rack 3.0.15 → 3.2.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (45) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +368 -6
  3. data/CONTRIBUTING.md +11 -9
  4. data/README.md +103 -28
  5. data/SPEC.rdoc +206 -288
  6. data/lib/rack/auth/abstract/request.rb +2 -0
  7. data/lib/rack/auth/basic.rb +1 -2
  8. data/lib/rack/bad_request.rb +8 -0
  9. data/lib/rack/builder.rb +29 -10
  10. data/lib/rack/cascade.rb +0 -3
  11. data/lib/rack/conditional_get.rb +4 -3
  12. data/lib/rack/constants.rb +4 -0
  13. data/lib/rack/directory.rb +6 -3
  14. data/lib/rack/events.rb +21 -6
  15. data/lib/rack/files.rb +1 -1
  16. data/lib/rack/head.rb +2 -3
  17. data/lib/rack/headers.rb +86 -2
  18. data/lib/rack/lint.rb +482 -425
  19. data/lib/rack/media_type.rb +14 -10
  20. data/lib/rack/mime.rb +6 -5
  21. data/lib/rack/mock_request.rb +10 -15
  22. data/lib/rack/mock_response.rb +50 -20
  23. data/lib/rack/multipart/parser.rb +255 -76
  24. data/lib/rack/multipart/uploaded_file.rb +42 -5
  25. data/lib/rack/multipart.rb +34 -1
  26. data/lib/rack/query_parser.rb +86 -78
  27. data/lib/rack/request.rb +78 -65
  28. data/lib/rack/response.rb +28 -20
  29. data/lib/rack/rewindable_input.rb +4 -1
  30. data/lib/rack/sendfile.rb +51 -21
  31. data/lib/rack/show_exceptions.rb +10 -4
  32. data/lib/rack/show_status.rb +0 -2
  33. data/lib/rack/static.rb +7 -3
  34. data/lib/rack/utils.rb +175 -119
  35. data/lib/rack/version.rb +3 -20
  36. data/lib/rack.rb +1 -4
  37. metadata +6 -12
  38. data/lib/rack/auth/digest/md5.rb +0 -1
  39. data/lib/rack/auth/digest/nonce.rb +0 -1
  40. data/lib/rack/auth/digest/params.rb +0 -1
  41. data/lib/rack/auth/digest/request.rb +0 -1
  42. data/lib/rack/auth/digest.rb +0 -256
  43. data/lib/rack/chunked.rb +0 -120
  44. data/lib/rack/file.rb +0 -9
  45. data/lib/rack/logger.rb +0 -22
@@ -3,53 +3,90 @@
3
3
  require 'strscan'
4
4
 
5
5
  require_relative '../utils'
6
+ require_relative '../bad_request'
6
7
 
7
8
  module Rack
8
9
  module Multipart
9
- class MultipartPartLimitError < Errno::EMFILE; end
10
+ class MultipartPartLimitError < Errno::EMFILE
11
+ include BadRequest
12
+ end
10
13
 
11
- class MultipartTotalPartLimitError < StandardError; end
14
+ class MultipartTotalPartLimitError < StandardError
15
+ include BadRequest
16
+ end
12
17
 
13
18
  # Use specific error class when parsing multipart request
14
19
  # that ends early.
15
- class EmptyContentError < ::EOFError; end
20
+ class EmptyContentError < ::EOFError
21
+ include BadRequest
22
+ end
16
23
 
17
24
  # Base class for multipart exceptions that do not subclass from
18
25
  # other exception classes for backwards compatibility.
19
- class Error < StandardError; end
26
+ class BoundaryTooLongError < StandardError
27
+ include BadRequest
28
+ end
20
29
 
