actionpack 6.1.4.4 → 7.0.0.alpha1

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of actionpack might be problematic. Click here for more details.

Files changed (107) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +101 -450
  3. data/MIT-LICENSE +1 -1
  4. data/README.rdoc +2 -3
  5. data/lib/abstract_controller/asset_paths.rb +1 -1
  6. data/lib/abstract_controller/base.rb +7 -21
  7. data/lib/abstract_controller/caching/fragments.rb +2 -2
  8. data/lib/abstract_controller/caching.rb +1 -1
  9. data/lib/abstract_controller/callbacks.rb +9 -8
  10. data/lib/abstract_controller/collector.rb +4 -2
  11. data/lib/abstract_controller/error.rb +1 -1
  12. data/lib/abstract_controller/helpers.rb +3 -2
  13. data/lib/abstract_controller/logger.rb +1 -1
  14. data/lib/abstract_controller/railties/routes_helpers.rb +2 -0
  15. data/lib/abstract_controller/translation.rb +0 -2
  16. data/lib/abstract_controller/url_for.rb +4 -6
  17. data/lib/action_controller/api.rb +1 -1
  18. data/lib/action_controller/log_subscriber.rb +3 -1
  19. data/lib/action_controller/metal/conditional_get.rb +38 -1
  20. data/lib/action_controller/metal/content_security_policy.rb +1 -1
  21. data/lib/action_controller/metal/cookies.rb +1 -1
  22. data/lib/action_controller/metal/data_streaming.rb +5 -13
  23. data/lib/action_controller/metal/exceptions.rb +19 -30
  24. data/lib/action_controller/metal/flash.rb +6 -2
  25. data/lib/action_controller/metal/http_authentication.rb +15 -15
  26. data/lib/action_controller/metal/instrumentation.rb +55 -52
  27. data/lib/action_controller/metal/live.rb +42 -2
  28. data/lib/action_controller/metal/mime_responds.rb +3 -3
  29. data/lib/action_controller/metal/params_wrapper.rb +7 -7
  30. data/lib/action_controller/metal/permissions_policy.rb +1 -1
  31. data/lib/action_controller/metal/query_tags.rb +16 -0
  32. data/lib/action_controller/metal/redirecting.rb +50 -16
  33. data/lib/action_controller/metal/rendering.rb +7 -7
  34. data/lib/action_controller/metal/request_forgery_protection.rb +64 -20
  35. data/lib/action_controller/metal/rescue.rb +1 -1
  36. data/lib/action_controller/metal/streaming.rb +1 -3
  37. data/lib/action_controller/metal/strong_parameters.rb +24 -28
  38. data/lib/action_controller/metal/testing.rb +0 -2
  39. data/lib/action_controller/metal.rb +7 -10
  40. data/lib/action_controller/railtie.rb +42 -5
  41. data/lib/action_controller/test_case.rb +6 -2
  42. data/lib/action_controller.rb +2 -5
  43. data/lib/action_dispatch/http/cache.rb +13 -6
  44. data/lib/action_dispatch/http/content_security_policy.rb +39 -35
  45. data/lib/action_dispatch/http/filter_parameters.rb +5 -0
  46. data/lib/action_dispatch/http/mime_negotiation.rb +13 -3
  47. data/lib/action_dispatch/http/mime_type.rb +9 -11
  48. data/lib/action_dispatch/http/parameters.rb +4 -4
  49. data/lib/action_dispatch/http/permissions_policy.rb +1 -1
  50. data/lib/action_dispatch/http/request.rb +10 -19
  51. data/lib/action_dispatch/http/response.rb +3 -3
  52. data/lib/action_dispatch/http/url.rb +9 -10
  53. data/lib/action_dispatch/journey/gtg/builder.rb +11 -12
  54. data/lib/action_dispatch/journey/gtg/simulator.rb +10 -4
  55. data/lib/action_dispatch/journey/gtg/transition_table.rb +77 -21
  56. data/lib/action_dispatch/journey/nodes/node.rb +70 -5
  57. data/lib/action_dispatch/journey/path/pattern.rb +22 -13
  58. data/lib/action_dispatch/journey/route.rb +5 -12
  59. data/lib/action_dispatch/journey/router/utils.rb +2 -2
  60. data/lib/action_dispatch/journey/router.rb +1 -1
  61. data/lib/action_dispatch/journey/routes.rb +3 -3
  62. data/lib/action_dispatch/journey/visualizer/fsm.js +49 -24
  63. data/lib/action_dispatch/journey/visualizer/index.html.erb +1 -1
  64. data/lib/action_dispatch/middleware/actionable_exceptions.rb +0 -1
  65. data/lib/action_dispatch/middleware/cookies.rb +7 -3
  66. data/lib/action_dispatch/middleware/debug_exceptions.rb +6 -4
