mwmitchell-solr-ruby 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,105 @@
1
+ require File.join(File.dirname(__FILE__), 'test_helpers')
2
+
3
+ require 'rss'
4
+
5
+ class MapperTest < Test::Unit::TestCase
6
+
7
+ # simple replacement
8
+ def test_string_map
9
+ data = {
10
+ :skip_this=>'!'
11
+ }
12
+ mapping = {
13
+ :id=>'one',
14
+ :name=>'foo'
15
+ }
16
+ mapper = Solr::Mapper::Base.new(mapping)
17
+ expected = [mapping]
18
+ assert_equal expected, mapper.map(data)
19
+ end
20
+
21
+ # test enumerable/array mappings
22
+ def test_array_multi_value
23
+ data = {
24
+ :NUMID=>100,
25
+ :type=>:type_val,
26
+ :code=>:code_val
27
+ }
28
+ mapping = {
29
+ :id=>:NUMID,
30
+ :name=>'foo',
31
+ :category=>[:type, :code]
32
+ }
33
+ mapper = Solr::Mapper::Base.new(mapping)
34
+ expected = [{:name=>"foo", :category=>[:type_val, :code_val], :id=>100}]
35
+ assert_equal expected, mapper.map(data)
36
+ end
37
+
38
+ # test the proc mapping type
39
+ # test that the second arg in the block is a Solr::Mapper
40
+ def test_proc
41
+ data = [{:name=>'-bach;'}]
42
+ mapping = {
43
+ :name=>proc{|d,mapper|
44
+ assert_equal Solr::Mapper::Base, mapper.class
45
+ d[:name].gsub(/\W+/, '')
46
+ }
47
+ }
48
+ mapper = Solr::Mapper::Base.new(mapping)
49
+ expected = [{:name=>"bach"}]
50
+ assert_equal expected, mapper.map(data)
51
+ end
52
+
53
+ def rss_file
54
+ @rss_file ||= File.join(File.dirname(__FILE__), 'ruby-lang.org.rss.xml')
55
+ end
56
+
57
+ # load an rss feed
58
+ # create a mapping
59
+ # map it and test the fields
60
+ def raw_mapping_rss_docs
61
+ rss = RSS::Parser.parse(File.read(rss_file), false)
62
+ mapping = {
63
+ :channel=>rss.channel.title,
64
+ :url=>rss.channel.link,
65
+ :total=>rss.items.size,
66
+ :title=>proc {|item,m| item.title },
67
+ :link=>proc{|item,m| item.link },
68
+ :published=>proc{|item,m| item.date },
69
+ :description=>proc{|item,m| item.description }
70
+ }
71
+ mapper = Solr::Mapper::Base.new(mapping)
72
+ mapper.map(rss.items)
73
+ end
74
+
75
+ # load an rss feed
76
+ # create a mapping
77
+ # map it and test the fields
78
+ def rss_mapper_docs
79
+ m = Solr::Mapper::RSS.new
80
+ mapping = {
81
+ :channel=>:'channel.title',
82
+ :url=>:'channel.link',
83
+ :total=>:'items.size',
84
+ :title=>proc {|item,m| item.title },
85
+ :link=>proc {|item,m| item.link },
86
+ :published=>proc {|item,m| item.date },
87
+ :description=>proc {|item,m| item.description }
88
+ }
89
+ m.map(rss_file, mapping)
90
+ end
91
+
92
+ def test_rss
93
+ [rss_mapper_docs, raw_mapping_rss_docs].each do |docs|
94
+ assert_equal 10, docs.size
95
+ first = docs.first
96
+ # make sure the mapped solr docs have all of the keys from the mapping
97
+ #assert mapping.keys.all?{|mapping_key| first.keys.include?(mapping_key) }
98
+ assert_equal docs.size, docs.first[:total].to_i
99
+ assert_equal Time.parse('Mon Nov 10 09:55:53 -0500 2008'), first[:published]
100
+ assert_equal 'http://www.ruby-lang.org/en/feeds/news.rss/', first[:url]
101
+ assert_equal 'Scotland on Rails 2009', first[:title]
102
+ end
103
+ end
104
+
105
+ end
@@ -0,0 +1,70 @@
1
+ require File.join(File.dirname(__FILE__), 'test_helpers')
2
+
3
+ class MessageTest < Test::Unit::TestCase
4
+
5
+ # call all of the simple methods...
6
+ # make sure the xml string is valid
7
+ # ensure the class is actually Solr::XML
8
+ def test_simple_methods
9
+ [:optimize, :rollback, :commit].each do |meth|
10
+ result = Solr::Message.send(meth)
11
+ assert_equal "<#{meth}/>", result.to_s
12
+ assert_equal String, result.class
13
+ end
14
+ end
15
+
16
+ def test_delete_by_id
17
+ result = Solr::Message.delete_by_id(10)
18
+ assert_equal String, result.class
19
+ assert_equal '<delete><id>10</id></delete>', result.to_s
20
+ end
21
+
22
+ def test_delete_by_multiple_ids
23
+ result = Solr::Message.delete_by_id([1, 2, 3])
24
+ assert_equal String, result.class
25
+ assert_equal '<delete><id>1</id><id>2</id><id>3</id></delete>', result.to_s
26
+ end
27
+
28
+ def test_delete_by_query
29
+ result = Solr::Message.delete_by_id('status:"LOST"')
30
+ assert_equal String, result.class
31
+ assert_equal '<delete><id>status:"LOST"</id></delete>', result.to_s
32
+ end
33
+
34
+ def test_delete_by_multiple_queries
35
+ result = Solr::Message.delete_by_id(['status:"LOST"', 'quantity:0'])
36
+ assert_equal String, result.class
37
+ assert_equal '<delete><id>status:"LOST"</id><id>quantity:0</id></delete>', result.to_s
38
+ end
39
+
40
+ # add a single hash ("doc")
41
+ def test_add_hash
42
+ data = {
43
+ :id=>1,
44
+ :name=>'matt'
45
+ }
46
+
47
+ expected = '<add><doc><field name="id">1</field><field name="name">matt</field></doc></add>'
48
+ assert_equal expected, Solr::Message.add(data).to_s
49
+ end
50
+
51
+ # add an array of hashes
52
+ def test_add_array
53
+ data = [
54
+ {
55
+ :id=>1,
56
+ :name=>'matt'
57
+ },
58
+ {
59
+ :id=>2,
60
+ :name=>'sam'
61
+ }
62
+ ]
63
+
64
+ message = Solr::Message.add(data)
65
+ expected = '<add><doc><field name="id">1</field><field name="name">matt</field></doc><doc><field name="id">2</field><field name="name">sam</field></doc></add>'
66
+
67
+ assert_equal expected, message.to_s
68
+ end
69
+
70