21
- EOL = "\r\n"
22
- MULTIPART = %r|\Amultipart/.*boundary=\"?([^\";,]+)\"?|ni
23
- TOKEN = /[^\s()<>,;:\\"\/\[\]?=]+/
24
- CONDISP = /Content-Disposition:\s*#{TOKEN}\s*/i
25
- VALUE = /"(?:\\"|[^"])*"|#{TOKEN}/
26
- BROKEN = /^#{CONDISP}.*;\s*filename=(#{VALUE})/i
27
- MULTIPART_CONTENT_TYPE = /Content-Type: (.*)#{EOL}/ni
28
- MULTIPART_CONTENT_DISPOSITION = /Content-Disposition:[^:]*;\s*name=(#{VALUE})/ni
29
- MULTIPART_CONTENT_ID = /Content-ID:\s*([^#{EOL}]*)/ni
30
- # Updated definitions from RFC 2231
31
- ATTRIBUTE_CHAR = %r{[^ \x00-\x1f\x7f)(><@,;:\\"/\[\]?='*%]}
32
- ATTRIBUTE = /#{ATTRIBUTE_CHAR}+/
33
- SECTION = /\*[0-9]+/
34
- REGULAR_PARAMETER_NAME = /#{ATTRIBUTE}#{SECTION}?/
35
- REGULAR_PARAMETER = /(#{REGULAR_PARAMETER_NAME})=(#{VALUE})/
36
- EXTENDED_OTHER_NAME = /#{ATTRIBUTE}\*[1-9][0-9]*\*/
37
- EXTENDED_OTHER_VALUE = /%[0-9a-fA-F]{2}|#{ATTRIBUTE_CHAR}/
38
- EXTENDED_OTHER_PARAMETER = /(#{EXTENDED_OTHER_NAME})=(#{EXTENDED_OTHER_VALUE}*)/
39
- EXTENDED_INITIAL_NAME = /#{ATTRIBUTE}(?:\*0)?\*/
40
- EXTENDED_INITIAL_VALUE = /[a-zA-Z0-9\-]*'[a-zA-Z0-9\-]*'#{EXTENDED_OTHER_VALUE}*/
41
- EXTENDED_INITIAL_PARAMETER = /(#{EXTENDED_INITIAL_NAME})=(#{EXTENDED_INITIAL_VALUE})/
42
- EXTENDED_PARAMETER = /#{EXTENDED_INITIAL_PARAMETER}|#{EXTENDED_OTHER_PARAMETER}/
43
- DISPPARM = /;\s*(?:#{REGULAR_PARAMETER}|#{EXTENDED_PARAMETER})\s*/
44
- RFC2183 = /^#{CONDISP}(#{DISPPARM})+$/i
30
+ # Prefer to use the BoundaryTooLongError class or Rack::BadRequest.
31
+ Error = BoundaryTooLongError
45
32
 
33
+ EOL = "\r\n"
34
+ FWS = /[ \t]+(?:\r\n[ \t]+)?/ # whitespace with optional folding
35
+ HEADER_VALUE = "(?:[^\r\n]|\r\n[ \t])*" # anything but a non-folding CRLF
36
+ MULTIPART = %r|\Amultipart/.*?boundary(\s*)=\"?([^\";,]+)\"?|ni
37
+ MULTIPART_CONTENT_TYPE = /^Content-Type:#{FWS}?(#{HEADER_VALUE})/ni
38
+ MULTIPART_CONTENT_DISPOSITION = /^Content-Disposition:#{FWS}?(#{HEADER_VALUE})/ni
39
+ MULTIPART_CONTENT_ID = /^Content-ID:#{FWS}?(#{HEADER_VALUE})/ni
40
+
41
+ # Rack::Multipart::Parser handles parsing of multipart/form-data requests.
42
+ #
43
+ # File Parameter Contents
44
+ #
45
+ # When processing file uploads, the parser returns a hash containing
46
+ # information about uploaded files. For +file+ parameters, the hash includes:
47
+ #
48
+ # * +:filename+ - The original filename, already URL decoded by the parser
49
+ # * +:type+ - The content type of the uploaded file
50
+ # * +:name+ - The parameter name from the form
51
+ # * +:tempfile+ - A Tempfile object containing the uploaded data
52
+ # * +:head+ - The raw header content for this part
46
53
  class Parser
47
54
  BUFSIZE = 1_048_576
48
55
  TEXT_PLAIN = "text/plain"
49
56
  TEMPFILE_FACTORY = lambda { |filename, content_type|
50
- Tempfile.new(["RackMultipart", ::File.extname(filename.gsub("\0", '%00'))])
57
+ extension = ::File.extname(filename.gsub("\0", '%00'))[0, 129]
58
+
59
+ Tempfile.new(["RackMultipart", extension])
51
60
  }
52
61
 
