ipaccess 1.2.0 → 1.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +5 -13
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/.yardopts +2 -0
- data/ChangeLog +66 -0
- data/Manifest.txt +5 -10
- data/README.md +2 -2
- data/Rakefile +1 -1
- data/docs/HISTORY +11 -0
- data/docs/TODO +1 -1
- data/docs/yard-tpl/default/fulldoc/html/css/common.css +5 -0
- data/examples/open-uri.rb +14 -0
- data/examples/telnet.rb +1 -1
- data/ipaccess.gemspec +62 -0
- data/lib/ipaccess.rb +2 -566
- data/lib/ipaccess/arm_sockets.rb +0 -1
- data/lib/ipaccess/core.rb +523 -0
- data/lib/ipaccess/ghost_doc/ghost_doc.rb +1 -1
- data/lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc +54 -0
- data/lib/ipaccess/ghost_doc/ghost_doc_net_ftp.rb +35 -19
- data/lib/ipaccess/ghost_doc/ghost_doc_net_http.rb +34 -18
- data/lib/ipaccess/ghost_doc/ghost_doc_net_smtp.rb +35 -19
- data/lib/ipaccess/ghost_doc/ghost_doc_net_telnet.rb +35 -19
- data/lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc +65 -0
- data/lib/ipaccess/ghost_doc/ghost_doc_sockets.rb +353 -125
- data/lib/ipaccess/ip_access_check.rb +2 -2
- data/lib/ipaccess/ip_access_errors.rb +2 -2
- data/lib/ipaccess/ip_access_list.rb +3 -3
- data/lib/ipaccess/patches/generic.rb +150 -183
- data/lib/ipaccess/patches/net_ftp.rb +1 -2
- data/lib/ipaccess/patches/net_http.rb +10 -14
- data/lib/ipaccess/patches/net_imap.rb +1 -2
- data/lib/ipaccess/patches/net_pop.rb +2 -4
- data/lib/ipaccess/patches/net_smtp.rb +2 -4
- data/lib/ipaccess/patches/net_telnet.rb +1 -2
- data/lib/ipaccess/patches/sockets.rb +67 -69
- data/lib/ipaccess/socket.rb +0 -17
- metadata +70 -100
- metadata.gz.sig +0 -0
- data/lib/ipaccess/ghost_doc/ghost_doc_acl.rb +0 -54
- data/lib/ipaccess/ghost_doc/ghost_doc_p_blacklist.rb +0 -36
- data/lib/ipaccess/ghost_doc/ghost_doc_p_blacklist_e.rb +0 -7
- data/lib/ipaccess/ghost_doc/ghost_doc_p_unblacklist.rb +0 -36
- data/lib/ipaccess/ghost_doc/ghost_doc_p_unblacklist_e.rb +0 -7
- data/lib/ipaccess/ghost_doc/ghost_doc_p_unwhitelist.rb +0 -36
- data/lib/ipaccess/ghost_doc/ghost_doc_p_unwhitelist_e.rb +0 -7
- data/lib/ipaccess/ghost_doc/ghost_doc_p_whitelist.rb +0 -36
- data/lib/ipaccess/ghost_doc/ghost_doc_p_whitelist_e.rb +0 -7
- data/lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rb +0 -64
data/lib/ipaccess/socket.rb
CHANGED
@@ -8,27 +8,11 @@
|
|
8
8
|
# of Ruby socket handling classes equipped
|
9
9
|
# with IP access control.
|
10
10
|
#
|
11
|
-
#--
|
12
|
-
#
|
13
|
-
# Copyright (C) 2009 by Paweł Wilk. All Rights Reserved.
|
14
|
-
#
|
15
|
-
# This program is free software; you can redistribute it and/or modify
|
16
|
-
# it under the terms of either: 1) the GNU Lesser General Public License
|
17
|
-
# as published by the Free Software Foundation; either version 3 of the
|
18
|
-
