ipaccess 1.2.0 → 1.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +5 -13
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/.yardopts +2 -0
- data/ChangeLog +66 -0
- data/Manifest.txt +5 -10
- data/README.md +2 -2
- data/Rakefile +1 -1
- data/docs/HISTORY +11 -0
- data/docs/TODO +1 -1
- data/docs/yard-tpl/default/fulldoc/html/css/common.css +5 -0
- data/examples/open-uri.rb +14 -0
- data/examples/telnet.rb +1 -1
- data/ipaccess.gemspec +62 -0
- data/lib/ipaccess.rb +2 -566
- data/lib/ipaccess/arm_sockets.rb +0 -1
- data/lib/ipaccess/core.rb +523 -0
- data/lib/ipaccess/ghost_doc/ghost_doc.rb +1 -1
- data/lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc +54 -0
- data/lib/ipaccess/ghost_doc/ghost_doc_net_ftp.rb +35 -19
- data/lib/ipaccess/ghost_doc/ghost_doc_net_http.rb +34 -18
- data/lib/ipaccess/ghost_doc/ghost_doc_net_smtp.rb +35 -19
- data/lib/ipaccess/ghost_doc/ghost_doc_net_telnet.rb +35 -19
- data/lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc +65 -0
- data/lib/ipaccess/ghost_doc/ghost_doc_sockets.rb +353 -125
- data/lib/ipaccess/ip_access_check.rb +2 -2
- data/lib/ipaccess/ip_access_errors.rb +2 -2
- data/lib/ipaccess/ip_access_list.rb +3 -3
- data/lib/ipaccess/patches/generic.rb +150 -183
- data/lib/ipaccess/patches/net_ftp.rb +1 -2
- data/lib/ipaccess/patches/net_http.rb +10 -14
- data/lib/ipaccess/patches/net_imap.rb +1 -2
- data/lib/ipaccess/patches/net_pop.rb +2 -4
- data/lib/ipaccess/patches/net_smtp.rb +2 -4
- data/lib/ipaccess/patches/net_telnet.rb +1 -2
- data/lib/ipaccess/patches/sockets.rb +67 -69
- data/lib/ipaccess/socket.rb +0 -17
- metadata +70 -100
- metadata.gz.sig +0 -0
- data/lib/ipaccess/ghost_doc/ghost_doc_acl.rb +0 -54
- data/lib/ipaccess/ghost_doc/ghost_doc_p_blacklist.rb +0 -36
- data/lib/ipaccess/ghost_doc/ghost_doc_p_blacklist_e.rb +0 -7
- data/lib/ipaccess/ghost_doc/ghost_doc_p_unblacklist.rb +0 -36
- data/lib/ipaccess/ghost_doc/ghost_doc_p_unblacklist_e.rb +0 -7
- data/lib/ipaccess/ghost_doc/ghost_doc_p_unwhitelist.rb +0 -36
- data/lib/ipaccess/ghost_doc/ghost_doc_p_unwhitelist_e.rb +0 -7
- data/lib/ipaccess/ghost_doc/ghost_doc_p_whitelist.rb +0 -36
- data/lib/ipaccess/ghost_doc/ghost_doc_p_whitelist_e.rb +0 -7
- data/lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rb +0 -64
@@ -31,7 +31,7 @@
|
|
31
31
|
# class but provides special member called +acl+ and a few new
|
32
32
|
# instance methods for controlling IP access.
|
33
33
|
#
|
34
|
-
|
34
|
+
# {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
|
35
35
|
#
|
36
36
|
# This documentation doesn't cover description of all
|
37
37
|
# class and instance methods of the original
|
@@ -66,29 +66,193 @@
|
|
66
66
|
# socket.close
|
67
67
|
#
|
68
68
|
class IPAccess::Socket
|
69
|
-
#:include:ghost_doc_p_whitelist_e.rb
|
70
|
-
def whitelist!; end
|
71
69
|
|
72
|
-
|
73
|
-
|
70
|
+
# This method works same way as whitelist
|
71
|
+
# but it will allow you to modify the list
|
72
|
+
# even if the global access set is used by object.
|
73
|
+
#
|
74
|
+
# @overload whitelist!(*addresses)
|
75
|
+
# @overload whitelist!(list, *addresses)
|
76
|
+
|
77
|
+
def whitelist!(*addresses); end
|
78
|
+
|
79
|
+
# This method whitelists IP address(-es) in
|
80
|
+
# the input or output access list selected
|
81
|
+
# by the *list* argument (+:input+ or +:output+).
|
82
|
+
# If the access list selector is omited it
|
83
|
+
# operates on the default access list that certain
|