62
+ BOUNDARY_START_LIMIT = 16 * 1024
63
+ private_constant :BOUNDARY_START_LIMIT
64
+
65
+ MIME_HEADER_BYTESIZE_LIMIT = 64 * 1024
66
+ private_constant :MIME_HEADER_BYTESIZE_LIMIT
67
+
68
+ env_int = lambda do |key, val|
69
+ if str_val = ENV[key]
70
+ begin
71
+ val = Integer(str_val, 10)
72
+ rescue ArgumentError
73
+ raise ArgumentError, "non-integer value provided for environment variable #{key}"
74
+ end
75
+ end
76
+
77
+ val
78
+ end
79
+
80
+ BUFFERED_UPLOAD_BYTESIZE_LIMIT = env_int.call("RACK_MULTIPART_BUFFERED_UPLOAD_BYTESIZE_LIMIT", 16 * 1024 * 1024)
81
+ private_constant :BUFFERED_UPLOAD_BYTESIZE_LIMIT
82
+
83
+ bytesize_limit = env_int.call("RACK_MULTIPART_PARSER_BYTESIZE_LIMIT", 10 * 1024 * 1024 * 1024)
84
+ PARSER_BYTESIZE_LIMIT = bytesize_limit > 0 ? bytesize_limit : nil
85
+ private_constant :PARSER_BYTESIZE_LIMIT
86
+
87
+ CONTENT_DISPOSITION_QUOTED_ESCAPES_LIMIT = env_int.call("RACK_MULTIPART_CONTENT_DISPOSITION_QUOTED_ESCAPES_LIMIT", 8 * 1024)
88
+ private_constant :CONTENT_DISPOSITION_QUOTED_ESCAPES_LIMIT
89
+
53
90
  class BoundedIO # :nodoc:
54
91
  def initialize(io, content_length)
55
92
  @io = io
@@ -86,7 +123,15 @@ module Rack
86
123
  return unless content_type
87
124
  data = content_type.match(MULTIPART)
88
125
  return unless data
89
- data[1]
126
+
127
+ unless data[1].empty?
128
+ raise Error, "whitespace between boundary parameter name and equal sign"
129
+ end
130
+ if data.post_match.match?(/boundary\s*=/i)
131
+ raise BoundaryTooLongError, "multiple boundary parameters found in multipart content type"
132
+ end
133
+
134
+ data[2]
90
135
  end
91
136
 
92
137
  def self.parse(io, content_length, content_type, tmpfile, bufsize, qp)
@@ -95,10 +140,14 @@ module Rack
95
140
  boundary = parse_boundary content_type
96
141
  return EMPTY unless boundary
97
142
 
143
+ if PARSER_BYTESIZE_LIMIT && content_length && content_length > PARSER_BYTESIZE_LIMIT
144
+ raise Error, "multipart Content-Length #{content_length} exceeds limit of #{PARSER_BYTESIZE_LIMIT} bytes"
145
+ end
146
+
98
147
  if boundary.length > 70
99
148
  # RFC 1521 Section 7.2.1 imposes a 70 character maximum for the boundary.
100
149
  # Most clients use no more than 55 characters.
101
- raise Error, "multipart boundary size too large (#{boundary.length} characters)"
150
+ raise BoundaryTooLongError, "multipart boundary size too large (#{boundary.length} characters)"
102
151
  end
103
152
 
104
153
  io = BoundedIO.new(io, content_length) if content_length
@@ -209,16 +258,22 @@ module Rack
209
258
 
210
259
  @state = :FAST_FORWARD
211
260
  @mime_index = 0
261
+ @body_retained = nil
262
+ @retained_size = 0
263
+ @total_bytes_read = (0 if PARSER_BYTESIZE_LIMIT)
264
+ @content_disposition_quoted_escapes = 0
212
265
  @collector = Collector.new tempfile
213
266
 
214
267
  @sbuf = StringScanner.new("".dup)
215
268
  @body_regex = /(?:#{EOL}|\A)--#{Regexp.quote(boundary)}(?:#{EOL}|--)/m
269
+ @body_regex_at_end = /#{@body_regex}\z/m
216
270
  @end_boundary_size = boundary.bytesize + 4 # (-- at start, -- at finish)
217
271
  @rx_max_size = boundary.bytesize + 6 # (\r\n-- at start, either \r\n or -- at finish)
218
272
  @head_regex = /(.*?#{EOL})#{EOL}/m
219
273
  end
220
274
 
221
275
  def parse(io)
276
+ @total_bytes_read &&= nil if io.is_a?(BoundedIO)
222
277
  outbuf = String.new
223
278
  read_data(io, outbuf)
224
279
 
