rails3_csrf_patcher 0.0.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: b6aa8eb909ef56c03cc3c13417f51e40eeb23431
4
+ data.tar.gz: aabff52582e4e1d72e91e48d9b20fa675029f08b
5
+ SHA512:
6
+ metadata.gz: 2280e8e23f1dfc50f9809dcff439d77e75e6b1965572fc925a6a9e1e22919ef5de59948bce2c595d7c76a48fd3062dd58cf1a9a73724097c4f6819569bb87547
7
+ data.tar.gz: 3f7724ecce38a3ccafc583e423adf8815c50297da6f5b8c7a752dcf698b1b42b7c4aea8f31f0850a4b7ea88f18d28f0e67881237b74584d4f8c1c586c833a322
data/.gitignore ADDED
@@ -0,0 +1,22 @@
1
+ *.gem
2
+ *.rbc
3
+ .bundle
4
+ .config
5
+ .yardoc
6
+ Gemfile.lock
7
+ InstalledFiles
8
+ _yardoc
9
+ coverage
10
+ doc/
11
+ lib/bundler/man
12
+ pkg
13
+ rdoc
14
+ spec/reports
15
+ test/tmp
16
+ test/version_tmp
17
+ tmp
18
+ *.bundle
19
+ *.so
20
+ *.o
21
+ *.a
22
+ mkmf.log
data/Gemfile ADDED
@@ -0,0 +1,4 @@
1
+ source 'https://rubygems.org'
2
+
3
+ # Specify your gem's dependencies in rails3_csrf_patcher.gemspec
4
+ gemspec
data/LICENSE.txt ADDED
@@ -0,0 +1,22 @@
1
+ Copyright (c) 2015 Maxim Abramchuk
2
+
3
+ MIT License
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining
6
+ a copy of this software and associated documentation files (the
7
+ "Software"), to deal in the Software without restriction, including
8
+ without limitation the rights to use, copy, modify, merge, publish,
9
+ distribute, sublicense, and/or sell copies of the Software, and to
10
+ permit persons to whom the Software is furnished to do so, subject to
11
+ the following conditions:
12
+
13
+ The above copyright notice and this permission notice shall be
14
+ included in all copies or substantial portions of the Software.
15
+
16
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
17
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
18
+ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
19
+ NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
20
+ LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
21
+ OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
22
+ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,29 @@
1
+ # Rails3CsrfPatcher
2
+
3
+ TODO: Write a gem description
4
+
5
+ ## Installation
6
+
7
+ Add this line to your application's Gemfile:
8
+
9
+ gem 'rails3_csrf_patcher'
10
+
11
+ And then execute:
12
+
13
+ $ bundle
14
+
15
+ Or install it yourself as:
16
+
17
+ $ gem install rails3_csrf_patcher
18
+
19
+ ## Usage
20
+
21
+ TODO: Write usage instructions here
22
+
23
+ ## Contributing
24
+
25
+ 1. Fork it ( https://github.com/[my-github-username]/rails3_csrf_patcher/fork )
26
+ 2. Create your feature branch (`git checkout -b my-new-feature`)
27
+ 3. Commit your changes (`git commit -am 'Add some feature'`)
28
+ 4. Push to the branch (`git push origin my-new-feature`)
29
+ 5. Create a new Pull Request
data/Rakefile ADDED
@@ -0,0 +1,2 @@
1
+ require "bundler/gem_tasks"
2
+
@@ -0,0 +1,5 @@
1
+ require "rails3_csrf_patcher/version"
2
+
3
+ module Rails3CsrfPatcher
4
+ # Your code goes here...
5
+ end
@@ -0,0 +1,56 @@
1
+ module ActionController
2
+ class InvalidCrossOriginRequest < ActionControllerError
3
+ end
4
+
5
+ module RequestForgeryProtection
6
+ module ClassMethods
7
+ def protect_from_forgery(options = {})
8
+ self.request_forgery_protection_token ||= :authenticity_token
9
+ prepend_before_filter :verify_authenticity_token, options
10
+ append_after_filter :verify_same_origin_request
11
+ end
12
+ end
13
+
14
+ protected
15
+
16
+ def verify_authenticity_token
17
+ @marked_for_same_origin_verification = true
18
+
19
+ unless verified_request?
20
+ logger.warn "WARNING: Can't verify CSRF token authenticity" if logger
21
+ handle_unverified_request
22
+ end
23
+ end
24
+
25
+ CROSS_ORIGIN_JAVASCRIPT_WARNING = "Security warning: an embedded " \
26
+ "<script> tag on another site requested protected JavaScript. " \
27
+ "If you know what you're doing, go ahead and disable forgery " \
28
+ "protection on this action to permit cross-origin JavaScript embedding."
29
+ private_constant :CROSS_ORIGIN_JAVASCRIPT_WARNING
30
+
31
+ # If `verify_authenticity_token` was run (indicating that we have
32
+ # forgery protection enabled for this request) then also verify that
33
+ # we aren't serving an unauthorized cross-origin response.
34
+ def verify_same_origin_request
35
+ if marked_for_same_origin_verification? && non_xhr_javascript_response?
