123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341 |
- require 'rack/utils'
- module Rack
- # Rack::Request provides a convenient interface to a Rack
- # environment. It is stateless, the environment +env+ passed to the
- # constructor will be directly modified.
- #
- # req = Rack::Request.new(env)
- # req.post?
- # req.params["data"]
- #
- # The environment hash passed will store a reference to the Request object
- # instantiated so that it will only instantiate if an instance of the Request
- # object doesn't already exist.
- class Request
- # The environment of the request.
- attr_reader :env
- def initialize(env)
- @env = env
- end
- def body; @env["rack.input"] end
- def script_name; @env["SCRIPT_NAME"].to_s end
- def path_info; @env["PATH_INFO"].to_s end
- def request_method; @env["REQUEST_METHOD"] end
- def query_string; @env["QUERY_STRING"].to_s end
- def content_length; @env['CONTENT_LENGTH'] end
- def content_type
- content_type = @env['CONTENT_TYPE']
- content_type.nil? || content_type.empty? ? nil : content_type
- end
- def session; @env['rack.session'] ||= {} end
- def session_options; @env['rack.session.options'] ||= {} end
- def logger; @env['rack.logger'] end
- # The media type (type/subtype) portion of the CONTENT_TYPE header
- # without any media type parameters. e.g., when CONTENT_TYPE is
- # "text/plain;charset=utf-8", the media-type is "text/plain".
- #
- # For more information on the use of media types in HTTP, see:
- # http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.7
- def media_type
- content_type && content_type.split(/\s*[;,]\s*/, 2).first.downcase
- end
- # The media type parameters provided in CONTENT_TYPE as a Hash, or
- # an empty Hash if no CONTENT_TYPE or media-type parameters were
- # provided. e.g., when the CONTENT_TYPE is "text/plain;charset=utf-8",
- # this method responds with the following Hash:
- # { 'charset' => 'utf-8' }
- def media_type_params
- return {} if content_type.nil?
- Hash[*content_type.split(/\s*[;,]\s*/)[1..-1].
- collect { |s| s.split('=', 2) }.
- map { |k,v| [k.downcase, v] }.flatten]
- end
- # The character set of the request body if a "charset" media type
- # parameter was given, or nil if no "charset" was specified. Note
- # that, per RFC2616, text/* media types that specify no explicit
- # charset are to be considered ISO-8859-1.
- def content_charset
- media_type_params['charset']
- end
- def scheme
- if @env['HTTPS'] == 'on'
- 'https'
- elsif @env['HTTP_X_FORWARDED_SSL'] == 'on'
- 'https'
- elsif @env['HTTP_X_FORWARDED_SCHEME']
- @env['HTTP_X_FORWARDED_SCHEME']
- elsif @env['HTTP_X_FORWARDED_PROTO']
- @env['HTTP_X_FORWARDED_PROTO'].split(',')[0]
- else
- @env["rack.url_scheme"]
- end
- end
- def ssl?
- scheme == 'https'
- end
- def host_with_port
- if forwarded = @env["HTTP_X_FORWARDED_HOST"]
- forwarded.split(/,\s?/).last
- else
- @env['HTTP_HOST'] || "#{@env['SERVER_NAME'] || @env['SERVER_ADDR']}:#{@env['SERVER_PORT']}"
- end
- end
- def port
- if port = host_with_port.split(/:/)[1]
- port.to_i
- elsif port = @env['HTTP_X_FORWARDED_PORT']
- port.to_i
- elsif ssl?
- 443
- elsif @env.has_key?("HTTP_X_FORWARDED_HOST")
- 80
- else
- @env["SERVER_PORT"].to_i
- end
- end
- def host
- # Remove port number.
- host_with_port.to_s.gsub(/:\d+\z/, '')
- end
- def script_name=(s); @env["SCRIPT_NAME"] = s.to_s end
- def path_info=(s); @env["PATH_INFO"] = s.to_s end
- # Checks the HTTP request method (or verb) to see if it was of type DELETE
- def delete?; request_method == "DELETE" end
-
- # Checks the HTTP request method (or verb) to see if it was of type GET
- def get?; request_method == "GET" end
-
- # Checks the HTTP request method (or verb) to see if it was of type HEAD
- def head?; request_method == "HEAD" end
-
- # Checks the HTTP request method (or verb) to see if it was of type OPTIONS
- def options?; request_method == "OPTIONS" end
-
- # Checks the HTTP request method (or verb) to see if it was of type PATCH
- def patch?; request_method == "PATCH" end
-
- # Checks the HTTP request method (or verb) to see if it was of type POST
- def post?; request_method == "POST" end
-
- # Checks the HTTP request method (or verb) to see if it was of type PUT
- def put?; request_method == "PUT" end
-
- # Checks the HTTP request method (or verb) to see if it was of type TRACE
- def trace?; request_method == "TRACE" end
- # The set of form-data media-types. Requests that do not indicate
- # one of the media types presents in this list will not be eligible
- # for form-data / param parsing.
- FORM_DATA_MEDIA_TYPES = [
- 'application/x-www-form-urlencoded',
- 'multipart/form-data'
- ]
- # The set of media-types. Requests that do not indicate
- # one of the media types presents in this list will not be eligible
- # for param parsing like soap attachments or generic multiparts
- PARSEABLE_DATA_MEDIA_TYPES = [
- 'multipart/related',
- 'multipart/mixed'
- ]
- # Determine whether the request body contains form-data by checking
- # the request Content-Type for one of the media-types:
- # "application/x-www-form-urlencoded" or "multipart/form-data". The
- # list of form-data media types can be modified through the
- # +FORM_DATA_MEDIA_TYPES+ array.
