"patterns as defined by match operator in java" as r5475 says

git-svn-id: https://svn.berlios.de/svnroot/repos/yacy/trunk@5476 6c8d7289-2bf4-0310-a012-ef5d649a1542
pull/1/head
lotus 16 years ago
parent 9ef77d57f5
commit e54d588a15

@ -31,5 +31,5 @@ network.unit.update.location3 = http://www.yacystats.de/yacybuild/
network.unit.protocol.control = uncontrolled
# white/blacklists
network.unit.access.whitelist = 10.*,127.*,172.16.*,169.254.*,192.168.*,localhost
network.unit.access.whitelist = 10\..*,127.*,172.(1[6-9]|2[0-9]|3[0-1])\..*,169.254.*,192.168.*,localhost
network.unit.access.blacklist =

@ -26,5 +26,5 @@ network.unit.update.location3 = http://www.yacystats.de/yacybuild/
network.unit.protocol.control = uncontrolled
# white/blacklists
network.unit.access.whitelist = 10.*,127.*,172.16.*,169.254.*,192.168.*,localhost
network.unit.access.whitelist = 10\..*,127.*,172.(1[6-9]|2[0-9]|3[0-1])\..*,169.254.*,192.168.*,localhost
network.unit.access.blacklist =

@ -52,9 +52,9 @@
# In contrast also a list of IPs may be given to be not allowed to access the peers at all
# The YaCy-httpd will not respond on any request from IPs given in the blacklist
# By default both lists should be empty to provide a basic search functionality for everyone.
# When running a private YaCy network, all peers that are in the own networ should be configured
# in the whitelist. Othervise the access from whitelistes clients is allowed, but the executing
# search requests in the private network for a singe request from outside is also blocked.
# When running a private YaCy network, all peers that are in the own network should be configured
# in the whitelist. Otherwise the access from whitelisted clients is allowed, but the executing
# search requests in the private network for a single request from outside is also blocked.
# Put simply all IPs from you peers in the whitelist.
# network.unit.access.whitelist =
# network.unit.access.blacklist =

@ -23,5 +23,5 @@ network.unit.update.location3 = http://www.yacystats.de/yacybuild/
network.unit.protocol.control = uncontrolled
# white/blacklists
network.unit.access.whitelist = 10.*,127.*,172.16.*,169.254.*,192.168.*,localhost
network.unit.access.whitelist = 10\..*,127.*,172.(1[6-9]|2[0-9]|3[0-1])\..*,169.254.*,192.168.*,localhost
network.unit.access.blacklist =
Loading…
Cancel
Save