ipaccess 1.2.0 → 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. checksums.yaml +5 -13
  2. checksums.yaml.gz.sig +0 -0
  3. data.tar.gz.sig +0 -0
  4. data/.yardopts +2 -0
  5. data/ChangeLog +66 -0
  6. data/Manifest.txt +5 -10
  7. data/README.md +2 -2
  8. data/Rakefile +1 -1
  9. data/docs/HISTORY +11 -0
  10. data/docs/TODO +1 -1
  11. data/docs/yard-tpl/default/fulldoc/html/css/common.css +5 -0
  12. data/examples/open-uri.rb +14 -0
  13. data/examples/telnet.rb +1 -1
  14. data/ipaccess.gemspec +62 -0
  15. data/lib/ipaccess.rb +2 -566
  16. data/lib/ipaccess/arm_sockets.rb +0 -1
  17. data/lib/ipaccess/core.rb +523 -0
  18. data/lib/ipaccess/ghost_doc/ghost_doc.rb +1 -1
  19. data/lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc +54 -0
  20. data/lib/ipaccess/ghost_doc/ghost_doc_net_ftp.rb +35 -19
  21. data/lib/ipaccess/ghost_doc/ghost_doc_net_http.rb +34 -18
  22. data/lib/ipaccess/ghost_doc/ghost_doc_net_smtp.rb +35 -19
  23. data/lib/ipaccess/ghost_doc/ghost_doc_net_telnet.rb +35 -19
  24. data/lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc +65 -0
  25. data/lib/ipaccess/ghost_doc/ghost_doc_sockets.rb +353 -125
  26. data/lib/ipaccess/ip_access_check.rb +2 -2
  27. data/lib/ipaccess/ip_access_errors.rb +2 -2
  28. data/lib/ipaccess/ip_access_list.rb +3 -3
  29. data/lib/ipaccess/patches/generic.rb +150 -183
  30. data/lib/ipaccess/patches/net_ftp.rb +1 -2
  31. data/lib/ipaccess/patches/net_http.rb +10 -14
  32. data/lib/ipaccess/patches/net_imap.rb +1 -2
  33. data/lib/ipaccess/patches/net_pop.rb +2 -4
  34. data/lib/ipaccess/patches/net_smtp.rb +2 -4
  35. data/lib/ipaccess/patches/net_telnet.rb +1 -2
  36. data/lib/ipaccess/patches/sockets.rb +67 -69
  37. data/lib/ipaccess/socket.rb +0 -17
  38. metadata +70 -100
  39. metadata.gz.sig +0 -0
  40. data/lib/ipaccess/ghost_doc/ghost_doc_acl.rb +0 -54
  41. data/lib/ipaccess/ghost_doc/ghost_doc_p_blacklist.rb +0 -36
  42. data/lib/ipaccess/ghost_doc/ghost_doc_p_blacklist_e.rb +0 -7
  43. data/lib/ipaccess/ghost_doc/ghost_doc_p_unblacklist.rb +0 -36
  44. data/lib/ipaccess/ghost_doc/ghost_doc_p_unblacklist_e.rb +0 -7
  45. data/lib/ipaccess/ghost_doc/ghost_doc_p_unwhitelist.rb +0 -36
  46. data/lib/ipaccess/ghost_doc/ghost_doc_p_unwhitelist_e.rb +0 -7
  47. data/lib/ipaccess/ghost_doc/ghost_doc_p_whitelist.rb +0 -36
  48. data/lib/ipaccess/ghost_doc/ghost_doc_p_whitelist_e.rb +0 -7
  49. data/lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rb +0 -64
@@ -31,7 +31,7 @@
31
31
  # class but provides special member called +acl+ and a few new
32
32
  # instance methods for controlling IP access.
33
33
  #
34
- #:include:ghost_doc_patched_usage.rb
34
+ # {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
35
35
  #
36
36
  # This documentation doesn't cover description of all
37
37
  # class and instance methods of the original
@@ -66,29 +66,193 @@
66
66
  # socket.close
67
67
  #
68
68
  class IPAccess::Socket
69
- #:include:ghost_doc_p_whitelist_e.rb
70
- def whitelist!; end
71
69
 
