rack 2.2.18 → 3.2.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +561 -75
- data/CONTRIBUTING.md +63 -55
- data/MIT-LICENSE +1 -1
- data/README.md +384 -0
- data/SPEC.rdoc +243 -277
- data/lib/rack/auth/abstract/handler.rb +3 -1
- data/lib/rack/auth/abstract/request.rb +5 -1
- data/lib/rack/auth/basic.rb +1 -3
- data/lib/rack/bad_request.rb +8 -0
- data/lib/rack/body_proxy.rb +21 -3
- data/lib/rack/builder.rb +108 -69
- data/lib/rack/cascade.rb +2 -3
- data/lib/rack/common_logger.rb +22 -17
- data/lib/rack/conditional_get.rb +20 -16
- data/lib/rack/constants.rb +68 -0
- data/lib/rack/content_length.rb +12 -16
- data/lib/rack/content_type.rb +8 -5
- data/lib/rack/deflater.rb +40 -26
- data/lib/rack/directory.rb +9 -3
- data/lib/rack/etag.rb +17 -23
- data/lib/rack/events.rb +25 -6
- data/lib/rack/files.rb +15 -17
- data/lib/rack/head.rb +8 -8
- data/lib/rack/headers.rb +238 -0
- data/lib/rack/lint.rb +817 -648
- data/lib/rack/lock.rb +2 -5
- data/lib/rack/media_type.rb +6 -7
- data/lib/rack/method_override.rb +5 -1
- data/lib/rack/mime.rb +14 -5
- data/lib/rack/mock.rb +1 -300
- data/lib/rack/mock_request.rb +161 -0
- data/lib/rack/mock_response.rb +147 -0
- data/lib/rack/multipart/generator.rb +7 -5
- data/lib/rack/multipart/parser.rb +291 -95
- data/lib/rack/multipart/uploaded_file.rb +45 -4
- data/lib/rack/multipart.rb +53 -40
- data/lib/rack/null_logger.rb +9 -0
- data/lib/rack/query_parser.rb +118 -121
- data/lib/rack/recursive.rb +2 -0
- data/lib/rack/reloader.rb +0 -2
- data/lib/rack/request.rb +272 -141
- data/lib/rack/response.rb +151 -66
- data/lib/rack/rewindable_input.rb +27 -5
- data/lib/rack/runtime.rb +7 -6
- data/lib/rack/sendfile.rb +68 -33
- data/lib/rack/show_exceptions.rb +25 -6
- data/lib/rack/show_status.rb +17 -9
- data/lib/rack/static.rb +8 -8
- data/lib/rack/tempfile_reaper.rb +15 -4
- data/lib/rack/urlmap.rb +3 -1
- data/lib/rack/utils.rb +228 -238
- data/lib/rack/version.rb +3 -15
- data/lib/rack.rb +13 -90
- metadata +14 -40
- data/README.rdoc +0 -347
- data/Rakefile +0 -130
- data/bin/rackup +0 -5
- data/contrib/rack.png +0 -0
- data/contrib/rack.svg +0 -150
- data/contrib/rack_logo.svg +0 -164
- data/contrib/rdoc.css +0 -412
- data/example/lobster.ru +0 -6
- data/example/protectedlobster.rb +0 -16
- data/example/protectedlobster.ru +0 -10
- data/lib/rack/auth/digest/md5.rb +0 -131
- data/lib/rack/auth/digest/nonce.rb +0 -53
- data/lib/rack/auth/digest/params.rb +0 -54
- data/lib/rack/auth/digest/request.rb +0 -43
- data/lib/rack/chunked.rb +0 -117
- data/lib/rack/core_ext/regexp.rb +0 -14
- data/lib/rack/file.rb +0 -7
- data/lib/rack/handler/cgi.rb +0 -59
- data/lib/rack/handler/fastcgi.rb +0 -100
- data/lib/rack/handler/lsws.rb +0 -61
- data/lib/rack/handler/scgi.rb +0 -71
- data/lib/rack/handler/thin.rb +0 -34
- data/lib/rack/handler/webrick.rb +0 -129
- data/lib/rack/handler.rb +0 -104
- data/lib/rack/lobster.rb +0 -70
- data/lib/rack/logger.rb +0 -20
- data/lib/rack/server.rb +0 -466
- data/lib/rack/session/abstract/id.rb +0 -523
- data/lib/rack/session/cookie.rb +0 -203
- data/lib/rack/session/memcache.rb +0 -10
- data/lib/rack/session/pool.rb +0 -90
- data/rack.gemspec +0 -46
@@ -2,14 +2,55 @@
|
|
2
2
|
|
3
3
|
require 'strscan'
|
4
4
|
|
5
|
+
require_relative '../utils'
|
6
|
+
require_relative '../bad_request'