@@ -245,7 +300,8 @@ module Rack
245
300
  @collector.each do |part|
246
301
  part.get_data do |data|
247
302
  tag_multipart_encoding(part.filename, part.content_type, part.name, data)
248
- @query_parser.normalize_params(@params, part.name, data)
303
+ name, data = handle_dummy_encoding(part.name, data)
304
+ @query_parser.normalize_params(@params, name, data)
249
305
  end
250
306
  end
251
307
  MultipartInfo.new @params.to_params_hash, @collector.find_all(&:file?).map(&:body)
@@ -253,15 +309,15 @@ module Rack
253
309
 
254
310
  private
255
311
 
256
- def dequote(str) # From WEBrick::HTTPUtils
257
- ret = (/\A"(.*)"\Z/ =~ str) ? $1 : str.dup
258
- ret.gsub!(/\\(.)/, "\\1")
259
- ret
260
- end
261
-
262
312
  def read_data(io, outbuf)
263
313
  content = io.read(@bufsize, outbuf)
264
314
  handle_empty_content!(content)
315
+ if @total_bytes_read
316
+ @total_bytes_read += content.bytesize
317
+ if @total_bytes_read > PARSER_BYTESIZE_LIMIT
318
+ raise Error, "multipart upload exceeds limit of #{PARSER_BYTESIZE_LIMIT} bytes"
319
+ end
320
+ end
265
321
  @sbuf.concat(content)
266
322
  end
267
323
 
@@ -289,6 +345,10 @@ module Rack
289
345
 
290
346
  # retry for opening boundary
291
347
  else
348
+ # We raise if we don't find the multipart boundary, to avoid unbounded memory
349
+ # buffering. Note that the actual limit is the higher of 16KB and the buffer size (1MB by default)
350
+ raise Error, "multipart boundary not found within limit" if @sbuf.string.bytesize > BOUNDARY_START_LIMIT
351
+
292
352
  # no boundary found, keep reading data
293
353
  return :want_read
294
354
  end
@@ -305,32 +365,143 @@ module Rack
305
365
  end
306
366
  end
307
367
 
368
+ CONTENT_DISPOSITION_MAX_PARAMS = 16
369
+ CONTENT_DISPOSITION_MAX_BYTES = 1536
370
+ OBS_UNFOLD = /\r\n([ \t])/
371
+ private_constant :OBS_UNFOLD
372
+
308
373
  def handle_mime_head
309
374
  if @sbuf.scan_until(@head_regex)
310
375
  head = @sbuf[1]
311
376
  content_type = head[MULTIPART_CONTENT_TYPE, 1]
312
- if name = head[MULTIPART_CONTENT_DISPOSITION, 1]
313
- name = dequote(name)
377
+ content_type.gsub!(OBS_UNFOLD, '\1') if content_type
378
+
379
+ if (disposition = head[MULTIPART_CONTENT_DISPOSITION, 1]) &&
380
+ disposition.bytesize <= CONTENT_DISPOSITION_MAX_BYTES
381
+
382
+ # Implement OBS unfolding (RFC 5322 Section 2.2.3)
383
+ disposition.gsub!(OBS_UNFOLD, '\1')
384
+
385
+ # ignore actual content-disposition value (should always be form-data)
386
+ i = disposition.index(';')
387
+ disposition.slice!(0, i+1)
388
+ param = nil
389
+ num_params = 0
390
+
391
+ # Parse parameter list
392
+ while i = disposition.index('=')
393
+ # Only parse up to max parameters, to avoid potential denial of service
394
+ num_params += 1
395
+ break if num_params > CONTENT_DISPOSITION_MAX_PARAMS
396
+
397
+ # Found end of parameter name, ensure forward progress in loop
398
+ param = disposition.slice!(0, i+1)
399
+
400
+ # Remove ending equals and preceding whitespace from parameter name
401
+ param.chomp!('=')
402
+ param.lstrip!
403
+
404
+ if disposition[0] == '"'
405
+ # Parameter value is quoted, parse it, handling backslash escapes
406
+ disposition.slice!(0, 1)
407
+ value = String.new
408
+
409
+ while i = disposition.index(/(["\\])/)
410
+ c = $1
411
+
412
+ # Append all content until ending quote or escape
413
+ value << disposition.slice!(0, i)
414
+
415
+ # Remove either backslash or ending quote,
416
+ # ensures forward progress in loop
417
+ disposition.slice!(0, 1)
418
+
419
+ # stop parsing parameter value if found ending quote
420
+ break if c == '"'
421
+
422
+ @content_disposition_quoted_escapes += 1
423
+ if @content_disposition_quoted_escapes > CONTENT_DISPOSITION_QUOTED_ESCAPES_LIMIT
424
+ raise Error, "number of quoted escapes during content disposition parsing exceeds limit"
425
+ end
426
+
427
+ escaped_char = disposition.slice!(0, 1)
428
+ if param == 'filename' && escaped_char != '"'
429
+ # Possible IE uploaded filename, append both escape backslash and value
430
+ value << c << escaped_char
431
+ else
432
+ # Other only append escaped value
433
+ value << escaped_char
434
+ end
435
+ end
436
+ else
437
+ if i = disposition.index(';')
438
+ # Parameter value unquoted (which may be invalid), value ends at semicolon
439
+ value = disposition.slice!(0, i)
440
+ else
441
+ # If no ending semicolon, assume remainder of line is value and stop
442
+ # parsing
443
+ disposition.strip!
444
+ value = disposition
445
+ disposition = ''
446
+ end
447
+ end
448
+
449
+ case param
450
+ when 'name'
451
+ name = value
452
+ when 'filename'
453
+ filename = value
454
+ when 'filename*'
455
+ filename_star = value
456
+ # else
457
+ # ignore other parameters
458
+ end
459
+
460
+ # skip trailing semicolon, to proceed to next parameter
461
+ if i = disposition.index(';')
462
+ disposition.slice!(0, i+1)
463
+ end
464
+ end
314
465
  else
315
466
  name = head[MULTIPART_CONTENT_ID, 1]
316
467
  end
317
468
 
