default_allow_file and default_deny_file.
|
|
specified in default_allow_file and default_deny_file.
|
|
|
|
|
|
@@ -659,10 +660,10 @@ if (allow_routing()) {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.2. allow_routing(basename)
|
|
|
|
|
|
+4.2. allow_routing(basename)
|
|
|
|
|
|
Returns true if all pairs constructed as described in Section 1.1,
|
|
Returns true if all pairs constructed as described in Section 1.1,
|
|
- “Call Routing� have appropriate permissions according to the
|
|
|
|
|
|
+ "Call Routing" have appropriate permissions according to the
|
|
configuration files given as parameters.
|
|
configuration files given as parameters.
|
|
|
|
|
|
Meaning of the parameters is as follows:
|
|
Meaning of the parameters is as follows:
|
|
@@ -682,10 +683,10 @@ if (allow_routing("basename")) {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.3. allow_routing(allow_file,deny_file)
|
|
|
|
|
|
+4.3. allow_routing(allow_file,deny_file)
|
|
|
|
|
|
Returns true if all pairs constructed as described in Section 1.1,
|
|
Returns true if all pairs constructed as described in Section 1.1,
|
|
- “Call Routing� have appropriate permissions according to the
|
|
|
|
|
|
+ "Call Routing" have appropriate permissions according to the
|
|
configuration files given as parameters.
|
|
configuration files given as parameters.
|
|
|
|
|
|
Meaning of the parameters is as follows:
|
|
Meaning of the parameters is as follows:
|
|
@@ -707,10 +708,10 @@ if (allow_routing("rules.allow", "rules.deny")) {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.4. allow_register(basename)
|
|
|
|
|
|
+4.4. allow_register(basename)
|
|
|
|
|
|
The function returns true if all pairs constructed as described in
|
|
The function returns true if all pairs constructed as described in
|
|
- Section 1.2, “Registration Permissions� have appropriate permissions
|
|
|
|
|
|
+ Section 1.2, "Registration Permissions" have appropriate permissions
|
|
according to the configuration files given as parameters.
|
|
according to the configuration files given as parameters.
|
|
|
|
|
|
Meaning of the parameters is as follows:
|
|
Meaning of the parameters is as follows:
|
|
@@ -735,10 +736,10 @@ if (method=="REGISTER") {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.5. allow_register(allow_file, deny_file)
|
|
|
|
|
|
+4.5. allow_register(allow_file, deny_file)
|
|
|
|
|
|
The function returns true if all pairs constructed as described in
|
|
The function returns true if all pairs constructed as described in
|
|
- Section 1.2, “Registration Permissions� have appropriate permissions
|
|
|
|
|
|
+ Section 1.2, "Registration Permissions" have appropriate permissions
|
|
according to the configuration files given as parameters.
|
|
according to the configuration files given as parameters.
|
|
|
|
|
|
Meaning of the parameters is as follows:
|
|
Meaning of the parameters is as follows:
|
|
@@ -765,10 +766,10 @@ if (method=="REGISTER") {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.6. allow_uri(basename, pvar)
|
|
|
|
|
|
+4.6. allow_uri(basename, pvar)
|
|
|
|
|
|
- Returns true if the pair constructed as described in Section 1.3, “URI
|
|
|
|
- Permissions� have appropriate permissions according to the
|
|
|
|
|
|
+ Returns true if the pair constructed as described in Section 1.3, "URI
|
|
|
|
+ Permissions" have appropriate permissions according to the
|
|
configuration files specified by the parameter.
|
|
configuration files specified by the parameter.
|
|
|
|
|
|
Meaning of the parameter is as follows:
|
|
Meaning of the parameter is as follows:
|
|
@@ -792,7 +793,7 @@ if (allow_uri("basename", "$avp(i:705)") { // Check URI stored in $avp(i:705)
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.7. allow_address(group_id, ip_addr_pvar, port_pvar)
|
|
|
|
|
|
+4.7. allow_address(group_id, ip_addr_pvar, port_pvar)
|
|
|
|
|
|
Returns true if address and port given as values of pvar arguments
|
|
Returns true if address and port given as values of pvar arguments
|
|
belonging to a group given as group_id argument matches an IP subnet or
|
|
belonging to a group given as group_id argument matches an IP subnet or
|
|
@@ -821,7 +822,7 @@ if (!allow_address("2", "$avp(dst_adr)", "$avp(dst_port)") {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.8. allow_source_address([group_id])
|
|
|
|
|
|
+4.8. allow_source_address([group_id])
|
|
|
|
|
|
Equal to allow_address(group_id, "$si", "$sp"). If 'group_id' is
|
|
Equal to allow_address(group_id, "$si", "$sp"). If 'group_id' is
|
|
missing, the function is equal to allow_address("1", "$si", "$sp").