|
7
|
+
|
5
8
|
module Rack
|
6
9
|
module Multipart
|
7
|
-
class MultipartPartLimitError < Errno::EMFILE
|
8
|
-
|
10
|
+
class MultipartPartLimitError < Errno::EMFILE
|
11
|
+
include BadRequest
|
12
|
+
end
|
9
13
|
|
10
|
-
class
|
11
|
-
|
14
|
+
class MultipartTotalPartLimitError < StandardError
|
15
|
+
include BadRequest
|
16
|
+
end
|
17
|
+
|
18
|
+
# Use specific error class when parsing multipart request
|
19
|
+
# that ends early.
|
20
|
+
class EmptyContentError < ::EOFError
|
21
|
+
include BadRequest
|
22
|
+
end
|
23
|
+
|
24
|
+
# Base class for multipart exceptions that do not subclass from
|
25
|
+
# other exception classes for backwards compatibility.
|
26
|
+
class BoundaryTooLongError < StandardError
|
27
|
+
include BadRequest
|
28
|
+
end
|
12
29
|
|
30
|
+
# Prefer to use the BoundaryTooLongError class or Rack::BadRequest.
|
31
|
+
Error = BoundaryTooLongError
|
32
|
+
|
33
|
+
EOL = "\r\n"
|
34
|
+
FWS = /[ \t]+(?:\r\n[ \t]+)?/ # whitespace with optional folding
|
35
|
+
HEADER_VALUE = "(?:[^\r\n]|\r\n[ \t])*" # anything but a non-folding CRLF
|
36
|
+
MULTIPART = %r|\Amultipart/.*boundary=\"?([^\";,]+)\"?|ni
|
37
|
+
MULTIPART_CONTENT_TYPE = /^Content-Type:#{FWS}?(#{HEADER_VALUE})/ni
|
38
|
+
MULTIPART_CONTENT_DISPOSITION = /^Content-Disposition:#{FWS}?(#{HEADER_VALUE})/ni
|
39
|
+
MULTIPART_CONTENT_ID = /^Content-ID:#{FWS}?(#{HEADER_VALUE})/ni
|
40
|
+
|
41
|
+
# Rack::Multipart::Parser handles parsing of multipart/form-data requests.
|
42
|
+
#
|
43
|
+
# File Parameter Contents
|
44
|
+
#
|
45
|
+
# When processing file uploads, the parser returns a hash containing
|
46
|
+
# information about uploaded files. For +file+ parameters, the hash includes:
|
47
|
+
#
|
48
|
+
# * +:filename+ - The original filename, already URL decoded by the parser
|
49
|
+
# * +:type+ - The content type of the uploaded file
|
50
|
+
# * +:name+ - The parameter name from the form
|
51
|
+
# * +:tempfile+ - A Tempfile object containing the uploaded data
|
52
|
+
# * +:head+ - The raw header content for this part
|
53
|
+
class Parser
|
13
54
|
BUFSIZE = 1_048_576
|
14
55
|
TEXT_PLAIN = "text/plain"
|
15
56
|
TEMPFILE_FACTORY = lambda { |filename, content_type|
|
@@ -18,7 +59,26 @@ module Rack
|
|
18
59
|
Tempfile.new(["RackMultipart", extension])
|
19
60
|
}
|
20
61
|
|
21
|
-
|
62
|
+
BOUNDARY_START_LIMIT = 16 * 1024
|
63
|
+
