1
0
Fork 0
mirror of https://github.com/sinatra/sinatra synced 2023-03-27 23:18:01 -04:00
sinatra/rack-protection/spec/lib/rack/protection/path_traversal_spec.rb
2014-09-03 19:28:14 +02:00

39 lines
1.3 KiB
Ruby

describe Rack::Protection::PathTraversal do
it_behaves_like "any rack application"
context 'escaping' do
before do
mock_app { |e| [200, {'Content-Type' => 'text/plain'}, [e['PATH_INFO']]] }
end
%w[/foo/bar /foo/bar/ / /.f /a.x].each do |path|
it("does not touch #{path.inspect}") { expect(get(path).body).to eq(path) }
end
{ # yes, this is ugly, feel free to change that
'/..' => '/', '/a/../b' => '/b', '/a/../b/' => '/b/', '/a/.' => '/a/',
'/%2e.' => '/', '/a/%2E%2e/b' => '/b', '/a%2f%2E%2e%2Fb/' => '/b/',
'//' => '/', '/%2fetc%2Fpasswd' => '/etc/passwd'
}.each do |a, b|
it("replaces #{a.inspect} with #{b.inspect}") { expect(get(a).body).to eq(b) }
end
it 'should be able to deal with PATH_INFO = nil (fcgi?)' do
app = Rack::Protection::PathTraversal.new(proc { 42 })
expect(app.call({})).to eq(42)
end
end
if "".respond_to?(:encoding) # Ruby 1.9+ M17N
context "PATH_INFO's encoding" do
before do
@app = Rack::Protection::PathTraversal.new(proc { |e| [200, {'Content-Type' => 'text/plain'}, [e['PATH_INFO'].encoding.to_s]] })
end
it 'should remain unchanged as ASCII-8BIT' do
body = @app.call({ 'PATH_INFO' => '/'.encode('ASCII-8BIT') })[2][0]
expect(body).to eq('ASCII-8BIT')
end
end
end
end