+ end
@@ -0,0 +1,391 @@
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
3
+ <channel>
4
+ <title>Ruby News</title>
5
+ <link>http://www.ruby-lang.org/en/feeds/news.rss/</link>
6
+ <language>en-us</language>
7
+ <ttl>40</ttl>
8
+ <description>The latest news from Ruby-Lang.org.</description>
9
+
10
+
11
+ <item>
12
+ <title>Scotland on Rails 2009</title>
13
+ <description>&lt;p&gt;&lt;a href=&quot;http://scotlandonrails.com&quot;&gt;Scotland on Rails&lt;/a&gt; is pleased to announce that Conference2009 will be held March 26-28 in Edinburgh, Scotland.&lt;/p&gt;
14
+
15
+
16
+ &lt;p&gt;We are now accepting submissions. The closing date for submissions is December 1st 2008, so there&amp;#8217;s still time! Please mail your plaintext proposals for 45 minute sessions to &lt;a href=&quot;mailto:submissions@scotlandonrails.com&quot;&gt;submissions@scotlandonrails.com&lt;/a&gt;.&lt;/p&gt;
17
+
18
+
19
+ &lt;p&gt;Alternatively, if you are interested in sponsoring the conference, please mail &lt;a href=&quot;mailto:sponsorship@scotlandonrails.com&quot;&gt;sponsorship@scotlandonrails.com&lt;/a&gt; for a prospectus.&lt;/p&gt;
20
+
21
+
22
+ &lt;p&gt;Lastly, if you wish to be notified when we open for registration, you can sign up on the site.&lt;/p&gt;
23
+
24
+
25
+ &lt;p&gt;Come and enjoy all that Edinburgh has to offer (whisky! castle! volcano! ruby! whisky!) in March. We hope to see you there.&lt;/p&gt; </description>
26
+ <pubDate>Mon, 10 Nov 2008 14:55:53 GMT</pubDate>
27
+ <guid>http://www.ruby-lang.org/en/news/2008/11/10/scotland-on-rails-2009/</guid>
28
+ <link>http://www.ruby-lang.org/en/news/2008/11/10/scotland-on-rails-2009/</link>
29
+ </item>
30
+
31
+ <item>
32
+ <title>MountainWest RubyConf 2009 dates and CFP</title>
33
+ <description>&lt;p&gt;&lt;a href=&quot;http://mtnwestrubyconf.org&quot;&gt;MountainWest RubyConf 2009&lt;/a&gt; will be held March 13-14, 2009, in Salt Lake City, Utah, &lt;span class=&quot;caps&quot;&gt;USA&lt;/span&gt;.&lt;/p&gt;
34
+
35
+
36
+ &lt;p&gt;Proposals to speak at this regional conference are now being accepted. Please send your proposal to proposals@mtnwestrubyconf.org.&lt;/p&gt;
37
+
38
+
39
+ &lt;p&gt;The submission deadline is midnight (MST) on December 31st, 2008.&lt;/p&gt;
40
+
41
+
42
+ &lt;p&gt;There are sponsorship opportunities available as well. Please contact sponsorship@mtnwestruby.org if you are interested.&lt;/p&gt;
43
+
44
+
45
+ &lt;p&gt;Please see &lt;a href=&quot;http://mtnwestrubyconf.org&quot;&gt;mtnwestrubyconf.org/&lt;/a&gt; for more details as they become available.&lt;/p&gt; </description>
46
+ <pubDate>Sat, 08 Nov 2008 15:03:32 GMT</pubDate>
47
+ <guid>http://www.ruby-lang.org/en/news/2008/11/08/mountainwest-rubyconf-2009-dates-and-cfp/</guid>
48
+ <link>http://www.ruby-lang.org/en/news/2008/11/08/mountainwest-rubyconf-2009-dates-and-cfp/</link>
49
+ </item>
50
+
51
+ <item>
52
+ <title> Ruby 1.9.1-preview 1 released</title>
53
+ <description>&lt;p&gt;Yugui (Yuki Sonoda) announced the release of Ruby 1.9.1-preview 1:&lt;/p&gt;
54
+
55
+
56
+ &lt;blockquote&gt;
57
+ This is a preview release of Ruby 1.9.1, which will be the first stable version of the Ruby 1.9 series. Try it out now and get an early taste of a modern, faster, multilingualized, and much improved Ruby with clearer syntax.&lt;br&gt;&lt;br&gt;
58
+
59
+ &lt;p&gt;If you encounter any bugs or problems, please let us know via the official issue tracking system:&lt;/p&gt;
60
+
61
+
62
+ &lt;p&gt;&lt;a href=&quot;http://redmine.ruby-lang.org&quot;&gt;http://redmine.ruby-lang.org&lt;/a&gt;&lt;/p&gt;
63
+
64
+
65
+ &lt;/blockquote&gt;
66
+
67
+ &lt;p&gt;You can download the release from;&lt;/p&gt;
68
+
69
+
70
+ &lt;ul&gt;
71
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.1-preview1.tar.bz2&quot;&gt;ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.1-preview1.tar.bz2&lt;/a&gt;
72
+
73
+ &lt;p&gt;&lt;span class=&quot;caps&quot;&gt;SIZE&lt;/span&gt;: 6169022 bytes
74
+ &lt;span class=&quot;caps&quot;&gt;MD5&lt;/span&gt;: 0d51dc949bb6b438ad4ebfabbb5f6754
75
+ &lt;span class=&quot;caps&quot;&gt;SHA256&lt;/span&gt;: dc39000537d7c7528ef26af8e1c3a6215b30b6c579c615eaec7013513410456a&lt;/p&gt;&lt;/li&gt;
76
+ &lt;/ul&gt;
77
+
78
+
79
+ &lt;ul&gt;
80
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.1-preview1.tar.gz&quot;&gt;ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.1-preview1.tar.gz&lt;/a&gt;
81
+
82
+ &lt;p&gt;&lt;span class=&quot;caps&quot;&gt;SIZE&lt;/span&gt;: 7409682 bytes
83
+ &lt;span class=&quot;caps&quot;&gt;MD5&lt;/span&gt;: 738f701532452fd5d36f5c155f3ba692
84
+ &lt;span class=&quot;caps&quot;&gt;SHA256&lt;/span&gt;: 99443bdae9f94ba7b08de187881f8cbee172379edf9c5fa85fc04c869150ff6d&lt;/p&gt;&lt;/li&gt;
85
+ &lt;/ul&gt;
86
+
87
+
88
+ &lt;ul&gt;
89
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.1-preview1.zip&quot;&gt;ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.1-preview1.zip&lt;/a&gt;
90
+
91
+ &lt;p&gt;&lt;span class=&quot;caps&quot;&gt;SIZE&lt;/span&gt;: 8569116 bytes
92
+ &lt;span class=&quot;caps&quot;&gt;MD5&lt;/span&gt;: 5f68246246c4cd29d8a3b6b34b29b6ac
93