84
|
+
# kind of network object uses. The allowed format of address
|
85
|
+
# is the same as for IPAccess.to_cidrs.
|
86
|
+
# This method will not add nor remove any
|
87
|
+
# blacklisted item.
|
88
|
+
#
|
89
|
+
# === Restrictions
|
90
|
+
#
|
91
|
+
# This method won't allow you to modify the list if
|
92
|
+
# the global access set is associated with an object.
|
93
|
+
# You may operate on IPAccess::Set.Global or use
|
94
|
+
# whitelist! instead.
|
95
|
+
#
|
96
|
+
# === Return value
|
97
|
+
#
|
98
|
+
# It will return the result of calling
|
99
|
+
# IPAccess::List#whitelist on the list.
|
100
|
+
#
|
101
|
+
# === Revalidation
|
102
|
+
#
|
103
|
+
# After modyfing access set current connection
|
104
|
+
# is validated again to avoid access leaks.
|
105
|
+
#
|
106
|
+
# === DNS Warning
|
107
|
+
#
|
108
|
+
# You should avoid passing hostnames as arguments since
|
109
|
+
# DNS is not reliable and responses may change with time,
|
110
|
+
# which may cause security flaws.
|
111
|
+
#
|
112
|
+
# @overload(*addresses)
|
113
|
+
# @overload(list, *addresses)
|
114
|
+
def whitelist(*addresses); end
|
115
|
+
|
116
|
+
# This method works same way as blacklist
|
117
|
+
# but it will allow you to modify the list
|
118
|
+
# even if the global access set is used by object.
|
119
|
+
#
|
120
|
+
# @overload blacklist!(*addresses)
|
121
|
+
# @overload blacklist!(list, *addresses)
|
122
|
+
|
123
|
+
def blacklist!(*addresses); end
|
124
|
+
|
125
|
+
# This method blacklists IP address(-es) in
|
126
|
+
# the input or output access list selected
|
127
|
+
# by the *list* argument (+:input+ or +:output+).
|
128
|
+
# If the access list selector is omited it
|
129
|
+
# operates on the default access list that certain
|
130
|
+
# kind of network object uses. The allowed format of address
|
131
|
+
# is the same as for IPAccess.to_cidrs.
|
132
|
+
# This method will not add nor remove any
|
133
|
+
# whitelisted item.
|
134
|
+
#
|
135
|
+
# === Restrictions
|
136
|
+
#
|
137
|
+
# This method won't allow you to modify the list if
|
138
|
+
# the global access set is associated with an object.
|
139
|
+
# You may operate on IPAccess::Set.Global or use
|
140
|
+
# blacklist! instead.
|
141
|
+
#
|
142
|
+
# === Return value
|
143
|
+
#
|
144
|
+
# It will return the result of calling
|
145
|
+
# IPAccess::List#blacklist on the list.
|
146
|
+
#
|
147
|
+
# === Revalidation
|
148
|
+
#
|
149
|
+
# After modyfing access set current connection
|
150
|
+
# is validated again to avoid access leaks.
|
151
|
+
#
|
152
|
+
# === DNS Warning
|
153
|
+
#
|
154
|
+
# You should avoid passing hostnames as arguments since
|
155
|
+
# DNS is not reliable and responses may change with time,
|
156
|
+
# which may cause security flaws.
|
157
|
+
#
|
158
|
+
# @overload blacklist(*addresses)
|
159
|
+
# @overload blacklist(list, *addresses)
|
74
160
|
|
75
|
-
|
76
|
-
def blacklist!; end
|
161
|
+
def blacklist(*addresses); end
|
77
162
|
|
78
|
-
|
79
|
-
|
163
|
+
# This method works same way as unwhitelist
|
164
|
+
# but it will allow you to modify the list
|
165
|
+
# even if the global access set is used by object.
|
166
|
+
#
|
167
|
+
# @overload unwhitelist!(*addresses)
|
168
|
+
# @overload unwhitelist!(list, *addresses)
|
169
|
+
|
170
|
+
def unwhitelist!(*addresses); end
|
171
|
+
|
172
|
+
# This method removes whitelisted IP address(-es)
|
173
|
+
# from the input or output access list selected
|
