secure_cookies2 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA256:
3
+ metadata.gz: 4142848af4035583bb4d06f0dd5cd2c389835536d386c68105a733ed06964b41
4
+ data.tar.gz: 682e0f46d1dc106765e4c99dd759c67deccd98039822e3e72c8944c6b694bd03
5
+ SHA512:
6
+ metadata.gz: 22134aba7a75ac4f603a7d74355c8b019453608655701988aef7493ae9d03050e797e7e44d392fdf10a8100530fd986ea423f9839f5283652de1247ad755f5c8
7
+ data.tar.gz: 565616b86b7449080b5a4eb8293a1b27e819ea5c95c998dbd3dc4f2f757b9d5fb73a89dc24ddb3837f5e71a7f26ebcb8f34e74e7f13f9edef74ab4e9cc90790f
data/.gitignore ADDED
@@ -0,0 +1,9 @@
1
+ /.bundle/
2
+ /.yardoc
3
+ /_yardoc/
4
+ /coverage/
5
+ /doc/
6
+ /pkg/
7
+ /spec/reports/
8
+ /tmp/
9
+ Gemfile.lock
data/.ruby-version ADDED
@@ -0,0 +1 @@
1
+ 2.6.1
data/.travis.yml ADDED
@@ -0,0 +1,28 @@
1
+ language: ruby
2
+
3
+ rvm:
4
+ - ruby-head
5
+ - 2.6.1
6
+ - 2.5.0
7
+ - 2.4.3
8
+ - jruby-head
9
+
10
+ env:
11
+ - SUITE=rspec spec
12
+ - SUITE=rubocop
13
+
14
+ script: bundle exec $SUITE
15
+
16
+ matrix:
17
+ allow_failures:
18
+ - rvm: jruby-head
19
+ - rvm: ruby-head
20
+
21
+ before_install:
22
+ - gem update --system
23
+ - gem --version
24
+ - gem update bundler
25
+ bundler_args: --without guard -j 3
26
+
27
+ sudo: false
28
+ cache: bundler
data/Gemfile ADDED
@@ -0,0 +1,23 @@
1
+ # frozen_string_literal: true
2
+ source "https://rubygems.org"
3
+
4
+ gemspec
5
+
6
+ group :test do
7
+ gem "coveralls"
8
+ gem "json"
9
+ gem "pry-nav"
10
+ gem "rack"
11
+ gem "rspec"
12
+ gem "rubocop"
13
+ gem "rubocop-github"
14
+ gem "term-ansicolor"
15
+ gem "tins"
16
+ end
17
+
18
+ group :guard do
19
+ gem "growl"
20
+ gem "guard-rspec"
21
+ gem "rb-fsevent"
22
+ gem "terminal-notifier-guard"
23
+ end
data/Guardfile ADDED
@@ -0,0 +1,13 @@
1
+ # frozen_string_literal: true
2
+ guard :rspec, cmd: "bundle exec rspec", all_on_start: true, all_after_pass: true do
3
+ require "guard/rspec/dsl"
4
+ dsl = Guard::RSpec::Dsl.new(self)
5
+
6
+ # RSpec files
7
+ rspec = dsl.rspec
8
+ watch(rspec.spec_helper) { rspec.spec_dir }
9
+ watch(rspec.spec_support) { rspec.spec_dir }
10
+ watch(rspec.spec_files)
11
+
12
+ watch(%r{^lib/(.+)\.rb$}) { |m| "spec/lib/#{m[1]}_spec.rb" }
13
+ end
data/LICENSE ADDED
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2019 Neil Matatall
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,68 @@
1
+ # SecureCookies
2
+
3
+ SecureCookies is an extract of the cookie functionality from [secure_headers](https://github.com/twitter/secure_headers). Rails has good header support but the cookie support is still lacking. Maybe one day this functionality will be added to rails core.
4
+
5
+ ## Configuration
6
+
7
+ These can be defined in the form of a boolean, or as a Hash for more refined configuration.