+ &lt;span class=&quot;caps&quot;&gt;SHA256&lt;/span&gt;: a6c3a7bf7ea83b595024764926353e08596a78e40c57ac58c568662e5e88df95&lt;/p&gt;&lt;/li&gt;
94
+ &lt;/ul&gt; </description>
95
+ <pubDate>Tue, 28 Oct 2008 19:45:27 GMT</pubDate>
96
+ <guid>http://www.ruby-lang.org/en/news/2008/10/28/ruby-1-9-1-preview-1-released/</guid>
97
+ <link>http://www.ruby-lang.org/en/news/2008/10/28/ruby-1-9-1-preview-1-released/</link>
98
+ </item>
99
+
100
+ <item>
101
+ <title>RubyConf 2008 is Sold-out</title>
102
+ <description>&lt;p&gt;&lt;a href=&quot;http://rubyconf.org/&quot;&gt;RubyConf 2008&lt;/a&gt; is sold out&lt;/p&gt;
103
+
104
+
105
+ &lt;p&gt;However, there is a &lt;a href=&quot;http://www.regonline.com/builder/site/Default.aspx?eventid=636797&quot;&gt;waiting list&lt;/a&gt; you can join in case of cancellations.&lt;/p&gt; </description>
106
+ <pubDate>Thu, 02 Oct 2008 23:21:06 GMT</pubDate>
107
+ <guid>http://www.ruby-lang.org/en/news/2008/10/02/rubyconf-2008-is-sold-out/</guid>
108
+ <link>http://www.ruby-lang.org/en/news/2008/10/02/rubyconf-2008-is-sold-out/</link>
109
+ </item>
110
+
111
+ <item>
112
+ <title>Voices That Matter 2008</title>
113
+ <description>&lt;p&gt;Pearson Education is running a &lt;a href=&quot;http://www.voicesthatmatter.com/ruby2008/&quot;&gt;Voices That Matter&lt;/a&gt; Ruby conference this fall in Boston. The conference, from the same people who Addison-Wesley's Professional Ruby Series, will give you a chance to meet and learn from those very same authors. Don't miss a chance to interact with so many Ruby professionals.&lt;/p&gt; </description>
114
+ <pubDate>Tue, 09 Sep 2008 02:49:37 GMT</pubDate>
115
+ <guid>http://www.ruby-lang.org/en/news/2008/09/09/voices-that-matter-2008/</guid>
116
+ <link>http://www.ruby-lang.org/en/news/2008/09/09/voices-that-matter-2008/</link>
117
+ </item>
118
+
119
+ <item>
120
+ <title>DoS vulnerability in REXML</title>
121
+ <description>&lt;p&gt;There is a DoS vulnerability in the REXML library included in the Ruby
122
+ Standard Library. A so-called &quot;XML entity explosion&quot; attack technique
123
+ can be used for remotely bringing down (disabling) any application
124
+ which parses user-provided XML using REXML.&lt;/p&gt;&lt;p&gt;Most Rails applications will be vulnerable because Rails parses
125
+ user-provided XML using REXML by default. &lt;/p&gt; &lt;h2&gt;&lt;a name=&quot;label-0&quot; id=&quot;label-0&quot;&gt;Impact&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Impact&quot; --&gt;&lt;p&gt;An attacker can cause a denial of service by causing REXML to parse a
126
+ document containing recursively nested entities such as:&lt;/p&gt;&lt;pre&gt;&amp;lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&amp;gt;
127
+ &amp;lt;!DOCTYPE member [
128
+ &amp;lt;!ENTITY a &quot;&amp;amp;b;&amp;amp;b;&amp;amp;b;&amp;amp;b;&amp;amp;b;&amp;amp;b;&amp;amp;b;&amp;amp;b;&amp;amp;b;&amp;amp;b;&quot;&amp;gt;
129
+ &amp;lt;!ENTITY b &quot;&amp;amp;c;&amp;amp;c;&amp;amp;c;&amp;amp;c;&amp;amp;c;&amp;amp;c;&amp;amp;c;&amp;amp;c;&amp;amp;c;&amp;amp;c;&quot;&amp;gt;
130
+ &amp;lt;!ENTITY c &quot;&amp;amp;d;&amp;amp;d;&amp;amp;d;&amp;amp;d;&amp;amp;d;&amp;amp;d;&amp;amp;d;&amp;amp;d;&amp;amp;d;&amp;amp;d;&quot;&amp;gt;
131
+ &amp;lt;!ENTITY d &quot;&amp;amp;e;&amp;amp;e;&amp;amp;e;&amp;amp;e;&amp;amp;e;&amp;amp;e;&amp;amp;e;&amp;amp;e;&amp;amp;e;&amp;amp;e;&quot;&amp;gt;
132
+ &amp;lt;!ENTITY e &quot;&amp;amp;f;&amp;amp;f;&amp;amp;f;&amp;amp;f;&amp;amp;f;&amp;amp;f;&amp;amp;f;&amp;amp;f;&amp;amp;f;&amp;amp;f;&quot;&amp;gt;
133
+ &amp;lt;!ENTITY f &quot;&amp;amp;g;&amp;amp;g;&amp;amp;g;&amp;amp;g;&amp;amp;g;&amp;amp;g;&amp;amp;g;&amp;amp;g;&amp;amp;g;&amp;amp;g;&quot;&amp;gt;
134
+ &amp;lt;!ENTITY g &quot;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&quot;&amp;gt;
135
+ ]&amp;gt;
136
+ &amp;lt;member&amp;gt;
137
+ &amp;amp;a;
138
+ &amp;lt;/member&amp;gt;&lt;/pre&gt;&lt;h2&gt;&lt;a name=&quot;label-1&quot; id=&quot;label-1&quot;&gt;Vulnerable versions&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Vulnerable versions&quot; --&gt;&lt;h3&gt;&lt;a name=&quot;label-2&quot; id=&quot;label-2&quot;&gt;1.8 series&lt;/a&gt;&lt;/h3&gt;&lt;!-- RDLabel: &quot;1.8 series&quot; --&gt;&lt;ul&gt;
139
+ &lt;li&gt;1.8.6-p287 and all prior versions&lt;/li&gt;
140
+ &lt;li&gt;1.8.7-p72 and all prior versions&lt;/li&gt;
141
+ &lt;/ul&gt;&lt;h3&gt;&lt;a name=&quot;label-3&quot; id=&quot;label-3&quot;&gt;1.9 series&lt;/a&gt;&lt;/h3&gt;&lt;!-- RDLabel: &quot;1.9 series&quot; --&gt;&lt;ul&gt;
142
+ &lt;li&gt;all versions&lt;/li&gt;
143
+ &lt;/ul&gt;&lt;h2&gt;&lt;a name=&quot;label-4&quot; id=&quot;label-4&quot;&gt;Solution&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Solution&quot; --&gt;&lt;p&gt;Please download the following monkey patch to fix this problem.&lt;/p&gt;&lt;ul&gt;
144
+ &lt;li&gt;&lt;a href=&quot;http://www.ruby-lang.org/security/20080823rexml/rexml-expansion-fix2.rb&quot;&gt;&amp;lt;URL:http://www.ruby-lang.org/security/20080823rexml/rexml-expansion-fix2.rb&amp;gt;&lt;/a&gt;&lt;/li&gt;
145
+ &lt;/ul&gt;&lt;p&gt;Then fix your application to load rexml-expansion-fix2.rb before using
146
+ REXML.&lt;/p&gt;&lt;pre&gt;require &quot;rexml-expansion-fix2&quot;
147
+ ...