174
|
+
# by the *list* argument (+:input+ or +:output+).
|
175
|
+
# If the access list selector is omited it
|
176
|
+
# operates on the default access list that certain
|
177
|
+
# kind of network object uses. The allowed format of address
|
178
|
+
# is the same as for IPAccess.to_cidrs.
|
179
|
+
# This method will not add nor remove any
|
180
|
+
# blacklisted item.
|
181
|
+
#
|
182
|
+
# === Restrictions
|
183
|
+
#
|
184
|
+
# This method won't allow you to modify the list if
|
185
|
+
# the global access set is associated with an object.
|
186
|
+
# You may operate on IPAccess::Set.Global or use
|
187
|
+
# unwhitelist! instead.
|
188
|
+
#
|
189
|
+
# === Return value
|
190
|
+
#
|
191
|
+
# It will return the result of calling
|
192
|
+
# IPAccess::List#unwhitelist on the list.
|
193
|
+
#
|
194
|
+
# === Revalidation
|
195
|
+
#
|
196
|
+
# After modyfing access set current connection
|
197
|
+
# is validated again to avoid access leaks.
|
198
|
+
#
|
199
|
+
# === DNS Warning
|
200
|
+
#
|
201
|
+
# You should avoid passing hostnames as arguments since
|
202
|
+
# DNS is not reliable and responses may change with time,
|
203
|
+
# which may cause security flaws.
|
204
|
+
#
|
205
|
+
# @overload unwhitelist(*addresses)
|
206
|
+
# @overload unwhitelist(list, *addresses)
|
80
207
|
|
81
|
-
|
82
|
-
def unwhitelist!; end
|
83
|
-
|
84
|
-
#:include:ghost_doc_p_unwhitelist.rb
|
85
|
-
def unwhitelist; end
|
208
|
+
def unwhitelist(*addresses); end
|
86
209
|
|
87
|
-
|
88
|
-
|
210
|
+
# This method works same way as unblacklist
|
211
|
+
# but it will allow you to modify the list
|
212
|
+
# even if the global access set is used by object.
|
213
|
+
#
|
214
|
+
# @overload unblacklist!(*addresses)
|
215
|
+
# @overload unblacklist!(list, *addresses)
|
216
|
+
|
217
|
+
def unblacklist!(*addresses); end
|
218
|
+
|
219
|
+
# This method removes blacklisted IP address(-es)
|
220
|
+
# from the input or output access list selected
|
221
|
+
# by the *list* argument (+:input+ or +:output+).
|
222
|
+
# If the access list selector is omited it
|
223
|
+
# operates on the default access list that certain
|
224
|
+
# kind of network object uses. The allowed format of address
|
225
|
+
# is the same as for IPAccess.to_cidrs.
|
226
|
+
# This method will not add nor remove any
|
227
|
+
# whitelisted item.
|
228
|
+
#
|
229
|
+
# === Restrictions
|
230
|
+
#
|
231
|
+
# This method won't allow you to modify the list if
|
232
|
+
# the global access set is associated with an object.
|
233
|
+
# You may operate on IPAccess::Set.Global or use
|
234
|
+
# unblacklist! instead.
|
235
|
+
#
|
236
|
+
# === Return value
|
237
|
+
#
|
238
|
+
# It will return the result of calling
|
239
|
+
# IPAccess::List#unblacklist on the list.
|
240
|
+
#
|
241
|
+
# === Revalidation
|
242
|
+
#
|
243
|
+
# After modyfing access set current connection
|
244
|
+
# is validated again to avoid access leaks.
|
245
|
+
#
|
246
|
+
# === DNS Warning
|
247
|
+
#
|
248
|
+
# You should avoid passing hostnames as arguments since
|
249
|
+
# DNS is not reliable and responses may change with time,
|
250
|
+
# which may cause security flaws.
|
251
|
+
#
|
252
|
+
# @overload unblacklist(*addresses)
|
253
|
+
# @overload unblacklist(list, *addresses)
|
89
254
|
|
90
|
-
|
91
|
-
def unblacklist; end
|
255
|
+
def unblacklist(*addresses); end
|
92
256
|
|
93
257
|
alias_method :unblock!, :unblacklist!
