Fixes omniauth & rack-1.2 bug #1824
Rack 1.2's request.url method is buggy, as it gets the host part from HTTP_X_FORWARDED_HOST, but the port from SERVER_PORT (which should be used in conjuction with SERVER_ADDR). This way, if the app is run behind a reverse proxy, it will create a URL with <public_host>:<private port>, and pass this to Facebook, so Facebook will redirect back to the URL with the wrong port. Upgrading Rack requires upgrade to Rails 3.1. This temporary solution configures OmniAuth using a copy of the newer version of Rack::Request.
This commit is contained in:
parent
5b0cae2bbd
commit
6e60d932c0
2 changed files with 350 additions and 0 deletions
|
|
@ -2,6 +2,16 @@
|
|||
# licensed under the Affero General Public License version 3 or later. See
|
||||
# the COPYRIGHT file.
|
||||
|
||||
require_dependency "rack/fixed_request"
|
||||
OmniAuth.config.full_host = lambda do |env|
|
||||
request_url = Rack::FixedRequest.new(env).url
|
||||
# Copied from OmniAuth::Strategy#full_host (omniauth-0.2.6)
|
||||
uri = URI.parse(request_url.gsub(/\?.*$/,''))
|
||||
uri.path = ''
|
||||
uri.query = nil
|
||||
uri.to_s
|
||||
end
|
||||
|
||||
Rails.application.config.middleware.use OmniAuth::Builder do
|
||||
if SERVICES['twitter'] && SERVICES['twitter']['consumer_key'] && SERVICES['twitter']['consumer_secret']
|
||||
provider :twitter, SERVICES['twitter']['consumer_key'], SERVICES['twitter']['consumer_secret']
|
||||
|
|
|
|||
340
lib/rack/fixed_request.rb
Normal file
340
lib/rack/fixed_request.rb
Normal file
|
|
@ -0,0 +1,340 @@
|
|||
# Copied and renamed from https://github.com/rack/rack/blob/1.3.4/lib/rack/request.rb
|
||||
require 'rack/utils'
|
||||
|
||||
module Rack
|
||||
# Rack::Request provides a convenient interface to a Rack
|
||||
# environment. It is stateless, the environment +env+ passed to the
|
||||
# constructor will be directly modified.
|
||||
#
|
||||
# req = Rack::Request.new(env)
|
||||
# req.post?
|
||||
# req.params["data"]
|
||||
#
|
||||
# The environment hash passed will store a reference to the Request object
|
||||
# instantiated so that it will only instantiate if an instance of the Request
|
||||
# object doesn't already exist.
|
||||
|
||||
class FixedRequest
|
||||
# The environment of the request.
|
||||
attr_reader :env
|
||||
|
||||
def initialize(env)
|
||||
@env = env
|
||||
end
|
||||
|
||||
def body; @env["rack.input"] end
|
||||
def script_name; @env["SCRIPT_NAME"].to_s end
|
||||
def path_info; @env["PATH_INFO"].to_s end
|
||||
def request_method; @env["REQUEST_METHOD"] end
|
||||
def query_string; @env["QUERY_STRING"].to_s end
|
||||
def content_length; @env['CONTENT_LENGTH'] end
|
||||
|
||||
def content_type
|
||||
content_type = @env['CONTENT_TYPE']
|
||||
content_type.nil? || content_type.empty? ? nil : content_type
|
||||
end
|
||||
|
||||
def session; @env['rack.session'] ||= {} end
|
||||
def session_options; @env['rack.session.options'] ||= {} end
|
||||
def logger; @env['rack.logger'] end
|
||||
|
||||
# The media type (type/subtype) portion of the CONTENT_TYPE header
|
||||
# without any media type parameters. e.g., when CONTENT_TYPE is
|
||||
# "text/plain;charset=utf-8", the media-type is "text/plain".
|
||||
#
|
||||
# For more information on the use of media types in HTTP, see:
|
||||
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.7
|
||||
def media_type
|
||||
content_type && content_type.split(/\s*[;,]\s*/, 2).first.downcase
|
||||
end
|
||||
|
||||
# The media type parameters provided in CONTENT_TYPE as a Hash, or
|
||||
# an empty Hash if no CONTENT_TYPE or media-type parameters were
|
||||
# provided. e.g., when the CONTENT_TYPE is "text/plain;charset=utf-8",
|
||||
# this method responds with the following Hash:
|
||||
# { 'charset' => 'utf-8' }
|
||||
def media_type_params
|
||||
return {} if content_type.nil?