72
- #:include:ghost_doc_p_whitelist.rb
73
- def whitelist; end
70
+ # This method works same way as whitelist
71
+ # but it will allow you to modify the list
72
+ # even if the global access set is used by object.
73
+ #
74
+ # @overload whitelist!(*addresses)
75
+ # @overload whitelist!(list, *addresses)
76
+
77
+ def whitelist!(*addresses); end
78
+
79
+ # This method whitelists IP address(-es) in
80
+ # the input or output access list selected
81
+ # by the *list* argument (+:input+ or +:output+).
82
+ # If the access list selector is omited it
83
+ # operates on the default access list that certain
84
+ # kind of network object uses. The allowed format of address
85
+ # is the same as for IPAccess.to_cidrs.
86
+ # This method will not add nor remove any
87
+ # blacklisted item.
88
+ #
89
+ # === Restrictions
90
+ #
91
+ # This method won't allow you to modify the list if
92
+ # the global access set is associated with an object.
93
+ # You may operate on IPAccess::Set.Global or use
94
+ # whitelist! instead.
95
+ #
96
+ # === Return value
97
+ #
98
+ # It will return the result of calling
99
+ # IPAccess::List#whitelist on the list.
100
+ #
101
+ # === Revalidation
102
+ #
103
+ # After modyfing access set current connection
104
+ # is validated again to avoid access leaks.
105
+ #
106
+ # === DNS Warning
107
+ #
108
+ # You should avoid passing hostnames as arguments since
109
+ # DNS is not reliable and responses may change with time,
110
+ # which may cause security flaws.
111
+ #
112
+ # @overload(*addresses)
113
+ # @overload(list, *addresses)
114
+ def whitelist(*addresses); end
115
+
116
+ # This method works same way as blacklist
117
+ # but it will allow you to modify the list
118
+ # even if the global access set is used by object.
119
+ #
120
+ # @overload blacklist!(*addresses)
121
+ # @overload blacklist!(list, *addresses)
122
+
123
+ def blacklist!(*addresses); end
124
+
125
+ # This method blacklists IP address(-es) in
126
+ # the input or output access list selected
127
+ # by the *list* argument (+:input+ or +:output+).
128
+ # If the access list selector is omited it
129
+ # operates on the default access list that certain
130
+ # kind of network object uses. The allowed format of address
131
+ # is the same as for IPAccess.to_cidrs.
132
+ # This method will not add nor remove any
133
+ # whitelisted item.
134
+ #
135
+ # === Restrictions
136
+ #
137
+ # This method won't allow you to modify the list if
138
+ # the global access set is associated with an object.
139
+ # You may operate on IPAccess::Set.Global or use
140
+ # blacklist! instead.
141
+ #
142
+ # === Return value
143
+ #
144
+ # It will return the result of calling
145
+ # IPAccess::List#blacklist on the list.
146
+ #
147
+ # === Revalidation
148
+ #
149
+ # After modyfing access set current connection
150
+ # is validated again to avoid access leaks.
151
+ #
152
+ # === DNS Warning
153
+ #
154
+ # You should avoid passing hostnames as arguments since
155
+ # DNS is not reliable and responses may change with time,
156
+ # which may cause security flaws.
157
+ #
158
+ # @overload blacklist(*addresses)
159
+ # @overload blacklist(list, *addresses)
74
160
 
75
- #:include:ghost_doc_p_blacklist_e.rb
76
- def blacklist!; end
161
+ def blacklist(*addresses); end
77
162
 