private_constant :BOUNDARY_START_LIMIT
|
64
|
+
|
65
|
+
MIME_HEADER_BYTESIZE_LIMIT = 64 * 1024
|
66
|
+
private_constant :MIME_HEADER_BYTESIZE_LIMIT
|
67
|
+
|
68
|
+
env_int = lambda do |key, val|
|
69
|
+
if str_val = ENV[key]
|
70
|
+
begin
|
71
|
+
val = Integer(str_val, 10)
|
72
|
+
rescue ArgumentError
|
73
|
+
raise ArgumentError, "non-integer value provided for environment variable #{key}"
|
74
|
+
end
|
75
|
+
end
|
76
|
+
|
77
|
+
val
|
78
|
+
end
|
79
|
+
|
80
|
+
BUFFERED_UPLOAD_BYTESIZE_LIMIT = env_int.call("RACK_MULTIPART_BUFFERED_UPLOAD_BYTESIZE_LIMIT", 16 * 1024 * 1024)
|
81
|
+
private_constant :BUFFERED_UPLOAD_BYTESIZE_LIMIT
|
22
82
|
|
23
83
|
class BoundedIO # :nodoc:
|
24
84
|
def initialize(io, content_length)
|
@@ -41,16 +101,12 @@ module Rack
|
|
41
101
|
if str
|
42
102
|
@cursor += str.bytesize
|
43
103
|
else
|
44
|
-
# Raise an error for mismatching
|
104
|
+
# Raise an error for mismatching content-length and actual contents
|
45
105
|
raise EOFError, "bad content body"
|
46
106
|
end
|
47
107
|
|
48
108
|
str
|
49
109
|
end
|
50
|
-
|
51
|
-
def rewind
|
52
|
-
@io.rewind
|
53
|
-
end
|
54
110
|
end
|
55
111
|
|
56
112
|
MultipartInfo = Struct.new :params, :tmp_files
|
@@ -69,18 +125,17 @@ module Rack
|
|
69
125
|
boundary = parse_boundary content_type
|
70
126
|
return EMPTY unless boundary
|
71
127
|
|
128
|
+
if boundary.length > 70
|
129
|
+
# RFC 1521 Section 7.2.1 imposes a 70 character maximum for the boundary.
|
130
|
+
# Most clients use no more than 55 characters.
|
131
|
+
raise BoundaryTooLongError, "multipart boundary size too large (#{boundary.length} characters)"
|
132
|
+
end
|
133
|
+
|
72
134
|
io = BoundedIO.new(io, content_length) if content_length
|
73
|
-
outbuf = String.new
|
74
135
|
|
75
136
|
parser = new(boundary, tmpfile, bufsize, qp)
|
76
|
-
parser.
|
77
|
-
|
78
|
-
loop do
|
79
|
-
break if parser.state == :DONE
|
80
|
-
parser.on_read io.read(bufsize, outbuf)
|
81
|
-
end
|
137
|
+
parser.parse(io)
|
82
138
|
|
83
|
-
io.rewind
|
84
139
|
parser.result
|
85
140
|
end
|
86
141
|
|
@@ -180,33 +235,51 @@ module Rack
|
|
180
235
|
def initialize(boundary, tempfile, bufsize, query_parser)
|
181
236
|
@query_parser = query_parser
|
182
237
|
@params = query_parser.make_params
|
183
|
-
@boundary = "--#{boundary}"
|
184
238
|
@bufsize = bufsize
|
185
239
|
|
186
|
-
@full_boundary = @boundary
|
