Skip to main content

A tool to update Linode/ACC firewall rules with your current IP address.

Project description

acc-firewall_updater

A tool to automatically update the Akamai Connected Cloud (ACC) / Linode firewall rules to allow your IP

Description

acc-fwu is a command-line tool to automatically update Linode/ACC firewall rules with your current IP address. This is particularly useful for dynamically updating firewall rules to allow access from changing IP addresses, like when you visit the gym or you're sat in an airport.

Installation

You can install the package via pip:

pip install acc-fwu

Alternatively, you can install it directly from the source:

git clone https://github.com/johnybradshaw/acc-firewall_updater.git
cd acc-firewall_updater
pip install -e .

Usage

First-time Setup

The first time you use acc-fwu, you’ll need to provide your Linode/ACC Firewall ID and optionally the label for the rule you want to create or update:

acc-fwu --firewall_id <FIREWALL_ID> --label <RULE_LABEL>

For example:

acc-fwu --firewall_id 123456 --label "Allow-My-Current-IP"

This command will do two things:

  1. It will create or update the firewall rule with your current public IP address.
  2. It will save the firewall_id and label to a configuration file (~/.acc-fwu-config) for future use.

Subsequent Usage

After the initial setup, you can simply run acc-fwu without needing to provide the firewall_id and label again:

acc-fwu

This will:

  1. Load the saved firewall_id and label from the configuration file.
  2. Update the firewall rule with your current public IP address.

Updating the Configuration

If you need to change the firewall_id or label, you can do so by running:

acc-fwu --firewall_id <NEW_FIREWALL_ID> --label <NEW_RULE_LABEL>

This will update the configuration file with the new values.

Removing Firewall Rules

You can remove the firewall rule by running:

acc-fwu --remove

Configuration File

The acc-fwu tool saves the firewall_id and label in a configuration file located at ~/.acc-fwu-config. This file is automatically managed by the tool, so you generally won’t need to edit it manually.

Summary of Changes

2024-08-18

  • Remove Firewall Rules: Instructions on how to remove the firewall rule.

2024-08-17

  • First-time Setup: Instructions on how to set the firewall_id and label the first time you use the tool.
  • Subsequent Usage: Information about running the tool without additional arguments after the initial setup.
  • Updating the Configuration: Guidance on how to change the stored firewall_id and label if needed.
  • Configuration File: Brief explanation of the config file and its location.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

acc_fwu-0.1.1.tar.gz (19.2 kB view details)

Uploaded Source

Built Distribution

acc_fwu-0.1.1-py3-none-any.whl (18.0 kB view details)

Uploaded Python 3

File details

Details for the file acc_fwu-0.1.1.tar.gz.

File metadata

  • Download URL: acc_fwu-0.1.1.tar.gz
  • Upload date:
  • Size: 19.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.0 CPython/3.12.5

File hashes

Hashes for acc_fwu-0.1.1.tar.gz
Algorithm Hash digest
SHA256 afa730e657407a992485084cd8b85d56211889aa6f51acb347c3f0cfac16c5d9
MD5 72f88aba79c973f0f5644bfe599c217b
BLAKE2b-256 2183411bae50589e0394d5c25f0c1e41b7d6c31b358755a774d0c74fd16fcba9

See more details on using hashes here.

File details

Details for the file acc_fwu-0.1.1-py3-none-any.whl.

File metadata

  • Download URL: acc_fwu-0.1.1-py3-none-any.whl
  • Upload date:
  • Size: 18.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.0 CPython/3.12.5

File hashes

Hashes for acc_fwu-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 4a6a0e00456f782eed21e01c0b4325c83c64adea6f1683e7686d5d1cca386ea9
MD5 e95a5e6505623060cf98b40aff5defa3
BLAKE2b-256 36fccfb83e52a09cc29e1580d9573a51b564d129c740762cd0d0d31c78ea4c1e

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page