summaryrefslogtreecommitdiffstats
path: root/contrib/testpbx/configs/acl.conf.xml
diff options
context:
space:
mode:
authorHolger Hans Peter Freyther <holger@moiji-mobile.com>2017-03-05 16:47:57 +0100
committerHolger Hans Peter Freyther <holger@moiji-mobile.com>2017-03-05 17:01:21 +0100
commit7166d0f448eae451b1a6287b522c0fc82387b05b (patch)
tree57c749e1cf281fb74d03001f32d71c2253f0f129 /contrib/testpbx/configs/acl.conf.xml
parent42b073a233740e0e0125e99e4bea29ac7d3d27ed (diff)
contrib: Add Dockerfile to build and configure a FreeSWITCH
Rhizomatica is using FreeSWITCH and we should have an easy way to test against it. A docker container with exposed ports seems like the easiest. FreeSWITCH by default is giving us some exmaple numbers: * 5000 a menu... that allows DTMF * 9195 an echo test * 9198 tetris. The config is copied on top of the default/big config that is installed. If this PBX should be reached from the outside one needs to change 127.0.0.1 to the external address and maybe configure the acl as well to add more CIDRs. Besides that make container make run Will build it and start the container. Takes a bit of time and requires docker. With it configure one can see things like: 2017-03-05 15:32:49.913912 [INFO] switch_channel.c:515 RECV DTMF 3:2000 2017-03-05 15:32:50.952752 [INFO] switch_channel.c:515 RECV DTMF 2:2000 Now to test DTMF in the system. Change-Id: I7f3aa8c81b9e8698df090a05d2e41a41b67d8e3c
Diffstat (limited to 'contrib/testpbx/configs/acl.conf.xml')
-rw-r--r--contrib/testpbx/configs/acl.conf.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/contrib/testpbx/configs/acl.conf.xml b/contrib/testpbx/configs/acl.conf.xml
new file mode 100644
index 0000000..70a64ea
--- /dev/null
+++ b/contrib/testpbx/configs/acl.conf.xml
@@ -0,0 +1,34 @@
+<configuration name="acl.conf" description="Network Lists">
+ <network-lists>
+ <!--
+ These ACL's are automatically created on startup.
+
+ rfc1918.auto - RFC1918 Space
+ nat.auto - RFC1918 Excluding your local lan.
+ localnet.auto - ACL for your local lan.
+ loopback.auto - ACL for your local lan.
+ -->
+
+ <list name="lan" default="allow">
+ <node type="allow" cidr="192.168.0.0/16"/>
+ </list>
+
+ <!--
+ This will traverse the directory adding all users
+ with the cidr= tag to this ACL, when this ACL matches
+ the users variables and params apply as if they
+ digest authenticated.
+ -->
+ <list name="domains" default="allow">
+ <!-- domain= is special it scans the domain from the directory to build the ACL -->
+ <node type="allow" domain="$${domain}"/>
+ <node type="allow" cidr="0.0.0.0/0"/>
+ <node type="allow" cidr="172.0.0.0/8"/>
+ <!-- use cidr= if you wish to allow ip ranges to this domains acl. -->
+ <!-- <node type="allow" cidr="192.168.0.0/24"/> -->
+ <node type="allow" cidr="192.168.0.0/16"/>
+ <node type="allow" cidr="10.0.0.0/16"/>
+ </list>
+
+ </network-lists>
+</configuration>