# License, or (at your option) any later version; or 2) Ruby's License.
|
19
|
-
#
|
20
|
-
# See the file COPYING for complete licensing information.
|
21
|
-
#
|
22
|
-
#
|
23
|
-
# See ipaccess/ghost_doc/ghost_doc.rb for documentation of this classes.
|
24
|
-
#
|
25
|
-
#++
|
26
11
|
|
27
12
|
require 'socket'
|
28
13
|
require 'ipaccess/ip_access_set'
|
29
14
|
require 'ipaccess/patches/sockets'
|
30
15
|
|
31
|
-
|
32
16
|
class IPAccess::Socket < Socket
|
33
17
|
include IPAccess::Patches::Socket
|
34
18
|
end
|
@@ -50,4 +34,3 @@ end
|
|
50
34
|
class IPAccess::TCPServer < TCPServer
|
51
35
|
include IPAccess::Patches::TCPServer
|
52
36
|
end
|
53
|
-
|
metadata
CHANGED
@@ -1,203 +1,175 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: ipaccess
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
5
|
-
MS4yLjA=
|
4
|
+
version: 1.2.2
|
6
5
|
platform: ruby
|
7
6
|
authors:
|
8
7
|
- Paweł Wilk
|
9
8
|
autorequire:
|
10
9
|
bindir: bin
|
11
10
|
cert_chain:
|
12
|
-
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
dk9qMGhUdXBLWFdPcVdrUzllTG1zSFlnUlYrUm02Q2xzQ3VkTApuc3c3VUpB
|
34
|
-
NVJUSXdhMnVpOVc0LzBKSG8yLzhEUCtjQ3NFcDRUdzVMMFdpSjRQRmV0eFo2
|
35
|
-
blB4NW0wNmhsQ2w0CnJOb21iS210SEMwQVNzQVB6Rlpudy8rVzJiNzNVQVR3
|
36
|
-
bkgwZFpLbTJUVFpUNUhlU3FYbkZVdTlnSDZNdEkvUysKVmZzQWxMVG04dVNX
|
37
|
-
QTNDalIxZEpZZ1JVcDh0WVF4d053TXY1SVYxRmt5OXA4TktTVTIzM2xoQlNP
|
38
|
-
VUpjckE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
|
39
|
-
date: 2013-12-23 00:00:00.000000000 Z
|
11
|
+
- |
|
12
|
+
-----BEGIN CERTIFICATE-----
|
13
|
+
MIIDKjCCAhKgAwIBAgIBATANBgkqhkiG9w0BAQUFADA7MQ8wDQYDVQQDDAZzaWVm
|
14
|
+
Y2ExEzARBgoJkiaJk/IsZAEZFgNnbnUxEzARBgoJkiaJk/IsZAEZFgNvcmcwHhcN
|
15
|
+
MTMxMTE5MjMzMjQ0WhcNMTQxMTE5MjMzMjQ0WjA7MQ8wDQYDVQQDDAZzaWVmY2Ex
|
16
|
+
EzARBgoJkiaJk/IsZAEZFgNnbnUxEzARBgoJkiaJk/IsZAEZFgNvcmcwggEiMA0G
|
17
|
+
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCdk4+9ieSx2I2OPslPcj/LjajwtsrH
|
18
|
+
mev6Fs3xK9hdDIbbLuQM9AypBS7NeKP/2YToEOGxsvzcpFzL2Ah71cP6Yfn+Z2Yo
|
19
|
+
zvqpAx5/nl79PrJKvjlkdzVNOFBp/EOkLK67QK4Pv97ABnG2PkF4FokqOjuNHLM7
|
20
|
+
47OkJPvFyfHyMBDZN7EFljBBNm3IuQRTiO48e5Jcp3L761PWOvCpnV8wiga0Wwt3
|
21
|
+
98Gmy7c1nWzfbQc1wHwKLPICY/aidKU20KymSHG63BSW5pO2cXZecIeYjw5YNjGA
|
22
|
+
M1RZMiwT7QJ9W86VVP+8EqbJKJOS95xlmQTHjPK56yXv8GiuyLQHpPh5AgMBAAGj
|
23
|
+
OTA3MAkGA1UdEwQCMAAwCwYDVR0PBAQDAgSwMB0GA1UdDgQWBBSjirKWTjauG7eQ
|
24
|
+
9gxHsQfr7DAdhjANBgkqhkiG9w0BAQUFAAOCAQEAY/8C5woc9KCN4J+6rKX0Z6mJ
|
25
|
+
olJDlVfTh3TW8gmgBDk5hUySr5+KJbtmJBxoJeIRLx6WNp9Y7ClJPnxvOSKWZfkE
|
26
|
+
UToitEQsi/NmVY+JL7xYSTyh8W6vOj0hTupKXWOqWkS9eLmsHYgRV+Rm6ClsCudL
|
27
|
+
nsw7UJA5RTIwa2ui9W4/0JHo2/8DP+cCsEp4Tw5L0WiJ4PFetxZ6nPx5m06hlCl4
|
28
|
+
rNombKmtHC0ASsAPzFZnw/+W2b73UATwnH0dZKm2TTZT5HeSqXnFUu9gH6MtI/S+
|
29
|
+
VfsAlLTm8uSWA3CjR1dJYgRUp8tYQxwNwMv5IV1Fky9p8NKSU233lhBSOUJcrA==
|
30
|
+
