secure_headers 3.6.2 → 3.6.3

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of secure_headers might be problematic. Click here for more details.

checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 8c3666c9bb44c2f8f0d9a441150a3ca4c8d15b33
4
- data.tar.gz: 33ae40721f89cdec7721a8332b746729d519507a
3
+ metadata.gz: dd5f78a40f8d31a380fcd970d120e6347c2bd6e2
4
+ data.tar.gz: 2dc3822aa77da59d2d2210137ad0ae76f0311911
5
5
  SHA512:
6
- metadata.gz: a4fb6ccbfd0b5fb40dc6631a0ec936f30782a9d2791984500b46d00f3ed09626f0bc53ad9c4b334ac69248af98b5e7b4af73a240ec69fd04eecc7c0c4f5c79d6
7
- data.tar.gz: f12ae55d6a6992a02d9126154c45b944bec8ae61b6ebcdac0a2e22ebcfaf7d5dff827e6a14253f01a5f563e5c827af295105d7b994a16f9974ca132766ddf63e
6
+ metadata.gz: da1e539890120c9612cc425fd2502f6f59e43eafb78ca5cfa45f192dc73ae2b52b43ad8f495c65621ea4db082a0bb3004881d89084423614449e222f21240890
7
+ data.tar.gz: 6a998c6542b3ffbd0852c731007f4cec605c9029464396002083c8415df6a9eae515c3035357f745d86f9d5c56ae451fcc66846b4f30e13ba8e8f9e425c651b2
@@ -1,3 +1,7 @@
1
+ ## 3.6.3
2
+
3
+ Remove deprecation warning when setting `frame-src`. It is no longer deprecated.
4
+
1
5
  ## 3.6.2
2
6
 
3
7
  Now that Safari 10 supports nonces and it appears to work, enable the nonce feature for safari.
@@ -0,0 +1,46 @@
1
+ # Contributor Covenant Code of Conduct
2
+
3
+ ## Our Pledge
4
+
5
+ In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation.
6
+
7
+ ## Our Standards
8
+
9
+ Examples of behavior that contributes to creating a positive environment include:
10
+
11
+ * Using welcoming and inclusive language
12
+ * Being respectful of differing viewpoints and experiences
13
+ * Gracefully accepting constructive criticism
14
+ * Focusing on what is best for the community
15
+ * Showing empathy towards other community members
16
+
17
+ Examples of unacceptable behavior by participants include:
18
+
19
+ * The use of sexualized language or imagery and unwelcome sexual attention or advances
20
+ * Trolling, insulting/derogatory comments, and personal or political attacks
21
+ * Public or private harassment
22
+ * Publishing others' private information, such as a physical or electronic address, without explicit permission
23
+ * Other conduct which could reasonably be considered inappropriate in a professional setting
24
+
25
+ ## Our Responsibilities
26
+
27
+ Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior.
28
+
29
+ Project maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful.
30
+
31
+ ## Scope
32
+
33
+ This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.
34
+
35
+ ## Enforcement
36
+
37
+ Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at neil.matatall@gmail.com. The project team will review and investigate all complaints, and will respond in a way that it deems appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
38
+
39
+ Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership.
40
+
41
+ ## Attribution
42
+
43
+ This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4, available at [http://contributor-covenant.org/version/1/4][version]
44
+
45
+ [homepage]: http://contributor-covenant.org
46
+ [version]: http://contributor-covenant.org/version/1/4/
@@ -0,0 +1,43 @@
1
+ ## Contributing
2
+
3
+ [fork]: https://github.com/twitter/secureheaders/fork
4
+ [pr]: https://github.com/twitter/secureheaders/compare
5
+ [style]: https://github.com/styleguide/ruby
6
+ [code-of-conduct]: CODE_OF_CONDUCT.md
7
+
8
+ Hi there! We're thrilled that you'd like to contribute to this project. Your help is essential for keeping it great.
9
+
10
+ Please note that this project is released with a [Contributor Code of Conduct][code-of-conduct]. By participating in this project you agree to abide by its terms.
11
+
12
+ ## Submitting a pull request
13
+
14
+ 0. [Fork][fork] and clone the repository
15
+ 0. Configure and install the dependencies: `bundle install`
16
+ 0. Make sure the tests pass on your machine: `bundle exec rspec spec`
17
+ 0. Create a new branch: `git checkout -b my-branch-name`
18
+ 0. Make your change, add tests, and make sure the tests still pass
19
+ 0. Push to your fork and [submit a pull request][pr]
20
+ 0. Pat your self on the back and wait for your pull request to be reviewed and merged.
21
+
22
+ Here are a few things you can do that will increase the likelihood of your pull request being accepted:
23
+
24
+ - Write tests.
25
+ - Keep your change as focused as possible. If there are multiple changes you would like to make that are not dependent upon each other, consider submitting them as separate pull requests.
26
+ - Write a [good commit message](http://tbaggery.com/2008/04/19/a-note-about-git-commit-messages.html).
27
+
28
+ ## Releasing
29
+
30
+ 0. Ensure CI is green
31
+ 0. Pull the latest code
32
+ 0. Increment the version
33
+ 0. Run `gem build darrrr.gemspec`
34
+ 0. Bump the Gemfile and Gemfile.lock versions for an app which relies on this gem
35
+ 0. Test behavior locally, branch deploy, whatever needs to happen
36
+ 0. Run `bundle exec rake release`
37
+
38
+ ## Resources
39
+
40
+ - [How to Contribute to Open Source](https://opensource.guide/how-to-contribute/)
41
+ - [Using Pull Requests](https://help.github.com/articles/about-pull-requests/)
42
+
43
+
@@ -59,8 +59,6 @@ module SecureHeaders
59
59
  def normalize_child_frame_src
60
60
  if @config.frame_src && @config.child_src && @config.frame_src != @config.child_src
61
61
  Kernel.warn("#{Kernel.caller.first}: [DEPRECATION] both :child_src and :frame_src supplied and do not match. This can lead to inconsistent behavior across browsers.")
62
- elsif @config.frame_src
63
- Kernel.warn("#{Kernel.caller.first}: [DEPRECATION] :frame_src is deprecated, use :child_src instead. Provided: #{@config.frame_src}.")
64
62
  end
65
63
 
