Working on a remote host? Have IP-based login restrictions for security? This script updates your configuration files with current IPs of allowed hosts.
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Failed to load latest commit information.

Purpose of this tool

In my home, I have a cable connection which occasionally changes its IP address - occasionally means, it could be once a year or once a month. My coworkers use DSL connections, which get a new IP on each reconnect. On our server, we use IP addresses for access restrictions - root logins are only allowed from "our" IPs, as well as remote connections to the database (for having just one development DB).

So, whenever update-config tool is run, it resolves the IP addresses of some dynamic DNS hostnames and updates the appropriate section of the config files with the new addresses. As configuration files may have a distinct syntax, the user can specify the format of each config file in a very simple manner.


As this tool will directly modify your system's configuration, I urge you to make backup copies of each file you add to the configuration. I wrote this tool for my personal use, so I can't grant for anything if you might happen to locking yourself out of a remote machine.

This is tested with Debian Lenny and Mac OS X Snow Leopard, both with ruby 1.8.7, but should also work on other UNIX systems.


git clone
cd update-config
cp etc/security/hosts_allowed.yml /etc/security/
cp usr/sbin/resolver /usr/sbin
chmod 740 /usr/sbin/resolver

Now edit your hosts_allowed.yml with a text editor of your choice - maybe you should make a copy of your original access.conf or pg_hba using cp /etc/security/access.conf /etc/security/ cp /etc/postgresql/8.3/main/pg_hba.conf /etc/postgresql/8.3/main/ before running the script. The script itself will create a backup of the files (extension .bak) on each call, so you can always revert to the last state (only). Refer to the "Sample crontab entry" section of this file about adding a crontab entry.

Configuration example

The script looks after a BEGIN allowed_hosts ... END allowed_hosts block in each file. For each entry in the hostnames section, the contents of the block will be replaced by a comment and configuration line specified for each file.

Example hosts_allowed.yml file: hostnames: fred: eric: files: postgres: path: '/etc/postgresql/8.3/main/pg_hba.conf' comment: "# #{name}/#{host}" line: "hostssl\tall\t\tall\t\t#{ip}/32\tmd5" after: "kill -HUP cat /var/run/postgresql/" This example configuration will place the lines # eric/ hostssl all all md5 # fred/ hostssl all all md5 between the # BEGIN .. # END lines of your postgresql access configuration file and send HUP to the postgres process to enforce reloading of the configuration.

The block notation recognized by the script looks like: # BEGIN allowed_hosts configuration entries will be inserted here # END allowed_hosts Please notice the space between the comment hash and BEGIN/END.

The text has to be enclosed by double quotes. The following variables can be used (using #{variable}): ip host name After each line, a newline character is automatically inserted.

Sample crontab entry

Create a crontab entry like this - if you know when IP addresses are likely to change, you can make a crontab that executes the resolve script only at that minute. E.g. 32,14 1,5 * * * /usr/sbin/resolver >> /var/log/resolver.log 2>&1 This will execute the resolver at 1:14 am, 1:32 am, 5:14 am and 5:32 am. This may be neccessary if there are some more people working on your server.