secure_headers 1.4.1 → 2.0.0.pre
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of secure_headers might be problematic. Click here for more details.
- checksums.yaml +7 -0
- data/.gitignore +4 -8
- data/Gemfile +2 -2
- data/Guardfile +8 -0
- data/README.md +102 -48
- data/Rakefile +0 -116
- data/fixtures/rails_3_2_12/app/views/layouts/application.html.erb +1 -1
- data/fixtures/rails_3_2_12/app/views/other_things/index.html.erb +2 -1
- data/fixtures/rails_3_2_12/config/initializers/secure_headers.rb +1 -1
- data/fixtures/rails_3_2_12/config/script_hashes.yml +5 -0
- data/fixtures/rails_3_2_12/config.ru +3 -0
- data/fixtures/rails_3_2_12/spec/controllers/other_things_controller_spec.rb +50 -18
- data/fixtures/rails_3_2_12/spec/controllers/things_controller_spec.rb +1 -1
- data/fixtures/rails_3_2_12_no_init/app/controllers/other_things_controller.rb +1 -2
- data/lib/secure_headers/hash_helper.rb +7 -0
- data/lib/secure_headers/headers/content_security_policy/script_hash_middleware.rb +22 -0
- data/lib/secure_headers/headers/content_security_policy.rb +141 -137
- data/lib/secure_headers/railtie.rb +0 -22
- data/lib/secure_headers/version.rb +1 -1
- data/lib/secure_headers/view_helper.rb +68 -0
- data/lib/secure_headers.rb +51 -17
- data/lib/tasks/tasks.rake +48 -0
- data/spec/lib/secure_headers/headers/content_security_policy/script_hash_middleware_spec.rb +47 -0
- data/spec/lib/secure_headers/headers/content_security_policy_spec.rb +83 -208
- data/spec/lib/secure_headers_spec.rb +16 -62
- data/spec/spec_helper.rb +25 -1
- metadata +22 -24
- data/HISTORY.md +0 -162
- data/app/controllers/content_security_policy_controller.rb +0 -76
- data/config/curl-ca-bundle.crt +0 -5420
- data/config/routes.rb +0 -3
- data/spec/controllers/content_security_policy_controller_spec.rb +0 -90
data/config/routes.rb
DELETED
@@ -1,90 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
describe ContentSecurityPolicyController do
|
4
|
-
let(:params) {
|
5
|
-
{
|
6
|
-
"csp-report" => {
|
7
|
-
"document-uri" => "http://localhost:3001/csp","violated-directive" => "script-src 'none'",
|
8
|
-
"original-policy" => "default-src https://* 'unsafe-eval'; frame-src 'self'; img-src https://*; report-uri http://localhost:3001/scribes/csp_report; script-src 'none'; style-src 'unsafe-inline' 'self';",
|
9
|
-
"blocked-uri" => "http://localhost:3001/stuff.js"
|
10
|
-
}
|
11
|
-
}
|
12
|
-
}
|
13
|
-
|
14
|
-
class FakeRequest
|
15
|
-
def user_agent
|
16
|
-
"Foo"
|
17
|
-
end
|
18
|
-
def env
|
19
|
-
{"HTTP_X_FORWARDED_FOR" => ""}
|
20
|
-
end
|
21
|
-
def remote_ip
|
22
|
-
"123.12.45.67"
|
23
|
-
end
|
24
|
-
def content_type
|
25
|
-
"application/json"
|
26
|
-
end
|
27
|
-
end
|
28
|
-
|
29
|
-
describe "#csp" do
|
30
|
-
let(:request) { double().as_null_object }
|
31
|
-
let(:endpoint) { "https://example.com" }
|
32
|
-
let(:secondary_endpoint) { "https://internal.example.com" }
|
33
|
-
|
34
|
-
before(:each) do
|
35
|
-
allow(SecureHeaders::Configuration).to receive(:csp).and_return({:report_uri => endpoint, :forward_endpoint => secondary_endpoint})
|
36
|
-
expect(subject).to receive :head
|
37
|
-
allow(subject).to receive(:params).and_return(params)
|
38
|
-
allow(subject).to receive(:request).and_return(FakeRequest.new)
|
39
|
-
allow_any_instance_of(Net::HTTP).to receive(:request)
|
40
|
-
end
|
41
|
-
|
42
|
-
context "delivery endpoint" do
|
43
|
-
it "posts over ssl" do
|
44
|
-
expect(subject).to receive(:use_ssl)
|
45
|
-
subject.scribe
|
46
|
-
end
|
47
|
-
|
48
|
-
it "posts over plain http" do
|
49
|
-
allow(SecureHeaders::Configuration).to receive(:csp).and_return(:report_uri => 'http://example.com')
|
50
|
-
expect(subject).not_to receive(:use_ssl)
|
51
|
-
subject.scribe
|
52
|
-
end
|
53
|
-
end
|
54
|
-
|
55
|
-
it "makes a POST request" do
|
56
|
-
allow(Net::HTTP).to receive(:new).and_return(request)
|
57
|
-
expect(request).to receive(:request).with(instance_of(::Net::HTTP::Post))
|
58
|
-
allow(params).to receive(:to_json)
|
59
|
-
subject.scribe
|
60
|
-
end
|
61
|
-
|
62
|
-
it "POSTs to the configured forward_endpoint" do
|
63
|
-
expect(Net::HTTP::Post).to receive(:new).with(secondary_endpoint).and_return(request)
|
64
|
-
subject.scribe
|
65
|
-
end
|
66
|
-
|
67
|
-
it "does not POST if there is no forwarder configured" do
|
68
|
-
allow(SecureHeaders::Configuration).to receive(:csp).and_return({})
|
69
|
-
expect(Net::HTTP::Post).not_to receive(:new)
|
70
|
-
subject.scribe
|
71
|
-
end
|
72
|
-
|
73
|
-
it "eliminates known phony CSP reports" do
|
74
|
-
allow(SecureHeaders::Configuration).to receive(:csp).and_return(:report_uri => nil)
|
75
|
-
expect(Net::HTTP::Post).not_to receive :new
|
76
|
-
subject.scribe
|
77
|
-
end
|
78
|
-
|
79
|
-
it "logs errors when it cannot forward the CSP report" do
|
80
|
-
class Rails; def logger; end; end
|
81
|
-
logger = double(:repond_to? => true)
|
82
|
-
allow(Rails).to receive(:logger).and_return(logger)
|
83
|
-
|
84
|
-
allow(SecureHeaders::Configuration).to receive(:csp).and_raise(StandardError)
|
85
|
-
|
86
|
-
expect(logger).to receive(:warn)
|
87
|
-
subject.scribe
|
88
|
-
end
|
89
|
-
end
|
90
|
-
end
|