open_uri_redirections 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +18 -0
- data/Gemfile +4 -0
- data/LICENSE.txt +22 -0
- data/README.md +63 -0
- data/Rakefile +1 -0
- data/lib/open-uri/redirections_patch.rb +50 -0
- data/lib/open_uri_redirections.rb +4 -0
- data/lib/open_uri_redirections/version.rb +3 -0
- data/open_uri_redirections.gemspec +21 -0
- data/spec/redirections_spec.rb +55 -0
- data/spec/samples/http_safe.response +9 -0
- data/spec/samples/http_unsafe.response +15 -0
- data/spec/samples/https_safe.response +15 -0
- data/spec/samples/https_unsafe.response +9 -0
- data/spec/spec_helper.rb +19 -0
- metadata +117 -0
data/.gitignore
ADDED
data/Gemfile
ADDED
data/LICENSE.txt
ADDED
@@ -0,0 +1,22 @@
|
|
1
|
+
Copyright (c) 2012 Jaime Iniesta
|
2
|
+
|
3
|
+
MIT License
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
6
|
+
a copy of this software and associated documentation files (the
|
7
|
+
"Software"), to deal in the Software without restriction, including
|
8
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
9
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
10
|
+
permit persons to whom the Software is furnished to do so, subject to
|
11
|
+
the following conditions:
|
12
|
+
|
13
|
+
The above copyright notice and this permission notice shall be
|
14
|
+
included in all copies or substantial portions of the Software.
|
15
|
+
|
16
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
17
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
18
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
19
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
20
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
21
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
22
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,63 @@
|
|
1
|
+
# OpenUriRedirections
|
2
|
+
|
3
|
+
This gem applies a patch to OpenURI to optionally allow redirections from HTTP to HTTPS, or from HTTPS to HTTP.
|
4
|
+
|
5
|
+
Here is the problem it tries to solve:
|
6
|
+
|
7
|
+
$ irb
|
8
|
+
1.9.2p320 :001 > require 'open-uri'
|
9
|
+
=> true
|
10
|
+
1.9.2p320 :002 > open('http://github.com')
|
11
|
+
RuntimeError: redirection forbidden: http://github.com -> https://github.com/
|
12
|
+
|
13
|
+
And here is how you can use this patch to follow the redirections:
|
14
|
+
|
15
|
+
$ irb
|
16
|
+
1.9.2p320 :001 > require 'open-uri'
|
17
|
+
=> true
|
18
|
+
> require 'open_uri_redirections'
|
19
|
+
=> true
|
20
|
+
1.9.2p320 :002 > open('http://github.com', :allow_safe_redirections => true)
|
21
|
+
=> #<File:/var/folders/...>
|
22
|
+
|
23
|
+
The patch contained in this gem adds two options to `OpenURI#open`:
|
24
|
+
|
25
|
+
* `:allow_safe_redirections` When set to true, it will allow HTTP => HTTPS redirections.
|
26
|
+
* `:allow_unsafe_redirections` When set to true, it will allow HTTPS => HTTP redirections.
|
27
|
+
|
28
|
+
## Understand what you're doing
|
29
|
+
|
30
|
+
Before using this gem, read this:
|
31
|
+
|
32
|
+
### Original gist URL:
|
33
|
+
[https://gist.github.com/1271420](https://gist.github.com/1271420)
|
34
|
+
|
35
|
+
### Relevant issue:
|
36
|
+
[http://redmine.ruby-lang.org/issues/3719](http://redmine.ruby-lang.org/issues/3719)
|
37
|
+
|
38
|
+
### Source here:
|
39
|
+
[https://github.com/ruby/ruby/blob/trunk/lib/open-uri.rb](https://github.com/ruby/ruby/blob/trunk/lib/open-uri.rb)
|
40
|
+
|
41
|
+
Use it at your own risk!
