@@ -23,7 +23,7 @@ access control should be used on this request. The following ``access_control``
2323options are used for matching:
2424
2525* ``path ``
26- * ``ip `` or ``ips `` (netmask is supported)
26+ * ``ip `` or ``ips `` (netmasks are also supported)
2727* ``host ``
2828* ``methods ``
2929
@@ -176,6 +176,7 @@ pattern so that it is only accessible by requests from the local server itself:
176176 # ...
177177 access_control :
178178 #
179+ # the 'ips' option supports IP addresses and subnet masks
179180 - { path: ^/internal, roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1, ::1, 192.168.0.1/24] }
180181 - { path: ^/internal, roles: ROLE_NO_ACCESS }
181182
@@ -191,6 +192,7 @@ pattern so that it is only accessible by requests from the local server itself:
191192
192193 <config >
193194 <!-- ... -->
195+ <!-- the 'ips' option supports IP addresses and subnet masks -->
194196 <rule path =" ^/internal"
195197 role =" IS_AUTHENTICATED_ANONYMOUSLY"
196198 ips =" 127.0.0.1, ::1, 192.168.0.1/24"
@@ -209,6 +211,7 @@ pattern so that it is only accessible by requests from the local server itself:
209211 array(
210212 'path' => '^/internal',
211213 'role' => 'IS_AUTHENTICATED_ANONYMOUSLY',
214+ // the 'ips' option supports IP addresses and subnet masks
212215 'ips' => '127.0.0.1, ::1, 192.168.0.1/24',
213216 ),
214217 array(
@@ -239,8 +242,6 @@ address):
239242
240243* The second access rule is not examined as the first rule matched.
241244
242- IP netmask is supported. You can write ``ip `` or ``ips `` with ``192.168.0.1/24 `` or ``192.168.0.1/32 ``.
243-
244245.. _security-allow-if :
245246
246247Securing by an Expression
0 commit comments