|
||||
Hash[*content_type.split(/\s*[;,]\s*/)[1..-1].
|
||||
collect { |s| s.split('=', 2) }.
|
||||
map { |k,v| [k.downcase, v] }.flatten]
|
||||
end
|
||||
|
||||
# The character set of the request body if a "charset" media type
|
||||
# parameter was given, or nil if no "charset" was specified. Note
|
||||
# that, per RFC2616, text/* media types that specify no explicit
|
||||
# charset are to be considered ISO-8859-1.
|
||||
def content_charset
|
||||
media_type_params['charset']
|
||||
end
|
||||
|
||||
def scheme
|
||||
if @env['HTTPS'] == 'on'
|
||||
'https'
|
||||
elsif @env['HTTP_X_FORWARDED_SSL'] == 'on'
|
||||
'https'
|
||||
elsif @env['HTTP_X_FORWARDED_PROTO']
|
||||
@env['HTTP_X_FORWARDED_PROTO'].split(',')[0]
|
||||
else
|
||||
@env["rack.url_scheme"]
|
||||
end
|
||||
end
|
||||
|
||||
def ssl?
|
||||
scheme == 'https'
|
||||
end
|
||||
|
||||
def host_with_port
|
||||
if forwarded = @env["HTTP_X_FORWARDED_HOST"]
|
||||
forwarded.split(/,\s?/).last
|
||||
else
|
||||
@env['HTTP_HOST'] || "#{@env['SERVER_NAME'] || @env['SERVER_ADDR']}:#{@env['SERVER_PORT']}"
|
||||
end
|
||||
end
|
||||
|
||||
def port
|
||||
if port = host_with_port.split(/:/)[1]
|
||||
port.to_i
|
||||
elsif port = @env['HTTP_X_FORWARDED_PORT']
|
||||
port.to_i
|
||||
elsif ssl?
|
||||
443
|
||||
elsif @env.has_key?("HTTP_X_FORWARDED_HOST")
|
||||
80
|
||||
else
|
||||
@env["SERVER_PORT"].to_i
|
||||
end
|
||||
end
|
||||
|
||||
def host
|
||||
# Remove port number.
|
||||
host_with_port.to_s.gsub(/:\d+\z/, '')