36
+ logger.warn CROSS_ORIGIN_JAVASCRIPT_WARNING if logger
37
+ raise ActionController::InvalidCrossOriginRequest, CROSS_ORIGIN_JAVASCRIPT_WARNING
38
+ end
39
+ end
40
+
41
+ # If the `verify_authenticity_token` before_action ran, verify that
42
+ # JavaScript responses are only served to same-origin GET requests.
43
+ def marked_for_same_origin_verification?
44
+ defined? @marked_for_same_origin_verification
45
+ end
46
+
47
+ # Check for cross-origin JavaScript responses.
48
+ def non_xhr_javascript_response?
49
+ content_type =~ %r(\Atext/javascript) && !request.xhr?
50
+ end
51
+
52
+ def handle_unverified_request
53
+ raise(ActionController::InvalidAuthenticityToken)
54
+ end
55
+ end
56
+ end
@@ -0,0 +1,3 @@
1
+ module Rails3CsrfPatcher
2
+ VERSION = "0.0.1"
3
+ end
@@ -0,0 +1,18 @@
1
+ namespace :patcher do
2
+ desc 'Patch your rails app to protect from the CSRF vulnerability' do
3
+ task :install do
4
+ source = File.join(Gem.loaded_specs['rails3_csrf_patcher'].full_gem_path, 'lib/rail3_csrf_patcher/patch.rb')
5
+ target = File.join(Rails.root, 'config/initializers/')
6
+
7
+ FileUtils.cp source, target
8
+ end
9
+ end
10
+
11
+ desc 'Unpatch your rails app from the CSRF vulnerability protection' do
12
+ task :uninstall do
13
+ patch_file = File.join(Gem.loaded_specs['rails3_csrf_patcher'].full_gem_path, 'lib/rail3_csrf_patcher/patch.rb')
14
+
15
+ FileUtils.rm patch_file if patch_file.present?
16
+ end
17
+ end
18
+ end
@@ -0,0 +1,23 @@
1
+ # coding: utf-8
2
+ lib = File.expand_path('../lib', __FILE__)
3
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
4
+ require 'rails3_csrf_patcher/version'
5
+
6
+ Gem::Specification.new do |spec|
7
+ spec.name = "rails3_csrf_patcher"
8
+ spec.version = Rails3CsrfPatcher::VERSION
9
+ spec.authors = ["Maxim Abramchuk"]
10
+ spec.email = ["maximabramchuck@gmail.com"]
11
+ spec.summary = %q{Patch your rails app due to protect from the CSRF vulnerability.}
12
+ spec.description = %q{Patch your rails app due to protect from the CSRF vulnerability.}
13
+ spec.homepage = "https://github.com/MaximAbramchuck/rails3_csrf_patcher"
14
+ spec.license = "MIT"
15
+
16
+ spec.files = `git ls-files -z`.split("\x0")
17
+ spec.executables = spec.files.grep(%r{^bin/}) { |f| File.basename(f) }
18
+ spec.test_files = spec.files.grep(%r{^(test|spec|features)/})
19
+ spec.require_paths = ["lib"]
20
+
21
+ spec.add_development_dependency "bundler", "~> 1.6"
22
+ spec.add_development_dependency "rake"
23
+ end
metadata ADDED
@@ -0,0 +1,82 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: rails3_csrf_patcher
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.0.1
5
+ platform: ruby
6
+ authors:
7
+ - Maxim Abramchuk
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2015-03-23 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: bundler
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '1.6'
20
+ type: :development
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '1.6'
27
+ - !ruby/object:Gem::Dependency
28
+ name: rake
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - ">="
32
+ - !ruby/object:Gem::Version
33
+ version: '0'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - ">="
39
+ - !ruby/object:Gem::Version
40
+ version: '0'
41
+ description: Patch your rails app due to protect from the CSRF vulnerability.
42
+ email:
43
+ - maximabramchuck@gmail.com
44
+ executables: []
45
+ extensions: []
46
+ extra_rdoc_files: []
47
+ files:
48
+ - ".gitignore"
49
+ - Gemfile
50
+ - LICENSE.txt
51
+ - README.md
52
+ - Rakefile
53
+ - lib/rails3_csrf_patcher.rb
54
+ - lib/rails3_csrf_patcher/patch.rb
55
+ - lib/rails3_csrf_patcher/version.rb
56
+ - lib/tasks/patcher.rake
57
+ - rails3_csrf_patcher.gemspec
58
+ homepage: https://github.com/MaximAbramchuck/rails3_csrf_patcher
59
+ licenses:
60
+ - MIT
61
+ metadata: {}
62
+ post_install_message:
63
+ rdoc_options: []
64
+ require_paths:
65
+ - lib
66
+ required_ruby_version: !ruby/object:Gem::Requirement
67
+ requirements:
68
+ - - ">="
69
+ - !ruby/object:Gem::Version
70
+ version: '0'
71
+ required_rubygems_version: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - ">="
74
+ - !ruby/object:Gem::Version
75
+ version: '0'
76
+ requirements: []
77
+ rubyforge_project:
78
+ rubygems_version: 2.2.2
79
+ signing_key:
80
+ specification_version: 4
81
+ summary: Patch your rails app due to protect from the CSRF vulnerability.
82
+ test_files: []