|
42
|
+
|
43
|
+
## Installation
|
44
|
+
|
45
|
+
Add this line to your application's Gemfile:
|
46
|
+
|
47
|
+
gem 'open_uri_redirections'
|
48
|
+
|
49
|
+
And then execute:
|
50
|
+
|
51
|
+
$ bundle
|
52
|
+
|
53
|
+
Or install it yourself as:
|
54
|
+
|
55
|
+
$ gem install open_uri_redirections
|
56
|
+
|
57
|
+
## Contributing
|
58
|
+
|
59
|
+
1. Fork it
|
60
|
+
2. Create your feature branch (`git checkout -b my-new-feature`)
|
61
|
+
3. Commit your changes (`git commit -am 'Add some feature'`)
|
62
|
+
4. Push to the branch (`git push origin my-new-feature`)
|
63
|
+
5. Create new Pull Request
|
data/Rakefile
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
require "bundler/gem_tasks"
|
@@ -0,0 +1,50 @@
|
|
1
|
+
# Patch to allow open-uri to follow safe (http to https) and unsafe redirections (https to http).
|
2
|
+
# Original gist URL:
|
3
|
+
# https://gist.github.com/1271420
|
4
|
+
#
|
5
|
+
# Relevant issue:
|
6
|
+
# http://redmine.ruby-lang.org/issues/3719
|
7
|
+
#
|
8
|
+
# Source here:
|
9
|
+
# https://github.com/ruby/ruby/blob/trunk/lib/open-uri.rb
|
10
|
+
|
11
|
+
module OpenURI
|
12
|
+
class <<self
|
13
|
+
alias_method :open_uri_original, :open_uri
|
14
|
+
alias_method :redirectable_cautious?, :redirectable?
|
15
|
+
|
16
|
+
def redirectable_safe?(uri1, uri2)
|
17
|
+
uri1.scheme.downcase == uri2.scheme.downcase || (uri1.scheme.downcase == "http" && uri2.scheme.downcase == "https")
|
18
|
+
end
|
19
|
+
|
20
|
+
def redirectable_unsafe?(uri1, uri2)
|
21
|
+
!redirectable_safe?(uri1, uri2)
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
# The original open_uri takes *args but then doesn't do anything with them.
|
26
|
+
# Assume we can only handle a hash.
|
27
|
+
def self.open_uri(name, options = {})
|
28
|
+
redirectable_unsafe = options.delete :allow_unsafe_redirections
|
29
|
+
redirectable_safe = options.delete :allow_safe_redirections
|
30
|
+
|
31
|
+
if redirectable_unsafe
|
32
|
+
class <<self
|
33
|
+
remove_method :redirectable?
|
34
|
+
alias_method :redirectable?, :redirectable_unsafe?
|
35
|
+
end
|
36
|
+
elsif redirectable_safe
|
37
|
+
class <<self
|
38
|
+
remove_method :redirectable?
|
39
|
+
alias_method :redirectable?, :redirectable_safe?
|
40
|
+
end
|
41
|
+
else
|
42
|
+
class <<self
|
43
|
+
remove_method :redirectable?
|
44
|
+
alias_method :redirectable?, :redirectable_cautious?