|
94
258
|
alias_method :del_black!, :unblacklist!
|
@@ -103,7 +267,7 @@ class IPAccess::Socket
|
|
103
267
|
alias_method :del_white!, :unwhitelist!
|
104
268
|
alias_method :del_white, :unwhitelist
|
105
269
|
|
106
|
-
|
270
|
+
# {include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
|
107
271
|
#
|
108
272
|
# === Example
|
109
273
|
#
|
@@ -151,7 +315,7 @@ end
|
|
151
315
|
# class but provides special member called +acl+ and a few new
|
152
316
|
# instance methods for controlling IP access.
|
153
317
|
#
|
154
|
-
|
318
|
+
# {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
|
155
319
|
#
|
156
320
|
# This documentation doesn't cover description of all
|
157
321
|
# class and instance methods of the original
|
@@ -159,29 +323,45 @@ end
|
|
159
323
|
# class, just the patched variants that make use of IP access control.
|
160
324
|
|
161
325
|
class IPAccess::UDPSocket
|
162
|
-
|
163
|
-
|
164
|
-
|
165
|
-
|
166
|
-
|
167
|
-
|
168
|
-
|
169
|
-
|
170
|
-
|
171
|
-
|
172
|
-
|
173
|
-
|
174
|
-
|
175
|
-
def
|
176
|
-
|
177
|
-
|
178
|
-
|
179
|
-
|
180
|
-
|
181
|
-
|
182
|
-
|
183
|
-
|
184
|
-
|
326
|
+
# {include:IPAccess::Socket#whitelist!}
|
327
|
+
# @overload whitelist!(*addresses)
|
328
|
+
# @overload whitelist!(list, *addresses)
|
329
|
+
def whitelist!(*addresses); end
|
330
|
+
|
331
|
+
# {include:IPAccess::Socket#whitelist}
|
332
|
+
# @overload whitelist(*addresses)
|
333
|
+
# @overload whitelist(list, *addresses)
|
334
|
+
def whitelist(*addresses); end
|
335
|
+
|
336
|
+
# {include:IPAccess::Socket#blacklist!}
|
337
|
+
# @overload blacklist!(*addresses)
|
338
|
+
# @overload blacklist!(list, *addresses)
|
339
|
+
def blacklist!(*addresses); end
|
340
|
+
|
341
|
+
# {include:IPAccess::Socket#blacklist}
|
342
|
+
# @overload blacklist(*addresses)
|
343
|
+
# @overload blacklist(list, *addresses)
|
344
|
+
def blacklist(*addresses); end
|
345
|
+
|
346
|
+
# {include:IPAccess::Socket#unwhitelist!}
|
347
|
+
# @overload unwhitelist!(*addresses)
|
348
|
+
# @overload unwhitelist!(list, *addresses)
|
349
|
+
def unwhitelist!(*addresses); end
|
350
|
+
|
351
|
+
# {include:IPAccess::Socket#unwhitelist}
|
352
|
+
# @overload unwhitelist(*addresses)
|
353
|
+
# @overload unwhitelist(list, *addresses)
|
354
|
+
def unwhitelist(*addresses); end
|
355
|
+
|
356
|
+
#{include:IPAccess::Socket#unblacklist!}
|
357
|
+
# @overload unblacklist!(*addresses)
|
358
|
+
# @overload unblacklist!(list, *addresses)
|
359
|
+
def unblacklist!(*addresses); end
|
360
|
+
|
361
|
+
#{include:IPAccess::Socket#unblacklist}
|
362
|
+
# @overload unblacklist(*addresses)
|
363
|
+
# @overload unblacklist(list, *addresses)
|
364
|
+
def unblacklist(*addresses); end
|
185
365
|
|
186
366
|
alias_method :unblock!, :unblacklist!
|
187
367
|
alias_method :del_black!, :unblacklist!
