Commit graph

7 commits

Author SHA1 Message Date
taca
e000f4c1bd Update ruby-rack-protection to 1.5.3.
* Discard invalid Referer header.
  If an invalid Referer header such as "http://example.com/bad|uri" is
  provided, ignore the value of it and skip using the Host header fallback.
* refactor instantiation.
* fix typoed header name.
* clarify reaction warning, test it.
2015-03-13 17:26:00 +00:00
taca
370c6fc6b0 Update ruby-rack-protection to 1.5.2.
Changes are not available, please refer commit log:
<https://github.com/rkh/rack-protection/commits/master>.
2014-03-14 19:24:32 +00:00
taca
d080636622 Update ruby-rack-protection to 1.5.0.
* Add a `report` reaction.
  This reaction does not halt the request, but leaves it up to the app to
  react on this information.  This allows e.g. frameworks to ignore failures
  in certain conditions.
2013-03-17 16:16:39 +00:00
taca
0e38a2316c Update ruby-rack-protection to 1.4.0.
* fix docs
* Introducing :use
* remove note about NoReferrer
*  xhr requests cannot be used for the json attack, fixes #39
2013-03-10 13:07:29 +00:00
taca
237efd95c9 Update ruby-rack-protection to 1.3.2.
No changes are available, Various bug fixes and improvement.
2013-01-17 12:43:34 +00:00
obache
38e85effb4 Update ruby-rack-protection to 1.2.0.
Changes:
* Show warnings for JsonCsrtf attacks.
* do not enable parameter escaping by default, fixes #8.
* Use more specific namespace declaration in Rack::Builder configuration.
* NotimpelentedError typo fix
* add test that makes sure passingin on :track option works. related to #6.
* deal with PATH_INFO being nil, fixes #7.
* do not track HTTP_VERSION, fixes #6.
2012-01-08 03:01:22 +00:00
taca
ad2ee011bb Importing www/ruby-rack-protection pacakge version 1.1.4.
Rack::Protection

You should use protection!

This gem protects against typical web attacks.
Should work for all Rack apps, including Rails.
2011-12-16 15:28:34 +00:00