|
45
|
+
end
|
46
|
+
end
|
47
|
+
|
48
|
+
self.open_uri_original name, options
|
49
|
+
end
|
50
|
+
end
|
@@ -0,0 +1,21 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
lib = File.expand_path('../lib', __FILE__)
|
3
|
+
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
4
|
+
require 'open_uri_redirections/version'
|
5
|
+
|
6
|
+
Gem::Specification.new do |gem|
|
7
|
+
gem.name = "open_uri_redirections"
|
8
|
+
gem.version = OpenUriRedirections::VERSION
|
9
|
+
gem.authors = ["Jaime Iniesta", "Gabriel Cebrián"]
|
10
|
+
gem.email = ["jaimeiniesta@gmail.com"]
|
11
|
+
gem.description = %q{OpenURI patch to allow redirections between HTTP and HTTPS}
|
12
|
+
gem.summary = %q{OpenURI patch to allow redirections between HTTP and HTTPS}
|
13
|
+
gem.homepage = "https://github.com/jaimeiniesta/open_uri_redirections"
|
14
|
+
|
15
|
+
gem.files = `git ls-files`.split($/)
|
16
|
+
gem.test_files = gem.files.grep(%r{^(spec)/})
|
17
|
+
gem.require_paths = ["lib"]
|
18
|
+
|
19
|
+
gem.add_development_dependency 'rspec', '2.12.0'
|
20
|
+
gem.add_development_dependency 'fakeweb', '1.3.0'
|
21
|
+
end
|
@@ -0,0 +1,55 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
|
3
|
+
require File.join(File.dirname(__FILE__), "/spec_helper")
|
4
|
+
|
5
|
+
describe "OpenURI" do
|
6
|
+
describe "#open" do
|
7
|
+
describe ":allow_safe_redirections" do
|
8
|
+
it "should allow HTTP => HTTPS redirections when true" do
|
9
|
+
expect {
|
10
|
+
open("http://safe.com", :allow_safe_redirections => true)
|
11
|
+
}.to_not raise_error
|
12
|
+
end
|
13
|
+
|
14
|
+
it "should disallow HTTP => HTTPS redirections when false" do
|
15
|
+
expect {
|
16
|
+
open("http://safe.com", :allow_safe_redirections => false)
|
17
|
+
}.to raise_error(RuntimeError, "redirection forbidden: http://safe.com -> https://safe.com/")
|
18
|
+
end
|
19
|
+
|
20
|
+
it "should disallow HTTP => HTTPS redirections by default" do
|
21
|
+
expect {
|
22
|
+
open("http://safe.com")
|
23
|
+
}.to raise_error(RuntimeError, "redirection forbidden: http://safe.com -> https://safe.com/")
|
24
|
+
end
|
25
|
+
|
26
|
+
it "should follow safe redirection when true" do
|
27
|
+
open("http://safe.com", :allow_safe_redirections => true).read.should == "Hello, this is Safe."
|
28
|
+
end
|
29
|
+
end
|
30
|
+
|
31
|
+
describe ":allow_unsafe_redirections" do
|
32
|
+
it "should allow HTTPS => HTTP redirections when true" do
|
33
|
+
expect {
|
34
|
+
open("https://unsafe.com", :allow_unsafe_redirections => true)
|
35
|
+
}.to_not raise_error
|
36
|
+
end
|
37
|
+
|
38
|
+
it "should disallow HTTPS => HTTP redirections when false" do
|
39
|
+
expect {
|
40
|
+
open("https://unsafe.com", :allow_unsafe_redirections => false)
|
41
|
+
}.to raise_error(RuntimeError, "redirection forbidden: https://unsafe.com -> http://unsafe.com/")
|
42
|
+
end
|
43
|
+
|
44
|
+
it "should disallow HTTPS => HTTP redirections by default" do
|
45
|
+
expect {
|
46
|
+
open("https://unsafe.com")
|
47
|
+
}.to raise_error(RuntimeError, "redirection forbidden: https://unsafe.com -> http://unsafe.com/")
|
48
|
+
end
|
49
|
+
|
50
|
+
it "should follow unsafe redirection when true" do
|
51
|
+
open("https://unsafe.com", :allow_unsafe_redirections => true).read.should == "Hello, this is Unsafe."
|
52
|
+
end
|
53
|
+
end
|
54
|
+
end
|
55
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
HTTP/1.1 200 OK
|
2
|
+
Server: nginx
|
3
|
+
Date: Mon, 03 Dec 2012 11:37:51 GMT
|
4
|
+
Content-Type: text/html; charset=utf-8
|
5
|
+
Connection: keep-alive
|
6
|
+
Status: 200 OK
|
7
|
+
X-Runtime: 10
|
8
|
+
ETag: "a9e1dd587bb233eb670ec06f7d553dbc"
|
9
|
+
X-Frame-Options: deny
|
10
|
+
Set-Cookie: _gh_sess=BAh7BzoPc2Vzc2lvbl9pZCIlZTc4ZDNlOGEwM2NlZDQ3Y2VhMDdlMTQyOTA4NWVmYzA6EF9jc3JmX3Rva2VuIjE0U2xsYUoybFFNSWxhWEtudHNvalJCVjZtVnJZcFVlRVk4WlpMbEZKWktRPQ%3D%3D--8ea4a235fd3c5e727d462e24b992fabd8f50050d; path=/; expires=Sat, 01-Jan-2022 00:00:00 GMT; secure; HttpOnly
|
11
|
+
Content-Length: 21814
|
12
|
+
Cache-Control: private, max-age=0, must-revalidate
|
13
|
+
Strict-Transport-Security: max-age=2592000
|
14
|
+
|
15
|
+
Hello, this is Unsafe.
