mirror of
https://github.com/rails/rails.git
synced 2022-11-09 12:12:34 -05:00
287920ca7d
If they're not set we'll still fall back to localhost, but this makes it possible to run the tests against a remote Postgres / Redis / whatever.
92 lines
2.7 KiB
Ruby
92 lines
2.7 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require "rack"
|
|
require "rails"
|
|
require "action_controller/railtie"
|
|
require "action_view/railtie"
|
|
require "blade"
|
|
require "json"
|
|
|
|
module UJS
|
|
class Server < Rails::Application
|
|
routes.append do
|
|
get "/rails-ujs.js" => Blade::Assets.environment
|
|
get "/" => "tests#index"
|
|
match "/echo" => "tests#echo", via: :all
|
|
get "/error" => proc { |env| [403, {}, []] }
|
|
end
|
|
|
|
config.cache_classes = false
|
|
config.eager_load = false
|
|
config.secret_key_base = "59d7a4dbd349fa3838d79e330e39690fc22b931e7dc17d9162f03d633d526fbb92dfdb2dc9804c8be3e199631b9c1fbe43fc3e4fc75730b515851849c728d5c7"
|
|
config.paths["app/views"].unshift("#{Rails.root}/views")
|
|
config.public_file_server.enabled = true
|
|
config.logger = Logger.new(STDOUT)
|
|
config.log_level = :error
|
|
config.hosts << proc { true }
|
|
|
|
config.content_security_policy do |policy|
|
|
policy.default_src :self, :https
|
|
policy.font_src :self, :https, :data
|
|
policy.img_src :self, :https, :data
|
|
policy.object_src :none
|
|
policy.script_src :self, :https
|
|
policy.style_src :self, :https
|
|
end
|
|
|
|
config.content_security_policy_nonce_generator = ->(req) { SecureRandom.base64(16) }
|
|
end
|
|
end
|
|
|
|
module TestsHelper
|
|
def test_to(*names)
|
|
names = names.map { |name| "/test/#{name}.js" }
|
|
names = %w[/vendor/qunit.js /test/settings.js] + names
|
|
|
|
capture do
|
|
names.each do |name|
|
|
concat(javascript_include_tag(name))
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
class TestsController < ActionController::Base
|
|
helper TestsHelper
|
|
layout "application"
|
|
|
|
def index
|
|
render :index
|
|
end
|
|
|
|
def echo
|
|
data = { params: params.to_unsafe_h }.update(request.env)
|
|
|
|
if params[:content_type] && params[:content]
|
|
render inline: params[:content], content_type: params[:content_type]
|
|
elsif request.xhr?
|
|
if params[:with_xhr_redirect]
|
|
response.set_header("X-Xhr-Redirect", "http://example.com/")
|
|
render inline: %{Turbolinks.clearCache()\nTurbolinks.visit("http://example.com/", {"action":"replace"})}
|
|
else
|
|
render json: JSON.generate(data)
|
|
end
|
|
elsif params[:iframe]
|
|
payload = JSON.generate(data).gsub("<", "<").gsub(">", ">")
|
|
html = <<-HTML
|
|
<script nonce="#{request.content_security_policy_nonce}">
|
|
if (window.top && window.top !== window)
|
|
window.top.jQuery.event.trigger('iframe:loaded', #{payload})
|
|
</script>
|
|
<p>You shouldn't be seeing this. <a href="#{request.env['HTTP_REFERER']}">Go back</a></p>
|
|
HTML
|
|
|
|
render html: html.html_safe
|
|
else
|
|
render plain: "ERROR: #{request.path} requested without ajax", status: 404
|
|
end
|
|
end
|
|
end
|
|
|
|
Blade.initialize!
|
|
UJS::Server.initialize!
|