318
- filename = get_filename(head)
469
+ if filename_star
470
+ encoding, _, filename = filename_star.split("'", 3)
471
+ filename = normalize_filename(filename || '')
472
+ filename.force_encoding(find_encoding(encoding))
473
+ elsif filename
474
+ filename = normalize_filename(filename)
475
+ end
319
476
 
320
477
  if name.nil? || name.empty?
321
478
  name = filename || "#{content_type || TEXT_PLAIN}[]".dup
322
479
  end
323
480
 
481
+ # Mime part head data is retained for both TempfilePart and BufferPart
482
+ # for the entireity of the parse, even though it isn't used for BufferPart.
483
+ update_retained_size(head.bytesize)
484
+
485
+ # If a filename is given, a TempfilePart will be used, so the body will
486
+ # not be buffered in memory. However, if a filename is not given, a BufferPart
487
+ # will be used, and the body will be buffered in memory.
488
+ @body_retained = !filename
489
+
324
490
  @collector.on_mime_head @mime_index, head, filename, content_type, name
325
491
  @state = :MIME_BODY
326
492
  else
327
- :want_read
493
+ # We raise if the mime part header is too large, to avoid unbounded memory
494
+ # buffering. Note that the actual limit is the higher of 64KB and the buffer size (1MB by default)
495
+ raise Error, "multipart mime part header too large" if @sbuf.rest.bytesize > MIME_HEADER_BYTESIZE_LIMIT
496
+
497
+ return :want_read
328
498
  end
329
499
  end
330
500
 
331
501
  def handle_mime_body
332
502
  if (body_with_boundary = @sbuf.check_until(@body_regex)) # check but do not advance the pointer yet
333
- body = body_with_boundary.sub(/#{@body_regex}\z/m, '') # remove the boundary from the string
503
+ body = body_with_boundary.sub(@body_regex_at_end, '') # remove the boundary from the string
504
+ update_retained_size(body.bytesize) if @body_retained
334
505
  @collector.on_mime_body @mime_index, body
335
506
  @sbuf.pos += body.length + 2 # skip \r\n after the content
336
507
  @state = :CONSUME_TOKEN
@@ -339,7 +510,9 @@ module Rack
339
510
  # Save what we have so far
340
511
  if @rx_max_size < @sbuf.rest_size
341
512
  delta = @sbuf.rest_size - @rx_max_size
342
- @collector.on_mime_body @mime_index, @sbuf.peek(delta)
513
+ body = @sbuf.peek(delta)
514
+ update_retained_size(body.bytesize) if @body_retained
515
+ @collector.on_mime_body @mime_index, body
343
516
  @sbuf.pos += delta
344
517
  @sbuf.string = @sbuf.rest
345
518
  end
@@ -347,6 +520,13 @@ module Rack
347
520
  end
348
521
  end
349
522
 