8
+
9
+ __Note__: Regardless of the configuration specified, Secure cookies are only enabled for HTTPS requests.
10
+
11
+ #### Defaults
12
+
13
+ By default, all cookies will get both `Secure`, `HttpOnly`, and `SameSite=Lax`.
14
+
15
+ ```ruby
16
+ config.cookies = {
17
+ secure: true, # defaults to true but will be a no op on non-HTTPS requests
18
+ httponly: true, # defaults to true
19
+ samesite: { # defaults to set `SameSite=Lax`
20
+ lax: true
21
+ }
22
+ }
23
+ ```
24
+
25
+ #### Boolean-based configuration
26
+
27
+ Boolean-based configuration is intended to globally enable or disable a specific cookie attribute. *Note: As of 4.0, you must use OPT_OUT rather than false to opt out of the defaults.*
28
+
29
+ ```ruby
30
+ config.cookies = {
31
+ secure: true, # mark all cookies as Secure
32
+ httponly: OPT_OUT, # do not mark any cookies as HttpOnly
33
+ }
34
+ ```
35
+
36
+ #### Hash-based configuration
37
+
38
+ Hash-based configuration allows for fine-grained control.
39
+
40
+ ```ruby
41
+ config.cookies = {
42
+ secure: { except: ['_guest'] }, # mark all but the `_guest` cookie as Secure
43
+ httponly: { only: ['_rails_session'] }, # only mark the `_rails_session` cookie as HttpOnly
44
+ }
45
+ ```
46
+
47
+ #### SameSite cookie configuration
48
+
49
+ SameSite cookies permit either `Strict` or `Lax` enforcement mode options.
50
+
51
+ ```ruby
52
+ config.cookies = {
53
+ samesite: {
54
+ strict: true # mark all cookies as SameSite=Strict
55
+ }
56
+ }
57
+ ```
58
+
59
+ `Strict` and `Lax` enforcement modes can also be specified using a Hash.
60
+
61
+ ```ruby
62
+ config.cookies = {
63
+ samesite: {
64
+ strict: { only: ['_rails_session'] },
65
+ lax: { only: ['_guest'] }
66
+ }
67
+ }
68
+ ```
data/Rakefile ADDED
@@ -0,0 +1,2 @@
1
+ require "bundler/gem_tasks"
2
+ task :default => :spec
data/bin/console ADDED
@@ -0,0 +1,14 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require "bundler/setup"
4
+ require "secure_cookies"
5
+
6
+ # You can add fixtures and/or initialization code here to make experimenting
7
+ # with your gem easier. You can also use a different console, if you like.
8
+
9
+ # (If you use this, don't forget to add pry to your Gemfile!)
10
+ # require "pry"
11
+ # Pry.start
12
+
13
+ require "irb"
14
+ IRB.start(__FILE__)
data/bin/setup ADDED
@@ -0,0 +1,8 @@
1
+ #!/usr/bin/env bash
2
+ set -euo pipefail
3
+ IFS=$'\n\t'
4
+ set -vx
5
+
6
+ bundle install
7
+
8
+ # Do any other automated setup that you need to do here
@@ -0,0 +1,111 @@
1
+ require "secure_cookies/cookie"
2
+ require "secure_cookies/middleware"
3
+ require "secure_cookies/railtie"
4
+ require "secure_cookies/version"
5
+
6
+ module SecureCookies
7
+ OPT_OUT = Object.new
8
+
9
+ DEFAULT_CONFIG = {
10
+ secure: true, # defaults to true but will be a no op on non-HTTPS requests
11
+ httponly: true, # defaults to true
12
+ samesite: { # defaults to set `SameSite=Lax`
13
+ lax: true
14
+ }
15
+ }
16
+
17
+ class << self
18
+ def config
19
+ @config || DEFAULT_CONFIG
20
+ end
21
+ def config=(configuration)
22
+ raise RuntimeError, "Already configured" if @config
23
+ @config = configuration
24
+ @config.freeze
25
+ validate!
26
+ end
27
+
28
+ def validate!
29
+ return if config == OPT_OUT
30
+ validate_config!
31
+ validate_secure_config! unless config[:secure].nil?
32
+ validate_httponly_config! unless config[:httponly].nil?
33
+ validate_samesite_config! unless config[:samesite].nil?
34
+ end
35
+
36
+ private
37
+
38
+ def validate_config!
39
+ raise CookiesConfigError.new("config must be a hash.") unless is_hash?(config)
40
+ end
41
+
42
+ def validate_secure_config!
43
+ validate_hash_or_true_or_opt_out!(:secure)
44
+ validate_exclusive_use_of_hash_constraints!(config[:secure], :secure)
45
+ end
46
+
47
+ def validate_httponly_config!
48
+ validate_hash_or_true_or_opt_out!(:httponly)
49
+ validate_exclusive_use_of_hash_constraints!(config[:httponly], :httponly)
50
+ end
51
+
52
+ def validate_samesite_config!
53
+ return if config[:samesite] == OPT_OUT
54
+ raise CookiesConfigError.new("samesite cookie config must be a hash") unless is_hash?(config[:samesite])
55
+
56
+ validate_samesite_boolean_config!
57
+ validate_samesite_hash_config!
58
+ end
59
+
60
+ # when configuring with booleans, only one enforcement is permitted
61
+ def validate_samesite_boolean_config!
62
+ if config[:samesite].key?(:lax) && config[:samesite][:lax].is_a?(TrueClass) && config[:samesite].key?(:strict)
63
+ raise CookiesConfigError.new("samesite cookie config is invalid, combination use of booleans and Hash to configure lax and strict enforcement is not permitted.")
64
+ elsif config[:samesite].key?(:strict) && config[:samesite][:strict].is_a?(TrueClass) && config[:samesite].key?(:lax)
65
+ raise CookiesConfigError.new("samesite cookie config is invalid, combination use of booleans and Hash to configure lax and strict enforcement is not permitted.")
66
+ end
67
+ end
68
+
69
+ def validate_samesite_hash_config!
70
+ # validate Hash-based samesite configuration
71
+ if is_hash?(config[:samesite][:lax])
72
+ validate_exclusive_use_of_hash_constraints!(config[:samesite][:lax], "samesite lax")
73
+
74
+ if is_hash?(config[:samesite][:strict])
75
+ validate_exclusive_use_of_hash_constraints!(config[:samesite][:strict], "samesite strict")
76
+ validate_exclusive_use_of_samesite_enforcement!(:only)
77
+ validate_exclusive_use_of_samesite_enforcement!(:except)
78
+ end
79
+ end
80
+ end
81
+
82
+ def validate_hash_or_true_or_opt_out!(attribute)
83
+ if !(is_hash?(config[attribute]) || is_true_or_opt_out?(config[attribute]))
84
+ raise CookiesConfigError.new("#{attribute} cookie config must be a hash, true, or SecureCookies::OPT_OUT")
85
+ end
86
+ end
87
+
88
+ # validate exclusive use of only or except but not both at the same time
89
+ def validate_exclusive_use_of_hash_constraints!(conf, attribute)
90
+ return unless is_hash?(conf)
91
+ if conf.key?(:only) && conf.key?(:except)
92
+ raise CookiesConfigError.new("#{attribute} cookie config is invalid, simultaneous use of conditional arguments `only` and `except` is not permitted.")
93
+ end
94
+ end
95
+
96
+ # validate exclusivity of only and except members within strict and lax
97
+ def validate_exclusive_use_of_samesite_enforcement!(attribute)
98
+ if (intersection = (config[:samesite][:lax].fetch(attribute, []) & config[:samesite][:strict].fetch(attribute, []))).any?
99
+ raise CookiesConfigError.new("samesite cookie config is invalid, cookie(s) #{intersection.join(', ')} cannot be enforced as lax and strict")
100
+ end
101
+ end
102
+
103
+ def is_hash?(obj)
104
+ obj && obj.is_a?(Hash)
105
+ end
106
+
107
+ def is_true_or_opt_out?(obj)
108
+ obj && (obj.is_a?(TrueClass) || obj == OPT_OUT)
109
+ end
110
+ end
111
+ end
@@ -0,0 +1,135 @@
1
+ # frozen_string_literal: true
2
+ require "cgi"
3
+
4
+ module SecureCookies
5
+ class CookiesConfigError < StandardError; end
6
+ class Cookie
7
+ attr_reader :raw_cookie, :config
8
+
9
+ COOKIE_DEFAULTS = {
10
+ httponly: true,
11
+ secure: true,
12
+ samesite: { lax: true },
13
+ }.freeze
14
+
15
+ def initialize(cookie, config)
16
+ @raw_cookie = cookie
17
+ unless config == OPT_OUT
18
+ config ||= {}
19
+ config = COOKIE_DEFAULTS.merge(config)
20
+ end
21
+ @config = config
22
+ @attributes = {
23
+ httponly: nil,
24
+ samesite: nil,
25
+ secure: nil,
26
+ }
27
+
28
+ parse(cookie)
29
+ end
30
+
31
+ def to_s
32
+ @raw_cookie.dup.tap do |c|
33
+ c << "; secure" if secure?
34
+ c << "; HttpOnly" if httponly?
35
+ c << "; #{samesite_cookie}" if samesite?
36
+ end
37
+ end
38
+
39
+ def secure?
40
+ flag_cookie?(:secure) && !already_flagged?(:secure)
41
+ end
42
+
43
+ def httponly?
44
+ flag_cookie?(:httponly) && !already_flagged?(:httponly)
45
+ end
46
+
47
+ def samesite?
48
+ flag_samesite? && !already_flagged?(:samesite)
49
+ end
50
+
51
+ private
52
+
53
+ def parsed_cookie
54
+ @parsed_cookie ||= CGI::Cookie.parse(raw_cookie)
55
+ end
56
+
57
+ def already_flagged?(attribute)
58
+ @attributes[attribute]
59
+ end
60
+
61
+ def flag_cookie?(attribute)
62
+ return false if config == OPT_OUT
63
+ case config[attribute]
64
+ when TrueClass
65
+ true
66
+ when Hash
67
+ conditionally_flag?(config[attribute])
68
+ else
69
+ false
70
+ end
71
+ end
72
+
73
+ def conditionally_flag?(configuration)
74
+ if(Array(configuration[:only]).any? && (Array(configuration[:only]) & parsed_cookie.keys).any?)
75
+ true
76
+ elsif(Array(configuration[:except]).any? && (Array(configuration[:except]) & parsed_cookie.keys).none?)
77
+ true
78
+ else
79
+ false
80
+ end
81
+ end
82
+
83
+ def samesite_cookie
84
+ if flag_samesite_lax?
85
+ "SameSite=Lax"
86
+ elsif flag_samesite_strict?
87
+ "SameSite=Strict"
88
+ end
89
+ end
90
+
91
+ def flag_samesite?
92
+ return false if config == OPT_OUT || config[:samesite] == OPT_OUT
93
+ flag_samesite_lax? || flag_samesite_strict?
94
+ end
95
+
96
+ def flag_samesite_lax?
97
+ flag_samesite_enforcement?(:lax)
98
+ end
99
+
100
+ def flag_samesite_strict?
101
+ flag_samesite_enforcement?(:strict)
102
+ end
103
+
104
+ def flag_samesite_enforcement?(mode)
105
+ return unless config[:samesite]
106
+
107
+ if config[:samesite].is_a?(TrueClass) && mode == :lax
108
+ return true
109
+ end
110
+
111
+ case config[:samesite][mode]
112
+ when Hash
113
+ conditionally_flag?(config[:samesite][mode])
114
+ when TrueClass
115
+ true
116
+ else
117
+ false
118
+ end
119
+ end
120
+
121
+ def parse(cookie)
122
+ return unless cookie
123
+
124
+ cookie.split(/[;,]\s?/).each do |pairs|
125
+ name, values = pairs.split("=", 2)
126
+ name = CGI.unescape(name)
127
+
128
+ attribute = name.downcase.to_sym
129
+ if @attributes.has_key?(attribute)
130
+ @attributes[attribute] = values || true
131
+ end
132
+ end
133
+ end
134
+ end
135
+ end
@@ -0,0 +1,55 @@
1
+ # frozen_string_literal: true
2
+ module SecureCookies
3
+ class Middleware
4
+ def initialize(app)
5
+ @app = app
6
+ end
7
+
8
+ # merges the hash of headers into the current header set.
9
+ def call(env)
10
+ req = Rack::Request.new(env)
11
+ status, headers, response = @app.call(env)
12
+
13
+ unless SecureCookies.config == OPT_OUT
14
+ flag_cookies!(headers, override_secure(env, SecureCookies.config))
15
+ end
16
+
17
+ [status, headers, response]
18
+ end
19
+
20
+ private
21
+
22
+ # inspired by https://github.com/tobmatth/rack-ssl-enforcer/blob/6c014/lib/rack/ssl-enforcer.rb#L183-L194
23
+ def flag_cookies!(headers, config)
24
+ if cookies = headers["Set-Cookie"]
25
+ # Support Rails 2.3 / Rack 1.1 arrays as headers
26
+ cookies = cookies.split("\n") unless cookies.is_a?(Array)
27
+
28
+ headers["Set-Cookie"] = cookies.map do |cookie|
29
+ SecureCookies::Cookie.new(cookie, config).to_s
30
+ end.join("\n")
31
+ end
32
+ end
33
+
34
+ # disable Secure cookies for non-https requests
35
+ def override_secure(env, config = {})
36
+ if scheme(env) != "https" && config != OPT_OUT
37
+ config = config.dup
38
+ config[:secure] = OPT_OUT
39
+ end
40
+
41
+ config
42
+ end
43
+
44
+ # derived from https://github.com/tobmatth/rack-ssl-enforcer/blob/6c014/lib/rack/ssl-enforcer.rb#L119
45
+ def scheme(env)
46
+ if env["HTTPS"] == "on" || env["HTTP_X_SSL_REQUEST"] == "on"
47
+ "https"
48
+ elsif env["HTTP_X_FORWARDED_PROTO"]
49
+ env["HTTP_X_FORWARDED_PROTO"].split(",")[0]
50
+ else
51
+ env["rack.url_scheme"]
52
+ end
53
+ end
54
+ end
55
+ end
@@ -0,0 +1,13 @@
1
+ # frozen_string_literal: true
2
+ # rails 3.1+
3
+ if defined?(Rails::Railtie)
4
+ module SecureCookies
5
+ class Railtie < Rails::Railtie
6
+ isolate_namespace SecureCookies if defined? isolate_namespace # rails 3.0
7
+
8
+ initializer "secure_cookies.middleware" do
9
+ Rails.application.config.middleware.insert_before 0, SecureCookies::Middleware
10
+ end
11
+ end
12
+ end
13
+ end
@@ -0,0 +1,3 @@
1
+ module SecureCookies
2
+ VERSION = "0.1.0"
3
+ end
@@ -0,0 +1,38 @@
1
+
2
+ lib = File.expand_path("../lib", __FILE__)
3
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
4
+ require "secure_cookies/version"
5
+
6
+ Gem::Specification.new do |spec|
7
+ spec.name = "secure_cookies2"
8
+ spec.version = SecureCookies::VERSION
9
+ spec.authors = ["Neil Matatall"]
10
+ spec.email = ["oreoshake@users.noreply.github.com"]
11
+
12
+ spec.summary = %q{Automatically marks all cookies as secure, httponly, and samesite=lax}
13
+ spec.description = %q{Secure your cookies with an API for opting out}
14
+ spec.homepage = "https://github.com/oreoshake/secure_cookies"
15
+
16
+ # Prevent pushing this gem to RubyGems.org. To allow pushes either set the 'allowed_push_host'
17
+ # to allow pushing to a single host or delete this section to allow pushing to any host.