66
64
  if supported_directives.include?(:child_src)
@@ -1,10 +1,10 @@
1
1
  # -*- encoding: utf-8 -*-
2
2
  Gem::Specification.new do |gem|
3
3
  gem.name = "secure_headers"
4
- gem.version = "3.6.2"
4
+ gem.version = "3.6.3"
5
5
  gem.authors = ["Neil Matatall"]
6
6
  gem.email = ["neil.matatall@gmail.com"]
7
- gem.description = 'Security related headers all in one gem.'
7
+ gem.description = 'Manages application of security headers with many safe defaults.'
8
8
  gem.summary = 'Add easily configured security headers to responses
9
9
  including content-security-policy, x-frame-options,
10
10
  strict-transport-security, etc.'
@@ -86,8 +86,8 @@ module SecureHeaders
86
86
  expect(csp.value).to eq("default-src example.org")
87
87
  end
88
88
 
89
- it "emits a warning when using frame-src" do
90
- expect(Kernel).to receive(:warn).with(/:frame_src is deprecated, use :child_src instead./)
89
+ it "does not emit a warning when using frame-src" do
90
+ expect(Kernel).to_not receive(:warn)
91
91
  ContentSecurityPolicy.new(default_src: %w('self'), frame_src: %w('self')).value
92
92
  end
93
93
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: secure_headers
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.6.2
4
+ version: 3.6.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - Neil Matatall
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-03-03 00:00:00.000000000 Z
11
+ date: 2017-04-25 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rake
@@ -38,7 +38,7 @@ dependencies:
38
38
  - - ">="
39
39
  - !ruby/object:Gem::Version
40
40
  version: '0'
41
- description: Security related headers all in one gem.
41
+ description: Manages application of security headers with many safe defaults.
42
42
  email:
43
43
  - neil.matatall@gmail.com
44
44
  executables: []
@@ -53,6 +53,8 @@ files:
53
53
  - ".ruby-version"
54
54
  - ".travis.yml"
55
55
  - CHANGELOG.md
56
+ - CODE_OF_CONDUCT.md
57
+ - CONTRIBUTING.md
56
58
  - Gemfile
57
59
  - Guardfile
58
60
  - LICENSE