187
|
-
@end_boundary = @boundary + '--'
|
188
240
|
@state = :FAST_FORWARD
|
189
241
|
@mime_index = 0
|
242
|
+
@body_retained = nil
|
243
|
+
@retained_size = 0
|
190
244
|
@collector = Collector.new tempfile
|
191
245
|
|
192
246
|
@sbuf = StringScanner.new("".dup)
|
193
|
-
@body_regex = /(?:#{EOL})
|
194
|
-
@
|
195
|
-
@
|
247
|
+
@body_regex = /(?:#{EOL}|\A)--#{Regexp.quote(boundary)}(?:#{EOL}|--)/m
|
248
|
+
@body_regex_at_end = /#{@body_regex}\z/m
|
249
|
+
@end_boundary_size = boundary.bytesize + 4 # (-- at start, -- at finish)
|
250
|
+
@rx_max_size = boundary.bytesize + 6 # (\r\n-- at start, either \r\n or -- at finish)
|
196
251
|
@head_regex = /(.*?#{EOL})#{EOL}/m
|
197
252
|
end
|
198
253
|
|
199
|
-
def
|
200
|
-
|
201
|
-
|
202
|
-
|
254
|
+
def parse(io)
|
255
|
+
outbuf = String.new
|
256
|
+
read_data(io, outbuf)
|
257
|
+
|
258
|
+
loop do
|
259
|
+
status =
|
260
|
+
case @state
|
261
|
+
when :FAST_FORWARD
|
262
|
+
handle_fast_forward
|
263
|
+
when :CONSUME_TOKEN
|
264
|
+
handle_consume_token
|
265
|
+
when :MIME_HEAD
|
266
|
+
handle_mime_head
|
267
|
+
when :MIME_BODY
|
268
|
+
handle_mime_body
|
269
|
+
else # when :DONE
|
270
|
+
return
|
271
|
+
end
|
272
|
+
|
273
|
+
read_data(io, outbuf) if status == :want_read
|
274
|
+
end
|
203
275
|
end
|
204
276
|
|
205
277
|
def result
|
206
278
|
@collector.each do |part|
|
207
279
|
part.get_data do |data|
|
208
280
|
tag_multipart_encoding(part.filename, part.content_type, part.name, data)
|
209
|
-
|
281
|
+
name, data = handle_dummy_encoding(part.name, data)
|
282
|
+
@query_parser.normalize_params(@params, name, data)
|
210
283
|
end
|
211
284
|
end
|
212
285
|
MultipartInfo.new @params.to_params_hash, @collector.find_all(&:file?).map(&:body)
|
@@ -214,34 +287,43 @@ module Rack
|
|
214
287
|
|
215
288
|
private
|
216
289
|
|
217
|
-
def
|
218
|
-
|
219
|
-
|
220
|
-
|
221
|
-
break if handle_fast_forward == :want_read
|
222
|
-
when :CONSUME_TOKEN
|
223
|
-
break if handle_consume_token == :want_read
|
224
|
-
when :MIME_HEAD
|
225
|
-
break if handle_mime_head == :want_read
|
226
|
-
when :MIME_BODY
|
227
|
-
break if handle_mime_body == :want_read
|
228
|
-
when :DONE
|
229
|
-
break
|
230
|
-
end
|
231
|
-
end
|
290
|
+
def read_data(io, outbuf)
|
291
|
+
content = io.read(@bufsize, outbuf)
|
292
|
+
handle_empty_content!(content)
|
293
|
+
@sbuf.concat(content)