148
+ doc = REXML::Document.new(str)
149
+ ...&lt;/pre&gt;&lt;p&gt;If you have a Rails application, copy rexml-expansion-fix2.rb into a
150
+ directory on the load path (such as RAILS_ROOT/lib/), and put the
151
+ following line into config/environment.rb.&lt;/p&gt;&lt;pre&gt;require &quot;rexml-expansion-fix2&quot;&lt;/pre&gt;&lt;p&gt;If your application is Rails 2.1 or later, you can simply copy
152
+ rexml-expansion-fix2.rb to RAILS_ROOT/config/initializers and it will
153
+ be required automatically.&lt;/p&gt;&lt;p&gt;By default, XML entity expansion limit is 10000. You can change it by
154
+ changing REXML::Document.entity_expansion_limit. e.g.&lt;/p&gt;&lt;pre&gt;REXML::Document.entity_expansion_limit = 1000&lt;/pre&gt;&lt;p&gt;This fix will be made available as a gem and used by future versions of
155
+ rails, but users should take corrective action immediately.&lt;/p&gt;&lt;h2&gt;&lt;a name=&quot;label-5&quot; id=&quot;label-5&quot;&gt;Credit&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Credit&quot; --&gt;&lt;p&gt;Credit to Luka Treiber and Mitja Kolsek of ACROS Security for
156
+ disclosing the problem to Ruby and Rails Security Teams.&lt;/p&gt;&lt;p&gt;Credit to Michael Koziarski of Rails Core Team for creating the monkey
157
+ patch to fix the vulnerability.&lt;/p&gt;&lt;h2&gt;&lt;a name=&quot;label-6&quot; id=&quot;label-6&quot;&gt;Changes&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Changes&quot; --&gt;&lt;ul&gt;
158
+ &lt;li&gt;2008-08-29 18:46 +09:00 fixed the summary not to mislead that this vulnerability is Rails specific.&lt;/li&gt;
159
+ &lt;li&gt;2008-11-09 12:40 +09:00 fixed &lt;a href=&quot;http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502535&quot;&gt;a bug of the monkey patch&lt;/a&gt;.&lt;/li&gt;
160
+ &lt;/ul&gt;</description>
161
+ <pubDate>Sat, 23 Aug 2008 07:56:11 GMT</pubDate>
162
+ <guid>http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/</guid>
163
+ <link>http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/</link>
164
+ </item>
165
+
166
+ <item>
167
+ <title>Ruby 1.8.7-p72 and 1.8.6-p287 released</title>
168
+ <description>&lt;p&gt;Ruby 1.8.7-p72 and 1.8.6-p287 have been released.
169
+ The last releases were incomplete, and the new releases include fixes of &lt;a href=&quot;http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/#label-3&quot;&gt;the previously announced vulnerability of dl&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;The released source archives are available at:&lt;/p&gt;&lt;ul&gt;
170
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p287.tar.gz&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p287.tar.gz&amp;gt;&lt;/a&gt;&lt;/li&gt;
171
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p287.tar.bz2&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p287.tar.bz2&amp;gt;&lt;/a&gt;&lt;/li&gt;
172
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p287.zip&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p287.zip&amp;gt;&lt;/a&gt;&lt;/li&gt;
173
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p72.tar.gz&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p72.tar.gz&amp;gt;&lt;/a&gt;&lt;/li&gt;
174
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p72.tar.bz2&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p72.tar.bz2&amp;gt;&lt;/a&gt;&lt;/li&gt;
175
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p72.zip&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p72.zip&amp;gt;&lt;/a&gt;&lt;/li&gt;
176
+ &lt;/ul&gt; &lt;p&gt;Checksums:&lt;/p&gt;&lt;pre&gt;MD5(ruby-1.8.6-p287.tar.gz)= f6cd51001534ced5375339707a757556
177
+ SHA256(ruby-1.8.6-p287.tar.gz)= 6463d1932c34ff72b79174ac7d2c28940d29d147928250928a00a0dbee43db57
178
+ SIZE(ruby-1.8.6-p287.tar.gz)= 4590393
179
+
180
+ MD5(ruby-1.8.6-p287.tar.bz2)= 80b5f3db12531d36e6c81fac6d05dda9
181
+ SHA256(ruby-1.8.6-p287.tar.bz2)= ac15a1cb78c50ec9cc7e831616a143586bdd566bc865c6b769a0c47b3b3936ce
182
+ SIZE(ruby-1.8.6-p287.tar.bz2)= 3956902
183
+
184
+ MD5(ruby-1.8.6-p287.zip)= e555d51f5b387fdd52ae53d9bafa13f5
185
+ SHA256(ruby-1.8.6-p287.zip)= 844c66c015565839531a34b83e0526cd4fa2a71cc0f5cc8ddb0d4c158403543a
186
+ SIZE(ruby-1.8.6-p287.zip)= 5606238
187
+
188
+ MD5(ruby-1.8.7-p72.tar.gz)= 5e5b7189674b3a7f69401284f6a7a36d
189
+ SHA256(ruby-1.8.7-p72.tar.gz)= e15ca005076f5d6f91fc856fdfbd071698a4cadac3c6e25855899dba1f6fc5ef
190
+ SIZE(ruby-1.8.7-p72.tar.gz)= 4805594
191
+
192
+ MD5(ruby-1.8.7-p72.tar.bz2)= 0b215c46b89b28d7ab8d56d96e72d5b9
193
+ SHA256(ruby-1.8.7-p72.tar.bz2)= a8f8a28e286dd76747d8e97ea5cfe7a315eb896906ab8c8606d687d9f6f6146e
194
+ SIZE(ruby-1.8.7-p72.tar.bz2)= 4127450
195
+
196
+ MD5(ruby-1.8.7-p72.zip)= b44fe5a12d4bf138ba0d3660e13a8216
197
+ SHA256(ruby-1.8.7-p72.zip)= 77e67be4aa8c3e041e1d20d24e5fcf2e33ad9bccb3da3332b6c0a5b648334903
198