  67. data/lib/action_dispatch/middleware/debug_locks.rb +3 -3
  68. data/lib/action_dispatch/middleware/exception_wrapper.rb +4 -0
  69. data/lib/action_dispatch/middleware/flash.rb +9 -11
  70. data/lib/action_dispatch/middleware/host_authorization.rb +15 -34
  71. data/lib/action_dispatch/middleware/remote_ip.rb +16 -4
  72. data/lib/action_dispatch/middleware/session/abstract_store.rb +1 -1
  73. data/lib/action_dispatch/middleware/show_exceptions.rb +7 -9
  74. data/lib/action_dispatch/middleware/stack.rb +50 -9
  75. data/lib/action_dispatch/middleware/static.rb +2 -5
  76. data/lib/action_dispatch/middleware/templates/rescues/_message_and_suggestions.html.erb +1 -1
  77. data/lib/action_dispatch/middleware/templates/rescues/_request_and_response.html.erb +4 -11
  78. data/lib/action_dispatch/middleware/templates/rescues/_trace.html.erb +2 -2
  79. data/lib/action_dispatch/middleware/templates/rescues/blocked_host.html.erb +3 -3
  80. data/lib/action_dispatch/middleware/templates/rescues/blocked_host.text.erb +1 -1
  81. data/lib/action_dispatch/middleware/templates/rescues/diagnostics.html.erb +4 -4
  82. data/lib/action_dispatch/middleware/templates/rescues/invalid_statement.html.erb +3 -3
  83. data/lib/action_dispatch/middleware/templates/rescues/layout.erb +28 -18
  84. data/lib/action_dispatch/middleware/templates/rescues/missing_exact_template.html.erb +3 -3
  85. data/lib/action_dispatch/middleware/templates/rescues/missing_template.html.erb +3 -3
  86. data/lib/action_dispatch/middleware/templates/rescues/routing_error.html.erb +3 -3
  87. data/lib/action_dispatch/middleware/templates/rescues/template_error.html.erb +3 -3
  88. data/lib/action_dispatch/middleware/templates/rescues/unknown_action.html.erb +3 -3
  89. data/lib/action_dispatch/middleware/templates/routes/_table.html.erb +5 -14
  90. data/lib/action_dispatch/railtie.rb +8 -2
  91. data/lib/action_dispatch/request/session.rb +43 -13
  92. data/lib/action_dispatch/routing/mapper.rb +44 -72
  93. data/lib/action_dispatch/routing/redirection.rb +0 -2
  94. data/lib/action_dispatch/routing/route_set.rb +9 -6
  95. data/lib/action_dispatch/routing/routes_proxy.rb +1 -1
  96. data/lib/action_dispatch/routing/url_for.rb +1 -2
  97. data/lib/action_dispatch/routing.rb +2 -2
  98. data/lib/action_dispatch/system_test_case.rb +5 -5
  99. data/lib/action_dispatch/system_testing/driver.rb +24 -4
  100. data/lib/action_dispatch/system_testing/test_helpers/screenshot_helper.rb +10 -6
  101. data/lib/action_dispatch/testing/assertions.rb +2 -5
  102. data/lib/action_dispatch/testing/integration.rb +6 -8
  103. data/lib/action_dispatch/testing/test_process.rb +12 -9
  104. data/lib/action_dispatch.rb +1 -1
  105. data/lib/action_pack/gem_version.rb +4 -4
  106. data/lib/action_pack.rb +1 -1
  107. metadata +18 -17
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1c122d3421f71b41eaa2b4fef11a5ce6dfd8b697a85e5a3dcaff50fc4326da9b
4
- data.tar.gz: c090acfe45da5c02c4c4ed5e566254aaa3b42860802f4843e05e0ec0bb63fb7e
3
+ metadata.gz: 0abf991e8448167804273ced78bacdd30f1893fee1faf3641957269a6f65b6a6
4
+ data.tar.gz: 2f2d0db3358796edfd2956c920f8db7f4a723bd0bb9b6736d8bd63f9bf67a200
5
5
  SHA512:
6
- metadata.gz: 86c9508f96aff5cf65d96af499fe3650c95c58cc2e0c84a743ffb716ba72fd5486511a974f3ec4dd29198d52a9859f4cb9d1a777668e6d60792491d9397f68e7
7
- data.tar.gz: 1d3ef386672fea19f17329b5de313ab4fc1a4bb999dd86ed104731a896f6d9f53607777126651d64fe2ddf12523b2bd5228f20155c03dfff74ce369361421a35
6
+ metadata.gz: 28e7fa0e651362d6ff86a2f8caddbe321ee762a27485bae54436fa48283eaf2d8eb9f9c5bd118415b32a4859927f1868de8f2a7bcb78743a385a350f9c1ed3c2
7
+ data.tar.gz: fb6318f474b1f71365531af95711791568d68da4fb7de2796cb09254cabb8f7547819fbbf70193a08c7970680dadd51e036637a0bc184339504b7544e21b9c07
data/CHANGELOG.md CHANGED
@@ -1,542 +1,193 @@
1
- ## Rails 6.1.4.4 (December 15, 2021) ##
1
+ ## Rails 7.0.0.alpha1 (September 15, 2021) ##
2
2
 
