Apply an IP restriction to specific routes
Project description
django-simple-ip-restrict
This middleware allows you to mark Django URL namespaces as unavailable to all requests except those coming from a whitelisted IP subnet.
Instructions
Add to the list of MIDDLEWARE:
"django_simple_ip_restrict.middleware.ip_filter",
Then you can set the following keys on settings.py:
- IP_PROTECTED_NAMESPACES: list of namespaces to block (default: ["admin"])
- IP_NETWORKS_WHITELIST: list of subnets to allow, in CIDR notation
Manual deployment
Since we don't have a CI/CD pipeline set up right now. You'll have to follow the following steps to release
- Do your changes
- Install
bumpversion
andtwine
pip install twine bumpversion
- Bump the version using
bumpversion
bumpversion patch
- A commit should be made automatically, just push
git push
- Build using setup.py
python setup.py sdist
- Push to pypi using twine
twine upload dist/*
Use 1password
to find the credentials for pypi.
In order to upload, we have 2FA and the following needs to be done:
- username should be "__token__"
- password should be the Access Token value
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file django_simple_ip_restrict-1.0.46.tar.gz
.
File metadata
- Download URL: django_simple_ip_restrict-1.0.46.tar.gz
- Upload date:
- Size: 3.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.10.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e0f70f7e548071776186b41bf65ea335cbfd29a63dd02c35f1c3db1d8f181a5a |
|
MD5 | da195e81a74afeec1ab7440026e7e528 |
|
BLAKE2b-256 | aa1029e38db3bd5179254bd603640702e98b86e86672cc8ebb7591321eba8591 |