File: localhost_open.srv

package info (click to toggle)
cfengine3 3.24.2-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 37,552 kB
  • sloc: ansic: 163,161; sh: 10,296; python: 2,950; makefile: 1,744; lex: 784; yacc: 633; perl: 211; pascal: 157; xml: 21; sed: 13
file content (58 lines) | stat: -rw-r--r-- 1,625 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
body common control
{
      bundlesequence => { "access_rules" };
      inputs => { "../../default.cf.sub" };

}

#########################################################
# Server config
#########################################################

body server control

{
      port => "9876";

      allowconnects         => { "127.0.0.1" , "::1" };
      allowallconnects      => { "127.0.0.1" , "::1" };
      trustkeysfrom         => { "127.0.0.1" , "::1" };
      allowlegacyconnects   => { "127.0.0.1" , "::1" };
}

#########################################################

bundle server access_rules()

{
  access:

      "$(G.testdir)/source_file"
        admit    => { "127.0.0.1", "::1" },
        shortcut => "simple_source";

      "$(G.testdir)/$(connection.ip).txt"
        admit_ips => { "$(connection.ip)" },
        shortcut  => "expand_ip_source";


      # Directory existing only in connection time (not in daemon init
      # time), after special variables have been expanded. So we need to
      # specify recursive access by appending trailing slash or slashdot.

      # Trailing slash
      "$(G.testdir)/$(connection.ip)_DIR1/"
        admit_ips => { "$(connection.ip)" };

      # Trailing slashdot, should be equivalent to trailing slash
      "$(G.testdir)/$(connection.ip)_DIR2/."
        admit_ips => { "$(connection.ip)" };


      # Deny access to a file within a recursively admitted directory!
      "$(G.testdir)/$(connection.ip)_DIR1/DENY_FILE"
        deny_ips => { "$(connection.ip)" };
      "$(G.testdir)/$(connection.ip)_DIR2/DENY_FILE"
        deny_ips => { "$(connection.ip)" };
}