3
- * Fix issue with host protection not allowing host with port in development.
3
+ * Use a static error message when raising `ActionDispatch::Http::Parameters::ParseError`
4
+ to avoid inadvertently logging the HTTP request body at the `fatal` level when it contains
5
+ malformed JSON.
4
6
 
7
+ Fixes #41145
5
8
 
6
- ## Rails 6.1.4.3 (December 14, 2021) ##
9
+ *Aaron Lahey*
7
10
 
8
- * Fix issue with host protection not allowing localhost in development.
11
+ * Add `Middleware#delete!` to delete middleware or raise if not found.
9
12
 
13
+ `Middleware#delete!` works just like `Middleware#delete` but will
14
+ raise an error if the middleware isn't found.
10
15
 
11
- ## Rails 6.1.4.2 (December 14, 2021) ##
16
+ *Alex Ghiculescu*, *Petrik de Heus*, *Junichi Sato*
12
17
 
13
- * Fix X_FORWARDED_HOST protection. [CVE-2021-44528]
18
+ * Raise error on unpermitted open redirects.
14
19
 
15
- ## Rails 6.1.4.1 (August 19, 2021) ##
16
-
17
- * [CVE-2021-22942] Fix possible open redirect in Host Authorization middleware.
18
-
19
- Specially crafted "X-Forwarded-Host" headers in combination with certain
20
- "allowed host" formats can cause the Host Authorization middleware in Action
21
- Pack to redirect users to a malicious website.
22
-
23
- ## Rails 6.1.4 (June 24, 2021) ##
24
-
25
- * Ignore file fixtures on `db:fixtures:load`
26
-
27
- *Kevin Sjöberg*
28
-
29
- * Fix ActionController::Live controller test deadlocks by removing the body buffer size limit for tests.
30
-
31
- *Dylan Thacker-Smith*
32
-
33
- * Correctly place optional path parameter booleans.
34
-
35
- Previously, if you specify a url parameter that is part of the path as false it would include that part
36
- of the path as parameter for example:
37
-
38
- ```
39
- get "(/optional/:optional_id)/things" => "foo#foo", as: :things
40
- things_path(optional_id: false) # => /things?optional_id=false
41
- ```
42
-
43
- After this change, true and false will be treated the same when used as optional path parameters. Meaning now:
44
-
45
- ```
46
- get '(this/:my_bool)/that' as: :that
47
-
48
- that_path(my_bool: true) # => `/this/true/that`
49
- that_path(my_bool: false) # => `/this/false/that`
50
- ```
51
-
52
- *Adam Hess*
53
-
54
- * Add support for 'private, no-store' Cache-Control headers.
55
-
56
- Previously, 'no-store' was exclusive; no other directives could be specified.
57
-
58
- *Alex Smith*
59
-
60
-
61
- ## Rails 6.1.3.2 (May 05, 2021) ##
62
-
63
- * Prevent open redirects by correctly escaping the host allow list
64
- CVE-2021-22903
65
-
66
- * Prevent catastrophic backtracking during mime parsing
67
- CVE-2021-22902
68
-
69
- * Prevent regex DoS in HTTP token authentication
70
- CVE-2021-22904
71
-
72
- * Prevent string polymorphic route arguments.
73
-
74
- `url_for` supports building polymorphic URLs via an array
75
- of arguments (usually symbols and records). If a developer passes a
76
- user input array, strings can result in unwanted route helper calls.
77
-
78
- CVE-2021-22885
20
+ Add `allow_other_host` options to `redirect_to`.
21
+ Opt in to this behaviour with `ActionController::Base.raise_on_open_redirects = true`.
79
22
 