|
|
missing, the function is equal to allow_address("1", "$si", "$sp").
|
|
@@ -837,7 +838,7 @@ if (!allow_source_address("1")) {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.9. allow_source_address_group()
|
|
|
|
|
|
+4.9. allow_source_address_group()
|
|
|
|
|
|
Checks if source address/port is found in cached address or subnet
|
|
Checks if source address/port is found in cached address or subnet
|
|
table in any group. If yes, returns that group. If not returns -1. Port
|
|
table in any group. If yes, returns that group. If not returns -1. Port
|
|
@@ -854,7 +855,7 @@ if ($var(group) != -1) {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.10. allow_address_group(addr, port)
|
|
|
|
|
|
+4.10. allow_address_group(addr, port)
|
|
|
|
|
|
Checks if address/port is found in cached address or subnet table in
|
|
Checks if address/port is found in cached address or subnet table in
|
|
any group. If yes, returns that group. If not returns -1. Port value 0
|
|
any group. If yes, returns that group. If not returns -1. Port value 0
|
|
@@ -872,19 +873,19 @@ if ($var(group) != -1) {
|
|
};
|
|
};
|
|
...
|
|
...
|
|
|
|
|
|
-4.11. allow_trusted([src_ip_pvar, proto_pvar])
|
|
|
|
|
|
+4.11. allow_trusted([src_ip_pvar, proto_pvar])
|
|
|
|
|
|
Checks based either on request's source address and transport protocol
|
|
Checks based either on request's source address and transport protocol
|
|
or source address and transport protocol given in pvar arguments, and
|
|
or source address and transport protocol given in pvar arguments, and
|
|
From URI of request if request can be trusted without authentication.
|
|
From URI of request if request can be trusted without authentication.
|
|
- Returns 1 if a match is found as described in Section 1.5, “Trusted
|
|
|
|
- Requests� and -1 otherwise. If a match is found and peer_tag_avp has
|
|
|
|
|
|
+ Returns 1 if a match is found as described in Section 1.5, "Trusted
|
|
|
|
+ Requests" and -1 otherwise. If a match is found and peer_tag_avp has
|
|
been defined, adds a non-NULL tag column value of the matching peer to
|
|
been defined, adds a non-NULL tag column value of the matching peer to
|
|
AVP peer_tag_avp.
|
|
AVP peer_tag_avp.
|
|
|
|
|
|
Source address and transport protocol given in pvar arguments must be
|
|
Source address and transport protocol given in pvar arguments must be
|
|
in string format. Valid transport protocol values are (ignoring case)
|
|
in string format. Valid transport protocol values are (ignoring case)
|
|
- "any", "udp, "tcp", "tls", and "sctp".
|
|
|
|
|
|
+ "any", "udp, "tcp", "tls", "ws", "wss" and "sctp".
|
|
|
|
|
|
This function can be used from REQUEST_ROUTE, FAILURE_ROUTE.
|
|
This function can be used from REQUEST_ROUTE, FAILURE_ROUTE.
|
|
|
|
|
|
@@ -908,7 +909,7 @@ if (allow_trusted("$si", "$proto")) {
|
|
5.5. trusted_dump
|
|
5.5. trusted_dump
|
|
5.6. allow_uri
|
|
5.6. allow_uri
|
|
|
|
|
|
-5.1. address_reload
|
|
|
|
|
|
+5.1. address_reload
|
|
|
|
|
|
Causes permissions module to re-read the contents of address database
|
|
Causes permissions module to re-read the contents of address database
|
|
table into cache memory. In cache memory the entries are for
|
|
table into cache memory. In cache memory the entries are for
|
|
@@ -917,35 +918,35 @@ if (allow_trusted("$si", "$proto")) {
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-5.2. address_dump
|
|
|
|
|
|
+5.2. address_dump
|
|
|
|
|
|
Causes permissions module to dump contents of cache memory address
|
|
Causes permissions module to dump contents of cache memory address
|
|
table.
|
|
table.