|
@@ -212,7 +392,7 @@ class IPAccess::UDPSocket
|
|
212
392
|
# allows to set reason.
|
213
393
|
def blacklist_reasonable(reason, *addresses); end
|
214
394
|
|
215
|
-
|
395
|
+
#{include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
|
216
396
|
#
|
217
397
|
# === Example
|
218
398
|
#
|
@@ -248,7 +428,7 @@ end
|
|
248
428
|
# class but provides special member called +acl+ and a few new
|
249
429
|
# instance methods for controlling IP access.
|
250
430
|
#
|
251
|
-
|
431
|
+
# {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
|
252
432
|
#
|
253
433
|
# This documentation doesn't cover description of all
|
254
434
|
# class and instance methods of the original
|
@@ -256,29 +436,45 @@ end
|
|
256
436
|
# class, just the patched variants that make use of IP access control.
|
257
437
|
|
258
438
|
class IPAccess::SOCKSSocket
|
259
|
-
|
260
|
-
|
261
|
-
|
262
|
-
|
263
|
-
|
264
|
-
|
265
|
-
|
266
|
-
|
267
|
-
|
268
|
-
|
269
|
-
|
270
|
-
|
271
|
-
|
272
|
-
def
|
273
|
-
|
274
|
-
|
275
|
-
|
276
|
-
|
277
|
-
|
278
|
-
|
279
|
-
|
280
|
-
|
281
|
-
|
439
|
+
# {include:IPAccess::Socket#whitelist!}
|
440
|
+
# @overload whitelist!(*addresses)
|
441
|
+
# @overload whitelist!(list, *addresses)
|
442
|
+
def whitelist!(*addresses); end
|
443
|
+
|
444
|
+
# {include:IPAccess::Socket#whitelist}
|
445
|
+
# @overload whitelist(*addresses)
|
446
|
+
# @overload whitelist(list, *addresses)
|
447
|
+
def whitelist(*addresses); end
|
448
|
+
|
449
|
+
# {include:IPAccess::Socket#blacklist!}
|
450
|
+
# @overload blacklist!(*addresses)
|
451
|
+
# @overload blacklist!(list, *addresses)
|
452
|
+
def blacklist!(*addresses); end
|
453
|
+
|
454
|
+
# {include:IPAccess::Socket#blacklist}
|
455
|
+
# @overload blacklist(*addresses)
|
456
|
+
# @overload blacklist(list, *addresses)
|
457
|
+
def blacklist(*addresses); end
|
458
|
+
|
459
|
+
# {include:IPAccess::Socket#unwhitelist!}
|
460
|
+
# @overload unwhitelist!(*addresses)
|
461
|
+
# @overload unwhitelist!(list, *addresses)
|
462
|
+
def unwhitelist!(*addresses); end
|
463
|
+
|
464
|
+
# {include:IPAccess::Socket#unwhitelist}
|
465
|
+
# @overload unwhitelist(*addresses)
|
466
|
+
# @overload unwhitelist(list, *addresses)
|
467
|
+
def unwhitelist(*addresses); end
|
468
|
+
|
469
|
+
#{include:IPAccess::Socket#unblacklist!}
|
470
|
+
# @overload unblacklist!(*addresses)
|
471
|
+
# @overload unblacklist!(list, *addresses)
|
472
|
+
def unblacklist!(*addresses); end
|
473
|
+
|
474
|
+
#{include:IPAccess::Socket#unblacklist}
|
475
|
+
# @overload unblacklist(*addresses)
|
476
|
+
# @overload unblacklist(list, *addresses)
|
477
|
+
def unblacklist(*addresses); end
|
282
478
|
|
283
479
|
alias_method :unblock!, :unblacklist!
|
284
480
|
alias_method :del_black!, :unblacklist!
|
@@ -293,7 +489,7 @@ class IPAccess::SOCKSSocket
|
|
293
489
|
alias_method :del_white!, :unwhitelist!