80
23
  *Gannon McGibbon*
81
24
 
82
- ## Rails 6.1.3.1 (March 26, 2021) ##
83
-
84
- * No changes.
85
-
86
-
87
- ## Rails 6.1.3 (February 17, 2021) ##
88
-
89
- * Re-define routes when not set correctly via inheritance.
90
-
91
- *John Hawthorn*
92
-
93
-
94
- ## Rails 6.1.2.1 (February 10, 2021) ##
95
-
96
- * Prevent open redirect when allowed host starts with a dot
97
-
98
- [CVE-2021-22881]
99
-
100
- Thanks to @tktech (https://hackerone.com/tktech) for reporting this
101
- issue and the patch!
25
+ * Deprecate `poltergeist` and `webkit` (capybara-webkit) driver registration for system testing (they will be removed in Rails 7.1). Add `cuprite` instead.
102
26
 
103
- *Aaron Patterson*
27
+ [Poltergeist](https://github.com/teampoltergeist/poltergeist) and [capybara-webkit](https://github.com/thoughtbot/capybara-webkit) are already not maintained. These usage in Rails are removed for avoiding confusing users.
104
28
 
29
+ [Cuprite](https://github.com/rubycdp/cuprite) is a good alternative to Poltergeist. Some guide descriptions are replaced from Poltergeist to Cuprite.
105
30
 
106
- ## Rails 6.1.2 (February 09, 2021) ##
107
-
108
- * Fix error in `ActionController::LogSubscriber` that would happen when throwing inside a controller action.
109
-
110
- *Janko Marohnić*
111
-
112
- * Fix `fixture_file_upload` deprecation when `file_fixture_path` is a relative path.
113
-
114
- *Eugene Kenny*
31
+ *Yusuke Iwaki*
115
32
 
33
+ * Exclude additional flash types from `ActionController::Base.action_methods`.
116
34
 
117
- ## Rails 6.1.1 (January 07, 2021) ##
35
+ Ensures that additional flash types defined on ActionController::Base subclasses
36
+ are not listed as actions on that controller.
118
37
 
119
- * Fix nil translation key lookup in controllers/
120
-
121
- *Jan Klimo*
122
-
123
- * Quietly handle unknown HTTP methods in Action Dispatch SSL middleware.
124
-
125
- *Alex Robbin*
126
-
127
- * Change the request method to a `GET` when passing failed requests down to `config.exceptions_app`.
128
-
129
- *Alex Robbin*
38
+ class MyController < ApplicationController
39
+ add_flash_types :hype
40
+ end
130
41
 
42
+ MyController.action_methods.include?('hype') # => false
131
43
 
132
- ## Rails 6.1.0 (December 09, 2020) ##
44
+ *Gavin Morrice*
133
45
 
134
- * Support for the HTTP header `Feature-Policy` has been revised to reflect
135
- its [rename](https://github.com/w3c/webappsec-permissions-policy/pull/379) to [`Permissions-Policy`](https://w3c.github.io/webappsec-permissions-policy/#permissions-policy-http-header-field).
46
+ * OpenSSL constants are now used for Digest computations.
136
47
 
137
- ```ruby
138
- Rails.application.config.permissions_policy do |p|
139
- p.camera :none
140
- p.gyroscope :none
141
- p.microphone :none
142
- p.usb :none
143
- p.fullscreen :self
144
- p.payment :self, "https://secure-example.com"
145
- end
146
- ```
48
+ *Dirkjan Bussink*
147
49
 
148
- *Julien Grillot*
50
+ * Remove IE6-7-8 file download related hack/fix from ActionController::DataStreaming module.
149
51
 
150
- * Allow `ActionDispatch::HostAuthorization` to exclude specific requests.
52
+ Due to the age of those versions of IE this fix is no longer relevant, more importantly it creates an edge-case for unexpected Cache-Control headers.
151
53
 
152
- Host Authorization checks can be skipped for specific requests. This allows for health check requests to be permitted for requests with missing or non-matching host headers.
54
+ *Tadas Sasnauskas*
153
55
 
154
- *Chris Bisnett*
56
+ * Configuration setting to skip logging an uncaught exception backtrace when the exception is
57
+ present in `rescued_responses`.
155
58
 
156
- * Add `config.action_dispatch.request_id_header` to allow changing the name of
157
- the unique X-Request-Id header
59
+ It may be too noisy to get all backtraces logged for applications that manage uncaught
60
+ exceptions via `rescued_responses` and `exceptions_app`.
61
+ `config.action_dispatch.log_rescued_responses` (defaults to `true`) can be set to `false` in
62
+ this case, so that only exceptions not found in `rescued_responses` will be logged.
158
63
 
159
- *Arlston Fernandes*
64
+ *Alexander Azarov*, *Mike Dalessio*
160
65
 
161
- * Deprecate `config.action_dispatch.return_only_media_type_on_content_type`.
162
-
163
- *Rafael Mendonça França*
164
-
165
- * Change `ActionDispatch::Response#content_type` to return the full Content-Type header.
166
-
167
- *Rafael Mendonça França*
66
+ * Ignore file fixtures on `db:fixtures:load`.
168
67
 