|
232
294
|
end
|
233
295
|
|
296
|
+
# This handles the initial parser state. We read until we find the starting
|
297
|
+
# boundary, then we can transition to the next state. If we find the ending
|
298
|
+
# boundary, this is an invalid multipart upload, but keep scanning for opening
|
299
|
+
# boundary in that case. If no boundary found, we need to keep reading data
|
300
|
+
# and retry. It's highly unlikely the initial read will not consume the
|
301
|
+
# boundary. The client would have to deliberately craft a response
|
302
|
+
# with the opening boundary beyond the buffer size for that to happen.
|
234
303
|
def handle_fast_forward
|
235
|
-
|
304
|
+
while true
|
305
|
+
case consume_boundary
|
306
|
+
when :BOUNDARY
|
307
|
+
# found opening boundary, transition to next state
|
308
|
+
@state = :MIME_HEAD
|
309
|
+
return
|
310
|
+
when :END_BOUNDARY
|
311
|
+
# invalid multipart upload
|
312
|
+
if @sbuf.pos == @end_boundary_size && @sbuf.rest == EOL
|
313
|
+
# stop parsing a buffer if a buffer is only an end boundary.
|
314
|
+
@state = :DONE
|
315
|
+
return
|
316
|
+
end
|
236
317
|
|
237
|
-
|
238
|
-
|
239
|
-
|
240
|
-
|
241
|
-
|
242
|
-
|
243
|
-
|
244
|
-
|
318
|
+
# retry for opening boundary
|
319
|
+
else
|
320
|
+
# We raise if we don't find the multipart boundary, to avoid unbounded memory
|
321
|
+
# buffering. Note that the actual limit is the higher of 16KB and the buffer size (1MB by default)
|
322
|
+
raise Error, "multipart boundary not found within limit" if @sbuf.string.bytesize > BOUNDARY_START_LIMIT
|
323
|
+
|
324
|
+
# no boundary found, keep reading data
|
325
|
+
return :want_read
|
326
|
+
end
|
245
327
|
end
|
246
328
|
end
|
247
329
|
|
@@ -255,32 +337,130 @@ module Rack
|
|
255
337
|
end
|
256
338
|
end
|
257
339
|
|
340
|
+
CONTENT_DISPOSITION_MAX_PARAMS = 16
|
341
|
+
CONTENT_DISPOSITION_MAX_BYTES = 1536
|
258
342
|
def handle_mime_head
|
259
343
|
if @sbuf.scan_until(@head_regex)
|
260
344
|
head = @sbuf[1]
|
261
345
|
content_type = head[MULTIPART_CONTENT_TYPE, 1]
|
262
|
-
if
|
263
|
-
|
346
|
+
if (disposition = head[MULTIPART_CONTENT_DISPOSITION, 1]) &&
|
347
|
+
disposition.bytesize <= CONTENT_DISPOSITION_MAX_BYTES
|
348
|
+
|
349
|
+
# ignore actual content-disposition value (should always be form-data)
|
350
|
+
i = disposition.index(';')
|
351
|
+
disposition.slice!(0, i+1)
|
352
|
+
param = nil
|
353
|
+
num_params = 0
|
354
|
+
|
355
|
+
# Parse parameter list
|
356
|
+
while i = disposition.index('=')
|
357
|
+
# Only parse up to max parameters, to avoid potential denial of service
|
358
|
+
num_params += 1
|
359
|
+
break if num_params > CONTENT_DISPOSITION_MAX_PARAMS
|
360
|
+
|
361
|
+
# Found end of parameter name, ensure forward progress in loop
|
362
|
+
param = disposition.slice!(0, i+1)
|
363
|
+
|
364
|
+
# Remove ending equals and preceding whitespace from parameter name
|
365
|
+
param.chomp!('=')
|
366
|
+
param.lstrip!
|
367
|
+
|
368
|
+
if disposition[0] == '"'
|
369
|
+
# Parameter value is quoted, parse it, handling backslash escapes
|
370
|
+
disposition.slice!(0, 1)
|
371
|
+
value = String.new
|
372
|
+
|
373
|
+
while i = disposition.index(/(["\\])/)
|
374
|
+
c = $1
|
375
|
+
|
376
|
+
# Append all content until ending quote or escape
|
377
|
+
value << disposition.slice!(0, i)
|
378
|
+
|
379
|
+
# Remove either backslash or ending quote,
|
380
|
+
# ensures forward progress in loop
|
381
|
+
disposition.slice!(0, 1)
|
382
|
+
|
383
|
+
# stop parsing parameter value if found ending quote
|
384
|
+
break if c == '"'
|
385
|
+
|
386
|
+
escaped_char = disposition.slice!(0, 1)
|
387
|
+
if param == 'filename' && escaped_char != '"'
|
388
|
+
# Possible IE uploaded filename, append both escape backslash and value
|
389
|
+
value << c << escaped_char
|
390
|
+
else
|
391
|
+
# Other only append escaped value
|
392
|
+
value << escaped_char
|
393
|
+
end
|
394
|
+
end
|
395
|
+
else
|
396
|
+
if i = disposition.index(';')
|
397
|
+
# Parameter value unquoted (which may be invalid), value ends at semicolon
|
398
|
+
value = disposition.slice!(0, i)
|
399
|
+
else
|
400
|
+
# If no ending semicolon, assume remainder of line is value and stop
|
401
|
+
# parsing
|
402
|
+
disposition.strip!