|
294
490
|
alias_method :del_white, :unwhitelist
|
295
491
|
|
296
|
-
|
492
|
+
#{include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
|
297
493
|
#
|
298
494
|
# === Example
|
299
495
|
#
|
@@ -348,7 +544,7 @@ end
|
|
348
544
|
# class but provides special member called +acl+ and a few new
|
349
545
|
# instance methods for controlling IP access.
|
350
546
|
#
|
351
|
-
|
547
|
+
# {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
|
352
548
|
#
|
353
549
|
# This documentation doesn't cover description of all
|
354
550
|
# class and instance methods of the original
|
@@ -365,29 +561,45 @@ end
|
|
365
561
|
# socket = IPAccess::TCPSocket.new('randomseed.pl', 80)
|
366
562
|
|
367
563
|
class IPAccess::TCPSocket
|
368
|
-
|
369
|
-
|
370
|
-
|
371
|
-
|
372
|
-
|
373
|
-
|
374
|
-
|
375
|
-
|
376
|
-
|
377
|
-
|
378
|
-
|
379
|
-
|
380
|
-
|
381
|
-
def
|
382
|
-
|
383
|
-
|
384
|
-
|
385
|
-
|
386
|
-
|
387
|
-
|
388
|
-
|
389
|
-
|
390
|
-
|
564
|
+
# {include:IPAccess::Socket#whitelist!}
|
565
|
+
# @overload whitelist!(*addresses)
|
566
|
+
# @overload whitelist!(list, *addresses)
|
567
|
+
def whitelist!(*addresses); end
|
568
|
+
|
569
|
+
# {include:IPAccess::Socket#whitelist}
|
570
|
+
# @overload whitelist(*addresses)
|
571
|
+
# @overload whitelist(list, *addresses)
|
572
|
+
def whitelist(*addresses); end
|
573
|
+
|
574
|
+
# {include:IPAccess::Socket#blacklist!}
|
575
|
+
# @overload blacklist!(*addresses)
|
576
|
+
# @overload blacklist!(list, *addresses)
|
577
|
+
def blacklist!(*addresses); end
|
578
|
+
|
579
|
+
# {include:IPAccess::Socket#blacklist}
|
580
|
+
# @overload blacklist(*addresses)
|
581
|
+
# @overload blacklist(list, *addresses)
|
582
|
+
def blacklist(*addresses); end
|
583
|
+
|
584
|
+
# {include:IPAccess::Socket#unwhitelist!}
|
585
|
+
# @overload unwhitelist!(*addresses)
|
586
|
+
# @overload unwhitelist!(list, *addresses)
|
587
|
+
def unwhitelist!(*addresses); end
|
588
|
+
|
589
|
+
# {include:IPAccess::Socket#unwhitelist}
|
590
|
+
# @overload unwhitelist(*addresses)
|
591
|
+
# @overload unwhitelist(list, *addresses)
|
592
|
+
def unwhitelist(*addresses); end
|
593
|
+
|
594
|
+
#{include:IPAccess::Socket#unblacklist!}
|
595
|
+
# @overload unblacklist!(*addresses)
|
596
|
+
# @overload unblacklist!(list, *addresses)
|
597
|
+
def unblacklist!(*addresses); end
|
598
|
+
|
599
|
+
#{include:IPAccess::Socket#unblacklist}
|
600
|
+
# @overload unblacklist(*addresses)
|
601
|
+
# @overload unblacklist(list, *addresses)
|
602
|
+
def unblacklist(*addresses); end
|
391
603
|
|
392
604
|
alias_method :unblock!, :unblacklist!
|
393
605
|
alias_method :del_black!, :unblacklist!
|
@@ -402,7 +614,7 @@ class IPAccess::TCPSocket
|
|
402
614
|
alias_method :del_white!, :unwhitelist!