169
- * Remove deprecated `ActionDispatch::Http::ParameterFilter`.
68
+ *Kevin Sjöberg*
170
69
 
171
- *Rafael Mendonça França*
70
+ * Fix ActionController::Live controller test deadlocks by removing the body buffer size limit for tests.
172
71
 
173
- * Added support for exclusive no-store Cache-Control header.
72
+ *Dylan Thacker-Smith*
174
73
 
175
- If `no-store` is set on Cache-Control header it is exclusive (all other cache directives are dropped).
74
+ * New `ActionController::ConditionalGet#no_store` method to set HTTP cache control `no-store` directive.
176
75
 
177
- *Chris Kruger*
76
+ *Tadas Sasnauskas*
178
77
 
179
- * Catch invalid UTF-8 parameters for POST requests and respond with BadRequest.
78
+ * Drop support for the `SERVER_ADDR` header.
180
79
 
181
- Additionally, perform `#set_binary_encoding` in `ActionDispatch::Http::Request#GET` and
182
- `ActionDispatch::Http::Request#POST` prior to validating encoding.
80
+ Following up https://github.com/rack/rack/pull/1573 and https://github.com/rails/rails/pull/42349.
183
81
 
184
- *Adrianna Chang*
82
+ *Ricardo Díaz*
185
83
 
186
- * Allow `assert_recognizes` routing assertions to work on mounted root routes.
84
+ * Set session options when initializing a basic session.
187
85
 
188
86
  *Gannon McGibbon*
189
87
 
190
- * Change default redirection status code for non-GET/HEAD requests to 308 Permanent Redirect for `ActionDispatch::SSL`.
191
-
192
- *Alan Tan*, *Oz Ben-David*
193
-
194
- * Fix `follow_redirect!` to follow redirection with same HTTP verb when following
195
- a 308 redirection.
196
-
197
- *Alan Tan*
198
-
199
- * When multiple domains are specified for a cookie, a domain will now be
200
- chosen only if it is equal to or is a superdomain of the request host.
201
-
202
- *Jonathan Hefner*
203
-
204
- * `ActionDispatch::Static` handles precompiled Brotli (.br) files.
205
-
206
- Adds to existing support for precompiled gzip (.gz) files.
207
- Brotli files are preferred due to much better compression.
208
-
209
- When the browser requests /some.js with `Accept-Encoding: br`,
210
- we check for public/some.js.br and serve that file, if present, with
211
- `Content-Encoding: br` and `Vary: Accept-Encoding` headers.
212
-
213
- *Ryan Edward Hall*, *Jeremy Daer*
214
-
215
- * Add raise_on_missing_translations support for controllers.
216
-
217
- This configuration determines whether an error should be raised for missing translations.
218
- It can be enabled through `config.i18n.raise_on_missing_translations`. Note that described
219
- configuration also affects raising error for missing translations in views.
220
-
221
- *fatkodima*
222
-
223
- * Added `compact` and `compact!` to `ActionController::Parameters`.
224
-
225
- *Eugene Kenny*
226
-
227
- * Calling `each_pair` or `each_value` on an `ActionController::Parameters`
228
- without passing a block now returns an enumerator.
229
-
230
- *Eugene Kenny*
231
-
232
- * `fixture_file_upload` now uses path relative to `file_fixture_path`
233
-
234
- Previously the path had to be relative to `fixture_path`.
235
- You can change your existing code as follow:
88
+ * Add `cache_control: {}` option to `fresh_when` and `stale?`.
236
89
 
237
- ```ruby
238
- # Before
239
- fixture_file_upload('files/dog.png')
240
-
241
- # After
242
- fixture_file_upload('dog.png')
243
- ```
244
-
245
- *Edouard Chin*
246
-
247
- * Remove deprecated `force_ssl` at the controller level.
248
-
249
- *Rafael Mendonça França*
250
-
251
- * The +helper+ class method for controllers loads helper modules specified as
252
- strings/symbols with `String#constantize` instead of `require_dependency`.
253
-
254
- Remember that support for strings/symbols is only a convenient API. You can
255
- always pass a module object:
256
-
257
- ```ruby
258
- helper UtilsHelper
259
- ```
260
-
261
- which is recommended because it is simple and direct. When a string/symbol
262
- is received, `helper` just manipulates and inflects the argument to obtain
263
- that same module object.
264
-
265
- *Xavier Noria*, *Jean Boussier*
266
-
267
- * Correctly identify the entire localhost IPv4 range as trusted proxy.
268
-
269
- *Nick Soracco*
270
-
271
- * `url_for` will now use "https://" as the default protocol when
272
- `Rails.application.config.force_ssl` is set to true.
273
-
274
- *Jonathan Hefner*
275
-
276
- * Accept and default to base64_urlsafe CSRF tokens.
277
-
278
- Base64 strict-encoded CSRF tokens are not inherently websafe, which makes
279
- them difficult to deal with. For example, the common practice of sending
280
- the CSRF token to a browser in a client-readable cookie does not work properly
281
- out of the box: the value has to be url-encoded and decoded to survive transport.
282
-
283
- Now, we generate Base64 urlsafe-encoded CSRF tokens, which are inherently safe
284
- to transport. Validation accepts both urlsafe tokens, and strict-encoded tokens
285
- for backwards compatibility.
286
-
287
- *Scott Blum*
288
-
289
- * Support rolling deploys for cookie serialization/encryption changes.
90
+ Works as a shortcut to set `response.cache_control` with the above methods.
290
91
 
