Codota Logo
FirewallConfig
Code IndexAdd Codota to your IDE (free)

How to use
FirewallConfig
in
org.restlet.ext.platform

Best Java code snippets using org.restlet.ext.platform.FirewallConfig (Showing top 20 results out of 315)

  • Common ways to obtain FirewallConfig
private void myMethod () {
FirewallConfig f =
  • Codota IconList rules;new FirewallConfig(rules)
  • Smart code suggestions by Codota
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that forbids access to the given set of IP addresses.
 * 
 * @param blackList
 *            The list of rejected IP addresses.
 */
public void addIpAddressesBlackList(List<String> blackList) {
  add(new FirewallIpFilteringRule(blackList, false));
}
origin: org.restlet.gae/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.jee/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.jee/org.restlet.ext.platform

FirewallModule firewallModule = new FirewallModule(
    restletCloudConfig, modulesSettings);
FirewallConfig firewallConfig = new FirewallConfig(
    firewallRules);
firewallModule.updateFirewallConfig(firewallConfig);
origin: org.restlet.gae/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.gae/org.restlet.ext.platform

FirewallModule firewallModule = new FirewallModule(
    restletCloudConfig, modulesSettings);
FirewallConfig firewallConfig = new FirewallConfig(
    firewallRules);
firewallModule.updateFirewallConfig(firewallConfig);
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access to the given set of IP addresses.
 * 
 * @param whiteList
 *            The list of accepted IP addresses.
 */
public void addIpAddressesWhiteList(List<String> whiteList) {
  add(new FirewallIpFilteringRule(whiteList, true));
}
origin: org.restlet.osgi/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.jse/org.restlet.ext.platform

FirewallModule firewallModule = new FirewallModule(
    restletCloudConfig, modulesSettings);
FirewallConfig firewallConfig = new FirewallConfig(
    firewallRules);
firewallModule.updateFirewallConfig(firewallConfig);
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that forbids access to the given set of IP addresses.
 * 
 * @param blackList
 *            The list of rejected IP addresses.
 */
public void addIpAddressesBlackList(List<String> blackList) {
  add(new FirewallIpFilteringRule(blackList, false));
}
origin: org.restlet.jse/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.osgi/org.restlet.ext.platform

FirewallModule firewallModule = new FirewallModule(
    restletCloudConfig, modulesSettings);
FirewallConfig firewallConfig = new FirewallConfig(
    firewallRules);
firewallModule.updateFirewallConfig(firewallConfig);
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access to the given set of IP addresses.
 * 
 * @param whiteList
 *            The list of accepted IP addresses.
 */
public void addIpAddressesWhiteList(List<String> whiteList) {
  add(new FirewallIpFilteringRule(whiteList, true));
}
origin: org.restlet.gae/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
org.restlet.ext.platformFirewallConfig

Javadoc

Configuration methods for the Firewall.

Most used methods

  • <init>
    Private Constructor.
  • add
    Adds a rule to the firewall.
  • addIpAddressesBlackList
    Adds a rule that forbids access to the given set of IP addresses.
  • addIpAddressesWhiteList
    Adds a rule that restricts access to the given set of IP addresses.
  • addRolesConcurrencyCounter
    Adds a rule that restricts access according to the Role of the current authenticated User. Each role
  • addRolesPeriodicCounter
    Adds a rule that restricts access according to the Role of the current authenticated User. Each role

Popular in Java

  • Making http requests using okhttp
  • scheduleAtFixedRate (Timer)
  • getResourceAsStream (ClassLoader)
  • getSharedPreferences (Context)
  • Pointer (com.sun.jna)
    An abstraction for a native pointer data type. A Pointer instance represents, on the Java side, a na
  • GridBagLayout (java.awt)
    The GridBagLayout class is a flexible layout manager that aligns components vertically and horizonta
  • Date (java.sql)
    A class which can consume and produce dates in SQL Date format. Dates are represented in SQL as yyyy
  • Enumeration (java.util)
    A legacy iteration interface.New code should use Iterator instead. Iterator replaces the enumeration
  • CountDownLatch (java.util.concurrent)
    A synchronization aid that allows one or more threads to wait until a set of operations being perfor
  • JOptionPane (javax.swing)
Codota Logo
  • Products

    Search for Java codeSearch for JavaScript codeEnterprise
  • IDE Plugins

    IntelliJ IDEAWebStormAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimAtomGoLandRubyMineEmacsJupyter
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogCodota Academy Plugin user guide Terms of usePrivacy policyJava Code IndexJavascript Code Index
Get Codota for your IDE now