|
403
|
+
value = disposition
|
404
|
+
disposition = ''
|
405
|
+
end
|
406
|
+
end
|
407
|
+
|
408
|
+
case param
|
409
|
+
when 'name'
|
410
|
+
name = value
|
411
|
+
when 'filename'
|
412
|
+
filename = value
|
413
|
+
when 'filename*'
|
414
|
+
filename_star = value
|
415
|
+
# else
|
416
|
+
# ignore other parameters
|
417
|
+
end
|
418
|
+
|
419
|
+
# skip trailing semicolon, to proceed to next parameter
|
420
|
+
if i = disposition.index(';')
|
421
|
+
disposition.slice!(0, i+1)
|
422
|
+
end
|
423
|
+
end
|
264
424
|
else
|
265
425
|
name = head[MULTIPART_CONTENT_ID, 1]
|
266
426
|
end
|
267
427
|
|
268
|
-
|
428
|
+
if filename_star
|
429
|
+
encoding, _, filename = filename_star.split("'", 3)
|
430
|
+
filename = normalize_filename(filename || '')
|
431
|
+
filename.force_encoding(find_encoding(encoding))
|
432
|
+
elsif filename
|
433
|
+
filename = normalize_filename(filename)
|
434
|
+
end
|
269
435
|
|
270
436
|
if name.nil? || name.empty?
|
271
437
|
name = filename || "#{content_type || TEXT_PLAIN}[]".dup
|
272
438
|
end
|
273
439
|
|
440
|
+
# Mime part head data is retained for both TempfilePart and BufferPart
|
441
|
+
# for the entireity of the parse, even though it isn't used for BufferPart.
|
442
|
+
update_retained_size(head.bytesize)
|
443
|
+
|
444
|
+
# If a filename is given, a TempfilePart will be used, so the body will
|
445
|
+
# not be buffered in memory. However, if a filename is not given, a BufferPart
|
446
|
+
# will be used, and the body will be buffered in memory.
|
447
|
+
@body_retained = !filename
|
448
|
+
|
274
449
|
@collector.on_mime_head @mime_index, head, filename, content_type, name
|
275
450
|
@state = :MIME_BODY
|
276
451
|
else
|
277
|
-
|
452
|
+
# We raise if the mime part header is too large, to avoid unbounded memory
|
453
|
+
# buffering. Note that the actual limit is the higher of 64KB and the buffer size (1MB by default)
|
454
|
+
raise Error, "multipart mime part header too large" if @sbuf.string.bytesize > MIME_HEADER_BYTESIZE_LIMIT
|
455
|
+
|
456
|
+
return :want_read
|
278
457
|
end
|
279
458
|
end
|
280
459
|
|
281
460
|
def handle_mime_body
|
282
461
|
if (body_with_boundary = @sbuf.check_until(@body_regex)) # check but do not advance the pointer yet
|
283
|
-
body = body_with_boundary.sub(
|
462
|
+
body = body_with_boundary.sub(@body_regex_at_end, '') # remove the boundary from the string
|
463
|
+
update_retained_size(body.bytesize) if @body_retained
|
284
464
|
@collector.on_mime_body @mime_index, body
|
285
465
|
@sbuf.pos += body.length + 2 # skip \r\n after the content
|
286
466
|
@state = :CONSUME_TOKEN
|
@@ -289,7 +469,9 @@ module Rack
|
|
289
469
|
# Save what we have so far
|
290
470
|
if @rx_max_size < @sbuf.rest_size
|
291
471
|
delta = @sbuf.rest_size - @rx_max_size
|
292
|
-
|
472
|
+
body = @sbuf.peek(delta)
|
473
|
+
update_retained_size(body.bytesize) if @body_retained
|
474
|
+
@collector.on_mime_body @mime_index, body
|
293
475
|
@sbuf.pos += delta
|
294
476
|
@sbuf.string = @sbuf.rest
|
295
477
|
end
|
@@ -297,54 +479,38 @@ module Rack
|
|
297
479
|
end
|
298
480
|
end
|
299
481
|
|
300
|
-
def
|
301
|
-
|
302
|
-
|
303
|
-
|
304
|
-
case read_buffer.strip
|
305
|
-
when full_boundary then return :BOUNDARY
|
306
|
-
when @end_boundary then return :END_BOUNDARY
|
307
|
-
end
|
308
|
-
return if @sbuf.eos?