- #
- # A request body is also assumed to contain form-data when no
- # Content-Type header is provided and the request_method is POST.
- def form_data?
- type = media_type
- meth = env["rack.methodoverride.original_method"] || env['REQUEST_METHOD']
- (meth == 'POST' && type.nil?) || FORM_DATA_MEDIA_TYPES.include?(type)
- end
- # Determine whether the request body contains data by checking
- # the request media_type against registered parse-data media-types
- def parseable_data?
- PARSEABLE_DATA_MEDIA_TYPES.include?(media_type)
- end
- # Returns the data received in the query string.
- def GET
- if @env["rack.request.query_string"] == query_string
- @env["rack.request.query_hash"]
- else
- @env["rack.request.query_string"] = query_string
- @env["rack.request.query_hash"] = parse_query(query_string)
- end
- end
- # Returns the data received in the request body.
- #
- # This method support both application/x-www-form-urlencoded and
- # multipart/form-data.
- def POST
- if @env["rack.input"].nil?
- raise "Missing rack.input"
- elsif @env["rack.request.form_input"].eql? @env["rack.input"]
- @env["rack.request.form_hash"]
- elsif form_data? || parseable_data?
- @env["rack.request.form_input"] = @env["rack.input"]
- unless @env["rack.request.form_hash"] = parse_multipart(env)
- form_vars = @env["rack.input"].read
- # Fix for Safari Ajax postings that always append \0
- # form_vars.sub!(/\0\z/, '') # performance replacement:
- form_vars.slice!(-1) if form_vars[-1] == ?\0
- @env["rack.request.form_vars"] = form_vars
- @env["rack.request.form_hash"] = parse_query(form_vars)
- @env["rack.input"].rewind
- end
- @env["rack.request.form_hash"]
- else
- {}
- end
- end
- # The union of GET and POST data.
- def params
- @params ||= self.GET.merge(self.POST)
- rescue EOFError
- self.GET
- end
- # shortcut for request.params[key]
- def [](key)
- params[key.to_s]
- end
- # shortcut for request.params[key] = value
- def []=(key, value)
- params[key.to_s] = value
- end
- # like Hash#values_at
- def values_at(*keys)
- keys.map{|key| params[key] }
- end
- # the referer of the client
- def referer
- @env['HTTP_REFERER']
- end
- alias referrer referer
- def user_agent
- @env['HTTP_USER_AGENT']
- end
- def cookies
- hash = @env["rack.request.cookie_hash"] ||= {}
- string = @env["HTTP_COOKIE"]
- return hash if string == @env["rack.request.cookie_string"]
- hash.clear
- # According to RFC 2109:
- # If multiple cookies satisfy the criteria above, they are ordered in
- # the Cookie header such that those with more specific Path attributes
- # precede those with less specific. Ordering with respect to other
- # attributes (e.g., Domain) is unspecified.
- Utils.parse_query(string, ';,').each { |k,v| hash[k] = Array === v ? v.first : v }
- @env["rack.request.cookie_string"] = string
- hash
- rescue => error
- error.message.replace "cannot parse Cookie header: #{error.message}"
- raise
- end
- def xhr?
- @env["HTTP_X_REQUESTED_WITH"] == "XMLHttpRequest"
- end
- def base_url
- url = scheme + "://"
- url << host
- if scheme == "https" && port != 443 ||
- scheme == "http" && port != 80
- url << ":#{port}"
- end
- url
- end
- # Tries to return a remake of the original request URL as a string.
- def url
- base_url + fullpath
- end
- def path
- script_name + path_info
- end
- def fullpath
- query_string.empty? ? path : "#{path}?#{query_string}"
- end
- def accept_encoding
- @env["HTTP_ACCEPT_ENCODING"].to_s.split(/\s*,\s*/).map do |part|
- encoding, parameters = part.split(/\s*;\s*/, 2)
- quality = 1.0
- if parameters and /\Aq=([\d.]+)/ =~ parameters
- quality = $1.to_f
- end
- [encoding, quality]
- end
- end
- def trusted_proxy?(ip)
- ip =~ /^127\.0\.0\.1$|^(10|172\.(1[6-9]|2[0-9]|30|31)|192\.168)\.|^::1$|^fd[0-9a-f]{2}:.+|^localhost$/i
- end
- def ip
- remote_addrs = @env['REMOTE_ADDR'] ? @env['REMOTE_ADDR'].split(/[,\s]+/) : []
- remote_addrs.reject! { |addr| trusted_proxy?(addr) }
-
- return remote_addrs.first if remote_addrs.any?
- forwarded_ips = @env['HTTP_X_FORWARDED_FOR'] ? @env['HTTP_X_FORWARDED_FOR'].strip.split(/[,\s]+/) : []
- if client_ip = @env['HTTP_CLIENT_IP']
- # If forwarded_ips doesn't include the client_ip, it might be an
- # ip spoofing attempt, so we ignore HTTP_CLIENT_IP
- return client_ip if forwarded_ips.include?(client_ip)
- end
- return forwarded_ips.reject { |ip| trusted_proxy?(ip) }.last || @env["REMOTE_ADDR"]
- end
- protected
- def parse_query(qs)
- Utils.parse_nested_query(qs)
- end
- def parse_multipart(env)
- Rack::Multipart.parse_multipart(env)
- end
- end
- end
|