-----END CERTIFICATE-----
|
31
|
+
date: 2013-12-24 00:00:00.000000000 Z
|
40
32
|
dependencies:
|
41
33
|
- !ruby/object:Gem::Dependency
|
42
34
|
name: netaddr
|
43
35
|
requirement: !ruby/object:Gem::Requirement
|
44
36
|
requirements:
|
45
|
-
- -
|
37
|
+
- - '>='
|
46
38
|
- !ruby/object:Gem::Version
|
47
|
-
version:
|
48
|
-
MS41LjA=
|
39
|
+
version: 1.5.0
|
49
40
|
type: :runtime
|
50
41
|
prerelease: false
|
51
42
|
version_requirements: !ruby/object:Gem::Requirement
|
52
43
|
requirements:
|
53
|
-
- -
|
44
|
+
- - '>='
|
54
45
|
- !ruby/object:Gem::Version
|
55
|
-
version:
|
56
|
-
MS41LjA=
|
46
|
+
version: 1.5.0
|
57
47
|
- !ruby/object:Gem::Dependency
|
58
48
|
name: hoe-yard
|
59
49
|
requirement: !ruby/object:Gem::Requirement
|
60
50
|
requirements:
|
61
|
-
- -
|
51
|
+
- - '>='
|
62
52
|
- !ruby/object:Gem::Version
|
63
|
-
version:
|
64
|
-
MC4xLjI=
|
53
|
+
version: 0.1.2
|
65
54
|
type: :development
|
66
55
|
prerelease: false
|
67
56
|
version_requirements: !ruby/object:Gem::Requirement
|
68
57
|
requirements:
|
69
|
-
- -
|
58
|
+
- - '>='
|
70
59
|
- !ruby/object:Gem::Version
|
71
|
-
version:
|
72
|
-
MC4xLjI=
|
60
|
+
version: 0.1.2
|
73
61
|
- !ruby/object:Gem::Dependency
|
74
62
|
name: rspec
|
75
63
|
requirement: !ruby/object:Gem::Requirement
|
76
64
|
requirements:
|
77
|
-
- -
|
65
|
+
- - '>='
|
78
66
|
- !ruby/object:Gem::Version
|
79
|
-
version:
|
80
|
-
Mi42LjA=
|
67
|
+
version: 2.6.0
|
81
68
|
type: :development
|
82
69
|
prerelease: false
|
83
70
|
version_requirements: !ruby/object:Gem::Requirement
|
84
71
|
requirements:
|
85
|
-
- -
|
72
|
+
- - '>='
|
86
73
|
- !ruby/object:Gem::Version
|
87
|
-
version:
|
88
|
-
Mi42LjA=
|
74
|
+
version: 2.6.0
|
89
75
|
- !ruby/object:Gem::Dependency
|
90
76
|
name: yard
|
91
77
|
requirement: !ruby/object:Gem::Requirement
|
92
78
|
requirements:
|
93
|
-
- -
|
79
|
+
- - '>='
|
94
80
|
- !ruby/object:Gem::Version
|
95
|
-
version:
|
96
|
-
MC44LjI=
|
81
|
+
version: 0.8.2
|
97
82
|
type: :development
|
98
83
|
prerelease: false
|
99
84
|
version_requirements: !ruby/object:Gem::Requirement
|
100
85
|
requirements:
|
101
|
-
- -
|
86
|
+
- - '>='
|
102
87
|
- !ruby/object:Gem::Version
|
103
|
-
version:
|
104
|
-
MC44LjI=
|
88
|
+
version: 0.8.2
|
105
89
|
- !ruby/object:Gem::Dependency
|
106
90
|
name: rdoc
|
107
91
|
requirement: !ruby/object:Gem::Requirement
|
108
92
|
requirements:
|
109
|
-
- -
|
93
|
+
- - '>='
|
110
94
|
- !ruby/object:Gem::Version
|
111
|
-
version:
|
112
|
-
My44LjA=
|
95
|
+
version: 3.8.0
|
113
96
|
type: :development
|
114
97
|
prerelease: false
|
115
98
|
version_requirements: !ruby/object:Gem::Requirement
|
116
99
|
requirements:
|
117
|
-
- -
|
100
|
+
- - '>='
|
118
101
|
- !ruby/object:Gem::Version
|
119
|
-
version:
|
120
|
-
My44LjA=
|
102
|
+