291
- In a distributed configuration like rolling update, users may observe
292
- both old and new instances during deployment. Users may be served by a
293
- new instance and then by an old instance.
92
+ *Jacopo Beschi*
294
93
 
295
- That means when the server changes `cookies_serializer` from `:marshal`
296
- to `:hybrid` or the server changes `use_authenticated_cookie_encryption`
297
- from `false` to `true`, users may lose their sessions if they access the
298
- server during deployment.
94
+ * Writing into a disabled session will now raise an error.
299
95
 
300
- We added fallbacks to downgrade the cookie format when necessary during
301
- deployment, ensuring compatibility on both old and new instances.
96
+ Previously when no session store was set, writing into the session would silently fail.
302
97
 
303
- *Masaki Hara*
98
+ *Jean Boussier*
304
99
 
305
- * `ActionDispatch::Request.remote_ip` has ip address even when all sites are trusted.
100
+ * Add support for 'require-trusted-types-for' and 'trusted-types' headers.
306
101
 
307
- Before, if all `X-Forwarded-For` sites were trusted, the `remote_ip` would default to `127.0.0.1`.
308
- Now, the furthest proxy site is used. e.g.: It now gives an ip address when using curl from the load balancer.
102
+ Fixes #42034.
309
103
 
310
- *Keenan Brock*
104
+ *lfalcao*
311
105
 
312
- * Fix possible information leak / session hijacking vulnerability.
106
+ * Remove inline styles and address basic accessibility issues on rescue templates.
313
107
 
314
- The `ActionDispatch::Session::MemcacheStore` is still vulnerable given it requires the
315
- gem dalli to be updated as well.
108
+ *Jacob Herrington*
316
109
 
317
- CVE-2019-16782.
318
-
319
- * Include child session assertion count in ActionDispatch::IntegrationTest.
320
-
321
- `IntegrationTest#open_session` uses `dup` to create the new session, which
322
- meant it had its own copy of `@assertions`. This prevented the assertions
323
- from being correctly counted and reported.
324
-
325
- Child sessions now have their `attr_accessor` overridden to delegate to the
326
- root session.
327
-
328
- Fixes #32142.
329
-
330
- *Sam Bostock*
331
-
332
- * Add SameSite protection to every written cookie.
333
-
334
- Enabling `SameSite` cookie protection is an addition to CSRF protection,
335
- where cookies won't be sent by browsers in cross-site POST requests when set to `:lax`.
336
-
337
- `:strict` disables cookies being sent in cross-site GET or POST requests.
338
-
339
- Passing `:none` disables this protection and is the same as previous versions albeit a `; SameSite=None` is appended to the cookie.
340
-
341
- See upgrade instructions in config/initializers/new_framework_defaults_6_1.rb.
110
+ * Add support for 'private, no-store' Cache-Control headers.
342
111
 
343
- More info [here](https://tools.ietf.org/html/draft-west-first-party-cookies-07)
112
+ Previously, 'no-store' was exclusive; no other directives could be specified.
344
113
 
345
- _NB: Technically already possible as Rack supports SameSite protection, this is to ensure it's applied to all cookies_
114
+ *Alex Smith*
346
115
 
347
- *Cédric Fabianski*
116
+ * Expand payload of `unpermitted_parameters.action_controller` instrumentation to allow subscribers to
117
+ know which controller action received unpermitted parameters.
348
118
 
349
- * Bring back the feature that allows loading external route files from the router.
119
+ *bbuchalter*
350
120
 
351
- This feature existed back in 2012 but got reverted with the incentive that
352
- https://github.com/rails/routing_concerns was a better approach. Turned out
353
- that this wasn't fully the case and loading external route files from the router
354
- can be helpful for applications with a really large set of routes.
355
- Without this feature, application needs to implement routes reloading
356
- themselves and it's not straightforward.
121
+ * Add `ActionController::Live#send_stream` that makes it more convenient to send generated streams:
357
122
 
