rails3_csrf_patcher 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +22 -0
- data/Gemfile +4 -0
- data/LICENSE.txt +22 -0
- data/README.md +29 -0
- data/Rakefile +2 -0
- data/lib/rails3_csrf_patcher.rb +5 -0
- data/lib/rails3_csrf_patcher/patch.rb +56 -0
- data/lib/rails3_csrf_patcher/version.rb +3 -0
- data/lib/tasks/patcher.rake +18 -0
- data/rails3_csrf_patcher.gemspec +23 -0
- metadata +82 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: b6aa8eb909ef56c03cc3c13417f51e40eeb23431
|
4
|
+
data.tar.gz: aabff52582e4e1d72e91e48d9b20fa675029f08b
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 2280e8e23f1dfc50f9809dcff439d77e75e6b1965572fc925a6a9e1e22919ef5de59948bce2c595d7c76a48fd3062dd58cf1a9a73724097c4f6819569bb87547
|
7
|
+
data.tar.gz: 3f7724ecce38a3ccafc583e423adf8815c50297da6f5b8c7a752dcf698b1b42b7c4aea8f31f0850a4b7ea88f18d28f0e67881237b74584d4f8c1c586c833a322
|
data/.gitignore
ADDED
@@ -0,0 +1,22 @@
|
|
1
|
+
*.gem
|
2
|
+
*.rbc
|
3
|
+
.bundle
|
4
|
+
.config
|
5
|
+
.yardoc
|
6
|
+
Gemfile.lock
|
7
|
+
InstalledFiles
|
8
|
+
_yardoc
|
9
|
+
coverage
|
10
|
+
doc/
|
11
|
+
lib/bundler/man
|
12
|
+
pkg
|
13
|
+
rdoc
|
14
|
+
spec/reports
|
15
|
+
test/tmp
|
16
|
+
test/version_tmp
|
17
|
+
tmp
|
18
|
+
*.bundle
|
19
|
+
*.so
|
20
|
+
*.o
|
21
|
+
*.a
|
22
|
+
mkmf.log
|
data/Gemfile
ADDED
data/LICENSE.txt
ADDED
@@ -0,0 +1,22 @@
|
|
1
|
+
Copyright (c) 2015 Maxim Abramchuk
|
2
|
+
|
3
|
+
MIT License
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
6
|
+
a copy of this software and associated documentation files (the
|
7
|
+
"Software"), to deal in the Software without restriction, including
|
8
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
9
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
10
|
+
permit persons to whom the Software is furnished to do so, subject to
|
11
|
+
the following conditions:
|
12
|
+
|
13
|
+
The above copyright notice and this permission notice shall be
|
14
|
+
included in all copies or substantial portions of the Software.
|
15
|
+
|
16
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
17
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
18
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
19
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
20
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
21
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
22
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,29 @@
|
|
1
|
+
# Rails3CsrfPatcher
|
2
|
+
|
3
|
+
TODO: Write a gem description
|
4
|
+
|
5
|
+
## Installation
|
6
|
+
|
7
|
+
Add this line to your application's Gemfile:
|
8
|
+
|
9
|
+
gem 'rails3_csrf_patcher'
|
10
|
+
|
11
|
+
And then execute:
|
12
|
+
|
13
|
+
$ bundle
|
14
|
+
|
15
|
+
Or install it yourself as:
|
16
|
+
|
17
|
+
$ gem install rails3_csrf_patcher
|
18
|
+
|
19
|
+
## Usage
|
20
|
+
|
21
|
+
TODO: Write usage instructions here
|
22
|
+
|
23
|
+
## Contributing
|
24
|
+
|
25
|
+
1. Fork it ( https://github.com/[my-github-username]/rails3_csrf_patcher/fork )
|
26
|
+
2. Create your feature branch (`git checkout -b my-new-feature`)
|
27
|
+
3. Commit your changes (`git commit -am 'Add some feature'`)
|
28
|
+
4. Push to the branch (`git push origin my-new-feature`)
|
29
|
+
5. Create a new Pull Request
|
data/Rakefile
ADDED
@@ -0,0 +1,56 @@
|
|
1
|
+
module ActionController
|
2
|
+
class InvalidCrossOriginRequest < ActionControllerError
|
3
|
+
end
|
4
|
+
|
5
|
+
module RequestForgeryProtection
|
6
|
+
module ClassMethods
|
7
|
+
def protect_from_forgery(options = {})
|
8
|
+
self.request_forgery_protection_token ||= :authenticity_token
|
9
|
+
prepend_before_filter :verify_authenticity_token, options
|
10
|
+
append_after_filter :verify_same_origin_request
|
11
|
+
end
|
12
|
+
end
|
13
|
+
|
14
|
+
protected
|
15
|
+
|
16
|
+
def verify_authenticity_token
|
17
|
+
@marked_for_same_origin_verification = true
|
18
|
+
|
19
|
+
unless verified_request?