523
+ def update_retained_size(size)
524
+ @retained_size += size
525
+ if @retained_size > BUFFERED_UPLOAD_BYTESIZE_LIMIT
526
+ raise Error, "multipart data over retained size limit"
527
+ end
528
+ end
529
+
350
530
  # Scan until the we find the start or end of the boundary.
351
531
  # If we find it, return the appropriate symbol for the start or
352
532
  # end of the boundary. If we don't find the start or end of the
@@ -360,39 +540,14 @@ module Rack
360
540
  end
361
541
  end
362
542
 
363
- def get_filename(head)
364
- filename = nil
365
- case head
366
- when RFC2183
367
- params = Hash[*head.scan(DISPPARM).flat_map(&:compact)]
368
-
369
- if filename = params['filename*']
370
- encoding, _, filename = filename.split("'", 3)
371
- elsif filename = params['filename']
372
- filename = $1 if filename =~ /^"(.*)"$/
373
- end
374
- when BROKEN
375
- filename = $1
376
- filename = $1 if filename =~ /^"(.*)"$/
377
- end
378
-
379
- return unless filename
380
-
543
+ def normalize_filename(filename)
381
544
  if filename.scan(/%.?.?/).all? { |s| /%[0-9a-fA-F]{2}/.match?(s) }
382
545
  filename = Utils.unescape_path(filename)
383
546
  end
384
547
 
385
548
  filename.scrub!
386
549
 
387
- if filename !~ /\\[^\\"]/
388
- filename = filename.gsub(/\\(.)/, '\1')
389
- end
390
-
391
- if encoding
392
- filename.force_encoding ::Encoding.find(encoding)
393
- end
394
-
395
- filename
550
+ filename.split(/[\/\\]/).last || String.new
396
551
  end
397
552
 
398
553
  CHARSET = "charset"
@@ -418,11 +573,7 @@ module Rack
418
573
  v.strip!
419
574
  v = v[1..-2] if v.start_with?('"') && v.end_with?('"')
420
575
  if k == "charset"
421
- encoding = begin
422
- Encoding.find v
423
- rescue ArgumentError
424
- Encoding::BINARY
425
- end
576
+ encoding = find_encoding(v)
426
577
  end
427
578
  end
428
579
  end
@@ -432,6 +583,34 @@ module Rack
432
583
  body.force_encoding(encoding)
433
584
  end
434
585
 
586
+ # Return the related Encoding object. However, because
587
+ # enc is submitted by the user, it may be invalid, so
588
+ # use a binary encoding in that case.
589
+ def find_encoding(enc)
590
+ Encoding.find enc
591
+ rescue ArgumentError
592
+ Encoding::BINARY
593
+ end
594
+
595
+ REENCODE_DUMMY_ENCODINGS = {
596
+ # ISO-2022-JP is a legacy but still widely used encoding in Japan
597
+ # Here we convert ISO-2022-JP to UTF-8 so that it can be handled.
598
+ Encoding::ISO_2022_JP => true
599
+
600
+ # Other dummy encodings are rarely used and have not been supported yet.
601
+ # Adding support for them will require careful considerations.
602
+ }
603
+
604
+ def handle_dummy_encoding(name, body)
605
+ # A string object with a 'dummy' encoding does not have full functionality and can cause errors.
606
+ # So here we covert it to UTF-8 so that it can be handled properly.
607
+ if name.encoding.dummy? && REENCODE_DUMMY_ENCODINGS[name.encoding]
608
+ name = name.encode(Encoding::UTF_8)
609
+ body = body.encode(Encoding::UTF_8)
610
+ end
611
+ return name, body
612
+ end
613
+
435
614
  def handle_empty_content!(content)
436
615
  if content.nil? || content.empty?
437
616
  raise EmptyContentError
@@ -5,14 +5,47 @@ require 'fileutils'
5
5
 
