I second this. This could be useful as a setting for applications as
well. Like putting all backend-stuff in a separate app, and then
require specific IP's for access. It seems natural to provide this
kind of functionality as an environment-dependent setting, preferably
with customizeable fallback:

prod:
  .secure_access:
    allow:             //list ip's
    disallow:         //list ip's
    fallback:         //name of environment || app || url || none
(404/500)

Regards, Gunnar

On May 16, 2:55 pm, Andreas Hucks <[EMAIL PROTECTED]> wrote:
> Improvement: make "dev_hosts" an array for development on multiple machines.
>
> Andreas Hucks schrieb:
>
> > How about having a setting "dev_host" or something in security.yml or
> > other config. If the server executing the script does not match
> > dev_host, symfony either won't execute the dev environment at all, or
> > revert back to prod.
>
> > That way, it defaults to "don't execute dev", and cannot be overlooked
> > by accident when uploading.
>
> > Cheers,
> > Andreas
>
> > Ian P. Christian schrieb:
> >> I want to hear from you all as to what you think the best method for
> >> securing the default _dev files - I will not suggset anythign now, as I
> >> want to present a  blank slate.
>
> >> I will implement the solution we finally agree on.
> >> Thoes that want to help please let me know.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"symfony developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/symfony-devs?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to