|
482
|
+
def update_retained_size(size)
|
483
|
+
@retained_size += size
|
484
|
+
if @retained_size > BUFFERED_UPLOAD_BYTESIZE_LIMIT
|
485
|
+
raise Error, "multipart data over retained size limit"
|
309
486
|
end
|
310
487
|
end
|
311
488
|
|
312
|
-
|
313
|
-
|
314
|
-
|
315
|
-
|
316
|
-
|
317
|
-
|
318
|
-
|
319
|
-
|
320
|
-
|
321
|
-
|
322
|
-
end
|
323
|
-
when BROKEN
|
324
|
-
filename = $1
|
325
|
-
filename = $1 if filename =~ /^"(.*)"$/
|
489
|
+
# Scan until the we find the start or end of the boundary.
|
490
|
+
# If we find it, return the appropriate symbol for the start or
|
491
|
+
# end of the boundary. If we don't find the start or end of the
|
492
|
+
# boundary, clear the buffer and return nil.
|
493
|
+
def consume_boundary
|
494
|
+
if read_buffer = @sbuf.scan_until(@body_regex)
|
495
|
+
read_buffer.end_with?(EOL) ? :BOUNDARY : :END_BOUNDARY
|
496
|
+
else
|
497
|
+
@sbuf.terminate
|
498
|
+
nil
|
326
499
|
end
|
500
|
+
end
|
327
501
|
|
328
|
-
|
329
|
-
|
502
|
+
def normalize_filename(filename)
|
330
503
|
if filename.scan(/%.?.?/).all? { |s| /%[0-9a-fA-F]{2}/.match?(s) }
|
331
504
|
filename = Utils.unescape_path(filename)
|
332
505
|
end
|
333
506
|
|
334
507
|
filename.scrub!
|
335
508
|
|
336
|
-
|
337
|
-
filename = filename.gsub(/\\(.)/, '\1')
|
338
|
-
end
|
339
|
-
|
340
|
-
if encoding
|
341
|
-
filename.force_encoding ::Encoding.find(encoding)
|
342
|
-
end
|
343
|
-
|
344
|
-
filename
|
509
|
+
filename.split(/[\/\\]/).last || String.new
|
345
510
|
end
|
346
511
|
|
347
512
|
CHARSET = "charset"
|
513
|
+
deprecate_constant :CHARSET
|
348
514
|
|
349
515
|
def tag_multipart_encoding(filename, content_type, name, body)
|
350
516
|
name = name.to_s
|
@@ -365,7 +531,9 @@ module Rack
|
|
365
531
|
k.strip!
|
366
532
|
v.strip!
|
367
533
|
v = v[1..-2] if v.start_with?('"') && v.end_with?('"')
|
368
|
-
|
534
|
+
if k == "charset"
|
535
|
+
encoding = find_encoding(v)
|
536
|
+
end
|
369
537
|
end
|
370
538
|
end
|
371
539
|
end
|
@@ -374,9 +542,37 @@ module Rack
|
|
374
542
|
body.force_encoding(encoding)
|
375
543
|
end
|
376
544
|
|
545
|
+
# Return the related Encoding object. However, because
|
546
|
+
# enc is submitted by the user, it may be invalid, so
|
547
|
+
# use a binary encoding in that case.
|
548
|
+
def find_encoding(enc)
|
549
|
+
Encoding.find enc
|
550
|
+
rescue ArgumentError
|
551
|
+
Encoding::BINARY
|
552
|
+
end
|
553
|
+
|
554
|
+
REENCODE_DUMMY_ENCODINGS = {
|
555
|
+
# ISO-2022-JP is a legacy but still widely used encoding in Japan
|
556
|
+
# Here we convert ISO-2022-JP to UTF-8 so that it can be handled.
|
557
|
+
Encoding::ISO_2022_JP => true
|
558
|
+
|
559
|
+
# Other dummy encodings are rarely used and have not been supported yet.
|
560
|
+
# Adding support for them will require careful considerations.
|
561
|
+
}
|
562
|
+
|
563
|
+
def handle_dummy_encoding(name, body)
|
564
|
+
# A string object with a 'dummy' encoding does not have full functionality and can cause errors.
|
565
|
+
# So here we covert it to UTF-8 so that it can be handled properly.
|
566
|
+
if name.encoding.dummy? && REENCODE_DUMMY_ENCODINGS[name.encoding]
|
567
|
+
name = name.encode(Encoding::UTF_8)
|
568
|
+
body = body.encode(Encoding::UTF_8)
|
569
|
+
end
|
570
|
+
return name, body
|
571
|
+
end
|
572
|
+
|
377
573
|
def handle_empty_content!(content)
|
378
574
|
if content.nil? || content.empty?
