Clarify how security works in rippled-example.cfg

This commit is contained in:
Arthur Britto
2013-01-18 15:38:27 -08:00
parent 79d1727b38
commit 032022a5bf
2 changed files with 19 additions and 11 deletions

View File

@@ -114,27 +114,35 @@
#
# [rpc_user]:
# As a server, require a this user to specified and require rpc_password to
# be checked for RPC access.
# be checked for RPC access via the rpc_ip and rpc_port. The user and password
# must be specified via HTTP's basic authentication method.
#
# As a client, supply this to the server.
# As a client, supply this to the server via HTTP's basic authentication
# method.
#
# [rpc_password]:
# As a server, require a this password to specified and require rpc_user to
# be checked for RPC access.
# be checked for RPC access via the rpc_ip and rpc_port. The user and password
# must be specified via HTTP's basic authentication method.
#
# As a client, supply this to the server.
# As a client, supply this to the server via HTTP's basic authentication
# method.
#
# [rpc_admin_user]:
# As a server, require a this user to specified and require rpc_admin_password
# to be checked for RPC admin functions.
# As a server, require this as the admin user to be specified. Also, require
# rpc_admin_user and rpc_admin_password to be checked for RPC admin functions.
# The request must specify these as the admin_user and admin_password in the
# request object.
#
# As a client, supply this to the server.
# As a client, supply this to the server in the request object.
#
# [rpc_admin_password]:
# As a server, require a this password to specified and require rpc_admin_user
# to be checked for RPC admin functions.
# As a server, require this as the admin pasword to be specified. Also,
# require rpc_admin_user and rpc_admin_password to be checked for RPC admin
# functions. The request must specify these as the admin_user and
# admin_password in the request object.
#
# As a client, supply this to the server.
# As a client, supply this to the server in the request object.
#
# [websocket_public_ip]:
# IP address or domain to bind to allow untrusted connections from clients.

View File

@@ -99,7 +99,7 @@ public:
int iRole = mHandler->getPublic()
? RPCHandler::GUEST // Don't check on the public interface.
: iAdminGet(jvRequest, mRemoteIP); // XXX Fix this to return the remote IP.
: iAdminGet(jvRequest, mRemoteIP);
if (RPCHandler::FORBID == iRole)
{