mirror of
https://github.com/sinatra/sinatra
synced 2023-03-27 23:18:01 -04:00
remove "not yet implemented" comments if not true
This commit is contained in:
parent
899fa10b95
commit
7a452035e9
6 changed files with 0 additions and 12 deletions
|
@ -11,8 +11,6 @@ module Rack
|
|||
# included in the session.
|
||||
#
|
||||
# Compatible with Rails and rack-csrf.
|
||||
#
|
||||
# Not Yet Implemented!
|
||||
class AuthenticityToken < Base
|
||||
def accepts?(env)
|
||||
return true if safe? env
|
||||
|
|
|
@ -12,8 +12,6 @@ module Rack
|
|||
#
|
||||
# This middleware is not used when using the Rack::Protection collection,
|
||||
# since it renders web services unusable.
|
||||
#
|
||||
# Not Yet Implemented!
|
||||
class NoReferrer < Base
|
||||
default_reaction :deny
|
||||
|
||||
|
|
|
@ -9,8 +9,6 @@ module Rack
|
|||
#
|
||||
# Unescapes '/' and '.', expands +path_info+.
|
||||
# Thus <tt>GET /foo/%2e%2e%2fbar</tt> becomes <tt>GET /bar</tt>.
|
||||
#
|
||||
# Not Yet Implemented!
|
||||
class PathTraversal < Base
|
||||
def call(env)
|
||||
path_was = env["PATH_INFO"]
|
||||
|
|
|
@ -12,8 +12,6 @@ module Rack
|
|||
#
|
||||
# Combine with NoReferrer to also block remote requests from non-HTTP pages
|
||||
# (FTP/HTTPS/...).
|
||||
#
|
||||
# Not Yet Implemented!
|
||||
class RemoteReferrer < Base
|
||||
default_reaction :deny
|
||||
|
||||
|
|
|
@ -11,8 +11,6 @@ module Rack
|
|||
# included in the session *or* the request comes from the same origin.
|
||||
#
|
||||
# Compatible with Rails and rack-csrf.
|
||||
#
|
||||
# Not Yet Implemented!
|
||||
class RemoteToken < AuthenticityToken
|
||||
default_reaction :deny
|
||||
|
||||
|
|
|
@ -11,8 +11,6 @@ module Rack
|
|||
# the session if those properties change. This essentially prevents attacks
|
||||
# from Firesheep. Since all headers taken into consideration might be
|
||||
# spoofed, too, this will not prevent all hijacking attempts.
|
||||
#
|
||||
# Not Yet Implemented!
|
||||
class SessionHijacking < Base
|
||||
default_options :tracking_key => :tracking, :encrypt_tracking => true,
|
||||
:track => %w[HTTP_USER_AGENT HTTP_ACCEPT_ENCODING HTTP_ACCEPT_LANGUAGE
|
||||
|
|
Loading…
Add table
Reference in a new issue