|
||||
end
|
||||
|
||||
def script_name=(s); @env["SCRIPT_NAME"] = s.to_s end
|
||||
def path_info=(s); @env["PATH_INFO"] = s.to_s end
|
||||
|
||||
|
||||
# Checks the HTTP request method (or verb) to see if it was of type DELETE
|
||||
def delete?; request_method == "DELETE" end
|
||||
|
||||
# Checks the HTTP request method (or verb) to see if it was of type GET
|
||||
def get?; request_method == "GET" end
|
||||
|
||||
# Checks the HTTP request method (or verb) to see if it was of type HEAD
|
||||
def head?; request_method == "HEAD" end
|
||||
|
||||
# Checks the HTTP request method (or verb) to see if it was of type OPTIONS
|
||||
def options?; request_method == "OPTIONS" end
|
||||
|
||||
# Checks the HTTP request method (or verb) to see if it was of type PATCH
|
||||
def patch?; request_method == "PATCH" end
|
||||
|
||||
# Checks the HTTP request method (or verb) to see if it was of type POST
|
||||
def post?; request_method == "POST" end
|
||||
|
||||
# Checks the HTTP request method (or verb) to see if it was of type PUT
|
||||
def put?; request_method == "PUT" end
|
||||
|
||||
# Checks the HTTP request method (or verb) to see if it was of type TRACE
|
||||
def trace?; request_method == "TRACE" end
|
||||
|
||||
|
||||
# The set of form-data media-types. Requests that do not indicate
|
||||
# one of the media types presents in this list will not be eligible
|
||||
# for form-data / param parsing.
|
||||
FORM_DATA_MEDIA_TYPES = [
|
||||
'application/x-www-form-urlencoded',
|
||||
'multipart/form-data'
|
||||
]
|
||||
|
||||
# The set of media-types. Requests that do not indicate
|
||||
# one of the media types presents in this list will not be eligible
|
||||
# for param parsing like soap attachments or generic multiparts
|
||||
PARSEABLE_DATA_MEDIA_TYPES = [
|
||||
'multipart/related',
|
||||
'multipart/mixed'
|
||||
]
|
||||
|
||||
# Determine whether the request body contains form-data by checking
|
||||
# the request Content-Type for one of the media-types:
|
||||
# "application/x-www-form-urlencoded" or "multipart/form-data". The
|
||||
# list of form-data media types can be modified through the
|
||||
# +FORM_DATA_MEDIA_TYPES+ array.
|
||||
#
|
||||
# A request body is also assumed to contain form-data when no
|
||||
# Content-Type header is provided and the request_method is POST.
|
||||
def form_data?
|
||||
type = media_type
|
||||
meth = env["rack.methodoverride.original_method"] || env['REQUEST_METHOD']
|
||||
(meth == 'POST' && type.nil?) || FORM_DATA_MEDIA_TYPES.include?(type)
|
||||
end
|
||||
|
||||
# Determine whether the request body contains data by checking
|
||||
# the request media_type against registered parse-data media-types
|
||||
def parseable_data?
|
||||
PARSEABLE_DATA_MEDIA_TYPES.include?(media_type)
|
||||
end
|
||||
|
||||
# Returns the data recieved in the query string.
|
||||
def GET
|
||||
if @env["rack.request.query_string"] == query_string
|
||||
@env["rack.request.query_hash"]
|
||||
else
|
||||
@env["rack.request.query_string"] = query_string
|
||||
@env["rack.request.query_hash"] = parse_query(query_string)
|
||||
end
|
||||
end
|
||||
|
||||
# Returns the data recieved in the request body.
|
||||
#
|
||||
# This method support both application/x-www-form-urlencoded and
|
||||
# multipart/form-data.
|
||||
def POST
|
||||
if @env["rack.input"].nil?
|
||||
raise "Missing rack.input"
|
||||
elsif @env["rack.request.form_input"].eql? @env["rack.input"]
|
||||
@env["rack.request.form_hash"]
|
||||
elsif form_data? || parseable_data?
|
||||
@env["rack.request.form_input"] = @env["rack.input"]
|
||||
unless @env["rack.request.form_hash"] = parse_multipart(env)
|
||||
form_vars = @env["rack.input"].read
|
||||
|
||||
# Fix for Safari Ajax postings that always append \0
|
||||
# form_vars.sub!(/\0\z/, '') # performance replacement:
|
||||
form_vars.slice!(-1) if form_vars[-1] == ?\0
|
||||
|
||||
@env["rack.request.form_vars"] = form_vars
|
||||
@env["rack.request.form_hash"] = parse_query(form_vars)
|
||||
|
||||
@env["rack.input"].rewind
|
||||
end
|
||||
@env["rack.request.form_hash"]