version: 3.8.0
|
121
103
|
- !ruby/object:Gem::Dependency
|
122
104
|
name: redcarpet
|
123
105
|
requirement: !ruby/object:Gem::Requirement
|
124
106
|
requirements:
|
125
|
-
- -
|
107
|
+
- - '>='
|
126
108
|
- !ruby/object:Gem::Version
|
127
|
-
version:
|
128
|
-
Mi4xLjA=
|
109
|
+
version: 2.1.0
|
129
110
|
type: :development
|
130
111
|
prerelease: false
|
131
112
|
version_requirements: !ruby/object:Gem::Requirement
|
132
113
|
requirements:
|
133
|
-
- -
|
114
|
+
- - '>='
|
134
115
|
- !ruby/object:Gem::Version
|
135
|
-
version:
|
136
|
-
Mi4xLjA=
|
116
|
+
version: 2.1.0
|
137
117
|
- !ruby/object:Gem::Dependency
|
138
118
|
name: bundler
|
139
119
|
requirement: !ruby/object:Gem::Requirement
|
140
120
|
requirements:
|
141
|
-
- -
|
121
|
+
- - '>='
|
142
122
|
- !ruby/object:Gem::Version
|
143
|
-
version:
|
144
|
-
MS4wLjEw
|
123
|
+
version: 1.0.10
|
145
124
|
type: :development
|
146
125
|
prerelease: false
|
147
126
|
version_requirements: !ruby/object:Gem::Requirement
|
148
127
|
requirements:
|
149
|
-
- -
|
128
|
+
- - '>='
|
150
129
|
- !ruby/object:Gem::Version
|
151
|
-
version:
|
152
|
-
MS4wLjEw
|
130
|
+
version: 1.0.10
|
153
131
|
- !ruby/object:Gem::Dependency
|
154
132
|
name: hoe-bundler
|
155
133
|
requirement: !ruby/object:Gem::Requirement
|
156
134
|
requirements:
|
157
|
-
- -
|
135
|
+
- - '>='
|
158
136
|
- !ruby/object:Gem::Version
|
159
|
-
version:
|
160
|
-
MS4xLjA=
|
137
|
+
version: 1.1.0
|
161
138
|
type: :development
|
162
139
|
prerelease: false
|
163
140
|
version_requirements: !ruby/object:Gem::Requirement
|
164
141
|
requirements:
|
165
|
-
- -
|
142
|
+
- - '>='
|
166
143
|
- !ruby/object:Gem::Version
|
167
|
-
version:
|
168
|
-
MS4xLjA=
|
144
|
+
version: 1.1.0
|
169
145
|
- !ruby/object:Gem::Dependency
|
170
146
|
name: hoe-gemspec
|
171
147
|
requirement: !ruby/object:Gem::Requirement
|
172
148
|
requirements:
|
173
|
-
- -
|
149
|
+
- - '>='
|
174
150
|
- !ruby/object:Gem::Version
|
175
|
-
version:
|
176
|
-
MS4wLjA=
|
151
|
+
version: 1.0.0
|
177
152
|
type: :development
|
178
153
|
prerelease: false
|
179
154
|
version_requirements: !ruby/object:Gem::Requirement
|
180
155
|
requirements:
|
181
|
-
- -
|
156
|
+
- - '>='
|
182
157
|
- !ruby/object:Gem::Version
|
183
|
-
version:
|
184
|
-
MS4wLjA=
|
158
|
+
version: 1.0.0
|
185
159
|
- !ruby/object:Gem::Dependency
|
186
160
|
name: hoe
|
187
161
|
requirement: !ruby/object:Gem::Requirement
|
188
162
|
requirements:
|
189
163
|
- - ~>
|
190
164
|
- !ruby/object:Gem::Version
|
191
|
-
version:
|
192
|
-
Mi4xNg==
|
165
|
+
version: '2.16'
|
193
166
|
type: :development
|
194
167
|
prerelease: false
|
195
168
|
version_requirements: !ruby/object:Gem::Requirement
|
196
169
|
requirements:
|
197
170
|
- - ~>
|
198
171
|
- !ruby/object:Gem::Version
|
199
|
-
version:
|
200
|
-
Mi4xNg==
|
172
|
+
version: '2.16'
|
201
173
|
description: This library allows you to control IP access for sockets and other objects
|
202
174
|
email:
|
203
175
|
- pw@gnu.org
|
@@ -205,6 +177,8 @@ executables: []
|
|
205
177
|
extensions: []
|
206
178
|
extra_rdoc_files:
|
207
179
|
- Manifest.txt
|
180
|
+
- lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc
|
181
|
+
- lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc
|
208
182
|
files:
|
209
183
|
- .rspec
|
210
184
|
- .yardopts
|
@@ -228,32 +202,28 @@ files:
|
|
228
202
|
- docs/images/ipaccess_setup_origin_tab.png
|
229
203
|
- docs/images/ipaccess_view.png
|
230
204
|
- docs/rdoc.css
|
205
|
+
- docs/yard-tpl/default/fulldoc/html/css/common.css
|
231
206
|
- examples/ftp.rb
|
232
207
|
- examples/http.rb
|
233
208
|
- examples/imap.rb
|
209
|
+
- examples/open-uri.rb
|
234
210
|
- examples/pop.rb
|
235
211
|
- examples/smtp.rb
|
236
212
|
- examples/tcp_server.rb
|
237
213
|
- examples/tcp_socket.rb
|
238
214
|
- examples/telnet.rb
|
239
215
|
- examples/text_message.rb
|
216
|
+
- ipaccess.gemspec
|
240
217
|
- lib/ipaccess.rb
|
241
218
|
- lib/ipaccess/arm_sockets.rb
|
219
|
+
- lib/ipaccess/core.rb
|
242
220
|
- lib/ipaccess/ghost_doc/ghost_doc.rb
|
243
|
-
- lib/ipaccess/ghost_doc/ghost_doc_acl.
|
221
|
+
- lib/ipaccess/ghost_doc/ghost_doc_acl.rdoc
|
244
222
|
- lib/ipaccess/ghost_doc/ghost_doc_net_ftp.rb
|
245
223
|
- lib/ipaccess/ghost_doc/ghost_doc_net_http.rb
|
246
224
|
- lib/ipaccess/ghost_doc/ghost_doc_net_smtp.rb
|
247
225
|
- lib/ipaccess/ghost_doc/ghost_doc_net_telnet.rb
|
248
|
-
- lib/ipaccess/ghost_doc/
|
249
|
-
- lib/ipaccess/ghost_doc/ghost_doc_p_blacklist_e.rb
|
250
|
-
- lib/ipaccess/ghost_doc/ghost_doc_p_unblacklist.rb
|
251
|
-
- lib/ipaccess/ghost_doc/ghost_doc_p_unblacklist_e.rb
|
252
|
-
- lib/ipaccess/ghost_doc/ghost_doc_p_unwhitelist.rb
|
253
|
-
- lib/ipaccess/ghost_doc/ghost_doc_p_unwhitelist_e.rb
|
254
|
-
- lib/ipaccess/ghost_doc/ghost_doc_p_whitelist.rb
|
255
|
-
- lib/ipaccess/ghost_doc/ghost_doc_p_whitelist_e.rb
|
256
|
-
- lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rb
|
226
|
+
- lib/ipaccess/ghost_doc/ghost_doc_patched_usage.rdoc
|
257
227
|
- lib/ipaccess/ghost_doc/ghost_doc_sockets.rb
|
258
228
|
- lib/ipaccess/ip_access_check.rb
|
259
229
|
- lib/ipaccess/ip_access_errors.rb
|
@@ -294,12 +264,12 @@ require_paths:
|
|
294
264
|
- lib
|
295
265
|
required_ruby_version: !ruby/object:Gem::Requirement
|
296
266
|
requirements:
|
297
|
-
- -
|
267
|
+
- - '>='
|
298
268
|
- !ruby/object:Gem::Version
|
299
269
|
version: '0'
|
300
270
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
301
271
|
requirements:
|
302
|
-
- -
|
272
|
+
- - '>='
|
303
273
|
- !ruby/object:Gem::Version
|
304
274
|
version: '0'
|
305
275
|
requirements: []
