U:RDoc::NormalClass[iI"ACL:ET@I" Object;To:RDoc::Markup::Document: @parts[o;;[ o:RDoc::Markup::Paragraph;[I"!Simple Access Control Lists.;To:RDoc::Markup::BlankLineo; ;[I"OAccess control lists are composed of "allow" and "deny" halves to control ;TI"Raccess. Use "all" or "*" to match any address. To match a specific address ;TI"@use any address or address mask that IPAddr can understand.;T@o; ;[I" Example:;T@o:RDoc::Markup::Verbatim;[I"list = %w[ ;TI" deny all ;TI" allow 192.168.1.1 ;TI" allow ::ffff:192.168.1.2 ;TI" allow 192.168.1.3 ;TI"] ;TI" ;TI"8# From Socket#peeraddr, see also ACL#allow_socket? ;TI"4addr = ["AF_INET", 10, "lc630", "192.168.1.3"] ;TI" ;TI"acl = ACL.new ;TI"'p acl.allow_addr?(addr) # => true ;TI" ;TI"*acl = ACL.new(list, ACL::DENY_ALLOW) ;TI"&p acl.allow_addr?(addr) # => true;T: @format0: @fileI"lib/drb/acl.rb;T:0@omit_headings_from_table_of_contents_below0; 0;0[[U:RDoc::Constant[iI" VERSION;FI"ACL::VERSION;T00o;;[o; ;[I"The current version of ACL;T; @*;0@*@cRDoc::NormalClass0U;[iI"DENY_ALLOW;FI"ACL::DENY_ALLOW;T00o;;[o; ;[I"Default to deny;T; @*;0@*@@60U;[iI"ALLOW_DENY;FI"ACL::ALLOW_DENY;T00o;;[o; ;[I"Default to allow;T; @*;0@*@@60[[[I" class;T[[: public[[I"new;TI"lib/drb/acl.rb;T[:protected[[: private[[I" instance;T[[;[[I"allow_addr?;F@R[I"allow_socket?;F@R[I"install_list;F@R[;[[;[[[U:RDoc::Context::Section[i0o;;[; 0;0[@*@*cRDoc::TopLevel