|
||||
else
|
||||
{}
|
||||
end
|
||||
end
|
||||
|
||||
# The union of GET and POST data.
|
||||
def params
|
||||
@params ||= self.GET.merge(self.POST)
|
||||
rescue EOFError
|
||||
self.GET
|
||||
end
|
||||
|
||||
# shortcut for request.params[key]
|
||||
def [](key)
|
||||
params[key.to_s]
|
||||
end
|
||||
|
||||
# shortcut for request.params[key] = value
|
||||
def []=(key, value)
|
||||
params[key.to_s] = value
|
||||
end
|
||||
|
||||
# like Hash#values_at
|
||||
def values_at(*keys)
|
||||
keys.map{|key| params[key] }
|
||||
end
|
||||
|
||||
# the referer of the client
|
||||
def referer
|
||||
@env['HTTP_REFERER']
|
||||
end
|
||||
alias referrer referer
|
||||
|
||||
def user_agent
|
||||
@env['HTTP_USER_AGENT']
|
||||
end
|
||||
|
||||
def cookies
|
||||
hash = @env["rack.request.cookie_hash"] ||= {}
|
||||
string = @env["HTTP_COOKIE"]
|
||||
|
||||
return hash if string == @env["rack.request.cookie_string"]
|
||||
hash.clear
|
||||
|
||||
# According to RFC 2109:
|
||||
# If multiple cookies satisfy the criteria above, they are ordered in
|
||||
# the Cookie header such that those with more specific Path attributes
|
||||
# precede those with less specific. Ordering with respect to other
|
||||
# attributes (e.g., Domain) is unspecified.
|
||||
Utils.parse_query(string, ';,').each { |k,v| hash[k] = Array === v ? v.first : v }
|
||||
@env["rack.request.cookie_string"] = string
|
||||
hash
|
||||
rescue => error
|
||||
raise error.class, "cannot parse Cookie header: #{error.message}"
|
||||
end
|
||||
|
||||
def xhr?
|
||||
@env["HTTP_X_REQUESTED_WITH"] == "XMLHttpRequest"
|
||||
end
|
||||
|
||||
def base_url
|
||||
url = scheme + "://"
|
||||
url << host
|
||||
|
||||
if scheme == "https" && port != 443 ||
|
||||
scheme == "http" && port != 80
|
||||
url << ":#{port}"
|
||||
end
|
||||
|
||||
url
|
||||
end
|
||||
|
||||
# Tries to return a remake of the original request URL as a string.
|
||||
def url
|
||||
base_url + fullpath
|
||||
end
|
||||
|
||||
def path
|
||||
script_name + path_info
|
||||
end
|
||||
|
||||
def fullpath
|
||||
query_string.empty? ? path : "#{path}?#{query_string}"
|
||||
end
|
||||
|
||||
def accept_encoding
|
||||
@env["HTTP_ACCEPT_ENCODING"].to_s.split(/\s*,\s*/).map do |part|
|
||||
encoding, parameters = part.split(/\s*;\s*/, 2)
|
||||
quality = 1.0
|
||||
if parameters and /\Aq=([\d.]+)/ =~ parameters
|
||||
quality = $1.to_f
|
||||
end
|
||||
[encoding, quality]
|
||||
end
|
||||
end
|
||||
|
||||
def trusted_proxy?(ip)
|
||||
ip =~ /^127\.0\.0\.1$|^(10|172\.(1[6-9]|2[0-9]|30|31)|192\.168)\.|^::1$|^fd[0-9a-f]{2}:.+|^localhost$/i
|
||||
end
|
||||
|
||||
def ip
|
||||
remote_addrs = @env['REMOTE_ADDR'] ? @env['REMOTE_ADDR'].split(/[,\s]+/) : []
|
||||
remote_addrs.reject! { |addr| trusted_proxy?(addr) }
|
||||
|
||||
return remote_addrs.first if remote_addrs.any?
|
||||
|
||||
forwarded_ips = @env['HTTP_X_FORWARDED_FOR'] ? @env['HTTP_X_FORWARDED_FOR'].strip.split(/[,\s]+/) : []
|
||||
|
||||
if client_ip = @env['HTTP_CLIENT_IP']
|
||||
# If forwarded_ips doesn't include the client_ip, it might be an
|
||||
# ip spoofing attempt, so we ignore HTTP_CLIENT_IP
|
||||
return client_ip if forwarded_ips.include?(client_ip)
|
||||
end
|
||||
|
||||
return forwarded_ips.reject { |ip| trusted_proxy?(ip) }.last || @env["REMOTE_ADDR"]
|
||||
end
|
||||
|
||||
protected
|
||||
def parse_query(qs)
|
||||
Utils.parse_nested_query(qs)
|
||||
end
|
||||
|
||||
def parse_multipart(env)
|
||||
Rack::Multipart.parse_multipart(env)
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
Loading…
Reference in a new issue