|
@@ -0,0 +1,15 @@
|
|
1
|
+
HTTP/1.1 200 OK
|
2
|
+
Server: nginx
|
3
|
+
Date: Mon, 03 Dec 2012 11:37:51 GMT
|
4
|
+
Content-Type: text/html; charset=utf-8
|
5
|
+
Connection: keep-alive
|
6
|
+
Status: 200 OK
|
7
|
+
X-Runtime: 10
|
8
|
+
ETag: "a9e1dd587bb233eb670ec06f7d553dbc"
|
9
|
+
X-Frame-Options: deny
|
10
|
+
Set-Cookie: _gh_sess=BAh7BzoPc2Vzc2lvbl9pZCIlZTc4ZDNlOGEwM2NlZDQ3Y2VhMDdlMTQyOTA4NWVmYzA6EF9jc3JmX3Rva2VuIjE0U2xsYUoybFFNSWxhWEtudHNvalJCVjZtVnJZcFVlRVk4WlpMbEZKWktRPQ%3D%3D--8ea4a235fd3c5e727d462e24b992fabd8f50050d; path=/; expires=Sat, 01-Jan-2022 00:00:00 GMT; secure; HttpOnly
|
11
|
+
Content-Length: 21814
|
12
|
+
Cache-Control: private, max-age=0, must-revalidate
|
13
|
+
Strict-Transport-Security: max-age=2592000
|
14
|
+
|
15
|
+
Hello, this is Safe.
|
data/spec/spec_helper.rb
ADDED
@@ -0,0 +1,19 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
|
3
|
+
$: << File.join(File.dirname(__FILE__), "/../lib")
|
4
|
+
require 'open_uri_redirections'
|
5
|
+
require 'fakeweb'
|
6
|
+
|
7
|
+
FakeWeb.allow_net_connect = false
|
8
|
+
|
9
|
+
$samples_dir = File.dirname(__FILE__) + '/samples'
|
10
|
+
|
11
|
+
#######################
|
12
|
+
# Faked web responses #
|
13
|
+
#######################
|
14
|
+
|
15
|
+
FakeWeb.register_uri(:get, "http://safe.com/", :response => open("#{$samples_dir}/http_safe.response").read)
|
16
|
+
FakeWeb.register_uri(:get, "https://safe.com/", :response => open("#{$samples_dir}/https_safe.response").read)
|
17
|
+
|
18
|
+
FakeWeb.register_uri(:get, "https://unsafe.com/", :response => open("#{$samples_dir}/https_unsafe.response").read)
|
19
|
+
FakeWeb.register_uri(:get, "http://unsafe.com/", :response => open("#{$samples_dir}/http_unsafe.response").read)
|
metadata
ADDED
@@ -0,0 +1,117 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: open_uri_redirections
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
hash: 29
|
5
|
+
prerelease:
|
6
|
+
segments:
|
7
|
+
- 0
|
8
|
+
- 0
|
9
|
+
- 1
|
10
|
+
version: 0.0.1
|
11
|
+
platform: ruby
|
12
|
+
authors:
|
13
|
+
- Jaime Iniesta
|
14
|
+
- "Gabriel Cebri\xC3\xA1n"
|
15
|
+
autorequire:
|
16
|
+
bindir: bin
|
17
|
+
cert_chain: []
|
18
|
+
|
19
|
+
date: 2012-12-03 00:00:00 Z
|
20
|
+
dependencies:
|
21
|
+
- !ruby/object:Gem::Dependency
|
22
|
+
name: rspec
|
23
|
+
prerelease: false
|
24
|
+
requirement: &id001 !ruby/object:Gem::Requirement
|
25
|
+
none: false
|
26
|
+
requirements:
|
27
|
+
- - "="
|
28
|
+
- !ruby/object:Gem::Version
|
29
|
+
hash: 63
|
30
