1
0
Fork 0
mirror of https://github.com/sinatra/sinatra synced 2023-03-27 23:18:01 -04:00

remove "not yet implemented" comments if not true

This commit is contained in:
Konstantin Haase 2011-06-19 14:54:29 +02:00
parent 899fa10b95
commit 7a452035e9
6 changed files with 0 additions and 12 deletions

View file

@ -11,8 +11,6 @@ module Rack
# included in the session.
#
# Compatible with Rails and rack-csrf.
#
# Not Yet Implemented!
class AuthenticityToken < Base
def accepts?(env)
return true if safe? env

View file

@ -12,8 +12,6 @@ module Rack
#
# This middleware is not used when using the Rack::Protection collection,
# since it renders web services unusable.
#
# Not Yet Implemented!
class NoReferrer < Base
default_reaction :deny

View file

@ -9,8 +9,6 @@ module Rack
#
# Unescapes '/' and '.', expands +path_info+.
# Thus <tt>GET /foo/%2e%2e%2fbar</tt> becomes <tt>GET /bar</tt>.
#
# Not Yet Implemented!
class PathTraversal < Base
def call(env)
path_was = env["PATH_INFO"]

View file

@ -12,8 +12,6 @@ module Rack
#
# Combine with NoReferrer to also block remote requests from non-HTTP pages
# (FTP/HTTPS/...).
#
# Not Yet Implemented!
class RemoteReferrer < Base
default_reaction :deny

View file

@ -11,8 +11,6 @@ module Rack
# included in the session *or* the request comes from the same origin.
#
# Compatible with Rails and rack-csrf.
#
# Not Yet Implemented!
class RemoteToken < AuthenticityToken
default_reaction :deny

View file

@ -11,8 +11,6 @@ module Rack
# the session if those properties change. This essentially prevents attacks
# from Firesheep. Since all headers taken into consideration might be
# spoofed, too, this will not prevent all hijacking attempts.
#
# Not Yet Implemented!
class SessionHijacking < Base
default_options :tracking_key => :tracking, :encrypt_tracking => true,
:track => %w[HTTP_USER_AGENT HTTP_ACCEPT_ENCODING HTTP_ACCEPT_LANGUAGE