|
20
|
+
logger.warn "WARNING: Can't verify CSRF token authenticity" if logger
|
21
|
+
handle_unverified_request
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
CROSS_ORIGIN_JAVASCRIPT_WARNING = "Security warning: an embedded " \
|
26
|
+
"<script> tag on another site requested protected JavaScript. " \
|
27
|
+
"If you know what you're doing, go ahead and disable forgery " \
|
28
|
+
"protection on this action to permit cross-origin JavaScript embedding."
|
29
|
+
private_constant :CROSS_ORIGIN_JAVASCRIPT_WARNING
|
30
|
+
|
31
|
+
# If `verify_authenticity_token` was run (indicating that we have
|
32
|
+
# forgery protection enabled for this request) then also verify that
|
33
|
+
# we aren't serving an unauthorized cross-origin response.
|
34
|
+
def verify_same_origin_request
|
35
|
+
if marked_for_same_origin_verification? && non_xhr_javascript_response?
|
36
|
+
logger.warn CROSS_ORIGIN_JAVASCRIPT_WARNING if logger
|
37
|
+
raise ActionController::InvalidCrossOriginRequest, CROSS_ORIGIN_JAVASCRIPT_WARNING
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
# If the `verify_authenticity_token` before_action ran, verify that
|
42
|
+
# JavaScript responses are only served to same-origin GET requests.
|
43
|
+
def marked_for_same_origin_verification?
|
44
|
+
defined? @marked_for_same_origin_verification
|
45
|
+
end
|
46
|
+
|
47
|
+
# Check for cross-origin JavaScript responses.
|
48
|
+
def non_xhr_javascript_response?
|
49
|
+
content_type =~ %r(\Atext/javascript) && !request.xhr?
|
50
|
+
end
|
51
|
+
|
52
|
+
def handle_unverified_request
|
53
|
+
raise(ActionController::InvalidAuthenticityToken)
|
54
|
+
end
|
55
|
+
end
|
56
|
+
end
|
@@ -0,0 +1,18 @@
|
|
1
|
+
namespace :patcher do
|
2
|
+
desc 'Patch your rails app to protect from the CSRF vulnerability' do
|
3
|
+
task :install do
|
4
|
+
source = File.join(Gem.loaded_specs['rails3_csrf_patcher'].full_gem_path, 'lib/rail3_csrf_patcher/patch.rb')
|
5
|
+
target = File.join(Rails.root, 'config/initializers/')
|
6
|
+
|
7
|
+
FileUtils.cp source, target
|
8
|
+
end
|
9
|
+
end
|
10
|
+
|
11
|
+
desc 'Unpatch your rails app from the CSRF vulnerability protection' do
|
12
|
+
task :uninstall do
|
13
|
+
patch_file = File.join(Gem.loaded_specs['rails3_csrf_patcher'].full_gem_path, 'lib/rail3_csrf_patcher/patch.rb')
|
14
|
+
|
15
|
+
FileUtils.rm patch_file if patch_file.present?