+ SIZE(ruby-1.8.7-p72.zip)= 5855902&lt;/pre&gt;&lt;p&gt;For a full list of all changes, see the bundled files named ChangeLog, which are also available at the following locations:&lt;/p&gt;&lt;ul&gt;
199
+ &lt;li&gt;&lt;a href=&quot;http://svn.ruby-lang.org/repos/ruby/tags/v1_8_6_287/ChangeLog&quot;&gt;&amp;lt;URL:http://svn.ruby-lang.org/repos/ruby/tags/v1_8_6_287/ChangeLog&amp;gt;&lt;/a&gt;&lt;/li&gt;
200
+ &lt;li&gt;&lt;a href=&quot;http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_72/ChangeLog&quot;&gt;&amp;lt;URL:http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_72/ChangeLog&amp;gt;&lt;/a&gt;&lt;/li&gt;
201
+ &lt;/ul&gt;</description>
202
+ <pubDate>Mon, 11 Aug 2008 02:01:00 GMT</pubDate>
203
+ <guid>http://www.ruby-lang.org/en/news/2008/08/11/ruby-1-8-7-p72-and-1-8-6-p287-released/</guid>
204
+ <link>http://www.ruby-lang.org/en/news/2008/08/11/ruby-1-8-7-p72-and-1-8-6-p287-released/</link>
205
+ </item>
206
+
207
+ <item>
208
+ <title>Multiple vulnerabilities in Ruby</title>
209
+ <description>&lt;p&gt;Multiple vulnerabilities have been discovered in Ruby. It's
210
+ recommended that you upgrade to the latest versions.&lt;/p&gt; &lt;h2&gt;&lt;a name=&quot;label-0&quot; id=&quot;label-0&quot;&gt;Details&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Details&quot; --&gt;&lt;p&gt;The following vulnerabilities have been discovered.&lt;/p&gt;&lt;h3&gt;&lt;a name=&quot;label-1&quot; id=&quot;label-1&quot;&gt;Several vulnerabilities in safe level&lt;/a&gt;&lt;/h3&gt;&lt;!-- RDLabel: &quot;Several vulnerabilities in safe level&quot; --&gt;&lt;p&gt;Several vulnerabilities in safe level have been discovered.&lt;/p&gt;&lt;ul&gt;
211
+ &lt;li&gt;&lt;p&gt;untrace_var is permitted at safe level 4.&lt;/p&gt;
212
+ &lt;pre&gt;trace_var(:$VAR) {|val| puts &quot;$VAR = #{val}&quot; }
213
+
214
+ Thread.new do
215
+ $SAFE = 4
216
+ eval %q{
217
+ proc = untrace_var :$VAR
218
+ proc.first.call(&quot;aaa&quot;)
219
+ }
220
+ end.join&lt;/pre&gt;&lt;/li&gt;
221
+ &lt;li&gt;&lt;p&gt;$PROGRAM_NAME may be modified at safe level 4.&lt;/p&gt;
222
+ &lt;pre&gt;Thread.new do
223
+ $SAFE = 4
224
+ eval %q{$PROGRAM_NAME.replace &quot;Hello, World!&quot;}
225
+ end.join
226
+
227
+ $PROGRAM_NAME #=&amp;gt; &quot;Hello, World!&quot;&lt;/pre&gt;&lt;/li&gt;
228
+ &lt;li&gt;&lt;p&gt;Insecure methods may be called at safe level 1-3.&lt;/p&gt;
229
+ &lt;pre&gt;class Hello
230
+ def world
231
+ Thread.new do
232
+ $SAFE = 4
233
+ msg = &quot;Hello, World!&quot;
234
+ def msg.size
235
+ self.replace self*10 # replace string
236
+ 1 # return wrong size
237
+ end
238
+ msg
239
+ end.value
240
+ end
241
+ end
242
+
243
+ $SAFE = 1 # or 2, or 3
244
+ s = Hello.new.world
245
+ if s.kind_of?(String)
246
+ puts s if s.size &amp;lt; 20 # print string which size is less than 20
247
+ end&lt;/pre&gt;&lt;/li&gt;
248
+ &lt;li&gt;&lt;p&gt;Syslog operations are permitted at safe level 4.&lt;/p&gt;
249
+ &lt;pre&gt;require &quot;syslog&quot;
250
+
251
+ Syslog.open
252
+
253
+ Thread.new do
254
+ $SAFE = 4
255
+ eval %q{
256
+ Syslog.log(Syslog::LOG_WARNING, &quot;Hello, World!&quot;)
257
+ Syslog.mask = Syslog::LOG_UPTO(Syslog::LOG_EMERG)
258
+ Syslog.info(&quot;masked&quot;)
259
+ Syslog.close
260
+ }
261
+ end.join&lt;/pre&gt;&lt;/li&gt;
262
+ &lt;/ul&gt;&lt;p&gt;These vulnerabilities were reported by Keita Yamaguchi.&lt;/p&gt;&lt;h3&gt;&lt;a name=&quot;label-2&quot; id=&quot;label-2&quot;&gt;DoS vulnerability in WEBrick&lt;/a&gt;&lt;/h3&gt;&lt;!-- RDLabel: &quot;DoS vulnerability in WEBrick&quot; --&gt;&lt;p&gt;WEBrick::HTTP::DefaultFileHandler is faulty of exponential time taking
263
+ requests due to a backtracking regular expression in
264
+ WEBrick::HTTPUtils.split_header_value.&lt;/p&gt;&lt;p&gt;Exploitable server:&lt;/p&gt;&lt;pre&gt;require 'webrick'
265
+ WEBrick::HTTPServer.new(:Port =&amp;gt; 2000, :DocumentRoot =&amp;gt; &quot;/etc&quot;).start&lt;/pre&gt;&lt;p&gt;Attack:&lt;/p&gt;&lt;pre&gt;require 'net/http'
266
+ res = Net::HTTP.start(&quot;localhost&quot;, 2000) { |http|
267
+ req = Net::HTTP::Get.new(&quot;/passwd&quot;)
268
+ req['If-None-Match'] = %q{meh=&quot;&quot;} + %q{foo=&quot;bar&quot; } * 100
269
+ http.request(req)
270
+ }
271
+ p res&lt;/pre&gt;&lt;p&gt;The request likely won't finish in this universe.&lt;/p&gt;&lt;p&gt;This vulnerability was reported by Christian Neukirchen.&lt;/p&gt;&lt;h3&gt;&lt;a name=&quot;label-3&quot; id=&quot;label-3&quot;&gt;Lack of taintness check in dl&lt;/a&gt;&lt;/h3&gt;&lt;!-- RDLabel: &quot;Lack of taintness check in dl&quot; --&gt;&lt;p&gt;dl doesn't check taintness, so it could allow attackers to call
272
+ dangerous functions.&lt;/p&gt;&lt;pre&gt;require 'dl'
273
+ $SAFE = 1
274
+ h = DL.dlopen(nil)
275
+ sys = h.sym('system', 'IP')
276
+ uname = 'uname -rs'.taint
277
