Skip to content
Snippets Groups Projects
Commit f0740218 authored by smayer's avatar smayer
Browse files

Add module for allowing requests from Labs domain

parent 128c86ed
Branches
No related tags found
1 merge request!2Merging development into onb as preparation for Annolyzer release
class ApplicationController < ActionController::Base class ApplicationController < ActionController::Base
include Authentication include Authentication
include AddProxyRequestOrigin
def send_file def send_file
File.open("tmp/#{params[:filename]}", "r") do |f| File.open("tmp/#{params[:filename]}", "r") do |f|
......
...@@ -76,6 +76,4 @@ Rails.application.configure do ...@@ -76,6 +76,4 @@ Rails.application.configure do
# Allow Action Cable access from any origin. # Allow Action Cable access from any origin.
config.action_cable.url = ENV['NEP_CABLE_URL'] || 'http://127.0.0.1:3000/cable' config.action_cable.url = ENV['NEP_CABLE_URL'] || 'http://127.0.0.1:3000/cable'
config.action_cable.allowed_request_origins = [ENV['NEP_LABS_DOMAIN'], 'http://127.0.0.1:8001'] config.action_cable.allowed_request_origins = [ENV['NEP_LABS_DOMAIN'], 'http://127.0.0.1:8001']
# Allow XHR/Ajax requests from different origin
config.action_controller.forgery_protection_origin_check = false
end end
# Allow requests from Labs domain
module AddProxyRequestOrigin
extend ActionController::RequestForgeryProtection
allowed_request_origins = [ENV['NEP_LABS_DOMAIN'], 'http://127.0.0.1:8001']
def valid_request_origin? # :doc:
if forgery_protection_origin_check
# We accept blank origin headers because some user agents don't send it.
raise InvalidAuthenticityToken, NULL_ORIGIN_MESSAGE if request.origin == "null"
request.origin.nil? || request.origin == request.base_url || request.origin in allowed_request_origins
else
true
end
end
end
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment