congrats Icon
New! Tabnine Pro 14-day free trial
Start a free trial
Tabnine Logo
FirewallConfig
Code IndexAdd Tabnine to your IDE (free)

How to use
FirewallConfig
in
org.restlet.ext.platform

Best Java code snippets using org.restlet.ext.platform.FirewallConfig (Showing top 20 results out of 315)

origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that forbids access to the given set of IP addresses.
 * 
 * @param blackList
 *            The list of rejected IP addresses.
 */
public void addIpAddressesBlackList(List<String> blackList) {
  add(new FirewallIpFilteringRule(blackList, false));
}
origin: org.restlet.gae/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.jee/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.jee/org.restlet.ext.platform

FirewallModule firewallModule = new FirewallModule(
    restletCloudConfig, modulesSettings);
FirewallConfig firewallConfig = new FirewallConfig(
    firewallRules);
firewallModule.updateFirewallConfig(firewallConfig);
origin: org.restlet.gae/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.gae/org.restlet.ext.platform

FirewallModule firewallModule = new FirewallModule(
    restletCloudConfig, modulesSettings);
FirewallConfig firewallConfig = new FirewallConfig(
    firewallRules);
firewallModule.updateFirewallConfig(firewallConfig);
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that forbids access to the given set of IP addresses.
 * 
 * @param blackList
 *            The list of rejected IP addresses.
 */
public void addIpAddressesBlackList(List<String> blackList) {
  add(new FirewallIpFilteringRule(blackList, false));
}
origin: org.restlet.osgi/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.jse/org.restlet.ext.platform

FirewallModule firewallModule = new FirewallModule(
    restletCloudConfig, modulesSettings);
FirewallConfig firewallConfig = new FirewallConfig(
    firewallRules);
firewallModule.updateFirewallConfig(firewallConfig);
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access to the given set of IP addresses.
 * 
 * @param whiteList
 *            The list of accepted IP addresses.
 */
public void addIpAddressesWhiteList(List<String> whiteList) {
  add(new FirewallIpFilteringRule(whiteList, true));
}
origin: org.restlet.jse/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.gae/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.osgi/org.restlet.ext.platform

FirewallModule firewallModule = new FirewallModule(
    restletCloudConfig, modulesSettings);
FirewallConfig firewallConfig = new FirewallConfig(
    firewallRules);
firewallModule.updateFirewallConfig(firewallConfig);
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access to the given set of IP addresses.
 * 
 * @param whiteList
 *            The list of accepted IP addresses.
 */
public void addIpAddressesWhiteList(List<String> whiteList) {
  add(new FirewallIpFilteringRule(whiteList, true));
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
org.restlet.ext.platformFirewallConfig

Javadoc

Configuration methods for the Firewall.

Most used methods

  • <init>
    Private Constructor.
  • add
    Adds a rule to the firewall.
  • addIpAddressesBlackList
    Adds a rule that forbids access to the given set of IP addresses.
  • addIpAddressesWhiteList
    Adds a rule that restricts access to the given set of IP addresses.
  • addRolesConcurrencyCounter
    Adds a rule that restricts access according to the Role of the current authenticated User. Each role
  • addRolesPeriodicCounter
    Adds a rule that restricts access according to the Role of the current authenticated User. Each role

Popular in Java

  • Parsing JSON documents to java classes using gson
  • setRequestProperty (URLConnection)
  • startActivity (Activity)
  • findViewById (Activity)
  • Proxy (java.net)
    This class represents proxy server settings. A created instance of Proxy stores a type and an addres
  • Arrays (java.util)
    This class contains various methods for manipulating arrays (such as sorting and searching). This cl
  • Comparator (java.util)
    A Comparator is used to compare two objects to determine their ordering with respect to each other.
  • LinkedHashMap (java.util)
    LinkedHashMap is an implementation of Map that guarantees iteration order. All optional operations a
  • SortedSet (java.util)
    SortedSet is a Set which iterates over its elements in a sorted order. The order is determined eithe
  • Loader (org.hibernate.loader)
    Abstract superclass of object loading (and querying) strategies. This class implements useful common
  • 14 Best Plugins for Eclipse
Tabnine Logo
  • Products

    Search for Java codeSearch for JavaScript code
  • IDE Plugins

    IntelliJ IDEAWebStormVisual StudioAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimAtomGoLandRubyMineEmacsJupyter NotebookJupyter LabRiderDataGripAppCode
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogTabnine AcademyStudentsTerms of usePrivacy policyJava Code IndexJavascript Code Index
Get Tabnine for your IDE now