78
- #:include:ghost_doc_p_blacklist.rb
79
- def blacklist; end
163
+ # This method works same way as unwhitelist
164
+ # but it will allow you to modify the list
165
+ # even if the global access set is used by object.
166
+ #
167
+ # @overload unwhitelist!(*addresses)
168
+ # @overload unwhitelist!(list, *addresses)
169
+
170
+ def unwhitelist!(*addresses); end
171
+
172
+ # This method removes whitelisted IP address(-es)
173
+ # from the input or output access list selected
174
+ # by the *list* argument (+:input+ or +:output+).
175
+ # If the access list selector is omited it
176
+ # operates on the default access list that certain
177
+ # kind of network object uses. The allowed format of address
178
+ # is the same as for IPAccess.to_cidrs.
179
+ # This method will not add nor remove any
180
+ # blacklisted item.
181
+ #
182
+ # === Restrictions
183
+ #
184
+ # This method won't allow you to modify the list if
185
+ # the global access set is associated with an object.
186
+ # You may operate on IPAccess::Set.Global or use
187
+ # unwhitelist! instead.
188
+ #
189
+ # === Return value
190
+ #
191
+ # It will return the result of calling
192
+ # IPAccess::List#unwhitelist on the list.
193
+ #
194
+ # === Revalidation
195
+ #
196
+ # After modyfing access set current connection
197
+ # is validated again to avoid access leaks.
198
+ #
199
+ # === DNS Warning
200
+ #
201
+ # You should avoid passing hostnames as arguments since
202
+ # DNS is not reliable and responses may change with time,
203
+ # which may cause security flaws.
204
+ #
205
+ # @overload unwhitelist(*addresses)
206
+ # @overload unwhitelist(list, *addresses)
80
207
 
81
- #:include:ghost_doc_p_unwhitelist_e.rb
82
- def unwhitelist!; end
83
-
84
- #:include:ghost_doc_p_unwhitelist.rb
85
- def unwhitelist; end
208
+ def unwhitelist(*addresses); end
86
209
 
87
- #:include:ghost_doc_p_unblacklist_e.rb
88
- def unblacklist!; end
210
+ # This method works same way as unblacklist
211
+ # but it will allow you to modify the list
212
+ # even if the global access set is used by object.
213
+ #
214
+ # @overload unblacklist!(*addresses)
215
+ # @overload unblacklist!(list, *addresses)
216
+
217
+ def unblacklist!(*addresses); end
218
+
219
+ # This method removes blacklisted IP address(-es)
220
+ # from the input or output access list selected
221
+ # by the *list* argument (+:input+ or +:output+).
222
+ # If the access list selector is omited it
223
+ # operates on the default access list that certain
224
+ # kind of network object uses. The allowed format of address
225
+ # is the same as for IPAccess.to_cidrs.
226
+ # This method will not add nor remove any
227
+ # whitelisted item.
228
+ #
229
+ # === Restrictions
230
+ #
231
+ # This method won't allow you to modify the list if
232
+ # the global access set is associated with an object.
233
+ # You may operate on IPAccess::Set.Global or use
234
+ # unblacklist! instead.
235
+ #
236
+ # === Return value
237
+ #
238
+ # It will return the result of calling
239
+ # IPAccess::List#unblacklist on the list.
240
+ #
241
+ # === Revalidation
242
+ #
243
+ # After modyfing access set current connection
244
+ # is validated again to avoid access leaks.
245
+ #
246
+ # === DNS Warning
247
+ #
248
+ # You should avoid passing hostnames as arguments since
249
+ # DNS is not reliable and responses may change with time,
250
+ # which may cause security flaws.
251
+ #
252
+ # @overload unblacklist(*addresses)
253
+ # @overload unblacklist(list, *addresses)
89
254
 
90
- #:include:ghost_doc_p_unblacklist.rb
91
- def unblacklist; end
255
+ def unblacklist(*addresses); end
92
256
 
93
257
  alias_method :unblock!, :unblacklist!
94
258
  alias_method :del_black!, :unblacklist!
@@ -103,7 +267,7 @@ class IPAccess::Socket
103
267
  alias_method :del_white!, :unwhitelist!
104
268
  alias_method :del_white, :unwhitelist
105
269
 
