Sha256: 6ad4b4dbc72e55a345e5b9b74f25c4b6600efb680f1a608ffe9afa7078fc6fa9
Contents?: true
Size: 1.89 KB
Versions: 27
Compression:
Stored size: 1.89 KB
Contents
require 'padrino-core' require 'redcarpet' Tilt.prefer Tilt::RedcarpetTemplate module PactBroker module Doc module Controllers class App < Padrino::Application set :root, File.join(File.dirname(__FILE__), '..') set :show_exceptions, true MAPPINGS = { 'webhooks-create' => 'webhooks', 'webhooks-webhooks' => 'webhooks', 'webhook' => 'webhooks', 'can-i-deploy-pacticipant-version-to-tag' => 'can-i-deploy', 'pacticipant' => 'pacticipants' }.freeze helpers do def view_name_for rel_name, context = nil view_name = MAPPINGS[rel_name] || rel_name context ? "#{context}/#{view_name}" : view_name end def resource_exists? rel_name, context = nil File.exist? File.join(self.class.root, 'views', "#{view_name_for(rel_name, context)}.markdown") end end get ":rel_name" do rel_name = params[:rel_name] context = params[:context] view_params = {:layout_engine => :haml, layout: :'layouts/main', locals: { base_url: base_url }} if resource_exists? rel_name, context markdown view_name_for(rel_name, context).to_sym, view_params, {} elsif resource_exists? rel_name markdown view_name_for(rel_name).to_sym, view_params, {} else markdown :not_found, view_params, {} end end private def base_url # Using the X-Forwarded headers in the UI can leave the app vulnerable # https://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ # Either use the explicitly configured base url or an empty string, # rather than request.base_url, which uses the X-Forwarded headers. PactBroker.configuration.base_url || '' end end end end end
Version data entries
27 entries across 27 versions & 1 rubygems