|
379
|
-
raise
|
575
|
+
raise EmptyContentError
|
380
576
|
end
|
381
577
|
end
|
382
578
|
end
|
@@ -1,14 +1,51 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
+
require 'tempfile'
|
4
|
+
require 'fileutils'
|
5
|
+
|
3
6
|
module Rack
|
4
7
|
module Multipart
|
8
|
+
# Despite the misleading name, UploadedFile is designed for use for
|
9
|
+
# preparing multipart file upload bodies, generally for use in tests.
|
10
|
+
# It is not designed for and should not be used for handling uploaded
|
11
|
+
# files (there is no need for that, since Rack's multipart parser
|
12
|
+
# already creates Tempfiles for that). Using this with non-trusted
|
13
|
+
# filenames can create a security vulnerability.
|
14
|
+
#
|
15
|
+
# You should only use this class if you plan on passing the instances
|
16
|
+
# to Rack::MockRequest for use in creating multipart request bodies.
|
17
|
+
#
|
18
|
+
# UploadedFile delegates most methods to the tempfile it contains.
|
5
19
|
class UploadedFile
|
6
|
-
# The
|
20
|
+
# The provided name of the file. This generally is the basename of
|
21
|
+
# path provided during initialization, but it can contain slashes if they
|
22
|
+
# were present in the filename argument when the instance was created.
|
7
23
|
attr_reader :original_filename
|
8
24
|
|
9
|
-
# The content type of the
|
25
|
+
# The content type of the instance.
|
10
26
|
attr_accessor :content_type
|
11
27
|
|
28
|
+
# Create a new UploadedFile. For backwards compatibility, this accepts
|
29
|
+
# both positional and keyword versions of the same arguments:
|
30
|
+
#
|
31
|
+
# filepath/path :: The path to the file
|
32
|
+
# ct/content_type :: The content_type of the file
|
33
|
+
# bin/binary :: Whether to set binmode on the file before copying data into it.
|
34
|
+
#
|
35
|
+
# If both positional and keyword arguments are present, the keyword arguments
|
36
|
+
# take precedence.
|
37
|
+
#
|
38
|
+
# The following keyword-only arguments are also accepted:
|
39
|
+
#
|
40
|
+
# filename :: Override the filename to use for the file. This is so the
|
41
|
+
# filename for the upload does not need to match the basename of
|
42
|
+
# the file path. This should not contain slashes, unless you are
|
43
|
+
# trying to test how an application handles invalid filenames in
|
44
|
+
# multipart upload bodies.
|
45
|
+
# io :: Use the given IO-like instance as the tempfile, instead of creating
|
46
|
+
# a Tempfile instance. This is useful for building multipart file
|
47
|
+
# upload bodies without a file being present on the filesystem. If you are
|
48
|
+
# providing this, you should also provide the filename argument.
|
12
49
|
def initialize(filepath = nil, ct = "text/plain", bin = false,
|
13
50
|
path: filepath, content_type: ct, binary: bin, filename: nil, io: nil)
|
14
51
|
if io
|
@@ -24,15 +61,19 @@ module Rack
|
|
24
61
|
@content_type = content_type
|
25
62
|
end
|
26
63
|
|
64
|
+
# The path of the tempfile for the instance, if the tempfile has a path.
|
65
|
+
# nil if the tempfile does not have a path.
|
27
66
|
def path
|
28
67
|
@tempfile.path if @tempfile.respond_to?(:path)
|
29
68
|
end
|
30
69
|
alias_method :local_path, :path
|
31
70
|
|
32
|
-
|
33
|
-
|
71
|
+
# Return true if the tempfile responds to the method.
|
72
|
+
def respond_to_missing?(*args)
|
73
|
+
@tempfile.respond_to?(*args)
|
34
74
|
end
|
35
75
|
|
76
|
+
# Delegate method missing calls to the tempfile.
|
36
77
|
def method_missing(method_name, *args, &block) #:nodoc:
|
37
78
|
@tempfile.__send__(method_name, *args, &block)
|
38
79
|
end
|