106
- #:include:ghost_doc_acl.rb
270
+ # {include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
107
271
  #
108
272
  # === Example
109
273
  #
@@ -151,7 +315,7 @@ end
151
315
  # class but provides special member called +acl+ and a few new
152
316
  # instance methods for controlling IP access.
153
317
  #
154
- #:include:ghost_doc_patched_usage.rb
318
+ # {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
155
319
  #
156
320
  # This documentation doesn't cover description of all
157
321
  # class and instance methods of the original
@@ -159,29 +323,45 @@ end
159
323
  # class, just the patched variants that make use of IP access control.
160
324
 
161
325
  class IPAccess::UDPSocket
162
- #:include:ghost_doc_p_whitelist_e.rb
163
- def whitelist!; end
164
-
165
- #:include:ghost_doc_p_whitelist.rb
166
- def whitelist; end
167
-
168
- #:include:ghost_doc_p_blacklist_e.rb
169
- def blacklist!; end
170
-
171
- #:include:ghost_doc_p_blacklist.rb
172
- def blacklist; end
173
-
174
- #:include:ghost_doc_p_unwhitelist_e.rb
175
- def unwhitelist!; end
176
-
177
- #:include:ghost_doc_p_unwhitelist.rb
178
- def unwhitelist; end
179
-
180
- #:include:ghost_doc_p_unblacklist_e.rb
181
- def unblacklist!; end
182
-
183
- #:include:ghost_doc_p_unblacklist.rb
184
- def unblacklist; end
326
+ # {include:IPAccess::Socket#whitelist!}
327
+ # @overload whitelist!(*addresses)
328
+ # @overload whitelist!(list, *addresses)
329
+ def whitelist!(*addresses); end
330
+
331
+ # {include:IPAccess::Socket#whitelist}
332
+ # @overload whitelist(*addresses)
333
+ # @overload whitelist(list, *addresses)
334
+ def whitelist(*addresses); end
335
+
336
+ # {include:IPAccess::Socket#blacklist!}
337
+ # @overload blacklist!(*addresses)
338
+ # @overload blacklist!(list, *addresses)
339
+ def blacklist!(*addresses); end
340
+
341
+ # {include:IPAccess::Socket#blacklist}
342
+ # @overload blacklist(*addresses)
343
+ # @overload blacklist(list, *addresses)
344
+ def blacklist(*addresses); end
345
+
346
+ # {include:IPAccess::Socket#unwhitelist!}
347
+ # @overload unwhitelist!(*addresses)
348
+ # @overload unwhitelist!(list, *addresses)
349
+ def unwhitelist!(*addresses); end
350
+
351
+ # {include:IPAccess::Socket#unwhitelist}
352
+ # @overload unwhitelist(*addresses)
353
+ # @overload unwhitelist(list, *addresses)
354
+ def unwhitelist(*addresses); end
355
+
356
+ #{include:IPAccess::Socket#unblacklist!}
357
+ # @overload unblacklist!(*addresses)
358
+ # @overload unblacklist!(list, *addresses)
359
+ def unblacklist!(*addresses); end
360
+
361
+ #{include:IPAccess::Socket#unblacklist}
362
+ # @overload unblacklist(*addresses)
363
+ # @overload unblacklist(list, *addresses)
364
+ def unblacklist(*addresses); end
185
365
 
186
366
  alias_method :unblock!, :unblacklist!
187
367
  alias_method :del_black!, :unblacklist!
@@ -212,7 +392,7 @@ class IPAccess::UDPSocket
212
392
  # allows to set reason.
213
393
  def blacklist_reasonable(reason, *addresses); end
214
394
 
215
- #:include:ghost_doc_acl.rb
395
+ #{include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
216
396
  #
217
397
  # === Example
218
398
  #
@@ -248,7 +428,7 @@ end
248
428
  # class but provides special member called +acl+ and a few new
249
429
  # instance methods for controlling IP access.
250
430
  #
251
- #:include:ghost_doc_patched_usage.rb
431
+ # {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
252
432
  #
253
433
  # This documentation doesn't cover description of all
254
434
  # class and instance methods of the original
@@ -256,29 +436,45 @@ end
256
436
  # class, just the patched variants that make use of IP access control.
257
437
 
