1. 09 1月, 2015 1 次提交
  2. 20 8月, 2014 1 次提交
  3. 17 6月, 2014 2 次提交
  4. 16 6月, 2014 1 次提交
  5. 28 5月, 2014 1 次提交
  6. 06 5月, 2014 1 次提交
  7. 18 4月, 2014 2 次提交
  8. 05 3月, 2014 1 次提交
  9. 18 12月, 2013 2 次提交
  10. 19 9月, 2013 1 次提交
  11. 09 2月, 2013 1 次提交
  12. 23 1月, 2013 1 次提交
  13. 06 1月, 2013 1 次提交
  14. 13 9月, 2012 1 次提交
  15. 31 5月, 2012 1 次提交
  16. 29 3月, 2012 3 次提交
  17. 16 3月, 2012 1 次提交
  18. 15 3月, 2012 2 次提交
  19. 10 3月, 2012 1 次提交
    • S
      configure how unverified request will be handled · 24594110
      Sergey Nartimov 提交于
      can be configured using `:with` option in `protect_from_forgery` method
      or `request_forgery_protection_method` config option
      
      possible values:
      - :reset_session (default)
      - :exception
      
      new applications are generated with:
      
          protect_from_forgery :with => :exception
      24594110
  20. 23 2月, 2012 1 次提交
    • D
      Add config.default_method_for_update to support PATCH · 002713c6
      David Lee 提交于
      PATCH is the correct HTML verb to map to the #update action. The
      semantics for PATCH allows for partial updates, whereas PUT requires a
      complete replacement.
      
      Changes:
      * adds config.default_method_for_update you can set to :patch
      * optionally use PATCH instead of PUT in resource routes and forms
      * adds the #patch verb to routes to detect PATCH requests
      * adds #patch? to Request
      * changes documentation and comments to indicate support for PATCH
      
      This change maintains complete backwards compatibility by keeping :put
      as the default for config.default_method_for_update.
      002713c6
  21. 22 1月, 2012 1 次提交
  22. 17 1月, 2012 1 次提交
  23. 11 9月, 2011 2 次提交
  24. 24 5月, 2011 1 次提交
  25. 11 5月, 2011 1 次提交
  26. 08 4月, 2011 1 次提交
  27. 09 2月, 2011 1 次提交
    • M
      Change the CSRF whitelisting to only apply to get requests · ae19e414
      Michael Koziarski 提交于
      Unfortunately the previous method of browser detection and XHR whitelisting is unable to prevent requests issued from some Flash animations and Java applets.  To ease the work required to include the CSRF token in ajax requests rails now supports providing the token in a custom http header:
      
       X-CSRF-Token: ...
      
      This fixes CVE-2011-0447
      ae19e414
  28. 07 2月, 2011 1 次提交
  29. 06 2月, 2011 1 次提交
  30. 10 1月, 2011 1 次提交
  31. 27 9月, 2010 1 次提交
  32. 14 9月, 2010 1 次提交
  33. 11 9月, 2010 1 次提交