+ sys[uname]&lt;/pre&gt;&lt;p&gt;This vulnerability was reported by sheepman.&lt;/p&gt;&lt;h3&gt;&lt;a name=&quot;label-4&quot; id=&quot;label-4&quot;&gt;DNS spoofing vulnerability in resolv.rb&lt;/a&gt;&lt;/h3&gt;&lt;!-- RDLabel: &quot;DNS spoofing vulnerability in resolv.rb&quot; --&gt;&lt;p&gt;resolv.rb allow remote attackers to spoof DNS answers. This risk can be
278
+ reduced by randomness of DNS transaction IDs and source ports, so resolv.rb
279
+ is fixed to randomize them.&lt;/p&gt;&lt;ul&gt;
280
+ &lt;li&gt;see also: &lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447&quot;&gt;CVE-2008-1447&lt;/a&gt;&lt;/li&gt;
281
+ &lt;/ul&gt;&lt;p&gt;This vulnerability was reported by Tanaka Akira.&lt;/p&gt;&lt;h2&gt;&lt;a name=&quot;label-5&quot; id=&quot;label-5&quot;&gt;Vulnerable versions&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Vulnerable versions&quot; --&gt;&lt;dl&gt;
282
+ &lt;dt&gt;&lt;a name=&quot;label-6&quot; id=&quot;label-6&quot;&gt;1.8 series&lt;/a&gt;&lt;/dt&gt;&lt;!-- RDLabel: &quot;1.8 series&quot; --&gt;
283
+ &lt;dd&gt;
284
+ &lt;ul&gt;
285
+ &lt;li&gt;1.8.5 and all prior versions&lt;/li&gt;
286
+ &lt;li&gt;1.8.6-p286 and all prior versions&lt;/li&gt;
287
+ &lt;li&gt;1.8.7-p71 and all prior versions&lt;/li&gt;
288
+ &lt;/ul&gt;
289
+ &lt;/dd&gt;
290
+ &lt;dt&gt;&lt;a name=&quot;label-7&quot; id=&quot;label-7&quot;&gt;1.9 series&lt;/a&gt;&lt;/dt&gt;&lt;!-- RDLabel: &quot;1.9 series&quot; --&gt;
291
+ &lt;dd&gt;
292
+ &lt;ul&gt;
293
+ &lt;li&gt;r18423 and all prior revisions&lt;/li&gt;
294
+ &lt;/ul&gt;
295
+ &lt;/dd&gt;
296
+ &lt;/dl&gt;&lt;h2&gt;&lt;a name=&quot;label-8&quot; id=&quot;label-8&quot;&gt;Solution&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Solution&quot; --&gt;&lt;dl&gt;
297
+ &lt;dt&gt;&lt;a name=&quot;label-9&quot; id=&quot;label-9&quot;&gt;1.8 series&lt;/a&gt;&lt;/dt&gt;&lt;!-- RDLabel: &quot;1.8 series&quot; --&gt;
298
+ &lt;dd&gt;
299
+ Please upgrade to 1.8.6-p287, or 1.8.7-p72.
300
+ &lt;ul&gt;
301
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p287.tar.gz&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p287.tar.gz&amp;gt;&lt;/a&gt;&lt;/li&gt;
302
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p72.tar.gz&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p72.tar.gz&amp;gt;&lt;/a&gt;&lt;/li&gt;
303
+ &lt;/ul&gt;
304
+ &lt;/dd&gt;
305
+ &lt;dt&gt;&lt;a name=&quot;label-10&quot; id=&quot;label-10&quot;&gt;1.9 series&lt;/a&gt;&lt;/dt&gt;&lt;!-- RDLabel: &quot;1.9 series&quot; --&gt;
306
+ &lt;dd&gt;
307
+ &lt;p&gt;Please check out the latest version using Subversion.&lt;/p&gt;
308
+ &lt;pre&gt;$ svn co http://svn.ruby-lang.org/repos/ruby/trunk ruby&lt;/pre&gt;
309
+ &lt;/dd&gt;
310
+ &lt;/dl&gt;&lt;p&gt;Please note that a package that corrects this weakness may already be
311
+ available through your package management software.&lt;/p&gt;&lt;h2&gt;&lt;a name=&quot;label-11&quot; id=&quot;label-11&quot;&gt;Credit&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Credit&quot; --&gt;&lt;p&gt;Credit to Keita Yamaguchi, Christian Neukirchen, sheepman, and Tanaka
312
+ Akira for disclosing these problems to Ruby Security Team.&lt;/p&gt;&lt;h2&gt;&lt;a name=&quot;label-12&quot; id=&quot;label-12&quot;&gt;Changes&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Changes&quot; --&gt;&lt;ul&gt;
313
+ &lt;li&gt;2008-08-08 12:21 +09:00 fixed the revision number of ruby 1.9.&lt;/li&gt;
314
+ &lt;li&gt;2008-08-11 11:23 +09:00 fixed the patchlevel of ruby 1.8. see &lt;a href=&quot;http://www.ruby-lang.org/en/news/2008/08/11/ruby-1-8-7-p72-and-1-8-6-p287-released/&quot;&gt;the release announcement of Ruby 1.8.7-p72 and 1.8.6-p287&lt;/a&gt;&lt;/li&gt;
315
+ &lt;/ul&gt;</description>
316
+ <pubDate>Fri, 08 Aug 2008 02:59:49 GMT</pubDate>
317
+ <guid>http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/</guid>
318
+ <link>http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/</link>
319
+ </item>
320
+
321
+ <item>
322
+ <title>RubyConf 2008 Proposals Now Being Accepted</title>
323
+ <description>&lt;p&gt;&lt;a href=&quot;http://www.rubyconf.org&quot;&gt;RubyConf 2008&lt;/a&gt; will be held in Orlando, Florida, &lt;span class=&quot;caps&quot;&gt;USA&lt;/span&gt;, from November 6 to November 8.&lt;/p&gt;
324
+
325
+
326
+ &lt;p&gt;&lt;a href=&quot;http://www.rubyconf.org/proposals/new&quot;&gt;Proposals for presentations&lt;/a&gt; are now begin accepted. All proposals must be received by August 21.&lt;/p&gt; </description>
327
+ <pubDate>Mon, 04 Aug 2008 20:26:29 GMT</pubDate>
328
+ <guid>http://www.ruby-lang.org/en/news/2008/08/04/rubyconf-2008-proposals-now-being-accepted/</guid>
329
+ <link>http://www.ruby-lang.org/en/news/2008/08/04/rubyconf-2008-proposals-now-being-accepted/</link>
330
+ </item>
331
+
332
+ <item>
333
+ <title>Arbitrary code execution vulnerabilities</title>
334
+ <description>&lt;p&gt;Multiple vulnerabilities in Ruby may lead to a denial of service (DoS)
335
