HEX
Server: Apache
System: Windows NT MAGNETO-ARM 10.0 build 22000 (Windows 10) AMD64
User: Michel (0)
PHP: 7.4.7
Disabled: NONE
Upload Files
File: C:/Ruby27-x64/lib/ruby/gems/2.7.0/doc/actionpack-7.0.4.2/ri/ActionDispatch/RemoteIp/new-c.ri
U:RDoc::AnyMethod[iI"new:ETI""ActionDispatch::RemoteIp::new;TT:publico:RDoc::Markup::Document:@parts[
o:RDoc::Markup::Paragraph;	[I"1Create a new +RemoteIp+ middleware instance.;To:RDoc::Markup::BlankLineo;
;	[
I"LThe +ip_spoofing_check+ option is on by default. When on, an exception ;TI"Mis raised if it looks like the client is trying to lie about its own IP ;TI"Maddress. It makes sense to turn off this check on sites aimed at non-IP ;TI"Jclients (like WAP devices), or behind proxies that set headers in an ;TI"/incorrect or confusing way (like AWS ELB).;T@o;
;	[I"MThe +custom_proxies+ argument can take an enumerable which will be used ;TI"Jinstead of +TRUSTED_PROXIES+. Any proxy setup will put the value you ;TI"Kwant in the middle (or at the beginning) of the X-Forwarded-For list, ;TI"Lwith your proxy servers after it. If your proxies aren't removed, pass ;TI"Othem in via the +custom_proxies+ parameter. That way, the middleware will ;TI"Aignore those IP addresses, and return the one that you want.;T:
@fileI"0lib/action_dispatch/middleware/remote_ip.rb;T:0@omit_headings_from_table_of_contents_below000[I":(app, ip_spoofing_check = true, custom_proxies = nil);T@FI"
RemoteIp;TcRDoc::NormalClass00