Sha256: 6537ab34fed5dc9873a788638c5fa625c9d6c3d6480b6e010d976b9220704a70
Contents?: true
Size: 1.91 KB
Versions: 8
Compression:
Stored size: 1.91 KB
Contents
# frozen_string_literal: true require 'padrino-core' require 'redcarpet' Tilt.prefer Tilt::RedcarpetTemplate module PactBroker module Doc module Controllers class App < Padrino::Application set :root, File.join(File.dirname(__FILE__), '..') set :show_exceptions, true MAPPINGS = { 'webhooks-create' => 'webhooks', 'webhooks-webhooks' => 'webhooks', 'webhook' => 'webhooks', 'can-i-deploy-pacticipant-version-to-tag' => 'can-i-deploy', 'pacticipant' => 'pacticipants' }.freeze helpers do def view_name_for rel_name, context = nil view_name = MAPPINGS[rel_name] || rel_name context ? "#{context}/#{view_name}" : view_name end def resource_exists? rel_name, context = nil File.exist? File.join(self.class.root, 'views', "#{view_name_for(rel_name, context)}.markdown") end end get ":rel_name" do rel_name = params[:rel_name] context = params[:context] view_params = {:layout_engine => :haml, layout: :'layouts/main', locals: { base_url: base_url }} if resource_exists? rel_name, context markdown view_name_for(rel_name, context).to_sym, view_params, {} elsif resource_exists? rel_name markdown view_name_for(rel_name).to_sym, view_params, {} else markdown :not_found, view_params, {} end end private def base_url # Using the X-Forwarded headers in the UI can leave the app vulnerable # https://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ # Either use the explicitly configured base url or an empty string, # rather than request.base_url, which uses the X-Forwarded headers. env["pactbroker.base_url"] || '' end end end end end
Version data entries
8 entries across 8 versions & 1 rubygems