258
438
  class IPAccess::SOCKSSocket
259
- #:include:ghost_doc_p_whitelist_e.rb
260
- def whitelist!; end
261
-
262
- #:include:ghost_doc_p_whitelist.rb
263
- def whitelist; end
264
-
265
- #:include:ghost_doc_p_blacklist_e.rb
266
- def blacklist!; end
267
-
268
- #:include:ghost_doc_p_blacklist.rb
269
- def blacklist; end
270
-
271
- #:include:ghost_doc_p_unwhitelist_e.rb
272
- def unwhitelist!; end
273
-
274
- #:include:ghost_doc_p_unwhitelist.rb
275
- def unwhitelist; end
276
-
277
- #:include:ghost_doc_p_unblacklist_e.rb
278
- def unblacklist!; end
279
-
280
- #:include:ghost_doc_p_unblacklist.rb
281
- def unblacklist; end
439
+ # {include:IPAccess::Socket#whitelist!}
440
+ # @overload whitelist!(*addresses)
441
+ # @overload whitelist!(list, *addresses)
442
+ def whitelist!(*addresses); end
443
+
444
+ # {include:IPAccess::Socket#whitelist}
445
+ # @overload whitelist(*addresses)
446
+ # @overload whitelist(list, *addresses)
447
+ def whitelist(*addresses); end
448
+
449
+ # {include:IPAccess::Socket#blacklist!}
450
+ # @overload blacklist!(*addresses)
451
+ # @overload blacklist!(list, *addresses)
452
+ def blacklist!(*addresses); end
453
+
454
+ # {include:IPAccess::Socket#blacklist}
455
+ # @overload blacklist(*addresses)
456
+ # @overload blacklist(list, *addresses)
457
+ def blacklist(*addresses); end
458
+
459
+ # {include:IPAccess::Socket#unwhitelist!}
460
+ # @overload unwhitelist!(*addresses)
461
+ # @overload unwhitelist!(list, *addresses)
462
+ def unwhitelist!(*addresses); end
463
+
464
+ # {include:IPAccess::Socket#unwhitelist}
465
+ # @overload unwhitelist(*addresses)
466
+ # @overload unwhitelist(list, *addresses)
467
+ def unwhitelist(*addresses); end
468
+
469
+ #{include:IPAccess::Socket#unblacklist!}
470
+ # @overload unblacklist!(*addresses)
471
+ # @overload unblacklist!(list, *addresses)
472
+ def unblacklist!(*addresses); end
473
+
474
+ #{include:IPAccess::Socket#unblacklist}
475
+ # @overload unblacklist(*addresses)
476
+ # @overload unblacklist(list, *addresses)
477
+ def unblacklist(*addresses); end
282
478
 
283
479
  alias_method :unblock!, :unblacklist!
284
480
  alias_method :del_black!, :unblacklist!
@@ -293,7 +489,7 @@ class IPAccess::SOCKSSocket
293
489
  alias_method :del_white!, :unwhitelist!
294
490
  alias_method :del_white, :unwhitelist
295
491
 
296
- #:include:ghost_doc_acl.rb
492
+ #{include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
297
493
  #
298
494
  # === Example
299
495
  #
@@ -348,7 +544,7 @@ end
348
544
  # class but provides special member called +acl+ and a few new
349
545
  # instance methods for controlling IP access.
350
546
  #
351
- #:include:ghost_doc_patched_usage.rb
547
+ # {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
352
548
  #
353
549
  # This documentation doesn't cover description of all
354
550
  # class and instance methods of the original
@@ -365,29 +561,45 @@ end
365
561
  # socket = IPAccess::TCPSocket.new('randomseed.pl', 80)
366
562
 