358
123
  ```ruby
359
- # config/routes.rb
360
-
361
- Rails.application.routes.draw do
362
- draw(:admin)
363
- end
364
-
365
- # config/routes/admin.rb
366
-
367
- get :foo, to: 'foo#bar'
368
- ```
369
-
370
- *Yehuda Katz*, *Edouard Chin*
371
-
372
- * Fix system test driver option initialization for non-headless browsers.
373
-
374
- *glaszig*
375
-
376
- * `redirect_to.action_controller` notifications now include the `ActionDispatch::Request` in
377
- their payloads as `:request`.
124
+ send_stream(filename: "subscribers.csv") do |stream|
125
+ stream.writeln "email_address,updated_at"
378
126
 
379
- *Austin Story*
380
-
381
- * `respond_to#any` no longer returns a response's Content-Type based on the
382
- request format but based on the block given.
383
-
384
- Example:
385
-
386
- ```ruby
387
- def my_action
388
- respond_to do |format|
389
- format.any { render(json: { foo: 'bar' }) }
390
- end
127
+ @subscribers.find_each do |subscriber|
128
+ stream.writeln [ subscriber.email_address, subscriber.updated_at ].join(",")
391
129
  end
392
-
393
- get('my_action.csv')
394
- ```
395
-
396
- The previous behaviour was to respond with a `text/csv` Content-Type which
397
- is inaccurate since a JSON response is being rendered.
398
-
399
- Now it correctly returns a `application/json` Content-Type.
400
-
401
- *Edouard Chin*
402
-
403
- * Replaces (back)slashes in failure screenshot image paths with dashes.
404
-
405
- If a failed test case contained a slash or a backslash, a screenshot would be created in a
406
- nested directory, causing issues with `tmp:clear`.
407
-
408
- *Damir Zekic*
409
-
410
- * Add `params.member?` to mimic Hash behavior.
411
-
412
- *Younes Serraj*
413
-
414
- * `process_action.action_controller` notifications now include the following in their payloads:
415
-
416
- * `:request` - the `ActionDispatch::Request`
417
- * `:response` - the `ActionDispatch::Response`
418
-
419
- *George Claghorn*
420
-
421
- * Updated `ActionDispatch::Request.remote_ip` setter to clear set the instance
422
- `remote_ip` to `nil` before setting the header that the value is derived
423
- from.
424
-
425
- Fixes #37383.
426
-
427
- *Norm Provost*
428
-
429
- * `ActionController::Base.log_at` allows setting a different log level per request.
430
-
431
- ```ruby
432
- # Use the debug level if a particular cookie is set.
433
- class ApplicationController < ActionController::Base
434
- log_at :debug, if: -> { cookies[:debug] }
435
130
  end
436
131
  ```
437
132
 
438
- *George Claghorn*
439
-
440
- * Allow system test screen shots to be taken more than once in
441
- a test by prefixing the file name with an incrementing counter.
442
-
443
- Add an environment variable `RAILS_SYSTEM_TESTING_SCREENSHOT_HTML` to
444
- enable saving of HTML during a screenshot in addition to the image.
445
- This uses the same image name, with the extension replaced with `.html`
446
-
447
- *Tom Fakes*
448
-
449
- * Add `Vary: Accept` header when using `Accept` header for response.
450
-
451
- For some requests like `/users/1`, Rails uses requests' `Accept`
452
- header to determine what to return. And if we don't add `Vary`
453
- in the response header, browsers might accidentally cache different
454
- types of content, which would cause issues: e.g. javascript got displayed
455
- instead of html content. This PR fixes these issues by adding `Vary: Accept`
456
- in these types of requests. For more detailed problem description, please read:
457
-
458
- https://github.com/rails/rails/pull/36213
459
-
460
- Fixes #25842.
461
-
462
- *Stan Lo*
463
-
464
- * Fix IntegrationTest `follow_redirect!` to follow redirection using the same HTTP verb when following
465
- a 307 redirection.
466
-
467
- *Edouard Chin*
133
+ *DHH*
468
134
 
469
- * System tests require Capybara 3.26 or newer.
135
+ * Add `ActionController::Live::Buffer#writeln` to write a line to the stream with a newline included.
470
136
 
471
- *George Claghorn*
137
+ *DHH*
472
138
 
473
- * Reduced log noise handling ActionController::RoutingErrors.
139
+ * `ActionDispatch::Request#content_type` now returned Content-Type header as it is.
474
140
 