18
+ if spec.respond_to?(:metadata)
19
+ spec.metadata["homepage_uri"] = spec.homepage
20
+ spec.metadata["source_code_uri"] = "https://github.com/oreoshake/secure_cookies"
21
+ spec.metadata["changelog_uri"] = "https://github.com/oreoshake/secure_cookies/CHANGELOG"
22
+ else
23
+ raise "RubyGems 2.0 or newer is required to protect against " \
24
+ "public gem pushes."
25
+ end
26
+
27
+ # Specify which files should be added to the gem when it is released.
28
+ # The `git ls-files -z` loads the files in the RubyGem that have been added into git.
29
+ spec.files = Dir.chdir(File.expand_path('..', __FILE__)) do
30
+ `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
31
+ end
32
+ spec.bindir = "exe"
33
+ spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
34
+ spec.require_paths = ["lib"]
35
+
36
+ spec.add_development_dependency "bundler", "~> 2.0"
37
+ spec.add_development_dependency "rake", "~> 10.0"
38
+ end
metadata ADDED
@@ -0,0 +1,89 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: secure_cookies2
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Neil Matatall
8
+ autorequire:
9
+ bindir: exe
10
+ cert_chain: []
11
+ date: 2019-02-23 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: bundler
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '2.0'
20
+ type: :development
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '2.0'
27
+ - !ruby/object:Gem::Dependency
28
+ name: rake
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '10.0'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '10.0'
41
+ description: Secure your cookies with an API for opting out
42
+ email:
43
+ - oreoshake@users.noreply.github.com
44
+ executables: []
45
+ extensions: []
46
+ extra_rdoc_files: []
47
+ files:
48
+ - ".gitignore"
49
+ - ".ruby-version"
50
+ - ".travis.yml"
51
+ - Gemfile
52
+ - Guardfile
53
+ - LICENSE
54
+ - README.md
55
+ - Rakefile
56
+ - bin/console
57
+ - bin/setup
58
+ - lib/secure_cookies.rb
59
+ - lib/secure_cookies/cookie.rb
60
+ - lib/secure_cookies/middleware.rb
61
+ - lib/secure_cookies/railtie.rb
62
+ - lib/secure_cookies/version.rb
63
+ - secure_cookies.gemspec
64
+ homepage: https://github.com/oreoshake/secure_cookies
65
+ licenses: []
66
+ metadata:
67
+ homepage_uri: https://github.com/oreoshake/secure_cookies
68
+ source_code_uri: https://github.com/oreoshake/secure_cookies
69
+ changelog_uri: https://github.com/oreoshake/secure_cookies/CHANGELOG
70
+ post_install_message:
71
+ rdoc_options: []
72
+ require_paths:
73
+ - lib
74
+ required_ruby_version: !ruby/object:Gem::Requirement
75
+ requirements:
76
+ - - ">="
77
+ - !ruby/object:Gem::Version
78
+ version: '0'
79
+ required_rubygems_version: !ruby/object:Gem::Requirement
80
+ requirements:
81
+ - - ">="
82
+ - !ruby/object:Gem::Version
83
+ version: '0'
84
+ requirements: []
85
+ rubygems_version: 3.0.1
86
+ signing_key:
87
+ specification_version: 4
88
+ summary: Automatically marks all cookies as secure, httponly, and samesite=lax
89
+ test_files: []