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-5.3. subnet_dump
|
|
|
|
|
|
+5.3. subnet_dump
|
|
|
|
|
|
Causes permissions module to dump contents of cache memory subnet
|
|
Causes permissions module to dump contents of cache memory subnet
|
|
table.
|
|
table.
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-5.4. trusted_reload
|
|
|
|
|
|
+5.4. trusted_reload
|
|
|
|
|
|
Causes permissions module to re-read the contents of trusted table into
|
|
Causes permissions module to re-read the contents of trusted table into
|
|
cache memory.
|
|
cache memory.
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-5.5. trusted_dump
|
|
|
|
|
|
+5.5. trusted_dump
|
|
|
|
|
|
Causes permissions module to dump contents of trusted table from cache
|
|
Causes permissions module to dump contents of trusted table from cache
|
|
memory.
|
|
memory.
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-5.6. allow_uri
|
|
|
|
|
|
+5.6. allow_uri
|
|
|
|
|
|
Tests if (URI, Contact) pair is allowed according to allow/deny files.
|
|
Tests if (URI, Contact) pair is allowed according to allow/deny files.
|
|
The files must already have been loaded by Kamailio.
|
|
The files must already have been loaded by Kamailio.
|
|
@@ -966,7 +967,7 @@ if (allow_trusted("$si", "$proto")) {
|
|
6.5. trustedReload
|
|
6.5. trustedReload
|
|
6.6. trustedDump
|
|
6.6. trustedDump
|
|
|
|
|
|
-6.1. addressReload
|
|
|
|
|
|
+6.1. addressReload
|
|
|
|
|
|
Causes permissions module to re-read the contents of address database
|
|
Causes permissions module to re-read the contents of address database
|
|
table into cache memory. In cache memory the entries are for
|
|
table into cache memory. In cache memory the entries are for
|
|
@@ -975,21 +976,21 @@ if (allow_trusted("$si", "$proto")) {
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-6.2. addressDump
|
|
|
|
|
|
+6.2. addressDump
|
|
|
|
|
|
Causes permissions module to dump contents of cache memory address
|
|
Causes permissions module to dump contents of cache memory address
|
|
table. (Not the subnet table).
|
|
table. (Not the subnet table).
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-6.3. subnetDump
|
|
|
|
|
|
+6.3. subnetDump
|
|
|
|
|
|
Causes permissions module to dump contents of cache memory subnet
|
|
Causes permissions module to dump contents of cache memory subnet
|
|
table.
|
|
table.
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-6.4. testUri basename uri contact
|
|
|
|
|
|
+6.4. testUri basename uri contact
|
|
|
|
|
|
Tests if (URI, Contact) pair is allowed according to allow/deny files.
|
|
Tests if (URI, Contact) pair is allowed according to allow/deny files.
|
|
The files must already have been loaded by Kamailio.
|
|
The files must already have been loaded by Kamailio.
|
|
@@ -1001,14 +1002,14 @@ if (allow_trusted("$si", "$proto")) {
|
|
* URI - URI to be tested
|
|
* URI - URI to be tested
|
|
* Contact - Contact to be tested
|
|
* Contact - Contact to be tested
|
|
|
|
|
|
-6.5. trustedReload
|
|
|
|
|
|
+6.5. trustedReload
|
|
|
|
|
|
Causes permissions module to re-read the contents of trusted table into
|
|
Causes permissions module to re-read the contents of trusted table into
|
|
cache memory.
|
|
cache memory.
|
|
|
|
|
|
Parameters: none
|
|
Parameters: none
|
|
|
|
|
|
-6.6. trustedDump
|
|
|
|
|
|
+6.6. trustedDump
|
|
|
|
|
|
Causes permissions module to dump contents of trusted table from cache
|
|
Causes permissions module to dump contents of trusted table from cache
|
|
memory.
|
|
memory.
|