|
+
segments:
|
31
|
+
- 2
|
32
|
+
- 12
|
33
|
+
- 0
|
34
|
+
version: 2.12.0
|
35
|
+
type: :development
|
36
|
+
version_requirements: *id001
|
37
|
+
- !ruby/object:Gem::Dependency
|
38
|
+
name: fakeweb
|
39
|
+
prerelease: false
|
40
|
+
requirement: &id002 !ruby/object:Gem::Requirement
|
41
|
+
none: false
|
42
|
+
requirements:
|
43
|
+
- - "="
|
44
|
+
- !ruby/object:Gem::Version
|
45
|
+
hash: 27
|
46
|
+
segments:
|
47
|
+
- 1
|
48
|
+
- 3
|
49
|
+
- 0
|
50
|
+
version: 1.3.0
|
51
|
+
type: :development
|
52
|
+
version_requirements: *id002
|
53
|
+
description: OpenURI patch to allow redirections between HTTP and HTTPS
|
54
|
+
email:
|
55
|
+
- jaimeiniesta@gmail.com
|
56
|
+
executables: []
|
57
|
+
|
58
|
+
extensions: []
|
59
|
+
|
60
|
+
extra_rdoc_files: []
|
61
|
+
|
62
|
+
files:
|
63
|
+
- .gitignore
|
64
|
+
- Gemfile
|
65
|
+
- LICENSE.txt
|
66
|
+
- README.md
|
67
|
+
- Rakefile
|
68
|
+
- lib/open-uri/redirections_patch.rb
|
69
|
+
- lib/open_uri_redirections.rb
|
70
|
+
- lib/open_uri_redirections/version.rb
|
71
|
+
- open_uri_redirections.gemspec
|
72
|
+
- spec/redirections_spec.rb
|
73
|
+
- spec/samples/http_safe.response
|
74
|
+
- spec/samples/http_unsafe.response
|
75
|
+
- spec/samples/https_safe.response
|
76
|
+
- spec/samples/https_unsafe.response
|
77
|
+
- spec/spec_helper.rb
|
78
|
+
homepage: https://github.com/jaimeiniesta/open_uri_redirections
|
79
|
+
licenses: []
|
80
|
+
|
81
|
+
post_install_message:
|
82
|
+
rdoc_options: []
|
83
|
+
|
84
|
+
require_paths:
|
85
|
+
- lib
|
86
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
87
|
+
none: false
|
88
|
+
requirements:
|
89
|
+
- - ">="
|
90
|
+
- !ruby/object:Gem::Version
|
91
|
+
hash: 3
|
92
|
+
segments:
|
93
|
+
- 0
|
94
|
+
version: "0"
|
95
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
96
|
+
none: false
|
97
|
+
requirements:
|
98
|
+
- - ">="
|
99
|
+
- !ruby/object:Gem::Version
|
100
|
+
hash: 3
|
101
|
+
segments:
|
102
|
+
- 0
|
103
|
+
version: "0"
|
104
|
+
requirements: []
|
105
|
+
|
106
|
+
rubyforge_project:
|
107
|
+
rubygems_version: 1.8.24
|
108
|
+
signing_key:
|
109
|
+
specification_version: 3
|
110
|
+
summary: OpenURI patch to allow redirections between HTTP and HTTPS
|
111
|
+
test_files:
|
112
|
+
- spec/redirections_spec.rb
|
113
|
+
- spec/samples/http_safe.response
|
114
|
+
- spec/samples/http_unsafe.response
|
115
|
+
- spec/samples/https_safe.response
|
116
|
+
- spec/samples/https_unsafe.response
|
117
|
+
- spec/spec_helper.rb
|