475
- *Alberto Fernández-Capel*
141
+ Previously, `ActionDispatch::Request#content_type` returned value does NOT contain charset part.
142
+ This behavior changed to returned Content-Type header containing charset part as it is.
476
143
 
477
- * Add DSL for configuring HTTP Feature Policy.
144
+ If you want just MIME type, please use `ActionDispatch::Request#media_type` instead.
478
145
 
479
- This new DSL provides a way to configure an HTTP Feature Policy at a
480
- global or per-controller level. Full details of HTTP Feature Policy
481
- specification and guidelines can be found at MDN:
482
-
483
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Feature-Policy
484
-
485
- Example global policy:
146
+ Before:
486
147
 
487
148
  ```ruby
488
- Rails.application.config.feature_policy do |f|
489
- f.camera :none
490
- f.gyroscope :none
491
- f.microphone :none
492
- f.usb :none
493
- f.fullscreen :self
494
- f.payment :self, "https://secure.example.com"
495
- end
149
+ request = ActionDispatch::Request.new("CONTENT_TYPE" => "text/csv; header=present; charset=utf-16", "REQUEST_METHOD" => "GET")
150
+ request.content_type #=> "text/csv"
496
151
  ```
497
152
 
498
- Example controller level policy:
153
+ After:
499
154
 
500
155
  ```ruby
501
- class PagesController < ApplicationController
502
- feature_policy do |p|
503
- p.geolocation "https://example.com"
504
- end
505
- end
156
+ request = ActionDispatch::Request.new("Content-Type" => "text/csv; header=present; charset=utf-16", "REQUEST_METHOD" => "GET")
157
+ request.content_type #=> "text/csv; header=present; charset=utf-16"
158
+ request.media_type #=> "text/csv"
506
159
  ```
507
160
 
508
- *Jacob Bednarz*
161
+ *Rafael Mendonça França*
509
162
 
510
- * Add the ability to set the CSP nonce only to the specified directives.
163
+ * Change `ActionDispatch::Request#media_type` to return `nil` when the request don't have a `Content-Type` header.
511
164
 
512
- Fixes #35137.
165
+ *Rafael Mendonça França*
513
166
 
514
- *Yuji Yaginuma*
167
+ * Fix error in `ActionController::LogSubscriber` that would happen when throwing inside a controller action.
515
168
 
516
- * Keep part when scope option has value.
169
+ *Janko Marohnić*
517
170
 
518
- When a route was defined within an optional scope, if that route didn't
519
- take parameters the scope was lost when using path helpers. This commit
520
- ensures scope is kept both when the route takes parameters or when it
521
- doesn't.
171
+ * Allow anything with `#to_str` (like `Addressable::URI`) as a `redirect_to` location.
522
172
 
523
- Fixes #33219.
173
+ *ojab*
524
174
 
525
- *Alberto Almagro*
175
+ * Change the request method to a `GET` when passing failed requests down to `config.exceptions_app`.
526
176
 
527
- * Added `deep_transform_keys` and `deep_transform_keys!` methods to ActionController::Parameters.
177
+ *Alex Robbin*
528
178
 
529
- *Gustavo Gutierrez*
179
+ * Deprecate the ability to assign a single value to `config.action_dispatch.trusted_proxies`
180
+ as `RemoteIp` middleware behaves inconsistently depending on whether this is configured
181
+ with a single value or an enumerable.
530
182
 
531
- * Calling `ActionController::Parameters#transform_keys`/`!` without a block now returns
532
- an enumerator for the parameters instead of the underlying hash.
183
+ Fixes #40772.
533
184
 
534
- *Eugene Kenny*
185
+ *Christian Sutter*
535
186
 
536
- * Fix strong parameters blocks all attributes even when only some keys are invalid (non-numerical).
537
- It should only block invalid key's values instead.
187
+ * Add `redirect_back_or_to(fallback_location, **)` as a more aesthetically pleasing version of `redirect_back fallback_location:, **`.
188
+ The old method name is retained without explicit deprecation.
538
189
 
539
- *Stan Lo*
190
+ *DHH*
540
191
 
541
192
 
542
- Please check [6-0-stable](https://github.com/rails/rails/blob/6-0-stable/actionpack/CHANGELOG.md) for previous changes.
193
+ Please check [6-1-stable](https://github.com/rails/rails/blob/6-1-stable/actionpack/CHANGELOG.md) for previous changes.
data/MIT-LICENSE CHANGED
@@ -1,4 +1,4 @@
1
- Copyright (c) 2004-2020 David Heinemeier Hansson
1
+ Copyright (c) 2004-2021 David Heinemeier Hansson
2
2
 
3
3
  Permission is hereby granted, free of charge, to any person obtaining
4
4
  a copy of this software and associated documentation files (the