|
metadata.gz.sig
CHANGED
Binary file
|
@@ -1,54 +0,0 @@
|
|
1
|
-
# This member selects IPAccess::Set object that will be used to
|
2
|
-
# control IP access for a socket.
|
3
|
-
#
|
4
|
-
# === Setting an access set
|
5
|
-
#
|
6
|
-
# You may assign global access set,
|
7
|
-
# create local access set or use shared set.
|
8
|
-
#
|
9
|
-
# - If an argument is +:global+ it uses global access set.
|
10
|
-
# - If an argument is +:private+ it creates an empty, private access set.
|
11
|
-
# - If an argument is an IPAccess::Set object then it is used as external, shared set.
|
12
|
-
#
|
13
|
-
# ==== Global access set
|
14
|
-
#
|
15
|
-
# Global access set is an IPAccess::Set object referenced by contant IPAccess::Set.Global
|
16
|
-
# It cannot be modified by calling +acl+ attribute. To add or remove rules
|
17
|
-
# use mentioned constant. By default all sockets with enabled IP access control
|
18
|
-
# are using this set.
|
19
|
-
#
|
20
|
-
# ==== Private access set
|
21
|
-
#
|
22
|
-
# Private access set is an IPAccess::Set object created for socket object.
|
23
|
-
# You may modify it by referencing to +acl+ member of the socket object.
|
24
|
-
#
|
25
|
-
# Under some circumstances it is possible to share private access set
|
26
|
-
# – you just have to pass the +acl+ member of a socket to initializer
|
27
|
-
# of new socket object as shared access set.
|
28
|
-
#
|
29
|
-
# ==== Shared access set
|
30
|
-
#
|
31
|
-
# Shared access set is an IPAccess::Set object that more than one socket
|
32
|
-
# may use to control IP access. It differs from private access set
|
33
|
-
# only by operation used to create. The private access set is created
|
34
|
-
# automatically and shared access set exists before socket object is
|
35
|
-
# formed.
|
36
|
-
#
|
37
|
-
# === Using an access set
|
38
|
-
#
|
39
|
-
# This member keeps the information about currently
|
40
|
-
# used access set. You may use it to do low-level
|
41
|
-
# operations on IPAccess::Set object associated
|
42
|
-
# with instance. You cannot however call any
|
43
|
-
# of global access set operations – to do that
|
44
|
-
# use IPAccess::Set.Global contant referencing to
|
45
|
-
# global ACL.
|
46
|
-
#
|
47
|
-
# ==== Manipulating access lists
|
48
|
-
#
|
49
|
-
# You should avoid manipulating an access set directly to add
|
50
|
-
# or remove rules in lists. It works fine but under some circumstances
|
51
|
-
# changes made on working (connected) network object may
|
52
|
-
# not be noticed immediately. You should use direct methods
|
53
|
-
# (like blacklist, whitelist, blacklist! and whitelist!)
|
54
|
-
# to control access for existing network objects.
|
@@ -1,36 +0,0 @@
|
|
1
|
-
# :call-seq:
|
2
|
-
# blacklist(*addresses)<br />
|
3
|
-
# blacklist(list, *addresses)
|
4
|
-
#
|
5
|
-
# This method blacklists IP address(-es) in
|
6
|
-
# the input or output access list selected
|
7
|
-
# by the *list* argument (+:input+ or +:output+).
|
8
|
-
# If the access list selector is omited it
|
9
|
-
# operates on the default access list that certain
|
10
|
-
# kind of network object uses. The allowed format of address
|
11
|
-
# is the same as for IPAccess.to_cidrs.
|
12
|
-
# This method will not add nor remove any
|
13
|
-
# whitelisted item.
|
14
|
-
#
|
15
|
-
# === Restrictions
|
16
|
-
#
|
17
|
-
# This method won't allow you to modify the list if
|
18
|
-
# the global access set is associated with an object.
|
19
|
-
# You may operate on IPAccess::Set.Global or use
|
20
|
-
# blacklist! instead.
|
21
|
-
#
|
22
|
-
# === Return value
|
23
|
-
#
|
24
|
-
# It will return the result of calling
|
25
|
-
# IPAccess::List#blacklist on the list.
|
26
|
-
#
|
27
|
-
# === Revalidation
|
28
|
-
#
|
29
|
-
# After modyfing access set current connection
|
30
|
-
# is validated again to avoid access leaks.
|
31
|
-
#
|
32
|
-
# === DNS Warning
|
33
|
-
#
|
34
|
-
# You should avoid passing hostnames as arguments since
|
35
|
-
# DNS is not reliable and responses may change with time,
|
36
|
-
# which may cause security flaws.
|