|
403
615
|
alias_method :del_white, :unwhitelist
|
404
616
|
|
405
|
-
|
617
|
+
#{include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
|
406
618
|
#
|
407
619
|
# === Example
|
408
620
|
#
|
@@ -430,11 +642,7 @@ class IPAccess::TCPSocket
|
|
430
642
|
# global ACL.
|
431
643
|
|
432
644
|
attr_reader :acl
|
433
|
-
|
434
|
-
# :call-seq:
|
435
|
-
# new(addr, port) <tt>{|socket| …}</tt><br />
|
436
|
-
# new(addr, port, acl) <tt>{|socket| …}</tt>
|
437
|
-
#
|
645
|
+
|
438
646
|
# Creates a new object and attempts to connect
|
439
647
|
# to the host and port. If a block is provided,
|
440
648
|
# it is yielded as socket object.
|
@@ -443,7 +651,11 @@ class IPAccess::TCPSocket
|
|
443
651
|
# The access set given as an argument has precedence
|
444
652
|
# over access set given in options. If ACL parameter
|
445
653
|
# is not given it defaults to ACL to <tt>IPAccess::Set.Global</tt>.
|
446
|
-
|
654
|
+
#
|
655
|
+
# @overload new(addr, port)
|
656
|
+
# @yieldparam socket [Socket,TCPSocket,UDPSocket,SOCKSSocket]
|
657
|
+
# @overload new(addr, port, acl)
|
658
|
+
|
447
659
|
def initialize
|
448
660
|
# Real code hidden.
|
449
661
|
end
|
@@ -474,7 +686,7 @@ end
|
|
474
686
|
# class but provides special member called +acl+ and a few new
|
475
687
|
# instance methods for controlling IP access.
|
476
688
|
#
|
477
|
-
|
689
|
+
# {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
|
478
690
|
#
|
479
691
|
# This documentation doesn't cover description of all
|
480
692
|
# class and instance methods of the original
|
@@ -495,29 +707,45 @@ end
|
|
495
707
|
# sock = serv.sysaccept # accept connection
|
496
708
|
|
497
709
|
class IPAccess::TCPServer
|
498
|
-
|
499
|
-
|
500
|
-
|
501
|
-
|
502
|
-
|
503
|
-
|
504
|
-
|
505
|
-
|
506
|
-
|
507
|
-
|
508
|
-
|
509
|
-
|
510
|
-
|
511
|
-
def
|
512
|
-
|
513
|
-
|
514
|
-
|
515
|
-
|
516
|
-
|
517
|
-
|
518
|
-
|
519
|
-
|
520
|
-
|
710
|
+
# {include:IPAccess::Socket#whitelist!}
|
711
|
+
# @overload whitelist!(*addresses)
|
712
|
+
# @overload whitelist!(list, *addresses)
|
713
|
+
def whitelist!(*addresses); end
|
714
|
+
|
715
|
+
# {include:IPAccess::Socket#whitelist}
|
716
|
+
# @overload whitelist(*addresses)
|
717
|
+
# @overload whitelist(list, *addresses)
|
718
|
+
def whitelist(*addresses); end
|
719
|
+
|
720
|
+
# {include:IPAccess::Socket#blacklist!}
|
721
|
+
# @overload blacklist!(*addresses)
|
722
|
+
# @overload blacklist!(list, *addresses)
|
723
|
+
def blacklist!(*addresses); end
|
724
|
+
|
725
|
+
# {include:IPAccess::Socket#blacklist}
|
726
|
+
# @overload blacklist(*addresses)
|
727
|
+
# @overload blacklist(list, *addresses)
|
728
|
+
def blacklist(*addresses); end
|
729
|
+
|
730
|
+
# {include:IPAccess::Socket#unwhitelist!}
|
731
|
+
# @overload unwhitelist!(*addresses)
|
732
|
+
# @overload unwhitelist!(list, *addresses)
|
733
|
+
def unwhitelist!(*addresses); end
|
734
|
+
|
735
|
+
# {include:IPAccess::Socket#unwhitelist}
|
736
|
+
# @overload unwhitelist(*addresses)
|
737
|
+
# @overload unwhitelist(list, *addresses)
|
738
|
+
def unwhitelist(*addresses); end
|
739
|
+
|
740
|
+
#{include:IPAccess::Socket#unblacklist!}
|
741
|
+
# @overload unblacklist!(*addresses)
|
742
|
+
# @overload unblacklist!(list, *addresses)
|
743
|
+
def unblacklist!(*addresses); end
|
744
|
+
|
745
|
+
#{include:IPAccess::Socket#unblacklist}
|
746
|
+
# @overload unblacklist(*addresses)
|
747
|
+
# @overload unblacklist(list, *addresses)
|
748
|
+
def unblacklist(*addresses); end
|
521
749
|
|
522
750
|
alias_method :unblock!, :unblacklist!
|
523
751
|
alias_method :del_black!, :unblacklist!
|
@@ -532,7 +760,7 @@ class IPAccess::TCPServer
|
|
532
760
|
alias_method :del_white!, :unwhitelist!
|
533
761
|
alias_method :del_white, :unwhitelist
|
534
762
|
|
535
|
-
|
763
|
+
#{include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
|
536
764
|
#
|
537
765
|
# === Example
|
538
766
|
#
|