+ condition or allow execution of arbitrary code.&lt;/p&gt; &lt;h2&gt;&lt;a name=&quot;label-0&quot; id=&quot;label-0&quot;&gt;Impact&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Impact&quot; --&gt;&lt;p&gt;With the following vulnerabilities, an attacker can lead to denial of
336
+ service condition or execute arbitrary code.&lt;/p&gt;&lt;ul&gt;
337
+ &lt;li&gt;&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662&quot;&gt;CVE-2008-2662&lt;/a&gt;&lt;/li&gt;
338
+ &lt;li&gt;&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663&quot;&gt;CVE-2008-2663&lt;/a&gt;&lt;/li&gt;
339
+ &lt;li&gt;&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725&quot;&gt;CVE-2008-2725&lt;/a&gt;&lt;/li&gt;
340
+ &lt;li&gt;&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726&quot;&gt;CVE-2008-2726&lt;/a&gt;&lt;/li&gt;
341
+ &lt;li&gt;&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664&quot;&gt;CVE-2008-2664&lt;/a&gt;&lt;/li&gt;
342
+ &lt;/ul&gt;&lt;h2&gt;&lt;a name=&quot;label-1&quot; id=&quot;label-1&quot;&gt;Vulnerable versions&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Vulnerable versions&quot; --&gt;&lt;dl&gt;
343
+ &lt;dt&gt;&lt;a name=&quot;label-2&quot; id=&quot;label-2&quot;&gt;1.8 series&lt;/a&gt;&lt;/dt&gt;&lt;!-- RDLabel: &quot;1.8 series&quot; --&gt;
344
+ &lt;dd&gt;
345
+ &lt;ul&gt;
346
+ &lt;li&gt;1.8.4 and all prior versions&lt;/li&gt;
347
+ &lt;li&gt;1.8.5-p230 and all prior versions&lt;/li&gt;
348
+ &lt;li&gt;1.8.6-p229 and all prior versions&lt;/li&gt;
349
+ &lt;li&gt;1.8.7-p21 and all prior versions&lt;/li&gt;
350
+ &lt;/ul&gt;
351
+ &lt;/dd&gt;
352
+ &lt;dt&gt;&lt;a name=&quot;label-3&quot; id=&quot;label-3&quot;&gt;1.9 series&lt;/a&gt;&lt;/dt&gt;&lt;!-- RDLabel: &quot;1.9 series&quot; --&gt;
353
+ &lt;dd&gt;
354
+ &lt;ul&gt;
355
+ &lt;li&gt;1.9.0-1 and all prior versions&lt;/li&gt;
356
+ &lt;/ul&gt;
357
+ &lt;/dd&gt;
358
+ &lt;/dl&gt;&lt;h2&gt;&lt;a name=&quot;label-4&quot; id=&quot;label-4&quot;&gt;Solution&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Solution&quot; --&gt;&lt;dl&gt;
359
+ &lt;dt&gt;&lt;a name=&quot;label-5&quot; id=&quot;label-5&quot;&gt;1.8 series&lt;/a&gt;&lt;/dt&gt;&lt;!-- RDLabel: &quot;1.8 series&quot; --&gt;
360
+ &lt;dd&gt;
361
+ Please upgrade to 1.8.5-p231, or 1.8.6-p230, or 1.8.7-p22.
362
+ &lt;ul&gt;
363
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-p231.tar.gz&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-p231.tar.gz&amp;gt;&lt;/a&gt;
364
+ (md5sum: e900cf225d55414bffe878f00a85807c)&lt;/li&gt;
365
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p230.tar.gz&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p230.tar.gz&amp;gt;&lt;/a&gt;
366
+ (md5sum: 5e8247e39be2dc3c1a755579c340857f)&lt;/li&gt;
367
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p22.tar.gz&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p22.tar.gz&amp;gt;&lt;/a&gt;
368
+ (md5sum: fc3ede83a98f48d8cb6de2145f680ef2)&lt;/li&gt;
369
+ &lt;/ul&gt;
370
+ &lt;/dd&gt;
371
+ &lt;dt&gt;&lt;a name=&quot;label-6&quot; id=&quot;label-6&quot;&gt;1.9 series&lt;/a&gt;&lt;/dt&gt;&lt;!-- RDLabel: &quot;1.9 series&quot; --&gt;
372
+ &lt;dd&gt;
373
+ Please upgrade to 1.9.0-2.
374
+ &lt;ul&gt;
375
+ &lt;li&gt;&lt;a href=&quot;ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.0-2.tar.gz&quot;&gt;&amp;lt;URL:ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.0-2.tar.gz&amp;gt;&lt;/a&gt;
376
+ (md5sum: 2a848b81ed1d6393b88eec8aa6173b75)&lt;/li&gt;
377
+ &lt;/ul&gt;
378
+ &lt;/dd&gt;
379
+ &lt;/dl&gt;&lt;p&gt;These versions also fix the vulnerability of WEBrick (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1891&quot;&gt;CVE-2008-1891&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;Please note that a package that corrects this weakness may already be
380
+ available through your package management software.&lt;/p&gt;&lt;h2&gt;&lt;a name=&quot;label-7&quot; id=&quot;label-7&quot;&gt;Credit&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Credit&quot; --&gt;&lt;p&gt;Credit to Drew Yao of Apple Product Security for disclosing the problem to Ruby
381
+ Security Team.&lt;/p&gt;&lt;h2&gt;&lt;a name=&quot;label-8&quot; id=&quot;label-8&quot;&gt;Changes&lt;/a&gt;&lt;/h2&gt;&lt;!-- RDLabel: &quot;Changes&quot; --&gt;&lt;ul&gt;
382
+ &lt;li&gt;2008-06-21 00:29 +09:00 removed wrong CVE IDs (CVE-2008-2727, CVE-2008-2728).&lt;/li&gt;
383
+ &lt;/ul&gt;</description>
384
+ <pubDate>Fri, 20 Jun 2008 12:54:43 GMT</pubDate>
385
+ <guid>http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</guid>
386
+ <link>http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/</link>
387
+ </item>
388
+
389
+
390
+ </channel>
391
+ </rss>
@@ -0,0 +1,31 @@
1
+ $: << File.dirname(__FILE__)
2
+ require File.join(File.dirname(__FILE__), '..', 'lib', 'solr')
3
+ require 'test/unit'
4
+
5
+ #begin
6
+ # require 'rubygems'
7
+ # require 'redgreen'
8
+ #rescue LoadError
