Sha256: 9e168a8b0813ba412a63184630624daaa5fef1d9fa84e67b28dc76f67c56b10f
Contents?: true
Size: 1.95 KB
Versions: 1
Compression:
Stored size: 1.95 KB
Contents
# frozen_string_literal: true require 'padrino-core' require 'redcarpet' Tilt.prefer Tilt::RedcarpetTemplate module PactBroker module Doc module Controllers class App < Padrino::Application set :root, File.join(File.dirname(__FILE__), '..') set :show_exceptions, true MAPPINGS = { 'webhooks-create' => 'webhooks', 'webhooks-webhooks' => 'webhooks', 'webhook' => 'webhooks', 'can-i-deploy-pacticipant-version-to-tag' => 'can-i-deploy', 'pacticipant' => 'pacticipants' }.freeze helpers do def view_name_for rel_name, context = nil view_name = MAPPINGS[rel_name] || rel_name context ? "#{context}/#{view_name}" : view_name end def resource_exists? rel_name, context = nil File.exist? File.join(self.class.root, 'views', "#{view_name_for(rel_name, context)}.markdown") end end get ":rel_name" do rel_name = params[:rel_name] context = params[:context] view_params = {:layout_engine => :haml, layout: :'layouts/main', locals: { base_url: base_url }} if resource_exists? rel_name, context markdown view_name_for(rel_name, context).to_sym, view_params, {} elsif resource_exists? rel_name markdown view_name_for(rel_name).to_sym, view_params, {} else markdown :not_found, view_params, {} end end private def base_url # Using the X-Forwarded headers in the UI can leave the app vulnerable # https://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ # Either use the explicitly configured base url or an empty string, # rather than request.base_url, which uses the X-Forwarded headers. env["pactbroker.base_url"] || PactBroker.configuration.base_url || '' end end end end end
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
pact_broker-2.75.0 | lib/pact_broker/doc/controllers/app.rb |