bartt-ssl_requirement 1.2.1 → 1.2.2
Sign up to get free protection for your applications and to get access to all the features.
- data/VERSION +1 -1
- data/bartt-ssl_requirement.gemspec +2 -2
- data/lib/ssl_requirement.rb +1 -1
- metadata +3 -3
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.2.
|
1
|
+
1.2.2
|
@@ -5,11 +5,11 @@
|
|
5
5
|
|
6
6
|
Gem::Specification.new do |s|
|
7
7
|
s.name = %q{bartt-ssl_requirement}
|
8
|
-
s.version = "1.2.
|
8
|
+
s.version = "1.2.2"
|
9
9
|
|
10
10
|
s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
|
11
11
|
s.authors = ["RailsJedi", "David Heinemeier Hansson", "jcnetdev", "bcurren", "bmpercy", "revo", "nathany", "bartt"]
|
12
|
-
s.date = %q{2010-
|
12
|
+
s.date = %q{2010-06-12}
|
13
13
|
s.description = %q{SSL requirement adds a declarative way of specifying that certain actions should only be allowed to run under SSL, and if they're accessed without it, they should be redirected.}
|
14
14
|
s.email = %q{bartt@vurve.com}
|
15
15
|
s.extra_rdoc_files = [
|
data/lib/ssl_requirement.rb
CHANGED
@@ -105,7 +105,7 @@ module SslRequirement
|
|
105
105
|
|
106
106
|
def determine_redirect_url(request, ssl)
|
107
107
|
protocol = ssl ? "https" : "http"
|
108
|
-
"#{protocol}://#{determine_host_and_port(request, ssl)}#{request.
|
108
|
+
"#{protocol}://#{determine_host_and_port(request, ssl)}#{request.fullpath}"
|
109
109
|
end
|
110
110
|
|
111
111
|
def determine_host_and_port(request, ssl)
|
metadata
CHANGED
@@ -5,8 +5,8 @@ version: !ruby/object:Gem::Version
|
|
5
5
|
segments:
|
6
6
|
- 1
|
7
7
|
- 2
|
8
|
-
-
|
9
|
-
version: 1.2.
|
8
|
+
- 2
|
9
|
+
version: 1.2.2
|
10
10
|
platform: ruby
|
11
11
|
authors:
|
12
12
|
- RailsJedi
|
@@ -21,7 +21,7 @@ autorequire:
|
|
21
21
|
bindir: bin
|
22
22
|
cert_chain: []
|
23
23
|
|
24
|
-
date: 2010-
|
24
|
+
date: 2010-06-12 00:00:00 -07:00
|
25
25
|
default_executable:
|
26
26
|
dependencies: []
|
27
27
|
|