9
+ #end
10
+
11
+ def mock_query_response
12
+ {'responseHeader'=>{
13
+ 'status'=>0,'QTime'=>43,'params'=>{
14
+ 'q'=>'*:*','wt'=>'ruby','echoParams'=>'EXPLICIT'
15
+ }
16
+ },
17
+ 'response'=>{
18
+ 'numFound'=>26,'start'=>0,'docs'=>[
19
+ {'id'=>'SP2514N','inStock'=>true,'manu'=>'Samsung Electronics Co. Ltd.','name'=>'Samsung SpinPoint P120 SP2514N - hard drive - 250 GB - ATA-133','popularity'=>6,'price'=>92.0,'sku'=>'SP2514N','timestamp'=>'2008-11-21T17:21:55.601Z','cat'=>['electronics','hard drive'],'spell'=>['Samsung SpinPoint P120 SP2514N - hard drive - 250 GB - ATA-133'],'features'=>['7200RPM, 8MB cache, IDE Ultra ATA-133','NoiseGuard, SilentSeek technology, Fluid Dynamic Bearing (FDB) motor']},
20
+ {'id'=>'6H500F0','inStock'=>true,'manu'=>'Maxtor Corp.','name'=>'Maxtor DiamondMax 11 - hard drive - 500 GB - SATA-300','popularity'=>6,'price'=>350.0,'sku'=>'6H500F0','timestamp'=>'2008-11-21T17:21:55.617Z','cat'=>['electronics','hard drive'],'spell'=>['Maxtor DiamondMax 11 - hard drive - 500 GB - SATA-300'],'features'=>['SATA 3.0Gb/s, NCQ','8.5ms seek','16MB cache']},
21
+ {'id'=>'F8V7067-APL-KIT','inStock'=>false,'manu'=>'Belkin','name'=>'Belkin Mobile Power Cord for iPod w/ Dock','popularity'=>1,'price'=>19.95,'sku'=>'F8V7067-APL-KIT','timestamp'=>'2008-11-21T17:21:55.652Z','weight'=>4.0,'cat'=>['electronics','connector'],'spell'=>['Belkin Mobile Power Cord for iPod w/ Dock'],'features'=>['car power adapter, white']},
22
+ {'id'=>'IW-02','inStock'=>false,'manu'=>'Belkin','name'=>'iPod & iPod Mini USB 2.0 Cable','popularity'=>1,'price'=>11.5,'sku'=>'IW-02','timestamp'=>'2008-11-21T17:21:55.657Z','weight'=>2.0,'cat'=>['electronics','connector'],'spell'=>['iPod & iPod Mini USB 2.0 Cable'],'features'=>['car power adapter for iPod, white']},
23
+ {'id'=>'MA147LL/A','inStock'=>true,'includes'=>'earbud headphones, USB cable','manu'=>'Apple Computer Inc.','name'=>'Apple 60 GB iPod with Video Playback Black','popularity'=>10,'price'=>399.0,'sku'=>'MA147LL/A','timestamp'=>'2008-11-21T17:21:55.681Z','weight'=>5.5,'cat'=>['electronics','music'],'spell'=>['Apple 60 GB iPod with Video Playback Black'],'features'=>['iTunes, Podcasts, Audiobooks','Stores up to 15,000 songs, 25,000 photos, or 150 hours of video','2.5-inch, 320x240 color TFT LCD display with LED backlight','Up to 20 hours of battery life','Plays AAC, MP3, WAV, AIFF, Audible, Apple Lossless, H.264 video','Notes, Calendar, Phone book, Hold button, Date display, Photo wallet, Built-in games, JPEG photo playback, Upgradeable firmware, USB 2.0 compatibility, Playback speed control, Rechargeable capability, Battery level indication']},
24
+ {'id'=>'TWINX2048-3200PRO','inStock'=>true,'manu'=>'Corsair Microsystems Inc.','name'=>'CORSAIR XMS 2GB (2 x 1GB) 184-Pin DDR SDRAM Unbuffered DDR 400 (PC 3200) Dual Channel Kit System Memory - Retail','popularity'=>5,'price'=>185.0,'sku'=>'TWINX2048-3200PRO','timestamp'=>'2008-11-21T17:21:55.706Z','cat'=>['electronics','memory'],'spell'=>['CORSAIR XMS 2GB (2 x 1GB) 184-Pin DDR SDRAM Unbuffered DDR 400 (PC 3200) Dual Channel Kit System Memory - Retail'],'features'=>['CAS latency 2, 2-3-3-6 timing, 2.75v, unbuffered, heat-spreader']},
25
+ {'id'=>'VS1GB400C3','inStock'=>true,'manu'=>'Corsair Microsystems Inc.','name'=>'CORSAIR ValueSelect 1GB 184-Pin DDR SDRAM Unbuffered DDR 400 (PC 3200) System Memory - Retail','popularity'=>7,'price'=>74.99,'sku'=>'VS1GB400C3','timestamp'=>'2008-11-21T17:21:55.71Z','cat'=>['electronics','memory'],'spell'=>['CORSAIR ValueSelect 1GB 184-Pin DDR SDRAM Unbuffered DDR 400 (PC 3200) System Memory - Retail']},
26
+ {'id'=>'VDBDB1A16','inStock'=>true,'manu'=>'A-DATA Technology Inc.','name'=>'A-DATA V-Series 1GB 184-Pin DDR SDRAM Unbuffered DDR 400 (PC 3200) System Memory - OEM','popularity'=>5,'sku'=>'VDBDB1A16','timestamp'=>'2008-11-21T17:21:55.712Z','cat'=>['electronics','memory'],'spell'=>['A-DATA V-Series 1GB 184-Pin DDR SDRAM Unbuffered DDR 400 (PC 3200) System Memory - OEM'],'features'=>['CAS latency 3, 2.7v']},
27
+ {'id'=>'3007WFP','inStock'=>true,'includes'=>'USB cable','manu'=>'Dell, Inc.','name'=>'Dell Widescreen UltraSharp 3007WFP','popularity'=>6,'price'=>2199.0,'sku'=>'3007WFP','timestamp'=>'2008-11-21T17:21:55.724Z','weight'=>401.6,'cat'=>['electronics','monitor'],'spell'=>['Dell Widescreen UltraSharp 3007WFP'],'features'=>['30" TFT active matrix LCD, 2560 x 1600, .25mm dot pitch, 700:1 contrast']},
28
+ {'id'=>'VA902B','inStock'=>true,'manu'=>'ViewSonic Corp.','name'=>'ViewSonic VA902B - flat panel display - TFT - 19"','popularity'=>6,'price'=>279.95,'sku'=>'VA902B','timestamp'=>'2008-11-21T17:21:55.734Z','weight'=>190.4,'cat'=>['electronics','monitor'],'spell'=>['ViewSonic VA902B - flat panel display - TFT - 19"'],'features'=>['19" TFT active matrix LCD, 8ms response time, 1280 x 1024 native resolution']}]
29
+ }
30
+ }
31
+ end