6
6
  module Rack
7
7
  module Multipart
8
+ # Despite the misleading name, UploadedFile is designed for use for
9
+ # preparing multipart file upload bodies, generally for use in tests.
10
+ # It is not designed for and should not be used for handling uploaded
11
+ # files (there is no need for that, since Rack's multipart parser
12
+ # already creates Tempfiles for that). Using this with non-trusted
13
+ # filenames can create a security vulnerability.
14
+ #
15
+ # You should only use this class if you plan on passing the instances
16
+ # to Rack::MockRequest for use in creating multipart request bodies.
17
+ #
18
+ # UploadedFile delegates most methods to the tempfile it contains.
8
19
  class UploadedFile
9
-
10
- # The filename, *not* including the path, of the "uploaded" file
20
+ # The provided name of the file. This generally is the basename of
21
+ # path provided during initialization, but it can contain slashes if they
22
+ # were present in the filename argument when the instance was created.
11
23
  attr_reader :original_filename
12
24
 
13
- # The content type of the "uploaded" file
25
+ # The content type of the instance.
14
26
  attr_accessor :content_type
15
27
 
28
+ # Create a new UploadedFile. For backwards compatibility, this accepts
29
+ # both positional and keyword versions of the same arguments:
30
+ #
31
+ # filepath/path :: The path to the file
32
+ # ct/content_type :: The content_type of the file
33
+ # bin/binary :: Whether to set binmode on the file before copying data into it.
34
+ #
35
+ # If both positional and keyword arguments are present, the keyword arguments
36
+ # take precedence.
37
+ #
38
+ # The following keyword-only arguments are also accepted:
39
+ #
40
+ # filename :: Override the filename to use for the file. This is so the
41
+ # filename for the upload does not need to match the basename of
42
+ # the file path. This should not contain slashes, unless you are
43
+ # trying to test how an application handles invalid filenames in
44
+ # multipart upload bodies.
45
+ # io :: Use the given IO-like instance as the tempfile, instead of creating
46
+ # a Tempfile instance. This is useful for building multipart file
47
+ # upload bodies without a file being present on the filesystem. If you are
48
+ # providing this, you should also provide the filename argument.
16
49
  def initialize(filepath = nil, ct = "text/plain", bin = false,
17
50
  path: filepath, content_type: ct, binary: bin, filename: nil, io: nil)
18
51
  if io
@@ -28,15 +61,19 @@ module Rack
28
61
  @content_type = content_type
29
62
  end
30
63
 
64
+ # The path of the tempfile for the instance, if the tempfile has a path.
65
+ # nil if the tempfile does not have a path.
31
66
  def path
32
67
  @tempfile.path if @tempfile.respond_to?(:path)
33
68
  end
34
69
  alias_method :local_path, :path
35
70
 
36
- def respond_to?(*args)
37
- super or @tempfile.respond_to?(*args)
71
+ # Return true if the tempfile responds to the method.
72
+ def respond_to_missing?(*args)
73
+ @tempfile.respond_to?(*args)
38
74
  end
39
75
 
76
+ # Delegate method missing calls to the tempfile.
40
77
  def method_missing(method_name, *args, &block) #:nodoc:
41
78
  @tempfile.__send__(method_name, *args, &block)
42
79
  end
@@ -6,6 +6,8 @@ require_relative 'utils'
6
6
  require_relative 'multipart/parser'
7
7
  require_relative 'multipart/generator'
8
8
 
9
+ require_relative 'bad_request'
10
+
9
11
  module Rack
10
12
  # A multipart form data parser, adapted from IOWA.
11
13
  #
@@ -13,9 +15,40 @@ module Rack
13
15
  module Multipart
14
16
  MULTIPART_BOUNDARY = "AaB03x"
15
17
 
18
+ class MissingInputError < StandardError
19
+ include BadRequest
20
+ end
21
+
22
+ # Accumulator for multipart form data, conforming to the QueryParser API.
23
+ # In future, the Parser could return the pair list directly, but that would
24
+ # change its API.
25
+ class ParamList # :nodoc:
26
+ def self.make_params
27
+ new
28
+ end
29
+
30
+ def self.normalize_params(params, key, value)
31
+ params << [key, value]
32
+ end
33
+
34
+ def initialize
35
+ @pairs = []
36
+ end
37
+
38
+ def <<(pair)
39
+ @pairs << pair
40
+ end
41
+
42
+ def to_params_hash
43
+ @pairs
44
+ end
45
+ end
46
+
16
47
  class << self
17
48
  def parse_multipart(env, params = Rack::Utils.default_query_parser)
18
- io = env[RACK_INPUT]
49
+ unless io = env[RACK_INPUT]
50
+ raise MissingInputError, "Missing input stream!"
51
+ end
19
52
 
20
53
  if content_length = env['CONTENT_LENGTH']
21
54
  content_length = content_length.to_i