|
16
|
+
end
|
17
|
+
end
|
18
|
+
end
|
@@ -0,0 +1,23 @@
|
|
1
|
+
# coding: utf-8
|
2
|
+
lib = File.expand_path('../lib', __FILE__)
|
3
|
+
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
4
|
+
require 'rails3_csrf_patcher/version'
|
5
|
+
|
6
|
+
Gem::Specification.new do |spec|
|
7
|
+
spec.name = "rails3_csrf_patcher"
|
8
|
+
spec.version = Rails3CsrfPatcher::VERSION
|
9
|
+
spec.authors = ["Maxim Abramchuk"]
|
10
|
+
spec.email = ["maximabramchuck@gmail.com"]
|
11
|
+
spec.summary = %q{Patch your rails app due to protect from the CSRF vulnerability.}
|
12
|
+
spec.description = %q{Patch your rails app due to protect from the CSRF vulnerability.}
|
13
|
+
spec.homepage = "https://github.com/MaximAbramchuck/rails3_csrf_patcher"
|
14
|
+
spec.license = "MIT"
|
15
|
+
|
16
|
+
spec.files = `git ls-files -z`.split("\x0")
|
17
|
+
spec.executables = spec.files.grep(%r{^bin/}) { |f| File.basename(f) }
|
18
|
+
spec.test_files = spec.files.grep(%r{^(test|spec|features)/})
|
19
|
+
spec.require_paths = ["lib"]
|
20
|
+
|
21
|
+
spec.add_development_dependency "bundler", "~> 1.6"
|
22
|
+
spec.add_development_dependency "rake"
|
23
|
+
end
|
metadata
ADDED
@@ -0,0 +1,82 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: rails3_csrf_patcher
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.0.1
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Maxim Abramchuk
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
date: 2015-03-23 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: bundler
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - "~>"
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '1.6'
|
20
|
+
type: :development
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - "~>"
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '1.6'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: rake
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - ">="
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '0'
|
34
|
+
type: :development
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - ">="
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '0'
|
41
|
+
description: Patch your rails app due to protect from the CSRF vulnerability.
|
42
|
+
email:
|
43
|
+
- maximabramchuck@gmail.com
|
44
|
+
executables: []
|
45
|
+
extensions: []
|
46
|
+
extra_rdoc_files: []
|
47
|
+
files:
|
48
|
+
- ".gitignore"
|
49
|
+
- Gemfile
|
50
|
+
- LICENSE.txt
|
51
|
+
- README.md
|
52
|
+
- Rakefile
|
53
|
+
- lib/rails3_csrf_patcher.rb
|
54
|
+
- lib/rails3_csrf_patcher/patch.rb
|
55
|
+
- lib/rails3_csrf_patcher/version.rb
|
56
|
+
- lib/tasks/patcher.rake
|
57
|
+
- rails3_csrf_patcher.gemspec
|
58
|
+
homepage: https://github.com/MaximAbramchuck/rails3_csrf_patcher
|
59
|
+
licenses:
|
60
|
+
- MIT
|
61
|
+
metadata: {}
|
62
|
+
post_install_message:
|
63
|
+
rdoc_options: []
|
64
|
+
require_paths:
|
65
|
+
- lib
|
66
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
67
|
+
requirements:
|
68
|
+
- - ">="
|
69
|
+
- !ruby/object:Gem::Version
|
70
|
+
version: '0'
|
71
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - ">="
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: '0'
|
76
|
+
requirements: []
|
77
|
+
rubyforge_project:
|
78
|
+
rubygems_version: 2.2.2
|
79
|
+
signing_key:
|
80
|
+
specification_version: 4
|
81
|
+
summary: Patch your rails app due to protect from the CSRF vulnerability.
|
82
|
+
test_files: []
|