367
563
  class IPAccess::TCPSocket
368
- #:include:ghost_doc_p_whitelist_e.rb
369
- def whitelist!; end
370
-
371
- #:include:ghost_doc_p_whitelist.rb
372
- def whitelist; end
373
-
374
- #:include:ghost_doc_p_blacklist_e.rb
375
- def blacklist!; end
376
-
377
- #:include:ghost_doc_p_blacklist.rb
378
- def blacklist; end
379
-
380
- #:include:ghost_doc_p_unwhitelist_e.rb
381
- def unwhitelist!; end
382
-
383
- #:include:ghost_doc_p_unwhitelist.rb
384
- def unwhitelist; end
385
-
386
- #:include:ghost_doc_p_unblacklist_e.rb
387
- def unblacklist!; end
388
-
389
- #:include:ghost_doc_p_unblacklist.rb
390
- def unblacklist; end
564
+ # {include:IPAccess::Socket#whitelist!}
565
+ # @overload whitelist!(*addresses)
566
+ # @overload whitelist!(list, *addresses)
567
+ def whitelist!(*addresses); end
568
+
569
+ # {include:IPAccess::Socket#whitelist}
570
+ # @overload whitelist(*addresses)
571
+ # @overload whitelist(list, *addresses)
572
+ def whitelist(*addresses); end
573
+
574
+ # {include:IPAccess::Socket#blacklist!}
575
+ # @overload blacklist!(*addresses)
576
+ # @overload blacklist!(list, *addresses)
577
+ def blacklist!(*addresses); end
578
+
579
+ # {include:IPAccess::Socket#blacklist}
580
+ # @overload blacklist(*addresses)
581
+ # @overload blacklist(list, *addresses)
582
+ def blacklist(*addresses); end
583
+
584
+ # {include:IPAccess::Socket#unwhitelist!}
585
+ # @overload unwhitelist!(*addresses)
586
+ # @overload unwhitelist!(list, *addresses)
587
+ def unwhitelist!(*addresses); end
588
+
589
+ # {include:IPAccess::Socket#unwhitelist}
590
+ # @overload unwhitelist(*addresses)
591
+ # @overload unwhitelist(list, *addresses)
592
+ def unwhitelist(*addresses); end
593
+
594
+ #{include:IPAccess::Socket#unblacklist!}
595
+ # @overload unblacklist!(*addresses)
596
+ # @overload unblacklist!(list, *addresses)
597
+ def unblacklist!(*addresses); end
598
+
599
+ #{include:IPAccess::Socket#unblacklist}
600
+ # @overload unblacklist(*addresses)
601
+ # @overload unblacklist(list, *addresses)
602
+ def unblacklist(*addresses); end
391
603
 
392
604
  alias_method :unblock!, :unblacklist!
393
605
  alias_method :del_black!, :unblacklist!
@@ -402,7 +614,7 @@ class IPAccess::TCPSocket
402
614
  alias_method :del_white!, :unwhitelist!
403
615
  alias_method :del_white, :unwhitelist
404
616
 
405
- #:include:ghost_doc_acl.rb
617
+ #{include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
406
618
  #
407
619
  # === Example
408
620
  #
@@ -430,11 +642,7 @@ class IPAccess::TCPSocket
430
642
  # global ACL.
431
643
 
432
644
  attr_reader :acl
433
-
434
- # :call-seq:
435
- # new(addr, port) <tt>{|socket| …}</tt><br />
436
- # new(addr, port, acl) <tt>{|socket| …}</tt>
437
- #
645
+
438
646
  # Creates a new object and attempts to connect
439
647
  # to the host and port. If a block is provided,
440
648
  # it is yielded as socket object.
@@ -443,7 +651,11 @@ class IPAccess::TCPSocket
443
651
  # The access set given as an argument has precedence
444
652
  # over access set given in options. If ACL parameter
445
653
  # is not given it defaults to ACL to <tt>IPAccess::Set.Global</tt>.
446
-
654
+ #
655
+ # @overload new(addr, port)
656
+ # @yieldparam socket [Socket,TCPSocket,UDPSocket,SOCKSSocket]
657
+ # @overload new(addr, port, acl)
658
+
447
659
  def initialize
448
660
  # Real code hidden.
449
661
  end
@@ -474,7 +686,7 @@ end
474
686
  # class but provides special member called +acl+ and a few new
475
687
  # instance methods for controlling IP access.
476
688
  #
477
- #:include:ghost_doc_patched_usage.rb
689
+ # {include:file:lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc}
478
690
  #
479
691
  # This documentation doesn't cover description of all
480
692
  # class and instance methods of the original
@@ -495,29 +707,45 @@ end
495
707
  # sock = serv.sysaccept # accept connection
496
708
 
497
709
  class IPAccess::TCPServer
498
- #:include:ghost_doc_p_whitelist_e.rb
499
- def whitelist!; end
500
-
501
- #:include:ghost_doc_p_whitelist.rb
502
- def whitelist; end
503
-
504
- #:include:ghost_doc_p_blacklist_e.rb
505
- def blacklist!; end
506
-
507
- #:include:ghost_doc_p_blacklist.rb
508
- def blacklist; end
509
-
510
- #:include:ghost_doc_p_unwhitelist_e.rb
511
- def unwhitelist!; end
512
-
513
- #:include:ghost_doc_p_unwhitelist.rb
514
- def unwhitelist; end
515
-
516
- #:include:ghost_doc_p_unblacklist_e.rb
517
- def unblacklist!; end
518
-
519
- #:include:ghost_doc_p_unblacklist.rb
520
- def unblacklist; end
710
+ # {include:IPAccess::Socket#whitelist!}
711
+ # @overload whitelist!(*addresses)
712
+ # @overload whitelist!(list, *addresses)
713
+ def whitelist!(*addresses); end
714
+
715
+ # {include:IPAccess::Socket#whitelist}
716
+ # @overload whitelist(*addresses)
717
+ # @overload whitelist(list, *addresses)
718
+ def whitelist(*addresses); end
719
+
720
+ # {include:IPAccess::Socket#blacklist!}
721
+ # @overload blacklist!(*addresses)
722
+ # @overload blacklist!(list, *addresses)
723
+ def blacklist!(*addresses); end
724
+
725
+ # {include:IPAccess::Socket#blacklist}
726
+ # @overload blacklist(*addresses)
727
+ # @overload blacklist(list, *addresses)
728
+ def blacklist(*addresses); end
729
+
730
+ # {include:IPAccess::Socket#unwhitelist!}
731
+ # @overload unwhitelist!(*addresses)
732
+ # @overload unwhitelist!(list, *addresses)
733
+ def unwhitelist!(*addresses); end
734
+
735
+ # {include:IPAccess::Socket#unwhitelist}
736
+ # @overload unwhitelist(*addresses)
737
+ # @overload unwhitelist(list, *addresses)
738
+ def unwhitelist(*addresses); end
739
+
740
+ #{include:IPAccess::Socket#unblacklist!}
741
+ # @overload unblacklist!(*addresses)
742
+ # @overload unblacklist!(list, *addresses)
743
+ def unblacklist!(*addresses); end
744
+
745
+ #{include:IPAccess::Socket#unblacklist}
746
+ # @overload unblacklist(*addresses)
747
+ # @overload unblacklist(list, *addresses)
748
+ def unblacklist(*addresses); end
521
749
 
522
750
  alias_method :unblock!, :unblacklist!
523
751
  alias_method :del_black!, :unblacklist!
@@ -532,7 +760,7 @@ class IPAccess::TCPServer
532
760
  alias_method :del_white!, :unwhitelist!
533
761
  alias_method :del_white, :unwhitelist
534
762
 
535
- #:include:ghost_doc_acl.rb
763
+ #{include:file:lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc}
536
764
  #
537
765
  # === Example
538
766
  #